create ~/.procmail.d/ with system:anyuser=rl
[clinton/scripts.git] / create-user
... / ...
CommitLineData
1#!/bin/bash -ex
2
3# MUST be executed:
4# - on deleuze
5# - as a user with an /etc/sudoers line
6# - member of wheel unix group
7# - while holding tokens for a user who is:
8# - a member of system:administrator
9# - listed in 'bos listusers deleuze'
10
11USER=$1
12
13if test -z "$USER"; then
14 echo "Invoke as create-user <USERNAME>"
15 exit 1
16fi
17
18
19#
20# Kerberos principals
21# (creat kerberos principals: fred, fred/cgi, fred/mailfilter)
22#
23
24# We use -randkey for user's main principal as well, to make sure that
25# the creation process does not continue without having a main
26# principal. (But you who want to set password for a user, don't
27# worry - we'll invoke cpw later, so that it has the same effect
28# as setting password right now - while it is more error tolerant).
29
30sudo kadmin.local -p root/admin -q "ank -policy user -randkey $USER@HCOOP.NET"
31sudo kadmin.local -p root/admin -q "ank -policy mailfilter -randkey $USER/mailfilter@HCOOP.NET"
32sudo kadmin.local -p root/admin -q "ank -policy cgi -randkey $USER/cgi@HCOOP.NET"
33
34
35#
36# Create AFS users corresponding to krb5 principals.
37# (fred/cgi principal == fred.cgi AFS user)
38#
39
40pts cu $USER || true
41ID=`pts examine $USER | head -n1 | sed 's_.*, id: *__' | sed 's_,.*__'`
42pts cu $USER.mailfilter $ID_MF || true
43ID_MF=`pts examine $USER.mailfilter | head -n1 | sed 's_.*, id: *__' | sed 's_,.*__'`
44pts cu $USER.cgi || true
45ID_CGI=`pts examine $USER.cgi | head -n1 | sed 's_.*, id: *__' | sed 's_,.*__'`
46
47
48#
49# Construct various paths for later perusal.
50#
51
52# (If it's not clear, for user fred, PATHBITS = f/fr/fred)
53PATHBITS=`echo $USER | head -c 1`/`echo $USER | head -c 2`/$USER
54HOMEPATH=/afs/hcoop.net/user/$PATHBITS
55MAILPATH=/afs/hcoop.net/common/email/$PATHBITS
56DBPATH=/afs/hcoop.net/common/databases/$PATHBITS
57PGDIR=$DBPATH/postgres
58MYSQLDIR=$DBPATH/mysql
59
60
61#
62# Create LDAP entries. (With the whole libnss-ptdb, I kind of
63# lost the idea of what I want to do with LDAP, but we'll
64# see with time how well it integrates...)
65# The ID returned from AFS is important here, we want to make
66# sure those IDs match.
67#
68
69# USER entry
70echo "
71dn: uid=$USER,ou=People,dc=hcoop,dc=net
72objectClass: top
73objectClass: person
74objectClass: posixAccount
75cn: $USER
76uid: $USER
77gidNumber: $ID
78homeDirectory: $HOMEPATH
79sn: $USER
80host: abulafia
81host: mire
82
83dn: cn=$USER,ou=Group,dc=hcoop,dc=net
84objectClass: top
85objectClass: posixGroup
86cn: $USER
87gidNumber: $ID
88memberUid: $USER
89" | sudo ldapadd -x -D cn=admin,dc=hcoop,dc=net -y /etc/ldap.secret || true
90
91# USER.mailfilter entry
92echo "
93dn: uid=$USER.mailfilter,ou=People,dc=hcoop,dc=net
94objectClass: top
95objectClass: person
96objectClass: posixAccount
97cn: $USER.mailfilter
98uid: $USER.mailfilter
99gidNumber: $ID_MF
100homeDirectory: $HOMEPATH
101sn: $USER.mailfilter
102
103dn: cn=$USER.mailfilter,ou=Group,dc=hcoop,dc=net
104objectClass: top
105objectClass: posixGroup
106cn: $USER.mailfilter
107gidNumber: $ID_MF
108memberUid: $USER.mailfilter
109" | sudo ldapadd -x -D cn=admin,dc=hcoop,dc=net -y /etc/ldap.secret || true
110
111# USER.cgi entry
112echo "
113dn: uid=$USER.cgi,ou=People,dc=hcoop,dc=net
114objectClass: top
115objectClass: person
116objectClass: posixAccount
117cn: $USER.cgi
118uid: $USER.cgi
119gidNumber: $ID_CGI
120homeDirectory: $HOMEPATH
121sn: $USER.cgi
122
123dn: cn=$USER.cgi,ou=Group,dc=hcoop,dc=net
124objectClass: top
125objectClass: posixGroup
126cn: $USER.cgi
127gidNumber: $ID_CGI
128memberUid: $USER.cgi
129" | sudo ldapadd -x -D cn=admin,dc=hcoop,dc=net -y /etc/ldap.secret || true
130
131
132#
133# Export .mailfilter and .cgi keys to a keytab file
134#
135
136# create a mailfilter keytab (used by /etc/exim4/get-token)
137sudo kadmin.local -p root/admin -q "ktadd -k /etc/keytabs/mailfilter/$USER $USER/mailfilter@HCOOP.NET"
138
139# create a cgi keytab
140sudo kadmin.local -p root/admin -q "ktadd -k /etc/keytabs/cgi/$USER $USER/cgi@HCOOP.NET"
141
142# Properly chown/mod keytab files (www-data must own the cgi keytab)
143sudo chown www-data:wheel /etc/keytabs/cgi/$USER
144sudo chown $USER:wheel /etc/keytabs/mailfilter/$USER
145sudo chmod 440 /etc/keytabs/cgi/$USER /etc/keytabs/mailfilter/$USER
146
147# rsync keytabs to mire
148rsync -e ssh -a /etc/keytabs/cgi/$USER mire.hcoop.net:/etc/keytabs/cgi/$USER
149
150#
151# Create/mount/set-perms on user's volumes (home, mail, databases, logs)
152#
153
154# HOME VOLUME
155vos examine user.$USER 2>/dev/null || \
156 vos create deleuze.hcoop.net /vicepa user.$USER -maxquota 400000
157mkdir -p `dirname $HOMEPATH`
158fs ls $HOMEPATH || fs mkm $HOMEPATH user.$USER
159chown $USER $HOMEPATH
160fs sa $HOMEPATH $USER all
161fs sa $HOMEPATH system:anyuser rl
162
163# Apache logs
164mkdir -p $HOMEPATH/logs/apache
165fs sa $HOMEPATH/logs/apache $USER.cgi rlwidk
166
167# public_html
168mkdir -p $HOMEPATH/public_html/
169fs sa $HOMEPATH/public_html system:anyuser rl
170mkdir -p $HOMEPATH/.procmail.d/
171fs sa $HOMEPATH/.procmail.d/ system:anyuser rl
172
173# MAIL VOLUME
174vos examine mail.$USER 2>/dev/null || \
175 vos create deleuze.hcoop.net /vicepa mail.$USER -maxquota 400000
176mkdir -p `dirname $MAILPATH`
177fs ls $MAILPATH || fs mkm $MAILPATH mail.$USER
178fs ls $HOMEPATH/Maildir || fs mkm $HOMEPATH/Maildir mail.$USER
179fs sa $MAILPATH $USER all
180fs sa $MAILPATH $USER.mailfilter all
181
182# DATABASE VOLUME
183if ! vos examine db.$USER >/dev/null 2>/dev/null; then
184 mkdir -p `dirname /afs/.hcoop.net/common/.databases/$PATHBITS`
185 vos create -server afs -partition a -name db.$USER -maxquota 400000
186 fs mkmount -dir /afs/.hcoop.net/common/.databases/$PATHBITS -vol db.$USER -rw
187 vos release common.databases
188 fs sa -dir $DBPATH -acl system:postgres l
189 fs sa -dir $DBPATH -acl system:mysql l
190 fs sa -dir $DBPATH -acl system:backup rl
191fi
192
193# Create postgres user and tablespace placeholder within volume
194if ! [ -d $PGDIR ]; then
195 mkdir -p $PGDIR
196 chown postgres:postgres $PGDIR
197 fs sa -dir $PGDIR -acl system:postgres write
198
199 sudo -u postgres psql -c "CREATE TABLESPACE user_$USER OWNER postgres LOCATION '$PGDIR'" template1
200fi
201
202# Create mysql user and databases placeholder within volume
203mkdir -p $MYSQLDIR
204chown mysql:mysql $MYSQLDIR
205fs sa -dir $MYSQLDIR -acl system:mysql write
206
207
208#
209# Mount points for backup volumes
210#
211
212mkdir -p `dirname /afs/hcoop.net/old/user/$PATHBITS`
213mkdir -p `dirname /afs/hcoop.net/old/mail/$PATHBITS`
214fs ls /afs/hcoop.net/old/user/$PATHBITS || \
215 fs mkm /afs/hcoop.net/old/user/$PATHBITS user.$USER.backup
216fs ls /afs/hcoop.net/old/mail/$PATHBITS || \
217 fs mkm /afs/hcoop.net/old/mail/$PATHBITS mail.$USER.backup
218
219vos syncserv deleuze
220vos syncvldb deleuze
221fs checkvolumes
222
223#
224# Finally, set password for main user's principal
225# Aborting this operation is harmless. Just re-invoke cpw.
226#
227# kadmin.local doesn't report errors properly, so we have to
228# check manually
229#
230sudo rm -f /tmp/kadmin.out
231sudo kadmin.local -p root/admin -q "cpw $USER@HCOOP.NET" \
232 2>&1 | tee /tmp/kadmin.out
233cat /tmp/kadmin.out | grep 'Password for .* changed'
234sudo rm -f /tmp/kadmin.out
235