Add cdi.enabled option to runtime configure

Signed-off-by: Evan Lezar <elezar@nvidia.com>
This commit is contained in:
Evan Lezar 2023-10-31 15:24:27 +01:00
parent ccff00bc30
commit a9b01a43bc
7 changed files with 51 additions and 0 deletions

View File

@ -9,6 +9,7 @@
* Added detection of libnvdxgdmal.so.1 on WSL2. * Added detection of libnvdxgdmal.so.1 on WSL2.
* Fix bug in determining default nvidia-container-runtime.user config value on SUSE-based systems. * Fix bug in determining default nvidia-container-runtime.user config value on SUSE-based systems.
* Add `crun` to the list of configured low-level runtimes. * Add `crun` to the list of configured low-level runtimes.
* Add `--cdi.enabled` option to `nvidia-ctk runtime configure` command to enable CDI in containerd.
* [toolkit-container] Bump CUDA base image version to 12.3.1. * [toolkit-container] Bump CUDA base image version to 12.3.1.
* [libnvidia-container] Added detection of libnvdxgdmal.so.1 on WSL2. * [libnvidia-container] Added detection of libnvdxgdmal.so.1 on WSL2.

View File

@ -71,6 +71,11 @@ type config struct {
hookPath string hookPath string
setAsDefault bool setAsDefault bool
} }
// cdi-specific options
cdi struct {
enabled bool
}
} }
func (m command) build() *cli.Command { func (m command) build() *cli.Command {
@ -141,6 +146,11 @@ func (m command) build() *cli.Command {
Usage: "set the NVIDIA runtime as the default runtime", Usage: "set the NVIDIA runtime as the default runtime",
Destination: &config.nvidiaRuntime.setAsDefault, Destination: &config.nvidiaRuntime.setAsDefault,
}, },
&cli.BoolFlag{
Name: "cdi.enabled",
Usage: "Enable CDI in the configured runtime",
Destination: &config.cdi.enabled,
},
} }
return &configure return &configure
@ -175,6 +185,13 @@ func (m command) validateFlags(c *cli.Context, config *config) error {
} }
} }
if config.runtime != "containerd" {
if config.cdi.enabled {
m.logger.Warningf("Ignoring cdi.enabled flag for %v", config.runtime)
}
config.cdi.enabled = false
}
return nil return nil
} }
@ -227,6 +244,12 @@ func (m command) configureConfigFile(c *cli.Context, config *config) error {
return fmt.Errorf("unable to update config: %v", err) return fmt.Errorf("unable to update config: %v", err)
} }
if config.cdi.enabled {
if err := cfg.Set("enable_cdi", true); err != nil {
return fmt.Errorf("failed enable CDI in containerd: %w", err)
}
}
outputPath := config.getOuputConfigPath() outputPath := config.getOuputConfigPath()
n, err := cfg.Save(outputPath) n, err := cfg.Save(outputPath)
if err != nil { if err != nil {

View File

@ -20,6 +20,7 @@ package engine
type Interface interface { type Interface interface {
DefaultRuntime() string DefaultRuntime() string
AddRuntime(string, string, bool) error AddRuntime(string, string, bool) error
Set(string, interface{}) error
RemoveRuntime(string) error RemoveRuntime(string) error
Save(string) (int64, error) Save(string) (int64, error)
} }

View File

@ -134,6 +134,14 @@ func (c *ConfigV1) RemoveRuntime(name string) error {
return nil return nil
} }
// SetOption sets the specified containerd option.
func (c *ConfigV1) Set(key string, value interface{}) error {
config := *c.Tree
config.SetPath([]string{"plugins", "cri", "containerd", key}, value)
*c.Tree = config
return nil
}
// Save wrotes the config to a file // Save wrotes the config to a file
func (c ConfigV1) Save(path string) (int64, error) { func (c ConfigV1) Save(path string) (int64, error) {
return (Config)(c).Save(path) return (Config)(c).Save(path)

View File

@ -90,6 +90,14 @@ func (c *Config) getRuntimeAnnotations(path []string) ([]string, error) {
return annotations, nil return annotations, nil
} }
// Set sets the specified containerd option.
func (c *Config) Set(key string, value interface{}) error {
config := *c.Tree
config.SetPath([]string{"plugins", "io.containerd.grpc.v1.cri", key}, value)
*c.Tree = config
return nil
}
// DefaultRuntime returns the default runtime for the cri-o config // DefaultRuntime returns the default runtime for the cri-o config
func (c Config) DefaultRuntime() string { func (c Config) DefaultRuntime() string {
if runtime, ok := c.GetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "default_runtime_name"}).(string); ok { if runtime, ok := c.GetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "default_runtime_name"}).(string); ok {

View File

@ -99,6 +99,11 @@ func (c *Config) RemoveRuntime(name string) error {
return nil return nil
} }
// Set is not supported for cri-o configs.
func (c *Config) Set(key string, value interface{}) error {
return fmt.Errorf("Set is not supported for crio configs")
}
// Save writes the config to the specified path // Save writes the config to the specified path
func (c Config) Save(path string) (int64, error) { func (c Config) Save(path string) (int64, error) {
config := (toml.Tree)(c) config := (toml.Tree)(c)

View File

@ -114,6 +114,11 @@ func (c *Config) RemoveRuntime(name string) error {
return nil return nil
} }
// Set is not supported for docker configs.
func (c *Config) Set(key string, value interface{}) error {
return fmt.Errorf("Set is not supported for crio configs")
}
// Save writes the config to the specified path // Save writes the config to the specified path
func (c Config) Save(path string) (int64, error) { func (c Config) Save(path string) (int64, error) {
output, err := json.MarshalIndent(c, "", " ") output, err := json.MarshalIndent(c, "", " ")