Section 2 - Utilize Deployment Strategies to Design and Build CI/CD Pipelines that Support Continuous Delivery Processes
Circle CI is only one of many options for CI/CD tools. It is a “software as a service” and has a free account that you can use throughout this project, which is ideal for UdaPeople since it’s a start-up running on a shoestring budget!
- Create an account with circleci.com if you haven't already. We recommend the free tier for this course. It includes 2500 credits per week which equals around 70 builds. This should be enough as long as you are conservative with your builds. If you run out of credits, you can create another account and continue working.
- Create a new project in Circle CI using your GitHub repo.
- Notice the
.circleci
folder. This is where your jobs will go.
- Ensure a workflow starts with the jobs in your
.config
file. If you need to take a look at some samples, Circle CI was nice enough to give us a few.
Please watch the video walkthrough of setting up CircleCI here.
Throughout this project, you will be asked to take screenshots or provide URLs to aid in the evaluation process once you're done with the project. It's worth mentioning here since it's much harder to harvest some screen shots once you've passed certain milestones. It's best if you take screenshots along the way and store them in a folder on your computer until you're ready to turn the project in. Also, it's good to keep a document or notepad with the list of urls that are requested.
- Make sure commits/pushes to repo trigger the CI/CD pipeline (this should be automatic after connecting CircleCI to your Github repo).
The goal of a build phase is to compile or lint the source code to check for syntax errors or unintentional typos in code. It’s your first line of defense against bugs as you attempt to integrate the pieces of your project together. This is especially important to UdaPeople because we don’t want to waste credits or time running other steps if the code can’t even compile.
- Find the job named
build-frontend
in the.circleci/config.yml
file.- Add code to build/compile the front-end.
- Find another job named
build-backend
in the.circleci/config.yml
file.- Add code to build/compile the back-end.
- Notice that both jobs have selected a Docker image that is compatible with NodeJS.
- image: circleci/node:13.8.0
- Throughout this project, you should have separate jobs for the front-end and back-end so that failure alerts are more descriptive.
- Jobs should fail if code cannot be compiled (fail for the right reasons), and a failed build should stop all future jobs.
- We have provided an easy-to-fix compile error in the code to prove the jobs fail. Provide a screenshot of jobs that failed because of compile errors. [SCREENSHOT01]
- Fix the compile error so that the pipeline can continue (see code-comment that guides you to the fix).
Unit tests are one of the many very important building blocks of a system that enables Continuous Delivery (notice, we didn’t say “the only or most important thing”). UdaPeople believes that tests should come first just like they do in the scientific method. So, if a test fails, it's because the code is no longer trustworthy. Only trustworthy code should get a ticket to continue the ride!
- Find the jobs named
test-frontend
andtest-backend
in the config file.- For both jobs, select a Docker image that is compatible with NodeJS.
- Write code to run all the unit tests in both layers.
- Remember, we separate the frontend and backend into separate jobs!
- A unit test job should fail the job and prevent any future jobs from running.
- We have provided one failing test in both front-end and back-end. Provide a screenshot of the failed unit tests in the "Test Failures" tab. [SCREENSHOT02]
- Fix the unit tests and make the job succeed.
UdaPeople handles some private information like social security numbers, salary amount, etc. It would be a shame if a package with a known vulnerability left a security hole in our application, giving hackers access to that information! That’s why we should include a job that checks for known vulnerabilities every time we check in new code.
- Find the jobs named
scan-frontend
andscan-backend
in the config file.- For both jobs, select a Docker image that is compatible with NodeJS.
- Write code to check for security vulnerabilities in the packages used in the application.
- Use
npm
to “audit” the code to check for known package vulnerabilities. Justcd
into the directory of front-end and back-end and run the following:
- Use
npm audit --audit-level=critical
- Job should fail if any major vulnerabilities are found (fail for the right reasons). We left you an intentional vulnerability to cause a failure. Provide a screenshot of jobs that failed because of vulnerable packages listed. [SCREENSHOT03]
- Fix the vulnerability using the command below and re-run the job.
npm audit fix --audit-level=critical --force
- A failed analysis should stop all future jobs.
When a build fails for any reason, the UdaPeople dev team needs to know about it. That way they can jump in and save the day (the day that they almost ruined by checking in bad code… but we digress). We’re going to add an alert so that botched builds raise a nice wavy red flag.
- Integrate Slack, email or another communication tool to receive alerts when jobs fail. Our examples are using Slack, but you should feel free to use the communication tool to which you are most accustomed.
- Alerts should include a summary of what happened and a link to the job console output for quick troubleshooting.
- Provide a screenshot of an alert from one of your failed builds. [SCREENSHOT04]