Automatic quality assurance for software installers

ABSTRACT

An approach for assuring quality of a software installer is presented. A first view of a system is recorded. The installer is executed to create installed components for an application, and subsequently, a second view of the system is recorded. Based on a recorded change between the first and second views, information about the installed components is recorded. The installation is determined to be successful or unsuccessful. If successful, selected installed components are removed. The installer is executed to reinstall the selected installed components. The reinstallation is verified. A third view of the system is recorded. An uninstaller is executed to uninstall the software application. A fourth view of the system is recorded. The uninstallation is verified. A report is generated using the first, second, third and fourth views.

TECHNICAL FIELD

The present invention relates to a data processing method and system forassuring quality of software, and more particularly to a technique forautomatically assuring quality of software installers.

BACKGROUND

An End User Services (EUS) Application Packaging service generatessoftware installers (also known as (a.k.a.) “installation packages” or“packages”), based on customer requirements. Certain softwareapplications, such as an Adobe® Reader® electronic document viewer, areconfigured and silently executed on customer's workstations to perform atransparent and unattended installation. The Adobe® Reader® electronicdocument viewer is offered by Adobe Systems, Inc. located in San Jose,Calif. In order to create installation packages, a standard and global“best practices” guide explains how to create a software installer usinga standard set of tools. Different customers, however, demand differenttools and methodologies when creating software installers. A qualityassurance (QA) procedure for testing a software installer includesverifying that the software installer can provide successfulinstallation, reinstallation and uninstallation of an application, andalso includes several other checks. Log file generation and namingconventions, signed files or registry signed entries, and shortcutlocations provide common verifications in the QA procedure. Packagers(i.e., people who create the software installers) manually perform theaforementioned verifications using a QA checklist as a guide. Because ofthe volume of packages being created, the packagers often do not use theQA checklist in the correct manner or the packagers do not have time tomanually test each item, thereby leading to several required tests beingomitted. The omitted tests lead to a package being delivered to acustomer and failing, which results in the package being returned by thecustomer to be adjusted, thereby generating a significant number ofrework incidents and a significant amount of time to modify thefailures.

BRIEF SUMMARY

In a first embodiment, the present invention provides a method ofmanaging a software installer. The method includes a computer recordinginformation representative of a first view of an operating system of thecomputer. The method further includes the computer executing thesoftware installer to create installed components in an installation ofa software application. The method further includes subsequent to thestep of executing the software installer to create the installedcomponents in the installation, the computer recording informationrepresentative of a second view of the operating system. The methodfurther includes the computer determining and recording a change betweenthe first view and the second view. The method further includes based onthe change, the computer recording information about the installedcomponents. The method further includes the computer performing checkson the installation. The method further includes based on the checks onthe installation, the computer determining whether the installation wassuccessful. The method further includes responsive to a determinationthat the installation was successful, the computer removing selectedinstalled components. The method further includes the computer executingthe software installer to perform a reinstallation of the selectedinstalled components that had been removed. The method further includesthe computer performing checks on the reinstallation. The method furtherincludes subsequent to the step of executing the software installer toperform the reinstallation, the computer recording informationrepresentative of a third view of the operating system. The methodfurther includes the computer executing an uninstaller to perform anuninstallation of the software application. The method further includessubsequent to the step of executing the uninstaller, the computerrecording information representative of a fourth view of the operatingsystem. The method further includes the computer performing checks onthe uninstallation. The method further includes the computer generatinga report using the recorded information representative of the first,second, third and fourth views of the operating system.

In a second embodiment, the present invention provides a centralprocessing unit (CPU); a memory coupled to the CPU; and acomputer-readable, tangible storage device coupled to the CPU. Thestorage device includes instructions that are executed by the CPU viathe memory to implement a method of managing a software installer. Themethod includes the computer system recording information representativeof a first view of an operating system of the computer system. Themethod further includes the computer system executing the softwareinstaller to create installed components in an installation of asoftware application. The method further includes subsequent to the stepof executing the software installer to create the installed componentsin the installation, the computer system recording informationrepresentative of a second view of the operating system. The methodfurther includes the computer system determining and recording a changebetween the first view and the second view. The method further includesbased on the change, the computer system recording information about theinstalled components. The method further includes the computer systemperforming checks on the installation. The method further includes basedon the checks on the installation, the computer system determiningwhether the installation was successful. The method further includesresponsive to a determination that the installation was successful, thecomputer system removing selected installed components. The methodfurther includes the computer system executing the software installer toperform a reinstallation of the selected installed components that hadbeen removed. The method further includes the computer system performingchecks on the reinstallation. The method further includes subsequent tothe step of executing the software installer to perform thereinstallation, the computer system recording information representativeof a third view of the operating system. The method further includes thecomputer system executing an uninstaller to perform an uninstallation ofthe software application. The method further includes subsequent to thestep of executing the uninstaller, the computer system recordinginformation representative of a fourth view of the operating system. Themethod further includes the computer system performing checks on theuninstallation. The method further includes the computer systemgenerating a report using the recorded information representative of thefirst, second, third and fourth views of the operating system.

In a third embodiment, the present invention provides a computer programproduct including a computer-readable, tangible storage device and acomputer-readable program code stored in the computer-readable, tangiblestorage device. The computer-readable program code includes instructionsthat are executed by a central processing unit (CPU) of a computersystem to implement a method of managing a software installer. Themethod includes the computer system recording information representativeof a first view of an operating system of the computer system. Themethod further includes the computer system executing the softwareinstaller to create installed components in an installation of asoftware application. The method further includes subsequent to the stepof executing the software installer to create the installed componentsin the installation, the computer system recording informationrepresentative of a second view of the operating system. The methodfurther includes the computer system determining and recording a changebetween the first view and the second view. The method further includesbased on the change, the computer system recording information about theinstalled components. The method further includes the computer systemperforming checks on the installation. The method further includes basedon the checks on the installation, the computer system determiningwhether the installation was successful. The method further includesresponsive to a determination that the installation was successful, thecomputer system removing selected installed components. The methodfurther includes the computer system executing the software installer toperform a reinstallation of the selected installed components that hadbeen removed. The method further includes the computer system performingchecks on the reinstallation. The method further includes subsequent tothe step of executing the software installer to perform thereinstallation, the computer system recording information representativeof a third view of the operating system. The method further includes thecomputer system executing an uninstaller to perform an uninstallation ofthe software application. The method further includes subsequent to thestep of executing the uninstaller, the computer system recordinginformation representative of a fourth view of the operating system. Themethod further includes the computer system performing checks on theuninstallation. The method further includes the computer systemgenerating a report using the recorded information representative of thefirst, second, third and fourth views of the operating system.

In a fourth embodiment, the present invention provides a process forsupporting computing infrastructure. The process includes a firstcomputer system providing at least one support service for at least oneof creating, integrating, hosting, maintaining, and deployingcomputer-readable code in a second computer system. Thecomputer-readable code includes instructions, where the instructions,when executed by a processor of the second computer system, implement amethod of managing a software installer. The method includes the secondcomputer system recording information representative of a first view ofan operating system of the second computer system. The method furtherincludes the second computer system executing the software installer tocreate installed components in an installation of a softwareapplication. The method further includes subsequent to the step ofexecuting the software installer to create the installed components inthe installation, the second computer system recording informationrepresentative of a second view of the operating system. The methodfurther includes the second computer system determining and recording achange between the first view and the second view. The method furtherincludes based on the change, the second computer system recordinginformation about the installed components. The method further includesthe second computer system performing checks on the installation. Themethod further includes based on the checks on the installation, thesecond computer system determining whether the installation wassuccessful. The method further includes responsive to a determinationthat the installation was successful, the second computer systemremoving selected installed components. The method further includes thesecond computer system executing the software installer to perform areinstallation of the selected installed components that had beenremoved. The method further includes the second computer systemperforming checks on the reinstallation. The method further includessubsequent to the step of executing the software installer to performthe reinstallation, the second computer system recording informationrepresentative of a third view of the operating system. The methodfurther includes the second computer system executing an uninstaller toperform an uninstallation of the software application. The methodfurther includes subsequent to the step of executing the uninstaller,the second computer system recording information representative of afourth view of the operating system. The method further includes thesecond computer system performing checks on the uninstallation. Themethod further includes the second computer system generating a reportusing the recorded information representative of the first, second,third and fourth views of the operating system.

Embodiments of the present invention provide an automated technique forverifying software installers, thereby reducing rework incidents,avoiding common human errors and forcing packagers to perform thecorrect verifications. Embodiments of the present invention generatedetailed reports on the behavior of a software installer andverification tests performed on the software installer. The reports canbe shared among teams involved in an application packaging tasks cycle.Packagers viewing the generated report learn from their errors becausethey view detected problems as the problems occur.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a system for assuring quality of a softwareinstaller, in accordance with embodiments of the present invention.

FIGS. 2A-2B depict a flowchart of a process of assuring quality of asoftware installer in the system of FIG. 1, in accordance withembodiments of the present invention.

FIG. 3A is a flowchart of a process of performing installation checks inthe process of FIGS. 2A-2B, in accordance with embodiments of thepresent invention.

FIG. 3B is a flowchart of a process of verifying software installationin the process of FIG. 3A, in accordance with embodiments of the presentinvention.

FIG. 4 is a flowchart of a process of performing reinstallation checksin the process of FIGS. 2A-2B, in accordance with embodiments of thepresent invention.

FIG. 5 is a flowchart of a process of performing uninstallation checksin the process of FIGS. 2A-2B, in accordance with embodiments of thepresent invention.

FIG. 6 is a flowchart of a process of recovering from an unsuccessfulinstallation determined in the process of FIGS. 2A-2B, in accordancewith embodiments of the present invention.

FIG. 7 is a flowchart of a sub-process of automatically testing anapplication, which is included in the process of FIG. 3A, in accordancewith embodiments of the present invention.

FIG. 8 is a block diagram of a computer system included in the system ofFIG. 1 and that implements the processes of FIGS. 2A-2B, FIG. 3A, FIG.3B, FIG. 4, FIG. 5, FIG. 6, and FIG. 7, in accordance with embodimentsof the present invention.

DETAILED DESCRIPTION Overview

Embodiments of the present invention automatically perform qualityassurance testing on features of software installers, includinginstallation, reinstallation and uninstallation of a softwareapplication. Embodiments of the present invention take operating systemsnapshots (i.e., captures) before and after installation and before andafter uninstallation to verify the installation and uninstallation,respectively. A selection of installed files resulting from theinstallation may be deleted to verify reinstallation. In one embodiment,a final quality assurance report is generated based on all informationcollected when verifying installation, reinstallation, anduninstallation. The final report may include the installed, modified anderased files resulting from the installation, reinstallation anduninstallation.

System for Assuring Quality of a Software Installer

FIG. 1 is a block diagram of a system for assuring quality of a softwareinstaller, in accordance with embodiments of the present invention. Asystem 100 includes a computer system 102, which runs a software-basedquality assurance (QA) tool 104 and a software installer 106. QA tool104 includes an operating system (O/S) snapshot generator, an O/Ssnapshot comparison analyzer 110, an installation checks tool 112, areinstallation checks tool 114, an uninstallation checks tool 116, and aQA report generator 118. Computer system 102 includes other componentswhich are shown in FIG. 8 and described in the discussion of FIG. 8,presented below.

System 100 also includes a data repository 120, which is operativelycoupled to computer system 102. Data repository 120 includes aconfiguration file 122, O/S snapshots 124 and a database 126. QA tool104 reads configuration file 122. O/S snapshot generator 108 generatesO/S snapshots 124. O/S snapshot comparison analyzer 110 receives andcompares O/S snapshots 124 taken before and after an installation ofsoftware installer 106 and before and after an uninstallation ofsoftware installer 106. From the comparisons, O/S snapshot comparisonanalyzer determines installed, modified and deleted files andshortcut(s) stores the files and shortcut(s) in database 126.

Installation checks tool 112 performs verification checks on aninstallation of a software application performed by software installer106. Reinstallation checks tool 114 performs verification checks on areinstallation of the software application by software installer 106. Asused herein, a reinstallation includes reinstalling, not an entiresoftware application, but only the files or other components that arerequired for a complete installation but are currently missing (e.g.,files that had been previously deleted due to, for example, a deletionof shortcuts by a user or a deletion of files by malware). Byreinstalling only the files or other components that are currentlymissing, a reinstallation avoids a need to uninstall an entire softwareapplication and then installing the entire software application again.Uninstallation checks tool 116 performs verification checks on anuninstallation of the software application by software installer 106 orby a software-based uninstaller (not shown) associated with softwareinstaller 106. Hereinafter, the software application whose installationis verified by installation checks tool 112, whose reinstallation isverified by reinstallation checks tool 114, and/or whose uninstallationis verified by uninstallation checks tool 116 is also referred to simplyas “the software application.”

QA report generator 118 generates a final QA report 128 based oninformation collected when verifying the installation, reinstallation,and uninstallation of the software application. In one embodiment, QAreport 128 indicates files that are installed, files that are modifiedand/or files that are deleted as a result of the installation,reinstallation and uninstallation verifications.

Computer system 102 also runs a software-based recovery tool 130, whichis invoked in response to determining that an installation fails.Recovery tool 130 attempts to fix a software installer based oninformation collected as a result of the installation verification.

The functionality of the components of FIG. 1 is described in moredetail in the discussions presented below relative to FIGS. 2A-2B, FIG.3A, FIG. 3B, FIG. 4, FIG. 5, FIG. 6, and FIG. 7, and in the sectionentitled Computer System.

Processes for Assuring Quality of an Installation by a SoftwareInstaller

FIGS. 2A-2B depict a flowchart of a process of assuring quality of asoftware installer in the system of FIG. 1, in accordance withembodiments of the present invention. The process of FIGS. 2A-2B beginsat step 200. In step 202, QA tool 104 (see FIG. 1) reads configurationfile 122 (see FIG. 1).

In step 204, QA tool 104 (see FIG. 1) receives a selection of softwareinstaller 106 (see FIG. 1).

In step 206, O/S snapshot generator 108 (see FIG. 1) generates a firstsnapshot of an O/S of computer system 102 (see FIG. 1) and stores thefirst snapshot in O/S snapshots 124 (see FIG. 1) included in datarepository 120 (see FIG. 1).

In step 208, QA tool 104 (see FIG. 1) initiates an execution of softwareinstaller 106 (see FIG. 1) to perform an installation of a softwareapplication, and subsequently determines that the installation isfinished.

In step 210, O/S snapshot generator 108 (see FIG. 1) generates a secondsnapshot of the O/S of computer system 102 (see FIG. 1) and stores thesecond snapshot in O/S snapshots 124 (see FIG. 1) included in datarepository 120 (see FIG. 1).

In step 212, O/S snapshot comparison analyzer compares theaforementioned first and second snapshots generated in steps 206 and210, respectively. Using the result of the comparison of the first andsecond snapshots, O/S snapshot comparison analyzer 110 (see FIG. 1)determines changes resulting from the installation that finished in step208. The aforementioned changes include components that were installed(i.e., the installed components), other components that were modified,and/or still other components that were deleted as a result of theinstallation that finished in step 208. The aforementioned componentsinclude installed, modified and deleted computer files and shortcut(s)to the software application whose installation was finished in step 208.O/S snapshot comparison analyzer 110 (see FIG. 1) stores the changes indatabase 126 (see FIG. 1) in data repository 120 (see FIG. 1). In oneembodiment, the changes determined in step 212 are indicated bytimestamp differences between the first and second snapshots.

In step 214, installation checks tool 112 (see FIG. 1) performsverification checks on the installation of the software application thatfinished in step 208. The verification checks on the installation aredescribed below relative to FIG. 3A and FIG. 3B.

In step 216, QA tool 104 (see FIG. 1) determines whether theinstallation finished in step 208 was successful based on theinstallation checks performed in step 214. If QA tool 104 (see FIG. 1)determines in step 216 that the installation was successful, then theYes branch of step 216 is taken and step 218 is performed.

In step 218, QA tool 104 (see FIG. 1) determines that a proper subset ofthe installed components (a.k.a. the selected installed components)determined and stored in step 212 are to be deleted, and subsequentlydeletes the selected installed components from database 126 (see FIG.1). The selected installed components may include shortcuts thatsoftware installer 106 (see FIG. 1) runs, or particular files found on adata table generated by an MSI installer, or particular files identifiedby the comparison in step 212 if the software installer is an EXEinstaller. MSI installers and EXE installers are described below in thediscussion of FIG. 3B.

In step 220, QA tool 104 (see FIG. 1) initiates a re-execution ofsoftware installer 106 (see FIG. 1) to perform a reinstallation of thesoftware application, and subsequently determines that thereinstallation of the software application is finished.

In step 222, reinstallation checks tool 114 (see FIG. 1) performsverification checks on the reinstallation of the software applicationthat finished in step 220. The verification checks on the reinstallationare described below relative to FIG. 4.

Following step 222, the process of FIGS. 2A-2B continues with step 224in FIG. 2B. In step 224, O/S snapshot generator 108 (see FIG. 1)generates a third snapshot of the O/S and stores the third snapshot inO/S snapshots 124 (see FIG. 1) included in data repository 120 (see FIG.1).

In step 226, QA tool 104 (see FIG. 1) initiates an execution of softwareinstaller 106 (see FIG. 1) or an uninstaller running on computer system102 (see FIG. 1) to perform an uninstallation of the softwareapplication, and subsequently determines that the uninstallation isfinished.

In step 228, O/S snapshot generator 108 (see FIG. 1) generates a fourthsnapshot of the O/S and stores the fourth snapshot in O/S snapshots 124(see FIG. 1) included in data repository 120 (see FIG. 1).

In step 230, uninstallation checks tool 116 (see FIG. 1) performsverification checks on the uninstallation of the software applicationthat finished in step 226. The verification checks on the uninstallationare described below relative to FIG. 5.

In step 232, QA report generator 118 (see FIG. 1) generates QA report128 (see FIG. 1). Following step 232, the process of FIGS. 2A-2B ends atstep 234.

Returning to step 216 (see FIG. 2A), if QA tool 104 (see FIG. 1)determines that the installation was unsuccessful, then the No branch ofstep 216 (see FIG. 2A) is taken and step 236 is performed. In step 236,QA report generator 118 (see FIG. 1) generates QA report 128 (see FIG.1). If software installer 106 (see FIG. 1) is an MSI installer, thenstep 238 follows step 236. In step 238, recovery tool 130 (see FIG. 1)automatically recovers from the unsuccessful (i.e., failed)installation. In one embodiment, step 238 includes the steps of theprocess of FIG. 6. Following step 238, the process of FIGS. 2A-2B endsat step 234. If software installer 106 (see FIG. 1) is an EXE installer,then following step 236, there is an optional manual recovery from theunsuccessful installation, and subsequently the process of FIGS. 2A-2Bends at step 234.

In one embodiment, the checks performed in steps 214 and 222 in FIG. 2Aand step 230 in FIG. 2B include generating a specially designedsemaphore on a display to visually indicate by different colors or othergraphical elements the results of the checks. For example, the semaphoremay show red to indicate the installation by software installer 106 (seeFIG. 1) was unsuccessful.

FIG. 3A is a flowchart of a process of performing installation checks inthe process of FIGS. 2A-2B, in accordance with embodiments of thepresent invention. In one embodiment, step 214 (see FIG. 2A) includesthe process of FIG. 3A. The process of FIG. 3A begins at step 300. Instep 302, installation checks tool 112 (see FIG. 1) verifies theinstallation of the software application based on whether the computerfile of software installer 106 (see FIG. 1) has an .msi file extensionor an .exe file extension. Step 302 includes the steps of FIG. 3B,described below. The result of step 302 is installation checks tool 112(see FIG. 1) assigning a first value to a flag to indicate that theinstallation was successful or assigning a second value to a flag toindicate that the installation was unsuccessful. An .msi file extensionindicates the computer file is a Microsoft® software installer offeredby Microsoft Corporation located in Redmond, Wash. The softwareinstaller having an .msi file extension is used for installingMicrosoft® Windows® software offered by Microsoft Corporation. Althoughthe present invention discusses a computer file (in the singular) ofsoftware installer 106 (see FIG. 1), those skilled in the art willappreciate that the software installer may also include one or moreother files that are used by the file having the .msi or .exe file nameextension.

In step 304, installation checks tool 112 (see FIG. 1) determineswhether the installation of the software application was successfulbased on whether the aforementioned flag has the first value (i.e., asuccessful flag indicating the installation was successful) or thesecond value (i.e., an unsuccessful flag indicating the installation wasunsuccessful). If installation checks tool 112 (see FIG. 1) determinesin step 304 that the installation of the software application wasunsuccessful, then the No branch of step 304 is taken and the process ofFIG. 3A ends with installation checks tool 112 (see FIG. 1) assigning avalue to a flag to indicate the unsuccessful installation. Ifinstallation checks tool 112 (see FIG. 1) determines in step 304 thatthe installation of the software application was successful, then theYes branch of step 304 is taken and step 308 is performed.

In step 308, installation checks tool 112 (see FIG. 1) searches for anyshortcuts in the installation changes in database 126 included in datarepository 120 (see FIG. 1). The installation changes were written todatabase 126 in step 212 (see FIG. 2A). In one embodiment, the changeswritten to database 126 in step 212 (see FIG. 2A) include one or moreshortcuts to the software application.

In step 310, installation checks tool 112 (see FIG. 1) determines fromthe search in step 308 whether shortcut(s) were found in the databaseincluded in data repository 120 (see FIG. 1). If installation checkstool 112 (see FIG. 1) determines shortcut(s) were found in the searchperformed in step 308, then the Yes branch of step 310 is taken and step312 is performed.

In step 312, installation checks tool 112 (see FIG. 1) determinespath(s) of the found shortcut(s) and compares the path(s) of theshortcut(s) with path(s) of shortcut(s) in configuration file 122 (seeFIG. 1). The path(s) in configuration file 122 (see FIG. 1) are thepath(s) of shortcut(s) expected to exist after a successful installationof the software application. Also in step 312, installation checks tool112 (see FIG. 1) writes the determined path(s) of shortcut(s) into QAreport 128 (see FIG. 1).

In step 314, installation checks tool 112 (see FIG. 1) writes to datarepository 120 (see FIG. 1) location(s) of the shortcut(s) found as aresult of the search in step 308.

In step 316, installation checks tool 112 (see FIG. 1) initiates anexecution of the shortcut(s) found as a result of the search in step308. In one embodiment, shortcuts are executed in step 316 one by one,and with each execution, a human operator determines whether theshortcut being executed and the software application being launched bythe shortcut are working properly.

In step 318, installation checks tool 112 (see FIG. 1) records in datarepository 120 (see FIG. 1) the results of the execution initiated instep 316, where the recorded results are included in QA report 128 (seeFIG. 1). The results recorded in step 318 may include the operator'sdetermination whether each shortcut and the software application areworking properly.

In step 320, the process of FIG. 3A ends with installation checks tool112 (see FIG. 1) assigning a value to a flag to indicate theinstallation was successful.

Returning to step 310, if installation checks tool 112 (see FIG. 1)determines that no shortcut was found as a result of the search in step308, then the No branch of step 310 is taken, and the process of FIG. 3Aends at step 320, with installation checks tool 112 (see FIG. 1)assigning a value to a flag to indicate the installation was successful.

FIG. 3B is a flowchart of a process of verifying software installationin the process of FIG. 3A, in accordance with embodiments of the presentinvention. In one embodiment, step 302 (see FIG. 3A) includes theprocess of FIG. 3B. The process of FIG. 3B starts at step 350. In step352, installation checks tool 112 (see FIG. 1) determines whethersoftware installer 106 (see FIG. 1) is an MSI installer (i.e., thecomputer file of software installer 106 (see FIG. 1) has an .msi fileextension) or an EXE installer (i.e., the computer file of the softwareinstaller has an .exe file extension). If installation checks tool 112(see FIG. 1) determines in step 352 that software installer 106 (seeFIG. 1) is an MSI installer, then the Yes branch of step 352 is takenand step 354 is performed.

In step 354, installation checks tool 112 (see FIG. 1) obtains productinformation (i.e., information about the software application whoseinstallation by software installer 106 (see FIG. 1) is being verified)by opening a database (i.e., MSI database) resulting from softwareinstaller 106 (see FIG. 1) installing the software application in step208 (see FIG. 2A), and reading and collecting information from theopened database about the software application whose installation isbeing verified. In one embodiment, the MSI database is included in datarepository 120 (see FIG. 1). The collected information includes aproduct code and a product name identifying the software application,and further includes properties (i.e., MSI properties) and computerfiles needed for verification of the installation of the softwareapplication. In one embodiment, step 354 also includes installationchecks tool 112 (see FIG. 1) recording the aforementioned collectedinformation in data repository 120 (see FIG. 1) and QA report generator118 (see FIG. 1) including the recorded information in QA report 128(see FIG. 1).

In step 356, installation checks tool 112 (see FIG. 1) compares the MSIproperties collected in step 354 with properties in configuration file122 (see FIG. 1) to determine whether the MSI properties match theproperties in configuration file 122 (see FIG. 1) (i.e., match theexpected properties of an MSI installer). For example, the propertiesincluded in the collected information may include a first indicator thatsoftware installer 106 (see FIG. 1) is to be installed for all users ofcomputer system 102 (see FIG. 1), or a second indicator that softwareinstaller 106 (see FIG. 1) is to be installed for only one particularuser. In one embodiment, step 356 also includes installation checks tool112 (see FIG. 1) recording the result of the comparison in step 356 indata repository 120 (see FIG. 1) and QA report generator 118 (seeFIG. 1) including the recorded result in QA report 128 (see FIG. 1).

In step 358, installation checks tool 112 (see FIG. 1) compares an exitcode returned from the installation that finishes in step 208 (see FIG.2A) with standard MSI exit codes that can result from executing an MSIinstaller (i.e., Microsoft® Standard Exit Codes provided by MicrosoftCorporation) and determines which of the standard MSI exit codes matchesthe exit code returned from the installation. The comparison performedin step 358 retrieves the standard exit codes from data repository 120(see FIG. 1). In one embodiment, the standard exit codes includes anexit code of “0” which indicates that the installation was successful.In one embodiment, step 358 also includes installation checks tool 112(see FIG. 1) recording the result of the aforementioned exit codecomparison in data repository 120 (see FIG. 1) and QA report generator118 (see FIG. 1) adding the recorded result to QA report 128 (see FIG.1).

As used herein, an exit code is a code returned by software installer106 (see FIG. 1) installing, reinstalling or uninstalling the softwareapplication, where the code indicates the installation, reinstallationor uninstallation was completed successfully or indicates a particularerror that occurred to make the installation, reinstallation oruninstallation unsuccessful. For example, a software installer that isinstalling a software suite S needs Application A to be installed. Thesoftware installer verifies if Application A is installed. If thesoftware installer determines Application A is not installed, then theexit code matches error code “100.” A standard error code list includeserror code 100 and its meaning that Application A is needed for theinstallation of software suite S, but that Application A is notinstalled.

In step 360, installation checks tool 112 (see FIG. 1) executes aproduct globally unique identifier (product GUID) check. A product GUIDis a unique reference number that identifies the software applicationwhose installation is being verified in the process of FIG. 3B. Aproduct GUID check includes installation checks tool 112 (see FIG. 1)determining whether the product code collected in step 354 matches acode specifying the software application, where the code is retrievedfrom a system dynamic-link library (DLL) file or registry of computersystem 102 (see FIG. 1). If the product code matches the retrieved code,then the product GUID check indicates a successful installation. In oneembodiment, step 360 also includes installation checks tool 112 (seeFIG. 1) recording the result of the product GUID check in datarepository 120 (see FIG. 1) and QA report generator 118 (see FIG. 1)including the recorded result in QA report 128 (see FIG. 1).

In step 362, installation checks tool 112 (see FIG. 1) determineswhether the installation of the software application that finished instep 208 (see FIG. 2A) is successful based on the results of steps 356,358 and 360. If the comparison in step 356 determines that the MSIproperties does not match the properties in configuration file 122 (seeFIG. 1), the comparison in step 358 determines that the exit codereturned from the installation does not match a standard MSI exit codeindicating a successful installation, or the product GUID check in step360 determines that the product code collected in step 354 does notmatch a code of the software application retrieved from a DLL file ofcomputer system 102 (see FIG. 1), then in step 362, installation checkstool 112 (see FIG. 1) determines that the installation of the softwareapplication is unsuccessful, the No branch of step 362 is taken, and theprocess of FIG. 3B ends at step 364, with installation checks tool 112(see FIG. 1) assigning a value to a flag indicating that theinstallation was unsuccessful.

If the comparison in step 356 determines that the MSI properties matchthe properties in configuration file 122 (see FIG. 1), the comparison instep 358 determines that the exit code returned from the installationmatches a standard MSI exit code indicating a successful installation,and the product GUID check in step 360 determines that the product codecollected in step 354 matches a code of the software applicationretrieved from a DLL file of computer system 102 (see FIG. 1), then instep 362, installation checks tool 112 (see FIG. 1) determines that theinstallation of the software application is a success, the Yes branch ofstep 362 is taken, and step 366 is performed.

In step 366, installation checks tool 112 (see FIG. 1) searches for theproduct name collected in step 354, where the search is done on logfiles maintained by an event viewer of the operating system of computersystem 102 (see FIG. 1). The log files store all the events occurring onthe operating system of computer system 102 (see FIG. 1). The eventsincluded in the log files include an installation of the softwareapplication or software installer 106 (see FIG. 1), and includes textindicating whether the installation was successful. The search in step366 also includes a search of the log files of the event viewer forparticular text that indicates the installation is successful or forother text that indicates the installation is unsuccessful. Installationchecks tool 112 (see FIG. 1) determines the installation was successfulif the search in step 366 finds the product name in the log files andfinds the particular text that indicates a successful installation.

In step 368, installation checks tool 112 (see FIG. 1) determineswhether the installation of the software application is a success bydetermining whether the search in step 366 finds an error in the productname. If installation checks tool 112 (see FIG. 1) in step 368determines that no error was found in the search performed in step 366,then the Yes branch is taken and step 370 is performed.

In step 370, installation checks tool 112 (see FIG. 1) searches insidethe aforementioned MSI database and finds a signature file (a.k.a. signfile or signed file) included in configuration file 122 (see FIG. 1). Inone embodiment, step 370 also includes installation checks tool 112 (seeFIG. 1) recording the result of the search for the signature file indata repository 120 (see FIG. 1) and QA report generator 118 (seeFIG. 1) including the recorded result in QA report 128 (see FIG. 1). Asignature file is used to keep track of what computer systems havereceived a software distribution.

In step 372, installation checks tool 112 (see FIG. 1) determines thatthe signature file found in step 370 matches a signature file includedin the second snapshot generated in step 210 (see FIG. 2A). The matchdetermined in step 372 ensures that the signature file was installed bythe installation that finished in step 208 (see FIG. 2A).

Based on the match in step 372 ensuring that the signature file found instep 370 was installed, installation checks tool 112 (see FIG. 1)assigns a value to a flag to indicate that the installation of thesoftware application was successful and the process of FIG. 3B ends atstep 374.

Returning to step 368, if installation checks tool 112 (see FIG. 1)determines that the installation of the software application isunsuccessful by determining the search in step 366 finds an error in theproduct name, then the No branch of step 368 is taken and the process ofFIG. 3B ends at step 364, with installation checks tool 112 (see FIG. 1)assigning a value to a flag to indicate the installation of the softwareapplication was unsuccessful.

Returning to step 352, if installation checks tool 112 (see FIG. 1)determines software installer 106 (see FIG. 1) is an EXE installer, thenthe No branch of step 352 is taken and step 376 is performed.

In step 376, installation checks tool 112 (see FIG. 1) extracts productinformation from a developer's install script or source code forinstalling the software application. The product information includesthe product name identifying the software application. In oneembodiment, a script analyzer (not shown in FIG. 1) extracts theaforementioned product information in step 376.

In step 378, installation checks tool 112 (see FIG. 1) reads an exitcode returned from the installation that finished in step 208 (see FIG.2A) and compares the returned exit code with exit codes on a standardexit code list that was used for the type of software installer 106 (seeFIG. 1) that was determined in step 352 (i.e., an EXE installer). Thestandard exit code list is created by a developer of the EXE installerand stored in data repository 120 (see FIG. 1). In one embodiment, anexit code of “0” indicates that the installation was successful. In oneembodiment, step 378 also includes installation checks tool 112 (seeFIG. 1) recording the result of the exit code comparison in step 378 indata repository 120 (see FIG. 1) and QA report generator 118 (seeFIG. 1) including the recorded result in QA report 128 (see FIG. 1).

In step 380, installation checks tool 112 (see FIG. 1) searches for andfinds a product name on an uninstall registry key. Finding a removebutton in the uninstall registry that corresponds to the product namemeans that the installation successfully finished all of its tasksbecause creating the remove button on the uninstall registry is the lastaction performed by an EXE installer.

In step 382, installation checks tool 112 (see FIG. 1) determineswhether the installation is a success based on whether the comparison instep 378 determines the returned exit code matches a standard exit codefrom the standard exit code list, and based on whether the product namefound in step 380 matches the product name extracted in step 376.

If installation checks tool 112 (see FIG. 1) determines in step 382 thatthe returned exit code matches a standard exit code and the product namefound in step 380 matches the product name extracted in step 376, theninstallation checks tool 112 (see FIG. 1) determines the installation isa success, the Yes branch of step 382 is taken and step 384 isperformed.

In step 384, installation checks tool 112 (see FIG. 1) searches for andextracts a location of a signature file on the aforementioned installscript or installation source code. Subsequently, installation checkstool 112 (see FIG. 1) retrieves the signature file whose location wasextracted in step 384. In one embodiment, step 384 also includesinstallation checks tool 112 (see FIG. 1) recording the result of thesearch for the location of the signature file in data repository 120(see FIG. 1) and QA report generator 118 (see FIG. 1) including therecorded result in QA report 128 (see FIG. 1).

In step 386, installation checks tool 112 (see FIG. 1) finds a signaturefile in the second snapshot of the O/S generated in step 210 (see FIG.2A). Following step 386, installation checks tool 112 (see FIG. 1)determines the signature file whose location was extracted in step 384matches the signature in the second snapshot generated in step 210 (seeFIG. 2A). Based on the aforementioned match of the signature files,installation checks tool 112 (see FIG. 1) determines the installationwas successful and assigns a value to a flag indicating the installationwas successful. Following step 386, the process of FIG. 3B ends at step374.

Returning to step 382, if installation checks tool 112 (see FIG. 1)determines that the returned exit code does not match a standard exitcode that indicates a successful installation or the product name foundin step 380 does not match the product name extracted in step 376, theninstallation checks tool 112 (see FIG. 1) determines the installation isunsuccessful, the No branch of step 382 is taken and the process of FIG.3B ends at step 364, with installation checks tool 112 (see FIG. 1)assigning a value to a flag indicating that the installation wasunsuccessful.

Process for Assuring Quality of a Reinstallation by a Software Installer

FIG. 4 is a flowchart of a process of performing reinstallation checksin the process of FIGS. 2A-2B, in accordance with embodiments of thepresent invention. In one embodiment, step 222 (see FIG. 2A) includesthe process of FIG. 4. The process of FIG. 4 starts at step 400. In step402, reinstallation checks tool 114 (see FIG. 1) reads the exit codereturned from the reinstallation finished in step 220 (see FIG. 2A) andcompares the returned exit code with standard exit codes. The standardexit codes are standard MSI exit codes if step 352 (see FIG. 3B)determines that software installer 106 (see FIG. 1) is an MSI installeror are standard EXE exit codes if step 352 (see FIG. 3B) determines thatsoftware installer 106 (see FIG. 1) is an EXE installer. The comparisonperformed in step 402 retrieves the standard exit codes from datarepository 120 (see FIG. 1).

In step 404, reinstallation checks tool 114 (see FIG. 1) reads database126 (see FIG. 1) to search for and find previously installed componentsthat were deleted in step 218 (see FIG. 2A), and subsequently determineswhether the installed components that had been deleted in step 218 (seeFIG. 1) were restored by the reinstallation that was finished in step220 (see FIG. 2A). Determining the previously deleted components wererestored includes determining the previously deleted components arepresent in computer system 102 (see FIG. 1).

In step 406, reinstallation checks tool 114 (see FIG. 1) searches forany message in the event viewer of the O/S of computer system 102 (seeFIG. 1) that includes the product name of the software applicationreinstalled by the reinstallation that finished in step 220 (see FIG.2A).

In step 408, reinstallation checks tool 114 (see FIG. 1) records theinformation resulting from steps 402, 404 and 406 in data repository 120(see FIG. 1), and subsequently, QA report generator 118 (see FIG. 1)retrieves the recorded information resulting from steps 402, 404 and 406to include in QA report 128 (see FIG. 1).

Although not shown, reinstallation checks tool 114 (see FIG. 1)determines that the reinstallation that finished in step 220 wassuccessful if the comparison in step 402 results in the returned exitcode matching one of the standard exit codes, all the components deletedin step 218 (see FIG. 2A) are determined in step 404 to be restored, andthe product name is found in the event viewer messages in step 406.Reinstallation checks tool 114 (see FIG. 1) determines that thereinstallation that finished in step 220 was unsuccessful if thecomparison in step 402 results in the returned exit code not matchingany of the standard exit codes, not all of the components deleted instep 218 (see FIG. 2A) are determined in step 404 to be restored, or theproduct name is not found in any event viewer message in step 406.

Following step 408, the process of FIG. 4 ends at step 410.

Process for Assuring Quality of an Uninstallation by a SoftwareInstaller

FIG. 5 is a flowchart of a process of performing uninstallation checksin the process of FIGS. 2A-2B, in accordance with embodiments of thepresent invention. In one embodiment, step 230 (see FIG. 2B) includesthe process of FIG. 5. The process of FIG. 5 starts at step 500. In step502, uninstallation checks tool 116 (see FIG. 1) determines whethersoftware installer 106 (see FIG. 1) is an MSI installer (i.e., thecomputer file of software installer 106 (see FIG. 1) has an .msi fileextension) or an EXE installer (i.e., the computer file of softwareinstaller 106 (see FIG. 1) has an .exe file extension). Ifuninstallation checks tool 116 (see FIG. 1) determines in step 502 thatsoftware installer 106 (see FIG. 1) is an MSI installer, then the Yesbranch of step 502 is taken and step 504 is performed.

In step 504, uninstallation checks tool 116 (see FIG. 1) compares theexit code returned from the uninstallation that finishes in step 226(see FIG. 2B) with standard MSI exit codes that can result fromexecuting an MSI installer (i.e., Microsoft® Standard Exit Codes) anddetermines which of the standard MSI exit codes match the exit codereturned from the uninstallation. The comparison performed in step 504retrieves standard MSI exit codes from data repository 120 (see FIG. 1).In one embodiment, step 504 also includes uninstallation checks tool 116(see FIG. 1) recording the result of the exit code comparison in step504, and QA report generator 118 (see FIG. 1) including the recordedresult in QA report 128 (see FIG. 1).

Prior to step 506 and after the Yes branch of step 502, uninstallationchecks tool 116 (see FIG. 1) obtains product information (i.e.,information about the software application whose uninstallation is beingverified) by opening the MSI database resulting from the uninstallationthat finishes in step 226 (see FIG. 2B), and reading and collectinginformation from the opened database about the software applicationwhose uninstallation is being verified. In one embodiment, the collectedinformation includes a product code identifying the softwareapplication.

In step 506, uninstallation checks tool 116 (see FIG. 1) executes aproduct GUID check, which includes uninstallation checks tool 116 (seeFIG. 1) determining whether the product code collected prior to step 506and after the Yes branch of step 502 does not match a code specifyingthe software application in a system DLL file of computer system 102(see FIG. 1).

In step 508, uninstallation checks tool 116 (see FIG. 1) searches forthe product name collected prior to step 506 and after the Yes branch ofstep 502, where the search is done on log files maintained by the eventviewer of the operating system of computer system 102 (see FIG. 1). Thesearch in step 508 also includes a search of the log files forparticular text that indicates the uninstallation is successful or forother text that indicates the uninstallation is unsuccessful.Uninstallation checks tool 116 (see FIG. 1) determines theuninstallation was successful if the search in step 508 finds theproduct name in the log files and finds the particular text thatindicates a successful uninstallation.

In step 510, uninstallation checks tool 116 (see FIG. 1) searches insidethe aforementioned MSI database to determine whether a signature filedoes not exist in the MSI database, where the signature file beingsearched for is included in configuration file 122 (see FIG. 1). In oneembodiment, step 510 also includes uninstallation checks tool 116 (seeFIG. 1) recording in data repository 120 (see FIG. 1) the result of thesearch for the signature file and QA report generator 118 (see FIG. 1)including the recorded result in QA report 128 (see FIG. 1).

After step 510 and prior to step 512, uninstallation checks tool 116(see FIG. 1) determines whether the uninstallation of the softwareapplication that finished in step 226 (see FIG. 2B) is successful basedon the results of steps 504, 506, 508 and 510. If the comparison in step504 determines that the exit code returned from the uninstallation doesnot match a standard MSI exit code, the product GUID check in step 506determines that the product code collected prior to step 506 matches acode of the software application retrieved from a DLL file of computersystem 102 (see FIG. 1), the search for the product name in step 508results in finding error(s) in the product name, and/or step 510determines that the signature file exists in the MSI database, thenuninstallation checks tool 116 (see FIG. 1) determines that theuninstallation of the software application that was finished in step 226(see FIG. 2B) is unsuccessful and the process of FIG. 5 ends at step512.

If the comparison in step 504 determines that the exit code returnedfrom the uninstallation matches a standard MSI exit code, the productGUID check in step 506 determines that the product code collected priorto step 506 and after the Yes branch of step 502 does not match a codespecifying the software application retrieved from a DLL file ofcomputer system 102 (see FIG. 1), the product name found in step 508 hasno errors, and the signature file searched for in step 510 does notexist, then uninstallation checks tool 116 (see FIG. 1) determines thatthe uninstallation of the software application is a success and theprocess of FIG. 5 ends at step 512.

Returning to step 502, if uninstallation checks tool 116 (see FIG. 1)determines software installer 106 (see FIG. 1) is an EXE installer, thenthe No branch of step 502 is taken and step 514 is performed.

In step 514, uninstallation checks tool 116 (see FIG. 1) reads the exitcode returned from the uninstallation that finished in step 226 (seeFIG. 2B) and compares the returned exit code with exit codes on astandard exit code list that was used for the type of software installer106 (see FIG. 1) that was determined in step 502 (i.e., standard exitcodes that had been developed for an EXE installer). In one embodiment,the standard exit code list is stored in data repository 120 (see FIG.1). In one embodiment, step 514 also includes uninstallation checks tool116 (see FIG. 1) recording in data repository 120 (see FIG. 1) theresult of the exit code comparison in step 514, and QA report generator118 (see FIG. 1) including the recorded result in QA report 128 (seeFIG. 1).

Prior to step 516 and after the No branch of step 502, uninstallationchecks tool 116 (see FIG. 1) extracts product information from adeveloper's install script or source code for installing the softwareapplication. In one embodiment, the extracted product informationincludes the product name identifying the software application.

In step 516, uninstallation checks tool 116 (see FIG. 1) searches forthe extracted product name and determines whether the extracted productname does not exist on the uninstall registry key.

In step 518, uninstallation checks tool 116 (see FIG. 1) searches forand extracts a location of a signature file on the aforementionedinstall script or installation source code. Subsequently, uninstallationchecks tool 116 (see FIG. 1) retrieves the signature file whose locationwas extracted in step 384. In step 386, uninstallation checks tool 116(see FIG. 1) determines whether the retrieved signature file does notexist in the fourth snapshot of the O/S generated in step 228 (see FIG.2B). In one embodiment, step 518 also includes uninstallation checkstool 116 (see FIG. 1) recording in data repository 120 (see FIG. 1) theresult of the search for the signature file and QA report generator 118(see FIG. 1) including the recorded result in QA report 128 (see FIG.1).

After step 518 and prior to step 512, uninstallation checks tool 116(see FIG. 1) determines whether the uninstallation is a success based onthe results of steps 514, 516 and 518. After step 518, the process ofFIG. 5 ends at step 512.

If uninstallation checks tool 116 (see FIG. 1) determines in step 514that the returned exit code matches a standard exit code that indicatesa successful uninstallation, the product name searched for in step 516does not exist in the uninstall registry key, and the signature filesearched for in step 518 does not exist in the fourth snapshot of theO/S of computer system 102 (see FIG. 1), then uninstallation checks tool116 (see FIG. 1) determines the uninstallation is successful.

If uninstallation checks tool 116 (see FIG. 1) determines in step 514that the returned exit code does not match a standard exit code thatindicates a successful uninstallation, the product name searched for instep 516 exists in the uninstall registry key, and/or the signature filesearched for in step 518 exists in the fourth snapshot of the O/S ofcomputer system 102 (see FIG. 1), then uninstallation checks tool 116(see FIG. 1) determines the uninstallation is unsuccessful.

Recovering from an Unsuccessful Installation

FIG. 6 is a flowchart of a process of recovering from an unsuccessfulinstallation determined in the process of FIGS. 2A-2B, in accordancewith embodiments of the present invention. In one embodiment, step 238(see FIG. 2B) includes the process of FIG. 6 and software installer 106(see FIG. 1) is an MSI installer. The process of FIG. 6 starts at step600. In step 602, recovery tool 130 (see FIG. 1) detects a type of errorthat caused the unsuccessful installation, which is indicated by theflag assigned in step 364 (see FIG. 3B), indicated by a comparison ofthe signature files found in steps 370 and 372 in FIG. 3B, or indicatedby the comparison of shortcut paths in step 312 (see FIG. 3A). The typeof error detected in step 602 includes (1) an MSI error exit code (i.e.,the comparison in step 358 (see FIG. 3B) determines that the exit coderesulting from the installation matches one of multiple standard MSIexit codes in data repository 120 (see FIG. 1) (e.g., codes other thanthe “0” code indicating a successful installation), where each of thestandard MSI exit codes indicates a corresponding error; (2) a shortcuterror (i.e., the comparison in step 312 (see FIG. 3A) determines thatpath(s) of shortcut(s) in configuration file 122 (see FIG. 1) do notmatch path(s) of shortcut(s) found in step 310 (see FIG. 3A); (3) asignature file error (i.e., the signature file is not found in thesearch in step 370 in FIG. 3B); or (4) registry error (i.e., the productGUID check in step 360 (see FIG. 3B) results in not finding a matchbetween the product code collected in step 354 (see FIG. 3B) and thecode retrieved from the DLL file).

In step 604, recovery tool 130 (see FIG. 1) determines whether the errortype detected in step 602 is (1) an MSI error exit code or (2) ashortcut, signature file, or registry error. If recovery tool 130 (seeFIG. 1) in step 604 determines the error type is an MSI error exit code,then the left branch of step 604 is taken and step 606 is performed.

In step 606, recovery tool 130 (see FIG. 1) determines whether theparticular error indicated by the MSI error exit code has an automatedsolution. If recovery tool 130 (see FIG. 1) determines in step 606 thatthe error indicated by the MSI error exit code has an automatedsolution, then the Yes branch of step 606 is taken and step 608 isperformed. In one embodiment, data repository 120 (see FIG. 1) stores anassociation between the standard MSI error exit codes and respectiveautomated solutions for the errors indicated by the standard MSI errorexit codes.

In step 608, recovery tool 130 (see FIG. 1) opens the computer file ofthe MSI installer (i.e., the MSI file) for a write operation. In step610, recovery tool 130 (see FIG. 1) modifies the MSI tables in the MSIfile to correct the particular error indicated by the detected MSI errorexit code detected in step 602. In step 612, recovery tool 130 (seeFIG. 1) closes the MSI file and assigns a value to a flag indicating theinstallation was successful. Following step 612, the process of FIG. 6ends at step 614.

Returning to step 606, if recovery tool 130 (see FIG. 1) determines thatthe error indicated by the MSI error exit code does not have anautomated solution, then the No branch of step 606 is taken and recovertool 130 (see FIG. 1) assigns a value to a flag indicating theinstallation was unsuccessful. Following the No branch of step 606, theprocess of FIG. 6 ends at step 616.

Returning to step 604, if recovery tool 130 (see FIG. 1) determines theerror type is a shortcut error, signature file error, or registry error,then the right branch of step 604 is taken and step 608 is performed. Instep 608 following the right branch of step 604, recovery tool 130 (seeFIG. 1) opens the MSI file for write operations. In step 610, recoverytool 130 (see FIG. 1) modifies the MSI tables in the MSI file to correctthe particular error whose type was detected in step 602. In step 612,recovery tool 130 (see FIG. 1) closes the MSI file and assigns a valueto a flag indicating the installation was successful. Following step612, the process of FIG. 6 ends at step 614.

Automatically Testing an Application

FIG. 7 is a flowchart of a sub-process of automatically testing anapplication, which is included in the process of FIG. 3A, in accordancewith embodiments of the present invention. In one embodiment, step 318(see FIG. 3A) is replaced with the process of FIG. 7 to provide anautomatic test of the software application whose installation is checkedin the process of FIG. 3A. The process of FIG. 7 begins at step 700after the software application and shortcut(s) to the softwareapplication have been installed in step 208 (see FIG. 2A). In step 702,installation checks tool 112 (see FIG. 1) reads a location of aninstalled shortcut to the installed software application. In oneembodiment, the location is read in step 702 from database 126 (see FIG.1).

In step 704, installation checks tool 112 (see FIG. 1) extractsexecutable and command line information inside the shortcut whoselocation was read in step 702. The extracted executable and command lineinformation indicates how to execute the software application. In oneembodiment, the executable and command line information is extractedfrom database 126 (see FIG. 1).

In step 706, by using the executable and command line informationextracted in step 704, installation checks tool 112 (see FIG. 1)executes the software application to test the software application.

In step 708, installation checks tool 112 (see FIG. 1) monitors thesoftware application as it is running and sends a close signal to awindow of the software application.

In step 710, installation checks tool 112 (see FIG. 1) reads the exitcode from the software application.

In step 712, installation checks tool 112 (see FIG. 1) determineswhether the exit code read in step 710 indicates the softwareapplication test was a success or a failure. If installation checks tool112 (see FIG. 1) in step 712 determines the exit code read in step 710indicates the software application test was successful, then the Yesbranch of step 712 is taken and step 714 is performed.

In step 714, installation checks tool 112 (see FIG. 1) records in datarepository 120 (see FIG. 1) the software application test as beingsuccessful.

Returning to step 712, if installation checks tool 112 (see FIG. 1)determines that the exit code read in step 710 indicates the softwareapplication test was unsuccessful, then the No branch of step 712 istaken and step 716 is performed.

In step 716, installation checks tool 112 (see FIG. 1) records in datarepository 120 (see FIG. 1) the software application test as beingunsuccessful.

Step 718 is performed after step 714 and after step 716. In step 718,installation checks tool 112 (see FIG. 1) determines whether there isanother shortcut to the software application that is not yet tested inthe process of FIG. 7. If installation checks tool 112 (see FIG. 1)determines in step 718 that there is another shortcut to be tested, thenthe Yes branch of step 718 is taken and the process repeats starting atstep 702. Otherwise, if there are no other shortcuts to be tested, thenthe No branch of step 718 is taken and the process of FIG. 7 ends atstep 720. In one embodiment, installation checks tool 112 (see FIG. 1)determines whether there is another shortcut to be tested by identifyingthe shortcuts to be tested from shortcut information stored in database126 (see FIG. 1).

Computer System

FIG. 8 is a block diagram of a computer system included in the system ofFIG. 1 and that implements the processes of FIGS. 2A-2B, FIG. 3A, FIG.3B, FIG. 4, FIG. 5, FIG. 6, and FIG. 7, in accordance with embodimentsof the present invention. Computer system 102 generally includes acentral processing unit (CPU) 802, a memory 804, an input/output (I/O)interface 806, and a bus 808. Further, computer system 102 is coupled toI/O devices 810 and a computer data storage unit 812. CPU 802 performscomputation and control functions of computer system 102, includingexecuting instructions included in program code 814, 816 and 818 toperform a method of assuring quality of a software installer, where theinstructions are executed by CPU 802 via memory 804. CPU 802 may includea single processing unit, or be distributed across one or moreprocessing units in one or more locations (e.g., on a client andserver). Program code 814 includes program code for QA tool 104 (seeFIG. 1). Program code 816 includes program code for software installer106 (see FIG. 1). Program code 818 includes program code for recoverytool 130 (see FIG. 1).

Memory 804 includes a known computer-readable storage medium, which isdescribed below. In one embodiment, cache memory elements of memory 804provide temporary storage of at least some program code (e.g., programcode 814, 816 and 818) in order to reduce the number of times code mustbe retrieved from bulk storage while instructions of the program codeare executed. Moreover, similar to CPU 802, memory 804 may reside at asingle physical location, including one or more types of data storage,or be distributed across a plurality of physical systems in variousforms. Further, memory 804 can include data distributed across, forexample, a local area network (LAN) or a wide area network (WAN).

I/O interface 806 includes any system for exchanging information to orfrom an external source. I/O devices 810 include any known type ofexternal device, including a display device (e.g., monitor), keyboard,mouse, printer, speakers, handheld device, facsimile, etc. I/O devices810 includes display device 118 (see FIG. 1). Bus 808 provides acommunication link between each of the components in computer system102, and may include any type of transmission link, includingelectrical, optical, wireless, etc.

I/O interface 806 also allows computer system 102 to store information(e.g., data or program instructions such as program code 814, 816 and818) on and retrieve the information from computer data storage unit 812or another computer data storage unit (not shown). In one embodiment,program code 814, 816 and 818 are stored on computer data storage unit812. Computer data storage unit 812 includes a known computer-readablestorage medium, which is described below. For example, computer datastorage unit 812 may be a non-volatile data storage device, such as amagnetic disk drive (i.e., hard disk drive) or an optical disc drive(e.g., a CD-ROM drive which receives a CD-ROM disk).

Memory 804 and/or storage unit 812 may store computer program code 814,816 and 818 that includes instructions that are carried out by CPU 802via memory 804 to assure quality of a software installer. Although FIG.8 depicts memory 804 as including program code 814, 816 and 818, thepresent invention contemplates embodiments in which memory 804 does notinclude all of code 814, 816 and 818 simultaneously, but instead at onetime includes only a portion of code 814, a portion of code 816 and/or aportion of code 818.

Further, memory 804 may include other systems not shown in FIG. 8, suchas an operating system (e.g., Linux®) that runs on CPU 802 and providescontrol of various components within and/or connected to computer system102. Linux is a registered trademark of Linus Torvalds in the UnitedStates, other countries, or both.

Storage unit 812 and/or one or more other computer data storage units(not shown) that are coupled to computer system 102 may storeconfiguration file 122 (see FIG. 1), O/S snapshots 124 (see FIG. 1) anddatabase 126. In embodiment, storage unit 812 includes data repository120 (see FIG. 1).

As will be appreciated by one skilled in the art, in a first embodiment,the present invention may be a system; in a second embodiment, thepresent invention may be a method; and in a third embodiment, thepresent invention may be a computer program product. A component of anembodiment of the present invention may take the form of an entirelyhardware-based component, an entirely software component (includingfirmware, resident software, micro-code, etc.) or a component combiningsoftware and hardware sub-components that may all generally be referredto herein as a “module”.

An embodiment of the present invention may take the form of a computerprogram product embodied in one or more computer-readable medium(s)(e.g., memory 804 and/or computer data storage unit 812) havingcomputer-readable program code (e.g., program code 814, 816 and 818)embodied or stored thereon.

Any combination of one or more computer-readable mediums (e.g., memory804 and computer data storage unit 812) may be utilized. Thecomputer-readable medium may be (1) a computer-readable storage medium,or (2) a computer-readable signal medium. As used herein, acomputer-readable storage medium is not a computer-readable signalmedium.

In one embodiment, the computer-readable storage medium is a physical,tangible computer-readable storage device or physical, tangiblecomputer-readable storage apparatus that stores but does not propagate.A computer-readable storage medium may include, for example, anelectronic, magnetic, optical, electromagnetic, or semiconductor system,apparatus, device or any suitable combination of the foregoing. Anon-exhaustive list of more specific examples of the computer-readablestorage medium includes: a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an optical fiber,a portable compact disc read-only memory (CD-ROM), an optical storagedevice, a magnetic storage device, or any suitable combination of theforegoing. In the context of this document, a computer-readable storagemedium is a physical, tangible storage medium that can contain or storea program (e.g., program 814, 816 and 818) for use by or in connectionwith a system, apparatus, or device for carrying out instructions in theprogram, and which does not propagate. As used herein, acomputer-readable storage medium is not a computer-readable signalmedium.

A computer-readable signal medium may include a propagated data signalwith computer-readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electromagnetic, optical, or any suitable combination thereof. Acomputer-readable signal medium may be any computer-readable medium thatis not a computer-readable storage medium and that can communicate,propagate, or transport a program for use by or in connection with asystem, apparatus, or device for carrying out instructions.

Program code (e.g., program code 814, 816 and 818) embodied on acomputer-readable medium may be transmitted using any appropriatemedium, including but not limited to wireless, wireline, optical fibercable, radio frequency (RF), etc., or any suitable combination of theforegoing.

Computer program code (e.g., program code 814, 816 and 818) for carryingout operations for aspects of the present invention may be written inany combination of one or more programming languages, including anobject oriented programming language such as Java®, Smalltalk, C++ orthe like and conventional procedural programming languages, such as the“C” programming language or similar programming languages. Java and allJava-based trademarks are trademarks or registered trademarks of Oracleand/or its affiliates. Instructions of the program code may be carriedout entirely on a user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server, wherethe aforementioned user's computer, remote computer and server may be,for example, computer system 102 or another computer system (not shown)having components analogous to the components of computer system 102included in FIG. 8. In the latter scenario, the remote computer may beconnected to the user's computer through any type of network (notshown), including a LAN or a WAN, or the connection may be made to anexternal computer (e.g., through the Internet using an Internet ServiceProvider).

Aspects of the present invention are described herein with reference toflowchart illustrations (e.g., FIGS. 2A-2B, FIG. 3A, FIG. 3B, FIG. 4,FIG. 5, FIG. 6, and FIG. 7) and/or block diagrams of methods, apparatus(systems) (e.g., FIG. 1 and FIG. 8), and computer program productsaccording to embodiments of the invention. It will be understood thateach block of the flowchart illustrations and/or block diagrams, andcombinations of blocks in the flowchart illustrations and/or blockdiagrams, can be implemented by computer program instructions (e.g.,program code 814, 816 and 818). These computer program instructions maybe provided to one or more hardware processors (e.g., CPU 802) of ageneral purpose computer, special purpose computer, or otherprogrammable data processing apparatus to produce a machine, such thatthe instructions, which are carried out via the processor(s) of thecomputer or other programmable data processing apparatus, create meansfor implementing the functions/acts specified in the flowcharts and/orblock diagram block or blocks.

These computer program instructions may also be stored in acomputer-readable medium (e.g., memory 804 or computer data storage unit812) that can direct a computer (e.g., computer system 102), otherprogrammable data processing apparatus, or other devices to function ina particular manner, such that the instructions (e.g., program 814, 816and 818) stored in the computer-readable medium produce an article ofmanufacture including instructions which implement the function/actspecified in the flowcharts and/or block diagram block or blocks.

The computer program instructions may also be loaded onto a computer(e.g., computer system 102), other programmable data processingapparatus, or other devices to cause a series of operational steps to beperformed on the computer, other programmable apparatus, or otherdevices to produce a computer-implemented process such that theinstructions (e.g., program 814, 816 and 818) which are executed on thecomputer, other programmable apparatus, or other devices provideprocesses for implementing the functions/acts specified in theflowcharts and/or block diagram block or blocks.

Any of the components of an embodiment of the present invention can bedeployed, managed, serviced, etc. by a service provider that offers todeploy or integrate computing infrastructure with respect to assuringquality of a software installer. Thus, an embodiment of the presentinvention discloses a process for supporting computer infrastructure,where the process includes providing at least one support service for atleast one of integrating, hosting, maintaining and deployingcomputer-readable code (e.g., program code 814, 816 and 818) in acomputer system (e.g., computer system 102) including one or moreprocessors (e.g., CPU 802), wherein the processor(s) carry outinstructions contained in the code causing the computer system to assurequality of a software installer. Another embodiment discloses a processfor supporting computer infrastructure, where the process includesintegrating computer-readable program code into a computer systemincluding a processor. The step of integrating includes storing theprogram code in a computer-readable storage device of the computersystem through use of the processor. The program code, upon beingexecuted by the processor, implements a method of assuring quality of asoftware installer.

While it is understood that program code 814, 816 and 818 for assuringquality of a software installer may be deployed by manually loadingdirectly in client, server and proxy computers (not shown) via loading acomputer-readable storage medium (e.g., computer data storage unit 812),program code 814, 816 and 818 may also be automatically orsemi-automatically deployed into computer system 102 by sending programcode 814, 816 and 818 to a central server (e.g., computer system 102) ora group of central servers. Program code 814, 816 and 818 is thendownloaded into client computers (not shown) that will execute programcode 814, 816 and 818. Alternatively, program code 814, 816 and 818 issent directly to the client computer via e-mail. Program code 814, 816and 818 is then either detached to a directory on the client computer orloaded into a directory on the client computer by a button on the e-mailthat executes a program that detaches program code 814, 816 and 818 intoa directory. Another alternative is to send program code 814, 816 and818 directly to a directory on the client computer hard drive. In a casein which there are proxy servers, the process selects the proxy servercode, determines on which computers to place the proxy servers' code,transmits the proxy server code, and then installs the proxy server codeon the proxy computer. Program code 814, 816 and 818 is transmitted tothe proxy server and then it is stored on the proxy server.

In one embodiment, program code 814, 816 and 818 is integrated into aclient, server and network environment by providing for program code814, 816 and 818 to coexist with software applications (not shown),operating systems (not shown) and network operating systems software(not shown) and then installing program code 814, 816 and 818 on theclients and servers in the environment where program code 814, 816 and818 will function.

The first step of the aforementioned integration of code included inprogram code 814, 816 and 818 is to identify any software on the clientsand servers including the network operating system (not shown) whereprogram code 814, 816 and 818 will be deployed that are required byprogram code 814, 816 and 818 or that work in conjunction with programcode 814, 816 and 818. This identified software includes the networkoperating system that is software that enhances a basic operating systemby adding networking features. Next, the software applications andversion numbers are identified and compared to the list of softwareapplications and version numbers that have been tested to work withprogram code 814, 816 and 818. Those software applications that aremissing or that do not match the correct version are upgraded with thecorrect version numbers. Program instructions that pass parameters fromprogram code 814, 816 and 818 to the software applications are checkedto ensure the parameter lists match the parameter lists required by theprogram code 814, 816 and 818. Conversely, parameters passed by thesoftware applications to program code 814, 816 and 818 are checked toensure the parameters match the parameters required by program code 814,816 and 818. The client and server operating systems including thenetwork operating systems are identified and compared to the list ofoperating systems, version numbers and network software that have beentested to work with program code 814, 816 and 818. Those operatingsystems, version numbers and network software that do not match the listof tested operating systems and version numbers are upgraded on theclients and servers to the required level. After ensuring that thesoftware, where program code 814, 816 and 818 is to be deployed, is atthe correct version level that has been tested to work with program code814, 816 and 818, the integration is completed by installing programcode 814, 816 and 818 on the clients and servers.

Another embodiment of the invention provides a method that performs theprocess steps on a subscription, advertising and/or fee basis. That is,a service provider, such as a Solution Integrator, can offer to create,maintain, support, etc. a process of assuring quality of a softwareinstaller. In this case, the service provider can create, maintain,support, etc. a computer infrastructure that performs the process stepsfor one or more customers. In return, the service provider can receivepayment from the customer(s) under a subscription and/or fee agreement,and/or the service provider can receive payment from the sale ofadvertising content to one or more third parties.

The flowcharts in FIGS. 2A-2B, FIG. 3A, FIG. 3B, FIG. 4, FIG. 5, FIG. 6,and FIG. 7 and the block diagrams in FIG. 1 and FIG. 8 illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowcharts or block diagrams may represent a module, segment, or portionof code (e.g., program code 814, 816 or 818), which includes one or moreexecutable instructions for implementing the specified logicalfunction(s). It should also be noted that, in some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be performed substantially concurrently, or the blocks maysometimes be performed in reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustrations, and combinations ofblocks in the block diagrams and/or flowchart illustrations, can beimplemented by special purpose hardware-based systems that perform thespecified functions or acts, or combinations of special purpose hardwareand computer instructions.

While embodiments of the present invention have been described hereinfor purposes of illustration, many modifications and changes will becomeapparent to those skilled in the art. Accordingly, the appended claimsare intended to encompass all such modifications and changes as fallwithin the true spirit and scope of this invention.

What is claimed is:
 1. A method of managing a software installer, themethod comprising the steps of: a computer recording informationrepresentative of a first view of an operating system of the computer;the computer executing the software installer to create installedcomponents in an installation of a software application; subsequent tothe step of executing the software installer to create the installedcomponents in the installation, the computer recording informationrepresentative of a second view of the operating system; the computerdetermining and recording a change between the first view and the secondview, and based on the change, the computer recording information aboutthe installed components; the computer performing checks on theinstallation; based on the checks on the installation, the computermaking a determination that the installation was successful; responsiveto the determination that the installation was successful, the computerremoving selected installed components; the computer executing thesoftware installer to perform a reinstallation of the selected installedcomponents that had been removed; the computer performing checks on thereinstallation; subsequent to the step of executing the softwareinstaller to perform the reinstallation, the computer recordinginformation representative of a third view of the operating system; thecomputer executing an uninstaller to perform an uninstallation of thesoftware application; subsequent to the step of executing theuninstaller, the computer recording information representative of afourth view of the operating system; the computer performing checks onthe uninstallation; the computer generating a report using the recordedinformation representative of the first, second, third and fourth viewsof the operating system; responsive to the step of making thedetermination that the installation was successful, the computerdetermining a location for an installed shortcut for the softwareapplication; using the location, the computer extracting executable andcommand line information inside the shortcut; based on the extractedexecutable and command line information, the computer executing thesoftware application to perform a test of the software application;while the software application is executing, the computer sending aclose signal to a window of the software application; responsive to thestep of sending the close signal, the computer reading an exit code fromthe software application; the computer determining whether the exit codematches a standard exit code indicating the test of the softwareapplication was successful; responsive to a determination the exit codematches the standard exit code indicating the test of the softwareapplication was successful, the computer documenting in the report thatthe test of the software application is successful; or responsive to adetermination the exit code does not match the standard exit code, thecomputer documenting in the report that the test of the softwareapplication was unsuccessful; and for any other installed shortcut, thecomputer repeating the steps of determining the location, extracting theexecutable and command line information, executing the softwareapplication; sending the close signal, reading the exit code,determining whether the exit code matches the standard exit codeindicating the test was successful, and documenting that the test of thesoftware application was successful or unsuccessful.
 2. The method ofclaim 1, further comprising the step of prior to the step of executingthe software installer to create the installed components, the computerreading a configuration file, wherein the step of performing the checkson the installation includes: the computer determining an extension of afile name of the software installer is .msi; and responsive to the stepof determining the extension of the file name of the software installeris .msi: the computer determining whether a second exit code returnedfrom the installation matches a second standard exit code indicating theinstallation was successful based on the extension being .msi; thecomputer determining whether an event view of the operating systemincludes a product name identifying the software application; thecomputer determining whether a signature file in the configuration fileis included in the recorded information about the installed components;and responsive to a determination that the second exit code matches thesecond standard exit code, the event view includes the product name, andthe signature file is included in the recorded information about theinstalled components, the computer determining the installation wassuccessful; or responsive to a determination that the second exit codedoes not match the second standard exit code, the event view does notinclude the product name or the signature file is not included in therecorded information about the installed components, the computerdetermining the installation was unsuccessful.
 3. The method of claim 1,wherein the step of performing the checks on the installation includes:the computer determining an extension of a file name of the softwareinstaller is .exe; and responsive to the step of determining theextension of the file name of the software installer is .exe: thecomputer determining whether a second exit code returned from theinstallation matches a second standard exit code indicating theinstallation was successful based on the extension being .exe; thecomputer extracting a product name identifying the software applicationfrom a script or a source code providing the installation; the computerdetermining whether the extracted product name matches a product name inan uninstall registry key; and responsive to a determination that thesecond exit code matches the second standard exit code and the extractedproduct name matches the product name in the uninstall registry key, thecomputer determining the installation was successful; or responsive to adetermination that the second exit code does not match the secondstandard exit code and the extracted product name does not match theproduct name in the uninstall registry key, the computer determining theinstallation was unsuccessful.
 4. The method of claim 1, furthercomprising the steps of: based on checks on another installation of thesoftware application, the computer determining the other installationwas unsuccessful by the computer determining a second exit code returnedfrom the other installation does not match the standard exit code; thecomputer determining the second exit code indicates an existence of anautomated recovery from the other installation that was unsuccessful;the computer opening a file of the software installer for writeoperations; the computer modifying tables in the file to perform theautomated recovery; the computer closing the file; and the computerdesignating the automated recovery as successful.
 5. The method of claim1, further comprising the steps of: based on checks on anotherinstallation of the software application, the computer determining theother installation was unsuccessful by determining a signature file in aconfiguration file is included in the recorded information about theinstalled components, determining a product name extracted from a scriptof a source code providing the other installation does not match theproduct name in an uninstall registry key, or determining a second exitcode indicates a test of closing a window of the software application isunsuccessful, the test using executable and command line informationextracted from an installed shortcut of the software application; thecomputer opening a file of the software installer for write operations;the computer modifying tables in the file to perform an automatedrecovery from the installation that was unsuccessful; the computerclosing the file; and the computer designating the automated recovery assuccessful.
 6. The method of claim 1, wherein the step of performing thechecks on the reinstallation includes: the computer determining a secondexit code returned from the reinstallation matches a second standardexit code indicating the reinstallation was successful; the computerdetermining the selected installed components that had been removed weresubsequently restored in the reinstallation; the computer searching forand locating one or more messages in an event viewer of the operatingsystem, the one or more messages including a product name of thesoftware installer; and the computer adding to the report informationabout the second exit code matching the second standard exit codeindicating the reinstallation was successful, the selected installedcomponents being restored, and the one or more messages including theproduct name of the software installer.
 7. The method of claim 1,wherein the step of performing the checks on the uninstallationincludes: the computer determining an extension of a file name of thesoftware installer is .msi; and responsive to the step of determiningthe extension of the file name of the software installer is .msi: thecomputer determining a second exit code returned from the uninstallationmatches a second standard exit code indicating the uninstallation wassuccessful; the computer determining a product code for the installedcomponents does not exist in the fourth view of the operating system;the computer determining an event view of the operating system does notinclude a product name identifying the software application; and thecomputer determining a signature file in a configuration file is notincluded in the fourth view of the operating system.
 8. The method ofclaim 1, wherein the step of performing the checks on the uninstallationincludes: the computer determining an extension of a file name of thesoftware installer is .exe; and responsive to the step of determiningthe extension of the file name of the software installer is .exe: thecomputer determining a second exit code returned from the uninstallationmatches a second standard exit code indicating the uninstallation wassuccessful; the computer extracting a product name identifying thesoftware application from a script or a source code providing theinstallation; the computer determining the extracted product name doesnot exist in an uninstall registry key; and the computer determining asignature file in a configuration file is not included in the fourthview of the operating system.
 9. A computer system comprising: a centralprocessing unit (CPU); a memory coupled to the CPU; a computer-readable,tangible storage device coupled to the CPU, the storage devicecontaining instructions that are executed by the CPU via the memory toimplement a method of managing a software installer, the methodcomprising the steps of: the computer system recording informationrepresentative of a first view of an operating system of the computersystem; the computer system executing the software installer to createinstalled components in an installation of a software application;subsequent to the step of executing the software installer to create theinstalled components in the installation, the computer system recordinginformation representative of a second view of the operating system; thecomputer system determining and recording a change between the firstview and the second view, and based on the change, the computer systemrecording information about the installed components; the computersystem performing checks on the installation; based on the checks on theinstallation, the computer system making a determination that theinstallation was successful; responsive to the determination that theinstallation was successful, the computer system removing selectedinstalled components; the computer system executing the softwareinstaller to perform a reinstallation of the selected installedcomponents that had been removed; the computer system performing checkson the reinstallation; subsequent to the step of executing the softwareinstaller to perform the reinstallation, the computer system recordinginformation representative of a third view of the operating system; thecomputer system executing an uninstaller to perform an uninstallation ofthe software application; subsequent to the step of executing theuninstaller, the computer system recording information representative ofa fourth view of the operating system; the computer system performingchecks on the uninstallation; the computer system generating a reportusing the recorded information representative of the first, second,third and fourth views of the operating system; responsive to the stepof making the determination that the installation was successful, thecomputer system determining a location for an installed shortcut for thesoftware application; using the location, the computer system extractingexecutable and command line information inside the shortcut; based onthe extracted executable and command line information, the computersystem executing the software application to perform a test of thesoftware application; while the software application is executing, thecomputer system sending a close signal to a window of the softwareapplication; responsive to the step of sending the close signal, thecomputer system reading an exit code from the software application; thecomputer system determining whether the exit code matches a standardexit code indicating the test of the software application wassuccessful; responsive to a determination the exit code matches thestandard exit code indicating the test of the software application wassuccessful, the computer system documenting in the report that the testof the software application is successful; or responsive to adetermination the exit code does not match the standard exit code, thecomputer system documenting in the report that the test of the softwareapplication was unsuccessful; and for any other installed shortcut, thecomputer system repeating the steps of determining the location,extracting the executable and command line information, executing thesoftware application; sending the close signal, reading the exit code,determining whether the exit code matches the standard exit codeindicating the test was successful, and documenting that the test of thesoftware application was successful or unsuccessful.
 10. The computersystem of claim 9, wherein the method further comprises the step ofprior to the step of executing the software installer to create theinstalled components, the computer system reading a configuration file,wherein the step of performing the checks on the installation includes:the computer system determining an extension of a file name of thesoftware installer is .msi; and responsive to the step of determiningthe extension of the file name of the software installer is .msi: thecomputer system determining whether a second exit code returned from theinstallation matches a second standard exit code indicating theinstallation was successful based on the extension being .msi; thecomputer system determining whether an event view of the operatingsystem includes a product name identifying the software application; thecomputer system determining whether a signature file in theconfiguration file is included in the recorded information about theinstalled components; and responsive to a determination that the secondexit code matches the second standard exit code, the event view includesthe product name, and the signature file is included in the recordedinformation about the installed components, the computer systemdetermining the installation was successful; or responsive to adetermination that the second exit code does not match the secondstandard exit code, the event view does not include the product name orthe signature file is not included in the recorded information about theinstalled components, the computer system determining the installationwas unsuccessful.
 11. The computer system of claim 9, wherein the stepof performing the checks on the installation includes: the computersystem determining an extension of a file name of the software installeris .exe; and responsive to the step of determining the extension of thefile name of the software installer is .exe: the computer systemdetermining whether a second exit code returned from the installationmatches a second standard exit code indicating the installation wassuccessful based on the extension being .exe; the computer systemextracting a product name identifying the software application from ascript or a source code providing the installation; the computer systemdetermining whether the extracted product name matches a product name inan uninstall registry key; and responsive to a determination that thesecond exit code matches the second standard exit code and the extractedproduct name matches the product name in the uninstall registry key, thecomputer system determining the installation was successful; orresponsive to a determination that the second exit code does not matchthe second standard exit code and the extracted product name does notmatch the product name in the uninstall registry key, the computersystem determining the installation was unsuccessful.
 12. A computerprogram product, comprising: a computer-readable, tangible storagedevice; and a computer-readable program code stored in thecomputer-readable, tangible storage device, the computer-readableprogram code containing instructions that are executed by a centralprocessing unit (CPU) of a computer system to implement a method ofmanaging a software installer, the method comprising the steps of: thecomputer system recording information representative of a first view ofan operating system of the computer system; the computer systemexecuting the software installer to create installed components in aninstallation of a software application; subsequent to the step ofexecuting the software installer to create the installed components inthe installation, the computer system recording informationrepresentative of a second view of the operating system; the computersystem determining and recording a change between the first view and thesecond view, and based on the change, the computer system recordinginformation about the installed components; the computer systemperforming checks on the installation; based on the checks on theinstallation, the computer system making a determination that theinstallation was successful; responsive to the determination that theinstallation was successful, the computer system removing selectedinstalled components; the computer system executing the softwareinstaller to perform a reinstallation of the selected installedcomponents that had been removed; the computer system performing checkson the reinstallation; subsequent to the step of executing the softwareinstaller to perform the reinstallation, the computer system recordinginformation representative of a third view of the operating system; thecomputer system executing an uninstaller to perform an uninstallation ofthe software application; subsequent to the step of executing theuninstaller, the computer system recording information representative ofa fourth view of the operating system; the computer system performingchecks on the uninstallation; the computer system generating a reportusing the recorded information representative of the first, second,third and fourth views of the operating system; responsive to the stepof making the determination that the installation was successful, thecomputer system determining a location for an installed shortcut for thesoftware application; using the location, the computer system extractingexecutable and command line information inside the shortcut; based onthe extracted executable and command line information, the computersystem executing the software application to perform a test of thesoftware application; while the software application is executing, thecomputer system sending a close signal to a window of the softwareapplication; responsive to the step of sending the close signal, thecomputer system reading an exit code from the software application; thecomputer system determining whether the exit code matches a standardexit code indicating the test of the software application wassuccessful; responsive to a determination the exit code matches thestandard exit code indicating the test of the software application wassuccessful, the computer system documenting in the report that the testof the software application is successful; or responsive to adetermination the exit code does not match the standard exit code, thecomputer system documenting in the report that the test of the softwareapplication was unsuccessful; and for any other installed shortcut, thecomputer system repeating the steps of determining the location,extracting the executable and command line information, executing thesoftware application; sending the close signal, reading the exit code,determining whether the exit code matches the standard exit codeindicating the test was successful, and documenting that the test of thesoftware application was successful or unsuccessful.
 13. The programproduct of claim 12, wherein the method further comprises the step ofprior to the step of executing the software installer to create theinstalled components, the computer system reading a configuration file,wherein the step of performing the checks on the installation includes:the computer system determining an extension of a file name of thesoftware installer is .msi; and responsive to the step of determiningthe extension of the file name of the software installer is .msi: thecomputer system determining whether a second exit code returned from theinstallation matches a second standard exit code indicating theinstallation was successful based on the extension being .msi; thecomputer system determining whether an event view of the operatingsystem includes a product name identifying the software application; thecomputer system determining whether a signature file in theconfiguration file is included in the recorded information about theinstalled components; and responsive to a determination that the secondexit code matches the second standard exit code, the event view includesthe product name, and the signature file is included in the recordedinformation about the installed components, the computer systemdetermining the installation was successful; or responsive to adetermination that the second exit code does not match the secondstandard exit code, the event view does not include the product name orthe signature file is not included in the recorded information about theinstalled components, the computer system determining the installationwas unsuccessful.
 14. The program product of claim 12, wherein the stepof performing the checks on the installation includes: the computersystem determining an extension of a file name of the software installeris .exe; and responsive to the step of determining the extension of thefile name of the software installer is .exe: the computer systemdetermining whether a second exit code returned from the installationmatches a second standard exit code indicating the installation wassuccessful based on the extension being .exe; the computer systemextracting a product name identifying the software application from ascript or a source code providing the installation; the computer systemdetermining whether the extracted product name matches a product name inan uninstall registry key; and responsive to a determination that thesecond exit code matches the second standard exit code and the extractedproduct name matches the product name in the uninstall registry key, thecomputer system determining the installation was successful; orresponsive to a determination that the second exit code does not matchthe second standard exit code and the extracted product name does notmatch the product name in the uninstall registry key, the computersystem determining the installation was unsuccessful.
 15. A process forsupporting computing infrastructure, the process comprising the step of:a first computer system providing at least one support service for atleast one of creating, integrating, hosting, maintaining, and deployingcomputer-readable code in a second computer system, thecomputer-readable code containing instructions, wherein theinstructions, when carried out by a processor of the second computersystem, implement a method of managing a data package, the methodcomprising the steps of: the second computer system recordinginformation representative of a first view of an operating system of thesecond computer system; the second computer system executing thesoftware installer to create installed components in an installation ofa software application; subsequent to the step of executing the softwareinstaller to create the installed components in the installation, thesecond computer system recording information representative of a secondview of the operating system; the second computer system determining andrecording a change between the first view and the second view, and basedon the change, the second computer system recording information aboutthe installed components; the second computer system performing checkson the installation; based on the checks on the installation, thecomputer system making a determination that the installation wassuccessful; responsive to the determination that the installation wassuccessful, the second computer system removing selected installedcomponents; the second computer system executing the software installerto perform a reinstallation of the selected installed components thathad been removed; the second computer system performing checks on thereinstallation; subsequent to the step of executing the softwareinstaller to perform the reinstallation, the second computer systemrecording information representative of a third view of the operatingsystem; the second computer system executing an uninstaller to performan uninstallation of the software application; subsequent to the step ofexecuting the uninstaller, the second computer system recordinginformation representative of a fourth view of the operating system; thesecond computer system performing checks on the uninstallation; thesecond computer system generating a report using the recordedinformation representative of the first, second, third and fourth viewsof the operating system; responsive to the step of making thedetermination that the installation was successful, the second computersystem determining a location for an installed shortcut for the softwareapplication; using the location, the second computer system extractingexecutable and command line information inside the shortcut; based onthe extracted executable and command line information, the secondcomputer system executing the software application to perform a test ofthe software application; while the software application is executing,the second computer system sending a close signal to a window of thesoftware application; responsive to the step of sending the closesignal, the second computer system reading an exit code from thesoftware application; the second computer system determining whether theexit code matches a standard exit code indicating the test of thesoftware application was successful; responsive to a determination theexit code matches the standard exit code indicating the test of thesoftware application was successful, the second computer systemdocumenting in the report that the test of the software application issuccessful; or responsive to a determination the exit code does notmatch the standard exit code, the second computer system documenting inthe report that the test of the software application was unsuccessful;and for any other installed shortcut, the second computer systemrepeating the steps of determining the location, extracting theexecutable and command line information, executing the softwareapplication; sending the close signal, reading the exit code,determining whether the exit code matches the standard exit codeindicating the test was successful, and documenting that the test of thesoftware application was successful or unsuccessful.
 16. The process ofclaim 15, wherein the method further comprises the step of prior to thestep of executing the software installer to create the installedcomponents, the second computer system reading a configuration file,wherein the step of performing the checks on the installation includes:the second computer system determining an extension of a file name ofthe software installer is .msi; and responsive to the step ofdetermining the extension of the file name of the software installer is.msi: the second computer system determining whether a second exit codereturned from the installation matches a second standard exit codeindicating the installation was successful based on the extension being.msi; the second computer system determining whether an event view ofthe operating system includes a product name identifying the softwareapplication; the second computer system determining whether a signaturefile in the configuration file is included in the recorded informationabout the installed components; and responsive to a determination thatthe second exit code matches the second standard exit code, the eventview includes the product name, and the signature file is included inthe recorded information about the installed components, the secondcomputer system determining the installation was successful; orresponsive to a determination that the second exit code does not matchthe second standard exit code, the event view does not include theproduct name or the signature file is not included in the recordedinformation about the installed components, the second computer systemdetermining the installation was unsuccessful.
 17. The process of claim15, wherein the step of performing the checks on the installationincludes: the second computer system determining an extension of a filename of the software installer is .exe; and responsive to the step ofdetermining the extension of the file name of the software installer is.exe: the second computer system determining whether a second exit codereturned from the installation matches a second standard exit codeindicating the installation was successful based on the extension being.exe; the second computer system extracting a product name identifyingthe software application from a script or a source code providing theinstallation; the second computer system determining whether theextracted product name matches a product name in an uninstall registrykey; and responsive to a determination that the second exit code matchesthe second standard exit code and the extracted product name matches theproduct name in the uninstall registry key, the second computer systemdetermining the installation was successful; or responsive to adetermination that the second exit code does not match the secondstandard exit code and the extracted product name does not match theproduct name in the uninstall registry key, the second computer systemdetermining the installation was unsuccessful.