Skip to content

Run confinement security checks more frequently #27

@timmc-edx

Description

@timmc-edx

codejail-service currently runs a set of security checks at startup that determine, for the runtime of the application, 1) how the healthcheck endpoint will respond, and 2) whether the code-exec endpoint will accept requests.

Because AppArmor profiles can be changed on the host without restarting the service, we should check more frequently. Any confinement failure should cause the service to enter a failure state until restarted. (A failing check followed by a passing one should still be considered a sign of an insecure service.)

Acceptance criteria:

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions