| skipped 40 lines |
41 | 41 | | choices=("debug", "info", "warning", "critical", "error"), |
42 | 42 | | help="Sets the log level") |
43 | 43 | | parser.add_argument('--port', action='store', type=int, help='port to run this server on') |
| 44 | + | parser.add_argument('--interface', action='store', help='interface to run the engine on for client-side training') |
44 | 45 | | |
45 | 46 | | parser.add_argument('--wait-for-censor', action='store_true', help='send control packets to the censor to get startup confirmation') |
46 | 47 | | |
| skipped 13 lines |
60 | 61 | | eid = args.get("environment_id") |
61 | 62 | | use_engine = not args.get("no_engine") |
62 | 63 | | port = args.get("port") |
| 64 | + | interface = args.get("interface") |
63 | 65 | | server_side = args.get("server_side") |
64 | 66 | | assert port, "Need to specify a port in order to launch a sniffer" |
65 | 67 | | |
| skipped 3 lines |
69 | 71 | | with actions.sniffer.Sniffer(pcap_filename, port, logger) as sniff: |
70 | 72 | | |
71 | 73 | | # Conditionally initialize the engine |
72 | | - | with engine.Engine(port, args.get("strategy"), server_side=False, environment_id=eid, output_directory=output_path, log_level=args.get("log", "info"), enabled=use_engine) as eng: |
| 74 | + | with engine.Engine(port, args.get("strategy"), server_side=False, environment_id=eid, output_directory=output_path, log_level=args.get("log", "info"), interface=interface, enabled=use_engine) as eng: |
73 | 75 | | # Wait for the censor to start up, if one is running |
74 | 76 | | if args.get("wait_for_censor"): |
75 | 77 | | self.wait_for_censor(args.get("server"), port, eid, output_path) |
| skipped 56 lines |