-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use LMS as codejail service for CMS #33538
Comments
4 tasks
3 tasks
timmc-edx
added a commit
that referenced
this issue
Jan 9, 2024
This supports having an authenticated codejail service in general, but in particular is to support the temporary use of the LMS as a codejail service for the CMS: #33538 The new settings are all optional, and if not provided, the current behavior does not change.
timmc-edx
added a commit
to edx/edx-arch-experiments
that referenced
this issue
Jan 11, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
A/C:
As a step towards moving codejail to its own service and containerizing edxapp, we could move to an intermediate approach where the LMS runs codejail executions on behalf of CMS. This would provide the following benefits:
This would entail adding a new view in LMS and configuring CMS to call it, as well as adding some authorization code.
Implementation details:
xmodule/capa/safe_exec/remote_exec.py
unsafely
are in play. We can adjust remote_exec.py to add a token on behalf of the cms service user.unsafely
request parameter unless a new Django setting (maybeCODEJAIL_SERVICE_ALLOW_UNSAFE
) is set to True. To my knowledge, 2U does not allow unsandboxed codejail execution. Any deployer who wants to allow this will need to explicitly opt in to this dangerous setting.The text was updated successfully, but these errors were encountered: