mirror of
https://github.com/NVIDIA/nvidia-container-toolkit
synced 2025-04-06 05:25:01 +00:00
Add support for injecting additional GIDs
This change adds support for injecting additional GIDs using the internal CDI representations. (Applicable for Tegra-based systems and /dev/dri devices) This is disabled by default, but can be opted in to by setting the features.allow-additional-gids feature flag. This can also be done by running sudo nvidia-ctk config --in-place --set features.allow-additional-gids Signed-off-by: Evan Lezar <elezar@nvidia.com>
This commit is contained in:
parent
50278cb22b
commit
cf93aa94d3
@ -17,12 +17,17 @@
|
|||||||
package config
|
package config
|
||||||
|
|
||||||
type featureName string
|
type featureName string
|
||||||
|
type feature bool
|
||||||
|
|
||||||
const (
|
const (
|
||||||
FeatureGDS = featureName("gds")
|
FeatureAllowAdditionalGIDs = featureName("allow-additional-gids")
|
||||||
FeatureMOFED = featureName("mofed")
|
FeatureGDRCopy = featureName("gdrcopy")
|
||||||
FeatureNVSWITCH = featureName("nvswitch")
|
FeatureGDS = featureName("gds")
|
||||||
FeatureGDRCopy = featureName("gdrcopy")
|
FeatureMOFED = featureName("mofed")
|
||||||
|
FeatureNVSWITCH = featureName("nvswitch")
|
||||||
|
|
||||||
|
featureEnabled feature = true
|
||||||
|
featureDisabled feature = false
|
||||||
)
|
)
|
||||||
|
|
||||||
// features specifies a set of named features.
|
// features specifies a set of named features.
|
||||||
@ -31,19 +36,23 @@ type features struct {
|
|||||||
MOFED *feature `toml:"mofed,omitempty"`
|
MOFED *feature `toml:"mofed,omitempty"`
|
||||||
NVSWITCH *feature `toml:"nvswitch,omitempty"`
|
NVSWITCH *feature `toml:"nvswitch,omitempty"`
|
||||||
GDRCopy *feature `toml:"gdrcopy,omitempty"`
|
GDRCopy *feature `toml:"gdrcopy,omitempty"`
|
||||||
|
// AllowAdditionalGIDs triggers the additionalGIDs field in internal CDI
|
||||||
|
// specifications to be populated if required. This can be useful when
|
||||||
|
// running the container as a user id that may not have access to device
|
||||||
|
// nodes.
|
||||||
|
AllowAdditionalGIDs *feature `toml:"allow-additional-gids,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type feature bool
|
|
||||||
|
|
||||||
// IsEnabled checks whether a specified named feature is enabled.
|
// IsEnabled checks whether a specified named feature is enabled.
|
||||||
// An optional list of environments to check for feature-specific environment
|
// An optional list of environments to check for feature-specific environment
|
||||||
// variables can also be supplied.
|
// variables can also be supplied.
|
||||||
func (fs features) IsEnabled(n featureName, in ...getenver) bool {
|
func (fs features) IsEnabled(n featureName, in ...getenver) bool {
|
||||||
featureEnvvars := map[featureName]string{
|
featureEnvvars := map[featureName]string{
|
||||||
FeatureGDS: "NVIDIA_GDS",
|
FeatureGDS: "NVIDIA_GDS",
|
||||||
FeatureMOFED: "NVIDIA_MOFED",
|
FeatureMOFED: "NVIDIA_MOFED",
|
||||||
FeatureNVSWITCH: "NVIDIA_NVSWITCH",
|
FeatureNVSWITCH: "NVIDIA_NVSWITCH",
|
||||||
FeatureGDRCopy: "NVIDIA_GDRCOPY",
|
FeatureGDRCopy: "NVIDIA_GDRCOPY",
|
||||||
|
FeatureAllowAdditionalGIDs: "NVIDIA_ALLOW_ADDITIONAL_GIDS",
|
||||||
}
|
}
|
||||||
|
|
||||||
envvar := featureEnvvars[n]
|
envvar := featureEnvvars[n]
|
||||||
@ -56,6 +65,8 @@ func (fs features) IsEnabled(n featureName, in ...getenver) bool {
|
|||||||
return fs.NVSWITCH.isEnabled(envvar, in...)
|
return fs.NVSWITCH.isEnabled(envvar, in...)
|
||||||
case FeatureGDRCopy:
|
case FeatureGDRCopy:
|
||||||
return fs.GDRCopy.isEnabled(envvar, in...)
|
return fs.GDRCopy.isEnabled(envvar, in...)
|
||||||
|
case FeatureAllowAdditionalGIDs:
|
||||||
|
return fs.AllowAdditionalGIDs.isEnabled(envvar, in...)
|
||||||
default:
|
default:
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
@ -66,17 +77,19 @@ func (fs features) IsEnabled(n featureName, in ...getenver) bool {
|
|||||||
// associated envvar is checked in the specified getenver for the string "enabled"
|
// associated envvar is checked in the specified getenver for the string "enabled"
|
||||||
// A CUDA container / image can be passed here.
|
// A CUDA container / image can be passed here.
|
||||||
func (f *feature) isEnabled(envvar string, ins ...getenver) bool {
|
func (f *feature) isEnabled(envvar string, ins ...getenver) bool {
|
||||||
|
if envvar != "" {
|
||||||
|
for _, in := range ins {
|
||||||
|
switch in.Getenv(envvar) {
|
||||||
|
case "enabled", "true":
|
||||||
|
return true
|
||||||
|
case "disabled", "false":
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
if f != nil {
|
if f != nil {
|
||||||
return bool(*f)
|
return bool(*f)
|
||||||
}
|
}
|
||||||
if envvar == "" {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
for _, in := range ins {
|
|
||||||
if in.Getenv(envvar) == "enabled" {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
|
150
internal/config/features_test.go
Normal file
150
internal/config/features_test.go
Normal file
@ -0,0 +1,150 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestFeatures(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
features features
|
||||||
|
expected map[featureName]bool
|
||||||
|
envs []getenver
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "empty features",
|
||||||
|
expected: map[featureName]bool{
|
||||||
|
FeatureAllowAdditionalGIDs: false,
|
||||||
|
FeatureGDRCopy: false,
|
||||||
|
FeatureGDS: false,
|
||||||
|
FeatureMOFED: false,
|
||||||
|
FeatureNVSWITCH: false,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "envvar sets features if enabled",
|
||||||
|
expected: map[featureName]bool{
|
||||||
|
FeatureAllowAdditionalGIDs: true,
|
||||||
|
FeatureGDRCopy: false,
|
||||||
|
FeatureGDS: false,
|
||||||
|
FeatureMOFED: false,
|
||||||
|
FeatureNVSWITCH: false,
|
||||||
|
},
|
||||||
|
envs: []getenver{
|
||||||
|
mockEnver{
|
||||||
|
"NVIDIA_ALLOW_ADDITIONAL_GIDS": "enabled",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "envvar sets features if true",
|
||||||
|
expected: map[featureName]bool{
|
||||||
|
FeatureAllowAdditionalGIDs: true,
|
||||||
|
FeatureGDRCopy: false,
|
||||||
|
FeatureGDS: false,
|
||||||
|
FeatureMOFED: false,
|
||||||
|
FeatureNVSWITCH: false,
|
||||||
|
},
|
||||||
|
envs: []getenver{
|
||||||
|
mockEnver{
|
||||||
|
"NVIDIA_ALLOW_ADDITIONAL_GIDS": "true",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "feature sets feature",
|
||||||
|
features: features{
|
||||||
|
AllowAdditionalGIDs: ptr(featureEnabled),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
for n, v := range tc.expected {
|
||||||
|
t.Run(tc.description+"-"+string(n), func(t *testing.T) {
|
||||||
|
require.EqualValues(t, v, tc.features.IsEnabled(n, tc.envs...))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestFeature(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
feature *feature
|
||||||
|
envvar string
|
||||||
|
envs []getenver
|
||||||
|
expected bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "nil feature is false",
|
||||||
|
feature: nil,
|
||||||
|
expected: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "feature enables",
|
||||||
|
feature: ptr(featureEnabled),
|
||||||
|
expected: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "feature disabled",
|
||||||
|
feature: ptr(featureDisabled),
|
||||||
|
expected: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "envvar overrides feature disabled",
|
||||||
|
feature: ptr(featureDisabled),
|
||||||
|
envvar: "FEATURE",
|
||||||
|
envs: []getenver{
|
||||||
|
mockEnver{"FEATURE": "enabled"},
|
||||||
|
},
|
||||||
|
expected: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "envvar overrides feature enabled",
|
||||||
|
feature: ptr(featureEnabled),
|
||||||
|
envvar: "FEATURE",
|
||||||
|
envs: []getenver{
|
||||||
|
mockEnver{"FEATURE": "disabled"},
|
||||||
|
},
|
||||||
|
expected: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
require.EqualValues(t, tc.expected, tc.feature.isEnabled(tc.envvar, tc.envs...))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type mockEnver map[string]string
|
||||||
|
|
||||||
|
func (m mockEnver) Getenv(k string) string {
|
||||||
|
return m[k]
|
||||||
|
}
|
||||||
|
|
||||||
|
func ptr[T any](x T) *T {
|
||||||
|
return &x
|
||||||
|
}
|
@ -17,6 +17,9 @@
|
|||||||
package edits
|
package edits
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"golang.org/x/sys/unix"
|
||||||
"tags.cncf.io/container-device-interface/pkg/cdi"
|
"tags.cncf.io/container-device-interface/pkg/cdi"
|
||||||
"tags.cncf.io/container-device-interface/specs-go"
|
"tags.cncf.io/container-device-interface/specs-go"
|
||||||
|
|
||||||
@ -26,15 +29,23 @@ import (
|
|||||||
type device discover.Device
|
type device discover.Device
|
||||||
|
|
||||||
// toEdits converts a discovered device to CDI Container Edits.
|
// toEdits converts a discovered device to CDI Container Edits.
|
||||||
func (d device) toEdits() (*cdi.ContainerEdits, error) {
|
func (d device) toEdits(allowAdditionalGIDs bool) (*cdi.ContainerEdits, error) {
|
||||||
deviceNode, err := d.toSpec()
|
deviceNode, err := d.toSpec()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var additionalGIDs []uint32
|
||||||
|
if allowAdditionalGIDs {
|
||||||
|
if requiredGID := d.getRequiredGID(); requiredGID != 0 {
|
||||||
|
additionalGIDs = append(additionalGIDs, requiredGID)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
e := cdi.ContainerEdits{
|
e := cdi.ContainerEdits{
|
||||||
ContainerEdits: &specs.ContainerEdits{
|
ContainerEdits: &specs.ContainerEdits{
|
||||||
DeviceNodes: []*specs.DeviceNode{deviceNode},
|
DeviceNodes: []*specs.DeviceNode{deviceNode},
|
||||||
|
AdditionalGIDs: additionalGIDs,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
return &e, nil
|
return &e, nil
|
||||||
@ -52,6 +63,7 @@ func (d device) toSpec() (*specs.DeviceNode, error) {
|
|||||||
if hostPath == d.Path {
|
if hostPath == d.Path {
|
||||||
hostPath = ""
|
hostPath = ""
|
||||||
}
|
}
|
||||||
|
|
||||||
s := specs.DeviceNode{
|
s := specs.DeviceNode{
|
||||||
HostPath: hostPath,
|
HostPath: hostPath,
|
||||||
Path: d.Path,
|
Path: d.Path,
|
||||||
@ -59,3 +71,29 @@ func (d device) toSpec() (*specs.DeviceNode, error) {
|
|||||||
|
|
||||||
return &s, nil
|
return &s, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// getRequiredGID returns the group id of the device if the device is not world read/writable.
|
||||||
|
// If the information cannot be extracted or an error occurs, 0 is returned.
|
||||||
|
func (d device) getRequiredGID() uint32 {
|
||||||
|
path := d.HostPath
|
||||||
|
if path == "" {
|
||||||
|
path = d.Path
|
||||||
|
}
|
||||||
|
if path == "" {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
var stat unix.Stat_t
|
||||||
|
if err := unix.Lstat(path, &stat); err != nil {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
// This is only supported for char devices
|
||||||
|
if stat.Mode&unix.S_IFMT != unix.S_IFCHR {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
if permissionsForOther := os.FileMode(stat.Mode).Perm(); permissionsForOther&06 == 0 {
|
||||||
|
return stat.Gid
|
||||||
|
}
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
@ -58,7 +58,7 @@ func (o *options) EditsFromDiscoverer(d discover.Discover) (*cdi.ContainerEdits,
|
|||||||
|
|
||||||
c := NewContainerEdits()
|
c := NewContainerEdits()
|
||||||
for _, d := range devices {
|
for _, d := range devices {
|
||||||
edits, err := device(d).toEdits()
|
edits, err := device(d).toEdits(o.allowAdditionalGIDs)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to create container edits for device: %w", err)
|
return nil, fmt.Errorf("failed to create container edits for device: %w", err)
|
||||||
}
|
}
|
||||||
|
@ -19,7 +19,8 @@ package edits
|
|||||||
import "github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
import "github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
|
||||||
type options struct {
|
type options struct {
|
||||||
logger logger.Interface
|
logger logger.Interface
|
||||||
|
allowAdditionalGIDs bool
|
||||||
}
|
}
|
||||||
|
|
||||||
type Option func(*options)
|
type Option func(*options)
|
||||||
@ -29,3 +30,9 @@ func WithLogger(logger logger.Interface) Option {
|
|||||||
o.logger = logger
|
o.logger = logger
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func WithAllowAdditionalGIDs(allowAdditionalGIDs bool) Option {
|
||||||
|
return func(o *options) {
|
||||||
|
o.allowAdditionalGIDs = allowAdditionalGIDs
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -28,16 +28,18 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type discoverModifier struct {
|
type discoverModifier struct {
|
||||||
logger logger.Interface
|
logger logger.Interface
|
||||||
discoverer discover.Discover
|
discoverer discover.Discover
|
||||||
|
allowAdditionalGIDs bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewModifierFromDiscoverer creates a modifier that applies the discovered
|
// NewModifierFromDiscoverer creates a modifier that applies the discovered
|
||||||
// modifications to an OCI spec if required by the runtime wrapper.
|
// modifications to an OCI spec if required by the runtime wrapper.
|
||||||
func NewModifierFromDiscoverer(logger logger.Interface, d discover.Discover) (oci.SpecModifier, error) {
|
func NewModifierFromDiscoverer(logger logger.Interface, d discover.Discover, allowAdditionalGIDs bool) (oci.SpecModifier, error) {
|
||||||
m := discoverModifier{
|
m := discoverModifier{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
discoverer: d,
|
discoverer: d,
|
||||||
|
allowAdditionalGIDs: allowAdditionalGIDs,
|
||||||
}
|
}
|
||||||
return &m, nil
|
return &m, nil
|
||||||
}
|
}
|
||||||
@ -47,6 +49,7 @@ func NewModifierFromDiscoverer(logger logger.Interface, d discover.Discover) (oc
|
|||||||
func (m discoverModifier) Modify(spec *specs.Spec) error {
|
func (m discoverModifier) Modify(spec *specs.Spec) error {
|
||||||
e := edits.New(
|
e := edits.New(
|
||||||
edits.WithLogger(m.logger),
|
edits.WithLogger(m.logger),
|
||||||
|
edits.WithAllowAdditionalGIDs(m.allowAdditionalGIDs),
|
||||||
)
|
)
|
||||||
|
|
||||||
specEdits, err := e.SpecModifierFromDiscoverer(m.discoverer)
|
specEdits, err := e.SpecModifierFromDiscoverer(m.discoverer)
|
||||||
|
@ -132,7 +132,7 @@ func TestDiscoverModifier(t *testing.T) {
|
|||||||
|
|
||||||
for _, tc := range testCases {
|
for _, tc := range testCases {
|
||||||
t.Run(tc.description, func(t *testing.T) {
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
m, err := NewModifierFromDiscoverer(logger, tc.discover)
|
m, err := NewModifierFromDiscoverer(logger, tc.discover, true)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
err = m.Modify(tc.spec)
|
err = m.Modify(tc.spec)
|
||||||
|
@ -78,5 +78,7 @@ func NewFeatureGatedModifier(logger logger.Interface, cfg *config.Config, image
|
|||||||
discoverers = append(discoverers, d)
|
discoverers = append(discoverers, d)
|
||||||
}
|
}
|
||||||
|
|
||||||
return NewModifierFromDiscoverer(logger, discover.Merge(discoverers...))
|
allowAdditionalGIDs := !cfg.Features.IsEnabled(config.FeatureAllowAdditionalGIDs, image)
|
||||||
|
|
||||||
|
return NewModifierFromDiscoverer(logger, discover.Merge(discoverers...), allowAdditionalGIDs)
|
||||||
}
|
}
|
||||||
|
@ -62,7 +62,9 @@ func NewGraphicsModifier(logger logger.Interface, cfg *config.Config, image imag
|
|||||||
drmNodes,
|
drmNodes,
|
||||||
mounts,
|
mounts,
|
||||||
)
|
)
|
||||||
return NewModifierFromDiscoverer(logger, d)
|
|
||||||
|
allowAdditionalGIDs := cfg.Features.IsEnabled(config.FeatureAllowAdditionalGIDs, image)
|
||||||
|
return NewModifierFromDiscoverer(logger, d, allowAdditionalGIDs)
|
||||||
}
|
}
|
||||||
|
|
||||||
// requiresGraphicsModifier determines whether a graphics modifier is required.
|
// requiresGraphicsModifier determines whether a graphics modifier is required.
|
||||||
|
@ -4,9 +4,8 @@
|
|||||||
package oci
|
package oci
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"sync"
|
|
||||||
|
|
||||||
"github.com/opencontainers/runtime-spec/specs-go"
|
"github.com/opencontainers/runtime-spec/specs-go"
|
||||||
|
"sync"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Ensure, that SpecMock does implement Spec.
|
// Ensure, that SpecMock does implement Spec.
|
||||||
|
@ -65,6 +65,8 @@ type nvcdilib struct {
|
|||||||
infolib info.Interface
|
infolib info.Interface
|
||||||
|
|
||||||
mergedDeviceOptions []transform.MergedDeviceOption
|
mergedDeviceOptions []transform.MergedDeviceOption
|
||||||
|
|
||||||
|
allowAdditionalGIDs bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// New creates a new nvcdi library
|
// New creates a new nvcdi library
|
||||||
@ -196,6 +198,7 @@ func (m *wrapper) GetCommonEdits() (*cdi.ContainerEdits, error) {
|
|||||||
func (l *nvcdilib) editsFromDiscoverer(d discover.Discover) (*cdi.ContainerEdits, error) {
|
func (l *nvcdilib) editsFromDiscoverer(d discover.Discover) (*cdi.ContainerEdits, error) {
|
||||||
e := edits.New(
|
e := edits.New(
|
||||||
edits.WithLogger(l.logger),
|
edits.WithLogger(l.logger),
|
||||||
|
edits.WithAllowAdditionalGIDs(l.allowAdditionalGIDs),
|
||||||
)
|
)
|
||||||
return e.EditsFromDiscoverer(d)
|
return e.EditsFromDiscoverer(d)
|
||||||
}
|
}
|
||||||
|
@ -4,9 +4,8 @@
|
|||||||
package nvcdi
|
package nvcdi
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"sync"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/go-nvml/pkg/nvml"
|
"github.com/NVIDIA/go-nvml/pkg/nvml"
|
||||||
|
"sync"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Ensure, that nvmlUUIDerMock does implement nvmlUUIDer.
|
// Ensure, that nvmlUUIDerMock does implement nvmlUUIDer.
|
||||||
|
@ -155,3 +155,11 @@ func WithLibrarySearchPaths(paths []string) Option {
|
|||||||
o.librarySearchPaths = paths
|
o.librarySearchPaths = paths
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// WithAllowAdditionalGIDs specifies whether a generated CDI spec can contain
|
||||||
|
// the additionaGIDs field.
|
||||||
|
func WithAllowAdditionalGIDs(allowAdditionalGIDs bool) Option {
|
||||||
|
return func(o *nvcdilib) {
|
||||||
|
o.allowAdditionalGIDs = allowAdditionalGIDs
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -17,6 +17,8 @@
|
|||||||
package transform
|
package transform
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"slices"
|
||||||
|
|
||||||
"tags.cncf.io/container-device-interface/specs-go"
|
"tags.cncf.io/container-device-interface/specs-go"
|
||||||
)
|
)
|
||||||
|
|
||||||
@ -50,6 +52,12 @@ func (d dedupe) Transform(spec *specs.Spec) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (d dedupe) transformEdits(edits *specs.ContainerEdits) error {
|
func (d dedupe) transformEdits(edits *specs.ContainerEdits) error {
|
||||||
|
additionalGIDs, err := d.deduplicateAdditionalGIDs(edits.AdditionalGIDs)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
edits.AdditionalGIDs = additionalGIDs
|
||||||
|
|
||||||
deviceNodes, err := d.deduplicateDeviceNodes(edits.DeviceNodes)
|
deviceNodes, err := d.deduplicateDeviceNodes(edits.DeviceNodes)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
@ -150,3 +158,19 @@ func (d dedupe) deduplicateMounts(entities []*specs.Mount) ([]*specs.Mount, erro
|
|||||||
}
|
}
|
||||||
return mounts, nil
|
return mounts, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (d dedupe) deduplicateAdditionalGIDs(entities []uint32) ([]uint32, error) {
|
||||||
|
seen := make(map[uint32]bool)
|
||||||
|
var additionalGIDs []uint32
|
||||||
|
for _, e := range entities {
|
||||||
|
if seen[e] {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
seen[e] = true
|
||||||
|
additionalGIDs = append(additionalGIDs, e)
|
||||||
|
}
|
||||||
|
|
||||||
|
slices.Sort(additionalGIDs)
|
||||||
|
|
||||||
|
return additionalGIDs, nil
|
||||||
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user