摘要:
The present description refers to a technique for receiving a client instruction, performing an action in response to the client instruction, generating an instance of a progress information message by the business object calling a first method of an API and identifying the progress information message to be generated, determining if an error condition occurs during the performing the action, generating an instance of an error message, if the error condition occurs, by calling the first method of the API, sending the progress information message instance from a second software work process to the client application in response to a request for progress information received by the second software work process from the client application, and sending the error message instance, if generated, from the first software work process to the client application.
摘要:
Various embodiments of systems and methods to compare different versions of a development object based on a version comparison profile are described herein. Identities of the different versions of the development object are received. Further, a version comparison profile and a corresponding profile definition associated with the development object are received. Furthermore, the different versions of the development object are compared to determine one or more differences based upon the received version comparison profile and the corresponding profile definition. The determined one or more differences between the different versions of the development object are returned.
摘要:
In accordance with aspects of the disclosure, a system and methods are provided for managing development of business applications. The system and methods may be provided for defining security relevance for data types associated with business objects, defining security rules for the data types associated with the business objects, and defining validation and test fulfillment of the security rules by providing one or more security runtime modules for each security rule defined by the security rules handler to ensure validation and test fulfillment of each security rule.
摘要:
The present disclosure describes methods, systems, and computer program products for semantically analyzing modeled objects. One method includes identifying an object model created in a distributed development system for semantic analysis, where the distributed development system is associated with a software platform. The identified object model is then semantically analyzed based on a predetermined algorithm. A set of at least one pre-existing object models associated with the software platform is compared to the semantically analyzed object model, and a level of semantic overlap between the semantically analyzed object model and each of the set of at least one pre-existing object models is determined. In some instances, the predetermined algorithm may be selected based on and correspond to the object model type of the identified object model. The set of at least one pre-existing object models may comprise a subset of pre-existing object models available in a development system or associated with a software platform.
摘要:
A bulk service interface can be instantiated for each of at least one service provider providing a plurality of business objects using a stored definition of a plurality of metadata properties relating to generation of a user interface that incorporates content of a plurality of business objects. The bulk service interface can query the stored definition and access, in a bulk metadata access process, dynamic metadata required for instantiation of the plurality of business objects. If the stored definition has not previously been received, a default bulk services access process that queries an existing dynamic metadata access interface of each of the plurality of business objects can be initiated to retrieve the dynamic metadata from each of the plurality of business objects. An instance of the user interface can be generated using dynamic metadata accessed by the bulk service interface and/or the retrieved by the default bulk services access process.
摘要:
A computerized method for accessing business object data stored in a data buffer of a server computer includes providing an application program interface (API) having a function for specifying a set of paths through a business object stored as a data structure in a data buffer of a server computer. Each of the paths included in the set of paths specifies a plurality of nodes of the business object for accessing hosted data at the plurality of nodes. The method further includes receiving a set of parameters for the function of the API. The set of parameters specify the set of paths. The method further includes issuing the set of parameters to the server computer, retrieving hosted data from the plurality of nodes for each path in the set of paths; and transmitting to a client the hosted data retrieved from the plurality of nodes.
摘要:
A bulk service interface can be instantiated for each of at least one service provider providing a plurality of business objects using a stored definition of a plurality of metadata properties relating to generation of a user interface that incorporates content of a plurality of business objects. The bulk service interface can query the stored definition and access, in a bulk metadata access process, dynamic metadata required for instantiation of the plurality of business objects. If the stored definition has not previously been received, a default bulk services access process that queries an existing dynamic metadata access interface of each of the plurality of business objects can be initiated to retrieve the dynamic metadata from each of the plurality of business objects. An instance of the user interface can be generated using dynamic metadata accessed by the bulk service interface and/or the retrieved by the default bulk services access process.
摘要:
Various embodiments of systems and methods to determine semantic information of a plurality of business applications are described herein. In one aspect, a selection of user interface elements of a first business application and a second business application of the plurality of business applications are received. Further, data processing paths to a business object field and a corresponding database table field associated with the user interface elements are identified. Furthermore, semantic information of the plurality of business applications is determined by grouping the identified data processing paths, which can be used for applications such as business application integration, business data migration and the like.
摘要:
In some example implementations, there is provided a method. The method may include receiving a message from a user interface, the message representing a request for an identity of an entity having information regarding a component of a system being developed; determining whether a cache includes the identity of the entity having the information regarding the component; accessing, from at least a repository, metadata including at least one of a version information for the component and an organization structure information, when the cache does not include the identity of the entity having the information regarding the component, and determining, based on the accessed metadata, the entity, when the cache does not include the identity of the entity having the information regarding the component. Related systems, methods, and articles of manufacture are also provided.
摘要:
The present disclosure involves systems, products, and methods for automatically testing and verifying business objects. One method includes operations for identifying a modified business object for testing and verification; retrieving a set of metadata associated with the identified modified business object, the set of metadata retrieved from a metadata repository and including at least one core service performed by the identified modified business object; identifying at least one verification procedure associated with at least one of the core services operable to be performed by the identified modified business object; executing each of the at least one identified verification procedures; and determining whether execution of at least one of the identified verification procedures failed.