From 25e184899b3a2ab5d846fbd88dff79df31621fe7 Mon Sep 17 00:00:00 2001 From: Olliver Schinagl Date: Sat, 2 Apr 2022 16:08:16 +0200 Subject: [PATCH 3/3] updpkg: ghidra install desktop shortcut Lets install a desktop shortcut, for user convenience. Signed-off-by: Olliver Schinagl --- trunk/PKGBUILD | 9 ++++++++- trunk/ghidra.desktop | 13 +++++++++++++ 2 files changed, 21 insertions(+), 1 deletion(-) create mode 100644 trunk/ghidra.desktop diff --git a/trunk/PKGBUILD b/trunk/PKGBUILD index fda11ef86e95..f1afba6f76dd 100644 --- a/trunk/PKGBUILD +++ b/trunk/PKGBUILD @@ -3,7 +3,7 @@ pkgname=ghidra pkgver=10.1.2 -pkgrel=1 +pkgrel=2 pkgdesc='Software reverse engineering framework' url='https://ghidra-sre.org/' arch=('x86_64') @@ -14,8 +14,10 @@ optdepends=('python2: Python feature' 'pam: GhidraServer support') options=('!strip') source=(https://github.com/NationalSecurityAgency/ghidra/archive/Ghidra_${pkgver}_build.tar.gz + ghidra.desktop ) sha512sums=('d6f27713a61dc97b882cc1ba0ae7984f52b6eb35f880788e775db84a5a047abfcc48defa4f5cfc6c5cdf316d0dc550bb8e81b767c52d115f4f7bfa466145f30b' + '190a450792eef95b6dff27f4b0c5c6dea4a1ac2b2e26b93656b916a7eb578dd9135f5b231863e4e950b11de22adeff8fd0fba9a2773992d27e7e76a6639d9b59') prepare() { export PATH="/usr/lib/jvm/java-11-openjdk/bin:${PATH}" @@ -50,6 +52,11 @@ package() { # Simplify some directory and binary names ln -s "/usr/share/${pkgname}/ghidraRun" "${pkgdir}"/usr/bin/ghidra ln -s "/usr/share/${pkgname}/ghidra/support/analyzeHeadless" "${pkgdir}"/usr/bin/ghidra-analyzeHeadless + + install -D -m 0644 -t "${pkgdir}/usr/share/applications/" \ + "${srcdir}/ghidra.desktop" + install -D -m 0644 "GhidraDocs/GhidraClass/AdvancedDevelopment/Images/GhidraLogo64.png" \ + "${pkgdir}/usr/share/icons/hicolor/64x64/apps/ghidra.png" } # vim: ts=2 sw=2 et: diff --git a/trunk/ghidra.desktop b/trunk/ghidra.desktop new file mode 100644 index 000000000000..d7b50655c076 --- /dev/null +++ b/trunk/ghidra.desktop @@ -0,0 +1,13 @@ +[Desktop Entry] +Name=Ghidra +GenericName=ghidra +Comment=A software reverse engineering (SRE) suite of tools developed by the NSA +Encoding=UTF-8 +Terminal=false +Categories=Development;Debugger;Programming;Application +Keywords=Debugger; Reverse Engineering; +Exec=ghidra %F +Type=Application +MimeType=application/x-ghidra;; +StartupNotify=true +Icon=/usr/share/icons/hicolor/64x64/apps/ghidra.png -- 2.35.1