Python sandbox runners for executing code in isolation aka snekbox.
A client sends Python code to a snekbox, the snekbox executes the code, and finally the results of the execution are returned to the client.
%%{init: { 'sequence': {'mirrorActors': false, 'messageFontWeight': 300, 'actorFontFamily': '-apple-system,BlinkMacSystemFont,Segoe UI,Helvetica,Arial,sans-serif' } } }%%
sequenceDiagram
actor Client
participant Snekbox
participant NsJail
participant Python as Python Subprocess
Client ->>+ Snekbox: HTTP POST
Snekbox ->>+ NsJail: Python code
NsJail ->>+ Python: Python code
Python -->>- NsJail: Execution result
NsJail -->>- Snekbox: Execution result
Snekbox -->>- Client: JSON response
The code is executed in a Python process that is launched through NsJail, which is responsible for sandboxing the Python process.
The output returned by snekbox is truncated at around 1 MB.
Communication with snekbox is done over a HTTP REST API. The framework for the HTTP REST API is Falcon and the WSGI being used is Gunicorn. By default, the server is hosted on 0.0.0.0:8060
with two workers.
See snekapi.py
and resources
for API documentation.
A Docker image is available in the GitHub Container Registry. A container can be started with the following command, which will also pull the image if it doesn't currently exist locally:
docker run --ipc=none --privileged -p 8060:8060 ghcr.io/python-discord/snekbox
To run it in the background, use the -d
option. See the documentation on docker run
for more information.
The above command will make the API accessible on the host via http://localhost:8060/
. Currently, there's only one endpoint: http://localhost:8060/eval
.
Configuration files can be edited directly. However, this requires rebuilding the image. Alternatively, a Docker volume or bind mounts can be used to override the configuration files at their default locations.
The main features of the default configuration are:
- Time limit
- Memory limit
- Process count limit
- No networking
- Restricted, read-only filesystem
NsJail is configured through snekbox.cfg
. It contains the exact values for the items listed above. The configuration format is defined by a protobuf file which can be referred to for documentation. The command-line options of NsJail can also serve as documentation since they closely follow the config file format.
Gunicorn settings can be found in gunicorn.conf.py
. In the default configuration, the worker count and the bind address are likely the only things of any interest. Since it uses the default synchronous workers, the worker count effectively determines how many concurrent code evaluations can be performed.
All environment variables have defaults and are therefore not required to be set.
Name | Description |
---|---|
DEBUG |
Enable debug logging if set to a non-empty value. |
GIT_SHA |
Sentry release identifier. Set in CI. |
NSJAIL_CFG |
Path to the NsJail configuration file. |
NSJAIL_PATH |
Path to the NsJail binary. |
SNEKBOX_SENTRY_DSN |
Data Source Name for Sentry. Sentry is disabled if left unset. |
Note: relative paths are relative to the root of the repository.
By default, the Python interpreter has no access to any packages besides the standard library. Even snekbox's own dependencies like Falcon and Gunicorn are not exposed.
To expose third-party Python packages during evaluation, install them to a custom user site:
docker exec snekbox /bin/sh -c 'PYTHONUSERBASE=/snekbox/user_base pip install numpy'
In the above command, snekbox
is the name of the running container. The name may be different and can be checked with docker ps
.
The packages will be installed to the user site within /snekbox/user_base
. To persist the installed packages, a volume for the directory can be created with Docker. For an example, see docker-compose.yml
.
If pip
, setuptools
, or wheel
are dependencies or need to be exposed, then use the --ignore-installed
option with pip. However, note that this will also re-install packages present in the custom user site, effectively making caching it futile. Current limitations of pip don't allow it to ignore packages extant outside the installation destination.
See CONTRIBUTING.md.