From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 93B321EB45 for ; Wed, 8 May 2024 06:50:40 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.137.202.133 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715151041; cv=none; b=ZXjINWClT+midSQaMd9XekqwfNZomWPSt4FBvbcOy8GyYXYfQf4Utgs0NYMEDPKS1ve/bbLR7aYS4TftU6ElZQiZsFtjKl0PBhD/xBUBL3wWFwiUMo9zGUNwQj68NKVYAu1J9eag0Saf5sv+KKk9dUvXtUe/1C1hPDdw3tEd2+E= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715151041; c=relaxed/simple; bh=+2C1ZSNZYZUjelwVl9mMXLeccWTubZCkaSgLWcIg4z8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=YS74zqpdp8RZ9KhMZAIqMvXNm9BrtnYmXjrwkEq+bvgwH0ZBBbIdjnCgCdG4R97CIeE21t6Hb1LA0/eKy1agxFFIRWKNgU6JY68NBjfKCBmDOION8FhNbBlLNE88QP3mWe49VJZVjVM9jPxER+7U8m+Cac+ITCO4pRAT6nxdvy0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org; spf=none smtp.mailfrom=infradead.org; dkim=pass (2048-bit key) header.d=infradead.org header.i=@infradead.org header.b=o2gYKxsT; arc=none smtp.client-ip=198.137.202.133 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=infradead.org Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=infradead.org header.i=@infradead.org header.b="o2gYKxsT" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Sender:Content-Transfer-Encoding: MIME-Version:References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From: Reply-To:Content-Type:Content-ID:Content-Description; bh=bmNf48676D3MKlwLMsBWUfwsK1hR8GU6f4u+mHdNjKE=; b=o2gYKxsTC42LVKBLTwBp2nVVek deovUJ570+EgkWJsaqX0BsZxWZvDRchEzMKb0FtIU6yAeJcotYJC6jvE6QuVJ+inzazwCrY8UgTAg BGHylAG6aub+MW9EMiqITJxkYDSDuKbhT8zex9hS8S+Wis3zVwslufVwMWMF7YuLBH1gk17oXhpgq 0+qrydMNQLeOhB8mxj4qYdnYRPh3QXHt6A7dVskYOGa0PFLJrwzDkKTeZN2tsgwM0bPDvoKzdOGoF ltxzDybjO00BnwUiFm77wHqXcNG+fvoXYuvwGLAitBUqcB5FBuf9KTt2UkE1rBGmp83e9smK/xfK2 iOsWge6A==; Received: from mcgrof by bombadil.infradead.org with local (Exim 4.97.1 #2 (Red Hat Linux)) id 1s4b8S-0000000EIkJ-0UJZ; Wed, 08 May 2024 06:50:40 +0000 From: Luis Chamberlain To: kdevops@lists.linux.dev Cc: mcgrof@kernel.org Subject: [PATCH 03/10] guestfs: set default root password Date: Tue, 7 May 2024 23:50:31 -0700 Message-ID: <20240508065039.3408637-4-mcgrof@kernel.org> X-Mailer: git-send-email 2.44.0 In-Reply-To: <20240508065039.3408637-1-mcgrof@kernel.org> References: <20240508065039.3408637-1-mcgrof@kernel.org> Precedence: bulk X-Mailing-List: kdevops@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: Luis Chamberlain For guests we used to use vagrant and that had a default root password. Setting up a custom one makes sense if we're doing production stuff, but if you're just hacking on stuff on ephemeral development guests in a private network we want to be able to log in easily, not scrape random passwords. Use kdevops for the root password. Signed-off-by: Luis Chamberlain --- scripts/bringup_guestfs.sh | 1 + 1 file changed, 1 insertion(+) diff --git a/scripts/bringup_guestfs.sh b/scripts/bringup_guestfs.sh index e1ce70e256d3..17fabcecf0d2 100755 --- a/scripts/bringup_guestfs.sh +++ b/scripts/bringup_guestfs.sh @@ -64,6 +64,7 @@ run-command useradd -m kdevops -s /bin/bash append-line /etc/sudoers.d/kdevops:kdevops ALL=(ALL) NOPASSWD: ALL edit /etc/default/grub:s/^GRUB_CMDLINE_LINUX_DEFAULT=.*/GRUB_CMDLINE_LINUX_DEFAULT="console=ttyS0"/ run-command /usr/sbin/update-grub2 +root-password password:kdevops _EOT if [ $DO_UNREG -ne 0 ]; then -- 2.43.0