wg-home-refresh: use the sandboxed wireguard-tools
This commit is contained in:
@@ -185,7 +185,7 @@ let
|
|||||||
# periodically re-apply peers, to ensure DNS mappings stay fresh
|
# periodically re-apply peers, to ensure DNS mappings stay fresh
|
||||||
# borrowed from <repo:nixos/nixpkgs:nixos/modules/services/networking/wireguard.nix>
|
# borrowed from <repo:nixos/nixpkgs:nixos/modules/services/networking/wireguard.nix>
|
||||||
wantedBy = [ "network.target" ];
|
wantedBy = [ "network.target" ];
|
||||||
path = with pkgs; [ wireguard-tools ];
|
path = [ config.sane.programs.wireguard-tools.package ];
|
||||||
serviceConfig.Restart = "always";
|
serviceConfig.Restart = "always";
|
||||||
serviceConfig.RestartSec = "60"; #< retry delay when we fail (because e.g. there's no network)
|
serviceConfig.RestartSec = "60"; #< retry delay when we fail (because e.g. there's no network)
|
||||||
serviceConfig.Type = "simple";
|
serviceConfig.Type = "simple";
|
||||||
@@ -215,6 +215,7 @@ let
|
|||||||
serviceConfig.SystemCallArchitectures = "native";
|
serviceConfig.SystemCallArchitectures = "native";
|
||||||
serviceConfig.SystemCallFilter = [
|
serviceConfig.SystemCallFilter = [
|
||||||
"@system-service"
|
"@system-service"
|
||||||
|
"@sandbox"
|
||||||
"~@chown"
|
"~@chown"
|
||||||
"~@cpu-emulation"
|
"~@cpu-emulation"
|
||||||
"~@keyring"
|
"~@keyring"
|
||||||
|
Reference in New Issue
Block a user