bsmunconv.sh revision e1a4a99e6f424cd8d62deb51dccd37f0406e7204
#
#
#
# CDDL HEADER START
#
# The contents of this file are subject to the terms of the
# Common Development and Distribution License (the "License").
# You may not use this file except in compliance with the License.
#
# You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
# See the License for the specific language governing permissions
# and limitations under the License.
#
# When distributing Covered Code, include this CDDL HEADER in each
# file and include the License file at usr/src/OPENSOLARIS.LICENSE.
# If applicable, add the following below this CDDL HEADER, with the
# fields enclosed by brackets "[]" replaced with your own identifying
# information: Portions Copyright [yyyy] [name of copyright owner]
#
# CDDL HEADER END
#
# Copyright 2006 Sun Microsystems, Inc. All rights reserved.
# Use is subject to license terms.
#
# ident "%Z%%M% %I% %E% SMI"
#
TEXTDOMAIN="SUNW_OST_OSCMD"
export TEXTDOMAIN
# Perform required permission checks, depending on value of LOCAL_ROOT
# (whether we are converting the active OS or just alternative boot
# environments).
{
then
exit 1
fi
then
exit 1
fi
RUNLEVEL="$3"
then
echo "$form \c"
read RESP
esac
fi
RESP="x"
do
gettext "This script is used to disable the Basic Security Module (BSM).\n"
echo "$form \c"
read RESP
done
then
exit 2
fi
}
{
# Turn off device allocation. This is not currently done for alternate
# boot environments.
then
fi
# disable auditd service on next boot
/usr/sbin/svcadm disable system/auditd
SVC_UPGRADE
# restore volume manager startup on next boot using the
# previous state saved by bsmconv.sh
state="enable"
if [ -f ${ROOT}/etc/security/spool/vold.state ]; then
prev_state=`cat ${ROOT}/etc/security/spool/vold.state`
state="disable"
fi
fi
svcadm ${state} svc:/system/filesystem/volfs:default
SVC_UPGRADE
# Turn off auditing in the loadable module
then
else
fi
# If we are currently converting the active host (${ROOT}="/") we will
# need to ensure that cron is not running. cron should not be running
# at run-level S, but it may have been started by hand.
then
if [ $? -eq 0 ]; then
fi
fi
}
# main
if [ $# -eq 0 ]
then
# converting local root, perform all permission checks
LOCAL_ROOT=true
# begin conversion
ROOT=
echo
gettext "The Basic Security Module has been disabled.\n"
gettext "Reboot this system now to come up without BSM.\n"
else
# determine if local root is being converted ("/" passed on
# command line), if so, full permission check required
LOCAL_ROOT=false
do
if [ "$ROOT" = "/" ]
then
LOCAL_ROOT=true
fi
done
# perform required permission checks (depending on value of
# LOCAL_ROOT)
do
done
echo
gettext "The Basic Security Module has been disabled.\n"
gettext "Reboot each system that was disabled to come up without BSM.\n"
fi
exit 0