committed by
GitHub
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 164 additions and 0 deletions
@ -0,0 +1,164 @@ |
|||
#!/usr/bin/env sh |
|||
# Script to deploy a certificate to FortiGate via API and set it as the current web GUI certificate. |
|||
# |
|||
# FortiGate's native ACME integration does not support wildcard certificates or domain validation, |
|||
# and is not supported if you have a custom management web port (eg. DNAT web traffic). |
|||
# |
|||
# REQUIRED: |
|||
# export FGT_HOST="fortigate_hostname-or-ip" |
|||
# export FGT_TOKEN="fortigate_api_token" |
|||
# |
|||
# OPTIONAL: |
|||
# export FGT_PORT="10443" # Custom HTTPS port (defaults to 443 if not set) |
|||
# |
|||
# Run `acme.sh --deploy -d example.com --deploy-hook fortigate --insecure` to use this script. |
|||
# `--insecure` is required on first run if not already using a valid SSL certificate on firewall. |
|||
|
|||
# Function to parse response |
|||
parse_response() { |
|||
response="$1" |
|||
func="$2" |
|||
status=$(echo "$response" | grep -o '"status":[ ]*"[^"]*"' | sed 's/"status":[ ]*"\([^"]*\)"/\1/') |
|||
if [ "$status" != "success" ]; then |
|||
_err "[$func] Operation failed. Deploy with --insecure if current certificate is invalid. Try deploying with --debug to troubleshoot." |
|||
return 1 |
|||
else |
|||
_debug "[$func] Operation successful." |
|||
return 0 |
|||
fi |
|||
} |
|||
|
|||
# Function to deploy base64-encoded certificate to firewall |
|||
deployer() { |
|||
cert_base64=$(_base64 <"$_cfullchain" | tr -d '\n') |
|||
key_base64=$(_base64 <"$_ckey" | tr -d '\n') |
|||
payload=$( |
|||
cat <<EOF |
|||
{ |
|||
"type": "regular", |
|||
"scope": "global", |
|||
"certname": "$_cdomain", |
|||
"key_file_content": "$key_base64", |
|||
"file_content": "$cert_base64" |
|||
} |
|||
EOF |
|||
) |
|||
url="https://${FGT_HOST}:${FGT_PORT}/api/v2/monitor/vpn-certificate/local/import" |
|||
_debug "Uploading certificate via URL: $url" |
|||
_H1="Authorization: Bearer $FGT_TOKEN" |
|||
response=$(_post "$payload" "$url" "" "POST" "application/json") |
|||
_debug "FortiGate API Response: $response" |
|||
parse_response "$response" "Deploying certificate" || return 1 |
|||
} |
|||
|
|||
# Function to upload CA certificate to firewall (FortiGate doesn't automatically extract CA from fullchain) |
|||
upload_ca_cert() { |
|||
ca_base64=$(_base64 <"$_cca" | tr -d '\n') |
|||
payload=$( |
|||
cat <<EOF |
|||
{ |
|||
"import_method": "file", |
|||
"scope": "global", |
|||
"file_content": "$ca_base64" |
|||
} |
|||
EOF |
|||
) |
|||
url="https://${FGT_HOST}:${FGT_PORT}/api/v2/monitor/vpn-certificate/ca/import" |
|||
_debug "Uploading CA certificate via URL: $url" |
|||
_H1="Authorization: Bearer $FGT_TOKEN" |
|||
response=$(_post "$payload" "$url" "" "POST" "application/json") |
|||
_debug "FortiGate API CA Response: $response" |
|||
# Handle response -328 (CA already exists) |
|||
if echo "$response" | grep -q '"error":[ ]*-328'; then |
|||
_debug "CA certificate already exists. Skipping CA upload." |
|||
return 0 |
|||
fi |
|||
parse_response "$response" "Deploying CA certificate" || return 1 |
|||
} |
|||
|
|||
# Function to activate the new certificate |
|||
set_active_web_cert() { |
|||
payload=$( |
|||
cat <<EOF |
|||
{ |
|||
"admin-server-cert": "$_cdomain" |
|||
} |
|||
EOF |
|||
) |
|||
url="https://${FGT_HOST}:${FGT_PORT}/api/v2/cmdb/system/global" |
|||
_debug "Setting GUI certificate..." |
|||
_H1="Authorization: Bearer $FGT_TOKEN" |
|||
response=$(_post "$payload" "$url" "" "PUT" "application/json") |
|||
parse_response "$response" "Assigning active certificate" || return 1 |
|||
} |
|||
|
|||
# Function to clean up previous certificate (if exists) |
|||
cleanup_previous_certificate() { |
|||
_getdeployconf FGT_LAST_CERT |
|||
|
|||
if [ -n "$FGT_LAST_CERT" ] && [ "$FGT_LAST_CERT" != "$_cdomain" ]; then |
|||
_debug "Found previously deployed certificate: $FGT_LAST_CERT. Deleting it." |
|||
|
|||
url="https://${FGT_HOST}:${FGT_PORT}/api/v2/cmdb/vpn.certificate/local/${FGT_LAST_CERT}" |
|||
|
|||
_H1="Authorization: Bearer $FGT_TOKEN" |
|||
response=$(_post "" "$url" "" "DELETE" "application/json") |
|||
_debug "Delete certificate API response: $response" |
|||
|
|||
parse_response "$response" "Delete previous certificate" || return 1 |
|||
else |
|||
_debug "No previous certificate found or new cert is the same as the previous one." |
|||
fi |
|||
} |
|||
|
|||
# Main function |
|||
fortigate_deploy() { |
|||
# Create new certificate name with date appended (cannot directly overwrite old certificate) |
|||
_cdomain="$(echo "$1" | sed 's/*/WILDCARD_/g')_$(date -u +"%Y-%m-%d")" |
|||
_ckey="$2" |
|||
_cca="$4" |
|||
_cfullchain="$5" |
|||
|
|||
if [ ! -f "$_ckey" ] || [ ! -f "$_cfullchain" ]; then |
|||
_err "Valid key and/or certificate not found." |
|||
return 1 |
|||
fi |
|||
|
|||
# Save required environment variables if not already stored |
|||
for var in FGT_HOST FGT_TOKEN FGT_PORT; do |
|||
if [ "$(eval echo \$$var)" ]; then |
|||
_debug "Detected ENV variable $var. Saving to file." |
|||
_savedeployconf "$var" "$(eval echo \$$var)" 1 |
|||
else |
|||
_debug "Attempting to load variable $var from file." |
|||
_getdeployconf "$var" |
|||
fi |
|||
done |
|||
|
|||
if [ -z "$FGT_HOST" ] || [ -z "$FGT_TOKEN" ]; then |
|||
_err "FGT_HOST and FGT_TOKEN must be set." |
|||
return 1 |
|||
fi |
|||
|
|||
FGT_PORT="${FGT_PORT:-443}" |
|||
_debug "Using FortiGate port: $FGT_PORT" |
|||
|
|||
# Upload new certificate |
|||
deployer || return 1 |
|||
|
|||
# Upload base64-encoded CA certificate |
|||
if [ -n "$_cca" ] && [ -f "$_cca" ]; then |
|||
upload_ca_cert || return 1 |
|||
else |
|||
_debug "No CA certificate provided." |
|||
fi |
|||
|
|||
# Activate new certificate |
|||
set_active_web_cert || return 1 |
|||
|
|||
# Delete previous certificate |
|||
cleanup_previous_certificate |
|||
|
|||
# Store new certificate name for cleanup on next renewal |
|||
_savedeployconf "FGT_LAST_CERT" "$_cdomain" 1 |
|||
} |
Write
Preview
Loading…
Cancel
Save
Reference in new issue