|
1 | 1 | .. _whats_new:
|
2 | 2 |
|
3 | 3 | ###############################
|
4 |
| -What's New in {Singularity} 4.1 |
| 4 | +What's New in {Singularity} 4.2 |
5 | 5 | ###############################
|
6 | 6 |
|
7 |
| -This section highlights important changes and new features in {Singularity} 4.1 |
| 7 | +This section highlights important changes and new features in {Singularity} 4.2 |
8 | 8 | that are of note to users. See also the "What's New" section in the Admin Guide
|
9 | 9 | for administrator-facing changes.
|
10 | 10 |
|
11 | 11 | If you are upgrading from a 3.x version of {Singularity} we recommend also
|
12 | 12 | reviewing the `"What's New" section for 4.0
|
13 | 13 | <https://docs.sylabs.io/guides/4.0/user-guide/new.html>`__.
|
14 | 14 |
|
15 |
| -******** |
16 |
| -OCI-mode |
17 |
| -******** |
| 15 | +******* |
| 16 | +Runtime |
| 17 | +******* |
18 | 18 |
|
19 |
| -- Singularity will now :ref:`build OCI-SIF images from Dockerfiles |
20 |
| - <dockerfile>`, if the ``--oci`` flag is used with the ``build`` command. |
21 |
| - Provide a Dockerfile as the final argument to ``build``, instead of a |
22 |
| - Singularity definition (.def) file. Supports ``--build-arg`` / |
23 |
| - ``--build-arg-file`` options, ``--arch`` for cross-architecture builds, |
24 |
| - `--authfile` and other authentication options, and more. Dockerfile builds are |
25 |
| - not available on EL7 / SLES12 distributions. |
26 |
| -- `Docker-style SCIF containers <https://sci-f.github.io/tutorial-preview-install>`__ |
27 |
| - are now supported. If the entrypoint of an OCI container is the ``scif`` |
28 |
| - executable, then the ``run`` / ``exec`` / ``shell`` commands in ``--oci`` mode |
29 |
| - can be given the ``--app <appname>`` flag, and will automatically invoke the |
30 |
| - relevant SCIF command. |
31 |
| -- `Multi layer OCI-SIF images <sec:multi_layer_oci_sif>` can now be created |
32 |
| - using a new ``--keep-layers`` flag, for the ``pull`` and ``run/shell/exec`` |
33 |
| - commands. This allows individual layers to be preserved when an OCI-SIF image |
34 |
| - is created from an OCI source. Multi layer OCI-SIF images can be run with |
35 |
| - SingularityCE 4.1 and later. |
36 |
| - |
37 |
| -*********** |
38 |
| -CLI Changes |
39 |
| -*********** |
40 |
| - |
41 |
| -- The ``registry login`` and ``registry logout`` commands now support an |
42 |
| - ``--authfile <path>`` flag, which causes the OCI credentials to be written to |
43 |
| - / removed from a custom file located at ``<path>`` instead of the default |
44 |
| - location (``$HOME/.singularity/docker-config.json``). The commands ``pull``, |
45 |
| - ``push``, ``run``, ``exec``, ``shell``, and ``instance start`` can now also be |
46 |
| - passed a ``--authfile <path>`` option, to read OCI registry credentials from |
47 |
| - this custom file. |
48 |
| -- A new `--tmp-sandbox` flag has been added to the `run / shell / exec / |
49 |
| - instance start` commands. This will force Singularity to extract a container |
50 |
| - to a temporary sandbox before running it, when it would otherwise perform a |
51 |
| - kernel or FUSE mount. |
52 |
| - |
53 |
| -************************ |
54 |
| -Runtime Behavior Changes |
55 |
| -************************ |
56 |
| - |
57 |
| -- In native mode, SIF/SquashFS container images will now be mounted with |
58 |
| - squashfuse when kernel mounts are disabled in ``singularity.conf``, or cannot |
59 |
| - be used (non-setuid / user namespace workflow). If the FUSE mount fails, |
60 |
| - Singularity will fall back to extracting the container to a temporary sandbox |
61 |
| - in order to run it. |
62 |
| -- In native mode, bare extfs container images will now be mounted with |
63 |
| - ``fuse2fs`` when kernel mounts are disabled in ``singularity.conf``, or cannot |
64 |
| - be used (non-setuid / user namespace workflow). |
65 |
| - |
66 |
| -************ |
67 |
| -Deprecations |
68 |
| -************ |
69 |
| - |
70 |
| -- The experimental ``--sif-fuse`` flag, and ``sif fuse`` directive in |
71 |
| - ``singularity.conf`` are deprecated. The flag and directive were used to |
72 |
| - enable experimental mounting of SIF/SquashFS container images with FUSE in |
73 |
| - prior versions of Singularity. From 4.1, FUSE mounts are used automatically |
74 |
| - when kernel mounts are disabled / not available. |
| 19 | +- The new ``--netns-path`` flag takes a path to a network namespace to join when |
| 20 | + starting a container. The root user may join any network namespace. An |
| 21 | + unprivileged user can only join a network namespace specified in the new |
| 22 | + allowed ``netns paths directive`` in ``singularity.conf``, if they are also |
| 23 | + listed in ``allow net users`` / ``allow net groups``. Not currently supported |
| 24 | + with ``--fakeroot``, or in ``--oci`` mode. See :ref:`sec:netns-path`. |
0 commit comments