Add the configuration for the OpenSCAP Scan below to your pipeline text file.
In Builds > Pipelines > tasks-pipeline > Actions > Edit
In your pipeline, verify the following variables are there after the version and mvnCmd definitions. Please fill in the values between the quotes if not done previously.
def ocuser = " "
def ocpass = " "
def ocp = " "
For Example:
def ocuser = "userYOUR#"
def ocpass = "openshift"
def ocp = "masterexample.presidioworkshops.com"
In your pipeline, make sure you replaced the Jenkins agent ‘maven’ with ‘jenkins-slave-image-mgmt’.
pipeline {
agent {
label 'jenkins-slave-image-mgmt'
}
In your pipeline, add the OpenSCAP DISA STIG Scan after the Container Vulnerability Scan Stage.
stage('OSCAP DISA STIG Scan') {
steps {
sh "oc login -u $ocuser -p $ocpass --insecure-skip-tls-verify https://$ocp 2>&1"
sh "sshpass -p $ocpass ssh -oStrictHostKeyChecking=no -t $ocuser@$ocp docker login -u $ocuser -p " + '"$(oc whoami -t)"' + " docker-registry-default.apps.$ocp"
sh "sshpass -p $ocpass ssh -oStrictHostKeyChecking=no -t $ocuser@$ocp docker pull docker-registry-default.apps.$ocp/dev-$ocuser/tasks:latest"
sh "sshpass -p $ocpass ssh -oStrictHostKeyChecking=no -t $ocuser@$ocp sudo oscap-docker image docker-registry-default.apps.$ocp/dev-$ocuser/tasks:latest xccdf eval --profile xccdf_org.ssgproject.content_profile_stig-rhel7-disa --report report.html /usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml"
}
}
Save your Jenkins file
Go to Builds > Pipeline
Click Start Pipeline for the pipeline you just created called tasks-pipeline.
Your pipeline should now execute through all the stages you created.
Go ahead and click View Log. This will take you to the Jenkins logs and you can follow the various stages in your pipeline.
When it asks to promote to stage, go ahead and promote it.
You can view the security controls from the OpenSCAP Scan on the jenkins pipeline log.
Please ask your instructor on how you can view the full report.
Your report should look similar to the following: OpenScap DISA STIG SCAN report