Server IP : 192.64.112.168 / Your IP : 3.141.21.106 Web Server : Apache System : Linux nc-ph-2300-85.bluforrest.com 4.18.0-513.9.1.el8_9.x86_64 #1 SMP Sat Dec 2 05:23:44 EST 2023 x86_64 User : expressoneac ( 1128) PHP Version : 8.0.30 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /lib/python3.6/site-packages/sos/report/plugins/ |
Upload File : |
# This file is part of the sos project: https://github.com/sosreport/sos # # This copyrighted material is made available to anyone wishing to use, # modify, copy, or redistribute it subject to the terms and conditions of # version 2 of the GNU General Public License. # # See the LICENSE file in the source distribution for further information. from sos.report.plugins import Plugin, IndependentPlugin, PluginOpt class SEDUtility(Plugin, IndependentPlugin): """ Collects information about SED drives installed on host system. This plugin will capture data using sedutil utility """ short_desc = 'Self Encrypting Drives' plugin_name = 'sedutil' profiles = ('security', 'system', 'storage', 'hardware') packages = ('sedutil',) option_list = [ PluginOpt('debug', default=False, desc='capture debug data'), ] def setup(self): sed_list = [] result = self.collect_cmd_output('sedutil-cli --scan') if self.get_option("debug"): if 0 == result['status']: # iterate over all the devices returned and # create a list of SED drives. for line in result['output'].splitlines(): if line.startswith("/dev/"): line = line.split() disk, tcg_opal_dev = line[:2] # Check if it is SED device or not if "2" == tcg_opal_dev: sed_list.append(disk) self.do_debug(sed_list) def do_debug(self, sed_list): """ Collect debug logs """ for device in sed_list: self.add_cmd_output(f"sedutil-cli --query {device}") # vim: set et ts=4 sw=4 :