Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Tatuya Kamada
gitlab-ce
Commits
6c88a9df
Commit
6c88a9df
authored
Oct 13, 2016
by
Achilleas Pipinellis
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Add more info on the new CI permissions model
[ci skip]
parent
21e3712a
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
36 additions
and
18 deletions
+36
-18
doc/user/project/new_ci_build_permissions_model.md
doc/user/project/new_ci_build_permissions_model.md
+36
-18
No files found.
doc/user/project/new_ci_build_permissions_model.md
View file @
6c88a9df
...
@@ -87,20 +87,6 @@ your Runners in the most possible secure way, by avoiding the following:
...
@@ -87,20 +87,6 @@ your Runners in the most possible secure way, by avoiding the following:
By using an insecure GitLab Runner configuration, you allow the rogue developers
By using an insecure GitLab Runner configuration, you allow the rogue developers
to steal the tokens of other builds.
to steal the tokens of other builds.
## Debugging problems
With the new permission model in place, there may be times that your build will
fail. This is most likely because your project tries to access other project's
sources, and you don't have the appropriate permissions. In the build log look
for information about 403 or forbidden access messages
As an Administrator, you can verify that the user is a member of the group or
project they're trying to have access to, and you can impersonate the user to
retry the failing build in order to verify that everything is correct.
You need to make sure that your installation has HTTPS cloning enabled.
HTTPS support is required by GitLab CI to clone all sources.
## Build triggers
## Build triggers
[
Build triggers
][
triggers
]
do not support the new permission model.
[
Build triggers
][
triggers
]
do not support the new permission model.
...
@@ -152,17 +138,46 @@ with GitLab 8.12.
...
@@ -152,17 +138,46 @@ with GitLab 8.12.
## Making use of the new CI build permissions model
## Making use of the new CI build permissions model
With the new build permission model, there is now an easy way to access all
With the new build permission
s
model, there is now an easy way to access all
dependent source code in a project. That way, we can:
dependent source code in a project. That way, we can:
1.
Access a project's Git submodules
1.
Access a project's Git submodules
1.
Access private container images
1.
Access private container images
1.
Access project's and submodule LFS objects
1.
Access project's and submodule LFS objects
Let's see how that works with Git submodules and private Docker images hosted on
Below you can see the prerequisites needed to make use of the new permissions
model and how that works with Git submodules and private Docker images hosted on
the container registry.
the container registry.
## Git submodules
### Prerequisites to use the new permissions model
With the new permissions model in place, there may be times that your build will
fail. This is most likely because your project tries to access other project's
sources, and you don't have the appropriate permissions. In the build log look
for information about 403 or forbidden access messages.
In short here's what you need to do should you encounter any issues.
As an administrator:
-
**500 errors**
: You will need to update
[
GitLab Workhorse
][
workhorse
]
to at
least 0.8.2. This is done automatically for Omnibus installations, you need to
check manually for installations from source.
-
**500 errors**
: Check if you have another web proxy sitting in front of NGINX (HAProxy,
Apache, etc.). It might be a good idea to let GitLab use the internal NGINX
web server and not disable it completely. See
[
this comment
][
comment
]
for an
example.
-
**403 errors**
: You need to make sure that your installation has
[
HTTP(S)
cloning enabled
][
https
]
. HTTP(S) support is now a
**requirement**
by GitLab CI
to clone all sources.
As a user:
-
Make sure you are a member of the group or project you're trying to have
access to. As an Administrator, you can verify that by impersonating the user
and retry the failing build in order to verify that everything is correct.
### Git submodules
>
>
It often happens that while working on one project, you need to use another
It often happens that while working on one project, you need to use another
...
@@ -286,7 +301,10 @@ test:
...
@@ -286,7 +301,10 @@ test:
- docker run $CI_REGISTRY/group/other-project:latest
- docker run $CI_REGISTRY/group/other-project:latest
```
```
[
git-scm
]:
https://git-scm.com/book/en/v2/Git-Tools-Submodules
[
build permissions
]:
../permissions.md#builds-permissions
[
build permissions
]:
../permissions.md#builds-permissions
[
comment
]:
https://gitlab.com/gitlab-org/gitlab-ce/issues/22484#note_16648302
[
ext
]:
../permissions.md#external-users
[
ext
]:
../permissions.md#external-users
[
git-scm
]:
https://git-scm.com/book/en/v2/Git-Tools-Submodules
[
https
]:
../admin_area/settings/visibility_and_access_controls.md#enabled-git-access-protocols
[
triggers
]:
../../ci/triggers/README.md
[
triggers
]:
../../ci/triggers/README.md
[
workhorse
]:
https://gitlab.com/gitlab-org/gitlab-workhorse
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment