doc/development/permissions/granular_access/rest_api_implementation_guide.md
To reduce the security impact of compromised Personal Access Tokens (PATs), granular or fine-grained PATs allow users to create tokens with fine-grained permissions limited to specific organizational boundaries (groups, projects, user, or instance-level). This enables users to follow the principle of least privilege by granting tokens only the permissions they need.
Granular PATs allow fine-grained access control through granular scopes that consist of a boundary and specific resource permissions. When authenticating API requests with a granular PAT, GitLab validates that the token's permissions include access to the requested resource at the specified boundary level.
This documentation is designed for community contributors and GitLab developers who want to make REST API endpoints compliant with granular PAT authorization.
This guide walks you through adding granular PAT authorization to REST API endpoints. Before starting, review the Permission Naming Conventions documentation to understand the terminology used throughout.
[!note] These steps cover REST API endpoints only. For adding support to GraphQL queries and mutations, refer to the GraphQL implementation guide.
The implementation follows this flow:
Quick reference showing what you create in each step:
| Step | File Type | Location | Quantity | Example |
|---|---|---|---|---|
| 2 | Planning document | (mental notes) | — | Permission names identified |
| 3 | Raw permission YAML | config/authz/permissions/<resource>/<action>.yml | 1 per permission | config/authz/permissions/job/read.yml |
| 3 | Raw permission resource metadata | config/authz/permissions/<resource>/.metadata.yml | 1 per resource | config/authz/permissions/job/.metadata.yml |
| 4 | Assignable permission YAML | config/authz/permission_groups/assignable_permissions/<category>/<resource>/<action>.yml | 1 per group | config/authz/permission_groups/assignable_permissions/ci_cd/job/run.yml |
| 4 (optional) | Category metadata | config/authz/permission_groups/assignable_permissions/<category>/.metadata.yml | 0 or 1 per category | config/authz/permission_groups/assignable_permissions/ci_cd/.metadata.yml |
| 4 | Resource metadata | config/authz/permission_groups/assignable_permissions/<category>/<resource>/.metadata.yml | 1 per resource | config/authz/permission_groups/assignable_permissions/ci_cd/job/.metadata.yml |
| 5 | Grape decorators | Modify lib/api/<resource>.rb | 1 per endpoint | Added route_setting :authorization |
| 6 | RSpec tests | Modify spec/requests/api/<resource>_spec.rb | 1 per endpoint | Added it_behaves_like 'authorizing...' |
Goal: Find all REST API endpoints for the resource you're working on.
Locate the API file for your resource in lib/api/<resource_name>.rb.
Example: For the jobs resource, open lib/api/ci/jobs.rb
Tips:
resources :resource_name do blocks that define nested endpointsIdentify all HTTP method/route pairs in the file. Document each endpoint with its HTTP verb:
get ':id/jobs'
get ':id/jobs/:job_id'
post ':id/jobs/:job_id/cancel'
post ':id/jobs/:job_id/retry'
delete ':id/jobs/:job_id/artifacts'
Check if any endpoints already have authorization decorators (route_setting :authorization). You'll need to:
[!note] These endpoints are the basis for the raw permissions you'll create in the next step. Each unique operation (HTTP verb + route) typically needs its own permission.
Goal: Define granular permissions following GitLab naming conventions.
For the naming conventions, see Naming Permissions in the conventions documentation.
When implementing granular PAT authorization, name permissions based on what the endpoint modifies or returns, not the route structure.
Examples:
DELETE /projects/:id/jobs/:job_id/artifacts → modifies artifacts → permission name is delete_job_artifactGET /projects/:id/issues → returns issues → permission name is read_issuePOST /projects/:id/jobs/:job_id/cancel → modifies the job status → permission name is cancel_jobread_resource permission for both
GET /projects/:id/jobs → read_jobGET /projects/:id/jobs/:job_id → read_jobPOST /projects/:id/pipeline_schedules/:pipeline_schedule_id/variables → create_pipeline_schedule_variableupdate_issue covers updating title, description, assignees, etc.update_issue_description, update_issue_titleGoal: Create YAML definition files for each permission, if they don't exist yet.
Follow the instructions in the Permission Definition File section to create raw permission YAML files using the bin/permission command.
Goal: Create assignable permissions that bundle related raw permissions for a simpler user experience.
Follow the instructions in the Assignable Permissions section to create assignable permission YAML files.
For each endpoint, add the route_setting :authorization decorator immediately before the route definition:
route_setting :authorization, permissions: :read_job, boundary_type: :project
get ':id/jobs' do
# endpoint implementation
end
| Option | Description |
|---|---|
permissions | The permission(s) required for this endpoint (symbol or array of symbols) |
boundary_type | The boundary type for single-boundary endpoints: :project, :group, :user, or :instance |
boundary_param | Optional. The request parameter containing the boundary identifier. Defaults to :id for projects and :id or :group_id for groups |
boundaries | Alternative to boundary_type for endpoints supporting multiple boundaries (see below) |
boundary | Alternative to boundary_type for endpoints where the boundary cannot be determined through standard parameter lookup. A callable object (proc, lambda, or method) that returns the boundary object |
skip_granular_token_authorization | Optional. When set to true, allows granular PATs to access the endpoint without requiring specific permissions (see below) |
Example with custom boundary_param:
route_setting :authorization, permissions: :read_job, boundary_type: :project, boundary_param: :project_id
get 'jobs' do
# endpoint uses params[:project_id] instead of params[:id]
end
Example using boundary:
def registry
::VirtualRegistries::Packages::Maven::Registry.find(params[:id])
end
route_setting :authorization, permissions: :download_maven_package_file, boundary: -> { registry.group }, boundary_type: :group
get '/api/v4/virtual_registries/packages/maven/:id/*path' do
# Boundary cannot be determined through `params`. Instead, it is determined
# from an object (registry) fetched using an ID from the endpoint's
# parameters.
end
Some endpoints may need to support multiple boundary types. For example, an import endpoint might work at the group level when importing into a group namespace, or at the user level when importing into a personal namespace. In these cases, use the boundaries option instead of boundary_type or boundary:
route_setting :authorization, permissions: :create_bitbucket_import,
boundaries: [{ boundary_type: :group, boundary_param: :target_namespace }, { boundary_type: :user }]
post 'import/bitbucket' do
# endpoint implementation
end
When multiple boundaries are defined:
project > group > user > instanceboundary_type key and optionally a boundary_param key to specify which request parameter contains the boundary identifierSome endpoints don't require authentication and are publicly accessible, or do not implement token authentication. Since token authentication is skipped for these endpoints, defining granular permissions doesn't make sense. However, to maintain coverage tracking for all endpoints, use the skip_granular_token_authorization option:
route_setting :authorization, skip_granular_token_authorization: true
get 'public-endpoint' do
# endpoint implementation
end
When to use skip_granular_token_authorization:
Adding this decorator ensures that all endpoints are explicitly covered by the authorization system, even those that don't require permissions.
Important Notes:
get, post, put, delete)boundary_type or boundary for single-boundary endpoints; use boundaries array for multi-boundary endpointsskip_granular_token_authorization: true sparingly and only for endpoints that truly don't require permission checksGoal: Verify that granular PAT permissions are correctly enforced on endpoints.
Test files are usually located at spec/requests/api/<resource>_spec.rb. If you don't find them there, you may need to look around a bit more for the relevant spec files.
What These Tests Do: These tests verify that:
insufficient_granular_scope)granular_personal_access_tokens is properly enforced (denies access when disabled)For each endpoint, add the 'authorizing granular token permissions' shared example. This is a reusable test helper that validates authorization behavior:
it_behaves_like 'authorizing granular token permissions', :<permission_name> do
let(:boundary_object) { <boundary_object> }
let(:user) { <user> }
let(:request) do
<http_method> api("<endpoint_path>", personal_access_token: pat), params: <params_if_needed>
end
end
The boundary_object must match the boundary_type:
| Boundary Type | Boundary Object |
|---|---|
:project | project |
:group | group |
:user | :user |
:instance | :instance |
Important: When the boundary object is a :project or :group, the user must be a member of that namespace (project or group) for the authorization to be granted.
Goal: Manually test your implementation in a local environment to verify permissions work as expected before creating a merge request.
Use this if you want to test your endpoint and permissions in a Rails console before running the full test suite.
Setup:
In Rails console, create a granular PAT for a user and copy a URL to test the endpoint with the token:
# Enable feature flag
Feature.enable(:granular_personal_access_tokens)
user = User.human.first
# Create granular token
token = PersonalAccessTokens::CreateService.new(
current_user: user,
target_user: user,
organization_id: user.organization_id,
params: { expires_at: 1.month.from_now, scopes: ['granular'], granular: true, name: 'gPAT' }
).execute[:personal_access_token]
# Get the appropriate boundary object (project, group, :user, or :instance)
project = user.projects.first
boundary = Authz::Boundary.for(project)
# Create scope with the permission being tested (replace :read_job with your permission)
scope = Authz::GranularScope.new(namespace: boundary.namespace, access: boundary.access, permissions: [:read_job])
# Add the scope to the token
Authz::GranularScopeService.new(token).add_granular_scopes(scope)
# Copy the API endpoint URL with the token (replace with your endpoint)
IO.popen('pbcopy', 'w') { |f| f.puts "curl \"http://#{Gitlab.host_with_port}/api/v4/projects/#{project.id}/jobs\" --request GET --header \"PRIVATE-TOKEN: #{token.token}\"" }