Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Get public IP from default interface in install.sh #1396

Merged
merged 1 commit into from
Apr 17, 2019
Merged

Get public IP from default interface in install.sh #1396

merged 1 commit into from
Apr 17, 2019

Conversation

wtgtybhertgeghgtwtg
Copy link
Contributor

Currently, publicIpFromInterface in install.sh will only get the IP from the eth0 interface, which may not exist. Since there's a DEFAULT_INTERFACE defined directly above it and that isn't used anywhere else, I guess that's supposed to be used.

Description

Get the IP from the default interface instead of always eth0.

Motivation and Context

eth0 may not be the default interface.

How Has This Been Tested?

I ran the altered script in an environment without an eth0 and that got set up. I didn't see a way to run tests in CONTRIBUTING.md, so I guess it's supposed to go through CI.

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • [] New feature (non-breaking change which adds functionality)
  • [] Breaking change (fix or feature that would cause existing functionality to not work as expected)

Checklist:

  • I have read the CONTRIBUTING document.
  • My code follows the code style of this project.
  • [] My change requires a change to the documentation.
  • [] I have updated the documentation accordingly.
  • [] I have added tests to cover my changes.
  • [] All new and existing tests passed.

@CLAassistant
Copy link

CLAassistant commented Apr 16, 2019

CLA assistant check
All committers have signed the CLA.

@jackivanov jackivanov merged commit 8f10647 into trailofbits:master Apr 17, 2019
@jackivanov
Copy link
Collaborator

Thanks!

andreimc added a commit to tunnelhero/algo that referenced this pull request Apr 29, 2019
* upstream/master: (22 commits)
  Automatically create cloud firewall rules for installs onto Vultr (trailofbits#1400)
  Refactoring, Linting and additional tests (trailofbits#1397)
  Update Linux WireGuard client instructions (trailofbits#1407)
  Update cloud-vultr.md (trailofbits#1406)
  Update openssl.yml (trailofbits#1403)
  Update deploy-from-script-or-cloud-init-to-localhost.md
  Update README.md (trailofbits#1380)
  Update Adblock lists (trailofbits#1394)
  fix: get public IP from default interface (trailofbits#1396)
  Move `Delete the CA key` task to the appropriate role (trailofbits#1393)
  Update deploy-from-script-or-cloud-init-to-localhost.md
  Consolidate firewall documentation (trailofbits#1386)
  Fix 963 again (trailofbits#1379)
  Refactoring to support roles inclusion (trailofbits#1365)
  Update DNS filtering advice in FAQ (trailofbits#1389)
  Use VULTR_API_CONFIG variable if set (trailofbits#1374)
  IPv6 range to AllowedIPs only when ipv6_support (trailofbits#1388)
  Update ubuntu.yml (trailofbits#1383)
  Script to support cloud-init and local easy deploy (trailofbits#1366)
  Update 10-algo-lo100.network.j2 (trailofbits#1369)
  ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants