# -*- coding: iso-8859-1 -*-
-# Copyright (C) 2007-2019 CEA/DEN, EDF R&D, OPEN CASCADE
+# Copyright (C) 2007-2021 CEA/DEN, EDF R&D, OPEN CASCADE
#
# Copyright (C) 2003-2007 OPEN CASCADE, EADS/CCR, LIP6, CEA/DEN,
# CEDRAT, EDF R&D, LEG, PRINCIPIA R&D, BUREAU VERITAS
# get ip address on default interface (for instance eth0) to limit listening on this interface (cyber security request)
from subprocess import check_output
ips = check_output(['hostname', '--all-ip-addresses'])
- ipDefault = ips.split()[0].decode()
+ if ips.strip():
+ ipDefault = ips.split()[0].decode()
+ else:
+ ip = check_output(['hostname', '--ip-address'])
+ ipDefault = ip.split()[-1].decode()
self.CMD = ['omniNames','-start' , aPort]
self.CMD += ['-logdir' , upath, '-errlog', upath+'/omniNameErrors.log']
- self.CMD += ['-ORBendPoint', 'giop:tcp:%s:%s'%(hname,aPort)]
if verbose(): print("... ok")
if verbose(): print("to list contexts and objects bound into the context with the specified name : showNS ")