Reference no: EM133863348
Professional Practice in Information Technology
Building a Jenkins Continuous Delivery Pipeline
Overview
The objective of this assignment is to design and implement a generic Jenkins pipeline that can be used to automate the continuous delivery of software applications. Get online assignment help from Ph.D. experts!
Task Instructions Part 1
Create a new Jenkins pipeline job.
Define the pipeline script in the Jenkinsfile.
The pipeline must have six stages with the following names:
Build
Test
Code Quality Check
Deploy
Approval
Deploy to Production
Define and use environment variables for the pipeline. The following environment variables must be included:
DIRECTORY_PATH: The path of the code directory being fetched.
TESTING_ENVIRONMENT: The name of the testing environment.
PRODUCTION_ENVIRONMENT: The name of the production environment. Use your name as the name of production environment.
Configure the pipeline stages.
In the Build stage, configure the pipeline to print a message that reads: "Fetch the source code from the directory path specified by the environment variable". Add another build step to the job to print this message: "Compile the code and generate any necessary artefacts".
In the Test stage, add steps to print the messages "Unit tests" and "Integration tests".
In the Code Quality Check stage, add a message showing that "Check the quality of the code".
In the Deploy stage, print "Deploy the application to a testing environment specified by the environment variable".
In the Approval stage, add a sleep command to simulate manual approval. The pipeline must pause for 10 seconds before continuing.
In the Deploy to Production stage, add one step to display a message related to deploying the code to the production environment, using the environment variable specifying the environment name.
Run the pipeline and verify that it executes successfully.
Part 2 (One paragraph)
Name three security tools that can be integrated into a DevOps pipeline to enhance or assess the security of an application, such as checking for code vulnerabilities, conducting application security testing, and ensuring compliance and monitoring. Then, briefly discuss how these tools could be used to address cybersecurity concerns, drawing from your own experience (e.g., professional work or assignments from other units).