HP-UX Reference (11i v2 07/12) - 1M System Administration Commands N-Z (vol 4)
s
swverify(1M) swverify(1M)
NAME
swverify - verify software products
SYNOPSIS
swverify [-d|-r][-F
][-v][-C session_file][-f software_file][
-J jobid] [-Q date]
[
-S session_file][
-t target_file][-x option=value][-X option_file]
[software_selections][
@ target_selections]
Remarks
• This command supports operations on remote systems. See Remote Operation below.
• For an overview of all SD commands, see the sd(5) man page by typing
man 5 sd on the com-
mand line.
DESCRIPTION
The
swverify command verifies the software_selections at one or more target_selections (for example,
root filesystems). When verifying installed software,
swverify checks software states, dependency rela-
tionships, file existence and integrity, in addition to executing vendor-supplied verification scripts.
The
swverify command also verifies software_selections at one or more target depots. For target
depots,
swverify performs all of the checks listed above, but does not execute verification scripts.
NOTE: swverify does not support operations on a tape depot.
The swverify command also supports these features:
• Verifies whether installed or configured software is compatible with the hosts on which that
software is installed.
• Verifies that all dependencies (prerequisites, corequisites, exrequisites) are being met (for installed
software) or can be met (for available software).
• Executes vendor-specific verify scripts that check if the software products is correctly
configured.
• Executes vendor-specific fix scripts that correct and report specific problems.
• Reports missing files, check all file attributes (ignoring volatile files). These attributes include per-
missions, file types, size, checksum, mtime, link source and major/minor attributes.
Remote Operation
You can enable SD to manage software on remote systems. To let the root user from a central SD con-
troller (also called the central management server or manager node) perform operations on a remote target
(also called the host or agent):
1) Set up the root, host, and template Access Control Lists (ACLs) on the remote machines to permit root
access from the controller system. To do this, run the following command on each remote system:
/usr/lib/sw/mx/setaccess
controller
NOTES:
• controller is the name of the central management server.
• If remote system is 11.00, make sure SD patch PHCO_22526 or a superseding patch is installed on
remote system before running
setaccess.
• If remote system is older than 11.00 or for some other reason does not have setaccess in place,
copy setaccess script from an 11.11 or higher system to the remote system.
2) swinstall, swcopy, and swremove have enhanced GUI interfaces for remote operations. Enable
the enhanced GUIs by creating the .sdkey file on the controller. Use this command:
touch /var/adm/sw/.sdkey
See sd(5), swinstall(1M), swcopy(1M), swjob(1M), swlist(1M), or swremove(1M) for more information
on interactive operations.
NOTE: You can also set up remote access by using swacl directly on the remote machines to grant root or
non-root access to users from the controller system.
530 Hewlett-Packard Company − 1 − HP-UX 11i Version 2: December 2007 Update