create-user: don't create .forward: we read straight from .public/.forward now
[hcoop/scripts.git] / create-user
CommitLineData
d2462e94 1#!/bin/bash -ex
2
3# MUST be executed:
4# - on deleuze
5# - as a user with an /etc/sudoers line
64f69c08 6# - member of "wheel" unix group on deleuze
78725790 7# - while holding tickets for a user who can 'ssh -K' to mire
64f69c08 8# - and is a member of "wheel" on mire
d2462e94 9# - while holding tokens for a user who is:
10# - a member of system:administrator
11# - listed in 'bos listusers deleuze'
12
13USER=$1
14
cd0db70e 15export PATH=$PATH:/afs/hcoop.net/common/bin/
16
d2462e94 17if test -z "$USER"; then
18 echo "Invoke as create-user <USERNAME>"
19 exit 1
20fi
21
22
23#
24# Kerberos principals
25# (creat kerberos principals: fred, fred/cgi, fred/mailfilter)
26#
27
28# We use -randkey for user's main principal as well, to make sure that
29# the creation process does not continue without having a main
30# principal. (But you who want to set password for a user, don't
31# worry - we'll invoke cpw later, so that it has the same effect
32# as setting password right now - while it is more error tolerant).
33
52e2a5b3 34sudo kadmin.local -p root/admin -q "ank -policy user -randkey +requires_preauth $USER@HCOOP.NET"
cd0db70e 35sudo kadmin.local -p root/admin -q "modprinc -maxlife 1day $USER@HCOOP.NET"
36sudo kadmin.local -p root/admin -q "ank -policy daemon -randkey +requires_preauth $USER/daemon@HCOOP.NET"
d2462e94 37
38#
39# Create AFS users corresponding to krb5 principals.
40# (fred/cgi principal == fred.cgi AFS user)
41#
42
43pts cu $USER || true
44ID=`pts examine $USER | head -n1 | sed 's_.*, id: *__' | sed 's_,.*__'`
cd0db70e 45pts cu $USER.daemon || true
46ID_DAEMON=`pts examine $USER.daemon | head -n1 | sed 's_.*, id: *__' | sed 's_,.*__'`
d2462e94 47
48
49#
50# Construct various paths for later perusal.
51#
52
53# (If it's not clear, for user fred, PATHBITS = f/fr/fred)
54PATHBITS=`echo $USER | head -c 1`/`echo $USER | head -c 2`/$USER
55HOMEPATH=/afs/hcoop.net/user/$PATHBITS
56MAILPATH=/afs/hcoop.net/common/email/$PATHBITS
64f69c08 57DBPATH=/afs/hcoop.net/common/.databases/$PATHBITS
d2462e94 58PGDIR=$DBPATH/postgres
59MYSQLDIR=$DBPATH/mysql
60
61
62#
63# Create LDAP entries. (With the whole libnss-ptdb, I kind of
64# lost the idea of what I want to do with LDAP, but we'll
65# see with time how well it integrates...)
66# The ID returned from AFS is important here, we want to make
67# sure those IDs match.
68#
69
70# USER entry
71echo "
72dn: uid=$USER,ou=People,dc=hcoop,dc=net
73objectClass: top
74objectClass: person
75objectClass: posixAccount
76cn: $USER
77uid: $USER
78gidNumber: $ID
d2462e94 79sn: $USER
80host: abulafia
81host: mire
82
83dn: cn=$USER,ou=Group,dc=hcoop,dc=net
84objectClass: top
85objectClass: posixGroup
86cn: $USER
87gidNumber: $ID
88memberUid: $USER
0963ebc5 89" | sudo ldapadd -x -D cn=admin,dc=hcoop,dc=net -y /etc/ldap.secret || true
d2462e94 90
cd0db70e 91# USER.daemon entry
d2462e94 92echo "
cd0db70e 93dn: uid=$USER.daemon,ou=People,dc=hcoop,dc=net
d2462e94 94objectClass: top
95objectClass: person
96objectClass: posixAccount
cd0db70e 97cn: $USER.daemon
98uid: $USER.daemon
99gidNumber: $ID_DAEMON
100sn: $USER.daemon
d2462e94 101
cd0db70e 102dn: cn=$USER.daemon,ou=Group,dc=hcoop,dc=net
d2462e94 103objectClass: top
104objectClass: posixGroup
cd0db70e 105cn: $USER.daemon
106gidNumber: $ID_DAEMON
107memberUid: $USER.daemon
0963ebc5 108" | sudo ldapadd -x -D cn=admin,dc=hcoop,dc=net -y /etc/ldap.secret || true
d2462e94 109
110
111#
112# Export .mailfilter and .cgi keys to a keytab file
113#
114
cd0db70e 115# create a daemon keytab (used by /etc/exim4/get-token)
116# *only* if it does not exist!
117test -e /etc/keytabs/user.daemon/$USER || \
118 sudo kadmin.local -p root/admin -q "ktadd -k /etc/keytabs/user.daemon/$USER $USER/daemon@HCOOP.NET"
d2462e94 119
cd0db70e 120# Properly chown/mod keytab files (must be $USER:www-data)
121sudo chown $USER:www-data /etc/keytabs/user.daemon/$USER
122sudo chmod 440 /etc/keytabs/user.daemon/$USER
d2462e94 123
7a7e31c9 124# rsync keytabs to mire
cd0db70e 125(cd /etc/keytabs
126 sudo tar clpf - user.daemon/$USER | \
127 ssh mire.hcoop.net cd /etc/keytabs\; sudo tar xlpf -)
d2462e94 128
129#
130# Create/mount/set-perms on user's volumes (home, mail, databases, logs)
131#
132
133# HOME VOLUME
0963ebc5 134vos examine user.$USER 2>/dev/null || \
135 vos create deleuze.hcoop.net /vicepa user.$USER -maxquota 400000
d2462e94 136mkdir -p `dirname $HOMEPATH`
ef64fd5f 137fs ls $HOMEPATH || fs mkm $HOMEPATH user.$USER
d2462e94 138chown $USER $HOMEPATH
139fs sa $HOMEPATH $USER all
cd0db70e 140fs sa $HOMEPATH system:anyuser l
d2462e94 141
142# Apache logs
143mkdir -p $HOMEPATH/logs/apache
ea773cea 144fs sa $HOMEPATH/logs/apache $USER.daemon rlwidk
d2462e94 145
7a7e31c9 146# public_html
05033b52 147mkdir -p $HOMEPATH/public_html/
7a7e31c9 148fs sa $HOMEPATH/public_html system:anyuser rl
05033b52 149mkdir -p $HOMEPATH/.procmail.d/
150fs sa $HOMEPATH/.procmail.d/ system:anyuser rl
cd0db70e 151mkdir -p $HOMEPATH/.public/
152fs sa $HOMEPATH/.public/ system:anyuser rl
cd0db70e 153mkdir -p $HOMEPATH/.public/.domtool/
154test -e $HOMEPATH/.domtool || \
155 test -L $HOMEPATH/.domtool || \
156 ln -s $HOMEPATH/.public/.domtool $HOMEPATH/.domtool
7a7e31c9 157
d2462e94 158# MAIL VOLUME
0963ebc5 159vos examine mail.$USER 2>/dev/null || \
160 vos create deleuze.hcoop.net /vicepa mail.$USER -maxquota 400000
d2462e94 161mkdir -p `dirname $MAILPATH`
ef64fd5f 162fs ls $MAILPATH || fs mkm $MAILPATH mail.$USER
163fs ls $HOMEPATH/Maildir || fs mkm $HOMEPATH/Maildir mail.$USER
cd0db70e 164fs sa $MAILPATH $USER all
ea773cea 165fs sa $MAILPATH $USER.daemon all
d2462e94 166
167# DATABASE VOLUME
168if ! vos examine db.$USER >/dev/null 2>/dev/null; then
169 mkdir -p `dirname /afs/.hcoop.net/common/.databases/$PATHBITS`
170 vos create -server afs -partition a -name db.$USER -maxquota 400000
171 fs mkmount -dir /afs/.hcoop.net/common/.databases/$PATHBITS -vol db.$USER -rw
172 vos release common.databases
173 fs sa -dir $DBPATH -acl system:postgres l
174 fs sa -dir $DBPATH -acl system:mysql l
175 fs sa -dir $DBPATH -acl system:backup rl
176fi
177
178# Create postgres user and tablespace placeholder within volume
179if ! [ -d $PGDIR ]; then
180 mkdir -p $PGDIR
181 chown postgres:postgres $PGDIR
182 fs sa -dir $PGDIR -acl system:postgres write
183
184 sudo -u postgres psql -c "CREATE TABLESPACE user_$USER OWNER postgres LOCATION '$PGDIR'" template1
185fi
186
187# Create mysql user and databases placeholder within volume
188mkdir -p $MYSQLDIR
189chown mysql:mysql $MYSQLDIR
190fs sa -dir $MYSQLDIR -acl system:mysql write
191
192
193#
194# Mount points for backup volumes
195#
196
cd0db70e 197mkdir -p `dirname /afs/hcoop.net/.old/user/$PATHBITS`
198mkdir -p `dirname /afs/hcoop.net/.old/mail/$PATHBITS`
199fs ls /afs/hcoop.net/.old/user/$PATHBITS || \
200 fs mkm /afs/hcoop.net/.old/user/$PATHBITS user.$USER.backup
201fs ls /afs/hcoop.net/.old/mail/$PATHBITS || \
202 fs mkm /afs/hcoop.net/.old/mail/$PATHBITS mail.$USER.backup
203vos release old
d2462e94 204
7fe272af 205# technically this might not be necessary, but for good measure...
d2462e94 206vos syncserv deleuze
207vos syncvldb deleuze
7fe272af 208
209# refresh volume location cache (takes ~2hrs otherwise)
d2462e94 210fs checkvolumes
7fe272af 211ssh mire.hcoop.net fs checkvolumes
d2462e94 212
e8f64a1b 213# Technically this is not idempotent. This is not *too* bad because
214# of the fact that in AFS non-system:administrators users can't change
215# the group/owner of a file anyways. However, users still might want
216# to know which other users created certain files (in, say, a dropbox
217# or something like that). FIMXE.
218chown -R $USER:nogroup $HOMEPATH
219chown -R $USER:nogroup $MAILPATH