Gitlab is a git front end with repository management, graphs, links, goodies, commands to run, and review capabilities similar in feel to a self hosted github.

Debian is running its own Instance of Gitlab under, which is not based on the packaged version.

See this proposal to create a fasttrack repo for packages like gitlab.

Buster (Recommended)

Gitlab 11.11.7 is available in personal repo of gitlab maintainer targeting buster as base distribution. (no open security issues).

Add to /etc/apt/sources.list

deb buster-backports contrib main
deb buster-backports contrib main
deb buster-fasttrack contrib main

# apt update

You may encounter the following error message:

The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 0B76920762A6B785

If so, those commands can help:

# wget
# apt-key add praveen.key.asc


# apt -t buster-backports install gitlab

Note: is running on this version.

Unstable (be careful when updating packages)

Gitlab 11.8.10 is available in unstable (many open security issues). Note: Use experimental till libgit2 transition is complete.

# apt install gitlab

We try to keep the version in unstable in a good shape with latest security updates, but some times dependency updates breaks gitlab.

Experimental - During freeze and transitions

Gitlab 11.11.8 is available in experimental (no open security issues). Use libjs-uglify from unstable.

libgit2, grpc and protobuf transition is delaying upload to unstable.

# apt install libjs-uglify/unstable
# apt -t experimental install ruby-rugged ruby-grpc ruby-google-protobuf
# apt -t experimental install gitlab-workhorse gitaly
# apt -t experimental install ruby-devise ruby-task-list ruby-bootstrap-form ruby-sshkey node-raw-loader
# apt install gitlab/experimental

Stretch Backports (upgrade to buster)

Gitlab 11.4.9 is available in stretch-backports (still affected by some security issues, many security releases behind).

Gitlab 11.5.10 is available for stretch-backports via personal repo of gitlab maintainer (many security releases behind) from

Add to /etc/apt/sources.list

deb stretch-backports contrib main

Note 1: Official stretch-backports repo is also required for this personal repo to work. See Backports. You will also need contrib section

# apt -t stretch-backports install gitlab

It is recommended to upgrade to buster to receive security updates.

Note: Remove unnecessary packages after upgrade (remove ruby-bootsnap if you see strange load errors).

# apt remove rails npm ruby-bootsnap

Stretch (upgrade to stretch backports and then to buster)

Gitlab 8.13.11 is available in stretch, but it is not receiving any security updates. So it is recommend to update to newer versions from unstable or buster or stretch-backports.

# apt install gitlab

It is recommended to upgrade to stretch backports and then to buster to receive security updates.

Contact maintainers

You can reach the maintainers of gitlab package via Matrix at Join via your browser if you don't have a matrix account.

Maintainer's corner

  1. Installing gitlab on an lxc container to test - See gitlab/lxc

  2. Updating gitlab package to newer versions - See Teams/Ruby/Packaging/newUpstreamRailsApp


  1. Aim to get gitlab back in main by bullseye release by packaging all node dependencies. We can do this gradually starting with webpack from the archive.
  2. Get autopkgtest working so we can detect problems when someone updates dependencies without coordinating with us.

Omnibus Packages

Note: this section is about installation of upstream-provided unofficial packages.


all actions are performed under root user, in ~ unless otherwise noted.

Step 1

navigate to and copy down the link to the debian deb package.

as of this writing @ june, 5, 2014


Step 2


Step 3

i got errors 1st time around 2nd time around gitlab looked like it set everything and ran well.

To avoid errors, execute /opt/gitlab/embedded/bin/runsvdir-start for one minute, more or less (tested in 7.9.0 and 7.9.1 omnibus versions).


to verify that things are running


Step 4

navigate to your servers ip address or domain name, and login as:

user: root password: 5iveL!fe

External Resources