It seems that when I use "singularity shell --fakeroot" some "--bind" directories that I could read as the user on the host become unreadable from inside the container. On the host, the user has group read and execute permissions on a directory hierarchy. When those are bound into the container and "--fakeroot" is not specified, they are accessible from within the container. However, when "--fakeroot" is specified, the bound directories appear as owned by the nobody user and nobody group. The fake root account inside the container is unable to read them. An "ls" reports "Permission denied." I found this behavior surprising.
Is there any way to keep the bound in directories readable when the "--fakeroot" parameter is specified?
For additional background, I am only using "--fakeroot" so that I can use "--net." The use of "--net" with "--bind" of group controlled directories is my real goal.
Singularity version 3.7.4-1.el7 (Red Hat Enterprise Linux Server release 7.9)