Skip to content

fix: use UID 1000 for container user to match typical Linux host users#77

Merged
sgasser merged 1 commit intomainfrom
fix/container-uid-permissions
Mar 13, 2026
Merged

fix: use UID 1000 for container user to match typical Linux host users#77
sgasser merged 1 commit intomainfrom
fix/container-uid-permissions

Conversation

@sgasser
Copy link
Owner

@sgasser sgasser commented Mar 2, 2026

Summary

  • Changes container UID from 1001 to 1000
  • Fixes permission denied errors when mounting volumes

Root cause

The Presidio base image uses UID 1001, but most Linux desktop users have UID 1000. When bind-mounting ./data, the host directory is owned by UID 1000, so the container process (UID 1001) couldn't write to it.

Test plan

  • Build image locally: docker compose build
  • Run with volume mount: docker compose up -d
  • Verify no permission errors in logs: docker compose logs pasteguard

Fixes #76

Fixes permission denied errors when mounting volumes. Most Linux desktop
users have UID 1000, so bind-mounted directories now work without manual
chown.

Fixes #76
@sgasser sgasser force-pushed the fix/container-uid-permissions branch from 893b2ca to 295b3fd Compare March 13, 2026 07:48
@sgasser sgasser merged commit 6162bc3 into main Mar 13, 2026
3 checks passed
@sgasser sgasser deleted the fix/container-uid-permissions branch March 13, 2026 08:02
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Cant start Container with persistent data, unable top open database file

1 participant