
When you run rootless podman, it uses a user namespace to map between the user IDs in the container and the user IDs on your host. Rootless podman (running Podman as a non-root user) needs to do some gymnastics to get the same container experience you’re familiar with from docker, but without requiring root. You need to understand how rootless podman works That is, if you run ps -ef on the host, and find your containerised process, this is the UID that you will see in the process list. The third column shows who the process is really running as, on the host. You can set this with podman using the -u option - e.g. The second column is the user that the container process is running as. Do you run the command as the root user (e.g. The first column is how you’re running podman. This table shows you the 4 main rootless/rootful operating modes of Podman, and how they really work in practice. Or, you could just run your process as the root user inside the container.Check that the permissions are OK, by listing the directory inside the container.Use podman unshare chown to grant the container user ID permissions to write to your directory.

Get the UID of the container user first.
#Get info mac ignore ownership on this volume how to

Podman is architected like classic Linux tools – it’s lightweight, it doesn’t ask for more permissions than it needs, and it cooperates willingly with SELinux. It’s daemonless (unlike docker) and it’s designed to play a bit nicer in the Linux ecosystem, from the ground up. Podman is the new tool for running containers.
