# remirepo spec/Fedora file for php-zendframework-zend-escaper # # Copyright (c) 2015 Remi Collet # License: CC-BY-SA # http://creativecommons.org/licenses/by-sa/4.0/ # # Please, preserve the changelog entries # %global bootstrap 0 %global gh_commit a4b227d8a477f4e7e9073f8e0a7ae7dbd3104a73 %global gh_short %(c=%{gh_commit}; echo ${c:0:7}) %global gh_owner zendframework %global gh_project zend-escaper %global php_home %{_datadir}/php %global library Escaper %if %{bootstrap} %global with_tests 0%{?_with_tests:1} %else %global with_tests 0%{!?_without_tests:1} %endif Name: php-%{gh_owner}-%{gh_project} Version: 2.5.1 Release: 1%{?dist} Summary: Zend Framework %{library} component Group: Development/Libraries License: BSD URL: http://framework.zend.com/ Source0: %{gh_commit}/%{name}-%{version}-%{gh_short}.tgz Source1: makesrc.sh BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root BuildArch: noarch # Tests %if %{with_tests} BuildRequires: php(language) >= 5.3.23 BuildRequires: php-ctype BuildRequires: php-iconv BuildRequires: php-mbstring BuildRequires: php-pcre BuildRequires: php-spl # From composer, "require-dev": { # "fabpot/php-cs-fixer": "1.7.*", # "phpunit/PHPUnit": "~4.0" BuildRequires: php-composer(phpunit/phpunit) >= 4.0 # Autoloader BuildRequires: php-composer(%{gh_owner}/zend-loader) >= 2.5 %endif # From composer, "require": { # "php": ">=5.3.23" Requires: php(language) >= 5.3.23 # From phpcompatinfo report for version 2.5.1 Requires: php-ctype Requires: php-iconv Requires: php-mbstring Requires: php-pcre Requires: php-spl # Autoloader Requires: php-composer(%{gh_owner}/zend-loader) >= 2.5 Obsoletes: php-ZendFramework2-%{library} < 2.5 Provides: php-ZendFramework2-%{library} = %{version} Provides: php-composer(%{gh_owner}/%{gh_project}) = %{version} %description The OWASP Top 10 web security risks study lists Cross-Site Scripting (XSS) in second place. PHP’s sole functionality against XSS is limited to two functions of which one is commonly misapplied. Thus, the Zend\Escaper component was written. It offers developers a way to escape output and defend from XSS and related vulnerabilities by introducing contextual escaping based on peer-reviewed rules. %prep %setup -q -n %{gh_project}-%{gh_commit} %build # Empty build section, nothing required %install rm -rf %{buildroot} mkdir -p %{buildroot}%{php_home}/Zend/ cp -pr src %{buildroot}%{php_home}/Zend/%{library} %check %if %{with_tests} mkdir vendor cat << EOF | tee vendor/autoload.php array( 'namespaces' => array( 'ZendTest\\\\%{library}' => dirname(__DIR__).'/test/', 'Zend\\\\%{library}' => '%{buildroot}%{php_home}/Zend/%{library}' )))); require_once '%{php_home}/Zend/autoload.php'; EOF %{_bindir}/php -r 'require "vendor/autoload.php"; var_dump(Zend\Loader\AutoloaderFactory::getRegisteredAutoloaders());' %{_bindir}/phpunit --include-path=%{buildroot}%{php_home} %else : Test suite disabled %endif %clean rm -rf %{buildroot} %files %defattr(-,root,root,-) %{!?_licensedir:%global license %%doc} %license LICENSE.md %doc CONTRIBUTING.md README.md %doc composer.json %{php_home}/Zend/%{library} %changelog * Tue Aug 4 2015 Remi Collet - 2.5.1-1 - initial package