Releases: sylabs/singularity
SingularityCE 4.0.1
SingularityCE 4.0.1 is a patch release in the 4.0 series, with bug fixes and minor updates.
New Features & Functionality
- Added the upcoming NVIDIA driver library
libnvidia-gpucomp.soto the
list of libraries to add to NVIDIA GPU-enabled containers.
Bug Fixes
- Don't bind
/var/tmpon top of/tmpin the container, where/var/tmpresolves to same location as/tmp. - Fix problem where credentials locally stored with
registry logincommand were not usable in some execution flows. Runregistry loginagain with latest version to ensure credentials are stored correctly. - Don't fail in a yum bootstrap on systems where the _db_backend rpm macros is not defined (EL <8).
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-4.0.1.tar.gz download below to obtain and install SingularityCE 4.0.1. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.21.3
SingularityCE 4.0.0
We are pleased to announce the availability of SingularityCE 4.0.0. This is a new major version, with the new OCI-mode becoming fully supported and expanded to use OCI-SIF images. v4.0.0 also introduces a number of CLI improvements, templating support for definition files, improved platform/architecture handling for OCI images, and much more.
Please review the changelog carefully, as it highlights behavior changes that may impact some workflows. You may also wish to read the 'What's new in SingularityCE 4.0' sections of the:
OCI-mode
Singularity 4 introduces OCI-mode as a fully supported feature. It is enabled by using the --oci flag with the run / shell / exec / pull commands, or by setting oci mode = yes in singularity.conf.
In OCI-mode:
- Container images from OCI sources will be
pull-ed to an OCI-SIF file. An OCI-SIF file encapsulates the OCI image configuration and squashed filesystem using an OCI, rather than Singularity specific, structure. - The
run / shell / execcommands use a low-level OCI runtime (crun/runc) for container execution. - Default operation is compatible with other OCI tools, similar to using
--compatin Singularity's non-OCI native mode. - OCI-modes support running existing Singularity non-OCI-SIF images, and can be made to imitate native mode default behavior by using the
--no-compatflag.
OCI-mode changes from 3.11 to 4.0 include:
run / shell / execin OCI-mode now includes support for the following existing CLI flags:--add-caps--drop-caps--keep-privs--no-privs--overlayfrom directories, bare squashfs and extfs images.--workdir--scratch--no-home--no-mount(dev cannot be disabled in OCI mode)--no-umask(with--no-compat)--writable-tmpfs(with--no-compat)
- Added
--deviceflag to "action" commands (run/exec/shell) when run in OCI mode (--oci). Currently supports passing one or more (comma-separated) fully-qualified CDI device names, and those devices will then be made available inside the container. - Added
--cdi-dirsflag to override the default search locations for CDI json files, allowing, for example, users who don't have root access on their host machine to nevertheless create CDI mappings (into containers run with--fakeroot, for example). - A container run as root, or with
--fakeroot, has OCI default effective/permitted capabilities. - An
--env-fileis evaluated with respect to the host environment, to match native mode behaviour. - If the kernel does not support unprivileged overlays, OCI-mode will attempt to use
fuse-overlayfsandfusermountfor overlay mounting and unmounting. - Support for thee
SINGULARITY_CONTAINLIBSenv var, to specify libraries to bind into/.singularity.d/libs/in the container. - Support for running OCI-SIF images directly from
docker://,http://,https://andoras://URIs. - A new
--no-compatflag can be used with OCI-mode to mirror singularity's historic native mode behavior on a variety of settings, instead of setting them the way other OCI runtimes typically do:$HOME,/tmp,/var/tmpare bind mounted from the host.- The full
/devis bind mounted from the host, unlessmount dev = minimalinsingularity.conf(requirescrun, not applied withrunc). bind pathentries insingularity.confare mounted into the container.- The current working directory is mounted into the container, and is the entry point into the container.
- The container is read-only unless
--writable-tmpfsis also used. - The host umask is propagated into the container, unless
--no-umaskis also used. - When a native (non-OCI-SIF) image is run in OCI-mode, environment variables will be shell evaluated on container startup.
- The
pullcommand now accepts a new flag--ocifor OCI image sources. This will create an OCI-SIF image rather than convert to Singularity's native container format. - OCI-SIF containers can be pushed/pulled to/from OCI registries as single file artifacts using
oras://URIs. - OCI-SIF containers can be pushed/pulled to/from registries as OCI images, with a single squashfs layer, using
docker://URIs. - A new
oci modedirective insingularity.confcan be set to true to enable OCI-mode by default. It can be negated with a new--no-ocicommand line flag.
See the admin guide and user guide for full requirements of OCI-mode and usage information.
Changed defaults / behaviours
Packages / Requirements
- RPM packages now use
/var/lib/singularity(rather than/var/singularity) to store local state files. - Bash completions are now install to the modern
share/bash-completion/completionslocation, rather than underetc. - The
--vmand related flags to start singularity inside a VM have been removed. This functionality was related to the retired Singularity Desktop / SyOS projects. - Singularity uses
squashfuse_ll/squashfuse, which is now built from a git submodule unless--without-squashfuseis specified as an argument tomconfig. When built with--without-squashfuse,squashfuse_llorsquashfusewill be located onPATH. Version 0.2.0 or later is required.
CLI
- The commands related to OCI/Docker registries that were under
remotehave been moved to their own, dedicatedregistrycommand. Runsingularity help registryfor more information. - The
remote listsubcommand now outputs only remote endpoints (with keyservers and OCI/Docker registries having been moved to separate commands), and the output has been streamlined. - Adding a new remote endpoint using the
singularity remote addcommand will now set the new endpoint as default. This behavior can be suppressed by supplying the--no-default(or-n) flag toremote add. - The keyserver-related commands that were under
remotehave been moved to their own, dedicatedkeyservercommand. Runsingularity help keyserverfor more information. - Improved the clarity of
singularity key listoutput. --cwdis now the preferred form of the flag for setting the container's working directory, though--pwdis still supported for compatibility.
Runtime Behaviour
- The way
--homeis handled when running as root (e.g.sudo singularity) or with--fakeroothas changed. Previously, we were only modifying theHOMEenvironment variable in these cases, while leaving the container's/etc/passwdfile unchanged (with its homedir field pointing to/root, regardless of the value passed to--home). With this change, both the value ofHOMEand the contents of/etc/passwdin the container will reflect the value passed to--home. - Bind mounts are now performed in the order of their occurrence on the command line, or within the value of the
SINGULARITY_BINDenvironment variable. (Previously, image-mounts were always performed first, regardless of order.) - Default OCI config generated with
singularity mountno longer sets any inheritable / ambient capabilites, matching other OCI runtimes. singularity oci mountnow uses, and requires,squashfuse_llorsquashfuseto mount a SIF image to an OCI bundle. Note thatsquashfuse_llis built with singularity unless--without-squashfuseis passed tomconfig.- The current working directory is created in the container when it doesn't exist, so that it can be entered. You must now specify
--no-mount home,cwdinstead of just--no-mount hometo avoid mounting from$HOMEif you runsingularityfrom inside$HOME. - If the path of the current working directory in the container and on the host contain symlinks to different locations, it will not be mounted.
New Features & Functionality
- Templating support for definition files: users can now define variables in definition files via a matching pair of double curly brackets. Variables of the form
{{ variable }}will be replaced by a value defined either by avariable=valueentry in the%argumentssection of the definition file, or through new build options--build-argor--build-arg-file. - Added
--secretflag (shorthand:-s) tokey removesubcommand, to allow removal of a private key by fingerprint. - Added
--privateas a synonym for--secretinkey list,key export, andkey removesubcommands. - The
remote statuscommand will now print the username, realname, and email of the logged-in user, if available. - The
cachecommands now accept--type oci-sifto list and clean cached OCI-SIF image conversions of OCI sources. - The
instance startcommand now accepts an optional--app <name>argument which invokes start script within the%appstart <name>section in the definition file. Theinstance stopcommand still only requires the instance name. - A new
--no-pidflag forsingularity run/shell/execdisables the PID namespace inferred by--containalland--compat. - A new
--platformflag can be used to specify anOS/Architecture[/Variant]when pulling images from OCI or library sources. When pulling from library sources the optional variant is ignored. - The
--archflag can now be used to specify a required architecture when pulling images from OCI, as well as library sources. - Execution flows that unpack an image into a temporary sandbox dir can now be disabled, by setting "tmp sandbox = no" in
singularity.confor by passing--no-tmp-sandboxto the relevantrun / shell / execcommand.
Developer / API
- Support for image driver plugins, deprecated at 3.11, has been removed. Unprivileged kernel overlay is supp...
SingularityCE 3.11.5
SingularityCE 3.11.5 is a patch release in the 3.11 series, with changes detailed below.
Changed defaults / behaviours
- If commands that expect an image file are given an OCI-SIF image, an error will be generated advising the user that this format is only supported in versions 4.0 and up.
Bug Fixes
- Improved help text for
compileandinstallsubcommands ofplugincommand. Thanks to tonghuaroot (https://github.com/tonghuaroot) for the suggested improvements.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.11.5.tar.gz download below to obtain and install SingularityCE 3.11.5. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.21.1
SingularityCE 4.0.0 Release Candidate 2
SingularityCE 4.0.0-rc.2 is a release candidate for the upcoming 4.0.0 release, with the changes detailed below relative to 4.0.0-rc.1.
See the 4.0.0-rc.1 release notes for a full changelog.
OCI-mode
- If system does not meet the requirements for using OCI-SIF, OCI mode will fall back to a filesystem-based strategy: the OCI container will be unpacked into a temporary sandbox dir and run from there.
New Features & Functionality
- Execution flows that unpack an image into a temporary sandbox dir can now be disabled, by setting "tmp sandbox = no" in
singularity.confor by passing--no-tmp-sandboxto the relevantrun / shell / execcommand.
Bug Fixes
- Improved help text for
compileandinstallsubcommands ofplugincommand. Thanks to tonghuaroot (https://github.com/tonghuaroot) for the suggested improvements. - Fix compilation with the
mconfig-boption (custom builddir).
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-4.0.0-rc.2.tar.gz download below to obtain and install SingularityCE 4.0.0-rc.2. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.21.0
SingularityCE 4.0.0 Release Candidate 1
SingularityCE 4.0.0-rc.1 is a release candidate for the upcoming 4.0.0 release, with changes detailed below.
OCI-mode
Singularity 4 introduces OCI-mode as a fully supported feature. It is enabled by using the --oci flag with the run / shell / exec / pull commands, or by setting oci mode = yes in singularity.conf.
In OCI-mode:
- Container images from OCI sources will be
pull-ed to an OCI-SIF file. An OCI-SIF file encapsulates the OCI image configuration and squashed filesystem using an OCI, rather than Singularity specific, structure. - The
run / shell / execcommands use a low-level OCI runtime (crun/runc) for container execution. - Default operation is compatible with other OCI tools, similar to using
--compatin Singularity's non-OCI native mode. - OCI-modes support running existing Singularity non-OCI-SIF images, and can be made to imitate native mode default behavior by using the
--no-compatflag.
OCI-mode changes from 3.11 to 4.0 include:
run / shell / execin OCI-mode now includes support for the following existing CLI flags:--add-caps--drop-caps--keep-privs--no-privs--overlayfrom directories, bare squashfs and extfs images.--workdir--scratch--no-home--no-mount(dev cannot be disabled in OCI mode)--no-umask(with--no-compat)--writable-tmpfs(with--no-compat)
- Added
--deviceflag to "action" commands (run/exec/shell) when run in OCI mode (--oci). Currently supports passing one or more (comma-separated) fully-qualified CDI device names, and those devices will then be made available inside the container. - Added
--cdi-dirsflag to override the default search locations for CDI json files, allowing, for example, users who don't have root access on their host machine to nevertheless create CDI mappings (into containers run with--fakeroot, for example). - A container run as root, or with
--fakeroot, has OCI default effective/permitted capabilities. - An
--env-fileis evaluated with respect to the host environment, to match native mode behaviour. - If the kernel does not support unprivileged overlays, OCI-mode will attempt to use
fuse-overlayfsandfusermountfor overlay mounting and unmounting. - Support for thee
SINGULARITY_CONTAINLIBSenv var, to specify libraries to bind into/.singularity.d/libs/in the container. - Support for running OCI-SIF images directly from
docker://,http://,https://andoras://URIs. - A new
--no-compatflag can be used with OCI-mode to mirror singularity's historic native mode behavior on a variety of settings, instead of setting them the way other OCI runtimes typically do:$HOME,/tmp,/var/tmpare bind mounted from the host.- The full
/devis bind mounted from the host, unlessmount dev = minimalinsingularity.conf(requirescrun, not applied withrunc). bind pathentries insingularity.confare mounted into the container.- The current working directory is mounted into the container, and is the entry point into the container.
- The container is read-only unless
--writable-tmpfsis also used. - The host umask is propagated into the container, unless
--no-umaskis also used. - When a native (non-OCI-SIF) image is run in OCI-mode, environment variables will be shell evaluated on container startup.
- The
pullcommand now accepts a new flag--ocifor OCI image sources. This will create an OCI-SIF image rather than convert to Singularity's native container format. - OCI-SIF containers can be pushed/pulled to/from OCI registries as single file artifacts using
oras://URIs. - OCI-SIF containers can be pushed/pulled to/from registries as OCI images, with a single squashfs layer, using
docker://URIs. - A new
oci modedirective insingularity.confcan be set to true to enable OCI-mode by default. It can be negated with a new--no-ocicommand line flag.
See the admin guide and user guide for full requirements of OCI-mode and usage information.
Changed defaults / behaviours
Packages / Requirements
- RPM packages now use
/var/lib/singularity(rather than/var/singularity) to store local state files. - Bash completions are now install to the modern
share/bash-completion/completionslocation, rather than underetc. - The
--vmand related flags to start singularity inside a VM have been removed. This functionality was related to the retired Singularity Desktop / SyOS projects. - Singularity uses
squashfuse_ll/squashfuse, which is now built from a git submodule unless--without-squashfuseis specified as an argument tomconfig. When built with--without-squashfuse,squashfuse_llorsquashfusewill be located onPATH. Version 0.2.0 or later is required.
CLI
- The commands related to OCI/Docker registries that were under
remotehave been moved to their own, dedicatedregistrycommand. Runsingularity help registryfor more information. - The
remote listsubcommand now outputs only remote endpoints (with keyservers and OCI/Docker registries having been moved to separate commands), and the output has been streamlined. - Adding a new remote endpoint using the
singularity remote addcommand will now set the new endpoint as default. This behavior can be suppressed by supplying the--no-default(or-n) flag toremote add. - The keyserver-related commands that were under
remotehave been moved to their own, dedicatedkeyservercommand. Runsingularity help keyserverfor more information. - Improved the clarity of
singularity key listoutput. --cwdis now the preferred form of the flag for setting the container's working directory, though--pwdis still supported for compatibility.
Runtime Behaviour
- The way
--homeis handled when running as root (e.g.sudo singularity) or with--fakeroothas changed. Previously, we were only modifying theHOMEenvironment variable in these cases, while leaving the container's/etc/passwdfile unchanged (with its homedir field pointing to/root, regardless of the value passed to--home). With this change, both the value ofHOMEand the contents of/etc/passwdin the container will reflect the value passed to--home. - Bind mounts are now performed in the order of their occurrence on the command line, or within the value of the
SINGULARITY_BINDenvironment variable. (Previously, image-mounts were always performed first, regardless of order.) - Default OCI config generated with
singularity mountno longer sets any inheritable / ambient capabilites, matching other OCI runtimes. singularity oci mountnow uses, and requires,squashfuse_llorsquashfuseto mount a SIF image to an OCI bundle. Note thatsquashfuse_llis built with singularity unless--without-squashfuseis passed tomconfig.- The current working directory is created in the container when it doesn't exist, so that it can be entered. You must now specify
--no-mount home,cwdinstead of just--no-mount hometo avoid mounting from$HOMEif you runsingularityfrom inside$HOME. - If the path of the current working directory in the container and on the host contain symlinks to different locations, it will not be mounted.
New Features & Functionality
- Templating support for definition files: users can now define variables in definition files via a matching pair of double curly brackets. Variables of the form
{{ variable }}will be replaced by a value defined either by avariable=valueentry in the%argumentssection of the definition file, or through new build options--build-argor--build-arg-file. - Added
--secretflag (shorthand:-s) tokey removesubcommand, to allow removal of a private key by fingerprint. - Added
--privateas a synonym for--secretinkey list,key export, andkey removesubcommands. - The
remote statuscommand will now print the username, realname, and email of the logged-in user, if available. - The
cachecommands now accept--type oci-sifto list and clean cached OCI-SIF image conversions of OCI sources. - The
instance startcommand now accepts an optional--app <name>argument which invokes start script within the%appstart <name>section in the definition file. Theinstance stopcommand still only requires the instance name. - A new
--no-pidflag forsingularity run/shell/execdisables the PID namespace inferred by--containalland--compat. - A new
--platformflag can be used to specify anOS/Architecture[/Variant]when pulling images from OCI or library sources. When pulling from library sources the optional variant is ignored. - The
--archflag can now be used to specify a required architecture when pulling images from OCI, as well as library sources.
Developer / API
- Support for image driver plugins, deprecated at 3.11, has been removed. Unprivileged kernel overlay is supported without a plugin. In
singularity.conf, theimage driverdirective has been removed, andenable overlayno longer supports thedriveroption. - Changes in
pkg/build/types.Definitionstruct. New.FullRawfield introduced, which always contains the raw data for the entire definition file. Behavior of.Rawfield has changed: for multi-stage builds parsed withpkg/build/types/parser.All(),.Rawcontains the raw content of a single build stage. Otherwise, it is equal to.FullRaw. - The SingularityCE go module is now
github.com/sylabs/singularity/v4, reflecting the major version of the application.
Bug Fixes
- Fix interaction between
--workdirwhen given relative path and--scratch. - Set correct
$HOMEin--ocimode whenmount home = noinsingularity.conf. - Lookup a...
SingularityCE 3.11.4
SingularityCE 3.11.4 is a patch release in the 3.11 series, with changes detailed below.
Changed defaults / behaviours
- Add
xino=onmount option for writable kernel overlay mount points to fix inode numbers consistency after kernel cache flush.
New Features & Functionality
- The
tapCNI plugin, new to github.com/containernetworking/plugins v1.3.0, is now provided. - Added
remote get-login-passwordsubcommand that allows the user to retrieve a CLI token to interact with the OCI registry of a
Singularity Enterprise instance. - Added
--no-setgroupsflag for--fakerootbuilds and run/shell/exec. This prevents thesetgroupssyscall being used on the container process in the fakeroot user namespace. Maintains access from within the user namespace to files on the host that have permissions based on supplementary group membership. Note that supplementary groups are mapped tonobodyin the container, andchgrp,newgrp, etc. cannot be used. - Added ability to set a custom user config directory (default
$HOME/.singularity) via the newSINGULARITY_CONFIGDIRenvironment variable.
Bug Fixes
- In
--ocimode, do not attempt to use unprivileged overlay on systems that do not support it. - Fix dropped "n" characters on some platforms in definition file stored as part of SIF metadata.
- Pass STDIN to
--ocicontainers correctly, to fix piping input to a container. - Fix compilation on 32-bit systems.
- Fix seccomp filters to allow mknod/mknodat syscalls to create pipe/socket and character devices with device number 0 for fakeroot builds.
- Fix freeze when copying files between stages in an unprivileged proot build.
- Fix non-POSIX sh operator in mconfig.
- Correct internal name for CAP_BLOCK_SUSPEND.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.11.4.tar.gz download below to obtain and install SingularityCE 3.11.4. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.20.5
SingularityCE 3.11.3
SingularityCE 3.11.3 is a patch release in the 3.11 series, with changes detailed below.
Changed defaults / behaviours
--ocimode now provides a writable container by default, using a tmpfs overlay. This improves parity with--compatmode in the native runtime, as--compatenables--writable-tmpfs.
Bug Fixes
- Ensure the
allow kernel squashfsdirective insingularity.confapplies to encrypted squashfs filesystems in a SIF.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.11.3.tar.gz download below to obtain and install SingularityCE 3.11.3. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.20.4
SingularityCE 3.11.2
SingularityCE 3.11.2 is a patch release in the 3.11 series, with changes detailed below.
New Features & Functionality
- OCI mode now supports
--hostname(requires UTS namespace, therefore this flag will infer--uts). - OCI mode now supports
--scratch(shorthand:-S) to mount a tmpfs scratch directory in the container. - Support
--pwdin OCI mode. - OCI mode now supports
--home. Supplying a single location (e.g.--home /myhomedir) will result in a new tmpfs directory being created at the specified location inside the container, and that dir being set as the in-container user's home dir. Supplying two locations separated by a colon (e.g.--home /home/user:/myhomedir) will result in the first location on the host being bind-mounted as the second location in-container, and set as the in-container user's home dir. - OCI mode now handles
--dnsandresolv.confon par with native mode: the--dnsflag can be used to pass a comma-separated list of DNS servers that will be used in the container; if this flag is not used, the container will use the sameresolv.confsettings as the host. - Added
allow kernel squashfsdirective tosingularity.conf. Defaults toyes. When set to no, Singularity will not mount squashfs filesystems using the kernel squashfs driver. - Added
allow kernel extfsdirective tosingularity.conf. Defaults toyes. When set to no, Singularity will not mount extfs filesystems using the kernel extfs driver.
Bug Fixes
- Require
runcin RPM packages built on SLES, notcrun, becausecrunis part of the Package Hub community repository that may not be enabled. SingularityCE will still prefercrunif it has been installed. - Use
/dev/loop-controlfor loop device creation, to avoid issues with recent kernel patch wheremax_loopis not set. - Always request inner userns in
--ocimode without--fakeroot, so that inner id mapping is applied correctly. - Use correct target uid/gid for inner id mappings in
--ocimode. - Avoid
runccgroup creation error when using--ocifrom a root-owned cgroup (e.g. ssh login session scope). - Pass host's
TERMenvironment variable to container in OCI mode. Can be overridden by settingSINGULARITYENV_TERMon host. - Honour
config passwdandconfig groupdirectives fromsingularity.confin--ocimode. - Honour
mount proc/mount sys/mount tmp/mount homedirectives fromsingularity.confin--ocimode. - Corrected
singularity.confcomment, to refer to correct file as source of default capabilities whenroot default capabilities = file.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.11.2.tar.gz download below to obtain and install SingularityCE 3.11.2. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.20.3
SingularityCE 3.11.1
SingularityCE 3.11.1 is a bugfix patch release in the 3.11 series, with changes detailed below.
New Features & Functionality
- Add
setoptdefinition file header for theyumbootstrap agent. Thesetoptvalue is passed toyum / dnfusing the--setoptflag. This permits setting e.g.install_weak_deps=Falseto bootstrap recent versions of Fedora, wheresystemd(a weak dependency) cannot install correctly in the container. Seeexamples/Fedorafor an example defintion file. - Warn user that a
yumbootstrap of an older distro may fail if the host rpm_db_backendis notbdb.
Bug Fixes
- Fix implied
--writable-tmpfswith--nvccli, to avoid r/o filesytem error. - Avoid incorrect error when requesting fakeroot network.
- Pass computed
LD_LIBRARY_PATHto wrapped unsquashfs. Fixes issues whereunsquashfson host uses libraries in non-default paths. - Show correct memory limit in
instance statswhen a limit is set. - Ensure consistent binding of libraries under
--nv/--rocmwhen duplicate<library>.so[.version]files are listed byldconfig -p. - Fix systemd cgroup manager error when running a container as a non-root user with
--oci, on systems with cgroups v1 andrunc. - Fix joining cgroup of instance started as root, with cgroups v1, non-default cgroupfs manager, and no device rules.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.11.1.tar.gz download below to obtain and install SingularityCE 3.11.1. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.20.2
SingularityCE 3.11.0
SingularityCE 3.11.0 is the first release in the 3.11 series, with changes, new features, and bug fixes detailed below.
Changed defaults / behaviours
- Image driver plugins, implementing the
RegisterImageDrivercallback, are deprecated and will be removed in 4.0. Support for the example plugin, permitting Ubuntu unprivileged overlay functionality, has been replaced with direct support for kernel unprivileged overlay. - When the kernel supports unprivileged overlay mounts in a user namespace, the container will be constructed using an overlay instead of underlay layout.
crunwill be used as the low-level OCI runtime, when available, rather thanrunc. Ifcrunis not available,runcwill be used.sessiondir maxsizeinsingularity.confnow defaults to 64 MiB for new installations. This is an increase from 16 MiB in prior versions.- Instances are started in a cgroup, by default, when run as root or when unified cgroups v2 with systemd as manager is configured. This allows
singularity instance statsto be supported by default when possible.
New features / functionality
Image Building
- Support for a custom hashbang in the
%testsection of a Singularity recipe (akin to the runscript and start sections). - Non-root users can now build from a definition file, on systems that do not support
--fakeroot. This requires the statically builtprootcommand (https://proot-me.github.io/) to be available on the userPATH. These builds:- Do not support
arch/debootstrap/yum/zypperbootstraps. Uselocalimage,library,oras, or one of the docker/oci sources. - Do not support
%preand%setupsections. - Run the
%postsections of a build in the container as an emulated root user. - Run the
%testsection of a build as the non-root user, likesingularity test. - Are subject to any restrictions imposed in
singularity.conf. Incur a performance penalty due toproot'sptracebased interception of
syscalls. - May fail if the
%postscript requires privileged operations thatprootcannot emulate.
- Do not support
Instances
- Instances started by a non-root user can use
--apply-cgroupsto apply resource limits. Requires cgroups v2, and delegation configured via systemd. - A new
instance statscommand displays basic resource usage statistics for a specified instance, running within a cgroup. - Instance name is available inside an instance via the new
SINGULARITY_INSTANCEenvironment variable.
Mounts & Overlays
--writable-tmpfsis now available when running unprivileged, or explicitly requesting a user namespace, on systems with a kernel that supports unprivileged overlay mounts in a user namespace.- The
--no-mountflag now accepts the valuebind-pathsto disable mounting of allbind pathentries insingularity.conf. - Persistent overlays (
--overlay) from a directory are now available when running unprivileged, or explicitly requesting a user namespace, on systems with a kernel that supports unprivileged overlay mounts in a user namespace. - Add
--sparseflag tooverlay createcommand to allow generation of a sparse ext3 overlay image.
OCI / Docker Compatibility
- Support for
DOCKER_HOSTparsing when usingdocker-daemon:// DOCKER_USERNAMEandDOCKER_PASSWORDsupported withoutSINGULARITY_prefix.- A new
--ociflag forrun/exec/shellenables the experimental OCI runtime mode. This mode:- Runs OCI container images from an OCI bundle, using
runcorcrun. - Supports
docker://,docker-archive:,docker-daemon:,oci:,oci-archive:image sources. - Does not support running Singularity SIF, SquashFS, or EXT3 images.
- Provides an environment similar to Singularity's native runtime, running with
--compat. - Supports the following options / flags. Other options are not yet supported:
--fakerootfor effective root in the container. Requires subuid/subgid mappings.- Bind mounts via
--bindor--mount. No image mounts. - Additional namespaces requests with
--net,--uts,--user. - Container environment variables via
--env,--env-file, andSINGULARITYENV_host env vars. --rocmto bind ROCm GPU libraries and devices into the container.--nvto bind Nvidia driver / basic CUDA libraries and devices into the container.--apply-cgroups, and the--cpu*,--blkio*,--memory*,--pids-limitflags to apply resource limits.
- Runs OCI container images from an OCI bundle, using
Signing & Verification
- The
signcommand now supports signing with non-PGP key material by specifying the path to a private key via the--keyflag. - The
verifycommand now supports verification with non-PGP key material by specifying the path to a public key via the--keyflag. - The
verifycommand now supports verification with X.509 certificates by specifying the path to a certificate via the--certificateflag. By default, the system root certificate pool is used as trust anchors unless overridden via the--certificate-rootsflag. A pool of intermediate certificates that are not trust anchors, but can be used to form a certificate chain can also be specified via the--certificate-intermediatesflag. - Support for online verification checks of x509 certificates using OCSP protocol. (introduced flag:
verify --ocsp-verify)
Other
- Add new Linux capabilities:
CAP_PERFMON,CAP_BPF,CAP_CHECKPOINT_RESTORE. - A new
--reproducibleflag for./mconfigwill configure Singularity so that its binaries do not contain non-reproducible paths. This disables plugin functionality.
Bug Fixes
- In
--rocmmode, the whole of/dev/driis now bound into the container when--containis in use. This makes/dev/dri/renderdevices available, required for later ROCm versions. - Overlay is blocked on the
panfsfilesystem, allowing sandbox directories to be run frompanfswithout error. - Avoid UID / GID readonly var warnings with --env-file.
Development / Testing
- Significant reduction in the use of network image sources in the e2e tests.
- Improved parallelization and use of image caches in the e2e tests.
- The
e2e-testmakefile target now accepts an argumentE2E_GROUPSto only run specified groups of end to end tests. E.g.make -C builddir e2e-test E2E_GROUPS=VERSION,HELPwill run end to end tests in theVERSIONandHELPgroups only. - The
e2e-testmakefile target now accepts an argumentE2E_TESTSwhich is a regular expression specifying the names of (top level) end to end tests that should be run. E.g.make -C builddir e2e-test E2E_TESTS=^semanticwill only run end to end tests with a name that begins withsemantic. TheseE2E_variables offer an alternative to the-runflag, which may be easier to use given the structure of e2e tests.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.11.0.tar.gz download below to obtain and install SingularityCE 3.11.0. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.19.5