Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Next »

A Jenkins pipeline unavoidably uses confidential information such as usernames and passwords which need to be protected from unauthorised access and alteration. Jenkins enables this by allowing the variables used in your pipeline definition (stored in the file Jenkinsfile) to be sourced from your Jenkins Credentials which are then accessed via properties on your Jenkins Agents. To be more explicit:

Location

JENKINSFILE ${env.variables}

NODE VARIABLES

GLOBAL CREDENTIALS

Contents

Names of NODE VARIABLES

Names of GLOBAL CREDENTIALS

The actual (potentially encrypted) values used at runtime

Environment and Local Variables

Note that the Jenkins Credentials Binding Plugin is used to take the values of encrypted environment variables and place their values into variables within the scope of the pipeline step.

For Example:

withCredentials([
      string(credentialsId: "${env.MY_ENVIRONMENT_VARIABLE}", variable: 'MY_LOCAL_VAR'),
])

Example

Jenkinsfile

This Jenkinsfile contains a reference to a variable ${env.MCIPASSWORD}

Node Variable

The reference ${env.MCIPASSWORD} is an environment variable which is one of the properties of a Jenkins Agent (sometimes referred to as a Jenkins Node) using to execute the relevant pipeline stage(s):

Node Properties for this Agent include the referenced Environment Variable:

See Using Jenkins Agents - Jenkins documentation

From the Jenkins documentation:

Environment variables defined here will be made available to every build executed by this agent, and will override any environment variables that have the same Name as those defined on the Configure System page.

Using the syntax $NAME or ${NAME} (%NAME% on Windows), these variables can be used in job configurations, or from process launched by a build.

Jenkins also supports a special syntax, BASE+EXTRA, which allows you to add multiple key-value pairs here, which will be prepended to an existing environment variable.

For example, if you have a machine which has PATH=/usr/bin, you could add to the standard path by defining an environment variable here, with the name PATH+LOCAL_BIN and value /usr/local/bin.
This would result in PATH=/usr/local/bin:/usr/bin being exported during builds executed on this machine. PATH+LOCAL_BIN=/usr/local/bin will also be exported.
Multiple entries are prepended to the "base" variable according to the alphabetical order of the "extra" part of the name.

If the Value is empty or whitespace-only, it will not be added to the environment, nor will it override or unset any environment variable with the same name that may already exist (e.g. a variable defined by the system).

Global Credentials

Jenkins Credentials may be of a variety of types, including…

  • Username with password

  • Docker Host Certificate Authentication

  • SSH Username with private key

  • Secret file

  • Secret text

  • Certificate

In this example the Node’s Environment Variable with the ID MCIPASSWORD has, in this example, the value demo115-MCIPassword which is actually the ID of a value in your Jenkins Credentials store (see below). You can see from the Key icon in the 'T' column that that these credentials are of the type Secret text.

Taking a look at the specified value reveals the actual value used by the Jenkins pipeline at runtime:

  • No labels