In this exercise we explore the non-functional side of testing.
_____
As a learner you will be able to
- Create additional Jenkins stages to scan for security vulnerabilities in the Apps
- Assess test quiality by producing coveage reports as part of a build
- Improve code readability with linting
- Do some light performance testing to monitor throughput of APIs
Below is a collection of the frameworks that will be used in this lab
This exercise begins cluster containing blah blah
This lesson will use the Exerisise 4's Zap Slave and Arachni scanner to improve the pipeline. Linting will be included in the build and code coverage too.
Add a parallel stage after the e2e tests on the front end to run OWASP Zap and Arachni against the deployed apps.
Add Code Coverage reporing to the build for gaining greater insight into test improvements.
Add npm run lint:ci
to the Frontend and report the result using the Checkstyle Plugin in Jenkins.
Create a new Jenkins job to run some light performance testing against the API layer using the perf tests tasks.
This is a well structured guide with references to exact filenames and indications as to what should be done.
In this exercise the first of our non-functional testing is explored in the form of some security scanning
file1.txt
export SOME_THING=biscuits
New Item
and click it prefix of exercise and why we're doing it
Ideas for go-getters. Advanced topic for doers to get on with if they finish early. These will usually not have a solution and are provided for additional scope.
List of links or other reading that might be of use / reference for the exercise
link back to the deck for the supporting material