Automatically mirror repositories from GitHub to your self-hosted Gitea instance.
# Fastest way - using the simplified Docker setup
docker compose -f docker-compose.alt.yml up -d
# Access at http://localhost:4321First user signup becomes admin. Configure GitHub and Gitea through the web interface!
- 🔁 Mirror public, private, and starred GitHub repos to Gitea
- 🏢 Mirror entire organizations with flexible strategies
- 🎯 Custom destination control for repos and organizations
- 📦 Git LFS support - Mirror large files with Git LFS
- 📝 Metadata mirroring - Issues, pull requests (as issues), labels, milestones, wiki
- 🚫 Repository ignore - Mark specific repos to skip
- 🔐 Secure authentication with Better Auth (email/password, SSO, OIDC)
- 📊 Real-time dashboard with activity logs
- ⏱️ Scheduled automatic mirroring with configurable intervals
- 🔄 Auto-discovery - Automatically import new GitHub repositories (v3.4.0+)
- 🧹 Repository cleanup - Auto-remove repos deleted from GitHub (v3.4.0+)
- 🎯 Proper mirror intervals - Respects configured sync intervals (v3.4.0+)
- 🗑️ Automatic database cleanup with configurable retention
- 🐳 Dockerized with multi-arch support (AMD64/ARM64)
We provide two Docker Compose options:
Perfect for trying out Gitea Mirror or simple deployments:
# Clone repository
git clone https://github.com/RayLabsHQ/gitea-mirror.git
cd gitea-mirror
# Start with simplified setup
docker compose -f docker-compose.alt.yml up -d
# Access at http://localhost:4321Features:
- ✅ Pre-built image - no building required
- ✅ Minimal configuration needed
- ✅ Data stored in
./datadirectory - ✅ Configure everything through web UI
- ✅ Automatic user/group ID mapping
Best for:
- First-time users
- Testing and evaluation
- Simple deployments
- When you prefer web-based configuration
For production deployments with environment-based configuration:
# Start with full configuration options
docker compose up -dFeatures:
- ✅ Build from source or use pre-built image
- ✅ Complete environment variable configuration
- ✅ Support for custom CA certificates
- ✅ Advanced mirror settings (forks, wiki, issues)
- ✅ Multi-registry support
Best for:
- Production deployments
- Automated/scripted setups
- Advanced mirror configurations
- When using self-signed certificates
docker pull ghcr.io/raylabshq/gitea-mirror:v3.1.1Minimal .env file (optional - has sensible defaults):
# Custom port (default: 4321)
PORT=4321
# User/Group IDs for file permissions (default: 1000)
PUID=1000
PGID=1000
# Session secret (auto-generated if not set)
BETTER_AUTH_SECRET=your-secret-key-change-this-in-productionAll other settings are configured through the web interface after starting.
Supports extensive environment variables for automated deployment. See the full docker-compose.yml for all available options including GitHub tokens, Gitea URLs, mirror settings, and more.
📚 For a complete list of all supported environment variables, see the Environment Variables Documentation.
# One-line install on Proxmox VE
bash -c "$(curl -fsSL https://raw.githubusercontent.com/community-scripts/ProxmoxVE/main/ct/gitea-mirror.sh)"See the Proxmox VE Community Scripts for more details.
# Install Bun
curl -fsSL https://bun.sh/install | bash
# Setup and run
bun run setup
bun run dev-
First Time Setup
- Navigate to http://localhost:4321
- Create admin account (first user signup)
- Configure GitHub and Gitea connections
-
Mirror Strategies
- Preserve Structure: Maintains GitHub organization structure
- Single Organization: All repos go to one Gitea organization
- Flat User: All repos under your Gitea user account
- Mixed Mode: Personal repos in one org, organization repos preserve structure
-
Customization
- Click edit buttons on organization cards to set custom destinations
- Override individual repository destinations in the table view
- Starred repositories automatically go to a dedicated organization
Mirror Git LFS objects along with your repositories:
- Enable "Mirror LFS" option in Settings → Mirror Options
- Requires Gitea server with LFS enabled (
LFS_START_SERVER = true) - Requires Git v2.1.2+ on the server
Transfer complete repository metadata from GitHub to Gitea:
- Issues - Mirror all issues with comments and labels
- Pull Requests - Transfer PR discussions to Gitea
- Labels - Preserve repository labels
- Milestones - Keep project milestones
- Wiki - Mirror wiki content
- Releases - Transfer GitHub releases with assets
Enable in Settings → Mirror Options → Mirror metadata
- Ignore Status - Mark repositories to skip from mirroring
- Automatic Cleanup - Configure retention period for activity logs
- Scheduled Sync - Set custom intervals for automatic mirroring
Gitea Mirror provides powerful automatic synchronization features:
- Auto-discovery: Automatically discovers and imports new GitHub repositories
- Repository cleanup: Removes repositories that no longer exist in GitHub
- Proper intervals: Mirrors respect your configured sync intervals (not Gitea's default 24h)
- Smart scheduling: Only syncs repositories that need updating
- Auto-start on boot (v3.5.3+): Automatically imports and mirrors all repositories when
SCHEDULE_ENABLED=trueorGITEA_MIRROR_INTERVALis set - no manual clicks required!
Navigate to the Configuration page and enable "Automatic Syncing" with your preferred interval.
🚀 Set it and forget it! With these environment variables, Gitea Mirror will automatically:
- Import all your GitHub repositories on startup (no manual import needed!)
- Mirror them to Gitea immediately
- Keep them synchronized based on your interval
- Auto-discover new repos you create/star on GitHub
- Clean up repos you delete from GitHub
# Option 1: Enable automatic scheduling (triggers auto-start)
SCHEDULE_ENABLED=true
SCHEDULE_INTERVAL=3600 # Check every hour (or use cron: "0 * * * *")
# Option 2: Set mirror interval (also triggers auto-start)
GITEA_MIRROR_INTERVAL=8h # Every 8 hours
# Other examples: 5m, 30m, 1h, 24h, 1d, 7d
# Advanced: Use cron expressions for specific times
SCHEDULE_INTERVAL="0 2 * * *" # Daily at 2 AM (optimize bandwidth usage)
# Auto-import new repositories (default: true)
AUTO_IMPORT_REPOS=true
# Auto-cleanup orphaned repositories
CLEANUP_DELETE_IF_NOT_IN_GITHUB=true
CLEANUP_ORPHANED_REPO_ACTION=archive # 'archive' (recommended) or 'delete'
CLEANUP_DRY_RUN=false # Set to true to test without changesImportant Notes:
- Auto-Start: When
SCHEDULE_ENABLED=trueorGITEA_MIRROR_INTERVALis set, the service automatically imports all GitHub repositories and mirrors them on startup. No manual "Import" or "Mirror" button clicks required! - The scheduler checks every minute for tasks to run. The
GITEA_MIRROR_INTERVALdetermines how often each repository is actually synced. For example, with8h, each repo syncs every 8 hours from its last successful sync.
🛡️ Backup Protection Features:
- No Accidental Deletions: Repository cleanup is automatically skipped if GitHub is inaccessible (account deleted, banned, or API errors)
- Archive Never Deletes Data: The
archiveaction preserves all repository data:- Regular repositories: Made read-only using Gitea's archive feature
- Mirror repositories: Renamed with
archived-prefix (Gitea API limitation prevents archiving mirrors) - Failed operations: Repository remains fully accessible even if marking as archived fails
- Manual Sync on Demand: Archived mirrors stay in Gitea with automatic syncs disabled; trigger
Manual Syncfrom the Repositories page whenever you need fresh data. - The Whole Point of Backups: Your Gitea mirrors are preserved even when GitHub sources disappear - that's why you have backups!
- Strongly Recommended: Always use
CLEANUP_ORPHANED_REPO_ACTION=archive(default) instead ofdelete
If using a reverse proxy (e.g., nginx proxy manager) and experiencing issues with JavaScript files not loading properly, try enabling HTTP/2 support in your proxy configuration. While not required by the application, some proxy configurations may have better compatibility with HTTP/2 enabled. See issue #43 for reference.
# Install dependencies
bun install
# Run development server
bun run dev
# Run tests
bun test
# Build for production
bun run build- Frontend: Astro, React, Shadcn UI, Tailwind CSS v4
- Backend: Bun runtime, SQLite, Drizzle ORM
- APIs: GitHub (Octokit), Gitea REST API
- Auth: Better Auth with session-based authentication
- All GitHub and Gitea API tokens are encrypted at rest using AES-256-GCM
- Encryption is automatic and transparent to users
- Set
ENCRYPTION_SECRETenvironment variable for production deployments - Falls back to
BETTER_AUTH_SECRETif not set
- User passwords are securely hashed by Better Auth
- Never stored in plaintext
- Secure cookie-based session management
Gitea Mirror supports multiple authentication methods. Email/password authentication is the default and always enabled.
The standard authentication method. First user to sign up becomes the admin.
Enable users to sign in with external identity providers like Google, Azure AD, Okta, Authentik, or any OIDC-compliant service.
Configuration:
- Navigate to Settings → Authentication & SSO
- Click "Add Provider"
- Enter your OIDC provider details:
- Issuer URL (e.g.,
https://accounts.google.com) - Client ID and Secret from your provider
- Use the "Discover" button to auto-fill endpoints
- Issuer URL (e.g.,
Redirect URL for your provider:
https://your-domain.com/api/auth/sso/callback/{provider-id}
Need help? The SSO & OIDC guide now includes a working Authentik walkthrough plus troubleshooting tips. If you upgraded from a version earlier than v3.8.10 and see TypeError … url.startsWith after the callback, delete the old provider and add it again using the Discover button (see #73 and #122).
Perfect for automatic authentication when using reverse proxies like Authentik, Authelia, or Traefik Forward Auth.
Environment Variables:
# Enable header authentication
HEADER_AUTH_ENABLED=true
# Header names (customize based on your proxy)
HEADER_AUTH_USER_HEADER=X-Authentik-Username
HEADER_AUTH_EMAIL_HEADER=X-Authentik-Email
HEADER_AUTH_NAME_HEADER=X-Authentik-Name
# Auto-provision new users
HEADER_AUTH_AUTO_PROVISION=true
# Restrict to specific email domains (optional)
HEADER_AUTH_ALLOWED_DOMAINS=example.com,company.orgHow it works:
- Users authenticated by your reverse proxy are automatically logged in
- No additional login step required
- New users can be auto-provisioned if enabled
- Falls back to regular authentication if headers are missing
Example Authentik Configuration:
# In your reverse proxy configuration
proxy_set_header X-Authentik-Username $authentik_username;
proxy_set_header X-Authentik-Email $authentik_email;
proxy_set_header X-Authentik-Name $authentik_name;Gitea Mirror can also act as an OIDC provider for other applications. Register OAuth applications in Settings → Authentication & SSO → OAuth Applications tab.
Use cases:
- Allow other services to authenticate using Gitea Mirror accounts
- Create service-to-service authentication
- Build integrations with your Gitea Mirror instance
Pull requests cannot be created as actual PRs in Gitea due to API limitations. Instead, they are mirrored as enriched issues with comprehensive metadata.
Why real PR mirroring isn't possible:
- Gitea's API doesn't support creating pull requests from external sources
- Real PRs require actual Git branches with commits to exist in the repository
- Would require complex branch synchronization and commit replication
- The mirror relationship is one-way (GitHub → Gitea) for repository content
How we handle Pull Requests: PRs are mirrored as issues with rich metadata including:
- 🏷️ Special "pull-request" label for identification
- 📌 [PR #number] prefix in title with status indicators ([MERGED], [CLOSED])
- 👤 Original author and creation date
- 📝 Complete commit history (up to 10 commits with links)
- 📊 File changes summary with additions/deletions
- 📁 List of modified files (up to 20 files)
- 💬 Original PR description and comments
- 🔀 Base and head branch information
- ✅ Merge status tracking
This approach preserves all important PR information while working within Gitea's API constraints. The PRs appear in Gitea's issue tracker with clear visual distinction and comprehensive details.
Contributions are welcome! Please read our Contributing Guidelines for details on our code of conduct and the process for submitting pull requests.
GNU General Public License v3.0 - see LICENSE file for details.






