1. # Contributor: fnord0 < fnord0 AT riseup DOT net >
  2.  
  3. pkgname=zaproxy
  4. pkgver=2.0.0
  5. pkgrel=1
  6. pkgdesc="OWASP ZAP: An easy to use integrated penetration testing tool for finding vulnerabilities in web applications"
  7. arch=('i686' 'x86_64')
  8. url=("http://code.google.com/p/zaproxy/")
  9. license=('Apache')
  10. depends=('java-runtime')
  11. source=("http://zaproxy.googlecode.com/files/ZAP_${pkgver}_Linux.tar.gz")
  12. sha1sums=('77e6658cff4a10d2966fe1bd008412ae2a331cf5')
  13.  
  14. build() {
  15.     mkdir -p ${pkgdir}/usr/{bin,share} || return 1
  16.     cd ${pkgdir}/usr/share
  17.     #cd ${pkgdir}/usr/share/${pkgname}
  18.     cp -pR ${srcdir}/ZAP_${pkgver} ${pkgname} || return 1
  19.  
  20.         #create startup app /usr/bin/sqlninja
  21.         echo "#!/bin/sh" > ${pkgdir}/usr/bin/${pkgname}
  22.         echo "cd /usr/share/zaproxy" >> ${pkgdir}/usr/bin/${pkgname}
  23.         echo "./zap.sh" >> ${pkgdir}/usr/bin/${pkgname}
  24.     echo "cd -" >> ${pkgdir}/usr/bin/${pkgname}
  25.     chmod +x ${pkgdir}/usr/bin/${pkgname}
  26.  
  27.     #user notification
  28.     echo -e ""
  29.     echo -e "\e[1;31m[\e[0m\e[1;34m*\e[0m\e[1;31m]\e[0m \e[1;31mrun '\e[0m\e[1;34m/usr/bin/zaproxy\e[0m\e[1;31m' to call the application (make SURE 'java' is in your \$PATH)\e[0m"
  30.     echo -e "\e[1;34m>>>\e[0m \e[1;31mmore information @ \e[0m\e[1;32mhttp://code.google.com/p/zaproxy/\e[0m"
  31.     echo -e ""
  32. }
  33. # vim:syntax=sh