A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and control, hunt for advanced threats, collaborate with the community, and write detections-as-code.
Running the setup script in a GHA environment generally works -- the sudo prefix is used and doesn't cause problems (Ubuntu GHA runner so it's recognized as linux). However, if a private repo is used to add/replace a service then using sudo prevents the credentials which were associated via docker login.
This is a super simple approach and isn't added to docs/general usage. This use case is kind of specific to some internal testing -- there's not really a reason for a customer to need compatibility with docker login since all of our images are public.
Running the setup script in a GHA environment generally works -- the
sudo
prefix is used and doesn't cause problems (Ubuntu GHA runner so it's recognized as linux). However, if a private repo is used to add/replace a service then using sudo prevents the credentials which were associated viadocker login
.This is a super simple approach and isn't added to docs/general usage. This use case is kind of specific to some internal testing -- there's not really a reason for a customer to need compatibility with
docker login
since all of our images are public.