mirror of
https://github.com/open-webui/open-webui.git
synced 2026-03-18 21:11:48 -05:00
[PR #16622] [MERGED] Fix/arbitrary uid #10987
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/open-webui/open-webui/pull/16622
Author: @SebLz
Created: 8/14/2025
Status: ✅ Merged
Merged: 8/15/2025
Merged by: @tjbck
Base:
dev← Head:fix/arbitrary-uid📝 Commits (2)
4525ac6feat: add Docker publish workflow for multi-architecture buildsc82183fRemove CI workflow (not part of PR)📊 Changes
1 file changed (+9 additions, -0 deletions)
View changed files
📝
Dockerfile(+9 -0)📄 Description
Prefix:
fixTarget branch:
mainPull Request Checklist
mainfixChangelog Entry
Description
This PR addresses [Discussion #16594](https://github.com/open-webui/open-webui/discussions/16594) and fixes [Issue #16592](https://github.com/open-webui/open-webui/issues/16592) by making the Open WebUI container image arbitrary-UID friendly, ensuring compatibility with OpenShift's restricted Security Context Constraints (SCC) and similar hardened Kubernetes environments.
Currently, running the official image in such environments may fail when the process (running under a random UID with supplemental GID 0) attempts to write to
/root,/appor other application directories that areroot:root 755. This results in permission errors for Python libraries (e.g.,transformers,tiktoken) and application caches.The proposed change ensures these paths are writable by the injected UID's supplemental GID 0 without introducing additional privileges, following best practices for arbitrary-UID container images.
Added
Changed
Adjusted file system permissions in the Dockerfile:
/appand/rootare now group-owned by GID 0 and haveg+rwXpermissions.g+s) to these directories so new files inherit group 0.Deprecated
Removed
Fixed
/rootor application directories under OpenShift's restricted SCC with arbitrary UID injection.Security
Improves security posture by:
USERin the image.Breaking Changes
Additional Information
Related discussion: [#16594](https://github.com/open-webui/open-webui/discussions/16594)
Related issue: [#16592](https://github.com/open-webui/open-webui/issues/16592)
Change should be fully backward-compatible and transparent for standard Docker/K8s usage.
Tested:
I confirm that I have read and fully agree to the [Contributor License Agreement (CLA)](/CONTRIBUTOR_LICENSE_AGREEMENT), and I am providing my contributions under its terms.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.