123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305 |
- #!/usr/bin/env sh
- # Here is a script to deploy cert on a Unifi Controller or Cloud Key device.
- # It supports:
- # - self-hosted Unifi Controller
- # - Unifi Cloud Key (Gen1/2/2+)
- # - Unifi Cloud Key running UnifiOS (v2.0.0+, Gen2/2+ only)
- # - Unifi Dream Machine
- # This has not been tested on other "all-in-one" devices such as
- # UDM Pro or Unifi Express.
- #
- # OS Version v2.0.0+
- # Network Application version 7.0.0+
- # OS version ~3.1 removed java and keytool from the UnifiOS.
- # Using PKCS12 format keystore appears to work fine.
- #
- # Please report bugs to https://github.com/acmesh-official/acme.sh/issues/3359
- #returns 0 means success, otherwise error.
- # The deploy-hook automatically detects standard Unifi installations
- # for each of the supported environments. Most users should not need
- # to set any of these variables, but if you are running a self-hosted
- # Controller with custom locations, set these as necessary before running
- # the deploy hook. (Defaults shown below.)
- #
- # Settings for Unifi Controller:
- # Location of Java keystore or unifi.keystore.jks file:
- #DEPLOY_UNIFI_KEYSTORE="/usr/lib/unifi/data/keystore"
- # Keystore password (built into Unifi Controller, not a user-set password):
- #DEPLOY_UNIFI_KEYPASS="aircontrolenterprise"
- # Command to restart Unifi Controller:
- # DEPLOY_UNIFI_RELOAD="systemctl restart unifi"
- # System Properties file location for controller
- #DEPLOY_UNIFI_SYSTEM_PROPERTIES="/usr/lib/unifi/data/system.properties"
- #
- # Settings for Unifi Cloud Key Gen1 (nginx admin pages):
- # Directory where cloudkey.crt and cloudkey.key live:
- #DEPLOY_UNIFI_CLOUDKEY_CERTDIR="/etc/ssl/private"
- # Command to restart maintenance pages and Controller
- # (same setting as above, default is updated when running on Cloud Key Gen1):
- #DEPLOY_UNIFI_RELOAD="service nginx restart && service unifi restart"
- #
- # Settings for UnifiOS (Cloud Key Gen2):
- # Directory where unifi-core.crt and unifi-core.key live:
- #DEPLOY_UNIFI_CORE_CONFIG="/data/unifi-core/config/"
- # Command to restart unifi-core:
- # DEPLOY_UNIFI_OS_RELOAD="systemctl restart unifi-core"
- #
- # At least one of DEPLOY_UNIFI_KEYSTORE, DEPLOY_UNIFI_CLOUDKEY_CERTDIR,
- # or DEPLOY_UNIFI_CORE_CONFIG must exist to receive the deployed certs.
- ######## Public functions #####################
- #domain keyfile certfile cafile fullchain
- unifi_deploy() {
- _cdomain="$1"
- _ckey="$2"
- _ccert="$3"
- _cca="$4"
- _cfullchain="$5"
- _debug _cdomain "$_cdomain"
- _debug _ckey "$_ckey"
- _debug _ccert "$_ccert"
- _debug _cca "$_cca"
- _debug _cfullchain "$_cfullchain"
- _getdeployconf DEPLOY_UNIFI_KEYSTORE
- _getdeployconf DEPLOY_UNIFI_KEYPASS
- _getdeployconf DEPLOY_UNIFI_CLOUDKEY_CERTDIR
- _getdeployconf DEPLOY_UNIFI_CORE_CONFIG
- _getdeployconf DEPLOY_UNIFI_RELOAD
- _getdeployconf DEPLOY_UNIFI_SYSTEM_PROPERTIES
- _getdeployconf DEPLOY_UNIFI_OS_RELOAD
- _debug2 DEPLOY_UNIFI_KEYSTORE "$DEPLOY_UNIFI_KEYSTORE"
- _debug2 DEPLOY_UNIFI_KEYPASS "$DEPLOY_UNIFI_KEYPASS"
- _debug2 DEPLOY_UNIFI_CLOUDKEY_CERTDIR "$DEPLOY_UNIFI_CLOUDKEY_CERTDIR"
- _debug2 DEPLOY_UNIFI_CORE_CONFIG "$DEPLOY_UNIFI_CORE_CONFIG"
- _debug2 DEPLOY_UNIFI_RELOAD "$DEPLOY_UNIFI_RELOAD"
- _debug2 DEPLOY_UNIFI_OS_RELOAD "$DEPLOY_UNIFI_OS_RELOAD"
- _debug2 DEPLOY_UNIFI_SYSTEM_PROPERTIES "$DEPLOY_UNIFI_SYSTEM_PROPERTIES"
- # Space-separated list of environments detected and installed:
- _services_updated=""
- # Default reload commands accumulated as we auto-detect environments:
- _reload_cmd=""
- # Unifi Controller environment (self hosted or any Cloud Key) --
- # auto-detect by file /usr/lib/unifi/data/keystore
- _unifi_keystore="${DEPLOY_UNIFI_KEYSTORE:-/usr/lib/unifi/data/keystore}"
- if [ -f "$_unifi_keystore" ]; then
- _debug _unifi_keystore "$_unifi_keystore"
- if ! _exists keytool; then
- _do_keytool=0
- _info "Installing certificate for Unifi Controller (PKCS12 keystore)."
- else
- _do_keytool=1
- _info "Installing certificate for Unifi Controller (Java keystore)"
- fi
- if [ ! -w "$_unifi_keystore" ]; then
- _err "The file $_unifi_keystore is not writable, please change the permission."
- return 1
- fi
- _unifi_keypass="${DEPLOY_UNIFI_KEYPASS:-aircontrolenterprise}"
- _debug "Generate import pkcs12"
- _import_pkcs12="$(_mktemp)"
- _debug "_toPkcs $_import_pkcs12 $_ckey $_ccert $_cca $_unifi_keypass unifi root"
- _toPkcs "$_import_pkcs12" "$_ckey" "$_ccert" "$_cca" "$_unifi_keypass" unifi root
- # shellcheck disable=SC2181
- if [ "$?" != "0" ]; then
- _err "Error generating pkcs12. Please re-run with --debug and report a bug."
- return 1
- fi
- # Save the existing keystore in case something goes wrong.
- mv -f "${_unifi_keystore}" "${_unifi_keystore}"_original
- _info "Previous keystore saved to ${_unifi_keystore}_original."
- if [ "$_do_keytool" -eq 1 ]; then
- _debug "Import into keystore: $_unifi_keystore"
- if keytool -importkeystore \
- -deststorepass "$_unifi_keypass" -destkeypass "$_unifi_keypass" -destkeystore "$_unifi_keystore" \
- -srckeystore "$_import_pkcs12" -srcstoretype PKCS12 -srcstorepass "$_unifi_keypass" \
- -alias unifi -noprompt; then
- _debug "Import keystore success!"
- else
- _err "Error importing into Unifi Java keystore."
- _err "Please re-run with --debug and report a bug."
- _info "Restoring original keystore."
- mv -f "${_unifi_keystore}"_original "${_unifi_keystore}"
- rm "$_import_pkcs12"
- return 1
- fi
- else
- _debug "Copying new keystore to $_unifi_keystore"
- cp -f "$_import_pkcs12" "$_unifi_keystore"
- fi
- # correct file ownership according to the directory, the keystore is placed in
- _unifi_keystore_dir=$(dirname "${_unifi_keystore}")
- _unifi_keystore_dir_owner=$(find "${_unifi_keystore_dir}" -maxdepth 0 -printf '%u\n')
- _unifi_keystore_owner=$(find "${_unifi_keystore}" -maxdepth 0 -printf '%u\n')
- if ! [ "${_unifi_keystore_owner}" = "${_unifi_keystore_dir_owner}" ]; then
- _debug "Changing keystore owner to ${_unifi_keystore_dir_owner}"
- chown "$_unifi_keystore_dir_owner" "${_unifi_keystore}" >/dev/null 2>&1 # fail quietly if we're not running as root
- fi
- # Update unifi service for certificate cipher compatibility
- _unifi_system_properties="${DEPLOY_UNIFI_SYSTEM_PROPERTIES:-/usr/lib/unifi/data/system.properties}"
- if ${ACME_OPENSSL_BIN:-openssl} pkcs12 \
- -in "$_import_pkcs12" \
- -password pass:aircontrolenterprise \
- -nokeys | ${ACME_OPENSSL_BIN:-openssl} x509 -text \
- -noout | grep -i "signature" | grep -iq ecdsa >/dev/null 2>&1; then
- if [ -f "$(dirname "${DEPLOY_UNIFI_KEYSTORE}")/system.properties" ]; then
- _unifi_system_properties="$(dirname "${DEPLOY_UNIFI_KEYSTORE}")/system.properties"
- else
- _unifi_system_properties="/usr/lib/unifi/data/system.properties"
- fi
- if [ -f "${_unifi_system_properties}" ]; then
- cp -f "${_unifi_system_properties}" "${_unifi_system_properties}"_original
- _info "Updating system configuration for cipher compatibility."
- _info "Saved original system config to ${_unifi_system_properties}_original"
- sed -i '/unifi\.https\.ciphers/d' "${_unifi_system_properties}"
- echo "unifi.https.ciphers=ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES128-GCM-SHA256" >>"${_unifi_system_properties}"
- sed -i '/unifi\.https\.sslEnabledProtocols/d' "${_unifi_system_properties}"
- echo "unifi.https.sslEnabledProtocols=TLSv1.3,TLSv1.2" >>"${_unifi_system_properties}"
- _info "System configuration updated."
- fi
- fi
- rm "$_import_pkcs12"
- # Restarting unifi-core will bring up unifi, doing it out of order results in
- # a certificate error, and breaks wifiman.
- # Restart if we aren't doing Unifi OS (e.g. unifi-core service), otherwise stop for later restart.
- _unifi_reload="${DEPLOY_UNIFI_RELOAD:-systemctl restart unifi}"
- if [ ! -f "${DEPLOY_UNIFI_CORE_CONFIG:-/data/unifi-core/config}/unifi-core.key" ]; then
- _reload_cmd="${_reload_cmd:+$_reload_cmd && }$_unifi_reload"
- else
- _info "Stopping Unifi Controller for later restart."
- _unifi_stop=$(echo "${_unifi_reload}" | sed -e 's/restart/stop/')
- $_unifi_stop
- _reload_cmd="${_reload_cmd:+$_reload_cmd && }$_unifi_reload"
- _info "Unifi Controller stopped."
- fi
- _services_updated="${_services_updated} unifi"
- _info "Install Unifi Controller certificate success!"
- elif [ "$DEPLOY_UNIFI_KEYSTORE" ]; then
- _err "The specified DEPLOY_UNIFI_KEYSTORE='$DEPLOY_UNIFI_KEYSTORE' is not valid, please check."
- return 1
- fi
- # Cloud Key environment (non-UnifiOS -- nginx serves admin pages) --
- # auto-detect by file /etc/ssl/private/cloudkey.key:
- _cloudkey_certdir="${DEPLOY_UNIFI_CLOUDKEY_CERTDIR:-/etc/ssl/private}"
- if [ -f "${_cloudkey_certdir}/cloudkey.key" ]; then
- _info "Installing certificate for Cloud Key Gen1 (nginx admin pages)"
- _debug _cloudkey_certdir "$_cloudkey_certdir"
- if [ ! -w "$_cloudkey_certdir" ]; then
- _err "The directory $_cloudkey_certdir is not writable; please check permissions."
- return 1
- fi
- # Cloud Key expects to load the keystore from /etc/ssl/private/unifi.keystore.jks.
- # It appears that unifi won't start if this is a symlink, so we'll copy it instead.
- # if ! cmp -s "$_unifi_keystore" "${_cloudkey_certdir}/unifi.keystore.jks"; then
- # _err "Unsupported Cloud Key configuration: keystore not found at '${_cloudkey_certdir}/unifi.keystore.jks'"
- # return 1
- # fi
- _info "Updating ${_cloudkey_certdir}/unifi.keystore.jks"
- if [ -e "${_cloudkey_certdir}/unifi.keystore.jks" ]; then
- if [ -L "${_cloudkey_certdir}/unifi.keystore.jks" ]; then
- rm -f "${_cloudkey_certdir}/unifi.keystore.jks"
- else
- mv "${_cloudkey_certdir}/unifi.keystore.jks" "${_cloudkey_certdir}/unifi.keystore.jks_original"
- fi
- fi
- cp "${_unifi_keystore}" "${_cloudkey_certdir}/unifi.keystore.jks"
- cat "$_cfullchain" >"${_cloudkey_certdir}/cloudkey.crt"
- cat "$_ckey" >"${_cloudkey_certdir}/cloudkey.key"
- (cd "$_cloudkey_certdir" && tar -cf cert.tar cloudkey.crt cloudkey.key unifi.keystore.jks)
- if systemctl -q is-active nginx; then
- _reload_cmd="${_reload_cmd:+$_reload_cmd && }service nginx restart"
- fi
- _info "Install Cloud Key Gen1 certificate success!"
- _services_updated="${_services_updated} nginx"
- elif [ "$DEPLOY_UNIFI_CLOUDKEY_CERTDIR" ]; then
- _err "The specified DEPLOY_UNIFI_CLOUDKEY_CERTDIR='$DEPLOY_UNIFI_CLOUDKEY_CERTDIR' is not valid, please check."
- return 1
- fi
- # UnifiOS environment -- auto-detect by /data/unifi-core/config/unifi-core.key:
- _unifi_core_config="${DEPLOY_UNIFI_CORE_CONFIG:-/data/unifi-core/config}"
- if [ -f "${_unifi_core_config}/unifi-core.key" ]; then
- _info "Installing certificate for UnifiOS"
- _debug _unifi_core_config "$_unifi_core_config"
- if [ ! -w "$_unifi_core_config" ]; then
- _err "The directory $_unifi_core_config is not writable; please check permissions."
- return 1
- fi
- # Save the existing certs in case something goes wrong.
- cp -f "${_unifi_core_config}"/unifi-core.crt "${_unifi_core_config}"/unifi-core_original.crt
- cp -f "${_unifi_core_config}"/unifi-core.key "${_unifi_core_config}"/unifi-core_original.key
- _info "Previous certificate and key saved to ${_unifi_core_config}/unifi-core_original.crt.key."
- cat "$_cfullchain" >"${_unifi_core_config}/unifi-core.crt"
- cat "$_ckey" >"${_unifi_core_config}/unifi-core.key"
- _unifi_os_reload="${DEPLOY_UNIFI_OS_RELOAD:-systemctl restart unifi-core}"
- _reload_cmd="${_reload_cmd:+$_reload_cmd && }$_unifi_os_reload"
- _info "Install UnifiOS certificate success!"
- _services_updated="${_services_updated} unifi-core"
- elif [ "$DEPLOY_UNIFI_CORE_CONFIG" ]; then
- _err "The specified DEPLOY_UNIFI_CORE_CONFIG='$DEPLOY_UNIFI_CORE_CONFIG' is not valid, please check."
- return 1
- fi
- if [ -z "$_services_updated" ]; then
- # None of the Unifi environments were auto-detected, so no deployment has occurred
- # (and none of DEPLOY_UNIFI_{KEYSTORE,CLOUDKEY_CERTDIR,CORE_CONFIG} were set).
- _err "Unable to detect Unifi environment in standard location."
- _err "(This deploy hook must be run on the Unifi device, not a remote machine.)"
- _err "For non-standard Unifi installations, set DEPLOY_UNIFI_KEYSTORE,"
- _err "DEPLOY_UNIFI_CLOUDKEY_CERTDIR, and/or DEPLOY_UNIFI_CORE_CONFIG as appropriate."
- return 1
- fi
- _reload_cmd="${DEPLOY_UNIFI_RELOAD:-$_reload_cmd}"
- if [ -z "$_reload_cmd" ]; then
- _err "Certificates were installed for services:${_services_updated},"
- _err "but none appear to be active. Please set DEPLOY_UNIFI_RELOAD"
- _err "to a command that will restart the necessary services."
- return 1
- fi
- _info "Reload services (this may take some time): $_reload_cmd"
- if eval "$_reload_cmd"; then
- _info "Reload success!"
- else
- _err "Reload error"
- return 1
- fi
- # Successful, so save all (non-default) config:
- _savedeployconf DEPLOY_UNIFI_KEYSTORE "$DEPLOY_UNIFI_KEYSTORE"
- _savedeployconf DEPLOY_UNIFI_KEYPASS "$DEPLOY_UNIFI_KEYPASS"
- _savedeployconf DEPLOY_UNIFI_CLOUDKEY_CERTDIR "$DEPLOY_UNIFI_CLOUDKEY_CERTDIR"
- _savedeployconf DEPLOY_UNIFI_CORE_CONFIG "$DEPLOY_UNIFI_CORE_CONFIG"
- _savedeployconf DEPLOY_UNIFI_RELOAD "$DEPLOY_UNIFI_RELOAD"
- _savedeployconf DEPLOY_UNIFI_OS_RELOAD "$DEPLOY_UNIFI_OS_RELOAD"
- _savedeployconf DEPLOY_UNIFI_SYSTEM_PROPERTIES "$DEPLOY_UNIFI_SYSTEM_PROPERTIES"
- return 0
- }
|