Error loading file based infobase support components

публикация базы на веб-сервере

публикация базы на веб-сервере

Я
   Djonny

09.05.19 — 17:21

Добрый день! всех с праздником.

может ли кто помочь в публикации базы на веб-сервере..?

есть ubuntu 18.04

установлен apache 2.4

публикация базы проходит без ошибок.

при входе через барузер, вот такая ошибка: Error loading file-based infobase support componentsError when loading component ‘help’File not found. 2(0x00000002): No such file or directory77u/ew0KezlkYjFmYTM3LWI0NTUtNGYzZi1iOGRkLTdkZTBlYTdkNmRhMywiRmls ZSBub3QgZm91bmQuIDIoMHgwMDAwMDAwMik6IE5vIHN1Y2ggZmlsZSBvciBkaXJl Y3RvcnkifSwxLA0KeyIiLDB9LCIuL3NyYy9GaWxlSU9NYW5hZ2VySW1wbC5jcHAo MjU1KTogMigweDAwMDAwMDAyKTogTm8gc3VjaCBmaWxlIG9yIGRpcmVjdG9yeSJ9 77u/ew0Ke2QyOTRlMzg0LTdlYTYtNDljNi1iZTk2LWYzYTZlM2RlMTI0MiwiRXJy b3Igd2hlbiBsb2FkaW5nIGNvbXBvbmVudCAnaGVscCcifSwxfQ==

   Garykom

1 — 09.05.19 — 17:32

Проблема с правами https://forum.infostart.ru/forum71/topic115887/

   Garykom

2 — 09.05.19 — 17:33

У тебя апач от чьего имени запускается? www-data ?

Дай права ему на запуск установленной 1С и каталога базы

   Djonny

3 — 09.05.19 — 17:42

(2)да.. так  и есть. права дал. все равно такая шляпа была

перегрузил комп, заработало)))) теперь на лицензию ругается, хотя ключ торчит, и через толстого клиента заходит.. где еще нужно что прописать, чтобы через тонкого входил?

   Garykom

4 — 09.05.19 — 17:44

(3) Локальный ключ для веб-клиента только один сеанс, и толстого/тонкого надо закрыть.

   Garykom

5 — 09.05.19 — 17:45

(4)+ В смысле однопользовательский ключ если, нужен многопользовательский или несколько программных лицензий.

   Djonny

6 — 09.05.19 — 17:45

(4)все закрыто…через браузер не пускает, через тонкого — заходит

   Garykom

7 — 09.05.19 — 17:47

(6) Значит «модуль расширения веб-сервера» не может ключ найти, бывает

   Garykom

8 — 09.05.19 — 17:49

(7)+ Возможно глючный сеанс ключ занял и другие сессии уже не пускает, там примерно через 20 минут освобождается лицензия если веб-клиента закрыть неправильно не выйдя.

   Djonny

9 — 09.05.19 — 22:54

(8)даже комп перегружал. все равно на лицензию ругается…

   Garykom

10 — 09.05.19 — 23:27

(9) Возможно снова проблема с правами, на этот раз на ключ/драйвер

  

Djonny

11 — 09.05.19 — 23:29

(10)на что права нужно давать?

ВНИМАНИЕ! Если вы потеряли окно ввода сообщения, нажмите Ctrl-F5 или Ctrl-R или кнопку «Обновить» в браузере.

Тема не обновлялась длительное время, и была помечена как архивная. Добавление сообщений невозможно.
Но вы можете создать новую ветку и вам обязательно ответят!
Каждый час на Волшебном форуме бывает более 2000 человек.

Содержание

  1. Публикация файловой 1С на Ubuntu 12.04
  2. Xubuntu 20.04 для бухгалтера 1С
  3. 1c 8.2 сервер + Linux + Hasp License Manager на Windows + Веб-клиент
  4. 1C:Enterprise 8.3. Administrator Guide. Contents
  5. 6.1. USER LIST MAINTENANCE
  6. 6.1.1. Adding a New User
  7. 6.1.2. Copying a User
  8. 6.1.3. Setting a Password
  9. 6.1.4. Deleting a User
  10. 6.1.5. Editing User Properties
  11. 6.1.6. Filtering
  12. 6.1.7. Types of Authentication
  13. 6.1.7.1. Authentication with 1C:Enterprise Tools
  14. 6.1.7.2. Operating system authentication
  15. NOTE 1
  16. NOTE 2
  17. 6.1.7.3. OpenID Authentication
  18. NOTE 1
  19. NOTE 2
  20. 6.2. ACTIVE USERS
  21. 6.3. LOCKING USER SESSIONS
  22. 6.4. INFOBASE REGIONAL SETTINGS
  23. 6.5. INFOBASE OPTIONS
  24. 6.6. DUMPING AN INFOBASE TO A FILE
  25. 6.7. RESTORING AN INFOBASE FROM A FILE
  26. NOTE 1
  27. NOTE 2
  28. NOTE 3
  29. 6.8.1. File mode infobase
  30. 6.8.2. Mobile device
  31. 6.9. INFOBASE VERIFICATION AND REPAIR
  32. 6.10. RESETTING THE DISTRIBUTED INFOBASE MASTER NODE
  33. 6.11. DELETING DATA OF A DATA AREA OR INFOBASE
  34. 6.12. EVENT LOG
  35. 6.12.1. Event Log Options
  36. 6.12.2. Saving Event Log
  37. 6.13. TECHNOLOGICAL LOG
  38. 6.13.1. Technological Log Configuration File
  39. 6.13.2. Default Technological Log
  40. 6.13.3. Technological Log Structure
  41. 6.13.4.1. Windows
  42. 6.13.4.2. Linux
  43. Defining Dumps Names and Location
  44. 6.13.5. Sample Technological Log Customization Files
  45. 6.13.5.1. Technological Log Disabled
  46. 6.13.5.2. Full Technological Log
  47. 6.13.5.3. DBMS Calls
  48. 6.13.5.4. Administrator Actions and Errors
  49. 6.13.5.5. Errors and Lengthy Operations
  50. 6.14. REFERENCE INTEGRITY CONTROL
  51. 6.14.1. Major Concepts
  52. 6.14.2. Enabling Reference Integrity Control Mode
  53. 6.14.3. Direct Deletion of Objects
  54. 6.14.4. Marking for Deletion or Removing Deletion Mark
  55. 6.14.5. Specific Features of Using Objects Marked for Deletion
  56. 6.15. STANDARD FUNCTIONS
  57. 6.15.1. Active Users
  58. 6.15.2. Event Log
  59. 6.15.2.1. Viewing Event Log
  60. Fig. 49. Event Log
  61. 6.15.2.2. Selecting Period
  62. 6.15.2.3. Filtering
  63. 6.15.3. Deleting Marked Objects
  64. 6.15.3.1. Selecting Deletion Option
  65. 6.15.3.2. Delete Completely
  66. 6.15.3.3. Delete Selectively
  67. 6.15.3.4. List of Not Deleted Objects
  68. 6.15.4. Finding References to Objects
  69. 6.15.5. Document Posting
  70. 6.15.5.1. Document Posting
  71. 6.15.5.2. Restore Sequences
  72. 6.15.6. Totals Management
  73. 6.15.6.1. Frequently Used Features
  74. Set Calculated Totals Period
  75. Enable Totals Usage
  76. Rebuild and Fill
  77. Get Optimal Aggregates
  78. 6.15.6.2. All Available Features
  79. 6.15.7. Full-text Search Management

Публикация файловой 1С на Ubuntu 12.04

Добрый день!
Помогите разобраться с ошибкой:

Error loading file-based infobase support componentsError when loading component ‘help’File access error ‘/home/user/1c/db/1c-tms-demo/1Cv8Temp’77u/ew0KezlkYjFmYTM3LWI0NTUtNGYzZi1iOGRkLTdkZT ­BlYTdkNmRhMywiRmls ZSBhY2Nlc3MgZXJyb3IgJy9ob21lL3VzZXIvMWMvZGIvMWMtdG1zLWRlbW8v ­MUN2 OFRlbXAnIn0sNCwNCnsiZmlsZTovLy9ob21lL3VzZXIvMWMvZGIvMWMtdG1z ­LWRl bW8vMUN2OFRlbXAiLDB9LCIuL3NyYy9maWxlcy5jcHAoMjI4Myk6IDEzKDB4 ­MDAw MDAwMEQpOiBQZXJtaXNzaW9uIGRlbmllZCJ977u/ew0Ke2QyOTRlMzg0LTdl ­YTYtNDljNi1iZTk2LWYzYTZlM2RlMTI0MiwiRXJy b3Igd2hlbiBsb2FkaW5nIGNvbXBvbmVudCAnaGVscCcifSwxfQ==

root@ubuntu:/home/user# ls -l /home/user/1c/db
total 4
drw-rw-r— 2 user www-data 4096 Aug 27 23:39 1c-tms-demo
root@ubuntu:/home/user# ls -l /home/user/1c/db/1c-tms-demo/
total 155704
-rw-rw-r— 1 user www-data 159440896 Aug 23 16:54 1Cv8.1CD

$ cd /home/user/1c/db/1c-tms-demo
-bash: cd: /home/user/1c/db/1c-tms-demo: Permission denied

Владелец user, права есть, но зайти в папку не может
Как такое может быть?

У апача прав не хватает на каталог где находится база.
По ошибке можно сказать, что апач не может работать с временными файлами в подкаталоге базы /1Cv8Temp
Попробуйте дать полные права на каталог командой sudo chmod -R 777 /home/user/1c/db/1c-tms-demo/

Если надо что бы в каталоге были права только пользователю user, то надо что бы и апач запускался из-под это пользователя.
Вроде в конфиге у апача можно задать пользователя под которым будет он запускатсья.
Поищите строчки что то вроде APACHE_RUN_USER и APACHE_RUN_GROUP

И на всякий случай проверте какую версию апача используете. Мо стандартного репозитория мог скачать апач выше 2.2, а 1с поддерживает только до 2.2. При том при публикации не говорит что нет подходящей версии, а потом разные ошибки возникают. Я вот так один раз сидел голову ломал, пока не осенило.

Источник

Xubuntu 20.04 для бухгалтера 1С

В публикации представлен необходимый минимум для настройки Xubuntu 20.04 в качестве рабочего места бухгалтера, ведущего учёт в программе 1С: Бухгалтерия 3.0 файловый вариант. Кроме этого, настроено подключение и других сотрудников через тонкий клиент 1С к опубликованной на веб-сервере базе бухгалтерии.

(1)
На вопрос 1: Слишком много ненужного софта включают в исходный дистрибутив, который потом приходится удалять, в качестве офисного пакета используют LibreOffice, хотя нужен ONLYOFFICE.
Если софт в исходном дистрибутиве Xubuntu устраивает, то конечно проще установить Xubuntu.

На вопрос 2: Да, совершенно верно, в дистрибутив входит и скрипт от 1С для распаковки (установки) конфигурации бухгалтерии в linux, спасибо, что указали на это. Но мне нужна была только .cf-ка и как вариант воспользовался разработкой автора onec_dtools, которая вместе с библиотекой обладает более широким функционалом, нежели распаковка .efd. Советую с ней (библиотекой) ознакомиться.

На вопрос 3: Скорее обязательно пользоваться защищёнными каналами (даже в 2002 году). В публикации можно было много чего еще написать, но она и так получилась достаточно объемная, несмотря на мои «вычеркивания». В статье предполагается, что компьютеры бухгалтера и других находятся внутри локальной сети, защищенной от интернета межсетевым экраном. Поэтому не показана настройка брандмауэра и других защитных механизмов. При работе через интернет всегда использую OpenVPN, внутри которого можно спокойно работать и по обычному http на 80 порту.

Источник

1c 8.2 сервер + Linux + Hasp License Manager на Windows + Веб-клиент

Доброго времени суток. Рассказываю проблему. Есть Сервер на линуксе, на нём стоит сервер 1с 8.2 + БД Постгри. Ключ сетевой на 20 пользователей стоит на другом сервере с Виндовс. Различные схемы доступа к базам. Итак по порядку:

— Клиент — Виндовс. Подключение к базе SQL на линукс-сервере через клиенское приложение. Полёт нормальный.

— Клиент — ВиндовсЛинукс. Подключение к базе SQL на линукс-сервере через веб-браузер. Стартует, но не находит ключ. По всем мануалам присутствие файла nethasp.ini в папке conf 1с-сервера не помогает. В нём прописано:
[NH_COMMON]

NH_SERVER_ADDR = 192.168.1.3
NH_PORT_NUMBER = 475
NH_TCPIP_METHOD = UDP
NH_TCPIP_BROADCAST = Dasabled

На виндовс-машине с работающим лиценз-манагером и спокойно раздающем лицензии клиентским приложениям настроено так, nhsrv.ini:
NHS_IP]

NHS_USE_UDP = enabled ; enabled or disabled (default: enabled)
NHS_USE_TCP = enabled ; enabled or disabled (default: enabled)
NHS_IP_portnum = 475 ; IP port number (default: 475 (IANA registered))
; CAUTION: clients must use the same port !

То есть вроде всё совпадает.

— Далее Клиент ЛинуксВиндовс. Доступ через браузер к файловой базе на линукс-сервере. Ловит ошибку:

Учитывая то, что доступ по вебу к SQL-базе доходит до этапа проверки лицензии и благополучно вначале стартует до этого момента ясно что Апач и сервер 1с настроены верно. Всё крутится под пользователем сервера 1с, он же является владельцем папок /var/www и папок с файловыми базами. Рекурсивно. В общем ковыряю где мог промахнуться. Что касается Hasp пока вообще нет соображений, на уровне протоколов по идее не должно быть проблем.
Может у кого есть какие соображения? Заранее благодарен.

Источник

1C:Enterprise 8.3. Administrator Guide. Contents

In the process of 1C:Enterprise operation it is required to solve various tasks related to its administration, including:

„ User list maintenance

„ Granting user rights

„ Creating a technological log to analyze errors, etc.

The Designer contains administration tools intended to solve the tasks above.

For example, 1C:Enterprise supports building a list of users authorized to work with the system. This list will be used to authorize a user when logging into the system. Please, note that the list of 1 C :Enterprise users is not a part of a configuration: it is created independently in a particular company that uses the software.

A password can be set for each user to log into the system. The password is used to verify the user’s rights to work with 1C:Enterprise.

Backup is another important administrative task. You have to run this procedure periodically to be able to restore the source data with minimal losses in case of database corruption. The backup frequency should depend on the intensiveness of data changes. The more frequently data changes occur, the shorter the period between two backups should be.

This chapter covers 1C:Enterprise administration tasks that can be carried out in the Designer.

6.1. USER LIST MAINTENANCE

Use Administration – Users to open user list.

Fig. 38. User List

The user list window consists of a toolbar and a table box with two columns:

„ The Name column lists the users that are registered in the 1 C :Enterprise 8.

„ The Full name column can contain the full version of the name displayed in the first column.

Users with an access password are identified by lock icons (user Storekeeper in the fig. 38).

The users without any role or authentication are identified by question icons (user Sales manager in the fig. 38).

Use the Actions menu to maintain the user list, customize list view (column selection, content, sorting order) and to save the user list as a spreadsheet or text document.

6.1.1. Adding a New User

Use the Actions – Add command in the User list window to add a new user. The user parameters editing window will open.

Use the Main tab to specify the user name and full name.

Fig. 39. New User

We recommend not including «:» in the user name. The uniqueness of the infobase user guaranteed through a combination of values in three separate fields: Name , Full Name and operating system User (if the OS tools authentication is enabled). The uniqueness is supported as follows: on the basis of the first 64 characters in the Name field, on the basis of the first 128 characters in the Full Name field, and on the basis of the first 128 characters in the operating system User field. We is recommend that you do not to exceed the 64-character length of the Name field.

It’s advisable to assign meaningful user names, using users’ last name, position, job functions, etc. This name will be used by the employees to log in 1 C :Enterprise.

You should specify the authentication method for the new user. You can choose between 1C:Enterprise and OS authentication tools. For more information on types of authentication supported by 1C:Enterprise, see page 102.

The client application run under Linux does not support operating system authentication.

Each of the authentication check boxes ( 1 C :Enterprise Authentication , Operating system authentication , OpenID authentication ) defines the authentication method for a given user. These check boxes do not affect the authentication-attempt order. When assigning the authentication type, take into account the following aspects:

„ If all authentication boxes are unchecked, that user is denied access to the applied solution.

„ To perform a successful authentication by using the OpenID protocol, set up this infobase publication on the web server accordingly (see page 167).

„ The user will be denied access to the applied solution if he/she is authenticated using OS tools or OpenID, but the checkbox that permits that authentication type is unchecked.

„ The authentication attempt via OS tools or OpenID can be disabled using the relevant keys of the client application startup string.

At least one user should exist in the system possessing administrator rights with 1C:Enterprise authentication enabled for this user.

If User cannot change password is checked, this user will be unable to edit their own password (this checkbox is used when 1C:Enterprise authentication is enabled).

If Show in List is checked, this user will be displayed in the selection list when connecting to 1C:Enterprise infobase. If 1C:Enterprise authentication is disabled for a user, the Show in List checkbox will not be available to toggle and the user will not be displayed in the selection list when connecting to the infobase.

Use the Other tab to specify available roles and language. If there are multiple roles in the configuration, you can assign multiple roles to a user. Besides, 1C:Enterprise operation mode can be specified for a user. If Auto is used as a value, the default operation mode specified in the Default run mode configuration property will be used. You can specify specific operation modes when some users need to use a specific mode. For example, it may be needed when some user works in the managed application mode. In this case you should specify Managed application in the Run mode field.

Fig. 40. Other Options for a New User

It’s not necessary to fill in all the fields in the user properties edit window. You can fill in the remaining fields later.

6.1.2. Copying a User

A new user can be created by copying an existing one. With this feature it’s not necessary to create a new user from scratch as you will simply need to copy one of the existing users to the list and edit their properties.

To copy, select a source line in the user list and execute the Actions – Clone command.

When you create a copy of a user, the user name can be transformed to keep it unique. Other properties (except the password) of a newly created user will be the same as those of the source user.

6.1.3. Setting a Password

To make it impossible for users to login to 1 C :Enterprise under different names, an access password can be specified for every user allowed to work with the system. Similarly to the user name, the password is used to confirm the user’s rights to work in the system.

Enter the user password into the appropriate field. The password is an arbitrary combination of alphanumeric characters. The password should not exceed 255 characters.

The password you are entering will be displayed in asterisks, so make sure to pay close attention to what you are typing to prevent any errors during entry.

Re-enter the password in the Confirm Password field to avoid possible erratic entry. If the password confirmation does not match the originally entered password, the Password and confirmation do not match warning will be displayed when you click OK , and the password will not be set.

Click the Cancel button if you decide not to set a password.

You cannot view the user password. Therefore, you should pay extreme attention to selecting a password and remember the value.

If a user forgets their password, you have to set a new password for this user.

Users with a password are identified by a special icon in the user list (a lock in the icon, see the user Storekeeper in the fig. 38).

6.1.4. Deleting a User

To delete a user, highlight the user name in the user list and select Actions – Delete command in the User list window.

To confirm your intention to delete the user, in the displayed prompt you will need to click Yes .

6.1.5. Editing User Properties

The Administration – Users option of the Designer menu is intended to edit user parameters. Highlight the user in the list and select Actions – Change menu option in the User list window.

The User window is intended to edit the parameters of the selected user.

6.1.6. Filtering

Use filters to view user list conveniently. Select the Actions – Set Filter command in the user list.

Fig. 41. Filtering

Users can be filtered by role, language, operation mode and user authentication mode.

6.1.7. Types of Authentication

Authentication checks whether the provided identifier (name) belongs to a certain user of the system. This is a sort of verification. 1C:Enterprise supports several different authentication options, which will be described in the sections below.

6.1.7.1. Authentication with 1C:Enterprise Tools

User authentication in 1 C :Enterprise requires you to enter the user name and password (in the authentication dialog, as command line parameters or connection string parameters for an external connection with a database or an automation server). In this scenario, 1C:Enterprise verifies whether the user exists and its password has been entered correctly.

6.1.7.2. Operating system authentication

The user can be authenticated implicitly by the operating system. To this end, a certain OS user should be assigned to the user to be verified. At system startup, 1C:Enterprise requests the OS to provide a user who is currently authenticated in the system. The SSPI interface in Windows and the GSS-API interface in Linux are used for this. Then the system verifies that this OS user is assigned to the 1C:Enterprise user. If the search is successful, the 1C:Enterprise user is authenticated successfully, and no authentication dialog is displayed.

NOTE 1

The client application run under Linux does not support authentication by operating system tools.

NOTE 2

No OS user authentication is supported if a client application connects to an infobase via an Apache web server under Windows.

The OS user should be specified in the following format: \domain_nameuser_name .

If you need to enforce user authentication with 1C:Enterprise tools, enter the command line key ( -WA-) in the client application startup command line. Therefore, the -WA+ command line key is used for forced OS authentication with the OS tools (enabled by default).

6.1.7.3. OpenID Authentication

OpenID ( http://openid.net/ ) is a protocol that can be used by the user to authenticate on many resources, systems, etc. that are not connected with each other with the same credentials. 1C:Enterprise uses an OpenID 2.0-based protocol and the Direct Identity model.

NOTE 1

This authentication method cannot be used to call web services published by 1C:Enterprise.

NOTE 2

A 1C:Enterprise infobase functions as an OpenID provider.

The general process flow is as follows:

„ A user tries to log in to the system.

„ The system identifies that OpenID authentication is used in an infobase (the default.vrd publication file points to that).

„ An authentication query is sent to the OpenID provider.

„ If no interactive actions are required (the identifier is authenticated for the first time, or the authentication attribute of this identifier expires), the provider prompts the system to ask the user to provide his/her username and password. The system performs an interactive action and returns the data it obtains to an OpenID provider.

The successful user authentication attribute is stored in cookie files that are located in an individual web browser for each storage. The thin client uses its own storage.

„ If the provider authenticates the user, information that the user is authenticated returns to the system.

OpenID authentication only works when an infobase is accessed via HTTP/ HTTPS protocols. This means that only a web client and a thin client connected to an infobase via a web server can use OpenID authentication. OpenID authentication supports cross domain queries in the thin client and Mozilla Firefox, Google Chrome, Safari, and Microsoft Internet Explorer 8 and 9 web browsers. A window prompting the user to confirm operation opens in Microsoft Internet Explorer 6.0 and 8 after the user provides his/her user name and password. If the user confirms the operation, authentication proceeds. Otherwise, the system prompts the user to enter the user name and password again.

A 1C:Enterprise infobase functions as an OpenID provider. Names of infobase users are used as an OpenID identifier (see page 98). Such an infobase should be published on a web server (the default.vrd publication file contains a special element) and made available to the infobase that wants to perform an OpenID authentication.

Interaction with the OpenID provider is only supported via the HTTPS connection.

The Name property assigned to the user of an OpenID provider infobase is used as an OpenID identifier of that user. The user password is also set in the OpenID provider infobase. The password set in an infobase which functions as an OpenID provider client is ignored in OpenID authentication.

If you need to perform forced OpenID authentication, enter the default -OIDA+ command line key in the client application startup command line. In this way, the -OIDA- command line key can be used to expressly disable OpenID authentication.

For more details on setting up a web server for working with OpenID authentication, see page 167.

6.2. ACTIVE USERS

Sometimes it is good to know what users are currently working with the infobase.

Use the Administration – Active Users command to view the active user list. A window will be opened that contains a list of the users that are currently working with the database.

Fig. 42. Active Users

The active line shows the information of a user that opens this window (current session).

The current user is identified by an icon (a marked user icon).

Use the Actions menu to customize list view or to save the list as a spreadsheet or a text document.

You can sort the list of active users by any column.

6.3. LOCKING USER SESSIONS

1C:Enterprise makes it possible to lock user infobase sessions. You can deny a user infobase session and display a message stating the reason for the denial.

For example, this can be useful when in the administrative purposes you need current users to terminate their sessions and prevent new users from connecting to the infobase.

In the client/server mode sessions can be locked using 1C:Enterprise server cluster administration utility.

There is also a feature to connect to the infobase by bypassing the sessions lock. The /UC command line option and UC= connec-

tion string option are intended to achieve the bypass. If an access code is specified when the lock is initiated, you should enter this code in the /UC option to bypass the lock and connect to the infobase. If the access code contains any spaces, it should be enclosed in quotation marks.

If web client or thin client operating via a web server is used, it is possible to enter the access code in the UC option of the descriptor file connection string (see page 235). In this situation we recommend publishing the infobase to the web server additionally.

Using the script language

In any operation mode a lock can be enabled using 1C:Enterprise script language. Use the SessionsLock 1 C :Enterprise script entity that you can create in the wizard and customize the sessions lock properties as needed.

The SetSessionsLock() global context method allows you to enable a created lock, and the GetSessionsLock() method is intended to obtain the already enabled lock.

6.4. INFOBASE REGIONAL SETTINGS

The regional infobase settings customization mode is intended to manage the date and time formats, the format of numbers and logical constants. It also determines lines sorting order in the infobase lists. Use the Administration – Infobase Regional Settings command to initiate this mode.

Fig. 43. Regional Settings

If a property is not selected, the date, number and time formats will be defined by default settings used in the 1C:Enterprise for the specified language (country). Language (country) is specified when the infobase is created.

If Use regional settings from the current session is checked, the Number , Date , and Boolean values are displayed in compliance with the regional settings used in the current session (including in the input fields, calendar and calculator). These settings are defined based on the regional settings of the client computer but they can also be overridden by the /VL option.

The bottom part of the dialog window contains samples of number, date and time view with the selected settings applied.

Boolean values are displayed in accordance with the platform’s interface language. You can specify this value with the -L parameter.

Language (Country) . Select the language (country) for the current infobase installation.

If PostgreSQL is used as the database management system, the language (country) cannot be changed for an existing infobase randomly. The defined language (country) value can only be replaced by another value that will apply the same lines sorting order (collation) of the DBMS that is used due to the existing value. For example, you can replace Russian (Russia) with Belarusian (Belarus) but replacing this value with Ukrainian (Ukraine) is impossible.

If IBM DB2 is used as the database management system, changing the value for language (country) is not supported.

Decimal separator . You pick a separator from the list or enter it manually into the appropriate input field. A sample symbol will be shown to the left of the input field.

Thousands separator . You can select the thousands group separator from the dropdown list or enter it manually into the appropriate input field. A sample symbol will be shown to the left of the input field.

Grouping . Use this option to customize the number grouping in the whole part of numbers. You can pick the format line from the dropdown list or enter it manually.

Use the following grouping format: … … .

You can use any non-numeric symbol as a separator.

For example, the 3,2,0 sequence means that a number will be grouped as follows (the digits are counted from left to right and only in the whole part):

„ the first group consists of the first three digits;

„ this group is followed by a separator (specified in the operating system settings or in the Thousands separator option);

„ the remaining digits of a number will be grouped by two.

The zero ( 0) character in the end of the format line means «up to the end». So if we remove 0 in the end of the format line in our example and specify 3,2 sequence only instead, the following grouping will be applied:

„ the first group consists of the first three digits;

„ this group is followed by a separator;

„ the second group consists of the next two digits;

„ this group is followed by a separator;

„ the remaining digits are all grouped together.

Entering only one zero ( 0 ) into this field means that the digits in the whole part of numbers will not be grouped.

Negative number representation . You can select the negative number view from the dropdown list. Pick Auto to use the operating system settings for negative numbers.

Date format . Specifies the date format. You can use the following characters in different combinations:

The day of the month. Numbers under 10 are displayed without the leading zero.

The day of the month. Numbers under 10 are displayed with the leading zero.

The month number. The month numbers under 10 are displayed without the leading zero.

The month number. The month numbers under 10 are displayed with the leading zero.

Two last digits of the year number. Numbers under 10 are displayed without the leading zero.

Two last digits of the year number. Numbers under 10 are displayed with the leading zero.

Four-digit year number.

You can customize the above characters and characters groups to be used in any order. You can use different separators between day, month and year values.

Time format. Specifies time format. You can use the following characters in different combinations:

Hours in 12-hour ( h ) or 24-hour ( H ) format. Hours under 10 are displayed without the leading zero.

Hours in 12-hour ( hh ) or 24-hour ( HH ) format. Hours under 10 are displayed with the leading zero.

Minutes. Minutes under 10 are displayed without the leading zero.

Minutes. Minutes under 10 are displayed with the leading zero.

Seconds. Seconds under 10 are displayed without the leading zero.

Seconds. Seconds under 10 are displayed with the leading zero.

You can customize the above characters and characters groups to be used in any order. You can use different separators between hours, minutes and seconds.

When you use regional settings to customize date format for input fields, you should only use the settings supported by input fields.

Logical False , Logical True . Use this option to customize logical constants view.

You can select the constant format from the dropdown list or enter it manually.

6.5. INFOBASE OPTIONS

The infobase options customization mode is intended to specify data lock timeout and select if restrictions should be applied to user passwords.

Fig. 44. Infobase Options

The following options can be customized:

Data Lock Time Out (in Seconds)

The timeout for transaction lock by database server. For example, if the current transaction must lock data but this record is already locked by another transaction, the current transaction will wait for the data to be unlocked, but the timeout will not exceed the value of this option. This option also defines the transaction lock timeout in the 1C:Enterprise managed transaction lock mode.

Minimum User Password Length

Defines a minimum length for user passwords. If the User Password Complexity Check option is checked, passwords must have at least 7 characters.

User Password Complexity Check

If this option is checked, the users’ passwords should satisfy the following criteria:

„ The password length should not be less than the value of the Minimum User Password Length option;

„ The password should include characters from at least three of the following groups:

„ Password should not be the same as the user name; „ Password should not be a sequence of characters.

Applying restrictions to infobase user passwords does not affect the existing passwords. The restrictions will only be applied when an existing password is changed or a new infobase user is added. But a password is verified based on the current infobase settings. This means that when User Password Complexity Check is checked, password verification will be case-sensitive.

For example, if for some reason PaSsWoRd was set as a password for some user, with User Password Complexity Check option unchecked, a user could enter the password in any of the following manners: password , or PASSWORD , or Password with any of the entry versions enabling the user to log in. If the User Password Complexity Check option is subsequently checked, user will only be able to log in if the password is entered with case matching: PaSwWoRd .

6.6. DUMPING AN INFOBASE TO A FILE

The current infobase can be saved to a file.

Use Administration – Dump Infobase to save the data to a file. The standard file selection dialog will be displayed. Browse to the directory and specify the name for the file that will be used to dump the data.

The dumping mechanism enables you to:

„ obtain an image of an infobase regardless of the data storage mechanism being used.

„ transfer an infobase from one DBMS (or a file mode) to another DBMS (or a file mode).

Before dumping an infobase, testing (with the Designer or a special utility) and fixing any issues detected are recommended.

This method is not recommended for creating a backup copy of an infobase because:

„ a situation may occur when the dumped file cannot be loaded if an infobase from which the file was dumped contained errors;

„ creating such a backup copy in this way can be time consuming;

„ exclusive database access is required; „ the high requirements for RAM.

Infobase operation in the exclusive mode does not switch the MS SQL database to the single user mode.

6.7. RESTORING AN INFOBASE FROM A FILE

Use the Administration – Restore Infobase menu option to restore an infobase from a file.

The standard file selection dialog will be displayed. Browse to the directory and specify the name for the file that will be used to record the data.

The current infobase will be completely replaced upon restoration.

NOTE 1

To speed up infobase restoration when Microsoft SQL Server DBMS is used, it is recommended that you set the database recovery mode to the Simple restoration or Bulk logged restoration values. The mode can be changed either prior to restoration or on an ongoing basis if restoring the database at an arbitrary point of time is not necessary. Database backup must be performed before you change the database restoration mode!

NOTE 2

Infobase dump files ( .dt ) generated by 1C:Enterprise 8.1 and 8.2 can be restored by 1C:Enterprise 8.3.

NOTE 3

When you attempt to restore the configuration with an unknown compatibility mode, an error message will be returned indicating the version required. Restoration of 1cv8.dt files generated in version 8.3.1 and above is not permitted in older versions of 1C:Enterprise (older than 8.3.1), except where the Compatibility mode configuration property is set to Version 8.2.16 in version 8.3.1 and above.

6.8. CREATING A BACKUP COPY OF AN INFOBASE

6.8.1. File mode infobase

A backup is required before any operations that can damage the infobase data.

No connections (including those established by the Designer) should be made to a file infobase when the backup copy of the infobase is created.

Backup can be carried out in any software for operations with files. Using the files manager open the directory containing the infobase. To create a copy of the infobase, simply copy the 1 C v8.1CD file to a separate directory. To restore the infobase (if it is damaged, corrupted, etc.), simply copy the saved file to the directory where it was previously located.

Note that you can also carry out infobase backups using special software tools designed for data backup and restoration.

6.8.2. Mobile device

A user backs up on a mobile platform by using built-in tools in iOS and specialized programs in Android.

6.9. INFOBASE VERIFICATION AND REPAIR

Various abnormal situations (e.g. power failures, operating system hang-up, hardware failures, etc.) can occur when you work with 1 C :Enterprise. If such situations occur at the time when changes are recorded to the 1 C :Enterprise infobase (especially in the file mode), they can corrupt the infobase. There can be different signs of infobase corruption, including inability to run 1 C :Enterprise.

The infobase verification and repair procedure is used for diagnostics and error correction of the infobase in various formats (file mode or client/server mode).

Use the Administration – Verify and Repair menu option to initiate this mode. The following dialog window will be displayed:

Fig. 45. Infobase Verification and Repair

Specify the required checks and modes. You can run different types of tests independently. You can reindex and compress database for a file mode of an infobase. You can also check the logical integrity of data and recalculate totals for both modes (the file mode and the client/server mode).

For certain distributed infobase that allow you to acquire the data that contain references to objects outside of the infobase under testing, unchecking the Checking infobase reference integrity option will make it possible not to create «nonexistent» data, and, consequently, will not send the data to the other nodes of the distributed infobase.

There are several groups of settings under the list of modes:

„ The first group is intended to select the actions required: verification only or both verification and repair. In the first case, the software will verify the infobase without making any changes. In the latter case, the software will follow the instructions from the second group of settings. Switch names describe their functions.

„ The settings in the second group determine the actions for when references to non-existent objects are identified or for when data in the existing objects are partly lost.

„ The third group of controls enables you to carry out lengthy verification and repair procedures divided into multiple sessions.

The Abort check after checkbox is intended to specify verification timeout: when this value is achieved, verification will be aborted while the verification and repair options will be saved for the next Designer session.

The Resume previously aborted testing checkbox is intended to resume the procedure from the point where it was aborted in the previous verification and repair session.

The verification and repair events are recorded in the event log.

Click the Execute button to initiate the verification procedure. Testing may be aborted by pressing Ctrl + Break .

The software will check if it is possible to switch to the exclusive mode and will turn the mode on if possible. If it is impossible to switch to the exclusive mode, the following warning will be displayed: Unable to switch access to exclusive mode. Users at work . Open the active users list (using the Administration – Active Users menu item, see page 104) to view the currently active users.

If the exclusive mode is enabled, the software will begin executing the specified actions, and the testing results dialog window will be opened.

Infobase operation in the exclusive mode does not switch the MS SQL database to the single user mode.

The exclusive mode will be switched off upon completion.

The distribution kit includes a file mode database restoration utility ( chdbfl.exe ). For description of this utility, see page 315.

6.10. RESETTING THE DISTRIBUTED INFOBASE MASTER NODE

If the master node of the distributed infobase needs to be reset, you can use the /ResetMasterNode command line option of Designer batch startup mode. This operation is equivalent to calling the SetMasterNode(Undefined) method of the ExchangePlanManager object.

This operation can become necessary, for example, if any subtree of the distributed infobase needs to be evolved into an independent infobase or when you need to change subordination of distributed infobase nodes. For details on the distributed infobase, see «1C:Enterprise 8.3. Developer Guide».

6.11. DELETING DATA OF A DATA AREA OR INFOBASE

When a data area or an entire infobase has to be deleted, use the /EraseData option of the command line for Designer batch startup mode. The area to be deleted is defined with the /Z parameter of the startup command line. For detailed information about the distributed infobase, see «1C:Enterprise 8.3. Developer Guide».

To delete data, the account under which the data is being deleted must have Administration rights and be capable of getting exclusive access to the infobase.

CAUTION

If none of the separators is used in the session or data deletion is executed in an unseparated infobase, all infobase data will be deleted.

6.12. EVENT LOG

Administrative duties often require finding out what events have occurred at a particular time or what actions various users have executed.

The event log is used for this purpose. Various events are recorded in this log. An administrator can use it to obtain a history of users’ interactions with the system.

The event log is not stored in the database and is not saved when an infobase is restored/dumped.

When users work in the 1 C :Enterprise, the software registers major user actions involving infobase data modifications, scheduled operations, connection and disconnection, etc.

The event log works both in the Designer and in the 1 C :Enterprise modes.

For description of handling event log in the 1C:Enterprise mode, see page 131.

6.12.1. Event Log Options

Use Administration – Event Log Options to configure events registration in the log.

Fig. 46. Event Log Options

In the network mode you can save the customized settings only if no users except the administrator are working with the configuration.

Event log records are saved in files. Each file contains records for a certain period. The period itself is defined in the Divide log by periods field. A new file is opened when a new value for each of the following is reached (defined in the option value):

When a new infobase is created, a day is selected for the event log splitting period and the events of all the importance levels are selected to be recorded.

The event log can accumulate a significant number of records over time. To reduce the number of records, open the log option window and click the Reduce Size button. The following window will be displayed:

Fig. 47. Saving Event Log

The records will be truncated up to the date defined in the Delete events older than . Please, note that this will delete all the records of the event log splitting period the specified date belongs to (see above for the description of the Divide log by periods field). So if a month is selected as the splitting period and the date specified is, for example, 8/1/2013 , all the event log records up to August 2013 (inclusive) will be deleted. Also note that the event log splitting period can be changed with time and the deleted period will be defined by the period used as of the date specified in the Delete events older than field instead of the current splitting period used.

If you want to save the deleted records, check the Write deleted events to file option and enter a name for the file to save records to.

If you want to reduce the log size regularly and enable viewing of the already deleted log events, check Save the log divided by periods and merge it with the previous log .

In order to preserve splitting into periods for when the Designer is launched

in the command mode, you can also use the /ReduceEventLogSize KeepSplitting command.

Use the File – Open menu item and pick the Event log (*.lgf) file type in the standard file opening dialog window to view the archived event log records. Select the required archive file and click Open .

The automatic update and update period are customized using the standard table box list customization tool.

An event in the event log is identified by a row. At that a combination of characters _$ and $_ is used to distinguish system events (e.g., _$InfoBase$_.MasterNodeUpdate or _$PerformError$_ ). _$InfoBase$_.MasterNodeUpdate will be displayed as a row: Infobase. Master node update . It is prohibited to use these characters combination in the names of the events recorded via the 1C:Enterprise script using the WriteLogEvent method. The events created using this method are displayed as is.

6.12.2. Saving Event Log

To save the event log, open it and select File – Save Copy menu item. A dialog box will be displayed to browse to the directory and the file that will be used to dump the records as well as to select the file type (the event log file extension *.lgf is assigned by default). It is also possible to dump the records to an XML file (for description of the format, see page 229).

Sample of event log dump:

6.13. TECHNOLOGICAL LOG

1C:Enterprise supports the technological log functionality. This log contains information from all the 1C:Enterprise applications.

The technological log is intended to identify errors occurring in the 1C:Enterprise operation and for 1C Company technical support service to carry out diagnostics. The log is also used to analyze the software performance indicators.

The assortment of the events contained in the technological log and their properties can vary from one platform release to another.

Since the technological log is basically a collection of text files stored in various directories, it can be used by application developers to analyze various 1C:Enterprise and applications’ operation modes.

The technological log can be maintained on any computer where 1C:Enterprise is installed. Maintenance of the technological log depends on the configuration file that describes:

„ The directory that will hold the technological log files;

„ The information that will be recorded in the technological log;

„ Storage time for technological log files;

„ Parameters of the dump that is created upon application failure.

This configuration file does not exist by default. This means that the technological log is enabled and is instructed to save minimum dumps upon application failures to the following directory:

%USERPROFILE%Local SetingsApplication Data1C1Cv8dumps

In Windows Vista and above, the directory will appear as follows:

If required, the event log can be customized randomly using a separate configuration file. This file should be named logcfg.xml and located in the 1C:Enterprise configuration files directory. For details on the configuration file structure and features, see page 266.

For the technological log to operate under Windows, the user of the process creating a record in the log should possess full access rights to the technological log directory and read rights to the technological log directory owner.

1C:Enterprise will send requests to the program files directory regularly (every 60 seconds) to check if the configuration file exists and what its content is if any. This means that the technological log options can be modified right in the process of operation without restarting the already running 1C:Enterprise applications.

With certain settings applied, the technological log can be rather sizable so we recommend specifying storage time for the log files in the configuration file. Once this time is reached, 1C:Enterprise will delete the obsolete log files. If the directory holding these obsolete files is empty when the files are deleted, the directory itself will be deleted as well. Hence, the entire technological log directory tree will not contain any obsolete files or folders.

If the software runs under Linux, the operating system tools manage crash dumps production. At that the technological log will include the information on the process crash and the number of the alert that resulted in this failure. For details on log customization for Linux, see page 122.

Please note that the technological log directory is not intended for storing files which are not related to the technological log. So do not place dumps in it and do not use a directory that may contain files which are not related to the 1C:Enterprise technological log. If the directory specified as a technological logdirectory contains any unrelated files, specification of the directory will fail and the technological log will not be created.

6.13.1. Technological Log Configuration File

Below you will find sample content of a very basic configuration file:

Here is the meaning of the configuration file content:

„ All the client connections to the server and disconnections are recorded in the technological log;

„ The technological log files are located at c:1clogs ;

„ The technological log files are stored for one hour;

„ The dump files are located at c:1cdumps ;

„ The dump files contain all the information available (the content of the entire process memory).

When no configuration file exists, the following parameters are applied:

„ The technological log is disabled;

„ The technological log is enabled by default;

„ Minimum dump files;

„ Dumps are stored in the directory %USERPROFILE%Local SettingsApplication Data1C1cv8dumps of the current user profile.

For details on the configuration file structure and features, see page 266.

Handling the configuration file under Linux is virtually similar to handling it under Windows with the following distinctions:

„ The file should be stored in the 1C:Enterprise configuration files directory.

„ The account under which the application (server, client applications, web server extensions, etc.) generating the technological log is run should have write access to the directory where the technological log will be generated.

6.13.2. Default Technological Log

The Default Technological Log can be used to record critical events in the 1C:Enterprise system. A fixed event filter that cannot be changed is created by the platform for this log.

The default technological log has the following settings:

„ A file directory of the default technological log:

○ Windows: %USERPROFILE%Local SettingsApplication Data1C1cv8logs (or %LOCALAPPDATA%1C1cv8logs for Windows Vista or later). ○ Linux:

„ By default, data is deleted from the technological log after 24 hours.

„ SYSTEM events ( Error level) are recorded in the technological log by default.

You can change these settings with the element (see page 298). Rules that regulate creation of the events to be registered in the technological log by default can be set with the element (see page 300).

6.13.3. Technological Log Structure

The technological log is basically a directory with its subdirectories holding the technological data collected. The log directory structure is described below:

Every log file contains the events for 1 hour. A file is named as follows:

„ yy – two last digits of the year number

„ mm – month number

„ hh – hour number

The log files are text files. In such a file the information of every individual event ending is recorded on a new line.

Event ending line is formatted as follows: mm:ss.tttttt-d, , , , where:

„ mm – the number of the minute of the current hour

„ ss – the number of the second of the current minute

„ tttttt – the number of the microsecond of the current second

„ d – the event length measured in microseconds

„ – event level in the current thread stack

„ – = ; , , – arbitrary text. If the text contains any line end characters or commas, the text should be enclosed in quotation marks or apostrophes depending on what is less present in the line while the quotation marks or apostrophes contained in the text itself will be doubled.

6.13.4. Customization of Memory Dumps Generation

6.13.4.1. Windows

This section covers sample customization of a technological log configuration file ( logcfg.xml ) that is required to create crash memory dumps:

When this setup is applied, memory dumps will be generated at C:Program Files1cv8dumps and will include the entire process memory content and an extra data segment.

The user account the client application is running under should possess full rights to the following directories:

„ temporary files directory

„ technological log directory

The user account the client application is running under should possess read rights to the following directories:

„ configuration files directory (see page 227)

„ the directory holding the dumps directory

If query plan receipt is customized in the logcfg.xml file, this file must be located in the configuration files directory of the appropriate application:

„ For the client/server mode – in the directory of the configuration files available to the 1C:Enterprise server.

„ For the file mode with a direct connection – in the directory of the configuration files available to the appropriate version of the client application.

„ For the file mode with a web server connection – in the directory of the configuration files available to the extension of the web server supporting this infobase. For details on logcfg.xml customization, see page 266.

6.13.4.2. Linux

This section covers the steps involved in Linux setup required to provide for memory dumps generation upon application crashes.

The instructions provided in the current section are fully applicable to Fedora Core 4 operating system and its analogues. For other Linux distribution kits the commands described below can have different names and syntax. For details, see help of the used Linux distribution kit.

Generation of crash dumps is disabled by default. Linux distributors recommend enabling dumps generation only on the computers used for development (versus the computers used in actual software operation). Enabling Automatic Dumps Generation

Generation of abend dumps is configured for all processes executed by a particular user. To enable automatic generation of dumps, add the lines below to the

Where is the name of the account under which the 1C:Enterprise application is being run.

Defining Dumps Names and Location

To better understand which process generated a crash dump and to locate the dumps on the hard drive, we recommend specifying a template for dump naming.

A template can be specified for a single session only or continuously.

The customization described in this section affects all processes executed by all the users of the operating system. This means that the abend dumps of other users (if their generation is enabled) will be stored according to the specified path with the selected name pattern.

The actions below should be executed under the root user account.

To specify a template for crash dumps names and paths use the following command:

sysctl -w kernel.core_pattern=/tmp/core. e. p

This setting will be valid until the computer is restarted. In this situation the dumps will be located in the /tmp directory while the names of the dumps will contain:

„ executable file name

„ ID of the process the crash dump is generated for

To specify a continuous template for the name and the path, you should add the following string to /etc/sysctl.conf :

kernel.core_pattern=/tmp/core. e. p

For the changes in the file to be applied, you will also need to execute the following command:

Accounts under which applications generating abend dumps are run should have write access to the path specified in the settings.

6.13.5. Sample Technological Log Customization Files

In the samples below we assume that 1C:Enterprise is installed by default to C:Program Files1cv8 .

Remember that some technological log settings can result in a large volume of data being output to its directory. You should therefore ensure enough free space on the disk where you aim to locate the files from the technological log.

Below you will find some examples of logcfg.xml files demonstrating the most frequently used technological log configurations.

6.13.5.1. Technological Log Disabled

If no logcfg.xml file is available in the 1C:Enterprise configuration files directory (see page 227), the technological log will not be generated. If the logcfg.xml file is required for correct dumps setup, it should not contain any log elements. The example below defines generation of a full application dump upon failure. The dumps are located at: C:v8dumps .

6.13.5.2. Full Technological Log

The configuration file below specifies for recording of all the events along with all their properties in the technological log. The log will be stored for a week (168 hours). The volume of the information recorded will be very large with this arrangement but it can be useful for analysis of complicated exceptions. This configuration is recommended for the QA period and for errors examination.

6.13.5.3. DBMS Calls

The following configuration file defines that the technological log will only contain 1C:Enterprise calls to the database management system and the information on errors. The volume of the recorded information is lower than that for full technological log maintenance but can also be very large.

6.13.5.4. Administrator Actions and Errors

This configuration file creates a moderately sized technological log that will contain the information on applications startup and termination, on connecting to the 1C:Enterprise server cluster and disconnecting from it, on cluster administrator actions and the 1C:Enterprise errors. In the majority of situations this log is sufficient to investigate errors both in the configuration and in the 1C:Enterprise technological platform.

6.13.5.5. Errors and Lengthy Operations

In comparison to the previous file, this configuration file also adds all the operations lasting over 10 seconds. This may be useful to identify users’ actions that took a lengthy time, for example, to subsequently optimize the operations. The events length is measured in hundreds of microseconds.

6.14. REFERENCE INTEGRITY CONTROL

1 C :Enterprise stores a considerable portion of data as references. For example, when documents are entered, one can fill in many document attributes by selecting their values from a list or from a document contained in a list of documents. These attributes are references to the items in corresponding lists.

Using references, you can avoid multiple corrections of the same information in various locations. For example, after a number of documents had been input and printed, it was found out that a name of a contractor was specified incorrectly in the documents. Since the contractor name had been input in the documents by selecting it from the contractors list, you can only edit the contractor’s name in the list itself and this name will be automatically corrected in the documents. The only thing you have to do is rebuild the corresponding print forms.

However, if you delete the contractor from the list, all the documents that used the company will contain invalid references, that is, references to a non-existent object.

To avoid such situations, 1 C :Enterprise comes with reference integrity control that will be described in this section.

6.14.1. Major Concepts

Reference integrity control divides the deletion process of referenced data objects (such as lists and documents) into two stages.

At the first stage, users mark objects for deletion. An object that is marked for deletion can be used as an ordinary object.

At the second stage, the system administrator or another person possessing appropriate rights (assigned by the Interactive delete marked right for corresponding types of lists and documents) performs a special procedure – deletion of marked objects. This procedure is implemented as the standard Delete Marked Objects feature (for details, see page 136). When this procedure is executed, all the references to the marked objects are completely analyzed and only those objects can be deleted that are either not referenced to or are referenced to from the objects that are also marked for deletion.

Actually, the deletion procedure for the marked objects is a scheduled procedure. The procedure is recommended to be performed periodically, as enough marked objects are accumulated.

6.14.2. Enabling Reference Integrity Control Mode

1 C :Enterprise makes it possible to delete unnecessary or obsolete information in two modes:

„ Direct deletion of objects : no analysis of the deleted object usage in other database objects;

„ Reference integrity control enabled : objects are first marked for deletion, followed by checking if these objects are referenced to from other objects.

Deletion rights (direct deletion or reference integrity control enabled) are assigned for every user role by every object type (lists and documents) at the stage of application designing.

If a user works in the direct deletion mode, additional responsibility is laid both on the user that deletes the objects and on the system administrator that assigns user rights and system actions with invalid references. For example, specialists debugging an application can operate the system with reference integrity control disabled. If reference integrity control is not used, objects are deleted directly (without deletion marks), and it can result in invalid references.

The most drastic approach to reference integrity control mode setup is complete disabling of objects direct deletion rights in the entire configuration. This method completely excludes the capability to directly delete objects within this application. Users will only be able to mark objects for deletion.

Rights for direct deletion of objects, marking objects for deletion and removing deletion marks should be assigned for each object type of the configuration. If Interactive delete right is selected for a given type for a selected set of rights (for a role), users who are assigned this role can directly delete objects of the given type. Rights are assigned at the application development stage.

The rights to mark objects for deletion and to remove the deletion mark, as well as that of marked objects deletion are assigned similarly.

Consistent use of reference integrity mechanism by all the users is only achieved through disabling the Interactive delete right in the configuration.

Please note that objects can be directly deleted using 1C:Enterprise script tools. Therefore, elements of a specific configuration can directly delete objects, bypassing reference integrity control. In this case, a specialist who develops the specific configuration mechanism is responsible for the data integrity.

6.14.3. Direct Deletion of Objects

If the reference integrity control mode is not used (the Interactive delete right is selected in the configuration for a specific user and a specific type of the configuration objects), the user can select the Delete Directly menu item ( Shift + Del key or the corresponding toolbar button) to delete objects of this type from the lists of lists and document journals. This object is deleted without checking if it is referenced by other objects.

6.14.4. Marking for Deletion or Removing Deletion Mark

When reference integrity control is enabled, the lists of lists and document journals contain the Mark/Unmark for deletion option in the More ( All Actions ) menu. If this menu option is selected, an object is marked for deletion. An object that is marked for deletion will have an icon in the left column of the list; the icon shows a crossed-out object image.

If a posted document is marked for deletion, the document becomes unposted.

Selecting More – Mark/Unmark for deletion (All Actions – Mark/Unmark for deletion) menu item will mark an object for deletion while if an object is already marked for deletion, the mark will be removed instead.

If a deletion mark is removed, the document is still unposted. You should re-post the document in order for the document to become posted.

The possibility to mark for deletion or remove the deletion mark by a specific user is also regulated by access rights (marking for deletion and removing the deletion mark are regulated separately).

6.14.5. Specific Features of Using Objects Marked for Deletion

Objects that are marked for deletion are used in the generally similarly manner as ordinary objects. They are also displayed in the lists, they are searchable, etc. You can open and edit the objects that are marked for deletion.

A document that is marked for deletion cannot be posted. If an attempt is made to post a document that is marked for deletion, the corresponding message is displayed and the document is not posted.

6.15. STANDARD FUNCTIONS

When referring to «standard functions», we mean a set of system tools that are intended to carry out various service-related activities that may be needed for infobase administration.

The service functions are only accessible in the 1C:Enterprise mode. To enable access to standard functions, you will need to check the appropriate option in the settings window ( Tools – Options – Show «All Functions» command ).

Getting navigation links is not supported for standard functions windows so they cannot be added to user favorites.

The complete list of standard functions along with a brief description of every function is provided below:

Displays the list of the users currently logged into 1C:Enterprise. Availability of the function is determined by Active users right.

Intended to view the event log.

Availability of the function is determined by the Event log right.

Find References to Objects

Allows to find the objects with reference to a selected object.

Intended to post and repost documents for a selected period as well as to restore various sequences existing in the configuration.

Allows to delete the objects marked for deletion.

Intended to carry out scheduled operations on registers.

Full Text Search

Manages full text search.

In order to open a required standard function, open the All functions window, select the Standard branch and in the list that opens select the function you need (provided that it is available to you).

The details on all the standard functions are provided below.

6.15.1. Active Users

The window contains a list of the users that are currently working with the database.

Fig. 48. Active Users

The user who opens the window (for the current session) is displayed in bold.

The bottom of the window will display the total number of the users working with this infobase.

Event log – opens the event log.

User actions – opens the event log filtered by the selected user.

This action can also be executed by clicking the hyperlink which contains the user name (the User column).

6.15.2. Event Log

Administrative duties often require finding out what events have occurred at a particular time or what actions various users have executed.

The event log is used for this purpose. Various events are recorded in this log. An administrator can use it to obtain a history of users’ interactions with the system.

When users work in the 1 C :Enterprise, the software registers major user actions involving infobase data modifications, scheduled operations, connection and disconnection, etc.

6.15.2.1. Viewing Event Log

The event log can be viewed in a dedicated form:

Fig. 49. Event Log

Every event is recorded on a separate line of the event log. The left column ( Date, time ) will hold an icon displaying the event type (see fig. 49). To view an event, select More – Details ( All actions – Details ).

The following types of events can occur in the software operation process:

Fig. 50. Event Log Event Types

If an event is related to some data, the View data option becomes available in the More menu (Or All Actions – View data ). This option can be used to view the data related to the event.

Events can be either Transactional or Independent (software determined). By default, the independent mode of event recording is selected.

Please note that there is a set of predefined events generated at the system level. The transaction nature for such events is also set at the system level. Data modification events and document posting events are transactional, while session opening and closing are independent. Below is the list of predefined events.

□ Authentication □ Authentication error ○ Open-ID provider:

□ Changing the configuration

□ Changing the database configuration

□ Changing the master node

□ Changing event log parameters

□ Changing infobase parameters

□ Changing regional settings

□ Deleting infobase data

□ Starting background database configuration update

□ Cancelling background database configuration update

□ Suspending background database configuration update

□ Continuing background database configuration update

□ Ending background database configuration update ○ Testing and repairing:

□ Deleting ○ Execution error „ Transactional:

□ Changing the period of calculated totals

□ Posting cancellation ○ Transaction:

Information on the transaction is displayed in the Transaction and Transaction status columns. For transactional events, the transaction status can take one of the following values: Not Completed , Committed, Rolled back . Independent events have no transaction status.

On transaction startup, the corresponding Transaction.Start event is recorded in the event log and a transaction identifier is assigned to this event. When a transaction is completion (if it is committed), the Transaction.Commit event is logged, and the Transaction.Start record transaction status is updated to Committed . If a transaction is cancelled, the Transaction.Rollback event is logged, and the Transaction.Start transaction status is replaced by Rolled back . Upon emergency transaction execution completion, the transaction status remains Not Completed .

When the event log is opened, by default it is filtered by events, excluding transaction-related events.

Records corresponding to cancelled transactions and the transactions with undefined status are displayed in «pale» font color.

In addition to simply viewing the event log for the current infobase, you can also view a portion of an event log that was earlier saved as an LGF file. This is accomplished using More – Load from file (All Actions – Load from file) command.

6.15.2.2. Selecting Period

The interval used to display log events can be selected using the More – Set period for viewing (All Actions – Set period for viewing) menu option.

Fig. 51. Period Customization Dialog

Select the required period in the customization dialog and click OK .

You can also open this dialog by double-clicking the Date , Time column content.

6.15.2.3. Filtering

The log events can be filtered using the Set filter button or More – Set filter ( All actions – Set filter ) menu option. The filter setup window is displayed:

Fig. 52. Event Log Filter Options Dialog

This dialog is intended to configure the filter by period, by user, by event, by computer name, by connection number, by event importance, or by comment. When setting up a filter by period, take into account the following aspects:

„ The filter is set up subject to time.

„ The time must also be set when the start or end date is edited manually.

„ When the start or end date is selected from the calendar, the time is set automatically: when selected in the Period from field, the time is set to 00:00:00, and when selected in the to field, the time is set to 23:59:59.

„ When the interval is selected by means of the … option button, the time is set to the period start date for the start and to the period end date for the end.

If multiple applications were running simultaneously, you can use the application list to specify the applications for event filtering.

Use the events list to specify the event types that should be filtered.

The Data group is intended to specify the data to filter events by. The information on the events is displayed in the Metadata , Data and Data presentation columns of the event log.

The Metadata field contains the list of the metadata available in the configuration. Check the metadata types that should be used as filter criteria.

Use the Data field to select the infobase object to filter events by.

Use the Data presentation field to configure line representation.

You can set up extended filter options in the Other group.

„ Transaction status – transaction statuses will be selected.

„ Transaction – to designate a specific transaction.

„ Sessions – to specify session numbers (comma separated).

„ Working servers – central cluster servers are selected (for client/server mode).

„ IP ports – IP-ports of cluster manager are selected (for client/server mode).

„ Additional IP ports – secondary IP-ports of cluster manager are selected (for client/server mode).

Press OK to apply the filter.

The set filter presentation is displayed to the right of the Set filter button. The filter presentation is preceded by the Clear hyperlink. Clicking this hyperlink disables the filter.

6.15.3. Deleting Marked Objects

Objects that are marked for deletion are deleted in several stages. The stages follow each other in strict sequence. The process can be interrupted prior to every next stage by closing the window of this mode. System and user actions at each stage are detailed below.

6.15.3.1. Selecting Deletion Option

At the first stage the system prompts the user to select a deletion option: complete or selective deletion.

Fig. 53. Deleting Marked Objects

6.15.3.2. Delete Completely

When Full deletion option is selected, an attempt to delete all the marked objects will be made. Reference integrity control is applied to deletion so some of the objects may not be deleted when the operation is completed because some of such objects may be referenced by objects that cannot be deleted.

The list of the objects that could not be deleted (if any) will be displayed when deletion process is completed. For details, see page 138.

6.15.3.3. Delete Selectively

When Selective deletion option is selected, the software will generate the list of the objects that are marked for deletion. At the end of this stage, a window is displayed with a list of the identified objects that are marked for deletion in the infobase.

From the list the user will be able to select the objects to be deleted.

If an object is checked in the list, this object will be deleted (see fig. 54).

Checkboxes in this dialog only apply to the marked objects deletion mode and do not affect the object marks in the system itself. If an object is unchecked in this dialog, the object will still remain marked for deletion after you leave this mode.

To open an object’s form, double-click the object. Here you will be able to view the objects and decide if you should really delete them.

At this stage, the user can switch to other windows and modes and make any necessary changes without closing the window for the marked objects deletion mode.

Click the Delete button to delete the objects. In this case, the system deletes objects that are allowed for deletion. Reference integrity control is applied to deletion so some of the objects may not be deleted when the operation is completed because some of such objects may be referenced by objects that cannot be deleted.

Fig. 54. List of Objects Marked for Deletion

6.15.3.4. List of Not Deleted Objects

If the infobase contains references to the objects selected in the marked for deletion list, the system will display the following warning: Cannot delete objects: because other infobase objects reference to them . These objects will not be deleted.

Clicking Next will display the list of the objects that could not be deleted accompanied by the list of the references identified. The references are displayed for a selected object.

Fig. 55. The List of Not Deleted Objects

If you select a required reference in the list, you can open it to view and edit. Thus, you can modify the object (select another reference) so that the marked object could be deleted.

Click Close to exit the deletion of marked objects mode.

6.15.4. Finding References to Objects

This mode is intended for system administrator to find the objects containing references to a selected object.

In this mode the user can select an object and view a list of the references to this object contained in other infobase objects.

Fig. 56. Find References to Object

Select an object from the Object field and click the Find references button. The system searches for references to the selected object in all the infobase objects where they could be located (determined by the application). When search is completed, the identified references can be analyzed. To open the form of the reference, press the Open button (if available) or click the hyperlink. When you have to search for references to one of the items from the References to the object list, open the context menu (on the row selected) and execute the Find references command. A new window will open for the object reference search and the search for references to the selected object will be performed.

You can switch to other windows and modes without closing the search window.

6.15.5. Document Posting

This tool is intended to post and repost documents in batches and to restore sequences.

6.15.5.1. Document Posting

You can post selected types of documents belonging to a specified period using Document Posting tool.

Fig. 57. Document Posting

You should specify the period for the documents to be posted in the upper part of the dialog in the Period field. To specify a period, you should either select one of the standard period options or use Custom period and define the period manually. If in the custom period window you will clear both period boundaries, no time limitations will be applied to posting. This will also be indicated by a text to the right from the period selection field.

The dialog window contains the list of document types that can be posted. The list of available documents will only contain the documents types with Interactive Posting right selected for the current user.

The list of the selected documents that should be posted can be edited by doubleclicking or using the Add > (multiple selection available) and Add all >> buttons and the reverse buttons (multiple selection available) and .

Specify which documents you want posted by selecting or clearing the Repost posted documents and Post unposted documents check boxes.

Click the Post button after selecting all the options necessary to execute the posting. Prior to posting the dates of the first and the last posted documents is determined (based on the posting mode and the list of posted documents).

When documents are posted in batch, those documents that are marked for deletion will not be posted even if they meet all the criteria selected in the system batch posting dialog. If an error occurs in the document posting process, the system will behave as specified by the Stop posting if an error occurs . If this option is checked, posting will be aborted upon error but if it is unchecked (default value), posting will continue and the documents posted with errors will be saved.

Once posting is completed, the number of the posted documents will be displayed. If errors occur in the posting process, a form will be displayed containing a list of documents with errors.

Fig. 58. Documents with Posting Errors

If the list only contains one Document posting error line, it indicates that an error occurred in the document posting process but the document itself has not generated any error messages.

Double-clicking the line containing document name will open the document to view it.

In the posting process the status bar will display the real documents posting period, the current posting date and the total number of posted documents.

You can interrupt the documents posting process using Ctrl + Break keyboard shortcut.

6.15.5.2. Restore Sequences

All the documents in the 1 C :Enterprise form the same time sequence. To make this possible, every document has its own date and time. If two documents have the same date and time, they are still placed in a certain sequence depending on the time when they were entered into the system. You can change a document’s date and time. Thus, irrespective of the input order, the documents can be ordered in sequence that reflects a real sequence of the company’s business activity events.

When a document is posted in 1 C :Enterprise, it performs some actions that will record the document in multiple accounting mechanisms supported by 1 C :Enterprise.

The document posting algorithm usually records information contained in a document (in its attributes). However, in some cases, the document posting algorithm also analyzes current totals and uses them in posting. For example, if a document is used to write off goods or materials at average cost, the algorithm analyzes the balance of goods (or materials) at the document time. If goods or materials are written off using the LIFO or FIFO methods, the posting algorithm will analyze the current balance of goods (or materials) by lots (at the date/time of the document).

Obviously, the documents that use totals data in posting (for example, for lots) should be posted in a strict sequence. However, it often becomes necessary to input or correct some documents post factum, due to human errors or document delays. In this case, posting of register records performed by all future documents (that happened after the corrected document) will be considered incorrect. For example, if it turns out that a receipt that was entered at the beginning of the month contained the wrong amount of goods, it is necessary to re-analyze all subsequent outcome invoices that write off available lots and to re-write the register records. That is, all the documents that analyze the balance and are positioned after a corrected document should be reposted.

You should use documents sequences to check if documents should be reposted automatically. Each documents sequence that has been input in the configuration provides control of the posting order of these documents. Therefore, there may be multiple independent sequences in the system.

The Restore Sequences mode makes it possible to automatically repost all the documents related to the sequence from the current position of the sequence boundary to a specified moment. The current position of the sequence boundary is defined by the date that marks the beginning of the period where you should restore the documents posting sequence.

Fig. 59. Restoring Document Sequence

The table lists all the sequences in the configuration that the current user is granted Edit rights for. The current position of the sequence boundary is shown for each sequence in the Boundary column of the table. You can click the Restore all button to restore all the sequences.

Click the Restore button to restore sequences. The system will repost all the documents belonging to the selected sequences starting from the position of the earliest boundary of the selected sequences and up to the specified position (inclusive). If multiple sequences are selected (using multiple selection), all the selected sequences will be restored ordered same as they are in the list. If a single sequence is selected, this sequence will be restored only.

The Stop sequence restoration if an error occurs checkbox determines system behavior for when an error is discovered when a sequence is restored. If it is unchecked (by default), the error will not abort the entire process, i.e. the remaining selected sequences will be restored. Otherwise the process will be aborted when any error is discovered.

You can interrupt the sequences restoration process using Ctrl + Break keyboard shortcut.

6.15.6. Totals Management

This service is intended to enable performance of required scheduled actions on the registers available in the application. These actions include toggling use of totals on or off, totals recalculation, working with aggregates, etc.

There are two sets of possibilities in totals management:

„ Frequently used features (opened by default) – this mode provides simple tools to perform the most frequent actions on totals of registers;

„ All available features – this mode provides full access to operations on totals and application aggregates.

This list includes only the accumulation and accounting registers for which the current user has the Totals control right enabled. Another condition is mandatory to include them in the list: all separators of which they are part (if there are any separators in the applied solution) are used for these registers in the current session. Both totals management modes work with this list.

Use the hyperlink at the bottom right of the window to toggle the use mode. When the window is closed, the current mode is stored for the window to be opened in the same mode next time.

The details on both modes are provided below.

6.15.6.1. Frequently Used Features

The list of frequent features includes the operations of specifying calculated totals period, enabling totals use mode, aggregates rebuilding and filling and operation of getting optimal aggregates.

Fig. 60. Totals management – frequently used features

Set Calculated Totals Period

This operation is intended to specify calculated totals period for all the accumulation and accounting registers with totals enabled. For accumulation registers the period would be specified at the last day of the previous month because accumulation registers are most frequently used to obtain current balance. At the same time for an accounting register the period would be specified at the last day of the current month because accounting registers are most frequently used to obtain turnovers for the current month.

This operation can be used in the beginning of each month to improve registers performance.

Enable Totals Usage

This operation is intended to enable use of totals for all the registers with disabled totals except for the turnover accumulation registers that are in the aggregates mode.

This operation may be needed when an operation of batch registers data edit that disables totals to improve processing time, fails.

Rebuild and Fill

This operation performs rebuild and fill actions for all the turnover accumulation registers with aggregates mode enabled and their use selected.

For details on using the aggregates, see «1 C :Enterprise 8.3. Developer Guide».

This operation can be used as a scheduled operation when aggregates are used.

Get Optimal Aggregates

This operation calculates optimal aggregates for all the turnover accumulation registers with aggregates specified in the Designer.

This operation can both be used prior to enabling aggregates use and in the process of operation.

6.15.6.2. All Available Features

The All available features mode is intended to provide full access to all the tools involved in managing totals ( Totals tab) and aggregates ( Aggregates tab) of the accumulation registers and accounting registers. Totals Management

The Totals tab provides a list of information, accumulation, and accounting registers (for which the totals use is enabled) available for that user.

Fig. 61. All Totals Management Operations

The list displays the current state of the system registers. The modes that are currently enabled for every register are checked: „ Totals – current state of totals use

„ Current totals – state of current totals use

„ Minimum totals period – current date of minimum totals relevance period

„ Totals period – current totals relevance date

„ Totals splitting – totals splitting mode state

„ Aggregates/Totals – current state of aggregates or totals use for turnover accumulation registers that have aggregates specified in the Designer

Those modes that cannot be modified in the current system state are grayed out. For example, gray color in the Totals splitting column means that splitting of totals is disabled for the selected register in the Designer.

Using the required commands you can enable and disable respective modes and calculate certain totals.

Multiple selection mode is available for all the commands. This means that a command being executed will be executed for all the selected registers. If an error occurs upon command execution, further system behavior depends on the state of the Stop the data processor on the first error checkbox. If it is unchecked (default value), command execution will not be aborted (if an error occurs) and all the selected registers will be processed. Otherwise processing will be aborted.

If a register is able to operate in the aggregates mode, double-clicking the contents of the Aggregates/Totals column will take you to the Aggregates tab where the cursor will be positioned at the register named same as the one at the Totals tab. Aggregates Management

The tools available at the Aggregates tab are intended to manage aggregates of turnover accumulation registers (for details on the aggregates, see the «1C:Enterprise 8.3. Developer Guide»).

Fig. 62. All Aggregates Management Operations

The upper list contains all the turnover accumulation registers of the current configuration with aggregates specified in the Designer. The lower list Register Aggregates ( ) contains all the aggregates specified for the register, flag of using this or that aggregate and statistics on the aggregate.

It is possible to toggle register use mode, change aggregates use flag and perform the major operations on the aggregates.

When optimal aggregates are calculated, you will be prompted to specify the directory for the file containing the list of optimal aggregates for the selected register. The register will be displayed in bold if it is recommended to replace the existing aggregates by the calculated list of optimal aggregates.

For optimal aggregates saving, the file name will be generated as follows: AggregateName.xml . For example, the file of optimal aggregates for a register named Sales in the fig. 62 will be named as Sales.xml .

6.15.7. Full-text Search Management

1 C :Enterprise allows arranging for full text search in data. Search availability and the forms to enter search criteria are designed at the configuration development stage. The system enables full text search management.

Fig. 63. Full Text Search Management Mode

The Full-text search switch enables or disables full text search. To perform this action, exclusive access to the infobase is required. This means that you can enable (or disable) full text search only when a single user works with the infobase.

After pressing the Update index button, the system generates search index. To optimize the index generation process, both the basic and additional indices are used. The additional index is generated during data input and contains the information on the data entered after the last update of the basic index.

You can clear indices (clicking the Clear index button) to delete an index, e.g. to free the disc space currently taken by the index files. After an index is cleared, indexing should be performed (if required).

The buttons in this dialog window are only available if the current user possesses the Administrative Tasks right.

The Index created on field contains start date of the last indexing.

Источник

  1. 02.04.2017, 16:28


    #1

    vital105 вне форума


    Гость форума


    Question Ошибка Apache 2.4 и 1С 8.3.9 (permission denied)

    Добрый день!

    Apache настроил, в 1С веб-сервер опубликовал.
    Но при попытке браузером зайти на localhost/base пишет:
    Error loading file-based infobase support componentsError when loading component ‘help’File access error ‘/home/user/folder/base’. 13(0x0000000D): Permission denied

    Насколько понимаю, если заходить через браузер, то файлами базы «руководит» пользователь www-data. Ему даны права на папку с базой. И всеравно не хочет.

    Уже даны права на папку всем

    И всеравно не хочет.

    Подскажите, кто чем может :)


  2. 02.04.2017, 17:08


    #2

    vital105 вне форума


    Гость форума


    По умолчанию Re: Ошибка Apache 2.4 и 1С 8.3.9 (permission denied)

    Решено. Оказалось, что у папки Dropbox свои права. Нужно было поменять 700 на 755.
    Мож кому поможет ))


  3. 06.04.2017, 17:56


    #3

    По умолчанию Re: Ошибка Apache 2.4 и 1С 8.3.9 (permission denied)

    Цитата Сообщение от vital105
    Посмотреть сообщение

    Решено. Оказалось, что у папки Dropbox свои права. Нужно было поменять 700 на 755.
    Мож кому поможет ))

    Завуалировано, а что база в папке Dropbox? Нафиг если по вебке публикуешь, в локалке и так увидет по IP а внешний по белому стучаться будет.


  4. 07.04.2017, 10:22


    #4

    vital105 вне форума


    Гость форума


    По умолчанию Re: Ошибка Apache 2.4 и 1С 8.3.9 (permission denied)

    Dropbox для облачного бэкапа с версионированием фалов. Хотя изначально это был запасной вариант, если с веб-сервером не получится.


  5. 07.04.2017, 10:42


    #5

    По умолчанию Re: Ошибка Apache 2.4 и 1С 8.3.9 (permission denied)

    Прикольно:), но он может сильно притуплять работу базы. Задумка интересная, но я бы архивацию на обменник сделал.


  6. 07.04.2017, 11:03


    #6

    vital105 вне форума


    Гость форума


    По умолчанию Re: Ошибка Apache 2.4 и 1С 8.3.9 (permission denied)

    Так и есть. Дропбокс часть ресурсов берет на себя, и постоянно проверяет файлы, которые используются.
    Может тогда подскажешь какие есть хорошие обменники для этого :) Сервачок с рейдом будет позже.


  7. 07.04.2017, 11:16


    #7

    По умолчанию Re: Ошибка Apache 2.4 и 1С 8.3.9 (permission denied)

    Лучше сервака ток РИБ. Или VPN подними.


  8. Пользователь сказал cпасибо:


  9. 07.04.2017, 12:06


    #8

    vital105 вне форума


    Гость форума


    По умолчанию Re: Ошибка Apache 2.4 и 1С 8.3.9 (permission denied)

    Прочитал и понял глупость своего вопроса ))
    Спасибо за совет. Буду действовать.


Похожие темы

  1. Ответов: 0

    Последнее сообщение: 24.04.2010, 11:10

  2. Ответов: 0

    Последнее сообщение: 24.04.2010, 10:08

Метки этой темы

Социальные закладки

Социальные закладки


Ваши права

  • Вы не можете создавать новые темы
  • Вы не можете отвечать в темах
  • Вы не можете прикреплять вложения
  • Вы не можете редактировать свои сообщения
  •  
  • BB коды Вкл.
  • Смайлы Вкл.
  • [IMG] код Вкл.
  • [VIDEO] код Вкл.
  • HTML код Выкл.

Правила форума

  • Печать

Страницы: [1] 2  Все   Вниз

Тема: 1C v 8.2 клиент под Ubuntu Linux  (Прочитано 29563 раз)

0 Пользователей и 1 Гость просматривают эту тему.

Оффлайн
bulldog1972

Всем добрый день, подскажите кто пробовал 1С v 8.2 меня интересует веб клиент, насколько сложна установка на сервер этого безобразия и вообще можно ли нормально и полноценно использовать данную систему в связке с ubuntu.

Бюрократия разрастается — что бы удовлетворять нужды разрастающейся бюрократии.


Оффлайн
SashkaDotCom

Всем добрый день, подскажите кто пробовал 1С v 8.2 меня интересует веб клиент, насколько сложна установка на сервер этого безобразия и вообще можно ли нормально и полноценно использовать данную систему в связке с ubuntu.

почитай тут http://www.forum.mista.ru/topic.php?id=387017


Оффлайн
Sashker

Я все установил без проблем, но тоже столкнулся с проблемой прав на папки. Даже 777 ничего не дают (а может и не в этом дело совсем). Все это я пытался сделать под Ubuntu 9.10 и получил вот это:

{«#exception»:»{http://v8.1c.ru/8.2/virtual-resource-system}Exception»,»exception»:{«clsid»:»580392e6-ba49-4280-ac67-fcd6f2180121″,»reason»:500,»descr»:»Error loading file-based infobase support components»,»#inner»:»{http://v8.1c.ru/8.1/data/core}Exception»,»inner»:{«clsid»:»d294e384-7ea6-49c6-be96-f3a6e3de1242″,»descr»:»Error when loading component ‘help'»,»data»:»77u/ew0Ke2QyOTRlMzg0LTdlYTYtNDljNi1iZTk2LWYzYTZlM2RlMTI0MiwiRXJy
b3Igd2hlbiBsb2FkaW5nIGNvbXBvbmVudCAnaGVscCcifSwxfQ==»,»#inner»:»{http://v8.1c.ru/8.1/data/core}Exception»,»inner»:{«clsid»:»9db1fa37-b455-4f3f-b8dd-7de0ea7d6da3″,»descr»:»File access error ‘/var/www/1c/config/1Cv8Temp'»,»data»:»77u/ew0KezlkYjFmYTM3LWI0NTUtNGYzZi1iOGRkLTdkZTBlYTdkNmRhMywiRmls
ZSBhY2Nlc3MgZXJyb3IgJy92YXIvd3d3LzFjL2NvbmZpZy8xQ3Y4VGVtcCcifSw0
LA0KeyJmaWxlOi8vL3Zhci93d3cvMWMvY29uZmlnLzFDdjhUZW1wIiwwfQ0KfQ==
«}}}}


Пользователь решил продолжить мысль 11 Октября 2009, 09:54:10:


Проблему устранил, но теперь столкнулся с «Не обнаружен ключ защиты программы», если кто-то знает, как это можно полечить под Ubuntu, то буду очень благодарен.

Пока опишу последовательность установки (руководствовался официальным мануалом и информацией с http://www.forum.mista.ru/topic.php?id=387017):

1)Распаковываем архив с компонентами сервера в какую-нибудь папку
2)Устанавливаем из этой папки: dpkg -i *
3)Создаем в директории /var/www/ папку под названием 1с
4)Внутри директории 1с создаем файлик default.vrd со след. содержанием:

<?xml version=»1.0″ encoding=»UTF-8″ ?>
<vrs:point
xmlns:vrs=»http://v8.1c.ru/8.2/virtual-resource-system»

 base=»/1c»
ib=»FILE=&quot;/var/www/html/1c/config/&quot;»/>

5)Внутри папки 1с создаем папку config и копируем туда файлы базы 1Cv8.1CD и т.д.
6)Правим файл конфига апача: sudo nano /etc/apache2/apache2.conf и добавляем в него следующий текст:

Alias /1c «/var/www/1c»
<Directory «/var/www/1c»>
   AllowOverride None
   Options None
   Order allow,deny
   Allow from all
   SetHandler 1c-application
   ManagedApplicationDescriptor /var/www/1c/default.vrd
</Directory>

7)Добавляем пользователя, под которым стартует апач в группу 1с: sudo usermod -a -G grp1cv82 www-data

8)Меняем права доступа на папку 1с: sudo chmod 777 /var/www/1c (права надо давать ниже, конечно, типа rwx, но мне было лень этим озадачиваться)
9)Меняем владельца папок: sudo chown www-data:grp1cv82 -R /var/www/1c и sudo chown www-data:grp1cv82 -R /var/www/1c/config
10)Перезапускаем апач: sudo /etc/init.d/apache2 restart
11)Заходим на локальной машине по адресу: http://localhost/1c

И вуаля — ничего не видим, кроме таблички 1С, которая висит 15 сек. и сразу исчезает, оставляя нас на едине с пустым экраном. Сразу же рекомендую добавить localhost в мозилле в список исключений для блокировки всплывающих окон. Тогда вы сможете полюбоваться на окошко с надписью «Не обнаружен ключ защиты программы»  :P

« Последнее редактирование: 11 Октября 2009, 09:54:10 от Sashker »

Mens et Manus


Оффлайн
al908

Я все установил без проблем, но тоже столкнулся с проблемой прав на папки. Даже 777 ничего не дают (а может и не в этом дело совсем). Все это я пытался сделать под Ubuntu 9.10 и получил вот это:

{«#exception»:»{http://v8.1c.ru/8.2/virtual-resource-system}Exception»,»exception»:{«clsid»:»580392e6-ba49-4280-ac67-fcd6f2180121″,»reason»:500,»descr»:»Error loading file-based infobase support components»,»#inner»:»{http://v8.1c.ru/8.1/data/core}Exception»,»inner»:{«clsid»:»d294e384-7ea6-49c6-be96-f3a6e3de1242″,»descr»:»Error when loading component ‘help'»,»data»:»77u/ew0Ke2QyOTRlMzg0LTdlYTYtNDljNi1iZTk2LWYzYTZlM2RlMTI0MiwiRXJy
b3Igd2hlbiBsb2FkaW5nIGNvbXBvbmVudCAnaGVscCcifSwxfQ==»,»#inner»:»{http://v8.1c.ru/8.1/data/core}Exception»,»inner»:{«clsid»:»9db1fa37-b455-4f3f-b8dd-7de0ea7d6da3″,»descr»:»File access error ‘/var/www/1c/config/1Cv8Temp'»,»data»:»77u/ew0KezlkYjFmYTM3LWI0NTUtNGYzZi1iOGRkLTdkZTBlYTdkNmRhMywiRmls
ZSBhY2Nlc3MgZXJyb3IgJy92YXIvd3d3LzFjL2NvbmZpZy8xQ3Y4VGVtcCcifSw0
LA0KeyJmaWxlOi8vL3Zhci93d3cvMWMvY29uZmlnLzFDdjhUZW1wIiwwfQ0KfQ==
«}}}}


Пользователь решил продолжить мысль 11 Октября 2009, 07:54:10:


Проблему устранил, но теперь столкнулся с «Не обнаружен ключ защиты программы», если кто-то знает, как это можно полечить под Ubuntu, то буду очень благодарен.

Если не секрет, в чем была проблема? Я получил такое сообщение:

{«#exception»:»{http://v8.1c.ru/8.2/virtual-resource-system}Exception»,»exception»:{«clsid»:»580392e6-ba49-4280-ac67-fcd6f2180121″,»reason»:500,»descr»:»Error loading file-based infobase support components»,»#inner»:»{http://v8.1c.ru/8.1/data/core}Exception»,»inner»:{«clsid»:»d294e384-7ea6-49c6-be96-f3a6e3de1242″,»descr»:»Error loading component dbeng8″,»data»:»77u/ew0Ke2QyOTRlMzg0LTdlYTYtNDljNi1iZTk2LWYzYTZlM2RlMTI0MiwiRXJyrnb3IgbG9hZGluZyBjb21wb25lbnQgZGJlbmc4In0sMX0=»}}}

« Последнее редактирование: 13 Октября 2009, 17:53:16 от al908 »


Оффлайн
Sashker

Да, полагаю, все в том же — в правах доступа к папкам. Попробуйте сделать, как в моем посте (я это брал из оф. мануала), должно помочь.


Оффлайн
al908

Да, полагаю, все в том же — в правах доступа к папкам. Попробуйте сделать, как в моем посте (я это брал из оф. мануала), должно помочь.

Я вроде все так же и сделал. А в папке  /var/www/1c/config что должно быть? Я туда закинул 1Cv8.1CD, и 2 папки 1Cv8FTxt и 1Cv8Log. Этого должно быть достаточно?


Оффлайн
DJArty

* Starting web server apache2                                                  Syntax error on line 279 of /etc/apache2/apache2.conf:
Invalid command 'ManagedApplicationDescriptor', perhaps misspelled or defined by a module not included in the server configuration
                                                                         [fail]
Это чего то апачу не хватает?
и ещё в примере default.vrd

/var/www/html/1c/config/

а ниже без html гдето что то ж не так?


Оффлайн
SashkaDotCom

Я все установил без проблем, но тоже столкнулся с проблемой прав на папки. Даже 777 ничего не дают (а может и не в этом дело совсем). Все это я пытался сделать под Ubuntu 9.10 и получил вот это:

{«#exception»:»{http://v8.1c.ru/8.2/virtual-resource-system}Exception»,»exception»:{«clsid»:»580392e6-ba49-4280-ac67-fcd6f2180121″,»reason»:500,»descr»:»Error loading file-based infobase support components»,»#inner»:»{http://v8.1c.ru/8.1/data/core}Exception»,»inner»:{«clsid»:»d294e384-7ea6-49c6-be96-f3a6e3de1242″,»descr»:»Error when loading component ‘help'»,»data»:»77u/ew0Ke2QyOTRlMzg0LTdlYTYtNDljNi1iZTk2LWYzYTZlM2RlMTI0MiwiRXJy
b3Igd2hlbiBsb2FkaW5nIGNvbXBvbmVudCAnaGVscCcifSwxfQ==»,»#inner»:»{http://v8.1c.ru/8.1/data/core}Exception»,»inner»:{«clsid»:»9db1fa37-b455-4f3f-b8dd-7de0ea7d6da3″,»descr»:»File access error ‘/var/www/1c/config/1Cv8Temp'»,»data»:»77u/ew0KezlkYjFmYTM3LWI0NTUtNGYzZi1iOGRkLTdkZTBlYTdkNmRhMywiRmls
ZSBhY2Nlc3MgZXJyb3IgJy92YXIvd3d3LzFjL2NvbmZpZy8xQ3Y4VGVtcCcifSw0
LA0KeyJmaWxlOi8vL3Zhci93d3cvMWMvY29uZmlnLzFDdjhUZW1wIiwwfQ0KfQ==
«}}}}


Пользователь решил продолжить мысль 11 Октября 2009, 09:54:10:


Проблему устранил, но теперь столкнулся с «Не обнаружен ключ защиты программы», если кто-то знает, как это можно полечить под Ubuntu, то буду очень благодарен.

Пока опишу последовательность установки (руководствовался официальным мануалом и информацией с http://www.forum.mista.ru/topic.php?id=387017):

1)Распаковываем архив с компонентами сервера в какую-нибудь папку
2)Устанавливаем из этой папки: dpkg -i *
3)Создаем в директории /var/www/ папку под названием 1с
4)Внутри директории 1с создаем файлик default.vrd со след. содержанием:

<?xml version=»1.0″ encoding=»UTF-8″ ?>
<vrs:point
xmlns:vrs=»http://v8.1c.ru/8.2/virtual-resource-system»

 base=»/1c»
ib=»FILE=&quot;/var/www/html/1c/config/&quot;»/>

5)Внутри папки 1с создаем папку config и копируем туда файлы базы 1Cv8.1CD и т.д.
6)Правим файл конфига апача: sudo nano /etc/apache2/apache2.conf и добавляем в него следующий текст:

Alias /1c «/var/www/1c»
<Directory «/var/www/1c»>
   AllowOverride None
   Options None
   Order allow,deny
   Allow from all
   SetHandler 1c-application
   ManagedApplicationDescriptor /var/www/1c/default.vrd
</Directory>

7)Добавляем пользователя, под которым стартует апач в группу 1с: sudo usermod -a -G grp1cv82 www-data

8)Меняем права доступа на папку 1с: sudo chmod 777 /var/www/1c (права надо давать ниже, конечно, типа rwx, но мне было лень этим озадачиваться)
9)Меняем владельца папок: sudo chown www-data:grp1cv82 -R /var/www/1c и sudo chown www-data:grp1cv82 -R /var/www/1c/config
10)Перезапускаем апач: sudo /etc/init.d/apache2 restart
11)Заходим на локальной машине по адресу: http://localhost/1c

И вуаля — ничего не видим, кроме таблички 1С, которая висит 15 сек. и сразу исчезает, оставляя нас на едине с пустым экраном. Сразу же рекомендую добавить localhost в мозилле в список исключений для блокировки всплывающих окон. Тогда вы сможете полюбоваться на окошко с надписью «Не обнаружен ключ защиты программы»  :P

Покупай ключ )) ставь в усб )) и драва от алладина за версией 1.8 и все будет прекрасно


Оффлайн
Sashker

Я вроде все так же и сделал. А в папке  /var/www/1c/config что должно быть? Я туда закинул 1Cv8.1CD, и 2 папки 1Cv8FTxt и 1Cv8Log. Этого должно быть достаточно?

Да, достаточно. Вообще, база хранится в файле 1Cv8.1CD


Пользователь решил продолжить мысль 15 Октября 2009, 09:09:00:


* Starting web server apache2                                                  Syntax error on line 279 of /etc/apache2/apache2.conf:
Invalid command 'ManagedApplicationDescriptor', perhaps misspelled or defined by a module not included in the server configuration
                                                                         [fail]
Это чего то апачу не хватает?
и ещё в примере default.vrd

/var/www/html/1c/config/

а ниже без html гдето что то ж не так?

Ну, да, моя ошибка :) Если путь у тебя с html, то везде он с html, а если просто /var/www/1c/config/, то и не надо html писать (ошибся при копировании, видимо)

« Последнее редактирование: 15 Октября 2009, 09:09:00 от Sashker »

Mens et Manus


Оффлайн
ivanov_d_o

та же ошибка что и у al908
{«#exception»:»{http://v8.1c.ru/8.2/virtual-resource-system}Exception»,»exception»:{«clsid»:»580392e6-ba49-4280-ac67-fcd6f2180121″,»reason»:500,»descr»:»Error loading file-based infobase support components»,»#inner»:»{http://v8.1c.ru/8.1/data/core}Exception»,»inner»:{«clsid»:»d294e384-7ea6-49c6-be96-f3a6e3de1242″,»descr»:»Error loading component dbeng8″,»data»:»77u/ew0Ke2QyOTRlMzg0LTdlYTYtNDljNi1iZTk2LWYzYTZlM2RlMTI0MiwiRXJyrnb3IgbG9hZGluZyBjb21wb25lbnQgZGJlbmc4In0sMX0=»}}}
заметил, что в описании в каталог config положили БОЛЬШЕ файлов:
/var/www/html/1c/config/

[root@ws199 config]# ls -a

 .  ..  1Cv8.1CD  1Cv8.1CL  1Cv8FTxt  1Cv8Log  1Cv8tmp.1CD  1Cv8tmp.1CL
может в этом проблема?


Оффлайн
Sashker

Как вариант, проблема может быть в формате самой базы: не забывайте, что нужно выкладывать туда файлы формата 8.2. Я сначала под виндой создал пустую базу в 8.2 и уже ЭТИ файлики копировал под Убунтой.


Оффлайн
SashkaDotCom

Как вариант, проблема может быть в формате самой базы: не забывайте, что нужно выкладывать туда файлы формата 8.2. Я сначала под виндой создал пустую базу в 8.2 и уже ЭТИ файлики копировал под Убунтой.

когда база будет от 8.1 он так и скажет формат базы не подходит.

Так что только права пусть проверяет


Оффлайн
Sashker

СОгласен, попробовал поменять на 8.1 — так и сказал  :)


Оффлайн
ivanov_d_o

Как выяснилось, моя проблема была из-за того, что пакеты nls не были установлены. Если посмотреть в окне браузера то ссылка переходит на ru-ru. а этих пакетов не было. Теперь проблема с ключом:( hasp отказывается устонавливатся:) если я правильно понял драйвера идут для разных версий ядра, а для 2,26 я не нашел:(


Оффлайн
SashkaDotCom

Как выяснилось, моя проблема была из-за того, что пакеты nls не были установлены. Если посмотреть в окне браузера то ссылка переходит на ru-ru. а этих пакетов не было. Теперь проблема с ключом:( hasp отказывается устонавливатся:) если я правильно понял драйвера идут для разных версий ядра, а для 2,26 я не нашел:(

Я вот этими дровами пользовался для хаспа —> http://depositfiles.com/files/kzxb2c8hg


  • Печать

Страницы: [1] 2  Все   Вверх

The 1C:Enterprise developers forum

#1

People who like this:0Yes/0No

Sep 22, 2013 08:36 PM

Interested


Rating:

32



Joined: Oct 27, 2011
Company: Abaco Soluciones S.A.

Was trying to establish local debug web-server (win XP, apache 2.2)

Code
<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="http://localhost/83/e1csys/vrscore/exception.xslt?sysver=8.3.3.721"?><exception xmlns="http://v8.1c.ru/8.2/virtual-resource-system" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="Exception" clsid="580392e6-ba49-4280-ac67-fcd6f2180121" reason="500"><descr xmlns="http://v8.1c.ru/8.1/data/core">Error loading file-based infobase support components</descr><inner xmlns="http://v8.1c.ru/8.1/data/core" xsi:type="Exception" clsid="d294e384-7ea6-49c6-be96-f3a6e3de1242"><descr>Error when loading component 'help'</descr><inner xsi:type="Exception" clsid="9db1fa37-b455-4f3f-b8dd-7de0ea7d6da3"><descr>Directory not found 'Z:Base1c'</descr><data>77u/ew0KezlkYjFmYTM3LWI0NTUtNGYzZi1iOGRkLTdkZTBlYTdkNmRhMywiRGly
ZWN0b3J5IG5vdCBmb3VuZCAnWjpcQmFzZTFjJyJ9LDIsDQp7ImZpbGU6Ly9aOi9C
YXNlMWMiLDB9LCJzcmNcZmlsZXMuY3BwKDIyNzYpOiAzKDB4MDAwMDAwMDMpOiBU
aGUgc3lzdGVtIGNhbm5vdCBmaW5kIHRoZSBwYXRoIHNwZWNpZmllZC4gIn0=</data></inner><data>77u/ew0Ke2QyOTRlMzg0LTdlYTYtNDljNi1iZTk2LWYzYTZlM2RlMTI0MiwiRXJy
b3Igd2hlbiBsb2FkaW5nIGNvbXBvbmVudCAnaGVscCcifSwxfQ==</data></inner></exception>

This is the vrd apache conf file

Code
<?xml version="1.0" encoding="UTF-8"?>
<point xmlns="http://v8.1c.ru/8.2/virtual-resource-system"
      xmlns:xs="http://www.w3.org/2001/XMLSchema"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      base="/83"
      ib="File=&quot;Z:Base1c83&quot;;">
   <debug enable="true"
         url="/debug"/>
   <ws enable="false">
      <point name="PuntoDeVenta"
            alias="pdv.1cws"
            enable="true"/>
   </ws>
</point>

Z:/Base1c exist and it is accessible. It is network-connected drive.


 
Sergey Polikarpov

#2

People who like this:0Yes/0No

Sep 23, 2013 01:33 AM

Administrator

1C:Professional


Rating:

8



Joined: Jun 25, 2013
Company: 1C Company

Could you give me a detailed error description, I’ll send it to our developers.

1C Company support team


 
Timofey Bugaevsky

#3

People who like this:0Yes/0No

Sep 30, 2013 05:50 AM

Timofey Bugaevsky

Guest

Joined:
Company:

Please check if user that the server is runned on behalf of has an access to this directory.


 
Subscribe

Users browsing this topic (guests: 1, registered: 0, hidden: 0)

Войти или зарегистрироваться

8.х Ошибка при обновлении на Centos

Тема в разделе «Установка платформы «1С:Предприятие 8″», создана пользователем Matisse, 15 фев 2017 в 00:17.




0/5,
Голосов: 0
  1. TopicStarter Overlay

    Matisse

    Offline

    Matisse

    Регистрация:
    Среда
    Сообщения:
    1
    Симпатии:
    0
    Баллы:
    1

    Всем привет, возникла проблема. Хотел обновить платформу с 8.3.6-2363 до 8.3.9.2170, но получил ошибку:

    Код:
    Error loading file-based infobase support componentsComponent 'plnnrcmn' (8.3.9.2170) version differs from the root module 'core83' (8.3.6.2363) 

    Все происходило на Centos 6 с использованием веб-сервера. Обновил все rpm пакеты из последней версии, но что-то пошло нет так. Это говорит о том, что я что-то не обновил?
    Спасибо!


    Matisse,
    15 фев 2017 в 00:17
    #1
(Вы должны войти или зарегистрироваться, чтобы ответить.)
Показать игнорируемое содержимое

Поделиться этой страницей

Ваше имя или e-mail:
У Вас уже есть учётная запись?
  • Нет, зарегистрироваться сейчас.
  • Да, мой пароль:
  • Забыли пароль?

Запомнить меня


1C-pro.ru - форум по 1С:Предприятию 7.7, 8.0, 8.1, 8.2, 8.3

Поиск

  • Искать только в заголовках
Сообщения пользователя:

Имена участников (разделяйте запятой).

Новее чем:
  • Искать только в этой теме
  • Искать только в этом разделе
    • Отображать результаты в виде тем

Быстрый поиск

  • Последние сообщения

Больше…

Доброго времени суток. Рассказываю проблему. Есть Сервер на линуксе, на нём стоит сервер 1с 8.2 + БД Постгри. Ключ сетевой на 20 пользователей стоит на другом сервере с Виндовс. Различные схемы доступа к базам. Итак по порядку: — Клиент — Виндовс. Подключение к базе SQL на линукс-сервере через клиенское приложение. Полёт нормальный. — Клиент — ВиндовсЛинукс. Подключение к базе SQL на линукс-сервере через веб-браузер. Стартует, но не находит ключ. По всем мануалам присутствие файла nethasp.ini в папке conf 1с-сервера не помогает. В нём прописано: [NH_COMMON] На виндовс-машине с работающим лиценз-манагером и спокойно раздающем лицензии клиентским приложениям настроено так, nhsrv.ini: NHS_IP] NHS_USE_UDP      = enabled   ; enabled or disabled (default: enabled) NHS_USE_TCP      = enabled   ; enabled or disabled (default: enabled) NHS_IP_portnum   = 475       ; IP port number (default: 475 (IANA registered))                             ;   CAUTION: clients must use the same port ! То есть вроде всё совпадает. — Далее Клиент ЛинуксВиндовс. Доступ через браузер к файловой базе на линукс-сервере. Ловит ошибку: {«#exception»:»{ loading file-based infobase support components»,»#inner»:»{ loading component dbeng8″,»data»:»77u/ew0Ke2QyOTRlMzg0LTdlYTYtNDljNi1iZTk2LWYzYTZlM2RlMTI0MiwiRXJy
b3IgbG9hZGluZyBjb21wb25lbnQgZGJlbmc4In0sMX0=»}}} Учитывая то, что доступ по вебу к SQL-базе доходит до этапа проверки лицензии и благополучно вначале стартует до этого момента ясно что Апач и сервер 1с настроены верно. Всё крутится под пользователем сервера 1с, он же является владельцем папок /var/www и папок с файловыми базами. Рекурсивно. В общем ковыряю где мог промахнуться. Что касается Hasp пока вообще нет соображений, на уровне протоколов по идее не должно быть проблем. Может у кого есть какие соображения? Заранее благодарен.

если содержимое nethasp.ini полный копипаст, то обрати внимание: {NH_TCPIP] первый символ немного не в тему

В свойствах сервера (в консоли) — поставь галку выдавать лицензии, может поможет.

где-то проскакивала инфа, что веб-сервак, который дергает настройку или ключ дефолтно ищет их в каталогах users и далее там где-то (ну как бы он это делал под виндой) — может и у тебя он там же искать пытается?

OldFornit, спасибо, не заметил. Поправил конфиг, но ничег оне поменялось. Adept, поищу, спасибо. Фрэнки, не видел такой инфы, во всех мануалах, что мне попадались было одно и тоже — nethasp.ini клали в /opt/1C/v8.2/i386(или x86_64 для 64 битного сервера)/conf. Попробую нарыть ещё информации.

тоже такого не видел, но то, что надо разрешить выдавать серверу лицензии — факт. Достаточно недавно появилось. Ты попробуй еще метод TCP включить. Все-таки udp может немного подглючивать. И телнетом сервер защиты проверь.

А как в линуксе разрешить это? Кстати м портами всё в порядке, с того сервера работают, да и телнет по 475 порту с линукса на сервер лицензий проходит на ура, уже пробовал.

телнес кстати проверяет только tcp соединение, не udp. А включить через mmc-оснастку управления сервером 1с.

так где же её взять на линуксе или я что-то упускаю?

Все управление сервером 1с предприятия, кроме установки параметров ведения технологического журнала осуществляется с win-машины с помощью «Администрирование сервером 1с предприятия», которое можно найти в «пуск-программы-1с». Или еще поподробнее разжевать надо?

Ладно, разберёмся. Просто обычно таким образом управляется именно виндовый сервер…

таким образом управляется именно сервер 1с предприятия. Какая разница где он находится? Или от слова Linux непременно надо впадать в экстатический восторг и впадать в состояние священного транса?

Извиняюсь, тупанул, нет конечно, уж не от этого слова точно… Консоль поставил, разрешил серверу выдавать лицензии, ничего не поменялось.

получение данных по tcp а не udp пробовали?

Пробовали, не помогает, в итоге и клиентов из под винды перестало пускать, сейчас руководство подкинуло новых проблем, немного отвлёкся от темы, на днях продолжу изыскания. По результатам отпишу.

На данный момент проблема осталась актуальной, веб-клиенты так и не получают лицензии…

Проверьте еще раз содержимое файла nethasp.ini и наличие прав на него от пользователя, под которым стартует сервер 1С. От какого пользователя стартует сервер 1С ?

nethasp.ini: [NH_COMMON] [NH_TCPIP] Владелец всего — usr1cv82 из группы grp1cv82, чтобы не париться от него работает и апач и сервер 1с, везде он.

а есть ли серверный ключ на машине с сервером 1с?

Покажите вывод команды ls -l | grep conf в каталоге /opt/1C/v8.2/i386, покажите выводи команды ls -l в каталоге /opt/1C/v8.2/i386/conf

root@host:/opt/1C/v8.2/x86_64# ls -l | grep conf drwxrwxr-x 2 usr1cv82 grp1cv82     4096 Мар  4 13:58 conf итого 8 -rw-r—r— 1 usr1cv82 grp1cv82 170 Мар 18 12:48 nethasp.ini -rw-rw-r— 1 usr1cv82 grp1cv82  57 Дек  8 15:40 wsconnectionpool.xml

Включайте ТЖ с фильтром событий HASP.

Технологический журнал (logcfg.xml). Обработку по настройке конфигурации записи тех. журналов можно найти  на  ИТС.

Понял, спасибо, в понедельник попробую.

линуксоид значит нет денег. нет денег значит неудачник. неудачник значит задрот. задрот значит убей себя об стену, самочек тебе не достанется.

тут не Фукусима, Иван, самочки довольные спят) и Линукс тут скорее разнообразие

из серии не куришь — значит пидарас

Уважаемый Иван, меня всегда забавляли подобные индивиды как вы, ибо хронический комплекс неполноценности постоянно требует от вас самоутверждаться путём комфортной диареи в сторону окружающих. Комфортной ибо по ту сторону монитора легко, прикрывшись расстоянием и ником, безнаказанно хамить другим людям, приходя в щенячий восторг от собственной иллюзорной исключительности, которую никак иначе подпитывать вы не можете. Не хватает ума, усидчивости и таланта. Всё что вы можете, это мерить людей по себе своим дефицитом мировоззрения, который не позволяет мысль о том, что люди могут чем то интересоваться по широкому ряду причин, и что человеку у которого на компьютере лицензионные виндовс и офис (как никак работаю в фирме — партнёре Майкрасофта) могут быть интересны и другие операционные системы. Я видел десятки таких как вы и ничего кроме презрительной жалости вы у меня уже не вызываете. P.S. Кстати таблетка какого-нибудь стугерона или винпозитина улучшит мозговое кровообращение и поможет лучше переварить то множество букавок, что я тут набросал. С «уважением», Юнин Я.А.

egor2fsys, а события HASP к какой группе событий относятся в журнале?

В журнале нашёл следующее: 44:59.9299-1,HASP,3,process=rphost,p:processName=test1,t:clientID=3,t:applicationName=WebServerExtension,t:computerName=host,Txt=’ LOCALHASP_ISHASP(,,ser=Unknown,,,,)->found=0,port=0,stat=0,’ 44:59.9301-1,HASP,0,process=rphost,p:processName=test1,Txt=’ NETHASP_SET_CONFIG_FILENAME(,prog=17,ser=EN8SA,,size=36,,FName=/opt/1C/v8.2/x86_64/conf/nethasp.ini)->,,,’ 44:59.9303-1,HASP,0,process=rphost,p:processName=test1,Txt=’ NETHASP_LASTSTATUS(,prog=17,ser=EN8SA,,,,)->NStat=19,SysErr=10,stat=0,’ 44:59.9305-1,HASP,0,process=rphost,p:processName=test1,Txt=’ NETHASP_SET_CONFIG_FILENAME(,prog=17,ser=Unknown,,size=36,,FName=/opt/1C/v8.2/x86_64/conf/nethasp.ini)->,,,’ 44:59.9307-1,HASP,0,process=rphost,p:processName=test1,Txt=’ NETHASP_LASTSTATUS(,prog=17,ser=Unknown,,,,)->NStat=19,SysErr=10,stat=0,’

ValeriTim, это давно всё сделано, но не работает.

давай еще раз поэкспериментируем и подправим настройки. 1. На сервере защиты разрешим раздачу по tcp (ну или и tcp и udp). Удостоверимся в том, что ключ на самом деле сетевой. К примеру с другой машинки запустим Аладдин Монитор. Если монитор не видит сервер защиты — то ой. Ковыряем. 2. На машинке с сервером приложений телнетом проверим сервер защиты — откликается ли он на нужном нам порту(475 вроде)(это будет проверка по tcp). 3. Если телнет проходит — значит внимательно смотрим конфиг на сервере приложений и указываем там нужные айпишник/порт/протокол. Пробуем. 4. Если нет — значит проблема на машинке с сервером защиты. В общем медленно спустимся с горы…

Возникла таже проблема, не видит ключей веб-клиент работающий через Apache22. Конфигурация: Сервер с ключами на Windows 2008; Сервер с 1С сервисом и Apache на Ubuntu 10.10; Клиент Windows 7, Internet Explorer. Если клиент ходит через тонкий клиент то ключи находит. Если через веб, то ключа нет. Выяснилось следующее, тонкий клиент сам находит ключ, минуя сервер приложения. А вот веб-клиент пытается ключ получить через веб-расширение. Данный вывод сделан из захвата трафика на сервере с ключами, клиента и сервера приложений. В случае веб-клиента обращения к сети вообще не происходит.

И так поборол данный косяк, оказалось все банально, не правильный конфиг файл nethasp.ini. Вот пример рабочего файла: [NH_COMMON]  Скорее всего ошибка у автора поста в параметре, а именно в его значении:   NH_TCPIP_BROADCAST = Dasabled на Да и комментировать в данном файле только (;)

купить виндуз предлагали уже ?

Продолжая размышления по поводу, как диагностировать данную проблему. Сначала включаем ТЖ. С фильтром на все. За проверку лицензий отвечает процесс rmngr, находим строки, где содержится данная строка rmngr. ./rmngr_1265/11033110.log:26:31.4466-1,HASP,0,process=rmngr,p:processName=RegMngrCntxt,Txt=’ ./rmngr_1265/11033110.log:NETHASP_SET_CONFIG_FILENAME(,prog=17,ser=ORGL8,,size=34,,FName=/opt/1C/v8.2/i386/conf/nethasp.ini)->,,,’ ./rmngr_1265/11033110.log:26:31.4468-1,HASP,0,process=rmngr,p:processName=RegMngrCntxt,Txt=’ ./rmngr_1265/11033110.log:NETHASP_LASTSTATUS(,prog=17,ser=ORGL8,,,,)->NStat=19,SysErr=8,stat=0,’ Далее находим строку где содержится NETHASP_SET_CONFIG_FILENAME, убеждаемся что процесс rmngr читает файл с настройками HASP

Извините нажал рано отправить. * клиента. Далее находим строку, где содержится NETHASP_LASTSTATUS, а именно NStat и SysErr. С NStat я не смог понять, что означает значение 19, может быть это указывает на ошибку в конфигурационном файле nethasp.ini. Значение параметра SysErr указывает на строку, файла nethasp.ini, в которое содержится ошибка. В случае когда конфигурация верна это строка будет выглядеть следующим образом:

ftom, спасибо, сейчас всё попробую. smaharbA, вопрос повторюсь в этом не стоит. У нас всё на винде, это клиенту надо всё на линуксе. Мне надо сервер тестить и ковырять н алинуксе, но сетевой ключ в моей конторе один и люди работают, так что не могу я его переставить на машину с линуксом для своих изысков. OldFornit, 1 и 2 пункты уже не раз проверены, колдуем над 3-м… Сервер защиты работает полюбому, на нём вся контора получает лицензии.

итак… nethasp.ini: [NH_COMMON] Веб-клиента не пускает, не найдена лицензия, в журнале имеем следующее: NETHASP_SET_CONFIG_FILENAME(,prog=17,ser=EN8SA,,size=36,,FName=/opt/1C/v8.2/x86_64/conf/nethasp.ini)->,,,’ 36:44.5741-1,HASP,0,process=rphost,p:processName=test1,Txt=’ NETHASP_LASTSTATUS(,prog=17,ser=EN8SA,,,,)->NStat=0,SysErr=0,stat=0,’ … NETHASP_LOGIN(,prog=17,ser=EN8SA,,,,)->,,,’ 36:50.0431-1,HASP,0,process=rphost,p:processName=test1,Txt=’ NETHASP_LASTSTATUS(,prog=17,ser=EN8SA,,,,)->NStat=159,SysErr=0,stat=0,’ 36:50.0433-1,HASP,0,process=rphost,p:processName=test1,Txt=’ NETHASP_SET_CONFIG_FILENAME(,prog=17,ser=Unknown,,size=36,,FName=/opt/1C/v8.2/x86_64/conf/nethasp.ini)->,,,’ 36:50.0435-1,HASP,0,process=rphost,p:processName=test1,Txt=’ NETHASP_LASTSTATUS(,prog=17,ser=Unknown,,,,)->NStat=0,SysErr=0,stat=0,’

Логи приведены rphost, а нужен rmngr. Но даже по эти логам видно, что файл валидный. Но все таки хочется увидеть по rmngr. Попробуй в конфиге оставить только: [NH_COMMON]

пейсателя в забанить и отлучить, пока не пройдет 10 классов школы

Да пробовал уже всё это. А в rmngr вообще по хаспу нет никаких строк.

А ну понятно, у тебя в настройках ИБ отключено «выдавать лицензии сервером приложения». Как я писал уже, что за проверку лицензий отвечает процесс rmngr, при условии включенном параметре «выдавать лицензии сервером приложения» на ИБ. В противном случае проверятся будет только серверный ключ процессом rphost. Когда отключен параметр «выдавать лицензии …», то веб клиенты работать не будут, а будут только тонкие или толстые клиенты.

Сейчас проверю, хотя я это уже включал, не помогало, хотя возможно это было при неправильном хаспини….

Блин, спасибо, заработало…. остался косяк с файловой базой только победить. Ошибка на месте как в 1 сообщении. А с кластера открылась.

Но в принципе это уже дело второе, проверю везде доступ и права, уже работало на другом сервере и тут разберусь. Огромное всем спасибо за помошь, персональная благодарность ftom. Тему можно закрывать.

Тэги:

Комментарии доступны только авторизированным пользователям

таже, плять, хирня
тока что вот это работало
1C_Enterprise-server-8.1.12-101.i386.rpm
1C_Enterprise-common-8.1.12-101.i386.rpm

снёс, развернул это гомно:

Код: Выделить всё

[18:02]  /compat/tmp/8.2.15 >ll
total 161786
-rwxr-xr-x  1 root  wheel   23297869 24 дек 10:08 1C_Enterprise82-common-8.2.15-289.i386.rpm
-rwxr-xr-x  1 root  wheel     964181 24 дек 10:08 1C_Enterprise82-common-nls-8.2.15-289.i386.rpm
-rwxr-xr-x  1 root  wheel     559079 24 дек 10:08 1C_Enterprise82-crs-8.2.15-289.i386.rpm
-rwxr-xr-x  1 root  wheel     106859 24 дек 10:08 1C_Enterprise82-crs-nls-8.2.15-289.i386.rpm
-rwxr-xr-x  1 root  wheel  118298177 24 дек 10:09 1C_Enterprise82-server-8.2.15-289.i386.rpm
-rwxr-xr-x  1 root  wheel   22063575 24 дек 10:10 1C_Enterprise82-server-nls-8.2.15-289.i386.rpm
-rwxr-xr-x  1 root  wheel     177490 24 дек 10:10 1C_Enterprise82-ws-8.2.15-289.i386.rpm
-rwxr-xr-x  1 root  wheel      11985 24 дек 10:10 1C_Enterprise82-ws-nls-8.2.15-289.i386.rpm
drwxr-xr-x  4 root  wheel        512 19 янв 14:18 etc
drwxr-xr-x  3 root  wheel        512 19 янв 14:17 opt
-rwxr-xr-x  1 root  wheel        126 19 янв 14:16 unpack

на фре всё чудесно стартануло

Код: Выделить всё

[17:37]  /usr/local/etc/rc.d >./1cserver.sh status
 1cserver1cv8usr   28939  0,5  1,0 521980 20580  ??  S    17:37     0:00,20 /compat/linux/opt/1C/v8.2/i386/ragent -daemon
1cv8usr   28943  0,3  1,0 521980 20580  ??  S    17:37     0:00,00 /compat/linux/opt/1C/v8.2/i386/ragent -daemon
1cv8usr   28937  0,1  1,0 521980 20580  ??  S    17:37     0:00,00 /compat/linux/opt/1C/v8.2/i386/ragent -daemon
1cv8usr   28927  0,0  1,0 521980 20580  ??  Ss   17:37     0:00,21 /compat/linux/opt/1C/v8.2/i386/ragent -daemon
1cv8usr   28928  0,0  1,0 521980 20580  ??  S    17:37     0:00,00 /compat/linux/opt/1C/v8.2/i386/ragent -daemon
1cv8usr   28935  0,0  1,0 521980 20580  ??  S    17:37     0:00,00 /compat/linux/opt/1C/v8.2/i386/ragent -daemon
1cv8usr   28940  0,0  1,0 521980 20580  ??  S    17:37     0:00,00 /compat/linux/opt/1C/v8.2/i386/ragent -daemon
1cv8usr   28944  0,0  1,0 521980 20580  ??  S    17:37     0:00,01 /compat/linux/opt/1C/v8.2/i386/ragent -daemon
root      28955  0,0  0,1  3464  1120   1  S+   17:37     0:00,00 grep ragent
1cv8usr   28948  0,6  1,0 324072 19936  ??  S    17:37     0:00,00 /usr/compat/linux/opt/1C/v8.2/i386/rphost -range 1560:1591 -reghost mx -regport 1541 -
1cv8usr   28945  0,5  1,0 324072 19936  ??  S    17:37     0:00,17 /usr/compat/linux/opt/1C/v8.2/i386/rphost -range 1560:1591 -reghost mx -regport 1541 -
1cv8usr   28949  0,5  1,0 324072 19936  ??  S    17:37     0:00,00 /usr/compat/linux/opt/1C/v8.2/i386/rphost -range 1560:1591 -reghost mx -regport 1541 -
1cv8usr   28947  0,3  1,0 324072 19936  ??  S    17:37     0:00,00 /usr/compat/linux/opt/1C/v8.2/i386/rphost -range 1560:1591 -reghost mx -regport 1541 -
1cv8usr   28946  0,2  1,0 324072 19936  ??  S    17:37     0:00,00 /usr/compat/linux/opt/1C/v8.2/i386/rphost -range 1560:1591 -reghost mx -regport 1541 -
root      28957  0,0  0,1  3464  1120   1  S+   17:37     0:00,00 grep rphost
1cv8usr   28929  0,0  1,0 588484 21596  ??  S    17:37     0:00,06 /usr/compat/linux/opt/1C/v8.2/i386/rmngr -port 1541 -range 1560:1591
1cv8usr   28930  0,0  1,0 588484 21596  ??  S    17:37     0:00,00 /usr/compat/linux/opt/1C/v8.2/i386/rmngr -port 1541 -range 1560:1591
1cv8usr   28931  0,0  1,0 588484 21596  ??  S    17:37     0:00,00 /usr/compat/linux/opt/1C/v8.2/i386/rmngr -port 1541 -range 1560:1591
1cv8usr   28932  0,0  1,0 588484 21596  ??  S    17:37     0:00,00 /usr/compat/linux/opt/1C/v8.2/i386/rmngr -port 1541 -range 1560:1591
1cv8usr   28933  0,0  1,0 588484 21596  ??  S    17:37     0:00,00 /usr/compat/linux/opt/1C/v8.2/i386/rmngr -port 1541 -range 1560:1591
1cv8usr   28934  0,0  1,0 588484 21596  ??  S    17:37     0:00,00 /usr/compat/linux/opt/1C/v8.2/i386/rmngr -port 1541 -range 1560:1591
1cv8usr   28936  0,0  1,0 588484 21596  ??  S    17:37     0:00,01 /usr/compat/linux/opt/1C/v8.2/i386/rmngr -port 1541 -range 1560:1591
1cv8usr   28938  0,0  1,0 588484 21596  ??  S    17:37     0:00,01 /usr/compat/linux/opt/1C/v8.2/i386/rmngr -port 1541 -range 1560:1591
root      28959  0,0  0,1  3464  1116   1  S+   17:37     0:00,00 grep rmngr

и привет, с виндовозного клиента на «диск цэ» кудато лезет, сцуко и всё.. :st:

вот тут народ какбэ «обрадовал», шо под 8.2 никак.. :(
так ли это?

Понравилась статья? Поделить с друзьями:
  • Error loading fastfile ru core patch fast file archive checksum does not match executable
  • Error loading external login information
  • Error loading extension section server
  • Error loading extension section default
  • Error loading eula text