Configuring Your GitLab Repository

Configuring Your GitLab Repository

Upon receiving a Liferay Cloud onboarding email, you’re provisioned a GitHub repository hosted in the dxpcloud organization. This repository is a template for a team’s separate private Liferay Cloud development repository and is typically removed after 10 business days. Users must:

  1. Transfer the provisioned repository to their own private repository.
  2. Integrate their private repository with the Jenkins (CI) service in Liferay Cloud using a Webhook.

The provisioned repository will be on GitHub, but you can transfer it to a GitLab repository as of version 3.2.0 of the Jenkins service. This must be done with administrative access to the GitLab repository.


The repository’s administrators are not necessarily the same as your project’s administrators in the Cloud console.

Preparing the Jenkins Service

If you’ve customized your Jenkinsfile, follow this guide to extend the default Jenkinsfile.

Creating a GitLab Repository

First, create a new GitLab repository:

  1. Go to GitLab.

  2. Click New project.

    Click New project to begin creating a new GitLab repository.

  3. Provide a project slug (the repository name in the url).

    Fill in the details for your new repository.

  4. Configure the visibility level to private (free users have unlimited private repositories).

  5. Ensure Initialize repository with a README is unchecked.

  6. Click Create project.

Transferring from GitHub to GitLab

Follow these steps to transfer the provisioned GitHub repository to your own GitLab repository:

  1. Clone the provisioned GitHub repository locally:

    git clone


    If you have already cloned the repository for work with another provider, then you can skip this step and work within the same clone.

  2. Add a new Git remote and point to GitLab:

    git remote add gitlab

  3. Push the cloned repository to the new remote repository:

    git push gitlab master

If you need help creating, cloning, and pushing repositories, see GitLab’s documentation.

Generating Access Tokens for GitLab

Next, create an access token that will be used by the Webhook to trigger Jenkins builds:

  1. Navigate to the personal access tokens page.

    Create a personal access token for GitLab, which cannot be accessed again later.

  2. Provide a name and an expiration date for this access token.

  3. Configure the access token to have the following permissions:

    • api
    • read_repository
    • write_repository
  4. Click Create personal access token.

  5. Copy your access token and save it somewhere (you won’t see it again otherwise).

Connecting GitLab to Your Jenkins service

Lastly, set environment variables in the Jenkins service’s to point to your new repository:

  1. Log in to the Liferay Cloud Console and navigate to your Jenkins service in the infra environment.

  2. Navigate to the Environment Variables tab.

  3. Configure the following environment variables:

Name Value
LCP_CI_SCM_TOKEN [access_token]

After updating these environment variables, the Jenkins service restarts. Any pushed branches and pull requests in your new repository trigger builds.

Connecting to a Private GitLab Server

To use a private GitLab server, you must set an additional environment variable in your Jenkins service:

Name Value

Set the LCP_CI_SCM_SERVER_HOST variable to the base URL of your private GitLab server (for example, This sets the server URL that CI uses to retrieve your code base when generating builds and linking to your repository’s branches. By default, CI uses as the base URL for GitLab.

Additional GitLab Webhook Configurations

Liferay Cloud’s Jenkins service creates a webhook for your selected git SCM provider; however, it only creates the default one. GitLab’s default webhook requires additional configuration to match the functionality of GitHub and BitBucket’s webhooks.

  1. Navigate to your GitLab repository.

  2. Navigate to Settings and select Webhooks.

  3. Under Project Hooks, verify the created webhook is listed.

  4. Click the Edit button for the CI webhook.

    Edit the webhook that has been automatically created for your repository.

  5. Uncheck Tags push events and Comments.

  6. Check Enable SSL verification.

  7. Click Save changes.

Verifying Builds

Pushed branches and merge requests (GitLab’s equivalent of pull requests) trigger builds that you can see or deploy from the Builds tab in the Liferay Cloud Console. After setting up integration with the Jenkins service, a good next step is to verify these builds, to ensure that the integration was successful.

Verifying Builds from Pushed Branches

Verify that new Git pushes trigger Jenkins builds:

  1. Make a change to the repository (like adding a file), then commit it to the branch:

    git commit -m "Add file to test builds"
  2. Push the branch up to GitLab:

    git push gitlab branch-name
  3. Navigate to the Builds page in the Liferay Cloud Console.

  4. Verify that the build displays for the pushed branch on the Builds page.

Verifying Builds from Merge Requests

Verify that new merge requests trigger Jenkins builds:

  1. Create a merge request from any branch to the develop branch.

  2. Verify that a new build is created for the merge request.

  3. Navigate to the Builds page in the Liferay Cloud Console.

  4. Click the links for the branch and commit in the appropriate build.

    Check the links for the branch and commit for your build, on the Builds page.

  5. Verify that the links redirect to the correct GitLab pages.