|
12 | 12 |
|
13 | 13 | @click.command(cls=SoftLayer.CLI.command.SLCommand, ) |
14 | 14 | @click.argument('identifier') |
| 15 | +@click.option('--credentials', type=click.BOOL, |
| 16 | + help="Display FortiGate username and FortiGate password to multi vlans.") |
15 | 17 | @environment.pass_env |
16 | | -def cli(env, identifier): |
17 | | - """Detail firewall.""" |
| 18 | +def cli(env, identifier, credentials): |
| 19 | + """Detail firewall. |
| 20 | +
|
| 21 | + EXAMPLES: |
| 22 | +
|
| 23 | + slcli firewall detail vs:12345 |
| 24 | +
|
| 25 | + slcli firewall detail --credentials true multiVlan:456789 |
| 26 | + """ |
18 | 27 |
|
19 | 28 | mgr = SoftLayer.FirewallManager(env.client) |
20 | 29 |
|
21 | 30 | firewall_type, firewall_id = firewall.parse_id(identifier) |
22 | | - _firewall = mgr.get_instance(firewall_id) |
23 | 31 |
|
24 | | - table = formatting.KeyValueTable(['name', 'value']) |
25 | | - table.align['name'] = 'r' |
26 | | - table.align['value'] = 'l' |
| 32 | + if firewall_type in ('vs', 'server', 'vlan', 'multiVlan'): |
| 33 | + |
| 34 | + if firewall_type == 'vlan': |
| 35 | + _firewall = mgr.get_instance(firewall_id) |
| 36 | + |
| 37 | + table = formatting.KeyValueTable(['name', 'value']) |
| 38 | + table.align['name'] = 'r' |
| 39 | + table.align['value'] = 'l' |
| 40 | + |
| 41 | + table.add_row(['id', _firewall.get('id')]) |
| 42 | + table.add_row(['primaryIpAddress', _firewall.get('primaryIpAddress')]) |
| 43 | + table.add_row(['datacenter', utils.lookup(_firewall, 'datacenter', 'longName')]) |
| 44 | + table.add_row(['networkVlan', utils.lookup(_firewall, 'networkVlan', 'name')]) |
| 45 | + table.add_row(['networkVlaniD', utils.lookup(_firewall, 'networkVlan', 'id')]) |
| 46 | + |
| 47 | + rules = mgr.get_dedicated_fwl_rules(firewall_id) |
| 48 | + table.add_row(['rules', get_rules_table(rules)]) |
| 49 | + |
| 50 | + if firewall_type == 'multiVlan': |
| 51 | + _firewall = mgr.get_instance(firewall_id) |
| 52 | + |
| 53 | + table = formatting.KeyValueTable(['name', 'value']) |
| 54 | + table.align['name'] = 'r' |
| 55 | + table.align['value'] = 'l' |
| 56 | + |
| 57 | + table.add_row(['name', utils.lookup(_firewall, 'networkGateway', 'name')]) |
| 58 | + table.add_row(['datacenter', utils.lookup(_firewall, 'datacenter', 'longName')]) |
| 59 | + table.add_row(['public ip', utils.lookup(_firewall, 'networkGateway', 'publicIpAddress', 'ipAddress')]) |
| 60 | + table.add_row(['private ip', utils.lookup(_firewall, 'networkGateway', 'privateIpAddress', 'ipAddress')]) |
| 61 | + table.add_row(['public ipv6', utils.lookup(_firewall, 'networkGateway', 'publicIpv6Address', 'ipAddress')]) |
| 62 | + table.add_row(['public vlan', utils.lookup(_firewall, 'networkGateway', 'publicVlan', 'vlanNumber')]) |
| 63 | + table.add_row(['private vlan', utils.lookup(_firewall, 'networkGateway', 'privateVlan', 'vlanNumber')]) |
| 64 | + table.add_row(['type', _firewall.get('firewallType')]) |
| 65 | + |
| 66 | + if credentials: |
| 67 | + table.add_row(['fortiGate username', utils.lookup(_firewall, 'managementCredentials', 'username')]) |
| 68 | + table.add_row(['fortiGate password', utils.lookup(_firewall, 'managementCredentials', 'password')]) |
| 69 | + |
| 70 | + rules = mgr.get_dedicated_fwl_rules(firewall_id) |
| 71 | + if len(rules) != 0: |
| 72 | + table.add_row(['rules', get_rules_table(rules)]) |
| 73 | + else: |
| 74 | + table.add_row(['rules', '-']) |
| 75 | + |
| 76 | + if firewall_type == 'vs' or firewall_type == 'server': |
| 77 | + rules = mgr.get_standard_fwl_rules(firewall_id) |
| 78 | + table = get_rules_table(rules) |
27 | 79 |
|
28 | | - table.add_row(['id', _firewall.get('id')]) |
29 | | - table.add_row(['primaryIpAddress', _firewall.get('primaryIpAddress')]) |
30 | | - table.add_row(['datacenter', utils.lookup(_firewall, 'datacenter', 'longName')]) |
31 | | - table.add_row(['networkVlan', utils.lookup(_firewall, 'networkVlan', 'name')]) |
32 | | - table.add_row(['networkVlaniD', utils.lookup(_firewall, 'networkVlan', 'id')]) |
| 80 | + env.fout(table) |
33 | 81 |
|
34 | | - if firewall_type == 'vlan': |
35 | | - rules = mgr.get_dedicated_fwl_rules(firewall_id) |
36 | 82 | else: |
37 | | - rules = mgr.get_standard_fwl_rules(firewall_id) |
38 | | - table.add_row(['rules', get_rules_table(rules)]) |
39 | | - env.fout(table) |
| 83 | + click.secho('Invalid firewall type %s: firewall type should be either vlan, multiVlan, vs or server.' |
| 84 | + % firewall_type, fg='red') |
| 85 | + return |
40 | 86 |
|
41 | 87 |
|
42 | 88 | def get_rules_table(rules): |
|
0 commit comments