Skip to content

Latest commit

 

History

History
56 lines (42 loc) · 3.9 KB

README.md

File metadata and controls

56 lines (42 loc) · 3.9 KB

CITE Collection Manager

Overview

This is a server-side Groovlet for proxying instances of the CITE Collection Editor. It will store an administrator's authorization credentials and proxy Google Fusion Tables requests on behalf of end-users who don't have direct access to the fusion tables themselves.

Configuration

  • Get a Google Fusion Tables API key, following the instructions in the CITE Collection Editor README
  • On the Google API Access page, click the "Download JSON" link for the Client ID
  • Copy the resulting client_secrets.json file to src/main/resources/client_secrets.json
  • Copy a built instance of the CITE Collection Editor (i.e. the build/ directory) to src/main/webapp/cite-collection-editor (this should eventually be rolled into a Gradle dependency)
  • Create an authorization table in Google Fusion Tables. This is a table with three text columns named E-Mail, Name, and Blocked
  • Copy gradle.properties-dist to gradle.properties, modifying the values to your email address, capabilities URL, and authorization table ID. Set the validTables parameter if you want to restrict proxied access to a set of tables. The "Administrator" email address must have "edit" permissions on the authorization Fusion Table and all Fusion Tables you wish to proxy. When not running on App Engine, setting a path (e.g. /tmp/cite-collection-manager) for fileCredentialStore will use a file-backed credential store for the offline credential, instead of a memory-backed store, which should allow the credential to persist between multiple runs of the server.
  • Run gradle jettyRunWar

Deploying on Google App Engine

Unlike the CITE Collection Editor, the CITE Collection Manager requires some server-side resources and processing. This can typically be managed within the free quotas of Google's App Engine platform if you don't want to manage a server yourself. The CITE Collection Manager also has code specifically for persisting credentials within the the App Engine environment.

  • First, follow the general configuration steps above

  • Create an application at http://appengine.google.com/

  • Copy appengine-web.example.xml to src/main/webapp/WEB-INF/appengine-web.xml, editing the <application> tag with the name of your App Engine application

  • Add the following to "Redirect URIs" for your Google API Credentials:

      http://myapp.appspot.com/oauth2callback
      http://myapp.appspot.com/editor
      https://myapp.appspot.com/oauth2callback
      https://myapp.appspot.com/editor
    
  • Add the following to "JavaScript Origins" for your Google API Credentials:

      http://myapp.appspot.com/
      https://myapp.appspot.com/
    

Deploying with the Google App Engine SDK for Java

Deploying with the Google App Engine Gradle Plugin

  • Download/install the Google Cloud SDK, then do the following one-time setup:
    • gcloud components install app-engine-java
    • gcloud config set project myapp where myapp is replaced with what you'll use for e.g. myapp.appspot.com
    • gcloud auth login
  • Deploy with gradle appengineDeploy