Skip to content

Commit ded1765

Browse files
committed
Land rapid7#4439, rm Redmine references in code
2 parents 067bda4 + 80d3c5b commit ded1765

File tree

16 files changed

+24
-40
lines changed

16 files changed

+24
-40
lines changed

.travis.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,6 @@ before_install:
1414
- sudo apt-get install -qq libpcap-dev
1515
# Uncomment when we have fewer shipping msftidy warnings.
1616
# Merge committers will still be checking, just not autofailing.
17-
# See https://dev.metasploit.com/redmine/issues/8498
1817
# - ln -sf ../../tools/dev/pre-commit-hook.rb ./.git/hooks/post-merge
1918
# - ls -la ./.git/hooks
2019
# - ./.git/hooks/post-merge

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Pull requests [#2940](https://github.com/rapid7/metasploit-framework/pull/2940)
5757
#### New Modules
5858

5959
* **Do** run `tools/msftidy.rb` against your module and fix any errors or warnings that come up. Even better would be to set up `msftidy.rb` as a [pre-commit hook](https://github.com/rapid7/metasploit-framework/blob/master/tools/dev/pre-commit-hook.rb).
60-
* **Do** use the [many module mixin APIs](https://dev.metasploit.com/api/). Wheel improvements are welcome; wheel reinventions, not so much.
60+
* **Do** use the [many module mixin APIs](https://rapid7.github.io/metasploit-framework/api/). Wheel improvements are welcome; wheel reinventions, not so much.
6161
* **Don't** include more than one module per pull request.
6262

6363
#### Library Code

README.md

Lines changed: 8 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,18 @@
1-
21
Metasploit [![Build Status](https://travis-ci.org/rapid7/metasploit-framework.png)](https://travis-ci.org/rapid7/metasploit-framework) [![Code Climate](https://codeclimate.com/badge.png)](https://codeclimate.com/github/rapid7/metasploit-framework)
32
==
43
The Metasploit Framework is released under a BSD-style license. See
54
COPYING for more details.
65

7-
The latest version of this software is available from http://metasploit.com/
6+
The latest version of this software is available from https://metasploit.com/
87

98
Bug tracking and development information can be found at:
10-
https://dev.metasploit.com/redmine/projects/framework/
11-
12-
The public GitHub source repository can be found at:
139
https://github.com/rapid7/metasploit-framework
1410

15-
Questions and suggestions can be sent to:
16-
msfdev(at)metasploit.com
17-
18-
The framework mailing list is the place to discuss features and ask for help.
19-
To subscribe, visit the following web page:
20-
https://mail.metasploit.com/mailman/listinfo/framework
11+
API documentation for writing modules can be found at:
12+
https://rapid7.github.io/metasploit-framework/api
2113

22-
The mailing list archives are available from:
23-
https://mail.metasploit.com/pipermail/framework/
14+
Questions and suggestions can be sent to:
15+
https://lists.sourceforge.net/lists/listinfo/metasploit-hackers
2416

2517
Installing
2618
--
@@ -34,10 +26,8 @@ Using Metasploit
3426
--
3527
Metasploit can do all sorts of things. The first thing you'll want to do
3628
is start `msfconsole`, but after that, you'll probably be best served by
37-
reading some of the great tutorials online:
38-
39-
* [Metasploit Unleashed][unleashed]
40-
* [The official Metasploit wiki on Github][wiki-start]
29+
reading [Metasploit Unleashed][unleashed], the [great community
30+
resources](https://metasploit.github.io), or the [wiki].
4131

4232
Contributing
4333
--
@@ -48,6 +38,7 @@ pull request. For slightly more info, see
4838
[Contributing](https://github.com/rapid7/metasploit-framework/blob/master/CONTRIBUTING.md).
4939

5040

41+
[wiki]: https://github.com/rapid7/metasploit-framework/wiki
5142
[wiki-devenv]: https://github.com/rapid7/metasploit-framework/wiki/Setting-Up-a-Metasploit-Development-Environment "Metasploit Development Environment Setup"
5243
[wiki-start]: https://github.com/rapid7/metasploit-framework/wiki/ "Metasploit Wiki"
5344
[wiki-usage]: https://github.com/rapid7/metasploit-framework/wiki/Using-Metasploit "Using Metasploit"

data/meterpreter/meterpreter.php

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -920,7 +920,7 @@ function read($resource, $len=null) {
920920
# whole php process will block waiting for data that may never come.
921921
# Unfortunately, selecting on pipes created with proc_open on Windows
922922
# always returns immediately. Basically, shell interaction in Windows
923-
# is hosed until this gets figured out. See https://dev.metasploit.com/redmine/issues/2232
923+
# is hosed until this gets figured out.
924924
$r = Array($resource);
925925
my_print("Calling select to see if there's data on $resource");
926926
while (true) {

lib/msf/core/exploit/oracle.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ def initialize(info = {})
4545
def check_dependencies
4646
if not @oci8_loaded
4747
print_error("Failed to load the OCI library: #{@oci8_error}")
48-
print_error("See http://www.metasploit.com/redmine/projects/framework/wiki/OracleUsage for installation instructions")
48+
print_error("Try 'gem install ruby-oci8'")
4949
return false
5050
end
5151
return true

lib/msf/util/exe.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1928,7 +1928,7 @@ def self.to_executable_fmt_formats
19281928
end
19291929

19301930
#
1931-
# EICAR Canary: https://www.metasploit.com/redmine/projects/framework/wiki/EICAR
1931+
# EICAR Canary
19321932
#
19331933
def self.is_eicar_corrupted?
19341934
path = ::File.expand_path(::File.join(

lib/rex/post/meterpreter/client_core.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -280,7 +280,7 @@ def migrate( pid )
280280
# good bet that migration failed and the remote side is hung.
281281
# Since we have the comm_mutex here, we *must* release it to
282282
# keep from hanging the packet dispatcher thread, which results
283-
# in blocking the entire process. See Redmine #8794
283+
# in blocking the entire process.
284284
begin
285285
Timeout.timeout(60) do
286286
# Renegotiate SSL over this socket

modules/auxiliary/scanner/http/cisco_nac_manager_traversal.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,7 @@ def initialize
2222
[
2323
[ 'CVE', '2011-3305' ],
2424
[ 'OSVDB', '76080'],
25-
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml' ],
26-
[ 'URL', 'http://dev.metasploit.com/redmine/issues/5673' ]
25+
[ 'URL', 'http://www.cisco.com/warp/public/707/cisco-sa-20111005-nac.shtml' ]
2726
],
2827
'Author' => [ 'Nenad Stojanovski <nenad.stojanovski[at]gmail.com>' ],
2928
'License' => MSF_LICENSE

modules/auxiliary/scanner/http/http_login.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ def initialize
3232
[ 'CVE', '1999-0502'] # Weak password
3333
],
3434
'License' => MSF_LICENSE,
35-
# See https://dev.metasploit.com/redmine/issues/8814
35+
# See https://github.com/rapid7/metasploit-framework/issues/3811
3636
#'DefaultOptions' => {
3737
# 'USERPASS_FILE' => File.join(Msf::Config.data_directory, "wordlists", "http_default_userpass.txt"),
3838
# 'USER_FILE' => File.join(Msf::Config.data_directory, "wordlists", "http_default_users.txt"),

modules/exploits/linux/misc/hp_nnmi_pmd_bof.rb

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,6 @@ def check
8888
res = udp_sock.timed_read(8, 1)
8989
if res.blank?
9090
# To mitigate MacOSX udp sockets behavior
91-
# see https://dev.metasploit.com/redmine/issues/7480
9291
udp_sock.put(pkt)
9392
res = udp_sock.timed_read(8)
9493
end
@@ -112,7 +111,6 @@ def exploit
112111
res = udp_sock.timed_read(13964, 1)
113112
if res.blank?
114113
# To mitigate MacOSX udp sockets behavior
115-
# see https://dev.metasploit.com/redmine/issues/7480
116114
udp_sock.put(proto_tbl_pkt)
117115
res = udp_sock.timed_read(13964)
118116
end

0 commit comments

Comments
 (0)