Contents:
Trinventum (Transaction and Inventory Unified Manager) is a software that helps manage an e-commerce business.
Trinventum allows to:
What Trinventum is NOT:
Trinventum is meant to be a place where you keep records of what products you have, in what quantities, in what statuses, who is buying and selling them and the transactions between the sellers and buyers.
Documentation is also available on the Trinventum wiki.
Screenshots are available on the SourceForge project page.
Current version is 1.0.
Download this at SourceForge.
postgres
(you can
do su - postgres
as root
to login to that account on Linux) and run:
pg_ctl start
root
and run:
systemctl start postgresqlXX (XX being the version)
root
and run:
service postgresql start
root
):
systemctl start httpd-prefork
service httpd start
postgres
and run:
createuser -P trinventumIt's advised for the user to be the owner of the database that will be created.
postgres
and run:
createdb -O trinventum trinventum(for the specified user to be the database owner)
postgres
and run:
createlang plpgsql trinventum(don't worry if it says that the language already exists).
postgres
or root
):
cp /var/lib/pgsql/data/pg_hba.conf /var/lib/pgsql/data/pg_hba.conf-backup echo local trinventum trinventum scram-sha-256 >> /var/lib/pgsql/data/pg_hba.conf echo host all all 127.0.0.1/32 scram-sha-256 >> /var/lib/pgsql/data/pg_hba.conf(Note the double "
>>
" - it's CRUCIAL to use double ">>
",
a single ">
" would OVERWRITE the target file).scram-sha-256
with md5
.host all all 127.0.0.1/32 scram-sha-256
should be added to pg_hba.conf, containing the correct IP address/etc/hosts.allow
file (tcpwrappers) may need to be adjustedpostgres
and run:
pg_ctl reload
root
and run:
systemctl restart postgresqlXX (XX being the version)
root
and run:
service postgresql restart
Copy the contents of the webapp
directory (including hidden files) to a
chosen location reachable by the web server and adjust the access modes accordingly so that the web server
can actually run the files.
Alternatively, if you have the make
program and some common Linux
utilities, you can run make install
, passing the prefix of the target
directory. Trinventum will be installed in $(PREFIX)/trinventum
. Examples:
make install PREFIX=/srv/www/html SERVERCONF=/etc/httpd/conf/webapps.d make install PREFIX=/var/www/html SERVERCONF=/etc/httpd/conf.d make install PREFIX=$HOME/public_html SERVERCONF=$HOME/tmp
The SERVERCONF
parameter specifies where to put the global web server
configuration file. Can be ignored and set to any directory for local installations.
To install the documentation, you can add a chosen directory as the DOCDIR
parameter to make install
. Documentation will be installed in
$(DOCDIR)/trinventum
. Examples:
make install PREFIX=/srv/www/html SERVERCONF=/etc/httpd/conf/webapps.d DOCDIR=/usr/share/doc make install PREFIX=/var/www/html DOCDIR=/usr/share/doc make install PREFIX=$HOME/public_html DOCDIR=$HOME/tools/doc
trinventum
created earlier).
To install Trinventum as a Docker container for testing, execute one of (as root
):
docker/docker.sh docker-compose -p trinventum -f docker/docker-compose.yaml up -d
in the Trinventum source code top directory (not the docker
subdirectory).
WARNING: The default configuration has no permanent storage for the database. In order to have a persistent, working setup, you must add permanent storage to the configuration files.
WARNING:
The default docker-compose.yaml
file has hardcoded simple passwords. If you
wish to use this file and have a secure setup, you must
change those passwords in the file.
Apart from the main database user (the database owner), you can have users with various privileges using the application:
To create the base roles, run the scripts/create_roles.pgsql
file on the
database as the database administration user (postgres
):
psql -U postgres -d trinventum -f scripts/create_roles.pgsql
Then, you can use the shell command createuser
to create new users
- login to the system as the database user postgres
and run:
createuser -P trin_mgr createuser -P trin_sell createuser -P trin_buy createuser -P trin_tx
and grant the selected role(s), found in the scripts/create_roles.pgsql
file, to the new user:
psql -U postgres -d trinventum -c 'grant trinventum_product_manager to trin_mgr' psql -U postgres -d trinventum -c 'grant trinventum_seller_manager to trin_sell' psql -U postgres -d trinventum -c 'grant trinventum_buyer_manager to trin_buy' psql -U postgres -d trinventum -c 'grant trinventum_transaction_manager to trin_tx'
Then, you can log in as the chosen user and have access to just the required functionalities.
Various versions of Trinventum have successfully been used with the following components in the following versions:
Other versions may also work.
Any defects or issues can be reported by e-mail or in the SourceForge project defect manager (in English).
Any improvement suggestions can be reported by e-mail or in the SourceForge project ticket manager (in English).
To report usage problems, include:
PostgreSQL 14.1
,Apache HTTP Server 2.4.52
,PHP 8.1.3
,Help in victory, play a game, send regards, or at least stop using some products
shred
,shred
(the filesystem itself is destroyed too)h2fasm
, h2gas
, h2nasm
),make4fasm
),symvers-nasm
, symvers-fasm
),ax_prog_nasm.m4
, ax_prog_nasm_opt.m4
,
ax_prog_fasm.m4
, ax_prog_fasm_opt.m4
,
ax_prog_yasm.m4
, ax_prog_yasm_opt.m4
,
ax_prog_tasm.m4
, ax_prog_tasm_opt.m4
,
ax_prog_masm.m4
, ax_prog_masm_opt.m4
,
ax_prog_hla.m4
, ax_prog_hla_opt.m4
),The always-up-to-date list of my SourceForge projects is on my profile page on SourceForge.
Last-Modified
HTTP header Contact me: bogdro AT users . sourceforge . net (English accepted, just say '[SOFT]' in the title).
bogdro
aliases
The public certificate for the e-mail:
crt format,
cer format,
pem format,
p7b format,
p7c format
Certificate's RIPEMD160 fingerprint: 99:4E:9C:0F:D9:1B:F8:D2:F2:AE:E5:18:9F:3B:5C:61:E6:6C:B4:A8
Certificate's SHA256 fingerprint: 26:22:FE:0F:D7:3A:DE:0A:60:4A:99:29:CB:66:3D:DF:10:45:8B:B6:EC:3E:04:31:DA:67:A5:6E:C4:70:30:B9
The public certificate for bogdro-soft
:
crt format,
cer format,
pem format,
p7b format,
p7c format
Certificate's RIPEMD160 fingerprint: 01:A7:57:30:52:EB:F6:58:70:AC:EF:DF:C9:74:50:B1:B3:40:BD:47
Certificate's SHA256 fingerprint: D2:B3:73:22:C0:10:DB:62:3F:DB:1D:FC:EC:44:5C:48:21:0C:C5:9B:E1:7D:E3:63:26:CB:3A:B5:94:45:8C:A5
The public certificate for bogdro-perl
:
crt format,
cer format,
pem format,
p7b format,
p7c format
Certificate's RIPEMD160 fingerprint: BF:66:A2:24:6C:87:55:53:90:2C:2B:A5:62:26:D8:11:93:AC:41:98
Certificate's SHA256 fingerprint: 45:C6:17:13:CD:19:FF:39:6C:8D:EC:02:86:5E:E5:90:B5:0B:B6:3F:86:68:E2:7F:60:B7:19:FF:7D:B4:0D:24
Issuer's certificate: der format
Issuer's certificate's RIPEMD160 fingerprint: D8:F4:50:F0:8F:79:25:CC:65:20:C9:8D:70:1F:63:14:22:B0:12:24
Issuer's certificate's SHA256 fingerprint: 5E:B4:48:78:F7:58:C6:94:D9:C8:04:B2:42:63:24:9F:5F:03:D0:22:E1:C6:55:18:3E:21:D8:4B:F0:7E:7F:11
The public GnuPG /
PGP keys:
Bogdro-sf e-mail, asc format,
key number 476249B50EE1F2E59C4005AF67FFC0790E2D6D3C
.
A verified version is available at PGP® Global Directory entry for bogdro-sf
Bogdro-soft, asc format,
key number 7E05C1468119E8C32B69F72E11B90C14CAE8F72A
.
A verified version is available at PGP® Global Directory entry for bogdro-soft
Bogdro-perl, asc format,
key number A17EBF519B8D55F43472997BFCDBA236678656EA
.
A verified version is available at PGP® Global Directory entry for bogdro-perl
PGP® and Pretty Good Privacy® are registered trademarks of Symantec Corporation in the United States and other countries.
The certificate of the timestamping server which confirms the signature time, can be found on freeTSA.org.
This page is hosted at SourceForge.net.
This page is written using valid
HTML 4.01
,
, for all browsers:
This page has a content security policy.
This page doesn't use GIF images and doesn't use JPG images.
This page is pure HTML and CSS.
The project icon was created using Inkscape™.
LINUX® is a registered trademark of Linus Torvalds.
Postgres® and PostgreSQL® and the Elephant Logo (Slonik) are all registered trademarks of the PostgreSQL Community Association of Canada.
Apache HTTP Server, Apache, and the Apache feather logo are trademarks of The Apache Software Foundation.
All other trademarks, logos and names on this page and all subpages are properties of their respective owners and are given here only as an example.