How to Use GitLab Pipeline Variables: A Practical Introduction

Okay, here’s a comprehensive article on using GitLab Pipeline Variables, designed to be practical and cover a wide range of use cases.

How to Use GitLab Pipeline Variables: A Practical Introduction

GitLab CI/CD pipelines are a powerful tool for automating software development workflows, from building and testing to deploying applications. A crucial component of making these pipelines flexible, reusable, and secure is the effective use of pipeline variables. This article provides a deep dive into GitLab pipeline variables, covering their different types, scopes, precedence, and practical applications with numerous examples. We’ll go beyond the basics and explore advanced techniques for managing secrets, creating dynamic pipelines, and integrating with external systems.

1. What are GitLab Pipeline Variables?

GitLab pipeline variables are key-value pairs that you can define and use within your .gitlab-ci.yml file and in your project settings. They act as environment variables that are accessible to your pipeline’s scripts during execution. Think of them as placeholders for values that might change between different environments (development, staging, production), different branches, or even different runs of the same pipeline.

Benefits of Using Pipeline Variables:

  • Reusability: Define values once and reuse them across multiple jobs and pipelines. Avoid hardcoding values directly into your scripts.
  • Maintainability: Update values in a single place (variable definition) instead of searching and replacing throughout your .gitlab-ci.yml file.
  • Security: Store sensitive information like API keys, passwords, and deployment credentials securely, preventing them from being exposed in your repository’s code.
  • Flexibility: Create dynamic pipelines that adapt to different contexts (e.g., different branches, tags, or manual triggers).
  • Portability: Easily move your pipeline configuration between projects or environments by adjusting the variable values.

2. Types of GitLab Pipeline Variables:

GitLab provides several types of variables, each with its own characteristics and intended use cases:

  • CI/CD Variables (Defined in Project/Group/Instance Settings): These are the most common type of variables. You define them through the GitLab UI, making them readily available to all pipelines within the specified scope (project, group, or instance).

    • Where to Define:

      • Project Level: Settings > CI/CD > Variables (for a specific project)
      • Group Level: Group Settings > CI/CD > Variables (for all projects within a group)
      • Instance Level: Admin Area > Settings > CI/CD > Variables (for all projects on the GitLab instance – requires administrator access)
    • Key Properties:

      • Key: The name of the variable (e.g., DATABASE_URL, API_KEY). Must be alphanumeric and can include underscores (_). It’s best practice to use uppercase for variable names.
      • Value: The actual value of the variable (e.g., postgres://user:password@host:port/database, your_secret_api_key).
      • Type:
        • Variable (default): A simple key-value pair.
        • File: The value is treated as the contents of a file. Useful for storing multi-line secrets or configuration files. The value is stored encoded.
      • Environment Scope: Allows you to restrict the variable’s availability to specific environments (e.g., production, staging). Use wildcards (*) for broader matching (e.g., staging/* for all branches starting with staging/).
      • Protected: Makes the variable available only to pipelines running on protected branches or protected tags. This is crucial for protecting sensitive credentials used in deployments to critical environments.
      • Masked: Hides the variable’s value in job logs, preventing accidental exposure of sensitive data. The value must meet certain criteria to be masked (e.g., minimum length, specific characters). The value is stored encoded.
      • Expand Variable Reference: Whether to recursively resolve nested variable references within the variable’s value.
  • Predefined Variables: GitLab automatically provides a set of predefined variables that contain information about the pipeline, project, and environment. These variables are read-only and cannot be modified. They are incredibly useful for creating dynamic and context-aware pipelines. Examples include:

    • CI_PIPELINE_ID: The unique ID of the current pipeline.
    • CI_COMMIT_SHA: The commit SHA that triggered the pipeline.
    • CI_COMMIT_REF_NAME: The branch or tag name.
    • CI_JOB_NAME: The name of the current job.
    • CI_PROJECT_NAME: The name of the project.
    • CI_PROJECT_PATH: The full path to the project (e.g., group/subgroup/project).
    • CI_REGISTRY: The address of the GitLab Container Registry.
    • CI_ENVIRONMENT_NAME: The name of the environment (if defined).
    • CI_COMMIT_BEFORE_SHA: SHA of the previous commit on the target branch (merge request pipelines)
    • CI_MERGE_REQUEST_TARGET_BRANCH_NAME: Name of the target branch (merge request pipelines)
    • A complete list can be found in the GitLab documentation: https://docs.gitlab.com/ee/ci/variables/predefined_variables.html
  • Variables Defined in .gitlab-ci.yml: You can define variables directly within your .gitlab-ci.yml file. These variables have a more limited scope, typically applying only to the specific job or stage where they are defined.

    • Global variables block: Define variables that are available to all jobs in the pipeline.
    • Job-level variables block: Define variables that are only available to a specific job.

    “`yaml
    variables:
    GLOBAL_VARIABLE: “This is a global variable”

    job1:
    variables:
    JOB_VARIABLE: “This is a job-specific variable”
    script:
    – echo “Global: $GLOBAL_VARIABLE”
    – echo “Job: $JOB_VARIABLE”

    job2:
    script:
    – echo “Global: $GLOBAL_VARIABLE”
    – echo “Job: $JOB_VARIABLE” # This will be empty, as JOB_VARIABLE is not defined for job2
    “`

  • Trigger Variables: These variables are passed to the pipeline when it is triggered manually or through the GitLab API. They are useful for customizing pipeline behavior on a per-run basis.

    • Manual Triggers: You can define trigger variables when starting a pipeline manually from the GitLab UI.
    • API Triggers: You can pass variables as part of the API request when triggering a pipeline using the GitLab API. This is often used for integrating with external systems or creating custom workflows.

    “`bash

    Trigger a pipeline with variables using the GitLab API

    curl –request POST \
    –form token=$CI_JOB_TOKEN \
    –form ref=main \
    –form “variables[DEPLOY_ENVIRONMENT]=production” \
    –form “variables[FEATURE_FLAG]=true” \
    “https://gitlab.example.com/api/v4/projects//trigger/pipeline”
    “`

  • Scheduled Pipeline Variables: Similar to trigger variables, these are defined when you create a scheduled pipeline in GitLab. They allow you to customize the behavior of pipelines that run on a schedule.

    • Where to Define: CI/CD > Schedules > New Schedule
  • Group and Instance Level Variables: These are defined at a higher level than project variables and can be inherited by multiple projects.

    • Group-level variables: These are available to all projects within a specific GitLab group. This is very useful for sharing common configuration values across multiple related projects.
    • Instance-level variables: These are available to all projects on the GitLab instance. This requires administrator access and should be used sparingly, primarily for truly global settings.

3. Variable Precedence (Order of Resolution):

When multiple variables with the same name are defined, GitLab uses a specific order of precedence to determine which value to use. Understanding this order is crucial for avoiding unexpected behavior. The precedence, from highest to lowest, is:

  1. Trigger Variables / Scheduled Pipeline Variables: These variables have the highest precedence, overriding any other variables with the same name.
  2. Job-Level Variables (defined in .gitlab-ci.yml): Variables defined within a specific job’s variables block.
  3. Project-Level Variables (defined in project settings): Variables defined in the project’s CI/CD settings.
  4. Group-Level Variables (defined in group settings): Variables defined in the group’s CI/CD settings.
  5. Instance-Level Variables (defined in instance settings): Variables defined in the instance’s CI/CD settings.
  6. Global Variables (defined in .gitlab-ci.yml): Variables defined in the global variables block of the .gitlab-ci.yml file.
  7. Predefined Variables: These variables have the lowest precedence and cannot be overridden.

Example:

“`yaml
variables:
MY_VARIABLE: “global_value”

job1:
variables:
MY_VARIABLE: “job_value”
script:
– echo “MY_VARIABLE: $MY_VARIABLE” # Output: MY_VARIABLE: job_value

job2:
script:
– echo “MY_VARIABLE: $MY_VARIABLE” # Output: MY_VARIABLE: global_value (if no project/group/instance variable overrides it)
“`

If MY_VARIABLE were also defined as a project-level variable with the value “project_value”, job2 would output “project_value” because project-level variables have higher precedence than global variables defined in .gitlab-ci.yml. If it was a trigger variable with a value “trigger_value”, then both job1 and job2 would output trigger_value.

4. Using Variables in Your .gitlab-ci.yml File:

To use a variable within your pipeline scripts, you simply reference it using the $ symbol followed by the variable name (e.g., $MY_VARIABLE). GitLab automatically substitutes the variable’s value before executing the script.

“`yaml
stages:
– build
– deploy

build_job:
stage: build
image: node:16
script:
– echo “Building project: $CI_PROJECT_NAME”
– echo “Commit SHA: $CI_COMMIT_SHA”
– npm install
– npm run build

deploy_job:
stage: deploy
image: ruby:3.1
script:
– echo “Deploying to: $DEPLOY_ENVIRONMENT”
– echo “Using API key: $API_KEY” # API_KEY should be a masked, protected variable
– ./deploy.sh # Your deployment script
environment:
name: $DEPLOY_ENVIRONMENT
url: $DEPLOY_URL
only:
– main # Only run on the main branch
“`

5. Practical Use Cases and Examples:

Let’s explore some practical scenarios where GitLab pipeline variables are essential:

  • Database Credentials:

    “`yaml

    In Project Settings > CI/CD > Variables:

    Key: DATABASE_URL

    Value: postgres://user:password@host:port/database (Masked and Protected)

    Type: Variable

    test_job:
    stage: test
    image: postgres:14
    services:
    – postgres:14
    variables:
    POSTGRES_USER: user
    POSTGRES_PASSWORD: password
    POSTGRES_DB: mydatabase
    script:
    – psql -h postgres -U $POSTGRES_USER -d $POSTGRES_DB -c “SELECT 1;”
    – ./run_tests.sh # Your test script, which can use $DATABASE_URL
    “`

  • API Keys and Secrets:

    “`yaml

    In Project Settings > CI/CD > Variables:

    Key: AWS_ACCESS_KEY_ID

    Value: YOUR_AWS_ACCESS_KEY_ID (Masked and Protected)

    Type: Variable

    Key: AWS_SECRET_ACCESS_KEY

    Value: YOUR_AWS_SECRET_ACCESS_KEY (Masked and Protected)

    Type: Variable

    deploy_to_aws:
    stage: deploy
    image: amazon/aws-cli
    script:
    – aws s3 cp ./build s3://my-bucket/$CI_COMMIT_SHA/ –recursive
    only:
    – main
    “`

  • Deployment Environments:

    “`yaml

    In Project Settings > CI/CD > Variables:

    Key: DEPLOY_ENVIRONMENT

    Value: staging (for staging branch) / production (for main branch)

    Environment Scope: staging/* (for staging) / main (for production)

    Type: Variable

    deploy:
    stage: deploy
    script:
    – ./deploy.sh –environment $DEPLOY_ENVIRONMENT
    environment:
    name: $DEPLOY_ENVIRONMENT
    url: https://$DEPLOY_ENVIRONMENT.example.com
    only:
    – staging/*
    – main
    “`

  • Conditional Logic based on Branch/Tag:

    yaml
    build:
    stage: build
    script:
    - echo "Building..."
    only:
    variables:
    - $CI_COMMIT_BRANCH == "main" # Only build on the main branch

  • Using File Type Variables:

    “`yaml

    In Project Settings > CI/CD > Variables:

    Key: SSH_PRIVATE_KEY

    Value: (Contents of your private SSH key) (Masked and Protected)

    Type: File

    deploy_with_ssh:
    stage: deploy
    image: alpine/git
    before_script:
    – ‘which ssh-agent || ( apk add –update openssh )’
    – eval $(ssh-agent -s)
    – mkdir -p ~/.ssh
    – echo “$SSH_PRIVATE_KEY” | base64 -d > ~/.ssh/id_rsa
    – chmod 600 ~/.ssh/id_rsa
    – ssh-add ~/.ssh/id_rsa
    – ssh-keyscan -H $DEPLOY_SERVER >> ~/.ssh/known_hosts
    script:
    – ssh user@$DEPLOY_SERVER “cd /var/www/my-app && git pull origin main && ./deploy.sh”
    only:
    – main
    “`

  • Dynamic Image Tagging:

    yaml
    build_image:
    stage: build
    image: docker:20.10.12-dind
    services:
    - docker:20.10.12-dind
    script:
    - docker login -u $CI_REGISTRY_USER -p $CI_REGISTRY_PASSWORD $CI_REGISTRY
    - docker build -t $CI_REGISTRY_IMAGE:$CI_COMMIT_SHORT_SHA .
    - docker push $CI_REGISTRY_IMAGE:$CI_COMMIT_SHORT_SHA

    * Overriding variables with rules:

    “`yaml
    variables:
    DEPLOY_ENVIRONMENT: “staging”

    deploy_staging:
    stage: deploy
    script:
    – ./deploy.sh
    environment:
    name: staging
    rules:
    – if: ‘$CI_COMMIT_BRANCH == “staging”‘

    deploy_production:
    stage: deploy
    script:
    – ./deploy.sh
    environment:
    name: production
    rules:
    – if: ‘$CI_COMMIT_BRANCH == “main”‘
    variables:
    DEPLOY_ENVIRONMENT: “production” # Override the global variable
    “`

6. Advanced Techniques and Best Practices:

  • Variable Expansion: GitLab supports variable expansion within variable values. This allows you to create more complex and dynamic variables.

    “`yaml

    In Project Settings > CI/CD > Variables:

    Key: BASE_URL

    Value: example.com

    Type: Variable

    Key: FULL_URL

    Value: https://$BASE_URL/api

    Type: Variable

    Expand Variable Reference: Enabled

    job:
    script:
    – echo “Full URL: $FULL_URL” # Output: Full URL: https://example.com/api
    “`
    Be careful with circular references, which can lead to errors.

  • Using dotenv Files: You can use .env files to manage environment variables locally and then load them into your GitLab pipeline. This is useful for development and testing. You can use the dotenv package (available in many languages) or similar tools to parse the .env file and set the environment variables.

    “`yaml

    .env file (NOT committed to the repository)

    DATABASE_URL=postgres://dev_user:dev_password@localhost:5432/dev_db

    API_KEY=local_dev_api_key

    test_local:
    stage: test
    image: python:3.9
    before_script:
    – pip install python-dotenv
    – export $(grep -v ‘^#’ .env | xargs) # Load variables from .env (be careful with this approach in production!)
    script:
    – echo “Database URL: $DATABASE_URL”
    – ./run_tests.sh
    ``
    **Important Security Note:** *Never* commit
    .envfiles containing sensitive information to your Git repository. Use GitLab CI/CD variables for secrets. The.env` file example above is suitable for local development only.

  • Integrating with External Secret Managers: For enhanced security, especially in production environments, integrate GitLab with external secret management solutions like HashiCorp Vault, AWS Secrets Manager, or Azure Key Vault. These tools provide more robust security features, including audit logging, access control, and secret rotation. While the specifics of integration vary depending on the tool, the general approach involves:

    1. Configure Authentication: Set up authentication between your GitLab pipeline and the secret manager (e.g., using service accounts, API keys, or tokens). Store the authentication credentials securely as GitLab CI/CD variables.
    2. Retrieve Secrets: Use the secret manager’s API or CLI within your pipeline scripts to retrieve the necessary secrets.
    3. Use Secrets: Use the retrieved secrets in your deployment or application configuration.

    This integration adds a layer of complexity, but it significantly enhances security, especially for highly sensitive data.

  • Group and Instance Level Variable Usage Strategy:

    • Group Variables: Ideal for sharing configuration that is common across a set of related projects. Examples include shared database connection strings (for a shared development database), common API endpoints, or standard deployment settings.
    • Instance Variables: Use with extreme caution. These are for settings that truly apply to every project on the GitLab instance. Good examples might be the base URL of a company-wide artifact repository or a global notification email address. Avoid using instance variables for anything project-specific or sensitive.
  • Naming Conventions: Adopt a clear and consistent naming convention for your variables. This makes your pipelines easier to understand and maintain. A common practice is to use uppercase with underscores (e.g., DATABASE_URL, API_KEY). Prefixes can help categorize variables (e.g. AWS_ACCESS_KEY_ID).

  • Documentation: Document your variables, their purpose, and their expected values. This is especially important for project, group, and instance-level variables that are used across multiple jobs and pipelines. You can add comments in your .gitlab-ci.yml file and utilize the description field within the GitLab variable settings to provide more details.

  • Regular Auditing: Periodically review your defined variables, especially protected and masked variables, to ensure they are still necessary and their values are up-to-date. Remove any unused or outdated variables.

  • Least Privilege: Grant access to variables (especially protected variables) only to the pipelines and users that absolutely require them. Use environment scopes and protected branches/tags to limit the exposure of sensitive information.

7. Troubleshooting Common Issues:

  • Variable Not Found: Double-check the variable name (case-sensitivity), scope (project, group, instance, job), and precedence. Ensure the variable is defined in the correct location. Use echo statements to debug and see if the variable is being resolved as expected.
  • Incorrect Variable Value: Verify the variable’s value in the GitLab UI or .gitlab-ci.yml file. Check for typos or incorrect environment scope settings. Remember variable precedence; a trigger variable will override a project variable, which overrides a global .gitlab-ci.yml variable.
  • Masked Variable Not Masking: Ensure the variable meets the masking requirements (length, characters). Check the job logs carefully; sometimes, the masking might not be perfect if the value appears in a slightly modified form.
  • Protected Variable Not Available: Confirm that the pipeline is running on a protected branch or tag. Check the variable’s “Protected” setting in the GitLab UI.
  • Variable Expansion Errors: Check for circular references in your variable definitions. Ensure that nested variables are defined before they are referenced.
  • only/except/rules not working as expected: These keywords use a slightly different variable syntax within their conditions. You may need to use single quotes around the variable name (e.g., if: '$CI_COMMIT_BRANCH == "main"'). Refer to the GitLab documentation for precise syntax.

8. Conclusion:

GitLab pipeline variables are a fundamental building block for creating robust, flexible, and secure CI/CD workflows. By mastering the different types of variables, their scopes, precedence, and best practices, you can significantly improve the maintainability, reusability, and security of your pipelines. From simple configuration values to sensitive secrets, variables empower you to automate your development processes effectively and efficiently. Remember to leverage external secret managers for enhanced security in production environments, and always prioritize security best practices when handling sensitive data. This comprehensive guide provides the foundation; continuous learning and experimentation with GitLab’s features are key to becoming a CI/CD expert.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top