<eyJhb>
Could be usefull as well, might look at that in the long run
<eyJhb>
Welll
<eyJhb>
[srtoffee] Copying secrets...
<eyJhb>
[srtoffee] Finished copying secrets
<eyJhb>
[srtoffee] Triggering system switcher...
<eyJhb>
[srtoffee] bash: /nix/store/pb9ji5sldkwwgij6zh7w953ykywbjajx-switch/bin/switch: No such file or directory
<eyJhb>
Am I doing something wrong infinisil ?
<eyJhb>
Basically getting this - [srtoffee] error: cannot add path '/nix/store/08phg319sck4dhq4wf9dp6431pdpz2xc-users-groups.json' because it lacks a valid signature
<infinisil>
hmmm
<infinisil>
eyJhb: What's the full contents of the deploy script?
<eyJhb>
I fixed it by adding my nix-deployer user to trusted users.
<infinisil>
It should have a `nix-copy-closure` at some point which is supposed to copy the `/nix/store/08ph...` file over
<eyJhb>
I can get the output in a bit
<infinisil>
Oh
<eyJhb>
But should that be required?
<infinisil>
I'd try enabling `set -x` for the switch script
<infinisil>
(if you didn't solve it already)
<infinisil>
So we could figure out what the problem with it is
<eyJhb>
Trying to see if it happens on the other host as well
<eyJhb>
I however do miss being able to execute a set of commands on a bunch of hosts, as morph does. But I love the defaults quite a lot with nixus. And the modules thing which I am yet to use
<eyJhb>
infinisil: check PM, I have sent the logs
<eyJhb>
Or the last of the
<eyJhb>
them*
cole-h has joined #nixus
<infinisil>
Can also send them here unless there's any private information there :)
<infinisil>
eyJhb: What's the output with `set -x`
<eyJhb>
infinisil: IPs :p
<eyJhb>
/domains
<eyJhb>
Logs with -x sent infinisil
eyJhb has quit [Quit: Clever message]
eyJhb has joined #nixus
eyJhb has joined #nixus
eyJhb has quit [Changing host]
<infinisil>
eyJhb: Oh yeah I guess it makes sense, the closure didn't finish copying
<infinisil>
I guess it should fail before trying to continue though
<infinisil>
Ugh, bash
<eyJhb>
It can be "fixed" with having the ssh user as a trusted user. I am guessing most just use root as their user, or have their default user as trusted