debian-mirror-gitlab/doc/ci/environments/protected_environments.md

165 lines
6.7 KiB
Markdown
Raw Normal View History

2019-09-04 21:01:54 +05:30
---
2020-05-24 23:13:21 +05:30
stage: Release
2021-02-22 17:27:13 +05:30
group: Release
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
2019-09-04 21:01:54 +05:30
type: concepts, howto
---
2021-03-11 19:13:27 +05:30
# Protected environments **(PREMIUM)**
2019-07-07 11:18:12 +05:30
2020-03-13 15:44:24 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/6303) in [GitLab Premium](https://about.gitlab.com/pricing/) 11.3.
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
[Environments](../environments/index.md) can be used for different reasons:
2019-07-07 11:18:12 +05:30
- Some of them are just for testing.
- Others are for production.
2019-07-31 22:56:46 +05:30
Since deploy jobs can be raised by different users with different roles, it is important that
specific environments are "protected" to prevent unauthorized people from affecting them.
2019-07-07 11:18:12 +05:30
By default, a protected environment does one thing: it ensures that only people
with the right privileges can deploy to it, thus keeping it safe.
2021-02-22 17:27:13 +05:30
NOTE:
2019-07-07 11:18:12 +05:30
A GitLab admin is always allowed to use environments, even if they are protected.
To protect, update, or unprotect an environment, you need to have at least
[Maintainer permissions](../../user/permissions.md).
## Protecting environments
To protect an environment:
1. Navigate to your project's **Settings > CI/CD**.
2021-03-11 19:13:27 +05:30
1. Expand the **Protected environments** section.
2019-07-07 11:18:12 +05:30
1. From the **Environment** dropdown menu, select the environment you want to protect.
2019-07-31 22:56:46 +05:30
1. In the **Allowed to Deploy** dropdown menu, select the role, users, or groups you
want to give deploy access to. Keep in mind that:
- There are two roles to choose from:
2021-03-08 18:12:59 +05:30
- **Maintainers**: Allows access to all maintainers in the project.
- **Developers**: Allows access to all maintainers and all developers in the project.
2019-07-31 22:56:46 +05:30
- You can only select groups that are already associated with the project.
2021-03-08 18:12:59 +05:30
- Only users that have at least the Developer permission level appear in
2019-07-31 22:56:46 +05:30
the **Allowed to Deploy** dropdown menu.
2019-07-07 11:18:12 +05:30
1. Click the **Protect** button.
2021-03-08 18:12:59 +05:30
The protected environment now appears in the list of protected environments.
2019-07-07 11:18:12 +05:30
2021-01-29 00:20:46 +05:30
### Use the API to protect an environment
Alternatively, you can use the API to protect an environment:
1. Use a project with a CI that creates an environment. For example:
```yaml
stages:
- test
- deploy
test:
stage: test
script:
- 'echo "Testing Application: ${CI_PROJECT_NAME}"'
production:
stage: deploy
when: manual
script:
- 'echo "Deploying to ${CI_ENVIRONMENT_NAME}"'
2021-04-29 21:17:54 +05:30
environment:
name: ${CI_JOB_NAME}
2021-01-29 00:20:46 +05:30
```
2021-04-17 20:07:23 +05:30
1. Use the UI to [create a new group](../../user/group/index.md#create-a-group).
2021-01-29 00:20:46 +05:30
For example, this group is called `protected-access-group` and has the group ID `9899826`. Note
that the rest of the examples in these steps use this group.
![Group Access](img/protected_access_group_v13_6.png)
1. Use the API to add a user to the group as a reporter:
```shell
2021-03-08 18:12:59 +05:30
$ curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" --data "user_id=3222377&access_level=20" "https://gitlab.com/api/v4/groups/9899826/members"
2021-01-29 00:20:46 +05:30
{"id":3222377,"name":"Sean Carroll","username":"sfcarroll","state":"active","avatar_url":"https://assets.gitlab-static.net/uploads/-/system/user/avatar/3222377/avatar.png","web_url":"https://gitlab.com/sfcarroll","access_level":20,"created_at":"2020-10-26T17:37:50.309Z","expires_at":null}
```
1. Use the API to add the group to the project as a reporter:
```shell
2021-03-08 18:12:59 +05:30
$ curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" --request POST "https://gitlab.com/api/v4/projects/22034114/share?group_id=9899826&group_access=20"
2021-01-29 00:20:46 +05:30
{"id":1233335,"project_id":22034114,"group_id":9899826,"group_access":20,"expires_at":null}
```
1. Use the API to add the group with protected environment access:
```shell
2021-03-08 18:12:59 +05:30
curl --header 'Content-Type: application/json' --request POST --data '{"name": "production", "deploy_access_levels": [{"group_id": 9899826}]}' --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.com/api/v4/projects/22034114/protected_environments"
2021-01-29 00:20:46 +05:30
```
The group now has access and can be seen in the UI.
2020-11-24 15:15:51 +05:30
## Environment access by group membership
A user may be granted access to protected environments as part of
[group membership](../../user/group/index.md). Users with
[Reporter permissions](../../user/permissions.md), can only be granted access to
protected environments with this method.
## Deployment branch access
Users with [Developer permissions](../../user/permissions.md) can be granted
access to a protected environment through any of these methods:
- As an individual contributor, through a role.
- Through a group membership.
If the user also has push or merge access to the branch deployed on production,
they have the following privileges:
- [Stopping an environment](index.md#stopping-an-environment).
- [Delete a stopped environment](index.md#delete-a-stopped-environment).
- [Create an environment terminal](index.md#web-terminals).
## Deployment-only access to protected environments
Users granted access to a protected environment, but not push or merge access
2021-04-17 20:07:23 +05:30
to the branch deployed to it, are only granted access to deploy the environment. An individual in a
group with the Reporter permission, or in groups added to the project with Reporter permissions,
appears in the dropdown menu for deployment-only access.
2020-11-24 15:15:51 +05:30
2021-04-17 20:07:23 +05:30
To add deployment-only access:
1. Add a group with Reporter permissions.
1. Add user(s) to the group.
1. Invite the group to be a project member.
1. Follow the steps outlined in [Protecting Environments](#protecting-environments).
Note that deployment-only access is the only possible access level for groups with [Reporter permissions](../../user/permissions.md).
2020-11-24 15:15:51 +05:30
2019-07-07 11:18:12 +05:30
## Modifying and unprotecting environments
Maintainers can:
2019-07-31 22:56:46 +05:30
- Update existing protected environments at any time by changing the access in the
**Allowed to Deploy** dropdown menu.
- Unprotect a protected environment by clicking the **Unprotect** button for that environment.
2019-09-04 21:01:54 +05:30
2020-11-24 15:15:51 +05:30
After an environment is unprotected, all access entries are deleted and must
be re-entered if the environment is re-protected.
2020-06-23 00:09:42 +05:30
For more information, see [Deployment safety](deployment_safety.md).
2019-09-04 21:01:54 +05:30
<!-- ## Troubleshooting
Include any troubleshooting steps that you can foresee. If you know beforehand what issues
one might have when setting this up, or when something is changed, or on upgrading, it's
important to describe those, too. Think of things that may go wrong and include them here.
This is important to minimize requests for support, and to avoid doc comments with
questions that you know someone might ask.
Each scenario can be a third-level heading, e.g. `### Getting error message X`.
If you have none to add when creating a doc, leave this section in place
but commented out to help encourage others to add to it in the future. -->