Skip to content

Organization profiles

An organization profile defines sets of repository access and permissions available to agents associated with the Buildkite organization, optionally restricted to specific pipelines via match rules.

The location of the organizational profile is configured via the GITHUB_ORG_PROFILE environment variable.

Profile-related tokens are requested via separate URL paths. Tokens will not be vended on these paths unless configuration is present.

Profiles are useful for a variety of use cases where low-risk access is required by a wide set of repositories. For example:

  • Accessing private packages or releases
  • Loading Buildkite plugins from private repositories
  • Cloning or reading multiple private repositories within a pipeline

The organization profile is provided as a YAML file with structure as follows:

organization:
profiles:
- name: "<profile-name>"
match: # Optional: restricts which pipelines can use this profile
- claim: "<claim-name>"
value: "<exact-value>" # OR
valuePattern: "<regex>" # One of value/valuePattern required
repositories:
- "<repository-name>"
permissions: ["<permission>"]

The root element that contains all organization-related configurations.

A list of profiles within the organization. Each profile must contain:

The name of the profile. This should be a unique identifier for the profile.

(optional)

A list of conditions that must all be satisfied (AND logic) for a pipeline to use this profile. If omitted or empty, the profile is available to all pipelines.

Each match rule must specify:

  • claim: The JWT claim name to match against (see allowed claims below)
  • value: Exact string match, OR
  • valuePattern: RE2 regex pattern (automatically anchored for full-string matching)

A list of repositories that the profile has access to. This list includes only the repository name and does not include the owner or organization name.

A list of permissions granted to the profile. See the GitHub documentation for tokens for available permission values.

The following JWT claims can be used in match rules:

ClaimDescription
pipeline_slugPipeline’s slug
pipeline_idPipeline UUID
build_numberBuild number (as string)
build_branchGit branch name
build_tagGit tag (if present)
build_commitGit commit SHA
cluster_id, cluster_nameCluster identifiers
queue_id, queue_keyQueue identifiers
agent_tag:NAMEDynamic agent tags (e.g., agent_tag:queue)
organization:
profiles:
# allow read access to a set of buildkite-plugins
- name: "buildkite-plugin"
# array of repos accessible to the profile
repositories:
- somewhat-private-buildkite-plugin
- very-private-buildkite-plugin
permissions: ["contents:read"]
# allow package access to any repository
- name: "package-registry"
# '*' indicates all, when specified must be only value. No other wildcards supported.
repositories: ["*"]
permissions: ["packages:read"]
# allow write access only for release pipelines on main branch
- name: "release-publisher"
match:
- claim: pipeline_slug
valuePattern: ".*-release"
- claim: build_branch
value: "main"
repositories: ["release-tools", "shared-infra"]
permissions: ["contents:write", "packages:write"]