Skip to content

fix: Added support for listing IB interfaces#218

Open
hwadekar-nv wants to merge 7 commits intomainfrom
fix/ib-interface
Open

fix: Added support for listing IB interfaces#218
hwadekar-nv wants to merge 7 commits intomainfrom
fix/ib-interface

Conversation

@hwadekar-nv
Copy link
Contributor

@hwadekar-nv hwadekar-nv commented Mar 9, 2026

Description

Added support for listing InfiniBand (IB) interfaces with filtering capabilities.

  • Enabled querying IB interfaces by InstanceID
  • Enabled querying IB interfaces by InfiniBandPartitionID

Type of Change

  • Feature - New feature or functionality (feat:)
  • Fix - Bug fixes (fix:)
  • Chore - Modification or removal of existing functionality (chore:)
  • Refactor - Refactoring of existing functionality (refactor:)
  • Docs - Changes in documentation or OpenAPI schema (docs:)
  • CI - Changes in Github workflows. Requires additional scrutiny (ci:)
  • Version - Issuing a new release version (version:)

Services Affected

  • API - API models or endpoints updated
  • Workflow - Workflow service updated
  • DB - DB DAOs or migrations updated
  • Site Manager - Site Manager updated
  • Cert Manager - Cert Manager updated
  • Site Agent - Site Agent updated
  • RLA - RLA service updated
  • Powershelf Manager - Powershelf Manager updated

Related Issues (Optional)

Breaking Changes

  • This PR contains breaking changes

Testing

  • Unit tests added/updated
  • Integration tests added/updated
  • Manual testing performed
  • No testing required (docs, internal refactor, etc.)

Additional Notes

@copy-pr-bot
Copy link

copy-pr-bot bot commented Mar 9, 2026

This pull request requires additional validation before any workflows can run on NVIDIA's runners.

Pull request vetters can view their responsibilities here.

Contributors can view more details about this message here.

@hwadekar-nv hwadekar-nv self-assigned this Mar 9, 2026
@hwadekar-nv hwadekar-nv force-pushed the fix/ib-interface branch 2 times, most recently from 1e35723 to 4c5c0ef Compare March 9, 2026 20:42
@github-actions
Copy link

github-actions bot commented Mar 9, 2026

🔐 TruffleHog Secret Scan

No secrets or credentials found!

Your code has been scanned for 700+ types of secrets and credentials. All clear! 🎉

🔗 View scan details

🕐 Last updated: 2026-03-09 23:22:05 UTC | Commit: aa8260b

@github-actions
Copy link

github-actions bot commented Mar 9, 2026

🛡️ Vulnerability Scan

🚨 Found 64 vulnerability(ies)
📊 vs main: 64 (no change)

Severity Breakdown:

  • 🔴 Critical/High: 64
  • 🟡 Medium: 0
  • 🔵 Low/Info: 0
📋 Top Vulnerabilities
  • AVD-KSV-0109: Artifact: deploy/kustomize/base/api/configmap.yaml
    Type: kubernetes
    Vulnerability AVD-KSV-0109
    Severity: HIGH
    Message: ConfigMap 'carbide-rest-api-config' in 'default' namespace stores secrets in key(s) or value(s) '{" password"}'
    Link: AVD-KSV-0109 (deploy/kustomize/base/api/configmap.yaml)
  • KSV014: Artifact: deploy/kustomize/base/api/deployment.yaml
    Type: kubernetes
    Vulnerability KSV014
    Severity: HIGH
    Message: Container 'api' of Deployment 'carbide-rest-api' should set 'securityContext.readOnlyRootFilesystem' to true
    Link: KSV014 (deploy/kustomize/base/api/deployment.yaml)
  • KSV118: Artifact: deploy/kustomize/base/api/deployment.yaml
    Type: kubernetes
    Vulnerability KSV118
    Severity: HIGH
    Message: container carbide-rest-api in default namespace is using the default security context
    Link: KSV118 (deploy/kustomize/base/api/deployment.yaml)
  • KSV118: Artifact: deploy/kustomize/base/api/deployment.yaml
    Type: kubernetes
    Vulnerability KSV118
    Severity: HIGH
    Message: deployment carbide-rest-api in default namespace is using the default security context, which allows root privileges
    Link: KSV118 (deploy/kustomize/base/api/deployment.yaml)
  • KSV014: Artifact: deploy/kustomize/base/db/job.yaml
    Type: kubernetes
    Vulnerability KSV014
    Severity: HIGH
    Message: Container 'migrations' of Job 'carbide-rest-db-migration' should set 'securityContext.readOnlyRootFilesystem' to true
    Link: KSV014 (deploy/kustomize/base/db/job.yaml)
  • KSV014: Artifact: deploy/kustomize/base/db/job.yaml
    Type: kubernetes
    Vulnerability KSV014
    Severity: HIGH
    Message: Container 'wait-for-postgres' of Job 'carbide-rest-db-migration' should set 'securityContext.readOnlyRootFilesystem' to true
    Link: KSV014 (deploy/kustomize/base/db/job.yaml)
  • KSV118: Artifact: deploy/kustomize/base/db/job.yaml
    Type: kubernetes
    Vulnerability KSV118
    Severity: HIGH
    Message: container carbide-rest-db-migration in default namespace is using the default security context
    Link: KSV118 (deploy/kustomize/base/db/job.yaml)
  • KSV118: Artifact: deploy/kustomize/base/db/job.yaml
    Type: kubernetes
    Vulnerability KSV118
    Severity: HIGH
    Message: container carbide-rest-db-migration in default namespace is using the default security context
    Link: KSV118 (deploy/kustomize/base/db/job.yaml)
  • KSV118: Artifact: deploy/kustomize/base/db/job.yaml
    Type: kubernetes
    Vulnerability KSV118
    Severity: HIGH
    Message: job carbide-rest-db-migration in default namespace is using the default security context, which allows root privileges
    Link: KSV118 (deploy/kustomize/base/db/job.yaml)
  • KSV014: Artifact: deploy/kustomize/base/keycloak/deployment.yaml
    Type: kubernetes
    Vulnerability KSV014
    Severity: HIGH
    Message: Container 'keycloak' of Deployment 'keycloak' should set 'securityContext.readOnlyRootFilesystem' to true
    Link: KSV014 (deploy/kustomize/base/keycloak/deployment.yaml)

🔗 View full details in Security tab

🕐 Last updated: 2026-03-09 20:44:54 UTC | Commit: 4c5c0ef

@github-actions
Copy link

github-actions bot commented Mar 9, 2026

Test Results

7 798 tests  +47   7 798 ✅ +47   8m 7s ⏱️ +20s
  136 suites ± 0       0 💤 ± 0 
   14 files   ± 0       0 ❌ ± 0 

Results for commit 22f5364. ± Comparison against base commit 58e03a0.

♻️ This comment has been updated with latest results.

@hwadekar-nv hwadekar-nv force-pushed the fix/ib-interface branch 3 times, most recently from 0e2d51a to 078680f Compare March 10, 2026 16:46
@hwadekar-nv hwadekar-nv force-pushed the fix/ib-interface branch 4 times, most recently from 89b2703 to f9e6de9 Compare March 11, 2026 21:59
Signed-off-by: Hitesh Wadekar <hwadekar@nvidia.com>
Signed-off-by: Hitesh Wadekar <hwadekar@nvidia.com>
Signed-off-by: Hitesh Wadekar <hwadekar@nvidia.com>
Signed-off-by: Hitesh Wadekar <hwadekar@nvidia.com>
Signed-off-by: Hitesh Wadekar <hwadekar@nvidia.com>
Signed-off-by: Hitesh Wadekar <hwadekar@nvidia.com>
Signed-off-by: Hitesh Wadekar <hwadekar@nvidia.com>
- schema:
type: string
enum:
- NAME_ASC
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

InfiniBand Interfaces don't have name attribute, these 2 need to be removed.


c.Request().URL.RawQuery = q.Encode()

delegate := NewGetAllNVLinkInterfaceHandler(ganvliih.dbSession, ganvliih.tc, ganvliih.cfg)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When we do this delegation and the Instance ID is non-existent or doesn't belong to Tenant, user will receive messages like Invalid Instance ID in query and be confused as to why we are saying they sent something in query.

Previously I suggested that NewGetAllNVLinkInterfaceHandler can have an explicit argument queryOverride instead of modifying the request object. Based on values int he query override, we can change message tone and skip some checks etc.

TenantIDs: []uuid.UUID{tenant.ID},
SiteIDs: siteIDs,
},
cdbp.PageInput{},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Needs total limit.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants