Group-level protected environments API
DETAILS: Tier: Premium, Ultimate Offering: GitLab.com, Self-managed, GitLab Dedicated
- Introduced in GitLab 14.0. Deployed behind the
group_level_protected_environmentsflag, disabled by default.- Feature flag
group_level_protected_environmentsremoved in GitLab 14.3.- Generally available in GitLab 14.3.
Read more about group-level protected environments.
Valid access levels
The access levels are defined in the ProtectedEnvironments::DeployAccessLevel::ALLOWED_ACCESS_LEVELS method.
Currently, these levels are recognized:
30 => Developer access
40 => Maintainer access
60 => Admin accessList group-level protected environments
Gets a list of protected environments from a group.
GET /groups/:id/protected_environments| Attribute | Type | Required | Description | 
|---|---|---|---|
| id | integer/string | yes | The ID or URL-encoded path of the group maintained by the authenticated user. | 
curl --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/5/protected_environments/"Example response:
[
   {
      "name":"production",
      "deploy_access_levels":[
         {
            "id": 12,
            "access_level": 40,
            "access_level_description": "Maintainers",
            "user_id": null,
            "group_id": null
         }
      ],
      "required_approval_count": 0
   }
]Get a single protected environment
Gets a single protected environment.
GET /groups/:id/protected_environments/:name| Attribute | Type | Required | Description | 
|---|---|---|---|
| id | integer/string | yes | The ID or URL-encoded path of the group maintained by the authenticated user. | 
| name | string | yes | The deployment tier of the protected environment. One of production,staging,testing,development, orother. Read more about deployment tiers. | 
curl --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/5/protected_environments/production"Example response:
{
   "name":"production",
   "deploy_access_levels":[
      {
         "id": 12,
         "access_level":40,
         "access_level_description":"Maintainers",
         "user_id":null,
         "group_id":null
      }
   ],
   "required_approval_count": 0
}Protect a single environment
Protects a single environment.
POST /groups/:id/protected_environments| Attribute | Type | Required | Description | 
|---|---|---|---|
| id | integer/string | yes | The ID or URL-encoded path of the group maintained by the authenticated user. | 
| name | string | yes | The deployment tier of the protected environment. One of production,staging,testing,development, orother. Read more about deployment tiers. | 
| deploy_access_levels | array | yes | Array of access levels allowed to deploy, with each described by a hash. One of user_id,group_idoraccess_level. They take the form of{user_id: integer},{group_id: integer}or{access_level: integer}respectively. | 
| approval_rules | array | no | Array of access levels allowed to approve, with each described by a hash. One of user_id,group_idoraccess_level. They take the form of{user_id: integer},{group_id: integer}or{access_level: integer}respectively. You can also specify the number of required approvals from the specified entity withrequired_approvalsfield. See Multiple approval rules for more information. | 
The assignable user_id are the users who belong to the given group with the Maintainer role (or above).
The assignable group_id are the subgroups under the given group.
curl --header 'Content-Type: application/json' --request POST --data '{"name": "production", "deploy_access_levels": [{"group_id": 9899826}]}' --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/22034114/protected_environments"Example response:
{
   "name":"production",
   "deploy_access_levels":[
      {
         "id": 12,
         "access_level": 40,
         "access_level_description": "protected-access-group",
         "user_id": null,
         "group_id": 9899826
      }
   ],
   "required_approval_count": 0
}An example with multiple approval rules:
curl --header 'Content-Type: application/json' --request POST \
     --data '{"name": "production", "deploy_access_levels": [{"group_id": 138}], "approval_rules": [{"group_id": 134}, {"group_id": 135, "required_approvals": 2}]}' \
     --header "PRIVATE-TOKEN: <your_access_token>" \
     "https://gitlab.example.com/api/v4/groups/128/protected_environments"In this configuration, the operator group "group_id": 138 can execute the deployment job
to production only after the QA group "group_id": 134 and security group
"group_id": 135 have approved the deployment.
Update a protected environment
- Introduced in GitLab 15.4.
Updates a single environment.
PUT /groups/:id/protected_environments/:name| Attribute | Type | Required | Description | 
|---|---|---|---|
| id | integer/string | yes | The ID or URL-encoded path of the group maintained by the authenticated user. | 
| name | string | yes | The deployment tier of the protected environment. One of production,staging,testing,development, orother. Read more about deployment tiers. | 
| deploy_access_levels | array | no | Array of access levels allowed to deploy, with each described by a hash. One of user_id,group_idoraccess_level. They take the form of{user_id: integer},{group_id: integer}or{access_level: integer}respectively. | 
| required_approval_count | integer | no | The number of approvals required to deploy to this environment. | 
| approval_rules | array | no | Array of access levels allowed to approve, with each described by a hash. One of user_id,group_idoraccess_level. They take the form of{user_id: integer},{group_id: integer}or{access_level: integer}respectively. You can also specify the number of required approvals from the specified entity withrequired_approvalsfield. See Multiple approval rules for more information. | 
To update:
- 
user_id: Ensure the updated user belongs to the given group with the Maintainer role (or above). You must also pass theidof either adeploy_access_levelorapproval_rulein the respective hash.
- 
group_id: Ensure the updated group is a subgroup of the group this protected environment belongs to. You must also pass theidof either adeploy_access_levelorapproval_rulein the respective hash.
To delete:
- You must pass _destroyset totrue. See the following examples.
Example: Create a deploy_access_level record
curl --header 'Content-Type: application/json' --request PUT \
     --data '{"deploy_access_levels": [{"group_id": 9899829, access_level: 40}]}' \
     --header "PRIVATE-TOKEN: <your_access_token>" \
     "https://gitlab.example.com/api/v4/groups/22034114/protected_environments/production"Example response:
{
   "name": "production",
   "deploy_access_levels": [
      {
         "id": 12,
         "access_level": 40,
         "access_level_description": "protected-access-group",
         "user_id": null,
         "group_id": 9899829,
         "group_inheritance_type": 1
      }
   ],
   "required_approval_count": 0
}
Example: Update a deploy_access_level record
curl --header 'Content-Type: application/json' --request PUT \
     --data '{"deploy_access_levels": [{"id": 12, "group_id": 22034120}]}' \
     --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/22034114/protected_environments/production"{
   "name": "production",
   "deploy_access_levels": [
      {
         "id": 12,
         "access_level": 40,
         "access_level_description": "protected-access-group",
         "user_id": null,
         "group_id": 22034120,
         "group_inheritance_type": 0
      }
   ],
   "required_approval_count": 2
}
Example: Delete a deploy_access_level record
curl --header 'Content-Type: application/json' --request PUT \
     --data '{"deploy_access_levels": [{"id": 12, "_destroy": true}]}' \
     --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/22034114/protected_environments/production"Example response:
{
   "name": "production",
   "deploy_access_levels": [],
   "required_approval_count": 0
}
Example: Create an approval_rule record
curl --header 'Content-Type: application/json' --request PUT \
     --data '{"approval_rules": [{"group_id": 134, "required_approvals": 1}]}' \
     --header "PRIVATE-TOKEN: <your_access_token>" \
     "https://gitlab.example.com/api/v4/groups/22034114/protected_environments/production"Example response:
{
   "name": "production",
   "approval_rules": [
      {
         "id": 38,
         "user_id": null,
         "group_id": 134,
         "access_level": null,
         "access_level_description": "qa-group",
         "required_approvals": 1,
         "group_inheritance_type": 0
      }
   ]
}
Example: Update an approval_rule record
curl --header 'Content-Type: application/json' --request PUT \
     --data '{"approval_rules": [{"id": 38, "group_id": 135, "required_approvals": 2}]}' \
     --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/22034114/protected_environments/production"{
   "name": "production",
   "approval_rules": [
      {
         "id": 38,
         "user_id": null,
         "group_id": 135,
         "access_level": null,
         "access_level_description": "security-group",
         "required_approvals": 2,
         "group_inheritance_type": 0
      }
   ]
}
Example: Delete an approval_rule record
curl --header 'Content-Type: application/json' --request PUT \
     --data '{"approval_rules": [{"id": 38, "_destroy": true}]}' \
     --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/22034114/protected_environments/production"Example response:
{
   "name": "production",
   "approval_rules": []
}Unprotect a single environment
Unprotects the given protected environment.
DELETE /groups/:id/protected_environments/:name| Attribute | Type | Required | Description | 
|---|---|---|---|
| id | integer/string | yes | The ID or URL-encoded path of the group maintained by the authenticated user. | 
| name | string | yes | The deployment tier of the protected environment. One of production,staging,testing,development, orother. Read more about deployment tiers. | 
curl --request DELETE --header "PRIVATE-TOKEN: <your_access_token>" "https://gitlab.example.com/api/v4/groups/5/protected_environments/staging"The response should return a 200 code.