Software Distributor Administrator Guide (September 2010)

11.4.3.1 SW_DEFERRED_KERNBLD ....................................................................280
11.4.3.2 SW_INITIAL_INSTALL ...........................................................................281
11.4.3.3 SW_KERNEL_PATH ................................................................................281
11.4.3.4 SW_SESSION_IS_KERNEL.......................................................................281
11.4.3.5 SW_SESSION_IS_REBOOT.......................................................................281
11.4.3.6 SW_SYSTEM_FILE_PATH .......................................................................281
11.4.4 Variables That Affect swverify..........................................................................281
11.4.4.1 SW_IS_COMPATIBLE...............................................................................281
11.5 Execution of Control Scripts .....................................................................................281
11.5.1 Details Common to All Control Scripts ............................................................282
11.5.2 Checkinstall Scripts ..........................................................................................283
11.5.3 Preinstall Scripts ...............................................................................................283
11.5.4 Postinstall Scripts ..............................................................................................284
11.5.5 Configure Scripts ..............................................................................................284
11.5.6 Unconfigure Scripts ..........................................................................................285
11.5.7 Verify Scripts ....................................................................................................285
11.5.8 Fix Scripts..........................................................................................................286
11.5.9 Checkremove Scripts ........................................................................................286
11.5.10 Preremove Scripts ...........................................................................................286
11.5.11 Postremove Scripts ..........................................................................................287
11.5.12 Request Scripts.................................................................................................287
11.6 Execution of Other Commands by Control Scripts ..................................................288
11.7 Control Script Input and Output...............................................................................289
11.8 File Management by Control Scripts ........................................................................291
11.9 Testing Control Scripts .............................................................................................291
11.9.1 Testing Installation Scripts ...............................................................................292
11.9.2 Testing Configuration Scripts ...........................................................................292
11.9.3 Testing Removal Scripts ...................................................................................294
11.10 Requesting User Responses (swask)........................................................................295
11.10.1 Using swask.....................................................................................................295
11.11 Request Script Tasks and Examples.........................................................................297
11.11.1 swask Examples...............................................................................................297
11.11.2 swinstall Examples..........................................................................................297
11.11.3 swconfig Examples..........................................................................................298
12 Nonprivileged SD ................................................................................................................299
12.1 Overview...................................................................................................................299
12.1.1 Who Can Benefit?..............................................................................................299
12.1.2 How Does It Work?...........................................................................................299
12.1.3 Limitations.........................................................................................................300
12.2 Setting Up Nonprivileged Mode...............................................................................300
12.2.1 Packaging Software for Use in Nonprivileged Mode.......................................300
12.2.2 Turning On Nonprivileged Mode.....................................................................301
12 Table of Contents