New comment by classabbyamp on void-packages repository https://github.com/void-linux/void-packages/pull/39633#issuecomment-1267333294 Comment: the previously-installed rules with the `vsed` made it so only elogind users could use the udev rules. The now-installed rules only work with the `plugdev` group (and the `vsed` did nothing useful), this patch fixes that. This should also be upstreamed, I think. Also, upstream repo changed namespaces. template change: ```diff diff --git a/srcpkgs/hackrf/template b/srcpkgs/hackrf/template index 397efa95a0..f47857bada 100644 --- a/srcpkgs/hackrf/template +++ b/srcpkgs/hackrf/template @@ -12,13 +12,9 @@ short_desc="${_desc} - tools" maintainer="Orphaned " license="GPL-2.0-or-later" homepage="https://greatscottgadgets.com/hackrf/" -distfiles="https://github.com/mossmann/hackrf/releases/download/v${version}/${pkgname}-${version}.tar.xz" +distfiles="https://github.com/greatscottgadgets/hackrf/releases/download/v${version}/${pkgname}-${version}.tar.xz" checksum=a43e5080c11efdfe69ddebcc35a02b018e30e820de0e0ebdc7948cf7b0cd93a3 -pre_configure() { - vsed -i 's|MODE="660", GROUP="plugdev"|TAG+="uaccess"|g' libhackrf/53-hackrf.rules -} - post_install() { for f in ../firmware-bin/*.{bin,dfu}; do vinstall "$f" 644 usr/share/hackrf/ ``` patch: ```diff enable device access via elogind --- a/host/libhackrf/53-hackrf.rules.in +++ b/host/libhackrf/53-hackrf.rules.in @@ -1,13 +1,13 @@ # HackRF Jawbreaker -ATTR{idVendor}=="1d50", ATTR{idProduct}=="604b", SYMLINK+="hackrf-jawbreaker-%k", MODE="660", GROUP="@HACKRF_GROUP@" +ATTR{idVendor}=="1d50", ATTR{idProduct}=="604b", SYMLINK+="hackrf-jawbreaker-%k", MODE="660", GROUP="@HACKRF_GROUP@", TAG+="uaccess" # HackRF One -ATTR{idVendor}=="1d50", ATTR{idProduct}=="6089", SYMLINK+="hackrf-one-%k", MODE="660", GROUP="@HACKRF_GROUP@" +ATTR{idVendor}=="1d50", ATTR{idProduct}=="6089", SYMLINK+="hackrf-one-%k", MODE="660", GROUP="@HACKRF_GROUP@", TAG+="uaccess" # rad1o -ATTR{idVendor}=="1d50", ATTR{idProduct}=="cc15", SYMLINK+="rad1o-%k", MODE="660", GROUP="@HACKRF_GROUP@" +ATTR{idVendor}=="1d50", ATTR{idProduct}=="cc15", SYMLINK+="rad1o-%k", MODE="660", GROUP="@HACKRF_GROUP@", TAG+="uaccess" # NXP Semiconductors DFU mode (HackRF and rad1o) -ATTR{idVendor}=="1fc9", ATTR{idProduct}=="000c", SYMLINK+="nxp-dfu-%k", MODE="660", GROUP="@HACKRF_GROUP@" +ATTR{idVendor}=="1fc9", ATTR{idProduct}=="000c", SYMLINK+="nxp-dfu-%k", MODE="660", GROUP="@HACKRF_GROUP@", TAG+="uaccess" # rad1o "full flash" mode -KERNEL=="sd?", SUBSYSTEM=="block", ENV{ID_VENDOR_ID}=="1fc9", ENV{ID_MODEL_ID}=="0042", SYMLINK+="rad1o-flash-%k", MODE="660", GROUP="@HACKRF_GROUP@" +KERNEL=="sd?", SUBSYSTEM=="block", ENV{ID_VENDOR_ID}=="1fc9", ENV{ID_MODEL_ID}=="0042", SYMLINK+="rad1o-flash-%k", MODE="660", GROUP="@HACKRF_GROUP@", TAG+="uaccess" # rad1o flash disk -KERNEL=="sd?", SUBSYSTEM=="block", ENV{ID_VENDOR_ID}=="1fc9", ENV{ID_MODEL_ID}=="0082", SYMLINK+="rad1o-msc-%k", MODE="660", GROUP="@HACKRF_GROUP@" +KERNEL=="sd?", SUBSYSTEM=="block", ENV{ID_VENDOR_ID}=="1fc9", ENV{ID_MODEL_ID}=="0082", SYMLINK+="rad1o-msc-%k", MODE="660", GROUP="@HACKRF_GROUP@", TAG+="uaccess" # ```