diff options
| author | seth <[email protected]> | 2024-07-06 18:21:23 -0400 |
|---|---|---|
| committer | seth <[email protected]> | 2024-07-09 15:38:51 -0400 |
| commit | f9b9476089f74547a8f04484e7c9a4b369c9d1ef (patch) | |
| tree | 122ee327ae67508a5ead9fae46e814340295332f /modules/nixos/traits | |
| parent | 399012d647d5e08b01b33345b7711851090ee6d4 (diff) | |
nixos/tailscale: don't always enable secret management when available
yes this is an exception to most things, but authkeys only really need
to be on servers so womp womp
Diffstat (limited to 'modules/nixos/traits')
| -rw-r--r-- | modules/nixos/traits/tailscale.nix | 5 |
1 files changed, 1 insertions, 4 deletions
diff --git a/modules/nixos/traits/tailscale.nix b/modules/nixos/traits/tailscale.nix index bc70431..7e76f58 100644 --- a/modules/nixos/traits/tailscale.nix +++ b/modules/nixos/traits/tailscale.nix @@ -11,10 +11,7 @@ in options.traits.tailscale = { enable = lib.mkEnableOption "Tailscale"; ssh.enable = lib.mkEnableOption "Tailscale SSH"; - manageSecrets = lib.mkEnableOption "automatic management of secrets" // { - default = config.traits.secrets.enable; - defaultText = lib.literalExpression "config.traits.secrets.enable"; - }; + manageSecrets = lib.mkEnableOption "automatic management of secrets"; }; config = lib.mkIf cfg.enable ( |
