Replies: 4 comments 6 replies
-
Thanks for keeping track of this! ❤️ |
Beta Was this translation helpful? Give feedback.
-
Yes I am able to run Frigate without This is what I did: I confirmed this with: Then I wanted to add udev rules. I was looking for parameters for this device and found the following. At the time of searching it was mounted under
Next step add a rule to my custom udev rules and added this one to my file After a reload of the rules(
But there I made a mistake. Since I don't know yet how to change S6 overlay to use custom users, for testing purposes I have changed it to: Then I went trying to mount a subtree without root. This is almost impossible, because the main tree needs root. So I decided to -instead of mounting a volume- mount it as a device. This worked in my docker-compose:
But since this can always change, I tried adding a SYMLINK: This worked! I now have a
So now I can change my docker-compose to basically any subtree in
The only thing I don't understand (yet) is how S6 works with dropping priviliges. I could use some help there. But for now, I run Frigate without |
Beta Was this translation helpful? Give feedback.
-
Quickly chipping in.... I too noticed ID changed in the past while I was also trying to make this work "rock solid". I'm quite busy past 3 weeks, should have time to try the recipe later this week. |
Beta Was this translation helpful? Give feedback.
-
Looks like we're observing this effect here: google-coral/edgetpu#536. So there might not be a way around specifying the two sets of ids in the udev rules. |
Beta Was this translation helpful? Give feedback.
-
Derived from a closed ticket(#41).
I think we can all agree that more security on Frigate is very much wanted. Using a specific UID and GID will be the best final solution, but dropping the
privileged: true
will be a major step forward already.The main issue will be probably if it is possible to use Frigate as non-root and still be able to access the Google Coral.
I think there are three (main) challenges.
1:
/dev/dri/renderD128
. In synology this is indeed mapped to group videodriver. Noted by @weltenwort :2: Coral USB drive. I am not sure if it is possible to only mount a subtree. Other issue I see is that you never know which device it gets mounted to? For Zigbee and Z-wave sticks I use these udev statements:
To be honest I am lacking knowledge here.
3: Frigate seems to use S6-Overlay. There is also the possibility to drop privileges within S6-Overlay: user-directive
Just wanted to open this discussion to keep this topic active. I think a lot of people using Frigate are worried about the excessive privileges needed. Especially when running on a NAS. Not because I don't trust Frigate, but because of massive privilege escalation possibilities if there is a breach somewhere.
Related issues:
blakeblackshear/frigate#3434
blakeblackshear/frigate#3108
Beta Was this translation helpful? Give feedback.
All reactions