Skip to content

Commit c1b600d

Browse files
committed
syntax and readme updates
1 parent 62fab9f commit c1b600d

4 files changed

Lines changed: 13 additions & 9 deletions

File tree

Dockerfile

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
# syntax=docker/dockerfile:1
2+
13
FROM ghcr.io/linuxserver/baseimage-selkies:alpine322
24

35
# set version label
@@ -36,6 +38,6 @@ RUN \
3638
COPY /root /
3739

3840
# ports and volumes
39-
EXPOSE 3000
41+
EXPOSE 3001
4042

4143
VOLUME /config

Dockerfile.aarch64

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
# syntax=docker/dockerfile:1
2+
13
FROM ghcr.io/linuxserver/baseimage-selkies:alpine322
24

35
# set version label
@@ -36,6 +38,6 @@ RUN \
3638
COPY /root /
3739

3840
# ports and volumes
39-
EXPOSE 3000
41+
EXPOSE 3001
4042

4143
VOLUME /config

README.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,8 @@ By default, this container has no authentication. The optional `CUSTOM_USER` and
8080

8181
The web interface includes a terminal with passwordless `sudo` access. Any user with access to the GUI can gain root control within the container, install arbitrary software, and probe your local network.
8282

83+
While not generally recommended, certain legacy environments specifically those with older hardware or outdated Linux distributions may require the deactivation of the standard seccomp profile to get containerized desktop software to run. This can be achieved by utilizing the `--security-opt seccomp=unconfined` parameter. It is critical to use this option only when absolutely necessary as it disables a key security layer of Docker, elevating the potential for container escape vulnerabilities.
84+
8385
### Options in all Selkies-based GUI containers
8486

8587
This container is based on [Docker Baseimage Selkies](https://github.com/linuxserver/docker-baseimage-selkies), which provides the following environment variables and run configurations to customize its functionality.
@@ -189,8 +191,6 @@ services:
189191
container_name: wireshark
190192
cap_add:
191193
- NET_ADMIN
192-
security_opt:
193-
- seccomp:unconfined #optional
194194
network_mode: host
195195
environment:
196196
- PUID=1000
@@ -201,6 +201,7 @@ services:
201201
ports:
202202
- 3000:3000 #optional
203203
- 3001:3001 #optional
204+
shm_size: "1gb"
204205
restart: unless-stopped
205206
```
206207
@@ -211,13 +212,13 @@ docker run -d \
211212
--name=wireshark \
212213
--net=host \
213214
--cap-add=NET_ADMIN \
214-
--security-opt seccomp=unconfined `#optional` \
215215
-e PUID=1000 \
216216
-e PGID=1000 \
217217
-e TZ=Etc/UTC \
218218
-p 3000:3000 `#optional` \
219219
-p 3001:3001 `#optional` \
220220
-v /path/to/wireshark/config:/config \
221+
--shm-size="1gb" \
221222
--restart unless-stopped \
222223
lscr.io/linuxserver/wireshark:latest
223224
```
@@ -235,7 +236,7 @@ Containers are configured using parameters passed at runtime (such as those abov
235236
| `-e PGID=1000` | for GroupID - see below for explanation |
236237
| `-e TZ=Etc/UTC` | specify a timezone to use, see this [list](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones#List). |
237238
| `-v /config` | Users home directory in the container, stores program settings and potentially dump files. |
238-
| `--security-opt seccomp=unconfined` | For Docker Engine only, many modern gui apps need this to function on older hosts as syscalls are unknown to Docker. |
239+
| `--shm-size=` | Recommended for all desktop images. |
239240
| `--cap-add=NET_ADMIN` | Required to allow packet capture. |
240241

241242
### Portainer notice

readme-vars.yml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,8 @@ opt_param_usage_include_ports: true
2828
opt_param_ports:
2929
- {external_port: "3000", internal_port: "3000", port_desc: "WireShark desktop gui HTTPS, must be proxied."}
3030
- {external_port: "3001", internal_port: "3001", port_desc: "WireShark desktop gui HTTPS, only use this if you are not using host mode and sniffing Docker network traffic."}
31-
opt_security_opt_param: true
32-
opt_security_opt_param_vars:
33-
- {run_var: "seccomp=unconfined", compose_var: "seccomp:unconfined", desc: "For Docker Engine only, many modern gui apps need this to function on older hosts as syscalls are unknown to Docker."}
31+
custom_params:
32+
- {name: "shm-size", name_compose: "shm_size", value: "1gb", desc: "Recommended for all desktop images."}
3433
# Selkies blurb settings
3534
selkies_blurb: true
3635
# application setup block

0 commit comments

Comments
 (0)