summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/rangehttpserver
diff options
context:
space:
mode:
authorEduard Bachmakov <eduarrrd@users.noreply.github.com>2024-08-09 22:17:11 +0200
committerEduard Bachmakov <eduarrrd@users.noreply.github.com>2024-08-09 23:10:30 +0200
commitcb10fe8aaf430862537f0ae807146995fc05c946 (patch)
tree98ef5eb1b01bc6d3308e9e894ff2654d68002d8d /pkgs/development/python-modules/rangehttpserver
parentcb9a96f23c491c081b38eab96d22fa958043c9fa (diff)
treewide: Remove ineffective capability grants.
Systemd units with `PrivateUsers` set get their capabilities within the user namespace only [1]. As a result they do cannot bind to privileged ports even though they *appear* like they should be able to. The units in this commit [2] set `PrivateUsers` unconditionally so binding to privileged ports is currently impossible. Granting them CAP_NET_BIND_SERVICE is useless and misleading any reader of those modules. Technically, this commit also hardens these modules ever so slightly. (There are corner cases where this could make sense (e.g. across units, using `JoinsNamspaceOf`) but this is arcane enough to not to be present in nixpkgs.) [1]: systemd.exec(5): PrivateUsers [2]: found using `rg -e 'PrivateUsers.?=\s+[^f][^a]' -l | xargs rg -e '\bCAP_' -l`
Diffstat (limited to 'pkgs/development/python-modules/rangehttpserver')
0 files changed, 0 insertions, 0 deletions