1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52
|
# Singularity Execution Control List config file
#
# This file describes execution groups in which SIF files are checked for
# authorized loading/execution. The decision is made by validating both the
# location of the sif file in the file system and by checking against a list of
# signing entities.
#
# *****************************************************************************
# WARNING
#
# The ECL is not effective if unprivileged user namespaces are enabled. It is
# only effectively applied when Singularity is running using the native runtime
# in setuid mode, and unprivileged container execution is not possible on the
# host.
#
# You must disable unprivileged user namespace creation on the host if you rely
# on the ECL to limit container execution. This will disable OCI mode, which is
# unprivileged and cannot enforce the ECL.
#
# The ECL only applies to SIF container images. To block execution of other
# images (e.g. ext3 or sandbox containers), you must also disable them in
# singularity.conf
#
# See the 'Security' and 'Configuration Files' sections of the Admin Guide for
# more information.
# *****************************************************************************
#
# The current possible list modes are: whitelist, whitestrict and blacklist.
#
# Example:
#
#activated = true
#
#[[execgroup]]
# tagname = "group1"
# mode = "whitestrict"
# dirpath = "/var/cache/containers"
# keyfp = ["5994BE54C31CF1B5E1994F987C52CF6D055F072B","7064B1D6EFF01B1262FED3F03581D99FE87EAFD1"]
#
#[[execgroup]]
# tagname = "group2"
# mode = "whitelist"
# dirpath = "/tmp/containers"
# keyfp = ["7064B1D6EFF01B1262FED3F03581D99FE87EAFD1"]
#
# The above example defines 2 execution groups (dirpath: /var/cache/containers
# and /tmp/containers), in which only SIF files signed with both Key IDs
# 055F072B and E87EAFD1 may run if started from /var/cache/containers and only
# SIF files signed with Key ID E87EAFD1 may run if started from /tmp/containers.
#
activated = false
|