debian-mirror-gitlab/doc/ci/jobs/ci_job_token.md

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

247 lines
11 KiB
Markdown
Raw Normal View History

2021-11-11 11:23:49 +05:30
---
stage: Verify
2023-05-27 22:25:52 +05:30
group: Pipeline Security
2022-11-25 23:54:43 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
2021-11-11 11:23:49 +05:30
---
2022-01-26 12:08:38 +05:30
# GitLab CI/CD job token **(FREE)**
2021-11-11 11:23:49 +05:30
When a pipeline job is about to run, GitLab generates a unique token and injects it as the
[`CI_JOB_TOKEN` predefined variable](../variables/predefined_variables.md).
You can use a GitLab CI/CD job token to authenticate with specific API endpoints:
- Packages:
2021-11-18 22:05:49 +05:30
- [Package Registry](../../user/packages/package_registry/index.md#use-gitlab-cicd-to-build-packages).
2022-08-27 11:52:29 +05:30
- [Packages API](../../api/packages.md) (project-level).
2023-03-17 16:20:25 +05:30
- [Container Registry](../../user/packages/container_registry/build_and_push_images.md#use-gitlab-cicd)
2021-11-11 11:23:49 +05:30
(the `$CI_REGISTRY_PASSWORD` is `$CI_JOB_TOKEN`).
- [Container Registry API](../../api/container_registry.md)
(scoped to the job's project, when the `ci_job_token_scope` feature flag is enabled).
- [Get job artifacts](../../api/job_artifacts.md#get-job-artifacts).
- [Get job token's job](../../api/jobs.md#get-job-tokens-job).
2022-11-25 23:54:43 +05:30
- [Pipeline triggers](../../api/pipeline_triggers.md), using the `token=` parameter
to [trigger a multi-project pipeline](../pipelines/downstream_pipelines.md#trigger-a-multi-project-pipeline-by-using-the-api).
2022-07-23 23:45:48 +05:30
- [Releases](../../api/releases/index.md) and [Release links](../../api/releases/links.md).
2021-11-11 11:23:49 +05:30
- [Terraform plan](../../user/infrastructure/index.md).
2022-03-02 08:16:31 +05:30
The token has the same permissions to access the API as the user that caused the
2023-01-13 00:05:48 +05:30
job to run. A user can cause a job to run by taking action like pushing a commit,
triggering a manual job, or being the owner of a scheduled pipeline. Therefore, this user must be assigned to
2022-03-02 08:16:31 +05:30
[a role that has the required privileges](../../user/permissions.md#gitlab-cicd-permissions).
2021-11-11 11:23:49 +05:30
The token is valid only while the pipeline job runs. After the job finishes, you can't
use the token anymore.
A job token can access a project's resources without any configuration, but it might
give extra permissions that aren't necessary. There is [a proposal](https://gitlab.com/groups/gitlab-org/-/epics/3559)
to redesign the feature for more strategic control of the access permissions.
You can also use the job token to authenticate and clone a repository from a private project
in a CI/CD job:
```shell
git clone https://gitlab-ci-token:${CI_JOB_TOKEN}@gitlab.example.com/<namespace>/<project>
```
## GitLab CI/CD job token security
To make sure that this token doesn't leak, GitLab:
- Masks the job token in job logs.
- Grants permissions to the job token only when the job is running.
To make sure that this token doesn't leak, you should also configure
your [runners](../runners/index.md) to be secure. Avoid:
2023-03-04 22:38:38 +05:30
- Using Docker `privileged` mode if the machines are re-used.
2021-11-11 11:23:49 +05:30
- Using the [`shell` executor](https://docs.gitlab.com/runner/executors/shell.html) when jobs
run on the same machine.
If you have an insecure GitLab Runner configuration, you increase the risk that someone
tries to steal tokens from other jobs.
2023-04-23 21:23:45 +05:30
## Configure CI/CD job token access
2021-11-11 11:23:49 +05:30
2023-04-23 21:23:45 +05:30
You can control what projects a CI/CD job token can access to increase the
2021-11-11 11:23:49 +05:30
job token's security. A job token might give extra permissions that aren't necessary
2023-05-27 22:25:52 +05:30
to access specific private resources. The job token scope only controls access
to private projects. If an accessed project is public or internal, token scoping does
not apply.
2023-04-23 21:23:45 +05:30
If a job token is leaked, it could potentially be used to access private data
2021-11-18 22:05:49 +05:30
to the job token's user. By limiting the job token access scope, private data cannot
be accessed unless projects are explicitly authorized.
2021-11-11 11:23:49 +05:30
2023-04-23 21:23:45 +05:30
There is a proposal to add more strategic control of the access permissions,
see [epic 3559](https://gitlab.com/groups/gitlab-org/-/epics/3559).
### Allow access to your project with a job token
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/346298/) in GitLab 15.9. [Deployed behind the `:inbound_ci_scoped_job_token` feature flag](../../user/feature_flags.md), enabled by default.
2023-05-27 22:25:52 +05:30
Create an **inbound** allowlist of projects which can access your project through
their `CI_JOB_TOKEN`.
2023-04-23 21:23:45 +05:30
2023-05-27 22:25:52 +05:30
For example, project `A` can add project `B` to the inbound allowlist. CI/CD jobs
in project `B` (the "allowed project") can now use their CI/CD job token to
authenticate API calls to access project `A`. If project `A` is public or internal,
the project can be accessed by project `B` without adding it to the inbound allowlist.
2023-04-23 21:23:45 +05:30
2023-05-27 22:25:52 +05:30
By default the inbound allowlist of any project only includes itself.
2023-04-23 21:23:45 +05:30
It is a security risk to disable this feature, so project maintainers or owners should
keep this setting enabled at all times. Add projects to the allowlist only when cross-project
access is needed.
### Disable the inbound job token scope allowlist
WARNING:
It is a security risk to disable the allowlist. A malicious user could try to compromise
a pipeline created in an unauthorized project. If the pipeline was created by one of
your maintainers, the job token could be used in an attempt to access your project.
You can disable the inbound job token scope allowlist for testing or a similar reason,
but you should enable it again as soon as possible.
Prerequisite:
- You must have at least the Maintainer role for the project.
To disable the inbound job token scope allowlist:
1. On the top bar, select **Main menu > Projects** and find your project.
1. On the left sidebar, select **Settings > CI/CD**.
1. Expand **Token Access**.
1. Toggle **Allow access to this project with a CI_JOB_TOKEN** to disabled.
Enabled by default in new projects.
2023-05-27 22:25:52 +05:30
You can also disable the allowlist [with the API](../../api/graphql/reference/index.md#mutationprojectcicdsettingsupdate).
2023-04-23 21:23:45 +05:30
### Add a project to the inbound job token scope allowlist
You can add projects to the inbound allowlist for a project. Projects added to the allowlist
can make API calls from running pipelines by using the CI/CD job token.
Prerequisite:
- You must have at least the Maintainer role in the current project and at least
the Guest role in the allowed project.
- You must not have more than 100 projects added to the allowlist.
To add a project:
1. On the top bar, select **Main menu > Projects** and find your project.
1. On the left sidebar, select **Settings > CI/CD**.
1. Expand **Token Access**.
1. Verify **Allow access to this project with a CI_JOB_TOKEN** is enabled.
1. Under **Allow CI job tokens from the following projects to access this project**,
add projects to the allowlist.
2023-05-27 22:25:52 +05:30
You can also add a target project to the allowlist [with the API](../../api/graphql/reference/index.md#mutationcijobtokenscopeaddproject).
2023-04-23 21:23:45 +05:30
### Limit your project's job token access
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/328553) in GitLab 14.1. [Deployed behind the `:ci_scoped_job_token` feature flag](../../user/feature_flags.md), disabled by default.
> - [Enabled on GitLab.com and self-managed](https://gitlab.com/gitlab-org/gitlab/-/issues/332272) in GitLab 14.4.
> - [Feature flag removed](https://gitlab.com/gitlab-org/gitlab/-/issues/332272) in GitLab 14.6.
NOTE:
This feature is disabled by default for all new projects and is [scheduled for removal](https://gitlab.com/gitlab-org/gitlab/-/issues/383084)
in GitLab 16.0. Project maintainers or owners should enable the **inbound** access control instead.
Control your project's job token scope by creating an **outbound** allowlist of projects which
can be accessed by your project's job token.
By default, the allowlist includes your current project.
2021-11-11 11:23:49 +05:30
Other projects can be added and removed by maintainers with access to both projects.
2023-04-23 21:23:45 +05:30
With the setting disabled, all projects are considered in the allowlist and the job token is
limited only by the user's access permissions.
2021-11-11 11:23:49 +05:30
For example, when the setting is enabled, jobs in a pipeline in project `A` have
a `CI_JOB_TOKEN` scope limited to project `A`. If the job needs to use the token
to make an API request to a private project `B`, then `B` must be added to the allowlist for `A`.
2023-05-27 22:25:52 +05:30
If project `B` is public or internal, you do not need to add
`B` to the allowlist to grant access.
2021-11-11 11:23:49 +05:30
2023-04-23 21:23:45 +05:30
### Configure the outbound job token scope
Prerequisite:
- You must not have more than 100 projects added to the token's scope.
To configure the outbound job token scope:
2021-11-11 11:23:49 +05:30
2022-10-11 01:57:18 +05:30
1. On the top bar, select **Main menu > Projects** and find your project.
2021-11-11 11:23:49 +05:30
1. On the left sidebar, select **Settings > CI/CD**.
1. Expand **Token Access**.
1. Toggle **Limit CI_JOB_TOKEN access** to enabled.
2022-01-26 12:08:38 +05:30
1. Optional. Add existing projects to the token's access scope. The user adding a
2022-04-04 11:22:00 +05:30
project must have the Maintainer role in both projects.
2021-11-11 11:23:49 +05:30
## Download an artifact from a different pipeline **(PREMIUM)**
> `CI_JOB_TOKEN` for artifacts download with the API was [introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/2346) in GitLab 9.5.
You can use the `CI_JOB_TOKEN` to access artifacts from a job created by a previous
pipeline. You must specify which job you want to retrieve the artifacts from:
```yaml
build_submodule:
stage: test
script:
- apt update && apt install -y unzip
- curl --location --output artifacts.zip "https://gitlab.example.com/api/v4/projects/1/jobs/artifacts/main/download?job=test&job_token=$CI_JOB_TOKEN"
- unzip artifacts.zip
```
Read more about the [jobs artifacts API](../../api/job_artifacts.md#download-the-artifacts-archive).
2021-11-18 22:05:49 +05:30
## Troubleshooting
CI job token failures are usually shown as responses like `404 Not Found` or similar:
- Unauthorized Git clone:
```plaintext
$ git clone https://gitlab-ci-token:$CI_JOB_TOKEN@gitlab.com/fabiopitino/test2.git
Cloning into 'test2'...
remote: The project you were looking for could not be found or you don't have permission to view it.
fatal: repository 'https://gitlab-ci-token:[MASKED]@gitlab.com/<namespace>/<project>.git/' not found
```
- Unauthorized package download:
```plaintext
$ wget --header="JOB-TOKEN: $CI_JOB_TOKEN" ${CI_API_V4_URL}/projects/1234/packages/generic/my_package/0.0.1/file.txt
--2021-09-23 11:00:13-- https://gitlab.com/api/v4/projects/1234/packages/generic/my_package/0.0.1/file.txt
Resolving gitlab.com (gitlab.com)... 172.65.251.78, 2606:4700:90:0:f22e:fbec:5bed:a9b9
Connecting to gitlab.com (gitlab.com)|172.65.251.78|:443... connected.
HTTP request sent, awaiting response... 404 Not Found
2021-09-23 11:00:13 ERROR 404: Not Found.
```
- Unauthorized API request:
```plaintext
$ curl --verbose --request POST --form "token=$CI_JOB_TOKEN" --form ref=master "https://gitlab.com/api/v4/projects/1234/trigger/pipeline"
< HTTP/2 404
< date: Thu, 23 Sep 2021 11:00:12 GMT
{"message":"404 Not Found"}
< content-type: application/json
```
While troubleshooting CI/CD job token authentication issues, be aware that:
2023-04-23 21:23:45 +05:30
- When the [CI/CD job token scopes](#configure-cicd-job-token-access) are enabled,
2021-11-18 22:05:49 +05:30
and the job token is being used to access a different project:
- The user that executes the job must be a member of the project that is being accessed.
- The user must have the [permissions](../../user/permissions.md) to perform the action.
2023-04-23 21:23:45 +05:30
- The accessed project must have the project attempting to access it [added to the inbound allowlist](#add-a-project-to-the-inbound-job-token-scope-allowlist).
2021-11-18 22:05:49 +05:30
- The CI job token becomes invalid if the job is no longer running, has been erased,
or if the project is in the process of being deleted.