Full Changelog: v0.13.0...v0.14.0
Changes
- Promote
v0.14.0-rc.3
tov0.14.0
- Bumped
nvidia-container-toolkit
dependency to latest version for newer CDI spec generation code - Updated GFD subchart to version v0.8.0
Changes from v0.14.0-rc.3
- Removed the
--cdi-enabled
config option and instead trigger CDI injection based oncdi-annotation
strategy. - Bumped
go-nvlib
dependency to latest version to support new MIG profiles. - Added
cdi-annotation-prefix
config option to control how CDI annotations are generated. - Renamed
driver-root-ctr-path
config option added inv0.14.0-rc.1
tocontainer-driver-root
. - Updated GFD subchart to version v0.8.0-rc.2
Changes from v0.14.0-rc.2
- Fix bug from v0.14.0-rc.1 when using cdi-enabled=false
Changes from v0.14.0-rc.1
- Added --cdi-enabled flag to GPU Device Plugin. With this enabled, the device plugin will generate CDI specifications for available NVIDIA devices. Allocation will add CDI anntiations (
cdi.k8s.io/*
) to the response. These are read by a CDI-enabled runtime to make the required modifications to a container being created. - Updated GFD subchard to version 0.8.0-rc.1
- Bumped Golang version to 1.20.1
- Bumped CUDA base images version to 12.1.0
- Switched to klog for logging
- Added a static deployment file for Microshift
Note:
The container image nvcr.io/nvidia/k8s-device-plugin-v0.14.0-ubi8
contains the following high-severity CVEs:
- CVE-2023-0286 - Vulnerability found in os package type (rpm) - openssl-libs
- CVE-2023-24329 - Vulnerability found in os package type (rpm) - platform-python and python3-libs