nixpkgs/nixos/modules/services/monitoring/prometheus
Eduard Bachmakov cb10fe8aaf treewide: Remove ineffective capability grants.
Systemd units with `PrivateUsers` set get their capabilities within the user namespace only [1].
As a result they do cannot bind to privileged ports even though they *appear* like they should be able to.

The units in this commit [2] set `PrivateUsers` unconditionally so binding to privileged ports is currently impossible.
Granting them CAP_NET_BIND_SERVICE is useless and misleading any reader of those modules.
Technically, this commit also hardens these modules ever so slightly.

(There are corner cases where this could make sense (e.g. across units, using `JoinsNamspaceOf`) but this is arcane enough to not to be present in nixpkgs.)

[1]: systemd.exec(5): PrivateUsers
[2]: found using `rg -e 'PrivateUsers.?=\s+[^f][^a]' -l | xargs rg -e '\bCAP_' -l`
2024-08-09 23:10:30 +02:00
..
exporters nixos/prometheus-smartctl-exporter: providing the path to the binary is no longer needed 2024-07-31 10:48:38 +02:00
alertmanager-irc-relay.nix nixos: remove all uses of lib.mdDoc 2024-04-13 10:07:35 -07:00
alertmanager-webhook-logger.nix nixos/prometheus: Harden alertmanager/webhook-logger/pushgateway systemd definitions 2024-07-07 00:15:57 +01:00
alertmanager.nix nixos/prometheus: Harden alertmanager/webhook-logger/pushgateway systemd definitions 2024-07-07 00:15:57 +01:00
default.nix treewide: Remove ineffective capability grants. 2024-08-09 23:10:30 +02:00
exporters.md Merge pull request #222415 from justinas/prometheus-exporters-nftables 2024-04-03 01:28:20 +02:00
exporters.nix added prometheus-borgmatic-exporter module 2024-07-16 12:17:49 +02:00
pushgateway.nix nixos/prometheus: Harden alertmanager/webhook-logger/pushgateway systemd definitions 2024-07-07 00:15:57 +01:00
sachet.nix nixos: remove all uses of lib.mdDoc 2024-04-13 10:07:35 -07:00
xmpp-alerts.nix nixos: remove all uses of lib.mdDoc 2024-04-13 10:07:35 -07:00