There are a lot of XSS, a security hole typically found in web
applications, caused by incorrect (or lack of) JavaScript
escaping. This module is aimed to provide a secure JavaScript
escaping to avoid XSS with JavaScript values.
The escaping routine JavaScript::Value::Escape provides escapes q!"!,
q!'!, q!&!, q!=!, q!-!, q!+!, q!;!, q!<!, q!>!, q!/!, q!\! and control
characters to JavaScript unicode entities like "\u0026".
WWW: http://search.cpan.org/dist/JavaScript-Value-Escape/
2011-05-19 15:54:39 +02:00
|
|
|
# New ports collection makefile for: JavaScript::Value::Escape
|
|
|
|
# Date created: 19 May 2011
|
|
|
|
# Whom: Jun Kuriyama <kuriyama@FreeBSD.org>
|
|
|
|
#
|
|
|
|
# $FreeBSD$
|
|
|
|
#
|
|
|
|
|
|
|
|
PORTNAME= JavaScript-Value-Escape
|
2011-08-06 13:42:02 +02:00
|
|
|
PORTVERSION= 0.06
|
There are a lot of XSS, a security hole typically found in web
applications, caused by incorrect (or lack of) JavaScript
escaping. This module is aimed to provide a secure JavaScript
escaping to avoid XSS with JavaScript values.
The escaping routine JavaScript::Value::Escape provides escapes q!"!,
q!'!, q!&!, q!=!, q!-!, q!+!, q!;!, q!<!, q!>!, q!/!, q!\! and control
characters to JavaScript unicode entities like "\u0026".
WWW: http://search.cpan.org/dist/JavaScript-Value-Escape/
2011-05-19 15:54:39 +02:00
|
|
|
CATEGORIES= lang perl5
|
|
|
|
MASTER_SITES= CPAN
|
|
|
|
PKGNAMEPREFIX= p5-
|
|
|
|
|
|
|
|
MAINTAINER= kuriyama@FreeBSD.org
|
|
|
|
COMMENT= Perl extension to avoid XSS with JavaScript value interpolation
|
|
|
|
|
|
|
|
PERL_CONFIGURE= yes
|
|
|
|
|
|
|
|
MAN3= JavaScript::Value::Escape.3
|
|
|
|
|
|
|
|
.include <bsd.port.mk>
|