# remirepo/Fedora spec file for php-zendframework-zend-escaper # # Copyright (c) 2015-2017 Remi Collet # License: CC-BY-SA # http://creativecommons.org/licenses/by-sa/4.0/ # # Please, preserve the changelog entries # %global bootstrap 0 %global gh_commit 2dcd14b61a72d8b8e27d579c6344e12c26141d4e %global gh_short %(c=%{gh_commit}; echo ${c:0:7}) %global gh_owner zendframework %global gh_project zend-escaper %global php_home %{_datadir}/php %global library Escaper %if %{bootstrap} %global with_tests 0%{?_with_tests:1} %else %global with_tests 0%{!?_without_tests:1} %endif Name: php-%{gh_owner}-%{gh_project} Version: 2.5.2 Release: 1%{?dist} Summary: Zend Framework %{library} component Group: Development/Libraries License: BSD URL: https://zendframework.github.io/%{gh_project}/ Source0: %{gh_commit}/%{name}-%{version}-%{gh_short}.tgz Source1: makesrc.sh BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root BuildArch: noarch # Tests %if %{with_tests} BuildRequires: php(language) >= 5.5 BuildRequires: php-ctype BuildRequires: php-iconv BuildRequires: php-mbstring BuildRequires: php-pcre BuildRequires: php-spl # From composer, "require-dev": { # "fabpot/php-cs-fixer": "1.7.*", # "phpunit/PHPUnit": "~4.0" BuildRequires: php-composer(phpunit/phpunit) >= 4.0 # Autoloader BuildRequires: php-composer(%{gh_owner}/zend-loader) >= 2.5 %endif # From composer, "require": { # "php": ">=5.5" Requires: php(language) >= 5.5 # From phpcompatinfo report for version 2.5.1 Requires: php-ctype Requires: php-iconv Requires: php-mbstring Requires: php-pcre Requires: php-spl # Autoloader Requires: php-composer(%{gh_owner}/zend-loader) >= 2.5 Obsoletes: php-ZendFramework2-%{library} < 2.5 Provides: php-ZendFramework2-%{library} = %{version} Provides: php-composer(%{gh_owner}/%{gh_project}) = %{version} %description The OWASP Top 10 web security risks study lists Cross-Site Scripting (XSS) in second place. PHP’s sole functionality against XSS is limited to two functions of which one is commonly misapplied. Thus, the Zend\Escaper component was written. It offers developers a way to escape output and defend from XSS and related vulnerabilities by introducing contextual escaping based on peer-reviewed rules. Documentation: https://zendframework.github.io/%{gh_project}/ %prep %setup -q -n %{gh_project}-%{gh_commit} mv LICENSE.md LICENSE %build # Empty build section, nothing required %install rm -rf %{buildroot} mkdir -p %{buildroot}%{php_home}/Zend/ cp -pr src %{buildroot}%{php_home}/Zend/%{library} %check %if %{with_tests} mkdir vendor cat << EOF | tee vendor/autoload.php array( 'namespaces' => array( 'ZendTest\\\\%{library}' => dirname(__DIR__).'/test/', 'Zend\\\\%{library}' => '%{buildroot}%{php_home}/Zend/%{library}' )))); require_once '%{php_home}/Zend/autoload.php'; EOF # remirepo:11 run=0 ret=0 if which php56; then php56 %{_bindir}/phpunit --include-path=%{buildroot}%{php_home} || ret=1 run=1 fi if which php71; then php70 %{_bindir}/phpunit --include-path=%{buildroot}%{php_home} || ret=1 run=1 fi if [ $run -eq 0 ]; then %{_bindir}/phpunit --include-path=%{buildroot}%{php_home} --verbose # remirepo:2 fi exit $ret %else : Test suite disabled %endif %clean rm -rf %{buildroot} %files %defattr(-,root,root,-) %{!?_licensedir:%global license %%doc} %license LICENSE %doc *.md %doc composer.json %{php_home}/Zend/%{library} %changelog * Fri Jul 1 2016 Remi Collet - 2.5.2-1 - update to 2.5.2 - raise dependency on PHP 5.5 * Tue Aug 4 2015 Remi Collet - 2.5.1-1 - initial package