TOC & Recently Viewed

Recently Viewed Topics

Solano Labs

Before You Begin

These instructions describe how to push a Docker image from Solano Labs to Tenable.io Container Security.

These steps assume you are already comfortable using Solano Labs and are already pushing Docker images to a public or private registry. If you are already using Solano Labs, but have not built Docker container images, familiarize yourself with the Solano Labs documentation.

Note: Solano Labs support for building Docker container images is in private beta. For customers interested in participating, Solano Labs recommends contacting Solano Labs support.

Steps

  1. Open the solano.yml file, which should look similar to the following:

    # Use docker-enabled workers (currently private beta - contact support@solanolabs.com)

    system:

    docker: true

    python:

    python_version: 2.7

    hooks:

    pre_setup: |

    set -ex

    sudo apt-get update -qq

    sudo docker pull jenkins

    sudo docker build -t myrepo/jenkins-dsl-ready:my .

    tests:

    - python -m doctest build/resolve_jenkins_plugins_dependencies.py

  2. Add a post_build phase with your Tenable.io Container Security user name.

    # Use docker-enabled workers (currently private beta - contact support@solanolabs.com)

    system:

    docker: true

    python:

    python_version: 2.7

    hooks:

    pre_setup: |

    set -ex

    sudo apt-get update -qq

    sudo docker pull jenkins

    sudo docker build -t myrepo/jenkins-dsl-ready .

    post_build: |

    docker login -u $TENABLE_IO_ACCESS_KEY -p $TENABLE_IO_SECRET_KEY registry.cloud.tenable.com

    docker push myrepo/jenkins-dsl-ready

    tests:

    - python -m doctest build/resolve_jenkins_plugins_dependencies.py

    Solano Labs builds are sent to Tenable.io Container Security for storage, distribution, vulnerability scanning, and malicious code scanning.

Copyright 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.