Defining a password for the Administrator’s private key¶
The WAPT console has lost the path to the private key, it is normal because in 1.3 the WAPT console was pointing to the private key. Now in 1.5, the WAPT console points to the certificate associated with the private key.
Go to
, then fill in the path to the new certificate.WAPT 1.6 requires to protect the private key with a password to sign packages and actions.
In the WAPT console, go to
, then select your certificate and enter a password for your private key.Generating a Code Signing certificate¶
WAPT 1.6 differentiates Code Signing certificates from simple SSL certificates.
It is therefore necessary to regenerate a Code Signing certificate.
By default, WAPT 1.6 Community generates self-signed Code Signing certificates.
You must insure that the old certificate in C:\private\mykey.crt
and the key C:\private\mykey.pem
are present in C:\private
.
Attention
For packages to be deployed on the Organization’s computers, all packages will have to be re-signed with a Code Signing certificate.
To create the Code Signing certificate, in the WAPT console go to
.Note
Normally, you will not have to recreate a new key. Only the certificate
will have to be changed. You must enter the path to your key
(ex: C:\private\mykey.pem
).
Attention
Do not make changes to the informations on the certificate. If any information is changed, then you will not be able to migrate from 1.3.13 to 1.6 using the waptupgrade procedure.
The WAPT console now asks you whether the new certificate should be added
to the ssl
folder of the local WAPT agent, you can accept.
Now that you have generated your new key you must now change the path to your personal certificate. The WAPT console must now point to this new certificate.
Go to
, then fill in the path to the new certificate.You may now delete the old certificate.
Re-signing the packages on your WAPT repositories¶
All WAPT 1.3.13 must be re-signed because WAPT 1.6 packages must be signed with a Code Signing certificate and hashed with sha256.
Linux¶
You must temporarily copy your private key (.pem
)
and the Code Signing certificate (.crt
) on your Linux based WAPT
Server using WinSCP or an equivalent tool.
Then, connect with SSH to the Linux WAPT Server and re-sign all WAPT base packages with the new certificate:
PYTHONPATH=/opt/wapt PYTHONHOME=/opt/wapt python /opt/wapt/wapt-signpackages.py -i -s --message-digest=sha256,sha1 -c /root/wapt-private-20180312-1522.crt /var/www/wapt/*.wapt
Hint
The WAPT Server SuperAdmin password is requested to access the database so to do the matching between FQDN and their corresponding UUID .
Rename host packages with the UUID nomenclature:
PYTHONPATH=/opt/wapt PYTHONHOME=/opt/wapt python /opt/wapt/waptserver/scripts/migrate-hosts.py -C /root/wapt-private-20180312-1522.crt -K /root/wapt-private.pem
Note
The private key now password protected, the password is requested for signing the packages.
Attention
DO NOT FORGET to delete the private key (.pem) from the WAPT Server!
Windows¶
Then, open a session on the Windows machine hosting the WAPT Server and re-sign all WAPT base packages with the new certificate:
wapt-signpackages -i -s --message-digest=sha256,sha1 -c C:\private\wapt-private-20180312-1522.crt C:\wapt\waptserver\repository\wapt\*.wapt
Hint
The WAPT Server SuperAdmin password is requested to access the database so to do the matching between FQDNs and their corresponding UUIDs.
Rename host packages with the UUID nomenclature:
"C:\wapt\waptserver\scripts\migrate-hosts.bat" -C C:\private\wapt-private-20180312-1522.crt -K C:\private\wapt-private.pem
Note
The private key now password protected, the password is requested for signing the packages.
Attention
DO NOT FORGET to delete the private key (.pem) from the WAPT Server!
Generating the PostgreSQL database table for the group packages¶
In WAPT 1.3, group filtering was done by scanning the Packages
index file in the wapt-host
folder of the WAPT Server.
For performance reasons, the filtering is now done by querying a PostgreSQL database table. The table will fill in automatically as WAPT agents register with the WAPT Server 1.6.
To quickly regenerate the database table, the trick is to create a temporary group mig-temp.
You may then apply the mig-temp package to all WAPT clients from the WAPT console (CTRL+A in the inventory, then
and select the package mig-temp).You may now revert the operation (CTRL+A in the inventory, then
and select the package mig-temp).The filtering of groups should be operational again.
Ugrading WAPT agents¶
You may now follow the procedure to create the new WAPT agent.
Attention
The version update implies a change in the way packages are signed.
If you update from 1.3.13, the WAPT package waptupgrade should install correctly if you check the box sign waptupgrade with sha256 AND sha1 while generating the WAPT agent.
If your WAPT agents are in a version that is less than 1.3.13, the package waptupgrade will not work.
You may choose instead to use a waptdeploy GPO to deploy the new WAPT agent on your installed base of PCs.
Installing waptupgrade on the computers¶
With version 1.6, it is no longer possible to directly contact WAPT agents in an inferior version from the WAPT console.
To allow you to install the waptupgrade package on 1.3.13 computers, we have designed a small script.
Linux¶
You may thus launch the script:
/opt/wapt/waptserver/trigger_action.sh prefix-waptupgrade
Windows¶
You may thus launch the script:
"C:\wapt\waptserver\trigger_action.bat" prefix-waptupgrade