committed by
GitHub
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 104 additions and 0 deletions
@ -0,0 +1,104 @@ |
|||
#!/usr/bin/env sh |
|||
# Script to deploy a certificate to FortiGate via API and set it as the current web GUI certificate. |
|||
# |
|||
# REQUIRED: |
|||
# export FGT_HOST="fortigate_hostname-or-ip" |
|||
# export FGT_TOKEN="fortigate_api_token" |
|||
# |
|||
# OPTIONAL: |
|||
# export FGT_PORT="10443" # Custom HTTPS port (defaults to 443 if not set) |
|||
# |
|||
# Run `acme.sh --deploy -d example.com --deploy-hook fortigate --insecure` to use this script. |
|||
# '--insecure' is required to allow acme.sh to connect to the FortiGate API over HTTPS without a pre-existing valid certificate. |
|||
# |
|||
|
|||
# Function to parse response from the firewall |
|||
parse_response() { |
|||
status=$(echo "$1" | grep -o '"status":[ ]*"[^"]*"' | sed 's/"status":[ ]*"\([^"]*\)"/\1/') |
|||
error_code=$(echo "$1" | grep -o '"error":[ ]*[-0-9]*' | sed 's/"error":[ ]*\([-0-9]*\)/\1/') |
|||
http_status=$(echo "$1" | grep -o '"http_status":[ ]*[0-9]*' | sed 's/"http_status":[ ]*\([0-9]*\)/\1/') |
|||
|
|||
if [ "$status" != "success" ]; then |
|||
_err "FortiGate error: HTTP $http_status, Code $error_code" |
|||
return 1 |
|||
else |
|||
_debug "Operation successful." |
|||
return 0 |
|||
fi |
|||
} |
|||
|
|||
# Function to deploy certificate to firewall |
|||
deployer() { |
|||
cert_base64=$(cat "$_cfullchain" | _base64) |
|||
key_base64=$(cat "$_ckey" | _base64) |
|||
|
|||
payload=$(cat <<EOF |
|||
{ |
|||
"type": "regular", |
|||
"certname": "$_cdomain", |
|||
"key_file_content": "$key_base64", |
|||
"file_content": "$cert_base64" |
|||
} |
|||
EOF |
|||
) |
|||
|
|||
url="https://${FGT_HOST}:${FGT_PORT}/api/v2/monitor/vpn-certificate/local/import" |
|||
_debug "Uploading certificate via URL: $url" |
|||
|
|||
_H1="Authorization: Bearer $FGT_TOKEN" |
|||
response=$(_post "$payload" "$url" "" "POST" "application/json") |
|||
|
|||
_debug "FortiGate API Response: $response" |
|||
parse_response "$response" |
|||
} |
|||
|
|||
# Function to assign new cert as active server certificate |
|||
set_active_web_cert() { |
|||
payload=$(cat <<EOF |
|||
{ |
|||
"admin-server-cert": "$_cdomain" |
|||
} |
|||
EOF |
|||
) |
|||
url="https://${FGT_HOST}:${FGT_PORT}/api/v2/cmdb/system/global" |
|||
_debug "Setting GUI certificate.." |
|||
|
|||
_H1="Authorization: Bearer $FGT_TOKEN" |
|||
|
|||
response=$(_post "$payload" "$url" "" "PUT" "application/json") |
|||
parse_response "$response" |
|||
} |
|||
|
|||
# Main function |
|||
fortigate_deploy() { |
|||
_cdomain=$(echo "$1" | sed 's/*/WILDCARD_/g') |
|||
_ckey="$2" |
|||
_cfullchain="$5" |
|||
|
|||
if [ ! -f "$_ckey" ] || [ ! -f "$_cfullchain" ]; then |
|||
_err "Valid key and/or certificate not found." |
|||
return 1 |
|||
fi |
|||
|
|||
# Handle environment variables |
|||
for var in FGT_HOST FGT_TOKEN FGT_PORT; do |
|||
if [ "$(eval echo \$$var)" ]; then |
|||
_debug "Detected ENV variable $var. Saving to file." |
|||
_savedeployconf "$var" "$(eval echo \$$var)" 1 |
|||
else |
|||
_debug "Attempting to load variable $var from file." |
|||
_getdeployconf "$var" |
|||
fi |
|||
done |
|||
|
|||
if [ -z "$FGT_HOST" ] || [ -z "$FGT_TOKEN" ]; then |
|||
_err "FGT_HOST and FGT_TOKEN must be set." |
|||
return 1 |
|||
fi |
|||
|
|||
FGT_PORT="${FGT_PORT:-443}" |
|||
_debug "Using FortiGate port: $FGT_PORT" |
|||
|
|||
deployer || return 1 |
|||
set_active_web_cert || return 1 |
|||
} |
|||
Write
Preview
Loading…
Cancel
Save
Reference in new issue