summaryrefslogtreecommitdiff
path: root/src/op_mode/show_nat_rules.py
blob: 1a02f6602db1cb9fb77d9705883373218da84e17 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
#!/usr/bin/env python3
#
# Copyright (C) 2021 VyOS maintainers and contributors
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2 or later as
# published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

import jmespath
import json

from argparse import ArgumentParser
from jinja2 import Template
from sys import exit
from vyos.util import cmd
from vyos.util import dict_search

parser = ArgumentParser()
group = parser.add_mutually_exclusive_group()
group.add_argument("--source", help="Show statistics for configured source NAT rules", action="store_true")
group.add_argument("--destination", help="Show statistics for configured destination NAT rules", action="store_true")
args = parser.parse_args()

if args.source or args.destination:
    tmp = cmd('sudo nft -j list table ip nat')
    tmp = json.loads(tmp)
    
    format_nat66_rule = '%-10s %-50s %-50s %-10s'
    print(format_nat66_rule % ("Rule", "Source" if args.source else "Destination", "Translation", "Outbound Interface" if args.source else "Inbound Interface"))
    print(format_nat66_rule % ("----", "------" if args.source else "-----------", "-----------", "------------------" if args.source else "-----------------"))

    data_json = jmespath.search('nftables[?rule].rule[?chain]', tmp)
    for idx in range(0, len(data_json)):
        data = data_json[idx]
        comment = data['comment']
        rule = comment.replace('SRC-NAT-','')
        rule = rule.replace('DST-NAT-','')
        rule = rule.replace(' tcp_udp','')
        chain = data['chain']
        if not (args.source and chain == 'POSTROUTING') or (not args.source and chain == 'PREROUTING'):
            continue
        interface = dict_search('match.right', data['expr'][0])
        srcdest = dict_search('match.right.prefix.addr', data['expr'][1])
        if srcdest:
            addr_tmp = dict_search('match.right.prefix.len', data['expr'][1])
            if addr_tmp:
                srcdest = srcdest + '/' + str(addr_tmp)
        else:
            srcdest = dict_search('match.right', data['expr'][1])
        tran_addr = dict_search('snat.addr.prefix.addr' if args.source else 'dnat.addr.prefix.addr', data['expr'][3])
        if tran_addr:
            addr_tmp = dict_search('snat.addr.prefix.len' if args.source else 'dnat.addr.prefix.len', data['expr'][3])
            if addr_tmp:
                srcdest = srcdest + '/' + str(addr_tmp)
        else:
            if 'masquerade' in data['expr'][3]:
                tran_addr = 'masquerade'
            elif 'log' in data['expr'][3]:
                continue
            else:
                tran_addr = dict_search('snat.addr' if args.source else 'dnat.addr', data['expr'][3])
        
        print(format_nat66_rule % (rule, srcdest, tran_addr, interface))
    
    exit(0)
else:
    parser.print_help()
    exit(1)