mirror of
https://github.com/raspiblitz/raspiblitz.git
synced 2025-04-13 22:29:20 +02:00
lnd.service: avoid hanging on stop #2827
This commit is contained in:
parent
58ae87e3cb
commit
02425de990
@ -14,7 +14,8 @@ After=bitcoind.service
|
||||
[Service]
|
||||
ExecStartPre=-/home/admin/config.scripts/lnd.check.sh prestart mainnet
|
||||
ExecStart=/usr/local/bin/lnd --configfile=/home/bitcoin/.lnd/lnd.conf
|
||||
ExecStop=/usr/local/bin/lncli stop
|
||||
# avoid hanging on stop
|
||||
# ExecStop=/usr/local/bin/lncli stop
|
||||
PIDFile=/home/bitcoin/.lnd/lnd.pid
|
||||
|
||||
User=bitcoin
|
||||
@ -39,21 +40,16 @@ StandardError=journal
|
||||
|
||||
# Hardening Measures
|
||||
####################
|
||||
|
||||
# Mount /usr, /boot/ and /etc read-only for the process.
|
||||
ProtectSystem=full
|
||||
|
||||
# Disallow the process and all of its children to gain
|
||||
# new privileges through execve().
|
||||
NoNewPrivileges=true
|
||||
|
||||
# Use a new /dev namespace only populated with API pseudo devices
|
||||
# such as /dev/null, /dev/zero and /dev/random.
|
||||
PrivateDevices=true
|
||||
|
||||
# Deny the creation of writable and executable memory mappings.
|
||||
MemoryDenyWriteExecute=true
|
||||
|
||||
PrivateTmp=true
|
||||
|
||||
[Install]
|
||||
|
@ -289,7 +289,8 @@ EnvironmentFile=/mnt/hdd/raspiblitz.conf
|
||||
|
||||
ExecStartPre=-/home/admin/config.scripts/lnd.check.sh prestart ${CHAIN}
|
||||
ExecStart=/usr/local/bin/lnd --configfile=/home/bitcoin/.lnd/${netprefix}lnd.conf
|
||||
ExecStop=/usr/local/bin/lncli -n=${CHAIN} --rpcserver localhost:1${rpcportmod}009 stop
|
||||
# avoid hanging on stop
|
||||
# ExecStop=/usr/local/bin/lncli -n=${CHAIN} --rpcserver localhost:1${rpcportmod}009 stop
|
||||
PIDFile=/home/bitcoin/.lnd/${netprefix}lnd.pid
|
||||
|
||||
User=bitcoin
|
||||
@ -313,21 +314,16 @@ StandardError=journal
|
||||
|
||||
# Hardening Measures
|
||||
####################
|
||||
|
||||
# Mount /usr, /boot/ and /etc read-only for the process.
|
||||
ProtectSystem=full
|
||||
|
||||
# Disallow the process and all of its children to gain
|
||||
# new privileges through execve().
|
||||
NoNewPrivileges=true
|
||||
|
||||
# Use a new /dev namespace only populated with API pseudo devices
|
||||
# such as /dev/null, /dev/zero and /dev/random.
|
||||
PrivateDevices=true
|
||||
|
||||
# Deny the creation of writable and executable memory mappings.
|
||||
MemoryDenyWriteExecute=true
|
||||
|
||||
PrivateTmp=true
|
||||
|
||||
[Install]
|
||||
|
Loading…
x
Reference in New Issue
Block a user