-
Notifications
You must be signed in to change notification settings - Fork 1
Home
This repository contains a Jenkins Pipeline Template Catalog for Application Development Organizations to use to build, scan, publish, and deploy containerized applications at CMS.
The following pipeline templates are available in this catalog:
- SAST Scan - Runs Static Application Security Testing (SAST) scans on the application code (using SonarQube).
- Delivery Pipeline - Runs container build and scan steps and publishes the resulting container image to the CMS container registry (Artifactory).
- GitOps Deployment - Runs steps to deploy the container image to a Kubernetes cluster by updating the image tag in Kubernetes manifests.
The pipeline templates in this catalog are designed to be used by invoking them from another Jenkins Pipeline that will typically be a Multi-Branch Pipeline that runs when the source code of a project changes, and/or can run with different configurations for different branches.
Stage | Step | Tool |
---|---|---|
Build | Build | Application Specific (e.g. Maven, npm, pip) |
Test | Unit Test | Application Specific (e.g. JUnit, Jest, Pytest) |
Test | Lint | Application Specific (e.g. ESLint, Pylint) |
SAST | Scan Source | SonarQube |
Delivery | Build Image | Kaniko |
Delivery | Vulnerability Scan | Snyk |
Delivery | Malware Scan | ClamAV |
Delivery | Publish Image | Crane -> Artifactory |
Deployment | Update Image Tags | Kustomize |
Deployment | Commit & Push | Git -> ArgoCD |
The delivery and deployment model for the pipeline templates in this catalog is based on the GitOps model. The GitOps model is a way to do Continuous Deployment where the desired system state is versioned in a Git repository. The Git repository in this case is a Kubernetes manifest repository that contains the desired state of the Kubernetes cluster. The GitOps model is implemented using ArgoCD, which is a declarative, GitOps continuous delivery tool for Kubernetes.
As code changes are made for an application, the Delivery pipeline can be used to continuously build the latest container image for the application. The resulting container images can be pushed to the CMS container registry (Artifactory). The Delivery pipeline is intended to be run after basic application testing and SAST scanning has been completed. The Delivery pipeline includes steps to scan the resulting container image for vulnerabilities and malware before publishing the image to the container registry. With a container image published to the container registry, it can be leveraged by developers for local testing, or it can be deployed to a Kubernetes cluster using the Deployment pipeline and ArgoCD.
The Deployment pipeline updates references to the container image in the Kubernetes manifests in the manifests repository, and then commits and pushes the changes to the repository. The Deployment pipeline can be configured to target a specific branch and a specific subfolder of the manifests repository, thus allowing for different deployment strategies for different environments, as well as enabling feature branch testing. ArgoCD is configured to watch the manifests repository for changes, and will automatically deploy the updated manifests to the Kubernetes cluster. The Deployment pipeline is intended to be run after the Delivery pipeline has successfully published a container image to the container registry.
To use the Pipeline Templates in this catalog, the CloudBees Pipeline: Templates plugin must be installed and enabled. To make the Pipeline Templates available to your Jenkins instance, perform the following steps:
From the Jenkins dashboard, select "Pipeline Template Catalogs" and then click the "Add catalog" link under that.
Select the Branch or Tag that you want to utilize. Selecting the main
branch will give you the latest version of the templates, however it could lead to breaking changes being automatically introduced during a future update. Selecting a "stable" version branch such as v1
will give you a stable version of the templates that will not introduce breaking changes, but will be updated with bug and security fixes. Selecting a specific version tag such as v1.0.0
will give you a specific version of the templates that will not be updated.
Enter the URL of this repository (https://github.com/CMS-Enterprise/delivery-pipeline-templates.git
) in the "Catalog source code repository location" section, and click Save.
In order to utilize the Pipeline Templates in this catalog, you must create an instance of the template in your Jenkins instance. To do this, click the "New Item" button from the Jenkins dashboard, and select the desired template name: "SAST Scan", "Delivery Pipeline", or "Deployment". Enter a name for the pipeline instance, and click OK.
Once the new Pipeline has been created, you will be prompted to select the parameters for the pipeline. The parameters are specific to each template, and are documented in the README for each template. Specifying parameter values when creating an instance of the template is optional and the specified values only serve as defaults for the parameters when the pipeline is run.
Instances of these Pipeline Templates are not intended to be run manually (although you can do so by clicking the "Build With Parameters" button in Jenkins). Instead, they are intended to be run from another Jenkins Pipeline using the Pipeline: Build Step plugin. This allows a project-specific Jenkins pipeline that is responsible for building and testing the application, using custom tools and scripts for that purpose, to invoke the these Pipelines for steps that are common to multiple applications. For details on how to invoke an instance of one of these Pipeline Templates see the specific template README.
If your project contains multiple applications or services, you can organize your Delivery Pipelines in one of two ways: create separate pipelines for each of your projects that have different default parameter values for that specific application, or create a single pipeline with minimal default settings, that can be invoked from multiple application specific pipelines with different parameter values. The former strategy will result in more pipelines appearing in your Jenkins dashboard, but may make it easier to find a specific pipeline run for a particular application.
For example, if you use a single Delivery pipeline to build the container image for multiple applications, passing the different image name and other parameters from the triggering Jenkins files, this build history for the shared Delivery pipeline will include a mix of pipeline runs for both applications. This can make it more difficult to determine when one application or another is having pipeline failures.