set -l __fish_iptables_tables filter nat mangle raw security function __fish_iptables_current_table set -l next_is_table 1 for token in (commandline -oc) switch $token case "--table=*" echo (string split -m1 = -- $token)[2] return 0 case "--table" set next_is_table 0 case "-*t*" set next_is_table 0 case "*" if [ $next_is_table -eq 0 ] echo $token return 0 end end end return 1 end function __fish_iptables_user_chains # There can be user-defined chains so we need iptables' help set -l tablearg set -l table (__fish_iptables_current_table) if __fish_iptables_current_table set tablearg "--table=$table" end # This only works as root, so ignore errors iptables $tablearg -L ^/dev/null | grep Chain | while read a b c echo $b end end function __fish_iptables_chains set -l table (__fish_iptables_current_table) [ -z $table ] and set -l table "*" set -l prerouting "PREROUTING For packets that are coming in" set -l input "INPUT For packets destined to local sockets" set -l output "OUTPUT For locally-generated packets" set -l forward "FORWARD For packets being routed through" set -l postrouting "POSTROUTING For packets that are about to go out" switch $table case "filter" echo $input echo $forward echo $output case "nat" echo $prerouting echo $output echo $postrouting case "mangle" echo $prerouting echo $input echo $output echo $forward echo $postrouting case "raw" echo $prerouting echo $output case "security" echo $input echo $output echo $forward case '*' echo $prerouting echo $input echo $output echo $forward echo $postrouting end __fish_iptables_user_chains end function __fish_iptables_has_chain # Remove descriptions set -l chains (__fish_iptables_chains | string split -m1 " " | while read a b; echo $a; end) set -l cmdline (commandline -op) for c in $chains if contains -- $c $cmdline return 0 end end return 1 end # A target is a user-defined chain, one of "ACCEPT DROP RETURN" or an extension (TODO) function __fish_iptables_targets echo "ACCEPT" echo "DROP" echo "RETURN" __fish_iptables_chains end ### Commands complete -c iptables -s A -l append -d 'Append rules to the end of a chain' -a '(__fish_iptables_chains)' -f complete -c iptables -s C -l check -d 'Check whether a matching rule exists in a chain' -a '(__fish_iptables_chains)' -f complete -c iptables -s D -l delete -d 'Delete rules from a chain' -a '(__fish_iptables_chains)' -f # Rulespec is match (can't complete that) and then a target # TODO: This is only valid for some options, as others need a rulenum first or no rulespec at all complete -c iptables -n '__fish_contains_opt -s A -s C -s D append check delete; and __fish_iptables_has_chain' -s j -l jump -d 'Specify the target of a rule' -f -a\ '(__fish_iptables_targets)' complete -c iptables -n '__fish_contains_opt -s A -s C -s D append check delete; and __fish_iptables_has_chain' -s m -l match -d 'Specify a match to use' -f complete -c iptables -n '__fish_iptables_has_chain' -a 'ACCEPT DROP RETURN' -f complete -c iptables -n '__fish_iptables_has_chain' -a '( __fish_iptables_user_chains)' -f complete -c iptables -s I -l insert -d 'Insert rules in the beginning of a chain' -a '(__fish_iptables_chains)' -f complete -c iptables -s R -l replace -d 'Replace a rule in a chain' -a '(__fish_iptables_chains)' -f complete -c iptables -s L -l list -d 'List all rules in a chain' -a '(__fish_iptables_chains)' -f complete -c iptables -s S -l list-rules -d 'Print all rules in a chain.' -a '(__fish_iptables_chains)' -f complete -c iptables -s F -l flush -d 'Delete ALL rules in a chain' -a '(__fish_iptables_chains)' -f complete -c iptables -s Z -l zero -d 'Zero the packet and byte counters in chains' -a '(__fish_iptables_chains)' -f complete -c iptables -s N -l new-chain -d 'Create a new user-defined chain by the given name' -a '(__fish_iptables_chains)' -f complete -c iptables -s X -l delete-chain -d 'Delete the optional user-defined chain specified' -a '(__fish_iptables_chains)' -f complete -c iptables -s P -l policy -d 'Set the policy for the chain to the given target' -a '(__fish_iptables_chains)' -f complete -c iptables -s E -l rename-chain -d 'Rename the user specified chain to the user supplied name' -a '(__fish_iptables_chains)' -f complete -c iptables -s h -d 'Help' -f complete -c iptables -s p -l protocol -d 'The protocol of the rule or of the packet to check' -f complete -c iptables -s s -l source -d 'Source specification' -f complete -c iptables -s d -l destination -d 'Destination specification' -f complete -c iptables -s j -l jump -d 'Specify the target of a rule' -f complete -c iptables -s i -l in-interface -d 'Interface via which a packet was received' -f complete -c iptables -s o -l out-interface -d 'Interface via which packet is to be sent' -f complete -c iptables -s f -l fragment -d 'Rule only refers to second and further ipv4 fragments' -f complete -c iptables -s c -l set-counters -d 'Initialize packet and byte counters of a rule' -f complete -c iptables -s v -l verbose -d 'Verbose output' -f complete -c iptables -s w -l wait -d 'Wait for the xtables lock' -f complete -c iptables -s n -l numeric -d 'Numeric output' -f complete -c iptables -s x -l exact -d 'Expand numbers' -f complete -c iptables -l line-numbers -d 'When listing rules, add line numbers' -f complete -c iptables -s t -l table -d 'The table to operate on' -a "$__fish_iptables_tables" -f # Options that take files complete -c iptables -l modprobe -d 'Use this command to load modules' -r # I don't get these # complete -c iptables -s 4 -l ipv4 -d 'This option has no effect in iptables and iptables-restore.' -f # complete -c iptables -s 6 -l ipv6 -d 'If a rule using the -6 option is inserted with … [See Man Page]' -f # complete -c iptables -s g -l goto -d '' -f # Should aliased options be in the completion? # complete -c iptables -l dst -d 'Alias for -d' -f