https://star-bnl.github.io/star-sw/#containers Here is how these changes can be tested before they are merged into main. Go to the latest GitHub actions page for this PR (https://github.com/star-bnl/star-sw/actions/runs/2352599614) and download the zip archive with already built libraries using the star-sw-root5-build link under Artifacts Unpack the downloaded zip archive to get a single tar file Build a singularity (or docker) image from the tar file Run any command in the container On SDCC only singularity is available, so the above would look like this (actual commands): $ curl -L -u token: https://api.github.com/repos/star-bnl/star-sw/actions/artifacts/246519433/zip | gunzip -d > star-sw-root5-build.tar $ singularity build star-sw-root5-build.sif docker-archive://star-sw-root5-build.tar The above setup should take only a few minutes. Now run your bfc.C chain. I am using one of the nightly tests as an example: $ singularity run -e -B /gpfs01:/gpfs01 star-sw-root5-build.sif root4star -b -q 'bfc.C(10, \"P2018a,StiCA,btof,mtd,PicoVtxDefault,BEmcChkStat,QAalltrigs,OSpaceZ2,OGridLeak3D,-hitfilt\", \"/gpfs01/star/rcf/test/daq/2018/136/st_physics_19136012_raw_1000016.daq\")' singularity run docker://ghcr.io/star-bnl/star-sw:main-root5-gcc485 bash -l singularity run docker://ghcr.io/star-bnl/star-sw:main-root5-gcc485 root4star singularity run -B /star/rcf docker://ghcr.io/star-bnl/star-sw:main-root5-gcc485 root4star -b -q -l 'bfc.C(10, \"pp2022,StiCA,BEmcChkStat,epdhit\", \"/star/rcf/test/daq/2022/010/23010027/st_physics_23010027_raw_1000015.daq\")' singularity run -B `pwd` /star/rcf docker://ghcr.io/star-bnl/star-sw:main-root5-gcc485 root4star -b -q -l 'bfc.C(1)' singularity run -H `pwd` docker://ghcr.io/star-bnl/star-sw:main-root5-gcc485 root4star 'bfc.C(1)' switch to sl73 from al92 singularity exec -e -B /direct -B /star -B /afs -B /gpfs -B /sdcc/lustre02 /cvmfs/star.sdcc.bnl.gov/containers/rhic_sl7.sif csh [starsub01] ~/work/dEdx/jobs3 $ apptainer inspect /cvmfs/star.sdcc.bnl.gov/containers/rhic_sl7.sif Disclaimer: CONTAINER IMAGE PROVIDED "AS IS" WITHOUT WARRANTY OR SUPPORT. LICENSES/DISCLAIMERS OF INDIVIDUAL SOFTWARE COMPONENTS APPLY. Maintainer: Chris Hollowell , Costin Caramarcu Title: RCF Farm SL7 Container Version: 1.5 org.label-schema.build-arch: amd64 org.label-schema.build-date: Monday_4_November_2024_9:56:2_EST org.label-schema.schema-version: 1.0 org.label-schema.usage.singularity.deffile.bootstrap: yum org.label-schema.usage.singularity.deffile.include: yum org.label-schema.usage.singularity.deffile.mirrorurl: http://imgsvr.rcf.bnl.gov/os/sl64_7.3/ org.label-schema.usage.singularity.deffile.osversion: 7 org.label-schema.usage.singularity.version: 3.7.4-1.el7 Options for exec command: --add-caps string a comma separated capability list to add --allow-setuid allow setuid binaries in container (root only) --app string set an application to run inside a container --apply-cgroups string apply cgroups from file for container processes (root only) -B, --bind stringArray a user-bind path specification. spec has the format src[:dest[:opts]], where src and dest are outside and inside paths. If dest is not given, it is set equal to src. Mount options ('opts') may be specified as 'ro' (read-only) or 'rw' (read/write, which is the default). Multiple bind paths can be given by a comma separated list. --blkio-weight int Block IO relative weight in range 10-1000, 0 to disable --blkio-weight-device strings Device specific block IO relative weight -e, --cleanenv clean environment before running container --compat apply settings for increased OCI/Docker compatibility. Infers --containall, --no-init, --no-umask, --no-eval, --writable-tmpfs. -c, --contain use minimal /dev and empty other directories (e.g. /tmp and $HOME) instead of sharing filesystems from your host -C, --containall contain not only file systems, but also PID, IPC, and environment --cpu-shares int CPU shares for container (default -1) --cpus string Number of CPUs available to container --cpuset-cpus string List of host CPUs available to container --cpuset-mems string List of host memory nodes available to container --disable-cache do not use or create cache --dns string list of DNS server separated by commas to add in resolv.conf --docker-host string specify a custom Docker daemon host --docker-login login to a Docker Repository interactively --drop-caps string a comma separated capability list to drop --env stringToString pass environment variable to contained process (default []) --env-file string pass environment variables from file to contained process -f, --fakeroot run container with the appearance of running as root --fusemount strings A FUSE filesystem mount specification of the form ': ' - where is 'container' or 'host', specifying where the mount will be performed ('container-daemon' or 'host-daemon' will run the FUSE process detached). is the path to the FUSE executable, plus options for the mount. is the location in the container to which the FUSE mount will be attached. E.g. 'container:sshfs 10.0.0.1:/ /sshfs'. Implies --pid. -h, --help help for exec -H, --home string a home directory specification. spec can either be a src path or src:dest pair. src is the source path of the home directory outside the container and dest overrides the home directory within the container. (default "/star/u/fisyak") --hostname string set container hostname -i, --ipc run container in a new IPC namespace --keep-privs let root user keep privileges in container (root only) --memory string Memory limit in bytes --memory-reservation string Memory soft limit in bytes --memory-swap string Swap limit, use -1 for unlimited swap --mount stringArray a mount specification e.g. 'type=bind,source=/opt,destination=/hostopt'. -n, --net run container in a new network namespace (sets up a bridge network interface by default) --network string specify desired network type separated by commas, each network will bring up a dedicated interface inside container --network-args strings specify network arguments to pass to CNI plugins --no-eval do not shell evaluate env vars or OCI container CMD/ENTRYPOINT/ARGS --no-home do NOT mount users home directory if /home is not the current working directory --no-https use http instead of https for docker:// oras:// and library:///... URIs --no-init do NOT start shim process with --pid --no-mount strings disable one or more 'mount xxx' options set in apptainer.conf and/or specify absolute destination path to disable a bind path entry, or 'bind-paths' to disable all bind path entries. --no-privs drop all privileges from root user in container) --no-umask do not propagate umask to the container, set default 0022 umask --nv enable Nvidia support --nvccli use nvidia-container-cli for GPU setup (experimental) --oom-kill-disable Disable OOM killer -o, --overlay strings use an overlayFS image for persistent data storage or as read-only layer of container --passphrase prompt for an encryption passphrase --pem-path string enter an path to a PEM formatted RSA key for an encrypted container -p, --pid run container in a new PID namespace --pids-limit int Limit number of container PIDs, use -1 for unlimited --pwd string initial working directory for payload process inside the container --rocm enable experimental Rocm support -S, --scratch strings include a scratch directory within the container that is linked to a temporary dir (use -W to force location) --security strings enable security features (SELinux, Apparmor, Seccomp) --underlay use underlay --unsquash Convert SIF file to temporary sandbox before running -u, --userns run container in a new user namespace --uts run container in a new UTS namespace --vm enable VM support --vm-cpu string number of CPU cores to allocate to Virtual Machine (implies --vm) (default "1") --vm-err enable attaching stderr from VM --vm-ip string IP Address to assign for container usage. Defaults to DHCP within bridge network. (default "dhcp") --vm-ram string amount of RAM in MiB to allocate to Virtual Machine (implies --vm) (default "1024") -W, --workdir string working directory to be used for /tmp, /var/tmp and $HOME (if -c/--contain was also used) -w, --writable by default all Apptainer containers are available as read only. This option makes the file system accessible as read/write. --writable-tmpfs makes the file system accessible as read-write with non persistent data (with overlay support only) Run 'apptainer --help' for more detailed usage information.