github.com/apptainer/singularity@v3.1.1+incompatible/internal/pkg/syecl/syecl.toml.example (about) 1 # Singularity Execution Control List config file 2 # 3 # This file describes execution groups in which SIF files are checked for 4 # authorized loading/execution. The decision is made by validating both the 5 # location of the sif file in the file system and by checking against a list of 6 # signing entities. 7 # 8 # The current possible list modes are: whitelist, whitestrict and blacklist. 9 # 10 # Example: 11 # 12 #activated = true 13 # 14 #[[execgroup]] 15 # tagname = "group1" 16 # mode = "whitestrict" 17 # dirpath = "/var/cache/containers" 18 # keyfp = ["5994BE54C31CF1B5E1994F987C52CF6D055F072B","7064B1D6EFF01B1262FED3F03581D99FE87EAFD1"] 19 # 20 #[[execgroup]] 21 # tagname = "group2" 22 # mode = "whitelist" 23 # dirpath = "/tmp/containers" 24 # keyfp = ["7064B1D6EFF01B1262FED3F03581D99FE87EAFD1"] 25 # 26 # The above example defines 2 execution groups (dirpath: /var/cache/containers 27 # and /tmp/containers), in which only SIF files signed with both Key IDs 28 # 055F072B and E87EAFD1 may run if started from /var/cache/containers and only 29 # SIF files signed with Key ID E87EAFD1 may run if started from /tmp/containers. 30 # 31 32 activated = false