deployments-cicd
Original:🇺🇸 English
Not Translated
Vercel deployment and CI/CD expert guidance. Use when deploying, promoting, rolling back, inspecting deployments, building with --prebuilt, or configuring CI workflow files for Vercel.
2installs
Sourcevercel/vercel-plugin
Added on
NPX Install
npx skill4agent add vercel/vercel-plugin deployments-cicdSKILL.md Content
Vercel Deployments & CI/CD
You are an expert in Vercel deployment workflows — , , , , , and CI/CD pipeline integration with GitHub Actions, GitLab CI, and Bitbucket Pipelines.
vercel deployvercel promotevercel rollbackvercel inspectvercel buildDeployment Commands
Preview Deployment
bash
# Deploy from project root (creates preview URL)
vercel
# Equivalent explicit form
vercel deployPreview deployments are created automatically for every push to a non-production branch when using Git integration. They provide a unique URL for testing.
Production Deployment
bash
# Deploy directly to production
vercel --prod
vercel deploy --prod
# Force a new deployment (skip cache)
vercel --prod --forceBuild Locally, Deploy Build Output
bash
# Build locally (uses development env vars by default)
vercel build
# Build with production env vars
vercel build --prod
# Deploy only the build output (no remote build)
vercel deploy --prebuilt
vercel deploy --prebuilt --prodWhen to use : Custom CI pipelines where you control the build step, need build caching at the CI level, or need to run tests between build and deploy.
--prebuiltPromote & Rollback
bash
# Promote a preview deployment to production
vercel promote <deployment-url-or-id>
# Rollback to the previous production deployment
vercel rollback
# Rollback to a specific deployment
vercel rollback <deployment-url-or-id>Promote vs deploy --prod: is instant — it re-points the production alias without rebuilding. Use it when a preview deployment has been validated and is ready for production.
promoteInspect Deployments
bash
# View deployment details (build info, functions, metadata)
vercel inspect <deployment-url>
# List recent deployments
vercel ls
# View logs for a deployment
vercel logs <deployment-url>
vercel logs <deployment-url> --followCI/CD Integration
Required Environment Variables
Every CI pipeline needs these three variables:
bash
VERCEL_TOKEN=<your-token> # Personal or team token
VERCEL_ORG_ID=<org-id> # From .vercel/project.json
VERCEL_PROJECT_ID=<project-id> # From .vercel/project.jsonSet these as secrets in your CI provider. Never commit them to source control.
GitHub Actions
yaml
name: Deploy to Vercel
on:
push:
branches: [main]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Install Vercel CLI
run: npm install -g vercel
- name: Pull Vercel Environment
run: vercel pull --yes --environment=production --token=${{ secrets.VERCEL_TOKEN }}
- name: Build
run: vercel build --prod --token=${{ secrets.VERCEL_TOKEN }}
- name: Deploy
run: vercel deploy --prebuilt --prod --token=${{ secrets.VERCEL_TOKEN }}OIDC Federation (Secure Backend Access)
Vercel OIDC federation is for secure backend access — letting your deployed Vercel functions authenticate with third-party services (AWS, GCP, HashiCorp Vault) without storing long-lived secrets. It does not replace for CLI deployments.
VERCEL_TOKENWhat OIDC does: Your Vercel function requests a short-lived OIDC token from Vercel at runtime, then exchanges it with an external provider's STS/token endpoint for scoped credentials.
What OIDC does not do: Authenticate the Vercel CLI in CI pipelines. All , , and commands still require .
vercel pullvercel buildvercel deploy--token=${{ secrets.VERCEL_TOKEN }}When to use OIDC:
- Serverless functions that need to call AWS APIs (S3, DynamoDB, SQS)
- Functions authenticating to GCP services via Workload Identity Federation
- Any runtime service-to-service auth where you want to avoid storing static secrets in Vercel env vars
GitLab CI
yaml
deploy:
image: node:20
stage: deploy
script:
- npm install -g vercel
- vercel pull --yes --environment=production --token=$VERCEL_TOKEN
- vercel build --prod --token=$VERCEL_TOKEN
- vercel deploy --prebuilt --prod --token=$VERCEL_TOKEN
only:
- mainBitbucket Pipelines
yaml
pipelines:
branches:
main:
- step:
name: Deploy to Vercel
image: node:20
script:
- npm install -g vercel
- vercel pull --yes --environment=production --token=$VERCEL_TOKEN
- vercel build --prod --token=$VERCEL_TOKEN
- vercel deploy --prebuilt --prod --token=$VERCEL_TOKENCommon CI Patterns
Preview Deployments on PRs
yaml
# GitHub Actions
on:
pull_request:
types: [opened, synchronize]
jobs:
preview:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- run: npm install -g vercel
- run: vercel pull --yes --environment=preview --token=${{ secrets.VERCEL_TOKEN }}
- run: vercel build --token=${{ secrets.VERCEL_TOKEN }}
- id: deploy
run: echo "url=$(vercel deploy --prebuilt --token=${{ secrets.VERCEL_TOKEN }})" >> $GITHUB_OUTPUT
- name: Comment PR
uses: actions/github-script@v7
with:
script: |
github.rest.issues.createComment({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
body: `Preview: ${{ steps.deploy.outputs.url }}`
})Promote After Tests Pass
yaml
jobs:
deploy-preview:
# ... deploy preview ...
outputs:
url: ${{ steps.deploy.outputs.url }}
e2e-tests:
needs: deploy-preview
runs-on: ubuntu-latest
steps:
- run: npx playwright test --base-url=${{ needs.deploy-preview.outputs.url }}
promote:
needs: [deploy-preview, e2e-tests]
runs-on: ubuntu-latest
if: github.ref == 'refs/heads/main'
steps:
- run: npm install -g vercel
- run: vercel promote ${{ needs.deploy-preview.outputs.url }} --token=${{ secrets.VERCEL_TOKEN }}Global CLI Flags for CI
| Flag | Purpose |
|---|---|
| Authenticate (required in CI) |
| Skip confirmation prompts |
| Execute as a specific team |
| Set working directory |
Best Practices
- Always use in CI — separates build from deploy, enables build caching and test gates
--prebuilt - Use before build — ensures correct env vars and project settings
vercel pull - Prefer over re-deploy — instant, no rebuild, same artifact
promote - Use OIDC federation for runtime backend access — lets Vercel functions auth to AWS/GCP without static secrets (does not replace for CLI)
VERCEL_TOKEN - Pin the Vercel CLI version in CI — can break unexpectedly
npm install -g vercel@latest - Add flag in CI — prevents interactive prompts from hanging pipelines
--yes
Deployment Strategy Matrix
| Scenario | Strategy | Commands |
|---|---|---|
| Standard team workflow | Git-push deploy | Push to main/feature branches |
| Custom CI/CD (Actions, CircleCI) | Prebuilt deploy | |
| Monorepo with Turborepo | Affected + remote cache | |
| Preview for every PR | Default behavior | Auto-creates preview URL per branch |
| Promote preview to production | CLI promotion | |
| Atomic deploys with DB migrations | Two-phase | Run migration → verify → |
| Edge-first architecture | Edge Functions | Set |
Common Build Errors
| Error | Cause | Fix |
|---|---|---|
| Lockfile doesn't match package.json | Run |
| Root directory misconfigured | Set |
| Config syntax error | Validate config locally with |
| Wrong file structure | Move to |
| File permission issue in build | Don't |
Deploy Summary Format
Present a structured deploy result block:
## Deploy Result
- **URL**: <deployment-url>
- **Target**: production | preview
- **Status**: READY | ERROR | BUILDING | QUEUED
- **Commit**: <short-sha>
- **Framework**: <detected-framework>
- **Build Duration**: <duration>If the deployment failed, append:
- **Error**: <summary of failure from logs>For production deploys, also include:
### Post-Deploy Observability
- **Error scan**: <N errors found / clean> (scanned via vercel logs --level error --since 1h)
- **Drains**: <N configured / none>
- **Monitoring**: <active / gaps identified>Deploy Next Steps
Based on the deployment outcome:
- Success (preview) → "Visit the preview URL to verify. When ready, run to promote to production."
/deploy prod - Success (production) → "Your production site is live. Run to see the full project overview."
/status - Build error → "Check the build logs above. Common fixes: verify script in package.json, check for missing env vars with
build, ensure dependencies are installed."/env list - Missing env vars → "Run to sync environment variables locally, or
/env pullto review what's configured on Vercel."/env list - Monorepo issues → "Ensure the correct project root is configured in Vercel project settings. Check for
vercel.json."rootDirectory - Post-deploy errors detected → "Review errors above. Check for details. If drains are configured, correlate with external monitoring."
vercel logs <url> --level error - No monitoring configured → "Set up drains or install an error tracking integration before the next production deploy. Run for a full observability diagnostic."
/status