@@ -19,11 +19,11 @@ using the same API, but will not guard against malicious code. This allows the
19
19
same code to be used on safe-configured or non-safe-configured developer's
20
20
machines.
21
21
22
- A CodeJail sandbox consists of several pieces:
22
+ A CodeJail sandbox consists of several pieces:
23
23
24
24
#) Sandbox environment. For a Python setup, this would be Python and
25
25
associated core packages. This is denoted throughout this document
26
- as **<SANDENV> **. This is read-only.
26
+ as **<SANDENV> **. This is read-only.
27
27
28
28
#) Sandbox packages. These are additional packages needed for a given
29
29
run. For example, this might be a grader written by an instructor
@@ -34,7 +34,7 @@ A CodeJail sandbox consists of several pieces:
34
34
#) Untrusted packages. This is typically the code submitted by the
35
35
student to be tested on the server, as well as any data the code
36
36
may need to modify. This is denoted throughout this document as
37
- **<UNTRUSTED_PACK> **. This is currently read-only, but may need to
37
+ **<UNTRUSTED_PACK> **. This is currently read-only, but may need to
38
38
be read-write for some applications.
39
39
40
40
#) OS packages. These are standard system libraries needed to run
@@ -48,6 +48,20 @@ sandboxes. This will be referred to as **<SANDBOX_CALLER>**. The
48
48
second account is the account under which the sandbox runs. This is
49
49
typically the account 'sandbox.'
50
50
51
+ Supported Versions
52
+ ------------------
53
+
54
+ This library currently is tested to work with the following versions
55
+
56
+ Python:
57
+
58
+ * 3.11
59
+
60
+ Ubuntu:
61
+
62
+ * 20.04
63
+ * 22.04
64
+
51
65
Installation
52
66
------------
53
67
@@ -129,6 +143,10 @@ Other details here that depend on your configuration:
129
143
130
144
7. Reactivate your project's main virtualenv again.
131
145
146
+ 8. Disable using PAM to set rlimits::
147
+
148
+ sed -i '/pam_limits.so/d' /etc/pam.d/sudo
149
+
132
150
Using CodeJail
133
151
--------------
134
152
@@ -142,7 +160,7 @@ commands at your Python terminal::
142
160
codejail.safe_exec.safe_exec("output=open('/etc/passwd').read()", jailed_globals)
143
161
print(jailed_globals) # should be unreachable if codejail is working properly
144
162
145
- This should fail with an exception.
163
+ This should fail with an exception.
146
164
147
165
If you need to change the packages installed into your sandbox's virtualenv,
148
166
you'll need to disable AppArmor, because your sandboxed Python doesn't have
0 commit comments