2020-02-05 23:29:01 +01:00
#!/usr/bin/env sh
# Script to deploy certificates to Palo Alto Networks PANOS via API
# Note PANOS API KEY and IP address needs to be set prior to running.
# The following variables exported from environment will be used.
# If not set then values previously saved in domain.conf file are used.
#
# Firewall admin with superuser and IP address is required.
#
2023-05-15 03:43:54 +02:00
# REQURED:
2023-07-18 21:43:47 +02:00
# export PANOS_HOST=""
# export PANOS_USER="" #User *MUST* have Commit and Import Permissions in XML API for Admin Role
2023-05-15 03:43:54 +02:00
# export PANOS_PASS=""
#
2023-07-18 21:43:47 +02:00
# The script will automatically generate a new API key if
2023-05-15 03:43:54 +02:00
# no key is found, or if a saved key has expired or is invalid.
2023-07-18 21:43:47 +02:00
2023-05-17 22:06:06 +02:00
# This function is to parse the XML response from the firewall
2020-02-05 23:29:01 +01:00
parse_response( ) {
2020-02-12 03:15:10 +01:00
type = $2
2020-02-12 07:26:48 +01:00
if [ " $type " = 'keygen' ] ; then
2020-02-12 03:15:10 +01:00
status = $( echo " $1 " | sed 's/^.*\([' \' ']\)\([a-z]*\)' \' '.*/\2/g' )
if [ " $status " = "success" ] ; then
panos_key = $( echo " $1 " | sed 's/^.*\(<key>\)\(.*\)<\/key>.*/\2/g' )
_panos_key = $panos_key
else
message = "PAN-OS Key could not be set."
fi
else
2023-07-12 01:56:41 +02:00
status = $( echo " $1 " | tr -d '\n' | sed 's/^.*"\([a-z]*\)".*/\1/g' )
message = $( echo " $1 " | tr -d '\n' | sed 's/.*\(<result>\|<msg>\|<line>\)\([^<]*\).*/\2/g' )
_debug " Firewall message: $message "
2023-05-15 03:43:54 +02:00
if [ " $type " = 'keytest' ] && [ " $status " != "success" ] ; then
_debug "**** API Key has EXPIRED or is INVALID ****"
2023-04-13 00:00:53 +02:00
unset _panos_key
fi
2020-02-12 03:15:10 +01:00
fi
2020-02-05 23:29:01 +01:00
return 0
}
2023-05-17 22:06:06 +02:00
#This function is used to deploy to the firewall
2020-02-05 23:29:01 +01:00
deployer( ) {
2020-02-14 03:01:27 +01:00
content = ""
2023-05-15 03:43:54 +02:00
type = $1 # Types are keytest, keygen, cert, key, commit
2020-02-12 03:15:10 +01:00
panos_url = " https:// $_panos_host /api/ "
2023-04-24 20:45:50 +02:00
2023-07-18 21:43:47 +02:00
#Test API Key by performing a lookup
2023-05-15 03:43:54 +02:00
if [ " $type " = 'keytest' ] ; then
_debug "**** Testing saved API Key ****"
2023-04-13 00:00:53 +02:00
_H1 = "Content-Type: application/x-www-form-urlencoded"
2023-07-18 21:43:47 +02:00
# Get Version Info to test key
content = " type=version&key= $_panos_key "
## Exclude all scopes for the empty commit
#_exclude_scope="<policy-and-objects>exclude</policy-and-objects><device-and-network>exclude</device-and-network><shared-object>exclude</shared-object>"
#content="type=commit&action=partial&key=$_panos_key&cmd=<commit><partial>$_exclude_scope<admin><member>acmekeytest</member></admin></partial></commit>"
2023-04-13 00:00:53 +02:00
fi
# Generate API Key
2020-02-12 07:26:48 +01:00
if [ " $type " = 'keygen' ] ; then
2023-05-15 03:43:54 +02:00
_debug "**** Generating new API Key ****"
2020-02-12 03:15:10 +01:00
_H1 = "Content-Type: application/x-www-form-urlencoded"
content = " type=keygen&user= $_panos_user &password= $_panos_pass "
# content="$content${nl}--$delim${nl}Content-Disposition: form-data; type=\"keygen\"; user=\"$_panos_user\"; password=\"$_panos_pass\"${nl}Content-Type: application/octet-stream${nl}${nl}"
2020-02-05 23:29:01 +01:00
fi
2020-02-12 03:15:10 +01:00
2023-05-17 22:06:06 +02:00
# Deploy Cert or Key
2020-02-12 07:26:48 +01:00
if [ " $type " = 'cert' ] || [ " $type " = 'key' ] ; then
2023-05-15 03:43:54 +02:00
_debug " **** Deploying $type **** "
#Generate DELIM
2020-02-12 07:34:55 +01:00
delim = " -----MultipartDelimiter $( date "+%s%N" ) "
nl = "\015\012"
#Set Header
export _H1 = " Content-Type: multipart/form-data; boundary= $delim "
2020-02-12 07:26:48 +01:00
if [ " $type " = 'cert' ] ; then
2020-03-25 04:01:51 +01:00
panos_url = " ${ panos_url } ?type=import "
content = " -- $delim ${ nl } Content-Disposition: form-data; name=\"category\"\r\n\r\ncertificate "
content = " $content ${ nl } -- $delim ${ nl } Content-Disposition: form-data; name=\"certificate-name\"\r\n\r\n $_cdomain "
content = " $content ${ nl } -- $delim ${ nl } Content-Disposition: form-data; name=\"key\"\r\n\r\n $_panos_key "
content = " $content ${ nl } -- $delim ${ nl } Content-Disposition: form-data; name=\"format\"\r\n\r\npem "
2020-02-12 03:15:10 +01:00
content = " $content ${ nl } -- $delim ${ nl } Content-Disposition: form-data; name=\"file\"; filename=\" $( basename " $_cfullchain " ) \" ${ nl } Content-Type: application/octet-stream ${ nl } ${ nl } $( cat " $_cfullchain " ) "
fi
2020-02-12 07:26:48 +01:00
if [ " $type " = 'key' ] ; then
2020-03-25 04:01:51 +01:00
panos_url = " ${ panos_url } ?type=import "
content = " -- $delim ${ nl } Content-Disposition: form-data; name=\"category\"\r\n\r\nprivate-key "
content = " $content ${ nl } -- $delim ${ nl } Content-Disposition: form-data; name=\"certificate-name\"\r\n\r\n $_cdomain "
content = " $content ${ nl } -- $delim ${ nl } Content-Disposition: form-data; name=\"key\"\r\n\r\n $_panos_key "
content = " $content ${ nl } -- $delim ${ nl } Content-Disposition: form-data; name=\"format\"\r\n\r\npem "
content = " $content ${ nl } -- $delim ${ nl } Content-Disposition: form-data; name=\"passphrase\"\r\n\r\n123456 "
2023-03-31 02:33:44 +02:00
content = " $content ${ nl } -- $delim ${ nl } Content-Disposition: form-data; name=\"file\"; filename=\" $( basename " $_cdomain .key " ) \" ${ nl } Content-Type: application/octet-stream ${ nl } ${ nl } $( cat " $_ckey " ) "
2020-02-12 03:15:10 +01:00
fi
#Close multipart
2020-03-25 04:01:51 +01:00
content = " $content ${ nl } -- $delim -- ${ nl } ${ nl } "
2020-02-12 03:15:10 +01:00
#Convert CRLF
content = $( printf %b " $content " )
2020-02-05 23:29:01 +01:00
fi
2023-05-17 22:06:06 +02:00
# Commit changes
2020-02-12 07:26:48 +01:00
if [ " $type " = 'commit' ] ; then
2023-05-15 03:43:54 +02:00
_debug "**** Committing changes ****"
2020-02-12 07:23:10 +01:00
export _H1 = "Content-Type: application/x-www-form-urlencoded"
2023-07-12 01:56:41 +02:00
#Check for force commit - will commit ALL uncommited changes to the firewall. Use with caution!
2023-05-17 22:06:06 +02:00
if [ " $FORCE " ] ; then
2023-07-12 01:56:41 +02:00
_debug "Force switch detected. Committing ALL changes to the firewall."
cmd = $( printf "%s" " <commit><partial><force><admin><member> $_panos_user </member></admin></force></partial></commit> " | _url_encode)
2023-05-15 03:43:54 +02:00
else
2023-07-12 01:56:41 +02:00
_exclude_scope = "<policy-and-objects>exclude</policy-and-objects><device-and-network>exclude</device-and-network>"
cmd = $( printf "%s" " <commit><partial> $_exclude_scope <admin><member> $_panos_user </member></admin></partial></commit> " | _url_encode)
2023-05-15 03:43:54 +02:00
fi
2023-07-12 01:56:41 +02:00
content = " type=commit&action=partial&key= $_panos_key &cmd= $cmd "
2020-02-05 23:29:01 +01:00
fi
2023-05-17 22:06:06 +02:00
2020-02-12 03:15:10 +01:00
response = $( _post " $content " " $panos_url " "" "POST" )
2020-02-12 07:23:10 +01:00
parse_response " $response " " $type "
2020-02-05 23:29:01 +01:00
# Saving response to variables
response_status = $status
_debug response_status " $response_status "
if [ " $response_status " = "success" ] ; then
_debug " Successfully deployed $type "
return 0
else
_err " Deploy of type $type failed. Try deploying with --debug to troubleshoot. "
_debug " $message "
return 1
fi
}
# This is the main function that will call the other functions to deploy everything.
panos_deploy( ) {
2023-04-24 20:45:50 +02:00
_cdomain = $( echo " $1 " | sed 's/*/WILDCARD_/g' ) #Wildcard Safe Filename
2020-02-05 23:29:01 +01:00
_ckey = " $2 "
_cfullchain = " $5 "
2023-07-18 22:10:31 +02:00
_regen_keys = false #Flag to regenerate keys if PANOS_USER or PANOS_PASS changes.
2023-05-24 20:51:57 +02:00
2023-07-12 02:03:21 +02:00
# VALID FILE CHECK
if [ ! -f " $_ckey " ] || [ ! -f " $_cfullchain " ] ; then
_err "Unable to find a valid key and/or cert. If this is an ECDSA/ECC cert, use the --ecc flag when deploying."
return 1
2023-03-31 02:33:44 +02:00
fi
2023-05-15 03:43:54 +02:00
# PANOS_HOST
if [ " $PANOS_HOST " ] ; then
_debug "Detected ENV variable PANOS_HOST. Saving to file."
_savedeployconf PANOS_HOST " $PANOS_HOST " 1
2020-02-05 23:29:01 +01:00
else
2023-05-15 03:43:54 +02:00
_debug "Attempting to load variable PANOS_HOST from file."
_getdeployconf PANOS_HOST
fi
# PANOS USER
if [ " $PANOS_USER " ] ; then
_debug "Detected ENV variable PANOS_USER. Saving to file."
2020-02-12 23:57:31 +01:00
_savedeployconf PANOS_USER " $PANOS_USER " 1
2023-05-15 03:43:54 +02:00
else
_debug "Attempting to load variable PANOS_USER from file."
_getdeployconf PANOS_USER
fi
2023-05-15 03:46:21 +02:00
# PANOS_PASS
2023-05-15 03:43:54 +02:00
if [ " $PANOS_PASS " ] ; then
_debug "Detected ENV variable PANOS_PASS. Saving to file."
2020-02-12 23:57:31 +01:00
_savedeployconf PANOS_PASS " $PANOS_PASS " 1
2023-05-15 03:43:54 +02:00
else
_debug "Attempting to load variable PANOS_PASS from file."
_getdeployconf PANOS_PASS
2020-02-05 23:29:01 +01:00
fi
2023-05-15 03:43:54 +02:00
2023-07-18 22:10:31 +02:00
# PANOS_KEY
_getdeployconf PANOS_KEY
if [ " $PANOS_KEY " ] ; then
_debug "Detected saved key."
_panos_key = $PANOS_KEY
else
_debug "No key detected"
unset _panos_key
fi
2023-05-15 03:43:54 +02:00
#Store variables
_panos_host = $PANOS_HOST
_panos_user = $PANOS_USER
_panos_pass = $PANOS_PASS
2023-04-13 00:00:53 +02:00
2023-07-18 21:43:47 +02:00
#Test API Key if found. If the key is invalid, the variable _panos_key will be unset.
2023-05-15 03:43:54 +02:00
if [ " $_panos_host " ] && [ " $_panos_key " ] ; then
_debug "**** Testing API KEY ****"
deployer keytest
fi
# Check for valid variables
if [ -z " $_panos_host " ] ; then
2023-05-17 22:06:06 +02:00
_err "No host found. If this is your first time deploying, please set PANOS_HOST in ENV variables. You can delete it after you have successfully deployed the certs."
return 1
elif [ -z " $_panos_user " ] ; then
2023-05-24 20:51:57 +02:00
_err "No user found. If this is your first time deploying, please set PANOS_USER in ENV variables. You can delete it after you have successfully deployed the certs."
2023-05-15 03:43:54 +02:00
return 1
2023-07-18 21:43:47 +02:00
elif [ -z " $_panos_pass " ] ; then
_err "No password found. If this is your first time deploying, please set PANOS_PASS in ENV variables. You can delete it after you have successfully deployed the certs."
2023-05-15 03:43:54 +02:00
return 1
else
# Generate a new API key if no valid API key is found
2023-04-13 00:00:53 +02:00
if [ -z " $_panos_key " ] ; then
_debug "**** Generating new PANOS API KEY ****"
deployer keygen
_savedeployconf PANOS_KEY " $_panos_key " 1
fi
2023-04-24 20:45:50 +02:00
# Confirm that a valid key was generated
2020-02-12 03:15:10 +01:00
if [ -z " $_panos_key " ] ; then
2023-05-17 22:06:06 +02:00
_err "Unable to generate an API key. The user and pass may be invalid or not authorized to generate a new key. Please check the PANOS_USER and PANOS_PASS credentials and try again"
2020-02-05 23:29:01 +01:00
return 1
else
deployer cert
deployer key
deployer commit
fi
fi
2020-02-12 07:34:55 +01:00
}