mirror of
https://github.com/NVIDIA/nvidia-container-toolkit
synced 2025-06-26 18:18:24 +00:00
Compare commits
1729 Commits
v1.10.0-rc
...
pull-reque
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
699608902b | ||
|
|
d4b331fbbb | ||
|
|
f3b730c805 | ||
|
|
1cfaef4b01 | ||
|
|
76b6d4d38f | ||
|
|
4523b2e35d | ||
|
|
d757f6e68c | ||
|
|
5d5166cbb6 | ||
|
|
3df59b955a | ||
|
|
33280cd2b2 | ||
|
|
3306d5081e | ||
|
|
7c3ab75d08 | ||
|
|
71985df972 | ||
|
|
4255d73d89 | ||
|
|
9bdb74aec2 | ||
|
|
e436533a6f | ||
|
|
0f299c3431 | ||
|
|
f852043078 | ||
|
|
ef0b16bc24 | ||
|
|
225dfec83f | ||
|
|
03c48a6824 | ||
|
|
6530826293 | ||
|
|
971fd195b3 | ||
|
|
3b10afd0fe | ||
|
|
6b7ed26fba | ||
|
|
8d5f1e2427 | ||
|
|
d82a9ccd89 | ||
|
|
8ac213e3e6 | ||
|
|
0128762832 | ||
|
|
d7b150a2e6 | ||
|
|
57c917e3b1 | ||
|
|
bc9ec77fdd | ||
|
|
82f2eb7b73 | ||
|
|
712d829018 | ||
|
|
598b9740fc | ||
|
|
968e2ccca4 | ||
|
|
aff9301f2e | ||
|
|
011fb72330 | ||
|
|
2adef9903e | ||
|
|
70b1f5af98 | ||
|
|
c9422f12b3 | ||
|
|
b7fbd56f7e | ||
|
|
bd87c009ba | ||
|
|
fc65d3a784 | ||
|
|
52b9631333 | ||
|
|
9429fbac5f | ||
|
|
04e9bf4ac1 | ||
|
|
3ceaf1f85c | ||
|
|
9f0c1042c4 | ||
|
|
352b55c8ce | ||
|
|
b13139793b | ||
|
|
05f44b7752 | ||
|
|
a109f28cb6 | ||
|
|
65b575fa96 | ||
|
|
6e413d8445 | ||
|
|
5d9b27f107 | ||
|
|
767aee913d | ||
|
|
25bac4c62a | ||
|
|
7e371aa024 | ||
|
|
bc2b937574 | ||
|
|
ae8561b509 | ||
|
|
64633903c7 | ||
|
|
1273f879cc | ||
|
|
8713a173fe | ||
|
|
e6d99934f8 | ||
|
|
0cf2d60406 | ||
|
|
0e759d4ad8 | ||
|
|
9e85fb54fc | ||
|
|
ce79d01cf5 | ||
|
|
5d27489d18 | ||
|
|
d80e8b9733 | ||
|
|
a72b9cd12c | ||
|
|
c2f4ac0959 | ||
|
|
5db5ddb31b | ||
|
|
ff1897f2e4 | ||
|
|
88f0157cae | ||
|
|
27f1738c3d | ||
|
|
f52df9522e | ||
|
|
edf79d6e8b | ||
|
|
6aadd6ed21 | ||
|
|
a1d60910b6 | ||
|
|
03f5a09aec | ||
|
|
1f2232fc5f | ||
|
|
b19f5d8f7d | ||
|
|
fa1379c6d5 | ||
|
|
4ded119c31 | ||
|
|
e0813e0c4d | ||
|
|
4add0a6bf2 | ||
|
|
fbcf8ef12e | ||
|
|
92472bd0ed | ||
|
|
ac236a80f8 | ||
|
|
b69d98d7cf | ||
|
|
adbe127afd | ||
|
|
82ccae23b1 | ||
|
|
44cf1f4e3b | ||
|
|
1d0777ee01 | ||
|
|
9f82e910f6 | ||
|
|
cb172ba336 | ||
|
|
bbdb13c47d | ||
|
|
03152dba8d | ||
|
|
cf026dce9a | ||
|
|
073fb138d7 | ||
|
|
948bc113f0 | ||
|
|
b457247a0c | ||
|
|
bae4b3ebd3 | ||
|
|
3a06066f6b | ||
|
|
c0292f5048 | ||
|
|
cd8937bc5b | ||
|
|
cec3445318 | ||
|
|
f830653738 | ||
|
|
6e9ff446c8 | ||
|
|
9a07de0ee8 | ||
|
|
517873e97d | ||
|
|
49b45693ee | ||
|
|
78d6cdc7f7 | ||
|
|
61640591ba | ||
|
|
df4c87b877 | ||
|
|
d6c312956b | ||
|
|
51f765dd71 | ||
|
|
d8cd5438e4 | ||
|
|
5ed25bb375 | ||
|
|
a7786d4d41 | ||
|
|
be1ac24f2a | ||
|
|
dd86f598b5 | ||
|
|
2b417c1a9a | ||
|
|
e89be14c86 | ||
|
|
f625242ed6 | ||
|
|
df73db7e1e | ||
|
|
89f33bdf71 | ||
|
|
6834d5e0a4 | ||
|
|
c91a1b1dc8 | ||
|
|
96d91df78e | ||
|
|
a990860bfa | ||
|
|
bf9d618ff2 | ||
|
|
7ae5c2901f | ||
|
|
6b236746ce | ||
|
|
ed3b52eb8d | ||
|
|
1176430278 | ||
|
|
c22f3bd56c | ||
|
|
6375e832ff | ||
|
|
991b9c222f | ||
|
|
fdad3927b4 | ||
|
|
6bd292eff8 | ||
|
|
9429ce039b | ||
|
|
d953bbb977 | ||
|
|
5cbf3f82d9 | ||
|
|
69375d7889 | ||
|
|
9753096398 | ||
|
|
76edd1d7ca | ||
|
|
a6476193c8 | ||
|
|
d75b1adeda | ||
|
|
9aa2f67a22 | ||
|
|
b89e7ca849 | ||
|
|
7c5ed8157b | ||
|
|
a401e4a5a6 | ||
|
|
2bc4201205 | ||
|
|
cb52e779ba | ||
|
|
8cc672bed9 | ||
|
|
be001d938c | ||
|
|
d584f9a40b | ||
|
|
11acbe7ca2 | ||
|
|
95bda3ad72 | ||
|
|
6e4b0632c5 | ||
|
|
e4be26ff55 | ||
|
|
8e6b57b38a | ||
|
|
c935779693 | ||
|
|
4b43a29957 | ||
|
|
b3b0d107de | ||
|
|
d22fca51b8 | ||
|
|
adad9b9c92 | ||
|
|
b6d360fbbe | ||
|
|
5699ec1cff | ||
|
|
ec182705f1 | ||
|
|
7598fe14bc | ||
|
|
4fc181a418 | ||
|
|
4bf5894833 | ||
|
|
272f891204 | ||
|
|
4b352e6bac | ||
|
|
178369eb8e | ||
|
|
3c012499db | ||
|
|
6e883bf10a | ||
|
|
cc61f186a8 | ||
|
|
aac0a62528 | ||
|
|
2529aebd6c | ||
|
|
784917a0d9 | ||
|
|
1330467652 | ||
|
|
22035d4561 | ||
|
|
9318aaf275 | ||
|
|
70261d84f1 | ||
|
|
f8f506fd85 | ||
|
|
b0a5fb9f86 | ||
|
|
83790dbccd | ||
|
|
7ceae92ac1 | ||
|
|
8dfa61338b | ||
|
|
484cae273c | ||
|
|
6e67bb247b | ||
|
|
8bd7dd7060 | ||
|
|
e25c052aa6 | ||
|
|
21ba9932d0 | ||
|
|
dcd65a6410 | ||
|
|
8603d605aa | ||
|
|
e1efa28fe6 | ||
|
|
75a934e11c | ||
|
|
43aca46f10 | ||
|
|
00f1d5a627 | ||
|
|
c0764366d9 | ||
|
|
1afada7de5 | ||
|
|
5c3ffc2fba | ||
|
|
e188090a92 | ||
|
|
1995925a7d | ||
|
|
46fc47c67a | ||
|
|
b142091234 | ||
|
|
e9b8ad95df | ||
|
|
f77a808105 | ||
|
|
832818084d | ||
|
|
ab0a4eaa19 | ||
|
|
0c687be794 | ||
|
|
8d869acce5 | ||
|
|
324096c979 | ||
|
|
5bc0315448 | ||
|
|
3fb1615d26 | ||
|
|
9e4696bf7d | ||
|
|
8c9d3d8f65 | ||
|
|
efb18a72ad | ||
|
|
75376d3df2 | ||
|
|
7e0cd45b1c | ||
|
|
a04e3ac4f7 | ||
|
|
92779e71b3 | ||
|
|
23f1ba3e93 | ||
|
|
d0d85a8c5c | ||
|
|
bfea673d6a | ||
|
|
6a6a3e6055 | ||
|
|
fa59d12973 | ||
|
|
d78868cd31 | ||
|
|
74b1e5ea8c | ||
|
|
88608781b6 | ||
|
|
fa5a4ac499 | ||
|
|
9f1bd62c42 | ||
|
|
9534249936 | ||
|
|
e1ea0056b9 | ||
|
|
c802c3089c | ||
|
|
771ac6b88a | ||
|
|
0f7aba9c3c | ||
|
|
3c07ea0b17 | ||
|
|
183dff9161 | ||
|
|
5e3e91a010 | ||
|
|
dc0e191093 | ||
|
|
8a6c1944a5 | ||
|
|
5d057dce66 | ||
|
|
5931136879 | ||
|
|
1145ce2283 | ||
|
|
38790c5df0 | ||
|
|
e5175c270e | ||
|
|
d18a2b6fc7 | ||
|
|
2987c4d670 | ||
|
|
2e6712d2bc | ||
|
|
92df542f2f | ||
|
|
1991b3ef2a | ||
|
|
cdf39fbad3 | ||
|
|
c30ca0fdc3 | ||
|
|
b077e2648d | ||
|
|
457d71c170 | ||
|
|
bc9180b59d | ||
|
|
ec8dfaf779 | ||
|
|
c129122da6 | ||
|
|
0abf800000 | ||
|
|
1d9d0acf7d | ||
|
|
17f14278a9 | ||
|
|
1fa5bbf351 | ||
|
|
f794d09df1 | ||
|
|
17a2377ad5 | ||
|
|
b90ee5d100 | ||
|
|
1ef3f4048f | ||
|
|
7fb31bd1dc | ||
|
|
e2fe591535 | ||
|
|
adf3708d0b | ||
|
|
a06d838b1c | ||
|
|
f477dc0df1 | ||
|
|
879bb9ffd5 | ||
|
|
4604e3b6c8 | ||
|
|
a9ca6995f7 | ||
|
|
7cd2aef0d8 | ||
|
|
19482dac6f | ||
|
|
78c4ca8a12 | ||
|
|
b12bdfc52a | ||
|
|
82ae2e615a | ||
|
|
4f440dedda | ||
|
|
3ee678f4f6 | ||
|
|
103375e504 | ||
|
|
5bedbc2b50 | ||
|
|
94337b7427 | ||
|
|
046a05921f | ||
|
|
6ca2700a17 | ||
|
|
0d626cfbb7 | ||
|
|
10bafd1d09 | ||
|
|
bf2bdfd35e | ||
|
|
f126877254 | ||
|
|
006aebf31e | ||
|
|
6c5f4eea63 | ||
|
|
b0b7c7c9ee | ||
|
|
b466270a24 | ||
|
|
d806f1045b | ||
|
|
35ee96ac41 | ||
|
|
f8141aab27 | ||
|
|
98ffe2aa67 | ||
|
|
79c59aeb7f | ||
|
|
906531fee3 | ||
|
|
0e68f60c0b | ||
|
|
563db0e0be | ||
|
|
7b770f63c3 | ||
|
|
dcbf5bc81f | ||
|
|
978d439cf8 | ||
|
|
aa946f3f59 | ||
|
|
a5a5833c14 | ||
|
|
8e07d90802 | ||
|
|
2aadbbf22d | ||
|
|
88f9414849 | ||
|
|
53c2dc6301 | ||
|
|
3121663537 | ||
|
|
4b6de8036d | ||
|
|
dc2ccdd2fa | ||
|
|
5145b0a4b6 | ||
|
|
a819cfdab4 | ||
|
|
629db79b4f | ||
|
|
8693dd6962 | ||
|
|
51cc619eab | ||
|
|
9b72161b63 | ||
|
|
d925b6596b | ||
|
|
c02b144ed4 | ||
|
|
16fdef50e6 | ||
|
|
b061446694 | ||
|
|
9c2476c98d | ||
|
|
70da6cfa50 | ||
|
|
a4bfccc3fe | ||
|
|
66f50d91bd | ||
|
|
ba1ed3232f | ||
|
|
c490baab63 | ||
|
|
32486cf1e9 | ||
|
|
b9c3185d72 | ||
|
|
e383b75a4d | ||
|
|
5827434cae | ||
|
|
6ad699c095 | ||
|
|
2450b002a8 | ||
|
|
03d1acc7b0 | ||
|
|
39120d5878 | ||
|
|
da5e3ce8c3 | ||
|
|
b47f954b7c | ||
|
|
f959c0daaa | ||
|
|
c3c0cdcc89 | ||
|
|
e3936fd623 | ||
|
|
f4987580d2 | ||
|
|
f3fceab317 | ||
|
|
ff2ba2bbc5 | ||
|
|
0c554cbf7e | ||
|
|
beb921fafe | ||
|
|
45030d1169 | ||
|
|
2f37055bc6 | ||
|
|
5316c2a618 | ||
|
|
89e4ae70c8 | ||
|
|
c68b4be12f | ||
|
|
89c12c1368 | ||
|
|
9d4294450d | ||
|
|
070b40d62a | ||
|
|
13862f3c75 | ||
|
|
05449807d1 | ||
|
|
b7948428ff | ||
|
|
d2750e86c3 | ||
|
|
0e4759cf36 | ||
|
|
d767e4cfe9 | ||
|
|
e454caf577 | ||
|
|
fa46c01331 | ||
|
|
122136fe92 | ||
|
|
fa16d83494 | ||
|
|
faabbd36d6 | ||
|
|
a470818ba7 | ||
|
|
404a2763cb | ||
|
|
87a63a6159 | ||
|
|
d8ccd50349 | ||
|
|
95694f082b | ||
|
|
c5c124b882 | ||
|
|
a67c3a1bb5 | ||
|
|
51911974fb | ||
|
|
73a6c4d521 | ||
|
|
eb7983af41 | ||
|
|
2273664328 | ||
|
|
49acaef503 | ||
|
|
fb6a767ada | ||
|
|
76f419e3ba | ||
|
|
df3a7729ce | ||
|
|
509993e138 | ||
|
|
fce56f905b | ||
|
|
832fcba5cd | ||
|
|
b646372998 | ||
|
|
d51cee6a9d | ||
|
|
2d9c45575c | ||
|
|
49ada6ce56 | ||
|
|
d8edb83673 | ||
|
|
969d6c3a4b | ||
|
|
ee4f1f4a24 | ||
|
|
1b1b03d46e | ||
|
|
cf417b0308 | ||
|
|
aedd3b8f04 | ||
|
|
d969c6f302 | ||
|
|
976fdae5d0 | ||
|
|
0eec445d7a | ||
|
|
448a3853ad | ||
|
|
9dd4e357b7 | ||
|
|
6358c13dab | ||
|
|
e4cdc48854 | ||
|
|
8e079c040a | ||
|
|
8b010313e5 | ||
|
|
bd7295702e | ||
|
|
135f682a87 | ||
|
|
077ad3eb25 | ||
|
|
e527cc1ff5 | ||
|
|
55ea268829 | ||
|
|
aae3da88c3 | ||
|
|
bb2be19a6c | ||
|
|
6fd2fc0c24 | ||
|
|
7c2e624492 | ||
|
|
c0a3864ab4 | ||
|
|
0c309df7e7 | ||
|
|
46838b1a44 | ||
|
|
be11cf428b | ||
|
|
b42a5d3e3a | ||
|
|
b8389283d5 | ||
|
|
6732f6d13b | ||
|
|
70ef0fb973 | ||
|
|
15c884e99f | ||
|
|
17d4d7da1f | ||
|
|
c96ac07bf7 | ||
|
|
a6a96a8d0e | ||
|
|
be61ba01d9 | ||
|
|
3aeba886d4 | ||
|
|
490c7dd599 | ||
|
|
8df5e33ef6 | ||
|
|
f55aac0232 | ||
|
|
2c8431c1f8 | ||
|
|
f35f3903ab | ||
|
|
bbc5363009 | ||
|
|
0b944ba274 | ||
|
|
ca528c4f53 | ||
|
|
692dac4cbd | ||
|
|
6b78c72fec | ||
|
|
a3223f32e0 | ||
|
|
f2eb4ea9ba | ||
|
|
4686f9499c | ||
|
|
3f481cd20a | ||
|
|
cd52be86e6 | ||
|
|
b5743da52f | ||
|
|
03ccd64f33 | ||
|
|
33369861fc | ||
|
|
d9a1106e00 | ||
|
|
f26425d3fd | ||
|
|
272585d261 | ||
|
|
fe5a44cb35 | ||
|
|
5f2be72335 | ||
|
|
ae074e7ba2 | ||
|
|
876d479308 | ||
|
|
abd638add9 | ||
|
|
1dd59101c7 | ||
|
|
55630bc2c0 | ||
|
|
4f0de9f1ef | ||
|
|
bced007f87 | ||
|
|
ac90b7963d | ||
|
|
2e947edbe4 | ||
|
|
9fde4b21df | ||
|
|
84e0060fe8 | ||
|
|
024dd3126d | ||
|
|
86b272cc7b | ||
|
|
2bc24970e0 | ||
|
|
00dc0daecc | ||
|
|
e3120cbe64 | ||
|
|
00d82dd540 | ||
|
|
8fe366683e | ||
|
|
7320fcd86d | ||
|
|
01f212b7a8 | ||
|
|
71e0b8590f | ||
|
|
e841c6256a | ||
|
|
c2411e644e | ||
|
|
dffce25637 | ||
|
|
f5a4b23041 | ||
|
|
dfc8e22e12 | ||
|
|
155fe66575 | ||
|
|
9208159263 | ||
|
|
9b83d09f18 | ||
|
|
c5eda7af8e | ||
|
|
572b0401a4 | ||
|
|
0d70052105 | ||
|
|
bead6f98f3 | ||
|
|
533d7119db | ||
|
|
e4b46a09a7 | ||
|
|
8fc4b9c742 | ||
|
|
ef57c07199 | ||
|
|
b407109bdf | ||
|
|
abb5abaea4 | ||
|
|
e55e6abc09 | ||
|
|
17c044eef8 | ||
|
|
edda11d647 | ||
|
|
52d0383b47 | ||
|
|
3defc6babb | ||
|
|
7b988f15ab | ||
|
|
179d8655f9 | ||
|
|
2d7b2360d2 | ||
|
|
a61dc148b2 | ||
|
|
3f6b916a85 | ||
|
|
cf388e7e63 | ||
|
|
b435b797af | ||
|
|
c86c3aeeaf | ||
|
|
f13f1bdba4 | ||
|
|
55440f40b3 | ||
|
|
cc34996684 | ||
|
|
5a3eda4cba | ||
|
|
973a6633b3 | ||
|
|
f4d0cfb687 | ||
|
|
35b23c5a2c | ||
|
|
0dc87e5d69 | ||
|
|
edc50f6e49 | ||
|
|
7de7444b0f | ||
|
|
8d3ffcd122 | ||
|
|
d72481cbd7 | ||
|
|
a442a5ed1f | ||
|
|
7de58b4af4 | ||
|
|
fde099d25b | ||
|
|
0a3eb67df8 | ||
|
|
78f250a6b0 | ||
|
|
0aed9a16ad | ||
|
|
f46b99c2f7 | ||
|
|
d5f6e6f868 | ||
|
|
082ce066ed | ||
|
|
bbaf543537 | ||
|
|
50dd460eaa | ||
|
|
b3af77166b | ||
|
|
d8cb812c8e | ||
|
|
80386a7fb2 | ||
|
|
c0a5bbe7db | ||
|
|
ddeeca392c | ||
|
|
9944feee45 | ||
|
|
762b14b6cd | ||
|
|
e76e10fb36 | ||
|
|
fcdf565586 | ||
|
|
7a9bc14d98 | ||
|
|
5788e622f4 | ||
|
|
29c0f82ed2 | ||
|
|
e1417bee64 | ||
|
|
5f9e49705c | ||
|
|
1d2b61ee11 | ||
|
|
271987d448 | ||
|
|
6cac2f5848 | ||
|
|
ef4eb0d3c6 | ||
|
|
04ab0595fa | ||
|
|
9d3418d603 | ||
|
|
57acd85fb1 | ||
|
|
6d69ca81de | ||
|
|
be73581489 | ||
|
|
5682ce3149 | ||
|
|
cb2b000ddc | ||
|
|
cbc6ff73a4 | ||
|
|
4cd86caf67 | ||
|
|
885313af3b | ||
|
|
26e52b8013 | ||
|
|
011c658945 | ||
|
|
413da20838 | ||
|
|
09341a0934 | ||
|
|
2a9e3537ec | ||
|
|
c374520b64 | ||
|
|
e982b9798c | ||
|
|
7eb031919c | ||
|
|
97950d6b8d | ||
|
|
1613f35bf5 | ||
|
|
a78a7f866f | ||
|
|
643b89e539 | ||
|
|
bdfa525a75 | ||
|
|
93763d25f0 | ||
|
|
5800e55027 | ||
|
|
c572c3b787 | ||
|
|
3f7ed7c8db | ||
|
|
cc6cbd4a89 | ||
|
|
98ad835a77 | ||
|
|
3a1ac85020 | ||
|
|
1ddc859700 | ||
|
|
f1f629674e | ||
|
|
5a6bf02914 | ||
|
|
197cbbe0c6 | ||
|
|
b9abb44613 | ||
|
|
c4ec4a01f8 | ||
|
|
f40f4369a1 | ||
|
|
2733661125 | ||
|
|
4806f6e70d | ||
|
|
db21f5f9a8 | ||
|
|
07443a0e86 | ||
|
|
675db67ebb | ||
|
|
14ecacf6d1 | ||
|
|
9451da1e6d | ||
|
|
e30ddb398f | ||
|
|
375188495e | ||
|
|
5ff48a5a89 | ||
|
|
44ae31d101 | ||
|
|
942e5c7224 | ||
|
|
88ad42ccd1 | ||
|
|
df9732dae4 | ||
|
|
e66cc6a7b1 | ||
|
|
8f5a9a1918 | ||
|
|
6b9dee5b77 | ||
|
|
50bbf32cf0 | ||
|
|
413c1264ce | ||
|
|
c084756e48 | ||
|
|
6265a2d89e | ||
|
|
72778ee536 | ||
|
|
2f11a190bf | ||
|
|
2d394f4624 | ||
|
|
ea55757bc3 | ||
|
|
2a620dc845 | ||
|
|
bad5369760 | ||
|
|
2623e8a707 | ||
|
|
05dd438489 | ||
|
|
6780afbed1 | ||
|
|
f80f4c485d | ||
|
|
ac63063362 | ||
|
|
761a425e0d | ||
|
|
296d4560b0 | ||
|
|
0409824106 | ||
|
|
562addc3c6 | ||
|
|
ae82b2d9b6 | ||
|
|
355997d2d6 | ||
|
|
b6efd3091d | ||
|
|
52da12cf9a | ||
|
|
cd7d586afa | ||
|
|
cc4c2783a3 | ||
|
|
a8d48808d7 | ||
|
|
aa724f1ac6 | ||
|
|
519b9f3cc8 | ||
|
|
6e1bc0d7fb | ||
|
|
a2a1a78620 | ||
|
|
ab7693ac9f | ||
|
|
f4df5308d0 | ||
|
|
8dcc57c614 | ||
|
|
6594f06e9a | ||
|
|
8a706a97a0 | ||
|
|
39f0bf21ce | ||
|
|
0915a12e38 | ||
|
|
e6cd897cc4 | ||
|
|
35600910e0 | ||
|
|
f89cef307d | ||
|
|
e96edb3f36 | ||
|
|
bab4ec30af | ||
|
|
b6ab444529 | ||
|
|
15d905def0 | ||
|
|
e64b723b71 | ||
|
|
f0545dd979 | ||
|
|
f414ac2865 | ||
|
|
772cf77dcc | ||
|
|
026055a0b7 | ||
|
|
812e6a2402 | ||
|
|
b56aebb26f | ||
|
|
870903e03e | ||
|
|
b233a8b6ba | ||
|
|
e96e1baed5 | ||
|
|
dce368e308 | ||
|
|
15f609a52d | ||
|
|
0bf08085ce | ||
|
|
da68ad393c | ||
|
|
2f3600af9a | ||
|
|
0ff28aa21b | ||
|
|
b88ff4470c | ||
|
|
cfb1daee0a | ||
|
|
e3ab55beed | ||
|
|
9530d9949f | ||
|
|
6b2cd487a6 | ||
|
|
e5ec408a5c | ||
|
|
301b666790 | ||
|
|
e99b519509 | ||
|
|
d123273800 | ||
|
|
07136d9ac4 | ||
|
|
0ef06be477 | ||
|
|
5a70e75547 | ||
|
|
46b4cd7b03 | ||
|
|
93e15bc641 | ||
|
|
07d1f48778 | ||
|
|
21ed60bc46 | ||
|
|
7abbd98ff0 | ||
|
|
862f071557 | ||
|
|
73cd63e4e5 | ||
|
|
6857f538a6 | ||
|
|
195e3a22b4 | ||
|
|
88debb8e34 | ||
|
|
03cbf9c6cd | ||
|
|
55097b3d7d | ||
|
|
738ebd83d3 | ||
|
|
9c6dd94ac8 | ||
|
|
f936f4c0bc | ||
|
|
ab598f004d | ||
|
|
9c1f0bb08b | ||
|
|
b3519fadc4 | ||
|
|
d80657dd0a | ||
|
|
838493b8b9 | ||
|
|
26a4eb327c | ||
|
|
f6c252cbde | ||
|
|
11692a8499 | ||
|
|
ba3d80e8ea | ||
|
|
9c029cac72 | ||
|
|
dd065fa69e | ||
|
|
6f3d9307bb | ||
|
|
72584cd863 | ||
|
|
2a7bfcd36b | ||
|
|
21fc1f24e4 | ||
|
|
9396858834 | ||
|
|
79acd7acff | ||
|
|
fab711ddf3 | ||
|
|
760cf93317 | ||
|
|
f4838dde9b | ||
|
|
c90211e070 | ||
|
|
a2262d00cc | ||
|
|
95b8ebc297 | ||
|
|
99b3050d20 | ||
|
|
883f7ec3d8 | ||
|
|
9dd324be9c | ||
|
|
508438a0c5 | ||
|
|
9baed635d1 | ||
|
|
895a5ed73a | ||
|
|
2d7b126bc9 | ||
|
|
86d86395ea | ||
|
|
32c3bd1ded | ||
|
|
3158146946 | ||
|
|
def7d09f85 | ||
|
|
b9ac54b922 | ||
|
|
ae1b7e126c | ||
|
|
08ef3e7969 | ||
|
|
ea977fb43e | ||
|
|
7b47eee634 | ||
|
|
d7a3d93024 | ||
|
|
527248ef5b | ||
|
|
83ad09b179 | ||
|
|
ffe7ed313a | ||
|
|
7627d48a5c | ||
|
|
5c78e2b7e6 | ||
|
|
bc4e19aa48 | ||
|
|
879cc99aac | ||
|
|
aa72dcde97 | ||
|
|
a545810981 | ||
|
|
cff50aa5d6 | ||
|
|
84d857b497 | ||
|
|
7840e7d650 | ||
|
|
c014f72ffb | ||
|
|
893b3c1824 | ||
|
|
097e203f1f | ||
|
|
671d787a42 | ||
|
|
fcc9922133 | ||
|
|
64fb26b086 | ||
|
|
16a4de1a2b | ||
|
|
efae501834 | ||
|
|
3045954cd9 | ||
|
|
886c6b973e | ||
|
|
1ab3ef0af4 | ||
|
|
dd9b13cb58 | ||
|
|
8a7a6e8a70 | ||
|
|
1909b1fe60 | ||
|
|
881e440d22 | ||
|
|
7d79b311d8 | ||
|
|
b46bc10c44 | ||
|
|
bbd9222206 | ||
|
|
f20ab793a2 | ||
|
|
e5391760e6 | ||
|
|
5505886655 | ||
|
|
64f554ef41 | ||
|
|
fc8c5f82dc | ||
|
|
d792e64f38 | ||
|
|
232df647c1 | ||
|
|
adc516fd59 | ||
|
|
039d7fd324 | ||
|
|
2768023ff5 | ||
|
|
255181a5ff | ||
|
|
dc36ea76e8 | ||
|
|
e315d7d74b | ||
|
|
b4c6832828 | ||
|
|
3a96a00362 | ||
|
|
00a712d018 | ||
|
|
d4e21fdd10 | ||
|
|
9085cb7dd5 | ||
|
|
f6e3593a72 | ||
|
|
f2ef7ee661 | ||
|
|
27777f4dab | ||
|
|
34175f15d3 | ||
|
|
eb35d9b30a | ||
|
|
f1d32f2cd3 | ||
|
|
ee713adf33 | ||
|
|
33cb1b68df | ||
|
|
6dc9ee3f33 | ||
|
|
e609e41a64 | ||
|
|
80ecd024ee | ||
|
|
e8dbb216a5 | ||
|
|
f5d8d248b7 | ||
|
|
5d7ee25b37 | ||
|
|
2ff2d84283 | ||
|
|
c63fb35ba8 | ||
|
|
da0755769f | ||
|
|
04b28d116c | ||
|
|
65b0b2b5e0 | ||
|
|
8d52cc18ce | ||
|
|
c25376afa0 | ||
|
|
7cc0c1f1cf | ||
|
|
e56bb09889 | ||
|
|
c7a7083e64 | ||
|
|
61595aa0fa | ||
|
|
b8b134f389 | ||
|
|
c5a9ed6594 | ||
|
|
833254fa59 | ||
|
|
1b1aae9c4a | ||
|
|
acc50969dc | ||
|
|
48d68e4eff | ||
|
|
709e27bf4b | ||
|
|
1b16b341dd | ||
|
|
2e1f94aedf | ||
|
|
2f48ab99c3 | ||
|
|
f8870b31be | ||
|
|
73857eb8e3 | ||
|
|
dd2f218226 | ||
|
|
8a9f367067 | ||
|
|
e0df157f70 | ||
|
|
f2c9937ca8 | ||
|
|
12dc12ce09 | ||
|
|
2fad708556 | ||
|
|
73749285d5 | ||
|
|
49dbae5c32 | ||
|
|
d8d56e18f9 | ||
|
|
7f610d19ed | ||
|
|
3eca7dfd7b | ||
|
|
b02d5538b0 | ||
|
|
ebff62f56b | ||
|
|
53b24618a5 | ||
|
|
867151fe25 | ||
|
|
82fc309c4e | ||
|
|
27521c0b5e | ||
|
|
e611d4403b | ||
|
|
807c87e057 | ||
|
|
f63ad3d9e7 | ||
|
|
c4b4478d1a | ||
|
|
963250a58f | ||
|
|
be570fce65 | ||
|
|
6094effd58 | ||
|
|
7187608a36 | ||
|
|
a54d9d2118 | ||
|
|
56dd69ff1c | ||
|
|
89240cecae | ||
|
|
4ec9bd751e | ||
|
|
d74f7fef4e | ||
|
|
538d4020df | ||
|
|
f2bd3173d4 | ||
|
|
2bf8017516 | ||
|
|
2a3afdd5d9 | ||
|
|
1dc028cdf2 | ||
|
|
72c56567fe | ||
|
|
ca1055588d | ||
|
|
fca30d7acc | ||
|
|
5bf2209fdb | ||
|
|
f86a5abeb6 | ||
|
|
9ac313f551 | ||
|
|
546f810159 | ||
|
|
7affdafcd3 | ||
|
|
7221b6b24b | ||
|
|
f904ec41eb | ||
|
|
e7ae0f183c | ||
|
|
86df7c6696 | ||
|
|
99923b57b8 | ||
|
|
4addb292b1 | ||
|
|
149a8d7bd8 | ||
|
|
a69657dde7 | ||
|
|
c2d4de54b0 | ||
|
|
5216e89a70 | ||
|
|
96766aa719 | ||
|
|
3670e7b89e | ||
|
|
b18ac09f77 | ||
|
|
4dcaa61167 | ||
|
|
8bf52e1dec | ||
|
|
e4722e9642 | ||
|
|
65f6f46846 | ||
|
|
f6a4986c15 | ||
|
|
6d3b29f3ca | ||
|
|
30c0848487 | ||
|
|
ee1b0c3e4f | ||
|
|
37ac294a11 | ||
|
|
0d862efa9c | ||
|
|
22d7b52a58 | ||
|
|
9f1c9b2a31 | ||
|
|
0483eebc7b | ||
|
|
54aacb4245 | ||
|
|
5cb367e771 | ||
|
|
feb069a2e9 | ||
|
|
cbdbcd87ff | ||
|
|
7a4d2cff67 | ||
|
|
5638f47cb0 | ||
|
|
4c513d536b | ||
|
|
8553fce68a | ||
|
|
03a4e2f8a9 | ||
|
|
918bd03488 | ||
|
|
01a7f7bb8e | ||
|
|
6b48cbd1dc | ||
|
|
64a0a67eb4 | ||
|
|
93d9e18f04 | ||
|
|
7c2c42b8da | ||
|
|
e4fee325cb | ||
|
|
ec63533eb1 | ||
|
|
e51621aa7f | ||
|
|
80a78e60d1 | ||
|
|
9f46c34587 | ||
|
|
f07a0585fc | ||
|
|
32ec10485e | ||
|
|
ce7d5f7a51 | ||
|
|
9b64d74f6a | ||
|
|
99cc0aebd6 | ||
|
|
cca343abb0 | ||
|
|
f08e48e700 | ||
|
|
e2f8d2a15f | ||
|
|
2c5761d32e | ||
|
|
3c9d95c62f | ||
|
|
481000b4ce | ||
|
|
b2126722e5 | ||
|
|
083b789102 | ||
|
|
a564b38b7e | ||
|
|
5427249cfc | ||
|
|
032982ab9c | ||
|
|
96aeb9bf64 | ||
|
|
c98f6ea395 | ||
|
|
073f9cf120 | ||
|
|
1fdd0c1248 | ||
|
|
a883c65dd6 | ||
|
|
aac39f89cc | ||
|
|
e25576d26d | ||
|
|
3626a13273 | ||
|
|
6750ce1667 | ||
|
|
1081cecea9 | ||
|
|
7451e6eb75 | ||
|
|
81908c8cc9 | ||
|
|
d3d41a3e1d | ||
|
|
0a37f8798a | ||
|
|
4f89b60ab9 | ||
|
|
0938576618 | ||
|
|
4ca8d4173a | ||
|
|
978549dc58 | ||
|
|
d5cbe48d59 | ||
|
|
e8ec795883 | ||
|
|
62bc6b211f | ||
|
|
6fac6c237b | ||
|
|
20ff4e2fb9 | ||
|
|
f78d3a858f | ||
|
|
bc6ca7ff88 | ||
|
|
65ae6f1dab | ||
|
|
ba24338122 | ||
|
|
2299c9588d | ||
|
|
ba80d0318f | ||
|
|
6342dae0e9 | ||
|
|
baf94181aa | ||
|
|
bbe9742c46 | ||
|
|
1447ef3818 | ||
|
|
5598dbf9d7 | ||
|
|
8967e851c4 | ||
|
|
15378f6ced | ||
|
|
4d2e8d1913 | ||
|
|
4feaee0fe6 | ||
|
|
51984d49cf | ||
|
|
a6a8bb940c | ||
|
|
6265e34afb | ||
|
|
d08a2394b3 | ||
|
|
c0f1263d78 | ||
|
|
a25b1c1048 | ||
|
|
99859e461d | ||
|
|
d52dbeaa7a | ||
|
|
c11c7695cb | ||
|
|
c4d3b13ae2 | ||
|
|
bcf3a70174 | ||
|
|
743d290577 | ||
|
|
82347eb9bc | ||
|
|
84c7bf8b18 | ||
|
|
d92300506c | ||
|
|
2da32970b9 | ||
|
|
1d0a733487 | ||
|
|
9464953924 | ||
|
|
c9b05d8fed | ||
|
|
a02bc27c3e | ||
|
|
6a04e97bca | ||
|
|
0780621024 | ||
|
|
2bc0f45a52 | ||
|
|
178eb5c5a8 | ||
|
|
761fc29567 | ||
|
|
9f5c82420a | ||
|
|
23041be511 | ||
|
|
dcbf4b4f2a | ||
|
|
652345bc4d | ||
|
|
69a1a9ef7a | ||
|
|
2464181d2b | ||
|
|
c3c1d19a5c | ||
|
|
75f288a6e4 | ||
|
|
94259baea1 | ||
|
|
9e8ff003b6 | ||
|
|
3dee9d9a4c | ||
|
|
3f03a71afd | ||
|
|
093e93cfbf | ||
|
|
78f619b1e7 | ||
|
|
43c44a0f48 | ||
|
|
6b1e8171c8 | ||
|
|
2e50b3da7c | ||
|
|
eca13e72bf | ||
|
|
b64ba6ac2d | ||
|
|
7b801a0ce0 | ||
|
|
528cbbb636 | ||
|
|
fd48233c13 | ||
|
|
b72764af5a | ||
|
|
7e7c45fb0f | ||
|
|
61f515b3dd | ||
|
|
e05686cbe8 | ||
|
|
1fc8ae32bd | ||
|
|
e80d43f4c4 | ||
|
|
a6b0f45d2c | ||
|
|
39263ea365 | ||
|
|
9ea214d0b3 | ||
|
|
5371ff039b | ||
|
|
315f4adb8f | ||
|
|
05632c0a40 | ||
|
|
8df4a98d7b | ||
|
|
02656b624d | ||
|
|
61af2aee8e | ||
|
|
ddebd69128 | ||
|
|
ac11727ec5 | ||
|
|
5748d220ba | ||
|
|
3b86683843 | ||
|
|
3bd5baa3c5 | ||
|
|
330aa16687 | ||
|
|
8a4d6b5bcf | ||
|
|
40d0a88cf9 | ||
|
|
dc6a895db8 | ||
|
|
3b1b89e6c0 | ||
|
|
013a1b413b | ||
|
|
3be16d8077 | ||
|
|
927ec78b6e | ||
|
|
8ca606f7ac | ||
|
|
e7d2a9c212 | ||
|
|
fcb4e379e3 | ||
|
|
cda96f2f9e | ||
|
|
e11f65e51e | ||
|
|
3ea02d13fc | ||
|
|
e30fd0f4ad | ||
|
|
418e4014e6 | ||
|
|
e78a4f5eac | ||
|
|
540dbcbc03 | ||
|
|
a8265f8846 | ||
|
|
c120c511d5 | ||
|
|
424b8c9d46 | ||
|
|
5bc72b70b8 | ||
|
|
fe37196788 | ||
|
|
ba44c50f4e | ||
|
|
729ca941be | ||
|
|
0ee947dba6 | ||
|
|
d1fd0a7384 | ||
|
|
ae2c582138 | ||
|
|
b7e5cef934 | ||
|
|
9378d0cd0f | ||
|
|
f9df36c473 | ||
|
|
8bb0235c92 | ||
|
|
fc310e429e | ||
|
|
8d0ffb2fa5 | ||
|
|
9f07cc9ab2 | ||
|
|
1fff80e10d | ||
|
|
0a57cdc6e8 | ||
|
|
1a86b20f7c | ||
|
|
0068750a5c | ||
|
|
ee47f26d1c | ||
|
|
3945abb2f2 | ||
|
|
9de4f7f4b9 | ||
|
|
3610b5073b | ||
|
|
1991138185 | ||
|
|
8ebc21cd1f | ||
|
|
1c1ce2c6f7 | ||
|
|
39b0830a66 | ||
|
|
6b367445a3 | ||
|
|
37c66fc33c | ||
|
|
1bd5798a99 | ||
|
|
90c4c4811a | ||
|
|
49de170652 | ||
|
|
07c89fa975 | ||
|
|
7a1f23e2e4 | ||
|
|
25165b0771 | ||
|
|
3e7acec0b4 | ||
|
|
4165961d31 | ||
|
|
2e3a12438a | ||
|
|
731c99b52c | ||
|
|
470b4eebd8 | ||
|
|
6750df8e01 | ||
|
|
8736d1e78f | ||
|
|
140b1e33ef | ||
|
|
3056428eda | ||
|
|
367a30827f | ||
|
|
fe8ef9e0bd | ||
|
|
d77f46aa09 | ||
|
|
043e283db3 | ||
|
|
2019f1e7ea | ||
|
|
22c7178561 | ||
|
|
525aeb102f | ||
|
|
9fb5ac36ed | ||
|
|
c30764b7cc | ||
|
|
8a2de90c28 | ||
|
|
243c439bb8 | ||
|
|
060ac46bd8 | ||
|
|
ae2a683929 | ||
|
|
2b5eeb8d24 | ||
|
|
bbb94be213 | ||
|
|
e1c75aec6c | ||
|
|
3030d281d9 | ||
|
|
81d8b94cdc | ||
|
|
276e1960b1 | ||
|
|
70920d7a04 | ||
|
|
f1e201d368 | ||
|
|
ef863f5fd4 | ||
|
|
ce65df7d17 | ||
|
|
fa9c6116a4 | ||
|
|
28b70663f1 | ||
|
|
c0fe8f27eb | ||
|
|
926ac77bc0 | ||
|
|
fc7c8f7520 | ||
|
|
46c1c45d85 | ||
|
|
f99e863649 | ||
|
|
dcc21ece97 | ||
|
|
a53e3604a6 | ||
|
|
cfea6c1179 | ||
|
|
4d1daa0b6c | ||
|
|
df925bc7fd | ||
|
|
df22e37dfd | ||
|
|
2136266d1d | ||
|
|
a95232dd33 | ||
|
|
29c6288128 | ||
|
|
cd6fcb5297 | ||
|
|
36989deff7 | ||
|
|
7f6c9851fe | ||
|
|
b7079454b5 | ||
|
|
448bd45ab4 | ||
|
|
dde6170df1 | ||
|
|
e4b9350e65 | ||
|
|
622a0649ce | ||
|
|
f6983969ad | ||
|
|
7f7fc35843 | ||
|
|
8eef7e5406 | ||
|
|
f27c33b45f | ||
|
|
6a83e2ebe5 | ||
|
|
ee5be5e3f2 | ||
|
|
be0cc9dc6e | ||
|
|
7c5283bb97 | ||
|
|
4d5ba09d88 | ||
|
|
149236b002 | ||
|
|
ee141f97dc | ||
|
|
646503ff31 | ||
|
|
cdaaf5e46f | ||
|
|
e774c51c97 | ||
|
|
7f5c9abc1e | ||
|
|
92d82ceaee | ||
|
|
c46b118f37 | ||
|
|
1722b07615 | ||
|
|
c13c6ebadb | ||
|
|
2abe679dd1 | ||
|
|
9571513601 | ||
|
|
ff2767ee7b | ||
|
|
56319475a6 | ||
|
|
a3ee58a294 | ||
|
|
7a533aeff3 | ||
|
|
226c54613e | ||
|
|
1ebbebf5de | ||
|
|
33f6fe0217 | ||
|
|
5ff206e1a9 | ||
|
|
df618d3cba | ||
|
|
9506bd9da0 | ||
|
|
5e0684e99d | ||
|
|
09a0cb24cc | ||
|
|
ff92f1d799 | ||
|
|
b87703c503 | ||
|
|
b2aaa21b0a | ||
|
|
310c15b046 | ||
|
|
685802b1ce | ||
|
|
380eb8340a | ||
|
|
f98e1160f5 | ||
|
|
1962fd68df | ||
|
|
29813c1e14 | ||
|
|
df40fbe03e | ||
|
|
7000c6074e | ||
|
|
ef1fe3ab41 | ||
|
|
fdd198b0e8 | ||
|
|
e37f77e02d | ||
|
|
3fcfee88be | ||
|
|
a082413d09 | ||
|
|
280f40508e | ||
|
|
e2be0e2ff0 | ||
|
|
dcff3118d9 | ||
|
|
731168ec8d | ||
|
|
7b4435a0f8 | ||
|
|
738af29724 | ||
|
|
08ef242afb | ||
|
|
92ea8be309 | ||
|
|
48414e97bb | ||
|
|
77a2975524 | ||
|
|
ce9477966d | ||
|
|
fe02351c3a | ||
|
|
9c2018a0dc | ||
|
|
33e5b34fa1 | ||
|
|
ccf73f2505 | ||
|
|
3a11f6ee0a | ||
|
|
8f694bbfb7 | ||
|
|
4c2eff4865 | ||
|
|
1fbdc17c40 | ||
|
|
965d62f326 | ||
|
|
25ea7fa98e | ||
|
|
5ee040ba95 | ||
|
|
eb2aec9da8 | ||
|
|
973e7bda5e | ||
|
|
154cd4ecf3 | ||
|
|
936fad1d04 | ||
|
|
86dd046c7c | ||
|
|
510fb248fe | ||
|
|
c7384c6aee | ||
|
|
1c3c9143f8 | ||
|
|
1c696b1e39 | ||
|
|
a2adbc1133 | ||
|
|
36576708f0 | ||
|
|
cc7a6f166b | ||
|
|
62d88e7c95 | ||
|
|
dca8e3123f | ||
|
|
3bac4fad09 | ||
|
|
9fff19da23 | ||
|
|
e5bb4d2718 | ||
|
|
5bfb51f801 | ||
|
|
ece5b29d97 | ||
|
|
ec8a92c17f | ||
|
|
868393b7ed | ||
|
|
ebe18fbb7f | ||
|
|
9435343541 | ||
|
|
1cd20afe4f | ||
|
|
1e6fe40c76 | ||
|
|
6d220ed9a2 | ||
|
|
f00439c93e | ||
|
|
c59696e30e | ||
|
|
89c18c73cd | ||
|
|
cb5006c73f | ||
|
|
547b71f222 | ||
|
|
ae84bfb055 | ||
|
|
9b303d5b89 | ||
|
|
d944f934d7 | ||
|
|
c37209cd09 | ||
|
|
863b569a61 | ||
|
|
f36c514f1f | ||
|
|
3ab28c7fa4 | ||
|
|
c03258325b | ||
|
|
20d3bb189b | ||
|
|
90acec60bb | ||
|
|
0565888c03 | ||
|
|
f7e817cff6 | ||
|
|
29cbbe83f9 | ||
|
|
64b16acb1f | ||
|
|
19c20bb422 | ||
|
|
28b10d2ee0 | ||
|
|
1f5123f72a | ||
|
|
ac5b6d097b | ||
|
|
a7bf9ddf28 | ||
|
|
e27479e170 | ||
|
|
fa28e738c6 | ||
|
|
898c5555f6 | ||
|
|
314059fcf0 | ||
|
|
221781bd0b | ||
|
|
9f5e141437 | ||
|
|
8be6de177f | ||
|
|
890a519121 | ||
|
|
89321edae6 | ||
|
|
6d6cd56196 | ||
|
|
2e95e04359 | ||
|
|
accba4ead5 | ||
|
|
1e9b7883cf | ||
|
|
87e406eee6 | ||
|
|
45ed3b0412 | ||
|
|
0516fc96ca | ||
|
|
e7a435fd5b | ||
|
|
7a249d7771 | ||
|
|
7986ff9cee | ||
|
|
b74c13d75f | ||
|
|
de8eeb87f4 | ||
|
|
36c4174de3 | ||
|
|
3497936cdf | ||
|
|
81abc92743 | ||
|
|
1ef8dc3137 | ||
|
|
9a5c1bbe48 | ||
|
|
30dff61376 | ||
|
|
de1bb68d19 | ||
|
|
06d8bb5019 | ||
|
|
b4dc1f338d | ||
|
|
181128fe73 | ||
|
|
252838e696 | ||
|
|
49f171a8b1 | ||
|
|
3d12803ab3 | ||
|
|
a168091bfb | ||
|
|
35fc57291f | ||
|
|
2542224d7b | ||
|
|
882fbb3209 | ||
|
|
2680c45811 | ||
|
|
b76808dbd5 | ||
|
|
ba50b50a15 | ||
|
|
f6d3f8d471 | ||
|
|
d9859d66bf | ||
|
|
4ccb0b9a53 | ||
|
|
f36c775d50 | ||
|
|
b21dc929ef | ||
|
|
d226925fe7 | ||
|
|
20d6e9af04 | ||
|
|
5103adab89 | ||
|
|
7eb435eb73 | ||
|
|
5d011c1333 | ||
|
|
6adb792d57 | ||
|
|
a844749791 | ||
|
|
dd0d43e726 | ||
|
|
25811471fa | ||
|
|
569bc1a889 | ||
|
|
b1756b410a | ||
|
|
7789ac6331 | ||
|
|
7a3aabbbda | ||
|
|
e486095603 | ||
|
|
bf6babe07e | ||
|
|
d5a4d89682 | ||
|
|
5710b9e7e8 | ||
|
|
b4ab95f00c | ||
|
|
a52c9f0ac6 | ||
|
|
b6bab4d3fd | ||
|
|
5b110fba2d | ||
|
|
179133c8ad | ||
|
|
365b6c7bc2 | ||
|
|
dc4887cd44 | ||
|
|
c4836a576f | ||
|
|
98afe0d27a | ||
|
|
fdc759f7c2 | ||
|
|
43448bac11 | ||
|
|
456d2864a6 | ||
|
|
406a5ec76f | ||
|
|
f71c419cfb | ||
|
|
babb73295f | ||
|
|
f3ec5fd329 | ||
|
|
5aca0d147d | ||
|
|
f2b19b6ae9 | ||
|
|
7cb9ed66be | ||
|
|
d578f4598a | ||
|
|
d30e6c23ab | ||
|
|
1c05f2fb9a | ||
|
|
1407ace94a | ||
|
|
97008f2db6 | ||
|
|
076eed7eb4 | ||
|
|
33c7b056ea | ||
|
|
3b8c40c3e6 | ||
|
|
3f70521a63 | ||
|
|
21f5895b5a | ||
|
|
738a2e7343 | ||
|
|
62bd015475 | ||
|
|
ac5c62c116 | ||
|
|
80fe1065ad | ||
|
|
fea195cc8d | ||
|
|
9ef314e1e3 | ||
|
|
95f859118b | ||
|
|
daceac9117 | ||
|
|
cfa2647260 | ||
|
|
03cdf3b5d7 | ||
|
|
f8f415a605 | ||
|
|
fe117d3916 | ||
|
|
069536d598 | ||
|
|
5f53ca0af5 | ||
|
|
9a06768863 | ||
|
|
0c8379f681 | ||
|
|
92dc0506fe | ||
|
|
7045a223d2 | ||
|
|
763e4936cd | ||
|
|
f0c7491029 | ||
|
|
ba5c4b2831 | ||
|
|
9c73438682 | ||
|
|
37f7337d2b | ||
|
|
98285c27ab | ||
|
|
5750881cea | ||
|
|
95ca1c2e50 | ||
|
|
e4031ced39 | ||
|
|
7f6d21c53b | ||
|
|
846ac347fe | ||
|
|
50afd443fc | ||
|
|
14bcebd8b7 | ||
|
|
d091d3c7f4 | ||
|
|
eb0ef8ab31 | ||
|
|
9c5c12a1bc | ||
|
|
8b197b27ed | ||
|
|
8c57e55b59 | ||
|
|
6d1639a513 | ||
|
|
5e6f72e8f4 | ||
|
|
707e3479f8 | ||
|
|
201232dae3 | ||
|
|
f768bb5783 | ||
|
|
f0de3ccd9c | ||
|
|
09e8d4c4f3 | ||
|
|
8188400c97 | ||
|
|
962d38e9dd | ||
|
|
9fc2c59122 | ||
|
|
540f4349f5 | ||
|
|
1d7e419008 | ||
|
|
95394e0fc8 | ||
|
|
f9330a4c2c | ||
|
|
be0e4667a5 | ||
|
|
408eeae70f | ||
|
|
27c82c19ea | ||
|
|
937f3d0d78 | ||
|
|
bc3cc71f90 | ||
|
|
ad4531db1e | ||
|
|
e5d8d10d4f | ||
|
|
89bf81a9db | ||
|
|
6237477ba3 | ||
|
|
6706024687 | ||
|
|
7649126248 | ||
|
|
104dca867f | ||
|
|
881b1c0e08 | ||
|
|
3537d76726 | ||
|
|
ccd1961c60 | ||
|
|
f350f0c0bb | ||
|
|
80672d33af | ||
|
|
7a1cfb48b9 | ||
|
|
ae3b213b0e | ||
|
|
eaf9bdaeb4 | ||
|
|
bc4bfb94a2 | ||
|
|
a77331f8f0 | ||
|
|
94b7add334 | ||
|
|
9c9e6cd324 | ||
|
|
f50efca73f | ||
|
|
19cfb2774d | ||
|
|
27347c98d9 | ||
|
|
ebbc47702d | ||
|
|
09d42f0ad9 | ||
|
|
35df24d63a | ||
|
|
f93b6a13f4 | ||
|
|
50d7fb8f41 | ||
|
|
311e7a1feb | ||
|
|
14e587d55f | ||
|
|
66ec967de2 | ||
|
|
252693aeac | ||
|
|
079b47ed94 | ||
|
|
d2952b07aa | ||
|
|
41f1b93422 | ||
|
|
3140810c95 | ||
|
|
046d761f4c | ||
|
|
0a2083df72 | ||
|
|
80c810bf9e | ||
|
|
82ba424212 | ||
|
|
c131b99cb3 | ||
|
|
64a85fb832 | ||
|
|
ebf1772068 | ||
|
|
8604c255c4 | ||
|
|
bea8321205 | ||
|
|
db962c4bf2 | ||
|
|
d1a3de7671 | ||
|
|
8da7e74408 | ||
|
|
55eb898186 | ||
|
|
a7fc29d4bd | ||
|
|
fdb3e51294 | ||
|
|
0582180cab | ||
|
|
46667b5a8c | ||
|
|
e4e1de82ec | ||
|
|
d51c8fcfa7 | ||
|
|
9b33c34a57 | ||
|
|
0b6cd7e90e | ||
|
|
029a04c37d | ||
|
|
60c1df4e9c | ||
|
|
3e35312537 | ||
|
|
932b39fd08 | ||
|
|
78cafe45d4 | ||
|
|
584e792a5a | ||
|
|
f0bcfa0415 | ||
|
|
d45ec7bd28 | ||
|
|
153f2f6300 | ||
|
|
9df3975740 | ||
|
|
5575b391ff | ||
|
|
9faf11ddf3 | ||
|
|
d3ed27722e | ||
|
|
07a3f3040a | ||
|
|
749ab2a746 | ||
|
|
217a135eb1 | ||
|
|
22e65b320b | ||
|
|
53bb940b30 | ||
|
|
1c1ad8098a | ||
|
|
203db4390c | ||
|
|
b6d9c2c1ad | ||
|
|
429ef4d4e9 | ||
|
|
25759ca933 | ||
|
|
74abea07e2 | ||
|
|
7955bb1a84 | ||
|
|
75b11eb80a | ||
|
|
c958817eef | ||
|
|
80f8c2a418 | ||
|
|
08640a6f64 | ||
|
|
9db31f7506 | ||
|
|
7fd40632fe | ||
|
|
6ef19d2925 | ||
|
|
83ce83239b | ||
|
|
30fb486e44 | ||
|
|
0022661565 | ||
|
|
28e882f26f | ||
|
|
71fbe7a812 | ||
|
|
ce3d94af1a | ||
|
|
0bc09665a8 | ||
|
|
205ba098e9 | ||
|
|
877832da69 | ||
|
|
b7ba96a72e | ||
|
|
93c59f2d9c | ||
|
|
5a56b658ba | ||
|
|
99889671b5 | ||
|
|
a2fb017208 | ||
|
|
f7021d84b5 | ||
|
|
c793fc27d8 | ||
|
|
3d2328bdfd | ||
|
|
76b69f45de | ||
|
|
73e65edaa9 | ||
|
|
cd7ee5a435 | ||
|
|
eac4faddc6 | ||
|
|
bc8a73dde4 | ||
|
|
624b9d8ee6 | ||
|
|
9d6e2ff1b0 | ||
|
|
aca0c7bc5a | ||
|
|
db47b58275 | ||
|
|
59bf7607ce | ||
|
|
61ff3fbd7b | ||
|
|
523fc57ab4 | ||
|
|
ae18c5d847 | ||
|
|
4abdc2f35d | ||
|
|
f8748bfa9a | ||
|
|
5fb0ae2c2d | ||
|
|
899fc72014 | ||
|
|
1267c1d9a2 | ||
|
|
9a697e340b | ||
|
|
abe8ca71e0 | ||
|
|
9bbf7dcf96 | ||
|
|
ec1222b58b | ||
|
|
229b46e0ca | ||
|
|
b6a68c4add | ||
|
|
e588bfac7d | ||
|
|
224020533e | ||
|
|
3736bb3aca | ||
|
|
1e72f92b74 | ||
|
|
896f5b2e9f | ||
|
|
c068d4048f | ||
|
|
8796cd76b0 | ||
|
|
1597ede2af | ||
|
|
3dd8020695 | ||
|
|
dfa041991f | ||
|
|
568896742b | ||
|
|
f52973217f | ||
|
|
efd29f1cec | ||
|
|
4b02670049 | ||
|
|
8550874686 | ||
|
|
38513d5a53 | ||
|
|
a35236a8f6 | ||
|
|
0c2e72b7c1 | ||
|
|
f0bdfbebe4 | ||
|
|
a4fa61d05d | ||
|
|
6e23a635c6 | ||
|
|
4dedac6a24 | ||
|
|
8c1b9b33c1 | ||
|
|
d37c17857e | ||
|
|
a0065456d0 | ||
|
|
a34a571d2e | ||
|
|
bb4cfece61 | ||
|
|
b16d263ee7 | ||
|
|
027395bb8a | ||
|
|
3ecd790206 | ||
|
|
52bb9e186b | ||
|
|
68b6d1cab1 | ||
|
|
bdb67b4fba | ||
|
|
d0c39a11d5 | ||
|
|
9de6361938 | ||
|
|
fb016dca86 | ||
|
|
8beb7b4231 | ||
|
|
2b08a79206 | ||
|
|
5885fead8f | ||
|
|
a9fb7a4a88 | ||
|
|
b5dbcaeaf9 | ||
|
|
80a46d4a5c | ||
|
|
febce822d5 | ||
|
|
e8099a713c | ||
|
|
d9de4a09b8 | ||
|
|
2dbcda2619 | ||
|
|
691b93ffb0 | ||
|
|
cb0c94cd40 | ||
|
|
3168718563 | ||
|
|
dc8972a26a | ||
|
|
0a2d8f4d22 | ||
|
|
8d623967ed | ||
|
|
503ed96275 | ||
|
|
d8ba84d427 | ||
|
|
8e8c41a3bc | ||
|
|
e34fe17b45 | ||
|
|
c5b0278c58 | ||
|
|
8daa257b35 | ||
|
|
6329174cfc | ||
|
|
1ec41c1bf1 | ||
|
|
581a76de38 | ||
|
|
5d52ca8909 | ||
|
|
ad7151d394 | ||
|
|
3269a7b0e7 | ||
|
|
6a155cc606 | ||
|
|
a5bbf613e8 | ||
|
|
22427c1359 | ||
|
|
f17121fd6c | ||
|
|
256e37eb3f | ||
|
|
bdfd123b9d | ||
|
|
3f7dce202a | ||
|
|
a6d21abe14 | ||
|
|
d0f1fe2273 | ||
|
|
8de9593209 | ||
|
|
64b2b50470 | ||
|
|
4dc1451c49 | ||
|
|
211081ff25 | ||
|
|
c1c1d5cf8e | ||
|
|
e91ffef258 | ||
|
|
47c8aa3790 | ||
|
|
33b4e7fb0a | ||
|
|
936da0295b | ||
|
|
c2205c14fb | ||
|
|
56935f5743 | ||
|
|
1b3bae790c | ||
|
|
47559a8c87 | ||
|
|
86412ea821 | ||
|
|
b8aa844171 | ||
|
|
f9464c5cf9 | ||
|
|
9df75e1fa3 | ||
|
|
0218e2ebf7 | ||
|
|
a9dc6550d5 | ||
|
|
ffd6ec3c54 | ||
|
|
de3e0df96c | ||
|
|
e5dadf34d9 | ||
|
|
52145f2d73 | ||
|
|
90df3caf62 | ||
|
|
50db66a925 | ||
|
|
8587fa05bd | ||
|
|
8129dade3c | ||
|
|
3610fe7c33 | ||
|
|
90518e0ce5 | ||
|
|
9c060f06ba | ||
|
|
e848aa7813 | ||
|
|
feedc912e4 | ||
|
|
ab3f05cf62 | ||
|
|
35982e51bf | ||
|
|
94e650c518 | ||
|
|
d9edc18bf8 | ||
|
|
f4d01e0a05 | ||
|
|
648cfaba51 | ||
|
|
3a9de13f4e | ||
|
|
629a68937e | ||
|
|
34e80abdea | ||
|
|
1161b21166 | ||
|
|
bcdef81e30 | ||
|
|
acc0afbb7a | ||
|
|
7584044b3c | ||
|
|
02c14e981c | ||
|
|
37ee972f74 | ||
|
|
3809407b6a | ||
|
|
f9547c447a | ||
|
|
eb85d45137 | ||
|
|
9f0060f651 | ||
|
|
0e6dc3f7ea | ||
|
|
1b4944e1de | ||
|
|
83743e3613 | ||
|
|
87afcc3ef4 | ||
|
|
6ed3a4e1a6 | ||
|
|
8a56671d18 | ||
|
|
1d81db76a6 | ||
|
|
f50aecb84e | ||
|
|
a4258277e1 | ||
|
|
18eb3c7c38 | ||
|
|
a0e728b5c8 | ||
|
|
df0176cca4 | ||
|
|
b68b3c543b | ||
|
|
aea1a85bb4 | ||
|
|
98e874e750 | ||
|
|
eef016c27d | ||
|
|
19f89ecafd | ||
|
|
8817dee66c | ||
|
|
404e266222 | ||
|
|
9b898c65fa | ||
|
|
5c39cf4deb | ||
|
|
beff276a52 | ||
|
|
55cb82c6c8 | ||
|
|
88d1143827 | ||
|
|
d5162b1917 | ||
|
|
ec078543a1 | ||
|
|
9191074666 | ||
|
|
89824849d3 | ||
|
|
877083f091 | ||
|
|
6467fcd0f5 | ||
|
|
fd135f1a8b | ||
|
|
4e08ec2405 | ||
|
|
925c348565 | ||
|
|
25fd1aaf7e | ||
|
|
91e645b91b | ||
|
|
a1c2f07b6e | ||
|
|
7f7bec0668 | ||
|
|
cb34f7c6d1 | ||
|
|
7f47a61986 | ||
|
|
e8843c38f2 | ||
|
|
d66c00dd1d | ||
|
|
55ac8628c8 | ||
|
|
175f75b43f | ||
|
|
da3226745c | ||
|
|
b23e3ea13a | ||
|
|
02f0ee08fc | ||
|
|
4b0e79be50 | ||
|
|
8b729475e2 | ||
|
|
a1319b1786 | ||
|
|
278fa43303 | ||
|
|
d75f364b27 | ||
|
|
52d5021b76 | ||
|
|
7cfd3bd510 | ||
|
|
05ca131858 | ||
|
|
181ce8571d | ||
|
|
2ab0c6abce | ||
|
|
50caf29b4e | ||
|
|
067f7af142 | ||
|
|
d1449951bc | ||
|
|
a05af50b0f | ||
|
|
950aff269b | ||
|
|
e033db559f | ||
|
|
9a24a40fd2 | ||
|
|
df391e2144 | ||
|
|
9146b4d4b6 | ||
|
|
068d7e085b | ||
|
|
79510a8290 | ||
|
|
50240c93bd | ||
|
|
7ca0e5db60 | ||
|
|
c0e6765d46 | ||
|
|
7739b0e8ea |
110
.common-ci.yml
110
.common-ci.yml
@@ -1,4 +1,4 @@
|
|||||||
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
# Copyright (c) 2021-2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
# you may not use this file except in compliance with the License.
|
# you may not use this file except in compliance with the License.
|
||||||
@@ -12,17 +12,17 @@
|
|||||||
# See the License for the specific language governing permissions and
|
# See the License for the specific language governing permissions and
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
default:
|
default:
|
||||||
image: docker:stable
|
image: docker
|
||||||
services:
|
services:
|
||||||
- name: docker:stable-dind
|
- name: docker:dind
|
||||||
command: ["--experimental"]
|
command: ["--experimental"]
|
||||||
|
|
||||||
variables:
|
variables:
|
||||||
GIT_SUBMODULE_STRATEGY: recursive
|
GIT_SUBMODULE_STRATEGY: recursive
|
||||||
BUILDIMAGE: "${CI_REGISTRY_IMAGE}/build:${CI_COMMIT_SHORT_SHA}"
|
|
||||||
BUILD_MULTI_ARCH_IMAGES: "true"
|
BUILD_MULTI_ARCH_IMAGES: "true"
|
||||||
|
|
||||||
stages:
|
stages:
|
||||||
|
- trigger
|
||||||
- image
|
- image
|
||||||
- lint
|
- lint
|
||||||
- go-checks
|
- go-checks
|
||||||
@@ -33,52 +33,70 @@ stages:
|
|||||||
- test
|
- test
|
||||||
- scan
|
- scan
|
||||||
- release
|
- release
|
||||||
|
- sign
|
||||||
|
|
||||||
|
.pipeline-trigger-rules:
|
||||||
|
rules:
|
||||||
|
# We trigger the pipeline if started manually
|
||||||
|
- if: $CI_PIPELINE_SOURCE == "web"
|
||||||
|
# We trigger the pipeline on the main branch
|
||||||
|
- if: $CI_COMMIT_BRANCH == "main"
|
||||||
|
# We trigger the pipeline on the release- branches
|
||||||
|
- if: $CI_COMMIT_BRANCH =~ /^release-.*$/
|
||||||
|
# We trigger the pipeline on tags
|
||||||
|
- if: $CI_COMMIT_TAG && $CI_COMMIT_TAG != ""
|
||||||
|
|
||||||
|
workflow:
|
||||||
|
rules:
|
||||||
|
# We trigger the pipeline on a merge request
|
||||||
|
- if: $CI_PIPELINE_SOURCE == 'merge_request_event'
|
||||||
|
# We then add all the regular triggers
|
||||||
|
- !reference [.pipeline-trigger-rules, rules]
|
||||||
|
|
||||||
|
# The main or manual job is used to filter out distributions or architectures that are not required on
|
||||||
|
# every build.
|
||||||
|
.main-or-manual:
|
||||||
|
rules:
|
||||||
|
- !reference [.pipeline-trigger-rules, rules]
|
||||||
|
- if: $CI_PIPELINE_SOURCE == "schedule"
|
||||||
|
when: manual
|
||||||
|
|
||||||
|
# The trigger-pipeline job adds a manualy triggered job to the pipeline on merge requests.
|
||||||
|
trigger-pipeline:
|
||||||
|
stage: trigger
|
||||||
|
script:
|
||||||
|
- echo "starting pipeline"
|
||||||
|
rules:
|
||||||
|
- !reference [.main-or-manual, rules]
|
||||||
|
- if: $CI_PIPELINE_SOURCE == "merge_request_event"
|
||||||
|
when: manual
|
||||||
|
allow_failure: false
|
||||||
|
- when: always
|
||||||
|
|
||||||
# Define the distribution targets
|
# Define the distribution targets
|
||||||
.dist-amazonlinux2:
|
|
||||||
variables:
|
|
||||||
DIST: amazonlinux2
|
|
||||||
|
|
||||||
.dist-centos7:
|
.dist-centos7:
|
||||||
|
rules:
|
||||||
|
- !reference [.main-or-manual, rules]
|
||||||
variables:
|
variables:
|
||||||
DIST: centos7
|
DIST: centos7
|
||||||
CVE_UPDATES: "cyrus-sasl-lib"
|
|
||||||
|
|
||||||
.dist-centos8:
|
.dist-centos8:
|
||||||
variables:
|
variables:
|
||||||
DIST: centos8
|
DIST: centos8
|
||||||
CVE_UPDATES: "cyrus-sasl-lib"
|
|
||||||
|
|
||||||
.dist-debian10:
|
|
||||||
variables:
|
|
||||||
DIST: debian10
|
|
||||||
|
|
||||||
.dist-debian9:
|
|
||||||
variables:
|
|
||||||
DIST: debian9
|
|
||||||
|
|
||||||
.dist-opensuse-leap15.1:
|
|
||||||
variables:
|
|
||||||
DIST: opensuse-leap15.1
|
|
||||||
|
|
||||||
.dist-ubi8:
|
.dist-ubi8:
|
||||||
|
rules:
|
||||||
|
- !reference [.main-or-manual, rules]
|
||||||
variables:
|
variables:
|
||||||
DIST: ubi8
|
DIST: ubi8
|
||||||
CVE_UPDATES: "cyrus-sasl-lib"
|
|
||||||
|
|
||||||
.dist-ubuntu16.04:
|
|
||||||
variables:
|
|
||||||
DIST: ubuntu16.04
|
|
||||||
|
|
||||||
.dist-ubuntu18.04:
|
.dist-ubuntu18.04:
|
||||||
variables:
|
variables:
|
||||||
DIST: ubuntu18.04
|
DIST: ubuntu18.04
|
||||||
CVE_UPDATES: "libsasl2-2 libsasl2-modules-db"
|
|
||||||
|
|
||||||
.dist-ubuntu20.04:
|
.dist-ubuntu20.04:
|
||||||
variables:
|
variables:
|
||||||
DIST: ubuntu20.04
|
DIST: ubuntu20.04
|
||||||
CVE_UPDATES: "libsasl2-2 libsasl2-modules-db"
|
|
||||||
|
|
||||||
.dist-packaging:
|
.dist-packaging:
|
||||||
variables:
|
variables:
|
||||||
@@ -98,6 +116,8 @@ stages:
|
|||||||
ARCH: arm64
|
ARCH: arm64
|
||||||
|
|
||||||
.arch-ppc64le:
|
.arch-ppc64le:
|
||||||
|
rules:
|
||||||
|
- !reference [.main-or-manual, rules]
|
||||||
variables:
|
variables:
|
||||||
ARCH: ppc64le
|
ARCH: ppc64le
|
||||||
|
|
||||||
@@ -125,7 +145,7 @@ stages:
|
|||||||
- docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
- docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
||||||
- docker pull "${IMAGE_NAME}:${VERSION}-${DIST}"
|
- docker pull "${IMAGE_NAME}:${VERSION}-${DIST}"
|
||||||
script:
|
script:
|
||||||
- make -f build/container/Makefile test-${DIST}
|
- make -f deployments/container/Makefile test-${DIST}
|
||||||
|
|
||||||
# Define the test targets
|
# Define the test targets
|
||||||
test-packaging:
|
test-packaging:
|
||||||
@@ -138,7 +158,7 @@ test-packaging:
|
|||||||
# Download the regctl binary for use in the release steps
|
# Download the regctl binary for use in the release steps
|
||||||
.regctl-setup:
|
.regctl-setup:
|
||||||
before_script:
|
before_script:
|
||||||
- export REGCTL_VERSION=v0.3.10
|
- export REGCTL_VERSION=v0.4.5
|
||||||
- apk add --no-cache curl
|
- apk add --no-cache curl
|
||||||
- mkdir -p bin
|
- mkdir -p bin
|
||||||
- curl -sSLo bin/regctl https://github.com/regclient/regclient/releases/download/${REGCTL_VERSION}/regctl-linux-amd64
|
- curl -sSLo bin/regctl https://github.com/regclient/regclient/releases/download/${REGCTL_VERSION}/regctl-linux-amd64
|
||||||
@@ -175,7 +195,7 @@ test-packaging:
|
|||||||
|
|
||||||
# Since OUT_IMAGE_NAME and OUT_IMAGE_VERSION are set, this will push the CI image to the
|
# Since OUT_IMAGE_NAME and OUT_IMAGE_VERSION are set, this will push the CI image to the
|
||||||
# Target
|
# Target
|
||||||
- make -f build/container/Makefile push-${DIST}
|
- make -f deployments/container/Makefile push-${DIST}
|
||||||
|
|
||||||
# Define a staging release step that pushes an image to an internal "staging" repository
|
# Define a staging release step that pushes an image to an internal "staging" repository
|
||||||
# This is triggered for all pipelines (i.e. not only tags) to test the pipeline steps
|
# This is triggered for all pipelines (i.e. not only tags) to test the pipeline steps
|
||||||
@@ -194,6 +214,8 @@ test-packaging:
|
|||||||
.release:external:
|
.release:external:
|
||||||
extends:
|
extends:
|
||||||
- .release
|
- .release
|
||||||
|
variables:
|
||||||
|
FORCE_PUBLISH_IMAGES: "yes"
|
||||||
rules:
|
rules:
|
||||||
- if: $CI_COMMIT_TAG
|
- if: $CI_COMMIT_TAG
|
||||||
variables:
|
variables:
|
||||||
@@ -203,20 +225,6 @@ test-packaging:
|
|||||||
OUT_IMAGE_VERSION: "${DEVEL_RELEASE_IMAGE_VERSION}"
|
OUT_IMAGE_VERSION: "${DEVEL_RELEASE_IMAGE_VERSION}"
|
||||||
|
|
||||||
# Define the release jobs
|
# Define the release jobs
|
||||||
release:staging-centos7:
|
|
||||||
extends:
|
|
||||||
- .release:staging
|
|
||||||
- .dist-centos7
|
|
||||||
needs:
|
|
||||||
- image-centos7
|
|
||||||
|
|
||||||
release:staging-centos8:
|
|
||||||
extends:
|
|
||||||
- .release:staging
|
|
||||||
- .dist-centos8
|
|
||||||
needs:
|
|
||||||
- image-centos8
|
|
||||||
|
|
||||||
release:staging-ubi8:
|
release:staging-ubi8:
|
||||||
extends:
|
extends:
|
||||||
- .release:staging
|
- .release:staging
|
||||||
@@ -224,16 +232,6 @@ release:staging-ubi8:
|
|||||||
needs:
|
needs:
|
||||||
- image-ubi8
|
- image-ubi8
|
||||||
|
|
||||||
release:staging-ubuntu18.04:
|
|
||||||
extends:
|
|
||||||
- .release:staging
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
needs:
|
|
||||||
- test-toolkit-ubuntu18.04
|
|
||||||
- test-containerd-ubuntu18.04
|
|
||||||
- test-crio-ubuntu18.04
|
|
||||||
- test-docker-ubuntu18.04
|
|
||||||
|
|
||||||
release:staging-ubuntu20.04:
|
release:staging-ubuntu20.04:
|
||||||
extends:
|
extends:
|
||||||
- .release:staging
|
- .release:staging
|
||||||
|
|||||||
3
.github/copy-pr-bot.yaml
vendored
Normal file
3
.github/copy-pr-bot.yaml
vendored
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
# https://docs.gha-runners.nvidia.com/apps/copy-pr-bot/#configuration
|
||||||
|
|
||||||
|
enabled: true
|
||||||
120
.github/dependabot.yml
vendored
Normal file
120
.github/dependabot.yml
vendored
Normal file
@@ -0,0 +1,120 @@
|
|||||||
|
# Please see the documentation for all configuration options:
|
||||||
|
# https://docs.github.com/github/administering-a-repository/configuration-options-for-dependency-updates
|
||||||
|
|
||||||
|
version: 2
|
||||||
|
updates:
|
||||||
|
# main branch
|
||||||
|
- package-ecosystem: "gomod"
|
||||||
|
target-branch: main
|
||||||
|
directories:
|
||||||
|
- "/"
|
||||||
|
- "deployments/devel"
|
||||||
|
- "tests"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
groups:
|
||||||
|
k8sio:
|
||||||
|
patterns:
|
||||||
|
- k8s.io/*
|
||||||
|
exclude-patterns:
|
||||||
|
- k8s.io/klog/*
|
||||||
|
|
||||||
|
- package-ecosystem: "docker"
|
||||||
|
target-branch: main
|
||||||
|
directories:
|
||||||
|
# CUDA image
|
||||||
|
- "/deployments/container"
|
||||||
|
# Golang version
|
||||||
|
- "/deployments/devel"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
|
||||||
|
- package-ecosystem: "github-actions"
|
||||||
|
target-branch: main
|
||||||
|
directory: "/"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
|
||||||
|
# Allow dependabot to update the libnvidia-container submodule.
|
||||||
|
- package-ecosystem: "gitsubmodule"
|
||||||
|
target-branch: main
|
||||||
|
directory: "/"
|
||||||
|
allow:
|
||||||
|
- dependency-name: "third_party/libnvidia-container"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
- libnvidia-container
|
||||||
|
|
||||||
|
# The release branch(es):
|
||||||
|
- package-ecosystem: "gomod"
|
||||||
|
target-branch: release-1.17
|
||||||
|
directories:
|
||||||
|
- "/"
|
||||||
|
# We don't update development or test dependencies on release branches
|
||||||
|
# - "deployments/devel"
|
||||||
|
# - "tests"
|
||||||
|
schedule:
|
||||||
|
interval: "weekly"
|
||||||
|
day: "sunday"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
- maintenance
|
||||||
|
ignore:
|
||||||
|
# For release branches we only consider patch updates.
|
||||||
|
- dependency-name: "*"
|
||||||
|
update-types:
|
||||||
|
- version-update:semver-major
|
||||||
|
- version-update:semver-minor
|
||||||
|
groups:
|
||||||
|
k8sio:
|
||||||
|
patterns:
|
||||||
|
- k8s.io/*
|
||||||
|
exclude-patterns:
|
||||||
|
- k8s.io/klog/*
|
||||||
|
|
||||||
|
- package-ecosystem: "docker"
|
||||||
|
target-branch: release-1.17
|
||||||
|
directories:
|
||||||
|
# CUDA image
|
||||||
|
- "/deployments/container"
|
||||||
|
# Golang version
|
||||||
|
- "/deployments/devel"
|
||||||
|
schedule:
|
||||||
|
interval: "weekly"
|
||||||
|
day: "sunday"
|
||||||
|
ignore:
|
||||||
|
# For release branches we only apply patch updates to the golang version.
|
||||||
|
- dependency-name: "*golang*"
|
||||||
|
update-types:
|
||||||
|
- version-update:semver-major
|
||||||
|
- version-update:semver-minor
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
- maintenance
|
||||||
|
|
||||||
|
- package-ecosystem: "github-actions"
|
||||||
|
target-branch: release-1.17
|
||||||
|
directory: "/"
|
||||||
|
schedule:
|
||||||
|
interval: "weekly"
|
||||||
|
day: "sunday"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
- maintenance
|
||||||
|
|
||||||
|
# Github actions need to be gh-pages branches.
|
||||||
|
- package-ecosystem: "github-actions"
|
||||||
|
target-branch: gh-pages
|
||||||
|
directory: "/"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
53
.github/workflows/ci.yaml
vendored
Normal file
53
.github/workflows/ci.yaml
vendored
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
# Copyright 2025 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
name: CI Pipeline
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- "pull-request/[0-9]+"
|
||||||
|
- main
|
||||||
|
- release-*
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
code-scanning:
|
||||||
|
uses: ./.github/workflows/code_scanning.yaml
|
||||||
|
|
||||||
|
variables:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
outputs:
|
||||||
|
version: ${{ steps.version.outputs.version }}
|
||||||
|
steps:
|
||||||
|
- name: Generate Commit Short SHA
|
||||||
|
id: version
|
||||||
|
run: echo "version=$(echo $GITHUB_SHA | cut -c1-8)" >> "$GITHUB_OUTPUT"
|
||||||
|
|
||||||
|
golang:
|
||||||
|
uses: ./.github/workflows/golang.yaml
|
||||||
|
|
||||||
|
image:
|
||||||
|
uses: ./.github/workflows/image.yaml
|
||||||
|
needs: [variables, golang, code-scanning]
|
||||||
|
secrets: inherit
|
||||||
|
with:
|
||||||
|
version: ${{ needs.variables.outputs.version }}
|
||||||
|
build_multi_arch_images: ${{ github.ref_name == 'main' || startsWith(github.ref_name, 'release-') }}
|
||||||
|
|
||||||
|
e2e-test:
|
||||||
|
needs: [image, variables]
|
||||||
|
secrets: inherit
|
||||||
|
uses: ./.github/workflows/e2e.yaml
|
||||||
|
with:
|
||||||
|
version: ${{ needs.variables.outputs.version }}
|
||||||
49
.github/workflows/code_scanning.yaml
vendored
Normal file
49
.github/workflows/code_scanning.yaml
vendored
Normal file
@@ -0,0 +1,49 @@
|
|||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
name: "CodeQL"
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_call: {}
|
||||||
|
pull_request:
|
||||||
|
types:
|
||||||
|
- opened
|
||||||
|
- synchronize
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
- release-*
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
analyze:
|
||||||
|
name: Analyze Go code with CodeQL
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
timeout-minutes: 360
|
||||||
|
permissions:
|
||||||
|
security-events: write
|
||||||
|
packages: read
|
||||||
|
steps:
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
- name: Initialize CodeQL
|
||||||
|
uses: github/codeql-action/init@v3
|
||||||
|
with:
|
||||||
|
languages: go
|
||||||
|
build-mode: manual
|
||||||
|
- shell: bash
|
||||||
|
run: |
|
||||||
|
make build
|
||||||
|
- name: Perform CodeQL Analysis
|
||||||
|
uses: github/codeql-action/analyze@v3
|
||||||
|
with:
|
||||||
|
category: "/language:go"
|
||||||
98
.github/workflows/e2e.yaml
vendored
Normal file
98
.github/workflows/e2e.yaml
vendored
Normal file
@@ -0,0 +1,98 @@
|
|||||||
|
# Copyright 2025 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
name: End-to-end Tests
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_call:
|
||||||
|
inputs:
|
||||||
|
version:
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
secrets:
|
||||||
|
AWS_ACCESS_KEY_ID:
|
||||||
|
required: true
|
||||||
|
AWS_SECRET_ACCESS_KEY:
|
||||||
|
required: true
|
||||||
|
AWS_SSH_KEY:
|
||||||
|
required: true
|
||||||
|
E2E_SSH_USER:
|
||||||
|
required: true
|
||||||
|
SLACK_BOT_TOKEN:
|
||||||
|
required: true
|
||||||
|
SLACK_CHANNEL_ID:
|
||||||
|
required: true
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
e2e-tests:
|
||||||
|
runs-on: linux-amd64-cpu4
|
||||||
|
steps:
|
||||||
|
- name: Check out code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Calculate build vars
|
||||||
|
id: vars
|
||||||
|
run: |
|
||||||
|
echo "COMMIT_SHORT_SHA=${GITHUB_SHA:0:8}" >> $GITHUB_ENV
|
||||||
|
echo "LOWERCASE_REPO_OWNER=$(echo "${GITHUB_REPOSITORY_OWNER}" | awk '{print tolower($0)}')" >> $GITHUB_ENV
|
||||||
|
GOLANG_VERSION=$(./hack/golang-version.sh)
|
||||||
|
echo "GOLANG_VERSION=${GOLANG_VERSION##GOLANG_VERSION := }" >> $GITHUB_ENV
|
||||||
|
|
||||||
|
- name: Install Go
|
||||||
|
uses: actions/setup-go@v5
|
||||||
|
with:
|
||||||
|
go-version: ${{ env.GOLANG_VERSION }}
|
||||||
|
|
||||||
|
- name: Set up Holodeck
|
||||||
|
uses: NVIDIA/holodeck@v0.2.6
|
||||||
|
with:
|
||||||
|
aws_access_key_id: ${{ secrets.AWS_ACCESS_KEY_ID }}
|
||||||
|
aws_secret_access_key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
|
||||||
|
aws_ssh_key: ${{ secrets.AWS_SSH_KEY }}
|
||||||
|
holodeck_config: "tests/e2e/infra/aws.yaml"
|
||||||
|
|
||||||
|
- name: Get public dns name
|
||||||
|
id: holodeck_public_dns_name
|
||||||
|
uses: mikefarah/yq@master
|
||||||
|
with:
|
||||||
|
cmd: yq '.status.properties[] | select(.name == "public-dns-name") | .value' /github/workspace/.cache/holodeck.yaml
|
||||||
|
|
||||||
|
- name: Run e2e tests
|
||||||
|
env:
|
||||||
|
IMAGE_NAME: ghcr.io/nvidia/container-toolkit
|
||||||
|
VERSION: ${{ inputs.version }}
|
||||||
|
SSH_KEY: ${{ secrets.AWS_SSH_KEY }}
|
||||||
|
E2E_SSH_USER: ${{ secrets.E2E_SSH_USER }}
|
||||||
|
E2E_SSH_HOST: ${{ steps.holodeck_public_dns_name.outputs.result }}
|
||||||
|
E2E_INSTALL_CTK: "true"
|
||||||
|
run: |
|
||||||
|
e2e_ssh_key=$(mktemp)
|
||||||
|
echo "$SSH_KEY" > "$e2e_ssh_key"
|
||||||
|
chmod 600 "$e2e_ssh_key"
|
||||||
|
export E2E_SSH_KEY="$e2e_ssh_key"
|
||||||
|
|
||||||
|
make -f tests/e2e/Makefile test
|
||||||
|
|
||||||
|
- name: Send Slack alert notification
|
||||||
|
if: ${{ failure() }}
|
||||||
|
uses: slackapi/slack-github-action@v2.0.0
|
||||||
|
with:
|
||||||
|
method: chat.postMessage
|
||||||
|
token: ${{ secrets.SLACK_BOT_TOKEN }}
|
||||||
|
payload: |
|
||||||
|
channel: ${{ secrets.SLACK_CHANNEL_ID }}
|
||||||
|
text: |
|
||||||
|
:x: On repository ${{ github.repository }}, the Workflow *${{ github.workflow }}* has failed.
|
||||||
|
|
||||||
|
Details: https://github.com/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
||||||
83
.github/workflows/golang.yaml
vendored
Normal file
83
.github/workflows/golang.yaml
vendored
Normal file
@@ -0,0 +1,83 @@
|
|||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
name: Golang
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_call: {}
|
||||||
|
pull_request:
|
||||||
|
types:
|
||||||
|
- opened
|
||||||
|
- synchronize
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
- release-*
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
check:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
name: Checkout code
|
||||||
|
- name: Get Golang version
|
||||||
|
id: vars
|
||||||
|
run: |
|
||||||
|
GOLANG_VERSION=$(./hack/golang-version.sh)
|
||||||
|
echo "GOLANG_VERSION=${GOLANG_VERSION##GOLANG_VERSION := }" >> $GITHUB_ENV
|
||||||
|
- name: Install Go
|
||||||
|
uses: actions/setup-go@v5
|
||||||
|
with:
|
||||||
|
go-version: ${{ env.GOLANG_VERSION }}
|
||||||
|
- name: Lint
|
||||||
|
uses: golangci/golangci-lint-action@v6
|
||||||
|
with:
|
||||||
|
version: latest
|
||||||
|
args: -v --timeout 5m
|
||||||
|
skip-cache: true
|
||||||
|
- name: Check golang modules
|
||||||
|
run: |
|
||||||
|
make check-vendor
|
||||||
|
make -C deployments/devel check-modules
|
||||||
|
test:
|
||||||
|
name: Unit test
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
- name: Get Golang version
|
||||||
|
id: vars
|
||||||
|
run: |
|
||||||
|
GOLANG_VERSION=$(./hack/golang-version.sh)
|
||||||
|
echo "GOLANG_VERSION=${GOLANG_VERSION##GOLANG_VERSION := }" >> $GITHUB_ENV
|
||||||
|
- name: Install Go
|
||||||
|
uses: actions/setup-go@v5
|
||||||
|
with:
|
||||||
|
go-version: ${{ env.GOLANG_VERSION }}
|
||||||
|
- run: make test
|
||||||
|
build:
|
||||||
|
name: Build
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
- name: Get Golang version
|
||||||
|
id: vars
|
||||||
|
run: |
|
||||||
|
GOLANG_VERSION=$(./hack/golang-version.sh)
|
||||||
|
echo "GOLANG_VERSION=${GOLANG_VERSION##GOLANG_VERSION ?= }" >> $GITHUB_ENV
|
||||||
|
- name: Install Go
|
||||||
|
uses: actions/setup-go@v5
|
||||||
|
with:
|
||||||
|
go-version: ${{ env.GOLANG_VERSION }}
|
||||||
|
- run: make build
|
||||||
126
.github/workflows/image.yaml
vendored
Normal file
126
.github/workflows/image.yaml
vendored
Normal file
@@ -0,0 +1,126 @@
|
|||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
# Run this workflow on pull requests
|
||||||
|
name: image
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_call:
|
||||||
|
inputs:
|
||||||
|
version:
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
build_multi_arch_images:
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
packages:
|
||||||
|
runs-on: linux-amd64-cpu4
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
target:
|
||||||
|
- ubuntu18.04-arm64
|
||||||
|
- ubuntu18.04-amd64
|
||||||
|
- ubuntu18.04-ppc64le
|
||||||
|
- centos7-aarch64
|
||||||
|
- centos7-x86_64
|
||||||
|
- centos8-ppc64le
|
||||||
|
ispr:
|
||||||
|
- ${{ github.ref_name != 'main' && !startsWith( github.ref_name, 'release-' ) }}
|
||||||
|
exclude:
|
||||||
|
- ispr: true
|
||||||
|
target: ubuntu18.04-arm64
|
||||||
|
- ispr: true
|
||||||
|
target: ubuntu18.04-ppc64le
|
||||||
|
- ispr: true
|
||||||
|
target: centos7-aarch64
|
||||||
|
- ispr: true
|
||||||
|
target: centos8-ppc64le
|
||||||
|
fail-fast: false
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
name: Check out code
|
||||||
|
|
||||||
|
- name: Set up QEMU
|
||||||
|
uses: docker/setup-qemu-action@v3
|
||||||
|
with:
|
||||||
|
image: tonistiigi/binfmt:master
|
||||||
|
|
||||||
|
- name: Set up Docker Buildx
|
||||||
|
uses: docker/setup-buildx-action@v3
|
||||||
|
|
||||||
|
- name: build ${{ matrix.target }} packages
|
||||||
|
run: |
|
||||||
|
sudo apt-get install -y coreutils build-essential sed git bash make
|
||||||
|
echo "Building packages"
|
||||||
|
./scripts/build-packages.sh ${{ matrix.target }}
|
||||||
|
|
||||||
|
- name: 'Upload Artifacts'
|
||||||
|
uses: actions/upload-artifact@v4
|
||||||
|
with:
|
||||||
|
compression-level: 0
|
||||||
|
name: toolkit-container-${{ matrix.target }}-${{ github.run_id }}
|
||||||
|
path: ${{ github.workspace }}/dist/*
|
||||||
|
|
||||||
|
image:
|
||||||
|
runs-on: linux-amd64-cpu4
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
dist:
|
||||||
|
- ubuntu20.04
|
||||||
|
- ubi8
|
||||||
|
- packaging
|
||||||
|
ispr:
|
||||||
|
- ${{ github.ref_name != 'main' && !startsWith( github.ref_name, 'release-' ) }}
|
||||||
|
exclude:
|
||||||
|
- ispr: true
|
||||||
|
dist: ubi8
|
||||||
|
needs: packages
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
name: Check out code
|
||||||
|
|
||||||
|
- name: Set up QEMU
|
||||||
|
uses: docker/setup-qemu-action@v3
|
||||||
|
with:
|
||||||
|
image: tonistiigi/binfmt:master
|
||||||
|
|
||||||
|
- name: Set up Docker Buildx
|
||||||
|
uses: docker/setup-buildx-action@v3
|
||||||
|
|
||||||
|
- name: Get built packages
|
||||||
|
uses: actions/download-artifact@v4
|
||||||
|
with:
|
||||||
|
path: ${{ github.workspace }}/dist/
|
||||||
|
pattern: toolkit-container-*-${{ github.run_id }}
|
||||||
|
merge-multiple: true
|
||||||
|
|
||||||
|
- name: Login to GitHub Container Registry
|
||||||
|
uses: docker/login-action@v3
|
||||||
|
with:
|
||||||
|
registry: ghcr.io
|
||||||
|
username: ${{ github.actor }}
|
||||||
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|
||||||
|
- name: Build image
|
||||||
|
env:
|
||||||
|
IMAGE_NAME: ghcr.io/nvidia/container-toolkit
|
||||||
|
VERSION: ${{ inputs.version }}
|
||||||
|
PUSH_ON_BUILD: "true"
|
||||||
|
BUILD_MULTI_ARCH_IMAGES: ${{ inputs.build_multi_arch_images }}
|
||||||
|
run: |
|
||||||
|
echo "${VERSION}"
|
||||||
|
make -f deployments/container/Makefile build-${{ matrix.dist }}
|
||||||
38
.github/workflows/release.yaml
vendored
Normal file
38
.github/workflows/release.yaml
vendored
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
# Run this workflow on new tags
|
||||||
|
name: Release
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
tags:
|
||||||
|
- v*
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
release:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
name: Check out code
|
||||||
|
|
||||||
|
- name: Prepare Artifacts
|
||||||
|
run: |
|
||||||
|
./hack/prepare-artifacts.sh ${{ github.ref_name }}
|
||||||
|
|
||||||
|
- name: Create Draft Release
|
||||||
|
env:
|
||||||
|
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
run: |
|
||||||
|
./hack/create-release.sh ${{ github.ref_name }}
|
||||||
8
.gitignore
vendored
8
.gitignore
vendored
@@ -1,9 +1,13 @@
|
|||||||
dist
|
/dist
|
||||||
|
/artifacts
|
||||||
*.swp
|
*.swp
|
||||||
*.swo
|
*.swo
|
||||||
/coverage.out*
|
/coverage.out*
|
||||||
/test/output/
|
/tests/output/
|
||||||
/nvidia-container-runtime
|
/nvidia-container-runtime
|
||||||
|
/nvidia-container-runtime.*
|
||||||
|
/nvidia-container-runtime-hook
|
||||||
/nvidia-container-toolkit
|
/nvidia-container-toolkit
|
||||||
/nvidia-ctk
|
/nvidia-ctk
|
||||||
/shared-*
|
/shared-*
|
||||||
|
/release-*
|
||||||
|
|||||||
253
.gitlab-ci.yml
253
.gitlab-ci.yml
@@ -1,4 +1,4 @@
|
|||||||
# Copyright (c) 2019-2021, NVIDIA CORPORATION. All rights reserved.
|
# Copyright (c) 2019-2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
# you may not use this file except in compliance with the License.
|
# you may not use this file except in compliance with the License.
|
||||||
@@ -15,68 +15,6 @@
|
|||||||
include:
|
include:
|
||||||
- .common-ci.yml
|
- .common-ci.yml
|
||||||
|
|
||||||
build-dev-image:
|
|
||||||
stage: image
|
|
||||||
script:
|
|
||||||
- apk --no-cache add make bash
|
|
||||||
- make .build-image
|
|
||||||
- docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
|
||||||
- make .push-build-image
|
|
||||||
|
|
||||||
.requires-build-image:
|
|
||||||
image: "${BUILDIMAGE}"
|
|
||||||
|
|
||||||
.go-check:
|
|
||||||
extends:
|
|
||||||
- .requires-build-image
|
|
||||||
stage: go-checks
|
|
||||||
|
|
||||||
fmt:
|
|
||||||
extends:
|
|
||||||
- .go-check
|
|
||||||
script:
|
|
||||||
- make assert-fmt
|
|
||||||
|
|
||||||
vet:
|
|
||||||
extends:
|
|
||||||
- .go-check
|
|
||||||
script:
|
|
||||||
- make vet
|
|
||||||
|
|
||||||
lint:
|
|
||||||
extends:
|
|
||||||
- .go-check
|
|
||||||
script:
|
|
||||||
- make lint
|
|
||||||
allow_failure: true
|
|
||||||
|
|
||||||
ineffassign:
|
|
||||||
extends:
|
|
||||||
- .go-check
|
|
||||||
script:
|
|
||||||
- make ineffassign
|
|
||||||
allow_failure: true
|
|
||||||
|
|
||||||
misspell:
|
|
||||||
extends:
|
|
||||||
- .go-check
|
|
||||||
script:
|
|
||||||
- make misspell
|
|
||||||
|
|
||||||
go-build:
|
|
||||||
extends:
|
|
||||||
- .requires-build-image
|
|
||||||
stage: go-build
|
|
||||||
script:
|
|
||||||
- make build
|
|
||||||
|
|
||||||
unit-tests:
|
|
||||||
extends:
|
|
||||||
- .requires-build-image
|
|
||||||
stage: unit-tests
|
|
||||||
script:
|
|
||||||
- make coverage
|
|
||||||
|
|
||||||
# Define the package build helpers
|
# Define the package build helpers
|
||||||
.multi-arch-build:
|
.multi-arch-build:
|
||||||
before_script:
|
before_script:
|
||||||
@@ -94,7 +32,7 @@ unit-tests:
|
|||||||
- .multi-arch-build
|
- .multi-arch-build
|
||||||
- .package-artifacts
|
- .package-artifacts
|
||||||
stage: package-build
|
stage: package-build
|
||||||
timeout: 2h 30m
|
timeout: 3h
|
||||||
script:
|
script:
|
||||||
- ./scripts/build-packages.sh ${DIST}-${ARCH}
|
- ./scripts/build-packages.sh ${DIST}-${ARCH}
|
||||||
|
|
||||||
@@ -102,25 +40,35 @@ unit-tests:
|
|||||||
name: ${ARTIFACTS_NAME}
|
name: ${ARTIFACTS_NAME}
|
||||||
paths:
|
paths:
|
||||||
- ${ARTIFACTS_ROOT}
|
- ${ARTIFACTS_ROOT}
|
||||||
|
needs:
|
||||||
|
- job: package-meta-packages
|
||||||
|
artifacts: true
|
||||||
|
|
||||||
# Define the package build targets
|
# Define the package build targets
|
||||||
package-amazonlinux2-aarch64:
|
package-meta-packages:
|
||||||
extends:
|
extends:
|
||||||
- .package-build
|
- .package-artifacts
|
||||||
- .dist-amazonlinux2
|
stage: package-build
|
||||||
- .arch-aarch64
|
variables:
|
||||||
|
SKIP_LIBNVIDIA_CONTAINER: "yes"
|
||||||
|
SKIP_NVIDIA_CONTAINER_TOOLKIT: "yes"
|
||||||
|
parallel:
|
||||||
|
matrix:
|
||||||
|
- PACKAGING: [deb, rpm]
|
||||||
|
before_script:
|
||||||
|
- apk add --no-cache coreutils build-base sed git bash make
|
||||||
|
script:
|
||||||
|
- ./scripts/build-packages.sh ${PACKAGING}
|
||||||
|
artifacts:
|
||||||
|
name: ${ARTIFACTS_NAME}
|
||||||
|
paths:
|
||||||
|
- ${ARTIFACTS_ROOT}
|
||||||
|
|
||||||
package-amazonlinux2-x86_64:
|
package-centos7-aarch64:
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-amazonlinux2
|
|
||||||
- .arch-x86_64
|
|
||||||
|
|
||||||
package-centos7-ppc64le:
|
|
||||||
extends:
|
extends:
|
||||||
- .package-build
|
- .package-build
|
||||||
- .dist-centos7
|
- .dist-centos7
|
||||||
- .arch-ppc64le
|
- .arch-aarch64
|
||||||
|
|
||||||
package-centos7-x86_64:
|
package-centos7-x86_64:
|
||||||
extends:
|
extends:
|
||||||
@@ -128,54 +76,12 @@ package-centos7-x86_64:
|
|||||||
- .dist-centos7
|
- .dist-centos7
|
||||||
- .arch-x86_64
|
- .arch-x86_64
|
||||||
|
|
||||||
package-centos8-aarch64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-centos8
|
|
||||||
- .arch-aarch64
|
|
||||||
|
|
||||||
package-centos8-ppc64le:
|
package-centos8-ppc64le:
|
||||||
extends:
|
extends:
|
||||||
- .package-build
|
- .package-build
|
||||||
- .dist-centos8
|
- .dist-centos8
|
||||||
- .arch-ppc64le
|
- .arch-ppc64le
|
||||||
|
|
||||||
package-centos8-x86_64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-centos8
|
|
||||||
- .arch-x86_64
|
|
||||||
|
|
||||||
package-debian10-amd64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-debian10
|
|
||||||
- .arch-amd64
|
|
||||||
|
|
||||||
package-debian9-amd64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-debian9
|
|
||||||
- .arch-amd64
|
|
||||||
|
|
||||||
package-opensuse-leap15.1-x86_64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-opensuse-leap15.1
|
|
||||||
- .arch-x86_64
|
|
||||||
|
|
||||||
package-ubuntu16.04-amd64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-ubuntu16.04
|
|
||||||
- .arch-amd64
|
|
||||||
|
|
||||||
package-ubuntu16.04-ppc64le:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-ubuntu16.04
|
|
||||||
- .arch-ppc64le
|
|
||||||
|
|
||||||
package-ubuntu18.04-amd64:
|
package-ubuntu18.04-amd64:
|
||||||
extends:
|
extends:
|
||||||
- .package-build
|
- .package-build
|
||||||
@@ -216,30 +122,11 @@ package-ubuntu18.04-ppc64le:
|
|||||||
before_script:
|
before_script:
|
||||||
- !reference [.buildx-setup, before_script]
|
- !reference [.buildx-setup, before_script]
|
||||||
|
|
||||||
- apk add --no-cache bash make
|
- apk add --no-cache bash make git
|
||||||
- 'echo "Logging in to CI registry ${CI_REGISTRY}"'
|
- 'echo "Logging in to CI registry ${CI_REGISTRY}"'
|
||||||
- docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
- docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
||||||
script:
|
script:
|
||||||
- make -f build/container/Makefile build-${DIST}
|
- make -f deployments/container/Makefile build-${DIST}
|
||||||
|
|
||||||
image-centos7:
|
|
||||||
extends:
|
|
||||||
- .image-build
|
|
||||||
- .package-artifacts
|
|
||||||
- .dist-centos7
|
|
||||||
needs:
|
|
||||||
- package-centos7-ppc64le
|
|
||||||
- package-centos7-x86_64
|
|
||||||
|
|
||||||
image-centos8:
|
|
||||||
extends:
|
|
||||||
- .image-build
|
|
||||||
- .package-artifacts
|
|
||||||
- .dist-centos8
|
|
||||||
needs:
|
|
||||||
- package-centos8-aarch64
|
|
||||||
- package-centos8-x86_64
|
|
||||||
- package-centos8-ppc64le
|
|
||||||
|
|
||||||
image-ubi8:
|
image-ubi8:
|
||||||
extends:
|
extends:
|
||||||
@@ -247,20 +134,9 @@ image-ubi8:
|
|||||||
- .package-artifacts
|
- .package-artifacts
|
||||||
- .dist-ubi8
|
- .dist-ubi8
|
||||||
needs:
|
needs:
|
||||||
# Note: The ubi8 image uses the centos8 packages
|
# Note: The ubi8 image uses the centos7 packages
|
||||||
- package-centos8-aarch64
|
- package-centos7-aarch64
|
||||||
- package-centos8-x86_64
|
- package-centos7-x86_64
|
||||||
- package-centos8-ppc64le
|
|
||||||
|
|
||||||
image-ubuntu18.04:
|
|
||||||
extends:
|
|
||||||
- .image-build
|
|
||||||
- .package-artifacts
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
needs:
|
|
||||||
- package-ubuntu18.04-amd64
|
|
||||||
- package-ubuntu18.04-arm64
|
|
||||||
- package-ubuntu18.04-ppc64le
|
|
||||||
|
|
||||||
image-ubuntu20.04:
|
image-ubuntu20.04:
|
||||||
extends:
|
extends:
|
||||||
@@ -270,7 +146,8 @@ image-ubuntu20.04:
|
|||||||
needs:
|
needs:
|
||||||
- package-ubuntu18.04-amd64
|
- package-ubuntu18.04-amd64
|
||||||
- package-ubuntu18.04-arm64
|
- package-ubuntu18.04-arm64
|
||||||
- package-ubuntu18.04-ppc64le
|
- job: package-ubuntu18.04-ppc64le
|
||||||
|
optional: true
|
||||||
|
|
||||||
# The DIST=packaging target creates an image containing all built packages
|
# The DIST=packaging target creates an image containing all built packages
|
||||||
image-packaging:
|
image-packaging:
|
||||||
@@ -279,29 +156,26 @@ image-packaging:
|
|||||||
- .package-artifacts
|
- .package-artifacts
|
||||||
- .dist-packaging
|
- .dist-packaging
|
||||||
needs:
|
needs:
|
||||||
- package-amazonlinux2-aarch64
|
- job: package-ubuntu18.04-amd64
|
||||||
- package-amazonlinux2-x86_64
|
- job: package-ubuntu18.04-arm64
|
||||||
- package-centos7-ppc64le
|
- job: package-amazonlinux2-aarch64
|
||||||
- package-centos7-x86_64
|
optional: true
|
||||||
- package-centos8-aarch64
|
- job: package-amazonlinux2-x86_64
|
||||||
- package-centos8-ppc64le
|
optional: true
|
||||||
- package-centos8-x86_64
|
- job: package-centos7-aarch64
|
||||||
- package-debian10-amd64
|
optional: true
|
||||||
- package-debian9-amd64
|
- job: package-centos7-x86_64
|
||||||
- package-opensuse-leap15.1-x86_64
|
optional: true
|
||||||
- package-ubuntu16.04-amd64
|
- job: package-centos8-ppc64le
|
||||||
- package-ubuntu16.04-ppc64le
|
optional: true
|
||||||
- package-ubuntu18.04-amd64
|
- job: package-debian10-amd64
|
||||||
- package-ubuntu18.04-arm64
|
optional: true
|
||||||
- package-ubuntu18.04-ppc64le
|
- job: package-opensuse-leap15.1-x86_64
|
||||||
|
optional: true
|
||||||
|
- job: package-ubuntu18.04-ppc64le
|
||||||
|
optional: true
|
||||||
|
|
||||||
# Define publish test helpers
|
# Define publish test helpers
|
||||||
.test:toolkit:
|
|
||||||
extends:
|
|
||||||
- .integration
|
|
||||||
variables:
|
|
||||||
TEST_CASES: "toolkit"
|
|
||||||
|
|
||||||
.test:docker:
|
.test:docker:
|
||||||
extends:
|
extends:
|
||||||
- .integration
|
- .integration
|
||||||
@@ -325,34 +199,6 @@ image-packaging:
|
|||||||
TEST_CASES: "crio"
|
TEST_CASES: "crio"
|
||||||
|
|
||||||
# Define the test targets
|
# Define the test targets
|
||||||
test-toolkit-ubuntu18.04:
|
|
||||||
extends:
|
|
||||||
- .test:toolkit
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
needs:
|
|
||||||
- image-ubuntu18.04
|
|
||||||
|
|
||||||
test-containerd-ubuntu18.04:
|
|
||||||
extends:
|
|
||||||
- .test:containerd
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
needs:
|
|
||||||
- image-ubuntu18.04
|
|
||||||
|
|
||||||
test-crio-ubuntu18.04:
|
|
||||||
extends:
|
|
||||||
- .test:crio
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
needs:
|
|
||||||
- image-ubuntu18.04
|
|
||||||
|
|
||||||
test-docker-ubuntu18.04:
|
|
||||||
extends:
|
|
||||||
- .test:docker
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
needs:
|
|
||||||
- image-ubuntu18.04
|
|
||||||
|
|
||||||
test-toolkit-ubuntu20.04:
|
test-toolkit-ubuntu20.04:
|
||||||
extends:
|
extends:
|
||||||
- .test:toolkit
|
- .test:toolkit
|
||||||
@@ -380,4 +226,3 @@ test-docker-ubuntu20.04:
|
|||||||
- .dist-ubuntu20.04
|
- .dist-ubuntu20.04
|
||||||
needs:
|
needs:
|
||||||
- image-ubuntu20.04
|
- image-ubuntu20.04
|
||||||
|
|
||||||
|
|||||||
8
.gitmodules
vendored
8
.gitmodules
vendored
@@ -1,10 +1,4 @@
|
|||||||
[submodule "third_party/libnvidia-container"]
|
[submodule "third_party/libnvidia-container"]
|
||||||
path = third_party/libnvidia-container
|
path = third_party/libnvidia-container
|
||||||
url = https://gitlab.com/nvidia/container-toolkit/libnvidia-container.git
|
url = https://github.com/NVIDIA/libnvidia-container.git
|
||||||
branch = main
|
branch = main
|
||||||
[submodule "third_party/nvidia-container-runtime"]
|
|
||||||
path = third_party/nvidia-container-runtime
|
|
||||||
url = https://gitlab.com/nvidia/container-toolkit/container-runtime.git
|
|
||||||
[submodule "third_party/nvidia-docker"]
|
|
||||||
path = third_party/nvidia-docker
|
|
||||||
url = https://gitlab.com/nvidia/container-toolkit/nvidia-docker.git
|
|
||||||
|
|||||||
43
.golangci.yml
Normal file
43
.golangci.yml
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
run:
|
||||||
|
timeout: 10m
|
||||||
|
|
||||||
|
linters:
|
||||||
|
enable:
|
||||||
|
- contextcheck
|
||||||
|
- gocritic
|
||||||
|
- gofmt
|
||||||
|
- goimports
|
||||||
|
- gosec
|
||||||
|
- gosimple
|
||||||
|
- govet
|
||||||
|
- ineffassign
|
||||||
|
- misspell
|
||||||
|
- staticcheck
|
||||||
|
- unconvert
|
||||||
|
|
||||||
|
linters-settings:
|
||||||
|
goimports:
|
||||||
|
local-prefixes: github.com/NVIDIA/nvidia-container-toolkit
|
||||||
|
|
||||||
|
issues:
|
||||||
|
exclude:
|
||||||
|
# The legacy hook relies on spec.Hooks.Prestart, which is deprecated as of the v1.2.0 OCI runtime spec.
|
||||||
|
- "SA1019:(.+).Prestart is deprecated(.+)"
|
||||||
|
# TODO: We should address each of the following integer overflows.
|
||||||
|
- "G115: integer overflow conversion(.+)"
|
||||||
|
exclude-rules:
|
||||||
|
# Exclude the gocritic dupSubExpr issue for cgo files.
|
||||||
|
- path: internal/dxcore/dxcore.go
|
||||||
|
linters:
|
||||||
|
- gocritic
|
||||||
|
text: dupSubExpr
|
||||||
|
# Exclude the checks for usage of returns to config.Delete(Path) in the crio and containerd config packages.
|
||||||
|
- path: pkg/config/engine/
|
||||||
|
linters:
|
||||||
|
- errcheck
|
||||||
|
text: config.Delete
|
||||||
|
# RENDERD refers to the Render Device and not the past tense of render.
|
||||||
|
- path: .*.go
|
||||||
|
linters:
|
||||||
|
- misspell
|
||||||
|
text: "`RENDERD` is a misspelling of `RENDERED`"
|
||||||
237
.nvidia-ci.yml
237
.nvidia-ci.yml
@@ -1,4 +1,4 @@
|
|||||||
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
# Copyright (c) 2021-2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
# you may not use this file except in compliance with the License.
|
# you may not use this file except in compliance with the License.
|
||||||
@@ -33,8 +33,11 @@ variables:
|
|||||||
# On the multi-arch builder we don't need the qemu setup.
|
# On the multi-arch builder we don't need the qemu setup.
|
||||||
SKIP_QEMU_SETUP: "1"
|
SKIP_QEMU_SETUP: "1"
|
||||||
# Define the public staging registry
|
# Define the public staging registry
|
||||||
STAGING_REGISTRY: registry.gitlab.com/nvidia/container-toolkit/container-toolkit/staging
|
STAGING_REGISTRY: ghcr.io/nvidia
|
||||||
STAGING_VERSION: ${CI_COMMIT_SHORT_SHA}
|
STAGING_VERSION: ${CI_COMMIT_SHORT_SHA}
|
||||||
|
ARTIFACTORY_REPO_BASE: "https://urm.nvidia.com/artifactory/sw-gpu-cloudnative"
|
||||||
|
KITMAKER_RELEASE_FOLDER: "kitmaker"
|
||||||
|
PACKAGE_ARCHIVE_RELEASE_FOLDER: "releases"
|
||||||
|
|
||||||
.image-pull:
|
.image-pull:
|
||||||
stage: image-build
|
stage: image-build
|
||||||
@@ -48,8 +51,9 @@ variables:
|
|||||||
OUT_IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
OUT_IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
||||||
PUSH_MULTIPLE_TAGS: "false"
|
PUSH_MULTIPLE_TAGS: "false"
|
||||||
# We delay the job start to allow the public pipeline to generate the required images.
|
# We delay the job start to allow the public pipeline to generate the required images.
|
||||||
when: delayed
|
rules:
|
||||||
start_in: 30 minutes
|
- when: delayed
|
||||||
|
start_in: 30 minutes
|
||||||
timeout: 30 minutes
|
timeout: 30 minutes
|
||||||
retry:
|
retry:
|
||||||
max: 2
|
max: 2
|
||||||
@@ -63,38 +67,23 @@ variables:
|
|||||||
regctl manifest get ${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST} --list > /dev/null && echo "${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST}" || ( echo "${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST} does not exist" && sleep infinity )
|
regctl manifest get ${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST} --list > /dev/null && echo "${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST}" || ( echo "${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST} does not exist" && sleep infinity )
|
||||||
script:
|
script:
|
||||||
- regctl registry login "${OUT_REGISTRY}" -u "${OUT_REGISTRY_USER}" -p "${OUT_REGISTRY_TOKEN}"
|
- regctl registry login "${OUT_REGISTRY}" -u "${OUT_REGISTRY_USER}" -p "${OUT_REGISTRY_TOKEN}"
|
||||||
- make -f build/container/Makefile IMAGE=${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST} OUT_IMAGE=${OUT_IMAGE_NAME}:${CI_COMMIT_SHORT_SHA}-${DIST} push-${DIST}
|
- make -f deployments/container/Makefile IMAGE=${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST} OUT_IMAGE=${OUT_IMAGE_NAME}:${CI_COMMIT_SHORT_SHA}-${DIST} push-${DIST}
|
||||||
|
|
||||||
image-centos7:
|
|
||||||
extends:
|
|
||||||
- .image-pull
|
|
||||||
- .dist-centos7
|
|
||||||
|
|
||||||
image-centos8:
|
|
||||||
extends:
|
|
||||||
- .image-pull
|
|
||||||
- .dist-centos8
|
|
||||||
|
|
||||||
image-ubi8:
|
image-ubi8:
|
||||||
extends:
|
extends:
|
||||||
- .image-pull
|
|
||||||
- .dist-ubi8
|
- .dist-ubi8
|
||||||
|
|
||||||
image-ubuntu18.04:
|
|
||||||
extends:
|
|
||||||
- .image-pull
|
- .image-pull
|
||||||
- .dist-ubuntu18.04
|
|
||||||
|
|
||||||
image-ubuntu20.04:
|
image-ubuntu20.04:
|
||||||
extends:
|
extends:
|
||||||
- .image-pull
|
|
||||||
- .dist-ubuntu20.04
|
- .dist-ubuntu20.04
|
||||||
|
- .image-pull
|
||||||
|
|
||||||
# The DIST=packaging target creates an image containing all built packages
|
# The DIST=packaging target creates an image containing all built packages
|
||||||
image-packaging:
|
image-packaging:
|
||||||
extends:
|
extends:
|
||||||
- .image-pull
|
|
||||||
- .dist-packaging
|
- .dist-packaging
|
||||||
|
- .image-pull
|
||||||
|
|
||||||
# We skip the integration tests for the internal CI:
|
# We skip the integration tests for the internal CI:
|
||||||
.integration:
|
.integration:
|
||||||
@@ -111,10 +100,10 @@ image-packaging:
|
|||||||
image: "${PULSE_IMAGE}"
|
image: "${PULSE_IMAGE}"
|
||||||
variables:
|
variables:
|
||||||
IMAGE: "${CI_REGISTRY_IMAGE}/container-toolkit:${CI_COMMIT_SHORT_SHA}-${DIST}"
|
IMAGE: "${CI_REGISTRY_IMAGE}/container-toolkit:${CI_COMMIT_SHORT_SHA}-${DIST}"
|
||||||
IMAGE_ARCHIVE: "container-toolkit.tar"
|
IMAGE_ARCHIVE: "container-toolkit-${DIST}-${ARCH}-${CI_JOB_ID}.tar"
|
||||||
except:
|
rules:
|
||||||
variables:
|
- if: $SKIP_SCANS != "yes"
|
||||||
- $SKIP_SCANS && $SKIP_SCANS == "yes"
|
- when: manual
|
||||||
before_script:
|
before_script:
|
||||||
- docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
- docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
||||||
# TODO: We should specify the architecture here and scan all architectures
|
# TODO: We should specify the architecture here and scan all architectures
|
||||||
@@ -126,6 +115,7 @@ image-packaging:
|
|||||||
- if [ -z "$SSA_TOKEN" ]; then exit 1; else echo "SSA_TOKEN set!"; fi
|
- if [ -z "$SSA_TOKEN" ]; then exit 1; else echo "SSA_TOKEN set!"; fi
|
||||||
script:
|
script:
|
||||||
- pulse-cli -n $NSPECT_ID --ssa $SSA_TOKEN scan -i $IMAGE_ARCHIVE -p $CONTAINER_POLICY -o
|
- pulse-cli -n $NSPECT_ID --ssa $SSA_TOKEN scan -i $IMAGE_ARCHIVE -p $CONTAINER_POLICY -o
|
||||||
|
- rm -f "${IMAGE_ARCHIVE}"
|
||||||
artifacts:
|
artifacts:
|
||||||
when: always
|
when: always
|
||||||
expire_in: 1 week
|
expire_in: 1 week
|
||||||
@@ -137,91 +127,47 @@ image-packaging:
|
|||||||
- policy_evaluation.json
|
- policy_evaluation.json
|
||||||
|
|
||||||
# Define the scan targets
|
# Define the scan targets
|
||||||
scan-centos7-amd64:
|
|
||||||
extends:
|
|
||||||
- .scan
|
|
||||||
- .dist-centos7
|
|
||||||
- .platform-amd64
|
|
||||||
needs:
|
|
||||||
- image-centos7
|
|
||||||
|
|
||||||
scan-centos7-arm64:
|
|
||||||
extends:
|
|
||||||
- .scan
|
|
||||||
- .dist-centos7
|
|
||||||
- .platform-arm64
|
|
||||||
needs:
|
|
||||||
- image-centos7
|
|
||||||
- scan-centos7-amd64
|
|
||||||
|
|
||||||
scan-centos8-amd64:
|
|
||||||
extends:
|
|
||||||
- .scan
|
|
||||||
- .dist-centos8
|
|
||||||
- .platform-amd64
|
|
||||||
needs:
|
|
||||||
- image-centos8
|
|
||||||
|
|
||||||
scan-centos8-arm64:
|
|
||||||
extends:
|
|
||||||
- .scan
|
|
||||||
- .dist-centos8
|
|
||||||
- .platform-arm64
|
|
||||||
needs:
|
|
||||||
- image-centos8
|
|
||||||
- scan-centos8-amd64
|
|
||||||
|
|
||||||
scan-ubuntu18.04-amd64:
|
|
||||||
extends:
|
|
||||||
- .scan
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
- .platform-amd64
|
|
||||||
needs:
|
|
||||||
- image-ubuntu18.04
|
|
||||||
|
|
||||||
scan-ubuntu18.04-arm64:
|
|
||||||
extends:
|
|
||||||
- .scan
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
- .platform-arm64
|
|
||||||
needs:
|
|
||||||
- image-ubuntu18.04
|
|
||||||
- scan-ubuntu18.04-amd64
|
|
||||||
|
|
||||||
scan-ubuntu20.04-amd64:
|
scan-ubuntu20.04-amd64:
|
||||||
extends:
|
extends:
|
||||||
- .scan
|
|
||||||
- .dist-ubuntu20.04
|
- .dist-ubuntu20.04
|
||||||
- .platform-amd64
|
- .platform-amd64
|
||||||
|
- .scan
|
||||||
needs:
|
needs:
|
||||||
- image-ubuntu20.04
|
- image-ubuntu20.04
|
||||||
|
|
||||||
scan-ubuntu20.04-arm64:
|
scan-ubuntu20.04-arm64:
|
||||||
extends:
|
extends:
|
||||||
- .scan
|
|
||||||
- .dist-ubuntu20.04
|
- .dist-ubuntu20.04
|
||||||
- .platform-arm64
|
- .platform-arm64
|
||||||
|
- .scan
|
||||||
needs:
|
needs:
|
||||||
- image-ubuntu20.04
|
- image-ubuntu20.04
|
||||||
- scan-ubuntu20.04-amd64
|
- scan-ubuntu20.04-amd64
|
||||||
|
|
||||||
scan-ubi8-amd64:
|
scan-ubi8-amd64:
|
||||||
extends:
|
extends:
|
||||||
- .scan
|
|
||||||
- .dist-ubi8
|
- .dist-ubi8
|
||||||
- .platform-amd64
|
- .platform-amd64
|
||||||
|
- .scan
|
||||||
needs:
|
needs:
|
||||||
- image-ubi8
|
- image-ubi8
|
||||||
|
|
||||||
scan-ubi8-arm64:
|
scan-ubi8-arm64:
|
||||||
extends:
|
extends:
|
||||||
- .scan
|
|
||||||
- .dist-ubi8
|
- .dist-ubi8
|
||||||
- .platform-arm64
|
- .platform-arm64
|
||||||
|
- .scan
|
||||||
needs:
|
needs:
|
||||||
- image-ubi8
|
- image-ubi8
|
||||||
- scan-ubi8-amd64
|
- scan-ubi8-amd64
|
||||||
|
|
||||||
|
scan-packaging:
|
||||||
|
extends:
|
||||||
|
- .dist-packaging
|
||||||
|
- .scan
|
||||||
|
needs:
|
||||||
|
- image-packaging
|
||||||
|
|
||||||
# Define external release helpers
|
# Define external release helpers
|
||||||
.release:ngc:
|
.release:ngc:
|
||||||
extends:
|
extends:
|
||||||
@@ -232,12 +178,48 @@ scan-ubi8-arm64:
|
|||||||
OUT_REGISTRY: "${NGC_REGISTRY}"
|
OUT_REGISTRY: "${NGC_REGISTRY}"
|
||||||
OUT_IMAGE_NAME: "${NGC_REGISTRY_IMAGE}"
|
OUT_IMAGE_NAME: "${NGC_REGISTRY_IMAGE}"
|
||||||
|
|
||||||
release:staging-ubuntu18.04:
|
.release:packages:
|
||||||
extends:
|
stage: release
|
||||||
- .release:staging
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
needs:
|
needs:
|
||||||
- image-ubuntu18.04
|
- image-packaging
|
||||||
|
variables:
|
||||||
|
VERSION: "${CI_COMMIT_SHORT_SHA}"
|
||||||
|
PACKAGE_REGISTRY: "${CI_REGISTRY}"
|
||||||
|
PACKAGE_REGISTRY_USER: "${CI_REGISTRY_USER}"
|
||||||
|
PACKAGE_REGISTRY_TOKEN: "${CI_REGISTRY_PASSWORD}"
|
||||||
|
PACKAGE_IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
||||||
|
PACKAGE_IMAGE_TAG: "${CI_COMMIT_SHORT_SHA}-packaging"
|
||||||
|
KITMAKER_ARTIFACTORY_REPO: "${ARTIFACTORY_REPO_BASE}-generic-local/${KITMAKER_RELEASE_FOLDER}"
|
||||||
|
ARTIFACTS_DIR: "${CI_PROJECT_DIR}/artifacts"
|
||||||
|
script:
|
||||||
|
- !reference [.regctl-setup, before_script]
|
||||||
|
- apk add --no-cache bash git
|
||||||
|
- regctl registry login "${PACKAGE_REGISTRY}" -u "${PACKAGE_REGISTRY_USER}" -p "${PACKAGE_REGISTRY_TOKEN}"
|
||||||
|
- ./scripts/extract-packages.sh "${PACKAGE_IMAGE_NAME}:${PACKAGE_IMAGE_TAG}"
|
||||||
|
- ./scripts/release-kitmaker-artifactory.sh "${KITMAKER_ARTIFACTORY_REPO}"
|
||||||
|
- rm -rf ${ARTIFACTS_DIR}
|
||||||
|
|
||||||
|
# Define the package release targets
|
||||||
|
release:packages:kitmaker:
|
||||||
|
extends:
|
||||||
|
- .release:packages
|
||||||
|
|
||||||
|
release:archive:
|
||||||
|
extends:
|
||||||
|
- .release:external
|
||||||
|
needs:
|
||||||
|
- image-packaging
|
||||||
|
variables:
|
||||||
|
VERSION: "${CI_COMMIT_SHORT_SHA}"
|
||||||
|
PACKAGE_REGISTRY: "${CI_REGISTRY}"
|
||||||
|
PACKAGE_REGISTRY_USER: "${CI_REGISTRY_USER}"
|
||||||
|
PACKAGE_REGISTRY_TOKEN: "${CI_REGISTRY_PASSWORD}"
|
||||||
|
PACKAGE_IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
||||||
|
PACKAGE_IMAGE_TAG: "${CI_COMMIT_SHORT_SHA}-packaging"
|
||||||
|
PACKAGE_ARCHIVE_ARTIFACTORY_REPO: "${ARTIFACTORY_REPO_BASE}-generic-local/${PACKAGE_ARCHIVE_RELEASE_FOLDER}"
|
||||||
|
script:
|
||||||
|
- apk add --no-cache bash git
|
||||||
|
- ./scripts/archive-packages.sh "${PACKAGE_ARCHIVE_ARTIFACTORY_REPO}"
|
||||||
|
|
||||||
release:staging-ubuntu20.04:
|
release:staging-ubuntu20.04:
|
||||||
extends:
|
extends:
|
||||||
@@ -248,27 +230,76 @@ release:staging-ubuntu20.04:
|
|||||||
|
|
||||||
# Define the external release targets
|
# Define the external release targets
|
||||||
# Release to NGC
|
# Release to NGC
|
||||||
release:ngc-centos7:
|
|
||||||
extends:
|
|
||||||
- .release:ngc
|
|
||||||
- .dist-centos7
|
|
||||||
|
|
||||||
release:ngc-centos8:
|
|
||||||
extends:
|
|
||||||
- .release:ngc
|
|
||||||
- .dist-centos8
|
|
||||||
|
|
||||||
release:ngc-ubuntu18.04:
|
|
||||||
extends:
|
|
||||||
- .release:ngc
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
|
|
||||||
release:ngc-ubuntu20.04:
|
release:ngc-ubuntu20.04:
|
||||||
extends:
|
extends:
|
||||||
- .release:ngc
|
|
||||||
- .dist-ubuntu20.04
|
- .dist-ubuntu20.04
|
||||||
|
- .release:ngc
|
||||||
|
|
||||||
release:ngc-ubi8:
|
release:ngc-ubi8:
|
||||||
extends:
|
extends:
|
||||||
- .release:ngc
|
|
||||||
- .dist-ubi8
|
- .dist-ubi8
|
||||||
|
- .release:ngc
|
||||||
|
|
||||||
|
release:ngc-packaging:
|
||||||
|
extends:
|
||||||
|
- .dist-packaging
|
||||||
|
- .release:ngc
|
||||||
|
|
||||||
|
# Define the external image signing steps for NGC
|
||||||
|
# Download the ngc cli binary for use in the sign steps
|
||||||
|
.ngccli-setup:
|
||||||
|
before_script:
|
||||||
|
- apt-get update && apt-get install -y curl unzip jq
|
||||||
|
- |
|
||||||
|
if [ -z "${NGCCLI_VERSION}" ]; then
|
||||||
|
NGC_VERSION_URL="https://api.ngc.nvidia.com/v2/resources/nvidia/ngc-apps/ngc_cli/versions"
|
||||||
|
# Extract the latest version from the JSON data using jq
|
||||||
|
export NGCCLI_VERSION=$(curl -s $NGC_VERSION_URL | jq -r '.recipe.latestVersionIdStr')
|
||||||
|
fi
|
||||||
|
echo "NGCCLI_VERSION ${NGCCLI_VERSION}"
|
||||||
|
- curl -sSLo ngccli_linux.zip https://api.ngc.nvidia.com/v2/resources/nvidia/ngc-apps/ngc_cli/versions/${NGCCLI_VERSION}/files/ngccli_linux.zip
|
||||||
|
- unzip ngccli_linux.zip
|
||||||
|
- chmod u+x ngc-cli/ngc
|
||||||
|
|
||||||
|
# .sign forms the base of the deployment jobs which signs images in the CI registry.
|
||||||
|
# This is extended with the image name and version to be deployed.
|
||||||
|
.sign:ngc:
|
||||||
|
image: ubuntu:latest
|
||||||
|
stage: sign
|
||||||
|
rules:
|
||||||
|
- if: $CI_COMMIT_TAG
|
||||||
|
variables:
|
||||||
|
NGC_CLI_API_KEY: "${NGC_REGISTRY_TOKEN}"
|
||||||
|
IMAGE_NAME: "${NGC_REGISTRY_IMAGE}"
|
||||||
|
IMAGE_TAG: "${CI_COMMIT_TAG}-${DIST}"
|
||||||
|
retry:
|
||||||
|
max: 2
|
||||||
|
before_script:
|
||||||
|
- !reference [.ngccli-setup, before_script]
|
||||||
|
# We ensure that the IMAGE_NAME and IMAGE_TAG is set
|
||||||
|
- 'echo Image Name: ${IMAGE_NAME} && [[ -n "${IMAGE_NAME}" ]] || exit 1'
|
||||||
|
- 'echo Image Tag: ${IMAGE_TAG} && [[ -n "${IMAGE_TAG}" ]] || exit 1'
|
||||||
|
script:
|
||||||
|
- 'echo "Signing the image ${IMAGE_NAME}:${IMAGE_TAG}"'
|
||||||
|
- ngc-cli/ngc registry image publish --source ${IMAGE_NAME}:${IMAGE_TAG} ${IMAGE_NAME}:${IMAGE_TAG} --public --discoverable --allow-guest --sign --org nvidia
|
||||||
|
|
||||||
|
sign:ngc-ubuntu20.04:
|
||||||
|
extends:
|
||||||
|
- .dist-ubuntu20.04
|
||||||
|
- .sign:ngc
|
||||||
|
needs:
|
||||||
|
- release:ngc-ubuntu20.04
|
||||||
|
|
||||||
|
sign:ngc-ubi8:
|
||||||
|
extends:
|
||||||
|
- .dist-ubi8
|
||||||
|
- .sign:ngc
|
||||||
|
needs:
|
||||||
|
- release:ngc-ubi8
|
||||||
|
|
||||||
|
sign:ngc-packaging:
|
||||||
|
extends:
|
||||||
|
- .dist-packaging
|
||||||
|
- .sign:ngc
|
||||||
|
needs:
|
||||||
|
- release:ngc-packaging
|
||||||
|
|||||||
375
CHANGELOG.md
375
CHANGELOG.md
@@ -1,5 +1,380 @@
|
|||||||
# NVIDIA Container Toolkit Changelog
|
# NVIDIA Container Toolkit Changelog
|
||||||
|
|
||||||
|
## v1.17.4
|
||||||
|
- Disable mounting of compat libs from container by default
|
||||||
|
- Add allow-cuda-compat-libs-from-container feature flag
|
||||||
|
- Skip graphics modifier in CSV mode
|
||||||
|
- Properly pass configSearchPaths to a Driver constructor
|
||||||
|
- Add support for containerd version 3 config
|
||||||
|
- Add string TOML source
|
||||||
|
|
||||||
|
### Changes in libnvidia-container
|
||||||
|
- Add no-cntlibs CLI option to nvidia-container-cli
|
||||||
|
|
||||||
|
### Changes in the Toolkit Container
|
||||||
|
- Bump CUDA base image version to 12.6.3
|
||||||
|
|
||||||
|
## v1.17.3
|
||||||
|
- Only allow host-relative LDConfig paths by default.
|
||||||
|
### Changes in libnvidia-container
|
||||||
|
- Create virtual copy of host ldconfig binary before calling fexecve()
|
||||||
|
|
||||||
|
## v1.17.2
|
||||||
|
- Fixed a bug where legacy images would set imex channels as `all`.
|
||||||
|
|
||||||
|
## v1.17.1
|
||||||
|
- Fixed a bug where specific symlinks existing in a container image could cause a container to fail to start.
|
||||||
|
- Fixed a bug on Tegra-based systems where a container would fail to start.
|
||||||
|
- Fixed a bug where the default container runtime config path was not properly set.
|
||||||
|
|
||||||
|
### Changes in the Toolkit Container
|
||||||
|
- Fallback to using a config file if the current runtime config can not be determined from the command line.
|
||||||
|
|
||||||
|
## v1.17.0
|
||||||
|
- Promote v1.17.0-rc.2 to v1.17.0
|
||||||
|
- Fix bug when using just-in-time CDI spec generation
|
||||||
|
- Check for valid paths in create-symlinks hook
|
||||||
|
|
||||||
|
## v1.17.0-rc.2
|
||||||
|
- Fix bug in locating libcuda.so from ldcache
|
||||||
|
- Fix bug in sorting of symlink chain
|
||||||
|
- Remove unsupported print-ldcache command
|
||||||
|
- Remove csv-filename support from create-symlinks
|
||||||
|
|
||||||
|
### Changes in the Toolkit Container
|
||||||
|
- Fallback to `crio-status` if `crio status` does not work when configuring the crio runtime
|
||||||
|
|
||||||
|
## v1.17.0-rc.1
|
||||||
|
- Allow IMEX channels to be requested as volume mounts
|
||||||
|
- Fix typo in error message
|
||||||
|
- Add disable-imex-channel-creation feature flag
|
||||||
|
- Add -z,lazy to LDFLAGS
|
||||||
|
- Add imex channels to management CDI spec
|
||||||
|
- Add support to fetch current container runtime config from the command line.
|
||||||
|
- Add creation of select driver symlinks to CDI spec generation.
|
||||||
|
- Remove support for config overrides when configuring runtimes.
|
||||||
|
- Skip explicit creation of libnvidia-allocator.so.1 symlink
|
||||||
|
- Add vdpau as as a driver library search path.
|
||||||
|
- Add support for using libnvsandboxutils to generate CDI specifications.
|
||||||
|
|
||||||
|
### Changes in the Toolkit Container
|
||||||
|
|
||||||
|
- Allow opt-in features to be selected when deploying the toolkit-container.
|
||||||
|
- Bump CUDA base image version to 12.6.2
|
||||||
|
- Remove support for config overrides when configuring runtimes.
|
||||||
|
|
||||||
|
### Changes in libnvidia-container
|
||||||
|
|
||||||
|
- Add no-create-imex-channels command line option.
|
||||||
|
|
||||||
|
## v1.16.2
|
||||||
|
- Exclude libnvidia-allocator from graphics mounts. This fixes a bug that leaks mounts when a container is started with bi-directional mount propagation.
|
||||||
|
- Use empty string for default runtime-config-override. This removes a redundant warning for runtimes (e.g. Docker) where this is not applicable.
|
||||||
|
|
||||||
|
### Changes in the Toolkit Container
|
||||||
|
- Bump CUDA base image version to 12.6.0
|
||||||
|
|
||||||
|
### Changes in libnvidia-container
|
||||||
|
- Add no-gsp-firmware command line option
|
||||||
|
- Add no-fabricmanager command line option
|
||||||
|
- Add no-persistenced command line option
|
||||||
|
- Skip directories and symlinks when mounting libraries.
|
||||||
|
|
||||||
|
## v1.16.1
|
||||||
|
- Fix bug with processing errors during CDI spec generation for MIG devices
|
||||||
|
|
||||||
|
## v1.16.0
|
||||||
|
- Promote v1.16.0-rc.2 to v1.16.0
|
||||||
|
|
||||||
|
### Changes in the Toolkit Container
|
||||||
|
- Bump CUDA base image version to 12.5.1
|
||||||
|
|
||||||
|
## v1.16.0-rc.2
|
||||||
|
- Use relative path to locate driver libraries
|
||||||
|
- Add RelativeToRoot function to Driver
|
||||||
|
- Inject additional libraries for full X11 functionality
|
||||||
|
- Extract options from default runtime if runc does not exist
|
||||||
|
- Avoid using map pointers as maps are always passed by reference
|
||||||
|
- Reduce logging for the NVIDIA Container runtime
|
||||||
|
- Fix bug in argument parsing for logger creation
|
||||||
|
|
||||||
|
## v1.16.0-rc.1
|
||||||
|
|
||||||
|
- Support vulkan ICD files directly in a driver root. This allows for the discovery of vulkan files in GKE driver installations.
|
||||||
|
- Increase priority of ld.so.conf.d config file injected into container. This ensures that injected libraries are preferred over libraries present in the container.
|
||||||
|
- Set default CDI spec permissions to 644. This fixes permission issues when using the `nvidia-ctk cdi transform` functions.
|
||||||
|
- Add `dev-root` option to `nvidia-ctk system create-device-nodes` command.
|
||||||
|
- Fix location of `libnvidia-ml.so.1` when a non-standard driver root is used. This enabled CDI spec generation when using the driver container on a host.
|
||||||
|
- Recalculate minimum required CDI spec version on save.
|
||||||
|
- Move `nvidia-ctk hook` commands to a separate `nvidia-cdi-hook` binary. The same subcommands are supported.
|
||||||
|
- Use `:` as an `nvidia-ctk config --set` list separator. This fixes a bug when trying to set config options that are lists.
|
||||||
|
|
||||||
|
- [toolkit-container] Bump CUDA base image version to 12.5.0
|
||||||
|
- [toolkit-container] Allow the path to `toolkit.pid` to be specified directly.
|
||||||
|
- [toolkit-container] Remove provenance information from image manifests.
|
||||||
|
- [toolkit-container] Add `dev-root` option when configuring the toolkit. This adds support for GKE driver installations.
|
||||||
|
|
||||||
|
## v1.15.0
|
||||||
|
|
||||||
|
* Remove `nvidia-container-runtime` and `nvidia-docker2` packages.
|
||||||
|
* Use `XDG_DATA_DIRS` environment variable when locating config files such as graphics config files.
|
||||||
|
* Add support for v0.7.0 Container Device Interface (CDI) specification.
|
||||||
|
* Add `--config-search-path` option to `nvidia-ctk cdi generate` command. These paths are used when locating driver files such as graphics config files.
|
||||||
|
* Use D3DKMTEnumAdapters3 to enumerate adpaters on WSL2 if available.
|
||||||
|
* Add support for v1.2.0 OCI Runtime specification.
|
||||||
|
* Explicitly set `NVIDIA_VISIBLE_DEVICES=void` in generated CDI specifications. This prevents the NVIDIA Container Runtime from making additional modifications.
|
||||||
|
|
||||||
|
* [libnvidia-container] Use D3DKMTEnumAdapters3 to enumerate adpaters on WSL2 if available.
|
||||||
|
|
||||||
|
* [toolkit-container] Bump CUDA base image version to 12.4.1
|
||||||
|
|
||||||
|
## v1.15.0-rc.4
|
||||||
|
* Add a `--spec-dir` option to the `nvidia-ctk cdi generate` command. This allows specs outside of `/etc/cdi` and `/var/run/cdi` to be processed.
|
||||||
|
* Add support for extracting device major number from `/proc/devices` if `nvidia` is used as a device name over `nvidia-frontend`.
|
||||||
|
* Allow multiple device naming strategies for `nvidia-ctk cdi generate` command. This allows a single
|
||||||
|
CDI spec to be generated that includes GPUs by index and UUID.
|
||||||
|
* Set the default `--device-name-strategy` for the `nvidia-ctk cdi generate` command to `[index, uuid]`.
|
||||||
|
* Remove `libnvidia-container0` jetpack dependency included for legacy Tegra-based systems.
|
||||||
|
* Add `NVIDIA_VISIBLE_DEVICES=void` to generated CDI specifications.
|
||||||
|
|
||||||
|
* [toolkit-container] Remove centos7 image. The ubi8 image can be used on all RPM-based platforms.
|
||||||
|
* [toolkit-container] Bump CUDA base image version to 12.3.2
|
||||||
|
|
||||||
|
## v1.15.0-rc.3
|
||||||
|
* Fix bug in `nvidia-ctk hook update-ldcache` where default `--ldconfig-path` value was not applied.
|
||||||
|
|
||||||
|
## v1.15.0-rc.2
|
||||||
|
* Extend the `runtime.nvidia.com/gpu` CDI kind to support full-GPUs and MIG devices specified by index or UUID.
|
||||||
|
* Fix bug when specifying `--dev-root` for Tegra-based systems.
|
||||||
|
* Log explicitly requested runtime mode.
|
||||||
|
* Remove package dependency on libseccomp.
|
||||||
|
* Added detection of libnvdxgdmal.so.1 on WSL2
|
||||||
|
* Use devRoot to resolve MIG device nodes.
|
||||||
|
* Fix bug in determining default nvidia-container-runtime.user config value on SUSE-based systems.
|
||||||
|
* Add `crun` to the list of configured low-level runtimes.
|
||||||
|
* Added support for `--ldconfig-path` to `nvidia-ctk cdi generate` command.
|
||||||
|
* Fix `nvidia-ctk runtime configure --cdi.enabled` for Docker.
|
||||||
|
* Add discovery of the GDRCopy device (`gdrdrv`) if the `NVIDIA_GDRCOPY` environment variable of the container is set to `enabled`
|
||||||
|
|
||||||
|
* [toolkit-container] Bump CUDA base image version to 12.3.1.
|
||||||
|
|
||||||
|
## v1.15.0-rc.1
|
||||||
|
* Skip update of ldcache in containers without ldconfig. The .so.SONAME symlinks are still created.
|
||||||
|
* Normalize ldconfig path on use. This automatically adjust the ldconfig setting applied to ldconfig.real on systems where this exists.
|
||||||
|
* Include `nvidia/nvoptix.bin` in list of graphics mounts.
|
||||||
|
* Include `vulkan/icd.d/nvidia_layers.json` in list of graphics mounts.
|
||||||
|
* Add support for `--library-search-paths` to `nvidia-ctk cdi generate` command.
|
||||||
|
* Add support for injecting /dev/nvidia-nvswitch* devices if the NVIDIA_NVSWITCH=enabled envvar is specified.
|
||||||
|
* Added support for `nvidia-ctk runtime configure --enable-cdi` for the `docker` runtime. Note that this requires Docker >= 25.
|
||||||
|
* Fixed bug in `nvidia-ctk config` command when using `--set`. The types of applied config options are now applied correctly.
|
||||||
|
* Add `--relative-to` option to `nvidia-ctk transform root` command. This controls whether the root transformation is applied to host or container paths.
|
||||||
|
* Added automatic CDI spec generation when the `runtime.nvidia.com/gpu=all` device is requested by a container.
|
||||||
|
|
||||||
|
* [libnvidia-container] Fix device permission check when using cgroupv2 (fixes #227)
|
||||||
|
|
||||||
|
## v1.14.3
|
||||||
|
* [toolkit-container] Bump CUDA base image version to 12.2.2.
|
||||||
|
|
||||||
|
## v1.14.2
|
||||||
|
* Fix bug on Tegra-based systems where symlinks were not created in containers.
|
||||||
|
* Add --csv.ignore-pattern command line option to nvidia-ctk cdi generate command.
|
||||||
|
|
||||||
|
## v1.14.1
|
||||||
|
* Fixed bug where contents of `/etc/nvidia-container-runtime/config.toml` is ignored by the NVIDIA Container Runtime Hook.
|
||||||
|
|
||||||
|
* [libnvidia-container] Use libelf.so on RPM-based systems due to removed mageia repositories hosting pmake and bmake.
|
||||||
|
|
||||||
|
## v1.14.0
|
||||||
|
* Promote v1.14.0-rc.3 to v1.14.0
|
||||||
|
|
||||||
|
## v1.14.0-rc.3
|
||||||
|
* Added support for generating OCI hook JSON file to `nvidia-ctk runtime configure` command.
|
||||||
|
* Remove installation of OCI hook JSON from RPM package.
|
||||||
|
* Refactored config for `nvidia-container-runtime-hook`.
|
||||||
|
* Added a `nvidia-ctk config` command which supports setting config options using a `--set` flag.
|
||||||
|
* Added `--library-search-path` option to `nvidia-ctk cdi generate` command in `csv` mode. This allows folders where
|
||||||
|
libraries are located to be specified explicitly.
|
||||||
|
* Updated go-nvlib to support devices which are not present in the PCI device database. This allows the creation of dev/char symlinks on systems with such devices installed.
|
||||||
|
* Added `UsesNVGPUModule` info function for more robust platform detection. This is required on Tegra-based systems where libnvidia-ml.so is also supported.
|
||||||
|
|
||||||
|
* [toolkit-container] Set `NVIDIA_VISIBLE_DEVICES=void` to prevent injection of NVIDIA devices and drivers into the NVIDIA Container Toolkit container.
|
||||||
|
|
||||||
|
## v1.14.0-rc.2
|
||||||
|
* Fix bug causing incorrect nvidia-smi symlink to be created on WSL2 systems with multiple driver roots.
|
||||||
|
* Remove dependency on coreutils when installing package on RPM-based systems.
|
||||||
|
* Create output folders if required when running `nvidia-ctk runtime configure`
|
||||||
|
* Generate default config as post-install step.
|
||||||
|
* Added support for detecting GSP firmware at custom paths when generating CDI specifications.
|
||||||
|
* Added logic to skip the extraction of image requirements if `NVIDIA_DISABLE_REQUIRES` is set to `true`.
|
||||||
|
|
||||||
|
* [libnvidia-container] Include Shared Compiler Library (libnvidia-gpucomp.so) in the list of compute libaries.
|
||||||
|
|
||||||
|
* [toolkit-container] Ensure that common envvars have higher priority when configuring the container engines.
|
||||||
|
* [toolkit-container] Bump CUDA base image version to 12.2.0.
|
||||||
|
* [toolkit-container] Remove installation of nvidia-experimental runtime. This is superceded by the NVIDIA Container Runtime in CDI mode.
|
||||||
|
|
||||||
|
## v1.14.0-rc.1
|
||||||
|
|
||||||
|
* Add support for updating containerd configs to the `nvidia-ctk runtime configure` command.
|
||||||
|
* Create file in `etc/ld.so.conf.d` with permissions `644` to support non-root containers.
|
||||||
|
* Generate CDI specification files with `644` permissions to allow rootless applications (e.g. podman)
|
||||||
|
* Add `nvidia-ctk cdi list` command to show the known CDI devices.
|
||||||
|
* Add support for generating merged devices (e.g. `all` device) to the nvcdi API.
|
||||||
|
* Use *.* pattern to locate libcuda.so when generating a CDI specification to support platforms where a patch version is not specified.
|
||||||
|
* Update go-nvlib to skip devices that are not MIG capable when generating CDI specifications.
|
||||||
|
* Add `nvidia-container-runtime-hook.path` config option to specify NVIDIA Container Runtime Hook path explicitly.
|
||||||
|
* Fix bug in creation of `/dev/char` symlinks by failing operation if kernel modules are not loaded.
|
||||||
|
* Add option to load kernel modules when creating device nodes
|
||||||
|
* Add option to create device nodes when creating `/dev/char` symlinks
|
||||||
|
|
||||||
|
* [libnvidia-container] Support OpenSSL 3 with the Encrypt/Decrypt library
|
||||||
|
|
||||||
|
* [toolkit-container] Allow same envars for all runtime configs
|
||||||
|
|
||||||
|
## v1.13.1
|
||||||
|
|
||||||
|
* Update `update-ldcache` hook to only update ldcache if it exists.
|
||||||
|
* Update `update-ldcache` hook to create `/etc/ld.so.conf.d` folder if it doesn't exist.
|
||||||
|
* Fix failure when libcuda cannot be located during XOrg library discovery.
|
||||||
|
* Fix CDI spec generation on systems that use `/etc/alternatives` (e.g. Debian)
|
||||||
|
|
||||||
|
## v1.13.0
|
||||||
|
|
||||||
|
* Promote 1.13.0-rc.3 to 1.13.0
|
||||||
|
|
||||||
|
## v1.13.0-rc.3
|
||||||
|
|
||||||
|
* Only initialize NVML for modes that require it when runing `nvidia-ctk cdi generate`.
|
||||||
|
* Prefer /run over /var/run when locating nvidia-persistenced and nvidia-fabricmanager sockets.
|
||||||
|
* Fix the generation of CDI specifications for management containers when the driver libraries are not in the LDCache.
|
||||||
|
* Add transformers to deduplicate and simplify CDI specifications.
|
||||||
|
* Generate a simplified CDI specification by default. This means that entities in the common edits in a spec are not included in device definitions.
|
||||||
|
* Also return an error from the nvcdi.New constructor instead of panicing.
|
||||||
|
* Detect XOrg libraries for injection and CDI spec generation.
|
||||||
|
* Add `nvidia-ctk system create-device-nodes` command to create control devices.
|
||||||
|
* Add `nvidia-ctk cdi transform` command to apply transforms to CDI specifications.
|
||||||
|
* Add `--vendor` and `--class` options to `nvidia-ctk cdi generate`
|
||||||
|
|
||||||
|
* [libnvidia-container] Fix segmentation fault when RPC initialization fails.
|
||||||
|
* [libnvidia-container] Build centos variants of the NVIDIA Container Library with static libtirpc v1.3.2.
|
||||||
|
* [libnvidia-container] Remove make targets for fedora35 as the centos8 packages are compatible.
|
||||||
|
|
||||||
|
* [toolkit-container] Add `nvidia-container-runtime.modes.cdi.annotation-prefixes` config option that allows the CDI annotation prefixes that are read to be overridden.
|
||||||
|
* [toolkit-container] Create device nodes when generating CDI specification for management containers.
|
||||||
|
* [toolkit-container] Add `nvidia-container-runtime.runtimes` config option to set the low-level runtime for the NVIDIA Container Runtime
|
||||||
|
|
||||||
|
## v1.13.0-rc.2
|
||||||
|
|
||||||
|
* Don't fail chmod hook if paths are not injected
|
||||||
|
* Only create `by-path` symlinks if CDI devices are actually requested.
|
||||||
|
* Fix possible blank `nvidia-ctk` path in generated CDI specifications
|
||||||
|
* Fix error in postun scriplet on RPM-based systems
|
||||||
|
* Only check `NVIDIA_VISIBLE_DEVICES` for environment variables if no annotations are specified.
|
||||||
|
* Add `cdi.default-kind` config option for constructing fully-qualified CDI device names in CDI mode
|
||||||
|
* Add support for `accept-nvidia-visible-devices-envvar-unprivileged` config setting in CDI mode
|
||||||
|
* Add `nvidia-container-runtime-hook.skip-mode-detection` config option to bypass mode detection. This allows `legacy` and `cdi` mode, for example, to be used at the same time.
|
||||||
|
* Add support for generating CDI specifications for GDS and MOFED devices
|
||||||
|
* Ensure CDI specification is validated on save when generating a spec
|
||||||
|
* Rename `--discovery-mode` argument to `--mode` for `nvidia-ctk cdi generate`
|
||||||
|
* [libnvidia-container] Fix segfault on WSL2 systems
|
||||||
|
* [toolkit-container] Add `--cdi-enabled` flag to toolkit config
|
||||||
|
* [toolkit-container] Install `nvidia-ctk` from toolkit container
|
||||||
|
* [toolkit-container] Use installed `nvidia-ctk` path in NVIDIA Container Toolkit config
|
||||||
|
* [toolkit-container] Bump CUDA base images to 12.1.0
|
||||||
|
* [toolkit-container] Set `nvidia-ctk` path in the
|
||||||
|
* [toolkit-container] Add `cdi.k8s.io/*` to set of allowed annotations in containerd config
|
||||||
|
* [toolkit-container] Generate CDI specification for use in management containers
|
||||||
|
* [toolkit-container] Install experimental runtime as `nvidia-container-runtime.experimental` instead of `nvidia-container-runtime-experimental`
|
||||||
|
* [toolkit-container] Install and configure mode-specific runtimes for `cdi` and `legacy` modes
|
||||||
|
|
||||||
|
## v1.13.0-rc.1
|
||||||
|
|
||||||
|
* Include MIG-enabled devices as GPUs when generating CDI specification
|
||||||
|
* Fix missing NVML symbols when running `nvidia-ctk` on some platforms [#49]
|
||||||
|
* Add CDI spec generation for WSL2-based systems to `nvidia-ctk cdi generate` command
|
||||||
|
* Add `auto` mode to `nvidia-ctk cdi generate` command to automatically detect a WSL2-based system over a standard NVML-based system.
|
||||||
|
* Add mode-specific (`.cdi` and `.legacy`) NVIDIA Container Runtime binaries for use in the GPU Operator
|
||||||
|
* Discover all `gsb*.bin` GSP firmware files when generating CDI specification.
|
||||||
|
* Align `.deb` and `.rpm` release candidate package versions
|
||||||
|
* Remove `fedora35` packaging targets
|
||||||
|
* [libnvidia-container] Include all `gsp*.bin` firmware files if present
|
||||||
|
* [libnvidia-container] Align `.deb` and `.rpm` release candidate package versions
|
||||||
|
* [libnvidia-container] Remove `fedora35` packaging targets
|
||||||
|
* [toolkit-container] Install `nvidia-container-toolkit-operator-extensions` package for mode-specific executables.
|
||||||
|
* [toolkit-container] Allow `nvidia-container-runtime.mode` to be set when configuring the NVIDIA Container Toolkit
|
||||||
|
|
||||||
|
## v1.12.0
|
||||||
|
|
||||||
|
* Promote `v1.12.0-rc.5` to `v1.12.0`
|
||||||
|
* Rename `nvidia cdi generate` `--root` flag to `--driver-root` to better indicate intent
|
||||||
|
* [libnvidia-container] Add nvcubins.bin to DriverStore components under WSL2
|
||||||
|
* [toolkit-container] Bump CUDA base images to 12.0.1
|
||||||
|
|
||||||
|
## v1.12.0-rc.5
|
||||||
|
|
||||||
|
* Fix bug here the `nvidia-ctk` path was not properly resolved. This causes failures to run containers when the runtime is configured in `csv` mode or if the `NVIDIA_DRIVER_CAPABILITIES` includes `graphics` or `display` (e.g. `all`).
|
||||||
|
|
||||||
|
## v1.12.0-rc.4
|
||||||
|
|
||||||
|
* Generate a minimum CDI spec version for improved compatibility.
|
||||||
|
* Add `--device-name-strategy` options to the `nvidia-ctk cdi generate` command that can be used to control how device names are constructed.
|
||||||
|
* Set default for CDI device name generation to `index` to generate device names such as `nvidia.com/gpu=0` or `nvidia.com/gpu=1:0` by default.
|
||||||
|
|
||||||
|
## v1.12.0-rc.3
|
||||||
|
|
||||||
|
* Don't fail if by-path symlinks for DRM devices do not exist
|
||||||
|
* Replace the --json flag with a --format [json|yaml] flag for the nvidia-ctk cdi generate command
|
||||||
|
* Ensure that the CDI output folder is created if required
|
||||||
|
* When generating a CDI specification use a blank host path for devices to ensure compatibility with the v0.4.0 CDI specification
|
||||||
|
* Add injection of Wayland JSON files
|
||||||
|
* Add GSP firmware paths to generated CDI specification
|
||||||
|
* Add --root flag to nvidia-ctk cdi generate command
|
||||||
|
|
||||||
|
## v1.12.0-rc.2
|
||||||
|
|
||||||
|
* Inject Direct Rendering Manager (DRM) devices into a container using the NVIDIA Container Runtime
|
||||||
|
* Improve logging of errors from the NVIDIA Container Runtime
|
||||||
|
* Improve CDI specification generation to support rootless podman
|
||||||
|
* Use `nvidia-ctk cdi generate` to generate CDI specifications instead of `nvidia-ctk info generate-cdi`
|
||||||
|
* [libnvidia-container] Skip creation of existing files when these are already mounted
|
||||||
|
|
||||||
|
## v1.12.0-rc.1
|
||||||
|
|
||||||
|
* Add support for multiple Docker Swarm resources
|
||||||
|
* Improve injection of Vulkan configurations and libraries
|
||||||
|
* Add `nvidia-ctk info generate-cdi` command to generated CDI specification for available devices
|
||||||
|
* [libnvidia-container] Include NVVM compiler library in compute libs
|
||||||
|
|
||||||
|
## v1.11.0
|
||||||
|
|
||||||
|
* Promote v1.11.0-rc.3 to v1.11.0
|
||||||
|
|
||||||
|
## v1.11.0-rc.3
|
||||||
|
|
||||||
|
* Build fedora35 packages
|
||||||
|
* Introduce an `nvidia-container-toolkit-base` package for better dependency management
|
||||||
|
* Fix removal of `nvidia-container-runtime-hook` on RPM-based systems
|
||||||
|
* Inject platform files into container on Tegra-based systems
|
||||||
|
* [toolkit container] Update CUDA base images to 11.7.1
|
||||||
|
* [libnvidia-container] Preload libgcc_s.so.1 on arm64 systems
|
||||||
|
|
||||||
|
## v1.11.0-rc.2
|
||||||
|
|
||||||
|
* Allow `accept-nvidia-visible-devices-*` config options to be set by toolkit container
|
||||||
|
* [libnvidia-container] Fix bug where LDCache was not updated when the `--no-pivot-root` option was specified
|
||||||
|
|
||||||
|
## v1.11.0-rc.1
|
||||||
|
|
||||||
|
* Add discovery of GPUDirect Storage (`nvidia-fs*`) devices if the `NVIDIA_GDS` environment variable of the container is set to `enabled`
|
||||||
|
* Add discovery of MOFED Infiniband devices if the `NVIDIA_MOFED` environment variable of the container is set to `enabled`
|
||||||
|
* Fix bug in CSV mode where libraries listed as `sym` entries in mount specification are not added to the LDCache.
|
||||||
|
* Rename `nvidia-container-toolkit` executable to `nvidia-container-runtime-hook` and create `nvidia-container-toolkit` as a symlink to `nvidia-container-runtime-hook` instead.
|
||||||
|
* Add `nvidia-ctk runtime configure` command to configure the Docker config file (e.g. `/etc/docker/daemon.json`) for use with the NVIDIA Container Runtime.
|
||||||
|
|
||||||
|
## v1.10.0
|
||||||
|
|
||||||
|
* Promote v1.10.0-rc.3 to v1.10.0
|
||||||
|
|
||||||
## v1.10.0-rc.3
|
## v1.10.0-rc.3
|
||||||
|
|
||||||
* Use default config instead of raising an error if config file cannot be found
|
* Use default config instead of raising an error if config file cannot be found
|
||||||
|
|||||||
@@ -19,7 +19,7 @@ where `TARGET` is a make target that is valid for each of the sub-components.
|
|||||||
|
|
||||||
These include:
|
These include:
|
||||||
* `ubuntu18.04-amd64`
|
* `ubuntu18.04-amd64`
|
||||||
* `centos8-x86_64`
|
* `centos7-x86_64`
|
||||||
|
|
||||||
If no `TARGET` is specified, all valid release targets are built.
|
If no `TARGET` is specified, all valid release targets are built.
|
||||||
|
|
||||||
@@ -34,7 +34,7 @@ environment variables.
|
|||||||
|
|
||||||
## Testing packages locally
|
## Testing packages locally
|
||||||
|
|
||||||
The [test/release](./test/release/) folder contains documentation on how the installation of local or staged packages can be tested.
|
The [tests/release](./tests/release/) folder contains documentation on how the installation of local or staged packages can be tested.
|
||||||
|
|
||||||
|
|
||||||
## Releasing
|
## Releasing
|
||||||
|
|||||||
142
Jenkinsfile
vendored
142
Jenkinsfile
vendored
@@ -1,142 +0,0 @@
|
|||||||
/*
|
|
||||||
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
podTemplate (cloud:'sw-gpu-cloudnative',
|
|
||||||
containers: [
|
|
||||||
containerTemplate(name: 'docker', image: 'docker:dind', ttyEnabled: true, privileged: true),
|
|
||||||
containerTemplate(name: 'golang', image: 'golang:1.16.3', ttyEnabled: true)
|
|
||||||
]) {
|
|
||||||
node(POD_LABEL) {
|
|
||||||
def scmInfo
|
|
||||||
|
|
||||||
stage('checkout') {
|
|
||||||
scmInfo = checkout(scm)
|
|
||||||
}
|
|
||||||
|
|
||||||
stage('dependencies') {
|
|
||||||
container('golang') {
|
|
||||||
sh 'GO111MODULE=off go get -u github.com/client9/misspell/cmd/misspell'
|
|
||||||
sh 'GO111MODULE=off go get -u github.com/gordonklaus/ineffassign'
|
|
||||||
sh 'GO111MODULE=off go get -u golang.org/x/lint/golint'
|
|
||||||
}
|
|
||||||
container('docker') {
|
|
||||||
sh 'apk add --no-cache make bash git'
|
|
||||||
}
|
|
||||||
}
|
|
||||||
stage('check') {
|
|
||||||
parallel (
|
|
||||||
getGolangStages(["assert-fmt", "lint", "vet", "ineffassign", "misspell"])
|
|
||||||
)
|
|
||||||
}
|
|
||||||
stage('test') {
|
|
||||||
parallel (
|
|
||||||
getGolangStages(["test"])
|
|
||||||
)
|
|
||||||
}
|
|
||||||
|
|
||||||
def versionInfo
|
|
||||||
stage('version') {
|
|
||||||
container('docker') {
|
|
||||||
versionInfo = getVersionInfo(scmInfo)
|
|
||||||
println "versionInfo=${versionInfo}"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def dist = 'ubuntu20.04'
|
|
||||||
def arch = 'amd64'
|
|
||||||
def stageLabel = "${dist}-${arch}"
|
|
||||||
|
|
||||||
stage('build-one') {
|
|
||||||
container('docker') {
|
|
||||||
stage (stageLabel) {
|
|
||||||
sh "make ${dist}-${arch}"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
stage('release') {
|
|
||||||
container('docker') {
|
|
||||||
stage (stageLabel) {
|
|
||||||
|
|
||||||
def component = 'main'
|
|
||||||
def repository = 'sw-gpu-cloudnative-debian-local/pool/main/'
|
|
||||||
|
|
||||||
def uploadSpec = """{
|
|
||||||
"files":
|
|
||||||
[ {
|
|
||||||
"pattern": "./dist/${dist}/${arch}/*.deb",
|
|
||||||
"target": "${repository}",
|
|
||||||
"props": "deb.distribution=${dist};deb.component=${component};deb.architecture=${arch}"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}"""
|
|
||||||
|
|
||||||
sh "echo starting release with versionInfo=${versionInfo}"
|
|
||||||
if (versionInfo.isTag) {
|
|
||||||
// upload to artifactory repository
|
|
||||||
def server = Artifactory.server 'sw-gpu-artifactory'
|
|
||||||
server.upload spec: uploadSpec
|
|
||||||
} else {
|
|
||||||
sh "echo skipping release for non-tagged build"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def getGolangStages(def targets) {
|
|
||||||
stages = [:]
|
|
||||||
|
|
||||||
for (t in targets) {
|
|
||||||
stages[t] = getLintClosure(t)
|
|
||||||
}
|
|
||||||
|
|
||||||
return stages
|
|
||||||
}
|
|
||||||
|
|
||||||
def getLintClosure(def target) {
|
|
||||||
return {
|
|
||||||
container('golang') {
|
|
||||||
stage(target) {
|
|
||||||
sh "make ${target}"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// getVersionInfo returns a hash of version info
|
|
||||||
def getVersionInfo(def scmInfo) {
|
|
||||||
def versionInfo = [
|
|
||||||
isTag: isTag(scmInfo.GIT_BRANCH)
|
|
||||||
]
|
|
||||||
|
|
||||||
scmInfo.each { k, v -> versionInfo[k] = v }
|
|
||||||
return versionInfo
|
|
||||||
}
|
|
||||||
|
|
||||||
def isTag(def branch) {
|
|
||||||
if (!branch.startsWith('v')) {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
def version = shOutput('git describe --all --exact-match --always')
|
|
||||||
return version == "tags/${branch}"
|
|
||||||
}
|
|
||||||
|
|
||||||
def shOuptut(def script) {
|
|
||||||
return sh(script: script, returnStdout: true).trim()
|
|
||||||
}
|
|
||||||
116
Makefile
116
Makefile
@@ -38,8 +38,8 @@ EXAMPLE_TARGETS := $(patsubst %,example-%, $(EXAMPLES))
|
|||||||
CMDS := $(patsubst ./cmd/%/,%,$(sort $(dir $(wildcard ./cmd/*/))))
|
CMDS := $(patsubst ./cmd/%/,%,$(sort $(dir $(wildcard ./cmd/*/))))
|
||||||
CMD_TARGETS := $(patsubst %,cmd-%, $(CMDS))
|
CMD_TARGETS := $(patsubst %,cmd-%, $(CMDS))
|
||||||
|
|
||||||
CHECK_TARGETS := assert-fmt vet lint ineffassign misspell
|
CHECK_TARGETS := lint
|
||||||
MAKE_TARGETS := binaries build check fmt lint-internal test examples cmds coverage generate $(CHECK_TARGETS)
|
MAKE_TARGETS := binaries build check fmt test examples cmds coverage generate licenses vendor check-vendor $(CHECK_TARGETS)
|
||||||
|
|
||||||
TARGETS := $(MAKE_TARGETS) $(EXAMPLE_TARGETS) $(CMD_TARGETS)
|
TARGETS := $(MAKE_TARGETS) $(EXAMPLE_TARGETS) $(CMD_TARGETS)
|
||||||
|
|
||||||
@@ -51,23 +51,28 @@ CLI_VERSION = $(LIB_VERSION)$(if $(LIB_TAG),-$(LIB_TAG))
|
|||||||
else
|
else
|
||||||
CLI_VERSION = $(VERSION)
|
CLI_VERSION = $(VERSION)
|
||||||
endif
|
endif
|
||||||
|
CLI_VERSION_PACKAGE = github.com/NVIDIA/nvidia-container-toolkit/internal/info
|
||||||
GOOS ?= linux
|
|
||||||
|
|
||||||
binaries: cmds
|
binaries: cmds
|
||||||
ifneq ($(PREFIX),)
|
ifneq ($(PREFIX),)
|
||||||
cmd-%: COMMAND_BUILD_OPTIONS = -o $(PREFIX)/$(*)
|
cmd-%: COMMAND_BUILD_OPTIONS = -o $(PREFIX)/$(*)
|
||||||
endif
|
endif
|
||||||
cmds: $(CMD_TARGETS)
|
cmds: $(CMD_TARGETS)
|
||||||
|
|
||||||
|
ifneq ($(shell uname),Darwin)
|
||||||
|
EXTLDFLAGS = -Wl,--export-dynamic -Wl,--unresolved-symbols=ignore-in-object-files -Wl,-z,lazy
|
||||||
|
else
|
||||||
|
EXTLDFLAGS = -Wl,-undefined,dynamic_lookup
|
||||||
|
endif
|
||||||
$(CMD_TARGETS): cmd-%:
|
$(CMD_TARGETS): cmd-%:
|
||||||
GOOS=$(GOOS) go build -ldflags "-s -w -X github.com/NVIDIA/nvidia-container-toolkit/internal/info.gitCommit=$(GIT_COMMIT) -X github.com/NVIDIA/nvidia-container-toolkit/internal/info.version=$(CLI_VERSION)" $(COMMAND_BUILD_OPTIONS) $(MODULE)/cmd/$(*)
|
go build -ldflags "-s -w '-extldflags=$(EXTLDFLAGS)' -X $(CLI_VERSION_PACKAGE).gitCommit=$(GIT_COMMIT) -X $(CLI_VERSION_PACKAGE).version=$(CLI_VERSION)" $(COMMAND_BUILD_OPTIONS) $(MODULE)/cmd/$(*)
|
||||||
|
|
||||||
build:
|
build:
|
||||||
GOOS=$(GOOS) go build ./...
|
go build ./...
|
||||||
|
|
||||||
examples: $(EXAMPLE_TARGETS)
|
examples: $(EXAMPLE_TARGETS)
|
||||||
$(EXAMPLE_TARGETS): example-%:
|
$(EXAMPLE_TARGETS): example-%:
|
||||||
GOOS=$(GOOS) go build ./examples/$(*)
|
go build ./examples/$(*)
|
||||||
|
|
||||||
all: check test build binary
|
all: check test build binary
|
||||||
check: $(CHECK_TARGETS)
|
check: $(CHECK_TARGETS)
|
||||||
@@ -77,34 +82,47 @@ fmt:
|
|||||||
go list -f '{{.Dir}}' $(MODULE)/... \
|
go list -f '{{.Dir}}' $(MODULE)/... \
|
||||||
| xargs gofmt -s -l -w
|
| xargs gofmt -s -l -w
|
||||||
|
|
||||||
assert-fmt:
|
# Apply goimports -local github.com/NVIDIA/container-toolkit to the codebase
|
||||||
go list -f '{{.Dir}}' $(MODULE)/... \
|
goimports:
|
||||||
| xargs gofmt -s -l > fmt.out
|
go list -f {{.Dir}} $(MODULE)/... \
|
||||||
@if [ -s fmt.out ]; then \
|
| xargs goimports -local $(MODULE) -w
|
||||||
echo "\nERROR: The following files are not formatted:\n"; \
|
|
||||||
cat fmt.out; \
|
|
||||||
rm fmt.out; \
|
|
||||||
exit 1; \
|
|
||||||
else \
|
|
||||||
rm fmt.out; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
ineffassign:
|
|
||||||
ineffassign $(MODULE)/...
|
|
||||||
|
|
||||||
lint:
|
lint:
|
||||||
# We use `go list -f '{{.Dir}}' $(MODULE)/...` to skip the `vendor` folder.
|
golangci-lint run ./...
|
||||||
go list -f '{{.Dir}}' $(MODULE)/... | xargs golint -set_exit_status
|
|
||||||
|
|
||||||
misspell:
|
vendor: | mod-tidy mod-vendor mod-verify
|
||||||
misspell $(MODULE)/...
|
|
||||||
|
|
||||||
vet:
|
mod-tidy:
|
||||||
go vet $(MODULE)/...
|
@for mod in $$(find . -name go.mod -not -path "./testdata/*" -not -path "./third_party/*"); do \
|
||||||
|
echo "Tidying $$mod..."; ( \
|
||||||
|
cd $$(dirname $$mod) && go mod tidy \
|
||||||
|
) || exit 1; \
|
||||||
|
done
|
||||||
|
|
||||||
|
mod-vendor:
|
||||||
|
@for mod in $$(find . -name go.mod -not -path "./testdata/*" -not -path "./third_party/*" -not -path "./deployments/*"); do \
|
||||||
|
echo "Vendoring $$mod..."; ( \
|
||||||
|
cd $$(dirname $$mod) && go mod vendor \
|
||||||
|
) || exit 1; \
|
||||||
|
done
|
||||||
|
|
||||||
|
mod-verify:
|
||||||
|
@for mod in $$(find . -name go.mod -not -path "./testdata/*" -not -path "./third_party/*"); do \
|
||||||
|
echo "Verifying $$mod..."; ( \
|
||||||
|
cd $$(dirname $$mod) && go mod verify | sed 's/^/ /g' \
|
||||||
|
) || exit 1; \
|
||||||
|
done
|
||||||
|
|
||||||
|
|
||||||
|
check-vendor: vendor
|
||||||
|
git diff --exit-code HEAD -- go.mod go.sum vendor
|
||||||
|
|
||||||
|
licenses:
|
||||||
|
go-licenses csv $(MODULE)/...
|
||||||
|
|
||||||
COVERAGE_FILE := coverage.out
|
COVERAGE_FILE := coverage.out
|
||||||
test: build cmds
|
test: build cmds
|
||||||
go test -v -coverprofile=$(COVERAGE_FILE) $(MODULE)/...
|
go test -coverprofile=$(COVERAGE_FILE) $(MODULE)/...
|
||||||
|
|
||||||
coverage: test
|
coverage: test
|
||||||
cat $(COVERAGE_FILE) | grep -v "_mock.go" > $(COVERAGE_FILE).no-mocks
|
cat $(COVERAGE_FILE) | grep -v "_mock.go" > $(COVERAGE_FILE).no-mocks
|
||||||
@@ -115,30 +133,24 @@ generate:
|
|||||||
|
|
||||||
# Generate an image for containerized builds
|
# Generate an image for containerized builds
|
||||||
# Note: This image is local only
|
# Note: This image is local only
|
||||||
.PHONY: .build-image .pull-build-image .push-build-image
|
.PHONY: .build-image
|
||||||
.build-image: docker/Dockerfile.devel
|
.build-image:
|
||||||
if [ x"$(SKIP_IMAGE_BUILD)" = x"" ]; then \
|
make -f deployments/devel/Makefile .build-image
|
||||||
$(DOCKER) build \
|
|
||||||
--progress=plain \
|
|
||||||
--build-arg GOLANG_VERSION="$(GOLANG_VERSION)" \
|
|
||||||
--tag $(BUILDIMAGE) \
|
|
||||||
-f $(^) \
|
|
||||||
docker; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
.pull-build-image:
|
ifeq ($(BUILD_DEVEL_IMAGE),yes)
|
||||||
$(DOCKER) pull $(BUILDIMAGE)
|
$(DOCKER_TARGETS): .build-image
|
||||||
|
.shell: .build-image
|
||||||
|
endif
|
||||||
|
|
||||||
.push-build-image:
|
$(DOCKER_TARGETS): docker-%:
|
||||||
$(DOCKER) push $(BUILDIMAGE)
|
@echo "Running 'make $(*)' in container image $(BUILDIMAGE)"
|
||||||
|
|
||||||
$(DOCKER_TARGETS): docker-%: .build-image
|
|
||||||
@echo "Running 'make $(*)' in docker container $(BUILDIMAGE)"
|
|
||||||
$(DOCKER) run \
|
$(DOCKER) run \
|
||||||
--rm \
|
--rm \
|
||||||
-e GOCACHE=/tmp/.cache \
|
-e GOCACHE=/tmp/.cache/go \
|
||||||
-v $(PWD):$(PWD) \
|
-e GOMODCACHE=/tmp/.cache/gomod \
|
||||||
-w $(PWD) \
|
-e GOLANGCI_LINT_CACHE=/tmp/.cache/golangci-lint \
|
||||||
|
-v $(PWD):/work \
|
||||||
|
-w /work \
|
||||||
--user $$(id -u):$$(id -g) \
|
--user $$(id -u):$$(id -g) \
|
||||||
$(BUILDIMAGE) \
|
$(BUILDIMAGE) \
|
||||||
make $(*)
|
make $(*)
|
||||||
@@ -149,8 +161,10 @@ PHONY: .shell
|
|||||||
$(DOCKER) run \
|
$(DOCKER) run \
|
||||||
--rm \
|
--rm \
|
||||||
-ti \
|
-ti \
|
||||||
-e GOCACHE=/tmp/.cache \
|
-e GOCACHE=/tmp/.cache/go \
|
||||||
-v $(PWD):$(PWD) \
|
-e GOMODCACHE=/tmp/.cache/gomod \
|
||||||
-w $(PWD) \
|
-e GOLANGCI_LINT_CACHE=/tmp/.cache/golangci-lint \
|
||||||
|
-v $(PWD):/work \
|
||||||
|
-w /work \
|
||||||
--user $$(id -u):$$(id -g) \
|
--user $$(id -u):$$(id -g) \
|
||||||
$(BUILDIMAGE)
|
$(BUILDIMAGE)
|
||||||
|
|||||||
36
RELEASE.md
Normal file
36
RELEASE.md
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
# Release Process
|
||||||
|
|
||||||
|
The NVIDIA Container Toolkit consists of the following artifacts:
|
||||||
|
- The NVIDIA Container Toolkit container
|
||||||
|
- Packages for debian-based systems
|
||||||
|
- Packages for rpm-based systems
|
||||||
|
|
||||||
|
# Release Process Checklist:
|
||||||
|
- [ ] Create a release PR:
|
||||||
|
- [ ] Run the `./hack/prepare-release.sh` script to update the version in all the needed files. This also creates a [release issue](https://github.com/NVIDIA/cloud-native-team/issues?q=is%3Aissue+is%3Aopen+label%3Arelease)
|
||||||
|
- [ ] Run the `./hack/generate-changelog.sh` script to generate the a draft changelog and update `CHANGELOG.md` with the changes.
|
||||||
|
- [ ] Create a PR from the created `bump-release-{{ .VERSION }}` branch.
|
||||||
|
- [ ] Merge the release PR
|
||||||
|
- [ ] Tag the release and push the tag to the `internal` mirror:
|
||||||
|
- [ ] Image release pipeline: https://gitlab-master.nvidia.com/dl/container-dev/container-toolkit/-/pipelines/16466098
|
||||||
|
- [ ] Wait for the image release to complete.
|
||||||
|
- [ ] Push the tag to the the upstream GitHub repo.
|
||||||
|
- [ ] Wait for the [`Release`](https://github.com/NVIDIA/k8s-device-plugin/actions/workflows/release.yaml) GitHub Action to complete
|
||||||
|
- [ ] Publish the [draft release](https://github.com/NVIDIA/k8s-device-plugin/releases) created by the GitHub Action
|
||||||
|
- [ ] Publish the packages to the gh-pages branch of the libnvidia-container repo
|
||||||
|
- [ ] Create a KitPick
|
||||||
|
|
||||||
|
## Troubleshooting
|
||||||
|
|
||||||
|
*Note*: This assumes that we have the release tag checked out locally.
|
||||||
|
|
||||||
|
- If the `Release` GitHub Action fails:
|
||||||
|
- Check the logs for the error first.
|
||||||
|
- Create the helm packages locally by running:
|
||||||
|
```bash
|
||||||
|
./hack/prepare-artifacts.sh {{ .VERSION }}
|
||||||
|
```
|
||||||
|
- Create the draft release by running:
|
||||||
|
```bash
|
||||||
|
./hack/create-release.sh {{ .VERSION }}
|
||||||
|
```
|
||||||
@@ -1,97 +0,0 @@
|
|||||||
# Copyright (c) 2019-2021, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
ARG BASE_DIST
|
|
||||||
ARG CUDA_VERSION
|
|
||||||
ARG GOLANG_VERSION=x.x.x
|
|
||||||
ARG VERSION="N/A"
|
|
||||||
|
|
||||||
# NOTE: In cases where the libc version is a concern, we would have to use an
|
|
||||||
# image based on the target OS to build the golang executables here -- especially
|
|
||||||
# if cgo code is included.
|
|
||||||
FROM golang:${GOLANG_VERSION} as build
|
|
||||||
|
|
||||||
# We override the GOPATH to ensure that the binaries are installed to
|
|
||||||
# /artifacts/bin
|
|
||||||
ARG GOPATH=/artifacts
|
|
||||||
|
|
||||||
# Install the experiemental nvidia-container-runtime
|
|
||||||
# NOTE: This will be integrated into the nvidia-container-toolkit package / repo
|
|
||||||
ARG NVIDIA_CONTAINER_RUNTIME_EXPERIMENTAL_VERSION=experimental
|
|
||||||
RUN GOPATH=/artifacts go install github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-container-runtime.experimental@${NVIDIA_CONTAINER_RUNTIME_EXPERIMENTAL_VERSION}
|
|
||||||
|
|
||||||
WORKDIR /build
|
|
||||||
COPY . .
|
|
||||||
|
|
||||||
# NOTE: Until the config utilities are properly integrated into the
|
|
||||||
# nvidia-container-toolkit repository, these are built from the `tools` folder
|
|
||||||
# and not `cmd`.
|
|
||||||
RUN GOPATH=/artifacts go install -ldflags="-s -w -X 'main.Version=${VERSION}'" ./tools/...
|
|
||||||
|
|
||||||
|
|
||||||
FROM nvidia/cuda:${CUDA_VERSION}-base-${BASE_DIST}
|
|
||||||
|
|
||||||
ARG BASE_DIST
|
|
||||||
# See https://www.centos.org/centos-linux-eol/
|
|
||||||
# and https://stackoverflow.com/a/70930049 for move to vault.centos.org
|
|
||||||
# and https://serverfault.com/questions/1093922/failing-to-run-yum-update-in-centos-8 for move to vault.epel.cloud
|
|
||||||
RUN [[ "${BASE_DIST}" != "centos8" ]] || \
|
|
||||||
( \
|
|
||||||
sed -i 's/mirrorlist/#mirrorlist/g' /etc/yum.repos.d/CentOS-Linux-* && \
|
|
||||||
sed -i 's|#baseurl=http://mirror.centos.org|baseurl=http://vault.epel.cloud|g' /etc/yum.repos.d/CentOS-Linux-* \
|
|
||||||
)
|
|
||||||
|
|
||||||
ENV NVIDIA_DISABLE_REQUIRE="true"
|
|
||||||
ENV NVIDIA_VISIBLE_DEVICES=all
|
|
||||||
ENV NVIDIA_DRIVER_CAPABILITIES=utility
|
|
||||||
|
|
||||||
ARG ARTIFACTS_ROOT
|
|
||||||
ARG PACKAGE_DIST
|
|
||||||
COPY ${ARTIFACTS_ROOT}/${PACKAGE_DIST} /artifacts/packages/${PACKAGE_DIST}
|
|
||||||
|
|
||||||
WORKDIR /artifacts/packages
|
|
||||||
|
|
||||||
ARG PACKAGE_VERSION
|
|
||||||
ARG TARGETARCH
|
|
||||||
ENV PACKAGE_ARCH ${TARGETARCH}
|
|
||||||
RUN PACKAGE_ARCH=${PACKAGE_ARCH/amd64/x86_64} && PACKAGE_ARCH=${PACKAGE_ARCH/arm64/aarch64} && \
|
|
||||||
yum localinstall -y \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container1-${PACKAGE_VERSION}*.rpm \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container-tools-${PACKAGE_VERSION}*.rpm \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/nvidia-container-toolkit-${PACKAGE_VERSION}*.rpm
|
|
||||||
|
|
||||||
WORKDIR /work
|
|
||||||
|
|
||||||
COPY --from=build /artifacts/bin /work
|
|
||||||
|
|
||||||
ENV PATH=/work:$PATH
|
|
||||||
|
|
||||||
LABEL io.k8s.display-name="NVIDIA Container Runtime Config"
|
|
||||||
LABEL name="NVIDIA Container Runtime Config"
|
|
||||||
LABEL vendor="NVIDIA"
|
|
||||||
LABEL version="${VERSION}"
|
|
||||||
LABEL release="N/A"
|
|
||||||
LABEL summary="Automatically Configure your Container Runtime for GPU support."
|
|
||||||
LABEL description="See summary"
|
|
||||||
|
|
||||||
COPY ./LICENSE /licenses/LICENSE
|
|
||||||
|
|
||||||
# Install / upgrade packages here that are required to resolve CVEs
|
|
||||||
ARG CVE_UPDATES
|
|
||||||
RUN if [ -n "${CVE_UPDATES}" ]; then \
|
|
||||||
yum update -y ${CVE_UPDATES} && \
|
|
||||||
rm -rf /var/cache/yum/*; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
ENTRYPOINT ["/work/nvidia-toolkit"]
|
|
||||||
@@ -1,105 +0,0 @@
|
|||||||
# Copyright (c) 2019-2021, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
ARG BASE_DIST
|
|
||||||
ARG CUDA_VERSION
|
|
||||||
ARG GOLANG_VERSION=x.x.x
|
|
||||||
ARG VERSION="N/A"
|
|
||||||
|
|
||||||
# NOTE: In cases where the libc version is a concern, we would have to use an
|
|
||||||
# image based on the target OS to build the golang executables here -- especially
|
|
||||||
# if cgo code is included.
|
|
||||||
FROM golang:${GOLANG_VERSION} as build
|
|
||||||
|
|
||||||
# We override the GOPATH to ensure that the binaries are installed to
|
|
||||||
# /artifacts/bin
|
|
||||||
ARG GOPATH=/artifacts
|
|
||||||
|
|
||||||
# Install the experiemental nvidia-container-runtime
|
|
||||||
# NOTE: This will be integrated into the nvidia-container-toolkit package / repo
|
|
||||||
ARG NVIDIA_CONTAINER_RUNTIME_EXPERIMENTAL_VERSION=experimental
|
|
||||||
RUN GOPATH=/artifacts go install github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-container-runtime.experimental@${NVIDIA_CONTAINER_RUNTIME_EXPERIMENTAL_VERSION}
|
|
||||||
|
|
||||||
WORKDIR /build
|
|
||||||
COPY . .
|
|
||||||
|
|
||||||
# NOTE: Until the config utilities are properly integrated into the
|
|
||||||
# nvidia-container-toolkit repository, these are built from the `tools` folder
|
|
||||||
# and not `cmd`.
|
|
||||||
RUN GOPATH=/artifacts go install -ldflags="-s -w -X 'main.Version=${VERSION}'" ./tools/...
|
|
||||||
|
|
||||||
|
|
||||||
FROM nvcr.io/nvidia/cuda:${CUDA_VERSION}-base-${BASE_DIST}
|
|
||||||
|
|
||||||
# Remove the CUDA repository configurations to avoid issues with rotated GPG keys
|
|
||||||
RUN rm -f /etc/apt/sources.list.d/cuda.list
|
|
||||||
|
|
||||||
ARG DEBIAN_FRONTEND=noninteractive
|
|
||||||
RUN apt-get update && apt-get install -y --no-install-recommends \
|
|
||||||
libcap2 \
|
|
||||||
curl \
|
|
||||||
&& \
|
|
||||||
rm -rf /var/lib/apt/lists/*
|
|
||||||
|
|
||||||
ENV NVIDIA_DISABLE_REQUIRE="true"
|
|
||||||
ENV NVIDIA_VISIBLE_DEVICES=all
|
|
||||||
ENV NVIDIA_DRIVER_CAPABILITIES=utility
|
|
||||||
|
|
||||||
ARG ARTIFACTS_ROOT
|
|
||||||
ARG PACKAGE_DIST
|
|
||||||
COPY ${ARTIFACTS_ROOT}/${PACKAGE_DIST} /artifacts/packages/${PACKAGE_DIST}
|
|
||||||
|
|
||||||
WORKDIR /artifacts/packages
|
|
||||||
|
|
||||||
ARG PACKAGE_VERSION
|
|
||||||
ARG TARGETARCH
|
|
||||||
ENV PACKAGE_ARCH ${TARGETARCH}
|
|
||||||
|
|
||||||
ARG LIBNVIDIA_CONTAINER_REPO="https://nvidia.github.io/libnvidia-container"
|
|
||||||
ARG LIBNVIDIA_CONTAINER0_VERSION
|
|
||||||
RUN if [ "${PACKAGE_ARCH}" = "arm64" ]; then \
|
|
||||||
curl -L ${LIBNVIDIA_CONTAINER_REPO}/${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container0_${LIBNVIDIA_CONTAINER0_VERSION}_${PACKAGE_ARCH}.deb \
|
|
||||||
--output ${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container0_${LIBNVIDIA_CONTAINER0_VERSION}_${PACKAGE_ARCH}.deb && \
|
|
||||||
dpkg -i ${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container0_${LIBNVIDIA_CONTAINER0_VERSION}_${PACKAGE_ARCH}.deb; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
RUN dpkg -i \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container1_${PACKAGE_VERSION}*.deb \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container-tools_${PACKAGE_VERSION}*.deb \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/nvidia-container-toolkit_${PACKAGE_VERSION}*.deb
|
|
||||||
|
|
||||||
WORKDIR /work
|
|
||||||
|
|
||||||
COPY --from=build /artifacts/bin /work/
|
|
||||||
|
|
||||||
ENV PATH=/work:$PATH
|
|
||||||
|
|
||||||
LABEL io.k8s.display-name="NVIDIA Container Runtime Config"
|
|
||||||
LABEL name="NVIDIA Container Runtime Config"
|
|
||||||
LABEL vendor="NVIDIA"
|
|
||||||
LABEL version="${VERSION}"
|
|
||||||
LABEL release="N/A"
|
|
||||||
LABEL summary="Automatically Configure your Container Runtime for GPU support."
|
|
||||||
LABEL description="See summary"
|
|
||||||
|
|
||||||
COPY ./LICENSE /licenses/LICENSE
|
|
||||||
|
|
||||||
# Install / upgrade packages here that are required to resolve CVEs
|
|
||||||
ARG CVE_UPDATES
|
|
||||||
RUN if [ -n "${CVE_UPDATES}" ]; then \
|
|
||||||
apt-get update && apt-get upgrade -y ${CVE_UPDATES} && \
|
|
||||||
rm -rf /var/lib/apt/lists/*; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
ENTRYPOINT ["/work/nvidia-toolkit"]
|
|
||||||
31
cmd/nvidia-cdi-hook/README.md
Normal file
31
cmd/nvidia-cdi-hook/README.md
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
# NVIDIA CDI Hook
|
||||||
|
|
||||||
|
The CLI `nvidia-cdi-hook` provides container device runtime hook capabilities when
|
||||||
|
called by a container runtime, as specific in a
|
||||||
|
[Container Device Interface](https://tags.cncf.io/container-device-interface/blob/main/SPEC.md)
|
||||||
|
file.
|
||||||
|
|
||||||
|
## Generating a CDI
|
||||||
|
|
||||||
|
The CDI itself is created for an NVIDIA-capable device using the
|
||||||
|
[`nvidia-ctk cdi generate`](../nvidia-ctk/) command.
|
||||||
|
|
||||||
|
When `nvidia-ctk cdi generate` is run, the CDI specification is generated as a yaml file.
|
||||||
|
The CDI specification provides instructions for a container runtime to set up devices, files and
|
||||||
|
other resources for the container prior to starting it. Those instructions
|
||||||
|
may include executing command-line tools to prepare the filesystem. The execution
|
||||||
|
of such command-line tools is called a hook.
|
||||||
|
|
||||||
|
`nvidia-cdi-hook` is the CLI tool that is expected to be called by the container runtime,
|
||||||
|
when specified by the CDI file.
|
||||||
|
|
||||||
|
See the [`nvidia-ctk` documentation](../nvidia-ctk/README.md) for more information
|
||||||
|
on generating a CDI file.
|
||||||
|
|
||||||
|
## Functionality
|
||||||
|
|
||||||
|
The `nvidia-cdi-hook` CLI provides the following functionality:
|
||||||
|
|
||||||
|
* `chmod` - Change the permissions of a file or directory inside the directory path to be mounted into a container.
|
||||||
|
* `create-symlinks` - Create symlinks inside the directory path to be mounted into a container.
|
||||||
|
* `update-ldcache` - Update the dynamic linker cache inside the directory path to be mounted into a container.
|
||||||
160
cmd/nvidia-cdi-hook/chmod/chmod.go
Normal file
160
cmd/nvidia-cdi-hook/chmod/chmod.go
Normal file
@@ -0,0 +1,160 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package chmod
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io/fs"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type config struct {
|
||||||
|
paths cli.StringSlice
|
||||||
|
modeStr string
|
||||||
|
mode fs.FileMode
|
||||||
|
containerSpec string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a chmod command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build the chmod command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
cfg := config{}
|
||||||
|
|
||||||
|
// Create the 'chmod' command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "chmod",
|
||||||
|
Usage: "Set the permissions of folders in the container by running chmod. The container root is prefixed to the specified paths.",
|
||||||
|
Before: func(c *cli.Context) error {
|
||||||
|
return validateFlags(c, &cfg)
|
||||||
|
},
|
||||||
|
Action: func(c *cli.Context) error {
|
||||||
|
return m.run(c, &cfg)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "path",
|
||||||
|
Usage: "Specify a path to apply the specified mode to",
|
||||||
|
Destination: &cfg.paths,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "mode",
|
||||||
|
Usage: "Specify the file mode",
|
||||||
|
Destination: &cfg.modeStr,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "container-spec",
|
||||||
|
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN",
|
||||||
|
Destination: &cfg.containerSpec,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func validateFlags(c *cli.Context, cfg *config) error {
|
||||||
|
if strings.TrimSpace(cfg.modeStr) == "" {
|
||||||
|
return fmt.Errorf("a non-empty mode must be specified")
|
||||||
|
}
|
||||||
|
|
||||||
|
modeInt, err := strconv.ParseUint(cfg.modeStr, 8, 32)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to parse mode as octal: %v", err)
|
||||||
|
}
|
||||||
|
cfg.mode = fs.FileMode(modeInt)
|
||||||
|
|
||||||
|
for _, p := range cfg.paths.Value() {
|
||||||
|
if strings.TrimSpace(p) == "" {
|
||||||
|
return fmt.Errorf("paths must not be empty")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(c *cli.Context, cfg *config) error {
|
||||||
|
s, err := oci.LoadContainerState(cfg.containerSpec)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to load container state: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerRoot, err := s.GetContainerRoot()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to determined container root: %v", err)
|
||||||
|
}
|
||||||
|
if containerRoot == "" {
|
||||||
|
return fmt.Errorf("empty container root detected")
|
||||||
|
}
|
||||||
|
|
||||||
|
paths := m.getPaths(containerRoot, cfg.paths.Value(), cfg.mode)
|
||||||
|
if len(paths) == 0 {
|
||||||
|
m.logger.Debugf("No paths specified; exiting")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, path := range paths {
|
||||||
|
err = os.Chmod(path, cfg.mode)
|
||||||
|
// in some cases this is not an issue (e.g. whole /dev mounted), see #143
|
||||||
|
if errors.Is(err, fs.ErrPermission) {
|
||||||
|
m.logger.Debugf("Ignoring permission error with chmod: %v", err)
|
||||||
|
err = nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// getPaths updates the specified paths relative to the root.
|
||||||
|
func (m command) getPaths(root string, paths []string, desiredMode fs.FileMode) []string {
|
||||||
|
var pathsInRoot []string
|
||||||
|
for _, f := range paths {
|
||||||
|
path := filepath.Join(root, f)
|
||||||
|
stat, err := os.Stat(path)
|
||||||
|
if err != nil {
|
||||||
|
m.logger.Debugf("Skipping path %q: %v", path, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if (stat.Mode()&(fs.ModePerm|fs.ModeSetuid|fs.ModeSetgid|fs.ModeSticky))^desiredMode == 0 {
|
||||||
|
m.logger.Debugf("Skipping path %q: already desired mode", path)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
pathsInRoot = append(pathsInRoot, path)
|
||||||
|
}
|
||||||
|
|
||||||
|
return pathsInRoot
|
||||||
|
}
|
||||||
38
cmd/nvidia-cdi-hook/commands/commands.go
Normal file
38
cmd/nvidia-cdi-hook/commands/commands.go
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package commands
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/chmod"
|
||||||
|
symlinks "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/create-symlinks"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/cudacompat"
|
||||||
|
ldcache "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/update-ldcache"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
// New creates the commands associated with supported CDI hooks.
|
||||||
|
// These are shared by the nvidia-cdi-hook and nvidia-ctk hook commands.
|
||||||
|
func New(logger logger.Interface) []*cli.Command {
|
||||||
|
return []*cli.Command{
|
||||||
|
ldcache.NewCommand(logger),
|
||||||
|
symlinks.NewCommand(logger),
|
||||||
|
chmod.NewCommand(logger),
|
||||||
|
cudacompat.NewCommand(logger),
|
||||||
|
}
|
||||||
|
}
|
||||||
172
cmd/nvidia-cdi-hook/create-symlinks/create-symlinks.go
Normal file
172
cmd/nvidia-cdi-hook/create-symlinks/create-symlinks.go
Normal file
@@ -0,0 +1,172 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package symlinks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/moby/sys/symlink"
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup/symlinks"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type config struct {
|
||||||
|
links cli.StringSlice
|
||||||
|
containerSpec string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a hook command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build creates the create-symlink command.
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
cfg := config{}
|
||||||
|
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "create-symlinks",
|
||||||
|
Usage: "A hook to create symlinks in the container.",
|
||||||
|
Action: func(c *cli.Context) error {
|
||||||
|
return m.run(c, &cfg)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "link",
|
||||||
|
Usage: "Specify a specific link to create. The link is specified as target::link. If the link exists in the container root, it is removed.",
|
||||||
|
Destination: &cfg.links,
|
||||||
|
},
|
||||||
|
// The following flags are testing-only flags.
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "container-spec",
|
||||||
|
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN. This is only intended for testing.",
|
||||||
|
Destination: &cfg.containerSpec,
|
||||||
|
Hidden: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(c *cli.Context, cfg *config) error {
|
||||||
|
s, err := oci.LoadContainerState(cfg.containerSpec)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to load container state: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerRoot, err := s.GetContainerRoot()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to determined container root: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
created := make(map[string]bool)
|
||||||
|
for _, l := range cfg.links.Value() {
|
||||||
|
if created[l] {
|
||||||
|
m.logger.Debugf("Link %v already processed", l)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
parts := strings.Split(l, "::")
|
||||||
|
if len(parts) != 2 {
|
||||||
|
return fmt.Errorf("invalid symlink specification %v", l)
|
||||||
|
}
|
||||||
|
|
||||||
|
err := m.createLink(containerRoot, parts[0], parts[1])
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create link %v: %w", parts, err)
|
||||||
|
}
|
||||||
|
created[l] = true
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// createLink creates a symbolic link in the specified container root.
|
||||||
|
// This is equivalent to:
|
||||||
|
//
|
||||||
|
// chroot {{ .containerRoot }} ln -f -s {{ .target }} {{ .link }}
|
||||||
|
//
|
||||||
|
// If the specified link already exists and points to the same target, this
|
||||||
|
// operation is a no-op.
|
||||||
|
// If a file exists at the link path or the link points to a different target
|
||||||
|
// this file is removed before creating the link.
|
||||||
|
//
|
||||||
|
// Note that if the link path resolves to an absolute path oudside of the
|
||||||
|
// specified root, this is treated as an absolute path in this root.
|
||||||
|
func (m command) createLink(containerRoot string, targetPath string, link string) error {
|
||||||
|
linkPath := filepath.Join(containerRoot, link)
|
||||||
|
|
||||||
|
exists, err := linkExists(targetPath, linkPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to check if link exists: %w", err)
|
||||||
|
}
|
||||||
|
if exists {
|
||||||
|
m.logger.Debugf("Link %s already exists", linkPath)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// We resolve the parent of the symlink that we're creating in the container root.
|
||||||
|
// If we resolve the full link path, an existing link at the location itself
|
||||||
|
// is also resolved here and we are unable to force create the link.
|
||||||
|
resolvedLinkParent, err := symlink.FollowSymlinkInScope(filepath.Dir(linkPath), containerRoot)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to follow path for link %v relative to %v: %w", link, containerRoot, err)
|
||||||
|
}
|
||||||
|
resolvedLinkPath := filepath.Join(resolvedLinkParent, filepath.Base(linkPath))
|
||||||
|
|
||||||
|
m.logger.Infof("Symlinking %v to %v", resolvedLinkPath, targetPath)
|
||||||
|
err = os.MkdirAll(filepath.Dir(resolvedLinkPath), 0755)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create directory: %v", err)
|
||||||
|
}
|
||||||
|
err = symlinks.ForceCreate(targetPath, resolvedLinkPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create symlink: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// linkExists checks whether the specified link exists.
|
||||||
|
// A link exists if the path exists, is a symlink, and points to the specified target.
|
||||||
|
func linkExists(target string, link string) (bool, error) {
|
||||||
|
currentTarget, err := symlinks.Resolve(link)
|
||||||
|
if errors.Is(err, os.ErrNotExist) {
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return false, fmt.Errorf("failed to resolve existing symlink %s: %w", link, err)
|
||||||
|
}
|
||||||
|
if currentTarget == target {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
297
cmd/nvidia-cdi-hook/create-symlinks/create-symlinks_test.go
Normal file
297
cmd/nvidia-cdi-hook/create-symlinks/create-symlinks_test.go
Normal file
@@ -0,0 +1,297 @@
|
|||||||
|
package symlinks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup/symlinks"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestLinkExist(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
require.NoError(
|
||||||
|
t,
|
||||||
|
makeFs(tmpDir,
|
||||||
|
dirOrLink{path: "/a/b/c", target: "d"},
|
||||||
|
dirOrLink{path: "/a/b/e", target: "/a/b/f"},
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
exists, err := linkExists("d", filepath.Join(tmpDir, "/a/b/c"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.True(t, exists)
|
||||||
|
|
||||||
|
exists, err = linkExists("/a/b/f", filepath.Join(tmpDir, "/a/b/e"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.True(t, exists)
|
||||||
|
|
||||||
|
exists, err = linkExists("different-target", filepath.Join(tmpDir, "/a/b/c"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.False(t, exists)
|
||||||
|
|
||||||
|
exists, err = linkExists("/a/b/d", filepath.Join(tmpDir, "/a/b/c"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.False(t, exists)
|
||||||
|
|
||||||
|
exists, err = linkExists("foo", filepath.Join(tmpDir, "/a/b/does-not-exist"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.False(t, exists)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCreateLink(t *testing.T) {
|
||||||
|
type link struct {
|
||||||
|
path string
|
||||||
|
target string
|
||||||
|
}
|
||||||
|
type expectedLink struct {
|
||||||
|
link
|
||||||
|
err error
|
||||||
|
}
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
containerContents []dirOrLink
|
||||||
|
link link
|
||||||
|
expectedCreateError error
|
||||||
|
expectedLinks []expectedLink
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "link to / resolves to container root",
|
||||||
|
containerContents: []dirOrLink{
|
||||||
|
{path: "/lib/foo", target: "/"},
|
||||||
|
},
|
||||||
|
link: link{
|
||||||
|
path: "/lib/foo/libfoo.so",
|
||||||
|
target: "libfoo.so.1",
|
||||||
|
},
|
||||||
|
expectedLinks: []expectedLink{
|
||||||
|
{
|
||||||
|
link: link{
|
||||||
|
path: "{{ .containerRoot }}/libfoo.so",
|
||||||
|
target: "libfoo.so.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "link to / resolves to container root; parent relative link",
|
||||||
|
containerContents: []dirOrLink{
|
||||||
|
{path: "/lib/foo", target: "/"},
|
||||||
|
},
|
||||||
|
link: link{
|
||||||
|
path: "/lib/foo/libfoo.so",
|
||||||
|
target: "../libfoo.so.1",
|
||||||
|
},
|
||||||
|
expectedLinks: []expectedLink{
|
||||||
|
{
|
||||||
|
link: link{
|
||||||
|
path: "{{ .containerRoot }}/libfoo.so",
|
||||||
|
target: "../libfoo.so.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "link to / resolves to container root; absolute link",
|
||||||
|
containerContents: []dirOrLink{
|
||||||
|
{path: "/lib/foo", target: "/"},
|
||||||
|
},
|
||||||
|
link: link{
|
||||||
|
path: "/lib/foo/libfoo.so",
|
||||||
|
target: "/a-path-in-container/foo/libfoo.so.1",
|
||||||
|
},
|
||||||
|
expectedLinks: []expectedLink{
|
||||||
|
{
|
||||||
|
link: link{
|
||||||
|
path: "{{ .containerRoot }}/libfoo.so",
|
||||||
|
target: "/a-path-in-container/foo/libfoo.so.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// We also check that the target is NOT created.
|
||||||
|
link: link{
|
||||||
|
path: "{{ .containerRoot }}/a-path-in-container/foo/libfoo.so.1",
|
||||||
|
},
|
||||||
|
err: os.ErrNotExist,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
hostRoot := filepath.Join(tmpDir, "/host-root/")
|
||||||
|
containerRoot := filepath.Join(tmpDir, "/container-root")
|
||||||
|
|
||||||
|
require.NoError(t, makeFs(hostRoot))
|
||||||
|
require.NoError(t, makeFs(containerRoot, tc.containerContents...))
|
||||||
|
|
||||||
|
// nvidia-cdi-hook create-symlinks --link linkSpec
|
||||||
|
err := getTestCommand().createLink(containerRoot, tc.link.target, tc.link.path)
|
||||||
|
// TODO: We may be able to replace this with require.ErrorIs.
|
||||||
|
if tc.expectedCreateError != nil {
|
||||||
|
require.Error(t, err)
|
||||||
|
} else {
|
||||||
|
require.NoError(t, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, expectedLink := range tc.expectedLinks {
|
||||||
|
path := strings.ReplaceAll(expectedLink.path, "{{ .containerRoot }}", containerRoot)
|
||||||
|
path = strings.ReplaceAll(path, "{{ .hostRoot }}", hostRoot)
|
||||||
|
if expectedLink.target != "" {
|
||||||
|
target, err := symlinks.Resolve(path)
|
||||||
|
require.ErrorIs(t, err, expectedLink.err)
|
||||||
|
require.Equal(t, expectedLink.target, target)
|
||||||
|
} else {
|
||||||
|
_, err := os.Stat(path)
|
||||||
|
require.ErrorIs(t, err, expectedLink.err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCreateLinkRelativePath(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
hostRoot := filepath.Join(tmpDir, "/host-root/")
|
||||||
|
containerRoot := filepath.Join(tmpDir, "/container-root")
|
||||||
|
|
||||||
|
require.NoError(t, makeFs(hostRoot))
|
||||||
|
require.NoError(t, makeFs(containerRoot, dirOrLink{path: "/lib/"}))
|
||||||
|
|
||||||
|
// nvidia-cdi-hook create-symlinks --link libfoo.so.1::/lib/libfoo.so
|
||||||
|
err := getTestCommand().createLink(containerRoot, "libfoo.so.1", "/lib/libfoo.so")
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
target, err := symlinks.Resolve(filepath.Join(containerRoot, "/lib/libfoo.so"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, "libfoo.so.1", target)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCreateLinkAbsolutePath(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
hostRoot := filepath.Join(tmpDir, "/host-root/")
|
||||||
|
containerRoot := filepath.Join(tmpDir, "/container-root")
|
||||||
|
|
||||||
|
require.NoError(t, makeFs(hostRoot))
|
||||||
|
require.NoError(t, makeFs(containerRoot, dirOrLink{path: "/lib/"}))
|
||||||
|
|
||||||
|
// nvidia-cdi-hook create-symlinks --link /lib/libfoo.so.1::/lib/libfoo.so
|
||||||
|
err := getTestCommand().createLink(containerRoot, "/lib/libfoo.so.1", "/lib/libfoo.so")
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
target, err := symlinks.Resolve(filepath.Join(containerRoot, "/lib/libfoo.so"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, "/lib/libfoo.so.1", target)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCreateLinkAlreadyExists(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
containerContents []dirOrLink
|
||||||
|
shouldExist []string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "link already exists with correct target",
|
||||||
|
containerContents: []dirOrLink{{path: "/lib/libfoo.so", target: "libfoo.so.1"}},
|
||||||
|
shouldExist: []string{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "link already exists with different target",
|
||||||
|
containerContents: []dirOrLink{{path: "/lib/libfoo.so", target: "different-target"}, {path: "different-target"}},
|
||||||
|
shouldExist: []string{"{{ .containerRoot }}/different-target"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
hostRoot := filepath.Join(tmpDir, "/host-root/")
|
||||||
|
containerRoot := filepath.Join(tmpDir, "/container-root")
|
||||||
|
require.NoError(t, makeFs(hostRoot))
|
||||||
|
require.NoError(t, makeFs(containerRoot, tc.containerContents...))
|
||||||
|
|
||||||
|
// nvidia-cdi-hook create-symlinks --link libfoo.so.1::/lib/libfoo.so
|
||||||
|
err := getTestCommand().createLink(containerRoot, "libfoo.so.1", "/lib/libfoo.so")
|
||||||
|
require.NoError(t, err)
|
||||||
|
target, err := symlinks.Resolve(filepath.Join(containerRoot, "lib/libfoo.so"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, "libfoo.so.1", target)
|
||||||
|
|
||||||
|
for _, p := range tc.shouldExist {
|
||||||
|
require.DirExists(t, strings.ReplaceAll(p, "{{ .containerRoot }}", containerRoot))
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCreateLinkOutOfBounds(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
hostRoot := filepath.Join(tmpDir, "/host-root")
|
||||||
|
containerRoot := filepath.Join(tmpDir, "/container-root")
|
||||||
|
|
||||||
|
require.NoError(t,
|
||||||
|
makeFs(hostRoot,
|
||||||
|
dirOrLink{path: "libfoo.so"},
|
||||||
|
),
|
||||||
|
)
|
||||||
|
require.NoError(t,
|
||||||
|
makeFs(containerRoot,
|
||||||
|
dirOrLink{path: "/lib"},
|
||||||
|
dirOrLink{path: "/lib/foo", target: hostRoot},
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
path, err := symlinks.Resolve(filepath.Join(containerRoot, "/lib/foo"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, hostRoot, path)
|
||||||
|
|
||||||
|
// nvidia-cdi-hook create-symlinks --link ../libfoo.so.1::/lib/foo/libfoo.so
|
||||||
|
_ = getTestCommand().createLink(containerRoot, "../libfoo.so.1", "/lib/foo/libfoo.so")
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
target, err := symlinks.Resolve(filepath.Join(containerRoot, hostRoot, "libfoo.so"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, "../libfoo.so.1", target)
|
||||||
|
|
||||||
|
require.DirExists(t, filepath.Join(hostRoot, "libfoo.so"))
|
||||||
|
}
|
||||||
|
|
||||||
|
type dirOrLink struct {
|
||||||
|
path string
|
||||||
|
target string
|
||||||
|
}
|
||||||
|
|
||||||
|
func makeFs(tmpdir string, fs ...dirOrLink) error {
|
||||||
|
if err := os.MkdirAll(tmpdir, 0o755); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
for _, s := range fs {
|
||||||
|
s.path = filepath.Join(tmpdir, s.path)
|
||||||
|
if s.target == "" {
|
||||||
|
_ = os.MkdirAll(s.path, 0o755)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err := os.MkdirAll(filepath.Dir(s.path), 0o755); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := os.Symlink(s.target, s.path); err != nil && !os.IsExist(err) {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// getTestCommand creates a command for running tests against.
|
||||||
|
func getTestCommand() *command {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
return &command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
}
|
||||||
76
cmd/nvidia-cdi-hook/cudacompat/container-root.go
Normal file
76
cmd/nvidia-cdi-hook/cudacompat/container-root.go
Normal file
@@ -0,0 +1,76 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package cudacompat
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/moby/sys/symlink"
|
||||||
|
)
|
||||||
|
|
||||||
|
// A containerRoot represents the root filesystem of a container.
|
||||||
|
type containerRoot string
|
||||||
|
|
||||||
|
// hasPath checks whether the specified path exists in the root.
|
||||||
|
func (r containerRoot) hasPath(path string) bool {
|
||||||
|
resolved, err := r.resolve(path)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if _, err := os.Stat(resolved); err != nil && os.IsNotExist(err) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// globFiles matches the specified pattern in the root.
|
||||||
|
// The files that match must be regular files.
|
||||||
|
func (r containerRoot) globFiles(pattern string) ([]string, error) {
|
||||||
|
patternPath, err := r.resolve(pattern)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
matches, err := filepath.Glob(patternPath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
var files []string
|
||||||
|
for _, match := range matches {
|
||||||
|
info, err := os.Lstat(match)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
// Ignore symlinks.
|
||||||
|
if info.Mode()&os.ModeSymlink != 0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
// Ignore directories.
|
||||||
|
if info.IsDir() {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
files = append(files, match)
|
||||||
|
}
|
||||||
|
return files, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// resolve returns the absolute path including root path.
|
||||||
|
// Symlinks are resolved, but are guaranteed to resolve in the root.
|
||||||
|
func (r containerRoot) resolve(path string) (string, error) {
|
||||||
|
absolute := filepath.Clean(filepath.Join(string(r), path))
|
||||||
|
return symlink.FollowSymlinkInScope(absolute, string(r))
|
||||||
|
}
|
||||||
221
cmd/nvidia-cdi-hook/cudacompat/cudacompat.go
Normal file
221
cmd/nvidia-cdi-hook/cudacompat/cudacompat.go
Normal file
@@ -0,0 +1,221 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package cudacompat
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
cudaCompatPath = "/usr/local/cuda/compat"
|
||||||
|
// cudaCompatLdsoconfdFilenamePattern specifies the pattern for the filename
|
||||||
|
// in ld.so.conf.d that includes a reference to the CUDA compat path.
|
||||||
|
// The 00-compat prefix is chosen to ensure that these libraries have a
|
||||||
|
// higher precedence than other libraries on the system.
|
||||||
|
cudaCompatLdsoconfdFilenamePattern = "00-compat-*.conf"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type options struct {
|
||||||
|
hostDriverVersion string
|
||||||
|
containerSpec string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a cuda-compat command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build the enable-cuda-compat command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
cfg := options{}
|
||||||
|
|
||||||
|
// Create the 'enable-cuda-compat' command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "enable-cuda-compat",
|
||||||
|
Usage: "This hook ensures that the folder containing the CUDA compat libraries is added to the ldconfig search path if required.",
|
||||||
|
Before: func(c *cli.Context) error {
|
||||||
|
return m.validateFlags(c, &cfg)
|
||||||
|
},
|
||||||
|
Action: func(c *cli.Context) error {
|
||||||
|
return m.run(c, &cfg)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "host-driver-version",
|
||||||
|
Usage: "Specify the host driver version. If the CUDA compat libraries detected in the container do not have a higher MAJOR version, the hook is a no-op.",
|
||||||
|
Destination: &cfg.hostDriverVersion,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "container-spec",
|
||||||
|
Hidden: true,
|
||||||
|
Category: "testing-only",
|
||||||
|
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN",
|
||||||
|
Destination: &cfg.containerSpec,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(_ *cli.Context, cfg *options) error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(_ *cli.Context, cfg *options) error {
|
||||||
|
if cfg.hostDriverVersion == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
s, err := oci.LoadContainerState(cfg.containerSpec)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to load container state: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerRootDir, err := s.GetContainerRoot()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to determined container root: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerForwardCompatDir, err := m.getContainerForwardCompatDir(containerRoot(containerRootDir), cfg.hostDriverVersion)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to get container forward compat directory: %w", err)
|
||||||
|
}
|
||||||
|
if containerForwardCompatDir == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return m.createLdsoconfdFile(containerRoot(containerRootDir), cudaCompatLdsoconfdFilenamePattern, containerForwardCompatDir)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) getContainerForwardCompatDir(containerRoot containerRoot, hostDriverVersion string) (string, error) {
|
||||||
|
if hostDriverVersion == "" {
|
||||||
|
m.logger.Debugf("Host driver version not specified")
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
if !containerRoot.hasPath(cudaCompatPath) {
|
||||||
|
m.logger.Debugf("No CUDA forward compatibility libraries directory in container")
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
if !containerRoot.hasPath("/etc/ld.so.cache") {
|
||||||
|
m.logger.Debugf("The container does not have an LDCache")
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
libs, err := containerRoot.globFiles(filepath.Join(cudaCompatPath, "libcuda.so.*.*"))
|
||||||
|
if err != nil {
|
||||||
|
m.logger.Warningf("Failed to find CUDA compat library: %w", err)
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(libs) == 0 {
|
||||||
|
m.logger.Debugf("No CUDA forward compatibility libraries container")
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(libs) != 1 {
|
||||||
|
m.logger.Warningf("Unexpected number of CUDA compat libraries in container: %v", libs)
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
compatDriverVersion := strings.TrimPrefix(filepath.Base(libs[0]), "libcuda.so.")
|
||||||
|
compatMajor, err := extractMajorVersion(compatDriverVersion)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("failed to extract major version from %q: %v", compatDriverVersion, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
driverMajor, err := extractMajorVersion(hostDriverVersion)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("failed to extract major version from %q: %v", hostDriverVersion, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if driverMajor >= compatMajor {
|
||||||
|
m.logger.Debugf("Compat major version is not greater than the host driver major version (%v >= %v)", hostDriverVersion, compatDriverVersion)
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
resolvedCompatDir := strings.TrimPrefix(filepath.Dir(libs[0]), string(containerRoot))
|
||||||
|
return resolvedCompatDir, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// createLdsoconfdFile creates a file at /etc/ld.so.conf.d/ in the specified root.
|
||||||
|
// The file is created at /etc/ld.so.conf.d/{{ .pattern }} using `CreateTemp` and
|
||||||
|
// contains the specified directories on each line.
|
||||||
|
func (m command) createLdsoconfdFile(in containerRoot, pattern string, dirs ...string) error {
|
||||||
|
if len(dirs) == 0 {
|
||||||
|
m.logger.Debugf("No directories to add to /etc/ld.so.conf")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
ldsoconfdDir, err := in.resolve("/etc/ld.so.conf.d")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := os.MkdirAll(ldsoconfdDir, 0755); err != nil {
|
||||||
|
return fmt.Errorf("failed to create ld.so.conf.d: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
configFile, err := os.CreateTemp(ldsoconfdDir, pattern)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create config file: %w", err)
|
||||||
|
}
|
||||||
|
defer configFile.Close()
|
||||||
|
|
||||||
|
m.logger.Debugf("Adding directories %v to %v", dirs, configFile.Name())
|
||||||
|
|
||||||
|
added := make(map[string]bool)
|
||||||
|
for _, dir := range dirs {
|
||||||
|
if added[dir] {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
_, err = configFile.WriteString(fmt.Sprintf("%s\n", dir))
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to update config file: %w", err)
|
||||||
|
}
|
||||||
|
added[dir] = true
|
||||||
|
}
|
||||||
|
|
||||||
|
// The created file needs to be world readable for the cases where the container is run as a non-root user.
|
||||||
|
if err := configFile.Chmod(0644); err != nil {
|
||||||
|
return fmt.Errorf("failed to chmod config file: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// extractMajorVersion parses a version string and returns the major version as an int.
|
||||||
|
func extractMajorVersion(version string) (int, error) {
|
||||||
|
majorString := strings.SplitN(version, ".", 2)[0]
|
||||||
|
return strconv.Atoi(majorString)
|
||||||
|
}
|
||||||
182
cmd/nvidia-cdi-hook/cudacompat/cudacompat_test.go
Normal file
182
cmd/nvidia-cdi-hook/cudacompat/cudacompat_test.go
Normal file
@@ -0,0 +1,182 @@
|
|||||||
|
/*
|
||||||
|
# Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package cudacompat
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestCompatLibs(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
contents map[string]string
|
||||||
|
hostDriverVersion string
|
||||||
|
expectedContainerForwardCompatDir string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "empty root",
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "compat lib is newer; no ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.333.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "compat lib is newer; ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.333.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "/usr/local/cuda/compat",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "compat lib is older; ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.111.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "compat lib has same major version; ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.222.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "numeric comparison is used; ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.222.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "99.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "/usr/local/cuda/compat",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "driver version empty; ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.222.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "symlinks are followed",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/etc/alternatives/cuda/compat/libcuda.so.333.88.99": "",
|
||||||
|
"/usr/local/cuda": "symlink=/etc/alternatives/cuda",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "/etc/alternatives/cuda/compat",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "symlinks stay in container",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/compat/libcuda.so.333.88.99": "",
|
||||||
|
"/usr/local/cuda": "symlink=../../../../../../",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "/compat",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
containerRootDir := t.TempDir()
|
||||||
|
for name, contents := range tc.contents {
|
||||||
|
target := filepath.Join(containerRootDir, name)
|
||||||
|
require.NoError(t, os.MkdirAll(filepath.Dir(target), 0755))
|
||||||
|
|
||||||
|
if strings.HasPrefix(contents, "symlink=") {
|
||||||
|
require.NoError(t, os.Symlink(strings.TrimPrefix(contents, "symlink="), target))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
require.NoError(t, os.WriteFile(target, []byte(contents), 0600))
|
||||||
|
}
|
||||||
|
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
containerForwardCompatDir, err := c.getContainerForwardCompatDir(containerRoot(containerRootDir), tc.hostDriverVersion)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.EqualValues(t, tc.expectedContainerForwardCompatDir, containerForwardCompatDir)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestUpdateLdconfig(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
folders []string
|
||||||
|
expectedContents string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "no folders; have no contents",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "single folder is added",
|
||||||
|
folders: []string{"/usr/local/cuda/compat"},
|
||||||
|
expectedContents: "/usr/local/cuda/compat\n",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
containerRootDir := t.TempDir()
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
err := c.createLdsoconfdFile(containerRoot(containerRootDir), cudaCompatLdsoconfdFilenamePattern, tc.folders...)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
matches, err := filepath.Glob(filepath.Join(containerRootDir, "/etc/ld.so.conf.d/00-compat-*.conf"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
if tc.expectedContents == "" {
|
||||||
|
require.Empty(t, matches)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
require.Len(t, matches, 1)
|
||||||
|
contents, err := os.ReadFile(matches[0])
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.EqualValues(t, tc.expectedContents, string(contents))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
93
cmd/nvidia-cdi-hook/main.go
Normal file
93
cmd/nvidia-cdi-hook/main.go
Normal file
@@ -0,0 +1,93 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2024, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/sirupsen/logrus"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
||||||
|
|
||||||
|
cli "github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/commands"
|
||||||
|
)
|
||||||
|
|
||||||
|
// options defines the options that can be set for the CLI through config files,
|
||||||
|
// environment variables, or command line flags
|
||||||
|
type options struct {
|
||||||
|
// Debug indicates whether the CLI is started in "debug" mode
|
||||||
|
Debug bool
|
||||||
|
// Quiet indicates whether the CLI is started in "quiet" mode
|
||||||
|
Quiet bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
logger := logrus.New()
|
||||||
|
|
||||||
|
// Create a options struct to hold the parsed environment variables or command line flags
|
||||||
|
opts := options{}
|
||||||
|
|
||||||
|
// Create the top-level CLI
|
||||||
|
c := cli.NewApp()
|
||||||
|
c.Name = "NVIDIA CDI Hook"
|
||||||
|
c.UseShortOptionHandling = true
|
||||||
|
c.EnableBashCompletion = true
|
||||||
|
c.Usage = "Command to structure files for usage inside a container, called as hooks from a container runtime, defined in a CDI yaml file"
|
||||||
|
c.Version = info.GetVersionString()
|
||||||
|
|
||||||
|
// Setup the flags for this command
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "debug",
|
||||||
|
Aliases: []string{"d"},
|
||||||
|
Usage: "Enable debug-level logging",
|
||||||
|
Destination: &opts.Debug,
|
||||||
|
EnvVars: []string{"NVIDIA_CDI_DEBUG"},
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "quiet",
|
||||||
|
Usage: "Suppress all output except for errors; overrides --debug",
|
||||||
|
Destination: &opts.Quiet,
|
||||||
|
EnvVars: []string{"NVIDIA_CDI_QUIET"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set log-level for all subcommands
|
||||||
|
c.Before = func(c *cli.Context) error {
|
||||||
|
logLevel := logrus.InfoLevel
|
||||||
|
if opts.Debug {
|
||||||
|
logLevel = logrus.DebugLevel
|
||||||
|
}
|
||||||
|
if opts.Quiet {
|
||||||
|
logLevel = logrus.ErrorLevel
|
||||||
|
}
|
||||||
|
logger.SetLevel(logLevel)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Define the subcommands
|
||||||
|
c.Commands = commands.New(logger)
|
||||||
|
|
||||||
|
// Run the CLI
|
||||||
|
err := c.Run(os.Args)
|
||||||
|
if err != nil {
|
||||||
|
logger.Errorf("%v", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
}
|
||||||
46
cmd/nvidia-cdi-hook/update-ldcache/container-root.go
Normal file
46
cmd/nvidia-cdi-hook/update-ldcache/container-root.go
Normal file
@@ -0,0 +1,46 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package ldcache
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/moby/sys/symlink"
|
||||||
|
)
|
||||||
|
|
||||||
|
// A containerRoot represents the root filesystem of a container.
|
||||||
|
type containerRoot string
|
||||||
|
|
||||||
|
// hasPath checks whether the specified path exists in the root.
|
||||||
|
func (r containerRoot) hasPath(path string) bool {
|
||||||
|
resolved, err := r.resolve(path)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if _, err := os.Stat(resolved); err != nil && os.IsNotExist(err) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// resolve returns the absolute path including root path.
|
||||||
|
// Symlinks are resolved, but are guaranteed to resolve in the root.
|
||||||
|
func (r containerRoot) resolve(path string) (string, error) {
|
||||||
|
absolute := filepath.Clean(filepath.Join(string(r), path))
|
||||||
|
return symlink.FollowSymlinkInScope(absolute, string(r))
|
||||||
|
}
|
||||||
57
cmd/nvidia-cdi-hook/update-ldcache/safe-exec_linux.go
Normal file
57
cmd/nvidia-cdi-hook/update-ldcache/safe-exec_linux.go
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package ldcache
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"strconv"
|
||||||
|
"syscall"
|
||||||
|
|
||||||
|
"github.com/opencontainers/runc/libcontainer/dmz"
|
||||||
|
)
|
||||||
|
|
||||||
|
// SafeExec attempts to clone the specified binary (as an memfd, for example) before executing it.
|
||||||
|
func (m command) SafeExec(path string, args []string, envv []string) error {
|
||||||
|
safeExe, err := cloneBinary(path)
|
||||||
|
if err != nil {
|
||||||
|
m.logger.Warningf("Failed to clone binary %q: %v; falling back to Exec", path, err)
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
|
return syscall.Exec(path, args, envv)
|
||||||
|
}
|
||||||
|
defer safeExe.Close()
|
||||||
|
|
||||||
|
exePath := "/proc/self/fd/" + strconv.Itoa(int(safeExe.Fd()))
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
|
return syscall.Exec(exePath, args, envv)
|
||||||
|
}
|
||||||
|
|
||||||
|
func cloneBinary(path string) (*os.File, error) {
|
||||||
|
exe, err := os.Open(path)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("opening current binary: %w", err)
|
||||||
|
}
|
||||||
|
defer exe.Close()
|
||||||
|
|
||||||
|
stat, err := exe.Stat()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("checking %v size: %w", path, err)
|
||||||
|
}
|
||||||
|
size := stat.Size()
|
||||||
|
|
||||||
|
return dmz.CloneBinary(exe, size, path, os.TempDir())
|
||||||
|
}
|
||||||
29
cmd/nvidia-cdi-hook/update-ldcache/safe-exec_other.go
Normal file
29
cmd/nvidia-cdi-hook/update-ldcache/safe-exec_other.go
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
//go:build !linux
|
||||||
|
// +build !linux
|
||||||
|
|
||||||
|
/**
|
||||||
|
# Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package ldcache
|
||||||
|
|
||||||
|
import "syscall"
|
||||||
|
|
||||||
|
// SafeExec is not implemented on non-linux systems and forwards directly to the
|
||||||
|
// Exec syscall.
|
||||||
|
func (m *command) SafeExec(path string, args []string, envv []string) error {
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
|
return syscall.Exec(path, args, envv)
|
||||||
|
}
|
||||||
198
cmd/nvidia-cdi-hook/update-ldcache/update-ldcache.go
Normal file
198
cmd/nvidia-cdi-hook/update-ldcache/update-ldcache.go
Normal file
@@ -0,0 +1,198 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package ldcache
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
// ldsoconfdFilenamePattern specifies the pattern for the filename
|
||||||
|
// in ld.so.conf.d that includes references to the specified directories.
|
||||||
|
// The 00-nvcr prefix is chosen to ensure that these libraries have a
|
||||||
|
// higher precedence than other libraries on the system, but lower than
|
||||||
|
// the 00-cuda-compat that is included in some containers.
|
||||||
|
ldsoconfdFilenamePattern = "00-nvcr-*.conf"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type options struct {
|
||||||
|
folders cli.StringSlice
|
||||||
|
ldconfigPath string
|
||||||
|
containerSpec string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs an update-ldcache command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build the update-ldcache command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
cfg := options{}
|
||||||
|
|
||||||
|
// Create the 'update-ldcache' command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "update-ldcache",
|
||||||
|
Usage: "Update ldcache in a container by running ldconfig",
|
||||||
|
Before: func(c *cli.Context) error {
|
||||||
|
return m.validateFlags(c, &cfg)
|
||||||
|
},
|
||||||
|
Action: func(c *cli.Context) error {
|
||||||
|
return m.run(c, &cfg)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "folder",
|
||||||
|
Usage: "Specify a folder to add to /etc/ld.so.conf before updating the ld cache",
|
||||||
|
Destination: &cfg.folders,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "ldconfig-path",
|
||||||
|
Usage: "Specify the path to the ldconfig program",
|
||||||
|
Destination: &cfg.ldconfigPath,
|
||||||
|
Value: "/sbin/ldconfig",
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "container-spec",
|
||||||
|
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN",
|
||||||
|
Destination: &cfg.containerSpec,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(c *cli.Context, cfg *options) error {
|
||||||
|
if cfg.ldconfigPath == "" {
|
||||||
|
return errors.New("ldconfig-path must be specified")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(c *cli.Context, cfg *options) error {
|
||||||
|
s, err := oci.LoadContainerState(cfg.containerSpec)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to load container state: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerRootDir, err := s.GetContainerRoot()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to determined container root: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ldconfigPath := m.resolveLDConfigPath(cfg.ldconfigPath)
|
||||||
|
args := []string{filepath.Base(ldconfigPath)}
|
||||||
|
if containerRootDir != "" {
|
||||||
|
args = append(args, "-r", containerRootDir)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerRoot := containerRoot(containerRootDir)
|
||||||
|
|
||||||
|
if containerRoot.hasPath("/etc/ld.so.cache") {
|
||||||
|
args = append(args, "-C", "/etc/ld.so.cache")
|
||||||
|
} else {
|
||||||
|
m.logger.Debugf("No ld.so.cache found, skipping update")
|
||||||
|
args = append(args, "-N")
|
||||||
|
}
|
||||||
|
|
||||||
|
folders := cfg.folders.Value()
|
||||||
|
if containerRoot.hasPath("/etc/ld.so.conf.d") {
|
||||||
|
err := m.createLdsoconfdFile(containerRoot, ldsoconfdFilenamePattern, folders...)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to update ld.so.conf.d: %v", err)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
args = append(args, folders...)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Explicitly specify using /etc/ld.so.conf since the host's ldconfig may
|
||||||
|
// be configured to use a different config file by default.
|
||||||
|
args = append(args, "-f", "/etc/ld.so.conf")
|
||||||
|
|
||||||
|
return m.SafeExec(ldconfigPath, args, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// resolveLDConfigPath determines the LDConfig path to use for the system.
|
||||||
|
// On systems such as Ubuntu where `/sbin/ldconfig` is a wrapper around
|
||||||
|
// /sbin/ldconfig.real, the latter is returned.
|
||||||
|
func (m command) resolveLDConfigPath(path string) string {
|
||||||
|
return strings.TrimPrefix(config.NormalizeLDConfigPath("@"+path), "@")
|
||||||
|
}
|
||||||
|
|
||||||
|
// createLdsoconfdFile creates a file at /etc/ld.so.conf.d/ in the specified root.
|
||||||
|
// The file is created at /etc/ld.so.conf.d/{{ .pattern }} using `CreateTemp` and
|
||||||
|
// contains the specified directories on each line.
|
||||||
|
func (m command) createLdsoconfdFile(in containerRoot, pattern string, dirs ...string) error {
|
||||||
|
if len(dirs) == 0 {
|
||||||
|
m.logger.Debugf("No directories to add to /etc/ld.so.conf")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
ldsoconfdDir, err := in.resolve("/etc/ld.so.conf.d")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := os.MkdirAll(ldsoconfdDir, 0755); err != nil {
|
||||||
|
return fmt.Errorf("failed to create ld.so.conf.d: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
configFile, err := os.CreateTemp(ldsoconfdDir, pattern)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create config file: %w", err)
|
||||||
|
}
|
||||||
|
defer configFile.Close()
|
||||||
|
|
||||||
|
m.logger.Debugf("Adding directories %v to %v", dirs, configFile.Name())
|
||||||
|
|
||||||
|
added := make(map[string]bool)
|
||||||
|
for _, dir := range dirs {
|
||||||
|
if added[dir] {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
_, err = configFile.WriteString(fmt.Sprintf("%s\n", dir))
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to update config file: %w", err)
|
||||||
|
}
|
||||||
|
added[dir] = true
|
||||||
|
}
|
||||||
|
|
||||||
|
// The created file needs to be world readable for the cases where the container is run as a non-root user.
|
||||||
|
if err := configFile.Chmod(0644); err != nil {
|
||||||
|
return fmt.Errorf("failed to chmod config file: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
27
cmd/nvidia-container-runtime-hook/capabilities.go
Normal file
27
cmd/nvidia-container-runtime-hook/capabilities.go
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"log"
|
||||||
|
)
|
||||||
|
|
||||||
|
func capabilityToCLI(cap string) string {
|
||||||
|
switch cap {
|
||||||
|
case "compute":
|
||||||
|
return "--compute"
|
||||||
|
case "compat32":
|
||||||
|
return "--compat32"
|
||||||
|
case "graphics":
|
||||||
|
return "--graphics"
|
||||||
|
case "utility":
|
||||||
|
return "--utility"
|
||||||
|
case "video":
|
||||||
|
return "--video"
|
||||||
|
case "display":
|
||||||
|
return "--display"
|
||||||
|
case "ngx":
|
||||||
|
return "--ngx"
|
||||||
|
default:
|
||||||
|
log.Panicln("unknown driver capability:", cap)
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
@@ -6,47 +6,33 @@ import (
|
|||||||
"log"
|
"log"
|
||||||
"os"
|
"os"
|
||||||
"path"
|
"path"
|
||||||
"path/filepath"
|
|
||||||
"strings"
|
"github.com/opencontainers/runtime-spec/specs-go"
|
||||||
|
"golang.org/x/mod/semver"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/image"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/image"
|
||||||
"golang.org/x/mod/semver"
|
|
||||||
)
|
|
||||||
|
|
||||||
var envSwarmGPU *string
|
|
||||||
|
|
||||||
const (
|
|
||||||
envCUDAVersion = "CUDA_VERSION"
|
|
||||||
envNVRequirePrefix = "NVIDIA_REQUIRE_"
|
|
||||||
envNVRequireCUDA = envNVRequirePrefix + "CUDA"
|
|
||||||
envNVDisableRequire = "NVIDIA_DISABLE_REQUIRE"
|
|
||||||
envNVVisibleDevices = "NVIDIA_VISIBLE_DEVICES"
|
|
||||||
envNVMigConfigDevices = "NVIDIA_MIG_CONFIG_DEVICES"
|
|
||||||
envNVMigMonitorDevices = "NVIDIA_MIG_MONITOR_DEVICES"
|
|
||||||
envNVDriverCapabilities = "NVIDIA_DRIVER_CAPABILITIES"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
capSysAdmin = "CAP_SYS_ADMIN"
|
capSysAdmin = "CAP_SYS_ADMIN"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
|
||||||
deviceListAsVolumeMountsRoot = "/var/run/nvidia-container-devices"
|
|
||||||
)
|
|
||||||
|
|
||||||
type nvidiaConfig struct {
|
type nvidiaConfig struct {
|
||||||
Devices string
|
Devices []string
|
||||||
MigConfigDevices string
|
MigConfigDevices string
|
||||||
MigMonitorDevices string
|
MigMonitorDevices string
|
||||||
|
ImexChannels []string
|
||||||
DriverCapabilities string
|
DriverCapabilities string
|
||||||
Requirements []string
|
// Requirements defines the requirements DSL for the container to run.
|
||||||
DisableRequire bool
|
// This is empty if no specific requirements are needed, or if requirements are
|
||||||
|
// explicitly disabled.
|
||||||
|
Requirements []string
|
||||||
}
|
}
|
||||||
|
|
||||||
type containerConfig struct {
|
type containerConfig struct {
|
||||||
Pid int
|
Pid int
|
||||||
Rootfs string
|
Rootfs string
|
||||||
Env map[string]string
|
Image image.CUDA
|
||||||
Nvidia *nvidiaConfig
|
Nvidia *nvidiaConfig
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -73,23 +59,14 @@ type LinuxCapabilities struct {
|
|||||||
Ambient []string `json:"ambient,omitempty" platform:"linux"`
|
Ambient []string `json:"ambient,omitempty" platform:"linux"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Mount from OCI runtime spec
|
|
||||||
// https://github.com/opencontainers/runtime-spec/blob/v1.0.0/specs-go/config.go#L103
|
|
||||||
type Mount struct {
|
|
||||||
Destination string `json:"destination"`
|
|
||||||
Type string `json:"type,omitempty" platform:"linux,solaris"`
|
|
||||||
Source string `json:"source,omitempty"`
|
|
||||||
Options []string `json:"options,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Spec from OCI runtime spec
|
// Spec from OCI runtime spec
|
||||||
// We use pointers to structs, similarly to the latest version of runtime-spec:
|
// We use pointers to structs, similarly to the latest version of runtime-spec:
|
||||||
// https://github.com/opencontainers/runtime-spec/blob/v1.0.0/specs-go/config.go#L5-L28
|
// https://github.com/opencontainers/runtime-spec/blob/v1.0.0/specs-go/config.go#L5-L28
|
||||||
type Spec struct {
|
type Spec struct {
|
||||||
Version *string `json:"ociVersion"`
|
Version *string `json:"ociVersion"`
|
||||||
Process *Process `json:"process,omitempty"`
|
Process *Process `json:"process,omitempty"`
|
||||||
Root *Root `json:"root,omitempty"`
|
Root *Root `json:"root,omitempty"`
|
||||||
Mounts []Mount `json:"mounts,omitempty"`
|
Mounts []specs.Mount `json:"mounts,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// HookState holds state information about the hook
|
// HookState holds state information about the hook
|
||||||
@@ -132,7 +109,7 @@ func isPrivileged(s *Spec) bool {
|
|||||||
}
|
}
|
||||||
|
|
||||||
var caps []string
|
var caps []string
|
||||||
// If v1.1.0-rc1 <= OCI version < v1.0.0-rc5 parse s.Process.Capabilities as:
|
// If v1.0.0-rc1 <= OCI version < v1.0.0-rc5 parse s.Process.Capabilities as:
|
||||||
// github.com/opencontainers/runtime-spec/blob/v1.0.0-rc1/specs-go/config.go#L30-L54
|
// github.com/opencontainers/runtime-spec/blob/v1.0.0-rc1/specs-go/config.go#L30-L54
|
||||||
rc1cmp := semver.Compare("v"+*s.Version, "v1.0.0-rc1")
|
rc1cmp := semver.Compare("v"+*s.Version, "v1.0.0-rc1")
|
||||||
rc5cmp := semver.Compare("v"+*s.Version, "v1.0.0-rc5")
|
rc5cmp := semver.Compare("v"+*s.Version, "v1.0.0-rc5")
|
||||||
@@ -141,118 +118,57 @@ func isPrivileged(s *Spec) bool {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
log.Panicln("could not decode Process.Capabilities in OCI spec:", err)
|
log.Panicln("could not decode Process.Capabilities in OCI spec:", err)
|
||||||
}
|
}
|
||||||
// Otherwise, parse s.Process.Capabilities as:
|
for _, c := range caps {
|
||||||
// github.com/opencontainers/runtime-spec/blob/v1.0.0/specs-go/config.go#L30-L54
|
if c == capSysAdmin {
|
||||||
} else {
|
return true
|
||||||
var lc LinuxCapabilities
|
}
|
||||||
err := json.Unmarshal(*s.Process.Capabilities, &lc)
|
|
||||||
if err != nil {
|
|
||||||
log.Panicln("could not decode Process.Capabilities in OCI spec:", err)
|
|
||||||
}
|
}
|
||||||
// We only make sure that the bounding capabibility set has
|
return false
|
||||||
// CAP_SYS_ADMIN. This allows us to make sure that the container was
|
|
||||||
// actually started as '--privileged', but also allow non-root users to
|
|
||||||
// access the privileged NVIDIA capabilities.
|
|
||||||
caps = lc.Bounding
|
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, c := range caps {
|
// Otherwise, parse s.Process.Capabilities as:
|
||||||
if c == capSysAdmin {
|
// github.com/opencontainers/runtime-spec/blob/v1.0.0/specs-go/config.go#L30-L54
|
||||||
return true
|
process := specs.Process{
|
||||||
}
|
Env: s.Process.Env,
|
||||||
}
|
}
|
||||||
|
|
||||||
return false
|
err := json.Unmarshal(*s.Process.Capabilities, &process.Capabilities)
|
||||||
|
if err != nil {
|
||||||
|
log.Panicln("could not decode Process.Capabilities in OCI spec:", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
fullSpec := specs.Spec{
|
||||||
|
Version: *s.Version,
|
||||||
|
Process: &process,
|
||||||
|
}
|
||||||
|
|
||||||
|
return image.IsPrivileged(&fullSpec)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getDevicesFromEnvvar(env map[string]string, legacyImage bool) *string {
|
func getDevicesFromEnvvar(containerImage image.CUDA, swarmResourceEnvvars []string) []string {
|
||||||
// Build a list of envvars to consider.
|
// We check if the image has at least one of the Swarm resource envvars defined and use this
|
||||||
envVars := []string{envNVVisibleDevices}
|
// if specified.
|
||||||
if envSwarmGPU != nil {
|
for _, envvar := range swarmResourceEnvvars {
|
||||||
// The Swarm envvar has higher precedence.
|
if containerImage.HasEnvvar(envvar) {
|
||||||
envVars = append([]string{*envSwarmGPU}, envVars...)
|
return containerImage.DevicesFromEnvvars(swarmResourceEnvvars...).List()
|
||||||
}
|
|
||||||
|
|
||||||
// Grab a reference to devices from the first envvar
|
|
||||||
// in the list that actually exists in the environment.
|
|
||||||
var devices *string
|
|
||||||
for _, envVar := range envVars {
|
|
||||||
if devs, ok := env[envVar]; ok {
|
|
||||||
devices = &devs
|
|
||||||
break
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Environment variable unset with legacy image: default to "all".
|
return containerImage.VisibleDevicesFromEnvVar()
|
||||||
if devices == nil && legacyImage {
|
|
||||||
all := "all"
|
|
||||||
return &all
|
|
||||||
}
|
|
||||||
|
|
||||||
// Environment variable unset or empty or "void": return nil
|
|
||||||
if devices == nil || len(*devices) == 0 || *devices == "void" {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// Environment variable set to "none": reset to "".
|
|
||||||
if *devices == "none" {
|
|
||||||
empty := ""
|
|
||||||
return &empty
|
|
||||||
}
|
|
||||||
|
|
||||||
// Any other value.
|
|
||||||
return devices
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func getDevicesFromMounts(mounts []Mount) *string {
|
func (hookConfig *hookConfig) getDevices(image image.CUDA, privileged bool) []string {
|
||||||
var devices []string
|
|
||||||
for _, m := range mounts {
|
|
||||||
root := filepath.Clean(deviceListAsVolumeMountsRoot)
|
|
||||||
source := filepath.Clean(m.Source)
|
|
||||||
destination := filepath.Clean(m.Destination)
|
|
||||||
|
|
||||||
// Only consider mounts who's host volume is /dev/null
|
|
||||||
if source != "/dev/null" {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
// Only consider container mount points that begin with 'root'
|
|
||||||
if len(destination) < len(root) {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
if destination[:len(root)] != root {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
// Grab the full path beyond 'root' and add it to the list of devices
|
|
||||||
device := destination[len(root):]
|
|
||||||
if len(device) > 0 && device[0] == '/' {
|
|
||||||
device = device[1:]
|
|
||||||
}
|
|
||||||
if len(device) == 0 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
devices = append(devices, device)
|
|
||||||
}
|
|
||||||
|
|
||||||
if devices == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
ret := strings.Join(devices, ",")
|
|
||||||
return &ret
|
|
||||||
}
|
|
||||||
|
|
||||||
func getDevices(hookConfig *HookConfig, env map[string]string, mounts []Mount, privileged bool, legacyImage bool) *string {
|
|
||||||
// If enabled, try and get the device list from volume mounts first
|
// If enabled, try and get the device list from volume mounts first
|
||||||
if hookConfig.AcceptDeviceListAsVolumeMounts {
|
if hookConfig.AcceptDeviceListAsVolumeMounts {
|
||||||
devices := getDevicesFromMounts(mounts)
|
devices := image.VisibleDevicesFromMounts()
|
||||||
if devices != nil {
|
if len(devices) > 0 {
|
||||||
return devices
|
return devices
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Fallback to reading from the environment variable if privileges are correct
|
// Fallback to reading from the environment variable if privileges are correct
|
||||||
devices := getDevicesFromEnvvar(env, legacyImage)
|
devices := getDevicesFromEnvvar(image, hookConfig.getSwarmResourceEnvvars())
|
||||||
if devices == nil {
|
if len(devices) == 0 {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
if privileged || hookConfig.AcceptEnvvarUnprivileged {
|
if privileged || hookConfig.AcceptEnvvarUnprivileged {
|
||||||
@@ -265,26 +181,55 @@ func getDevices(hookConfig *HookConfig, env map[string]string, mounts []Mount, p
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func getMigConfigDevices(env map[string]string) *string {
|
func getMigConfigDevices(i image.CUDA) *string {
|
||||||
if devices, ok := env[envNVMigConfigDevices]; ok {
|
return getMigDevices(i, image.EnvVarNvidiaMigConfigDevices)
|
||||||
return &devices
|
}
|
||||||
|
|
||||||
|
func getMigMonitorDevices(i image.CUDA) *string {
|
||||||
|
return getMigDevices(i, image.EnvVarNvidiaMigMonitorDevices)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getMigDevices(image image.CUDA, envvar string) *string {
|
||||||
|
if !image.HasEnvvar(envvar) {
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
devices := image.Getenv(envvar)
|
||||||
|
return &devices
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hookConfig *hookConfig) getImexChannels(image image.CUDA, privileged bool) []string {
|
||||||
|
if hookConfig.Features.IgnoreImexChannelRequests.IsEnabled() {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// If enabled, try and get the device list from volume mounts first
|
||||||
|
if hookConfig.AcceptDeviceListAsVolumeMounts {
|
||||||
|
devices := image.ImexChannelsFromMounts()
|
||||||
|
if len(devices) > 0 {
|
||||||
|
return devices
|
||||||
|
}
|
||||||
|
}
|
||||||
|
devices := image.ImexChannelsFromEnvVar()
|
||||||
|
if len(devices) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if privileged || hookConfig.AcceptEnvvarUnprivileged {
|
||||||
|
return devices
|
||||||
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func getMigMonitorDevices(env map[string]string) *string {
|
func (hookConfig *hookConfig) getDriverCapabilities(cudaImage image.CUDA, legacyImage bool) image.DriverCapabilities {
|
||||||
if devices, ok := env[envNVMigMonitorDevices]; ok {
|
|
||||||
return &devices
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func getDriverCapabilities(env map[string]string, supportedDriverCapabilities DriverCapabilities, legacyImage bool) DriverCapabilities {
|
|
||||||
// We use the default driver capabilities by default. This is filtered to only include the
|
// We use the default driver capabilities by default. This is filtered to only include the
|
||||||
// supported capabilities
|
// supported capabilities
|
||||||
capabilities := supportedDriverCapabilities.Intersection(defaultDriverCapabilities)
|
supportedDriverCapabilities := image.NewDriverCapabilities(hookConfig.SupportedDriverCapabilities)
|
||||||
|
|
||||||
capsEnv, capsEnvSpecified := env[envNVDriverCapabilities]
|
capabilities := supportedDriverCapabilities.Intersection(image.DefaultDriverCapabilities)
|
||||||
|
|
||||||
|
capsEnvSpecified := cudaImage.HasEnvvar(image.EnvVarNvidiaDriverCapabilities)
|
||||||
|
capsEnv := cudaImage.Getenv(image.EnvVarNvidiaDriverCapabilities)
|
||||||
|
|
||||||
if !capsEnvSpecified && legacyImage {
|
if !capsEnvSpecified && legacyImage {
|
||||||
// Environment variable unset with legacy image: set all capabilities.
|
// Environment variable unset with legacy image: set all capabilities.
|
||||||
@@ -293,9 +238,9 @@ func getDriverCapabilities(env map[string]string, supportedDriverCapabilities Dr
|
|||||||
|
|
||||||
if capsEnvSpecified && len(capsEnv) > 0 {
|
if capsEnvSpecified && len(capsEnv) > 0 {
|
||||||
// If the envvironment variable is specified and is non-empty, use the capabilities value
|
// If the envvironment variable is specified and is non-empty, use the capabilities value
|
||||||
envCapabilities := DriverCapabilities(capsEnv)
|
envCapabilities := image.NewDriverCapabilities(capsEnv)
|
||||||
capabilities = supportedDriverCapabilities.Intersection(envCapabilities)
|
capabilities = supportedDriverCapabilities.Intersection(envCapabilities)
|
||||||
if envCapabilities != all && capabilities != envCapabilities {
|
if !envCapabilities.IsAll() && len(capabilities) != len(envCapabilities) {
|
||||||
log.Panicln(fmt.Errorf("unsupported capabilities found in '%v' (allowed '%v')", envCapabilities, capabilities))
|
log.Panicln(fmt.Errorf("unsupported capabilities found in '%v' (allowed '%v')", envCapabilities, capabilities))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -303,14 +248,12 @@ func getDriverCapabilities(env map[string]string, supportedDriverCapabilities Dr
|
|||||||
return capabilities
|
return capabilities
|
||||||
}
|
}
|
||||||
|
|
||||||
func getNvidiaConfig(hookConfig *HookConfig, image image.CUDA, mounts []Mount, privileged bool) *nvidiaConfig {
|
func (hookConfig *hookConfig) getNvidiaConfig(image image.CUDA, privileged bool) *nvidiaConfig {
|
||||||
legacyImage := image.IsLegacy()
|
legacyImage := image.IsLegacy()
|
||||||
|
|
||||||
var devices string
|
devices := hookConfig.getDevices(image, privileged)
|
||||||
if d := getDevices(hookConfig, image, mounts, privileged, legacyImage); d != nil {
|
if len(devices) == 0 {
|
||||||
devices = *d
|
// empty devices means this is not a GPU container.
|
||||||
} else {
|
|
||||||
// 'nil' devices means this is not a GPU container.
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -330,26 +273,26 @@ func getNvidiaConfig(hookConfig *HookConfig, image image.CUDA, mounts []Mount, p
|
|||||||
log.Panicln("cannot set MIG_MONITOR_DEVICES in non privileged container")
|
log.Panicln("cannot set MIG_MONITOR_DEVICES in non privileged container")
|
||||||
}
|
}
|
||||||
|
|
||||||
driverCapabilities := getDriverCapabilities(image, hookConfig.SupportedDriverCapabilities, legacyImage).String()
|
imexChannels := hookConfig.getImexChannels(image, privileged)
|
||||||
|
|
||||||
|
driverCapabilities := hookConfig.getDriverCapabilities(image, legacyImage).String()
|
||||||
|
|
||||||
requirements, err := image.GetRequirements()
|
requirements, err := image.GetRequirements()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Panicln("failed to get requirements", err)
|
log.Panicln("failed to get requirements", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
disableRequire := image.HasDisableRequire()
|
|
||||||
|
|
||||||
return &nvidiaConfig{
|
return &nvidiaConfig{
|
||||||
Devices: devices,
|
Devices: devices,
|
||||||
MigConfigDevices: migConfigDevices,
|
MigConfigDevices: migConfigDevices,
|
||||||
MigMonitorDevices: migMonitorDevices,
|
MigMonitorDevices: migMonitorDevices,
|
||||||
|
ImexChannels: imexChannels,
|
||||||
DriverCapabilities: driverCapabilities,
|
DriverCapabilities: driverCapabilities,
|
||||||
Requirements: requirements,
|
Requirements: requirements,
|
||||||
DisableRequire: disableRequire,
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func getContainerConfig(hook HookConfig) (config containerConfig) {
|
func (hookConfig *hookConfig) getContainerConfig() (config containerConfig) {
|
||||||
var h HookState
|
var h HookState
|
||||||
d := json.NewDecoder(os.Stdin)
|
d := json.NewDecoder(os.Stdin)
|
||||||
if err := d.Decode(&h); err != nil {
|
if err := d.Decode(&h); err != nil {
|
||||||
@@ -363,17 +306,20 @@ func getContainerConfig(hook HookConfig) (config containerConfig) {
|
|||||||
|
|
||||||
s := loadSpec(path.Join(b, "config.json"))
|
s := loadSpec(path.Join(b, "config.json"))
|
||||||
|
|
||||||
image, err := image.NewCUDAImageFromEnv(s.Process.Env)
|
image, err := image.New(
|
||||||
|
image.WithEnv(s.Process.Env),
|
||||||
|
image.WithMounts(s.Mounts),
|
||||||
|
image.WithDisableRequire(hookConfig.DisableRequire),
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Panicln(err)
|
log.Panicln(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
privileged := isPrivileged(s)
|
privileged := isPrivileged(s)
|
||||||
envSwarmGPU = hook.SwarmResource
|
|
||||||
return containerConfig{
|
return containerConfig{
|
||||||
Pid: h.Pid,
|
Pid: h.Pid,
|
||||||
Rootfs: s.Root.Path,
|
Rootfs: s.Root.Path,
|
||||||
Env: image,
|
Image: image,
|
||||||
Nvidia: getNvidiaConfig(&hook, image, s.Mounts, privileged),
|
Nvidia: hookConfig.getNvidiaConfig(image, privileged),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
977
cmd/nvidia-container-runtime-hook/container_config_test.go
Normal file
977
cmd/nvidia-container-runtime-hook/container_config_test.go
Normal file
@@ -0,0 +1,977 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"path/filepath"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/opencontainers/runtime-spec/specs-go"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/image"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestGetNvidiaConfig(t *testing.T) {
|
||||||
|
var tests = []struct {
|
||||||
|
description string
|
||||||
|
env map[string]string
|
||||||
|
privileged bool
|
||||||
|
hookConfig *hookConfig
|
||||||
|
expectedConfig *nvidiaConfig
|
||||||
|
expectedPanic bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "No environment, unprivileged",
|
||||||
|
env: map[string]string{},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "No environment, privileged",
|
||||||
|
env: map[string]string{},
|
||||||
|
privileged: true,
|
||||||
|
expectedConfig: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Legacy image, no devices, no capabilities, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"all"},
|
||||||
|
DriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Legacy image, devices 'all', no capabilities, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"all"},
|
||||||
|
DriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Legacy image, devices 'empty', no capabilities, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Legacy image, devices 'void', no capabilities, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "void",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Legacy image, devices 'none', no capabilities, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "none",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{""},
|
||||||
|
DriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Legacy image, devices set, no capabilities, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Legacy image, devices set, capabilities 'empty', no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Legacy image, devices set, capabilities 'all', no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "all",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Legacy image, devices set, capabilities set, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "video,display",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: "display,video",
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Legacy image, devices set, capabilities set, requirements set",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "video,display",
|
||||||
|
image.NvidiaRequirePrefix + "REQ0": "req0=true",
|
||||||
|
image.NvidiaRequirePrefix + "REQ1": "req1=false",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: "display,video",
|
||||||
|
Requirements: []string{"cuda>=9.0", "req0=true", "req1=false"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Legacy image, devices set, capabilities set, requirements set, disable requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "video,display",
|
||||||
|
image.NvidiaRequirePrefix + "REQ0": "req0=true",
|
||||||
|
image.NvidiaRequirePrefix + "REQ1": "req1=false",
|
||||||
|
image.EnvVarNvidiaDisableRequire: "true",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: "display,video",
|
||||||
|
Requirements: []string{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, no devices, no capabilities, no requirements, no image.EnvVarCudaVersion",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, no devices, no capabilities, no requirement, image.EnvVarCudaVersion set",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "9.0",
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices 'all', no capabilities, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"all"},
|
||||||
|
DriverCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices 'empty', no capabilities, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices 'void', no capabilities, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "void",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices 'none', no capabilities, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "none",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{""},
|
||||||
|
DriverCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices set, no capabilities, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices set, capabilities 'empty', no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices set, capabilities 'all', no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "all",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices set, capabilities set, no requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "video,display",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: "display,video",
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices set, capabilities set, requirements set",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "video,display",
|
||||||
|
image.NvidiaRequirePrefix + "REQ0": "req0=true",
|
||||||
|
image.NvidiaRequirePrefix + "REQ1": "req1=false",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: "display,video",
|
||||||
|
Requirements: []string{"cuda>=9.0", "req0=true", "req1=false"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices set, capabilities set, requirements set, disable requirements",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "gpu0,gpu1",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "video,display",
|
||||||
|
image.NvidiaRequirePrefix + "REQ0": "req0=true",
|
||||||
|
image.NvidiaRequirePrefix + "REQ1": "req1=false",
|
||||||
|
image.EnvVarNvidiaDisableRequire: "true",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"gpu0", "gpu1"},
|
||||||
|
DriverCapabilities: "display,video",
|
||||||
|
Requirements: []string{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "No cuda envs, devices 'all'",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"all"},
|
||||||
|
DriverCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
Requirements: []string{},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices 'all', migConfig set, privileged",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
image.EnvVarNvidiaMigConfigDevices: "mig0,mig1",
|
||||||
|
},
|
||||||
|
privileged: true,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"all"},
|
||||||
|
MigConfigDevices: "mig0,mig1",
|
||||||
|
DriverCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices 'all', migConfig set, unprivileged",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
image.EnvVarNvidiaMigConfigDevices: "mig0,mig1",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedPanic: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices 'all', migMonitor set, privileged",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
image.EnvVarNvidiaMigMonitorDevices: "mig0,mig1",
|
||||||
|
},
|
||||||
|
privileged: true,
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"all"},
|
||||||
|
MigMonitorDevices: "mig0,mig1",
|
||||||
|
DriverCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
Requirements: []string{"cuda>=9.0"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Modern image, devices 'all', migMonitor set, unprivileged",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaRequireCuda: "cuda>=9.0",
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
image.EnvVarNvidiaMigMonitorDevices: "mig0,mig1",
|
||||||
|
},
|
||||||
|
privileged: false,
|
||||||
|
expectedPanic: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Hook config set as driver-capabilities-all",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "all",
|
||||||
|
},
|
||||||
|
privileged: true,
|
||||||
|
hookConfig: &hookConfig{
|
||||||
|
Config: &config.Config{
|
||||||
|
SupportedDriverCapabilities: "video,display",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"all"},
|
||||||
|
DriverCapabilities: "display,video",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Hook config set, envvar sets driver-capabilities",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "video,display",
|
||||||
|
},
|
||||||
|
privileged: true,
|
||||||
|
hookConfig: &hookConfig{
|
||||||
|
Config: &config.Config{
|
||||||
|
SupportedDriverCapabilities: "video,display,compute,utility",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"all"},
|
||||||
|
DriverCapabilities: "display,video",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Hook config set, envvar unset sets default driver-capabilities",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
},
|
||||||
|
privileged: true,
|
||||||
|
hookConfig: &hookConfig{
|
||||||
|
Config: &config.Config{
|
||||||
|
SupportedDriverCapabilities: "video,display,utility,compute",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"all"},
|
||||||
|
DriverCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Hook config set, swarmResource overrides device selection",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
"DOCKER_SWARM_RESOURCE": "GPU1,GPU2",
|
||||||
|
},
|
||||||
|
privileged: true,
|
||||||
|
hookConfig: &hookConfig{
|
||||||
|
Config: &config.Config{
|
||||||
|
SwarmResource: "DOCKER_SWARM_RESOURCE",
|
||||||
|
SupportedDriverCapabilities: "video,display,utility,compute",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"GPU1", "GPU2"},
|
||||||
|
DriverCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Hook config set, comma separated swarmResource is split and overrides device selection",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "all",
|
||||||
|
"DOCKER_SWARM_RESOURCE": "GPU1,GPU2",
|
||||||
|
},
|
||||||
|
privileged: true,
|
||||||
|
hookConfig: &hookConfig{
|
||||||
|
Config: &config.Config{
|
||||||
|
SwarmResource: "NOT_DOCKER_SWARM_RESOURCE,DOCKER_SWARM_RESOURCE",
|
||||||
|
SupportedDriverCapabilities: "video,display,utility,compute",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expectedConfig: &nvidiaConfig{
|
||||||
|
Devices: []string{"GPU1", "GPU2"},
|
||||||
|
DriverCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tc := range tests {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
image, _ := image.New(
|
||||||
|
image.WithEnvMap(tc.env),
|
||||||
|
)
|
||||||
|
// Wrap the call to getNvidiaConfig() in a closure.
|
||||||
|
var cfg *nvidiaConfig
|
||||||
|
getConfig := func() {
|
||||||
|
hookCfg := tc.hookConfig
|
||||||
|
if hookCfg == nil {
|
||||||
|
defaultConfig, _ := config.GetDefault()
|
||||||
|
hookCfg = &hookConfig{defaultConfig}
|
||||||
|
}
|
||||||
|
cfg = hookCfg.getNvidiaConfig(image, tc.privileged)
|
||||||
|
}
|
||||||
|
|
||||||
|
// For any tests that are expected to panic, make sure they do.
|
||||||
|
if tc.expectedPanic {
|
||||||
|
require.Panics(t, getConfig)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// For all other tests, just grab the config
|
||||||
|
getConfig()
|
||||||
|
|
||||||
|
// And start comparing the test results to the expected results.
|
||||||
|
if tc.expectedConfig == nil {
|
||||||
|
require.Nil(t, cfg, tc.description)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
require.NotNil(t, cfg, tc.description)
|
||||||
|
|
||||||
|
require.Equal(t, tc.expectedConfig.Devices, cfg.Devices)
|
||||||
|
require.Equal(t, tc.expectedConfig.MigConfigDevices, cfg.MigConfigDevices)
|
||||||
|
require.Equal(t, tc.expectedConfig.MigMonitorDevices, cfg.MigMonitorDevices)
|
||||||
|
require.Equal(t, tc.expectedConfig.DriverCapabilities, cfg.DriverCapabilities)
|
||||||
|
|
||||||
|
require.ElementsMatch(t, tc.expectedConfig.Requirements, cfg.Requirements)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestDeviceListSourcePriority(t *testing.T) {
|
||||||
|
var tests = []struct {
|
||||||
|
description string
|
||||||
|
mountDevices []specs.Mount
|
||||||
|
envvarDevices string
|
||||||
|
privileged bool
|
||||||
|
acceptUnprivileged bool
|
||||||
|
acceptMounts bool
|
||||||
|
expectedDevices []string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "Mount devices, unprivileged, no accept unprivileged",
|
||||||
|
mountDevices: []specs.Mount{
|
||||||
|
{
|
||||||
|
Source: "/dev/null",
|
||||||
|
Destination: filepath.Join(image.DeviceListAsVolumeMountsRoot, "GPU0"),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Source: "/dev/null",
|
||||||
|
Destination: filepath.Join(image.DeviceListAsVolumeMountsRoot, "GPU1"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
envvarDevices: "GPU2,GPU3",
|
||||||
|
privileged: false,
|
||||||
|
acceptUnprivileged: false,
|
||||||
|
acceptMounts: true,
|
||||||
|
expectedDevices: []string{"GPU0", "GPU1"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "No mount devices, unprivileged, no accept unprivileged",
|
||||||
|
mountDevices: nil,
|
||||||
|
envvarDevices: "GPU0,GPU1",
|
||||||
|
privileged: false,
|
||||||
|
acceptUnprivileged: false,
|
||||||
|
acceptMounts: true,
|
||||||
|
expectedDevices: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "No mount devices, privileged, no accept unprivileged",
|
||||||
|
mountDevices: nil,
|
||||||
|
envvarDevices: "GPU0,GPU1",
|
||||||
|
privileged: true,
|
||||||
|
acceptUnprivileged: false,
|
||||||
|
acceptMounts: true,
|
||||||
|
expectedDevices: []string{"GPU0", "GPU1"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "No mount devices, unprivileged, accept unprivileged",
|
||||||
|
mountDevices: nil,
|
||||||
|
envvarDevices: "GPU0,GPU1",
|
||||||
|
privileged: false,
|
||||||
|
acceptUnprivileged: true,
|
||||||
|
acceptMounts: true,
|
||||||
|
expectedDevices: []string{"GPU0", "GPU1"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Mount devices, unprivileged, accept unprivileged, no accept mounts",
|
||||||
|
mountDevices: []specs.Mount{
|
||||||
|
{
|
||||||
|
Source: "/dev/null",
|
||||||
|
Destination: filepath.Join(image.DeviceListAsVolumeMountsRoot, "GPU0"),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Source: "/dev/null",
|
||||||
|
Destination: filepath.Join(image.DeviceListAsVolumeMountsRoot, "GPU1"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
envvarDevices: "GPU2,GPU3",
|
||||||
|
privileged: false,
|
||||||
|
acceptUnprivileged: true,
|
||||||
|
acceptMounts: false,
|
||||||
|
expectedDevices: []string{"GPU2", "GPU3"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Mount devices, unprivileged, no accept unprivileged, no accept mounts",
|
||||||
|
mountDevices: []specs.Mount{
|
||||||
|
{
|
||||||
|
Source: "/dev/null",
|
||||||
|
Destination: filepath.Join(image.DeviceListAsVolumeMountsRoot, "GPU0"),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Source: "/dev/null",
|
||||||
|
Destination: filepath.Join(image.DeviceListAsVolumeMountsRoot, "GPU1"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
envvarDevices: "GPU2,GPU3",
|
||||||
|
privileged: false,
|
||||||
|
acceptUnprivileged: false,
|
||||||
|
acceptMounts: false,
|
||||||
|
expectedDevices: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, tc := range tests {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
// Wrap the call to getDevices() in a closure.
|
||||||
|
var devices []string
|
||||||
|
getDevices := func() {
|
||||||
|
image, _ := image.New(
|
||||||
|
image.WithEnvMap(
|
||||||
|
map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: tc.envvarDevices,
|
||||||
|
},
|
||||||
|
),
|
||||||
|
image.WithMounts(tc.mountDevices),
|
||||||
|
)
|
||||||
|
defaultConfig, _ := config.GetDefault()
|
||||||
|
cfg := &hookConfig{defaultConfig}
|
||||||
|
cfg.AcceptEnvvarUnprivileged = tc.acceptUnprivileged
|
||||||
|
cfg.AcceptDeviceListAsVolumeMounts = tc.acceptMounts
|
||||||
|
devices = cfg.getDevices(image, tc.privileged)
|
||||||
|
}
|
||||||
|
|
||||||
|
// For all other tests, just grab the devices and check the results
|
||||||
|
getDevices()
|
||||||
|
|
||||||
|
require.Equal(t, tc.expectedDevices, devices)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGetDevicesFromEnvvar(t *testing.T) {
|
||||||
|
envDockerResourceGPUs := "DOCKER_RESOURCE_GPUS"
|
||||||
|
gpuID := "GPU-12345"
|
||||||
|
anotherGPUID := "GPU-67890"
|
||||||
|
thirdGPUID := "MIG-12345"
|
||||||
|
|
||||||
|
var tests = []struct {
|
||||||
|
description string
|
||||||
|
swarmResourceEnvvars []string
|
||||||
|
env map[string]string
|
||||||
|
expectedDevices []string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "empty env returns nil for non-legacy image",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "blank NVIDIA_VISIBLE_DEVICES returns nil for non-legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "'void' NVIDIA_VISIBLE_DEVICES returns nil for non-legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "void",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "'none' NVIDIA_VISIBLE_DEVICES returns empty for non-legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "none",
|
||||||
|
},
|
||||||
|
expectedDevices: []string{""},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "NVIDIA_VISIBLE_DEVICES set returns value for non-legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: gpuID,
|
||||||
|
},
|
||||||
|
expectedDevices: []string{gpuID},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "NVIDIA_VISIBLE_DEVICES set returns value for legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: gpuID,
|
||||||
|
image.EnvVarCudaVersion: "legacy",
|
||||||
|
},
|
||||||
|
expectedDevices: []string{gpuID},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "empty env returns all for legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarCudaVersion: "legacy",
|
||||||
|
},
|
||||||
|
expectedDevices: []string{"all"},
|
||||||
|
},
|
||||||
|
// Add the `DOCKER_RESOURCE_GPUS` envvar and ensure that this is ignored when
|
||||||
|
// not enabled
|
||||||
|
{
|
||||||
|
description: "missing NVIDIA_VISIBLE_DEVICES returns nil for non-legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
envDockerResourceGPUs: anotherGPUID,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "blank NVIDIA_VISIBLE_DEVICES returns nil for non-legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "",
|
||||||
|
envDockerResourceGPUs: anotherGPUID,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "'void' NVIDIA_VISIBLE_DEVICES returns nil for non-legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "void",
|
||||||
|
envDockerResourceGPUs: anotherGPUID,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "'none' NVIDIA_VISIBLE_DEVICES returns empty for non-legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: "none",
|
||||||
|
envDockerResourceGPUs: anotherGPUID,
|
||||||
|
},
|
||||||
|
expectedDevices: []string{""},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "NVIDIA_VISIBLE_DEVICES set returns value for non-legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: gpuID,
|
||||||
|
envDockerResourceGPUs: anotherGPUID,
|
||||||
|
},
|
||||||
|
expectedDevices: []string{gpuID},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "NVIDIA_VISIBLE_DEVICES set returns value for legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: gpuID,
|
||||||
|
envDockerResourceGPUs: anotherGPUID,
|
||||||
|
image.EnvVarCudaVersion: "legacy",
|
||||||
|
},
|
||||||
|
expectedDevices: []string{gpuID},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "empty env returns all for legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
envDockerResourceGPUs: anotherGPUID,
|
||||||
|
image.EnvVarCudaVersion: "legacy",
|
||||||
|
},
|
||||||
|
expectedDevices: []string{"all"},
|
||||||
|
},
|
||||||
|
// Add the `DOCKER_RESOURCE_GPUS` envvar and ensure that this is selected when
|
||||||
|
// enabled
|
||||||
|
{
|
||||||
|
description: "empty env returns nil for non-legacy image",
|
||||||
|
swarmResourceEnvvars: []string{envDockerResourceGPUs},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "blank DOCKER_RESOURCE_GPUS returns nil for non-legacy image",
|
||||||
|
swarmResourceEnvvars: []string{envDockerResourceGPUs},
|
||||||
|
env: map[string]string{
|
||||||
|
envDockerResourceGPUs: "",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "'void' DOCKER_RESOURCE_GPUS returns nil for non-legacy image",
|
||||||
|
swarmResourceEnvvars: []string{envDockerResourceGPUs},
|
||||||
|
env: map[string]string{
|
||||||
|
envDockerResourceGPUs: "void",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "'none' DOCKER_RESOURCE_GPUS returns empty for non-legacy image",
|
||||||
|
swarmResourceEnvvars: []string{envDockerResourceGPUs},
|
||||||
|
env: map[string]string{
|
||||||
|
envDockerResourceGPUs: "none",
|
||||||
|
},
|
||||||
|
expectedDevices: []string{""},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "DOCKER_RESOURCE_GPUS set returns value for non-legacy image",
|
||||||
|
swarmResourceEnvvars: []string{envDockerResourceGPUs},
|
||||||
|
env: map[string]string{
|
||||||
|
envDockerResourceGPUs: gpuID,
|
||||||
|
},
|
||||||
|
expectedDevices: []string{gpuID},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "DOCKER_RESOURCE_GPUS set returns value for legacy image",
|
||||||
|
swarmResourceEnvvars: []string{envDockerResourceGPUs},
|
||||||
|
env: map[string]string{
|
||||||
|
envDockerResourceGPUs: gpuID,
|
||||||
|
image.EnvVarCudaVersion: "legacy",
|
||||||
|
},
|
||||||
|
expectedDevices: []string{gpuID},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "DOCKER_RESOURCE_GPUS is selected if present",
|
||||||
|
swarmResourceEnvvars: []string{envDockerResourceGPUs},
|
||||||
|
env: map[string]string{
|
||||||
|
envDockerResourceGPUs: anotherGPUID,
|
||||||
|
},
|
||||||
|
expectedDevices: []string{anotherGPUID},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "DOCKER_RESOURCE_GPUS overrides NVIDIA_VISIBLE_DEVICES if present",
|
||||||
|
swarmResourceEnvvars: []string{envDockerResourceGPUs},
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: gpuID,
|
||||||
|
envDockerResourceGPUs: anotherGPUID,
|
||||||
|
},
|
||||||
|
expectedDevices: []string{anotherGPUID},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "DOCKER_RESOURCE_GPUS_ADDITIONAL overrides NVIDIA_VISIBLE_DEVICES if present",
|
||||||
|
swarmResourceEnvvars: []string{"DOCKER_RESOURCE_GPUS_ADDITIONAL"},
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: gpuID,
|
||||||
|
"DOCKER_RESOURCE_GPUS_ADDITIONAL": anotherGPUID,
|
||||||
|
},
|
||||||
|
expectedDevices: []string{anotherGPUID},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "All available swarm resource envvars are selected and override NVIDIA_VISIBLE_DEVICES if present",
|
||||||
|
swarmResourceEnvvars: []string{"DOCKER_RESOURCE_GPUS", "DOCKER_RESOURCE_GPUS_ADDITIONAL"},
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: gpuID,
|
||||||
|
"DOCKER_RESOURCE_GPUS": thirdGPUID,
|
||||||
|
"DOCKER_RESOURCE_GPUS_ADDITIONAL": anotherGPUID,
|
||||||
|
},
|
||||||
|
expectedDevices: []string{thirdGPUID, anotherGPUID},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "DOCKER_RESOURCE_GPUS_ADDITIONAL or DOCKER_RESOURCE_GPUS override NVIDIA_VISIBLE_DEVICES if present",
|
||||||
|
swarmResourceEnvvars: []string{"DOCKER_RESOURCE_GPUS", "DOCKER_RESOURCE_GPUS_ADDITIONAL"},
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaVisibleDevices: gpuID,
|
||||||
|
"DOCKER_RESOURCE_GPUS_ADDITIONAL": anotherGPUID,
|
||||||
|
},
|
||||||
|
expectedDevices: []string{anotherGPUID},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range tests {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
image, _ := image.New(
|
||||||
|
image.WithEnvMap(tc.env),
|
||||||
|
)
|
||||||
|
devices := getDevicesFromEnvvar(image, tc.swarmResourceEnvvars)
|
||||||
|
require.EqualValues(t, tc.expectedDevices, devices)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGetDriverCapabilities(t *testing.T) {
|
||||||
|
|
||||||
|
supportedCapabilities := "compute,display,utility,video"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
env map[string]string
|
||||||
|
legacyImage bool
|
||||||
|
supportedCapabilities string
|
||||||
|
expectedPanic bool
|
||||||
|
expectedCapabilities string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "Env is set for legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "display,video",
|
||||||
|
},
|
||||||
|
legacyImage: true,
|
||||||
|
supportedCapabilities: supportedCapabilities,
|
||||||
|
expectedCapabilities: "display,video",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Env is all for legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "all",
|
||||||
|
},
|
||||||
|
legacyImage: true,
|
||||||
|
supportedCapabilities: supportedCapabilities,
|
||||||
|
expectedCapabilities: supportedCapabilities,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Env is empty for legacy image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "",
|
||||||
|
},
|
||||||
|
legacyImage: true,
|
||||||
|
supportedCapabilities: supportedCapabilities,
|
||||||
|
expectedCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Env unset for legacy image is 'all'",
|
||||||
|
env: map[string]string{},
|
||||||
|
legacyImage: true,
|
||||||
|
supportedCapabilities: supportedCapabilities,
|
||||||
|
expectedCapabilities: supportedCapabilities,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Env is set for modern image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "display,video",
|
||||||
|
},
|
||||||
|
legacyImage: false,
|
||||||
|
supportedCapabilities: supportedCapabilities,
|
||||||
|
expectedCapabilities: "display,video",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Env unset for modern image is default",
|
||||||
|
env: map[string]string{},
|
||||||
|
legacyImage: false,
|
||||||
|
supportedCapabilities: supportedCapabilities,
|
||||||
|
expectedCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Env is all for modern image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "all",
|
||||||
|
},
|
||||||
|
legacyImage: false,
|
||||||
|
supportedCapabilities: supportedCapabilities,
|
||||||
|
expectedCapabilities: supportedCapabilities,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Env is empty for modern image",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "",
|
||||||
|
},
|
||||||
|
legacyImage: false,
|
||||||
|
supportedCapabilities: supportedCapabilities,
|
||||||
|
expectedCapabilities: image.DefaultDriverCapabilities.String(),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Invalid capabilities panic",
|
||||||
|
env: map[string]string{
|
||||||
|
image.EnvVarNvidiaDriverCapabilities: "compute,utility",
|
||||||
|
},
|
||||||
|
supportedCapabilities: "not-compute,not-utility",
|
||||||
|
expectedPanic: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "Default is restricted for modern image",
|
||||||
|
legacyImage: false,
|
||||||
|
supportedCapabilities: "compute",
|
||||||
|
expectedCapabilities: "compute",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
var capabilities string
|
||||||
|
|
||||||
|
c := hookConfig{
|
||||||
|
Config: &config.Config{
|
||||||
|
SupportedDriverCapabilities: tc.supportedCapabilities,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
image, _ := image.New(
|
||||||
|
image.WithEnvMap(tc.env),
|
||||||
|
)
|
||||||
|
getDriverCapabilities := func() {
|
||||||
|
capabilities = c.getDriverCapabilities(image, tc.legacyImage).String()
|
||||||
|
}
|
||||||
|
|
||||||
|
if tc.expectedPanic {
|
||||||
|
require.Panics(t, getDriverCapabilities)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
getDriverCapabilities()
|
||||||
|
require.EqualValues(t, tc.expectedCapabilities, capabilities)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
106
cmd/nvidia-container-runtime-hook/hook_config.go
Normal file
106
cmd/nvidia-container-runtime-hook/hook_config.go
Normal file
@@ -0,0 +1,106 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"reflect"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/image"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
configPath = "/etc/nvidia-container-runtime/config.toml"
|
||||||
|
driverPath = "/run/nvidia/driver"
|
||||||
|
)
|
||||||
|
|
||||||
|
// hookConfig wraps the toolkit config.
|
||||||
|
// This allows for functions to be defined on the local type.
|
||||||
|
type hookConfig struct {
|
||||||
|
*config.Config
|
||||||
|
}
|
||||||
|
|
||||||
|
// loadConfig loads the required paths for the hook config.
|
||||||
|
func loadConfig() (*config.Config, error) {
|
||||||
|
var configPaths []string
|
||||||
|
var required bool
|
||||||
|
if len(*configflag) != 0 {
|
||||||
|
configPaths = append(configPaths, *configflag)
|
||||||
|
required = true
|
||||||
|
} else {
|
||||||
|
configPaths = append(configPaths, path.Join(driverPath, configPath), configPath)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, p := range configPaths {
|
||||||
|
cfg, err := config.New(
|
||||||
|
config.WithConfigFile(p),
|
||||||
|
config.WithRequired(true),
|
||||||
|
)
|
||||||
|
if err == nil {
|
||||||
|
return cfg.Config()
|
||||||
|
} else if os.IsNotExist(err) && !required {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("couldn't open required configuration file: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return config.GetDefault()
|
||||||
|
}
|
||||||
|
|
||||||
|
func getHookConfig() (*hookConfig, error) {
|
||||||
|
cfg, err := loadConfig()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to load config: %v", err)
|
||||||
|
}
|
||||||
|
config := &hookConfig{cfg}
|
||||||
|
|
||||||
|
allSupportedDriverCapabilities := image.SupportedDriverCapabilities
|
||||||
|
if config.SupportedDriverCapabilities == "all" {
|
||||||
|
config.SupportedDriverCapabilities = allSupportedDriverCapabilities.String()
|
||||||
|
}
|
||||||
|
configuredCapabilities := image.NewDriverCapabilities(config.SupportedDriverCapabilities)
|
||||||
|
// We ensure that the configured value is a subset of all supported capabilities
|
||||||
|
if !allSupportedDriverCapabilities.IsSuperset(configuredCapabilities) {
|
||||||
|
configName := config.getConfigOption("SupportedDriverCapabilities")
|
||||||
|
log.Panicf("Invalid value for config option '%v'; %v (supported: %v)\n", configName, config.SupportedDriverCapabilities, allSupportedDriverCapabilities.String())
|
||||||
|
}
|
||||||
|
|
||||||
|
return config, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// getConfigOption returns the toml config option associated with the
|
||||||
|
// specified struct field.
|
||||||
|
func (c hookConfig) getConfigOption(fieldName string) string {
|
||||||
|
t := reflect.TypeOf(c)
|
||||||
|
f, ok := t.FieldByName(fieldName)
|
||||||
|
if !ok {
|
||||||
|
return fieldName
|
||||||
|
}
|
||||||
|
v, ok := f.Tag.Lookup("toml")
|
||||||
|
if !ok {
|
||||||
|
return fieldName
|
||||||
|
}
|
||||||
|
return v
|
||||||
|
}
|
||||||
|
|
||||||
|
// getSwarmResourceEnvvars returns the swarm resource envvars for the config.
|
||||||
|
func (c *hookConfig) getSwarmResourceEnvvars() []string {
|
||||||
|
if c.SwarmResource == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
candidates := strings.Split(c.SwarmResource, ",")
|
||||||
|
|
||||||
|
var envvars []string
|
||||||
|
for _, c := range candidates {
|
||||||
|
trimmed := strings.TrimSpace(c)
|
||||||
|
if len(trimmed) > 0 {
|
||||||
|
envvars = append(envvars, trimmed)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return envvars
|
||||||
|
}
|
||||||
@@ -22,22 +22,25 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/image"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestGetHookConfig(t *testing.T) {
|
func TestGetHookConfig(t *testing.T) {
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
lines []string
|
lines []string
|
||||||
expectedPanic bool
|
expectedPanic bool
|
||||||
expectedDriverCapabilities DriverCapabilities
|
expectedDriverCapabilities string
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
expectedDriverCapabilities: allDriverCapabilities,
|
expectedDriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
lines: []string{
|
lines: []string{
|
||||||
"supported-driver-capabilities = \"all\"",
|
"supported-driver-capabilities = \"all\"",
|
||||||
},
|
},
|
||||||
expectedDriverCapabilities: allDriverCapabilities,
|
expectedDriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
lines: []string{
|
lines: []string{
|
||||||
@@ -47,19 +50,19 @@ func TestGetHookConfig(t *testing.T) {
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
lines: []string{},
|
lines: []string{},
|
||||||
expectedDriverCapabilities: allDriverCapabilities,
|
expectedDriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
lines: []string{
|
lines: []string{
|
||||||
"supported-driver-capabilities = \"\"",
|
"supported-driver-capabilities = \"\"",
|
||||||
},
|
},
|
||||||
expectedDriverCapabilities: none,
|
expectedDriverCapabilities: "",
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
lines: []string{
|
lines: []string{
|
||||||
"supported-driver-capabilities = \"utility,compute\"",
|
"supported-driver-capabilities = \"compute,utility\"",
|
||||||
},
|
},
|
||||||
expectedDriverCapabilities: DriverCapabilities("utility,compute"),
|
expectedDriverCapabilities: "compute,utility",
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -87,9 +90,10 @@ func TestGetHookConfig(t *testing.T) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
var config HookConfig
|
var cfg hookConfig
|
||||||
getHookConfig := func() {
|
getHookConfig := func() {
|
||||||
config = getHookConfig()
|
c, _ := getHookConfig()
|
||||||
|
cfg = *c
|
||||||
}
|
}
|
||||||
|
|
||||||
if tc.expectedPanic {
|
if tc.expectedPanic {
|
||||||
@@ -99,7 +103,56 @@ func TestGetHookConfig(t *testing.T) {
|
|||||||
|
|
||||||
getHookConfig()
|
getHookConfig()
|
||||||
|
|
||||||
require.EqualValues(t, tc.expectedDriverCapabilities, config.SupportedDriverCapabilities)
|
require.EqualValues(t, tc.expectedDriverCapabilities, cfg.SupportedDriverCapabilities)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestGetSwarmResourceEnvvars(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
value string
|
||||||
|
expected []string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
value: "",
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
value: " ",
|
||||||
|
expected: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
value: "single",
|
||||||
|
expected: []string{"single"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
value: "single ",
|
||||||
|
expected: []string{"single"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
value: "one,two",
|
||||||
|
expected: []string{"one", "two"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
value: "one ,two",
|
||||||
|
expected: []string{"one", "two"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
value: "one, two",
|
||||||
|
expected: []string{"one", "two"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
|
c := &hookConfig{
|
||||||
|
Config: &config.Config{
|
||||||
|
SwarmResource: tc.value,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
envvars := c.getSwarmResourceEnvvars()
|
||||||
|
require.EqualValues(t, tc.expected, envvars)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -13,7 +13,9 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
"syscall"
|
"syscall"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -36,16 +38,12 @@ func exit() {
|
|||||||
os.Exit(0)
|
os.Exit(0)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getCLIPath(config CLIConfig) string {
|
func getCLIPath(config config.ContainerCLIConfig) string {
|
||||||
if config.Path != nil {
|
if config.Path != "" {
|
||||||
return *config.Path
|
return config.Path
|
||||||
}
|
}
|
||||||
|
|
||||||
var root string
|
if err := os.Setenv("PATH", lookup.GetPath(config.Root)); err != nil {
|
||||||
if config.Root != nil {
|
|
||||||
root = *config.Root
|
|
||||||
}
|
|
||||||
if err := os.Setenv("PATH", lookup.GetPath(root)); err != nil {
|
|
||||||
log.Panicln("couldn't set PATH variable:", err)
|
log.Panicln("couldn't set PATH variable:", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -71,53 +69,62 @@ func doPrestart() {
|
|||||||
defer exit()
|
defer exit()
|
||||||
log.SetFlags(0)
|
log.SetFlags(0)
|
||||||
|
|
||||||
hook := getHookConfig()
|
hook, err := getHookConfig()
|
||||||
cli := hook.NvidiaContainerCLI
|
if err != nil || hook == nil {
|
||||||
|
log.Panicln("error getting hook config:", err)
|
||||||
if info.ResolveAutoMode(&logInterceptor{}, hook.NVIDIAContainerRuntime.Mode) != "legacy" {
|
|
||||||
log.Panicln("invoking the NVIDIA Container Runtime Hook directly (e.g. specifying the docker --gpus flag) is not supported. Please use the NVIDIA Container Runtime instead.")
|
|
||||||
}
|
}
|
||||||
|
cli := hook.NVIDIAContainerCLIConfig
|
||||||
|
|
||||||
container := getContainerConfig(hook)
|
container := hook.getContainerConfig()
|
||||||
nvidia := container.Nvidia
|
nvidia := container.Nvidia
|
||||||
if nvidia == nil {
|
if nvidia == nil {
|
||||||
// Not a GPU container, nothing to do.
|
// Not a GPU container, nothing to do.
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if !hook.NVIDIAContainerRuntimeHookConfig.SkipModeDetection && info.ResolveAutoMode(&logInterceptor{}, hook.NVIDIAContainerRuntimeConfig.Mode, container.Image) != "legacy" {
|
||||||
|
log.Panicln("invoking the NVIDIA Container Runtime Hook directly (e.g. specifying the docker --gpus flag) is not supported. Please use the NVIDIA Container Runtime (e.g. specify the --runtime=nvidia flag) instead.")
|
||||||
|
}
|
||||||
|
|
||||||
rootfs := getRootfsPath(container)
|
rootfs := getRootfsPath(container)
|
||||||
|
|
||||||
args := []string{getCLIPath(cli)}
|
args := []string{getCLIPath(cli)}
|
||||||
if cli.Root != nil {
|
if cli.Root != "" {
|
||||||
args = append(args, fmt.Sprintf("--root=%s", *cli.Root))
|
args = append(args, fmt.Sprintf("--root=%s", cli.Root))
|
||||||
}
|
}
|
||||||
if cli.LoadKmods {
|
if cli.LoadKmods {
|
||||||
args = append(args, "--load-kmods")
|
args = append(args, "--load-kmods")
|
||||||
}
|
}
|
||||||
|
if hook.Features.DisableImexChannelCreation.IsEnabled() {
|
||||||
|
args = append(args, "--no-create-imex-channels")
|
||||||
|
}
|
||||||
if cli.NoPivot {
|
if cli.NoPivot {
|
||||||
args = append(args, "--no-pivot")
|
args = append(args, "--no-pivot")
|
||||||
}
|
}
|
||||||
if *debugflag {
|
if *debugflag {
|
||||||
args = append(args, "--debug=/dev/stderr")
|
args = append(args, "--debug=/dev/stderr")
|
||||||
} else if cli.Debug != nil {
|
} else if cli.Debug != "" {
|
||||||
args = append(args, fmt.Sprintf("--debug=%s", *cli.Debug))
|
args = append(args, fmt.Sprintf("--debug=%s", cli.Debug))
|
||||||
}
|
}
|
||||||
if cli.Ldcache != nil {
|
if cli.Ldcache != "" {
|
||||||
args = append(args, fmt.Sprintf("--ldcache=%s", *cli.Ldcache))
|
args = append(args, fmt.Sprintf("--ldcache=%s", cli.Ldcache))
|
||||||
}
|
}
|
||||||
if cli.User != nil {
|
if cli.User != "" {
|
||||||
args = append(args, fmt.Sprintf("--user=%s", *cli.User))
|
args = append(args, fmt.Sprintf("--user=%s", cli.User))
|
||||||
}
|
}
|
||||||
args = append(args, "configure")
|
args = append(args, "configure")
|
||||||
|
|
||||||
if cli.Ldconfig != nil {
|
if !hook.Features.AllowCUDACompatLibsFromContainer.IsEnabled() {
|
||||||
args = append(args, fmt.Sprintf("--ldconfig=%s", *cli.Ldconfig))
|
args = append(args, "--no-cntlibs")
|
||||||
|
}
|
||||||
|
if ldconfigPath := cli.NormalizeLDConfigPath(); ldconfigPath != "" {
|
||||||
|
args = append(args, fmt.Sprintf("--ldconfig=%s", ldconfigPath))
|
||||||
}
|
}
|
||||||
if cli.NoCgroups {
|
if cli.NoCgroups {
|
||||||
args = append(args, "--no-cgroups")
|
args = append(args, "--no-cgroups")
|
||||||
}
|
}
|
||||||
if len(nvidia.Devices) > 0 {
|
if devicesString := strings.Join(nvidia.Devices, ","); len(devicesString) > 0 {
|
||||||
args = append(args, fmt.Sprintf("--device=%s", nvidia.Devices))
|
args = append(args, fmt.Sprintf("--device=%s", devicesString))
|
||||||
}
|
}
|
||||||
if len(nvidia.MigConfigDevices) > 0 {
|
if len(nvidia.MigConfigDevices) > 0 {
|
||||||
args = append(args, fmt.Sprintf("--mig-config=%s", nvidia.MigConfigDevices))
|
args = append(args, fmt.Sprintf("--mig-config=%s", nvidia.MigConfigDevices))
|
||||||
@@ -125,6 +132,9 @@ func doPrestart() {
|
|||||||
if len(nvidia.MigMonitorDevices) > 0 {
|
if len(nvidia.MigMonitorDevices) > 0 {
|
||||||
args = append(args, fmt.Sprintf("--mig-monitor=%s", nvidia.MigMonitorDevices))
|
args = append(args, fmt.Sprintf("--mig-monitor=%s", nvidia.MigMonitorDevices))
|
||||||
}
|
}
|
||||||
|
if imexString := strings.Join(nvidia.ImexChannels, ","); len(imexString) > 0 {
|
||||||
|
args = append(args, fmt.Sprintf("--imex-channel=%s", imexString))
|
||||||
|
}
|
||||||
|
|
||||||
for _, cap := range strings.Split(nvidia.DriverCapabilities, ",") {
|
for _, cap := range strings.Split(nvidia.DriverCapabilities, ",") {
|
||||||
if len(cap) == 0 {
|
if len(cap) == 0 {
|
||||||
@@ -133,16 +143,15 @@ func doPrestart() {
|
|||||||
args = append(args, capabilityToCLI(cap))
|
args = append(args, capabilityToCLI(cap))
|
||||||
}
|
}
|
||||||
|
|
||||||
if !hook.DisableRequire && !nvidia.DisableRequire {
|
for _, req := range nvidia.Requirements {
|
||||||
for _, req := range nvidia.Requirements {
|
args = append(args, fmt.Sprintf("--require=%s", req))
|
||||||
args = append(args, fmt.Sprintf("--require=%s", req))
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
args = append(args, fmt.Sprintf("--pid=%s", strconv.FormatUint(uint64(container.Pid), 10)))
|
args = append(args, fmt.Sprintf("--pid=%s", strconv.FormatUint(uint64(container.Pid), 10)))
|
||||||
args = append(args, rootfs)
|
args = append(args, rootfs)
|
||||||
|
|
||||||
env := append(os.Environ(), cli.Environment...)
|
env := append(os.Environ(), cli.Environment...)
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection?
|
||||||
err = syscall.Exec(args[0], args, env)
|
err = syscall.Exec(args[0], args, env)
|
||||||
log.Panicln("exec failed:", err)
|
log.Panicln("exec failed:", err)
|
||||||
}
|
}
|
||||||
@@ -185,11 +194,11 @@ func main() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// logInterceptor implements the info.Logger interface to allow for logging from this function.
|
// logInterceptor implements the logger.Interface to allow for logging from executable.
|
||||||
type logInterceptor struct{}
|
type logInterceptor struct {
|
||||||
|
logger.NullLogger
|
||||||
|
}
|
||||||
|
|
||||||
func (l *logInterceptor) Infof(format string, args ...interface{}) {
|
func (l *logInterceptor) Infof(format string, args ...interface{}) {
|
||||||
log.Printf(format, args...)
|
log.Printf(format, args...)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *logInterceptor) Debugf(format string, args ...interface{}) {}
|
|
||||||
34
cmd/nvidia-container-runtime.cdi/main.go
Normal file
34
cmd/nvidia-container-runtime.cdi/main.go
Normal file
@@ -0,0 +1,34 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/runtime"
|
||||||
|
)
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
rt := runtime.New(
|
||||||
|
runtime.WithModeOverride("cdi"),
|
||||||
|
)
|
||||||
|
|
||||||
|
err := rt.Run(os.Args)
|
||||||
|
if err != nil {
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
}
|
||||||
34
cmd/nvidia-container-runtime.legacy/main.go
Normal file
34
cmd/nvidia-container-runtime.legacy/main.go
Normal file
@@ -0,0 +1,34 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/runtime"
|
||||||
|
)
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
rt := runtime.New(
|
||||||
|
runtime.WithModeOverride("legacy"),
|
||||||
|
)
|
||||||
|
|
||||||
|
err := rt.Run(os.Args)
|
||||||
|
if err != nil {
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -2,24 +2,209 @@
|
|||||||
|
|
||||||
The NVIDIA Container Runtime is a shim for OCI-compliant low-level runtimes such as [runc](https://github.com/opencontainers/runc). When a `create` command is detected, the incoming [OCI runtime specification](https://github.com/opencontainers/runtime-spec) is modified in place and the command is forwarded to the low-level runtime.
|
The NVIDIA Container Runtime is a shim for OCI-compliant low-level runtimes such as [runc](https://github.com/opencontainers/runc). When a `create` command is detected, the incoming [OCI runtime specification](https://github.com/opencontainers/runtime-spec) is modified in place and the command is forwarded to the low-level runtime.
|
||||||
|
|
||||||
## Standard Mode
|
## Configuration
|
||||||
|
|
||||||
In the standard mode configuration, the NVIDIA Container Runtime adds a [`prestart` hook](https://github.com/opencontainers/runtime-spec/blob/master/config.md#prestart) to the incomming OCI specification that invokes the NVIDIA Container Runtime Hook for all containers created. This hook checks whether NVIDIA devices are requested and ensures GPU access is configured using the `nvidia-container-cli` from project [libnvidia-container](https://github.com/NVIDIA/libnvidia-container).
|
The NVIDIA Container Runtime uses file-based configuration, with the config stored in `/etc/nvidia-container-runtime/config.toml`. The `/etc` path can be overridden using the `XDG_CONFIG_HOME` environment variable with the `${XDG_CONFIG_HOME}/nvidia-container-runtime/config.toml` file used instead if this environment variable is set.
|
||||||
|
|
||||||
## Experimental Mode
|
This config file may contain options for other components of the NVIDIA container stack and for the NVIDIA Container Runtime, the relevant config section is `nvidia-container-runtime`
|
||||||
|
|
||||||
The NVIDIA Container Runtime can be configured in an experimental mode by setting the following options in the runtime's `config.toml` file:
|
### Logging
|
||||||
|
|
||||||
|
The `log-level` config option (default: `"info"`) specifies the log level to use and the `debug` option, if set, specifies a log file to which logs for the NVIDIA Container Runtime must be written.
|
||||||
|
|
||||||
|
In addition to this, the NVIDIA Container Runtime considers the value of `--log` and `--log-format` flags that may be passed to it by a container runtime such as docker or containerd. If the `--debug` flag is present the log-level specified in the config file is overridden as `"debug"`.
|
||||||
|
|
||||||
|
### Low-level Runtime Path
|
||||||
|
|
||||||
|
The `runtimes` config option allows for the low-level runtime to be specified. The first entry in this list that is an existing executable file is used as the low-level runtime. If the entry is not a path, the `PATH` is searched for a matching executable. If the entry is a path this is checked instead.
|
||||||
|
|
||||||
|
The default value for this setting is:
|
||||||
|
```toml
|
||||||
|
runtimes = [
|
||||||
|
"docker-runc",
|
||||||
|
"runc",
|
||||||
|
]
|
||||||
|
```
|
||||||
|
|
||||||
|
and if, for example, `crun` is to be used instead this can be changed to:
|
||||||
|
```toml
|
||||||
|
runtimes = [
|
||||||
|
"crun",
|
||||||
|
]
|
||||||
|
```
|
||||||
|
|
||||||
|
### Runtime Mode
|
||||||
|
|
||||||
|
The `mode` config option (default `"auto"`) controls the high-level behaviour of the runtime.
|
||||||
|
|
||||||
|
#### Auto Mode
|
||||||
|
|
||||||
|
When `mode` is set to `"auto"`, the runtime employs heuristics to determine which mode to use based on, for example, the platform where the runtime is being run.
|
||||||
|
|
||||||
|
#### Legacy Mode
|
||||||
|
|
||||||
|
When `mode` is set to `"legacy"`, the NVIDIA Container Runtime adds a [`prestart` hook](https://github.com/opencontainers/runtime-spec/blob/master/config.md#prestart) to the incomming OCI specification that invokes the NVIDIA Container Runtime Hook for all containers created. This hook checks whether NVIDIA devices are requested and ensures GPU access is configured using the `nvidia-container-cli` from the [libnvidia-container](https://github.com/NVIDIA/libnvidia-container) project.
|
||||||
|
|
||||||
|
#### CSV Mode
|
||||||
|
|
||||||
|
When `mode` is set to `"csv"`, CSV files at `/etc/nvidia-container-runtime/host-files-for-container.d` define the devices and mounts that are to be injected into a container when it is created. The search path for the files can be overridden by modifying the `nvidia-container-runtime.modes.csv.mount-spec-path` in the config as below:
|
||||||
|
|
||||||
```toml
|
```toml
|
||||||
[nvidia-container-runtime]
|
[nvidia-container-runtime]
|
||||||
experimental = true
|
[nvidia-container-runtime.modes.csv]
|
||||||
|
mount-spec-path = "/etc/nvidia-container-runtime/host-files-for-container.d"
|
||||||
```
|
```
|
||||||
|
|
||||||
When this setting is enabled, the modifications made to the OCI specification are controlled by the `nvidia-container-runtime.discover-mode` option, with the following mode supported:
|
This mode is primarily targeted at Tegra-based systems without NVML available.
|
||||||
|
|
||||||
* `"legacy"`: This mode mirrors the behaviour of the standard mode, inserting the NVIDIA Container Runtime Hook as a `prestart` hook into the container's OCI specification.
|
|
||||||
* `"csv"`: This mode uses CSV files at `/etc/nvidia-container-runtime/host-files-for-container.d` to define the devices and mounts that are to be injected into a container when it is created.
|
|
||||||
|
|
||||||
### Notes on using the docker CLI
|
### Notes on using the docker CLI
|
||||||
|
|
||||||
The `docker` CLI supports the `--gpus` flag to select GPUs for inclusion in a container. Since specifying this flag inserts the same NVIDIA Container Runtime Hook into the OCI runtime specification. When experimental mode is activated, the NVIDIA Container Runtime detects the presence of the hook and raises an error. This requirement will be relaxed in the near future.
|
Note that only the `"legacy"` NVIDIA Container Runtime mode is directly compatible with the `--gpus` flag implemented by the `docker` CLI (assuming the NVIDIA Container Runtime is not used). The reason for this is that `docker` inserts the same NVIDIA Container Runtime Hook into the OCI runtime specification.
|
||||||
|
|
||||||
|
|
||||||
|
If a different mode is explicitly set or detected, the NVIDIA Container Runtime Hook will raise the following error when `--gpus` is set:
|
||||||
|
```
|
||||||
|
$ docker run --rm --gpus all ubuntu:18.04
|
||||||
|
docker: Error response from daemon: failed to create shim: OCI runtime create failed: container_linux.go:380: starting container process caused: process_linux.go:545: container init caused: Running hook #0:: error running hook: exit status 1, stdout: , stderr: Auto-detected mode as 'csv'
|
||||||
|
invoking the NVIDIA Container Runtime Hook directly (e.g. specifying the docker --gpus flag) is not supported. Please use the NVIDIA Container Runtime instead.: unknown.
|
||||||
|
```
|
||||||
|
Here NVIDIA Container Runtime must be used explicitly. The recommended way to do this is to specify the `--runtime=nvidia` command line argument as part of the `docker run` commmand as follows:
|
||||||
|
```
|
||||||
|
$ docker run --rm --gpus all --runtime=nvidia ubuntu:18.04
|
||||||
|
```
|
||||||
|
|
||||||
|
Alternatively the NVIDIA Container Runtime can be set as the default runtime for docker. This can be done by modifying the `/etc/docker/daemon.json` file as follows:
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"default-runtime": "nvidia",
|
||||||
|
"runtimes": {
|
||||||
|
"nvidia": {
|
||||||
|
"path": "nvidia-container-runtime",
|
||||||
|
"runtimeArgs": []
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Environment variables (OCI spec)
|
||||||
|
|
||||||
|
Each environment variable maps to an command-line argument for `nvidia-container-cli` from [libnvidia-container](https://github.com/NVIDIA/libnvidia-container).
|
||||||
|
These variables are already set in our [official CUDA images](https://hub.docker.com/r/nvidia/cuda/).
|
||||||
|
|
||||||
|
### `NVIDIA_VISIBLE_DEVICES`
|
||||||
|
This variable controls which GPUs will be made accessible inside the container.
|
||||||
|
|
||||||
|
#### Possible values
|
||||||
|
* `0,1,2`, `GPU-fef8089b` …: a comma-separated list of GPU UUID(s) or index(es).
|
||||||
|
* `all`: all GPUs will be accessible, this is the default value in our container images.
|
||||||
|
* `none`: no GPU will be accessible, but driver capabilities will be enabled.
|
||||||
|
* `void` or *empty* or *unset*: `nvidia-container-runtime` will have the same behavior as `runc`.
|
||||||
|
|
||||||
|
**Note**: When running on a MIG capable device, the following values will also be available:
|
||||||
|
* `0:0,0:1,1:0`, `MIG-GPU-fef8089b/0/1` …: a comma-separated list of MIG Device UUID(s) or index(es).
|
||||||
|
|
||||||
|
Where the MIG device indices have the form `<GPU Device Index>:<MIG Device Index>` as seen in the example output:
|
||||||
|
```
|
||||||
|
$ nvidia-smi -L
|
||||||
|
GPU 0: Graphics Device (UUID: GPU-b8ea3855-276c-c9cb-b366-c6fa655957c5)
|
||||||
|
MIG Device 0: (UUID: MIG-GPU-b8ea3855-276c-c9cb-b366-c6fa655957c5/1/0)
|
||||||
|
MIG Device 1: (UUID: MIG-GPU-b8ea3855-276c-c9cb-b366-c6fa655957c5/1/1)
|
||||||
|
MIG Device 2: (UUID: MIG-GPU-b8ea3855-276c-c9cb-b366-c6fa655957c5/11/0)
|
||||||
|
```
|
||||||
|
|
||||||
|
### `NVIDIA_MIG_CONFIG_DEVICES`
|
||||||
|
This variable controls which of the visible GPUs can have their MIG
|
||||||
|
configuration managed from within the container. This includes enabling and
|
||||||
|
disabling MIG mode, creating and destroying GPU Instances and Compute
|
||||||
|
Instances, etc.
|
||||||
|
|
||||||
|
#### Possible values
|
||||||
|
* `all`: Allow all MIG-capable GPUs in the visible device list to have their
|
||||||
|
MIG configurations managed.
|
||||||
|
|
||||||
|
**Note**:
|
||||||
|
* This feature is only available on MIG capable devices (e.g. the A100).
|
||||||
|
* To use this feature, the container must be started with `CAP_SYS_ADMIN` privileges.
|
||||||
|
* When not running as `root`, the container user must have read access to the
|
||||||
|
`/proc/driver/nvidia/capabilities/mig/config` file on the host.
|
||||||
|
|
||||||
|
### `NVIDIA_MIG_MONITOR_DEVICES`
|
||||||
|
This variable controls which of the visible GPUs can have aggregate information
|
||||||
|
about all of their MIG devices monitored from within the container. This
|
||||||
|
includes inspecting the aggregate memory usage, listing the aggregate running
|
||||||
|
processes, etc.
|
||||||
|
|
||||||
|
#### Possible values
|
||||||
|
* `all`: Allow all MIG-capable GPUs in the visible device list to have their
|
||||||
|
MIG devices monitored.
|
||||||
|
|
||||||
|
**Note**:
|
||||||
|
* This feature is only available on MIG capable devices (e.g. the A100).
|
||||||
|
* To use this feature, the container must be started with `CAP_SYS_ADMIN` privileges.
|
||||||
|
* When not running as `root`, the container user must have read access to the
|
||||||
|
`/proc/driver/nvidia/capabilities/mig/monitor` file on the host.
|
||||||
|
|
||||||
|
### `NVIDIA_DRIVER_CAPABILITIES`
|
||||||
|
This option controls which driver libraries/binaries will be mounted inside the container.
|
||||||
|
|
||||||
|
#### Possible values
|
||||||
|
* `compute,video`, `graphics,utility` …: a comma-separated list of driver features the container needs.
|
||||||
|
* `all`: enable all available driver capabilities.
|
||||||
|
* *empty* or *unset*: use default driver capability: `utility,compute`.
|
||||||
|
|
||||||
|
#### Supported driver capabilities
|
||||||
|
* `compute`: required for CUDA and OpenCL applications.
|
||||||
|
* `compat32`: required for running 32-bit applications.
|
||||||
|
* `graphics`: required for running OpenGL and Vulkan applications.
|
||||||
|
* `utility`: required for using `nvidia-smi` and NVML.
|
||||||
|
* `video`: required for using the Video Codec SDK.
|
||||||
|
* `display`: required for leveraging X11 display.
|
||||||
|
|
||||||
|
### `NVIDIA_REQUIRE_*`
|
||||||
|
A logical expression to define constraints on the configurations supported by the container.
|
||||||
|
|
||||||
|
#### Supported constraints
|
||||||
|
* `cuda`: constraint on the CUDA driver version.
|
||||||
|
* `driver`: constraint on the driver version.
|
||||||
|
* `arch`: constraint on the compute architectures of the selected GPUs.
|
||||||
|
* `brand`: constraint on the brand of the selected GPUs (e.g. GeForce, Tesla, GRID).
|
||||||
|
|
||||||
|
#### Expressions
|
||||||
|
Multiple constraints can be expressed in a single environment variable: space-separated constraints are ORed, comma-separated constraints are ANDed.
|
||||||
|
Multiple environment variables of the form `NVIDIA_REQUIRE_*` are ANDed together.
|
||||||
|
|
||||||
|
### `NVIDIA_DISABLE_REQUIRE`
|
||||||
|
Single switch to disable all the constraints of the form `NVIDIA_REQUIRE_*`.
|
||||||
|
|
||||||
|
### `NVIDIA_REQUIRE_CUDA`
|
||||||
|
|
||||||
|
The version of the CUDA toolkit used by the container. It is an instance of the generic `NVIDIA_REQUIRE_*` case and it is set by official CUDA images.
|
||||||
|
If the version of the NVIDIA driver is insufficient to run this version of CUDA, the container will not be started.
|
||||||
|
|
||||||
|
#### Possible values
|
||||||
|
* `cuda>=7.5`, `cuda>=8.0`, `cuda>=9.0` …: any valid CUDA version in the form `major.minor`.
|
||||||
|
|
||||||
|
### `CUDA_VERSION`
|
||||||
|
Similar to `NVIDIA_REQUIRE_CUDA`, for legacy CUDA images.
|
||||||
|
In addition, if `NVIDIA_REQUIRE_CUDA` is not set, `NVIDIA_VISIBLE_DEVICES` and `NVIDIA_DRIVER_CAPABILITIES` will default to `all`.
|
||||||
|
|
||||||
|
## Usage example
|
||||||
|
|
||||||
|
**NOTE:** The use of the `nvidia-container-runtime` as CLI replacement for `runc` is uncommon and is only provided for completeness.
|
||||||
|
|
||||||
|
Although the `nvidia-container-runtime` is typically configured as a replacement for `runc` or `crun` in various container engines, it can also be
|
||||||
|
invoked from the command line as `runc` would. For example:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
# Setup a rootfs based on Ubuntu 16.04
|
||||||
|
cd $(mktemp -d) && mkdir rootfs
|
||||||
|
curl -sS http://cdimage.ubuntu.com/ubuntu-base/releases/16.04/release/ubuntu-base-16.04.6-base-amd64.tar.gz | tar --exclude 'dev/*' -C rootfs -xz
|
||||||
|
|
||||||
|
# Create an OCI runtime spec
|
||||||
|
nvidia-container-runtime spec
|
||||||
|
sed -i 's;"sh";"nvidia-smi";' config.json
|
||||||
|
sed -i 's;\("TERM=xterm"\);\1, "NVIDIA_VISIBLE_DEVICES=0";' config.json
|
||||||
|
|
||||||
|
# Run the container
|
||||||
|
sudo nvidia-container-runtime run nvidia_smi
|
||||||
|
```
|
||||||
|
|||||||
@@ -1,84 +1,15 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"os"
|
"os"
|
||||||
"strings"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/runtime"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
|
||||||
"github.com/opencontainers/runtime-spec/specs-go"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// version must be set by go build's -X main.version= option in the Makefile.
|
|
||||||
var version = "unknown"
|
|
||||||
|
|
||||||
// gitCommit will be the hash that the binary was built from
|
|
||||||
// and will be populated by the Makefile
|
|
||||||
var gitCommit = ""
|
|
||||||
|
|
||||||
var logger = NewLogger()
|
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
err := run(os.Args)
|
r := runtime.New()
|
||||||
|
err := r.Run(os.Args)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Errorf("%v", err)
|
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// run is an entry point that allows for idiomatic handling of errors
|
|
||||||
// when calling from the main function.
|
|
||||||
func run(argv []string) (rerr error) {
|
|
||||||
printVersion := hasVersionFlag(argv)
|
|
||||||
if printVersion {
|
|
||||||
fmt.Printf("%v version %v\n", "NVIDIA Container Runtime", info.GetVersionString(fmt.Sprintf("spec: %v", specs.Version)))
|
|
||||||
}
|
|
||||||
|
|
||||||
cfg, err := config.GetConfig()
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("error loading config: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
logger, err = UpdateLogger(
|
|
||||||
cfg.NVIDIAContainerRuntimeConfig.DebugFilePath,
|
|
||||||
cfg.NVIDIAContainerRuntimeConfig.LogLevel,
|
|
||||||
argv,
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to set up logger: %v", err)
|
|
||||||
}
|
|
||||||
defer logger.Reset()
|
|
||||||
|
|
||||||
logger.Debugf("Command line arguments: %v", argv)
|
|
||||||
runtime, err := newNVIDIAContainerRuntime(logger.Logger, cfg, argv)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to create NVIDIA Container Runtime: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if printVersion {
|
|
||||||
fmt.Print("\n")
|
|
||||||
}
|
|
||||||
return runtime.Exec(argv)
|
|
||||||
}
|
|
||||||
|
|
||||||
// TODO: This should be refactored / combined with parseArgs in logger.
|
|
||||||
func hasVersionFlag(args []string) bool {
|
|
||||||
for i := 0; i < len(args); i++ {
|
|
||||||
param := args[i]
|
|
||||||
|
|
||||||
parts := strings.SplitN(param, "=", 2)
|
|
||||||
trimmed := strings.TrimLeft(parts[0], "-")
|
|
||||||
// If this is not a flag we continue
|
|
||||||
if parts[0] == trimmed {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check the version flag
|
|
||||||
if trimmed == "version" {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -3,25 +3,28 @@ package main
|
|||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"io/ioutil"
|
"io"
|
||||||
|
"log"
|
||||||
"os"
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-container-runtime/modifier"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/test"
|
|
||||||
"github.com/opencontainers/runtime-spec/specs-go"
|
"github.com/opencontainers/runtime-spec/specs-go"
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/modifier"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/test"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
nvidiaRuntime = "nvidia-container-runtime"
|
nvidiaRuntime = "nvidia-container-runtime"
|
||||||
nvidiaHook = "nvidia-container-runtime-hook"
|
nvidiaHook = "nvidia-container-runtime-hook"
|
||||||
bundlePathSuffix = "test/output/bundle/"
|
bundlePathSuffix = "tests/output/bundle/"
|
||||||
specFile = "config.json"
|
specFile = "config.json"
|
||||||
unmodifiedSpecFileSuffix = "test/input/test_spec.json"
|
unmodifiedSpecFileSuffix = "tests/input/test_spec.json"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@@ -41,10 +44,10 @@ func TestMain(m *testing.M) {
|
|||||||
var err error
|
var err error
|
||||||
moduleRoot, err := test.GetModuleRoot()
|
moduleRoot, err := test.GetModuleRoot()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Fatalf("error in test setup: could not get module root: %v", err)
|
log.Fatalf("error in test setup: could not get module root: %v", err)
|
||||||
}
|
}
|
||||||
testBinPath := filepath.Join(moduleRoot, "test", "bin")
|
testBinPath := filepath.Join(moduleRoot, "tests", "bin")
|
||||||
testInputPath := filepath.Join(moduleRoot, "test", "input")
|
testInputPath := filepath.Join(moduleRoot, "tests", "input")
|
||||||
|
|
||||||
// Set the environment variables for the test
|
// Set the environment variables for the test
|
||||||
os.Setenv("PATH", test.PrependToPath(testBinPath, moduleRoot))
|
os.Setenv("PATH", test.PrependToPath(testBinPath, moduleRoot))
|
||||||
@@ -53,11 +56,11 @@ func TestMain(m *testing.M) {
|
|||||||
// Confirm that the environment is configured correctly
|
// Confirm that the environment is configured correctly
|
||||||
runcPath, err := exec.LookPath(runcExecutableName)
|
runcPath, err := exec.LookPath(runcExecutableName)
|
||||||
if err != nil || filepath.Join(testBinPath, runcExecutableName) != runcPath {
|
if err != nil || filepath.Join(testBinPath, runcExecutableName) != runcPath {
|
||||||
logger.Fatalf("error in test setup: mock runc path set incorrectly in TestMain(): %v", err)
|
log.Fatalf("error in test setup: mock runc path set incorrectly in TestMain(): %v", err)
|
||||||
}
|
}
|
||||||
hookPath, err := exec.LookPath(nvidiaHook)
|
hookPath, err := exec.LookPath(nvidiaHook)
|
||||||
if err != nil || filepath.Join(testBinPath, nvidiaHook) != hookPath {
|
if err != nil || filepath.Join(testBinPath, nvidiaHook) != hookPath {
|
||||||
logger.Fatalf("error in test setup: mock hook path set incorrectly in TestMain(): %v", err)
|
log.Fatalf("error in test setup: mock hook path set incorrectly in TestMain(): %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Store the root and binary paths in the test Config
|
// Store the root and binary paths in the test Config
|
||||||
@@ -77,13 +80,14 @@ func TestMain(m *testing.M) {
|
|||||||
|
|
||||||
// case 1) nvidia-container-runtime run --bundle
|
// case 1) nvidia-container-runtime run --bundle
|
||||||
// case 2) nvidia-container-runtime create --bundle
|
// case 2) nvidia-container-runtime create --bundle
|
||||||
// - Confirm the runtime handles bad input correctly
|
// - Confirm the runtime handles bad input correctly
|
||||||
func TestBadInput(t *testing.T) {
|
func TestBadInput(t *testing.T) {
|
||||||
err := cfg.generateNewRuntimeSpec()
|
err := cfg.generateNewRuntimeSpec()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle")
|
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle")
|
||||||
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
||||||
err = cmdCreate.Run()
|
err = cmdCreate.Run()
|
||||||
@@ -91,15 +95,17 @@ func TestBadInput(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// case 1) nvidia-container-runtime run --bundle <bundle-name> <ctr-name>
|
// case 1) nvidia-container-runtime run --bundle <bundle-name> <ctr-name>
|
||||||
// - Confirm the runtime runs with no errors
|
// - Confirm the runtime runs with no errors
|
||||||
|
//
|
||||||
// case 2) nvidia-container-runtime create --bundle <bundle-name> <ctr-name>
|
// case 2) nvidia-container-runtime create --bundle <bundle-name> <ctr-name>
|
||||||
// - Confirm the runtime inserts the NVIDIA prestart hook correctly
|
// - Confirm the runtime inserts the NVIDIA prestart hook correctly
|
||||||
func TestGoodInput(t *testing.T) {
|
func TestGoodInput(t *testing.T) {
|
||||||
err := cfg.generateNewRuntimeSpec()
|
err := cfg.generateNewRuntimeSpec()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("error generating runtime spec: %v", err)
|
t.Fatalf("error generating runtime spec: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
cmdRun := exec.Command(nvidiaRuntime, "run", "--bundle", cfg.bundlePath(), "testcontainer")
|
cmdRun := exec.Command(nvidiaRuntime, "run", "--bundle", cfg.bundlePath(), "testcontainer")
|
||||||
t.Logf("executing: %s\n", strings.Join(cmdRun.Args, " "))
|
t.Logf("executing: %s\n", strings.Join(cmdRun.Args, " "))
|
||||||
output, err := cmdRun.CombinedOutput()
|
output, err := cmdRun.CombinedOutput()
|
||||||
@@ -110,6 +116,7 @@ func TestGoodInput(t *testing.T) {
|
|||||||
require.NoError(t, err, "should be no errors when reading and parsing spec from config.json")
|
require.NoError(t, err, "should be no errors when reading and parsing spec from config.json")
|
||||||
require.Empty(t, spec.Hooks, "there should be no hooks in config.json")
|
require.Empty(t, spec.Hooks, "there should be no hooks in config.json")
|
||||||
|
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle", cfg.bundlePath(), "testcontainer")
|
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle", cfg.bundlePath(), "testcontainer")
|
||||||
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
||||||
err = cmdCreate.Run()
|
err = cmdCreate.Run()
|
||||||
@@ -155,6 +162,7 @@ func TestDuplicateHook(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Test how runtime handles already existing prestart hook in config.json
|
// Test how runtime handles already existing prestart hook in config.json
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle", cfg.bundlePath(), "testcontainer")
|
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle", cfg.bundlePath(), "testcontainer")
|
||||||
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
||||||
output, err := cmdCreate.CombinedOutput()
|
output, err := cmdCreate.CombinedOutput()
|
||||||
@@ -170,7 +178,8 @@ func TestDuplicateHook(t *testing.T) {
|
|||||||
// addNVIDIAHook is a basic wrapper for an addHookModifier that is used for
|
// addNVIDIAHook is a basic wrapper for an addHookModifier that is used for
|
||||||
// testing.
|
// testing.
|
||||||
func addNVIDIAHook(spec *specs.Spec) error {
|
func addNVIDIAHook(spec *specs.Spec) error {
|
||||||
m := modifier.NewStableRuntimeModifier(logger.Logger)
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
m := modifier.NewStableRuntimeModifier(logger, nvidiaHook)
|
||||||
return m.Modify(spec)
|
return m.Modify(spec)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -184,15 +193,16 @@ func (c testConfig) getRuntimeSpec() (specs.Spec, error) {
|
|||||||
}
|
}
|
||||||
defer jsonFile.Close()
|
defer jsonFile.Close()
|
||||||
|
|
||||||
jsonContent, err := ioutil.ReadAll(jsonFile)
|
jsonContent, err := io.ReadAll(jsonFile)
|
||||||
if err != nil {
|
switch {
|
||||||
|
case err != nil:
|
||||||
return spec, err
|
return spec, err
|
||||||
} else if json.Valid(jsonContent) {
|
case json.Valid(jsonContent):
|
||||||
err = json.Unmarshal(jsonContent, &spec)
|
err = json.Unmarshal(jsonContent, &spec)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return spec, err
|
return spec, err
|
||||||
}
|
}
|
||||||
} else {
|
default:
|
||||||
err = json.NewDecoder(bytes.NewReader(jsonContent)).Decode(&spec)
|
err = json.NewDecoder(bytes.NewReader(jsonContent)).Decode(&spec)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return spec, err
|
return spec, err
|
||||||
@@ -222,6 +232,7 @@ func (c testConfig) generateNewRuntimeSpec() error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
cmd := exec.Command("cp", c.unmodifiedSpecFile(), c.specFilePath())
|
cmd := exec.Command("cp", c.unmodifiedSpecFile(), c.specFilePath())
|
||||||
err = cmd.Run()
|
err = cmd.Run()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|||||||
@@ -1,166 +0,0 @@
|
|||||||
/**
|
|
||||||
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
**/
|
|
||||||
|
|
||||||
package modifier
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/image"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/cuda"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/discover"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/discover/csv"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/edits"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/requirements"
|
|
||||||
"github.com/opencontainers/runtime-spec/specs-go"
|
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
)
|
|
||||||
|
|
||||||
// csvMode represents the modifications as performed by the csv runtime mode
|
|
||||||
type csvMode struct {
|
|
||||||
logger *logrus.Logger
|
|
||||||
discoverer discover.Discover
|
|
||||||
}
|
|
||||||
|
|
||||||
const (
|
|
||||||
visibleDevicesEnvvar = "NVIDIA_VISIBLE_DEVICES"
|
|
||||||
visibleDevicesVoid = "void"
|
|
||||||
|
|
||||||
nvidiaRequireJetpackEnvvar = "NVIDIA_REQUIRE_JETPACK"
|
|
||||||
)
|
|
||||||
|
|
||||||
// NewCSVModifier creates a modifier that applies modications to an OCI spec if required by the runtime wrapper.
|
|
||||||
// The modifications are defined by CSV MountSpecs.
|
|
||||||
func NewCSVModifier(logger *logrus.Logger, cfg *config.Config, ociSpec oci.Spec) (oci.SpecModifier, error) {
|
|
||||||
rawSpec, err := ociSpec.Load()
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("failed to load OCI spec: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// In experimental mode, we check whether a modification is required at all and return the lowlevelRuntime directly
|
|
||||||
// if no modification is required.
|
|
||||||
visibleDevices, exists := ociSpec.LookupEnv(visibleDevicesEnvvar)
|
|
||||||
if !exists || visibleDevices == "" || visibleDevices == visibleDevicesVoid {
|
|
||||||
logger.Infof("No modification required: %v=%v (exists=%v)", visibleDevicesEnvvar, visibleDevices, exists)
|
|
||||||
return nil, nil
|
|
||||||
}
|
|
||||||
logger.Infof("Constructing modifier from config: %+v", *cfg)
|
|
||||||
|
|
||||||
config := &discover.Config{
|
|
||||||
Root: cfg.NVIDIAContainerCLIConfig.Root,
|
|
||||||
NVIDIAContainerToolkitCLIExecutablePath: cfg.NVIDIACTKConfig.Path,
|
|
||||||
}
|
|
||||||
|
|
||||||
// TODO: Once the devices have been encapsulated in the CUDA image, this can be moved to before the
|
|
||||||
// visible devices are checked.
|
|
||||||
image, err := image.NewCUDAImageFromSpec(rawSpec)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := checkRequirements(logger, &image); err != nil {
|
|
||||||
return nil, fmt.Errorf("requirements not met: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
csvFiles, err := csv.GetFileList(cfg.NVIDIAContainerRuntimeConfig.Modes.CSV.MountSpecPath)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("failed to get list of CSV files: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
nvidiaRequireJetpack, _ := ociSpec.LookupEnv(nvidiaRequireJetpackEnvvar)
|
|
||||||
if nvidiaRequireJetpack != "csv-mounts=all" {
|
|
||||||
csvFiles = csv.BaseFilesOnly(csvFiles)
|
|
||||||
}
|
|
||||||
|
|
||||||
csvDiscoverer, err := discover.NewFromCSVFiles(logger, csvFiles, config.Root)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("failed to create CSV discoverer: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
ldcacheUpdateHook, err := discover.NewLDCacheUpdateHook(logger, csvDiscoverer, config)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("failed to create ldcach update hook discoverer: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
createSymlinksHook, err := discover.NewCreateSymlinksHook(logger, csvFiles, csvDiscoverer, config)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("failed to create symlink hook discoverer: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
d := discover.NewList(csvDiscoverer, ldcacheUpdateHook, createSymlinksHook)
|
|
||||||
|
|
||||||
return newModifierFromDiscoverer(logger, d)
|
|
||||||
}
|
|
||||||
|
|
||||||
// newModifierFromDiscoverer created a modifier that aplies the discovered
|
|
||||||
// modifications to an OCI spec if require by the runtime wrapper.
|
|
||||||
func newModifierFromDiscoverer(logger *logrus.Logger, d discover.Discover) (oci.SpecModifier, error) {
|
|
||||||
m := csvMode{
|
|
||||||
logger: logger,
|
|
||||||
discoverer: d,
|
|
||||||
}
|
|
||||||
return &m, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// Modify applies the required modifications to the incomming OCI spec. These modifications
|
|
||||||
// are applied in-place.
|
|
||||||
func (m csvMode) Modify(spec *specs.Spec) error {
|
|
||||||
err := nvidiaContainerRuntimeHookRemover{m.logger}.Modify(spec)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to remove existing hooks: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
specEdits, err := edits.NewSpecEdits(m.logger, m.discoverer)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to get required container edits: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return specEdits.Modify(spec)
|
|
||||||
}
|
|
||||||
|
|
||||||
func checkRequirements(logger *logrus.Logger, image *image.CUDA) error {
|
|
||||||
if image.HasDisableRequire() {
|
|
||||||
// TODO: We could print the real value here instead
|
|
||||||
logger.Debugf("NVIDIA_DISABLE_REQUIRE=%v; skipping requirement checks", true)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
imageRequirements, err := image.GetRequirements()
|
|
||||||
if err != nil {
|
|
||||||
// TODO: Should we treat this as a failure, or just issue a warning?
|
|
||||||
return fmt.Errorf("failed to get image requirements: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
r := requirements.New(logger, imageRequirements)
|
|
||||||
|
|
||||||
cudaVersion, err := cuda.Version()
|
|
||||||
if err != nil {
|
|
||||||
logger.Warnf("Failed to get CUDA version: %v", err)
|
|
||||||
} else {
|
|
||||||
r.AddVersionProperty(requirements.CUDA, cudaVersion)
|
|
||||||
}
|
|
||||||
|
|
||||||
compteCapability, err := cuda.ComputeCapability(0)
|
|
||||||
if err != nil {
|
|
||||||
logger.Warnf("Failed to get CUDA Compute Capability: %v", err)
|
|
||||||
} else {
|
|
||||||
r.AddVersionProperty(requirements.ARCH, compteCapability)
|
|
||||||
}
|
|
||||||
|
|
||||||
return r.Assert()
|
|
||||||
}
|
|
||||||
@@ -1,284 +0,0 @@
|
|||||||
/**
|
|
||||||
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
**/
|
|
||||||
|
|
||||||
package modifier
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/discover"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
|
||||||
"github.com/opencontainers/runtime-spec/specs-go"
|
|
||||||
testlog "github.com/sirupsen/logrus/hooks/test"
|
|
||||||
"github.com/stretchr/testify/require"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestNewCSVModifier(t *testing.T) {
|
|
||||||
logger, _ := testlog.NewNullLogger()
|
|
||||||
|
|
||||||
testCases := []struct {
|
|
||||||
description string
|
|
||||||
cfg *config.Config
|
|
||||||
spec oci.Spec
|
|
||||||
visibleDevices string
|
|
||||||
expectedError error
|
|
||||||
expectedNil bool
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
description: "spec load error returns error",
|
|
||||||
spec: &oci.SpecMock{
|
|
||||||
LoadFunc: func() (*specs.Spec, error) {
|
|
||||||
return nil, fmt.Errorf("load failed")
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedError: fmt.Errorf("load failed"),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "visible devices not set returns nil",
|
|
||||||
visibleDevices: "NOT_SET",
|
|
||||||
expectedNil: true,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "visible devices empty returns nil",
|
|
||||||
visibleDevices: "",
|
|
||||||
expectedNil: true,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "visible devices 'void' returns nil",
|
|
||||||
visibleDevices: "void",
|
|
||||||
expectedNil: true,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, tc := range testCases {
|
|
||||||
t.Run(tc.description, func(t *testing.T) {
|
|
||||||
spec := tc.spec
|
|
||||||
if spec == nil {
|
|
||||||
spec = &oci.SpecMock{
|
|
||||||
LookupEnvFunc: func(s string) (string, bool) {
|
|
||||||
if tc.visibleDevices != "NOT_SET" && s == visibleDevicesEnvvar {
|
|
||||||
return tc.visibleDevices, true
|
|
||||||
}
|
|
||||||
return "", false
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
m, err := NewCSVModifier(logger, tc.cfg, spec)
|
|
||||||
if tc.expectedError != nil {
|
|
||||||
require.Error(t, err)
|
|
||||||
} else {
|
|
||||||
require.NoError(t, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if tc.expectedNil || tc.expectedError != nil {
|
|
||||||
require.Nil(t, m)
|
|
||||||
} else {
|
|
||||||
require.NotNil(t, m)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestExperimentalModifier(t *testing.T) {
|
|
||||||
logger, _ := testlog.NewNullLogger()
|
|
||||||
|
|
||||||
testCases := []struct {
|
|
||||||
description string
|
|
||||||
discover *discover.DiscoverMock
|
|
||||||
spec *specs.Spec
|
|
||||||
expectedError error
|
|
||||||
expectedSpec *specs.Spec
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
description: "empty discoverer does not modify spec",
|
|
||||||
discover: &discover.DiscoverMock{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "failed hooks discoverer returns error",
|
|
||||||
discover: &discover.DiscoverMock{
|
|
||||||
HooksFunc: func() ([]discover.Hook, error) {
|
|
||||||
return nil, fmt.Errorf("discover.Hooks error")
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedError: fmt.Errorf("discover.Hooks error"),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "discovered hooks are injected into spec",
|
|
||||||
spec: &specs.Spec{},
|
|
||||||
discover: &discover.DiscoverMock{
|
|
||||||
HooksFunc: func() ([]discover.Hook, error) {
|
|
||||||
hooks := []discover.Hook{
|
|
||||||
{
|
|
||||||
Lifecycle: "prestart",
|
|
||||||
Path: "/hook/a",
|
|
||||||
Args: []string{"/hook/a", "arga"},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Lifecycle: "createContainer",
|
|
||||||
Path: "/hook/b",
|
|
||||||
Args: []string{"/hook/b", "argb"},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
return hooks, nil
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedSpec: &specs.Spec{
|
|
||||||
Hooks: &specs.Hooks{
|
|
||||||
Prestart: []specs.Hook{
|
|
||||||
{
|
|
||||||
Path: "/hook/a",
|
|
||||||
Args: []string{"/hook/a", "arga"},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
CreateContainer: []specs.Hook{
|
|
||||||
{
|
|
||||||
Path: "/hook/b",
|
|
||||||
Args: []string{"/hook/b", "argb"},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "existing hooks are maintained",
|
|
||||||
spec: &specs.Spec{
|
|
||||||
Hooks: &specs.Hooks{
|
|
||||||
Prestart: []specs.Hook{
|
|
||||||
{
|
|
||||||
Path: "/hook/a",
|
|
||||||
Args: []string{"/hook/a", "arga"},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
discover: &discover.DiscoverMock{
|
|
||||||
HooksFunc: func() ([]discover.Hook, error) {
|
|
||||||
hooks := []discover.Hook{
|
|
||||||
{
|
|
||||||
Lifecycle: "prestart",
|
|
||||||
Path: "/hook/b",
|
|
||||||
Args: []string{"/hook/b", "argb"},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
return hooks, nil
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedSpec: &specs.Spec{
|
|
||||||
Hooks: &specs.Hooks{
|
|
||||||
Prestart: []specs.Hook{
|
|
||||||
{
|
|
||||||
Path: "/hook/a",
|
|
||||||
Args: []string{"/hook/a", "arga"},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Path: "/hook/b",
|
|
||||||
Args: []string{"/hook/b", "argb"},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "modification removes existing nvidia-container-runtime-hook",
|
|
||||||
spec: &specs.Spec{
|
|
||||||
Hooks: &specs.Hooks{
|
|
||||||
Prestart: []specs.Hook{
|
|
||||||
{
|
|
||||||
Path: "/path/to/nvidia-container-runtime-hook",
|
|
||||||
Args: []string{"/path/to/nvidia-container-runtime-hook", "prestart"},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
discover: &discover.DiscoverMock{
|
|
||||||
HooksFunc: func() ([]discover.Hook, error) {
|
|
||||||
hooks := []discover.Hook{
|
|
||||||
{
|
|
||||||
Lifecycle: "prestart",
|
|
||||||
Path: "/hook/b",
|
|
||||||
Args: []string{"/hook/b", "argb"},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
return hooks, nil
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedSpec: &specs.Spec{
|
|
||||||
Hooks: &specs.Hooks{
|
|
||||||
Prestart: []specs.Hook{
|
|
||||||
{
|
|
||||||
Path: "/hook/b",
|
|
||||||
Args: []string{"/hook/b", "argb"},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "modification removes existing nvidia-container-toolkit",
|
|
||||||
spec: &specs.Spec{
|
|
||||||
Hooks: &specs.Hooks{
|
|
||||||
Prestart: []specs.Hook{
|
|
||||||
{
|
|
||||||
Path: "/path/to/nvidia-container-toolkit",
|
|
||||||
Args: []string{"/path/to/nvidia-container-toolkit", "prestart"},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
discover: &discover.DiscoverMock{
|
|
||||||
HooksFunc: func() ([]discover.Hook, error) {
|
|
||||||
hooks := []discover.Hook{
|
|
||||||
{
|
|
||||||
Lifecycle: "prestart",
|
|
||||||
Path: "/hook/b",
|
|
||||||
Args: []string{"/hook/b", "argb"},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
return hooks, nil
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedSpec: &specs.Spec{
|
|
||||||
Hooks: &specs.Hooks{
|
|
||||||
Prestart: []specs.Hook{
|
|
||||||
{
|
|
||||||
Path: "/hook/b",
|
|
||||||
Args: []string{"/hook/b", "argb"},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, tc := range testCases {
|
|
||||||
t.Run(tc.description, func(t *testing.T) {
|
|
||||||
m, err := newModifierFromDiscoverer(logger, tc.discover)
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
err = m.Modify(tc.spec)
|
|
||||||
if tc.expectedError != nil {
|
|
||||||
require.Error(t, err)
|
|
||||||
} else {
|
|
||||||
require.NoError(t, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
require.EqualValues(t, tc.expectedSpec, tc.spec)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,73 +0,0 @@
|
|||||||
/*
|
|
||||||
# Copyright (c) 2021-2022, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package main
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-container-runtime/modifier"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/runtime"
|
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
)
|
|
||||||
|
|
||||||
// newNVIDIAContainerRuntime is a factory method that constructs a runtime based on the selected configuration and specified logger
|
|
||||||
func newNVIDIAContainerRuntime(logger *logrus.Logger, cfg *config.Config, argv []string) (oci.Runtime, error) {
|
|
||||||
lowLevelRuntime, err := oci.NewLowLevelRuntime(logger, cfg.NVIDIAContainerRuntimeConfig.Runtimes)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("error constructing low-level runtime: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if !oci.HasCreateSubcommand(argv) {
|
|
||||||
logger.Debugf("Skipping modifier for non-create subcommand")
|
|
||||||
return lowLevelRuntime, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
ociSpec, err := oci.NewSpec(logger, argv)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("error constructing OCI specification: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
specModifier, err := newSpecModifier(logger, cfg, ociSpec, argv)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("failed to construct OCI spec modifier: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
// Create the wrapping runtime with the specified modifier
|
|
||||||
r := runtime.NewModifyingRuntimeWrapper(
|
|
||||||
logger,
|
|
||||||
lowLevelRuntime,
|
|
||||||
ociSpec,
|
|
||||||
specModifier,
|
|
||||||
)
|
|
||||||
|
|
||||||
return r, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// newSpecModifier is a factory method that creates constructs an OCI spec modifer based on the provided config.
|
|
||||||
func newSpecModifier(logger *logrus.Logger, cfg *config.Config, ociSpec oci.Spec, argv []string) (oci.SpecModifier, error) {
|
|
||||||
switch info.ResolveAutoMode(logger, cfg.NVIDIAContainerRuntimeConfig.Mode) {
|
|
||||||
case "legacy":
|
|
||||||
return modifier.NewStableRuntimeModifier(logger), nil
|
|
||||||
case "csv":
|
|
||||||
return modifier.NewCSVModifier(logger, cfg, ociSpec)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil, fmt.Errorf("invalid runtime mode: %v", cfg.NVIDIAContainerRuntimeConfig.Mode)
|
|
||||||
}
|
|
||||||
@@ -1,129 +0,0 @@
|
|||||||
/*
|
|
||||||
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package main
|
|
||||||
|
|
||||||
import (
|
|
||||||
"encoding/json"
|
|
||||||
"os"
|
|
||||||
"path/filepath"
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
|
||||||
"github.com/opencontainers/runtime-spec/specs-go"
|
|
||||||
testlog "github.com/sirupsen/logrus/hooks/test"
|
|
||||||
"github.com/stretchr/testify/require"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestFactoryMethod(t *testing.T) {
|
|
||||||
logger, _ := testlog.NewNullLogger()
|
|
||||||
|
|
||||||
testCases := []struct {
|
|
||||||
description string
|
|
||||||
cfg *config.Config
|
|
||||||
spec *specs.Spec
|
|
||||||
expectedError bool
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
description: "empty config raises error",
|
|
||||||
cfg: &config.Config{
|
|
||||||
NVIDIAContainerRuntimeConfig: config.RuntimeConfig{},
|
|
||||||
},
|
|
||||||
expectedError: true,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "config with runtime raises no error",
|
|
||||||
cfg: &config.Config{
|
|
||||||
NVIDIAContainerRuntimeConfig: config.RuntimeConfig{
|
|
||||||
Runtimes: []string{"runc"},
|
|
||||||
Mode: "legacy",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "csv mode is supported",
|
|
||||||
cfg: &config.Config{
|
|
||||||
NVIDIAContainerRuntimeConfig: config.RuntimeConfig{
|
|
||||||
Runtimes: []string{"runc"},
|
|
||||||
Mode: "csv",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
spec: &specs.Spec{
|
|
||||||
Process: &specs.Process{
|
|
||||||
Env: []string{
|
|
||||||
"NVIDIA_VISIBLE_DEVICES=all",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "non-legacy discover mode raises error",
|
|
||||||
cfg: &config.Config{
|
|
||||||
NVIDIAContainerRuntimeConfig: config.RuntimeConfig{
|
|
||||||
Runtimes: []string{"runc"},
|
|
||||||
Mode: "non-legacy",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedError: true,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "legacy discover mode returns modifier",
|
|
||||||
cfg: &config.Config{
|
|
||||||
NVIDIAContainerRuntimeConfig: config.RuntimeConfig{
|
|
||||||
Runtimes: []string{"runc"},
|
|
||||||
Mode: "legacy",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "csv discover mode returns modifier",
|
|
||||||
cfg: &config.Config{
|
|
||||||
NVIDIAContainerRuntimeConfig: config.RuntimeConfig{
|
|
||||||
Runtimes: []string{"runc"},
|
|
||||||
Mode: "csv",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "empty mode raises error",
|
|
||||||
cfg: &config.Config{
|
|
||||||
NVIDIAContainerRuntimeConfig: config.RuntimeConfig{
|
|
||||||
Runtimes: []string{"runc"},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedError: true,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, tc := range testCases {
|
|
||||||
t.Run(tc.description, func(t *testing.T) {
|
|
||||||
bundleDir := t.TempDir()
|
|
||||||
|
|
||||||
specFile, err := os.Create(filepath.Join(bundleDir, "config.json"))
|
|
||||||
require.NoError(t, err)
|
|
||||||
require.NoError(t, json.NewEncoder(specFile).Encode(tc.spec))
|
|
||||||
|
|
||||||
argv := []string{"--bundle", bundleDir, "create"}
|
|
||||||
|
|
||||||
_, err = newNVIDIAContainerRuntime(logger, tc.cfg, argv)
|
|
||||||
if tc.expectedError {
|
|
||||||
require.Error(t, err)
|
|
||||||
} else {
|
|
||||||
require.NoError(t, err)
|
|
||||||
}
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,83 +0,0 @@
|
|||||||
package main
|
|
||||||
|
|
||||||
import (
|
|
||||||
"log"
|
|
||||||
"strings"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
allDriverCapabilities = DriverCapabilities("compute,compat32,graphics,utility,video,display,ngx")
|
|
||||||
defaultDriverCapabilities = DriverCapabilities("utility,compute")
|
|
||||||
|
|
||||||
none = DriverCapabilities("")
|
|
||||||
all = DriverCapabilities("all")
|
|
||||||
)
|
|
||||||
|
|
||||||
func capabilityToCLI(cap string) string {
|
|
||||||
switch cap {
|
|
||||||
case "compute":
|
|
||||||
return "--compute"
|
|
||||||
case "compat32":
|
|
||||||
return "--compat32"
|
|
||||||
case "graphics":
|
|
||||||
return "--graphics"
|
|
||||||
case "utility":
|
|
||||||
return "--utility"
|
|
||||||
case "video":
|
|
||||||
return "--video"
|
|
||||||
case "display":
|
|
||||||
return "--display"
|
|
||||||
case "ngx":
|
|
||||||
return "--ngx"
|
|
||||||
default:
|
|
||||||
log.Panicln("unknown driver capability:", cap)
|
|
||||||
}
|
|
||||||
return ""
|
|
||||||
}
|
|
||||||
|
|
||||||
// DriverCapabilities is used to process the NVIDIA_DRIVER_CAPABILITIES environment
|
|
||||||
// variable. Operations include default values, filtering, and handling meta values such as "all"
|
|
||||||
type DriverCapabilities string
|
|
||||||
|
|
||||||
// Intersection returns intersection between two sets of capabilities.
|
|
||||||
func (d DriverCapabilities) Intersection(capabilities DriverCapabilities) DriverCapabilities {
|
|
||||||
if capabilities == all {
|
|
||||||
return d
|
|
||||||
}
|
|
||||||
if d == all {
|
|
||||||
return capabilities
|
|
||||||
}
|
|
||||||
|
|
||||||
lookup := make(map[string]bool)
|
|
||||||
for _, c := range d.list() {
|
|
||||||
lookup[c] = true
|
|
||||||
}
|
|
||||||
var found []string
|
|
||||||
for _, c := range capabilities.list() {
|
|
||||||
if lookup[c] {
|
|
||||||
found = append(found, c)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
intersection := DriverCapabilities(strings.Join(found, ","))
|
|
||||||
return intersection
|
|
||||||
}
|
|
||||||
|
|
||||||
// String returns the string representation of the driver capabilities
|
|
||||||
func (d DriverCapabilities) String() string {
|
|
||||||
return string(d)
|
|
||||||
}
|
|
||||||
|
|
||||||
// list returns the driver capabilities as a list
|
|
||||||
func (d DriverCapabilities) list() []string {
|
|
||||||
var caps []string
|
|
||||||
for _, c := range strings.Split(string(d), ",") {
|
|
||||||
trimmed := strings.TrimSpace(c)
|
|
||||||
if len(trimmed) == 0 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
caps = append(caps, trimmed)
|
|
||||||
}
|
|
||||||
|
|
||||||
return caps
|
|
||||||
}
|
|
||||||
@@ -1,134 +0,0 @@
|
|||||||
/**
|
|
||||||
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
**/
|
|
||||||
|
|
||||||
package main
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"github.com/stretchr/testify/require"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestDriverCapabilitiesIntersection(t *testing.T) {
|
|
||||||
testCases := []struct {
|
|
||||||
capabilities DriverCapabilities
|
|
||||||
supportedCapabilities DriverCapabilities
|
|
||||||
expectedIntersection DriverCapabilities
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
capabilities: none,
|
|
||||||
supportedCapabilities: none,
|
|
||||||
expectedIntersection: none,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: all,
|
|
||||||
supportedCapabilities: none,
|
|
||||||
expectedIntersection: none,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: all,
|
|
||||||
supportedCapabilities: allDriverCapabilities,
|
|
||||||
expectedIntersection: allDriverCapabilities,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: allDriverCapabilities,
|
|
||||||
supportedCapabilities: all,
|
|
||||||
expectedIntersection: allDriverCapabilities,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: none,
|
|
||||||
supportedCapabilities: all,
|
|
||||||
expectedIntersection: none,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: none,
|
|
||||||
supportedCapabilities: DriverCapabilities("cap1"),
|
|
||||||
expectedIntersection: none,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("cap0,cap1"),
|
|
||||||
supportedCapabilities: DriverCapabilities("cap1,cap0"),
|
|
||||||
expectedIntersection: DriverCapabilities("cap0,cap1"),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: defaultDriverCapabilities,
|
|
||||||
supportedCapabilities: allDriverCapabilities,
|
|
||||||
expectedIntersection: defaultDriverCapabilities,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("compute,compat32,graphics,utility,video,display"),
|
|
||||||
supportedCapabilities: DriverCapabilities("compute,compat32,graphics,utility,video,display,ngx"),
|
|
||||||
expectedIntersection: DriverCapabilities("compute,compat32,graphics,utility,video,display"),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("cap1"),
|
|
||||||
supportedCapabilities: none,
|
|
||||||
expectedIntersection: none,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("compute,compat32,graphics,utility,video,display,ngx"),
|
|
||||||
supportedCapabilities: DriverCapabilities("compute,compat32,graphics,utility,video,display"),
|
|
||||||
expectedIntersection: DriverCapabilities("compute,compat32,graphics,utility,video,display"),
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for i, tc := range testCases {
|
|
||||||
t.Run(fmt.Sprintf("test case %d", i), func(t *testing.T) {
|
|
||||||
intersection := tc.supportedCapabilities.Intersection(tc.capabilities)
|
|
||||||
require.EqualValues(t, tc.expectedIntersection, intersection)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestDriverCapabilitiesList(t *testing.T) {
|
|
||||||
testCases := []struct {
|
|
||||||
capabilities DriverCapabilities
|
|
||||||
expected []string
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities(""),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities(" "),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities(","),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities(",cap"),
|
|
||||||
expected: []string{"cap"},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("cap,"),
|
|
||||||
expected: []string{"cap"},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("cap0,,cap1"),
|
|
||||||
expected: []string{"cap0", "cap1"},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("cap1,cap0,cap3"),
|
|
||||||
expected: []string{"cap1", "cap0", "cap3"},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for i, tc := range testCases {
|
|
||||||
t.Run(fmt.Sprintf("test case %d", i), func(t *testing.T) {
|
|
||||||
require.EqualValues(t, tc.expected, tc.capabilities.list())
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,989 +0,0 @@
|
|||||||
package main
|
|
||||||
|
|
||||||
import (
|
|
||||||
"path/filepath"
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"github.com/stretchr/testify/require"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestGetNvidiaConfig(t *testing.T) {
|
|
||||||
var tests = []struct {
|
|
||||||
description string
|
|
||||||
env map[string]string
|
|
||||||
privileged bool
|
|
||||||
hookConfig *HookConfig
|
|
||||||
expectedConfig *nvidiaConfig
|
|
||||||
expectedPanic bool
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
description: "No environment, unprivileged",
|
|
||||||
env: map[string]string{},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "No environment, privileged",
|
|
||||||
env: map[string]string{},
|
|
||||||
privileged: true,
|
|
||||||
expectedConfig: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Legacy image, no devices, no capabilities, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "all",
|
|
||||||
DriverCapabilities: allDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Legacy image, devices 'all', no capabilities, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
envNVVisibleDevices: "all",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "all",
|
|
||||||
DriverCapabilities: allDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Legacy image, devices 'empty', no capabilities, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
envNVVisibleDevices: "",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Legacy image, devices 'void', no capabilities, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
envNVVisibleDevices: "",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Legacy image, devices 'none', no capabilities, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
envNVVisibleDevices: "none",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "",
|
|
||||||
DriverCapabilities: allDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Legacy image, devices set, no capabilities, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: allDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Legacy image, devices set, capabilities 'empty', no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
envNVDriverCapabilities: "",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Legacy image, devices set, capabilities 'all', no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
envNVDriverCapabilities: "all",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: allDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Legacy image, devices set, capabilities set, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
envNVDriverCapabilities: "video,display",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: "video,display",
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Legacy image, devices set, capabilities set, requirements set",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
envNVDriverCapabilities: "video,display",
|
|
||||||
envNVRequirePrefix + "REQ0": "req0=true",
|
|
||||||
envNVRequirePrefix + "REQ1": "req1=false",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: "video,display",
|
|
||||||
Requirements: []string{"cuda>=9.0", "req0=true", "req1=false"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Legacy image, devices set, capabilities set, requirements set, disable requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
envNVDriverCapabilities: "video,display",
|
|
||||||
envNVRequirePrefix + "REQ0": "req0=true",
|
|
||||||
envNVRequirePrefix + "REQ1": "req1=false",
|
|
||||||
envNVDisableRequire: "true",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: "video,display",
|
|
||||||
Requirements: []string{"cuda>=9.0", "req0=true", "req1=false"},
|
|
||||||
DisableRequire: true,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, no devices, no capabilities, no requirements, no envCUDAVersion",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, no devices, no capabilities, no requirement, envCUDAVersion set",
|
|
||||||
env: map[string]string{
|
|
||||||
envCUDAVersion: "9.0",
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices 'all', no capabilities, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "all",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "all",
|
|
||||||
DriverCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices 'empty', no capabilities, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices 'void', no capabilities, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices 'none', no capabilities, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "none",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "",
|
|
||||||
DriverCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices set, no capabilities, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices set, capabilities 'empty', no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
envNVDriverCapabilities: "",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices set, capabilities 'all', no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
envNVDriverCapabilities: "all",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: allDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices set, capabilities set, no requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
envNVDriverCapabilities: "video,display",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: "video,display",
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices set, capabilities set, requirements set",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
envNVDriverCapabilities: "video,display",
|
|
||||||
envNVRequirePrefix + "REQ0": "req0=true",
|
|
||||||
envNVRequirePrefix + "REQ1": "req1=false",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: "video,display",
|
|
||||||
Requirements: []string{"cuda>=9.0", "req0=true", "req1=false"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices set, capabilities set, requirements set, disable requirements",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "gpu0,gpu1",
|
|
||||||
envNVDriverCapabilities: "video,display",
|
|
||||||
envNVRequirePrefix + "REQ0": "req0=true",
|
|
||||||
envNVRequirePrefix + "REQ1": "req1=false",
|
|
||||||
envNVDisableRequire: "true",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "gpu0,gpu1",
|
|
||||||
DriverCapabilities: "video,display",
|
|
||||||
Requirements: []string{"cuda>=9.0", "req0=true", "req1=false"},
|
|
||||||
DisableRequire: true,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "No cuda envs, devices 'all'",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: "all",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "all",
|
|
||||||
DriverCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
Requirements: []string{},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices 'all', migConfig set, privileged",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "all",
|
|
||||||
envNVMigConfigDevices: "mig0,mig1",
|
|
||||||
},
|
|
||||||
privileged: true,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "all",
|
|
||||||
MigConfigDevices: "mig0,mig1",
|
|
||||||
DriverCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices 'all', migConfig set, unprivileged",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "all",
|
|
||||||
envNVMigConfigDevices: "mig0,mig1",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedPanic: true,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices 'all', migMonitor set, privileged",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "all",
|
|
||||||
envNVMigMonitorDevices: "mig0,mig1",
|
|
||||||
},
|
|
||||||
privileged: true,
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "all",
|
|
||||||
MigMonitorDevices: "mig0,mig1",
|
|
||||||
DriverCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
Requirements: []string{"cuda>=9.0"},
|
|
||||||
DisableRequire: false,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Modern image, devices 'all', migMonitor set, unprivileged",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVRequireCUDA: "cuda>=9.0",
|
|
||||||
envNVVisibleDevices: "all",
|
|
||||||
envNVMigMonitorDevices: "mig0,mig1",
|
|
||||||
},
|
|
||||||
privileged: false,
|
|
||||||
expectedPanic: true,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Hook config set as driver-capabilities-all",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: "all",
|
|
||||||
envNVDriverCapabilities: "all",
|
|
||||||
},
|
|
||||||
privileged: true,
|
|
||||||
hookConfig: &HookConfig{
|
|
||||||
SupportedDriverCapabilities: "video,display",
|
|
||||||
},
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "all",
|
|
||||||
DriverCapabilities: "video,display",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Hook config set, envvar sets driver-capabilities",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: "all",
|
|
||||||
envNVDriverCapabilities: "video,display",
|
|
||||||
},
|
|
||||||
privileged: true,
|
|
||||||
hookConfig: &HookConfig{
|
|
||||||
SupportedDriverCapabilities: "video,display,compute,utility",
|
|
||||||
},
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "all",
|
|
||||||
DriverCapabilities: "video,display",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Hook config set, envvar unset sets default driver-capabilities",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: "all",
|
|
||||||
},
|
|
||||||
privileged: true,
|
|
||||||
hookConfig: &HookConfig{
|
|
||||||
SupportedDriverCapabilities: "video,display,utility,compute",
|
|
||||||
},
|
|
||||||
expectedConfig: &nvidiaConfig{
|
|
||||||
Devices: "all",
|
|
||||||
DriverCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
for _, tc := range tests {
|
|
||||||
t.Run(tc.description, func(t *testing.T) {
|
|
||||||
// Wrap the call to getNvidiaConfig() in a closure.
|
|
||||||
var config *nvidiaConfig
|
|
||||||
getConfig := func() {
|
|
||||||
hookConfig := tc.hookConfig
|
|
||||||
if hookConfig == nil {
|
|
||||||
defaultConfig := getDefaultHookConfig()
|
|
||||||
hookConfig = &defaultConfig
|
|
||||||
}
|
|
||||||
config = getNvidiaConfig(hookConfig, tc.env, nil, tc.privileged)
|
|
||||||
}
|
|
||||||
|
|
||||||
// For any tests that are expected to panic, make sure they do.
|
|
||||||
if tc.expectedPanic {
|
|
||||||
require.Panics(t, getConfig)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
// For all other tests, just grab the config
|
|
||||||
getConfig()
|
|
||||||
|
|
||||||
// And start comparing the test results to the expected results.
|
|
||||||
if tc.expectedConfig == nil {
|
|
||||||
require.Nil(t, config, tc.description)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
require.NotNil(t, config, tc.description)
|
|
||||||
|
|
||||||
require.Equal(t, tc.expectedConfig.Devices, config.Devices)
|
|
||||||
require.Equal(t, tc.expectedConfig.MigConfigDevices, config.MigConfigDevices)
|
|
||||||
require.Equal(t, tc.expectedConfig.MigMonitorDevices, config.MigMonitorDevices)
|
|
||||||
require.Equal(t, tc.expectedConfig.DriverCapabilities, config.DriverCapabilities)
|
|
||||||
|
|
||||||
require.ElementsMatch(t, tc.expectedConfig.Requirements, config.Requirements)
|
|
||||||
require.Equal(t, tc.expectedConfig.DisableRequire, config.DisableRequire)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestGetDevicesFromMounts(t *testing.T) {
|
|
||||||
var tests = []struct {
|
|
||||||
description string
|
|
||||||
mounts []Mount
|
|
||||||
expectedDevices *string
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
description: "No mounts",
|
|
||||||
mounts: nil,
|
|
||||||
expectedDevices: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Host path is not /dev/null",
|
|
||||||
mounts: []Mount{
|
|
||||||
{
|
|
||||||
Source: "/not/dev/null",
|
|
||||||
Destination: filepath.Join(deviceListAsVolumeMountsRoot, "GPU0"),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedDevices: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Container path is not prefixed by 'root'",
|
|
||||||
mounts: []Mount{
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: filepath.Join("/other/prefix", "GPU0"),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedDevices: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Container path is only 'root'",
|
|
||||||
mounts: []Mount{
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: deviceListAsVolumeMountsRoot,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedDevices: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Discover 2 devices",
|
|
||||||
mounts: []Mount{
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: filepath.Join(deviceListAsVolumeMountsRoot, "GPU0"),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: filepath.Join(deviceListAsVolumeMountsRoot, "GPU1"),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedDevices: &[]string{"GPU0,GPU1"}[0],
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Discover 2 devices with slashes in the name",
|
|
||||||
mounts: []Mount{
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: filepath.Join(deviceListAsVolumeMountsRoot, "GPU0-MIG0/0/1"),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: filepath.Join(deviceListAsVolumeMountsRoot, "GPU1-MIG0/0/1"),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedDevices: &[]string{"GPU0-MIG0/0/1,GPU1-MIG0/0/1"}[0],
|
|
||||||
},
|
|
||||||
}
|
|
||||||
for _, tc := range tests {
|
|
||||||
t.Run(tc.description, func(t *testing.T) {
|
|
||||||
devices := getDevicesFromMounts(tc.mounts)
|
|
||||||
require.Equal(t, tc.expectedDevices, devices)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestDeviceListSourcePriority(t *testing.T) {
|
|
||||||
var tests = []struct {
|
|
||||||
description string
|
|
||||||
mountDevices []Mount
|
|
||||||
envvarDevices string
|
|
||||||
privileged bool
|
|
||||||
acceptUnprivileged bool
|
|
||||||
acceptMounts bool
|
|
||||||
expectedDevices *string
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
description: "Mount devices, unprivileged, no accept unprivileged",
|
|
||||||
mountDevices: []Mount{
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: filepath.Join(deviceListAsVolumeMountsRoot, "GPU0"),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: filepath.Join(deviceListAsVolumeMountsRoot, "GPU1"),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
envvarDevices: "GPU2,GPU3",
|
|
||||||
privileged: false,
|
|
||||||
acceptUnprivileged: false,
|
|
||||||
acceptMounts: true,
|
|
||||||
expectedDevices: &[]string{"GPU0,GPU1"}[0],
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "No mount devices, unprivileged, no accept unprivileged",
|
|
||||||
mountDevices: nil,
|
|
||||||
envvarDevices: "GPU0,GPU1",
|
|
||||||
privileged: false,
|
|
||||||
acceptUnprivileged: false,
|
|
||||||
acceptMounts: true,
|
|
||||||
expectedDevices: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "No mount devices, privileged, no accept unprivileged",
|
|
||||||
mountDevices: nil,
|
|
||||||
envvarDevices: "GPU0,GPU1",
|
|
||||||
privileged: true,
|
|
||||||
acceptUnprivileged: false,
|
|
||||||
acceptMounts: true,
|
|
||||||
expectedDevices: &[]string{"GPU0,GPU1"}[0],
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "No mount devices, unprivileged, accept unprivileged",
|
|
||||||
mountDevices: nil,
|
|
||||||
envvarDevices: "GPU0,GPU1",
|
|
||||||
privileged: false,
|
|
||||||
acceptUnprivileged: true,
|
|
||||||
acceptMounts: true,
|
|
||||||
expectedDevices: &[]string{"GPU0,GPU1"}[0],
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Mount devices, unprivileged, accept unprivileged, no accept mounts",
|
|
||||||
mountDevices: []Mount{
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: filepath.Join(deviceListAsVolumeMountsRoot, "GPU0"),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: filepath.Join(deviceListAsVolumeMountsRoot, "GPU1"),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
envvarDevices: "GPU2,GPU3",
|
|
||||||
privileged: false,
|
|
||||||
acceptUnprivileged: true,
|
|
||||||
acceptMounts: false,
|
|
||||||
expectedDevices: &[]string{"GPU2,GPU3"}[0],
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Mount devices, unprivileged, no accept unprivileged, no accept mounts",
|
|
||||||
mountDevices: []Mount{
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: filepath.Join(deviceListAsVolumeMountsRoot, "GPU0"),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
Source: "/dev/null",
|
|
||||||
Destination: filepath.Join(deviceListAsVolumeMountsRoot, "GPU1"),
|
|
||||||
},
|
|
||||||
},
|
|
||||||
envvarDevices: "GPU2,GPU3",
|
|
||||||
privileged: false,
|
|
||||||
acceptUnprivileged: false,
|
|
||||||
acceptMounts: false,
|
|
||||||
expectedDevices: nil,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
for _, tc := range tests {
|
|
||||||
t.Run(tc.description, func(t *testing.T) {
|
|
||||||
// Wrap the call to getDevices() in a closure.
|
|
||||||
var devices *string
|
|
||||||
getDevices := func() {
|
|
||||||
env := map[string]string{
|
|
||||||
envNVVisibleDevices: tc.envvarDevices,
|
|
||||||
}
|
|
||||||
hookConfig := getDefaultHookConfig()
|
|
||||||
hookConfig.AcceptEnvvarUnprivileged = tc.acceptUnprivileged
|
|
||||||
hookConfig.AcceptDeviceListAsVolumeMounts = tc.acceptMounts
|
|
||||||
devices = getDevices(&hookConfig, env, tc.mountDevices, tc.privileged, false)
|
|
||||||
}
|
|
||||||
|
|
||||||
// For all other tests, just grab the devices and check the results
|
|
||||||
getDevices()
|
|
||||||
|
|
||||||
require.Equal(t, tc.expectedDevices, devices)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestGetDevicesFromEnvvar(t *testing.T) {
|
|
||||||
all := "all"
|
|
||||||
empty := ""
|
|
||||||
envDockerResourceGPUs := "DOCKER_RESOURCE_GPUS"
|
|
||||||
gpuID := "GPU-12345"
|
|
||||||
anotherGPUID := "GPU-67890"
|
|
||||||
|
|
||||||
var tests = []struct {
|
|
||||||
description string
|
|
||||||
envSwarmGPU *string
|
|
||||||
env map[string]string
|
|
||||||
legacyImage bool
|
|
||||||
expectedDevices *string
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
description: "empty env returns nil for non-legacy image",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "blank NVIDIA_VISIBLE_DEVICES returns nil for non-legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: "",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "'void' NVIDIA_VISIBLE_DEVICES returns nil for non-legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: "void",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "'none' NVIDIA_VISIBLE_DEVICES returns empty for non-legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: "none",
|
|
||||||
},
|
|
||||||
expectedDevices: &empty,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "NVIDIA_VISIBLE_DEVICES set returns value for non-legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: gpuID,
|
|
||||||
},
|
|
||||||
expectedDevices: &gpuID,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "NVIDIA_VISIBLE_DEVICES set returns value for legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: gpuID,
|
|
||||||
},
|
|
||||||
legacyImage: true,
|
|
||||||
expectedDevices: &gpuID,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "empty env returns all for legacy image",
|
|
||||||
legacyImage: true,
|
|
||||||
expectedDevices: &all,
|
|
||||||
},
|
|
||||||
// Add the `DOCKER_RESOURCE_GPUS` envvar and ensure that this is ignored when
|
|
||||||
// not enabled
|
|
||||||
{
|
|
||||||
description: "missing NVIDIA_VISIBLE_DEVICES returns nil for non-legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envDockerResourceGPUs: anotherGPUID,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "blank NVIDIA_VISIBLE_DEVICES returns nil for non-legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: "",
|
|
||||||
envDockerResourceGPUs: anotherGPUID,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "'void' NVIDIA_VISIBLE_DEVICES returns nil for non-legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: "void",
|
|
||||||
envDockerResourceGPUs: anotherGPUID,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "'none' NVIDIA_VISIBLE_DEVICES returns empty for non-legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: "none",
|
|
||||||
envDockerResourceGPUs: anotherGPUID,
|
|
||||||
},
|
|
||||||
expectedDevices: &empty,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "NVIDIA_VISIBLE_DEVICES set returns value for non-legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: gpuID,
|
|
||||||
envDockerResourceGPUs: anotherGPUID,
|
|
||||||
},
|
|
||||||
expectedDevices: &gpuID,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "NVIDIA_VISIBLE_DEVICES set returns value for legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: gpuID,
|
|
||||||
envDockerResourceGPUs: anotherGPUID,
|
|
||||||
},
|
|
||||||
legacyImage: true,
|
|
||||||
expectedDevices: &gpuID,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "empty env returns all for legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envDockerResourceGPUs: anotherGPUID,
|
|
||||||
},
|
|
||||||
legacyImage: true,
|
|
||||||
expectedDevices: &all,
|
|
||||||
},
|
|
||||||
// Add the `DOCKER_RESOURCE_GPUS` envvar and ensure that this is selected when
|
|
||||||
// enabled
|
|
||||||
{
|
|
||||||
description: "empty env returns nil for non-legacy image",
|
|
||||||
envSwarmGPU: &envDockerResourceGPUs,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "blank DOCKER_RESOURCE_GPUS returns nil for non-legacy image",
|
|
||||||
envSwarmGPU: &envDockerResourceGPUs,
|
|
||||||
env: map[string]string{
|
|
||||||
envDockerResourceGPUs: "",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "'void' DOCKER_RESOURCE_GPUS returns nil for non-legacy image",
|
|
||||||
envSwarmGPU: &envDockerResourceGPUs,
|
|
||||||
env: map[string]string{
|
|
||||||
envDockerResourceGPUs: "void",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "'none' DOCKER_RESOURCE_GPUS returns empty for non-legacy image",
|
|
||||||
envSwarmGPU: &envDockerResourceGPUs,
|
|
||||||
env: map[string]string{
|
|
||||||
envDockerResourceGPUs: "none",
|
|
||||||
},
|
|
||||||
expectedDevices: &empty,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "DOCKER_RESOURCE_GPUS set returns value for non-legacy image",
|
|
||||||
envSwarmGPU: &envDockerResourceGPUs,
|
|
||||||
env: map[string]string{
|
|
||||||
envDockerResourceGPUs: gpuID,
|
|
||||||
},
|
|
||||||
expectedDevices: &gpuID,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "DOCKER_RESOURCE_GPUS set returns value for legacy image",
|
|
||||||
envSwarmGPU: &envDockerResourceGPUs,
|
|
||||||
env: map[string]string{
|
|
||||||
envDockerResourceGPUs: gpuID,
|
|
||||||
},
|
|
||||||
legacyImage: true,
|
|
||||||
expectedDevices: &gpuID,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "DOCKER_RESOURCE_GPUS is selected if present",
|
|
||||||
envSwarmGPU: &envDockerResourceGPUs,
|
|
||||||
env: map[string]string{
|
|
||||||
envDockerResourceGPUs: anotherGPUID,
|
|
||||||
},
|
|
||||||
expectedDevices: &anotherGPUID,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "DOCKER_RESOURCE_GPUS overrides NVIDIA_VISIBLE_DEVICES if present",
|
|
||||||
envSwarmGPU: &envDockerResourceGPUs,
|
|
||||||
env: map[string]string{
|
|
||||||
envNVVisibleDevices: gpuID,
|
|
||||||
envDockerResourceGPUs: anotherGPUID,
|
|
||||||
},
|
|
||||||
expectedDevices: &anotherGPUID,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for i, tc := range tests {
|
|
||||||
t.Run(tc.description, func(t *testing.T) {
|
|
||||||
envSwarmGPU = tc.envSwarmGPU
|
|
||||||
devices := getDevicesFromEnvvar(tc.env, tc.legacyImage)
|
|
||||||
if tc.expectedDevices == nil {
|
|
||||||
require.Nil(t, devices, "%d: %v", i, tc)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
require.NotNil(t, devices, "%d: %v", i, tc)
|
|
||||||
require.Equal(t, *tc.expectedDevices, *devices, "%d: %v", i, tc)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestGetDriverCapabilities(t *testing.T) {
|
|
||||||
|
|
||||||
supportedCapabilities := "compute,utility,display,video"
|
|
||||||
|
|
||||||
testCases := []struct {
|
|
||||||
description string
|
|
||||||
env map[string]string
|
|
||||||
legacyImage bool
|
|
||||||
supportedCapabilities string
|
|
||||||
expectedPanic bool
|
|
||||||
expectedCapabilities string
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
description: "Env is set for legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVDriverCapabilities: "display,video",
|
|
||||||
},
|
|
||||||
legacyImage: true,
|
|
||||||
supportedCapabilities: supportedCapabilities,
|
|
||||||
expectedCapabilities: "display,video",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Env is all for legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVDriverCapabilities: "all",
|
|
||||||
},
|
|
||||||
legacyImage: true,
|
|
||||||
supportedCapabilities: supportedCapabilities,
|
|
||||||
expectedCapabilities: supportedCapabilities,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Env is empty for legacy image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVDriverCapabilities: "",
|
|
||||||
},
|
|
||||||
legacyImage: true,
|
|
||||||
supportedCapabilities: supportedCapabilities,
|
|
||||||
expectedCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Env unset for legacy image is 'all'",
|
|
||||||
env: map[string]string{},
|
|
||||||
legacyImage: true,
|
|
||||||
supportedCapabilities: supportedCapabilities,
|
|
||||||
expectedCapabilities: supportedCapabilities,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Env is set for modern image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVDriverCapabilities: "display,video",
|
|
||||||
},
|
|
||||||
legacyImage: false,
|
|
||||||
supportedCapabilities: supportedCapabilities,
|
|
||||||
expectedCapabilities: "display,video",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Env unset for modern image is default",
|
|
||||||
env: map[string]string{},
|
|
||||||
legacyImage: false,
|
|
||||||
supportedCapabilities: supportedCapabilities,
|
|
||||||
expectedCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Env is all for modern image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVDriverCapabilities: "all",
|
|
||||||
},
|
|
||||||
legacyImage: false,
|
|
||||||
supportedCapabilities: supportedCapabilities,
|
|
||||||
expectedCapabilities: supportedCapabilities,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Env is empty for modern image",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVDriverCapabilities: "",
|
|
||||||
},
|
|
||||||
legacyImage: false,
|
|
||||||
supportedCapabilities: supportedCapabilities,
|
|
||||||
expectedCapabilities: defaultDriverCapabilities.String(),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Invalid capabilities panic",
|
|
||||||
env: map[string]string{
|
|
||||||
envNVDriverCapabilities: "compute,utility",
|
|
||||||
},
|
|
||||||
supportedCapabilities: "not-compute,not-utility",
|
|
||||||
expectedPanic: true,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
description: "Default is restricted for modern image",
|
|
||||||
legacyImage: false,
|
|
||||||
supportedCapabilities: "compute",
|
|
||||||
expectedCapabilities: "compute",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, tc := range testCases {
|
|
||||||
t.Run(tc.description, func(t *testing.T) {
|
|
||||||
var capabilites DriverCapabilities
|
|
||||||
|
|
||||||
getDriverCapabilities := func() {
|
|
||||||
supportedCapabilities := DriverCapabilities(tc.supportedCapabilities)
|
|
||||||
capabilites = getDriverCapabilities(tc.env, supportedCapabilities, tc.legacyImage)
|
|
||||||
}
|
|
||||||
|
|
||||||
if tc.expectedPanic {
|
|
||||||
require.Panics(t, getDriverCapabilities)
|
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
getDriverCapabilities()
|
|
||||||
require.EqualValues(t, tc.expectedCapabilities, capabilites)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,118 +0,0 @@
|
|||||||
package main
|
|
||||||
|
|
||||||
import (
|
|
||||||
"log"
|
|
||||||
"os"
|
|
||||||
"path"
|
|
||||||
"reflect"
|
|
||||||
|
|
||||||
"github.com/BurntSushi/toml"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
configPath = "/etc/nvidia-container-runtime/config.toml"
|
|
||||||
driverPath = "/run/nvidia/driver"
|
|
||||||
)
|
|
||||||
|
|
||||||
var defaultPaths = [...]string{
|
|
||||||
path.Join(driverPath, configPath),
|
|
||||||
configPath,
|
|
||||||
}
|
|
||||||
|
|
||||||
// CLIConfig : options for nvidia-container-cli.
|
|
||||||
type CLIConfig struct {
|
|
||||||
Root *string `toml:"root"`
|
|
||||||
Path *string `toml:"path"`
|
|
||||||
Environment []string `toml:"environment"`
|
|
||||||
Debug *string `toml:"debug"`
|
|
||||||
Ldcache *string `toml:"ldcache"`
|
|
||||||
LoadKmods bool `toml:"load-kmods"`
|
|
||||||
NoPivot bool `toml:"no-pivot"`
|
|
||||||
NoCgroups bool `toml:"no-cgroups"`
|
|
||||||
User *string `toml:"user"`
|
|
||||||
Ldconfig *string `toml:"ldconfig"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// HookConfig : options for the nvidia-container-toolkit.
|
|
||||||
type HookConfig struct {
|
|
||||||
DisableRequire bool `toml:"disable-require"`
|
|
||||||
SwarmResource *string `toml:"swarm-resource"`
|
|
||||||
AcceptEnvvarUnprivileged bool `toml:"accept-nvidia-visible-devices-envvar-when-unprivileged"`
|
|
||||||
AcceptDeviceListAsVolumeMounts bool `toml:"accept-nvidia-visible-devices-as-volume-mounts"`
|
|
||||||
SupportedDriverCapabilities DriverCapabilities `toml:"supported-driver-capabilities"`
|
|
||||||
|
|
||||||
NvidiaContainerCLI CLIConfig `toml:"nvidia-container-cli"`
|
|
||||||
NVIDIAContainerRuntime config.RuntimeConfig `toml:"nvidia-container-runtime"`
|
|
||||||
}
|
|
||||||
|
|
||||||
func getDefaultHookConfig() HookConfig {
|
|
||||||
return HookConfig{
|
|
||||||
DisableRequire: false,
|
|
||||||
SwarmResource: nil,
|
|
||||||
AcceptEnvvarUnprivileged: true,
|
|
||||||
AcceptDeviceListAsVolumeMounts: false,
|
|
||||||
SupportedDriverCapabilities: allDriverCapabilities,
|
|
||||||
NvidiaContainerCLI: CLIConfig{
|
|
||||||
Root: nil,
|
|
||||||
Path: nil,
|
|
||||||
Environment: []string{},
|
|
||||||
Debug: nil,
|
|
||||||
Ldcache: nil,
|
|
||||||
LoadKmods: true,
|
|
||||||
NoPivot: false,
|
|
||||||
NoCgroups: false,
|
|
||||||
User: nil,
|
|
||||||
Ldconfig: nil,
|
|
||||||
},
|
|
||||||
NVIDIAContainerRuntime: *config.GetDefaultRuntimeConfig(),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func getHookConfig() (config HookConfig) {
|
|
||||||
var err error
|
|
||||||
|
|
||||||
if len(*configflag) > 0 {
|
|
||||||
config = getDefaultHookConfig()
|
|
||||||
_, err = toml.DecodeFile(*configflag, &config)
|
|
||||||
if err != nil {
|
|
||||||
log.Panicln("couldn't open configuration file:", err)
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
for _, p := range defaultPaths {
|
|
||||||
config = getDefaultHookConfig()
|
|
||||||
_, err = toml.DecodeFile(p, &config)
|
|
||||||
if err == nil {
|
|
||||||
break
|
|
||||||
} else if !os.IsNotExist(err) {
|
|
||||||
log.Panicln("couldn't open default configuration file:", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if config.SupportedDriverCapabilities == all {
|
|
||||||
config.SupportedDriverCapabilities = allDriverCapabilities
|
|
||||||
}
|
|
||||||
// We ensure that the supported-driver-capabilites option is a subset of allDriverCapabilities
|
|
||||||
if intersection := allDriverCapabilities.Intersection(config.SupportedDriverCapabilities); intersection != config.SupportedDriverCapabilities {
|
|
||||||
configName := config.getConfigOption("SupportedDriverCapabilities")
|
|
||||||
log.Panicf("Invalid value for config option '%v'; %v (supported: %v)\n", configName, config.SupportedDriverCapabilities, allDriverCapabilities)
|
|
||||||
}
|
|
||||||
|
|
||||||
return config
|
|
||||||
}
|
|
||||||
|
|
||||||
// getConfigOption returns the toml config option associated with the
|
|
||||||
// specified struct field.
|
|
||||||
func (c HookConfig) getConfigOption(fieldName string) string {
|
|
||||||
t := reflect.TypeOf(c)
|
|
||||||
f, ok := t.FieldByName(fieldName)
|
|
||||||
if !ok {
|
|
||||||
return fieldName
|
|
||||||
}
|
|
||||||
v, ok := f.Tag.Lookup("toml")
|
|
||||||
if !ok {
|
|
||||||
return fieldName
|
|
||||||
}
|
|
||||||
return v
|
|
||||||
}
|
|
||||||
@@ -15,28 +15,23 @@ docker setup \
|
|||||||
/run/nvidia/toolkit
|
/run/nvidia/toolkit
|
||||||
```
|
```
|
||||||
|
|
||||||
Configure the `nvidia-container-runtime` as a docker runtime named `NAME`. If the `--runtime-name` flag is not specified, this runtime would be called `nvidia`. A runtime named `nvidia-experimental` will also be configured using the `nvidia-container-runtime-experimental` OCI-compliant runtime shim.
|
Configure the `nvidia-container-runtime` as a docker runtime named `NAME`. If the `--runtime-name` flag is not specified, this runtime would be called `nvidia`.
|
||||||
|
|
||||||
Since `--set-as-default` is enabled by default, the specified runtime name will also be set as the default docker runtime. This can be disabled by explicityly specifying `--set-as-default=false`.
|
Since `--set-as-default` is enabled by default, the specified runtime name will also be set as the default docker runtime. This can be disabled by explicityly specifying `--set-as-default=false`.
|
||||||
|
|
||||||
**Note**: If `--runtime-name` is specified as `nvidia-experimental` explicitly, the `nvidia-experimental` runtime will be configured as the default runtime, with the `nvidia` runtime still configured and available for use.
|
|
||||||
|
|
||||||
The following table describes the behaviour for different `--runtime-name` and `--set-as-default` flag combinations.
|
The following table describes the behaviour for different `--runtime-name` and `--set-as-default` flag combinations.
|
||||||
|
|
||||||
| Flags | Installed Runtimes | Default Runtime |
|
| Flags | Installed Runtimes | Default Runtime |
|
||||||
|-------------------------------------------------------------|:--------------------------------|:----------------------|
|
|-------------------------------------------------------------|:--------------------------------|:----------------------|
|
||||||
| **NONE SPECIFIED** | `nvidia`, `nvidia-experimental` | `nvidia` |
|
| **NONE SPECIFIED** | `nvidia` | `nvidia` |
|
||||||
| `--runtime-name nvidia` | `nvidia`, `nvidia-experimental` | `nvidia` |
|
| `--runtime-name nvidia` | `nvidia` | `nvidia` |
|
||||||
| `--runtime-name NAME` | `NAME`, `nvidia-experimental` | `NAME` |
|
| `--runtime-name NAME` | `NAME` | `NAME` |
|
||||||
| `--runtime-name nvidia-experimental` | `nvidia`, `nvidia-experimental` | `nvidia-experimental` |
|
| `--set-as-default` | `nvidia` | `nvidia` |
|
||||||
| `--set-as-default` | `nvidia`, `nvidia-experimental` | `nvidia` |
|
| `--set-as-default --runtime-name nvidia` | `nvidia` | `nvidia` |
|
||||||
| `--set-as-default --runtime-name nvidia` | `nvidia`, `nvidia-experimental` | `nvidia` |
|
| `--set-as-default --runtime-name NAME` | `NAME` | `NAME` |
|
||||||
| `--set-as-default --runtime-name NAME` | `NAME`, `nvidia-experimental` | `NAME` |
|
| `--set-as-default=false` | `nvidia` | **NOT SET** |
|
||||||
| `--set-as-default --runtime-name nvidia-experimental` | `nvidia`, `nvidia-experimental` | `nvidia-experimental` |
|
| `--set-as-default=false --runtime-name NAME` | `NAME` | **NOT SET** |
|
||||||
| `--set-as-default=false` | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
| `--set-as-default=false --runtime-name nvidia` | `nvidia` | **NOT SET** |
|
||||||
| `--set-as-default=false --runtime-name NAME` | `NAME`, `nvidia-experimental` | **NOT SET** |
|
|
||||||
| `--set-as-default=false --runtime-name nvidia` | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
|
||||||
| `--set-as-default=false --runtime-name nvidia-experimental` | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
|
||||||
|
|
||||||
These combinations also hold for the environment variables that map to the command line flags: `DOCKER_RUNTIME_NAME`, `DOCKER_SET_AS_DEFAULT`.
|
These combinations also hold for the environment variables that map to the command line flags: `DOCKER_RUNTIME_NAME`, `DOCKER_SET_AS_DEFAULT`.
|
||||||
|
|
||||||
@@ -48,7 +43,7 @@ containerd setup \
|
|||||||
/run/nvidia/toolkit
|
/run/nvidia/toolkit
|
||||||
```
|
```
|
||||||
|
|
||||||
Configure the `nvidia-container-runtime` as a runtime class named `NAME`. If the `--runtime-class` flag is not specified, this runtime would be called `nvidia`. A runtime class named `nvidia-experimental` will also be configured using the `nvidia-container-runtime-experimental` OCI-compliant runtime shim.
|
Configure the `nvidia-container-runtime` as a runtime class named `NAME`. If the `--runtime-class` flag is not specified, this runtime would be called `nvidia`.
|
||||||
|
|
||||||
Adding the `--set-as-default` flag as follows:
|
Adding the `--set-as-default` flag as follows:
|
||||||
```bash
|
```bash
|
||||||
@@ -59,19 +54,15 @@ containerd setup \
|
|||||||
```
|
```
|
||||||
will set the runtime class `NAME` (or `nvidia` if not specified) as the default runtime class.
|
will set the runtime class `NAME` (or `nvidia` if not specified) as the default runtime class.
|
||||||
|
|
||||||
**Note**: If `--runtime-class` is specified as `nvidia-experimental` explicitly and `--set-as-default` is specified, the `nvidia-experimental` runtime will be configured as the default runtime class, with the `nvidia` runtime class still configured and available for use.
|
|
||||||
|
|
||||||
The following table describes the behaviour for different `--runtime-class` and `--set-as-default` flag combinations.
|
The following table describes the behaviour for different `--runtime-class` and `--set-as-default` flag combinations.
|
||||||
|
|
||||||
| Flags | Installed Runtime Classes | Default Runtime Class |
|
| Flags | Installed Runtime Classes | Default Runtime Class |
|
||||||
|--------------------------------------------------------|:--------------------------------|:----------------------|
|
|--------------------------------------------------------|:--------------------------------|:----------------------|
|
||||||
| **NONE SPECIFIED** | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
| **NONE SPECIFIED** | `nvidia` | **NOT SET** |
|
||||||
| `--runtime-class NAME` | `NAME`, `nvidia-experimental` | **NOT SET** |
|
| `--runtime-class NAME` | `NAME` | **NOT SET** |
|
||||||
| `--runtime-class nvidia` | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
| `--runtime-class nvidia` | `nvidia` | **NOT SET** |
|
||||||
| `--runtime-class nvidia-experimental` | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
| `--set-as-default` | `nvidia` | `nvidia` |
|
||||||
| `--set-as-default` | `nvidia`, `nvidia-experimental` | `nvidia` |
|
| `--set-as-default --runtime-class NAME` | `NAME` | `NAME` |
|
||||||
| `--set-as-default --runtime-class NAME` | `NAME`, `nvidia-experimental` | `NAME` |
|
| `--set-as-default --runtime-class nvidia` | `nvidia` | `nvidia` |
|
||||||
| `--set-as-default --runtime-class nvidia` | `nvidia`, `nvidia-experimental` | `nvidia` |
|
|
||||||
| `--set-as-default --runtime-class nvidia-experimental` | `nvidia`, `nvidia-experimental` | `nvidia-experimental` |
|
|
||||||
|
|
||||||
These combinations also hold for the environment variables that map to the command line flags.
|
These combinations also hold for the environment variables that map to the command line flags.
|
||||||
177
cmd/nvidia-ctk-installer/container/container.go
Normal file
177
cmd/nvidia-ctk-installer/container/container.go
Normal file
@@ -0,0 +1,177 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
|
||||||
|
"github.com/sirupsen/logrus"
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/operator"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
restartModeNone = "none"
|
||||||
|
restartModeSignal = "signal"
|
||||||
|
restartModeSystemd = "systemd"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Options defines the shared options for the CLIs to configure containers runtimes.
|
||||||
|
type Options struct {
|
||||||
|
Config string
|
||||||
|
Socket string
|
||||||
|
// EnabledCDI indicates whether CDI should be enabled.
|
||||||
|
EnableCDI bool
|
||||||
|
RuntimeName string
|
||||||
|
RuntimeDir string
|
||||||
|
SetAsDefault bool
|
||||||
|
RestartMode string
|
||||||
|
HostRootMount string
|
||||||
|
}
|
||||||
|
|
||||||
|
// ParseArgs parses the command line arguments to the CLI
|
||||||
|
func ParseArgs(c *cli.Context, o *Options) error {
|
||||||
|
if o.RuntimeDir != "" {
|
||||||
|
logrus.Debug("Runtime directory already set; ignoring arguments")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
args := c.Args()
|
||||||
|
|
||||||
|
logrus.Infof("Parsing arguments: %v", args.Slice())
|
||||||
|
if c.NArg() != 1 {
|
||||||
|
return fmt.Errorf("incorrect number of arguments")
|
||||||
|
}
|
||||||
|
|
||||||
|
o.RuntimeDir = args.Get(0)
|
||||||
|
|
||||||
|
logrus.Infof("Successfully parsed arguments")
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Configure applies the options to the specified config
|
||||||
|
func (o Options) Configure(cfg engine.Interface) error {
|
||||||
|
err := o.UpdateConfig(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to update config: %v", err)
|
||||||
|
}
|
||||||
|
return o.flush(cfg)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Unconfigure removes the options from the specified config
|
||||||
|
func (o Options) Unconfigure(cfg engine.Interface) error {
|
||||||
|
err := o.RevertConfig(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to update config: %v", err)
|
||||||
|
}
|
||||||
|
return o.flush(cfg)
|
||||||
|
}
|
||||||
|
|
||||||
|
// flush flushes the specified config to disk
|
||||||
|
func (o Options) flush(cfg engine.Interface) error {
|
||||||
|
logrus.Infof("Flushing config to %v", o.Config)
|
||||||
|
n, err := cfg.Save(o.Config)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to flush config: %v", err)
|
||||||
|
}
|
||||||
|
if n == 0 {
|
||||||
|
logrus.Infof("Config file is empty, removed")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateConfig updates the specified config to include the nvidia runtimes
|
||||||
|
func (o Options) UpdateConfig(cfg engine.Interface) error {
|
||||||
|
runtimes := operator.GetRuntimes(
|
||||||
|
operator.WithNvidiaRuntimeName(o.RuntimeName),
|
||||||
|
operator.WithSetAsDefault(o.SetAsDefault),
|
||||||
|
operator.WithRoot(o.RuntimeDir),
|
||||||
|
)
|
||||||
|
for name, runtime := range runtimes {
|
||||||
|
err := cfg.AddRuntime(name, runtime.Path, runtime.SetAsDefault)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to update runtime %q: %v", name, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if o.EnableCDI {
|
||||||
|
cfg.EnableCDI()
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RevertConfig reverts the specified config to remove the nvidia runtimes
|
||||||
|
func (o Options) RevertConfig(cfg engine.Interface) error {
|
||||||
|
runtimes := operator.GetRuntimes(
|
||||||
|
operator.WithNvidiaRuntimeName(o.RuntimeName),
|
||||||
|
operator.WithSetAsDefault(o.SetAsDefault),
|
||||||
|
operator.WithRoot(o.RuntimeDir),
|
||||||
|
)
|
||||||
|
for name := range runtimes {
|
||||||
|
err := cfg.RemoveRuntime(name)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to remove runtime %q: %v", name, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Restart restarts the specified service
|
||||||
|
func (o Options) Restart(service string, withSignal func(string) error) error {
|
||||||
|
switch o.RestartMode {
|
||||||
|
case restartModeNone:
|
||||||
|
logrus.Warningf("Skipping restart of %v due to --restart-mode=%v", service, o.RestartMode)
|
||||||
|
return nil
|
||||||
|
case restartModeSignal:
|
||||||
|
return withSignal(o.Socket)
|
||||||
|
case restartModeSystemd:
|
||||||
|
return o.SystemdRestart(service)
|
||||||
|
}
|
||||||
|
|
||||||
|
return fmt.Errorf("invalid restart mode specified: %v", o.RestartMode)
|
||||||
|
}
|
||||||
|
|
||||||
|
// SystemdRestart restarts the specified service using systemd
|
||||||
|
func (o Options) SystemdRestart(service string) error {
|
||||||
|
var args []string
|
||||||
|
var msg string
|
||||||
|
if o.HostRootMount != "" {
|
||||||
|
msg = " on host"
|
||||||
|
args = append(args, "chroot", o.HostRootMount)
|
||||||
|
}
|
||||||
|
args = append(args, "systemctl", "restart", service)
|
||||||
|
|
||||||
|
logrus.Infof("Restarting %v%v using systemd: %v", service, msg, args)
|
||||||
|
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
|
cmd := exec.Command(args[0], args[1:]...)
|
||||||
|
cmd.Stdout = os.Stdout
|
||||||
|
cmd.Stderr = os.Stderr
|
||||||
|
err := cmd.Run()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error restarting %v using systemd: %v", service, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
133
cmd/nvidia-ctk-installer/container/operator/operator.go
Normal file
133
cmd/nvidia-ctk-installer/container/operator/operator.go
Normal file
@@ -0,0 +1,133 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package operator
|
||||||
|
|
||||||
|
import "path/filepath"
|
||||||
|
|
||||||
|
const (
|
||||||
|
defaultRuntimeName = "nvidia"
|
||||||
|
|
||||||
|
defaultRoot = "/usr/bin"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Runtime defines a runtime to be configured.
|
||||||
|
// The path and whether the runtime is the default runtime can be specified
|
||||||
|
type Runtime struct {
|
||||||
|
name string
|
||||||
|
Path string
|
||||||
|
SetAsDefault bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// Runtimes defines a set of runtimes to be configured for use in the GPU Operator
|
||||||
|
type Runtimes map[string]Runtime
|
||||||
|
|
||||||
|
type config struct {
|
||||||
|
root string
|
||||||
|
nvidiaRuntimeName string
|
||||||
|
setAsDefault bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetRuntimes returns the set of runtimes to be configured for use with the GPU Operator.
|
||||||
|
func GetRuntimes(opts ...Option) Runtimes {
|
||||||
|
c := &config{}
|
||||||
|
for _, opt := range opts {
|
||||||
|
opt(c)
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.root == "" {
|
||||||
|
c.root = defaultRoot
|
||||||
|
}
|
||||||
|
if c.nvidiaRuntimeName == "" {
|
||||||
|
c.nvidiaRuntimeName = defaultRuntimeName
|
||||||
|
}
|
||||||
|
|
||||||
|
runtimes := make(Runtimes)
|
||||||
|
runtimes.add(c.nvidiaRuntime())
|
||||||
|
|
||||||
|
modes := []string{"cdi", "legacy"}
|
||||||
|
for _, mode := range modes {
|
||||||
|
runtimes.add(c.modeRuntime(mode))
|
||||||
|
}
|
||||||
|
return runtimes
|
||||||
|
}
|
||||||
|
|
||||||
|
// DefaultRuntimeName returns the name of the default runtime.
|
||||||
|
func (r Runtimes) DefaultRuntimeName() string {
|
||||||
|
for _, runtime := range r {
|
||||||
|
if runtime.SetAsDefault {
|
||||||
|
return runtime.name
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
// Add a runtime to the set of runtimes.
|
||||||
|
func (r Runtimes) add(runtime Runtime) {
|
||||||
|
r[runtime.name] = runtime
|
||||||
|
}
|
||||||
|
|
||||||
|
// nvidiaRuntime creates a runtime that corresponds to the nvidia runtime.
|
||||||
|
// If name is equal to one of the predefined runtimes, `nvidia` is used as the runtime name instead.
|
||||||
|
func (c config) nvidiaRuntime() Runtime {
|
||||||
|
predefinedRuntimes := map[string]struct{}{
|
||||||
|
"nvidia-cdi": {},
|
||||||
|
"nvidia-legacy": {},
|
||||||
|
}
|
||||||
|
name := c.nvidiaRuntimeName
|
||||||
|
if _, isPredefinedRuntime := predefinedRuntimes[name]; isPredefinedRuntime {
|
||||||
|
name = defaultRuntimeName
|
||||||
|
}
|
||||||
|
return c.newRuntime(name, "nvidia-container-runtime")
|
||||||
|
}
|
||||||
|
|
||||||
|
// modeRuntime creates a runtime for the specified mode.
|
||||||
|
func (c config) modeRuntime(mode string) Runtime {
|
||||||
|
return c.newRuntime("nvidia-"+mode, "nvidia-container-runtime."+mode)
|
||||||
|
}
|
||||||
|
|
||||||
|
// newRuntime creates a runtime based on the configuration
|
||||||
|
func (c config) newRuntime(name string, binary string) Runtime {
|
||||||
|
return Runtime{
|
||||||
|
name: name,
|
||||||
|
Path: filepath.Join(c.root, binary),
|
||||||
|
SetAsDefault: c.setAsDefault && name == c.nvidiaRuntimeName,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Option is a functional option for configuring set of runtimes.
|
||||||
|
type Option func(*config)
|
||||||
|
|
||||||
|
// WithRoot sets the root directory for the runtime binaries.
|
||||||
|
func WithRoot(root string) Option {
|
||||||
|
return func(c *config) {
|
||||||
|
c.root = root
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithNvidiaRuntimeName sets the name of the nvidia runtime.
|
||||||
|
func WithNvidiaRuntimeName(name string) Option {
|
||||||
|
return func(c *config) {
|
||||||
|
c.nvidiaRuntimeName = name
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithSetAsDefault sets the default runtime to the nvidia runtime.
|
||||||
|
func WithSetAsDefault(set bool) Option {
|
||||||
|
return func(c *config) {
|
||||||
|
c.setAsDefault = set
|
||||||
|
}
|
||||||
|
}
|
||||||
141
cmd/nvidia-ctk-installer/container/operator/operator_test.go
Normal file
141
cmd/nvidia-ctk-installer/container/operator/operator_test.go
Normal file
@@ -0,0 +1,141 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package operator
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestOptions(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
setAsDefault bool
|
||||||
|
nvidiaRuntimeName string
|
||||||
|
root string
|
||||||
|
expectedDefaultRuntime string
|
||||||
|
expectedRuntimes Runtimes
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
expectedRuntimes: Runtimes{
|
||||||
|
"nvidia": Runtime{
|
||||||
|
name: "nvidia",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
"nvidia-cdi": Runtime{
|
||||||
|
name: "nvidia-cdi",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
"nvidia-legacy": Runtime{
|
||||||
|
name: "nvidia-legacy",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
setAsDefault: true,
|
||||||
|
expectedDefaultRuntime: "nvidia",
|
||||||
|
expectedRuntimes: Runtimes{
|
||||||
|
"nvidia": Runtime{
|
||||||
|
name: "nvidia",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime",
|
||||||
|
SetAsDefault: true,
|
||||||
|
},
|
||||||
|
"nvidia-cdi": Runtime{
|
||||||
|
name: "nvidia-cdi",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
"nvidia-legacy": Runtime{
|
||||||
|
name: "nvidia-legacy",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
setAsDefault: true,
|
||||||
|
nvidiaRuntimeName: "nvidia",
|
||||||
|
expectedDefaultRuntime: "nvidia",
|
||||||
|
expectedRuntimes: Runtimes{
|
||||||
|
"nvidia": Runtime{
|
||||||
|
name: "nvidia",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime",
|
||||||
|
SetAsDefault: true,
|
||||||
|
},
|
||||||
|
"nvidia-cdi": Runtime{
|
||||||
|
name: "nvidia-cdi",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
"nvidia-legacy": Runtime{
|
||||||
|
name: "nvidia-legacy",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
setAsDefault: true,
|
||||||
|
nvidiaRuntimeName: "NAME",
|
||||||
|
expectedDefaultRuntime: "NAME",
|
||||||
|
expectedRuntimes: Runtimes{
|
||||||
|
"NAME": Runtime{
|
||||||
|
name: "NAME",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime",
|
||||||
|
SetAsDefault: true,
|
||||||
|
},
|
||||||
|
"nvidia-cdi": Runtime{
|
||||||
|
name: "nvidia-cdi",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
"nvidia-legacy": Runtime{
|
||||||
|
name: "nvidia-legacy",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
setAsDefault: false,
|
||||||
|
nvidiaRuntimeName: "NAME",
|
||||||
|
expectedRuntimes: Runtimes{
|
||||||
|
"NAME": Runtime{
|
||||||
|
name: "NAME",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
"nvidia-cdi": Runtime{
|
||||||
|
name: "nvidia-cdi",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
"nvidia-legacy": Runtime{
|
||||||
|
name: "nvidia-legacy",
|
||||||
|
Path: "/usr/bin/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
|
runtimes := GetRuntimes(
|
||||||
|
WithNvidiaRuntimeName(tc.nvidiaRuntimeName),
|
||||||
|
WithSetAsDefault(tc.setAsDefault),
|
||||||
|
WithRoot(tc.root),
|
||||||
|
)
|
||||||
|
|
||||||
|
require.EqualValues(t, tc.expectedRuntimes, runtimes)
|
||||||
|
require.Equal(t, tc.expectedDefaultRuntime, runtimes.DefaultRuntimeName())
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,584 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package containerd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/containerd"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/toml"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestUpdateV1ConfigDefaultRuntime(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
legacyConfig bool
|
||||||
|
setAsDefault bool
|
||||||
|
runtimeName string
|
||||||
|
expectedDefaultRuntimeName interface{}
|
||||||
|
expectedDefaultRuntimeBinary interface{}
|
||||||
|
}{
|
||||||
|
{},
|
||||||
|
{
|
||||||
|
legacyConfig: true,
|
||||||
|
setAsDefault: false,
|
||||||
|
expectedDefaultRuntimeName: nil,
|
||||||
|
expectedDefaultRuntimeBinary: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
legacyConfig: true,
|
||||||
|
setAsDefault: true,
|
||||||
|
expectedDefaultRuntimeName: nil,
|
||||||
|
expectedDefaultRuntimeBinary: "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
legacyConfig: true,
|
||||||
|
setAsDefault: true,
|
||||||
|
runtimeName: "NAME",
|
||||||
|
expectedDefaultRuntimeName: nil,
|
||||||
|
expectedDefaultRuntimeBinary: "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
legacyConfig: false,
|
||||||
|
setAsDefault: false,
|
||||||
|
expectedDefaultRuntimeName: nil,
|
||||||
|
expectedDefaultRuntimeBinary: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
legacyConfig: false,
|
||||||
|
setAsDefault: true,
|
||||||
|
expectedDefaultRuntimeName: "nvidia",
|
||||||
|
expectedDefaultRuntimeBinary: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
legacyConfig: false,
|
||||||
|
setAsDefault: true,
|
||||||
|
runtimeName: "NAME",
|
||||||
|
expectedDefaultRuntimeName: "NAME",
|
||||||
|
expectedDefaultRuntimeBinary: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
RuntimeName: tc.runtimeName,
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
SetAsDefault: tc.setAsDefault,
|
||||||
|
}
|
||||||
|
|
||||||
|
v1, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.Empty),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithUseLegacyConfig(tc.legacyConfig),
|
||||||
|
containerd.WithConfigVersion(1),
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
err = o.UpdateConfig(v1)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
cfg := v1.(*containerd.ConfigV1)
|
||||||
|
defaultRuntimeName := cfg.GetPath([]string{"plugins", "cri", "containerd", "default_runtime_name"})
|
||||||
|
require.EqualValues(t, tc.expectedDefaultRuntimeName, defaultRuntimeName)
|
||||||
|
|
||||||
|
defaultRuntime := cfg.GetPath([]string{"plugins", "cri", "containerd", "default_runtime"})
|
||||||
|
if tc.expectedDefaultRuntimeBinary == nil {
|
||||||
|
require.Nil(t, defaultRuntime)
|
||||||
|
} else {
|
||||||
|
require.NotNil(t, defaultRuntime)
|
||||||
|
|
||||||
|
expected, err := defaultRuntimeTomlConfigV1(tc.expectedDefaultRuntimeBinary.(string))
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
configContents, _ := toml.Marshal(defaultRuntime.(*toml.Tree))
|
||||||
|
expectedContents, _ := toml.Marshal(expected)
|
||||||
|
|
||||||
|
require.Equal(t, string(expectedContents), string(configContents), "%d: %v: %v", i, tc)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestUpdateV1Config(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
runtimeName string
|
||||||
|
expectedConfig map[string]interface{}
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
runtimeName: "nvidia",
|
||||||
|
expectedConfig: map[string]interface{}{
|
||||||
|
"version": int64(1),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"nvidia": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-cdi": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
runtimeName: "NAME",
|
||||||
|
expectedConfig: map[string]interface{}{
|
||||||
|
"version": int64(1),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"NAME": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-cdi": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
RuntimeName: tc.runtimeName,
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
}
|
||||||
|
|
||||||
|
v1, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.Empty),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithConfigVersion(1),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
err = o.UpdateConfig(v1)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.Equal(t, expected.String(), v1.String())
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestUpdateV1ConfigWithRuncPresent(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
runtimeName string
|
||||||
|
expectedConfig map[string]interface{}
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
runtimeName: "nvidia",
|
||||||
|
expectedConfig: map[string]interface{}{
|
||||||
|
"version": int64(1),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"runc": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/runc-binary",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-cdi": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
runtimeName: "NAME",
|
||||||
|
expectedConfig: map[string]interface{}{
|
||||||
|
"version": int64(1),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"runc": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/runc-binary",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"NAME": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-cdi": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
RuntimeName: tc.runtimeName,
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
}
|
||||||
|
|
||||||
|
v1, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.FromMap(runcConfigMapV1("/runc-binary"))),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithConfigVersion(1),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
err = o.UpdateConfig(v1)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.Equal(t, expected.String(), v1.String())
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestUpdateV1EnableCDI(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
enableCDI bool
|
||||||
|
expectedEnableCDIValue interface{}
|
||||||
|
}{
|
||||||
|
{},
|
||||||
|
{
|
||||||
|
enableCDI: false,
|
||||||
|
expectedEnableCDIValue: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
enableCDI: true,
|
||||||
|
expectedEnableCDIValue: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%v", tc.enableCDI), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
EnableCDI: tc.enableCDI,
|
||||||
|
RuntimeName: "nvidia",
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg, err := toml.Empty.Load()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
v1 := &containerd.ConfigV1{
|
||||||
|
Logger: logger,
|
||||||
|
Tree: cfg,
|
||||||
|
RuntimeType: runtimeType,
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.UpdateConfig(v1)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
enableCDIValue := v1.GetPath([]string{"plugins", "cri", "containerd", "enable_cdi"})
|
||||||
|
require.EqualValues(t, tc.expectedEnableCDIValue, enableCDIValue)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestRevertV1Config(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
testCases := []struct {
|
||||||
|
config map[string]interface {
|
||||||
|
}
|
||||||
|
expected map[string]interface{}
|
||||||
|
}{
|
||||||
|
{},
|
||||||
|
{
|
||||||
|
config: map[string]interface{}{
|
||||||
|
"version": int64(1),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
config: map[string]interface{}{
|
||||||
|
"version": int64(1),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"nvidia": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime"),
|
||||||
|
"nvidia-cdi": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.cdi"),
|
||||||
|
"nvidia-legacy": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.legacy"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
config: map[string]interface{}{
|
||||||
|
"version": int64(1),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"nvidia": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime"),
|
||||||
|
"nvidia-cdi": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.cdi"),
|
||||||
|
"nvidia-legacy": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.legacy"),
|
||||||
|
},
|
||||||
|
"default_runtime": defaultRuntimeV1("/test/runtime/dir/nvidia-container-runtime"),
|
||||||
|
"default_runtime_name": "nvidia",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
RuntimeName: "nvidia",
|
||||||
|
}
|
||||||
|
|
||||||
|
expected, err := toml.TreeFromMap(tc.expected)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
v1, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.FromMap(tc.config)),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
err = o.RevertConfig(v1)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.Equal(t, expected.String(), v1.String())
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func defaultRuntimeTomlConfigV1(binary string) (*toml.Tree, error) {
|
||||||
|
return toml.TreeFromMap(defaultRuntimeV1(binary))
|
||||||
|
}
|
||||||
|
|
||||||
|
func defaultRuntimeV1(binary string) map[string]interface{} {
|
||||||
|
return map[string]interface{}{
|
||||||
|
"runtime_type": runtimeType,
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": binary,
|
||||||
|
"Runtime": binary,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func runtimeMapV1(binary string) map[string]interface{} {
|
||||||
|
return map[string]interface{}{
|
||||||
|
"runtime_type": runtimeType,
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": binary,
|
||||||
|
"Runtime": binary,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func runcConfigMapV1(binary string) map[string]interface{} {
|
||||||
|
return map[string]interface{}{
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"runc": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": binary,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,520 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package containerd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/containerd"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/toml"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
runtimeType = "runtime_type"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestUpdateV2ConfigDefaultRuntime(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
setAsDefault bool
|
||||||
|
runtimeName string
|
||||||
|
expectedDefaultRuntimeName interface{}
|
||||||
|
}{
|
||||||
|
{},
|
||||||
|
{
|
||||||
|
setAsDefault: false,
|
||||||
|
runtimeName: "nvidia",
|
||||||
|
expectedDefaultRuntimeName: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
setAsDefault: false,
|
||||||
|
runtimeName: "NAME",
|
||||||
|
expectedDefaultRuntimeName: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
setAsDefault: true,
|
||||||
|
runtimeName: "nvidia",
|
||||||
|
expectedDefaultRuntimeName: "nvidia",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
setAsDefault: true,
|
||||||
|
runtimeName: "NAME",
|
||||||
|
expectedDefaultRuntimeName: "NAME",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
RuntimeName: tc.runtimeName,
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
SetAsDefault: tc.setAsDefault,
|
||||||
|
}
|
||||||
|
|
||||||
|
v2, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.Empty),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
err = o.UpdateConfig(v2)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
cfg := v2.(*containerd.Config)
|
||||||
|
|
||||||
|
defaultRuntimeName := cfg.GetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "default_runtime_name"})
|
||||||
|
require.EqualValues(t, tc.expectedDefaultRuntimeName, defaultRuntimeName)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestUpdateV2Config(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
runtimeName string
|
||||||
|
expectedConfig map[string]interface{}
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
runtimeName: "nvidia",
|
||||||
|
expectedConfig: map[string]interface{}{
|
||||||
|
"version": int64(2),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"nvidia": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-cdi": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
runtimeName: "NAME",
|
||||||
|
expectedConfig: map[string]interface{}{
|
||||||
|
"version": int64(2),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"NAME": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-cdi": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"runtime_type": "runtime_type",
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
RuntimeName: tc.runtimeName,
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
}
|
||||||
|
|
||||||
|
v2, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.Empty),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
err = o.UpdateConfig(v2)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.Equal(t, expected.String(), v2.String())
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestUpdateV2ConfigWithRuncPresent(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
runtimeName string
|
||||||
|
expectedConfig map[string]interface{}
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
runtimeName: "nvidia",
|
||||||
|
expectedConfig: map[string]interface{}{
|
||||||
|
"version": int64(2),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"runc": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/runc-binary",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-cdi": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
runtimeName: "NAME",
|
||||||
|
expectedConfig: map[string]interface{}{
|
||||||
|
"version": int64(2),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"runc": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/runc-binary",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"NAME": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-cdi": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"container_annotations": []string{"cdi.k8s.io/*"},
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
RuntimeName: tc.runtimeName,
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
}
|
||||||
|
|
||||||
|
v2, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.FromMap(runcConfigMapV2("/runc-binary"))),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
err = o.UpdateConfig(v2)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.Equal(t, expected.String(), v2.String())
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestUpdateV2ConfigEnableCDI(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
enableCDI bool
|
||||||
|
expectedEnableCDIValue interface{}
|
||||||
|
}{
|
||||||
|
{},
|
||||||
|
{
|
||||||
|
enableCDI: false,
|
||||||
|
expectedEnableCDIValue: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
enableCDI: true,
|
||||||
|
expectedEnableCDIValue: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%v", tc.enableCDI), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
EnableCDI: tc.enableCDI,
|
||||||
|
RuntimeName: "nvidia",
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
SetAsDefault: false,
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg, err := toml.LoadMap(map[string]interface{}{})
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
v2 := &containerd.Config{
|
||||||
|
Logger: logger,
|
||||||
|
Tree: cfg,
|
||||||
|
RuntimeType: runtimeType,
|
||||||
|
CRIRuntimePluginName: "io.containerd.grpc.v1.cri",
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.UpdateConfig(v2)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
enableCDIValue := cfg.GetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "enable_cdi"})
|
||||||
|
require.EqualValues(t, tc.expectedEnableCDIValue, enableCDIValue)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestRevertV2Config(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
config map[string]interface {
|
||||||
|
}
|
||||||
|
expected map[string]interface{}
|
||||||
|
}{
|
||||||
|
{},
|
||||||
|
{
|
||||||
|
config: map[string]interface{}{
|
||||||
|
"version": int64(2),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
config: map[string]interface{}{
|
||||||
|
"version": int64(2),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"nvidia": runtimeMapV2("/test/runtime/dir/nvidia-container-runtime"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
config: map[string]interface{}{
|
||||||
|
"version": int64(2),
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"nvidia": runtimeMapV2("/test/runtime/dir/nvidia-container-runtime"),
|
||||||
|
},
|
||||||
|
"default_runtime_name": "nvidia",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
RuntimeName: "nvidia",
|
||||||
|
}
|
||||||
|
|
||||||
|
expected, err := toml.TreeFromMap(tc.expected)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
v2, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.FromMap(tc.config)),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
err = o.RevertConfig(v2)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.Equal(t, expected.String(), v2.String())
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func runtimeMapV2(binary string) map[string]interface{} {
|
||||||
|
return map[string]interface{}{
|
||||||
|
"runtime_type": runtimeType,
|
||||||
|
"runtime_root": "",
|
||||||
|
"runtime_engine": "",
|
||||||
|
"privileged_without_host_devices": false,
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"BinaryName": binary,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func runcConfigMapV2(binary string) map[string]interface{} {
|
||||||
|
return map[string]interface{}{
|
||||||
|
"version": 2,
|
||||||
|
"plugins": map[string]interface{}{
|
||||||
|
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
||||||
|
"containerd": map[string]interface{}{
|
||||||
|
"runtimes": map[string]interface{}{
|
||||||
|
"runc": map[string]interface{}{
|
||||||
|
"runtime_type": "runc_runtime_type",
|
||||||
|
"runtime_root": "runc_runtime_root",
|
||||||
|
"runtime_engine": "runc_runtime_engine",
|
||||||
|
"privileged_without_host_devices": true,
|
||||||
|
"options": map[string]interface{}{
|
||||||
|
"runc-option": "value",
|
||||||
|
"BinaryName": binary,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,184 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2020-2021, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package containerd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
cli "github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/containerd"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/toml"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
Name = "containerd"
|
||||||
|
|
||||||
|
DefaultConfig = "/etc/containerd/config.toml"
|
||||||
|
DefaultSocket = "/run/containerd/containerd.sock"
|
||||||
|
DefaultRestartMode = "signal"
|
||||||
|
|
||||||
|
defaultRuntmeType = "io.containerd.runc.v2"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Options stores the containerd-specific options
|
||||||
|
type Options struct {
|
||||||
|
useLegacyConfig bool
|
||||||
|
runtimeType string
|
||||||
|
|
||||||
|
ContainerRuntimeModesCDIAnnotationPrefixes cli.StringSlice
|
||||||
|
|
||||||
|
runtimeConfigOverrideJSON string
|
||||||
|
}
|
||||||
|
|
||||||
|
func Flags(opts *Options) []cli.Flag {
|
||||||
|
flags := []cli.Flag{
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "use-legacy-config",
|
||||||
|
Usage: "Specify whether a legacy (pre v1.3) config should be used. " +
|
||||||
|
"This ensures that a version 1 container config is created by default and that the " +
|
||||||
|
"containerd.runtimes.default_runtime config section is used to define the default " +
|
||||||
|
"runtime instead of container.default_runtime_name.",
|
||||||
|
Destination: &opts.useLegacyConfig,
|
||||||
|
EnvVars: []string{"CONTAINERD_USE_LEGACY_CONFIG"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "runtime-type",
|
||||||
|
Usage: "The runtime_type to use for the configured runtime classes",
|
||||||
|
Value: defaultRuntmeType,
|
||||||
|
Destination: &opts.runtimeType,
|
||||||
|
EnvVars: []string{"CONTAINERD_RUNTIME_TYPE"},
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "nvidia-container-runtime-modes.cdi.annotation-prefixes",
|
||||||
|
Destination: &opts.ContainerRuntimeModesCDIAnnotationPrefixes,
|
||||||
|
EnvVars: []string{"NVIDIA_CONTAINER_RUNTIME_MODES_CDI_ANNOTATION_PREFIXES"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "runtime-config-override",
|
||||||
|
Destination: &opts.runtimeConfigOverrideJSON,
|
||||||
|
Usage: "specify additional runtime options as a JSON string. The paths are relative to the runtime config.",
|
||||||
|
Value: "{}",
|
||||||
|
EnvVars: []string{"RUNTIME_CONFIG_OVERRIDE", "CONTAINERD_RUNTIME_CONFIG_OVERRIDE"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return flags
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup updates a containerd configuration to include the nvidia-containerd-runtime and reloads it
|
||||||
|
func Setup(c *cli.Context, o *container.Options, co *Options) error {
|
||||||
|
log.Infof("Starting 'setup' for %v", c.App.Name)
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o, co)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Configure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to configure containerd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartContainerd(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to restart containerd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Completed 'setup' for %v", c.App.Name)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cleanup reverts a containerd configuration to remove the nvidia-containerd-runtime and reloads it
|
||||||
|
func Cleanup(c *cli.Context, o *container.Options, co *Options) error {
|
||||||
|
log.Infof("Starting 'cleanup' for %v", c.App.Name)
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o, co)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Unconfigure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to unconfigure containerd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartContainerd(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to restart containerd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Completed 'cleanup' for %v", c.App.Name)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RestartContainerd restarts containerd depending on the value of restartModeFlag
|
||||||
|
func RestartContainerd(o *container.Options) error {
|
||||||
|
return o.Restart("containerd", SignalContainerd)
|
||||||
|
}
|
||||||
|
|
||||||
|
// containerAnnotationsFromCDIPrefixes returns the container annotations to set for the given CDI prefixes.
|
||||||
|
func (o *Options) containerAnnotationsFromCDIPrefixes() []string {
|
||||||
|
var annotations []string
|
||||||
|
for _, prefix := range o.ContainerRuntimeModesCDIAnnotationPrefixes.Value() {
|
||||||
|
annotations = append(annotations, prefix+"*")
|
||||||
|
}
|
||||||
|
|
||||||
|
return annotations
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o *Options) runtimeConfigOverride() (map[string]interface{}, error) {
|
||||||
|
if o.runtimeConfigOverrideJSON == "" {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
runtimeOptions := make(map[string]interface{})
|
||||||
|
if err := json.Unmarshal([]byte(o.runtimeConfigOverrideJSON), &runtimeOptions); err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to read %v as JSON: %w", o.runtimeConfigOverrideJSON, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return runtimeOptions, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetLowlevelRuntimePaths(o *container.Options, co *Options) ([]string, error) {
|
||||||
|
cfg, err := getRuntimeConfig(o, co)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("unable to load containerd config: %w", err)
|
||||||
|
}
|
||||||
|
return engine.GetBinaryPathsForRuntimes(cfg), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getRuntimeConfig(o *container.Options, co *Options) (engine.Interface, error) {
|
||||||
|
return containerd.New(
|
||||||
|
containerd.WithPath(o.Config),
|
||||||
|
containerd.WithConfigSource(
|
||||||
|
toml.LoadFirst(
|
||||||
|
containerd.CommandLineSource(o.HostRootMount),
|
||||||
|
toml.FromFile(o.Config),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
containerd.WithRuntimeType(co.runtimeType),
|
||||||
|
containerd.WithUseLegacyConfig(co.useLegacyConfig),
|
||||||
|
containerd.WithContainerAnnotations(co.containerAnnotationsFromCDIPrefixes()...),
|
||||||
|
)
|
||||||
|
}
|
||||||
@@ -0,0 +1,113 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2020-2023 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package containerd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"syscall"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
reloadBackoff = 5 * time.Second
|
||||||
|
maxReloadAttempts = 6
|
||||||
|
|
||||||
|
socketMessageToGetPID = ""
|
||||||
|
)
|
||||||
|
|
||||||
|
// SignalContainerd sends a SIGHUP signal to the containerd daemon
|
||||||
|
func SignalContainerd(socket string) error {
|
||||||
|
log.Infof("Sending SIGHUP signal to containerd")
|
||||||
|
|
||||||
|
// Wrap the logic to perform the SIGHUP in a function so we can retry it on failure
|
||||||
|
retriable := func() error {
|
||||||
|
conn, err := net.Dial("unix", socket)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to dial: %v", err)
|
||||||
|
}
|
||||||
|
defer conn.Close()
|
||||||
|
|
||||||
|
sconn, err := conn.(*net.UnixConn).SyscallConn()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to get syscall connection: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err1 := sconn.Control(func(fd uintptr) {
|
||||||
|
err = syscall.SetsockoptInt(int(fd), syscall.SOL_SOCKET, syscall.SO_PASSCRED, 1)
|
||||||
|
})
|
||||||
|
if err1 != nil {
|
||||||
|
return fmt.Errorf("unable to issue call on socket fd: %v", err1)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to SetsockoptInt on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, _, err = conn.(*net.UnixConn).WriteMsgUnix([]byte(socketMessageToGetPID), nil, nil)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to WriteMsgUnix on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
oob := make([]byte, 1024)
|
||||||
|
_, oobn, _, _, err := conn.(*net.UnixConn).ReadMsgUnix(nil, oob)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ReadMsgUnix on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
oob = oob[:oobn]
|
||||||
|
scm, err := syscall.ParseSocketControlMessage(oob)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ParseSocketControlMessage from message received on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ucred, err := syscall.ParseUnixCredentials(&scm[0])
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ParseUnixCredentials from message received on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = syscall.Kill(int(ucred.Pid), syscall.SIGHUP)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to send SIGHUP to 'containerd' process: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Try to send a SIGHUP up to maxReloadAttempts times
|
||||||
|
var err error
|
||||||
|
for i := 0; i < maxReloadAttempts; i++ {
|
||||||
|
err = retriable()
|
||||||
|
if err == nil {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if i == maxReloadAttempts-1 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
log.Warningf("Error signaling containerd, attempt %v/%v: %v", i+1, maxReloadAttempts, err)
|
||||||
|
time.Sleep(reloadBackoff)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
log.Warningf("Max retries reached %v/%v, aborting", maxReloadAttempts, maxReloadAttempts)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Successfully signaled containerd")
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -0,0 +1,29 @@
|
|||||||
|
//go:build !linux
|
||||||
|
// +build !linux
|
||||||
|
|
||||||
|
/**
|
||||||
|
# Copyright 2023 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package containerd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
// SignalContainerd is unsupported on non-linux platforms.
|
||||||
|
func SignalContainerd(socket string) error {
|
||||||
|
return errors.New("SignalContainerd is unsupported on non-linux platforms")
|
||||||
|
}
|
||||||
@@ -0,0 +1,72 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package containerd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestRuntimeOptions(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
options Options
|
||||||
|
expected map[string]interface{}
|
||||||
|
expectedError error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "empty is nil",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "empty json",
|
||||||
|
options: Options{
|
||||||
|
runtimeConfigOverrideJSON: "{}",
|
||||||
|
},
|
||||||
|
expected: map[string]interface{}{},
|
||||||
|
expectedError: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "SystemdCgroup is true",
|
||||||
|
options: Options{
|
||||||
|
runtimeConfigOverrideJSON: "{\"SystemdCgroup\": true}",
|
||||||
|
},
|
||||||
|
expected: map[string]interface{}{
|
||||||
|
"SystemdCgroup": true,
|
||||||
|
},
|
||||||
|
expectedError: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "SystemdCgroup is false",
|
||||||
|
options: Options{
|
||||||
|
runtimeConfigOverrideJSON: "{\"SystemdCgroup\": false}",
|
||||||
|
},
|
||||||
|
expected: map[string]interface{}{
|
||||||
|
"SystemdCgroup": false,
|
||||||
|
},
|
||||||
|
expectedError: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
runtimeOptions, err := tc.options.runtimeConfigOverride()
|
||||||
|
require.ErrorIs(t, tc.expectedError, err)
|
||||||
|
require.EqualValues(t, tc.expected, runtimeOptions)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
210
cmd/nvidia-ctk-installer/container/runtime/crio/crio.go
Normal file
210
cmd/nvidia-ctk-installer/container/runtime/crio/crio.go
Normal file
@@ -0,0 +1,210 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2021-2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package crio
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
cli "github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/crio"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/ocihook"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/toml"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
Name = "crio"
|
||||||
|
|
||||||
|
defaultConfigMode = "hook"
|
||||||
|
|
||||||
|
// Hook-based settings
|
||||||
|
defaultHooksDir = "/usr/share/containers/oci/hooks.d"
|
||||||
|
defaultHookFilename = "oci-nvidia-hook.json"
|
||||||
|
|
||||||
|
// Config-based settings
|
||||||
|
DefaultConfig = "/etc/crio/crio.conf"
|
||||||
|
DefaultSocket = "/var/run/crio/crio.sock"
|
||||||
|
DefaultRestartMode = "systemd"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Options defines the cri-o specific options.
|
||||||
|
type Options struct {
|
||||||
|
configMode string
|
||||||
|
|
||||||
|
// hook-specific options
|
||||||
|
hooksDir string
|
||||||
|
hookFilename string
|
||||||
|
}
|
||||||
|
|
||||||
|
func Flags(opts *Options) []cli.Flag {
|
||||||
|
flags := []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "hooks-dir",
|
||||||
|
Usage: "path to the cri-o hooks directory",
|
||||||
|
Value: defaultHooksDir,
|
||||||
|
Destination: &opts.hooksDir,
|
||||||
|
EnvVars: []string{"CRIO_HOOKS_DIR"},
|
||||||
|
DefaultText: defaultHooksDir,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "hook-filename",
|
||||||
|
Usage: "filename of the cri-o hook that will be created / removed in the hooks directory",
|
||||||
|
Value: defaultHookFilename,
|
||||||
|
Destination: &opts.hookFilename,
|
||||||
|
EnvVars: []string{"CRIO_HOOK_FILENAME"},
|
||||||
|
DefaultText: defaultHookFilename,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "config-mode",
|
||||||
|
Usage: "the configuration mode to use. One of [hook | config]",
|
||||||
|
Value: defaultConfigMode,
|
||||||
|
Destination: &opts.configMode,
|
||||||
|
EnvVars: []string{"CRIO_CONFIG_MODE"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return flags
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup installs the prestart hook required to launch GPU-enabled containers
|
||||||
|
func Setup(c *cli.Context, o *container.Options, co *Options) error {
|
||||||
|
log.Infof("Starting 'setup' for %v", c.App.Name)
|
||||||
|
|
||||||
|
switch co.configMode {
|
||||||
|
case "hook":
|
||||||
|
return setupHook(o, co)
|
||||||
|
case "config":
|
||||||
|
return setupConfig(o)
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("invalid config-mode '%v'", co.configMode)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// setupHook installs the prestart hook required to launch GPU-enabled containers
|
||||||
|
func setupHook(o *container.Options, co *Options) error {
|
||||||
|
log.Infof("Installing prestart hook")
|
||||||
|
|
||||||
|
hookPath := filepath.Join(co.hooksDir, co.hookFilename)
|
||||||
|
err := ocihook.CreateHook(hookPath, filepath.Join(o.RuntimeDir, config.NVIDIAContainerRuntimeHookExecutable))
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error creating hook: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// setupConfig updates the cri-o config for the NVIDIA container runtime
|
||||||
|
func setupConfig(o *container.Options) error {
|
||||||
|
log.Infof("Updating config file")
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Configure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to configure cri-o: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartCrio(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to restart crio: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cleanup removes the specified prestart hook
|
||||||
|
func Cleanup(c *cli.Context, o *container.Options, co *Options) error {
|
||||||
|
log.Infof("Starting 'cleanup' for %v", c.App.Name)
|
||||||
|
|
||||||
|
switch co.configMode {
|
||||||
|
case "hook":
|
||||||
|
return cleanupHook(co)
|
||||||
|
case "config":
|
||||||
|
return cleanupConfig(o)
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("invalid config-mode '%v'", co.configMode)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// cleanupHook removes the prestart hook
|
||||||
|
func cleanupHook(co *Options) error {
|
||||||
|
log.Infof("Removing prestart hook")
|
||||||
|
|
||||||
|
hookPath := filepath.Join(co.hooksDir, co.hookFilename)
|
||||||
|
err := os.Remove(hookPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error removing hook '%v': %v", hookPath, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// cleanupConfig removes the NVIDIA container runtime from the cri-o config
|
||||||
|
func cleanupConfig(o *container.Options) error {
|
||||||
|
log.Infof("Reverting config file modifications")
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Unconfigure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to unconfigure cri-o: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartCrio(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to restart crio: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RestartCrio restarts crio depending on the value of restartModeFlag
|
||||||
|
func RestartCrio(o *container.Options) error {
|
||||||
|
return o.Restart("crio", func(string) error { return fmt.Errorf("supporting crio via signal is unsupported") })
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetLowlevelRuntimePaths(o *container.Options) ([]string, error) {
|
||||||
|
cfg, err := getRuntimeConfig(o)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("unable to load crio config: %w", err)
|
||||||
|
}
|
||||||
|
return engine.GetBinaryPathsForRuntimes(cfg), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getRuntimeConfig(o *container.Options) (engine.Interface, error) {
|
||||||
|
return crio.New(
|
||||||
|
crio.WithPath(o.Config),
|
||||||
|
crio.WithConfigSource(
|
||||||
|
toml.LoadFirst(
|
||||||
|
crio.CommandLineSource(o.HostRootMount),
|
||||||
|
toml.FromFile(o.Config),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
)
|
||||||
|
}
|
||||||
111
cmd/nvidia-ctk-installer/container/runtime/docker/docker.go
Normal file
111
cmd/nvidia-ctk-installer/container/runtime/docker/docker.go
Normal file
@@ -0,0 +1,111 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package docker
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
cli "github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/docker"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
Name = "docker"
|
||||||
|
|
||||||
|
DefaultConfig = "/etc/docker/daemon.json"
|
||||||
|
DefaultSocket = "/var/run/docker.sock"
|
||||||
|
DefaultRestartMode = "signal"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Options struct{}
|
||||||
|
|
||||||
|
func Flags(opts *Options) []cli.Flag {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup updates docker configuration to include the nvidia runtime and reloads it
|
||||||
|
func Setup(c *cli.Context, o *container.Options) error {
|
||||||
|
log.Infof("Starting 'setup' for %v", c.App.Name)
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Configure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to configure docker: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartDocker(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to restart docker: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Completed 'setup' for %v", c.App.Name)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cleanup reverts docker configuration to remove the nvidia runtime and reloads it
|
||||||
|
func Cleanup(c *cli.Context, o *container.Options) error {
|
||||||
|
log.Infof("Starting 'cleanup' for %v", c.App.Name)
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Unconfigure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to unconfigure docker: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartDocker(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to signal docker: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Completed 'cleanup' for %v", c.App.Name)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RestartDocker restarts docker depending on the value of restartModeFlag
|
||||||
|
func RestartDocker(o *container.Options) error {
|
||||||
|
return o.Restart("docker", SignalDocker)
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetLowlevelRuntimePaths(o *container.Options) ([]string, error) {
|
||||||
|
cfg, err := docker.New(
|
||||||
|
docker.WithPath(o.Config),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("unable to load docker config: %w", err)
|
||||||
|
}
|
||||||
|
return engine.GetBinaryPathsForRuntimes(cfg), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getRuntimeConfig(o *container.Options) (engine.Interface, error) {
|
||||||
|
return docker.New(
|
||||||
|
docker.WithPath(o.Config),
|
||||||
|
)
|
||||||
|
}
|
||||||
@@ -0,0 +1,113 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2021-2023 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package docker
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"syscall"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
reloadBackoff = 5 * time.Second
|
||||||
|
maxReloadAttempts = 6
|
||||||
|
|
||||||
|
socketMessageToGetPID = "GET /info HTTP/1.0\r\n\r\n"
|
||||||
|
)
|
||||||
|
|
||||||
|
// SignalDocker sends a SIGHUP signal to docker daemon
|
||||||
|
func SignalDocker(socket string) error {
|
||||||
|
log.Infof("Sending SIGHUP signal to docker")
|
||||||
|
|
||||||
|
// Wrap the logic to perform the SIGHUP in a function so we can retry it on failure
|
||||||
|
retriable := func() error {
|
||||||
|
conn, err := net.Dial("unix", socket)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to dial: %v", err)
|
||||||
|
}
|
||||||
|
defer conn.Close()
|
||||||
|
|
||||||
|
sconn, err := conn.(*net.UnixConn).SyscallConn()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to get syscall connection: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err1 := sconn.Control(func(fd uintptr) {
|
||||||
|
err = syscall.SetsockoptInt(int(fd), syscall.SOL_SOCKET, syscall.SO_PASSCRED, 1)
|
||||||
|
})
|
||||||
|
if err1 != nil {
|
||||||
|
return fmt.Errorf("unable to issue call on socket fd: %v", err1)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to SetsockoptInt on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, _, err = conn.(*net.UnixConn).WriteMsgUnix([]byte(socketMessageToGetPID), nil, nil)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to WriteMsgUnix on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
oob := make([]byte, 1024)
|
||||||
|
_, oobn, _, _, err := conn.(*net.UnixConn).ReadMsgUnix(nil, oob)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ReadMsgUnix on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
oob = oob[:oobn]
|
||||||
|
scm, err := syscall.ParseSocketControlMessage(oob)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ParseSocketControlMessage from message received on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ucred, err := syscall.ParseUnixCredentials(&scm[0])
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ParseUnixCredentials from message received on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = syscall.Kill(int(ucred.Pid), syscall.SIGHUP)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to send SIGHUP to 'docker' process: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Try to send a SIGHUP up to maxReloadAttempts times
|
||||||
|
var err error
|
||||||
|
for i := 0; i < maxReloadAttempts; i++ {
|
||||||
|
err = retriable()
|
||||||
|
if err == nil {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if i == maxReloadAttempts-1 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
log.Warningf("Error signaling docker, attempt %v/%v: %v", i+1, maxReloadAttempts, err)
|
||||||
|
time.Sleep(reloadBackoff)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
log.Warningf("Max retries reached %v/%v, aborting", maxReloadAttempts, maxReloadAttempts)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Successfully signaled docker")
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -0,0 +1,29 @@
|
|||||||
|
//go:build !linux
|
||||||
|
// +build !linux
|
||||||
|
|
||||||
|
/**
|
||||||
|
# Copyright 2023 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package docker
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
// SignalDocker is unsupported on non-linux platforms.
|
||||||
|
func SignalDocker(socket string) error {
|
||||||
|
return errors.New("SignalDocker is unsupported on non-linux platforms")
|
||||||
|
}
|
||||||
@@ -14,13 +14,16 @@
|
|||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package main
|
package docker
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/docker"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestUpdateConfigDefaultRuntime(t *testing.T) {
|
func TestUpdateConfigDefaultRuntime(t *testing.T) {
|
||||||
@@ -41,11 +44,6 @@ func TestUpdateConfigDefaultRuntime(t *testing.T) {
|
|||||||
runtimeName: "NAME",
|
runtimeName: "NAME",
|
||||||
expectedDefaultRuntimeName: "NAME",
|
expectedDefaultRuntimeName: "NAME",
|
||||||
},
|
},
|
||||||
{
|
|
||||||
setAsDefault: true,
|
|
||||||
runtimeName: "nvidia-experimental",
|
|
||||||
expectedDefaultRuntimeName: "nvidia-experimental",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
setAsDefault: true,
|
setAsDefault: true,
|
||||||
runtimeName: "nvidia",
|
runtimeName: "nvidia",
|
||||||
@@ -54,15 +52,15 @@ func TestUpdateConfigDefaultRuntime(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
o := &options{
|
o := &container.Options{
|
||||||
setAsDefault: tc.setAsDefault,
|
RuntimeName: tc.runtimeName,
|
||||||
runtimeName: tc.runtimeName,
|
RuntimeDir: runtimeDir,
|
||||||
runtimeDir: runtimeDir,
|
SetAsDefault: tc.setAsDefault,
|
||||||
}
|
}
|
||||||
|
|
||||||
config := map[string]interface{}{}
|
config := docker.Config(map[string]interface{}{})
|
||||||
|
|
||||||
err := UpdateConfig(config, o)
|
err := o.UpdateConfig(&config)
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
require.NoError(t, err, "%d: %v", i, tc)
|
||||||
|
|
||||||
defaultRuntimeName := config["default-runtime"]
|
defaultRuntimeName := config["default-runtime"]
|
||||||
@@ -74,7 +72,7 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
const runtimeDir = "/test/runtime/dir"
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
config map[string]interface{}
|
config docker.Config
|
||||||
setAsDefault bool
|
setAsDefault bool
|
||||||
runtimeName string
|
runtimeName string
|
||||||
expectedConfig map[string]interface{}
|
expectedConfig map[string]interface{}
|
||||||
@@ -88,8 +86,12 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime-experimental",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
"args": []string{},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"path": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@@ -105,25 +107,12 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime-experimental",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
},
|
"nvidia-legacy": map[string]interface{}{
|
||||||
},
|
"path": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
},
|
|
||||||
{
|
|
||||||
config: map[string]interface{}{},
|
|
||||||
setAsDefault: false,
|
|
||||||
runtimeName: "nvidia-experimental",
|
|
||||||
expectedConfig: map[string]interface{}{
|
|
||||||
"runtimes": map[string]interface{}{
|
|
||||||
"nvidia": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime-experimental",
|
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@@ -145,8 +134,12 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime-experimental",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
"args": []string{},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"path": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@@ -171,8 +164,12 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime-experimental",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
"args": []string{},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"path": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@@ -191,28 +188,12 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime-experimental",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
},
|
"nvidia-legacy": map[string]interface{}{
|
||||||
},
|
"path": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
},
|
|
||||||
{
|
|
||||||
config: map[string]interface{}{
|
|
||||||
"default-runtime": "runc",
|
|
||||||
},
|
|
||||||
setAsDefault: true,
|
|
||||||
runtimeName: "nvidia-experimental",
|
|
||||||
expectedConfig: map[string]interface{}{
|
|
||||||
"default-runtime": "nvidia-experimental",
|
|
||||||
"runtimes": map[string]interface{}{
|
|
||||||
"nvidia": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime-experimental",
|
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@@ -239,8 +220,12 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime-experimental",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
"args": []string{},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"path": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@@ -249,12 +234,15 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
options := &options{
|
tc := tc
|
||||||
setAsDefault: tc.setAsDefault,
|
|
||||||
runtimeName: tc.runtimeName,
|
o := &container.Options{
|
||||||
runtimeDir: runtimeDir,
|
RuntimeName: tc.runtimeName,
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
SetAsDefault: tc.setAsDefault,
|
||||||
}
|
}
|
||||||
err := UpdateConfig(tc.config, options)
|
|
||||||
|
err := o.UpdateConfig(&tc.config)
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
require.NoError(t, err, "%d: %v", i, tc)
|
||||||
|
|
||||||
configContent, err := json.MarshalIndent(tc.config, "", " ")
|
configContent, err := json.MarshalIndent(tc.config, "", " ")
|
||||||
@@ -269,7 +257,7 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
|
|
||||||
func TestRevertConfig(t *testing.T) {
|
func TestRevertConfig(t *testing.T) {
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
config map[string]interface{}
|
config docker.Config
|
||||||
expectedConfig map[string]interface{}
|
expectedConfig map[string]interface{}
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
@@ -290,7 +278,7 @@ func TestRevertConfig(t *testing.T) {
|
|||||||
{
|
{
|
||||||
config: map[string]interface{}{
|
config: map[string]interface{}{
|
||||||
"runtimes": map[string]interface{}{
|
"runtimes": map[string]interface{}{
|
||||||
"nvidia-experimental": map[string]interface{}{
|
"nvidia": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
@@ -305,8 +293,12 @@ func TestRevertConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime-experimental",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
|
"args": []string{},
|
||||||
|
},
|
||||||
|
"nvidia-legacy": map[string]interface{}{
|
||||||
|
"path": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@@ -368,7 +360,9 @@ func TestRevertConfig(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
err := RevertConfig(tc.config)
|
tc := tc
|
||||||
|
o := &container.Options{}
|
||||||
|
err := o.RevertConfig(&tc.config)
|
||||||
|
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
require.NoError(t, err, "%d: %v", i, tc)
|
||||||
|
|
||||||
@@ -381,43 +375,3 @@ func TestRevertConfig(t *testing.T) {
|
|||||||
require.EqualValues(t, string(expectedContent), string(configContent), "%d: %v", i, tc)
|
require.EqualValues(t, string(expectedContent), string(configContent), "%d: %v", i, tc)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestFlagsDefaultRuntime(t *testing.T) {
|
|
||||||
testCases := []struct {
|
|
||||||
setAsDefault bool
|
|
||||||
runtimeName string
|
|
||||||
expected string
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
expected: "",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
runtimeName: "not-bool",
|
|
||||||
expected: "",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
setAsDefault: false,
|
|
||||||
runtimeName: "nvidia",
|
|
||||||
expected: "",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
setAsDefault: true,
|
|
||||||
runtimeName: "nvidia",
|
|
||||||
expected: "nvidia",
|
|
||||||
},
|
|
||||||
{
|
|
||||||
setAsDefault: true,
|
|
||||||
runtimeName: "nvidia-experimental",
|
|
||||||
expected: "nvidia-experimental",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for i, tc := range testCases {
|
|
||||||
f := options{
|
|
||||||
setAsDefault: tc.setAsDefault,
|
|
||||||
runtimeName: tc.runtimeName,
|
|
||||||
}
|
|
||||||
|
|
||||||
require.Equal(t, tc.expected, f.getDefaultRuntime(), "%d: %v", i, tc)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
192
cmd/nvidia-ctk-installer/container/runtime/runtime.go
Normal file
192
cmd/nvidia-ctk-installer/container/runtime/runtime.go
Normal file
@@ -0,0 +1,192 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package runtime
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/runtime/containerd"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/runtime/crio"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/runtime/docker"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/toolkit"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
defaultSetAsDefault = true
|
||||||
|
// defaultRuntimeName specifies the NVIDIA runtime to be use as the default runtime if setting the default runtime is enabled
|
||||||
|
defaultRuntimeName = "nvidia"
|
||||||
|
defaultHostRootMount = "/host"
|
||||||
|
|
||||||
|
runtimeSpecificDefault = "RUNTIME_SPECIFIC_DEFAULT"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Options struct {
|
||||||
|
container.Options
|
||||||
|
|
||||||
|
containerdOptions containerd.Options
|
||||||
|
crioOptions crio.Options
|
||||||
|
}
|
||||||
|
|
||||||
|
func Flags(opts *Options) []cli.Flag {
|
||||||
|
flags := []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "config",
|
||||||
|
Usage: "Path to the runtime config file",
|
||||||
|
Value: runtimeSpecificDefault,
|
||||||
|
Destination: &opts.Config,
|
||||||
|
EnvVars: []string{"RUNTIME_CONFIG", "CONTAINERD_CONFIG", "DOCKER_CONFIG"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "socket",
|
||||||
|
Usage: "Path to the runtime socket file",
|
||||||
|
Value: runtimeSpecificDefault,
|
||||||
|
Destination: &opts.Socket,
|
||||||
|
EnvVars: []string{"RUNTIME_SOCKET", "CONTAINERD_SOCKET", "DOCKER_SOCKET"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "restart-mode",
|
||||||
|
Usage: "Specify how the runtime should be restarted; If 'none' is selected it will not be restarted [signal | systemd | none ]",
|
||||||
|
Value: runtimeSpecificDefault,
|
||||||
|
Destination: &opts.RestartMode,
|
||||||
|
EnvVars: []string{"RUNTIME_RESTART_MODE"},
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "enable-cdi-in-runtime",
|
||||||
|
Usage: "Enable CDI in the configured runt ime",
|
||||||
|
Destination: &opts.EnableCDI,
|
||||||
|
EnvVars: []string{"RUNTIME_ENABLE_CDI"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "host-root",
|
||||||
|
Usage: "Specify the path to the host root to be used when restarting the runtime using systemd",
|
||||||
|
Value: defaultHostRootMount,
|
||||||
|
Destination: &opts.HostRootMount,
|
||||||
|
EnvVars: []string{"HOST_ROOT_MOUNT"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "runtime-name",
|
||||||
|
Aliases: []string{"nvidia-runtime-name", "runtime-class"},
|
||||||
|
Usage: "Specify the name of the `nvidia` runtime. If set-as-default is selected, the runtime is used as the default runtime.",
|
||||||
|
Value: defaultRuntimeName,
|
||||||
|
Destination: &opts.RuntimeName,
|
||||||
|
EnvVars: []string{"NVIDIA_RUNTIME_NAME", "CONTAINERD_RUNTIME_CLASS", "DOCKER_RUNTIME_NAME"},
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "set-as-default",
|
||||||
|
Usage: "Set the `nvidia` runtime as the default runtime.",
|
||||||
|
Value: defaultSetAsDefault,
|
||||||
|
Destination: &opts.SetAsDefault,
|
||||||
|
EnvVars: []string{"NVIDIA_RUNTIME_SET_AS_DEFAULT", "CONTAINERD_SET_AS_DEFAULT", "DOCKER_SET_AS_DEFAULT"},
|
||||||
|
Hidden: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags = append(flags, containerd.Flags(&opts.containerdOptions)...)
|
||||||
|
flags = append(flags, crio.Flags(&opts.crioOptions)...)
|
||||||
|
|
||||||
|
return flags
|
||||||
|
}
|
||||||
|
|
||||||
|
// ValidateOptions checks whether the specified options are valid
|
||||||
|
func ValidateOptions(c *cli.Context, opts *Options, runtime string, toolkitRoot string, to *toolkit.Options) error {
|
||||||
|
// We set this option here to ensure that it is available in future calls.
|
||||||
|
opts.RuntimeDir = toolkitRoot
|
||||||
|
|
||||||
|
if !c.IsSet("enable-cdi-in-runtime") {
|
||||||
|
opts.EnableCDI = to.CDI.Enabled
|
||||||
|
}
|
||||||
|
|
||||||
|
// Apply the runtime-specific config changes.
|
||||||
|
switch runtime {
|
||||||
|
case containerd.Name:
|
||||||
|
if opts.Config == runtimeSpecificDefault {
|
||||||
|
opts.Config = containerd.DefaultConfig
|
||||||
|
}
|
||||||
|
if opts.Socket == runtimeSpecificDefault {
|
||||||
|
opts.Socket = containerd.DefaultSocket
|
||||||
|
}
|
||||||
|
if opts.RestartMode == runtimeSpecificDefault {
|
||||||
|
opts.RestartMode = containerd.DefaultRestartMode
|
||||||
|
}
|
||||||
|
case crio.Name:
|
||||||
|
if opts.Config == runtimeSpecificDefault {
|
||||||
|
opts.Config = crio.DefaultConfig
|
||||||
|
}
|
||||||
|
if opts.Socket == runtimeSpecificDefault {
|
||||||
|
opts.Socket = crio.DefaultSocket
|
||||||
|
}
|
||||||
|
if opts.RestartMode == runtimeSpecificDefault {
|
||||||
|
opts.RestartMode = crio.DefaultRestartMode
|
||||||
|
}
|
||||||
|
case docker.Name:
|
||||||
|
if opts.Config == runtimeSpecificDefault {
|
||||||
|
opts.Config = docker.DefaultConfig
|
||||||
|
}
|
||||||
|
if opts.Socket == runtimeSpecificDefault {
|
||||||
|
opts.Socket = docker.DefaultSocket
|
||||||
|
}
|
||||||
|
if opts.RestartMode == runtimeSpecificDefault {
|
||||||
|
opts.RestartMode = docker.DefaultRestartMode
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("undefined runtime %v", runtime)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Setup(c *cli.Context, opts *Options, runtime string) error {
|
||||||
|
switch runtime {
|
||||||
|
case containerd.Name:
|
||||||
|
return containerd.Setup(c, &opts.Options, &opts.containerdOptions)
|
||||||
|
case crio.Name:
|
||||||
|
return crio.Setup(c, &opts.Options, &opts.crioOptions)
|
||||||
|
case docker.Name:
|
||||||
|
return docker.Setup(c, &opts.Options)
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("undefined runtime %v", runtime)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func Cleanup(c *cli.Context, opts *Options, runtime string) error {
|
||||||
|
switch runtime {
|
||||||
|
case containerd.Name:
|
||||||
|
return containerd.Cleanup(c, &opts.Options, &opts.containerdOptions)
|
||||||
|
case crio.Name:
|
||||||
|
return crio.Cleanup(c, &opts.Options, &opts.crioOptions)
|
||||||
|
case docker.Name:
|
||||||
|
return docker.Cleanup(c, &opts.Options)
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("undefined runtime %v", runtime)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetLowlevelRuntimePaths(opts *Options, runtime string) ([]string, error) {
|
||||||
|
switch runtime {
|
||||||
|
case containerd.Name:
|
||||||
|
return containerd.GetLowlevelRuntimePaths(&opts.Options, &opts.containerdOptions)
|
||||||
|
case crio.Name:
|
||||||
|
return crio.GetLowlevelRuntimePaths(&opts.Options)
|
||||||
|
case docker.Name:
|
||||||
|
return docker.GetLowlevelRuntimePaths(&opts.Options)
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("undefined runtime %v", runtime)
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -14,7 +14,7 @@
|
|||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package main
|
package toolkit
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
@@ -23,8 +23,6 @@ import (
|
|||||||
"path/filepath"
|
"path/filepath"
|
||||||
"sort"
|
"sort"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
log "github.com/sirupsen/logrus"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type executableTarget struct {
|
type executableTarget struct {
|
||||||
@@ -33,6 +31,7 @@ type executableTarget struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
type executable struct {
|
type executable struct {
|
||||||
|
fileInstaller
|
||||||
source string
|
source string
|
||||||
target executableTarget
|
target executableTarget
|
||||||
env map[string]string
|
env map[string]string
|
||||||
@@ -43,21 +42,21 @@ type executable struct {
|
|||||||
// install installs an executable component of the NVIDIA container toolkit. The source executable
|
// install installs an executable component of the NVIDIA container toolkit. The source executable
|
||||||
// is copied to a `.real` file and a wapper is created to set up the environment as required.
|
// is copied to a `.real` file and a wapper is created to set up the environment as required.
|
||||||
func (e executable) install(destFolder string) (string, error) {
|
func (e executable) install(destFolder string) (string, error) {
|
||||||
log.Infof("Installing executable '%v' to %v", e.source, destFolder)
|
e.logger.Infof("Installing executable '%v' to %v", e.source, destFolder)
|
||||||
|
|
||||||
dotfileName := e.dotfileName()
|
dotfileName := e.dotfileName()
|
||||||
|
|
||||||
installedDotfileName, err := installFileToFolderWithName(destFolder, dotfileName, e.source)
|
installedDotfileName, err := e.installFileToFolderWithName(destFolder, dotfileName, e.source)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", fmt.Errorf("error installing file '%v' as '%v': %v", e.source, dotfileName, err)
|
return "", fmt.Errorf("error installing file '%v' as '%v': %v", e.source, dotfileName, err)
|
||||||
}
|
}
|
||||||
log.Infof("Installed '%v'", installedDotfileName)
|
e.logger.Infof("Installed '%v'", installedDotfileName)
|
||||||
|
|
||||||
wrapperFilename, err := e.installWrapper(destFolder, installedDotfileName)
|
wrapperFilename, err := e.installWrapper(destFolder, installedDotfileName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", fmt.Errorf("error wrapping '%v': %v", installedDotfileName, err)
|
return "", fmt.Errorf("error wrapping '%v': %v", installedDotfileName, err)
|
||||||
}
|
}
|
||||||
log.Infof("Installed wrapper '%v'", wrapperFilename)
|
e.logger.Infof("Installed wrapper '%v'", wrapperFilename)
|
||||||
|
|
||||||
return wrapperFilename, nil
|
return wrapperFilename, nil
|
||||||
}
|
}
|
||||||
@@ -14,7 +14,7 @@
|
|||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package main
|
package toolkit
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
@@ -23,10 +23,13 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestWrapper(t *testing.T) {
|
func TestWrapper(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
|
||||||
const shebang = "#! /bin/sh"
|
const shebang = "#! /bin/sh"
|
||||||
const destFolder = "/dest/folder"
|
const destFolder = "/dest/folder"
|
||||||
const dotfileName = "source.real"
|
const dotfileName = "source.real"
|
||||||
@@ -98,6 +101,8 @@ func TestWrapper(t *testing.T) {
|
|||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
buf := &bytes.Buffer{}
|
buf := &bytes.Buffer{}
|
||||||
|
|
||||||
|
tc.e.logger = logger
|
||||||
|
|
||||||
err := tc.e.writeWrapperTo(buf, destFolder, dotfileName)
|
err := tc.e.writeWrapperTo(buf, destFolder, dotfileName)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
@@ -107,6 +112,8 @@ func TestWrapper(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func TestInstallExecutable(t *testing.T) {
|
func TestInstallExecutable(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
|
||||||
inputFolder, err := os.MkdirTemp("", "")
|
inputFolder, err := os.MkdirTemp("", "")
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
defer os.RemoveAll(inputFolder)
|
defer os.RemoveAll(inputFolder)
|
||||||
@@ -121,6 +128,9 @@ func TestInstallExecutable(t *testing.T) {
|
|||||||
require.NoError(t, sourceFile.Close())
|
require.NoError(t, sourceFile.Close())
|
||||||
|
|
||||||
e := executable{
|
e := executable{
|
||||||
|
fileInstaller: fileInstaller{
|
||||||
|
logger: logger,
|
||||||
|
},
|
||||||
source: source,
|
source: source,
|
||||||
target: executableTarget{
|
target: executableTarget{
|
||||||
dotfileName: "input.real",
|
dotfileName: "input.real",
|
||||||
95
cmd/nvidia-ctk-installer/container/toolkit/file-installer.go
Normal file
95
cmd/nvidia-ctk-installer/container/toolkit/file-installer.go
Normal file
@@ -0,0 +1,95 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package toolkit
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type fileInstaller struct {
|
||||||
|
logger logger.Interface
|
||||||
|
// sourceRoot specifies the root that is searched for the components to install.
|
||||||
|
sourceRoot string
|
||||||
|
}
|
||||||
|
|
||||||
|
// installFileToFolder copies a source file to a destination folder.
|
||||||
|
// The path of the input file is ignored.
|
||||||
|
// e.g. installFileToFolder("/some/path/file.txt", "/output/path")
|
||||||
|
// will result in a file "/output/path/file.txt" being generated
|
||||||
|
func (t *fileInstaller) installFileToFolder(destFolder string, src string) (string, error) {
|
||||||
|
name := filepath.Base(src)
|
||||||
|
return t.installFileToFolderWithName(destFolder, name, src)
|
||||||
|
}
|
||||||
|
|
||||||
|
// cp src destFolder/name
|
||||||
|
func (t *fileInstaller) installFileToFolderWithName(destFolder string, name, src string) (string, error) {
|
||||||
|
dest := filepath.Join(destFolder, name)
|
||||||
|
err := t.installFile(dest, src)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("error copying '%v' to '%v': %v", src, dest, err)
|
||||||
|
}
|
||||||
|
return dest, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// installFile copies a file from src to dest and maintains
|
||||||
|
// file modes
|
||||||
|
func (t *fileInstaller) installFile(dest string, src string) error {
|
||||||
|
src = filepath.Join(t.sourceRoot, src)
|
||||||
|
t.logger.Infof("Installing '%v' to '%v'", src, dest)
|
||||||
|
|
||||||
|
source, err := os.Open(src)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error opening source: %v", err)
|
||||||
|
}
|
||||||
|
defer source.Close()
|
||||||
|
|
||||||
|
destination, err := os.Create(dest)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error creating destination: %v", err)
|
||||||
|
}
|
||||||
|
defer destination.Close()
|
||||||
|
|
||||||
|
_, err = io.Copy(destination, source)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error copying file: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = applyModeFromSource(dest, src)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error setting destination file mode: %v", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// applyModeFromSource sets the file mode for a destination file
|
||||||
|
// to match that of a specified source file
|
||||||
|
func applyModeFromSource(dest string, src string) error {
|
||||||
|
sourceInfo, err := os.Stat(src)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error getting file info for '%v': %v", src, err)
|
||||||
|
}
|
||||||
|
err = os.Chmod(dest, sourceInfo.Mode())
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error setting mode for '%v': %v", dest, err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
40
cmd/nvidia-ctk-installer/container/toolkit/options.go
Normal file
40
cmd/nvidia-ctk-installer/container/toolkit/options.go
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package toolkit
|
||||||
|
|
||||||
|
import "github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
|
||||||
|
// An Option provides a mechanism to configure an Installer.
|
||||||
|
type Option func(*Installer)
|
||||||
|
|
||||||
|
func WithLogger(logger logger.Interface) Option {
|
||||||
|
return func(i *Installer) {
|
||||||
|
i.logger = logger
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func WithToolkitRoot(toolkitRoot string) Option {
|
||||||
|
return func(i *Installer) {
|
||||||
|
i.toolkitRoot = toolkitRoot
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func WithSourceRoot(sourceRoot string) Option {
|
||||||
|
return func(i *Installer) {
|
||||||
|
i.sourceRoot = sourceRoot
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -14,7 +14,7 @@
|
|||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package main
|
package toolkit
|
||||||
|
|
||||||
import "strings"
|
import "strings"
|
||||||
|
|
||||||
85
cmd/nvidia-ctk-installer/container/toolkit/runtime.go
Normal file
85
cmd/nvidia-ctk-installer/container/toolkit/runtime.go
Normal file
@@ -0,0 +1,85 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package toolkit
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/operator"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
nvidiaContainerRuntimeSource = "/usr/bin/nvidia-container-runtime"
|
||||||
|
)
|
||||||
|
|
||||||
|
// installContainerRuntimes sets up the NVIDIA container runtimes, copying the executables
|
||||||
|
// and implementing the required wrapper
|
||||||
|
func (t *Installer) installContainerRuntimes(toolkitDir string) error {
|
||||||
|
runtimes := operator.GetRuntimes()
|
||||||
|
for _, runtime := range runtimes {
|
||||||
|
r := t.newNvidiaContainerRuntimeInstaller(runtime.Path)
|
||||||
|
|
||||||
|
_, err := r.install(toolkitDir)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error installing NVIDIA container runtime: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// newNVidiaContainerRuntimeInstaller returns a new executable installer for the NVIDIA container runtime.
|
||||||
|
// This installer will copy the specified source executable to the toolkit directory.
|
||||||
|
// The executable is copied to a file with the same name as the source, but with a ".real" suffix and a wrapper is
|
||||||
|
// created to allow for the configuration of the runtime environment.
|
||||||
|
func (t *Installer) newNvidiaContainerRuntimeInstaller(source string) *executable {
|
||||||
|
wrapperName := filepath.Base(source)
|
||||||
|
dotfileName := wrapperName + ".real"
|
||||||
|
target := executableTarget{
|
||||||
|
dotfileName: dotfileName,
|
||||||
|
wrapperName: wrapperName,
|
||||||
|
}
|
||||||
|
return t.newRuntimeInstaller(source, target, nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *Installer) newRuntimeInstaller(source string, target executableTarget, env map[string]string) *executable {
|
||||||
|
preLines := []string{
|
||||||
|
"",
|
||||||
|
"cat /proc/modules | grep -e \"^nvidia \" >/dev/null 2>&1",
|
||||||
|
"if [ \"${?}\" != \"0\" ]; then",
|
||||||
|
" echo \"nvidia driver modules are not yet loaded, invoking runc directly\"",
|
||||||
|
" exec runc \"$@\"",
|
||||||
|
"fi",
|
||||||
|
"",
|
||||||
|
}
|
||||||
|
|
||||||
|
runtimeEnv := make(map[string]string)
|
||||||
|
runtimeEnv["XDG_CONFIG_HOME"] = filepath.Join(destDirPattern, ".config")
|
||||||
|
for k, v := range env {
|
||||||
|
runtimeEnv[k] = v
|
||||||
|
}
|
||||||
|
|
||||||
|
r := executable{
|
||||||
|
fileInstaller: t.fileInstaller,
|
||||||
|
source: source,
|
||||||
|
target: target,
|
||||||
|
env: runtimeEnv,
|
||||||
|
preLines: preLines,
|
||||||
|
}
|
||||||
|
|
||||||
|
return &r
|
||||||
|
}
|
||||||
@@ -14,18 +14,25 @@
|
|||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package main
|
package toolkit
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestNvidiaContainerRuntimeInstallerWrapper(t *testing.T) {
|
func TestNvidiaContainerRuntimeInstallerWrapper(t *testing.T) {
|
||||||
r := newNvidiaContainerRuntimeInstaller()
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
i := Installer{
|
||||||
|
fileInstaller: fileInstaller{
|
||||||
|
logger: logger,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
r := i.newNvidiaContainerRuntimeInstaller(nvidiaContainerRuntimeSource)
|
||||||
|
|
||||||
const shebang = "#! /bin/sh"
|
const shebang = "#! /bin/sh"
|
||||||
const destFolder = "/dest/folder"
|
const destFolder = "/dest/folder"
|
||||||
@@ -55,36 +62,3 @@ func TestNvidiaContainerRuntimeInstallerWrapper(t *testing.T) {
|
|||||||
exepectedContents := strings.Join(expectedLines, "\n")
|
exepectedContents := strings.Join(expectedLines, "\n")
|
||||||
require.Equal(t, exepectedContents, buf.String())
|
require.Equal(t, exepectedContents, buf.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestExperimentalContainerRuntimeInstallerWrapper(t *testing.T) {
|
|
||||||
r := newNvidiaContainerRuntimeExperimentalInstaller("/some/root/usr/lib64")
|
|
||||||
|
|
||||||
const shebang = "#! /bin/sh"
|
|
||||||
const destFolder = "/dest/folder"
|
|
||||||
const dotfileName = "source.real"
|
|
||||||
|
|
||||||
buf := &bytes.Buffer{}
|
|
||||||
|
|
||||||
err := r.writeWrapperTo(buf, destFolder, dotfileName)
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
expectedLines := []string{
|
|
||||||
shebang,
|
|
||||||
"",
|
|
||||||
"cat /proc/modules | grep -e \"^nvidia \" >/dev/null 2>&1",
|
|
||||||
"if [ \"${?}\" != \"0\" ]; then",
|
|
||||||
" echo \"nvidia driver modules are not yet loaded, invoking runc directly\"",
|
|
||||||
" exec runc \"$@\"",
|
|
||||||
"fi",
|
|
||||||
"",
|
|
||||||
"LD_LIBRARY_PATH=/some/root/usr/lib64:$LD_LIBRARY_PATH \\",
|
|
||||||
"PATH=/dest/folder:$PATH \\",
|
|
||||||
"XDG_CONFIG_HOME=/dest/folder/.config \\",
|
|
||||||
"source.real \\",
|
|
||||||
"\t\"$@\"",
|
|
||||||
"",
|
|
||||||
}
|
|
||||||
|
|
||||||
exepectedContents := strings.Join(expectedLines, "\n")
|
|
||||||
require.Equal(t, exepectedContents, buf.String())
|
|
||||||
}
|
|
||||||
748
cmd/nvidia-ctk-installer/container/toolkit/toolkit.go
Normal file
748
cmd/nvidia-ctk-installer/container/toolkit/toolkit.go
Normal file
@@ -0,0 +1,748 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package toolkit
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
"tags.cncf.io/container-device-interface/pkg/cdi"
|
||||||
|
"tags.cncf.io/container-device-interface/pkg/parser"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/system/nvdevices"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi"
|
||||||
|
transformroot "github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/transform/root"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
// DefaultNvidiaDriverRoot specifies the default NVIDIA driver run directory
|
||||||
|
DefaultNvidiaDriverRoot = "/run/nvidia/driver"
|
||||||
|
|
||||||
|
nvidiaContainerCliSource = "/usr/bin/nvidia-container-cli"
|
||||||
|
nvidiaContainerRuntimeHookSource = "/usr/bin/nvidia-container-runtime-hook"
|
||||||
|
|
||||||
|
nvidiaContainerToolkitConfigSource = "/etc/nvidia-container-runtime/config.toml"
|
||||||
|
configFilename = "config.toml"
|
||||||
|
)
|
||||||
|
|
||||||
|
type cdiOptions struct {
|
||||||
|
Enabled bool
|
||||||
|
outputDir string
|
||||||
|
kind string
|
||||||
|
vendor string
|
||||||
|
class string
|
||||||
|
}
|
||||||
|
|
||||||
|
type Options struct {
|
||||||
|
DriverRoot string
|
||||||
|
DevRoot string
|
||||||
|
DriverRootCtrPath string
|
||||||
|
DevRootCtrPath string
|
||||||
|
|
||||||
|
ContainerRuntimeMode string
|
||||||
|
ContainerRuntimeDebug string
|
||||||
|
ContainerRuntimeLogLevel string
|
||||||
|
|
||||||
|
ContainerRuntimeModesCdiDefaultKind string
|
||||||
|
ContainerRuntimeModesCDIAnnotationPrefixes cli.StringSlice
|
||||||
|
|
||||||
|
ContainerRuntimeRuntimes cli.StringSlice
|
||||||
|
|
||||||
|
ContainerRuntimeHookSkipModeDetection bool
|
||||||
|
|
||||||
|
ContainerCLIDebug string
|
||||||
|
|
||||||
|
// CDI stores the CDI options for the toolkit.
|
||||||
|
CDI cdiOptions
|
||||||
|
|
||||||
|
createDeviceNodes cli.StringSlice
|
||||||
|
|
||||||
|
acceptNVIDIAVisibleDevicesWhenUnprivileged bool
|
||||||
|
acceptNVIDIAVisibleDevicesAsVolumeMounts bool
|
||||||
|
|
||||||
|
ignoreErrors bool
|
||||||
|
|
||||||
|
optInFeatures cli.StringSlice
|
||||||
|
}
|
||||||
|
|
||||||
|
func Flags(opts *Options) []cli.Flag {
|
||||||
|
flags := []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "driver-root",
|
||||||
|
Aliases: []string{"nvidia-driver-root"},
|
||||||
|
Value: DefaultNvidiaDriverRoot,
|
||||||
|
Destination: &opts.DriverRoot,
|
||||||
|
EnvVars: []string{"NVIDIA_DRIVER_ROOT", "DRIVER_ROOT"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "driver-root-ctr-path",
|
||||||
|
Value: DefaultNvidiaDriverRoot,
|
||||||
|
Destination: &opts.DriverRootCtrPath,
|
||||||
|
EnvVars: []string{"DRIVER_ROOT_CTR_PATH"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "dev-root",
|
||||||
|
Usage: "Specify the root where `/dev` is located. If this is not specified, the driver-root is assumed.",
|
||||||
|
Destination: &opts.DevRoot,
|
||||||
|
EnvVars: []string{"NVIDIA_DEV_ROOT", "DEV_ROOT"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "dev-root-ctr-path",
|
||||||
|
Usage: "Specify the root where `/dev` is located in the container. If this is not specified, the driver-root-ctr-path is assumed.",
|
||||||
|
Destination: &opts.DevRootCtrPath,
|
||||||
|
EnvVars: []string{"DEV_ROOT_CTR_PATH"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-container-runtime.debug",
|
||||||
|
Aliases: []string{"nvidia-container-runtime-debug"},
|
||||||
|
Usage: "Specify the location of the debug log file for the NVIDIA Container Runtime",
|
||||||
|
Destination: &opts.ContainerRuntimeDebug,
|
||||||
|
EnvVars: []string{"NVIDIA_CONTAINER_RUNTIME_DEBUG"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-container-runtime.log-level",
|
||||||
|
Aliases: []string{"nvidia-container-runtime-debug-log-level"},
|
||||||
|
Destination: &opts.ContainerRuntimeLogLevel,
|
||||||
|
EnvVars: []string{"NVIDIA_CONTAINER_RUNTIME_LOG_LEVEL"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-container-runtime.mode",
|
||||||
|
Aliases: []string{"nvidia-container-runtime-mode"},
|
||||||
|
Destination: &opts.ContainerRuntimeMode,
|
||||||
|
EnvVars: []string{"NVIDIA_CONTAINER_RUNTIME_MODE"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-container-runtime.modes.cdi.default-kind",
|
||||||
|
Destination: &opts.ContainerRuntimeModesCdiDefaultKind,
|
||||||
|
EnvVars: []string{"NVIDIA_CONTAINER_RUNTIME_MODES_CDI_DEFAULT_KIND"},
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "nvidia-container-runtime.modes.cdi.annotation-prefixes",
|
||||||
|
Destination: &opts.ContainerRuntimeModesCDIAnnotationPrefixes,
|
||||||
|
EnvVars: []string{"NVIDIA_CONTAINER_RUNTIME_MODES_CDI_ANNOTATION_PREFIXES"},
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "nvidia-container-runtime.runtimes",
|
||||||
|
Destination: &opts.ContainerRuntimeRuntimes,
|
||||||
|
EnvVars: []string{"NVIDIA_CONTAINER_RUNTIME_RUNTIMES"},
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "nvidia-container-runtime-hook.skip-mode-detection",
|
||||||
|
Value: true,
|
||||||
|
Destination: &opts.ContainerRuntimeHookSkipModeDetection,
|
||||||
|
EnvVars: []string{"NVIDIA_CONTAINER_RUNTIME_HOOK_SKIP_MODE_DETECTION"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-container-cli.debug",
|
||||||
|
Aliases: []string{"nvidia-container-cli-debug"},
|
||||||
|
Usage: "Specify the location of the debug log file for the NVIDIA Container CLI",
|
||||||
|
Destination: &opts.ContainerCLIDebug,
|
||||||
|
EnvVars: []string{"NVIDIA_CONTAINER_CLI_DEBUG"},
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "accept-nvidia-visible-devices-envvar-when-unprivileged",
|
||||||
|
Usage: "Set the accept-nvidia-visible-devices-envvar-when-unprivileged config option",
|
||||||
|
Value: true,
|
||||||
|
Destination: &opts.acceptNVIDIAVisibleDevicesWhenUnprivileged,
|
||||||
|
EnvVars: []string{"ACCEPT_NVIDIA_VISIBLE_DEVICES_ENVVAR_WHEN_UNPRIVILEGED"},
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "accept-nvidia-visible-devices-as-volume-mounts",
|
||||||
|
Usage: "Set the accept-nvidia-visible-devices-as-volume-mounts config option",
|
||||||
|
Destination: &opts.acceptNVIDIAVisibleDevicesAsVolumeMounts,
|
||||||
|
EnvVars: []string{"ACCEPT_NVIDIA_VISIBLE_DEVICES_AS_VOLUME_MOUNTS"},
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "cdi-enabled",
|
||||||
|
Aliases: []string{"enable-cdi"},
|
||||||
|
Usage: "enable the generation of a CDI specification",
|
||||||
|
Destination: &opts.CDI.Enabled,
|
||||||
|
EnvVars: []string{"CDI_ENABLED", "ENABLE_CDI"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "cdi-output-dir",
|
||||||
|
Usage: "the directory where the CDI output files are to be written. If this is set to '', no CDI specification is generated.",
|
||||||
|
Value: "/var/run/cdi",
|
||||||
|
Destination: &opts.CDI.outputDir,
|
||||||
|
EnvVars: []string{"CDI_OUTPUT_DIR"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "cdi-kind",
|
||||||
|
Usage: "the vendor string to use for the generated CDI specification",
|
||||||
|
Value: "management.nvidia.com/gpu",
|
||||||
|
Destination: &opts.CDI.kind,
|
||||||
|
EnvVars: []string{"CDI_KIND"},
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "ignore-errors",
|
||||||
|
Usage: "ignore errors when installing the NVIDIA Container toolkit. This is used for testing purposes only.",
|
||||||
|
Hidden: true,
|
||||||
|
Destination: &opts.ignoreErrors,
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "create-device-nodes",
|
||||||
|
Usage: "(Only applicable with --cdi-enabled) specifies which device nodes should be created. If any one of the options is set to '' or 'none', no device nodes will be created.",
|
||||||
|
Value: cli.NewStringSlice("control"),
|
||||||
|
Destination: &opts.createDeviceNodes,
|
||||||
|
EnvVars: []string{"CREATE_DEVICE_NODES"},
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "opt-in-features",
|
||||||
|
Hidden: true,
|
||||||
|
Destination: &opts.optInFeatures,
|
||||||
|
EnvVars: []string{"NVIDIA_CONTAINER_TOOLKIT_OPT_IN_FEATURES"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return flags
|
||||||
|
}
|
||||||
|
|
||||||
|
// An Installer is used to install the NVIDIA Container Toolkit from the toolkit container.
|
||||||
|
type Installer struct {
|
||||||
|
fileInstaller
|
||||||
|
// toolkitRoot specifies the destination path at which the toolkit is installed.
|
||||||
|
toolkitRoot string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewInstaller creates an installer for the NVIDIA Container Toolkit.
|
||||||
|
func NewInstaller(opts ...Option) *Installer {
|
||||||
|
i := &Installer{}
|
||||||
|
for _, opt := range opts {
|
||||||
|
opt(i)
|
||||||
|
}
|
||||||
|
|
||||||
|
if i.logger == nil {
|
||||||
|
i.logger = logger.New()
|
||||||
|
}
|
||||||
|
return i
|
||||||
|
}
|
||||||
|
|
||||||
|
// ValidateOptions checks whether the specified options are valid
|
||||||
|
func (t *Installer) ValidateOptions(opts *Options) error {
|
||||||
|
if t == nil {
|
||||||
|
return fmt.Errorf("toolkit installer is not initilized")
|
||||||
|
}
|
||||||
|
if t.toolkitRoot == "" {
|
||||||
|
return fmt.Errorf("invalid --toolkit-root option: %v", t.toolkitRoot)
|
||||||
|
}
|
||||||
|
|
||||||
|
vendor, class := parser.ParseQualifier(opts.CDI.kind)
|
||||||
|
if err := parser.ValidateVendorName(vendor); err != nil {
|
||||||
|
return fmt.Errorf("invalid CDI vendor name: %v", err)
|
||||||
|
}
|
||||||
|
if err := parser.ValidateClassName(class); err != nil {
|
||||||
|
return fmt.Errorf("invalid CDI class name: %v", err)
|
||||||
|
}
|
||||||
|
opts.CDI.vendor = vendor
|
||||||
|
opts.CDI.class = class
|
||||||
|
|
||||||
|
if opts.CDI.Enabled && opts.CDI.outputDir == "" {
|
||||||
|
t.logger.Warning("Skipping CDI spec generation (no output directory specified)")
|
||||||
|
opts.CDI.Enabled = false
|
||||||
|
}
|
||||||
|
|
||||||
|
isDisabled := false
|
||||||
|
for _, mode := range opts.createDeviceNodes.Value() {
|
||||||
|
if mode != "" && mode != "none" && mode != "control" {
|
||||||
|
return fmt.Errorf("invalid --create-device-nodes value: %v", mode)
|
||||||
|
}
|
||||||
|
if mode == "" || mode == "none" {
|
||||||
|
isDisabled = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !opts.CDI.Enabled && !isDisabled {
|
||||||
|
t.logger.Info("disabling device node creation since --cdi-enabled=false")
|
||||||
|
isDisabled = true
|
||||||
|
}
|
||||||
|
if isDisabled {
|
||||||
|
opts.createDeviceNodes = *cli.NewStringSlice()
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Install installs the components of the NVIDIA container toolkit.
|
||||||
|
// Any existing installation is removed.
|
||||||
|
func (t *Installer) Install(cli *cli.Context, opts *Options) error {
|
||||||
|
if t == nil {
|
||||||
|
return fmt.Errorf("toolkit installer is not initilized")
|
||||||
|
}
|
||||||
|
t.logger.Infof("Installing NVIDIA container toolkit to '%v'", t.toolkitRoot)
|
||||||
|
|
||||||
|
t.logger.Infof("Removing existing NVIDIA container toolkit installation")
|
||||||
|
err := os.RemoveAll(t.toolkitRoot)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error removing toolkit directory: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error removing toolkit directory: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
toolkitConfigDir := filepath.Join(t.toolkitRoot, ".config", "nvidia-container-runtime")
|
||||||
|
toolkitConfigPath := filepath.Join(toolkitConfigDir, configFilename)
|
||||||
|
|
||||||
|
err = t.createDirectories(t.toolkitRoot, toolkitConfigDir)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("could not create required directories: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("could not create required directories: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
err = t.installContainerLibraries(t.toolkitRoot)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error installing NVIDIA container library: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error installing NVIDIA container library: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
err = t.installContainerRuntimes(t.toolkitRoot)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error installing NVIDIA container runtime: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error installing NVIDIA container runtime: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
nvidiaContainerCliExecutable, err := t.installContainerCLI(t.toolkitRoot)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error installing NVIDIA container CLI: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error installing NVIDIA container CLI: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
nvidiaContainerRuntimeHookPath, err := t.installRuntimeHook(t.toolkitRoot, toolkitConfigPath)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error installing NVIDIA container runtime hook: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error installing NVIDIA container runtime hook: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
nvidiaCTKPath, err := t.installContainerToolkitCLI(t.toolkitRoot)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error installing NVIDIA Container Toolkit CLI: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error installing NVIDIA Container Toolkit CLI: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
nvidiaCDIHookPath, err := t.installContainerCDIHookCLI(t.toolkitRoot)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error installing NVIDIA Container CDI Hook CLI: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error installing NVIDIA Container CDI Hook CLI: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
err = t.installToolkitConfig(cli, toolkitConfigPath, nvidiaContainerCliExecutable, nvidiaCTKPath, nvidiaContainerRuntimeHookPath, opts)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error installing NVIDIA container toolkit config: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error installing NVIDIA container toolkit config: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
err = t.createDeviceNodes(opts)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error creating device nodes: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error creating device nodes: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
err = t.generateCDISpec(opts, nvidiaCDIHookPath)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error generating CDI specification: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error generating CDI specification: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// installContainerLibraries locates and installs the libraries that are part of
|
||||||
|
// the nvidia-container-toolkit.
|
||||||
|
// A predefined set of library candidates are considered, with the first one
|
||||||
|
// resulting in success being installed to the toolkit folder. The install process
|
||||||
|
// resolves the symlink for the library and copies the versioned library itself.
|
||||||
|
func (t *Installer) installContainerLibraries(toolkitRoot string) error {
|
||||||
|
t.logger.Infof("Installing NVIDIA container library to '%v'", toolkitRoot)
|
||||||
|
|
||||||
|
libs := []string{
|
||||||
|
"libnvidia-container.so.1",
|
||||||
|
"libnvidia-container-go.so.1",
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, l := range libs {
|
||||||
|
err := t.installLibrary(l, toolkitRoot)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to install %s: %v", l, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// installLibrary installs the specified library to the toolkit directory.
|
||||||
|
func (t *Installer) installLibrary(libName string, toolkitRoot string) error {
|
||||||
|
libraryPath, err := t.findLibrary(libName)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error locating NVIDIA container library: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
installedLibPath, err := t.installFileToFolder(toolkitRoot, libraryPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error installing %v to %v: %v", libraryPath, toolkitRoot, err)
|
||||||
|
}
|
||||||
|
t.logger.Infof("Installed '%v' to '%v'", libraryPath, installedLibPath)
|
||||||
|
|
||||||
|
if filepath.Base(installedLibPath) == libName {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
err = t.installSymlink(toolkitRoot, libName, installedLibPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error installing symlink for NVIDIA container library: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// installToolkitConfig installs the config file for the NVIDIA container toolkit ensuring
|
||||||
|
// that the settings are updated to match the desired install and nvidia driver directories.
|
||||||
|
func (t *Installer) installToolkitConfig(c *cli.Context, toolkitConfigPath string, nvidiaContainerCliExecutablePath string, nvidiaCTKPath string, nvidaContainerRuntimeHookPath string, opts *Options) error {
|
||||||
|
t.logger.Infof("Installing NVIDIA container toolkit config '%v'", toolkitConfigPath)
|
||||||
|
|
||||||
|
cfg, err := config.New(
|
||||||
|
config.WithConfigFile(nvidiaContainerToolkitConfigSource),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("could not open source config file: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
targetConfig, err := os.Create(toolkitConfigPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("could not create target config file: %v", err)
|
||||||
|
}
|
||||||
|
defer targetConfig.Close()
|
||||||
|
|
||||||
|
// Read the ldconfig path from the config as this may differ per platform
|
||||||
|
// On ubuntu-based systems this ends in `.real`
|
||||||
|
ldconfigPath := fmt.Sprintf("%s", cfg.GetDefault("nvidia-container-cli.ldconfig", "/sbin/ldconfig"))
|
||||||
|
// Use the driver run root as the root:
|
||||||
|
driverLdconfigPath := config.NormalizeLDConfigPath("@" + filepath.Join(opts.DriverRoot, strings.TrimPrefix(ldconfigPath, "@/")))
|
||||||
|
|
||||||
|
configValues := map[string]interface{}{
|
||||||
|
// Set the options in the root toml table
|
||||||
|
"accept-nvidia-visible-devices-envvar-when-unprivileged": opts.acceptNVIDIAVisibleDevicesWhenUnprivileged,
|
||||||
|
"accept-nvidia-visible-devices-as-volume-mounts": opts.acceptNVIDIAVisibleDevicesAsVolumeMounts,
|
||||||
|
// Set the nvidia-container-cli options
|
||||||
|
"nvidia-container-cli.root": opts.DriverRoot,
|
||||||
|
"nvidia-container-cli.path": nvidiaContainerCliExecutablePath,
|
||||||
|
"nvidia-container-cli.ldconfig": driverLdconfigPath,
|
||||||
|
// Set nvidia-ctk options
|
||||||
|
"nvidia-ctk.path": nvidiaCTKPath,
|
||||||
|
// Set the nvidia-container-runtime-hook options
|
||||||
|
"nvidia-container-runtime-hook.path": nvidaContainerRuntimeHookPath,
|
||||||
|
"nvidia-container-runtime-hook.skip-mode-detection": opts.ContainerRuntimeHookSkipModeDetection,
|
||||||
|
}
|
||||||
|
|
||||||
|
toolkitRuntimeList := opts.ContainerRuntimeRuntimes.Value()
|
||||||
|
if len(toolkitRuntimeList) > 0 {
|
||||||
|
configValues["nvidia-container-runtime.runtimes"] = toolkitRuntimeList
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, optInFeature := range opts.optInFeatures.Value() {
|
||||||
|
configValues["features."+optInFeature] = true
|
||||||
|
}
|
||||||
|
|
||||||
|
for key, value := range configValues {
|
||||||
|
cfg.Set(key, value)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set the optional config options
|
||||||
|
optionalConfigValues := map[string]interface{}{
|
||||||
|
"nvidia-container-runtime.debug": opts.ContainerRuntimeDebug,
|
||||||
|
"nvidia-container-runtime.log-level": opts.ContainerRuntimeLogLevel,
|
||||||
|
"nvidia-container-runtime.mode": opts.ContainerRuntimeMode,
|
||||||
|
"nvidia-container-runtime.modes.cdi.annotation-prefixes": opts.ContainerRuntimeModesCDIAnnotationPrefixes,
|
||||||
|
"nvidia-container-runtime.modes.cdi.default-kind": opts.ContainerRuntimeModesCdiDefaultKind,
|
||||||
|
"nvidia-container-runtime.runtimes": opts.ContainerRuntimeRuntimes,
|
||||||
|
"nvidia-container-cli.debug": opts.ContainerCLIDebug,
|
||||||
|
}
|
||||||
|
|
||||||
|
for key, value := range optionalConfigValues {
|
||||||
|
if !c.IsSet(key) {
|
||||||
|
t.logger.Infof("Skipping unset option: %v", key)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if value == nil {
|
||||||
|
t.logger.Infof("Skipping option with nil value: %v", key)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
switch v := value.(type) {
|
||||||
|
case string:
|
||||||
|
if v == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
case cli.StringSlice:
|
||||||
|
if len(v.Value()) == 0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
value = v.Value()
|
||||||
|
default:
|
||||||
|
t.logger.Warningf("Unexpected type for option %v=%v: %T", key, value, v)
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg.Set(key, value)
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := cfg.WriteTo(targetConfig); err != nil {
|
||||||
|
return fmt.Errorf("error writing config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
os.Stdout.WriteString("Using config:\n")
|
||||||
|
if _, err = cfg.WriteTo(os.Stdout); err != nil {
|
||||||
|
t.logger.Warningf("Failed to output config to STDOUT: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// installContainerToolkitCLI installs the nvidia-ctk CLI executable and wrapper.
|
||||||
|
func (t *Installer) installContainerToolkitCLI(toolkitDir string) (string, error) {
|
||||||
|
e := executable{
|
||||||
|
fileInstaller: t.fileInstaller,
|
||||||
|
source: "/usr/bin/nvidia-ctk",
|
||||||
|
target: executableTarget{
|
||||||
|
dotfileName: "nvidia-ctk.real",
|
||||||
|
wrapperName: "nvidia-ctk",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return e.install(toolkitDir)
|
||||||
|
}
|
||||||
|
|
||||||
|
// installContainerCDIHookCLI installs the nvidia-cdi-hook CLI executable and wrapper.
|
||||||
|
func (t *Installer) installContainerCDIHookCLI(toolkitDir string) (string, error) {
|
||||||
|
e := executable{
|
||||||
|
fileInstaller: t.fileInstaller,
|
||||||
|
source: "/usr/bin/nvidia-cdi-hook",
|
||||||
|
target: executableTarget{
|
||||||
|
dotfileName: "nvidia-cdi-hook.real",
|
||||||
|
wrapperName: "nvidia-cdi-hook",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return e.install(toolkitDir)
|
||||||
|
}
|
||||||
|
|
||||||
|
// installContainerCLI sets up the NVIDIA container CLI executable, copying the executable
|
||||||
|
// and implementing the required wrapper
|
||||||
|
func (t *Installer) installContainerCLI(toolkitRoot string) (string, error) {
|
||||||
|
t.logger.Infof("Installing NVIDIA container CLI from '%v'", nvidiaContainerCliSource)
|
||||||
|
|
||||||
|
env := map[string]string{
|
||||||
|
"LD_LIBRARY_PATH": toolkitRoot,
|
||||||
|
}
|
||||||
|
|
||||||
|
e := executable{
|
||||||
|
fileInstaller: t.fileInstaller,
|
||||||
|
source: nvidiaContainerCliSource,
|
||||||
|
target: executableTarget{
|
||||||
|
dotfileName: "nvidia-container-cli.real",
|
||||||
|
wrapperName: "nvidia-container-cli",
|
||||||
|
},
|
||||||
|
env: env,
|
||||||
|
}
|
||||||
|
|
||||||
|
installedPath, err := e.install(toolkitRoot)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("error installing NVIDIA container CLI: %v", err)
|
||||||
|
}
|
||||||
|
return installedPath, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// installRuntimeHook sets up the NVIDIA runtime hook, copying the executable
|
||||||
|
// and implementing the required wrapper
|
||||||
|
func (t *Installer) installRuntimeHook(toolkitRoot string, configFilePath string) (string, error) {
|
||||||
|
t.logger.Infof("Installing NVIDIA container runtime hook from '%v'", nvidiaContainerRuntimeHookSource)
|
||||||
|
|
||||||
|
argLines := []string{
|
||||||
|
fmt.Sprintf("-config \"%s\"", configFilePath),
|
||||||
|
}
|
||||||
|
|
||||||
|
e := executable{
|
||||||
|
fileInstaller: t.fileInstaller,
|
||||||
|
source: nvidiaContainerRuntimeHookSource,
|
||||||
|
target: executableTarget{
|
||||||
|
dotfileName: "nvidia-container-runtime-hook.real",
|
||||||
|
wrapperName: "nvidia-container-runtime-hook",
|
||||||
|
},
|
||||||
|
argLines: argLines,
|
||||||
|
}
|
||||||
|
|
||||||
|
installedPath, err := e.install(toolkitRoot)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("error installing NVIDIA container runtime hook: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = t.installSymlink(toolkitRoot, "nvidia-container-toolkit", installedPath)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("error installing symlink to NVIDIA container runtime hook: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return installedPath, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// installSymlink creates a symlink in the toolkitDirectory that points to the specified target.
|
||||||
|
// Note: The target is assumed to be local to the toolkit directory
|
||||||
|
func (t *Installer) installSymlink(toolkitRoot string, link string, target string) error {
|
||||||
|
symlinkPath := filepath.Join(toolkitRoot, link)
|
||||||
|
targetPath := filepath.Base(target)
|
||||||
|
t.logger.Infof("Creating symlink '%v' -> '%v'", symlinkPath, targetPath)
|
||||||
|
|
||||||
|
err := os.Symlink(targetPath, symlinkPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error creating symlink '%v' => '%v': %v", symlinkPath, targetPath, err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// findLibrary searches a set of candidate libraries in the specified root for
|
||||||
|
// a given library name
|
||||||
|
func (t *Installer) findLibrary(libName string) (string, error) {
|
||||||
|
t.logger.Infof("Finding library %v (root=%v)", libName)
|
||||||
|
|
||||||
|
candidateDirs := []string{
|
||||||
|
"/usr/lib64",
|
||||||
|
"/usr/lib/x86_64-linux-gnu",
|
||||||
|
"/usr/lib/aarch64-linux-gnu",
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, d := range candidateDirs {
|
||||||
|
l := filepath.Join(t.sourceRoot, d, libName)
|
||||||
|
t.logger.Infof("Checking library candidate '%v'", l)
|
||||||
|
|
||||||
|
libraryCandidate, err := t.resolveLink(l)
|
||||||
|
if err != nil {
|
||||||
|
t.logger.Infof("Skipping library candidate '%v': %v", l, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
return strings.TrimPrefix(libraryCandidate, t.sourceRoot), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return "", fmt.Errorf("error locating library '%v'", libName)
|
||||||
|
}
|
||||||
|
|
||||||
|
// resolveLink finds the target of a symlink or the file itself in the
|
||||||
|
// case of a regular file.
|
||||||
|
// This is equivalent to running `readlink -f ${l}`
|
||||||
|
func (t *Installer) resolveLink(l string) (string, error) {
|
||||||
|
resolved, err := filepath.EvalSymlinks(l)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("error resolving link '%v': %v", l, err)
|
||||||
|
}
|
||||||
|
if l != resolved {
|
||||||
|
t.logger.Infof("Resolved link: '%v' => '%v'", l, resolved)
|
||||||
|
}
|
||||||
|
return resolved, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *Installer) createDirectories(dir ...string) error {
|
||||||
|
for _, d := range dir {
|
||||||
|
t.logger.Infof("Creating directory '%v'", d)
|
||||||
|
err := os.MkdirAll(d, 0755)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error creating directory: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *Installer) createDeviceNodes(opts *Options) error {
|
||||||
|
modes := opts.createDeviceNodes.Value()
|
||||||
|
if len(modes) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
devices, err := nvdevices.New(
|
||||||
|
nvdevices.WithDevRoot(opts.DevRootCtrPath),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create library: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, mode := range modes {
|
||||||
|
t.logger.Infof("Creating %v device nodes at %v", mode, opts.DevRootCtrPath)
|
||||||
|
if mode != "control" {
|
||||||
|
t.logger.Warningf("Unrecognised device mode: %v", mode)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err := devices.CreateNVIDIAControlDevices(); err != nil {
|
||||||
|
return fmt.Errorf("failed to create control device nodes: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// generateCDISpec generates a CDI spec for use in management containers
|
||||||
|
func (t *Installer) generateCDISpec(opts *Options, nvidiaCDIHookPath string) error {
|
||||||
|
if !opts.CDI.Enabled {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
t.logger.Info("Generating CDI spec for management containers")
|
||||||
|
cdilib, err := nvcdi.New(
|
||||||
|
nvcdi.WithLogger(t.logger),
|
||||||
|
nvcdi.WithMode(nvcdi.ModeManagement),
|
||||||
|
nvcdi.WithDriverRoot(opts.DriverRootCtrPath),
|
||||||
|
nvcdi.WithDevRoot(opts.DevRootCtrPath),
|
||||||
|
nvcdi.WithNVIDIACDIHookPath(nvidiaCDIHookPath),
|
||||||
|
nvcdi.WithVendor(opts.CDI.vendor),
|
||||||
|
nvcdi.WithClass(opts.CDI.class),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create CDI library for management containers: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
spec, err := cdilib.GetSpec()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to genereate CDI spec for management containers: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
transformer := transformroot.NewDriverTransformer(
|
||||||
|
transformroot.WithDriverRoot(opts.DriverRootCtrPath),
|
||||||
|
transformroot.WithTargetDriverRoot(opts.DriverRoot),
|
||||||
|
transformroot.WithDevRoot(opts.DevRootCtrPath),
|
||||||
|
transformroot.WithTargetDevRoot(opts.DevRoot),
|
||||||
|
)
|
||||||
|
if err := transformer.Transform(spec.Raw()); err != nil {
|
||||||
|
return fmt.Errorf("failed to transform driver root in CDI spec: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
name, err := cdi.GenerateNameForSpec(spec.Raw())
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to generate CDI name for management containers: %v", err)
|
||||||
|
}
|
||||||
|
err = spec.Save(filepath.Join(opts.CDI.outputDir, name))
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to save CDI spec for management containers: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
217
cmd/nvidia-ctk-installer/container/toolkit/toolkit_test.go
Normal file
217
cmd/nvidia-ctk-installer/container/toolkit/toolkit_test.go
Normal file
@@ -0,0 +1,217 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package toolkit
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup/symlinks"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/test"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestInstall(t *testing.T) {
|
||||||
|
t.Setenv("__NVCT_TESTING_DEVICES_ARE_FILES", "true")
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
|
||||||
|
moduleRoot, err := test.GetModuleRoot()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
artifactRoot := filepath.Join(moduleRoot, "testdata", "installer", "artifacts")
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
hostRoot string
|
||||||
|
packageType string
|
||||||
|
cdiEnabled bool
|
||||||
|
expectedError error
|
||||||
|
expectedCdiSpec string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
hostRoot: "rootfs-empty",
|
||||||
|
packageType: "deb",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
hostRoot: "rootfs-empty",
|
||||||
|
packageType: "rpm",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
hostRoot: "rootfs-empty",
|
||||||
|
packageType: "deb",
|
||||||
|
cdiEnabled: true,
|
||||||
|
expectedError: fmt.Errorf("no NVIDIA device nodes found"),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
hostRoot: "rootfs-1",
|
||||||
|
packageType: "deb",
|
||||||
|
cdiEnabled: true,
|
||||||
|
expectedCdiSpec: `---
|
||||||
|
cdiVersion: 0.5.0
|
||||||
|
kind: example.com/class
|
||||||
|
devices:
|
||||||
|
- name: all
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: /host/driver/root/dev/nvidia0
|
||||||
|
- path: /dev/nvidiactl
|
||||||
|
hostPath: /host/driver/root/dev/nvidiactl
|
||||||
|
- path: /dev/nvidia-caps-imex-channels/channel0
|
||||||
|
hostPath: /host/driver/root/dev/nvidia-caps-imex-channels/channel0
|
||||||
|
- path: /dev/nvidia-caps-imex-channels/channel1
|
||||||
|
hostPath: /host/driver/root/dev/nvidia-caps-imex-channels/channel1
|
||||||
|
- path: /dev/nvidia-caps-imex-channels/channel2047
|
||||||
|
hostPath: /host/driver/root/dev/nvidia-caps-imex-channels/channel2047
|
||||||
|
containerEdits:
|
||||||
|
env:
|
||||||
|
- NVIDIA_VISIBLE_DEVICES=void
|
||||||
|
hooks:
|
||||||
|
- hookName: createContainer
|
||||||
|
path: {{ .toolkitRoot }}/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- create-symlinks
|
||||||
|
- --link
|
||||||
|
- libcuda.so.1::/lib/x86_64-linux-gnu/libcuda.so
|
||||||
|
- hookName: createContainer
|
||||||
|
path: {{ .toolkitRoot }}/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- update-ldcache
|
||||||
|
- --folder
|
||||||
|
- /lib/x86_64-linux-gnu
|
||||||
|
mounts:
|
||||||
|
- hostPath: /host/driver/root/lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
containerPath: /lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
options:
|
||||||
|
- ro
|
||||||
|
- nosuid
|
||||||
|
- nodev
|
||||||
|
- bind
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
// hostRoot := filepath.Join(moduleRoot, "testdata", "lookup", tc.hostRoot)
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
testRoot := t.TempDir()
|
||||||
|
toolkitRoot := filepath.Join(testRoot, "toolkit-test")
|
||||||
|
cdiOutputDir := filepath.Join(moduleRoot, "toolkit-test", "/var/cdi")
|
||||||
|
sourceRoot := filepath.Join(artifactRoot, tc.packageType)
|
||||||
|
options := Options{
|
||||||
|
DriverRoot: "/host/driver/root",
|
||||||
|
DriverRootCtrPath: filepath.Join(moduleRoot, "testdata", "lookup", tc.hostRoot),
|
||||||
|
CDI: cdiOptions{
|
||||||
|
Enabled: tc.cdiEnabled,
|
||||||
|
outputDir: cdiOutputDir,
|
||||||
|
kind: "example.com/class",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
ti := NewInstaller(
|
||||||
|
WithLogger(logger),
|
||||||
|
WithToolkitRoot(toolkitRoot),
|
||||||
|
WithSourceRoot(sourceRoot),
|
||||||
|
)
|
||||||
|
require.NoError(t, ti.ValidateOptions(&options))
|
||||||
|
|
||||||
|
err := ti.Install(&cli.Context{}, &options)
|
||||||
|
if tc.expectedError == nil {
|
||||||
|
require.NoError(t, err)
|
||||||
|
} else {
|
||||||
|
require.Contains(t, err.Error(), tc.expectedError.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
require.DirExists(t, toolkitRoot)
|
||||||
|
requireSymlink(t, toolkitRoot, "libnvidia-container.so.1", "libnvidia-container.so.99.88.77")
|
||||||
|
requireSymlink(t, toolkitRoot, "libnvidia-container-go.so.1", "libnvidia-container-go.so.99.88.77")
|
||||||
|
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-cdi-hook")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-container-cli")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-container-runtime")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-container-runtime-hook")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-container-runtime.cdi")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-container-runtime.legacy")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-ctk")
|
||||||
|
|
||||||
|
requireSymlink(t, toolkitRoot, "nvidia-container-toolkit", "nvidia-container-runtime-hook")
|
||||||
|
|
||||||
|
// TODO: Add checks for wrapper contents
|
||||||
|
// grep -q -E "nvidia driver modules are not yet loaded, invoking runc directly" "${shared_dir}/usr/local/nvidia/toolkit/nvidia-container-runtime"
|
||||||
|
// grep -q -E "exec runc \".@\"" "${shared_dir}/usr/local/nvidia/toolkit/nvidia-container-runtime"
|
||||||
|
|
||||||
|
require.DirExists(t, filepath.Join(toolkitRoot, ".config"))
|
||||||
|
require.DirExists(t, filepath.Join(toolkitRoot, ".config", "nvidia-container-runtime"))
|
||||||
|
require.FileExists(t, filepath.Join(toolkitRoot, ".config", "nvidia-container-runtime", "config.toml"))
|
||||||
|
|
||||||
|
cfgToml, err := config.New(config.WithConfigFile(filepath.Join(toolkitRoot, ".config", "nvidia-container-runtime", "config.toml")))
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
cfg, err := cfgToml.Config()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
// Ensure that the config file has the required contents.
|
||||||
|
// TODO: Add checks for additional config options.
|
||||||
|
require.Equal(t, "/host/driver/root", cfg.NVIDIAContainerCLIConfig.Root)
|
||||||
|
require.Equal(t, "@/host/driver/root/sbin/ldconfig", string(cfg.NVIDIAContainerCLIConfig.Ldconfig))
|
||||||
|
require.EqualValues(t, filepath.Join(toolkitRoot, "nvidia-container-cli"), cfg.NVIDIAContainerCLIConfig.Path)
|
||||||
|
require.EqualValues(t, filepath.Join(toolkitRoot, "nvidia-ctk"), cfg.NVIDIACTKConfig.Path)
|
||||||
|
|
||||||
|
if len(tc.expectedCdiSpec) > 0 {
|
||||||
|
cdiSpecFile := filepath.Join(cdiOutputDir, "example.com-class.yaml")
|
||||||
|
require.FileExists(t, cdiSpecFile)
|
||||||
|
info, err := os.Stat(cdiSpecFile)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotZero(t, info.Mode()&0004)
|
||||||
|
contents, err := os.ReadFile(cdiSpecFile)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, strings.ReplaceAll(tc.expectedCdiSpec, "{{ .toolkitRoot }}", toolkitRoot), string(contents))
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func requireWrappedExecutable(t *testing.T, toolkitRoot string, expectedExecutable string) {
|
||||||
|
requireExecutable(t, toolkitRoot, expectedExecutable)
|
||||||
|
requireExecutable(t, toolkitRoot, expectedExecutable+".real")
|
||||||
|
}
|
||||||
|
|
||||||
|
func requireExecutable(t *testing.T, toolkitRoot string, expectedExecutable string) {
|
||||||
|
executable := filepath.Join(toolkitRoot, expectedExecutable)
|
||||||
|
require.FileExists(t, executable)
|
||||||
|
info, err := os.Lstat(executable)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Zero(t, info.Mode()&os.ModeSymlink)
|
||||||
|
require.NotZero(t, info.Mode()&0111)
|
||||||
|
}
|
||||||
|
|
||||||
|
func requireSymlink(t *testing.T, toolkitRoot string, expectedLink string, expectedTarget string) {
|
||||||
|
link := filepath.Join(toolkitRoot, expectedLink)
|
||||||
|
require.FileExists(t, link)
|
||||||
|
target, err := symlinks.Resolve(link)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, expectedTarget, target)
|
||||||
|
}
|
||||||
327
cmd/nvidia-ctk-installer/main.go
Normal file
327
cmd/nvidia-ctk-installer/main.go
Normal file
@@ -0,0 +1,327 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"os/signal"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"syscall"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
"golang.org/x/sys/unix"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/runtime"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/toolkit"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
toolkitPidFilename = "toolkit.pid"
|
||||||
|
defaultPidFile = "/run/nvidia/toolkit/" + toolkitPidFilename
|
||||||
|
toolkitSubDir = "toolkit"
|
||||||
|
|
||||||
|
defaultRuntime = "docker"
|
||||||
|
defaultRuntimeArgs = ""
|
||||||
|
)
|
||||||
|
|
||||||
|
var availableRuntimes = map[string]struct{}{"docker": {}, "crio": {}, "containerd": {}}
|
||||||
|
var defaultLowLevelRuntimes = []string{"docker-runc", "runc", "crun"}
|
||||||
|
|
||||||
|
var waitingForSignal = make(chan bool, 1)
|
||||||
|
var signalReceived = make(chan bool, 1)
|
||||||
|
|
||||||
|
// options stores the command line arguments
|
||||||
|
type options struct {
|
||||||
|
noDaemon bool
|
||||||
|
runtime string
|
||||||
|
runtimeArgs string
|
||||||
|
root string
|
||||||
|
pidFile string
|
||||||
|
sourceRoot string
|
||||||
|
|
||||||
|
toolkitOptions toolkit.Options
|
||||||
|
runtimeOptions runtime.Options
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o options) toolkitRoot() string {
|
||||||
|
return filepath.Join(o.root, toolkitSubDir)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Version defines the CLI version. This is set at build time using LD FLAGS
|
||||||
|
var Version = "development"
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
logger := logger.New()
|
||||||
|
|
||||||
|
remainingArgs, root, err := ParseArgs(logger, os.Args)
|
||||||
|
if err != nil {
|
||||||
|
logger.Errorf("Error: unable to parse arguments: %v", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
c := NewApp(logger, root)
|
||||||
|
|
||||||
|
// Run the CLI
|
||||||
|
logger.Infof("Starting %v", c.Name)
|
||||||
|
if err := c.Run(remainingArgs); err != nil {
|
||||||
|
logger.Errorf("error running nvidia-toolkit: %v", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.Infof("Completed %v", c.Name)
|
||||||
|
}
|
||||||
|
|
||||||
|
// An app represents the nvidia-ctk-installer.
|
||||||
|
type app struct {
|
||||||
|
logger logger.Interface
|
||||||
|
// defaultRoot stores the root to use if the --root flag is not specified.
|
||||||
|
defaultRoot string
|
||||||
|
|
||||||
|
toolkit *toolkit.Installer
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewApp creates the CLI app fro the specified options.
|
||||||
|
// defaultRoot is used as the root if not specified via the --root flag.
|
||||||
|
func NewApp(logger logger.Interface, defaultRoot string) *cli.App {
|
||||||
|
a := app{
|
||||||
|
logger: logger,
|
||||||
|
defaultRoot: defaultRoot,
|
||||||
|
}
|
||||||
|
return a.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a app) build() *cli.App {
|
||||||
|
options := options{
|
||||||
|
toolkitOptions: toolkit.Options{},
|
||||||
|
}
|
||||||
|
// Create the top-level CLI
|
||||||
|
c := cli.NewApp()
|
||||||
|
c.Name = "nvidia-toolkit"
|
||||||
|
c.Usage = "Install the nvidia-container-toolkit for use by a given runtime"
|
||||||
|
c.UsageText = "[DESTINATION] [-n | --no-daemon] [-r | --runtime] [-u | --runtime-args]"
|
||||||
|
c.Description = "DESTINATION points to the host path underneath which the nvidia-container-toolkit should be installed.\nIt will be installed at ${DESTINATION}/toolkit"
|
||||||
|
c.Version = Version
|
||||||
|
c.Before = func(ctx *cli.Context) error {
|
||||||
|
return a.Before(ctx, &options)
|
||||||
|
}
|
||||||
|
c.Action = func(ctx *cli.Context) error {
|
||||||
|
return a.Run(ctx, &options)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup flags for the CLI
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "no-daemon",
|
||||||
|
Aliases: []string{"n"},
|
||||||
|
Usage: "terminate immediately after setting up the runtime. Note that no cleanup will be performed",
|
||||||
|
Destination: &options.noDaemon,
|
||||||
|
EnvVars: []string{"NO_DAEMON"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "runtime",
|
||||||
|
Aliases: []string{"r"},
|
||||||
|
Usage: "the runtime to setup on this node. One of {'docker', 'crio', 'containerd'}",
|
||||||
|
Value: defaultRuntime,
|
||||||
|
Destination: &options.runtime,
|
||||||
|
EnvVars: []string{"RUNTIME"},
|
||||||
|
},
|
||||||
|
// TODO: Remove runtime-args
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "runtime-args",
|
||||||
|
Aliases: []string{"u"},
|
||||||
|
Usage: "arguments to pass to 'docker', 'crio', or 'containerd' setup command",
|
||||||
|
Value: defaultRuntimeArgs,
|
||||||
|
Destination: &options.runtimeArgs,
|
||||||
|
EnvVars: []string{"RUNTIME_ARGS"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "root",
|
||||||
|
Value: a.defaultRoot,
|
||||||
|
Usage: "the folder where the NVIDIA Container Toolkit is to be installed. It will be installed to `ROOT`/toolkit",
|
||||||
|
Destination: &options.root,
|
||||||
|
EnvVars: []string{"ROOT"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "source-root",
|
||||||
|
Value: "/",
|
||||||
|
Usage: "The folder where the required toolkit artifacts can be found",
|
||||||
|
Destination: &options.sourceRoot,
|
||||||
|
EnvVars: []string{"SOURCE_ROOT"},
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "pid-file",
|
||||||
|
Value: defaultPidFile,
|
||||||
|
Usage: "the path to a toolkit.pid file to ensure that only a single configuration instance is running",
|
||||||
|
Destination: &options.pidFile,
|
||||||
|
EnvVars: []string{"TOOLKIT_PID_FILE", "PID_FILE"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = append(c.Flags, toolkit.Flags(&options.toolkitOptions)...)
|
||||||
|
c.Flags = append(c.Flags, runtime.Flags(&options.runtimeOptions)...)
|
||||||
|
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) Before(c *cli.Context, o *options) error {
|
||||||
|
a.toolkit = toolkit.NewInstaller(
|
||||||
|
toolkit.WithLogger(a.logger),
|
||||||
|
toolkit.WithSourceRoot(o.sourceRoot),
|
||||||
|
toolkit.WithToolkitRoot(o.toolkitRoot()),
|
||||||
|
)
|
||||||
|
return a.validateFlags(c, o)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) validateFlags(c *cli.Context, o *options) error {
|
||||||
|
if o.root == "" {
|
||||||
|
return fmt.Errorf("the install root must be specified")
|
||||||
|
}
|
||||||
|
if _, exists := availableRuntimes[o.runtime]; !exists {
|
||||||
|
return fmt.Errorf("unknown runtime: %v", o.runtime)
|
||||||
|
}
|
||||||
|
if filepath.Base(o.pidFile) != toolkitPidFilename {
|
||||||
|
return fmt.Errorf("invalid toolkit.pid path %v", o.pidFile)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := a.toolkit.ValidateOptions(&o.toolkitOptions); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := runtime.ValidateOptions(c, &o.runtimeOptions, o.runtime, o.toolkitRoot(), &o.toolkitOptions); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Run installs the NVIDIA Container Toolkit and updates the requested runtime.
|
||||||
|
// If the application is run as a daemon, the application waits and unconfigures
|
||||||
|
// the runtime on termination.
|
||||||
|
func (a *app) Run(c *cli.Context, o *options) error {
|
||||||
|
err := a.initialize(o.pidFile)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to initialize: %v", err)
|
||||||
|
}
|
||||||
|
defer a.shutdown(o.pidFile)
|
||||||
|
|
||||||
|
if len(o.toolkitOptions.ContainerRuntimeRuntimes.Value()) == 0 {
|
||||||
|
lowlevelRuntimePaths, err := runtime.GetLowlevelRuntimePaths(&o.runtimeOptions, o.runtime)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to determine runtime options: %w", err)
|
||||||
|
}
|
||||||
|
lowlevelRuntimePaths = append(lowlevelRuntimePaths, defaultLowLevelRuntimes...)
|
||||||
|
|
||||||
|
o.toolkitOptions.ContainerRuntimeRuntimes = *cli.NewStringSlice(lowlevelRuntimePaths...)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = a.toolkit.Install(c, &o.toolkitOptions)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to install toolkit: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = runtime.Setup(c, &o.runtimeOptions, o.runtime)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to setup runtime: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !o.noDaemon {
|
||||||
|
err = a.waitForSignal()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to wait for signal: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = runtime.Cleanup(c, &o.runtimeOptions, o.runtime)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to cleanup runtime: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ParseArgs checks if a single positional argument was defined and extracts this the root.
|
||||||
|
// If no positional arguments are defined, it is assumed that the root is specified as a flag.
|
||||||
|
func ParseArgs(logger logger.Interface, args []string) ([]string, string, error) {
|
||||||
|
logger.Infof("Parsing arguments")
|
||||||
|
|
||||||
|
if len(args) < 2 {
|
||||||
|
return args, "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var lastPositionalArg int
|
||||||
|
for i, arg := range args {
|
||||||
|
if strings.HasPrefix(arg, "-") {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
lastPositionalArg = i
|
||||||
|
}
|
||||||
|
|
||||||
|
if lastPositionalArg == 0 {
|
||||||
|
return args, "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if lastPositionalArg == 1 {
|
||||||
|
return append([]string{args[0]}, args[2:]...), args[1], nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil, "", fmt.Errorf("unexpected positional argument(s) %v", args[2:lastPositionalArg+1])
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) initialize(pidFile string) error {
|
||||||
|
a.logger.Infof("Initializing")
|
||||||
|
|
||||||
|
if dir := filepath.Dir(pidFile); dir != "" {
|
||||||
|
err := os.MkdirAll(dir, 0755)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to create folder for pidfile: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
f, err := os.Create(pidFile)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to create pidfile: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = unix.Flock(int(f.Fd()), unix.LOCK_EX|unix.LOCK_NB)
|
||||||
|
if err != nil {
|
||||||
|
a.logger.Warningf("Unable to get exclusive lock on '%v'", pidFile)
|
||||||
|
a.logger.Warningf("This normally means an instance of the NVIDIA toolkit Container is already running, aborting")
|
||||||
|
return fmt.Errorf("unable to get flock on pidfile: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = f.WriteString(fmt.Sprintf("%v\n", os.Getpid()))
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to write PID to pidfile: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
sigs := make(chan os.Signal, 1)
|
||||||
|
signal.Notify(sigs, syscall.SIGHUP, syscall.SIGINT, syscall.SIGQUIT, syscall.SIGPIPE, syscall.SIGTERM)
|
||||||
|
go func() {
|
||||||
|
<-sigs
|
||||||
|
select {
|
||||||
|
case <-waitingForSignal:
|
||||||
|
signalReceived <- true
|
||||||
|
default:
|
||||||
|
a.logger.Infof("Signal received, exiting early")
|
||||||
|
a.shutdown(pidFile)
|
||||||
|
os.Exit(0)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) waitForSignal() error {
|
||||||
|
a.logger.Infof("Waiting for signal")
|
||||||
|
waitingForSignal <- true
|
||||||
|
<-signalReceived
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) shutdown(pidFile string) {
|
||||||
|
a.logger.Infof("Shutting Down")
|
||||||
|
|
||||||
|
err := os.Remove(pidFile)
|
||||||
|
if err != nil {
|
||||||
|
a.logger.Warningf("Unable to remove pidfile: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
516
cmd/nvidia-ctk-installer/main_test.go
Normal file
516
cmd/nvidia-ctk-installer/main_test.go
Normal file
@@ -0,0 +1,516 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/test"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestParseArgs(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
testCases := []struct {
|
||||||
|
args []string
|
||||||
|
expectedRemaining []string
|
||||||
|
expectedRoot string
|
||||||
|
expectedError error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
args: []string{},
|
||||||
|
expectedRemaining: []string{},
|
||||||
|
expectedRoot: "",
|
||||||
|
expectedError: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
args: []string{"app"},
|
||||||
|
expectedRemaining: []string{"app"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
args: []string{"app", "root"},
|
||||||
|
expectedRemaining: []string{"app"},
|
||||||
|
expectedRoot: "root",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
args: []string{"app", "--flag"},
|
||||||
|
expectedRemaining: []string{"app", "--flag"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
args: []string{"app", "root", "--flag"},
|
||||||
|
expectedRemaining: []string{"app", "--flag"},
|
||||||
|
expectedRoot: "root",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
args: []string{"app", "root", "not-root", "--flag"},
|
||||||
|
expectedError: fmt.Errorf("unexpected positional argument(s) [not-root]"),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
args: []string{"app", "root", "not-root"},
|
||||||
|
expectedError: fmt.Errorf("unexpected positional argument(s) [not-root]"),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
args: []string{"app", "root", "not-root", "also"},
|
||||||
|
expectedError: fmt.Errorf("unexpected positional argument(s) [not-root also]"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
|
remaining, root, err := ParseArgs(logger, tc.args)
|
||||||
|
if tc.expectedError != nil {
|
||||||
|
require.EqualError(t, err, tc.expectedError.Error())
|
||||||
|
} else {
|
||||||
|
require.NoError(t, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
require.ElementsMatch(t, tc.expectedRemaining, remaining)
|
||||||
|
require.Equal(t, tc.expectedRoot, root)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestApp(t *testing.T) {
|
||||||
|
t.Setenv("__NVCT_TESTING_DEVICES_ARE_FILES", "true")
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
|
||||||
|
moduleRoot, err := test.GetModuleRoot()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
artifactRoot := filepath.Join(moduleRoot, "testdata", "installer", "artifacts")
|
||||||
|
hostRoot := filepath.Join(moduleRoot, "testdata", "lookup", "rootfs-1")
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
args []string
|
||||||
|
expectedToolkitConfig string
|
||||||
|
expectedRuntimeConfig string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "no args",
|
||||||
|
expectedToolkitConfig: `accept-nvidia-visible-devices-as-volume-mounts = false
|
||||||
|
accept-nvidia-visible-devices-envvar-when-unprivileged = true
|
||||||
|
disable-require = false
|
||||||
|
supported-driver-capabilities = "compat32,compute,display,graphics,ngx,utility,video"
|
||||||
|
swarm-resource = ""
|
||||||
|
|
||||||
|
[nvidia-container-cli]
|
||||||
|
debug = ""
|
||||||
|
environment = []
|
||||||
|
ldcache = ""
|
||||||
|
ldconfig = "@/run/nvidia/driver/sbin/ldconfig"
|
||||||
|
load-kmods = true
|
||||||
|
no-cgroups = false
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-cli"
|
||||||
|
root = "/run/nvidia/driver"
|
||||||
|
user = ""
|
||||||
|
|
||||||
|
[nvidia-container-runtime]
|
||||||
|
debug = "/dev/null"
|
||||||
|
log-level = "info"
|
||||||
|
mode = "auto"
|
||||||
|
runtimes = ["docker-runc", "runc", "crun"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.cdi]
|
||||||
|
annotation-prefixes = ["cdi.k8s.io/"]
|
||||||
|
default-kind = "nvidia.com/gpu"
|
||||||
|
spec-dirs = ["/etc/cdi", "/var/run/cdi"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.csv]
|
||||||
|
mount-spec-path = "/etc/nvidia-container-runtime/host-files-for-container.d"
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.jit-cdi]
|
||||||
|
load-kernel-modules = ["nvidia", "nvidia-uvm", "nvidia-modeset"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime-hook]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime-hook"
|
||||||
|
skip-mode-detection = true
|
||||||
|
|
||||||
|
[nvidia-ctk]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-ctk"
|
||||||
|
`,
|
||||||
|
expectedRuntimeConfig: `{
|
||||||
|
"default-runtime": "nvidia",
|
||||||
|
"runtimes": {
|
||||||
|
"nvidia": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime"
|
||||||
|
},
|
||||||
|
"nvidia-cdi": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.cdi"
|
||||||
|
},
|
||||||
|
"nvidia-legacy": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.legacy"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "CDI enabled enables CDI in docker",
|
||||||
|
args: []string{"--cdi-enabled", "--create-device-nodes=none"},
|
||||||
|
expectedToolkitConfig: `accept-nvidia-visible-devices-as-volume-mounts = false
|
||||||
|
accept-nvidia-visible-devices-envvar-when-unprivileged = true
|
||||||
|
disable-require = false
|
||||||
|
supported-driver-capabilities = "compat32,compute,display,graphics,ngx,utility,video"
|
||||||
|
swarm-resource = ""
|
||||||
|
|
||||||
|
[nvidia-container-cli]
|
||||||
|
debug = ""
|
||||||
|
environment = []
|
||||||
|
ldcache = ""
|
||||||
|
ldconfig = "@/run/nvidia/driver/sbin/ldconfig"
|
||||||
|
load-kmods = true
|
||||||
|
no-cgroups = false
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-cli"
|
||||||
|
root = "/run/nvidia/driver"
|
||||||
|
user = ""
|
||||||
|
|
||||||
|
[nvidia-container-runtime]
|
||||||
|
debug = "/dev/null"
|
||||||
|
log-level = "info"
|
||||||
|
mode = "auto"
|
||||||
|
runtimes = ["docker-runc", "runc", "crun"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.cdi]
|
||||||
|
annotation-prefixes = ["cdi.k8s.io/"]
|
||||||
|
default-kind = "nvidia.com/gpu"
|
||||||
|
spec-dirs = ["/etc/cdi", "/var/run/cdi"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.csv]
|
||||||
|
mount-spec-path = "/etc/nvidia-container-runtime/host-files-for-container.d"
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.jit-cdi]
|
||||||
|
load-kernel-modules = ["nvidia", "nvidia-uvm", "nvidia-modeset"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime-hook]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime-hook"
|
||||||
|
skip-mode-detection = true
|
||||||
|
|
||||||
|
[nvidia-ctk]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-ctk"
|
||||||
|
`,
|
||||||
|
expectedRuntimeConfig: `{
|
||||||
|
"default-runtime": "nvidia",
|
||||||
|
"features": {
|
||||||
|
"cdi": true
|
||||||
|
},
|
||||||
|
"runtimes": {
|
||||||
|
"nvidia": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime"
|
||||||
|
},
|
||||||
|
"nvidia-cdi": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.cdi"
|
||||||
|
},
|
||||||
|
"nvidia-legacy": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.legacy"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "--enable-cdi-in-runtime=false overrides --cdi-enabled in Docker",
|
||||||
|
args: []string{"--cdi-enabled", "--create-device-nodes=none", "--enable-cdi-in-runtime=false"},
|
||||||
|
expectedToolkitConfig: `accept-nvidia-visible-devices-as-volume-mounts = false
|
||||||
|
accept-nvidia-visible-devices-envvar-when-unprivileged = true
|
||||||
|
disable-require = false
|
||||||
|
supported-driver-capabilities = "compat32,compute,display,graphics,ngx,utility,video"
|
||||||
|
swarm-resource = ""
|
||||||
|
|
||||||
|
[nvidia-container-cli]
|
||||||
|
debug = ""
|
||||||
|
environment = []
|
||||||
|
ldcache = ""
|
||||||
|
ldconfig = "@/run/nvidia/driver/sbin/ldconfig"
|
||||||
|
load-kmods = true
|
||||||
|
no-cgroups = false
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-cli"
|
||||||
|
root = "/run/nvidia/driver"
|
||||||
|
user = ""
|
||||||
|
|
||||||
|
[nvidia-container-runtime]
|
||||||
|
debug = "/dev/null"
|
||||||
|
log-level = "info"
|
||||||
|
mode = "auto"
|
||||||
|
runtimes = ["docker-runc", "runc", "crun"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.cdi]
|
||||||
|
annotation-prefixes = ["cdi.k8s.io/"]
|
||||||
|
default-kind = "nvidia.com/gpu"
|
||||||
|
spec-dirs = ["/etc/cdi", "/var/run/cdi"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.csv]
|
||||||
|
mount-spec-path = "/etc/nvidia-container-runtime/host-files-for-container.d"
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.jit-cdi]
|
||||||
|
load-kernel-modules = ["nvidia", "nvidia-uvm", "nvidia-modeset"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime-hook]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime-hook"
|
||||||
|
skip-mode-detection = true
|
||||||
|
|
||||||
|
[nvidia-ctk]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-ctk"
|
||||||
|
`,
|
||||||
|
expectedRuntimeConfig: `{
|
||||||
|
"default-runtime": "nvidia",
|
||||||
|
"runtimes": {
|
||||||
|
"nvidia": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime"
|
||||||
|
},
|
||||||
|
"nvidia-cdi": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.cdi"
|
||||||
|
},
|
||||||
|
"nvidia-legacy": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.legacy"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "CDI enabled enables CDI in containerd",
|
||||||
|
args: []string{"--cdi-enabled", "--runtime=containerd"},
|
||||||
|
expectedToolkitConfig: `accept-nvidia-visible-devices-as-volume-mounts = false
|
||||||
|
accept-nvidia-visible-devices-envvar-when-unprivileged = true
|
||||||
|
disable-require = false
|
||||||
|
supported-driver-capabilities = "compat32,compute,display,graphics,ngx,utility,video"
|
||||||
|
swarm-resource = ""
|
||||||
|
|
||||||
|
[nvidia-container-cli]
|
||||||
|
debug = ""
|
||||||
|
environment = []
|
||||||
|
ldcache = ""
|
||||||
|
ldconfig = "@/run/nvidia/driver/sbin/ldconfig"
|
||||||
|
load-kmods = true
|
||||||
|
no-cgroups = false
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-cli"
|
||||||
|
root = "/run/nvidia/driver"
|
||||||
|
user = ""
|
||||||
|
|
||||||
|
[nvidia-container-runtime]
|
||||||
|
debug = "/dev/null"
|
||||||
|
log-level = "info"
|
||||||
|
mode = "auto"
|
||||||
|
runtimes = ["docker-runc", "runc", "crun"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.cdi]
|
||||||
|
annotation-prefixes = ["cdi.k8s.io/"]
|
||||||
|
default-kind = "nvidia.com/gpu"
|
||||||
|
spec-dirs = ["/etc/cdi", "/var/run/cdi"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.csv]
|
||||||
|
mount-spec-path = "/etc/nvidia-container-runtime/host-files-for-container.d"
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.jit-cdi]
|
||||||
|
load-kernel-modules = ["nvidia", "nvidia-uvm", "nvidia-modeset"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime-hook]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime-hook"
|
||||||
|
skip-mode-detection = true
|
||||||
|
|
||||||
|
[nvidia-ctk]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-ctk"
|
||||||
|
`,
|
||||||
|
expectedRuntimeConfig: `version = 2
|
||||||
|
|
||||||
|
[plugins]
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri"]
|
||||||
|
enable_cdi = true
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd]
|
||||||
|
default_runtime_name = "nvidia"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes]
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-cdi]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-cdi.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.cdi"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-legacy]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-legacy.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.legacy"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "--enable-cdi-in-runtime=false overrides --cdi-enabled in containerd",
|
||||||
|
args: []string{"--cdi-enabled", "--create-device-nodes=none", "--enable-cdi-in-runtime=false", "--runtime=containerd"},
|
||||||
|
expectedToolkitConfig: `accept-nvidia-visible-devices-as-volume-mounts = false
|
||||||
|
accept-nvidia-visible-devices-envvar-when-unprivileged = true
|
||||||
|
disable-require = false
|
||||||
|
supported-driver-capabilities = "compat32,compute,display,graphics,ngx,utility,video"
|
||||||
|
swarm-resource = ""
|
||||||
|
|
||||||
|
[nvidia-container-cli]
|
||||||
|
debug = ""
|
||||||
|
environment = []
|
||||||
|
ldcache = ""
|
||||||
|
ldconfig = "@/run/nvidia/driver/sbin/ldconfig"
|
||||||
|
load-kmods = true
|
||||||
|
no-cgroups = false
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-cli"
|
||||||
|
root = "/run/nvidia/driver"
|
||||||
|
user = ""
|
||||||
|
|
||||||
|
[nvidia-container-runtime]
|
||||||
|
debug = "/dev/null"
|
||||||
|
log-level = "info"
|
||||||
|
mode = "auto"
|
||||||
|
runtimes = ["docker-runc", "runc", "crun"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.cdi]
|
||||||
|
annotation-prefixes = ["cdi.k8s.io/"]
|
||||||
|
default-kind = "nvidia.com/gpu"
|
||||||
|
spec-dirs = ["/etc/cdi", "/var/run/cdi"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.csv]
|
||||||
|
mount-spec-path = "/etc/nvidia-container-runtime/host-files-for-container.d"
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.jit-cdi]
|
||||||
|
load-kernel-modules = ["nvidia", "nvidia-uvm", "nvidia-modeset"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime-hook]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime-hook"
|
||||||
|
skip-mode-detection = true
|
||||||
|
|
||||||
|
[nvidia-ctk]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-ctk"
|
||||||
|
`,
|
||||||
|
expectedRuntimeConfig: `version = 2
|
||||||
|
|
||||||
|
[plugins]
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri"]
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd]
|
||||||
|
default_runtime_name = "nvidia"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes]
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-cdi]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-cdi.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.cdi"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-legacy]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-legacy.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.legacy"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
testRoot := t.TempDir()
|
||||||
|
|
||||||
|
cdiOutputDir := filepath.Join(testRoot, "/var/run/cdi")
|
||||||
|
runtimeConfigFile := filepath.Join(testRoot, "config.file")
|
||||||
|
|
||||||
|
toolkitRoot := filepath.Join(testRoot, "toolkit-test")
|
||||||
|
toolkitConfigFile := filepath.Join(toolkitRoot, "toolkit/.config/nvidia-container-runtime/config.toml")
|
||||||
|
|
||||||
|
app := NewApp(logger, toolkitRoot)
|
||||||
|
|
||||||
|
testArgs := []string{
|
||||||
|
"nvidia-ctk-installer",
|
||||||
|
"--no-daemon",
|
||||||
|
"--cdi-output-dir=" + cdiOutputDir,
|
||||||
|
"--config=" + runtimeConfigFile,
|
||||||
|
"--create-device-nodes=none",
|
||||||
|
"--driver-root-ctr-path=" + hostRoot,
|
||||||
|
"--pid-file=" + filepath.Join(testRoot, "toolkit.pid"),
|
||||||
|
"--restart-mode=none",
|
||||||
|
"--source-root=" + filepath.Join(artifactRoot, "deb"),
|
||||||
|
}
|
||||||
|
|
||||||
|
err := app.Run(append(testArgs, tc.args...))
|
||||||
|
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.FileExists(t, toolkitConfigFile)
|
||||||
|
toolkitConfigFileContents, err := os.ReadFile(toolkitConfigFile)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.EqualValues(t, strings.ReplaceAll(tc.expectedToolkitConfig, "{{ .toolkitRoot }}", toolkitRoot), string(toolkitConfigFileContents))
|
||||||
|
|
||||||
|
require.FileExists(t, runtimeConfigFile)
|
||||||
|
runtimeConfigFileContents, err := os.ReadFile(runtimeConfigFile)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.EqualValues(t, strings.ReplaceAll(tc.expectedRuntimeConfig, "{{ .toolkitRoot }}", toolkitRoot), string(runtimeConfigFileContents))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -1,3 +1,73 @@
|
|||||||
# NVIDIA Container Toolkit CLI
|
# NVIDIA Container Toolkit CLI
|
||||||
|
|
||||||
The NVIDIA Container Toolkit CLI `nvidia-ctk` provides a number of utilities that are useful for working with the NVIDIA Container Toolkit.
|
The NVIDIA Container Toolkit CLI `nvidia-ctk` provides a number of utilities that are useful for working with the NVIDIA Container Toolkit.
|
||||||
|
|
||||||
|
## Functionality
|
||||||
|
|
||||||
|
### Configure runtimes
|
||||||
|
|
||||||
|
The `runtime` command of the `nvidia-ctk` CLI provides a set of utilities to related to the configuration
|
||||||
|
and management of supported container engines.
|
||||||
|
|
||||||
|
For example, running the following command:
|
||||||
|
```bash
|
||||||
|
nvidia-ctk runtime configure --set-as-default
|
||||||
|
```
|
||||||
|
will ensure that the NVIDIA Container Runtime is added as the default runtime to the default container
|
||||||
|
engine.
|
||||||
|
|
||||||
|
## Configure the NVIDIA Container Toolkit
|
||||||
|
|
||||||
|
The `config` command of the `nvidia-ctk` CLI allows a user to display and manipulate the NVIDIA Container Toolkit
|
||||||
|
configuration.
|
||||||
|
|
||||||
|
For example, running the following command:
|
||||||
|
```bash
|
||||||
|
nvidia-ctk config default
|
||||||
|
```
|
||||||
|
will display the default config for the detected platform.
|
||||||
|
|
||||||
|
Whereas
|
||||||
|
```bash
|
||||||
|
nvidia-ctk config
|
||||||
|
```
|
||||||
|
will display the effective NVIDIA Container Toolkit config using the configured config file, and running:
|
||||||
|
|
||||||
|
Individual config options can be set by specifying these are key-value pairs to the `--set` argument:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
nvidia-ctk config --set nvidia-container-cli.no-cgroups=true
|
||||||
|
```
|
||||||
|
|
||||||
|
By default, all commands output to `STDOUT`, but specifying the `--output` flag writes the config to the specified file.
|
||||||
|
|
||||||
|
### Generate CDI specifications
|
||||||
|
|
||||||
|
The [Container Device Interface (CDI)](https://tags.cncf.io/container-device-interface) provides
|
||||||
|
a vendor-agnostic mechanism to make arbitrary devices accessible in containerized environments. To allow NVIDIA devices to be
|
||||||
|
used in these environments, the NVIDIA Container Toolkit CLI includes functionality to generate a CDI specification for the
|
||||||
|
available NVIDIA GPUs in a system.
|
||||||
|
|
||||||
|
In order to generate the CDI specification for the available devices, run the following command:\
|
||||||
|
```bash
|
||||||
|
nvidia-ctk cdi generate
|
||||||
|
```
|
||||||
|
|
||||||
|
The default is to print the specification to STDOUT and a filename can be specified using the `--output` flag.
|
||||||
|
|
||||||
|
The specification will contain a device entries as follows (where applicable):
|
||||||
|
* An `nvidia.com/gpu=gpu{INDEX}` device for each non-MIG-enabled full GPU in the system
|
||||||
|
* An `nvidia.com/gpu=mig{GPU_INDEX}:{MIG_INDEX}` device for each MIG-device in the system
|
||||||
|
* A special device called `nvidia.com/gpu=all` which represents all available devices.
|
||||||
|
|
||||||
|
For example, to generate the CDI specification in the default location where CDI-enabled tools such as `podman`, `containerd`, `cri-o`, or the NVIDIA Container Runtime can be configured to load it, the following command can be run:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
sudo nvidia-ctk cdi generate --output=/etc/cdi/nvidia.yaml
|
||||||
|
```
|
||||||
|
(Note that `sudo` is used to ensure the correct permissions to write to the `/etc/cdi` folder)
|
||||||
|
|
||||||
|
With the specification generated, a GPU can be requested by specifying the fully-qualified CDI device name. With `podman` as an exmaple:
|
||||||
|
```bash
|
||||||
|
podman run --rm -ti --device=nvidia.com/gpu=gpu0 ubuntu nvidia-smi -L
|
||||||
|
```
|
||||||
|
|||||||
55
cmd/nvidia-ctk/cdi/cdi.go
Normal file
55
cmd/nvidia-ctk/cdi/cdi.go
Normal file
@@ -0,0 +1,55 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package cdi
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi/generate"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi/list"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi/transform"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs an info command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
// Create the 'hook' command
|
||||||
|
hook := cli.Command{
|
||||||
|
Name: "cdi",
|
||||||
|
Usage: "Provide tools for interacting with Container Device Interface specifications",
|
||||||
|
}
|
||||||
|
|
||||||
|
hook.Subcommands = []*cli.Command{
|
||||||
|
generate.NewCommand(m.logger),
|
||||||
|
transform.NewCommand(m.logger),
|
||||||
|
list.NewCommand(m.logger),
|
||||||
|
}
|
||||||
|
|
||||||
|
return &hook
|
||||||
|
}
|
||||||
306
cmd/nvidia-ctk/cdi/generate/generate.go
Normal file
306
cmd/nvidia-ctk/cdi/generate/generate.go
Normal file
@@ -0,0 +1,306 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package generate
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
cdi "tags.cncf.io/container-device-interface/pkg/parser"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/go-nvml/pkg/nvml"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/platform-support/tegra/csv"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/spec"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/transform"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
allDeviceName = "all"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type options struct {
|
||||||
|
output string
|
||||||
|
format string
|
||||||
|
deviceNameStrategies cli.StringSlice
|
||||||
|
driverRoot string
|
||||||
|
devRoot string
|
||||||
|
nvidiaCDIHookPath string
|
||||||
|
ldconfigPath string
|
||||||
|
mode string
|
||||||
|
vendor string
|
||||||
|
class string
|
||||||
|
|
||||||
|
configSearchPaths cli.StringSlice
|
||||||
|
librarySearchPaths cli.StringSlice
|
||||||
|
|
||||||
|
csv struct {
|
||||||
|
files cli.StringSlice
|
||||||
|
ignorePatterns cli.StringSlice
|
||||||
|
}
|
||||||
|
|
||||||
|
// the following are used for dependency injection during spec generation.
|
||||||
|
nvmllib nvml.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a generate-cdi command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build creates the CLI command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
opts := options{}
|
||||||
|
|
||||||
|
// Create the 'generate-cdi' command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "generate",
|
||||||
|
Usage: "Generate CDI specifications for use with CDI-enabled runtimes",
|
||||||
|
Before: func(c *cli.Context) error {
|
||||||
|
return m.validateFlags(c, &opts)
|
||||||
|
},
|
||||||
|
Action: func(c *cli.Context) error {
|
||||||
|
return m.run(c, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "config-search-path",
|
||||||
|
Usage: "Specify the path to search for config files when discovering the entities that should be included in the CDI specification.",
|
||||||
|
Destination: &opts.configSearchPaths,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "output",
|
||||||
|
Usage: "Specify the file to output the generated CDI specification to. If this is '' the specification is output to STDOUT",
|
||||||
|
Destination: &opts.output,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "format",
|
||||||
|
Usage: "The output format for the generated spec [json | yaml]. This overrides the format defined by the output file extension (if specified).",
|
||||||
|
Value: spec.FormatYAML,
|
||||||
|
Destination: &opts.format,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "mode",
|
||||||
|
Aliases: []string{"discovery-mode"},
|
||||||
|
Usage: "The mode to use when discovering the available entities. " +
|
||||||
|
"One of [" + strings.Join(nvcdi.AllModes[string](), " | ") + "]. " +
|
||||||
|
"If mode is set to 'auto' the mode will be determined based on the system configuration.",
|
||||||
|
Value: string(nvcdi.ModeAuto),
|
||||||
|
Destination: &opts.mode,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "dev-root",
|
||||||
|
Usage: "Specify the root where `/dev` is located. If this is not specified, the driver-root is assumed.",
|
||||||
|
Destination: &opts.devRoot,
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "device-name-strategy",
|
||||||
|
Usage: "Specify the strategy for generating device names. If this is specified multiple times, the devices will be duplicated for each strategy. One of [index | uuid | type-index]",
|
||||||
|
Value: cli.NewStringSlice(nvcdi.DeviceNameStrategyIndex, nvcdi.DeviceNameStrategyUUID),
|
||||||
|
Destination: &opts.deviceNameStrategies,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "driver-root",
|
||||||
|
Usage: "Specify the NVIDIA GPU driver root to use when discovering the entities that should be included in the CDI specification.",
|
||||||
|
Destination: &opts.driverRoot,
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "library-search-path",
|
||||||
|
Usage: "Specify the path to search for libraries when discovering the entities that should be included in the CDI specification.\n\tNote: This option only applies to CSV mode.",
|
||||||
|
Destination: &opts.librarySearchPaths,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-cdi-hook-path",
|
||||||
|
Aliases: []string{"nvidia-ctk-path"},
|
||||||
|
Usage: "Specify the path to use for the nvidia-cdi-hook in the generated CDI specification. " +
|
||||||
|
"If not specified, the PATH will be searched for `nvidia-cdi-hook`. " +
|
||||||
|
"NOTE: That if this is specified as `nvidia-ctk`, the PATH will be searched for `nvidia-ctk` instead.",
|
||||||
|
Destination: &opts.nvidiaCDIHookPath,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "ldconfig-path",
|
||||||
|
Usage: "Specify the path to use for ldconfig in the generated CDI specification",
|
||||||
|
Destination: &opts.ldconfigPath,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "vendor",
|
||||||
|
Aliases: []string{"cdi-vendor"},
|
||||||
|
Usage: "the vendor string to use for the generated CDI specification.",
|
||||||
|
Value: "nvidia.com",
|
||||||
|
Destination: &opts.vendor,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "class",
|
||||||
|
Aliases: []string{"cdi-class"},
|
||||||
|
Usage: "the class string to use for the generated CDI specification.",
|
||||||
|
Value: "gpu",
|
||||||
|
Destination: &opts.class,
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "csv.file",
|
||||||
|
Usage: "The path to the list of CSV files to use when generating the CDI specification in CSV mode.",
|
||||||
|
Value: cli.NewStringSlice(csv.DefaultFileList()...),
|
||||||
|
Destination: &opts.csv.files,
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "csv.ignore-pattern",
|
||||||
|
Usage: "Specify a pattern the CSV mount specifications.",
|
||||||
|
Destination: &opts.csv.ignorePatterns,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(c *cli.Context, opts *options) error {
|
||||||
|
opts.format = strings.ToLower(opts.format)
|
||||||
|
switch opts.format {
|
||||||
|
case spec.FormatJSON:
|
||||||
|
case spec.FormatYAML:
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("invalid output format: %v", opts.format)
|
||||||
|
}
|
||||||
|
|
||||||
|
opts.mode = strings.ToLower(opts.mode)
|
||||||
|
if !nvcdi.IsValidMode(opts.mode) {
|
||||||
|
return fmt.Errorf("invalid discovery mode: %v", opts.mode)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, strategy := range opts.deviceNameStrategies.Value() {
|
||||||
|
_, err := nvcdi.NewDeviceNamer(strategy)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
opts.nvidiaCDIHookPath = config.ResolveNVIDIACDIHookPath(m.logger, opts.nvidiaCDIHookPath)
|
||||||
|
|
||||||
|
if outputFileFormat := formatFromFilename(opts.output); outputFileFormat != "" {
|
||||||
|
m.logger.Debugf("Inferred output format as %q from output file name", outputFileFormat)
|
||||||
|
if !c.IsSet("format") {
|
||||||
|
opts.format = outputFileFormat
|
||||||
|
} else if outputFileFormat != opts.format {
|
||||||
|
m.logger.Warningf("Requested output format %q does not match format implied by output file name: %q", opts.format, outputFileFormat)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := cdi.ValidateVendorName(opts.vendor); err != nil {
|
||||||
|
return fmt.Errorf("invalid CDI vendor name: %v", err)
|
||||||
|
}
|
||||||
|
if err := cdi.ValidateClassName(opts.class); err != nil {
|
||||||
|
return fmt.Errorf("invalid CDI class name: %v", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(c *cli.Context, opts *options) error {
|
||||||
|
spec, err := m.generateSpec(opts)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to generate CDI spec: %v", err)
|
||||||
|
}
|
||||||
|
m.logger.Infof("Generated CDI spec with version %v", spec.Raw().Version)
|
||||||
|
|
||||||
|
if opts.output == "" {
|
||||||
|
_, err := spec.WriteTo(os.Stdout)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to write CDI spec to STDOUT: %v", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return spec.Save(opts.output)
|
||||||
|
}
|
||||||
|
|
||||||
|
func formatFromFilename(filename string) string {
|
||||||
|
ext := filepath.Ext(filename)
|
||||||
|
switch strings.ToLower(ext) {
|
||||||
|
case ".json":
|
||||||
|
return spec.FormatJSON
|
||||||
|
case ".yaml", ".yml":
|
||||||
|
return spec.FormatYAML
|
||||||
|
}
|
||||||
|
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) generateSpec(opts *options) (spec.Interface, error) {
|
||||||
|
var deviceNamers []nvcdi.DeviceNamer
|
||||||
|
for _, strategy := range opts.deviceNameStrategies.Value() {
|
||||||
|
deviceNamer, err := nvcdi.NewDeviceNamer(strategy)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to create device namer: %v", err)
|
||||||
|
}
|
||||||
|
deviceNamers = append(deviceNamers, deviceNamer)
|
||||||
|
}
|
||||||
|
|
||||||
|
cdilib, err := nvcdi.New(
|
||||||
|
nvcdi.WithLogger(m.logger),
|
||||||
|
nvcdi.WithDriverRoot(opts.driverRoot),
|
||||||
|
nvcdi.WithDevRoot(opts.devRoot),
|
||||||
|
nvcdi.WithNVIDIACDIHookPath(opts.nvidiaCDIHookPath),
|
||||||
|
nvcdi.WithLdconfigPath(opts.ldconfigPath),
|
||||||
|
nvcdi.WithDeviceNamers(deviceNamers...),
|
||||||
|
nvcdi.WithMode(opts.mode),
|
||||||
|
nvcdi.WithConfigSearchPaths(opts.configSearchPaths.Value()),
|
||||||
|
nvcdi.WithLibrarySearchPaths(opts.librarySearchPaths.Value()),
|
||||||
|
nvcdi.WithCSVFiles(opts.csv.files.Value()),
|
||||||
|
nvcdi.WithCSVIgnorePatterns(opts.csv.ignorePatterns.Value()),
|
||||||
|
// We set the following to allow for dependency injection:
|
||||||
|
nvcdi.WithNvmlLib(opts.nvmllib),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to create CDI library: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
deviceSpecs, err := cdilib.GetAllDeviceSpecs()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to create device CDI specs: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
commonEdits, err := cdilib.GetCommonEdits()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to create edits common for entities: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return spec.New(
|
||||||
|
spec.WithVendor(opts.vendor),
|
||||||
|
spec.WithClass(opts.class),
|
||||||
|
spec.WithDeviceSpecs(deviceSpecs),
|
||||||
|
spec.WithEdits(*commonEdits.ContainerEdits),
|
||||||
|
spec.WithFormat(opts.format),
|
||||||
|
spec.WithMergedDeviceOptions(
|
||||||
|
transform.WithName(allDeviceName),
|
||||||
|
transform.WithSkipIfExists(true),
|
||||||
|
),
|
||||||
|
spec.WithPermissions(0644),
|
||||||
|
)
|
||||||
|
}
|
||||||
157
cmd/nvidia-ctk/cdi/generate/generate_test.go
Normal file
157
cmd/nvidia-ctk/cdi/generate/generate_test.go
Normal file
@@ -0,0 +1,157 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package generate
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/go-nvml/pkg/nvml"
|
||||||
|
"github.com/NVIDIA/go-nvml/pkg/nvml/mock/dgxa100"
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/test"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestGenerateSpec(t *testing.T) {
|
||||||
|
t.Setenv("__NVCT_TESTING_DEVICES_ARE_FILES", "true")
|
||||||
|
moduleRoot, err := test.GetModuleRoot()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
driverRoot := filepath.Join(moduleRoot, "testdata", "lookup", "rootfs-1")
|
||||||
|
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
options options
|
||||||
|
expectedValidateError error
|
||||||
|
expectedOptions options
|
||||||
|
expectedError error
|
||||||
|
expectedSpec string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "default",
|
||||||
|
options: options{
|
||||||
|
format: "yaml",
|
||||||
|
mode: "nvml",
|
||||||
|
vendor: "example.com",
|
||||||
|
class: "device",
|
||||||
|
driverRoot: driverRoot,
|
||||||
|
},
|
||||||
|
expectedOptions: options{
|
||||||
|
format: "yaml",
|
||||||
|
mode: "nvml",
|
||||||
|
vendor: "example.com",
|
||||||
|
class: "device",
|
||||||
|
nvidiaCDIHookPath: "/usr/bin/nvidia-cdi-hook",
|
||||||
|
driverRoot: driverRoot,
|
||||||
|
},
|
||||||
|
expectedSpec: `---
|
||||||
|
cdiVersion: 0.5.0
|
||||||
|
kind: example.com/device
|
||||||
|
devices:
|
||||||
|
- name: "0"
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidia0
|
||||||
|
- name: all
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidia0
|
||||||
|
containerEdits:
|
||||||
|
env:
|
||||||
|
- NVIDIA_VISIBLE_DEVICES=void
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidiactl
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidiactl
|
||||||
|
hooks:
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- create-symlinks
|
||||||
|
- --link
|
||||||
|
- libcuda.so.1::/lib/x86_64-linux-gnu/libcuda.so
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- enable-cuda-compat
|
||||||
|
- --host-driver-version=999.88.77
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- update-ldcache
|
||||||
|
- --folder
|
||||||
|
- /lib/x86_64-linux-gnu
|
||||||
|
mounts:
|
||||||
|
- hostPath: {{ .driverRoot }}/lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
containerPath: /lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
options:
|
||||||
|
- ro
|
||||||
|
- nosuid
|
||||||
|
- nodev
|
||||||
|
- bind
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
|
||||||
|
err := c.validateFlags(nil, &tc.options)
|
||||||
|
require.ErrorIs(t, err, tc.expectedValidateError)
|
||||||
|
require.EqualValues(t, tc.expectedOptions, tc.options)
|
||||||
|
|
||||||
|
// Set up a mock server, reusing the DGX A100 mock.
|
||||||
|
server := dgxa100.New()
|
||||||
|
// Override the driver version to match the version in our mock filesystem.
|
||||||
|
server.SystemGetDriverVersionFunc = func() (string, nvml.Return) {
|
||||||
|
return "999.88.77", nvml.SUCCESS
|
||||||
|
}
|
||||||
|
// Set the device count to 1 explicitly since we only have a single device node.
|
||||||
|
server.DeviceGetCountFunc = func() (int, nvml.Return) {
|
||||||
|
return 1, nvml.SUCCESS
|
||||||
|
}
|
||||||
|
for _, d := range server.Devices {
|
||||||
|
// TODO: This is not implemented in the mock.
|
||||||
|
(d.(*dgxa100.Device)).GetMaxMigDeviceCountFunc = func() (int, nvml.Return) {
|
||||||
|
return 0, nvml.SUCCESS
|
||||||
|
}
|
||||||
|
}
|
||||||
|
tc.options.nvmllib = server
|
||||||
|
|
||||||
|
spec, err := c.generateSpec(&tc.options)
|
||||||
|
require.ErrorIs(t, err, tc.expectedError)
|
||||||
|
|
||||||
|
var buf bytes.Buffer
|
||||||
|
_, err = spec.WriteTo(&buf)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.Equal(t, strings.ReplaceAll(tc.expectedSpec, "{{ .driverRoot }}", driverRoot), buf.String())
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
104
cmd/nvidia-ctk/cdi/list/list.go
Normal file
104
cmd/nvidia-ctk/cdi/list/list.go
Normal file
@@ -0,0 +1,104 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package list
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
"tags.cncf.io/container-device-interface/pkg/cdi"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type config struct {
|
||||||
|
cdiSpecDirs cli.StringSlice
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a cdi list command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build creates the CLI command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
cfg := config{}
|
||||||
|
|
||||||
|
// Create the command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "list",
|
||||||
|
Usage: "List the available CDI devices",
|
||||||
|
Before: func(c *cli.Context) error {
|
||||||
|
return m.validateFlags(c, &cfg)
|
||||||
|
},
|
||||||
|
Action: func(c *cli.Context) error {
|
||||||
|
return m.run(c, &cfg)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "spec-dir",
|
||||||
|
Usage: "specify the directories to scan for CDI specifications",
|
||||||
|
Value: cli.NewStringSlice(cdi.DefaultSpecDirs...),
|
||||||
|
Destination: &cfg.cdiSpecDirs,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(c *cli.Context, cfg *config) error {
|
||||||
|
if len(cfg.cdiSpecDirs.Value()) == 0 {
|
||||||
|
return errors.New("at least one CDI specification directory must be specified")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(c *cli.Context, cfg *config) error {
|
||||||
|
registry, err := cdi.NewCache(
|
||||||
|
cdi.WithAutoRefresh(false),
|
||||||
|
cdi.WithSpecDirs(cfg.cdiSpecDirs.Value()...),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create CDI cache: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_ = registry.Refresh()
|
||||||
|
if errors := registry.GetErrors(); len(errors) > 0 {
|
||||||
|
m.logger.Warningf("The following registry errors were reported:")
|
||||||
|
for k, err := range errors {
|
||||||
|
m.logger.Warningf("%v: %v", k, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
devices := registry.ListDevices()
|
||||||
|
m.logger.Infof("Found %d CDI devices", len(devices))
|
||||||
|
for _, device := range devices {
|
||||||
|
fmt.Printf("%s\n", device)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
169
cmd/nvidia-ctk/cdi/transform/root/root.go
Normal file
169
cmd/nvidia-ctk/cdi/transform/root/root.go
Normal file
@@ -0,0 +1,169 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package root
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
"tags.cncf.io/container-device-interface/pkg/cdi"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/spec"
|
||||||
|
transformroot "github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/transform/root"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type transformOptions struct {
|
||||||
|
input string
|
||||||
|
output string
|
||||||
|
}
|
||||||
|
|
||||||
|
type options struct {
|
||||||
|
transformOptions
|
||||||
|
from string
|
||||||
|
to string
|
||||||
|
relativeTo string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a generate-cdi command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build creates the CLI command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
opts := options{}
|
||||||
|
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "root",
|
||||||
|
Usage: "Apply a root transform to a CDI specification",
|
||||||
|
Before: func(c *cli.Context) error {
|
||||||
|
return m.validateFlags(c, &opts)
|
||||||
|
},
|
||||||
|
Action: func(c *cli.Context) error {
|
||||||
|
return m.run(c, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "from",
|
||||||
|
Usage: "specify the root to be transformed",
|
||||||
|
Destination: &opts.from,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "input",
|
||||||
|
Usage: "Specify the file to read the CDI specification from. If this is '-' the specification is read from STDIN",
|
||||||
|
Value: "-",
|
||||||
|
Destination: &opts.input,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "output",
|
||||||
|
Usage: "Specify the file to output the generated CDI specification to. If this is '' the specification is output to STDOUT",
|
||||||
|
Destination: &opts.output,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "relative-to",
|
||||||
|
Usage: "specify whether the transform is relative to the host or to the container. One of [ host | container ]",
|
||||||
|
Value: "host",
|
||||||
|
Destination: &opts.relativeTo,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "to",
|
||||||
|
Usage: "specify the replacement root. If this is the same as the from root, the transform is a no-op.",
|
||||||
|
Value: "",
|
||||||
|
Destination: &opts.to,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(c *cli.Context, opts *options) error {
|
||||||
|
switch opts.relativeTo {
|
||||||
|
case "host":
|
||||||
|
case "container":
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("invalid --relative-to value: %v", opts.relativeTo)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(c *cli.Context, opts *options) error {
|
||||||
|
spec, err := opts.Load()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to load CDI specification: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = transformroot.New(
|
||||||
|
transformroot.WithRoot(opts.from),
|
||||||
|
transformroot.WithTargetRoot(opts.to),
|
||||||
|
transformroot.WithRelativeTo(opts.relativeTo),
|
||||||
|
).Transform(spec.Raw())
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to transform CDI specification: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return opts.Save(spec)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Load lodas the input CDI specification
|
||||||
|
func (o transformOptions) Load() (spec.Interface, error) {
|
||||||
|
contents, err := o.getContents()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to read spec contents: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
raw, err := cdi.ParseSpec(contents)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to parse CDI spec: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return spec.New(
|
||||||
|
spec.WithRawSpec(raw),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o transformOptions) getContents() ([]byte, error) {
|
||||||
|
if o.input == "-" {
|
||||||
|
return io.ReadAll(os.Stdin)
|
||||||
|
}
|
||||||
|
|
||||||
|
return os.ReadFile(o.input)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Save saves the CDI specification to the output file
|
||||||
|
func (o transformOptions) Save(s spec.Interface) error {
|
||||||
|
if o.output == "" {
|
||||||
|
_, err := s.WriteTo(os.Stdout)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to write CDI spec to STDOUT: %v", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return s.Save(o.output)
|
||||||
|
}
|
||||||
52
cmd/nvidia-ctk/cdi/transform/transform.go
Normal file
52
cmd/nvidia-ctk/cdi/transform/transform.go
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package transform
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi/transform/root"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build creates the CLI command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "transform",
|
||||||
|
Usage: "Apply a transform to a CDI specification",
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{}
|
||||||
|
|
||||||
|
c.Subcommands = []*cli.Command{
|
||||||
|
root.NewCommand(m.logger),
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
244
cmd/nvidia-ctk/config/config.go
Normal file
244
cmd/nvidia-ctk/config/config.go
Normal file
@@ -0,0 +1,244 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"reflect"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
createdefault "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/config/create-default"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/config/flags"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
// options stores the subcommand options
|
||||||
|
type options struct {
|
||||||
|
flags.Options
|
||||||
|
setListSeparator string
|
||||||
|
sets cli.StringSlice
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs an config command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
opts := options{}
|
||||||
|
|
||||||
|
// Create the 'config' command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "config",
|
||||||
|
Usage: "Interact with the NVIDIA Container Toolkit configuration",
|
||||||
|
Before: func(ctx *cli.Context) error {
|
||||||
|
return validateFlags(ctx, &opts)
|
||||||
|
},
|
||||||
|
Action: func(ctx *cli.Context) error {
|
||||||
|
return run(ctx, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "config-file",
|
||||||
|
Aliases: []string{"config", "c"},
|
||||||
|
Usage: "Specify the config file to modify.",
|
||||||
|
Value: config.GetConfigFilePath(),
|
||||||
|
Destination: &opts.Config,
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "set",
|
||||||
|
Usage: "Set a config value using the pattern 'key[=value]'. " +
|
||||||
|
"Specifying only 'key' is equivalent to 'key=true' for boolean settings. " +
|
||||||
|
"This flag can be specified multiple times, but only the last value for a specific " +
|
||||||
|
"config option is applied. " +
|
||||||
|
"If the setting represents a list, the elements are colon-separated.",
|
||||||
|
Destination: &opts.sets,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "set-list-separator",
|
||||||
|
Usage: "Specify a separator for lists applied using the set command.",
|
||||||
|
Hidden: true,
|
||||||
|
Value: ":",
|
||||||
|
Destination: &opts.setListSeparator,
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "in-place",
|
||||||
|
Aliases: []string{"i"},
|
||||||
|
Usage: "Modify the config file in-place",
|
||||||
|
Destination: &opts.InPlace,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "output",
|
||||||
|
Aliases: []string{"o"},
|
||||||
|
Usage: "Specify the output file to write to; If not specified, the output is written to stdout",
|
||||||
|
Destination: &opts.Output,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Subcommands = []*cli.Command{
|
||||||
|
createdefault.NewCommand(m.logger),
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func validateFlags(c *cli.Context, opts *options) error {
|
||||||
|
if opts.setListSeparator == "" {
|
||||||
|
return fmt.Errorf("set-list-separator must be set")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func run(c *cli.Context, opts *options) error {
|
||||||
|
cfgToml, err := config.New(
|
||||||
|
config.WithConfigFile(opts.Config),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to create config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, set := range opts.sets.Value() {
|
||||||
|
key, value, err := setFlagToKeyValue(set, opts.setListSeparator)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("invalid --set option %v: %w", set, err)
|
||||||
|
}
|
||||||
|
if value == nil {
|
||||||
|
_ = cfgToml.Delete(key)
|
||||||
|
} else {
|
||||||
|
cfgToml.Set(key, value)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := opts.EnsureOutputFolder(); err != nil {
|
||||||
|
return fmt.Errorf("failed to create output directory: %v", err)
|
||||||
|
}
|
||||||
|
output, err := opts.CreateOutput()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to open output file: %v", err)
|
||||||
|
}
|
||||||
|
defer output.Close()
|
||||||
|
|
||||||
|
if _, err := cfgToml.Save(output); err != nil {
|
||||||
|
return fmt.Errorf("failed to save config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var errInvalidConfigOption = errors.New("invalid config option")
|
||||||
|
var errUndefinedField = errors.New("undefined field")
|
||||||
|
var errInvalidFormat = errors.New("invalid format")
|
||||||
|
|
||||||
|
// setFlagToKeyValue converts a --set flag to a key-value pair.
|
||||||
|
// The set flag is of the form key[=value], with the value being optional if key refers to a
|
||||||
|
// boolean config option.
|
||||||
|
func setFlagToKeyValue(setFlag string, setListSeparator string) (string, interface{}, error) {
|
||||||
|
setParts := strings.SplitN(setFlag, "=", 2)
|
||||||
|
key := setParts[0]
|
||||||
|
|
||||||
|
field, err := getField(key)
|
||||||
|
if err != nil {
|
||||||
|
return key, nil, fmt.Errorf("%w: %w", errInvalidConfigOption, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
kind := field.Kind()
|
||||||
|
if len(setParts) != 2 {
|
||||||
|
if kind == reflect.Bool || (kind == reflect.Pointer && field.Elem().Kind() == reflect.Bool) {
|
||||||
|
return key, true, nil
|
||||||
|
}
|
||||||
|
return key, nil, fmt.Errorf("%w: expected key=value; got %v", errInvalidFormat, setFlag)
|
||||||
|
}
|
||||||
|
|
||||||
|
value := setParts[1]
|
||||||
|
if kind == reflect.Pointer && value != "nil" {
|
||||||
|
kind = field.Elem().Kind()
|
||||||
|
}
|
||||||
|
switch kind {
|
||||||
|
case reflect.Pointer:
|
||||||
|
return key, nil, nil
|
||||||
|
case reflect.Bool:
|
||||||
|
b, err := strconv.ParseBool(value)
|
||||||
|
if err != nil {
|
||||||
|
return key, value, fmt.Errorf("%w: %w", errInvalidFormat, err)
|
||||||
|
}
|
||||||
|
return key, b, nil
|
||||||
|
case reflect.String:
|
||||||
|
return key, value, nil
|
||||||
|
case reflect.Slice:
|
||||||
|
valueParts := strings.Split(value, setListSeparator)
|
||||||
|
switch field.Elem().Kind() {
|
||||||
|
case reflect.String:
|
||||||
|
return key, valueParts, nil
|
||||||
|
case reflect.Int:
|
||||||
|
var output []int64
|
||||||
|
for _, v := range valueParts {
|
||||||
|
vi, err := strconv.ParseInt(v, 10, 0)
|
||||||
|
if err != nil {
|
||||||
|
return key, nil, fmt.Errorf("%w: %w", errInvalidFormat, err)
|
||||||
|
}
|
||||||
|
output = append(output, vi)
|
||||||
|
}
|
||||||
|
return key, output, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return key, nil, fmt.Errorf("unsupported type for %v (%v)", setParts, kind)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getField(key string) (reflect.Type, error) {
|
||||||
|
s, err := getStruct(reflect.TypeOf(config.Config{}), strings.Split(key, ".")...)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return s.Type, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func getStruct(current reflect.Type, paths ...string) (reflect.StructField, error) {
|
||||||
|
if len(paths) < 1 {
|
||||||
|
return reflect.StructField{}, fmt.Errorf("%w: no fields selected", errUndefinedField)
|
||||||
|
}
|
||||||
|
tomlField := paths[0]
|
||||||
|
for i := 0; i < current.NumField(); i++ {
|
||||||
|
f := current.Field(i)
|
||||||
|
v, ok := f.Tag.Lookup("toml")
|
||||||
|
if !ok {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if strings.SplitN(v, ",", 2)[0] != tomlField {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if len(paths) == 1 {
|
||||||
|
return f, nil
|
||||||
|
}
|
||||||
|
return getStruct(f.Type, paths[1:]...)
|
||||||
|
}
|
||||||
|
return reflect.StructField{}, fmt.Errorf("%w: %q", errUndefinedField, tomlField)
|
||||||
|
}
|
||||||
143
cmd/nvidia-ctk/config/config_test.go
Normal file
143
cmd/nvidia-ctk/config/config_test.go
Normal file
@@ -0,0 +1,143 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestSetFlagToKeyValue(t *testing.T) {
|
||||||
|
// TODO: We need to enable this test again since switching to reflect.
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
setFlag string
|
||||||
|
setListSeparator string
|
||||||
|
expectedKey string
|
||||||
|
expectedValue interface{}
|
||||||
|
expectedError error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "option not present returns an error",
|
||||||
|
setFlag: "undefined=new-value",
|
||||||
|
expectedKey: "undefined",
|
||||||
|
expectedError: errInvalidConfigOption,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "undefined nexted option returns error",
|
||||||
|
setFlag: "nvidia-container-cli.undefined",
|
||||||
|
expectedKey: "nvidia-container-cli.undefined",
|
||||||
|
expectedError: errInvalidConfigOption,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "boolean option assumes true",
|
||||||
|
setFlag: "disable-require",
|
||||||
|
expectedKey: "disable-require",
|
||||||
|
expectedValue: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "boolean option returns true",
|
||||||
|
setFlag: "disable-require=true",
|
||||||
|
expectedKey: "disable-require",
|
||||||
|
expectedValue: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "boolean option returns false",
|
||||||
|
setFlag: "disable-require=false",
|
||||||
|
expectedKey: "disable-require",
|
||||||
|
expectedValue: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "invalid boolean option returns error",
|
||||||
|
setFlag: "disable-require=something",
|
||||||
|
expectedKey: "disable-require",
|
||||||
|
expectedValue: "something",
|
||||||
|
expectedError: errInvalidFormat,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "string option requires value",
|
||||||
|
setFlag: "swarm-resource",
|
||||||
|
expectedKey: "swarm-resource",
|
||||||
|
expectedValue: nil,
|
||||||
|
expectedError: errInvalidFormat,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "string option returns value",
|
||||||
|
setFlag: "swarm-resource=string-value",
|
||||||
|
expectedKey: "swarm-resource",
|
||||||
|
expectedValue: "string-value",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "string option returns value with equals",
|
||||||
|
setFlag: "swarm-resource=string-value=more",
|
||||||
|
expectedKey: "swarm-resource",
|
||||||
|
expectedValue: "string-value=more",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "string option treats bool value as string",
|
||||||
|
setFlag: "swarm-resource=true",
|
||||||
|
expectedKey: "swarm-resource",
|
||||||
|
expectedValue: "true",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "string option treats int value as string",
|
||||||
|
setFlag: "swarm-resource=5",
|
||||||
|
expectedKey: "swarm-resource",
|
||||||
|
expectedValue: "5",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "[]string option returns single value",
|
||||||
|
setFlag: "nvidia-container-cli.environment=string-value",
|
||||||
|
expectedKey: "nvidia-container-cli.environment",
|
||||||
|
expectedValue: []string{"string-value"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "[]string option returns multiple values",
|
||||||
|
setFlag: "nvidia-container-cli.environment=first,second",
|
||||||
|
setListSeparator: ",",
|
||||||
|
expectedKey: "nvidia-container-cli.environment",
|
||||||
|
expectedValue: []string{"first", "second"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "[]string option returns values with equals",
|
||||||
|
setFlag: "nvidia-container-cli.environment=first=1,second=2",
|
||||||
|
setListSeparator: ",",
|
||||||
|
expectedKey: "nvidia-container-cli.environment",
|
||||||
|
expectedValue: []string{"first=1", "second=2"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "[]string option returns multiple values semi-colon",
|
||||||
|
setFlag: "nvidia-container-cli.environment=first;second",
|
||||||
|
setListSeparator: ";",
|
||||||
|
expectedKey: "nvidia-container-cli.environment",
|
||||||
|
expectedValue: []string{"first", "second"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
if tc.setListSeparator == "" {
|
||||||
|
tc.setListSeparator = ","
|
||||||
|
}
|
||||||
|
k, v, err := setFlagToKeyValue(tc.setFlag, tc.setListSeparator)
|
||||||
|
require.ErrorIs(t, err, tc.expectedError)
|
||||||
|
require.EqualValues(t, tc.expectedKey, k)
|
||||||
|
require.EqualValues(t, tc.expectedValue, v)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
94
cmd/nvidia-ctk/config/create-default/create-default.go
Normal file
94
cmd/nvidia-ctk/config/create-default/create-default.go
Normal file
@@ -0,0 +1,94 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package defaultsubcommand
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/config/flags"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a default command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build creates the CLI command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
opts := flags.Options{}
|
||||||
|
|
||||||
|
// Create the 'default' command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "default",
|
||||||
|
Aliases: []string{"create-default", "generate-default"},
|
||||||
|
Usage: "Generate the default NVIDIA Container Toolkit configuration file",
|
||||||
|
Before: func(c *cli.Context) error {
|
||||||
|
return m.validateFlags(c, &opts)
|
||||||
|
},
|
||||||
|
Action: func(c *cli.Context) error {
|
||||||
|
return m.run(c, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "output",
|
||||||
|
Aliases: []string{"o"},
|
||||||
|
Usage: "Specify the output file to write to; If not specified, the output is written to stdout",
|
||||||
|
Destination: &opts.Output,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(c *cli.Context, opts *flags.Options) error {
|
||||||
|
return opts.Validate()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(c *cli.Context, opts *flags.Options) error {
|
||||||
|
cfgToml, err := config.New()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load or create config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := opts.EnsureOutputFolder(); err != nil {
|
||||||
|
return fmt.Errorf("failed to create output directory: %v", err)
|
||||||
|
}
|
||||||
|
output, err := opts.CreateOutput()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to open output file: %v", err)
|
||||||
|
}
|
||||||
|
defer output.Close()
|
||||||
|
|
||||||
|
if _, err = cfgToml.Save(output); err != nil {
|
||||||
|
return fmt.Errorf("failed to write output: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
82
cmd/nvidia-ctk/config/flags/options.go
Normal file
82
cmd/nvidia-ctk/config/flags/options.go
Normal file
@@ -0,0 +1,82 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package flags
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Options stores options for the config commands
|
||||||
|
type Options struct {
|
||||||
|
Config string
|
||||||
|
Output string
|
||||||
|
InPlace bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate checks whether the options are valid.
|
||||||
|
func (o Options) Validate() error {
|
||||||
|
if o.InPlace && o.Output != "" {
|
||||||
|
return fmt.Errorf("cannot specify both --in-place and --output")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetOutput returns the effective output
|
||||||
|
func (o Options) GetOutput() string {
|
||||||
|
if o.InPlace {
|
||||||
|
return o.Config
|
||||||
|
}
|
||||||
|
|
||||||
|
return o.Output
|
||||||
|
}
|
||||||
|
|
||||||
|
// EnsureOutputFolder creates the output folder if it does not exist.
|
||||||
|
// If the output folder is not specified (i.e. output to STDOUT), it is ignored.
|
||||||
|
func (o Options) EnsureOutputFolder() error {
|
||||||
|
output := o.GetOutput()
|
||||||
|
if output == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if dir := filepath.Dir(output); dir != "" {
|
||||||
|
return os.MkdirAll(dir, 0755)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// CreateOutput creates the writer for the output.
|
||||||
|
func (o Options) CreateOutput() (io.WriteCloser, error) {
|
||||||
|
output := o.GetOutput()
|
||||||
|
if output == "" {
|
||||||
|
return nullCloser{os.Stdout}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return os.Create(output)
|
||||||
|
}
|
||||||
|
|
||||||
|
// nullCloser is a writer that does nothing on Close.
|
||||||
|
type nullCloser struct {
|
||||||
|
io.Writer
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close is a no-op for a nullCloser.
|
||||||
|
func (d nullCloser) Close() error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -1,229 +0,0 @@
|
|||||||
/**
|
|
||||||
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
**/
|
|
||||||
|
|
||||||
package symlinks
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
"path/filepath"
|
|
||||||
"strings"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/discover/csv"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
)
|
|
||||||
|
|
||||||
type command struct {
|
|
||||||
logger *logrus.Logger
|
|
||||||
}
|
|
||||||
|
|
||||||
type config struct {
|
|
||||||
hostRoot string
|
|
||||||
filenames cli.StringSlice
|
|
||||||
links cli.StringSlice
|
|
||||||
containerSpec string
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewCommand constructs a hook command with the specified logger
|
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
|
||||||
c := command{
|
|
||||||
logger: logger,
|
|
||||||
}
|
|
||||||
return c.build()
|
|
||||||
}
|
|
||||||
|
|
||||||
// build
|
|
||||||
func (m command) build() *cli.Command {
|
|
||||||
cfg := config{}
|
|
||||||
|
|
||||||
// Create the '' command
|
|
||||||
c := cli.Command{
|
|
||||||
Name: "create-symlinks",
|
|
||||||
Usage: "A hook to create symlinks in the container. This can be used to proces CSV mount specs",
|
|
||||||
Action: func(c *cli.Context) error {
|
|
||||||
return m.run(c, &cfg)
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
c.Flags = []cli.Flag{
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "host-root",
|
|
||||||
Usage: "The root on the host filesystem to use to resolve symlinks",
|
|
||||||
Destination: &cfg.hostRoot,
|
|
||||||
},
|
|
||||||
&cli.StringSliceFlag{
|
|
||||||
Name: "csv-filename",
|
|
||||||
Usage: "Specify a (CSV) filename to process",
|
|
||||||
Destination: &cfg.filenames,
|
|
||||||
},
|
|
||||||
&cli.StringSliceFlag{
|
|
||||||
Name: "link",
|
|
||||||
Usage: "Specify a specific link to create. The link is specified as source:target",
|
|
||||||
Destination: &cfg.links,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "container-spec",
|
|
||||||
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN",
|
|
||||||
Destination: &cfg.containerSpec,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
return &c
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m command) run(c *cli.Context, cfg *config) error {
|
|
||||||
s, err := oci.LoadContainerState(cfg.containerSpec)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to load container state: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
containerRoot, err := s.GetContainerRoot()
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to determined container root: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
csvFiles := cfg.filenames.Value()
|
|
||||||
|
|
||||||
chainLocator := lookup.NewSymlinkChainLocator(m.logger, cfg.hostRoot)
|
|
||||||
|
|
||||||
var candidates []string
|
|
||||||
for _, file := range csvFiles {
|
|
||||||
mountSpecs, err := csv.NewCSVFileParser(m.logger, file).Parse()
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Debugf("Skipping CSV file %v: %v", file, err)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, ms := range mountSpecs {
|
|
||||||
if ms.Type != csv.MountSpecSym {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
targets, err := chainLocator.Locate(ms.Path)
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Warnf("Failed to locate symlink %v", ms.Path)
|
|
||||||
}
|
|
||||||
candidates = append(candidates, targets...)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
created := make(map[string]bool)
|
|
||||||
// candidates is a list of absolute paths to symlinks in a chain, or the final target of the chain.
|
|
||||||
for _, candidate := range candidates {
|
|
||||||
targets, err := m.Locate(candidate)
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Debugf("Skipping invalid link: %v", err)
|
|
||||||
continue
|
|
||||||
} else if len(targets) != 1 {
|
|
||||||
m.logger.Debugf("Unexepected number of targets: %v", targets)
|
|
||||||
continue
|
|
||||||
} else if targets[0] == candidate {
|
|
||||||
m.logger.Debugf("%v is not a symlink", candidate)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
err = m.createLink(created, cfg.hostRoot, containerRoot, targets[0], candidate)
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Warnf("Failed to create link %v: %v", []string{targets[0], candidate}, err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
links := cfg.links.Value()
|
|
||||||
for _, l := range links {
|
|
||||||
parts := strings.Split(l, ":")
|
|
||||||
if len(parts) != 2 {
|
|
||||||
m.logger.Warnf("Invalid link specification %v", l)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
err := m.createLink(created, cfg.hostRoot, containerRoot, parts[0], parts[1])
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Warnf("Failed to create link %v: %v", parts, err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m command) createLink(created map[string]bool, hostRoot string, containerRoot string, target string, link string) error {
|
|
||||||
linkPath, err := changeRoot(hostRoot, containerRoot, link)
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Warnf("Failed to resolve path for link %v relative to %v: %v", link, containerRoot, err)
|
|
||||||
}
|
|
||||||
if created[linkPath] {
|
|
||||||
m.logger.Debugf("Link %v already created", linkPath)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
targetPath, err := changeRoot(hostRoot, "/", target)
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Warnf("Failed to resolve path for target %v relative to %v: %v", target, "/", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
m.logger.Infof("Symlinking %v to %v", linkPath, targetPath)
|
|
||||||
err = os.MkdirAll(filepath.Dir(linkPath), 0755)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to create directory: %v", err)
|
|
||||||
}
|
|
||||||
err = os.Symlink(target, linkPath)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to create symlink: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func changeRoot(current string, new string, path string) (string, error) {
|
|
||||||
if !filepath.IsAbs(path) {
|
|
||||||
return path, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
relative := path
|
|
||||||
if current != "" {
|
|
||||||
r, err := filepath.Rel(current, path)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
relative = r
|
|
||||||
}
|
|
||||||
|
|
||||||
return filepath.Join(new, relative), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// Locate returns the link target of the specified filename or an empty slice if the
|
|
||||||
// specified filename is not a symlink.
|
|
||||||
func (m command) Locate(filename string) ([]string, error) {
|
|
||||||
info, err := os.Lstat(filename)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("failed to get file info: %v", info)
|
|
||||||
}
|
|
||||||
if info.Mode()&os.ModeSymlink == 0 {
|
|
||||||
m.logger.Debugf("%v is not a symlink", filename)
|
|
||||||
return nil, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
target, err := os.Readlink(filename)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("error checking symlink: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
m.logger.Debugf("Resolved link: '%v' => '%v'", filename, target)
|
|
||||||
|
|
||||||
return []string{target}, nil
|
|
||||||
}
|
|
||||||
@@ -17,18 +17,18 @@
|
|||||||
package hook
|
package hook
|
||||||
|
|
||||||
import (
|
import (
|
||||||
symlinks "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/hook/create-symlinks"
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/commands"
|
||||||
ldcache "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/hook/update-ldcache"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"github.com/urfave/cli/v2"
|
"github.com/urfave/cli/v2"
|
||||||
)
|
)
|
||||||
|
|
||||||
type hookCommand struct {
|
type hookCommand struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCommand constructs a hook command with the specified logger
|
// NewCommand constructs a hook command with the specified logger
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
c := hookCommand{
|
c := hookCommand{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
@@ -43,10 +43,7 @@ func (m hookCommand) build() *cli.Command {
|
|||||||
Usage: "A collection of hooks that may be injected into an OCI spec",
|
Usage: "A collection of hooks that may be injected into an OCI spec",
|
||||||
}
|
}
|
||||||
|
|
||||||
hook.Subcommands = []*cli.Command{
|
hook.Subcommands = commands.New(m.logger)
|
||||||
ldcache.NewCommand(m.logger),
|
|
||||||
symlinks.NewCommand(m.logger),
|
|
||||||
}
|
|
||||||
|
|
||||||
return &hook
|
return &hook
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,129 +0,0 @@
|
|||||||
/**
|
|
||||||
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
**/
|
|
||||||
|
|
||||||
package ldcache
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
"path/filepath"
|
|
||||||
"syscall"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
)
|
|
||||||
|
|
||||||
type command struct {
|
|
||||||
logger *logrus.Logger
|
|
||||||
}
|
|
||||||
|
|
||||||
type config struct {
|
|
||||||
folders cli.StringSlice
|
|
||||||
containerSpec string
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewCommand constructs an update-ldcache command with the specified logger
|
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
|
||||||
c := command{
|
|
||||||
logger: logger,
|
|
||||||
}
|
|
||||||
return c.build()
|
|
||||||
}
|
|
||||||
|
|
||||||
// build the update-ldcache command
|
|
||||||
func (m command) build() *cli.Command {
|
|
||||||
cfg := config{}
|
|
||||||
|
|
||||||
// Create the 'update-ldcache' command
|
|
||||||
c := cli.Command{
|
|
||||||
Name: "update-ldcache",
|
|
||||||
Usage: "Update ldcache in a container by running ldconfig",
|
|
||||||
Action: func(c *cli.Context) error {
|
|
||||||
return m.run(c, &cfg)
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
c.Flags = []cli.Flag{
|
|
||||||
&cli.StringSliceFlag{
|
|
||||||
Name: "folder",
|
|
||||||
Usage: "Specifiy a folder to add to /etc/ld.so.conf before updating the ld cache",
|
|
||||||
Destination: &cfg.folders,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "container-spec",
|
|
||||||
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN",
|
|
||||||
Destination: &cfg.containerSpec,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
return &c
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m command) run(c *cli.Context, cfg *config) error {
|
|
||||||
s, err := oci.LoadContainerState(cfg.containerSpec)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to load container state: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
containerRoot, err := s.GetContainerRoot()
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to determined container root: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
err = m.createConfig(containerRoot, cfg.folders.Value())
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to update ld.so.conf: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
args := []string{"/sbin/ldconfig"}
|
|
||||||
if containerRoot != "" {
|
|
||||||
args = append(args, "-r", containerRoot)
|
|
||||||
}
|
|
||||||
|
|
||||||
return syscall.Exec(args[0], args, nil)
|
|
||||||
}
|
|
||||||
|
|
||||||
// createConfig creates (or updates) /etc/ld.so.conf.d/nvcr-<RANDOM_STRING>.conf in the container
|
|
||||||
// to include the required paths.
|
|
||||||
func (m command) createConfig(root string, folders []string) error {
|
|
||||||
if len(folders) == 0 {
|
|
||||||
m.logger.Debugf("No folders to add to /etc/ld.so.conf")
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
configFile, err := os.CreateTemp(filepath.Join(root, "/etc/ld.so.conf.d"), "nvcr-*.conf")
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to create config file: %v", err)
|
|
||||||
}
|
|
||||||
defer configFile.Close()
|
|
||||||
|
|
||||||
m.logger.Debugf("Adding folders %v to %v", folders, configFile.Name())
|
|
||||||
|
|
||||||
configured := make(map[string]bool)
|
|
||||||
for _, folder := range folders {
|
|
||||||
if configured[folder] {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
_, err = configFile.WriteString(fmt.Sprintf("%s\n", folder))
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to update ld.so.conf.d: %v", err)
|
|
||||||
}
|
|
||||||
configured[folder] = true
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
48
cmd/nvidia-ctk/info/info.go
Normal file
48
cmd/nvidia-ctk/info/info.go
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package info
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs an info command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
// Create the 'info' command
|
||||||
|
info := cli.Command{
|
||||||
|
Name: "info",
|
||||||
|
Usage: "Provide information about the system",
|
||||||
|
}
|
||||||
|
|
||||||
|
info.Subcommands = []*cli.Command{}
|
||||||
|
|
||||||
|
return &info
|
||||||
|
}
|
||||||
@@ -19,24 +19,33 @@ package main
|
|||||||
import (
|
import (
|
||||||
"os"
|
"os"
|
||||||
|
|
||||||
|
"github.com/sirupsen/logrus"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/config"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/hook"
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/hook"
|
||||||
|
infoCLI "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/info"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/runtime"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/system"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
||||||
log "github.com/sirupsen/logrus"
|
|
||||||
cli "github.com/urfave/cli/v2"
|
cli "github.com/urfave/cli/v2"
|
||||||
)
|
)
|
||||||
|
|
||||||
var logger = log.New()
|
// options defines the options that can be set for the CLI through config files,
|
||||||
|
|
||||||
// config defines the options that can be set for the CLI through config files,
|
|
||||||
// environment variables, or command line flags
|
// environment variables, or command line flags
|
||||||
type config struct {
|
type options struct {
|
||||||
// Debug indicates whether the CLI is started in "debug" mode
|
// Debug indicates whether the CLI is started in "debug" mode
|
||||||
Debug bool
|
Debug bool
|
||||||
|
// Quiet indicates whether the CLI is started in "quiet" mode
|
||||||
|
Quiet bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
// Create a config struct to hold the parsed environment variables or command line flags
|
logger := logrus.New()
|
||||||
config := config{}
|
|
||||||
|
// Create a options struct to hold the parsed environment variables or command line flags
|
||||||
|
opts := options{}
|
||||||
|
|
||||||
// Create the top-level CLI
|
// Create the top-level CLI
|
||||||
c := cli.NewApp()
|
c := cli.NewApp()
|
||||||
@@ -52,16 +61,25 @@ func main() {
|
|||||||
Name: "debug",
|
Name: "debug",
|
||||||
Aliases: []string{"d"},
|
Aliases: []string{"d"},
|
||||||
Usage: "Enable debug-level logging",
|
Usage: "Enable debug-level logging",
|
||||||
Destination: &config.Debug,
|
Destination: &opts.Debug,
|
||||||
EnvVars: []string{"NVIDIA_CTK_DEBUG"},
|
EnvVars: []string{"NVIDIA_CTK_DEBUG"},
|
||||||
},
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "quiet",
|
||||||
|
Usage: "Suppress all output except for errors; overrides --debug",
|
||||||
|
Destination: &opts.Quiet,
|
||||||
|
EnvVars: []string{"NVIDIA_CTK_QUIET"},
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
// Set log-level for all subcommands
|
// Set log-level for all subcommands
|
||||||
c.Before = func(c *cli.Context) error {
|
c.Before = func(c *cli.Context) error {
|
||||||
logLevel := log.InfoLevel
|
logLevel := logrus.InfoLevel
|
||||||
if config.Debug {
|
if opts.Debug {
|
||||||
logLevel = log.DebugLevel
|
logLevel = logrus.DebugLevel
|
||||||
|
}
|
||||||
|
if opts.Quiet {
|
||||||
|
logLevel = logrus.ErrorLevel
|
||||||
}
|
}
|
||||||
logger.SetLevel(logLevel)
|
logger.SetLevel(logLevel)
|
||||||
return nil
|
return nil
|
||||||
@@ -70,12 +88,17 @@ func main() {
|
|||||||
// Define the subcommands
|
// Define the subcommands
|
||||||
c.Commands = []*cli.Command{
|
c.Commands = []*cli.Command{
|
||||||
hook.NewCommand(logger),
|
hook.NewCommand(logger),
|
||||||
|
runtime.NewCommand(logger),
|
||||||
|
infoCLI.NewCommand(logger),
|
||||||
|
cdi.NewCommand(logger),
|
||||||
|
system.NewCommand(logger),
|
||||||
|
config.NewCommand(logger),
|
||||||
}
|
}
|
||||||
|
|
||||||
// Run the CLI
|
// Run the CLI
|
||||||
err := c.Run(os.Args)
|
err := c.Run(os.Args)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Errorf("%v", err)
|
logger.Errorf("%v", err)
|
||||||
log.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
355
cmd/nvidia-ctk/runtime/configure/configure.go
Normal file
355
cmd/nvidia-ctk/runtime/configure/configure.go
Normal file
@@ -0,0 +1,355 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package configure
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/containerd"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/crio"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/docker"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/ocihook"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/toml"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
defaultRuntime = "docker"
|
||||||
|
|
||||||
|
// defaultNVIDIARuntimeName is the default name to use in configs for the NVIDIA Container Runtime
|
||||||
|
defaultNVIDIARuntimeName = "nvidia"
|
||||||
|
// defaultNVIDIARuntimeExecutable is the default NVIDIA Container Runtime executable file name
|
||||||
|
defaultNVIDIARuntimeExecutable = "nvidia-container-runtime"
|
||||||
|
defaultNVIDIARuntimeExpecutablePath = "/usr/bin/nvidia-container-runtime"
|
||||||
|
defaultNVIDIARuntimeHookExpecutablePath = "/usr/bin/nvidia-container-runtime-hook"
|
||||||
|
|
||||||
|
defaultContainerdConfigFilePath = "/etc/containerd/config.toml"
|
||||||
|
defaultCrioConfigFilePath = "/etc/crio/crio.conf"
|
||||||
|
defaultDockerConfigFilePath = "/etc/docker/daemon.json"
|
||||||
|
|
||||||
|
defaultConfigSource = configSourceFile
|
||||||
|
configSourceCommand = "command"
|
||||||
|
configSourceFile = "file"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a configure command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// config defines the options that can be set for the CLI through config files,
|
||||||
|
// environment variables, or command line config
|
||||||
|
type config struct {
|
||||||
|
dryRun bool
|
||||||
|
runtime string
|
||||||
|
configFilePath string
|
||||||
|
configSource string
|
||||||
|
mode string
|
||||||
|
hookFilePath string
|
||||||
|
|
||||||
|
runtimeConfigOverrideJSON string
|
||||||
|
|
||||||
|
nvidiaRuntime struct {
|
||||||
|
name string
|
||||||
|
path string
|
||||||
|
hookPath string
|
||||||
|
setAsDefault bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// cdi-specific options
|
||||||
|
cdi struct {
|
||||||
|
enabled bool
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
// Create a config struct to hold the parsed environment variables or command line flags
|
||||||
|
config := config{}
|
||||||
|
|
||||||
|
// Create the 'configure' command
|
||||||
|
configure := cli.Command{
|
||||||
|
Name: "configure",
|
||||||
|
Usage: "Add a runtime to the specified container engine",
|
||||||
|
Before: func(c *cli.Context) error {
|
||||||
|
return m.validateFlags(c, &config)
|
||||||
|
},
|
||||||
|
Action: func(c *cli.Context) error {
|
||||||
|
return m.configureWrapper(c, &config)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
configure.Flags = []cli.Flag{
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "dry-run",
|
||||||
|
Usage: "update the runtime configuration as required but don't write changes to disk",
|
||||||
|
Destination: &config.dryRun,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "runtime",
|
||||||
|
Usage: "the target runtime engine; one of [containerd, crio, docker]",
|
||||||
|
Value: defaultRuntime,
|
||||||
|
Destination: &config.runtime,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "config",
|
||||||
|
Usage: "path to the config file for the target runtime",
|
||||||
|
Destination: &config.configFilePath,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "config-mode",
|
||||||
|
Usage: "the config mode for runtimes that support multiple configuration mechanisms",
|
||||||
|
Destination: &config.mode,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "config-source",
|
||||||
|
Usage: "the source to retrieve the container runtime configuration; one of [command, file]\"",
|
||||||
|
Destination: &config.configSource,
|
||||||
|
Value: defaultConfigSource,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "oci-hook-path",
|
||||||
|
Usage: "the path to the OCI runtime hook to create if --config-mode=oci-hook is specified. If no path is specified, the generated hook is output to STDOUT.\n\tNote: The use of OCI hooks is deprecated.",
|
||||||
|
Destination: &config.hookFilePath,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-runtime-name",
|
||||||
|
Usage: "specify the name of the NVIDIA runtime that will be added",
|
||||||
|
Value: defaultNVIDIARuntimeName,
|
||||||
|
Destination: &config.nvidiaRuntime.name,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-runtime-path",
|
||||||
|
Aliases: []string{"runtime-path"},
|
||||||
|
Usage: "specify the path to the NVIDIA runtime executable",
|
||||||
|
Value: defaultNVIDIARuntimeExecutable,
|
||||||
|
Destination: &config.nvidiaRuntime.path,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-runtime-hook-path",
|
||||||
|
Usage: "specify the path to the NVIDIA Container Runtime hook executable",
|
||||||
|
Value: defaultNVIDIARuntimeHookExpecutablePath,
|
||||||
|
Destination: &config.nvidiaRuntime.hookPath,
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "nvidia-set-as-default",
|
||||||
|
Aliases: []string{"set-as-default"},
|
||||||
|
Usage: "set the NVIDIA runtime as the default runtime",
|
||||||
|
Destination: &config.nvidiaRuntime.setAsDefault,
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "cdi.enabled",
|
||||||
|
Aliases: []string{"cdi.enable", "enable-cdi"},
|
||||||
|
Usage: "Enable CDI in the configured runtime",
|
||||||
|
Destination: &config.cdi.enabled,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &configure
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(c *cli.Context, config *config) error {
|
||||||
|
if config.mode == "oci-hook" {
|
||||||
|
if !filepath.IsAbs(config.nvidiaRuntime.hookPath) {
|
||||||
|
return fmt.Errorf("the NVIDIA runtime hook path %q is not an absolute path", config.nvidiaRuntime.hookPath)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if config.mode != "" && config.mode != "config-file" {
|
||||||
|
m.logger.Warningf("Ignoring unsupported config mode for %v: %q", config.runtime, config.mode)
|
||||||
|
}
|
||||||
|
config.mode = "config-file"
|
||||||
|
|
||||||
|
switch config.runtime {
|
||||||
|
case "containerd", "crio", "docker":
|
||||||
|
break
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("unrecognized runtime '%v'", config.runtime)
|
||||||
|
}
|
||||||
|
|
||||||
|
switch config.runtime {
|
||||||
|
case "containerd", "crio":
|
||||||
|
if config.nvidiaRuntime.path == defaultNVIDIARuntimeExecutable {
|
||||||
|
config.nvidiaRuntime.path = defaultNVIDIARuntimeExpecutablePath
|
||||||
|
}
|
||||||
|
if !filepath.IsAbs(config.nvidiaRuntime.path) {
|
||||||
|
return fmt.Errorf("the NVIDIA runtime path %q is not an absolute path", config.nvidiaRuntime.path)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.runtime != "containerd" && config.runtime != "docker" {
|
||||||
|
if config.cdi.enabled {
|
||||||
|
m.logger.Warningf("Ignoring cdi.enabled flag for %v", config.runtime)
|
||||||
|
}
|
||||||
|
config.cdi.enabled = false
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.runtimeConfigOverrideJSON != "" && config.runtime != "containerd" {
|
||||||
|
m.logger.Warningf("Ignoring runtime-config-override flag for %v", config.runtime)
|
||||||
|
config.runtimeConfigOverrideJSON = ""
|
||||||
|
}
|
||||||
|
|
||||||
|
switch config.configSource {
|
||||||
|
case configSourceCommand:
|
||||||
|
if config.runtime == "docker" {
|
||||||
|
m.logger.Warningf("A %v Config Source is not supported for %v; using %v", config.configSource, config.runtime, configSourceFile)
|
||||||
|
config.configSource = configSourceFile
|
||||||
|
}
|
||||||
|
case configSourceFile:
|
||||||
|
break
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("unrecognized Config Source: %v", config.configSource)
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.configFilePath == "" {
|
||||||
|
switch config.runtime {
|
||||||
|
case "containerd":
|
||||||
|
config.configFilePath = defaultContainerdConfigFilePath
|
||||||
|
case "crio":
|
||||||
|
config.configFilePath = defaultCrioConfigFilePath
|
||||||
|
case "docker":
|
||||||
|
config.configFilePath = defaultDockerConfigFilePath
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// configureWrapper updates the specified container engine config to enable the NVIDIA runtime
|
||||||
|
func (m command) configureWrapper(c *cli.Context, config *config) error {
|
||||||
|
switch config.mode {
|
||||||
|
case "oci-hook":
|
||||||
|
return m.configureOCIHook(c, config)
|
||||||
|
case "config-file":
|
||||||
|
return m.configureConfigFile(c, config)
|
||||||
|
}
|
||||||
|
return fmt.Errorf("unsupported config-mode: %v", config.mode)
|
||||||
|
}
|
||||||
|
|
||||||
|
// configureConfigFile updates the specified container engine config file to enable the NVIDIA runtime.
|
||||||
|
func (m command) configureConfigFile(c *cli.Context, config *config) error {
|
||||||
|
configSource, err := config.resolveConfigSource()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
var cfg engine.Interface
|
||||||
|
switch config.runtime {
|
||||||
|
case "containerd":
|
||||||
|
cfg, err = containerd.New(
|
||||||
|
containerd.WithLogger(m.logger),
|
||||||
|
containerd.WithPath(config.configFilePath),
|
||||||
|
containerd.WithConfigSource(configSource),
|
||||||
|
)
|
||||||
|
case "crio":
|
||||||
|
cfg, err = crio.New(
|
||||||
|
crio.WithLogger(m.logger),
|
||||||
|
crio.WithPath(config.configFilePath),
|
||||||
|
crio.WithConfigSource(configSource),
|
||||||
|
)
|
||||||
|
case "docker":
|
||||||
|
cfg, err = docker.New(
|
||||||
|
docker.WithLogger(m.logger),
|
||||||
|
docker.WithPath(config.configFilePath),
|
||||||
|
)
|
||||||
|
default:
|
||||||
|
err = fmt.Errorf("unrecognized runtime '%v'", config.runtime)
|
||||||
|
}
|
||||||
|
if err != nil || cfg == nil {
|
||||||
|
return fmt.Errorf("unable to load config for runtime %v: %v", config.runtime, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = cfg.AddRuntime(
|
||||||
|
config.nvidiaRuntime.name,
|
||||||
|
config.nvidiaRuntime.path,
|
||||||
|
config.nvidiaRuntime.setAsDefault,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to update config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.cdi.enabled {
|
||||||
|
cfg.EnableCDI()
|
||||||
|
}
|
||||||
|
|
||||||
|
outputPath := config.getOutputConfigPath()
|
||||||
|
n, err := cfg.Save(outputPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to flush config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if outputPath != "" {
|
||||||
|
if n == 0 {
|
||||||
|
m.logger.Infof("Removed empty config from %v", outputPath)
|
||||||
|
} else {
|
||||||
|
m.logger.Infof("Wrote updated config to %v", outputPath)
|
||||||
|
}
|
||||||
|
m.logger.Infof("It is recommended that %v daemon be restarted.", config.runtime)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// resolveConfigSource returns the default config source or the user provided config source
|
||||||
|
func (c *config) resolveConfigSource() (toml.Loader, error) {
|
||||||
|
switch c.configSource {
|
||||||
|
case configSourceCommand:
|
||||||
|
return c.getCommandConfigSource(), nil
|
||||||
|
case configSourceFile:
|
||||||
|
return toml.FromFile(c.configFilePath), nil
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("unrecognized config source: %s", c.configSource)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// getConfigSourceCommand returns the default cli command to fetch the current runtime config
|
||||||
|
func (c *config) getCommandConfigSource() toml.Loader {
|
||||||
|
switch c.runtime {
|
||||||
|
case "containerd":
|
||||||
|
return containerd.CommandLineSource("")
|
||||||
|
case "crio":
|
||||||
|
return crio.CommandLineSource("")
|
||||||
|
}
|
||||||
|
return toml.Empty
|
||||||
|
}
|
||||||
|
|
||||||
|
// getOutputConfigPath returns the configured config path or "" if dry-run is enabled
|
||||||
|
func (c *config) getOutputConfigPath() string {
|
||||||
|
if c.dryRun {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
return c.configFilePath
|
||||||
|
}
|
||||||
|
|
||||||
|
// configureOCIHook creates and configures the OCI hook for the NVIDIA runtime
|
||||||
|
func (m *command) configureOCIHook(c *cli.Context, config *config) error {
|
||||||
|
err := ocihook.CreateHook(config.hookFilePath, config.nvidiaRuntime.hookPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error creating OCI hook: %v", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
50
cmd/nvidia-ctk/runtime/runtime.go
Normal file
50
cmd/nvidia-ctk/runtime/runtime.go
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package runtime
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/urfave/cli/v2"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/runtime/configure"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type runtimeCommand struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a runtime command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := runtimeCommand{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m runtimeCommand) build() *cli.Command {
|
||||||
|
// Create the 'runtime' command
|
||||||
|
runtime := cli.Command{
|
||||||
|
Name: "runtime",
|
||||||
|
Usage: "A collection of runtime-related utilities for the NVIDIA Container Toolkit",
|
||||||
|
}
|
||||||
|
|
||||||
|
runtime.Subcommands = []*cli.Command{
|
||||||
|
configure.NewCommand(m.logger),
|
||||||
|
}
|
||||||
|
|
||||||
|
return &runtime
|
||||||
|
}
|
||||||
176
cmd/nvidia-ctk/system/create-dev-char-symlinks/all.go
Normal file
176
cmd/nvidia-ctk/system/create-dev-char-symlinks/all.go
Normal file
@@ -0,0 +1,176 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package devchar
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/go-nvlib/pkg/nvpci"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/info/proc/devices"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/nvcaps"
|
||||||
|
)
|
||||||
|
|
||||||
|
type allPossible struct {
|
||||||
|
logger logger.Interface
|
||||||
|
devRoot string
|
||||||
|
deviceMajors devices.Devices
|
||||||
|
migCaps nvcaps.MigCaps
|
||||||
|
}
|
||||||
|
|
||||||
|
// newAllPossible returns a new allPossible device node lister.
|
||||||
|
// This lister lists all possible device nodes for NVIDIA GPUs, control devices, and capability devices.
|
||||||
|
func newAllPossible(logger logger.Interface, devRoot string) (nodeLister, error) {
|
||||||
|
deviceMajors, err := devices.GetNVIDIADevices()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed reading device majors: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
var requiredMajors []devices.Name
|
||||||
|
migCaps, err := nvcaps.NewMigCaps()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to read MIG caps: %v", err)
|
||||||
|
}
|
||||||
|
if migCaps == nil {
|
||||||
|
migCaps = make(nvcaps.MigCaps)
|
||||||
|
} else {
|
||||||
|
requiredMajors = append(requiredMajors, devices.NVIDIACaps)
|
||||||
|
}
|
||||||
|
|
||||||
|
requiredMajors = append(requiredMajors, devices.NVIDIAGPU, devices.NVIDIAUVM)
|
||||||
|
for _, name := range requiredMajors {
|
||||||
|
if !deviceMajors.Exists(name) {
|
||||||
|
return nil, fmt.Errorf("missing required device major %s", name)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
l := allPossible{
|
||||||
|
logger: logger,
|
||||||
|
devRoot: devRoot,
|
||||||
|
deviceMajors: deviceMajors,
|
||||||
|
migCaps: migCaps,
|
||||||
|
}
|
||||||
|
|
||||||
|
return l, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// DeviceNodes returns a list of all possible device nodes for NVIDIA GPUs, control devices, and capability devices.
|
||||||
|
func (m allPossible) DeviceNodes() ([]deviceNode, error) {
|
||||||
|
gpus, err := nvpci.New(
|
||||||
|
nvpci.WithPCIDevicesRoot(filepath.Join(m.devRoot, nvpci.PCIDevicesRoot)),
|
||||||
|
nvpci.WithLogger(m.logger),
|
||||||
|
).GetGPUs()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to get GPU information: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
count := len(gpus)
|
||||||
|
if count == 0 {
|
||||||
|
m.logger.Infof("No NVIDIA devices found in %s", m.devRoot)
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
deviceNodes, err := m.getControlDeviceNodes()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to get control device nodes: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
for gpu := 0; gpu < count; gpu++ {
|
||||||
|
deviceNodes = append(deviceNodes, m.getGPUDeviceNodes(gpu)...)
|
||||||
|
deviceNodes = append(deviceNodes, m.getNVCapDeviceNodes(gpu)...)
|
||||||
|
}
|
||||||
|
|
||||||
|
return deviceNodes, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// getControlDeviceNodes generates a list of control devices
|
||||||
|
func (m allPossible) getControlDeviceNodes() ([]deviceNode, error) {
|
||||||
|
var deviceNodes []deviceNode
|
||||||
|
|
||||||
|
// Define the control devices for standard GPUs.
|
||||||
|
controlDevices := []deviceNode{
|
||||||
|
m.newDeviceNode(devices.NVIDIAGPU, "/dev/nvidia-modeset", devices.NVIDIAModesetMinor),
|
||||||
|
m.newDeviceNode(devices.NVIDIAGPU, "/dev/nvidiactl", devices.NVIDIACTLMinor),
|
||||||
|
m.newDeviceNode(devices.NVIDIAUVM, "/dev/nvidia-uvm", devices.NVIDIAUVMMinor),
|
||||||
|
m.newDeviceNode(devices.NVIDIAUVM, "/dev/nvidia-uvm-tools", devices.NVIDIAUVMToolsMinor),
|
||||||
|
}
|
||||||
|
|
||||||
|
deviceNodes = append(deviceNodes, controlDevices...)
|
||||||
|
|
||||||
|
for _, migControlDevice := range []nvcaps.MigCap{"config", "monitor"} {
|
||||||
|
migControlMinor, exist := m.migCaps[migControlDevice]
|
||||||
|
if !exist {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
d := m.newDeviceNode(
|
||||||
|
devices.NVIDIACaps,
|
||||||
|
migControlMinor.DevicePath(),
|
||||||
|
int(migControlMinor),
|
||||||
|
)
|
||||||
|
|
||||||
|
deviceNodes = append(deviceNodes, d)
|
||||||
|
}
|
||||||
|
|
||||||
|
return deviceNodes, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// getGPUDeviceNodes generates a list of device nodes for a given GPU.
|
||||||
|
func (m allPossible) getGPUDeviceNodes(gpu int) []deviceNode {
|
||||||
|
d := m.newDeviceNode(
|
||||||
|
devices.NVIDIAGPU,
|
||||||
|
fmt.Sprintf("/dev/nvidia%d", gpu),
|
||||||
|
gpu,
|
||||||
|
)
|
||||||
|
|
||||||
|
return []deviceNode{d}
|
||||||
|
}
|
||||||
|
|
||||||
|
// getNVCapDeviceNodes generates a list of cap device nodes for a given GPU.
|
||||||
|
func (m allPossible) getNVCapDeviceNodes(gpu int) []deviceNode {
|
||||||
|
var selectedCapMinors []nvcaps.MigMinor
|
||||||
|
|
||||||
|
for _, capMinors := range m.migCaps.FilterForGPU(nvcaps.Index(gpu)) {
|
||||||
|
selectedCapMinors = append(selectedCapMinors, capMinors)
|
||||||
|
}
|
||||||
|
|
||||||
|
var deviceNodes []deviceNode
|
||||||
|
for _, capMinor := range selectedCapMinors {
|
||||||
|
d := m.newDeviceNode(
|
||||||
|
devices.NVIDIACaps,
|
||||||
|
capMinor.DevicePath(),
|
||||||
|
int(capMinor),
|
||||||
|
)
|
||||||
|
deviceNodes = append(deviceNodes, d)
|
||||||
|
}
|
||||||
|
|
||||||
|
return deviceNodes
|
||||||
|
}
|
||||||
|
|
||||||
|
// newDeviceNode creates a new device node with the specified path and major/minor numbers.
|
||||||
|
// The path is adjusted for the specified driver root.
|
||||||
|
func (m allPossible) newDeviceNode(deviceName devices.Name, path string, minor int) deviceNode {
|
||||||
|
major, _ := m.deviceMajors.Get(deviceName)
|
||||||
|
|
||||||
|
return deviceNode{
|
||||||
|
path: filepath.Join(m.devRoot, path),
|
||||||
|
major: uint32(major),
|
||||||
|
minor: uint32(minor),
|
||||||
|
}
|
||||||
|
}
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user