# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4 PortSystem 1.0 PortGroup github 1.0 PortGroup java 1.0 PortGroup app 1.0 github.setup NationalSecurityAgency ghidra 11.3.1 Ghidra_ _build github.tarball_from archive checksums rmd160 dfac81c6328f3c7ce024354f6f806996f80d069a \ sha256 f81d7b964d106daf4987a72e5fa0f189c3a0b17695a66a0e9b3cd6de2410c4fc \ size 69609047 categories devel license Apache maintainers {1e0.co.uk:dev @hexagonal-sun} {crowell.biz:jeff @crowell} openmaintainer description A software reverse engineering (SRE) suite of tools developed by NSA's \ Research Directorate in support of the Cybersecurity mission long_description {*}${description} homepage https://ghidra-sre.org/ java.version 21 java.fallback openjdk21 universal_variant no depends_build-append port:gradle port:py313-pip port:python313 depends_run-append port:python313 set javadest ${prefix}/share/java/${name}-${version} configure.env-append GRADLE_USER_HOME=${worksrcpath} configure.pre_args "" configure.cmd gradle -I gradle/support/fetchDependencies.gradle build.env-append GRADLE_USER_HOME=${worksrcpath} build.env-append _JAVA_OPTIONS=-Duser.home=${worksrcpath} build.cmd gradle build.target buildGhidra patchfiles launch.properties.diff set ghidra_copy_list \ [list \ Extensions \ GPL \ Ghidra \ LICENSE \ docs \ ghidraRun \ licenses \ server \ support \ ] destroot { system "unzip ${worksrcpath}/build/dist/ghidra*.zip -d ${worksrcpath}/ghbuild" xinstall -d ${destroot}${javadest} foreach item ${ghidra_copy_list} { copy ${worksrcpath}/ghbuild/ghidra_${version}_DEV/${item} ${destroot}${javadest}/ } system "javac -d ${destroot}${javadest}/Ghidra/patch/ -cp \"\$(find ${destroot}${javadest}/ | egrep '.jar\$' | tr '\n' ':')\" ${filespath}/docking/widgets/filechooser/GhidraFileChooser.java" } # app settings app.executable ${javadest}/ghidraRun app.icon ${worksrcpath}/Ghidra/RuntimeScripts/Windows/support/ghidra.ico app.retina yes