aPuppet is the open source engine providing remote access to Android-based devices for the purpose of technical support and maintenance. Devices are controlled from a web-based application.
The software consists of:
- Janus. Media server for screen sharing and gesture delivery
- nginx. Web server for hosting the web application
- certbot. Agent managing SSL certificates issued by LetsEncrypt
- web-admin. Web application for the remote control of mobile devices
This project is the server module. The source code of the mobile agent is available at https://github.com/h-mdm/apuppet-android and also on Google Play.
It is recommended to use a cloud instance or a dedicated server for the aPuppet hosting, so the software or port conflicts are avoided.
Minimal software requirements:
- 1xCPU
- 2GB RAM
- 5GB HDD
Other requirements:
- CPU architecture
x84_64
/amd64
- Ubuntu Linux, available options are:
- Ubuntu Focal
20.04 LTS
- Ubuntu Bionic
18.04 LTS
- Ubuntu Xenial
16.04 LTS
- Ubuntu Focal
bash
command interpreter
The software has been tested on the DigitalOcean hosting (minimal $5 Droplet). The following Ubuntu versions have been tested:
- Ubuntu Focal 20.04 LTS x64
- Ubuntu Bionic 18.04.3 LTS x64
- Ubuntu Xenial 16.04.6 LTS x64
The web application for remote control (web-admin) has been tested and found to be fully functional in the following browsers:
- Chrome 86+
- Firefox 83+
- Opera 72+
Update the system installation packages:
sudo apt update
Install git in case it's not installed yet:
sudo apt install -y git
Download the source code to the server via git
from the repository https://github.com/h-mdm/apuppet-server.
git clone https://github.com/h-mdm/apuppet-server.git
Notice: to get the source code of the premium version, contact the sales at https://apuppet.org.
Change the directory to the project directory:
cd apuppet-server
Edit the file config.yaml
and setup the domain name where aPuppet will be installed and the administrator's email:
---
hostname: "apuppet.my-company.org"
email: "administrator@my-company.org"
Important: aPuppet is designed to work on the dedicated domain. You can use either a domain like yourdomain.com
or a subdomain of any level. During the installation, the software checks the existence of the domain name entered in config.yaml
and verifies its ownership (otherwise the setup is aborted). Therefore, you need to create and setup a (sub)domain so it is resolved to an external IP address of your server.
sudo ./install.sh
After the successful run of this command, aPuppet will be configured, installed and started.
You can open the remote control web app (web-admin) using the URL apuppet.my-company.org/web-admin/
To control the mobile device remotely, you need to install the aPuppet application available on Google Play.
Notice: you can also get the mobile app source code at github and build your own version.
At first start, grant the required permissions.
- to simulate the user's gestures:
- to draw over other apps (so the mobile app could display a sharing indicator):
The app on Google play points to the public aPuppet server (srv.apuppet.org) by default. You can change the server URL and secret in the app settings:
If you build the mobile app from the source code, you can change the default server URL and secret to your own values in build.gradle
.
On the main screen of the application, you can see the server connection status and the remote access credentials: Session ID
and Password
:
Enter these credentials in the web-admin
application or just open the link provided by the mobile app. The mobile device will ask for the screen sharing permission. Grant this permission to start a remote support session:
To setup the HTTPS connection, aPuppet uses free certificates provided by LetsEncrypt. These certificates are supported by most OS and browsers.
Note that LetsEncrypt certifies only the domain name ownership and authenticity. It doesn't certify the data about your company. This fact may make LetsEncrypt not appropriate for work with sensitive data, for example in financial or medical areas.
In the Premium version, you can use any HTTPS certificate. Please fill in the contact form at https://apuppet.org for details and how to purchase a premium license.
In most cases, aPuppet can be updated by renewing the source codes and running ./install.sh
.
cd apuppet-server
git pull
sudo ./install.sh
This will update aPuppet to the latest version.
Here's what the script install.sh
does:
- checks the OS type and version. The aPuppet setup is aborted if the OS differs from Ubuntu LTS version 16.04, 18.04, 20.04.
- installs the required version of Ansible
- executes the Ansible playbook deploy/install.sh which installs aPuppet and required dependencies
- executes the Ansible playbook deploy/start.sh which configures and starts aPuppet
The script should be started with root privileged or via sudo:
sudo ./install.sh
Any changes in aPuppet configuration, templates or web-admin source code should be followed by running the install.sh script to reconfigure aPuppet, apply all changes and restart the service!
To run playbooks
, Ansible 2.9.x must be installed.
Ubuntu Focal (20.04 LTS) already has the required version in the repository. Older Ubuntu releases include a deprecated version of Ansible, so the required version is installed from the official PPA.
You can read more about the Ansible setup in the official Ansible documentation.
In the future, official PPA may change the latest version to 2.10.x or above. Since there is a substantial difference between version 2.10 and the required version 2.9.x, the installation may fail. If you will get any issues with the Ansible version, please contact the aPuppet development team at https://apuppet.org.
To deploy the system and run Ansible playbook, the following software is installed:
- System packages:
git
,apt-transport-https
,ca-certificates
,curl
,gnupg-agent
,software-properties-common
,python-pip
,python3
,python3-setuptools
,python3-pip
- Python 2 components:
dnspython
- Python 3 components:
docker
,docker-compose
,dnspython
aPuppet includes several configuration files:
config.yaml
. This is the primary aPuppet configuration. All changes must be done here.deploy/config.build.yaml
. This is the aPuppet build and deployment configuration. We don't recommend to change anything here because it may break the software compilation.deploy/config.defaults.yaml
. This is the default aPuppet configuration.
Here's the list of available configuration parameters and their default values:
hostname
. The domain used to accept remote control connections from mobile devicesemail
. Administrator's email used to generate a LetsEncrypt certificate and get notifications from LetsEncryptnat
. If aPuppet is installed behind NAT you should set this flag:nat: true
public_ip
. Public IP is used if aPuppet is behind NAT. By default, it is determined by resolving your hostname via DNS, and can be overridden in config.yaml- Janus
api_http: true
. Allows REST API over the non-encrypted HTTP protocol. Since Nginx proxy uses HTTP, it is recommended to set it to trueapi_http_port: 8088
. HTTP port for REST APIapi_https: true
. Allows REST API on encrypted HTTPS protocolapi_https_port: 8089
. HTTPS port for REST APIadmin_api_https: false
. Enables Admin REST API over the HTTPS protocol. Since the admin API is not used, it is not recommended to turn on this setting.admin_api_https_port: 7889
. HTTPS port for Admin REST APIapi_wss: true
. Enables Websockets API over HTTPS (WSS). This is a recommended and most effective method of interaction between the server and the web admin applicationapi_wss_port: 8989
. HTTPS port for Websockets API
- Nginx
is_nginx_enabled: true
. Enables nginx. If nginx is disabled, you need to place theweb-admin
module (deploy/dist/web-admin/
folder) on your web serverweb_http_port: 80
. HTTP portweb_https_port: 443
. HTTPS port
- RTP
rtp_port_range: 10000-10500
. Range of UDP ports used for casting the mobile device screen
- SSL and Certbot
is_certbot_enabled: true
. Enables Certbot. If you're not using a custom SSL certificate, it is recommended to enable Certbot, otherwise the connection will not be encryptedshare_email: true
. Provides your email to EFF (Electronic Frontier Foundation), the Certbot developer company
aPuppet uses the following incoming ports which should be allowed on your firewall or forwarded via NAT:
- 80/TCP - used only by certbot to renew certificates
- 443/TCP - used by nginx to display the web UI
- 8989/TCP - WSS protocol used by WebRTC to play the video
- 8089/TCP - used by the web application to communicate with Janus server (REST API)
- 10000-10500/UDP - a set of UDP ports for the RTP screencast (the port is chosen dynamically by Janus).
Notice: aPuppet requires enabling all incoming and outgoing UDP traffic, especially if you're behind a NAT.
You can install aPuppet with different options.
Installation of all components, generation and renewal an SSL certificate required for aPuppet proper work.
This is the default option. Set the parameters is_certbot_enabled
and is_nginx_enabled
(or comment them) in the main configuration file config.yaml
.
If you have your own SSL certificate, you can use it in aPuppet premium (contact the sales team on https://apuppet.org for details).
To setup this option, turn off certbot in the configuration file config.yaml
:
is_certbot_enabled: false
In this option, only media server is installed. This option can be used if you already have a website where the aPuppet web application should be embedded.
To implement this option, turn off certbot and nginx in config.yaml
:
is_certbot_enabled: false
is_nginx_enabled: false
Before executing commands, change the directory to the one where aPuppet is installed:
cd ~/apuppet-server
The system is based on docker-compose
, therefore you need to use docker-compose commands to start, restart, stop, and other aPuppet management actions.
View the running services and their states:
docker-compose ps
Start services (a recommended method):
docker-compose up --detach
You can also start the software in a foreground mode (in the console). In this mode, the software can be stopped by pressing Ctrl+C
. We DO NOT recommend this mode on a production server.
docker-compose up
Restart services:
docker-compose restart
Stop:
docker-compose stop
Stop and removal all containsers, networks images:
docker-compose down
More information about docker-compose commands and their parameters can be found in the official docker-compose documentation.
To disable unauthorized access to your server, two secret codes are generated during the installation:
janus_api_secret
. This is a secret code to call API methods by a mobile application. This secret is stored in./dist/credentials/janus_api_secret
janus_admin_api_secret
. A secret code to call Admin API methods. This secret is stored in./dist/credentials/janus_admin_api_secret
janus_api_secret
is required for both the web and mobile applications. It is automatically saved in the web application configuration and is displayed on the screen when aPuppet is started.
You need to enter this API secret together with the server URL in the configuration of a mobile application. If you build your own version of the mobile app, you can change the default values in build.gradle
.
The aPuppet logs are written by using a standard docker logging.
Default setup:
- driver:
json-file
- compression: on
- rotation parameters:
- maximum file size: 20 Mb
- amount of files: 5
Logs are stored in the docker's system folders, the path to logs is /var/lib/docker/containers/<container_id>/
.
A fine tuning of logging through Ansible's yaml files is not implemented. If you need to change the default logging setup, you can do it in the docker-compose.yaml configuration file: ./dist/templates/docker-compose/docker-compose.yaml.j2
. Each service uses a logging section with its own logging parameters.
Read more about docker logging in the official docker logging documentation.
To view aPuppet logs, use standard docker-compose commands.
View all logs:
docker-compose logs
View logs of certain services:
docker-compose logs janus
docker-compose logs nginx certbot
You can limit the output to last N lines by the --tail
parameter:
docker-compose logs --tail=100
To follow log messages in realtime, use the parameter --follow
or -f
:
docker-compose logs --tail=100 --follow
You can combine multiple parameters if required:
docker-compose logs --tail 100 --follow certbot
docker-compose logs --tail=100 -f janus nginx
Read more about logging in docker and docker-compose.
This is a web application for the remote access to the mobile device through a web browser. The app is written in HTML, CSS, and Javascript (WebRTC library is used for displaying the screencast and transferring gestures to a mobile device).
The source code of the web application is stored in the folder web-admin/
. During the deployment, it is compiled by using gulp: CSS and JS are minified and concatenated. The production files are stored in the folder deploy/dist/web-admin
. In the same folder, a configuration file settings.js
is stored, which contains the aPuppet settings (paths, ports, secrets).
If you need to modify the source code of the web admin application, modify the web-admin
folder and run the following command to apply your changes:
ansible-playbook deploy/pre_webadmin.yaml
Notice: ./install.sh
will also apply changes but it is executed much slower.