Automating configuration of software applications
First Claim
1. A method for configuring a software application, comprising:
- running the software application on a data processing system;
invoking a plurality of operations of the software application, the execution of each operation requiring a configuration feature of the software application;
verifying, for each operation in the plurality of operations, an availability or a non-availability of a configuration feature required by the operation based on a data structure storing identifiers of available configuration features required by operations in the plurality of operations;
logging an indication of each non-available configuration feature required by each operation to thereby generate logged non-available configuration features;
simulating, for each operation, availability of each non-available configuration feature to enable execution of the operation;
executing each operation based on the simulation of availability of each non-available configuration feature; and
configuring the software application according to the logged non-available configuration features by updating the data structure to include the logged non-available configuration features as available configuration features required by operations in the plurality of operations.
1 Assignment
0 Petitions
Accused Products
Abstract
A solution is proposed for populating a policy file in a Java environment automatically. For this purpose, there is provided a wrapper for a security manager in charge of controlling any access to protected resources. A generic Java application is run in a test environment. Whenever a specific operation must be executed on a secured resource, the Java application submits a corresponding permission request to the wrapper. The wrapper forwards the permission request to the security manager, which verifies whether the required permission is available in the policy file. The wrapper logs any denied permission. In any case, the wrapper always grants the required permission to the Java application, so that its operation can continue without any problem. At the end of the running of the Java application, the logged missing permissions are added to the policy file.
124 Citations
23 Claims
-
1. A method for configuring a software application, comprising:
-
running the software application on a data processing system; invoking a plurality of operations of the software application, the execution of each operation requiring a configuration feature of the software application; verifying, for each operation in the plurality of operations, an availability or a non-availability of a configuration feature required by the operation based on a data structure storing identifiers of available configuration features required by operations in the plurality of operations; logging an indication of each non-available configuration feature required by each operation to thereby generate logged non-available configuration features; simulating, for each operation, availability of each non-available configuration feature to enable execution of the operation; executing each operation based on the simulation of availability of each non-available configuration feature; and configuring the software application according to the logged non-available configuration features by updating the data structure to include the logged non-available configuration features as available configuration features required by operations in the plurality of operations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A data processing system, comprising:
-
a processor; and a memory coupled to the processor, wherein the memory comprises instructions which, when executed by the processor, cause the processor to; run a software application on the data processing system; invoke a plurality of operations of the software application, the execution of each operation requiring a configuration feature of the software application; verify, for each operation in the plurality of operations, an availability or a non-availability of a configuration feature required by the operation based on a data structure storing identifiers of available configuration features required by operations in the plurality of operations; log an indication of each non-available configuration feature required by each operation to thereby generate logged non-available configuration features; simulate, for each operation, availability of each non-available configuration feature to enable execution of the operation; execute each operation based on the simulation of availability of each non-available configuration feature; and configure the software application according to the logged non-available configuration features by updating the data structure to include the logged non-available configuration features as available configuration features required by operations in the plurality of operations. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product, in a computer readable storage medium having a computer readable program stored thereon, wherein the computer readable program, when executed by a computing device, causes the computing device to:
-
run a software application on a data processing system; invoke a plurality of operations of the software application, the execution of each operation requiring a configuration feature of the software application; verify, for each operation in the plurality of operations, an availability or a non-availability of a configuration feature required by the operation based on a data structure storing identifiers of available configuration features required by operations in the plurality of operations; log an indication of each non-available configuration feature required by each operation to thereby generate logged non-available configuration features; simulate, for each operation, availability of each non-available configuration feature to enable execution of the operation; execute each operation based on the simulation of availability of each non-available configuration feature; and configure the software application according to the logged non-available configuration features by updating the data structure to include the logged non-available configuration features as available configuration features required by operations in the plurality of operations. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification