a6486b7823
Gitlab config validator currently requires the gitlab endpoint to be specified, even though we support leaving it unspecified for non-enterprise installs. Fix the validator to allow this case.
30 lines
1.2 KiB
Python
30 lines
1.2 KiB
Python
from app import app
|
|
from oauth.services.gitlab import GitLabOAuthService
|
|
from util.config.validators import BaseValidator, ConfigValidationException
|
|
|
|
class GitLabTriggerValidator(BaseValidator):
|
|
name = "gitlab-trigger"
|
|
|
|
@classmethod
|
|
def validate(cls, config, user, user_password):
|
|
""" Validates the OAuth credentials and API endpoint for a GitLab service. """
|
|
github_config = config.get('GITLAB_TRIGGER_CONFIG')
|
|
if not github_config:
|
|
raise ConfigValidationException('Missing GitLab client id and client secret')
|
|
|
|
endpoint = github_config.get('GITLAB_ENDPOINT')
|
|
if endpoint:
|
|
if endpoint.find('http://') != 0 and endpoint.find('https://') != 0:
|
|
raise ConfigValidationException('GitLab Endpoint must start with http:// or https://')
|
|
|
|
if not github_config.get('CLIENT_ID'):
|
|
raise ConfigValidationException('Missing Client ID')
|
|
|
|
if not github_config.get('CLIENT_SECRET'):
|
|
raise ConfigValidationException('Missing Client Secret')
|
|
|
|
client = app.config['HTTPCLIENT']
|
|
oauth = GitLabOAuthService(config, 'GITLAB_TRIGGER_CONFIG')
|
|
result = oauth.validate_client_id_and_secret(client, app.config)
|
|
if not result:
|
|
raise ConfigValidationException('Invalid client id or client secret')
|