debian-mirror-gitlab/doc/ci/yaml/README.md

4038 lines
135 KiB
Markdown
Raw Normal View History

2019-09-04 21:01:54 +05:30
---
2020-06-23 00:09:42 +05:30
stage: Verify
group: Continuous Integration
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#designated-technical-writers
2019-09-04 21:01:54 +05:30
type: reference
---
2019-07-07 11:18:12 +05:30
# GitLab CI/CD Pipeline Configuration Reference
2015-09-25 12:07:36 +05:30
2020-04-08 14:13:33 +05:30
GitLab CI/CD [pipelines](../pipelines/index.md) are configured using a YAML file called `.gitlab-ci.yml` within each project.
2016-06-02 11:05:42 +05:30
2019-07-07 11:18:12 +05:30
The `.gitlab-ci.yml` file defines the structure and order of the pipelines and determines:
2018-05-09 12:01:36 +05:30
2019-07-07 11:18:12 +05:30
- What to execute using [GitLab Runner](https://docs.gitlab.com/runner/).
- What decisions to make when specific conditions are encountered. For example, when a process succeeds or fails.
This topic covers CI/CD pipeline configuration. For other CI/CD configuration information, see:
- [GitLab CI/CD Variables](../variables/README.md), for configuring the environment the pipelines run in.
- [GitLab Runner advanced configuration](https://docs.gitlab.com/runner/configuration/advanced-configuration.html), for configuring GitLab Runner.
We have complete examples of configuring pipelines:
2020-04-22 19:07:51 +05:30
- For a quick introduction to GitLab CI/CD, follow our [quick start guide](../quick_start/README.md).
2019-07-07 11:18:12 +05:30
- For a collection of examples, see [GitLab CI/CD Examples](../examples/README.md).
2019-12-21 20:55:43 +05:30
- To see a large `.gitlab-ci.yml` file used in an enterprise, see the [`.gitlab-ci.yml` file for `gitlab`](https://gitlab.com/gitlab-org/gitlab/blob/master/.gitlab-ci.yml).
2016-06-02 11:05:42 +05:30
2020-06-23 00:09:42 +05:30
> For some additional information about GitLab CI/CD:
>
> - <i class="fa fa-youtube-play youtube" aria-hidden="true"></i>&nbsp;Watch the [CI/CD Ease of configuration](https://www.youtube.com/embed/opdLqwz6tcE) video.
> - Watch the [Making the case for CI/CD in your organization](https://about.gitlab.com/compare/github-actions-alternative/)
> webcast to learn the benefits of CI/CD and how to measure the results of CI/CD automation.
> - <i class="fa fa-youtube-play youtube" aria-hidden="true"></i>&nbsp;Learn how [Verizon reduced rebuilds](https://about.gitlab.com/blog/2019/02/14/verizon-customer-story/)
> from 30 days to under 8 hours with GitLab.
2018-05-09 12:01:36 +05:30
NOTE: **Note:**
2019-12-26 22:10:19 +05:30
If you have a [mirrored repository where GitLab pulls from](../../user/project/repository/repository_mirroring.md#pulling-from-a-remote-repository-starter),
2018-05-09 12:01:36 +05:30
you may need to enable pipeline triggering in your project's
**Settings > Repository > Pull from a remote repository > Trigger pipelines for mirror updates**.
2016-06-02 11:05:42 +05:30
2019-07-07 11:18:12 +05:30
## Introduction
2015-12-23 02:04:40 +05:30
2019-07-07 11:18:12 +05:30
Pipeline configuration begins with jobs. Jobs are the most fundamental element of a `.gitlab-ci.yml` file.
Jobs are:
- Defined with constraints stating under what conditions they should be executed.
- Top-level elements with an arbitrary name and must contain at least the [`script`](#script) clause.
- Not limited in how many can be defined.
For example:
2015-09-25 12:07:36 +05:30
```yaml
job1:
script: "execute-script-for-job1"
job2:
script: "execute-script-for-job2"
```
2018-05-09 12:01:36 +05:30
The above example is the simplest possible CI/CD configuration with two separate
2015-12-23 02:04:40 +05:30
jobs, where each of the jobs executes a different command.
Of course a command can execute code directly (`./configure;make;make install`)
or run a script (`test.sh`) in the repository.
2015-09-25 12:07:36 +05:30
2017-08-17 22:00:37 +05:30
Jobs are picked up by [Runners](../runners/README.md) and executed within the
environment of the Runner. What is important, is that each job is run
independently from each other.
2015-09-25 12:07:36 +05:30
2019-12-21 20:55:43 +05:30
### Validate the `.gitlab-ci.yml`
2019-07-07 11:18:12 +05:30
2020-04-22 19:07:51 +05:30
Each instance of GitLab CI/CD has an embedded debug tool called Lint, which validates the
2019-07-07 11:18:12 +05:30
content of your `.gitlab-ci.yml` files. You can find the Lint under the page `ci/lint` of your
2019-07-31 22:56:46 +05:30
project namespace. For example, `https://gitlab.example.com/gitlab-org/project-123/-/ci/lint`.
2019-07-07 11:18:12 +05:30
### Unavailable names for jobs
2018-05-09 12:01:36 +05:30
Each job must have a unique name, but there are a few **reserved `keywords` that
2020-05-24 23:13:21 +05:30
can't be used as job names**:
2015-09-25 12:07:36 +05:30
2018-05-09 12:01:36 +05:30
- `image`
- `services`
- `stages`
- `types`
- `before_script`
- `after_script`
- `variables`
- `cache`
2020-01-01 13:55:28 +05:30
- `include`
2015-09-25 12:07:36 +05:30
2019-07-07 11:18:12 +05:30
### Using reserved keywords
If you get validation error when using specific values (for example, `true` or `false`), try to:
- Quote them.
- Change them to a different form. For example, `/bin/true`.
## Configuration parameters
A job is defined as a list of parameters that define the job's behavior.
The following table lists available parameters for jobs:
2020-05-24 23:13:21 +05:30
| Keyword | Description |
|:---------------------------------------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| [`script`](#script) | Shell script which is executed by Runner. |
2020-06-23 00:09:42 +05:30
| [`image`](#image) | Use Docker images. Also available: `image:name` and `image:entrypoint`. |
| [`services`](#services) | Use Docker services images. Also available: `services:name`, `services:alias`, `services:entrypoint`, and `services:command`. |
2020-05-24 23:13:21 +05:30
| [`before_script`](#before_script-and-after_script) | Override a set of commands that are executed before job. |
| [`after_script`](#before_script-and-after_script) | Override a set of commands that are executed after job. |
| [`stage`](#stage) | Defines a job stage (default: `test`). |
| [`only`](#onlyexcept-basic) | Limit when jobs are created. Also available: [`only:refs`, `only:kubernetes`, `only:variables`, and `only:changes`](#onlyexcept-advanced). |
| [`except`](#onlyexcept-basic) | Limit when jobs are not created. Also available: [`except:refs`, `except:kubernetes`, `except:variables`, and `except:changes`](#onlyexcept-advanced). |
| [`rules`](#rules) | List of conditions to evaluate and determine selected attributes of a job, and whether or not it's created. May not be used alongside `only`/`except`. |
| [`tags`](#tags) | List of tags which are used to select Runner. |
| [`allow_failure`](#allow_failure) | Allow job to fail. Failed job does not contribute to commit status. |
| [`when`](#when) | When to run job. Also available: `when:manual` and `when:delayed`. |
| [`environment`](#environment) | Name of an environment to which the job deploys. Also available: `environment:name`, `environment:url`, `environment:on_stop`, `environment:auto_stop_in` and `environment:action`. |
| [`cache`](#cache) | List of files that should be cached between subsequent runs. Also available: `cache:paths`, `cache:key`, `cache:untracked`, and `cache:policy`. |
2020-06-23 00:09:42 +05:30
| [`artifacts`](#artifacts) | List of files and directories to attach to a job on success. Also available: `artifacts:paths`, `artifacts:exclude`, `artifacts:expose_as`, `artifacts:name`, `artifacts:untracked`, `artifacts:when`, `artifacts:expire_in`, `artifacts:reports`, `artifacts:reports:junit`, `artifacts:reports:cobertura`, and `artifacts:reports:terraform`.<br><br>In GitLab [Enterprise Edition](https://about.gitlab.com/pricing/), these are available: `artifacts:reports:codequality`, `artifacts:reports:sast`, `artifacts:reports:dependency_scanning`, `artifacts:reports:container_scanning`, `artifacts:reports:dast`, `artifacts:reports:license_scanning`, `artifacts:reports:license_management` (removed in GitLab 13.0),`artifacts:reports:performance` and `artifacts:reports:metrics`. |
2020-05-24 23:13:21 +05:30
| [`dependencies`](#dependencies) | Restrict which artifacts are passed to a specific job by providing a list of jobs to fetch artifacts from. |
| [`coverage`](#coverage) | Code coverage settings for a given job. |
| [`retry`](#retry) | When and how many times a job can be auto-retried in case of a failure. |
| [`timeout`](#timeout) | Define a custom job-level timeout that takes precedence over the project-wide setting. |
| [`parallel`](#parallel) | How many instances of a job should be run in parallel. |
| [`trigger`](#trigger) | Defines a downstream pipeline trigger. |
| [`include`](#include) | Allows this job to include external YAML files. Also available: `include:local`, `include:file`, `include:template`, and `include:remote`. |
| [`extends`](#extends) | Configuration entries that this job is going to inherit from. |
| [`pages`](#pages) | Upload the result of a job to use with GitLab Pages. |
| [`variables`](#variables) | Define job variables on a job level. |
| [`interruptible`](#interruptible) | Defines if a job can be canceled when made redundant by a newer run. |
| [`resource_group`](#resource_group) | Limit job concurrency. |
2019-07-07 11:18:12 +05:30
NOTE: **Note:**
Parameters `types` and `type` are [deprecated](#deprecated-parameters).
2020-05-24 23:13:21 +05:30
## Global parameters
Some parameters must be defined at a global level, affecting all jobs in the pipeline.
### Global defaults
2019-09-30 21:07:59 +05:30
Some parameters can be set globally as the default for all jobs using the
`default:` keyword. Default parameters can then be overridden by job-specific
configuration.
The following job parameters can be defined inside a `default:` block:
- [`image`](#image)
- [`services`](#services)
- [`before_script`](#before_script-and-after_script)
- [`after_script`](#before_script-and-after_script)
2020-01-01 13:55:28 +05:30
- [`tags`](#tags)
2019-09-30 21:07:59 +05:30
- [`cache`](#cache)
2020-01-01 13:55:28 +05:30
- [`artifacts`](#artifacts)
- [`retry`](#retry)
- [`timeout`](#timeout)
2019-12-26 22:10:19 +05:30
- [`interruptible`](#interruptible)
2019-09-30 21:07:59 +05:30
In the following example, the `ruby:2.5` image is set as the default for all
jobs except the `rspec 2.6` job, which uses the `ruby:2.6` image:
```yaml
default:
image: ruby:2.5
rspec:
script: bundle exec rspec
rspec 2.6:
image: ruby:2.6
script: bundle exec rspec
```
2020-05-24 23:13:21 +05:30
#### `inherit`
2020-04-08 14:13:33 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/207484) in GitLab 12.9.
2020-04-08 14:13:33 +05:30
You can disable inheritance of globally defined defaults
and variables with the `inherit:` parameter.
To enable or disable the inheritance of all `variables:` or `default:` parameters, use the following format:
- `default: true` or `default: false`
- `variables: true` or `variables: false`
To inherit only a subset of `default:` parameters or `variables:`, specify what
you wish to inherit, and any not listed will **not** be inherited. Use
one of the following formats:
```yaml
inherit:
default: [parameter1, parameter2]
variables: [VARIABLE1, VARIABLE2]
```
Or:
```yaml
inherit:
default:
- parameter1
- parameter2
variables:
- VARIABLE1
- VARIABLE2
```
In the example below:
- `rubocop`:
- **will** inherit: Nothing.
- `rspec`:
- **will** inherit: the default `image` and the `WEBHOOK_URL` variable.
2020-05-24 23:13:21 +05:30
- will **not** inherit: the default `before_script` and the `DOMAIN` variable.
2020-04-08 14:13:33 +05:30
- `capybara`:
- **will** inherit: the default `before_script` and `image`.
2020-05-24 23:13:21 +05:30
- will **not** inherit: the `DOMAIN` and `WEBHOOK_URL` variables.
2020-04-08 14:13:33 +05:30
- `karma`:
- **will** inherit: the default `image` and `before_script`, and the `DOMAIN` variable.
2020-05-24 23:13:21 +05:30
- will **not** inherit: `WEBHOOK_URL` variable.
2020-04-08 14:13:33 +05:30
```yaml
default:
image: 'ruby:2.4'
before_script:
- echo Hello World
variables:
DOMAIN: example.com
WEBHOOK_URL: https://my-webhook.example.com
rubocop:
inherit:
default: false
variables: false
script: bundle exec rubocop
rspec:
inherit:
default: [image]
variables: [WEBHOOK_URL]
script: bundle exec rspec
capybara:
inherit:
variables: false
script: bundle exec capybara
karma:
inherit:
default: true
variables: [DOMAIN]
script: karma
```
2020-05-24 23:13:21 +05:30
### `stages`
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
`stages` is used to define stages that can be used by jobs and is defined
globally.
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
The specification of `stages` allows for having flexible multi stage pipelines.
The ordering of elements in `stages` defines the ordering of jobs' execution:
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
1. Jobs of the same stage are run in parallel.
1. Jobs of the next stage are run after the jobs from the previous stage
complete successfully.
Let's consider the following example, which defines 3 stages:
2019-07-07 11:18:12 +05:30
```yaml
2020-05-24 23:13:21 +05:30
stages:
- build
- test
- deploy
2019-07-07 11:18:12 +05:30
```
2020-05-24 23:13:21 +05:30
1. First, all jobs of `build` are executed in parallel.
1. If all jobs of `build` succeed, the `test` jobs are executed in parallel.
1. If all jobs of `test` succeed, the `deploy` jobs are executed in parallel.
1. If all jobs of `deploy` succeed, the commit is marked as `passed`.
1. If any of the previous jobs fails, the commit is marked as `failed` and no
jobs of further stage are executed.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
There are also two edge cases worth mentioning:
1. If no `stages` are defined in `.gitlab-ci.yml`, then the `build`,
`test` and `deploy` are allowed to be used as job's stage by default.
1. If a job does not specify a `stage`, the job is assigned the `test` stage.
### `workflow:rules`
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/29654) in GitLab 12.5
2020-05-24 23:13:21 +05:30
The top-level `workflow:` key applies to the entirety of a pipeline, and will
determine whether or not a pipeline is created. It currently accepts a single
`rules:` key that operates similarly to [`rules:` defined within jobs](#rules),
enabling dynamic configuration of the pipeline.
#### `workflow:rules` templates
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/217732) in GitLab 13.0.
We provide pre-made templates for use with your pipelines that set up `workflow: rules`
for common scenarios. Usage of these will make things easier and prevent duplicate pipelines from running.
The [`Branch-Pipelines` template](https://gitlab.com/gitlab-org/gitlab/-/tree/master/lib/gitlab/ci/templates/Workflows/Branch-Pipelines.gitlab-ci.yml)
makes your pipelines run for branches and tags.
Branch pipeline status will be displayed within merge requests that use that branch
as a source, but this pipeline type does not support any features offered by
[Merge Request Pipelines](../merge_request_pipelines/) like
[Pipelines for Merge Results](../merge_request_pipelines/#pipelines-for-merged-results-premium)
or [Merge Trains](../merge_request_pipelines/pipelines_for_merged_results/merge_trains/).
Use this template if you are intentionally avoiding those features.
It is [included](#include) as follows:
2019-07-07 11:18:12 +05:30
```yaml
2020-05-24 23:13:21 +05:30
include:
- template: 'Workflows/Branch-Pipelines.gitlab-ci.yml'
```
The [`MergeRequest-Pipelines` template](https://gitlab.com/gitlab-org/gitlab/-/tree/master/lib/gitlab/ci/templates/Workflows/MergeRequest-Pipelines.gitlab-ci.yml)
makes your pipelines run for the default branch (usually `master`), tags, and
all types of merge request pipelines. Use this template if you use any of the
the [Pipelines for Merge Requests features](../merge_request_pipelines/), as mentioned
above.
It is [included](#include) as follows:
```yaml
include:
- template: 'Workflows/MergeRequest-Pipelines.gitlab-ci.yml'
```
If you prefer to define your own rules, the configuration options currently available are:
- [`if`](#rulesif): Define a rule.
- [`when`](#when): May be set to `always` or `never` only. If not provided, the default value is `always`.
The list of `if` rules is evaluated until a single one is matched. If none
match, the last `when` will be used:
```yaml
workflow:
rules:
- if: $CI_COMMIT_REF_NAME =~ /-wip$/
when: never
- if: $CI_COMMIT_TAG
when: never
- when: always
2019-07-07 11:18:12 +05:30
```
2020-05-24 23:13:21 +05:30
### `include`
> - Introduced in [GitLab Premium](https://about.gitlab.com/pricing/) 10.5.
> - Available for Starter, Premium and Ultimate since 10.6.
> - [Moved](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/42861) to GitLab Core in 11.4.
Using the `include` keyword allows the inclusion of external YAML files. This helps
to break down the CI/CD configuration into multiple files and increases readability for long configuration files.
It's also possible to have template files stored in a central repository and projects include their
configuration files. This helps avoid duplicated configuration, for example, global default variables for all projects.
`include` requires the external YAML file to have the extensions `.yml` or `.yaml`,
otherwise the external file won't be included.
`include` supports the following inclusion methods:
| Method | Description |
|:--------------------------------|:------------------------------------------------------------------|
| [`local`](#includelocal) | Include a file from the local project repository. |
| [`file`](#includefile) | Include a file from a different project repository. |
| [`remote`](#includeremote) | Include a file from a remote URL. Must be publicly accessible. |
| [`template`](#includetemplate) | Include templates which are provided by GitLab. |
2019-07-07 11:18:12 +05:30
NOTE: **Note:**
2020-05-24 23:13:21 +05:30
`.gitlab-ci.yml` configuration included by all methods is evaluated at pipeline creation.
The configuration is a snapshot in time and persisted in the database. Any changes to
referenced `.gitlab-ci.yml` configuration won't be reflected in GitLab until the next pipeline is created.
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
The files defined in `include` are:
- Deep merged with those in `.gitlab-ci.yml`.
- Always evaluated first and merged with the content of `.gitlab-ci.yml`,
regardless of the position of the `include` keyword.
TIP: **Tip:**
Use merging to customize and override included CI/CD configurations with local
definitions.
NOTE: **Note:**
Using YAML aliases across different YAML files sourced by `include` is not
supported. You must only refer to aliases in the same file. Instead
of using YAML anchors, you can use the [`extends` keyword](#extends).
#### `include:local`
`include:local` includes a file from the same repository as `.gitlab-ci.yml`.
It's referenced using full paths relative to the root directory (`/`).
You can only use files that are currently tracked by Git on the same branch
your configuration file is on. In other words, when using a `include:local`, make
sure that both `.gitlab-ci.yml` and the local file are on the same branch.
All [nested includes](#nested-includes) will be executed in the scope of the same project,
so it's possible to use local, project, remote, or template includes.
NOTE: **Note:**
Including local files through Git submodules paths is not supported.
Example:
2020-01-01 13:55:28 +05:30
```yaml
2020-05-24 23:13:21 +05:30
include:
- local: '/templates/.gitlab-ci-template.yml'
```
TIP: **Tip:**
Local includes can be used as a replacement for symbolic links which are not followed.
This can be defined as a short local include:
```yaml
include: '.gitlab-ci-production.yml'
```
#### `include:file`
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/53903) in GitLab 11.7.
2020-05-24 23:13:21 +05:30
To include files from another private project under the same GitLab instance,
use `include:file`. This file is referenced using full paths relative to the
root directory (`/`). For example:
```yaml
include:
- project: 'my-group/my-project'
file: '/templates/.gitlab-ci-template.yml'
```
You can also specify `ref`, with the default being the `HEAD` of the project:
```yaml
include:
- project: 'my-group/my-project'
ref: master
file: '/templates/.gitlab-ci-template.yml'
- project: 'my-group/my-project'
ref: v1.0.0
file: '/templates/.gitlab-ci-template.yml'
- project: 'my-group/my-project'
ref: 787123b47f14b552955ca2786bc9542ae66fee5b # Git SHA
file: '/templates/.gitlab-ci-template.yml'
```
All [nested includes](#nested-includes) will be executed in the scope of the target project,
so it's possible to use local (relative to target project), project, remote
or template includes.
#### `include:remote`
`include:remote` can be used to include a file from a different location,
using HTTP/HTTPS, referenced by using the full URL. The remote file must be
publicly accessible through a simple GET request as authentication schemas
in the remote URL are not supported. For example:
```yaml
include:
- remote: 'https://gitlab.com/awesome-project/raw/master/.gitlab-ci-template.yml'
```
All [nested includes](#nested-includes) will be executed without context as public user, so only another remote
or public project, or template, is allowed.
#### `include:template`
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/53445) in GitLab 11.7.
2020-05-24 23:13:21 +05:30
`include:template` can be used to include `.gitlab-ci.yml` templates that are
[shipped with GitLab](https://gitlab.com/gitlab-org/gitlab/tree/master/lib/gitlab/ci/templates).
For example:
```yaml
# File sourced from GitLab's template collection
include:
- template: Auto-DevOps.gitlab-ci.yml
```
Multiple `include:template` files:
```yaml
include:
- template: Android-Fastlane.gitlab-ci.yml
- template: Auto-DevOps.gitlab-ci.yml
2020-01-01 13:55:28 +05:30
```
2020-05-24 23:13:21 +05:30
All [nested includes](#nested-includes) will be executed only with the permission of the user,
so it's possible to use project, remote or template includes.
#### Nested includes
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/56836) in GitLab 11.9.
2020-05-24 23:13:21 +05:30
Nested includes allow you to compose a set of includes.
A total of 100 includes is allowed, but duplicate includes are considered a configuration error.
2020-06-23 00:09:42 +05:30
Since [GitLab 12.4](https://gitlab.com/gitlab-org/gitlab/-/issues/28212), the time limit
2020-05-24 23:13:21 +05:30
for resolving all files is 30 seconds.
#### Additional `includes` examples
There is a list of [additional `includes` examples](includes.md) available.
## Parameter details
The following are detailed explanations for parameters used to configure CI/CD pipelines.
2019-07-07 11:18:12 +05:30
### `image`
Used to specify [a Docker image](../docker/using_docker_images.md#what-is-an-image) to use for the job.
For:
2019-12-21 20:55:43 +05:30
- Simple definition examples, see [Define `image` and `services` from `.gitlab-ci.yml`](../docker/using_docker_images.md#define-image-and-services-from-gitlab-ciyml).
2019-07-07 11:18:12 +05:30
- Detailed usage information, refer to [Docker integration](../docker/README.md) documentation.
#### `image:name`
2020-06-23 00:09:42 +05:30
An [extended Docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
2019-07-07 11:18:12 +05:30
For more information, see [Available settings for `image`](../docker/using_docker_images.md#available-settings-for-image).
#### `image:entrypoint`
2020-06-23 00:09:42 +05:30
An [extended Docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
2019-07-07 11:18:12 +05:30
For more information, see [Available settings for `image`](../docker/using_docker_images.md#available-settings-for-image).
2020-05-24 23:13:21 +05:30
#### `services`
2019-07-07 11:18:12 +05:30
Used to specify a [service Docker image](../docker/using_docker_images.md#what-is-a-service), linked to a base image specified in [`image`](#image).
For:
2019-12-21 20:55:43 +05:30
- Simple definition examples, see [Define `image` and `services` from `.gitlab-ci.yml`](../docker/using_docker_images.md#define-image-and-services-from-gitlab-ciyml).
2019-07-07 11:18:12 +05:30
- Detailed usage information, refer to [Docker integration](../docker/README.md) documentation.
2020-04-22 19:07:51 +05:30
- For example services, see [GitLab CI/CD Services](../services/README.md).
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
##### `services:name`
2019-07-07 11:18:12 +05:30
2020-06-23 00:09:42 +05:30
An [extended Docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
2019-07-07 11:18:12 +05:30
2020-04-22 19:07:51 +05:30
For more information, see [Available settings for `services`](../docker/using_docker_images.md#available-settings-for-services).
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
##### `services:alias`
2019-07-07 11:18:12 +05:30
2020-06-23 00:09:42 +05:30
An [extended Docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
2019-07-07 11:18:12 +05:30
2020-04-22 19:07:51 +05:30
For more information, see [Available settings for `services`](../docker/using_docker_images.md#available-settings-for-services).
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
##### `services:entrypoint`
2019-07-07 11:18:12 +05:30
2020-06-23 00:09:42 +05:30
An [extended Docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
2019-07-07 11:18:12 +05:30
2020-04-22 19:07:51 +05:30
For more information, see [Available settings for `services`](../docker/using_docker_images.md#available-settings-for-services).
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
##### `services:command`
2019-07-07 11:18:12 +05:30
2020-06-23 00:09:42 +05:30
An [extended Docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
2019-07-07 11:18:12 +05:30
2020-04-22 19:07:51 +05:30
For more information, see [Available settings for `services`](../docker/using_docker_images.md#available-settings-for-services).
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
### `script`
2018-03-17 18:26:18 +05:30
2020-05-24 23:13:21 +05:30
`script` is the only required keyword that a job needs. It's a shell script
which is executed by the Runner. For example:
2019-09-04 21:01:54 +05:30
2020-05-24 23:13:21 +05:30
```yaml
job:
script: "bundle exec rspec"
```
2019-09-04 21:01:54 +05:30
2020-05-24 23:13:21 +05:30
[YAML anchors for scripts](#yaml-anchors-for-script) are available.
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
This parameter can also contain several commands using an array:
2015-12-23 02:04:40 +05:30
2018-05-09 12:01:36 +05:30
```yaml
job:
script:
2020-05-24 23:13:21 +05:30
- uname -a
- bundle exec rspec
2018-05-09 12:01:36 +05:30
```
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
Sometimes, `script` commands will need to be wrapped in single or double quotes.
For example, commands that contain a colon (`:`) need to be wrapped in quotes so
that the YAML parser knows to interpret the whole thing as a string rather than
a "key: value" pair. Be careful when using special characters:
`:`, `{`, `}`, `[`, `]`, `,`, `&`, `*`, `#`, `?`, `|`, `-`, `<`, `>`, `=`, `!`, `%`, `@`, `` ` ``.
2015-09-25 12:07:36 +05:30
2020-05-24 23:13:21 +05:30
If any of the script commands return an exit code different from zero, the job
will fail and further commands won't be executed. This behavior can be avoided by
storing the exit code in a variable:
2015-12-23 02:04:40 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
script:
- false || exit_code=$?
- if [ $exit_code -ne 0 ]; then echo "Previous command failed"; fi;
2015-09-25 12:07:36 +05:30
```
2020-05-24 23:13:21 +05:30
#### `before_script` and `after_script`
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
> Introduced in GitLab 8.7 and requires GitLab Runner v1.2.
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
`before_script` is used to define a command that should be run before each
job, including deploy jobs, but after the restoration of any [artifacts](#artifacts).
This must be an array.
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
Scripts specified in `before_script` are concatenated with any scripts specified
in the main [`script`](#script), and executed together in a single shell.
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
`after_script` is used to define the command that will be run after each
job, including failed ones. This must be an array.
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
Scripts specified in `after_script` are executed in a new shell, separate from any
`before_script` or `script` scripts. As a result, they:
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
- Have a current working directory set back to the default.
- Have no access to changes done by scripts defined in `before_script` or `script`, including:
- Command aliases and variables exported in `script` scripts.
- Changes outside of the working tree (depending on the Runner executor), like
software installed by a `before_script` or `script` script.
- Have a separate timeout, which is hard coded to 5 minutes. See
2020-06-23 00:09:42 +05:30
[related issue](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/2716) for details.
2020-05-24 23:13:21 +05:30
- Don't affect the job's exit code. If the `script` section succeeds and the
`after_script` times out or fails, the job will exit with code `0` (`Job Succeeded`).
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
It's possible to overwrite a globally defined `before_script` or `after_script`
if you set it per-job:
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
```yaml
default:
before_script:
- global before script
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
job:
before_script:
- execute this instead of global before script
script:
- my command
after_script:
- execute this after my script
```
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
[YAML anchors for `before_script` and `after_script`](#yaml-anchors-for-before_script-and-after_script) are available.
2020-04-08 14:13:33 +05:30
2020-06-23 00:09:42 +05:30
#### Coloring script output
Script output can be colored using [ANSI escape codes](https://en.wikipedia.org/wiki/ANSI_escape_code#Colors),
or by running commands or programs that output ANSI escape codes.
For example, using [Bash with color codes](https://misc.flogisoft.com/bash/tip_colors_and_formatting):
```yaml
job:
script:
- echo -e "\e[31mThis text is red,\e[0m but this text isn't\e[31m however this text is red again."
```
You can define the color codes in Shell variables, or even [custom environment variables](../variables/README.md#custom-environment-variables),
which makes the commands easier to read and reusable.
For example, using the same example as above and variables defined in a `before_script`:
```yaml
job:
before_script:
- TXT_RED="\e[31m" && TXT_CLEAR="\e[0m"
script:
- echo -e "${TXT_RED}This text is red,${TXT_CLEAR} but this part isn't${TXT_RED} however this part is again."
- echo "This text is not colored"
```
Or with [PowerShell color codes](https://superuser.com/a/1259916):
```yaml
job:
before_script:
- $esc="$([char]27)"; $TXT_RED="$esc[31m"; $TXT_CLEAR="$esc[0m"
script:
- Write-Host $TXT_RED"This text is red,"$TXT_CLEAR" but this text isn't"$TXT_RED" however this text is red again."
- Write-Host "This text is not colored"
```
2019-07-07 11:18:12 +05:30
### `stage`
2016-01-29 22:53:50 +05:30
2018-05-09 12:01:36 +05:30
`stage` is defined per-job and relies on [`stages`](#stages) which is defined
globally. It allows to group jobs into different stages, and jobs of the same
2019-07-07 11:18:12 +05:30
`stage` are executed in parallel (subject to [certain conditions](#using-your-own-runners)). For example:
2017-09-10 17:25:29 +05:30
```yaml
stages:
2018-05-09 12:01:36 +05:30
- build
2017-09-10 17:25:29 +05:30
- test
2018-05-09 12:01:36 +05:30
- deploy
2017-09-10 17:25:29 +05:30
2019-12-21 20:55:43 +05:30
job 0:
stage: .pre
script: make something useful before build stage
2018-05-09 12:01:36 +05:30
job 1:
stage: build
script: make build dependencies
job 2:
stage: build
script: make build artifacts
job 3:
stage: test
script: make test
job 4:
stage: deploy
script: make deploy
2019-12-21 20:55:43 +05:30
job 5:
stage: .post
script: make something useful at the end of pipeline
2018-05-09 12:01:36 +05:30
```
2019-07-07 11:18:12 +05:30
#### Using your own Runners
2015-12-23 02:04:40 +05:30
2019-07-07 11:18:12 +05:30
When using your own Runners, GitLab Runner runs only one job at a time by default (see the
`concurrent` flag in [Runner global settings](https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-global-section)
for more information).
2018-05-09 12:01:36 +05:30
2019-07-07 11:18:12 +05:30
Jobs will run on your own Runners in parallel only if:
2015-09-25 12:07:36 +05:30
2019-07-07 11:18:12 +05:30
- Run on different Runners.
- The Runner's `concurrent` setting has been changed.
2015-09-25 12:07:36 +05:30
2020-05-24 23:13:21 +05:30
#### `.pre` and `.post`
2015-09-25 12:07:36 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/31441) in GitLab 12.4.
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
The following stages are available to every pipeline:
2015-12-23 02:04:40 +05:30
2020-05-24 23:13:21 +05:30
- `.pre`, which is guaranteed to always be the first stage in a pipeline.
- `.post`, which is guaranteed to always be the last stage in a pipeline.
2015-09-25 12:07:36 +05:30
2020-05-24 23:13:21 +05:30
User-defined stages are executed after `.pre` and before `.post`.
2015-12-23 02:04:40 +05:30
2020-05-24 23:13:21 +05:30
The order of `.pre` and `.post` can't be changed, even if defined out of order in `.gitlab-ci.yml`.
For example, the following are equivalent configuration:
2015-12-23 02:04:40 +05:30
2020-05-24 23:13:21 +05:30
- Configured in order:
2017-09-10 17:25:29 +05:30
2020-05-24 23:13:21 +05:30
```yaml
stages:
- .pre
- a
- b
- .post
```
2017-09-10 17:25:29 +05:30
2020-05-24 23:13:21 +05:30
- Configured out of order:
2015-09-25 12:07:36 +05:30
2020-05-24 23:13:21 +05:30
```yaml
stages:
- a
- .pre
- b
- .post
```
2015-09-25 12:07:36 +05:30
2020-05-24 23:13:21 +05:30
- Not explicitly configured:
2019-04-03 18:18:56 +05:30
2020-05-24 23:13:21 +05:30
```yaml
stages:
- a
- b
```
2019-04-03 18:18:56 +05:30
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
A pipeline won't be created if it only contains jobs in `.pre` or `.post` stages.
2016-06-02 11:05:42 +05:30
2020-05-24 23:13:21 +05:30
### `extends`
2016-06-02 11:05:42 +05:30
2020-05-24 23:13:21 +05:30
> Introduced in GitLab 11.3.
`extends` defines entry names that a job that uses `extends` is going to
inherit from.
It's an alternative to using [YAML anchors](#anchors) and is a little
more flexible and readable:
2015-11-26 14:37:03 +05:30
```yaml
2020-05-24 23:13:21 +05:30
.tests:
script: rake test
stage: test
2015-11-26 14:37:03 +05:30
only:
2020-05-24 23:13:21 +05:30
refs:
- branches
rspec:
extends: .tests
script: rake rspec
only:
variables:
- $RSPEC
2015-11-26 14:37:03 +05:30
```
2015-12-23 02:04:40 +05:30
2020-05-24 23:13:21 +05:30
In the example above, the `rspec` job inherits from the `.tests` template job.
GitLab will perform a reverse deep merge based on the keys. GitLab will:
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
- Merge the `rspec` contents into `.tests` recursively.
- Not merge the values of the keys.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
This results in the following `rspec` job:
2019-02-15 15:39:39 +05:30
```yaml
2020-05-24 23:13:21 +05:30
rspec:
script: rake rspec
stage: test
only:
refs:
- branches
variables:
- $RSPEC
2019-02-15 15:39:39 +05:30
```
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
Note that `script: rake test` has been overwritten by `script: rake rspec`.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
If you do want to include the `rake test`, see [`before_script` and `after_script`](#before_script-and-after_script).
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
`.tests` in this example is a [hidden job](#hide-jobs), but it's
possible to inherit from regular jobs as well.
2019-09-04 21:01:54 +05:30
2020-05-24 23:13:21 +05:30
`extends` supports multi-level inheritance, however it's not recommended to
use more than three levels. The maximum nesting level that is supported is 10.
The following example has two levels of inheritance:
2019-09-04 21:01:54 +05:30
2020-05-24 23:13:21 +05:30
```yaml
.tests:
only:
- pushes
2019-09-04 21:01:54 +05:30
2020-05-24 23:13:21 +05:30
.rspec:
extends: .tests
script: rake rspec
2019-09-04 21:01:54 +05:30
2020-05-24 23:13:21 +05:30
rspec 1:
variables:
RSPEC_SUITE: '1'
extends: .rspec
2019-09-04 21:01:54 +05:30
2020-05-24 23:13:21 +05:30
rspec 2:
variables:
RSPEC_SUITE: '2'
extends: .rspec
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
spinach:
extends: .tests
script: rake spinach
```
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
In GitLab 12.0 and later, it's also possible to use multiple parents for
`extends`. The algorithm used for merge is "closest scope wins", so
keys from the last member will always shadow anything defined on other
levels. For example:
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
```yaml
.only-important:
only:
- master
- stable
tags:
- production
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
.in-docker:
tags:
- docker
image: alpine
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
rspec:
extends:
- .only-important
- .in-docker
script:
- rake rspec
2019-07-07 11:18:12 +05:30
```
2020-05-24 23:13:21 +05:30
This results in the following `rspec` job:
2018-05-09 12:01:36 +05:30
2020-05-24 23:13:21 +05:30
```yaml
rspec:
only:
- master
- stable
tags:
- docker
image: alpine
script:
- rake rspec
```
2018-03-17 18:26:18 +05:30
2020-05-24 23:13:21 +05:30
#### Using `extends` and `include` together
2018-03-17 18:26:18 +05:30
2020-05-24 23:13:21 +05:30
`extends` works across configuration files combined with `include`.
2018-03-17 18:26:18 +05:30
2020-05-24 23:13:21 +05:30
For example, if you have a local `included.yml` file:
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
```yaml
.template:
script:
- echo Hello!
```
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
Then, in `.gitlab-ci.yml` you can use it like this:
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
```yaml
include: included.yml
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
useTemplate:
image: alpine
extends: .template
```
2018-05-09 12:01:36 +05:30
2020-05-24 23:13:21 +05:30
This will run a job called `useTemplate` that runs `echo Hello!` as defined in
the `.template` job, and uses the `alpine` Docker image as defined in the local job.
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
### `rules`
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/27863) in GitLab 12.3.
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
`rules` allows for a list of individual rule objects to be evaluated
*in order*, until one matches and dynamically provides attributes to the job.
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
CAUTION: **Caution:**
`rules` can't be used in combination with `only/except` as it is a replacement for that functionality. If you attempt to do this, the linter will return a
`key may not be used with rules` error.
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
#### Key details when using `rules`
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
A very important difference between `rules` and `only/except`, is that jobs defined
with `rules` trigger merge request pipelines by default, but `only/except` jobs do not.
This may be surprising if migrating from `only` and `except`, so new users of `rules`
can use one of the [`workflow: rules` templates](#workflowrules-templates) to get started.
This will ensure that the behavior is more stable as you start adding additional `rules`
blocks, and will avoid issues like creating a duplicate, merge request (detached) pipeline.
2019-12-04 20:38:33 +05:30
2020-06-23 00:09:42 +05:30
We don't recommend mixing `only/except` jobs with `rules` jobs in the same pipeline.
2020-05-24 23:13:21 +05:30
It may not cause YAML errors, but debugging the exact execution behavior can be complex
due to the different default behaviors of `only/except` and `rules`.
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
### Rules clauses
Available rule clauses include:
- [`if`](#rulesif) (similar to [`only:variables`](#onlyvariablesexceptvariables))
- [`changes`](#ruleschanges) (same as [`only:changes`](#onlychangesexceptchanges))
- [`exists`](#rulesexists)
For example, using `if`. This configuration specifies that `job` should be built
and run for every pipeline on merge requests targeting `master`, regardless of
the status of other builds:
2020-04-08 14:13:33 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
script: "echo Hello, Rules!"
rules:
- if: '$CI_MERGE_REQUEST_TARGET_BRANCH_NAME == "master"'
when: always
- if: '$VAR =~ /pattern/'
when: manual
- when: on_success
2020-04-08 14:13:33 +05:30
```
2020-05-24 23:13:21 +05:30
In this example, if the first rule:
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
- Matches, the job will be given the `when:always` attribute.
- Does not match, the second and third rules will be evaluated sequentially
until a match is found. That is, the job will be given either the:
- `when: manual` attribute if the second rule matches. **The stage won't complete until this manual job is triggered and completes successfully.**
- `when: on_success` attribute if the second rule does not match. The third
rule will always match when reached because it has no conditional clauses.
2019-07-31 22:56:46 +05:30
2020-05-24 23:13:21 +05:30
#### `rules:if`
2018-03-17 18:26:18 +05:30
2020-05-24 23:13:21 +05:30
`rules:if` differs slightly from `only:variables` by accepting only a single
expression string, rather than an array of them. Any set of expressions to be
evaluated should be conjoined into a single expression using `&&` or `||`, and use
the [variable matching syntax](../variables/README.md#syntax-of-environment-variable-expressions).
For example:
2018-03-17 18:26:18 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
script: "echo Hello, Rules!"
rules:
- if: '$CI_MERGE_REQUEST_SOURCE_BRANCH_NAME =~ /^feature/ && $CI_MERGE_REQUEST_TARGET_BRANCH_NAME == "master"' # This rule will be evaluated
when: always
- if: '$CI_MERGE_REQUEST_SOURCE_BRANCH_NAME =~ /^feature/' # This rule will only be evaluated if the target branch is not "master"
when: manual
- if: '$CI_MERGE_REQUEST_SOURCE_BRANCH_NAME' # If neither of the first two match but the simple presence does, we set to "on_success" by default
2019-02-15 15:39:39 +05:30
```
2020-06-23 00:09:42 +05:30
Some details regarding the logic that determines the `when` for the job:
- If none of the provided rules match, the job is set to `when: never`, and is
not included in the pipeline.
- A rule without any conditional clause, such as a `when` or `allow_failure`
rule without `if` or `changes`, always matches, and is always used if reached.
- If a rule matches and has no `when` defined, the rule will use the `when`
defined for the job, which defaults to `on_success` if not defined.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
#### `rules:changes`
2019-07-31 22:56:46 +05:30
2020-05-24 23:13:21 +05:30
`rules: changes` works exactly the same way as `only: changes` and `except: changes`,
accepting an array of paths. Similarly, it will always return true if there is no
Git push event. See [`only/except: changes`](#onlychangesexceptchanges) for more information.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
For example:
2019-02-15 15:39:39 +05:30
```yaml
2020-05-24 23:13:21 +05:30
docker build:
script: docker build -t my-image:$CI_COMMIT_REF_SLUG .
rules:
- changes: # Will include the job and set to when:manual if any of the follow paths match a modified file.
- Dockerfile
when: manual
- if: '$VAR == "string value"'
when: manual # Will include the job and set to when:manual if the expression evaluates to true, after the `changes:` rule fails to match.
- when: on_success # If neither of the first rules match, set to on_success
2018-03-17 18:26:18 +05:30
```
2020-05-24 23:13:21 +05:30
In this example, a job either set to:
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
- Run manually if `Dockerfile` has changed OR `$VAR == "string value"`.
- `when:on_success` by the last rule, where no earlier clauses evaluate to true.
2019-07-31 22:56:46 +05:30
2020-05-24 23:13:21 +05:30
#### `rules:exists`
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/24021) in GitLab 12.4.
2016-06-02 11:05:42 +05:30
2020-05-24 23:13:21 +05:30
`exists` accepts an array of paths and will match if any of these paths exist
as files in the repository.
2016-06-02 11:05:42 +05:30
2020-05-24 23:13:21 +05:30
For example:
2019-12-21 20:55:43 +05:30
```yaml
job:
script: docker build -t my-image:$CI_COMMIT_REF_SLUG .
rules:
- exists:
- Dockerfile
```
You can also use glob patterns to match multiple files in any directory within
the repository.
For example:
```yaml
job:
script: bundle exec rspec
rules:
- exists:
- spec/**.rb
```
NOTE: **Note:**
For performance reasons, using `exists` with patterns is limited to 10000
checks. After the 10000th check, rules with patterned globs will always match.
2020-03-13 15:44:24 +05:30
#### `rules:allow_failure`
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/30235) in GitLab 12.8.
2020-03-13 15:44:24 +05:30
You can use [`allow_failure: true`](#allow_failure) within `rules:` to allow a job to fail, or a manual job to
wait for action, without stopping the pipeline itself. All jobs using `rules:` default to `allow_failure: false`
if `allow_failure:` is not defined.
2020-06-23 00:09:42 +05:30
The rule-level `rules:allow_failure` option overrides the job-level
[`allow_failure`](#allow_failure) option, and is only applied when the job is
triggered by the particular rule.
2020-03-13 15:44:24 +05:30
```yaml
job:
script: "echo Hello, Rules!"
rules:
- if: '$CI_MERGE_REQUEST_TARGET_BRANCH_NAME == "master"'
when: manual
allow_failure: true
```
In this example, if the first rule matches, then the job will have `when: manual` and `allow_failure: true`.
2019-12-04 20:38:33 +05:30
#### Complex rule clauses
2019-12-21 20:55:43 +05:30
To conjoin `if`, `changes`, and `exists` clauses with an AND, use them in the
same rule.
2019-12-04 20:38:33 +05:30
In the following example:
- We run the job manually if `Dockerfile` or any file in `docker/scripts/`
has changed AND `$VAR == "string value"`.
2020-05-24 23:13:21 +05:30
- Otherwise, the job won't be included in the pipeline.
2019-12-04 20:38:33 +05:30
```yaml
docker build:
script: docker build -t my-image:$CI_COMMIT_REF_SLUG .
rules:
- if: '$VAR == "string value"'
changes: # Will include the job and set to when:manual if any of the follow paths match a modified file.
- Dockerfile
- docker/scripts/*
when: manual
# - when: never would be redundant here, this is implied any time rules are listed.
```
The only clauses currently available are:
- `if`
- `changes`
2019-12-21 20:55:43 +05:30
- `exists`
2019-12-04 20:38:33 +05:30
Keywords such as `branches` or `refs` that are currently available for
`only`/`except` are not yet available in `rules` as they are being individually
2020-05-24 23:13:21 +05:30
considered for their usage and behavior in this context. Future keyword improvements
are being discussed in our [epic for improving `rules`](https://gitlab.com/groups/gitlab-org/-/epics/2783),
where anyone can add suggestions or requests.
2019-12-04 20:38:33 +05:30
#### Permitted attributes
The only job attributes currently set by `rules` are:
- `when`.
- `start_in`, if `when` is set to `delayed`.
2020-03-13 15:44:24 +05:30
- `allow_failure`.
2019-12-04 20:38:33 +05:30
A job will be included in a pipeline if `when` is evaluated to any value
except `never`.
Delayed jobs require a `start_in` value, so rule objects do as well. For
example:
```yaml
docker build:
script: docker build -t my-image:$CI_COMMIT_REF_SLUG .
rules:
- changes: # Will include the job and delay 3 hours when the Dockerfile has changed
- Dockerfile
when: delayed
start_in: '3 hours'
- when: on_success # Otherwise include the job and set to run normally
```
Additional job configuration may be added to rules in the future. If something
2020-05-24 23:13:21 +05:30
useful is not available, please
2020-06-23 00:09:42 +05:30
[open an issue](https://gitlab.com/gitlab-org/gitlab/-/issues).
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
### `only`/`except` (basic)
2019-12-21 20:55:43 +05:30
NOTE: **Note:**
2020-05-24 23:13:21 +05:30
The [`rules`](#rules) syntax is an improved, more powerful solution for defining
when jobs should run or not. Consider using `rules` instead of `only/except` to get
the most out of your pipelines.
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
`only` and `except` are two parameters that set a job policy to limit when
jobs are created:
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
1. `only` defines the names of branches and tags for which the job will run.
1. `except` defines the names of branches and tags for which the job will
**not** run.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
There are a few rules that apply to the usage of job policy:
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
- `only` and `except` are inclusive. If both `only` and `except` are defined
in a job specification, the ref is filtered by `only` and `except`.
- `only` and `except` allow the use of regular expressions ([supported regexp syntax](#supported-onlyexcept-regexp-syntax)).
- `only` and `except` allow to specify a repository path to filter jobs for
forks.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
In addition, `only` and `except` allow the use of special keywords:
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
| **Value** | **Description** |
| --------- | ---------------- |
| `branches` | When a Git reference of a pipeline is a branch. |
| `tags` | When a Git reference of a pipeline is a tag. |
| `api` | When pipeline has been triggered by a second pipelines API (not triggers API). |
| `external` | When using CI services other than GitLab. |
| `pipelines` | For multi-project triggers, created using the API with `CI_JOB_TOKEN`. |
| `pushes` | Pipeline is triggered by a `git push` by the user. |
| `schedules` | For [scheduled pipelines](../pipelines/schedules.md). |
| `triggers` | For pipelines created using a trigger token. |
| `web` | For pipelines created using **Run pipeline** button in GitLab UI (under your project's **Pipelines**). |
| `merge_requests` | When a merge request is created or updated (See [pipelines for merge requests](../merge_request_pipelines/index.md)). |
| `external_pull_requests`| When an external pull request on GitHub is created or updated (See [Pipelines for external pull requests](../ci_cd_for_external_repos/index.md#pipelines-for-external-pull-requests)). |
| `chat` | For jobs created using a [GitLab ChatOps](../chatops/README.md) command. |
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
In the example below, `job` will run only for refs that start with `issue-`,
whereas all branches will be skipped:
2018-12-05 23:21:45 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
# use regexp
only:
- /^issue-.*$/
# use special keyword
except:
- branches
2018-12-05 23:21:45 +05:30
```
2020-05-24 23:13:21 +05:30
Pattern matching is case-sensitive by default. Use `i` flag modifier, like
`/pattern/i` to make a pattern case-insensitive:
2017-08-17 22:00:37 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
# use regexp
only:
- /^issue-.*$/i
# use special keyword
except:
- branches
2017-08-17 22:00:37 +05:30
```
2020-05-24 23:13:21 +05:30
In this example, `job` will run only for refs that are tagged, or if a build is
explicitly requested via an API trigger or a [Pipeline Schedule](../pipelines/schedules.md):
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
# use special keywords
only:
- tags
- triggers
- schedules
2016-11-03 12:29:30 +05:30
```
2020-05-24 23:13:21 +05:30
The repository path can be used to have jobs executed only for the parent
repository and not forks:
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
only:
- branches@gitlab-org/gitlab
except:
- master@gitlab-org/gitlab
- /^release/.*$/@gitlab-org/gitlab
2016-11-03 12:29:30 +05:30
```
2020-05-24 23:13:21 +05:30
The above example will run `job` for all branches on `gitlab-org/gitlab`,
except `master` and those with names prefixed with `release/`.
2016-11-03 12:29:30 +05:30
2020-05-24 23:13:21 +05:30
If a job does not have an `only` rule, `only: ['branches', 'tags']` is set by
default. If it does not have an `except` rule, it's empty.
2016-11-03 12:29:30 +05:30
2020-05-24 23:13:21 +05:30
For example,
2016-11-03 12:29:30 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
script: echo 'test'
2016-11-03 12:29:30 +05:30
```
2020-05-24 23:13:21 +05:30
is translated to:
2020-03-13 15:44:24 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
script: echo 'test'
only: ['branches', 'tags']
2020-03-13 15:44:24 +05:30
```
2020-05-24 23:13:21 +05:30
#### Regular expressions
2020-01-01 13:55:28 +05:30
2020-05-24 23:13:21 +05:30
Because `@` is used to denote the beginning of a ref's repository path,
matching a ref name containing the `@` character in a regular expression
requires the use of the hex character code match `\x40`.
2020-01-01 13:55:28 +05:30
2020-05-24 23:13:21 +05:30
Only the tag or branch name can be matched by a regular expression.
The repository path, if given, is always matched literally.
2020-01-01 13:55:28 +05:30
2020-05-24 23:13:21 +05:30
If a regular expression shall be used to match the tag or branch name,
the entire ref name part of the pattern has to be a regular expression,
and must be surrounded by `/`.
(With regular expression flags appended after the closing `/`.)
So `issue-/.*/` won't work to match all tag names or branch names
that begin with `issue-`.
2020-01-01 13:55:28 +05:30
2020-05-24 23:13:21 +05:30
TIP: **Tip**
Use anchors `^` and `$` to avoid the regular expression
matching only a substring of the tag name or branch name.
For example, `/^issue-.*$/` is equivalent to `/^issue-/`,
while just `/issue/` would also match a branch called `severe-issues`.
2020-01-01 13:55:28 +05:30
2020-05-24 23:13:21 +05:30
#### Supported `only`/`except` regexp syntax
2020-01-01 13:55:28 +05:30
2020-05-24 23:13:21 +05:30
CAUTION: **Warning:**
This is a breaking change that was introduced with GitLab 11.9.4.
2020-01-01 13:55:28 +05:30
2020-05-24 23:13:21 +05:30
In GitLab 11.9.4, GitLab begun internally converting regexp used
in `only` and `except` parameters to [RE2](https://github.com/google/re2/wiki/Syntax).
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
This means that only subset of features provided by [Ruby Regexp](https://ruby-doc.org/core/Regexp.html)
is supported. [RE2](https://github.com/google/re2/wiki/Syntax) limits the set of features
provided due to computational complexity, which means some features became unavailable in GitLab 11.9.4.
For example, negative lookaheads.
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
For GitLab versions from 11.9.7 and up to GitLab 12.0, GitLab provides a feature flag that can be
enabled by administrators that allows users to use unsafe regexp syntax. This brings compatibility
with previously allowed syntax version and allows users to gracefully migrate to the new syntax.
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
```ruby
Feature.enable(:allow_unsafe_ruby_regexp)
2018-04-04 21:44:52 +05:30
```
2020-05-24 23:13:21 +05:30
### `only`/`except` (advanced)
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
CAUTION: **Warning:**
This is an _alpha_ feature, and is subject to change at any time without
prior notice!
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
GitLab supports both simple and complex strategies, so it's possible to use an
array and a hash configuration scheme.
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
Four keys are available:
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
- `refs`
- `variables`
- `changes`
- `kubernetes`
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
If you use multiple keys under `only` or `except`, the keys will be evaluated as a
single conjoined expression. That is:
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
- `only:` means "include this job if all of the conditions match".
- `except:` means "exclude this job if any of the conditions match".
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
With `only`, individual keys are logically joined by an AND:
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
> (any of refs) AND (any of variables) AND (any of changes) AND (if Kubernetes is active)
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
In the example below, the `test` job will `only` be created when **all** of the following are true:
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
- The pipeline has been [scheduled](../../user/project/pipelines/schedules.md) **or** runs for `master`.
- The `variables` keyword matches.
- The `kubernetes` service is active on the project.
2018-04-04 21:44:52 +05:30
```yaml
2020-05-24 23:13:21 +05:30
test:
script: npm run test
only:
refs:
- master
- schedules
variables:
- $CI_COMMIT_MESSAGE =~ /run-end-to-end-tests/
kubernetes: active
2018-04-04 21:44:52 +05:30
```
2020-05-24 23:13:21 +05:30
`except` is implemented as a negation of this complete expression:
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
> NOT((any of refs) AND (any of variables) AND (any of changes) AND (if Kubernetes is active))
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
This means the keys are treated as if joined by an OR. This relationship could be described as:
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
> (any of refs) OR (any of variables) OR (any of changes) OR (if Kubernetes is active)
2018-10-15 14:42:47 +05:30
2020-05-24 23:13:21 +05:30
In the example below, the `test` job will **not** be created when **any** of the following are true:
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
- The pipeline runs for the `master`.
- There are changes to the `README.md` file in the root directory of the repository.
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
```yaml
test:
script: npm run test
except:
refs:
- master
changes:
- "README.md"
```
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
#### `only:refs`/`except:refs`
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
> `refs` policy introduced in GitLab 10.0.
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
The `refs` strategy can take the same values as the
[simplified only/except configuration](#onlyexcept-basic).
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
In the example below, the `deploy` job is going to be created only when the
pipeline has been [scheduled](../pipelines/schedules.md) or runs for the `master` branch:
2018-04-04 21:44:52 +05:30
```yaml
2020-05-24 23:13:21 +05:30
deploy:
only:
refs:
- master
- schedules
2018-04-04 21:44:52 +05:30
```
2020-05-24 23:13:21 +05:30
#### `only:kubernetes`/`except:kubernetes`
> `kubernetes` policy introduced in GitLab 10.0.
The `kubernetes` strategy accepts only the `active` keyword.
In the example below, the `deploy` job is going to be created only when the
Kubernetes service is active in the project:
2018-04-04 21:44:52 +05:30
```yaml
2020-05-24 23:13:21 +05:30
deploy:
only:
kubernetes: active
2018-04-04 21:44:52 +05:30
```
2020-05-24 23:13:21 +05:30
#### `only:variables`/`except:variables`
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
> `variables` policy introduced in GitLab 10.7.
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
The `variables` keyword is used to define variables expressions. In other words,
you can use predefined variables / project / group or
environment-scoped variables to define an expression GitLab is going to
evaluate in order to decide whether a job should be created or not.
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
Examples of using variables expressions:
2019-12-26 22:10:19 +05:30
```yaml
2020-05-24 23:13:21 +05:30
deploy:
script: cap staging deploy
only:
refs:
- branches
variables:
- $RELEASE == "staging"
- $STAGING
2019-12-26 22:10:19 +05:30
```
2020-05-24 23:13:21 +05:30
Another use case is excluding jobs depending on a commit message:
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
```yaml
end-to-end:
script: rake test:end-to-end
except:
variables:
- $CI_COMMIT_MESSAGE =~ /skip-end-to-end-tests/
```
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
Learn more about [variables expressions](../variables/README.md#environment-variables-expressions).
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
#### `only:changes`/`except:changes`
2019-12-26 22:10:19 +05:30
2020-06-23 00:09:42 +05:30
> `changes` policy [introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/19232) in GitLab 11.4.
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
Using the `changes` keyword with `only` or `except` makes it possible to define if
a job should be created based on files modified by a Git push event.
This means the `only:changes` policy is useful for pipelines where:
- `$CI_PIPELINE_SOURCE == 'push'`
- `$CI_PIPELINE_SOURCE == 'merge_request_event'`
- `$CI_PIPELINE_SOURCE == 'external_pull_request_event'`
If there is no Git push event, such as for pipelines with
2020-06-23 00:09:42 +05:30
[sources other than the three above](../variables/predefined_variables.md),
2020-05-24 23:13:21 +05:30
`changes` can't determine if a given file is new or old, and will always
return true.
A basic example of using `only: changes`:
2019-12-26 22:10:19 +05:30
```yaml
2020-05-24 23:13:21 +05:30
docker build:
script: docker build -t my-image:$CI_COMMIT_REF_SLUG .
only:
changes:
- Dockerfile
- docker/scripts/*
- dockerfiles/**/*
- more_scripts/*.{rb,py,sh}
2019-12-26 22:10:19 +05:30
```
2020-05-24 23:13:21 +05:30
In the scenario above, when pushing commits to an existing branch in GitLab,
it creates and triggers the `docker build` job, provided that one of the
commits contains changes to any of the following:
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
- The `Dockerfile` file.
- Any of the files inside `docker/scripts/` directory.
- Any of the files and subdirectories inside the `dockerfiles` directory.
- Any of the files with `rb`, `py`, `sh` extensions inside the `more_scripts` directory.
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
CAUTION: **Warning:**
If using `only:changes` with [only allow merge requests to be merged if the pipeline succeeds](../../user/project/merge_requests/merge_when_pipeline_succeeds.md#only-allow-merge-requests-to-be-merged-if-the-pipeline-succeeds),
undesired behavior could result if you don't [also use `only:merge_requests`](#using-onlychanges-with-pipelines-for-merge-requests).
You can also use glob patterns to match multiple files in either the root directory
of the repository, or in _any_ directory within the repository, but they must be wrapped
in double quotes or GitLab will fail to parse the `.gitlab-ci.yml`. For example:
2018-04-04 21:44:52 +05:30
```yaml
2020-05-24 23:13:21 +05:30
test:
script: npm run test
only:
changes:
- "*.json"
- "**/*.sql"
2018-04-04 21:44:52 +05:30
```
2020-05-24 23:13:21 +05:30
The following example will skip the `build` job if a change is detected in any file
in the root directory of the repository with a `.md` extension:
2018-04-04 21:44:52 +05:30
```yaml
2020-05-24 23:13:21 +05:30
build:
script: npm run build
except:
changes:
- "*.md"
2018-04-04 21:44:52 +05:30
```
2020-05-24 23:13:21 +05:30
CAUTION: **Warning:**
There are some points to be aware of when
[using this feature with new branches or tags *without* pipelines for merge requests](#using-onlychanges-without-pipelines-for-merge-requests).
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
CAUTION: **Warning:**
There are some points to be aware of when
[using this feature with scheduled pipelines](#using-onlychanges-with-scheduled-pipelines).
2018-04-04 21:44:52 +05:30
2020-05-24 23:13:21 +05:30
##### Using `only:changes` with pipelines for merge requests
2020-05-24 23:13:21 +05:30
With [pipelines for merge requests](../merge_request_pipelines/index.md),
it's possible to define a job to be created based on files modified
in a merge request.
2016-09-29 09:46:39 +05:30
2020-05-24 23:13:21 +05:30
In order to deduce the correct base SHA of the source branch, we recommend combining
this keyword with `only: [merge_requests]`. This way, file differences are correctly
calculated from any further commits, thus all changes in the merge requests are properly
tested in pipelines.
2016-09-29 09:46:39 +05:30
2020-05-24 23:13:21 +05:30
For example:
2016-09-29 09:46:39 +05:30
2020-05-24 23:13:21 +05:30
```yaml
docker build service one:
script: docker build -t my-service-one-image:$CI_COMMIT_REF_SLUG .
only:
refs:
- merge_requests
changes:
- Dockerfile
- service-one/**/*
2016-09-29 09:46:39 +05:30
```
2020-05-24 23:13:21 +05:30
In the scenario above, if a merge request is created or updated that changes
either files in `service-one` directory or the `Dockerfile`, GitLab creates
and triggers the `docker build service one` job.
2016-11-03 12:29:30 +05:30
2020-05-24 23:13:21 +05:30
Note that if [pipelines for merge requests](../merge_request_pipelines/index.md) is
combined with `only: [change]`, but `only: [merge_requests]` is omitted, there could be
unwanted behavior.
2016-09-29 09:46:39 +05:30
2020-05-24 23:13:21 +05:30
For example:
2015-11-26 14:37:03 +05:30
2020-05-24 23:13:21 +05:30
```yaml
docker build service one:
script: docker build -t my-service-one-image:$CI_COMMIT_REF_SLUG .
only:
changes:
- Dockerfile
- service-one/**/*
```
2015-12-23 02:04:40 +05:30
2020-05-24 23:13:21 +05:30
In the example above, a pipeline could fail due to changes to a file in `service-one/**/*`.
A later commit could then be pushed that does not include any changes to this file,
but includes changes to the `Dockerfile`, and this pipeline could pass because it's only
testing the changes to the `Dockerfile`. GitLab checks the **most recent pipeline**,
that **passed**, and will show the merge request as mergeable, despite the earlier
failed pipeline caused by a change that was not yet corrected.
2015-12-23 02:04:40 +05:30
2020-05-24 23:13:21 +05:30
With this configuration, care must be taken to check that the most recent pipeline
properly corrected any failures from previous pipelines.
2015-12-23 02:04:40 +05:30
2020-05-24 23:13:21 +05:30
##### Using `only:changes` without pipelines for merge requests
2015-11-26 14:37:03 +05:30
2020-05-24 23:13:21 +05:30
Without [pipelines for merge requests](../merge_request_pipelines/index.md), pipelines
run on branches or tags that don't have an explicit association with a merge request.
In this case, a previous SHA is used to calculate the diff, which equivalent to `git diff HEAD~`.
This could result in some unexpected behavior, including:
2015-12-23 02:04:40 +05:30
2020-05-24 23:13:21 +05:30
- When pushing a new branch or a new tag to GitLab, the policy always evaluates to true.
- When pushing a new commit, the changed files are calculated using the previous commit
as the base SHA.
2019-09-30 21:07:59 +05:30
2020-05-24 23:13:21 +05:30
##### Using `only:changes` with scheduled pipelines
2015-11-26 14:37:03 +05:30
2020-05-24 23:13:21 +05:30
`only:changes` always evaluates as "true" in [Scheduled pipelines](../pipelines/schedules.md).
All files are considered to have "changed" when a scheduled pipeline
runs.
2015-12-23 02:04:40 +05:30
2020-05-24 23:13:21 +05:30
### `needs`
2015-11-26 14:37:03 +05:30
2020-06-23 00:09:42 +05:30
> - [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/47063) in GitLab 12.2.
2020-05-24 23:13:21 +05:30
> - In GitLab 12.3, maximum number of jobs in `needs` array raised from five to 50.
2020-06-23 00:09:42 +05:30
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/30631) in GitLab 12.8, `needs: []` lets jobs start immediately.
2020-05-24 23:13:21 +05:30
The `needs:` keyword enables executing jobs out-of-order, allowing you to implement
a [directed acyclic graph](../directed_acyclic_graph/index.md) in your `.gitlab-ci.yml`.
This lets you run some jobs without waiting for other ones, disregarding stage ordering
so you can have multiple stages running concurrently.
Let's consider the following example:
2017-08-17 22:00:37 +05:30
```yaml
2020-05-24 23:13:21 +05:30
linux:build:
2017-08-17 22:00:37 +05:30
stage: build
2020-05-24 23:13:21 +05:30
mac:build:
stage: build
2016-04-02 18:10:28 +05:30
2020-05-24 23:13:21 +05:30
lint:
stage: test
needs: []
2016-04-02 18:10:28 +05:30
2020-05-24 23:13:21 +05:30
linux:rspec:
stage: test
needs: ["linux:build"]
2016-04-02 18:10:28 +05:30
2020-05-24 23:13:21 +05:30
linux:rubocop:
stage: test
needs: ["linux:build"]
2016-04-02 18:10:28 +05:30
2020-05-24 23:13:21 +05:30
mac:rspec:
stage: test
needs: ["mac:build"]
2020-04-22 19:07:51 +05:30
2020-05-24 23:13:21 +05:30
mac:rubocop:
stage: test
needs: ["mac:build"]
production:
stage: deploy
2020-04-22 19:07:51 +05:30
```
2020-05-24 23:13:21 +05:30
This example creates four paths of execution:
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
- Linter: the `lint` job will run immediately without waiting for the `build` stage to complete because it has no needs (`needs: []`).
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
- Linux path: the `linux:rspec` and `linux:rubocop` jobs will be run as soon
as the `linux:build` job finishes without waiting for `mac:build` to finish.
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
- macOS path: the `mac:rspec` and `mac:rubocop` jobs will be run as soon
as the `mac:build` job finishes, without waiting for `linux:build` to finish.
- The `production` job will be executed as soon as all previous jobs
finish; in this case: `linux:build`, `linux:rspec`, `linux:rubocop`,
`mac:build`, `mac:rspec`, `mac:rubocop`.
#### Requirements and limitations
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
- If `needs:` is set to point to a job that is not instantiated
because of `only/except` rules or otherwise does not exist, the
pipeline will be created with YAML error.
- The maximum number of jobs that a single job can need in the `needs:` array is limited:
- For GitLab.com, the limit is ten. For more information, see our
2020-06-23 00:09:42 +05:30
[infrastructure issue](https://gitlab.com/gitlab-com/gl-infra/infrastructure/-/issues/7541).
2020-05-24 23:13:21 +05:30
- For self-managed instances, the limit is:
- 10, if the `ci_dag_limit_needs` feature flag is enabled (default).
- 50, if the `ci_dag_limit_needs` feature flag is disabled.
- If `needs:` refers to a job that is marked as `parallel:`.
the current job will depend on all parallel jobs created.
- `needs:` is similar to `dependencies:` in that it needs to use jobs from prior stages,
meaning it's impossible to create circular dependencies. Depending on jobs in the
2020-06-23 00:09:42 +05:30
current stage is not possible either, but support [is planned](https://gitlab.com/gitlab-org/gitlab/-/issues/30632).
2020-05-24 23:13:21 +05:30
- Related to the above, stages must be explicitly defined for all jobs
that have the keyword `needs:` or are referred to by one.
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
##### Changing the `needs:` job limit
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
The maximum number of jobs that can be defined within `needs:` defaults to 10, but
can be changed to 50 via a feature flag. To change the limit to 50,
[start a Rails console session](../../administration/troubleshooting/debug.md#starting-a-rails-console-session)
and run:
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
```ruby
Feature::disable(:ci_dag_limit_needs)
2019-12-26 22:10:19 +05:30
```
2020-05-24 23:13:21 +05:30
To set it back to 10, run the opposite command:
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
```ruby
Feature::enable(:ci_dag_limit_needs)
```
2015-11-26 14:37:03 +05:30
2020-05-24 23:13:21 +05:30
#### Artifact downloads with `needs`
2015-12-23 02:04:40 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/14311) in GitLab v12.6.
2015-12-23 02:04:40 +05:30
2020-05-24 23:13:21 +05:30
When using `needs`, artifact downloads are controlled with `artifacts: true` or `artifacts: false`.
The `dependencies` keyword should not be used with `needs`, as this is deprecated since GitLab 12.6.
2018-11-08 19:23:39 +05:30
2020-05-24 23:13:21 +05:30
In the example below, the `rspec` job will download the `build_job` artifacts, while the
`rubocop` job won't:
2015-12-23 02:04:40 +05:30
```yaml
2020-05-24 23:13:21 +05:30
build_job:
stage: build
2016-06-02 11:05:42 +05:30
artifacts:
2018-10-15 14:42:47 +05:30
paths:
2018-11-08 19:23:39 +05:30
- binaries/
2020-05-24 23:13:21 +05:30
rspec:
stage: test
needs:
- job: build_job
artifacts: true
rubocop:
stage: test
needs:
- job: build_job
artifacts: false
2015-11-26 14:37:03 +05:30
```
2020-05-24 23:13:21 +05:30
Additionally, in the three syntax examples below, the `rspec` job will download the artifacts
from all three `build_jobs`, as `artifacts` is true for `build_job_1`, and will
**default** to true for both `build_job_2` and `build_job_3`.
2015-12-23 02:04:40 +05:30
```yaml
2020-05-24 23:13:21 +05:30
rspec:
needs:
- job: build_job_1
artifacts: true
- job: build_job_2
- build_job_3
2016-06-02 11:05:42 +05:30
```
2020-05-24 23:13:21 +05:30
#### Cross project artifact downloads with `needs` **(PREMIUM)**
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/14311) in GitLab v12.7.
2020-05-24 23:13:21 +05:30
`needs` can be used to download artifacts from up to five jobs in pipelines on
[other refs in the same project](#artifact-downloads-between-pipelines-in-the-same-project),
or pipelines in different projects:
2016-06-02 11:05:42 +05:30
```yaml
2020-05-24 23:13:21 +05:30
build_job:
stage: build
script:
- ls -lhR
needs:
- project: group/project-name
job: build-1
ref: master
artifacts: true
2015-11-26 14:37:03 +05:30
```
2020-05-24 23:13:21 +05:30
`build_job` will download the artifacts from the latest successful `build-1` job
on the `master` branch in the `group/project-name` project.
##### Artifact downloads between pipelines in the same project
`needs` can be used to download artifacts from different pipelines in the current project
by setting the `project` keyword as the current project's name, and specifying a ref.
In the example below, `build_job` will download the artifacts for the latest successful
`build-1` job with the `other-ref` ref:
2015-12-23 02:04:40 +05:30
```yaml
2020-05-24 23:13:21 +05:30
build_job:
stage: build
script:
- ls -lhR
needs:
- project: group/same-project-name
job: build-1
ref: other-ref
artifacts: true
2015-11-26 14:37:03 +05:30
```
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
Downloading artifacts from jobs that are run in [`parallel:`](#parallel) is not supported.
2016-06-02 11:05:42 +05:30
2020-05-24 23:13:21 +05:30
### `tags`
`tags` is used to select specific Runners from the list of all Runners that are
allowed to run this project.
During the registration of a Runner, you can specify the Runner's tags, for
example `ruby`, `postgres`, `development`.
`tags` allow you to run jobs with Runners that have the specified tags
assigned to them:
2015-11-26 14:37:03 +05:30
2015-12-23 02:04:40 +05:30
```yaml
2016-06-02 11:05:42 +05:30
job:
2020-05-24 23:13:21 +05:30
tags:
- ruby
- postgres
2016-06-02 11:05:42 +05:30
```
2015-11-26 14:37:03 +05:30
2020-05-24 23:13:21 +05:30
The specification above, will make sure that `job` is built by a Runner that
has both `ruby` AND `postgres` tags defined.
Tags are also a great way to run different jobs on different platforms, for
example, given an OS X Runner with tag `osx` and Windows Runner with tag
`windows`, the following jobs run on respective platforms:
2017-09-10 17:25:29 +05:30
```yaml
2020-05-24 23:13:21 +05:30
windows job:
stage:
- build
tags:
- windows
script:
- echo Hello, %USERNAME%!
osx job:
stage:
- build
tags:
- osx
script:
- echo "Hello, $USER!"
2018-10-15 14:42:47 +05:30
```
2020-05-24 23:13:21 +05:30
### `allow_failure`
2018-10-15 14:42:47 +05:30
2020-05-24 23:13:21 +05:30
`allow_failure` allows a job to fail without impacting the rest of the CI
suite.
The default value is `false`, except for [manual](#whenmanual) jobs using the
`when: manual` syntax, unless using [`rules:`](#rules) syntax, where all jobs
default to false, *including* `when: manual` jobs.
2018-10-15 14:42:47 +05:30
2020-05-24 23:13:21 +05:30
When enabled and the job fails, the job will show an orange warning in the UI.
However, the logical flow of the pipeline will consider the job a
success/passed, and is not blocked.
2018-10-15 14:42:47 +05:30
2020-05-24 23:13:21 +05:30
Assuming all other jobs are successful, the job's stage and its pipeline will
show the same orange warning. However, the associated commit will be marked
"passed", without warnings.
In the example below, `job1` and `job2` will run in parallel, but if `job1`
fails, it won't stop the next stage from running, since it's marked with
`allow_failure: true`:
2018-10-15 14:42:47 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job1:
stage: test
script:
- execute_script_that_will_fail
allow_failure: true
2018-10-15 14:42:47 +05:30
2020-05-24 23:13:21 +05:30
job2:
stage: test
script:
- execute_script_that_will_succeed
2018-10-15 14:42:47 +05:30
2020-05-24 23:13:21 +05:30
job3:
stage: deploy
script:
- deploy_to_staging
2017-09-10 17:25:29 +05:30
```
2020-05-24 23:13:21 +05:30
### `when`
`when` is used to implement jobs that are run in case of failure or despite the
failure.
`when` can be set to one of the following values:
1. `on_success` - execute job only when all jobs from prior stages
succeed (or are considered succeeding because they are marked
`allow_failure`). This is the default.
1. `on_failure` - execute job only when at least one job from prior stages
fails.
1. `always` - execute job regardless of the status of jobs from prior stages.
1. `manual` - execute job manually (added in GitLab 8.10). Read about
[manual actions](#whenmanual) below.
1. `delayed` - execute job after a certain period (added in GitLab 11.14).
Read about [delayed actions](#whendelayed) below.
For example:
2020-05-24 23:13:21 +05:30
```yaml
stages:
- build
- cleanup_build
- test
- deploy
- cleanup
2020-05-24 23:13:21 +05:30
build_job:
stage: build
script:
- make build
2020-05-24 23:13:21 +05:30
cleanup_build_job:
stage: cleanup_build
script:
- cleanup build when failed
when: on_failure
2020-05-24 23:13:21 +05:30
test_job:
stage: test
script:
- make test
2020-05-24 23:13:21 +05:30
deploy_job:
stage: deploy
script:
- make deploy
when: manual
2020-05-24 23:13:21 +05:30
cleanup_job:
stage: cleanup
script:
- cleanup after jobs
when: always
```
2020-05-24 23:13:21 +05:30
The above script will:
2020-05-24 23:13:21 +05:30
1. Execute `cleanup_build_job` only when `build_job` fails.
1. Always execute `cleanup_job` as the last step in pipeline regardless of
success or failure.
1. Allow you to manually execute `deploy_job` from GitLab's UI.
2020-05-24 23:13:21 +05:30
#### `when:manual`
2020-05-24 23:13:21 +05:30
> - Introduced in GitLab 8.10.
> - Blocking manual actions were introduced in GitLab 9.0.
> - Protected actions were introduced in GitLab 9.2.
2020-05-24 23:13:21 +05:30
Manual actions are a special type of job that are not executed automatically,
they need to be explicitly started by a user. An example usage of manual actions
would be a deployment to a production environment. Manual actions can be started
from the pipeline, job, environment, and deployment views. Read more at the
[environments documentation](../environments/index.md#configuring-manual-deployments).
2020-05-24 23:13:21 +05:30
Manual actions can be either optional or blocking. Blocking manual actions will
block the execution of the pipeline at the stage this action is defined in. It's
possible to resume execution of the pipeline when someone executes a blocking
manual action by clicking a _play_ button.
2017-08-17 22:00:37 +05:30
2020-05-24 23:13:21 +05:30
When a pipeline is blocked, it won't be merged if Merge When Pipeline Succeeds
is set. Blocked pipelines also do have a special status, called _manual_.
When the `when:manual` syntax is used, manual actions are non-blocking by
default. If you want to make manual action blocking, it's necessary to add
`allow_failure: false` to the job's definition in `.gitlab-ci.yml`.
2020-05-24 23:13:21 +05:30
Optional manual actions have `allow_failure: true` set by default and their
Statuses don't contribute to the overall pipeline status. So, if a manual
action fails, the pipeline will eventually succeed.
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
When using [`rules:`](#rules), `allow_failure` defaults to `false`, including for manual jobs.
2020-05-24 23:13:21 +05:30
Manual actions are considered to be write actions, so permissions for
[protected branches](../../user/project/protected_branches.md) are used when
a user wants to trigger an action. In other words, in order to trigger a manual
action assigned to a branch that the pipeline is running for, the user needs to
have the ability to merge to this branch. It's possible to use protected environments
to more strictly [protect manual deployments](#protecting-manual-jobs-premium) from being
run by unauthorized users.
2018-11-18 11:00:15 +05:30
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
Using `when:manual` and `trigger` together results in the error `jobs:#{job-name} when
should be on_success, on_failure or always`, because `when:manual` prevents triggers
being used.
2018-11-18 11:00:15 +05:30
2020-05-24 23:13:21 +05:30
##### Protecting manual jobs **(PREMIUM)**
2018-11-18 11:00:15 +05:30
2020-05-24 23:13:21 +05:30
It's possible to use [protected environments](../environments/protected_environments.md)
to define a precise list of users authorized to run a manual job. By allowing only
users associated with a protected environment to trigger manual jobs, it's possible
to implement some special use cases, such as:
2018-11-18 11:00:15 +05:30
2020-05-24 23:13:21 +05:30
- More precisely limiting who can deploy to an environment.
- Enabling a pipeline to be blocked until an approved user "approves" it.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
To do this, you must:
2018-11-18 11:00:15 +05:30
2020-05-24 23:13:21 +05:30
1. Add an `environment` to the job. For example:
2018-11-18 11:00:15 +05:30
2020-05-24 23:13:21 +05:30
```yaml
deploy_prod:
stage: deploy
script:
- echo "Deploy to production server"
environment:
name: production
url: https://example.com
when: manual
only:
- master
```
2018-11-18 11:00:15 +05:30
2020-05-24 23:13:21 +05:30
1. In the [protected environments settings](../environments/protected_environments.md#protecting-environments),
select the environment (`production` in the example above) and add the users, roles or groups
that are authorized to trigger the manual job to the **Allowed to Deploy** list. Only those in
this list will be able to trigger this manual job, as well as GitLab administrators
who are always able to use protected environments.
2018-11-18 11:00:15 +05:30
2020-05-24 23:13:21 +05:30
Additionally, if a manual job is defined as blocking by adding `allow_failure: false`,
the next stages of the pipeline won't run until the manual job is triggered. This
can be used as a way to have a defined list of users allowed to "approve" later pipeline
stages by triggering the blocking manual job.
2018-11-18 11:00:15 +05:30
2020-05-24 23:13:21 +05:30
#### `when:delayed`
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/51352) in GitLab 11.4.
2018-11-18 11:00:15 +05:30
2020-05-24 23:13:21 +05:30
Delayed job are for executing scripts after a certain period.
This is useful if you want to avoid jobs entering `pending` state immediately.
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
You can set the period with `start_in` key. The value of `start_in` key is an elapsed time in seconds, unless a unit is
provided. `start_in` key must be less than or equal to one week. Examples of valid values include:
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
- `'5'`
- `10 seconds`
- `30 minutes`
- `1 day`
- `1 week`
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
When there is a delayed job in a stage, the pipeline won't progress until the delayed job has finished.
This means this keyword can also be used for inserting delays between different stages.
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
The timer of a delayed job starts immediately after the previous stage has completed.
Similar to other types of jobs, a delayed job's timer won't start unless the previous stage passed.
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
The following example creates a job named `timed rollout 10%` that is executed 30 minutes after the previous stage has completed:
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
```yaml
timed rollout 10%:
stage: deploy
script: echo 'Rolling out 10% ...'
when: delayed
start_in: 30 minutes
```
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
You can stop the active timer of a delayed job by clicking the **{time-out}** (**Unschedule**) button.
This job will never be executed in the future unless you execute the job manually.
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
You can start a delayed job immediately by clicking the **Play** button.
GitLab Runner will pick your job soon and start the job.
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
### `environment`
2020-04-08 14:13:33 +05:30
2020-05-24 23:13:21 +05:30
> - Introduced in GitLab 8.9.
> - You can read more about environments and find more examples in the
> [documentation about environments](../environments/index.md).
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
`environment` is used to define that a job deploys to a specific environment.
If `environment` is specified and no environment under that name exists, a new
one will be created automatically.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
In its simplest form, the `environment` keyword can be defined like:
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
```yaml
deploy to production:
stage: deploy
script: git push production HEAD:master
environment: production
```
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
In the above example, the `deploy to production` job will be marked as doing a
deployment to the `production` environment.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
#### `environment:name`
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
> - Introduced in GitLab 8.11.
> - Before GitLab 8.11, the name of an environment could be defined as a string like
> `environment: production`. The recommended way now is to define it under the
> `name` keyword.
> - The `name` parameter can use any of the defined CI variables,
> including predefined, secure variables and `.gitlab-ci.yml` [`variables`](#variables).
> You however can't use variables defined under `script`.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
The `environment` name can contain:
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
- letters
- digits
- spaces
- `-`
- `_`
- `/`
- `$`
- `{`
- `}`
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
Common names are `qa`, `staging`, and `production`, but you can use whatever
name works with your workflow.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
Instead of defining the name of the environment right after the `environment`
keyword, it's also possible to define it as a separate value. For that, use
the `name` keyword under `environment`:
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
```yaml
deploy to production:
stage: deploy
script: git push production HEAD:master
environment:
name: production
```
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
#### `environment:url`
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
> - Introduced in GitLab 8.11.
> - Before GitLab 8.11, the URL could be added only in GitLab's UI. The
> recommended way now is to define it in `.gitlab-ci.yml`.
> - The `url` parameter can use any of the defined CI variables,
> including predefined, secure variables and `.gitlab-ci.yml` [`variables`](#variables).
> You however can't use variables defined under `script`.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
This is an optional value that when set, it exposes buttons in various places
in GitLab which when clicked take you to the defined URL.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
In the example below, if the job finishes successfully, it will create buttons
in the merge requests and in the environments/deployments pages which will point
to `https://prod.example.com`.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
```yaml
deploy to production:
stage: deploy
script: git push production HEAD:master
environment:
name: production
url: https://prod.example.com
```
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
#### `environment:on_stop`
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
> - [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/22191) in GitLab 8.13.
> - Starting with GitLab 8.14, when you have an environment that has a stop action
> defined, GitLab will automatically trigger a stop action when the associated
> branch is deleted.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
Closing (stopping) environments can be achieved with the `on_stop` keyword defined under
`environment`. It declares a different job that runs in order to close
the environment.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
Read the `environment:action` section for an example.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
#### `environment:action`
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/22191) in GitLab 8.13.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
The `action` keyword is to be used in conjunction with `on_stop` and is defined
in the job that is called to close the environment.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
Take for instance:
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
```yaml
review_app:
stage: deploy
script: make deploy-app
environment:
name: review
on_stop: stop_review_app
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
stop_review_app:
stage: deploy
variables:
GIT_STRATEGY: none
script: make delete-app
when: manual
environment:
name: review
action: stop
```
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
In the above example we set up the `review_app` job to deploy to the `review`
environment, and we also defined a new `stop_review_app` job under `on_stop`.
Once the `review_app` job is successfully finished, it will trigger the
`stop_review_app` job based on what is defined under `when`. In this case we
set it up to `manual` so it will need a [manual action](#whenmanual) via
GitLab's web interface in order to run.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
Also in the example, `GIT_STRATEGY` is set to `none` so that GitLab Runner wont
try to check out the code after the branch is deleted when the `stop_review_app`
job is [automatically triggered](../environments/index.md#automatically-stopping-an-environment).
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
The above example overwrites global variables. If your stop environment job depends
on global variables, you can use [anchor variables](#yaml-anchors-for-variables) when setting the `GIT_STRATEGY`
to change it without overriding the global variables.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
The `stop_review_app` job is **required** to have the following keywords defined:
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
- `when` - [reference](#when)
- `environment:name`
- `environment:action`
- `stage` should be the same as the `review_app` in order for the environment
to stop automatically when the branch is deleted
2018-12-13 13:39:08 +05:30
2020-06-23 00:09:42 +05:30
Additionally, both jobs should have matching [`rules`](../yaml/README.md#onlyexcept-basic)
or [`only/except`](../yaml/README.md#onlyexcept-basic) configuration. In the example
above, if the configuration is not identical, the `stop_review_app` job might not be
included in all pipelines that include the `review_app` job, and it will not be
possible to trigger the `action: stop` to stop the environment automatically.
2020-05-24 23:13:21 +05:30
#### `environment:auto_stop_in`
2018-12-13 13:39:08 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/20956) in GitLab 12.8.
2019-07-31 22:56:46 +05:30
2020-05-24 23:13:21 +05:30
The `auto_stop_in` keyword is for specifying life period of the environment,
that when expired, GitLab automatically stops them.
2019-09-04 21:01:54 +05:30
2020-05-24 23:13:21 +05:30
For example,
2019-07-31 22:56:46 +05:30
2020-05-24 23:13:21 +05:30
```yaml
review_app:
script: deploy-review-app
environment:
name: review/$CI_COMMIT_REF_NAME
auto_stop_in: 1 day
```
2019-07-31 22:56:46 +05:30
2020-05-24 23:13:21 +05:30
When `review_app` job is executed and a review app is created, a life period of
the environment is set to `1 day`.
2016-06-02 11:05:42 +05:30
2020-05-24 23:13:21 +05:30
For more information, see
[the environments auto-stop documentation](../environments/index.md#environments-auto-stop)
2016-06-02 11:05:42 +05:30
2020-05-24 23:13:21 +05:30
#### `environment:kubernetes`
2016-06-02 11:05:42 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/27630) in GitLab 12.6.
2016-06-02 11:05:42 +05:30
2020-05-24 23:13:21 +05:30
The `kubernetes` block is used to configure deployments to a
[Kubernetes cluster](../../user/project/clusters/index.md) that is associated with your project.
2016-06-02 11:05:42 +05:30
2020-05-24 23:13:21 +05:30
For example:
2016-06-02 11:05:42 +05:30
```yaml
deploy:
stage: deploy
2020-05-24 23:13:21 +05:30
script: make deploy-app
environment:
name: production
kubernetes:
namespace: production
2015-11-26 14:37:03 +05:30
```
2020-05-24 23:13:21 +05:30
This will set up the `deploy` job to deploy to the `production`
environment, using the `production`
[Kubernetes namespace](https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/).
2018-03-17 18:26:18 +05:30
2020-05-24 23:13:21 +05:30
For more information, see
[Available settings for `kubernetes`](../environments/index.md#configuring-kubernetes-deployments).
2018-03-17 18:26:18 +05:30
NOTE: **Note:**
2020-05-24 23:13:21 +05:30
Kubernetes configuration is not supported for Kubernetes clusters
that are [managed by GitLab](../../user/project/clusters/index.md#gitlab-managed-clusters).
To follow progress on support for GitLab-managed clusters, see the
2020-06-23 00:09:42 +05:30
[relevant issue](https://gitlab.com/gitlab-org/gitlab/-/issues/38054).
2019-10-12 21:52:04 +05:30
2020-05-24 23:13:21 +05:30
#### Dynamic environments
2019-10-12 21:52:04 +05:30
2020-05-24 23:13:21 +05:30
> - [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/21971) in GitLab 8.12 and GitLab Runner 1.6.
> - The `$CI_ENVIRONMENT_SLUG` was [introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/22864) in GitLab 8.15.
> - The `name` and `url` parameters can use any of the defined CI variables,
> including predefined, secure variables and `.gitlab-ci.yml` [`variables`](#variables).
> You however can't use variables defined under `script`.
2019-10-12 21:52:04 +05:30
2020-05-24 23:13:21 +05:30
For example:
2019-10-12 21:52:04 +05:30
```yaml
2020-05-24 23:13:21 +05:30
deploy as review app:
2019-10-12 21:52:04 +05:30
stage: deploy
2020-05-24 23:13:21 +05:30
script: make deploy
environment:
name: review/$CI_COMMIT_REF_NAME
url: https://$CI_ENVIRONMENT_SLUG.example.com/
2019-10-12 21:52:04 +05:30
```
2020-05-24 23:13:21 +05:30
The `deploy as review app` job will be marked as deployment to dynamically
create the `review/$CI_COMMIT_REF_NAME` environment, where `$CI_COMMIT_REF_NAME`
is an [environment variable](../variables/README.md) set by the Runner. The
`$CI_ENVIRONMENT_SLUG` variable is based on the environment name, but suitable
for inclusion in URLs. In this case, if the `deploy as review app` job was run
in a branch named `pow`, this environment would be accessible with an URL like
`https://review-pow.example.com/`.
2019-10-12 21:52:04 +05:30
2020-05-24 23:13:21 +05:30
This of course implies that the underlying server which hosts the application
is properly configured.
2019-10-12 21:52:04 +05:30
2020-05-24 23:13:21 +05:30
The common use case is to create dynamic environments for branches and use them
as Review Apps. You can see a simple example using Review Apps at
<https://gitlab.com/gitlab-examples/review-apps-nginx/>.
2019-10-12 21:52:04 +05:30
2020-05-24 23:13:21 +05:30
### `cache`
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
> - Introduced in GitLab Runner v0.7.0.
> - `cache` can be set globally and per-job.
> - From GitLab 9.0, caching is enabled and shared between pipelines and jobs
> by default.
> - From GitLab 9.2, caches are restored before [artifacts](#artifacts).
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
TIP: **Learn more:**
Read how caching works and find out some good practices in the
[caching dependencies documentation](../caching/index.md).
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
`cache` is used to specify a list of files and directories which should be
cached between jobs. You can only use paths that are within the local working
copy.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
If `cache` is defined outside the scope of jobs, it means it's set
globally and all jobs will use that definition.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
#### `cache:paths`
2020-01-01 13:55:28 +05:30
2020-05-24 23:13:21 +05:30
Use the `paths` directive to choose which files or directories will be cached. Paths
are relative to the project directory (`$CI_PROJECT_DIR`) and can't directly link outside it.
Wildcards can be used that follow the [glob](https://en.wikipedia.org/wiki/Glob_(programming))
patterns and:
2020-01-01 13:55:28 +05:30
2020-05-24 23:13:21 +05:30
- In [GitLab Runner 13.0](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/2620) and later,
[`doublestar.Glob`](https://pkg.go.dev/github.com/bmatcuk/doublestar@v1.2.2?tab=doc#Match).
- In GitLab Runner 12.10 and earlier,
[`filepath.Match`](https://pkg.go.dev/path/filepath/#Match).
2020-01-01 13:55:28 +05:30
2020-05-24 23:13:21 +05:30
Cache all files in `binaries` that end in `.apk` and the `.config` file:
2020-01-01 13:55:28 +05:30
```yaml
rspec:
2020-05-24 23:13:21 +05:30
script: test
cache:
paths:
- binaries/*.apk
- .config
2020-01-01 13:55:28 +05:30
```
2020-05-24 23:13:21 +05:30
Locally defined cache overrides globally defined options. The following `rspec`
job will cache only `binaries/`:
2020-01-01 13:55:28 +05:30
```yaml
2020-05-24 23:13:21 +05:30
cache:
paths:
- my/files
2020-01-01 13:55:28 +05:30
rspec:
2020-05-24 23:13:21 +05:30
script: test
cache:
key: rspec
paths:
- binaries/
2020-01-01 13:55:28 +05:30
```
2020-05-24 23:13:21 +05:30
Note that since cache is shared between jobs, if you're using different
paths for different jobs, you should also set a different **cache:key**
otherwise cache content can be overwritten.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
#### `cache:key`
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
> Introduced in GitLab Runner v1.0.0.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
Since the cache is shared between jobs, if you're using different
paths for different jobs, you should also set a different `cache:key`
otherwise cache content can be overwritten.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
The `key` directive allows you to define the affinity of caching between jobs,
allowing to have a single cache for all jobs, cache per-job, cache per-branch
or any other way that fits your workflow. This way, you can fine tune caching,
allowing you to cache data between different jobs or even different branches.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
The `cache:key` variable can use any of the
[predefined variables](../variables/README.md), and the default key, if not
set, is just literal `default` which means everything is shared between
pipelines and jobs by default, starting from GitLab 9.0.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
The `cache:key` variable can't contain the `/` character, or the equivalent
URI-encoded `%2F`; a value made only of dots (`.`, `%2E`) is also forbidden.
For example, to enable per-branch caching:
2020-03-13 15:44:24 +05:30
```yaml
2020-05-24 23:13:21 +05:30
cache:
key: "$CI_COMMIT_REF_SLUG"
paths:
- binaries/
2020-03-13 15:44:24 +05:30
```
2020-05-24 23:13:21 +05:30
If you use **Windows Batch** to run your shell scripts you need to replace
`$` with `%`:
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
```yaml
cache:
key: "%CI_COMMIT_REF_SLUG%"
paths:
- binaries/
```
2016-06-02 11:05:42 +05:30
2020-05-24 23:13:21 +05:30
##### `cache:key:files`
2017-08-17 22:00:37 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/18986) in GitLab v12.5.
2017-08-17 22:00:37 +05:30
2020-05-24 23:13:21 +05:30
The `cache:key:files` keyword extends the `cache:key` functionality by making it easier
to reuse some caches, and rebuild them less often, which will speed up subsequent pipeline
runs.
2017-08-17 22:00:37 +05:30
2020-05-24 23:13:21 +05:30
When you include `cache:key:files`, you must also list the project files that will be used to generate the key, up to a maximum of two files.
The cache `key` will be a SHA checksum computed from the most recent commits (up to two, if two files are listed)
that changed the given files. If neither file was changed in any commits,
the fallback key will be `default`.
2017-08-17 22:00:37 +05:30
```yaml
2020-05-24 23:13:21 +05:30
cache:
key:
files:
- Gemfile.lock
- package.json
paths:
- vendor/ruby
- node_modules
2017-08-17 22:00:37 +05:30
```
2020-05-24 23:13:21 +05:30
In this example we're creating a cache for Ruby and Node.js dependencies that
is tied to current versions of the `Gemfile.lock` and `package.json` files. Whenever one of
these files changes, a new cache key is computed and a new cache is created. Any future
job runs using the same `Gemfile.lock` and `package.json` with `cache:key:files` will
use the new cache, instead of rebuilding the dependencies.
2017-09-10 17:25:29 +05:30
2020-05-24 23:13:21 +05:30
##### `cache:key:prefix`
2017-09-10 17:25:29 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/18986) in GitLab v12.5.
2017-09-10 17:25:29 +05:30
2020-05-24 23:13:21 +05:30
The `prefix` parameter adds extra functionality to `key:files` by allowing the key to
be composed of the given `prefix` combined with the SHA computed for `cache:key:files`.
For example, adding a `prefix` of `test`, will cause keys to look like: `test-feef9576d21ee9b6a32e30c5c79d0a0ceb68d1e5`.
If neither file was changed in any commits, the prefix is added to `default`, so the
key in the example would be `test-default`.
2017-09-10 17:25:29 +05:30
2020-05-24 23:13:21 +05:30
Like `cache:key`, `prefix` can use any of the [predefined variables](../variables/README.md),
but the following are not allowed:
2017-09-10 17:25:29 +05:30
2020-05-24 23:13:21 +05:30
- the `/` character (or the equivalent URI-encoded `%2F`)
- a value made only of `.` (or the equivalent URI-encoded `%2E`)
2017-09-10 17:25:29 +05:30
```yaml
2020-05-24 23:13:21 +05:30
cache:
key:
files:
- Gemfile.lock
prefix: ${CI_JOB_NAME}
paths:
- vendor/ruby
rspec:
script:
- bundle exec rspec
2017-09-10 17:25:29 +05:30
```
2020-05-24 23:13:21 +05:30
For example, adding a `prefix` of `$CI_JOB_NAME` will
cause the key to look like: `rspec-feef9576d21ee9b6a32e30c5c79d0a0ceb68d1e5` and
the job cache is shared across different branches. If a branch changes
`Gemfile.lock`, that branch will have a new SHA checksum for `cache:key:files`. A new cache key
will be generated, and a new cache will be created for that key.
If `Gemfile.lock` is not found, the prefix is added to
`default`, so the key in the example would be `rspec-default`.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
#### `cache:untracked`
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
Set `untracked: true` to cache all files that are untracked in your Git
repository:
2018-12-13 13:39:08 +05:30
```yaml
2020-05-24 23:13:21 +05:30
rspec:
script: test
cache:
untracked: true
2018-12-13 13:39:08 +05:30
```
2020-05-24 23:13:21 +05:30
Cache all Git untracked files and files in `binaries`:
2018-12-13 13:39:08 +05:30
```yaml
2020-05-24 23:13:21 +05:30
rspec:
script: test
cache:
untracked: true
paths:
- binaries/
2018-12-13 13:39:08 +05:30
```
2020-05-24 23:13:21 +05:30
#### `cache:policy`
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
> Introduced in GitLab 9.4.
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
The default behavior of a caching job is to download the files at the start of
execution, and to re-upload them at the end. This allows any changes made by the
job to be persisted for future runs, and is known as the `pull-push` cache
policy.
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
If you know the job does not alter the cached files, you can skip the upload step
by setting `policy: pull` in the job specification. Typically, this would be
twinned with an ordinary cache job at an earlier stage to ensure the cache
is updated from time to time:
2019-12-04 20:38:33 +05:30
```yaml
2020-05-24 23:13:21 +05:30
stages:
- setup
- test
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
prepare:
stage: setup
cache:
key: gems
paths:
- vendor/bundle
script:
- bundle install --deployment
rspec:
stage: test
cache:
key: gems
paths:
- vendor/bundle
policy: pull
script:
- bundle exec rspec ...
2019-12-04 20:38:33 +05:30
```
2020-05-24 23:13:21 +05:30
This helps to speed up job execution and reduce load on the cache server,
especially when you have a large number of cache-using jobs executing in
parallel.
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
Additionally, if you have a job that unconditionally recreates the cache without
reference to its previous contents, you can use `policy: push` in that job to
skip the download step.
### `artifacts`
> - Introduced in GitLab Runner v0.7.0 for non-Windows platforms.
> - Windows support was added in GitLab Runner v.1.0.0.
> - From GitLab 9.2, caches are restored before artifacts.
> - Not all executors are [supported](https://docs.gitlab.com/runner/executors/#compatibility-chart).
> - Job artifacts are only collected for successful jobs by default.
`artifacts` is used to specify a list of files and directories which should be
attached to the job when it [succeeds, fails, or always](#artifactswhen).
The artifacts will be sent to GitLab after the job finishes and will
be available for download in the GitLab UI.
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
[Read more about artifacts](../pipelines/job_artifacts.md).
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
#### `artifacts:paths`
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
Paths are relative to the project directory (`$CI_PROJECT_DIR`) and can't directly
link outside it. Wildcards can be used that follow the [glob](https://en.wikipedia.org/wiki/Glob_(programming))
patterns and [`filepath.Match`](https://golang.org/pkg/path/filepath/#Match).
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
To restrict which jobs a specific job will fetch artifacts from, see [dependencies](#dependencies).
2018-12-13 13:39:08 +05:30
2020-05-24 23:13:21 +05:30
Send all files in `binaries` and `.config`:
2018-12-13 13:39:08 +05:30
2020-01-01 13:55:28 +05:30
```yaml
2020-05-24 23:13:21 +05:30
artifacts:
paths:
- binaries/
- .config
2018-12-13 13:39:08 +05:30
```
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
To disable artifact passing, define the job with empty [dependencies](#dependencies):
2019-10-12 21:52:04 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
stage: build
script: make build
dependencies: []
2019-10-12 21:52:04 +05:30
```
2020-05-24 23:13:21 +05:30
You may want to create artifacts only for tagged releases to avoid filling the
build server storage with temporary build artifacts.
2019-10-12 21:52:04 +05:30
2020-05-24 23:13:21 +05:30
Create artifacts only for tags (`default-job` won't create artifacts):
2019-10-12 21:52:04 +05:30
2020-05-24 23:13:21 +05:30
```yaml
default-job:
script:
- mvn test -U
except:
- tags
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
release-job:
script:
- mvn package -U
artifacts:
paths:
- target/*.war
only:
- tags
```
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
You can use wildcards for directories too. For example, if you want to get all the files inside the directories that end with `xyz`:
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
```yaml
job:
artifacts:
paths:
- path/*xyz/*
```
2020-03-13 15:44:24 +05:30
2020-06-23 00:09:42 +05:30
#### `artifacts:exclude`
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/15122) in GitLab 13.1
> - Requires GitLab Runner 13.1
`exclude` makes it possible to prevent files from being added to an artifacts
archive.
Similar to [`artifacts:paths`](#artifactspaths), `exclude` paths are relative
to the project directory. Wildcards can be used that follow the
[glob](https://en.wikipedia.org/wiki/Glob_(programming)) patterns and
[`filepath.Match`](https://golang.org/pkg/path/filepath/#Match).
For example, to store all files in `binaries/`, but not `*.o` files located in
subdirectories of `binaries/`:
```yaml
artifacts:
paths:
- binaries/
exclude:
- binaries/**/*.o
```
Files matched by [`artifacts:untracked`](#artifactsuntracked) can be excluded using
`artifacts:exclude` too.
2020-05-24 23:13:21 +05:30
#### `artifacts:expose_as`
2019-07-07 11:18:12 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/15018) in GitLab 12.5.
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
The `expose_as` keyword can be used to expose [job artifacts](../pipelines/job_artifacts.md)
in the [merge request](../../user/project/merge_requests/index.md) UI.
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
For example, to match a single file:
2019-07-07 11:18:12 +05:30
```yaml
2020-05-24 23:13:21 +05:30
test:
script: [ 'echo 1' ]
artifacts:
expose_as: 'artifact 1'
paths: ['path/to/file.txt']
2019-07-07 11:18:12 +05:30
```
2020-05-24 23:13:21 +05:30
With this configuration, GitLab will add a link **artifact 1** to the relevant merge request
that points to `file1.txt`.
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
An example that will match an entire directory:
2019-07-07 11:18:12 +05:30
```yaml
2020-05-24 23:13:21 +05:30
test:
script: [ 'echo 1' ]
artifacts:
expose_as: 'artifact 1'
paths: ['path/to/directory/']
2019-07-07 11:18:12 +05:30
```
2020-05-24 23:13:21 +05:30
Note the following:
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
- A maximum of 10 job artifacts per merge request can be exposed.
- Glob patterns are unsupported.
- If a directory is specified, the link will be to the job [artifacts browser](../pipelines/job_artifacts.md#browsing-artifacts) if there is more than
one file in the directory.
- For exposed single file artifacts with `.html`, `.htm`, `.txt`, `.json`, `.xml`,
and `.log` extensions, if [GitLab Pages](../../administration/pages/index.md) is:
- Enabled, GitLab will automatically render the artifact.
- Not enabled, you will see the file in the artifacts browser.
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
#### `artifacts:name`
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
> Introduced in GitLab 8.6 and GitLab Runner v1.1.0.
2019-12-26 22:10:19 +05:30
2020-05-24 23:13:21 +05:30
The `name` directive allows you to define the name of the created artifacts
archive. That way, you can have a unique name for every archive which could be
useful when you'd like to download the archive from GitLab. The `artifacts:name`
variable can make use of any of the [predefined variables](../variables/README.md).
The default name is `artifacts`, which becomes `artifacts.zip` when downloaded.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
If your branch-name contains forward slashes
(for example `feature/my-feature`) it's advised to use `$CI_COMMIT_REF_SLUG`
instead of `$CI_COMMIT_REF_NAME` for proper naming of the artifact.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
To create an archive with a name of the current job:
2020-03-13 15:44:24 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
artifacts:
name: "$CI_JOB_NAME"
paths:
- binaries/
2020-03-13 15:44:24 +05:30
```
2020-05-24 23:13:21 +05:30
To create an archive with a name of the current branch or tag including only
the binaries directory:
2020-03-13 15:44:24 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
artifacts:
name: "$CI_COMMIT_REF_NAME"
paths:
- binaries/
2020-03-13 15:44:24 +05:30
```
2020-05-24 23:13:21 +05:30
To create an archive with a name of the current job and the current branch or
tag including only the binaries directory:
2020-04-08 14:13:33 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
2020-04-08 14:13:33 +05:30
artifacts:
2020-05-24 23:13:21 +05:30
name: "$CI_JOB_NAME-$CI_COMMIT_REF_NAME"
2020-04-08 14:13:33 +05:30
paths:
2020-05-24 23:13:21 +05:30
- binaries/
2020-04-08 14:13:33 +05:30
```
2020-05-24 23:13:21 +05:30
To create an archive with a name of the current [stage](#stages) and branch name:
2020-03-13 15:44:24 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
artifacts:
name: "$CI_JOB_STAGE-$CI_COMMIT_REF_NAME"
paths:
- binaries/
2020-03-13 15:44:24 +05:30
```
2020-05-24 23:13:21 +05:30
---
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
If you use **Windows Batch** to run your shell scripts you need to replace
`$` with `%`:
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
```yaml
job:
artifacts:
name: "%CI_JOB_STAGE%-%CI_COMMIT_REF_NAME%"
paths:
- binaries/
```
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
If you use **Windows PowerShell** to run your shell scripts you need to replace
`$` with `$env:`:
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
```yaml
job:
artifacts:
name: "$env:CI_JOB_STAGE-$env:CI_COMMIT_REF_NAME"
paths:
- binaries/
```
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
#### `artifacts:untracked`
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
`artifacts:untracked` is used to add all Git untracked files as artifacts (along
to the paths defined in `artifacts:paths`).
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
`artifacts:untracked` ignores configuration in the repository's `.gitignore` file.
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
Send all Git untracked files:
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
```yaml
artifacts:
untracked: true
2019-12-04 20:38:33 +05:30
```
2020-05-24 23:13:21 +05:30
Send all Git untracked files and files in `binaries`:
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
```yaml
artifacts:
untracked: true
paths:
- binaries/
```
2019-12-04 20:38:33 +05:30
2020-06-23 00:09:42 +05:30
Send all untracked files but [exclude](#artifactsexclude) `*.txt`:
```yaml
artifacts:
untracked: true
exclude:
- *.txt
```
2020-05-24 23:13:21 +05:30
#### `artifacts:when`
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
> Introduced in GitLab 8.9 and GitLab Runner v1.3.0.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
`artifacts:when` is used to upload artifacts on job failure or despite the
failure.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
`artifacts:when` can be set to one of the following values:
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
1. `on_success` - upload artifacts only when the job succeeds. This is the default.
1. `on_failure` - upload artifacts only when the job fails.
1. `always` - upload artifacts regardless of the job status.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
To upload artifacts only when job fails:
2020-03-13 15:44:24 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job:
artifacts:
when: on_failure
2020-03-13 15:44:24 +05:30
```
2020-05-24 23:13:21 +05:30
#### `artifacts:expire_in`
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
> Introduced in GitLab 8.9 and GitLab Runner v1.3.0.
2020-03-13 15:44:24 +05:30
2020-05-24 23:13:21 +05:30
`expire_in` allows you to specify how long artifacts should live before they
expire and are therefore deleted, counting from the time they are uploaded and
stored on GitLab. If the expiry time is not defined, it defaults to the
[instance wide setting](../../user/admin_area/settings/continuous_integration.md#default-artifacts-expiration-core-only)
(30 days by default, forever on GitLab.com).
2020-04-22 19:07:51 +05:30
2020-05-24 23:13:21 +05:30
You can use the **Keep** button on the job page to override expiration and
keep artifacts forever.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
After their expiry, artifacts are deleted hourly by default (via a cron job),
and are not accessible anymore.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
The value of `expire_in` is an elapsed time in seconds, unless a unit is
provided. Examples of valid values:
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
- `42`
- `3 mins 4 sec`
- `2 hrs 20 min`
- `2h20min`
- `6 mos 1 day`
- `47 yrs 6 mos and 4d`
- `3 weeks and 2 days`
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
To expire artifacts 1 week after being uploaded:
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
```yaml
job:
artifacts:
expire_in: 1 week
```
2018-12-05 23:21:45 +05:30
2019-03-02 22:35:43 +05:30
NOTE: **Note:**
2020-06-23 00:09:42 +05:30
For artifacts created in [GitLab 13.1](https://gitlab.com/gitlab-org/gitlab/-/issues/16267)
2020-05-24 23:13:21 +05:30
and later, the latest artifact for a ref is always kept, regardless of the expiry time.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
#### `artifacts:reports`
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
The [`artifacts:reports` keyword](../pipelines/job_artifacts.md#artifactsreports)
is used for collecting test reports, code quality reports, and security reports from jobs.
It also exposes these reports in GitLab's UI (merge requests, pipeline views, and security dashboards).
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
These are the available report types:
| Parameter | Description |
|--------------------------------------------------------------------------------------------------------------------------------------|-------------|
| [`artifacts:reports:junit`](../pipelines/job_artifacts.md#artifactsreportsjunit) | The `junit` report collects JUnit XML files. |
| [`artifacts:reports:dotenv`](../pipelines/job_artifacts.md#artifactsreportsdotenv) | The `dotenv` report collects a set of environment variables. |
| [`artifacts:reports:cobertura`](../pipelines/job_artifacts.md#artifactsreportscobertura) | The `cobertura` report collects Cobertura coverage XML files. |
| [`artifacts:reports:terraform`](../pipelines/job_artifacts.md#artifactsreportsterraform) | The `terraform` report collects Terraform `tfplan.json` files. |
| [`artifacts:reports:codequality`](../pipelines/job_artifacts.md#artifactsreportscodequality-starter) **(STARTER)** | The `codequality` report collects CodeQuality issues. |
| [`artifacts:reports:sast`](../pipelines/job_artifacts.md#artifactsreportssast-ultimate) **(ULTIMATE)** | The `sast` report collects Static Application Security Testing vulnerabilities. |
| [`artifacts:reports:dependency_scanning`](../pipelines/job_artifacts.md#artifactsreportsdependency_scanning-ultimate) **(ULTIMATE)** | The `dependency_scanning` report collects Dependency Scanning vulnerabilities. |
| [`artifacts:reports:container_scanning`](../pipelines/job_artifacts.md#artifactsreportscontainer_scanning-ultimate) **(ULTIMATE)** | The `container_scanning` report collects Container Scanning vulnerabilities. |
| [`artifacts:reports:dast`](../pipelines/job_artifacts.md#artifactsreportsdast-ultimate) **(ULTIMATE)** | The `dast` report collects Dynamic Application Security Testing vulnerabilities. |
| [`artifacts:reports:license_management`](../pipelines/job_artifacts.md#artifactsreportslicense_management-ultimate) **(ULTIMATE)** | The `license_management` report collects Licenses (*removed from GitLab 13.0*). |
| [`artifacts:reports:license_scanning`](../pipelines/job_artifacts.md#artifactsreportslicense_scanning-ultimate) **(ULTIMATE)** | The `license_scanning` report collects Licenses. |
| [`artifacts:reports:performance`](../pipelines/job_artifacts.md#artifactsreportsperformance-premium) **(PREMIUM)** | The `performance` report collects Performance metrics. |
| [`artifacts:reports:metrics`](../pipelines/job_artifacts.md#artifactsreportsmetrics-premium) **(PREMIUM)** | The `metrics` report collects Metrics. |
#### `dependencies`
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
> Introduced in GitLab 8.6 and GitLab Runner v1.1.1.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
By default, all [`artifacts`](#artifacts) from all previous [stages](#stages)
are passed, but you can use the `dependencies` parameter to define a limited
list of jobs (or no jobs) to fetch artifacts from.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
To use this feature, define `dependencies` in context of the job and pass
a list of all previous jobs from which the artifacts should be downloaded.
You can only define jobs from stages that are executed before the current one.
An error will be shown if you define jobs from the current stage or next ones.
Defining an empty array will skip downloading any artifacts for that job.
The status of the previous job is not considered when using `dependencies`, so
if it failed or it's a manual job that was not run, no error occurs.
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
In the following example, we define two jobs with artifacts, `build:osx` and
`build:linux`. When the `test:osx` is executed, the artifacts from `build:osx`
will be downloaded and extracted in the context of the build. The same happens
for `test:linux` and artifacts from `build:linux`.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
The job `deploy` will download artifacts from all previous jobs because of
the [stage](#stages) precedence:
2019-03-02 22:35:43 +05:30
```yaml
2020-05-24 23:13:21 +05:30
build:osx:
stage: build
script: make build:osx
artifacts:
paths:
- binaries/
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
build:linux:
stage: build
script: make build:linux
artifacts:
paths:
- binaries/
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
test:osx:
stage: test
script: make test:osx
dependencies:
- build:osx
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
test:linux:
stage: test
script: make test:linux
dependencies:
- build:linux
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
deploy:
stage: deploy
script: make deploy
2018-12-05 23:21:45 +05:30
```
2020-05-24 23:13:21 +05:30
##### When a dependent job will fail
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
> Introduced in GitLab 10.3.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
If the artifacts of the job that is set as a dependency have been
[expired](#artifactsexpire_in) or
[erased](../pipelines/job_artifacts.md#erasing-artifacts), then
the dependent job will fail.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
You can ask your administrator to
[flip this switch](../../administration/job_artifacts.md#validation-for-dependencies)
and bring back the old behavior.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
### `coverage`
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/20428) in GitLab 8.17.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
`coverage` allows you to configure how code coverage will be extracted from the
job output.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
Regular expressions are the only valid kind of value expected here. So, using
surrounding `/` is mandatory in order to consistently and explicitly represent
a regular expression string. You must escape special characters if you want to
match them literally.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
A simple example:
2019-03-02 22:35:43 +05:30
```yaml
2020-05-24 23:13:21 +05:30
job1:
script: rspec
coverage: '/Code coverage: \d+\.\d+/'
2019-02-15 15:39:39 +05:30
```
2020-05-24 23:13:21 +05:30
### `retry`
> - [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/3442) in GitLab 9.5.
> - [Behavior expanded](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/3515) in GitLab 11.5 to control on which failures to retry.
`retry` allows you to configure how many times a job is going to be retried in
case of a failure.
When a job fails and has `retry` configured, it's going to be processed again
up to the amount of times specified by the `retry` keyword.
If `retry` is set to 2, and a job succeeds in a second run (first retry), it won't be retried
again. `retry` value has to be a positive integer, equal or larger than 0, but
lower or equal to 2 (two retries maximum, three runs in total).
A simple example to retry in all failure cases:
2019-12-04 20:38:33 +05:30
```yaml
2020-05-24 23:13:21 +05:30
test:
script: rspec
retry: 2
2019-12-04 20:38:33 +05:30
```
2020-05-24 23:13:21 +05:30
By default, a job will be retried on all failure cases. To have a better control
on which failures to retry, `retry` can be a hash with the following keys:
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
- `max`: The maximum number of retries.
- `when`: The failure cases to retry.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
To retry only runner system failures at maximum two times:
2018-12-05 23:21:45 +05:30
2019-03-02 22:35:43 +05:30
```yaml
2020-05-24 23:13:21 +05:30
test:
script: rspec
retry:
max: 2
when: runner_system_failure
2019-03-02 22:35:43 +05:30
```
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
If there is another failure, other than a runner system failure, the job will
not be retried.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
To retry on multiple failure cases, `when` can also be an array of failures:
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
```yaml
test:
script: rspec
retry:
max: 2
when:
- runner_system_failure
- stuck_or_timeout_failure
```
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
Possible values for `when` are:
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
<!--
Please make sure to update `RETRY_WHEN_IN_DOCUMENTATION` array in
`spec/lib/gitlab/ci/config/entry/retry_spec.rb` if you change any of
the documented values below. The test there makes sure that all documented
values are really valid as a configuration option and therefore should always
stay in sync with this documentation.
-->
2019-12-21 20:55:43 +05:30
2020-05-24 23:13:21 +05:30
- `always`: Retry on any failure (default).
- `unknown_failure`: Retry when the failure reason is unknown.
- `script_failure`: Retry when the script failed.
- `api_failure`: Retry on API failure.
- `stuck_or_timeout_failure`: Retry when the job got stuck or timed out.
- `runner_system_failure`: Retry if there was a runner system failure (for example, job setup failed).
- `missing_dependency_failure`: Retry if a dependency was missing.
- `runner_unsupported`: Retry if the runner was unsupported.
- `stale_schedule`: Retry if a delayed job could not be executed.
- `job_execution_timeout`: Retry if the script exceeded the maximum execution time set for the job.
- `archived_failure`: Retry if the job is archived and can't be run.
- `unmet_prerequisites`: Retry if the job failed to complete prerequisite tasks.
- `scheduler_failure`: Retry if the scheduler failed to assign the job to a runner.
- `data_integrity_failure`: Retry if there was a structural integrity problem detected.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
You can specify the number of [retry attempts for certain stages of job execution](#job-stages-attempts) using variables.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
### `timeout`
2018-12-05 23:21:45 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/14887) in GitLab 12.3.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
`timeout` allows you to configure a timeout for a specific job. For example:
2019-02-15 15:39:39 +05:30
2019-03-02 22:35:43 +05:30
```yaml
2020-05-24 23:13:21 +05:30
build:
script: build.sh
timeout: 3 hours 30 minutes
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
test:
script: rspec
timeout: 3h 30m
2019-03-02 22:35:43 +05:30
```
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
The job-level timeout can exceed the
[project-level timeout](../pipelines/settings.md#timeout) but can't
exceed the Runner-specific timeout.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
### `parallel`
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/21480) in GitLab 11.5.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
`parallel` allows you to configure how many instances of a job to run in
parallel. This value has to be greater than or equal to two (2) and less than or equal to 50.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
This creates N instances of the same job that run in parallel. They are named
sequentially from `job_name 1/N` to `job_name N/N`.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
For every job, `CI_NODE_INDEX` and `CI_NODE_TOTAL` [environment variables](../variables/README.md#predefined-environment-variables) are set.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
Marking a job to be run in parallel requires adding `parallel` to your configuration
file. For example:
2019-03-02 22:35:43 +05:30
```yaml
2020-05-24 23:13:21 +05:30
test:
script: rspec
parallel: 5
2019-03-02 22:35:43 +05:30
```
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
TIP: **Tip:**
Parallelize tests suites across parallel jobs.
Different languages have different tools to facilitate this.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
A simple example using [Semaphore Test Boosters](https://github.com/renderedtext/test-boosters) and RSpec to run some Ruby tests:
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
```ruby
# Gemfile
source 'https://rubygems.org'
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
gem 'rspec'
gem 'semaphore_test_boosters'
2019-03-02 22:35:43 +05:30
```
2019-02-15 15:39:39 +05:30
2019-03-02 22:35:43 +05:30
```yaml
2020-05-24 23:13:21 +05:30
test:
parallel: 3
2019-03-02 22:35:43 +05:30
script:
2020-05-24 23:13:21 +05:30
- bundle
- bundle exec rspec_booster --job $CI_NODE_INDEX/$CI_NODE_TOTAL
2019-03-02 22:35:43 +05:30
```
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
CAUTION: **Caution:**
Please be aware that semaphore_test_boosters reports usages statistics to the author.
2019-02-15 15:39:39 +05:30
2020-05-24 23:13:21 +05:30
You can then navigate to the **Jobs** tab of a new pipeline build and see your RSpec
job split into three separate jobs.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
### `trigger`
2018-12-05 23:21:45 +05:30
2020-06-23 00:09:42 +05:30
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/8997) in [GitLab Premium](https://about.gitlab.com/pricing/) 11.8.
> - [Moved](https://gitlab.com/gitlab-org/gitlab/-/issues/199224) to GitLab Core in 12.8.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
`trigger` allows you to define downstream pipeline trigger. When a job created
from `trigger` definition is started by GitLab, a downstream pipeline gets
created.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
This keyword allows the creation of two different types of downstream pipelines:
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
- [Multi-project pipelines](../multi_project_pipelines.md#creating-multi-project-pipelines-from-gitlab-ciyml)
- [Child pipelines](../parent_child_pipelines.md)
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
Using a `trigger` with `when:manual` together results in the error `jobs:#{job-name}
when should be on_success, on_failure or always`, because `when:manual` prevents
triggers being used.
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
#### Simple `trigger` syntax for multi-project pipelines
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
The simplest way to configure a downstream trigger is to use `trigger` keyword
with a full path to a downstream project:
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
```yaml
rspec:
stage: test
script: bundle exec rspec
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
staging:
stage: deploy
trigger: my/deployment
```
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
#### Complex `trigger` syntax for multi-project pipelines
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
It's possible to configure a branch name that GitLab will use to create
a downstream pipeline with:
2018-12-05 23:21:45 +05:30
2019-03-02 22:35:43 +05:30
```yaml
2020-05-24 23:13:21 +05:30
rspec:
stage: test
script: bundle exec rspec
staging:
stage: deploy
trigger:
project: my/deployment
branch: stable
2018-12-05 23:21:45 +05:30
```
2020-05-24 23:13:21 +05:30
It's possible to mirror the status from a triggered pipeline:
2018-12-05 23:21:45 +05:30
2019-03-02 22:35:43 +05:30
```yaml
2020-05-24 23:13:21 +05:30
trigger_job:
trigger:
project: my/project
strategy: depend
```
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
It's possible to mirror the status from an upstream pipeline:
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
```yaml
upstream_bridge:
stage: test
needs:
pipeline: other/project
2018-12-05 23:21:45 +05:30
```
2020-05-24 23:13:21 +05:30
#### `trigger` syntax for child pipeline
2019-07-07 11:18:12 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/16094) in GitLab 12.7.
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
To create a [child pipeline](../parent_child_pipelines.md), specify the path to the
YAML file containing the CI config of the child pipeline:
2019-07-07 11:18:12 +05:30
```yaml
2020-05-24 23:13:21 +05:30
trigger_job:
trigger:
include: path/to/child-pipeline.yml
2019-07-07 11:18:12 +05:30
```
2020-05-24 23:13:21 +05:30
Similar to [multi-project pipelines](../multi_project_pipelines.md#mirroring-status-from-triggered-pipeline),
it's possible to mirror the status from a triggered pipeline:
2019-07-07 11:18:12 +05:30
```yaml
2020-05-24 23:13:21 +05:30
trigger_job:
trigger:
include:
- local: path/to/child-pipeline.yml
strategy: depend
2019-07-07 11:18:12 +05:30
```
2020-05-24 23:13:21 +05:30
##### Trigger child pipeline with generated configuration file
2019-07-07 11:18:12 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/35632) in GitLab 12.9.
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
You can also trigger a child pipeline from a [dynamically generated configuration file](../parent_child_pipelines.md#dynamic-child-pipelines):
2019-07-07 11:18:12 +05:30
```yaml
2020-05-24 23:13:21 +05:30
generate-config:
stage: build
script: generate-ci-config > generated-config.yml
artifacts:
paths:
- generated-config.yml
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
child-pipeline:
stage: test
trigger:
include:
- artifact: generated-config.yml
job: generate-config
2019-07-07 11:18:12 +05:30
```
2020-05-24 23:13:21 +05:30
The `generated-config.yml` is extracted from the artifacts and used as the configuration
for triggering the child pipeline.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
#### Linking pipelines with `trigger:strategy`
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
By default, the `trigger` job completes with the `success` status
as soon as the downstream pipeline is created.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
To force the `trigger` job to wait for the downstream (multi-project or child) pipeline to complete, use
`strategy: depend`. This will make the trigger job wait with a "running" status until the triggered
pipeline completes. At that point, the `trigger` job will complete and display the same status as
the downstream job.
2019-03-02 22:35:43 +05:30
```yaml
2020-05-24 23:13:21 +05:30
trigger_job:
trigger:
include: path/to/child-pipeline.yml
strategy: depend
2019-03-02 22:35:43 +05:30
```
2020-05-24 23:13:21 +05:30
This can help keep your pipeline execution linear. In the example above, jobs from
subsequent stages will wait for the triggered pipeline to successfully complete before
starting, at the cost of reduced parallelization.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
#### Trigger a pipeline by API call
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
Triggers can be used to force a rebuild of a specific branch, tag or commit,
with an API call when a pipeline gets created using a trigger token.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
Not to be confused with the [`trigger`](#trigger) parameter.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
[Read more in the triggers documentation.](../triggers/README.md)
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
### `interruptible`
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/32022) in GitLab 12.3.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
`interruptible` is used to indicate that a job should be canceled if made redundant by a newer pipeline run. Defaults to `false`.
This value will only be used if the [automatic cancellation of redundant pipelines feature](../pipelines/settings.md#auto-cancel-pending-pipelines)
is enabled.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
When enabled, a pipeline on the same branch will be canceled when:
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
- it's made redundant by a newer pipeline run.
- Either all jobs are set as interruptible, or any uninterruptible jobs haven't started.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
Pending jobs are always considered interruptible.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
TIP: **Tip:**
Set jobs as interruptible that can be safely canceled once started (for instance, a build job).
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
Here is a simple example:
2019-09-04 21:01:54 +05:30
```yaml
2020-05-24 23:13:21 +05:30
stages:
- stage1
- stage2
- stage3
2019-09-04 21:01:54 +05:30
2020-05-24 23:13:21 +05:30
step-1:
stage: stage1
2019-09-04 21:01:54 +05:30
script:
2020-05-24 23:13:21 +05:30
- echo "Can be canceled."
interruptible: true
2019-09-04 21:01:54 +05:30
2020-05-24 23:13:21 +05:30
step-2:
stage: stage2
script:
- echo "Can not be canceled."
2019-09-04 21:01:54 +05:30
2020-05-24 23:13:21 +05:30
step-3:
stage: stage3
2019-09-04 21:01:54 +05:30
script:
2020-05-24 23:13:21 +05:30
- echo "Because step-2 can not be canceled, this step will never be canceled, even though set as interruptible."
interruptible: true
2019-09-04 21:01:54 +05:30
```
2020-05-24 23:13:21 +05:30
In the example above, a new pipeline run will cause an existing running pipeline to be:
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
- Canceled, if only `step-1` is running or pending.
- Not canceled, once `step-2` starts running.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
NOTE: **Note:**
Once an uninterruptible job is running, the pipeline will never be canceled, regardless of the final job's state.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
### `resource_group`
2019-03-02 22:35:43 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/15536) in GitLab 12.7.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
Sometimes running multiples jobs or pipelines at the same time in an environment
can lead to errors during the deployment.
2019-03-02 22:35:43 +05:30
2020-05-24 23:13:21 +05:30
To avoid these errors, the `resource_group` attribute can be used to ensure that
the Runner won't run certain jobs simultaneously.
When the `resource_group` key is defined for a job in `.gitlab-ci.yml`,
job executions are mutually exclusive across different pipelines for the same project.
If multiple jobs belonging to the same resource group are enqueued simultaneously,
only one of the jobs will be picked by the Runner, and the other jobs will wait until the
`resource_group` is free.
Here is a simple example:
```yaml
deploy-to-production:
script: deploy
resource_group: production
2019-03-02 22:35:43 +05:30
```
2020-05-24 23:13:21 +05:30
In this case, if a `deploy-to-production` job is running in a pipeline, and a new
`deploy-to-production` job is created in a different pipeline, it won't run until
the currently running/pending `deploy-to-production` job is finished. As a result,
you can ensure that concurrent deployments will never happen to the production environment.
There can be multiple `resource_group`s defined per environment. A good use case for this
is when deploying to physical devices. You may have more than one physical device, and each
one can be deployed to, but there can be only one deployment per device at any given time.
NOTE: **Note:**
This key can only contain letters, digits, `-`, `_`, `/`, `$`, `{`, `}`, `.`, and spaces.
It can't start or end with `/`.
2019-03-02 22:35:43 +05:30
2020-06-23 00:09:42 +05:30
For more information, see [Deployments Safety](../environments/deployment_safety.md).
2019-07-07 11:18:12 +05:30
### `pages`
2019-03-02 22:35:43 +05:30
`pages` is a special job that is used to upload static content to GitLab that
can be used to serve your website. It has a special syntax, so the two
requirements below must be met:
- Any static content must be placed under a `public/` directory.
- `artifacts` with a path to the `public/` directory must be defined.
The example below simply moves all files from the root of the project to the
2020-05-24 23:13:21 +05:30
`public/` directory. The `.public` workaround is so `cp` does not also copy
2019-03-02 22:35:43 +05:30
`public/` to itself in an infinite loop:
```yaml
pages:
stage: deploy
script:
- mkdir .public
- cp -r * .public
- mv .public public
artifacts:
paths:
- public
only:
- master
```
Read more on [GitLab Pages user documentation](../../user/project/pages/index.md).
2018-12-05 23:21:45 +05:30
2020-05-24 23:13:21 +05:30
## `variables`
2018-05-09 12:01:36 +05:30
> Introduced in GitLab Runner v0.5.0.
NOTE: **Note:**
Integers (as well as strings) are legal both for variable's name and value.
2020-05-24 23:13:21 +05:30
Floats are not legal and can't be used.
2018-05-09 12:01:36 +05:30
GitLab CI/CD allows you to define variables inside `.gitlab-ci.yml` that are
then passed in the job environment. They can be set globally and per-job.
2020-04-22 19:07:51 +05:30
When the `variables` keyword is used on a job level, it will override the global
YAML variables and predefined ones of the same name.
2018-05-09 12:01:36 +05:30
They are stored in the Git repository and are meant to store non-sensitive
project configuration, for example:
```yaml
variables:
DATABASE_URL: "postgres://postgres@postgres/my_database"
```
These variables can be later used in all executed commands and scripts.
The YAML-defined variables are also set to all created service containers,
thus allowing to fine tune them.
Except for the user defined variables, there are also the ones [set up by the
2019-03-02 22:35:43 +05:30
Runner itself](../variables/README.md#predefined-environment-variables).
2018-05-09 12:01:36 +05:30
One example would be `CI_COMMIT_REF_NAME` which has the value of
the branch or tag name for which project is built. Apart from the variables
you can set in `.gitlab-ci.yml`, there are also the so called
2019-07-31 22:56:46 +05:30
[Variables](../variables/README.md#gitlab-cicd-environment-variables)
2018-05-09 12:01:36 +05:30
which can be set in GitLab's UI.
2020-03-13 15:44:24 +05:30
[YAML anchors for variables](#yaml-anchors-for-variables) are available.
2018-05-09 12:01:36 +05:30
2020-04-22 19:07:51 +05:30
Learn more about [variables and their priority](../variables/README.md).
2020-01-01 13:55:28 +05:30
2020-05-24 23:13:21 +05:30
### Git strategy
2016-08-24 12:49:21 +05:30
2020-04-22 19:07:51 +05:30
> - Introduced in GitLab 8.9 as an experimental feature.
> - `GIT_STRATEGY=none` requires GitLab Runner v1.7+.
CAUTION: **Caution:**
May change or be removed completely in future releases.
2016-11-03 12:29:30 +05:30
You can set the `GIT_STRATEGY` used for getting recent application code, either
2018-05-09 12:01:36 +05:30
globally or per-job in the [`variables`](#variables) section. If left
unspecified, the default from project settings will be used.
2016-08-24 12:49:21 +05:30
2016-11-03 12:29:30 +05:30
There are three possible values: `clone`, `fetch`, and `none`.
`clone` is the slowest option. It clones the repository from scratch for every
2019-12-21 20:55:43 +05:30
job, ensuring that the local working copy is always pristine.
2016-08-24 12:49:21 +05:30
2017-08-17 22:00:37 +05:30
```yaml
2016-08-24 12:49:21 +05:30
variables:
GIT_STRATEGY: clone
```
2019-12-21 20:55:43 +05:30
`fetch` is faster as it re-uses the local working copy (falling back to `clone`
2020-05-24 23:13:21 +05:30
if it does not exist). `git clean` is used to undo any changes made by the last
2016-11-03 12:29:30 +05:30
job, and `git fetch` is used to retrieve commits made since the last job ran.
2016-08-24 12:49:21 +05:30
2017-08-17 22:00:37 +05:30
```yaml
2016-08-24 12:49:21 +05:30
variables:
GIT_STRATEGY: fetch
```
2019-12-21 20:55:43 +05:30
`none` also re-uses the local working copy, but skips all Git operations
2020-05-24 23:13:21 +05:30
(including GitLab Runner's pre-clone script, if present). It's mostly useful
2020-06-23 00:09:42 +05:30
for jobs that operate exclusively on artifacts (for example, `deploy`). Git repository
2020-05-24 23:13:21 +05:30
data may be present, but it's certain to be out of date, so you should only
2019-12-21 20:55:43 +05:30
rely on files brought into the local working copy from cache or artifacts.
2016-11-03 12:29:30 +05:30
2017-08-17 22:00:37 +05:30
```yaml
2016-11-03 12:29:30 +05:30
variables:
GIT_STRATEGY: none
```
2019-03-02 22:35:43 +05:30
NOTE: **Note:** `GIT_STRATEGY` is not supported for
[Kubernetes executor](https://docs.gitlab.com/runner/executors/kubernetes.html),
2020-06-23 00:09:42 +05:30
but may be in the future. See the [support Git strategy with Kubernetes executor feature proposal](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/3847)
2019-03-02 22:35:43 +05:30
for updates.
2020-05-24 23:13:21 +05:30
### Git submodule strategy
2017-08-17 22:00:37 +05:30
> Requires GitLab Runner v1.10+.
The `GIT_SUBMODULE_STRATEGY` variable is used to control if / how Git
2018-05-09 12:01:36 +05:30
submodules are included when fetching the code before a build. You can set them
globally or per-job in the [`variables`](#variables) section.
2017-08-17 22:00:37 +05:30
There are three possible values: `none`, `normal`, and `recursive`:
2020-05-24 23:13:21 +05:30
- `none` means that submodules won't be included when fetching the project
2017-08-17 22:00:37 +05:30
code. This is the default, which matches the pre-v1.10 behavior.
2020-05-24 23:13:21 +05:30
- `normal` means that only the top-level submodules will be included. It's
2017-08-17 22:00:37 +05:30
equivalent to:
2020-01-01 13:55:28 +05:30
```shell
2019-10-12 21:52:04 +05:30
git submodule sync
git submodule update --init
```
2017-08-17 22:00:37 +05:30
- `recursive` means that all submodules (including submodules of submodules)
2018-11-20 20:47:30 +05:30
will be included. This feature needs Git v1.8.1 and later. When using a
GitLab Runner with an executor not based on Docker, make sure the Git version
2020-05-24 23:13:21 +05:30
meets that requirement. It's equivalent to:
2017-08-17 22:00:37 +05:30
2020-01-01 13:55:28 +05:30
```shell
2019-10-12 21:52:04 +05:30
git submodule sync --recursive
git submodule update --init --recursive
```
2017-08-17 22:00:37 +05:30
Note that for this feature to work correctly, the submodules must be configured
(in `.gitmodules`) with either:
- the HTTP(S) URL of a publicly-accessible repository, or
- a relative path to another repository on the same GitLab server. See the
[Git submodules](../git_submodules.md) documentation.
2020-05-24 23:13:21 +05:30
### Git checkout
2018-05-09 12:01:36 +05:30
2019-07-07 11:18:12 +05:30
> Introduced in GitLab Runner 9.3.
2018-05-09 12:01:36 +05:30
The `GIT_CHECKOUT` variable can be used when the `GIT_STRATEGY` is set to either
`clone` or `fetch` to specify whether a `git checkout` should be run. If not
specified, it defaults to true. You can set them globally or per-job in the
[`variables`](#variables) section.
If set to `false`, the Runner will:
- when doing `fetch` - update the repository and leave working copy on
the current revision,
- when doing `clone` - clone the repository and leave working copy on the
default branch.
Having this setting set to `true` will mean that for both `clone` and `fetch`
strategies the Runner will checkout the working copy to a revision related
to the CI pipeline:
```yaml
variables:
GIT_STRATEGY: clone
GIT_CHECKOUT: "false"
script:
2019-07-07 11:18:12 +05:30
- git checkout -B master origin/master
- git merge $CI_COMMIT_SHA
2018-05-09 12:01:36 +05:30
```
2017-08-17 22:00:37 +05:30
2020-05-24 23:13:21 +05:30
### Git clean flags
2019-07-07 11:18:12 +05:30
> Introduced in GitLab Runner 11.10
The `GIT_CLEAN_FLAGS` variable is used to control the default behavior of
`git clean` after checking out the sources. You can set it globally or per-job in the
[`variables`](#variables) section.
2019-12-21 20:55:43 +05:30
`GIT_CLEAN_FLAGS` accepts all possible options of the [`git clean`](https://git-scm.com/docs/git-clean)
2019-07-07 11:18:12 +05:30
command.
`git clean` is disabled if `GIT_CHECKOUT: "false"` is specified.
If `GIT_CLEAN_FLAGS` is:
- Not specified, `git clean` flags default to `-ffdx`.
- Given the value `none`, `git clean` is not executed.
For example:
```yaml
variables:
GIT_CLEAN_FLAGS: -ffdx -e cache/
script:
- ls -al cache/
```
2020-06-23 00:09:42 +05:30
### Git fetch extra flags
> [Introduced](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/4142) in GitLab Runner 13.1.
The `GIT_FETCH_EXTRA_FLAGS` variable is used to control the behavior of
`git fetch`. You can set it globally or per-job in the [`variables`](#variables) section.
`GIT_FETCH_EXTRA_FLAGS` accepts all possible options of the [`git fetch`](https://git-scm.com/docs/git-fetch) command, but please note that `GIT_FETCH_EXTRA_FLAGS` flags will be appended after the default flags that can't be modified.
The default flags are:
- [GIT_DEPTH](#shallow-cloning).
- The list of [refspecs](https://git-scm.com/book/en/v2/Git-Internals-The-Refspec).
- A remote called `origin`.
If `GIT_FETCH_EXTRA_FLAGS` is:
- Not specified, `git fetch` flags default to `--prune --quiet` along with the default flags.
- Given the value `none`, `git fetch` is executed only with the default flags.
For example, the default flags are `--prune --quiet`, so you can make `git fetch` more verbose by overriding this with just `--prune`:
```yaml
variables:
GIT_FETCH_EXTRA_FLAGS: --prune
script:
- ls -al cache/
```
The configurtion above will result in `git fetch` being called this way:
```shell
git fetch origin $REFSPECS --depth 50 --prune
```
Where `$REFSPECS` is a value provided to the Runner internally by GitLab.
2020-05-24 23:13:21 +05:30
### Job stages attempts
2017-08-17 22:00:37 +05:30
> Introduced in GitLab, it requires GitLab Runner v1.9+.
You can set the number for attempts the running job will try to execute each
of the following stages:
2020-04-22 19:07:51 +05:30
| Variable | Description |
|-----------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **GET_SOURCES_ATTEMPTS** | Number of attempts to fetch sources running a job |
| **ARTIFACT_DOWNLOAD_ATTEMPTS** | Number of attempts to download artifacts running a job |
| **RESTORE_CACHE_ATTEMPTS** | Number of attempts to restore the cache running a job |
| **EXECUTOR_JOB_SECTION_ATTEMPTS** | [Since GitLab 12.10](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/4450), the number of attempts to run a section in a job after a [`No Such Container`](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/4450) error ([Docker executor](https://docs.gitlab.com/runner/executors/docker.html) only). |
2017-08-17 22:00:37 +05:30
The default is one single attempt.
Example:
```yaml
variables:
2017-09-10 17:25:29 +05:30
GET_SOURCES_ATTEMPTS: 3
2017-08-17 22:00:37 +05:30
```
2018-05-09 12:01:36 +05:30
You can set them globally or per-job in the [`variables`](#variables) section.
2017-08-17 22:00:37 +05:30
2020-05-24 23:13:21 +05:30
### Shallow cloning
2016-08-24 12:49:21 +05:30
2020-04-22 19:07:51 +05:30
> Introduced in GitLab 8.9 as an experimental feature.
2020-06-23 00:09:42 +05:30
NOTE: **Note**:
As of GitLab 12.0, newly created projects will automatically have a [default `git depth` value of `50`](../pipelines/settings.md#git-shallow-clone).
2016-08-24 12:49:21 +05:30
You can specify the depth of fetching and cloning using `GIT_DEPTH`. This allows
shallow cloning of the repository which can significantly speed up cloning for
repositories with a large number of commits or old, large binaries. The value is
passed to `git fetch` and `git clone`.
2019-07-07 11:18:12 +05:30
NOTE: **Note:**
2017-08-17 22:00:37 +05:30
If you use a depth of 1 and have a queue of jobs or retry
jobs, jobs may fail.
2016-08-24 12:49:21 +05:30
2017-08-17 22:00:37 +05:30
Since Git fetching and cloning is based on a ref, such as a branch name, Runners
can't clone a specific commit SHA. If there are multiple jobs in the queue, or
2020-05-24 23:13:21 +05:30
you're retrying an old job, the commit to be tested needs to be within the
2017-08-17 22:00:37 +05:30
Git history that is cloned. Setting too small a value for `GIT_DEPTH` can make
2016-08-24 12:49:21 +05:30
it impossible to run these old commits. You will see `unresolved reference` in
2017-08-17 22:00:37 +05:30
job logs. You should then reconsider changing `GIT_DEPTH` to a higher value.
2016-08-24 12:49:21 +05:30
2017-08-17 22:00:37 +05:30
Jobs that rely on `git describe` may not work correctly when `GIT_DEPTH` is
set since only part of the Git history is present.
2016-08-24 12:49:21 +05:30
To fetch or clone only the last 3 commits:
2017-08-17 22:00:37 +05:30
```yaml
2016-08-24 12:49:21 +05:30
variables:
GIT_DEPTH: "3"
```
2018-05-09 12:01:36 +05:30
You can set it globally or per-job in the [`variables`](#variables) section.
2020-05-24 23:13:21 +05:30
### Custom build directories
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/2211) in GitLab Runner 11.10
2019-07-07 11:18:12 +05:30
NOTE: **Note:**
This can only be used when `custom_build_dir` is enabled in the [Runner's
configuration](https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-runnerscustom_build_dir-section).
This is the default configuration for `docker` and `kubernetes` executor.
2019-07-31 22:56:46 +05:30
By default, GitLab Runner clones the repository in a unique subpath of the
`$CI_BUILDS_DIR` directory. However, your project might require the code in a
specific directory (Go projects, for example). In that case, you can specify
the `GIT_CLONE_PATH` variable to tell the Runner in which directory to clone the
repository:
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
```yaml
2019-07-07 11:18:12 +05:30
variables:
GIT_CLONE_PATH: $CI_BUILDS_DIR/project-name
test:
script:
- pwd
```
The `GIT_CLONE_PATH` has to always be within `$CI_BUILDS_DIR`. The directory set in `$CI_BUILDS_DIR`
is dependent on executor and configuration of [runners.builds_dir](https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-runners-section)
setting.
2020-05-24 23:13:21 +05:30
#### Handling concurrency
2019-07-07 11:18:12 +05:30
An executor using a concurrency greater than `1` might lead
to failures because multiple jobs might be working on the same directory if the `builds_dir`
is shared between jobs.
2020-05-24 23:13:21 +05:30
GitLab Runner does not try to prevent this situation. It's up to the administrator
2019-07-07 11:18:12 +05:30
and developers to comply with the requirements of Runner configuration.
To avoid this scenario, you can use a unique path within `$CI_BUILDS_DIR`, because Runner
exposes two additional variables that provide a unique `ID` of concurrency:
- `$CI_CONCURRENT_ID`: Unique ID for all jobs running within the given executor.
- `$CI_CONCURRENT_PROJECT_ID`: Unique ID for all jobs running within the given executor and project.
The most stable configuration that should work well in any scenario and on any executor
is to use `$CI_CONCURRENT_ID` in the `GIT_CLONE_PATH`. For example:
2020-05-24 23:13:21 +05:30
```yaml
2019-07-07 11:18:12 +05:30
variables:
GIT_CLONE_PATH: $CI_BUILDS_DIR/$CI_CONCURRENT_ID/project-name
test:
script:
- pwd
```
The `$CI_CONCURRENT_PROJECT_ID` should be used in conjunction with `$CI_PROJECT_PATH`
as the `$CI_PROJECT_PATH` provides a path of a repository. That is, `group/subgroup/project`. For example:
2020-05-24 23:13:21 +05:30
```yaml
2019-07-07 11:18:12 +05:30
variables:
GIT_CLONE_PATH: $CI_BUILDS_DIR/$CI_CONCURRENT_ID/$CI_PROJECT_PATH
test:
script:
- pwd
```
2020-05-24 23:13:21 +05:30
#### Nested paths
2019-09-04 21:01:54 +05:30
The value of `GIT_CLONE_PATH` is expanded once and nesting variables
2020-05-24 23:13:21 +05:30
within is not supported.
2019-09-04 21:01:54 +05:30
For example, you define both the variables below in your
`.gitlab-ci.yml` file:
2020-05-24 23:13:21 +05:30
```yaml
2019-09-04 21:01:54 +05:30
variables:
GOPATH: $CI_BUILDS_DIR/go
GIT_CLONE_PATH: $GOPATH/src/namespace/project
```
The value of `GIT_CLONE_PATH` is expanded once into
`$CI_BUILDS_DIR/go/src/namespace/project`, and results in failure
2019-09-30 21:07:59 +05:30
because `$CI_BUILDS_DIR` is not expanded.
2019-09-04 21:01:54 +05:30
2018-05-09 12:01:36 +05:30
## Special YAML features
It's possible to use special YAML features like anchors (`&`), aliases (`*`)
and map merging (`<<`), which will allow you to greatly reduce the complexity
of `.gitlab-ci.yml`.
Read more about the various [YAML features](https://learnxinyminutes.com/docs/yaml/).
2016-06-02 11:05:42 +05:30
### Anchors
2016-09-29 09:46:39 +05:30
> Introduced in GitLab 8.6 and GitLab Runner v1.1.1.
2016-06-02 11:05:42 +05:30
2017-08-17 22:00:37 +05:30
YAML has a handy feature called 'anchors', which lets you easily duplicate
2016-06-02 11:05:42 +05:30
content across your document. Anchors can be used to duplicate/inherit
2020-05-24 23:13:21 +05:30
properties, and is a perfect example to be used with [hidden jobs](#hide-jobs)
2016-06-02 11:05:42 +05:30
to provide templates for your jobs.
The following example uses anchors and map merging. It will create two jobs,
`test1` and `test2`, that will inherit the parameters of `.job_template`, each
having their own custom `script` defined:
```yaml
2016-09-29 09:46:39 +05:30
.job_template: &job_definition # Hidden key that defines an anchor named 'job_definition'
2020-03-13 15:44:24 +05:30
image: ruby:2.6
2016-06-02 11:05:42 +05:30
services:
- postgres
- redis
test1:
<<: *job_definition # Merge the contents of the 'job_definition' alias
script:
- test1 project
test2:
<<: *job_definition # Merge the contents of the 'job_definition' alias
script:
- test2 project
```
`&` sets up the name of the anchor (`job_definition`), `<<` means "merge the
given hash into the current one", and `*` includes the named anchor
(`job_definition` again). The expanded version looks like this:
```yaml
.job_template:
2020-03-13 15:44:24 +05:30
image: ruby:2.6
2016-06-02 11:05:42 +05:30
services:
- postgres
- redis
test1:
2020-03-13 15:44:24 +05:30
image: ruby:2.6
2016-06-02 11:05:42 +05:30
services:
- postgres
- redis
script:
- test1 project
test2:
2020-03-13 15:44:24 +05:30
image: ruby:2.6
2016-06-02 11:05:42 +05:30
services:
- postgres
- redis
script:
- test2 project
```
Let's see another one example. This time we will use anchors to define two sets
of services. This will create two jobs, `test:postgres` and `test:mysql`, that
will share the `script` directive defined in `.job_template`, and the `services`
directive defined in `.postgres_services` and `.mysql_services` respectively:
```yaml
.job_template: &job_definition
script:
- test project
.postgres_services:
services: &postgres_definition
- postgres
- ruby
.mysql_services:
services: &mysql_definition
- mysql
- ruby
test:postgres:
2016-08-24 12:49:21 +05:30
<<: *job_definition
2016-06-02 11:05:42 +05:30
services: *postgres_definition
test:mysql:
2016-08-24 12:49:21 +05:30
<<: *job_definition
2016-06-02 11:05:42 +05:30
services: *mysql_definition
```
The expanded version looks like this:
```yaml
.job_template:
script:
- test project
.postgres_services:
services:
- postgres
- ruby
.mysql_services:
services:
- mysql
- ruby
test:postgres:
script:
- test project
services:
- postgres
- ruby
test:mysql:
script:
- test project
services:
- mysql
- ruby
```
2020-05-24 23:13:21 +05:30
You can see that the hidden jobs are conveniently used as templates.
2016-09-29 09:46:39 +05:30
2020-01-01 13:55:28 +05:30
NOTE: **Note:**
You can't use YAML anchors across multiple files when leveraging the [`include`](#include)
feature. Anchors are only valid within the file they were defined in.
2020-03-13 15:44:24 +05:30
#### YAML anchors for `before_script` and `after_script`
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/23005) in GitLab 12.5.
2020-03-13 15:44:24 +05:30
You can use [YAML anchors](#anchors) with `before_script` and `after_script`,
which makes it possible to include a predefined list of commands in multiple
jobs.
Example:
```yaml
.something_before: &something_before
- echo 'something before'
.something_after: &something_after
- echo 'something after'
2020-06-23 00:09:42 +05:30
- echo 'another thing after'
2020-03-13 15:44:24 +05:30
job_name:
before_script:
- *something_before
script:
- echo 'this is the script'
after_script:
- *something_after
```
#### YAML anchors for `script`
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/23005) in GitLab 12.5.
2020-03-13 15:44:24 +05:30
You can use [YAML anchors](#anchors) with scripts, which makes it possible to
include a predefined list of commands in multiple jobs.
For example:
```yaml
.something: &something
- echo 'something'
job_name:
script:
- *something
- echo 'this is the script'
```
#### YAML anchors for variables
[YAML anchors](#anchors) can be used with `variables`, to easily repeat assignment
of variables across multiple jobs. It can also enable more flexibility when a job
requires a specific `variables` block that would otherwise override the global variables.
In the example below, we will override the `GIT_STRATEGY` variable without affecting
the use of the `SAMPLE_VARIABLE` variable:
```yaml
# global variables
variables: &global-variables
SAMPLE_VARIABLE: sample_variable_value
2020-06-23 00:09:42 +05:30
ANOTHER_SAMPLE_VARIABLE: another_sample_variable_value
2020-03-13 15:44:24 +05:30
# a job that needs to set the GIT_STRATEGY variable, yet depend on global variables
job_no_git_strategy:
stage: cleanup
variables:
<<: *global-variables
GIT_STRATEGY: none
script: echo $SAMPLE_VARIABLE
```
2020-05-24 23:13:21 +05:30
### Hide jobs
2016-09-29 09:46:39 +05:30
2020-05-24 23:13:21 +05:30
> Introduced in GitLab 8.6 and GitLab Runner v1.1.1.
2019-07-07 11:18:12 +05:30
2020-05-24 23:13:21 +05:30
If you want to temporarily 'disable' a job, rather than commenting out all the
lines where the job is defined:
2016-09-29 09:46:39 +05:30
2020-05-24 23:13:21 +05:30
```yaml
#hidden_job:
# script:
# - run test
```
2020-06-23 00:09:42 +05:30
You can instead start its name with a dot (`.`) and it won't be processed by
2020-05-24 23:13:21 +05:30
GitLab CI/CD. In the following example, `.hidden_job` will be ignored:
```yaml
.hidden_job:
script:
- run test
```
Use this feature to ignore jobs, or use the
[special YAML features](#special-yaml-features) and transform the hidden jobs
into templates.
## Skip Pipeline
If your commit message contains `[ci skip]` or `[skip ci]`, using any
capitalization, the commit will be created but the pipeline will be skipped.
Alternatively, one can pass the `ci.skip` [Git push option](../../user/project/push_options.md#push-options-for-gitlab-cicd)
if using Git 2.10 or newer.
2015-11-26 14:37:03 +05:30
2019-07-07 11:18:12 +05:30
## Processing Git pushes
2020-06-23 00:09:42 +05:30
GitLab will create at most 4 branch and tag pipelines when
pushing multiple changes in single `git push` invocation.
2019-07-07 11:18:12 +05:30
2020-06-23 00:09:42 +05:30
This limitation does not affect any of the updated Merge Request pipelines.
All updated Merge Requests will have a pipeline created when using
2019-07-07 11:18:12 +05:30
[pipelines for merge requests](../merge_request_pipelines/index.md).
2020-05-24 23:13:21 +05:30
## Deprecated parameters
2017-08-17 22:00:37 +05:30
2020-05-24 23:13:21 +05:30
The following parameters are deprecated.
2017-08-17 22:00:37 +05:30
2020-05-24 23:13:21 +05:30
### Globally-defined `types`
CAUTION: **Deprecated:**
`types` is deprecated, and could be removed in a future release.
Use [`stages`](#stages) instead.
### Job-defined `type`
CAUTION: **Deprecated:**
`type` is deprecated, and could be removed in one of the future releases.
Use [`stage`](#stage) instead.
### Globally-defined `image`, `services`, `cache`, `before_script`, `after_script`
Defining `image`, `services`, `cache`, `before_script`, and
`after_script` globally is deprecated. Support could be removed
from a future release.
Use [`default:`](#global-defaults) instead. For example:
```yaml
default:
image: ruby:2.5
services:
- docker:dind
cache:
paths: [vendor/]
before_script:
- bundle install --path vendor/
after_script:
- rm -rf tmp/
```
2019-02-15 15:39:39 +05:30
2019-09-04 21:01:54 +05:30
<!-- ## Troubleshooting
Include any troubleshooting steps that you can foresee. If you know beforehand what issues
one might have when setting this up, or when something is changed, or on upgrading, it's
important to describe those, too. Think of things that may go wrong and include them here.
This is important to minimize requests for support, and to avoid doc comments with
questions that you know someone might ask.
Each scenario can be a third-level heading, e.g. `### Getting error message X`.
If you have none to add when creating a doc, leave this section in place
but commented out to help encourage others to add to it in the future. -->