C2C WSGI Utils¶
c2cwsgiutils is a framework assisting in development, integration and administration of WSGI applications.
c2cgeoportal uses c2cwsgiutils.
See its documentation.
The entry point URL is <application main URL>/c2c, where you will have a dashboard with the
c2cwsgiutils and c2cgeoportal services.
The invalidate view is protected with the same authentication, see below.
Authentication¶
To have basic authentication of those tools (and on tile generation) you can set
C2C_SECRET in the env.project file to have single password without brute force protection.
You can also activate the authentication on GitHub with OAuth2, the configuration is in the
env.project file:
- Verify that the - C2C_AUTH_GITHUB_REPOSITORYis correctly configured to match the project repository name on GitHub.
- By default, the - C2C_AUTH_GITHUB_ACCESS_TYPEis set to admin then only admins users of the previously defined repository have access, can be- pull,- pushor- admin.
- Define the - C2C_AUTH_GITHUB_SECRETrandomly.
For projects that create their GitHub applications:
- Create an OAuth Apps on GitHub: GitHub organizations settings, on ‘Developer settings’, ‘OAuth Apps’, ‘New OAuth App`, fill the form, reopen the application, ‘Generate a new client secret’, - C2C_AUTH_GITHUB_CLIENT_IDand- C2C_AUTH_GITHUB_CLIENT_SECRETshould be configured with the obtain information.
For project hosted by Camptocamp, who use the standard Camptocamp GitHub application:
- You should ask Camptocamp for a new secret and set it in - C2C_AUTH_GITHUB_CLIENT_SECRET. It will be defined in the GitHub organizations settings, on ‘Developer settings’, ‘OAuth Apps’, ‘Geoservices` application, ‘Generate a new client secret’, the URL should also be configured in the redirect proxy.
- The - C2C_AUTH_GITHUB_PROXY_URLshould be uncommented.
For more information see C2C WSGI Utils Readme.
