# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4 PortSystem 1.0 PortGroup github 1.0 PortGroup java 1.0 PortGroup app 1.0 github.setup NationalSecurityAgency ghidra 12.0.3 Ghidra_ _build github.tarball_from archive checksums rmd160 a0f99bfc2c2201c85638111218339aedefe77f91 \ sha256 39e5d160fafa544c8b1858e2df869728d18aa3c9c5490f47a2d0db776f3b4d4d \ size 78589019 categories devel license Apache maintainers {1e0.co.uk:dev @hexagonal-sun} {crowell.biz:jeff @crowell} openmaintainer description A software reverse engineering (SRE) suite of tools developed by NSA's \ Research Directorate in support of the Cybersecurity mission long_description {*}${description} homepage https://ghidra-sre.org/ java.version 24 java.fallback openjdk24-zulu universal_variant no depends_build-append port:gradle port:py314-pip port:python314 depends_run-append port:python314 set javadest ${prefix}/share/java/${name}-${version} configure.env-append GRADLE_USER_HOME=${worksrcpath} configure.pre_args "" configure.cmd gradle -I gradle/support/fetchDependencies.gradle build.env-append GRADLE_USER_HOME=${worksrcpath} build.env-append _JAVA_OPTIONS=-Duser.home=${worksrcpath} build.cmd gradle build.target buildGhidra patchfiles launch.properties.diff set ghidra_copy_list \ [list \ Extensions \ GPL \ Ghidra \ LICENSE \ docs \ ghidraRun \ licenses \ server \ support \ ] destroot { system "unzip ${worksrcpath}/build/dist/ghidra*.zip -d ${worksrcpath}/ghbuild" xinstall -d ${destroot}${javadest} foreach item ${ghidra_copy_list} { copy ${worksrcpath}/ghbuild/ghidra_${version}_DEV/${item} ${destroot}${javadest}/ } } # app settings app.executable ${javadest}/ghidraRun app.icon ${worksrcpath}/Ghidra/RuntimeScripts/Windows/support/ghidra.ico app.retina yes