On-demand database service system and method for determining whether a developed application will operate properly with at least one other application

ABSTRACT

In accordance with embodiments, there are provided mechanisms and methods for determining whether a developed application associated with an on-demand database service will operate properly with at least one other application. These mechanisms and methods for providing such determination can enable embodiments to ensure that new versions of developed applications will operate in the same application environment of a previous version. The ability of embodiments to make such determination may lead to an improved application migration development/runtime framework, etc.

CLAIM OF PRIORITY

This application is a continuation of U.S. application Ser. No.12/192,943, filed Aug. 15, 2008, which claims the benefit of U.S.Provisional Patent Application 60/956,629 entitled “SYSTEM, METHOD, ANDCOMPUTER PROGRAM PRODUCT FOR VERSION LATCHING IN AN ON DEMANDAPPLICATION SERVICES PLATFORM,” by Craig Weissman, filed Aug. 17, 2007,the entire contents of both are incorporated herein by reference.

COPYRIGHT NOTICE

A portion of the disclosure of this patent document contains materialwhich is subject to copyright protection. The copyright owner has noobjection to the facsimile reproduction by anyone of the patent documentor the patent disclosure, as it appears in the Patent and TrademarkOffice patent file or records, but otherwise reserves all copyrightrights whatsoever.

FIELD OF THE INVENTION

The current invention relates generally to developer frameworks, andmore particularly to developing applications in an improved manner.

BACKGROUND

The subject matter discussed in the background section should not beassumed to be prior art merely as a result of its mention in thebackground section. Similarly, a problem mentioned in the backgroundsection or associated with the subject matter of the background sectionshould not be assumed to have been previously recognized in the priorart. The subject matter in the background section merely representsdifferent approaches, which in and of themselves may also be inventions.

In conventional database systems, users access their data resources inone logical database. A user of such a conventional system typicallyretrieves data from and stores data on the system using the user's ownsystems. A user system might remotely access one of a plurality ofserver systems that might in turn access the database system. Dataretrieval from the system might include the issuance of a query from theuser system to the database system. The database system might processthe request for information received in the query and send to the usersystem information relevant to the request.

There is often a desire to develop various applications for extendingcapabilities of the aforementioned database systems. To date, however,such applications have typically been developed in a manner independentof an intended application environment in which the developedapplication will operate. As a result, there is an increased chance thatthe developed application will not operate properly in such environment.This, in turn, may lead to various shortcomings in applicationmigration, etc.

BRIEF SUMMARY

In accordance with embodiments, there are provided mechanisms andmethods for determining whether a developed application associated withan on-demand database service will operate properly with at least oneother application. These mechanisms and methods for providing suchdetermination can enable embodiments to ensure that new versions ofdeveloped applications will operate in the same application environmentof a previous version. The ability of embodiments to make suchdetermination may lead to an improved application migrationdevelopment/runtime framework, etc.

In an embodiment and by way of example, a method is provided fordetermining whether a developed application associated with an on-demanddatabase service will operate properly with at least one otherapplication. In use, a developed application is received from adeveloper at an on-demand database service. Further, a data structure isprovided which describes aspects of the developed application. Stillyet, there is an identification of information associated with at leastone other application of at least one subscriber with which thedeveloped application is to operate. By this framework, it may bedetermined whether the developed application and the at least one otherapplication will properly operate together, utilizing the data structureand the information.

While the present invention is described with reference to an embodimentin which techniques for determining application interoperability areimplemented in an application server providing a front end for amulti-tenant database on-demand service, the present invention is notlimited to multi-tenant databases or deployment on application servers.Embodiments may be practiced using other database architectures, i.e.,ORACLE®, DB2® and the like without departing from the scope of theembodiments claimed.

Any of the above embodiments may be used alone or together with oneanother in any combination. Inventions encompassed within thisspecification may also include embodiments that are only partiallymentioned or alluded to or are not mentioned or alluded to at all inthis brief summary or in the abstract. Although various embodiments ofthe invention may have been motivated by various deficiencies with theprior art, which may be discussed or alluded to in one or more places inthe specification, the embodiments of the invention do not necessarilyaddress any of these deficiencies. In other words, different embodimentsof the invention may address different deficiencies that may bediscussed in the specification. Some embodiments may only partiallyaddress some deficiencies or just one deficiency that may be discussedin the specification, and some embodiments may not address any of thesedeficiencies.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a system for verifying that a developed applicationassociated with an on-demand database service will operate properly withat least one other application, in accordance with one embodiment.

FIG. 2 shows a method for determining whether a developed applicationassociated with an on-demand database service will operate properly withat least one other application, in accordance with one embodiment.

FIG. 3 shows a system for verifying that a developed applicationassociated with an on-demand database service will operate properly withat least one other application, in accordance with another embodiment.

FIG. 4 shows a method for enforcing the inclusion of tests in adeveloped application, in accordance with one embodiment.

FIG. 5 shows a method for validating a developed application, inaccordance with one embodiment.

FIG. 6 shows a method for runtime invocation of an appropriate versionof program instructions in an on-demand database service, in accordancewith one embodiment.

FIG. 7 illustrates a block diagram of an example of an environmentwherein an on-demand database service might be used.

FIG. 8 illustrates a block diagram of an embodiment of elements of FIG.7 and various possible interconnections between these elements.

DETAILED DESCRIPTION

General Overview

Systems and methods are provided for verifying that a developedapplication associated with an on-demand database service will operateproperly with at least one other application.

In the development of applications for use with database systems, manychallenges exist resulting from the fact that applications havetypically been developed in a manner independent of an intendedapplication environment in which the developed application will operate.As a result, there is an increased chance that the developed applicationwill not operate properly in such environment. Thus, mechanisms andmethods provided herein for verifying adequate operation can enableembodiments to ensure that new versions of developed applications willoperate in the same application environment of a previous version. Theability of embodiments to make such determination may lead to animproved application migration development/runtime framework, etc.

Next, mechanisms and methods will be described for verifying that adeveloped application associated with an on-demand database service willoperate properly with at least one other application, in accordance withvarious exemplary embodiments.

FIG. 1 illustrates a system 100 for verifying that a developedapplication associated with an on-demand database service 102 willoperate properly with at least one other application, in accordance withone embodiment. In the context of the present description, an on-demanddatabase service may include any service that relies on a databasesystem that is accessible over a network.

In one embodiment, the on-demand database service 102 may include amulti-tenant on-demand database service. In the present description,such multi-tenant on-demand database service may include any servicethat relies on a database system that is accessible over a network, inwhich various elements of hardware and software of the database systemmay be shared by one or more customers. For instance, a givenapplication server may simultaneously process requests for a greatnumber of customers, and a given database table may store rows for apotentially much greater number of customers.

As shown, the on-demand database service 102 communicates with aplurality of developers 104. In use, the on-demand database service 102is adapted to receive developed applications from the developers 104. Inthe context of the present description, the developers 104 may includeany one or more persons or entities (e.g. corporation, organization,etc.) that develop computer code. Further, the applications may includeany computer code (e.g. a complete program, a partial program, a codesegment, etc.).

In addition, the on-demand database service 102 communicates with one ormore tenants 106 of the on-demand database service 102. In theaforementioned embodiment where the on-demand database service 102includes a multi-tenant on-demand database service, a plurality of thetenants 106 may exist. In any case, a tenant refers to any one or morepersons or entities that are capable of accessing the on-demand databaseservice 102, in the present description. For example, the tenant(s) 106may subscribe to the on-demand database service 102.

By this design, the on-demand database service 102 serves to provideaccess to the applications to the tenant(s) 106 of the on-demanddatabase service 102. In use, the aforementioned applications may beunder the control of the on-demand database service 102. Byadministering such control, an improved development/runtime framework,etc. is thereby provided.

In various embodiments, such control may be administered in any desiredmanner. For example, the on-demand database service 102 may enforce anydesired policies by precluding access to applications by the tenant(s)106, in situations where the applications do not adhere to the policies.In other embodiments, the on-demand database service 102 may enforcesuch policies by precluding or limiting functionality accessible to thedevelopers 104, in such non-compliant scenario. For example, publicationof an application to the on-demand database service 102 may bedisallowed in the absence of meeting certain requirements. In onespecific embodiment, the on-demand database service 102 may monitor andlimit various aspects of the applications and terminate related code,based on a dynamic contextual limiter. Of course, the foregoing controlmay be implemented in any desired manner.

In one embodiment, the aforementioned control may take the form oflimiting at least one aspect of the applications by the on-demanddatabase service 102. For instance, such aspect may relate toprocessing, storage, bandwidth, etc. resources made available to theapplications of the developers 104. By this design, the on-demanddatabase service 102 may be able constrain the developers in a way thatoptimizes the ability of the on-demand database service 102 to servicethe tenant(s) 106 via the applications.

In various embodiments, such resources-related aspect may involve adatabase associated with the on-demand database service 102, a manner inwhich such database may be accessed utilizing the applications, etc. Insuch embodiments, the foregoing aspect may include, but is not limitedto a number of columns of a database, a number of queries to a databasein a predetermined timeframe, a number of rows returned by queries, anumber of database statements (e.g. modification statements, etc.), anumber of script statements between database statements, a number ofrows processed (e.g. modified, etc.) in a predetermined timeframe, anumber of transaction statements, a total number of uncommitted rowssince a last transaction control statement, a total number of scriptstatements since a last database call, a duration of processing, etc.

Of course, such exemplary list is not to be construed as limiting. Forexample, any aspect of the on-demand database service 102 (e.g.electronic mail management, etc.) may also be limited as well. In onespecific instance, a number of e-mails one can send per request and/or anumber of outbound web service calls made per request, may be limited.In various embodiments, limits may be applied to an application on aper-request basis or on a per-time-period (e.g. per day) basis. In thelatter embodiment, such limitation may apply on a per-user or per-tenantbasis.

In other embodiments, a development of the applications may becontrolled. For example, the applications may be controlled by imposingrequirements of the on-demand database service 102 that the applicationsbe tested (e.g. validated, etc.). Such testing may, in one embodiment,be natively run in an automated manner, by way of a call made to anapplication program interface associated with the on-demand databaseservice 102.

In other aspects of the present embodiment involving developmentcontrols, the on-demand database service 102 may require that functionaltests be written for applications and further require a predeterminedpercentage of code coverage. In this embodiment, such technique mayallow one to run such tests whenever the on-demand database service 102is modified, to reduce the risk of accidentally breaking workingapplications. By this design, regression and/or any other negativetraits may be avoided.

in still additional embodiments, access to the applications by thetenant(s) 106 of the on-demand database service 102 may be controlled.For instance, a single instance of each application may be instantiatedamong a plurality of the tenant(s) 106 of the on-demand database service102. Thus, only a single copy of the application need be stored by theon-demand database service 102, and simultaneously shared amongst thetenant(s) 106 in the foregoing manner.

In vet another embodiment, the on-demand database service 102 may beutilized to determine whether a developed application associated withthe on-demand database service 102 will operate properly with anotherapplication. In this case, the developed application may be receivedfrom one of the developers 104 at an on-demand database service 102. Adata structure may then be provided which describes aspects of thedeveloped application. Information associated with at least one otherapplication of one or more of the subscribers or tenants 106, with whichthe developed application is to operate, is identified. By thisframework, it may be determined whether the developed application andthe at least one other application will properly operate together,utilizing the data structure and the information.

In various embodiments, the on-demand database service 102 may beimplemented to ensure adequate operation of a first applicationassociated with the on-demand database service 102 and a secondapplication, or a different version of the first application. Forexample, in one embodiment, a developed application may be received atan on-demand database service 102 and it may be determined whether atleast one test is provided. In this case, the test may include a testfor testing whether a first application operates properly with a secondapplication. The developed application may then be conditionallyvalidated based on the determination.

In another embodiment, a developed application may be received at theon-demand database service 102 and the developed application may bevalidated. The developed application may then be conditionallydistributed based on the validation.

In still another embodiment, program instructions of an application maybe received at the on-demand database service 102. A version of theprogram instructions to be invoked may then be determined. Furthermore,an appropriate portion of the program instructions may be invoked basedon the determined version.

It should be that the forgoing control may be static or dynamic, may ormay not be uniformly applied, etc. For example, the foregoing aspectsand related control criteria may or may not be different for differentapplications, tenants 106, etc. Just by way of example, the on-demanddatabase service 102 may allow for more resources when running anupgrade script, with respect to when running a per-row database trigger,etc. Further, the on-demand database service 102 may allow for moreresources for large tenants 106, etc.

FIG. 2 shows a method 200 for determining whether a developedapplication associated with an on-demand database service will operateproperly with at least one other application, in accordance with oneembodiment. As an option, the present method 200 may be implemented inthe context of the on-demand database service 102 of FIG. 1. Of course,however, the method 200 may be carried out in any desired environment.The aforementioned definitions may apply during the present description.

As shown, a developed application is received from a developer at anon-demand database service. See operation 202. A data structuredescribing aspects of the developed application is then created. Seeoperation 204.

The aspects described by the data structure may include any number ofaspects. For example, in various embodiments, the aspects may include aversion identifier, a schema, a message shape, a semantic behavior,uniform resource locators, etc.

Additionally, information associated with at least one other applicationof at least one subscriber with which the developed application is tooperate is identified. See operation 206. Further, it is determinedwhether the developed application and the at least one other applicationwill properly operate together, utilizing the data structure and theinformation. See operation 208.

As an option, the at least one subscriber and the developer may beallowed to edit at least one component of the developed application. Forexample, if it is determined that the developed application and the atleast one other application will not properly operate together, at leastone of the developer and the subscriber may be allowed to edit thedeveloped application. In this case, the at least one component mayinclude a field. For example, the field may be a field associated withthe developed application or the at least one other application thatwill not allow the applications to properly operate together.

In one embodiment, a plurality of versions of the developed applicationmay be tracked to determine which versions a plurality of thesubscribers are utilizing. In this case, the tracking may be performedto ensure that subscribers are migrating towards the use of thedeveloped application.

In another embodiment, information may be received by an on demandapplication services platform. In this case, such information mayinclude program code comprising an application capable of being run bythe platform. Further, the application may be associated with at leastone indication of a version. In addition, the information may be storedas metadata in association with the version, enabling changes to theapplication to be tracked using the version.

Thus, the platform may store applications as metadata on behalf of auser organization. As an option, all development by an organization maybe accomplished in separate development organizations, which may beginby representing metadata copies of the organization.

Additionally, all of the configuration changes made by an organization(e.g. organization permission, black tab settings, and all metadata,etc.) may be captured in a portable metadata file format and may bestored in a source code control system, such that a developmentorganization for that customer may be created from first principlesusing only metadata application programming interfaces (APIs).

As an option, multiple developers may each have their own developmentorganization. In one embodiment, multiple developers may sharein-process changes with one another using metadata APIs based onXML-representations of those changes and a project manifest (e.g. a filethat may point at all the top-level entities/files in that project).Inside the development organization, that project may be represented asan unmanaged package, which may be used to keep track of what objectsare needed by that project. The file system manifest may be kept up todate with this database project, such that all developers might see thesame work items for a project.

As an option, a metadata spider may maintain the database project aschanges are made that may require several objects to be added to themanifest. For example, one presentation by the metadata spider may be“Here are the other things/think you need to add now, which would youlike to include?” Once the changes are developed and tested, thosechanges may then be applied to the production organization using adeployment API.

In one embodiment, production organizations may integrate with standardfunctionality provided by the on-demand service provider as well asmanaged installed exchange applications. These customizations may bindto an exact major version number for those applications (e.g. thesettings may represent metadata that the organization controls) anddevelopers may have the ability to choose when to upgrade to new majorversions of those applications.

As an option, customizations may be implemented by an organization to amanaged package (e.g. to the subscriber controlled fields). In thiscase, a developer row may be partitioned from the subscriber row, eitherin the data structure explicitly, or in the file format. For example,there may be an explicit “overlay” file format for subscribercustomizations and the changes may be included as part of the manifestfile.

To produce a new development organization (e.g. a new workspace) for anexisting application, a developer may signup for a new organization, andmay specify an application namespace, password, and a version from whichthe developer is branching. This may install all necessary applications(e.g. dependent managed applications) and may place the applicationnamespace into a development mode, which may make its componentseditable. Multiple developers working on the same application, or aversion of that application, may communicate and share in-progresschanges, by using source code control and metadata APIs, for example.

In one embodiment, a portion of the application definition may includethe dependencies on other managed applications and/or on features,permissions, and editions. The testing environment provided by theplatform may allow testing the application in all allowedconfigurations, which may include target organization edition settings.This may involve creating throw-away test organizations with thoseeditions, installing all the code, and/or running the code. Further, thetesting code may be allowed to emulate the different editions orsettings in-place in the developer organization temporarily, withoutcommitting any of those changes.

As an option, for a new major version of an application, all componentscapable of being referenced may be flagged with a minimum version stampwith this new version. In one embodiment, the reference-able componentsmay include schema (e.g. objects and fields, etc.) and/or Apex codeidentifiers. Also, if the application developer wishes to end-of-lifecertain elements (e.g. deprecate the components, etc.), this informationmay be included as part of the version metadata. For example, the lastreleased version may become the max version for that component.

Once development and testing are finished for a version, one of thosedevelopment organizations may be used to upload the new version. A newversion number may then be created. For example, a branched dot releaseversion number may be created when there are branches. A new version rowmay also be created in an application version global table. The presenceof this row may now invalidate the previous version of the developmentorganization, since that version may represent a non-current version ofthe application.

In one embodiment, version numbering may be implemented using a standardnotion of major and minor releases as well as branching. As an option,focused versioning may be implemented such that versions are numeric andmonotonically increasing along each branch line. In another embodiment,a three level number schema may be implemented for the versioning, wheremajor releases such as 1.0.0 and 2.0.0 may be for introducing bigfunctionality, new schema, and/or for changing the public signature ofApex code and schema objects (e.g. adding and dropping, etc.).

In this case, sub-major releases may be branches. These may allow addingnew functionality to one major release while developing another majorrelease. Additionally, sub-major versions may allow merging to anothermajor version. For example, sub-major version numbers may include 2.1,2.2, 3.1, etc.

In this way, the first two numbers of the fully qualified version maydetermine the public signature of the application version in use. Thus,the term “version” may refer to major and sub-major version numbers(e.g. an x.y portion of the version number).

In one embodiment, every externally addressable component of anapplication may receive a minimum version number, which may correspondto the version in which it was added. The application developer may alsoend-of-life (e.g. deprecate, etc.) a component by indicting that thecomponent no longer appears in the version currently under development.This may mean that the component has a max version which is equal to thebase version from which the current work is being developed. For thesereasons, higher versions of an application may no longer be a super-setof lower-numbered versions. Thus, all dependencies may bind to an exactversion number.

In the context of the present description, externally addressablecomponents may include schema components (e.g. custom objects, customfields, etc.), Apex identifiers (e.g. types, variables, methods, etc.),and all other top-level metadata components that may be referenced (e.g.profiles may refer to layouts, workflow rules may refer to workflowactions, etc.). Accordingly, custom objects and fields may be given amax version, which may allow for deprecation. The same may be true forApex Identifiers.

In one embodiment, all managed applications that interact with othermanaged applications may specify the exact version on which they depend.As an option, this may be exported as part of the metadata for anapplication version. Similarly, the code within an organization mayspecify exactly what version of an application is in use and/or isdepended upon.

In this case, an organization version bundle may be utilized. Anorganization version bundle may include a set of application versionnumbers. As an option, each organization may have at least one versionbundle, where a default bundle corresponds to all customizations in thatorganization and/or versions of the installed applications that wereassumed when Apex Code or other customizations were authored.

In one embodiment, application developers may write their most recentcode to be backwards compatible for old versions. This may beaccomplished by exposing (e.g. in Apex Code) new runtime access to theversion number of the current request. Application developers may beable to switch on this information to emulate old behavior.

In some cases, application developers may be responsible for enforcingrules such that semantics do not change for old versions. To facilitatethis, test code may be ran as a old versions of that application, suchthat a developer may assert and/or test that old behaviors still work,even if the newest version of that application may behave differently.

In one embodiment, the metadata APIs may refer to top-level metadataobjects by name. This may increase ability of a user to edit thosefiles. Names may either be internal to the organization or application,or they may be references to names in other managed applications.References within an organization/application version may all be changedat once.

Between applications, the base application developer may be able torename identifiers or deprecate the identifiers. In this way, themetadata for an application may include the old names of identifiers asfar back as version information is needed for versions that may still besupported. Because extension developers may always bind to exactversions of other applications, the names may be immutable for all time,even if a new version of that application is pushed forward into thesubscribing organization.

When an application version is installed, a symbol table may bematerialized in the subscriber organization that may represent a mappingof a version bundle, entity type, and/or entity name to the ID of thatrow in the organization. All compile and/or metadata API operations mayuse this symbol table for name resolution.

By using latched version bundles (e.g. which may assert the image of anapplication in use by the organization), installing a new version of anapplication into an organization may not change the view of thatapplication for the subscribing organization. Furthermore, if anorganization is ready to use functionality in the new version of anapplication, that subscribing organization may change its currentversion bundle to point at the new version before any of those changes,in signatures or functionality, are observed. As an option, this mayfirst be done in a test environment.

In addition, the minimum installed version of an application in anorganization may be tracked, since there may be several differentversion bundles in the organization specifying different versionnumbers. Thus, any elements whose max version is less than the minimumversion in use in the subscribing organization may be withheld frominstall.

In one embodiment, the minor version number, mentioned above, may beused for changing (e.g. fixing) items such as Apex code. Apex pages,documents, etc. As an option, these changes may be pushed to allsubscribing organizations. As another option, minor versions may notchange the public signature of any processes or schema objects. Thus,any version replacement may be transparent to the subscribingorganization.

In one embodiment, only the most current minor version of an applicationmay be installed. New minor versions may be pushed to all subscriberorganizations within a short window. For example, new minor versions maybe pushed via a reliable, restart-able background process.

It should be noted that the metadata for a new major version may also bepushed into all organizations without changing the behavior of thatapplication for the subscribing organizations, as long as thatapplication was written properly for backwards compatibility. Thus, theversion installed in an organization may be different from the versionin use by the organization. The latest code may be installed withoutchanging the semantics.

In this way, a partner customer may change the internal operation oftheir application as long as the public semantics remain the same. Forthis reason, upgrades may be pushed to the head major version of anybranch that a subscriber organization may be using. However, in general,the partner may not force subscribers to change their semantic usage ofthe old version.

On the other hand, communication between a partner and their subscribersmay be encouraged. An organization for a partner application may allowthe partner to observe who has installed that application and/or whatversions are currently in use (e.g. via the version bundles, or minimumversion, etc.).

In most cases, the partner may not remove any elements that are in useby a version that is still being used in some subscriber organization.However, once a custom field is no longer visible to any subscribingorganization, it may be removed. This may occur along time afterdeprecation. As an option, the partner may be able to indicate theminimum version of an application that may be installed by neworganizations.

FIG. 3 shows a system 300 for verifying that a developed applicationassociated with an on-demand database service 302 will operate properlywith at least one other application, in accordance with anotherembodiment. As an option, the present system 300 may be implemented inthe context of the architecture and functionality of FIGS. 1-2. Ofcourse, however, the system 300 may be carried out in any desiredenvironment. Again, the aforementioned definitions may apply during thepresent description.

As shown, the on-demand database service 302 remains in communicationwith a developer 304 and at least one end user tenant 306 via a network308. Further, the on-demand database service 302 includes an applicationserver 310 that interfaces with the developer 304 and user tenant 306differently. Specifically, the application server 310 may interface withthe developer 304 during a compile-time phase, and the user tenant 306during a runtime phase.

For example, the application server 310 is adapted to receive programlanguage instructions (e.g. script, etc.) from the developer 304 whomay, in one embodiment, intend to extend an API of the on-demanddatabase service 302. In response to receiving such script, theapplication server 310 processes (e.g. compiles, etc.) and stores thesame in a database 312. As an option, such processing may furtherinclude any of the desired controls and/or updates mentioned earlier, tomake sure that the developer 304 employs best practices, or any otherpredetermined practices in script development. In one embodiment, suchcompiled script may be stored in the form of metadata, for use inresponse to requests from the end user tenant 306. By this feature, thescript may be adapted to be triggered in response to a particularassociated request (e.g. request to select, access, modify, etc. anobject) from the end user tenant 306.

Specifically, the application server 310 is further adapted forreceiving requests from the end user tenant 306. In response to suchrequests, they are processed utilizing a run-time interpreter 314 of theapplication server 310, by using such request to identify and retrievethe correlating compiled script from the database 312. The run-timeinterpreter 314 is further equipped with the ability to processing thecompiled script. The compiled script thus may dictate the manner inwhich the request is fulfilled, etc.

FIG. 4 shows a method 400 for enforcing the inclusion of tests in adeveloped application, in accordance with one embodiment. As an option,the present method 400 may be implemented in the context of thefunctionality and architecture of FIGS. 1-3. Of course, however, themethod 400 may be carried out in any desired environment. Theaforementioned definitions may apply during the present description.

As shown, a developed application is received at an on-demand databaseservice. See operation 402. Further, it is determined whether at leastone test is provided. See operation 404.

In one embodiment, the test may be provided by a developer of thedeveloped application. As an option, the test may be provided with thedeveloped application. Once it is determined whether a test is provided,the developed application is conditionally validated based on thedetermination. See operation 406.

In one embodiment, it may be determined whether the at least one testmeets predetermined criteria. As an option, the predetermined criteriamay include a test result. For example, the test may be executedutilizing known parameters and it may be determined whether theexecution results in an acceptable predetermined result. In some cases,the predetermined result may include a standard deviation such that theresult of the execution may be within a range of values.

In another embodiment, the predetermined criteria may include athreshold. In this case, the test may be executed and it may bedetermined whether a result of the execution is within a threshold. Instill another embodiment, the test may be executed and it may bedetermined whether the execution resulted in an error.

In yet another embodiment, it may be determined whether the at least onetest adequately tests whether the developed application is capable ofexecuting a predetermined version thereof. For example, the developedapplication may include new or updated computer code, variables,variable names, methods, lists, and/or various other objects. In thiscase, the test may test whether the developed application is capable ofexecuting at least a portion of an older version of the application,which may be included in the developed application.

As an option, the developed application may be conditionally validatedbased on at least one of the determinations, such as whether the testmeets predetermined criteria and/or whether the at least one testadequately tests whether the developed application is capable ofexecuting a predetermined version.

In one embodiment, the at least one test may test whether the developedapplication is capable of invoking different portions of programinstructions based on a determined version. For example, the determinedversion may include an older or more recent version of the developedapplication. In this case, the program instructions may include anyinstructions or code associated with the developed application.

In some cases, the at least one test may test whether the application iscapable of operation such that a first portion of the programinstructions is invoked if during runtime, it is determined that a firstversion of the program instructions is to be invoked, and a secondportion of the program instructions is invoked if, during runtime, it isdetermined that a second version of the program instructions is to beinvoked.

In this case, the first version of the program instructions and thesecond version of the program instructions may both be included with theapplication. The first and second version may be an older and a morerecent version where at least one aspect of the versions is different.For example, the first version of the program instructions and thesecond version of the program instructions may differ with respect to atleast one method, at least one class, or at least one variable.

As an option, it may be determined whether the at least one test isincluded with the developed application. In one embodiment, thevalidation of the developed application may be based on thedetermination. For example, it may be determined whether a testcorresponding to a known change between a first and second version isincluded with the developed application. If the test is included, thetest may be executed and the validation may be determined based on aresult of the execution. If the test is not included, the developedapplication may not be validated.

In one embodiment, a developer may be forced to write a test thatemulates a first version of at least a portion of an application, suchthat it may be determined that the first version of the at least aportion of the application functions adequately with a second version ofthe application. In this way, a test may be written in emulation modesuch that it may be determined that an older version of an applicationfunctions adequately with a newer version of the application.Furthermore, it may be determined that the older version of theapplication functions adequately if the older version functions in asame or a similar manner to the functionality of the older versionbefore the older version of the application was incorporated in a newerversion of the application.

As an example, a developer may develop a first version of an applicationincluding the pseudo-code shown in Table 1.

TABLE 1 global integer m (string s) % % where m is any method { if (s ==“a”) return 1; else return 2; }

Subsequently, the developer may determine that an array of integers isto be returned and that the string “s” should not be compared to “a,”but rather “x.” Accordingly, the developer may create a second versionof the application that includes the pseudo-code shown in Table 2.

TABLE 2  c deprecated global integer m (string s) { return m(s)[0]; }global integer [ ] m(string s) { if (system.client_version < 2) { if (s== “a”) return new_integer[ ] {1}; }  return new_integer[ ] {5,6}; }

In this way, it may be determined, at runtime, which version of theapplication is being utilized. Based on this determination, code orvariables associated with an old version may be utilized if it isdetermined an older version is being used, and code or variablesassociated with a new version may utilized if it is determined a newversion is being used (e.g. in this case (5, 6), etc.).

Additionally, a test may be included in the application to determinewhether behavior associated with an older version of the applicationfunctions adequately or correctly in an updated version of theapplication. For example, Table 3 shows pseudo-code for a test that maybe included in the application to test whether the first version of theapplication operates adequately when implanted in the second updatedversion, in accordance with the example above.

TABLE 3 clstest (version = 1) test system assert vals (1, m (‘a’));system assert vals (2, m (‘x’));

Thus, at least a portion of an application may be tested, as if it werethe first version, and it may be determined whether the values used inthe test function the same in the second version of the application. Inthis way, a test may emulate a particular client and/or at least aportion of an application. Furthermore, runtime code may test whatversion should be utilized, and the correct code may be utilized. In oneembodiment, the testing method described in the context of FIG. 4 may beimplemented such that users of an on-demand database service may buildon a platform provided by the on-demand database service.

FIG. 5 shows a method 500 for validating a developed application, inaccordance with one embodiment. As an option, the present method 500 maybe implemented in the context of the functionality and architecture ofFIGS. 1-4. Of course, however, the method 500 may be carried out in anydesired environment. Again, the aforementioned definitions may applyduring the present description.

As shown, a developed application is received at an on-demand databaseservice. See operation 502. Additionally, the developed application isvalidated. See operation 504. Still yet, the developed application isconditionally distributed based on the validation. See operation 506.

In one embodiment, the developed application may not be distributed ifthe developed application is not validated. On the other hand, thedeveloped application may be distributed if the developed application isvalidated. In these cases, the validation may include implementingvarious techniques to validate the developed application.

In one embodiment, the validation may validate whether the developedapplication is capable of executing a predetermined version thereof. Forexample, a first older version of the application may be incorporated ina second more recent version of the application. In this case, thevalidation may include validating whether the second version of theapplication is capable of adequately operating functionality associatedwith the first version.

In another embodiment, the validation may validate whether the developedapplication is capable of invoking different portions of programinstructions based on a determined version. For example, the validationmay validate whether the application is capable of operation such that afirst portion of the program instructions is invoked if, during runtime,it is determined that a first version of the program instructions is tobe invoked, and a second portion of the program instructions is invokedif during runtime, it is determined that a second version of the programinstructions is to be invoked. In this case, the first version of theprogram instructions and the version of the program instructions mayboth be included with the developed application.

Furthermore, the first version of the program instructions and thesecond version of the program instructions may differ with respect to atleast one method, at least one class, or at least one variable. As anoption, a developer may be prevented from changing the developedapplication in a manner that would cause a loss of functionality of aprevious version of the developed application. For example, a developersystem may explicitly prevent the developer from removing or otherwisemaking changes that would break a pre-existing version of theapplication. Additionally, a developer may be prevented from modifyingor deleting portions of a developed application that would cause anyproblems in a subscriber organization (e.g. with an older version of theapplication, etc.) if that new version were pushed to the subscriber.

In still another embodiment, the validation may include running at leastone test on the developed application. As noted above, the at least onetest may be included with the developed application. Additionally, itmay be determined whether the at least one test runs as of a previousversion of the developed application.

For example, a syntax for annotating that a test should run “as of” anolder version may be included in the test and/or the developedapplication. Furthermore, a runtime mechanism may be included fortesting what version a subscriber thinks the subscriber is runningwithin the actual code. In this case, the developed application mayinclude at least one test for determining, in run-time, a version of thedeveloped application a subscriber of the on-demand database service isrunning, from the point of view of the subscriber.

In one embodiment, all lines of real code that address differentversions may be required to be covered by the test code for validation.Thus, even if an application has a relatively high test coverage, theseversion-specific lines must be 100% covered. In this way, the validationmay include determining whether a predetermined level of computer codecoverage is present in the developed application. The developedapplication may then be validated if the predetermined level of computercode coverage is present in the developed application. If thepredetermined level of computer code is not present, uploading of theapplication may be prevented.

The developed application may be distributed utilizing a variety oftechniques. For example, the developed application may be distributedutilizing push technology. In the one embodiment, the developedapplication may be asynchronously distributed utilizing push technology.In still another embodiment, the developed application may bedownloaded. As an option, only updated portions of the developedapplication may be distributed.

FIG. 6 shows a method 600 for runtime invocation of an appropriateversion of program instructions in an on-demand database service, inaccordance with one embodiment. As an option, the present method 600 maybe implemented in the context of the functionality and architecture ofFIGS. 1-5. Of course, however, the method 600 may be carried out in anydesired environment. The aforementioned definitions may apply during thepresent description.

As shown, program instructions of an application are received at anon-demand database service. See operations 602. Additionally, a versionof the program instructions to be invoked is determined. See operation604. Furthermore, an appropriate portion of the program instructions isinvoked based on the determined version. See operation 606.

In one embodiment, the version may be determined utilizing versioninformation associated with a subscriber of the on-demand databaseservice. For example, a subscriber may be utilizing a first version ofthe program instructions which correspond to an older version of theprogram instructions. On the other hand, a second updated version of theprogram instructions associated with the developed application may beavailable.

In this case, the application may be pushed to a plurality ofsubscribers (e.g. asynchronously, etc.). At least one of the subscribersmay be relying on functionality associated with the first version andmay determine that the first version should continue to be used. Thus,the appropriate portion of the program instructions may be invoked basedon this determination.

In one embodiment, a test included with the program instructions may beapplied to the version information to identify the appropriate portionof the program instructions to be invoked. In this case, the test mayinclude determining which version of program instructions are to beutilized based on the version information. The version information mayinclude a version number, aversion date, a last modified date, and/orvarious other version information.

In one embodiment, a first portion of the program instructions may beinvoked if it is determined that a first version of the programinstructions is to be invoked, and a second portion of the programinstructions may be invoked if it is determined that a second version ofthe program instructions is to be invoked. In this case, the firstversion of the program instructions and the second version of theprogram instructions may both be included with the application.

Furthermore, the first version of the program instructions and theversion of the program instructions may differ with respect to at leastone method, at least one class, and/or at least one variable. Forexample, the first version of the program instructions may be a previousversion and the second portion of the program instructions may be alater version. In this case, the first version of the programinstructions may be marked in accordance with a predetermined format.For instance, the program instructions may be marked in a mannerindicating a version (e.g. utilizing a version number, etc.), a subclassof a version (e.g. utilizing an extension of a version number, etc.), orother marking techniques.

Using these techniques, a push upgrade of a developed application may beallowed such that software components may be formally version releasedin a manner that a developer may evolve the upgrade package so existinginstallations are not disrupted. Furthermore, subscribers of anon-demand database service may be allowed to switch to later updatedversions of applications in a predictable, testable manner.

Versioning may be implemented to formalize the extension and referenceconcept between software applications. Traditionally, most components ofan application could be referenced in a manner defined by thesubscriber. However, by utilizing private components, an on-demanddatabase service may prevent such references. Versioning and deprecationallows the restriction of references to global components.

This may be accomplished using various techniques, as noted above. Forexample, components (e.g. classes, variables, methods, etc.) included inan application may export a minimum and a maximum version of theapplication in which they reside. Additionally, references to acomponent may be made in a particular version bundle context which is anextension of an application version. Further, a version bundle mayspecify an application version of the on-demand database serviceprovider as well as a single version for each application (i.e. anamespace, etc.) that may be referenced from that context.

Still yet, all references to components may be implemented within aparticular bundle context. In this way, extension components may store aspecific version bundle ID and may operate at runtime with that versionbundle, which may be different from the initiating version bundle of therequest. In one embodiment, all entry points (e.g. API calls, etc.) mayinclude a version bundle context.

Using version information associated with the components (e.g. theversion ID, etc.), a developer may end-of-life a component by deletingthe component. In this case, the component may appear in a project listwith an associated undelete link.

In the case of some class identifiers (e.g. Apex class identifiers,etc.) and some VF attributes, etc., the developer may indicate that anidentifier is removed by using an indicator (e.g. a tag, a token, aflag, etc.), such as an “@deprecated” annotation. In this case, the@deprecated token may only be allowed for identifiers that have alreadybeen managed released. If the identifiers have not been managedreleased, an error may result. In these cases, once an identifier isuploaded in the @deprecated state, the identifier must retain the@deprecated annotation. Losing the @deprecated annotation may result ina new error.

When deprecating a type, all identifiers within that type may also beimplicitly deprecated (e.g. inner or outer types). In one embodiment,the child identifiers may not be deprecated in this manner. For example,if the child identifiers are configured such that they are unable to beviewed when the surrounding parent identifier is unable to be viewed,the child identifiers may not be depreciated.

In one embodiment, a functional prototype for an Apex class (e.g. in asubscriber organization) may show version information. In this case, theversion information may include a minimum and/or maximum version for aglobal identifier. Also, subscribers of the on-demand database service,such as development organizations, may be allowed to view the prototypevia a link.

As an option, a table may be utilized to track version information. Inthis case, the table may be stored or maintained by the on-demanddatabase service and/or the subscriber. In these cases, when an updatedapplication or application package (e.g. a portion of an application,etc.) is uploaded, previous version information (e.g. a version ID,etc.) may be recorded in a column or row indicating a maximum version(e.g. a “max_all_package_version_id” column, etc.). This global statemay be utilized to indicate that a component no longer exists in packageversions starting with the version that last uploaded.

As an option, an application or an application package may include auser interface (UI) that shows version information to subscribers (e.g.developers, etc.), including information for child identifiers (e.g.Apex class identifiers, etc.), and layouts, etc. As another option, aclass prototype in a subscriber organization may also show thisinformation.

In one embodiment, new components that are uploaded and introduced in anupdated application version may be available in the subscribingorganizations as of that version, for versioning purposes. In this case,a first upload may determine the minimum version. In general, acomponent may not be deprecated/removed in an updated version. Thus,that designation will not have an affect on subscribers.

An application may export or upload the version bundles that theapplication needs to operate. A version bundle may include anynamed/namespaced component in an organization/application. In oneembodiment, the version bundle may only include private components. Inthis case, private components refer to components that may not bereferenced by other applications in other namespaces.

In one embodiment, a version bundle may specify the versions of otherapplications. For example, a header row may specify the version of theapplication of the on-demand database service. As an option, a childtable (e.g. a “VersionBundleDefinition” table, etc.) that specifieswhich version ID is being used (e.g. a “AllPackageVersionId” tag, etc.)for each package ID (e.g. an “AllPackageId” tag, etc.) may be utilized.

It should be noted that version bundles and their definitions may becached. In one embodiment, an organization information cache key orother cache key may be utilized to facilitate such caching.

In one embodiment, when a new application is installed, a developer maynot have to add that application to existing version bundles. In thiscase, the installed version number may be inserted automatically. Inthis way, the version bundles may include a plurality of installedapplications, specifying a version for each. As an option, when anapplication is uninstalled, the application may be removed from existingversion bundles automatically.

In another embodiment, all organizations may have at least one versionbundle. As an option, an organization may have one default versionbundle. This default bundle may be created when the organization signsup using the current application of the on-demand database service. Inthis way, organizations will not see new schema in the application ofthe on-demand database service without changing the default or otherversion bundles.

In some cases, an organization may clone or edit an existing bundle. Inone embodiment, editing an existing bundle may not be allowed to occurlive in production. For example, the editing may be restricted where theediting adversely impacts (e.g. breaks, etc.) existing components (e.g.Apex code, etc.).

In one embodiment, a developer and/or an administrator may be presentedwith a tool or interface indicating which components are using eachbundle. As an option, this tool may include a bundle detail screen. Inanother embodiment, developers and administrators may be prevented fromediting and/or warned when trying to edit an existing bundle in such away that would break existing components that use the bundle.

Further, version bundles may allow each component within an applicationto specify the particular needs of that component. These needs (e.g.functional information, etc.) may be different for different componentsas the application evolves. In one embodiment, this may be accomplishedby storing the functional information, etc. in a foreign key column(e.g. a “VersionBundleId” column, etc.) in each component table. In thisway, all managed components may have a “VersionBundleId” foreign key.

In the context of upgrades, an indicator indicating the version number(e.g. an “InstalledPackageVersion” tag, etc.) may be interpreted as thephysical version number of installed applications. Because versionbundles ensure that all uses of an installed application are “latched”to a particular version, the push upgrade process may modify this numberwithout affecting the semantics of any components.

Additionally, the physically installed version may specify the maximumversion that may be chosen in a version bundle. A minimum version tag orindicator may indicate the minimum non-deprecated version of thatapplication. As another option, a subscriber may be prohibited fromusing a logical version before using the version the customer hasinstalled.

Still yet, a time delay for use may be implemented such that a versionbundle may be unable to use a newly installed physical version of anapplication or application portion for a predetermined time. In thisway, if a problem is discovered, an older version may be “rolled back”before use of the problem program. In this case, a metadata install maysupport the physical rollback.

As noted above, API calls may specify their full versioning information,not just the API version information. In various embodiments, this maybe accomplished by specifying version bundle information on the fly inthe request (e.g. in a header, etc.), or by utilizing version bundlespecific end points.

In some cases, developers associated with subscribers of the on-demanddatabase service may wish to emulate application code behavior (e.g.Apex behavior, etc.) for an older version of their application. Thus,runtime access may be provided to the currently executing versioninformation (e.g. information associated with “AllPackageVersion,” etc.)for at least that application. This may be provided as a method in theapplication, for example. Additionally, to test this code, tests may beimplemented (e.g. Apex tests) and may have the ability to specify that atest segment runs as of a specific version.

In one embodiment, a version provider interface may be utilized toprovide version information. In this case, the interface may beimplemented to retrieve and set version information. Furthermore, thisinterface may be utilized to determine the visibility of installedcomponents and associated version information. The interface may alsodetermine the backward capability of components utilizing theminimum/maximum version numbers, the namespace, and other informationassociated with components.

In order to maintain functionality of applications used by subscribers,information relating to a class hierarchy that was uploaded may berecorded in such a way that a developer is prevented from removing orchanging component relationships in a manner that may damagefunctionality of the subscribing organizations. For example, a globaltable (e.g. a “core.all_managed_class_rel” [AMCR] table, etc.) may beused to record the managed relationships among classes and interfaces.In this case, the table may include a plurality of fields including aglobal Apex class type identifier (e.g. “AMPM_Id”) that has arelationship (e.g. extends or implements, etc.) to another global type,a parent enumeration or ID (e.g. a user-defined type or a built-insystem type constant, etc.), a package ID, and various other fields.

At upload time of a managed released package, all new classrelationships may be recorded. In this case, only immediaterelationships may be stored in the global table. In other words, not allimplied transitive relationships may be stored in the table. When aclass is later saved, it may be validated that no existing relationshipin the table is removed. In the case of interface implementation, theredundant grandparent relationship may be left in the class signature.

In one embodiment, extension classes may remain constant. For example,once a global class extends another global class, that exactrelationship may remain. Similarly, in the case that a class is releasedwithout any global super-class, a super-class may not be added at alater time. Furthermore, a “gender” of a type may not have the abilityto be changed after upload. For example, a class may not be changed toan enumeration or interface.

With respect to pushing updates, adding a new global method may call forversioning. The presence of a new global method in a base class couldcause issues in an extension class if the extension happens to use thatsame signature. However, in the context of Apex versioning, thesubscriber may add an override keyword to the method when the subscriberupgrades to the latest version in the version bundle.

In one embodiment, no new global final methods may be added in a laterapplication version. In this case, all final methods may be virtual. Forexample, if a subscriber had used a method signature, the subscriber maynot be able to migrate a class onto the newest version of the base classsince the final designation may prevent this.

As an option, new global types may be added because the subclass mayhave a type with the same name. In this case, references to the basetype may need to be fully qualified in order to be used. Additionally, anew global variable may be allowed to be added because the subscribermay have a variable with the same name. For static variables, the exactvariable may be referenced using the fully qualified class name. Formember variables, the subclass variable may always be reached, even ifit is shadowed, by assigning the super-type object to a variabledeclared of the subtype.

In one embodiment, no new abstract or interface methods may be added ina global class update. For example, the base class might try to call newabstract or interface method assuming that all subclasses orimplementers provide an implementation for those methods. However,subscribers using an earlier version of the application may not haveimplemented those methods yet. If there is no way to prevent invocationof those methods from the base class point of view, the addition of newabstract methods may be prevented (e.g. either at this class level orany class below it in the hierarchy), as well as the addition ofinterfaces that have the same effect.

Furthermore, global abstract classes may be prevented from including anypublic abstract methods. This may be implemented because there may be noway for the extending application to access the methods the applicationis configured to execute.

Additionally, a virtual keyword may not be taken away from a managedmethod. For example, once released as virtual, the keyword should stayvirtual. As an option, a final method may be permitted to becomevirtual. Still yet, a concrete class may only be permitted to becomeabstract if it had no global constructors before.

Using these techniques, a development ecosystem may be provided thatmanages component lifecycles and enforces signature invariance thatseparates a physically installed version from a logical version in useby subscribers of an on-demand database service. This ensurescompatibility for a push upgrade, which is an automated managed upgradeprocess in the ecosystem that ensures no visible changes until thesubscriber is ready. Furthermore, a coding language may be utilized thathas signature versioning and runtime inspection of client versions builtin, allowing for automated testing of backwards compatibility.

System Overview

FIG. 7 illustrates a block diagram 700 of an environment 710 wherein anon-demand database service might be used. As an option, any of thepreviously described embodiments of the foregoing figures may or may notbe implemented in the context of the environment 710. Environment 710may include user systems 712, network 714, system 716, processor system717, application platform 718, network interface 720, tenant datastorage 722, system data storage 724, program code 726, and processspace 728. In other embodiments, environment 710 may not have all of thecomponents listed and/or may have other elements instead of, or inaddition to, those listed above.

Environment 710 is an environment in which an on-demand database serviceexists. User system 712 may be any machine or system that is used by auser to access a database user system. For example, any of user systems712 can be a handheld computing device, a mobile phone, a laptopcomputer, a work station, and/or a network of computing devices. Asillustrated in FIG. 7 (and in more detail in FIG. 8) user systems 712might interact via a network with an on-demand database service, whichis system 716.

An on-demand database service, such as system 716, is a database systemthat is made available to outside users that do not need to necessarilybe concerned with building and/or maintaining the database system, butinstead may be available for their use when the users need the databasesystem (e.g., on the demand of the users). Some on-demand databaseservices may store information from one or more tenants stored intotables of a common database image to form a multi-tenant database system(MTS). Accordingly, “on-demand database service 716” and “system 716”will be used interchangeably herein. A database image may include one ormore database objects. A relational database management system (RDMS) orthe equivalent may execute storage and retrieval of information againstthe database object(s). Application platform 718 may be a framework thatallows the applications of system 716 to run, such as the hardwareand/or software, e.g., the operating system. In an embodiment, on-demanddatabase service 716 may include an application platform 718 thatenables creation, managing and executing one or more applicationsdeveloped by the provider of the on-demand database service, usersaccessing the on-demand database service via user systems 712, or thirdparty application developers accessing the on-demand database servicevia user systems 712.

The users of user systems 712 may differ in their respective capacities,and the capacity of a particular user system 712 might be entirelydetermined by permissions (permission levels) for the current user. Forexample, where a salesperson is using a particular user system 712 tointeract with system 716, that user system has the capacities allottedto that salesperson. However, while an administrator is using that usersystem to interact with system 716, that user system has the capacitiesallotted to that administrator. In systems with a hierarchical rolemodel, users at one permission level may have access to applications,data, and database information accessible by a lower permission leveluser, but may not have access to certain applications, databaseinformation, and data accessible by a user at a higher permission level.Thus, different users will have different capabilities with regard toaccessing and modifying application and database information, dependingon a user's security or permission level.

Network 714 is any network or combination of networks of devices thatcommunicate with one another. For example, network 714 can be any one orany combination of a LAN (local area network), WAN (wide area network),telephone network, wireless network, point-to-point network, starnetwork, token ring network, hub network, or other appropriateconfiguration. As the most common type of computer network in currentuse is a TCP/IP (Transfer Control Protocol and Internet Protocol)network, such as the global internetwork of networks often referred toas the “Internet” with a capital “I,” that network will be used in manyof the examples herein. However, it should be understood that thenetworks that the present invention might use are not so limited,although TCP/IP is a frequently implemented protocol.

User systems 712 might communicate with system 716 using TCP/IP and, ata higher network level use other common Internet protocols tocommunicate, such as HTTP, FTP, AFS, WAP, etc. In an example where HTTPis used, user system 712 might include an HTTP client commonly referredto as a “browser” for sending and receiving HTTP messages to and from anHTTP server at system 716. Such an HTTP server might be implemented asthe sole network interface between system 716 and network 714, but othertechniques might be used as well or instead. In some implementations,the interface between system 716 and network 714 includes load sharingfunctionality, such as round-robin HTTP request distributors to balanceloads and distribute incoming HTTP requests evenly over a plurality ofservers. At least as for the users that are accessing that server, eachof the plurality of servers has access to the MTS' data; however, otheralternative configurations may be used instead.

In one embodiment, system 716, shown in FIG. 7, implements a web-basedcustomer relationship management (CRM) system. For example, in oneembodiment, system 716 includes application servers configured toimplement and execute CRM software applications as well as providerelated data, code, forms, webpages and other information to and fromuser systems 712 and to store to, and retrieve from, a database systemrelated data, objects, and Webpage content. With a multi-tenant system,data for multiple tenants may be stored in the same physical databaseobject, however, tenant data typically is arranged so that data of onetenant is kept logically separate from that of other tenants so that onetenant does not have access to another tenant's data, unless such datais expressly shared. In certain embodiments, system 716 implementsapplications other than, or in addition to, a CRM application. Forexample, system 716 may provide tenant access to multiple hosted(standard and custom) applications, including a CRM application. User(or third party developer) applications, which may or may not includeCRM, may be supported by the application platform 718, which managescreation, storage of the applications into one or more database objectsand executing of the applications in a virtual machine in the processspace of the system 716.

One arrangement for elements of system 716 is shown in FIG. 8, includinga network interface 720, application platform 718, tenant data storage722 for tenant data 723, system data storage 724 for system dataaccessible to system 716 and possibly multiple tenants, program code 726for implementing various functions of system 716, and a process space728 for executing MTS system processes and tenant-specific processes,such as running applications as part of an application hosting service.Additional processes that may execute on system 716 include databaseindexing processes.

Several elements in the system shown in FIG. 7 include conventional,well-known elements that are explained only briefly here. For example,each user system 712 could include a desktop personal computer,workstation, laptop, PDA, cell phone, or any wireless access protocol(WAP) enabled device or any other computing device capable ofinterfacing directly or indirectly to the Internet or other networkconnection. User system 712 typically runs an HTTP client, e.g., abrowsing program, such as Microsoft's Internet Explorer browser,Netscape's Navigator browser, Opera's browser, or a WAP-enabled browserin the case of a cell phone, PDA or other wireless device, or the like,allowing a user (e.g., subscriber of the multi-tenant database system)of user system 712 to access, process and view information, pages andapplications available to it from system 716 over network 714. Each usersystem 712 also typically includes one or more user interface devices,such as a keyboard, a mouse, trackball, touch pad, touch screen, pen orthe like, for interacting with a graphical user interface (GUI) providedby the browser on a display (e.g., a monitor screen, LCD display, etc.)in conjunction with pages, forms, applications and other informationprovided by system 716 or other systems or servers. For example, theuser interface device can be used to access data and applications hostedby system 716, and to perform searches on stored data, and otherwiseallow a user to interact with various GUI pages that may be presented toa user. As discussed above, embodiments are suitable for use with theInternet, which refers to a specific global internetwork of networks.However, it should be understood that other networks can be used insteadof the Internet, such as an intranet, an extranet, a virtual privatenetwork (VPN), a non-TCP/IP based network, any LAN or WAN or the like.

According to one embodiment, each user system 712 and all of itscomponents are operator configurable using applications, such as abrowser, including computer code run using a central processing unitsuch as an Intel Pentium® processor or the like. Similarly, system 716(and additional instances of an MTS, where more than one is present) andall of their components might be operator configurable usingapplication(s) including computer code to run using a central processingunit such as processor system 717 of FIG. 7, which may include an IntelPentium® processor or the like, and/or multiple processor units. Acomputer program product embodiment includes a machine-readable storagemedium (media) having instructions stored thereon/in which can be usedto program a computer to perform any of the processes of the embodimentsdescribed herein. Computer code for operating and configuring system 716to intercommunicate and to process webpages, applications and other dataand media content as described herein are preferably downloaded andstored on a hard disk, but the entire program code, or portions thereof,may also be stored in any other volatile or non-volatile memory mediumor device as is well known, such as a ROM or RAM, or provided on anymedia capable of storing program code, such as any type of rotatingmedia including floppy disks, optical discs, digital versatile disk(DVD), compact disk (CD), microdrive, and magneto-optical disks, andmagnetic or optical cards, nanosystems (including molecular memory ICs),or any type of media or device suitable for storing instructions and/ordata. Additionally, the entire program code, or portions thereof, may betransmitted and downloaded from a software source over a transmissionmedium, e.g., over the Internet, or from another server, as is wellknown, or transmitted over any other conventional network connection asis well known (e.g., extranet, VPN, LAN, etc.) using any communicationmedium and protocols (e.g., TCP/IP, HTTP, HTTPS, Ethernet, etc.) as arewell known. It will also be appreciated that computer code forimplementing embodiments of the present invention can be implemented inany programming language that can be executed on a client system and/orserver or server system such as, for example, C, C++, HTML, any othermarkup language, Java™, JavaScript, ActiveX, any other scriptinglanguage, such as VBScript, and many other programming languages as arewell known may be used. Java™ is a trademark of Sun Microsystems, Inc.).

According to one embodiment, each system 716 is configured to providewebpages, forms, applications, data and media content to user (client)systems 712 to support the access by user systems 712 as tenants ofsystem 716. As such, system 716 provides security mechanisms to keepeach tenant's data separate unless the data is shared. If more than oneMTS is used, they may be located in close proximity to one another(e.g., in a server farm located in a single building or campus), or theymay be distributed at locations remote from one another (e.g., one ormore servers located in city A and one or more servers located in cityB). As used herein, each MTS could include one or more logically and/orphysically connected servers distributed locally or across one or moregeographic locations. Additionally, the term “server” is meant toinclude a computer system, including processing hardware and processspace(s), and an associated storage system and database application(e.g., OODBMS or RDBMS) as is well known in the art. It should also beunderstood that “server system” and “server” are often usedinterchangeably herein. Similarly, the database object described hereincan be implemented as single databases, a distributed database, acollection of distributed databases, a database with redundant online oroffline backups or other redundancies, etc., and might include adistributed database or storage network and associated processingintelligence.

FIG. 8 also illustrates environment 710. However, in FIG. 8 elements ofsystem 716 and various interconnections in an embodiment are furtherillustrated. FIG. 8 shows that user system 712 may include processorsystem 712A, memory system 712B, input system 712C, and output system712D. FIG. 8 shows network 714 and system 716. FIG. 8 also shows thatsystem 716 may include tenant data storage 722, tenant data 723, systemdata storage 724, system data 725, User Interface (UI) 830, ApplicationProgram Interface (API) 832, PL/SOQL 834, save routines 836, applicationsetup mechanism 838, applications servers 800 ₁-800 _(N), system processspace 802, tenant process spaces 804, tenant management process space810, tenant storage area 812, user storage 814, and application metadata816. In other embodiments, environment 710 may not have the sameelements as those listed above and/or may have other elements insteadof, or in addition to, those listed above.

User system 712, network 714, system 716, tenant data storage 722, andsystem data storage 724 were discussed above in FIG. 7. Regarding usersystem 712, processor system 712A may be any combination of one or moreprocessors. Memory system 712B may be any combination of one or morememory devices, short term, and/or long term memory. Input system 712Cmay be any combination of input devices, such as one or more keyboards,mice, trackballs, scanners, cameras, and/or interfaces to networks.Output system 712D may be any combination of output devices, such as oneor more monitors, printers, and/or interfaces to networks. As shown byFIG. 8, system 716 may include a network interface 720 (of FIG. 7)implemented as a set of HTTP application servers 800, an applicationplatform 718, tenant data storage 722, and system data storage 724. Alsoshown is system process space 802, including individual tenant processspaces 804 and a tenant management process space 810. Each applicationserver 800 may be configured to tenant data storage 722 and the tenantdata 723 therein, and system data storage 724 and the system data 725therein to serve requests of user systems 712. The tenant data 723 mightbe divided into individual tenant storage areas 812, which can be eithera physical arrangement and/or a logical arrangement of data. Within eachtenant storage area 812, user storage 814 and application metadata 816might be similarly allocated for each user. For example, a copy of auser's most recently used (MRU) items might be stored to user storage814. Similarly, a copy of MRU items for an entire organization that is atenant might be stored to tenant storage area 812. A 830 provides a userinterface and an API 832 provides an application programmer interface tosystem 716 resident processes to users and/or developers at user systems712. The tenant data and the system data may be stored in variousdatabases, such as one or more Oracle™ databases.

Application platform 718 includes an application setup mechanism 838that supports application developers' creation and management ofapplications, which may be saved as metadata into tenant data storage722 by save routines 836 for execution by subscribers as one or moretenant process spaces 804 managed by tenant management process 810 forexample. Invocations to such applications may be coded using PL/SOQL 834that provides a programming language style interface extension to API832. A detailed description of some PL/SOQL language embodiments isdiscussed in commonly owned U.S. Provisional Patent Application60/828,192 entitled, PROGRAMMING LANGUAGE METHOD AND SYSTEM FOREXTENDING APIS TO EXECUTE IN CONJUNCTION WITH DATABASE APIS, by CraigWeissman, filed Oct. 4, 2006, which is incorporated in its entiretyherein for all purposes. Invocations to applications may be detected byone or more system processes, which manages retrieving applicationmetadata 816 for the subscriber making the invocation and executing themetadata as an application in a virtual machine.

Each application server 800 may be communicably coupled to databasesystems, e.g., having access to system data 725 and tenant data 723, viaa different network connection. For example, one application server 800₁ might be coupled via the network 714 (e.g., the Internet), anotherapplication server 800 _(N-1) might be coupled via a direct networklink, and another application server 800 _(N) might be coupled by yet adifferent network connection. Transfer Control Protocol and InternetProtocol (TCP/IP) are typical protocols for communicating betweenapplication servers 800 and the database system. However, it will beapparent to one skilled in the art that other transport protocols may beused to optimize the system depending on the network interconnect used.

In certain embodiments, each application server 800 is configured tohandle requests for any user associated with any organization that is atenant. Because it is desirable to be able to add and remove applicationservers from the server pool at any time for any reason, there ispreferably no server affinity for a user and/or organization to aspecific application server 800. In one embodiment, therefore, aninterface system implementing a load balancing function (e.g., an F5Big-IP load balancer) is communicably coupled between the applicationservers 800 and the user systems 712 to distribute requests to theapplication servers 800. In one embodiment, the load balancer uses aleast connections algorithm to route user requests to the applicationservers 800. Other examples of load balancing algorithms, such as roundrobin and observed response time, also can be used. For example, incertain embodiments, three consecutive requests from the same user couldhit three different application servers 800, and three requests fromdifferent users could hit the same application server 800. In thismanner, system 716 is multi-tenant, wherein system 716 handles storageof, and access to, different objects, data and applications acrossdisparate users and organizations.

As an example of storage, one tenant might be a company that employs asales force where each salesperson uses system 716 to manage their salesprocess. Thus, a user might maintain contact data, leads data, customerfollow-up data, performance data, goals and progress data, etc., allapplicable to that user's personal sales process (e.g., in tenant datastorage 722). In an example of a MTS arrangement, since all of the dataand the applications to access, view, modify, report, transmit,calculate, etc., can be maintained and accessed by a user system havingnothing more than network access, the user can manage his or her salesefforts and cycles from any of many different user systems. For example,if a salesperson is visiting a customer and the customer has Internetaccess in their lobby, the salesperson can obtain critical updates as tothat customer while waiting for the customer to arrive in the lobby.

While each user's data might be separate from other users' dataregardless of the employers of each user, some data might beorganization-wide data shared or accessible by a plurality of users orall of the users for a given organization that is a tenant. Thus, theremight be some data structures managed by system 716 that are allocatedat the tenant level while other data structures might be managed at theuser level. Because an MTS might support multiple tenants includingpossible competitors, the MTS should have security protocols that keepdata, applications, and application use separate. Also, because manytenants may opt for access to an MTS rather than maintain their ownsystem, redundancy, up-time, and backup are additional functions thatmay be implemented in the MTS. In addition to user-specific data andtenant-specific data, system 716 might also maintain system level datausable by multiple tenants or other data. Such system level data mightinclude industry reports, news, postings, and the like that are sharableamong tenants.

in certain embodiments, user systems 712 (which may be client systems)communicate with application servers 800 to request and updatesystem-level and tenant-level data from system 716 that may requiresending one or more queries to tenant data storage 722 and/or systemdata storage 724. System 716 (e.g., an application server 800 in system716) automatically generates one or more SQL statements (e.g., one ormore SQL queries) that are designed to access the desired information.System data storage 724 may generate query plans to access the requesteddata from the database.

Each database can generally be viewed as a collection of objects, suchas a set of logical tables, containing data fitted into predefinedcategories. A “table” is one representation of a data object, and may beused herein to simplify the conceptual description of objects and customobjects according to the present invention. It should be understood that“table” and “object” may be used interchangeably herein. Each tablegenerally contains one or more data categories logically arranged ascolumns or fields in a viewable schema. Each row or record of a tablecontains an instance of data for each category defined by the fields.For example, a CRM database may include a table that describes acustomer with fields for basic contact information such as name,address, phone number, fax number, etc. Another table might describe apurchase order, including fields for information such as customer,product, sale price, date, etc. In some multi-tenant database systems,standard entity tables might be provided for use by all tenants. For CRMdatabase applications, such standard entities might include tables forAccount, Contact, Lead, and Opportunity data, each containingpre-defined fields. It should be understood that the word “entity” mayalso be used interchangeably herein with “object” and “table”.

In some multi-tenant database systems, tenants may be allowed to createand store custom objects, or they may be allowed to customize standardentities or objects, for example by creating custom fields for standardobjects, including custom index fields. U.S. patent application Ser. No.10/817,161, filed Apr. 2, 2004, entitled “CUSTOM ENTITIES AND FIELDS INA MULTI-TENANT DATABASE SYSTEM,” which is hereby incorporated herein byreference, teaches systems and methods for creating custom objects aswell as customizing standard objects in a multi-tenant database system.In certain embodiments, for example, all custom entity data rows arestored in a single multi-tenant physical table, which may containmultiple logical tables per organization. It is transparent to customersthat their multiple “tables” are in fact stored in one large table orthat their data may be stored in the same table as the data of othercustomers.

It should be noted that any of the different embodiments describedherein may or may not be equipped with any one or more of the featuresset forth in one or more of the following published applications:US2003/0233404, titled “OFFLINE SIMULATION OF ONLINE SESSION BETWEENCLIENT AND SERVER,” filed Nov. 4, 2002; US2004/0210909, titled “JAVAOBJECT CACHE SERVER FOR DATABASES,” filed Apr. 17, 2003, now issued U.S.Pat. No. 7,209,929; US2005/0065925, titled “QUERY OPTIMIZATION IN AMULTI-TENANT DATABASE SYSTEM,” filed Sep. 23, 2003; US2005/0223022,titled “CUSTOM ENTITIES AND FIELDS IN A MULTI-TENANT DATABASE SYSTEM,”filed Apr. 2, 2004; US2005/0283478, titled “SOAP-BASED WEB SERVICES IN AMULTI-TENANT DATABASE SYSTEM,” filed Jun. 16, 2004; and/orUS2006/0206834, titled “SYSTEMS AND METHODS FOR IMPLEMENTINGMULTI-APPLICATION TABS AND TAB SETS,” filed Mar. 8, 2005; which are eachincorporated herein by reference in their entirety for all purposes.

While the invention has been described by way of example and in terms ofthe specific embodiments, it is to be understood that the invention isnot limited to the disclosed embodiments. To the contrary, it isintended to cover various modifications and similar arrangements aswould be apparent to those skilled in the art. Therefore, the scope ofthe appended claims should be accorded the broadest interpretation so asto encompass all such modifications and similar arrangements.

The invention claimed is:
 1. A method, comprising: receiving a developedapplication from a developer at an on-demand database service; creatinga data structure describing aspects of the developed application, wherethe aspects include one or more of a version identifier, a schema, amessage shape, a semantic behavior, and uniform resource locators;identifying information associated with at least one other applicationof at least one subscriber with which the developed application is tooperate; and determining whether the developed application and the atleast one other application will properly operate together, utilizingthe data structure and the information, by: identifying settings used inan application environment of the at least one subscriber including theat least one other application, using the information associated withthe at least one other application, creating a temporary testenvironment having the identified settings, and testing the developedapplication within the temporary test environment.
 2. The method ofclaim 1, wherein the at least one subscriber and the developer areallowed to edit at least one component of the developed application. 3.The method of claim 2, wherein the at least one component includes afield.
 4. The method of claim 1, and further comprising tracking whichof a plurality of versions of the developed application a plurality ofthe subscribers are utilizing.
 5. The method of claim 1, wherein, if itis determined that the developed application and the at least one otherapplication will not properly operate together, at least one of thedeveloper and the subscriber is allowed to edit the developedapplication.
 6. The method of claim 1, and further comprisingdetermining from the identified settings a version of the application tobe tested.
 7. The method of claim 1, and further comprising identifyinga portion of the developed application including a version of theapplication to be tested, using the data structure.
 8. The method ofclaim 7, and further comprising testing the identified portion of thedeveloped application.
 9. A non-transitory machine-readable mediumcarrying one or more sequences of instructions which, when executed byone or more processors, cause the one or more processors to carry outthe steps of: receiving a developed application from a developer at anon-demand database service; creating a data structure describing aspectsof the developed application, where the aspects include one or more of aversion identifier, a schema, a message shape, a semantic behavior, anduniform resource locators; identifying information associated with atleast one other application of at least one subscriber with which thedeveloped application is to operate; and determining whether thedeveloped application and the at least one other application willproperly operate together, utilizing the data structure and theinformation, by: identifying settings used in an application environmentof the at least one subscriber including the at least one otherapplication, using the information associated with the at least oneother application, creating a temporary test environment having theidentified settings, and testing the developed application within thetemporary test environment.
 10. An apparatus, comprising: a computerprocessor; and one or more stored sequences of instructions which, whenexecuted by the computer processor, cause the computer processor tocarry out the steps of: receiving a developed application from adeveloper at an on-demand database service; creating a data structuredescribing aspects of the developed application, where the aspectsinclude one or more of a version identifier, a schema, a message shape,a semantic behavior, and uniform resource locators; identifyinginformation associated with at least one other application of at leastone subscriber with which the developed application is to operate; anddetermining whether the developed application and the at least one otherapplication will properly operate together, utilizing the data structureand the information, by: identifying settings used in an applicationenvironment of the at least one subscriber including the at least oneother application, using the information associated with the at leastone other application, creating a temporary test environment having theidentified settings, and testing the developed application within thetemporary test environment.
 11. A method for transmitting code for usein a multi-tenant database system on a transmission medium, the methodcomprising: transmitting code for identifying a developed application ofa developer in an on-demand database service; transmitting code forcreating a data structure describing aspects of the developedapplication, where the aspects include one or more of a versionidentifier, a schema, a message shape, a semantic behavior, and uniformresource locators; transmitting code for identifying informationassociated with at least one other application of at least onesubscriber with which the developed application is to operate; andtransmitting code for determining whether the developed application andthe at least one other application will properly operate together,utilizing the data structure and the information, by: identifyingsettings used in an application environment of the at least onesubscriber including the at least one other application, using theinformation associated with the at least one other application, creatinga temporary test environment having the identified settings, and testingthe developed application within the temporary test environment.
 12. Themethod of claim 11, wherein the at least one subscriber and thedeveloper are allowed to edit at least one component of the developedapplication.
 13. The method of claim 12, wherein the at least onecomponent includes a field.