#!/bin/bash -lx # Deploy fai configuration to faiserver, # then start a virtual machine to test the config. set -eE -o pipefail trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?"' ERR ssh root@faiserver rm -rf /srv/fai/config/\* scp -r /a/bin/fai/fai/config root@faiserver:/srv/fai # fai example pass: fai #ROOTPW='$1$kBnWcO.E$djxB128U7dMkrltJHPf6d1' # generating a hashed password: # under debian, you can do # echo "yoursecrectpassword" | mkpasswd -m sha-512 -s # On arch, best seems to be copy your shadow file to a temp location, # then passwd, get out the new pass, then copy the shadow file back. ssh root@faiserver tee -a /srv/fai/config/class/DEFAULT.var <