Introduction to WAPT¶
For what purpose is WAPT useful?¶
WAPT installs, updates and removes software and configurations on Windows, Linux and macOS devices. Software deployment (Firefox, MS Office, etc.) can be carried out from a central server using a graphical console. WAPT is taking many ideas from Debian Linux apt package management tool, hence its name.
Private companies of all sizes, Colleges, Schools, Universities, research labs, local and state governments, Hospitals, city governments, state ministries around the world are successfully using WAPT.
WAPT exists in two versions, Discovery and Enterprise, both proprietary, the Community version having been friendly forked to the Opensource Community.
WAPT is very efficient to address recurrent Firefox or Chrome update needs and it is often to cover that basic need that WAPT is initially adopted; it then becomes a tool of choice for the sysadmin’s daily tasks.
Security Certification from French Cyberdefense Agency ANSSI¶
Following its first level security certification obtained on 14 February 2018, WAPT has obtained on 15 march 2018 a higher level certification from ANSSI.
The genesis of WAPT¶
Our assessment after 15 years of IT management¶
Managing large IT installed bases of Microsoft Windows computers is today a difficult task in a secured environment:
Common ghosting methods (Clonezilla or Ghost) are efficient on homogeneous IT infrastructures with roaming user profiles.
Deployment tools (OCSInventory or WPKG) can broadcast software but do not easily allow software level or user level customizations that are useful to prevent or limit user support requests.
Software from smaller vendors often need Local Administrator rights to run properly.
Currently available solutions to address theses problems are either too expensive or too inefficient, and they are in every case too complex.
WAPT development hypotheses and motivations¶
The development of WAPT is motivated by these two principles:
What is complicated should be made simple.
What is simple should be made trivial.
WAPT relies on a small set of fundamental hypotheses:
Sysadmins should know a scripting language and WAPT has chosen Python for the depth and breadth of its libraries.
Sysadmins who have little experience with scripting languages MUST find inspiration in simple and efficient examples that they will adapt to fit their needs.
Sysadmins MUST be able to communicate on the efficiency of their actions to their superiors and report process gaps to internal or external auditors.
Sysadmins MUST be able to collaborate with their IT team; thereby WAPT local repositories provide signed packages that they can trust to be deployed on their network. Alternatively, they can choose external public repositories providing them the security guarantees that they consider sufficient.
Sysadmins are aware that user workstations serve business purposes and some customizations MUST be possible. The adaptation of the infrastructure to the business needs is facilitated by the notion of groups and OU; it allows to select a large number of hosts to customize their configuration.
Packages are stored in a web repository. They are not stored in a database.
Transport protocol used for deploying packages is HTTPS.
WAPT packages are served by the Nginx web server, available with Linux and Windows.
Packages index file is the only thing necessary.
It lists the packages available on allowed repositories and some basic information on each package.
That mechanism allows to easily set up a replication process between multiple repositories.
Large organizations with remote sites and subsidiaries sometimes require services to be replicated locally to avoid bandwidth congestion (Edge Computing).
Replicated repository ¶
WAPT Enterprise offers the possibility to upgrade remote WAPT Agents to serve as remote repositories that can be managed directly from the WAPT Console. All WAPT Agents can then be centrally configured to automatically select the best repository based on a set of rules.
When WAPT is used on bandwidth limited remote sites, it makes sense to have a local device that will replicate the main WAPT repository to reduce the network bandwidth consumed when deploying updates on remote devices.
With remote repositories, WAPT remains a solution with a low operating cost because high bandwidth fiber links are not required to take advantage of WAPT.
It works as follows:
A small form factor and no maintenance appliance with the role of secondary repository is deployed on the local network of each remote site; a workstation can also be used, although it may not be up and running if you want to connect to it.
The remote repository replicates the packages from the main repository.
The WAPT clients connect in priority with the repository that is the closest to them, the local repository.
To learn more about the replicated repositories, visit the documentation on the replicating a repository.
A WAPT package structure is similar to Debian Linux .deb packages. Each WAPT package includes the binaries to be executed and the other files it needs.
A package is easily transportable.
Here is how a WAPT package looks:
To learn more about the composition of a WAPT package, visit the documentation on the structure of a WAPT package.
Types of WAPT packages¶
There are 8 types of WAPT packages:
They are classic software packages.
They are stored in the web directory https://srvwapt.mydomain.lan/wapt/.
They are groups of packages.
Each group often correspond to:
a service in an organization (ex: accounting).
a room, building, etc.
A host can be a member of several groups.
They are stored in the web directory https://srvwapt.mydomain.lan/wapt/.
Each host will look for its host package to know the packages that it must install (i.e. dependencies).
Host packages are stored in the web directory https://srvwapt.mydomain.lan/wapt-host/.
unit packages ¶
Unit packages bear the complete name of OU, example: OU=room1,OU=prod,OU=computers,DC=mydomain,DC=lan.
By default, each computer looks for the unit packages and then installs the list of associated dependencies.
Unit packages are stored in the web directory https://srvwapt.mydomain.lan/wapt/.
wsus packages ¶
Wsus packages contain the list of authorized or prohibited Windows Updates.
When this package is installed on the endpoints, the next update scan performed by WAPT will choose Windows updates based on this filtering.
Wsus packages are stored in the web directory https://srvwapt.mydomain.lan/wapt/.
self-service packages ¶
Self-service packages contain a list of groups or users (Active Directory or local) and their associated lists of authorized packages that Users are allowed to install by themselves.
Self-service packages are stored in the web directory https://srvwapt.mydomain.lan/wapt/.
profile packages ¶
Profile packages are similar to group packages.
However, profile packages work a little differently and are most useful when an Active Directory Server is operating within the Organization:
The WAPT Agent will list the Active Directory groups to which the host belongs.
If a profile package has the same name as an Active Directory group, then the WAPT agent will install automatically the profile package for the Active Directory group of which it is a member.
If the host is no longer a member of its Active Directory group, then the corresponding profile package will be uninstalled.
Profile packages are stored in the web directory https://srvwapt.mydomain.lan/wapt/.
Profile packages are not explicitly assigned to the host (i.e. as dependencies in the host package) but are implicitly taken into account by the WAPT agent dependency engine during the WAPT upgrade.
For performance reasons, this feature is enabled only if the
use_ad_groups option is enabled in the
wapt-get.ini configuration file.
config packages ¶
config packages are used for modifying the WAPT Agents configuration parameters. This way, it is possible to have a generic WAPT Agent and to customize the WAPT Agents configuration using host profiles. For example, some hosts may need different WAPTWUA rules and some other hosts may need to be set to a DEV maturity, etc.
In WAPT everything works on the principle of dependencies.
By default, the WAPT Agent will look for its host package. The host package lists WAPT packages to install on the computer.
The host package is correctly installed when all its dependencies are satisfied.
Each sub-dependency MUST be satisfied to satisfy an upper-level dependency.
When every dependency has been satisfied, the host notifies its status to the WAPT Server. The host status indicator turns OK and green in the WAPT Console, meaning the host has the host profile that the Administrator or Package Deployer has defined for it.
When attributing a software package to a host as a dependency, only the software canonical name without its version number is registered as a dependency (ex: I want Freemind to be installed on this host in its latest version and Freemind to be configured so that the User does not call me because she does not find the icon on her desktop!).
For each dependency, the WAPT Agent will take care of automatically installing the latest available package version. So if several versions of Freemind are available on the repository, the WAPT Agent will always get the latest version, unless I have pinned the version for reason of compatibility with other sets of tools.
Afterwards, when the WAPT Agent contacts the repository to check for new updates, it will compare the package versions on the repository with its own local list of packages already installed on the host.
If an update of an installed package is available, the client will switch the status of the package to NEED UPGRADE. It will then install the software updates during the next upgrade.
Private key / Public certificate principle¶
Like Android APK packages, WAPT packages are signed; a hash of the control sum of all the files included in the package is calculated.
This signing method guarantees the origin and integrity of the package.
To work properly, WAPT requires a private key / public certificate pair (self-signed, issued by an internal Certificate Authority or commercially issued).
The private key will be used to sign WAPT packages whereas the public certificate will be distributed with every WAPT client so that WAPT Agents may validate the files that were signed with the private key.
The different public certificates will be stored in the WAPT subdirectory
That folder can contain several public certificates.
When a WAPT package is downloaded, the WAPT Agent (waptagent) will check the integrity of the package, and then check that the package has been properly signed.
If the WAPT package signature does not match any of the public certificates located in
C:\Program Files (x86)\wapt\ssl on Windows or in
/opt/wapt/ssl on Linux and macOS, the WAPT Agent will refuse to install the package.
For more information, please refer to the documentation on how the integrity of the installation process a WAPT package is insured.
The private certificate is important¶
The private key ** MUST NOT** be stored on the WAPT Server, nor on any public or shared storage that could be accessed by non-authorized personnel. Indeed, WAPT security is based on keeping the private key private.
The private key MUST be stored in a safe place, because she who has your key controls your network!
Finally, to ensure maximum security, the private key can be secured in a smartcard or a cryptographic token that WAPT Administrators or Package Deployer will carry physically on them, using the smartcard or the token only when needed to sign a WAPT package.
The private key is protected with a password by default.
More informations on generating the Administrator’s certificate for signing WAPT packages.
Differentiating user roles in WAPT ¶
WAPT offers the possibility to differentiate roles based on:
Public Key Infrastructure¶
The usage of an existing PKI is possible, the WAPT Console comes with a simple certificate generator.
WAPT works as a CA mode in regards to PKI.
By design, WAPT is capable of generating certificates that may be used as parent keys to generate other public and private child keys.
Therefore the main WAPT Administrator who acts as a may issue certificates for each IT admin so their actions may be identified when they use WAPT.
Child certificates issued from the CA can themselves be configured as:
Code-signing certificate to allow IT admins to package, sign and deploy WAPT packages containing executable loads (i.e.
CA certificate to delegate to other IT admins the right to issue certificates.
Simple SSL certficate to limit IT admins to only deploying packages containing non executable loads (i.e. configure hosts).
To learn more on generating the Certificate Authority (CA) with WAPT, visit this documentation.
Access Control Lists¶
With WAPT, it is possible to define user access rights using ACL.
Each IT technician is identified with his own certificate and rights can therefore be be finely applied on an individual basis.
For exemple, a WAPT Console user may have a
View right on a host but may not be allowed to click on Edit hosts.
To learn more on ACLS in WAPT, visit this documentation.
WAPT mode of operation¶
WAPT keeps a hardware and software inventory of each host.
That inventory is stored in a small database integrated in each WAPT Agent.
When first registering with the WAPT Server, the WAPT Agent sends its entire inventory (BIOS, hardware, software) to the WAPT Server.
When the WAPT Agent updates, the WAPT Agent will report its new inventory status to the WAPT Server.
The central inventory allows you to filter hosts by their components, software or any other searchable argument.
The WAPT Agents also report back their WAPT package status.
In case of errors during package installation, the information will be reported to the WAPT Server. The host will then appear in ERROR in the WAPT Console.
The possibles status of a host in the WAPT Console are:
The Administrator can see the packages returned in error in the WAPT Console and fix the package accordingly.
For each upgrade, WAPT will try to install a new version of the package until no error status is returned.
WAPT Agents sign their inventory before sending it to the WAPT Server.
For more information, please refer to signing inventory updates.
WAPT common interactions¶
When an update command is launched on a WAPT Agent, it is equivalent to ordering the Agent to check the WAPT repository for new packages. By default, the WAPT Agent will look for updates every two hours.
If the date of the
Packages index file has changed since the last update, then the WAPT Agent downloads the new
Packages file (between 20 and 100k), otherwise, it does nothing.
The WAPT Agent then compares the
Packages file with its own local database.
If the WAPT Agent detects that a package MUST be added or updated, it will switch the status of the host and the status of the package to NEED-UPGRADE.
It will not launch the installation of the package immediately. The WAPT Agent will wait for an upgrade order to launch the upgrade.
When we launch an upgrade, we ask the WAPT Agent to install the packages having a NEED-UPGRADE status.
An wapt-get update MUST come before a wapt-get upgrade, otherwise the Agent will not know whether updates are available.
By default, the WAPT Agent will trigger an wapt-get update/ wapt-get download-upgrade at startup; after starting up, the WAPT Agent will then check every 2 hours to see whether it has something to do.
Packages to be installed will be downloaded and cached in the folder
C:\Program Files (x86)\wapt\cache.
waptexit will launch a wapt-get upgrade when the computer shuts down. An Administrator can force the immediate launch of an upgrade from the WAPT Console. Alternatively, an end-user may choose to manually launch an upgrade. Lastly, a scheduled task may be set up on hosts to launch an upgrade.
If the WAPT Server is not reachable when upgrading, the WAPT Agent will still be able to install cached packages. Inventory updates are sent to the WAPT Server when network connectivity returns.
The 5 goals of the WAPT Agent are therefore:
To install a base, a group or a unit package if it is available.
To remove obsolete packages.
To resolve package dependencies and conflicts.
To make sure all installed WAPT packages are up to date compared to the ones stored on the repository.
To regularly update the WAPT Server with its hardware status and the status of installed software.
WAPT Agent behavior¶
A key concept that can be hard to understand is the behavior of a WAPT Agent when installing a package and the considerations around it.
WAPT Agent package installation can be split in simple steps:
On triggerring a wapt-get update, the WAPT Agent downloads NEED-UPGRADE or NEED-INSTALL packages and stores them in the cache folder.
On triggerring a wapt-get upgrade, the WAPT Agent unzips the packages into a temporary folder.
setup.pycontent is parsed and stored in the WAPT Agent database located in
C:\Program Files (x86)\wapt\db\waptdb.sqlite.
setup.pyis executed and the software is installed from unzipped files.
In case of success: the downloaded packages and unzipped files are deleted. An OK status is returned to the WAPT Server.
In case of failure: the downloaded packages are kept and the unzipped files are deleted. An ERROR status is returned to the WAPT Server.
That behavior is important for understanding the lifecycle of an installed package.
For instance when removing a package, the following steps are taken:
setup.pycontent is retrieved from WAPT Agent sqlite database located in
C:\Program Files (x86)\wapt\db\waptdb.sqlite.
The WAPT Agent looks up the
UninstallStringin the local database.
If defined in the
setup.pycopied into the local database during initial installation of the WAPT package, the uninstall() function is executed.
Similar steps are activated when executing session_setup and audit.
Complete diagram of the WAPT operating mechanism¶
We find here the common WAPT behavior, from duplicating a package from an external repository accessible on the Internet, to deploying it on network hosts.
Reading the diagram clockwise, a WAPT Administrator will:
Import packages from an external repository (or create a new package from scratch).
Test, validate, build and then sign the package.
Upload the package onto the main repository.
Packages are automatically downloaded by WAPT clients.
Packages are executed based on the selected method:
Inventory information is fed back to the WAPT Server.
The updated inventory is reported in the WAPT Console.
WAPT Server architecture¶
The WAPT Server architecture relies on several distinct roles:
The repository role for distributing packages.
The inventory and central server role for hardware and software inventory.
The proxy role to relay actions between the WAPT Console and the WAPT Agents.
First, the WAPT Server serves as a web repository.
The repository role is accomplished by a Nginx web server.
WAPT packages are available via a web browser by visiting https://srvwapt.mydomain.lan/wapt.
The host packages are stored in a directory that is not accessible by default (https://srvwapt.mydomain.lan/wapt/wapt-host/).
Inventory server role¶
Second, the WAPT Server serves as an inventory server.
The inventory server is a passive service that collects information reported by WAPT Agents:
WAPT packages status.
Tasks status (running, pending, error).
The WAPT service is not active in the sense that it only receives information from clients. As a consequence, if the WAPT inventory Server fails, the inventory will recover by itself from inventory status reports received from the deployed WAPT Agents.
In the Discovery version of WAPT, access to inventory data is only possible through the WAPT Console.
Third, the WAPT Server serves as a command relay proxy.
It acts as a relay between the WAPT management Console and deployed WAPT Agents.
Every action triggered on a WAPT Agent from the WAPT Server are signed with a private key.
Without a valid private key, it is not possible to trigger remote actions on remote WAPT equipped devices.
For more information on remote actions, please refer to the documenation on signing actions relayed to the WAPT Agents.
WAPT language and development environment¶
WAPT is built using the Python language.
With WAPT 2.0, the WAPT internals have switched to python3.
WAPT packages MUST NOW follow the new python3 syntax.
Refer to this documentation to help you identify potential problems when switching your existing packages from Python2 to Python3.
Any RAD environment intended for Python development is suitable.
Tranquil IT has developed some useful WAPT specific plugins for the PyScripter IDE (https://sourceforge.net/projects/pyscripter).
Tranquil IT recommends using PyScripter for developing WAPT packages for Windows and vscode for developing WAPT packages for macOS and Linux.
The strength of Python¶
All the power of Python can be advantageously put to use.
Many libraries already exist in Python for:
Doing conditional loops (if … then … else …).
Copying, pasting, moving files and directories.
Checking whether files or directories exist.
Checking whether registry keys exist.
Checking access rights, modifying access rights.
Looking up information on external data sources (LDAP, databases, files, etc).
The power of WAPT¶
Functions most commonly used with WAPT have been simplified and integrated within libraries called Setuphelpers.
SetupHelpers libraries simplify the process of creating and testing WAPT packages, thus validating WAPT’s main objectives:
That which was complicated is made simple.
That which was simple is made trivial.