Last changed
Contact our team to test out this image for free. Please also indicate any other images you would like to evaluate.
A minimal, Wolfi-based container image for Jenkins - an open-source CI/CD server that enables developers to build, test, and deploy their software.
The image is available on cgr.dev:
The following example runs a local instance of Jenkins, specifying a local volume as the jenkins_home for data persistence:
In the console output, the initial admin password will be logged. Use this to login to the Jenkins UI:
Refer to the upstream documentation for full instructions on running and configuring Jenkins.
To run Jenkins in FIPS enabled mode, this image runs with the -Djenkins.security.FIPS140.COMPLIANCE=true property set. This variable must be set to true to inform Jenkins that it should attempt to use compliant algorithms only. However the Jenkins FIPS-140 documentation notes that if "any code from the JVM, servlet container, Jenkins, or any plugin requests a non-compliant algorithm, this will still be the case, and the request may be honoured."
Also note that if you are providing JAVA_OPTS via environment variables, you will need to include the -Djenkins.security.FIPS140.COMPLIANCE=true property since user supplied options will override the image's defaults.
To check that Jenkins is running with FIPS enabled, you can run the following Groovy script via the script console:
The result will be true if Jenkins is configured to use FIPS, and false if it is not.
Chainguard's container images contain software packages that are direct or transitive dependencies. The following licenses were found in the "latest" tag of this image:
Apache-2.0
For a complete list of licenses, please refer to this Image's SBOM.
Software license agreementChainguard Containers are SLSA Level 3 compliant with detailed metadata and documentation about how it was built. We generate build provenance and a Software Bill of Materials (SBOM) for each release, with complete visibility into the software supply chain.
SLSA compliance at ChainguardThis image helps reduce time and effort in establishing PCI DSS 4.0 compliance with low-to-no CVEs.
PCI DSS at ChainguardThis is a FIPS validated image for FedRAMP compliance.
This image is STIG hardened and scanned against the DISA General Purpose Operating System SRG with reports available.
Learn more about STIGsGet started with STIGs