![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Control > Check In (Apex/Summit)Files under Summit/CM control must be checked out to be modified and then checked in when modifications are complete. You can place an object under Summit/CM control as part of check in, or by using Control > Object Properties (Apex/Summit). You can also accept the checked-in versions into another view. This command is only available through the shadowing capabilities of Apex Ada 95/83 for Windows NT.
The Control > Check In command saves the current file image in the version history database. After the file is checked in, it will have read-only UNIX file permissions and may not be modified. When you choose this command, the Check In dialog box appears.
Check In Dialog Box Fields:
Check In Field
Specifies the name of the files you want to check in to Summit/CM. Use the Add input field to add additional file names to the Check In list field. Use the Remove or Clear button to delete entries from the list.
Allow check-in of privately checked-out files, even if not the latest version
Normally, a privately checked-out file can only be checked-in if no new version has been created since the private check-out occurred. This option permits such a check-in. Additional information on private check out is available in More on Private Check Out (Apex/Summit).
Perform keyword replacement
Enables replacement of keywords with substitution strings. This is set by default.
Accept object(s) into subsystem-relative view name
Causes each checked-in file to be accepted into another view identified by the simple view name specified.
Place File Under Source Control Check Box
Select this check box to check-in uncontrolled files. Otherwise, it is an error to check-in an uncontrolled file.
Set attribute on checked-in versions
Select this check box to set an extended version attribute on checked-in verions. Two additional fields described below will appear: Set Attribute and To Value.
Set Attribute
The name of the extended attribute to be set in the checked-in versions. The Alternatives icon displays the extended attributes defined for the enclosing subsystem.
To Value
The value to be assigned to the specified extended attribute in the checked-in versions. For list attributes, values are appended. The Alternatives icon displays possible values for enumeration attributes.
Associate Tasks Field (Rational Summit/TM)
Specifies the tasks to associate with the checked in objects. It is initialized with the current task list. The Navigate icon can be used to select a different set of tasks by activating the Select Tasks dialog. The Alternatives icon displays tasks in your "to do" task list.
Notes Field
You can use the Notes field to attach notes to the current version of the file. You can view notes by selecting the Control > Show > Notes (Apex/Summit) command.
Shadowing Fields
These fields have been provided to give better control over shadowing when using DHCP. Most users will want the default settings for these fields. The following explanation is useful for advanced users of shadowing.
When using DHCP, the IP address for the NT machine is assigned dynamically and may be different from the one assigned when shadowing was set up. The IP address of the NT machine which contains the view being shadowed is stored on the CM repository. This address is used by the CM server to communicate with the NT machine. The Current IP Address field shows the current IP address of the current NT machine. If the corresponding check box is checked, the IP address stored on the CM repository is replaced by the new value shown in this field. This enables the CM server to correctly communicate with your NT machine even when the IP address of your NT machine has changed. If this box is not checked, the CM server will attempt to talk to the old IP address.
IP addresses on the CM server may be stored directly in the Policy/Shadow_Location file of the view or may be specified in a common file that is included in the Policy/Shadow_Location file. If the update include file radio button is selected, any included files are updated otherwise the change in the IP address is made only in the Policy/Shadow_Location file.
Command Line Interface > check_in
Additional Topics
Rational Software Corporation http://www.rational.com support@rational.com techpubs@rational.com Copyright © 1993-2001, Rational Software Corporation. All rights reserved. |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |