mirror of
https://github.com/NVIDIA/nvidia-container-toolkit
synced 2024-11-24 13:05:17 +00:00
f477dc0df1
Signed-off-by: Tariq Ibrahim <tibrahim@nvidia.com> add default runtime binary path to runtimes field of toolkit config toml Signed-off-by: Tariq Ibrahim <tibrahim@nvidia.com> [no-relnote] Get low-level runtimes consistently We ensure that we use the same low-level runtimes regardless of the runtime engine being configured. This ensures consistent behaviour. Signed-off-by: Evan Lezar <elezar@nvidia.com> Co-authored-by: Evan Lezar <elezar@nvidia.com> address review comment Signed-off-by: Tariq Ibrahim <tibrahim@nvidia.com>
145 lines
4.9 KiB
Go
145 lines
4.9 KiB
Go
/**
|
|
# Copyright (c) NVIDIA CORPORATION. All rights reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
**/
|
|
|
|
package containerd
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/engine"
|
|
"github.com/NVIDIA/nvidia-container-toolkit/pkg/config/toml"
|
|
)
|
|
|
|
// AddRuntime adds a runtime to the containerd config
|
|
func (c *Config) AddRuntime(name string, path string, setAsDefault bool) error {
|
|
if c == nil || c.Tree == nil {
|
|
return fmt.Errorf("config is nil")
|
|
}
|
|
config := *c.Tree
|
|
|
|
config.Set("version", int64(2))
|
|
|
|
runtimeNamesForConfig := engine.GetLowLevelRuntimes(c)
|
|
for _, r := range runtimeNamesForConfig {
|
|
options := config.GetSubtreeByPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", r})
|
|
if options == nil {
|
|
continue
|
|
}
|
|
c.Logger.Debugf("using options from runtime %v: %v", r, options)
|
|
config.SetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", name}, options.Copy())
|
|
break
|
|
}
|
|
|
|
if config.GetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", name}) == nil {
|
|
c.Logger.Warningf("could not infer options from runtimes %v; using defaults", runtimeNamesForConfig)
|
|
config.SetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", name, "runtime_type"}, c.RuntimeType)
|
|
config.SetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", name, "runtime_root"}, "")
|
|
config.SetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", name, "runtime_engine"}, "")
|
|
config.SetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", name, "privileged_without_host_devices"}, false)
|
|
}
|
|
|
|
if len(c.ContainerAnnotations) > 0 {
|
|
annotations, err := c.getRuntimeAnnotations([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", name, "container_annotations"})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
annotations = append(c.ContainerAnnotations, annotations...)
|
|
config.SetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", name, "container_annotations"}, annotations)
|
|
}
|
|
|
|
config.SetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", name, "options", "BinaryName"}, path)
|
|
|
|
if setAsDefault {
|
|
config.SetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "default_runtime_name"}, name)
|
|
}
|
|
|
|
*c.Tree = config
|
|
return nil
|
|
}
|
|
|
|
func (c *Config) getRuntimeAnnotations(path []string) ([]string, error) {
|
|
if c == nil || c.Tree == nil {
|
|
return nil, nil
|
|
}
|
|
|
|
config := *c.Tree
|
|
if !config.HasPath(path) {
|
|
return nil, nil
|
|
}
|
|
annotationsI, ok := config.GetPath(path).([]interface{})
|
|
if !ok {
|
|
return nil, fmt.Errorf("invalid annotations: %v", annotationsI)
|
|
}
|
|
|
|
var annotations []string
|
|
for _, annotation := range annotationsI {
|
|
a, ok := annotation.(string)
|
|
if !ok {
|
|
return nil, fmt.Errorf("invalid annotation: %v", annotation)
|
|
}
|
|
annotations = append(annotations, a)
|
|
}
|
|
|
|
return annotations, nil
|
|
}
|
|
|
|
// Set sets the specified containerd option.
|
|
func (c *Config) Set(key string, value interface{}) {
|
|
config := *c.Tree
|
|
config.SetPath([]string{"plugins", "io.containerd.grpc.v1.cri", key}, value)
|
|
*c.Tree = config
|
|
}
|
|
|
|
// DefaultRuntime returns the default runtime for the cri-o config
|
|
func (c Config) DefaultRuntime() string {
|
|
if runtime, ok := c.GetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "default_runtime_name"}).(string); ok {
|
|
return runtime
|
|
}
|
|
return ""
|
|
}
|
|
|
|
// RemoveRuntime removes a runtime from the docker config
|
|
func (c *Config) RemoveRuntime(name string) error {
|
|
if c == nil || c.Tree == nil {
|
|
return nil
|
|
}
|
|
|
|
config := *c.Tree
|
|
|
|
config.DeletePath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", name})
|
|
if runtime, ok := config.GetPath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "default_runtime_name"}).(string); ok {
|
|
if runtime == name {
|
|
config.DeletePath([]string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "default_runtime_name"})
|
|
}
|
|
}
|
|
|
|
runtimePath := []string{"plugins", "io.containerd.grpc.v1.cri", "containerd", "runtimes", name}
|
|
for i := 0; i < len(runtimePath); i++ {
|
|
if runtimes, ok := config.GetPath(runtimePath[:len(runtimePath)-i]).(*toml.Tree); ok {
|
|
if len(runtimes.Keys()) == 0 {
|
|
config.DeletePath(runtimePath[:len(runtimePath)-i])
|
|
}
|
|
}
|
|
}
|
|
|
|
if len(config.Keys()) == 1 && config.Keys()[0] == "version" {
|
|
config.Delete("version")
|
|
}
|
|
|
|
*c.Tree = config
|
|
return nil
|
|
}
|