FirewallGetCommand.cs 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
  1. using Microsoft.Extensions.DependencyInjection;
  2. using RackPeek.Domain.Resources.Firewalls;
  3. using Shared.Rcl.Commands;
  4. using Spectre.Console;
  5. using Spectre.Console.Cli;
  6. namespace Shared.Rcl.Commands.Firewalls;
  7. public class FirewallGetCommand(
  8. IServiceProvider serviceProvider
  9. ) : AsyncCommand {
  10. public override async Task<int> ExecuteAsync(
  11. CommandContext context,
  12. CancellationToken cancellationToken) {
  13. using IServiceScope scope = serviceProvider.CreateScope();
  14. FirewallHardwareReportUseCase useCase =
  15. scope.ServiceProvider.GetRequiredService<FirewallHardwareReportUseCase>();
  16. FirewallHardwareReport report = await useCase.ExecuteAsync();
  17. if (report.Firewalls.Count == 0) {
  18. AnsiConsole.MarkupLine("[yellow]No Firewalls found.[/]");
  19. return 0;
  20. }
  21. Table table = new Table()
  22. .Border(TableBorder.Rounded)
  23. .AddColumn("Name")
  24. .AddColumn("Model")
  25. .AddColumn("Managed")
  26. .AddColumn("PoE")
  27. .AddColumn("Ports")
  28. .AddColumn("Port Summary");
  29. foreach (FirewallHardwareRow s in report.Firewalls)
  30. table.AddRow(
  31. s.Name.EscapeMarkup(),
  32. (s.Model ?? "Unknown").EscapeMarkup(),
  33. s.Managed ? "[green]yes[/]" : "[red]no[/]",
  34. s.Poe ? "[green]yes[/]" : "[red]no[/]",
  35. s.TotalPorts.ToString(),
  36. s.PortSummary.EscapeMarkup()
  37. );
  38. AnsiConsole.Write(table);
  39. return 0;
  40. }
  41. }