Automate Gitlab Repository Settings with Terraform

This guide shows an example on how to automate GitLab settings with Terraform.

Fork the repo and use it as a template to start adapting it for your organization!

You can extend this for various other automation tasks.

Reasoning and Advantag…


This content originally appeared on DEV Community and was authored by Chris Schindlbeck

This guide shows an example on how to automate GitLab settings with Terraform.

Fork the repo and use it as a template to start adapting it for your organization!

You can extend this for various other automation tasks.

Reasoning and Advantages of this Approach

Are you responsible in your organization for a complex project with many repositories? Are you tired of going through all repositories manually and do such tasks as adding/removing users and setting merge permissions?

By following this guide, you can:

  • Save Time: Automate repetitive tasks and focus on what truly matters.
  • Reduce Errors: Minimize human errors with consistent automation scripts.
  • Improve Productivity: Streamline your workflow and enhance team collaboration.

This guide exemplifies how to leverage Terraform to automate branch protection permissions in GitLab.

Fictitious example

In this example, branch protection rules for two fictitious teams (backend and frontend) with different repositories respectively, are automated.

The repositories hosted on GitLab and each teams requires specific branch protection rules. The frontend team handles solely frontend repos, and the backend team handles the backend repos.

To get a rough idea, this table summarizes what we want to achieve automatically

MergeStrategyTable

Step-by-Step Explanation

Initial Setup

Security first, so export your Gitlab PAT (private access token) via the command line, by setting an environment variable with

export $TF_VAR_gitlab_token=YOURTOKEN

in order to avoid exposing sensitive information in your git repo (put it in your .bashrc/.zshrc if you do not want to do this each time you open a terminal). This environment variable is then accessible in HCL (Terraform's own programming language) via var.gitlab_token (make sure you give at least repo_read, repo_write permissions for the PAT).

Now we can add the Gitlab provider to enable Terraform to communicate with Gitlab:

terraform {
  required_providers {
    gitlab = {
      source  = "gitlabhq/gitlab"
      version = "17.1.0"
    }
  }
}

variable "gitlab_token" {}
provider "gitlab" {
  base_url = "https://gitlab.iav.com/api/v4"
  token    = var.gitlab_token
}

Initialize the terraform directory

terraform init

which will download the necessary code for communication with the Gitlab API in a .terraform directory.

Get a list of frontend and backend repositories

Then, we must obtain a list of all frontend and backend repositories. For simplicity, we assume that these repositories (in Gitlab called "projects") are found in the same directory (in Gitlab called "group").

Enter the path to the group in the next block and

# Specify the path to your group
data "gitlab_group" "group" {
  full_path = "<YOUR_PATH_TO_YOUR_GROUP>"
}

# Filter repositories for the frontend
data "gitlab_projects" "frontend_projects" {
  group_id          = data.gitlab_group.group.id
  order_by          = "name"
  include_subgroups = true
  search            = "frontend" # filter out repos containing the word 'frontend'
}

# Filter repositories for the backend
data "gitlab_projects" "backend_projects" {
  group_id          = data.gitlab_group.group.id
  order_by          = "name"
  include_subgroups = true
  search            = "backend" # filter out repos containing the word 'backend'
}

These so-called data resources will obtain the current information of the repositories and store them in the terraform.tfstate file. By specifing a search field, we can obtain only the repos that contain a certain word, here front- and backend. This makes them accessible via data.gitlab_projects.frontend_projects.projects and data.gitlab_projects.backend_projects.projects so that we can change the settings there accordingly. Note that this will only work if the repos adhere to a certain naming scheme, here they must include the words frontend or backend.

Specify who is admin or dev

Now, let's define who is a backend and a frontend admin or developer, starting with the frontend admins.

You can get the IDs by searching for the person in Gitlab and right-clicking the three dots on the right to copy their ID.

Here, we set a list of frontend admins

variable "frontend_admins" {
  description = "List of frontend admin ids"
  type        = list(number)
  default     = [71, 63]
}

And let's repeat the same for the remaining ones with

variable "frontend_devs" {
  description = "List of frontend dev ids"
  type        = list(number)
  default     = [82, 102, 182]
}

variable "backend_admins" {
  description = "List of backend admin ids"
  type        = list(number)
  default     = [713]
}

variable "backend_devs" {
  description = "List of backend dev ids"
  type        = list(number)
  default     = [767, 90, 152]
}

Protect branches

Finally we can set our branch protection rules for all the repositories in an automated way.

Let's start with protecting the master branch of the frontend repositories, by including this block.

resource "gitlab_branch_protection" "frontend_master_protection" {
  for_each                     = { for project in data.gitlab_projects.frontend_projects.projects : project.id => project }
  project                      = each.value.id
  allow_force_push             = true
  code_owner_approval_required = true
  branch                       = "master"
  push_access_level            = "no one" # do not push to master directly
  merge_access_level           = "no one" # we will specify who can push below
  dynamic "allowed_to_merge" {
    for_each = var.frontend_admins
    content {
      user_id = allowed_to_merge.value
    }
  }
}

Let's explore this large block in more detail:

  • for_each: We loop over all our frontend repositories that we gathered in the data block previously
  • allow_force_push/code_owner_approval_required: Allow force push by the admins/Require code owner approval
  • push_access_level/merge_access_level: Set level of push/merge access (no one, developer, maintainer, owner), we allow no role here, but individual accounts
  • allowed_to_merge: We loop over all frontend admins for merge rights

We set levels to no one in this example because backend and frontend devs might both be classified as developer but we want only to include the ones responsible for their part.

Now, we can do the same for the dev branch

resource "gitlab_branch_protection" "frontend_dev_protection" {
  for_each                     = { for project in data.gitlab_projects.frontend_projects.projects : project.id => project }
  project                      = each.value.id
  allow_force_push             = false
  code_owner_approval_required = true
  branch                       = "dev"
  push_access_level            = "developer" # here, let's allow every developer to push, regardless of front- or backend
  merge_access_level           = "no one"    # we will specify who can push below
  dynamic "allowed_to_merge" {
    for_each = distinct(concat(var.frontend_admins, var.frontend_devs)) # union over devs and admins
    content {
      user_id = allowed_to_merge.value
    }
  }
  dynamic "allowed_to_push" {
    for_each = distinct(concat(var.frontend_admins, var.frontend_devs)) # union over devs and admins
    content {
      user_id = allowed_to_push.value
    }
  }
}

We follow the same approach as for the master branch with a few differences for the dev branch:

  • allow_force_push/code_owner_approval_required: We disallow force push for anyone here
  • allowed_to_push/allowed_to_merge: We loop over the union of frontend admins and devs to let them have push/merge rights (admins should be able to merge/push too, right?)

Now that we have done this for the frontend repos, we can do this in an analagous fashion for the backend repos by changing only frontend_projects to backend_projects and frontend_admins and frontend_devs to backend_admins and backend_devs, such as

  ...
  for_each                     = { for project in data.gitlab_projects.backend_projects.projects : project.id => project }
  ...
    for_each = distinct(concat(var.backend_admins, var.backend_devs)) # union over devs and admins

You can take a look at the entire code here, or adapt the settings to your preferences/organizational process.

Now we have every set up to make the changes readily availabe in GitLab.

Deployment

Finally, we can apply our changes via

terraform apply

Carefully look through the upcoming changes and confirm with yes if you are sure everything is set correctly.

Attention: if you have already set up your repos (and settings) in Gitlab, this will fail as Terraform will complain that the resources already exist. In this case, you will need to import the current state to your terraform.tfstate first, so that terraform is able to manage this.

You can do this for each project you want to import via

terraform import gitlab_project.gitlab_repo_manager <project_id>

or, alternatively, for more complex projects, check out terraformer, a CLI tool to import/update your tfstate from existing infrastructure.

Summary

This guide walked you through an example on how to set up branch protection in multiple Gitlab repos automatically via Terraform. You can take this example as a starting point on how to automate much more settings in Gitlab repos, such as setting the preferred merge method, tag protection, branch rules and much more!

If you host your repos on GitHub you can take this example as a template and take the structure and adapt it step-by-step for the GitHub provider.

The days are numbered where you had to do this manually for (countless) repos in a complex project for every subteam. Embrace the mighty tooling capabilities of Terraform!

Bonus: Check out how to set the preferred merge method (the only correct answer is fast-forward only, right?) in my github repo.


This content originally appeared on DEV Community and was authored by Chris Schindlbeck


Print Share Comment Cite Upload Translate Updates
APA

Chris Schindlbeck | Sciencx (2024-07-13T08:32:50+00:00) Automate Gitlab Repository Settings with Terraform. Retrieved from https://www.scien.cx/2024/07/13/automate-gitlab-repository-settings-with-terraform/

MLA
" » Automate Gitlab Repository Settings with Terraform." Chris Schindlbeck | Sciencx - Saturday July 13, 2024, https://www.scien.cx/2024/07/13/automate-gitlab-repository-settings-with-terraform/
HARVARD
Chris Schindlbeck | Sciencx Saturday July 13, 2024 » Automate Gitlab Repository Settings with Terraform., viewed ,<https://www.scien.cx/2024/07/13/automate-gitlab-repository-settings-with-terraform/>
VANCOUVER
Chris Schindlbeck | Sciencx - » Automate Gitlab Repository Settings with Terraform. [Internet]. [Accessed ]. Available from: https://www.scien.cx/2024/07/13/automate-gitlab-repository-settings-with-terraform/
CHICAGO
" » Automate Gitlab Repository Settings with Terraform." Chris Schindlbeck | Sciencx - Accessed . https://www.scien.cx/2024/07/13/automate-gitlab-repository-settings-with-terraform/
IEEE
" » Automate Gitlab Repository Settings with Terraform." Chris Schindlbeck | Sciencx [Online]. Available: https://www.scien.cx/2024/07/13/automate-gitlab-repository-settings-with-terraform/. [Accessed: ]
rf:citation
» Automate Gitlab Repository Settings with Terraform | Chris Schindlbeck | Sciencx | https://www.scien.cx/2024/07/13/automate-gitlab-repository-settings-with-terraform/ |

Please log in to upload a file.




There are no updates yet.
Click the Upload button above to add an update.

You must be logged in to translate posts. Please log in or register.