OneToMany Mapping Exception - can anybody help

SEVERE: >>java.lang.ExceptionInInitializerError: null
javax.persistence.PersistenceException: Exception [TOPLINK-28018] (Oracle TopLink Essentials - 2.0 (Build b40-rc (03/21/2007))): oracle.toplink.essentials.exceptions.EntityManagerSetupExceptionException Description: predeploy for PersistenceUnit [dmsPU] failed.
Internal Exception: Exception [TOPLINK-7154] (Oracle TopLink Essentials - 2.0 (Build b40-rc (03/21/2007))): oracle.toplink.essentials.exceptions.ValidationException
Exception Description: The attribute [mPackagepartses] in entity class [class com.adityas.jpa.masters.part.MPart] has a mappedBy value of [part] which does not exist in its owning entity class [class com.adityas.jpa.masters.packageParts.MPackageparts]. If the owning entity class is a @MappedSuperclass, this is invalid, and your attribute should reference the correct subclass.
oracle.toplink.essentials.exceptions.EntityManagerSetupException: Exception Description: predeploy for PersistenceUnit [dmsPU] failed.
Internal Exception: Exception [TOPLINK-7154] (Oracle TopLink Essentials - 2.0 (Build b40-rc (03/21/2007))): oracle.toplink.essentials.exceptions.ValidationException
Exception Description: The attribute [mPackagepartses] in entity class [class com.adityas.jpa.masters.part.MPart] has a mappedBy value of [part] which does not exist in its owning entity class [class com.adityas.jpa.masters.packageParts.MPackageparts]. If the owning entity class is a @MappedSuperclass, this is invalid, and your attribute should reference the correct subclass.
Local Exception Stack:
Exception [TOPLINK-7154] (Oracle TopLink Essentials - 2.0 (Build b40-rc (03/21/2007))): oracle.toplink.essentials.exceptions.ValidationException
Exception Description: The attribute [mPackagepartses] in entity class [class com.adityas.jpa.masters.part.MPart] has a mappedBy value of [part] which does not exist in its owning entity class [class com.adityas.jpa.masters.packageParts.MPackageparts]. If the owning entity class is a @MappedSuperclass, this is invalid, and your attribute should reference the correct subclass.
     at oracle.toplink.essentials.exceptions.ValidationException.noMappedByAttributeFound(ValidationException.java:1118)
     at oracle.toplink.essentials.internal.ejb.cmp3.metadata.MetadataValidator.throwNoMappedByAttributeFound(MetadataValidator.java:297)
     at oracle.toplink.essentials.internal.ejb.cmp3.metadata.accessors.RelationshipAccessor.getOwningMapping(RelationshipAccessor.java:127)

@Entity
@Table(name = "m_part", catalog = "dms_dev")
public class MPart implements java.io.Serializable {
     // Fields
     private static final long serialVersionUID = -7784550511312653300L;
     private Integer partPk;
     private MWarehouse warehouse;
     private String partNo;
     private String venderPartNo;
     private String partName;
     private Integer group2;
     private Integer issueUom;
     private Integer purchaseUom;
     private String warrantyAppl;
     private String returnable;
     private String salvageValue;
     private Double mrp;
     private Double ndp;
     private Double venderPrice;
     private String partLocation;
     private Double stockInHand;
     private Double minQty;
     private Double openQty;
     private String decsription;
     private Integer crtBy;
     private Date crtDt;
     private Integer updBy;
     private Date updDt;
     private Integer partGroup;
     private Set<TReqApprDtl> reqApprDtls = new HashSet<TReqApprDtl>(0);
     private Set<TPcrInfo> pcrInfos = new HashSet<TPcrInfo>(0);
     private Set<TPoReceive> poReceives = new HashSet<TPoReceive>(0);
     private Set<MPackageparts> packagepartses = new HashSet<MPackageparts>(0);
     private Set<TPoReturn> poReturns = new HashSet<TPoReturn>(0);
     private Set<TAncillaryDtls> ancillaryDtlses = new HashSet<TAncillaryDtls>(0);
     private Set<TPoDetails> poDetailses = new HashSet<TPoDetails>(0);
     // Constructors
     /** default constructor */
     public MPart() {
@OneToMany(cascade = CascadeType.ALL, fetch = FetchType.EAGER, mappedBy = "part")
     public Set<MPackageparts> getMPackagepartses() {
          return this.packagepartses;
     public void setMPackagepartses(Set<MPackageparts> packagepartses) {
          this.packagepartses = packagepartses;
@Entity
@Table(name = "m_packageparts", catalog = "dms_dev")
public class MPackageparts implements java.io.Serializable {
     // Fields
     private static final long serialVersionUID = -3528271808797143260L;
     private Integer packagePartPk;
     private MPart part;
     private MComplaint complaint;
     private Double reqQuantity;
     private Integer crtBy;
     private Date crtDt;
     private Integer updBy;
     private Date updDt;
     // Constructors
     /** default constructor */
     public MPackageparts() {
@ManyToOne(fetch = FetchType.EAGER)
     @JoinColumn(name = "PART_PK", nullable = false)
     public MPart getMPart() {
          return this.part;
     public void setMPart(MPart part) {
          this.part = part;
Yes it is mentioned as ManyToOne mapping.

Similar Messages

  • I have a iphone4. Using maps I am unable to get voice navigation. Can anybody help?

    I have a iphone4. Using apple maps i am unable to get turn by turn VOICE navigation. Can anybody help?

    Thank You. Just at this moment I also found the answer in the ios 7 manual. Thanks for your help all the same.

  • Can anybody help? My Safari browser keeps crashing. The whole window just turns grey.

    Can anybody help? My Safari browser keeps crashing on iMac 10.7.5. The whole window just turns grey. It started happening around the time of the new bookmarks menu upgrade recently which changed the bookmarks to be only on the side and makes it so you can see all your bookmarks while browsing.  I know I have a lot of bookmarks, so I tried hiding them, but it still happens. I ALREADY TRIED CLEARING MY HISTORY, AND THAT DID NOT HELP, AND I HAVE NO EXTENSIONS FOR THIS BROWSER.
    Does the fact that I am in Brasil have anything to do with it?
    Thank you to anyone who can help. In case no one can come up with an answer, is there an easy way to transfer my bookmarks from safari to either firefox or chrome?
    Much appreciated.

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are outside the safe harbor, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Most of the real-world danger of malware attack comes from highly targeted "zero-day" exploits that are not yet recognized.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • I have just download a book from itunes store but, i don't have an iPad to read it. Can anybody help me? Can i convert it? Thanks.

    i have just download a book from itunes store but, since i don't have an iPad, i can´t read it or even see it. Can anybody help me? Can i convert it? Thanks.

    Every purchase page for an ebook has a section that says "Requirements".  What does that say for your particular book?  That should give you the answer to your question.  Conversion is normally not possible.
    But there are some exceptions.  Please provide the Title of the book if you want further help.

  • Unable to connect facebook using HTTP_CONNECTOR in Integrator. Can anybody help for connecting Facebook with Integrator.??

    Hi,
    I am unable to connect facebook using HTTP_CONNECTOR component i have added all the parameters required for its authentication i.e client_id , client_secret, grant_type correct but the graph is giving the following error:
    ====================================================================================================================
    ERROR [WatchDog_0] - Component [Query for access token:QUERY_FOR_ACCESS_TOKEN] finished with status ERROR.
    peer not authenticated
    ERROR [WatchDog_0] - Error details:
    org.jetel.exception.JetelRuntimeException: Component [Query for access token:QUERY_FOR_ACCESS_TOKEN] finished with status ERROR.
      at org.jetel.graph.Node.createNodeException(Node.java:535)
      at org.jetel.graph.Node.run(Node.java:514)
      at java.lang.Thread.run(Thread.java:722)
    Caused by: javax.net.ssl.SSLPeerUnverifiedException: peer not authenticated
      at sun.security.ssl.SSLSessionImpl.getPeerCertificates(SSLSessionImpl.java:397)
      at org.apache.http.conn.ssl.AbstractVerifier.verify(AbstractVerifier.java:128)
      at org.apache.http.conn.ssl.SSLSocketFactory.connectSocket(SSLSocketFactory.java:572)
      at org.apache.http.impl.conn.DefaultClientConnectionOperator.openConnection(DefaultClientConnectionOperator.java:180)
      at org.apache.http.impl.conn.AbstractPoolEntry.open(AbstractPoolEntry.java:151)
      at org.apache.http.impl.conn.AbstractPooledConnAdapter.open(AbstractPooledConnAdapter.java:125)
      at org.apache.http.impl.client.DefaultRequestDirector.tryConnect(DefaultRequestDirector.java:641)
      at org.apache.http.impl.client.DefaultRequestDirector.execute(DefaultRequestDirector.java:480)
      at org.apache.http.impl.client.AbstractHttpClient.execute(AbstractHttpClient.java:906)
      at org.apache.http.impl.client.AbstractHttpClient.execute(AbstractHttpClient.java:805)
      at org.apache.http.impl.client.AbstractHttpClient.execute(AbstractHttpClient.java:784)
      at org.jetel.component.HttpConnector.buildAndSendRequest(HttpConnector.java:1836)
      at org.jetel.component.HttpConnector.process(HttpConnector.java:1803)
      at org.jetel.component.HttpConnector.executeForRecord(HttpConnector.java:1947)
      at org.jetel.component.HttpConnector.execute(HttpConnector.java:1914)
      at org.jetel.graph.Node.run(Node.java:485)
      ... 1 more
    ============================================================================================================
    Can anybody help with this ??

    Hi Brett,
    I have installed endeca in non-ssl mode. I am trying to validate the HTTP_Connector component as shown below and its showing the following error:  
    and if run the graph its showing error as mention above. I am new to endeca so can you please help me that what can i do for validating this component and connecting to facebook.

  • Hello friends, my itunes has stopped working. and the problem report stated the following: Fault Module Name:     KERNELBASE.dll   Fault Module Version:     6.1.7601.17514.................. please can anybody help me?hello friends, my itunes has stopped w

    Hello everybody> my itunes has stopped working and the problem report stated the following:
    Problem signature:
      Problem Event Name:    APPCRASH
      Application Name:    iTunes.exe
      Application Version:    10.5.3.3
      Application Timestamp:    4f14cc3d
      Fault Module Name:    KERNELBASE.dll
      Fault Module Version:    6.1.7601.17514
      Fault Module Timestamp:    4ce7b8f0
      Exception Code:    80000003
      Exception Offset:    0003381b
      OS Version:    6.1.7601.2.1.0.256.1
      Locale ID:    1033
      Additional Information 1:    0a9e
      Additional Information 2:    0a9e372d3b4ad19135b953a78882e789
      Additional Information 3:    0a9e
      Additional Information 4:    0a9e372d3b4ad19135b953a78882e789
    can anybody help me?

    Are you seeing a similar message when launching QuickTime Player?
    What security software is installed on the computer? Have you tried testing in an admin account or after uninstalling tthe security software?
    Use one of the following articles to guide you through removing iTunes and the related QuickTime files.
    Removing and Reinstalling iTunes, QuickTime, and other software components for Windows XP
    Removing and reinstalling iTunes, QuickTime, and other software components for Windows Vista or Windows 7

  • Images won't open in my gmail or websites can anybody help me? this happend when i updated to the newest version of Firefox

    Question
    Images won't open in my gmail or websites can anybody help me? This happen when I updated to the newest version of Firefox

    If images are missing then check that you aren't blocking images from some domains.
    See:
    * http://kb.mozillazine.org/Images_or_animations_do_not_load
    * Check the permissions for the domain in the current tab in Tools > Page Info > Permissions
    * Check that images are enabled: Tools > Options > Content: [X] Load images automatically
    * Check the exceptions in Tools > Options > Content: Load Images > Exceptions
    * Check the "Tools > Page Info > Media" tab for blocked images (scroll through all the images)
    There are also extensions (Tools > Add-ons > Extensions) that can block images.
    * [[Troubleshooting extensions and themes]]

  • Can anybody help out in ALE?

    Hi friends,
                  Can anybody help me out by giving the navigation steps of configuring the ALE.......Please urgent
    Useful Answers will be definetly rewarded points.

    hi,
    1.     INTRODUCTION TO ALE DEVELOPMENT
    To develop a new custom ALE scenario, comprises 5 steps:
    1.     Design and develop the custom IDoc with it’s segments and a new message type
    2.     Configure the ALE environment with the new IDoc and message type (customer model, partner profiles and linking IDoc to message type)
    3.     Develop the outbound process which does the following:
    •     Populates the custom IDoc with control info and functional data
    •     Sends the IDoc to the ALE layer for distribution
    •     Updates status and handles errors
    4.     Configure the ALE inbound side (partner profiles with inbound process code)
    5.     Develop the inbound process which does the following:
    •     Reads the IDoc into a BDC table; selects other data that is required
    •     Runs transaction using call transaction or BDC session
    •     Updates status and handles errors
    2.1.     Create IDoc type (WE30) Client independent
    The IDoc type refers to the IDoc structure that you will require for your development
    To create the IDoc type, follow these next few steps:
    •     Enter transaction WE30 (ALE -> Extensions -> IDoc types -> Maintain IDoc type)
    •     Type in ZINVRV01 and click on Basic IDoc type, click the Create icon
    •     Click on Create new (we are creating an IDoc from scratch but you may want to copy another IDoc if it is similar to your requirements) and enter a description, and press enter
    •     Click on ZINVRV01 and then on the Create icon
    •     Enter Z1INVRV as the segment type (must start with Z1), check mandatory if the segment must exist (in this case check it), enter 1 in minimum number and 1 as maximum number. (Make the maximum number 9999999999 if there are going to be many of these segments in each IDoc. IE. When line items are passed via IDocs), click on Segment editor
    •     Enter a description for your segment type and create
    •     Enter a description for your segment, enter each field required in your IDoc, in our case type LIFNR across for Field name, DE structure and DE documentation, repeat for XBLNR and press enter to validate.
    •     Save and generate, press back
    •     To release the segment choose Goto, Release from the menu
    •     Check the box on the line of your new segment
    •     Save, back and enter
    •     Your IDoc type structure should be displayed with your new segment
    •     Save and back
    •     To release the IDoc type choose Extras, Release type from the menu and Yes
    Your IDoc is now ready for use. If you need to add fields or segments to your IDoc type, you will need to cancel the release of the IDoc type as well as the segment release using a similar
    procedure followed above (except now you uncheck the release box for the segment and you choose cancel release for the IDoc type).
    2.2.     Create message type (WE81) Client independent
    To create a new message type, follow these next few steps:
    •     Enter transaction WE81 (ALE -> Extensions -> IDoc types -> Maintain message type for intermed. Structure -> Create logical message type)
    •     Choose Create logical message type by double clicking on it
    •     Click on change icon to enter change mode
    •     Click on New entries to add a new type
    •     Enter the required message type, in our case it is ZINVRV and an appropriate description
    •     Save and exit.
    Your message type has now been created. The next step will be to link it to the IDoc.
    2.2.1.     Link message to IDoc type (WE82 & BD69) Client independent
    To link the message type to the IDoc type follow these next few steps:
    •     Enter transaction WE82 (ALE -> Extensions -> IDoc types -> Maintain message type for intermed. Structure -> EDI: Message Types and Assignment to IDoc Types)
    •     Click on change icon to enter change mode
    •     Click on New entries to create the link
    •     Enter the message type ZINVRV and the BasicIDoc type as ZINVRV01
    •     Save and exit
    •     Enter transaction BD69 (ALE -> Extensions -> IDoc types -> Maintain message type for intermed. Structure -> Assign message type to IDoc for ALE)
    •     Click on change icon to enter change mode
    •     Click on New entries to create the link
    •     Enter the message type ZINVRV and the BasicIDoc type as ZINVRV01
    •     Save and exit
    Your IDoc is now linked to your message type. We still need to link object types and add the message to the model before we can use the message.
    2.2.2.     Maintain object type for message type (BD59) Client independent
    The ALE objects are used to create links between IDocs and applications objects, to control the serialisation, to filter messages in the customer model and to use listings.
    For our own message type and IDoc you must maintain object types for the links.
    If you want to check the serialisation for the message type, then you must maintain object types for the serialisation. If no serialisation object has been maintained for a given message type, then the serialisation will not be checked for this message type.
    To add an object type to our message type, follow these next few steps:
    •     Enter transaction BD59 (ALE -> Extensions -> ALE object maintenance -> Maintain object types)
    •     Type in your message type ZINVRV and press enter
    •     Click on New entries
    •     Enter your object type, LIFNR (We need to use the vendor as a filter object), the segment name where LIFNR resides, Z1INVRV, a number 1 for the sequence followed by the actual field name LIFNR
    •     Save and exit.
    You have now created an object that we’ll use as a filter object in the customer model to direct the flow of messages to the various logical systems based on the vendors in the filter of the message type ZINVRV.
    We now need to add our new message type to the distribution model.
    2.3.     Configuring the Distribution Model
    This task is performed on your ALE reference client.
    2.3.1.     Manual Configuration (BD64) Client dependent
    To manually configure the customer distribution model, read the ALE configuration procedure, and follow these steps:
    •     Perform the Maintain customer distribution model directly function. (ALE -> Distribution customer model -> Maintain customer distribution model directly)
    •     Specify the customer model you want to maintain and the logical system that is to be the sender of the messages OR create a new model. (Create model ALE with logical system ALELS1C400)
    •     Choose the receiving systems to which the sending system must forward message type ZINVRV to.
    •     For each receiving logical system allocate the message type necessary for communication to the receiving systems as per ALE configuration procedure.
    •     Create filter objects (in our case LIFNR as the object type with the associated vendor number, 0000018001 with leading zeros, in the object area) for the message types.
    •     Save the entries.
    NOTES:
    You cannot maintain a message type between the same sender and receiver in more than one customer distribution model.
    Only the owner is authorised to modify the model.
    To change the owner of a model, choose the 'Maintain ownership of customer distribution model' function. Make sure that all changes will be distributed to all systems that know the corresponding model. To do so, you can use the correction and transport system.
    To transport the customer distribution model you should use the Distribute customer model function of the IMG as described below.
    2.3.2.     Distribute customer model (BD71) Client dependent
    After the customer model has been created centrally, it must be distributed to the other remote systems. This entails first of all setting up the communication for the distributed systems and then sending the model.
    2.3.2.1.     Distribute Model (BD71) Client dependent
    This task is performed on your ALE reference client. To distribute the customer distribution model, read the ALE configuration procedure and follow these steps:
    •     Make the settings for the communication with the other decentral systems, you have not set them yet.
    •     Define the RFC destination for R/3 connections whose names correspond to the name of the corresponding logical system.
    •     Create the output partner profile.
    •     Distribute the customer model
    •     Specify the name of the customer model.
    •     You must specify the target system to which you want to distribute the customer model.
    •     You must repeat this function for every distributed logical system.
    2.3.2.2.     Maintain sending system partner profile (WE20) Client dependent
    With this function, you define the partner profiles for all outbound and inbound messages on the basis of the customer distribution model.
    After you have defined and distributed the customer model, you will have to maintain the partner profiles locally. To do this read the ALE configuration procedure.
    •     Enter the output mode (background, immediately) and the package size for outbound processing.
    Requirements
    •     The customer model must be maintained.
    •     RFC destinations must be maintained.
    •     The customer model must be distributed.
    •     To ensure that the appropriate persons in charge are informed if a processing error occurs, you must make settings in: Error processing Maintain organisational units.
    2.4.     Populate & distribute IDoc using ABAP
    An IDoc consists of a control record with structure edidc and one or more data records with structure edidd. The control record contains the sender and recipient of the IDoc, as well as information on the type of message.
    To be able to pass an IDoc to the ALE layer, you must set up a field string with structure edidc and an internal table with structure edidd. They are used to call function module master_idoc_distribute, which performs the save to the database and triggers the dispatch if necessary.
    Hope this helps, Do reward.

  • Can anybody help me with the product costing report... URGENt!!!!!

    Hi,
    Can anybody help me with the logic. teh present logic is given below. But as per the new requirement in the Selection screen when I add Material as Select Options then Logic should "expecting to get the report either in Product Group or (single/multiple/range) Material" . Please reply ASAP.
    get the list of product groups based on the range entered by the user.
      SELECT KSTRG FROM CKPH INTO TABLE I_KSTRG
                   WHERE KSTRG IN SO_KSTRG.
    for each product explode the hierarchy get all sub product groups
      LOOP AT I_KSTRG.
        CLEAR I_CKPH. REFRESH I_CKPH.
        CALL FUNCTION 'K_CKPH_GET_HIERARCHY'
             EXPORTING
                  DATBI     = '99991231'
                  KSTRG     = I_KSTRG-KSTRG
             TABLES
                  CKPH_I    = I_CKPH
             EXCEPTIONS
                  NOT_FOUND = 1
                  OTHERS    = 2.
        IF SY-SUBRC EQ 0.
        save all unique product groups within the hierarchy.
          LOOP AT I_CKPH.
            MOVE 'EQ' TO F_KSTRG-OPTION.
            MOVE 'I' TO F_KSTRG-SIGN.
            MOVE I_CKPH-KSTRG TO F_KSTRG-LOW.
            COLLECT F_KSTRG.
            MOVE I_CKPH-KSTRG TO KSTRG-LEVEL2.
            MOVE I_CKPH-UEKTR TO KSTRG-LEVEL1.
            COLLECT KSTRG. CLEAR KSTRG.
          ENDLOOP.
        ENDIF.
      ENDLOOP.
    SORT KSTRG BY LEVEL2 LEVEL1.
    check if there are product groups extracted.
      CLEAR Z_LINES. DESCRIBE TABLE F_KSTRG LINES Z_LINES.
      IF Z_LINES GT 0.
    get the materials attached to each product group.
        SELECT KSTRG WERKS MATNR
          INTO CORRESPONDING FIELDS OF TABLE I_CKPE
          FROM CKPE
          WHERE KSTRG IN F_KSTRG
            AND WERKS = PA_WERKS.
      IF NOT I_CKPE[] IS INITIAL.
    get the order info order number & object number
          SELECT AFPOMATNR AUFKOBJNR
             INTO CORRESPONDING FIELDS OF TABLE I_AFPO
             FROM AFPO AS AFPO INNER JOIN AUFK AS AUFK
             ON AFPOAUFNR = AUFKAUFNR
             FOR ALL ENTRIES IN I_CKPE
           WHERE AFPO~MATNR = I_CKPE-MATNR.
        ENDIF.
        SORT I_AFPO BY MATNR.
        LOOP AT I_CKPE.
      get the division for the material.
          CLEAR: Z_SPART, MARA.
          SELECT SINGLE SPART
                   INTO Z_SPART
                   FROM MARA
                  WHERE MATNR = I_CKPE-MATNR
                    AND MTART = 'ZTFG'.
          MARA-SPART = Z_SPART.
        only proceed with processing if division is within users selection
          IF Z_SPART IN SO_SPART.
            LOOP AT I_AFPO WHERE MATNR = I_CKPE-MATNR.
              CLEAR: Z_MATERIAL_FLG, Z_EXPENSES_FLG, Z_SCRAP_FLG,
                     Z_OUTVAR_FLG, Z_ACTIVITY_FLG.
              LOOP AT I_COEP WHERE OBJNR = I_AFPO-OBJNR
                              AND  VRGNG NE 'KOAO'.   "changed by Kasturi
                PERFORM GET_DATA_FOR_REPORT TABLES I_DATA I_DATA_QTY.
                ENDLOOP.
              ENDLOOP.                       "afpo
            ENDIF.                           "division check
          ENDLOOP.                           "ckpe
        ELSE.
      no product groups extracted.
         MESSAGE i011.
      ENDIF.

    Has this been resolved?
    Your requirement is not clear. Could you please elaborate more about the output required?
    Thanks,
    F~Y

  • I cannot open iCal because of a problem. Can anybody help me? The computer will not allow it to open and sends a message to apple each time. The icon has gone from the dock, but ical works on my iPad and I am afraid to sync it with my computer.?

    I cannot open iCal because of a problem. Can anybody help me? The computer will not allow it to open and sends a message to apple each time. The icon has gone from the dock, but ical works on my iPad and I am afraid to sync it with my computer in case it wipes everything .

    I have the exact same problem. I have not changed anything. This is probably a bug or something that has gone bad with Mac OS X (10.7.2). I have not found any solution for this on the web.
    MacBook Pro, Mac OS X (10.7.2).

  • I desperately to uninstall adobe reader from my Mac book air. I sent adobe reader to trash and afterwards look for internet plugs in in library but the folder is empty. Can anybody help me?

    I desperately need to uninstall adobe reader from my Mac book air. I sent adobe reader to trash and afterwards look for internet plugs in  library but this folder is empty in my library. Can anybody help me?

    I looked for plugs in in my library but the folder internet plugs in is empty

  • My ipad just won't let me enter my apple password on FaceTime or iMessage, it works fine on my iPhone, I have tried numerous things but nothing works, can anybody help please, will a bug fix sort this out when they finally make one

    My ipad just won't let me sign in with my apple password on FaceTime or iMessage since updating to ios7 it says check my network connection, even though my iPhone works fine with the same password, can anybody help please, I have tried numerous things but nothing  works.  Will I have to wait for a bug fix to sort this? I hear they are working on one a the minute, I hate ios7

    Try a Restart.
    Press and hold the Sleep/Wake button for a few seconds until the red "slide to power off" slider appears, and then slide the slider. Press and hold the Sleep/Wake button until the Apple logo appears.
    Resetting your settings
    You can also try resetting all settings. Settings>General>Reset>Reset All Settings. You will have to enter all of your device settings again.... All of the settings in the settings app will have to be re-entered. You won't lose any data, but it takes time to enter all of the settings again.
    Resetting your device
    Press and hold the Sleep/Wake button and the Home button together for at least ten seconds, until the Apple logo appears. Apple recommends this only if you are unable to restart it.
    Or if this doesn't work and nobody else on the blog doesn't have a better idea you can contact Apple.
    Here is a link to their contacts with most of the information below.
    http://www.apple.com/contact/

  • I have an iPhone 3gs and it used to show up on my computer, but now it shows up on my screen that it is charging however, does not appear in iTunes or My Computer so i can't sync it. Can anybody help? Thanks

    I have an iPhone 3gs and it used to show up on my computer, but now it shows up on my screen that it is charging however, does not appear in iTunes or My Computer so i can't sync it. Can anybody help? Thanks.

    Did you already make sure that Apple Mobile Device Service is installed and active on your computer?
    http://support.apple.com/kb/TS1567
    More troubleshooting about your device not recognized in Windows can be found here: http://support.apple.com/kb/TS1495

  • My Bluetooth USB wireless transmitter for my portable speakers has quit working.  Preferences says, "The selected device has no output controls", it used to work just fine.  Can anybody help?

    My Bluetooth USB wireless transmitter for my portable BT speakers has quit working.  Preferences says, "The selected device has no output controls", it used to work just fine.  The internal and a pair of wired external speakers work fine.  Can anybody help?

    Just tested something and it worked.
    If I put the headphones all the way in, the mac recognizes it as a digital output.
    But if i don't put it all the way in, it recognizes it as headphones and works perfectly.
    It's probably this crappy headphones.
    If anyone has the same problem, try this out.

  • I have been trying to put music I bought on I tunes on my Samsung Note 2 phone but it won't play.I try to convert them to mp3 format so I can play them on my phone but it won't let me convert them because it says they are protected. Can anybody help me?

    I have been trying to put music I bought on Itunes on my Samsung Note 2 but my media player won't play m4p files so I tried to convert the files to mp3 but I couldn't, because a message says they are protected files. I then tried downloading different media player apps to see if they would play them but had no success.Can anybody help with a solution to this problem?

    First quit iTunes and look in your iTunes folder.
    On Windows, the iTunes folder is in your My Music folder.
    On Mac, the iTunes folder is in your Music folder.
    Follow this path:    iTunes > iTunes Media > Music >
    Here there should be all your music folders. Open the folders containing the music that is not playing. Right click "get info" (mac) or right click "properties" (windows).
    This window will tell you the file type. iTunes will play music in AAC, MP3, and Lossless, etc.
    If the files are .wma you will need to convert them into ACC or MP3 format for it to play on an iPod. In iTunes, highlight the tracks that you want to convert, then on the menu bar, Advanced > Create AAC/MP3 version and the tracks will convert. Delete the old files.
    If the file extenstion is anything like .exe .txt .rar  then you don't have an audio file.

Maybe you are looking for

  • FAILED INSTALLATION OF ITUNES 7 & ITUNES 6

    i've been reading the threads on problems installing iTunes v7 and it seems the common fix is to to do this: Go to HD>Library>Receipts> and remove the "iTunesX.pkg" to the trash. Then reinstall iTunes. Well this didnt work for me and the installer re

  • Integrate Document Builder to SRM PPS using Web Service

    Well, if what you want to see is the "Document Builder" link from "Related Links" of your RFx document, what you need to do is to configure it in IMG : SPRO - SRM Server >> Cross-Industry Functions >> Integration with Document Builder >> Activate Doc

  • How to get file attribs - on any Mac

    ok so if the Mac in question has Developer / Tools - yeah the GetFileInfo binary will work to get the Type and Creator code and other info.... since most Macs dont have this bulky download... how to get file attribute information via Terminal ? How t

  • From French to English

    My iTunes program speak French. How can I make my program speak English?

  • WiFi turns off upon physical stimulus

    Hey community, I have an R400, model 7440DK5 that has served me very well over almost 3 years at this point. However over the last month or so it has been having a very peculiar problem: the wifi keeps turning off when the laptop receives some physic