Configuring GitLab EE and CE Access
These instructions are for using an on-premise installation of GitLab Enterprise Edition (EE) or GitLab Community Edition (CE) for HCP Terraform's VCS features. GitLab.com has separate instructions, as do the other supported VCS providers.
Configuring a new VCS provider requires permission to manage VCS settings for the organization. (More about permissions.)
Connecting HCP Terraform to your VCS involves four steps:
On your VCS | On HCP Terraform |
---|---|
Create a new connection in HCP Terraform. Get redirect URI. | |
Register your HCP Terraform organization as a new app. Provide redirect URI. Get ID and key. | |
Provide HCP Terraform with application ID and secret. Request VCS access. | |
Approve access request. |
The rest of this page explains the on-premise GitLab versions of these steps.
Important: HCP Terraform needs to contact your GitLab instance during setup and during normal operation. For the SaaS version of HCP Terraform, this means GitLab must be internet-accessible; for Terraform Enterprise, you must have network connectivity between your Terraform Enterprise and GitLab instances.
Note: Alternately, you can skip the OAuth configuration process and authenticate with a personal access token. This requires using HCP Terraform's API. For details, see the OAuth Clients API page.
Version Note: HCP Terraform supports GitLab versions 9.0 and newer. HashiCorp does not test older versions of GitLab with HCP Terraform, and they might not work as expected. Also note that, although we do not deliberately remove support for versions that have reached end of life (per the GitLab Support End of Life Policy), our ability to resolve customer issues with end of life versions might be limited.
Step 1: On HCP Terraform, Begin Adding a New VCS Provider
Go to your organization's settings and then click Providers. The VCS Providers page appears.
Click Add VCS Provider. The VCS Providers page appears.
Select GitLab and then select GitLab Enterprise Edition or GitLab Community Edition from the menu. The page moves to the next step.
In the "Set up provider" step, fill in the HTTP URL and API URL of your GitLab Enterprise Edition or GitLab Community Edition instance, as well as an optional Name for this VCS connection. Click "Continue."
Field Value HTTP URL https://<GITLAB INSTANCE HOSTNAME>
API URL https://<GITLAB INSTANCE HOSTNAME>/api/v4
Note that HCP Terraform uses GitLab's v4 API.
Leave the page open in a browser tab. In the next step you will copy values from this page, and in later steps you will continue configuring HCP Terraform.
Step 2: On GitLab, Create a New Application
In a new browser tab, open your GitLab instance and log in as whichever account you want HCP Terraform to act as. For most organizations this should be a dedicated service user, but a personal account will also work.
Important: The account you use for connecting HCP Terraform must have admin (master) access to any shared repositories of Terraform configurations, since creating webhooks requires admin permissions. Do not create the application as an administrative application not owned by a user; HCP Terraform needs user access to repositories to create webhooks and ingress configurations.
Important: In GitLab CE or EE 10.6 and up, you may also need to enable Allow requests to the local network from hooks and services on the "Outbound requests" section inside the Admin area under Settings (
/admin/application_settings/network
). Refer to the GitLab documentation for details.Navigate to GitLab's "User Settings > Applications" page.
This page is located at
https://<GITLAB INSTANCE HOSTNAME>/profile/applications
. You can also reach it through GitLab's menus:- Click your profile picture and choose "Settings."
- Click "Applications."
This page has a list of applications and a form for adding new ones. The form has two text fields and some checkboxes.
Fill out the fields and checkboxes with the corresponding values currently displayed in your HCP Terraform browser tab. HCP Terraform lists the values in the order they appear, and includes controls for copying values to your clipboard.
Fill out the form as follows:
Field Value Name HCP Terraform ( <YOUR ORGANIZATION NAME>
)Redirect URI https://app.terraform.io/<YOUR CALLBACK URL>
Confidential (checkbox) ✔️ (enabled) Expire access tokens (checkbox) (no longer required) Scopes (all checkboxes) api Note: For previous versions of HCP Terraform and GitLab, we recommended disabling a setting called
Expire access tokens
. This action was required because Gitlab marked OAuth tokens as expired after 2 hours, but HCP Terraform only refreshed tokens after 6 hours. This setting does not exist on Gitlab v15+ and HCP Terraform now refreshes tokens more often.Click the "Save application" button, which creates the application and takes you to its page.
Leave this page open in a browser tab. In the next step, you will copy and paste the unique Application ID and Secret.
Step 3: On HCP Terraform, Set up Your Provider
On the "Configure settings" step on HCP Terraform, enter the Application ID and Secret from the previous step.
Click Connect and continue. This takes you to a page on GitLab asking whether you want to authorize the app. If this results in a 500 error, it usually means HCP Terraform was unable to reach your GitLab instance.
Click the green Authorize button at the bottom of the authorization page.
Step 4: On HCP Terraform, Set Up a PEM formatted SSH Keypair (Optional)
Most organizations will not need to add an SSH private key. However, if the organization repositories include Git submodules that can only be accessed via SSH, an SSH key can be added along with the OAuth credentials. You can add or update the SSH private key at a later time.
Important Notes
- SSH will only be used to clone Git submodules. All other Git operations will still use HTTPS.
- Do not use your personal SSH key to connect HCP Terraform and GitLab; generate a new one or use an existing key reserved for service access.
- In the following steps, you must provide HCP Terraform with the private key. Although HCP Terraform does not display the text of the key to users after it is entered, it retains it and will use it for authenticating to GitLab.
- Protect this private key carefully. It can push code to the repositories you use to manage your infrastructure. Take note of your organization's policies for protecting important credentials and be sure to follow them.
If You Don't Need a PEM formatted SSH Keypair:
- Click the "Skip and Finish" button. This returns you to HCP Terraform's VCS Providers page, which now includes your new GitLab client.
If You Do Need a PEM formatted SSH Keypair:
On a secure workstation, create a PEM formatted SSH keypair that HCP Terraform can use to connect to GitLab. The exact command depends on your OS, but is usually something like:
ssh-keygen -t rsa -m PEM -f "/Users/<NAME>/.ssh/service_terraform" -C "service_terraform_enterprise"
This creates aservice_terraform
file with the private key, and aservice_terraform.pub
file with the public key. This SSH key must have an empty passphrase. HCP Terraform cannot use SSH keys that require a passphrase.While logged into the GitLab account you want HCP Terraform to act as, navigate to the SSH Keys settings page, add a new SSH key and paste the value of the SSH public key you just created.
In HCP Terraform's "Add VCS Provider" page, paste the text of the SSH private key you just created, and click the "Add SSH Key" button. This returns you to HCP Terraform's VCS Provider page, which now includes your new GitLab client.
Finished
At this point, GitLab access for HCP Terraform is fully configured, and you can create Terraform workspaces based on your organization's shared repositories.