Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
21 changes: 15 additions & 6 deletions SPEC.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,7 @@ Released versions of the spec are available as Git tags.
| | | Add `AdditionalGIDs` to `ContainerEdits` |
| v0.8.0 | | Remove .ToOCI() functions from specs-go package. |
| v1.0.0 | | Move minimum version logic to specs-go package. |
| v1.1.0 | | Add `NetDevices` to `ContainerEdits`, `Schemata` and `EnableMonitoring` to `IntelRdt`. Dropped `EnableCMT` and `EnableMBM` fields from `IntelRdt`. |

*Note*: spec loading fails on unknown fields and when the minimum required version is higher than the version specified in the spec. The minimum required version is determined based on the usage of fields mentioned in the table above. For example the minimum required version is v0.6.0 if the `Annotations` field is used in the spec, but `IntelRdt` is not.
`MinimumRequiredVersion` API can be used to get the minimum required version.
Expand Down Expand Up @@ -164,14 +165,22 @@ The keywords "must", "must not", "required", "shall", "shall not", "should", "sh
// Note that a value of 0 is ignored.
additionalGIDs: [ (optional)
<uint32>
]
],
"intelRdt": { (optional)
"closID": "<name>", (optional)
"l3CacheSchema": "string" (optional)
"memBwSchema": "string" (optional)
"enableCMT": "<boolean>" (optional)
"enableMBM": "<boolean>" (optional)
}
"schema": [ "string" ] (optional)
"enableMonitoring": <boolean> (optional)
},
// This field contains network interfaces that should be moved
// from the host to the container.
"netDevices": [ (optional)
{
"hostInterfaceName": "<interface name on the host>",
"name": "<interface name in the container>"
}
]
}
]
}
Expand Down Expand Up @@ -247,8 +256,8 @@ The `containerEdits` field has the following definition:
* `closID` (string, OPTIONAL) name of the `CLOS` (Class of Service).
* `l3CacheSchema` (string, OPTIONAL) L3 cache allocation schema for the `CLOS`.
* `memBwSchema` (string, OPTIONAL) memory bandwidth allocation schema for the `CLOS`.
* `enableCMT` (boolean, OPTIONAL) whether to enable cache monitoring
* `enableMBM` (boolean, OPTIONAL) whether to enable memory bandwidth monitoring
* `schemata` (array of strings, OPTIONAL) RDT schema for the CLOS.
* `enableMonitoring` (boolean, OPTIONAL) whether to enable memory bandwidth monitoring for the CLOS.
* `additionalGids` (array of uint32s, OPTIONAL) A list of additional group IDs to add with the container process. These values are added to the `user.additionalGids` field in the OCI runtime specification. Values of 0 are ignored. Added in v0.7.0.

## Error Handling
Expand Down
10 changes: 10 additions & 0 deletions cmd/cdi/cmd/validate.go
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ import (
"github.com/spf13/cobra"

"tags.cncf.io/container-device-interface/pkg/cdi"
"tags.cncf.io/container-device-interface/specs-go"
)

// validateCmd is our CDI command for validating CDI Spec files in the cache.
Expand All @@ -49,6 +50,15 @@ were reported by the cache.`,
fmt.Printf(" %2d: %v\n", idx, strings.TrimSpace(err.Error()))
}
}

for _, v := range cache.ListVendors() {
for _, s := range cache.GetVendorSpecs(v) {
if err := specs.ValidateVersion(s.Spec); err != nil {
fmt.Printf("Spec file %s failed version validation: %v\n", s.GetPath(), err)
}
}
}

os.Exit(1)
},
}
Expand Down
2 changes: 1 addition & 1 deletion cmd/cdi/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ require (
sigs.k8s.io/yaml v1.4.0
tags.cncf.io/container-device-interface v1.0.1
tags.cncf.io/container-device-interface/schema v0.0.0
tags.cncf.io/container-device-interface/specs-go v1.0.0
)

require (
Expand All @@ -22,7 +23,6 @@ require (
github.com/xeipuuv/gojsonschema v1.2.0 // indirect
golang.org/x/mod v0.19.0 // indirect
golang.org/x/sys v0.19.0 // indirect
tags.cncf.io/container-device-interface/specs-go v1.0.0 // indirect
)

replace (
Expand Down
76 changes: 76 additions & 0 deletions pkg/cdi/container-edits.go
Original file line number Diff line number Diff line change
Expand Up @@ -113,6 +113,14 @@ func (e *ContainerEdits) Apply(spec *oci.Spec) error {
}
}

if len(e.NetDevices) > 0 {
// specgen is currently missing functionality to set Linux NetDevices,
// so we use a locally rolled function for now.
for _, dev := range e.NetDevices {
specgenAddLinuxNetDevice(&specgen, dev.HostInterfaceName, (&LinuxNetDevice{dev}).toOCI())
}
}

if len(e.Mounts) > 0 {
for _, m := range e.Mounts {
specgen.RemoveMount(m.ContainerPath)
Expand Down Expand Up @@ -162,6 +170,24 @@ func (e *ContainerEdits) Apply(spec *oci.Spec) error {
return nil
}

func specgenAddLinuxNetDevice(specgen *ocigen.Generator, hostIf string, netDev *oci.LinuxNetDevice) {
if specgen == nil || netDev == nil {
return
}
ensureLinuxNetDevices(specgen.Config)
specgen.Config.Linux.NetDevices[hostIf] = *netDev
}

// Ensure OCI Spec Linux NetDevices map is not nil.
func ensureLinuxNetDevices(spec *oci.Spec) {
if spec.Linux == nil {
spec.Linux = &oci.Linux{}
}
if spec.Linux.NetDevices == nil {
spec.Linux.NetDevices = map[string]oci.LinuxNetDevice{}
}
}

// Validate container edits.
func (e *ContainerEdits) Validate() error {
if e == nil || e.ContainerEdits == nil {
Expand Down Expand Up @@ -191,6 +217,9 @@ func (e *ContainerEdits) Validate() error {
return err
}
}
if err := ValidateNetDevices(e.NetDevices); err != nil {
return err
}

return nil
}
Expand All @@ -210,6 +239,7 @@ func (e *ContainerEdits) Append(o *ContainerEdits) *ContainerEdits {

e.Env = append(e.Env, o.Env...)
e.DeviceNodes = append(e.DeviceNodes, o.DeviceNodes...)
e.NetDevices = append(e.NetDevices, o.NetDevices...)
e.Hooks = append(e.Hooks, o.Hooks...)
e.Mounts = append(e.Mounts, o.Mounts...)
if o.IntelRdt != nil {
Expand Down Expand Up @@ -244,6 +274,9 @@ func (e *ContainerEdits) isEmpty() bool {
if e.IntelRdt != nil {
return false
}
if len(e.NetDevices) > 0 {
return false
}
return true
}

Expand All @@ -257,6 +290,49 @@ func ValidateEnv(env []string) error {
return nil
}

// ValidateNetDevices validates the given net devices.
func ValidateNetDevices(devices []*cdi.LinuxNetDevice) error {
var (
hostSeen = map[string]string{}
nameSeen = map[string]string{}
)

for _, dev := range devices {
if err := (&LinuxNetDevice{dev}).Validate(); err != nil {
return err
}
if other, ok := hostSeen[dev.HostInterfaceName]; ok {
return fmt.Errorf("invalid linux net device, duplicate HostInterfaceName %q with names %q and %q",
dev.HostInterfaceName, dev.Name, other)
}
hostSeen[dev.HostInterfaceName] = dev.Name

if other, ok := nameSeen[dev.Name]; ok {
return fmt.Errorf("invalid linux net device, duplicate Name %q with HostInterfaceName %q and %q",
dev.Name, dev.HostInterfaceName, other)
}
nameSeen[dev.Name] = dev.HostInterfaceName
}

return nil
}

// LinuxNetDevice is a CDI Spec LinuxNetDevice wrapper, used for OCI conversion and validating.
type LinuxNetDevice struct {
*cdi.LinuxNetDevice
}

// Validate LinuxNetDevice.
func (d *LinuxNetDevice) Validate() error {
if d.HostInterfaceName == "" {
return errors.New("invalid linux net device, empty HostInterfaceName")
}
if d.Name == "" {
return errors.New("invalid linux net device, empty Name")
}
return nil
}

// DeviceNode is a CDI Spec DeviceNode wrapper, used for validating DeviceNodes.
type DeviceNode struct {
*cdi.DeviceNode
Expand Down
99 changes: 99 additions & 0 deletions pkg/cdi/container-edits_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -299,6 +299,41 @@ func TestValidateContainerEdits(t *testing.T) {
},
invalid: true,
},
{
name: "valid Linux net device",
edits: &cdi.ContainerEdits{
NetDevices: []*cdi.LinuxNetDevice{
{
HostInterfaceName: "eno1",
Name: "netdev0",
},
},
},
},
{
name: "invalid Linux net device, empty host interface name",
edits: &cdi.ContainerEdits{
NetDevices: []*cdi.LinuxNetDevice{
{
HostInterfaceName: "",
Name: "netdev0",
},
},
},
invalid: true,
},
{
name: "invalid Linux net device, empty container interface name",
edits: &cdi.ContainerEdits{
NetDevices: []*cdi.LinuxNetDevice{
{
HostInterfaceName: "eno1",
Name: "",
},
},
},
invalid: true,
},
} {
t.Run(tc.name, func(t *testing.T) {
edits := ContainerEdits{tc.edits}
Expand Down Expand Up @@ -587,6 +622,70 @@ func TestApplyContainerEdits(t *testing.T) {
},
},
},
{
name: "empty spec, Linux net devices",
spec: &oci.Spec{},
edits: &cdi.ContainerEdits{
NetDevices: []*cdi.LinuxNetDevice{
{
HostInterfaceName: "eno1",
Name: "netdev0",
},
{
HostInterfaceName: "eno2",
Name: "netdev1",
},
},
},
result: &oci.Spec{
Linux: &oci.Linux{
NetDevices: map[string]oci.LinuxNetDevice{
"eno1": {
Name: "netdev0",
},
"eno2": {
Name: "netdev1",
},
},
},
},
},
{
name: "non-empty spec, overriding Linux net devices",
spec: &oci.Spec{
Linux: &oci.Linux{
NetDevices: map[string]oci.LinuxNetDevice{
"eno1": {
Name: "netdev1",
},
},
},
},
edits: &cdi.ContainerEdits{
NetDevices: []*cdi.LinuxNetDevice{
{
HostInterfaceName: "eno1",
Name: "netdev2",
},
{
HostInterfaceName: "eno2",
Name: "netdev1",
},
},
},
result: &oci.Spec{
Linux: &oci.Linux{
NetDevices: map[string]oci.LinuxNetDevice{
"eno1": {
Name: "netdev2",
},
"eno2": {
Name: "netdev1",
},
},
},
},
},
{
name: "additional GIDs are applied",
spec: &oci.Spec{},
Expand Down
7 changes: 7 additions & 0 deletions pkg/cdi/oci.go
Original file line number Diff line number Diff line change
Expand Up @@ -63,3 +63,10 @@ func (i *IntelRdt) toOCI() *spec.LinuxIntelRdt {
EnableMonitoring: i.EnableMonitoring,
}
}

// toOCI returns the opencontainers runtime Spec LinuxNetDevice for this LinuxNetDevice.
func (d *LinuxNetDevice) toOCI() *spec.LinuxNetDevice {
return &spec.LinuxNetDevice{
Name: d.Name,
}
}
30 changes: 27 additions & 3 deletions schema/defs.json
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,9 @@
"Env": {
"$ref": "#/definitions/ArrayOfStrings"
},
"InterfaceName": {
"type": "string"
},
"mapStringString": {
"type": "object",
"patternProperties": {
Expand Down Expand Up @@ -111,6 +114,21 @@
"path"
]
},
"LinuxNetDevice": {
"type": "object",
"properties": {
"hostInterfaceName": {
"$ref": "#/definitions/InterfaceName"
},
"name": {
"$ref": "#/definitions/InterfaceName"
}
},
"required": [
"hostInterfaceName",
"name"
]
},
"containerEdits": {
"type": "object",
"properties": {
Expand All @@ -126,6 +144,12 @@
"$ref": "#/definitions/DeviceNode"
}
},
"netDevices": {
"type": "array",
"items": {
"$ref": "#/definitions/LinuxNetDevice"
}
},
"mounts": {
"type": "array",
"items": {
Expand All @@ -150,10 +174,10 @@
"memBwSchema": {
"type": "string"
},
"enableCMT": {
"type": "boolean"
"schemata": {
"$ref": "#/definitions/ArrayOfStrings"
},
"enableMBM": {
"enableMonitoring": {
"type": "boolean"
}
}
Expand Down
Loading