debian-mirror-gitlab/doc/user/project/deploy_keys/index.md

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

196 lines
8.2 KiB
Markdown
Raw Normal View History

2020-06-23 00:09:42 +05:30
---
stage: Release
2021-02-22 17:27:13 +05:30
group: Release
2022-11-25 23:54:43 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
2020-06-23 00:09:42 +05:30
---
2022-03-02 08:16:31 +05:30
# Deploy keys **(FREE)**
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
Use deploy keys to access repositories that are hosted in GitLab. In most cases, you use deploy keys
to access a repository from an external host, like a build server or Continuous Integration (CI) server.
2020-06-23 00:09:42 +05:30
2022-08-27 11:52:29 +05:30
Depending on your needs, you might want to use a [deploy token](../deploy_tokens/index.md) to access a repository instead.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
| Attribute | Deploy key | Deploy token |
|------------------|-------------|--------------|
| Sharing | Shareable between multiple projects, even those in different groups. | Belong to a project or group. |
| Source | Public SSH key generated on an external host. | Generated on your GitLab instance, and is provided to users only at creation time. |
2023-03-17 16:20:25 +05:30
| Validity | Valid as long as it's registered and enabled, and the user that created it exists. | Can be given an expiration date. |
2022-05-07 20:08:51 +05:30
| Registry access | Cannot access a package registry. | Can read from and write to a package registry. |
2020-06-23 00:09:42 +05:30
2023-01-10 11:22:00 +05:30
Deploy keys can't be used for Git operations if [external authorization](../../admin_area/settings/external_authorization.md) is enabled.
2022-05-07 20:08:51 +05:30
## Scope
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
A deploy key has a defined scope when it is created:
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
- **Project deploy key:** Access is limited to the selected project.
- **Public deploy key:** Access can be granted to _any_ project in a GitLab instance. Access to each
project must be [granted](#grant-project-access-to-a-public-deploy-key) by a user with at least
the Maintainer role.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
You cannot change a deploy key's scope after creating it.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
## Permissions
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
A deploy key is given a permission level when it is created:
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
- **Read-only:** A read-only deploy key can only read from the repository.
- **Read-write:** A read-write deploy key can read from, and write to, the repository.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
You can change a deploy key's permission level after creating it. Changing a project deploy key's
permissions only applies for the current project.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
When a read-write deploy key is used to push a commit, GitLab checks if the creator of the
deploy key has permission to access the resource.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
For example:
2020-06-23 00:09:42 +05:30
- When a deploy key is used to push a commit to a [protected branch](../protected_branches.md),
2022-05-07 20:08:51 +05:30
the _creator_ of the deploy key must have access to the branch.
- When a deploy key is used to push a commit that triggers a CI/CD pipeline, the _creator_ of the
deploy key must have access to the CI/CD resources, including protected environments and secret
variables.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
## View deploy keys
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
To view the deploy keys available to a project:
2020-06-23 00:09:42 +05:30
2022-10-11 01:57:18 +05:30
1. On the top bar, select **Main menu > Projects** and find your project.
2021-12-11 22:18:48 +05:30
1. On the left sidebar, select **Settings > Repository**.
1. Expand **Deploy keys**.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
The deploy keys available are listed:
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
- **Enabled deploy keys:** Deploy keys that have access to the project.
- **Privately accessible deploy keys:** Project deploy keys that don't have access to the project.
- **Public accessible deploy keys:** Public deploy keys that don't have access to the project.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
## Create a project deploy key
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
Prerequisites:
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
- You must have at least the Maintainer role for the project.
2022-06-21 17:19:12 +05:30
- [Generate an SSH key pair](../../ssh.md#generate-an-ssh-key-pair). Put the private SSH
2022-05-07 20:08:51 +05:30
key on the host that requires access to the repository.
2020-06-23 00:09:42 +05:30
2022-10-11 01:57:18 +05:30
1. On the top bar, select **Main menu > Projects** and find your project.
2022-05-07 20:08:51 +05:30
1. On the left sidebar, select **Settings > Repository**.
1. Expand **Deploy keys**.
1. Complete the fields.
1. Optional. To grant `read-write` permission, select the **Grant write permissions to this key**
checkbox.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
A project deploy key is enabled when it is created. You can modify only a project deploy key's
name and permissions.
2020-06-23 00:09:42 +05:30
2022-08-13 15:12:31 +05:30
## Create a public deploy key **(FREE SELF)**
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
Prerequisites:
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
- You must have administrator access.
2022-06-21 17:19:12 +05:30
- [Generate an SSH key pair](../../ssh.md#generate-an-ssh-key-pair). Put the private SSH
2022-05-07 20:08:51 +05:30
key on the host that requires access to the repository.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
To create a public deploy key:
2020-06-23 00:09:42 +05:30
2022-10-11 01:57:18 +05:30
1. On the top bar, select **Main menu > Admin**.
2021-09-30 23:02:18 +05:30
1. On the left sidebar, select **Deploy Keys**.
1. Select **New deploy key**.
2022-05-07 20:08:51 +05:30
1. Complete the fields.
- Use a meaningful description for **Name**. For example, include the name of the external host
or application that will use the public deploy key.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
You can modify only a public deploy key's name.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
## Grant project access to a public deploy key
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
Prerequisites:
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
- You must have at least the Maintainer role for the project.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
To grant a public deploy key access to a project:
2020-06-23 00:09:42 +05:30
2022-10-11 01:57:18 +05:30
1. On the top bar, select **Main menu > Projects** and find your project.
2022-05-07 20:08:51 +05:30
1. On the left sidebar, select **Settings > Repository**.
1. Expand **Deploy keys**.
1. Select **Publicly accessible deploy keys**.
1. In the key's row, select **Enable**.
1. To grant read-write permission to the public deploy key:
1. In the key's row, select **Edit** (**{pencil}**).
1. Select the **Grant write permissions to this key** checkbox.
## Revoke project access of a deploy key
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
To revoke a deploy key's access to a project, you can disable it. Any service that relies on
a deploy key stops working when the key is disabled.
2020-06-23 00:09:42 +05:30
2022-05-07 20:08:51 +05:30
Prerequisites:
2021-06-08 01:23:25 +05:30
2022-05-07 20:08:51 +05:30
- You must have at least the Maintainer role for the project.
To disable a deploy key:
2021-06-08 01:23:25 +05:30
2022-10-11 01:57:18 +05:30
1. On the top bar, select **Main menu > Projects** and find your project.
2021-12-11 22:18:48 +05:30
1. On the left sidebar, select **Settings > Repository**.
1. Expand **Deploy keys**.
1. Select **Disable** (**{cancel}**).
2021-06-08 01:23:25 +05:30
2022-05-07 20:08:51 +05:30
What happens to the deploy key when it is disabled depends on the following:
2021-06-08 01:23:25 +05:30
2022-05-07 20:08:51 +05:30
- If the key is publicly accessible, it is removed from the project but still available in the
**Publicly accessible deploy keys** tab.
- If the key is privately accessible and only in use by this project, it is deleted.
- If the key is privately accessible and also in use by other projects, it is removed from the
project, but still available in the **Privately accessible deploy keys** tab.
2021-06-08 01:23:25 +05:30
2020-06-23 00:09:42 +05:30
## Troubleshooting
2021-03-11 19:13:27 +05:30
### Deploy key cannot push to a protected branch
2020-06-23 00:09:42 +05:30
2022-08-27 11:52:29 +05:30
There are a few scenarios where a deploy key will fail to push to a
[protected branch](../protected_branches.md).
2020-06-23 00:09:42 +05:30
2021-11-18 22:05:49 +05:30
- The owner associated to a deploy key does not have access to the protected branch.
- The owner associated to a deploy key does not have [membership](../members/index.md) to the project of the protected branch.
2022-05-07 20:08:51 +05:30
- **No one** is selected in [the **Allowed to push** section](../protected_branches.md#configure-a-protected-branch) of the protected branch.
2021-11-18 22:05:49 +05:30
All deploy keys are associated to an account. Since the permissions for an account can change, this might lead to scenarios where a deploy key that was working is suddenly unable to push to a protected branch.
We recommend you create a service account, and associate a deploy key to the service account, for projects using deploy keys.
2022-11-25 23:54:43 +05:30
#### Identify deploy keys associated with non-member and blocked users
If you need to find the keys that belong to a non-member or blocked user,
you can use [the Rails console](../../../administration/operations/rails_console.md#starting-a-rails-console-session) to identify unusable deploy keys using a script similar to the following:
```ruby
ghost_user_id = User.ghost.id
DeployKeysProject.with_write_access.find_each do |deploy_key_mapping|
project = deploy_key_mapping.project
deploy_key = deploy_key_mapping.deploy_key
user = deploy_key.user
access_checker = Gitlab::DeployKeyAccess.new(deploy_key, container: project)
# can_push_for_ref? tests if deploy_key can push to default branch, which is likely to be protected
can_push = access_checker.can_do_action?(:push_code)
can_push_to_default = access_checker.can_push_for_ref?(project.repository.root_ref)
next if access_checker.allowed? && can_push && can_push_to_default
if user.nil? || user.id == ghost_user_id
username = 'none'
state = '-'
else
username = user.username
user_state = user.state
end
puts "Deploy key: #{deploy_key.id}, Project: #{project.full_path}, Can push?: " + (can_push ? 'YES' : 'NO') +
", Can push to default branch #{project.repository.root_ref}?: " + (can_push_to_default ? 'YES' : 'NO') +
", User: #{username}, User state: #{user_state}"
end
```