# Example secrets configuration # There is a better way to do this, but this works. # To get started: # 1. Copy this file to 'secrets.nix' # 2. Run uuidgen (or some other algorithm) to generate a shared secret, and replace services.k3s.token's value with that # 3. Copy your SSH key(s) into the authorized_keys section. # 4. Profit! let pkgs = import {}; in { services.k3s.token = "shared.secret.here"; users.users.clusteradm.openssh.authorizedKeys.keys = [ ]; }