|
@ -30,7 +30,9 @@ |
|
|
# Keystore password (built into Unifi Controller, not a user-set password): |
|
|
# Keystore password (built into Unifi Controller, not a user-set password): |
|
|
#DEPLOY_UNIFI_KEYPASS="aircontrolenterprise" |
|
|
#DEPLOY_UNIFI_KEYPASS="aircontrolenterprise" |
|
|
# Command to restart Unifi Controller: |
|
|
# Command to restart Unifi Controller: |
|
|
#DEPLOY_UNIFI_RELOAD="service unifi restart" |
|
|
|
|
|
|
|
|
# DEPLOY_UNIFI_RELOAD="systemctl restart unifi" |
|
|
|
|
|
# System Properties file location for controller |
|
|
|
|
|
#DEPLOY_UNIFI_SYSTEM_PROPERTIES="/usr/lib/unifi/data/system.properties" |
|
|
# |
|
|
# |
|
|
# Settings for Unifi Cloud Key Gen1 (nginx admin pages): |
|
|
# Settings for Unifi Cloud Key Gen1 (nginx admin pages): |
|
|
# Directory where cloudkey.crt and cloudkey.key live: |
|
|
# Directory where cloudkey.crt and cloudkey.key live: |
|
@ -43,7 +45,7 @@ |
|
|
# Directory where unifi-core.crt and unifi-core.key live: |
|
|
# Directory where unifi-core.crt and unifi-core.key live: |
|
|
#DEPLOY_UNIFI_CORE_CONFIG="/data/unifi-core/config/" |
|
|
#DEPLOY_UNIFI_CORE_CONFIG="/data/unifi-core/config/" |
|
|
# Command to restart unifi-core: |
|
|
# Command to restart unifi-core: |
|
|
#DEPLOY_UNIFI_RELOAD="systemctl restart unifi-core" |
|
|
|
|
|
|
|
|
# DEPLOY_UNIFI_OS_RELOAD="systemctl restart unifi-core" |
|
|
# |
|
|
# |
|
|
# At least one of DEPLOY_UNIFI_KEYSTORE, DEPLOY_UNIFI_CLOUDKEY_CERTDIR, |
|
|
# At least one of DEPLOY_UNIFI_KEYSTORE, DEPLOY_UNIFI_CLOUDKEY_CERTDIR, |
|
|
# or DEPLOY_UNIFI_CORE_CONFIG must exist to receive the deployed certs. |
|
|
# or DEPLOY_UNIFI_CORE_CONFIG must exist to receive the deployed certs. |
|
@ -69,12 +71,16 @@ unifi_deploy() { |
|
|
_getdeployconf DEPLOY_UNIFI_CLOUDKEY_CERTDIR |
|
|
_getdeployconf DEPLOY_UNIFI_CLOUDKEY_CERTDIR |
|
|
_getdeployconf DEPLOY_UNIFI_CORE_CONFIG |
|
|
_getdeployconf DEPLOY_UNIFI_CORE_CONFIG |
|
|
_getdeployconf DEPLOY_UNIFI_RELOAD |
|
|
_getdeployconf DEPLOY_UNIFI_RELOAD |
|
|
|
|
|
_getdeployconf DEPLOY_UNIFI_SYSTEM_PROPERTIES |
|
|
|
|
|
_getdeployconf DEPLOY_UNIFI_OS_RELOAD |
|
|
|
|
|
|
|
|
_debug2 DEPLOY_UNIFI_KEYSTORE "$DEPLOY_UNIFI_KEYSTORE" |
|
|
_debug2 DEPLOY_UNIFI_KEYSTORE "$DEPLOY_UNIFI_KEYSTORE" |
|
|
_debug2 DEPLOY_UNIFI_KEYPASS "$DEPLOY_UNIFI_KEYPASS" |
|
|
_debug2 DEPLOY_UNIFI_KEYPASS "$DEPLOY_UNIFI_KEYPASS" |
|
|
_debug2 DEPLOY_UNIFI_CLOUDKEY_CERTDIR "$DEPLOY_UNIFI_CLOUDKEY_CERTDIR" |
|
|
_debug2 DEPLOY_UNIFI_CLOUDKEY_CERTDIR "$DEPLOY_UNIFI_CLOUDKEY_CERTDIR" |
|
|
_debug2 DEPLOY_UNIFI_CORE_CONFIG "$DEPLOY_UNIFI_CORE_CONFIG" |
|
|
_debug2 DEPLOY_UNIFI_CORE_CONFIG "$DEPLOY_UNIFI_CORE_CONFIG" |
|
|
_debug2 DEPLOY_UNIFI_RELOAD "$DEPLOY_UNIFI_RELOAD" |
|
|
_debug2 DEPLOY_UNIFI_RELOAD "$DEPLOY_UNIFI_RELOAD" |
|
|
|
|
|
_debug2 DEPLOY_UNIFI_OS_RELOAD "$DEPLOY_UNIFI_OS_RELOAD" |
|
|
|
|
|
_debug2 DEPLOY_UNIFI_SYSTEM_PROPERTIES "$DEPLOY_UNIFI_SYSTEM_PROPERTIES" |
|
|
|
|
|
|
|
|
# Space-separated list of environments detected and installed: |
|
|
# Space-separated list of environments detected and installed: |
|
|
_services_updated="" |
|
|
_services_updated="" |
|
@ -136,32 +142,38 @@ unifi_deploy() { |
|
|
fi |
|
|
fi |
|
|
|
|
|
|
|
|
# Update unifi service for certificate cipher compatibility |
|
|
# Update unifi service for certificate cipher compatibility |
|
|
|
|
|
_unifi_system_properties="${DEPLOY_UNIFI_SYSTEM_PROPERTIES:-/usr/lib/unifi/data/system.properties}" |
|
|
if ${ACME_OPENSSL_BIN:-openssl} pkcs12 \ |
|
|
if ${ACME_OPENSSL_BIN:-openssl} pkcs12 \ |
|
|
-in "$_import_pkcs12" \ |
|
|
-in "$_import_pkcs12" \ |
|
|
-password pass:aircontrolenterprise \ |
|
|
-password pass:aircontrolenterprise \ |
|
|
-nokeys | ${ACME_OPENSSL_BIN:-openssl} x509 -text \ |
|
|
-nokeys | ${ACME_OPENSSL_BIN:-openssl} x509 -text \ |
|
|
-noout | grep -i "signature" | grep -iq ecdsa >/dev/null 2>&1; then |
|
|
-noout | grep -i "signature" | grep -iq ecdsa >/dev/null 2>&1; then |
|
|
cp -f /usr/lib/unifi/data/system.properties /usr/lib/unifi/data/system.properties_original |
|
|
|
|
|
|
|
|
cp -f "${_unifi_system_properties}" "${_unifi_system_properties}_original" |
|
|
_info "Updating system configuration for cipher compatibility." |
|
|
_info "Updating system configuration for cipher compatibility." |
|
|
_info "Saved original system config to /usr/lib/unifi/data/system.properties_original" |
|
|
|
|
|
sed -i '/unifi\.https\.ciphers/d' /usr/lib/unifi/data/system.properties |
|
|
|
|
|
echo "unifi.https.ciphers=ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES128-GCM-SHA256" >>/usr/lib/unifi/data/system.properties |
|
|
|
|
|
sed -i '/unifi\.https\.sslEnabledProtocols/d' /usr/lib/unifi/data/system.properties |
|
|
|
|
|
echo "unifi.https.sslEnabledProtocols=TLSv1.3,TLSv1.2" >>/usr/lib/unifi/data/system.properties |
|
|
|
|
|
|
|
|
_info "Saved original system config to ${_unifi_system_properties}_original" |
|
|
|
|
|
sed -i '/unifi\.https\.ciphers/d' "${_unifi_system_properties}" |
|
|
|
|
|
echo "unifi.https.ciphers=ECDHE-ECDSA-AES256-GCM-SHA384,ECDHE-RSA-AES128-GCM-SHA256" >>"${_unifi_system_properties}" |
|
|
|
|
|
sed -i '/unifi\.https\.sslEnabledProtocols/d' "${_unifi_system_properties}" |
|
|
|
|
|
echo "unifi.https.sslEnabledProtocols=TLSv1.3,TLSv1.2" >>"${_unifi_system_properties}" |
|
|
_info "System configuration updated." |
|
|
_info "System configuration updated." |
|
|
|
|
|
else |
|
|
|
|
|
_info "New certificate does not require ecdsa ciphers, not updating system properties." |
|
|
fi |
|
|
fi |
|
|
|
|
|
|
|
|
rm "$_import_pkcs12" |
|
|
rm "$_import_pkcs12" |
|
|
|
|
|
|
|
|
# Restarting unifi-core will bring up unifi, doing it out of order results in |
|
|
# Restarting unifi-core will bring up unifi, doing it out of order results in |
|
|
# a certificate error, and breaks wifiman. |
|
|
# a certificate error, and breaks wifiman. |
|
|
# Restart if we aren't doing unifi-core, otherwise stop for later restart. |
|
|
|
|
|
if systemctl -q is-active unifi; then |
|
|
|
|
|
|
|
|
# Restart if we aren't doing Unifi OS (e.g. unifi-core service), otherwise stop for later restart. |
|
|
|
|
|
_unifi_reload="${DEPLOY_UNIFI_RELOAD:-systemctl restart unifi}" |
|
|
if [ ! -f "${DEPLOY_UNIFI_CORE_CONFIG:-/data/unifi-core/config}/unifi-core.key" ]; then |
|
|
if [ ! -f "${DEPLOY_UNIFI_CORE_CONFIG:-/data/unifi-core/config}/unifi-core.key" ]; then |
|
|
_reload_cmd="${_reload_cmd:+$_reload_cmd && }systemctl restart unifi" |
|
|
|
|
|
|
|
|
_reload_cmd="${_reload_cmd:+$_reload_cmd && }$_unifi_reload" |
|
|
else |
|
|
else |
|
|
_reload_cmd="${_reload_cmd:+$_reload_cmd && }systemctl stop unifi" |
|
|
|
|
|
fi |
|
|
|
|
|
|
|
|
_info "Stopping Unifi Controller for later restart." |
|
|
|
|
|
_unifi_stop=$(echo "${_unifi_reload}" | sed -e 's/restart/stop/') |
|
|
|
|
|
$_unifi_stop |
|
|
|
|
|
_reload_cmd="${_reload_cmd:+$_reload_cmd && }$_unifi_reload" |
|
|
|
|
|
_info "Unifi Controller stopped." |
|
|
fi |
|
|
fi |
|
|
_services_updated="${_services_updated} unifi" |
|
|
_services_updated="${_services_updated} unifi" |
|
|
_info "Install Unifi Controller certificate success!" |
|
|
_info "Install Unifi Controller certificate success!" |
|
@ -181,13 +193,24 @@ unifi_deploy() { |
|
|
return 1 |
|
|
return 1 |
|
|
fi |
|
|
fi |
|
|
# Cloud Key expects to load the keystore from /etc/ssl/private/unifi.keystore.jks. |
|
|
# Cloud Key expects to load the keystore from /etc/ssl/private/unifi.keystore.jks. |
|
|
# Normally /usr/lib/unifi/data/keystore is a symlink there (so the keystore was |
|
|
|
|
|
# updated above), but if not, we don't know how to handle this installation: |
|
|
|
|
|
if ! cmp -s "$_unifi_keystore" "${_cloudkey_certdir}/unifi.keystore.jks"; then |
|
|
|
|
|
_err "Unsupported Cloud Key configuration: keystore not found at '${_cloudkey_certdir}/unifi.keystore.jks'" |
|
|
|
|
|
return 1 |
|
|
|
|
|
|
|
|
# It appears that unifi won't start if this is a symlink, so we'll copy it instead. |
|
|
|
|
|
|
|
|
|
|
|
# if ! cmp -s "$_unifi_keystore" "${_cloudkey_certdir}/unifi.keystore.jks"; then |
|
|
|
|
|
# _err "Unsupported Cloud Key configuration: keystore not found at '${_cloudkey_certdir}/unifi.keystore.jks'" |
|
|
|
|
|
# return 1 |
|
|
|
|
|
# fi |
|
|
|
|
|
|
|
|
|
|
|
_info "Updating ${_cloudkey_certdir}/unifi.keystore.jks" |
|
|
|
|
|
if [ -e "${_cloudkey_certdir}/unifi.keystore.jks" ]; then |
|
|
|
|
|
if [ -L "${_cloudkey_certdir}/unifi.keystore.jks" ]; then |
|
|
|
|
|
rm -f "${_cloudkey_certdir}/unifi.keystore.jks" |
|
|
|
|
|
else |
|
|
|
|
|
mv "${_cloudkey_certdir}/unifi.keystore.jks" "${_cloudkey_certdir}/unifi.keystore.jks_original" |
|
|
|
|
|
fi |
|
|
fi |
|
|
fi |
|
|
|
|
|
|
|
|
|
|
|
cp "_unifi_keystore" "${_cloudkey_certdir}/unifi.keystore.jks" |
|
|
|
|
|
|
|
|
cat "$_cfullchain" >"${_cloudkey_certdir}/cloudkey.crt" |
|
|
cat "$_cfullchain" >"${_cloudkey_certdir}/cloudkey.crt" |
|
|
cat "$_ckey" >"${_cloudkey_certdir}/cloudkey.key" |
|
|
cat "$_ckey" >"${_cloudkey_certdir}/cloudkey.key" |
|
|
(cd "$_cloudkey_certdir" && tar -cf cert.tar cloudkey.crt cloudkey.key unifi.keystore.jks) |
|
|
(cd "$_cloudkey_certdir" && tar -cf cert.tar cloudkey.crt cloudkey.key unifi.keystore.jks) |
|
@ -215,14 +238,14 @@ unifi_deploy() { |
|
|
# Save the existing certs in case something goes wrong. |
|
|
# Save the existing certs in case something goes wrong. |
|
|
cp -f "${_unifi_core_config}"/unifi-core.crt "${_unifi_core_config}"/unifi-core_original.crt |
|
|
cp -f "${_unifi_core_config}"/unifi-core.crt "${_unifi_core_config}"/unifi-core_original.crt |
|
|
cp -f "${_unifi_core_config}"/unifi-core.key "${_unifi_core_config}"/unifi-core_original.key |
|
|
cp -f "${_unifi_core_config}"/unifi-core.key "${_unifi_core_config}"/unifi-core_original.key |
|
|
_info "Previous certificate and key saved to ${_unifi_core_config}/unifi-core_original.crt/key." |
|
|
|
|
|
|
|
|
_info "Previous certificate and key saved to ${_unifi_core_config}/unifi-core_original.crt.key." |
|
|
|
|
|
|
|
|
cat "$_cfullchain" >"${_unifi_core_config}/unifi-core.crt" |
|
|
cat "$_cfullchain" >"${_unifi_core_config}/unifi-core.crt" |
|
|
cat "$_ckey" >"${_unifi_core_config}/unifi-core.key" |
|
|
cat "$_ckey" >"${_unifi_core_config}/unifi-core.key" |
|
|
|
|
|
|
|
|
if systemctl -q is-active unifi-core; then |
|
|
|
|
|
_reload_cmd="${_reload_cmd:+$_reload_cmd && }systemctl restart unifi-core" |
|
|
|
|
|
fi |
|
|
|
|
|
|
|
|
_unifi_os_reload="${DEPLOY_UNIFI_OS_RELOAD:-systemctl restart unifi-core}" |
|
|
|
|
|
_reload_cmd="${_reload_cmd:+$_reload_cmd && }$_unifi_os_reload" |
|
|
|
|
|
|
|
|
_info "Install UnifiOS certificate success!" |
|
|
_info "Install UnifiOS certificate success!" |
|
|
_services_updated="${_services_updated} unifi-core" |
|
|
_services_updated="${_services_updated} unifi-core" |
|
|
elif [ "$DEPLOY_UNIFI_CORE_CONFIG" ]; then |
|
|
elif [ "$DEPLOY_UNIFI_CORE_CONFIG" ]; then |
|
@ -261,6 +284,8 @@ unifi_deploy() { |
|
|
_savedeployconf DEPLOY_UNIFI_CLOUDKEY_CERTDIR "$DEPLOY_UNIFI_CLOUDKEY_CERTDIR" |
|
|
_savedeployconf DEPLOY_UNIFI_CLOUDKEY_CERTDIR "$DEPLOY_UNIFI_CLOUDKEY_CERTDIR" |
|
|
_savedeployconf DEPLOY_UNIFI_CORE_CONFIG "$DEPLOY_UNIFI_CORE_CONFIG" |
|
|
_savedeployconf DEPLOY_UNIFI_CORE_CONFIG "$DEPLOY_UNIFI_CORE_CONFIG" |
|
|
_savedeployconf DEPLOY_UNIFI_RELOAD "$DEPLOY_UNIFI_RELOAD" |
|
|
_savedeployconf DEPLOY_UNIFI_RELOAD "$DEPLOY_UNIFI_RELOAD" |
|
|
|
|
|
_savedeployconf DEPLOY_UNIFI_OS_RELOAD "$DEPLOY_UNIFI_OS_RELOAD" |
|
|
|
|
|
_savedeployconf DEPLOY_UNIFI_SYSTEM_PROPERTIES "$DEPLOY_UNIFI_SYSTEM_PROPERTIES" |
|
|
|
|
|
|
|
|
return 0 |
|
|
return 0 |
|
|
} |
|
|
} |