# Contributor: fnord0 < fnord0 AT riseup DOT net >
pkgname=zaproxy
pkgver=2.0.0
pkgrel=1
pkgdesc="OWASP ZAP: An easy to use integrated penetration testing tool for finding vulnerabilities in web applications"
arch=('i686' 'x86_64')
url=("http://code.google.com/p/zaproxy/")
license=('Apache')
depends=('java-runtime')
source=("http://zaproxy.googlecode.com/files/ZAP_${pkgver}_Linux.tar.gz")
sha1sums=('77e6658cff4a10d2966fe1bd008412ae2a331cf5')
build() {
mkdir -p ${pkgdir}/usr/{bin,share} || return 1
cd ${pkgdir}/usr/share
#cd ${pkgdir}/usr/share/${pkgname}
cp -pR ${srcdir}/ZAP_${pkgver} ${pkgname} || return 1
#create startup app /usr/bin/sqlninja
echo "#!/bin/sh" > ${pkgdir}/usr/bin/${pkgname}
echo "cd /usr/share/zaproxy" >> ${pkgdir}/usr/bin/${pkgname}
echo "./zap.sh" >> ${pkgdir}/usr/bin/${pkgname}
echo "cd -" >> ${pkgdir}/usr/bin/${pkgname}
chmod +x ${pkgdir}/usr/bin/${pkgname}
#user notification
echo -e ""
echo -e "\e[1;31m[\e[0m\e[1;34m*\e[0m\e[1;31m]\e[0m \e[1;31mrun '\e[0m\e[1;34m/usr/bin/zaproxy\e[0m\e[1;31m' to call the application (make SURE 'java' is in your \$PATH)\e[0m"
echo -e "\e[1;34m>>>\e[0m \e[1;31mmore information @ \e[0m\e[1;32mhttp://code.google.com/p/zaproxy/\e[0m"
echo -e ""
}
# vim:syntax=sh