摘要:
A mechanism is provided for deciding whether to install a first application within one of a plurality of candidate environments. An environment comprising one or more other applications. The first application and a candidate environment are analysed to determine whether there is the potential for the first application to interact in an unintended manner with an application in the candidate environment. If there is no such potential, then the environment is identified as a suitable environment into which to install the first application. An unintended interaction is when a rule would be broken by an interaction between the first application and an application in the candidate environment.
摘要:
A mechanism is provided for deciding whether to install a first application within one of a plurality of candidate environments. An environment comprising one or more other applications. The first application and a candidate environment are analyzed to determine whether there is the potential for the first application to interact in an unintended manner with an application in the candidate environment. If there is no such potential, then the environment is identified as a suitable environment into which to install the first application. An unintended interaction is when a rule would be broken by an interaction between the first application and an application in the candidate environment.
摘要:
A method, apparatus and computer program are disclosed for modifying an application comprising a plurality of modules. A user is presented with a list of modules. The user is able to specify input regarding any permitted version modifications for the modules listed. It is then determined whether the requested modifications are possible with one or more failure messages being output when any of the requested modifications are not possible. At least one of the failure messages is used to enable modification of the initial input provided by the user. In one embodiment, information is provided to the user based on one or more failure messages in order to enable the user to modify their choices. In another embodiment, the initial input is automatically modified. A permitted version modification may be, for example, a version upgrade, a version downgrade, and an indication that there is no preference.
摘要:
A method, apparatus and computer program are disclosed for modifying an application comprising a plurality of modules. A user is presented with a list of modules. The user is able to specify input regarding any permitted version modifications for the modules listed. It is then determined whether the requested modifications are possible with one or more failure messages being output when any of the requested modifications are not possible. At least one of the failure messages is used to enable modification of the initial input provided by the user. In one embodiment, information is provided to the user based on one or more failure messages in order to enable the user to modify their choices. In another embodiment, the initial input is automatically modified. A permitted version modification may be, for example, a version upgrade, a version downgrade, and an indication that there is no preference.
摘要:
A method, apparatus and computer program are disclosed for modifying an application comprising a plurality of modules. A user is presented with a list of modules. The user is able to specify input regarding any permitted version modifications for the modules listed. It is then determined whether the requested modifications are possible with one or more failure messages being output when any of the requested modifications are not possible. At least one of the failure messages is used to enable modification of the initial input provided by the user. In one embodiment, information is provided to the user based on one or more failure messages in order to enable the user to modify their choices. In another embodiment, the initial input is automatically modified. A permitted version modification may be, for example, a version upgrade, a version downgrade, and an indication that there is no preference.
摘要:
A method, apparatus and computer program are disclosed for modifying an application comprising a plurality of modules. A user is presented with a list of modules. The user is able to specify input regarding any permitted version modifications for the modules listed. It is then determined whether the requested modifications are possible with one or more failure messages being output when any of the requested modifications are not possible. At least one of the failure messages is used to enable modification of the initial input provided by the user. In one embodiment, information is provided to the user based on one or more failure messages in order to enable the user to modify their choices. In another embodiment, the initial input is automatically modified. A permitted version modification may be, for example, a version upgrade, a version downgrade, and an indication that there is no preference.
摘要:
A method, computer apparatus and computer program product for bytecode weaving is described herein. The method includes determining when a code module such as an OSGi bundle that requires bytecode weaving becomes available for loading into a system. Code associated with the code module is loaded. This code may be part of the module itself or part of a separate entity, such as an OSGI bundle fragment, but does not require weaving. Responsive to loading the code associated with the code module, a reference is received to the entity responsible for loading the code associated with the code module. A code entity (which does require weaving) within the code module is identified and a woven set of bytes are provided to the code loading entity identified via the returned reference. Consequently, the woven set of bytes represents a transformed version of the identified code entity.
摘要:
A first request for a bundle resource can be sent to a first location. A first response can be received that identifies a second location. The first response can be analyzed to identify the second location. A second request and a third request can be created for a metadata resource and for an artifact resource. The second request can be sent to the second location. The third request can be sent to a third location. A second response and a third response can be received. The second response can comprise the metadata resource. The third response can comprise the artifact resource. The second response can be evaluated to determine the metadata resource. The third response can be evaluated to determine the artifact resource. The bundle resource can be created.
摘要:
A method, computer apparatus and computer program product for bytecode weaving is described herein. The method includes determining when a code module such as an OSGi bundle that requires bytecode weaving becomes available for loading into a system. Code associated with the code module is loaded. This code may be part of the module itself or part of a separate entity, such as an OSGI bundle fragment, but does not require weaving. Responsive to loading the code associated with the code module, a reference is received to the entity responsible for loading the code associated with the code module. A code entity (which does require weaving) within the code module is identified and a woven set of bytes are provided to the code loading entity identified via the returned reference. Consequently, the woven set of bytes represents a transformed version of the identified code entity.