eselect-metasploit: revert incident changes on the 0.1 script

This commit is contained in:
Anton Bolshakov 2012-09-04 14:02:07 +00:00
parent 1c4e6a4025
commit d6094723e8
2 changed files with 4 additions and 4 deletions

View file

@ -1,4 +1,4 @@
AUX metasploit.eselect-0.1 4736 SHA256 fdc39f97b3ab9828715b9ebb3712f15caa348802028eee6f6a730bdf70177b37 SHA512 76c704fc09b715bebd1f0fdaa3cedef9b421759157cb179892756075aa7039eef8cb56e396ca0277f85cd332d3d0bb13f6b1fdddaeddf7118045553cc8f99faf WHIRLPOOL c4319b29dba297063997efe1034f4da05790950753a590b8f27bdc6fb541a95c33cc7c82523346e2b0cc96b5c6baa73bc84f061a0c45ec045bfbef65b68f107a
AUX metasploit.eselect-0.1 4629 SHA256 71159ab40077f05d099294b26e7bd40b9d36bca35d26b30d76b5fa016e3b64fe SHA512 ea26e8f4319fde16cc55d0fa26d2f6d39dcc75cfb9b78c14a7367ea7aaa5b678606a5adac7c4ac9194f4b9483c2a72f779a6aa744b0fd3493b8168e063df7a1a WHIRLPOOL 6e6d785a05726d2891a8975d6b0080deb9934d35853d2fa5ea5feeb6626cf9a112301318c33dcaea9c7145e92b96b7a01a3bc13cae61f99eea5041a80f4013b1
AUX metasploit.eselect-0.2 4698 SHA256 3013a9c2a5274e871fa663a04e925fc30fb95d4fdd04ad0bd05f071696b4e553 SHA512 0c978eb70f7cd51394d0f5074705497628ba4d4729af9762fd2eedcdef2ba90b93e3d1ddd61c2c2000f03e90ebdef391501f36244a765a25730baa0c729b5686 WHIRLPOOL 527abbf95e6e82b78af1a2c162c92cf36f8960250df15d458dc80d4c17c670e16335b0b097bab35a71bfef904e985ce7e231bca5d03879b5955989c27edd820d
EBUILD eselect-metasploit-0.1.ebuild 650 SHA256 410adea739a778c037d5d91172d623d315808f62d31b72f2cfa62b98c39fa7cc SHA512 fbb0d87cc71a0c81334b900d2c2450f7c1408a70e19df744c414b8f2ebb57eb3eb74c53d4cfd6b390fe64e3e2b278151b6ef87dc826c17e8608edf9d0e356bd7 WHIRLPOOL c80c81113e0b926d865807df248e8034e2fd87d7c8ec5203b054e6866982664eee18e73dd1e4dbdb64711e320edce75cf9e687e80580ffe95a93974f2c780d64
EBUILD eselect-metasploit-0.2.ebuild 650 SHA256 410adea739a778c037d5d91172d623d315808f62d31b72f2cfa62b98c39fa7cc SHA512 fbb0d87cc71a0c81334b900d2c2450f7c1408a70e19df744c414b8f2ebb57eb3eb74c53d4cfd6b390fe64e3e2b278151b6ef87dc826c17e8608edf9d0e356bd7 WHIRLPOOL c80c81113e0b926d865807df248e8034e2fd87d7c8ec5203b054e6866982664eee18e73dd1e4dbdb64711e320edce75cf9e687e80580ffe95a93974f2c780d64

View file

@ -36,7 +36,7 @@ find_targets() {
# remove the metasploit symlink
remove_symlink() {
for i in $(qlist metasploit | grep $(canonicalise "${EROOT}${MSFPATH}")/msf) "${EROOT}${MSFPATH}")/armitage
for i in $(qlist metasploit | grep $(canonicalise "${EROOT}${MSFPATH}")/msf)
do
unlink /usr/bin/$(echo ${i} | awk -F'/' '{print $5}')
done
@ -57,13 +57,13 @@ set_symlink() {
#this stanza doesn't appear to be needed...
elif [[ -d ${EROOT}/usr/$(get_libdir)/${target} ]]; then
ln -s "${target}" "${EROOT}${MSFPATH}"
for i in $(qlist metasploit | grep /usr/$(get_libdir)/${target}/msf) /usr/$(get_libdir)/${target}/armitage
for i in $(qlist metasploit | grep /usr/$(get_libdir)/${target}/msf)
do
ln -s ${i} /usr/bin/$(echo ${i} | awk -F'/' '{print $5}')
done
elif [[ -d ${EROOT}${MSFPATH}${target} ]]; then
ln -s "metasploit${target}" "${EROOT}${MSFPATH}"
for i in $(qlist metasploit | grep /usr/$(get_libdir)/${target}/msf) /usr/$(get_libdir)/${target}/armitage
for i in $(qlist metasploit | grep /usr/$(get_libdir)/${target}/msf)
do
ln -s ${i} /usr/bin/$(echo ${i} | awk -F'/' '{print $5}')
done