[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [OSSTest PATCH 2/2] ts-debian-fixup: avoid removing the host root password
for the following reasons: - it's the guest's root password that was being targeted, the fact that we're killing the host's one is a bug; - it's not needed, as a few lines below we copy the rsa keys necessary to login without any password being prompet. This has been tested by doing a full $ ./sg-run-job test-amd64-amd64-xl and, after that, restarting the guest and (successfully) ssh-ing there. Signed-off-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx> --- ts-debian-fixup | 1 - 1 file changed, 1 deletion(-) diff --git a/ts-debian-fixup b/ts-debian-fixup index f001418..66c65a5 100755 --- a/ts-debian-fixup +++ b/ts-debian-fixup @@ -55,7 +55,6 @@ sub access () { target_cmd_root($ho, <<END); set -ex mount /dev/$gho->{Vg}/$gho->{Lv} /mnt - perl -i~ -pe "s/^root:[^:]+:/root::/" /etc/shadow mkdir -p /mnt/root/.ssh /mnt/etc/ssh cp -a /root/.ssh/* /mnt/root/.ssh/. cp -a /etc/ssh/ssh_host_*key* /mnt/etc/ssh/. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |