commit | 772dcbbeec5cb971114bcd6433975ff2894997f1 | [log] [tgz] |
---|---|---|
author | Skyler Grey <minion@clicks.codes> | Mon Jun 10 17:14:06 2024 +0000 |
committer | Samuel Shuert <coded@clicks.codes> | Mon Jun 10 17:29:42 2024 +0000 |
tree | e179c2a9ab1091a983ea665e5a530d9d43e8b66e | |
parent | 8ef34818108286e06de0cbd32411715c4ae75e62 [diff] |
fix(tailscale): disable ssh server Tailscale ssh isn't properly supported on the currently released version of headscale, so while it's an excellent idea in theory it doesn't currently make much sense for us to have it on, and breaks SSHing to our openssh ssh servers over the tailnet Change-Id: Iac7039db42da8c05be192d555776f37150195214 Reviewed-on: https://git.clicks.codes/c/Infra/NixFiles/+/743 Reviewed-by: Samuel Shuert <coded@clicks.codes> Tested-by: Skyler Grey <minion@clicks.codes>
diff --git a/modules/nixos/clicks/networking/tailscale/default.nix b/modules/nixos/clicks/networking/tailscale/default.nix index 29e413a..9813e35 100644 --- a/modules/nixos/clicks/networking/tailscale/default.nix +++ b/modules/nixos/clicks/networking/tailscale/default.nix
@@ -37,7 +37,6 @@ extraUpFlags = [ "--login-server=${cfg.server}" "--accept-routes" - "--ssh" ] ++ (if cfg.runExitNode.enable then [ "--advertise-exit-node" ] else [ ]); authKeyFile = cfg.authKeyFile; };