Method, System and Computer Program for Automating Configuration of Software Applications
First Claim
1. A method for configuring a software application, comprising:
- running the software application on a data processing system;
invoking a plurality of operations of the software application, the execution of each operation requiring a configuration feature of the software application;
verifying an availability of the configuration feature for each operation;
logging an indication of each non-available configuration feature;
simulating the availability of each non-available configuration feature to enable the execution of the corresponding operation;
executing each operation; and
configuring the software application according to the logged non-available configuration features.
1 Assignment
0 Petitions
Accused Products
Abstract
A solution (300) is proposed for populating a policy file (320) in a Java environment automatically. For this purpose, there is provided a wrapper (325) for a security manager (315)—in charge of controlling any access to protected resources. A generic Java application (310) is run in a test environment. Whenever a specific operation must be executed on a secured resource, the Java application submits a corresponding permission request to the wrapper (A1). The wrapper forwards the permission request to the security manager (A2), which verifies whether the required permission is available in the policy file (A3-A4). The wrapper logs any denied permission (A5); in any case, the wrapper always grants the required permission to the Java application (A6-A7), so that its operation can continue without any problem. At the end of the running of the Java application, the logged missing permissions are added to the policy file (A8).
22 Citations
25 Claims
-
1. A method for configuring a software application, comprising:
-
running the software application on a data processing system; invoking a plurality of operations of the software application, the execution of each operation requiring a configuration feature of the software application; verifying an availability of the configuration feature for each operation; logging an indication of each non-available configuration feature; simulating the availability of each non-available configuration feature to enable the execution of the corresponding operation; executing each operation; and configuring the software application according to the logged non-available configuration features. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9-10. -10. (canceled)
-
11. A data processing system, comprising:
-
a processor; and a memory coupled to the processor, wherein the memory comprises instructions which, when executed by the processor, cause the processor to; run a software application on the data processing system; invoke a plurality of operations of the software application, the execution of each operation requiring a configuration feature of the software application; verify an availability of the configuration feature for each operation; log an indication of each non-available configuration feature; simulate the availability of each non-available configuration feature to enable the execution of the corresponding operation; execute each operation; and configure the software application according to the logged non-available configuration features. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product, in a computer readable medium having a computer readable program, wherein the computer readable program, when executed by a computing device, causes the computing device to:
-
run a software application on a data processing system; invoke a plurality of operations of the software application, the execution of each operation requiring a configuration feature of the software application; verify an availability of the configuration feature for each operation; log an indication of each non-available configuration feature; simulate the availability of each non-available configuration feature to enable the execution of the corresponding operation; execute each operation; and configure the software application according to the logged non-available configuration features. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification