Releases: sylabs/singularity
SingularityCE 3.11.0 Release Candidate 2
This is the second release candidate for the upcoming Singularity 3.11.0 release. Users are encouraged to test and report any issues, but should use the stable 3.10 release for production deployments.
3.11.0 Release Candidate 2 [2023-02-02]
Bug Fixes
- Avoid UID / GID readonly var warnings with
--env-file. - Ensure proot flow does not override
--remotebuild.
3.11.0 Release Candidate 1 [2023-01-11]
Changed defaults / behaviours
- Image driver plugins, implementing the
RegisterImageDrivercallback, are deprecated and will be removed in 4.0. Support for the example plugin, permitting Ubuntu unprivileged overlay functionality, has been replaced with direct support for kernel unprivileged overlay. - When the kernel supports unprivileged overlay mounts in a user namespace, the container will be constructed using an overlay instead of underlay layout.
crunwill be used as the low-level OCI runtime, when available, rather thanrunc. Ifcrunis not available,runcwill be used.sessiondir maxsizeinsingularity.confnow defaults to 64 MiB for new installations. This is an increase from 16 MiB in prior versions.- Instances are started in a cgroup, by default, when run as root or when unified cgroups v2 with systemd as manager is configured. This allows
singularity instance statsto be supported by default when possible.
New features / functionalities
Image Building
- Support for a custom hashbang in the
%testsection of a Singularity recipe (akin to the runscript and start sections). - Non-root users can now build from a definition file, on systems that do not support
--fakeroot. This requires the statically builtprootcommand (https://proot-me.github.io/) to be available on the userPATH. These builds:- Do not support
arch/debootstrap/yum/zypperbootstraps. Uselocalimage,library,oras, or one of the docker/oci sources. - Do not support
%preand%setupsections. - Run the
%postsections of a build in the container as an emulated root user. - Run the
%testsection of a build as the non-root user, likesingularity test. - Are subject to any restrictions imposed in
singularity.conf. Incur a performance penalty due toproot'sptracebased interception of
syscalls. - May fail if the
%postscript requires privileged operations thatprootcannot emulate.
- Do not support
Instances
- Instances started by a non-root user can use
--apply-cgroupsto apply resource limits. Requires cgroups v2, and delegation configured via systemd. - A new
instance statscommand displays basic resource usage statistics for a specified instance, running within a cgroup. - Instance name is available inside an instance via the new
SINGULARITY_INSTANCEenvironment variable.
Mounts & Overlays
--writable-tmpfsis now available when running unprivileged, or explicitly requesting a user namespace, on systems with a kernel that supports unprivileged overlay mounts in a user namespace.- The
--no-mountflag now accepts the valuebind-pathsto disable mounting of allbind pathentries insingularity.conf. - Persistent overlays (
--overlay) from a directory are now available when running unprivileged, or explicitly requesting a user namespace, on systems with a kernel that supports unprivileged overlay mounts in a user namespace. - Add
--sparseflag tooverlay createcommand to allow generation of a sparse ext3 overlay image.
OCI / Docker Compatibility
- Support for
DOCKER_HOSTparsing when usingdocker-daemon:// DOCKER_USERNAMEandDOCKER_PASSWORDsupported withoutSINGULARITY_prefix.- A new
--ociflag forrun/exec/shellenables the experimental OCI runtime mode. This mode:- Runs OCI container images from an OCI bundle, using
runcorcrun. - Supports
docker://,docker-archive:,docker-daemon:,oci:,oci-archive:image sources. - Does not support running Singularity SIF, SquashFS, or EXT3 images.
- Provides an environment similar to Singularity's native runtime, running with
--compat. - Supports the following options / flags. Other options are not yet supported:
--fakerootfor effective root in the container. Requires subuid/subgid mappings.- Bind mounts via
--bindor--mount. No image mounts. - Additional namespaces requests with
--net,--uts,--user. - Container environment variables via
--env,--env-file, andSINGULARITYENV_host env vars. --rocmto bind ROCm GPU libraries and devices into the container.--nvto bind Nvidia driver / basic CUDA libraries and devices into the container.--apply-cgroups, and the--cpu*,--blkio*,--memory*,--pids-limitflags to apply resource limits.
- Runs OCI container images from an OCI bundle, using
Signing & Verification
- The
signcommand now supports signing with non-PGP key material by specifying the path to a private key via the--keyflag. - The
verifycommand now supports verification with non-PGP key material by specifying the path to a public key via the--keyflag. - The
verifycommand now supports verification with X.509 certificates by specifying the path to a certificate via the--certificateflag. By default, the system root certificate pool is used as trust anchors unless overridden via the--certificate-rootsflag. A pool of intermediate certificates that are not trust anchors, but can be used to form a certificate chain can also be specified via the--certificate-intermediatesflag. - Support for online verification checks of x509 certificates using OCSP protocol. (introduced flag:
verify --ocsp-verify)
Other
- Add new Linux capabilities:
CAP_PERFMON,CAP_BPF,CAP_CHECKPOINT_RESTORE. - A new
--reproducibleflag for./mconfigwill configure Singularity so that its binaries do not contain non-reproducible paths. This disables plugin functionality.
Bug Fixes
- In
--rocmmode, the whole of/dev/driis now bound into the container when--containis in use. This makes/dev/dri/renderdevices available, required for later ROCm versions. - Overlay is blocked on the
panfsfilesystem, allowing sandbox directories to be run frompanfswithout error.
Development / Testing
- Significant reduction in the use of network image sources in the e2e tests.
- Improved parallelization and use of image caches in the e2e tests.
- The
e2e-testmakefile target now accepts an argumentE2E_GROUPSto only run specified groups of end to end tests. E.g.make -C builddir e2e-test E2E_GROUPS=VERSION,HELPwill run end to end tests in theVERSIONandHELPgroups only. - The
e2e-testmakefile target now accepts an argumentE2E_TESTSwhich is a regular expression specifying the names of (top level) end to end tests that should be run. E.g.make -C builddir e2e-test E2E_TESTS=^semanticwill only run end to end tests with a name that begins withsemantic. TheseE2E_variables offer an alternative to the-runflag, which may be easier to use given the structure of e2e tests.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.11.0-rc.2.tar.gz download below to obtain and install SingularityCE 3.11.0-rc.2. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.19.3
SingularityCE 3.10.5
SingularityCE 3.10.5 is a security release in the 3.10 series.
We encourage all users to upgrade. Please see the details and CVE/GHSA link below for more information about the vulnerability.
Security Related Fixes
- CVE-2022-23538: The github.com/sylabs/scs-library-client dependency included in SingularityCE >=3.10.0, <3.10.5 may leak user credentials to a third-party service via HTTP redirect. This issue is limited to
library://access to specific Singularity Enterprise 1.x or 3rd party library configurations, which plement a concurrent multi-part download flow. Access to Singularity Enterprise 2.x, or Singularity Container Services (cloud.sylabs.io), does not trigger the vulnerable flow. See the linked advisory for full details.
Commit 7b841c5 updates the dependency, bringing in the fix.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.10.5.tar.gz download below to obtain and install SingularityCE 3.10.5. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.19.5
SingularityCE 3.11.0 Release Candidate 1
This is the first release candidate for the upcoming Singularity 3.11.0 release. Users are encouraged to test and report any issues, but should use the stable 3.10 release for production deployments.
Changed defaults / behaviours
- Image driver plugins, implementing the
RegisterImageDrivercallback, are deprecated and will be removed in 4.0. Support for the example plugin, permitting Ubuntu unprivileged overlay functionality, has been replaced with direct support for kernel unprivileged overlay. - When the kernel supports unprivileged overlay mounts in a user namespace, the container will be constructed using an overlay instead of underlay layout.
crunwill be used as the low-level OCI runtime, when available, rather thanrunc. Ifcrunis not available,runcwill be used.sessiondir maxsizeinsingularity.confnow defaults to 64 MiB for new installations. This is an increase from 16 MiB in prior versions.- Instances are started in a cgroup, by default, when run as root or when unified cgroups v2 with systemd as manager is configured. This allows
singularity instance statsto be supported by default when possible.
New features / functionalities
Image Building
- Support for a custom hashbang in the
%testsection of a Singularity recipe (akin to the runscript and start sections). - Non-root users can now build from a definition file, on systems that do not support
--fakeroot. This requires the statically builtprootcommand (https://proot-me.github.io/) to be available on the userPATH. These builds:- Do not support
arch/debootstrap/yum/zypperbootstraps. Uselocalimage,library,oras, or one of the docker/oci sources. - Do not support
%preand%setupsections. - Run the
%postsections of a build in the container as an emulated root user. - Run the
%testsection of a build as the non-root user, likesingularity test. - Are subject to any restrictions imposed in
singularity.conf. Incur a performance penalty due toproot'sptracebased interception of
syscalls. - May fail if the
%postscript requires privileged operations thatprootcannot emulate.
- Do not support
Instances
- Instances started by a non-root user can use
--apply-cgroupsto apply resource limits. Requires cgroups v2, and delegation configured via systemd. - A new
instance statscommand displays basic resource usage statistics for a specified instance, running within a cgroup. - Instance name is available inside an instance via the new
SINGULARITY_INSTANCEenvironment variable.
Mounts & Overlays
--writable-tmpfsis now available when running unprivileged, or explicitly requesting a user namespace, on systems with a kernel that supports unprivileged overlay mounts in a user namespace.- The
--no-mountflag now accepts the valuebind-pathsto disable mounting of allbind pathentries insingularity.conf. - Persistent overlays (
--overlay) from a directory are now available when running unprivileged, or explicitly requesting a user namespace, on systems with a kernel that supports unprivileged overlay mounts in a user namespace. - Add
--sparseflag tooverlay createcommand to allow generation of a sparse ext3 overlay image.
OCI / Docker Compatibility
- Support for
DOCKER_HOSTparsing when usingdocker-daemon:// DOCKER_USERNAMEandDOCKER_PASSWORDsupported withoutSINGULARITY_prefix.- A new
--ociflag forrun/exec/shellenables the experimental OCI runtime mode. This mode:- Runs OCI container images from an OCI bundle, using
runcorcrun. - Supports
docker://,docker-archive:,docker-daemon:,oci:,oci-archive:image sources. - Does not support running Singularity SIF, SquashFS, or EXT3 images.
- Provides an environment similar to Singularity's native runtime, running with
--compat. - Supports the following options / flags. Other options are not yet supported:
--fakerootfor effective root in the container. Requires subuid/subgid mappings.- Bind mounts via
--bindor--mount. No image mounts. - Additional namespaces requests with
--net,--uts,--user. - Container environment variables via
--env,--env-file, andSINGULARITYENV_host env vars. --rocmto bind ROCm GPU libraries and devices into the container.--nvto bind Nvidia driver / basic CUDA libraries and devices into the container.--apply-cgroups, and the--cpu*,--blkio*,--memory*,--pids-limitflags to apply resource limits.
- Runs OCI container images from an OCI bundle, using
Signing & Verification
- The
signcommand now supports signing with non-PGP key material by specifying the path to a private key via the--keyflag. - The
verifycommand now supports verification with non-PGP key material by specifying the path to a public key via the--keyflag. - The
verifycommand now supports verification with X.509 certificates by specifying the path to a certificate via the--certificateflag. By default, the system root certificate pool is used as trust anchors unless overridden via the--certificate-rootsflag. A pool of intermediate certificates that are not trust anchors, but can be used to form a certificate chain can also be specified via the--certificate-intermediatesflag. - Support for online verification checks of x509 certificates using OCSP protocol. (introduced flag:
verify --ocsp-verify)
Other
- Add new Linux capabilities:
CAP_PERFMON,CAP_BPF,CAP_CHECKPOINT_RESTORE. - A new
--reproducibleflag for./mconfigwill configure Singularity so that its binaries do not contain non-reproducible paths. This disables plugin functionality.
Bug Fixes
- In
--rocmmode, the whole of/dev/driis now bound into the container when--containis in use. This makes/dev/dri/renderdevices available, required for later ROCm versions. - Overlay is blocked on the
panfsfilesystem, allowing sandbox directories to be run frompanfswithout error.
Development / Testing
- Significant reduction in the use of network image sources in the e2e tests.
- Improved parallelization and use of image caches in the e2e tests.
- The
e2e-testmakefile target now accepts an argumentE2E_GROUPSto only run specified groups of end to end tests. E.g.make -C builddir e2e-test E2E_GROUPS=VERSION,HELPwill run end to end tests in theVERSIONandHELPgroups only. - The
e2e-testmakefile target now accepts an argumentE2E_TESTSwhich is a regular expression specifying the names of (top level) end to end tests that should be run. E.g.make -C builddir e2e-test E2E_TESTS=^semanticwill only run end to end tests with a name that begins withsemantic. TheseE2E_variables offer an alternative to the-runflag, which may be easier to use given the structure of e2e tests.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.11.0-rc.1.tar.gz download below to obtain and install SingularityCE 3.11.0-rc.1. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.19.3
SingularityCE 3.10.4
SingularityCE 3.10.4 is a bugfix release in the 3.10 series.
Bug Fixes
- Ensure
make distdoesn't include conmon binary or intermediate files. - Do not hang on pull from http(s) source that doesn't provide a content-length.
- Avoid hang on fakeroot cleanup under high load seen on some
distributions / kernels.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.10.4.tar.gz download below to obtain and install SingularityCE 3.10.4. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.19.3
SingularityCE 3.10.3
SingularityCE 3.10.3 is a security and bugfix release in the 3.10 series. It fixes a vulnerability related to the verification of SIF container image signatures, in the github.com/sylabs/sif dependency, by updating to sif v2.8.1.
We encourage all users to upgrade. Please see the details and CVE/GHSA link below for more information about the vulnerability.
Security Related Fixes
- CVE-2022-39237: The github.com/sylabs/sif/v2 dependency included in SingularityCE <=3.10.3 does not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures. This release updates to sif v2.8.1 which corrects this issue. See the linked advisory for references and a workaround.
Bug Fixes
- Ensure bootstrap_history directory is populated with previous definition files, present in source containers used in a build.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.10.3.tar.gz download below to obtain and install SingularityCE 3.10.3. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.19.2
SingularityCE 3.10.2
SingularityCE 3.10.2 is a patch release in the 3.10 series. It introduces release packages for EL 9 distributions (RHEL, CentOS Stream, AlmaLinux, Rocky Linux) that are built on AlmaLinux 9. It also fixes a bug in the default runscript for converted OCI containers.
The OCI runscript issue, discovered by the Apptainer project on importing 3.10 series changes from SingularityCE, impacts containers that are directly pulled or built from an OCI source without a custom %runscript. SingularityCE 3.10.0 and 3.10.1 generated a default runscript that could not always be executed by other tools. While execution of these containers with recent versions of SingularityCE is not impacted, we advise upgrading so that all containers built are compatible with other tools.
New features / functionalities
- Added EL9 package builds to CI for GitHub releases.
Bug Fixes
- Ensure no empty
ifbranch is present in generated OCI image runscripts. Would prevent execution of container by other tools that are not using mvdan.cc/sh.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.10.2.tar.gz download below to obtain and install SingularityCE 3.10.2. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/AlmaLinux/Rocky 8 (el8)
- RHEL/CentOS/AlmaLinux/Rocky 9 (el9)
These packages were built with Go 1.18.4
SingularityCE 3.10.1
SingularityCE 3.10.1 is a patch release in the 3.10 series, with changes detailed below.
Note - Binary packages released via GitHub for 3.10.1 were built with Go 1.18.4, which addresses a number of CVEs present in earlier versions of Go. Although these are not critically applicable to SingularityCE, you may wish to update if you use the binary packages, or recompile if you build from source.
New features / functionalities
- Debug output can now be enabled by setting the
SINGULARITY_DEBUGenv var. - Debug output is now shown for nested
singularitycalls, in wrappedunsquashfsimage extraction, and build stages.
Bug Fixes
- Fix test code that implied
%test -c <shell>was supported - it is not. - Fix compilation on
mipsel.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.10.1.tar.gz download below to obtain and install SingularityCE 3.10.1. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/Alma/Rocky 8 (el8)
These packages were built with Go 1.18.4
SingularityCE 3.10.0
SingularityCE 3.10.0 is the first release in the 3.10 series, with changes, new features, and bug fixes detailed below.
Please note that some dependencies have changed, the master develop branch has been renamed to main, and you should now use --recurse-submodules when git cloning the SingularityCE source code repository, or checking out a branch / release. See the INSTALL.md or admin guide for details.
Changed defaults / behaviours
masterbranch of GitHub repository has been renamed tomain.oci mountsetsProcess.Terminal: truewhen creating an OCIconfig.json, so thatoci runprovides expected interactive behavior by default.- Default hostname for
oci mountcontainers is nowsingularityinstead ofmrsdalloway. - systemd is now supported and used as the default cgroups manager. Set
systemd cgroups = noinsingularity.confto manage cgroups directly via the cgroupfs. - The
singularity ocicommand group now usesruncto manage containers. - The
singularity ocicommands useconmonwhich is built from a git submodule, unless--without-conmonis specified as an argument tomconfig, in which case Singularity will searchPATHfor conmon. Version >=2.0.24 of conmon is required. - The
singularity ociflags--sync-socket,--empty-process, and--timeouthave been removed. - Don't prompt for y/n to overwrite an existing file when build is called from a non-interactive environment. Fail with an error.
- Plugins must be compiled from inside the SingularityCE source directory, and will use the main SingularityCE
go.modfile. Required for Go 1.18 support. - seccomp support is not disabled automatically in the absence of seccomp headers at build time. Run
mconfigusing--without-seccompand--without-conmonto disable seccomp support and building ofconmon(which requires seccomp headers). - SingularityCE now requires squashfs-tools >=4.3, which is satisfied by current EL / Ubuntu / Debian and other distributions.
- Added
--no-evalto the list of flags set by the OCI/Docker--compatmode (see below).
New features / functionalities
- Updated seccomp support allows use of seccomp profiles that set an error return code with
errnoRetanddefaultErrnoRet. Previously EPERM was hard coded. The exampleetc/seccomp-profiles/default.jsonhas been updated. - Native cgroups v2 resource limits can be specified using the
[unified]key in a cgroups toml file applied via--apply-cgroups. - The
--no-mountflag &SINGULARITY_NO_MOUNTenv var can now be used to disable abind pathentry fromsingularity.confby specifying the absolute path to the destination of the bind. - Non-root users can now use
--apply-cgroupswithrun/shell/execto limit container resource usage on a system using cgroups v2 and the systemd cgroups manager. - Added
--cpu*,--blkio*,--memory*,--pids-limitflags to apply cgroups resource limits to a container directly. - Allow experimental direct mount of SIF images with
squashfusein user-namespace / no-setuid mode. - New action flag
--no-evalwhich:- Prevents shell evaluation of
SINGULARITYENV_ / --env / --env-fileenvironment variables as they are injected in the container, to match OCI behavior. Applies to all containers. - Prevents shell evaluation of the values of
CMD / ENTRYPOINTand command line arguments for containers run or built directly from an OCI/Docker source. Applies to newly built containers only, usesingularity inspectto check version that container was built with.
- Prevents shell evaluation of
- Add support for
%filessection in remote builds, when a compatible remote is used.
Bug Fixes
- Allow
newgidmap / newuidmapthat use capabilities instead of setuid root. - Corrected
key searchoutput for results from some servers, and keys with multiple names. - Pass through a literal
\nin host environment variables to container. - Address 401 error pulling from private library:// projects.
- Correctly launch CleanupHost process only when needed in
--sif-fuseflow. - Add specific error for unreadable image / overlay file.
- Ensure cgroups device limits are default allow per past behavior.
- Improve error message when remote build server does not support the
%filessection.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.10.0.tar.gz download below to obtain and install SingularityCE 3.10.0. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/Alma/Rocky 8 (el8)
These packages were built with Go 1.18.2
SingularityCE 3.10.0 Release Candidate 2
This is the second release candidate for the upcoming SingularityCE 3.10 release.
The following changes are present in addition to those introduced in RC1 (https://github.com/sylabs/singularity/releases/tag/v3.10.0-rc.1)
New features / functionalities
- Add support for
%filessection in remote builds, when a compatible remote is used.
Bug Fixes
- Correctly launch CleanupHost process only when needed in
--sif-fuseflow. - Add specific error for unreadable image / overlay file.
- Ensure cgroups device limits are default allow per past behavior.
- Improve error message when remote build server does not support the
%filessection.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.10.0-rc.2.tar.gz download below to obtain and install SingularityCE 3.10.0-rc.2. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/Alma/Rocky 8 (el8)
These packages were built with Go 1.18.2
SingularityCE 3.10.0 Release Candidate 1
This is the first release candidate for the upcoming SingularityCE 3.10 release.
We would be grateful for any testing you can perform, and all feedback you can give. As this is a pre-release, you may not want to install it on a production system
Changed defaults / behaviours
oci mountsetsProcess.Terminal: truewhen creating an OCIconfig.json, so thatoci runprovides expected interactive behavior by default.- Default hostname for
oci mountcontainers is nowsingularityinstead ofmrsdalloway. - systemd is now supported and used as the default cgroups manager. Set
systemd cgroups = noinsingularity.confto manage cgroups directly via the cgroupfs. - The
singularity ocicommand group now usesruncto manage containers. - The
singularity ocicommands useconmonwhich is built from a git submodule, unless--without-conmonis specified as an argument tomconfig, in which case Singularity will searchPATHfor conmon. Version >=2.0.24 of conmon is required. - The
singularity ociflags--sync-socket,--empty-process, and--timeouthave been removed. - Don't prompt for y/n to overwrite an existing file when build is called from a non-interactive environment. Fail with an error.
- Plugins must be compiled from inside the SingularityCE source directory, and will use the main SingularityCE
go.modfile. Required for Go 1.18 support. - seccomp support is not disabled automatically in the absence of seccomp headers at build time. Run
mconfigusing--without-seccompand--without-conmonto disable seccomp support and building ofconmon(which requires seccomp headers). - SingularityCE now requires squashfs-tools >=4.3, which is satisfied by current EL / Ubuntu / Debian and other distributions.
- Added
--no-evalto the list of flags set by the OCI/Docker--compatmode (see below).
New features / functionalities
- Updated seccomp support allows use of seccomp profiles that set an error return code with
errnoRetanddefaultErrnoRet. Previously EPERM was hard coded. The exampleetc/seccomp-profiles/default.jsonhas been updated. - Native cgroups v2 resource limits can be specified using the
[unified]key in a cgroups toml file applied via--apply-cgroups. - The
--no-mountflag &SINGULARITY_NO_MOUNTenv var can now be used to disable abind pathentry fromsingularity.confby specifying the absolute path to the destination of the bind. - Non-root users can now use
--apply-cgroupswithrun/shell/execto limit container resource usage on a system using cgroups v2 and the systemd cgroups manager. - Added
--cpu*,--blkio*,--memory*,--pids-limitflags to apply cgroups resource limits to a container directly. - Allow experimental direct mount of SIF images with
squashfusein user-namespace / no-setuid mode. - New action flag
--no-evalwhich:- Prevents shell evaluation of
SINGULARITYENV_ / --env / --env-fileenvironment variables as they are injected in the container, to match OCI behavior. Applies to all containers. - Prevents shell evaluation of the values of
CMD / ENTRYPOINTand command line arguments for containers run or built directly from an OCI/Docker source. Applies to newly built containers only, usesingularity inspectto check version that container was built with.
- Prevents shell evaluation of
Bug Fixes
- Allow
newgidmap / newuidmapthat use capabilities instead of setuid root. - Corrected
key searchoutput for results from some servers, and keys with multiple names. - Pass through a literal
\nin host environment variables to container. - Address 401 error pulling from private library:// projects.
Thanks / Reporting Bugs
Thanks to our contributors for code, feedback and, testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to: [email protected]
Have fun!
Downloads
Source Code
Please use the singularity-ce-3.10.0-rc.1.tar.gz download below to obtain and install SingularityCE 3.10.0. The GitHub auto-generated 'Source Code' downloads do not include required dependencies etc.
Packages
RPM / DEB packages are provided for:
- Ubuntu 18.04 (bionic)
- Ubuntu 20.04 (focal)
- Ubuntu 22.04 (jammy)
- RHEL/CentOS 7 (el7)
- RHEL/CentOS/Alma/Rocky 8 (el8)
These packages were built with Go 1.18.1