From 99246d38a74861d7b0f544698a90d7c7b8b4ec3c Mon Sep 17 00:00:00 2001 From: Frank Schroeder Date: Tue, 26 Sep 2017 13:42:32 +0200 Subject: [PATCH] Revert monkey patch since it is not clear whether this is an issue at all. --- vendor/github.com/hashicorp/go-sockaddr/ipv4addr.go | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/vendor/github.com/hashicorp/go-sockaddr/ipv4addr.go b/vendor/github.com/hashicorp/go-sockaddr/ipv4addr.go index 89b56a24d4..4d395dc954 100644 --- a/vendor/github.com/hashicorp/go-sockaddr/ipv4addr.go +++ b/vendor/github.com/hashicorp/go-sockaddr/ipv4addr.go @@ -58,8 +58,7 @@ func NewIPv4Addr(ipv4Str string) (IPv4Addr, error) { // Strip off any bogus hex-encoded netmasks that will be mis-parsed by Go. In // particular, clients with the Barracuda VPN client will see something like: // `192.168.3.51/00ffffff` as their IP address. - // trailingHexNetmaskRe := trailingHexNetmaskRE.Copy() - trailingHexNetmaskRe := regexp.MustCompile(`/([0f]{8})$`) + trailingHexNetmaskRe := trailingHexNetmaskRE.Copy() if match := trailingHexNetmaskRe.FindStringIndex(ipv4Str); match != nil { ipv4Str = ipv4Str[:match[0]] }