Bind mounts and permissions
The previous examples use simple bind mounts with the "-v" option. For integration and testing, bind mounts are an easy way to get started. But when running native Docker on Linux, be aware that the airlock
user inside the container has the UID 1000
by default, which may not match your local user ID.
The UID of the airlock
user will "leak" through to your local filesystem.
Run the following troubleshooting steps, in case you run into problems with file permissions:
You may also use --user $(id -u)
as part of docker run
to use your user ID inside the container:
Be aware that when copying the configuration files to production, or any other machine or environment, you must change the owner back to "1000:0":