Documentation

GitLab (Cloud)

Configure GitLab OAuth and webhook settings.

GitLab onboarding uses OAuth to authorize access to groups or projects.

Create the GitLab OAuth application

  1. Create an OAuth application:
    • User scope: Profile → Preferences → Applications
    • Group scope: Group → Settings → Applications
  2. Set the Redirect URI to {{endpoint}}/auth/gitlab/callback. The Redirect base URL is where users land after successful authorization (typically your tenant app URL).
  3. Select scopes:
    • read_api
    • read_repository
  4. Save and copy the Application ID and Secret.

Register the provider in Relaymesh (SaaS UI)

  1. Open Providers in the Relaymesh dashboard.
  2. Click Add provider → GitLab.
  3. Paste Client ID, Client Secret, and your Webhook secret.
  4. Save to generate the onboarding URL.

Register via CLI

relaymesh --endpoint https://api.your-domain.com providers create --provider gitlab --config-file gitlab.yaml
webhook:
  secret: ${GITLAB_WEBHOOK_SECRET}
oauth:
  client_id: ${GITLAB_CLIENT_ID}
  client_secret: ${GITLAB_CLIENT_SECRET}

Onboarding

Start the onboarding URL from the dashboard to authorize the group or user.

Verify the installation in the Providers or Installations page after onboarding. Relaymesh Cloud registers webhooks automatically during onboarding.

Onboarding URL format

{{endpoint}}/?provider=gitlab&instance={{provider_hash}}&tenant_id={{tenant_id}}&state={{optional_correlation}}

tenant_id is optional for single-tenant usage. state is optional and can be used for correlation.