swverify.1m (2011 03)

s
swverify(1M) swverify(1M)
NAME
swverify - verify software products
SYNOPSIS
swverify [-d|-r][-F
][-v][-C session_file][-f software_file][
-J jobid] [-Q date ]
[
-S session_file][
-t target_file][-x option=value ][-X option_file ]
[software_selections][
@ target_selections]
Remarks
This command supports operations on remote systems. See Remote Operation below.
For an overview of all SD commands, see the sd(5) man page by typing
man5sdon the com-
mand line.
DESCRIPTION
The
swverify command verifies the software_selections at one or more target_selections (for example,
root filesystems). When verifying installed software,
swverify checks software states, dependency
relationships, file existence and integrity, in addition to executing vendor-supplied verification scripts.
The
swverify command also verifies software_selections at one or more target depots. For target
depots,
swverify performs all of the checks listed above, but does not execute verification scripts.
NOTE: swverify does not support operations on a tape depot.
The
swverify command also supports these features:
Verifies whether installed or configured software is compatible with the hosts on which that
software is installed.
Verifies that all dependencies (prerequisites, corequisites, exrequisites) are being met (for
installed software) or can be met (for available software).
Executes vendor-specific
verify scripts that check if the software products is correctly
configured.
Executes vendor-specific
fix scripts that correct and report specific problems.
Reports missing files, check all file attributes (ignoring volatile files). These attributes include
permissions, file types, size, checksum, mtime, link source and major/minor attributes.
Remote Operation
You can enable SD to manage software on remote systems. To let the root user from a central SD con-
troller (also called the central management server or manager node) perform operations on a remote tar-
get (also called the host or agent ):
1) Set up the root, host, and template Access Control Lists (ACLs) on the remote machines to permit
root access from the controller system. To do this, run the following command on each remote sys-
tem:
/usr/lib/sw/mx/setaccess controller
NOTES:
controller is the name of the central management server.
If remote system is 11.00, make sure SD patch PHCO_22526 or a superseding patch is installed
on remote system before running
setaccess.
If remote system is older than 11.00 or for some other reason does not have
setaccess in place,
copy setaccess script from an 11.11 or higher system to the remote system.
2)
swinstall, swcopy, and swremove have enhanced GUI interfaces for remote operations. Enable
the enhanced GUIs by creating the .sdkey file on the controller. Use this command:
touch /var/adm/sw/.sdkey
See sd(5), swinstall (1M), swcopy(1M), swjob(1M), swlist (1M), or swremove (1M) for more information
on interactive operations.
NOTE: You can also set up remote access by using
swacl directly on the remote machines to grant root
or non-root access to users from the controller system.
HP-UX 11i Version 3: March 2011 1 Hewlett-Packard Company 1

Summary of content (12 pages)