Prerequisites
Before you start, make sure:- You have the Owner role on the GitLab group you want to connect.
- You know the GitLab instance URL:
- GitLab.com:
https://gitlab.com - Self-hosted GitLab:
https://gitlab.your-company.com
- GitLab.com:
- Your GitLab plan supports group access tokens:
- GitLab.com: Premium or Ultimate
- GitLab Self-Managed / Dedicated: any license
What to create in GitLab
Yasu expects a group access token with:- Role:
Maintainer - Scope:
api
Maintainerlets Yasu manage project webhooks and post merge request notes.apigives Yasu the API access required to read merge requests, configure hooks, and publish bot-authored comments.
Steps
Open your GitLab group
- Sign in to GitLab.
- Open the group you want Yasu to manage.
- Copy either:
- the group path such as
yasucloud, or - the group ID
- the group path such as
Create a group access token
- In GitLab, open your group.
- Go to Settings → Access tokens.
- Click Add new token.
- Fill in the token:
- Token name:
Yasu Bot - Expiration date: choose a date that matches your security policy
- Role:
Maintainer - Scope:
api
- Token name:
- Click Create group access token.
- Copy the token immediately and store it somewhere safe.
GitLab only shows the token value once. If you lose it, create a new token.
Connect GitLab in Yasu
- In Yasu, go to Settings → Integrations → GitLab.
- In Add Bot Connection, fill in:
- GitLab Instance URL
- Display Label (optional)
- Group Path or ID
- Bot Access Token
- Click Add Bot Connection.
Select repositories
- In the connected GitLab card, search or browse the repositories in the group.
- Click Add on the repositories you want Yasu to monitor.
- Click Save Configuration.
Self-hosted GitLab
For self-hosted GitLab, the setup is the same:- use your own instance URL
- create the group access token in that GitLab instance
- paste it into Yasu
Troubleshooting
I do not see "Access tokens" in my GitLab group
I do not see "Access tokens" in my GitLab group
Possible causes:
- you are not a Group Owner
- your GitLab.com plan is Free or trial
- your top-level group disabled creation of group/project access tokens
Yasu says the token is invalid
Yasu says the token is invalid
Check the token settings:
- the token is a group access token, not a personal access token
- the token has the api scope
- the token has not expired or been revoked
- the Group Path or ID matches the group the token belongs to
Yasu cannot configure webhooks or reviews do not appear
Yasu cannot configure webhooks or reviews do not appear
Usually this means the token role is too weak or the selected repositories are outside the connected group.Use:
- Role:
Maintainer - Scope:
api