FirewallGetCommand.cs 1.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647
  1. using Microsoft.Extensions.DependencyInjection;
  2. using RackPeek.Domain.Resources.Firewalls;
  3. using Spectre.Console;
  4. using Spectre.Console.Cli;
  5. namespace Shared.Rcl.Commands.Firewalls;
  6. public class FirewallGetCommand(
  7. IServiceProvider serviceProvider
  8. ) : AsyncCommand {
  9. public override async Task<int> ExecuteAsync(
  10. CommandContext context,
  11. CancellationToken cancellationToken) {
  12. using IServiceScope scope = serviceProvider.CreateScope();
  13. FirewallHardwareReportUseCase useCase =
  14. scope.ServiceProvider.GetRequiredService<FirewallHardwareReportUseCase>();
  15. FirewallHardwareReport report = await useCase.ExecuteAsync();
  16. if (report.Firewalls.Count == 0) {
  17. AnsiConsole.MarkupLine("[yellow]No Firewalls found.[/]");
  18. return 0;
  19. }
  20. Table table = new Table()
  21. .Border(TableBorder.Rounded)
  22. .AddColumn("Name")
  23. .AddColumn("Model")
  24. .AddColumn("Managed")
  25. .AddColumn("PoE")
  26. .AddColumn("Ports")
  27. .AddColumn("Port Summary");
  28. foreach (FirewallHardwareRow s in report.Firewalls)
  29. table.AddRow(
  30. s.Name,
  31. s.Model ?? "Unknown",
  32. s.Managed ? "[green]yes[/]" : "[red]no[/]",
  33. s.Poe ? "[green]yes[/]" : "[red]no[/]",
  34. s.TotalPorts.ToString(),
  35. s.PortSummary
  36. );
  37. AnsiConsole.Write(table);
  38. return 0;
  39. }
  40. }