Replies: 4 comments 1 reply
-
I'm transferring the issue to podman repository as podman machine, mounts, etc are managed in this repository. |
Beta Was this translation helpful? Give feedback.
-
Here's the relevant podman version info too:
|
Beta Was this translation helpful? Give feedback.
-
podman run --rm -it -v You are running rootless containers, which will run as root inside of a user namespace. Docker does not do this since it runs as root. Could you try podman run --userns=keep-id --rm -it -v |
Beta Was this translation helpful? Give feedback.
-
This does not work for me 😞
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Bug description
Coming from Docker Desktop and Rancher Desktop, I'm used to having scripts run the container as the same uid/gid as the OS user (
-u $(id -u):$(id -g)
) when there is a need to attach volumes for writing files to persist outside the container runtime, and for those files written out to be owned by the OS user uid/gid.However, with Podman Desktop and using the default podman machine it creates out of the box, running these same scripts fail with permission denied errors unless I run the container as the root uid/gid.
Operating system
macOS Ventura 13.4.1 (Arm)
Installation Method
Brew (macOS)
Version
1.1.0
Steps to reproduce
Installed Podman Desktop on macOS using brew:
brew install --cask podman-desktop
Example fails to create file
test
as my uid/gid in container:Example creates file
test
as root uid/gid in container:Relevant log output
No response
Additional context
No response
Beta Was this translation helpful? Give feedback.
All reactions