summaryrefslogtreecommitdiff
path: root/src/op_mode/show_nat66_rules.py
blob: 736ba20639231eaa69fe83cc15ff30ae80163ded (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
#!/usr/bin/env python3
#
# Copyright (C) 2021 VyOS maintainers and contributors
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 or later as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

import jmespath
import json

from argparse import ArgumentParser
from jinja2 import Template
from sys import exit
from vyos.util import cmd
from vyos.util import dict_search

parser = ArgumentParser()
group = parser.add_mutually_exclusive_group()
group.add_argument("--source", help="Show statistics for configured source NAT rules", action="store_true")
group.add_argument("--destination", help="Show statistics for configured destination NAT rules", action="store_true")
args = parser.parse_args()

if args.source or args.destination:
    tmp = cmd('sudo nft -j list table ip6 nat')
    tmp = json.loads(tmp)
    
    format_nat66_rule = '%-10s %-50s %-50s %-10s'
    print(format_nat66_rule % ("Rule", "Source" if args.source else "Destination", "Translation", "Outbound Interface" if args.source else "Inbound Interface"))
    print(format_nat66_rule % ("----", "------" if args.source else "-----------", "-----------", "------------------" if args.source else "-----------------"))

    data_json = jmespath.search('nftables[?rule].rule[?chain]', tmp)
    for idx in range(0, len(data_json)):
        data = data_json[idx]
        
        # If there is no index 3, we don't think this is the record we need to check
        if len(data['expr']) <= 3:
            continue
        
        comment = data['comment']
        rule = comment.replace('SRC-NAT66-','')
        rule = rule.replace('DST-NAT66-','')
        chain = data['chain']
        if not (args.source and chain == 'POSTROUTING') or (not args.source and chain == 'PREROUTING'):
            continue
        interface = dict_search('match.right', data['expr'][0])
        srcdest = dict_search('match.right.prefix.addr', data['expr'][2])
        if srcdest:
            addr_tmp = dict_search('match.right.prefix.len', data['expr'][2])
            if addr_tmp:
                srcdest = srcdest + '/' + str(addr_tmp)
        else:
            srcdest = dict_search('match.right', data['expr'][2])
        
        tran_addr = dict_search('snat.addr.prefix.addr' if args.source else 'dnat.addr.prefix.addr', data['expr'][3])
        if tran_addr:
            addr_tmp = dict_search('snat.addr.prefix.len' if args.source else 'dnat.addr.prefix.len', data['expr'][3])
            if addr_tmp:
                srcdest = srcdest + '/' + str(addr_tmp)
        else:
            if 'masquerade' in data['expr'][3]:
                tran_addr = 'masquerade'
            else:
                tran_addr = dict_search('snat.addr' if args.source else 'dnat.addr', data['expr'][3])
        
        print(format_nat66_rule % (rule, srcdest, tran_addr, interface))
    
    exit(0)
else:
    parser.print_help()
    exit(1)