Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Contributor: fnord0 < fnord0 AT riseup DOT net >
- pkgname=zaproxy
- pkgver=2.0.0
- pkgrel=1
- pkgdesc="OWASP ZAP: An easy to use integrated penetration testing tool for finding vulnerabilities in web applications"
- arch=('i686' 'x86_64')
- url=("http://code.google.com/p/zaproxy/")
- license=('Apache')
- depends=('java-runtime')
- source=("http://zaproxy.googlecode.com/files/ZAP_${pkgver}_Linux.tar.gz")
- sha1sums=('77e6658cff4a10d2966fe1bd008412ae2a331cf5')
- build() {
- mkdir -p ${pkgdir}/usr/{bin,share} || return 1
- cd ${pkgdir}/usr/share
- #cd ${pkgdir}/usr/share/${pkgname}
- cp -pR ${srcdir}/ZAP_${pkgver} ${pkgname} || return 1
- #create startup app /usr/bin/sqlninja
- echo "#!/bin/sh" > ${pkgdir}/usr/bin/${pkgname}
- echo "cd /usr/share/zaproxy" >> ${pkgdir}/usr/bin/${pkgname}
- echo "./zap.sh" >> ${pkgdir}/usr/bin/${pkgname}
- echo "cd -" >> ${pkgdir}/usr/bin/${pkgname}
- chmod +x ${pkgdir}/usr/bin/${pkgname}
- #user notification
- echo -e ""
- echo -e "\e[1;31m[\e[0m\e[1;34m*\e[0m\e[1;31m]\e[0m \e[1;31mrun '\e[0m\e[1;34m/usr/bin/zaproxy\e[0m\e[1;31m' to call the application (make SURE 'java' is in your \$PATH)\e[0m"
- echo -e "\e[1;34m>>>\e[0m \e[1;31mmore information @ \e[0m\e[1;32mhttp://code.google.com/p/zaproxy/\e[0m"
- echo -e ""
- }
- # vim:syntax=sh
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement