.nh .TH "apptainer" "1" "Apr 2024" "Auto generated by spf13/cobra" "" .SH NAME .PP apptainer-build - Build an Apptainer image .SH SYNOPSIS .PP \fBapptainer build [local options...] \fP .SH DESCRIPTION .PP IMAGE PATH: .PP When Apptainer builds the container, output can be one of a few formats: .EX default: The compressed Apptainer read only image format (default) sandbox: This is a read-write container within a directory structure .EE .PP note: It is a common workflow to use the "sandbox" mode for development of the container, and then build it as a default Apptainer image for production use. The default format is immutable. .PP BUILD SPEC: .PP The build spec target is a definition (def) file, local image, or URI that can be used to create an Apptainer container. Several different local target formats exist: .EX def file : This is a recipe for building a container (examples below) directory: A directory structure containing a (ch)root file system image: A local image on your machine (will convert to sif if it is legacy format) .EE .PP Targets can also be remote and defined by a URI of the following formats: .EX library:// an image library (no default) docker:// a Docker/OCI registry (default Docker Hub) shub:// an Apptainer registry (default Singularity Hub) oras:// an OCI registry that holds SIF files using ORAS .EE .PP Temporary files: .PP The location used for temporary directories defaults to '/tmp' but can be overridden by the TMPDIR environment variable, and that can be overridden by the APPTAINER_TMPDIR environment variable. The temporary directory used during a build must be on a filesystem that has enough space to hold the entire container image, uncompressed, including any temporary files that are created and later removed during the build. You may need to set APPTAINER_TMPDIR or TMPDIR when building a large container on a system that has a small /tmp filesystem. .SH OPTIONS .PP \fB-B\fP, \fB--bind\fP=[] a user-bind path specification. spec has the format src[:dest[:opts]],where src and dest are outside and inside paths. If dest is not given,it is set equal to src. Mount options ('opts') may be specified as 'ro'(read-only) or 'rw' (read/write, which is the default).Multiple bind paths can be given by a comma separated list. .PP \fB--build-arg\fP=[] defines variable=value to replace {{ variable }} entries in build definition file .PP \fB--build-arg-file\fP="" specifies a file containing variable=value lines to replace '{{ variable }}' with value in build definition files .PP \fB--disable-cache\fP[=false] do not use cache or create cache .PP \fB--docker-host\fP="" specify a custom Docker daemon host .PP \fB--docker-login\fP[=false] login to a Docker Repository interactively .PP \fB-e\fP, \fB--encrypt\fP[=false] build an image with an encrypted file system .PP \fB-f\fP, \fB--fakeroot\fP[=false] build with the appearance of running as root (default when building from a definition file unprivileged) .PP \fB--fix-perms\fP[=false] ensure owner has rwX permissions on all container content for oci/docker sources .PP \fB-F\fP, \fB--force\fP[=false] overwrite an image file if it exists .PP \fB-h\fP, \fB--help\fP[=false] help for build .PP \fB--json\fP[=false] interpret build definition as JSON .PP \fB--library\fP="" container Library URL .PP \fB--mount\fP=[] a mount specification e.g. 'type=bind,source=/opt,destination=/hostopt'. .PP \fB--no-cleanup\fP[=false] do NOT clean up bundle after failed build, can be helpful for debugging .PP \fB--no-https\fP[=false] use http instead of https for docker:// oras:// and library:///... URIs .PP \fB-T\fP, \fB--notest\fP[=false] build without running tests in %test section .PP \fB--nv\fP[=false] inject host Nvidia libraries during build for post and test sections .PP \fB--nvccli\fP[=false] use nvidia-container-cli for GPU setup (experimental) .PP \fB--passphrase\fP[=false] prompt for an encryption passphrase .PP \fB--pem-path\fP="" enter an path to a PEM formatted RSA key for an encrypted container .PP \fB--rocm\fP[=false] inject host Rocm libraries during build for post and test sections .PP \fB-s\fP, \fB--sandbox\fP[=false] build image as sandbox format (chroot directory structure) .PP \fB--section\fP=[all] only run specific section(s) of deffile (setup, post, files, environment, test, labels, none) .PP \fB-u\fP, \fB--update\fP[=false] run definition over existing container (skips header) .PP \fB--userns\fP[=false] build without using setuid even if available .PP \fB--warn-unused-build-args\fP[=false] shows warning instead of fatal message when build args are not exact matched .PP \fB--writable-tmpfs\fP[=false] during the %test section, makes the file system accessible as read-write with non persistent data (with overlay support only) .SH EXAMPLE .EX DEF FILE BASE OS: Library: Bootstrap: library From: debian:9 Docker: Bootstrap: docker From: tensorflow/tensorflow:latest IncludeCmd: yes # Use the CMD as runscript instead of ENTRYPOINT Singularity Hub: Bootstrap: shub From: singularityhub/centos YUM/RHEL: Bootstrap: yum OSVersion: 7 MirrorURL: http://mirror.centos.org/centos-%{OSVERSION}/%{OSVERSION}/os/x86_64/ Include: yum SUSE: Bootstrap: zypper # on SLE system registration of build host is used Include: zypper openSUSE: Bootstrap: zypper MirrorURL: http://download.opensuse.org/distribution/openSUSE-stable/repo/oss Include: zypper Debian/Ubuntu: Bootstrap: debootstrap OSVersion: trusty MirrorURL: http://us.archive.ubuntu.com/ubuntu/ Local Image: Bootstrap: localimage From: /home/dave/starter.img Scratch: Bootstrap: scratch # Populate the container with a minimal rootfs in %setup DEFFILE SECTIONS: The following sections are presented in the order of processing, with the exception that labels and environment can also be manipulated in %post. %pre echo "This is a scriptlet that will be executed on the host, as root before" echo "the container has been bootstrapped. This section is not commonly used." %setup echo "This is a scriptlet that will be executed on the host, as root, after" echo "the container has been bootstrapped. To install things into the container" echo "reference the file system location with $APPTAINER_ROOTFS." %files /path/on/host/file.txt /path/on/container/file.txt relative_file.txt /path/on/container/relative_file.txt %post echo "This scriptlet section will be executed from within the container after" echo "the bootstrap/base has been created and setup." %environment LUKE=goodguy VADER=badguy HAN=someguy export HAN VADER LUKE %test echo "Define any test commands that should be executed after container has been" echo "built. This scriptlet will be executed from within the running container" echo "as the root user. Pay attention to the exit/return value of this scriptlet" echo "as any non-zero exit code will be assumed as failure." exit 0 %runscript echo "Define actions for the container to be executed with the run command or" echo "when container is executed." %startscript echo "Define actions for container to perform when started as an instance." %labels HELLO MOTO KEY VALUE %help This is a text file to be displayed with the run-help command. COMMANDS: Build a sif file from an Apptainer recipe file: $ apptainer build /tmp/debian0.sif /path/to/debian.def Build a sif image from the Library: $ apptainer build /tmp/debian1.sif library://debian:latest Build a base sandbox from DockerHub, make changes to it, then build sif $ apptainer build --sandbox /tmp/debian docker://debian:latest $ apptainer exec --writable /tmp/debian apt-get install python $ apptainer build /tmp/debian2.sif /tmp/debian .EE .SH SEE ALSO .PP \fBapptainer(1)\fP .SH HISTORY .PP 1-Apr-2024 Auto generated by spf13/cobra