Skip to main content

HFortix - Python SDK for Fortinet products (FortiOS, FortiManager, FortiAnalyzer)

Project description

HFortix - Fortinet Python SDK

Python client library for Fortinet products including FortiOS, FortiManager, and FortiAnalyzer.

PyPI version Python 3.8+ License: MIT

๐ŸŽฏ Current Status

  • CMDB API: 79 endpoints across 15 categories (52% coverage) โœ…
    • NEW: Firewall category with 28 endpoints (11 flat + 17 nested)
  • Service API: 21 methods across 3 modules โœ…
  • Log API: 42 methods across 5 modules (100% complete) โœ…
  • Monitor API: Not yet implemented โธ๏ธ

Latest Addition (v0.3.5):

  • โœจ Enhanced IDE Autocomplete: Full PEP 561 type hint support for better IntelliSense
  • โœ… Type Annotations: Explicit type hints on all API helper classes (cmdb, firewall, etc.)
  • โœ… Better Import Discovery: Improved __all__ exports for cleaner autocomplete suggestions
  • ๐Ÿ› Bug Fix: Removed duplicate assignments in CMDB initialization

Previous Releases:

  • v0.3.4: Unified import syntax documentation (from hfortix import FortiOS)
  • v0.3.3: Package restructuring for unified imports
  • v0.3.0: Firewall endpoints (11 flat + 17 nested = 28 total)
    • firewall/DoS-policy, DoS-policy6 (DoS protection)
    • firewall/access-proxy, access-proxy6 (Reverse proxy/WAF)
    • firewall/access-proxy-ssh-client-cert (SSH certificates)
    • firewall/access-proxy-virtual-host (Virtual hosts)
    • firewall/address, address6 (IPv4/IPv6 addresses)
    • firewall/addrgrp, addrgrp6 (IPv4/IPv6 address groups with simplified API)
    • firewall/address6-template (IPv6 address templates)
  • โœ… Firewall Sub-categories:
    • firewall.ipmacbinding (setting, table)
    • firewall.schedule (group, onetime, recurring)
    • firewall.service (category, custom, group)
    • firewall.shaper (per-ip-shaper, traffic-shaper)
    • firewall.ssh (host-key, local-ca, local-key, setting)
    • firewall.ssl (setting)
    • firewall.wildcard-fqdn (custom, group)

๐ŸŽฏ Features

  • Unified Package: Import all Fortinet products from a single package
  • Enhanced IDE Support: Full type hints with PEP 561 compliance for excellent autocomplete
  • Modular Architecture: Each product module can be used independently
  • PyPI Installation: pip install hfortix - simple and straightforward
  • Comprehensive Exception Handling: 387+ FortiOS error codes with detailed descriptions
  • Type-Safe: Proper exception hierarchy and error handling
  • Simplified APIs: Auto-conversion for common patterns (e.g., address group members)
  • Well-Documented: Extensive API documentation and examples
  • Modern Python: Type hints, PEP 585 compliance, Python 3.8+

๐Ÿ“ฆ Available Modules

Module Status Description
FortiOS โœ… Active FortiGate firewall management API
FortiManager โธ๏ธ Planned Centralized management for FortiGate devices
FortiAnalyzer โธ๏ธ Planned Log analysis and reporting platform

๐Ÿš€ Installation

From PyPI (Recommended)

pip install hfortix

๐Ÿ“– Quick Start

Basic Usage

from hfortix import FortiOS

# Initialize with API token (recommended)
fgt = FortiOS(
    host='192.168.1.99',
    token='your-api-token',
    verify=False  # Use True in production with valid SSL cert
)

# List firewall addresses
addresses = fgt.cmdb.firewall.address.list()
print(f"Found {len(addresses['results'])} addresses")

# Create a new address
result = fgt.cmdb.firewall.address.create(
    name='web-server',
    subnet='192.168.10.50/32',
    comment='Production web server'
)

Exception Handling

from hfortix import (
    FortiOS,
    APIError,
    ResourceNotFoundError,
    DuplicateEntryError
)

try:
    result = fgt.cmdb.firewall.address.create(
        name='test-address',
        subnet='10.0.0.0/24'
    )
except DuplicateEntryError as e:
    print(f"Address already exists: {e}")
except ResourceNotFoundError as e:
    print(f"Resource not found: {e}")
except APIError as e:
    print(f"API Error: {e.message}")
    print(f"HTTP Status: {e.http_status}")
    print(f"Error Code: {e.error_code}")

๐Ÿ—๏ธ Project Structure

fortinet/
โ”œโ”€โ”€ __init__.py              # Main package entry point
โ”œโ”€โ”€ exceptions.py            # Base exceptions for all products
โ”œโ”€โ”€ exceptions_forti.py      # FortiOS-specific error codes
โ”œโ”€โ”€ FortiOS/                 # FortiGate management
โ”‚   โ”œโ”€โ”€ __init__.py
โ”‚   โ”œโ”€โ”€ client.py
โ”‚   โ”œโ”€โ”€ exceptions.py        # Backward compatibility
โ”‚   โ””โ”€โ”€ api/                 # API endpoints
โ”‚       โ””โ”€โ”€ v2/
โ”‚           โ”œโ”€โ”€ cmdb/        # Configuration (firewall, system, etc.)
โ”‚           โ”œโ”€โ”€ monitor/     # Monitoring endpoints
โ”‚           โ”œโ”€โ”€ log/         # Log retrieval
โ”‚           โ””โ”€โ”€ service/     # Services (sniffer, security rating)
โ”œโ”€โ”€ FortiManager/            # Coming soon
โ”‚   โ””โ”€โ”€ __init__.py
โ””โ”€โ”€ FortiAnalyzer/           # Coming soon
    โ””โ”€โ”€ __init__.py

๐Ÿ” Module Discovery

Check which modules are available:

from fortinet import get_available_modules

modules = get_available_modules()
print(modules)
# {'FortiOS': True, 'FortiManager': False, 'FortiAnalyzer': False}

๐ŸŽ“ Examples

FortiOS - Firewall Address Management

from hfortix import FortiOS

fgt = FortiOS(host='192.168.1.99', token='your-token', verify=False)

# List addresses
addresses = fgt.cmdb.firewall.address.list()

# Create address
result = fgt.cmdb.firewall.address.create(
    name='web-server',
    subnet='10.0.1.100/32',
    comment='Production web server'
)

# Update address
result = fgt.cmdb.firewall.address.update(
    name='web-server',
    comment='Updated comment'
)

# Delete address
result = fgt.cmdb.firewall.address.delete(name='web-server')

FortiOS - DoS Protection (NEW!)

# Create IPv4 DoS policy with simplified API
result = fgt.cmdb.firewall.dos_policy.create(
    policyid=1,
    name='protect-web-servers',
    interface='port3',              # Simple string format
    srcaddr=['all'],                # Simple list format
    dstaddr=['web-servers'],
    service=['HTTP', 'HTTPS'],
    status='enable',
    comments='Protect web farm from DoS attacks'
)

# API automatically converts to FortiGate format:
# interface='port3' โ†’ {'q_origin_key': 'port3'}
# service=['HTTP'] โ†’ [{'name': 'HTTP'}]

# Custom anomaly detection thresholds
result = fgt.cmdb.firewall.dos_policy.create(
    policyid=2,
    name='strict-dos-policy',
    interface='wan1',
    srcaddr=['all'],
    dstaddr=['all'],
    service=['ALL'],
    anomaly=[
        {'name': 'tcp_syn_flood', 'threshold': 500, 'action': 'block'},
        {'name': 'udp_flood', 'threshold': 1000, 'action': 'block'}
    ]
)

FortiOS - Reverse Proxy/WAF (NEW!)

# Create access proxy (requires VIP with type='access-proxy')
result = fgt.cmdb.firewall.access_proxy.create(
    name='web-proxy',
    vip='web-vip',                    # VIP must be type='access-proxy'
    auth_portal='enable',
    log_blocked_traffic='enable',
    http_supported_max_version='2.0',
    svr_pool_multiplex='enable'
)

# Create virtual host with simplified API
result = fgt.cmdb.firewall.access_proxy_virtual_host.create(
    name='api-vhost',
    host='*.api.example.com',
    host_type='wildcard',
    ssl_certificate='Fortinet_Factory'  # String auto-converts to list
)

# API automatically converts:
# ssl_certificate='cert' โ†’ [{'name': 'cert'}]

FortiOS - Address & Address Group Management (NEW!)

# Create IPv4 address (subnet)
result = fgt.cmdb.firewall.address.create(
    name='internal-net',
    type='ipmask',
    subnet='192.168.1.0/24',
    comment='Internal network'
)

# Create IPv4 address (IP range)
result = fgt.cmdb.firewall.address.create(
    name='dhcp-range',
    type='iprange',
    start_ip='192.168.1.100',
    end_ip='192.168.1.200'
)

# Create IPv4 address (FQDN)
result = fgt.cmdb.firewall.address.create(
    name='google-dns',
    type='fqdn',
    fqdn='dns.google.com'
)

# Create IPv6 address
result = fgt.cmdb.firewall.address6.create(
    name='ipv6-internal',
    type='ipprefix',
    ip6='2001:db8::/32',
    comment='IPv6 internal network'
)

# Create address group with simplified API
result = fgt.cmdb.firewall.addrgrp.create(
    name='internal-networks',
    member=['subnet1', 'subnet2', 'subnet3'],  # Simple string list!
    comment='All internal networks'
)

# API automatically converts:
# member=['addr1', 'addr2'] โ†’ [{'name': 'addr1'}, {'name': 'addr2'}]

# Create IPv6 address group
result = fgt.cmdb.firewall.addrgrp6.create(
    name='ipv6-internal-networks',
    member=['ipv6-subnet1', 'ipv6-subnet2'],
    comment='All internal IPv6 networks'
)

# Create IPv6 address template
result = fgt.cmdb.firewall.address6_template.create(
    name='ipv6-subnet-template',
    ip6='2001:db8::/32',
    subnet_segment_count=2,
    comment='IPv6 subnet template'
)

FortiOS - Schedule Management

# Create recurring schedule
result = fgt.cmdb.firewall.schedule.recurring.create(
    name='business-hours',
    day=['monday', 'tuesday', 'wednesday', 'thursday', 'friday'],
    start='08:00',
    end='18:00'
)

# Create one-time schedule
from datetime import datetime, timedelta
tomorrow = datetime.now() + timedelta(days=1)
start = f"09:00 {tomorrow.strftime('%Y/%m/%d')}"
end = f"17:00 {tomorrow.strftime('%Y/%m/%d')}"

result = fgt.cmdb.firewall.schedule.onetime.create(
    name='maintenance-window',
    start=start,
    end=end,
    color=5
)

Exception Hierarchy

Exception
โ””โ”€โ”€ FortinetError (base)
    โ”œโ”€โ”€ AuthenticationError
    โ”œโ”€โ”€ AuthorizationError
    โ””โ”€โ”€ APIError
        โ”œโ”€โ”€ ResourceNotFoundError (404)
        โ”œโ”€โ”€ BadRequestError (400)
        โ”œโ”€โ”€ MethodNotAllowedError (405)
        โ”œโ”€โ”€ RateLimitError (429)
        โ”œโ”€โ”€ ServerError (500)
        โ”œโ”€โ”€ DuplicateEntryError (-5, -15, -100)
        โ”œโ”€โ”€ EntryInUseError (-23, -94, -95)
        โ”œโ”€โ”€ InvalidValueError (-651, -1, -50)
        โ””โ”€โ”€ PermissionDeniedError (-14, -37)

๐Ÿงช Testing

Each module includes comprehensive tests:

# Run FortiOS tests (requires FortiGate access)
cd FortiOS/Tests
python3 test_exceptions.py
python3 cmdb/firewall/address.py

๐Ÿ“ Version

Current version: 0.1.0

from fortinet import get_version
print(get_version())  # '0.1.0'

๐Ÿค Contributing

  1. Fork the repository
  2. Create a feature branch
  3. Make your changes
  4. Run tests
  5. Submit a pull request

๐Ÿ“„ License

[Your License Here]

๐Ÿ”— Links

๐Ÿ’ก Tips

  • Use API Tokens: Only token-based authentication is supported for FortiOS REST API
  • Error Handling: Always catch specific exceptions for better error handling
  • Verify SSL: Set verify=True in production (requires valid certificates)
  • Rate Limiting: Be aware of API rate limits (HTTP 429 errors)

โš™๏ธ Configuration

Environment Variables

export FGT_HOST="192.168.1.99"
export FGT_TOKEN="your-api-token"
export FGT_VERIFY_SSL="false"

Using .env File

from dotenv import load_dotenv
import os

load_dotenv()

fgt = FortiOS(
    host=os.getenv('FGT_HOST'),
    token=os.getenv('FGT_TOKEN'),
    verify=os.getenv('FGT_VERIFY_SSL', 'false').lower() == 'true'
)

๐ŸŽฏ Roadmap

  • [๐Ÿšง] FortiOS API implementation (In Development)
    • Exception handling system (387 error codes)
    • Base client architecture
    • [๐Ÿ”ท] CMDB endpoints (Beta - partial coverage)
      • Firewall (address, policy, service, etc.)
      • System (interface, admin, global, etc.)
      • Router (static, policy, etc.)
      • VPN (IPsec, SSL, etc.)
    • [๐Ÿ”ท] Service endpoints (Beta)
      • Sniffer, Security Rating, etc.
    • [๐Ÿ”ท] Log endpoints (Beta)
      • Traffic, Event, Virus, etc.
    • Monitor endpoints (Not Started)
    • Complete API coverage
  • Modular package architecture
  • FortiManager module (Not Started)
  • FortiAnalyzer module (Not Started)
  • PyPI package publication
  • Async support
  • CLI tool

๐Ÿ‘ค Author

Herman W. Jacobsen


Built with โค๏ธ for the Fortinet community

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

hfortix-0.3.7.tar.gz (137.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

hfortix-0.3.7-py3-none-any.whl (238.8 kB view details)

Uploaded Python 3

File details

Details for the file hfortix-0.3.7.tar.gz.

File metadata

  • Download URL: hfortix-0.3.7.tar.gz
  • Upload date:
  • Size: 137.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for hfortix-0.3.7.tar.gz
Algorithm Hash digest
SHA256 86bc41db3c316b81b2b7c267d018bd327e64fee7cd13014cb12b3a8380ab677e
MD5 0088d3ae5b453fef268f251dfc8c144c
BLAKE2b-256 9313fb1027a7a9bca00265feccf5eeef70b433e4afeb0530cee28fa640794aee

See more details on using hashes here.

File details

Details for the file hfortix-0.3.7-py3-none-any.whl.

File metadata

  • Download URL: hfortix-0.3.7-py3-none-any.whl
  • Upload date:
  • Size: 238.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.12.3

File hashes

Hashes for hfortix-0.3.7-py3-none-any.whl
Algorithm Hash digest
SHA256 7b65dea5ce1d701d009cf536ce37b75cf391cfb2717f6940a71b848597a7b80d
MD5 fce73e2f9ff0239ff01b9e68d987c6a0
BLAKE2b-256 f33fe4ccc6bad9d8f7038cd619d2e12dc93497ceba779523735ff11af636e855

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page