GitLab
Supported on Sourcegraph Free and Enterprise plans.
Site admins can sync Git repositories hosted on GitLab (GitLab.com and GitLab CE/EE) with Sourcegraph so that users can search and navigate the repositories.
To connect GitLab to Sourcegraph:
- Go to Site admin > Manage code hosts > Add code host
- Select GitLab (for GitLab.com) or GitLab Self-Managed.
- Set url to the URL of your GitLab instance, such as https://gitlab.example.com or https://gitlab.com (for GitLab.com).
- Create a GitLab access token using these instructions with the
read_api
andread_repository
scopes, and set it to be the value of the token. - Use the Repository syncing documentation below to select and add your preferred projects/repos to the configuration.
- You can use the action buttons above the text field to add the fields, and additional fields can be added using
Cmd/Ctrl+Space
for auto-completion. See the configuration documentation below for additional fields. - Click Add repositories.
Example config:
SHELL{ "url": "https://gitlab.com", "token": "<access token>", "projectQuery": [ "groups/mygroup/projects", "projects?membership=true&archived=no", "?search=<search query>", "?membership=true\u0026search=foo" ], "projects": [ { "name": "group/name" }, { "id": 42 } ] }
Supported versions
- GitLab.com
- GitLab CE/EE (v12.0 and newer)
Repository syncing
There are three fields for configuring which projects are mirrored/synchronized:
projects
: A list of projects in{"name": "group/name"}
or{"id": id}
format. The order determines the order in which we sync project metadata and is safe to change.projectQuery
: A list of strings. Accepted values include:- The special value
none
, which will sync no repositories. - Query parameters for the GitLab Projects API endpoint. For example,
?archived=false
. - A path and set of query parameters for any GitLab API endpoint that returns a list of repos. For example,
groups/mygroup/projects?visibility=public
.
- The special value
exclude
: A list of projects to exclude which takes precedence over theprojects
, andprojectQuery
fields. It has the same format asprojects
.
Troubleshooting
You can test your access token's permissions by running a cURL command against the GitLab API. This is the same API and the same project list used by Sourcegraph.
Replace $ACCESS_TOKEN
with the access token you are providing to Sourcegraph, and $GITLAB_HOSTNAME
with your GitLab hostname:
SHELLcurl -H 'Private-Token: $ACCESS_TOKEN' -XGET 'https://$GITLAB_HOSTNAME/api/v4/projects'
Repository permissions
GitLab permissions can be configured in three ways:
- Set up GitLab as an OAuth sign-on provider for Sourcegraph (recommended)
- Use a GitLab administrator (sudo-level) personal access token in conjunction with another SSO provider (recommended only if the first option is not possible)
- Assume username equivalency between Sourcegraph and GitLab (warning: this is generally unsafe and
should only be used if you are using strictly
http-header
authentication).
NOTE: It can take some time to complete full cycle of repository permissions sync if you have a large number of users or repositories. See sync duration time for more information.
OAuth application
Prerequisite: Add GitLab as an authentication provider.
Then, add or edit a GitLab connection and include the authorization
field:
JSON{ "url": "https://gitlab.com", "token": "$PERSONAL_ACCESS_TOKEN", // ... "authorization": { "identityProvider": { "type": "oauth" } } }
In this case, a user's OAuth token will be used to get a list of repositories that the user can access. Repository-centric permissions syncing will be disabled.
Administrator (sudo-level) access token
This method requires administrator access to GitLab so that Sourcegraph can access the admin GitLab Users API endpoint. For each GitLab user, this endpoint provides the user ID that comes from the authentication provider, so Sourcegraph can associate a user in its system to a user in GitLab.
Prerequisite: Add the SAML or OpenID Connect authentication provider you use to sign into GitLab.
Then, add or edit a GitLab connection using an administrator (sudo-level) personal access token, and include the authorization
field:
JSON{ "url": "https://gitlab.com", "token": "$PERSONAL_ACCESS_TOKEN", // ... "authorization": { "identityProvider": { "type": "external", "authProviderID": "$AUTH_PROVIDER_ID", "authProviderType": "$AUTH_PROVIDER_TYPE", "gitlabProvider": "$AUTH_PROVIDER_GITLAB_ID" } } }
$AUTH_PROVIDER_ID
and $AUTH_PROVIDER_TYPE
identify the authentication provider to use and should
match the fields specified in the authentication provider config
(auth.providers
). The authProviderID can be found in the configID
field of the auth provider config.
$AUTH_PROVIDER_GITLAB_ID
should match the identities.provider
returned by
the admin GitLab Users API endpoint.
Username
Prerequisite: Ensure that http-header
is the only authentication provider type configured for
Sourcegraph. If this is not the case, then it will be possible for users to escalate privileges,
because Sourcegraph usernames are mutable.
Add or edit a GitLab connection and include the authorization
field:
JSON{ "url": "https://gitlab.com", "token": "$PERSONAL_ACCESS_TOKEN", // ... "authorization": { "identityProvider": { "type": "username" } } }
User authentication
To configure GitLab as an authentication provider (which will enable sign-in via GitLab), see the authentication documentation.
Internal repositories
GitLab also has internal repositories in addition to the usual public and private repositories. Depending on how your organization structure is configured, you may want to make these internal repositories available to everyone on your Sourcegraph instance without relying on permission syncs. To mark all internal repositories as public, add the following field to the code host connection:
JSON{ // ... "markInternalReposAsPublic": true }
When adding this configuration option, you may also want to configure your GitLab auth provider so that it does not sync user permissions for internal repositories.
Rate limits
Always include a token in a configuration for a GitLab.com URL to avoid being denied service by GitLab's unauthenticated rate limits.
When Sourcegraph hits a rate limit imposed by GitLab, Sourcegraph waits the appropriate amount of time specified by GitLab before retrying the request. This can be several minutes in extreme cases.
Internal rate limits
See Internal rate limits.
Configuration
admin/code_hosts/gitlab.schema.json
JSON{ "authorization": { "identityProvider": { "type": null } }, "certificate": null, "exclude": null, "gitSSHCipher": null, "gitSSHCredential": null, "gitURLType": "http", "initialRepositoryEnablement": false, "markInternalReposAsPublic": false, "maxDeletions": 0, "nameTransformations": null, "projectQuery": [ "none" ], "projects": null, "rateLimit": { "enabled": true, "requestsPerHour": 36000 }, "repositoryPathPattern": "{host}/{pathWithNamespace}", "token": null, "token.oauth.expiry": 0, "token.oauth.refresh": null, "token.type": "pat", "url": null, "webhooks": null }
Configuration Notes
GitLab connections provide flexible configuration options for different deployment scenarios:
- Project Selection: Use
projects
for specific repositories,projectQuery
for API-based filtering, andexclude
for fine-grained exclusions - API Queries: The
projectQuery
field supports GitLab API parameters like?membership=true&archived=false
and group paths likegroups/mygroup/projects
- Path Patterns: The
repositoryPathPattern
field controls repository naming in Sourcegraph - ensure uniqueness across code hosts - Internal Repositories: GitLab's internal repository visibility can be handled via
markInternalReposAsPublic
for easier access
Rate Limiting Configuration
GitLab connections include rate limiting to manage API usage:
- Default: 36,000 requests per hour with rate limiting enabled
- GitLab.com enforces stricter rate limits for unauthenticated requests
- Self-managed instances may have different limits based on configuration
Token Configuration
The token
field supports different token types:
- Personal Access Token (PAT): Recommended for most use cases with
api
andread_repository
scopes - OAuth Token: Used with OAuth authentication flows, includes refresh token support
- Project Access Token: GitLab 13.10+ feature for project-specific access
Security Considerations
Token Security and Scoping
Personal Access Tokens: Grant broad access equivalent to the user's permissions:
- Use dedicated service accounts rather than personal tokens when possible
- Required scopes:
api
for repository discovery,read_repository
for cloning - Add
sudo
scope only when using external identity providers for permission syncing - Regularly rotate tokens and audit their usage
OAuth Tokens: Provide more secure, time-limited access:
- Tokens automatically refresh when expired
- Support for fine-grained permissions
- Better audit trail through OAuth application logs
Certificate Validation
For self-managed GitLab instances with custom certificates:
- Use the
certificate
field to specify custom CA certificates - Obtain certificates using:
openssl s_client -connect HOST:443 -showcerts
- Ensure certificate chain is complete for proper validation
Repository Permissions
GitLab permission syncing has specific security requirements:
- OAuth Method: Most secure, uses user's OAuth token for permission checks
- External Identity: Requires admin token with
sudo
scope, matches users via external auth providers - Username Method: Least secure, assumes username equivalency - only use with
http-header
auth
Internal Repository Access
GitLab's internal repositories require careful configuration:
- Setting
markInternalReposAsPublic: true
makes internal repos visible to all Sourcegraph users - Consider organizational policies before enabling this setting
- Alternative: Use proper permission syncing to maintain GitLab's access controls
Common Examples
Basic Project Sync
JSON{ "url": "https://gitlab.com", "token": "glpat-xxxxxxxxxxxxxxxxxxxx", "projects": [ {"name": "gitlab-org/gitlab"}, {"name": "my-group/my-project"} ] }
Organization-wide Sync with Exclusions
JSON{ "url": "https://gitlab.example.com", "token": "glpat-xxxxxxxxxxxxxxxxxxxx", "projectQuery": [ "groups/engineering/projects?archived=false", "?membership=true&visibility=private" ], "exclude": [ {"name": "engineering/deprecated-project"}, {"pattern": "^experimental/.*"} ] }
Self-managed GitLab with Authorization
JSON{ "url": "https://gitlab.company.com", "token": "glpat-xxxxxxxxxxxxxxxxxxxx", "projectQuery": ["?membership=true"], "authorization": { "identityProvider": { "type": "oauth" } }, "certificate": "-----BEGIN CERTIFICATE-----\n..." }
Advanced Query with Custom Path Pattern
JSON{ "url": "https://gitlab.com", "token": "glpat-xxxxxxxxxxxxxxxxxxxx", "projectQuery": [ "groups/kubernetes/projects?visibility=public&order_by=last_activity_at", "?search=docker&sort=desc" ], "repositoryPathPattern": "gitlab/{pathWithNamespace}", "markInternalReposAsPublic": true }
High-volume Configuration
JSON{ "url": "https://gitlab.enterprise.com", "token": "glpat-xxxxxxxxxxxxxxxxxxxx", "projectQuery": ["groups/bigorg/projects"], "rateLimit": { "enabled": true, "requestsPerHour": 20000 }, "exclude": [ {"emptyRepos": true} ] }
Best Practices
Token Management
- Use dedicated service accounts instead of personal tokens for production deployments
- Implement token rotation policies to regularly refresh access tokens
- Audit token permissions regularly to ensure least-privilege access
- Use OAuth tokens when possible for better security and automatic refresh
Repository Organization
- Use consistent naming patterns with
repositoryPathPattern
to maintain organization - Leverage project queries for dynamic repository discovery rather than static lists
- Implement exclusion patterns to filter out unwanted repositories (archived, empty, experimental)
- Group related projects using GitLab groups and subgroups for better organization
Performance Optimization
- Configure appropriate rate limits based on your GitLab instance's capacity
- Use specific project queries rather than broad searches to reduce API calls
- Monitor API usage to avoid hitting GitLab's rate limits
- Enable proper caching by configuring reasonable sync intervals
Permission Management
- Choose the right permission method for your authentication setup
- Test permission syncing thoroughly before deploying to production
- Use OAuth authentication when possible for better security and user experience
- Regularly audit repository access to ensure permissions remain appropriate
Maintenance
- Monitor connection health through the site admin interface
- Keep certificates updated for self-managed GitLab instances
- Review and update project queries as your repository landscape changes
- Test configuration changes in a staging environment when possible
Access token scopes
Sourcegraph requires an access token with api
permissions (and sudo
, if you are using an external
identity provider type). These permissions are required for the following reasons:
We are actively collaborating with GitLab to improve our integration (e.g. the Sourcegraph GitLab native integration and better APIs for querying repository permissions).
Request Type | Required GitLab scope | Sourcegraph usage |
---|---|---|
GET /projects | api or read_api | (1) For repository discovery when specifying projectQuery in code host configuration; (2) If using an external identity provider type, also used as a test query to ensure token is sudo (sudo not required otherwise). |
GET /users | read_user , api or read_api | If you are using an external identity provider type, used to discover user accounts. |
GET /users/:id | read_user , api or read_api | If using GitLab OAuth, used to fetch user metadata during the OAuth sign in process. |
GET /projects/:id | api or read_api | (1) If using GitLab OAuth and repository permissions, used to determine if a user has access to a given project; (2) Used to query repository metadata (e.g. description) for display on Sourcegraph. |
GET /projects/:id/repository/tree | api or read_api | If using GitLab OAuth and repository permissions, used to verify a given user has access to the file contents of a repository within a project (i.e. does not merely have Guest permissions). |
Batch Changes requests | api or read_api , read_repository , write_repository | Batch Changes require write access to push commits and create, update and close merge requests on GitLab repositories. See "Code host interactions in batch changes" for details. |
Webhooks
Using the webhooks
property on the external service has been deprecated.
Please consult this page in order to configure webhooks.