Clarify security implicatations.

This commit is contained in:
jdiamond 2024-07-29 17:34:10 +00:00
parent 02cae2e61e
commit 10fdf46410

View File

@ -13,10 +13,16 @@
},
// To give the container access to a device serial port, you can uncomment one of the following lines.
// You can explicitly forward the port. The docker user needs to be able to access this port, and this will only work
// if the device is plugged in from the start without reconnecting.
//
// You can explicitly just forward the port you want to connect to. Replace `/dev/ttyACM0` with the serial port for
// your device. This will only work if the device is plugged in from the start without reconnecting. Adding the
// `dialout` group is needed if read/write permisions for the port are limitted to the dialout user.
// "runArgs": ["--device=/dev/ttyACM0", "--group-add", "dialout"],
// Alternatively, you can give more comprehensive access to the host system.
//
// Alternatively, you can give more comprehensive access to the host system. This will expose all the host devices to
// the container. Adding the `dialout` group is needed if read/write permisions for the port are limitted to the
// dialout user. This could allow the container to modify unrelated serial devices, which would be a similar level of
// risk to running the build directly on the host.
// "runArgs": ["--privileged", "-v", "/dev/bus/usb:/dev/bus/usb", "--group-add", "dialout"],
// Set *default* container specific settings.json values on container create.