head	1.10;
access;
symbols
	RELEASE_8_3_0:1.7
	RELEASE_9_0_0:1.6
	RELEASE_7_4_0:1.4
	RELEASE_8_2_0:1.4
	RELEASE_6_EOL:1.4
	RELEASE_8_1_0:1.4
	RELEASE_7_3_0:1.2
	RELEASE_8_0_0:1.1
	RELEASE_7_2_0:1.1
	RELEASE_7_1_0:1.1
	RELEASE_6_4_0:1.1
	RELEASE_5_EOL:1.1;
locks; strict;
comment	@# @;


1.10
date	2012.11.17.06.01.20;	author svnexp;	state Exp;
branches;
next	1.9;

1.9
date	2012.10.03.20.01.09;	author rm;	state Exp;
branches;
next	1.8;

1.8
date	2012.07.13.09.10.11;	author rm;	state Exp;
branches;
next	1.7;

1.7
date	2012.03.10.20.53.18;	author rm;	state Exp;
branches;
next	1.6;

1.6
date	2011.11.14.23.06.23;	author rm;	state Exp;
branches;
next	1.5;

1.5
date	2011.11.14.17.16.14;	author tabthorpe;	state Exp;
branches;
next	1.4;

1.4
date	2010.03.21.20.25.07;	author niels;	state Exp;
branches;
next	1.3;

1.3
date	2010.03.15.21.28.07;	author niels;	state Exp;
branches;
next	1.2;

1.2
date	2009.11.03.02.54.09;	author linimon;	state Exp;
branches;
next	1.1;

1.1
date	2008.05.22.10.24.56;	author rafan;	state Exp;
branches;
next	;


desc
@@


1.10
log
@Switch exporter over
@
text
@# Created by: Tomoyuki Sakurai <cherry@@trombik.org>
# $FreeBSD: head/security/sqlmap/Makefile 305221 2012-10-03 20:01:09Z rm $

PORTNAME=	sqlmap
PORTVERSION=	0.9
PORTREVISION=	1
CATEGORIES=	security python
MASTER_SITES=	https://github.com/sqlmapproject/sqlmap/downloads/ \
		SF

MAINTAINER=	rm@@FreeBSD.org
COMMENT=	Automatic SQL injection tool

LICENSE=	GPLv2

FETCH_ARGS=	-pRr
USE_PYTHON=	-2.7
WRKSRC=		${WRKDIR}/${PORTNAME}
SUB_FILES=	${PORTNAME}.sh
SUB_LIST=	PYTHON_CMD=${PYTHON_CMD} \
		PATH=${PYTHONPREFIX_SITELIBDIR}/${PORTNAME}

OPTIONS_DEFINE=	MSF
MSF_DESC=	Enable Metasploit Framework integration

.include <bsd.port.options.mk>

.if  ${PORT_OPTIONS:MMSF}
RUN_DEPENDS+=	${LOCALBASE}/bin/msfcli:${PORTSDIR}/security/metasploit
.endif

post-patch:
	(cd ${WRKSRC} && ${RM} -rf `${FIND} . -type d -name .svn`)
	@@${RM} -f ${WRKSRC}/lib/core/settings.py.orig
	@@${GREP} -lr '/usr/bin/env python' ${WRKSRC} | \
		${XARGS} ${REINPLACE_CMD} -i "" \
		-e "s!/usr/bin/env python!${PYTHON_CMD}!"

do-build:
	@@${PYTHON_CMD} -m compileall ${WRKSRC}
	@@${PYTHON_CMD} -O -m compileall ${WRKSRC}
	${MKDIR} ${WRKDIR}/build/extra/
	${MV} ${WRKSRC}/doc/ ${WRKDIR}/build/
.for F in msfauxmod runcmd udfhack
	${MV} ${WRKSRC}/extra/${F} ${WRKDIR}/build/extra/${F}
.endfor

do-install:
.if  ${PORT_OPTIONS:MDOCS}
	${MKDIR} ${DOCSDIR}
.for F in AUTHORS ChangeLog README.html README.pdf THANKS
	${INSTALL_DATA} ${WRKDIR}/build/doc/${F} ${DOCSDIR}/
.endfor
.endif

	${MKDIR} ${PYTHONPREFIX_SITELIBDIR}/${PORTNAME}/extra
	( cd ${WRKDIR}/build/extra/ && ${COPYTREE_SHARE} . ${DATADIR} )
	( cd ${WRKSRC} && ${COPYTREE_SHARE} . ${PYTHONPREFIX_SITELIBDIR}/${PORTNAME} )

	${INSTALL_DATA} ${WRKSRC}/${PORTNAME}.conf ${PREFIX}/etc/${PORTNAME}.conf-dist
	${INSTALL_SCRIPT} ${WRKDIR}/${PORTNAME}.sh ${PREFIX}/bin/${PORTNAME}

.include <bsd.port.mk>
@


1.9
log
@SVN rev 305221 on 2012-10-03 20:01:09Z by rm

- fix runtime when devel/subversion and/or devel/pysvn is installed [1]
- bump PORTREVISION

As side effect, I completely disabled --update feature. It was done for number
of reasons:
- subversion relationship starts not only if --update feature is requested by
  user, but when pysvn or svn is available
- we do not installing repository metadata from the source tarball (exactly this
  breaks the --update option, but it is broken anyway, see below)
- aforementioned repository metadata is not compatible with svn 1.7, that is in
  ports now
- development repository moved to github from subversion hosting anyway

This is accomplished with replacing the call of getRevisionNumber() with static
const, that represents the svn last revision from tarball.

while here:
- trim Makefile header
- remove indefinite article from COMMENT
- convert to optionsng

Reported by:	Fausto Marzi <fausto.marzi at gmail dot com> (by mail) [1]
@
text
@d2 1
a2 1
# $FreeBSD$
@


1.8
log
@- add github as primary mirror, since the development moved there from SF
@
text
@d1 1
a1 4
# New ports collection makefile for:	sqlmap
# Date created:		2008-05-21
# Whom:			Tomoyuki Sakurai <cherry@@trombik.org>
#
a2 1
#
d6 1
d12 1
a12 1
COMMENT=	An automatic SQL injection tool
d23 2
a24 1
OPTIONS=	MSF "Enable Metasploit Framework integration" off
d28 1
a28 1
.if defined(WITH_MSF)
d34 1
d49 1
a49 1
.if !defined(NOPORTDOCS)
@


1.7
log
@- update to 0.9
- install license via LICENSE framework, not manually
- strict python versions
- drop py-psyco dependency (also suggested at [1]), because it will work
  only with python < 2.6 (EOL versions only)

PR:		165902 [1]
Submitted by:	antoine [1]
Feature safe:	yes
@
text
@d11 2
a12 1
MASTER_SITES=	SF
d19 1
@


1.6
log
@- take maintainership

Approved by:    novel (mentor)
Feature safe:   yes
@
text
@d9 1
a9 1
PORTVERSION=	0.8
d16 3
a18 2
USE_PYTHON=	2.5+
USE_BZIP2=	YES
d24 1
a24 2
OPTIONS=	MSF "Enable Metasploit Framework integration" off \
		PSY "Enable Psyco optimizer (recommended)" on
a30 3
.if defined(WITH_PSY)
RUN_DEPENDS+=	${PYTHON_SITELIBDIR}/psyco/core.py:${PORTSDIR}/devel/py-psyco
.endif
d43 3
a45 3
.	for F in msfauxmod runcmd udfhack
		${MV} ${WRKSRC}/extra/${F} ${WRKDIR}/build/extra/${F}
.	endfor
d48 1
a48 1
.	if !defined(NOPORTDOCS)
d50 3
a52 3
.	for F in AUTHORS COPYING ChangeLog README.html README.pdf THANKS
		${INSTALL_DATA} ${WRKDIR}/build/doc/${F} ${DOCSDIR}/
.	endfor
@


1.5
log
@- Reassign these ports back to the heap

Feature safe:	yes
@
text
@d13 1
a13 1
MAINTAINER=	ports@@FreeBSD.org
@


1.4
log
@Update to version 0.8 of sqlmap which adds quite some new features

WWW:	http://sqlmap.sourceforge.net/
Approved by:	itetcu (mentor)
@
text
@d13 1
a13 1
MAINTAINER=	niels@@FreeBSD.org
@


1.3
log
@- Upgrade to sqlmap 0.7 (many new features)
- Took maintainership of the port

Approved by:	itetcu (mentor)
@
text
@d9 1
a9 1
PORTVERSION=	0.7
d16 4
a19 3
USE_PYTHON=	yes
SQLMAP_DOCS=	AUTHORS COPYING ChangeLog README.html README.pdf THANKS
SUB_FILES=	${PORTNAME}
d23 12
d36 1
d44 5
d51 4
a54 5
	${INSTALL_SCRIPT} ${WRKDIR}/${PORTNAME} ${PREFIX}/bin/${PORTNAME}
	${MKDIR} ${PYTHONPREFIX_SITELIBDIR}/${PORTNAME}
.	for F in lib shell plugins txt udf xml
		${MKDIR} ${PYTHONPREFIX_SITELIBDIR}/${PORTNAME}/${F}
		( cd ${WRKSRC}/${F} && ${COPYTREE_SHARE} . ${PYTHONPREFIX_SITELIBDIR}/${PORTNAME}/${F} )
d56 6
d63 1
a63 8
	${INSTALL_SCRIPT} ${WRKSRC}/${PORTNAME}.py ${PYTHONPREFIX_SITELIBDIR}/${PORTNAME}/

.if !defined(NOPORTDOCS)
	${MKDIR} ${DOCSDIR}
.for F in ${SQLMAP_DOCS}
	${INSTALL_DATA} ${WRKSRC}/doc/${F} ${DOCSDIR}/
.endfor
.endif
@


1.2
log
@Reset cherry@@trombik.org due to maintainer-timeouts and no response
to email.

Hat:		portmgr
@
text
@d9 1
a9 1
PORTVERSION=	0.5
d13 1
a13 1
MAINTAINER=	ports@@FreeBSD.org
d17 4
a20 5
NO_BUILD=	yes
# XXX report to upstream
WRKSRC=		${WRKDIR}/${PORTNAME}
SQLMAP_TXT_FILES=	fuzz_vectors.txt user-agents.txt
SQLMAP_DOC_FILES=	AUTHORS ChangeLog README.html THANKS TODO
d23 7
a29 7
# XXX report to upstream
	${REINPLACE_CMD} -e 's|%%PYTHON_SITELIBDIR%%|${PYTHON_SITELIBDIR}|g' \
		-e 's|%%PORTNAME%%|${PORTNAME}|g' ${WRKSRC}/sqlmap.py
	${REINPLACE_CMD} -e 's|from lib\.|from ${PORTNAME}.|' \
		-e 's|from plugins\.|from ${PORTNAME}.plugins.|' ${WRKSRC}/lib/*
	${REINPLACE_CMD} -e 's|from lib\.|from ${PORTNAME}.|' \
		-e 's|from plugins\.|from ${PORTNAME}.plugins.|' ${WRKSRC}/plugins/*
d32 9
a40 15
	${INSTALL_SCRIPT} ${WRKSRC}/sqlmap.py ${PREFIX}/bin/sqlmap
	${RM} -rf ${WRKSRC}/lib/.svn
	${RM} -rf ${WRKSRC}/lib/*.bak
	${MKDIR} ${PYTHONPREFIX_SITELIBDIR}/sqlmap
	( cd ${WRKSRC}/lib && ${COPYTREE_SHARE} . ${PYTHONPREFIX_SITELIBDIR}/sqlmap )
	${RM} -rf ${WRKSRC}/plugins/.svn
	${RM} -rf ${WRKSRC}/plugins/*.bak
	${MKDIR} ${PYTHONPREFIX_SITELIBDIR:}/sqlmap/plugins
	( cd ${WRKSRC}/plugins && ${COPYTREE_SHARE} . ${PYTHONPREFIX_SITELIBDIR}/sqlmap/plugins )
.if !defined(NOPORTDATA)
	${MKDIR} ${DATADIR}/txt
.for F in ${SQLMAP_TXT_FILES}
	${INSTALL_DATA} ${WRKSRC}/txt/${F} ${DATADIR}/txt/
.endfor
.endif
d43 1
a43 1
.for F in ${SQLMAP_DOC_FILES}
@


1.1
log
@sqlmap is an automatic SQL injection tool entirely developed in Python. It is
capable to perform an extensive database management system back-end
fingerprint, retrieve remote DBMS databases, usernames, tables, columns,
enumerate entire DBMS, read system files and much more taking advantage of web
application programming security flaws that lead to SQL injection
vulnerabilities.

WWW:	http://sqlmap.sourceforge.net/

PR:		ports/123851
Submitted by:	Tomoyuki Sakurai <cherry at trombik.org>
@
text
@d13 1
a13 1
MAINTAINER=	cherry@@trombik.org
@

