Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Admin docs dont explain how Apptainer works anywhere #143

Open
deliciouslytyped opened this issue Dec 12, 2023 · 2 comments
Open

Admin docs dont explain how Apptainer works anywhere #143

deliciouslytyped opened this issue Dec 12, 2023 · 2 comments

Comments

@deliciouslytyped
Copy link

Incoming perspective: A few months back I did some preliminary work on introducing Singularity into one of my environments, but I haven't touched it since then and I've forgotten some things.

https://apptainer.org/docs/admin/latest/admin_quickstart.html#architecture-of-apptainer , i.e.

Architecture of {Project}
gives some design goals for Singularity, but I haven't been able to find anything anywhere explaining how Singularity/Apptainer is actually supposed to work and how it compares technologically to "standard" namespaces based containers. I've only found a couple instances of the word chroot in the documentation but none of them are about explaining Apptainers mechanisms.

This would also be helpful because my other major use case is being able to point someone else to something summarizing how the technology is supposed to work.

There is a very old FAQ mentioned here that I haven't been able to find any existing instances of https://stackoverflow.com/questions/45169598/chroot-vs-singularity -> http://singularity.lbl.gov/faq#how-is-singularity-different-from-chroot , the question just doesn't seem to exist anywhere.

@deliciouslytyped
Copy link
Author

deliciouslytyped commented Dec 12, 2023

My understanding is that Apptainer/Singularity is supposed to provide "container" style / filesystem image based portability similar to "standard" Linux style containers, but without any privileged mechanisms (though now user namespace and related functionality is an optional feature).

The fakeroot and security documentation pages explain a lot of the security mechanisms (again, no mention of chroot), but it's not clear how Apptainer/Singularity is different from standard containers when:

  • running in fully unprivileged mode (must use a different set of mechanisms than namespaces?)
  • running in rootless (user namespace) mode (uses namespaces, but then how is it different from docker/podman? is it just inertia of the singularity supporting feature set?)
  • running in suid mode (...?)

@DrDaveD
Copy link
Contributor

DrDaveD commented Dec 13, 2023

If you're asking for an update to the docs, that will require someone willing to contribute the time to write that up.

If you're more interested in getting an answer to your questions than getting it into the documentation, I suggest raising the issue on one of the forums, that is, the mailing list or Slack.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants