Also, the host IP detected is actually not routable to host here with podman. AFAIK only host.containers.internal or host.docker.internal should be used, to let Podman/Docker do its magic.
Setting TTRSS_XDEBUG_HOST to host.containers.internal on my end fixes the issue.
Podman can do both, but I am indeed not running it in a privileged mode — which is podman’s default, anyway. I imagine this comes as a result of a growing awareness over blatant security risks Docker’s default rootful approach imposes.
As noted above, the solution would be to map UIDs/GIDs accordingly, which should allow chmod/chown to work as expected.
EDIT: Just realized UID/GID is actually configurable in .env/Dockerfile.
when i was using podman i had to set UID/GID to 0 through .env which made it use my own UIDs otherwise it did strange things with userns.
i don’t support podman though so you’re on your own with anything that doesn’t work. i’m going to split your posts into a separate thread to minimize confusion.