Integrating Device Farm with a Jenkins CI server
The Jenkins CI plugin provides AWS Device Farm functionality from your own Jenkins continuous integration (CI) server. For
more information, see Jenkins
(software)
Note
To download the Jenkins plugin, go to GitHub
This section contains a series of procedures to set up and use the Jenkins CI plugin with AWS Device Farm.
The following images show the features of the Jenkins CI plugin.
The plugin can also pull down all the test artifacts (logs, screenshots, etc.) locally:
Topics
Dependencies
The Jenkins CI Plugin requires the AWS Mobile SDK 1.10.5 or later. For more information and to install
the SDK, see AWS Mobile SDK
Step 1: Installing the Jenkins CI plugin for AWS Device Farm
There are two options for installing the Jenkins continuous integration (CI)
plugin for AWS Device Farm. You can search for the plugin from within the Available
Plugins dialog in the Jenkins Web UI, or you can download the hpi
file and install it from
within Jenkins.
Install from within the Jenkins UI
Find the plugin within the Jenkins UI by choosing Manage Jenkins, Manage Plugins, and then choose Available.
Search for aws-device-farm.
Install the AWS Device Farm plugin.
Ensure that the plugin is owned by the
Jenkins
user.Restart Jenkins.
Download the plugin
Download the
hpi
file directly from http://updates.jenkins-ci.org/latest/aws-device-farm.hpi. Ensure that the plugin is owned by the
Jenkins
user.-
Install the plugin using one of the following options:
Upload the plugin by choosing Manage Jenkins, Manage Plugins, Advanced, and then choose Upload plugin.
Place the
hpi
file in the Jenkins plugin directory (usually/var/lib/jenkins/plugins
).
Restart Jenkins.
Step 2: Creating an AWS Identity and Access Management user for your Jenkins CI Plugin for AWS Device Farm
We recommend that you do not use your AWS root account to access Device Farm. Instead, create a new AWS Identity and Access Management (IAM) user (or use an existing IAM user) in your AWS account, and then access Device Farm with that IAM user.
To create a new IAM user, see Creating an IAM User (AWS Management Console). Be sure to generate an access key for each user and download or save the user security credentials. You will need the credentials later.
Give the IAM user permission to access Device Farm
To give the IAM user permission to access Device Farm, create a new access policy in IAM, and then assign the access policy to the IAM user as follows.
Note
The AWS root account or IAM user that you use to complete the following steps must have permission to create the following IAM policy and attach it to the IAM user. For more information, see Working with Policies
To create the access policy in IAM
Open the IAM console at https://console.aws.amazon.com/iam/
. -
Choose Policies.
-
Choose Create Policy. (If a Get Started button appears, choose it, and then choose Create Policy.)
-
Next to Create Your Own Policy, choose Select.
-
For Policy Name, type a name for the policy (for example,
AWSDeviceFarmAccessPolicy
). -
For Description, type a description that helps you associate this IAM user with your Jenkins project.
-
For Policy Document, type the following statement:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "DeviceFarmAll", "Effect": "Allow", "Action": [ "devicefarm:*" ], "Resource": [ "*" ] } ] }
-
Choose Create Policy.
To assign the access policy to the IAM user
-
Open the IAM console at https://console.aws.amazon.com/iam/
. -
Choose Users.
-
Choose the IAM user to whom you will assign the access policy.
-
In the Permissions area, for Managed Policies, choose Attach Policy.
-
Select the policy you just created (for example, AWSDeviceFarmAccessPolicy).
-
Choose Attach Policy.
Step 3: Configuring the Jenkins CI plugin for the first time in AWS Device Farm
The first time you run your Jenkins server, you will need to configure the system as follows.
Note
If you are using device slots, the device slots feature is disabled by default.
Log into your Jenkins Web user interface.
On the left-hand side of the screen, choose Manage Jenkins.
Choose Configure System.
Scroll down to the AWS Device Farm header.
Copy your security credentials from Creating an IAM user for your Jenkins CI Plugin and paste your Access Key ID and Secret Access Key into their respective boxes.
Choose Save.
Step 4: Using the plugin in a Jenkins job
Once you have installed the Jenkins plugin, follow these instructions to use the plugin in a Jenkins job.
Log into your Jenkins web UI.
Click the job you want to edit.
On the left-hand side of the screen, choose Configure.
Scroll down to the Post-build Actions header.
Click Add post-build action and select Run Tests on AWS Device Farm.
Select the project you would like to use.
Select the device pool you would like to use.
Select whether you'd like to have the test artifacts (such as the logs and screenshots) archived locally.
In Application, fill in the path to your compiled application.
Select the test you would like run and fill in all the required fields.
Choose Save.