File Management - IBM

File Management - IBM File Management - IBM

as400bks.rochester.ibm.com
from as400bks.rochester.ibm.com More from this publisher
30.06.2013 Views

© Copyright International Business Machines Corporation 1998, 2000. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

| Contents About File Management . . . . . . . vii Who should read the File Management book . . . vii What’s new in V4R5 File Management . . . . . vii Chapter 1. Introduction to File Management . . . . . . . . . . . . . 1 File types . . . . . . . . . . . . . . . 1 Chapter 2. File processing . . . . . . . 3 File Management operations overview . . . . . . 3 File security considerations . . . . . . . . . 8 Object authority . . . . . . . . . . . . 8 Data authorities . . . . . . . . . . . . 9 Authorities required for file operations . . . . 10 Limiting access to files and data when creating files . . . . . . . . . . . . . . . . 11 Sharing files . . . . . . . . . . . . . . 12 Open considerations for files shared in a job . . 13 I/O considerations for files shared in a job . . . 14 Close considerations for files shared in a job . . 15 Allocating file resources . . . . . . . . . . 15 File resource allocation . . . . . . . . . 16 File resources that must be allocated . . . . . 16 How the system allocates resources . . . . . 16 Opening files . . . . . . . . . . . . . . 17 Scoping of opened files . . . . . . . . . 18 Opening files using temporary file descriptions 18 Open considerations when using *LIBL with a DDM file . . . . . . . . . . . . . . 20 Detecting file description changes . . . . . . 21 Displaying information about open files . . . . 22 Monitoring file status with the open and I/O feedback area. . . . . . . . . . . . . 23 File error detection and handling by the system . . 24 Messages and message monitors in files by the system . . . . . . . . . . . . . . . 25 Major and minor return codes in files by the system . . . . . . . . . . . . . . . 26 Recovering from file system errors. . . . . . 28 Related information on file types . . . . . . . 31 Chapter 3. Using overrides . . . . . . 33 Overrides: An overview . . . . . . . . . . 33 Benefits of using overrides . . . . . . . . 34 Summary of the override commands . . . . . 34 Effect of overrides on some commands . . . . 35 Using overrides in multithreaded jobs . . . . 37 Applying overrides . . . . . . . . . . . . 37 Overriding file attributes . . . . . . . . . 38 Overriding file names . . . . . . . . . . 39 Overriding file names and file attributes. . . . 39 Overriding the scope of an open file . . . . . 40 How the system processes overrides . . . . . 40 Effect of exits on overrides: scenario . . . . . 48 Effect of TFRCTL on overrides-Scenario . . . . 49 | | | | | | | Overrides to the same file at the same call level: scenario 1 . . . . . . . . . . . . . . 49 Overrides to the same file at the same call level: scenario 2 . . . . . . . . . . . . . . 49 CL program overrides . . . . . . . . . . 50 Securing files against overrides . . . . . . . 51 Using a generic override for printer files . . . 51 Applying overrides when compiling a program 53 Deleting overrides . . . . . . . . . . . . 54 Deleting overrides: scenario 1 . . . . . . . 55 Deleting overrides: scenario 2 . . . . . . . 55 Displaying overrides . . . . . . . . . . . 57 Displaying all overrides for a specific activation group: scenario . . . . . . . . . . . . 57 Displaying merged file overrides for one file: scenario . . . . . . . . . . . . . . 58 Displaying all file overrides for one file: scenario 58 Displaying merged file overrides for all files: scenario . . . . . . . . . . . . . . 58 Displaying overrides with WRKJOB: scenario . . 58 Displaying overrides: comprehensive scenario . . 59 Displaying overrides: tips . . . . . . . . 63 Redirecting files . . . . . . . . . . . . . 64 Planning for redirecting files. . . . . . . . 65 Redirecting files: tips . . . . . . . . . . 65 Default actions for redirected files . . . . . . 66 Chapter 4. Copying files . . . . . . . 69 Copying physical or logical files . . . . . . . 69 Copying files: overview . . . . . . . . . . 70 Copying files: commands . . . . . . . . . 70 Copying files: supported functions . . . . . 73 Copying files: basic functions . . . . . . . 76 Creating the to-file (CRTFILE parameter) . . . . 82 Specifying CRTFILE(*YES) on either the CPYF or CPYFRMQRYF command. . . . . . . . . 83 Authorities, user profiles, and file capabilities of the to-file created by Copy File (CPYF) . . . . 83 Adding, replacing, and updating records (MBROPT parameter). . . . . . . . . . . . . . . 84 Specifying *REPLACE when copying files . . . 84 Specifying *ADD when copying files . . . . . 85 Specifying *UPDADD when copying files . . . 87 Copying records into files that use trigger programs . . . . . . . . . . . . . . 88 Selecting members to copy . . . . . . . . . 88 Copying file members: overview . . . . . . 88 Allowed copy operations and parameters . . . 89 Copying all members or labels within a file . . 89 Copying only certain members or labels within a file . . . . . . . . . . . . . . . . 90 Specifying the label identifier or member name for the copy operation . . . . . . . . . . 90 © Copyright IBM Corp. 1998, 2000 iii

© Copyright International Business Machines Corporation 1998, 2000. All rights reserved.<br />

US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract<br />

with <strong>IBM</strong> Corp.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!