Clarify security implicatations.
This commit is contained in:
		| @@ -13,10 +13,16 @@ | ||||
| 	}, | ||||
|  | ||||
| 	// To give the container access to a device serial port, you can uncomment one of the following lines. | ||||
| 	// You can explicitly forward the port. The docker user needs to be able to access this port, and this will only work | ||||
| 	// if the device is plugged in from the start without reconnecting. | ||||
| 	// | ||||
| 	// You can explicitly just forward the port you want to connect to. Replace `/dev/ttyACM0` with the serial port for | ||||
| 	// your device. This will only work if the device is plugged in from the start without reconnecting. Adding the | ||||
| 	// `dialout` group is needed if read/write permisions for the port are limitted to the dialout user. | ||||
| 	// "runArgs": ["--device=/dev/ttyACM0", "--group-add", "dialout"], | ||||
| 	// Alternatively, you can give more comprehensive access to the host system. | ||||
| 	// | ||||
| 	// Alternatively, you can give more comprehensive access to the host system. This will expose all the host devices to | ||||
| 	// the container. Adding the `dialout` group is needed if read/write permisions for the port are limitted to the | ||||
| 	// dialout user. This could allow the container to modify unrelated serial devices, which would be a similar level of | ||||
| 	// risk to running the build directly on the host. | ||||
| 	// "runArgs": ["--privileged", "-v", "/dev/bus/usb:/dev/bus/usb", "--group-add", "dialout"], | ||||
|  | ||||
| 	// Set *default* container specific settings.json values on container create. | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 jdiamond
					jdiamond