mirror of
https://github.com/Oxalide/vsphere-influxdb-go.git
synced 2023-10-10 11:36:51 +00:00
add vendoring with go dep
This commit is contained in:
131
vendor/github.com/vmware/govmomi/govc/host/firewall/find.go
generated
vendored
Normal file
131
vendor/github.com/vmware/govmomi/govc/host/firewall/find.go
generated
vendored
Normal file
@@ -0,0 +1,131 @@
|
||||
/*
|
||||
Copyright (c) 2015 VMware, Inc. All Rights Reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package firewall
|
||||
|
||||
import (
|
||||
"context"
|
||||
"flag"
|
||||
"fmt"
|
||||
"os"
|
||||
|
||||
"github.com/vmware/govmomi/govc/cli"
|
||||
"github.com/vmware/govmomi/govc/flags"
|
||||
"github.com/vmware/govmomi/govc/host/esxcli"
|
||||
"github.com/vmware/govmomi/object"
|
||||
"github.com/vmware/govmomi/vim25/types"
|
||||
)
|
||||
|
||||
type find struct {
|
||||
*flags.ClientFlag
|
||||
*flags.OutputFlag
|
||||
*flags.HostSystemFlag
|
||||
|
||||
enabled bool
|
||||
check bool
|
||||
|
||||
types.HostFirewallRule
|
||||
}
|
||||
|
||||
func init() {
|
||||
cli.Register("firewall.ruleset.find", &find{})
|
||||
}
|
||||
|
||||
func (cmd *find) Register(ctx context.Context, f *flag.FlagSet) {
|
||||
cmd.ClientFlag, ctx = flags.NewClientFlag(ctx)
|
||||
cmd.ClientFlag.Register(ctx, f)
|
||||
cmd.OutputFlag, ctx = flags.NewOutputFlag(ctx)
|
||||
cmd.OutputFlag.Register(ctx, f)
|
||||
cmd.HostSystemFlag, ctx = flags.NewHostSystemFlag(ctx)
|
||||
cmd.HostSystemFlag.Register(ctx, f)
|
||||
|
||||
f.BoolVar(&cmd.check, "c", true, "Check if esx firewall is enabled")
|
||||
f.BoolVar(&cmd.enabled, "enabled", true, "Find enabled rule sets if true, disabled if false")
|
||||
f.StringVar((*string)(&cmd.Direction), "direction", string(types.HostFirewallRuleDirectionOutbound), "Direction")
|
||||
f.StringVar((*string)(&cmd.PortType), "type", string(types.HostFirewallRulePortTypeDst), "Port type")
|
||||
f.StringVar((*string)(&cmd.Protocol), "proto", string(types.HostFirewallRuleProtocolTcp), "Protocol")
|
||||
f.Var(flags.NewInt32(&cmd.Port), "port", "Port")
|
||||
}
|
||||
|
||||
func (cmd *find) Process(ctx context.Context) error {
|
||||
if err := cmd.ClientFlag.Process(ctx); err != nil {
|
||||
return err
|
||||
}
|
||||
if err := cmd.OutputFlag.Process(ctx); err != nil {
|
||||
return err
|
||||
}
|
||||
if err := cmd.HostSystemFlag.Process(ctx); err != nil {
|
||||
return err
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
func (cmd *find) Description() string {
|
||||
return `Find firewall rulesets matching the given rule.
|
||||
|
||||
For a complete list of rulesets: govc host.esxcli network firewall ruleset list
|
||||
For a complete list of rules: govc host.esxcli network firewall ruleset rule list
|
||||
|
||||
Examples:
|
||||
govc firewall.ruleset.find -direction inbound -port 22
|
||||
govc firewall.ruleset.find -direction outbound -port 2377`
|
||||
}
|
||||
|
||||
func (cmd *find) Run(ctx context.Context, f *flag.FlagSet) error {
|
||||
host, err := cmd.HostSystem()
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
fs, err := host.ConfigManager().FirewallSystem(ctx)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if cmd.check {
|
||||
esxfw, err := esxcli.GetFirewallInfo(host)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if !esxfw.Enabled {
|
||||
fmt.Fprintln(os.Stderr, "host firewall is disabled")
|
||||
}
|
||||
}
|
||||
|
||||
info, err := fs.Info(ctx)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if f.NArg() != 0 {
|
||||
// TODO: f.Args() -> types.HostFirewallRulesetIpList
|
||||
return flag.ErrHelp
|
||||
}
|
||||
|
||||
rs := object.HostFirewallRulesetList(info.Ruleset)
|
||||
matched, err := rs.EnabledByRule(cmd.HostFirewallRule, cmd.enabled)
|
||||
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
for _, r := range matched {
|
||||
fmt.Println(r.Key)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
Reference in New Issue
Block a user