-
Notifications
You must be signed in to change notification settings - Fork 235
docs: add self-hosted GitLab OAuth setup guide #5702
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
+110
−1
Merged
Changes from all commits
Commits
Show all changes
15 commits
Select commit
Hold shift + click to select a range
be40734
Add self-hosted GitLab OAuth documentation
mintlify[bot] 509dcd1
Fix punctuation in GitLab self-hosted docs
mintlify[bot] 4d26e72
Clarify GitLab self-hosted OAuth vs. deploy token
mintlify[bot] 454ec5f
Remove outdated GitLab self-hosted troubleshooting
mintlify[bot] 7f565c4
Update deploy/gitlab-self-hosted.mdx
H2Shami 29fde64
Update deploy/gitlab-self-hosted.mdx
H2Shami 9cf2e14
Update deploy/gitlab-self-hosted.mdx
H2Shami f08d411
Update deploy/gitlab-self-hosted.mdx
H2Shami 472d613
Update deploy/gitlab-self-hosted.mdx
H2Shami f5c15ec
Update deploy/gitlab-self-hosted.mdx
H2Shami 6a8390a
Update deploy/gitlab-self-hosted.mdx
H2Shami 0c1e100
Update deploy/gitlab-self-hosted.mdx
H2Shami 516d149
Update deploy/gitlab-self-hosted.mdx
H2Shami ac74f10
Update deploy/gitlab-self-hosted.mdx
H2Shami 1f62f6f
Update deploy/gitlab-self-hosted.mdx
H2Shami File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -0,0 +1,108 @@ | ||||||
| --- | ||||||
| title: "Self-hosted GitLab OAuth" | ||||||
| description: "Connect a self-hosted GitLab instance to Mintlify via OAuth so workflows can clone repositories, push commits, and open merge requests on your behalf." | ||||||
| keywords: ["GitLab", "self-hosted", "OAuth", "workflows", "enterprise"] | ||||||
| --- | ||||||
|
|
||||||
| Mintlify supports OAuth-based authorization for self-hosted GitLab instances, in addition to gitlab.com. OAuth lets the Mintlify agent act as a GitLab user during workflow runs: cloning repositories, pushing commits, opening merge requests, and registering project webhooks. | ||||||
|
|
||||||
| You must configure OAuth authorization for self-hosted GitLab instances to support [workflows](/workflows). | ||||||
|
|
||||||
| Unlike gitlab.com, where Mintlify ships a single OAuth application that every customer authorizes against, each self-hosted instance must register its own OAuth application. Create the application on your GitLab instance, share its credentials with Mintlify, and then go through an OAuth authorization to connect a user. | ||||||
|
|
||||||
| <Note> | ||||||
| This guide is only for the **OAuth** integration that powers workflows. You must configure the deployment-side connection (used for content sync and previews) separately with a deploy token, see the [GitLab guide](/deploy/gitlab). The OAuth integration depends on the deployment-side connection. | ||||||
| </Note> | ||||||
|
|
||||||
| ## Prerequisites | ||||||
|
|
||||||
| - Admin access to your self-hosted GitLab instance. | ||||||
| - Your GitLab instance must be reachable from `https://dashboard.mintlify.com`. Instances behind a VPN or behind a firewall that blocks public ingress do not work. | ||||||
| - A Mintlify organization that has the self-hosted GitLab feature enabled. Contact support if you don't see the **Self-hosted GitLab** section in your [Git settings](https://dashboard.mintlify.com/settings/deployment/git-settings) dashboard page. | ||||||
|
|
||||||
| ## Set up the connection | ||||||
|
|
||||||
| <Steps> | ||||||
| <Step title="Register an OAuth application on your GitLab instance"> | ||||||
| In your self-hosted GitLab, sign in as an admin and navigate to **Admin Area** \> **Applications** \> **Add new application**. | ||||||
|
|
||||||
| Configure the application with these values: | ||||||
|
|
||||||
| - **Name**: `Mintlify` | ||||||
| - **Redirect URI**: `https://dashboard.mintlify.com/api/gitlab-oauth/callback` | ||||||
| - **Trusted**: leave **unchecked**. Trusting the application skips the consent screen for every user; leaving it unchecked surfaces a normal authorization prompt the first time each user connects. | ||||||
| - **Confidential**: **checked**. Mintlify is a server-side client and keeps the secret confidential. | ||||||
| - **Scopes**: select `api`, `read_repository`, and `write_repository`. The agent uses these to read project metadata, clone repositories, and push commits. | ||||||
|
|
||||||
| Click **Save application**. | ||||||
|
|
||||||
| <Tip> | ||||||
| Editing an OAuth application on GitLab can rotate the client secret silently. If you make changes later, click **Renew secret** and update the new value in Mintlify. | ||||||
| </Tip> | ||||||
| </Step> | ||||||
| <Step title="Copy the application credentials"> | ||||||
| After saving, GitLab displays the application's **Application ID** and **Secret**. Keep this page open—the secret is only shown once. | ||||||
| </Step> | ||||||
| <Step title="Register the instance in Mintlify"> | ||||||
| In your Mintlify dashboard, open **Settings** \> **Git settings** and find the **Self-hosted GitLab** section under **GitLab OAuth**. | ||||||
|
|
||||||
| Click **Connect Self-Hosted GitLab** and enter: | ||||||
|
|
||||||
| - **GitLab instance URL**: the public URL of your GitLab instance, for example `https://gitlab.your-company.com`. Mintlify reaches your instance through this URL when exchanging tokens and calling the GitLab API. | ||||||
| - **OAuth application client ID**: the **Application ID** from the previous step. | ||||||
| - **OAuth application client secret**: the **Secret** from the previous step. | ||||||
|
|
||||||
| Click **Save instance**. Mintlify encrypts the secret at rest and never returns it to the browser after saving. | ||||||
| </Step> | ||||||
| <Step title="Authorize"> | ||||||
| Click **Authorize self-hosted GitLab**. You'll be redirected to your GitLab instance, prompted to sign in if needed, and shown a consent screen listing the requested scopes. | ||||||
|
|
||||||
| After you click **Authorize** on GitLab, you'll be redirected back to Mintlify and the new connection appears in the installations list, badged with your instance hostname. | ||||||
|
Collaborator
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||
| </Step> | ||||||
| <Step title="Choose projects"> | ||||||
| Expand the connection in the dashboard. Mintlify lists every group your authorizing user has Maintainer or higher access to, plus a **Personal projects** entry for projects in the user's personal namespace. | ||||||
|
|
||||||
| Check the box next to each project that should participate in workflows. Mintlify registers a webhook on the project, generates a secret token, and stores it encrypted. From then on, Mintlify receives push and merge-request events from your instance for that project. | ||||||
|
|
||||||
| <Note> | ||||||
| The connecting user must have **Maintainer** role on a project for Mintlify to mint short-lived project access tokens during workflow runs. Without Maintainer, the agent can read but cannot push commits or open merge requests. | ||||||
| </Note> | ||||||
| </Step> | ||||||
| </Steps> | ||||||
|
|
||||||
| ## Rotate credentials | ||||||
|
|
||||||
| If you need to change the registered application's client secret—for example after renewing it on GitLab—remove the saved instance in Mintlify and add it again with the new values. You must revoke active OAuth connections first; otherwise Mintlify blocks the removal. | ||||||
|
|
||||||
| <Steps> | ||||||
| <Step title="Revoke each connection"> | ||||||
| Click **Revoke** on every installation listed under the self-hosted instance. This removes the webhook on every connected project and revokes the OAuth token on GitLab. | ||||||
| </Step> | ||||||
| <Step title="Remove the instance"> | ||||||
| In the **Self-hosted GitLab** card, click **Remove instance**. | ||||||
| </Step> | ||||||
| <Step title="Re-add with new credentials"> | ||||||
| Follow the **Set up the connection** steps described earlier with the new client secret. | ||||||
| </Step> | ||||||
| </Steps> | ||||||
|
|
||||||
| ## Troubleshooting | ||||||
|
|
||||||
| ### `invalid_client` after authorizing | ||||||
|
|
||||||
| GitLab rejected the token-exchange step because the client secret Mintlify sent doesn't match what's registered on the application. The most common cause is that a secret rotated on GitLab—by an explicit **Renew secret**, or silently when someone edited the application—and the value in Mintlify is stale. | ||||||
|
|
||||||
| Fix: rotate credentials following the [Rotate credentials](#rotate-credentials) steps with the current secret. | ||||||
|
|
||||||
| ### Webhook registration failed: `Invalid url given` | ||||||
|
|
||||||
| GitLab refused to register the webhook because the URL Mintlify sent (`https://dashboard.mintlify.com/gitlab-oauth-webhook`) was rejected by GitLab's outbound-request allowlist. Self-hosted instances reject "local" URLs unless the admin explicitly allows them. | ||||||
|
|
||||||
| Fix: in your GitLab admin area, go to **Settings** \> **Network** \> **Outbound requests** and enable **Allow requests to the local network from webhooks and integrations**. If your network policy blocks `dashboard.mintlify.com`, contact your network admin to allow outbound HTTPS to that host. | ||||||
|
|
||||||
| ### No consent screen on authorize | ||||||
|
|
||||||
| If you don't see GitLab's consent dialog when authorizing, either: | ||||||
|
|
||||||
| - The application is marked **Trusted** on GitLab. Trusted applications skip consent for all users. Uncheck **Trusted** in the application settings if you want users to see and confirm scopes. | ||||||
|
Check warning on line 107 in deploy/gitlab-self-hosted.mdx
|
||||||
| - Your GitLab user has previously authorized the application with the same scopes. GitLab remembers prior grants and skips consent on subsequent authorizes. Revoke the application authorization in **User settings** \> **Applications** \> **Authorized applications** to see consent again. | ||||||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.