摘要:
A method to model a business object is disclosed. An analysis module analyzes elements of a business object. A modeling module models business object logic based on the elements of the business object. An implementation module implements the modeled business object logic. A repository stores the modeled business object logic. A business object runtime module executes the modeled business object logic.
摘要:
The present disclosure is directed to executing transformation rules. In some implementations, a method includes receiving a request to apply a predefined transformation rule to a portion of a service. In response to at least the request, the predefined transformation rule is identified from a plurality of predefined transformation rules included in a business model. Each of the plurality of predefined transformation rules are configured to update at least one service independent of generating code in a service layer. The predefined transformation rule is assigned to the portion of the service.
摘要:
The disclosure generally describes computer-implemented methods, software, and systems for using mock application data to validate applications. A particular application to be validated is identified, wherein the particular application is generated via a user interface for generating new applications, and wherein the particular application is consistent with a data model used during the generation of the particular application. A set of stored mock application data associated with the particular application is identified. At least a portion of the identified set of mock application data is incorporated into a runtime version of the particular application. The particular application is executed using the incorporated set of mock application data in a validation environment.
摘要:
In some example implementations, there is provided a method. The method may include receiving a message from a user interface, the message representing a request for an identity of an entity having information regarding a component of a system being developed; determining whether a cache includes the identity of the entity having the information regarding the component; accessing, from at least a repository, metadata including at least one of a version information for the component and an organization structure information, when the cache does not include the identity of the entity having the information regarding the component, and determining, based on the accessed metadata, the entity, when the cache does not include the identity of the entity having the information regarding the component. Related systems, methods, and articles of manufacture are also provided.
摘要:
The present disclosure involves systems, products, and methods for automatically testing and verifying business objects. One method includes operations for identifying a modified business object for testing and verification; retrieving a set of metadata associated with the identified modified business object, the set of metadata retrieved from a metadata repository and including at least one core service performed by the identified modified business object; identifying at least one verification procedure associated with at least one of the core services operable to be performed by the identified modified business object; executing each of the at least one identified verification procedures; and determining whether execution of at least one of the identified verification procedures failed.
摘要:
Read access logging is performed by tracing data accesses in all domains. The logged data is traced on metadata level with some additions identifying the exposed data records. All data relevant for read access logging is stored at first in a temporary log, which is later processed, structured, and archived.
摘要:
In one aspect, there is provided a method for value help and check. The method may include receiving an indication associated with a user interface element, the indication representing a value help request for the user interface element; sending a request for a value help to a value help business object configured to provide the value help to a user interface including the user interface element, the user interface element bound to a portion of the value help business object; and receiving, at the user interface comprising the user interface element, a response to the request, the response comprising the value help. Related systems, methods, and articles of manufacture are also disclosed.
摘要:
The disclosure generally describes computer-implemented methods, software, and systems for cloud-based single sign-on (SSO) capabilities. A computer-implemented method includes operations for identifying a first system for single sign-on capabilities, identifying a second system disparate from the first system for providing a single sign-on capability with the first system through a cloud-based SSO configuration manager, automatically accessing metadata associated with the sign-on information of the second system, the set of metadata identifying sign-on-related information for sharing at least one credential/certificate for logging in to the second system, using the metadata to obtain an authorization for a single sign-on between the first and second systems, receiving a request from the first system for authorization at the second system, and, in response to the request, providing the authorization and creating a cloud-based SSO system that includes the first and second systems.
摘要:
In accordance with aspects of the disclosure, a system and methods are provided for managing business objects in memory. The system and methods may be provided for defining a context of one or more input parameters of data used to determine one or more properties of one or more business objects, defining one or more rules associated with the one or more properties of each business object, and generating a metadata model for each business object based on the context of the one or more input parameters of each business object and the one or more rules associated with the one or more properties of each business object.
摘要:
Techniques for managing content of a virtual workspace include receiving a request from a remote client for client-configuration settings, the remote client associated with a particular user; identifying a set of client-specific attributes associated with the remote client; identifying a set of user-specific attributes associated with the particular user; determining client-configuration settings for the remote client based at least in part on the identified client-specific attributes and the identified user-specific attributes; and transmitting the determined client-configuration settings to the remote client.