Skip to content
This repository has been archived by the owner on Sep 16, 2022. It is now read-only.

Latest commit

 

History

History
85 lines (59 loc) · 2.66 KB

alternative_installation_methods.md

File metadata and controls

85 lines (59 loc) · 2.66 KB

Installation: Snap runtime

Get it from the Snap Store

Installing

$ sudo snap install wott-agent

Because the Snap version of the agent does not allow you to pass on a claim token, we need to manually pair the node. You can do this by running:

$ sudo wott-agent whoami
$ sudo wott-agent claim-token

You now need to enter the above information on the Claim Device page to associate your device with the dashboard.

You also need to grant the agent "unsafe" interfaces needed by this snap are not auto-connected (may change in the future). To do this, run:

$ sudo snap connect wott-agent:network-control :network-control
$ sudo snap connect wott-agent:network-setup-control :network-setup-control
$ sudo snap connect wott-agent:process-control :process-control
$ sudo snap connect wott-agent:system-observe :system-observe
$ sudo snap connect wott-agent:firewall-control :firewall-control
$ sudo snap connect wott-agent:account-control :account-control
$ sudo snap connect wott-agent:log-observe :log-observe
$ sudo snap connect wott-agent:hardware-observe :hardware-observe

Installation: Docker runtime

Pre-requisites

Building

To build the docker container, simply run:

$ mkdir -p ~/src
$ cd ~/src
$ git clone https://github.com/WoTTsecurity/agent.git
$ cd agent
$ docker network create wott
$ ./bin/run.sh

You can now find out the device's WoTT ID by running:

$ docker logs wott-agent | grep wott
Got WoTT ID: x.d.wott.local

Note on the build process

The build process is utilizing multi-stage docker build to make sure we don't need to include all tools in the runtime environment. For more information, see the Dockerfile.

Installation: Python runtime (advanced)

It is possible to run the WoTT agent without Docker. To do this on a Raspbian Stretch device, run the following command:

$ git clone https://github.com/WoTTsecurity/agent.git
$ cd agent
$ sudo apt-get install -y python3 python3-pip python3-venv nmap
$ python3 -m venv ~/.wott-venv
$ source ~/.wott-venv/bin/activate
$ pip install -r requirements.txt
$ python setup.py install

You now have all the dependencies installed (with the exception of ghostunnel, which is used for end-to-end tunnels).

To start the agent, you just need to run:

$ sudo ~/.wott-venv/bin/python .wott-venv/bin/wott-agent