Installation of the judgehosts¶
A DOMjudge installation requires one or more judgehosts which will perform the actual compilation and evaluation of submissions.
Requirements¶
System requirements¶
The operating system is a Linux variant. DOMjudge has mostly been tested with Debian and Ubuntu, but should work on other environments. See our wiki for information about DOMjudge and WSLv2.
It is necessary that you have root access.
A TCP/IP network which connects the DOMserver and the judgehosts. The machines only need HTTP(S) access to the DOMserver.
Software requirements¶
PHP command line interface with the
curl
,json
,xml
,zip
extensions.Compilers for the languages you want to support.
For Debian (with some example compilers):
sudo apt install make sudo debootstrap libcgroup-dev lsof \
php-cli php-curl php-json php-xml php-zip procps \
gcc g++ default-jre-headless default-jdk-headless \
ghc fp-compiler
For RedHat:
sudo yum install make sudo libcgroup-devel lsof \
php-cli php-mbstring php-xml php-process procps-ng \
gcc gcc-c++ glibc-static libstdc++-static \
java-11-openjdk-headless java-11-openjdk-devel \
ghc-compiler fpc
Building and installing¶
After installing the software listed above, run configure. In this
example to install DOMjudge in the directory domjudge
under your
home directory:
./configure --prefix=$HOME/domjudge
make judgehost
sudo make install-judgehost
For running solution programs under a non-privileged user, a user and group have
to be added to the system that acts as judgehost. This user does not
need a home-directory or password, so the following command would
suffice to add a user and group domjudge-run
with minimal privileges:
sudo useradd -d /nonexistent -U -M -s /bin/false domjudge-run
Sudo permissions¶
The judgedaemon uses a wrapper to isolate programs when compiling
or running the submissions called runguard
. This wrapper needs
to be able to become root for certain operations like changing to the
runuser and performing a chroot. Also, the default
chroot-startstop.sh
script uses sudo to gain privileges for
certain operations. There’s a pregenerated snippet
in etc/sudoers-domjudge
that contains all required rules. You can
put this snippet in /etc/sudoers.d/
.
If you change the user you start the judgedaemon as, or the installation paths, be sure to update the sudoers rules accordingly.
Creating a chroot environment¶
The judgedaemon executes submissions inside a chroot environment for
security reasons. By default it mounts parts of a prebuilt chroot tree
read-only during this judging process (using the script
lib/judge/chroot-startstop.sh
). This is needed to support
extra languages that require access to interpreters or support
libraries at runtime, for example Java, C#, and any interpreted
languages like Python, Perl, Shell script, etc.
This chroot tree can be built using the script
bin/dj_make_chroot
. On Debian and Ubuntu the same
distribution and version as the host system are used, on other Linux
distributions the latest stable Debian release will be used to build
the chroot. Any extra packages to support languages can be passed with
the option -i
or be added to the INSTALLDEBS
variable in the script. The script bin/dj_run_chroot
runs an
interactive shell or a command inside the chroot. This can be used for
example to install new or upgrade existing packages inside the chroot.
Run these scripts with option -h
for more information.
Finally, if necessary edit the script lib/judge/chroot-startstop.sh
and adapt it to work with your local system. In case you changed the
default pre-built chroot directory, make sure to also update the sudo
rules and the CHROOTORIGINAL
variable in chroot-startstop.sh
.
Linux Control Groups¶
DOMjudge uses Linux Control Groups or cgroups for process isolation in the judgedaemon. Linux cgroups give more accurate measurement of actually allocated memory than traditional resource limits (which is helpful with interpreters like Java that reserve but do not actually use lots of memory). Also, cgroups are used to restrict network access so no separate measures are necessary, and they allow running multiple judgedaemons on a multi-core machine by using CPU binding.
The judgedaemon needs to run a recent Linux kernel (at least 3.2.0). The following steps configure cgroups on Debian. Instructions for other distributions may be different (send us your feedback!).
Edit grub config to add cgroup memory and swap accounting to the boot
options. Edit /etc/default/grub
and change the default
commandline to
GRUB_CMDLINE_LINUX_DEFAULT="quiet cgroup_enable=memory swapaccount=1"
On modern distros (e.g. Debian bullseye) which have cgroup v2 enabled by
default, you need to add systemd.unified_cgroup_hierarchy=0
as well.
Then run update-grub
and reboot.
After rebooting check that /proc/cmdline
actually contains the
added kernel options. On VM hosting providers such as Google Cloud or
DigitalOcean, GRUB_CMDLINE_LINUX_DEFAULT
may be overwritten
by other files in /etc/default/grub.d/
.
You have now configured the system to use cgroups. To create the actual cgroups that DOMjudge will use, run:
sudo systemctl enable create-cgroups --now
Note that this service will automatically be started if you use the
domjudge-judgehost
service, see below. Alternatively, you can
customize the script judge/create_cgroups
as required and run it
after each boot.
REST API credentials¶
The judgehost connects to the domserver via a REST API. You need to create an account in the DOMjudge web interface for the judgedaemons to use (this may be a shared account between all judgedaemons) with a difficult, random password and the ‘judgehost’ role.
On each judgehost, copy from the domserver (or create) a file
etc/restapi.secret
containing the id, URL,
username and password whitespace-separated on one line, for example:
default http://example.edu/domjudge/api/ judgehost MzfJYWF5agSlUfmiGEy5mgkfqU
The password here must be identical to that of the judgehost
user
in the admin web interface. Multiple lines may be specified to allow a
judgedaemon to work for multiple domservers. The id in the first column
is used to differentiate between multiple domservers, and should be
unique within the restapi.secret
file.
Starting the judgedaemon¶
Finally start the judgedaemon:
bin/judgedaemon
Upon its first connection to the domserver API, the judgehost will be auto-registered and will be by default enabled. If you wish to add a new judgehost but have it initially disabled, you can add it manually through the DOMjudge web interface and set it to disabled before starting the judgedaemon.
The judgedaemon can also be run as a service by running:
sudo systemctl enable domjudge-judgehost
sudo systemctl start domjudge-judgehost