Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learning Continuous Integration with Jenkins

You're reading from   Learning Continuous Integration with Jenkins An end-to-end guide to creating operational, secure, resilient, and cost-effective CI/CD processes

Arrow left icon
Product type Paperback
Published in Jan 2024
Publisher Packt
ISBN-13 9781835087732
Length 396 pages
Edition 3rd Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Nikhil Pathania Nikhil Pathania
Author Profile Icon Nikhil Pathania
Nikhil Pathania
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface 1. Part 1: The Concepts FREE CHAPTER
2. Chapter 1: The What, How, and Why of Continuous Integration 3. Part 2: Engineering the CI Ecosystem
4. Chapter 2: Planning, Deploying, and Maintaining Jenkins 5. Chapter 3: Securing Jenkins 6. Chapter 4: Extending Jenkins 7. Chapter 5: Scaling Jenkins 8. Part 3: Crafting the CI Pipeline
9. Chapter 6: Enhancing Jenkins Pipeline Vocabulary 10. Chapter 7: Crafting AI-Powered Pipeline Code 11. Chapter 8: Setting the Stage for Writing Your First CI Pipeline 12. Chapter 9: Writing Your First CI Pipeline 13. Part 4: Crafting the CD Pipeline
14. Chapter 10: Planning for Continuous Deployment 15. Chapter 11: Writing Your First CD Pipeline 16. Chapter 12: Enhancing Your CI/CD Pipelines 17. Index 18. Other Books You May Enjoy

Understanding CSRF protection in Jenkins

CSRF protection settings in Jenkins are designed to prevent malicious attacks that can trick users into performing unintended actions. CSRF attacks occur when an attacker tricks a user’s browser into making unintended requests to a target website, potentially causing unauthorized actions to be executed. In Jenkins, CSRF protection is enabled by default to safeguard against such attacks. The CSRF protection settings ensure that requests made to Jenkins are verified and validated to prevent unauthorized access or actions. Let’s understand this with an example.

In certain scenarios, you may need to trigger a Jenkins pipeline using an external webhook. For instance, when a CI pipeline uploads a new artifact to Artifactory, you may want the Artifactory webhook plugin to trigger a specific performance testing pipeline in Jenkins. External webhooks involving Jenkins typically utilize Jenkins’ REST API, which requires authentication...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime