Systems and methods for incremental software development
First Claim
1. A method, comprising:
- receiving, from a development environment, a modification of source code for a first library of a plurality of binary libraries;
identifying, by a processor, a second library of the plurality of libraries based on dependency metadata of the second library that indicates a dependency of the second library on the modified source code, the dependency metadata of the second library including a hash value to verify the identity of the second library, source code for the second library being inaccessible to the development environment;
determining, based on the identification of the second library, that the modified source code necessitates a modification to the second library;
in response to the determination, providing access to the source code for the second library to the development environment; and
causing the development environment to present the source code for the second library.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for facilitating incremental software development are disclosed. For example, a method can include receiving a plurality of binary software libraries sufficient for building a software project. A request from a user to modify source code for at least one of the plurality of binary libraries is received. In response to receiving the request, the source code for the at least one of the plurality of binary libraries is retrieved. The source code for the at least one of the plurality of binary libraries is presented to the user. Modified source code for the at least one of the plurality of binary libraries is received. The modified source code is compiled to produce compiled modified code. A revised version of the software project is built using the compiled modified code and the plurality of binary libraries.
39 Citations
18 Claims
-
1. A method, comprising:
-
receiving, from a development environment, a modification of source code for a first library of a plurality of binary libraries; identifying, by a processor, a second library of the plurality of libraries based on dependency metadata of the second library that indicates a dependency of the second library on the modified source code, the dependency metadata of the second library including a hash value to verify the identity of the second library, source code for the second library being inaccessible to the development environment; determining, based on the identification of the second library, that the modified source code necessitates a modification to the second library; in response to the determination, providing access to the source code for the second library to the development environment; and causing the development environment to present the source code for the second library. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising at least one processor and a plurality of modules providing instructions to be executed by the at least one processor, the modules comprising:
a development environment to; identify a modification of source code for a first library of a plurality of binary libraries, the modification made in a development environment; identify a second library of the plurality of libraries based on dependency metadata of the second library that indicates a dependency of the second library on the modified source code, the dependency metadata of the second library including a hash value to verify the identity of the second library, source code for the second library being inaccessible to the development environment; determine, based on the identification of the second library by the at least one processor, that the modified source code necessitates a modification to the second library; in response to the determination, providing access to the source code for the second library to the development environment; and cause the development environment to present the source code for the second library. - View Dependent Claims (9, 10, 11, 12, 13)
-
14. A non-transitory machine-readable storage medium having instructions encoded thereon which, when executed by at least one processor, cause the at least one processor to perform operations comprising:
-
detecting, in a development environment, a modification of source code for a first library of a set of binary libraries; identifying a second library of the plurality of libraries based on dependency metadata of the second library that indicates a dependency of the second library on the modified source code, the dependency metadata of the second library including a hash value to verify the identity of the second library, source code for the second library being inaccessible to the development environment; determining, based on the identification of the second library, that the modified source code necessitates a modification to the second library; in response to the determination, providing access to the source code for the second library to the development environment; and causing the development environment to present the source code for the second library. - View Dependent Claims (15, 16, 17, 18)
-
Specification