@@ -110,26 +110,21 @@ In this mode *all* operations run as the user who starts the
110
110
``singularity `` program. However, there are some disadvantages to this
111
111
approach:
112
112
113
- - SIF and other single-file container images cannot be mounted
114
- directly. The container image must be extracted to a directory on
115
- disk to run. This impacts the speed of execution. As a result,
116
- workloads accessing large numbers of small files (as is the case with
117
- python application startup, for example) do not benefit from the
118
- reduced metadata load on the filesystem an image file provides.
119
-
120
- {Singularity} 3.10 introduces experimental functionality to avoid
121
- this image-extraction by mounting the SIF container using
122
- ``squashfuse ``, if available on your system. You can enable this with
123
- the ``--sif-fuse `` flag, or by setting ``sif fuse `` in
124
- ``singularity.conf ``.
125
-
126
- - Replacing direct kernel mounts with a FUSE approach is likely to
127
- cause a significant reduction in performance.
128
-
129
- - The effectiveness of signing and verifying container images is
130
- reduced as, when extracted to a directory, modification of files is
131
- possible and verification of the image's original signature cannot be
132
- performed.
113
+ - SIF and other single-file container images cannot be mounted using kernel
114
+ mounts. {Singularity} will attempt to mount them in user space, using FUSE.
115
+ If this is not possible, the container image must be extracted to a directory
116
+ on disk to run. This impacts the speed of execution. As a result, workloads
117
+ accessing large numbers of small files (as is the case with python
118
+ application startup, for example) do not benefit from the reduced metadata
119
+ load on the filesystem an image file provides. To force extraction to disk,
120
+ instead of FUSE mount, use the ``--tmp-sandbox `` flag. To ensure containers
121
+ are not extracted to disk, even when FUSE mounts fail, use the
122
+ ``--no-tmp-sandbox `` flag.
123
+
124
+ - The effectiveness of signing and verifying container images is reduced. With
125
+ both FUSE mounts, and sandbox directories, the content of the container can
126
+ easily be modified at runtime and verification against the image's original
127
+ signature cannot be performed.
133
128
134
129
- Encryption is not supported. {Singularity} leverages kernel LUKS2
135
130
mounts to run encrypted containers without writing a decrypted
0 commit comments