Do unless instead "if !" to follow the Ruby guideline

bug/bundler_fix
wchen-r7 2016-05-19 19:21:45 -05:00
parent b5284375a7
commit 99a573a013
6 changed files with 6 additions and 6 deletions

View File

@ -133,7 +133,7 @@ class MetasploitModule < Msf::Exploit::Remote
end
def exploit
if !datastore['CMD'].blank?
unless datastore['CMD'].blank?
print_status("Executing user supplied command")
execute_command(datastore['CMD'])
return

View File

@ -186,7 +186,7 @@ class MetasploitModule < Msf::Exploit::Remote
end
def exploit
if !datastore['CMD'].blank?
unless datastore['CMD'].blank?
print_status("Executing user supplied command")
execute_command(datastore['CMD'])
return

View File

@ -149,7 +149,7 @@ class MetasploitModule < Msf::Exploit::Remote
def exploit
if !datastore['CMD'].blank?
unless datastore['CMD'].blank?
print_status("Executing command '#{datastore['CMD']}'")
execute_command(datastore['CMD'])
return

View File

@ -92,7 +92,7 @@ class MetasploitModule < Msf::Exploit::Remote
end
def exploit
if !datastore['CMD'].blank?
unless datastore['CMD'].blank?
print_status("Executing command '#{datastore['CMD']}'")
execute_command(datastore['CMD'])
return

View File

@ -110,7 +110,7 @@ class MetasploitModule < Msf::Exploit::Remote
def exploit
if !datastore['CMD'].blank?
unless datastore['CMD'].blank?
print_status("Executing command '#{datastore['CMD']}'")
execute_command(datastore['CMD'])
return

View File

@ -93,7 +93,7 @@ class MetasploitModule < Msf::Exploit::Remote
def exploit
if !datastore['CMD'].blank?
unless datastore['CMD'].blank?
print_status("Executing command '#{datastore['CMD']}'")
execute_command(datastore['CMD'])
return