X-Git-Url: https://jxself.org/git/?a=blobdiff_plain;f=kernel_hardening_checker%2Fengine.py;h=a810b98b450008baf0601bff08606099105f5d88;hb=7d8e8d5690ead4c66086ffde7676c5d9b3c1dabb;hp=4fdc222e7e8ac3d9fec6a2cf0a3c60c411f8c918;hpb=c49734db6223320fa19f1501560bd5cc513d0832;p=kconfig-hardened-check.git diff --git a/kernel_hardening_checker/engine.py b/kernel_hardening_checker/engine.py index 4fdc222..a810b98 100644 --- a/kernel_hardening_checker/engine.py +++ b/kernel_hardening_checker/engine.py @@ -1,4 +1,4 @@ -#!/usr/bin/python3 +#!/usr/bin/env python3 """ This tool is for checking the security hardening options of the Linux kernel. @@ -20,10 +20,9 @@ def colorize_result(input_text): return input_text if input_text.startswith('OK'): color = GREEN_COLOR - elif input_text.startswith('FAIL:'): - color = RED_COLOR else: - assert(False), f'unexpected result "{input_text}"' + assert(input_text.startswith('FAIL:')), f'unexpected result "{input_text}"' + color = RED_COLOR return f'{color}{input_text}{COLOR_END}' @@ -58,6 +57,10 @@ class OptCheck: self.state = None self.result = None + @property + def type(self): + return None + def check(self): # handle the 'is present' check if self.expected == 'is present':