Solved

View Source File

Posted on 2008-06-17
3
2,026 Views
Last Modified: 2012-08-14
We have a program in our AS400 that is scheduled to run every night to backup User data. I want to view the source code within the file. I simply want to look at it but for the life of me I dont know how. I dont want to edit or change anything, just look at it. Could anyone please give me a hand with this? I know this is very simple but I am not too proficient in the AS400.
0
Comment
Question by:rxmijares
3 Comments
 
LVL 16

Accepted Solution

by:
theo kouwenhoven earned 50 total points
ID: 21804288
Hi rxmijares,

If you know where the source is, and you don't have any experience with as/400
the most simple way is QRY

Just type on a command line :

RUNQRY QRYFILE((LibraryName/FileName ProgramName ))

File nam is possible QCLSRC

Other wise start PDM with STRDPM choos option 3,
Fill the fields on the screen and press enter,
now you can use Option 5 in front of a program to view the contents.

GoodLuck,
Murph
0
 
LVL 4

Expert Comment

by:rward
ID: 21804598
Sometimes you can find out where the source file for the compiled program is by using the DSPPGM command.

Example would be:  DSPPGM PGM(mypgm) DETAIL(*MODULE)   then use option 5 to display the module information. In the module attributes it will show the source file, library, and member the module was compiled from.

If the program isn't an ILE program then just running DSPPGM PGM(mypgm) will display the source file,lib,member that was used to compile.

Once you've got the source file you can use the STRSEU command to display the source.
example:  STRSEU SRCFILE(MYLIB/QRPGLESRC) SRCMBR(MYPGM) OPTION(5)   or  WRKMBRPDM FILE(QGPL/QRPLESRC) MBR(MYPGM) then option 5
0
 

Author Closing Comment

by:rxmijares
ID: 31467979
I used STRPDM and entered QCLSRC as the file name and was able to see it. Thank you.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A customer recently asked me about anti-malware and the different deployment options available for his business. Daily news about cyberattacks, zero-day vulnerabilities, and companies that suffered a security breach made him wonder if the endpoint a…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now