Skip to content

Fix selinux labeling issues of docker volume mounts#424

Open
Falk358 wants to merge 1 commit intooverleaf:masterfrom
Falk358:selinux-fix
Open

Fix selinux labeling issues of docker volume mounts#424
Falk358 wants to merge 1 commit intooverleaf:masterfrom
Falk358:selinux-fix

Conversation

@Falk358
Copy link
Copy Markdown

@Falk358 Falk358 commented Apr 2, 2026

Description

This pull Request fixes issues on linux systems with selinux installed. It uses A Standard Docker feature which enables selinux to correctly infer security labels for volume mounts created by docker on the local os.

Two suffixes :z or :Z can be added to the volume mount. These suffixes tell Docker to relabel file objects on the shared volumes. The 'z' option tells Docker that the volume content will be shared between containers. Docker will label the content with a shared content label. Shared volumes labels allow all containers to read/write content. The 'Z' option tells Docker to label the content with a private unshared label. Private volumes can only be used by the current container.

Related issues / Pull Requests

Partly solves existing issue with podman (since selinux is often also present) #330

Contributor Agreement

@Falk358
Copy link
Copy Markdown
Author

Falk358 commented Apr 2, 2026

This is my first first pull request on this project, please let me know should I have missed anything!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant