nixpkgs/pkgs/tools/security/ghidra/default.nix

71 lines
1.8 KiB
Nix
Raw Normal View History

{ stdenv, fetchzip, lib, makeWrapper, autoPatchelfHook
, openjdk11, pam, makeDesktopItem, icoutils
}: let
pkg_path = "$out/lib/ghidra";
desktopItem = makeDesktopItem {
name = "ghidra";
exec = "ghidra";
icon = "ghidra";
desktopName = "Ghidra";
genericName = "Ghidra Software Reverse Engineering Suite";
categories = "Development;";
};
2020-11-13 23:26:24 +00:00
in stdenv.mkDerivation rec {
2020-11-13 23:26:24 +00:00
pname = "ghidra";
version = "9.2";
versiondate = "20201113";
src = fetchzip {
2020-11-13 23:26:24 +00:00
url = "https://www.ghidra-sre.org/ghidra_${version}_PUBLIC_${versiondate}.zip";
sha256 = "0lcvmbq04qkdsf0bz509frgw79bhyxyixkqg1k712p3576ng3nby";
};
nativeBuildInputs = [
makeWrapper
2019-03-13 21:03:40 +00:00
autoPatchelfHook
icoutils
];
2019-03-13 21:03:40 +00:00
buildInputs = [
stdenv.cc.cc.lib
pam
];
2019-03-13 21:03:40 +00:00
dontStrip = true;
installPhase = ''
mkdir -p "${pkg_path}"
mkdir -p "${pkg_path}" "$out/share/applications"
cp -a * "${pkg_path}"
ln -s ${desktopItem}/share/applications/* $out/share/applications
icotool -x "${pkg_path}/support/ghidra.ico"
rm ghidra_4_40x40x32.png
for f in ghidra_*.png; do
res=$(basename "$f" ".png" | cut -d"_" -f3 | cut -d"x" -f1-2)
mkdir -pv "$out/share/icons/hicolor/$res/apps"
mv "$f" "$out/share/icons/hicolor/$res/apps/ghidra.png"
done;
'';
postFixup = ''
mkdir -p "$out/bin"
makeWrapper "${pkg_path}/ghidraRun" "$out/bin/ghidra" \
--prefix PATH : ${lib.makeBinPath [ openjdk11 ]}
'';
meta = with lib; {
description = "A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission";
homepage = "https://ghidra-sre.org/";
platforms = [ "x86_64-linux" ];
license = licenses.asl20;
2020-11-13 23:26:24 +00:00
maintainers = with maintainers; [ ck3d govanify ];
};
}