To copy a program
It is recommended that you create your own custom system code and program code such as ZZ to store customized programs instead of copying programs into an existing Infor Lawson delivered system code and program code.
- On the Program Definition form, press Define (F6) and select Program.
- Press Copy (F6).
-
Specify this information:
Field Description From System The system code from which you want to copy a program.
The default is the system code currently entered on the Program Definition form.
From Program The program code you want to copy. The program name appears next to the code.
The default is the program currently selected on the Program Definition form.
To System The system code to which you want to copy the program.
The default is the system code currently entered on the Program Definition form.
To Program The program code for the copied program. - Press Enter to save the copied program.
-
Compile the copied program.
- On the Program Definition form, press Action (F4) and select
Compile.
- or -
From the Application Development Workbench menu, select Programmer Utilities, then Compile Tools.
- To open the Compile Program window, select Program from the Compile menu.
- Select a compile option and specify this information:
Field Description Product Line The product line of the program you want to compile. System Code The system code of the program you want to compile. Program Code The program code you want to compile. For the complete list of qcompile options, see the System Utilities Reference Guide.
- Press Enter.
- On the Program Definition form, press Action (F4) and select
Compile.
- Verify that there is no .err (error) file in LAWDIR/productline/xxsrc (where xx is the system).
-
Verify in LAWDIR/productline/obj/XXX.gnt (where XXX is the program
name) if the program object exists after compiling.
Note: If you are set up through Lawson Security, you must create a security class using the Lawson Security Admin tool, add a rule that grants access to the token of the copied program, and then assign it to a role.
For more information, see the Resources and Security Administration Guide.