|
Here's the update. We created a directory under /usr named as400check. The unix programmer created his routine in that directory. Here's what it looks like: #Bill Vanderveen #February 11, 2004 #This is a QSH script that will wrap to call to AS400CheckClient # # parameters: 1 - directory (of file being printed) # 2 - filename (of file being printed) # 3 - document type to be printed by Optio if $# < 3 then echo "usage: optio directory filename doctype" else java -Djava.security.policy=java.policy -classpath .:./public app.rbc.as400CheckClient.AS400CheckClient ${1} ${2} ${3} fi He gave me the exact command to push the check spool file to the unix box, and I was able to create a CL program around it. I had to use EDTF to create the source, since this customer does not have PDM on the machine(what a pain). Forgive the appearance, as I pulled the blank lines out of the source code. Does anybody know how to end the QSH interpreter? When I run this program interactively, I end up at a command prompt telling me to press enter to exit out of QSH. PGM CPYSPLF FILE(APP032) TOFILE(CHECKS) + JOB(696254/TKELSEY/AP_CHK_PRT) CTLCHAR(*NONE) CPYTOSTMF FROMMBR('/QSYS.LIB/qgpl.LIB/checks.FILE/checks.MBR') + TOSTMF('/usr/as400check/checks.txt') STMFOPT(*REPLACE) + STMFCODPAG(*STDASCII) QSH CMD('java -Djava.security.policy=/usr/as400check/java.policy -classpath /usr/as400check:usr/as400check/public app.rbc.as400CheckClient.AS400CheckClient /usr/as400check checks.txt textpcl') ENDPGM Paul Nelson Arbor Solutions, Inc. 708-670-6978 Cell pnelson@xxxxxxxxxx
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact copyright@midrange.com.
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.