C2C WSGI Utils¶
c2cwsgiutils
is a framework assisting in development, integration and administration of WSGI applications.
c2cgeoportal
uses c2cwsgiutils
.
See its documentation.
The entry point URL is <application main URL>/c2c
, where you will have a dashboard with the
c2cwsgiutils
and c2cgeoportal
services.
The invalidate
view is protected with the same authentication, see below.
Authentication¶
To have basic authentication of those tools (and on tile generation) you can set
C2C_SECRET
in the env.project
file to have single password without brute force protection.
You can also activate the authentication on GitHub with OAuth2, the configuration is in the
env.project
file:
Verify that the
C2C_AUTH_GITHUB_REPOSITORY
is correctly configured to match the project repository name on GitHub.By default, the
C2C_AUTH_GITHUB_ACCESS_TYPE
is set to admin then only admins users of the previously defined repository have access, can bepull
,push
oradmin
.Define the
C2C_AUTH_GITHUB_SECRET
randomly.
For projects that create their GitHub applications:
Create an OAuth Apps on GitHub: GitHub organizations settings, on ‘Developer settings’, ‘OAuth Apps’, ‘New OAuth App`, fill the form, reopen the application, ‘Generate a new client secret’,
C2C_AUTH_GITHUB_CLIENT_ID
andC2C_AUTH_GITHUB_CLIENT_SECRET
should be configured with the obtain information.
For project hosted by Camptocamp, who use the standard Camptocamp GitHub application:
You should ask Camptocamp for a new secret and set it in
C2C_AUTH_GITHUB_CLIENT_SECRET
. It will be defined in the GitHub organizations settings, on ‘Developer settings’, ‘OAuth Apps’, ‘Geoservices` application, ‘Generate a new client secret’, the URL should also be configured in the redirect proxy.The
C2C_AUTH_GITHUB_PROXY_URL
should be uncommented.
For more information see C2C WSGI Utils Readme.