# Contributor: fnord0 < fnord0 AT riseup DOT net > pkgname=zaproxy pkgver=2.0.0 pkgrel=1 pkgdesc="OWASP ZAP: An easy to use integrated penetration testing tool for finding vulnerabilities in web applications" arch=('i686' 'x86_64') url=("http://code.google.com/p/zaproxy/") license=('Apache') depends=('java-runtime') source=("http://zaproxy.googlecode.com/files/ZAP_${pkgver}_Linux.tar.gz") sha1sums=('77e6658cff4a10d2966fe1bd008412ae2a331cf5') build() { mkdir -p ${pkgdir}/usr/{bin,share} || return 1 cd ${pkgdir}/usr/share #cd ${pkgdir}/usr/share/${pkgname} cp -pR ${srcdir}/ZAP_${pkgver} ${pkgname} || return 1 #create startup app /usr/bin/sqlninja echo "#!/bin/sh" > ${pkgdir}/usr/bin/${pkgname} echo "cd /usr/share/zaproxy" >> ${pkgdir}/usr/bin/${pkgname} echo "./zap.sh" >> ${pkgdir}/usr/bin/${pkgname} echo "cd -" >> ${pkgdir}/usr/bin/${pkgname} chmod +x ${pkgdir}/usr/bin/${pkgname} #user notification echo -e "" echo -e "\e[1;31m[\e[0m\e[1;34m*\e[0m\e[1;31m]\e[0m \e[1;31mrun '\e[0m\e[1;34m/usr/bin/zaproxy\e[0m\e[1;31m' to call the application (make SURE 'java' is in your \$PATH)\e[0m" echo -e "\e[1;34m>>>\e[0m \e[1;31mmore information @ \e[0m\e[1;32mhttp://code.google.com/p/zaproxy/\e[0m" echo -e "" } # vim:syntax=sh