# i use faiserver as a dns alias, but ssh key is associated with
# a canonical hostname and we will have ssh warning spam unless we
-# use it, so look it up.
+# use it, so look it up just to avoid the warning spam.
faiserver_host=$(chost faiserver) || faiserver_host=faiserver
ssh root@$faiserver_host rm -rf /srv/fai/config
scp -r fai/config root@$faiserver_host:/srv/fai
-# fai example pass: fai
-#ROOTPW='$1$kBnWcO.E$djxB128U7dMkrltJHPf6d1'
-
-# generating a hashed password:
-# under debian, you can do
-# echo "yoursecrectpassword" | mkpasswd -m sha-512 -s
-# On arch, best seems to be copy your shadow file to a temp location,
-# then passwd, get out the new pass, then copy the shadow file back.
-
-f=/q/root/shadow/standard
-if s test -e $f; then
- ssh root@$faiserver_host tee -a /srv/fai/config/class/DEFAULT.var <<EOF
-ROOTPW='$(s cat $f)'
-EOF
-fi
-tpvar="$(s cat /q/root/shadow/traci-simple)"
-ssh root@$faiserver_host tee -a /srv/fai/config/class/tp.var <<EOF
-ROOTPW='$tpvar'
-EOF
scp ~/.ssh/id_rsa.pub \
root@$faiserver_host:/srv/fai/config/files/home/ian/.ssh/authorized_keys/GRUB_PC
# todo: automatically disable faiserver after a period so
# these files are not exposed.
-s scp -r /q/root/luks /q/root/shadow/traci{,-simple} \
+s scp -r /q/root/luks /q/root/shadow \
root@$faiserver_host:/srv/fai/config/distro-install-common
scp /a/bin/devbyid root@$faiserver_host:/srv/fai/nfsroot/usr/local/bin
ssh root@$faiserver_host bash <<'EOF'