From 00bbbd81351545b1fa33861a8711dece15650e99 Mon Sep 17 00:00:00 2001 From: Gabriel Arazas Date: Tue, 24 Jan 2023 11:06:09 +0800 Subject: [PATCH] hosts/ni: disable ldap service Not yet familiar. Also causing me trouble with long login times since it is also trying for all users in the system, it seems. --- hosts/ni/default.nix | 14 -------------- 1 file changed, 14 deletions(-) diff --git a/hosts/ni/default.nix b/hosts/ni/default.nix index c67423ae..4f6637fb 100644 --- a/hosts/ni/default.nix +++ b/hosts/ni/default.nix @@ -57,7 +57,6 @@ in in getSecrets { ssh-key = { }; - "ldap/password".owner = "nslcd"; "wireguard/private-key" = { group = config.users.users.systemd-network.group; reloadUnits = [ "systemd-networkd.service" ]; @@ -207,19 +206,6 @@ in system.stateVersion = "22.11"; # Yes! I read the comment! - # Trying to be very portable with LDAP. - users.ldap = { - enable = true; - base = "dc=foodogsquared,dc=one"; - bind = { - distinguishedName = "cn=Manager,dc=foodogsquared,dc=one"; - passwordFile = config.sops.secrets."ni/ldap/password".path; - }; - - daemon.enable = true; - server = "ldaps://ldap.foodogsquared.one/"; - }; - # Setting up Wireguard as a VPN tunnel. Since this is a laptop that meant to # be used anywhere, we're configuring Wireguard here as a "client". #