Composing a module system and a non-module system

ABSTRACT

A bridge module is generated to bridge standard modules in a module system and non-module code in a non-module system. The bridge module includes explicit dependencies associated with a namespace, such as a dependency path corresponding to the non-module code. The bridge module exposes packages of the non-module code at least to the standard modules. Operations are performed on a code base that uses standard modules, bridge modules, and non-module code.

PRIORITY CLAIM; INCORPORATION BY REFERENCE

This application is a continuation application of U.S. Non-Provisionalpatent application Ser. No. 14/808,590, filed Jul. 24, 2015, now U.S.Pat. No. 9,626,171, issued Apr. 18, 2017, which is hereby incorporatedby reference.

The Applicant hereby rescinds any disclaimer of claim scope in theparent application(s) or the prosecution history thereof and advises theUSPTO that the claims in this application may be broader than any claimin the parent application(s).

TECHNICAL FIELD

The present disclosure relates to module systems and non-module systems.In particular, the present disclosure relates to techniques forcomposing a module system and a non-module system.

BACKGROUND

Computing platforms for developing and maintaining software generallyrely on one of two kinds of systems: non-module systems and modulesystems.

A non-module system refers to a system in which dependencies betweendifferent pieces of code are not strictly declared or restricted. Anindustry-defined term “JAR hell” refers to example uses of Java Archive(JAR) files in a non-module system which result in problems, forexample, with the class loading process.

A module system includes a collection of standard modules and defineshow the collection of standard modules work together. Each particularstandard module in the collection of standard modules may explicitlydefine dependencies on other standard modules (or the contents thereof).However, standard modules are typically restricted from explicitlydepending on any non-module code.

FIG. 1A illustrates a system 100 with components of a module environment102 and components of a non-module environment 130. The non-moduleenvironment 130 includes non-module code 132-146. Dependencies betweendifferent non-module code are not required to be explicitly declared.Accordingly, when a first non-module code depends on a second non-modulecode, the software development environment must search for the secondnon-module code in all files of a set of files associated with all ofthe code. The dependencies between different non-module code (which maynot be explicitly declared) are illustrated in FIG. 1A using arrows. Forexample, the dependency of non-module code 132 on non-module code 140 isillustrated using an arrow beginning at non-module code 132 and endingat non-module code 140. Furthermore, a dependency of non-module code 140on non-module code 142 and non-module code 144 is illustrated using twoarrow beginning at non-module code 140 and ending at non-module code 142and non-module code 144, respectively.

The module environment 102 includes a set of standard modules (e.g.,standard modules 104-112). Dependencies between different standardmodules in a module environment, such as module environment 102, areexplicitly declared by the modules. An explicitly declared dependencymay be referred to herein as an “explicit dependency.” The explicitdependencies between different standard modules (or contents thereof) inmodule environment 102 are also illustrated using arrows. For example,the explicit dependency of standard module 104 on standard module 108 isillustrated using an arrow starting at standard module 104 and ending atstandard module 108. Further, the explicit dependency of standard module108 on standard module 110 is illustrated using an arrow starting atstandard module 108 and ending at standard module 110.

As illustrated in FIG. 1A, there is a partition between moduleenvironment 102 and non-module environment 130. Specifically, standardmodules cannot explicitly depend on non-module code. For example,standard module 110 cannot explicitly depend on either non-module code132 or on non-module code 134. As a result, module environmentscomprising standard modules cannot be built on top of non-moduleenvironments comprising non-module code. The approaches described inthis section are approaches that could be pursued, but not necessarilyapproaches that have been previously conceived or pursued. Therefore,unless otherwise indicated, it should not be assumed that any of theapproaches described in this section qualify as prior art merely byvirtue of their inclusion in this section.

BRIEF DESCRIPTION OF THE DRAWINGS

The embodiments are illustrated by way of example and not by way oflimitation in the figures of the accompanying drawings. It should benoted that references to “an” or “one” embodiment in this disclosure arenot necessarily to the same embodiment, and they mean at least one. Inthe drawings:

FIG. 1A illustrates standard modules in a module environment andnon-module code in a non-module environment;

FIGS. 1B and 1C illustrate systems in accordance with one or moreembodiments;

FIG. 2 illustrates a set of operations for generating a bridge module inaccordance with one or more embodiments; and

FIGS. 3A-3D illustrate a detailed example in accordance with one or moreembodiments.

FIG. 4 illustrates a system in accordance with one or more embodiments.

DETAILED DESCRIPTION

In the following description, for the purposes of explanation, numerousspecific details are set forth in order to provide a thoroughunderstanding. One or more embodiments may be practiced without thesespecific details. Features described in one embodiment may be combinedwith features described in a different embodiment. In some examples,well-known structures and devices are described with reference to ablock diagram form in order to avoid unnecessarily obscuring the presentinvention.

-   -   1. GENERAL OVERVIEW    -   2. ARCHITECTURAL OVERVIEW    -   3. DEVELOPMENT ENVIRONMENT EXAMPLE    -   4. GENERATING A BRIDGE MODULE FOR BRIDGING A MODULE ENVIRONMENT        AND A NON-MODULE ENVIRONMENT    -   5. EXAMPLE EMBODIMENTS    -   6. MISCELLANEOUS; EXTENSIONS    -   7. HARDWARE OVERVIEW

1. General Overview

In an embodiment, a bridge module is generated to bridge standardmodules in a module environment and non-module code in a non-moduleenvironment. Standard modules from the module environment may dependexplicitly on the bridge modules, but may not depend explicitly on thenon-module code. Bridge modules may depend on the non-module code. Forexample, bridge modules may explicitly reference a namespace thatcorresponds to non-module code. For example, bridge modules mayexplicitly depend on a dependency path that corresponds to non-modulecode. Bridge modules may also depend on other bridge modules, andstandard modules.

In an embodiment, generating bridge modules includes modularizingnon-module code in the non-module environment. Modularization ofnon-module code may be performed in response to one or more triggeringevents. Furthermore, modularization requirements may be used fordetermining whether non-module code may be modularized.

Modularizing non-module code does not necessarily include anymodifications to the non-module code itself. Modularizing non-modulecode includes generating a description for the non-module code for useby other modules. For example, modularizing non-module code includesidentifying and exposing packages of the non-module code to a modulesystem via a module descriptor. The packages are exposed by a bridgemodule to other bridge modules, standard modules, and other non-modulecode. The dependencies of a bridge module are explicitly noted in amodule descriptor but, in at least one embodiment, are not exposed toother components. Modularizing code may further include identifyingdependency paths of the non-module code and including the dependencypaths in a module descriptor of the corresponding bridge module.

In an embodiment, operations are performed on a non-compiled or compiledcode base corresponding at least to a combined set of standard modules,bridge modules, and non-module code. For example, the code base may becomplied, validated, or executed by a system.

One or more embodiments described in this Specification and/or recitedin the claims may not be included in this General Overview section.

2. Architectural Overview

FIGS. 1B and 1C illustrate examples of systems in accordance with one ormore embodiments. Other embodiments may include more or fewer devicesand more or fewer components than illustrated in the systems and/ordescribed below. Hardware components, software components, and/orfunctionality described as corresponding to one device may insteadcorrespond to another device. Components illustrated separately may becombined into a single component or implemented on a single device.Accordingly, the scope of the claims should not be construed as beinglimited by the specific examples herein.

System 101 illustrates components associated with one or both of amodule environment 102 and a non-module environment 130. Componentswithin system 101 may depend on other components within system 101(dependency restrictions described in detail below). In an example, if afirst component needs a package or service provided by a secondcomponent, the first component depends on the second component.

A dependency between components may or may not be explicitly noted. Anexplicit dependency for a particular component, as referred to herein,includes a declaration of other components and/or a namespace. Anamespace maps names of resources (e.g., Java classes) to resourcedefinitions (e.g., class definitions). In one example, a namespace isimplemented as a dependency path. A dependency path may include, asparameters, an ordered set of entities. Each entity may contain andtransparently expose a set of named resource definitions (e.g., Javaclass definitions). In another example, a namespace is implemented as aclass loader. A class loader is an entity, containing and transparentlyexposing a set of named resources definitions (e.g., Java classdefinitions). Embodiments and examples herein, which refer to adependency path may be equally applicable to any other namespace, e.g.,a class loader.

In an embodiment, a dependency path identifies non-module code that maybe, but is not necessarily, depended upon. The dependency path may bestored as an environment variable in a software development environmentor stored within a file (e.g., a manifest file).

In an embodiment, the dependency path corresponds to a namespace. Anamespace may include a set of identifiers corresponding to respectivesets of non-module code. The set of identifiers may be ordered accordingto a policy. In an example, the namespace identifies a set of JavaArchive (JAR) files.

In the Java Module System, a keyword “requires” is used to declareexplicit dependencies. The keyword “requires” may be used with aparameter identifying another component or identifying a dependency path(e.g., CLASSPATH). An explicit dependency on a dependency path allowsfor depending on the parameters associated with the dependency path. Inan example, a first component depends on a second component, eitherdirectly or via a dependency path. To illustrate a first componentdepending on a second component in FIG. 1B, an arrow is drawn from thefirst component to the second component. The arrowhead points to thesecond component which is being depended upon, directly or via adependency path, by the first component.

In an illustrated example, the module environment 102 includes a set ofstandard modules (e.g., standard modules 104-112) which collectivelydefine how the set of standard modules work together, including but notlimited to any dependencies thereof. A standard module, as referred toherein, includes any module with a restriction that prohibits explicitdependency on any non-module code (e.g., non-module code 140-146) eitherdirectly or via a dependency path. A standard module may include anexplicit dependency on other standard modules and/or on bridge modules.Furthermore, a standard module may indirectly depend on non-module code(e.g., via bridge modules as described herein).

In an embodiment, bridge modules may serve as a bridge between standardmodules and non-module code. Specifically, bridge modules refer tomodules that may (a) be depended upon by standard modules and (b) dependupon non-module code. Bridge modules may depend upon non-module code viaan explicit dependency on a dependency path that corresponds to thenon-module code. In addition to the functionality to depend onnon-module code, bridge modules may depend on other bridge modulesand/or on standard modules. Bridge modules expose one or more packagesof non-module code to standard modules, other bridge modules, and othernon-module code via modularization as described below w/reference toFIG. 2.

In the illustrated example, standard module 108 explicitly depends onstandard module 110. Standard module 110 explicitly depends on bridgemodule 122 and bridge module 124. Bridge module 122 explicitly dependson a dependency path corresponding to non-module code 140. Furthermore,bridge module 122 explicitly depends on bridge module 124. Bridge module124 explicitly depends on a dependency path corresponding to non-modulecode 146. Furthermore, bridge module 124 explicitly depends on standardmodule 112.

In at least one embodiment, use of bridge modules, with characteristicsand functionality as described herein, may be restricted. In oneexample, generation of a bridge module may be restricted to a system orsoftware development environment. Developers that define standardmodules may be prohibited from defining module descriptors for bridgemodules.

In an embodiment, a system modularizes non-module code to obtainmodularized code (e.g., modularized code 133 and modularized code 135).Modularizing non-module code to obtain modularized code does notnecessarily require any modification of the non-module code itself.Modularizing non-module code to obtain modularized code includesgenerating data based on the contents of the non-module code. The dataassociated with the modularized code is indicated in a module descriptornaming a bridge module associated with the modularized code. The moduledescriptor is used for exposing (for example, by exporting) the packagesof the modularized code for access by other modules or non-module code.Furthermore, the module descriptor of a bridge module may include anexplicit dependency on a dependency path corresponding to non-modulecode without exposing the non-module code. Alternatively, the moduledescriptor may expose non-module code. A detailed example set ofoperations for modularization of non-module code is described below withreference to FIG. 2.

Referring again to the illustrated example, FIG. 1B includes system 101which is the result of modularizing non-module code 132 and non-modulecode 134 identified in FIG. 1A. Prior to the modularizing of non-modulecode 132 and non-module code 134, no standard modules in any moduleenvironment, such as module environment 102, could gain direct orindirect access to the functionality of non-module code 132-146.Specifically, standard modules 104-112 cannot depend explicitly on anyof non-module code 132-146. In this example, non-module code 132 andnon-module code 134, as illustrated in FIG. 1A, were modularized toobtain modularized code 133 and modularized code 135, respectively, asillustrated in FIG. 1B.

Modularization of non-module code 132 and non-module code 134 did notnecessarily require any modification of non-module code 132 andnon-module code 134, respectively. The modularization of non-module code132 to obtain modularized code 133 includes identification of thepackages in non-module code 132. The modularization of non-module code132 further includes identification of the dependencies of non-modulecode 132 (e.g., on a dependency path and/or on other non-modules).Bridge module 122 exposes the packages of modularized code 133(previously referred to as non-module code 132) to standard modules,other bridge modules, and other non-module code. As an example, bridgemodule 122 allows standard module 110 to access the packages ofmodularized code 133. However, bridge module 122 does not necessarilyexpose the explicit dependencies of modularized code 133 to othermodules. For example, while the module descriptor for bridge module 122includes an explicit dependency on a dependency path corresponding tonon-module code 140, the bridge module 122 does not expose non-modulecode 140 to any other module. Accordingly, standard module 110, whichcan access the packages of modularized code 133, cannot explicitlydepend on the non-module code 140. Alternative implementations mayinclude a bridge module exposing non-module code to other modules. In avariation of the above example, bridge module 122 exposes non-modulecode 140 to standard module 110. The bridge module may use “requirespublic” keywords to depend on and expose non-module code 140 to standardmodule 110.

In an example, a bridge module is used for exposing non-module code tostandard modules. Specifically, the bridge module exposes the non-modulecode, being modularized, to standard modules. Furthermore, the bridgemodule may expose all or a subset of other non-module code upon whichthe modularized code depends.

In an embodiment, non-module code can depend on packages exposed bybridge modules or by standard modules. In an example, non-module code146 depends on packages exposed by standard module 112, for example, viaan “exports” command in the Java Module System. Furthermore, non-modulecode 146 may access the packages of modularized code 133 that areexposed by bridge module 122 (access is not illustrated in the exampleFIG. 1B).

In an embodiment, bridge modules may be implemented without any standardmodules. As illustrated, in FIG. 1C, system 102 includes bridge modules122 and 124. The system 102 further includes non-module code 140, 142,144, and 146. However, system 102 does not include any standard modules.A main method or main application which serves as an entry point forexecution may be implemented in the modularized code 133 or themodularized code 135. A system without standard modules (e.g., system102 illustrated in FIG. 1C) may be (a) a permanent configuration or (b)a temporary configuration until the system is modified to includestandard modules (e.g., system 101 illustrated in FIG. 1B).

3. Development Environment Example

Embodiments, described herein, are applicable to any developmentenvironment for developing, debugging, or updating software. Forpurposes of explanation, specific examples reference operationsperformed using the Java Development Kit (JDK). Development environmentsother than the JDK may share some functional constructs with the JDK butnot others, and most functional constructs of the JDK are not requiredto implement the embodiments claimed or described herein. Even if otherlanguages use different names to refer to the same or highly similarfunctional constructs, a person of ordinary skill would understand howthese same or highly similar functional constructs could be used inconjunction with the embodiments claimed or described herein, instead ofthe corresponding JDK constructs. Certain features of the JDK aredescribed below. However, one or more embodiments include additionalfeatures not described below and/or omit features described below.

A Java program manages two kinds of information: primitive data andobjects. Primitive data includes common, fundamental values such asnumbers and characters. An object usually represents something morespecialized or complex, such as a bank account. An object is defined bya class. A class contains methods that generally represent theoperations that can be performed on objects created from that class.

Related classes may be grouped into packages. On example of a package isthe java.sql package including classes for interacting with databases(SQL stands for Structured Query Language). Another example of a packageis the java.awt package including classes which provide support fordrawing graphics and creating GUIs (AWT stands for Abstract WindowingToolkit). A package may expose some classes (e.g., classes that areinvaluable to a developer) while hiding other classes that relate toimplementation details (e.g., classes that are unlikely to be referencedby a developer). A set of exposed classes is referred to as anApplication Programming Interface (API). For example, the java.awtpackage includes the Java Abstract Windowing Toolkit API. In anotherexample, the java.sql package includes the Java Database ConnectivityAPI.

A set of packages may be referred to as a class library. A class librarysupports the development and execution of programs. A compiler and aclass library are often packaged together; class libraries can also beobtained separately through third-party vendors.

In order to develop Java programs, a compiler is required for compilingJava source code into Java class files. Java source code may bepre-defined (e.g., in a class library) or defined by a developer. Adeveloper may generate Java source code using any tool including, butnot limited to, a text editor or a full-fledged Integrated DevelopmentEnvironment (IDE). A compiler compiles all Java source code, whetherpre-defined or developer-defined, into Java class files. The javaccompiler, included in the JDK, is one example of a compiler used forcompiling source code into Java class files.

Java class files (i.e., *.class files) contain bytecode representing theoriginal source code in an efficient, portable, and architecture-neutralformal. The bytecode is executed by an implementation of the JavaVirtual Machine (JVM). Hotspot, included in the JDK, is an example of aJVM implementation. The JVM implementation may execute the bytecode byan interpretation technique which includes executing one bytecode“statement” at a time. The JVM implementation may execute by thebytecode by a compilation technique which includes converting thebytecode to machine code at runtime. In the compilation technique, adifferent converter, for converting the bytecode to machine code, isneeded for each kind of processor on which the bytecode is to beexecuted.

Prior to executing a Java class file, the JVM implementation verifiesall of the bytecode within the Java class file. The verificationensures: (a) branches reference valid locations and (b) data isinitialized and references are type-safe. Steps (a) and (b) of theverification process may be performed when a class is loaded using aclass loader.

A class loader is an object responsible for first locating a binaryrepresentation of a class, and then passing the binary representation tothe JVM to create a class in memory. The process of location followed bycreation is known as “class loading”. Class loading may be triggered bythe JVM as it executes code in one class and resolves that code'sreferences to other classes. The JVM may trigger class loading forclasses as needed by a program instead of loading all classes intomemory at once. Class loading may also be triggered by a Java program,because a class loader is an ordinary object whose class(java.lang.ClassLoader or a subclass) exposes methods to locate andcreate classes.

A Java runtime is typically associated with three or more class loaders.One class loader is a “bootstrap” class loader (also referred to as a“primordial class loader”) for loading trusted classes. Another classloader is an “extension” class loader which delegates class loading tothe bootstrap class loader or loads from a specified directory. Theextension class loader will typically load “non-core” and/or lesstrusted classes. Another class loader is an “application” class loaderfor loading developer-defined classes. An application class loader loadsclasses from a namespace. The namespace may refer to a CLASSPATH.Various embodiments, described herein, refer to uses of the CLASSPATH.If a Java program creates its own class loader, it is conventional forthat class loader to “delegate” to the class loaders associated with theJava runtime before that class loader attempts to locate and createclasses.

4. Generating a Bridge Module for Bridging a Module Environment and aNon-Module Environment

FIG. 2 illustrates an example set of operations for generating a bridgemodule for bridging a module environment and a non-module environment inaccordance with one or more embodiments. The bridge module may begenerated for any non-module code in a set of non-module code regardlessof where the non-module code is located in a dependency path. In anexample, a first non-module code depends on a second non-module code viaa dependency path. Either one of the first non-module code and thesecond non-module code may be modularized before or without themodularization of the other one of the first non-module code and thesecond non-module code.

One or more operations illustrated in FIG. 2 may be modified,rearranged, or omitted all together. Accordingly, the particularsequence of operations illustrated in FIG. 2 should not be construed aslimiting the scope of one or more embodiments.

Initially, a triggering event is detected for modularizing non-modulecode (Operation 202). In an embodiment, a triggering event is a commandor operation that explicitly requests modularizing of the non-modulecode or implicitly requires modularizing of the non-module code.Modularization of the non-module code may be required if a commandrequires a modularized version of the non-module code. In an example, amodule-related command, using the keyword “MODULEPATH”, is to beexecuted. The module-related command may be a command to compile,validate, or execute a particular code base. When the command is beingexecuted, an identifier, foo-bar.jar corresponding to the non-modulecode is identified as a parameter associated with the keyword“MODULEPATH.” An analysis of foo-bar.jar indicates that there is nomodule descriptor identifying a module corresponding to foo-bar.jar. Asa result of lacking a module descriptor, foo-bar.jar is determined to benon-module code. However, MODULEPATH requires a modularized version offoo-bar.jar, i.e., foo-bar.jar with a module descriptor. SinceMODULEPATH requires a modularized version of foo-bar.jar, modularizingof foo-bar.jar is triggered.

In another example, a triggering event includes receiving an explicitcommand from a developer to modularize the first non-module code. Thecommand may be determined as a function of a developer moving or copyinga file within a system. The system is configured such that when anynon-module code is moved or copied (e.g., using a Graphical UserInterface or Command Line Interface) into a particular file ordirectory, the system triggers the modularization of that non-modulecode.

Subsequent to detecting a trigger for modularizing the non-module code,a determination is made as to whether the non-module code meets therequirements for modularization (Operation 204). If the non-module codedoes not meet the requirements for modularization, a determination ismade that the first non-module cannot be modularized (Operation 206).

Different systems may implement different requirements formodularization of non-module code into modularized code. Requirementsfor modularizing non-module code may include, for example, one or moreof:

-   -   (a) Non-module code to be modularized may not contain any        duplicate packages.    -   (b) Non-module code to be modularized may not depend on any of a        particular set of restricted module code (e.g., Java Development        Kit-Internal APIs)    -   (c) Non-module code to be modularized may not perform reflective        operations, such as, looking up classes or resources in other        modules

In one example, two different sets of non-module code, depended on by aparticular code base, are determined to expose the same package. Inresponse to determining that the two different sets of non-module codeexpose the same package, the two different sets of non-module code arenot modularized.

Once a determination is made to modularize non-module code, a bridgemodule is generated for the non-module code. The bridge module isgenerated at least by defining a module descriptor, for the non-modulecode, that names the bridge module (Operation 208). If the moduledescriptor is system-defined, any deterministic naming convention may beused for selecting a name for the bridge module. In one example, thename is a function of the file name corresponding to the non-module codebeing modularized.

Once a module descriptor has been defined for the non-module code, thenon-module code may be referred to as modularized code. Accordingly,modularizing of non-module code to obtain modularized code does notnecessarily include any modification to the non-module code itself.

A module descriptor, as referred to herein, includes declarationscorresponding to information about the modularized code. Thedeclarations relate to the use and/or functionality of the modularizedcode. Examples of various declarations are provided below which shouldnot be construed as limiting the scope of the claims in any way.

In one embodiment, the module descriptor declares explicit dependency ofthe corresponding bridge module to a dependency path (Operation 208 a).In a first example, the non-module code is associated with a dependencypath. Specifically, the non-module code depends on other non-module codeidentified in the dependency path. The module descriptor declaresexplicit dependency of the bridge module to the dependency path inresponse to determining that the non-module code is associated with thedependency path. In a second example, a dependency path declared by themodule descriptor is determined independent of the non-module code. Thedependency path may be a default and/or system-defined dependency pathused for bridge modules. In a third example, the dependency pathdeclared by the bridge module is based on a combination of dependenciesof the non-module code (first example above) and system-defineddependencies that are independent of the non-module code (second exampleabove). In a fourth example, the non-module code, being modularized,depends on two or more sets of non-module code. The module descriptorincludes an explicit dependency to and/or exposes a first non-modulecode of the two or more sets of non-module code. The module descriptordoes not include an explicit dependency to and/or does not expose asecond non-module code of the two or more sets of non-module code. Inanother example, the non-module code depends on other non-module code oranother module that is not officially supported by a particularplatform. The bridge modules do not expose the non-module code or othermodule that is not officially supported by a particular platform. Inanother example, the module descriptor includes an explicit dependencyon a dependency path that corresponds to at least one set of non-modulecode that is not used or required by the non-module code that is beingmodularized.

The module descriptor may explicitly depend on the dependency pathitself without necessarily referring to or identifying the parameters ofthe dependency path. The module descriptor may be defined without evenexamining or identifying the parameters of the dependency path. Thedependency path included in the module descriptor may refer to files(e.g., JAR files) that are neither used nor required by the non-modulecode being modularized.

The explicit dependencies, included in the module descriptor, may or maynot be exposed to other modules within the system. In an example relatedto the Java Module System, “requires #CLASSPATH” may be used to declaredependence to parameters identified in the CLASSPATH without exposingthe parameters to other modules. Alternatively, “requires public#CLASSPATH” may be used to declare dependence to parameters identifiedin the CLASSPATH and expose the parameters to other modules.

In another example, the dependencies of the non-module code may berecursively determined. The non-module code is analyzed to determine afirst hierarchical layer of code on which the non-module code depends(either directly or via a dependency path). The first hierarchical layerof code is then analyzed to determine a second hierarchical layer ofcode upon which the first hierarchical layer of code depends. Theprocess is recursively repeated until a base layer is reached which doesnot depend on any other layers. The set of recursively determineddependencies may then be included as explicit dependencies in the moduledescriptor.

In an embodiment, a check is performed to ensure that contents of adependency path are not modified between (a) an initial time when abridge module is created for non-module code including the dependencypath and (b) a later time (subsequent to the initial time) when thedependency path is accessed. Specifically, contents of a dependency pathmay be identified and stored when creating a bridge module. At a latertime, when the dependency path is accessed, the current contents arecompared to the stored content. Any changes to the contents of thedependency path may trigger an alert.

In one embodiment, the module descriptor declares an explicit dependencyof the bridge module to all other bridge modules (Operation 208 b). Inan example, a system maintains a listing of all bridge modules that havealready been created. When a new bridge module is being created bydefining a module descriptor for non-module code, the new bridge moduleexplicitly depends on each bridge module included in the listing ofbridge modules. The explicit dependencies on other bridge modules aredefined such that the other bridge modules are exposed to other modulesor non-module code. In an example of the Java Module System, “requirespublic” is used for explicitly depending on the other bridge modules andexposing the other bridge modules to other modules or non-module code.

In one example, all bridge modules are configured to explicitly dependon and expose all other bridge modules. When a standard moduleexplicitly depends on one of the bridge modules in this configuration,all bridge modules are exposed to the standard module. Specifically, allpackages exposed by all of the bridge modules are exposed to thestandard module.

In an embodiment, the module descriptor declares explicit dependenciesto every observable standard module, to every standard module thatallows for an explicit dependence and/or to every standard moduledetermined by the runtime environment as being necessary for theexecution of an application which consists of a standard module(Operation 208 c). In an example, a standard module exposes a packagethat may be depended upon by other standard modules, bridge modules,and/or non-module code. A module descriptor of the bridge module maydeclare an explicit dependency to the standard module that exposes thepackage. In another example, standard module M has an entry pointenabling a user to run standard module M as an application. Standardmodule M requires standard module N and non-module code B, a JAR file.Furthermore, standard module N requires standard module O. The JAR fileis included on the MODULEPATH and as a result, the runtime environmentgenerates a bridge module B from the JAR file. The bridge module B isset up to require standard modules M, N, and O. If an additionalstandard module, P, is observable, but is not required by any ofstandard modules M, N, or O, then the bridge module B is not set up torequire standard module P.

In an embodiment, the module descriptor declares packages being exposedby the bridge module (Operation 208 d). In an example, a systemtraverses the contents of the non-module code being modularized. Thetraversal identifies all available packages. The packages are then madeavailable for dependence by other components using a declarationidentifying the packages.

In an embodiment, the module descriptor declares an entry point forinitiating execution of an application (Operation 208 e). In an example,a set of files includes a particular file that is an entry point forinitiating execution of an application. The particular file may includea “main” method or other primary method that corresponds to a primaryset of operations within the sets of operations defined in the sets offiles.

In an embodiment, defining a module descriptor for non-module code, asdescribed above with reference to Operation 208, results in modularizedcode corresponding to a bridge module. The module descriptor of thebridge module describes the declarations associated with the modularizedcode.

In an embodiment, a combination of standard modules, bridge modules, andnon-module code form a code base. Using the code base involvesconcurrently using standard modules, bridge modules, and non-module code(Operation 210). In an example, the code base may be compiled,validated, and/or executed. The standard modules may produce resultsbased, in part, on operations performed using non-module code.

In an embodiment, the modularized code, corresponding to bridge modules,may be fully analyzed to determine the actual code external to themodularized code that is used and/or required by the modularized code.Determining the actual code may involve a recursive set of operations toidentify a full hierarchy of code based on code dependencies. Theexplicit dependency of the bridge module on a dependency path may bereplaced by explicit dependencies on only the actual code that is usedand/or required.

5. Example Embodiments

In an embodiment, operations include: identifying a first non-modulecode, wherein the first non-module code does not correspond to any of aplurality of modules; generating a first module for the first non-modulecode; and wherein the generating operation comprises: defining a moduledescriptor that (a) corresponds to the first module and (b) comprises anexplicit dependency based on a namespace corresponding to one or moresets of non-module code. The namespace may include a dependency pathcorresponding to the one or more sets of non-module code. The operationsmay further include: prior to generating the first module, determiningthat the first non-module code is associated with the namespace; andwherein defining the module descriptor to comprise the explicitdependency based on the namespace is responsive to determining that thefirst non-module code was associated with the namespace. The operationsmay further include: determining the explicit dependency, for includingin the module descriptor, independent of any content or dependency ofthe first non-module code. The explicit dependency, in the moduledescriptor, may explicitly refer to the namespace without explicitlyreferring to the one or more sets of non-module code corresponding tothe namespace. The explicit dependency, in the module descriptor, mayexplicitly refer to a second non-module code selected from the one ormore sets of non-module code corresponding to the namespace. The one ormore sets of non-module code corresponding to the namespace may includea second non-module code that is not used or required by the firstnon-module code, and wherein the namespace, in the module descriptor,allows the first module to access the second non-module code even thoughthe second non-module code is not used or required by the firstnon-module code. The first module as referred to above may be a bridgemodule as described herein. The module descriptor, corresponding to thefirst module, may be defined by a system in response to the systemdetecting occurrence of a triggering event. The operations may furtherinclude: receiving a command requiring modularization of the firstnon-module code; and wherein generating the first module for the firstnon-module code is responsive to receiving the command. The operationsmay further include: determining that the first non-module code does notcorrespond to any of the plurality of modules; and wherein generatingthe first module for the first non-module code is responsive at least todetermining that the first non-module code does not correspond to any ofthe plurality of modules. The operations may further include: receivinga command for executing a module operation, the command comprising thefirst non-module code as a parameter; and wherein generating the firstmodule for the first non-module code is responsive to receiving thecommand. The operations may further include: receiving a commandcomprising a MODULEPATH keyword that refers to an identifier for thefirst non-module code as a parameter; and wherein generating the firstmodule for the first non-module code is responsive to receiving thecommand. The plurality of modules may include (a) a first set ofstandard modules that are restricted from explicitly depending on thenamespace corresponding to the one or more sets of non-module code and(b) a second set of bridge modules that are not restricted fromexplicitly depending on the namespace corresponding to the one or moresets of non-module code. When the first module is a bridge module, theoperations may further include: subsequent to generating the bridge:successfully validating a particular standard module with an explicitdependency on the bridge module; and wherein the particular standardmodule is restricted from including the explicit dependency on thenamespace. The operations may further include: defining the moduledescriptor to include a particular explicit dependency based on one ormore of: each module in the plurality of modules that allows forexplicit dependency by the first module; each module in the plurality ofmodules that is necessary for execution of an application which consistsof a standard module; each observable standard module in the pluralityof modules; each standard module enumerated by a developer; and eachbridge module other than the first module. The operations may furtherinclude: defining the module descriptor to allow every package in thefirst non-module code to be accessed by any standard module, any bridgemodule, and any non-module code. Generating the first module for thefirst non-module code may be responsive at least to determining:determining that the first non-module code does not contain anyduplicate packages; determining that the first non-module code does notdepend on any of a set of restricted modules of the plurality ofmodules; and determining that the first non-module code does not look upclasses or resources in other modules of the plurality of modules.

In an embodiment, operations include: executing an operation on a codebase corresponding to a plurality of modules comprising: a first set ofmodules that are not restricted from including an explicit dependencybased on a namespace corresponding to one or more sets of non-modulecode; and a second set of modules that are restricted from including theexplicit dependency based on the namespace corresponding to the one ormore sets of non-module code; and wherein at least one of the second setof modules explicitly depends on at least one of the first set ofmodules. The first of modules may consist of one or more bridge modules.The second set of modules may consist of one or more standard modules.The namespace may include a dependency path. The namespace may include adependency path corresponding to the one or more sets of non-modulecode. A particular module, in the first set of modules may include amodule descriptor, wherein the module descriptor includes the explicitdependency based on the namespace corresponding to the one or more setsof non-module code.

FIGS. 3A-3D illustrate detailed examples for purposes of clarity.Components and/or operations described below should be understood asspecifics example which may not be applicable to certain embodiments.Accordingly, components and/or operations described below should not beconstrued as limiting the scope of any of the claims. Furthermore, theexample is not intended to present a complete set of information. Forexample, only a subset of the content associated with modules or moduledescriptors is described below.

In an embodiment, FIG. 3A illustrates a non-module system, components ofwhich are being migrated to a module system. Specifically, non-modulecode within the non-module system is being modularized to generatebridge modules.

Code description 304 describes characteristics of four files A.jar 320,B.jar 310, C.jar 330, and D.jar 340. A.jar includes class a.AA, B.jarincludes class b.BB, c.jar includes class c.CC, and D.jar includes classd.DD. Class a.AA creates instances of b.BB and c.CC, and accordingly,depends on b.BB and c.CC. Class c.CC extends d.DD, and accordingly,depends on d.DD. A software development environment searches for andloads classes as needed by the various files.

In an initial operational state T0, the environment variable CLASSPATH,identified as dependency path 350, includes A.jar; B.jar; C.jar; D.jar.When operations (e.g., compiling, validating, or executing) are beingexecuted, the software development environment finds all files using theCLASSPATH.

At time T1, the operational state is illustrated after modularization ofD.jar 340. The modularization of D.jar 340 is triggered by adding D.jar340 to the MODULEPATH as illustrated in listing 355. The modularizationof D.jar 340 results in defining a module descriptor that names bridgemodule D 342 based on the file name “D.jar.” The module descriptor forbridge module 342 also exports d.DD. The software developmentenvironment now finds d.DD, when needed for A.jar and C.jar, based onthe export by bridge module D 342. No modification is needed for A.jar320 and C.jar 330 for the software development environment to find d.DDvia the export function of bridge module D 342 rather than theCLASSPATH. D.jar 340 cannot be found using the CLASSPATH as D.jar 340has been removed from the CLASSPATH.

At time T2, the operational state is illustrated after modularization ofA.jar 320. The modularization of A.jar 320 is triggered by adding A.jar320 to the MODULEPATH as illustrated in listing 355. The modularizationof A.jar 320 results in defining a module descriptor that names bridgemodule A 322 based on the file name “A.jar” and further exports a.AA.The software development environment may find a.AA, if and when needed,based on the export by bridge module A 322. A.jar 320 cannot be foundusing the CLASSPATH as A.jar 320 has been removed from the CLASSPATH.

At time T3, the operational state is illustrated after the addition ofstandard module 360 and standard module 370. Standard module 360explicitly depends on bridge module A 322. The software developmentenvironment uses the “requires” declaration of standard module 360 andthe “exports” declaration of bridge module A 322 to identify A.jar 320when needed for standard module 360. Standard module 370 explicitlydepends on bridge module 342. The software development environment usesthe “requires” declaration of standard module 370 and the “exports”declaration of bridge module D 342 to identify D.jar 340 when needed forstandard module 370. The bridge modules (bridge module A 322 and bridgemodule D 342) expose non-module code (A.jar 320 and D.jar 340) to thestandard modules. Furthermore, the bridge modules allow the standardmodules to complete operations indirectly using the non-module code thatis not exposed to the standard modules. Specifically, bridge module A322 allows standard module 360 to access A.jar 320. A.jar 320 may useB.jar 310 and C.jar 330 to perform operations for obtaining resultswhich may be passed on to the standard modules 360 and 370.

6. Miscellaneous; Extensions

Embodiments are directed to a system with one or more devices thatinclude a hardware processor and that are configured to perform any ofthe operations described herein and/or recited in any of the claimsbelow.

In an embodiment, a non-transitory computer readable storage mediumcomprises instructions which, when executed by one or more hardwareprocessors, causes performance of any of the operations described hereinand/or recited in any of the claims.

In an embodiment, the operations include identifying a first non-modulecode, wherein the first non-module code does not correspond to any of aplurality of modules; generating a first module for the first non-modulecode; and wherein the generating operation comprises: defining a moduledescriptor that (a) corresponds to the first module and (b) comprises anexplicit dependency based on a namespace corresponding to one or moresets of non-module code. In an embodiment, the namespace comprises adependency path corresponding to the one or more sets of non-modulecode. In an embodiment, the operations further comprise: prior togenerating the first module, determining that the first non-module codeis associated with the namespace; and wherein defining the moduledescriptor to comprise the explicit dependency based on the namespace isresponsive to determining that the first non-module code was associatedwith the namespace. In an embodiment, the operations further comprise:determining the explicit dependency, for including in the moduledescriptor, independent of any content or dependency of the firstnon-module code. In an embodiment, the explicit dependency, in themodule descriptor, explicitly refers to the namespace without explicitlyreferring to the one or more sets of non-module code corresponding tothe namespace. In an embodiment, the explicit dependency, in the moduledescriptor, explicitly refers to a second non-module code selected fromthe one or more sets of non-module code corresponding to the namespace.In an embodiment, the one or more sets of non-module code correspondingto the namespace includes a second non-module code that is not used orrequired by the first non-module code, and wherein the namespace, in themodule descriptor, allows the first module to access the secondnon-module code even though the second non-module code is not used orrequired by the first non-module code. In an embodiment, the firstmodule is a bridge module. In an embodiment, the module descriptor,corresponding to the first module, is defined by a system in response tothe system detecting occurrence of a triggering event. In an embodiment,the operations further comprise: receiving a command requiringmodularization of the first non-module code; and wherein generating thefirst module for the first non-module code is responsive to receivingthe command. In an embodiment, the operations further comprise:determining that the first non-module code does not correspond to any ofthe plurality of modules; and wherein generating the first module forthe first non-module code is responsive at least to determining that thefirst non-module code does not correspond to any of the plurality ofmodules. In an embodiment, the operations further comprise: receiving acommand for executing a module operation, the command comprising thefirst non-module code as a parameter; and wherein generating the firstmodule for the first non-module code is responsive to receiving thecommand. In an embodiment, the operations further comprise: receiving acommand comprising a MODULEPATH keyword that refers to an identifier forthe first non-module code as a parameter; and wherein generating thefirst module for the first non-module code is responsive to receivingthe command. In an embodiment, the plurality of modules comprises (a) afirst set of standard modules that are restricted from explicitlydepending on the namespace corresponding to the one or more sets ofnon-module code and (b) a second set of bridge modules that are notrestricted from explicitly depending on the namespace corresponding tothe one or more sets of non-module code. In an embodiment, the firstmodule is a bridge module, and wherein the operations further comprise:subsequent to generating the bridge: successfully validating aparticular standard module with an explicit dependency on the bridgemodule; and wherein the particular standard module is restricted fromincluding the explicit dependency on the namespace. In an embodiment,the operations further comprise: defining the module descriptor toinclude a particular explicit dependency based on one or more of: eachmodule in the plurality of modules that allows for explicit dependencyby the first module; each module in the plurality of modules that isnecessary for execution of an application which consists of a standardmodule; each observable standard module in the plurality of modules;each standard module enumerated by a developer; and each bridge moduleother than the first module. In an embodiment, the operations furthercomprise: defining the module descriptor to allow every package in thefirst non-module code to be accessed by any standard module, any bridgemodule, and any non-module code. In an embodiment, generating the firstmodule for the first non-module code is responsive at least todetermining: determining that the first non-module code does not containany duplicate packages; determining that the first non-module code doesnot depend on any of a set of restricted modules of the plurality ofmodules; and determining that the first non-module code does not look upclasses or resources in other modules of the plurality of modules.

In an embodiment, the operations include executing an operation on acode base corresponding to a plurality of modules comprising: a firstset of modules that are not restricted from including an explicitdependency based on a namespace corresponding to one or more sets ofnon-module code; and a second set of modules that are restricted fromincluding the explicit dependency based on the namespace correspondingto the one or more sets of non-module code; and wherein at least one ofthe second set of modules explicitly depends on at least one of thefirst set of modules. In an embodiment, the first set of modulesconsists of one or more bridge modules. In an embodiment, the second setof modules consists of one or more standard modules. In an embodiment,the namespace comprises a dependency path. In an embodiment, thenamespace comprises a dependency path corresponding to the one or moresets of non-module code. In an embodiment, a particular module, in thefirst set of modules, comprises a module descriptor; wherein the moduledescriptor comprises the explicit dependency based on the namespacecorresponding to one or more sets of non-module code.

Any combination of the features and functionalities described herein maybe used in accordance with one or more embodiments. In the foregoingspecification, embodiments have been described with reference tonumerous specific details that may vary from implementation toimplementation. The specification and drawings are, accordingly, to beregarded in an illustrative rather than a restrictive sense. The soleand exclusive indicator of the scope of the invention, and what isintended by the applicants to be the scope of the invention, is theliteral and equivalent scope of the set of claims that issue from thisapplication, in the specific form in which such claims issue, includingany subsequent correction.

7. Hardware Overview

According to one embodiment, the techniques described herein areimplemented by one or more special-purpose computing devices. Thespecial-purpose computing devices may be hard-wired to perform thetechniques, or may include digital electronic devices such as one ormore application-specific integrated circuits (ASICs) or fieldprogrammable gate arrays (FPGAs) that are persistently programmed toperform the techniques, or may include one or more general purposehardware processors programmed to perform the techniques pursuant toprogram instructions in firmware, memory, other storage, or acombination. Such special-purpose computing devices may also combinecustom hard-wired logic, ASICs, or FPGAs with custom programming toaccomplish the techniques. The special-purpose computing devices may bedesktop computer systems, portable computer systems, handheld devices,networking devices or any other device that incorporates hard-wiredand/or program logic to implement the techniques.

For example, FIG. 4 is a block diagram that illustrates a computersystem 400 upon which an embodiment of the invention may be implemented.Computer system 400 includes a bus 402 or other communication mechanismfor communicating information, and a hardware processor 404 coupled withbus 402 for processing information. Hardware processor 404 may be, forexample, a general purpose microprocessor.

Computer system 400 also includes a main memory 406, such as a randomaccess memory (RAM) or other dynamic storage device, coupled to bus 402for storing information and instructions to be executed by processor404. Main memory 406 also may be used for storing temporary variables orother intermediate information during execution of instructions to beexecuted by processor 404. Such instructions, when stored innon-transitory storage media accessible to processor 404, rendercomputer system 400 into a special-purpose machine that is customized toperform the operations specified in the instructions.

Computer system 400 further includes a read only memory (ROM) 408 orother static storage device coupled to bus 402 for storing staticinformation and instructions for processor 404. A storage device 410,such as a magnetic disk or optical disk, is provided and coupled to bus402 for storing information and instructions.

Computer system 400 may be coupled via bus 402 to a display 412, such asa cathode ray tube (CRT), for displaying information to a computer user.An input device 414, including alphanumeric and other keys, is coupledto bus 402 for communicating information and command selections toprocessor 404. Another kind of user input device is cursor control 416,such as a mouse, a trackball, or cursor direction keys for communicatingdirection information and command selections to processor 404 and forcontrolling cursor movement on display 412. This input device typicallyhas two degrees of freedom in two axes, a first axis (e.g., x) and asecond axis (e.g., y), that allows the device to specify positions in aplane.

Computer system 400 may implement the techniques described herein usingcustomized hard-wired logic, one or more ASICs or FPGAs, firmware and/orprogram logic which in combination with the computer system causes orprograms computer system 400 to be a special-purpose machine. Accordingto one embodiment, the techniques herein are performed by computersystem 400 in response to processor 404 executing one or more sequencesof one or more instructions contained in main memory 406. Suchinstructions may be read into main memory 406 from another storagemedium, such as storage device 410. Execution of the sequences ofinstructions contained in main memory 406 causes processor 404 toperform the process steps described herein. In alternative embodiments,hard-wired circuitry may be used in place of or in combination withsoftware instructions.

The term “storage media” as used herein refers to any non-transitorymedia that store data and/or instructions that cause a machine tooperation in a specific fashion. Such storage media may comprisenon-volatile media and/or volatile media. Non-volatile media includes,for example, optical or magnetic disks, such as storage device 410.Volatile media includes dynamic memory, such as main memory 406. Commonforms of storage media include, for example, a floppy disk, a flexibledisk, hard disk, solid state drive, magnetic tape, or any other magneticdata storage medium, a CD-ROM, any other optical data storage medium,any physical medium with patterns of holes, a RAM, a PROM, and EPROM, aFLASH-EPROM, NVRAM, any other memory chip or cartridge.

Storage media is distinct from but may be used in conjunction withtransmission media. Transmission media participates in transferringinformation between storage media. For example, transmission mediaincludes coaxial cables, copper wire and fiber optics, including thewires that comprise bus 402. Transmission media can also take the formof acoustic or light waves, such as those generated during radio-waveand infra-red data communications.

Various forms of media may be involved in carrying one or more sequencesof one or more instructions to processor 404 for execution. For example,the instructions may initially be carried on a magnetic disk or solidstate drive of a remote computer. The remote computer can load theinstructions into its dynamic memory and send the instructions over atelephone line using a modem. A modem local to computer system 400 canreceive the data on the telephone line and use an infra-red transmitterto convert the data to an infra-red signal. An infra-red detector canreceive the data carried in the infra-red signal and appropriatecircuitry can place the data on bus 402. Bus 402 carries the data tomain memory 406, from which processor 404 retrieves and executes theinstructions. The instructions received by main memory 406 mayoptionally be stored on storage device 410 either before or afterexecution by processor 404.

Computer system 400 also includes a communication interface 418 coupledto bus 402. Communication interface 418 provides a two-way datacommunication coupling to a network link 420 that is connected to alocal network 422. For example, communication interface 418 may be anintegrated services digital network (ISDN) card, cable modem, satellitemodem, or a modem to provide a data communication connection to acorresponding kind of telephone line. As another example, communicationinterface 418 may be a local area network (LAN) card to provide a datacommunication connection to a compatible LAN. Wireless links may also beimplemented. In any such implementation, communication interface 418sends and receives electrical, electromagnetic or optical signals thatcarry digital data streams representing various kinds of information.

Network link 420 typically provides data communication through one ormore networks to other data devices. For example, network link 420 mayprovide a connection through local network 422 to a host computer 424 orto data equipment operated by an Internet Service Provider (ISP) 426.ISP 426 in turn provides data communication services through the worldwide packet data communication network now commonly referred to as the“Internet” 428. Local network 422 and Internet 428 both use electrical,electromagnetic or optical signals that carry digital data streams. Thesignals through the various networks and the signals on network link 420and through communication interface 418, which carry the digital data toand from computer system 400, are example forms of transmission media.

Computer system 400 can send messages and receive data, includingprogram code, through the network(s), network link 420 and communicationinterface 418. In the Internet example, a server 430 might transmit arequested code for an application program through Internet 428, ISP 426,local network 422 and communication interface 418.

The received code may be executed by processor 404 as it is received,and/or stored in storage device 410, or other non-volatile storage forlater execution.

In the foregoing specification, embodiments of the invention have beendescribed with reference to numerous specific details that may vary fromimplementation to implementation. The specification and drawings are,accordingly, to be regarded in an illustrative rather than a restrictivesense. The sole and exclusive indicator of the scope of the invention,and what is intended by the applicants to be the scope of the invention,is the literal and equivalent scope of the set of claims that issue fromthis application, in the specific form in which such claims issue,including any subsequent correction.

What is claimed is:
 1. A non-transitory computer readable mediumcomprising instructions which, when executed by one or more hardwareprocessors, cause performance of operations comprising: identifying acode base comprising: one or more sets of non-module code that are notassociated with any module descriptors; a first module corresponding to:a first module descriptor that includes a first set of one or moreexplicit declarations indicating at least a dependency on the one ormore sets of non-module code; a first set of executable code; a secondmodule corresponding to: a second module descriptor that includes asecond set of one or more explicit declarations indicating at least adependency on the first module, wherein the second module descriptor isrestricted from including any explicit declaration indicating anydependency on the one or more sets of non-module code; a second set ofexecutable code; executing the first set of executable code and thesecond set of executable code; wherein executing the first set ofexecutable code comprises executing at least a first line of code of thefirst set of executable code that accesses at least a second line ofcode of the one or more sets of non-module code; wherein the firstmodule descriptor provides a basis for the first module to access theone or more sets of non-module code; and wherein the second moduledescriptor does not provide a basis for the second module to access theone or more sets of non-module code.
 2. The medium of claim 1, whereinthe first set of modules consists of one or more bridge modules.
 3. Themedium of claim 1, wherein the second set of modules consists of one ormore standard modules.
 4. The medium of claim 1, wherein the dependencyon the one or more sets of non-module code is expressed as a dependencyon a namespace corresponding to the one or more sets of non-module code.5. The medium of claim 1, wherein: executing the second set ofexecutable code comprises executing at least a third line of code of thesecond set of executable code that accesses at least a fourth line ofcode of the first set of executable code; and executing the fourth lineof code of the first set of executable code causes execution of thefirst line of code of the first set of executable code that accesses thesecond line of code of the one or more sets of non-module code.
 6. Themedium of claim 1, wherein executing the second set of executable codedoes not include executing any lines of code of the second set ofexecutable code that accesses any lines of code of the one or more setsof non-module code.
 7. The medium of claim 1, wherein the first line ofcode of the first set of executable code that accesses the second lineof code of the one or more sets of non-module code comprises: a line ofcode that calls a package or service provided by the one or more sets ofnon-module code.
 8. The medium of claim 1, wherein dependencies withinthe one or more sets of non-module code are not required to beexplicitly declared.
 9. The medium of claim 1, wherein the first moduledescriptor defines dependencies, of the first module, on one or moreother components of the code base.
 10. The medium of claim 1, whereinthe second module is restricted from accessing the one or more sets ofnon-module code.
 11. A system comprising: at least one device includinga hardware processor; configured to perform operations comprising:identifying a code base comprising: one or more sets of non-module codethat are not associated with any module descriptors; a first modulecorresponding to: a first module descriptor that includes a first set ofone or more explicit declarations indicating at least a dependency onthe one or more sets of non-module code; a first set of executable code;a second module corresponding to: a second module descriptor thatincludes a second set of one or more explicit declarations indicating atleast a dependency on the first module, wherein the second moduledescriptor is restricted from including any explicit declarationindicating any dependency on the one or more sets of non-module code; asecond set of executable code; executing the first set of executablecode and the second set of executable code; wherein executing the firstset of executable code comprises executing at least a first line of codeof the first set of executable code that accesses at least a second lineof code of the one or more sets of non-module code; wherein the firstmodule descriptor provides a basis for the first module to access theone or more sets of non-module code; and wherein the second moduledescriptor does not provide a basis for the second module to access theone or more sets of non-module code.
 12. The system of claim 11, whereinthe dependency on the one or more sets of non-module code is expressedas a dependency on a namespace corresponding to the one or more sets ofnon-module code.
 13. The system of claim 11, wherein: executing thesecond set of executable code comprises executing at least a third lineof code of the second set of executable code that accesses at least afourth line of code of the first set of executable code; and executingthe fourth line of code of the first set of executable code causesexecution of the first line of code of the first set of executable codethat accesses the second line of code of the one or more sets ofnon-module code.
 14. The system of claim 11, wherein executing thesecond set of executable code does not include executing any lines ofcode of the second set of executable code that accesses any lines ofcode of the one or more sets of non-module code.
 15. The system of claim11, wherein the first line of code of the first set of executable codethat accesses the second line of code of the one or more sets ofnon-module code comprises: a line of code that calls a package orservice provided by the one or more sets of non-module code.
 16. Thesystem of claim 11, wherein the second module is restricted fromaccessing the one or more sets of non-module code.
 17. A methodcomprising: identifying a code base comprising: one or more sets ofnon-module code that are not associated with any module descriptors; afirst module corresponding to: a first module descriptor that includes afirst set of one or more explicit declarations indicating at least adependency on the one or more sets of non-module code; a first set ofexecutable code; a second module corresponding to: a second moduledescriptor that includes a second set of one or more explicitdeclarations indicating at least a dependency on the first module,wherein the second module descriptor is restricted from including anyexplicit declaration indicating any dependency on the one or more setsof non-module code; a second set of executable code; executing the firstset of executable code and the second set of executable code; whereinexecuting the first set of executable code comprises executing at leasta first line of code of the first set of executable code that accessesat least a second line of code of the one or more sets of non-modulecode; wherein the first module descriptor provides a basis for the firstmodule to access the one or more sets of non-module code; and whereinthe second module descriptor does not provide a basis for the secondmodule to access the one or more sets of non-module code; and whereinthe method is executed by at least one device including a hardwareprocessor.
 18. The method of claim 17, wherein the dependency on the oneor more sets of non-module code is expressed as a dependency on anamespace corresponding to the one or more sets of non-module code. 19.The method of claim 17, wherein: executing the second set of executablecode comprises executing at least a third line of code of the second setof executable code that accesses at least a fourth line of code of thefirst set of executable code; and executing the fourth line of code ofthe first set of executable code causes execution of the first line ofcode of the first set of executable code that accesses the second lineof code of the one or more sets of non-module code.
 20. The method ofclaim 17, wherein executing the second set of executable code does notinclude executing any lines of code of the second set of executable codethat accesses any lines of code of the one or more sets of non-modulecode.