Singularity 3.5.1 Release
This is the first bugfix release for Singularity 3.5
New features / functionalities
A single feature has been added in the bugfix release, with specific
functionality:
- A new option
allow container encrypted
can be set tono
in
singularity.conf
to prevent execution of encrypted containers.
Bug Fixes
This bugfix release addresses the following issues:
- Fixes a disk space leak when building from docker-archive.
- Makes container process SIGABRT return the expected code.
- Fixes the
inspect
command in unprivileged workflows. - Sets an appropriate default umask during build stages, to avoid issues with
very restrictive user umasks. - Fixes an issue with build script content being consumed from STDIN.
- Corrects the behavior of underlay with non-empty / symlinked CWD and absolute
symlink binds targets. - Fixes execution of containers when binding BTRFS filesystems.
- Fixes build / check failures for MIPS & PPC64.
- Ensures file ownership maintained when building image from sandbox.
- Fixes a squashfs mount error on kernel 5.4.0 and above.
- Fixes an underlay fallback problem, which prevented use of sandboxes on
lustre filesystems.
Known Issues
The following are known issues in this release, and will be addressed in an upcoming version of Singularity:
- Using
--fakeroot
to build sandboxes to GPFS, and most sandboxes to Lustre filesystems, is known not to work. As a workaround you may built to a local filesystem, e.g./tmp/mysandbox
and copy to GPFS/Lustre. - Caching of
http(s)://
image sources is incorrect. Images with the same final part in the URL will be considered the same image. Use--disable-cache
orsingularity cache clean
between runs, or usesingularity pull
to explicitly fetch the image to a local SIF file.
Thanks to our contributors for code, feedback, and testing efforts!
As always, please report any bugs to: https://github.com/sylabs/singularity/issues/new
If you think that you've discovered a security vulnerability please report it to:
[email protected]
Have fun!