README.md 131.0 KB
Newer Older
M
Marcia Ramos 已提交
1 2 3 4
---
type: reference
---

E
Evan Read 已提交
5
# GitLab CI/CD Pipeline Configuration Reference
D
Douwe Maan 已提交
6

7
GitLab CI/CD [pipelines](../pipelines/index.md) are configured using a YAML file called `.gitlab-ci.yml` within each project.
8

E
Evan Read 已提交
9
The `.gitlab-ci.yml` file defines the structure and order of the pipelines and determines:
10

E
Evan Read 已提交
11 12 13 14 15 16 17 18 19 20
- What to execute using [GitLab Runner](https://docs.gitlab.com/runner/).
- What decisions to make when specific conditions are encountered. For example, when a process succeeds or fails.

This topic covers CI/CD pipeline configuration. For other CI/CD configuration information, see:

- [GitLab CI/CD Variables](../variables/README.md), for configuring the environment the pipelines run in.
- [GitLab Runner advanced configuration](https://docs.gitlab.com/runner/configuration/advanced-configuration.html), for configuring GitLab Runner.

We have complete examples of configuring pipelines:

21
- For a quick introduction to GitLab CI/CD, follow our [quick start guide](../quick_start/README.md).
E
Evan Read 已提交
22
- For a collection of examples, see [GitLab CI/CD Examples](../examples/README.md).
23
- To see a large `.gitlab-ci.yml` file used in an enterprise, see the [`.gitlab-ci.yml` file for `gitlab`](https://gitlab.com/gitlab-org/gitlab/blob/master/.gitlab-ci.yml).
24

25
NOTE: **Note:**
26
If you have a [mirrored repository where GitLab pulls from](../../user/project/repository/repository_mirroring.md#pulling-from-a-remote-repository-starter),
27 28 29
you may need to enable pipeline triggering in your project's
**Settings > Repository > Pull from a remote repository > Trigger pipelines for mirror updates**.

E
Evan Read 已提交
30 31 32
## Introduction

Pipeline configuration begins with jobs. Jobs are the most fundamental element of a `.gitlab-ci.yml` file.
33

E
Evan Read 已提交
34 35 36 37 38 39 40
Jobs are:

- Defined with constraints stating under what conditions they should be executed.
- Top-level elements with an arbitrary name and must contain at least the [`script`](#script) clause.
- Not limited in how many can be defined.

For example:
D
Douwe Maan 已提交
41 42 43 44 45 46 47 48 49

```yaml
job1:
  script: "execute-script-for-job1"

job2:
  script: "execute-script-for-job2"
```

50
The above example is the simplest possible CI/CD configuration with two separate
51 52 53
jobs, where each of the jobs executes a different command.
Of course a command can execute code directly (`./configure;make;make install`)
or run a script (`test.sh`) in the repository.
D
Douwe Maan 已提交
54

55 56 57
Jobs are picked up by [Runners](../runners/README.md) and executed within the
environment of the Runner. What is important, is that each job is run
independently from each other.
D
Douwe Maan 已提交
58

59
### Validate the `.gitlab-ci.yml`
E
Evan Read 已提交
60

61
Each instance of GitLab CI/CD has an embedded debug tool called Lint, which validates the
E
Evan Read 已提交
62
content of your `.gitlab-ci.yml` files. You can find the Lint under the page `ci/lint` of your
M
Marcel Amirault 已提交
63
project namespace. For example, `https://gitlab.example.com/gitlab-org/project-123/-/ci/lint`.
E
Evan Read 已提交
64 65 66

### Unavailable names for jobs

67
Each job must have a unique name, but there are a few **reserved `keywords` that
68
can't be used as job names**:
D
Douwe Maan 已提交
69

70 71 72 73 74 75 76 77
- `image`
- `services`
- `stages`
- `types`
- `before_script`
- `after_script`
- `variables`
- `cache`
78
- `include`
D
Douwe Maan 已提交
79

E
Evan Read 已提交
80 81 82 83 84 85 86 87 88 89 90 91 92
### Using reserved keywords

If you get validation error when using specific values (for example, `true` or `false`), try to:

- Quote them.
- Change them to a different form. For example, `/bin/true`.

## Configuration parameters

A job is defined as a list of parameters that define the job's behavior.

The following table lists available parameters for jobs:

93 94 95 96 97 98 99 100 101 102
| Keyword                                            | Description                                                                                                                                                                         |
|:---------------------------------------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| [`script`](#script)                                | Shell script which is executed by Runner.                                                                                                                                           |
| [`image`](#image)                                  | Use docker images. Also available: `image:name` and `image:entrypoint`.                                                                                                             |
| [`services`](#services)                            | Use docker services images. Also available: `services:name`, `services:alias`, `services:entrypoint`, and `services:command`.                                                       |
| [`before_script`](#before_script-and-after_script) | Override a set of commands that are executed before job.                                                                                                                            |
| [`after_script`](#before_script-and-after_script)  | Override a set of commands that are executed after job.                                                                                                                             |
| [`stage`](#stage)                                  | Defines a job stage (default: `test`).                                                                                                                                              |
| [`only`](#onlyexcept-basic)                        | Limit when jobs are created. Also available: [`only:refs`, `only:kubernetes`, `only:variables`, and `only:changes`](#onlyexcept-advanced).                                          |
| [`except`](#onlyexcept-basic)                      | Limit when jobs are not created. Also available: [`except:refs`, `except:kubernetes`, `except:variables`, and `except:changes`](#onlyexcept-advanced).                              |
103
| [`rules`](#rules)                                  | List of conditions to evaluate and determine selected attributes of a job, and whether or not it's created. May not be used alongside `only`/`except`.                             |
104
| [`tags`](#tags)                                    | List of tags which are used to select Runner.                                                                                                                                       |
105
| [`allow_failure`](#allow_failure)                  | Allow job to fail. Failed job does not contribute to commit status.                                                                                                                  |
106 107 108
| [`when`](#when)                                    | When to run job. Also available: `when:manual` and `when:delayed`.                                                                                                                  |
| [`environment`](#environment)                      | Name of an environment to which the job deploys. Also available: `environment:name`, `environment:url`, `environment:on_stop`, `environment:auto_stop_in` and `environment:action`. |
| [`cache`](#cache)                                  | List of files that should be cached between subsequent runs. Also available: `cache:paths`, `cache:key`, `cache:untracked`, and `cache:policy`.                                     |
109
| [`artifacts`](#artifacts)                          | List of files and directories to attach to a job on success. Also available: `artifacts:paths`, `artifacts:expose_as`, `artifacts:name`, `artifacts:untracked`, `artifacts:when`, `artifacts:expire_in`, `artifacts:reports`, `artifacts:reports:junit`, `artifacts:reports:cobertura`, and `artifacts:reports:terraform`.<br><br>In GitLab [Enterprise Edition](https://about.gitlab.com/pricing/), these are available: `artifacts:reports:codequality`, `artifacts:reports:sast`, `artifacts:reports:dependency_scanning`, `artifacts:reports:container_scanning`, `artifacts:reports:dast`, `artifacts:reports:license_scanning`, `artifacts:reports:license_management` (removed in GitLab 13.0),`artifacts:reports:performance` and `artifacts:reports:metrics`. |
110 111 112 113 114 115 116 117 118 119 120 121
| [`dependencies`](#dependencies)                    | Restrict which artifacts are passed to a specific job by providing a list of jobs to fetch artifacts from.                                                                          |
| [`coverage`](#coverage)                            | Code coverage settings for a given job.                                                                                                                                             |
| [`retry`](#retry)                                  | When and how many times a job can be auto-retried in case of a failure.                                                                                                             |
| [`timeout`](#timeout)                              | Define a custom job-level timeout that takes precedence over the project-wide setting.                                                                                              |
| [`parallel`](#parallel)                            | How many instances of a job should be run in parallel.                                                                                                                              |
| [`trigger`](#trigger)                              | Defines a downstream pipeline trigger.                                                                                                                                              |
| [`include`](#include)                              | Allows this job to include external YAML files. Also available: `include:local`, `include:file`, `include:template`, and `include:remote`.                                          |
| [`extends`](#extends)                              | Configuration entries that this job is going to inherit from.                                                                                                                       |
| [`pages`](#pages)                                  | Upload the result of a job to use with GitLab Pages.                                                                                                                                |
| [`variables`](#variables)                          | Define job variables on a job level.                                                                                                                                                |
| [`interruptible`](#interruptible)                  | Defines if a job can be canceled when made redundant by a newer run.                                                                                                                |
| [`resource_group`](#resource_group)                | Limit job concurrency.                                                                                                                                                              |
E
Evan Read 已提交
122 123 124 125

NOTE: **Note:**
Parameters `types` and `type` are [deprecated](#deprecated-parameters).

126 127 128 129 130
## Global parameters

Some parameters must be defined at a global level, affecting all jobs in the pipeline.

### Global defaults
K
Kamil Trzciński 已提交
131 132 133 134 135 136 137 138 139 140 141

Some parameters can be set globally as the default for all jobs using the
`default:` keyword. Default parameters can then be overridden by job-specific
configuration.

The following job parameters can be defined inside a `default:` block:

- [`image`](#image)
- [`services`](#services)
- [`before_script`](#before_script-and-after_script)
- [`after_script`](#before_script-and-after_script)
142
- [`tags`](#tags)
K
Kamil Trzciński 已提交
143
- [`cache`](#cache)
144
- [`artifacts`](#artifacts)
145
- [`retry`](#retry)
146
- [`timeout`](#timeout)
147
- [`interruptible`](#interruptible)
K
Kamil Trzciński 已提交
148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163

In the following example, the `ruby:2.5` image is set as the default for all
jobs except the `rspec 2.6` job, which uses the `ruby:2.6` image:

```yaml
default:
  image: ruby:2.5

rspec:
  script: bundle exec rspec

rspec 2.6:
  image: ruby:2.6
  script: bundle exec rspec
```

164
#### `inherit`
165

166
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/207484) in GitLab 12.9.
167 168 169 170

You can disable inheritance of globally defined defaults
and variables with the `inherit:` parameter.

171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197
To enable or disable the inheritance of all `variables:` or `default:` parameters, use the following format:

- `default: true` or `default: false`
- `variables: true` or `variables: false`

To inherit only a subset of `default:` parameters or `variables:`, specify what
you wish to inherit, and any not listed will **not** be inherited. Use
one of the following formats:

```yaml
inherit:
  default: [parameter1, parameter2]
  variables: [VARIABLE1, VARIABLE2]
```

Or:

```yaml
inherit:
  default:
    - parameter1
    - parameter2
  variables:
    - VARIABLE1
    - VARIABLE2
```

198 199
In the example below:

200 201 202 203
- `rubocop`:
  - **will** inherit: Nothing.
- `rspec`:
  - **will** inherit: the default `image` and the `WEBHOOK_URL` variable.
204
  - will **not** inherit: the default `before_script` and the `DOMAIN` variable.
205 206
- `capybara`:
  - **will** inherit: the default `before_script` and `image`.
207
  - will **not** inherit: the `DOMAIN` and `WEBHOOK_URL` variables.
208 209
- `karma`:
  - **will** inherit: the default `image` and `before_script`, and the `DOMAIN` variable.
210
  - will **not** inherit: `WEBHOOK_URL` variable.
211 212 213

```yaml
default:
214
  image: 'ruby:2.4'
215 216 217 218 219
  before_script:
    - echo Hello World

variables:
  DOMAIN: example.com
220
  WEBHOOK_URL: https://my-webhook.example.com
221 222

rubocop:
223 224 225
  inherit:
    default: false
    variables: false
226 227 228 229
  script: bundle exec rubocop

rspec:
  inherit:
230 231
    default: [image]
    variables: [WEBHOOK_URL]
232 233 234 235 236 237
  script: bundle exec rspec

capybara:
  inherit:
    variables: false
  script: bundle exec capybara
238 239 240 241 242 243

karma:
  inherit:
    default: true
    variables: [DOMAIN]
  script: karma
244 245
```

246
### `stages`
E
Evan Read 已提交
247

248 249
`stages` is used to define stages that can be used by jobs and is defined
globally.
E
Evan Read 已提交
250

251 252
The specification of `stages` allows for having flexible multi stage pipelines.
The ordering of elements in `stages` defines the ordering of jobs' execution:
E
Evan Read 已提交
253

254 255 256 257 258
1. Jobs of the same stage are run in parallel.
1. Jobs of the next stage are run after the jobs from the previous stage
   complete successfully.

Let's consider the following example, which defines 3 stages:
E
Evan Read 已提交
259 260

```yaml
261 262 263 264
stages:
  - build
  - test
  - deploy
E
Evan Read 已提交
265 266
```

267 268 269 270 271 272
1. First, all jobs of `build` are executed in parallel.
1. If all jobs of `build` succeed, the `test` jobs are executed in parallel.
1. If all jobs of `test` succeed, the `deploy` jobs are executed in parallel.
1. If all jobs of `deploy` succeed, the commit is marked as `passed`.
1. If any of the previous jobs fails, the commit is marked as `failed` and no
   jobs of further stage are executed.
273

274
There are also two edge cases worth mentioning:
E
Evan Read 已提交
275

276 277
1. If no `stages` are defined in `.gitlab-ci.yml`, then the `build`,
   `test` and `deploy` are allowed to be used as job's stage by default.
278
1. If a job does not specify a `stage`, the job is assigned the `test` stage.
E
Evan Read 已提交
279

280
### `workflow:rules`
E
Evan Read 已提交
281

282
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/29654) in GitLab 12.5
283

284 285 286 287
The top-level `workflow:` key applies to the entirety of a pipeline, and will
determine whether or not a pipeline is created. It currently accepts a single
`rules:` key that operates similarly to [`rules:` defined within jobs](#rules),
enabling dynamic configuration of the pipeline.
288

289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326
#### `workflow:rules` templates

> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/217732) in GitLab 13.0.

We provide pre-made templates for use with your pipelines that set up `workflow: rules`
for common scenarios. Usage of these will make things easier and prevent duplicate pipelines from running.

The [`Branch-Pipelines` template](https://gitlab.com/gitlab-org/gitlab/-/tree/master/lib/gitlab/ci/templates/Workflows/Branch-Pipelines.gitlab-ci.yml)
makes your pipelines run for branches and tags.

Branch pipeline status will be displayed within merge requests that use that branch
as a source, but this pipeline type does not support any features offered by
[Merge Request Pipelines](../merge_request_pipelines/) like
[Pipelines for Merge Results](../merge_request_pipelines/#pipelines-for-merged-results-premium)
or [Merge Trains](../merge_request_pipelines/pipelines_for_merged_results/merge_trains/).
Use this template if you are intentionally avoiding those features.

It is [included](#include) as follows:

```yaml
include:
  - template: 'Workflows/Branch-Pipelines.gitlab-ci.yml'
```

The [`MergeRequest-Pipelines` template](https://gitlab.com/gitlab-org/gitlab/-/tree/master/lib/gitlab/ci/templates/Workflows/MergeRequest-Pipelines.gitlab-ci.yml)
makes your pipelines run for the default branch (usually `master`), tags, and
all types of merge request pipelines. Use this template if you use any of the
the [Pipelines for Merge Requests features](../merge_request_pipelines/), as mentioned
above.

It is [included](#include) as follows:

```yaml
include:
  - template: 'Workflows/MergeRequest-Pipelines.gitlab-ci.yml'
```

If you prefer to define your own rules, the configuration options currently available are:​
E
Evan Read 已提交
327

328 329
- [`if`](#rulesif): Define a rule.
- [`when`](#when): May be set to `always` or `never` only. If not provided, the default value is `always`​.
E
Evan Read 已提交
330

331 332
The list of `if` rules is evaluated until a single one is matched. If none
match, the last `when` will be used:
E
Evan Read 已提交
333

334 335 336 337 338 339 340 341 342
```yaml
workflow:
  rules:
    - if: $CI_COMMIT_REF_NAME =~ /-wip$/
      when: never
    - if: $CI_COMMIT_TAG
      when: never
    - when: always
```
E
Evan Read 已提交
343

344
### `include`
E
Evan Read 已提交
345

346 347
> - Introduced in [GitLab Premium](https://about.gitlab.com/pricing/) 10.5.
> - Available for Starter, Premium and Ultimate since 10.6.
348
> - [Moved](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/42861) to GitLab Core in 11.4.
E
Evan Read 已提交
349

350 351
Using the `include` keyword allows the inclusion of external YAML files. This helps
to break down the CI/CD configuration into multiple files and increases readability for long configuration files.
352
It's also possible to have template files stored in a central repository and projects include their
353 354
configuration files. This helps avoid duplicated configuration, for example, global default variables for all projects.

355
`include` requires the external YAML file to have the extensions `.yml` or `.yaml`,
356
otherwise the external file won't be included.
E
Evan Read 已提交
357

358 359 360 361 362 363 364 365 366 367 368 369
`include` supports the following inclusion methods:

| Method                          | Description                                                       |
|:--------------------------------|:------------------------------------------------------------------|
| [`local`](#includelocal)        | Include a file from the local project repository.                 |
| [`file`](#includefile)          | Include a file from a different project repository.               |
| [`remote`](#includeremote)      | Include a file from a remote URL. Must be publicly accessible.    |
| [`template`](#includetemplate)  | Include templates which are provided by GitLab.                   |

NOTE: **Note:**
`.gitlab-ci.yml` configuration included by all methods is evaluated at pipeline creation.
The configuration is a snapshot in time and persisted in the database. Any changes to
370
referenced `.gitlab-ci.yml` configuration won't be reflected in GitLab until the next pipeline is created.
371

372
The files defined in `include` are:
E
Evan Read 已提交
373

374 375 376
- Deep merged with those in `.gitlab-ci.yml`.
- Always evaluated first and merged with the content of `.gitlab-ci.yml`,
  regardless of the position of the `include` keyword.
E
Evan Read 已提交
377

378 379 380
TIP: **Tip:**
Use merging to customize and override included CI/CD configurations with local
definitions.
E
Evan Read 已提交
381

382 383 384 385
NOTE: **Note:**
Using YAML aliases across different YAML files sourced by `include` is not
supported. You must only refer to aliases in the same file. Instead
of using YAML anchors, you can use the [`extends` keyword](#extends).
E
Evan Read 已提交
386

387
#### `include:local`
E
Evan Read 已提交
388

389 390
`include:local` includes a file from the same repository as `.gitlab-ci.yml`.
It's referenced using full paths relative to the root directory (`/`).
E
Evan Read 已提交
391

392 393 394
You can only use files that are currently tracked by Git on the same branch
your configuration file is on. In other words, when using a `include:local`, make
sure that both `.gitlab-ci.yml` and the local file are on the same branch.
E
Evan Read 已提交
395

396
All [nested includes](#nested-includes) will be executed in the scope of the same project,
397
so it's possible to use local, project, remote, or template includes.
E
Evan Read 已提交
398

399 400
NOTE: **Note:**
Including local files through Git submodules paths is not supported.
E
Evan Read 已提交
401

402
Example:
E
Evan Read 已提交
403

404 405 406 407
```yaml
include:
  - local: '/templates/.gitlab-ci-template.yml'
```
E
Evan Read 已提交
408

409 410 411 412 413 414 415 416 417
TIP: **Tip:**
Local includes can be used as a replacement for symbolic links which are not followed.

This can be defined as a short local include:

```yaml
include: '.gitlab-ci-production.yml'
```

418
#### `include:file`
E
Evan Read 已提交
419

420
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/53903) in GitLab 11.7.
E
Evan Read 已提交
421

422 423 424
To include files from another private project under the same GitLab instance,
use `include:file`. This file is referenced using full paths relative to the
root directory (`/`). For example:
E
Evan Read 已提交
425

426 427 428 429 430
```yaml
include:
  - project: 'my-group/my-project'
    file: '/templates/.gitlab-ci-template.yml'
```
E
Evan Read 已提交
431

432
You can also specify `ref`, with the default being the `HEAD` of the project:
E
Evan Read 已提交
433

434 435 436 437 438
```yaml
include:
  - project: 'my-group/my-project'
    ref: master
    file: '/templates/.gitlab-ci-template.yml'
E
Evan Read 已提交
439

440 441 442
  - project: 'my-group/my-project'
    ref: v1.0.0
    file: '/templates/.gitlab-ci-template.yml'
K
Kamil Trzcinski 已提交
443

444 445 446 447
  - project: 'my-group/my-project'
    ref: 787123b47f14b552955ca2786bc9542ae66fee5b # Git SHA
    file: '/templates/.gitlab-ci-template.yml'
```
448

449
All [nested includes](#nested-includes) will be executed in the scope of the target project,
450
so it's possible to use local (relative to target project), project, remote
451
or template includes.
452

453 454 455 456 457 458 459 460 461 462 463 464 465 466 467
#### `include:remote`

`include:remote` can be used to include a file from a different location,
using HTTP/HTTPS, referenced by using the full URL. The remote file must be
publicly accessible through a simple GET request as authentication schemas
in the remote URL are not supported. For example:

```yaml
include:
  - remote: 'https://gitlab.com/awesome-project/raw/master/.gitlab-ci-template.yml'
```

All [nested includes](#nested-includes) will be executed without context as public user, so only another remote
or public project, or template, is allowed.

468
#### `include:template`
469

470
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/53445) in GitLab 11.7.
471

472 473
`include:template` can be used to include `.gitlab-ci.yml` templates that are
[shipped with GitLab](https://gitlab.com/gitlab-org/gitlab/tree/master/lib/gitlab/ci/templates).
474

475
For example:
476

477
```yaml
478 479 480
# File sourced from GitLab's template collection
include:
  - template: Auto-DevOps.gitlab-ci.yml
481 482
```

483
Multiple `include:template` files:
D
Douwe Maan 已提交
484

485 486 487 488 489
```yaml
include:
  - template: Android-Fastlane.gitlab-ci.yml
  - template: Auto-DevOps.gitlab-ci.yml
```
490

491
All [nested includes](#nested-includes) will be executed only with the permission of the user,
492
so it's possible to use project, remote or template includes.
D
Douwe Maan 已提交
493

494
#### Nested includes
495

496
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/56836) in GitLab 11.9.
497

498
Nested includes allow you to compose a set of includes.
499

500
A total of 100 includes is allowed, but duplicate includes are considered a configuration error.
501

502
Since [GitLab 12.4](https://gitlab.com/gitlab-org/gitlab/-/issues/28212), the time limit
503
for resolving all files is 30 seconds.
504

505
#### Additional `includes` examples
506

507
There is a list of [additional `includes` examples](includes.md) available.
508

509
## Parameter details
510

511
The following are detailed explanations for parameters used to configure CI/CD pipelines.
512

513
### `image`
514

515
Used to specify [a Docker image](../docker/using_docker_images.md#what-is-an-image) to use for the job.
516

517
For:
518

519 520
- Simple definition examples, see [Define `image` and `services` from `.gitlab-ci.yml`](../docker/using_docker_images.md#define-image-and-services-from-gitlab-ciyml).
- Detailed usage information, refer to [Docker integration](../docker/README.md) documentation.
521

522
#### `image:name`
523

524
An [extended docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
525

526
For more information, see [Available settings for `image`](../docker/using_docker_images.md#available-settings-for-image).
527

528
#### `image:entrypoint`
529

530
An [extended docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
531

532
For more information, see [Available settings for `image`](../docker/using_docker_images.md#available-settings-for-image).
533

534
#### `services`
535

536
Used to specify a [service Docker image](../docker/using_docker_images.md#what-is-a-service), linked to a base image specified in [`image`](#image).
537

538
For:
539

540 541 542
- Simple definition examples, see [Define `image` and `services` from `.gitlab-ci.yml`](../docker/using_docker_images.md#define-image-and-services-from-gitlab-ciyml).
- Detailed usage information, refer to [Docker integration](../docker/README.md) documentation.
- For example services, see [GitLab CI/CD Services](../services/README.md).
543

544
##### `services:name`
545

546
An [extended docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
547

548
For more information, see [Available settings for `services`](../docker/using_docker_images.md#available-settings-for-services).
549

550
##### `services:alias`
551

552
An [extended docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
553

554
For more information, see [Available settings for `services`](../docker/using_docker_images.md#available-settings-for-services).
555

556
##### `services:entrypoint`
557

558
An [extended docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
559

560
For more information, see [Available settings for `services`](../docker/using_docker_images.md#available-settings-for-services).
561

562
##### `services:command`
563

564
An [extended docker configuration option](../docker/using_docker_images.md#extended-docker-configuration-options).
565

566
For more information, see [Available settings for `services`](../docker/using_docker_images.md#available-settings-for-services).
567

568 569 570 571
### `script`

`script` is the only required keyword that a job needs. It's a shell script
which is executed by the Runner. For example:
572 573

```yaml
574 575
job:
  script: "bundle exec rspec"
576 577
```

578 579 580
[YAML anchors for scripts](#yaml-anchors-for-script) are available.

This parameter can also contain several commands using an array:
581 582

```yaml
583 584 585 586
job:
  script:
    - uname -a
    - bundle exec rspec
587 588
```

589 590 591 592 593 594
NOTE: **Note:**
Sometimes, `script` commands will need to be wrapped in single or double quotes.
For example, commands that contain a colon (`:`) need to be wrapped in quotes so
that the YAML parser knows to interpret the whole thing as a string rather than
a "key: value" pair. Be careful when using special characters:
`:`, `{`, `}`, `[`, `]`, `,`, `&`, `*`, `#`, `?`, `|`, `-`, `<`, `>`, `=`, `!`, `%`, `@`, `` ` ``.
595

596
If any of the script commands return an exit code different from zero, the job
597
will fail and further commands won't be executed. This behavior can be avoided by
598
storing the exit code in a variable:
599

600 601 602 603 604 605
```yaml
job:
  script:
    - false || exit_code=$?
    - if [ $exit_code -ne 0 ]; then echo "Previous command failed"; fi;
```
606

607
#### `before_script` and `after_script`
608

609
> Introduced in GitLab 8.7 and requires GitLab Runner v1.2.
610

611 612 613
`before_script` is used to define a command that should be run before each
job, including deploy jobs, but after the restoration of any [artifacts](#artifacts).
This must be an array.
614

615 616
Scripts specified in `before_script` are concatenated with any scripts specified
in the main [`script`](#script), and executed together in a single shell.
617

618 619
`after_script` is used to define the command that will be run after each
job, including failed ones. This must be an array.
620

621 622
Scripts specified in `after_script` are executed in a new shell, separate from any
`before_script` or `script` scripts. As a result, they:
623

624 625 626 627 628 629
- Have a current working directory set back to the default.
- Have no access to changes done by scripts defined in `before_script` or `script`, including:
  - Command aliases and variables exported in `script` scripts.
  - Changes outside of the working tree (depending on the Runner executor), like
    software installed by a `before_script` or `script` script.
- Have a separate timeout, which is hard coded to 5 minutes. See
630
  [related issue](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/2716) for details.
631
- Don't affect the job's exit code. If the `script` section succeeds and the
632
  `after_script` times out or fails, the job will exit with code `0` (`Job Succeeded`).
633

634 635
It's possible to overwrite a globally defined `before_script` or `after_script`
if you set it per-job:
636 637

```yaml
638 639 640
default:
  before_script:
    - global before script
641

642 643 644 645 646 647 648
job:
  before_script:
    - execute this instead of global before script
  script:
    - my command
  after_script:
    - execute this after my script
649 650
```

651
[YAML anchors for `before_script` and `after_script`](#yaml-anchors-for-before_script-and-after_script) are available.
652

653
### `stage`
654

655 656 657
`stage` is defined per-job and relies on [`stages`](#stages) which is defined
globally. It allows to group jobs into different stages, and jobs of the same
`stage` are executed in parallel (subject to [certain conditions](#using-your-own-runners)). For example:
658

659 660 661 662 663
```yaml
stages:
  - build
  - test
  - deploy
664

665 666 667
job 0:
  stage: .pre
  script: make something useful before build stage
668

669 670 671
job 1:
  stage: build
  script: make build dependencies
672

673 674 675
job 2:
  stage: build
  script: make build artifacts
676

677 678 679
job 3:
  stage: test
  script: make test
680

681 682 683
job 4:
  stage: deploy
  script: make deploy
684

685 686 687
job 5:
  stage: .post
  script: make something useful at the end of pipeline
688 689
```

690
#### Using your own Runners
691

692 693 694
When using your own Runners, GitLab Runner runs only one job at a time by default (see the
`concurrent` flag in [Runner global settings](https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-global-section)
for more information).
695

696
Jobs will run on your own Runners in parallel only if:
697

698 699
- Run on different Runners.
- The Runner's `concurrent` setting has been changed.
700

701
#### `.pre` and `.post`
702

703
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/31441) in GitLab 12.4.
704

705
The following stages are available to every pipeline:
706

707 708
- `.pre`, which is guaranteed to always be the first stage in a pipeline.
- `.post`, which is guaranteed to always be the last stage in a pipeline.
709

710
User-defined stages are executed after `.pre` and before `.post`.
E
Evan Read 已提交
711

712
The order of `.pre` and `.post` can't be changed, even if defined out of order in `.gitlab-ci.yml`.
713
For example, the following are equivalent configuration:
714

715
- Configured in order:
716

717
  ```yaml
718 719 720 721 722 723
  stages:
    - .pre
    - a
    - b
    - .post
  ```
724

725
- Configured out of order:
726

727
  ```yaml
728 729 730 731 732 733
  stages:
    - a
    - .pre
    - b
    - .post
  ```
734

735
- Not explicitly configured:
E
Evan Read 已提交
736

737
  ```yaml
738 739 740 741
  stages:
    - a
    - b
  ```
742

743
NOTE: **Note:**
744
A pipeline won't be created if it only contains jobs in `.pre` or `.post` stages.
745

746
### `extends`
747

748
> Introduced in GitLab 11.3.
749

750 751
`extends` defines entry names that a job that uses `extends` is going to
inherit from.
752

753
It's an alternative to using [YAML anchors](#anchors) and is a little
754
more flexible and readable:
755

756 757 758 759 760 761 762
```yaml
.tests:
  script: rake test
  stage: test
  only:
    refs:
      - branches
763

764 765 766 767 768 769 770
rspec:
  extends: .tests
  script: rake rspec
  only:
    variables:
      - $RSPEC
```
E
Evan Read 已提交
771

772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795
In the example above, the `rspec` job inherits from the `.tests` template job.
GitLab will perform a reverse deep merge based on the keys. GitLab will:

- Merge the `rspec` contents into `.tests` recursively.
- Not merge the values of the keys.

This results in the following `rspec` job:

```yaml
rspec:
  script: rake rspec
  stage: test
  only:
    refs:
      - branches
    variables:
      - $RSPEC
```

NOTE: **Note:**
Note that `script: rake test` has been overwritten by `script: rake rspec`.

If you do want to include the `rake test`, see [`before_script` and `after_script`](#before_script-and-after_script).

796
`.tests` in this example is a [hidden job](#hide-jobs), but it's
797 798
possible to inherit from regular jobs as well.

799
`extends` supports multi-level inheritance, however it's not recommended to
800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893
use more than three levels. The maximum nesting level that is supported is 10.
The following example has two levels of inheritance:

```yaml
.tests:
  only:
    - pushes

.rspec:
  extends: .tests
  script: rake rspec

rspec 1:
  variables:
    RSPEC_SUITE: '1'
  extends: .rspec

rspec 2:
  variables:
    RSPEC_SUITE: '2'
  extends: .rspec

spinach:
  extends: .tests
  script: rake spinach
```

In GitLab 12.0 and later, it's also possible to use multiple parents for
`extends`. The algorithm used for merge is "closest scope wins", so
keys from the last member will always shadow anything defined on other
levels. For example:

```yaml
.only-important:
  only:
    - master
    - stable
  tags:
    - production

.in-docker:
  tags:
    - docker
  image: alpine

rspec:
  extends:
    - .only-important
    - .in-docker
  script:
    - rake rspec
```

This results in the following `rspec` job:

```yaml
rspec:
  only:
    - master
    - stable
  tags:
    - docker
  image: alpine
  script:
    - rake rspec
```

#### Using `extends` and `include` together

`extends` works across configuration files combined with `include`.

For example, if you have a local `included.yml` file:

```yaml
.template:
  script:
    - echo Hello!
```

Then, in `.gitlab-ci.yml` you can use it like this:

```yaml
include: included.yml

useTemplate:
  image: alpine
  extends: .template
```

This will run a job called `useTemplate` that runs `echo Hello!` as defined in
the `.template` job, and uses the `alpine` Docker image as defined in the local job.

### `rules`

894
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/27863) in GitLab 12.3.
895 896 897

`rules` allows for a list of individual rule objects to be evaluated
*in order*, until one matches and dynamically provides attributes to the job.
898 899 900

CAUTION: **Caution:**
`rules` can't be used in combination with `only/except` as it is a replacement for that functionality. If you attempt to do this, the linter will return a
901 902
`key may not be used with rules` error.

903 904 905 906 907 908 909 910 911 912 913 914 915 916 917
#### Key details when using `rules`

A very important difference between `rules` and `only/except`, is that jobs defined
with `rules` trigger merge request pipelines by default, but `only/except` jobs do not.
This may be surprising if migrating from `only` and `except`, so new users of `rules`
can use one of the [`workflow: rules` templates](#workflowrules-templates) to get started.
This will ensure that the behavior is more stable as you start adding additional `rules`
blocks, and will avoid issues like creating a duplicate, merge request (detached) pipeline.

We don't recomment mixing `only/except` jobs with `rules` jobs in the same pipeline.
It may not cause YAML errors, but debugging the exact execution behavior can be complex
due to the different default behaviors of `only/except` and `rules`.

### Rules clauses

918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943
Available rule clauses include:

- [`if`](#rulesif) (similar to [`only:variables`](#onlyvariablesexceptvariables))
- [`changes`](#ruleschanges) (same as [`only:changes`](#onlychangesexceptchanges))
- [`exists`](#rulesexists)

For example, using `if`. This configuration specifies that `job` should be built
and run for every pipeline on merge requests targeting `master`, regardless of
the status of other builds:

```yaml
job:
  script: "echo Hello, Rules!"
  rules:
    - if: '$CI_MERGE_REQUEST_TARGET_BRANCH_NAME == "master"'
      when: always
    - if: '$VAR =~ /pattern/'
      when: manual
    - when: on_success
```

In this example, if the first rule:

- Matches, the job will be given the `when:always` attribute.
- Does not match, the second and third rules will be evaluated sequentially
  until a match is found. That is, the job will be given either the:
944
  - `when: manual` attribute if the second rule matches. **The stage won't complete until this manual job is triggered and completes successfully.**
945 946 947 948 949 950 951 952
  - `when: on_success` attribute if the second rule does not match. The third
    rule will always match when reached because it has no conditional clauses.

#### `rules:if`

`rules:if` differs slightly from `only:variables` by accepting only a single
expression string, rather than an array of them. Any set of expressions to be
evaluated should be conjoined into a single expression using `&&` or `||`, and use
953
the [variable matching syntax](../variables/README.md#syntax-of-environment-variable-expressions).
954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979

For example:

```yaml
job:
  script: "echo Hello, Rules!"
  rules:
    - if: '$CI_MERGE_REQUEST_SOURCE_BRANCH_NAME =~ /^feature/ && $CI_MERGE_REQUEST_TARGET_BRANCH_NAME == "master"' # This rule will be evaluated
      when: always
    - if: '$CI_MERGE_REQUEST_SOURCE_BRANCH_NAME =~ /^feature/' # This rule will only be evaluated if the target branch is not "master"
      when: manual
    - if: '$CI_MERGE_REQUEST_SOURCE_BRANCH_NAME' # If neither of the first two match but the simple presence does, we set to "on_success" by default
```

If none of the provided rules match, the job will be set to `when:never`, and
not included in the pipeline. If `rules:when` is not included in the configuration
at all, the behavior defaults to `job:when`, which continues to default to
`on_success`.

#### `rules:changes`

`rules: changes` works exactly the same way as `only: changes` and `except: changes`,
accepting an array of paths. Similarly, it will always return true if there is no
Git push event. See [`only/except: changes`](#onlychangesexceptchanges) for more information.

For example:
980 981 982 983 984 985 986 987 988 989 990 991 992

```yaml
docker build:
  script: docker build -t my-image:$CI_COMMIT_REF_SLUG .
  rules:
    - changes: # Will include the job and set to when:manual if any of the follow paths match a modified file.
      - Dockerfile
      when: manual
    - if: '$VAR == "string value"'
      when: manual # Will include the job and set to when:manual if the expression evaluates to true, after the `changes:` rule fails to match.
    - when: on_success # If neither of the first rules match, set to on_success
```

E
Evan Read 已提交
993 994 995 996 997
In this example, a job either set to:

- Run manually if `Dockerfile` has changed OR `$VAR == "string value"`.
- `when:on_success` by the last rule, where no earlier clauses evaluate to true.

998 999
#### `rules:exists`

1000
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/24021) in GitLab 12.4.
1001

1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031
`exists` accepts an array of paths and will match if any of these paths exist
as files in the repository.

For example:

```yaml
job:
  script: docker build -t my-image:$CI_COMMIT_REF_SLUG .
  rules:
    - exists:
      - Dockerfile
```

You can also use glob patterns to match multiple files in any directory within
the repository.

For example:

```yaml
job:
  script: bundle exec rspec
  rules:
    - exists:
      - spec/**.rb
```

NOTE: **Note:**
For performance reasons, using `exists` with patterns is limited to 10000
checks. After the 10000th check, rules with patterned globs will always match.

1032 1033
#### `rules:allow_failure`

1034
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/30235) in GitLab 12.8.
1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050

You can use [`allow_failure: true`](#allow_failure) within `rules:` to allow a job to fail, or a manual job to
wait for action, without stopping the pipeline itself. All jobs using `rules:` default to `allow_failure: false`
if `allow_failure:` is not defined.

```yaml
job:
  script: "echo Hello, Rules!"
  rules:
    - if: '$CI_MERGE_REQUEST_TARGET_BRANCH_NAME == "master"'
      when: manual
      allow_failure: true
```

In this example, if the first rule matches, then the job will have `when: manual` and `allow_failure: true`.

E
Evan Read 已提交
1051
#### Complex rule clauses
1052

1053 1054
To conjoin `if`, `changes`, and `exists` clauses with an AND, use them in the
same rule.
E
Evan Read 已提交
1055 1056 1057 1058 1059

In the following example:

- We run the job manually if `Dockerfile` or any file in `docker/scripts/`
  has changed AND `$VAR == "string value"`.
1060
- Otherwise, the job won't be included in the pipeline.
1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073

```yaml
docker build:
  script: docker build -t my-image:$CI_COMMIT_REF_SLUG .
  rules:
    - if: '$VAR == "string value"'
      changes: # Will include the job and set to when:manual if any of the follow paths match a modified file.
      - Dockerfile
      - docker/scripts/*
      when: manual
  # - when: never would be redundant here, this is implied any time rules are listed.
```

E
Evan Read 已提交
1074 1075 1076 1077
The only clauses currently available are:

- `if`
- `changes`
1078
- `exists`
E
Evan Read 已提交
1079 1080 1081

Keywords such as `branches` or `refs` that are currently available for
`only`/`except` are not yet available in `rules` as they are being individually
1082 1083 1084
considered for their usage and behavior in this context. Future keyword improvements
are being discussed in our [epic for improving `rules`](https://gitlab.com/groups/gitlab-org/-/epics/2783),
where anyone can add suggestions or requests.
1085 1086 1087

#### Permitted attributes

E
Evan Read 已提交
1088 1089 1090 1091
The only job attributes currently set by `rules` are:

- `when`.
- `start_in`, if `when` is set to `delayed`.
1092
- `allow_failure`.
E
Evan Read 已提交
1093 1094 1095

A job will be included in a pipeline if `when` is evaluated to any value
except `never`.
1096

E
Evan Read 已提交
1097 1098
Delayed jobs require a `start_in` value, so rule objects do as well. For
example:
1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110

```yaml
docker build:
  script: docker build -t my-image:$CI_COMMIT_REF_SLUG .
  rules:
    - changes: # Will include the job and delay 3 hours when the Dockerfile has changed
      - Dockerfile
      when: delayed
      start_in: '3 hours'
    - when: on_success # Otherwise include the job and set to run normally
```

E
Evan Read 已提交
1111
Additional job configuration may be added to rules in the future. If something
1112
useful is not available, please
1113
[open an issue](https://gitlab.com/gitlab-org/gitlab/issues).
1114

1115
### `only`/`except` (basic)
1116

1117
NOTE: **Note:**
1118 1119 1120
The [`rules`](#rules) syntax is an improved, more powerful solution for defining
when jobs should run or not. Consider using `rules` instead of `only/except` to get
the most out of your pipelines.
1121

1122 1123
`only` and `except` are two parameters that set a job policy to limit when
jobs are created:
1124

1125 1126 1127
1. `only` defines the names of branches and tags for which the job will run.
1. `except` defines the names of branches and tags for which the job will
    **not** run.
1128

1129
There are a few rules that apply to the usage of job policy:
1130

1131 1132 1133 1134 1135
- `only` and `except` are inclusive. If both `only` and `except` are defined
   in a job specification, the ref is filtered by `only` and `except`.
- `only` and `except` allow the use of regular expressions ([supported regexp syntax](#supported-onlyexcept-regexp-syntax)).
- `only` and `except` allow to specify a repository path to filter jobs for
   forks.
D
Douwe Maan 已提交
1136

1137
In addition, `only` and `except` allow the use of special keywords:
D
Douwe Maan 已提交
1138

1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152
| **Value** |  **Description**  |
| --------- |  ---------------- |
| `branches`       | When a Git reference of a pipeline is a branch.  |
| `tags`           | When a Git reference of a pipeline is a tag.  |
| `api`            | When pipeline has been triggered by a second pipelines API (not triggers API).  |
| `external`       | When using CI services other than GitLab. |
| `pipelines`      | For multi-project triggers, created using the API with `CI_JOB_TOKEN`. |
| `pushes`         | Pipeline is triggered by a `git push` by the user. |
| `schedules`      | For [scheduled pipelines](../pipelines/schedules.md). |
| `triggers`       | For pipelines created using a trigger token. |
| `web`            | For pipelines created using **Run pipeline** button in GitLab UI (under your project's **Pipelines**). |
| `merge_requests` | When a merge request is created or updated (See [pipelines for merge requests](../merge_request_pipelines/index.md)). |
| `external_pull_requests`| When an external pull request on GitHub is created or updated (See [Pipelines for external pull requests](../ci_cd_for_external_repos/index.md#pipelines-for-external-pull-requests)). |
| `chat`          | For jobs created using a [GitLab ChatOps](../chatops/README.md) command. |
1153

1154 1155
In the example below, `job` will run only for refs that start with `issue-`,
whereas all branches will be skipped:
1156 1157

```yaml
D
Douwe Maan 已提交
1158
job:
1159 1160 1161 1162 1163 1164 1165
  # use regexp
  only:
    - /^issue-.*$/
  # use special keyword
  except:
    - branches
```
D
Douwe Maan 已提交
1166

1167 1168
Pattern matching is case-sensitive by default. Use `i` flag modifier, like
`/pattern/i` to make a pattern case-insensitive:
1169 1170

```yaml
1171 1172 1173 1174 1175 1176 1177
job:
  # use regexp
  only:
    - /^issue-.*$/i
  # use special keyword
  except:
    - branches
1178 1179
```

1180 1181
In this example, `job` will run only for refs that are tagged, or if a build is
explicitly requested via an API trigger or a [Pipeline Schedule](../pipelines/schedules.md):
1182 1183

```yaml
1184 1185 1186 1187 1188 1189
job:
  # use special keywords
  only:
    - tags
    - triggers
    - schedules
1190 1191
```

1192 1193
The repository path can be used to have jobs executed only for the parent
repository and not forks:
1194 1195

```yaml
1196 1197 1198 1199 1200 1201
job:
  only:
    - branches@gitlab-org/gitlab
  except:
    - master@gitlab-org/gitlab
    - /^release/.*$/@gitlab-org/gitlab
1202 1203
```

1204 1205
The above example will run `job` for all branches on `gitlab-org/gitlab`,
except `master` and those with names prefixed with `release/`.
W
Winnie Hellmann 已提交
1206

1207
If a job does not have an `only` rule, `only: ['branches', 'tags']` is set by
1208
default. If it does not have an `except` rule, it's empty.
W
Winnie Hellmann 已提交
1209

1210
For example,
W
Winnie Hellmann 已提交
1211

1212 1213 1214 1215
```yaml
job:
  script: echo 'test'
```
W
Winnie Hellmann 已提交
1216

1217
is translated to:
W
Winnie Hellmann 已提交
1218 1219

```yaml
1220 1221 1222
job:
  script: echo 'test'
  only: ['branches', 'tags']
W
Winnie Hellmann 已提交
1223 1224
```

1225
#### Regular expressions
W
Winnie Hellmann 已提交
1226

1227 1228 1229
Because `@` is used to denote the beginning of a ref's repository path,
matching a ref name containing the `@` character in a regular expression
requires the use of the hex character code match `\x40`.
W
Winnie Hellmann 已提交
1230

1231 1232
Only the tag or branch name can be matched by a regular expression.
The repository path, if given, is always matched literally.
1233

1234 1235 1236 1237 1238 1239
If a regular expression shall be used to match the tag or branch name,
the entire ref name part of the pattern has to be a regular expression,
and must be surrounded by `/`.
(With regular expression flags appended after the closing `/`.)
So `issue-/.*/` won't work to match all tag names or branch names
that begin with `issue-`.
1240

1241 1242 1243 1244 1245
TIP: **Tip**
Use anchors `^` and `$` to avoid the regular expression
matching only a substring of the tag name or branch name.
For example, `/^issue-.*$/` is equivalent to `/^issue-/`,
while just `/issue/` would also match a branch called `severe-issues`.
1246

1247
#### Supported `only`/`except` regexp syntax
1248

1249 1250
CAUTION: **Warning:**
This is a breaking change that was introduced with GitLab 11.9.4.
1251

1252 1253
In GitLab 11.9.4, GitLab begun internally converting regexp used
in `only` and `except` parameters to [RE2](https://github.com/google/re2/wiki/Syntax).
1254

1255 1256 1257 1258
This means that only subset of features provided by [Ruby Regexp](https://ruby-doc.org/core/Regexp.html)
is supported. [RE2](https://github.com/google/re2/wiki/Syntax) limits the set of features
provided due to computational complexity, which means some features became unavailable in GitLab 11.9.4.
For example, negative lookaheads.
1259

1260 1261 1262
For GitLab versions from 11.9.7 and up to GitLab 12.0, GitLab provides a feature flag that can be
enabled by administrators that allows users to use unsafe regexp syntax. This brings compatibility
with previously allowed syntax version and allows users to gracefully migrate to the new syntax.
1263

1264 1265 1266
```ruby
Feature.enable(:allow_unsafe_ruby_regexp)
```
1267

1268
### `only`/`except` (advanced)
1269

1270
CAUTION: **Warning:**
1271
This is an _alpha_ feature, and is subject to change at any time without
1272
prior notice!
1273

1274 1275
GitLab supports both simple and complex strategies, so it's possible to use an
array and a hash configuration scheme.
1276

1277
Four keys are available:
1278

1279 1280 1281 1282
- `refs`
- `variables`
- `changes`
- `kubernetes`
1283

1284 1285
If you use multiple keys under `only` or `except`, the keys will be evaluated as a
single conjoined expression. That is:
1286

1287 1288
- `only:` means "include this job if all of the conditions match".
- `except:` means "exclude this job if any of the conditions match".
1289

1290
With `only`, individual keys are logically joined by an AND:
1291

1292 1293 1294
> (any of refs) AND (any of variables) AND (any of changes) AND (if Kubernetes is active)

In the example below, the `test` job will `only` be created when **all** of the following are true:
1295

1296 1297 1298
- The pipeline has been [scheduled](../../user/project/pipelines/schedules.md) **or** runs for `master`.
- The `variables` keyword matches.
- The `kubernetes` service is active on the project.
1299

1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310
```yaml
test:
  script: npm run test
  only:
    refs:
      - master
      - schedules
    variables:
      - $CI_COMMIT_MESSAGE =~ /run-end-to-end-tests/
    kubernetes: active
```
1311

1312
`except` is implemented as a negation of this complete expression:
1313

1314
> NOT((any of refs) AND (any of variables) AND (any of changes) AND (if Kubernetes is active))
1315

1316
This means the keys are treated as if joined by an OR. This relationship could be described as:
1317

1318
> (any of refs) OR (any of variables) OR (any of changes) OR (if Kubernetes is active)
1319

1320
In the example below, the `test` job will **not** be created when **any** of the following are true:
1321

1322
- The pipeline runs for the `master`.
1323
- There are changes to the `README.md` file in the root directory of the repository.
1324 1325

```yaml
1326 1327 1328 1329 1330 1331 1332
test:
  script: npm run test
  except:
    refs:
      - master
    changes:
      - "README.md"
1333 1334
```

1335
#### `only:refs`/`except:refs`
1336

1337
> `refs` policy introduced in GitLab 10.0.
1338

1339 1340
The `refs` strategy can take the same values as the
[simplified only/except configuration](#onlyexcept-basic).
1341

1342 1343
In the example below, the `deploy` job is going to be created only when the
pipeline has been [scheduled](../pipelines/schedules.md) or runs for the `master` branch:
1344

1345 1346 1347 1348 1349 1350 1351
```yaml
deploy:
  only:
    refs:
      - master
      - schedules
```
1352

1353
#### `only:kubernetes`/`except:kubernetes`
1354

1355
> `kubernetes` policy introduced in GitLab 10.0.
1356

1357
The `kubernetes` strategy accepts only the `active` keyword.
1358

1359 1360
In the example below, the `deploy` job is going to be created only when the
Kubernetes service is active in the project:
1361 1362

```yaml
1363 1364 1365
deploy:
  only:
    kubernetes: active
1366 1367
```

1368
#### `only:variables`/`except:variables`
1369

1370
> `variables` policy introduced in GitLab 10.7.
1371

1372 1373 1374 1375
The `variables` keyword is used to define variables expressions. In other words,
you can use predefined variables / project / group or
environment-scoped variables to define an expression GitLab is going to
evaluate in order to decide whether a job should be created or not.
1376

1377
Examples of using variables expressions:
1378

1379 1380 1381 1382 1383 1384 1385 1386 1387 1388
```yaml
deploy:
  script: cap staging deploy
  only:
    refs:
      - branches
    variables:
      - $RELEASE == "staging"
      - $STAGING
```
1389

1390
Another use case is excluding jobs depending on a commit message:
1391 1392

```yaml
1393 1394 1395 1396 1397
end-to-end:
  script: rake test:end-to-end
  except:
    variables:
      - $CI_COMMIT_MESSAGE =~ /skip-end-to-end-tests/
1398 1399
```

1400
Learn more about [variables expressions](../variables/README.md#environment-variables-expressions).
1401

1402
#### `only:changes`/`except:changes`
1403

1404
> `changes` policy [introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/19232) in GitLab 11.4.
1405

1406 1407
Using the `changes` keyword with `only` or `except` makes it possible to define if
a job should be created based on files modified by a Git push event.
1408

1409
This means the `only:changes` policy is useful for pipelines where:
1410

1411 1412 1413 1414 1415 1416
- `$CI_PIPELINE_SOURCE == 'push'`
- `$CI_PIPELINE_SOURCE == 'merge_request_event'`
- `$CI_PIPELINE_SOURCE == 'external_pull_request_event'`

If there is no Git push event, such as for pipelines with
[sources other than the three above](../variables/predefined_variables.md#variables-reference),
1417
`changes` can't determine if a given file is new or old, and will always
1418 1419 1420
return true.

A basic example of using `only: changes`:
1421 1422

```yaml
1423 1424 1425 1426 1427 1428 1429 1430
docker build:
  script: docker build -t my-image:$CI_COMMIT_REF_SLUG .
  only:
    changes:
      - Dockerfile
      - docker/scripts/*
      - dockerfiles/**/*
      - more_scripts/*.{rb,py,sh}
1431 1432
```

1433 1434 1435
In the scenario above, when pushing commits to an existing branch in GitLab,
it creates and triggers the `docker build` job, provided that one of the
commits contains changes to any of the following:
1436

1437 1438 1439 1440
- The `Dockerfile` file.
- Any of the files inside `docker/scripts/` directory.
- Any of the files and subdirectories inside the `dockerfiles` directory.
- Any of the files with `rb`, `py`, `sh` extensions inside the `more_scripts` directory.
1441

1442 1443
CAUTION: **Warning:**
If using `only:changes` with [only allow merge requests to be merged if the pipeline succeeds](../../user/project/merge_requests/merge_when_pipeline_succeeds.md#only-allow-merge-requests-to-be-merged-if-the-pipeline-succeeds),
1444
undesired behavior could result if you don't [also use `only:merge_requests`](#using-onlychanges-with-pipelines-for-merge-requests).
1445

1446
You can also use glob patterns to match multiple files in either the root directory
1447
of the repository, or in _any_ directory within the repository, but they must be wrapped
1448
in double quotes or GitLab will fail to parse the `.gitlab-ci.yml`. For example:
1449

1450 1451 1452 1453 1454 1455 1456 1457
```yaml
test:
  script: npm run test
  only:
    changes:
      - "*.json"
      - "**/*.sql"
```
1458

1459
The following example will skip the `build` job if a change is detected in any file
1460
in the root directory of the repository with a `.md` extension:
1461

1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476
```yaml
build:
  script: npm run build
  except:
    changes:
      - "*.md"
```

CAUTION: **Warning:**
There are some points to be aware of when
[using this feature with new branches or tags *without* pipelines for merge requests](#using-onlychanges-without-pipelines-for-merge-requests).

CAUTION: **Warning:**
There are some points to be aware of when
[using this feature with scheduled pipelines](#using-onlychanges-with-scheduled-pipelines).
1477

1478
##### Using `only:changes` with pipelines for merge requests
1479

1480
With [pipelines for merge requests](../merge_request_pipelines/index.md),
1481
it's possible to define a job to be created based on files modified
1482
in a merge request.
1483

1484 1485 1486 1487
In order to deduce the correct base SHA of the source branch, we recommend combining
this keyword with `only: [merge_requests]`. This way, file differences are correctly
calculated from any further commits, thus all changes in the merge requests are properly
tested in pipelines.
1488

1489
For example:
1490 1491

```yaml
1492 1493 1494 1495 1496 1497 1498 1499
docker build service one:
  script: docker build -t my-service-one-image:$CI_COMMIT_REF_SLUG .
  only:
    refs:
      - merge_requests
    changes:
      - Dockerfile
      - service-one/**/*
1500 1501
```

1502 1503 1504
In the scenario above, if a merge request is created or updated that changes
either files in `service-one` directory or the `Dockerfile`, GitLab creates
and triggers the `docker build service one` job.
1505

1506 1507 1508
Note that if [pipelines for merge requests](../merge_request_pipelines/index.md) is
combined with `only: [change]`, but `only: [merge_requests]` is omitted, there could be
unwanted behavior.
1509

1510 1511 1512 1513 1514 1515 1516 1517 1518
For example:

```yaml
docker build service one:
  script: docker build -t my-service-one-image:$CI_COMMIT_REF_SLUG .
  only:
    changes:
      - Dockerfile
      - service-one/**/*
1519 1520
```

1521 1522
In the example above, a pipeline could fail due to changes to a file in `service-one/**/*`.
A later commit could then be pushed that does not include any changes to this file,
1523
but includes changes to the `Dockerfile`, and this pipeline could pass because it's only
1524 1525 1526
testing the changes to the `Dockerfile`. GitLab checks the **most recent pipeline**,
that **passed**, and will show the merge request as mergeable, despite the earlier
failed pipeline caused by a change that was not yet corrected.
1527

1528 1529
With this configuration, care must be taken to check that the most recent pipeline
properly corrected any failures from previous pipelines.
1530

1531
##### Using `only:changes` without pipelines for merge requests
1532

1533 1534 1535 1536
Without [pipelines for merge requests](../merge_request_pipelines/index.md), pipelines
run on branches or tags that don't have an explicit association with a merge request.
In this case, a previous SHA is used to calculate the diff, which equivalent to `git diff HEAD~`.
This could result in some unexpected behavior, including:
1537

1538 1539 1540
- When pushing a new branch or a new tag to GitLab, the policy always evaluates to true.
- When pushing a new commit, the changed files are calculated using the previous commit
  as the base SHA.
1541

1542
##### Using `only:changes` with scheduled pipelines
1543

1544 1545 1546
`only:changes` always evaluates as "true" in [Scheduled pipelines](../pipelines/schedules.md).
All files are considered to have "changed" when a scheduled pipeline
runs.
1547

1548
### `needs`
1549

1550
> - [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/47063) in GitLab 12.2.
1551
> - In GitLab 12.3, maximum number of jobs in `needs` array raised from five to 50.
1552
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/30631) in GitLab 12.8, `needs: []` lets jobs start immediately.
1553

1554 1555 1556 1557 1558 1559 1560
The `needs:` keyword enables executing jobs out-of-order, allowing you to implement
a [directed acyclic graph](../directed_acyclic_graph/index.md) in your `.gitlab-ci.yml`.

This lets you run some jobs without waiting for other ones, disregarding stage ordering
so you can have multiple stages running concurrently.

Let's consider the following example:
1561 1562

```yaml
1563 1564
linux:build:
  stage: build
1565

1566 1567
mac:build:
  stage: build
1568

1569 1570 1571
lint:
  stage: test
  needs: []
1572

1573 1574 1575
linux:rspec:
  stage: test
  needs: ["linux:build"]
1576

1577 1578 1579
linux:rubocop:
  stage: test
  needs: ["linux:build"]
1580

1581 1582 1583
mac:rspec:
  stage: test
  needs: ["mac:build"]
1584

1585 1586 1587
mac:rubocop:
  stage: test
  needs: ["mac:build"]
1588

1589 1590 1591
production:
  stage: deploy
```
1592

1593
This example creates four paths of execution:
1594

1595
- Linter: the `lint` job will run immediately without waiting for the `build` stage to complete because it has no needs (`needs: []`).
1596

1597 1598
- Linux path: the `linux:rspec` and `linux:rubocop` jobs will be run as soon
  as the `linux:build` job finishes without waiting for `mac:build` to finish.
1599

1600 1601
- macOS path: the `mac:rspec` and `mac:rubocop` jobs will be run as soon
  as the `mac:build` job finishes, without waiting for `linux:build` to finish.
1602

1603 1604 1605
- The `production` job will be executed as soon as all previous jobs
  finish; in this case: `linux:build`, `linux:rspec`, `linux:rubocop`,
  `mac:build`, `mac:rspec`, `mac:rubocop`.
1606

1607
#### Requirements and limitations
1608

1609 1610 1611
- If `needs:` is set to point to a job that is not instantiated
  because of `only/except` rules or otherwise does not exist, the
  pipeline will be created with YAML error.
1612
- The maximum number of jobs that a single job can need in the `needs:` array is limited:
1613 1614 1615 1616 1617 1618 1619 1620
  - For GitLab.com, the limit is ten. For more information, see our
    [infrastructure issue](https://gitlab.com/gitlab-com/gl-infra/infrastructure/issues/7541).
  - For self-managed instances, the limit is:
    - 10, if the `ci_dag_limit_needs` feature flag is enabled (default).
    - 50, if the `ci_dag_limit_needs` feature flag is disabled.
- If `needs:` refers to a job that is marked as `parallel:`.
  the current job will depend on all parallel jobs created.
- `needs:` is similar to `dependencies:` in that it needs to use jobs from prior stages,
1621
  meaning it's impossible to create circular dependencies. Depending on jobs in the
1622
  current stage is not possible either, but support [is planned](https://gitlab.com/gitlab-org/gitlab/-/issues/30632).
1623 1624
- Related to the above, stages must be explicitly defined for all jobs
  that have the keyword `needs:` or are referred to by one.
1625

1626
##### Changing the `needs:` job limit
1627

1628 1629 1630 1631
The maximum number of jobs that can be defined within `needs:` defaults to 10, but
can be changed to 50 via a feature flag. To change the limit to 50,
[start a Rails console session](../../administration/troubleshooting/debug.md#starting-a-rails-console-session)
and run:
1632

1633 1634
```ruby
Feature::disable(:ci_dag_limit_needs)
1635 1636
```

1637
To set it back to 10, run the opposite command:
1638

1639 1640
```ruby
Feature::enable(:ci_dag_limit_needs)
1641 1642
```

1643
#### Artifact downloads with `needs`
1644

1645
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/14311) in GitLab v12.6.
1646

1647 1648
When using `needs`, artifact downloads are controlled with `artifacts: true` or `artifacts: false`.
The `dependencies` keyword should not be used with `needs`, as this is deprecated since GitLab 12.6.
1649

1650
In the example below, the `rspec` job will download the `build_job` artifacts, while the
1651
`rubocop` job won't:
1652

1653
```yaml
1654 1655 1656
build_job:
  stage: build
  artifacts:
1657
    paths:
1658
      - binaries/
1659

1660 1661
rspec:
  stage: test
1662 1663 1664
  needs:
    - job: build_job
      artifacts: true
1665

1666 1667 1668 1669 1670 1671
rubocop:
  stage: test
  needs:
    - job: build_job
      artifacts: false
```
1672

1673 1674 1675
Additionally, in the three syntax examples below, the `rspec` job will download the artifacts
from all three `build_jobs`, as `artifacts` is true for `build_job_1`, and will
**default** to true for both `build_job_2` and `build_job_3`.
K
Kamil Trzcinski 已提交
1676

1677 1678 1679 1680 1681 1682 1683 1684
```yaml
rspec:
  needs:
    - job: build_job_1
      artifacts: true
    - job: build_job_2
    - build_job_3
```
1685

1686
#### Cross project artifact downloads with `needs` **(PREMIUM)**
1687

1688
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/14311) in GitLab v12.7.
1689

1690 1691 1692
`needs` can be used to download artifacts from up to five jobs in pipelines on
[other refs in the same project](#artifact-downloads-between-pipelines-in-the-same-project),
or pipelines in different projects:
1693

1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704
```yaml
build_job:
  stage: build
  script:
    - ls -lhR
  needs:
    - project: group/project-name
      job: build-1
      ref: master
      artifacts: true
```
1705

1706 1707
`build_job` will download the artifacts from the latest successful `build-1` job
on the `master` branch in the `group/project-name` project.
1708

1709
##### Artifact downloads between pipelines in the same project
1710

1711 1712 1713 1714
`needs` can be used to download artifacts from different pipelines in the current project
by setting the `project` keyword as the current project's name, and specifying a ref.
In the example below, `build_job` will download the artifacts for the latest successful
`build-1` job with the `other-ref` ref:
K
Kamil Trzcinski 已提交
1715

1716
```yaml
1717 1718 1719 1720 1721 1722 1723 1724 1725
build_job:
  stage: build
  script:
    - ls -lhR
  needs:
    - project: group/same-project-name
      job: build-1
      ref: other-ref
      artifacts: true
1726
```
K
Kamil Trzcinski 已提交
1727

1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740
NOTE: **Note:**
Downloading artifacts from jobs that are run in [`parallel:`](#parallel) is not supported.

### `tags`

`tags` is used to select specific Runners from the list of all Runners that are
allowed to run this project.

During the registration of a Runner, you can specify the Runner's tags, for
example `ruby`, `postgres`, `development`.

`tags` allow you to run jobs with Runners that have the specified tags
assigned to them:
1741 1742 1743

```yaml
job:
1744 1745 1746
  tags:
    - ruby
    - postgres
1747 1748
```

1749 1750
The specification above, will make sure that `job` is built by a Runner that
has both `ruby` AND `postgres` tags defined.
1751

1752 1753 1754
Tags are also a great way to run different jobs on different platforms, for
example, given an OS X Runner with tag `osx` and Windows Runner with tag
`windows`, the following jobs run on respective platforms:
1755 1756

```yaml
1757 1758 1759 1760 1761
windows job:
  stage:
    - build
  tags:
    - windows
1762
  script:
1763
    - echo Hello, %USERNAME%!
1764

1765 1766 1767 1768 1769
osx job:
  stage:
    - build
  tags:
    - osx
1770
  script:
1771
    - echo "Hello, $USER!"
1772 1773
```

1774
### `allow_failure`
1775

1776 1777 1778 1779 1780
`allow_failure` allows a job to fail without impacting the rest of the CI
suite.
The default value is `false`, except for [manual](#whenmanual) jobs using the
`when: manual` syntax, unless using [`rules:`](#rules) syntax, where all jobs
default to false, *including* `when: manual` jobs.
1781

1782 1783 1784
When enabled and the job fails, the job will show an orange warning in the UI.
However, the logical flow of the pipeline will consider the job a
success/passed, and is not blocked.
1785

1786 1787 1788
Assuming all other jobs are successful, the job's stage and its pipeline will
show the same orange warning. However, the associated commit will be marked
"passed", without warnings.
1789

1790
In the example below, `job1` and `job2` will run in parallel, but if `job1`
1791
fails, it won't stop the next stage from running, since it's marked with
1792
`allow_failure: true`:
1793

1794 1795 1796 1797 1798 1799
```yaml
job1:
  stage: test
  script:
    - execute_script_that_will_fail
  allow_failure: true
1800

1801 1802 1803 1804 1805 1806 1807 1808 1809
job2:
  stage: test
  script:
    - execute_script_that_will_succeed

job3:
  stage: deploy
  script:
    - deploy_to_staging
1810 1811
```

1812
### `when`
1813

1814 1815
`when` is used to implement jobs that are run in case of failure or despite the
failure.
1816

1817
`when` can be set to one of the following values:
1818

1819 1820 1821 1822 1823 1824 1825 1826 1827 1828
1. `on_success` - execute job only when all jobs from prior stages
    succeed (or are considered succeeding because they are marked
    `allow_failure`). This is the default.
1. `on_failure` - execute job only when at least one job from prior stages
    fails.
1. `always` - execute job regardless of the status of jobs from prior stages.
1. `manual` - execute job manually (added in GitLab 8.10). Read about
    [manual actions](#whenmanual) below.
1. `delayed` - execute job after a certain period (added in GitLab 11.14).
    Read about [delayed actions](#whendelayed) below.
1829

1830
For example:
1831

1832 1833 1834 1835 1836 1837 1838
```yaml
stages:
  - build
  - cleanup_build
  - test
  - deploy
  - cleanup
1839

1840 1841 1842 1843
build_job:
  stage: build
  script:
    - make build
1844

1845 1846 1847 1848 1849
cleanup_build_job:
  stage: cleanup_build
  script:
    - cleanup build when failed
  when: on_failure
1850

1851 1852 1853 1854
test_job:
  stage: test
  script:
    - make test
1855

1856 1857 1858 1859 1860
deploy_job:
  stage: deploy
  script:
    - make deploy
  when: manual
1861

1862 1863 1864 1865 1866
cleanup_job:
  stage: cleanup
  script:
    - cleanup after jobs
  when: always
1867 1868
```

1869
The above script will:
1870

1871 1872 1873 1874
1. Execute `cleanup_build_job` only when `build_job` fails.
1. Always execute `cleanup_job` as the last step in pipeline regardless of
   success or failure.
1. Allow you to manually execute `deploy_job` from GitLab's UI.
1875

1876
#### `when:manual`
1877

1878 1879 1880
> - Introduced in GitLab 8.10.
> - Blocking manual actions were introduced in GitLab 9.0.
> - Protected actions were introduced in GitLab 9.2.
1881

1882 1883 1884 1885
Manual actions are a special type of job that are not executed automatically,
they need to be explicitly started by a user. An example usage of manual actions
would be a deployment to a production environment. Manual actions can be started
from the pipeline, job, environment, and deployment views. Read more at the
1886
[environments documentation](../environments/index.md#configuring-manual-deployments).
1887

1888 1889 1890 1891
Manual actions can be either optional or blocking. Blocking manual actions will
block the execution of the pipeline at the stage this action is defined in. It's
possible to resume execution of the pipeline when someone executes a blocking
manual action by clicking a _play_ button.
1892

1893
When a pipeline is blocked, it won't be merged if Merge When Pipeline Succeeds
1894 1895
is set. Blocked pipelines also do have a special status, called _manual_.
When the `when:manual` syntax is used, manual actions are non-blocking by
1896
default. If you want to make manual action blocking, it's necessary to add
1897
`allow_failure: false` to the job's definition in `.gitlab-ci.yml`.
A
Achilleas Pipinellis 已提交
1898

1899
Optional manual actions have `allow_failure: true` set by default and their
1900
Statuses don't contribute to the overall pipeline status. So, if a manual
1901
action fails, the pipeline will eventually succeed.
1902

1903 1904
NOTE: **Note:**
When using [`rules:`](#rules), `allow_failure` defaults to `false`, including for manual jobs.
1905

1906 1907 1908 1909
Manual actions are considered to be write actions, so permissions for
[protected branches](../../user/project/protected_branches.md) are used when
a user wants to trigger an action. In other words, in order to trigger a manual
action assigned to a branch that the pipeline is running for, the user needs to
1910
have the ability to merge to this branch. It's possible to use protected environments
1911 1912
to more strictly [protect manual deployments](#protecting-manual-jobs-premium) from being
run by unauthorized users.
1913

1914 1915 1916 1917
NOTE: **Note:**
Using `when:manual` and `trigger` together results in the error `jobs:#{job-name} when
should be on_success, on_failure or always`, because `when:manual` prevents triggers
being used.
1918

1919
##### Protecting manual jobs **(PREMIUM)**
1920

1921 1922
It's possible to use [protected environments](../environments/protected_environments.md)
to define a precise list of users authorized to run a manual job. By allowing only
1923
users associated with a protected environment to trigger manual jobs, it's possible
1924
to implement some special use cases, such as:
1925

1926 1927
- More precisely limiting who can deploy to an environment.
- Enabling a pipeline to be blocked until an approved user "approves" it.
1928

1929
To do this, you must:
1930

1931
1. Add an `environment` to the job. For example:
1932

1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944
   ```yaml
   deploy_prod:
     stage: deploy
     script:
       - echo "Deploy to production server"
     environment:
       name: production
       url: https://example.com
     when: manual
     only:
       - master
   ```
1945

1946 1947 1948 1949 1950
1. In the [protected environments settings](../environments/protected_environments.md#protecting-environments),
   select the environment (`production` in the example above) and add the users, roles or groups
   that are authorized to trigger the manual job to the **Allowed to Deploy** list. Only those in
   this list will be able to trigger this manual job, as well as GitLab administrators
   who are always able to use protected environments.
1951

1952
Additionally, if a manual job is defined as blocking by adding `allow_failure: false`,
1953
the next stages of the pipeline won't run until the manual job is triggered. This
1954 1955
can be used as a way to have a defined list of users allowed to "approve" later pipeline
stages by triggering the blocking manual job.
1956

1957
#### `when:delayed`
1958

1959
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/51352) in GitLab 11.4.
1960

1961 1962
Delayed job are for executing scripts after a certain period.
This is useful if you want to avoid jobs entering `pending` state immediately.
1963

1964 1965
You can set the period with `start_in` key. The value of `start_in` key is an elapsed time in seconds, unless a unit is
provided. `start_in` key must be less than or equal to one week. Examples of valid values include:
1966

1967 1968 1969 1970 1971
- `'5'`
- `10 seconds`
- `30 minutes`
- `1 day`
- `1 week`
1972

1973
When there is a delayed job in a stage, the pipeline won't progress until the delayed job has finished.
1974
This means this keyword can also be used for inserting delays between different stages.
1975

1976
The timer of a delayed job starts immediately after the previous stage has completed.
1977
Similar to other types of jobs, a delayed job's timer won't start unless the previous stage passed.
1978

1979
The following example creates a job named `timed rollout 10%` that is executed 30 minutes after the previous stage has completed:
1980

1981 1982 1983 1984 1985 1986 1987
```yaml
timed rollout 10%:
  stage: deploy
  script: echo 'Rolling out 10% ...'
  when: delayed
  start_in: 30 minutes
```
1988

1989
You can stop the active timer of a delayed job by clicking the **{time-out}** (**Unschedule**) button.
1990
This job will never be executed in the future unless you execute the job manually.
1991

1992 1993
You can start a delayed job immediately by clicking the **Play** button.
GitLab Runner will pick your job soon and start the job.
1994

1995
### `environment`
1996

1997 1998
> - Introduced in GitLab 8.9.
> - You can read more about environments and find more examples in the
1999
>   [documentation about environments](../environments/index.md).
2000

2001 2002 2003 2004 2005
`environment` is used to define that a job deploys to a specific environment.
If `environment` is specified and no environment under that name exists, a new
one will be created automatically.

In its simplest form, the `environment` keyword can be defined like:
2006 2007

```yaml
2008 2009 2010 2011
deploy to production:
  stage: deploy
  script: git push production HEAD:master
  environment: production
2012 2013
```

2014 2015
In the above example, the `deploy to production` job will be marked as doing a
deployment to the `production` environment.
2016

2017
#### `environment:name`
2018

2019 2020 2021 2022 2023 2024
> - Introduced in GitLab 8.11.
> - Before GitLab 8.11, the name of an environment could be defined as a string like
>   `environment: production`. The recommended way now is to define it under the
>   `name` keyword.
> - The `name` parameter can use any of the defined CI variables,
>   including predefined, secure variables and `.gitlab-ci.yml` [`variables`](#variables).
2025
>   You however can't use variables defined under `script`.
B
Ben Bodenmiller 已提交
2026

2027
The `environment` name can contain:
2028

2029 2030 2031 2032 2033 2034 2035 2036 2037
- letters
- digits
- spaces
- `-`
- `_`
- `/`
- `$`
- `{`
- `}`
2038

2039 2040
Common names are `qa`, `staging`, and `production`, but you can use whatever
name works with your workflow.
2041

2042
Instead of defining the name of the environment right after the `environment`
2043
keyword, it's also possible to define it as a separate value. For that, use
2044
the `name` keyword under `environment`:
2045 2046

```yaml
2047 2048 2049 2050 2051
deploy to production:
  stage: deploy
  script: git push production HEAD:master
  environment:
    name: production
2052 2053
```

2054
#### `environment:url`
2055

2056 2057 2058 2059 2060
> - Introduced in GitLab 8.11.
> - Before GitLab 8.11, the URL could be added only in GitLab's UI. The
>   recommended way now is to define it in `.gitlab-ci.yml`.
> - The `url` parameter can use any of the defined CI variables,
>   including predefined, secure variables and `.gitlab-ci.yml` [`variables`](#variables).
2061
>   You however can't use variables defined under `script`.
2062

2063 2064
This is an optional value that when set, it exposes buttons in various places
in GitLab which when clicked take you to the defined URL.
2065

2066 2067 2068
In the example below, if the job finishes successfully, it will create buttons
in the merge requests and in the environments/deployments pages which will point
to `https://prod.example.com`.
2069

2070 2071 2072 2073 2074 2075 2076 2077
```yaml
deploy to production:
  stage: deploy
  script: git push production HEAD:master
  environment:
    name: production
    url: https://prod.example.com
```
2078

2079
#### `environment:on_stop`
2080

2081
> - [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/22191) in GitLab 8.13.
2082 2083 2084
> - Starting with GitLab 8.14, when you have an environment that has a stop action
>   defined, GitLab will automatically trigger a stop action when the associated
>   branch is deleted.
2085

2086 2087 2088
Closing (stopping) environments can be achieved with the `on_stop` keyword defined under
`environment`. It declares a different job that runs in order to close
the environment.
2089

2090
Read the `environment:action` section for an example.
2091

2092
#### `environment:action`
O
Olivier Gonzalez 已提交
2093

2094
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/22191) in GitLab 8.13.
O
Olivier Gonzalez 已提交
2095

2096 2097
The `action` keyword is to be used in conjunction with `on_stop` and is defined
in the job that is called to close the environment.
O
Olivier Gonzalez 已提交
2098

2099
Take for instance:
O
Olivier Gonzalez 已提交
2100

2101 2102 2103 2104 2105 2106 2107
```yaml
review_app:
  stage: deploy
  script: make deploy-app
  environment:
    name: review
    on_stop: stop_review_app
O
Olivier Gonzalez 已提交
2108

2109 2110 2111 2112 2113 2114 2115 2116 2117 2118
stop_review_app:
  stage: deploy
  variables:
    GIT_STRATEGY: none
  script: make delete-app
  when: manual
  environment:
    name: review
    action: stop
```
O
Olivier Gonzalez 已提交
2119

2120 2121 2122 2123 2124 2125
In the above example we set up the `review_app` job to deploy to the `review`
environment, and we also defined a new `stop_review_app` job under `on_stop`.
Once the `review_app` job is successfully finished, it will trigger the
`stop_review_app` job based on what is defined under `when`. In this case we
set it up to `manual` so it will need a [manual action](#whenmanual) via
GitLab's web interface in order to run.
O
Olivier Gonzalez 已提交
2126

2127 2128
Also in the example, `GIT_STRATEGY` is set to `none` so that GitLab Runner won’t
try to check out the code after the branch is deleted when the `stop_review_app`
2129
job is [automatically triggered](../environments/index.md#automatically-stopping-an-environment).
O
Olivier Gonzalez 已提交
2130

2131 2132 2133 2134
NOTE: **Note:**
The above example overwrites global variables. If your stop environment job depends
on global variables, you can use [anchor variables](#yaml-anchors-for-variables) when setting the `GIT_STRATEGY`
to change it without overriding the global variables.
O
Olivier Gonzalez 已提交
2135

2136
The `stop_review_app` job is **required** to have the following keywords defined:
O
Olivier Gonzalez 已提交
2137

2138 2139 2140 2141 2142
- `when` - [reference](#when)
- `environment:name`
- `environment:action`
- `stage` should be the same as the `review_app` in order for the environment
  to stop automatically when the branch is deleted
O
Olivier Gonzalez 已提交
2143

2144
#### `environment:auto_stop_in`
O
Olivier Gonzalez 已提交
2145

2146
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/20956) in GitLab 12.8.
O
Olivier Gonzalez 已提交
2147

2148 2149
The `auto_stop_in` keyword is for specifying life period of the environment,
that when expired, GitLab automatically stops them.
O
Olivier Gonzalez 已提交
2150

2151
For example,
O
Olivier Gonzalez 已提交
2152

2153 2154 2155 2156 2157 2158 2159
```yaml
review_app:
  script: deploy-review-app
  environment:
    name: review/$CI_COMMIT_REF_NAME
    auto_stop_in: 1 day
```
O
Olivier Gonzalez 已提交
2160

2161 2162
When `review_app` job is executed and a review app is created, a life period of
the environment is set to `1 day`.
O
Olivier Gonzalez 已提交
2163

2164
For more information, see
2165
[the environments auto-stop documentation](../environments/index.md#environments-auto-stop)
O
Olivier Gonzalez 已提交
2166

2167
#### `environment:kubernetes`
O
Olivier Gonzalez 已提交
2168

2169
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/27630) in GitLab 12.6.
O
Olivier Gonzalez 已提交
2170

2171 2172
The `kubernetes` block is used to configure deployments to a
[Kubernetes cluster](../../user/project/clusters/index.md) that is associated with your project.
O
Olivier Gonzalez 已提交
2173

2174
For example:
2175

2176 2177 2178 2179 2180 2181 2182 2183 2184
```yaml
deploy:
  stage: deploy
  script: make deploy-app
  environment:
    name: production
    kubernetes:
      namespace: production
```
O
Olivier Gonzalez 已提交
2185

2186 2187 2188
This will set up the `deploy` job to deploy to the `production`
environment, using the `production`
[Kubernetes namespace](https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/).
O
Olivier Gonzalez 已提交
2189

2190
For more information, see
2191
[Available settings for `kubernetes`](../environments/index.md#configuring-kubernetes-deployments).
O
Olivier Gonzalez 已提交
2192

2193 2194 2195 2196
NOTE: **Note:**
Kubernetes configuration is not supported for Kubernetes clusters
that are [managed by GitLab](../../user/project/clusters/index.md#gitlab-managed-clusters).
To follow progress on support for GitLab-managed clusters, see the
2197
[relevant issue](https://gitlab.com/gitlab-org/gitlab/-/issues/38054).
2198

2199
#### Dynamic environments
2200

2201 2202
> - [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/21971) in GitLab 8.12 and GitLab Runner 1.6.
> - The `$CI_ENVIRONMENT_SLUG` was [introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/22864) in GitLab 8.15.
2203 2204
> - The `name` and `url` parameters can use any of the defined CI variables,
>   including predefined, secure variables and `.gitlab-ci.yml` [`variables`](#variables).
2205
>   You however can't use variables defined under `script`.
2206

2207
For example:
2208

2209 2210 2211 2212 2213 2214 2215 2216
```yaml
deploy as review app:
  stage: deploy
  script: make deploy
  environment:
    name: review/$CI_COMMIT_REF_NAME
    url: https://$CI_ENVIRONMENT_SLUG.example.com/
```
O
Olivier Gonzalez 已提交
2217

2218 2219 2220 2221 2222 2223 2224
The `deploy as review app` job will be marked as deployment to dynamically
create the `review/$CI_COMMIT_REF_NAME` environment, where `$CI_COMMIT_REF_NAME`
is an [environment variable](../variables/README.md) set by the Runner. The
`$CI_ENVIRONMENT_SLUG` variable is based on the environment name, but suitable
for inclusion in URLs. In this case, if the `deploy as review app` job was run
in a branch named `pow`, this environment would be accessible with an URL like
`https://review-pow.example.com/`.
O
Olivier Gonzalez 已提交
2225

2226 2227
This of course implies that the underlying server which hosts the application
is properly configured.
O
Olivier Gonzalez 已提交
2228

2229 2230 2231
The common use case is to create dynamic environments for branches and use them
as Review Apps. You can see a simple example using Review Apps at
<https://gitlab.com/gitlab-examples/review-apps-nginx/>.
O
Olivier Gonzalez 已提交
2232

2233
### `cache`
M
Marcel Amirault 已提交
2234

2235 2236 2237 2238 2239
> - Introduced in GitLab Runner v0.7.0.
> - `cache` can be set globally and per-job.
> - From GitLab 9.0, caching is enabled and shared between pipelines and jobs
>   by default.
> - From GitLab 9.2, caches are restored before [artifacts](#artifacts).
2240

2241 2242 2243
TIP: **Learn more:**
Read how caching works and find out some good practices in the
[caching dependencies documentation](../caching/index.md).
M
Marcel Amirault 已提交
2244

2245 2246 2247
`cache` is used to specify a list of files and directories which should be
cached between jobs. You can only use paths that are within the local working
copy.
M
Marcel Amirault 已提交
2248

2249
If `cache` is defined outside the scope of jobs, it means it's set
2250
globally and all jobs will use that definition.
2251

2252
#### `cache:paths`
2253

2254
Use the `paths` directive to choose which files or directories will be cached. Paths
2255
are relative to the project directory (`$CI_PROJECT_DIR`) and can't directly link outside it.
2256
Wildcards can be used that follow the [glob](https://en.wikipedia.org/wiki/Glob_(programming))
2257 2258 2259 2260 2261 2262
patterns and:

- In [GitLab Runner 13.0](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/2620) and later,
[`doublestar.Glob`](https://pkg.go.dev/github.com/bmatcuk/doublestar@v1.2.2?tab=doc#Match).
- In GitLab Runner 12.10 and earlier,
[`filepath.Match`](https://pkg.go.dev/path/filepath/#Match).
2263

2264
Cache all files in `binaries` that end in `.apk` and the `.config` file:
2265

2266 2267 2268 2269 2270 2271 2272 2273
```yaml
rspec:
  script: test
  cache:
    paths:
      - binaries/*.apk
      - .config
```
2274

2275 2276
Locally defined cache overrides globally defined options. The following `rspec`
job will cache only `binaries/`:
2277

2278
```yaml
2279 2280 2281
cache:
  paths:
    - my/files
2282

2283 2284 2285 2286
rspec:
  script: test
  cache:
    key: rspec
2287
    paths:
P
pityonline 已提交
2288
      - binaries/
2289
```
2290

2291 2292 2293
Note that since cache is shared between jobs, if you're using different
paths for different jobs, you should also set a different **cache:key**
otherwise cache content can be overwritten.
2294

2295
#### `cache:key`
2296

2297
> Introduced in GitLab Runner v1.0.0.
2298

2299 2300 2301
Since the cache is shared between jobs, if you're using different
paths for different jobs, you should also set a different `cache:key`
otherwise cache content can be overwritten.
2302

2303 2304 2305 2306
The `key` directive allows you to define the affinity of caching between jobs,
allowing to have a single cache for all jobs, cache per-job, cache per-branch
or any other way that fits your workflow. This way, you can fine tune caching,
allowing you to cache data between different jobs or even different branches.
S
Shinya Maeda 已提交
2307

2308 2309 2310 2311
The `cache:key` variable can use any of the
[predefined variables](../variables/README.md), and the default key, if not
set, is just literal `default` which means everything is shared between
pipelines and jobs by default, starting from GitLab 9.0.
S
Shinya Maeda 已提交
2312

2313
NOTE: **Note:**
2314
The `cache:key` variable can't contain the `/` character, or the equivalent
2315
URI-encoded `%2F`; a value made only of dots (`.`, `%2E`) is also forbidden.
2316

2317
For example, to enable per-branch caching:
2318

2319 2320 2321 2322 2323 2324
```yaml
cache:
  key: "$CI_COMMIT_REF_SLUG"
  paths:
    - binaries/
```
2325

2326 2327
If you use **Windows Batch** to run your shell scripts you need to replace
`$` with `%`:
2328 2329

```yaml
2330 2331 2332 2333 2334
cache:
  key: "%CI_COMMIT_REF_SLUG%"
  paths:
    - binaries/
```
2335

2336
##### `cache:key:files`
2337

2338
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/18986) in GitLab v12.5.
2339

2340 2341 2342
The `cache:key:files` keyword extends the `cache:key` functionality by making it easier
to reuse some caches, and rebuild them less often, which will speed up subsequent pipeline
runs.
2343

2344 2345 2346 2347
When you include `cache:key:files`, you must also list the project files that will be used to generate the key, up to a maximum of two files.
The cache `key` will be a SHA checksum computed from the most recent commits (up to two, if two files are listed)
that changed the given files. If neither file was changed in any commits,
the fallback key will be `default`.
2348

2349 2350 2351 2352 2353 2354 2355 2356 2357 2358
```yaml
cache:
  key:
    files:
      - Gemfile.lock
      - package.json
  paths:
    - vendor/ruby
    - node_modules
```
2359

2360
In this example we're creating a cache for Ruby and Node.js dependencies that
2361 2362 2363 2364
is tied to current versions of the `Gemfile.lock` and `package.json` files. Whenever one of
these files changes, a new cache key is computed and a new cache is created. Any future
job runs using the same `Gemfile.lock` and `package.json`  with `cache:key:files` will
use the new cache, instead of rebuilding the dependencies.
2365

2366
##### `cache:key:prefix`
2367

2368
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/18986) in GitLab v12.5.
2369

2370 2371 2372 2373 2374
The `prefix` parameter adds extra functionality to `key:files` by allowing the key to
be composed of the given `prefix` combined with the SHA computed for `cache:key:files`.
For example, adding a `prefix` of `test`, will cause keys to look like: `test-feef9576d21ee9b6a32e30c5c79d0a0ceb68d1e5`.
If neither file was changed in any commits, the prefix is added to `default`, so the
key in the example would be `test-default`.
2375

2376 2377
Like `cache:key`, `prefix` can use any of the [predefined variables](../variables/README.md),
but the following are not allowed:
2378

2379 2380
- the `/` character (or the equivalent URI-encoded `%2F`)
- a value made only of `.` (or the equivalent URI-encoded `%2E`)
2381

2382 2383 2384 2385 2386 2387 2388 2389
```yaml
cache:
  key:
    files:
      - Gemfile.lock
    prefix: ${CI_JOB_NAME}
  paths:
    - vendor/ruby
2390

2391 2392 2393 2394
rspec:
  script:
    - bundle exec rspec
```
2395

2396 2397 2398 2399 2400 2401 2402
For example, adding a `prefix` of `$CI_JOB_NAME` will
cause the key to look like: `rspec-feef9576d21ee9b6a32e30c5c79d0a0ceb68d1e5` and
the job cache is shared across different branches. If a branch changes
`Gemfile.lock`, that branch will have a new SHA checksum for `cache:key:files`. A new cache key
will be generated, and a new cache will be created for that key.
If `Gemfile.lock` is not found, the prefix is added to
`default`, so the key in the example would be `rspec-default`.
2403

2404
#### `cache:untracked`
2405

2406 2407
Set `untracked: true` to cache all files that are untracked in your Git
repository:
2408

2409 2410 2411 2412 2413
```yaml
rspec:
  script: test
  cache:
    untracked: true
2414 2415
```

2416
Cache all Git untracked files and files in `binaries`:
2417

2418 2419 2420 2421 2422 2423 2424
```yaml
rspec:
  script: test
  cache:
    untracked: true
    paths:
      - binaries/
2425 2426
```

2427
#### `cache:policy`
2428

2429
> Introduced in GitLab 9.4.
2430

2431
The default behavior of a caching job is to download the files at the start of
2432 2433 2434
execution, and to re-upload them at the end. This allows any changes made by the
job to be persisted for future runs, and is known as the `pull-push` cache
policy.
2435

2436
If you know the job does not alter the cached files, you can skip the upload step
2437 2438 2439
by setting `policy: pull` in the job specification. Typically, this would be
twinned with an ordinary cache job at an earlier stage to ensure the cache
is updated from time to time:
2440 2441

```yaml
2442 2443 2444 2445 2446 2447 2448 2449
stages:
  - setup
  - test

prepare:
  stage: setup
  cache:
    key: gems
2450
    paths:
2451 2452 2453
      - vendor/bundle
  script:
    - bundle install --deployment
2454 2455 2456

rspec:
  stage: test
2457 2458 2459 2460 2461 2462 2463
  cache:
    key: gems
    paths:
      - vendor/bundle
    policy: pull
  script:
    - bundle exec rspec ...
2464 2465
```

2466 2467 2468
This helps to speed up job execution and reduce load on the cache server,
especially when you have a large number of cache-using jobs executing in
parallel.
2469

2470 2471 2472
Additionally, if you have a job that unconditionally recreates the cache without
reference to its previous contents, you can use `policy: push` in that job to
skip the download step.
2473

2474
### `artifacts`
2475

2476 2477 2478 2479 2480
> - Introduced in GitLab Runner v0.7.0 for non-Windows platforms.
> - Windows support was added in GitLab Runner v.1.0.0.
> - From GitLab 9.2, caches are restored before artifacts.
> - Not all executors are [supported](https://docs.gitlab.com/runner/executors/#compatibility-chart).
> - Job artifacts are only collected for successful jobs by default.
2481

2482 2483
`artifacts` is used to specify a list of files and directories which should be
attached to the job when it [succeeds, fails, or always](#artifactswhen).
2484

2485 2486
The artifacts will be sent to GitLab after the job finishes and will
be available for download in the GitLab UI.
2487

2488
[Read more about artifacts](../pipelines/job_artifacts.md).
2489

2490
#### `artifacts:paths`
2491

2492
Paths are relative to the project directory (`$CI_PROJECT_DIR`) and can't directly
2493 2494 2495 2496 2497 2498
link outside it. Wildcards can be used that follow the [glob](https://en.wikipedia.org/wiki/Glob_(programming))
patterns and [`filepath.Match`](https://golang.org/pkg/path/filepath/#Match).

To restrict which jobs a specific job will fetch artifacts from, see [dependencies](#dependencies).

Send all files in `binaries` and `.config`:
2499 2500

```yaml
2501 2502 2503 2504
artifacts:
  paths:
    - binaries/
    - .config
2505 2506
```

2507
To disable artifact passing, define the job with empty [dependencies](#dependencies):
2508

2509 2510 2511 2512 2513 2514
```yaml
job:
  stage: build
  script: make build
  dependencies: []
```
2515

2516 2517
You may want to create artifacts only for tagged releases to avoid filling the
build server storage with temporary build artifacts.
2518

2519
Create artifacts only for tags (`default-job` won't create artifacts):
2520

2521 2522 2523 2524 2525 2526
```yaml
default-job:
  script:
    - mvn test -U
  except:
    - tags
2527

2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538
release-job:
  script:
    - mvn package -U
  artifacts:
    paths:
      - target/*.war
  only:
    - tags
```

You can use wildcards for directories too. For example, if you want to get all the files inside the directories that end with `xyz`:
2539 2540

```yaml
2541 2542 2543 2544
job:
  artifacts:
    paths:
      - path/*xyz/*
2545 2546
```

2547
#### `artifacts:expose_as`
2548

2549
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/15018) in GitLab 12.5.
2550

2551 2552
The `expose_as` keyword can be used to expose [job artifacts](../pipelines/job_artifacts.md)
in the [merge request](../../user/project/merge_requests/index.md) UI.
2553

2554
For example, to match a single file:
2555

2556
```yaml
2557 2558 2559 2560 2561 2562
test:
  script: [ 'echo 1' ]
  artifacts:
    expose_as: 'artifact 1'
    paths: ['path/to/file.txt']
```
2563

2564 2565
With this configuration, GitLab will add a link **artifact 1** to the relevant merge request
that points to `file1.txt`.
2566

2567 2568
An example that will match an entire directory:

2569
```yaml
2570
test:
2571 2572 2573 2574
  script: [ 'echo 1' ]
  artifacts:
    expose_as: 'artifact 1'
    paths: ['path/to/directory/']
2575 2576
```

2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599
Note the following:

- A maximum of 10 job artifacts per merge request can be exposed.
- Glob patterns are unsupported.
- If a directory is specified, the link will be to the job [artifacts browser](../pipelines/job_artifacts.md#browsing-artifacts) if there is more than
  one file in the directory.
- For exposed single file artifacts with `.html`, `.htm`, `.txt`, `.json`, `.xml`,
  and `.log` extensions, if [GitLab Pages](../../administration/pages/index.md) is:
  - Enabled, GitLab will automatically render the artifact.
  - Not enabled, you will see the file in the artifacts browser.

#### `artifacts:name`

> Introduced in GitLab 8.6 and GitLab Runner v1.1.0.

The `name` directive allows you to define the name of the created artifacts
archive. That way, you can have a unique name for every archive which could be
useful when you'd like to download the archive from GitLab. The `artifacts:name`
variable can make use of any of the [predefined variables](../variables/README.md).
The default name is `artifacts`, which becomes `artifacts.zip` when downloaded.

NOTE: **Note:**
If your branch-name contains forward slashes
2600
(for example `feature/my-feature`) it's advised to use `$CI_COMMIT_REF_SLUG`
2601 2602 2603
instead of `$CI_COMMIT_REF_NAME` for proper naming of the artifact.

To create an archive with a name of the current job:
M
Markus Doits 已提交
2604

2605 2606 2607 2608 2609 2610 2611
```yaml
job:
  artifacts:
    name: "$CI_JOB_NAME"
    paths:
      - binaries/
```
2612

2613 2614
To create an archive with a name of the current branch or tag including only
the binaries directory:
2615 2616

```yaml
2617 2618 2619 2620 2621
job:
  artifacts:
    name: "$CI_COMMIT_REF_NAME"
    paths:
      - binaries/
2622 2623
```

2624 2625
To create an archive with a name of the current job and the current branch or
tag including only the binaries directory:
2626 2627

```yaml
2628 2629 2630 2631 2632
job:
  artifacts:
    name: "$CI_JOB_NAME-$CI_COMMIT_REF_NAME"
    paths:
      - binaries/
2633 2634
```

2635
To create an archive with a name of the current [stage](#stages) and branch name:
2636

2637 2638 2639 2640 2641 2642 2643
```yaml
job:
  artifacts:
    name: "$CI_JOB_STAGE-$CI_COMMIT_REF_NAME"
    paths:
      - binaries/
```
2644

2645
---
2646

2647 2648
If you use **Windows Batch** to run your shell scripts you need to replace
`$` with `%`:
2649

2650 2651 2652 2653 2654 2655 2656
```yaml
job:
  artifacts:
    name: "%CI_JOB_STAGE%-%CI_COMMIT_REF_NAME%"
    paths:
      - binaries/
```
2657

2658 2659
If you use **Windows PowerShell** to run your shell scripts you need to replace
`$` with `$env:`:
2660 2661

```yaml
2662 2663 2664 2665 2666
job:
  artifacts:
    name: "$env:CI_JOB_STAGE-$env:CI_COMMIT_REF_NAME"
    paths:
      - binaries/
2667 2668
```

2669
#### `artifacts:untracked`
M
Matija Čupić 已提交
2670

2671 2672
`artifacts:untracked` is used to add all Git untracked files as artifacts (along
to the paths defined in `artifacts:paths`).
M
Matija Čupić 已提交
2673

2674 2675
NOTE: **Note:**
`artifacts:untracked` ignores configuration in the repository's `.gitignore` file.
M
Matija Čupić 已提交
2676

2677
Send all Git untracked files:
M
Matija Čupić 已提交
2678

2679 2680 2681 2682
```yaml
artifacts:
  untracked: true
```
M
Matija Čupić 已提交
2683

2684
Send all Git untracked files and files in `binaries`:
M
Matija Čupić 已提交
2685

2686
```yaml
2687 2688 2689 2690
artifacts:
  untracked: true
  paths:
    - binaries/
M
Matija Čupić 已提交
2691
```
2692

2693
#### `artifacts:when`
2694

2695
> Introduced in GitLab 8.9 and GitLab Runner v1.3.0.
2696

2697 2698
`artifacts:when` is used to upload artifacts on job failure or despite the
failure.
2699

2700
`artifacts:when` can be set to one of the following values:
2701

2702 2703 2704
1. `on_success` - upload artifacts only when the job succeeds. This is the default.
1. `on_failure` - upload artifacts only when the job fails.
1. `always` - upload artifacts regardless of the job status.
2705

2706
To upload artifacts only when job fails:
2707

2708 2709 2710 2711 2712
```yaml
job:
  artifacts:
    when: on_failure
```
2713

2714
#### `artifacts:expire_in`
E
Evan Read 已提交
2715

2716
> Introduced in GitLab 8.9 and GitLab Runner v1.3.0.
E
Evan Read 已提交
2717

2718 2719 2720 2721 2722
`expire_in` allows you to specify how long artifacts should live before they
expire and are therefore deleted, counting from the time they are uploaded and
stored on GitLab. If the expiry time is not defined, it defaults to the
[instance wide setting](../../user/admin_area/settings/continuous_integration.md#default-artifacts-expiration-core-only)
(30 days by default, forever on GitLab.com).
E
Evan Read 已提交
2723

2724 2725
You can use the **Keep** button on the job page to override expiration and
keep artifacts forever.
2726

2727 2728
After their expiry, artifacts are deleted hourly by default (via a cron job),
and are not accessible anymore.
E
Evan Read 已提交
2729

2730
The value of `expire_in` is an elapsed time in seconds, unless a unit is
2731
provided. Examples of valid values:
2732

2733 2734 2735 2736 2737 2738 2739
- `42`
- `3 mins 4 sec`
- `2 hrs 20 min`
- `2h20min`
- `6 mos 1 day`
- `47 yrs 6 mos and 4d`
- `3 weeks and 2 days`
E
Evan Read 已提交
2740

2741
To expire artifacts 1 week after being uploaded:
E
Evan Read 已提交
2742 2743

```yaml
2744 2745 2746
job:
  artifacts:
    expire_in: 1 week
E
Evan Read 已提交
2747 2748
```

2749 2750 2751 2752
NOTE: **Note:**
For artifacts created in [GitLab 13.0](https://gitlab.com/gitlab-org/gitlab/-/issues/16267)
and later, the latest artifact for a ref is always kept, regardless of the expiry time.

2753
#### `artifacts:reports`
E
Evan Read 已提交
2754

2755 2756
The [`artifacts:reports` keyword](../pipelines/job_artifacts.md#artifactsreports)
is used for collecting test reports, code quality reports, and security reports from jobs.
2757
It also exposes these reports in GitLab's UI (merge requests, pipeline views, and security dashboards).
2758

2759 2760 2761 2762 2763 2764 2765 2766 2767 2768 2769 2770 2771
These are the available report types:

| Parameter                                                                                                                            | Description |
|--------------------------------------------------------------------------------------------------------------------------------------|-------------|
| [`artifacts:reports:junit`](../pipelines/job_artifacts.md#artifactsreportsjunit)                                                     | The `junit` report collects JUnit XML files.                                     |
| [`artifacts:reports:dotenv`](../pipelines/job_artifacts.md#artifactsreportsdotenv)                                                   | The `dotenv` report collects a set of environment variables.                     |
| [`artifacts:reports:cobertura`](../pipelines/job_artifacts.md#artifactsreportscobertura)                                             | The `cobertura` report collects Cobertura coverage XML files.                    |
| [`artifacts:reports:terraform`](../pipelines/job_artifacts.md#artifactsreportsterraform)                                             | The `terraform` report collects Terraform `tfplan.json` files.                   |
| [`artifacts:reports:codequality`](../pipelines/job_artifacts.md#artifactsreportscodequality-starter) **(STARTER)**                   | The `codequality` report collects CodeQuality issues.                            |
| [`artifacts:reports:sast`](../pipelines/job_artifacts.md#artifactsreportssast-ultimate) **(ULTIMATE)**                               | The `sast` report collects Static Application Security Testing vulnerabilities.  |
| [`artifacts:reports:dependency_scanning`](../pipelines/job_artifacts.md#artifactsreportsdependency_scanning-ultimate) **(ULTIMATE)** | The `dependency_scanning` report collects Dependency Scanning vulnerabilities.   |
| [`artifacts:reports:container_scanning`](../pipelines/job_artifacts.md#artifactsreportscontainer_scanning-ultimate) **(ULTIMATE)**   | The `container_scanning` report collects Container Scanning vulnerabilities.     |
| [`artifacts:reports:dast`](../pipelines/job_artifacts.md#artifactsreportsdast-ultimate) **(ULTIMATE)**                               | The `dast` report collects Dynamic Application Security Testing vulnerabilities. |
2772
| [`artifacts:reports:license_management`](../pipelines/job_artifacts.md#artifactsreportslicense_management-ultimate) **(ULTIMATE)**   | The `license_management` report collects Licenses (*removed from GitLab 13.0*).  |
2773 2774 2775
| [`artifacts:reports:license_scanning`](../pipelines/job_artifacts.md#artifactsreportslicense_scanning-ultimate) **(ULTIMATE)**       | The `license_scanning` report collects Licenses.                                 |
| [`artifacts:reports:performance`](../pipelines/job_artifacts.md#artifactsreportsperformance-premium) **(PREMIUM)**                   | The `performance` report collects Performance metrics.                           |
| [`artifacts:reports:metrics`](../pipelines/job_artifacts.md#artifactsreportsmetrics-premium) **(PREMIUM)**                           | The `metrics` report collects Metrics.                                           |
E
Evan Read 已提交
2776

2777
#### `dependencies`
2778

2779
> Introduced in GitLab 8.6 and GitLab Runner v1.1.1.
2780

2781 2782 2783
By default, all [`artifacts`](#artifacts) from all previous [stages](#stages)
are passed, but you can use the `dependencies` parameter to define a limited
list of jobs (or no jobs) to fetch artifacts from.
2784

2785 2786 2787 2788 2789 2790
To use this feature, define `dependencies` in context of the job and pass
a list of all previous jobs from which the artifacts should be downloaded.
You can only define jobs from stages that are executed before the current one.
An error will be shown if you define jobs from the current stage or next ones.
Defining an empty array will skip downloading any artifacts for that job.
The status of the previous job is not considered when using `dependencies`, so
2791
if it failed or it's a manual job that was not run, no error occurs.
2792

2793 2794 2795 2796
In the following example, we define two jobs with artifacts, `build:osx` and
`build:linux`. When the `test:osx` is executed, the artifacts from `build:osx`
will be downloaded and extracted in the context of the build. The same happens
for `test:linux` and artifacts from `build:linux`.
2797

2798 2799
The job `deploy` will download artifacts from all previous jobs because of
the [stage](#stages) precedence:
K
Kamil Trzciński 已提交
2800

2801
```yaml
2802 2803 2804 2805 2806 2807
build:osx:
  stage: build
  script: make build:osx
  artifacts:
    paths:
      - binaries/
K
Kamil Trzciński 已提交
2808

2809 2810 2811 2812 2813 2814
build:linux:
  stage: build
  script: make build:linux
  artifacts:
    paths:
      - binaries/
2815

2816 2817 2818 2819 2820
test:osx:
  stage: test
  script: make test:osx
  dependencies:
    - build:osx
2821

2822 2823 2824 2825 2826
test:linux:
  stage: test
  script: make test:linux
  dependencies:
    - build:linux
2827

2828 2829 2830
deploy:
  stage: deploy
  script: make deploy
2831 2832
```

2833
##### When a dependent job will fail
K
Kamil Trzciński 已提交
2834

2835
> Introduced in GitLab 10.3.
2836

2837 2838 2839 2840
If the artifacts of the job that is set as a dependency have been
[expired](#artifactsexpire_in) or
[erased](../pipelines/job_artifacts.md#erasing-artifacts), then
the dependent job will fail.
2841

2842 2843 2844 2845
NOTE: **Note:**
You can ask your administrator to
[flip this switch](../../administration/job_artifacts.md#validation-for-dependencies)
and bring back the old behavior.
K
Kamil Trzciński 已提交
2846

2847
### `coverage`
2848

2849
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/20428) in GitLab 8.17.
2850

2851 2852
`coverage` allows you to configure how code coverage will be extracted from the
job output.
2853

2854 2855 2856 2857
Regular expressions are the only valid kind of value expected here. So, using
surrounding `/` is mandatory in order to consistently and explicitly represent
a regular expression string. You must escape special characters if you want to
match them literally.
2858

2859
A simple example:
K
Kamil Trzciński 已提交
2860

2861
```yaml
2862 2863 2864
job1:
  script: rspec
  coverage: '/Code coverage: \d+\.\d+/'
K
Kamil Trzciński 已提交
2865 2866
```

2867
### `retry`
2868

2869 2870
> - [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/3442) in GitLab 9.5.
> - [Behavior expanded](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/3515) in GitLab 11.5 to control on which failures to retry.
2871

2872 2873
`retry` allows you to configure how many times a job is going to be retried in
case of a failure.
2874

2875
When a job fails and has `retry` configured, it's going to be processed again
2876
up to the amount of times specified by the `retry` keyword.
2877

2878 2879 2880 2881 2882
If `retry` is set to 2, and a job succeeds in a second run (first retry), it won't be retried
again. `retry` value has to be a positive integer, equal or larger than 0, but
lower or equal to 2 (two retries maximum, three runs in total).

A simple example to retry in all failure cases:
2883

2884
```yaml
2885 2886 2887
test:
  script: rspec
  retry: 2
2888
```
2889

2890 2891
By default, a job will be retried on all failure cases. To have a better control
on which failures to retry, `retry` can be a hash with the following keys:
2892

2893 2894
- `max`: The maximum number of retries.
- `when`: The failure cases to retry.
2895

2896
To retry only runner system failures at maximum two times:
2897

2898 2899 2900 2901 2902 2903 2904
```yaml
test:
  script: rspec
  retry:
    max: 2
    when: runner_system_failure
```
2905

2906 2907
If there is another failure, other than a runner system failure, the job will
not be retried.
2908

2909
To retry on multiple failure cases, `when` can also be an array of failures:
2910

2911 2912 2913 2914 2915 2916 2917 2918 2919
```yaml
test:
  script: rspec
  retry:
    max: 2
    when:
      - runner_system_failure
      - stuck_or_timeout_failure
```
K
Kamil Trzciński 已提交
2920

2921
Possible values for `when` are:
K
Kamil Trzciński 已提交
2922

2923 2924 2925 2926
<!--
  Please make sure to update `RETRY_WHEN_IN_DOCUMENTATION` array in
  `spec/lib/gitlab/ci/config/entry/retry_spec.rb` if you change any of
  the documented values below. The test there makes sure that all documented
2927
  values are really valid as a configuration option and therefore should always
2928 2929
  stay in sync with this documentation.
 -->
2930

2931 2932 2933 2934 2935
- `always`: Retry on any failure (default).
- `unknown_failure`: Retry when the failure reason is unknown.
- `script_failure`: Retry when the script failed.
- `api_failure`: Retry on API failure.
- `stuck_or_timeout_failure`: Retry when the job got stuck or timed out.
2936
- `runner_system_failure`: Retry if there was a runner system failure (for example, job setup failed).
2937 2938 2939 2940
- `missing_dependency_failure`: Retry if a dependency was missing.
- `runner_unsupported`: Retry if the runner was unsupported.
- `stale_schedule`: Retry if a delayed job could not be executed.
- `job_execution_timeout`: Retry if the script exceeded the maximum execution time set for the job.
2941
- `archived_failure`: Retry if the job is archived and can't be run.
2942 2943 2944
- `unmet_prerequisites`: Retry if the job failed to complete prerequisite tasks.
- `scheduler_failure`: Retry if the scheduler failed to assign the job to a runner.
- `data_integrity_failure`: Retry if there was a structural integrity problem detected.
2945

2946 2947
You can specify the number of [retry attempts for certain stages of job execution](#job-stages-attempts) using variables.

2948
### `timeout`
2949

2950
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/14887) in GitLab 12.3.
2951

2952
`timeout` allows you to configure a timeout for a specific job. For example:
2953

2954
```yaml
2955 2956 2957 2958 2959 2960 2961
build:
  script: build.sh
  timeout: 3 hours 30 minutes

test:
  script: rspec
  timeout: 3h 30m
2962 2963
```

2964
The job-level timeout can exceed the
2965
[project-level timeout](../pipelines/settings.md#timeout) but can't
2966
exceed the Runner-specific timeout.
2967

2968
### `parallel`
2969

2970
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/21480) in GitLab 11.5.
2971

2972 2973
`parallel` allows you to configure how many instances of a job to run in
parallel. This value has to be greater than or equal to two (2) and less than or equal to 50.
2974

2975
This creates N instances of the same job that run in parallel. They are named
2976
sequentially from `job_name 1/N` to `job_name N/N`.
2977

2978
For every job, `CI_NODE_INDEX` and `CI_NODE_TOTAL` [environment variables](../variables/README.md#predefined-environment-variables) are set.
K
Kamil Trzciński 已提交
2979

2980 2981
Marking a job to be run in parallel requires adding `parallel` to your configuration
file. For example:
K
Kamil Trzciński 已提交
2982

2983
```yaml
2984 2985 2986
test:
  script: rspec
  parallel: 5
2987
```
2988

2989 2990 2991
TIP: **Tip:**
Parallelize tests suites across parallel jobs.
Different languages have different tools to facilitate this.
K
Kamil Trzciński 已提交
2992

2993
A simple example using [Semaphore Test Boosters](https://github.com/renderedtext/test-boosters) and RSpec to run some Ruby tests:
K
Kamil Trzciński 已提交
2994

2995 2996 2997
```ruby
# Gemfile
source 'https://rubygems.org'
K
Kamil Trzciński 已提交
2998

2999 3000 3001
gem 'rspec'
gem 'semaphore_test_boosters'
```
3002

3003
```yaml
3004 3005
test:
  parallel: 3
3006
  script:
3007 3008
    - bundle
    - bundle exec rspec_booster --job $CI_NODE_INDEX/$CI_NODE_TOTAL
3009
```
3010

3011 3012
CAUTION: **Caution:**
Please be aware that semaphore_test_boosters reports usages statistics to the author.
3013

3014 3015
You can then navigate to the **Jobs** tab of a new pipeline build and see your RSpec
job split into three separate jobs.
3016

3017
### `trigger`
3018

3019 3020
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/8997) in [GitLab Premium](https://about.gitlab.com/pricing/) 11.8.
> - [Moved](https://gitlab.com/gitlab-org/gitlab/-/issues/199224) to GitLab Core in 12.8.
3021

3022 3023 3024
`trigger` allows you to define downstream pipeline trigger. When a job created
from `trigger` definition is started by GitLab, a downstream pipeline gets
created.
3025

3026
This keyword allows the creation of two different types of downstream pipelines:
3027

3028 3029
- [Multi-project pipelines](../multi_project_pipelines.md#creating-multi-project-pipelines-from-gitlab-ciyml)
- [Child pipelines](../parent_child_pipelines.md)
3030

3031 3032 3033 3034
NOTE: **Note:**
Using a `trigger` with `when:manual` together results in the error `jobs:#{job-name}
when should be on_success, on_failure or always`, because `when:manual` prevents
triggers being used.
3035

3036
#### Simple `trigger` syntax for multi-project pipelines
3037

3038 3039
The simplest way to configure a downstream trigger is to use `trigger` keyword
with a full path to a downstream project:
3040

3041 3042 3043 3044
```yaml
rspec:
  stage: test
  script: bundle exec rspec
3045

3046 3047 3048 3049
staging:
  stage: deploy
  trigger: my/deployment
```
3050

3051
#### Complex `trigger` syntax for multi-project pipelines
3052

3053
It's possible to configure a branch name that GitLab will use to create
3054
a downstream pipeline with:
3055

3056
```yaml
3057 3058 3059 3060 3061 3062 3063 3064 3065
rspec:
  stage: test
  script: bundle exec rspec

staging:
  stage: deploy
  trigger:
    project: my/deployment
    branch: stable
3066 3067
```

3068
It's possible to mirror the status from a triggered pipeline:
3069

3070
```yaml
3071 3072 3073 3074 3075
trigger_job:
  trigger:
    project: my/project
    strategy: depend
```
3076

3077
It's possible to mirror the status from an upstream pipeline:
3078

3079 3080 3081 3082 3083
```yaml
upstream_bridge:
  stage: test
  needs:
    pipeline: other/project
3084 3085
```

3086
#### `trigger` syntax for child pipeline
3087

3088
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/16094) in GitLab 12.7.
3089

3090 3091
To create a [child pipeline](../parent_child_pipelines.md), specify the path to the
YAML file containing the CI config of the child pipeline:
3092 3093

```yaml
3094 3095 3096
trigger_job:
  trigger:
    include: path/to/child-pipeline.yml
3097 3098
```

3099
Similar to [multi-project pipelines](../multi_project_pipelines.md#mirroring-status-from-triggered-pipeline),
3100
it's possible to mirror the status from a triggered pipeline:
3101 3102

```yaml
3103 3104 3105 3106 3107
trigger_job:
  trigger:
    include:
      - local: path/to/child-pipeline.yml
    strategy: depend
3108 3109
```

3110
##### Trigger child pipeline with generated configuration file
3111

3112
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/35632) in GitLab 12.9.
3113

3114
You can also trigger a child pipeline from a [dynamically generated configuration file](../parent_child_pipelines.md#dynamic-child-pipelines):
3115 3116

```yaml
3117 3118 3119 3120 3121 3122 3123 3124 3125 3126 3127 3128 3129
generate-config:
  stage: build
  script: generate-ci-config > generated-config.yml
  artifacts:
    paths:
      - generated-config.yml

child-pipeline:
  stage: test
  trigger:
    include:
      - artifact: generated-config.yml
        job: generate-config
3130 3131
```

3132 3133 3134 3135 3136 3137 3138 3139 3140 3141 3142 3143
The `generated-config.yml` is extracted from the artifacts and used as the configuration
for triggering the child pipeline.

#### Linking pipelines with `trigger:strategy`

By default, the `trigger` job completes with the `success` status
as soon as the downstream pipeline is created.

To force the `trigger` job to wait for the downstream (multi-project or child) pipeline to complete, use
`strategy: depend`. This will make the trigger job wait with a "running" status until the triggered
pipeline completes. At that point, the `trigger` job will complete and display the same status as
the downstream job.
3144 3145

```yaml
3146 3147 3148 3149
trigger_job:
  trigger:
    include: path/to/child-pipeline.yml
    strategy: depend
3150 3151
```

3152 3153 3154
This can help keep your pipeline execution linear. In the example above, jobs from
subsequent stages will wait for the triggered pipeline to successfully complete before
starting, at the cost of reduced parallelization.
3155

3156
#### Trigger a pipeline by API call
3157

3158 3159
Triggers can be used to force a rebuild of a specific branch, tag or commit,
with an API call when a pipeline gets created using a trigger token.
3160

3161
Not to be confused with the [`trigger`](#trigger) parameter.
3162

3163
[Read more in the triggers documentation.](../triggers/README.md)
3164

3165
### `interruptible`
3166

3167
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/32022) in GitLab 12.3.
3168

3169 3170 3171
`interruptible` is used to indicate that a job should be canceled if made redundant by a newer pipeline run. Defaults to `false`.
This value will only be used if the [automatic cancellation of redundant pipelines feature](../pipelines/settings.md#auto-cancel-pending-pipelines)
is enabled.
3172

3173
When enabled, a pipeline on the same branch will be canceled when:
3174

3175 3176
- it's made redundant by a newer pipeline run.
- Either all jobs are set as interruptible, or any uninterruptible jobs haven't started.
3177

3178
Pending jobs are always considered interruptible.
3179

3180 3181
TIP: **Tip:**
Set jobs as interruptible that can be safely canceled once started (for instance, a build job).
3182

3183
Here is a simple example:
3184 3185

```yaml
3186 3187 3188 3189
stages:
  - stage1
  - stage2
  - stage3
3190

3191 3192 3193 3194 3195
step-1:
  stage: stage1
  script:
    - echo "Can be canceled."
  interruptible: true
3196

3197 3198 3199 3200
step-2:
  stage: stage2
  script:
    - echo "Can not be canceled."
3201

3202 3203 3204 3205 3206
step-3:
  stage: stage3
  script:
    - echo "Because step-2 can not be canceled, this step will never be canceled, even though set as interruptible."
  interruptible: true
3207 3208
```

3209
In the example above, a new pipeline run will cause an existing running pipeline to be:
W
Wolphin 已提交
3210

3211 3212
- Canceled, if only `step-1` is running or pending.
- Not canceled, once `step-2` starts running.
W
Wolphin 已提交
3213

3214 3215
NOTE: **Note:**
Once an uninterruptible job is running, the pipeline will never be canceled, regardless of the final job's state.
W
Wolphin 已提交
3216

3217
### `resource_group`
W
Wolphin 已提交
3218

3219
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/15536) in GitLab 12.7.
W
Wolphin 已提交
3220

3221 3222
Sometimes running multiples jobs or pipelines at the same time in an environment
can lead to errors during the deployment.
W
Wolphin 已提交
3223

3224
To avoid these errors, the `resource_group` attribute can be used to ensure that
3225
the Runner won't run certain jobs simultaneously.
3226

3227 3228 3229 3230 3231
When the `resource_group` key is defined for a job in `.gitlab-ci.yml`,
job executions are mutually exclusive across different pipelines for the same project.
If multiple jobs belonging to the same resource group are enqueued simultaneously,
only one of the jobs will be picked by the Runner, and the other jobs will wait until the
`resource_group` is free.
3232

3233
Here is a simple example:
3234 3235

```yaml
3236 3237 3238
deploy-to-production:
  script: deploy
  resource_group: production
3239 3240
```

3241
In this case, if a `deploy-to-production` job is running in a pipeline, and a new
3242
`deploy-to-production` job is created in a different pipeline, it won't run until
3243 3244
the currently running/pending `deploy-to-production` job is finished. As a result,
you can ensure that concurrent deployments will never happen to the production environment.
3245

3246 3247 3248
There can be multiple `resource_group`s defined per environment. A good use case for this
is when deploying to physical devices. You may have more than one physical device, and each
one can be deployed to, but there can be only one deployment per device at any given time.
3249

3250
NOTE: **Note:**
3251 3252
This key can only contain letters, digits, `-`, `_`, `/`, `$`, `{`, `}`, `.`, and spaces.
It can't start or end with `/`.
3253

E
Evan Read 已提交
3254
### `pages`
3255 3256 3257 3258 3259 3260 3261 3262 3263

`pages` is a special job that is used to upload static content to GitLab that
can be used to serve your website. It has a special syntax, so the two
requirements below must be met:

- Any static content must be placed under a `public/` directory.
- `artifacts` with a path to the `public/` directory must be defined.

The example below simply moves all files from the root of the project to the
3264
`public/` directory. The `.public` workaround is so `cp` does not also copy
3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281
`public/` to itself in an infinite loop:

```yaml
pages:
  stage: deploy
  script:
    - mkdir .public
    - cp -r * .public
    - mv .public public
  artifacts:
    paths:
      - public
  only:
    - master
```

Read more on [GitLab Pages user documentation](../../user/project/pages/index.md).
3282

3283
## `variables`
3284 3285 3286 3287 3288

> Introduced in GitLab Runner v0.5.0.

NOTE: **Note:**
Integers (as well as strings) are legal both for variable's name and value.
3289
Floats are not legal and can't be used.
3290 3291 3292

GitLab CI/CD allows you to define variables inside `.gitlab-ci.yml` that are
then passed in the job environment. They can be set globally and per-job.
3293 3294
When the `variables` keyword is used on a job level, it will override the global
YAML variables and predefined ones of the same name.
3295 3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306 3307 3308

They are stored in the Git repository and are meant to store non-sensitive
project configuration, for example:

```yaml
variables:
  DATABASE_URL: "postgres://postgres@postgres/my_database"
```

These variables can be later used in all executed commands and scripts.
The YAML-defined variables are also set to all created service containers,
thus allowing to fine tune them.

Except for the user defined variables, there are also the ones [set up by the
E
Evan Read 已提交
3309
Runner itself](../variables/README.md#predefined-environment-variables).
3310 3311 3312
One example would be `CI_COMMIT_REF_NAME` which has the value of
the branch or tag name for which project is built. Apart from the variables
you can set in `.gitlab-ci.yml`, there are also the so called
3313
[Variables](../variables/README.md#gitlab-cicd-environment-variables)
3314 3315
which can be set in GitLab's UI.

3316
[YAML anchors for variables](#yaml-anchors-for-variables) are available.
3317

3318
Learn more about [variables and their priority](../variables/README.md).
3319

3320
### Git strategy
M
Mark Pundsack 已提交
3321

3322 3323 3324 3325 3326
> - Introduced in GitLab 8.9 as an experimental feature.
> - `GIT_STRATEGY=none` requires GitLab Runner v1.7+.

CAUTION: **Caution:**
May change or be removed completely in future releases.
N
Nick Thomas 已提交
3327 3328

You can set the `GIT_STRATEGY` used for getting recent application code, either
3329 3330
globally or per-job in the [`variables`](#variables) section. If left
unspecified, the default from project settings will be used.
M
Mark Pundsack 已提交
3331

N
Nick Thomas 已提交
3332 3333 3334
There are three possible values: `clone`, `fetch`, and `none`.

`clone` is the slowest option. It clones the repository from scratch for every
3335
job, ensuring that the local working copy is always pristine.
M
Mark Pundsack 已提交
3336

3337
```yaml
M
Mark Pundsack 已提交
3338 3339 3340 3341
variables:
  GIT_STRATEGY: clone
```

3342
`fetch` is faster as it re-uses the local working copy (falling back to `clone`
3343
if it does not exist). `git clean` is used to undo any changes made by the last
N
Nick Thomas 已提交
3344
job, and `git fetch` is used to retrieve commits made since the last job ran.
M
Mark Pundsack 已提交
3345

3346
```yaml
M
Mark Pundsack 已提交
3347 3348 3349 3350
variables:
  GIT_STRATEGY: fetch
```

3351
`none` also re-uses the local working copy, but skips all Git operations
3352 3353 3354
(including GitLab Runner's pre-clone script, if present). It's mostly useful
for jobs that operate exclusively on artifacts (for examples `deploy`). Git repository
data may be present, but it's certain to be out of date, so you should only
3355
rely on files brought into the local working copy from cache or artifacts.
N
Nick Thomas 已提交
3356

3357
```yaml
N
Nick Thomas 已提交
3358 3359 3360 3361
variables:
  GIT_STRATEGY: none
```

3362
NOTE: **Note:** `GIT_STRATEGY` is not supported for
E
Evan Read 已提交
3363
[Kubernetes executor](https://docs.gitlab.com/runner/executors/kubernetes.html),
3364
but may be in the future. See the [support Git strategy with Kubernetes executor feature proposal](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/3847)
3365 3366
for updates.

3367
### Git submodule strategy
3368 3369 3370 3371

> Requires GitLab Runner v1.10+.

The `GIT_SUBMODULE_STRATEGY` variable is used to control if / how Git
3372 3373
submodules are included when fetching the code before a build. You can set them
globally or per-job in the [`variables`](#variables) section.
3374

3375
There are three possible values: `none`, `normal`, and `recursive`:
3376

3377
- `none` means that submodules won't be included when fetching the project
3378 3379
  code. This is the default, which matches the pre-v1.10 behavior.

3380
- `normal` means that only the top-level submodules will be included. It's
3381
  equivalent to:
3382

3383
  ```shell
M
Marcel Amirault 已提交
3384 3385 3386
  git submodule sync
  git submodule update --init
  ```
3387 3388

- `recursive` means that all submodules (including submodules of submodules)
3389 3390
  will be included. This feature needs Git v1.8.1 and later. When using a
  GitLab Runner with an executor not based on Docker, make sure the Git version
3391
  meets that requirement. It's equivalent to:
3392

3393
  ```shell
M
Marcel Amirault 已提交
3394 3395 3396
  git submodule sync --recursive
  git submodule update --init --recursive
  ```
3397 3398 3399

Note that for this feature to work correctly, the submodules must be configured
(in `.gitmodules`) with either:
3400

3401 3402 3403 3404
- the HTTP(S) URL of a publicly-accessible repository, or
- a relative path to another repository on the same GitLab server. See the
  [Git submodules](../git_submodules.md) documentation.

3405
### Git checkout
3406

E
Evan Read 已提交
3407
> Introduced in GitLab Runner 9.3.
3408 3409 3410 3411 3412 3413 3414 3415 3416 3417 3418 3419 3420 3421 3422 3423 3424 3425 3426 3427 3428 3429

The `GIT_CHECKOUT` variable can be used when the `GIT_STRATEGY` is set to either
`clone` or `fetch` to specify whether a `git checkout` should be run. If not
specified, it defaults to true. You can set them globally or per-job in the
[`variables`](#variables) section.

If set to `false`, the Runner will:

- when doing `fetch` - update the repository and leave working copy on
  the current revision,
- when doing `clone` - clone the repository and leave working copy on the
  default branch.

Having this setting set to `true` will mean that for both `clone` and `fetch`
strategies the Runner will checkout the working copy to a revision related
to the CI pipeline:

```yaml
variables:
  GIT_STRATEGY: clone
  GIT_CHECKOUT: "false"
script:
3430 3431 3432 3433
  - git checkout -B master origin/master
  - git merge $CI_COMMIT_SHA
```

3434
### Git clean flags
3435 3436 3437 3438 3439 3440 3441

> Introduced in GitLab Runner 11.10

The `GIT_CLEAN_FLAGS` variable is used to control the default behavior of
`git clean` after checking out the sources. You can set it globally or per-job in the
[`variables`](#variables) section.

3442
`GIT_CLEAN_FLAGS` accepts all possible options of the [`git clean`](https://git-scm.com/docs/git-clean)
3443 3444 3445 3446 3447 3448 3449 3450 3451 3452 3453 3454 3455 3456 3457 3458
command.

`git clean` is disabled if `GIT_CHECKOUT: "false"` is specified.

If `GIT_CLEAN_FLAGS` is:

- Not specified, `git clean` flags default to `-ffdx`.
- Given the value `none`, `git clean` is not executed.

For example:

```yaml
variables:
  GIT_CLEAN_FLAGS: -ffdx -e cache/
script:
  - ls -al cache/
3459
```
3460

3461 3462 3463 3464 3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485 3486 3487 3488 3489 3490 3491 3492 3493 3494 3495 3496 3497
### Git fetch extra flags

> [Introduced](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/4142) in GitLab Runner 13.1.

The `GIT_FETCH_EXTRA_FLAGS` variable is used to control the behavior of
`git fetch`. You can set it globally or per-job in the [`variables`](#variables) section.

`GIT_FETCH_EXTRA_FLAGS` accepts all possible options of the [`git fetch`](https://git-scm.com/docs/git-fetch) command, but please note that `GIT_FETCH_EXTRA_FLAGS` flags will be appended after the default flags that can't be modified.

The default flags are:

- [GIT_DEPTH](#shallow-cloning).
- The list of [refspecs](https://git-scm.com/book/en/v2/Git-Internals-The-Refspec).
- A remote called `origin`.

If `GIT_FETCH_EXTRA_FLAGS` is:

- Not specified, `git fetch` flags default to `--prune --quiet` along with the default flags.
- Given the value `none`, `git fetch` is executed only with the default flags.
  
For example, the default flags are `--prune --quiet`, so you can make `git fetch` more verbose by overriding this with just `--prune`:

```yaml
variables:
  GIT_FETCH_EXTRA_FLAGS: --prune
script:
  - ls -al cache/
```

The configurtion above will result in `git fetch` being called this way:

```shell
git fetch origin $REFSPECS --depth 50  --prune
```

Where `$REFSPECS` is a value provided to the Runner internally by GitLab.

3498
### Job stages attempts
3499 3500 3501

> Introduced in GitLab, it requires GitLab Runner v1.9+.

3502
You can set the number for attempts the running job will try to execute each
3503 3504
of the following stages:

3505 3506 3507 3508 3509 3510
| Variable                          | Description                                                                                                                                                                                                                                                                                                        |
|-----------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| **GET_SOURCES_ATTEMPTS**          | Number of attempts to fetch sources running a job                                                                                                                                                                                                                                                                  |
| **ARTIFACT_DOWNLOAD_ATTEMPTS**    | Number of attempts to download artifacts running a job                                                                                                                                                                                                                                                             |
| **RESTORE_CACHE_ATTEMPTS**        | Number of attempts to restore the cache running a job                                                                                                                                                                                                                                                              |
| **EXECUTOR_JOB_SECTION_ATTEMPTS** | [Since GitLab 12.10](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/4450), the number of attempts to run a section in a job after a [`No Such Container`](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/4450) error ([Docker executor](https://docs.gitlab.com/runner/executors/docker.html) only). |
3511 3512 3513 3514 3515

The default is one single attempt.

Example:

3516
```yaml
3517
variables:
3518
  GET_SOURCES_ATTEMPTS: 3
3519 3520
```

3521
You can set them globally or per-job in the [`variables`](#variables) section.
3522

3523
### Shallow cloning
M
Mark Pundsack 已提交
3524

3525 3526
> Introduced in GitLab 8.9 as an experimental feature.

3527 3528
NOTE: **Note**:
As of GitLab 12.0, newly created projects will automatically have a [default `git depth` value of `50`](../pipelines/settings.md#git-shallow-clone).
M
Mark Pundsack 已提交
3529 3530

You can specify the depth of fetching and cloning using `GIT_DEPTH`. This allows
M
Mark Pundsack 已提交
3531 3532 3533
shallow cloning of the repository which can significantly speed up cloning for
repositories with a large number of commits or old, large binaries. The value is
passed to `git fetch` and `git clone`.
M
Mark Pundsack 已提交
3534

E
Evan Read 已提交
3535
NOTE: **Note:**
3536 3537
If you use a depth of 1 and have a queue of jobs or retry
jobs, jobs may fail.
M
Mark Pundsack 已提交
3538

3539 3540
Since Git fetching and cloning is based on a ref, such as a branch name, Runners
can't clone a specific commit SHA. If there are multiple jobs in the queue, or
3541
you're retrying an old job, the commit to be tested needs to be within the
3542
Git history that is cloned. Setting too small a value for `GIT_DEPTH` can make
M
Mark Pundsack 已提交
3543
it impossible to run these old commits. You will see `unresolved reference` in
3544
job logs. You should then reconsider changing `GIT_DEPTH` to a higher value.
M
Mark Pundsack 已提交
3545

3546 3547
Jobs that rely on `git describe` may not work correctly when `GIT_DEPTH` is
set since only part of the Git history is present.
M
Mark Pundsack 已提交
3548 3549

To fetch or clone only the last 3 commits:
3550 3551

```yaml
M
Mark Pundsack 已提交
3552
variables:
M
Mark Pundsack 已提交
3553
  GIT_DEPTH: "3"
M
Mark Pundsack 已提交
3554 3555
```

3556 3557
You can set it globally or per-job in the [`variables`](#variables) section.

3558
### Custom build directories
3559

3560
> [Introduced](https://gitlab.com/gitlab-org/gitlab-runner/-/issues/2211) in GitLab Runner 11.10
3561 3562 3563 3564 3565 3566

NOTE: **Note:**
This can only be used when `custom_build_dir` is enabled in the [Runner's
configuration](https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-runnerscustom_build_dir-section).
This is the default configuration for `docker` and `kubernetes` executor.

E
Evan Read 已提交
3567 3568 3569
By default, GitLab Runner clones the repository in a unique subpath of the
`$CI_BUILDS_DIR` directory. However, your project might require the code in a
specific directory (Go projects, for example). In that case, you can specify
A
Anthony Mastrean 已提交
3570 3571
the `GIT_CLONE_PATH` variable to tell the Runner in which directory to clone the
repository:
3572

3573
```yaml
3574 3575 3576 3577 3578 3579 3580 3581 3582 3583 3584 3585
variables:
  GIT_CLONE_PATH: $CI_BUILDS_DIR/project-name

test:
  script:
    - pwd
```

The `GIT_CLONE_PATH` has to always be within `$CI_BUILDS_DIR`. The directory set in `$CI_BUILDS_DIR`
is dependent on executor and configuration of [runners.builds_dir](https://docs.gitlab.com/runner/configuration/advanced-configuration.html#the-runners-section)
setting.

3586
#### Handling concurrency
3587 3588 3589 3590

An executor using a concurrency greater than `1` might lead
to failures because multiple jobs might be working on the same directory if the `builds_dir`
is shared between jobs.
3591
GitLab Runner does not try to prevent this situation. It's up to the administrator
3592 3593 3594 3595 3596 3597 3598 3599 3600 3601 3602
and developers to comply with the requirements of Runner configuration.

To avoid this scenario, you can use a unique path within `$CI_BUILDS_DIR`, because Runner
exposes two additional variables that provide a unique `ID` of concurrency:

- `$CI_CONCURRENT_ID`: Unique ID for all jobs running within the given executor.
- `$CI_CONCURRENT_PROJECT_ID`: Unique ID for all jobs running within the given executor and project.

The most stable configuration that should work well in any scenario and on any executor
is to use `$CI_CONCURRENT_ID` in the `GIT_CLONE_PATH`. For example:

3603
```yaml
3604 3605 3606 3607 3608 3609 3610 3611 3612 3613 3614
variables:
  GIT_CLONE_PATH: $CI_BUILDS_DIR/$CI_CONCURRENT_ID/project-name

test:
  script:
    - pwd
```

The `$CI_CONCURRENT_PROJECT_ID` should be used in conjunction with `$CI_PROJECT_PATH`
as the `$CI_PROJECT_PATH` provides a path of a repository. That is, `group/subgroup/project`. For example:

3615
```yaml
3616 3617 3618 3619 3620 3621 3622 3623
variables:
  GIT_CLONE_PATH: $CI_BUILDS_DIR/$CI_CONCURRENT_ID/$CI_PROJECT_PATH

test:
  script:
    - pwd
```

3624
#### Nested paths
3625 3626

The value of `GIT_CLONE_PATH` is expanded once and nesting variables
3627
within is not supported.
3628 3629 3630 3631

For example, you define both the variables below in your
`.gitlab-ci.yml` file:

3632
```yaml
3633 3634 3635 3636 3637 3638 3639
variables:
  GOPATH: $CI_BUILDS_DIR/go
  GIT_CLONE_PATH: $GOPATH/src/namespace/project
```

The value of `GIT_CLONE_PATH` is expanded once into
`$CI_BUILDS_DIR/go/src/namespace/project`, and results in failure
3640
because `$CI_BUILDS_DIR` is not expanded.
3641

3642 3643 3644 3645 3646 3647 3648 3649
## Special YAML features

It's possible to use special YAML features like anchors (`&`), aliases (`*`)
and map merging (`<<`), which will allow you to greatly reduce the complexity
of `.gitlab-ci.yml`.

Read more about the various [YAML features](https://learnxinyminutes.com/docs/yaml/).

3650 3651
### Anchors

3652
> Introduced in GitLab 8.6 and GitLab Runner v1.1.1.
3653

3654
YAML has a handy feature called 'anchors', which lets you easily duplicate
3655
content across your document. Anchors can be used to duplicate/inherit
3656
properties, and is a perfect example to be used with [hidden jobs](#hide-jobs)
3657 3658 3659 3660 3661
to provide templates for your jobs.

The following example uses anchors and map merging. It will create two jobs,
`test1` and `test2`, that will inherit the parameters of `.job_template`, each
having their own custom `script` defined:
3662 3663

```yaml
3664
.job_template: &job_definition  # Hidden key that defines an anchor named 'job_definition'
3665
  image: ruby:2.6
3666 3667 3668 3669 3670
  services:
    - postgres
    - redis

test1:
3671
  <<: *job_definition           # Merge the contents of the 'job_definition' alias
3672
  script:
3673
    - test1 project
3674 3675

test2:
3676
  <<: *job_definition           # Merge the contents of the 'job_definition' alias
3677
  script:
3678 3679 3680 3681 3682 3683 3684 3685 3686
    - test2 project
```

`&` sets up the name of the anchor (`job_definition`), `<<` means "merge the
given hash into the current one", and `*` includes the named anchor
(`job_definition` again). The expanded version looks like this:

```yaml
.job_template:
3687
  image: ruby:2.6
3688 3689 3690 3691 3692
  services:
    - postgres
    - redis

test1:
3693
  image: ruby:2.6
3694 3695 3696 3697 3698 3699 3700
  services:
    - postgres
    - redis
  script:
    - test1 project

test2:
3701
  image: ruby:2.6
3702 3703 3704 3705 3706
  services:
    - postgres
    - redis
  script:
    - test2 project
3707 3708
```

3709 3710 3711 3712
Let's see another one example. This time we will use anchors to define two sets
of services. This will create two jobs, `test:postgres` and `test:mysql`, that
will share the `script` directive defined in `.job_template`, and the `services`
directive defined in `.postgres_services` and `.mysql_services` respectively:
3713 3714 3715 3716 3717 3718 3719 3720 3721 3722 3723

```yaml
.job_template: &job_definition
  script:
    - test project

.postgres_services:
  services: &postgres_definition
    - postgres
    - ruby

3724
.mysql_services:
3725 3726 3727 3728 3729
  services: &mysql_definition
    - mysql
    - ruby

test:postgres:
A
Achilleas Pipinellis 已提交
3730
  <<: *job_definition
3731 3732 3733
  services: *postgres_definition

test:mysql:
A
Achilleas Pipinellis 已提交
3734
  <<: *job_definition
3735 3736 3737
  services: *mysql_definition
```

3738
The expanded version looks like this:
3739

3740 3741 3742 3743
```yaml
.job_template:
  script:
    - test project
3744

3745 3746 3747 3748
.postgres_services:
  services:
    - postgres
    - ruby
3749

3750 3751 3752 3753 3754 3755
.mysql_services:
  services:
    - mysql
    - ruby

test:postgres:
3756
  script:
3757 3758 3759 3760 3761 3762 3763 3764 3765 3766 3767
    - test project
  services:
    - postgres
    - ruby

test:mysql:
  script:
    - test project
  services:
    - mysql
    - ruby
3768 3769
```

3770
You can see that the hidden jobs are conveniently used as templates.
3771

3772 3773 3774 3775
NOTE: **Note:**
You can't use YAML anchors across multiple files when leveraging the [`include`](#include)
feature. Anchors are only valid within the file they were defined in.

3776 3777
#### YAML anchors for `before_script` and `after_script`

3778
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/23005) in GitLab 12.5.
3779 3780 3781 3782 3783 3784 3785 3786 3787 3788 3789 3790 3791

You can use [YAML anchors](#anchors) with `before_script` and `after_script`,
which makes it possible to include a predefined list of commands in multiple
jobs.

Example:

```yaml
.something_before: &something_before
- echo 'something before'

.something_after: &something_after
- echo 'something after'
3792
- echo 'another thing after'
3793 3794 3795 3796 3797 3798 3799 3800 3801 3802 3803 3804

job_name:
  before_script:
    - *something_before
  script:
    - echo 'this is the script'
  after_script:
    - *something_after
```

#### YAML anchors for `script`

3805
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/23005) in GitLab 12.5.
3806 3807 3808 3809 3810 3811 3812 3813 3814 3815 3816 3817 3818 3819 3820 3821 3822 3823 3824 3825 3826 3827 3828 3829 3830 3831 3832 3833 3834

You can use [YAML anchors](#anchors) with scripts, which makes it possible to
include a predefined list of commands in multiple jobs.

For example:

```yaml
.something: &something
- echo 'something'

job_name:
  script:
    - *something
    - echo 'this is the script'
```

#### YAML anchors for variables

[YAML anchors](#anchors) can be used with `variables`, to easily repeat assignment
of variables across multiple jobs. It can also enable more flexibility when a job
requires a specific `variables` block that would otherwise override the global variables.

In the example below, we will override the `GIT_STRATEGY` variable without affecting
the use of the `SAMPLE_VARIABLE` variable:

```yaml
# global variables
variables: &global-variables
  SAMPLE_VARIABLE: sample_variable_value
3835
  ANOTHER_SAMPLE_VARIABLE: another_sample_variable_value
3836 3837 3838 3839 3840 3841 3842 3843 3844 3845

# a job that needs to set the GIT_STRATEGY variable, yet depend on global variables
job_no_git_strategy:
  stage: cleanup
  variables:
    <<: *global-variables
    GIT_STRATEGY: none
  script: echo $SAMPLE_VARIABLE
```

3846
### Hide jobs
3847

3848 3849 3850 3851
> Introduced in GitLab 8.6 and GitLab Runner v1.1.1.

If you want to temporarily 'disable' a job, rather than commenting out all the
lines where the job is defined:
E
Evan Read 已提交
3852

3853 3854 3855 3856 3857
```yaml
#hidden_job:
#  script:
#    - run test
```
3858

3859
You can instead start its name with a dot (`.`) and it won't be processed by
3860 3861 3862 3863 3864 3865 3866 3867 3868
GitLab CI/CD. In the following example, `.hidden_job` will be ignored:

```yaml
.hidden_job:
  script:
    - run test
```

Use this feature to ignore jobs, or use the
3869
[special YAML features](#special-yaml-features) and transform the hidden jobs
3870 3871 3872 3873 3874 3875 3876 3877 3878
into templates.

## Skip Pipeline

If your commit message contains `[ci skip]` or `[skip ci]`, using any
capitalization, the commit will be created but the pipeline will be skipped.

Alternatively, one can pass the `ci.skip` [Git push option](../../user/project/push_options.md#push-options-for-gitlab-cicd)
if using Git 2.10 or newer.
3879

3880 3881
## Processing Git pushes

3882 3883
GitLab will create at most 4 branch and tag pipelines when
pushing multiple changes in single `git push` invocation.
3884

3885 3886
This limitation does not affect any of the updated Merge Request pipelines.
All updated Merge Requests will have a pipeline created when using
3887 3888
[pipelines for merge requests](../merge_request_pipelines/index.md).

3889
## Deprecated parameters
3890

3891
The following parameters are deprecated.
3892

3893 3894 3895 3896 3897 3898 3899 3900 3901 3902 3903 3904 3905 3906 3907 3908 3909 3910 3911 3912 3913 3914 3915 3916 3917 3918 3919 3920 3921 3922 3923 3924
### Globally-defined `types`

CAUTION: **Deprecated:**
`types` is deprecated, and could be removed in a future release.
Use [`stages`](#stages) instead.

### Job-defined `type`

CAUTION: **Deprecated:**
`type` is deprecated, and could be removed in one of the future releases.
Use [`stage`](#stage) instead.

### Globally-defined `image`, `services`, `cache`, `before_script`, `after_script`

Defining `image`, `services`, `cache`, `before_script`, and
`after_script` globally is deprecated. Support could be removed
from a future release.

Use [`default:`](#global-defaults) instead. For example:

```yaml
default:
  image: ruby:2.5
  services:
    - docker:dind
  cache:
    paths: [vendor/]
  before_script:
    - bundle install --path vendor/
  after_script:
    - rm -rf tmp/
```
3925

M
Marcia Ramos 已提交
3926 3927 3928 3929 3930 3931 3932 3933 3934 3935 3936
<!-- ## Troubleshooting

Include any troubleshooting steps that you can foresee. If you know beforehand what issues
one might have when setting this up, or when something is changed, or on upgrading, it's
important to describe those, too. Think of things that may go wrong and include them here.
This is important to minimize requests for support, and to avoid doc comments with
questions that you know someone might ask.

Each scenario can be a third-level heading, e.g. `### Getting error message X`.
If you have none to add when creating a doc, leave this section in place
but commented out to help encourage others to add to it in the future. -->