diff --git a/doc/user/application_security/policies/pipeline_execution_policies.md b/doc/user/application_security/policies/pipeline_execution_policies.md index 98ff09d74b365fe8fc57fcd7df72e51a09bb60d6..104e3243c43212b7d2698e1d045cca2197a04aae 100644 --- a/doc/user/application_security/policies/pipeline_execution_policies.md +++ b/doc/user/application_security/policies/pipeline_execution_policies.md @@ -56,6 +56,7 @@ Note the following: - `.pipeline-policy-post` at the very end of the pipeline, after the `.post` stage. - Injecting jobs in any of the reserved stages is guaranteed to always work. Execution policy jobs can also be assigned to any standard (build, test, deploy) or user-declared stages. However, in this case, the jobs may be ignored depending on the project pipeline configuration. - It is not possible to assign jobs to reserved stages outside of a pipeline execution policy. +- The `override_project_ci` strategy will not override other security policy configurations. - You should choose unique job names for pipeline execution policies. Some CI/CD configurations are based on job names and it can lead to unwanted results if a job exists multiple times in the same pipeline. The `needs` keyword, for example makes one job dependent on another. In case of multiple jobs with the same name, it will randomly depend on one of them. ### Job naming best practice