Skip to main content

Release Lifecycle Template Syntax

The following sections describe the supported fields and types that Phobos supports for release lifecycles.

info

All Phobos resources have a Phobos Resource Name (PRN) that uniquely identifies the resource. The PRN is a string that starts with prn: followed by the resource type, and/or the organization and project name, unique id, etc. PRNs are accessible via the UI on the details page for the resource. The description column in the tables below will indicate if a field can use the PRN.

Top-level fields

NameDescription
stageDefines stages in the release lifecycle template, containing deployments, pre-tasks, and post-tasks.
stage_orderSpecifies the execution order of stages in the release lifecycle template. By default, the stages will be executed based on the order they appear in the template. (optional)
variableDefines variables used within the release, including their type, default value, and name.
pluginUsed to configure the plugins used by the release lifecycle template.
plugin_requirementsDefines the source and version for external plugins that need to be imported for the configuration.
jwtDefines a JSON Web Token (JWT), which is used for OIDC (OpenID Connect) authentication with external systems.
volumeDefines an external volume that can be mounted into the file system of tasks within the release lifecycle template. (e.g., a directory from a git repo can be mounted as a volume into a task so that the task can access the files).
vcs_tokenEnables retrieving a VCS token from the specified VCS provider in Phobos. Supports both OAuth and Personal Access Tokens (PAT).

Top-level field definitions

stage

NameDescriptionSupported Fields and Types
preDefines pre-tasks to be executed before the main deployments in the stage.task
postDefines post-tasks to be executed after the main deployments in the stage.task
deploymentDefines a deployment to be executed within the stage, including approval rules, environment name, and dependencies.see deployment below
Expand for an example
stage "dev" {
deployment {
environment = "dev"
when = "manual"
approval_rules = [
"prn:approval_rule:example_approval_rule",
"prn:approval_rule:example_approval_rule_2"
]
}
}

stage_order

NameDescription
stage_orderOrder of stages in the release lifecycle template. (optional)
Expand for an example
stage_order = ["dev", "prod", "test"]

variable

NameDescriptionSupported Fields and Types
typeType of the variable. (optional)See list of supported types.
defaultDefault value for the variable. (optional)expression
Expand for an example
variable "account_name" {
type = string
default = "account1"
}

plugin

NameDescription
bodyDependent on the plugin type. See Plugin docs for information on supported fields. See the jwt, plugin, and plugin_requirements example below.

plugin_requirements

NameDescriptionTypes
replaceUsed to override the plugin with a local filesystem path. (optional)string
versionVersion of the plugin. (optional)string
sourceSource of the plugin.string

jwt

Phobos supports the use of JSON Web Tokens (JWTs), which allows for OIDC authentication, ensuring secure access to external resources. The jwt block defines a JWT with an audience and name.

NameDescriptionTypes
audienceAudience for the JWT.string
Expand for an example
plugin_requirements {
tharsis = {
source = "martian-cloud/tharsis"
version = "0.2.0"
}
}

jwt "tharsis" {
audience = "tharsis"
}

plugin tharsis {
api_url = "https://api.tharsis.example.com"
service_account_token = jwt.tharsis
service_account_path = "example-tharsis-group/example-service-account"
}

The JWT can be used in the service_account_token field of a plugin to authenticate with an external system. In this example, the tharsis plugin uses the tharsis JWT to authenticate with the Tharsis API.

Bound claims

Phobos supports bound claims, which are claims that are bound to a specific JWT. Bound claims are used to restrict the use of a claim to a specific JWT. Below are a list of bound claims that Phobos supports:

ClaimDescription
audThe intended audience of the JWT
subThe PRN of the project
project_nameThe name of the project
org_nameThe name of the organization
pipeline_idThe unique identifier of the pipeline
pipeline_typeThe type of the pipeline
is_releaseIndicates if the pipeline is a release
release_prnThe PRN of the release
release_lifecycle_prnThe PRN of the release lifecycle
environmentThe environment in which the pipeline is executed
Expand for an example

Below is an example of using bound claims with an external system. Two bound claims, aud and org_name, are attached to a service account within Tharsis.

Bound claims example

volume

Volumes and mount points in Phobos allow you to mount directories from VCS providers into your pipeline. Also, see the mount_point block for more information and for an additional example.

NameDescriptionSupported Fields and Types
vcs_optionsVCS options for the volume type.ref (string, optional), repository_path (string), provider_id (id or prn of the VCS provider; string)
typeType of the volume.string
Expand for an example
volume "tools" {
type = "vcs"
vcs_options {
provider_id = "vcs_provider_id"
repository_path = "martian/tools"
}
}

vcs_token

The vcs_token block is used to retrieve a VCS token from the specified VCS provider in Phobos. The vcs_token block supports both OAuth and Personal Access Tokens (PAT). This eliminates the need to store sensitive tokens in the lifecycle template or pass them as variables. This token can be used to initialize a GitLab plugin, for example.

NameDescriptionSupported Fields and Types
provider_idID or PRN of the VCS provider in Phobos.string

This block will expose the following fields for use in the lifecycle template:

NameDescriptionTypes
file_pathPath to the token file. (e.g., vcs_token.gitlab_token.file_path). The token in the file will be updated automatically before expiration, if applicable.string
valueStatic token value. (e.g., vcs_token.gitlab_token.value). This value will not be updated.string
Expand for an example
vcs_token "gitlab_token" {
provider_id = "prn:vcs_provider:my-org/gitlab"
}

plugin_requirements {
gitlab = {
source = "martian-cloud/gitlab"
}
}

plugin gitlab {
api_url = "https://gitlab.example.com/api/v4"
token_file = vcs_token.gitlab_token.file_path
auth_type = "oauth_token"
}

In the example above, the vcs_token block retrieves a token from the GitLab VCS provider in Phobos. The gitlab plugin uses this token to authenticate with the GitLab API. The token field in the gitlab plugin is set to the file_path of the gitlab_token VCS token, ensuring the plugin uses the latest token before expiration. The auth_type field is set to oauth_token, indicating that the token is an OAuth token. Refer to the plugin's documentation for more details on supported authentication methods.

tokens are sensitive

Ensure that the token is not exposed in the pipeline template or in the logs. The token should be stored securely and not shared with unauthorized users. A feature to mask sensitive data in the logs may be available in future releases.

Sub-level fields and definitions

pre and post

The pre and post blocks within a stage allow you to define tasks that run before and after the main stage deployments. These are useful for setup, validation, and cleanup operations.

NameDescriptionSupported Fields
taskTasks to be executed in the pre or post condition.task, required
Expand for an example
stage "production" {
pre {
task "health_check" {
action "exec_command" {
command = "echo 'Running pre-deployment health check'"
}
}

task "backup" {
dependencies = ["health_check"]
action "exec_command" {
command = "echo 'Creating backup before deployment'"
}
}
}

deployment {
environment = "production"
when = "manual"
approval_rules = ["prn:approval_rule:release_manager_approval"]
}

post {
task "verify" {
action "exec_command" {
command = "echo 'Verifying deployment success'"
}
}
}
}

This example shows pre-deployment health checks and backups, followed by post-deployment verification.

task

Tasks are one of the two fundamental units of work in a stage (the other being pipelines). Tasks utilize the plugin framework, which gives tasks access to a plugin's actions (see Plugins).

A task is executed automatically by default when it's ready; however, a task can also be manual in which case it would need to be manually started. A task can also act as a gate by setting the interval and success_condition fields. When the interval field is set, the task will be executed periodically until either the success condition has been satisfied or max attempt limit has been reached.

A task can also define a list of approval_rules, which specifies the members who can approve the task. Learn more about Approval Rules.

NameDescriptionSupported Fields and Types
dependenciesDefines dependencies for the task.array of strings, optional
success_conditionCondition that determines if the task was successful.expression, optional
approval_rulesUnique identifiers or PRNs for approval rules for the task.array of strings, optional
whenDefines when the task should be executed (auto or manual).string, optional
intervalInterval for repeatable tasks.string, optional
attemptsNumber of attempts for the task.integer, required if interval is set
actionActions to be executed within the task.see action below, optional
mount_pointMount points for volumes within the task.see mount_point below, optional
scheduleSchedule the task's start time using a datetime or cron expressionschedule, optional
ifCondition to execute the task. When the condition is false, the task will be skipped.expression, optional

deployment

Deployments are used to define the environment for the release lifecycle template. Deployments can have approval rules, dependencies, and a when field that defines when the deployment should be executed.

NameDescriptionSupported Fields and Types
approval_rulesUnique identifiers or PRNs for approval rules for the task.array of strings, optional
whenDefines when the task should be executed (auto or manual).string, optional
environmentThe name of the environment for the deployment.string
dependenciesList of other deployments that this deployment depends on.array of strings, optional
scheduleSchedule the deployment's start time using a datetime or cron expressionschedule, optional
ifCondition to execute the deployment. When the condition is false, the deployment will be skipped.expression, optional
on_errorBehavior when the deployment fails. Can be fail (default) or continue.string, optional
Expand for an example
stage "dev" {
deployment {
environment = "dev"
when = "manual"
approval_rules = [
"prn:approval_rule:example_approval_rule",
"prn:approval_rule:example_approval_rule_2"
]
}
}

action

NameDescriptionTypes
aliasAlias for the action. (optional)string, optional
labelLabel for the action in the format "plugin-name_action-name" (e.g., "exec_command").string

mount_point

Mount points and volumes in Phobos allow you to mount directories from VCS providers into your pipeline. See the volume block above for more information and for an additional example.

NameDescriptionTypes
pathPath where the volume will be mounted. (optional)string
volumeVolume to be mounted.string
Expand for an example
plugin "exec" {}

volume "demo_project" {
type = "vcs"
vcs_options {
provider_id = "prn:vcs_provider:example-provider"
ref = "main"
repository_path = "path/to/repo"
}
}

stage "security_scans" {
task "scan" {
mount_point {
volume = "demo_project"
path = "/"
}
action "exec_command" {
command = <<EOF
echo "Simulated security scan by listing files in directory"
ls -la
sleep 5
EOF
}
}
}

The scan task mounts the demo_project volume to the root directory. The exec_command action lists the files in the directory and sleeps for 5 seconds.

schedule

The schedule block is used to set a datetime or cron schedule for a deployment/task. When specifying the schedule block, the when field for the deployment or task node must be set to auto since the deployment/task will be automatically started based on the specified schedule once the deployment/task moves out of the BLOCKED state. The schedule can also be updated after the pipeline has been created via the API/UI.

NameDescriptionTypes
typeThe type of schedule which can be set to datetime or cronstring
optionsThe options are specific to the type of schedule specified by the type fieldobject

Datetime schedule type

The datetime schedule type requires a timestamp in RFC3339 format. When the deployment/task moves out of the BLOCKED state it'll automatically be scheduled to start at the specified time, if the datetime is in the past then the deployment/task will start immediately.

Cron schedule type

The cron schedule type requires a cron expression and timezone in order to calcuate the scheduled start time. When the deployment/task moves out of the BLOCKED state, the cron expression will be evaluated to determine what the scheduled start time will be. It's important to note that the cron expression does not get evaluated until the deployment/task node transitions out of the BLOCKED state. The cron schedule is useful when scheduling deployments for a specific maintenance window which occurs on a standard cadence.

note

The cron schedule is only used to calculate the scheduled start time for the deployment/task node and does not cause it to run periodically (i.e. the deployment/task will only run a singe time)

Expand for an example
stage "dev" {
deployment {
when = "auto"
schedule {
type = "datetime"
options = {
value = "2024-11-25T14:50:00.000Z"
}
}
environment = "dev-us-east-1"
}

deployment {
when = "auto"
schedule {
type = "cron"
options = {
expression = "* * * * 5#3"
timezone = "America/New_York"
}
}
environment = "dev-us-east-2"
}
}

The first deployment is scheduled using a specific datetime in RFC3339 format. The second deployment is scheduled using a cron expression which will set the scheduled start time to 12AM on the 3rd Friday of the Month in the America/New_York timezone.

Additional resources

Approvals and gates

A stage can also include an optional set of pre/post approvals and gates. All pre-approvals/gates must be satisfied before the deployments in a stage can be started and post-approvals/gates must be satisfied before the stage is considered complete.

Approvals define a set of principals who can approve that a given condition has been satisfied. Unlike approvals, gates include automation to periodically check if a condition has been satisfied. To perform custom automation, gates can use plugin actions similar to tasks in a pipeline.

Expand for an example
plugin exec {}

stage "production" {
pre {
# Gate example - automated health check
task "health_check" {
interval = "2m"
attempts = 10
success_condition = "action_outputs.stage.production.pre.task.health_check.action.check_service.exit_code == 0"

action "exec_command" {
alias = "check_service"
command = "curl -f https://api.example.com/health"
}
}

# Approval gate - manual approval as a task
task "security_review" {
when = "manual"
approval_rules = [
"prn:approval_rule:org/security-team",
"prn:approval_rule:org/platform-team"
]
}
}

deployment {
environment = "prod"
approval_rules = ["prn:approval_rule:org/release-managers"]
}

post {
task "deployment_verification" {
when = "manual"
approval_rules = ["prn:approval_rule:org/qa-team"]
}
}
}

This example shows automated gates (health check task with retry logic), manual approval gates (security review task), and deployment-level approvals (release manager approval).

note

Learn more about configuring Approval Rules.

Built-in functions

Phobos provides built-in HCL functions that can be used in your release lifecycle templates. For a complete reference with examples, see the Built-in Functions page.