Skip to content

fix(docker): add SELinux labeling to bind mounts#1291

Open
derekwaynecarr wants to merge 1 commit intoNVIDIA:mainfrom
derekwaynecarr:fix/docker-selinux-bind-mounts
Open

fix(docker): add SELinux labeling to bind mounts#1291
derekwaynecarr wants to merge 1 commit intoNVIDIA:mainfrom
derekwaynecarr:fix/docker-selinux-bind-mounts

Conversation

@derekwaynecarr
Copy link
Copy Markdown
Collaborator

Summary

Switch from Docker Mount API to string-based binds API with :z labels to enable SELinux-enforcing systems to access bind-mounted files.

The :z option applies a shared SELinux content label, allowing containers to read supervisor binaries and TLS certificates. Docker safely ignores :z on non-SELinux systems.

Related Issue

Changes

Testing

  • [x ] mise run pre-commit passes
  • [x ] Unit tests added/updated
  • E2E tests added/updated (if applicable)

Checklist

  • [x ] Follows Conventional Commits
  • [ x] Commits are signed off (DCO)
  • Architecture docs updated (if applicable)

Switch from Docker Mount API to string-based binds API with :z labels
to enable SELinux-enforcing systems to access bind-mounted files.

The :z option applies a shared SELinux content label, allowing
containers to read supervisor binaries and TLS certificates.
Docker safely ignores :z on non-SELinux systems.

Signed-off-by: Derek Carr <decarr@redhat.com>
@derekwaynecarr derekwaynecarr requested review from a team, maxamillion and mrunalp as code owners May 9, 2026 12:24
@copy-pr-bot
Copy link
Copy Markdown

copy-pr-bot Bot commented May 9, 2026

This pull request requires additional validation before any workflows can run on NVIDIA's runners.

Pull request vetters can view their responsibilities here.

Contributors can view more details about this message here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant