# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4 PortSystem 1.0 PortGroup github 1.0 PortGroup java 1.0 PortGroup app 1.0 github.setup NationalSecurityAgency ghidra 11.2.1 Ghidra_ _build checksums rmd160 387011c078775375144aedfc8001d45d6e3c9f97 \ sha256 dd4271dbe7c646bc8f3824f8dd44d66a700c22e389881ea4de4ada345525bd07 \ size 70364666 categories devel license Apache maintainers {1e0.co.uk:dev @hexagonal-sun} {crowell.biz:jeff @crowell} openmaintainer description A software reverse engineering (SRE) suite of tools developed by NSA's \ Research Directorate in support of the Cybersecurity mission long_description ${description} homepage https://ghidra-sre.org/ java.version 21 java.fallback openjdk21 universal_variant no depends_build-append port:gradle set javadest ${prefix}/share/java/${name}-${version} configure.env-append GRADLE_USER_HOME=${worksrcpath} configure.pre_args "" configure.cmd gradle -I gradle/support/fetchDependencies.gradle build.env-append GRADLE_USER_HOME=${worksrcpath} build.env-append _JAVA_OPTIONS=-Duser.home=${worksrcpath} build.cmd gradle build.target buildGhidra patchfiles launch.properties.diff set ghidra_copy_list \ [list \ Extensions \ GPL \ Ghidra \ LICENSE \ docs \ ghidraRun \ licenses \ server \ support \ ] destroot { system "unzip ${worksrcpath}/build/dist/ghidra*.zip -d ${worksrcpath}/ghbuild" xinstall -d ${destroot}${javadest} foreach item ${ghidra_copy_list} { copy ${worksrcpath}/ghbuild/ghidra_${version}_DEV/${item} ${destroot}${javadest}/ } system "javac -d ${destroot}${javadest}/Ghidra/patch/ -cp \"\$(find ${destroot}${javadest}/ | egrep '.jar\$' | tr '\n' ':')\" ${filespath}/docking/widgets/filechooser/GhidraFileChooser.java" } # app settings app.executable ${javadest}/ghidraRun app.icon ${worksrcpath}/Ghidra/RuntimeScripts/Windows/support/ghidra.ico app.retina yes