2021-11-11 11:23:49 +05:30
---
stage: Verify
2023-05-27 22:25:52 +05:30
group: Pipeline Security
2022-11-25 23:54:43 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
2021-11-11 11:23:49 +05:30
---
2022-01-26 12:08:38 +05:30
# GitLab CI/CD job token **(FREE)**
2021-11-11 11:23:49 +05:30
When a pipeline job is about to run, GitLab generates a unique token and injects it as the
[`CI_JOB_TOKEN` predefined variable ](../variables/predefined_variables.md ).
You can use a GitLab CI/CD job token to authenticate with specific API endpoints:
- Packages:
2023-06-20 00:43:36 +05:30
- [Package Registry ](../../user/packages/package_registry/index.md#to-build-packages ).
2022-08-27 11:52:29 +05:30
- [Packages API ](../../api/packages.md ) (project-level).
2023-03-17 16:20:25 +05:30
- [Container Registry ](../../user/packages/container_registry/build_and_push_images.md#use-gitlab-cicd )
2021-11-11 11:23:49 +05:30
(the `$CI_REGISTRY_PASSWORD` is `$CI_JOB_TOKEN` ).
- [Container Registry API ](../../api/container_registry.md )
(scoped to the job's project, when the `ci_job_token_scope` feature flag is enabled).
- [Get job artifacts ](../../api/job_artifacts.md#get-job-artifacts ).
- [Get job token's job ](../../api/jobs.md#get-job-tokens-job ).
2022-11-25 23:54:43 +05:30
- [Pipeline triggers ](../../api/pipeline_triggers.md ), using the `token=` parameter
to [trigger a multi-project pipeline ](../pipelines/downstream_pipelines.md#trigger-a-multi-project-pipeline-by-using-the-api ).
2022-07-23 23:45:48 +05:30
- [Releases ](../../api/releases/index.md ) and [Release links ](../../api/releases/links.md ).
2021-11-11 11:23:49 +05:30
- [Terraform plan ](../../user/infrastructure/index.md ).
2022-03-02 08:16:31 +05:30
The token has the same permissions to access the API as the user that caused the
2023-01-13 00:05:48 +05:30
job to run. A user can cause a job to run by taking action like pushing a commit,
triggering a manual job, or being the owner of a scheduled pipeline. Therefore, this user must be assigned to
2022-03-02 08:16:31 +05:30
[a role that has the required privileges ](../../user/permissions.md#gitlab-cicd-permissions ).
2021-11-11 11:23:49 +05:30
2023-06-20 00:43:36 +05:30
The token is valid only while the pipeline job runs. After the job finishes, you cannot
2021-11-11 11:23:49 +05:30
use the token anymore.
A job token can access a project's resources without any configuration, but it might
give extra permissions that aren't necessary. There is [a proposal ](https://gitlab.com/groups/gitlab-org/-/epics/3559 )
to redesign the feature for more strategic control of the access permissions.
You can also use the job token to authenticate and clone a repository from a private project
in a CI/CD job:
```shell
git clone https://gitlab-ci-token:${CI_JOB_TOKEN}@gitlab.example.com/< namespace > /< project >
```
## GitLab CI/CD job token security
To make sure that this token doesn't leak, GitLab:
- Masks the job token in job logs.
- Grants permissions to the job token only when the job is running.
To make sure that this token doesn't leak, you should also configure
your [runners ](../runners/index.md ) to be secure. Avoid:
2023-03-04 22:38:38 +05:30
- Using Docker `privileged` mode if the machines are re-used.
2021-11-11 11:23:49 +05:30
- Using the [`shell` executor ](https://docs.gitlab.com/runner/executors/shell.html ) when jobs
run on the same machine.
If you have an insecure GitLab Runner configuration, you increase the risk that someone
tries to steal tokens from other jobs.
2023-04-23 21:23:45 +05:30
## Configure CI/CD job token access
2021-11-11 11:23:49 +05:30
2023-04-23 21:23:45 +05:30
You can control what projects a CI/CD job token can access to increase the
2021-11-11 11:23:49 +05:30
job token's security. A job token might give extra permissions that aren't necessary
2023-05-27 22:25:52 +05:30
to access specific private resources. The job token scope only controls access
to private projects. If an accessed project is public or internal, token scoping does
not apply.
2023-04-23 21:23:45 +05:30
If a job token is leaked, it could potentially be used to access private data
2021-11-18 22:05:49 +05:30
to the job token's user. By limiting the job token access scope, private data cannot
be accessed unless projects are explicitly authorized.
2021-11-11 11:23:49 +05:30
2023-04-23 21:23:45 +05:30
There is a proposal to add more strategic control of the access permissions,
see [epic 3559 ](https://gitlab.com/groups/gitlab-org/-/epics/3559 ).
2023-06-20 00:43:36 +05:30
NOTE:
Because `CI_REGISTRY_TOKEN` uses `CI_JOB_TOKEN` to authenticate, the access configuration
also applies to `CI_REGISTRY_TOKEN` .
2023-04-23 21:23:45 +05:30
### Allow access to your project with a job token
2023-06-20 00:43:36 +05:30
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/346298/) in GitLab 15.9. [Deployed behind the `:inbound_ci_scoped_job_token` feature flag](../../user/feature_flags.md), enabled by default.
> - [Feature flag removed](https://gitlab.com/gitlab-org/gitlab/-/issues/346298/) in GitLab 15.10.
2023-04-23 21:23:45 +05:30
2023-06-20 00:43:36 +05:30
Create an allowlist of projects which can access your project through
2023-05-27 22:25:52 +05:30
their `CI_JOB_TOKEN` .
2023-04-23 21:23:45 +05:30
2023-06-20 00:43:36 +05:30
For example, project `A` can add project `B` to the allowlist. CI/CD jobs
2023-05-27 22:25:52 +05:30
in project `B` (the "allowed project") can now use their CI/CD job token to
authenticate API calls to access project `A` . If project `A` is public or internal,
2023-06-20 00:43:36 +05:30
the project can be accessed by project `B` without adding it to the allowlist.
2023-04-23 21:23:45 +05:30
2023-06-20 00:43:36 +05:30
By default, the allowlist of any project only includes itself.
2023-04-23 21:23:45 +05:30
It is a security risk to disable this feature, so project maintainers or owners should
keep this setting enabled at all times. Add projects to the allowlist only when cross-project
access is needed.
2023-06-20 00:43:36 +05:30
### Disable the job token scope allowlist
2023-04-23 21:23:45 +05:30
WARNING:
It is a security risk to disable the allowlist. A malicious user could try to compromise
a pipeline created in an unauthorized project. If the pipeline was created by one of
your maintainers, the job token could be used in an attempt to access your project.
2023-06-20 00:43:36 +05:30
You can disable the job token scope allowlist for testing or a similar reason,
2023-04-23 21:23:45 +05:30
but you should enable it again as soon as possible.
Prerequisite:
- You must have at least the Maintainer role for the project.
2023-06-20 00:43:36 +05:30
To disable the job token scope allowlist:
2023-04-23 21:23:45 +05:30
1. On the top bar, select **Main menu > Projects** and find your project.
1. On the left sidebar, select **Settings > CI/CD** .
1. Expand **Token Access** .
1. Toggle **Allow access to this project with a CI_JOB_TOKEN** to disabled.
Enabled by default in new projects.
2023-05-27 22:25:52 +05:30
You can also disable the allowlist [with the API ](../../api/graphql/reference/index.md#mutationprojectcicdsettingsupdate ).
2023-06-20 00:43:36 +05:30
### Add a project to the job token scope allowlist
2023-04-23 21:23:45 +05:30
2023-06-20 00:43:36 +05:30
You can add projects to the allowlist for a project. Projects added to the allowlist
2023-04-23 21:23:45 +05:30
can make API calls from running pipelines by using the CI/CD job token.
Prerequisite:
- You must have at least the Maintainer role in the current project and at least
the Guest role in the allowed project.
- You must not have more than 100 projects added to the allowlist.
To add a project:
1. On the top bar, select **Main menu > Projects** and find your project.
1. On the left sidebar, select **Settings > CI/CD** .
1. Expand **Token Access** .
1. Verify **Allow access to this project with a CI_JOB_TOKEN** is enabled.
1. Under **Allow CI job tokens from the following projects to access this project** ,
add projects to the allowlist.
2023-05-27 22:25:52 +05:30
You can also add a target project to the allowlist [with the API ](../../api/graphql/reference/index.md#mutationcijobtokenscopeaddproject ).
2023-04-23 21:23:45 +05:30
### Limit your project's job token access
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/328553) in GitLab 14.1. [Deployed behind the `:ci_scoped_job_token` feature flag](../../user/feature_flags.md), disabled by default.
> - [Enabled on GitLab.com and self-managed](https://gitlab.com/gitlab-org/gitlab/-/issues/332272) in GitLab 14.4.
> - [Feature flag removed](https://gitlab.com/gitlab-org/gitlab/-/issues/332272) in GitLab 14.6.
NOTE:
This feature is disabled by default for all new projects and is [scheduled for removal ](https://gitlab.com/gitlab-org/gitlab/-/issues/383084 )
2023-06-20 00:43:36 +05:30
in GitLab 16.0. Project maintainers or owners should enable the access control instead.
2023-04-23 21:23:45 +05:30
2023-06-20 00:43:36 +05:30
Control your project's job token scope by creating an allowlist of projects which
2023-04-23 21:23:45 +05:30
can be accessed by your project's job token.
By default, the allowlist includes your current project.
2021-11-11 11:23:49 +05:30
Other projects can be added and removed by maintainers with access to both projects.
2023-04-23 21:23:45 +05:30
With the setting disabled, all projects are considered in the allowlist and the job token is
limited only by the user's access permissions.
2021-11-11 11:23:49 +05:30
For example, when the setting is enabled, jobs in a pipeline in project `A` have
a `CI_JOB_TOKEN` scope limited to project `A` . If the job needs to use the token
to make an API request to a private project `B` , then `B` must be added to the allowlist for `A` .
2023-05-27 22:25:52 +05:30
If project `B` is public or internal, you do not need to add
`B` to the allowlist to grant access.
2021-11-11 11:23:49 +05:30
2023-06-20 00:43:36 +05:30
### Configure the job token scope
2023-04-23 21:23:45 +05:30
Prerequisite:
- You must not have more than 100 projects added to the token's scope.
2023-06-20 00:43:36 +05:30
To configure the job token scope:
2021-11-11 11:23:49 +05:30
2022-10-11 01:57:18 +05:30
1. On the top bar, select **Main menu > Projects** and find your project.
2021-11-11 11:23:49 +05:30
1. On the left sidebar, select **Settings > CI/CD** .
1. Expand **Token Access** .
1. Toggle **Limit CI_JOB_TOKEN access** to enabled.
2022-01-26 12:08:38 +05:30
1. Optional. Add existing projects to the token's access scope. The user adding a
2022-04-04 11:22:00 +05:30
project must have the Maintainer role in both projects.
2021-11-11 11:23:49 +05:30
## Download an artifact from a different pipeline **(PREMIUM)**
> `CI_JOB_TOKEN` for artifacts download with the API was [introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/2346) in GitLab 9.5.
You can use the `CI_JOB_TOKEN` to access artifacts from a job created by a previous
pipeline. You must specify which job you want to retrieve the artifacts from:
```yaml
build_submodule:
stage: test
script:
- apt update && apt install -y unzip
- curl --location --output artifacts.zip "https://gitlab.example.com/api/v4/projects/1/jobs/artifacts/main/download?job=test& job_token=$CI_JOB_TOKEN"
- unzip artifacts.zip
```
Read more about the [jobs artifacts API ](../../api/job_artifacts.md#download-the-artifacts-archive ).
2021-11-18 22:05:49 +05:30
## Troubleshooting
CI job token failures are usually shown as responses like `404 Not Found` or similar:
- Unauthorized Git clone:
```plaintext
$ git clone https://gitlab-ci-token:$CI_JOB_TOKEN@gitlab.com/fabiopitino/test2.git
Cloning into 'test2'...
remote: The project you were looking for could not be found or you don't have permission to view it.
fatal: repository 'https://gitlab-ci-token:[MASKED]@gitlab.com/< namespace > /< project > .git/' not found
```
- Unauthorized package download:
```plaintext
$ wget --header="JOB-TOKEN: $CI_JOB_TOKEN" ${CI_API_V4_URL}/projects/1234/packages/generic/my_package/0.0.1/file.txt
--2021-09-23 11:00:13-- https://gitlab.com/api/v4/projects/1234/packages/generic/my_package/0.0.1/file.txt
Resolving gitlab.com (gitlab.com)... 172.65.251.78, 2606:4700:90:0:f22e:fbec:5bed:a9b9
Connecting to gitlab.com (gitlab.com)|172.65.251.78|:443... connected.
HTTP request sent, awaiting response... 404 Not Found
2021-09-23 11:00:13 ERROR 404: Not Found.
```
- Unauthorized API request:
```plaintext
$ curl --verbose --request POST --form "token=$CI_JOB_TOKEN" --form ref=master "https://gitlab.com/api/v4/projects/1234/trigger/pipeline"
< HTTP / 2 404
< date: Thu , 23 Sep 2021 11:00:12 GMT
{"message":"404 Not Found"}
< content-type: application / json
```
While troubleshooting CI/CD job token authentication issues, be aware that:
2023-06-20 00:43:36 +05:30
- A [GraphQL example mutation ](../../api/graphql/getting_started.md#update-project-settings )
is available to toggle the scope settings per project.
2023-04-23 21:23:45 +05:30
- When the [CI/CD job token scopes ](#configure-cicd-job-token-access ) are enabled,
2021-11-18 22:05:49 +05:30
and the job token is being used to access a different project:
- The user that executes the job must be a member of the project that is being accessed.
- The user must have the [permissions ](../../user/permissions.md ) to perform the action.
2023-06-20 00:43:36 +05:30
- The accessed project must have the project attempting to access it [added to the allowlist ](#add-a-project-to-the-job-token-scope-allowlist ).
2021-11-18 22:05:49 +05:30
- The CI job token becomes invalid if the job is no longer running, has been erased,
or if the project is in the process of being deleted.