$ vagrant box add {title} {url}
$ vagrant init {title}
$ vagrant up
Docker is available for Linux, MacOS, and Windows.
Docker for Mac is best installed with Homebrew and Homebrew Cask. For other ways to install on MacOS, see Install Docker for Mac in Docker's docs.
brew cask install docker # Install Docker
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import { Fetcher } from '@commerce/utils/types' | |
import { FetcherError } from '@commerce/utils/errors' | |
import type { Response } from '@vercel/fetch' | |
import { getCustomerToken } from '@framework/utils' | |
async function getText(res: any) { | |
try { | |
return (await res.text()) || res.statusText | |
} catch (error) { | |
return res.statusText |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Introduction | |
When we run docker login, we will often see a warning message that our password is saved encrypted | |
in the Docker configuration file. | |
The warning might be ignored if the account and password to the operating system is not shared | |
with others. However, if it is a shared account, docker login might put your docker account | |
and password in danger. If we check the JSON file, we would find there is an unencrypted | |
representing our password there. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Recently having docker login credentials stored in plain text on a server was bugging me. | |
Granted the credentials are base64 encoded but easily decoded at which point the container r | |
egistry is vulnerable as well. I thought using one of the credential helpers would be quick | |
and simple but I was mistaken. | |
In my case I was using the pass credential helper on a Docker Swarm manager running Ubuntu server. | |
Part of the problem was that docker-credential-pass is not well-documented; I found various resources | |
that got me most of the way there but the complete solution required info across several resources | |
and none of them automated it as much as I wanted. |
NewerOlder