2015-08-05 15:41:14 +00:00
set -l __fish_iptables_tables filter nat mangle raw security
function __fish_iptables_current_table
2017-07-25 03:45:43 +00:00
set -l next_is_table 1
2024-01-22 06:42:45 +00:00
for token in ( commandline -xc )
2017-07-25 03:45:43 +00:00
switch $token
case "--table=*"
echo ( string split -m1 = -- $token ) [ 2 ]
return 0
2020-03-09 18:36:12 +00:00
case --table
2017-07-25 03:45:43 +00:00
set next_is_table 0
case "-*t*"
set next_is_table 0
case "*"
2021-11-23 13:45:28 +00:00
if test $next_is_table -eq 0
2017-07-25 03:45:43 +00:00
echo $token
return 0
end
end
end
return 1
2015-08-05 15:41:14 +00:00
end
function __fish_iptables_user_chains
2017-07-25 03:45:43 +00:00
# There can be user-defined chains so we need iptables' help
set -l tablearg
set -l table ( __fish_iptables_current_table )
if __fish_iptables_current_table
set tablearg " --table= $table "
end
# This only works as root, so ignore errors
2020-05-15 05:14:54 +00:00
iptables $tablearg -L 2 > /dev/null | string match '*Chain*' | while read -l a b c
2017-07-25 03:45:43 +00:00
echo $b
end
2015-08-05 15:41:14 +00:00
end
function __fish_iptables_chains
2017-07-25 03:45:43 +00:00
set -l table ( __fish_iptables_current_table )
2021-11-23 13:45:28 +00:00
test -z $table
2017-07-25 03:45:43 +00:00
and set -l table "*"
set -l prerouting "PREROUTING For packets that are coming in"
set -l input "INPUT For packets destined to local sockets"
set -l output "OUTPUT For locally-generated packets"
set -l forward "FORWARD For packets being routed through"
set -l postrouting "POSTROUTING For packets that are about to go out"
switch $table
2020-03-09 18:36:12 +00:00
case filter
2017-07-25 03:45:43 +00:00
echo $input
echo $forward
echo $output
2020-03-09 18:36:12 +00:00
case nat
2017-07-25 03:45:43 +00:00
echo $prerouting
echo $output
echo $postrouting
2020-03-09 18:36:12 +00:00
case mangle
2017-07-25 03:45:43 +00:00
echo $prerouting
echo $input
echo $output
echo $forward
echo $postrouting
2020-03-09 18:36:12 +00:00
case raw
2017-07-25 03:45:43 +00:00
echo $prerouting
echo $output
2020-03-09 18:36:12 +00:00
case security
2017-07-25 03:45:43 +00:00
echo $input
echo $output
echo $forward
case '*'
echo $prerouting
echo $input
echo $output
echo $forward
echo $postrouting
end
__fish_iptables_user_chains
2015-08-05 15:41:14 +00:00
end
function __fish_iptables_has_chain
2017-07-25 03:45:43 +00:00
# Remove descriptions
2020-05-15 05:14:54 +00:00
set -l chains ( __fish_iptables_chains | string split -m1 " " | while read -l a b; echo $a ; end )
2024-01-22 06:42:45 +00:00
set -l cmdline ( commandline -xp )
2017-07-25 03:45:43 +00:00
for c in $chains
if contains -- $c $cmdline
return 0
end
end
return 1
2015-08-05 15:41:14 +00:00
end
# A target is a user-defined chain, one of "ACCEPT DROP RETURN" or an extension (TODO)
function __fish_iptables_targets
2020-03-09 18:36:12 +00:00
echo ACCEPT
echo DROP
echo RETURN
2017-07-25 03:45:43 +00:00
__fish_iptables_chains
2015-08-05 15:41:14 +00:00
end
### Commands
2017-10-11 17:17:35 +00:00
complete -c iptables -s A -l append -d 'Append rules to the end of a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s C -l check -d 'Check whether a matching rule exists in a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s D -l delete -d 'Delete rules from a chain' -a '(__fish_iptables_chains)' -f
2015-08-05 15:41:14 +00:00
# Rulespec is match (can't complete that) and then a target
# TODO: This is only valid for some options, as others need a rulenum first or no rulespec at all
2017-10-11 17:17:35 +00:00
complete -c iptables -n '__fish_contains_opt -s A -s C -s D append check delete; and __fish_iptables_has_chain' -s j -l jump -d 'Specify the target of a rule' -f -a \
2015-08-05 15:41:14 +00:00
'(__fish_iptables_targets)'
2017-10-11 17:17:35 +00:00
complete -c iptables -n '__fish_contains_opt -s A -s C -s D append check delete; and __fish_iptables_has_chain' -s m -l match -d 'Specify a match to use' -f
2020-03-09 18:36:12 +00:00
complete -c iptables -n __fish_iptables_has_chain -a 'ACCEPT DROP RETURN' -f
complete -c iptables -n __fish_iptables_has_chain -a '( __fish_iptables_user_chains)' -f
2017-10-11 17:17:35 +00:00
complete -c iptables -s I -l insert -d 'Insert rules in the beginning of a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s R -l replace -d 'Replace a rule in a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s L -l list -d 'List all rules in a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s S -l list-rules -d 'Print all rules in a chain.' -a '(__fish_iptables_chains)' -f
complete -c iptables -s F -l flush -d 'Delete ALL rules in a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s Z -l zero -d 'Zero the packet and byte counters in chains' -a '(__fish_iptables_chains)' -f
complete -c iptables -s N -l new-chain -d 'Create a new user-defined chain by the given name' -a '(__fish_iptables_chains)' -f
complete -c iptables -s X -l delete-chain -d 'Delete the optional user-defined chain specified' -a '(__fish_iptables_chains)' -f
complete -c iptables -s P -l policy -d 'Set the policy for the chain to the given target' -a '(__fish_iptables_chains)' -f
complete -c iptables -s E -l rename-chain -d 'Rename the user specified chain to the user supplied name' -a '(__fish_iptables_chains)' -f
2020-03-09 18:36:12 +00:00
complete -c iptables -s h -d Help -f
2015-08-05 15:41:14 +00:00
2017-10-11 17:17:35 +00:00
complete -c iptables -s p -l protocol -d 'The protocol of the rule or of the packet to check' -f
complete -c iptables -s s -l source -d 'Source specification' -f
complete -c iptables -s d -l destination -d 'Destination specification' -f
complete -c iptables -s j -l jump -d 'Specify the target of a rule' -f
complete -c iptables -s i -l in-interface -d 'Interface via which a packet was received' -f
complete -c iptables -s o -l out-interface -d 'Interface via which packet is to be sent' -f
complete -c iptables -s f -l fragment -d 'Rule only refers to second and further ipv4 fragments' -f
complete -c iptables -s c -l set-counters -d 'Initialize packet and byte counters of a rule' -f
complete -c iptables -s v -l verbose -d 'Verbose output' -f
complete -c iptables -s w -l wait -d 'Wait for the xtables lock' -f
complete -c iptables -s n -l numeric -d 'Numeric output' -f
complete -c iptables -s x -l exact -d 'Expand numbers' -f
complete -c iptables -l line-numbers -d 'When listing rules, add line numbers' -f
complete -c iptables -s t -l table -d 'The table to operate on' -a " $__fish_iptables_tables " -f
2015-08-05 15:41:14 +00:00
# Options that take files
2017-10-11 17:17:35 +00:00
complete -c iptables -l modprobe -d 'Use this command to load modules' -r
2015-08-05 15:41:14 +00:00
# I don't get these
2017-10-11 17:17:35 +00:00
# complete -c iptables -s 4 -l ipv4 -d 'This option has no effect in iptables and iptables-restore.' -f
# complete -c iptables -s 6 -l ipv6 -d 'If a rule using the -6 option is inserted with … [See Man Page]' -f
# complete -c iptables -s g -l goto -d '' -f
2015-08-05 15:41:14 +00:00
# Should aliased options be in the completion?
2017-10-11 17:17:35 +00:00
# complete -c iptables -l dst -d 'Alias for -d' -f