fish-shell/share/completions/iptables.fish
2024-02-27 16:25:01 +01:00

146 lines
6.4 KiB
Fish

set -l __fish_iptables_tables filter nat mangle raw security
function __fish_iptables_current_table
set -l next_is_table 1
for token in (commandline -xc)
switch $token
case "--table=*"
echo (string split -m1 = -- $token)[2]
return 0
case --table
set next_is_table 0
case "-*t*"
set next_is_table 0
case "*"
if test $next_is_table -eq 0
echo $token
return 0
end
end
end
return 1
end
function __fish_iptables_user_chains
# There can be user-defined chains so we need iptables' help
set -l tablearg
set -l table (__fish_iptables_current_table)
if __fish_iptables_current_table
set tablearg "--table=$table"
end
# This only works as root, so ignore errors
iptables $tablearg -L 2>/dev/null | string match '*Chain*' | while read -l a b c
echo $b
end
end
function __fish_iptables_chains
set -l table (__fish_iptables_current_table)
test -z $table
and set -l table "*"
set -l prerouting "PREROUTING For packets that are coming in"
set -l input "INPUT For packets destined to local sockets"
set -l output "OUTPUT For locally-generated packets"
set -l forward "FORWARD For packets being routed through"
set -l postrouting "POSTROUTING For packets that are about to go out"
switch $table
case filter
echo $input
echo $forward
echo $output
case nat
echo $prerouting
echo $output
echo $postrouting
case mangle
echo $prerouting
echo $input
echo $output
echo $forward
echo $postrouting
case raw
echo $prerouting
echo $output
case security
echo $input
echo $output
echo $forward
case '*'
echo $prerouting
echo $input
echo $output
echo $forward
echo $postrouting
end
__fish_iptables_user_chains
end
function __fish_iptables_has_chain
# Remove descriptions
set -l chains (__fish_iptables_chains | string split -m1 " " | while read -l a b; echo $a; end)
set -l cmdline (commandline -xp)
for c in $chains
if contains -- $c $cmdline
return 0
end
end
return 1
end
# A target is a user-defined chain, one of "ACCEPT DROP RETURN" or an extension (TODO)
function __fish_iptables_targets
echo ACCEPT
echo DROP
echo RETURN
__fish_iptables_chains
end
### Commands
complete -c iptables -s A -l append -d 'Append rules to the end of a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s C -l check -d 'Check whether a matching rule exists in a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s D -l delete -d 'Delete rules from a chain' -a '(__fish_iptables_chains)' -f
# Rulespec is match (can't complete that) and then a target
# TODO: This is only valid for some options, as others need a rulenum first or no rulespec at all
complete -c iptables -n '__fish_contains_opt -s A -s C -s D append check delete; and __fish_iptables_has_chain' -s j -l jump -d 'Specify the target of a rule' -f -a\
'(__fish_iptables_targets)'
complete -c iptables -n '__fish_contains_opt -s A -s C -s D append check delete; and __fish_iptables_has_chain' -s m -l match -d 'Specify a match to use' -f
complete -c iptables -n __fish_iptables_has_chain -a 'ACCEPT DROP RETURN' -f
complete -c iptables -n __fish_iptables_has_chain -a '( __fish_iptables_user_chains)' -f
complete -c iptables -s I -l insert -d 'Insert rules in the beginning of a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s R -l replace -d 'Replace a rule in a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s L -l list -d 'List all rules in a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s S -l list-rules -d 'Print all rules in a chain.' -a '(__fish_iptables_chains)' -f
complete -c iptables -s F -l flush -d 'Delete ALL rules in a chain' -a '(__fish_iptables_chains)' -f
complete -c iptables -s Z -l zero -d 'Zero the packet and byte counters in chains' -a '(__fish_iptables_chains)' -f
complete -c iptables -s N -l new-chain -d 'Create a new user-defined chain by the given name' -a '(__fish_iptables_chains)' -f
complete -c iptables -s X -l delete-chain -d 'Delete the optional user-defined chain specified' -a '(__fish_iptables_chains)' -f
complete -c iptables -s P -l policy -d 'Set the policy for the chain to the given target' -a '(__fish_iptables_chains)' -f
complete -c iptables -s E -l rename-chain -d 'Rename the user specified chain to the user supplied name' -a '(__fish_iptables_chains)' -f
complete -c iptables -s h -d Help -f
complete -c iptables -s p -l protocol -d 'The protocol of the rule or of the packet to check' -f
complete -c iptables -s s -l source -d 'Source specification' -f
complete -c iptables -s d -l destination -d 'Destination specification' -f
complete -c iptables -s j -l jump -d 'Specify the target of a rule' -f
complete -c iptables -s i -l in-interface -d 'Interface via which a packet was received' -f
complete -c iptables -s o -l out-interface -d 'Interface via which packet is to be sent' -f
complete -c iptables -s f -l fragment -d 'Rule only refers to second and further ipv4 fragments' -f
complete -c iptables -s c -l set-counters -d 'Initialize packet and byte counters of a rule' -f
complete -c iptables -s v -l verbose -d 'Verbose output' -f
complete -c iptables -s w -l wait -d 'Wait for the xtables lock' -f
complete -c iptables -s n -l numeric -d 'Numeric output' -f
complete -c iptables -s x -l exact -d 'Expand numbers' -f
complete -c iptables -l line-numbers -d 'When listing rules, add line numbers' -f
complete -c iptables -s t -l table -d 'The table to operate on' -a "$__fish_iptables_tables" -f
# Options that take files
complete -c iptables -l modprobe -d 'Use this command to load modules' -r
# I don't get these
# complete -c iptables -s 4 -l ipv4 -d 'This option has no effect in iptables and iptables-restore.' -f
# complete -c iptables -s 6 -l ipv6 -d 'If a rule using the -6 option is inserted with … [See Man Page]' -f
# complete -c iptables -s g -l goto -d '' -f
# Should aliased options be in the completion?
# complete -c iptables -l dst -d 'Alias for -d' -f