Skip to main content

Pipeline Template Syntax

The following sections describe the supported fields and types that Phobos supports for pipeline templates.

info

All Phobos resources have a Phobos Resource Name (PRN) that uniquely identifies the resource. The PRN is a string that starts with prn: followed by the resource type, and/or the organization and project name, unique id, etc. PRNs are accessible via the UI on the details page for the resource. The description column in the tables below will indicate if a field can use the PRN.

Top-level fields

NameDescription
stageDefines stages in the pipeline template, containing tasks and nested pipelines.
stage_orderSpecifies the execution order of stages in the pipeline template. By default, the stages will be executed based on the order they appear in the template. (optional)
agentSets the default configuration for agent tags. Agent tags determine which agent will pick up and execute the job. Tags can also be specified at the task level. Task-level tags will take precedence over the default tags defined in the agent block. (optional)
variableDefines variables used within the pipeline, including their type, default value, and name.
pluginUsed to configure the plugins used by the pipeline template.
plugin_requirementsDefines the source and version for external plugins that need to be imported for the configuration.
jwtDefines a JSON Web Token (JWT), which is used for OIDC (OpenID Connect) authentication with external systems.
volumeDefines an external volume that can be mounted into the file system of tasks within the pipeline template. (e.g., a directory from a git repo can be mounted as a volume into a task so that the task can access the files).
vcs_tokenEnables retrieving a VCS token from the specified VCS provider in Phobos. Supports both OAuth and Personal Access Tokens (PAT).

Top-level field definitions

stage

NameDescriptionSupported Fields
preDefines pre-tasks to be executed before the main tasks in the stage.task
postDefines post-tasks to be executed after the main tasks in the stage.task
Expand for an example
stage "simple" {
pre {
task "pre_task" {
action "exec_command" {
command = <<EOF
echo "This is pre task sleeps for 10 seconds :)"
sleep 10
EOF
}
}
}
task "main_task" {
action "exec_command" {
command = <<EOF
echo "This main task sleeps for 10 seconds :)"
sleep 10
EOF
}
}
post {
task "post_task" {
action "exec_command" {
command = <<EOF
echo "This post task sleeps for another 10 seconds :)"
sleep 10
EOF
}
}
}
}

stage_order

NameDescription
stage_orderOrder of stages in the pipeline template. (optional)
Expand for an example
stage_order = ["dev", "prod", "test"]

agent

NameDescriptionSupported Fields and Types
tagsConfiguration related to an agenttags (array of strings)
Expand for an example
agent {
tags = ["example-tag", "example-tag-2"]
}

variable

NameDescriptionSupported Fields and Types
typeType of the variable. (optional)See list of supported types.
defaultDefault value for the variable. (optional)expression
Expand for an example
variable "account_name" {
type = string
default = "account1"
}

plugin

NameDescription
bodyDependent on the plugin type. See Plugin docs for information on supported fields. See the jwt, plugin, and plugin_requirements example below.

plugin_requirements

NameDescriptionTypes
replaceUsed to override the plugin with a local filesystem path. (optional)string
versionVersion of the plugin. (optional)string
sourceSource of the plugin.string

jwt

Phobos supports the use of JSON Web Tokens (JWTs), which allows for OIDC authentication, ensuring secure access to external resources. The jwt block defines a JWT with an audience and name.

NameDescriptionTypes
audienceAudience for the JWT.string
Expand for an example
plugin_requirements {
tharsis = {
source = "martian-cloud/tharsis"
version = "0.2.0"
}
}

jwt "tharsis" {
audience = "tharsis"
}

plugin tharsis {
api_url = "https://api.tharsis.example.com"
service_account_token = jwt.tharsis
service_account_path = "example-tharsis-group/example-service-account"
}

The JWT can be used in the service_account_token field of a plugin to authenticate with an external system. In this example, the tharsis plugin uses the tharsis JWT to authenticate with the Tharsis API.

Bound claims

Phobos supports bound claims, which are claims that are bound to a specific JWT. Bound claims are used to restrict the use of a claim to a specific JWT. Below are a list of bound claims that Phobos supports:

ClaimDescription
audThe intended audience of the JWT
subThe PRN of the project
project_nameThe name of the project
org_nameThe name of the organization
pipeline_idThe unique identifier of the pipeline
pipeline_typeThe type of the pipeline
is_releaseIndicates if the pipeline is a release
release_prnThe PRN of the release
release_lifecycle_prnThe PRN of the release lifecycle
environmentThe environment in which the pipeline is executed
Expand for an example

Below is an example of using bound claims with an external system. Two bound claims, aud and org_name, are attached to a service account within Tharsis.

Bound claims example

volume

Volumes and mount points in Phobos allow you to mount directories from VCS providers into your pipeline. Also, see the mount_point block for more information and for an additional example.

NameDescriptionSupported Fields and Types
vcs_optionsVCS options for the volume type.ref (string, optional), repository_path (string), provider_id (id or prn of the VCS provider; string)
typeType of the volume.string
Expand for an example
volume "tools" {
type = "vcs"
vcs_options {
provider_id = "vcs_provider_id"
repository_path = "martian/tools"
}
}

vcs_token

The vcs_token block is used to retrieve a VCS token from the specified VCS provider in Phobos. The vcs_token block supports both OAuth and Personal Access Tokens (PAT). This eliminates the need to store sensitive tokens in the pipeline template or pass them as variables. This token can be used to initialize a GitLab plugin, for example.

NameDescriptionSupported Fields and Types
provider_idID or PRN of the VCS provider in Phobos.string

This block will expose the following fields for use in the pipeline template:

NameDescriptionTypes
file_pathPath to the token file. (e.g., vcs_token.gitlab_token.file_path). The token in the file will be updated automatically before expiration, if applicable.string
valueStatic token value. (e.g., vcs_token.gitlab_token.value). This value will not be updated.string
Expand for an example
vcs_token "gitlab_token" {
provider_id = "prn:vcs_provider:my-org/gitlab"
}

plugin_requirements {
gitlab = {
source = "martian-cloud/gitlab"
}
}

plugin gitlab {
api_url = "https://gitlab.example.com/api/v4"
token_file = vcs_token.gitlab_token.file_path
auth_type = "oauth_token"
}

In the example above, the vcs_token block retrieves a token from the GitLab VCS provider in Phobos. The gitlab plugin uses this token to authenticate with the GitLab API. The token field in the gitlab plugin is set to the file_path of the gitlab_token VCS token, ensuring the plugin uses the latest token before expiration. The auth_type field is set to oauth_token, indicating that the token is an OAuth token. Refer to the plugin's documentation for more details on supported authentication methods.

tokens are sensitive

Ensure that the token is not exposed in the pipeline template or in the logs. The token should be stored securely and not shared with unauthorized users. A feature to mask sensitive data in the logs may be available in future releases.

Sub-level fields and definitions

task

Tasks are one of the two fundamental units of work in a stage (the other being pipelines). Tasks utilize the plugin framework, which gives tasks access to a plugin's actions (see Plugins).

A task is executed automatically by default when it's ready; however, a task can also be manual in which case it would need to be manually started. A task can also act as a gate by setting the interval and success_condition fields. When the interval field is set, the task will be executed periodically until either the success condition has been satisfied or max attempt limit has been reached.

A task can also define a list of approval_rules, which specifies the members who can approve the task. Learn more about Approval Rules.

NameDescriptionSupported Fields and Types
dependenciesDefines dependencies for the task.array of strings, optional
success_conditionCondition that determines if the task was successful.expression, optional
approval_rulesUnique identifiers or PRNs for approval rules for the task.array of strings, optional
whenDefines when the task should be executed (auto, manual, or never).string, optional
intervalInterval for repeatable tasks.string, optional
attemptsNumber of attempts for the task.integer, required if interval is set
agentConfiguration for the agent to execute the task.tags (array of strings), optional
actionActions to be executed within the task.action, optional
mount_pointMount points for volumes within the task.mount_point, optional
scheduleSchedule the task's start time using a datetime or cron expressionschedule, optional
ifCondition to execute the task. When the condition is false, the task will be skipped.expression, optional
imageContainer image to use for the task execution.string, optional
on_errorBehavior when the task fails. Can be fail (default) or continue.string, optional
agentAgent configuration specific to this task.agent, optional

action

NameDescriptionTypes
aliasAlias for the action. (optional)string, optional
labelLabel for the action in the format "plugin-name_action-name" (e.g., "exec_command").string

mount_point

Mount points and volumes in Phobos allow you to mount directories from VCS providers into your pipeline. See the volume block above for more information and for an additional example.

NameDescriptionTypes
pathPath where the volume will be mounted. (optional)string
volumeVolume to be mounted.string
Expand for an example
plugin "exec" {}

volume "demo_project" {
type = "vcs"
vcs_options {
provider_id = "prn:vcs_provider:example-provider"
ref = "main"
repository_path = "path/to/repo"
}
}

stage "security_scans" {
task "scan" {
mount_point {
volume = "demo_project"
path = "/"
}
action "exec_command" {
command = <<EOF
echo "Simulated security scan by listing files in directory"
ls -la
sleep 5
EOF
}
}
}

The scan task mounts the demo_project volume to the root directory. The exec_command action lists the files in the directory and sleeps for 5 seconds.

schedule

The schedule block is used to set a datetime or cron schedule for a task/pipeline. When specifying the schedule block, the when field for the task or pipeline node must be set to auto since the task/pipeline will be automatically started based on the specified schedule once the task/pipeline moves out of the BLOCKED state. The schedule can also be updated after the pipeline has been created via the API/UI.

NameDescriptionTypes
typeThe type of schedule which can be set to datetime or cronstring
optionsThe options are specific to the type of schedule specified by the type fieldobject

Datetime schedule type

The datetime schedule type requires a timestamp in RFC3339 format. When the task/pipeline moves out of the BLOCKED state it'll automatically be scheduled to start at the specified time, if the datetime is in the past then the task/pipeline will start immediately.

Cron schedule type

The cron schedule type requires a cron expression and timezone in order to calcuate the scheduled start time. When the task/pipeline moves out of the BLOCKED state, the cron expression will be evaluated to determine what the scheduled start time will be. It's important to note that the cron expression does not get evaluated until the task/pipeline node transitions out of the BLOCKED state.

note

The cron schedule is only used to calculate the scheduled start time for the task/pipeline node and does not cause it to run periodically (i.e. the task/pipeline will only run a singe time)

Expand for an example
stage "main" {
task "t1" {
schedule {
type = "datetime"
options = {
value = "2024-11-25T14:50:00.000Z"
}
}
}

task "t2" {
schedule {
type = "cron"
options = {
expression = "* * * * 5#3"
timezone = "America/New_York"
}
}
}

pipeline "p1" {
when = "auto"
schedule {
type = "cron"
options = {
expression = "* 12 * * *"
timezone = "UTC"
}
}
template_id = var.nested_pipeline_prn
}
}

The t1 task is scheduled using a specific datetime in RFC3339 format. The task t2 is scheduled using a cron expression which will set the scheduled start time to 12AM on the 3rd Friday of the Month in the America/New_York timezone. The nested pipeline p1 also has a cron schedule which will set the scheduled start time to 12PM UTC time.

Action outputs

Actions can have outputs that can be used in subsequent tasks. The outputs are defined in the action block.

Expand for an example
stage "test" {
pre {
task "ex_1" {
action "tharsis_create_workspace" {
name = "example-workspace"
group_path = var.tharsis_group_path
description = "Workspace created from Phobos"
skip_if_exists = true
}
}
}
task "ex_2" {
action "tharsis_create_run" {
# action output generated by the tharsis_create_workspace action
workspace_path = action_outputs.stage.test.pre.task.ex_1.action.tharsis_create_workspace.path
auto_approve = false
}
}
post {
task "ex_3" {
approval_rules = ["prn:approval_rule:example_approval_rule"]
action "tharsis_delete_workspace" {
# action output generated by the tharsis_create_workspace action
workspace_path = action_outputs.stage.test.pre.task.ex_1.action.tharsis_create_workspace.path
force = true
}
}
}
}

The ex_2 and ex_3 tasks use outputs from the ex_1 task's tharsis_create_workspace action to access the workspace path.

pre and post

The pre and post blocks within a stage allow you to define tasks that run before and after the main stage tasks. These are useful for setup, validation, and cleanup operations.

NameDescriptionSupported Fields
taskTasks to be executed in the pre or post condition.task, required
Expand for an example
stage "deploy" {
pre {
task "validate" {
action "exec_command" {
command = "echo 'Running pre-deployment validation'"
}
}
}

task "deploy_app" {
action "exec_command" {
command = "echo 'Deploying application'"
}
}

post {
task "cleanup" {
action "exec_command" {
command = "echo 'Running post-deployment cleanup'"
}
}
}
}

The validate task runs before any main stage tasks, and the cleanup task runs after all main stage tasks complete.

pipeline

The pipeline block is used to define and launch nested pipelines.

NameDescriptionSupported Fields and Types
variablesVariables used within the nested pipeline.expression, optional
template_idID of the template to be used for the nested pipeline.expression
environmentEnvironment name for the deployment pipeline.string, optional
whenDefines when the nested pipeline should be executed (auto, manual, or never).string, optional
pipeline_typeType of the nested pipeline (nested, deployment).string
dependenciesDependencies for the nested pipeline.array of strings, optional
approval_rulesUnique identifiers or PRNs for approval rules for the nested pipeline.array of strings, optional
scheduleSchedule the pipeline's start time using a datetime or cron expressionschedule, optional
ifCondition to execute the pipeline. When the condition is false, the pipeline will be skipped.expression, optional
on_errorBehavior when the pipeline fails. Can be fail (default) or continue.string, optional
Expand for an example
stage dev {
pipeline "deploy" {
pipeline_type = "deployment"
environment = "account1"
template_id = "<pipeline_template_id>"
approval_rules = [
"prn:approval_rule:example_approval_rule",
"prn:approval_rule:example_approval_rule_2"
]
when = "manual"
}
}
Expand for an example
plugin_requirements {
tharsis = {
source = "martian-cloud/tharsis"
version = "0.2.0"
}
}

jwt "tharsis" {
audience = "tharsis"
}

plugin tharsis {
api_url = "https://tharsis.example.com"
service_account_token = jwt.tharsis
service_account_path = "example-tharsis-group/example-service-account"
}

volume "volume_1" {
type = "vcs"
vcs_options {
ref = "main"
repository_path = "example/path/to/repo"
provider_id = "prn:vcs_provider:user/martian_cloud"
}
}

stage "test" {
task "create" {
action "tharsis_create_workspace" {
name = "test_workspace"
group_path = "example_group_path"
description = "test workspace"
skip_if_exists = true
managed_identity_paths = [
"example_group_path/sre-account-admins",
"example_group_path/example-provider"
]
}
mount_point {
volume = "volume_1"
path = "/"
}
}
}

Additional resources

Built-in functions

Phobos provides built-in HCL functions that can be used in your pipeline templates. For a complete reference with examples, see the Built-in Functions page.

Dynamic blocks and for_each

The dynamic block allows you to generate multiple blocks dynamically based on the values in a variable. The for_each construct iterates over each item in the variable and creates a corresponding block.

Below is an example pipeline template that demonstrates how to use dynamic blocks and the for_each construct with the Tharsis plugin to create workspaces dynamically.

Expand for an example
variable "tharsis_groups" {
type = list(object({
group_path = string
workspace_name = string
}))
}

plugin_requirements {
tharsis = {
source = "<registry-hostname>/<organization>/tharsis"
version = "0.2.0"
}
}

jwt "tharsis" {
audience = "tharsis"
}

provider tharsis {
api_url = "https://tharsis.example.com"
service_account_path = "example-group/example-service-account"
service_account_token = jwt.tharsis
}

stage "create_workspaces" {
dynamic "task" {
for_each = var.tharsis_groups
labels = [task.value.workspace_name]

content {
action "tharsis_create_workspace" {
group_path = task.value.group_path
name = task.value.workspace_name
description = "Automatically created workspace"
skip_if_exists = true
}
}
}
}

The stage named create_workspaces contains a dynamic block that generates a task block for each item in the tharsis_groups variable. The for_each construct iterates over each value in the tharsis_groups variable. The labels field is set to the workspace name, ensuring each task has a unique label based on the workspace name. The action block within the dynamically created task uses the tharsis_create_workspace action from the tharsis plugin, setting the group_path, name, description, and skip_if_exists fields based on the current iteration's values and predefined configurations.

For more information on pipeline templates, see the Pipeline Templates page.