mirror of
https://github.com/NVIDIA/nvidia-container-toolkit
synced 2025-06-26 18:18:24 +00:00
Compare commits
1323 Commits
v1.13.1
...
pull-reque
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
55a8d1e1e5 | ||
|
|
1676931fe0 | ||
|
|
ced79e51ed | ||
|
|
d1e25abd6c | ||
|
|
7d3defccd2 | ||
|
|
c95d36db52 | ||
|
|
36950ba03f | ||
|
|
d1286bceed | ||
|
|
2f204147f9 | ||
|
|
39975fc77b | ||
|
|
4bf7421a80 | ||
|
|
f0ea60a28f | ||
|
|
4bab94baa6 | ||
|
|
f642825ad4 | ||
|
|
5bc2f50299 | ||
|
|
60706815a5 | ||
|
|
69b0f0ba61 | ||
|
|
7abf5fa6a4 | ||
|
|
0dddd5cfd8 | ||
|
|
28ddc1454c | ||
|
|
17c5d1dc87 | ||
|
|
6149592bf6 | ||
|
|
d3ece78bc9 | ||
|
|
980ca5d1bc | ||
|
|
76b71a5498 | ||
|
|
5a1b4e7c1e | ||
|
|
39fd15d273 | ||
|
|
da6b849cf6 | ||
|
|
849691d290 | ||
|
|
f672d38aa5 | ||
|
|
eb39b972a5 | ||
|
|
d9c7ec9714 | ||
|
|
614e469dac | ||
|
|
aafe4d7ad0 | ||
|
|
1f7c7ffec2 | ||
|
|
7e1beb7aa6 | ||
|
|
d560888f1f | ||
|
|
81fb7bb9c1 | ||
|
|
208896d87d | ||
|
|
82b62898bf | ||
|
|
d03a06029a | ||
|
|
f4f7da65f1 | ||
|
|
5fe7b06514 | ||
|
|
5606caa5af | ||
|
|
8149be09ac | ||
|
|
d935648722 | ||
|
|
1f43b71dd8 | ||
|
|
b33d475ff3 | ||
|
|
6359cc9919 | ||
|
|
4f9c860a37 | ||
|
|
bab9fdf607 | ||
|
|
cc7812470f | ||
|
|
bdcdcb7449 | ||
|
|
8be03cfc41 | ||
|
|
8650ca6533 | ||
|
|
1bc2a9fee3 | ||
|
|
dc87dcf786 | ||
|
|
f17d424248 | ||
|
|
426186c992 | ||
|
|
6849ebd621 | ||
|
|
4a6685d3a8 | ||
|
|
2ccf67c40f | ||
|
|
0134ba4250 | ||
|
|
eab9cdf1c2 | ||
|
|
dba15acdcc | ||
|
|
8339fb1ec3 | ||
|
|
b9d646c80d | ||
|
|
7380cff645 | ||
|
|
f91736d832 | ||
|
|
5ccac4da5a | ||
|
|
1aee45be2d | ||
|
|
0d4a7f1d5a | ||
|
|
27f5ec83de | ||
|
|
0a3146f74f | ||
|
|
28add0a532 | ||
|
|
b55255e31f | ||
|
|
dede03f322 | ||
|
|
ce3e2c1ed5 | ||
|
|
a537d0323d | ||
|
|
2de997e25b | ||
|
|
e046d6ae79 | ||
|
|
0c8723a93a | ||
|
|
fdcd250362 | ||
|
|
b66d37bedb | ||
|
|
0c905d0de2 | ||
|
|
0d0b56816e | ||
|
|
d59fd3da11 | ||
|
|
6cf0248321 | ||
|
|
b4787511d2 | ||
|
|
890db82b46 | ||
|
|
5915328be5 | ||
|
|
bb3a54f7f4 | ||
|
|
a909914cd6 | ||
|
|
f973271da1 | ||
|
|
535e023828 | ||
|
|
f2cf3e8deb | ||
|
|
03e8b9e0f5 | ||
|
|
450f73a046 | ||
|
|
479df7134a | ||
|
|
19a83e3542 | ||
|
|
d2344cba34 | ||
|
|
c8c22162b7 | ||
|
|
ea9b8721c0 | ||
|
|
eaaa8536e4 | ||
|
|
e955f65d8f | ||
|
|
b934c68bef | ||
|
|
7bd65da91e | ||
|
|
872aa2fe1c | ||
|
|
be6a36c023 | ||
|
|
aaaa3c6275 | ||
|
|
f93d96a0de | ||
|
|
2a4cf4c0a0 | ||
|
|
cf3b9317ef | ||
|
|
6ba25e7288 | ||
|
|
296633d148 | ||
|
|
ac8f190c99 | ||
|
|
3c1f1a6519 | ||
|
|
3ee5ff0aa2 | ||
|
|
6dfd63f4a8 | ||
|
|
35e583b623 | ||
|
|
7d71932d2a | ||
|
|
d3ea72c440 | ||
|
|
c0dda358a3 | ||
|
|
ec29b602c3 | ||
|
|
241881f12f | ||
|
|
eb40f240ac | ||
|
|
72b2ee9ce0 | ||
|
|
f4981f0876 | ||
|
|
2ec67033c0 | ||
|
|
f8eda79aaf | ||
|
|
51504097d8 | ||
|
|
a4dc28bb3f | ||
|
|
d0103aa6a3 | ||
|
|
adb5e6719d | ||
|
|
0c254711e7 | ||
|
|
27adebaa44 | ||
|
|
496cdb5463 | ||
|
|
132c9afb6c | ||
|
|
c879fb59c1 | ||
|
|
fbff2c4943 | ||
|
|
0c765c6536 | ||
|
|
0863749de3 | ||
|
|
a8ca8e91f2 | ||
|
|
cf395e765a | ||
|
|
f859c9a671 | ||
|
|
f50e815837 | ||
|
|
ffcef4f9a8 | ||
|
|
194a1663ab | ||
|
|
51d603aec6 | ||
|
|
3f9359eba2 | ||
|
|
574d204953 | ||
|
|
ca061bb4f0 | ||
|
|
f7a415f480 | ||
|
|
e6cd7a3b53 | ||
|
|
9f6b45817b | ||
|
|
de3d736663 | ||
|
|
e4e7c5d857 | ||
|
|
0620dfa6f9 | ||
|
|
6394e9e9e7 | ||
|
|
a2e2a44516 | ||
|
|
6605bfb5fa | ||
|
|
14806f019b | ||
|
|
2437630421 | ||
|
|
cdad158f0f | ||
|
|
baa4f907ab | ||
|
|
afc05f6713 | ||
|
|
abea8d375c | ||
|
|
af985c22ea | ||
|
|
b4edc3e730 | ||
|
|
c57bdf3391 | ||
|
|
4c241f22ef | ||
|
|
cd3fdd9f0f | ||
|
|
cb7605e132 | ||
|
|
a2caaec99d | ||
|
|
7dc93d6c9a | ||
|
|
aacfaed40b | ||
|
|
7833723be1 | ||
|
|
986f3db971 | ||
|
|
98deb7e4bc | ||
|
|
3fbb6a8dc6 | ||
|
|
50a7e2fd15 | ||
|
|
8ab6ab984e | ||
|
|
0fb3eec1bb | ||
|
|
3913a6392b | ||
|
|
80fb4dc0e9 | ||
|
|
be9d7b6db1 | ||
|
|
c1c6534b1f | ||
|
|
bee1969bbf | ||
|
|
47fc33ea9b | ||
|
|
c1cf52d1f7 | ||
|
|
1c845ea2d5 | ||
|
|
5549824559 | ||
|
|
35b471d833 | ||
|
|
e33f15a128 | ||
|
|
77bf9157ab | ||
|
|
995e56306d | ||
|
|
3f58c67fed | ||
|
|
e7a0067aae | ||
|
|
002197d5b1 | ||
|
|
a72050442e | ||
|
|
75a30af36a | ||
|
|
89b99ff786 | ||
|
|
025407543f | ||
|
|
41fd83ab2b | ||
|
|
dd55eeecc9 | ||
|
|
62497870fa | ||
|
|
eb932bef8a | ||
|
|
e4547bdda6 | ||
|
|
d32449b2d2 | ||
|
|
63ed478ce9 | ||
|
|
047225a9ae | ||
|
|
2a9bae8e80 | ||
|
|
57f077fce7 | ||
|
|
26101ea023 | ||
|
|
64dd017801 | ||
|
|
37ba7a2801 | ||
|
|
3df59b955a | ||
|
|
33280cd2b2 | ||
|
|
3306d5081e | ||
|
|
7c3ab75d08 | ||
|
|
71985df972 | ||
|
|
4255d73d89 | ||
|
|
9bdb74aec2 | ||
|
|
e436533a6f | ||
|
|
0f299c3431 | ||
|
|
f852043078 | ||
|
|
ef0b16bc24 | ||
|
|
225dfec83f | ||
|
|
03c48a6824 | ||
|
|
6530826293 | ||
|
|
971fd195b3 | ||
|
|
3b10afd0fe | ||
|
|
6b7ed26fba | ||
|
|
8d5f1e2427 | ||
|
|
d82a9ccd89 | ||
|
|
8ac213e3e6 | ||
|
|
0128762832 | ||
|
|
d7b150a2e6 | ||
|
|
57c917e3b1 | ||
|
|
ed8faa2d2e | ||
|
|
bc9ec77fdd | ||
|
|
82f2eb7b73 | ||
|
|
712d829018 | ||
|
|
598b9740fc | ||
|
|
968e2ccca4 | ||
|
|
aff9301f2e | ||
|
|
011fb72330 | ||
|
|
2adef9903e | ||
|
|
70b1f5af98 | ||
|
|
c9422f12b3 | ||
|
|
b7fbd56f7e | ||
|
|
bd87c009ba | ||
|
|
fc65d3a784 | ||
|
|
52b9631333 | ||
|
|
9429fbac5f | ||
|
|
04e9bf4ac1 | ||
|
|
3ceaf1f85c | ||
|
|
9f0c1042c4 | ||
|
|
352b55c8ce | ||
|
|
b13139793b | ||
|
|
05f44b7752 | ||
|
|
a109f28cb6 | ||
|
|
65b575fa96 | ||
|
|
6e413d8445 | ||
|
|
5d9b27f107 | ||
|
|
767aee913d | ||
|
|
25bac4c62a | ||
|
|
7e371aa024 | ||
|
|
bc2b937574 | ||
|
|
ae8561b509 | ||
|
|
64633903c7 | ||
|
|
1273f879cc | ||
|
|
8713a173fe | ||
|
|
e6d99934f8 | ||
|
|
0cf2d60406 | ||
|
|
0e759d4ad8 | ||
|
|
9e85fb54fc | ||
|
|
ce79d01cf5 | ||
|
|
5d27489d18 | ||
|
|
d80e8b9733 | ||
|
|
a72b9cd12c | ||
|
|
c2f4ac0959 | ||
|
|
5db5ddb31b | ||
|
|
ff1897f2e4 | ||
|
|
88f0157cae | ||
|
|
27f1738c3d | ||
|
|
f52df9522e | ||
|
|
edf79d6e8b | ||
|
|
6aadd6ed21 | ||
|
|
a1d60910b6 | ||
|
|
03f5a09aec | ||
|
|
1f2232fc5f | ||
|
|
b19f5d8f7d | ||
|
|
fa1379c6d5 | ||
|
|
4ded119c31 | ||
|
|
e0813e0c4d | ||
|
|
4add0a6bf2 | ||
|
|
fbcf8ef12e | ||
|
|
92472bd0ed | ||
|
|
ac236a80f8 | ||
|
|
b69d98d7cf | ||
|
|
adbe127afd | ||
|
|
82ccae23b1 | ||
|
|
44cf1f4e3b | ||
|
|
1d0777ee01 | ||
|
|
9f82e910f6 | ||
|
|
cb172ba336 | ||
|
|
bbdb13c47d | ||
|
|
03152dba8d | ||
|
|
cf026dce9a | ||
|
|
073fb138d7 | ||
|
|
948bc113f0 | ||
|
|
b457247a0c | ||
|
|
bae4b3ebd3 | ||
|
|
3a06066f6b | ||
|
|
c0292f5048 | ||
|
|
cd8937bc5b | ||
|
|
cec3445318 | ||
|
|
f830653738 | ||
|
|
6e9ff446c8 | ||
|
|
9a07de0ee8 | ||
|
|
517873e97d | ||
|
|
49b45693ee | ||
|
|
78d6cdc7f7 | ||
|
|
61640591ba | ||
|
|
df4c87b877 | ||
|
|
d6c312956b | ||
|
|
51f765dd71 | ||
|
|
d8cd5438e4 | ||
|
|
5ed25bb375 | ||
|
|
a7786d4d41 | ||
|
|
be1ac24f2a | ||
|
|
dd86f598b5 | ||
|
|
2b417c1a9a | ||
|
|
e89be14c86 | ||
|
|
f625242ed6 | ||
|
|
df73db7e1e | ||
|
|
89f33bdf71 | ||
|
|
6834d5e0a4 | ||
|
|
c91a1b1dc8 | ||
|
|
96d91df78e | ||
|
|
a990860bfa | ||
|
|
bf9d618ff2 | ||
|
|
7ae5c2901f | ||
|
|
6b236746ce | ||
|
|
ed3b52eb8d | ||
|
|
1176430278 | ||
|
|
c22f3bd56c | ||
|
|
6375e832ff | ||
|
|
991b9c222f | ||
|
|
fdad3927b4 | ||
|
|
6bd292eff8 | ||
|
|
9429ce039b | ||
|
|
d953bbb977 | ||
|
|
5cbf3f82d9 | ||
|
|
69375d7889 | ||
|
|
9753096398 | ||
|
|
76edd1d7ca | ||
|
|
a6476193c8 | ||
|
|
d75b1adeda | ||
|
|
9aa2f67a22 | ||
|
|
b89e7ca849 | ||
|
|
7c5ed8157b | ||
|
|
a401e4a5a6 | ||
|
|
2bc4201205 | ||
|
|
cb52e779ba | ||
|
|
8cc672bed9 | ||
|
|
be001d938c | ||
|
|
d584f9a40b | ||
|
|
11acbe7ca2 | ||
|
|
95bda3ad72 | ||
|
|
6e4b0632c5 | ||
|
|
e4be26ff55 | ||
|
|
8e6b57b38a | ||
|
|
c935779693 | ||
|
|
4b43a29957 | ||
|
|
b3b0d107de | ||
|
|
d22fca51b8 | ||
|
|
adad9b9c92 | ||
|
|
b6d360fbbe | ||
|
|
5699ec1cff | ||
|
|
ec182705f1 | ||
|
|
7598fe14bc | ||
|
|
4fc181a418 | ||
|
|
4bf5894833 | ||
|
|
272f891204 | ||
|
|
4b352e6bac | ||
|
|
178369eb8e | ||
|
|
3c012499db | ||
|
|
6e883bf10a | ||
|
|
cc61f186a8 | ||
|
|
aac0a62528 | ||
|
|
2529aebd6c | ||
|
|
784917a0d9 | ||
|
|
1330467652 | ||
|
|
22035d4561 | ||
|
|
9318aaf275 | ||
|
|
70261d84f1 | ||
|
|
f8f506fd85 | ||
|
|
b0a5fb9f86 | ||
|
|
83790dbccd | ||
|
|
7ceae92ac1 | ||
|
|
8dfa61338b | ||
|
|
484cae273c | ||
|
|
6e67bb247b | ||
|
|
8bd7dd7060 | ||
|
|
e25c052aa6 | ||
|
|
21ba9932d0 | ||
|
|
dcd65a6410 | ||
|
|
8603d605aa | ||
|
|
e1efa28fe6 | ||
|
|
75a934e11c | ||
|
|
43aca46f10 | ||
|
|
00f1d5a627 | ||
|
|
c0764366d9 | ||
|
|
1afada7de5 | ||
|
|
5c3ffc2fba | ||
|
|
e188090a92 | ||
|
|
1995925a7d | ||
|
|
46fc47c67a | ||
|
|
b142091234 | ||
|
|
e9b8ad95df | ||
|
|
f77a808105 | ||
|
|
832818084d | ||
|
|
ab0a4eaa19 | ||
|
|
0c687be794 | ||
|
|
8d869acce5 | ||
|
|
324096c979 | ||
|
|
5bc0315448 | ||
|
|
3fb1615d26 | ||
|
|
9e4696bf7d | ||
|
|
8c9d3d8f65 | ||
|
|
efb18a72ad | ||
|
|
75376d3df2 | ||
|
|
7e0cd45b1c | ||
|
|
a04e3ac4f7 | ||
|
|
92779e71b3 | ||
|
|
23f1ba3e93 | ||
|
|
d0d85a8c5c | ||
|
|
bfea673d6a | ||
|
|
6a6a3e6055 | ||
|
|
fa59d12973 | ||
|
|
d78868cd31 | ||
|
|
74b1e5ea8c | ||
|
|
88608781b6 | ||
|
|
fa5a4ac499 | ||
|
|
9f1bd62c42 | ||
|
|
9534249936 | ||
|
|
e1ea0056b9 | ||
|
|
c802c3089c | ||
|
|
771ac6b88a | ||
|
|
0f7aba9c3c | ||
|
|
3c07ea0b17 | ||
|
|
183dff9161 | ||
|
|
5e3e91a010 | ||
|
|
dc0e191093 | ||
|
|
8a6c1944a5 | ||
|
|
5d057dce66 | ||
|
|
5931136879 | ||
|
|
1145ce2283 | ||
|
|
38790c5df0 | ||
|
|
e5175c270e | ||
|
|
d18a2b6fc7 | ||
|
|
2987c4d670 | ||
|
|
2e6712d2bc | ||
|
|
92df542f2f | ||
|
|
1991b3ef2a | ||
|
|
cdf39fbad3 | ||
|
|
c30ca0fdc3 | ||
|
|
b077e2648d | ||
|
|
457d71c170 | ||
|
|
bc9180b59d | ||
|
|
ec8dfaf779 | ||
|
|
c129122da6 | ||
|
|
0abf800000 | ||
|
|
1d9d0acf7d | ||
|
|
17f14278a9 | ||
|
|
1fa5bbf351 | ||
|
|
f794d09df1 | ||
|
|
17a2377ad5 | ||
|
|
b90ee5d100 | ||
|
|
1ef3f4048f | ||
|
|
7fb31bd1dc | ||
|
|
e2fe591535 | ||
|
|
adf3708d0b | ||
|
|
a06d838b1c | ||
|
|
f477dc0df1 | ||
|
|
879bb9ffd5 | ||
|
|
4604e3b6c8 | ||
|
|
a9ca6995f7 | ||
|
|
7cd2aef0d8 | ||
|
|
19482dac6f | ||
|
|
78c4ca8a12 | ||
|
|
b12bdfc52a | ||
|
|
82ae2e615a | ||
|
|
4f440dedda | ||
|
|
3ee678f4f6 | ||
|
|
103375e504 | ||
|
|
5bedbc2b50 | ||
|
|
94337b7427 | ||
|
|
046a05921f | ||
|
|
6ca2700a17 | ||
|
|
0d626cfbb7 | ||
|
|
10bafd1d09 | ||
|
|
bf2bdfd35e | ||
|
|
f126877254 | ||
|
|
006aebf31e | ||
|
|
6c5f4eea63 | ||
|
|
b0b7c7c9ee | ||
|
|
b466270a24 | ||
|
|
d806f1045b | ||
|
|
35ee96ac41 | ||
|
|
f8141aab27 | ||
|
|
98ffe2aa67 | ||
|
|
79c59aeb7f | ||
|
|
906531fee3 | ||
|
|
0e68f60c0b | ||
|
|
563db0e0be | ||
|
|
7b770f63c3 | ||
|
|
dcbf5bc81f | ||
|
|
978d439cf8 | ||
|
|
aa946f3f59 | ||
|
|
a5a5833c14 | ||
|
|
8e07d90802 | ||
|
|
2aadbbf22d | ||
|
|
88f9414849 | ||
|
|
53c2dc6301 | ||
|
|
3121663537 | ||
|
|
4b6de8036d | ||
|
|
dc2ccdd2fa | ||
|
|
5145b0a4b6 | ||
|
|
a819cfdab4 | ||
|
|
629db79b4f | ||
|
|
8693dd6962 | ||
|
|
51cc619eab | ||
|
|
9b72161b63 | ||
|
|
d925b6596b | ||
|
|
c02b144ed4 | ||
|
|
16fdef50e6 | ||
|
|
b061446694 | ||
|
|
9c2476c98d | ||
|
|
70da6cfa50 | ||
|
|
a4bfccc3fe | ||
|
|
66f50d91bd | ||
|
|
ba1ed3232f | ||
|
|
c490baab63 | ||
|
|
32486cf1e9 | ||
|
|
b9c3185d72 | ||
|
|
e383b75a4d | ||
|
|
5827434cae | ||
|
|
6ad699c095 | ||
|
|
2450b002a8 | ||
|
|
03d1acc7b0 | ||
|
|
39120d5878 | ||
|
|
da5e3ce8c3 | ||
|
|
b47f954b7c | ||
|
|
f959c0daaa | ||
|
|
c3c0cdcc89 | ||
|
|
e3936fd623 | ||
|
|
f4987580d2 | ||
|
|
f3fceab317 | ||
|
|
ff2ba2bbc5 | ||
|
|
0c554cbf7e | ||
|
|
beb921fafe | ||
|
|
45030d1169 | ||
|
|
2f37055bc6 | ||
|
|
5316c2a618 | ||
|
|
89e4ae70c8 | ||
|
|
c68b4be12f | ||
|
|
89c12c1368 | ||
|
|
9d4294450d | ||
|
|
070b40d62a | ||
|
|
13862f3c75 | ||
|
|
05449807d1 | ||
|
|
b7948428ff | ||
|
|
d2750e86c3 | ||
|
|
0e4759cf36 | ||
|
|
d767e4cfe9 | ||
|
|
e454caf577 | ||
|
|
fa46c01331 | ||
|
|
122136fe92 | ||
|
|
fa16d83494 | ||
|
|
faabbd36d6 | ||
|
|
a470818ba7 | ||
|
|
404a2763cb | ||
|
|
87a63a6159 | ||
|
|
d8ccd50349 | ||
|
|
95694f082b | ||
|
|
c5c124b882 | ||
|
|
a67c3a1bb5 | ||
|
|
51911974fb | ||
|
|
73a6c4d521 | ||
|
|
eb7983af41 | ||
|
|
2273664328 | ||
|
|
49acaef503 | ||
|
|
fb6a767ada | ||
|
|
76f419e3ba | ||
|
|
df3a7729ce | ||
|
|
509993e138 | ||
|
|
fce56f905b | ||
|
|
832fcba5cd | ||
|
|
b646372998 | ||
|
|
d51cee6a9d | ||
|
|
2d9c45575c | ||
|
|
49ada6ce56 | ||
|
|
d8edb83673 | ||
|
|
969d6c3a4b | ||
|
|
ee4f1f4a24 | ||
|
|
1b1b03d46e | ||
|
|
cf417b0308 | ||
|
|
aedd3b8f04 | ||
|
|
d969c6f302 | ||
|
|
976fdae5d0 | ||
|
|
0eec445d7a | ||
|
|
448a3853ad | ||
|
|
9dd4e357b7 | ||
|
|
6358c13dab | ||
|
|
e4cdc48854 | ||
|
|
8e079c040a | ||
|
|
8b010313e5 | ||
|
|
bd7295702e | ||
|
|
135f682a87 | ||
|
|
077ad3eb25 | ||
|
|
e527cc1ff5 | ||
|
|
55ea268829 | ||
|
|
aae3da88c3 | ||
|
|
bb2be19a6c | ||
|
|
6fd2fc0c24 | ||
|
|
7c2e624492 | ||
|
|
c0a3864ab4 | ||
|
|
0c309df7e7 | ||
|
|
46838b1a44 | ||
|
|
be11cf428b | ||
|
|
b42a5d3e3a | ||
|
|
b8389283d5 | ||
|
|
6732f6d13b | ||
|
|
70ef0fb973 | ||
|
|
15c884e99f | ||
|
|
17d4d7da1f | ||
|
|
c96ac07bf7 | ||
|
|
a6a96a8d0e | ||
|
|
be61ba01d9 | ||
|
|
3aeba886d4 | ||
|
|
490c7dd599 | ||
|
|
8df5e33ef6 | ||
|
|
f55aac0232 | ||
|
|
2c8431c1f8 | ||
|
|
f35f3903ab | ||
|
|
bbc5363009 | ||
|
|
0b944ba274 | ||
|
|
ca528c4f53 | ||
|
|
692dac4cbd | ||
|
|
6b78c72fec | ||
|
|
a3223f32e0 | ||
|
|
f2eb4ea9ba | ||
|
|
4686f9499c | ||
|
|
3f481cd20a | ||
|
|
cd52be86e6 | ||
|
|
b5743da52f | ||
|
|
03ccd64f33 | ||
|
|
33369861fc | ||
|
|
d9a1106e00 | ||
|
|
f26425d3fd | ||
|
|
272585d261 | ||
|
|
fe5a44cb35 | ||
|
|
5f2be72335 | ||
|
|
ae074e7ba2 | ||
|
|
876d479308 | ||
|
|
abd638add9 | ||
|
|
1dd59101c7 | ||
|
|
55630bc2c0 | ||
|
|
4f0de9f1ef | ||
|
|
bced007f87 | ||
|
|
ac90b7963d | ||
|
|
2e947edbe4 | ||
|
|
9fde4b21df | ||
|
|
84e0060fe8 | ||
|
|
024dd3126d | ||
|
|
86b272cc7b | ||
|
|
2bc24970e0 | ||
|
|
00dc0daecc | ||
|
|
e3120cbe64 | ||
|
|
00d82dd540 | ||
|
|
8fe366683e | ||
|
|
7320fcd86d | ||
|
|
01f212b7a8 | ||
|
|
71e0b8590f | ||
|
|
e841c6256a | ||
|
|
c2411e644e | ||
|
|
dffce25637 | ||
|
|
f5a4b23041 | ||
|
|
dfc8e22e12 | ||
|
|
155fe66575 | ||
|
|
9208159263 | ||
|
|
9b83d09f18 | ||
|
|
c5eda7af8e | ||
|
|
572b0401a4 | ||
|
|
0d70052105 | ||
|
|
bead6f98f3 | ||
|
|
533d7119db | ||
|
|
e4b46a09a7 | ||
|
|
8fc4b9c742 | ||
|
|
ef57c07199 | ||
|
|
b407109bdf | ||
|
|
abb5abaea4 | ||
|
|
e55e6abc09 | ||
|
|
17c044eef8 | ||
|
|
edda11d647 | ||
|
|
52d0383b47 | ||
|
|
3defc6babb | ||
|
|
7b988f15ab | ||
|
|
179d8655f9 | ||
|
|
2d7b2360d2 | ||
|
|
a61dc148b2 | ||
|
|
3f6b916a85 | ||
|
|
cf388e7e63 | ||
|
|
b435b797af | ||
|
|
c86c3aeeaf | ||
|
|
f13f1bdba4 | ||
|
|
55440f40b3 | ||
|
|
cc34996684 | ||
|
|
5a3eda4cba | ||
|
|
973a6633b3 | ||
|
|
f4d0cfb687 | ||
|
|
35b23c5a2c | ||
|
|
0dc87e5d69 | ||
|
|
edc50f6e49 | ||
|
|
7de7444b0f | ||
|
|
8d3ffcd122 | ||
|
|
d72481cbd7 | ||
|
|
a442a5ed1f | ||
|
|
7de58b4af4 | ||
|
|
fde099d25b | ||
|
|
0a3eb67df8 | ||
|
|
78f250a6b0 | ||
|
|
0aed9a16ad | ||
|
|
f46b99c2f7 | ||
|
|
d5f6e6f868 | ||
|
|
082ce066ed | ||
|
|
bbaf543537 | ||
|
|
50dd460eaa | ||
|
|
b3af77166b | ||
|
|
d8cb812c8e | ||
|
|
80386a7fb2 | ||
|
|
c0a5bbe7db | ||
|
|
ddeeca392c | ||
|
|
9944feee45 | ||
|
|
762b14b6cd | ||
|
|
e76e10fb36 | ||
|
|
fcdf565586 | ||
|
|
7a9bc14d98 | ||
|
|
5788e622f4 | ||
|
|
29c0f82ed2 | ||
|
|
e1417bee64 | ||
|
|
5f9e49705c | ||
|
|
1d2b61ee11 | ||
|
|
271987d448 | ||
|
|
6cac2f5848 | ||
|
|
ef4eb0d3c6 | ||
|
|
04ab0595fa | ||
|
|
9d3418d603 | ||
|
|
57acd85fb1 | ||
|
|
6d69ca81de | ||
|
|
be73581489 | ||
|
|
5682ce3149 | ||
|
|
cb2b000ddc | ||
|
|
cbc6ff73a4 | ||
|
|
4cd86caf67 | ||
|
|
885313af3b | ||
|
|
26e52b8013 | ||
|
|
011c658945 | ||
|
|
413da20838 | ||
|
|
09341a0934 | ||
|
|
2a9e3537ec | ||
|
|
c374520b64 | ||
|
|
e982b9798c | ||
|
|
7eb031919c | ||
|
|
97950d6b8d | ||
|
|
1613f35bf5 | ||
|
|
a78a7f866f | ||
|
|
643b89e539 | ||
|
|
bdfa525a75 | ||
|
|
93763d25f0 | ||
|
|
5800e55027 | ||
|
|
c572c3b787 | ||
|
|
3f7ed7c8db | ||
|
|
cc6cbd4a89 | ||
|
|
98ad835a77 | ||
|
|
3a1ac85020 | ||
|
|
1ddc859700 | ||
|
|
f1f629674e | ||
|
|
5a6bf02914 | ||
|
|
197cbbe0c6 | ||
|
|
b9abb44613 | ||
|
|
c4ec4a01f8 | ||
|
|
f40f4369a1 | ||
|
|
2733661125 | ||
|
|
4806f6e70d | ||
|
|
db21f5f9a8 | ||
|
|
07443a0e86 | ||
|
|
675db67ebb | ||
|
|
14ecacf6d1 | ||
|
|
9451da1e6d | ||
|
|
e30ddb398f | ||
|
|
375188495e | ||
|
|
5ff48a5a89 | ||
|
|
44ae31d101 | ||
|
|
942e5c7224 | ||
|
|
88ad42ccd1 | ||
|
|
df9732dae4 | ||
|
|
e66cc6a7b1 | ||
|
|
8f5a9a1918 | ||
|
|
6b9dee5b77 | ||
|
|
50bbf32cf0 | ||
|
|
413c1264ce | ||
|
|
c084756e48 | ||
|
|
6265a2d89e | ||
|
|
72778ee536 | ||
|
|
2f11a190bf | ||
|
|
2d394f4624 | ||
|
|
ea55757bc3 | ||
|
|
2a620dc845 | ||
|
|
bad5369760 | ||
|
|
2623e8a707 | ||
|
|
05dd438489 | ||
|
|
6780afbed1 | ||
|
|
f80f4c485d | ||
|
|
ac63063362 | ||
|
|
761a425e0d | ||
|
|
296d4560b0 | ||
|
|
0409824106 | ||
|
|
562addc3c6 | ||
|
|
ae82b2d9b6 | ||
|
|
355997d2d6 | ||
|
|
b6efd3091d | ||
|
|
52da12cf9a | ||
|
|
cd7d586afa | ||
|
|
cc4c2783a3 | ||
|
|
a8d48808d7 | ||
|
|
aa724f1ac6 | ||
|
|
519b9f3cc8 | ||
|
|
6e1bc0d7fb | ||
|
|
a2a1a78620 | ||
|
|
ab7693ac9f | ||
|
|
f4df5308d0 | ||
|
|
8dcc57c614 | ||
|
|
6594f06e9a | ||
|
|
8a706a97a0 | ||
|
|
39f0bf21ce | ||
|
|
0915a12e38 | ||
|
|
e6cd897cc4 | ||
|
|
35600910e0 | ||
|
|
f89cef307d | ||
|
|
e96edb3f36 | ||
|
|
bab4ec30af | ||
|
|
b6ab444529 | ||
|
|
15d905def0 | ||
|
|
e64b723b71 | ||
|
|
f0545dd979 | ||
|
|
f414ac2865 | ||
|
|
772cf77dcc | ||
|
|
026055a0b7 | ||
|
|
812e6a2402 | ||
|
|
b56aebb26f | ||
|
|
870903e03e | ||
|
|
b233a8b6ba | ||
|
|
e96e1baed5 | ||
|
|
dce368e308 | ||
|
|
15f609a52d | ||
|
|
0bf08085ce | ||
|
|
da68ad393c | ||
|
|
2f3600af9a | ||
|
|
0ff28aa21b | ||
|
|
b88ff4470c | ||
|
|
cfb1daee0a | ||
|
|
e3ab55beed | ||
|
|
9530d9949f | ||
|
|
6b2cd487a6 | ||
|
|
e5ec408a5c | ||
|
|
301b666790 | ||
|
|
e99b519509 | ||
|
|
d123273800 | ||
|
|
07136d9ac4 | ||
|
|
0ef06be477 | ||
|
|
5a70e75547 | ||
|
|
46b4cd7b03 | ||
|
|
93e15bc641 | ||
|
|
07d1f48778 | ||
|
|
21ed60bc46 | ||
|
|
7abbd98ff0 | ||
|
|
862f071557 | ||
|
|
73cd63e4e5 | ||
|
|
6857f538a6 | ||
|
|
195e3a22b4 | ||
|
|
88debb8e34 | ||
|
|
03cbf9c6cd | ||
|
|
55097b3d7d | ||
|
|
738ebd83d3 | ||
|
|
9c6dd94ac8 | ||
|
|
f936f4c0bc | ||
|
|
ab598f004d | ||
|
|
9c1f0bb08b | ||
|
|
b3519fadc4 | ||
|
|
d80657dd0a | ||
|
|
838493b8b9 | ||
|
|
26a4eb327c | ||
|
|
f6c252cbde | ||
|
|
11692a8499 | ||
|
|
ba3d80e8ea | ||
|
|
9c029cac72 | ||
|
|
dd065fa69e | ||
|
|
6f3d9307bb | ||
|
|
72584cd863 | ||
|
|
2a7bfcd36b | ||
|
|
21fc1f24e4 | ||
|
|
9396858834 | ||
|
|
79acd7acff | ||
|
|
fab711ddf3 | ||
|
|
760cf93317 | ||
|
|
f4838dde9b | ||
|
|
c90211e070 | ||
|
|
a2262d00cc | ||
|
|
95b8ebc297 | ||
|
|
99b3050d20 | ||
|
|
883f7ec3d8 | ||
|
|
9dd324be9c | ||
|
|
508438a0c5 | ||
|
|
9baed635d1 | ||
|
|
895a5ed73a | ||
|
|
2d7b126bc9 | ||
|
|
86d86395ea | ||
|
|
32c3bd1ded | ||
|
|
3158146946 | ||
|
|
def7d09f85 | ||
|
|
b9ac54b922 | ||
|
|
ae1b7e126c | ||
|
|
08ef3e7969 | ||
|
|
ea977fb43e | ||
|
|
7b47eee634 | ||
|
|
d7a3d93024 | ||
|
|
527248ef5b | ||
|
|
83ad09b179 | ||
|
|
ffe7ed313a | ||
|
|
7627d48a5c | ||
|
|
5c78e2b7e6 | ||
|
|
bc4e19aa48 | ||
|
|
879cc99aac | ||
|
|
aa72dcde97 | ||
|
|
a545810981 | ||
|
|
cff50aa5d6 | ||
|
|
84d857b497 | ||
|
|
7840e7d650 | ||
|
|
c014f72ffb | ||
|
|
893b3c1824 | ||
|
|
097e203f1f | ||
|
|
671d787a42 | ||
|
|
fcc9922133 | ||
|
|
64fb26b086 | ||
|
|
16a4de1a2b | ||
|
|
efae501834 | ||
|
|
3045954cd9 | ||
|
|
886c6b973e | ||
|
|
1ab3ef0af4 | ||
|
|
dd9b13cb58 | ||
|
|
8a7a6e8a70 | ||
|
|
1909b1fe60 | ||
|
|
881e440d22 | ||
|
|
7d79b311d8 | ||
|
|
b46bc10c44 | ||
|
|
bbd9222206 | ||
|
|
f20ab793a2 | ||
|
|
e5391760e6 | ||
|
|
5505886655 | ||
|
|
64f554ef41 | ||
|
|
fc8c5f82dc | ||
|
|
d792e64f38 | ||
|
|
232df647c1 | ||
|
|
adc516fd59 | ||
|
|
039d7fd324 | ||
|
|
2768023ff5 | ||
|
|
255181a5ff | ||
|
|
dc36ea76e8 | ||
|
|
e315d7d74b | ||
|
|
b4c6832828 | ||
|
|
3a96a00362 | ||
|
|
00a712d018 | ||
|
|
d4e21fdd10 | ||
|
|
9085cb7dd5 | ||
|
|
f6e3593a72 | ||
|
|
f2ef7ee661 | ||
|
|
27777f4dab | ||
|
|
34175f15d3 | ||
|
|
eb35d9b30a | ||
|
|
f1d32f2cd3 | ||
|
|
ee713adf33 | ||
|
|
33cb1b68df | ||
|
|
6dc9ee3f33 | ||
|
|
e609e41a64 | ||
|
|
80ecd024ee | ||
|
|
e8dbb216a5 | ||
|
|
f5d8d248b7 | ||
|
|
5d7ee25b37 | ||
|
|
2ff2d84283 | ||
|
|
c63fb35ba8 | ||
|
|
da0755769f | ||
|
|
04b28d116c | ||
|
|
65b0b2b5e0 | ||
|
|
8d52cc18ce | ||
|
|
c25376afa0 | ||
|
|
7cc0c1f1cf | ||
|
|
e56bb09889 | ||
|
|
c7a7083e64 | ||
|
|
61595aa0fa | ||
|
|
b8b134f389 | ||
|
|
c5a9ed6594 | ||
|
|
833254fa59 | ||
|
|
1b1aae9c4a | ||
|
|
acc50969dc | ||
|
|
48d68e4eff | ||
|
|
709e27bf4b | ||
|
|
1b16b341dd | ||
|
|
2e1f94aedf | ||
|
|
2f48ab99c3 | ||
|
|
f8870b31be | ||
|
|
73857eb8e3 | ||
|
|
dd2f218226 | ||
|
|
8a9f367067 | ||
|
|
e0df157f70 | ||
|
|
f2c9937ca8 | ||
|
|
12dc12ce09 | ||
|
|
2fad708556 | ||
|
|
73749285d5 | ||
|
|
49dbae5c32 | ||
|
|
d8d56e18f9 | ||
|
|
7f610d19ed | ||
|
|
3eca7dfd7b | ||
|
|
b02d5538b0 | ||
|
|
ebff62f56b | ||
|
|
53b24618a5 | ||
|
|
867151fe25 | ||
|
|
82fc309c4e | ||
|
|
27521c0b5e | ||
|
|
e611d4403b | ||
|
|
807c87e057 | ||
|
|
f63ad3d9e7 | ||
|
|
c4b4478d1a | ||
|
|
963250a58f | ||
|
|
be570fce65 | ||
|
|
6094effd58 | ||
|
|
7187608a36 | ||
|
|
a54d9d2118 | ||
|
|
56dd69ff1c | ||
|
|
89240cecae | ||
|
|
4ec9bd751e | ||
|
|
d74f7fef4e | ||
|
|
538d4020df | ||
|
|
f2bd3173d4 | ||
|
|
2bf8017516 | ||
|
|
2a3afdd5d9 | ||
|
|
1dc028cdf2 | ||
|
|
72c56567fe | ||
|
|
ca1055588d | ||
|
|
fca30d7acc | ||
|
|
5bf2209fdb | ||
|
|
f86a5abeb6 | ||
|
|
9ac313f551 | ||
|
|
546f810159 | ||
|
|
7affdafcd3 | ||
|
|
7221b6b24b | ||
|
|
f904ec41eb | ||
|
|
e7ae0f183c | ||
|
|
86df7c6696 | ||
|
|
99923b57b8 | ||
|
|
4addb292b1 | ||
|
|
149a8d7bd8 | ||
|
|
a69657dde7 | ||
|
|
c2d4de54b0 | ||
|
|
5216e89a70 | ||
|
|
96766aa719 | ||
|
|
3670e7b89e | ||
|
|
b18ac09f77 | ||
|
|
4dcaa61167 | ||
|
|
8bf52e1dec | ||
|
|
e4722e9642 | ||
|
|
65f6f46846 | ||
|
|
f6a4986c15 | ||
|
|
6d3b29f3ca | ||
|
|
30c0848487 | ||
|
|
ee1b0c3e4f | ||
|
|
37ac294a11 | ||
|
|
0d862efa9c | ||
|
|
22d7b52a58 | ||
|
|
9f1c9b2a31 | ||
|
|
0483eebc7b | ||
|
|
54aacb4245 | ||
|
|
5cb367e771 | ||
|
|
feb069a2e9 | ||
|
|
cbdbcd87ff | ||
|
|
7a4d2cff67 | ||
|
|
5638f47cb0 | ||
|
|
4c513d536b | ||
|
|
8553fce68a | ||
|
|
03a4e2f8a9 | ||
|
|
918bd03488 | ||
|
|
01a7f7bb8e | ||
|
|
6b48cbd1dc | ||
|
|
64a0a67eb4 | ||
|
|
93d9e18f04 | ||
|
|
7c2c42b8da | ||
|
|
e4fee325cb | ||
|
|
ec63533eb1 | ||
|
|
e51621aa7f | ||
|
|
80a78e60d1 | ||
|
|
9f46c34587 | ||
|
|
f07a0585fc | ||
|
|
32ec10485e | ||
|
|
ce7d5f7a51 | ||
|
|
9b64d74f6a | ||
|
|
99cc0aebd6 | ||
|
|
cca343abb0 | ||
|
|
f08e48e700 | ||
|
|
e2f8d2a15f | ||
|
|
2c5761d32e | ||
|
|
3c9d95c62f | ||
|
|
481000b4ce | ||
|
|
b2126722e5 | ||
|
|
083b789102 | ||
|
|
a564b38b7e | ||
|
|
5427249cfc | ||
|
|
032982ab9c | ||
|
|
96aeb9bf64 | ||
|
|
c98f6ea395 | ||
|
|
073f9cf120 | ||
|
|
1fdd0c1248 | ||
|
|
a883c65dd6 | ||
|
|
aac39f89cc | ||
|
|
e25576d26d | ||
|
|
3626a13273 | ||
|
|
6750ce1667 | ||
|
|
1081cecea9 | ||
|
|
7451e6eb75 | ||
|
|
81908c8cc9 | ||
|
|
d3d41a3e1d | ||
|
|
0a37f8798a | ||
|
|
4f89b60ab9 | ||
|
|
0938576618 | ||
|
|
4ca8d4173a | ||
|
|
978549dc58 | ||
|
|
d5cbe48d59 | ||
|
|
e8ec795883 | ||
|
|
62bc6b211f | ||
|
|
6fac6c237b | ||
|
|
20ff4e2fb9 | ||
|
|
f78d3a858f | ||
|
|
bc6ca7ff88 | ||
|
|
65ae6f1dab | ||
|
|
ba24338122 | ||
|
|
2299c9588d | ||
|
|
ba80d0318f | ||
|
|
6342dae0e9 | ||
|
|
baf94181aa | ||
|
|
bbe9742c46 | ||
|
|
1447ef3818 | ||
|
|
5598dbf9d7 | ||
|
|
8967e851c4 | ||
|
|
15378f6ced | ||
|
|
4d2e8d1913 | ||
|
|
4feaee0fe6 | ||
|
|
51984d49cf | ||
|
|
a6a8bb940c | ||
|
|
6265e34afb | ||
|
|
d08a2394b3 | ||
|
|
c0f1263d78 | ||
|
|
a25b1c1048 | ||
|
|
99859e461d | ||
|
|
d52dbeaa7a | ||
|
|
c11c7695cb | ||
|
|
c4d3b13ae2 | ||
|
|
bcf3a70174 | ||
|
|
743d290577 | ||
|
|
82347eb9bc | ||
|
|
84c7bf8b18 | ||
|
|
d92300506c | ||
|
|
2da32970b9 | ||
|
|
1d0a733487 | ||
|
|
9464953924 | ||
|
|
c9b05d8fed | ||
|
|
a02bc27c3e | ||
|
|
6a04e97bca | ||
|
|
0780621024 | ||
|
|
2bc0f45a52 | ||
|
|
178eb5c5a8 | ||
|
|
761fc29567 | ||
|
|
9f5c82420a | ||
|
|
23041be511 | ||
|
|
dcbf4b4f2a | ||
|
|
652345bc4d | ||
|
|
69a1a9ef7a | ||
|
|
2464181d2b | ||
|
|
c3c1d19a5c | ||
|
|
75f288a6e4 | ||
|
|
94259baea1 | ||
|
|
9e8ff003b6 | ||
|
|
3dee9d9a4c | ||
|
|
3f03a71afd | ||
|
|
093e93cfbf | ||
|
|
78f619b1e7 | ||
|
|
43c44a0f48 | ||
|
|
6b1e8171c8 | ||
|
|
2e50b3da7c | ||
|
|
eca13e72bf | ||
|
|
b64ba6ac2d | ||
|
|
7b801a0ce0 | ||
|
|
528cbbb636 | ||
|
|
fd48233c13 | ||
|
|
b72764af5a | ||
|
|
7e7c45fb0f | ||
|
|
61f515b3dd | ||
|
|
e05686cbe8 | ||
|
|
1fc8ae32bd | ||
|
|
e80d43f4c4 | ||
|
|
a6b0f45d2c | ||
|
|
39263ea365 | ||
|
|
9ea214d0b3 | ||
|
|
5371ff039b | ||
|
|
315f4adb8f | ||
|
|
05632c0a40 | ||
|
|
8df4a98d7b | ||
|
|
02656b624d | ||
|
|
61af2aee8e | ||
|
|
ddebd69128 | ||
|
|
ac11727ec5 | ||
|
|
5748d220ba | ||
|
|
3b86683843 | ||
|
|
3bd5baa3c5 | ||
|
|
330aa16687 | ||
|
|
8a4d6b5bcf | ||
|
|
40d0a88cf9 | ||
|
|
dc6a895db8 | ||
|
|
3b1b89e6c0 | ||
|
|
013a1b413b | ||
|
|
3be16d8077 | ||
|
|
927ec78b6e | ||
|
|
8ca606f7ac | ||
|
|
e7d2a9c212 | ||
|
|
fcb4e379e3 | ||
|
|
cda96f2f9e | ||
|
|
e11f65e51e | ||
|
|
3ea02d13fc | ||
|
|
e30fd0f4ad | ||
|
|
418e4014e6 | ||
|
|
e78a4f5eac | ||
|
|
540dbcbc03 | ||
|
|
a8265f8846 | ||
|
|
c120c511d5 | ||
|
|
424b8c9d46 | ||
|
|
5bc72b70b8 | ||
|
|
fe37196788 | ||
|
|
ba44c50f4e | ||
|
|
729ca941be | ||
|
|
0ee947dba6 | ||
|
|
d1fd0a7384 | ||
|
|
ae2c582138 | ||
|
|
b7e5cef934 | ||
|
|
9378d0cd0f | ||
|
|
f9df36c473 | ||
|
|
8bb0235c92 | ||
|
|
fc310e429e | ||
|
|
8d0ffb2fa5 | ||
|
|
9f07cc9ab2 | ||
|
|
1fff80e10d | ||
|
|
0a57cdc6e8 | ||
|
|
1a86b20f7c | ||
|
|
0068750a5c | ||
|
|
ee47f26d1c | ||
|
|
3945abb2f2 | ||
|
|
9de4f7f4b9 | ||
|
|
3610b5073b | ||
|
|
1991138185 | ||
|
|
8ebc21cd1f | ||
|
|
1c1ce2c6f7 | ||
|
|
39b0830a66 | ||
|
|
6b367445a3 | ||
|
|
37c66fc33c | ||
|
|
1bd5798a99 | ||
|
|
90c4c4811a | ||
|
|
49de170652 | ||
|
|
07c89fa975 | ||
|
|
7a1f23e2e4 | ||
|
|
25165b0771 | ||
|
|
3e7acec0b4 | ||
|
|
4165961d31 | ||
|
|
2e3a12438a | ||
|
|
731c99b52c | ||
|
|
470b4eebd8 | ||
|
|
6750df8e01 | ||
|
|
8736d1e78f | ||
|
|
140b1e33ef | ||
|
|
3056428eda | ||
|
|
367a30827f | ||
|
|
fe8ef9e0bd | ||
|
|
d77f46aa09 | ||
|
|
043e283db3 | ||
|
|
2019f1e7ea | ||
|
|
22c7178561 | ||
|
|
525aeb102f | ||
|
|
9fb5ac36ed | ||
|
|
c30764b7cc | ||
|
|
8a2de90c28 | ||
|
|
243c439bb8 | ||
|
|
060ac46bd8 | ||
|
|
ae2a683929 | ||
|
|
2b5eeb8d24 | ||
|
|
bbb94be213 | ||
|
|
e1c75aec6c | ||
|
|
3030d281d9 | ||
|
|
81d8b94cdc | ||
|
|
276e1960b1 | ||
|
|
70920d7a04 | ||
|
|
f1e201d368 | ||
|
|
ef863f5fd4 | ||
|
|
ce65df7d17 | ||
|
|
fa9c6116a4 |
234
.common-ci.yml
234
.common-ci.yml
@@ -19,21 +19,13 @@ default:
|
|||||||
|
|
||||||
variables:
|
variables:
|
||||||
GIT_SUBMODULE_STRATEGY: recursive
|
GIT_SUBMODULE_STRATEGY: recursive
|
||||||
BUILDIMAGE: "${CI_REGISTRY_IMAGE}/build:${CI_COMMIT_SHORT_SHA}"
|
|
||||||
BUILD_MULTI_ARCH_IMAGES: "true"
|
BUILD_MULTI_ARCH_IMAGES: "true"
|
||||||
|
|
||||||
stages:
|
stages:
|
||||||
- trigger
|
- pull
|
||||||
- image
|
|
||||||
- lint
|
|
||||||
- go-checks
|
|
||||||
- go-build
|
|
||||||
- unit-tests
|
|
||||||
- package-build
|
|
||||||
- image-build
|
|
||||||
- test
|
|
||||||
- scan
|
- scan
|
||||||
- release
|
- release
|
||||||
|
- sign
|
||||||
|
|
||||||
.pipeline-trigger-rules:
|
.pipeline-trigger-rules:
|
||||||
rules:
|
rules:
|
||||||
@@ -53,139 +45,6 @@ workflow:
|
|||||||
# We then add all the regular triggers
|
# We then add all the regular triggers
|
||||||
- !reference [.pipeline-trigger-rules, rules]
|
- !reference [.pipeline-trigger-rules, rules]
|
||||||
|
|
||||||
# The main or manual job is used to filter out distributions or architectures that are not required on
|
|
||||||
# every build.
|
|
||||||
.main-or-manual:
|
|
||||||
rules:
|
|
||||||
- !reference [.pipeline-trigger-rules, rules]
|
|
||||||
- if: $CI_PIPELINE_SOURCE == "schedule"
|
|
||||||
when: manual
|
|
||||||
|
|
||||||
# The trigger-pipeline job adds a manualy triggered job to the pipeline on merge requests.
|
|
||||||
trigger-pipeline:
|
|
||||||
stage: trigger
|
|
||||||
script:
|
|
||||||
- echo "starting pipeline"
|
|
||||||
rules:
|
|
||||||
- !reference [.main-or-manual, rules]
|
|
||||||
- if: $CI_PIPELINE_SOURCE == "merge_request_event"
|
|
||||||
when: manual
|
|
||||||
allow_failure: false
|
|
||||||
- when: always
|
|
||||||
|
|
||||||
# Define the distribution targets
|
|
||||||
.dist-amazonlinux2:
|
|
||||||
rules:
|
|
||||||
- !reference [.main-or-manual, rules]
|
|
||||||
variables:
|
|
||||||
DIST: amazonlinux2
|
|
||||||
PACKAGE_REPO_TYPE: rpm
|
|
||||||
|
|
||||||
.dist-centos7:
|
|
||||||
rules:
|
|
||||||
- !reference [.main-or-manual, rules]
|
|
||||||
variables:
|
|
||||||
DIST: centos7
|
|
||||||
CVE_UPDATES: "cyrus-sasl-lib"
|
|
||||||
PACKAGE_REPO_TYPE: rpm
|
|
||||||
|
|
||||||
.dist-centos8:
|
|
||||||
variables:
|
|
||||||
DIST: centos8
|
|
||||||
CVE_UPDATES: "cyrus-sasl-lib"
|
|
||||||
PACKAGE_REPO_TYPE: rpm
|
|
||||||
|
|
||||||
.dist-debian10:
|
|
||||||
rules:
|
|
||||||
- !reference [.main-or-manual, rules]
|
|
||||||
variables:
|
|
||||||
DIST: debian10
|
|
||||||
PACKAGE_REPO_TYPE: debian
|
|
||||||
|
|
||||||
.dist-opensuse-leap15.1:
|
|
||||||
rules:
|
|
||||||
- !reference [.main-or-manual, rules]
|
|
||||||
variables:
|
|
||||||
DIST: opensuse-leap15.1
|
|
||||||
PACKAGE_REPO_TYPE: rpm
|
|
||||||
|
|
||||||
.dist-ubi8:
|
|
||||||
rules:
|
|
||||||
- !reference [.main-or-manual, rules]
|
|
||||||
variables:
|
|
||||||
DIST: ubi8
|
|
||||||
CVE_UPDATES: "cyrus-sasl-lib"
|
|
||||||
PACKAGE_REPO_TYPE: rpm
|
|
||||||
|
|
||||||
.dist-ubuntu18.04:
|
|
||||||
variables:
|
|
||||||
DIST: ubuntu18.04
|
|
||||||
CVE_UPDATES: "libsasl2-2 libsasl2-modules-db"
|
|
||||||
PACKAGE_REPO_TYPE: debian
|
|
||||||
|
|
||||||
.dist-ubuntu20.04:
|
|
||||||
variables:
|
|
||||||
DIST: ubuntu20.04
|
|
||||||
CVE_UPDATES: "libsasl2-2 libsasl2-modules-db"
|
|
||||||
PACKAGE_REPO_TYPE: debian
|
|
||||||
|
|
||||||
.dist-packaging:
|
|
||||||
variables:
|
|
||||||
DIST: packaging
|
|
||||||
|
|
||||||
# Define architecture targets
|
|
||||||
.arch-aarch64:
|
|
||||||
variables:
|
|
||||||
ARCH: aarch64
|
|
||||||
|
|
||||||
.arch-amd64:
|
|
||||||
variables:
|
|
||||||
ARCH: amd64
|
|
||||||
|
|
||||||
.arch-arm64:
|
|
||||||
variables:
|
|
||||||
ARCH: arm64
|
|
||||||
|
|
||||||
.arch-ppc64le:
|
|
||||||
rules:
|
|
||||||
- !reference [.main-or-manual, rules]
|
|
||||||
variables:
|
|
||||||
ARCH: ppc64le
|
|
||||||
|
|
||||||
.arch-x86_64:
|
|
||||||
variables:
|
|
||||||
ARCH: x86_64
|
|
||||||
|
|
||||||
# Define the platform targets
|
|
||||||
.platform-amd64:
|
|
||||||
variables:
|
|
||||||
PLATFORM: linux/amd64
|
|
||||||
|
|
||||||
.platform-arm64:
|
|
||||||
variables:
|
|
||||||
PLATFORM: linux/arm64
|
|
||||||
|
|
||||||
# Define test helpers
|
|
||||||
.integration:
|
|
||||||
stage: test
|
|
||||||
variables:
|
|
||||||
IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
|
||||||
VERSION: "${CI_COMMIT_SHORT_SHA}"
|
|
||||||
before_script:
|
|
||||||
- apk add --no-cache make bash jq
|
|
||||||
- docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
|
||||||
- docker pull "${IMAGE_NAME}:${VERSION}-${DIST}"
|
|
||||||
script:
|
|
||||||
- make -f build/container/Makefile test-${DIST}
|
|
||||||
|
|
||||||
# Define the test targets
|
|
||||||
test-packaging:
|
|
||||||
extends:
|
|
||||||
- .integration
|
|
||||||
- .dist-packaging
|
|
||||||
needs:
|
|
||||||
- image-packaging
|
|
||||||
|
|
||||||
# Download the regctl binary for use in the release steps
|
# Download the regctl binary for use in the release steps
|
||||||
.regctl-setup:
|
.regctl-setup:
|
||||||
before_script:
|
before_script:
|
||||||
@@ -195,92 +54,3 @@ test-packaging:
|
|||||||
- curl -sSLo bin/regctl https://github.com/regclient/regclient/releases/download/${REGCTL_VERSION}/regctl-linux-amd64
|
- curl -sSLo bin/regctl https://github.com/regclient/regclient/releases/download/${REGCTL_VERSION}/regctl-linux-amd64
|
||||||
- chmod a+x bin/regctl
|
- chmod a+x bin/regctl
|
||||||
- export PATH=$(pwd)/bin:${PATH}
|
- export PATH=$(pwd)/bin:${PATH}
|
||||||
|
|
||||||
# .release forms the base of the deployment jobs which push images to the CI registry.
|
|
||||||
# This is extended with the version to be deployed (e.g. the SHA or TAG) and the
|
|
||||||
# target os.
|
|
||||||
.release:
|
|
||||||
stage: release
|
|
||||||
variables:
|
|
||||||
# Define the source image for the release
|
|
||||||
IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
|
||||||
VERSION: "${CI_COMMIT_SHORT_SHA}"
|
|
||||||
# OUT_IMAGE_VERSION is overridden for external releases
|
|
||||||
OUT_IMAGE_VERSION: "${CI_COMMIT_SHORT_SHA}"
|
|
||||||
before_script:
|
|
||||||
- !reference [.regctl-setup, before_script]
|
|
||||||
|
|
||||||
# We ensure that the OUT_IMAGE_VERSION is set
|
|
||||||
- 'echo Version: ${OUT_IMAGE_VERSION} ; [[ -n "${OUT_IMAGE_VERSION}" ]] || exit 1'
|
|
||||||
|
|
||||||
# In the case where we are deploying a different version to the CI_COMMIT_SHA, we
|
|
||||||
# need to tag the image.
|
|
||||||
# Note: a leading 'v' is stripped from the version if present
|
|
||||||
- apk add --no-cache make bash
|
|
||||||
script:
|
|
||||||
# Log in to the "output" registry, tag the image and push the image
|
|
||||||
- 'echo "Logging in to CI registry ${CI_REGISTRY}"'
|
|
||||||
- regctl registry login "${CI_REGISTRY}" -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}"
|
|
||||||
- '[ ${CI_REGISTRY} = ${OUT_REGISTRY} ] || echo "Logging in to output registry ${OUT_REGISTRY}"'
|
|
||||||
- '[ ${CI_REGISTRY} = ${OUT_REGISTRY} ] || regctl registry login "${OUT_REGISTRY}" -u "${OUT_REGISTRY_USER}" -p "${OUT_REGISTRY_TOKEN}"'
|
|
||||||
|
|
||||||
# Since OUT_IMAGE_NAME and OUT_IMAGE_VERSION are set, this will push the CI image to the
|
|
||||||
# Target
|
|
||||||
- make -f build/container/Makefile push-${DIST}
|
|
||||||
|
|
||||||
# Define a staging release step that pushes an image to an internal "staging" repository
|
|
||||||
# This is triggered for all pipelines (i.e. not only tags) to test the pipeline steps
|
|
||||||
# outside of the release process.
|
|
||||||
.release:staging:
|
|
||||||
extends:
|
|
||||||
- .release
|
|
||||||
variables:
|
|
||||||
OUT_REGISTRY_USER: "${CI_REGISTRY_USER}"
|
|
||||||
OUT_REGISTRY_TOKEN: "${CI_REGISTRY_PASSWORD}"
|
|
||||||
OUT_REGISTRY: "${CI_REGISTRY}"
|
|
||||||
OUT_IMAGE_NAME: "${CI_REGISTRY_IMAGE}/staging/container-toolkit"
|
|
||||||
|
|
||||||
# Define an external release step that pushes an image to an external repository.
|
|
||||||
# This includes a devlopment image off main.
|
|
||||||
.release:external:
|
|
||||||
extends:
|
|
||||||
- .release
|
|
||||||
rules:
|
|
||||||
- if: $CI_COMMIT_TAG
|
|
||||||
variables:
|
|
||||||
OUT_IMAGE_VERSION: "${CI_COMMIT_TAG}"
|
|
||||||
- if: $CI_COMMIT_BRANCH == $RELEASE_DEVEL_BRANCH
|
|
||||||
variables:
|
|
||||||
OUT_IMAGE_VERSION: "${DEVEL_RELEASE_IMAGE_VERSION}"
|
|
||||||
|
|
||||||
# Define the release jobs
|
|
||||||
release:staging-centos7:
|
|
||||||
extends:
|
|
||||||
- .release:staging
|
|
||||||
- .dist-centos7
|
|
||||||
needs:
|
|
||||||
- image-centos7
|
|
||||||
|
|
||||||
release:staging-ubi8:
|
|
||||||
extends:
|
|
||||||
- .release:staging
|
|
||||||
- .dist-ubi8
|
|
||||||
needs:
|
|
||||||
- image-ubi8
|
|
||||||
|
|
||||||
release:staging-ubuntu20.04:
|
|
||||||
extends:
|
|
||||||
- .release:staging
|
|
||||||
- .dist-ubuntu20.04
|
|
||||||
needs:
|
|
||||||
- test-toolkit-ubuntu20.04
|
|
||||||
- test-containerd-ubuntu20.04
|
|
||||||
- test-crio-ubuntu20.04
|
|
||||||
- test-docker-ubuntu20.04
|
|
||||||
|
|
||||||
release:staging-packaging:
|
|
||||||
extends:
|
|
||||||
- .release:staging
|
|
||||||
- .dist-packaging
|
|
||||||
needs:
|
|
||||||
- test-packaging
|
|
||||||
|
|||||||
3
.github/copy-pr-bot.yaml
vendored
Normal file
3
.github/copy-pr-bot.yaml
vendored
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
# https://docs.gha-runners.nvidia.com/apps/copy-pr-bot/#configuration
|
||||||
|
|
||||||
|
enabled: true
|
||||||
120
.github/dependabot.yml
vendored
Normal file
120
.github/dependabot.yml
vendored
Normal file
@@ -0,0 +1,120 @@
|
|||||||
|
# Please see the documentation for all configuration options:
|
||||||
|
# https://docs.github.com/github/administering-a-repository/configuration-options-for-dependency-updates
|
||||||
|
|
||||||
|
version: 2
|
||||||
|
updates:
|
||||||
|
# main branch
|
||||||
|
- package-ecosystem: "gomod"
|
||||||
|
target-branch: main
|
||||||
|
directories:
|
||||||
|
- "/"
|
||||||
|
- "deployments/devel"
|
||||||
|
- "tests"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
groups:
|
||||||
|
k8sio:
|
||||||
|
patterns:
|
||||||
|
- k8s.io/*
|
||||||
|
exclude-patterns:
|
||||||
|
- k8s.io/klog/*
|
||||||
|
|
||||||
|
- package-ecosystem: "docker"
|
||||||
|
target-branch: main
|
||||||
|
directories:
|
||||||
|
# CUDA image
|
||||||
|
- "/deployments/container"
|
||||||
|
# Golang version
|
||||||
|
- "/deployments/devel"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
|
||||||
|
- package-ecosystem: "github-actions"
|
||||||
|
target-branch: main
|
||||||
|
directory: "/"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
|
||||||
|
# Allow dependabot to update the libnvidia-container submodule.
|
||||||
|
- package-ecosystem: "gitsubmodule"
|
||||||
|
target-branch: main
|
||||||
|
directory: "/"
|
||||||
|
allow:
|
||||||
|
- dependency-name: "third_party/libnvidia-container"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
- libnvidia-container
|
||||||
|
|
||||||
|
# The release branch(es):
|
||||||
|
- package-ecosystem: "gomod"
|
||||||
|
target-branch: release-1.17
|
||||||
|
directories:
|
||||||
|
- "/"
|
||||||
|
# We don't update development or test dependencies on release branches
|
||||||
|
# - "deployments/devel"
|
||||||
|
# - "tests"
|
||||||
|
schedule:
|
||||||
|
interval: "weekly"
|
||||||
|
day: "sunday"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
- maintenance
|
||||||
|
ignore:
|
||||||
|
# For release branches we only consider patch updates.
|
||||||
|
- dependency-name: "*"
|
||||||
|
update-types:
|
||||||
|
- version-update:semver-major
|
||||||
|
- version-update:semver-minor
|
||||||
|
groups:
|
||||||
|
k8sio:
|
||||||
|
patterns:
|
||||||
|
- k8s.io/*
|
||||||
|
exclude-patterns:
|
||||||
|
- k8s.io/klog/*
|
||||||
|
|
||||||
|
- package-ecosystem: "docker"
|
||||||
|
target-branch: release-1.17
|
||||||
|
directories:
|
||||||
|
# CUDA image
|
||||||
|
- "/deployments/container"
|
||||||
|
# Golang version
|
||||||
|
- "/deployments/devel"
|
||||||
|
schedule:
|
||||||
|
interval: "weekly"
|
||||||
|
day: "sunday"
|
||||||
|
ignore:
|
||||||
|
# For release branches we only apply patch updates to the golang version.
|
||||||
|
- dependency-name: "*golang*"
|
||||||
|
update-types:
|
||||||
|
- version-update:semver-major
|
||||||
|
- version-update:semver-minor
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
- maintenance
|
||||||
|
|
||||||
|
- package-ecosystem: "github-actions"
|
||||||
|
target-branch: release-1.17
|
||||||
|
directory: "/"
|
||||||
|
schedule:
|
||||||
|
interval: "weekly"
|
||||||
|
day: "sunday"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
|
- maintenance
|
||||||
|
|
||||||
|
# Github actions need to be gh-pages branches.
|
||||||
|
- package-ecosystem: "github-actions"
|
||||||
|
target-branch: gh-pages
|
||||||
|
directory: "/"
|
||||||
|
schedule:
|
||||||
|
interval: "daily"
|
||||||
|
labels:
|
||||||
|
- dependencies
|
||||||
113
.github/workflows/blossom-ci.yaml
vendored
113
.github/workflows/blossom-ci.yaml
vendored
@@ -1,113 +0,0 @@
|
|||||||
# Copyright (c) 2020-2023, NVIDIA CORPORATION.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
# A workflow to trigger ci on hybrid infra (github + self hosted runner)
|
|
||||||
name: Blossom-CI
|
|
||||||
on:
|
|
||||||
issue_comment:
|
|
||||||
types: [created]
|
|
||||||
workflow_dispatch:
|
|
||||||
inputs:
|
|
||||||
platform:
|
|
||||||
description: 'runs-on argument'
|
|
||||||
required: false
|
|
||||||
args:
|
|
||||||
description: 'argument'
|
|
||||||
required: false
|
|
||||||
jobs:
|
|
||||||
Authorization:
|
|
||||||
name: Authorization
|
|
||||||
runs-on: blossom
|
|
||||||
outputs:
|
|
||||||
args: ${{ env.args }}
|
|
||||||
|
|
||||||
# This job only runs for pull request comments
|
|
||||||
if: |
|
|
||||||
contains( '\
|
|
||||||
anstockatnv,\
|
|
||||||
rohitrajani2018,\
|
|
||||||
cdesiniotis,\
|
|
||||||
shivamerla,\
|
|
||||||
ArangoGutierrez,\
|
|
||||||
elezar,\
|
|
||||||
klueska,\
|
|
||||||
zvonkok,\
|
|
||||||
', format('{0},', github.actor)) &&
|
|
||||||
github.event.comment.body == '/blossom-ci'
|
|
||||||
steps:
|
|
||||||
- name: Check if comment is issued by authorized person
|
|
||||||
run: blossom-ci
|
|
||||||
env:
|
|
||||||
OPERATION: 'AUTH'
|
|
||||||
REPO_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
REPO_KEY_DATA: ${{ secrets.BLOSSOM_KEY }}
|
|
||||||
|
|
||||||
Vulnerability-scan:
|
|
||||||
name: Vulnerability scan
|
|
||||||
needs: [Authorization]
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- name: Checkout code
|
|
||||||
uses: actions/checkout@v2
|
|
||||||
with:
|
|
||||||
repository: ${{ fromJson(needs.Authorization.outputs.args).repo }}
|
|
||||||
ref: ${{ fromJson(needs.Authorization.outputs.args).ref }}
|
|
||||||
lfs: 'true'
|
|
||||||
|
|
||||||
# repo specific steps
|
|
||||||
#- name: Setup java
|
|
||||||
# uses: actions/setup-java@v1
|
|
||||||
# with:
|
|
||||||
# java-version: 1.8
|
|
||||||
|
|
||||||
# add blackduck properties https://synopsys.atlassian.net/wiki/spaces/INTDOCS/pages/631308372/Methods+for+Configuring+Analysis#Using-a-configuration-file
|
|
||||||
#- name: Setup blackduck properties
|
|
||||||
# run: |
|
|
||||||
# PROJECTS=$(mvn -am dependency:tree | grep maven-dependency-plugin | awk '{ out="com.nvidia:"$(NF-1);print out }' | grep rapids | xargs | sed -e 's/ /,/g')
|
|
||||||
# echo detect.maven.build.command="-pl=$PROJECTS -am" >> application.properties
|
|
||||||
# echo detect.maven.included.scopes=compile >> application.properties
|
|
||||||
|
|
||||||
- name: Run blossom action
|
|
||||||
uses: NVIDIA/blossom-action@main
|
|
||||||
env:
|
|
||||||
REPO_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
REPO_KEY_DATA: ${{ secrets.BLOSSOM_KEY }}
|
|
||||||
with:
|
|
||||||
args1: ${{ fromJson(needs.Authorization.outputs.args).args1 }}
|
|
||||||
args2: ${{ fromJson(needs.Authorization.outputs.args).args2 }}
|
|
||||||
args3: ${{ fromJson(needs.Authorization.outputs.args).args3 }}
|
|
||||||
|
|
||||||
Job-trigger:
|
|
||||||
name: Start ci job
|
|
||||||
needs: [Vulnerability-scan]
|
|
||||||
runs-on: blossom
|
|
||||||
steps:
|
|
||||||
- name: Start ci job
|
|
||||||
run: blossom-ci
|
|
||||||
env:
|
|
||||||
OPERATION: 'START-CI-JOB'
|
|
||||||
CI_SERVER: ${{ secrets.CI_SERVER }}
|
|
||||||
REPO_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
|
|
||||||
Upload-Log:
|
|
||||||
name: Upload log
|
|
||||||
runs-on: blossom
|
|
||||||
if : github.event_name == 'workflow_dispatch'
|
|
||||||
steps:
|
|
||||||
- name: Jenkins log for pull request ${{ fromJson(github.event.inputs.args).pr }} (click here)
|
|
||||||
run: blossom-ci
|
|
||||||
env:
|
|
||||||
OPERATION: 'POST-PROCESSING'
|
|
||||||
CI_SERVER: ${{ secrets.CI_SERVER }}
|
|
||||||
REPO_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
53
.github/workflows/ci.yaml
vendored
Normal file
53
.github/workflows/ci.yaml
vendored
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
# Copyright 2025 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
name: CI Pipeline
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches:
|
||||||
|
- "pull-request/[0-9]+"
|
||||||
|
- main
|
||||||
|
- release-*
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
code-scanning:
|
||||||
|
uses: ./.github/workflows/code_scanning.yaml
|
||||||
|
|
||||||
|
variables:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
outputs:
|
||||||
|
version: ${{ steps.version.outputs.version }}
|
||||||
|
steps:
|
||||||
|
- name: Generate Commit Short SHA
|
||||||
|
id: version
|
||||||
|
run: echo "version=$(echo $GITHUB_SHA | cut -c1-8)" >> "$GITHUB_OUTPUT"
|
||||||
|
|
||||||
|
golang:
|
||||||
|
uses: ./.github/workflows/golang.yaml
|
||||||
|
|
||||||
|
image:
|
||||||
|
uses: ./.github/workflows/image.yaml
|
||||||
|
needs: [variables, golang, code-scanning]
|
||||||
|
secrets: inherit
|
||||||
|
with:
|
||||||
|
version: ${{ needs.variables.outputs.version }}
|
||||||
|
build_multi_arch_images: ${{ github.ref_name == 'main' || startsWith(github.ref_name, 'release-') }}
|
||||||
|
|
||||||
|
e2e-test:
|
||||||
|
needs: [image, variables]
|
||||||
|
secrets: inherit
|
||||||
|
uses: ./.github/workflows/e2e.yaml
|
||||||
|
with:
|
||||||
|
version: ${{ needs.variables.outputs.version }}
|
||||||
49
.github/workflows/code_scanning.yaml
vendored
Normal file
49
.github/workflows/code_scanning.yaml
vendored
Normal file
@@ -0,0 +1,49 @@
|
|||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
name: "CodeQL"
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_call: {}
|
||||||
|
pull_request:
|
||||||
|
types:
|
||||||
|
- opened
|
||||||
|
- synchronize
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
- release-*
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
analyze:
|
||||||
|
name: Analyze Go code with CodeQL
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
timeout-minutes: 360
|
||||||
|
permissions:
|
||||||
|
security-events: write
|
||||||
|
packages: read
|
||||||
|
steps:
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
- name: Initialize CodeQL
|
||||||
|
uses: github/codeql-action/init@v3
|
||||||
|
with:
|
||||||
|
languages: go
|
||||||
|
build-mode: manual
|
||||||
|
- shell: bash
|
||||||
|
run: |
|
||||||
|
make build
|
||||||
|
- name: Perform CodeQL Analysis
|
||||||
|
uses: github/codeql-action/analyze@v3
|
||||||
|
with:
|
||||||
|
category: "/language:go"
|
||||||
103
.github/workflows/e2e.yaml
vendored
Normal file
103
.github/workflows/e2e.yaml
vendored
Normal file
@@ -0,0 +1,103 @@
|
|||||||
|
# Copyright 2025 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
name: End-to-end Tests
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_call:
|
||||||
|
inputs:
|
||||||
|
version:
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
secrets:
|
||||||
|
AWS_ACCESS_KEY_ID:
|
||||||
|
required: true
|
||||||
|
AWS_SECRET_ACCESS_KEY:
|
||||||
|
required: true
|
||||||
|
AWS_SSH_KEY:
|
||||||
|
required: true
|
||||||
|
E2E_SSH_USER:
|
||||||
|
required: true
|
||||||
|
SLACK_BOT_TOKEN:
|
||||||
|
required: true
|
||||||
|
SLACK_CHANNEL_ID:
|
||||||
|
required: true
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
e2e-tests:
|
||||||
|
runs-on: linux-amd64-cpu4
|
||||||
|
steps:
|
||||||
|
- name: Check out code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Calculate build vars
|
||||||
|
id: vars
|
||||||
|
run: |
|
||||||
|
echo "COMMIT_SHORT_SHA=${GITHUB_SHA:0:8}" >> $GITHUB_ENV
|
||||||
|
echo "LOWERCASE_REPO_OWNER=$(echo "${GITHUB_REPOSITORY_OWNER}" | awk '{print tolower($0)}')" >> $GITHUB_ENV
|
||||||
|
GOLANG_VERSION=$(./hack/golang-version.sh)
|
||||||
|
echo "GOLANG_VERSION=${GOLANG_VERSION##GOLANG_VERSION := }" >> $GITHUB_ENV
|
||||||
|
|
||||||
|
- name: Install Go
|
||||||
|
uses: actions/setup-go@v5
|
||||||
|
with:
|
||||||
|
go-version: ${{ env.GOLANG_VERSION }}
|
||||||
|
|
||||||
|
- name: Set up Holodeck
|
||||||
|
uses: NVIDIA/holodeck@v0.2.12
|
||||||
|
with:
|
||||||
|
aws_access_key_id: ${{ secrets.AWS_ACCESS_KEY_ID }}
|
||||||
|
aws_secret_access_key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
|
||||||
|
aws_ssh_key: ${{ secrets.AWS_SSH_KEY }}
|
||||||
|
holodeck_config: "tests/e2e/infra/aws.yaml"
|
||||||
|
|
||||||
|
- name: Get public dns name
|
||||||
|
id: holodeck_public_dns_name
|
||||||
|
uses: mikefarah/yq@master
|
||||||
|
with:
|
||||||
|
cmd: yq '.status.properties[] | select(.name == "public-dns-name") | .value' /github/workspace/.cache/holodeck.yaml
|
||||||
|
|
||||||
|
- name: Run e2e tests
|
||||||
|
env:
|
||||||
|
E2E_INSTALL_CTK: "true"
|
||||||
|
E2E_IMAGE_NAME: ghcr.io/nvidia/container-toolkit
|
||||||
|
E2E_IMAGE_TAG: ${{ inputs.version }}
|
||||||
|
E2E_SSH_USER: ${{ secrets.E2E_SSH_USER }}
|
||||||
|
E2E_SSH_HOST: ${{ steps.holodeck_public_dns_name.outputs.result }}
|
||||||
|
run: |
|
||||||
|
e2e_ssh_key=$(mktemp)
|
||||||
|
echo "${{ secrets.AWS_SSH_KEY }}" > "$e2e_ssh_key"
|
||||||
|
chmod 600 "$e2e_ssh_key"
|
||||||
|
export E2E_SSH_KEY="$e2e_ssh_key"
|
||||||
|
|
||||||
|
make -f tests/e2e/Makefile test
|
||||||
|
|
||||||
|
- name: Archive Ginkgo logs
|
||||||
|
uses: actions/upload-artifact@v4
|
||||||
|
with:
|
||||||
|
name: ginkgo-logs
|
||||||
|
path: ginkgo.json
|
||||||
|
retention-days: 15
|
||||||
|
- name: Send Slack alert notification
|
||||||
|
if: ${{ failure() }}
|
||||||
|
uses: slackapi/slack-github-action@v2.1.0
|
||||||
|
with:
|
||||||
|
method: chat.postMessage
|
||||||
|
token: ${{ secrets.SLACK_BOT_TOKEN }}
|
||||||
|
payload: |
|
||||||
|
channel: ${{ secrets.SLACK_CHANNEL_ID }}
|
||||||
|
text: |
|
||||||
|
:x: On repository ${{ github.repository }}, the Workflow *${{ github.workflow }}* has failed.
|
||||||
|
|
||||||
|
Details: https://github.com/${{ github.repository }}/actions/runs/${{ github.run_id }}
|
||||||
102
.github/workflows/golang.yaml
vendored
Normal file
102
.github/workflows/golang.yaml
vendored
Normal file
@@ -0,0 +1,102 @@
|
|||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
name: Golang
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_call: {}
|
||||||
|
pull_request:
|
||||||
|
types:
|
||||||
|
- opened
|
||||||
|
- synchronize
|
||||||
|
branches:
|
||||||
|
- main
|
||||||
|
- release-*
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
check:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
name: Checkout code
|
||||||
|
|
||||||
|
- name: Get Golang version
|
||||||
|
id: vars
|
||||||
|
run: |
|
||||||
|
GOLANG_VERSION=$(./hack/golang-version.sh)
|
||||||
|
echo "GOLANG_VERSION=${GOLANG_VERSION##GOLANG_VERSION := }" >> $GITHUB_ENV
|
||||||
|
|
||||||
|
- name: Install Go
|
||||||
|
uses: actions/setup-go@v5
|
||||||
|
with:
|
||||||
|
go-version: ${{ env.GOLANG_VERSION }}
|
||||||
|
|
||||||
|
- name: Lint
|
||||||
|
uses: golangci/golangci-lint-action@v8
|
||||||
|
with:
|
||||||
|
version: latest
|
||||||
|
args: -v --timeout 5m
|
||||||
|
skip-cache: true
|
||||||
|
|
||||||
|
- name: Check golang modules
|
||||||
|
run: |
|
||||||
|
make check-vendor
|
||||||
|
make -C deployments/devel check-modules
|
||||||
|
|
||||||
|
test:
|
||||||
|
name: Unit test
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Get Golang version
|
||||||
|
id: vars
|
||||||
|
run: |
|
||||||
|
GOLANG_VERSION=$(./hack/golang-version.sh)
|
||||||
|
echo "GOLANG_VERSION=${GOLANG_VERSION##GOLANG_VERSION := }" >> $GITHUB_ENV
|
||||||
|
|
||||||
|
- name: Install Go
|
||||||
|
uses: actions/setup-go@v5
|
||||||
|
with:
|
||||||
|
go-version: ${{ env.GOLANG_VERSION }}
|
||||||
|
|
||||||
|
- name: Run unit tests and generate coverage report
|
||||||
|
run: make coverage
|
||||||
|
|
||||||
|
- name: Upload to Coveralls
|
||||||
|
uses: coverallsapp/github-action@v2
|
||||||
|
with:
|
||||||
|
github-token: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
file: coverage.out
|
||||||
|
|
||||||
|
build:
|
||||||
|
name: Build
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Get Golang version
|
||||||
|
id: vars
|
||||||
|
run: |
|
||||||
|
GOLANG_VERSION=$(./hack/golang-version.sh)
|
||||||
|
echo "GOLANG_VERSION=${GOLANG_VERSION##GOLANG_VERSION ?= }" >> $GITHUB_ENV
|
||||||
|
|
||||||
|
- name: Install Go
|
||||||
|
uses: actions/setup-go@v5
|
||||||
|
with:
|
||||||
|
go-version: ${{ env.GOLANG_VERSION }}
|
||||||
|
|
||||||
|
- run: make build
|
||||||
120
.github/workflows/image.yaml
vendored
Normal file
120
.github/workflows/image.yaml
vendored
Normal file
@@ -0,0 +1,120 @@
|
|||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
# Run this workflow on pull requests
|
||||||
|
name: image
|
||||||
|
|
||||||
|
on:
|
||||||
|
workflow_call:
|
||||||
|
inputs:
|
||||||
|
version:
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
build_multi_arch_images:
|
||||||
|
required: true
|
||||||
|
type: string
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
packages:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
target:
|
||||||
|
- ubuntu18.04-arm64
|
||||||
|
- ubuntu18.04-amd64
|
||||||
|
- ubuntu18.04-ppc64le
|
||||||
|
- centos7-aarch64
|
||||||
|
- centos7-x86_64
|
||||||
|
- centos8-ppc64le
|
||||||
|
ispr:
|
||||||
|
- ${{ github.ref_name != 'main' && !startsWith( github.ref_name, 'release-' ) }}
|
||||||
|
exclude:
|
||||||
|
- ispr: true
|
||||||
|
target: ubuntu18.04-arm64
|
||||||
|
- ispr: true
|
||||||
|
target: ubuntu18.04-ppc64le
|
||||||
|
- ispr: true
|
||||||
|
target: centos7-aarch64
|
||||||
|
- ispr: true
|
||||||
|
target: centos8-ppc64le
|
||||||
|
fail-fast: false
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
name: Check out code
|
||||||
|
|
||||||
|
- name: Set up QEMU
|
||||||
|
uses: docker/setup-qemu-action@v3
|
||||||
|
with:
|
||||||
|
image: tonistiigi/binfmt:master
|
||||||
|
|
||||||
|
- name: Set up Docker Buildx
|
||||||
|
uses: docker/setup-buildx-action@v3
|
||||||
|
|
||||||
|
- name: build ${{ matrix.target }} packages
|
||||||
|
run: |
|
||||||
|
sudo apt-get install -y coreutils build-essential sed git bash make
|
||||||
|
echo "Building packages"
|
||||||
|
./scripts/build-packages.sh ${{ matrix.target }}
|
||||||
|
|
||||||
|
- name: 'Upload Artifacts'
|
||||||
|
uses: actions/upload-artifact@v4
|
||||||
|
with:
|
||||||
|
compression-level: 0
|
||||||
|
name: toolkit-container-${{ matrix.target }}-${{ github.run_id }}
|
||||||
|
path: ${{ github.workspace }}/dist/*
|
||||||
|
|
||||||
|
image:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
strategy:
|
||||||
|
matrix:
|
||||||
|
target:
|
||||||
|
- application
|
||||||
|
- packaging
|
||||||
|
needs: packages
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
name: Check out code
|
||||||
|
|
||||||
|
- name: Set up QEMU
|
||||||
|
uses: docker/setup-qemu-action@v3
|
||||||
|
with:
|
||||||
|
image: tonistiigi/binfmt:master
|
||||||
|
|
||||||
|
- name: Set up Docker Buildx
|
||||||
|
uses: docker/setup-buildx-action@v3
|
||||||
|
|
||||||
|
- name: Get built packages
|
||||||
|
uses: actions/download-artifact@v4
|
||||||
|
with:
|
||||||
|
path: ${{ github.workspace }}/dist/
|
||||||
|
pattern: toolkit-container-*-${{ github.run_id }}
|
||||||
|
merge-multiple: true
|
||||||
|
|
||||||
|
- name: Login to GitHub Container Registry
|
||||||
|
uses: docker/login-action@v3
|
||||||
|
with:
|
||||||
|
registry: ghcr.io
|
||||||
|
username: ${{ github.actor }}
|
||||||
|
password: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
|
||||||
|
- name: Build image
|
||||||
|
env:
|
||||||
|
IMAGE_NAME: ghcr.io/nvidia/container-toolkit
|
||||||
|
VERSION: ${{ inputs.version }}
|
||||||
|
PUSH_ON_BUILD: "true"
|
||||||
|
BUILD_MULTI_ARCH_IMAGES: ${{ inputs.build_multi_arch_images }}
|
||||||
|
run: |
|
||||||
|
echo "${VERSION}"
|
||||||
|
make -f deployments/container/Makefile build-${{ matrix.target }}
|
||||||
38
.github/workflows/release.yaml
vendored
Normal file
38
.github/workflows/release.yaml
vendored
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
# Run this workflow on new tags
|
||||||
|
name: Release
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
tags:
|
||||||
|
- v*
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
release:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
name: Check out code
|
||||||
|
|
||||||
|
- name: Prepare Artifacts
|
||||||
|
run: |
|
||||||
|
./hack/prepare-artifacts.sh ${{ github.ref_name }}
|
||||||
|
|
||||||
|
- name: Create Draft Release
|
||||||
|
env:
|
||||||
|
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
||||||
|
run: |
|
||||||
|
./hack/create-release.sh ${{ github.ref_name }}
|
||||||
16
.gitignore
vendored
16
.gitignore
vendored
@@ -1,13 +1,11 @@
|
|||||||
dist
|
/dist
|
||||||
artifacts
|
/artifacts
|
||||||
*.swp
|
*.swp
|
||||||
*.swo
|
*.swo
|
||||||
/coverage.out*
|
/coverage.out*
|
||||||
/test/output/
|
/tests/output/
|
||||||
/nvidia-container-runtime
|
/nvidia-*
|
||||||
/nvidia-container-runtime.*
|
|
||||||
/nvidia-container-runtime-hook
|
|
||||||
/nvidia-container-toolkit
|
|
||||||
/nvidia-ctk
|
|
||||||
/shared-*
|
/shared-*
|
||||||
/release-*
|
/release-*
|
||||||
|
/bin
|
||||||
|
/toolkit-test
|
||||||
|
|||||||
314
.gitlab-ci.yml
314
.gitlab-ci.yml
@@ -1,314 +0,0 @@
|
|||||||
# Copyright (c) 2019-2022, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
include:
|
|
||||||
- .common-ci.yml
|
|
||||||
|
|
||||||
build-dev-image:
|
|
||||||
stage: image
|
|
||||||
script:
|
|
||||||
- apk --no-cache add make bash
|
|
||||||
- make .build-image
|
|
||||||
- docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
|
||||||
- make .push-build-image
|
|
||||||
|
|
||||||
.requires-build-image:
|
|
||||||
image: "${BUILDIMAGE}"
|
|
||||||
|
|
||||||
.go-check:
|
|
||||||
extends:
|
|
||||||
- .requires-build-image
|
|
||||||
stage: go-checks
|
|
||||||
|
|
||||||
fmt:
|
|
||||||
extends:
|
|
||||||
- .go-check
|
|
||||||
script:
|
|
||||||
- make assert-fmt
|
|
||||||
|
|
||||||
vet:
|
|
||||||
extends:
|
|
||||||
- .go-check
|
|
||||||
script:
|
|
||||||
- make vet
|
|
||||||
|
|
||||||
lint:
|
|
||||||
extends:
|
|
||||||
- .go-check
|
|
||||||
script:
|
|
||||||
- make lint
|
|
||||||
allow_failure: true
|
|
||||||
|
|
||||||
ineffassign:
|
|
||||||
extends:
|
|
||||||
- .go-check
|
|
||||||
script:
|
|
||||||
- make ineffassign
|
|
||||||
allow_failure: true
|
|
||||||
|
|
||||||
misspell:
|
|
||||||
extends:
|
|
||||||
- .go-check
|
|
||||||
script:
|
|
||||||
- make misspell
|
|
||||||
|
|
||||||
go-build:
|
|
||||||
extends:
|
|
||||||
- .requires-build-image
|
|
||||||
stage: go-build
|
|
||||||
script:
|
|
||||||
- make build
|
|
||||||
|
|
||||||
unit-tests:
|
|
||||||
extends:
|
|
||||||
- .requires-build-image
|
|
||||||
stage: unit-tests
|
|
||||||
script:
|
|
||||||
- make coverage
|
|
||||||
|
|
||||||
# Define the package build helpers
|
|
||||||
.multi-arch-build:
|
|
||||||
before_script:
|
|
||||||
- apk add --no-cache coreutils build-base sed git bash make
|
|
||||||
- '[[ -n "${SKIP_QEMU_SETUP}" ]] || docker run --rm --privileged multiarch/qemu-user-static --reset -p yes -c yes'
|
|
||||||
|
|
||||||
.package-artifacts:
|
|
||||||
variables:
|
|
||||||
ARTIFACTS_NAME: "toolkit-container-${CI_PIPELINE_ID}"
|
|
||||||
ARTIFACTS_ROOT: "toolkit-container-${CI_PIPELINE_ID}"
|
|
||||||
DIST_DIR: ${CI_PROJECT_DIR}/${ARTIFACTS_ROOT}
|
|
||||||
|
|
||||||
.package-build:
|
|
||||||
extends:
|
|
||||||
- .multi-arch-build
|
|
||||||
- .package-artifacts
|
|
||||||
stage: package-build
|
|
||||||
timeout: 3h
|
|
||||||
script:
|
|
||||||
- ./scripts/build-packages.sh ${DIST}-${ARCH}
|
|
||||||
|
|
||||||
artifacts:
|
|
||||||
name: ${ARTIFACTS_NAME}
|
|
||||||
paths:
|
|
||||||
- ${ARTIFACTS_ROOT}
|
|
||||||
|
|
||||||
# Define the package build targets
|
|
||||||
package-amazonlinux2-aarch64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-amazonlinux2
|
|
||||||
- .arch-aarch64
|
|
||||||
|
|
||||||
package-amazonlinux2-x86_64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-amazonlinux2
|
|
||||||
- .arch-x86_64
|
|
||||||
|
|
||||||
package-centos7-x86_64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-centos7
|
|
||||||
- .arch-x86_64
|
|
||||||
|
|
||||||
package-centos8-aarch64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-centos8
|
|
||||||
- .arch-aarch64
|
|
||||||
|
|
||||||
package-centos8-ppc64le:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-centos8
|
|
||||||
- .arch-ppc64le
|
|
||||||
|
|
||||||
package-centos8-x86_64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-centos8
|
|
||||||
- .arch-x86_64
|
|
||||||
|
|
||||||
package-debian10-amd64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-debian10
|
|
||||||
- .arch-amd64
|
|
||||||
|
|
||||||
package-opensuse-leap15.1-x86_64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-opensuse-leap15.1
|
|
||||||
- .arch-x86_64
|
|
||||||
|
|
||||||
package-ubuntu18.04-amd64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
- .arch-amd64
|
|
||||||
|
|
||||||
package-ubuntu18.04-arm64:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
- .arch-arm64
|
|
||||||
|
|
||||||
package-ubuntu18.04-ppc64le:
|
|
||||||
extends:
|
|
||||||
- .package-build
|
|
||||||
- .dist-ubuntu18.04
|
|
||||||
- .arch-ppc64le
|
|
||||||
|
|
||||||
.buildx-setup:
|
|
||||||
before_script:
|
|
||||||
- export BUILDX_VERSION=v0.6.3
|
|
||||||
- apk add --no-cache curl
|
|
||||||
- mkdir -p ~/.docker/cli-plugins
|
|
||||||
- curl -sSLo ~/.docker/cli-plugins/docker-buildx "https://github.com/docker/buildx/releases/download/${BUILDX_VERSION}/buildx-${BUILDX_VERSION}.linux-amd64"
|
|
||||||
- chmod a+x ~/.docker/cli-plugins/docker-buildx
|
|
||||||
|
|
||||||
- docker buildx create --use --platform=linux/amd64,linux/arm64
|
|
||||||
|
|
||||||
- '[[ -n "${SKIP_QEMU_SETUP}" ]] || docker run --rm --privileged multiarch/qemu-user-static --reset -p yes'
|
|
||||||
|
|
||||||
# Define the image build targets
|
|
||||||
.image-build:
|
|
||||||
stage: image-build
|
|
||||||
variables:
|
|
||||||
IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
|
||||||
VERSION: "${CI_COMMIT_SHORT_SHA}"
|
|
||||||
PUSH_ON_BUILD: "true"
|
|
||||||
before_script:
|
|
||||||
- !reference [.buildx-setup, before_script]
|
|
||||||
|
|
||||||
- apk add --no-cache bash make git
|
|
||||||
- 'echo "Logging in to CI registry ${CI_REGISTRY}"'
|
|
||||||
- docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
|
||||||
script:
|
|
||||||
- make -f build/container/Makefile build-${DIST}
|
|
||||||
|
|
||||||
image-centos7:
|
|
||||||
extends:
|
|
||||||
- .image-build
|
|
||||||
- .package-artifacts
|
|
||||||
- .dist-centos7
|
|
||||||
needs:
|
|
||||||
- package-centos7-x86_64
|
|
||||||
|
|
||||||
image-ubi8:
|
|
||||||
extends:
|
|
||||||
- .image-build
|
|
||||||
- .package-artifacts
|
|
||||||
- .dist-ubi8
|
|
||||||
needs:
|
|
||||||
# Note: The ubi8 image uses the centos8 packages
|
|
||||||
- package-centos8-aarch64
|
|
||||||
- package-centos8-x86_64
|
|
||||||
- package-centos8-ppc64le
|
|
||||||
|
|
||||||
image-ubuntu20.04:
|
|
||||||
extends:
|
|
||||||
- .image-build
|
|
||||||
- .package-artifacts
|
|
||||||
- .dist-ubuntu20.04
|
|
||||||
needs:
|
|
||||||
- package-ubuntu18.04-amd64
|
|
||||||
- package-ubuntu18.04-arm64
|
|
||||||
- job: package-ubuntu18.04-ppc64le
|
|
||||||
optional: true
|
|
||||||
|
|
||||||
# The DIST=packaging target creates an image containing all built packages
|
|
||||||
image-packaging:
|
|
||||||
extends:
|
|
||||||
- .image-build
|
|
||||||
- .package-artifacts
|
|
||||||
- .dist-packaging
|
|
||||||
needs:
|
|
||||||
- job: package-centos8-aarch64
|
|
||||||
- job: package-centos8-x86_64
|
|
||||||
- job: package-ubuntu18.04-amd64
|
|
||||||
- job: package-ubuntu18.04-arm64
|
|
||||||
- job: package-amazonlinux2-aarch64
|
|
||||||
optional: true
|
|
||||||
- job: package-amazonlinux2-x86_64
|
|
||||||
optional: true
|
|
||||||
- job: package-centos7-x86_64
|
|
||||||
optional: true
|
|
||||||
- job: package-centos8-ppc64le
|
|
||||||
optional: true
|
|
||||||
- job: package-debian10-amd64
|
|
||||||
optional: true
|
|
||||||
- job: package-opensuse-leap15.1-x86_64
|
|
||||||
optional: true
|
|
||||||
- job: package-ubuntu18.04-ppc64le
|
|
||||||
optional: true
|
|
||||||
|
|
||||||
# Define publish test helpers
|
|
||||||
.test:toolkit:
|
|
||||||
extends:
|
|
||||||
- .integration
|
|
||||||
variables:
|
|
||||||
TEST_CASES: "toolkit"
|
|
||||||
|
|
||||||
.test:docker:
|
|
||||||
extends:
|
|
||||||
- .integration
|
|
||||||
variables:
|
|
||||||
TEST_CASES: "docker"
|
|
||||||
|
|
||||||
.test:containerd:
|
|
||||||
# TODO: The containerd tests fail due to issues with SIGHUP.
|
|
||||||
# Until this is resolved with retry up to twice and allow failure here.
|
|
||||||
retry: 2
|
|
||||||
allow_failure: true
|
|
||||||
extends:
|
|
||||||
- .integration
|
|
||||||
variables:
|
|
||||||
TEST_CASES: "containerd"
|
|
||||||
|
|
||||||
.test:crio:
|
|
||||||
extends:
|
|
||||||
- .integration
|
|
||||||
variables:
|
|
||||||
TEST_CASES: "crio"
|
|
||||||
|
|
||||||
# Define the test targets
|
|
||||||
test-toolkit-ubuntu20.04:
|
|
||||||
extends:
|
|
||||||
- .test:toolkit
|
|
||||||
- .dist-ubuntu20.04
|
|
||||||
needs:
|
|
||||||
- image-ubuntu20.04
|
|
||||||
|
|
||||||
test-containerd-ubuntu20.04:
|
|
||||||
extends:
|
|
||||||
- .test:containerd
|
|
||||||
- .dist-ubuntu20.04
|
|
||||||
needs:
|
|
||||||
- image-ubuntu20.04
|
|
||||||
|
|
||||||
test-crio-ubuntu20.04:
|
|
||||||
extends:
|
|
||||||
- .test:crio
|
|
||||||
- .dist-ubuntu20.04
|
|
||||||
needs:
|
|
||||||
- image-ubuntu20.04
|
|
||||||
|
|
||||||
test-docker-ubuntu20.04:
|
|
||||||
extends:
|
|
||||||
- .test:docker
|
|
||||||
- .dist-ubuntu20.04
|
|
||||||
needs:
|
|
||||||
- image-ubuntu20.04
|
|
||||||
|
|
||||||
10
.gitmodules
vendored
10
.gitmodules
vendored
@@ -1,12 +1,4 @@
|
|||||||
[submodule "third_party/libnvidia-container"]
|
[submodule "third_party/libnvidia-container"]
|
||||||
path = third_party/libnvidia-container
|
path = third_party/libnvidia-container
|
||||||
url = https://gitlab.com/nvidia/container-toolkit/libnvidia-container.git
|
url = https://github.com/NVIDIA/libnvidia-container.git
|
||||||
branch = main
|
|
||||||
[submodule "third_party/nvidia-container-runtime"]
|
|
||||||
path = third_party/nvidia-container-runtime
|
|
||||||
url = https://gitlab.com/nvidia/container-toolkit/container-runtime.git
|
|
||||||
branch = main
|
|
||||||
[submodule "third_party/nvidia-docker"]
|
|
||||||
path = third_party/nvidia-docker
|
|
||||||
url = https://gitlab.com/nvidia/container-toolkit/nvidia-docker.git
|
|
||||||
branch = main
|
branch = main
|
||||||
|
|||||||
72
.golangci.yml
Normal file
72
.golangci.yml
Normal file
@@ -0,0 +1,72 @@
|
|||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
version: "2"
|
||||||
|
linters:
|
||||||
|
enable:
|
||||||
|
- contextcheck
|
||||||
|
- gocritic
|
||||||
|
- gosec
|
||||||
|
- misspell
|
||||||
|
- unconvert
|
||||||
|
exclusions:
|
||||||
|
generated: lax
|
||||||
|
presets:
|
||||||
|
- comments
|
||||||
|
- common-false-positives
|
||||||
|
- legacy
|
||||||
|
- std-error-handling
|
||||||
|
rules:
|
||||||
|
# Exclude the gocritic dupSubExpr issue for cgo files.
|
||||||
|
- linters:
|
||||||
|
- gocritic
|
||||||
|
path: internal/dxcore/dxcore.go
|
||||||
|
text: dupSubExpr
|
||||||
|
# Exclude the checks for usage of returns to config.Delete(Path) in the
|
||||||
|
# crio and containerd config packages.
|
||||||
|
- linters:
|
||||||
|
- errcheck
|
||||||
|
path: pkg/config/engine/
|
||||||
|
text: config.Delete
|
||||||
|
# RENDERD refers to the Render Device and not the past tense of render.
|
||||||
|
- linters:
|
||||||
|
- misspell
|
||||||
|
path: .*.go
|
||||||
|
text: '`RENDERD` is a misspelling of `RENDERED`'
|
||||||
|
# The legacy hook relies on spec.Hooks.Prestart, which is deprecated as of
|
||||||
|
# the v1.2.0 OCI runtime spec.
|
||||||
|
- path: (.+)\.go$
|
||||||
|
text: SA1019:(.+).Prestart is deprecated(.+)
|
||||||
|
# TODO: We should address each of the following integer overflows.
|
||||||
|
- path: (.+)\.go$
|
||||||
|
text: 'G115: integer overflow conversion(.+)'
|
||||||
|
paths:
|
||||||
|
- third_party$
|
||||||
|
- builtin$
|
||||||
|
- examples$
|
||||||
|
formatters:
|
||||||
|
enable:
|
||||||
|
- gofmt
|
||||||
|
- goimports
|
||||||
|
settings:
|
||||||
|
goimports:
|
||||||
|
local-prefixes:
|
||||||
|
- github.com/NVIDIA/nvidia-container-toolkit
|
||||||
|
exclusions:
|
||||||
|
generated: lax
|
||||||
|
paths:
|
||||||
|
- third_party$
|
||||||
|
- builtin$
|
||||||
|
- examples$
|
||||||
324
.nvidia-ci.yml
324
.nvidia-ci.yml
@@ -33,24 +33,68 @@ variables:
|
|||||||
# On the multi-arch builder we don't need the qemu setup.
|
# On the multi-arch builder we don't need the qemu setup.
|
||||||
SKIP_QEMU_SETUP: "1"
|
SKIP_QEMU_SETUP: "1"
|
||||||
# Define the public staging registry
|
# Define the public staging registry
|
||||||
STAGING_REGISTRY: registry.gitlab.com/nvidia/container-toolkit/container-toolkit/staging
|
STAGING_REGISTRY: ghcr.io/nvidia
|
||||||
STAGING_VERSION: ${CI_COMMIT_SHORT_SHA}
|
STAGING_VERSION: ${CI_COMMIT_SHORT_SHA}
|
||||||
ARTIFACTORY_REPO_BASE: "https://urm.nvidia.com/artifactory/sw-gpu-cloudnative"
|
ARTIFACTORY_REPO_BASE: "https://urm.nvidia.com/artifactory/sw-gpu-cloudnative"
|
||||||
KITMAKER_RELEASE_FOLDER: "kitmaker"
|
KITMAKER_RELEASE_FOLDER: "kitmaker"
|
||||||
|
PACKAGE_ARCHIVE_RELEASE_FOLDER: "releases"
|
||||||
|
|
||||||
.image-pull:
|
# .copy-images copies the required application and packaging images from the
|
||||||
stage: image-build
|
# IN_IMAGE="${IN_IMAGE_NAME}:${IN_IMAGE_TAG}${TAG_SUFFIX}"
|
||||||
|
# to
|
||||||
|
# OUT_IMAGE="${OUT_IMAGE_NAME}:${OUT_IMAGE_TAG}${TAG_SUFFIX}"
|
||||||
|
# The script also logs into IN_REGISTRY and OUT_REGISTRY using the supplied
|
||||||
|
# username and tokens.
|
||||||
|
.copy-images:
|
||||||
|
parallel:
|
||||||
|
matrix:
|
||||||
|
- TAG_SUFFIX: ["", "-packaging"]
|
||||||
|
before_script:
|
||||||
|
- !reference [.regctl-setup, before_script]
|
||||||
|
- apk add --no-cache make bash
|
||||||
|
variables:
|
||||||
|
REGCTL: regctl
|
||||||
|
script:
|
||||||
|
- |
|
||||||
|
if [ -n ${IN_REGISTRY} ] && [ -n ${IN_REGISTRY_USER} ]; then
|
||||||
|
echo "Logging in to ${IN_REGISTRY}"
|
||||||
|
${REGCTL} registry login "${IN_REGISTRY}" -u "${IN_REGISTRY_USER}" -p "${IN_REGISTRY_TOKEN}" || exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -n ${OUT_REGISTRY} ] && [ -n ${OUT_REGISTRY_USER} ] && [ "${IN_REGISTRY}" != "${OUT_REGISTRY}" ]; then
|
||||||
|
echo "Logging in to ${OUT_REGISTRY}"
|
||||||
|
${REGCTL} registry login "${OUT_REGISTRY}" -u "${OUT_REGISTRY_USER}" -p "${OUT_REGISTRY_TOKEN}" || exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
export IN_IMAGE="${IN_IMAGE_NAME}:${IN_IMAGE_TAG}${TAG_SUFFIX}"
|
||||||
|
export OUT_IMAGE="${OUT_IMAGE_NAME}:${OUT_IMAGE_TAG}${TAG_SUFFIX}"
|
||||||
|
|
||||||
|
echo "Copying ${IN_IMAGE} to ${OUT_IMAGE}"
|
||||||
|
${REGCTL} image copy ${IN_IMAGE} ${OUT_IMAGE}
|
||||||
|
|
||||||
|
# pull-images pulls images from the public CI registry to the internal CI registry.
|
||||||
|
pull-images:
|
||||||
|
extends:
|
||||||
|
- .copy-images
|
||||||
|
stage: pull
|
||||||
variables:
|
variables:
|
||||||
IN_REGISTRY: "${STAGING_REGISTRY}"
|
IN_REGISTRY: "${STAGING_REGISTRY}"
|
||||||
IN_IMAGE_NAME: container-toolkit
|
IN_IMAGE_NAME: ${STAGING_REGISTRY}/container-toolkit
|
||||||
IN_VERSION: "${STAGING_VERSION}"
|
IN_IMAGE_TAG: "${STAGING_VERSION}"
|
||||||
|
|
||||||
|
OUT_REGISTRY: "${CI_REGISTRY}"
|
||||||
OUT_REGISTRY_USER: "${CI_REGISTRY_USER}"
|
OUT_REGISTRY_USER: "${CI_REGISTRY_USER}"
|
||||||
OUT_REGISTRY_TOKEN: "${CI_REGISTRY_PASSWORD}"
|
OUT_REGISTRY_TOKEN: "${CI_REGISTRY_PASSWORD}"
|
||||||
OUT_REGISTRY: "${CI_REGISTRY}"
|
|
||||||
OUT_IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
OUT_IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
||||||
PUSH_MULTIPLE_TAGS: "false"
|
OUT_IMAGE_TAG: "${CI_COMMIT_SHORT_SHA}"
|
||||||
# We delay the job start to allow the public pipeline to generate the required images.
|
# We delay the job start to allow the public pipeline to generate the required images.
|
||||||
rules:
|
rules:
|
||||||
|
# If the pipeline is triggered from a tag or the WEB UI we don't delay the
|
||||||
|
# start of the pipeline.
|
||||||
|
- if: $CI_COMMIT_TAG || $CI_PIPELINE_SOURCE == "web"
|
||||||
|
# If the pipeline is triggered through other means (i.e. a branch or MR)
|
||||||
|
# we add a 30 minute delay to ensure that the images are available in the
|
||||||
|
# public CI registry.
|
||||||
- when: delayed
|
- when: delayed
|
||||||
start_in: 30 minutes
|
start_in: 30 minutes
|
||||||
timeout: 30 minutes
|
timeout: 30 minutes
|
||||||
@@ -59,35 +103,6 @@ variables:
|
|||||||
when:
|
when:
|
||||||
- job_execution_timeout
|
- job_execution_timeout
|
||||||
- stuck_or_timeout_failure
|
- stuck_or_timeout_failure
|
||||||
before_script:
|
|
||||||
- !reference [.regctl-setup, before_script]
|
|
||||||
- apk add --no-cache make bash
|
|
||||||
- >
|
|
||||||
regctl manifest get ${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST} --list > /dev/null && echo "${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST}" || ( echo "${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST} does not exist" && sleep infinity )
|
|
||||||
script:
|
|
||||||
- regctl registry login "${OUT_REGISTRY}" -u "${OUT_REGISTRY_USER}" -p "${OUT_REGISTRY_TOKEN}"
|
|
||||||
- make -f build/container/Makefile IMAGE=${IN_REGISTRY}/${IN_IMAGE_NAME}:${IN_VERSION}-${DIST} OUT_IMAGE=${OUT_IMAGE_NAME}:${CI_COMMIT_SHORT_SHA}-${DIST} push-${DIST}
|
|
||||||
|
|
||||||
image-centos7:
|
|
||||||
extends:
|
|
||||||
- .dist-centos7
|
|
||||||
- .image-pull
|
|
||||||
|
|
||||||
image-ubi8:
|
|
||||||
extends:
|
|
||||||
- .dist-ubi8
|
|
||||||
- .image-pull
|
|
||||||
|
|
||||||
image-ubuntu20.04:
|
|
||||||
extends:
|
|
||||||
- .dist-ubuntu20.04
|
|
||||||
- .image-pull
|
|
||||||
|
|
||||||
# The DIST=packaging target creates an image containing all built packages
|
|
||||||
image-packaging:
|
|
||||||
extends:
|
|
||||||
- .dist-packaging
|
|
||||||
- .image-pull
|
|
||||||
|
|
||||||
# We skip the integration tests for the internal CI:
|
# We skip the integration tests for the internal CI:
|
||||||
.integration:
|
.integration:
|
||||||
@@ -99,26 +114,37 @@ image-packaging:
|
|||||||
|
|
||||||
# The .scan step forms the base of the image scan operation performed before releasing
|
# The .scan step forms the base of the image scan operation performed before releasing
|
||||||
# images.
|
# images.
|
||||||
.scan:
|
scan-images:
|
||||||
stage: scan
|
stage: scan
|
||||||
|
needs:
|
||||||
|
- pull-images
|
||||||
image: "${PULSE_IMAGE}"
|
image: "${PULSE_IMAGE}"
|
||||||
|
parallel:
|
||||||
|
matrix:
|
||||||
|
- TAG_SUFFIX: [""]
|
||||||
|
PLATFORM: ["linux/amd64", "linux/arm64"]
|
||||||
|
- TAG_SUFFIX: "-packaging"
|
||||||
|
PLATFORM: "linux/amd64"
|
||||||
variables:
|
variables:
|
||||||
IMAGE: "${CI_REGISTRY_IMAGE}/container-toolkit:${CI_COMMIT_SHORT_SHA}-${DIST}"
|
IMAGE: "${CI_REGISTRY_IMAGE}/container-toolkit:${CI_COMMIT_SHORT_SHA}"
|
||||||
IMAGE_ARCHIVE: "container-toolkit-${DIST}-${ARCH}-${CI_JOB_ID}.tar"
|
IMAGE_ARCHIVE: "container-toolkit-${CI_JOB_ID}.tar"
|
||||||
rules:
|
rules:
|
||||||
- if: $SKIP_SCANS != "yes"
|
- if: $IGNORE_SCANS == "yes"
|
||||||
- when: manual
|
allow_failure: true
|
||||||
before_script:
|
- when: on_success
|
||||||
- docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
|
||||||
# TODO: We should specify the architecture here and scan all architectures
|
|
||||||
- docker pull --platform="${PLATFORM}" "${IMAGE}"
|
|
||||||
- docker save "${IMAGE}" -o "${IMAGE_ARCHIVE}"
|
|
||||||
- AuthHeader=$(echo -n $SSA_CLIENT_ID:$SSA_CLIENT_SECRET | base64 -w0)
|
|
||||||
- >
|
|
||||||
export SSA_TOKEN=$(curl --request POST --header "Authorization: Basic $AuthHeader" --header "Content-Type: application/x-www-form-urlencoded" ${SSA_ISSUER_URL} | jq ".access_token" | tr -d '"')
|
|
||||||
- if [ -z "$SSA_TOKEN" ]; then exit 1; else echo "SSA_TOKEN set!"; fi
|
|
||||||
script:
|
script:
|
||||||
- pulse-cli -n $NSPECT_ID --ssa $SSA_TOKEN scan -i $IMAGE_ARCHIVE -p $CONTAINER_POLICY -o
|
- |
|
||||||
|
docker login -u "${CI_REGISTRY_USER}" -p "${CI_REGISTRY_PASSWORD}" "${CI_REGISTRY}"
|
||||||
|
export SCAN_IMAGE=${IMAGE}${TAG_SUFFIX}
|
||||||
|
echo "Scanning image ${SCAN_IMAGE} for ${PLATFORM}"
|
||||||
|
docker pull --platform="${PLATFORM}" "${SCAN_IMAGE}"
|
||||||
|
docker save "${SCAN_IMAGE}" -o "${IMAGE_ARCHIVE}"
|
||||||
|
AuthHeader=$(echo -n $SSA_CLIENT_ID:$SSA_CLIENT_SECRET | base64 -w0)
|
||||||
|
export SSA_TOKEN=$(curl --request POST --header "Authorization: Basic $AuthHeader" --header "Content-Type: application/x-www-form-urlencoded" ${SSA_ISSUER_URL} | jq ".access_token" | tr -d '"')
|
||||||
|
if [ -z "$SSA_TOKEN" ]; then exit 1; else echo "SSA_TOKEN set!"; fi
|
||||||
|
|
||||||
|
pulse-cli -n $NSPECT_ID --ssa $SSA_TOKEN scan -i $IMAGE_ARCHIVE -p $CONTAINER_POLICY -o
|
||||||
|
rm -f "${IMAGE_ARCHIVE}"
|
||||||
artifacts:
|
artifacts:
|
||||||
when: always
|
when: always
|
||||||
expire_in: 1 week
|
expire_in: 1 week
|
||||||
@@ -129,72 +155,10 @@ image-packaging:
|
|||||||
- vulns.json
|
- vulns.json
|
||||||
- policy_evaluation.json
|
- policy_evaluation.json
|
||||||
|
|
||||||
# Define the scan targets
|
upload-kitmaker-packages:
|
||||||
scan-centos7-amd64:
|
|
||||||
extends:
|
|
||||||
- .dist-centos7
|
|
||||||
- .platform-amd64
|
|
||||||
- .scan
|
|
||||||
needs:
|
|
||||||
- image-centos7
|
|
||||||
|
|
||||||
scan-centos7-arm64:
|
|
||||||
extends:
|
|
||||||
- .dist-centos7
|
|
||||||
- .platform-arm64
|
|
||||||
- .scan
|
|
||||||
needs:
|
|
||||||
- image-centos7
|
|
||||||
- scan-centos7-amd64
|
|
||||||
|
|
||||||
scan-ubuntu20.04-amd64:
|
|
||||||
extends:
|
|
||||||
- .dist-ubuntu20.04
|
|
||||||
- .platform-amd64
|
|
||||||
- .scan
|
|
||||||
needs:
|
|
||||||
- image-ubuntu20.04
|
|
||||||
|
|
||||||
scan-ubuntu20.04-arm64:
|
|
||||||
extends:
|
|
||||||
- .dist-ubuntu20.04
|
|
||||||
- .platform-arm64
|
|
||||||
- .scan
|
|
||||||
needs:
|
|
||||||
- image-ubuntu20.04
|
|
||||||
- scan-ubuntu20.04-amd64
|
|
||||||
|
|
||||||
scan-ubi8-amd64:
|
|
||||||
extends:
|
|
||||||
- .dist-ubi8
|
|
||||||
- .platform-amd64
|
|
||||||
- .scan
|
|
||||||
needs:
|
|
||||||
- image-ubi8
|
|
||||||
|
|
||||||
scan-ubi8-arm64:
|
|
||||||
extends:
|
|
||||||
- .dist-ubi8
|
|
||||||
- .platform-arm64
|
|
||||||
- .scan
|
|
||||||
needs:
|
|
||||||
- image-ubi8
|
|
||||||
- scan-ubi8-amd64
|
|
||||||
|
|
||||||
# Define external release helpers
|
|
||||||
.release:ngc:
|
|
||||||
extends:
|
|
||||||
- .release:external
|
|
||||||
variables:
|
|
||||||
OUT_REGISTRY_USER: "${NGC_REGISTRY_USER}"
|
|
||||||
OUT_REGISTRY_TOKEN: "${NGC_REGISTRY_TOKEN}"
|
|
||||||
OUT_REGISTRY: "${NGC_REGISTRY}"
|
|
||||||
OUT_IMAGE_NAME: "${NGC_REGISTRY_IMAGE}"
|
|
||||||
|
|
||||||
.release:packages:
|
|
||||||
stage: release
|
stage: release
|
||||||
needs:
|
needs:
|
||||||
- image-packaging
|
- pull-images
|
||||||
variables:
|
variables:
|
||||||
VERSION: "${CI_COMMIT_SHORT_SHA}"
|
VERSION: "${CI_COMMIT_SHORT_SHA}"
|
||||||
PACKAGE_REGISTRY: "${CI_REGISTRY}"
|
PACKAGE_REGISTRY: "${CI_REGISTRY}"
|
||||||
@@ -203,39 +167,125 @@ scan-ubi8-arm64:
|
|||||||
PACKAGE_IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
PACKAGE_IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
||||||
PACKAGE_IMAGE_TAG: "${CI_COMMIT_SHORT_SHA}-packaging"
|
PACKAGE_IMAGE_TAG: "${CI_COMMIT_SHORT_SHA}-packaging"
|
||||||
KITMAKER_ARTIFACTORY_REPO: "${ARTIFACTORY_REPO_BASE}-generic-local/${KITMAKER_RELEASE_FOLDER}"
|
KITMAKER_ARTIFACTORY_REPO: "${ARTIFACTORY_REPO_BASE}-generic-local/${KITMAKER_RELEASE_FOLDER}"
|
||||||
|
ARTIFACTS_DIR: "${CI_PROJECT_DIR}/artifacts"
|
||||||
script:
|
script:
|
||||||
- !reference [.regctl-setup, before_script]
|
- !reference [.regctl-setup, before_script]
|
||||||
- apk add --no-cache bash git
|
- apk add --no-cache bash git
|
||||||
- regctl registry login "${PACKAGE_REGISTRY}" -u "${PACKAGE_REGISTRY_USER}" -p "${PACKAGE_REGISTRY_TOKEN}"
|
- regctl registry login "${PACKAGE_REGISTRY}" -u "${PACKAGE_REGISTRY_USER}" -p "${PACKAGE_REGISTRY_TOKEN}"
|
||||||
- ./scripts/extract-packages.sh "${PACKAGE_IMAGE_NAME}:${PACKAGE_IMAGE_TAG}"
|
- ./scripts/extract-packages.sh "${PACKAGE_IMAGE_NAME}:${PACKAGE_IMAGE_TAG}"
|
||||||
# TODO: ./scripts/release-packages-artifactory.sh "${DIST}-${ARCH}" "${PACKAGE_ARTIFACTORY_REPO}"
|
|
||||||
- ./scripts/release-kitmaker-artifactory.sh "${KITMAKER_ARTIFACTORY_REPO}"
|
- ./scripts/release-kitmaker-artifactory.sh "${KITMAKER_ARTIFACTORY_REPO}"
|
||||||
|
- rm -rf ${ARTIFACTS_DIR}
|
||||||
|
|
||||||
# Define the package release targets
|
push-images-to-staging:
|
||||||
release:packages:kitmaker:
|
|
||||||
extends:
|
extends:
|
||||||
- .release:packages
|
- .copy-images
|
||||||
|
stage: release
|
||||||
release:staging-ubuntu20.04:
|
|
||||||
extends:
|
|
||||||
- .release:staging
|
|
||||||
- .dist-ubuntu20.04
|
|
||||||
needs:
|
needs:
|
||||||
- image-ubuntu20.04
|
- scan-images
|
||||||
|
variables:
|
||||||
|
IN_REGISTRY: "${CI_REGISTRY}"
|
||||||
|
IN_REGISTRY_USER: "${CI_REGISTRY_USER}"
|
||||||
|
IN_REGISTRY_TOKEN: "${CI_REGISTRY_PASSWORD}"
|
||||||
|
IN_IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
||||||
|
IN_IMAGE_TAG: "${CI_COMMIT_SHORT_SHA}"
|
||||||
|
|
||||||
# Define the external release targets
|
OUT_REGISTRY: "${NGC_REGISTRY}"
|
||||||
# Release to NGC
|
OUT_REGISTRY_USER: "${NGC_REGISTRY_USER}"
|
||||||
release:ngc-centos7:
|
OUT_REGISTRY_TOKEN: "${NGC_REGISTRY_TOKEN}"
|
||||||
extends:
|
OUT_IMAGE_NAME: "${NGC_STAGING_REGISTRY}/container-toolkit"
|
||||||
- .dist-centos7
|
OUT_IMAGE_TAG: "${CI_COMMIT_SHORT_SHA}"
|
||||||
- .release:ngc
|
|
||||||
|
|
||||||
release:ngc-ubuntu20.04:
|
.release-images:
|
||||||
extends:
|
extends:
|
||||||
- .dist-ubuntu20.04
|
- .copy-images
|
||||||
- .release:ngc
|
stage: release
|
||||||
|
needs:
|
||||||
|
- scan-images
|
||||||
|
- push-images-to-staging
|
||||||
|
variables:
|
||||||
|
IN_REGISTRY: "${CI_REGISTRY}"
|
||||||
|
IN_REGISTRY_USER: "${CI_REGISTRY_USER}"
|
||||||
|
IN_REGISTRY_TOKEN: "${CI_REGISTRY_PASSWORD}"
|
||||||
|
IN_IMAGE_NAME: "${CI_REGISTRY_IMAGE}/container-toolkit"
|
||||||
|
IN_IMAGE_TAG: "${CI_COMMIT_SHORT_SHA}"
|
||||||
|
|
||||||
release:ngc-ubi8:
|
OUT_REGISTRY: "${NGC_REGISTRY}"
|
||||||
|
OUT_REGISTRY_USER: "${NGC_REGISTRY_USER}"
|
||||||
|
OUT_REGISTRY_TOKEN: "${NGC_REGISTRY_TOKEN}"
|
||||||
|
OUT_IMAGE_NAME: "${NGC_REGISTRY_IMAGE}"
|
||||||
|
OUT_IMAGE_TAG: "${CI_COMMIT_TAG}"
|
||||||
|
|
||||||
|
release-images-to-ngc:
|
||||||
extends:
|
extends:
|
||||||
- .dist-ubi8
|
- .release-images
|
||||||
- .release:ngc
|
rules:
|
||||||
|
- if: $CI_COMMIT_TAG
|
||||||
|
|
||||||
|
release-images-dummy:
|
||||||
|
extends:
|
||||||
|
- .release-images
|
||||||
|
variables:
|
||||||
|
REGCTL: "echo [DUMMY] regctl"
|
||||||
|
rules:
|
||||||
|
- if: $CI_COMMIT_TAG == null || $CI_COMMIT_TAG == ""
|
||||||
|
|
||||||
|
# .sign-images forms the base of the jobs which sign images in the NGC registry.
|
||||||
|
.sign-images:
|
||||||
|
stage: sign
|
||||||
|
image: ubuntu:latest
|
||||||
|
parallel:
|
||||||
|
matrix:
|
||||||
|
- TAG_SUFFIX: ["", "-packaging"]
|
||||||
|
variables:
|
||||||
|
IMAGE_NAME: "${NGC_REGISTRY_IMAGE}"
|
||||||
|
IMAGE_TAG: "${CI_COMMIT_TAG}"
|
||||||
|
NGC_CLI: "ngc-cli/ngc"
|
||||||
|
before_script:
|
||||||
|
- !reference [.ngccli-setup, before_script]
|
||||||
|
script:
|
||||||
|
- |
|
||||||
|
# We ensure that the IMAGE_NAME and IMAGE_TAG is set
|
||||||
|
echo Image Name: ${IMAGE_NAME} && [[ -n "${IMAGE_NAME}" ]] || exit 1
|
||||||
|
echo Image Tag: ${IMAGE_TAG} && [[ -n "${IMAGE_TAG}" ]] || exit 1
|
||||||
|
|
||||||
|
export IMAGE=${IMAGE_NAME}:${IMAGE_TAG}${TAG_SUFFIX}
|
||||||
|
echo "Signing the image ${IMAGE}"
|
||||||
|
${NGC_CLI} registry image publish --source ${IMAGE} ${IMAGE} --public --discoverable --allow-guest --sign --org nvidia
|
||||||
|
|
||||||
|
# Define the external image signing steps for NGC
|
||||||
|
# Download the ngc cli binary for use in the sign steps
|
||||||
|
.ngccli-setup:
|
||||||
|
before_script:
|
||||||
|
- apt-get update && apt-get install -y curl unzip jq
|
||||||
|
- |
|
||||||
|
if [ -z "${NGCCLI_VERSION}" ]; then
|
||||||
|
NGC_VERSION_URL="https://api.ngc.nvidia.com/v2/resources/nvidia/ngc-apps/ngc_cli/versions"
|
||||||
|
# Extract the latest version from the JSON data using jq
|
||||||
|
export NGCCLI_VERSION=$(curl -s $NGC_VERSION_URL | jq -r '.recipe.latestVersionIdStr')
|
||||||
|
fi
|
||||||
|
echo "NGCCLI_VERSION ${NGCCLI_VERSION}"
|
||||||
|
- curl -sSLo ngccli_linux.zip https://api.ngc.nvidia.com/v2/resources/nvidia/ngc-apps/ngc_cli/versions/${NGCCLI_VERSION}/files/ngccli_linux.zip
|
||||||
|
- unzip ngccli_linux.zip
|
||||||
|
- chmod u+x ngc-cli/ngc
|
||||||
|
|
||||||
|
sign-ngc-images:
|
||||||
|
extends:
|
||||||
|
- .sign-images
|
||||||
|
needs:
|
||||||
|
- release-images-to-ngc
|
||||||
|
rules:
|
||||||
|
- if: $CI_COMMIT_TAG
|
||||||
|
variables:
|
||||||
|
NGC_CLI_API_KEY: "${NGC_REGISTRY_TOKEN}"
|
||||||
|
retry:
|
||||||
|
max: 2
|
||||||
|
|
||||||
|
sign-images-dummy:
|
||||||
|
extends:
|
||||||
|
- .sign-images
|
||||||
|
needs:
|
||||||
|
- release-images-dummy
|
||||||
|
variables:
|
||||||
|
NGC_CLI: "echo [DUMMY] ngc-cli/ngc"
|
||||||
|
rules:
|
||||||
|
- if: $CI_COMMIT_TAG == null || $CI_COMMIT_TAG == ""
|
||||||
|
|||||||
336
CHANGELOG.md
336
CHANGELOG.md
@@ -1,5 +1,341 @@
|
|||||||
# NVIDIA Container Toolkit Changelog
|
# NVIDIA Container Toolkit Changelog
|
||||||
|
|
||||||
|
## v1.18.0-rc.1
|
||||||
|
|
||||||
|
- Add create-soname-symlinks hook
|
||||||
|
- Require matching version of libnvidia-container-tools
|
||||||
|
- Add envvar for libcuda.so parent dir to CDI spec
|
||||||
|
- Add EnvVar to Discover interface
|
||||||
|
- Resolve to legacy by default in nvidia-container-runtime-hook
|
||||||
|
- Default to jit-cdi mode in the nvidia runtime
|
||||||
|
- Use functional options to construct runtime mode resolver
|
||||||
|
- Add NVIDIA_CTK_CONFIG_FILE_PATH envvar
|
||||||
|
- Switch to cuda ubi9 base image
|
||||||
|
- Use single version tag for image
|
||||||
|
- BUGFIX: modifier: respect GPU volume-mount device requests
|
||||||
|
- Ensure consistent sorting of annotation devices
|
||||||
|
- Extract deb and rpm packages to single image
|
||||||
|
- Remove docker-run as default runtime candidate
|
||||||
|
- Return annotation devices from VisibleDevices
|
||||||
|
- Make CDI device requests consistent with other methods
|
||||||
|
- Construct container info once
|
||||||
|
- Add logic to extract annotation device requests to image type
|
||||||
|
- Add IsPrivileged function to CUDA container type
|
||||||
|
- Add device IDs to nvcdi.GetSpec API
|
||||||
|
- Refactor extracting requested devices from the container image
|
||||||
|
- Add EnvVars option for all nvidia-ctk cdi commands
|
||||||
|
- Add nvidia-cdi-refresh service
|
||||||
|
- Add discovery of arch-specific vulkan ICD
|
||||||
|
- Add disabled-device-node-modification hook to CDI spec
|
||||||
|
- Add a hook to disable device node creation in a container
|
||||||
|
- Remove redundant deduplication of search paths for WSL
|
||||||
|
- Added ability to disable specific (or all) CDI hooks
|
||||||
|
- Consolidate HookName functionality on internal/discover pkg
|
||||||
|
- Add envvar to control debug logging in CDI hooks
|
||||||
|
- Add FeatureFlags to the nvcdi API
|
||||||
|
- Reenable nvsandboxutils for driver discovery
|
||||||
|
- Edit discover.mounts to have a deterministic output
|
||||||
|
- Refactor the way we create CDI Hooks
|
||||||
|
- Issue warning on unsupported CDI hook
|
||||||
|
- Run update-ldcache in isolated namespaces
|
||||||
|
- Add cuda-compat-mode config option
|
||||||
|
- Fix mode detection on Thor-based systems
|
||||||
|
- Add rprivate to CDI mount options
|
||||||
|
- Skip nil discoverers in merge
|
||||||
|
- bump runc go dep to v1.3.0
|
||||||
|
- Fix resolution of libs in LDCache on ARM
|
||||||
|
- Updated .release:staging to stage images in nvstaging
|
||||||
|
- Refactor toolkit installer
|
||||||
|
- Allow container runtime executable path to be specified
|
||||||
|
- Add support for building ubuntu22.04 on arm64
|
||||||
|
- Fix race condition in mounts cache
|
||||||
|
- Add support for building ubuntu22.04 on amd64
|
||||||
|
- Fix update-ldcache arguments
|
||||||
|
- Remove positional arguments from nvidia-ctk-installer
|
||||||
|
- Remove deprecated --runtime-args from nvidia-ctk-installer
|
||||||
|
- Add version info to nvidia-ctk-installer
|
||||||
|
- Update nvidia-ctk-installer app name to match binary name
|
||||||
|
- Allow nvidia-ctk config --set to accept comma-separated lists
|
||||||
|
- Disable enable-cuda-compat hook for management containers
|
||||||
|
- Allow enable-cuda-compat hook to be disabled in CDI spec generation
|
||||||
|
- Add disable-cuda-compat-lib-hook feature flag
|
||||||
|
- Add basic integration tests for forward compat
|
||||||
|
- Ensure that mode hook is executed last
|
||||||
|
- Add enable-cuda-compat hook to CDI spec generation
|
||||||
|
- Add ldconfig hook in legacy mode
|
||||||
|
- Add enable-cuda-compat hook if required
|
||||||
|
- Add enable-cuda-compat hook to allow compat libs to be discovered
|
||||||
|
- Use libcontainer execseal to run ldconfig
|
||||||
|
- Add ignore-imex-channel-requests feature flag
|
||||||
|
- Disable nvsandboxutils in nvcdi API
|
||||||
|
- Allow cdi mode to work with --gpus flag
|
||||||
|
- Add E2E GitHub Action for Container Toolkit
|
||||||
|
- Add remote-test option for E2E
|
||||||
|
- Enable CDI in runtime if CDI_ENABLED is set
|
||||||
|
- Fix overwriting docker feature flags
|
||||||
|
- Add option in toolkit container to enable CDI in runtime
|
||||||
|
- Remove Set from engine config API
|
||||||
|
- Add EnableCDI() method to engine.Interface
|
||||||
|
- Add IMEX binaries to CDI discovery
|
||||||
|
- Rename test folder to tests
|
||||||
|
- Add allow-cuda-compat-libs-from-container feature flag
|
||||||
|
- Disable mounting of compat libs from container
|
||||||
|
- Skip graphics modifier in CSV mode
|
||||||
|
- Move nvidia-toolkit to nvidia-ctk-installer
|
||||||
|
- Automated regression testing for the NVIDIA Container Toolkit
|
||||||
|
- Add support for containerd version 3 config
|
||||||
|
- Remove watch option from create-dev-char-symlinks
|
||||||
|
- Add string TOML source
|
||||||
|
- Improve the implementation for UseLegacyConfig
|
||||||
|
- Properly pass configSearchPaths to a Driver constructor
|
||||||
|
- Fix create-device-node test when devices exist
|
||||||
|
- Add imex mode to CDI spec generation
|
||||||
|
- Only allow host-relative LDConfig paths
|
||||||
|
- Fix NVIDIA_IMEX_CHANNELS handling on legacy images
|
||||||
|
- Fix bug in default config file path
|
||||||
|
- Fix fsnotify.Remove logic function.
|
||||||
|
- Force symlink creation in create-symlink hook
|
||||||
|
|
||||||
|
### Changes in the Toolkit Container
|
||||||
|
|
||||||
|
- Create /work/nvidia-toolkit symlink
|
||||||
|
- Use Apache license for images
|
||||||
|
- Switch to golang distroless image
|
||||||
|
- Switch to cuda ubi9 base image
|
||||||
|
- Use single version tag for image
|
||||||
|
- Extract deb and rpm packages to single image
|
||||||
|
- Bump nvidia/cuda in /deployments/container
|
||||||
|
- Bump nvidia/cuda in /deployments/container
|
||||||
|
- Add E2E GitHub Action for Container Toolkit
|
||||||
|
- Bump nvidia/cuda in /deployments/container
|
||||||
|
- Move nvidia-toolkit to nvidia-ctk-installer
|
||||||
|
- Add support for containerd version 3 config
|
||||||
|
- Improve the implementation for UseLegacyConfig
|
||||||
|
- Bump nvidia/cuda in /deployments/container
|
||||||
|
- Add imex mode to CDI spec generation
|
||||||
|
- Only allow host-relative LDConfig paths
|
||||||
|
- Fallback to file for runtime config
|
||||||
|
|
||||||
|
### Changes in libnvidia-container
|
||||||
|
|
||||||
|
- Fix pointer accessing local variable out of scope
|
||||||
|
- Require version match between libnvidia-container-tools and libnvidia-container1
|
||||||
|
- Add libnvidia-gpucomp.so to the list of compute libs
|
||||||
|
- Use VERSION_ prefix for version parts in makefiles
|
||||||
|
- Add additional logging
|
||||||
|
- Do not discard container flags when --cuda-compat-mode is not specified
|
||||||
|
- Remove unneeded --no-cntlibs argument from list command
|
||||||
|
- Add cuda-compat-mode flag to configure command
|
||||||
|
- Skip files when user has insufficient permissions
|
||||||
|
- Fix building with Go 1.24
|
||||||
|
- Add no-cntlibs CLI option to nvidia-container-cli
|
||||||
|
- Fix always using fallback
|
||||||
|
- Add fallback for systems without memfd_create()
|
||||||
|
- Create virtual copy of host ldconfig binary before calling fexecve()
|
||||||
|
- Fix some typos in text.
|
||||||
|
|
||||||
|
|
||||||
|
## v1.17.0
|
||||||
|
- Promote v1.17.0-rc.2 to v1.17.0
|
||||||
|
- Fix bug when using just-in-time CDI spec generation
|
||||||
|
- Check for valid paths in create-symlinks hook
|
||||||
|
|
||||||
|
## v1.17.0-rc.2
|
||||||
|
- Fix bug in locating libcuda.so from ldcache
|
||||||
|
- Fix bug in sorting of symlink chain
|
||||||
|
- Remove unsupported print-ldcache command
|
||||||
|
- Remove csv-filename support from create-symlinks
|
||||||
|
|
||||||
|
### Changes in the Toolkit Container
|
||||||
|
- Fallback to `crio-status` if `crio status` does not work when configuring the crio runtime
|
||||||
|
|
||||||
|
## v1.17.0-rc.1
|
||||||
|
- Allow IMEX channels to be requested as volume mounts
|
||||||
|
- Fix typo in error message
|
||||||
|
- Add disable-imex-channel-creation feature flag
|
||||||
|
- Add -z,lazy to LDFLAGS
|
||||||
|
- Add imex channels to management CDI spec
|
||||||
|
- Add support to fetch current container runtime config from the command line.
|
||||||
|
- Add creation of select driver symlinks to CDI spec generation.
|
||||||
|
- Remove support for config overrides when configuring runtimes.
|
||||||
|
- Skip explicit creation of libnvidia-allocator.so.1 symlink
|
||||||
|
- Add vdpau as as a driver library search path.
|
||||||
|
- Add support for using libnvsandboxutils to generate CDI specifications.
|
||||||
|
|
||||||
|
### Changes in the Toolkit Container
|
||||||
|
|
||||||
|
- Allow opt-in features to be selected when deploying the toolkit-container.
|
||||||
|
- Bump CUDA base image version to 12.6.2
|
||||||
|
- Remove support for config overrides when configuring runtimes.
|
||||||
|
|
||||||
|
### Changes in libnvidia-container
|
||||||
|
|
||||||
|
- Add no-create-imex-channels command line option.
|
||||||
|
|
||||||
|
## v1.16.2
|
||||||
|
- Exclude libnvidia-allocator from graphics mounts. This fixes a bug that leaks mounts when a container is started with bi-directional mount propagation.
|
||||||
|
- Use empty string for default runtime-config-override. This removes a redundant warning for runtimes (e.g. Docker) where this is not applicable.
|
||||||
|
|
||||||
|
### Changes in the Toolkit Container
|
||||||
|
- Bump CUDA base image version to 12.6.0
|
||||||
|
|
||||||
|
### Changes in libnvidia-container
|
||||||
|
- Add no-gsp-firmware command line option
|
||||||
|
- Add no-fabricmanager command line option
|
||||||
|
- Add no-persistenced command line option
|
||||||
|
- Skip directories and symlinks when mounting libraries.
|
||||||
|
|
||||||
|
## v1.16.1
|
||||||
|
- Fix bug with processing errors during CDI spec generation for MIG devices
|
||||||
|
|
||||||
|
## v1.16.0
|
||||||
|
- Promote v1.16.0-rc.2 to v1.16.0
|
||||||
|
|
||||||
|
### Changes in the Toolkit Container
|
||||||
|
- Bump CUDA base image version to 12.5.1
|
||||||
|
|
||||||
|
## v1.16.0-rc.2
|
||||||
|
- Use relative path to locate driver libraries
|
||||||
|
- Add RelativeToRoot function to Driver
|
||||||
|
- Inject additional libraries for full X11 functionality
|
||||||
|
- Extract options from default runtime if runc does not exist
|
||||||
|
- Avoid using map pointers as maps are always passed by reference
|
||||||
|
- Reduce logging for the NVIDIA Container runtime
|
||||||
|
- Fix bug in argument parsing for logger creation
|
||||||
|
|
||||||
|
## v1.16.0-rc.1
|
||||||
|
|
||||||
|
- Support vulkan ICD files directly in a driver root. This allows for the discovery of vulkan files in GKE driver installations.
|
||||||
|
- Increase priority of ld.so.conf.d config file injected into container. This ensures that injected libraries are preferred over libraries present in the container.
|
||||||
|
- Set default CDI spec permissions to 644. This fixes permission issues when using the `nvidia-ctk cdi transform` functions.
|
||||||
|
- Add `dev-root` option to `nvidia-ctk system create-device-nodes` command.
|
||||||
|
- Fix location of `libnvidia-ml.so.1` when a non-standard driver root is used. This enabled CDI spec generation when using the driver container on a host.
|
||||||
|
- Recalculate minimum required CDI spec version on save.
|
||||||
|
- Move `nvidia-ctk hook` commands to a separate `nvidia-cdi-hook` binary. The same subcommands are supported.
|
||||||
|
- Use `:` as an `nvidia-ctk config --set` list separator. This fixes a bug when trying to set config options that are lists.
|
||||||
|
|
||||||
|
- [toolkit-container] Bump CUDA base image version to 12.5.0
|
||||||
|
- [toolkit-container] Allow the path to `toolkit.pid` to be specified directly.
|
||||||
|
- [toolkit-container] Remove provenance information from image manifests.
|
||||||
|
- [toolkit-container] Add `dev-root` option when configuring the toolkit. This adds support for GKE driver installations.
|
||||||
|
|
||||||
|
## v1.15.0
|
||||||
|
|
||||||
|
* Remove `nvidia-container-runtime` and `nvidia-docker2` packages.
|
||||||
|
* Use `XDG_DATA_DIRS` environment variable when locating config files such as graphics config files.
|
||||||
|
* Add support for v0.7.0 Container Device Interface (CDI) specification.
|
||||||
|
* Add `--config-search-path` option to `nvidia-ctk cdi generate` command. These paths are used when locating driver files such as graphics config files.
|
||||||
|
* Use D3DKMTEnumAdapters3 to enumerate adpaters on WSL2 if available.
|
||||||
|
* Add support for v1.2.0 OCI Runtime specification.
|
||||||
|
* Explicitly set `NVIDIA_VISIBLE_DEVICES=void` in generated CDI specifications. This prevents the NVIDIA Container Runtime from making additional modifications.
|
||||||
|
|
||||||
|
* [libnvidia-container] Use D3DKMTEnumAdapters3 to enumerate adpaters on WSL2 if available.
|
||||||
|
|
||||||
|
* [toolkit-container] Bump CUDA base image version to 12.4.1
|
||||||
|
|
||||||
|
## v1.15.0-rc.4
|
||||||
|
* Add a `--spec-dir` option to the `nvidia-ctk cdi generate` command. This allows specs outside of `/etc/cdi` and `/var/run/cdi` to be processed.
|
||||||
|
* Add support for extracting device major number from `/proc/devices` if `nvidia` is used as a device name over `nvidia-frontend`.
|
||||||
|
* Allow multiple device naming strategies for `nvidia-ctk cdi generate` command. This allows a single
|
||||||
|
CDI spec to be generated that includes GPUs by index and UUID.
|
||||||
|
* Set the default `--device-name-strategy` for the `nvidia-ctk cdi generate` command to `[index, uuid]`.
|
||||||
|
* Remove `libnvidia-container0` jetpack dependency included for legacy Tegra-based systems.
|
||||||
|
* Add `NVIDIA_VISIBLE_DEVICES=void` to generated CDI specifications.
|
||||||
|
|
||||||
|
* [toolkit-container] Remove centos7 image. The ubi8 image can be used on all RPM-based platforms.
|
||||||
|
* [toolkit-container] Bump CUDA base image version to 12.3.2
|
||||||
|
|
||||||
|
## v1.15.0-rc.3
|
||||||
|
* Fix bug in `nvidia-ctk hook update-ldcache` where default `--ldconfig-path` value was not applied.
|
||||||
|
|
||||||
|
## v1.15.0-rc.2
|
||||||
|
* Extend the `runtime.nvidia.com/gpu` CDI kind to support full-GPUs and MIG devices specified by index or UUID.
|
||||||
|
* Fix bug when specifying `--dev-root` for Tegra-based systems.
|
||||||
|
* Log explicitly requested runtime mode.
|
||||||
|
* Remove package dependency on libseccomp.
|
||||||
|
* Added detection of libnvdxgdmal.so.1 on WSL2
|
||||||
|
* Use devRoot to resolve MIG device nodes.
|
||||||
|
* Fix bug in determining default nvidia-container-runtime.user config value on SUSE-based systems.
|
||||||
|
* Add `crun` to the list of configured low-level runtimes.
|
||||||
|
* Added support for `--ldconfig-path` to `nvidia-ctk cdi generate` command.
|
||||||
|
* Fix `nvidia-ctk runtime configure --cdi.enabled` for Docker.
|
||||||
|
* Add discovery of the GDRCopy device (`gdrdrv`) if the `NVIDIA_GDRCOPY` environment variable of the container is set to `enabled`
|
||||||
|
|
||||||
|
* [toolkit-container] Bump CUDA base image version to 12.3.1.
|
||||||
|
|
||||||
|
## v1.15.0-rc.1
|
||||||
|
* Skip update of ldcache in containers without ldconfig. The .so.SONAME symlinks are still created.
|
||||||
|
* Normalize ldconfig path on use. This automatically adjust the ldconfig setting applied to ldconfig.real on systems where this exists.
|
||||||
|
* Include `nvidia/nvoptix.bin` in list of graphics mounts.
|
||||||
|
* Include `vulkan/icd.d/nvidia_layers.json` in list of graphics mounts.
|
||||||
|
* Add support for `--library-search-paths` to `nvidia-ctk cdi generate` command.
|
||||||
|
* Add support for injecting /dev/nvidia-nvswitch* devices if the NVIDIA_NVSWITCH=enabled envvar is specified.
|
||||||
|
* Added support for `nvidia-ctk runtime configure --enable-cdi` for the `docker` runtime. Note that this requires Docker >= 25.
|
||||||
|
* Fixed bug in `nvidia-ctk config` command when using `--set`. The types of applied config options are now applied correctly.
|
||||||
|
* Add `--relative-to` option to `nvidia-ctk transform root` command. This controls whether the root transformation is applied to host or container paths.
|
||||||
|
* Added automatic CDI spec generation when the `runtime.nvidia.com/gpu=all` device is requested by a container.
|
||||||
|
|
||||||
|
* [libnvidia-container] Fix device permission check when using cgroupv2 (fixes #227)
|
||||||
|
|
||||||
|
## v1.14.3
|
||||||
|
* [toolkit-container] Bump CUDA base image version to 12.2.2.
|
||||||
|
|
||||||
|
## v1.14.2
|
||||||
|
* Fix bug on Tegra-based systems where symlinks were not created in containers.
|
||||||
|
* Add --csv.ignore-pattern command line option to nvidia-ctk cdi generate command.
|
||||||
|
|
||||||
|
## v1.14.1
|
||||||
|
* Fixed bug where contents of `/etc/nvidia-container-runtime/config.toml` is ignored by the NVIDIA Container Runtime Hook.
|
||||||
|
|
||||||
|
* [libnvidia-container] Use libelf.so on RPM-based systems due to removed mageia repositories hosting pmake and bmake.
|
||||||
|
|
||||||
|
## v1.14.0
|
||||||
|
* Promote v1.14.0-rc.3 to v1.14.0
|
||||||
|
|
||||||
|
## v1.14.0-rc.3
|
||||||
|
* Added support for generating OCI hook JSON file to `nvidia-ctk runtime configure` command.
|
||||||
|
* Remove installation of OCI hook JSON from RPM package.
|
||||||
|
* Refactored config for `nvidia-container-runtime-hook`.
|
||||||
|
* Added a `nvidia-ctk config` command which supports setting config options using a `--set` flag.
|
||||||
|
* Added `--library-search-path` option to `nvidia-ctk cdi generate` command in `csv` mode. This allows folders where
|
||||||
|
libraries are located to be specified explicitly.
|
||||||
|
* Updated go-nvlib to support devices which are not present in the PCI device database. This allows the creation of dev/char symlinks on systems with such devices installed.
|
||||||
|
* Added `UsesNVGPUModule` info function for more robust platform detection. This is required on Tegra-based systems where libnvidia-ml.so is also supported.
|
||||||
|
|
||||||
|
* [toolkit-container] Set `NVIDIA_VISIBLE_DEVICES=void` to prevent injection of NVIDIA devices and drivers into the NVIDIA Container Toolkit container.
|
||||||
|
|
||||||
|
## v1.14.0-rc.2
|
||||||
|
* Fix bug causing incorrect nvidia-smi symlink to be created on WSL2 systems with multiple driver roots.
|
||||||
|
* Remove dependency on coreutils when installing package on RPM-based systems.
|
||||||
|
* Create output folders if required when running `nvidia-ctk runtime configure`
|
||||||
|
* Generate default config as post-install step.
|
||||||
|
* Added support for detecting GSP firmware at custom paths when generating CDI specifications.
|
||||||
|
* Added logic to skip the extraction of image requirements if `NVIDIA_DISABLE_REQUIRES` is set to `true`.
|
||||||
|
|
||||||
|
* [libnvidia-container] Include Shared Compiler Library (libnvidia-gpucomp.so) in the list of compute libaries.
|
||||||
|
|
||||||
|
* [toolkit-container] Ensure that common envvars have higher priority when configuring the container engines.
|
||||||
|
* [toolkit-container] Bump CUDA base image version to 12.2.0.
|
||||||
|
* [toolkit-container] Remove installation of nvidia-experimental runtime. This is superceded by the NVIDIA Container Runtime in CDI mode.
|
||||||
|
|
||||||
|
## v1.14.0-rc.1
|
||||||
|
|
||||||
|
* Add support for updating containerd configs to the `nvidia-ctk runtime configure` command.
|
||||||
|
* Create file in `etc/ld.so.conf.d` with permissions `644` to support non-root containers.
|
||||||
|
* Generate CDI specification files with `644` permissions to allow rootless applications (e.g. podman)
|
||||||
|
* Add `nvidia-ctk cdi list` command to show the known CDI devices.
|
||||||
|
* Add support for generating merged devices (e.g. `all` device) to the nvcdi API.
|
||||||
|
* Use *.* pattern to locate libcuda.so when generating a CDI specification to support platforms where a patch version is not specified.
|
||||||
|
* Update go-nvlib to skip devices that are not MIG capable when generating CDI specifications.
|
||||||
|
* Add `nvidia-container-runtime-hook.path` config option to specify NVIDIA Container Runtime Hook path explicitly.
|
||||||
|
* Fix bug in creation of `/dev/char` symlinks by failing operation if kernel modules are not loaded.
|
||||||
|
* Add option to load kernel modules when creating device nodes
|
||||||
|
* Add option to create device nodes when creating `/dev/char` symlinks
|
||||||
|
|
||||||
|
* [libnvidia-container] Support OpenSSL 3 with the Encrypt/Decrypt library
|
||||||
|
|
||||||
|
* [toolkit-container] Allow same envars for all runtime configs
|
||||||
|
|
||||||
## v1.13.1
|
## v1.13.1
|
||||||
|
|
||||||
* Update `update-ldcache` hook to only update ldcache if it exists.
|
* Update `update-ldcache` hook to only update ldcache if it exists.
|
||||||
|
|||||||
@@ -19,7 +19,7 @@ where `TARGET` is a make target that is valid for each of the sub-components.
|
|||||||
|
|
||||||
These include:
|
These include:
|
||||||
* `ubuntu18.04-amd64`
|
* `ubuntu18.04-amd64`
|
||||||
* `centos8-x86_64`
|
* `centos7-x86_64`
|
||||||
|
|
||||||
If no `TARGET` is specified, all valid release targets are built.
|
If no `TARGET` is specified, all valid release targets are built.
|
||||||
|
|
||||||
@@ -34,7 +34,7 @@ environment variables.
|
|||||||
|
|
||||||
## Testing packages locally
|
## Testing packages locally
|
||||||
|
|
||||||
The [test/release](./test/release/) folder contains documentation on how the installation of local or staged packages can be tested.
|
The [tests/release](./tests/release/) folder contains documentation on how the installation of local or staged packages can be tested.
|
||||||
|
|
||||||
|
|
||||||
## Releasing
|
## Releasing
|
||||||
|
|||||||
142
Jenkinsfile
vendored
142
Jenkinsfile
vendored
@@ -1,142 +0,0 @@
|
|||||||
/*
|
|
||||||
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
podTemplate (cloud:'sw-gpu-cloudnative',
|
|
||||||
containers: [
|
|
||||||
containerTemplate(name: 'docker', image: 'docker:dind', ttyEnabled: true, privileged: true),
|
|
||||||
containerTemplate(name: 'golang', image: 'golang:1.16.3', ttyEnabled: true)
|
|
||||||
]) {
|
|
||||||
node(POD_LABEL) {
|
|
||||||
def scmInfo
|
|
||||||
|
|
||||||
stage('checkout') {
|
|
||||||
scmInfo = checkout(scm)
|
|
||||||
}
|
|
||||||
|
|
||||||
stage('dependencies') {
|
|
||||||
container('golang') {
|
|
||||||
sh 'GO111MODULE=off go get -u github.com/client9/misspell/cmd/misspell'
|
|
||||||
sh 'GO111MODULE=off go get -u github.com/gordonklaus/ineffassign'
|
|
||||||
sh 'GO111MODULE=off go get -u golang.org/x/lint/golint'
|
|
||||||
}
|
|
||||||
container('docker') {
|
|
||||||
sh 'apk add --no-cache make bash git'
|
|
||||||
}
|
|
||||||
}
|
|
||||||
stage('check') {
|
|
||||||
parallel (
|
|
||||||
getGolangStages(["assert-fmt", "lint", "vet", "ineffassign", "misspell"])
|
|
||||||
)
|
|
||||||
}
|
|
||||||
stage('test') {
|
|
||||||
parallel (
|
|
||||||
getGolangStages(["test"])
|
|
||||||
)
|
|
||||||
}
|
|
||||||
|
|
||||||
def versionInfo
|
|
||||||
stage('version') {
|
|
||||||
container('docker') {
|
|
||||||
versionInfo = getVersionInfo(scmInfo)
|
|
||||||
println "versionInfo=${versionInfo}"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def dist = 'ubuntu20.04'
|
|
||||||
def arch = 'amd64'
|
|
||||||
def stageLabel = "${dist}-${arch}"
|
|
||||||
|
|
||||||
stage('build-one') {
|
|
||||||
container('docker') {
|
|
||||||
stage (stageLabel) {
|
|
||||||
sh "make ${dist}-${arch}"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
stage('release') {
|
|
||||||
container('docker') {
|
|
||||||
stage (stageLabel) {
|
|
||||||
|
|
||||||
def component = 'main'
|
|
||||||
def repository = 'sw-gpu-cloudnative-debian-local/pool/main/'
|
|
||||||
|
|
||||||
def uploadSpec = """{
|
|
||||||
"files":
|
|
||||||
[ {
|
|
||||||
"pattern": "./dist/${dist}/${arch}/*.deb",
|
|
||||||
"target": "${repository}",
|
|
||||||
"props": "deb.distribution=${dist};deb.component=${component};deb.architecture=${arch}"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}"""
|
|
||||||
|
|
||||||
sh "echo starting release with versionInfo=${versionInfo}"
|
|
||||||
if (versionInfo.isTag) {
|
|
||||||
// upload to artifactory repository
|
|
||||||
def server = Artifactory.server 'sw-gpu-artifactory'
|
|
||||||
server.upload spec: uploadSpec
|
|
||||||
} else {
|
|
||||||
sh "echo skipping release for non-tagged build"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
def getGolangStages(def targets) {
|
|
||||||
stages = [:]
|
|
||||||
|
|
||||||
for (t in targets) {
|
|
||||||
stages[t] = getLintClosure(t)
|
|
||||||
}
|
|
||||||
|
|
||||||
return stages
|
|
||||||
}
|
|
||||||
|
|
||||||
def getLintClosure(def target) {
|
|
||||||
return {
|
|
||||||
container('golang') {
|
|
||||||
stage(target) {
|
|
||||||
sh "make ${target}"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// getVersionInfo returns a hash of version info
|
|
||||||
def getVersionInfo(def scmInfo) {
|
|
||||||
def versionInfo = [
|
|
||||||
isTag: isTag(scmInfo.GIT_BRANCH)
|
|
||||||
]
|
|
||||||
|
|
||||||
scmInfo.each { k, v -> versionInfo[k] = v }
|
|
||||||
return versionInfo
|
|
||||||
}
|
|
||||||
|
|
||||||
def isTag(def branch) {
|
|
||||||
if (!branch.startsWith('v')) {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
def version = shOutput('git describe --all --exact-match --always')
|
|
||||||
return version == "tags/${branch}"
|
|
||||||
}
|
|
||||||
|
|
||||||
def shOuptut(def script) {
|
|
||||||
return sh(script: script, returnStdout: true).trim()
|
|
||||||
}
|
|
||||||
116
Makefile
116
Makefile
@@ -38,8 +38,8 @@ EXAMPLE_TARGETS := $(patsubst %,example-%, $(EXAMPLES))
|
|||||||
CMDS := $(patsubst ./cmd/%/,%,$(sort $(dir $(wildcard ./cmd/*/))))
|
CMDS := $(patsubst ./cmd/%/,%,$(sort $(dir $(wildcard ./cmd/*/))))
|
||||||
CMD_TARGETS := $(patsubst %,cmd-%, $(CMDS))
|
CMD_TARGETS := $(patsubst %,cmd-%, $(CMDS))
|
||||||
|
|
||||||
CHECK_TARGETS := assert-fmt vet lint ineffassign misspell
|
CHECK_TARGETS := lint
|
||||||
MAKE_TARGETS := binaries build check fmt lint-internal test examples cmds coverage generate licenses $(CHECK_TARGETS)
|
MAKE_TARGETS := binaries build check fmt test examples cmds coverage generate licenses vendor check-vendor $(CHECK_TARGETS)
|
||||||
|
|
||||||
TARGETS := $(MAKE_TARGETS) $(EXAMPLE_TARGETS) $(CMD_TARGETS)
|
TARGETS := $(MAKE_TARGETS) $(EXAMPLE_TARGETS) $(CMD_TARGETS)
|
||||||
|
|
||||||
@@ -53,22 +53,26 @@ CLI_VERSION = $(VERSION)
|
|||||||
endif
|
endif
|
||||||
CLI_VERSION_PACKAGE = github.com/NVIDIA/nvidia-container-toolkit/internal/info
|
CLI_VERSION_PACKAGE = github.com/NVIDIA/nvidia-container-toolkit/internal/info
|
||||||
|
|
||||||
GOOS ?= linux
|
|
||||||
|
|
||||||
binaries: cmds
|
binaries: cmds
|
||||||
ifneq ($(PREFIX),)
|
ifneq ($(PREFIX),)
|
||||||
cmd-%: COMMAND_BUILD_OPTIONS = -o $(PREFIX)/$(*)
|
cmd-%: COMMAND_BUILD_OPTIONS = -o $(PREFIX)/$(*)
|
||||||
endif
|
endif
|
||||||
cmds: $(CMD_TARGETS)
|
cmds: $(CMD_TARGETS)
|
||||||
|
|
||||||
|
ifneq ($(shell uname),Darwin)
|
||||||
|
EXTLDFLAGS = -Wl,--export-dynamic -Wl,--unresolved-symbols=ignore-in-object-files -Wl,-z,lazy
|
||||||
|
else
|
||||||
|
EXTLDFLAGS = -Wl,-undefined,dynamic_lookup
|
||||||
|
endif
|
||||||
$(CMD_TARGETS): cmd-%:
|
$(CMD_TARGETS): cmd-%:
|
||||||
GOOS=$(GOOS) go build -ldflags "-extldflags=-Wl,-z,lazy -s -w -X $(CLI_VERSION_PACKAGE).gitCommit=$(GIT_COMMIT) -X $(CLI_VERSION_PACKAGE).version=$(CLI_VERSION)" $(COMMAND_BUILD_OPTIONS) $(MODULE)/cmd/$(*)
|
go build -ldflags "-s -w '-extldflags=$(EXTLDFLAGS)' -X $(CLI_VERSION_PACKAGE).gitCommit=$(GIT_COMMIT) -X $(CLI_VERSION_PACKAGE).version=$(CLI_VERSION)" $(COMMAND_BUILD_OPTIONS) $(MODULE)/cmd/$(*)
|
||||||
|
|
||||||
build:
|
build:
|
||||||
GOOS=$(GOOS) go build ./...
|
go build ./...
|
||||||
|
|
||||||
examples: $(EXAMPLE_TARGETS)
|
examples: $(EXAMPLE_TARGETS)
|
||||||
$(EXAMPLE_TARGETS): example-%:
|
$(EXAMPLE_TARGETS): example-%:
|
||||||
GOOS=$(GOOS) go build ./examples/$(*)
|
go build ./examples/$(*)
|
||||||
|
|
||||||
all: check test build binary
|
all: check test build binary
|
||||||
check: $(CHECK_TARGETS)
|
check: $(CHECK_TARGETS)
|
||||||
@@ -78,71 +82,75 @@ fmt:
|
|||||||
go list -f '{{.Dir}}' $(MODULE)/... \
|
go list -f '{{.Dir}}' $(MODULE)/... \
|
||||||
| xargs gofmt -s -l -w
|
| xargs gofmt -s -l -w
|
||||||
|
|
||||||
assert-fmt:
|
# Apply goimports -local github.com/NVIDIA/container-toolkit to the codebase
|
||||||
go list -f '{{.Dir}}' $(MODULE)/... \
|
goimports:
|
||||||
| xargs gofmt -s -l > fmt.out
|
go list -f {{.Dir}} $(MODULE)/... \
|
||||||
@if [ -s fmt.out ]; then \
|
| xargs goimports -local $(MODULE) -w
|
||||||
echo "\nERROR: The following files are not formatted:\n"; \
|
|
||||||
cat fmt.out; \
|
|
||||||
rm fmt.out; \
|
|
||||||
exit 1; \
|
|
||||||
else \
|
|
||||||
rm fmt.out; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
ineffassign:
|
|
||||||
ineffassign $(MODULE)/...
|
|
||||||
|
|
||||||
lint:
|
lint:
|
||||||
# We use `go list -f '{{.Dir}}' $(MODULE)/...` to skip the `vendor` folder.
|
golangci-lint run ./...
|
||||||
go list -f '{{.Dir}}' $(MODULE)/... | xargs golint -set_exit_status
|
|
||||||
|
|
||||||
misspell:
|
vendor: | mod-tidy mod-vendor mod-verify
|
||||||
misspell $(MODULE)/...
|
|
||||||
|
|
||||||
vet:
|
mod-tidy:
|
||||||
go vet $(MODULE)/...
|
@for mod in $$(find . -name go.mod -not -path "./testdata/*" -not -path "./third_party/*"); do \
|
||||||
|
echo "Tidying $$mod..."; ( \
|
||||||
|
cd $$(dirname $$mod) && go mod tidy \
|
||||||
|
) || exit 1; \
|
||||||
|
done
|
||||||
|
|
||||||
|
mod-vendor:
|
||||||
|
@for mod in $$(find . -name go.mod -not -path "./testdata/*" -not -path "./third_party/*" -not -path "./deployments/*"); do \
|
||||||
|
echo "Vendoring $$mod..."; ( \
|
||||||
|
cd $$(dirname $$mod) && go mod vendor \
|
||||||
|
) || exit 1; \
|
||||||
|
done
|
||||||
|
|
||||||
|
mod-verify:
|
||||||
|
@for mod in $$(find . -name go.mod -not -path "./testdata/*" -not -path "./third_party/*"); do \
|
||||||
|
echo "Verifying $$mod..."; ( \
|
||||||
|
cd $$(dirname $$mod) && go mod verify | sed 's/^/ /g' \
|
||||||
|
) || exit 1; \
|
||||||
|
done
|
||||||
|
|
||||||
|
|
||||||
|
check-vendor: vendor
|
||||||
|
git diff --exit-code HEAD -- go.mod go.sum vendor
|
||||||
|
|
||||||
licenses:
|
licenses:
|
||||||
go-licenses csv $(MODULE)/...
|
go-licenses csv $(MODULE)/...
|
||||||
|
|
||||||
COVERAGE_FILE := coverage.out
|
COVERAGE_FILE := coverage.out
|
||||||
test: build cmds
|
test: build cmds
|
||||||
go test -v -coverprofile=$(COVERAGE_FILE) $(MODULE)/...
|
go test -coverprofile=$(COVERAGE_FILE).with-mocks $(MODULE)/...
|
||||||
|
|
||||||
coverage: test
|
coverage: test
|
||||||
cat $(COVERAGE_FILE) | grep -v "_mock.go" > $(COVERAGE_FILE).no-mocks
|
cat $(COVERAGE_FILE).with-mocks | grep -v "_mock.go" > $(COVERAGE_FILE)
|
||||||
go tool cover -func=$(COVERAGE_FILE).no-mocks
|
go tool cover -func=$(COVERAGE_FILE)
|
||||||
|
|
||||||
generate:
|
generate:
|
||||||
go generate $(MODULE)/...
|
go generate $(MODULE)/...
|
||||||
|
|
||||||
# Generate an image for containerized builds
|
# Generate an image for containerized builds
|
||||||
# Note: This image is local only
|
# Note: This image is local only
|
||||||
.PHONY: .build-image .pull-build-image .push-build-image
|
.PHONY: .build-image
|
||||||
.build-image: docker/Dockerfile.devel
|
.build-image:
|
||||||
if [ x"$(SKIP_IMAGE_BUILD)" = x"" ]; then \
|
make -f deployments/devel/Makefile .build-image
|
||||||
$(DOCKER) build \
|
|
||||||
--progress=plain \
|
|
||||||
--build-arg GOLANG_VERSION="$(GOLANG_VERSION)" \
|
|
||||||
--tag $(BUILDIMAGE) \
|
|
||||||
-f $(^) \
|
|
||||||
docker; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
.pull-build-image:
|
ifeq ($(BUILD_DEVEL_IMAGE),yes)
|
||||||
$(DOCKER) pull $(BUILDIMAGE)
|
$(DOCKER_TARGETS): .build-image
|
||||||
|
.shell: .build-image
|
||||||
|
endif
|
||||||
|
|
||||||
.push-build-image:
|
$(DOCKER_TARGETS): docker-%:
|
||||||
$(DOCKER) push $(BUILDIMAGE)
|
@echo "Running 'make $(*)' in container image $(BUILDIMAGE)"
|
||||||
|
|
||||||
$(DOCKER_TARGETS): docker-%: .build-image
|
|
||||||
@echo "Running 'make $(*)' in docker container $(BUILDIMAGE)"
|
|
||||||
$(DOCKER) run \
|
$(DOCKER) run \
|
||||||
--rm \
|
--rm \
|
||||||
-e GOCACHE=/tmp/.cache \
|
-e GOCACHE=/tmp/.cache/go \
|
||||||
-v $(PWD):$(PWD) \
|
-e GOMODCACHE=/tmp/.cache/gomod \
|
||||||
-w $(PWD) \
|
-e GOLANGCI_LINT_CACHE=/tmp/.cache/golangci-lint \
|
||||||
|
-v $(PWD):/work \
|
||||||
|
-w /work \
|
||||||
--user $$(id -u):$$(id -g) \
|
--user $$(id -u):$$(id -g) \
|
||||||
$(BUILDIMAGE) \
|
$(BUILDIMAGE) \
|
||||||
make $(*)
|
make $(*)
|
||||||
@@ -153,8 +161,10 @@ PHONY: .shell
|
|||||||
$(DOCKER) run \
|
$(DOCKER) run \
|
||||||
--rm \
|
--rm \
|
||||||
-ti \
|
-ti \
|
||||||
-e GOCACHE=/tmp/.cache \
|
-e GOCACHE=/tmp/.cache/go \
|
||||||
-v $(PWD):$(PWD) \
|
-e GOMODCACHE=/tmp/.cache/gomod \
|
||||||
-w $(PWD) \
|
-e GOLANGCI_LINT_CACHE=/tmp/.cache/golangci-lint \
|
||||||
|
-v $(PWD):/work \
|
||||||
|
-w /work \
|
||||||
--user $$(id -u):$$(id -g) \
|
--user $$(id -u):$$(id -g) \
|
||||||
$(BUILDIMAGE)
|
$(BUILDIMAGE)
|
||||||
|
|||||||
36
RELEASE.md
Normal file
36
RELEASE.md
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
# Release Process
|
||||||
|
|
||||||
|
The NVIDIA Container Toolkit consists of the following artifacts:
|
||||||
|
- The NVIDIA Container Toolkit container
|
||||||
|
- Packages for debian-based systems
|
||||||
|
- Packages for rpm-based systems
|
||||||
|
|
||||||
|
# Release Process Checklist:
|
||||||
|
- [ ] Create a release PR:
|
||||||
|
- [ ] Run the `./hack/prepare-release.sh` script to update the version in all the needed files. This also creates a [release issue](https://github.com/NVIDIA/cloud-native-team/issues?q=is%3Aissue+is%3Aopen+label%3Arelease)
|
||||||
|
- [ ] Run the `./hack/generate-changelog.sh` script to generate the a draft changelog and update `CHANGELOG.md` with the changes.
|
||||||
|
- [ ] Create a PR from the created `bump-release-{{ .VERSION }}` branch.
|
||||||
|
- [ ] Merge the release PR
|
||||||
|
- [ ] Tag the release and push the tag to the `internal` mirror:
|
||||||
|
- [ ] Image release pipeline: https://gitlab-master.nvidia.com/dl/container-dev/container-toolkit/-/pipelines/16466098
|
||||||
|
- [ ] Wait for the image release to complete.
|
||||||
|
- [ ] Push the tag to the the upstream GitHub repo.
|
||||||
|
- [ ] Wait for the [`Release`](https://github.com/NVIDIA/k8s-device-plugin/actions/workflows/release.yaml) GitHub Action to complete
|
||||||
|
- [ ] Publish the [draft release](https://github.com/NVIDIA/k8s-device-plugin/releases) created by the GitHub Action
|
||||||
|
- [ ] Publish the packages to the gh-pages branch of the libnvidia-container repo
|
||||||
|
- [ ] Create a KitPick
|
||||||
|
|
||||||
|
## Troubleshooting
|
||||||
|
|
||||||
|
*Note*: This assumes that we have the release tag checked out locally.
|
||||||
|
|
||||||
|
- If the `Release` GitHub Action fails:
|
||||||
|
- Check the logs for the error first.
|
||||||
|
- Create the helm packages locally by running:
|
||||||
|
```bash
|
||||||
|
./hack/prepare-artifacts.sh {{ .VERSION }}
|
||||||
|
```
|
||||||
|
- Create the draft release by running:
|
||||||
|
```bash
|
||||||
|
./hack/create-release.sh {{ .VERSION }}
|
||||||
|
```
|
||||||
24
SECURITY.md
Normal file
24
SECURITY.md
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
# Security
|
||||||
|
|
||||||
|
NVIDIA is dedicated to the security and trust of our software products and services, including all source code repositories managed through our organization.
|
||||||
|
|
||||||
|
If you need to report a security issue, please use the appropriate contact points outlined below. **Please do not report security vulnerabilities through GitHub.**
|
||||||
|
|
||||||
|
## Reporting Potential Security Vulnerability in an NVIDIA Product
|
||||||
|
|
||||||
|
To report a potential security vulnerability in any NVIDIA product:
|
||||||
|
- Web: [Security Vulnerability Submission Form](https://www.nvidia.com/object/submit-security-vulnerability.html)
|
||||||
|
- E-Mail: psirt@nvidia.com
|
||||||
|
- We encourage you to use the following PGP key for secure email communication: [NVIDIA public PGP Key for communication](https://www.nvidia.com/en-us/security/pgp-key)
|
||||||
|
- Please include the following information:
|
||||||
|
- Product/Driver name and version/branch that contains the vulnerability
|
||||||
|
- Type of vulnerability (code execution, denial of service, buffer overflow, etc.)
|
||||||
|
- Instructions to reproduce the vulnerability
|
||||||
|
- Proof-of-concept or exploit code
|
||||||
|
- Potential impact of the vulnerability, including how an attacker could exploit the vulnerability
|
||||||
|
|
||||||
|
While NVIDIA currently does not have a bug bounty program, we do offer acknowledgement when an externally reported security issue is addressed under our coordinated vulnerability disclosure policy. Please visit our [Product Security Incident Response Team (PSIRT)](https://www.nvidia.com/en-us/security/psirt-policies/) policies page for more information.
|
||||||
|
|
||||||
|
## NVIDIA Product Security
|
||||||
|
|
||||||
|
For all security-related concerns, please visit NVIDIA's Product Security portal at https://www.nvidia.com/en-us/security
|
||||||
@@ -1,97 +0,0 @@
|
|||||||
# Copyright (c) 2019-2021, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
ARG BASE_DIST
|
|
||||||
ARG CUDA_VERSION
|
|
||||||
ARG GOLANG_VERSION=x.x.x
|
|
||||||
ARG VERSION="N/A"
|
|
||||||
|
|
||||||
# NOTE: In cases where the libc version is a concern, we would have to use an
|
|
||||||
# image based on the target OS to build the golang executables here -- especially
|
|
||||||
# if cgo code is included.
|
|
||||||
FROM golang:${GOLANG_VERSION} as build
|
|
||||||
|
|
||||||
# We override the GOPATH to ensure that the binaries are installed to
|
|
||||||
# /artifacts/bin
|
|
||||||
ARG GOPATH=/artifacts
|
|
||||||
|
|
||||||
# Install the experiemental nvidia-container-runtime
|
|
||||||
# NOTE: This will be integrated into the nvidia-container-toolkit package / repo
|
|
||||||
ARG NVIDIA_CONTAINER_RUNTIME_EXPERIMENTAL_VERSION=experimental
|
|
||||||
RUN GOPATH=/artifacts go install github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-container-runtime.experimental@${NVIDIA_CONTAINER_RUNTIME_EXPERIMENTAL_VERSION}
|
|
||||||
|
|
||||||
WORKDIR /build
|
|
||||||
COPY . .
|
|
||||||
|
|
||||||
# NOTE: Until the config utilities are properly integrated into the
|
|
||||||
# nvidia-container-toolkit repository, these are built from the `tools` folder
|
|
||||||
# and not `cmd`.
|
|
||||||
RUN GOPATH=/artifacts go install -ldflags="-s -w -X 'main.Version=${VERSION}'" ./tools/...
|
|
||||||
|
|
||||||
|
|
||||||
FROM nvidia/cuda:${CUDA_VERSION}-base-${BASE_DIST}
|
|
||||||
|
|
||||||
ARG BASE_DIST
|
|
||||||
# See https://www.centos.org/centos-linux-eol/
|
|
||||||
# and https://stackoverflow.com/a/70930049 for move to vault.centos.org
|
|
||||||
# and https://serverfault.com/questions/1093922/failing-to-run-yum-update-in-centos-8 for move to vault.epel.cloud
|
|
||||||
RUN [[ "${BASE_DIST}" != "centos8" ]] || \
|
|
||||||
( \
|
|
||||||
sed -i 's/mirrorlist/#mirrorlist/g' /etc/yum.repos.d/CentOS-Linux-* && \
|
|
||||||
sed -i 's|#baseurl=http://mirror.centos.org|baseurl=http://vault.epel.cloud|g' /etc/yum.repos.d/CentOS-Linux-* \
|
|
||||||
)
|
|
||||||
|
|
||||||
ENV NVIDIA_DISABLE_REQUIRE="true"
|
|
||||||
ENV NVIDIA_VISIBLE_DEVICES=all
|
|
||||||
ENV NVIDIA_DRIVER_CAPABILITIES=utility
|
|
||||||
|
|
||||||
ARG ARTIFACTS_ROOT
|
|
||||||
ARG PACKAGE_DIST
|
|
||||||
COPY ${ARTIFACTS_ROOT}/${PACKAGE_DIST} /artifacts/packages/${PACKAGE_DIST}
|
|
||||||
|
|
||||||
WORKDIR /artifacts/packages
|
|
||||||
|
|
||||||
ARG PACKAGE_VERSION
|
|
||||||
ARG TARGETARCH
|
|
||||||
ENV PACKAGE_ARCH ${TARGETARCH}
|
|
||||||
RUN PACKAGE_ARCH=${PACKAGE_ARCH/amd64/x86_64} && PACKAGE_ARCH=${PACKAGE_ARCH/arm64/aarch64} && \
|
|
||||||
yum localinstall -y \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container1-1.*.rpm \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container-tools-1.*.rpm \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/nvidia-container-toolkit*-${PACKAGE_VERSION}*.rpm
|
|
||||||
|
|
||||||
WORKDIR /work
|
|
||||||
|
|
||||||
COPY --from=build /artifacts/bin /work
|
|
||||||
|
|
||||||
ENV PATH=/work:$PATH
|
|
||||||
|
|
||||||
LABEL io.k8s.display-name="NVIDIA Container Runtime Config"
|
|
||||||
LABEL name="NVIDIA Container Runtime Config"
|
|
||||||
LABEL vendor="NVIDIA"
|
|
||||||
LABEL version="${VERSION}"
|
|
||||||
LABEL release="N/A"
|
|
||||||
LABEL summary="Automatically Configure your Container Runtime for GPU support."
|
|
||||||
LABEL description="See summary"
|
|
||||||
|
|
||||||
RUN mkdir /licenses && mv /NGC-DL-CONTAINER-LICENSE /licenses/NGC-DL-CONTAINER-LICENSE
|
|
||||||
|
|
||||||
# Install / upgrade packages here that are required to resolve CVEs
|
|
||||||
ARG CVE_UPDATES
|
|
||||||
RUN if [ -n "${CVE_UPDATES}" ]; then \
|
|
||||||
yum update -y ${CVE_UPDATES} && \
|
|
||||||
rm -rf /var/cache/yum/*; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
ENTRYPOINT ["/work/nvidia-toolkit"]
|
|
||||||
@@ -1,41 +0,0 @@
|
|||||||
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
ARG BASE_DIST
|
|
||||||
ARG CUDA_VERSION
|
|
||||||
ARG GOLANG_VERSION=x.x.x
|
|
||||||
|
|
||||||
FROM nvidia/cuda:${CUDA_VERSION}-base-${BASE_DIST}
|
|
||||||
|
|
||||||
ARG ARTIFACTS_ROOT
|
|
||||||
COPY ${ARTIFACTS_ROOT} /artifacts/packages/
|
|
||||||
|
|
||||||
WORKDIR /artifacts/packages
|
|
||||||
|
|
||||||
# build-args are added to the manifest.txt file below.
|
|
||||||
ARG BASE_DIST
|
|
||||||
ARG PACKAGE_DIST
|
|
||||||
ARG PACKAGE_VERSION
|
|
||||||
ARG GIT_BRANCH
|
|
||||||
ARG GIT_COMMIT
|
|
||||||
ARG GIT_COMMIT_SHORT
|
|
||||||
ARG SOURCE_DATE_EPOCH
|
|
||||||
ARG VERSION
|
|
||||||
|
|
||||||
# Create a manifest.txt file with the absolute paths of all deb and rpm packages in the container
|
|
||||||
RUN echo "#IMAGE_EPOCH=$(date '+%s')" > /artifacts/manifest.txt && \
|
|
||||||
env | sed 's/^/#/g' >> /artifacts/manifest.txt && \
|
|
||||||
find /artifacts/packages -iname '*.deb' -o -iname '*.rpm' >> /artifacts/manifest.txt
|
|
||||||
|
|
||||||
RUN mkdir /licenses && mv /NGC-DL-CONTAINER-LICENSE /licenses/NGC-DL-CONTAINER-LICENSE
|
|
||||||
@@ -1,105 +0,0 @@
|
|||||||
# Copyright (c) 2019-2021, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
ARG BASE_DIST
|
|
||||||
ARG CUDA_VERSION
|
|
||||||
ARG GOLANG_VERSION=x.x.x
|
|
||||||
ARG VERSION="N/A"
|
|
||||||
|
|
||||||
# NOTE: In cases where the libc version is a concern, we would have to use an
|
|
||||||
# image based on the target OS to build the golang executables here -- especially
|
|
||||||
# if cgo code is included.
|
|
||||||
FROM golang:${GOLANG_VERSION} as build
|
|
||||||
|
|
||||||
# We override the GOPATH to ensure that the binaries are installed to
|
|
||||||
# /artifacts/bin
|
|
||||||
ARG GOPATH=/artifacts
|
|
||||||
|
|
||||||
# Install the experiemental nvidia-container-runtime
|
|
||||||
# NOTE: This will be integrated into the nvidia-container-toolkit package / repo
|
|
||||||
ARG NVIDIA_CONTAINER_RUNTIME_EXPERIMENTAL_VERSION=experimental
|
|
||||||
RUN GOPATH=/artifacts go install github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-container-runtime.experimental@${NVIDIA_CONTAINER_RUNTIME_EXPERIMENTAL_VERSION}
|
|
||||||
|
|
||||||
WORKDIR /build
|
|
||||||
COPY . .
|
|
||||||
|
|
||||||
# NOTE: Until the config utilities are properly integrated into the
|
|
||||||
# nvidia-container-toolkit repository, these are built from the `tools` folder
|
|
||||||
# and not `cmd`.
|
|
||||||
RUN GOPATH=/artifacts go install -ldflags="-s -w -X 'main.Version=${VERSION}'" ./tools/...
|
|
||||||
|
|
||||||
|
|
||||||
FROM nvcr.io/nvidia/cuda:${CUDA_VERSION}-base-${BASE_DIST}
|
|
||||||
|
|
||||||
# Remove the CUDA repository configurations to avoid issues with rotated GPG keys
|
|
||||||
RUN rm -f /etc/apt/sources.list.d/cuda.list
|
|
||||||
|
|
||||||
ARG DEBIAN_FRONTEND=noninteractive
|
|
||||||
RUN apt-get update && apt-get install -y --no-install-recommends \
|
|
||||||
libcap2 \
|
|
||||||
curl \
|
|
||||||
&& \
|
|
||||||
rm -rf /var/lib/apt/lists/*
|
|
||||||
|
|
||||||
ENV NVIDIA_DISABLE_REQUIRE="true"
|
|
||||||
ENV NVIDIA_VISIBLE_DEVICES=all
|
|
||||||
ENV NVIDIA_DRIVER_CAPABILITIES=utility
|
|
||||||
|
|
||||||
ARG ARTIFACTS_ROOT
|
|
||||||
ARG PACKAGE_DIST
|
|
||||||
COPY ${ARTIFACTS_ROOT}/${PACKAGE_DIST} /artifacts/packages/${PACKAGE_DIST}
|
|
||||||
|
|
||||||
WORKDIR /artifacts/packages
|
|
||||||
|
|
||||||
ARG PACKAGE_VERSION
|
|
||||||
ARG TARGETARCH
|
|
||||||
ENV PACKAGE_ARCH ${TARGETARCH}
|
|
||||||
|
|
||||||
ARG LIBNVIDIA_CONTAINER_REPO="https://nvidia.github.io/libnvidia-container"
|
|
||||||
ARG LIBNVIDIA_CONTAINER0_VERSION
|
|
||||||
RUN if [ "${PACKAGE_ARCH}" = "arm64" ]; then \
|
|
||||||
curl -L ${LIBNVIDIA_CONTAINER_REPO}/${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container0_${LIBNVIDIA_CONTAINER0_VERSION}_${PACKAGE_ARCH}.deb \
|
|
||||||
--output ${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container0_${LIBNVIDIA_CONTAINER0_VERSION}_${PACKAGE_ARCH}.deb && \
|
|
||||||
dpkg -i ${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container0_${LIBNVIDIA_CONTAINER0_VERSION}_${PACKAGE_ARCH}.deb; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
RUN dpkg -i \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container1_1.*.deb \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/libnvidia-container-tools_1.*.deb \
|
|
||||||
${PACKAGE_DIST}/${PACKAGE_ARCH}/nvidia-container-toolkit*_${PACKAGE_VERSION}*.deb
|
|
||||||
|
|
||||||
WORKDIR /work
|
|
||||||
|
|
||||||
COPY --from=build /artifacts/bin /work/
|
|
||||||
|
|
||||||
ENV PATH=/work:$PATH
|
|
||||||
|
|
||||||
LABEL io.k8s.display-name="NVIDIA Container Runtime Config"
|
|
||||||
LABEL name="NVIDIA Container Runtime Config"
|
|
||||||
LABEL vendor="NVIDIA"
|
|
||||||
LABEL version="${VERSION}"
|
|
||||||
LABEL release="N/A"
|
|
||||||
LABEL summary="Automatically Configure your Container Runtime for GPU support."
|
|
||||||
LABEL description="See summary"
|
|
||||||
|
|
||||||
RUN mkdir /licenses && mv /NGC-DL-CONTAINER-LICENSE /licenses/NGC-DL-CONTAINER-LICENSE
|
|
||||||
|
|
||||||
# Install / upgrade packages here that are required to resolve CVEs
|
|
||||||
ARG CVE_UPDATES
|
|
||||||
RUN if [ -n "${CVE_UPDATES}" ]; then \
|
|
||||||
apt-get update && apt-get upgrade -y ${CVE_UPDATES} && \
|
|
||||||
rm -rf /var/lib/apt/lists/*; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
ENTRYPOINT ["/work/nvidia-toolkit"]
|
|
||||||
31
cmd/nvidia-cdi-hook/README.md
Normal file
31
cmd/nvidia-cdi-hook/README.md
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
# NVIDIA CDI Hook
|
||||||
|
|
||||||
|
The CLI `nvidia-cdi-hook` provides container device runtime hook capabilities when
|
||||||
|
called by a container runtime, as specific in a
|
||||||
|
[Container Device Interface](https://tags.cncf.io/container-device-interface/blob/main/SPEC.md)
|
||||||
|
file.
|
||||||
|
|
||||||
|
## Generating a CDI
|
||||||
|
|
||||||
|
The CDI itself is created for an NVIDIA-capable device using the
|
||||||
|
[`nvidia-ctk cdi generate`](../nvidia-ctk/) command.
|
||||||
|
|
||||||
|
When `nvidia-ctk cdi generate` is run, the CDI specification is generated as a yaml file.
|
||||||
|
The CDI specification provides instructions for a container runtime to set up devices, files and
|
||||||
|
other resources for the container prior to starting it. Those instructions
|
||||||
|
may include executing command-line tools to prepare the filesystem. The execution
|
||||||
|
of such command-line tools is called a hook.
|
||||||
|
|
||||||
|
`nvidia-cdi-hook` is the CLI tool that is expected to be called by the container runtime,
|
||||||
|
when specified by the CDI file.
|
||||||
|
|
||||||
|
See the [`nvidia-ctk` documentation](../nvidia-ctk/README.md) for more information
|
||||||
|
on generating a CDI file.
|
||||||
|
|
||||||
|
## Functionality
|
||||||
|
|
||||||
|
The `nvidia-cdi-hook` CLI provides the following functionality:
|
||||||
|
|
||||||
|
* `chmod` - Change the permissions of a file or directory inside the directory path to be mounted into a container.
|
||||||
|
* `create-symlinks` - Create symlinks inside the directory path to be mounted into a container.
|
||||||
|
* `update-ldcache` - Update the dynamic linker cache inside the directory path to be mounted into a container.
|
||||||
@@ -17,30 +17,34 @@
|
|||||||
package chmod
|
package chmod
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"io/fs"
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"syscall"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup"
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type command struct {
|
type command struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
type config struct {
|
type config struct {
|
||||||
paths cli.StringSlice
|
paths []string
|
||||||
mode string
|
modeStr string
|
||||||
|
mode fs.FileMode
|
||||||
containerSpec string
|
containerSpec string
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCommand constructs a chmod command with the specified logger
|
// NewCommand constructs a chmod command with the specified logger
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
c := command{
|
c := command{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
@@ -55,24 +59,24 @@ func (m command) build() *cli.Command {
|
|||||||
c := cli.Command{
|
c := cli.Command{
|
||||||
Name: "chmod",
|
Name: "chmod",
|
||||||
Usage: "Set the permissions of folders in the container by running chmod. The container root is prefixed to the specified paths.",
|
Usage: "Set the permissions of folders in the container by running chmod. The container root is prefixed to the specified paths.",
|
||||||
Before: func(c *cli.Context) error {
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
return validateFlags(c, &cfg)
|
return ctx, validateFlags(cmd, &cfg)
|
||||||
},
|
},
|
||||||
Action: func(c *cli.Context) error {
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
return m.run(c, &cfg)
|
return m.run(cmd, &cfg)
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
c.Flags = []cli.Flag{
|
c.Flags = []cli.Flag{
|
||||||
&cli.StringSliceFlag{
|
&cli.StringSliceFlag{
|
||||||
Name: "path",
|
Name: "path",
|
||||||
Usage: "Specifiy a path to apply the specified mode to",
|
Usage: "Specify a path to apply the specified mode to",
|
||||||
Destination: &cfg.paths,
|
Destination: &cfg.paths,
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "mode",
|
Name: "mode",
|
||||||
Usage: "Specify the file mode",
|
Usage: "Specify the file mode",
|
||||||
Destination: &cfg.mode,
|
Destination: &cfg.modeStr,
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "container-spec",
|
Name: "container-spec",
|
||||||
@@ -84,12 +88,18 @@ func (m command) build() *cli.Command {
|
|||||||
return &c
|
return &c
|
||||||
}
|
}
|
||||||
|
|
||||||
func validateFlags(c *cli.Context, cfg *config) error {
|
func validateFlags(c *cli.Command, cfg *config) error {
|
||||||
if strings.TrimSpace(cfg.mode) == "" {
|
if strings.TrimSpace(cfg.modeStr) == "" {
|
||||||
return fmt.Errorf("a non-empty mode must be specified")
|
return fmt.Errorf("a non-empty mode must be specified")
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, p := range cfg.paths.Value() {
|
modeInt, err := strconv.ParseUint(cfg.modeStr, 8, 32)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to parse mode as octal: %v", err)
|
||||||
|
}
|
||||||
|
cfg.mode = fs.FileMode(modeInt)
|
||||||
|
|
||||||
|
for _, p := range cfg.paths {
|
||||||
if strings.TrimSpace(p) == "" {
|
if strings.TrimSpace(p) == "" {
|
||||||
return fmt.Errorf("paths must not be empty")
|
return fmt.Errorf("paths must not be empty")
|
||||||
}
|
}
|
||||||
@@ -98,7 +108,7 @@ func validateFlags(c *cli.Context, cfg *config) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m command) run(c *cli.Context, cfg *config) error {
|
func (m command) run(c *cli.Command, cfg *config) error {
|
||||||
s, err := oci.LoadContainerState(cfg.containerSpec)
|
s, err := oci.LoadContainerState(cfg.containerSpec)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to load container state: %v", err)
|
return fmt.Errorf("failed to load container state: %v", err)
|
||||||
@@ -112,33 +122,38 @@ func (m command) run(c *cli.Context, cfg *config) error {
|
|||||||
return fmt.Errorf("empty container root detected")
|
return fmt.Errorf("empty container root detected")
|
||||||
}
|
}
|
||||||
|
|
||||||
paths := m.getPaths(containerRoot, cfg.paths.Value())
|
paths := m.getPaths(containerRoot, cfg.paths, cfg.mode)
|
||||||
if len(paths) == 0 {
|
if len(paths) == 0 {
|
||||||
m.logger.Debugf("No paths specified; exiting")
|
m.logger.Debugf("No paths specified; exiting")
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
locator := lookup.NewExecutableLocator(m.logger, "")
|
for _, path := range paths {
|
||||||
targets, err := locator.Locate("chmod")
|
err = os.Chmod(path, cfg.mode)
|
||||||
if err != nil {
|
// in some cases this is not an issue (e.g. whole /dev mounted), see #143
|
||||||
return fmt.Errorf("failed to locate chmod: %v", err)
|
if errors.Is(err, fs.ErrPermission) {
|
||||||
|
m.logger.Debugf("Ignoring permission error with chmod: %v", err)
|
||||||
|
err = nil
|
||||||
|
}
|
||||||
}
|
}
|
||||||
chmodPath := targets[0]
|
|
||||||
|
|
||||||
args := append([]string{filepath.Base(chmodPath), cfg.mode}, paths...)
|
return err
|
||||||
|
|
||||||
return syscall.Exec(chmodPath, args, nil)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// getPaths updates the specified paths relative to the root.
|
// getPaths updates the specified paths relative to the root.
|
||||||
func (m command) getPaths(root string, paths []string) []string {
|
func (m command) getPaths(root string, paths []string, desiredMode fs.FileMode) []string {
|
||||||
var pathsInRoot []string
|
var pathsInRoot []string
|
||||||
for _, f := range paths {
|
for _, f := range paths {
|
||||||
path := filepath.Join(root, f)
|
path := filepath.Join(root, f)
|
||||||
if _, err := os.Stat(path); err != nil {
|
stat, err := os.Stat(path)
|
||||||
|
if err != nil {
|
||||||
m.logger.Debugf("Skipping path %q: %v", path, err)
|
m.logger.Debugf("Skipping path %q: %v", path, err)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
if (stat.Mode()&(fs.ModePerm|fs.ModeSetuid|fs.ModeSetgid|fs.ModeSticky))^desiredMode == 0 {
|
||||||
|
m.logger.Debugf("Skipping path %q: already desired mode", path)
|
||||||
|
continue
|
||||||
|
}
|
||||||
pathsInRoot = append(pathsInRoot, path)
|
pathsInRoot = append(pathsInRoot, path)
|
||||||
}
|
}
|
||||||
|
|
||||||
55
cmd/nvidia-cdi-hook/commands/commands.go
Normal file
55
cmd/nvidia-cdi-hook/commands/commands.go
Normal file
@@ -0,0 +1,55 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package commands
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/chmod"
|
||||||
|
createsonamesymlinks "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/create-soname-symlinks"
|
||||||
|
symlinks "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/create-symlinks"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/cudacompat"
|
||||||
|
disabledevicenodemodification "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/disable-device-node-modification"
|
||||||
|
ldcache "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/update-ldcache"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
// New creates the commands associated with supported CDI hooks.
|
||||||
|
// These are shared by the nvidia-cdi-hook and nvidia-ctk hook commands.
|
||||||
|
func New(logger logger.Interface) []*cli.Command {
|
||||||
|
return []*cli.Command{
|
||||||
|
ldcache.NewCommand(logger),
|
||||||
|
symlinks.NewCommand(logger),
|
||||||
|
chmod.NewCommand(logger),
|
||||||
|
cudacompat.NewCommand(logger),
|
||||||
|
createsonamesymlinks.NewCommand(logger),
|
||||||
|
disabledevicenodemodification.NewCommand(logger),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// IssueUnsupportedHookWarning logs a warning that no hook or an unsupported
|
||||||
|
// hook has been specified.
|
||||||
|
// This happens if a subcommand is provided that does not match one of the
|
||||||
|
// subcommands that has been explicitly specified.
|
||||||
|
func IssueUnsupportedHookWarning(logger logger.Interface, c *cli.Command) {
|
||||||
|
args := c.Args().Slice()
|
||||||
|
if len(args) == 0 {
|
||||||
|
logger.Warningf("No CDI hook specified")
|
||||||
|
} else {
|
||||||
|
logger.Warningf("Unsupported CDI hook: %v", args[0])
|
||||||
|
}
|
||||||
|
}
|
||||||
167
cmd/nvidia-cdi-hook/create-soname-symlinks/soname-symlinks.go
Normal file
167
cmd/nvidia-cdi-hook/create-soname-symlinks/soname-symlinks.go
Normal file
@@ -0,0 +1,167 @@
|
|||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package create_soname_symlinks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/moby/sys/reexec"
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/ldconfig"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
reexecUpdateLdCacheCommandName = "reexec-create-soname-symlinks"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type options struct {
|
||||||
|
folders []string
|
||||||
|
ldconfigPath string
|
||||||
|
containerSpec string
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
reexec.Register(reexecUpdateLdCacheCommandName, createSonameSymlinksHandler)
|
||||||
|
if reexec.Init() {
|
||||||
|
os.Exit(0)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs an create-soname-symlinks command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build the create-soname-symlinks command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
cfg := options{}
|
||||||
|
|
||||||
|
// Create the 'create-soname-symlinks' command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "create-soname-symlinks",
|
||||||
|
Usage: "Create soname symlinks libraries in specified directories",
|
||||||
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
|
return ctx, m.validateFlags(cmd, &cfg)
|
||||||
|
},
|
||||||
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
return m.run(cmd, &cfg)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "folder",
|
||||||
|
Usage: "Specify a directory to generate soname symlinks in. Can be specified multiple times",
|
||||||
|
Destination: &cfg.folders,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "ldconfig-path",
|
||||||
|
Usage: "Specify the path to ldconfig on the host",
|
||||||
|
Destination: &cfg.ldconfigPath,
|
||||||
|
Value: "/sbin/ldconfig",
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "container-spec",
|
||||||
|
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN",
|
||||||
|
Destination: &cfg.containerSpec,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(c *cli.Command, cfg *options) error {
|
||||||
|
if cfg.ldconfigPath == "" {
|
||||||
|
return errors.New("ldconfig-path must be specified")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(c *cli.Command, cfg *options) error {
|
||||||
|
s, err := oci.LoadContainerState(cfg.containerSpec)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to load container state: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerRootDir, err := s.GetContainerRoot()
|
||||||
|
if err != nil || containerRootDir == "" || containerRootDir == "/" {
|
||||||
|
return fmt.Errorf("failed to determined container root: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd, err := ldconfig.NewRunner(
|
||||||
|
reexecUpdateLdCacheCommandName,
|
||||||
|
cfg.ldconfigPath,
|
||||||
|
containerRootDir,
|
||||||
|
cfg.folders...,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return cmd.Run()
|
||||||
|
}
|
||||||
|
|
||||||
|
// createSonameSymlinksHandler wraps createSonameSymlinks with error handling.
|
||||||
|
func createSonameSymlinksHandler() {
|
||||||
|
if err := createSonameSymlinks(os.Args); err != nil {
|
||||||
|
log.Printf("Error updating ldcache: %v", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// createSonameSymlinks ensures that soname symlinks are created in the
|
||||||
|
// specified directories.
|
||||||
|
// It is invoked from a reexec'd handler and provides namespace isolation for
|
||||||
|
// the operations performed by this hook. At the point where this is invoked,
|
||||||
|
// we are in a new mount namespace that is cloned from the parent.
|
||||||
|
//
|
||||||
|
// args[0] is the reexec initializer function name
|
||||||
|
// args[1] is the path of the ldconfig binary on the host
|
||||||
|
// args[2] is the container root directory
|
||||||
|
// The remaining args are directories where soname symlinks need to be created.
|
||||||
|
func createSonameSymlinks(args []string) error {
|
||||||
|
if len(args) < 3 {
|
||||||
|
return fmt.Errorf("incorrect arguments: %v", args)
|
||||||
|
}
|
||||||
|
hostLdconfigPath := args[1]
|
||||||
|
containerRootDirPath := args[2]
|
||||||
|
|
||||||
|
ldconfig, err := ldconfig.New(
|
||||||
|
hostLdconfigPath,
|
||||||
|
containerRootDirPath,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to construct ldconfig runner: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return ldconfig.CreateSonameSymlinks(args[3:]...)
|
||||||
|
}
|
||||||
173
cmd/nvidia-cdi-hook/create-symlinks/create-symlinks.go
Normal file
173
cmd/nvidia-cdi-hook/create-symlinks/create-symlinks.go
Normal file
@@ -0,0 +1,173 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package symlinks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/moby/sys/symlink"
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup/symlinks"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type config struct {
|
||||||
|
links []string
|
||||||
|
containerSpec string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a hook command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build creates the create-symlink command.
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
cfg := config{}
|
||||||
|
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "create-symlinks",
|
||||||
|
Usage: "A hook to create symlinks in the container.",
|
||||||
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
return m.run(ctx, cmd, &cfg)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "link",
|
||||||
|
Usage: "Specify a specific link to create. The link is specified as target::link. If the link exists in the container root, it is removed.",
|
||||||
|
Destination: &cfg.links,
|
||||||
|
},
|
||||||
|
// The following flags are testing-only flags.
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "container-spec",
|
||||||
|
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN. This is only intended for testing.",
|
||||||
|
Destination: &cfg.containerSpec,
|
||||||
|
Hidden: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(ctx context.Context, cmd *cli.Command, cfg *config) error {
|
||||||
|
s, err := oci.LoadContainerState(cfg.containerSpec)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to load container state: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerRoot, err := s.GetContainerRoot()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to determined container root: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
created := make(map[string]bool)
|
||||||
|
for _, l := range cfg.links {
|
||||||
|
if created[l] {
|
||||||
|
m.logger.Debugf("Link %v already processed", l)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
parts := strings.Split(l, "::")
|
||||||
|
if len(parts) != 2 {
|
||||||
|
return fmt.Errorf("invalid symlink specification %v", l)
|
||||||
|
}
|
||||||
|
|
||||||
|
err := m.createLink(containerRoot, parts[0], parts[1])
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create link %v: %w", parts, err)
|
||||||
|
}
|
||||||
|
created[l] = true
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// createLink creates a symbolic link in the specified container root.
|
||||||
|
// This is equivalent to:
|
||||||
|
//
|
||||||
|
// chroot {{ .containerRoot }} ln -f -s {{ .target }} {{ .link }}
|
||||||
|
//
|
||||||
|
// If the specified link already exists and points to the same target, this
|
||||||
|
// operation is a no-op.
|
||||||
|
// If a file exists at the link path or the link points to a different target
|
||||||
|
// this file is removed before creating the link.
|
||||||
|
//
|
||||||
|
// Note that if the link path resolves to an absolute path oudside of the
|
||||||
|
// specified root, this is treated as an absolute path in this root.
|
||||||
|
func (m command) createLink(containerRoot string, targetPath string, link string) error {
|
||||||
|
linkPath := filepath.Join(containerRoot, link)
|
||||||
|
|
||||||
|
exists, err := linkExists(targetPath, linkPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to check if link exists: %w", err)
|
||||||
|
}
|
||||||
|
if exists {
|
||||||
|
m.logger.Debugf("Link %s already exists", linkPath)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// We resolve the parent of the symlink that we're creating in the container root.
|
||||||
|
// If we resolve the full link path, an existing link at the location itself
|
||||||
|
// is also resolved here and we are unable to force create the link.
|
||||||
|
resolvedLinkParent, err := symlink.FollowSymlinkInScope(filepath.Dir(linkPath), containerRoot)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to follow path for link %v relative to %v: %w", link, containerRoot, err)
|
||||||
|
}
|
||||||
|
resolvedLinkPath := filepath.Join(resolvedLinkParent, filepath.Base(linkPath))
|
||||||
|
|
||||||
|
m.logger.Infof("Symlinking %v to %v", resolvedLinkPath, targetPath)
|
||||||
|
err = os.MkdirAll(filepath.Dir(resolvedLinkPath), 0755)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create directory: %v", err)
|
||||||
|
}
|
||||||
|
err = symlinks.ForceCreate(targetPath, resolvedLinkPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create symlink: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// linkExists checks whether the specified link exists.
|
||||||
|
// A link exists if the path exists, is a symlink, and points to the specified target.
|
||||||
|
func linkExists(target string, link string) (bool, error) {
|
||||||
|
currentTarget, err := symlinks.Resolve(link)
|
||||||
|
if errors.Is(err, os.ErrNotExist) {
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return false, fmt.Errorf("failed to resolve existing symlink %s: %w", link, err)
|
||||||
|
}
|
||||||
|
if currentTarget == target {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
297
cmd/nvidia-cdi-hook/create-symlinks/create-symlinks_test.go
Normal file
297
cmd/nvidia-cdi-hook/create-symlinks/create-symlinks_test.go
Normal file
@@ -0,0 +1,297 @@
|
|||||||
|
package symlinks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup/symlinks"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestLinkExist(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
require.NoError(
|
||||||
|
t,
|
||||||
|
makeFs(tmpDir,
|
||||||
|
dirOrLink{path: "/a/b/c", target: "d"},
|
||||||
|
dirOrLink{path: "/a/b/e", target: "/a/b/f"},
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
exists, err := linkExists("d", filepath.Join(tmpDir, "/a/b/c"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.True(t, exists)
|
||||||
|
|
||||||
|
exists, err = linkExists("/a/b/f", filepath.Join(tmpDir, "/a/b/e"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.True(t, exists)
|
||||||
|
|
||||||
|
exists, err = linkExists("different-target", filepath.Join(tmpDir, "/a/b/c"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.False(t, exists)
|
||||||
|
|
||||||
|
exists, err = linkExists("/a/b/d", filepath.Join(tmpDir, "/a/b/c"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.False(t, exists)
|
||||||
|
|
||||||
|
exists, err = linkExists("foo", filepath.Join(tmpDir, "/a/b/does-not-exist"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.False(t, exists)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCreateLink(t *testing.T) {
|
||||||
|
type link struct {
|
||||||
|
path string
|
||||||
|
target string
|
||||||
|
}
|
||||||
|
type expectedLink struct {
|
||||||
|
link
|
||||||
|
err error
|
||||||
|
}
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
containerContents []dirOrLink
|
||||||
|
link link
|
||||||
|
expectedCreateError error
|
||||||
|
expectedLinks []expectedLink
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "link to / resolves to container root",
|
||||||
|
containerContents: []dirOrLink{
|
||||||
|
{path: "/lib/foo", target: "/"},
|
||||||
|
},
|
||||||
|
link: link{
|
||||||
|
path: "/lib/foo/libfoo.so",
|
||||||
|
target: "libfoo.so.1",
|
||||||
|
},
|
||||||
|
expectedLinks: []expectedLink{
|
||||||
|
{
|
||||||
|
link: link{
|
||||||
|
path: "{{ .containerRoot }}/libfoo.so",
|
||||||
|
target: "libfoo.so.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "link to / resolves to container root; parent relative link",
|
||||||
|
containerContents: []dirOrLink{
|
||||||
|
{path: "/lib/foo", target: "/"},
|
||||||
|
},
|
||||||
|
link: link{
|
||||||
|
path: "/lib/foo/libfoo.so",
|
||||||
|
target: "../libfoo.so.1",
|
||||||
|
},
|
||||||
|
expectedLinks: []expectedLink{
|
||||||
|
{
|
||||||
|
link: link{
|
||||||
|
path: "{{ .containerRoot }}/libfoo.so",
|
||||||
|
target: "../libfoo.so.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "link to / resolves to container root; absolute link",
|
||||||
|
containerContents: []dirOrLink{
|
||||||
|
{path: "/lib/foo", target: "/"},
|
||||||
|
},
|
||||||
|
link: link{
|
||||||
|
path: "/lib/foo/libfoo.so",
|
||||||
|
target: "/a-path-in-container/foo/libfoo.so.1",
|
||||||
|
},
|
||||||
|
expectedLinks: []expectedLink{
|
||||||
|
{
|
||||||
|
link: link{
|
||||||
|
path: "{{ .containerRoot }}/libfoo.so",
|
||||||
|
target: "/a-path-in-container/foo/libfoo.so.1",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
// We also check that the target is NOT created.
|
||||||
|
link: link{
|
||||||
|
path: "{{ .containerRoot }}/a-path-in-container/foo/libfoo.so.1",
|
||||||
|
},
|
||||||
|
err: os.ErrNotExist,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
hostRoot := filepath.Join(tmpDir, "/host-root/")
|
||||||
|
containerRoot := filepath.Join(tmpDir, "/container-root")
|
||||||
|
|
||||||
|
require.NoError(t, makeFs(hostRoot))
|
||||||
|
require.NoError(t, makeFs(containerRoot, tc.containerContents...))
|
||||||
|
|
||||||
|
// nvidia-cdi-hook create-symlinks --link linkSpec
|
||||||
|
err := getTestCommand().createLink(containerRoot, tc.link.target, tc.link.path)
|
||||||
|
// TODO: We may be able to replace this with require.ErrorIs.
|
||||||
|
if tc.expectedCreateError != nil {
|
||||||
|
require.Error(t, err)
|
||||||
|
} else {
|
||||||
|
require.NoError(t, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, expectedLink := range tc.expectedLinks {
|
||||||
|
path := strings.ReplaceAll(expectedLink.path, "{{ .containerRoot }}", containerRoot)
|
||||||
|
path = strings.ReplaceAll(path, "{{ .hostRoot }}", hostRoot)
|
||||||
|
if expectedLink.target != "" {
|
||||||
|
target, err := symlinks.Resolve(path)
|
||||||
|
require.ErrorIs(t, err, expectedLink.err)
|
||||||
|
require.Equal(t, expectedLink.target, target)
|
||||||
|
} else {
|
||||||
|
_, err := os.Stat(path)
|
||||||
|
require.ErrorIs(t, err, expectedLink.err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCreateLinkRelativePath(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
hostRoot := filepath.Join(tmpDir, "/host-root/")
|
||||||
|
containerRoot := filepath.Join(tmpDir, "/container-root")
|
||||||
|
|
||||||
|
require.NoError(t, makeFs(hostRoot))
|
||||||
|
require.NoError(t, makeFs(containerRoot, dirOrLink{path: "/lib/"}))
|
||||||
|
|
||||||
|
// nvidia-cdi-hook create-symlinks --link libfoo.so.1::/lib/libfoo.so
|
||||||
|
err := getTestCommand().createLink(containerRoot, "libfoo.so.1", "/lib/libfoo.so")
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
target, err := symlinks.Resolve(filepath.Join(containerRoot, "/lib/libfoo.so"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, "libfoo.so.1", target)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCreateLinkAbsolutePath(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
hostRoot := filepath.Join(tmpDir, "/host-root/")
|
||||||
|
containerRoot := filepath.Join(tmpDir, "/container-root")
|
||||||
|
|
||||||
|
require.NoError(t, makeFs(hostRoot))
|
||||||
|
require.NoError(t, makeFs(containerRoot, dirOrLink{path: "/lib/"}))
|
||||||
|
|
||||||
|
// nvidia-cdi-hook create-symlinks --link /lib/libfoo.so.1::/lib/libfoo.so
|
||||||
|
err := getTestCommand().createLink(containerRoot, "/lib/libfoo.so.1", "/lib/libfoo.so")
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
target, err := symlinks.Resolve(filepath.Join(containerRoot, "/lib/libfoo.so"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, "/lib/libfoo.so.1", target)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCreateLinkAlreadyExists(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
containerContents []dirOrLink
|
||||||
|
shouldExist []string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "link already exists with correct target",
|
||||||
|
containerContents: []dirOrLink{{path: "/lib/libfoo.so", target: "libfoo.so.1"}},
|
||||||
|
shouldExist: []string{},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "link already exists with different target",
|
||||||
|
containerContents: []dirOrLink{{path: "/lib/libfoo.so", target: "different-target"}, {path: "different-target"}},
|
||||||
|
shouldExist: []string{"{{ .containerRoot }}/different-target"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
hostRoot := filepath.Join(tmpDir, "/host-root/")
|
||||||
|
containerRoot := filepath.Join(tmpDir, "/container-root")
|
||||||
|
require.NoError(t, makeFs(hostRoot))
|
||||||
|
require.NoError(t, makeFs(containerRoot, tc.containerContents...))
|
||||||
|
|
||||||
|
// nvidia-cdi-hook create-symlinks --link libfoo.so.1::/lib/libfoo.so
|
||||||
|
err := getTestCommand().createLink(containerRoot, "libfoo.so.1", "/lib/libfoo.so")
|
||||||
|
require.NoError(t, err)
|
||||||
|
target, err := symlinks.Resolve(filepath.Join(containerRoot, "lib/libfoo.so"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, "libfoo.so.1", target)
|
||||||
|
|
||||||
|
for _, p := range tc.shouldExist {
|
||||||
|
require.DirExists(t, strings.ReplaceAll(p, "{{ .containerRoot }}", containerRoot))
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCreateLinkOutOfBounds(t *testing.T) {
|
||||||
|
tmpDir := t.TempDir()
|
||||||
|
hostRoot := filepath.Join(tmpDir, "/host-root")
|
||||||
|
containerRoot := filepath.Join(tmpDir, "/container-root")
|
||||||
|
|
||||||
|
require.NoError(t,
|
||||||
|
makeFs(hostRoot,
|
||||||
|
dirOrLink{path: "libfoo.so"},
|
||||||
|
),
|
||||||
|
)
|
||||||
|
require.NoError(t,
|
||||||
|
makeFs(containerRoot,
|
||||||
|
dirOrLink{path: "/lib"},
|
||||||
|
dirOrLink{path: "/lib/foo", target: hostRoot},
|
||||||
|
),
|
||||||
|
)
|
||||||
|
|
||||||
|
path, err := symlinks.Resolve(filepath.Join(containerRoot, "/lib/foo"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, hostRoot, path)
|
||||||
|
|
||||||
|
// nvidia-cdi-hook create-symlinks --link ../libfoo.so.1::/lib/foo/libfoo.so
|
||||||
|
_ = getTestCommand().createLink(containerRoot, "../libfoo.so.1", "/lib/foo/libfoo.so")
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
target, err := symlinks.Resolve(filepath.Join(containerRoot, hostRoot, "libfoo.so"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, "../libfoo.so.1", target)
|
||||||
|
|
||||||
|
require.DirExists(t, filepath.Join(hostRoot, "libfoo.so"))
|
||||||
|
}
|
||||||
|
|
||||||
|
type dirOrLink struct {
|
||||||
|
path string
|
||||||
|
target string
|
||||||
|
}
|
||||||
|
|
||||||
|
func makeFs(tmpdir string, fs ...dirOrLink) error {
|
||||||
|
if err := os.MkdirAll(tmpdir, 0o755); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
for _, s := range fs {
|
||||||
|
s.path = filepath.Join(tmpdir, s.path)
|
||||||
|
if s.target == "" {
|
||||||
|
_ = os.MkdirAll(s.path, 0o755)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err := os.MkdirAll(filepath.Dir(s.path), 0o755); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := os.Symlink(s.target, s.path); err != nil && !os.IsExist(err) {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// getTestCommand creates a command for running tests against.
|
||||||
|
func getTestCommand() *command {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
return &command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
}
|
||||||
76
cmd/nvidia-cdi-hook/cudacompat/container-root.go
Normal file
76
cmd/nvidia-cdi-hook/cudacompat/container-root.go
Normal file
@@ -0,0 +1,76 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package cudacompat
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/moby/sys/symlink"
|
||||||
|
)
|
||||||
|
|
||||||
|
// A containerRoot represents the root filesystem of a container.
|
||||||
|
type containerRoot string
|
||||||
|
|
||||||
|
// hasPath checks whether the specified path exists in the root.
|
||||||
|
func (r containerRoot) hasPath(path string) bool {
|
||||||
|
resolved, err := r.resolve(path)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if _, err := os.Stat(resolved); err != nil && os.IsNotExist(err) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// globFiles matches the specified pattern in the root.
|
||||||
|
// The files that match must be regular files.
|
||||||
|
func (r containerRoot) globFiles(pattern string) ([]string, error) {
|
||||||
|
patternPath, err := r.resolve(pattern)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
matches, err := filepath.Glob(patternPath)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
var files []string
|
||||||
|
for _, match := range matches {
|
||||||
|
info, err := os.Lstat(match)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
// Ignore symlinks.
|
||||||
|
if info.Mode()&os.ModeSymlink != 0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
// Ignore directories.
|
||||||
|
if info.IsDir() {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
files = append(files, match)
|
||||||
|
}
|
||||||
|
return files, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// resolve returns the absolute path including root path.
|
||||||
|
// Symlinks are resolved, but are guaranteed to resolve in the root.
|
||||||
|
func (r containerRoot) resolve(path string) (string, error) {
|
||||||
|
absolute := filepath.Clean(filepath.Join(string(r), path))
|
||||||
|
return symlink.FollowSymlinkInScope(absolute, string(r))
|
||||||
|
}
|
||||||
222
cmd/nvidia-cdi-hook/cudacompat/cudacompat.go
Normal file
222
cmd/nvidia-cdi-hook/cudacompat/cudacompat.go
Normal file
@@ -0,0 +1,222 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package cudacompat
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
cudaCompatPath = "/usr/local/cuda/compat"
|
||||||
|
// cudaCompatLdsoconfdFilenamePattern specifies the pattern for the filename
|
||||||
|
// in ld.so.conf.d that includes a reference to the CUDA compat path.
|
||||||
|
// The 00-compat prefix is chosen to ensure that these libraries have a
|
||||||
|
// higher precedence than other libraries on the system.
|
||||||
|
cudaCompatLdsoconfdFilenamePattern = "00-compat-*.conf"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type options struct {
|
||||||
|
hostDriverVersion string
|
||||||
|
containerSpec string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a cuda-compat command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build the enable-cuda-compat command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
cfg := options{}
|
||||||
|
|
||||||
|
// Create the 'enable-cuda-compat' command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "enable-cuda-compat",
|
||||||
|
Usage: "This hook ensures that the folder containing the CUDA compat libraries is added to the ldconfig search path if required.",
|
||||||
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
|
return ctx, m.validateFlags(cmd, &cfg)
|
||||||
|
},
|
||||||
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
return m.run(ctx, cmd, &cfg)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "host-driver-version",
|
||||||
|
Usage: "Specify the host driver version. If the CUDA compat libraries detected in the container do not have a higher MAJOR version, the hook is a no-op.",
|
||||||
|
Destination: &cfg.hostDriverVersion,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "container-spec",
|
||||||
|
Hidden: true,
|
||||||
|
Category: "testing-only",
|
||||||
|
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN",
|
||||||
|
Destination: &cfg.containerSpec,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(cmd *cli.Command, cfg *options) error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(ctx context.Context, cmd *cli.Command, cfg *options) error {
|
||||||
|
if cfg.hostDriverVersion == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
s, err := oci.LoadContainerState(cfg.containerSpec)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to load container state: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerRootDir, err := s.GetContainerRoot()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to determined container root: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerForwardCompatDir, err := m.getContainerForwardCompatDir(containerRoot(containerRootDir), cfg.hostDriverVersion)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to get container forward compat directory: %w", err)
|
||||||
|
}
|
||||||
|
if containerForwardCompatDir == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return m.createLdsoconfdFile(containerRoot(containerRootDir), cudaCompatLdsoconfdFilenamePattern, containerForwardCompatDir)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) getContainerForwardCompatDir(containerRoot containerRoot, hostDriverVersion string) (string, error) {
|
||||||
|
if hostDriverVersion == "" {
|
||||||
|
m.logger.Debugf("Host driver version not specified")
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
if !containerRoot.hasPath(cudaCompatPath) {
|
||||||
|
m.logger.Debugf("No CUDA forward compatibility libraries directory in container")
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
if !containerRoot.hasPath("/etc/ld.so.cache") {
|
||||||
|
m.logger.Debugf("The container does not have an LDCache")
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
libs, err := containerRoot.globFiles(filepath.Join(cudaCompatPath, "libcuda.so.*.*"))
|
||||||
|
if err != nil {
|
||||||
|
m.logger.Warningf("Failed to find CUDA compat library: %w", err)
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(libs) == 0 {
|
||||||
|
m.logger.Debugf("No CUDA forward compatibility libraries container")
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(libs) != 1 {
|
||||||
|
m.logger.Warningf("Unexpected number of CUDA compat libraries in container: %v", libs)
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
compatDriverVersion := strings.TrimPrefix(filepath.Base(libs[0]), "libcuda.so.")
|
||||||
|
compatMajor, err := extractMajorVersion(compatDriverVersion)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("failed to extract major version from %q: %v", compatDriverVersion, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
driverMajor, err := extractMajorVersion(hostDriverVersion)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("failed to extract major version from %q: %v", hostDriverVersion, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if driverMajor >= compatMajor {
|
||||||
|
m.logger.Debugf("Compat major version is not greater than the host driver major version (%v >= %v)", hostDriverVersion, compatDriverVersion)
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
resolvedCompatDir := strings.TrimPrefix(filepath.Dir(libs[0]), string(containerRoot))
|
||||||
|
return resolvedCompatDir, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// createLdsoconfdFile creates a file at /etc/ld.so.conf.d/ in the specified root.
|
||||||
|
// The file is created at /etc/ld.so.conf.d/{{ .pattern }} using `CreateTemp` and
|
||||||
|
// contains the specified directories on each line.
|
||||||
|
func (m command) createLdsoconfdFile(in containerRoot, pattern string, dirs ...string) error {
|
||||||
|
if len(dirs) == 0 {
|
||||||
|
m.logger.Debugf("No directories to add to /etc/ld.so.conf")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
ldsoconfdDir, err := in.resolve("/etc/ld.so.conf.d")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := os.MkdirAll(ldsoconfdDir, 0755); err != nil {
|
||||||
|
return fmt.Errorf("failed to create ld.so.conf.d: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
configFile, err := os.CreateTemp(ldsoconfdDir, pattern)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create config file: %w", err)
|
||||||
|
}
|
||||||
|
defer configFile.Close()
|
||||||
|
|
||||||
|
m.logger.Debugf("Adding directories %v to %v", dirs, configFile.Name())
|
||||||
|
|
||||||
|
added := make(map[string]bool)
|
||||||
|
for _, dir := range dirs {
|
||||||
|
if added[dir] {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
_, err = fmt.Fprintf(configFile, "%s\n", dir)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to update config file: %w", err)
|
||||||
|
}
|
||||||
|
added[dir] = true
|
||||||
|
}
|
||||||
|
|
||||||
|
// The created file needs to be world readable for the cases where the container is run as a non-root user.
|
||||||
|
if err := configFile.Chmod(0644); err != nil {
|
||||||
|
return fmt.Errorf("failed to chmod config file: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// extractMajorVersion parses a version string and returns the major version as an int.
|
||||||
|
func extractMajorVersion(version string) (int, error) {
|
||||||
|
majorString := strings.SplitN(version, ".", 2)[0]
|
||||||
|
return strconv.Atoi(majorString)
|
||||||
|
}
|
||||||
182
cmd/nvidia-cdi-hook/cudacompat/cudacompat_test.go
Normal file
182
cmd/nvidia-cdi-hook/cudacompat/cudacompat_test.go
Normal file
@@ -0,0 +1,182 @@
|
|||||||
|
/*
|
||||||
|
# Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package cudacompat
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestCompatLibs(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
contents map[string]string
|
||||||
|
hostDriverVersion string
|
||||||
|
expectedContainerForwardCompatDir string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "empty root",
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "compat lib is newer; no ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.333.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "compat lib is newer; ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.333.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "/usr/local/cuda/compat",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "compat lib is older; ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.111.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "compat lib has same major version; ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.222.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "numeric comparison is used; ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.222.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "99.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "/usr/local/cuda/compat",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "driver version empty; ldcache",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/usr/local/cuda/compat/libcuda.so.222.88.99": "",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "symlinks are followed",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/etc/alternatives/cuda/compat/libcuda.so.333.88.99": "",
|
||||||
|
"/usr/local/cuda": "symlink=/etc/alternatives/cuda",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "/etc/alternatives/cuda/compat",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "symlinks stay in container",
|
||||||
|
contents: map[string]string{
|
||||||
|
"/etc/ld.so.cache": "",
|
||||||
|
"/compat/libcuda.so.333.88.99": "",
|
||||||
|
"/usr/local/cuda": "symlink=../../../../../../",
|
||||||
|
},
|
||||||
|
hostDriverVersion: "222.55.66",
|
||||||
|
expectedContainerForwardCompatDir: "/compat",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
containerRootDir := t.TempDir()
|
||||||
|
for name, contents := range tc.contents {
|
||||||
|
target := filepath.Join(containerRootDir, name)
|
||||||
|
require.NoError(t, os.MkdirAll(filepath.Dir(target), 0755))
|
||||||
|
|
||||||
|
if strings.HasPrefix(contents, "symlink=") {
|
||||||
|
require.NoError(t, os.Symlink(strings.TrimPrefix(contents, "symlink="), target))
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
require.NoError(t, os.WriteFile(target, []byte(contents), 0600))
|
||||||
|
}
|
||||||
|
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
containerForwardCompatDir, err := c.getContainerForwardCompatDir(containerRoot(containerRootDir), tc.hostDriverVersion)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.EqualValues(t, tc.expectedContainerForwardCompatDir, containerForwardCompatDir)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestUpdateLdconfig(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
folders []string
|
||||||
|
expectedContents string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "no folders; have no contents",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "single folder is added",
|
||||||
|
folders: []string{"/usr/local/cuda/compat"},
|
||||||
|
expectedContents: "/usr/local/cuda/compat\n",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
containerRootDir := t.TempDir()
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
err := c.createLdsoconfdFile(containerRoot(containerRootDir), cudaCompatLdsoconfdFilenamePattern, tc.folders...)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
matches, err := filepath.Glob(filepath.Join(containerRootDir, "/etc/ld.so.conf.d/00-compat-*.conf"))
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
if tc.expectedContents == "" {
|
||||||
|
require.Empty(t, matches)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
require.Len(t, matches, 1)
|
||||||
|
contents, err := os.ReadFile(matches[0])
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.EqualValues(t, tc.expectedContents, string(contents))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,145 @@
|
|||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package disabledevicenodemodification
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bufio"
|
||||||
|
"bytes"
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
nvidiaDriverParamsPath = "/proc/driver/nvidia/params"
|
||||||
|
)
|
||||||
|
|
||||||
|
type options struct {
|
||||||
|
containerSpec string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs an disable-device-node-modification subcommand with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
cfg := options{}
|
||||||
|
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "disable-device-node-modification",
|
||||||
|
Usage: "Ensure that the /proc/driver/nvidia/params file present in the container does not allow device node modifications.",
|
||||||
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
|
return ctx, validateFlags(cmd, &cfg)
|
||||||
|
},
|
||||||
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
return run(ctx, cmd, &cfg)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "container-spec",
|
||||||
|
Hidden: true,
|
||||||
|
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN",
|
||||||
|
Destination: &cfg.containerSpec,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func validateFlags(c *cli.Command, cfg *options) error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func run(ctx context.Context, cmd *cli.Command, cfg *options) error {
|
||||||
|
modifiedParamsFileContents, err := getModifiedNVIDIAParamsContents()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to get modified params file contents: %w", err)
|
||||||
|
}
|
||||||
|
if len(modifiedParamsFileContents) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
s, err := oci.LoadContainerState(cfg.containerSpec)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to load container state: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerRootDirPath, err := s.GetContainerRoot()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to determined container root: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return createParamsFileInContainer(containerRootDirPath, modifiedParamsFileContents)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getModifiedNVIDIAParamsContents() ([]byte, error) {
|
||||||
|
hostNvidiaParamsFile, err := os.Open(nvidiaDriverParamsPath)
|
||||||
|
if errors.Is(err, os.ErrNotExist) {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to load params file: %w", err)
|
||||||
|
}
|
||||||
|
defer hostNvidiaParamsFile.Close()
|
||||||
|
|
||||||
|
modifiedContents, err := getModifiedParamsFileContentsFromReader(hostNvidiaParamsFile)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to get modfied params file contents: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return modifiedContents, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// getModifiedParamsFileContentsFromReader returns the contents of a modified params file from the specified reader.
|
||||||
|
func getModifiedParamsFileContentsFromReader(r io.Reader) ([]byte, error) {
|
||||||
|
var modified bytes.Buffer
|
||||||
|
scanner := bufio.NewScanner(r)
|
||||||
|
|
||||||
|
var requiresModification bool
|
||||||
|
for scanner.Scan() {
|
||||||
|
line := scanner.Text()
|
||||||
|
if strings.HasPrefix(line, "ModifyDeviceFiles: ") {
|
||||||
|
if line == "ModifyDeviceFiles: 0" {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
if line == "ModifyDeviceFiles: 1" {
|
||||||
|
line = "ModifyDeviceFiles: 0"
|
||||||
|
requiresModification = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if _, err := modified.WriteString(line + "\n"); err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to create output buffer: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err := scanner.Err(); err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to read params file: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !requiresModification {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return modified.Bytes(), nil
|
||||||
|
}
|
||||||
@@ -0,0 +1,91 @@
|
|||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package disabledevicenodemodification
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestGetModifiedParamsFileContentsFromReader(t *testing.T) {
|
||||||
|
testCases := map[string]struct {
|
||||||
|
contents []byte
|
||||||
|
expectedError error
|
||||||
|
expectedContents []byte
|
||||||
|
}{
|
||||||
|
"no contents": {
|
||||||
|
contents: nil,
|
||||||
|
expectedError: nil,
|
||||||
|
expectedContents: nil,
|
||||||
|
},
|
||||||
|
"other contents are ignored": {
|
||||||
|
contents: []byte(`# Some other content
|
||||||
|
that we don't care about
|
||||||
|
`),
|
||||||
|
expectedError: nil,
|
||||||
|
expectedContents: nil,
|
||||||
|
},
|
||||||
|
"already zero requires no modification": {
|
||||||
|
contents: []byte("ModifyDeviceFiles: 0"),
|
||||||
|
expectedError: nil,
|
||||||
|
expectedContents: nil,
|
||||||
|
},
|
||||||
|
"leading spaces require no modification": {
|
||||||
|
contents: []byte(" ModifyDeviceFiles: 1"),
|
||||||
|
},
|
||||||
|
"Trailing spaces require no modification": {
|
||||||
|
contents: []byte("ModifyDeviceFiles: 1 "),
|
||||||
|
},
|
||||||
|
"Not 1 require no modification": {
|
||||||
|
contents: []byte("ModifyDeviceFiles: 11"),
|
||||||
|
},
|
||||||
|
"single line requires modification": {
|
||||||
|
contents: []byte("ModifyDeviceFiles: 1"),
|
||||||
|
expectedError: nil,
|
||||||
|
expectedContents: []byte("ModifyDeviceFiles: 0\n"),
|
||||||
|
},
|
||||||
|
"single line with trailing newline requires modification": {
|
||||||
|
contents: []byte("ModifyDeviceFiles: 1\n"),
|
||||||
|
expectedError: nil,
|
||||||
|
expectedContents: []byte("ModifyDeviceFiles: 0\n"),
|
||||||
|
},
|
||||||
|
"other content is maintained": {
|
||||||
|
contents: []byte(`ModifyDeviceFiles: 1
|
||||||
|
other content
|
||||||
|
that
|
||||||
|
is maintained`),
|
||||||
|
expectedError: nil,
|
||||||
|
expectedContents: []byte(`ModifyDeviceFiles: 0
|
||||||
|
other content
|
||||||
|
that
|
||||||
|
is maintained
|
||||||
|
`),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for description, tc := range testCases {
|
||||||
|
t.Run(description, func(t *testing.T) {
|
||||||
|
contents, err := getModifiedParamsFileContentsFromReader(bytes.NewReader(tc.contents))
|
||||||
|
require.EqualValues(t, tc.expectedError, err)
|
||||||
|
require.EqualValues(t, string(tc.expectedContents), string(contents))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
@@ -0,0 +1,63 @@
|
|||||||
|
//go:build linux
|
||||||
|
|
||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package disabledevicenodemodification
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/opencontainers/runc/libcontainer/utils"
|
||||||
|
"golang.org/x/sys/unix"
|
||||||
|
)
|
||||||
|
|
||||||
|
func createParamsFileInContainer(containerRootDirPath string, contents []byte) error {
|
||||||
|
tmpRoot, err := os.MkdirTemp("", "nvct-empty-dir*")
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create temp root: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := createTmpFs(tmpRoot, len(contents)); err != nil {
|
||||||
|
return fmt.Errorf("failed to create tmpfs mount for params file: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
modifiedParamsFile, err := os.OpenFile(filepath.Join(tmpRoot, "nvct-params"), os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0444)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to open modified params file: %w", err)
|
||||||
|
}
|
||||||
|
defer modifiedParamsFile.Close()
|
||||||
|
|
||||||
|
if _, err := modifiedParamsFile.Write(contents); err != nil {
|
||||||
|
return fmt.Errorf("failed to write temporary params file: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = utils.WithProcfd(containerRootDirPath, nvidiaDriverParamsPath, func(nvidiaDriverParamsFdPath string) error {
|
||||||
|
return unix.Mount(modifiedParamsFile.Name(), nvidiaDriverParamsFdPath, "", unix.MS_BIND|unix.MS_RDONLY|unix.MS_NODEV|unix.MS_PRIVATE|unix.MS_NOSYMFOLLOW, "")
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to mount modified params file: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func createTmpFs(target string, size int) error {
|
||||||
|
return unix.Mount("tmpfs", target, "tmpfs", 0, fmt.Sprintf("size=%d", size))
|
||||||
|
}
|
||||||
@@ -0,0 +1,27 @@
|
|||||||
|
//go:build !linux
|
||||||
|
// +build !linux
|
||||||
|
|
||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package disabledevicenodemodification
|
||||||
|
|
||||||
|
import "fmt"
|
||||||
|
|
||||||
|
func createParamsFileInContainer(containerRootDirPath string, contents []byte) error {
|
||||||
|
return fmt.Errorf("not supported")
|
||||||
|
}
|
||||||
108
cmd/nvidia-cdi-hook/main.go
Normal file
108
cmd/nvidia-cdi-hook/main.go
Normal file
@@ -0,0 +1,108 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2024, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/sirupsen/logrus"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
||||||
|
|
||||||
|
cli "github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/commands"
|
||||||
|
)
|
||||||
|
|
||||||
|
// options defines the options that can be set for the CLI through config files,
|
||||||
|
// environment variables, or command line flags
|
||||||
|
type options struct {
|
||||||
|
// Debug indicates whether the CLI is started in "debug" mode
|
||||||
|
Debug bool
|
||||||
|
// Quiet indicates whether the CLI is started in "quiet" mode
|
||||||
|
Quiet bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
logger := logrus.New()
|
||||||
|
|
||||||
|
// Create a options struct to hold the parsed environment variables or command line flags
|
||||||
|
opts := options{}
|
||||||
|
|
||||||
|
// Create the top-level CLI
|
||||||
|
c := cli.Command{}
|
||||||
|
c.Name = "NVIDIA CDI Hook"
|
||||||
|
c.UseShortOptionHandling = true
|
||||||
|
c.EnableShellCompletion = true
|
||||||
|
c.Usage = "Command to structure files for usage inside a container, called as hooks from a container runtime, defined in a CDI yaml file"
|
||||||
|
c.Version = info.GetVersionString()
|
||||||
|
|
||||||
|
// We set the default action for the `nvidia-cdi-hook` command to issue a
|
||||||
|
// warning and exit with no error.
|
||||||
|
// This means that if an unsupported hook is run, a container will not fail
|
||||||
|
// to launch. An unsupported hook could be the result of a CDI specification
|
||||||
|
// referring to a new hook that is not yet supported by an older NVIDIA
|
||||||
|
// Container Toolkit version or a hook that has been removed in newer
|
||||||
|
// version.
|
||||||
|
c.Action = func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
commands.IssueUnsupportedHookWarning(logger, cmd)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup the flags for this command
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "debug",
|
||||||
|
Aliases: []string{"d"},
|
||||||
|
Usage: "Enable debug-level logging",
|
||||||
|
Destination: &opts.Debug,
|
||||||
|
// TODO: Support for NVIDIA_CDI_DEBUG is deprecated and NVIDIA_CTK_DEBUG should be used instead.
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_DEBUG", "NVIDIA_CDI_DEBUG"),
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "quiet",
|
||||||
|
Usage: "Suppress all output except for errors; overrides --debug",
|
||||||
|
Destination: &opts.Quiet,
|
||||||
|
// TODO: Support for NVIDIA_CDI_QUIET is deprecated and NVIDIA_CTK_QUIET should be used instead.
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_QUIET", "NVIDIA_CDI_QUIET"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set log-level for all subcommands
|
||||||
|
c.Before = func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
|
logLevel := logrus.InfoLevel
|
||||||
|
if opts.Debug {
|
||||||
|
logLevel = logrus.DebugLevel
|
||||||
|
}
|
||||||
|
if opts.Quiet {
|
||||||
|
logLevel = logrus.ErrorLevel
|
||||||
|
}
|
||||||
|
logger.SetLevel(logLevel)
|
||||||
|
return ctx, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Define the subcommands
|
||||||
|
c.Commands = commands.New(logger)
|
||||||
|
|
||||||
|
// Run the CLI
|
||||||
|
err := c.Run(context.Background(), os.Args)
|
||||||
|
if err != nil {
|
||||||
|
logger.Errorf("%v", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
}
|
||||||
165
cmd/nvidia-cdi-hook/update-ldcache/update-ldcache.go
Normal file
165
cmd/nvidia-cdi-hook/update-ldcache/update-ldcache.go
Normal file
@@ -0,0 +1,165 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package ldcache
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/moby/sys/reexec"
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/ldconfig"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
reexecUpdateLdCacheCommandName = "reexec-update-ldcache"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type options struct {
|
||||||
|
folders []string
|
||||||
|
ldconfigPath string
|
||||||
|
containerSpec string
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
reexec.Register(reexecUpdateLdCacheCommandName, updateLdCacheHandler)
|
||||||
|
if reexec.Init() {
|
||||||
|
os.Exit(0)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs an update-ldcache command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build the update-ldcache command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
cfg := options{}
|
||||||
|
|
||||||
|
// Create the 'update-ldcache' command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "update-ldcache",
|
||||||
|
Usage: "Update ldcache in a container by running ldconfig",
|
||||||
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
|
return ctx, m.validateFlags(cmd, &cfg)
|
||||||
|
},
|
||||||
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
return m.run(ctx, cmd, &cfg)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "folder",
|
||||||
|
Usage: "Specify a folder to add to /etc/ld.so.conf before updating the ld cache",
|
||||||
|
Destination: &cfg.folders,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "ldconfig-path",
|
||||||
|
Usage: "Specify the path to the ldconfig program",
|
||||||
|
Destination: &cfg.ldconfigPath,
|
||||||
|
Value: "/sbin/ldconfig",
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "container-spec",
|
||||||
|
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN",
|
||||||
|
Destination: &cfg.containerSpec,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(cmd *cli.Command, cfg *options) error {
|
||||||
|
if cfg.ldconfigPath == "" {
|
||||||
|
return errors.New("ldconfig-path must be specified")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(ctx context.Context, cmd *cli.Command, cfg *options) error {
|
||||||
|
s, err := oci.LoadContainerState(cfg.containerSpec)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to load container state: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
containerRootDir, err := s.GetContainerRoot()
|
||||||
|
if err != nil || containerRootDir == "" || containerRootDir == "/" {
|
||||||
|
return fmt.Errorf("failed to determined container root: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
runner, err := ldconfig.NewRunner(
|
||||||
|
reexecUpdateLdCacheCommandName,
|
||||||
|
cfg.ldconfigPath,
|
||||||
|
containerRootDir,
|
||||||
|
cfg.folders...,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return runner.Run()
|
||||||
|
}
|
||||||
|
|
||||||
|
// updateLdCacheHandler wraps updateLdCache with error handling.
|
||||||
|
func updateLdCacheHandler() {
|
||||||
|
if err := updateLdCache(os.Args); err != nil {
|
||||||
|
log.Printf("Error updating ldcache: %v", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// updateLdCache ensures that the ldcache in the container is updated to include
|
||||||
|
// libraries that are mounted from the host.
|
||||||
|
// It is invoked from a reexec'd handler and provides namespace isolation for
|
||||||
|
// the operations performed by this hook. At the point where this is invoked,
|
||||||
|
// we are in a new mount namespace that is cloned from the parent.
|
||||||
|
//
|
||||||
|
// args[0] is the reexec initializer function name
|
||||||
|
// args[1] is the path of the ldconfig binary on the host
|
||||||
|
// args[2] is the container root directory
|
||||||
|
// The remaining args are folders where soname symlinks need to be created.
|
||||||
|
func updateLdCache(args []string) error {
|
||||||
|
if len(args) < 3 {
|
||||||
|
return fmt.Errorf("incorrect arguments: %v", args)
|
||||||
|
}
|
||||||
|
hostLdconfigPath := args[1]
|
||||||
|
containerRootDirPath := args[2]
|
||||||
|
|
||||||
|
ldconfig, err := ldconfig.New(
|
||||||
|
hostLdconfigPath,
|
||||||
|
containerRootDirPath,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to construct ldconfig runner: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return ldconfig.UpdateLDCache(args[3:]...)
|
||||||
|
}
|
||||||
@@ -2,15 +2,6 @@ package main
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"log"
|
"log"
|
||||||
"strings"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
allDriverCapabilities = DriverCapabilities("compute,compat32,graphics,utility,video,display,ngx")
|
|
||||||
defaultDriverCapabilities = DriverCapabilities("utility,compute")
|
|
||||||
|
|
||||||
none = DriverCapabilities("")
|
|
||||||
all = DriverCapabilities("all")
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func capabilityToCLI(cap string) string {
|
func capabilityToCLI(cap string) string {
|
||||||
@@ -34,50 +25,3 @@ func capabilityToCLI(cap string) string {
|
|||||||
}
|
}
|
||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
|
|
||||||
// DriverCapabilities is used to process the NVIDIA_DRIVER_CAPABILITIES environment
|
|
||||||
// variable. Operations include default values, filtering, and handling meta values such as "all"
|
|
||||||
type DriverCapabilities string
|
|
||||||
|
|
||||||
// Intersection returns intersection between two sets of capabilities.
|
|
||||||
func (d DriverCapabilities) Intersection(capabilities DriverCapabilities) DriverCapabilities {
|
|
||||||
if capabilities == all {
|
|
||||||
return d
|
|
||||||
}
|
|
||||||
if d == all {
|
|
||||||
return capabilities
|
|
||||||
}
|
|
||||||
|
|
||||||
lookup := make(map[string]bool)
|
|
||||||
for _, c := range d.list() {
|
|
||||||
lookup[c] = true
|
|
||||||
}
|
|
||||||
var found []string
|
|
||||||
for _, c := range capabilities.list() {
|
|
||||||
if lookup[c] {
|
|
||||||
found = append(found, c)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
intersection := DriverCapabilities(strings.Join(found, ","))
|
|
||||||
return intersection
|
|
||||||
}
|
|
||||||
|
|
||||||
// String returns the string representation of the driver capabilities
|
|
||||||
func (d DriverCapabilities) String() string {
|
|
||||||
return string(d)
|
|
||||||
}
|
|
||||||
|
|
||||||
// list returns the driver capabilities as a list
|
|
||||||
func (d DriverCapabilities) list() []string {
|
|
||||||
var caps []string
|
|
||||||
for _, c := range strings.Split(string(d), ",") {
|
|
||||||
trimmed := strings.TrimSpace(c)
|
|
||||||
if len(trimmed) == 0 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
caps = append(caps, trimmed)
|
|
||||||
}
|
|
||||||
|
|
||||||
return caps
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -1,134 +0,0 @@
|
|||||||
/**
|
|
||||||
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
**/
|
|
||||||
|
|
||||||
package main
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"testing"
|
|
||||||
|
|
||||||
"github.com/stretchr/testify/require"
|
|
||||||
)
|
|
||||||
|
|
||||||
func TestDriverCapabilitiesIntersection(t *testing.T) {
|
|
||||||
testCases := []struct {
|
|
||||||
capabilities DriverCapabilities
|
|
||||||
supportedCapabilities DriverCapabilities
|
|
||||||
expectedIntersection DriverCapabilities
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
capabilities: none,
|
|
||||||
supportedCapabilities: none,
|
|
||||||
expectedIntersection: none,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: all,
|
|
||||||
supportedCapabilities: none,
|
|
||||||
expectedIntersection: none,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: all,
|
|
||||||
supportedCapabilities: allDriverCapabilities,
|
|
||||||
expectedIntersection: allDriverCapabilities,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: allDriverCapabilities,
|
|
||||||
supportedCapabilities: all,
|
|
||||||
expectedIntersection: allDriverCapabilities,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: none,
|
|
||||||
supportedCapabilities: all,
|
|
||||||
expectedIntersection: none,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: none,
|
|
||||||
supportedCapabilities: DriverCapabilities("cap1"),
|
|
||||||
expectedIntersection: none,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("cap0,cap1"),
|
|
||||||
supportedCapabilities: DriverCapabilities("cap1,cap0"),
|
|
||||||
expectedIntersection: DriverCapabilities("cap0,cap1"),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: defaultDriverCapabilities,
|
|
||||||
supportedCapabilities: allDriverCapabilities,
|
|
||||||
expectedIntersection: defaultDriverCapabilities,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("compute,compat32,graphics,utility,video,display"),
|
|
||||||
supportedCapabilities: DriverCapabilities("compute,compat32,graphics,utility,video,display,ngx"),
|
|
||||||
expectedIntersection: DriverCapabilities("compute,compat32,graphics,utility,video,display"),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("cap1"),
|
|
||||||
supportedCapabilities: none,
|
|
||||||
expectedIntersection: none,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("compute,compat32,graphics,utility,video,display,ngx"),
|
|
||||||
supportedCapabilities: DriverCapabilities("compute,compat32,graphics,utility,video,display"),
|
|
||||||
expectedIntersection: DriverCapabilities("compute,compat32,graphics,utility,video,display"),
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for i, tc := range testCases {
|
|
||||||
t.Run(fmt.Sprintf("test case %d", i), func(t *testing.T) {
|
|
||||||
intersection := tc.supportedCapabilities.Intersection(tc.capabilities)
|
|
||||||
require.EqualValues(t, tc.expectedIntersection, intersection)
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func TestDriverCapabilitiesList(t *testing.T) {
|
|
||||||
testCases := []struct {
|
|
||||||
capabilities DriverCapabilities
|
|
||||||
expected []string
|
|
||||||
}{
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities(""),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities(" "),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities(","),
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities(",cap"),
|
|
||||||
expected: []string{"cap"},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("cap,"),
|
|
||||||
expected: []string{"cap"},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("cap0,,cap1"),
|
|
||||||
expected: []string{"cap0", "cap1"},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
capabilities: DriverCapabilities("cap1,cap0,cap3"),
|
|
||||||
expected: []string{"cap1", "cap0", "cap3"},
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
for i, tc := range testCases {
|
|
||||||
t.Run(fmt.Sprintf("test case %d", i), func(t *testing.T) {
|
|
||||||
require.EqualValues(t, tc.expected, tc.capabilities.list())
|
|
||||||
})
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -6,46 +6,29 @@ import (
|
|||||||
"log"
|
"log"
|
||||||
"os"
|
"os"
|
||||||
"path"
|
"path"
|
||||||
"path/filepath"
|
|
||||||
"strings"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/image"
|
|
||||||
"github.com/opencontainers/runtime-spec/specs-go"
|
"github.com/opencontainers/runtime-spec/specs-go"
|
||||||
"golang.org/x/mod/semver"
|
"golang.org/x/mod/semver"
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/image"
|
||||||
envCUDAVersion = "CUDA_VERSION"
|
|
||||||
envNVRequirePrefix = "NVIDIA_REQUIRE_"
|
|
||||||
envNVRequireCUDA = envNVRequirePrefix + "CUDA"
|
|
||||||
envNVDisableRequire = "NVIDIA_DISABLE_REQUIRE"
|
|
||||||
envNVVisibleDevices = "NVIDIA_VISIBLE_DEVICES"
|
|
||||||
envNVMigConfigDevices = "NVIDIA_MIG_CONFIG_DEVICES"
|
|
||||||
envNVMigMonitorDevices = "NVIDIA_MIG_MONITOR_DEVICES"
|
|
||||||
envNVDriverCapabilities = "NVIDIA_DRIVER_CAPABILITIES"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
capSysAdmin = "CAP_SYS_ADMIN"
|
|
||||||
)
|
|
||||||
|
|
||||||
const (
|
|
||||||
deviceListAsVolumeMountsRoot = "/var/run/nvidia-container-devices"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type nvidiaConfig struct {
|
type nvidiaConfig struct {
|
||||||
Devices string
|
Devices []string
|
||||||
MigConfigDevices string
|
MigConfigDevices string
|
||||||
MigMonitorDevices string
|
MigMonitorDevices string
|
||||||
|
ImexChannels []string
|
||||||
DriverCapabilities string
|
DriverCapabilities string
|
||||||
Requirements []string
|
// Requirements defines the requirements DSL for the container to run.
|
||||||
DisableRequire bool
|
// This is empty if no specific requirements are needed, or if requirements are
|
||||||
|
// explicitly disabled.
|
||||||
|
Requirements []string
|
||||||
}
|
}
|
||||||
|
|
||||||
type containerConfig struct {
|
type containerConfig struct {
|
||||||
Pid int
|
Pid int
|
||||||
Rootfs string
|
Rootfs string
|
||||||
Env map[string]string
|
Image image.CUDA
|
||||||
Nvidia *nvidiaConfig
|
Nvidia *nvidiaConfig
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -72,23 +55,14 @@ type LinuxCapabilities struct {
|
|||||||
Ambient []string `json:"ambient,omitempty" platform:"linux"`
|
Ambient []string `json:"ambient,omitempty" platform:"linux"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// Mount from OCI runtime spec
|
|
||||||
// https://github.com/opencontainers/runtime-spec/blob/v1.0.0/specs-go/config.go#L103
|
|
||||||
type Mount struct {
|
|
||||||
Destination string `json:"destination"`
|
|
||||||
Type string `json:"type,omitempty" platform:"linux,solaris"`
|
|
||||||
Source string `json:"source,omitempty"`
|
|
||||||
Options []string `json:"options,omitempty"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// Spec from OCI runtime spec
|
// Spec from OCI runtime spec
|
||||||
// We use pointers to structs, similarly to the latest version of runtime-spec:
|
// We use pointers to structs, similarly to the latest version of runtime-spec:
|
||||||
// https://github.com/opencontainers/runtime-spec/blob/v1.0.0/specs-go/config.go#L5-L28
|
// https://github.com/opencontainers/runtime-spec/blob/v1.0.0/specs-go/config.go#L5-L28
|
||||||
type Spec struct {
|
type Spec struct {
|
||||||
Version *string `json:"ociVersion"`
|
Version *string `json:"ociVersion"`
|
||||||
Process *Process `json:"process,omitempty"`
|
Process *Process `json:"process,omitempty"`
|
||||||
Root *Root `json:"root,omitempty"`
|
Root *Root `json:"root,omitempty"`
|
||||||
Mounts []Mount `json:"mounts,omitempty"`
|
Mounts []specs.Mount `json:"mounts,omitempty"`
|
||||||
}
|
}
|
||||||
|
|
||||||
// HookState holds state information about the hook
|
// HookState holds state information about the hook
|
||||||
@@ -125,9 +99,9 @@ func loadSpec(path string) (spec *Spec) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func isPrivileged(s *Spec) bool {
|
func (s *Spec) GetCapabilities() []string {
|
||||||
if s.Process.Capabilities == nil {
|
if s == nil || s.Process == nil || s.Process.Capabilities == nil {
|
||||||
return false
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
var caps []string
|
var caps []string
|
||||||
@@ -140,141 +114,72 @@ func isPrivileged(s *Spec) bool {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
log.Panicln("could not decode Process.Capabilities in OCI spec:", err)
|
log.Panicln("could not decode Process.Capabilities in OCI spec:", err)
|
||||||
}
|
}
|
||||||
for _, c := range caps {
|
return caps
|
||||||
if c == capSysAdmin {
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return false
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Otherwise, parse s.Process.Capabilities as:
|
// Otherwise, parse s.Process.Capabilities as:
|
||||||
// github.com/opencontainers/runtime-spec/blob/v1.0.0/specs-go/config.go#L30-L54
|
// github.com/opencontainers/runtime-spec/blob/v1.0.0/specs-go/config.go#L30-L54
|
||||||
process := specs.Process{
|
capabilities := specs.LinuxCapabilities{}
|
||||||
Env: s.Process.Env,
|
err := json.Unmarshal(*s.Process.Capabilities, &capabilities)
|
||||||
}
|
|
||||||
|
|
||||||
err := json.Unmarshal(*s.Process.Capabilities, &process.Capabilities)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Panicln("could not decode Process.Capabilities in OCI spec:", err)
|
log.Panicln("could not decode Process.Capabilities in OCI spec:", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
fullSpec := specs.Spec{
|
return image.OCISpecCapabilities(capabilities).GetCapabilities()
|
||||||
Version: *s.Version,
|
|
||||||
Process: &process,
|
|
||||||
}
|
|
||||||
|
|
||||||
return image.IsPrivileged(&fullSpec)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func getDevicesFromEnvvar(image image.CUDA, swarmResourceEnvvars []string) *string {
|
func isPrivileged(s *Spec) bool {
|
||||||
// We check if the image has at least one of the Swarm resource envvars defined and use this
|
return image.IsPrivileged(s)
|
||||||
// if specified.
|
}
|
||||||
var hasSwarmEnvvar bool
|
|
||||||
for _, envvar := range swarmResourceEnvvars {
|
func getMigConfigDevices(i image.CUDA) *string {
|
||||||
if _, exists := image[envvar]; exists {
|
return getMigDevices(i, image.EnvVarNvidiaMigConfigDevices)
|
||||||
hasSwarmEnvvar = true
|
}
|
||||||
break
|
|
||||||
|
func getMigMonitorDevices(i image.CUDA) *string {
|
||||||
|
return getMigDevices(i, image.EnvVarNvidiaMigMonitorDevices)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getMigDevices(image image.CUDA, envvar string) *string {
|
||||||
|
if !image.HasEnvvar(envvar) {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
devices := image.Getenv(envvar)
|
||||||
|
return &devices
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hookConfig *hookConfig) getImexChannels(image image.CUDA, privileged bool) []string {
|
||||||
|
if hookConfig.Features.IgnoreImexChannelRequests.IsEnabled() {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// If enabled, try and get the device list from volume mounts first
|
||||||
|
if hookConfig.AcceptDeviceListAsVolumeMounts {
|
||||||
|
devices := image.ImexChannelsFromMounts()
|
||||||
|
if len(devices) > 0 {
|
||||||
|
return devices
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
devices := image.ImexChannelsFromEnvVar()
|
||||||
var devices []string
|
|
||||||
if hasSwarmEnvvar {
|
|
||||||
devices = image.DevicesFromEnvvars(swarmResourceEnvvars...).List()
|
|
||||||
} else {
|
|
||||||
devices = image.DevicesFromEnvvars(envNVVisibleDevices).List()
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(devices) == 0 {
|
if len(devices) == 0 {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
devicesString := strings.Join(devices, ",")
|
|
||||||
|
|
||||||
return &devicesString
|
|
||||||
}
|
|
||||||
|
|
||||||
func getDevicesFromMounts(mounts []Mount) *string {
|
|
||||||
var devices []string
|
|
||||||
for _, m := range mounts {
|
|
||||||
root := filepath.Clean(deviceListAsVolumeMountsRoot)
|
|
||||||
source := filepath.Clean(m.Source)
|
|
||||||
destination := filepath.Clean(m.Destination)
|
|
||||||
|
|
||||||
// Only consider mounts who's host volume is /dev/null
|
|
||||||
if source != "/dev/null" {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
// Only consider container mount points that begin with 'root'
|
|
||||||
if len(destination) < len(root) {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
if destination[:len(root)] != root {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
// Grab the full path beyond 'root' and add it to the list of devices
|
|
||||||
device := destination[len(root):]
|
|
||||||
if len(device) > 0 && device[0] == '/' {
|
|
||||||
device = device[1:]
|
|
||||||
}
|
|
||||||
if len(device) == 0 {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
devices = append(devices, device)
|
|
||||||
}
|
|
||||||
|
|
||||||
if devices == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
ret := strings.Join(devices, ",")
|
|
||||||
return &ret
|
|
||||||
}
|
|
||||||
|
|
||||||
func getDevices(hookConfig *HookConfig, image image.CUDA, mounts []Mount, privileged bool) *string {
|
|
||||||
// If enabled, try and get the device list from volume mounts first
|
|
||||||
if hookConfig.AcceptDeviceListAsVolumeMounts {
|
|
||||||
devices := getDevicesFromMounts(mounts)
|
|
||||||
if devices != nil {
|
|
||||||
return devices
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Fallback to reading from the environment variable if privileges are correct
|
|
||||||
devices := getDevicesFromEnvvar(image, hookConfig.getSwarmResourceEnvvars())
|
|
||||||
if devices == nil {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
if privileged || hookConfig.AcceptEnvvarUnprivileged {
|
if privileged || hookConfig.AcceptEnvvarUnprivileged {
|
||||||
return devices
|
return devices
|
||||||
}
|
}
|
||||||
|
|
||||||
configName := hookConfig.getConfigOption("AcceptEnvvarUnprivileged")
|
|
||||||
log.Printf("Ignoring devices specified in NVIDIA_VISIBLE_DEVICES (privileged=%v, %v=%v) ", privileged, configName, hookConfig.AcceptEnvvarUnprivileged)
|
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func getMigConfigDevices(env map[string]string) *string {
|
func (hookConfig *hookConfig) getDriverCapabilities(cudaImage image.CUDA, legacyImage bool) image.DriverCapabilities {
|
||||||
if devices, ok := env[envNVMigConfigDevices]; ok {
|
|
||||||
return &devices
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func getMigMonitorDevices(env map[string]string) *string {
|
|
||||||
if devices, ok := env[envNVMigMonitorDevices]; ok {
|
|
||||||
return &devices
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func getDriverCapabilities(env map[string]string, supportedDriverCapabilities DriverCapabilities, legacyImage bool) DriverCapabilities {
|
|
||||||
// We use the default driver capabilities by default. This is filtered to only include the
|
// We use the default driver capabilities by default. This is filtered to only include the
|
||||||
// supported capabilities
|
// supported capabilities
|
||||||
capabilities := supportedDriverCapabilities.Intersection(defaultDriverCapabilities)
|
supportedDriverCapabilities := image.NewDriverCapabilities(hookConfig.SupportedDriverCapabilities)
|
||||||
|
capabilities := supportedDriverCapabilities.Intersection(image.DefaultDriverCapabilities)
|
||||||
|
|
||||||
capsEnv, capsEnvSpecified := env[envNVDriverCapabilities]
|
capsEnvSpecified := cudaImage.HasEnvvar(image.EnvVarNvidiaDriverCapabilities)
|
||||||
|
capsEnv := cudaImage.Getenv(image.EnvVarNvidiaDriverCapabilities)
|
||||||
|
|
||||||
if !capsEnvSpecified && legacyImage {
|
if !capsEnvSpecified && legacyImage {
|
||||||
// Environment variable unset with legacy image: set all capabilities.
|
// Environment variable unset with legacy image: set all capabilities.
|
||||||
@@ -283,9 +188,9 @@ func getDriverCapabilities(env map[string]string, supportedDriverCapabilities Dr
|
|||||||
|
|
||||||
if capsEnvSpecified && len(capsEnv) > 0 {
|
if capsEnvSpecified && len(capsEnv) > 0 {
|
||||||
// If the envvironment variable is specified and is non-empty, use the capabilities value
|
// If the envvironment variable is specified and is non-empty, use the capabilities value
|
||||||
envCapabilities := DriverCapabilities(capsEnv)
|
envCapabilities := image.NewDriverCapabilities(capsEnv)
|
||||||
capabilities = supportedDriverCapabilities.Intersection(envCapabilities)
|
capabilities = supportedDriverCapabilities.Intersection(envCapabilities)
|
||||||
if envCapabilities != all && capabilities != envCapabilities {
|
if !envCapabilities.IsAll() && len(capabilities) != len(envCapabilities) {
|
||||||
log.Panicln(fmt.Errorf("unsupported capabilities found in '%v' (allowed '%v')", envCapabilities, capabilities))
|
log.Panicln(fmt.Errorf("unsupported capabilities found in '%v' (allowed '%v')", envCapabilities, capabilities))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -293,14 +198,12 @@ func getDriverCapabilities(env map[string]string, supportedDriverCapabilities Dr
|
|||||||
return capabilities
|
return capabilities
|
||||||
}
|
}
|
||||||
|
|
||||||
func getNvidiaConfig(hookConfig *HookConfig, image image.CUDA, mounts []Mount, privileged bool) *nvidiaConfig {
|
func (hookConfig *hookConfig) getNvidiaConfig(image image.CUDA, privileged bool) *nvidiaConfig {
|
||||||
legacyImage := image.IsLegacy()
|
legacyImage := image.IsLegacy()
|
||||||
|
|
||||||
var devices string
|
devices := image.VisibleDevices()
|
||||||
if d := getDevices(hookConfig, image, mounts, privileged); d != nil {
|
if len(devices) == 0 {
|
||||||
devices = *d
|
// empty devices means this is not a GPU container.
|
||||||
} else {
|
|
||||||
// 'nil' devices means this is not a GPU container.
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -320,26 +223,33 @@ func getNvidiaConfig(hookConfig *HookConfig, image image.CUDA, mounts []Mount, p
|
|||||||
log.Panicln("cannot set MIG_MONITOR_DEVICES in non privileged container")
|
log.Panicln("cannot set MIG_MONITOR_DEVICES in non privileged container")
|
||||||
}
|
}
|
||||||
|
|
||||||
driverCapabilities := getDriverCapabilities(image, hookConfig.SupportedDriverCapabilities, legacyImage).String()
|
imexChannels := hookConfig.getImexChannels(image, privileged)
|
||||||
|
|
||||||
|
driverCapabilities := hookConfig.getDriverCapabilities(image, legacyImage).String()
|
||||||
|
|
||||||
requirements, err := image.GetRequirements()
|
requirements, err := image.GetRequirements()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Panicln("failed to get requirements", err)
|
log.Panicln("failed to get requirements", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
disableRequire := image.HasDisableRequire()
|
|
||||||
|
|
||||||
return &nvidiaConfig{
|
return &nvidiaConfig{
|
||||||
Devices: devices,
|
Devices: devices,
|
||||||
MigConfigDevices: migConfigDevices,
|
MigConfigDevices: migConfigDevices,
|
||||||
MigMonitorDevices: migMonitorDevices,
|
MigMonitorDevices: migMonitorDevices,
|
||||||
|
ImexChannels: imexChannels,
|
||||||
DriverCapabilities: driverCapabilities,
|
DriverCapabilities: driverCapabilities,
|
||||||
Requirements: requirements,
|
Requirements: requirements,
|
||||||
DisableRequire: disableRequire,
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func getContainerConfig(hook HookConfig) (config containerConfig) {
|
func (hookConfig *hookConfig) getContainerConfig() (config *containerConfig) {
|
||||||
|
hookConfig.Lock()
|
||||||
|
defer hookConfig.Unlock()
|
||||||
|
|
||||||
|
if hookConfig.containerConfig != nil {
|
||||||
|
return hookConfig.containerConfig
|
||||||
|
}
|
||||||
|
|
||||||
var h HookState
|
var h HookState
|
||||||
d := json.NewDecoder(os.Stdin)
|
d := json.NewDecoder(os.Stdin)
|
||||||
if err := d.Decode(&h); err != nil {
|
if err := d.Decode(&h); err != nil {
|
||||||
@@ -353,16 +263,28 @@ func getContainerConfig(hook HookConfig) (config containerConfig) {
|
|||||||
|
|
||||||
s := loadSpec(path.Join(b, "config.json"))
|
s := loadSpec(path.Join(b, "config.json"))
|
||||||
|
|
||||||
image, err := image.NewCUDAImageFromEnv(s.Process.Env)
|
privileged := isPrivileged(s)
|
||||||
|
|
||||||
|
i, err := image.New(
|
||||||
|
image.WithEnv(s.Process.Env),
|
||||||
|
image.WithMounts(s.Mounts),
|
||||||
|
image.WithPrivileged(privileged),
|
||||||
|
image.WithDisableRequire(hookConfig.DisableRequire),
|
||||||
|
image.WithAcceptDeviceListAsVolumeMounts(hookConfig.AcceptDeviceListAsVolumeMounts),
|
||||||
|
image.WithAcceptEnvvarUnprivileged(hookConfig.AcceptEnvvarUnprivileged),
|
||||||
|
image.WithPreferredVisibleDevicesEnvVars(hookConfig.getSwarmResourceEnvvars()...),
|
||||||
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Panicln(err)
|
log.Panicln(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
privileged := isPrivileged(s)
|
cc := containerConfig{
|
||||||
return containerConfig{
|
|
||||||
Pid: h.Pid,
|
Pid: h.Pid,
|
||||||
Rootfs: s.Root.Path,
|
Rootfs: s.Root.Path,
|
||||||
Env: image,
|
Image: i,
|
||||||
Nvidia: getNvidiaConfig(&hook, image, s.Mounts, privileged),
|
Nvidia: hookConfig.getNvidiaConfig(i, privileged),
|
||||||
}
|
}
|
||||||
|
hookConfig.containerConfig = &cc
|
||||||
|
|
||||||
|
return hookConfig.containerConfig
|
||||||
}
|
}
|
||||||
|
|||||||
File diff suppressed because it is too large
Load Diff
@@ -1,114 +1,76 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
"log"
|
"log"
|
||||||
"os"
|
"os"
|
||||||
"path"
|
|
||||||
"reflect"
|
"reflect"
|
||||||
"strings"
|
"strings"
|
||||||
|
"sync"
|
||||||
|
|
||||||
"github.com/BurntSushi/toml"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/image"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
// hookConfig wraps the toolkit config.
|
||||||
configPath = "/etc/nvidia-container-runtime/config.toml"
|
// This allows for functions to be defined on the local type.
|
||||||
driverPath = "/run/nvidia/driver"
|
type hookConfig struct {
|
||||||
)
|
sync.Mutex
|
||||||
|
*config.Config
|
||||||
var defaultPaths = [...]string{
|
containerConfig *containerConfig
|
||||||
path.Join(driverPath, configPath),
|
|
||||||
configPath,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// CLIConfig : options for nvidia-container-cli.
|
// loadConfig loads the required paths for the hook config.
|
||||||
type CLIConfig struct {
|
func loadConfig() (*config.Config, error) {
|
||||||
Root *string `toml:"root"`
|
configFilePath, required := getConfigFilePath()
|
||||||
Path *string `toml:"path"`
|
cfg, err := config.New(
|
||||||
Environment []string `toml:"environment"`
|
config.WithConfigFile(configFilePath),
|
||||||
Debug *string `toml:"debug"`
|
config.WithRequired(true),
|
||||||
Ldcache *string `toml:"ldcache"`
|
)
|
||||||
LoadKmods bool `toml:"load-kmods"`
|
if err == nil {
|
||||||
NoPivot bool `toml:"no-pivot"`
|
return cfg.Config()
|
||||||
NoCgroups bool `toml:"no-cgroups"`
|
} else if os.IsNotExist(err) && !required {
|
||||||
User *string `toml:"user"`
|
return config.GetDefault()
|
||||||
Ldconfig *string `toml:"ldconfig"`
|
|
||||||
}
|
|
||||||
|
|
||||||
// HookConfig : options for the nvidia-container-runtime-hook.
|
|
||||||
type HookConfig struct {
|
|
||||||
DisableRequire bool `toml:"disable-require"`
|
|
||||||
SwarmResource *string `toml:"swarm-resource"`
|
|
||||||
AcceptEnvvarUnprivileged bool `toml:"accept-nvidia-visible-devices-envvar-when-unprivileged"`
|
|
||||||
AcceptDeviceListAsVolumeMounts bool `toml:"accept-nvidia-visible-devices-as-volume-mounts"`
|
|
||||||
SupportedDriverCapabilities DriverCapabilities `toml:"supported-driver-capabilities"`
|
|
||||||
|
|
||||||
NvidiaContainerCLI CLIConfig `toml:"nvidia-container-cli"`
|
|
||||||
NVIDIAContainerRuntime config.RuntimeConfig `toml:"nvidia-container-runtime"`
|
|
||||||
NVIDIAContainerRuntimeHook config.RuntimeHookConfig `toml:"nvidia-container-runtime-hook"`
|
|
||||||
}
|
|
||||||
|
|
||||||
func getDefaultHookConfig() HookConfig {
|
|
||||||
return HookConfig{
|
|
||||||
DisableRequire: false,
|
|
||||||
SwarmResource: nil,
|
|
||||||
AcceptEnvvarUnprivileged: true,
|
|
||||||
AcceptDeviceListAsVolumeMounts: false,
|
|
||||||
SupportedDriverCapabilities: allDriverCapabilities,
|
|
||||||
NvidiaContainerCLI: CLIConfig{
|
|
||||||
Root: nil,
|
|
||||||
Path: nil,
|
|
||||||
Environment: []string{},
|
|
||||||
Debug: nil,
|
|
||||||
Ldcache: nil,
|
|
||||||
LoadKmods: true,
|
|
||||||
NoPivot: false,
|
|
||||||
NoCgroups: false,
|
|
||||||
User: nil,
|
|
||||||
Ldconfig: nil,
|
|
||||||
},
|
|
||||||
NVIDIAContainerRuntime: *config.GetDefaultRuntimeConfig(),
|
|
||||||
NVIDIAContainerRuntimeHook: *config.GetDefaultRuntimeHookConfig(),
|
|
||||||
}
|
}
|
||||||
|
return nil, fmt.Errorf("couldn't open required configuration file: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getHookConfig() (config HookConfig) {
|
func getConfigFilePath() (string, bool) {
|
||||||
var err error
|
if configFromFlag := *configflag; configFromFlag != "" {
|
||||||
|
return configFromFlag, true
|
||||||
if len(*configflag) > 0 {
|
|
||||||
config = getDefaultHookConfig()
|
|
||||||
_, err = toml.DecodeFile(*configflag, &config)
|
|
||||||
if err != nil {
|
|
||||||
log.Panicln("couldn't open configuration file:", err)
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
for _, p := range defaultPaths {
|
|
||||||
config = getDefaultHookConfig()
|
|
||||||
_, err = toml.DecodeFile(p, &config)
|
|
||||||
if err == nil {
|
|
||||||
break
|
|
||||||
} else if !os.IsNotExist(err) {
|
|
||||||
log.Panicln("couldn't open default configuration file:", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
if configFromEnvvar := os.Getenv(config.FilePathOverrideEnvVar); configFromEnvvar != "" {
|
||||||
if config.SupportedDriverCapabilities == all {
|
return configFromEnvvar, true
|
||||||
config.SupportedDriverCapabilities = allDriverCapabilities
|
|
||||||
}
|
}
|
||||||
// We ensure that the supported-driver-capabilites option is a subset of allDriverCapabilities
|
return config.GetConfigFilePath(), false
|
||||||
if intersection := allDriverCapabilities.Intersection(config.SupportedDriverCapabilities); intersection != config.SupportedDriverCapabilities {
|
}
|
||||||
|
|
||||||
|
func getHookConfig() (*hookConfig, error) {
|
||||||
|
cfg, err := loadConfig()
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to load config: %v", err)
|
||||||
|
}
|
||||||
|
config := &hookConfig{Config: cfg}
|
||||||
|
|
||||||
|
allSupportedDriverCapabilities := image.SupportedDriverCapabilities
|
||||||
|
if config.SupportedDriverCapabilities == "all" {
|
||||||
|
config.SupportedDriverCapabilities = allSupportedDriverCapabilities.String()
|
||||||
|
}
|
||||||
|
configuredCapabilities := image.NewDriverCapabilities(config.SupportedDriverCapabilities)
|
||||||
|
// We ensure that the configured value is a subset of all supported capabilities
|
||||||
|
if !allSupportedDriverCapabilities.IsSuperset(configuredCapabilities) {
|
||||||
configName := config.getConfigOption("SupportedDriverCapabilities")
|
configName := config.getConfigOption("SupportedDriverCapabilities")
|
||||||
log.Panicf("Invalid value for config option '%v'; %v (supported: %v)\n", configName, config.SupportedDriverCapabilities, allDriverCapabilities)
|
log.Panicf("Invalid value for config option '%v'; %v (supported: %v)\n", configName, config.SupportedDriverCapabilities, allSupportedDriverCapabilities.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
return config
|
return config, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// getConfigOption returns the toml config option associated with the
|
// getConfigOption returns the toml config option associated with the
|
||||||
// specified struct field.
|
// specified struct field.
|
||||||
func (c HookConfig) getConfigOption(fieldName string) string {
|
func (c *hookConfig) getConfigOption(fieldName string) string {
|
||||||
t := reflect.TypeOf(c)
|
t := reflect.TypeOf(&c)
|
||||||
f, ok := t.FieldByName(fieldName)
|
f, ok := t.FieldByName(fieldName)
|
||||||
if !ok {
|
if !ok {
|
||||||
return fieldName
|
return fieldName
|
||||||
@@ -121,12 +83,12 @@ func (c HookConfig) getConfigOption(fieldName string) string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// getSwarmResourceEnvvars returns the swarm resource envvars for the config.
|
// getSwarmResourceEnvvars returns the swarm resource envvars for the config.
|
||||||
func (c *HookConfig) getSwarmResourceEnvvars() []string {
|
func (c *hookConfig) getSwarmResourceEnvvars() []string {
|
||||||
if c.SwarmResource == nil {
|
if c == nil || c.SwarmResource == "" {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
candidates := strings.Split(*c.SwarmResource, ",")
|
candidates := strings.Split(c.SwarmResource, ",")
|
||||||
|
|
||||||
var envvars []string
|
var envvars []string
|
||||||
for _, c := range candidates {
|
for _, c := range candidates {
|
||||||
@@ -138,3 +100,44 @@ func (c *HookConfig) getSwarmResourceEnvvars() []string {
|
|||||||
|
|
||||||
return envvars
|
return envvars
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// nvidiaContainerCliCUDACompatModeFlags returns required --cuda-compat-mode
|
||||||
|
// flag(s) depending on the hook and runtime configurations.
|
||||||
|
func (c *hookConfig) nvidiaContainerCliCUDACompatModeFlags() []string {
|
||||||
|
var flag string
|
||||||
|
switch c.NVIDIAContainerRuntimeConfig.Modes.Legacy.CUDACompatMode {
|
||||||
|
case config.CUDACompatModeLdconfig:
|
||||||
|
flag = "--cuda-compat-mode=ldconfig"
|
||||||
|
case config.CUDACompatModeMount:
|
||||||
|
flag = "--cuda-compat-mode=mount"
|
||||||
|
case config.CUDACompatModeDisabled, config.CUDACompatModeHook:
|
||||||
|
flag = "--cuda-compat-mode=disabled"
|
||||||
|
default:
|
||||||
|
if !c.Features.AllowCUDACompatLibsFromContainer.IsEnabled() {
|
||||||
|
flag = "--cuda-compat-mode=disabled"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if flag == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return []string{flag}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *hookConfig) assertModeIsLegacy() error {
|
||||||
|
if c.NVIDIAContainerRuntimeHookConfig.SkipModeDetection {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
mr := info.NewRuntimeModeResolver(
|
||||||
|
info.WithLogger(&logInterceptor{}),
|
||||||
|
info.WithImage(&c.containerConfig.Image),
|
||||||
|
info.WithDefaultMode(info.LegacyRuntimeMode),
|
||||||
|
)
|
||||||
|
|
||||||
|
mode := mr.ResolveRuntimeMode(c.NVIDIAContainerRuntimeConfig.Mode)
|
||||||
|
if mode == "legacy" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return fmt.Errorf("invoking the NVIDIA Container Runtime Hook directly (e.g. specifying the docker --gpus flag) is not supported. Please use the NVIDIA Container Runtime (e.g. specify the --runtime=nvidia flag) instead")
|
||||||
|
}
|
||||||
|
|||||||
@@ -22,22 +22,25 @@ import (
|
|||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/image"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestGetHookConfig(t *testing.T) {
|
func TestGetHookConfig(t *testing.T) {
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
lines []string
|
lines []string
|
||||||
expectedPanic bool
|
expectedPanic bool
|
||||||
expectedDriverCapabilities DriverCapabilities
|
expectedDriverCapabilities string
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
expectedDriverCapabilities: allDriverCapabilities,
|
expectedDriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
lines: []string{
|
lines: []string{
|
||||||
"supported-driver-capabilities = \"all\"",
|
"supported-driver-capabilities = \"all\"",
|
||||||
},
|
},
|
||||||
expectedDriverCapabilities: allDriverCapabilities,
|
expectedDriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
lines: []string{
|
lines: []string{
|
||||||
@@ -47,19 +50,19 @@ func TestGetHookConfig(t *testing.T) {
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
lines: []string{},
|
lines: []string{},
|
||||||
expectedDriverCapabilities: allDriverCapabilities,
|
expectedDriverCapabilities: image.SupportedDriverCapabilities.String(),
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
lines: []string{
|
lines: []string{
|
||||||
"supported-driver-capabilities = \"\"",
|
"supported-driver-capabilities = \"\"",
|
||||||
},
|
},
|
||||||
expectedDriverCapabilities: none,
|
expectedDriverCapabilities: "",
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
lines: []string{
|
lines: []string{
|
||||||
"supported-driver-capabilities = \"utility,compute\"",
|
"supported-driver-capabilities = \"compute,utility\"",
|
||||||
},
|
},
|
||||||
expectedDriverCapabilities: DriverCapabilities("utility,compute"),
|
expectedDriverCapabilities: "compute,utility",
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -82,14 +85,15 @@ func TestGetHookConfig(t *testing.T) {
|
|||||||
configflag = &filename
|
configflag = &filename
|
||||||
|
|
||||||
for _, line := range tc.lines {
|
for _, line := range tc.lines {
|
||||||
_, err := configFile.WriteString(fmt.Sprintf("%s\n", line))
|
_, err := fmt.Fprintf(configFile, "%s\n", line)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
var config HookConfig
|
var cfg *hookConfig
|
||||||
getHookConfig := func() {
|
getHookConfig := func() {
|
||||||
config = getHookConfig()
|
c, _ := getHookConfig()
|
||||||
|
cfg = c
|
||||||
}
|
}
|
||||||
|
|
||||||
if tc.expectedPanic {
|
if tc.expectedPanic {
|
||||||
@@ -99,7 +103,7 @@ func TestGetHookConfig(t *testing.T) {
|
|||||||
|
|
||||||
getHookConfig()
|
getHookConfig()
|
||||||
|
|
||||||
require.EqualValues(t, tc.expectedDriverCapabilities, config.SupportedDriverCapabilities)
|
require.EqualValues(t, tc.expectedDriverCapabilities, cfg.SupportedDriverCapabilities)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -109,10 +113,6 @@ func TestGetSwarmResourceEnvvars(t *testing.T) {
|
|||||||
value string
|
value string
|
||||||
expected []string
|
expected []string
|
||||||
}{
|
}{
|
||||||
{
|
|
||||||
value: "nil",
|
|
||||||
expected: nil,
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
value: "",
|
value: "",
|
||||||
expected: nil,
|
expected: nil,
|
||||||
@@ -145,13 +145,10 @@ func TestGetSwarmResourceEnvvars(t *testing.T) {
|
|||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
c := &HookConfig{
|
c := &hookConfig{
|
||||||
SwarmResource: func() *string {
|
Config: &config.Config{
|
||||||
if tc.value == "nil" {
|
SwarmResource: tc.value,
|
||||||
return nil
|
},
|
||||||
}
|
|
||||||
return &tc.value
|
|
||||||
}(),
|
|
||||||
}
|
}
|
||||||
|
|
||||||
envvars := c.getSwarmResourceEnvvars()
|
envvars := c.getSwarmResourceEnvvars()
|
||||||
|
|||||||
@@ -13,7 +13,9 @@ import (
|
|||||||
"strings"
|
"strings"
|
||||||
"syscall"
|
"syscall"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -36,16 +38,12 @@ func exit() {
|
|||||||
os.Exit(0)
|
os.Exit(0)
|
||||||
}
|
}
|
||||||
|
|
||||||
func getCLIPath(config CLIConfig) string {
|
func getCLIPath(config config.ContainerCLIConfig) string {
|
||||||
if config.Path != nil {
|
if config.Path != "" {
|
||||||
return *config.Path
|
return config.Path
|
||||||
}
|
}
|
||||||
|
|
||||||
var root string
|
if err := os.Setenv("PATH", lookup.GetPath(config.Root)); err != nil {
|
||||||
if config.Root != nil {
|
|
||||||
root = *config.Root
|
|
||||||
}
|
|
||||||
if err := os.Setenv("PATH", lookup.GetPath(root)); err != nil {
|
|
||||||
log.Panicln("couldn't set PATH variable:", err)
|
log.Panicln("couldn't set PATH variable:", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -57,7 +55,7 @@ func getCLIPath(config CLIConfig) string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// getRootfsPath returns an absolute path. We don't need to resolve symlinks for now.
|
// getRootfsPath returns an absolute path. We don't need to resolve symlinks for now.
|
||||||
func getRootfsPath(config containerConfig) string {
|
func getRootfsPath(config *containerConfig) string {
|
||||||
rootfs, err := filepath.Abs(config.Rootfs)
|
rootfs, err := filepath.Abs(config.Rootfs)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Panicln(err)
|
log.Panicln(err)
|
||||||
@@ -71,53 +69,61 @@ func doPrestart() {
|
|||||||
defer exit()
|
defer exit()
|
||||||
log.SetFlags(0)
|
log.SetFlags(0)
|
||||||
|
|
||||||
hook := getHookConfig()
|
hook, err := getHookConfig()
|
||||||
cli := hook.NvidiaContainerCLI
|
if err != nil || hook == nil {
|
||||||
|
log.Panicln("error getting hook config:", err)
|
||||||
if !hook.NVIDIAContainerRuntimeHook.SkipModeDetection && info.ResolveAutoMode(&logInterceptor{}, hook.NVIDIAContainerRuntime.Mode) != "legacy" {
|
|
||||||
log.Panicln("invoking the NVIDIA Container Runtime Hook directly (e.g. specifying the docker --gpus flag) is not supported. Please use the NVIDIA Container Runtime (e.g. specify the --runtime=nvidia flag) instead.")
|
|
||||||
}
|
}
|
||||||
|
cli := hook.NVIDIAContainerCLIConfig
|
||||||
|
|
||||||
container := getContainerConfig(hook)
|
container := hook.getContainerConfig()
|
||||||
nvidia := container.Nvidia
|
nvidia := container.Nvidia
|
||||||
if nvidia == nil {
|
if nvidia == nil {
|
||||||
// Not a GPU container, nothing to do.
|
// Not a GPU container, nothing to do.
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if err := hook.assertModeIsLegacy(); err != nil {
|
||||||
|
log.Panicf("%v", err)
|
||||||
|
}
|
||||||
|
|
||||||
rootfs := getRootfsPath(container)
|
rootfs := getRootfsPath(container)
|
||||||
|
|
||||||
args := []string{getCLIPath(cli)}
|
args := []string{getCLIPath(cli)}
|
||||||
if cli.Root != nil {
|
if cli.Root != "" {
|
||||||
args = append(args, fmt.Sprintf("--root=%s", *cli.Root))
|
args = append(args, fmt.Sprintf("--root=%s", cli.Root))
|
||||||
}
|
}
|
||||||
if cli.LoadKmods {
|
if cli.LoadKmods {
|
||||||
args = append(args, "--load-kmods")
|
args = append(args, "--load-kmods")
|
||||||
}
|
}
|
||||||
|
if hook.Features.DisableImexChannelCreation.IsEnabled() {
|
||||||
|
args = append(args, "--no-create-imex-channels")
|
||||||
|
}
|
||||||
if cli.NoPivot {
|
if cli.NoPivot {
|
||||||
args = append(args, "--no-pivot")
|
args = append(args, "--no-pivot")
|
||||||
}
|
}
|
||||||
if *debugflag {
|
if *debugflag {
|
||||||
args = append(args, "--debug=/dev/stderr")
|
args = append(args, "--debug=/dev/stderr")
|
||||||
} else if cli.Debug != nil {
|
} else if cli.Debug != "" {
|
||||||
args = append(args, fmt.Sprintf("--debug=%s", *cli.Debug))
|
args = append(args, fmt.Sprintf("--debug=%s", cli.Debug))
|
||||||
}
|
}
|
||||||
if cli.Ldcache != nil {
|
if cli.Ldcache != "" {
|
||||||
args = append(args, fmt.Sprintf("--ldcache=%s", *cli.Ldcache))
|
args = append(args, fmt.Sprintf("--ldcache=%s", cli.Ldcache))
|
||||||
}
|
}
|
||||||
if cli.User != nil {
|
if cli.User != "" {
|
||||||
args = append(args, fmt.Sprintf("--user=%s", *cli.User))
|
args = append(args, fmt.Sprintf("--user=%s", cli.User))
|
||||||
}
|
}
|
||||||
args = append(args, "configure")
|
args = append(args, "configure")
|
||||||
|
|
||||||
if cli.Ldconfig != nil {
|
args = append(args, hook.nvidiaContainerCliCUDACompatModeFlags()...)
|
||||||
args = append(args, fmt.Sprintf("--ldconfig=%s", *cli.Ldconfig))
|
|
||||||
|
if ldconfigPath := cli.NormalizeLDConfigPath(); ldconfigPath != "" {
|
||||||
|
args = append(args, fmt.Sprintf("--ldconfig=%s", ldconfigPath))
|
||||||
}
|
}
|
||||||
if cli.NoCgroups {
|
if cli.NoCgroups {
|
||||||
args = append(args, "--no-cgroups")
|
args = append(args, "--no-cgroups")
|
||||||
}
|
}
|
||||||
if len(nvidia.Devices) > 0 {
|
if devicesString := strings.Join(nvidia.Devices, ","); len(devicesString) > 0 {
|
||||||
args = append(args, fmt.Sprintf("--device=%s", nvidia.Devices))
|
args = append(args, fmt.Sprintf("--device=%s", devicesString))
|
||||||
}
|
}
|
||||||
if len(nvidia.MigConfigDevices) > 0 {
|
if len(nvidia.MigConfigDevices) > 0 {
|
||||||
args = append(args, fmt.Sprintf("--mig-config=%s", nvidia.MigConfigDevices))
|
args = append(args, fmt.Sprintf("--mig-config=%s", nvidia.MigConfigDevices))
|
||||||
@@ -125,6 +131,9 @@ func doPrestart() {
|
|||||||
if len(nvidia.MigMonitorDevices) > 0 {
|
if len(nvidia.MigMonitorDevices) > 0 {
|
||||||
args = append(args, fmt.Sprintf("--mig-monitor=%s", nvidia.MigMonitorDevices))
|
args = append(args, fmt.Sprintf("--mig-monitor=%s", nvidia.MigMonitorDevices))
|
||||||
}
|
}
|
||||||
|
if imexString := strings.Join(nvidia.ImexChannels, ","); len(imexString) > 0 {
|
||||||
|
args = append(args, fmt.Sprintf("--imex-channel=%s", imexString))
|
||||||
|
}
|
||||||
|
|
||||||
for _, cap := range strings.Split(nvidia.DriverCapabilities, ",") {
|
for _, cap := range strings.Split(nvidia.DriverCapabilities, ",") {
|
||||||
if len(cap) == 0 {
|
if len(cap) == 0 {
|
||||||
@@ -133,16 +142,15 @@ func doPrestart() {
|
|||||||
args = append(args, capabilityToCLI(cap))
|
args = append(args, capabilityToCLI(cap))
|
||||||
}
|
}
|
||||||
|
|
||||||
if !hook.DisableRequire && !nvidia.DisableRequire {
|
for _, req := range nvidia.Requirements {
|
||||||
for _, req := range nvidia.Requirements {
|
args = append(args, fmt.Sprintf("--require=%s", req))
|
||||||
args = append(args, fmt.Sprintf("--require=%s", req))
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
args = append(args, fmt.Sprintf("--pid=%s", strconv.FormatUint(uint64(container.Pid), 10)))
|
args = append(args, fmt.Sprintf("--pid=%s", strconv.FormatUint(uint64(container.Pid), 10)))
|
||||||
args = append(args, rootfs)
|
args = append(args, rootfs)
|
||||||
|
|
||||||
env := append(os.Environ(), cli.Environment...)
|
env := append(os.Environ(), cli.Environment...)
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection?
|
||||||
err = syscall.Exec(args[0], args, env)
|
err = syscall.Exec(args[0], args, env)
|
||||||
log.Panicln("exec failed:", err)
|
log.Panicln("exec failed:", err)
|
||||||
}
|
}
|
||||||
@@ -185,11 +193,11 @@ func main() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// logInterceptor implements the info.Logger interface to allow for logging from this function.
|
// logInterceptor implements the logger.Interface to allow for logging from executable.
|
||||||
type logInterceptor struct{}
|
type logInterceptor struct {
|
||||||
|
logger.NullLogger
|
||||||
|
}
|
||||||
|
|
||||||
func (l *logInterceptor) Infof(format string, args ...interface{}) {
|
func (l *logInterceptor) Infof(format string, args ...interface{}) {
|
||||||
log.Printf(format, args...)
|
log.Printf(format, args...)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (l *logInterceptor) Debugf(format string, args ...interface{}) {}
|
|
||||||
|
|||||||
@@ -21,8 +21,8 @@ The `runtimes` config option allows for the low-level runtime to be specified. T
|
|||||||
The default value for this setting is:
|
The default value for this setting is:
|
||||||
```toml
|
```toml
|
||||||
runtimes = [
|
runtimes = [
|
||||||
"docker-runc",
|
|
||||||
"runc",
|
"runc",
|
||||||
|
"crun",
|
||||||
]
|
]
|
||||||
```
|
```
|
||||||
|
|
||||||
@@ -85,3 +85,126 @@ Alternatively the NVIDIA Container Runtime can be set as the default runtime for
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Environment variables (OCI spec)
|
||||||
|
|
||||||
|
Each environment variable maps to an command-line argument for `nvidia-container-cli` from [libnvidia-container](https://github.com/NVIDIA/libnvidia-container).
|
||||||
|
These variables are already set in our [official CUDA images](https://hub.docker.com/r/nvidia/cuda/).
|
||||||
|
|
||||||
|
### `NVIDIA_VISIBLE_DEVICES`
|
||||||
|
This variable controls which GPUs will be made accessible inside the container.
|
||||||
|
|
||||||
|
#### Possible values
|
||||||
|
* `0,1,2`, `GPU-fef8089b` …: a comma-separated list of GPU UUID(s) or index(es).
|
||||||
|
* `all`: all GPUs will be accessible, this is the default value in our container images.
|
||||||
|
* `none`: no GPU will be accessible, but driver capabilities will be enabled.
|
||||||
|
* `void` or *empty* or *unset*: `nvidia-container-runtime` will have the same behavior as `runc`.
|
||||||
|
|
||||||
|
**Note**: When running on a MIG capable device, the following values will also be available:
|
||||||
|
* `0:0,0:1,1:0`, `MIG-GPU-fef8089b/0/1` …: a comma-separated list of MIG Device UUID(s) or index(es).
|
||||||
|
|
||||||
|
Where the MIG device indices have the form `<GPU Device Index>:<MIG Device Index>` as seen in the example output:
|
||||||
|
```
|
||||||
|
$ nvidia-smi -L
|
||||||
|
GPU 0: Graphics Device (UUID: GPU-b8ea3855-276c-c9cb-b366-c6fa655957c5)
|
||||||
|
MIG Device 0: (UUID: MIG-GPU-b8ea3855-276c-c9cb-b366-c6fa655957c5/1/0)
|
||||||
|
MIG Device 1: (UUID: MIG-GPU-b8ea3855-276c-c9cb-b366-c6fa655957c5/1/1)
|
||||||
|
MIG Device 2: (UUID: MIG-GPU-b8ea3855-276c-c9cb-b366-c6fa655957c5/11/0)
|
||||||
|
```
|
||||||
|
|
||||||
|
### `NVIDIA_MIG_CONFIG_DEVICES`
|
||||||
|
This variable controls which of the visible GPUs can have their MIG
|
||||||
|
configuration managed from within the container. This includes enabling and
|
||||||
|
disabling MIG mode, creating and destroying GPU Instances and Compute
|
||||||
|
Instances, etc.
|
||||||
|
|
||||||
|
#### Possible values
|
||||||
|
* `all`: Allow all MIG-capable GPUs in the visible device list to have their
|
||||||
|
MIG configurations managed.
|
||||||
|
|
||||||
|
**Note**:
|
||||||
|
* This feature is only available on MIG capable devices (e.g. the A100).
|
||||||
|
* To use this feature, the container must be started with `CAP_SYS_ADMIN` privileges.
|
||||||
|
* When not running as `root`, the container user must have read access to the
|
||||||
|
`/proc/driver/nvidia/capabilities/mig/config` file on the host.
|
||||||
|
|
||||||
|
### `NVIDIA_MIG_MONITOR_DEVICES`
|
||||||
|
This variable controls which of the visible GPUs can have aggregate information
|
||||||
|
about all of their MIG devices monitored from within the container. This
|
||||||
|
includes inspecting the aggregate memory usage, listing the aggregate running
|
||||||
|
processes, etc.
|
||||||
|
|
||||||
|
#### Possible values
|
||||||
|
* `all`: Allow all MIG-capable GPUs in the visible device list to have their
|
||||||
|
MIG devices monitored.
|
||||||
|
|
||||||
|
**Note**:
|
||||||
|
* This feature is only available on MIG capable devices (e.g. the A100).
|
||||||
|
* To use this feature, the container must be started with `CAP_SYS_ADMIN` privileges.
|
||||||
|
* When not running as `root`, the container user must have read access to the
|
||||||
|
`/proc/driver/nvidia/capabilities/mig/monitor` file on the host.
|
||||||
|
|
||||||
|
### `NVIDIA_DRIVER_CAPABILITIES`
|
||||||
|
This option controls which driver libraries/binaries will be mounted inside the container.
|
||||||
|
|
||||||
|
#### Possible values
|
||||||
|
* `compute,video`, `graphics,utility` …: a comma-separated list of driver features the container needs.
|
||||||
|
* `all`: enable all available driver capabilities.
|
||||||
|
* *empty* or *unset*: use default driver capability: `utility,compute`.
|
||||||
|
|
||||||
|
#### Supported driver capabilities
|
||||||
|
* `compute`: required for CUDA and OpenCL applications.
|
||||||
|
* `compat32`: required for running 32-bit applications.
|
||||||
|
* `graphics`: required for running OpenGL and Vulkan applications.
|
||||||
|
* `utility`: required for using `nvidia-smi` and NVML.
|
||||||
|
* `video`: required for using the Video Codec SDK.
|
||||||
|
* `display`: required for leveraging X11 display.
|
||||||
|
|
||||||
|
### `NVIDIA_REQUIRE_*`
|
||||||
|
A logical expression to define constraints on the configurations supported by the container.
|
||||||
|
|
||||||
|
#### Supported constraints
|
||||||
|
* `cuda`: constraint on the CUDA driver version.
|
||||||
|
* `driver`: constraint on the driver version.
|
||||||
|
* `arch`: constraint on the compute architectures of the selected GPUs.
|
||||||
|
* `brand`: constraint on the brand of the selected GPUs (e.g. GeForce, Tesla, GRID).
|
||||||
|
|
||||||
|
#### Expressions
|
||||||
|
Multiple constraints can be expressed in a single environment variable: space-separated constraints are ORed, comma-separated constraints are ANDed.
|
||||||
|
Multiple environment variables of the form `NVIDIA_REQUIRE_*` are ANDed together.
|
||||||
|
|
||||||
|
### `NVIDIA_DISABLE_REQUIRE`
|
||||||
|
Single switch to disable all the constraints of the form `NVIDIA_REQUIRE_*`.
|
||||||
|
|
||||||
|
### `NVIDIA_REQUIRE_CUDA`
|
||||||
|
|
||||||
|
The version of the CUDA toolkit used by the container. It is an instance of the generic `NVIDIA_REQUIRE_*` case and it is set by official CUDA images.
|
||||||
|
If the version of the NVIDIA driver is insufficient to run this version of CUDA, the container will not be started.
|
||||||
|
|
||||||
|
#### Possible values
|
||||||
|
* `cuda>=7.5`, `cuda>=8.0`, `cuda>=9.0` …: any valid CUDA version in the form `major.minor`.
|
||||||
|
|
||||||
|
### `CUDA_VERSION`
|
||||||
|
Similar to `NVIDIA_REQUIRE_CUDA`, for legacy CUDA images.
|
||||||
|
In addition, if `NVIDIA_REQUIRE_CUDA` is not set, `NVIDIA_VISIBLE_DEVICES` and `NVIDIA_DRIVER_CAPABILITIES` will default to `all`.
|
||||||
|
|
||||||
|
## Usage example
|
||||||
|
|
||||||
|
**NOTE:** The use of the `nvidia-container-runtime` as CLI replacement for `runc` is uncommon and is only provided for completeness.
|
||||||
|
|
||||||
|
Although the `nvidia-container-runtime` is typically configured as a replacement for `runc` or `crun` in various container engines, it can also be
|
||||||
|
invoked from the command line as `runc` would. For example:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
# Setup a rootfs based on Ubuntu 16.04
|
||||||
|
cd $(mktemp -d) && mkdir rootfs
|
||||||
|
curl -sS http://cdimage.ubuntu.com/ubuntu-base/releases/16.04/release/ubuntu-base-16.04.6-base-amd64.tar.gz | tar --exclude 'dev/*' -C rootfs -xz
|
||||||
|
|
||||||
|
# Create an OCI runtime spec
|
||||||
|
nvidia-container-runtime spec
|
||||||
|
sed -i 's;"sh";"nvidia-smi";' config.json
|
||||||
|
sed -i 's;\("TERM=xterm"\);\1, "NVIDIA_VISIBLE_DEVICES=0";' config.json
|
||||||
|
|
||||||
|
# Run the container
|
||||||
|
sudo nvidia-container-runtime run nvidia_smi
|
||||||
|
```
|
||||||
|
|||||||
@@ -3,26 +3,28 @@ package main
|
|||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"io/ioutil"
|
"io"
|
||||||
|
"log"
|
||||||
"os"
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/opencontainers/runtime-spec/specs-go"
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/modifier"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/modifier"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/test"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/test"
|
||||||
"github.com/opencontainers/runtime-spec/specs-go"
|
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"github.com/stretchr/testify/require"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
nvidiaRuntime = "nvidia-container-runtime"
|
nvidiaRuntime = "nvidia-container-runtime"
|
||||||
nvidiaHook = "nvidia-container-runtime-hook"
|
nvidiaHook = "nvidia-container-runtime-hook"
|
||||||
bundlePathSuffix = "test/output/bundle/"
|
bundlePathSuffix = "tests/output/bundle/"
|
||||||
specFile = "config.json"
|
specFile = "config.json"
|
||||||
unmodifiedSpecFileSuffix = "test/input/test_spec.json"
|
unmodifiedSpecFileSuffix = "tests/input/test_spec.json"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@@ -42,10 +44,10 @@ func TestMain(m *testing.M) {
|
|||||||
var err error
|
var err error
|
||||||
moduleRoot, err := test.GetModuleRoot()
|
moduleRoot, err := test.GetModuleRoot()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logrus.Fatalf("error in test setup: could not get module root: %v", err)
|
log.Fatalf("error in test setup: could not get module root: %v", err)
|
||||||
}
|
}
|
||||||
testBinPath := filepath.Join(moduleRoot, "test", "bin")
|
testBinPath := filepath.Join(moduleRoot, "tests", "bin")
|
||||||
testInputPath := filepath.Join(moduleRoot, "test", "input")
|
testInputPath := filepath.Join(moduleRoot, "tests", "input")
|
||||||
|
|
||||||
// Set the environment variables for the test
|
// Set the environment variables for the test
|
||||||
os.Setenv("PATH", test.PrependToPath(testBinPath, moduleRoot))
|
os.Setenv("PATH", test.PrependToPath(testBinPath, moduleRoot))
|
||||||
@@ -54,11 +56,11 @@ func TestMain(m *testing.M) {
|
|||||||
// Confirm that the environment is configured correctly
|
// Confirm that the environment is configured correctly
|
||||||
runcPath, err := exec.LookPath(runcExecutableName)
|
runcPath, err := exec.LookPath(runcExecutableName)
|
||||||
if err != nil || filepath.Join(testBinPath, runcExecutableName) != runcPath {
|
if err != nil || filepath.Join(testBinPath, runcExecutableName) != runcPath {
|
||||||
logrus.Fatalf("error in test setup: mock runc path set incorrectly in TestMain(): %v", err)
|
log.Fatalf("error in test setup: mock runc path set incorrectly in TestMain(): %v", err)
|
||||||
}
|
}
|
||||||
hookPath, err := exec.LookPath(nvidiaHook)
|
hookPath, err := exec.LookPath(nvidiaHook)
|
||||||
if err != nil || filepath.Join(testBinPath, nvidiaHook) != hookPath {
|
if err != nil || filepath.Join(testBinPath, nvidiaHook) != hookPath {
|
||||||
logrus.Fatalf("error in test setup: mock hook path set incorrectly in TestMain(): %v", err)
|
log.Fatalf("error in test setup: mock hook path set incorrectly in TestMain(): %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Store the root and binary paths in the test Config
|
// Store the root and binary paths in the test Config
|
||||||
@@ -85,6 +87,7 @@ func TestBadInput(t *testing.T) {
|
|||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle")
|
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle")
|
||||||
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
||||||
err = cmdCreate.Run()
|
err = cmdCreate.Run()
|
||||||
@@ -102,6 +105,7 @@ func TestGoodInput(t *testing.T) {
|
|||||||
t.Fatalf("error generating runtime spec: %v", err)
|
t.Fatalf("error generating runtime spec: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
cmdRun := exec.Command(nvidiaRuntime, "run", "--bundle", cfg.bundlePath(), "testcontainer")
|
cmdRun := exec.Command(nvidiaRuntime, "run", "--bundle", cfg.bundlePath(), "testcontainer")
|
||||||
t.Logf("executing: %s\n", strings.Join(cmdRun.Args, " "))
|
t.Logf("executing: %s\n", strings.Join(cmdRun.Args, " "))
|
||||||
output, err := cmdRun.CombinedOutput()
|
output, err := cmdRun.CombinedOutput()
|
||||||
@@ -112,16 +116,16 @@ func TestGoodInput(t *testing.T) {
|
|||||||
require.NoError(t, err, "should be no errors when reading and parsing spec from config.json")
|
require.NoError(t, err, "should be no errors when reading and parsing spec from config.json")
|
||||||
require.Empty(t, spec.Hooks, "there should be no hooks in config.json")
|
require.Empty(t, spec.Hooks, "there should be no hooks in config.json")
|
||||||
|
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle", cfg.bundlePath(), "testcontainer")
|
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle", cfg.bundlePath(), "testcontainer")
|
||||||
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
||||||
err = cmdCreate.Run()
|
err = cmdCreate.Run()
|
||||||
require.NoError(t, err, "runtime should not return an error")
|
require.NoError(t, err, "runtime should not return an error")
|
||||||
|
|
||||||
// Check config.json for NVIDIA prestart hook
|
// Check config.json to ensure that the NVIDIA prestart was not inserted.
|
||||||
spec, err = cfg.getRuntimeSpec()
|
spec, err = cfg.getRuntimeSpec()
|
||||||
require.NoError(t, err, "should be no errors when reading and parsing spec from config.json")
|
require.NoError(t, err, "should be no errors when reading and parsing spec from config.json")
|
||||||
require.NotEmpty(t, spec.Hooks, "there should be hooks in config.json")
|
require.Empty(t, spec.Hooks, "there should be no hooks in config.json")
|
||||||
require.Equal(t, 1, nvidiaHookCount(spec.Hooks), "exactly one nvidia prestart hook should be inserted correctly into config.json")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// NVIDIA prestart hook already present in config file
|
// NVIDIA prestart hook already present in config file
|
||||||
@@ -157,22 +161,23 @@ func TestDuplicateHook(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Test how runtime handles already existing prestart hook in config.json
|
// Test how runtime handles already existing prestart hook in config.json
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle", cfg.bundlePath(), "testcontainer")
|
cmdCreate := exec.Command(nvidiaRuntime, "create", "--bundle", cfg.bundlePath(), "testcontainer")
|
||||||
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
t.Logf("executing: %s\n", strings.Join(cmdCreate.Args, " "))
|
||||||
output, err := cmdCreate.CombinedOutput()
|
output, err := cmdCreate.CombinedOutput()
|
||||||
require.NoErrorf(t, err, "runtime should not return an error", "output=%v", string(output))
|
require.NoErrorf(t, err, "runtime should not return an error", "output=%v", string(output))
|
||||||
|
|
||||||
// Check config.json for NVIDIA prestart hook
|
// Check config.json to ensure that the NVIDIA prestart hook was removed.
|
||||||
spec, err = cfg.getRuntimeSpec()
|
spec, err = cfg.getRuntimeSpec()
|
||||||
require.NoError(t, err, "should be no errors when reading and parsing spec from config.json")
|
require.NoError(t, err, "should be no errors when reading and parsing spec from config.json")
|
||||||
require.NotEmpty(t, spec.Hooks, "there should be hooks in config.json")
|
require.Empty(t, spec.Hooks, "there should be no hooks in config.json")
|
||||||
require.Equal(t, 1, nvidiaHookCount(spec.Hooks), "exactly one nvidia prestart hook should be inserted correctly into config.json")
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// addNVIDIAHook is a basic wrapper for an addHookModifier that is used for
|
// addNVIDIAHook is a basic wrapper for an addHookModifier that is used for
|
||||||
// testing.
|
// testing.
|
||||||
func addNVIDIAHook(spec *specs.Spec) error {
|
func addNVIDIAHook(spec *specs.Spec) error {
|
||||||
m := modifier.NewStableRuntimeModifier(logrus.StandardLogger())
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
m := modifier.NewStableRuntimeModifier(logger, nvidiaHook)
|
||||||
return m.Modify(spec)
|
return m.Modify(spec)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -186,15 +191,16 @@ func (c testConfig) getRuntimeSpec() (specs.Spec, error) {
|
|||||||
}
|
}
|
||||||
defer jsonFile.Close()
|
defer jsonFile.Close()
|
||||||
|
|
||||||
jsonContent, err := ioutil.ReadAll(jsonFile)
|
jsonContent, err := io.ReadAll(jsonFile)
|
||||||
if err != nil {
|
switch {
|
||||||
|
case err != nil:
|
||||||
return spec, err
|
return spec, err
|
||||||
} else if json.Valid(jsonContent) {
|
case json.Valid(jsonContent):
|
||||||
err = json.Unmarshal(jsonContent, &spec)
|
err = json.Unmarshal(jsonContent, &spec)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return spec, err
|
return spec, err
|
||||||
}
|
}
|
||||||
} else {
|
default:
|
||||||
err = json.NewDecoder(bytes.NewReader(jsonContent)).Decode(&spec)
|
err = json.NewDecoder(bytes.NewReader(jsonContent)).Decode(&spec)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return spec, err
|
return spec, err
|
||||||
@@ -224,6 +230,7 @@ func (c testConfig) generateNewRuntimeSpec() error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
cmd := exec.Command("cp", c.unmodifiedSpecFile(), c.specFilePath())
|
cmd := exec.Command("cp", c.unmodifiedSpecFile(), c.specFilePath())
|
||||||
err = cmd.Run()
|
err = cmd.Run()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -231,18 +238,3 @@ func (c testConfig) generateNewRuntimeSpec() error {
|
|||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Return number of valid NVIDIA prestart hooks in runtime spec
|
|
||||||
func nvidiaHookCount(hooks *specs.Hooks) int {
|
|
||||||
if hooks == nil {
|
|
||||||
return 0
|
|
||||||
}
|
|
||||||
|
|
||||||
count := 0
|
|
||||||
for _, hook := range hooks.Prestart {
|
|
||||||
if strings.Contains(hook.Path, nvidiaHook) {
|
|
||||||
count++
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return count
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -15,28 +15,23 @@ docker setup \
|
|||||||
/run/nvidia/toolkit
|
/run/nvidia/toolkit
|
||||||
```
|
```
|
||||||
|
|
||||||
Configure the `nvidia-container-runtime` as a docker runtime named `NAME`. If the `--runtime-name` flag is not specified, this runtime would be called `nvidia`. A runtime named `nvidia-experimental` will also be configured using the `nvidia-container-runtime.experimental` OCI-compliant runtime shim.
|
Configure the `nvidia-container-runtime` as a docker runtime named `NAME`. If the `--runtime-name` flag is not specified, this runtime would be called `nvidia`.
|
||||||
|
|
||||||
Since `--set-as-default` is enabled by default, the specified runtime name will also be set as the default docker runtime. This can be disabled by explicityly specifying `--set-as-default=false`.
|
Since `--set-as-default` is enabled by default, the specified runtime name will also be set as the default docker runtime. This can be disabled by explicityly specifying `--set-as-default=false`.
|
||||||
|
|
||||||
**Note**: If `--runtime-name` is specified as `nvidia-experimental` explicitly, the `nvidia-experimental` runtime will be configured as the default runtime, with the `nvidia` runtime still configured and available for use.
|
|
||||||
|
|
||||||
The following table describes the behaviour for different `--runtime-name` and `--set-as-default` flag combinations.
|
The following table describes the behaviour for different `--runtime-name` and `--set-as-default` flag combinations.
|
||||||
|
|
||||||
| Flags | Installed Runtimes | Default Runtime |
|
| Flags | Installed Runtimes | Default Runtime |
|
||||||
|-------------------------------------------------------------|:--------------------------------|:----------------------|
|
|-------------------------------------------------------------|:--------------------------------|:----------------------|
|
||||||
| **NONE SPECIFIED** | `nvidia`, `nvidia-experimental` | `nvidia` |
|
| **NONE SPECIFIED** | `nvidia` | `nvidia` |
|
||||||
| `--runtime-name nvidia` | `nvidia`, `nvidia-experimental` | `nvidia` |
|
| `--runtime-name nvidia` | `nvidia` | `nvidia` |
|
||||||
| `--runtime-name NAME` | `NAME`, `nvidia-experimental` | `NAME` |
|
| `--runtime-name NAME` | `NAME` | `NAME` |
|
||||||
| `--runtime-name nvidia-experimental` | `nvidia`, `nvidia-experimental` | `nvidia-experimental` |
|
| `--set-as-default` | `nvidia` | `nvidia` |
|
||||||
| `--set-as-default` | `nvidia`, `nvidia-experimental` | `nvidia` |
|
| `--set-as-default --runtime-name nvidia` | `nvidia` | `nvidia` |
|
||||||
| `--set-as-default --runtime-name nvidia` | `nvidia`, `nvidia-experimental` | `nvidia` |
|
| `--set-as-default --runtime-name NAME` | `NAME` | `NAME` |
|
||||||
| `--set-as-default --runtime-name NAME` | `NAME`, `nvidia-experimental` | `NAME` |
|
| `--set-as-default=false` | `nvidia` | **NOT SET** |
|
||||||
| `--set-as-default --runtime-name nvidia-experimental` | `nvidia`, `nvidia-experimental` | `nvidia-experimental` |
|
| `--set-as-default=false --runtime-name NAME` | `NAME` | **NOT SET** |
|
||||||
| `--set-as-default=false` | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
| `--set-as-default=false --runtime-name nvidia` | `nvidia` | **NOT SET** |
|
||||||
| `--set-as-default=false --runtime-name NAME` | `NAME`, `nvidia-experimental` | **NOT SET** |
|
|
||||||
| `--set-as-default=false --runtime-name nvidia` | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
|
||||||
| `--set-as-default=false --runtime-name nvidia-experimental` | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
|
||||||
|
|
||||||
These combinations also hold for the environment variables that map to the command line flags: `DOCKER_RUNTIME_NAME`, `DOCKER_SET_AS_DEFAULT`.
|
These combinations also hold for the environment variables that map to the command line flags: `DOCKER_RUNTIME_NAME`, `DOCKER_SET_AS_DEFAULT`.
|
||||||
|
|
||||||
@@ -48,7 +43,7 @@ containerd setup \
|
|||||||
/run/nvidia/toolkit
|
/run/nvidia/toolkit
|
||||||
```
|
```
|
||||||
|
|
||||||
Configure the `nvidia-container-runtime` as a runtime class named `NAME`. If the `--runtime-class` flag is not specified, this runtime would be called `nvidia`. A runtime class named `nvidia-experimental` will also be configured using the `nvidia-container-runtime.experimental` OCI-compliant runtime shim.
|
Configure the `nvidia-container-runtime` as a runtime class named `NAME`. If the `--runtime-class` flag is not specified, this runtime would be called `nvidia`.
|
||||||
|
|
||||||
Adding the `--set-as-default` flag as follows:
|
Adding the `--set-as-default` flag as follows:
|
||||||
```bash
|
```bash
|
||||||
@@ -59,19 +54,15 @@ containerd setup \
|
|||||||
```
|
```
|
||||||
will set the runtime class `NAME` (or `nvidia` if not specified) as the default runtime class.
|
will set the runtime class `NAME` (or `nvidia` if not specified) as the default runtime class.
|
||||||
|
|
||||||
**Note**: If `--runtime-class` is specified as `nvidia-experimental` explicitly and `--set-as-default` is specified, the `nvidia-experimental` runtime will be configured as the default runtime class, with the `nvidia` runtime class still configured and available for use.
|
|
||||||
|
|
||||||
The following table describes the behaviour for different `--runtime-class` and `--set-as-default` flag combinations.
|
The following table describes the behaviour for different `--runtime-class` and `--set-as-default` flag combinations.
|
||||||
|
|
||||||
| Flags | Installed Runtime Classes | Default Runtime Class |
|
| Flags | Installed Runtime Classes | Default Runtime Class |
|
||||||
|--------------------------------------------------------|:--------------------------------|:----------------------|
|
|--------------------------------------------------------|:--------------------------------|:----------------------|
|
||||||
| **NONE SPECIFIED** | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
| **NONE SPECIFIED** | `nvidia` | **NOT SET** |
|
||||||
| `--runtime-class NAME` | `NAME`, `nvidia-experimental` | **NOT SET** |
|
| `--runtime-class NAME` | `NAME` | **NOT SET** |
|
||||||
| `--runtime-class nvidia` | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
| `--runtime-class nvidia` | `nvidia` | **NOT SET** |
|
||||||
| `--runtime-class nvidia-experimental` | `nvidia`, `nvidia-experimental` | **NOT SET** |
|
| `--set-as-default` | `nvidia` | `nvidia` |
|
||||||
| `--set-as-default` | `nvidia`, `nvidia-experimental` | `nvidia` |
|
| `--set-as-default --runtime-class NAME` | `NAME` | `NAME` |
|
||||||
| `--set-as-default --runtime-class NAME` | `NAME`, `nvidia-experimental` | `NAME` |
|
| `--set-as-default --runtime-class nvidia` | `nvidia` | `nvidia` |
|
||||||
| `--set-as-default --runtime-class nvidia` | `nvidia`, `nvidia-experimental` | `nvidia` |
|
|
||||||
| `--set-as-default --runtime-class nvidia-experimental` | `nvidia`, `nvidia-experimental` | `nvidia-experimental` |
|
|
||||||
|
|
||||||
These combinations also hold for the environment variables that map to the command line flags.
|
These combinations also hold for the environment variables that map to the command line flags.
|
||||||
182
cmd/nvidia-ctk-installer/container/container.go
Normal file
182
cmd/nvidia-ctk-installer/container/container.go
Normal file
@@ -0,0 +1,182 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
|
||||||
|
"github.com/sirupsen/logrus"
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/operator"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
restartModeNone = "none"
|
||||||
|
restartModeSignal = "signal"
|
||||||
|
restartModeSystemd = "systemd"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Options defines the shared options for the CLIs to configure containers runtimes.
|
||||||
|
type Options struct {
|
||||||
|
Config string
|
||||||
|
Socket string
|
||||||
|
// ExecutablePath specifies the path to the container runtime executable.
|
||||||
|
// This is used to extract the current config, for example.
|
||||||
|
// If a HostRootMount is specified, this path is relative to the host root
|
||||||
|
// mount.
|
||||||
|
ExecutablePath string
|
||||||
|
// EnabledCDI indicates whether CDI should be enabled.
|
||||||
|
EnableCDI bool
|
||||||
|
RuntimeName string
|
||||||
|
RuntimeDir string
|
||||||
|
SetAsDefault bool
|
||||||
|
RestartMode string
|
||||||
|
HostRootMount string
|
||||||
|
}
|
||||||
|
|
||||||
|
// ParseArgs parses the command line arguments to the CLI
|
||||||
|
func ParseArgs(c *cli.Command, o *Options) error {
|
||||||
|
if o.RuntimeDir != "" {
|
||||||
|
logrus.Debug("Runtime directory already set; ignoring arguments")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
args := c.Args()
|
||||||
|
|
||||||
|
logrus.Infof("Parsing arguments: %v", args)
|
||||||
|
if c.NArg() != 1 {
|
||||||
|
return fmt.Errorf("incorrect number of arguments")
|
||||||
|
}
|
||||||
|
|
||||||
|
o.RuntimeDir = args.Get(0)
|
||||||
|
|
||||||
|
logrus.Infof("Successfully parsed arguments")
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Configure applies the options to the specified config
|
||||||
|
func (o Options) Configure(cfg engine.Interface) error {
|
||||||
|
err := o.UpdateConfig(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to update config: %v", err)
|
||||||
|
}
|
||||||
|
return o.flush(cfg)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Unconfigure removes the options from the specified config
|
||||||
|
func (o Options) Unconfigure(cfg engine.Interface) error {
|
||||||
|
err := o.RevertConfig(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to update config: %v", err)
|
||||||
|
}
|
||||||
|
return o.flush(cfg)
|
||||||
|
}
|
||||||
|
|
||||||
|
// flush flushes the specified config to disk
|
||||||
|
func (o Options) flush(cfg engine.Interface) error {
|
||||||
|
logrus.Infof("Flushing config to %v", o.Config)
|
||||||
|
n, err := cfg.Save(o.Config)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to flush config: %v", err)
|
||||||
|
}
|
||||||
|
if n == 0 {
|
||||||
|
logrus.Infof("Config file is empty, removed")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// UpdateConfig updates the specified config to include the nvidia runtimes
|
||||||
|
func (o Options) UpdateConfig(cfg engine.Interface) error {
|
||||||
|
runtimes := operator.GetRuntimes(
|
||||||
|
operator.WithNvidiaRuntimeName(o.RuntimeName),
|
||||||
|
operator.WithSetAsDefault(o.SetAsDefault),
|
||||||
|
operator.WithRoot(o.RuntimeDir),
|
||||||
|
)
|
||||||
|
for name, runtime := range runtimes {
|
||||||
|
err := cfg.AddRuntime(name, runtime.Path, runtime.SetAsDefault)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to update runtime %q: %v", name, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if o.EnableCDI {
|
||||||
|
cfg.EnableCDI()
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RevertConfig reverts the specified config to remove the nvidia runtimes
|
||||||
|
func (o Options) RevertConfig(cfg engine.Interface) error {
|
||||||
|
runtimes := operator.GetRuntimes(
|
||||||
|
operator.WithNvidiaRuntimeName(o.RuntimeName),
|
||||||
|
operator.WithSetAsDefault(o.SetAsDefault),
|
||||||
|
operator.WithRoot(o.RuntimeDir),
|
||||||
|
)
|
||||||
|
for name := range runtimes {
|
||||||
|
err := cfg.RemoveRuntime(name)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to remove runtime %q: %v", name, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Restart restarts the specified service
|
||||||
|
func (o Options) Restart(service string, withSignal func(string) error) error {
|
||||||
|
switch o.RestartMode {
|
||||||
|
case restartModeNone:
|
||||||
|
logrus.Warningf("Skipping restart of %v due to --restart-mode=%v", service, o.RestartMode)
|
||||||
|
return nil
|
||||||
|
case restartModeSignal:
|
||||||
|
return withSignal(o.Socket)
|
||||||
|
case restartModeSystemd:
|
||||||
|
return o.SystemdRestart(service)
|
||||||
|
}
|
||||||
|
|
||||||
|
return fmt.Errorf("invalid restart mode specified: %v", o.RestartMode)
|
||||||
|
}
|
||||||
|
|
||||||
|
// SystemdRestart restarts the specified service using systemd
|
||||||
|
func (o Options) SystemdRestart(service string) error {
|
||||||
|
var args []string
|
||||||
|
var msg string
|
||||||
|
if o.HostRootMount != "" {
|
||||||
|
msg = " on host"
|
||||||
|
args = append(args, "chroot", o.HostRootMount)
|
||||||
|
}
|
||||||
|
args = append(args, "systemctl", "restart", service)
|
||||||
|
|
||||||
|
logrus.Infof("Restarting %v%v using systemd: %v", service, msg, args)
|
||||||
|
|
||||||
|
//nolint:gosec // TODO: Can we harden this so that there is less risk of command injection
|
||||||
|
cmd := exec.Command(args[0], args[1:]...)
|
||||||
|
cmd.Stdout = os.Stdout
|
||||||
|
cmd.Stderr = os.Stderr
|
||||||
|
err := cmd.Run()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error restarting %v using systemd: %v", service, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -19,21 +19,18 @@ package operator
|
|||||||
import "path/filepath"
|
import "path/filepath"
|
||||||
|
|
||||||
const (
|
const (
|
||||||
defaultRuntimeName = "nvidia"
|
defaultRuntimeName = "nvidia"
|
||||||
experimentalRuntimeName = "nvidia-experimental"
|
|
||||||
|
|
||||||
defaultRoot = "/usr/bin"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// Runtime defines a runtime to be configured.
|
// Runtime defines a runtime to be configured.
|
||||||
// The path and whether the runtime is the default runtime can be specfied
|
// The path and whether the runtime is the default runtime can be specified
|
||||||
type Runtime struct {
|
type Runtime struct {
|
||||||
name string
|
name string
|
||||||
Path string
|
Path string
|
||||||
SetAsDefault bool
|
SetAsDefault bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// Runtimes defines a set of runtimes to be configure for use in the GPU Operator
|
// Runtimes defines a set of runtimes to be configured for use in the GPU Operator
|
||||||
type Runtimes map[string]Runtime
|
type Runtimes map[string]Runtime
|
||||||
|
|
||||||
type config struct {
|
type config struct {
|
||||||
@@ -49,9 +46,6 @@ func GetRuntimes(opts ...Option) Runtimes {
|
|||||||
opt(c)
|
opt(c)
|
||||||
}
|
}
|
||||||
|
|
||||||
if c.root == "" {
|
|
||||||
c.root = defaultRoot
|
|
||||||
}
|
|
||||||
if c.nvidiaRuntimeName == "" {
|
if c.nvidiaRuntimeName == "" {
|
||||||
c.nvidiaRuntimeName = defaultRuntimeName
|
c.nvidiaRuntimeName = defaultRuntimeName
|
||||||
}
|
}
|
||||||
@@ -59,7 +53,7 @@ func GetRuntimes(opts ...Option) Runtimes {
|
|||||||
runtimes := make(Runtimes)
|
runtimes := make(Runtimes)
|
||||||
runtimes.add(c.nvidiaRuntime())
|
runtimes.add(c.nvidiaRuntime())
|
||||||
|
|
||||||
modes := []string{"experimental", "cdi", "legacy"}
|
modes := []string{"cdi", "legacy"}
|
||||||
for _, mode := range modes {
|
for _, mode := range modes {
|
||||||
runtimes.add(c.modeRuntime(mode))
|
runtimes.add(c.modeRuntime(mode))
|
||||||
}
|
}
|
||||||
@@ -77,17 +71,16 @@ func (r Runtimes) DefaultRuntimeName() string {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Add a runtime to the set of runtimes.
|
// Add a runtime to the set of runtimes.
|
||||||
func (r *Runtimes) add(runtime Runtime) {
|
func (r Runtimes) add(runtime Runtime) {
|
||||||
(*r)[runtime.name] = runtime
|
r[runtime.name] = runtime
|
||||||
}
|
}
|
||||||
|
|
||||||
// nvidiaRuntime creates a runtime that corresponds to the nvidia runtime.
|
// nvidiaRuntime creates a runtime that corresponds to the nvidia runtime.
|
||||||
// If name is equal to one of the predefined runtimes, `nvidia` is used as the runtime name instead.
|
// If name is equal to one of the predefined runtimes, `nvidia` is used as the runtime name instead.
|
||||||
func (c config) nvidiaRuntime() Runtime {
|
func (c config) nvidiaRuntime() Runtime {
|
||||||
predefinedRuntimes := map[string]struct{}{
|
predefinedRuntimes := map[string]struct{}{
|
||||||
"nvidia-experimental": {},
|
"nvidia-cdi": {},
|
||||||
"nvidia-cdi": {},
|
"nvidia-legacy": {},
|
||||||
"nvidia-legacy": {},
|
|
||||||
}
|
}
|
||||||
name := c.nvidiaRuntimeName
|
name := c.nvidiaRuntimeName
|
||||||
if _, isPredefinedRuntime := predefinedRuntimes[name]; isPredefinedRuntime {
|
if _, isPredefinedRuntime := predefinedRuntimes[name]; isPredefinedRuntime {
|
||||||
@@ -27,7 +27,6 @@ func TestOptions(t *testing.T) {
|
|||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
setAsDefault bool
|
setAsDefault bool
|
||||||
nvidiaRuntimeName string
|
nvidiaRuntimeName string
|
||||||
root string
|
|
||||||
expectedDefaultRuntime string
|
expectedDefaultRuntime string
|
||||||
expectedRuntimes Runtimes
|
expectedRuntimes Runtimes
|
||||||
}{
|
}{
|
||||||
@@ -37,10 +36,6 @@ func TestOptions(t *testing.T) {
|
|||||||
name: "nvidia",
|
name: "nvidia",
|
||||||
Path: "/usr/bin/nvidia-container-runtime",
|
Path: "/usr/bin/nvidia-container-runtime",
|
||||||
},
|
},
|
||||||
"nvidia-experimental": Runtime{
|
|
||||||
name: "nvidia-experimental",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
"nvidia-cdi": Runtime{
|
"nvidia-cdi": Runtime{
|
||||||
name: "nvidia-cdi",
|
name: "nvidia-cdi",
|
||||||
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
||||||
@@ -60,10 +55,6 @@ func TestOptions(t *testing.T) {
|
|||||||
Path: "/usr/bin/nvidia-container-runtime",
|
Path: "/usr/bin/nvidia-container-runtime",
|
||||||
SetAsDefault: true,
|
SetAsDefault: true,
|
||||||
},
|
},
|
||||||
"nvidia-experimental": Runtime{
|
|
||||||
name: "nvidia-experimental",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
"nvidia-cdi": Runtime{
|
"nvidia-cdi": Runtime{
|
||||||
name: "nvidia-cdi",
|
name: "nvidia-cdi",
|
||||||
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
||||||
@@ -84,10 +75,6 @@ func TestOptions(t *testing.T) {
|
|||||||
Path: "/usr/bin/nvidia-container-runtime",
|
Path: "/usr/bin/nvidia-container-runtime",
|
||||||
SetAsDefault: true,
|
SetAsDefault: true,
|
||||||
},
|
},
|
||||||
"nvidia-experimental": Runtime{
|
|
||||||
name: "nvidia-experimental",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
"nvidia-cdi": Runtime{
|
"nvidia-cdi": Runtime{
|
||||||
name: "nvidia-cdi",
|
name: "nvidia-cdi",
|
||||||
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
||||||
@@ -108,10 +95,6 @@ func TestOptions(t *testing.T) {
|
|||||||
Path: "/usr/bin/nvidia-container-runtime",
|
Path: "/usr/bin/nvidia-container-runtime",
|
||||||
SetAsDefault: true,
|
SetAsDefault: true,
|
||||||
},
|
},
|
||||||
"nvidia-experimental": Runtime{
|
|
||||||
name: "nvidia-experimental",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
"nvidia-cdi": Runtime{
|
"nvidia-cdi": Runtime{
|
||||||
name: "nvidia-cdi",
|
name: "nvidia-cdi",
|
||||||
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
||||||
@@ -130,56 +113,6 @@ func TestOptions(t *testing.T) {
|
|||||||
name: "NAME",
|
name: "NAME",
|
||||||
Path: "/usr/bin/nvidia-container-runtime",
|
Path: "/usr/bin/nvidia-container-runtime",
|
||||||
},
|
},
|
||||||
"nvidia-experimental": Runtime{
|
|
||||||
name: "nvidia-experimental",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
"nvidia-cdi": Runtime{
|
|
||||||
name: "nvidia-cdi",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
|
||||||
},
|
|
||||||
"nvidia-legacy": Runtime{
|
|
||||||
name: "nvidia-legacy",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime.legacy",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
setAsDefault: true,
|
|
||||||
nvidiaRuntimeName: "nvidia-experimental",
|
|
||||||
expectedDefaultRuntime: "nvidia-experimental",
|
|
||||||
expectedRuntimes: Runtimes{
|
|
||||||
"nvidia": Runtime{
|
|
||||||
name: "nvidia",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime",
|
|
||||||
},
|
|
||||||
"nvidia-experimental": Runtime{
|
|
||||||
name: "nvidia-experimental",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime.experimental",
|
|
||||||
SetAsDefault: true,
|
|
||||||
},
|
|
||||||
"nvidia-cdi": Runtime{
|
|
||||||
name: "nvidia-cdi",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
|
||||||
},
|
|
||||||
"nvidia-legacy": Runtime{
|
|
||||||
name: "nvidia-legacy",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime.legacy",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
setAsDefault: false,
|
|
||||||
nvidiaRuntimeName: "nvidia-experimental",
|
|
||||||
expectedRuntimes: Runtimes{
|
|
||||||
"nvidia": Runtime{
|
|
||||||
name: "nvidia",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime",
|
|
||||||
},
|
|
||||||
"nvidia-experimental": Runtime{
|
|
||||||
name: "nvidia-experimental",
|
|
||||||
Path: "/usr/bin/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
"nvidia-cdi": Runtime{
|
"nvidia-cdi": Runtime{
|
||||||
name: "nvidia-cdi",
|
name: "nvidia-cdi",
|
||||||
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
Path: "/usr/bin/nvidia-container-runtime.cdi",
|
||||||
@@ -197,7 +130,7 @@ func TestOptions(t *testing.T) {
|
|||||||
runtimes := GetRuntimes(
|
runtimes := GetRuntimes(
|
||||||
WithNvidiaRuntimeName(tc.nvidiaRuntimeName),
|
WithNvidiaRuntimeName(tc.nvidiaRuntimeName),
|
||||||
WithSetAsDefault(tc.setAsDefault),
|
WithSetAsDefault(tc.setAsDefault),
|
||||||
WithRoot(tc.root),
|
WithRoot("/usr/bin"),
|
||||||
)
|
)
|
||||||
|
|
||||||
require.EqualValues(t, tc.expectedRuntimes, runtimes)
|
require.EqualValues(t, tc.expectedRuntimes, runtimes)
|
||||||
@@ -14,24 +14,28 @@
|
|||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package main
|
package containerd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/engine/containerd"
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
"github.com/pelletier/go-toml"
|
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/containerd"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/toml"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestUpdateV1ConfigDefaultRuntime(t *testing.T) {
|
func TestUpdateV1ConfigDefaultRuntime(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
const runtimeDir = "/test/runtime/dir"
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
legacyConfig bool
|
legacyConfig bool
|
||||||
setAsDefault bool
|
setAsDefault bool
|
||||||
runtimeClass string
|
runtimeName string
|
||||||
expectedDefaultRuntimeName interface{}
|
expectedDefaultRuntimeName interface{}
|
||||||
expectedDefaultRuntimeBinary interface{}
|
expectedDefaultRuntimeBinary interface{}
|
||||||
}{
|
}{
|
||||||
@@ -51,17 +55,10 @@ func TestUpdateV1ConfigDefaultRuntime(t *testing.T) {
|
|||||||
{
|
{
|
||||||
legacyConfig: true,
|
legacyConfig: true,
|
||||||
setAsDefault: true,
|
setAsDefault: true,
|
||||||
runtimeClass: "NAME",
|
runtimeName: "NAME",
|
||||||
expectedDefaultRuntimeName: nil,
|
expectedDefaultRuntimeName: nil,
|
||||||
expectedDefaultRuntimeBinary: "/test/runtime/dir/nvidia-container-runtime",
|
expectedDefaultRuntimeBinary: "/test/runtime/dir/nvidia-container-runtime",
|
||||||
},
|
},
|
||||||
{
|
|
||||||
legacyConfig: true,
|
|
||||||
setAsDefault: true,
|
|
||||||
runtimeClass: "nvidia-experimental",
|
|
||||||
expectedDefaultRuntimeName: nil,
|
|
||||||
expectedDefaultRuntimeBinary: "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
legacyConfig: false,
|
legacyConfig: false,
|
||||||
setAsDefault: false,
|
setAsDefault: false,
|
||||||
@@ -77,72 +74,64 @@ func TestUpdateV1ConfigDefaultRuntime(t *testing.T) {
|
|||||||
{
|
{
|
||||||
legacyConfig: false,
|
legacyConfig: false,
|
||||||
setAsDefault: true,
|
setAsDefault: true,
|
||||||
runtimeClass: "NAME",
|
runtimeName: "NAME",
|
||||||
expectedDefaultRuntimeName: "NAME",
|
expectedDefaultRuntimeName: "NAME",
|
||||||
expectedDefaultRuntimeBinary: nil,
|
expectedDefaultRuntimeBinary: nil,
|
||||||
},
|
},
|
||||||
{
|
|
||||||
legacyConfig: false,
|
|
||||||
setAsDefault: true,
|
|
||||||
runtimeClass: "nvidia-experimental",
|
|
||||||
expectedDefaultRuntimeName: "nvidia-experimental",
|
|
||||||
expectedDefaultRuntimeBinary: nil,
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
o := &options{
|
o := &container.Options{
|
||||||
useLegacyConfig: tc.legacyConfig,
|
RuntimeName: tc.runtimeName,
|
||||||
setAsDefault: tc.setAsDefault,
|
RuntimeDir: runtimeDir,
|
||||||
runtimeClass: tc.runtimeClass,
|
SetAsDefault: tc.setAsDefault,
|
||||||
runtimeType: runtimeType,
|
|
||||||
runtimeDir: runtimeDir,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
config, err := toml.TreeFromMap(map[string]interface{}{})
|
v1, err := containerd.New(
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.Empty),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithUseLegacyConfig(tc.legacyConfig),
|
||||||
|
containerd.WithConfigVersion(1),
|
||||||
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
v1 := &containerd.ConfigV1{
|
err = o.UpdateConfig(v1)
|
||||||
Tree: config,
|
require.NoError(t, err)
|
||||||
UseDefaultRuntimeName: !tc.legacyConfig,
|
|
||||||
RuntimeType: runtimeType,
|
|
||||||
}
|
|
||||||
|
|
||||||
err = UpdateConfig(v1, o)
|
cfg := v1.(*containerd.ConfigV1)
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
defaultRuntimeName := cfg.GetPath([]string{"plugins", "cri", "containerd", "default_runtime_name"})
|
||||||
|
require.EqualValues(t, tc.expectedDefaultRuntimeName, defaultRuntimeName)
|
||||||
|
|
||||||
defaultRuntimeName := v1.GetPath([]string{"plugins", "cri", "containerd", "default_runtime_name"})
|
defaultRuntime := cfg.GetPath([]string{"plugins", "cri", "containerd", "default_runtime"})
|
||||||
require.EqualValues(t, tc.expectedDefaultRuntimeName, defaultRuntimeName, "%d: %v", i, tc)
|
|
||||||
|
|
||||||
defaultRuntime := v1.GetPath([]string{"plugins", "cri", "containerd", "default_runtime"})
|
|
||||||
if tc.expectedDefaultRuntimeBinary == nil {
|
if tc.expectedDefaultRuntimeBinary == nil {
|
||||||
require.Nil(t, defaultRuntime, "%d: %v", i, tc)
|
require.Nil(t, defaultRuntime)
|
||||||
} else {
|
} else {
|
||||||
require.NotNil(t, defaultRuntime)
|
require.NotNil(t, defaultRuntime)
|
||||||
|
|
||||||
expected, err := defaultRuntimeTomlConfigV1(tc.expectedDefaultRuntimeBinary.(string))
|
expected, err := defaultRuntimeTomlConfigV1(tc.expectedDefaultRuntimeBinary.(string))
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
require.NoError(t, err)
|
||||||
|
|
||||||
configContents, _ := toml.Marshal(defaultRuntime.(*toml.Tree))
|
configContents, _ := toml.Marshal(defaultRuntime.(*toml.Tree))
|
||||||
expectedContents, _ := toml.Marshal(expected)
|
expectedContents, _ := toml.Marshal(expected)
|
||||||
|
|
||||||
require.Equal(t, string(expectedContents), string(configContents), "%d: %v: %v", i, tc)
|
require.Equal(t, string(expectedContents), string(configContents), "%d: %v: %v", i, tc)
|
||||||
}
|
}
|
||||||
|
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestUpdateV1Config(t *testing.T) {
|
func TestUpdateV1Config(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
const runtimeDir = "/test/runtime/dir"
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
runtimeClass string
|
runtimeName string
|
||||||
expectedConfig map[string]interface{}
|
expectedConfig map[string]interface{}
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
runtimeClass: "nvidia",
|
runtimeName: "nvidia",
|
||||||
expectedConfig: map[string]interface{}{
|
expectedConfig: map[string]interface{}{
|
||||||
"version": int64(1),
|
"version": int64(1),
|
||||||
"plugins": map[string]interface{}{
|
"plugins": map[string]interface{}{
|
||||||
@@ -160,17 +149,6 @@ func TestUpdateV1Config(t *testing.T) {
|
|||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"runtime_type": "runtime_type",
|
"runtime_type": "runtime_type",
|
||||||
"runtime_root": "",
|
"runtime_root": "",
|
||||||
@@ -200,7 +178,7 @@ func TestUpdateV1Config(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
runtimeClass: "NAME",
|
runtimeName: "NAME",
|
||||||
expectedConfig: map[string]interface{}{
|
expectedConfig: map[string]interface{}{
|
||||||
"version": int64(1),
|
"version": int64(1),
|
||||||
"plugins": map[string]interface{}{
|
"plugins": map[string]interface{}{
|
||||||
@@ -218,75 +196,6 @@ func TestUpdateV1Config(t *testing.T) {
|
|||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-legacy": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
runtimeClass: "nvidia-experimental",
|
|
||||||
expectedConfig: map[string]interface{}{
|
|
||||||
"version": int64(1),
|
|
||||||
"plugins": map[string]interface{}{
|
|
||||||
"cri": map[string]interface{}{
|
|
||||||
"containerd": map[string]interface{}{
|
|
||||||
"runtimes": map[string]interface{}{
|
|
||||||
"nvidia": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"runtime_type": "runtime_type",
|
"runtime_type": "runtime_type",
|
||||||
"runtime_root": "",
|
"runtime_root": "",
|
||||||
@@ -319,42 +228,41 @@ func TestUpdateV1Config(t *testing.T) {
|
|||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
o := &options{
|
o := &container.Options{
|
||||||
runtimeClass: tc.runtimeClass,
|
RuntimeName: tc.runtimeName,
|
||||||
runtimeType: runtimeType,
|
RuntimeDir: runtimeDir,
|
||||||
runtimeDir: runtimeDir,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
config, err := toml.TreeFromMap(map[string]interface{}{})
|
v1, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.Empty),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithConfigVersion(1),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
v1 := &containerd.ConfigV1{
|
err = o.UpdateConfig(v1)
|
||||||
Tree: config,
|
|
||||||
UseDefaultRuntimeName: true,
|
|
||||||
RuntimeType: runtimeType,
|
|
||||||
ContainerAnnotations: []string{"cdi.k8s.io/*"},
|
|
||||||
}
|
|
||||||
|
|
||||||
err = UpdateConfig(v1, o)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
require.Equal(t, expected.String(), config.String())
|
require.Equal(t, expected.String(), v1.String())
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestUpdateV1ConfigWithRuncPresent(t *testing.T) {
|
func TestUpdateV1ConfigWithRuncPresent(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
const runtimeDir = "/test/runtime/dir"
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
runtimeClass string
|
runtimeName string
|
||||||
expectedConfig map[string]interface{}
|
expectedConfig map[string]interface{}
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
runtimeClass: "nvidia",
|
runtimeName: "nvidia",
|
||||||
expectedConfig: map[string]interface{}{
|
expectedConfig: map[string]interface{}{
|
||||||
"version": int64(1),
|
"version": int64(1),
|
||||||
"plugins": map[string]interface{}{
|
"plugins": map[string]interface{}{
|
||||||
@@ -383,18 +291,6 @@ func TestUpdateV1ConfigWithRuncPresent(t *testing.T) {
|
|||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"runtime_type": "runc_runtime_type",
|
"runtime_type": "runc_runtime_type",
|
||||||
"runtime_root": "runc_runtime_root",
|
"runtime_root": "runc_runtime_root",
|
||||||
@@ -426,7 +322,7 @@ func TestUpdateV1ConfigWithRuncPresent(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
runtimeClass: "NAME",
|
runtimeName: "NAME",
|
||||||
expectedConfig: map[string]interface{}{
|
expectedConfig: map[string]interface{}{
|
||||||
"version": int64(1),
|
"version": int64(1),
|
||||||
"plugins": map[string]interface{}{
|
"plugins": map[string]interface{}{
|
||||||
@@ -455,90 +351,6 @@ func TestUpdateV1ConfigWithRuncPresent(t *testing.T) {
|
|||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-legacy": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
runtimeClass: "nvidia-experimental",
|
|
||||||
expectedConfig: map[string]interface{}{
|
|
||||||
"version": int64(1),
|
|
||||||
"plugins": map[string]interface{}{
|
|
||||||
"cri": map[string]interface{}{
|
|
||||||
"containerd": map[string]interface{}{
|
|
||||||
"runtimes": map[string]interface{}{
|
|
||||||
"runc": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/runc-binary",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"Runtime": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"runtime_type": "runc_runtime_type",
|
"runtime_type": "runc_runtime_type",
|
||||||
"runtime_root": "runc_runtime_root",
|
"runtime_root": "runc_runtime_root",
|
||||||
@@ -573,34 +385,78 @@ func TestUpdateV1ConfigWithRuncPresent(t *testing.T) {
|
|||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
o := &options{
|
o := &container.Options{
|
||||||
runtimeClass: tc.runtimeClass,
|
RuntimeName: tc.runtimeName,
|
||||||
runtimeType: runtimeType,
|
RuntimeDir: runtimeDir,
|
||||||
runtimeDir: runtimeDir,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
config, err := toml.TreeFromMap(runcConfigMapV1("/runc-binary"))
|
v1, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.FromMap(runcConfigMapV1("/runc-binary"))),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithConfigVersion(1),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
v1 := &containerd.ConfigV1{
|
err = o.UpdateConfig(v1)
|
||||||
Tree: config,
|
|
||||||
UseDefaultRuntimeName: true,
|
|
||||||
RuntimeType: runtimeType,
|
|
||||||
ContainerAnnotations: []string{"cdi.k8s.io/*"},
|
|
||||||
}
|
|
||||||
|
|
||||||
err = UpdateConfig(v1, o)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
require.Equal(t, expected.String(), config.String())
|
require.Equal(t, expected.String(), v1.String())
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestUpdateV1EnableCDI(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
enableCDI bool
|
||||||
|
expectedEnableCDIValue interface{}
|
||||||
|
}{
|
||||||
|
{},
|
||||||
|
{
|
||||||
|
enableCDI: false,
|
||||||
|
expectedEnableCDIValue: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
enableCDI: true,
|
||||||
|
expectedEnableCDIValue: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%v", tc.enableCDI), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
EnableCDI: tc.enableCDI,
|
||||||
|
RuntimeName: "nvidia",
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg, err := toml.Empty.Load()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
v1 := &containerd.ConfigV1{
|
||||||
|
Logger: logger,
|
||||||
|
Tree: cfg,
|
||||||
|
RuntimeType: runtimeType,
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.UpdateConfig(v1)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
enableCDIValue := v1.GetPath([]string{"plugins", "cri", "containerd", "enable_cdi"})
|
||||||
|
require.EqualValues(t, tc.expectedEnableCDIValue, enableCDIValue)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestRevertV1Config(t *testing.T) {
|
func TestRevertV1Config(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
config map[string]interface {
|
config map[string]interface {
|
||||||
}
|
}
|
||||||
@@ -619,10 +475,9 @@ func TestRevertV1Config(t *testing.T) {
|
|||||||
"cri": map[string]interface{}{
|
"cri": map[string]interface{}{
|
||||||
"containerd": map[string]interface{}{
|
"containerd": map[string]interface{}{
|
||||||
"runtimes": map[string]interface{}{
|
"runtimes": map[string]interface{}{
|
||||||
"nvidia": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime"),
|
"nvidia": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime"),
|
||||||
"nvidia-experimental": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.experimental"),
|
"nvidia-cdi": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.cdi"),
|
||||||
"nvidia-cdi": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.cdi"),
|
"nvidia-legacy": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.legacy"),
|
||||||
"nvidia-legacy": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.legacy"),
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@@ -636,10 +491,9 @@ func TestRevertV1Config(t *testing.T) {
|
|||||||
"cri": map[string]interface{}{
|
"cri": map[string]interface{}{
|
||||||
"containerd": map[string]interface{}{
|
"containerd": map[string]interface{}{
|
||||||
"runtimes": map[string]interface{}{
|
"runtimes": map[string]interface{}{
|
||||||
"nvidia": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime"),
|
"nvidia": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime"),
|
||||||
"nvidia-experimental": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.experimental"),
|
"nvidia-cdi": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.cdi"),
|
||||||
"nvidia-cdi": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.cdi"),
|
"nvidia-legacy": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.legacy"),
|
||||||
"nvidia-legacy": runtimeMapV1("/test/runtime/dir/nvidia-container-runtime.legacy"),
|
|
||||||
},
|
},
|
||||||
"default_runtime": defaultRuntimeV1("/test/runtime/dir/nvidia-container-runtime"),
|
"default_runtime": defaultRuntimeV1("/test/runtime/dir/nvidia-container-runtime"),
|
||||||
"default_runtime_name": "nvidia",
|
"default_runtime_name": "nvidia",
|
||||||
@@ -652,29 +506,26 @@ func TestRevertV1Config(t *testing.T) {
|
|||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
o := &options{
|
o := &container.Options{
|
||||||
runtimeClass: "nvidia",
|
RuntimeName: "nvidia",
|
||||||
}
|
}
|
||||||
|
|
||||||
config, err := toml.TreeFromMap(tc.config)
|
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
|
||||||
|
|
||||||
expected, err := toml.TreeFromMap(tc.expected)
|
expected, err := toml.TreeFromMap(tc.expected)
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
require.NoError(t, err)
|
||||||
|
|
||||||
v1 := &containerd.ConfigV1{
|
v1, err := containerd.New(
|
||||||
Tree: config,
|
containerd.WithLogger(logger),
|
||||||
UseDefaultRuntimeName: true,
|
containerd.WithConfigSource(toml.FromMap(tc.config)),
|
||||||
RuntimeType: runtimeType,
|
containerd.WithRuntimeType(runtimeType),
|
||||||
}
|
|
||||||
|
|
||||||
err = RevertConfig(v1, o)
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
configContents, _ := toml.Marshal(config)
|
err = o.RevertConfig(v1)
|
||||||
expectedContents, _ := toml.Marshal(expected)
|
require.NoError(t, err)
|
||||||
|
|
||||||
require.Equal(t, string(expectedContents), string(configContents), "%d: %v", i, tc)
|
require.Equal(t, expected.String(), v1.String())
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -14,15 +14,18 @@
|
|||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package main
|
package containerd
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/engine/containerd"
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
"github.com/pelletier/go-toml"
|
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/containerd"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/toml"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@@ -30,81 +33,74 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
func TestUpdateV2ConfigDefaultRuntime(t *testing.T) {
|
func TestUpdateV2ConfigDefaultRuntime(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
const runtimeDir = "/test/runtime/dir"
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
setAsDefault bool
|
setAsDefault bool
|
||||||
runtimeClass string
|
runtimeName string
|
||||||
expectedDefaultRuntimeName interface{}
|
expectedDefaultRuntimeName interface{}
|
||||||
}{
|
}{
|
||||||
{},
|
{},
|
||||||
{
|
{
|
||||||
setAsDefault: false,
|
setAsDefault: false,
|
||||||
runtimeClass: "nvidia",
|
runtimeName: "nvidia",
|
||||||
expectedDefaultRuntimeName: nil,
|
expectedDefaultRuntimeName: nil,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
setAsDefault: false,
|
setAsDefault: false,
|
||||||
runtimeClass: "NAME",
|
runtimeName: "NAME",
|
||||||
expectedDefaultRuntimeName: nil,
|
|
||||||
},
|
|
||||||
{
|
|
||||||
setAsDefault: false,
|
|
||||||
runtimeClass: "nvidia-experimental",
|
|
||||||
expectedDefaultRuntimeName: nil,
|
expectedDefaultRuntimeName: nil,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
setAsDefault: true,
|
setAsDefault: true,
|
||||||
runtimeClass: "nvidia",
|
runtimeName: "nvidia",
|
||||||
expectedDefaultRuntimeName: "nvidia",
|
expectedDefaultRuntimeName: "nvidia",
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
setAsDefault: true,
|
setAsDefault: true,
|
||||||
runtimeClass: "NAME",
|
runtimeName: "NAME",
|
||||||
expectedDefaultRuntimeName: "NAME",
|
expectedDefaultRuntimeName: "NAME",
|
||||||
},
|
},
|
||||||
{
|
|
||||||
setAsDefault: true,
|
|
||||||
runtimeClass: "nvidia-experimental",
|
|
||||||
expectedDefaultRuntimeName: "nvidia-experimental",
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
o := &options{
|
o := &container.Options{
|
||||||
setAsDefault: tc.setAsDefault,
|
RuntimeName: tc.runtimeName,
|
||||||
runtimeClass: tc.runtimeClass,
|
RuntimeDir: runtimeDir,
|
||||||
runtimeDir: runtimeDir,
|
SetAsDefault: tc.setAsDefault,
|
||||||
}
|
}
|
||||||
|
|
||||||
config, err := toml.TreeFromMap(map[string]interface{}{})
|
v2, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.Empty),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
v2 := &containerd.Config{
|
err = o.UpdateConfig(v2)
|
||||||
Tree: config,
|
|
||||||
RuntimeType: runtimeType,
|
|
||||||
}
|
|
||||||
|
|
||||||
err = UpdateConfig(v2, o)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
defaultRuntimeName := config.GetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "default_runtime_name"})
|
cfg := v2.(*containerd.Config)
|
||||||
|
|
||||||
|
defaultRuntimeName := cfg.GetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "default_runtime_name"})
|
||||||
require.EqualValues(t, tc.expectedDefaultRuntimeName, defaultRuntimeName)
|
require.EqualValues(t, tc.expectedDefaultRuntimeName, defaultRuntimeName)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestUpdateV2Config(t *testing.T) {
|
func TestUpdateV2Config(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
const runtimeDir = "/test/runtime/dir"
|
const runtimeDir = "/test/runtime/dir"
|
||||||
const expectedVersion = int64(2)
|
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
runtimeClass string
|
runtimeName string
|
||||||
expectedConfig map[string]interface{}
|
expectedConfig map[string]interface{}
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
runtimeClass: "nvidia",
|
runtimeName: "nvidia",
|
||||||
expectedConfig: map[string]interface{}{
|
expectedConfig: map[string]interface{}{
|
||||||
"version": int64(2),
|
"version": int64(2),
|
||||||
"plugins": map[string]interface{}{
|
"plugins": map[string]interface{}{
|
||||||
@@ -121,16 +117,6 @@ func TestUpdateV2Config(t *testing.T) {
|
|||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"runtime_type": "runtime_type",
|
"runtime_type": "runtime_type",
|
||||||
"runtime_root": "",
|
"runtime_root": "",
|
||||||
@@ -158,7 +144,7 @@ func TestUpdateV2Config(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
runtimeClass: "NAME",
|
runtimeName: "NAME",
|
||||||
expectedConfig: map[string]interface{}{
|
expectedConfig: map[string]interface{}{
|
||||||
"version": int64(2),
|
"version": int64(2),
|
||||||
"plugins": map[string]interface{}{
|
"plugins": map[string]interface{}{
|
||||||
@@ -175,70 +161,6 @@ func TestUpdateV2Config(t *testing.T) {
|
|||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-legacy": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
runtimeClass: "nvidia-experimental",
|
|
||||||
expectedConfig: map[string]interface{}{
|
|
||||||
"version": int64(2),
|
|
||||||
"plugins": map[string]interface{}{
|
|
||||||
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
|
||||||
"containerd": map[string]interface{}{
|
|
||||||
"runtimes": map[string]interface{}{
|
|
||||||
"nvidia": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runtime_type",
|
|
||||||
"runtime_root": "",
|
|
||||||
"runtime_engine": "",
|
|
||||||
"privileged_without_host_devices": false,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"runtime_type": "runtime_type",
|
"runtime_type": "runtime_type",
|
||||||
"runtime_root": "",
|
"runtime_root": "",
|
||||||
@@ -269,42 +191,41 @@ func TestUpdateV2Config(t *testing.T) {
|
|||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
o := &options{
|
o := &container.Options{
|
||||||
runtimeClass: tc.runtimeClass,
|
RuntimeName: tc.runtimeName,
|
||||||
runtimeType: runtimeType,
|
RuntimeDir: runtimeDir,
|
||||||
runtimeDir: runtimeDir,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
config, err := toml.TreeFromMap(map[string]interface{}{})
|
v2, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.Empty),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
v2 := &containerd.Config{
|
err = o.UpdateConfig(v2)
|
||||||
Tree: config,
|
|
||||||
RuntimeType: runtimeType,
|
|
||||||
ContainerAnnotations: []string{"cdi.k8s.io/*"},
|
|
||||||
}
|
|
||||||
|
|
||||||
err = UpdateConfig(v2, o)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
require.Equal(t, expected.String(), config.String())
|
require.Equal(t, expected.String(), v2.String())
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestUpdateV2ConfigWithRuncPresent(t *testing.T) {
|
func TestUpdateV2ConfigWithRuncPresent(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
const runtimeDir = "/test/runtime/dir"
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
runtimeClass string
|
runtimeName string
|
||||||
expectedConfig map[string]interface{}
|
expectedConfig map[string]interface{}
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
runtimeClass: "nvidia",
|
runtimeName: "nvidia",
|
||||||
expectedConfig: map[string]interface{}{
|
expectedConfig: map[string]interface{}{
|
||||||
"version": int64(2),
|
"version": int64(2),
|
||||||
"plugins": map[string]interface{}{
|
"plugins": map[string]interface{}{
|
||||||
@@ -332,17 +253,6 @@ func TestUpdateV2ConfigWithRuncPresent(t *testing.T) {
|
|||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"runtime_type": "runc_runtime_type",
|
"runtime_type": "runc_runtime_type",
|
||||||
"runtime_root": "runc_runtime_root",
|
"runtime_root": "runc_runtime_root",
|
||||||
@@ -372,7 +282,7 @@ func TestUpdateV2ConfigWithRuncPresent(t *testing.T) {
|
|||||||
},
|
},
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
runtimeClass: "NAME",
|
runtimeName: "NAME",
|
||||||
expectedConfig: map[string]interface{}{
|
expectedConfig: map[string]interface{}{
|
||||||
"version": int64(2),
|
"version": int64(2),
|
||||||
"plugins": map[string]interface{}{
|
"plugins": map[string]interface{}{
|
||||||
@@ -400,85 +310,6 @@ func TestUpdateV2ConfigWithRuncPresent(t *testing.T) {
|
|||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-legacy": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
runtimeClass: "nvidia-experimental",
|
|
||||||
expectedConfig: map[string]interface{}{
|
|
||||||
"version": int64(2),
|
|
||||||
"plugins": map[string]interface{}{
|
|
||||||
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
|
||||||
"containerd": map[string]interface{}{
|
|
||||||
"runtimes": map[string]interface{}{
|
|
||||||
"runc": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/runc-binary",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"runtime_type": "runc_runtime_type",
|
|
||||||
"runtime_root": "runc_runtime_root",
|
|
||||||
"runtime_engine": "runc_runtime_engine",
|
|
||||||
"privileged_without_host_devices": true,
|
|
||||||
"container_annotations": []string{"cdi.k8s.io/*"},
|
|
||||||
"options": map[string]interface{}{
|
|
||||||
"runc-option": "value",
|
|
||||||
"BinaryName": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"runtime_type": "runc_runtime_type",
|
"runtime_type": "runc_runtime_type",
|
||||||
"runtime_root": "runc_runtime_root",
|
"runtime_root": "runc_runtime_root",
|
||||||
@@ -511,33 +342,80 @@ func TestUpdateV2ConfigWithRuncPresent(t *testing.T) {
|
|||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
o := &options{
|
o := &container.Options{
|
||||||
runtimeClass: tc.runtimeClass,
|
RuntimeName: tc.runtimeName,
|
||||||
runtimeType: runtimeType,
|
RuntimeDir: runtimeDir,
|
||||||
runtimeDir: runtimeDir,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
config, err := toml.TreeFromMap(runcConfigMapV2("/runc-binary"))
|
v2, err := containerd.New(
|
||||||
|
containerd.WithLogger(logger),
|
||||||
|
containerd.WithConfigSource(toml.FromMap(runcConfigMapV2("/runc-binary"))),
|
||||||
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
|
)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
v2 := &containerd.Config{
|
err = o.UpdateConfig(v2)
|
||||||
Tree: config,
|
|
||||||
RuntimeType: runtimeType,
|
|
||||||
ContainerAnnotations: []string{"cdi.k8s.io/*"},
|
|
||||||
}
|
|
||||||
|
|
||||||
err = UpdateConfig(v2, o)
|
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
expected, err := toml.TreeFromMap(tc.expectedConfig)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
require.Equal(t, expected.String(), config.String())
|
require.Equal(t, expected.String(), v2.String())
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestUpdateV2ConfigEnableCDI(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
const runtimeDir = "/test/runtime/dir"
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
enableCDI bool
|
||||||
|
expectedEnableCDIValue interface{}
|
||||||
|
}{
|
||||||
|
{},
|
||||||
|
{
|
||||||
|
enableCDI: false,
|
||||||
|
expectedEnableCDIValue: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
enableCDI: true,
|
||||||
|
expectedEnableCDIValue: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(fmt.Sprintf("%v", tc.enableCDI), func(t *testing.T) {
|
||||||
|
o := &container.Options{
|
||||||
|
EnableCDI: tc.enableCDI,
|
||||||
|
RuntimeName: "nvidia",
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
SetAsDefault: false,
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg, err := toml.LoadMap(map[string]interface{}{})
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
v2 := &containerd.Config{
|
||||||
|
Logger: logger,
|
||||||
|
Tree: cfg,
|
||||||
|
RuntimeType: runtimeType,
|
||||||
|
CRIRuntimePluginName: "io.containerd.grpc.v1.cri",
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.UpdateConfig(v2)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
enableCDIValue := cfg.GetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "enable_cdi"})
|
||||||
|
require.EqualValues(t, tc.expectedEnableCDIValue, enableCDIValue)
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestRevertV2Config(t *testing.T) {
|
func TestRevertV2Config(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
config map[string]interface {
|
config map[string]interface {
|
||||||
}
|
}
|
||||||
@@ -556,8 +434,7 @@ func TestRevertV2Config(t *testing.T) {
|
|||||||
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
||||||
"containerd": map[string]interface{}{
|
"containerd": map[string]interface{}{
|
||||||
"runtimes": map[string]interface{}{
|
"runtimes": map[string]interface{}{
|
||||||
"nvidia": runtimeMapV2("/test/runtime/dir/nvidia-container-runtime"),
|
"nvidia": runtimeMapV2("/test/runtime/dir/nvidia-container-runtime"),
|
||||||
"nvidia-experimental": runtimeMapV2("/test/runtime/dir/nvidia-container-runtime.experimental"),
|
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
@@ -571,8 +448,7 @@ func TestRevertV2Config(t *testing.T) {
|
|||||||
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
||||||
"containerd": map[string]interface{}{
|
"containerd": map[string]interface{}{
|
||||||
"runtimes": map[string]interface{}{
|
"runtimes": map[string]interface{}{
|
||||||
"nvidia": runtimeMapV2("/test/runtime/dir/nvidia-container-runtime"),
|
"nvidia": runtimeMapV2("/test/runtime/dir/nvidia-container-runtime"),
|
||||||
"nvidia-experimental": runtimeMapV2("/test/runtime/dir/nvidia-container-runtime.experimental"),
|
|
||||||
},
|
},
|
||||||
"default_runtime_name": "nvidia",
|
"default_runtime_name": "nvidia",
|
||||||
},
|
},
|
||||||
@@ -584,28 +460,25 @@ func TestRevertV2Config(t *testing.T) {
|
|||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
t.Run(fmt.Sprintf("%d", i), func(t *testing.T) {
|
||||||
o := &options{
|
o := &container.Options{
|
||||||
runtimeClass: "nvidia",
|
RuntimeName: "nvidia",
|
||||||
}
|
}
|
||||||
|
|
||||||
config, err := toml.TreeFromMap(tc.config)
|
|
||||||
require.NoError(t, err)
|
|
||||||
|
|
||||||
expected, err := toml.TreeFromMap(tc.expected)
|
expected, err := toml.TreeFromMap(tc.expected)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
v2 := &containerd.Config{
|
v2, err := containerd.New(
|
||||||
Tree: config,
|
containerd.WithLogger(logger),
|
||||||
RuntimeType: runtimeType,
|
containerd.WithConfigSource(toml.FromMap(tc.config)),
|
||||||
}
|
containerd.WithRuntimeType(runtimeType),
|
||||||
|
containerd.WithContainerAnnotations("cdi.k8s.io/*"),
|
||||||
err = RevertConfig(v2, o)
|
)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
configContents, _ := toml.Marshal(config)
|
err = o.RevertConfig(v2)
|
||||||
expectedContents, _ := toml.Marshal(expected)
|
require.NoError(t, err)
|
||||||
|
|
||||||
require.Equal(t, string(expectedContents), string(configContents))
|
require.Equal(t, expected.String(), v2.String())
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -624,6 +497,7 @@ func runtimeMapV2(binary string) map[string]interface{} {
|
|||||||
|
|
||||||
func runcConfigMapV2(binary string) map[string]interface{} {
|
func runcConfigMapV2(binary string) map[string]interface{} {
|
||||||
return map[string]interface{}{
|
return map[string]interface{}{
|
||||||
|
"version": 2,
|
||||||
"plugins": map[string]interface{}{
|
"plugins": map[string]interface{}{
|
||||||
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
"io.containerd.grpc.v1.cri": map[string]interface{}{
|
||||||
"containerd": map[string]interface{}{
|
"containerd": map[string]interface{}{
|
||||||
@@ -0,0 +1,184 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2020-2021, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package containerd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
cli "github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/containerd"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/toml"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
Name = "containerd"
|
||||||
|
|
||||||
|
DefaultConfig = "/etc/containerd/config.toml"
|
||||||
|
DefaultSocket = "/run/containerd/containerd.sock"
|
||||||
|
DefaultRestartMode = "signal"
|
||||||
|
|
||||||
|
defaultRuntmeType = "io.containerd.runc.v2"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Options stores the containerd-specific options
|
||||||
|
type Options struct {
|
||||||
|
useLegacyConfig bool
|
||||||
|
runtimeType string
|
||||||
|
|
||||||
|
ContainerRuntimeModesCDIAnnotationPrefixes []string
|
||||||
|
|
||||||
|
runtimeConfigOverrideJSON string
|
||||||
|
}
|
||||||
|
|
||||||
|
func Flags(opts *Options) []cli.Flag {
|
||||||
|
flags := []cli.Flag{
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "use-legacy-config",
|
||||||
|
Usage: "Specify whether a legacy (pre v1.3) config should be used. " +
|
||||||
|
"This ensures that a version 1 container config is created by default and that the " +
|
||||||
|
"containerd.runtimes.default_runtime config section is used to define the default " +
|
||||||
|
"runtime instead of container.default_runtime_name.",
|
||||||
|
Destination: &opts.useLegacyConfig,
|
||||||
|
Sources: cli.EnvVars("CONTAINERD_USE_LEGACY_CONFIG"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "runtime-type",
|
||||||
|
Usage: "The runtime_type to use for the configured runtime classes",
|
||||||
|
Value: defaultRuntmeType,
|
||||||
|
Destination: &opts.runtimeType,
|
||||||
|
Sources: cli.EnvVars("CONTAINERD_RUNTIME_TYPE"),
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "nvidia-container-runtime-modes.cdi.annotation-prefixes",
|
||||||
|
Destination: &opts.ContainerRuntimeModesCDIAnnotationPrefixes,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CONTAINER_RUNTIME_MODES_CDI_ANNOTATION_PREFIXES"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "runtime-config-override",
|
||||||
|
Destination: &opts.runtimeConfigOverrideJSON,
|
||||||
|
Usage: "specify additional runtime options as a JSON string. The paths are relative to the runtime config.",
|
||||||
|
Value: "{}",
|
||||||
|
Sources: cli.EnvVars("RUNTIME_CONFIG_OVERRIDE", "CONTAINERD_RUNTIME_CONFIG_OVERRIDE"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return flags
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup updates a containerd configuration to include the nvidia-containerd-runtime and reloads it
|
||||||
|
func Setup(c *cli.Command, o *container.Options, co *Options) error {
|
||||||
|
log.Infof("Starting 'setup' for %v", c.Name)
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o, co)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Configure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to configure containerd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartContainerd(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to restart containerd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Completed 'setup' for %v", c.Name)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cleanup reverts a containerd configuration to remove the nvidia-containerd-runtime and reloads it
|
||||||
|
func Cleanup(c *cli.Command, o *container.Options, co *Options) error {
|
||||||
|
log.Infof("Starting 'cleanup' for %v", c.Name)
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o, co)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Unconfigure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to unconfigure containerd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartContainerd(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to restart containerd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Completed 'cleanup' for %v", c.Name)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RestartContainerd restarts containerd depending on the value of restartModeFlag
|
||||||
|
func RestartContainerd(o *container.Options) error {
|
||||||
|
return o.Restart("containerd", SignalContainerd)
|
||||||
|
}
|
||||||
|
|
||||||
|
// containerAnnotationsFromCDIPrefixes returns the container annotations to set for the given CDI prefixes.
|
||||||
|
func (o *Options) containerAnnotationsFromCDIPrefixes() []string {
|
||||||
|
var annotations []string
|
||||||
|
for _, prefix := range o.ContainerRuntimeModesCDIAnnotationPrefixes {
|
||||||
|
annotations = append(annotations, prefix+"*")
|
||||||
|
}
|
||||||
|
|
||||||
|
return annotations
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o *Options) runtimeConfigOverride() (map[string]interface{}, error) {
|
||||||
|
if o.runtimeConfigOverrideJSON == "" {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
runtimeOptions := make(map[string]interface{})
|
||||||
|
if err := json.Unmarshal([]byte(o.runtimeConfigOverrideJSON), &runtimeOptions); err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to read %v as JSON: %w", o.runtimeConfigOverrideJSON, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return runtimeOptions, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetLowlevelRuntimePaths(o *container.Options, co *Options) ([]string, error) {
|
||||||
|
cfg, err := getRuntimeConfig(o, co)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("unable to load containerd config: %w", err)
|
||||||
|
}
|
||||||
|
return engine.GetBinaryPathsForRuntimes(cfg), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getRuntimeConfig(o *container.Options, co *Options) (engine.Interface, error) {
|
||||||
|
return containerd.New(
|
||||||
|
containerd.WithPath(o.Config),
|
||||||
|
containerd.WithConfigSource(
|
||||||
|
toml.LoadFirst(
|
||||||
|
containerd.CommandLineSource(o.HostRootMount, o.ExecutablePath),
|
||||||
|
toml.FromFile(o.Config),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
containerd.WithRuntimeType(co.runtimeType),
|
||||||
|
containerd.WithUseLegacyConfig(co.useLegacyConfig),
|
||||||
|
containerd.WithContainerAnnotations(co.containerAnnotationsFromCDIPrefixes()...),
|
||||||
|
)
|
||||||
|
}
|
||||||
@@ -0,0 +1,113 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2020-2023 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package containerd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"syscall"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
reloadBackoff = 5 * time.Second
|
||||||
|
maxReloadAttempts = 6
|
||||||
|
|
||||||
|
socketMessageToGetPID = ""
|
||||||
|
)
|
||||||
|
|
||||||
|
// SignalContainerd sends a SIGHUP signal to the containerd daemon
|
||||||
|
func SignalContainerd(socket string) error {
|
||||||
|
log.Infof("Sending SIGHUP signal to containerd")
|
||||||
|
|
||||||
|
// Wrap the logic to perform the SIGHUP in a function so we can retry it on failure
|
||||||
|
retriable := func() error {
|
||||||
|
conn, err := net.Dial("unix", socket)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to dial: %v", err)
|
||||||
|
}
|
||||||
|
defer conn.Close()
|
||||||
|
|
||||||
|
sconn, err := conn.(*net.UnixConn).SyscallConn()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to get syscall connection: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err1 := sconn.Control(func(fd uintptr) {
|
||||||
|
err = syscall.SetsockoptInt(int(fd), syscall.SOL_SOCKET, syscall.SO_PASSCRED, 1)
|
||||||
|
})
|
||||||
|
if err1 != nil {
|
||||||
|
return fmt.Errorf("unable to issue call on socket fd: %v", err1)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to SetsockoptInt on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, _, err = conn.(*net.UnixConn).WriteMsgUnix([]byte(socketMessageToGetPID), nil, nil)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to WriteMsgUnix on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
oob := make([]byte, 1024)
|
||||||
|
_, oobn, _, _, err := conn.(*net.UnixConn).ReadMsgUnix(nil, oob)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ReadMsgUnix on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
oob = oob[:oobn]
|
||||||
|
scm, err := syscall.ParseSocketControlMessage(oob)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ParseSocketControlMessage from message received on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ucred, err := syscall.ParseUnixCredentials(&scm[0])
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ParseUnixCredentials from message received on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = syscall.Kill(int(ucred.Pid), syscall.SIGHUP)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to send SIGHUP to 'containerd' process: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Try to send a SIGHUP up to maxReloadAttempts times
|
||||||
|
var err error
|
||||||
|
for i := 0; i < maxReloadAttempts; i++ {
|
||||||
|
err = retriable()
|
||||||
|
if err == nil {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if i == maxReloadAttempts-1 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
log.Warningf("Error signaling containerd, attempt %v/%v: %v", i+1, maxReloadAttempts, err)
|
||||||
|
time.Sleep(reloadBackoff)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
log.Warningf("Max retries reached %v/%v, aborting", maxReloadAttempts, maxReloadAttempts)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Successfully signaled containerd")
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -0,0 +1,29 @@
|
|||||||
|
//go:build !linux
|
||||||
|
// +build !linux
|
||||||
|
|
||||||
|
/**
|
||||||
|
# Copyright 2023 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package containerd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
// SignalContainerd is unsupported on non-linux platforms.
|
||||||
|
func SignalContainerd(socket string) error {
|
||||||
|
return errors.New("SignalContainerd is unsupported on non-linux platforms")
|
||||||
|
}
|
||||||
@@ -0,0 +1,72 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package containerd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestRuntimeOptions(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
options Options
|
||||||
|
expected map[string]interface{}
|
||||||
|
expectedError error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "empty is nil",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "empty json",
|
||||||
|
options: Options{
|
||||||
|
runtimeConfigOverrideJSON: "{}",
|
||||||
|
},
|
||||||
|
expected: map[string]interface{}{},
|
||||||
|
expectedError: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "SystemdCgroup is true",
|
||||||
|
options: Options{
|
||||||
|
runtimeConfigOverrideJSON: "{\"SystemdCgroup\": true}",
|
||||||
|
},
|
||||||
|
expected: map[string]interface{}{
|
||||||
|
"SystemdCgroup": true,
|
||||||
|
},
|
||||||
|
expectedError: nil,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "SystemdCgroup is false",
|
||||||
|
options: Options{
|
||||||
|
runtimeConfigOverrideJSON: "{\"SystemdCgroup\": false}",
|
||||||
|
},
|
||||||
|
expected: map[string]interface{}{
|
||||||
|
"SystemdCgroup": false,
|
||||||
|
},
|
||||||
|
expectedError: nil,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
runtimeOptions, err := tc.options.runtimeConfigOverride()
|
||||||
|
require.ErrorIs(t, tc.expectedError, err)
|
||||||
|
require.EqualValues(t, tc.expected, runtimeOptions)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
210
cmd/nvidia-ctk-installer/container/runtime/crio/crio.go
Normal file
210
cmd/nvidia-ctk-installer/container/runtime/crio/crio.go
Normal file
@@ -0,0 +1,210 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2021-2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package crio
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
cli "github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/crio"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/ocihook"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/toml"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
Name = "crio"
|
||||||
|
|
||||||
|
defaultConfigMode = "hook"
|
||||||
|
|
||||||
|
// Hook-based settings
|
||||||
|
defaultHooksDir = "/usr/share/containers/oci/hooks.d"
|
||||||
|
defaultHookFilename = "oci-nvidia-hook.json"
|
||||||
|
|
||||||
|
// Config-based settings
|
||||||
|
DefaultConfig = "/etc/crio/crio.conf"
|
||||||
|
DefaultSocket = "/var/run/crio/crio.sock"
|
||||||
|
DefaultRestartMode = "systemd"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Options defines the cri-o specific options.
|
||||||
|
type Options struct {
|
||||||
|
configMode string
|
||||||
|
|
||||||
|
// hook-specific options
|
||||||
|
hooksDir string
|
||||||
|
hookFilename string
|
||||||
|
}
|
||||||
|
|
||||||
|
func Flags(opts *Options) []cli.Flag {
|
||||||
|
flags := []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "hooks-dir",
|
||||||
|
Usage: "path to the cri-o hooks directory",
|
||||||
|
Value: defaultHooksDir,
|
||||||
|
Destination: &opts.hooksDir,
|
||||||
|
Sources: cli.EnvVars("CRIO_HOOKS_DIR"),
|
||||||
|
DefaultText: defaultHooksDir,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "hook-filename",
|
||||||
|
Usage: "filename of the cri-o hook that will be created / removed in the hooks directory",
|
||||||
|
Value: defaultHookFilename,
|
||||||
|
Destination: &opts.hookFilename,
|
||||||
|
Sources: cli.EnvVars("CRIO_HOOK_FILENAME"),
|
||||||
|
DefaultText: defaultHookFilename,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "config-mode",
|
||||||
|
Usage: "the configuration mode to use. One of [hook | config]",
|
||||||
|
Value: defaultConfigMode,
|
||||||
|
Destination: &opts.configMode,
|
||||||
|
Sources: cli.EnvVars("CRIO_CONFIG_MODE"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return flags
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup installs the prestart hook required to launch GPU-enabled containers
|
||||||
|
func Setup(c *cli.Command, o *container.Options, co *Options) error {
|
||||||
|
log.Infof("Starting 'setup' for %v", c.Name)
|
||||||
|
|
||||||
|
switch co.configMode {
|
||||||
|
case "hook":
|
||||||
|
return setupHook(o, co)
|
||||||
|
case "config":
|
||||||
|
return setupConfig(o)
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("invalid config-mode '%v'", co.configMode)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// setupHook installs the prestart hook required to launch GPU-enabled containers
|
||||||
|
func setupHook(o *container.Options, co *Options) error {
|
||||||
|
log.Infof("Installing prestart hook")
|
||||||
|
|
||||||
|
hookPath := filepath.Join(co.hooksDir, co.hookFilename)
|
||||||
|
err := ocihook.CreateHook(hookPath, filepath.Join(o.RuntimeDir, config.NVIDIAContainerRuntimeHookExecutable))
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error creating hook: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// setupConfig updates the cri-o config for the NVIDIA container runtime
|
||||||
|
func setupConfig(o *container.Options) error {
|
||||||
|
log.Infof("Updating config file")
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Configure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to configure cri-o: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartCrio(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to restart crio: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cleanup removes the specified prestart hook
|
||||||
|
func Cleanup(c *cli.Command, o *container.Options, co *Options) error {
|
||||||
|
log.Infof("Starting 'cleanup' for %v", c.Name)
|
||||||
|
|
||||||
|
switch co.configMode {
|
||||||
|
case "hook":
|
||||||
|
return cleanupHook(co)
|
||||||
|
case "config":
|
||||||
|
return cleanupConfig(o)
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("invalid config-mode '%v'", co.configMode)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// cleanupHook removes the prestart hook
|
||||||
|
func cleanupHook(co *Options) error {
|
||||||
|
log.Infof("Removing prestart hook")
|
||||||
|
|
||||||
|
hookPath := filepath.Join(co.hooksDir, co.hookFilename)
|
||||||
|
err := os.Remove(hookPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error removing hook '%v': %v", hookPath, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// cleanupConfig removes the NVIDIA container runtime from the cri-o config
|
||||||
|
func cleanupConfig(o *container.Options) error {
|
||||||
|
log.Infof("Reverting config file modifications")
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Unconfigure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to unconfigure cri-o: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartCrio(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to restart crio: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RestartCrio restarts crio depending on the value of restartModeFlag
|
||||||
|
func RestartCrio(o *container.Options) error {
|
||||||
|
return o.Restart("crio", func(string) error { return fmt.Errorf("supporting crio via signal is unsupported") })
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetLowlevelRuntimePaths(o *container.Options) ([]string, error) {
|
||||||
|
cfg, err := getRuntimeConfig(o)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("unable to load crio config: %w", err)
|
||||||
|
}
|
||||||
|
return engine.GetBinaryPathsForRuntimes(cfg), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getRuntimeConfig(o *container.Options) (engine.Interface, error) {
|
||||||
|
return crio.New(
|
||||||
|
crio.WithPath(o.Config),
|
||||||
|
crio.WithConfigSource(
|
||||||
|
toml.LoadFirst(
|
||||||
|
crio.CommandLineSource(o.HostRootMount, o.ExecutablePath),
|
||||||
|
toml.FromFile(o.Config),
|
||||||
|
),
|
||||||
|
),
|
||||||
|
)
|
||||||
|
}
|
||||||
111
cmd/nvidia-ctk-installer/container/runtime/docker/docker.go
Normal file
111
cmd/nvidia-ctk-installer/container/runtime/docker/docker.go
Normal file
@@ -0,0 +1,111 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package docker
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
cli "github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/docker"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
Name = "docker"
|
||||||
|
|
||||||
|
DefaultConfig = "/etc/docker/daemon.json"
|
||||||
|
DefaultSocket = "/var/run/docker.sock"
|
||||||
|
DefaultRestartMode = "signal"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Options struct{}
|
||||||
|
|
||||||
|
func Flags(opts *Options) []cli.Flag {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup updates docker configuration to include the nvidia runtime and reloads it
|
||||||
|
func Setup(c *cli.Command, o *container.Options) error {
|
||||||
|
log.Infof("Starting 'setup' for %v", c.Name)
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Configure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to configure docker: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartDocker(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to restart docker: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Completed 'setup' for %v", c.Name)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Cleanup reverts docker configuration to remove the nvidia runtime and reloads it
|
||||||
|
func Cleanup(c *cli.Command, o *container.Options) error {
|
||||||
|
log.Infof("Starting 'cleanup' for %v", c.Name)
|
||||||
|
|
||||||
|
cfg, err := getRuntimeConfig(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = o.Unconfigure(cfg)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to unconfigure docker: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = RestartDocker(o)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to signal docker: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Completed 'cleanup' for %v", c.Name)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RestartDocker restarts docker depending on the value of restartModeFlag
|
||||||
|
func RestartDocker(o *container.Options) error {
|
||||||
|
return o.Restart("docker", SignalDocker)
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetLowlevelRuntimePaths(o *container.Options) ([]string, error) {
|
||||||
|
cfg, err := docker.New(
|
||||||
|
docker.WithPath(o.Config),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("unable to load docker config: %w", err)
|
||||||
|
}
|
||||||
|
return engine.GetBinaryPathsForRuntimes(cfg), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func getRuntimeConfig(o *container.Options) (engine.Interface, error) {
|
||||||
|
return docker.New(
|
||||||
|
docker.WithPath(o.Config),
|
||||||
|
)
|
||||||
|
}
|
||||||
@@ -0,0 +1,113 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2021-2023 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package docker
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"syscall"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
reloadBackoff = 5 * time.Second
|
||||||
|
maxReloadAttempts = 6
|
||||||
|
|
||||||
|
socketMessageToGetPID = "GET /info HTTP/1.0\r\n\r\n"
|
||||||
|
)
|
||||||
|
|
||||||
|
// SignalDocker sends a SIGHUP signal to docker daemon
|
||||||
|
func SignalDocker(socket string) error {
|
||||||
|
log.Infof("Sending SIGHUP signal to docker")
|
||||||
|
|
||||||
|
// Wrap the logic to perform the SIGHUP in a function so we can retry it on failure
|
||||||
|
retriable := func() error {
|
||||||
|
conn, err := net.Dial("unix", socket)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to dial: %v", err)
|
||||||
|
}
|
||||||
|
defer conn.Close()
|
||||||
|
|
||||||
|
sconn, err := conn.(*net.UnixConn).SyscallConn()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to get syscall connection: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err1 := sconn.Control(func(fd uintptr) {
|
||||||
|
err = syscall.SetsockoptInt(int(fd), syscall.SOL_SOCKET, syscall.SO_PASSCRED, 1)
|
||||||
|
})
|
||||||
|
if err1 != nil {
|
||||||
|
return fmt.Errorf("unable to issue call on socket fd: %v", err1)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to SetsockoptInt on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, _, err = conn.(*net.UnixConn).WriteMsgUnix([]byte(socketMessageToGetPID), nil, nil)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to WriteMsgUnix on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
oob := make([]byte, 1024)
|
||||||
|
_, oobn, _, _, err := conn.(*net.UnixConn).ReadMsgUnix(nil, oob)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ReadMsgUnix on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
oob = oob[:oobn]
|
||||||
|
scm, err := syscall.ParseSocketControlMessage(oob)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ParseSocketControlMessage from message received on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ucred, err := syscall.ParseUnixCredentials(&scm[0])
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to ParseUnixCredentials from message received on socket fd: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = syscall.Kill(int(ucred.Pid), syscall.SIGHUP)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to send SIGHUP to 'docker' process: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Try to send a SIGHUP up to maxReloadAttempts times
|
||||||
|
var err error
|
||||||
|
for i := 0; i < maxReloadAttempts; i++ {
|
||||||
|
err = retriable()
|
||||||
|
if err == nil {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if i == maxReloadAttempts-1 {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
log.Warningf("Error signaling docker, attempt %v/%v: %v", i+1, maxReloadAttempts, err)
|
||||||
|
time.Sleep(reloadBackoff)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
log.Warningf("Max retries reached %v/%v, aborting", maxReloadAttempts, maxReloadAttempts)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Infof("Successfully signaled docker")
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -0,0 +1,29 @@
|
|||||||
|
//go:build !linux
|
||||||
|
// +build !linux
|
||||||
|
|
||||||
|
/**
|
||||||
|
# Copyright 2023 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package docker
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
)
|
||||||
|
|
||||||
|
// SignalDocker is unsupported on non-linux platforms.
|
||||||
|
func SignalDocker(socket string) error {
|
||||||
|
return errors.New("SignalDocker is unsupported on non-linux platforms")
|
||||||
|
}
|
||||||
@@ -14,14 +14,16 @@
|
|||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package main
|
package docker
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/engine/docker"
|
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/docker"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestUpdateConfigDefaultRuntime(t *testing.T) {
|
func TestUpdateConfigDefaultRuntime(t *testing.T) {
|
||||||
@@ -42,11 +44,6 @@ func TestUpdateConfigDefaultRuntime(t *testing.T) {
|
|||||||
runtimeName: "NAME",
|
runtimeName: "NAME",
|
||||||
expectedDefaultRuntimeName: "NAME",
|
expectedDefaultRuntimeName: "NAME",
|
||||||
},
|
},
|
||||||
{
|
|
||||||
setAsDefault: true,
|
|
||||||
runtimeName: "nvidia-experimental",
|
|
||||||
expectedDefaultRuntimeName: "nvidia-experimental",
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
setAsDefault: true,
|
setAsDefault: true,
|
||||||
runtimeName: "nvidia",
|
runtimeName: "nvidia",
|
||||||
@@ -55,15 +52,15 @@ func TestUpdateConfigDefaultRuntime(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
o := &options{
|
o := &container.Options{
|
||||||
setAsDefault: tc.setAsDefault,
|
RuntimeName: tc.runtimeName,
|
||||||
runtimeName: tc.runtimeName,
|
RuntimeDir: runtimeDir,
|
||||||
runtimeDir: runtimeDir,
|
SetAsDefault: tc.setAsDefault,
|
||||||
}
|
}
|
||||||
|
|
||||||
config := docker.Config(map[string]interface{}{})
|
config := docker.Config(map[string]interface{}{})
|
||||||
|
|
||||||
err := UpdateConfig(&config, o)
|
err := o.UpdateConfig(&config)
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
require.NoError(t, err, "%d: %v", i, tc)
|
||||||
|
|
||||||
defaultRuntimeName := config["default-runtime"]
|
defaultRuntimeName := config["default-runtime"]
|
||||||
@@ -89,10 +86,6 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
@@ -114,35 +107,6 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-legacy": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
config: map[string]interface{}{},
|
|
||||||
setAsDefault: false,
|
|
||||||
runtimeName: "nvidia-experimental",
|
|
||||||
expectedConfig: map[string]interface{}{
|
|
||||||
"runtimes": map[string]interface{}{
|
|
||||||
"nvidia": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
@@ -170,10 +134,6 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
@@ -204,10 +164,6 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
@@ -232,38 +188,6 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-legacy": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.legacy",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
config: map[string]interface{}{
|
|
||||||
"default-runtime": "runc",
|
|
||||||
},
|
|
||||||
setAsDefault: true,
|
|
||||||
runtimeName: "nvidia-experimental",
|
|
||||||
expectedConfig: map[string]interface{}{
|
|
||||||
"default-runtime": "nvidia-experimental",
|
|
||||||
"runtimes": map[string]interface{}{
|
|
||||||
"nvidia": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
@@ -296,10 +220,6 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
@@ -314,13 +234,15 @@ func TestUpdateConfig(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
options := &options{
|
tc := tc
|
||||||
setAsDefault: tc.setAsDefault,
|
|
||||||
runtimeName: tc.runtimeName,
|
o := &container.Options{
|
||||||
runtimeDir: runtimeDir,
|
RuntimeName: tc.runtimeName,
|
||||||
|
RuntimeDir: runtimeDir,
|
||||||
|
SetAsDefault: tc.setAsDefault,
|
||||||
}
|
}
|
||||||
|
|
||||||
err := UpdateConfig(&tc.config, options)
|
err := o.UpdateConfig(&tc.config)
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
require.NoError(t, err, "%d: %v", i, tc)
|
||||||
|
|
||||||
configContent, err := json.MarshalIndent(tc.config, "", " ")
|
configContent, err := json.MarshalIndent(tc.config, "", " ")
|
||||||
@@ -356,7 +278,7 @@ func TestRevertConfig(t *testing.T) {
|
|||||||
{
|
{
|
||||||
config: map[string]interface{}{
|
config: map[string]interface{}{
|
||||||
"runtimes": map[string]interface{}{
|
"runtimes": map[string]interface{}{
|
||||||
"nvidia-experimental": map[string]interface{}{
|
"nvidia": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
@@ -371,25 +293,6 @@ func TestRevertConfig(t *testing.T) {
|
|||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
"path": "/test/runtime/dir/nvidia-container-runtime",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
},
|
},
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
expectedConfig: map[string]interface{}{},
|
|
||||||
},
|
|
||||||
{
|
|
||||||
config: map[string]interface{}{
|
|
||||||
"runtimes": map[string]interface{}{
|
|
||||||
"nvidia": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-experimental": map[string]interface{}{
|
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.experimental",
|
|
||||||
"args": []string{},
|
|
||||||
},
|
|
||||||
"nvidia-cdi": map[string]interface{}{
|
"nvidia-cdi": map[string]interface{}{
|
||||||
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
"path": "/test/runtime/dir/nvidia-container-runtime.cdi",
|
||||||
"args": []string{},
|
"args": []string{},
|
||||||
@@ -457,7 +360,9 @@ func TestRevertConfig(t *testing.T) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
for i, tc := range testCases {
|
for i, tc := range testCases {
|
||||||
err := RevertConfig(&tc.config, &options{})
|
tc := tc
|
||||||
|
o := &container.Options{}
|
||||||
|
err := o.RevertConfig(&tc.config)
|
||||||
|
|
||||||
require.NoError(t, err, "%d: %v", i, tc)
|
require.NoError(t, err, "%d: %v", i, tc)
|
||||||
|
|
||||||
204
cmd/nvidia-ctk-installer/container/runtime/runtime.go
Normal file
204
cmd/nvidia-ctk-installer/container/runtime/runtime.go
Normal file
@@ -0,0 +1,204 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package runtime
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/runtime/containerd"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/runtime/crio"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/runtime/docker"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/toolkit"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
defaultSetAsDefault = true
|
||||||
|
// defaultRuntimeName specifies the NVIDIA runtime to be use as the default runtime if setting the default runtime is enabled
|
||||||
|
defaultRuntimeName = "nvidia"
|
||||||
|
defaultHostRootMount = "/host"
|
||||||
|
|
||||||
|
runtimeSpecificDefault = "RUNTIME_SPECIFIC_DEFAULT"
|
||||||
|
)
|
||||||
|
|
||||||
|
type Options struct {
|
||||||
|
container.Options
|
||||||
|
|
||||||
|
containerdOptions containerd.Options
|
||||||
|
crioOptions crio.Options
|
||||||
|
}
|
||||||
|
|
||||||
|
func Flags(opts *Options) []cli.Flag {
|
||||||
|
flags := []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "config",
|
||||||
|
Usage: "Path to the runtime config file",
|
||||||
|
Value: runtimeSpecificDefault,
|
||||||
|
Destination: &opts.Config,
|
||||||
|
Sources: cli.EnvVars("RUNTIME_CONFIG", "CONTAINERD_CONFIG", "DOCKER_CONFIG"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "executable-path",
|
||||||
|
Usage: "The path to the runtime executable. This is used to extract the current config",
|
||||||
|
Destination: &opts.ExecutablePath,
|
||||||
|
Sources: cli.EnvVars("RUNTIME_EXECUTABLE_PATH"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "socket",
|
||||||
|
Usage: "Path to the runtime socket file",
|
||||||
|
Value: runtimeSpecificDefault,
|
||||||
|
Destination: &opts.Socket,
|
||||||
|
Sources: cli.EnvVars("RUNTIME_SOCKET", "CONTAINERD_SOCKET", "DOCKER_SOCKET"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "restart-mode",
|
||||||
|
Usage: "Specify how the runtime should be restarted; If 'none' is selected it will not be restarted [signal | systemd | none ]",
|
||||||
|
Value: runtimeSpecificDefault,
|
||||||
|
Destination: &opts.RestartMode,
|
||||||
|
Sources: cli.EnvVars("RUNTIME_RESTART_MODE"),
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "enable-cdi-in-runtime",
|
||||||
|
Usage: "Enable CDI in the configured runt ime",
|
||||||
|
Destination: &opts.EnableCDI,
|
||||||
|
Sources: cli.EnvVars("RUNTIME_ENABLE_CDI"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "host-root",
|
||||||
|
Usage: "Specify the path to the host root to be used when restarting the runtime using systemd",
|
||||||
|
Value: defaultHostRootMount,
|
||||||
|
Destination: &opts.HostRootMount,
|
||||||
|
Sources: cli.EnvVars("HOST_ROOT_MOUNT"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "runtime-name",
|
||||||
|
Aliases: []string{"nvidia-runtime-name", "runtime-class"},
|
||||||
|
Usage: "Specify the name of the `nvidia` runtime. If set-as-default is selected, the runtime is used as the default runtime.",
|
||||||
|
Value: defaultRuntimeName,
|
||||||
|
Destination: &opts.RuntimeName,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_RUNTIME_NAME", "CONTAINERD_RUNTIME_CLASS", "DOCKER_RUNTIME_NAME"),
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "set-as-default",
|
||||||
|
Usage: "Set the `nvidia` runtime as the default runtime.",
|
||||||
|
Value: defaultSetAsDefault,
|
||||||
|
Destination: &opts.SetAsDefault,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_RUNTIME_SET_AS_DEFAULT", "CONTAINERD_SET_AS_DEFAULT", "DOCKER_SET_AS_DEFAULT"),
|
||||||
|
Hidden: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags = append(flags, containerd.Flags(&opts.containerdOptions)...)
|
||||||
|
flags = append(flags, crio.Flags(&opts.crioOptions)...)
|
||||||
|
|
||||||
|
return flags
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate checks whether the specified options are valid
|
||||||
|
func (opts *Options) Validate(logger logger.Interface, c *cli.Command, runtime string, toolkitRoot string, to *toolkit.Options) error {
|
||||||
|
// We set this option here to ensure that it is available in future calls.
|
||||||
|
opts.RuntimeDir = toolkitRoot
|
||||||
|
|
||||||
|
if !c.IsSet("enable-cdi-in-runtime") {
|
||||||
|
opts.EnableCDI = to.CDI.Enabled
|
||||||
|
}
|
||||||
|
|
||||||
|
if opts.ExecutablePath != "" && opts.RuntimeName == docker.Name {
|
||||||
|
logger.Warningf("Ignoring executable-path=%q flag for %v", opts.ExecutablePath, opts.RuntimeName)
|
||||||
|
opts.ExecutablePath = ""
|
||||||
|
}
|
||||||
|
|
||||||
|
// Apply the runtime-specific config changes.
|
||||||
|
switch runtime {
|
||||||
|
case containerd.Name:
|
||||||
|
if opts.Config == runtimeSpecificDefault {
|
||||||
|
opts.Config = containerd.DefaultConfig
|
||||||
|
}
|
||||||
|
if opts.Socket == runtimeSpecificDefault {
|
||||||
|
opts.Socket = containerd.DefaultSocket
|
||||||
|
}
|
||||||
|
if opts.RestartMode == runtimeSpecificDefault {
|
||||||
|
opts.RestartMode = containerd.DefaultRestartMode
|
||||||
|
}
|
||||||
|
case crio.Name:
|
||||||
|
if opts.Config == runtimeSpecificDefault {
|
||||||
|
opts.Config = crio.DefaultConfig
|
||||||
|
}
|
||||||
|
if opts.Socket == runtimeSpecificDefault {
|
||||||
|
opts.Socket = crio.DefaultSocket
|
||||||
|
}
|
||||||
|
if opts.RestartMode == runtimeSpecificDefault {
|
||||||
|
opts.RestartMode = crio.DefaultRestartMode
|
||||||
|
}
|
||||||
|
case docker.Name:
|
||||||
|
if opts.Config == runtimeSpecificDefault {
|
||||||
|
opts.Config = docker.DefaultConfig
|
||||||
|
}
|
||||||
|
if opts.Socket == runtimeSpecificDefault {
|
||||||
|
opts.Socket = docker.DefaultSocket
|
||||||
|
}
|
||||||
|
if opts.RestartMode == runtimeSpecificDefault {
|
||||||
|
opts.RestartMode = docker.DefaultRestartMode
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("undefined runtime %v", runtime)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func Setup(c *cli.Command, opts *Options, runtime string) error {
|
||||||
|
switch runtime {
|
||||||
|
case containerd.Name:
|
||||||
|
return containerd.Setup(c, &opts.Options, &opts.containerdOptions)
|
||||||
|
case crio.Name:
|
||||||
|
return crio.Setup(c, &opts.Options, &opts.crioOptions)
|
||||||
|
case docker.Name:
|
||||||
|
return docker.Setup(c, &opts.Options)
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("undefined runtime %v", runtime)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func Cleanup(c *cli.Command, opts *Options, runtime string) error {
|
||||||
|
switch runtime {
|
||||||
|
case containerd.Name:
|
||||||
|
return containerd.Cleanup(c, &opts.Options, &opts.containerdOptions)
|
||||||
|
case crio.Name:
|
||||||
|
return crio.Cleanup(c, &opts.Options, &opts.crioOptions)
|
||||||
|
case docker.Name:
|
||||||
|
return docker.Cleanup(c, &opts.Options)
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("undefined runtime %v", runtime)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetLowlevelRuntimePaths(opts *Options, runtime string) ([]string, error) {
|
||||||
|
switch runtime {
|
||||||
|
case containerd.Name:
|
||||||
|
return containerd.GetLowlevelRuntimePaths(&opts.Options, &opts.containerdOptions)
|
||||||
|
case crio.Name:
|
||||||
|
return crio.GetLowlevelRuntimePaths(&opts.Options)
|
||||||
|
case docker.Name:
|
||||||
|
return docker.GetLowlevelRuntimePaths(&opts.Options)
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("undefined runtime %v", runtime)
|
||||||
|
}
|
||||||
|
}
|
||||||
329
cmd/nvidia-ctk-installer/main.go
Normal file
329
cmd/nvidia-ctk-installer/main.go
Normal file
@@ -0,0 +1,329 @@
|
|||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"os/signal"
|
||||||
|
"path/filepath"
|
||||||
|
"syscall"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
"golang.org/x/sys/unix"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/runtime"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/toolkit"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
toolkitPidFilename = "toolkit.pid"
|
||||||
|
defaultPidFile = "/run/nvidia/toolkit/" + toolkitPidFilename
|
||||||
|
|
||||||
|
defaultToolkitInstallDir = "/usr/local/nvidia"
|
||||||
|
toolkitSubDir = "toolkit"
|
||||||
|
|
||||||
|
defaultRuntime = "docker"
|
||||||
|
)
|
||||||
|
|
||||||
|
var availableRuntimes = map[string]struct{}{"docker": {}, "crio": {}, "containerd": {}}
|
||||||
|
var defaultLowLevelRuntimes = []string{"runc", "crun"}
|
||||||
|
|
||||||
|
var waitingForSignal = make(chan bool, 1)
|
||||||
|
var signalReceived = make(chan bool, 1)
|
||||||
|
|
||||||
|
// options stores the command line arguments
|
||||||
|
type options struct {
|
||||||
|
toolkitInstallDir string
|
||||||
|
|
||||||
|
noDaemon bool
|
||||||
|
runtime string
|
||||||
|
pidFile string
|
||||||
|
sourceRoot string
|
||||||
|
packageType string
|
||||||
|
|
||||||
|
toolkitOptions toolkit.Options
|
||||||
|
runtimeOptions runtime.Options
|
||||||
|
}
|
||||||
|
|
||||||
|
func (o options) toolkitRoot() string {
|
||||||
|
return filepath.Join(o.toolkitInstallDir, toolkitSubDir)
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
logger := logger.New()
|
||||||
|
c := NewApp(logger)
|
||||||
|
|
||||||
|
// Run the CLI
|
||||||
|
logger.Infof("Starting %v", c.Name)
|
||||||
|
if err := c.Run(context.Background(), os.Args); err != nil {
|
||||||
|
logger.Errorf("error running %v: %v", c.Name, err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.Infof("Completed %v", c.Name)
|
||||||
|
}
|
||||||
|
|
||||||
|
// An app represents the nvidia-ctk-installer.
|
||||||
|
type app struct {
|
||||||
|
logger logger.Interface
|
||||||
|
|
||||||
|
toolkit *toolkit.Installer
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewApp creates the CLI app fro the specified options.
|
||||||
|
func NewApp(logger logger.Interface) *cli.Command {
|
||||||
|
a := app{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return a.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a app) build() *cli.Command {
|
||||||
|
options := options{
|
||||||
|
toolkitOptions: toolkit.Options{},
|
||||||
|
}
|
||||||
|
// Create the top-level CLI
|
||||||
|
c := cli.Command{}
|
||||||
|
c.Name = "nvidia-ctk-installer"
|
||||||
|
c.Usage = "Install the NVIDIA Container Toolkit and configure the specified runtime to use the `nvidia` runtime."
|
||||||
|
c.Version = info.GetVersionString()
|
||||||
|
c.Before = func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
|
return ctx, a.Before(cmd, &options)
|
||||||
|
}
|
||||||
|
c.Action = func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
return a.Run(cmd, &options)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup flags for the CLI
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "no-daemon",
|
||||||
|
Aliases: []string{"n"},
|
||||||
|
Usage: "terminate immediately after setting up the runtime. Note that no cleanup will be performed",
|
||||||
|
Destination: &options.noDaemon,
|
||||||
|
Sources: cli.EnvVars("NO_DAEMON"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "runtime",
|
||||||
|
Aliases: []string{"r"},
|
||||||
|
Usage: "the runtime to setup on this node. One of {'docker', 'crio', 'containerd'}",
|
||||||
|
Value: defaultRuntime,
|
||||||
|
Destination: &options.runtime,
|
||||||
|
Sources: cli.EnvVars("RUNTIME"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "toolkit-install-dir",
|
||||||
|
Aliases: []string{"root"},
|
||||||
|
Usage: "The directory where the NVIDIA Container Toolkit is to be installed. " +
|
||||||
|
"The components of the toolkit will be installed to `ROOT`/toolkit. " +
|
||||||
|
"Note that in the case of a containerized installer, this is the path in the container and it is " +
|
||||||
|
"recommended that this match the path on the host.",
|
||||||
|
Value: defaultToolkitInstallDir,
|
||||||
|
Destination: &options.toolkitInstallDir,
|
||||||
|
Sources: cli.EnvVars("TOOLKIT_INSTALL_DIR", "ROOT"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "toolkit-source-root",
|
||||||
|
Usage: "The folder where the required toolkit artifacts can be found. If this is not specified, the path /artifacts/{{ .ToolkitPackageType }} is used where ToolkitPackageType is the resolved package type",
|
||||||
|
Destination: &options.sourceRoot,
|
||||||
|
Sources: cli.EnvVars("TOOLKIT_SOURCE_ROOT"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "toolkit-package-type",
|
||||||
|
Usage: "specify the package type to use for the toolkit. One of ['deb', 'rpm', 'auto', '']. If 'auto' or '' are used, the type is inferred automatically.",
|
||||||
|
Value: "auto",
|
||||||
|
Destination: &options.packageType,
|
||||||
|
Sources: cli.EnvVars("TOOLKIT_PACKAGE_TYPE"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "pid-file",
|
||||||
|
Value: defaultPidFile,
|
||||||
|
Usage: "the path to a toolkit.pid file to ensure that only a single configuration instance is running",
|
||||||
|
Destination: &options.pidFile,
|
||||||
|
Sources: cli.EnvVars("TOOLKIT_PID_FILE", "PID_FILE"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = append(c.Flags, toolkit.Flags(&options.toolkitOptions)...)
|
||||||
|
c.Flags = append(c.Flags, runtime.Flags(&options.runtimeOptions)...)
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) Before(c *cli.Command, o *options) error {
|
||||||
|
if o.sourceRoot == "" {
|
||||||
|
sourceRoot, err := a.resolveSourceRoot(o.runtimeOptions.HostRootMount, o.packageType)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to resolve source root: %v", err)
|
||||||
|
}
|
||||||
|
a.logger.Infof("Resolved source root to %v", sourceRoot)
|
||||||
|
o.sourceRoot = sourceRoot
|
||||||
|
}
|
||||||
|
|
||||||
|
a.toolkit = toolkit.NewInstaller(
|
||||||
|
toolkit.WithLogger(a.logger),
|
||||||
|
toolkit.WithSourceRoot(o.sourceRoot),
|
||||||
|
toolkit.WithToolkitRoot(o.toolkitRoot()),
|
||||||
|
)
|
||||||
|
return a.validateFlags(c, o)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) validateFlags(c *cli.Command, o *options) error {
|
||||||
|
if o.toolkitInstallDir == "" {
|
||||||
|
return fmt.Errorf("the install root must be specified")
|
||||||
|
}
|
||||||
|
if _, exists := availableRuntimes[o.runtime]; !exists {
|
||||||
|
return fmt.Errorf("unknown runtime: %v", o.runtime)
|
||||||
|
}
|
||||||
|
if filepath.Base(o.pidFile) != toolkitPidFilename {
|
||||||
|
return fmt.Errorf("invalid toolkit.pid path %v", o.pidFile)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := a.toolkit.ValidateOptions(&o.toolkitOptions); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := o.runtimeOptions.Validate(a.logger, c, o.runtime, o.toolkitRoot(), &o.toolkitOptions); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Run installs the NVIDIA Container Toolkit and updates the requested runtime.
|
||||||
|
// If the application is run as a daemon, the application waits and unconfigures
|
||||||
|
// the runtime on termination.
|
||||||
|
func (a *app) Run(c *cli.Command, o *options) error {
|
||||||
|
err := a.initialize(o.pidFile)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to initialize: %v", err)
|
||||||
|
}
|
||||||
|
defer a.shutdown(o.pidFile)
|
||||||
|
|
||||||
|
if len(o.toolkitOptions.ContainerRuntimeRuntimes) == 0 {
|
||||||
|
lowlevelRuntimePaths, err := runtime.GetLowlevelRuntimePaths(&o.runtimeOptions, o.runtime)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to determine runtime options: %w", err)
|
||||||
|
}
|
||||||
|
lowlevelRuntimePaths = append(lowlevelRuntimePaths, defaultLowLevelRuntimes...)
|
||||||
|
|
||||||
|
o.toolkitOptions.ContainerRuntimeRuntimes = lowlevelRuntimePaths
|
||||||
|
}
|
||||||
|
|
||||||
|
err = a.toolkit.Install(c, &o.toolkitOptions)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to install toolkit: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = runtime.Setup(c, &o.runtimeOptions, o.runtime)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to setup runtime: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !o.noDaemon {
|
||||||
|
err = a.waitForSignal()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to wait for signal: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = runtime.Cleanup(c, &o.runtimeOptions, o.runtime)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to cleanup runtime: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) initialize(pidFile string) error {
|
||||||
|
a.logger.Infof("Initializing")
|
||||||
|
|
||||||
|
if dir := filepath.Dir(pidFile); dir != "" {
|
||||||
|
err := os.MkdirAll(dir, 0755)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to create folder for pidfile: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
f, err := os.Create(pidFile)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to create pidfile: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = unix.Flock(int(f.Fd()), unix.LOCK_EX|unix.LOCK_NB)
|
||||||
|
if err != nil {
|
||||||
|
a.logger.Warningf("Unable to get exclusive lock on '%v'", pidFile)
|
||||||
|
a.logger.Warningf("This normally means an instance of the NVIDIA toolkit Container is already running, aborting")
|
||||||
|
return fmt.Errorf("unable to get flock on pidfile: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = fmt.Fprintf(f, "%v\n", os.Getpid())
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to write PID to pidfile: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
sigs := make(chan os.Signal, 1)
|
||||||
|
signal.Notify(sigs, syscall.SIGHUP, syscall.SIGINT, syscall.SIGQUIT, syscall.SIGPIPE, syscall.SIGTERM)
|
||||||
|
go func() {
|
||||||
|
<-sigs
|
||||||
|
select {
|
||||||
|
case <-waitingForSignal:
|
||||||
|
signalReceived <- true
|
||||||
|
default:
|
||||||
|
a.logger.Infof("Signal received, exiting early")
|
||||||
|
a.shutdown(pidFile)
|
||||||
|
os.Exit(0)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) waitForSignal() error {
|
||||||
|
a.logger.Infof("Waiting for signal")
|
||||||
|
waitingForSignal <- true
|
||||||
|
<-signalReceived
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) shutdown(pidFile string) {
|
||||||
|
a.logger.Infof("Shutting Down")
|
||||||
|
|
||||||
|
err := os.Remove(pidFile)
|
||||||
|
if err != nil {
|
||||||
|
a.logger.Warningf("Unable to remove pidfile: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) resolveSourceRoot(hostRoot string, packageType string) (string, error) {
|
||||||
|
resolvedPackageType, err := a.resolvePackageType(hostRoot, packageType)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
switch resolvedPackageType {
|
||||||
|
case "deb":
|
||||||
|
return "/artifacts/deb", nil
|
||||||
|
case "rpm":
|
||||||
|
return "/artifacts/rpm", nil
|
||||||
|
default:
|
||||||
|
return "", fmt.Errorf("invalid package type: %v", resolvedPackageType)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (a *app) resolvePackageType(hostRoot string, packageType string) (rPackageTypes string, rerr error) {
|
||||||
|
if packageType != "" && packageType != "auto" {
|
||||||
|
return packageType, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
locator := lookup.NewExecutableLocator(a.logger, hostRoot)
|
||||||
|
if candidates, err := locator.Locate("/usr/bin/rpm"); err == nil && len(candidates) > 0 {
|
||||||
|
return "rpm", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if candidates, err := locator.Locate("/usr/bin/dpkg"); err == nil && len(candidates) > 0 {
|
||||||
|
return "deb", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return "deb", nil
|
||||||
|
}
|
||||||
456
cmd/nvidia-ctk-installer/main_test.go
Normal file
456
cmd/nvidia-ctk-installer/main_test.go
Normal file
@@ -0,0 +1,456 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/test"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestApp(t *testing.T) {
|
||||||
|
t.Setenv("__NVCT_TESTING_DEVICES_ARE_FILES", "true")
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
|
||||||
|
moduleRoot, err := test.GetModuleRoot()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
artifactRoot := filepath.Join(moduleRoot, "testdata", "installer", "artifacts")
|
||||||
|
hostRoot := filepath.Join(moduleRoot, "testdata", "lookup", "rootfs-1")
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
args []string
|
||||||
|
expectedToolkitConfig string
|
||||||
|
expectedRuntimeConfig string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "no args",
|
||||||
|
expectedToolkitConfig: `accept-nvidia-visible-devices-as-volume-mounts = false
|
||||||
|
accept-nvidia-visible-devices-envvar-when-unprivileged = true
|
||||||
|
disable-require = false
|
||||||
|
supported-driver-capabilities = "compat32,compute,display,graphics,ngx,utility,video"
|
||||||
|
swarm-resource = ""
|
||||||
|
|
||||||
|
[nvidia-container-cli]
|
||||||
|
debug = ""
|
||||||
|
environment = []
|
||||||
|
ldcache = ""
|
||||||
|
ldconfig = "@/run/nvidia/driver/sbin/ldconfig"
|
||||||
|
load-kmods = true
|
||||||
|
no-cgroups = false
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-cli"
|
||||||
|
root = "/run/nvidia/driver"
|
||||||
|
user = ""
|
||||||
|
|
||||||
|
[nvidia-container-runtime]
|
||||||
|
debug = "/dev/null"
|
||||||
|
log-level = "info"
|
||||||
|
mode = "auto"
|
||||||
|
runtimes = ["runc", "crun"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.cdi]
|
||||||
|
annotation-prefixes = ["cdi.k8s.io/"]
|
||||||
|
default-kind = "nvidia.com/gpu"
|
||||||
|
spec-dirs = ["/etc/cdi", "/var/run/cdi"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.csv]
|
||||||
|
mount-spec-path = "/etc/nvidia-container-runtime/host-files-for-container.d"
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.legacy]
|
||||||
|
cuda-compat-mode = "ldconfig"
|
||||||
|
|
||||||
|
[nvidia-container-runtime-hook]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime-hook"
|
||||||
|
skip-mode-detection = true
|
||||||
|
|
||||||
|
[nvidia-ctk]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-ctk"
|
||||||
|
`,
|
||||||
|
expectedRuntimeConfig: `{
|
||||||
|
"default-runtime": "nvidia",
|
||||||
|
"runtimes": {
|
||||||
|
"nvidia": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime"
|
||||||
|
},
|
||||||
|
"nvidia-cdi": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.cdi"
|
||||||
|
},
|
||||||
|
"nvidia-legacy": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.legacy"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "CDI enabled enables CDI in docker",
|
||||||
|
args: []string{"--cdi-enabled", "--create-device-nodes=none"},
|
||||||
|
expectedToolkitConfig: `accept-nvidia-visible-devices-as-volume-mounts = false
|
||||||
|
accept-nvidia-visible-devices-envvar-when-unprivileged = true
|
||||||
|
disable-require = false
|
||||||
|
supported-driver-capabilities = "compat32,compute,display,graphics,ngx,utility,video"
|
||||||
|
swarm-resource = ""
|
||||||
|
|
||||||
|
[nvidia-container-cli]
|
||||||
|
debug = ""
|
||||||
|
environment = []
|
||||||
|
ldcache = ""
|
||||||
|
ldconfig = "@/run/nvidia/driver/sbin/ldconfig"
|
||||||
|
load-kmods = true
|
||||||
|
no-cgroups = false
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-cli"
|
||||||
|
root = "/run/nvidia/driver"
|
||||||
|
user = ""
|
||||||
|
|
||||||
|
[nvidia-container-runtime]
|
||||||
|
debug = "/dev/null"
|
||||||
|
log-level = "info"
|
||||||
|
mode = "auto"
|
||||||
|
runtimes = ["runc", "crun"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.cdi]
|
||||||
|
annotation-prefixes = ["cdi.k8s.io/"]
|
||||||
|
default-kind = "nvidia.com/gpu"
|
||||||
|
spec-dirs = ["/etc/cdi", "/var/run/cdi"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.csv]
|
||||||
|
mount-spec-path = "/etc/nvidia-container-runtime/host-files-for-container.d"
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.legacy]
|
||||||
|
cuda-compat-mode = "ldconfig"
|
||||||
|
|
||||||
|
[nvidia-container-runtime-hook]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime-hook"
|
||||||
|
skip-mode-detection = true
|
||||||
|
|
||||||
|
[nvidia-ctk]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-ctk"
|
||||||
|
`,
|
||||||
|
expectedRuntimeConfig: `{
|
||||||
|
"default-runtime": "nvidia",
|
||||||
|
"features": {
|
||||||
|
"cdi": true
|
||||||
|
},
|
||||||
|
"runtimes": {
|
||||||
|
"nvidia": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime"
|
||||||
|
},
|
||||||
|
"nvidia-cdi": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.cdi"
|
||||||
|
},
|
||||||
|
"nvidia-legacy": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.legacy"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "--enable-cdi-in-runtime=false overrides --cdi-enabled in Docker",
|
||||||
|
args: []string{"--cdi-enabled", "--create-device-nodes=none", "--enable-cdi-in-runtime=false"},
|
||||||
|
expectedToolkitConfig: `accept-nvidia-visible-devices-as-volume-mounts = false
|
||||||
|
accept-nvidia-visible-devices-envvar-when-unprivileged = true
|
||||||
|
disable-require = false
|
||||||
|
supported-driver-capabilities = "compat32,compute,display,graphics,ngx,utility,video"
|
||||||
|
swarm-resource = ""
|
||||||
|
|
||||||
|
[nvidia-container-cli]
|
||||||
|
debug = ""
|
||||||
|
environment = []
|
||||||
|
ldcache = ""
|
||||||
|
ldconfig = "@/run/nvidia/driver/sbin/ldconfig"
|
||||||
|
load-kmods = true
|
||||||
|
no-cgroups = false
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-cli"
|
||||||
|
root = "/run/nvidia/driver"
|
||||||
|
user = ""
|
||||||
|
|
||||||
|
[nvidia-container-runtime]
|
||||||
|
debug = "/dev/null"
|
||||||
|
log-level = "info"
|
||||||
|
mode = "auto"
|
||||||
|
runtimes = ["runc", "crun"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.cdi]
|
||||||
|
annotation-prefixes = ["cdi.k8s.io/"]
|
||||||
|
default-kind = "nvidia.com/gpu"
|
||||||
|
spec-dirs = ["/etc/cdi", "/var/run/cdi"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.csv]
|
||||||
|
mount-spec-path = "/etc/nvidia-container-runtime/host-files-for-container.d"
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.legacy]
|
||||||
|
cuda-compat-mode = "ldconfig"
|
||||||
|
|
||||||
|
[nvidia-container-runtime-hook]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime-hook"
|
||||||
|
skip-mode-detection = true
|
||||||
|
|
||||||
|
[nvidia-ctk]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-ctk"
|
||||||
|
`,
|
||||||
|
expectedRuntimeConfig: `{
|
||||||
|
"default-runtime": "nvidia",
|
||||||
|
"runtimes": {
|
||||||
|
"nvidia": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime"
|
||||||
|
},
|
||||||
|
"nvidia-cdi": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.cdi"
|
||||||
|
},
|
||||||
|
"nvidia-legacy": {
|
||||||
|
"args": [],
|
||||||
|
"path": "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.legacy"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "CDI enabled enables CDI in containerd",
|
||||||
|
args: []string{"--cdi-enabled", "--runtime=containerd"},
|
||||||
|
expectedToolkitConfig: `accept-nvidia-visible-devices-as-volume-mounts = false
|
||||||
|
accept-nvidia-visible-devices-envvar-when-unprivileged = true
|
||||||
|
disable-require = false
|
||||||
|
supported-driver-capabilities = "compat32,compute,display,graphics,ngx,utility,video"
|
||||||
|
swarm-resource = ""
|
||||||
|
|
||||||
|
[nvidia-container-cli]
|
||||||
|
debug = ""
|
||||||
|
environment = []
|
||||||
|
ldcache = ""
|
||||||
|
ldconfig = "@/run/nvidia/driver/sbin/ldconfig"
|
||||||
|
load-kmods = true
|
||||||
|
no-cgroups = false
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-cli"
|
||||||
|
root = "/run/nvidia/driver"
|
||||||
|
user = ""
|
||||||
|
|
||||||
|
[nvidia-container-runtime]
|
||||||
|
debug = "/dev/null"
|
||||||
|
log-level = "info"
|
||||||
|
mode = "auto"
|
||||||
|
runtimes = ["runc", "crun"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.cdi]
|
||||||
|
annotation-prefixes = ["cdi.k8s.io/"]
|
||||||
|
default-kind = "nvidia.com/gpu"
|
||||||
|
spec-dirs = ["/etc/cdi", "/var/run/cdi"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.csv]
|
||||||
|
mount-spec-path = "/etc/nvidia-container-runtime/host-files-for-container.d"
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.legacy]
|
||||||
|
cuda-compat-mode = "ldconfig"
|
||||||
|
|
||||||
|
[nvidia-container-runtime-hook]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime-hook"
|
||||||
|
skip-mode-detection = true
|
||||||
|
|
||||||
|
[nvidia-ctk]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-ctk"
|
||||||
|
`,
|
||||||
|
expectedRuntimeConfig: `version = 2
|
||||||
|
|
||||||
|
[plugins]
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri"]
|
||||||
|
enable_cdi = true
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd]
|
||||||
|
default_runtime_name = "nvidia"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes]
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-cdi]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-cdi.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.cdi"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-legacy]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-legacy.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.legacy"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "--enable-cdi-in-runtime=false overrides --cdi-enabled in containerd",
|
||||||
|
args: []string{"--cdi-enabled", "--create-device-nodes=none", "--enable-cdi-in-runtime=false", "--runtime=containerd"},
|
||||||
|
expectedToolkitConfig: `accept-nvidia-visible-devices-as-volume-mounts = false
|
||||||
|
accept-nvidia-visible-devices-envvar-when-unprivileged = true
|
||||||
|
disable-require = false
|
||||||
|
supported-driver-capabilities = "compat32,compute,display,graphics,ngx,utility,video"
|
||||||
|
swarm-resource = ""
|
||||||
|
|
||||||
|
[nvidia-container-cli]
|
||||||
|
debug = ""
|
||||||
|
environment = []
|
||||||
|
ldcache = ""
|
||||||
|
ldconfig = "@/run/nvidia/driver/sbin/ldconfig"
|
||||||
|
load-kmods = true
|
||||||
|
no-cgroups = false
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-cli"
|
||||||
|
root = "/run/nvidia/driver"
|
||||||
|
user = ""
|
||||||
|
|
||||||
|
[nvidia-container-runtime]
|
||||||
|
debug = "/dev/null"
|
||||||
|
log-level = "info"
|
||||||
|
mode = "auto"
|
||||||
|
runtimes = ["runc", "crun"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.cdi]
|
||||||
|
annotation-prefixes = ["cdi.k8s.io/"]
|
||||||
|
default-kind = "nvidia.com/gpu"
|
||||||
|
spec-dirs = ["/etc/cdi", "/var/run/cdi"]
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.csv]
|
||||||
|
mount-spec-path = "/etc/nvidia-container-runtime/host-files-for-container.d"
|
||||||
|
|
||||||
|
[nvidia-container-runtime.modes.legacy]
|
||||||
|
cuda-compat-mode = "ldconfig"
|
||||||
|
|
||||||
|
[nvidia-container-runtime-hook]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime-hook"
|
||||||
|
skip-mode-detection = true
|
||||||
|
|
||||||
|
[nvidia-ctk]
|
||||||
|
path = "{{ .toolkitRoot }}/toolkit/nvidia-ctk"
|
||||||
|
`,
|
||||||
|
expectedRuntimeConfig: `version = 2
|
||||||
|
|
||||||
|
[plugins]
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri"]
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd]
|
||||||
|
default_runtime_name = "nvidia"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes]
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-cdi]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-cdi.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.cdi"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-legacy]
|
||||||
|
privileged_without_host_devices = false
|
||||||
|
runtime_engine = ""
|
||||||
|
runtime_root = ""
|
||||||
|
runtime_type = "io.containerd.runc.v2"
|
||||||
|
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.nvidia-legacy.options]
|
||||||
|
BinaryName = "{{ .toolkitRoot }}/toolkit/nvidia-container-runtime.legacy"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
testRoot := t.TempDir()
|
||||||
|
|
||||||
|
cdiOutputDir := filepath.Join(testRoot, "/var/run/cdi")
|
||||||
|
runtimeConfigFile := filepath.Join(testRoot, "config.file")
|
||||||
|
|
||||||
|
toolkitRoot := filepath.Join(testRoot, "toolkit-test")
|
||||||
|
toolkitConfigFile := filepath.Join(toolkitRoot, "toolkit/.config/nvidia-container-runtime/config.toml")
|
||||||
|
|
||||||
|
app := NewApp(logger)
|
||||||
|
|
||||||
|
testArgs := []string{
|
||||||
|
"nvidia-ctk-installer",
|
||||||
|
"--toolkit-install-dir=" + toolkitRoot,
|
||||||
|
"--no-daemon",
|
||||||
|
"--cdi-output-dir=" + cdiOutputDir,
|
||||||
|
"--config=" + runtimeConfigFile,
|
||||||
|
"--create-device-nodes=none",
|
||||||
|
"--driver-root-ctr-path=" + hostRoot,
|
||||||
|
"--pid-file=" + filepath.Join(testRoot, "toolkit.pid"),
|
||||||
|
"--restart-mode=none",
|
||||||
|
"--toolkit-source-root=" + filepath.Join(artifactRoot, "deb"),
|
||||||
|
}
|
||||||
|
|
||||||
|
err := app.Run(context.Background(), append(testArgs, tc.args...))
|
||||||
|
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.FileExists(t, toolkitConfigFile)
|
||||||
|
toolkitConfigFileContents, err := os.ReadFile(toolkitConfigFile)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.EqualValues(t, strings.ReplaceAll(tc.expectedToolkitConfig, "{{ .toolkitRoot }}", toolkitRoot), string(toolkitConfigFileContents))
|
||||||
|
|
||||||
|
require.FileExists(t, runtimeConfigFile)
|
||||||
|
runtimeConfigFileContents, err := os.ReadFile(runtimeConfigFile)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.EqualValues(t, strings.ReplaceAll(tc.expectedRuntimeConfig, "{{ .toolkitRoot }}", toolkitRoot), string(runtimeConfigFileContents))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
85
cmd/nvidia-ctk-installer/toolkit/installer/artifact-root.go
Normal file
85
cmd/nvidia-ctk-installer/toolkit/installer/artifact-root.go
Normal file
@@ -0,0 +1,85 @@
|
|||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package installer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup"
|
||||||
|
)
|
||||||
|
|
||||||
|
// An artifactRoot is used as a source for installed artifacts.
|
||||||
|
// It is refined by a directory path, a library locator, and an executable locator.
|
||||||
|
type artifactRoot struct {
|
||||||
|
path string
|
||||||
|
libraries lookup.Locator
|
||||||
|
executables lookup.Locator
|
||||||
|
}
|
||||||
|
|
||||||
|
func newArtifactRoot(logger logger.Interface, rootDirectoryPath string) (*artifactRoot, error) {
|
||||||
|
relativeLibrarySearchPaths := []string{
|
||||||
|
"/usr/lib64",
|
||||||
|
"/usr/lib/x86_64-linux-gnu",
|
||||||
|
"/usr/lib/aarch64-linux-gnu",
|
||||||
|
}
|
||||||
|
var librarySearchPaths []string
|
||||||
|
for _, l := range relativeLibrarySearchPaths {
|
||||||
|
librarySearchPaths = append(librarySearchPaths, filepath.Join(rootDirectoryPath, l))
|
||||||
|
}
|
||||||
|
|
||||||
|
a := artifactRoot{
|
||||||
|
path: rootDirectoryPath,
|
||||||
|
libraries: lookup.NewLibraryLocator(
|
||||||
|
lookup.WithLogger(logger),
|
||||||
|
lookup.WithCount(1),
|
||||||
|
lookup.WithSearchPaths(librarySearchPaths...),
|
||||||
|
),
|
||||||
|
executables: lookup.NewExecutableLocator(
|
||||||
|
logger,
|
||||||
|
rootDirectoryPath,
|
||||||
|
),
|
||||||
|
}
|
||||||
|
|
||||||
|
return &a, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *artifactRoot) findLibrary(name string) (string, error) {
|
||||||
|
candidates, err := r.libraries.Locate(name)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("error locating library: %w", err)
|
||||||
|
}
|
||||||
|
if len(candidates) == 0 {
|
||||||
|
return "", fmt.Errorf("library %v not found", name)
|
||||||
|
}
|
||||||
|
|
||||||
|
return candidates[0], nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *artifactRoot) findExecutable(name string) (string, error) {
|
||||||
|
candidates, err := r.executables.Locate(name)
|
||||||
|
if err != nil {
|
||||||
|
return "", fmt.Errorf("error locating executable: %w", err)
|
||||||
|
}
|
||||||
|
if len(candidates) == 0 {
|
||||||
|
return "", fmt.Errorf("executable %v not found", name)
|
||||||
|
}
|
||||||
|
|
||||||
|
return candidates[0], nil
|
||||||
|
}
|
||||||
47
cmd/nvidia-ctk-installer/toolkit/installer/directory.go
Normal file
47
cmd/nvidia-ctk-installer/toolkit/installer/directory.go
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package installer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type createDirectory struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *ToolkitInstaller) createDirectory() Installer {
|
||||||
|
return &createDirectory{
|
||||||
|
logger: t.logger,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *createDirectory) Install(dir string) error {
|
||||||
|
if dir == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
d.logger.Infof("Creating directory '%v'", dir)
|
||||||
|
err := os.MkdirAll(dir, 0755)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error creating directory: %v", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
179
cmd/nvidia-ctk-installer/toolkit/installer/executables.go
Normal file
179
cmd/nvidia-ctk-installer/toolkit/installer/executables.go
Normal file
@@ -0,0 +1,179 @@
|
|||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package installer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"fmt"
|
||||||
|
"html/template"
|
||||||
|
"io"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/container/operator"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
)
|
||||||
|
|
||||||
|
type executable struct {
|
||||||
|
requiresKernelModule bool
|
||||||
|
path string
|
||||||
|
symlink string
|
||||||
|
env map[string]string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *ToolkitInstaller) collectExecutables(destDir string) ([]Installer, error) {
|
||||||
|
configFilePath := t.ConfigFilePath(destDir)
|
||||||
|
|
||||||
|
executables := []executable{
|
||||||
|
{
|
||||||
|
path: "nvidia-ctk",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
path: "nvidia-cdi-hook",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for _, runtime := range operator.GetRuntimes() {
|
||||||
|
e := executable{
|
||||||
|
path: runtime.Path,
|
||||||
|
requiresKernelModule: true,
|
||||||
|
env: map[string]string{
|
||||||
|
config.FilePathOverrideEnvVar: configFilePath,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
executables = append(executables, e)
|
||||||
|
}
|
||||||
|
executables = append(executables,
|
||||||
|
executable{
|
||||||
|
path: "nvidia-container-cli",
|
||||||
|
env: map[string]string{"LD_LIBRARY_PATH": destDir + ":$LD_LIBRARY_PATH"},
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
executables = append(executables,
|
||||||
|
executable{
|
||||||
|
path: "nvidia-container-runtime-hook",
|
||||||
|
symlink: "nvidia-container-toolkit",
|
||||||
|
env: map[string]string{
|
||||||
|
config.FilePathOverrideEnvVar: configFilePath,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
var installers []Installer
|
||||||
|
for _, executable := range executables {
|
||||||
|
executablePath, err := t.artifactRoot.findExecutable(executable.path)
|
||||||
|
if err != nil {
|
||||||
|
if t.ignoreErrors {
|
||||||
|
log.Errorf("Ignoring error: %v", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
wrappedExecutableFilename := filepath.Base(executablePath)
|
||||||
|
dotRealFilename := wrappedExecutableFilename + ".real"
|
||||||
|
|
||||||
|
w := &wrapper{
|
||||||
|
Source: executablePath,
|
||||||
|
WrappedExecutable: dotRealFilename,
|
||||||
|
CheckModules: executable.requiresKernelModule,
|
||||||
|
Envvars: map[string]string{
|
||||||
|
"PATH": strings.Join([]string{destDir, "$PATH"}, ":"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for k, v := range executable.env {
|
||||||
|
w.Envvars[k] = v
|
||||||
|
}
|
||||||
|
|
||||||
|
installers = append(installers, w)
|
||||||
|
|
||||||
|
if executable.symlink == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
link := symlink{
|
||||||
|
linkname: executable.symlink,
|
||||||
|
target: filepath.Base(executablePath),
|
||||||
|
}
|
||||||
|
installers = append(installers, link)
|
||||||
|
}
|
||||||
|
|
||||||
|
return installers, nil
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
type wrapper struct {
|
||||||
|
Source string
|
||||||
|
Envvars map[string]string
|
||||||
|
WrappedExecutable string
|
||||||
|
CheckModules bool
|
||||||
|
}
|
||||||
|
|
||||||
|
type render struct {
|
||||||
|
*wrapper
|
||||||
|
DestDir string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *wrapper) Install(destDir string) error {
|
||||||
|
// Copy the executable with a .real extension.
|
||||||
|
mode, err := installFile(w.Source, filepath.Join(destDir, w.WrappedExecutable))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create a wrapper file.
|
||||||
|
r := render{
|
||||||
|
wrapper: w,
|
||||||
|
DestDir: destDir,
|
||||||
|
}
|
||||||
|
content, err := r.render()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to render wrapper: %w", err)
|
||||||
|
}
|
||||||
|
wrapperFile := filepath.Join(destDir, filepath.Base(w.Source))
|
||||||
|
return installContent(content, wrapperFile, mode|0111)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *render) render() (io.Reader, error) {
|
||||||
|
wrapperTemplate := `#! /bin/sh
|
||||||
|
{{- if (.CheckModules) }}
|
||||||
|
cat /proc/modules | grep -e "^nvidia " >/dev/null 2>&1
|
||||||
|
if [ "${?}" != "0" ]; then
|
||||||
|
echo "nvidia driver modules are not yet loaded, invoking runc directly"
|
||||||
|
exec runc "$@"
|
||||||
|
fi
|
||||||
|
{{- end }}
|
||||||
|
{{- range $key, $value := .Envvars }}
|
||||||
|
{{$key}}={{$value}} \
|
||||||
|
{{- end }}
|
||||||
|
{{ .DestDir }}/{{ .WrappedExecutable }} \
|
||||||
|
"$@"
|
||||||
|
`
|
||||||
|
|
||||||
|
var content bytes.Buffer
|
||||||
|
tmpl, err := template.New("wrapper").Parse(wrapperTemplate)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if err := tmpl.Execute(&content, w); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &content, nil
|
||||||
|
}
|
||||||
@@ -0,0 +1,91 @@
|
|||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package installer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestWrapperRender(t *testing.T) {
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
w *wrapper
|
||||||
|
expected string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "executable is added",
|
||||||
|
w: &wrapper{
|
||||||
|
WrappedExecutable: "some-runtime",
|
||||||
|
},
|
||||||
|
expected: `#! /bin/sh
|
||||||
|
/dest-dir/some-runtime \
|
||||||
|
"$@"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "module check is added",
|
||||||
|
w: &wrapper{
|
||||||
|
WrappedExecutable: "some-runtime",
|
||||||
|
CheckModules: true,
|
||||||
|
},
|
||||||
|
expected: `#! /bin/sh
|
||||||
|
cat /proc/modules | grep -e "^nvidia " >/dev/null 2>&1
|
||||||
|
if [ "${?}" != "0" ]; then
|
||||||
|
echo "nvidia driver modules are not yet loaded, invoking runc directly"
|
||||||
|
exec runc "$@"
|
||||||
|
fi
|
||||||
|
/dest-dir/some-runtime \
|
||||||
|
"$@"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "environment is added",
|
||||||
|
w: &wrapper{
|
||||||
|
WrappedExecutable: "some-runtime",
|
||||||
|
Envvars: map[string]string{
|
||||||
|
"PATH": "/foo/bar/baz",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
expected: `#! /bin/sh
|
||||||
|
PATH=/foo/bar/baz \
|
||||||
|
/dest-dir/some-runtime \
|
||||||
|
"$@"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
r := render{
|
||||||
|
wrapper: tc.w,
|
||||||
|
DestDir: "/dest-dir",
|
||||||
|
}
|
||||||
|
reader, err := r.render()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
var content bytes.Buffer
|
||||||
|
_, err = content.ReadFrom(reader)
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.Equal(t, tc.expected, content.String())
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -0,0 +1,188 @@
|
|||||||
|
// Code generated by moq; DO NOT EDIT.
|
||||||
|
// github.com/matryer/moq
|
||||||
|
|
||||||
|
package installer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
"sync"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Ensure, that fileInstallerMock does implement fileInstaller.
|
||||||
|
// If this is not the case, regenerate this file with moq.
|
||||||
|
var _ fileInstaller = &fileInstallerMock{}
|
||||||
|
|
||||||
|
// fileInstallerMock is a mock implementation of fileInstaller.
|
||||||
|
//
|
||||||
|
// func TestSomethingThatUsesfileInstaller(t *testing.T) {
|
||||||
|
//
|
||||||
|
// // make and configure a mocked fileInstaller
|
||||||
|
// mockedfileInstaller := &fileInstallerMock{
|
||||||
|
// installContentFunc: func(reader io.Reader, s string, v os.FileMode) error {
|
||||||
|
// panic("mock out the installContent method")
|
||||||
|
// },
|
||||||
|
// installFileFunc: func(s1 string, s2 string) (os.FileMode, error) {
|
||||||
|
// panic("mock out the installFile method")
|
||||||
|
// },
|
||||||
|
// installSymlinkFunc: func(s1 string, s2 string) error {
|
||||||
|
// panic("mock out the installSymlink method")
|
||||||
|
// },
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// // use mockedfileInstaller in code that requires fileInstaller
|
||||||
|
// // and then make assertions.
|
||||||
|
//
|
||||||
|
// }
|
||||||
|
type fileInstallerMock struct {
|
||||||
|
// installContentFunc mocks the installContent method.
|
||||||
|
installContentFunc func(reader io.Reader, s string, v os.FileMode) error
|
||||||
|
|
||||||
|
// installFileFunc mocks the installFile method.
|
||||||
|
installFileFunc func(s1 string, s2 string) (os.FileMode, error)
|
||||||
|
|
||||||
|
// installSymlinkFunc mocks the installSymlink method.
|
||||||
|
installSymlinkFunc func(s1 string, s2 string) error
|
||||||
|
|
||||||
|
// calls tracks calls to the methods.
|
||||||
|
calls struct {
|
||||||
|
// installContent holds details about calls to the installContent method.
|
||||||
|
installContent []struct {
|
||||||
|
// Reader is the reader argument value.
|
||||||
|
Reader io.Reader
|
||||||
|
// S is the s argument value.
|
||||||
|
S string
|
||||||
|
// V is the v argument value.
|
||||||
|
V os.FileMode
|
||||||
|
}
|
||||||
|
// installFile holds details about calls to the installFile method.
|
||||||
|
installFile []struct {
|
||||||
|
// S1 is the s1 argument value.
|
||||||
|
S1 string
|
||||||
|
// S2 is the s2 argument value.
|
||||||
|
S2 string
|
||||||
|
}
|
||||||
|
// installSymlink holds details about calls to the installSymlink method.
|
||||||
|
installSymlink []struct {
|
||||||
|
// S1 is the s1 argument value.
|
||||||
|
S1 string
|
||||||
|
// S2 is the s2 argument value.
|
||||||
|
S2 string
|
||||||
|
}
|
||||||
|
}
|
||||||
|
lockinstallContent sync.RWMutex
|
||||||
|
lockinstallFile sync.RWMutex
|
||||||
|
lockinstallSymlink sync.RWMutex
|
||||||
|
}
|
||||||
|
|
||||||
|
// installContent calls installContentFunc.
|
||||||
|
func (mock *fileInstallerMock) installContent(reader io.Reader, s string, v os.FileMode) error {
|
||||||
|
if mock.installContentFunc == nil {
|
||||||
|
panic("fileInstallerMock.installContentFunc: method is nil but fileInstaller.installContent was just called")
|
||||||
|
}
|
||||||
|
callInfo := struct {
|
||||||
|
Reader io.Reader
|
||||||
|
S string
|
||||||
|
V os.FileMode
|
||||||
|
}{
|
||||||
|
Reader: reader,
|
||||||
|
S: s,
|
||||||
|
V: v,
|
||||||
|
}
|
||||||
|
mock.lockinstallContent.Lock()
|
||||||
|
mock.calls.installContent = append(mock.calls.installContent, callInfo)
|
||||||
|
mock.lockinstallContent.Unlock()
|
||||||
|
return mock.installContentFunc(reader, s, v)
|
||||||
|
}
|
||||||
|
|
||||||
|
// installContentCalls gets all the calls that were made to installContent.
|
||||||
|
// Check the length with:
|
||||||
|
//
|
||||||
|
// len(mockedfileInstaller.installContentCalls())
|
||||||
|
func (mock *fileInstallerMock) installContentCalls() []struct {
|
||||||
|
Reader io.Reader
|
||||||
|
S string
|
||||||
|
V os.FileMode
|
||||||
|
} {
|
||||||
|
var calls []struct {
|
||||||
|
Reader io.Reader
|
||||||
|
S string
|
||||||
|
V os.FileMode
|
||||||
|
}
|
||||||
|
mock.lockinstallContent.RLock()
|
||||||
|
calls = mock.calls.installContent
|
||||||
|
mock.lockinstallContent.RUnlock()
|
||||||
|
return calls
|
||||||
|
}
|
||||||
|
|
||||||
|
// installFile calls installFileFunc.
|
||||||
|
func (mock *fileInstallerMock) installFile(s1 string, s2 string) (os.FileMode, error) {
|
||||||
|
if mock.installFileFunc == nil {
|
||||||
|
panic("fileInstallerMock.installFileFunc: method is nil but fileInstaller.installFile was just called")
|
||||||
|
}
|
||||||
|
callInfo := struct {
|
||||||
|
S1 string
|
||||||
|
S2 string
|
||||||
|
}{
|
||||||
|
S1: s1,
|
||||||
|
S2: s2,
|
||||||
|
}
|
||||||
|
mock.lockinstallFile.Lock()
|
||||||
|
mock.calls.installFile = append(mock.calls.installFile, callInfo)
|
||||||
|
mock.lockinstallFile.Unlock()
|
||||||
|
return mock.installFileFunc(s1, s2)
|
||||||
|
}
|
||||||
|
|
||||||
|
// installFileCalls gets all the calls that were made to installFile.
|
||||||
|
// Check the length with:
|
||||||
|
//
|
||||||
|
// len(mockedfileInstaller.installFileCalls())
|
||||||
|
func (mock *fileInstallerMock) installFileCalls() []struct {
|
||||||
|
S1 string
|
||||||
|
S2 string
|
||||||
|
} {
|
||||||
|
var calls []struct {
|
||||||
|
S1 string
|
||||||
|
S2 string
|
||||||
|
}
|
||||||
|
mock.lockinstallFile.RLock()
|
||||||
|
calls = mock.calls.installFile
|
||||||
|
mock.lockinstallFile.RUnlock()
|
||||||
|
return calls
|
||||||
|
}
|
||||||
|
|
||||||
|
// installSymlink calls installSymlinkFunc.
|
||||||
|
func (mock *fileInstallerMock) installSymlink(s1 string, s2 string) error {
|
||||||
|
if mock.installSymlinkFunc == nil {
|
||||||
|
panic("fileInstallerMock.installSymlinkFunc: method is nil but fileInstaller.installSymlink was just called")
|
||||||
|
}
|
||||||
|
callInfo := struct {
|
||||||
|
S1 string
|
||||||
|
S2 string
|
||||||
|
}{
|
||||||
|
S1: s1,
|
||||||
|
S2: s2,
|
||||||
|
}
|
||||||
|
mock.lockinstallSymlink.Lock()
|
||||||
|
mock.calls.installSymlink = append(mock.calls.installSymlink, callInfo)
|
||||||
|
mock.lockinstallSymlink.Unlock()
|
||||||
|
return mock.installSymlinkFunc(s1, s2)
|
||||||
|
}
|
||||||
|
|
||||||
|
// installSymlinkCalls gets all the calls that were made to installSymlink.
|
||||||
|
// Check the length with:
|
||||||
|
//
|
||||||
|
// len(mockedfileInstaller.installSymlinkCalls())
|
||||||
|
func (mock *fileInstallerMock) installSymlinkCalls() []struct {
|
||||||
|
S1 string
|
||||||
|
S2 string
|
||||||
|
} {
|
||||||
|
var calls []struct {
|
||||||
|
S1 string
|
||||||
|
S2 string
|
||||||
|
}
|
||||||
|
mock.lockinstallSymlink.RLock()
|
||||||
|
calls = mock.calls.installSymlink
|
||||||
|
mock.lockinstallSymlink.RUnlock()
|
||||||
|
return calls
|
||||||
|
}
|
||||||
172
cmd/nvidia-ctk-installer/toolkit/installer/installer.go
Normal file
172
cmd/nvidia-ctk-installer/toolkit/installer/installer.go
Normal file
@@ -0,0 +1,172 @@
|
|||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package installer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"io/fs"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
//go:generate moq -rm -fmt=goimports -out installer_mock.go . Installer
|
||||||
|
type Installer interface {
|
||||||
|
Install(string) error
|
||||||
|
}
|
||||||
|
|
||||||
|
type ToolkitInstaller struct {
|
||||||
|
logger logger.Interface
|
||||||
|
ignoreErrors bool
|
||||||
|
sourceRoot string
|
||||||
|
|
||||||
|
artifactRoot *artifactRoot
|
||||||
|
|
||||||
|
ensureTargetDirectory Installer
|
||||||
|
}
|
||||||
|
|
||||||
|
var _ Installer = (*ToolkitInstaller)(nil)
|
||||||
|
|
||||||
|
// New creates a toolkit installer with the specified options.
|
||||||
|
func New(opts ...Option) (*ToolkitInstaller, error) {
|
||||||
|
t := &ToolkitInstaller{
|
||||||
|
sourceRoot: "/",
|
||||||
|
}
|
||||||
|
for _, opt := range opts {
|
||||||
|
opt(t)
|
||||||
|
}
|
||||||
|
|
||||||
|
if t.logger == nil {
|
||||||
|
t.logger = logger.New()
|
||||||
|
}
|
||||||
|
if t.artifactRoot == nil {
|
||||||
|
artifactRoot, err := newArtifactRoot(t.logger, t.sourceRoot)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
t.artifactRoot = artifactRoot
|
||||||
|
}
|
||||||
|
|
||||||
|
if t.ensureTargetDirectory == nil {
|
||||||
|
t.ensureTargetDirectory = t.createDirectory()
|
||||||
|
}
|
||||||
|
|
||||||
|
return t, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Install ensures that the required toolkit files are installed in the specified directory.
|
||||||
|
func (t *ToolkitInstaller) Install(destDir string) error {
|
||||||
|
var installers []Installer
|
||||||
|
|
||||||
|
installers = append(installers, t.ensureTargetDirectory)
|
||||||
|
|
||||||
|
libraries, err := t.collectLibraries()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to collect libraries: %w", err)
|
||||||
|
}
|
||||||
|
installers = append(installers, libraries...)
|
||||||
|
|
||||||
|
executables, err := t.collectExecutables(destDir)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to collect executables: %w", err)
|
||||||
|
}
|
||||||
|
installers = append(installers, executables...)
|
||||||
|
|
||||||
|
var errs error
|
||||||
|
for _, i := range installers {
|
||||||
|
errs = errors.Join(errs, i.Install(destDir))
|
||||||
|
}
|
||||||
|
|
||||||
|
return errs
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *ToolkitInstaller) ConfigFilePath(destDir string) string {
|
||||||
|
toolkitConfigDir := filepath.Join(destDir, ".config", "nvidia-container-runtime")
|
||||||
|
return filepath.Join(toolkitConfigDir, "config.toml")
|
||||||
|
}
|
||||||
|
|
||||||
|
type symlink struct {
|
||||||
|
linkname string
|
||||||
|
target string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s symlink) Install(destDir string) error {
|
||||||
|
symlinkPath := filepath.Join(destDir, s.linkname)
|
||||||
|
return installSymlink(s.target, symlinkPath)
|
||||||
|
}
|
||||||
|
|
||||||
|
//go:generate moq -rm -fmt=goimports -out file-installer_mock.go . fileInstaller
|
||||||
|
type fileInstaller interface {
|
||||||
|
installContent(io.Reader, string, os.FileMode) error
|
||||||
|
installFile(string, string) (os.FileMode, error)
|
||||||
|
installSymlink(string, string) error
|
||||||
|
}
|
||||||
|
|
||||||
|
var installSymlink = installSymlinkStub
|
||||||
|
|
||||||
|
func installSymlinkStub(target string, link string) error {
|
||||||
|
err := os.Symlink(target, link)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error creating symlink '%v' => '%v': %v", link, target, err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var installFile = installFileStub
|
||||||
|
|
||||||
|
func installFileStub(src string, dest string) (os.FileMode, error) {
|
||||||
|
sourceInfo, err := os.Stat(src)
|
||||||
|
if err != nil {
|
||||||
|
return 0, fmt.Errorf("error getting file info for '%v': %v", src, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
source, err := os.Open(src)
|
||||||
|
if err != nil {
|
||||||
|
return 0, fmt.Errorf("error opening source: %w", err)
|
||||||
|
}
|
||||||
|
defer source.Close()
|
||||||
|
|
||||||
|
mode := sourceInfo.Mode()
|
||||||
|
if err := installContent(source, dest, mode); err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
return mode, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var installContent = installContentStub
|
||||||
|
|
||||||
|
func installContentStub(content io.Reader, dest string, mode fs.FileMode) error {
|
||||||
|
destination, err := os.Create(dest)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error creating destination: %w", err)
|
||||||
|
}
|
||||||
|
defer destination.Close()
|
||||||
|
|
||||||
|
_, err = io.Copy(destination, content)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error copying file: %w", err)
|
||||||
|
}
|
||||||
|
err = os.Chmod(dest, mode)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error setting mode for '%v': %v", dest, err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
74
cmd/nvidia-ctk-installer/toolkit/installer/installer_mock.go
Normal file
74
cmd/nvidia-ctk-installer/toolkit/installer/installer_mock.go
Normal file
@@ -0,0 +1,74 @@
|
|||||||
|
// Code generated by moq; DO NOT EDIT.
|
||||||
|
// github.com/matryer/moq
|
||||||
|
|
||||||
|
package installer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"sync"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Ensure, that InstallerMock does implement Installer.
|
||||||
|
// If this is not the case, regenerate this file with moq.
|
||||||
|
var _ Installer = &InstallerMock{}
|
||||||
|
|
||||||
|
// InstallerMock is a mock implementation of Installer.
|
||||||
|
//
|
||||||
|
// func TestSomethingThatUsesInstaller(t *testing.T) {
|
||||||
|
//
|
||||||
|
// // make and configure a mocked Installer
|
||||||
|
// mockedInstaller := &InstallerMock{
|
||||||
|
// InstallFunc: func(s string) error {
|
||||||
|
// panic("mock out the Install method")
|
||||||
|
// },
|
||||||
|
// }
|
||||||
|
//
|
||||||
|
// // use mockedInstaller in code that requires Installer
|
||||||
|
// // and then make assertions.
|
||||||
|
//
|
||||||
|
// }
|
||||||
|
type InstallerMock struct {
|
||||||
|
// InstallFunc mocks the Install method.
|
||||||
|
InstallFunc func(s string) error
|
||||||
|
|
||||||
|
// calls tracks calls to the methods.
|
||||||
|
calls struct {
|
||||||
|
// Install holds details about calls to the Install method.
|
||||||
|
Install []struct {
|
||||||
|
// S is the s argument value.
|
||||||
|
S string
|
||||||
|
}
|
||||||
|
}
|
||||||
|
lockInstall sync.RWMutex
|
||||||
|
}
|
||||||
|
|
||||||
|
// Install calls InstallFunc.
|
||||||
|
func (mock *InstallerMock) Install(s string) error {
|
||||||
|
if mock.InstallFunc == nil {
|
||||||
|
panic("InstallerMock.InstallFunc: method is nil but Installer.Install was just called")
|
||||||
|
}
|
||||||
|
callInfo := struct {
|
||||||
|
S string
|
||||||
|
}{
|
||||||
|
S: s,
|
||||||
|
}
|
||||||
|
mock.lockInstall.Lock()
|
||||||
|
mock.calls.Install = append(mock.calls.Install, callInfo)
|
||||||
|
mock.lockInstall.Unlock()
|
||||||
|
return mock.InstallFunc(s)
|
||||||
|
}
|
||||||
|
|
||||||
|
// InstallCalls gets all the calls that were made to Install.
|
||||||
|
// Check the length with:
|
||||||
|
//
|
||||||
|
// len(mockedInstaller.InstallCalls())
|
||||||
|
func (mock *InstallerMock) InstallCalls() []struct {
|
||||||
|
S string
|
||||||
|
} {
|
||||||
|
var calls []struct {
|
||||||
|
S string
|
||||||
|
}
|
||||||
|
mock.lockInstall.RLock()
|
||||||
|
calls = mock.calls.Install
|
||||||
|
mock.lockInstall.RUnlock()
|
||||||
|
return calls
|
||||||
|
}
|
||||||
251
cmd/nvidia-ctk-installer/toolkit/installer/installer_test.go
Normal file
251
cmd/nvidia-ctk-installer/toolkit/installer/installer_test.go
Normal file
@@ -0,0 +1,251 @@
|
|||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package installer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"io/fs"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestToolkitInstaller(t *testing.T) {
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
|
||||||
|
type contentCall struct {
|
||||||
|
wrapper string
|
||||||
|
path string
|
||||||
|
mode fs.FileMode
|
||||||
|
}
|
||||||
|
var contentCalls []contentCall
|
||||||
|
|
||||||
|
installer := &fileInstallerMock{
|
||||||
|
installFileFunc: func(s1, s2 string) (os.FileMode, error) {
|
||||||
|
return 0666, nil
|
||||||
|
},
|
||||||
|
installContentFunc: func(reader io.Reader, s string, fileMode fs.FileMode) error {
|
||||||
|
var b bytes.Buffer
|
||||||
|
if _, err := b.ReadFrom(reader); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
contents := contentCall{
|
||||||
|
wrapper: b.String(),
|
||||||
|
path: s,
|
||||||
|
mode: fileMode,
|
||||||
|
}
|
||||||
|
|
||||||
|
contentCalls = append(contentCalls, contents)
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
installSymlinkFunc: func(s1, s2 string) error {
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
}
|
||||||
|
installFile = installer.installFile
|
||||||
|
installContent = installer.installContent
|
||||||
|
installSymlink = installer.installSymlink
|
||||||
|
|
||||||
|
root := "/artifacts/test"
|
||||||
|
libraries := &lookup.LocatorMock{
|
||||||
|
LocateFunc: func(s string) ([]string, error) {
|
||||||
|
switch s {
|
||||||
|
case "libnvidia-container.so.1":
|
||||||
|
return []string{filepath.Join(root, "libnvidia-container.so.987.65.43")}, nil
|
||||||
|
case "libnvidia-container-go.so.1":
|
||||||
|
return []string{filepath.Join(root, "libnvidia-container-go.so.1.23.4")}, nil
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("%v not found", s)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
executables := &lookup.LocatorMock{
|
||||||
|
LocateFunc: func(s string) ([]string, error) {
|
||||||
|
switch s {
|
||||||
|
case "nvidia-container-runtime.cdi":
|
||||||
|
fallthrough
|
||||||
|
case "nvidia-container-runtime.legacy":
|
||||||
|
fallthrough
|
||||||
|
case "nvidia-container-runtime":
|
||||||
|
fallthrough
|
||||||
|
case "nvidia-ctk":
|
||||||
|
fallthrough
|
||||||
|
case "nvidia-container-cli":
|
||||||
|
fallthrough
|
||||||
|
case "nvidia-container-runtime-hook":
|
||||||
|
fallthrough
|
||||||
|
case "nvidia-cdi-hook":
|
||||||
|
return []string{filepath.Join(root, "usr/bin", s)}, nil
|
||||||
|
}
|
||||||
|
return nil, fmt.Errorf("%v not found", s)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
r := &artifactRoot{
|
||||||
|
libraries: libraries,
|
||||||
|
executables: executables,
|
||||||
|
}
|
||||||
|
|
||||||
|
createDirectory := &InstallerMock{
|
||||||
|
InstallFunc: func(c string) error {
|
||||||
|
return nil
|
||||||
|
},
|
||||||
|
}
|
||||||
|
i := ToolkitInstaller{
|
||||||
|
logger: logger,
|
||||||
|
artifactRoot: r,
|
||||||
|
ensureTargetDirectory: createDirectory,
|
||||||
|
}
|
||||||
|
|
||||||
|
err := i.Install("/foo/bar/baz")
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
require.ElementsMatch(t,
|
||||||
|
[]struct {
|
||||||
|
S string
|
||||||
|
}{
|
||||||
|
{"/foo/bar/baz"},
|
||||||
|
},
|
||||||
|
createDirectory.InstallCalls(),
|
||||||
|
)
|
||||||
|
|
||||||
|
require.ElementsMatch(t,
|
||||||
|
installer.installFileCalls(),
|
||||||
|
[]struct {
|
||||||
|
S1 string
|
||||||
|
S2 string
|
||||||
|
}{
|
||||||
|
{"/artifacts/test/libnvidia-container-go.so.1.23.4", "/foo/bar/baz/libnvidia-container-go.so.1.23.4"},
|
||||||
|
{"/artifacts/test/libnvidia-container.so.987.65.43", "/foo/bar/baz/libnvidia-container.so.987.65.43"},
|
||||||
|
{"/artifacts/test/usr/bin/nvidia-container-runtime.cdi", "/foo/bar/baz/nvidia-container-runtime.cdi.real"},
|
||||||
|
{"/artifacts/test/usr/bin/nvidia-container-runtime.legacy", "/foo/bar/baz/nvidia-container-runtime.legacy.real"},
|
||||||
|
{"/artifacts/test/usr/bin/nvidia-container-runtime", "/foo/bar/baz/nvidia-container-runtime.real"},
|
||||||
|
{"/artifacts/test/usr/bin/nvidia-ctk", "/foo/bar/baz/nvidia-ctk.real"},
|
||||||
|
{"/artifacts/test/usr/bin/nvidia-cdi-hook", "/foo/bar/baz/nvidia-cdi-hook.real"},
|
||||||
|
{"/artifacts/test/usr/bin/nvidia-container-cli", "/foo/bar/baz/nvidia-container-cli.real"},
|
||||||
|
{"/artifacts/test/usr/bin/nvidia-container-runtime-hook", "/foo/bar/baz/nvidia-container-runtime-hook.real"},
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
require.ElementsMatch(t,
|
||||||
|
installer.installSymlinkCalls(),
|
||||||
|
[]struct {
|
||||||
|
S1 string
|
||||||
|
S2 string
|
||||||
|
}{
|
||||||
|
{"libnvidia-container-go.so.1.23.4", "/foo/bar/baz/libnvidia-container-go.so.1"},
|
||||||
|
{"libnvidia-container.so.987.65.43", "/foo/bar/baz/libnvidia-container.so.1"},
|
||||||
|
{"nvidia-container-runtime-hook", "/foo/bar/baz/nvidia-container-toolkit"},
|
||||||
|
},
|
||||||
|
)
|
||||||
|
|
||||||
|
require.ElementsMatch(t,
|
||||||
|
contentCalls,
|
||||||
|
[]contentCall{
|
||||||
|
{
|
||||||
|
path: "/foo/bar/baz/nvidia-container-runtime",
|
||||||
|
mode: 0777,
|
||||||
|
wrapper: `#! /bin/sh
|
||||||
|
cat /proc/modules | grep -e "^nvidia " >/dev/null 2>&1
|
||||||
|
if [ "${?}" != "0" ]; then
|
||||||
|
echo "nvidia driver modules are not yet loaded, invoking runc directly"
|
||||||
|
exec runc "$@"
|
||||||
|
fi
|
||||||
|
NVIDIA_CTK_CONFIG_FILE_PATH=/foo/bar/baz/.config/nvidia-container-runtime/config.toml \
|
||||||
|
PATH=/foo/bar/baz:$PATH \
|
||||||
|
/foo/bar/baz/nvidia-container-runtime.real \
|
||||||
|
"$@"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
path: "/foo/bar/baz/nvidia-container-runtime.cdi",
|
||||||
|
mode: 0777,
|
||||||
|
wrapper: `#! /bin/sh
|
||||||
|
cat /proc/modules | grep -e "^nvidia " >/dev/null 2>&1
|
||||||
|
if [ "${?}" != "0" ]; then
|
||||||
|
echo "nvidia driver modules are not yet loaded, invoking runc directly"
|
||||||
|
exec runc "$@"
|
||||||
|
fi
|
||||||
|
NVIDIA_CTK_CONFIG_FILE_PATH=/foo/bar/baz/.config/nvidia-container-runtime/config.toml \
|
||||||
|
PATH=/foo/bar/baz:$PATH \
|
||||||
|
/foo/bar/baz/nvidia-container-runtime.cdi.real \
|
||||||
|
"$@"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
path: "/foo/bar/baz/nvidia-container-runtime.legacy",
|
||||||
|
mode: 0777,
|
||||||
|
wrapper: `#! /bin/sh
|
||||||
|
cat /proc/modules | grep -e "^nvidia " >/dev/null 2>&1
|
||||||
|
if [ "${?}" != "0" ]; then
|
||||||
|
echo "nvidia driver modules are not yet loaded, invoking runc directly"
|
||||||
|
exec runc "$@"
|
||||||
|
fi
|
||||||
|
NVIDIA_CTK_CONFIG_FILE_PATH=/foo/bar/baz/.config/nvidia-container-runtime/config.toml \
|
||||||
|
PATH=/foo/bar/baz:$PATH \
|
||||||
|
/foo/bar/baz/nvidia-container-runtime.legacy.real \
|
||||||
|
"$@"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
path: "/foo/bar/baz/nvidia-ctk",
|
||||||
|
mode: 0777,
|
||||||
|
wrapper: `#! /bin/sh
|
||||||
|
PATH=/foo/bar/baz:$PATH \
|
||||||
|
/foo/bar/baz/nvidia-ctk.real \
|
||||||
|
"$@"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
path: "/foo/bar/baz/nvidia-cdi-hook",
|
||||||
|
mode: 0777,
|
||||||
|
wrapper: `#! /bin/sh
|
||||||
|
PATH=/foo/bar/baz:$PATH \
|
||||||
|
/foo/bar/baz/nvidia-cdi-hook.real \
|
||||||
|
"$@"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
path: "/foo/bar/baz/nvidia-container-cli",
|
||||||
|
mode: 0777,
|
||||||
|
wrapper: `#! /bin/sh
|
||||||
|
LD_LIBRARY_PATH=/foo/bar/baz:$LD_LIBRARY_PATH \
|
||||||
|
PATH=/foo/bar/baz:$PATH \
|
||||||
|
/foo/bar/baz/nvidia-container-cli.real \
|
||||||
|
"$@"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
path: "/foo/bar/baz/nvidia-container-runtime-hook",
|
||||||
|
mode: 0777,
|
||||||
|
wrapper: `#! /bin/sh
|
||||||
|
NVIDIA_CTK_CONFIG_FILE_PATH=/foo/bar/baz/.config/nvidia-container-runtime/config.toml \
|
||||||
|
PATH=/foo/bar/baz:$PATH \
|
||||||
|
/foo/bar/baz/nvidia-container-runtime-hook.real \
|
||||||
|
"$@"
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
)
|
||||||
|
}
|
||||||
73
cmd/nvidia-ctk-installer/toolkit/installer/libraries.go
Normal file
73
cmd/nvidia-ctk-installer/toolkit/installer/libraries.go
Normal file
@@ -0,0 +1,73 @@
|
|||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package installer
|
||||||
|
|
||||||
|
import (
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
log "github.com/sirupsen/logrus"
|
||||||
|
)
|
||||||
|
|
||||||
|
// collectLibraries locates and installs the libraries that are part of
|
||||||
|
// the nvidia-container-toolkit.
|
||||||
|
// A predefined set of library candidates are considered, with the first one
|
||||||
|
// resulting in success being installed to the toolkit folder. The install process
|
||||||
|
// resolves the symlink for the library and copies the versioned library itself.
|
||||||
|
func (t *ToolkitInstaller) collectLibraries() ([]Installer, error) {
|
||||||
|
requiredLibraries := []string{
|
||||||
|
"libnvidia-container.so.1",
|
||||||
|
"libnvidia-container-go.so.1",
|
||||||
|
}
|
||||||
|
|
||||||
|
var installers []Installer
|
||||||
|
for _, l := range requiredLibraries {
|
||||||
|
libraryPath, err := t.artifactRoot.findLibrary(l)
|
||||||
|
if err != nil {
|
||||||
|
if t.ignoreErrors {
|
||||||
|
log.Errorf("Ignoring error: %v", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
installers = append(installers, library(libraryPath))
|
||||||
|
|
||||||
|
if filepath.Base(libraryPath) == l {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
link := symlink{
|
||||||
|
linkname: l,
|
||||||
|
target: filepath.Base(libraryPath),
|
||||||
|
}
|
||||||
|
installers = append(installers, link)
|
||||||
|
}
|
||||||
|
|
||||||
|
return installers, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type library string
|
||||||
|
|
||||||
|
// Install copies the library l to the destination folder.
|
||||||
|
// The same basename is used in the destination folder.
|
||||||
|
func (l library) Install(destinationDir string) error {
|
||||||
|
dest := filepath.Join(destinationDir, filepath.Base(string(l)))
|
||||||
|
|
||||||
|
_, err := installFile(string(l), dest)
|
||||||
|
return err
|
||||||
|
}
|
||||||
47
cmd/nvidia-ctk-installer/toolkit/installer/options.go
Normal file
47
cmd/nvidia-ctk-installer/toolkit/installer/options.go
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
/**
|
||||||
|
# SPDX-FileCopyrightText: Copyright (c) 2025 NVIDIA CORPORATION & AFFILIATES. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package installer
|
||||||
|
|
||||||
|
import "github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
|
||||||
|
type Option func(*ToolkitInstaller)
|
||||||
|
|
||||||
|
func WithLogger(logger logger.Interface) Option {
|
||||||
|
return func(ti *ToolkitInstaller) {
|
||||||
|
ti.logger = logger
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func WithArtifactRoot(artifactRoot *artifactRoot) Option {
|
||||||
|
return func(ti *ToolkitInstaller) {
|
||||||
|
ti.artifactRoot = artifactRoot
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func WithIgnoreErrors(ignoreErrors bool) Option {
|
||||||
|
return func(ti *ToolkitInstaller) {
|
||||||
|
ti.ignoreErrors = ignoreErrors
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithSourceRoot sets the root directory for locating artifacts to be installed.
|
||||||
|
func WithSourceRoot(sourceRoot string) Option {
|
||||||
|
return func(ti *ToolkitInstaller) {
|
||||||
|
ti.sourceRoot = sourceRoot
|
||||||
|
}
|
||||||
|
}
|
||||||
40
cmd/nvidia-ctk-installer/toolkit/options.go
Normal file
40
cmd/nvidia-ctk-installer/toolkit/options.go
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package toolkit
|
||||||
|
|
||||||
|
import "github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
|
||||||
|
// An Option provides a mechanism to configure an Installer.
|
||||||
|
type Option func(*Installer)
|
||||||
|
|
||||||
|
func WithLogger(logger logger.Interface) Option {
|
||||||
|
return func(i *Installer) {
|
||||||
|
i.logger = logger
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func WithToolkitRoot(toolkitRoot string) Option {
|
||||||
|
return func(i *Installer) {
|
||||||
|
i.toolkitRoot = toolkitRoot
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func WithSourceRoot(sourceRoot string) Option {
|
||||||
|
return func(i *Installer) {
|
||||||
|
i.sourceRoot = sourceRoot
|
||||||
|
}
|
||||||
|
}
|
||||||
534
cmd/nvidia-ctk-installer/toolkit/toolkit.go
Normal file
534
cmd/nvidia-ctk-installer/toolkit/toolkit.go
Normal file
@@ -0,0 +1,534 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2021, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package toolkit
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
"tags.cncf.io/container-device-interface/pkg/cdi"
|
||||||
|
"tags.cncf.io/container-device-interface/pkg/parser"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk-installer/toolkit/installer"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/system/nvdevices"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi"
|
||||||
|
transformroot "github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/transform/root"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
// DefaultNvidiaDriverRoot specifies the default NVIDIA driver run directory
|
||||||
|
DefaultNvidiaDriverRoot = "/run/nvidia/driver"
|
||||||
|
)
|
||||||
|
|
||||||
|
type cdiOptions struct {
|
||||||
|
Enabled bool
|
||||||
|
outputDir string
|
||||||
|
kind string
|
||||||
|
vendor string
|
||||||
|
class string
|
||||||
|
}
|
||||||
|
|
||||||
|
type Options struct {
|
||||||
|
DriverRoot string
|
||||||
|
DevRoot string
|
||||||
|
DriverRootCtrPath string
|
||||||
|
DevRootCtrPath string
|
||||||
|
|
||||||
|
ContainerRuntimeMode string
|
||||||
|
ContainerRuntimeDebug string
|
||||||
|
ContainerRuntimeLogLevel string
|
||||||
|
|
||||||
|
ContainerRuntimeModesCdiDefaultKind string
|
||||||
|
ContainerRuntimeModesCDIAnnotationPrefixes []string
|
||||||
|
|
||||||
|
ContainerRuntimeRuntimes []string
|
||||||
|
|
||||||
|
ContainerRuntimeHookSkipModeDetection bool
|
||||||
|
|
||||||
|
ContainerCLIDebug string
|
||||||
|
|
||||||
|
// CDI stores the CDI options for the toolkit.
|
||||||
|
CDI cdiOptions
|
||||||
|
|
||||||
|
createDeviceNodes []string
|
||||||
|
|
||||||
|
acceptNVIDIAVisibleDevicesWhenUnprivileged bool
|
||||||
|
acceptNVIDIAVisibleDevicesAsVolumeMounts bool
|
||||||
|
|
||||||
|
ignoreErrors bool
|
||||||
|
|
||||||
|
optInFeatures []string
|
||||||
|
}
|
||||||
|
|
||||||
|
func Flags(opts *Options) []cli.Flag {
|
||||||
|
flags := []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "driver-root",
|
||||||
|
Aliases: []string{"nvidia-driver-root"},
|
||||||
|
Value: DefaultNvidiaDriverRoot,
|
||||||
|
Destination: &opts.DriverRoot,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_DRIVER_ROOT", "DRIVER_ROOT"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "driver-root-ctr-path",
|
||||||
|
Value: DefaultNvidiaDriverRoot,
|
||||||
|
Destination: &opts.DriverRootCtrPath,
|
||||||
|
Sources: cli.EnvVars("DRIVER_ROOT_CTR_PATH"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "dev-root",
|
||||||
|
Usage: "Specify the root where `/dev` is located. If this is not specified, the driver-root is assumed.",
|
||||||
|
Destination: &opts.DevRoot,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_DEV_ROOT", "DEV_ROOT"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "dev-root-ctr-path",
|
||||||
|
Usage: "Specify the root where `/dev` is located in the container. If this is not specified, the driver-root-ctr-path is assumed.",
|
||||||
|
Destination: &opts.DevRootCtrPath,
|
||||||
|
Sources: cli.EnvVars("DEV_ROOT_CTR_PATH"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-container-runtime.debug",
|
||||||
|
Aliases: []string{"nvidia-container-runtime-debug"},
|
||||||
|
Usage: "Specify the location of the debug log file for the NVIDIA Container Runtime",
|
||||||
|
Destination: &opts.ContainerRuntimeDebug,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CONTAINER_RUNTIME_DEBUG"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-container-runtime.log-level",
|
||||||
|
Aliases: []string{"nvidia-container-runtime-debug-log-level"},
|
||||||
|
Destination: &opts.ContainerRuntimeLogLevel,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CONTAINER_RUNTIME_LOG_LEVEL"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-container-runtime.mode",
|
||||||
|
Aliases: []string{"nvidia-container-runtime-mode"},
|
||||||
|
Destination: &opts.ContainerRuntimeMode,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CONTAINER_RUNTIME_MODE"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-container-runtime.modes.cdi.default-kind",
|
||||||
|
Destination: &opts.ContainerRuntimeModesCdiDefaultKind,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CONTAINER_RUNTIME_MODES_CDI_DEFAULT_KIND"),
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "nvidia-container-runtime.modes.cdi.annotation-prefixes",
|
||||||
|
Destination: &opts.ContainerRuntimeModesCDIAnnotationPrefixes,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CONTAINER_RUNTIME_MODES_CDI_ANNOTATION_PREFIXES"),
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "nvidia-container-runtime.runtimes",
|
||||||
|
Destination: &opts.ContainerRuntimeRuntimes,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CONTAINER_RUNTIME_RUNTIMES"),
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "nvidia-container-runtime-hook.skip-mode-detection",
|
||||||
|
Value: true,
|
||||||
|
Destination: &opts.ContainerRuntimeHookSkipModeDetection,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CONTAINER_RUNTIME_HOOK_SKIP_MODE_DETECTION"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-container-cli.debug",
|
||||||
|
Aliases: []string{"nvidia-container-cli-debug"},
|
||||||
|
Usage: "Specify the location of the debug log file for the NVIDIA Container CLI",
|
||||||
|
Destination: &opts.ContainerCLIDebug,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CONTAINER_CLI_DEBUG"),
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "accept-nvidia-visible-devices-envvar-when-unprivileged",
|
||||||
|
Usage: "Set the accept-nvidia-visible-devices-envvar-when-unprivileged config option",
|
||||||
|
Value: true,
|
||||||
|
Destination: &opts.acceptNVIDIAVisibleDevicesWhenUnprivileged,
|
||||||
|
Sources: cli.EnvVars("ACCEPT_NVIDIA_VISIBLE_DEVICES_ENVVAR_WHEN_UNPRIVILEGED"),
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "accept-nvidia-visible-devices-as-volume-mounts",
|
||||||
|
Usage: "Set the accept-nvidia-visible-devices-as-volume-mounts config option",
|
||||||
|
Destination: &opts.acceptNVIDIAVisibleDevicesAsVolumeMounts,
|
||||||
|
Sources: cli.EnvVars("ACCEPT_NVIDIA_VISIBLE_DEVICES_AS_VOLUME_MOUNTS"),
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "cdi-enabled",
|
||||||
|
Aliases: []string{"enable-cdi"},
|
||||||
|
Usage: "enable the generation of a CDI specification",
|
||||||
|
Destination: &opts.CDI.Enabled,
|
||||||
|
Sources: cli.EnvVars("CDI_ENABLED", "ENABLE_CDI"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "cdi-output-dir",
|
||||||
|
Usage: "the directory where the CDI output files are to be written. If this is set to '', no CDI specification is generated.",
|
||||||
|
Value: "/var/run/cdi",
|
||||||
|
Destination: &opts.CDI.outputDir,
|
||||||
|
Sources: cli.EnvVars("CDI_OUTPUT_DIR"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "cdi-kind",
|
||||||
|
Usage: "the vendor string to use for the generated CDI specification",
|
||||||
|
Value: "management.nvidia.com/gpu",
|
||||||
|
Destination: &opts.CDI.kind,
|
||||||
|
Sources: cli.EnvVars("CDI_KIND"),
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "ignore-errors",
|
||||||
|
Usage: "ignore errors when installing the NVIDIA Container toolkit. This is used for testing purposes only.",
|
||||||
|
Hidden: true,
|
||||||
|
Destination: &opts.ignoreErrors,
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "create-device-nodes",
|
||||||
|
Usage: "(Only applicable with --cdi-enabled) specifies which device nodes should be created. If any one of the options is set to '' or 'none', no device nodes will be created.",
|
||||||
|
Value: []string{"control"},
|
||||||
|
Destination: &opts.createDeviceNodes,
|
||||||
|
Sources: cli.EnvVars("CREATE_DEVICE_NODES"),
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "opt-in-features",
|
||||||
|
Hidden: true,
|
||||||
|
Destination: &opts.optInFeatures,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CONTAINER_TOOLKIT_OPT_IN_FEATURES"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return flags
|
||||||
|
}
|
||||||
|
|
||||||
|
// An Installer is used to install the NVIDIA Container Toolkit from the toolkit container.
|
||||||
|
type Installer struct {
|
||||||
|
logger logger.Interface
|
||||||
|
|
||||||
|
sourceRoot string
|
||||||
|
// toolkitRoot specifies the destination path at which the toolkit is installed.
|
||||||
|
toolkitRoot string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewInstaller creates an installer for the NVIDIA Container Toolkit.
|
||||||
|
func NewInstaller(opts ...Option) *Installer {
|
||||||
|
i := &Installer{}
|
||||||
|
for _, opt := range opts {
|
||||||
|
opt(i)
|
||||||
|
}
|
||||||
|
|
||||||
|
if i.logger == nil {
|
||||||
|
i.logger = logger.New()
|
||||||
|
}
|
||||||
|
|
||||||
|
return i
|
||||||
|
}
|
||||||
|
|
||||||
|
// ValidateOptions checks whether the specified options are valid
|
||||||
|
func (t *Installer) ValidateOptions(opts *Options) error {
|
||||||
|
if t == nil {
|
||||||
|
return fmt.Errorf("toolkit installer is not initilized")
|
||||||
|
}
|
||||||
|
if t.toolkitRoot == "" {
|
||||||
|
return fmt.Errorf("invalid --toolkit-root option: %v", t.toolkitRoot)
|
||||||
|
}
|
||||||
|
|
||||||
|
vendor, class := parser.ParseQualifier(opts.CDI.kind)
|
||||||
|
if err := parser.ValidateVendorName(vendor); err != nil {
|
||||||
|
return fmt.Errorf("invalid CDI vendor name: %v", err)
|
||||||
|
}
|
||||||
|
if err := parser.ValidateClassName(class); err != nil {
|
||||||
|
return fmt.Errorf("invalid CDI class name: %v", err)
|
||||||
|
}
|
||||||
|
opts.CDI.vendor = vendor
|
||||||
|
opts.CDI.class = class
|
||||||
|
|
||||||
|
if opts.CDI.Enabled && opts.CDI.outputDir == "" {
|
||||||
|
t.logger.Warning("Skipping CDI spec generation (no output directory specified)")
|
||||||
|
opts.CDI.Enabled = false
|
||||||
|
}
|
||||||
|
|
||||||
|
isDisabled := false
|
||||||
|
for _, mode := range opts.createDeviceNodes {
|
||||||
|
if mode != "" && mode != "none" && mode != "control" {
|
||||||
|
return fmt.Errorf("invalid --create-device-nodes value: %v", mode)
|
||||||
|
}
|
||||||
|
if mode == "" || mode == "none" {
|
||||||
|
isDisabled = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !opts.CDI.Enabled && !isDisabled {
|
||||||
|
t.logger.Info("disabling device node creation since --cdi-enabled=false")
|
||||||
|
isDisabled = true
|
||||||
|
}
|
||||||
|
if isDisabled {
|
||||||
|
opts.createDeviceNodes = []string{}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Install installs the components of the NVIDIA container toolkit.
|
||||||
|
// Any existing installation is removed.
|
||||||
|
func (t *Installer) Install(cli *cli.Command, opts *Options) error {
|
||||||
|
if t == nil {
|
||||||
|
return fmt.Errorf("toolkit installer is not initilized")
|
||||||
|
}
|
||||||
|
t.logger.Infof("Installing NVIDIA container toolkit to '%v'", t.toolkitRoot)
|
||||||
|
|
||||||
|
t.logger.Infof("Removing existing NVIDIA container toolkit installation")
|
||||||
|
err := os.RemoveAll(t.toolkitRoot)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error removing toolkit directory: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error removing toolkit directory: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create a toolkit installer to actually install the toolkit components.
|
||||||
|
toolkit, err := installer.New(
|
||||||
|
installer.WithLogger(t.logger),
|
||||||
|
installer.WithSourceRoot(t.sourceRoot),
|
||||||
|
installer.WithIgnoreErrors(opts.ignoreErrors),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
if !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("could not create toolkit installer: %w", err)
|
||||||
|
}
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("could not create toolkit installer: %w", err))
|
||||||
|
}
|
||||||
|
if err := toolkit.Install(t.toolkitRoot); err != nil {
|
||||||
|
if !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("could not install toolkit components: %w", err)
|
||||||
|
}
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("could not install toolkit components: %w", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
err = t.installToolkitConfig(cli, opts, toolkit.ConfigFilePath(t.toolkitRoot))
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error installing NVIDIA container toolkit config: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error installing NVIDIA container toolkit config: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
err = t.createDeviceNodes(opts)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error creating device nodes: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error creating device nodes: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
nvidiaCDIHookPath := filepath.Join(t.toolkitRoot, "nvidia-cdi-hook")
|
||||||
|
err = t.generateCDISpec(opts, nvidiaCDIHookPath)
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("error generating CDI specification: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("error generating CDI specification: %v", err))
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// installToolkitConfig installs the config file for the NVIDIA container toolkit ensuring
|
||||||
|
// that the settings are updated to match the desired install and nvidia driver directories.
|
||||||
|
func (t *Installer) installToolkitConfig(c *cli.Command, opts *Options, toolkitConfigPath string) error {
|
||||||
|
|
||||||
|
t.logger.Infof("Installing NVIDIA container toolkit config '%v'", toolkitConfigPath)
|
||||||
|
|
||||||
|
err := t.createDirectories(filepath.Dir(toolkitConfigPath))
|
||||||
|
if err != nil && !opts.ignoreErrors {
|
||||||
|
return fmt.Errorf("could not create required directories: %v", err)
|
||||||
|
} else if err != nil {
|
||||||
|
t.logger.Errorf("Ignoring error: %v", fmt.Errorf("could not create required directories: %v", err))
|
||||||
|
}
|
||||||
|
nvidiaContainerCliExecutablePath := filepath.Join(t.toolkitRoot, "nvidia-container-cli")
|
||||||
|
nvidiaCTKPath := filepath.Join(t.toolkitRoot, "nvidia-ctk")
|
||||||
|
nvidiaContainerRuntimeHookPath := filepath.Join(t.toolkitRoot, "nvidia-container-runtime-hook")
|
||||||
|
|
||||||
|
cfg, err := config.New()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("could not open source config file: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
targetConfig, err := os.Create(toolkitConfigPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("could not create target config file: %v", err)
|
||||||
|
}
|
||||||
|
defer targetConfig.Close()
|
||||||
|
|
||||||
|
// Read the ldconfig path from the config as this may differ per platform
|
||||||
|
// On ubuntu-based systems this ends in `.real`
|
||||||
|
ldconfigPath := fmt.Sprintf("%s", cfg.GetDefault("nvidia-container-cli.ldconfig", "/sbin/ldconfig"))
|
||||||
|
// Use the driver run root as the root:
|
||||||
|
driverLdconfigPath := config.NormalizeLDConfigPath("@" + filepath.Join(opts.DriverRoot, strings.TrimPrefix(ldconfigPath, "@/")))
|
||||||
|
|
||||||
|
configValues := map[string]interface{}{
|
||||||
|
// Set the options in the root toml table
|
||||||
|
"accept-nvidia-visible-devices-envvar-when-unprivileged": opts.acceptNVIDIAVisibleDevicesWhenUnprivileged,
|
||||||
|
"accept-nvidia-visible-devices-as-volume-mounts": opts.acceptNVIDIAVisibleDevicesAsVolumeMounts,
|
||||||
|
// Set the nvidia-container-cli options
|
||||||
|
"nvidia-container-cli.root": opts.DriverRoot,
|
||||||
|
"nvidia-container-cli.path": nvidiaContainerCliExecutablePath,
|
||||||
|
"nvidia-container-cli.ldconfig": driverLdconfigPath,
|
||||||
|
// Set nvidia-ctk options
|
||||||
|
"nvidia-ctk.path": nvidiaCTKPath,
|
||||||
|
// Set the nvidia-container-runtime-hook options
|
||||||
|
"nvidia-container-runtime-hook.path": nvidiaContainerRuntimeHookPath,
|
||||||
|
"nvidia-container-runtime-hook.skip-mode-detection": opts.ContainerRuntimeHookSkipModeDetection,
|
||||||
|
}
|
||||||
|
|
||||||
|
toolkitRuntimeList := opts.ContainerRuntimeRuntimes
|
||||||
|
if len(toolkitRuntimeList) > 0 {
|
||||||
|
configValues["nvidia-container-runtime.runtimes"] = toolkitRuntimeList
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, optInFeature := range opts.optInFeatures {
|
||||||
|
configValues["features."+optInFeature] = true
|
||||||
|
}
|
||||||
|
|
||||||
|
for key, value := range configValues {
|
||||||
|
cfg.Set(key, value)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set the optional config options
|
||||||
|
optionalConfigValues := map[string]interface{}{
|
||||||
|
"nvidia-container-runtime.debug": opts.ContainerRuntimeDebug,
|
||||||
|
"nvidia-container-runtime.log-level": opts.ContainerRuntimeLogLevel,
|
||||||
|
"nvidia-container-runtime.mode": opts.ContainerRuntimeMode,
|
||||||
|
"nvidia-container-runtime.modes.cdi.annotation-prefixes": opts.ContainerRuntimeModesCDIAnnotationPrefixes,
|
||||||
|
"nvidia-container-runtime.modes.cdi.default-kind": opts.ContainerRuntimeModesCdiDefaultKind,
|
||||||
|
"nvidia-container-runtime.runtimes": opts.ContainerRuntimeRuntimes,
|
||||||
|
"nvidia-container-cli.debug": opts.ContainerCLIDebug,
|
||||||
|
}
|
||||||
|
|
||||||
|
for key, value := range optionalConfigValues {
|
||||||
|
if !c.IsSet(key) {
|
||||||
|
t.logger.Infof("Skipping unset option: %v", key)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if value == nil {
|
||||||
|
t.logger.Infof("Skipping option with nil value: %v", key)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
switch v := value.(type) {
|
||||||
|
case string:
|
||||||
|
if v == "" {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
case cli.StringSlice:
|
||||||
|
if len(v.Value()) == 0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
value = v.Value()
|
||||||
|
default:
|
||||||
|
t.logger.Warningf("Unexpected type for option %v=%v: %T", key, value, v)
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg.Set(key, value)
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := cfg.WriteTo(targetConfig); err != nil {
|
||||||
|
return fmt.Errorf("error writing config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
os.Stdout.WriteString("Using config:\n")
|
||||||
|
if _, err = cfg.WriteTo(os.Stdout); err != nil {
|
||||||
|
t.logger.Warningf("Failed to output config to STDOUT: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *Installer) createDirectories(dir ...string) error {
|
||||||
|
for _, d := range dir {
|
||||||
|
t.logger.Infof("Creating directory '%v'", d)
|
||||||
|
err := os.MkdirAll(d, 0755)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error creating directory: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t *Installer) createDeviceNodes(opts *Options) error {
|
||||||
|
modes := opts.createDeviceNodes
|
||||||
|
if len(modes) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
devices, err := nvdevices.New(
|
||||||
|
nvdevices.WithDevRoot(opts.DevRootCtrPath),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create library: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, mode := range modes {
|
||||||
|
t.logger.Infof("Creating %v device nodes at %v", mode, opts.DevRootCtrPath)
|
||||||
|
if mode != "control" {
|
||||||
|
t.logger.Warningf("Unrecognised device mode: %v", mode)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if err := devices.CreateNVIDIAControlDevices(); err != nil {
|
||||||
|
return fmt.Errorf("failed to create control device nodes: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// generateCDISpec generates a CDI spec for use in management containers
|
||||||
|
func (t *Installer) generateCDISpec(opts *Options, nvidiaCDIHookPath string) error {
|
||||||
|
if !opts.CDI.Enabled {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
t.logger.Info("Generating CDI spec for management containers")
|
||||||
|
cdilib, err := nvcdi.New(
|
||||||
|
nvcdi.WithLogger(t.logger),
|
||||||
|
nvcdi.WithMode(nvcdi.ModeManagement),
|
||||||
|
nvcdi.WithDriverRoot(opts.DriverRootCtrPath),
|
||||||
|
nvcdi.WithDevRoot(opts.DevRootCtrPath),
|
||||||
|
nvcdi.WithNVIDIACDIHookPath(nvidiaCDIHookPath),
|
||||||
|
nvcdi.WithVendor(opts.CDI.vendor),
|
||||||
|
nvcdi.WithClass(opts.CDI.class),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create CDI library for management containers: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
spec, err := cdilib.GetSpec()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to genereate CDI spec for management containers: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
transformer := transformroot.NewDriverTransformer(
|
||||||
|
transformroot.WithDriverRoot(opts.DriverRootCtrPath),
|
||||||
|
transformroot.WithTargetDriverRoot(opts.DriverRoot),
|
||||||
|
transformroot.WithDevRoot(opts.DevRootCtrPath),
|
||||||
|
transformroot.WithTargetDevRoot(opts.DevRoot),
|
||||||
|
)
|
||||||
|
if err := transformer.Transform(spec.Raw()); err != nil {
|
||||||
|
return fmt.Errorf("failed to transform driver root in CDI spec: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
name, err := cdi.GenerateNameForSpec(spec.Raw())
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to generate CDI name for management containers: %v", err)
|
||||||
|
}
|
||||||
|
err = spec.Save(filepath.Join(opts.CDI.outputDir, name))
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to save CDI spec for management containers: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
232
cmd/nvidia-ctk-installer/toolkit/toolkit_test.go
Normal file
232
cmd/nvidia-ctk-installer/toolkit/toolkit_test.go
Normal file
@@ -0,0 +1,232 @@
|
|||||||
|
/**
|
||||||
|
# Copyright 2024 NVIDIA CORPORATION
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package toolkit
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup/symlinks"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/test"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestInstall(t *testing.T) {
|
||||||
|
t.Setenv("__NVCT_TESTING_DEVICES_ARE_FILES", "true")
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
|
|
||||||
|
moduleRoot, err := test.GetModuleRoot()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
artifactRoot := filepath.Join(moduleRoot, "testdata", "installer", "artifacts")
|
||||||
|
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
hostRoot string
|
||||||
|
packageType string
|
||||||
|
cdiEnabled bool
|
||||||
|
expectedError error
|
||||||
|
expectedCdiSpec string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
hostRoot: "rootfs-empty",
|
||||||
|
packageType: "deb",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
hostRoot: "rootfs-empty",
|
||||||
|
packageType: "rpm",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
hostRoot: "rootfs-empty",
|
||||||
|
packageType: "deb",
|
||||||
|
cdiEnabled: true,
|
||||||
|
expectedError: fmt.Errorf("no NVIDIA device nodes found"),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
hostRoot: "rootfs-1",
|
||||||
|
packageType: "deb",
|
||||||
|
cdiEnabled: true,
|
||||||
|
expectedCdiSpec: `---
|
||||||
|
cdiVersion: 0.5.0
|
||||||
|
kind: example.com/class
|
||||||
|
devices:
|
||||||
|
- name: all
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: /host/driver/root/dev/nvidia0
|
||||||
|
- path: /dev/nvidiactl
|
||||||
|
hostPath: /host/driver/root/dev/nvidiactl
|
||||||
|
- path: /dev/nvidia-caps-imex-channels/channel0
|
||||||
|
hostPath: /host/driver/root/dev/nvidia-caps-imex-channels/channel0
|
||||||
|
- path: /dev/nvidia-caps-imex-channels/channel1
|
||||||
|
hostPath: /host/driver/root/dev/nvidia-caps-imex-channels/channel1
|
||||||
|
- path: /dev/nvidia-caps-imex-channels/channel2047
|
||||||
|
hostPath: /host/driver/root/dev/nvidia-caps-imex-channels/channel2047
|
||||||
|
containerEdits:
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_LIBCUDA_DIR=/lib/x86_64-linux-gnu
|
||||||
|
- NVIDIA_VISIBLE_DEVICES=void
|
||||||
|
hooks:
|
||||||
|
- hookName: createContainer
|
||||||
|
path: {{ .toolkitRoot }}/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- create-symlinks
|
||||||
|
- --link
|
||||||
|
- libcuda.so.1::/lib/x86_64-linux-gnu/libcuda.so
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
- hookName: createContainer
|
||||||
|
path: {{ .toolkitRoot }}/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- create-soname-symlinks
|
||||||
|
- --folder
|
||||||
|
- /lib/x86_64-linux-gnu
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
- hookName: createContainer
|
||||||
|
path: {{ .toolkitRoot }}/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- update-ldcache
|
||||||
|
- --folder
|
||||||
|
- /lib/x86_64-linux-gnu
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
mounts:
|
||||||
|
- hostPath: /host/driver/root/lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
containerPath: /lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
options:
|
||||||
|
- ro
|
||||||
|
- nosuid
|
||||||
|
- nodev
|
||||||
|
- rbind
|
||||||
|
- rprivate
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
// hostRoot := filepath.Join(moduleRoot, "testdata", "lookup", tc.hostRoot)
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
testRoot := t.TempDir()
|
||||||
|
toolkitRoot := filepath.Join(testRoot, "toolkit-test")
|
||||||
|
cdiOutputDir := filepath.Join(moduleRoot, "toolkit-test", "/var/cdi")
|
||||||
|
sourceRoot := filepath.Join(artifactRoot, tc.packageType)
|
||||||
|
options := Options{
|
||||||
|
DriverRoot: "/host/driver/root",
|
||||||
|
DriverRootCtrPath: filepath.Join(moduleRoot, "testdata", "lookup", tc.hostRoot),
|
||||||
|
CDI: cdiOptions{
|
||||||
|
Enabled: tc.cdiEnabled,
|
||||||
|
outputDir: cdiOutputDir,
|
||||||
|
kind: "example.com/class",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
ti := NewInstaller(
|
||||||
|
WithLogger(logger),
|
||||||
|
WithToolkitRoot(toolkitRoot),
|
||||||
|
WithSourceRoot(sourceRoot),
|
||||||
|
)
|
||||||
|
require.NoError(t, ti.ValidateOptions(&options))
|
||||||
|
|
||||||
|
err := ti.Install(&cli.Command{}, &options)
|
||||||
|
if tc.expectedError == nil {
|
||||||
|
require.NoError(t, err)
|
||||||
|
} else {
|
||||||
|
require.Contains(t, err.Error(), tc.expectedError.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
require.DirExists(t, toolkitRoot)
|
||||||
|
requireSymlink(t, toolkitRoot, "libnvidia-container.so.1", "libnvidia-container.so.99.88.77")
|
||||||
|
requireSymlink(t, toolkitRoot, "libnvidia-container-go.so.1", "libnvidia-container-go.so.99.88.77")
|
||||||
|
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-cdi-hook")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-container-cli")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-container-runtime")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-container-runtime-hook")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-container-runtime.cdi")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-container-runtime.legacy")
|
||||||
|
requireWrappedExecutable(t, toolkitRoot, "nvidia-ctk")
|
||||||
|
|
||||||
|
requireSymlink(t, toolkitRoot, "nvidia-container-toolkit", "nvidia-container-runtime-hook")
|
||||||
|
|
||||||
|
// TODO: Add checks for wrapper contents
|
||||||
|
// grep -q -E "nvidia driver modules are not yet loaded, invoking runc directly" "${shared_dir}/usr/local/nvidia/toolkit/nvidia-container-runtime"
|
||||||
|
// grep -q -E "exec runc \".@\"" "${shared_dir}/usr/local/nvidia/toolkit/nvidia-container-runtime"
|
||||||
|
|
||||||
|
require.DirExists(t, filepath.Join(toolkitRoot, ".config"))
|
||||||
|
require.DirExists(t, filepath.Join(toolkitRoot, ".config", "nvidia-container-runtime"))
|
||||||
|
require.FileExists(t, filepath.Join(toolkitRoot, ".config", "nvidia-container-runtime", "config.toml"))
|
||||||
|
|
||||||
|
cfgToml, err := config.New(config.WithConfigFile(filepath.Join(toolkitRoot, ".config", "nvidia-container-runtime", "config.toml")))
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
cfg, err := cfgToml.Config()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
// Ensure that the config file has the required contents.
|
||||||
|
// TODO: Add checks for additional config options.
|
||||||
|
require.Equal(t, "/host/driver/root", cfg.NVIDIAContainerCLIConfig.Root)
|
||||||
|
require.Equal(t, "@/host/driver/root/sbin/ldconfig", string(cfg.NVIDIAContainerCLIConfig.Ldconfig))
|
||||||
|
require.EqualValues(t, filepath.Join(toolkitRoot, "nvidia-container-cli"), cfg.NVIDIAContainerCLIConfig.Path)
|
||||||
|
require.EqualValues(t, filepath.Join(toolkitRoot, "nvidia-ctk"), cfg.NVIDIACTKConfig.Path)
|
||||||
|
|
||||||
|
if len(tc.expectedCdiSpec) > 0 {
|
||||||
|
cdiSpecFile := filepath.Join(cdiOutputDir, "example.com-class.yaml")
|
||||||
|
require.FileExists(t, cdiSpecFile)
|
||||||
|
info, err := os.Stat(cdiSpecFile)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.NotZero(t, info.Mode()&0004)
|
||||||
|
contents, err := os.ReadFile(cdiSpecFile)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, strings.ReplaceAll(tc.expectedCdiSpec, "{{ .toolkitRoot }}", toolkitRoot), string(contents))
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func requireWrappedExecutable(t *testing.T, toolkitRoot string, expectedExecutable string) {
|
||||||
|
requireExecutable(t, toolkitRoot, expectedExecutable)
|
||||||
|
requireExecutable(t, toolkitRoot, expectedExecutable+".real")
|
||||||
|
}
|
||||||
|
|
||||||
|
func requireExecutable(t *testing.T, toolkitRoot string, expectedExecutable string) {
|
||||||
|
executable := filepath.Join(toolkitRoot, expectedExecutable)
|
||||||
|
require.FileExists(t, executable)
|
||||||
|
info, err := os.Lstat(executable)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Zero(t, info.Mode()&os.ModeSymlink)
|
||||||
|
require.NotZero(t, info.Mode()&0111)
|
||||||
|
}
|
||||||
|
|
||||||
|
func requireSymlink(t *testing.T, toolkitRoot string, expectedLink string, expectedTarget string) {
|
||||||
|
link := filepath.Join(toolkitRoot, expectedLink)
|
||||||
|
require.FileExists(t, link)
|
||||||
|
target, err := symlinks.Resolve(link)
|
||||||
|
require.NoError(t, err)
|
||||||
|
require.Equal(t, expectedTarget, target)
|
||||||
|
}
|
||||||
@@ -16,9 +16,34 @@ nvidia-ctk runtime configure --set-as-default
|
|||||||
will ensure that the NVIDIA Container Runtime is added as the default runtime to the default container
|
will ensure that the NVIDIA Container Runtime is added as the default runtime to the default container
|
||||||
engine.
|
engine.
|
||||||
|
|
||||||
|
## Configure the NVIDIA Container Toolkit
|
||||||
|
|
||||||
|
The `config` command of the `nvidia-ctk` CLI allows a user to display and manipulate the NVIDIA Container Toolkit
|
||||||
|
configuration.
|
||||||
|
|
||||||
|
For example, running the following command:
|
||||||
|
```bash
|
||||||
|
nvidia-ctk config default
|
||||||
|
```
|
||||||
|
will display the default config for the detected platform.
|
||||||
|
|
||||||
|
Whereas
|
||||||
|
```bash
|
||||||
|
nvidia-ctk config
|
||||||
|
```
|
||||||
|
will display the effective NVIDIA Container Toolkit config using the configured config file, and running:
|
||||||
|
|
||||||
|
Individual config options can be set by specifying these are key-value pairs to the `--set` argument:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
nvidia-ctk config --set nvidia-container-cli.no-cgroups=true
|
||||||
|
```
|
||||||
|
|
||||||
|
By default, all commands output to `STDOUT`, but specifying the `--output` flag writes the config to the specified file.
|
||||||
|
|
||||||
### Generate CDI specifications
|
### Generate CDI specifications
|
||||||
|
|
||||||
The [Container Device Interface (CDI)](https://github.com/container-orchestrated-devices/container-device-interface) provides
|
The [Container Device Interface (CDI)](https://tags.cncf.io/container-device-interface) provides
|
||||||
a vendor-agnostic mechanism to make arbitrary devices accessible in containerized environments. To allow NVIDIA devices to be
|
a vendor-agnostic mechanism to make arbitrary devices accessible in containerized environments. To allow NVIDIA devices to be
|
||||||
used in these environments, the NVIDIA Container Toolkit CLI includes functionality to generate a CDI specification for the
|
used in these environments, the NVIDIA Container Toolkit CLI includes functionality to generate a CDI specification for the
|
||||||
available NVIDIA GPUs in a system.
|
available NVIDIA GPUs in a system.
|
||||||
|
|||||||
@@ -17,18 +17,20 @@
|
|||||||
package cdi
|
package cdi
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi/generate"
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi/generate"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi/list"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi/transform"
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi/transform"
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type command struct {
|
type command struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCommand constructs an info command with the specified logger
|
// NewCommand constructs an info command with the specified logger
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
c := command{
|
c := command{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
@@ -43,9 +45,10 @@ func (m command) build() *cli.Command {
|
|||||||
Usage: "Provide tools for interacting with Container Device Interface specifications",
|
Usage: "Provide tools for interacting with Container Device Interface specifications",
|
||||||
}
|
}
|
||||||
|
|
||||||
hook.Subcommands = []*cli.Command{
|
hook.Commands = []*cli.Command{
|
||||||
generate.NewCommand(m.logger),
|
generate.NewCommand(m.logger),
|
||||||
transform.NewCommand(m.logger),
|
transform.NewCommand(m.logger),
|
||||||
|
list.NewCommand(m.logger),
|
||||||
}
|
}
|
||||||
|
|
||||||
return &hook
|
return &hook
|
||||||
|
|||||||
@@ -17,19 +17,23 @@
|
|||||||
package generate
|
package generate
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/discover"
|
"github.com/urfave/cli/v3"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/edits"
|
cdi "tags.cncf.io/container-device-interface/pkg/parser"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/go-nvml/pkg/nvml"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/platform-support/tegra/csv"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi"
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/spec"
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/spec"
|
||||||
"github.com/container-orchestrated-devices/container-device-interface/pkg/cdi"
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/transform"
|
||||||
specs "github.com/container-orchestrated-devices/container-device-interface/specs-go"
|
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@@ -37,22 +41,38 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type command struct {
|
type command struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
type config struct {
|
type options struct {
|
||||||
output string
|
output string
|
||||||
format string
|
format string
|
||||||
deviceNameStrategy string
|
deviceNameStrategies []string
|
||||||
driverRoot string
|
driverRoot string
|
||||||
nvidiaCTKPath string
|
devRoot string
|
||||||
mode string
|
nvidiaCDIHookPath string
|
||||||
vendor string
|
ldconfigPath string
|
||||||
class string
|
mode string
|
||||||
|
vendor string
|
||||||
|
class string
|
||||||
|
|
||||||
|
configSearchPaths []string
|
||||||
|
librarySearchPaths []string
|
||||||
|
disabledHooks []string
|
||||||
|
|
||||||
|
config string
|
||||||
|
|
||||||
|
csv struct {
|
||||||
|
files []string
|
||||||
|
ignorePatterns []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// the following are used for dependency injection during spec generation.
|
||||||
|
nvmllib nvml.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCommand constructs a generate-cdi command with the specified logger
|
// NewCommand constructs a generate-cdi command with the specified logger
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
c := command{
|
c := command{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
@@ -61,127 +81,243 @@ func NewCommand(logger *logrus.Logger) *cli.Command {
|
|||||||
|
|
||||||
// build creates the CLI command
|
// build creates the CLI command
|
||||||
func (m command) build() *cli.Command {
|
func (m command) build() *cli.Command {
|
||||||
cfg := config{}
|
opts := options{}
|
||||||
|
|
||||||
|
var flags []cli.Flag
|
||||||
|
|
||||||
// Create the 'generate-cdi' command
|
// Create the 'generate-cdi' command
|
||||||
c := cli.Command{
|
c := cli.Command{
|
||||||
Name: "generate",
|
Name: "generate",
|
||||||
Usage: "Generate CDI specifications for use with CDI-enabled runtimes",
|
Usage: "Generate CDI specifications for use with CDI-enabled runtimes",
|
||||||
Before: func(c *cli.Context) error {
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
return m.validateFlags(c, &cfg)
|
// First, determine the config file path
|
||||||
|
var configFilePath string
|
||||||
|
if cmd.IsSet("config") {
|
||||||
|
configFilePath = cmd.String("config")
|
||||||
|
} else {
|
||||||
|
configFilePath = config.GetConfigFilePath()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Load the config file
|
||||||
|
configToml, err := config.New(
|
||||||
|
config.WithConfigFile(configFilePath),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get the typed config
|
||||||
|
cfg, err := configToml.Config()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Apply config defaults to flags that haven't been set via env vars or CLI
|
||||||
|
// we can't use urfave/cli-altsrc here because we need to check the config file
|
||||||
|
// for defaults, and we can't use the config file as an input source for the
|
||||||
|
// flags because the config file is not yet loaded.
|
||||||
|
m.applyConfigDefaults(cmd, &opts, cfg)
|
||||||
|
|
||||||
|
return ctx, m.validateFlags(cmd, &opts)
|
||||||
},
|
},
|
||||||
Action: func(c *cli.Context) error {
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
return m.run(c, &cfg)
|
return m.run(cmd, &opts)
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
c.Flags = []cli.Flag{
|
flags = []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "config",
|
||||||
|
Usage: "Specify the path to the config file to use",
|
||||||
|
Destination: &opts.config,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CONFIG_FILE"),
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "config-search-path",
|
||||||
|
Usage: "Specify the path to search for config files when discovering the entities that should be included in the CDI specification.",
|
||||||
|
Destination: &opts.configSearchPaths,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_GENERATE_CONFIG_SEARCH_PATHS"),
|
||||||
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "output",
|
Name: "output",
|
||||||
Usage: "Specify the file to output the generated CDI specification to. If this is '' the specification is output to STDOUT",
|
Usage: "Specify the file to output the generated CDI specification to. If this is '' the specification is output to STDOUT",
|
||||||
Destination: &cfg.output,
|
Destination: &opts.output,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_OUTPUT_FILE_PATH"),
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "format",
|
Name: "format",
|
||||||
Usage: "The output format for the generated spec [json | yaml]. This overrides the format defined by the output file extension (if specified).",
|
Usage: "The output format for the generated spec [json | yaml]. This overrides the format defined by the output file extension (if specified).",
|
||||||
Value: spec.FormatYAML,
|
Value: spec.FormatYAML,
|
||||||
Destination: &cfg.format,
|
Destination: &opts.format,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_GENERATE_OUTPUT_FORMAT"),
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "mode",
|
Name: "mode",
|
||||||
Aliases: []string{"discovery-mode"},
|
Aliases: []string{"discovery-mode"},
|
||||||
Usage: "The mode to use when discovering the available entities. One of [auto | nvml | wsl]. If mode is set to 'auto' the mode will be determined based on the system configuration.",
|
Usage: "The mode to use when discovering the available entities. " +
|
||||||
Value: nvcdi.ModeAuto,
|
"One of [" + strings.Join(nvcdi.AllModes[string](), " | ") + "]. " +
|
||||||
Destination: &cfg.mode,
|
"If mode is set to 'auto' the mode will be determined based on the system configuration.",
|
||||||
|
Value: string(nvcdi.ModeAuto),
|
||||||
|
Destination: &opts.mode,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_GENERATE_MODE"),
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
|
Name: "dev-root",
|
||||||
|
Usage: "Specify the root where `/dev` is located. If this is not specified, the driver-root is assumed.",
|
||||||
|
Destination: &opts.devRoot,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_DEV_ROOT"),
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
Name: "device-name-strategy",
|
Name: "device-name-strategy",
|
||||||
Usage: "Specify the strategy for generating device names. One of [index | uuid | type-index]",
|
Usage: "Specify the strategy for generating device names. If this is specified multiple times, the devices will be duplicated for each strategy. One of [index | uuid | type-index]",
|
||||||
Value: nvcdi.DeviceNameStrategyIndex,
|
Value: []string{nvcdi.DeviceNameStrategyIndex, nvcdi.DeviceNameStrategyUUID},
|
||||||
Destination: &cfg.deviceNameStrategy,
|
Destination: &opts.deviceNameStrategies,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_GENERATE_DEVICE_NAME_STRATEGIES"),
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "driver-root",
|
Name: "driver-root",
|
||||||
Usage: "Specify the NVIDIA GPU driver root to use when discovering the entities that should be included in the CDI specification.",
|
Usage: "Specify the NVIDIA GPU driver root to use when discovering the entities that should be included in the CDI specification.",
|
||||||
Destination: &cfg.driverRoot,
|
Destination: &opts.driverRoot,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_DRIVER_ROOT"),
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "library-search-path",
|
||||||
|
Usage: "Specify the path to search for libraries when discovering the entities that should be included in the CDI specification.\n\tNote: This option only applies to CSV mode.",
|
||||||
|
Destination: &opts.librarySearchPaths,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_GENERATE_LIBRARY_SEARCH_PATHS"),
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "nvidia-ctk-path",
|
Name: "nvidia-cdi-hook-path",
|
||||||
Usage: "Specify the path to use for the nvidia-ctk in the generated CDI specification. If this is left empty, the path will be searched.",
|
Aliases: []string{"nvidia-ctk-path"},
|
||||||
Destination: &cfg.nvidiaCTKPath,
|
Usage: "Specify the path to use for the nvidia-cdi-hook in the generated CDI specification. " +
|
||||||
|
"If not specified, the PATH will be searched for `nvidia-cdi-hook`. " +
|
||||||
|
"NOTE: That if this is specified as `nvidia-ctk`, the PATH will be searched for `nvidia-ctk` instead.",
|
||||||
|
Destination: &opts.nvidiaCDIHookPath,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_HOOK_PATH"),
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "ldconfig-path",
|
||||||
|
Usage: "Specify the path to use for ldconfig in the generated CDI specification",
|
||||||
|
Destination: &opts.ldconfigPath,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_GENERATE_LDCONFIG_PATH"),
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "vendor",
|
Name: "vendor",
|
||||||
Aliases: []string{"cdi-vendor"},
|
Aliases: []string{"cdi-vendor"},
|
||||||
Usage: "the vendor string to use for the generated CDI specification.",
|
Usage: "the vendor string to use for the generated CDI specification.",
|
||||||
Value: "nvidia.com",
|
Value: "nvidia.com",
|
||||||
Destination: &cfg.vendor,
|
Destination: &opts.vendor,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_GENERATE_VENDOR"),
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "class",
|
Name: "class",
|
||||||
Aliases: []string{"cdi-class"},
|
Aliases: []string{"cdi-class"},
|
||||||
Usage: "the class string to use for the generated CDI specification.",
|
Usage: "the class string to use for the generated CDI specification.",
|
||||||
Value: "gpu",
|
Value: "gpu",
|
||||||
Destination: &cfg.class,
|
Destination: &opts.class,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_GENERATE_CLASS"),
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "csv.file",
|
||||||
|
Usage: "The path to the list of CSV files to use when generating the CDI specification in CSV mode.",
|
||||||
|
Value: csv.DefaultFileList(),
|
||||||
|
Destination: &opts.csv.files,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_GENERATE_CSV_FILES"),
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "csv.ignore-pattern",
|
||||||
|
Usage: "specify a pattern the CSV mount specifications.",
|
||||||
|
Destination: &opts.csv.ignorePatterns,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_GENERATE_CSV_IGNORE_PATTERNS"),
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "disable-hook",
|
||||||
|
Aliases: []string{"disable-hooks"},
|
||||||
|
Usage: "specify a specific hook to skip when generating CDI " +
|
||||||
|
"specifications. This can be specified multiple times and the " +
|
||||||
|
"special hook name 'all' can be used ensure that the generated " +
|
||||||
|
"CDI specification does not include any hooks.",
|
||||||
|
Destination: &opts.disabledHooks,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_GENERATE_DISABLED_HOOKS"),
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
c.Flags = flags
|
||||||
|
|
||||||
return &c
|
return &c
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m command) validateFlags(c *cli.Context, cfg *config) error {
|
// applyConfigDefaults applies default values from the config file to flags that haven't been set
|
||||||
|
// via environment variables or CLI flags
|
||||||
|
func (m command) applyConfigDefaults(cmd *cli.Command, opts *options, cfg *config.Config) {
|
||||||
|
// Apply mode from config if not set via env var or CLI
|
||||||
|
if !cmd.IsSet("mode") && cfg.NVIDIAContainerRuntimeConfig.Mode != "" {
|
||||||
|
opts.mode = cfg.NVIDIAContainerRuntimeConfig.Mode
|
||||||
|
m.logger.Debugf("Setting mode from config: %s", opts.mode)
|
||||||
|
}
|
||||||
|
|
||||||
cfg.format = strings.ToLower(cfg.format)
|
// Apply ldconfig path from config if not set via env var or CLI
|
||||||
switch cfg.format {
|
if !cmd.IsSet("ldconfig-path") && cfg.NVIDIAContainerCLIConfig.Ldconfig != "" {
|
||||||
|
opts.ldconfigPath = string(cfg.NVIDIAContainerCLIConfig.Ldconfig)
|
||||||
|
m.logger.Debugf("Setting ldconfig-path from config: %s", opts.ldconfigPath)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Apply driver-root
|
||||||
|
if !cmd.IsSet("driver-root") && cfg.NVIDIAContainerCLIConfig.Root != "" {
|
||||||
|
opts.driverRoot = cfg.NVIDIAContainerCLIConfig.Root
|
||||||
|
m.logger.Debugf("Setting driver-root from config: %s", opts.driverRoot)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(c *cli.Command, opts *options) error {
|
||||||
|
opts.format = strings.ToLower(opts.format)
|
||||||
|
switch opts.format {
|
||||||
case spec.FormatJSON:
|
case spec.FormatJSON:
|
||||||
case spec.FormatYAML:
|
case spec.FormatYAML:
|
||||||
default:
|
default:
|
||||||
return fmt.Errorf("invalid output format: %v", cfg.format)
|
return fmt.Errorf("invalid output format: %v", opts.format)
|
||||||
}
|
}
|
||||||
|
|
||||||
cfg.mode = strings.ToLower(cfg.mode)
|
opts.mode = strings.ToLower(opts.mode)
|
||||||
switch cfg.mode {
|
if !nvcdi.IsValidMode(opts.mode) {
|
||||||
case nvcdi.ModeAuto:
|
return fmt.Errorf("invalid discovery mode: %v", opts.mode)
|
||||||
case nvcdi.ModeNvml:
|
|
||||||
case nvcdi.ModeWsl:
|
|
||||||
case nvcdi.ModeManagement:
|
|
||||||
default:
|
|
||||||
return fmt.Errorf("invalid discovery mode: %v", cfg.mode)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
_, err := nvcdi.NewDeviceNamer(cfg.deviceNameStrategy)
|
for _, strategy := range opts.deviceNameStrategies {
|
||||||
if err != nil {
|
_, err := nvcdi.NewDeviceNamer(strategy)
|
||||||
return err
|
if err != nil {
|
||||||
}
|
return err
|
||||||
|
|
||||||
cfg.nvidiaCTKPath = discover.FindNvidiaCTK(m.logger, cfg.nvidiaCTKPath)
|
|
||||||
|
|
||||||
if outputFileFormat := formatFromFilename(cfg.output); outputFileFormat != "" {
|
|
||||||
m.logger.Debugf("Inferred output format as %q from output file name", outputFileFormat)
|
|
||||||
if !c.IsSet("format") {
|
|
||||||
cfg.format = outputFileFormat
|
|
||||||
} else if outputFileFormat != cfg.format {
|
|
||||||
m.logger.Warningf("Requested output format %q does not match format implied by output file name: %q", cfg.format, outputFileFormat)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := cdi.ValidateVendorName(cfg.vendor); err != nil {
|
opts.nvidiaCDIHookPath = config.ResolveNVIDIACDIHookPath(m.logger, opts.nvidiaCDIHookPath)
|
||||||
|
|
||||||
|
if outputFileFormat := formatFromFilename(opts.output); outputFileFormat != "" {
|
||||||
|
m.logger.Debugf("Inferred output format as %q from output file name", outputFileFormat)
|
||||||
|
if !c.IsSet("format") {
|
||||||
|
opts.format = outputFileFormat
|
||||||
|
} else if outputFileFormat != opts.format {
|
||||||
|
m.logger.Warningf("Requested output format %q does not match format implied by output file name: %q", opts.format, outputFileFormat)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := cdi.ValidateVendorName(opts.vendor); err != nil {
|
||||||
return fmt.Errorf("invalid CDI vendor name: %v", err)
|
return fmt.Errorf("invalid CDI vendor name: %v", err)
|
||||||
}
|
}
|
||||||
if err := cdi.ValidateClassName(cfg.class); err != nil {
|
if err := cdi.ValidateClassName(opts.class); err != nil {
|
||||||
return fmt.Errorf("invalid CDI class name: %v", err)
|
return fmt.Errorf("invalid CDI class name: %v", err)
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m command) run(c *cli.Context, cfg *config) error {
|
func (m command) run(c *cli.Command, opts *options) error {
|
||||||
spec, err := m.generateSpec(cfg)
|
spec, err := m.generateSpec(opts)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to generate CDI spec: %v", err)
|
return fmt.Errorf("failed to generate CDI spec: %v", err)
|
||||||
}
|
}
|
||||||
m.logger.Infof("Generated CDI spec with version %v", spec.Raw().Version)
|
m.logger.Infof("Generated CDI spec with version %v", spec.Raw().Version)
|
||||||
|
|
||||||
if cfg.output == "" {
|
if opts.output == "" {
|
||||||
_, err := spec.WriteTo(os.Stdout)
|
_, err := spec.WriteTo(os.Stdout)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to write CDI spec to STDOUT: %v", err)
|
return fmt.Errorf("failed to write CDI spec to STDOUT: %v", err)
|
||||||
@@ -189,7 +325,7 @@ func (m command) run(c *cli.Context, cfg *config) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
return spec.Save(cfg.output)
|
return spec.Save(opts.output)
|
||||||
}
|
}
|
||||||
|
|
||||||
func formatFromFilename(filename string) string {
|
func formatFromFilename(filename string) string {
|
||||||
@@ -204,19 +340,37 @@ func formatFromFilename(filename string) string {
|
|||||||
return ""
|
return ""
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m command) generateSpec(cfg *config) (spec.Interface, error) {
|
func (m command) generateSpec(opts *options) (spec.Interface, error) {
|
||||||
deviceNamer, err := nvcdi.NewDeviceNamer(cfg.deviceNameStrategy)
|
var deviceNamers []nvcdi.DeviceNamer
|
||||||
if err != nil {
|
for _, strategy := range opts.deviceNameStrategies {
|
||||||
return nil, fmt.Errorf("failed to create device namer: %v", err)
|
deviceNamer, err := nvcdi.NewDeviceNamer(strategy)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to create device namer: %v", err)
|
||||||
|
}
|
||||||
|
deviceNamers = append(deviceNamers, deviceNamer)
|
||||||
}
|
}
|
||||||
|
|
||||||
cdilib, err := nvcdi.New(
|
cdiOptions := []nvcdi.Option{
|
||||||
nvcdi.WithLogger(m.logger),
|
nvcdi.WithLogger(m.logger),
|
||||||
nvcdi.WithDriverRoot(cfg.driverRoot),
|
nvcdi.WithDriverRoot(opts.driverRoot),
|
||||||
nvcdi.WithNVIDIACTKPath(cfg.nvidiaCTKPath),
|
nvcdi.WithDevRoot(opts.devRoot),
|
||||||
nvcdi.WithDeviceNamer(deviceNamer),
|
nvcdi.WithNVIDIACDIHookPath(opts.nvidiaCDIHookPath),
|
||||||
nvcdi.WithMode(string(cfg.mode)),
|
nvcdi.WithLdconfigPath(opts.ldconfigPath),
|
||||||
)
|
nvcdi.WithDeviceNamers(deviceNamers...),
|
||||||
|
nvcdi.WithMode(opts.mode),
|
||||||
|
nvcdi.WithConfigSearchPaths(opts.configSearchPaths),
|
||||||
|
nvcdi.WithLibrarySearchPaths(opts.librarySearchPaths),
|
||||||
|
nvcdi.WithCSVFiles(opts.csv.files),
|
||||||
|
nvcdi.WithCSVIgnorePatterns(opts.csv.ignorePatterns),
|
||||||
|
// We set the following to allow for dependency injection:
|
||||||
|
nvcdi.WithNvmlLib(opts.nvmllib),
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, hook := range opts.disabledHooks {
|
||||||
|
cdiOptions = append(cdiOptions, nvcdi.WithDisabledHook(hook))
|
||||||
|
}
|
||||||
|
|
||||||
|
cdilib, err := nvcdi.New(cdiOptions...)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to create CDI library: %v", err)
|
return nil, fmt.Errorf("failed to create CDI library: %v", err)
|
||||||
}
|
}
|
||||||
@@ -225,20 +379,6 @@ func (m command) generateSpec(cfg *config) (spec.Interface, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to create device CDI specs: %v", err)
|
return nil, fmt.Errorf("failed to create device CDI specs: %v", err)
|
||||||
}
|
}
|
||||||
var hasAll bool
|
|
||||||
for _, deviceSpec := range deviceSpecs {
|
|
||||||
if deviceSpec.Name == allDeviceName {
|
|
||||||
hasAll = true
|
|
||||||
break
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if !hasAll {
|
|
||||||
allDevice, err := MergeDeviceSpecs(deviceSpecs, allDeviceName)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("failed to create CDI specification for %q device: %v", allDeviceName, err)
|
|
||||||
}
|
|
||||||
deviceSpecs = append(deviceSpecs, allDevice)
|
|
||||||
}
|
|
||||||
|
|
||||||
commonEdits, err := cdilib.GetCommonEdits()
|
commonEdits, err := cdilib.GetCommonEdits()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -246,38 +386,15 @@ func (m command) generateSpec(cfg *config) (spec.Interface, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
return spec.New(
|
return spec.New(
|
||||||
spec.WithVendor(cfg.vendor),
|
spec.WithVendor(opts.vendor),
|
||||||
spec.WithClass(cfg.class),
|
spec.WithClass(opts.class),
|
||||||
spec.WithDeviceSpecs(deviceSpecs),
|
spec.WithDeviceSpecs(deviceSpecs),
|
||||||
spec.WithEdits(*commonEdits.ContainerEdits),
|
spec.WithEdits(*commonEdits.ContainerEdits),
|
||||||
spec.WithFormat(cfg.format),
|
spec.WithFormat(opts.format),
|
||||||
|
spec.WithMergedDeviceOptions(
|
||||||
|
transform.WithName(allDeviceName),
|
||||||
|
transform.WithSkipIfExists(true),
|
||||||
|
),
|
||||||
|
spec.WithPermissions(0644),
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
// MergeDeviceSpecs creates a device with the specified name which combines the edits from the previous devices.
|
|
||||||
// If a device of the specified name already exists, an error is returned.
|
|
||||||
func MergeDeviceSpecs(deviceSpecs []specs.Device, mergedDeviceName string) (specs.Device, error) {
|
|
||||||
if err := cdi.ValidateDeviceName(mergedDeviceName); err != nil {
|
|
||||||
return specs.Device{}, fmt.Errorf("invalid device name %q: %v", mergedDeviceName, err)
|
|
||||||
}
|
|
||||||
for _, d := range deviceSpecs {
|
|
||||||
if d.Name == mergedDeviceName {
|
|
||||||
return specs.Device{}, fmt.Errorf("device %q already exists", mergedDeviceName)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
mergedEdits := edits.NewContainerEdits()
|
|
||||||
|
|
||||||
for _, d := range deviceSpecs {
|
|
||||||
edit := cdi.ContainerEdits{
|
|
||||||
ContainerEdits: &d.ContainerEdits,
|
|
||||||
}
|
|
||||||
mergedEdits.Append(&edit)
|
|
||||||
}
|
|
||||||
|
|
||||||
merged := specs.Device{
|
|
||||||
Name: mergedDeviceName,
|
|
||||||
ContainerEdits: *mergedEdits.ContainerEdits,
|
|
||||||
}
|
|
||||||
return merged, nil
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
/**
|
/**
|
||||||
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
# Copyright (c) 2025, NVIDIA CORPORATION. All rights reserved.
|
||||||
#
|
#
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
# you may not use this file except in compliance with the License.
|
# you may not use this file except in compliance with the License.
|
||||||
@@ -17,101 +17,379 @@
|
|||||||
package generate
|
package generate
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"bytes"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/container-orchestrated-devices/container-device-interface/specs-go"
|
"github.com/NVIDIA/go-nvml/pkg/nvml"
|
||||||
|
"github.com/NVIDIA/go-nvml/pkg/nvml/mock/dgxa100"
|
||||||
|
testlog "github.com/sirupsen/logrus/hooks/test"
|
||||||
"github.com/stretchr/testify/require"
|
"github.com/stretchr/testify/require"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/test"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestMergeDeviceSpecs(t *testing.T) {
|
func TestGenerateSpec(t *testing.T) {
|
||||||
|
t.Setenv("__NVCT_TESTING_DEVICES_ARE_FILES", "true")
|
||||||
|
moduleRoot, err := test.GetModuleRoot()
|
||||||
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
driverRoot := filepath.Join(moduleRoot, "testdata", "lookup", "rootfs-1")
|
||||||
|
|
||||||
|
logger, _ := testlog.NewNullLogger()
|
||||||
testCases := []struct {
|
testCases := []struct {
|
||||||
description string
|
description string
|
||||||
deviceSpecs []specs.Device
|
options options
|
||||||
mergedDeviceName string
|
expectedValidateError error
|
||||||
expectedError error
|
expectedOptions options
|
||||||
expected specs.Device
|
expectedError error
|
||||||
|
expectedSpec string
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
description: "no devices",
|
description: "default",
|
||||||
mergedDeviceName: "all",
|
options: options{
|
||||||
expected: specs.Device{
|
format: "yaml",
|
||||||
Name: "all",
|
mode: "nvml",
|
||||||
|
vendor: "example.com",
|
||||||
|
class: "device",
|
||||||
|
driverRoot: driverRoot,
|
||||||
},
|
},
|
||||||
|
expectedOptions: options{
|
||||||
|
format: "yaml",
|
||||||
|
mode: "nvml",
|
||||||
|
vendor: "example.com",
|
||||||
|
class: "device",
|
||||||
|
nvidiaCDIHookPath: "/usr/bin/nvidia-cdi-hook",
|
||||||
|
driverRoot: driverRoot,
|
||||||
|
},
|
||||||
|
expectedSpec: `---
|
||||||
|
cdiVersion: 0.5.0
|
||||||
|
kind: example.com/device
|
||||||
|
devices:
|
||||||
|
- name: "0"
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidia0
|
||||||
|
- name: all
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidia0
|
||||||
|
containerEdits:
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_LIBCUDA_DIR=/lib/x86_64-linux-gnu
|
||||||
|
- NVIDIA_VISIBLE_DEVICES=void
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidiactl
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidiactl
|
||||||
|
hooks:
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- create-symlinks
|
||||||
|
- --link
|
||||||
|
- libcuda.so.1::/lib/x86_64-linux-gnu/libcuda.so
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- enable-cuda-compat
|
||||||
|
- --host-driver-version=999.88.77
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- create-soname-symlinks
|
||||||
|
- --folder
|
||||||
|
- /lib/x86_64-linux-gnu
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- update-ldcache
|
||||||
|
- --folder
|
||||||
|
- /lib/x86_64-linux-gnu
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- disable-device-node-modification
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
mounts:
|
||||||
|
- hostPath: {{ .driverRoot }}/lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
containerPath: /lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
options:
|
||||||
|
- ro
|
||||||
|
- nosuid
|
||||||
|
- nodev
|
||||||
|
- rbind
|
||||||
|
- rprivate
|
||||||
|
`,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
description: "one device",
|
description: "disableHooks1",
|
||||||
mergedDeviceName: "all",
|
options: options{
|
||||||
deviceSpecs: []specs.Device{
|
format: "yaml",
|
||||||
{
|
mode: "nvml",
|
||||||
Name: "gpu0",
|
vendor: "example.com",
|
||||||
ContainerEdits: specs.ContainerEdits{
|
class: "device",
|
||||||
Env: []string{"GPU=0"},
|
driverRoot: driverRoot,
|
||||||
},
|
disabledHooks: []string{"enable-cuda-compat"},
|
||||||
},
|
|
||||||
},
|
},
|
||||||
expected: specs.Device{
|
expectedOptions: options{
|
||||||
Name: "all",
|
format: "yaml",
|
||||||
ContainerEdits: specs.ContainerEdits{
|
mode: "nvml",
|
||||||
Env: []string{"GPU=0"},
|
vendor: "example.com",
|
||||||
},
|
class: "device",
|
||||||
|
nvidiaCDIHookPath: "/usr/bin/nvidia-cdi-hook",
|
||||||
|
driverRoot: driverRoot,
|
||||||
|
disabledHooks: []string{"enable-cuda-compat"},
|
||||||
},
|
},
|
||||||
|
expectedSpec: `---
|
||||||
|
cdiVersion: 0.5.0
|
||||||
|
kind: example.com/device
|
||||||
|
devices:
|
||||||
|
- name: "0"
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidia0
|
||||||
|
- name: all
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidia0
|
||||||
|
containerEdits:
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_LIBCUDA_DIR=/lib/x86_64-linux-gnu
|
||||||
|
- NVIDIA_VISIBLE_DEVICES=void
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidiactl
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidiactl
|
||||||
|
hooks:
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- create-symlinks
|
||||||
|
- --link
|
||||||
|
- libcuda.so.1::/lib/x86_64-linux-gnu/libcuda.so
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- create-soname-symlinks
|
||||||
|
- --folder
|
||||||
|
- /lib/x86_64-linux-gnu
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- update-ldcache
|
||||||
|
- --folder
|
||||||
|
- /lib/x86_64-linux-gnu
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- disable-device-node-modification
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
mounts:
|
||||||
|
- hostPath: {{ .driverRoot }}/lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
containerPath: /lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
options:
|
||||||
|
- ro
|
||||||
|
- nosuid
|
||||||
|
- nodev
|
||||||
|
- rbind
|
||||||
|
- rprivate
|
||||||
|
`,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
description: "two devices",
|
description: "disableHooks2",
|
||||||
mergedDeviceName: "all",
|
options: options{
|
||||||
deviceSpecs: []specs.Device{
|
format: "yaml",
|
||||||
{
|
mode: "nvml",
|
||||||
Name: "gpu0",
|
vendor: "example.com",
|
||||||
ContainerEdits: specs.ContainerEdits{
|
class: "device",
|
||||||
Env: []string{"GPU=0"},
|
driverRoot: driverRoot,
|
||||||
},
|
disabledHooks: []string{"enable-cuda-compat", "update-ldcache"},
|
||||||
},
|
|
||||||
{
|
|
||||||
Name: "gpu1",
|
|
||||||
ContainerEdits: specs.ContainerEdits{
|
|
||||||
Env: []string{"GPU=1"},
|
|
||||||
},
|
|
||||||
},
|
|
||||||
},
|
},
|
||||||
expected: specs.Device{
|
expectedOptions: options{
|
||||||
Name: "all",
|
format: "yaml",
|
||||||
ContainerEdits: specs.ContainerEdits{
|
mode: "nvml",
|
||||||
Env: []string{"GPU=0", "GPU=1"},
|
vendor: "example.com",
|
||||||
},
|
class: "device",
|
||||||
|
nvidiaCDIHookPath: "/usr/bin/nvidia-cdi-hook",
|
||||||
|
driverRoot: driverRoot,
|
||||||
|
disabledHooks: []string{"enable-cuda-compat", "update-ldcache"},
|
||||||
},
|
},
|
||||||
|
expectedSpec: `---
|
||||||
|
cdiVersion: 0.5.0
|
||||||
|
kind: example.com/device
|
||||||
|
devices:
|
||||||
|
- name: "0"
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidia0
|
||||||
|
- name: all
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidia0
|
||||||
|
containerEdits:
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_LIBCUDA_DIR=/lib/x86_64-linux-gnu
|
||||||
|
- NVIDIA_VISIBLE_DEVICES=void
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidiactl
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidiactl
|
||||||
|
hooks:
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- create-symlinks
|
||||||
|
- --link
|
||||||
|
- libcuda.so.1::/lib/x86_64-linux-gnu/libcuda.so
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- create-soname-symlinks
|
||||||
|
- --folder
|
||||||
|
- /lib/x86_64-linux-gnu
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
- hookName: createContainer
|
||||||
|
path: /usr/bin/nvidia-cdi-hook
|
||||||
|
args:
|
||||||
|
- nvidia-cdi-hook
|
||||||
|
- disable-device-node-modification
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_DEBUG=false
|
||||||
|
mounts:
|
||||||
|
- hostPath: {{ .driverRoot }}/lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
containerPath: /lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
options:
|
||||||
|
- ro
|
||||||
|
- nosuid
|
||||||
|
- nodev
|
||||||
|
- rbind
|
||||||
|
- rprivate
|
||||||
|
`,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
description: "has merged device",
|
description: "disableHooksAll",
|
||||||
mergedDeviceName: "gpu0",
|
options: options{
|
||||||
deviceSpecs: []specs.Device{
|
format: "yaml",
|
||||||
{
|
mode: "nvml",
|
||||||
Name: "gpu0",
|
vendor: "example.com",
|
||||||
ContainerEdits: specs.ContainerEdits{
|
class: "device",
|
||||||
Env: []string{"GPU=0"},
|
driverRoot: driverRoot,
|
||||||
},
|
disabledHooks: []string{"all"},
|
||||||
},
|
|
||||||
},
|
},
|
||||||
expectedError: fmt.Errorf("device %q already exists", "gpu0"),
|
expectedOptions: options{
|
||||||
},
|
format: "yaml",
|
||||||
{
|
mode: "nvml",
|
||||||
description: "invalid merged device name",
|
vendor: "example.com",
|
||||||
mergedDeviceName: ".-not-valid",
|
class: "device",
|
||||||
expectedError: fmt.Errorf("invalid device name %q", ".-not-valid"),
|
nvidiaCDIHookPath: "/usr/bin/nvidia-cdi-hook",
|
||||||
|
driverRoot: driverRoot,
|
||||||
|
disabledHooks: []string{"all"},
|
||||||
|
},
|
||||||
|
expectedSpec: `---
|
||||||
|
cdiVersion: 0.5.0
|
||||||
|
kind: example.com/device
|
||||||
|
devices:
|
||||||
|
- name: "0"
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidia0
|
||||||
|
- name: all
|
||||||
|
containerEdits:
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidia0
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidia0
|
||||||
|
containerEdits:
|
||||||
|
env:
|
||||||
|
- NVIDIA_CTK_LIBCUDA_DIR=/lib/x86_64-linux-gnu
|
||||||
|
- NVIDIA_VISIBLE_DEVICES=void
|
||||||
|
deviceNodes:
|
||||||
|
- path: /dev/nvidiactl
|
||||||
|
hostPath: {{ .driverRoot }}/dev/nvidiactl
|
||||||
|
mounts:
|
||||||
|
- hostPath: {{ .driverRoot }}/lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
containerPath: /lib/x86_64-linux-gnu/libcuda.so.999.88.77
|
||||||
|
options:
|
||||||
|
- ro
|
||||||
|
- nosuid
|
||||||
|
- nodev
|
||||||
|
- rbind
|
||||||
|
- rprivate
|
||||||
|
`,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, tc := range testCases {
|
for _, tc := range testCases {
|
||||||
t.Run(tc.description, func(t *testing.T) {
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
mergedDevice, err := MergeDeviceSpecs(tc.deviceSpecs, tc.mergedDeviceName)
|
c := command{
|
||||||
|
logger: logger,
|
||||||
if tc.expectedError != nil {
|
|
||||||
require.Error(t, err)
|
|
||||||
return
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
err := c.validateFlags(nil, &tc.options)
|
||||||
|
require.ErrorIs(t, err, tc.expectedValidateError)
|
||||||
|
require.EqualValues(t, tc.expectedOptions, tc.options)
|
||||||
|
|
||||||
|
// Set up a mock server, reusing the DGX A100 mock.
|
||||||
|
server := dgxa100.New()
|
||||||
|
// Override the driver version to match the version in our mock filesystem.
|
||||||
|
server.SystemGetDriverVersionFunc = func() (string, nvml.Return) {
|
||||||
|
return "999.88.77", nvml.SUCCESS
|
||||||
|
}
|
||||||
|
// Set the device count to 1 explicitly since we only have a single device node.
|
||||||
|
server.DeviceGetCountFunc = func() (int, nvml.Return) {
|
||||||
|
return 1, nvml.SUCCESS
|
||||||
|
}
|
||||||
|
for _, d := range server.Devices {
|
||||||
|
// TODO: This is not implemented in the mock.
|
||||||
|
(d.(*dgxa100.Device)).GetMaxMigDeviceCountFunc = func() (int, nvml.Return) {
|
||||||
|
return 0, nvml.SUCCESS
|
||||||
|
}
|
||||||
|
}
|
||||||
|
tc.options.nvmllib = server
|
||||||
|
|
||||||
|
spec, err := c.generateSpec(&tc.options)
|
||||||
|
require.ErrorIs(t, err, tc.expectedError)
|
||||||
|
|
||||||
|
var buf bytes.Buffer
|
||||||
|
_, err = spec.WriteTo(&buf)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.EqualValues(t, tc.expected, mergedDevice)
|
|
||||||
|
require.Equal(t, strings.ReplaceAll(tc.expectedSpec, "{{ .driverRoot }}", driverRoot), buf.String())
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
106
cmd/nvidia-ctk/cdi/list/list.go
Normal file
106
cmd/nvidia-ctk/cdi/list/list.go
Normal file
@@ -0,0 +1,106 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package list
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
"tags.cncf.io/container-device-interface/pkg/cdi"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
type config struct {
|
||||||
|
cdiSpecDirs []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a cdi list command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build creates the CLI command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
cfg := config{}
|
||||||
|
|
||||||
|
// Create the command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "list",
|
||||||
|
Usage: "List the available CDI devices",
|
||||||
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
|
return ctx, m.validateFlags(cmd, &cfg)
|
||||||
|
},
|
||||||
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
return m.run(cmd, &cfg)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "spec-dir",
|
||||||
|
Usage: "specify the directories to scan for CDI specifications",
|
||||||
|
Value: cdi.DefaultSpecDirs,
|
||||||
|
Destination: &cfg.cdiSpecDirs,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_CDI_SPEC_DIRS"),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(c *cli.Command, cfg *config) error {
|
||||||
|
if len(cfg.cdiSpecDirs) == 0 {
|
||||||
|
return errors.New("at least one CDI specification directory must be specified")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(c *cli.Command, cfg *config) error {
|
||||||
|
registry, err := cdi.NewCache(
|
||||||
|
cdi.WithAutoRefresh(false),
|
||||||
|
cdi.WithSpecDirs(cfg.cdiSpecDirs...),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create CDI cache: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_ = registry.Refresh()
|
||||||
|
if errors := registry.GetErrors(); len(errors) > 0 {
|
||||||
|
m.logger.Warningf("The following registry errors were reported:")
|
||||||
|
for k, err := range errors {
|
||||||
|
m.logger.Warningf("%v: %v", k, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
devices := registry.ListDevices()
|
||||||
|
m.logger.Infof("Found %d CDI devices", len(devices))
|
||||||
|
for _, device := range devices {
|
||||||
|
fmt.Printf("%s\n", device)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -17,24 +17,21 @@
|
|||||||
package root
|
package root
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"os"
|
"os"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
"tags.cncf.io/container-device-interface/pkg/cdi"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/spec"
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/spec"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/transform"
|
transformroot "github.com/NVIDIA/nvidia-container-toolkit/pkg/nvcdi/transform/root"
|
||||||
"github.com/container-orchestrated-devices/container-device-interface/pkg/cdi"
|
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type loadSaver interface {
|
|
||||||
Load() (spec.Interface, error)
|
|
||||||
Save(spec.Interface) error
|
|
||||||
}
|
|
||||||
|
|
||||||
type command struct {
|
type command struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
type transformOptions struct {
|
type transformOptions struct {
|
||||||
@@ -44,12 +41,13 @@ type transformOptions struct {
|
|||||||
|
|
||||||
type options struct {
|
type options struct {
|
||||||
transformOptions
|
transformOptions
|
||||||
from string
|
from string
|
||||||
to string
|
to string
|
||||||
|
relativeTo string
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCommand constructs a generate-cdi command with the specified logger
|
// NewCommand constructs a generate-cdi command with the specified logger
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
c := command{
|
c := command{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
@@ -63,15 +61,20 @@ func (m command) build() *cli.Command {
|
|||||||
c := cli.Command{
|
c := cli.Command{
|
||||||
Name: "root",
|
Name: "root",
|
||||||
Usage: "Apply a root transform to a CDI specification",
|
Usage: "Apply a root transform to a CDI specification",
|
||||||
Before: func(c *cli.Context) error {
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
return m.validateFlags(c, &opts)
|
return ctx, m.validateFlags(cmd, &opts)
|
||||||
},
|
},
|
||||||
Action: func(c *cli.Context) error {
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
return m.run(c, &opts)
|
return m.run(cmd, &opts)
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
c.Flags = []cli.Flag{
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "from",
|
||||||
|
Usage: "specify the root to be transformed",
|
||||||
|
Destination: &opts.from,
|
||||||
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "input",
|
Name: "input",
|
||||||
Usage: "Specify the file to read the CDI specification from. If this is '-' the specification is read from STDIN",
|
Usage: "Specify the file to read the CDI specification from. If this is '-' the specification is read from STDIN",
|
||||||
@@ -84,9 +87,10 @@ func (m command) build() *cli.Command {
|
|||||||
Destination: &opts.output,
|
Destination: &opts.output,
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "from",
|
Name: "relative-to",
|
||||||
Usage: "specify the root to be transformed",
|
Usage: "specify whether the transform is relative to the host or to the container. One of [ host | container ]",
|
||||||
Destination: &opts.from,
|
Value: "host",
|
||||||
|
Destination: &opts.relativeTo,
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "to",
|
Name: "to",
|
||||||
@@ -99,19 +103,26 @@ func (m command) build() *cli.Command {
|
|||||||
return &c
|
return &c
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m command) validateFlags(c *cli.Context, opts *options) error {
|
func (m command) validateFlags(c *cli.Command, opts *options) error {
|
||||||
|
switch opts.relativeTo {
|
||||||
|
case "host":
|
||||||
|
case "container":
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("invalid --relative-to value: %v", opts.relativeTo)
|
||||||
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m command) run(c *cli.Context, opts *options) error {
|
func (m command) run(c *cli.Command, opts *options) error {
|
||||||
spec, err := opts.Load()
|
spec, err := opts.Load()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to load CDI specification: %w", err)
|
return fmt.Errorf("failed to load CDI specification: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
err = transform.NewRootTransformer(
|
err = transformroot.New(
|
||||||
opts.from,
|
transformroot.WithRoot(opts.from),
|
||||||
opts.to,
|
transformroot.WithTargetRoot(opts.to),
|
||||||
|
transformroot.WithRelativeTo(opts.relativeTo),
|
||||||
).Transform(spec.Raw())
|
).Transform(spec.Raw())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to transform CDI specification: %w", err)
|
return fmt.Errorf("failed to transform CDI specification: %w", err)
|
||||||
|
|||||||
@@ -17,17 +17,18 @@
|
|||||||
package transform
|
package transform
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi/transform/root"
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi/transform/root"
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type command struct {
|
type command struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCommand constructs a command with the specified logger
|
// NewCommand constructs a command with the specified logger
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
c := command{
|
c := command{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
@@ -43,7 +44,7 @@ func (m command) build() *cli.Command {
|
|||||||
|
|
||||||
c.Flags = []cli.Flag{}
|
c.Flags = []cli.Flag{}
|
||||||
|
|
||||||
c.Subcommands = []*cli.Command{
|
c.Commands = []*cli.Command{
|
||||||
root.NewCommand(m.logger),
|
root.NewCommand(m.logger),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
252
cmd/nvidia-ctk/config/config.go
Normal file
252
cmd/nvidia-ctk/config/config.go
Normal file
@@ -0,0 +1,252 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"reflect"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
createdefault "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/config/create-default"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/config/flags"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
// options stores the subcommand options
|
||||||
|
type options struct {
|
||||||
|
flags.Options
|
||||||
|
setListSeparator string
|
||||||
|
sets []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs an config command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
opts := options{}
|
||||||
|
|
||||||
|
// Create the 'config' command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "config",
|
||||||
|
Usage: "Interact with the NVIDIA Container Toolkit configuration",
|
||||||
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
|
return ctx, validateFlags(cmd, &opts)
|
||||||
|
},
|
||||||
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
return run(cmd, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "config-file",
|
||||||
|
Aliases: []string{"config", "c"},
|
||||||
|
Usage: "Specify the config file to modify.",
|
||||||
|
Value: config.GetConfigFilePath(),
|
||||||
|
Destination: &opts.Config,
|
||||||
|
},
|
||||||
|
&cli.StringSliceFlag{
|
||||||
|
Name: "set",
|
||||||
|
Usage: "Set a config value using the pattern 'key[=value]'. " +
|
||||||
|
"Specifying only 'key' is equivalent to 'key=true' for boolean settings. " +
|
||||||
|
"This flag can be specified multiple times, but only the last value for a specific " +
|
||||||
|
"config option is applied. " +
|
||||||
|
"If the setting represents a list, the elements are colon-separated.",
|
||||||
|
Destination: &opts.sets,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "set-list-separator",
|
||||||
|
Usage: "Specify a separator for lists applied using the set command.",
|
||||||
|
Hidden: true,
|
||||||
|
Value: ":",
|
||||||
|
Destination: &opts.setListSeparator,
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "in-place",
|
||||||
|
Aliases: []string{"i"},
|
||||||
|
Usage: "Modify the config file in-place",
|
||||||
|
Destination: &opts.InPlace,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "output",
|
||||||
|
Aliases: []string{"o"},
|
||||||
|
Usage: "Specify the output file to write to; If not specified, the output is written to stdout",
|
||||||
|
Destination: &opts.Output,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Commands = []*cli.Command{
|
||||||
|
createdefault.NewCommand(m.logger),
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func validateFlags(c *cli.Command, opts *options) error {
|
||||||
|
if opts.setListSeparator == "" {
|
||||||
|
return fmt.Errorf("set-list-separator must be set")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func run(c *cli.Command, opts *options) error {
|
||||||
|
cfgToml, err := config.New(
|
||||||
|
config.WithConfigFile(opts.Config),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to create config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, set := range opts.sets {
|
||||||
|
key, value, err := setFlagToKeyValue(set, opts.setListSeparator)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("invalid --set option %v: %w", set, err)
|
||||||
|
}
|
||||||
|
if value == nil {
|
||||||
|
_ = cfgToml.Delete(key)
|
||||||
|
} else {
|
||||||
|
cfgToml.Set(key, value)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := opts.EnsureOutputFolder(); err != nil {
|
||||||
|
return fmt.Errorf("failed to create output directory: %v", err)
|
||||||
|
}
|
||||||
|
output, err := opts.CreateOutput()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to open output file: %v", err)
|
||||||
|
}
|
||||||
|
defer output.Close()
|
||||||
|
|
||||||
|
if _, err := cfgToml.Save(output); err != nil {
|
||||||
|
return fmt.Errorf("failed to save config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var errInvalidConfigOption = errors.New("invalid config option")
|
||||||
|
var errUndefinedField = errors.New("undefined field")
|
||||||
|
var errInvalidFormat = errors.New("invalid format")
|
||||||
|
|
||||||
|
// setFlagToKeyValue converts a --set flag to a key-value pair.
|
||||||
|
// The set flag is of the form key[=value], with the value being optional if key refers to a
|
||||||
|
// boolean config option.
|
||||||
|
func setFlagToKeyValue(setFlag string, setListSeparator string) (string, interface{}, error) {
|
||||||
|
setParts := strings.SplitN(setFlag, "=", 2)
|
||||||
|
key := setParts[0]
|
||||||
|
|
||||||
|
field, err := getField(key)
|
||||||
|
if err != nil {
|
||||||
|
return key, nil, fmt.Errorf("%w: %w", errInvalidConfigOption, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
kind := field.Kind()
|
||||||
|
if len(setParts) != 2 {
|
||||||
|
if kind == reflect.Bool || (kind == reflect.Pointer && field.Elem().Kind() == reflect.Bool) {
|
||||||
|
return key, true, nil
|
||||||
|
}
|
||||||
|
return key, nil, fmt.Errorf("%w: expected key=value; got %v", errInvalidFormat, setFlag)
|
||||||
|
}
|
||||||
|
|
||||||
|
value := setParts[1]
|
||||||
|
if kind == reflect.Pointer && value != "nil" {
|
||||||
|
kind = field.Elem().Kind()
|
||||||
|
}
|
||||||
|
switch kind {
|
||||||
|
case reflect.Pointer:
|
||||||
|
return key, nil, nil
|
||||||
|
case reflect.Bool:
|
||||||
|
b, err := strconv.ParseBool(value)
|
||||||
|
if err != nil {
|
||||||
|
return key, value, fmt.Errorf("%w: %w", errInvalidFormat, err)
|
||||||
|
}
|
||||||
|
return key, b, nil
|
||||||
|
case reflect.String:
|
||||||
|
return key, value, nil
|
||||||
|
case reflect.Slice:
|
||||||
|
valueParts := []string{value}
|
||||||
|
for _, sep := range []string{setListSeparator, ","} {
|
||||||
|
if !strings.Contains(value, sep) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
valueParts = strings.Split(value, sep)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
switch field.Elem().Kind() {
|
||||||
|
case reflect.String:
|
||||||
|
return key, valueParts, nil
|
||||||
|
case reflect.Int:
|
||||||
|
var output []int64
|
||||||
|
for _, v := range valueParts {
|
||||||
|
vi, err := strconv.ParseInt(v, 10, 0)
|
||||||
|
if err != nil {
|
||||||
|
return key, nil, fmt.Errorf("%w: %w", errInvalidFormat, err)
|
||||||
|
}
|
||||||
|
output = append(output, vi)
|
||||||
|
}
|
||||||
|
return key, output, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return key, nil, fmt.Errorf("unsupported type for %v (%v)", setParts, kind)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getField(key string) (reflect.Type, error) {
|
||||||
|
s, err := getStruct(reflect.TypeOf(config.Config{}), strings.Split(key, ".")...)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return s.Type, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func getStruct(current reflect.Type, paths ...string) (reflect.StructField, error) {
|
||||||
|
if len(paths) < 1 {
|
||||||
|
return reflect.StructField{}, fmt.Errorf("%w: no fields selected", errUndefinedField)
|
||||||
|
}
|
||||||
|
tomlField := paths[0]
|
||||||
|
for i := 0; i < current.NumField(); i++ {
|
||||||
|
f := current.Field(i)
|
||||||
|
v, ok := f.Tag.Lookup("toml")
|
||||||
|
if !ok {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if strings.SplitN(v, ",", 2)[0] != tomlField {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if len(paths) == 1 {
|
||||||
|
return f, nil
|
||||||
|
}
|
||||||
|
return getStruct(f.Type, paths[1:]...)
|
||||||
|
}
|
||||||
|
return reflect.StructField{}, fmt.Errorf("%w: %q", errUndefinedField, tomlField)
|
||||||
|
}
|
||||||
143
cmd/nvidia-ctk/config/config_test.go
Normal file
143
cmd/nvidia-ctk/config/config_test.go
Normal file
@@ -0,0 +1,143 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestSetFlagToKeyValue(t *testing.T) {
|
||||||
|
// TODO: We need to enable this test again since switching to reflect.
|
||||||
|
testCases := []struct {
|
||||||
|
description string
|
||||||
|
setFlag string
|
||||||
|
setListSeparator string
|
||||||
|
expectedKey string
|
||||||
|
expectedValue interface{}
|
||||||
|
expectedError error
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
description: "option not present returns an error",
|
||||||
|
setFlag: "undefined=new-value",
|
||||||
|
expectedKey: "undefined",
|
||||||
|
expectedError: errInvalidConfigOption,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "undefined nexted option returns error",
|
||||||
|
setFlag: "nvidia-container-cli.undefined",
|
||||||
|
expectedKey: "nvidia-container-cli.undefined",
|
||||||
|
expectedError: errInvalidConfigOption,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "boolean option assumes true",
|
||||||
|
setFlag: "disable-require",
|
||||||
|
expectedKey: "disable-require",
|
||||||
|
expectedValue: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "boolean option returns true",
|
||||||
|
setFlag: "disable-require=true",
|
||||||
|
expectedKey: "disable-require",
|
||||||
|
expectedValue: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "boolean option returns false",
|
||||||
|
setFlag: "disable-require=false",
|
||||||
|
expectedKey: "disable-require",
|
||||||
|
expectedValue: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "invalid boolean option returns error",
|
||||||
|
setFlag: "disable-require=something",
|
||||||
|
expectedKey: "disable-require",
|
||||||
|
expectedValue: "something",
|
||||||
|
expectedError: errInvalidFormat,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "string option requires value",
|
||||||
|
setFlag: "swarm-resource",
|
||||||
|
expectedKey: "swarm-resource",
|
||||||
|
expectedValue: nil,
|
||||||
|
expectedError: errInvalidFormat,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "string option returns value",
|
||||||
|
setFlag: "swarm-resource=string-value",
|
||||||
|
expectedKey: "swarm-resource",
|
||||||
|
expectedValue: "string-value",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "string option returns value with equals",
|
||||||
|
setFlag: "swarm-resource=string-value=more",
|
||||||
|
expectedKey: "swarm-resource",
|
||||||
|
expectedValue: "string-value=more",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "string option treats bool value as string",
|
||||||
|
setFlag: "swarm-resource=true",
|
||||||
|
expectedKey: "swarm-resource",
|
||||||
|
expectedValue: "true",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "string option treats int value as string",
|
||||||
|
setFlag: "swarm-resource=5",
|
||||||
|
expectedKey: "swarm-resource",
|
||||||
|
expectedValue: "5",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "[]string option returns single value",
|
||||||
|
setFlag: "nvidia-container-cli.environment=string-value",
|
||||||
|
expectedKey: "nvidia-container-cli.environment",
|
||||||
|
expectedValue: []string{"string-value"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "[]string option returns multiple values",
|
||||||
|
setFlag: "nvidia-container-cli.environment=first,second",
|
||||||
|
setListSeparator: ",",
|
||||||
|
expectedKey: "nvidia-container-cli.environment",
|
||||||
|
expectedValue: []string{"first", "second"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "[]string option returns values with equals",
|
||||||
|
setFlag: "nvidia-container-cli.environment=first=1,second=2",
|
||||||
|
setListSeparator: ",",
|
||||||
|
expectedKey: "nvidia-container-cli.environment",
|
||||||
|
expectedValue: []string{"first=1", "second=2"},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
description: "[]string option returns multiple values semi-colon",
|
||||||
|
setFlag: "nvidia-container-cli.environment=first;second",
|
||||||
|
setListSeparator: ";",
|
||||||
|
expectedKey: "nvidia-container-cli.environment",
|
||||||
|
expectedValue: []string{"first", "second"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tc := range testCases {
|
||||||
|
t.Run(tc.description, func(t *testing.T) {
|
||||||
|
if tc.setListSeparator == "" {
|
||||||
|
tc.setListSeparator = ","
|
||||||
|
}
|
||||||
|
k, v, err := setFlagToKeyValue(tc.setFlag, tc.setListSeparator)
|
||||||
|
require.ErrorIs(t, err, tc.expectedError)
|
||||||
|
require.EqualValues(t, tc.expectedKey, k)
|
||||||
|
require.EqualValues(t, tc.expectedValue, v)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
95
cmd/nvidia-ctk/config/create-default/create-default.go
Normal file
95
cmd/nvidia-ctk/config/create-default/create-default.go
Normal file
@@ -0,0 +1,95 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package defaultsubcommand
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/config/flags"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/config"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
|
type command struct {
|
||||||
|
logger logger.Interface
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommand constructs a default command with the specified logger
|
||||||
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
|
c := command{
|
||||||
|
logger: logger,
|
||||||
|
}
|
||||||
|
return c.build()
|
||||||
|
}
|
||||||
|
|
||||||
|
// build creates the CLI command
|
||||||
|
func (m command) build() *cli.Command {
|
||||||
|
opts := flags.Options{}
|
||||||
|
|
||||||
|
// Create the 'default' command
|
||||||
|
c := cli.Command{
|
||||||
|
Name: "default",
|
||||||
|
Aliases: []string{"create-default", "generate-default"},
|
||||||
|
Usage: "Generate the default NVIDIA Container Toolkit configuration file",
|
||||||
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
|
return ctx, m.validateFlags(cmd, &opts)
|
||||||
|
},
|
||||||
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
return m.run(cmd, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
c.Flags = []cli.Flag{
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "output",
|
||||||
|
Aliases: []string{"o"},
|
||||||
|
Usage: "Specify the output file to write to; If not specified, the output is written to stdout",
|
||||||
|
Destination: &opts.Output,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return &c
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) validateFlags(c *cli.Command, opts *flags.Options) error {
|
||||||
|
return opts.Validate()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m command) run(c *cli.Command, opts *flags.Options) error {
|
||||||
|
cfgToml, err := config.New()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("unable to load or create config: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := opts.EnsureOutputFolder(); err != nil {
|
||||||
|
return fmt.Errorf("failed to create output directory: %v", err)
|
||||||
|
}
|
||||||
|
output, err := opts.CreateOutput()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to open output file: %v", err)
|
||||||
|
}
|
||||||
|
defer output.Close()
|
||||||
|
|
||||||
|
if _, err = cfgToml.Save(output); err != nil {
|
||||||
|
return fmt.Errorf("failed to write output: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
82
cmd/nvidia-ctk/config/flags/options.go
Normal file
82
cmd/nvidia-ctk/config/flags/options.go
Normal file
@@ -0,0 +1,82 @@
|
|||||||
|
/**
|
||||||
|
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
**/
|
||||||
|
|
||||||
|
package flags
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Options stores options for the config commands
|
||||||
|
type Options struct {
|
||||||
|
Config string
|
||||||
|
Output string
|
||||||
|
InPlace bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// Validate checks whether the options are valid.
|
||||||
|
func (o Options) Validate() error {
|
||||||
|
if o.InPlace && o.Output != "" {
|
||||||
|
return fmt.Errorf("cannot specify both --in-place and --output")
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetOutput returns the effective output
|
||||||
|
func (o Options) GetOutput() string {
|
||||||
|
if o.InPlace {
|
||||||
|
return o.Config
|
||||||
|
}
|
||||||
|
|
||||||
|
return o.Output
|
||||||
|
}
|
||||||
|
|
||||||
|
// EnsureOutputFolder creates the output folder if it does not exist.
|
||||||
|
// If the output folder is not specified (i.e. output to STDOUT), it is ignored.
|
||||||
|
func (o Options) EnsureOutputFolder() error {
|
||||||
|
output := o.GetOutput()
|
||||||
|
if output == "" {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if dir := filepath.Dir(output); dir != "" {
|
||||||
|
return os.MkdirAll(dir, 0755)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// CreateOutput creates the writer for the output.
|
||||||
|
func (o Options) CreateOutput() (io.WriteCloser, error) {
|
||||||
|
output := o.GetOutput()
|
||||||
|
if output == "" {
|
||||||
|
return nullCloser{os.Stdout}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return os.Create(output)
|
||||||
|
}
|
||||||
|
|
||||||
|
// nullCloser is a writer that does nothing on Close.
|
||||||
|
type nullCloser struct {
|
||||||
|
io.Writer
|
||||||
|
}
|
||||||
|
|
||||||
|
// Close is a no-op for a nullCloser.
|
||||||
|
func (d nullCloser) Close() error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -1,229 +0,0 @@
|
|||||||
/**
|
|
||||||
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
**/
|
|
||||||
|
|
||||||
package symlinks
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
"path/filepath"
|
|
||||||
"strings"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/discover/csv"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/lookup"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
)
|
|
||||||
|
|
||||||
type command struct {
|
|
||||||
logger *logrus.Logger
|
|
||||||
}
|
|
||||||
|
|
||||||
type config struct {
|
|
||||||
hostRoot string
|
|
||||||
filenames cli.StringSlice
|
|
||||||
links cli.StringSlice
|
|
||||||
containerSpec string
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewCommand constructs a hook command with the specified logger
|
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
|
||||||
c := command{
|
|
||||||
logger: logger,
|
|
||||||
}
|
|
||||||
return c.build()
|
|
||||||
}
|
|
||||||
|
|
||||||
// build
|
|
||||||
func (m command) build() *cli.Command {
|
|
||||||
cfg := config{}
|
|
||||||
|
|
||||||
// Create the '' command
|
|
||||||
c := cli.Command{
|
|
||||||
Name: "create-symlinks",
|
|
||||||
Usage: "A hook to create symlinks in the container. This can be used to proces CSV mount specs",
|
|
||||||
Action: func(c *cli.Context) error {
|
|
||||||
return m.run(c, &cfg)
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
c.Flags = []cli.Flag{
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "host-root",
|
|
||||||
Usage: "The root on the host filesystem to use to resolve symlinks",
|
|
||||||
Destination: &cfg.hostRoot,
|
|
||||||
},
|
|
||||||
&cli.StringSliceFlag{
|
|
||||||
Name: "csv-filename",
|
|
||||||
Usage: "Specify a (CSV) filename to process",
|
|
||||||
Destination: &cfg.filenames,
|
|
||||||
},
|
|
||||||
&cli.StringSliceFlag{
|
|
||||||
Name: "link",
|
|
||||||
Usage: "Specify a specific link to create. The link is specified as target::link",
|
|
||||||
Destination: &cfg.links,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "container-spec",
|
|
||||||
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN",
|
|
||||||
Destination: &cfg.containerSpec,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
return &c
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m command) run(c *cli.Context, cfg *config) error {
|
|
||||||
s, err := oci.LoadContainerState(cfg.containerSpec)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to load container state: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
containerRoot, err := s.GetContainerRoot()
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to determined container root: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
csvFiles := cfg.filenames.Value()
|
|
||||||
|
|
||||||
chainLocator := lookup.NewSymlinkChainLocator(m.logger, cfg.hostRoot)
|
|
||||||
|
|
||||||
var candidates []string
|
|
||||||
for _, file := range csvFiles {
|
|
||||||
mountSpecs, err := csv.NewCSVFileParser(m.logger, file).Parse()
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Debugf("Skipping CSV file %v: %v", file, err)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, ms := range mountSpecs {
|
|
||||||
if ms.Type != csv.MountSpecSym {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
targets, err := chainLocator.Locate(ms.Path)
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Warnf("Failed to locate symlink %v", ms.Path)
|
|
||||||
}
|
|
||||||
candidates = append(candidates, targets...)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
created := make(map[string]bool)
|
|
||||||
// candidates is a list of absolute paths to symlinks in a chain, or the final target of the chain.
|
|
||||||
for _, candidate := range candidates {
|
|
||||||
targets, err := m.Locate(candidate)
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Debugf("Skipping invalid link: %v", err)
|
|
||||||
continue
|
|
||||||
} else if len(targets) != 1 {
|
|
||||||
m.logger.Debugf("Unexepected number of targets: %v", targets)
|
|
||||||
continue
|
|
||||||
} else if targets[0] == candidate {
|
|
||||||
m.logger.Debugf("%v is not a symlink", candidate)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
err = m.createLink(created, cfg.hostRoot, containerRoot, targets[0], candidate)
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Warnf("Failed to create link %v: %v", []string{targets[0], candidate}, err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
links := cfg.links.Value()
|
|
||||||
for _, l := range links {
|
|
||||||
parts := strings.Split(l, "::")
|
|
||||||
if len(parts) != 2 {
|
|
||||||
m.logger.Warnf("Invalid link specification %v", l)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
err := m.createLink(created, cfg.hostRoot, containerRoot, parts[0], parts[1])
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Warnf("Failed to create link %v: %v", parts, err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m command) createLink(created map[string]bool, hostRoot string, containerRoot string, target string, link string) error {
|
|
||||||
linkPath, err := changeRoot(hostRoot, containerRoot, link)
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Warnf("Failed to resolve path for link %v relative to %v: %v", link, containerRoot, err)
|
|
||||||
}
|
|
||||||
if created[linkPath] {
|
|
||||||
m.logger.Debugf("Link %v already created", linkPath)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
targetPath, err := changeRoot(hostRoot, "/", target)
|
|
||||||
if err != nil {
|
|
||||||
m.logger.Warnf("Failed to resolve path for target %v relative to %v: %v", target, "/", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
m.logger.Infof("Symlinking %v to %v", linkPath, targetPath)
|
|
||||||
err = os.MkdirAll(filepath.Dir(linkPath), 0755)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to create directory: %v", err)
|
|
||||||
}
|
|
||||||
err = os.Symlink(target, linkPath)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to create symlink: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func changeRoot(current string, new string, path string) (string, error) {
|
|
||||||
if !filepath.IsAbs(path) {
|
|
||||||
return path, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
relative := path
|
|
||||||
if current != "" {
|
|
||||||
r, err := filepath.Rel(current, path)
|
|
||||||
if err != nil {
|
|
||||||
return "", err
|
|
||||||
}
|
|
||||||
relative = r
|
|
||||||
}
|
|
||||||
|
|
||||||
return filepath.Join(new, relative), nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// Locate returns the link target of the specified filename or an empty slice if the
|
|
||||||
// specified filename is not a symlink.
|
|
||||||
func (m command) Locate(filename string) ([]string, error) {
|
|
||||||
info, err := os.Lstat(filename)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("failed to get file info: %v", info)
|
|
||||||
}
|
|
||||||
if info.Mode()&os.ModeSymlink == 0 {
|
|
||||||
m.logger.Debugf("%v is not a symlink", filename)
|
|
||||||
return nil, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
target, err := os.Readlink(filename)
|
|
||||||
if err != nil {
|
|
||||||
return nil, fmt.Errorf("error checking symlink: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
m.logger.Debugf("Resolved link: '%v' => '%v'", filename, target)
|
|
||||||
|
|
||||||
return []string{target}, nil
|
|
||||||
}
|
|
||||||
@@ -17,20 +17,20 @@
|
|||||||
package hook
|
package hook
|
||||||
|
|
||||||
import (
|
import (
|
||||||
chmod "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/hook/chmod"
|
"context"
|
||||||
|
|
||||||
symlinks "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/hook/create-symlinks"
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-cdi-hook/commands"
|
||||||
ldcache "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/hook/update-ldcache"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"github.com/urfave/cli/v2"
|
"github.com/urfave/cli/v3"
|
||||||
)
|
)
|
||||||
|
|
||||||
type hookCommand struct {
|
type hookCommand struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCommand constructs a hook command with the specified logger
|
// NewCommand constructs CLI subcommand for handling CDI hooks.
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
c := hookCommand{
|
c := hookCommand{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
@@ -39,17 +39,24 @@ func NewCommand(logger *logrus.Logger) *cli.Command {
|
|||||||
|
|
||||||
// build
|
// build
|
||||||
func (m hookCommand) build() *cli.Command {
|
func (m hookCommand) build() *cli.Command {
|
||||||
// Create the 'hook' command
|
// Create the 'hook' subcommand
|
||||||
hook := cli.Command{
|
hook := cli.Command{
|
||||||
Name: "hook",
|
Name: "hook",
|
||||||
Usage: "A collection of hooks that may be injected into an OCI spec",
|
Usage: "A collection of hooks that may be injected into an OCI spec",
|
||||||
|
// We set the default action for the `hook` subcommand to issue a
|
||||||
|
// warning and exit with no error.
|
||||||
|
// This means that if an unsupported hook is run, a container will not fail
|
||||||
|
// to launch. An unsupported hook could be the result of a CDI specification
|
||||||
|
// referring to a new hook that is not yet supported by an older NVIDIA
|
||||||
|
// Container Toolkit version or a hook that has been removed in newer
|
||||||
|
// version.
|
||||||
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
commands.IssueUnsupportedHookWarning(m.logger, cmd)
|
||||||
|
return nil
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
hook.Subcommands = []*cli.Command{
|
hook.Commands = commands.New(m.logger)
|
||||||
ldcache.NewCommand(m.logger),
|
|
||||||
symlinks.NewCommand(m.logger),
|
|
||||||
chmod.NewCommand(m.logger),
|
|
||||||
}
|
|
||||||
|
|
||||||
return &hook
|
return &hook
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,139 +0,0 @@
|
|||||||
/**
|
|
||||||
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
**/
|
|
||||||
|
|
||||||
package ldcache
|
|
||||||
|
|
||||||
import (
|
|
||||||
"fmt"
|
|
||||||
"os"
|
|
||||||
"path/filepath"
|
|
||||||
"syscall"
|
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/oci"
|
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
)
|
|
||||||
|
|
||||||
type command struct {
|
|
||||||
logger *logrus.Logger
|
|
||||||
}
|
|
||||||
|
|
||||||
type config struct {
|
|
||||||
folders cli.StringSlice
|
|
||||||
containerSpec string
|
|
||||||
}
|
|
||||||
|
|
||||||
// NewCommand constructs an update-ldcache command with the specified logger
|
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
|
||||||
c := command{
|
|
||||||
logger: logger,
|
|
||||||
}
|
|
||||||
return c.build()
|
|
||||||
}
|
|
||||||
|
|
||||||
// build the update-ldcache command
|
|
||||||
func (m command) build() *cli.Command {
|
|
||||||
cfg := config{}
|
|
||||||
|
|
||||||
// Create the 'update-ldcache' command
|
|
||||||
c := cli.Command{
|
|
||||||
Name: "update-ldcache",
|
|
||||||
Usage: "Update ldcache in a container by running ldconfig",
|
|
||||||
Action: func(c *cli.Context) error {
|
|
||||||
return m.run(c, &cfg)
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
c.Flags = []cli.Flag{
|
|
||||||
&cli.StringSliceFlag{
|
|
||||||
Name: "folder",
|
|
||||||
Usage: "Specifiy a folder to add to /etc/ld.so.conf before updating the ld cache",
|
|
||||||
Destination: &cfg.folders,
|
|
||||||
},
|
|
||||||
&cli.StringFlag{
|
|
||||||
Name: "container-spec",
|
|
||||||
Usage: "Specify the path to the OCI container spec. If empty or '-' the spec will be read from STDIN",
|
|
||||||
Destination: &cfg.containerSpec,
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
return &c
|
|
||||||
}
|
|
||||||
|
|
||||||
func (m command) run(c *cli.Context, cfg *config) error {
|
|
||||||
s, err := oci.LoadContainerState(cfg.containerSpec)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to load container state: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
containerRoot, err := s.GetContainerRoot()
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to determined container root: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
_, err = os.Stat(filepath.Join(containerRoot, "/etc/ld.so.cache"))
|
|
||||||
if err != nil && os.IsNotExist(err) {
|
|
||||||
m.logger.Debugf("No ld.so.cache found, skipping update")
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
err = m.createConfig(containerRoot, cfg.folders.Value())
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to update ld.so.conf: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
args := []string{"/sbin/ldconfig"}
|
|
||||||
if containerRoot != "" {
|
|
||||||
args = append(args, "-r", containerRoot)
|
|
||||||
}
|
|
||||||
|
|
||||||
return syscall.Exec(args[0], args, nil)
|
|
||||||
}
|
|
||||||
|
|
||||||
// createConfig creates (or updates) /etc/ld.so.conf.d/nvcr-<RANDOM_STRING>.conf in the container
|
|
||||||
// to include the required paths.
|
|
||||||
func (m command) createConfig(root string, folders []string) error {
|
|
||||||
if len(folders) == 0 {
|
|
||||||
m.logger.Debugf("No folders to add to /etc/ld.so.conf")
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
if err := os.MkdirAll(filepath.Join(root, "/etc/ld.so.conf.d"), 0755); err != nil {
|
|
||||||
return fmt.Errorf("failed to create ld.so.conf.d: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
configFile, err := os.CreateTemp(filepath.Join(root, "/etc/ld.so.conf.d"), "nvcr-*.conf")
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to create config file: %v", err)
|
|
||||||
}
|
|
||||||
defer configFile.Close()
|
|
||||||
|
|
||||||
m.logger.Debugf("Adding folders %v to %v", folders, configFile.Name())
|
|
||||||
|
|
||||||
configured := make(map[string]bool)
|
|
||||||
for _, folder := range folders {
|
|
||||||
if configured[folder] {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
_, err = configFile.WriteString(fmt.Sprintf("%s\n", folder))
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to update ld.so.conf.d: %v", err)
|
|
||||||
}
|
|
||||||
configured[folder] = true
|
|
||||||
}
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
@@ -17,16 +17,17 @@
|
|||||||
package info
|
package info
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/urfave/cli/v3"
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
)
|
)
|
||||||
|
|
||||||
type command struct {
|
type command struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCommand constructs an info command with the specified logger
|
// NewCommand constructs an info command with the specified logger
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
c := command{
|
c := command{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
@@ -35,13 +36,13 @@ func NewCommand(logger *logrus.Logger) *cli.Command {
|
|||||||
|
|
||||||
// build
|
// build
|
||||||
func (m command) build() *cli.Command {
|
func (m command) build() *cli.Command {
|
||||||
// Create the 'hook' command
|
// Create the 'info' command
|
||||||
hook := cli.Command{
|
info := cli.Command{
|
||||||
Name: "info",
|
Name: "info",
|
||||||
Usage: "Provide information about the system",
|
Usage: "Provide information about the system",
|
||||||
}
|
}
|
||||||
|
|
||||||
hook.Subcommands = []*cli.Command{}
|
info.Commands = []*cli.Command{}
|
||||||
|
|
||||||
return &hook
|
return &info
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -17,37 +17,43 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"os"
|
"os"
|
||||||
|
|
||||||
|
"github.com/sirupsen/logrus"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi"
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/cdi"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/config"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/hook"
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/hook"
|
||||||
infoCLI "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/info"
|
infoCLI "github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/info"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/runtime"
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/runtime"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/system"
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/system"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/info"
|
||||||
|
|
||||||
log "github.com/sirupsen/logrus"
|
cli "github.com/urfave/cli/v3"
|
||||||
cli "github.com/urfave/cli/v2"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var logger = log.New()
|
// options defines the options that can be set for the CLI through config files,
|
||||||
|
|
||||||
// config defines the options that can be set for the CLI through config files,
|
|
||||||
// environment variables, or command line flags
|
// environment variables, or command line flags
|
||||||
type config struct {
|
type options struct {
|
||||||
// Debug indicates whether the CLI is started in "debug" mode
|
// Debug indicates whether the CLI is started in "debug" mode
|
||||||
Debug bool
|
Debug bool
|
||||||
|
// Quiet indicates whether the CLI is started in "quiet" mode
|
||||||
|
Quiet bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
// Create a config struct to hold the parsed environment variables or command line flags
|
logger := logrus.New()
|
||||||
config := config{}
|
|
||||||
|
// Create a options struct to hold the parsed environment variables or command line flags
|
||||||
|
opts := options{}
|
||||||
|
|
||||||
// Create the top-level CLI
|
// Create the top-level CLI
|
||||||
c := cli.NewApp()
|
c := cli.Command{}
|
||||||
|
c.DisableSliceFlagSeparator = true
|
||||||
c.Name = "NVIDIA Container Toolkit CLI"
|
c.Name = "NVIDIA Container Toolkit CLI"
|
||||||
c.UseShortOptionHandling = true
|
c.UseShortOptionHandling = true
|
||||||
c.EnableBashCompletion = true
|
c.EnableShellCompletion = true
|
||||||
c.Usage = "Tools to configure the NVIDIA Container Toolkit"
|
c.Usage = "Tools to configure the NVIDIA Container Toolkit"
|
||||||
c.Version = info.GetVersionString()
|
c.Version = info.GetVersionString()
|
||||||
|
|
||||||
@@ -57,19 +63,28 @@ func main() {
|
|||||||
Name: "debug",
|
Name: "debug",
|
||||||
Aliases: []string{"d"},
|
Aliases: []string{"d"},
|
||||||
Usage: "Enable debug-level logging",
|
Usage: "Enable debug-level logging",
|
||||||
Destination: &config.Debug,
|
Destination: &opts.Debug,
|
||||||
EnvVars: []string{"NVIDIA_CTK_DEBUG"},
|
Sources: cli.EnvVars("NVIDIA_CTK_DEBUG"),
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "quiet",
|
||||||
|
Usage: "Suppress all output except for errors; overrides --debug",
|
||||||
|
Destination: &opts.Quiet,
|
||||||
|
Sources: cli.EnvVars("NVIDIA_CTK_QUIET"),
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
// Set log-level for all subcommands
|
// Set log-level for all subcommands
|
||||||
c.Before = func(c *cli.Context) error {
|
c.Before = func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
logLevel := log.InfoLevel
|
logLevel := logrus.InfoLevel
|
||||||
if config.Debug {
|
if opts.Debug {
|
||||||
logLevel = log.DebugLevel
|
logLevel = logrus.DebugLevel
|
||||||
|
}
|
||||||
|
if opts.Quiet {
|
||||||
|
logLevel = logrus.ErrorLevel
|
||||||
}
|
}
|
||||||
logger.SetLevel(logLevel)
|
logger.SetLevel(logLevel)
|
||||||
return nil
|
return ctx, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Define the subcommands
|
// Define the subcommands
|
||||||
@@ -79,12 +94,13 @@ func main() {
|
|||||||
infoCLI.NewCommand(logger),
|
infoCLI.NewCommand(logger),
|
||||||
cdi.NewCommand(logger),
|
cdi.NewCommand(logger),
|
||||||
system.NewCommand(logger),
|
system.NewCommand(logger),
|
||||||
|
config.NewCommand(logger),
|
||||||
}
|
}
|
||||||
|
|
||||||
// Run the CLI
|
// Run the CLI
|
||||||
err := c.Run(os.Args)
|
err := c.Run(context.Background(), os.Args)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Errorf("%v", err)
|
logger.Errorf("%v", err)
|
||||||
log.Exit(1)
|
os.Exit(1)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -17,31 +17,46 @@
|
|||||||
package configure
|
package configure
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"encoding/json"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"path/filepath"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/runtime/nvidia"
|
"github.com/urfave/cli/v3"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/engine/crio"
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/config/engine/docker"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
"github.com/pelletier/go-toml"
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine"
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/containerd"
|
||||||
"github.com/urfave/cli/v2"
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/crio"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine/docker"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/ocihook"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/toml"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
defaultRuntime = "docker"
|
defaultRuntime = "docker"
|
||||||
|
|
||||||
defaultDockerConfigFilePath = "/etc/docker/daemon.json"
|
// defaultNVIDIARuntimeName is the default name to use in configs for the NVIDIA Container Runtime
|
||||||
defaultCrioConfigFilePath = "/etc/crio/crio.conf"
|
defaultNVIDIARuntimeName = "nvidia"
|
||||||
|
// defaultNVIDIARuntimeExecutable is the default NVIDIA Container Runtime executable file name
|
||||||
|
defaultNVIDIARuntimeExecutable = "nvidia-container-runtime"
|
||||||
|
defaultNVIDIARuntimeExpecutablePath = "/usr/bin/nvidia-container-runtime"
|
||||||
|
defaultNVIDIARuntimeHookExpecutablePath = "/usr/bin/nvidia-container-runtime-hook"
|
||||||
|
|
||||||
|
defaultContainerdConfigFilePath = "/etc/containerd/config.toml"
|
||||||
|
defaultCrioConfigFilePath = "/etc/crio/crio.conf"
|
||||||
|
defaultDockerConfigFilePath = "/etc/docker/daemon.json"
|
||||||
|
|
||||||
|
defaultConfigSource = configSourceFile
|
||||||
|
configSourceCommand = "command"
|
||||||
|
configSourceFile = "file"
|
||||||
)
|
)
|
||||||
|
|
||||||
type command struct {
|
type command struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCommand constructs an configure command with the specified logger
|
// NewCommand constructs a configure command with the specified logger
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
c := command{
|
c := command{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
@@ -54,7 +69,22 @@ type config struct {
|
|||||||
dryRun bool
|
dryRun bool
|
||||||
runtime string
|
runtime string
|
||||||
configFilePath string
|
configFilePath string
|
||||||
nvidiaOptions nvidia.Options
|
executablePath string
|
||||||
|
configSource string
|
||||||
|
mode string
|
||||||
|
hookFilePath string
|
||||||
|
|
||||||
|
nvidiaRuntime struct {
|
||||||
|
name string
|
||||||
|
path string
|
||||||
|
hookPath string
|
||||||
|
setAsDefault bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// cdi-specific options
|
||||||
|
cdi struct {
|
||||||
|
enabled bool
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m command) build() *cli.Command {
|
func (m command) build() *cli.Command {
|
||||||
@@ -65,8 +95,11 @@ func (m command) build() *cli.Command {
|
|||||||
configure := cli.Command{
|
configure := cli.Command{
|
||||||
Name: "configure",
|
Name: "configure",
|
||||||
Usage: "Add a runtime to the specified container engine",
|
Usage: "Add a runtime to the specified container engine",
|
||||||
Action: func(c *cli.Context) error {
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
return m.configureWrapper(c, &config)
|
return ctx, m.validateFlags(cmd, &config)
|
||||||
|
},
|
||||||
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
|
return m.configureWrapper(cmd, &config)
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -78,7 +111,7 @@ func (m command) build() *cli.Command {
|
|||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "runtime",
|
Name: "runtime",
|
||||||
Usage: "the target runtime engine. One of [crio, docker]",
|
Usage: "the target runtime engine; one of [containerd, crio, docker]",
|
||||||
Value: defaultRuntime,
|
Value: defaultRuntime,
|
||||||
Destination: &config.runtime,
|
Destination: &config.runtime,
|
||||||
},
|
},
|
||||||
@@ -88,126 +121,240 @@ func (m command) build() *cli.Command {
|
|||||||
Destination: &config.configFilePath,
|
Destination: &config.configFilePath,
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "nvidia-runtime-name",
|
Name: "executable-path",
|
||||||
Usage: "specify the name of the NVIDIA runtime that will be added",
|
Usage: "The path to the runtime executable. This is used to extract the current config",
|
||||||
Value: nvidia.RuntimeName,
|
Destination: &config.executablePath,
|
||||||
Destination: &config.nvidiaOptions.RuntimeName,
|
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "runtime-path",
|
Name: "config-mode",
|
||||||
|
Usage: "the config mode for runtimes that support multiple configuration mechanisms",
|
||||||
|
Destination: &config.mode,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "config-source",
|
||||||
|
Usage: "the source to retrieve the container runtime configuration; one of [command, file]\"",
|
||||||
|
Destination: &config.configSource,
|
||||||
|
Value: defaultConfigSource,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "oci-hook-path",
|
||||||
|
Usage: "the path to the OCI runtime hook to create if --config-mode=oci-hook is specified. If no path is specified, the generated hook is output to STDOUT.\n\tNote: The use of OCI hooks is deprecated.",
|
||||||
|
Destination: &config.hookFilePath,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-runtime-name",
|
||||||
|
Usage: "specify the name of the NVIDIA runtime that will be added",
|
||||||
|
Value: defaultNVIDIARuntimeName,
|
||||||
|
Destination: &config.nvidiaRuntime.name,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-runtime-path",
|
||||||
|
Aliases: []string{"runtime-path"},
|
||||||
Usage: "specify the path to the NVIDIA runtime executable",
|
Usage: "specify the path to the NVIDIA runtime executable",
|
||||||
Value: nvidia.RuntimeExecutable,
|
Value: defaultNVIDIARuntimeExecutable,
|
||||||
Destination: &config.nvidiaOptions.RuntimePath,
|
Destination: &config.nvidiaRuntime.path,
|
||||||
|
},
|
||||||
|
&cli.StringFlag{
|
||||||
|
Name: "nvidia-runtime-hook-path",
|
||||||
|
Usage: "specify the path to the NVIDIA Container Runtime hook executable",
|
||||||
|
Value: defaultNVIDIARuntimeHookExpecutablePath,
|
||||||
|
Destination: &config.nvidiaRuntime.hookPath,
|
||||||
},
|
},
|
||||||
&cli.BoolFlag{
|
&cli.BoolFlag{
|
||||||
Name: "set-as-default",
|
Name: "nvidia-set-as-default",
|
||||||
Usage: "set the specified runtime as the default runtime",
|
Aliases: []string{"set-as-default"},
|
||||||
Destination: &config.nvidiaOptions.SetAsDefault,
|
Usage: "set the NVIDIA runtime as the default runtime",
|
||||||
|
Destination: &config.nvidiaRuntime.setAsDefault,
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "cdi.enabled",
|
||||||
|
Aliases: []string{"cdi.enable", "enable-cdi"},
|
||||||
|
Usage: "Enable CDI in the configured runtime",
|
||||||
|
Destination: &config.cdi.enabled,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
return &configure
|
return &configure
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m command) configureWrapper(c *cli.Context, config *config) error {
|
func (m command) validateFlags(c *cli.Command, config *config) error {
|
||||||
|
if config.mode == "oci-hook" {
|
||||||
|
if !filepath.IsAbs(config.nvidiaRuntime.hookPath) {
|
||||||
|
return fmt.Errorf("the NVIDIA runtime hook path %q is not an absolute path", config.nvidiaRuntime.hookPath)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if config.mode != "" && config.mode != "config-file" {
|
||||||
|
m.logger.Warningf("Ignoring unsupported config mode for %v: %q", config.runtime, config.mode)
|
||||||
|
}
|
||||||
|
config.mode = "config-file"
|
||||||
|
|
||||||
switch config.runtime {
|
switch config.runtime {
|
||||||
|
case "containerd", "crio", "docker":
|
||||||
|
break
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("unrecognized runtime '%v'", config.runtime)
|
||||||
|
}
|
||||||
|
|
||||||
|
switch config.runtime {
|
||||||
|
case "containerd", "crio":
|
||||||
|
if config.nvidiaRuntime.path == defaultNVIDIARuntimeExecutable {
|
||||||
|
config.nvidiaRuntime.path = defaultNVIDIARuntimeExpecutablePath
|
||||||
|
}
|
||||||
|
if !filepath.IsAbs(config.nvidiaRuntime.path) {
|
||||||
|
return fmt.Errorf("the NVIDIA runtime path %q is not an absolute path", config.nvidiaRuntime.path)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.runtime != "containerd" && config.runtime != "docker" {
|
||||||
|
if config.cdi.enabled {
|
||||||
|
m.logger.Warningf("Ignoring cdi.enabled flag for %v", config.runtime)
|
||||||
|
}
|
||||||
|
config.cdi.enabled = false
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.executablePath != "" && config.runtime == "docker" {
|
||||||
|
m.logger.Warningf("Ignoring executable-path=%q flag for %v", config.executablePath, config.runtime)
|
||||||
|
config.executablePath = ""
|
||||||
|
}
|
||||||
|
|
||||||
|
switch config.configSource {
|
||||||
|
case configSourceCommand:
|
||||||
|
if config.runtime == "docker" {
|
||||||
|
m.logger.Warningf("A %v Config Source is not supported for %v; using %v", config.configSource, config.runtime, configSourceFile)
|
||||||
|
config.configSource = configSourceFile
|
||||||
|
}
|
||||||
|
case configSourceFile:
|
||||||
|
break
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("unrecognized Config Source: %v", config.configSource)
|
||||||
|
}
|
||||||
|
|
||||||
|
if config.configFilePath == "" {
|
||||||
|
switch config.runtime {
|
||||||
|
case "containerd":
|
||||||
|
config.configFilePath = defaultContainerdConfigFilePath
|
||||||
|
case "crio":
|
||||||
|
config.configFilePath = defaultCrioConfigFilePath
|
||||||
|
case "docker":
|
||||||
|
config.configFilePath = defaultDockerConfigFilePath
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// configureWrapper updates the specified container engine config to enable the NVIDIA runtime
|
||||||
|
func (m command) configureWrapper(c *cli.Command, config *config) error {
|
||||||
|
switch config.mode {
|
||||||
|
case "oci-hook":
|
||||||
|
return m.configureOCIHook(c, config)
|
||||||
|
case "config-file":
|
||||||
|
return m.configureConfigFile(c, config)
|
||||||
|
}
|
||||||
|
return fmt.Errorf("unsupported config-mode: %v", config.mode)
|
||||||
|
}
|
||||||
|
|
||||||
|
// configureConfigFile updates the specified container engine config file to enable the NVIDIA runtime.
|
||||||
|
func (m command) configureConfigFile(c *cli.Command, config *config) error {
|
||||||
|
configSource, err := config.resolveConfigSource()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
var cfg engine.Interface
|
||||||
|
switch config.runtime {
|
||||||
|
case "containerd":
|
||||||
|
cfg, err = containerd.New(
|
||||||
|
containerd.WithLogger(m.logger),
|
||||||
|
containerd.WithPath(config.configFilePath),
|
||||||
|
containerd.WithConfigSource(configSource),
|
||||||
|
)
|
||||||
case "crio":
|
case "crio":
|
||||||
return m.configureCrio(c, config)
|
cfg, err = crio.New(
|
||||||
|
crio.WithLogger(m.logger),
|
||||||
|
crio.WithPath(config.configFilePath),
|
||||||
|
crio.WithConfigSource(configSource),
|
||||||
|
)
|
||||||
case "docker":
|
case "docker":
|
||||||
return m.configureDocker(c, config)
|
cfg, err = docker.New(
|
||||||
|
docker.WithLogger(m.logger),
|
||||||
|
docker.WithPath(config.configFilePath),
|
||||||
|
)
|
||||||
|
default:
|
||||||
|
err = fmt.Errorf("unrecognized runtime '%v'", config.runtime)
|
||||||
}
|
}
|
||||||
|
if err != nil || cfg == nil {
|
||||||
return fmt.Errorf("unrecognized runtime '%v'", config.runtime)
|
return fmt.Errorf("unable to load config for runtime %v: %v", config.runtime, err)
|
||||||
}
|
|
||||||
|
|
||||||
// configureDocker updates the docker config to enable the NVIDIA Container Runtime
|
|
||||||
func (m command) configureDocker(c *cli.Context, config *config) error {
|
|
||||||
configFilePath := config.configFilePath
|
|
||||||
if configFilePath == "" {
|
|
||||||
configFilePath = defaultDockerConfigFilePath
|
|
||||||
}
|
|
||||||
|
|
||||||
cfg, err := docker.New(
|
|
||||||
docker.WithPath(configFilePath),
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("unable to load config: %v", err)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
err = cfg.AddRuntime(
|
err = cfg.AddRuntime(
|
||||||
config.nvidiaOptions.RuntimeName,
|
config.nvidiaRuntime.name,
|
||||||
config.nvidiaOptions.RuntimePath,
|
config.nvidiaRuntime.path,
|
||||||
config.nvidiaOptions.SetAsDefault,
|
config.nvidiaRuntime.setAsDefault,
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("unable to update config: %v", err)
|
return fmt.Errorf("unable to update config: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if config.dryRun {
|
if config.cdi.enabled {
|
||||||
output, err := json.MarshalIndent(cfg, "", " ")
|
cfg.EnableCDI()
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("unable to convert to JSON: %v", err)
|
|
||||||
}
|
|
||||||
os.Stdout.WriteString(fmt.Sprintf("%s\n", output))
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
n, err := cfg.Save(configFilePath)
|
|
||||||
|
outputPath := config.getOutputConfigPath()
|
||||||
|
n, err := cfg.Save(outputPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("unable to flush config: %v", err)
|
return fmt.Errorf("unable to flush config: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if n == 0 {
|
if outputPath != "" {
|
||||||
m.logger.Infof("Removed empty config from %v", configFilePath)
|
if n == 0 {
|
||||||
} else {
|
m.logger.Infof("Removed empty config from %v", outputPath)
|
||||||
m.logger.Infof("Wrote updated config to %v", configFilePath)
|
} else {
|
||||||
}
|
m.logger.Infof("Wrote updated config to %v", outputPath)
|
||||||
m.logger.Infof("It is recommended that the docker daemon be restarted.")
|
|
||||||
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
// configureCrio updates the crio config to enable the NVIDIA Container Runtime
|
|
||||||
func (m command) configureCrio(c *cli.Context, config *config) error {
|
|
||||||
configFilePath := config.configFilePath
|
|
||||||
if configFilePath == "" {
|
|
||||||
configFilePath = defaultCrioConfigFilePath
|
|
||||||
}
|
|
||||||
|
|
||||||
cfg, err := crio.New(
|
|
||||||
crio.WithPath(configFilePath),
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("unable to load config: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
err = cfg.AddRuntime(
|
|
||||||
config.nvidiaOptions.RuntimeName,
|
|
||||||
config.nvidiaOptions.RuntimePath,
|
|
||||||
config.nvidiaOptions.SetAsDefault,
|
|
||||||
)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("unable to update config: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if config.dryRun {
|
|
||||||
output, err := toml.Marshal(cfg)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("unable to convert to TOML: %v", err)
|
|
||||||
}
|
}
|
||||||
os.Stdout.WriteString(fmt.Sprintf("%s\n", output))
|
m.logger.Infof("It is recommended that %v daemon be restarted.", config.runtime)
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
n, err := cfg.Save(configFilePath)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("unable to flush config: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if n == 0 {
|
|
||||||
m.logger.Infof("Removed empty config from %v", configFilePath)
|
|
||||||
} else {
|
|
||||||
m.logger.Infof("Wrote updated config to %v", configFilePath)
|
|
||||||
}
|
|
||||||
m.logger.Infof("It is recommended that the cri-o daemon be restarted.")
|
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// resolveConfigSource returns the default config source or the user provided config source
|
||||||
|
func (c *config) resolveConfigSource() (toml.Loader, error) {
|
||||||
|
switch c.configSource {
|
||||||
|
case configSourceCommand:
|
||||||
|
return c.getCommandConfigSource(), nil
|
||||||
|
case configSourceFile:
|
||||||
|
return toml.FromFile(c.configFilePath), nil
|
||||||
|
default:
|
||||||
|
return nil, fmt.Errorf("unrecognized config source: %s", c.configSource)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// getConfigSourceCommand returns the default cli command to fetch the current runtime config
|
||||||
|
func (c *config) getCommandConfigSource() toml.Loader {
|
||||||
|
switch c.runtime {
|
||||||
|
case "containerd":
|
||||||
|
return containerd.CommandLineSource("", c.executablePath)
|
||||||
|
case "crio":
|
||||||
|
return crio.CommandLineSource("", c.executablePath)
|
||||||
|
}
|
||||||
|
return toml.Empty
|
||||||
|
}
|
||||||
|
|
||||||
|
// getOutputConfigPath returns the configured config path or "" if dry-run is enabled
|
||||||
|
func (c *config) getOutputConfigPath() string {
|
||||||
|
if c.dryRun {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
return c.configFilePath
|
||||||
|
}
|
||||||
|
|
||||||
|
// configureOCIHook creates and configures the OCI hook for the NVIDIA runtime
|
||||||
|
func (m *command) configureOCIHook(c *cli.Command, config *config) error {
|
||||||
|
err := ocihook.CreateHook(config.hookFilePath, config.nvidiaRuntime.hookPath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("error creating OCI hook: %v", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|||||||
@@ -1,75 +0,0 @@
|
|||||||
/*
|
|
||||||
# Copyright (c) 2022, NVIDIA CORPORATION. All rights reserved.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package nvidia
|
|
||||||
|
|
||||||
const (
|
|
||||||
// RuntimeName is the default name to use in configs for the NVIDIA Container Runtime
|
|
||||||
RuntimeName = "nvidia"
|
|
||||||
// RuntimeExecutable is the default NVIDIA Container Runtime executable file name
|
|
||||||
RuntimeExecutable = "nvidia-container-runtime"
|
|
||||||
)
|
|
||||||
|
|
||||||
// Options specifies the options for the NVIDIA Container Runtime w.r.t a container engine such as docker.
|
|
||||||
type Options struct {
|
|
||||||
SetAsDefault bool
|
|
||||||
RuntimeName string
|
|
||||||
RuntimePath string
|
|
||||||
}
|
|
||||||
|
|
||||||
// Runtime defines an NVIDIA runtime with a name and a executable
|
|
||||||
type Runtime struct {
|
|
||||||
Name string
|
|
||||||
Path string
|
|
||||||
}
|
|
||||||
|
|
||||||
// DefaultRuntime returns the default runtime for the configured options.
|
|
||||||
// If the configuration is invalid or the default runtimes should not be set
|
|
||||||
// the empty string is returned.
|
|
||||||
func (o Options) DefaultRuntime() string {
|
|
||||||
if !o.SetAsDefault {
|
|
||||||
return ""
|
|
||||||
}
|
|
||||||
|
|
||||||
return o.RuntimeName
|
|
||||||
}
|
|
||||||
|
|
||||||
// Runtime creates a runtime struct based on the options.
|
|
||||||
func (o Options) Runtime() Runtime {
|
|
||||||
path := o.RuntimePath
|
|
||||||
|
|
||||||
if o.RuntimePath == "" {
|
|
||||||
path = RuntimeExecutable
|
|
||||||
}
|
|
||||||
|
|
||||||
r := Runtime{
|
|
||||||
Name: o.RuntimeName,
|
|
||||||
Path: path,
|
|
||||||
}
|
|
||||||
|
|
||||||
return r
|
|
||||||
}
|
|
||||||
|
|
||||||
// DockerRuntimesConfig generatest the expected docker config for the specified runtime
|
|
||||||
func (r Runtime) DockerRuntimesConfig() map[string]interface{} {
|
|
||||||
runtimes := make(map[string]interface{})
|
|
||||||
runtimes[r.Name] = map[string]interface{}{
|
|
||||||
"path": r.Path,
|
|
||||||
"args": []string{},
|
|
||||||
}
|
|
||||||
|
|
||||||
return runtimes
|
|
||||||
}
|
|
||||||
@@ -17,17 +17,18 @@
|
|||||||
package runtime
|
package runtime
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"github.com/urfave/cli/v3"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/runtime/configure"
|
"github.com/NVIDIA/nvidia-container-toolkit/cmd/nvidia-ctk/runtime/configure"
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
"github.com/urfave/cli/v2"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type runtimeCommand struct {
|
type runtimeCommand struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCommand constructs a runtime command with the specified logger
|
// NewCommand constructs a runtime command with the specified logger
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
c := runtimeCommand{
|
c := runtimeCommand{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
@@ -41,7 +42,7 @@ func (m runtimeCommand) build() *cli.Command {
|
|||||||
Usage: "A collection of runtime-related utilities for the NVIDIA Container Toolkit",
|
Usage: "A collection of runtime-related utilities for the NVIDIA Container Toolkit",
|
||||||
}
|
}
|
||||||
|
|
||||||
runtime.Subcommands = []*cli.Command{
|
runtime.Commands = []*cli.Command{
|
||||||
configure.NewCommand(m.logger),
|
configure.NewCommand(m.logger),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -20,37 +20,49 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/NVIDIA/go-nvlib/pkg/nvpci"
|
||||||
|
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/info/proc/devices"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/info/proc/devices"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
"github.com/NVIDIA/nvidia-container-toolkit/internal/nvcaps"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/nvcaps"
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"gitlab.com/nvidia/cloud-native/go-nvlib/pkg/nvpci"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type allPossible struct {
|
type allPossible struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
driverRoot string
|
devRoot string
|
||||||
deviceMajors devices.Devices
|
deviceMajors devices.Devices
|
||||||
migCaps nvcaps.MigCaps
|
migCaps nvcaps.MigCaps
|
||||||
}
|
}
|
||||||
|
|
||||||
// newAllPossible returns a new allPossible device node lister.
|
// newAllPossible returns a new allPossible device node lister.
|
||||||
// This lister lists all possible device nodes for NVIDIA GPUs, control devices, and capability devices.
|
// This lister lists all possible device nodes for NVIDIA GPUs, control devices, and capability devices.
|
||||||
func newAllPossible(logger *logrus.Logger, driverRoot string) (nodeLister, error) {
|
func newAllPossible(logger logger.Interface, devRoot string) (nodeLister, error) {
|
||||||
deviceMajors, err := devices.GetNVIDIADevices()
|
deviceMajors, err := devices.GetNVIDIADevices()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed reading device majors: %v", err)
|
return nil, fmt.Errorf("failed reading device majors: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
var requiredMajors []devices.Name
|
||||||
migCaps, err := nvcaps.NewMigCaps()
|
migCaps, err := nvcaps.NewMigCaps()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to read MIG caps: %v", err)
|
return nil, fmt.Errorf("failed to read MIG caps: %v", err)
|
||||||
}
|
}
|
||||||
if migCaps == nil {
|
if migCaps == nil {
|
||||||
migCaps = make(nvcaps.MigCaps)
|
migCaps = make(nvcaps.MigCaps)
|
||||||
|
} else {
|
||||||
|
requiredMajors = append(requiredMajors, devices.NVIDIACaps)
|
||||||
|
}
|
||||||
|
|
||||||
|
requiredMajors = append(requiredMajors, devices.NVIDIAGPU, devices.NVIDIAUVM)
|
||||||
|
for _, name := range requiredMajors {
|
||||||
|
if !deviceMajors.Exists(name) {
|
||||||
|
return nil, fmt.Errorf("missing required device major %s", name)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
l := allPossible{
|
l := allPossible{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
driverRoot: driverRoot,
|
devRoot: devRoot,
|
||||||
deviceMajors: deviceMajors,
|
deviceMajors: deviceMajors,
|
||||||
migCaps: migCaps,
|
migCaps: migCaps,
|
||||||
}
|
}
|
||||||
@@ -60,8 +72,9 @@ func newAllPossible(logger *logrus.Logger, driverRoot string) (nodeLister, error
|
|||||||
|
|
||||||
// DeviceNodes returns a list of all possible device nodes for NVIDIA GPUs, control devices, and capability devices.
|
// DeviceNodes returns a list of all possible device nodes for NVIDIA GPUs, control devices, and capability devices.
|
||||||
func (m allPossible) DeviceNodes() ([]deviceNode, error) {
|
func (m allPossible) DeviceNodes() ([]deviceNode, error) {
|
||||||
gpus, err := nvpci.NewFrom(
|
gpus, err := nvpci.New(
|
||||||
filepath.Join(m.driverRoot, nvpci.PCIDevicesRoot),
|
nvpci.WithPCIDevicesRoot(filepath.Join(m.devRoot, nvpci.PCIDevicesRoot)),
|
||||||
|
nvpci.WithLogger(m.logger),
|
||||||
).GetGPUs()
|
).GetGPUs()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to get GPU information: %v", err)
|
return nil, fmt.Errorf("failed to get GPU information: %v", err)
|
||||||
@@ -69,7 +82,7 @@ func (m allPossible) DeviceNodes() ([]deviceNode, error) {
|
|||||||
|
|
||||||
count := len(gpus)
|
count := len(gpus)
|
||||||
if count == 0 {
|
if count == 0 {
|
||||||
m.logger.Infof("No NVIDIA devices found in %s", m.driverRoot)
|
m.logger.Infof("No NVIDIA devices found in %s", m.devRoot)
|
||||||
return nil, nil
|
return nil, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -168,7 +181,7 @@ func (m allPossible) newDeviceNode(deviceName devices.Name, path string, minor i
|
|||||||
major, _ := m.deviceMajors.Get(deviceName)
|
major, _ := m.deviceMajors.Get(deviceName)
|
||||||
|
|
||||||
return deviceNode{
|
return deviceNode{
|
||||||
path: filepath.Join(m.driverRoot, path),
|
path: filepath.Join(m.devRoot, path),
|
||||||
major: uint32(major),
|
major: uint32(major),
|
||||||
minor: uint32(minor),
|
minor: uint32(minor),
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -17,16 +17,16 @@
|
|||||||
package devchar
|
package devchar
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"os/signal"
|
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"strings"
|
|
||||||
"syscall"
|
|
||||||
|
|
||||||
"github.com/fsnotify/fsnotify"
|
"github.com/urfave/cli/v3"
|
||||||
"github.com/sirupsen/logrus"
|
|
||||||
"github.com/urfave/cli/v2"
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/logger"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/system/nvdevices"
|
||||||
|
"github.com/NVIDIA/nvidia-container-toolkit/internal/system/nvmodules"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
@@ -34,19 +34,20 @@ const (
|
|||||||
)
|
)
|
||||||
|
|
||||||
type command struct {
|
type command struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
}
|
}
|
||||||
|
|
||||||
type config struct {
|
type config struct {
|
||||||
devCharPath string
|
devCharPath string
|
||||||
driverRoot string
|
driverRoot string
|
||||||
dryRun bool
|
dryRun bool
|
||||||
watch bool
|
createAll bool
|
||||||
createAll bool
|
createDeviceNodes bool
|
||||||
|
loadKernelModules bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewCommand constructs a command sub-command with the specified logger
|
// NewCommand constructs a command sub-command with the specified logger
|
||||||
func NewCommand(logger *logrus.Logger) *cli.Command {
|
func NewCommand(logger logger.Interface) *cli.Command {
|
||||||
c := command{
|
c := command{
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
@@ -61,11 +62,11 @@ func (m command) build() *cli.Command {
|
|||||||
c := cli.Command{
|
c := cli.Command{
|
||||||
Name: "create-dev-char-symlinks",
|
Name: "create-dev-char-symlinks",
|
||||||
Usage: "A utility to create symlinks to possible /dev/nv* devices in /dev/char",
|
Usage: "A utility to create symlinks to possible /dev/nv* devices in /dev/char",
|
||||||
Before: func(c *cli.Context) error {
|
Before: func(ctx context.Context, cmd *cli.Command) (context.Context, error) {
|
||||||
return m.validateFlags(c, &cfg)
|
return ctx, m.validateFlags(cmd, &cfg)
|
||||||
},
|
},
|
||||||
Action: func(c *cli.Context) error {
|
Action: func(ctx context.Context, cmd *cli.Command) error {
|
||||||
return m.run(c, &cfg)
|
return m.run(cmd, &cfg)
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -75,123 +76,94 @@ func (m command) build() *cli.Command {
|
|||||||
Usage: "The path at which the symlinks will be created. Symlinks will be created as `DEV_CHAR`/MAJOR:MINOR where MAJOR and MINOR are the major and minor numbers of a corresponding device node.",
|
Usage: "The path at which the symlinks will be created. Symlinks will be created as `DEV_CHAR`/MAJOR:MINOR where MAJOR and MINOR are the major and minor numbers of a corresponding device node.",
|
||||||
Value: defaultDevCharPath,
|
Value: defaultDevCharPath,
|
||||||
Destination: &cfg.devCharPath,
|
Destination: &cfg.devCharPath,
|
||||||
EnvVars: []string{"DEV_CHAR_PATH"},
|
Sources: cli.EnvVars("DEV_CHAR_PATH"),
|
||||||
},
|
},
|
||||||
&cli.StringFlag{
|
&cli.StringFlag{
|
||||||
Name: "driver-root",
|
Name: "driver-root",
|
||||||
Usage: "The path to the driver root. `DRIVER_ROOT`/dev is searched for NVIDIA device nodes.",
|
Usage: "The path to the driver root. `DRIVER_ROOT`/dev is searched for NVIDIA device nodes.",
|
||||||
Value: "/",
|
Value: "/",
|
||||||
Destination: &cfg.driverRoot,
|
Destination: &cfg.driverRoot,
|
||||||
EnvVars: []string{"DRIVER_ROOT"},
|
Sources: cli.EnvVars("NVIDIA_DRIVER_ROOT", "DRIVER_ROOT"),
|
||||||
},
|
|
||||||
&cli.BoolFlag{
|
|
||||||
Name: "watch",
|
|
||||||
Usage: "If set, the command will watch for changes to the driver root and recreate the symlinks when changes are detected.",
|
|
||||||
Value: false,
|
|
||||||
Destination: &cfg.watch,
|
|
||||||
EnvVars: []string{"WATCH"},
|
|
||||||
},
|
},
|
||||||
&cli.BoolFlag{
|
&cli.BoolFlag{
|
||||||
Name: "create-all",
|
Name: "create-all",
|
||||||
Usage: "Create all possible /dev/char symlinks instead of limiting these to existing device nodes.",
|
Usage: "Create all possible /dev/char symlinks instead of limiting these to existing device nodes.",
|
||||||
Destination: &cfg.createAll,
|
Destination: &cfg.createAll,
|
||||||
EnvVars: []string{"CREATE_ALL"},
|
Sources: cli.EnvVars("CREATE_ALL"),
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "load-kernel-modules",
|
||||||
|
Usage: "Load the NVIDIA kernel modules before creating symlinks. This is only applicable when --create-all is set.",
|
||||||
|
Destination: &cfg.loadKernelModules,
|
||||||
|
Sources: cli.EnvVars("LOAD_KERNEL_MODULES"),
|
||||||
|
},
|
||||||
|
&cli.BoolFlag{
|
||||||
|
Name: "create-device-nodes",
|
||||||
|
Usage: "Create the NVIDIA control device nodes in the driver root if they do not exist. This is only applicable when --create-all is set",
|
||||||
|
Destination: &cfg.createDeviceNodes,
|
||||||
|
Sources: cli.EnvVars("CREATE_DEVICE_NODES"),
|
||||||
},
|
},
|
||||||
&cli.BoolFlag{
|
&cli.BoolFlag{
|
||||||
Name: "dry-run",
|
Name: "dry-run",
|
||||||
Usage: "If set, the command will not create any symlinks.",
|
Usage: "If set, the command will not create any symlinks.",
|
||||||
Value: false,
|
Value: false,
|
||||||
Destination: &cfg.dryRun,
|
Destination: &cfg.dryRun,
|
||||||
EnvVars: []string{"DRY_RUN"},
|
Sources: cli.EnvVars("DRY_RUN"),
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
return &c
|
return &c
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m command) validateFlags(r *cli.Context, cfg *config) error {
|
func (m command) validateFlags(r *cli.Command, cfg *config) error {
|
||||||
if cfg.createAll && cfg.watch {
|
if cfg.createAll {
|
||||||
return fmt.Errorf("create-all and watch are mutually exclusive")
|
return fmt.Errorf("create-all and watch are mutually exclusive")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if cfg.loadKernelModules && !cfg.createAll {
|
||||||
|
m.logger.Warning("load-kernel-modules is only applicable when create-all is set; ignoring")
|
||||||
|
cfg.loadKernelModules = false
|
||||||
|
}
|
||||||
|
|
||||||
|
if cfg.createDeviceNodes && !cfg.createAll {
|
||||||
|
m.logger.Warning("create-device-nodes is only applicable when create-all is set; ignoring")
|
||||||
|
cfg.createDeviceNodes = false
|
||||||
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m command) run(c *cli.Context, cfg *config) error {
|
func (m command) run(c *cli.Command, cfg *config) error {
|
||||||
var watcher *fsnotify.Watcher
|
|
||||||
var sigs chan os.Signal
|
|
||||||
|
|
||||||
if cfg.watch {
|
|
||||||
watcher, err := newFSWatcher(filepath.Join(cfg.driverRoot, "dev"))
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to create FS watcher: %v", err)
|
|
||||||
}
|
|
||||||
defer watcher.Close()
|
|
||||||
|
|
||||||
sigs = newOSWatcher(syscall.SIGHUP, syscall.SIGINT, syscall.SIGTERM, syscall.SIGQUIT)
|
|
||||||
}
|
|
||||||
|
|
||||||
l, err := NewSymlinkCreator(
|
l, err := NewSymlinkCreator(
|
||||||
WithLogger(m.logger),
|
WithLogger(m.logger),
|
||||||
WithDevCharPath(cfg.devCharPath),
|
WithDevCharPath(cfg.devCharPath),
|
||||||
WithDriverRoot(cfg.driverRoot),
|
WithDriverRoot(cfg.driverRoot),
|
||||||
WithDryRun(cfg.dryRun),
|
WithDryRun(cfg.dryRun),
|
||||||
WithCreateAll(cfg.createAll),
|
WithCreateAll(cfg.createAll),
|
||||||
|
WithLoadKernelModules(cfg.loadKernelModules),
|
||||||
|
WithCreateDeviceNodes(cfg.createDeviceNodes),
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to create symlink creator: %v", err)
|
return fmt.Errorf("failed to create symlink creator: %v", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
create:
|
|
||||||
err = l.CreateLinks()
|
err = l.CreateLinks()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to create links: %v", err)
|
return fmt.Errorf("failed to create links: %v", err)
|
||||||
}
|
}
|
||||||
if !cfg.watch {
|
return nil
|
||||||
return nil
|
|
||||||
}
|
|
||||||
for {
|
|
||||||
select {
|
|
||||||
|
|
||||||
case event := <-watcher.Events:
|
|
||||||
deviceNode := filepath.Base(event.Name)
|
|
||||||
if !strings.HasPrefix(deviceNode, "nvidia") {
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
if event.Op&fsnotify.Create == fsnotify.Create {
|
|
||||||
m.logger.Infof("%s created, restarting.", event.Name)
|
|
||||||
goto create
|
|
||||||
}
|
|
||||||
if event.Op&fsnotify.Create == fsnotify.Remove {
|
|
||||||
m.logger.Infof("%s removed. Ignoring", event.Name)
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
// Watch for any other fs errors and log them.
|
|
||||||
case err := <-watcher.Errors:
|
|
||||||
m.logger.Errorf("inotify: %s", err)
|
|
||||||
|
|
||||||
// React to signals
|
|
||||||
case s := <-sigs:
|
|
||||||
switch s {
|
|
||||||
case syscall.SIGHUP:
|
|
||||||
m.logger.Infof("Received SIGHUP, recreating symlinks.")
|
|
||||||
goto create
|
|
||||||
default:
|
|
||||||
m.logger.Infof("Received signal %q, shutting down.", s)
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
type linkCreator struct {
|
type linkCreator struct {
|
||||||
logger *logrus.Logger
|
logger logger.Interface
|
||||||
lister nodeLister
|
lister nodeLister
|
||||||
driverRoot string
|
driverRoot string
|
||||||
devCharPath string
|
devRoot string
|
||||||
dryRun bool
|
devCharPath string
|
||||||
createAll bool
|
dryRun bool
|
||||||
|
createAll bool
|
||||||
|
createDeviceNodes bool
|
||||||
|
loadKernelModules bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// Creator is an interface for creating symlinks to /dev/nv* devices in /dev/char.
|
// Creator is an interface for creating symlinks to /dev/nv* devices in /dev/char.
|
||||||
@@ -209,34 +181,81 @@ func NewSymlinkCreator(opts ...Option) (Creator, error) {
|
|||||||
opt(&c)
|
opt(&c)
|
||||||
}
|
}
|
||||||
if c.logger == nil {
|
if c.logger == nil {
|
||||||
c.logger = logrus.StandardLogger()
|
c.logger = logger.New()
|
||||||
}
|
}
|
||||||
if c.driverRoot == "" {
|
if c.driverRoot == "" {
|
||||||
c.driverRoot = "/"
|
c.driverRoot = "/"
|
||||||
}
|
}
|
||||||
|
if c.devRoot == "" {
|
||||||
|
c.devRoot = "/"
|
||||||
|
}
|
||||||
if c.devCharPath == "" {
|
if c.devCharPath == "" {
|
||||||
c.devCharPath = defaultDevCharPath
|
c.devCharPath = defaultDevCharPath
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if err := c.setup(); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
if c.createAll {
|
if c.createAll {
|
||||||
lister, err := newAllPossible(c.logger, c.driverRoot)
|
lister, err := newAllPossible(c.logger, c.devRoot)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("failed to create all possible device lister: %v", err)
|
return nil, fmt.Errorf("failed to create all possible device lister: %v", err)
|
||||||
}
|
}
|
||||||
c.lister = lister
|
c.lister = lister
|
||||||
} else {
|
} else {
|
||||||
c.lister = existing{c.logger, c.driverRoot}
|
c.lister = existing{c.logger, c.devRoot}
|
||||||
}
|
}
|
||||||
return c, nil
|
return c, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (m linkCreator) setup() error {
|
||||||
|
if !m.loadKernelModules && !m.createDeviceNodes {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if m.loadKernelModules {
|
||||||
|
modules := nvmodules.New(
|
||||||
|
nvmodules.WithLogger(m.logger),
|
||||||
|
nvmodules.WithDryRun(m.dryRun),
|
||||||
|
nvmodules.WithRoot(m.driverRoot),
|
||||||
|
)
|
||||||
|
if err := modules.LoadAll(); err != nil {
|
||||||
|
return fmt.Errorf("failed to load NVIDIA kernel modules: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if m.createDeviceNodes {
|
||||||
|
devices, err := nvdevices.New(
|
||||||
|
nvdevices.WithLogger(m.logger),
|
||||||
|
nvdevices.WithDryRun(m.dryRun),
|
||||||
|
nvdevices.WithDevRoot(m.devRoot),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := devices.CreateNVIDIAControlDevices(); err != nil {
|
||||||
|
return fmt.Errorf("failed to create NVIDIA device nodes: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
// WithDriverRoot sets the driver root path.
|
// WithDriverRoot sets the driver root path.
|
||||||
|
// This is the path in which kernel modules must be loaded.
|
||||||
func WithDriverRoot(root string) Option {
|
func WithDriverRoot(root string) Option {
|
||||||
return func(c *linkCreator) {
|
return func(c *linkCreator) {
|
||||||
c.driverRoot = root
|
c.driverRoot = root
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// WithDevRoot sets the root path for the /dev directory.
|
||||||
|
func WithDevRoot(root string) Option {
|
||||||
|
return func(c *linkCreator) {
|
||||||
|
c.devRoot = root
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// WithDevCharPath sets the path at which the symlinks will be created.
|
// WithDevCharPath sets the path at which the symlinks will be created.
|
||||||
func WithDevCharPath(path string) Option {
|
func WithDevCharPath(path string) Option {
|
||||||
return func(c *linkCreator) {
|
return func(c *linkCreator) {
|
||||||
@@ -252,7 +271,7 @@ func WithDryRun(dryRun bool) Option {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// WithLogger sets the logger.
|
// WithLogger sets the logger.
|
||||||
func WithLogger(logger *logrus.Logger) Option {
|
func WithLogger(logger logger.Interface) Option {
|
||||||
return func(c *linkCreator) {
|
return func(c *linkCreator) {
|
||||||
c.logger = logger
|
c.logger = logger
|
||||||
}
|
}
|
||||||
@@ -265,6 +284,20 @@ func WithCreateAll(createAll bool) Option {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// WithLoadKernelModules sets the loadKernelModules flag for the linkCreator.
|
||||||
|
func WithLoadKernelModules(loadKernelModules bool) Option {
|
||||||
|
return func(lc *linkCreator) {
|
||||||
|
lc.loadKernelModules = loadKernelModules
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// WithCreateDeviceNodes sets the createDeviceNodes flag for the linkCreator.
|
||||||
|
func WithCreateDeviceNodes(createDeviceNodes bool) Option {
|
||||||
|
return func(lc *linkCreator) {
|
||||||
|
lc.createDeviceNodes = createDeviceNodes
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// CreateLinks creates symlinks for all NVIDIA device nodes found in the driver root.
|
// CreateLinks creates symlinks for all NVIDIA device nodes found in the driver root.
|
||||||
func (m linkCreator) CreateLinks() error {
|
func (m linkCreator) CreateLinks() error {
|
||||||
deviceNodes, err := m.lister.DeviceNodes()
|
deviceNodes, err := m.lister.DeviceNodes()
|
||||||
@@ -290,7 +323,7 @@ func (m linkCreator) CreateLinks() error {
|
|||||||
|
|
||||||
err = os.Symlink(target, linkPath)
|
err = os.Symlink(target, linkPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
m.logger.Warnf("Could not create symlink: %v", err)
|
m.logger.Warningf("Could not create symlink: %v", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -306,27 +339,3 @@ type deviceNode struct {
|
|||||||
func (d deviceNode) devCharName() string {
|
func (d deviceNode) devCharName() string {
|
||||||
return fmt.Sprintf("%d:%d", d.major, d.minor)
|
return fmt.Sprintf("%d:%d", d.major, d.minor)
|
||||||
}
|
}
|
||||||
|
|
||||||
func newFSWatcher(files ...string) (*fsnotify.Watcher, error) {
|
|
||||||
watcher, err := fsnotify.NewWatcher()
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, f := range files {
|
|
||||||
err = watcher.Add(f)
|
|
||||||
if err != nil {
|
|
||||||
watcher.Close()
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
return watcher, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func newOSWatcher(sigs ...os.Signal) chan os.Signal {
|
|
||||||
sigChan := make(chan os.Signal, 1)
|
|
||||||
signal.Notify(sigChan, sigs...)
|
|
||||||
|
|
||||||
return sigChan
|
|
||||||
}
|
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user