-
Notifications
You must be signed in to change notification settings - Fork 220
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Let toolbox access dialout group, to be able to use usb devices at /dev/tty* #432
Comments
Yes, I second this. An integrated method for Toolboxs to write to USBs and external devices would be appreciated. |
This is somewhat similar to #430 |
Any news on this? I still need to use workaround to access external devices. |
Which solution do you use? |
Preservation of groups from the host to the toolbox extends to other scenarios as well. I have a directory on the host served by TFTP and writable by Toolbox seems to be lacking any customisation levers. What I really want is just a configuration file where I can say "these paths on the host are mounted to these paths in the toolbox, and these are the permissions and group mappings". In #1297, it is suggested to pass Instead, what I see is hard coded paths. It was easier to customise when Toolbox was just a shell script. Where is the customisability? Where is the portability? |
Duplicate of #1348 |
Now that all the /dev tree is bind-mounted in the toolbox, thanks to #97, all the devices are visible in the toolbox.
The fact is that most of them have the nobody:nobody owner, which for most of the devices is kind of normal and acceptable since they give important/critical hardware devices access. Still, some devices might be used by developers such as dev boards or arduino-like devices.
These device usually requires devices access at /dev/ttyUSB* or /dev/ttyACM* (i.e. arduino) which are covered by the dialout group on the host.
To temporarly (an udev rule can make it permanent but this isn't scalable nor convenient or plug-an-play) access the /dev/ttyACM0 device inside the toolbox, these are the instructions (taken from the silverblue forum:
toolbox enter
/etc/group
(you must use sudo here) and append your username at the end of the dialout lineexit
to come back to the host terminalsudo setfacl -m g:100018:rw /dev/ttyACM0
on the host. This sets up an ACL in the toolbox (the root of the toolbox's GID is 100000 and the dialout GID is 18 on the host) to let the toolbox access the devicecat /dev/ttyACM0
or send some data to the device, you won't get any permission errorThis is fairly inconvenient and not scalable at all (even if you setup an udev rule).
So it would be really great if toolbox could make available the dialout group so that people don't have to fiddle like this to use their programming devices.
The text was updated successfully, but these errors were encountered: