head	1.4;
access;
symbols
	RELEASE_8_3_0:1.3
	RELEASE_9_0_0:1.3
	RELEASE_7_4_0:1.3
	RELEASE_8_2_0:1.3
	RELEASE_6_EOL:1.3
	RELEASE_8_1_0:1.3
	RELEASE_7_3_0:1.3
	RELEASE_8_0_0:1.3
	RELEASE_7_2_0:1.3
	RELEASE_7_1_0:1.3
	RELEASE_6_4_0:1.3
	RELEASE_5_EOL:1.3
	RELEASE_7_0_0:1.3
	RELEASE_6_3_0:1.3
	PRE_XORG_7:1.3
	RELEASE_4_EOL:1.3
	RELEASE_6_2_0:1.3
	RELEASE_6_1_0:1.2
	RELEASE_5_5_0:1.2
	RELEASE_6_0_0:1.2
	RELEASE_5_4_0:1.2
	RELEASE_4_11_0:1.2;
locks; strict;
comment	@# @;


1.4
date	2012.11.17.06.01.20;	author svnexp;	state Exp;
branches;
next	1.3;

1.3
date	2006.04.19.05.26.42;	author danfe;	state Exp;
branches;
next	1.2;

1.2
date	2004.11.11.21.15.44;	author pav;	state Exp;
branches;
next	1.1;

1.1
date	2004.11.11.21.10.04;	author pav;	state Exp;
branches;
next	;


desc
@@


1.4
log
@Switch exporter over
@
text
@# Ports collection makefile for:	spike-proxy
# Date created:				2 Aug 2004
# Whom:					Yonatan <Yonatan@@xpert.com>
#
# $FreeBSD: head/security/spike-proxy/Makefile 300897 2012-07-14 14:29:18Z beat $
#

PORTNAME=	spike-proxy
PORTVERSION=	1.4.8
CATEGORIES=	security
MASTER_SITES=	http://www.immunitysec.com/downloads/
DISTNAME=	SP${PORTVERSION:L:C/\.//g}
EXTRACT_SUFX=	.tgz

MAINTAINER=	onatan@@gmail.com
COMMENT=	Tool for looking for vulnerabilities in web applications

BUILD_DEPENDS=	${PYTHON_SITELIBDIR}/OpenSSL/SSL.so:${PORTSDIR}/security/py-openssl

WRKSRC=		${WRKDIR}/spkproxy
USE_PYTHON=	yes
NO_BUILD=	yes

post-patch:
	@@${REINPLACE_CMD} "s|\#\!/usr/bin/python|\#\!${LOCALBASE}/bin/python|" ${WRKSRC}/*.py

do-install:
	@@${MKDIR} ${DATADIR}
	@@${RM} -rf ${WRKSRC}/*.bak
	${CP} -Rp ${WRKSRC}/* ${DATADIR}/
	${SED} "s|DATADIR|${DATADIR}|" ${SCRIPTDIR}/spkproxy.sh > ${PREFIX}/bin/spkproxy.sh
	@@${CHMOD} 755 ${PREFIX}/bin/spkproxy.sh
.if !defined(NOPORTDOCS)
	@@${MKDIR} ${DOCSDIR}
.for f in WHYGPL.txt TODO.txt SpikeUsage.txt README.txt CHANGELOG.txt
	${INSTALL_DATA} ${WRKSRC}/${f} ${DOCSDIR}
.endfor
.endif

.include <bsd.port.mk>
@


1.3
log
@- Clean up Makefile
- Dump on USE_REINPLACE
- Set new maintainer [1]

Submitted by:	Jonatan B <onatan(at)gmail.com> [1]
@
text
@d5 1
a5 1
# $FreeBSD$
@


1.2
log
@- Reset bouncing maintainer's address:
  <Yonatan@@Xpert.com>: unknown user: "yonatan"
@
text
@d1 3
a3 3
# Ports collection makefile for:  spike-proxy
# Date created:			  2 Aug 2004
# Whom:				  Yonatan <Yonatan@@xpert.com>
d15 1
a15 1
MAINTAINER=	ports@@FreeBSD.org
a22 1
USE_REINPLACE=	yes
d25 1
a25 1
	${REINPLACE_CMD} "s|\#\!/usr/bin/python|\#\!${LOCALBASE}/bin/python|" ${WRKSRC}/*.py
d28 2
a29 2
	${MKDIR} ${DATADIR}
	${RM} -rf ${WRKSRC}/*.bak
d32 1
a32 1
	${CHMOD} 755 ${PREFIX}/bin/spkproxy.sh
d34 1
a34 1
	${MKDIR} ${DOCSDIR}
@


1.1
log
@Add spike-proxy, a professional-grade tool for looking for application-level
vulnerabilities in web applications. SPIKE Proxy covers the basics, such as SQL
Injection and cross-site-scripting, but it's completely open Python
infrastructure allows advanced users to customize it for web applications that
other tools fall apart on.

PR:		ports/69943
Submitted by:	Yonatan <Yonatan@@Xpert.com>
@
text
@d15 1
a15 1
MAINTAINER=	Yonatan@@xpert.com
@

