swa-step man page on HP-UX

Man page or keyword search:  
man Server   10987 pages
apropos Keyword Search (all sections)
Output format
HP-UX logo
[printable version]

swa-step(1M)							  swa-step(1M)

NAME
       - advanced control of Software Assistant execution steps

SYNOPSIS
       inventory_source]

       analyzer] inventory_source]

       stdout_report_type]

       target_depot]

       target_depot

DESCRIPTION
       The  command  supports  many  advanced use cases.  The and commands are
       made up of steps.  The command is comprised of  the  steps:  inventory,
       catalog,	 analyze,  and report.	The command is comprised of the steps:
       download and depot. With the command, you can execute one discrete step
       of the or command, such as: The command can be used to create different
       standard output reports, without having to redo	analysis.   Additional
       examples and use cases are provided below.

       Create  an  inventory  of  the  software	 installed on a system or in a
       depot.  This
	      inventory is stored in the subdirectory of the directory	speci‐
	      fied  by	the  extended  option  (the  filename  is  of the form
	      "swa_inventory_<number>.xml").  Example use case:	 if the system
	      to be analyzed and the system that will perform the analysis are
	      on isolated networks, run on the system to be analyzed to create
	      an  inventory file. Then copy that file (for example, burn a CD)
	      to the cache directory on the analysis system.

       Download an HP-supplied catalog of potential issues  and	 their	recom‐
       mended
	      resolutions.   This  catalog  is	stored in the directory of the
	      directory specified by the extended option (the default filename
	      is  "swa_catalog.xml").	Example	 use  case: if the system that
	      will perform the analysis has no access to the  Internet,	 down‐
	      load  the	 catalog  to a system with Internet access.  Then copy
	      the catalog (for example, on a USB drive) to the cache directory
	      on the analysis system.

       Given the results of running
	      and  the inventory file is compared with the catalog file to see
	      what issues need to be resolved on the system (see the "Security
	      Considerations"  section).   The	analysis results are stored in
	      the subdirectory of the  directory  specified  by	 the  extended
	      option  (the  default  filename is "swa_analysis.xml").  Example
	      use case: run different times, each time specifying a  different
	      set of analyzers and a different analysis file.

       Given the results of running
	      a	 summary  of  recommended  actions are written to the standard
	      output and comprehensive results are written to the subdirectory
	      of  the  directory specified by the extended option (the default
	      filename is "swa_report.html").  Example use case: run  multiple
	      times,  each  time  specifying a different stdout report format.
	      Another example is running on each analysis file created by mul‐
	      tiple runs of

       Given the results of running
	      download	software  recommended by the analysis (in the analysis
	      file).  The software is downloaded into a	 directory  controlled
	      by the extended option.  Example use case: if the system to per‐
	      form the analysis doesn't have Internet access, copy the	analy‐
	      sis  file	 to a system with Internet access, and run the command
	      on that system.

       Given the results of running
	      and package the downloaded software into a depot.	 Depending  on
	      the extended options used, a new depot is created or an existing
	      depot is augmented.  Example use case: if a depot server	system
	      doesn't have Internet access, use to download software to a sep‐
	      arate system that does have Internet  access.   Then,  copy  the
	      software	to  the swcache directory on your depot server and use
	      to create your depot.

       The analysis that performs relies on the integrity of the inventory  to
       determine  the  appropriate  patches  to	 install on the system.	 It is
       important that all protocols used to transmit the  inventory  data  are
       integrity  protected  and  that the host used to generate the inventory
       data is accurately represented.	For example, use of for	 gathering  an
       inventory  of a remote system uses a clear-text, unauthenticated proto‐
       col that does not protect the integrity	of  the	 data.	 Using	Secure
       Shell  to gather an inventory of a remote system uses an integrity pro‐
       tected (and encrypted) protocol.	 Even when  using  Secure  Shell,  the
       analysis	 still	relies	on the source of the data (the remote host) to
       accurately represent the software contents installed on that system.

       Software download relies on the	integrity  of  the  analysis  file  to
       ensure  the  integrity  of patches before unpacking them.  The analysis
       file gets MD5 checksum information directly from the  catalog.	There‐
       fore it is important that all transmissions of the catalog and/or anal‐
       ysis file are integrity protected and  that  file  permissions  do  not
       allow unnecessary modification.

       Depot creation relies on the integrity of the patches within the direc‐
       tory.  Therefore, after	unpacking the patches, it  is  important  that
       all subsequent transmissions of the patches are integrity protected and
       that file permissions do not allow unauthorized modification.   Deploy‐
       ing  software  using Software Distributor (e.g., using the command) has
       security properties that are documented in  the	"Software  Distributor
       Administration Guide".  recognizes the following options:

	      Specifies	 an  analyzer to use.  Each analyzer represents a dif‐
	      ferent type of
		     analysis that can	perform.   You	may  specify  multiple
		     options.  The supported analyzers follow:

		      - patches that fix critical problems

		     - patches with critical warnings

		     - patches with warnings (a superset of PCW)

		     - latest quality pack

		     - security bulletins that may apply

		       - include patch or recommended successor

		       -  include specific patch.  (Note: use of CHAIN is gen‐
		     erally preferred.)

		     If this option is not specified, the  "QPK",  "SEC",  and
		     "PCW" analyzers are used.

	      Run this command in preview mode.

	      Specifies the type of report to display to stdout.  Legal values
	      are:

		     - (Default) Summary of recommended actions

		     - Summary of identified issues

		     - Recommended actions with issue justification

		     - Comprehensive report in html format

		     - No report is generated on stdout

						 Specify one system  or	 depot
						 to   be  inventoried,	or  an
						 existing local inventory file
						 to be
			    analyzed  and  reported on.	 If this option is not
			    specified, the local system is  inventoried,  ana‐
			    lyzed  and	reported  on.	Supports  Secure Shell
			    (recommended for remote  connections)  and	swlist
			    (legacy)  protocols for gathering inventory infor‐
			    mation.  See the extended option for more details.

		     The depot software is copied into.	 This is where patches
		     from HP are copied into.
			    Normally,  the  target_depot should be empty and a
			    new depot will be created.	If the	depot  already
			    exists,  you  must specify the advanced option and
			    understand	its  implications.   (See   also   the
			    option).

		     The verbosity level is decreased by one for each instance
			    is specified.  (See also the option.)

		     The verbosity level is increased by one for each instance
			    is specified.  (See also the option.)

		     Displays general usage.

		     Describes	the legal values for this option.  If <option>
		     is
			    all possible extended options are listed  for  the
			    specified  major  mode.   If no mode is given, all
			    extended options are listed.

		     Sets the  extended	 option	 to  a	value.	 See  Extended
		     Options definitions below.

		     Describe the legal values for this option.

		     Gets the extended options from
			    option_file.   (See the file for a description and
			    examples of syntax for this file).

	      The extended options may be specified in different ways: on  the
	      command line using the option, in an option file specified using
	      the option, or in one of the configuration files	(system	 wide)
	      or (user-specific).  The file provides example syntax for a con‐
	      figuration or file.  If the same option  is  given  in  multiple
	      locations,  the  following  order is prioritized from highest to
	      lowest:

		     1.	    Options specified on the command line

		     2.	    Options specified within an option file

		     3.	    Proxy environment variables (See Environment Vari‐
			    able section.)

		     4.	    Options specified within the $HOME/.swa.conf file

		     5.	    Options specified within the /etc/opt/swa/swa.conf
			    file

		     6.	    Default value, specified in	 the  descriptions  of
			    each option below in format

	      Note:  If	 the  same option or extended option is given multiple
	      times in the same location,  the	last  takes  effect.   If  the
	      option  has a single letter equivalent (e.g., and ) and both are
	      used on the command line, the  single  letter  option  generally
	      takes  precedence.   If  the  single  letter  option  affects an
	      extended option that takes a list of arguments,  specifying  the
	      single letter option multiple times will append to the list.

	      recognizes  the  following  (extended)  options, which are shown
	      with their default values:

	      Usage: Advanced
		     Applicable steps:	download depot
		     Determines whether the target depot must be empty at  the
		     start  of	the command, or can be an existing depot.  SWA
		     does not perform any analysis of the depot contents.   By
		     specifying this option, you accept responsibility for the
		     contents of this depot.

		     Target depot can be existing (i.e., non-empty).

		     Target depot must be empty at the start of
			    the command.

	      Usage: Basic
		     Applicable steps:	analyze report download depot
		     The file containing the raw analysis results, including a
		     list  of software that should be downloaded from Hewlett-
		     Packard in order to address the issues found by the anal‐
		     ysis.   Use  this	option to save the results from a spe‐
		     cific analysis, and later reuse those results in order to
		     download  the  corresponding software from HP.  If you do
		     not use the default location when the  analysis  file  is
		     created  (e.g.,  creates  this  file), be sure to specify
		     that location when the analysis file is later used (e.g.,
		     uses this file).

		     Possible values include any absolute or relative pathname
		     with appropriate permissions.

		     The use of ${user_dir} at the beginning  of  this	option
		     value  is substituted with the value of the option (which
		     defaults to $HOME.swa).

	      Usage: Basic
		     Applicable steps:	analyze
		     Specifies a space-separated  list	(appropriately	quoted
		     for  your	shell  if applicable) of analyzers to be used.
		     Each analyzer represents a	 different  type  of  analysis
		     that  SWA can perform.  The supported analyzers follow in
		     two lists (generic and specific).

		     Generic analyzers:

		     - patches that fix critical problems

		     - patches with critical warnings

		     - patches with warnings (a superset of PCW)

		     - latest quality pack

		     - security bulletins that may apply

		     Specific analyzers:

		     - Include patch or recommended successor.

		     - Include specific patch.	Using CHAIN is generally  pre‐
		     ferred.

		     - Include specific issue.

	      Note:   This  option is equivalent to -a but is suitable for use
	      within an extended options file (-X) or configuration file.

	      Usage: Intermediate
		     Applicable steps:	catalog
		     Specifies the age, in hours, of the  locally-cached  copy
		     of the HP software catalog before a new local copy should
		     be obtained.  If the local file becomes too old (based on
		     the timestamp in the file), SWA tries to obtain a copy of
		     the catalog from the 'catalog_source'  location.	It  is
		     possible  that  the  remote  catalog  is also too old (as
		     determined by the timestamp in the file), for example  if
		      'catalog_max_age=2'  and	'catalog_source'  specifies  a
		     location that gets updated daily from HP's	 website.   In
		     this  case,  the  downloaded catalog is used, but will be
		     updated every time SWA checks the catalog's age.

		     Note: There are two special values, 0 and -1.  The	 value
		     of	 0  signifies to always update the file, and the value
		     of -1 signifies to never update the file,	regardless  of
		     age.

	      Usage: Intermediate
		     Applicable steps:	catalog analyze
		     The  file containing a locally-cached copy of the catalog
		     of available HP  software	and  published	security  bul‐
		     letins.

		     Possible values include any absolute or relative pathname
		     with appropriate permissions.

		     The use of ${user_dir} at the beginning  of  this	option
		     value  is substituted with the value of the option (which
		     defaults to $HOME.swa).

	      Usage: Intermediate
		     Applicable steps:	catalog
		     A space-separated list of URLs (appropriately quoted  for
		     your  shell if applicable) that controls the location and
		     service to obtain the SWA catalog.	 The catalog  must  be
		     internal to your data center; you may not use this option
		     to access the official HP site. The  catalog  contains  a
		     list  of  all potential issues, relevant software product
		     updates and patches that address many issues, along  with
		     descriptions  of manual actions that address some issues.
		     HP frequently updates the official catalog as new	issues
		     become known and as new actions are recommended.

		     The following format is used to specify URLs:

		     <service>:[user:password@]<hostname.domainname>:<port>
		     Where '<service>' is one of  the  following  methods  for
		     obtaining the remote catalog:

		     - Secure\/authenticated HTTP

		     - Unauthenticated HTTP

		     - Unauthenticated FTP

	      Usage: Advanced
		     Applicable steps:	catalog download
		     When  set to true, swa will require the certificate revo‐
		     cation list (CRL) to  be  updated	and  checked  for  the
		     trusted certificate authority (CA) certificate being used
		     to validate the remote server.

		     In the unlikely event that the private certificate of the
		     server  pointed  to  by  the option is suspected of being
		     compromised, its certificate will be revoked,  and	 added
		     to a list of revoked certificates by the CA.

		     The CRL must be signed by the same certificate chain that
		     signed the host certificate being checked.	 Checking  the
		     CRL  requires  regular  downloads	from the CA, which can
		     lengthen the swa run time.	 If you do not wish  to	 vali‐
		     date a revocation list, set this to false.

	      Usage: Advanced
		     Applicable steps:	catalog download
		     The  download_cmd extended option can be used to override
		     the default swa download commands, and therefore the pro‐
		     tocols  swa uses to download the catalog and patch files.
		     The command is enclosed in single quotes ('). This option
		     is	 useful in cases where a system does not have a direct
		     connection to the Internet, but  can  execute  a  command
		     that  can	download a URL from the Internet (for example,
		     by using a gateway machine).

		     Using this option overrides many options which  are  used
		     by	 the  internal	swa  download functionality, including
		     proxy and CRL configuration.

		     This command should take one option that is  supplied  by
		     swa  (the	URL  of	 a file to download), and outputs that
		     file to its stdout.  If the actual command in your	 envi‐
		     ronment behaves differently, it can be wrapped by a shell
		     script in order to provide the interface that swa needs.

		     Note:  Programs like wget, curl, and Perl's  GET  can  be
		     used  to  pass  the contents of a URL to standard output.
		     These commands may provide support for different types of
		     proxies  or  can  be used with ssh to work with a gateway
		     server. The GET command provides basic functionality. The
		     wget and curl commands provide extended functionality and
		     are  provided  with  HP-UX	 11i  Internet	Express	  (see
		     http:www.hp.comgointernetexpress).	 All  three  of	 these
		     commands are available for operating systems  other  than
		     HP-UX,  such  as  Linux  and  Windows.  For example, some
		     external  commands	  can	authenticate   using   Windows
		     NT.-based	domain	passwords  to  a Microsoft. web proxy,
		     which is not directly supported by swa.

		     The following command is an example:

		     -x download_cmd='usrlocalbinmyScript.sh'

		     The URL passed to	download_cmd  may  contain  characters
		     with  special  meanings to shells or other command inter‐
		     preters. By using a custom	 script	 as  shown  above  any
		     requirement for nested quotes can be handled.

		     The download command also allows URL target substitution.
		     The actual URL used will be substituted in place  of  the
		     URL target string of the download command. The URL target
		     string default is %url. The above example	download  com‐
		     mand  does not use the URL target string, SWA appends the
		     URL destination to the end of the command, which  becomes
		     the script argument. The URL target string can be custom‐
		     ized, see the option.

		     The following command is an example:

		     -x download_cmd='usrbincurl %url'

		     The URL passed to download_cmd may be defined in the cat‐
		     alog_source  option.   Otherwise  the default URL will be
		     used.

	      Usage: Advanced
		     Applicable steps:	catalog download
		     Proxy host and port (with optional http basic authentica‐
		     tion username and password) for accessing content via the
		     FTP protocol.   No	 proxy	information  is	 specified  by
		     default.

		     The following format is used:

		     <service>:[user:password@]<proxy-server>:<port>

		     For example: ftp_proxy=http:web-proxy.mycompany.com:8088

		     The  use of ${proxy} for this option value is substituted
		     with the value  of	 the  option  (which  is  not  set  by
		     default).

	      Usage: Basic
		     Applicable steps:	catalog download
		     Use  this option to specify the HP user ID to gain access
		     to the HPSC patch database. If SWA determines that the HP
		     user  ID  is  not	set in a config file or on the command
		     line, the user will be prompted for it.  Prompting for HP
		     user ID can be turned off using '-x prompt=false'.

	      Usage: Basic
		     Applicable steps:	catalog download
		     Use  this option in conjunction with hp_id to specify the
		     HP password to gain access to the HPSC patch database. If
		     SWA  determines that the HP password is not set in a con‐
		     fig file or  on  the  command  line,  the	user  will  be
		     prompted  for it. Prompting for HP password can be turned
		     off using	'-x prompt=false'.

	      Usage: Basic
		     Applicable steps:	report
		     The file containing the  HTML-formatted  report  that  is
		     generated	by  the	 command.   This is a single file with
		     internal hyperlinks.  The html report may be  printed  to
		     stdout using the option.

		     The  use  of  ${user_dir} at the beginning of this option
		     value is substituted with the value of the option	(which
		     defaults to $HOME.swa).

	      Usage: Advanced
		     Applicable steps:	catalog download
		     Proxy host and port (with optional http basic authentica‐
		     tion username and password) for accessing content via the
		     HTTPS  protocol.	No  proxy  information is specified by
		     default.

		     The following format is used:

		     <service>:[user:password@]<proxy-server>:<port>

		     For	    example:		 https_proxy=http:web-
		     proxy.mycompany.com:8088

		     If	 usernamepassword are specified as authentication cre‐
		     dentials to your proxy server, http basic	authentication
		     is	 used,	which  is  a  clear-text protocol, (i.e., your
		     password may be  visible  to  others  on  your  network).
		     Also, credentials specified on the command-line are visi‐
		     ble to other  local  users,  and  access  to  credentials
		     stored  in	 extended option files are determined by their
		     permissions.  If your proxy server requires another  type
		     of authentication, see the option.

		     The  use of ${proxy} for this option value is substituted
		     with the value  of	 the  option  (which  is  not  set  by
		     default).

	      Usage: Advanced
		     Applicable steps:	catalog download
		     Proxy host and port (with optional http basic authentica‐
		     tion username and password) for accessing content via the
		     HTTP  protocol.   No  proxy  information  is specified by
		     default.

		     The following format is used:

		     <service>:[user:password@]<proxy-server>:<port>

		     For example: http_proxy=http:web-proxy.mycompany.com:8088

		     The HTTP protocol is the default protocol used  to	 down‐
		     load certificate revocation lists.

		     The  use of ${proxy} for this option value is substituted
		     with the value  of	 the  option  (which  is  not  set  by
		     default).

	      Usage: Basic
		     Applicable steps:	analyze
		     Files  containing	regular	 expressions, indicating which
		     issues to ignore.	Each issue is  matched	by  a  regular
		     expression	 (see regexp(5)), and is ignored by the analy‐
		     sis.  That is, whether or not the	host  or  depot	 being
		     analyzed  have  the identified issue, that issue will not
		     appear on the report.  In addition, software will not  be
		     selected for download to address the issue.  The software
		     may still be selected to address a different issue.

		     When a user first runs swa, if this file does not	exist,
		     a	template  file is created, which contains instructions
		     on	 how  to  use  this  file.   Upon   creation,	if   a
		     ~.spc_ignore  file	 exists, it is translated into the swa
		     format and appended to the template.

		     The use of ${user_dir} at the beginning  of  this	option
		     value  is substituted with the value of the option (which
		     defaults to $HOME.swa).

	      Usage: Intermediate
		     Applicable steps:	inventory
		     Specifies the age, in hours, of the cached	 copy  of  the
		     inventory	contents  of a given system.  If the inventory
		     becomes too old (based on the  timestamp  stored  in  the
		     file), SWA will inventory the host systemdepot again.

		     Note:  There are two special values, 0 and -1.  The value
		     of 0 signifies to always update the file, and  the	 value
		     of	 -1  signifies to never update the file, regardless of
		     age.

	      Usage: Basic
		     Applicable steps:	inventory analyze
		     Note: This release supports only one system, depot	 (lim‐
		     ited  use cases) or inventory file for analysis per invo‐
		     cation of SWA.  This option is  useful  for  analyzing  a
		     remote system without installing swa on that system.

		     Specify one host system or depot to be inventoried, or an
		     existing inventory file to be analyzed, and reported on.

		     Specify source as a URL using one of the  following  for‐
		     mats:

		     - System specification, uses
			    unauthenticated swlist protocol to gather the host
			    inventory.

		     - Depot
			    specification, also uses swlist protocol  (limited
			    use cases).

		     -	    SSH	 specification to system or depot, uses SSH to
			    contact host and local swlist  of  the  system  or
			    depot.

		     -	    Inventory  file  specification,  must  be  a local
			    file.

			    If an argument is specified in such a way that  it
			    could  be interpreted as either a system name or a
			    file name, it will be assumed to be a system name.
			    For example if 'foo' is the argument, then it will
			    be interpreted as a system named  'foo'.  Alterna‐
			    tively  if '.foo' is the argument, then it will be
			    interpreted	 as  an	 inventory  file  named	 'foo'
			    residing in the current directory.

			    If	an  inventory  file name is not specified, the
			    inventory information is cached for	 later	access
			    in	a cache directory within the 'user_dir'.  Nam‐
			    ing of these cached inventory files	 is  based  on
			    the hostname and path-to-depot as specified (e.g.,
			    using the fully qualified domain name  of  a  host
			    will be cached separately from using the nodename,
			    even for the same machine). Refresh of the	cached
			    inventory  for each inventory_source is determined
			    by the option.

			    The following option specifications are examples:

			    System specification:

			    Depot specification:

			    Inventory file specification:

			    Note:  This option is  equivalent  to  -s  but  is
			    suitable  for  use within an extended options file
			    (-X) or configuration file.

	      Usage: Basic
		     Applicable steps:	catalog inventory analyze report down‐
		     load depot
		     This  is the path to the log file for this command.  Each
		     time SWA is run, this file will grow larger.  This can be
		     changed,  for  example,  to a month-specific location for
		     easier archiving, off-host backup, and rotation.

	      Usage: Basic
		     Applicable steps:	catalog inventory analyze report down‐
		     load depot
		     Specifies	the level of message verbosity in the log file
		     (See also -x verbosity).  Legal values are:

		     Only ERROR messages and the  startingending  BANNER  mes‐
		     sages.

		     Adds WARNING messages.

		     Adds NOTE messages.

		     Adds  INFO	 messages  (informational messages preceded by
		     the '*' character).

		     Adds verbose INFO messages.

		     Adds very-verbose INFO messages.

	      Usage: Basic
		     Applicable steps:	download depot
		     If true, run this command in  preview  mode  only	(i.e.,
		     complete the analysis phase and exit; no changes are com‐
		     mitted to disk).  Setting this option  to	true  has  the
		     same effect as specifying -p on the command line.

	      Usage: Basic
		     Applicable steps:	catalog download
		     Use  this option to turn off prompting for HP user ID and
		     password if SWA determines the values are	not  set.  See
		     the and '-x hp_pw' options.

	      Usage: Basic
		     Applicable steps:	catalog download
		     Proxy host and port (with optional http basic authentica‐
		     tion username and password) for accessing content via the
		     relevant  protocol.  No proxy information is specified by
		     default.

		     The following format is used:

		     <service>:[user:password@]<proxy-server>:<port>

		     For example: proxy=http:web-proxy.mycompany.com:8088

		     If usernamepassword are specified as authentication  cre‐
		     dentials  to your proxy server, http basic authentication
		     is used, which is	a  clear-text  protocol,  (i.e.,  your
		     password  may  be	visible	 to  others  on your network).
		     Also, credentials specified on the command-line are visi‐
		     ble  to  other  local  users,  and	 access to credentials
		     stored in extended option files are determined  by	 their
		     permissions.   If your proxy server requires another type
		     of authentication, see the option.	 This option  is  used
		     as the default for the other proxy settings.

		     This  option  controls the default for all three proxies.
		     See the option, the  option,  and	the  option  for  more
		     details.

	      Usage: Intermediate
		     Applicable steps:	report
		     Controls whether swa will produce a report to stdout when
		     there are no issues andor actions.	 This is  useful,  for
		     example,  in  a cron job where you want email sent to you
		     only if there is an issue found.

		     A stdout report is always produced.

		     A stdout report is only  produced	if  there  are	issues
		     andor actions.

			    Hint:  To check for error status use the exit code
			    of the command and check the logfile for details.

	      Usage: Intermediate
		     Applicable steps:	inventory
		     Options to be passed to ssh.   Multiple  options  may  be
		     included  as a space-delimited list.  For example, if you
		     are using SWA in a cronjob, you may wish to  specify  '-o
		     BatchMode=yes' to return immediately upon failure, rather
		     than prompting for a password.

		     See ssh_config(5) for additional options.

	      Usage: Basic
		     Applicable steps:	report
		     Type of report to display on stdout.  This is useful  for
		     controlling  what	type  of output you would like to see.
		     Legal values are:

		     - (Default) Summary of recommended actions

		     - Summary of identified issues

		     - Recommended actions with issue justification

		     - Comprehensive report in html format

		     - No report is generated on stdout

	      Usage: Basic
		     Applicable steps:	download depot
		     This is the directory where SWA stores downloaded patches
		     before  putting  them into a depot.  The default location
		     is only writable by root,	so  this  value	 needs	to  be
		     changed  for a non-root user to be able to download soft‐
		     ware.  Opening up permissions on the default location  is
		     not recommended.

	      Usage: Advanced
		     Applicable steps:	catalog download
		     This  option is used in conjunction with the download_cmd
		     option to override the default  url_target	 string(%url),
		     for  specific  environment	 needs.	 The url_target string
		     will be substituted in  the  download  command  with  the
		     actual URL for completing any downloads.

		     The following command is an example:

		     -x	 url_target='myUrlTargetString1' -x download_cmd='opt‐
		     perlbinGET myUrlTargetString1'

		     See the option.

	      Usage: Basic
		     Applicable steps:	catalog inventory analyze report down‐
		     load depot
		     The directory where swa stores catalog, inventory, analy‐
		     sis, ignore, and report files.  The default location is a
		     subdirectory  (.swa)  of the user's home directory.  This
		     can be changed, for example, to allow archival of	previ‐
		     ous  interim  artifacts  in  a date-specific directory or
		     off-host.	Several other options default to  a  directory
		     relative  to  this	 directory,  so	 changing  this option
		     allows all of those locations to stay in  synch  relative
		     to a common root.

	      Usage: Basic
		     Applicable steps:	catalog inventory analyze report down‐
		     load depot
		     Specifies the level of stderr verboseness:

		     Only ERROR messages and the  startingending  BANNER  mes‐
		     sages.

		     Adds WARNING messages.

		     Adds NOTE messages.

		     Adds  INFO	 messages  (informational messages preceded by
		     the '*' character).

		     Adds verbose INFO messages.

		     Adds very-verbose INFO messages.

			    Note:  The '-v' option is equivalent to increasing
			    verbosity  by  1  (e.g., from 3 to 4) and the '-q'
			    option is equivalent to decreasing verbosity by 1.
			    The	 '-v'  and  '-q' options can be used more than
			    once.

	      For compatibility with other applications,  several  environment
	      variables	 can  be  used	to  configure  how SWA connects to the
	      Internet to retrieve catalogs, certificate revocation lists, and
	      software.	 These environment variables include and

	      These  environment  variables have the same effect as the corre‐
	      sponding extended options	 of  the  same	names.	 The  Extended
	      Options  section	describes the usage and meaning of each option
	      and the behavior if the same option  is  specified  in  multiple
	      places.

	      The  extended option cannot be specified as an environment vari‐
	      able, but may be a useful alternative if all protocols  use  the
	      same proxy server at your site.

	      The  environment	variable is also honored for local operations,
	      if set.  If this value is not set, the default of is used.  This
	      directory	 does  not  allow  write operations for non-privileged
	      users, so TMPDIR must be set by non-root users  if  a  temporary
	      directory	 is required for that operation.  An example operation
	      that uses this directory	is  unsharing  of  patch  files.   For
	      older-style  patches which do not honor TMPDIR, SWA rewrites the
	      shar file so that TMPDIR will be honored	before	unpacking  the
	      patch.

   Return Values
       returns the following values:

	      Success
	      Error
	      Warning

   Examples
       These  example commands assume your default configuration file contains
       your ITRC login information.  The syntax will be:

       To display usage information:

       To display usage and list all extended options:

       To run using the options specified in the file "./myconfig":

       To inventory the local system, assuming it was last inventoried over 24
       hours ago:

       To  inventory a remote system using the unauthenticated networking pro‐
       tocols, assuming it was last inventoried over 1 hour ago:

       To get the catalog of known HP software and  issues,  only  downloading
       the catalog through the ITRC account user if it is older than 24 hours,
       using the default (HTTPS) protocol, and caching it in the default loca‐
       tion:

       To get the catalog regardless of age, from a customer-defined location,
       and specifying where to cache a local copy of the catalog:

       To get the catalog via  a  remote  system  command  using  the  default
       url_target string, %url

	      "%url"'

       To analyze the local system with the QPK, SEC, and PCW analyzers, using
       the previously cached inventory and catalog  (in	 their	default	 loca‐
       tions):

       To  analyze  a  remote system for security issues, using the previously
       cached inventory and catalog (in their default locations):

       To analyze the local system for	security  issues,  using  a  specified
       location for the catalog and analysis files:

       To create a default stdout "action" report based on a previous analysis
       (in the default location):

       To create a stdout "issue" report, and to specify the location  of  the
       comprehensive HTML report:

       To create a stdout "detail" report only if there is at least one issue,
       keeping stderr (i.e., progress) messages to a minimum:

       To create a stdout "action" report with minimal stderr (i.e., progress)
       messages, but with maximal progress messages logged to the logfile:

       To  download  software  recommended  by	the  previous  analysis (using
       default locations):

       To use the preview mode:

       To download software that does not exist in the swcache or in the  tar‐
       get depot:

       To  download software specified in an analysis file that is in a speci‐
       fied location, and putting the results into a specified	swcache	 loca‐
       tion:

       To  create a new depot with software recommended by the previous analy‐
       sis and previously downloaded software (using default locations):

       To add previously downloaded software to an existing depot from a spec‐
       ified swcache location:

       To  use	the  preview  mode  to	see what software would be added to an
       existing depot:

AUTHOR
       was developed by Hewlett-Packard Development Company, L.P.

FILES
       The per-user Software Assistant configuration  file.  This  file	 takes
       precedence over the system-wide SWA configuration file.

       An HP-supplied catalog file from the ITRC website that
	      contains	known  security	 issues	 and  other defects along with
	      their solutions. This file is downloaded with  the  command  swa
	      report or swa step catalog.

       The analysis of the inventory file and the catalog file
	      created with swa report or swa step analyze.

       The inventory of installed software created by swa
	      inventory or swa step inventory.

       Use this file to specify issues for analyzers to ignore. It is
	      possible	to use more than one ignore file by using the extended
	      option ignore_file.

       The comprehensive report written by swa report and
	      swa step report.

       Default alternative log file if you don't have permissions
	      to write to /var/opt/swa/swa.log.

       The system-wide SWA configuration file.

       An example configuration file outlining the usage of each
	      extended option.

       Script to configure HP SIM 5.2 and later for SWA. Only
	      required if SWA is installed when HP SIM is  installed  but  not
	      running. HP SIM must be running when configHPSIM is run.

       Manpages.

       The default directory for downloading software before it
	      is  packaged  in	a  depot.  This	 directory can be set with the
	      extended option swcache. Note that this directory can consume  a
	      significant amount of disk space.

       Directory that holds all clients' files generated from SWA
	      within HP SIM. Files are kept in user and job-specific subdirec‐
	      tories. This directory might require significant space  to  sup‐
	      port clients' analysis, catalog, inventory, and report files.

       User-specific directory used by SWA when running under
	      HP SIM.

       Default log file.

       Lists all files downloaded from HP to the swcache. It is
	      located in the swcache directory.

       Lists special installation instructions and dependencies
	      for  the patches in the depot. It is located in the depot direc‐
	      tory.

       Lists all files downloaded from HP stored within the
	      a directory specified by the extended option.

       Lists special installation instructions and other dependencies for  the
       patches in the depot.
	      Located in the root directory of the target depot.

       Lists issue IDs to be ignored (e.g., they are completed or not applica‐
       ble).  Supports comments
	      and regular expressions.	See regexp(5).

SEE ALSO
       swa(1M),	 swa-report(1M),   swa-get(1M),	  swa-clean(1M),   and	 secu‐
       rity_patch_check(1M).

								  swa-step(1M)
[top]

List of man pages available for HP-UX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net