Extensibility of embedded database procedures

ABSTRACT

Disclosed herein are systems and methods facilitating extensions to software applications that access a database, and in particular to applications with embedded database procedures. In various embodiments, an extension anchor embedded in the application as well as one or more extensions implemented as database procedures are encapsulated in specially marked database-procedure methods.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims priority to and the benefit of U.S. Provisional Patent Application No. 62/050,511, filed on Sep. 15, 2014, which is hereby incorporated herein by reference in its entirety.

TECHNICAL FIELD

This document relates generally to systems and methods for accessing databases, for example, methods and systems that incorporate database procedures and provide for extensibility.

BACKGROUND

Many businesses and other enterprises nowadays store vast amounts of data in databases, often using commercially available database platforms in conjunction with software applications capable of accessing and processing the data to extract meaningful information therefrom in support of various business processes. For example, software applications for enterprise resource planning, customer relationship management, supplier relationship management, supply chain management, and product lifecycle management are widely used across many industries. To extend the range of uses for their business applications and thereby grow their customer base, business-application vendors often enable their customers to adjust the applications to their particular needs. One approach for providing such extensibility is to allow customers to directly modify or extend the source code of an application. In a larger suite of interacting applications, this can, however, cause incompatibilities between the customized application and other applications if the software vendor implements updates to the original software. To avoid this problem, an alternative approach involves modeling “enhancement points” in the original software by facilitating modifications to the source code in various designated places and within well-defined parameters. By pre-defining the range of possible modifications and guaranteeing that certain aspects of the modeled enhancement points and their interactions with the other software components remain unaltered during subsequent changes to the application as a whole, the vendor can ensure the interoperability of vendor-provided updates with the customer's enhancements.

With a growing need for real-time data access and increasing amounts of data, a trend has emerged to move data-processing functionality closer towards the database to reduce the frequency with which the database is accessed by external programs. This “code push-down” can be accomplished through the use of database procedures that are executed within the database itself. Database procedures, however, are limited in the types of operations they can perform. Furthermore, databases typically do not provide for the extensibility of database procedures.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure illustrates embodiments of the invention by way of example and not limitation, and with reference to the following drawings:

FIG. 1 is a block diagram illustrating a system, in accordance with an example embodiment, including application and database servers.

FIG. 2 is a flow chart illustrating a method, in accordance with an example embodiment, for creating and executing applications with embedded database.

FIG. 3 is a code snippet illustrating a syntax for embedding database procedures in accordance with various example embodiments.

FIG. 4 is a block diagram illustrating an extensibility framework, in accordance with one example embodiment.

FIGS. 5A and 5B are flow charts illustrating methods, in accordance with example embodiments, for providing extensibility and consuming extensibility, respectively.

FIG. 6 is a diagram including code snippets that illustrate the use of extensible database procedures in accordance with various example embodiments.

FIGS. 7A and 7B are flow charts illustrating methods, in accordance with various example embodiments, for creating and executing application source-code extensions and database-procedure extensions, respectively.

FIG. 8 is a block diagram illustrating a software architecture, in accordance with an example embodiment, that may be installed on a machine.

FIG. 9 is a diagrammatic representation of a machine in the form of a computer system within which a set of instructions may be executed for causing the machine to perform any one or more of the methodologies discussed herein.

DETAILED DESCRIPTION

The description that follows includes systems, methods, techniques, instruction sequences, and computing machine program products that embody illustrative example embodiments of the disclosure. For the purposes of explanation, numerous specific details are set forth in order to provide an understanding of various example embodiments of the inventive subject matter. It will be evident, however, to those skilled in the art, that example embodiments of the inventive subject matter may be practiced without these specific details. In general, well-known instruction instances, protocols, structures, and techniques have not been shown in detail.

The present disclosure generally relates to the extensibility of software applications designed to access a database in order to retrieve data therefrom and/or store data therein, and/or to process the data, e.g., in accordance with a business process. In various embodiments, the database is maintained on a database server, and the software application is created and executed on an application server in communication therewith. Extensibility allows both vendors and customers to customize and adapt a generic application to a particular industry or enterprise. In accordance with some embodiments, extensibility is achieved using vendor-defined extension spots embedded in the application and associated extension interfaces, in conjunction with customer-provided extension implementations complying with the extension interfaces.

Furthermore, various embodiments provide a framework that integrates database procedures with traditional data-driven software applications. Within this framework, extensibility is provided not only for the software application itself, but also for any stored database procedures (herein also referred to as “database procedures” or “stored procedures”) embedded therein. A database procedure is considered “embedded” if its source code is included in the source code of the host application, despite the fact that, in general, the language in which the host application is written (hereinafter also referred to as the “host language”) differs from that used to define the embedded database procedure(s). This distinguishes embedded database procedures from database procedures that are defined and managed entirely by the database server and are available in applications only via indirect means, such as separately generated database-procedure proxies. Embedding database procedures in a host application eliminates the need for the programmer to use different toolsets for developing the application and database procedures, providing a more seamless development experience. In addition, as described herein, it facilitates building on the extension framework available for the host application to create an enhanced extension framework that also allows the database procedures to be enhanced and customized. This is a significant benefit, as the database and associated database management system generally do not provide functionality for extending database procedures.

FIG. 1 is a block diagram illustrating a system, in accordance with an example embodiment, including application and database servers. The system is shown to include an application server 100 and a database server 102, which may be connected via a wired or wireless network (not shown). The database server 102 stores a database 104 (e.g., an in-memory database) that includes business data, generally organized in tables 105, as well as an associated database management system (DBMS) 106. The DBMS 106 may include various software programs (or “modules”) that interact with users, other software applications, and the database 104; these programs may include, e.g., a modeler 108 (which may be used to define, e.g., tables, views, indexes, stored procedures, and other database objects), an SQLScript parser 110, and an SQLScript compiler or interpreter 112 (depending on the particular database). The application server 100 may include software development tools 120, including, e.g., a code editor used to define application source code (including any extensions thereof) as well as data types and data structures (including, e.g., scalars, tables, and views) used therein (which may be separately stored in the Data Dictionary (DDIC)). Further, the application server 100 may have a parser 121 that serves to check the code syntax and dependencies, and a compiler 122 that translates application source code into compilation units written in an intermediate language; in some example embodiments, the parser 121 and compiler 122 are integrated into one component. The application server 100 may also have an interpreter 124 that executes the compilation units, a program buffer 126 in which the compilation units are held during runtime, and a data buffer 128 in which frequently accessed and/or infrequently changed data may be temporarily stored to limit database accesses during execution of an application. In various example embodiments, the database 104 may double as a repository for the application source code 130, the compilation units 132, a data dictionary (DDIC) 134 that separately stores the data structures and types used in the application, and a program catalog 135 that stores metadata about the program objects (e.g., source code objects and compilation units). The database 104 further includes a database catalog 136 that stores metadata about the tables 105 (including their organization, available views, etc.) as well as the database procedures 138 (or, in some example embodiments, more precisely descriptions of the database procedures that are a prerequisite for database-procedure execution).

In various example embodiments, the applications server 100 is an Advanced Business Application Programming (ABAP) application server that hosts one or more software applications written in the ABAP language developed by SAP SE (headquartered in Walldorf, Germany). (In ABAP, the compilation units are also referred to as “loads.”) The database server 102 may provide, for example, the SAP-developed High-Performance Analytic Appliance (HANA™) database platform. HANA databases currently support database procedures written either in SQLScript (which herein refers to an SQL-based scripting language developed by SAP for HANA) and LLANG (or “L,” which is a database language developed by SAP for HANA that focuses on arithmetic and calculations rather than data access and manipulation, and has similarities to the C programming language). It is to be understood, of course, that the scope of the present disclosure is not limited to ABAP and HANA, but is also applicable to host applications and database procedures written in other programming languages, and to other types of application servers and database platforms (e.g., Oracle Database, IBM DB2, Microsoft SQL Server, or the like).

FIG. 2 is a flow chart illustrating a method, in accordance with an example embodiment, for creating and executing applications with embedded database procedures. The method may be deployed on the system of FIG. 1 and, accordingly, is described merely by way of example with reference thereto. To provide some context for the integration of database procedures into host applications, consider first the general process of creating and executing a host application. Application source code may be written on the application server 100, using the development tools 120 available thereon (see operation 200). The application source code is typically (but not necessarily) stored in the database 104. A program under development may be stored as an inactive version. To deploy the program in practice, the developer activates the program as shown at operation 202. Only one active version can exist at a given point in time; accordingly, activating an application overwrites any previously activated version of that program (e.g., a program with the same name). As shown at operation 204, activation may trigger syntax and dependency checks, followed by compilation of the source code (see operation 206). The compiled units, or compilation units 132, may be stored in the database 104. In some example embodiments, the compilation process is “lazy,” meaning that dependent objects (such as other programs, classes, and/or function groups referenced in the application source code) are not compiled at this time. To execute the program, the compilation units 132 are loaded into the program buffer 126. An interpreter 124 (which is part of a virtual machine) then sequentially executes the statements contained in the compilation units 132 (see operation 208), accessing the database tables 105 as needed. As dependent objects are encountered during runtime, the virtual machine checks for the existence of corresponding compilation units, and, if none are found, triggers the compilation of the dependent objects to create the requisite compilation units.

The example method shown in FIG. 2 also illustrates how the use of database procedures can be integrated into this workflow. In various example embodiments, the developer can embed database procedures directly into the host-application source code (operation 210) as so-called “application-server-managed database procedures (ASMDPs).” The database procedures are encapsulated in special methods (“ASMDP methods”) declared as database procedures, e.g., by virtue of a suitable tag (such as “by stored procedure” or “by database procedure” or “by database function”). The methods have a regular interface (like other methods written in the host language), illustrated in the example code snippet in FIG. 3. The body of the method, however, is implemented in SQLScript, or, more generally, in the native database procedure language used by the database server 102. To support multiple database platforms, alternative example embodiments may employ, instead of the database-specific native procedure language, an OpenSQLScript language that is either limited to functionality common to multiple respective database procedure languages or properly mapped to database-specific features. The ASMDP methods may be methods of a regular class of the host language; for example, the class may include both regular methods and ASMDP methods. In some example embodiments, ASMDPs are required to be public and static; this may serve to avoid the complexity of mapping the concepts of object orientation and inheritance to database procedures.

FIG. 3 is a code snippet illustrating a syntax for embedding database procedures in accordance with various example embodiments. In the example syntax shown in FIG. 3, the host application is written in ABAP. The interface includes “METHOD” followed by the method's name, the tag “BY DATABASE PROCEDURE,” which marks the method as an ASMDP method (in the context of ABAP also referred to as an ABAP-managed database procedure (AMDP) method), a declaration of the database used by the procedure (e.g., the word “FOR” followed by the database name, e.g., HDB (for HANA)), a declaration of the database procedure language (e.g., SQLScript), and a declaration of the objects (e.g., tables, views, and methods) used in the database procedure (e.g., the word “USING” followed by the type of object that is being declared, followed by the name of that particular object). In some example embodiments, the declaration of the database procedure language is mandatory; in other example embodiments, it is optional, and a default language is assumed absent an explicit declaration. Similarly, the explicit forward declaration of the dependent objects may be mandatory or optional, depending on whether a reliable method for ascertaining dependent objects is available. The various declarations are followed by the body of the database procedure, written in the native database procedure language, and the closing bracket “ENDMETHOD.”

Returning to the method shown in FIG. 2, in the course of checking the application source code, the embedded database procedures may be checked by exploiting inherent database functionality, in particular the SQLScript parser 110 on the database server 102. For this purpose, the parser 121 of the application server 100 may attempt to cause temporary runtime artifacts of the database procedure and its dependent objects (such as other database procedures and tables) to be created in the database catalog 136 (see operation 212) (e.g., by issuing a “create procedure” statement for execution by the DBMS 106); this attempt triggers (by virtue of the inherent database functionality) a syntax check by the SQLScript parser 110, and its success is contingent upon the syntactic correctness of the database procedure and its dependent objects.

In more detail, in accordance with one example embodiment, checking the database procedure for syntactic correctness may involve, first, identifying any dependent objects (including any dependent database procedures) used in the database procedure (see operation 212), either based on the forward declarations of dependent objects contained in the ASMDP method itself or by using the well-known “get_procedure_objects” method (or a similar method). Thereafter, as shown at operation 213, temporary proxies of the identified dependent objects, or “stubs” (which include the object name and signature, but omit, in the case of database procedures, the object body), are then created in the database catalog 136 (e.g., using the “create procedure” statement executed by the DBMS 106), provided they are syntactically correct. To avoid interference with any active versions of these objects, the proxies are created with different names. In case of multiple levels of dependencies (e.g., if dependent objects call further dependent objects), the objects are created in an order depending on their dependency level, beginning with the deepest level (e.g., with objects that do not have dependent objects themselves). Once proxies for all dependent objects have been successfully created, references to dependent objects in the body of the database procedure at issue are substituted for by references to the corresponding proxies, and the database procedure is then itself created in the database catalog 136 as shown in operation 214. Again, in the example embodiment, the database procedure is created under a different name to avoid confusion with any different, active version of the procedure. If the creation of the database procedure or any of its dependent objects is unsuccessful, an error message is sent to the parser 121 on the application server 100. Otherwise, the database procedure including its dependencies, and the corresponding ASMDP method itself, can be assumed to be syntactically correct, and no errors are to be expected when it is called during later execution of the embedding host application. Following the syntax check, as shown in operation 215, the temporary database procedure and the temporary dependent-object proxies are deleted, or “dropped,” in the database catalog 136 (e.g., using the “drop procedure” statement).

In various example embodiments, compilation of the application source code (see operation 206) does not result in the creation of runtime database procedures. Rather, for each ASMDP, a “create procedure” statement (as is well-known to those familiar with the SQL data description language (DDL)) is generated in or in association with the compilation units (see operation 218). (While semantically belonging to the compilation units, the DDL statements may be stored separately, with suitable references in the compilation units.) In addition to generating the create statements, compilation of the application source code may involve checking whether any of the embedded database procedures already exist in the catalog; if so, and if a comparison reveals that an embedded database procedure differs from the already existing one, this procedures is deleted (e.g., using the “drop procedure” statement executed by the DBMS 106) to prevent the use of outdated database procedures (see operation 219).

When, during later execution of the compilation unit(s) (at operation 208) by the interpreter 124 of the application server 100, an ASMDP is called, an attempt at its execution is made; this attempt results in a specific error if the called database procedure does not yet exist, triggering its creation or “activation” (and the creation/activation of any not yet existing dependent procedures or other objects) in the database catalog 136 based on the stored DDL statements (see operation 220), followed by its execution directly in the database (see operation 222). Thus, ASMDPs may be created upon being called during first-time execution of the compilation unit(s) by the interpreter 124 (or, alternatively, at some earlier time). Thereafter, the already existing database procedures are used. Execution of the database procedures is based on their respective entries in the database catalog 136 and accomplished with conventional database means (represented in FIG. 1 by the SQLScript Compiler/Interpreter 112), which may vary from database to database. In some example embodiments, the database procedures undergo a compilation process (e.g., as part of their activation in the database catalog 136) that results in separately stored runtime artifacts. In other example embodiments, the database procedures are interpreted (as the term is understood by those of ordinary skill in the art). Combinations of compilation and interpretation are also possible.

Beneficially, facilitating the incorporation of database procedures, written in the native database language, into database-accessing host applications (such as, e.g., ABAP programs) eliminates the need for application developers to generate program code objects with two separate development tools (such as, e.g., one for ABAP and one for the database procedures), which may require login under two separate user accounts, and the cumbersome task of manually creating interfaces and mapping data types between these program code objects. Moreover, the present framework for integrating database procedures into a host language is robust with regard to any changes to syntax of the database procedure language, as the parsing and execution of the database procedure remains the responsibility of the database itself.

In some embodiments, ASMDPs can be enhanced with other ASMDPs using explicit extension points defined in the host application by the vendor and used, e.g., by a customer wishing to enhance the application. FIG. 4 is a block diagram illustrating an extensibility framework in accordance with one example embodiment. The extensions are “anchored” within the regular host application 400 in the form of special extension procedure calls 402. One or more extension procedures 404 responsive to a particular extension procedure call 402 may be implemented; these extension procedures 404 are compliant with a pre-defined extension procedure interface 406 associated with the anchor. The extension procedure interface 406 provides a stable contract between the extension provider and the developer implementing one or more extensions by specifying the extension name(s) (or name space), signature (e.g., the number and types of parameters used in the extension), and exceptions that can be thrown in response to errors occurring during execution of the extension. Multiple procedures providing alternative implementations of an extension may be stored in multiple respective extension classes (e.g., one for each implementation). Often, an enhancement to an application involves extensions at multiple extension points, which collectively implement a particular functionality; these interrelated extensions may be grouped together, e.g., via association with a business function they support.

The extension procedures 404 may be registered in an extension register 408 to render them available for use during execution of the application 400. Further, the conditions under which a particular one of the extension 404 is to be used may be specified in a switch framework 410. The switch framework 410 facilitates selective activation of extensions based on business functions: extensions that belong to the same business function may be turned on and off together as a unit. During execution of the application 400, a call 402 to a conventional extension procedure may be delegated to an extension dispatcher 412, which may then invoke all registered extensions for that call in the right order and according to the switch positions of the switch framework 410.

FIGS. 5A and 5B are flow charts illustrating methods, in accordance with example embodiments, for providing extensibility and consuming extensibility, respectively. FIG. 5A illustrates various actions to be taken by the developer of the original application to provide for extensions, e.g., using the extension framework of FIG. 4. As shown, the developer may define an extension spot as the main anchor point for the extension scenario (see operation 500), e.g., by making an appropriate entry in the program catalog 135 that includes a description of the extension, metadata from the extension interface, an indication of the type of extension (e.g., whether it relates to data-processing logic or the user interface), and/or an indication whether only a single implementation of the extension can be used at any given time or whether multiple implementations can be used together (additively). Further, the developer may provide the implementation contract, at operation 502, by defining the extension interface 406 and/or associated metadata. This may be done in an extension interface editor; the editor may be automatically launched in response to the definition of the extension spot or may, alternatively, be launched manually. Finally, the developer may integrate the extension spot in live code (e.g., of application 400) (see operation 504), e.g., by embedding a procedure call 402 to the extension in the code. Although often executed in the order depicted, the three operations 500, 502, 504 may, in some embodiments, also be carried out in a different order. For example, the definition of the extension interface 406 may precede that of the extension spot; in this case, data regarding the extension interface 406 may automatically be populated once the extension spot is being entered in the program catalog 135.

FIG. 5B illustrates various actions to be taken by the developer who enhances or customizes applications by implementing extensions provided for as described above. In order to implement an extension, the developer may create an extension class including one or more extension procedures 404 in accordance with the extension interface 406 (at operation 510), register these implementing extension procedures 404 in the extension register 408 (at operation 512), and assign each of the extension procedures 404 to a business function in the switch framework 410 (at operation 514). In some embodiments, the extension developer may also provide a fallback procedure that is executed if none of the extension procedures 404 is turned on in the switch framework 410. If the fallback procedure is optional and none is provided, the call to the extension procedure 404 is simply ignored in case all extension implementations associated therewith are turned off.

FIG. 6 is a diagram including code snippets that illustrate the use of extensible database procedures in accordance with various example embodiments. In the example shown, the extension framework of FIG. 4 is implemented using “Business Add-ins” (BAdIs), a particular type of extensions in ABAP provided by SAP, which will be familiar to those of ordinary skill in ABAP development. BAdIs using database procedures may be implemented as AMDPs by encapsulating the extension code, which is itself written in SQLScript (or, more generally, the native database procedure language), in an ABAP method 600 including the tag “BY DATABASE PROCEDURE.” Further, in the host application, the BAdI anchor, e.g., the procedure call to the AMDP BAdI, is encapsulated in an AMDP method 602. In some embodiments, only AMDP BAdIs can be called within an AMDP method; the syntax check of the host program may ensure that this is the case. As will be readily apparent to those of ordinary skill in the art, the BAdIs may be created using the same or similar development tools as are employed to define the original software application.

While conventional extensions (e.g., BAdIs) are dynamically integrated into the program flow at the time of execution based on the switch settings in the switch framework 410, this approach is not feasible for stored database procedures, due to their creation and execution in the database itself (as opposed to in the host application). Therefore, for database procedures, the extension dispatcher 412 hard-codes the switch settings. The two integration methods are contrasted in FIGS. 7A and 7B, which are flow charts illustrating methods, in accordance with various example embodiments, for creating and executing application source-code extensions and database-procedure extensions, respectively.

As shown in FIG. 7A, upon embedding of an extension procedure call in the host-application code (see operation 700) and definition and creation of one or more associated conventional extension procedures (e.g., BAdIs) (see operation 702), the application source code and the conventional extension procedure(s) are compiled separately at operations 704, 706. Following the beginning of the execution of the compilation units at operation 708, when a procedure call to a conventional extension (or, more precisely, group of extensions implementing a conventional extension interface associated with the extension spot) is encountered, it is delegated to an extension dispatcher 412 (see operation 710) associated with that extension. The dispatcher 412 queries, at operation 712, the switch framework 410 to ascertain the switch settings (as previously created at operation 714) for all implementations registered for the extension spot, and then calls the active extension implementation(s) in the appropriate order (e.g., based on the relative priorities specified in the implementation(s)). Following execution of the extension procedures in operation 716, execution of the application is resumed at operation 718.

Referring now to FIG. 7B, database procedure extensions (e.g., AMDP BAdIs) are defined and registered (see operation 720), and integrated into host application code by means of a procedure call (see operation 722), in a generally similar manner as conventional extensions, with the major difference that they are encapsulated in ASMDP methods. However, by contrast to conventional extension procedures, ASMDP extensions are not pre-compiled. Rather, when during compilation (beginning at operation 724 and completed at operation 725) a call to an ASMDP extension is encountered within an ASMDP method, the compiler 122 determines the switch settings (as defined at operation 726) of the associated implementations at that point (see operation 728). Based on the switch settings, the compiler 122 causes the creation and configuration of an extension dispatcher (e.g., a BAdI dispatcher 604 as illustrated in FIG. 6) that includes calls only to those ASMDP extension procedures implementing the extension spot that are currently active in the switch framework 410 (see operation 730). In other words, the switch settings are hard-coded into the dispatcher. For the active ASMDP extensions procedures, “create procedure” statements are generated in the compilation units and/or an associated repository of DDL statements, at operation 732. When an ASMDP method calling ASMDP extensions is encountered during execution of the compilation unit(s) (which begins at operation 734), it is delegated to the dispatcher (see operation 736). Based on the ASMDP extension calls hard-coded in the dispatcher, the database procedures defined in the ASMDP extensions (as well as those defined directly in the calling ASMDP method itself) are created in the database catalog 136 and executed (see operation 738). Thereafter, the compiler resumes execution of the host application at operation 740. Since, in this approach, switch settings and registered implementations are hard-coded in the extension dispatcher, any changes to the switch settings or the registration cause classes using the corresponding ASMDP extensions to be invalidated. The hard-coded dispatcher will be adapted during re-compilation of the application code. The extension lifecycle on the database is thereby derived from the host-application's lifecycle management.

Accordingly, various embodiments hereof facilitate customer enhancements to database procedures by suitably modifying an existing framework for extending database-accessing applications (such as, e.g., ABAP programs). In doing so, they provide extension capability that is not currently available on database servers themselves.

Modules, Components, and Logic

Certain example embodiments are described herein as including logic or a number of components, modules, or mechanisms; for example, the system of FIG. 1 and the framework of FIG. 4 include several modules (e.g., development tools 120, parser 121, modeler 108, SQLScript parser 110, switch framework 410, dispatcher 412, etc.) for developing, executing, and extending database-accessing software applications. Modules may constitute either software modules (e.g., code embodied on a machine-readable medium or in a transmission signal) or hardware modules. A “hardware module” is a tangible unit capable of performing certain operations and may be configured or arranged in a certain physical manner. In various example embodiments, one or more computer systems (e.g., a standalone computer system, a client computer system, or a server computer system) or one or more hardware modules of a computer system (e.g., a processor or a group of processors) may be configured by software (e.g., an application or application portion) as a hardware module that operates to perform certain operations as described herein.

In some example embodiments, a hardware module may be implemented mechanically, electronically, or with any suitable combination thereof. For example, a hardware module may include dedicated circuitry or logic that is permanently configured to perform certain operations. For example, a hardware module may be a special-purpose processor, such as a field-programmable gate array (FPGA) or an ASIC. A hardware module may also include programmable logic or circuitry that is temporarily configured by software to perform certain operations. For example, a hardware module may include software encompassed within a general-purpose processor or other programmable processor. It will be appreciated that the decision to implement a hardware module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.

Accordingly, the phrase “hardware module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein. As used herein, “hardware-implemented module” refers to a hardware module. Considering example embodiments in which hardware modules are temporarily configured (e.g., programmed), each of the hardware modules need not be configured or instantiated at any one instance in time. For example, where a hardware module comprises a general-purpose processor configured by software to become a special-purpose processor, the general-purpose processor may be configured as respectively different special-purpose processors (e.g., comprising different hardware modules) at different times. Software may accordingly configure a particular processor or processors, for example, to constitute a particular hardware module at one instance of time and to constitute a different hardware module at a different instance of time.

Hardware modules can provide information to, and receive information from, other hardware modules. Accordingly, the described hardware modules may be regarded as being communicatively coupled. Where multiple hardware modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses) between or among two or more of the hardware modules. In example embodiments in which multiple hardware modules are configured or instantiated at different times, communications between such hardware modules may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple hardware modules have access. For example, one hardware module may perform an operation and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware module may then, at a later time, access the memory device to retrieve and process the stored output. Hardware modules may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information).

The various operations of example methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions described herein. As used herein, “processor-implemented module” refers to a hardware module implemented using one or more processors.

Similarly, the methods described herein may be at least partially processor-implemented, with a particular processor or processors being an example of hardware. For example, at least some of the operations of a method may be performed by one or more processors or processor-implemented modules. Moreover, the one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least some of the operations may be performed by a group of computers (as examples of machines including processors), with these operations being accessible via a network (e.g., the Internet) and via one or more appropriate interfaces (e.g., an application program interface (API)).

The performance of certain of the operations may be distributed among the processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the processors or processor-implemented modules may be located in a single geographic location (e.g., within a home environment, an office environment, or a server farm). In other example embodiments, the processors or processor-implemented modules may be distributed across a number of geographic locations.

Software Architecture

FIG. 8 is a block diagram illustrating an architecture of software 400, portions or the entirety of which may be installed on one or more of the application server 100 and/or the database server 102 depicted in FIG. 1. FIG. 8 is merely a non-limiting example of a software architecture and it will be appreciated that many other architectures may be implemented to facilitate the functionality described herein. The software 800 may be executing on hardware such as machine 900 of FIG. 9 that includes processors 910, memory 930, and I/O components 950. In the example architecture of FIG. 8, the software 800 may be conceptualized as a stack of layers where each layer may provide particular functionality. For example, the software 800 may include layers such as an operating system 802, libraries 804, frameworks 806, and applications 808. Operationally, the applications 808 may invoke application programming interface (API) calls 810 through the software stack and receive messages 812 in response to the API calls 810.

The operating system 802 may manage hardware resources and provide common services. The operating system 802 may include, for example, a kernel 820, services 822, and drivers 824. The kernel 820 may act as an abstraction layer between the hardware and the other software layers. For example, the kernel 820 may be responsible for memory management, processor management (e.g., scheduling), component management, networking, security settings, and so on. The services 822 may provide other common services for the other software layers. The drivers 824 may be responsible for controlling and/or interfacing with the underlying hardware. For instance, the drivers 824 may include display drivers, camera drivers, Bluetooth® drivers, flash memory drivers, serial communication drivers (e.g., Universal Serial Bus (USB) drivers), Wi-Fi® drivers, audio drivers, power management drivers, and so forth.

The libraries 804 may provide a low-level common infrastructure that may be utilized by the applications 808. The libraries 804 may include system libraries 830 (e.g., C standard library) that may provide functions such as memory allocation functions, string manipulation functions, mathematic functions, and the like. In addition, the libraries 804 may include API libraries 832 such as media libraries (e.g., libraries to support presentation and manipulation of various media format such as MPREG4, H.264, MP3, AAC, AMR, JPG, PNG), graphics libraries (e.g., an OpenGL framework that may be used to render 2D and 3D in a graphic content on a display), database libraries (e.g., SQLite that may provide various relational database functions), web libraries (e.g., WebKit that may provide web browsing functionality), and the like. The libraries 804 may also include a wide variety of other libraries 834 to provide many other APIs to the applications 808.

The frameworks 806 may provide a high-level common infrastructure that may be utilized by the applications 808. For example, the frameworks 806 may provide various graphic user interface (GUI) functions, high-level resource management, high-level location services, and so forth. The frameworks 806 may provide a broad spectrum of other APIs that may be utilized by the applications 808, some of which may be specific to a particular operating system or platform.

The applications 808 include a home application 850, a contacts application 852, a browser application 854, a book reader application 856, a location application 858, a media application 860, a messaging application 862, a game application 864, and a broad assortment of other applications such as third-party application 866. In a specific example, the third-party application 866 (e.g., an application developed using the Android™ or iOS™ software development kit (SDK) by an entity other than the vendor of the particular platform) may be mobile software running on a mobile operating system such as iOS™, Android™ Windows® Phone, or other mobile operating systems. In this example, the third party application 866 may invoke the API calls 810 provided by the mobile operating system 802 to facilitate functionality described herein.

Example Machine Architecture and Machine-Readable Medium

FIG. 9 is a block diagram illustrating components of a machine 900, according to some example embodiments, able to read instructions from a machine-readable medium (e.g., a machine-readable storage medium) and perform any one or more of the methodologies discussed herein. Specifically, FIG. 9 shows a diagrammatic representation of the machine 900 in the example form of a computer system, within which instructions 925 (e.g., software, a program, an application, an applet, an app, or other executable code) for causing the machine 900 to perform any one or more of the methodologies discussed herein may be executed. In alternative example embodiments, the machine 900 operates as a standalone device or may be coupled (e.g., networked) to other machines. In a networked deployment, the machine 900 may operate in the capacity of a server machine or a client machine in a server-client network environment, or as a peer machine in a peer-to-peer (or distributed) network environment. The machine 900 may comprise, but be not limited to, a server computer, a client computer, a personal computer (PC), a tablet computer, a laptop computer, a netbook, a set-top box (STB), a personal digital assistant (PDA), an entertainment media system, a cellular telephone, a smart phone, a mobile device, a wearable device (e.g., a smart watch), a smart home device (e.g., a smart appliance), other smart devices, a web appliance, a network router, a network switch, a network bridge, or any machine capable of executing the instructions 925, sequentially or otherwise, that specify actions to be taken by machine 900. Further, while only a single machine 900 is illustrated, the term “machine” shall also be taken to include a collection of machines 900 that individually or jointly execute the instructions 925 to perform any one or more of the methodologies discussed herein.

The machine 900 may include processors 910, memory 930, and I/O components 950, which may be configured to communicate with each other via a bus 905. In an example embodiment, the processors 910 (e.g., a Central Processing Unit (CPU), a Reduced Instruction Set Computing (RISC) processor, a Complex Instruction Set Computing (CISC) processor, a Graphics Processing Unit (GPU), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Radio-Frequency Integrated Circuit (RFIC), another processor, or any suitable combination thereof) may include, for example, processor 915 and processor 920 that may execute instructions 925. The term “processor” is intended to include multi-core processor that may comprise two or more independent processors (also referred to as “cores”) that may execute instructions contemporaneously. Although FIG. 9 shows multiple processors 910, the machine 900 may include a single processor with a single core, a single processor with multiple cores (e.g., a multi-core process), multiple processors with a single core, multiple processors with multiples cores, or any combination thereof.

The memory 930 may include a main memory 935, a static memory 940, and a storage unit 945 accessible to the processors 910 via the bus 905. The storage unit 945 may include a machine-readable medium 947 on which are stored the instructions 925 embodying any one or more of the methodologies or functions described herein. The instructions 925 may also reside, completely or at least partially, within the main memory 935, within the static memory 940, within at least one of the processors 910 (e.g., within a processor's cache memory), or any suitable combination thereof, during execution thereof by the machine 900. Accordingly, the main memory 935, static memory 940, and the processors 910 may be considered as machine-readable media 947.

As used herein, the term “memory” refers to a machine-readable medium 947 able to store data temporarily or permanently and may be taken to include, but not be limited to, random-access memory (RAM), read-only memory (ROM), buffer memory, flash memory, and cache memory. While the machine-readable medium 947 is shown in an example embodiment to be a single medium, the term “machine-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, or associated caches and servers) able to store instructions 925. The term “machine-readable medium” shall also be taken to include any medium, or combination of multiple media, that is capable of storing instructions (e.g., instructions 925) for execution by a machine (e.g., machine 900), such that the instructions, when executed by one or more processors of the machine 900 (e.g., processors 910), cause the machine 900 to perform any one or more of the methodologies described herein. Accordingly, a “machine-readable medium” refers to a single storage apparatus or device, as well as “cloud-based” storage systems or storage networks that include multiple storage apparatus or devices. The term “machine-readable medium” shall accordingly be taken to include, but not be limited to, one or more data repositories in the form of a solid-state memory (e.g., flash memory), an optical medium, a magnetic medium, other non-volatile memory (e.g., Erasable Programmable Read-Only Memory (EPROM)), or any suitable combination thereof. The term “machine-readable medium” specifically excludes non-statutory signals per se.

The I/O components 950 may include a wide variety of components to receive input, provide and/or produce output, transmit information, exchange information, capture measurements, and so on. It will be appreciated that the I/O components 950 may include many other components that are not shown in FIG. 9. In various example embodiments, the I/O components 950 may include output components 952 and/or input components 954. The output components 952 may include visual components (e.g., a display such as a plasma display panel (PDP), a light emitting diode (LED) display, a liquid crystal display (LCD), a projector, or a cathode ray tube (CRT)), acoustic components (e.g., speakers), haptic components (e.g., a vibratory motor), other signal generators, and so forth. The input components 954 may include alphanumeric input components (e.g., a keyboard, a touch screen configured to receive alphanumeric input, a photo-optical keyboard, or other alphanumeric input components), point-based input components (e.g., a mouse, a touchpad, a trackball, a joystick, a motion sensor, and/or other pointing instrument), tactile input components (e.g., a physical button, a touch screen that provides location and force of touches or touch gestures, and/or other tactile input components), audio input components (e.g., a microphone), and the like.

In further example embodiments, the I/O components 950 may include biometric components 956, motion components 958, environmental components 960, and/or position components 962 among a wide array of other components. For example, the biometric components 956 may include components to detect expressions (e.g., hand expressions, facial expressions, vocal expressions, body gestures, or eye tracking), measure biosignals (e.g., blood pressure, heart rate, body temperature, perspiration, or brain waves), identify a person (e.g., voice identification, retinal identification, facial identification, finger print identification, or electroencephalogram based identification), and the like. The motion components 958 may include acceleration sensor components (e.g., accelerometer), gravitation sensor components, rotation sensor components (e.g., gyroscope), and so forth. The environmental components 960 may include, for example, illumination sensor components (e.g., photometer), temperature sensor components (e.g., one or more thermometer that detect ambient temperature), humidity sensor components, pressure sensor components (e.g., barometer), acoustic sensor components (e.g., one or more microphones that detect background noise), proximity sensor components (e.g., infrared sensors that detect nearby objects), and/or other components that may provide indications, measurements, and/or signals corresponding to a surrounding physical environment. The position components 962 may include location sensor components (e.g., a Global Position System (GPS) receiver component), altitude sensor components (e.g., altimeters and/or barometers that detect air pressure from which altitude may be derived), orientation sensor components (e.g., magnetometers), and the like.

Communication may be implemented using a wide variety of technologies. The I/O components 950 may include communication components 964 operable to couple the machine 900 to a network 980 and/or devices 970 via coupling 982 and coupling 972 respectively. For example, the communication components 964 may include a network interface component or other suitable device to interface with the network 980. In further examples, communication components 964 may include wired communication components, wireless communication components, cellular communication components, Near Field Communication (NFC) components, Bluetooth® components (e.g., Bluetooth® Low Energy), Wi-Fi® components, and other communication components to provide communication via other modalities. The devices 970 may be another machine and/or any of a wide variety of peripheral devices (e.g., a peripheral device couple via a Universal Serial Bus (USB)).

Moreover, the communication components 964 may detect identifiers and/or include components operable to detect identifiers. For example, the communication components 964 may include Radio Frequency Identification (RFID) tag reader components, NFC smart tag detection components, optical reader components (e.g., an optical sensor to detect one-dimensional bar codes such as Universal Product Code (UPC) bar code, multi-dimensional bar codes such as Quick Response (QR) code, Aztec code, Data Matrix, Dataglyph, MaxiCode, PDF417, Ultra Code, UCC RSS-2D bar code, and other optical codes), acoustic detection components (e.g., microphones to identify tagged audio signals), and so on. In additional, a variety of information may be derived via the communication components 964, such as location via Internet Protocol (IP) geo-location, location via Wi-Fi® signal triangulation, location via detecting a NFC beacon signal that may indicate a particular location, and so forth.

Transmission Medium

In various example embodiments, one or more portions of the network 980 may be an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan area network (MAN), the Internet, a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a plain old telephone service (POTS) network, a cellular telephone network, a wireless network, a Wi-Fi® network, another type of network, or a combination of two or more such networks. For example, the network 980 or a portion of the network 980 may include a wireless or cellular network and the coupling 982 may be a Code Division Multiple Access (CDMA) connection, a Global System for Mobile communications (GSM) connection, or other type of cellular or wireless coupling. In this example, the coupling 982 may implement any of a variety of types of data transfer technology, such as Single Carrier Radio Transmission Technology (1×RTT), Evolution-Data Optimized (EVDO) technology, General Packet Radio Service (GPRS) technology, Enhanced Data rates for GSM Evolution (EDGE) technology, third Generation Partnership Project (3GPP) including 3G, fourth generation wireless (4G) networks, Universal Mobile Telecommunications System (UMTS), High Speed Packet Access (HSPA), Worldwide Interoperability for Microwave Access (WiMAX), Long Term Evolution (LTE) standard, others defined by various standard setting organizations, other long range protocols, or other data transfer technology.

The instructions 925 may be transmitted and/or received over the network 980 using a transmission medium via a network interface device (e.g., a network interface component included in the communication components 964) and utilizing any one of a number of well-known transfer protocols (e.g., hypertext transfer protocol (HTTP)). Similarly, the instructions 925 may be transmitted and/or received using a transmission medium via the coupling 972 (e.g., a peer-to-peer coupling) to devices 970. The term “transmission medium” shall be taken to include any intangible medium that is capable of storing, encoding, or carrying instructions 925 for execution by the machine 900, and includes digital or analog communications signals or other intangible media to facilitate communication of such software.

Furthermore, the machine-readable medium 947 is non-transitory (in other words, not having any transitory signals) in that it does not embody a propagating signal. However, labeling the machine-readable medium 947 as “non-transitory” should not be construed to mean that the medium is incapable of movement; the medium should be considered as being transportable from one physical location to another. Additionally, since the machine-readable medium 947 is tangible, the medium may be considered to be a machine-readable device.

Term Usage

Throughout this specification, plural instances may implement components, operations, or structures described as a single instance. Although individual operations of one or more methods are illustrated and described as separate operations, one or more of the individual operations may be performed concurrently, and nothing requires that the operations be performed in the order illustrated. Structures and functionality presented as separate components in example configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements fall within the scope of the subject matter herein.

Although an overview of the inventive subject matter has been described with reference to specific example embodiments, various modifications and changes may be made to these embodiments without departing from the broader scope of embodiments of the present disclosure. Such embodiments of the inventive subject matter may be referred to herein, individually or collectively, by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single disclosure or inventive concept if more than one is, in fact, disclosed.

The example embodiments illustrated herein are described in sufficient detail to enable those skilled in the art to practice the teachings disclosed. Other example embodiments may be used and derived therefrom, such that structural and logical substitutions and changes may be made without departing from the scope of this disclosure. The Detailed Description, therefore, is not to be taken in a limiting sense, and the scope of various example embodiments is defined only by the appended claims, along with the full range of equivalents to which such claims are entitled.

As used herein, the term “or” may be construed in either an inclusive or exclusive sense. Moreover, plural instances may be provided for resources, operations, or structures described herein as a single instance. Additionally, boundaries between various resources, operations, modules, engines, and data stores are somewhat arbitrary, and particular operations are illustrated in a context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within a scope of various example embodiments of the present disclosure. In general, structures and functionality presented as separate resources in the example configurations may be implemented as a combined structure or resource. Similarly, structures and functionality presented as a single resource may be implemented as separate resources. These and other variations, modifications, additions, and improvements fall within the scope of example embodiments of the present disclosure as represented by the appended claims. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. 

The invention claimed is:
 1. A computer-implemented method comprising: defining a host application including a method declared as a database procedure, and embedding an extension procedure call within the method, the extension procedure call anchoring an extension within the host application and having an associated extension procedure interface that specifies at least one of an extension name, an extension signature, or exceptions to be thrown in response to errors occurring during execution of the extension; implementing the extension as one or more extension procedures responsive to the extension procedure call and complying with the extension interface, and encapsulating the one or more extension procedures in one more methods declared as database procedures; registering the one or more extension procedures in an extension register and selectively activating the one or more extension procedures: compiling the host application, whereby an extension dispatcher calling the selectively activated ones of the one or more extension procedures is created; and executing the compiled host application, whereby one or more database procedures defined within the extension procedures called by the extension dispatcher are created and executed in a database.
 2. The method of claim 1, wherein the methods declared as database procedures are application-server-managed database procedure (ASMDP) methods.
 3. The method of claim 2, wherein each of the ASMDP methods includes a database procedure written in SQLScript or LLANG.
 4. The method of claim 2, wherein the one or more extensions procedures are Business Add-ins (BAdIs).
 5. The method of claim 1, further comprising assigning one or more business functions to the one or more extension procedures, wherein the one or more extension procedures are selectively activated in the switch framework based on the assigned one or more business functions.
 6. The method of claim 1, further comprising defining the extension procedure interface.
 7. A system comprising: one or more processors; and one or more machine-readable media storing a plurality of software modules for execution by the one or more processors, the software modules comprising: at least one source-code editor for defining source code of a host application including a method declared as a database procedure and embedding an extension procedure call within the method, the extension procedure call anchoring an extension within the host application and having an associated extension interface that specifies at least one of an extension name, an extension signature, or exceptions to be thrown in response to errors occurring during execution of the extension, and for further defining one or more extension procedures responsive to the extension procedure call and complying with the extension interface, and encapsulating the one or more extension procedures in one more methods declared as database procedures; a switch framework wherein the one or more extension procedures are selectively activated; a compiler configured to cause, upon encountering the extension procedure call during compilation of the source code, creation of an extension dispatcher calling the selectively activated ones of the one or more extension procedures; and an interpreter configured to call the extension dispatcher upon encountering the extension procedure call when executing the compiled source code, and further configured to cause, upon a call of one of the extension procedures by the extension dispatcher, creation and execution of a database procedure contained therein in a database.
 8. The system of claim 7, wherein groups of extension procedures are selectively activated in the switch framework based on business functions associated with the groups.
 9. The system of claim 7, the one or more machine-readable media further storing an extension register wherein extension procedures available for activation in the switch framework are registered.
 10. The system of claim 7, wherein the methods declared as database procedures are ASMDP methods.
 11. The system of claim 10, wherein each of the ASMDP methods includes a database procedure written in SQL Script or LLANG.
 12. The system of claim 10, wherein the one or more extension procedures are BAdIs.
 13. The system of claim 7, further comprising an extension interface editor for defining an extension procedure interface.
 14. A non-transitory machine-readable medium storing processor-executable instructions for compiling and executing a host application including an embedded method declared as a database procedure comprising an extension procedure call within the method that anchors an extension within the host application and has an associated extension procedure interface that specifies at least one of an extension name, an extension signature, or exceptions to be thrown in response to errors occurring during execution of the extension, the instructions, when executed by the processor, causing the processor to: compile the host application and, upon encountering the extension procedure call within the embedded extensible database procedure, create an extension dispatcher and configure the extension dispatcher, based on selective activation of one or more extension procedures encapsulated in one or more methods declared as database procedures that are responsive to the extension procedure call and comply with the extension interface, to call the activated ones of the one or more extension procedures; execute the compiled host application, whereby the extension dispatcher is called upon encountering the extension procedure call within the compiled embedded extensible database procedure; and upon a call of an activated one of the one or more extension procedures by the extension dispatcher, cause creation and execution, in a database, of a database procedure contained in the called activated extension procedure.
 15. The machine-readable medium of claim 14, wherein the embedded extensible database procedure is embedded in an ASMDP method.
 16. The machine-readable medium of claim 15, wherein the one or more extension procedures are ASMDP methods.
 17. The machine-readable medium of claim 14, wherein the one or more extension procedures are BAdIs. 