Apptainer Without Setuid

08/25/2022
by   Dave Dykstra, et al.
0

Apptainer (formerly known as Singularity) since its beginning implemented many of its container features with the assistance of a setuid-root program. It still supports that mode, but as of version 1.1.0 it no longer uses setuid by default. This is feasible because it now can mount squash filesystems, mount ext2/3/4 filesystems, and use overlayfs using unprivileged user namespaces and FUSE. It also now enables unprivileged users to build containers, even without requiring system administrators to configure /etc/subuid and /etc/subgid unlike other "rootless" container systems. As a result, all the unprivileged functions can be used nested inside of another container, even if the container runtime prevents any elevated privileges.

READ FULL TEXT

page 1

page 2

page 3

research
12/10/2018

Optimizing Frameworks Performance Using C++ Modules Aware ROOT

ROOT is a core HEP framework which is used broadly in and outside HEP. A...
research
03/09/2021

Dynamic Range Mode Enumeration

The range mode problem is a fundamental problem and there is a lot of wo...
research
09/03/2020

ScalAna: Automating Scaling Loss Detection with Graph Analysis

Scaling a parallel program to modern supercomputers is challenging due t...
research
02/27/2022

Out of Hypervisor (OoH): When Nested Virtualization Becomes Practical

This paper introduces Out of Hypervisor (OoH), a new research axis close...
research
04/11/2020

C++ Modules in ROOT and Beyond

C++ Modules come in C++20 to fix the long-standing build scalability pro...
research
12/24/2022

Kannudi – A Reference Editor for Kannada

Kannudi is a reference editor for Kannada based on OPOK! and OHOK! princ...
research
04/08/2019

Mode-Suppression: A Simple, Stable and Scalable Chunk-Sharing Algorithm for P2P Networks

The ability of a P2P network to scale its throughput up in proportion to...

Please sign up or login with your details

Forgot password? Click here to reset