gitlab-org--gitlab-foss/doc/api
2015-12-10 14:30:24 -08:00
..
branches.md Update API branches documentation [ci skip] 2015-02-15 17:18:13 +03:00
commits.md Fix md syntax in doc/api/commits.md 2015-11-17 13:08:11 +02:00
deploy_key_multiple_projects.md
deploy_keys.md Update docs to markdown style guide. 2014-06-03 23:16:31 +02:00
groups.md Add API group projects endpoint. 2015-12-07 17:10:40 +01:00
issues.md Query issues, merge requests and milestones with their IID through API 2015-05-02 10:44:52 +02:00
keys.md Move get user by ID of an SSH key documentation to separate file 2015-09-03 16:32:26 +03:00
labels.md Fix labels return code 2014-08-18 00:25:49 +02:00
merge_requests.md Merge branch 'master' into merge-if-green 2015-12-07 10:06:07 +01:00
milestones.md Revert "added link to issue closing pattern in doc" 2015-07-13 12:36:53 +02:00
namespaces.md Make namespace API available to all users 2015-05-28 11:39:12 -07:00
notes.md Extent Event and Note API 2015-12-04 12:22:50 +01:00
oauth2.md Improve the explanation and linking of the Oauth docs. 2015-02-18 20:49:19 -08:00
project_snippets.md Add snippet visibilty as parameter to API doc, closes #1562 2015-05-03 14:56:00 +02:00
projects.md Remove default_branch from project API creation since an empty repository 2015-12-08 21:31:22 -08:00
README.md Add tags page to readme [ci skip] 2015-11-21 12:13:30 +01:00
repositories.md Move git tags API to separate file 2015-11-12 15:41:13 +01:00
repository_files.md Add ability to fetch the commit ID of the last commit that actually touched a file 2015-11-02 17:07:06 +02:00
services.md Added service API endpoint to retrieve service parameters 2015-09-10 18:22:57 +02:00
session.md Fix Md style for API. 2014-08-15 09:03:18 +02:00
settings.md Fix typos in all docs [skip ci] 2015-11-24 02:19:17 +03:00
system_hooks.md Consistency, spelling and grammar 2014-08-15 15:03:01 +01:00
tags.md Allow editing a release in API via PUT method 2015-11-21 22:34:53 +01:00
users.md Move get user by ID of an SSH key documentation to separate file 2015-09-03 16:32:26 +03:00

GitLab API

Resources

Clients

Find API Clients for GitLab on our website. You can use GitLab as an OAuth2 client to make API calls.

Introduction

All API requests require authentication. You need to pass a private_token parameter by URL or header. If passed as header, the header name must be "PRIVATE-TOKEN" (capital and with dash instead of underscore). You can find or reset your private token in your profile.

If no, or an invalid, private_token is provided then an error message will be returned with status code 401:

{
  "message": "401 Unauthorized"
}

API requests should be prefixed with api and the API version. The API version is defined in lib/api.rb.

Example of a valid API request:

GET http://example.com/api/v3/projects?private_token=QVy1PB7sTxfy4pqfZM1U

Example for a valid API request using curl and authentication via header:

curl --header "PRIVATE-TOKEN: QVy1PB7sTxfy4pqfZM1U" "http://example.com/api/v3/projects"

The API uses JSON to serialize data. You don't need to specify .json at the end of API URL.

Authentication with OAuth2 token

Instead of the private_token you can transmit the OAuth2 access token as a header or as a parameter.

OAuth2 token (as a parameter)

curl https://localhost:3000/api/v3/user?access_token=OAUTH-TOKEN

OAuth2 token (as a header)

curl -H "Authorization: Bearer OAUTH-TOKEN" https://localhost:3000/api/v3/user

Read more about GitLab as an OAuth2 client.

Status codes

The API is designed to return different status codes according to context and action. In this way if a request results in an error the caller is able to get insight into what went wrong, e.g. status code 400 Bad Request is returned if a required attribute is missing from the request. The following list gives an overview of how the API functions generally behave.

API request types:

  • GET requests access one or more resources and return the result as JSON
  • POST requests return 201 Created if the resource is successfully created and return the newly created resource as JSON
  • GET, PUT and DELETE return 200 OK if the resource is accessed, modified or deleted successfully, the (modified) result is returned as JSON
  • DELETE requests are designed to be idempotent, meaning a request a resource still returns 200 OK even it was deleted before or is not available. The reasoning behind it is the user is not really interested if the resource existed before or not.

The following list shows the possible return codes for API requests.

Return values:

  • 200 OK - The GET, PUT or DELETE request was successful, the resource(s) itself is returned as JSON
  • 201 Created - The POST request was successful and the resource is returned as JSON
  • 400 Bad Request - A required attribute of the API request is missing, e.g. the title of an issue is not given
  • 401 Unauthorized - The user is not authenticated, a valid user token is necessary, see above
  • 403 Forbidden - The request is not allowed, e.g. the user is not allowed to delete a project
  • 404 Not Found - A resource could not be accessed, e.g. an ID for a resource could not be found
  • 405 Method Not Allowed - The request is not supported
  • 409 Conflict - A conflicting resource already exists, e.g. creating a project with a name that already exists
  • 422 Unprocessable - The entity could not be processed
  • 500 Server Error - While handling the request something went wrong on the server side

Sudo

All API requests support performing an api call as if you were another user, if your private token is for an administration account. You need to pass sudo parameter by URL or header with an id or username of the user you want to perform the operation as. If passed as header, the header name must be "SUDO" (capitals).

If a non administrative private_token is provided then an error message will be returned with status code 403:

{
  "message": "403 Forbidden: Must be admin to use sudo"
}

If the sudo user id or username cannot be found then an error message will be returned with status code 404:

{
  "message": "404 Not Found: No user id or username for: <id/username>"
}

Example of a valid API with sudo request:

GET http://example.com/api/v3/projects?private_token=QVy1PB7sTxfy4pqfZM1U&sudo=username
GET http://example.com/api/v3/projects?private_token=QVy1PB7sTxfy4pqfZM1U&sudo=23

Example for a valid API request with sudo using curl and authentication via header:

curl --header "PRIVATE-TOKEN: QVy1PB7sTxfy4pqfZM1U" --header "SUDO: username" "http://example.com/api/v3/projects"
curl --header "PRIVATE-TOKEN: QVy1PB7sTxfy4pqfZM1U" --header "SUDO: 23" "http://example.com/api/v3/projects"

Pagination

When listing resources you can pass the following parameters:

  • page (default: 1) - page number
  • per_page (default: 20, max: 100) - number of items to list per page

Link headers are send back with each response. These have rel prev/next/first/last and contain the relevant URL. Please use these instead of generating your own URLs.

id vs iid

When you work with API you may notice two similar fields in api entities: id and iid. The main difference between them is scope. Example:

Issue:

id: 46
iid: 5
  • id - is unique across all issues. It's used for any api call.
  • iid - is unique only in scope of a single project. When you browse issues or merge requests with Web UI, you see iid.

So if you want to get issue with api you use http://host/api/v3/.../issues/:id.json. But when you want to create a link to web page - use http:://host/project/issues/:iid.json

Data validation and error reporting

When working with the API you may encounter validation errors. In such case, the API will answer with an HTTP 400 status. Such errors appear in two cases:

  • A required attribute of the API request is missing, e.g. the title of an issue is not given
  • An attribute did not pass the validation, e.g. user bio is too long

When an attribute is missing, you will get something like:

HTTP/1.1 400 Bad Request
Content-Type: application/json

{
    "message":"400 (Bad request) \"title\" not given"
}

When a validation error occurs, error messages will be different. They will hold all details of validation errors:

HTTP/1.1 400 Bad Request
Content-Type: application/json

{
    "message": {
        "bio": [
            "is too long (maximum is 255 characters)"
        ]
    }
}

This makes error messages more machine-readable. The format can be described as follow:

{
    "message": {
        "<property-name>": [
            "<error-message>",
            "<error-message>",
            ...
        ],
        "<embed-entity>": {
            "<property-name>": [
                "<error-message>",
                "<error-message>",
                ...
            ],
        }
    }
}