GitLab integration enables connecting self-managed GitLab repositories as code sources within Jitera projects. Users authenticate with a Personal Access Token (PAT) through the Jitera UI — no Helm chart configuration is required.Documentation Index
Fetch the complete documentation index at: https://docs.jitera.ai/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
- A self-managed GitLab instance running version 16.8 or later
- A GitLab account with admin-level access
- A Personal Access Token with the
apiscope - Outbound HTTPS (port 443) access from the Kubernetes cluster to the GitLab instance
GitLab.com is not currently supported for self-hosted deployments. Only self-managed GitLab instances can be connected.
Creating a Personal Access Token
The steps below are provided as an example. Refer to the GitLab Personal Access Token documentation for the most up-to-date procedure.
- Log in to your GitLab instance as an admin user
- Go to User Settings > Access Tokens
- Create a new token with the following settings:
| Field | Value |
|---|---|
| Token name | A descriptive name (e.g., Jitera Integration) |
| Expiration date | Set according to your security policy |
| Scopes | api |
- Click Create personal access token
- Copy the generated token — it will not be shown again
Connecting GitLab in Jitera
No Helm chart configuration is required for GitLab integration. The connection is configured entirely through the Jitera UI — see Code Sources for the connection steps. When prompted, select GitLab, enter your self-managed host URL, and paste the Personal Access Token created above.Troubleshooting
Authorization Failed
Symptoms: Error when trying to authorize the GitLab connection Solutions:- Verify the Personal Access Token is valid and has not expired
- Confirm the token has the
apiscope - Ensure the token belongs to an account with access to the target repositories
- Check that the GitLab instance hostname is correct and reachable
Repository Not Listed
Symptoms: Expected repositories do not appear after authorization Solutions:- Verify the token owner has access to the repository
- Check repository visibility settings in GitLab
- For group repositories, verify the token owner has at least Maintainer access to the group
SSL Certificate Errors
Symptoms: SSL/TLS errors when connecting to self-managed GitLab Solutions:- Ensure the GitLab instance uses a valid SSL certificate
- For custom CA certificates, add the CA to the trusted store. Refer to your Kubernetes distribution’s documentation for mounting additional CA certificates into pods.
Connection Timeout
Symptoms: Connection times out when trying to reach GitLab Solutions:- Verify outbound HTTPS (port 443) is allowed from the Kubernetes cluster to the GitLab instance
- Check network policies and firewall rules
- Confirm the GitLab hostname resolves correctly from within the cluster:
Network Requirements
Ensure outbound HTTPS (port 443) access from the Kubernetes cluster to your GitLab instance. See Network and Firewall → 3rd Party Integrations for the full allow-list, including self-managed GitLab.Related Documentation
GitHub Integration
Configure GitHub integration
Integrations Overview
All available integrations
Requirements
Deployment requirements

