clightning: work around unsupported seccomp syscall
This commit is contained in:
parent
38a843d005
commit
4a74b7de08
@ -137,6 +137,14 @@ in {
|
|||||||
Restart = "on-failure";
|
Restart = "on-failure";
|
||||||
RestartSec = "10s";
|
RestartSec = "10s";
|
||||||
ReadWritePaths = cfg.dataDir;
|
ReadWritePaths = cfg.dataDir;
|
||||||
|
|
||||||
|
# TODO-EXTERNAL:
|
||||||
|
# The seccomp version used by systemd in NixOS 21.05 doesn't support
|
||||||
|
# handling syscall 436 (close_range), which has only recently been added:
|
||||||
|
# https://github.com/seccomp/libseccomp/commit/ac849e7960547d418009a783da654d5917dbfe2d
|
||||||
|
#
|
||||||
|
# Disable seccomp filtering because clightning depends on this syscall.
|
||||||
|
SystemCallFilter = [];
|
||||||
} // nbLib.allowedIPAddresses cfg.enforceTor;
|
} // nbLib.allowedIPAddresses cfg.enforceTor;
|
||||||
# Wait until the rpc socket appears
|
# Wait until the rpc socket appears
|
||||||
postStart = ''
|
postStart = ''
|
||||||
|
Loading…
Reference in New Issue
Block a user