CN110413336A - Exploration project starts method, apparatus, server and storage medium - Google Patents
Exploration project starts method, apparatus, server and storage medium Download PDFInfo
- Publication number
- CN110413336A CN110413336A CN201910528779.7A CN201910528779A CN110413336A CN 110413336 A CN110413336 A CN 110413336A CN 201910528779 A CN201910528779 A CN 201910528779A CN 110413336 A CN110413336 A CN 110413336A
- Authority
- CN
- China
- Prior art keywords
- component
- file
- shielded
- object module
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000003860 storage Methods 0.000 title claims abstract description 15
- 239000007858 starting material Substances 0.000 claims abstract description 11
- 230000015654 memory Effects 0.000 claims description 19
- 235000006719 Cassia obtusifolia Nutrition 0.000 claims description 16
- 235000014552 Cassia tora Nutrition 0.000 claims description 16
- 244000201986 Cassia tora Species 0.000 claims description 16
- 238000004590 computer program Methods 0.000 claims description 13
- 238000011161 development Methods 0.000 abstract description 21
- 230000002829 reductive effect Effects 0.000 abstract description 7
- 230000006870 function Effects 0.000 description 32
- 235000010627 Phaseolus vulgaris Nutrition 0.000 description 14
- 244000046052 Phaseolus vulgaris Species 0.000 description 14
- 230000000977 initiatory effect Effects 0.000 description 8
- 238000004422 calculation algorithm Methods 0.000 description 4
- 238000012217 deletion Methods 0.000 description 4
- 230000037430 deletion Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000005538 encapsulation Methods 0.000 description 4
- 238000002955 isolation Methods 0.000 description 4
- 238000013507 mapping Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 239000010453 quartz Substances 0.000 description 4
- VYPSYNLAJGMNEJ-UHFFFAOYSA-N silicon dioxide Inorganic materials O=[Si]=O VYPSYNLAJGMNEJ-UHFFFAOYSA-N 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000011084 recovery Methods 0.000 description 3
- 238000009825 accumulation Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 230000002427 irreversible effect Effects 0.000 description 2
- 230000007257 malfunction Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000036961 partial effect Effects 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/20—Software design
- G06F8/24—Object-oriented
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44521—Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44568—Immediately runnable code
- G06F9/44578—Preparing or optimising for loading
Abstract
A kind of exploration project starting method, which comprises receive the enabled instruction for the object module in exploration project;Determine the to be shielded file and/or to be shielded component unrelated with the object module;Shield the file to be shielded and/or component to be shielded;According to the file to be shielded and/or component to be shielded, associated documents relevant to the object module and/or associated component are determined;The associated documents and/or the associated component are loaded, to start the object module.The present invention also provides a kind of exploration project starter, server and storage mediums.The present invention can be reduced the starting time of project, meanwhile, improve the development efficiency of project.
Description
Technical field
The present invention relates to project development technical field more particularly to a kind of exploration project starting method, apparatus, server and
Storage medium.
Background technique
In the development process of project, a developer would generally be responsible for some module or function of the project.With
Project is continually developed, and project is increasing, and the module or function of project are also more and more, this allows for load when project initiation
Content it is more and more, the speed for causing project initiation is slower and slower.
Found in practice, developer usually only need to spend several seconds time go to modify the module oneself being responsible for some
File, but the starting time of entire project but needs 6 minutes or so, and for developer, they, which are only concerned, bears
The modification time of some module of duty, is not relevant for the starting time of entire project, if the starting time of entire project is significantly
More than the modification time for the module that he is responsible for, this can undoubtedly waste the time of developer, meanwhile, reduce project development
Efficiency.
Summary of the invention
In view of the foregoing, it is necessary to which a kind of exploration project starting method, apparatus, server and storage medium, energy are provided
The starting time of project is enough reduced, meanwhile, improve the development efficiency of project.
The first aspect of the present invention provides a kind of exploration project starting method, which comprises
Receive the enabled instruction for the object module in exploration project;
Determine the to be shielded file and/or to be shielded component unrelated with the object module;
Shield the file to be shielded and/or component to be shielded;
According to the file to be shielded and/or component to be shielded, determine associated documents relevant to the object module and/
Or associated component;
The associated documents and/or the associated component are loaded, to start the object module.
In one possible implementation, described after the shielding file to be shielded and/or component to be shielded
Method further include:
Obtain remaining file and/or component;
According to the dependence between the remaining file and/or component, judge to load the remaining file and/or
Whether component can start the object module;
If the object module cannot be started by loading the remaining file and/or component, from the described to be shielded of shielding
In file and/or component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined;
Restore the file to be restored and/or component to be restored;
It is described according to the file to be shielded and/or component to be shielded, it is determining relevant related literary with the object module
Part and/or associated component include;
According to the file to be shielded and/or component to be shielded and the file to be restored and/or component to be restored, really
Fixed associated documents relevant to the object module and/or associated component.
In one possible implementation, the determination to be shielded file unrelated with the object module and/or to
Shield assembly includes:
Obtain deployment descriptor file;
The serve end program unrelated with the object module is determined from the deployment descriptor file;
The shielding file to be shielded and/or component to be shielded include:
Shield the serve end program.
In one possible implementation, the determination to be shielded file unrelated with the object module and/or to
Shield assembly includes:
Obtain Enterprise Java Beans configuration describing document;
The all components unrelated with the object module are determined from the Enterprise Java Beans configuration describing document;
Infrastructure component and common package are determined from all components;
The shielding file to be shielded and/or component to be shielded include:
Shield the component in all components in addition to the infrastructure component and the common package.
In one possible implementation, the determination to be shielded file unrelated with the object module and/or to
Shield assembly includes:
Obtain data base manipulation statement configuration file;
The data base manipulation statement unrelated with the object module is determined from the data base manipulation statement configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the data base manipulation statement.
In one possible implementation, the determination to be shielded file unrelated with the object module and/or to
Shield assembly includes:
Obtain configuration file relevant to timer in the exploration project;
The timer unrelated with the object module is determined from the configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the timer unrelated with the object module.
In one possible implementation, the determination to be shielded file unrelated with the object module and/or to
Shield assembly includes:
Obtain routing configuration file;
The binding address unrelated with the object module is determined from the routing configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the binding address.
The second aspect of the present invention provides a kind of exploration project starter, and the exploration project starter includes:
Receiving module, for receiving the enabled instruction for the object module being directed in exploration project;
First determining module, for determining the to be shielded file and/or to be shielded component unrelated with the object module;
Shroud module, for shielding the file to be shielded and/or component to be shielded;
Second determining module, for according to the file to be shielded and/or component to be shielded, the determining and object module
Relevant associated documents and/or associated component;
Loading module, for loading the associated documents and/or the associated component, to start the object module.
The third aspect of the present invention provides a kind of server, and the server includes processor and memory, the processing
Device realizes the exploration project starting method when being used to execute the computer program stored in the memory.
The fourth aspect of the present invention provides a kind of computer readable storage medium, deposits on the computer readable storage medium
Computer program is contained, realizes that the exploration project starts method when the computer program is executed by processor.
By above technical scheme, in the present invention, the enabled instruction for the object module in exploration project can receive;Into
One step, determine the to be shielded file and/or to be shielded component unrelated with the object module;Further, described in shielding
File to be shielded and/or component to be shielded;Still further, according to the file to be shielded and/or component to be shielded, determine with
The relevant associated documents of the object module and/or associated component;Load file relevant to the object module and/or group
Part, to start the object module.As it can be seen that before starting for the object module in exploration project, passing through screen in the present invention
The to be shielded file and/or to be shielded component unrelated with the object module are covered, what is loaded when can reduce project initiation is interior
Holding, this can reduce the starting time of project, meanwhile, improve the development efficiency of project.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of the preferred embodiment of exploration project starting method disclosed by the invention.
Fig. 2 is a kind of functional block diagram of the preferred embodiment of exploration project starter disclosed by the invention.
Fig. 3 is the structural schematic diagram of the server for the preferred embodiment that the present invention realizes exploration project starting method.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real
Applying example, the present invention will be described in detail.It should be noted that in the absence of conflict, the embodiment of the present invention and embodiment
In feature can be combined with each other.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Unless otherwise defined, all technical and scientific terms used herein and belong to technical field of the invention
The normally understood meaning of technical staff is identical.Term as used herein in the specification of the present invention is intended merely to description tool
The purpose of the embodiment of body, it is not intended that in the limitation present invention.
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real
Applying mode, the present invention is described in further detail.
The exploration project starting method application of the embodiment of the present invention in the server, can also apply in server and pass through
In the hardware environment that the electronic equipment that network and the server are attached is constituted, held jointly by server and electronic equipment
Row.Network includes but is not limited to: wide area network, Metropolitan Area Network (MAN) or local area network.
Wherein, server, which can refer to, to provide the department of computer science of service to equipment (such as electronic equipment) other in network
System.If personal computer can externally provide File Transfer Protocol (File Transfer Protocol, abbreviation FTP) clothes
Business, can also be server.From narrow scope, server refers exclusively to certain high-performance computers, can externally be mentioned by network
For service, for common PC, stability, safety, performance etc. require it is higher, therefore
The hardware such as CPU, chipset, memory, disk system, network and common PC are different.
Referring to Figure 1, Fig. 1 is a kind of flow chart of the preferred embodiment of exploration project starting method disclosed by the invention.
Wherein, the sequence of step can change in the flow chart according to different requirements, and certain steps can be omitted.
S11, server receive the enabled instruction for the object module in exploration project.
In the development process of project, project is often split into modules different one by one by function, is allowed different
Developer can carry out development to the module being each responsible for simultaneously, improve the efficiency of project development.
Wherein, module, also known as component are the collection for referring to individually name and be independently completed the program statement of certain function
It closes (i.e. the aggregate of program code and data structure).There are two basic features for its tool: surface and internal feature.
Wherein, surface refers to interface that module contacts with external environment (i.e. other modules or the routine call module
Mode, include the global variable of input/output argument, reference) and module function;Internal feature refers to the inside of module
Environment has the special feature that (i.e. the local data of the module and program code).
Wherein, object module can be understood as some developer some module in responsible exploration project.
S12, server determine the to be shielded file and/or to be shielded component unrelated with the object module.
In general, containing many a modules inside a project, when a module needs to start, it is full load is not needed
The file and/or component in portion.
Wherein, the file to be shielded and/or component to be shielded refer to the file and/or group unrelated with the object module
Part, in order to accelerate the starting time of module, these files unrelated with the object module and/or component need to shield.
Wherein, component (Component) is the simplified package to data and method, is part reusable in program, In
During software development, reusable part can be generally packaged, after packaged, so that it may it calls directly, without
Rewrite this partial code.
Optionally, the determination to be shielded file unrelated with the object module and/or component to be shielded include:
Obtain deployment descriptor file;
The serve end program unrelated with the object module is determined from the deployment descriptor file;
The shielding file to be shielded and/or component to be shielded include:
Shield the serve end program.
Wherein, deployment descriptor file refers to web.xml file, needs to add when for configuring web (network) project initiation
The information of load.
Wherein, the serve end program Servlet (Server Applet) is the abbreviation of Java Servlet, referred to as small
Service routine or service adapter, with the server of written in Java, major function is interactively to browse and modify
Data generate dynamic web content.
Specifically, the deployment descriptor file state presence of the serve end program, and bind specific class with
And access path.
Wherein, class (Class) is that Object-oriented Programming Design (OOP, Object-Oriented Programming) is realized
The basis of Information encapsulation.Class is a kind of user defined type, also referred to as Class Type.Each class includes data explanation and one group of operand
According to or transmitting message function.The example of class is known as object.
In the optional embodiment, deployment descriptor file can be first obtained, from the deployment descriptor file
After the determining serve end program unrelated with the object module, so that it may shield the serve end program, leave behind the portion
Program relevant to the object module in descriptor file is affixed one's name to, is loaded when can thus reduce the starting object module
Content, to reduce the starting time.
Optionally, the determination to be shielded file unrelated with the object module and/or component to be shielded include:
Obtain Enterprise Java Beans configuration describing document;
The all components unrelated with the object module are determined from the Enterprise Java Beans configuration describing document;
Infrastructure component and common package are determined from all components;
The shielding file to be shielded and/or component to be shielded include:
Shield the component in all components in addition to the infrastructure component and the common package.
Wherein, the Enterprise Java Beans refer to that EJB (Enterprise JavaBean), EJB are J2EE (Java2
Platform, Enterprise Edition) server end component model, EJB include Session Border Control (Session Bean),
Entity B ean (Entity Bean), Message-Driven Bean (Message Driven Bean).Wherein, it is big enterprise that J2EE, which is one,
The calculating type of industry host-level and the Java platform designed.
Wherein, Session Border Control is utilized to complete the business operation of some server ends in J2EE application program, such as visits
It asks database, call other EJB components;Entity B ean is domain model object, maps (object/ for realizing O/R
Relational mapping, Object/Relational Mapping), it is responsible for the record of table in database being mapped to entity object;Message-driven
Bean is the new firms Bean introduced in EJB2.0, and an actually asynchronous Stateless session Bean, client call disappears
It withouts waiting for, immediately returns to after breath driving Bean.
Wherein, the infrastructure component includes but is not limited to: System (system) class, Runtime (running environment) class, Date
(date) class, Math (mathematics) class and Random (random) class etc..
Wherein, the common package refer to the daily accumulation of developer, encapsulation it is good, functional independence, often use
The range of the accessory part arrived, the common package can include but is not limited to: collection class (including synchronization, sequence etc.), equipment
Assisted class (including the assisted class such as sound, photo acquisition, clipbook, computer hardware information, keyboard, mouse), encryption class (including
Base64, Md5 (Message-Digest Algorithm, Message Digest 5), SHA1 (Secure Hash
Algorithm1, secure hash algorithm 1), it is reversible with irreversible encryption etc.) and thread class etc..The common package can help
Developer saves many development times.Wherein, Base64 is that one kind based on 64 printable characters indicates binary data
Method;Md5 refers to a kind of Cryptographic Hash Function being widely used, and can produce out the hash of one 128 (16 byte)
It is worth (hash value), for ensuring that information transmission is complete consistent;SHA1 is a kind of Cryptographic Hash Function, and message is treated as always
One position (bit) character string is handled.
In the optional embodiment, Enterprise Java Beans configuration describing document can be first obtained, from the enterprise
It, will also be from described all groups after determining all components unrelated with the object module in grade Java component configuration describing document
Infrastructure component and common package are determined in part, further, are shielded in all components except the infrastructure component and the public affairs
With the component except component, the component content loaded when starting the object module can be thus reduced, when reducing starting
Between.
Optionally, the determination to be shielded file unrelated with the object module and/or component to be shielded include:
Obtain data base manipulation statement configuration file;
The data base manipulation statement unrelated with the object module is determined from the data base manipulation statement configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the data base manipulation statement.
Wherein, the data base manipulation statement abbreviation SQL, for accessing data and querying, updating, and managing relationship number
According to library system;It is simultaneously also the extension name of database script file.
Specifically, during exploitation, it will usually need the data base manipulation statement used to encapsulate exploration project
Come, it is only necessary to which specified data library action statement can be called by providing specific parameter, and not have to repeat to go to write described
Data base manipulation statement.But for a module, the operation for having excessive to database is not needed many times, than
Such as, some module is accomplished that function of search, there was only the operation inquired to database, as other data base manipulation statements are to use
Less than, such as insertion, deletion and update etc..These data base manipulation statements taken less than are not required to be loaded, and being can be by
Shielding, any influence will not be had to the object module by shielding.It therefore, can be in the optional embodiment
Data base manipulation statement configuration file is first obtained, the determining and object module from the data base manipulation statement configuration file
After unrelated data base manipulation statement, so that it may the shielding data base manipulation statement unrelated with the object module, only
Retain data base manipulation statement relevant to the object module in the data base manipulation statement configuration file, it thus can be with
The data base manipulation statement content loaded when starting the object module is reduced, to reduce the starting time.
Optionally, the determination to be shielded file unrelated with the object module and/or component to be shielded include:
Obtain configuration file relevant to timer in the exploration project;
The timer unrelated with the object module is determined from the configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the timer unrelated with the object module.
Specifically, the timer is one preset time value of setting, then after the preset time value or every
The function of pre-set programs code is executed every this time value.
For example, triggering timer, the timer is for monitoring the user in some page when user logins successfully
Without operation duration, when the user is when the page is more than the preset time value of timer without operation duration, logging off users
Logging state.At this point, the user needs to re-start register.
Specifically, there are mainly two types of timers: Timer timer and Quartz timer in Java exploitation.
Wherein, Timer (timer) is provided in JDK (Java Development Kit, Java development kit)
One Timer Utility, use when, can play an individual thread except main thread and execute specified plan target, can
It once or is repeatedly executed repeatedly with specified execute.Quartz is one completely by the open source job scheduling frame of written in Java,
Simple powerful mechanism is provided to carry out job scheduling in java application.
In the optional embodiment, configuration file relevant to timer in the exploration project can be first obtained,
After determining the timer unrelated with the object module in the configuration file, so that it may shielding and the object module without
The timer of pass leaves behind timer relevant to the object module in the configuration file, can thus reduce starting
The timer content loaded when the object module, to reduce the starting time.
Optionally, the determination to be shielded file unrelated with the object module and/or component to be shielded include:
Obtain routing configuration file;
The binding address unrelated with the object module is determined from the routing configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the binding address.
Wherein, the routing refers to the specific method being mapped to address (URL) in the concrete kind of Java, or is mapped to
On specific JSP (Java Server Pages, Java service page) file.Wherein, JSP is in traditional webpage HTML
Java applet is inserted into (HyperText Markup Language, HyperText Markup Language) file (* .htm, * .html)
Section (Scriptlet) and JSP label (tag), to form jsp file, suffix is entitled (.jsp).
Wherein, the binding address refers to the address for the specific method being mapped in concrete kind.Different addresses may tie
The different function of disparate modules is tied up.
Specifically, it is not required to be loaded by other modules in addition to the object module that address bundlees.Therefore,
In the optional embodiment, routing configuration file can be first obtained, the determining and mesh from the routing configuration file
After marking the unrelated binding address of module, so that it may the binding address is shielded, it can be to avoid by shielding the binding address
The method of other modules of call address binding, thus can load other modules to avoid when starting the object module
Content reduces the content loaded when starting the object module, reduces the starting time.
S13, server shield the file to be shielded and/or component to be shielded.
Wherein, the mode of the shielding includes but is not limited to: the modes such as deletion, annotation and isolation.Wherein, the annotation is
Finger falls the code annotation of the component to be shielded, and the code after annotation will not be compiled device compiling;The isolation refers to institute
State file to be shielded be moved to exploration project scanning less than catalogue under, it is ensured that will not be loaded by the object module.
S14, according to the file to be shielded and/or component to be shielded, server determination is relevant to the object module
Associated documents and/or associated component.
Specifically, remove the file to be shielded and/or component to be shielded from whole file and/or component, it is remaining
File and/or component be associated documents relevant to the object module and/or associated component.
As an alternative embodiment, after step S13, the method also includes:
Obtain remaining file and/or component;
According to the dependence between the remaining file and/or component, judge to load the remaining file and/or
Whether component can start the object module;
If the object module cannot be started by loading the remaining file and/or component, from the described to be shielded of shielding
In file and/or component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined;
Restore the file to be restored and/or component to be restored;
For step S14 according to the file to be shielded and/or component to be shielded, determination is relevant related to the object module
File and/or associated component include;
According to the file to be shielded and/or component to be shielded and the file to be restored and/or component to be restored, really
Fixed associated documents relevant to the object module and/or associated component.
Specifically, there may be the relationships that certain is relied between file and file, between component and component.For example, In
In Java exploitation, if first class has invoked the method and/or data of second class, first class is just to second class
Dependence is produced, if second class is shielded, first class may malfunction in operation.It therefore, be according to institute
The dependence between remaining file and/or component is stated, it is further to remaining file and/or component to be judged.
Wherein, the file to be restored and/or component to be restored refer in the file to be shielded and/or component to be shielded
In, file relevant to the object module and/or component have the file and/or component of dependence.The file to be restored
And/or the method that needs to call there may be file relevant to the object module and/or component in component to be restored and/or
Data etc..
In the optional embodiment, available remaining file and/or component, then according to the remaining text
Dependence between part and/or component judges whether load the remaining file and/or component can start the target mould
Block, if the load remaining file and/or component cannot start the object module it is necessary to from the text to be shielded of shielding
In part and/or component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined, finally restore described to extensive
Multiple file and/or component to be restored.Wherein, the remaining file and/or component and the file to be restored and/or to
Recovery component is associated documents relevant to the object module and/or associated component together.The file to be restored and/or
Component to be restored namely file relevant to the object module and/or component are essential in start-up loading.
S15, server load the associated documents and/or the associated component, to start the object module.
Specifically, the file and/or component loaded when starting the object module is to start the mesh by screening
It does not need to load the file and/or component unrelated with the object module when marking module, need to only load and the object module phase
The file and/or component of pass, to reduce the content loaded when starting the object module.
In the method flow described in Fig. 1, the enabled instruction for the object module in exploration project can receive;Into
One step, determine the to be shielded file and/or to be shielded component unrelated with the object module;Further, described in shielding
File to be shielded and/or component to be shielded;Still further, according to the file to be shielded and/or component to be shielded, determine with
The relevant associated documents of the object module and/or associated component;Load file relevant to the object module and/or group
Part, to start the object module.As it can be seen that before starting for the object module in exploration project, passing through screen in the present invention
The to be shielded file and/or to be shielded component unrelated with the object module are covered, what is loaded when can reduce project initiation is interior
Holding, this can reduce the starting time of project, meanwhile, improve the development efficiency of project.
The above is only a specific embodiment of the invention, but scope of protection of the present invention is not limited thereto, for
For those skilled in the art, without departing from the concept of the premise of the invention, improvement, but these can also be made
It all belongs to the scope of protection of the present invention.
Fig. 2 is referred to, Fig. 2 is a kind of functional module of the preferred embodiment of exploration project starter disclosed by the invention
Figure.
In some embodiments, the exploration project starter is run in server.The exploration project starting dress
Setting may include multiple functional modules as composed by program code segments.Each program segment in the exploration project starter
Program code can store in memory, and as performed by least one processor, item is developed described in Fig. 1 to execute
Step some or all of in mesh starting method.
In the present embodiment, function of the exploration project starter according to performed by it can be divided into multiple function
It can module.The functional module may include: receiving module 201, the first determining module 202, the determination of shroud module 203, second
Module 204 and loading module 205.The so-called module of the present invention refers to that one kind can be performed by least one processor and energy
The series of computation machine program segment of fixed function is enough completed, storage is in memory.In some embodiments, about each module
Function will be described in detail in subsequent embodiment.
Receiving module 201, for receiving the enabled instruction for the object module being directed in exploration project;
In the development process of project, project is often split into modules different one by one by function, is allowed different
Developer can carry out development to the module being each responsible for simultaneously, improve the efficiency of project development.
Wherein, module, also known as component are the collection for referring to individually name and be independently completed the program statement of certain function
It closes (i.e. the aggregate of program code and data structure).There are two basic features for its tool: surface and internal feature.
Wherein, surface refers to interface that module contacts with external environment (i.e. other modules or the routine call module
Mode, include the global variable of input/output argument, reference) and module function;Internal feature refers to the inside of module
Environment has the special feature that (i.e. the local data of the module and program code).
Wherein, object module can be understood as some developer some module in responsible exploration project.
First determining module 202, for the determining to be shielded file unrelated with the object module and/or to be shielded group
Part;
In general, containing many a modules inside a project, when a module needs to start, it is full load is not needed
The file and/or component in portion.
Wherein, the file to be shielded and/or component to be shielded refer to the file and/or group unrelated with the object module
Part, in order to accelerate the starting time of module, these files unrelated with the object module and/or component need to shield.
Wherein, component (Component) is the simplified package to data and method, is part reusable in program, In
During software development, reusable part can be generally packaged, after packaged, so that it may it calls directly, without
Rewrite this partial code.
Shroud module 203, for shielding the file to be shielded and/or component to be shielded;
Wherein, the mode of the shielding includes but is not limited to: the modes such as deletion, annotation and isolation.Wherein, the annotation is
Finger falls the code annotation of the component to be shielded, and the code after annotation will not be compiled device compiling;The isolation refers to institute
State file to be shielded be moved to exploration project scanning less than catalogue under, it is ensured that will not be loaded by the object module.
Second determining module 204, for according to the file to be shielded and/or component to be shielded, the determining and target
The relevant associated documents of module and/or associated component;
Specifically, remove the file to be shielded and/or component to be shielded from whole file and/or component, it is remaining
File and/or component be associated documents relevant to the object module and/or associated component.
Wherein, if the load remaining file and/or component cannot start the object module, then the institute from shielding
It states after restoring the file to be restored and/or component to be restored in file to be shielded and/or component to be shielded, the remaining text
Part and/or component and the file to be restored and/or component to be restored are relevant related to the object module together
File and/or associated component.
Loading module 205, for loading the associated documents and/or the associated component, to start the object module.
Specifically, the file and/or component loaded when starting the object module is to start the mesh by screening
It does not need to load the file and/or component unrelated with the object module when marking module, need to only load and the object module phase
The file and/or component of pass, to reduce the content loaded when starting the object module.
As an alternative embodiment, the exploration project starter further include:
Module is obtained, for after the shroud module 203 shields the file to be shielded and/or component to be shielded,
Obtain remaining file and/or component;
Judgment module, it is described surplus for according to the dependence between the remaining file and/or component, judging to load
Whether remaining file and/or component can start the object module;
Third determining module, if the object module cannot be started for loading the remaining file and/or component, from
In the file to be shielded and/or component to be shielded of shielding, the file to be restored for needing to restore and/or to be restored group are determined
Part;
Recovery module, for restoring the file to be restored and/or component to be restored;
Second determining module 204 is according to the file to be shielded and/or component to be shielded, the determining and target mould
The relevant associated documents of block and/or associated component include:
According to the file to be shielded and/or component to be shielded and the file to be restored and/or component to be restored, really
Fixed associated documents relevant to the object module and/or associated component.
Specifically, there may be the relationships that certain is relied between file and file, between component and component.For example, In
In Java exploitation, if first class has invoked the method and/or data of second class, first class is just to second class
Dependence is produced, if second class is shielded, first class may malfunction in operation.It therefore, be according to institute
The dependence between remaining file and/or component is stated, it is further to remaining file and/or component to be judged.
Wherein, the file to be restored and/or component to be restored refer in the file to be shielded and/or component to be shielded
In, file relevant to the object module and/or component have the file and/or component of dependence.The file to be restored
And/or the method that needs to call there may be file relevant to the object module and/or component in component to be restored and/or
Data etc..
In the optional embodiment, available remaining file and/or component, then according to the remaining text
Dependence between part and/or component judges whether load the remaining file and/or component can start the target mould
Block, if the load remaining file and/or component cannot start the object module it is necessary to from the text to be shielded of shielding
In part and/or component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined, finally restore described to extensive
Multiple file and/or component to be restored, wherein the file to be restored of recovery and/or component to be restored namely with the target
The relevant file of module and/or component are essential in start-up loading.
As an alternative embodiment, first determining module 202 includes:
First acquisition submodule, for obtaining deployment descriptor file;
First determines submodule, for determining the service unrelated with the object module from the deployment descriptor file
Hold program;
The shroud module 203 shields the mode of the file to be shielded and/or component to be shielded specifically:
Shield the serve end program.
Wherein, deployment descriptor file refers to web.xml file, needs to add when for configuring web (network) project initiation
The information of load.
Wherein, the serve end program Servlet (Server Applet) is the abbreviation of Java Servlet, referred to as small
Service routine or service adapter, with the server of written in Java, major function is interactively to browse and modify
Data generate dynamic web content.
Specifically, the deployment descriptor file state presence of the serve end program, and bind specific class with
And access path.
Wherein, class (Class) is that Object-oriented Programming Design (OOP, Object-Oriented Programming) is realized
The basis of Information encapsulation.Class is a kind of user defined type, also referred to as Class Type.Each class includes data explanation and one group of operand
According to or transmitting message function.The example of class is known as object.
In the optional embodiment, deployment descriptor file can be first obtained, from the deployment descriptor file
After the determining serve end program unrelated with the object module, so that it may shield the serve end program, leave behind the portion
Program relevant to the object module in descriptor file is affixed one's name to, is loaded when can thus reduce the starting object module
Content, to reduce the starting time.
As an alternative embodiment, first determining module 202 includes:
Second acquisition submodule, for obtaining Enterprise Java Beans configuration describing document;
Second determines submodule, for the determining and target mould from the Enterprise Java Beans configuration describing document
The unrelated all components of block;
Described second determines submodule, is also used to determine infrastructure component and common package from all components;
The shroud module 203 shields the mode of the file to be shielded and/or component to be shielded specifically:
Shield the component in all components in addition to the infrastructure component and the common package.
Wherein, the Enterprise Java Beans refer to that EJB (Enterprise JavaBean), EJB are J2EE (Java2
Platform, Enterprise Edition) server end component model, EJB include Session Border Control (Session Bean),
Entity B ean (Entity Bean), Message-Driven Bean (Message Driven Bean).Wherein, it is big enterprise that J2EE, which is one,
The calculating type of industry host-level and the Java platform designed.
Wherein, Session Border Control is utilized to complete the business operation of some server ends in J2EE application program, such as visits
It asks database, call other EJB components;Entity B ean is domain model object, maps (object/ for realizing O/R
Relational mapping, Object/Relational Mapping), it is responsible for the record of table in database being mapped to entity object;Message-driven
Bean is the new firms Bean introduced in EJB2.0, and an actually asynchronous Stateless session Bean, client call disappears
It withouts waiting for, immediately returns to after breath driving Bean.
Wherein, the infrastructure component includes but is not limited to: System (system) class, Runtime (running environment) class, Date
(date) class, Math (mathematics) class and Random (random) class etc..
Wherein, the common package refer to the daily accumulation of developer, encapsulation it is good, functional independence, often use
The range of the accessory part arrived, the common package can include but is not limited to: collection class (including synchronization, sequence etc.), equipment
Assisted class (including the assisted class such as sound, photo acquisition, clipbook, computer hardware information, keyboard, mouse), encryption class (including
Base64, Md5 (Message-Digest Algorithm, Message Digest 5), SHA1 (Secure Hash
Algorithm1, secure hash algorithm 1), it is reversible with irreversible encryption etc.) and thread class etc..The common package can help
Developer saves many development times.Wherein, Base64 is that one kind based on 64 printable characters indicates binary data
Method;Md5 refers to a kind of Cryptographic Hash Function being widely used, and can produce out the hash of one 128 (16 byte)
It is worth (hash value), for ensuring that information transmission is complete consistent;SHA1 is a kind of Cryptographic Hash Function, and message is treated as always
One position (bit) character string is handled.
In the optional embodiment, Enterprise Java Beans configuration describing document can be first obtained, from the enterprise
It, will also be from described all groups after determining all components unrelated with the object module in grade Java component configuration describing document
Infrastructure component and common package are determined in part, further, are shielded in all components except the infrastructure component and the public affairs
With the component except component, the component content loaded when starting the object module can be thus reduced, when reducing starting
Between.
As an alternative embodiment, first determining module 202 includes:
Third acquisition submodule, for obtaining data base manipulation statement configuration file;
Third determines submodule, for from the data base manipulation statement configuration file it is determining with the object module without
The data base manipulation statement of pass;
The shroud module 203 shields the mode of the file to be shielded and/or component to be shielded specifically:
Shield the data base manipulation statement.
Wherein, the data base manipulation statement abbreviation SQL, for accessing data and querying, updating, and managing relationship number
According to library system;It is simultaneously also the extension name of database script file.
Specifically, during exploitation, it will usually need the data base manipulation statement used to encapsulate exploration project
Come, it is only necessary to which specified data library action statement can be called by providing specific parameter, and not have to repeat to go to write described
Data base manipulation statement.But for a module, the operation for having excessive to database is not needed many times, than
Such as, some module is accomplished that function of search, there was only the operation inquired to database, as other data base manipulation statements are to use
Less than, such as insertion, deletion and update etc..These data base manipulation statements taken less than are not required to be loaded, and being can be by
Shielding, any influence will not be had to the object module by shielding.It therefore, can be in the optional embodiment
Data base manipulation statement configuration file is first obtained, the determining and object module from the data base manipulation statement configuration file
After unrelated data base manipulation statement, so that it may the shielding data base manipulation statement unrelated with the object module, only
Retain data base manipulation statement relevant to the object module in the data base manipulation statement configuration file, it thus can be with
The data base manipulation statement content loaded when starting the object module is reduced, to reduce the starting time.
As an alternative embodiment, first determining module 202 includes:
4th acquisition submodule, for obtaining configuration file relevant to timer in the exploration project;
4th determines submodule, for determining the timer unrelated with the object module from the configuration file;
The shroud module 203 shields the mode of the file to be shielded and/or component to be shielded specifically:
Shield the timer unrelated with the object module.
Specifically, the timer is one preset time value of setting, then after the preset time value or every
The function of pre-set programs code is executed every this time value.
For example, triggering timer, the timer is for monitoring the user in some page when user logins successfully
Without operation duration, when the user is when the page is more than the preset time value of timer without operation duration, logging off users
Logging state.At this point, the user needs to re-start register.
Specifically, there are mainly two types of timers: Timer timer and Quartz timer in Java exploitation.
Wherein, Timer (timer) is provided in JDK (Java Development Kit, Java development kit)
One Timer Utility, use when, can play an individual thread except main thread and execute specified plan target, can
It once or is repeatedly executed repeatedly with specified execute.Quartz is one completely by the open source job scheduling frame of written in Java,
Simple powerful mechanism is provided to carry out job scheduling in java application.
In the optional embodiment, configuration file relevant to timer in the exploration project can be first obtained,
After determining the timer unrelated with the object module in the configuration file, so that it may shielding and the object module without
The timer of pass leaves behind timer relevant to the object module in the configuration file, can thus reduce starting
The timer content loaded when the object module, to reduce the starting time.
As an alternative embodiment, first determining module 202 includes:
5th acquisition submodule, for obtaining routing configuration file;
5th determines submodule, for determining the binding unrelated with the object module from the routing configuration file
Location;
The shroud module 203 shields the mode of the file to be shielded and/or component to be shielded specifically:
Shield the binding address.
Wherein, the routing refers to the specific method being mapped to address (URL) in the concrete kind of Java, or is mapped to
On specific JSP (Java Server Pages, Java service page) file.Wherein, JSP is in traditional webpage HTML
Java applet is inserted into (HyperText Markup Language, HyperText Markup Language) file (* .htm, * .html)
Section (Scriptlet) and JSP label (tag), to form jsp file, suffix is entitled (.jsp).
Wherein, the binding address refers to the address for the specific method being mapped in concrete kind.Different addresses may tie
The different function of disparate modules is tied up.
Specifically, it is not required to be loaded by other modules in addition to the object module that address bundlees.Therefore,
In the optional embodiment, routing configuration file can be first obtained, the determining and mesh from the routing configuration file
After marking the unrelated binding address of module, so that it may the binding address is shielded, it can be to avoid by shielding the binding address
The method of other modules of call address binding, thus can load other modules to avoid when starting the object module
Content reduces the content loaded when starting the object module, reduces the starting time.
In the exploration project starter described in Fig. 2, opening for the object module in exploration project can receive
Dynamic instruction;Further, it is determined that the to be shielded file and/or to be shielded component unrelated with the object module;Further,
Shield the file to be shielded and/or component to be shielded;Still further, according to the file to be shielded and/or to be shielded group
Part determines associated documents relevant to the object module and/or associated component;Load file relevant to the object module
And/or component, to start the object module.As it can be seen that in the present invention, starting for the object module in exploration project it
Before, by shielding the to be shielded file and/or to be shielded component unrelated with the object module, project initiation when institute can be reduced
The content of load, this can reduce the starting time of project, meanwhile, improve the development efficiency of project.
As shown in figure 3, the structure that Fig. 3 is the server for the preferred embodiment that the present invention realizes exploration project starting method is shown
It is intended to.The server 3 includes memory 31, at least one processor 32, is stored in the memory 31 and can be described
The computer program 33 and at least one communication bus 34 run at least one processor 32.
It will be understood by those skilled in the art that schematic diagram shown in Fig. 3 is only the example of the server 3, not structure
The restriction of the pairs of server 3 may include perhaps combining certain components or not than illustrating more or fewer components
Same component, such as the server 3 can also include input-output equipment, network access equipment etc..
At least one described processor 32 can be central processing unit (Central Processing Unit, CPU),
It can also be other general processors, digital signal processor (Digital Signal Processor, DSP), dedicated integrated
Circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..The processor 32 can be microprocessor or the processor 32 is also possible to any conventional processor
Deng the processor 32 is the control centre of the server 3, utilizes each of various interfaces and the entire server 3 of connection
A part.
The memory 31 can be used for storing the computer program 33 and/or module/unit, and the processor 32 passes through
Operation executes the computer program and/or module/unit being stored in the memory 31, and calls and be stored in memory
Data in 31 realize the various functions of the server 3.The memory 31 can mainly include storing program area and storage number
According to area, wherein storing program area can application program needed for storage program area, at least one function (for example sound plays function
Energy, image player function etc.) etc.;Storage data area, which can be stored, uses created data (such as audio number according to server 3
According to, phone directory etc.) etc..In addition, memory 31 may include high-speed random access memory, it can also include non-volatile memories
Device, such as hard disk, memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatibility are solid
State memory device.
In conjunction with Fig. 1, the memory 31 in the server 3 stores multiple instruction to realize a kind of exploration project starting
The multiple instruction can be performed to realize in method, the processor 32:
Receive the enabled instruction for the object module in exploration project;
Determine the to be shielded file and/or to be shielded component unrelated with the object module;
Shield the file to be shielded and/or component to be shielded;
According to the file to be shielded and/or component to be shielded, determine associated documents relevant to the object module and/
Or associated component;
The associated documents and/or the associated component are loaded, to start the object module.
In a kind of optional embodiment, after the shielding file to be shielded and/or component to be shielded, institute
Stating processor 32 can be performed the multiple instruction to realize:
Obtain remaining file and/or component;
According to the dependence between the remaining file and/or component, judge to load the remaining file and/or
Whether component can start the object module;
If the object module cannot be started by loading the remaining file and/or component, from the described to be shielded of shielding
In file and/or component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined;
Restore the file to be restored and/or component to be restored;
It is described according to the file to be shielded and/or component to be shielded, it is determining relevant related literary with the object module
Part and/or associated component include;
According to the file to be shielded and/or component to be shielded and the file to be restored and/or component to be restored, really
Fixed associated documents relevant to the object module and/or associated component.
In a kind of optional embodiment, the determination to be shielded file unrelated with the object module and/or to
Shield assembly includes:
Obtain deployment descriptor file;
The serve end program unrelated with the object module is determined from the deployment descriptor file;
The shielding file to be shielded and/or component to be shielded include:
Shield the serve end program.
In a kind of optional embodiment, the determination to be shielded file unrelated with the object module and/or to
Shield assembly includes:
Obtain Enterprise Java Beans configuration describing document;
The all components unrelated with the object module are determined from the Enterprise Java Beans configuration describing document;
Infrastructure component and common package are determined from all components;
The shielding file to be shielded and/or component to be shielded include:
Shield the component in all components in addition to the infrastructure component and the common package.
In a kind of optional embodiment, the determination to be shielded file unrelated with the object module and/or to
Shield assembly includes:
Obtain data base manipulation statement configuration file;
The data base manipulation statement unrelated with the object module is determined from the data base manipulation statement configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the data base manipulation statement.
In a kind of optional embodiment, the determination to be shielded file unrelated with the object module and/or to
Shield assembly includes:
Obtain configuration file relevant to timer in the exploration project;
The timer unrelated with the object module is determined from the configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the timer unrelated with the object module.
In a kind of optional embodiment, the determination to be shielded file unrelated with the object module and/or to
Shield assembly includes:
Obtain routing configuration file;
The binding address unrelated with the object module is determined from the routing configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the binding address.
Specifically, the processor 32 can refer to the concrete methods of realizing of above-metioned instruction related in Fig. 1 corresponding embodiment
The description of step, this will not be repeated here.
In the server 3 described in Fig. 3, the enabled instruction for the object module in exploration project can receive;Into
One step, determine the to be shielded file and/or to be shielded component unrelated with the object module;Further, described in shielding
File to be shielded and/or component to be shielded;Still further, according to the file to be shielded and/or component to be shielded, determine with
The relevant associated documents of the object module and/or associated component;Load file relevant to the object module and/or group
Part, to start the object module.As it can be seen that before starting for the object module in exploration project, passing through screen in the present invention
The to be shielded file and/or to be shielded component unrelated with the object module are covered, what is loaded when can reduce project initiation is interior
Holding, this can reduce the starting time of project, meanwhile, improve the development efficiency of project.
If the integrated module/unit of the server 3 is realized in the form of SFU software functional unit and as independent production
Product when selling or using, can store in a computer readable storage medium.Based on this understanding, the present invention realizes
All or part of the process in above-described embodiment method can also instruct relevant hardware to complete by computer program,
The computer program can be stored in a computer readable storage medium, the computer program when being executed by processor,
The step of above-mentioned each embodiment of the method can be achieved.Wherein, the computer program includes computer program code, the calculating
Machine program code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer
Readable medium may include: any entity or device, recording medium, USB flash disk, the movement that can carry the computer program code
Hard disk, magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory
(RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It needs to illustrate
It is that the content that the computer-readable medium includes can be fitted according to the requirement made laws in jurisdiction with patent practice
When increase and decrease, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium does not include electric carrier wave letter
Number and telecommunication signal.
In several embodiments provided by the present invention, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the module
It divides, only a kind of logical function partition, there may be another division manner in actual implementation.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of hardware adds software function module.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie
In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included in the present invention.Any attached associated diagram label in claim should not be considered as right involved in limitation to want
It asks.Furthermore, it is to be understood that one word of " comprising " does not exclude other units or steps, odd number is not excluded for plural number.It is stated in system claims
Multiple units or device can also be implemented through software or hardware by a unit or device.Second equal words are used to table
Show title, and does not indicate any particular order.
Finally it should be noted that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although reference
Preferred embodiment describes the invention in detail, those skilled in the art should understand that, it can be to of the invention
Technical solution is modified or equivalent replacement, without departing from the spirit and scope of the technical solution of the present invention.
Claims (10)
1. a kind of exploration project starts method, which is characterized in that the described method includes:
Receive the enabled instruction for the object module in exploration project;
Determine the to be shielded file and/or to be shielded component unrelated with the object module;
Shield the file to be shielded and/or component to be shielded;
According to the file to be shielded and/or component to be shielded, associated documents relevant to the object module and/or phase are determined
Close component;
The associated documents and/or the associated component are loaded, to start the object module.
2. the method according to claim 1, wherein the shielding file to be shielded and/or to be shielded group
After part, the method also includes:
Obtain remaining file and/or component;
According to the dependence between the remaining file and/or component, judge to load the remaining file and/or component
Whether the object module can be started;
If the object module cannot be started by loading the remaining file and/or component, from the file to be shielded of shielding
And/or in component to be shielded, the file to be restored and/or component to be restored for needing to restore are determined;
Restore the file to be restored and/or component to be restored;
It is described according to the file to be shielded and/or component to be shielded, determine associated documents relevant to the object module and/
Or associated component includes;
According to the file to be shielded and/or component to be shielded and the file to be restored and/or component to be restored, determine with
The relevant associated documents of the object module and/or associated component.
3. method according to claim 1 or 2, which is characterized in that the determination is unrelated with the object module wait shield
It covers file and/or component to be shielded includes:
Obtain deployment descriptor file;
The serve end program unrelated with the object module is determined from the deployment descriptor file;
The shielding file to be shielded and/or component to be shielded include:
Shield the serve end program.
4. method according to claim 1 or 2, which is characterized in that the determination is unrelated with the object module wait shield
It covers file and/or component to be shielded includes:
Obtain Enterprise Java Beans configuration describing document;
The all components unrelated with the object module are determined from the Enterprise Java Beans configuration describing document;
Infrastructure component and common package are determined from all components;
The shielding file to be shielded and/or component to be shielded include:
Shield the component in all components in addition to the infrastructure component and the common package.
5. method according to claim 1 or 2, which is characterized in that the determination is unrelated with the object module wait shield
It covers file and/or component to be shielded includes:
Obtain data base manipulation statement configuration file;
The data base manipulation statement unrelated with the object module is determined from the data base manipulation statement configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the data base manipulation statement.
6. method according to claim 1 or 2, which is characterized in that the determination is unrelated with the object module wait shield
It covers file and/or component to be shielded includes:
Obtain configuration file relevant to timer in the exploration project;
The timer unrelated with the object module is determined from the configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the timer unrelated with the object module.
7. method according to claim 1 or 2, which is characterized in that the determination is unrelated with the object module wait shield
It covers file and/or component to be shielded includes:
Obtain routing configuration file;
The binding address unrelated with the object module is determined from the routing configuration file;
The shielding file to be shielded and/or component to be shielded include:
Shield the binding address.
8. a kind of exploration project starter, which is characterized in that the exploration project starter includes:
Receiving module, for receiving the enabled instruction for the object module being directed in exploration project;
First determining module, for determining the to be shielded file and/or to be shielded component unrelated with the object module;
Shroud module, for shielding the file to be shielded and/or component to be shielded;
Second determining module, for according to the file to be shielded and/or component to be shielded, determination to be related to the object module
Associated documents and/or associated component;
Loading module, for loading the associated documents and/or the associated component, to start the object module.
9. a kind of server, which is characterized in that the server includes processor and memory, and the processor is deposited for executing
The computer program stored in reservoir is to realize exploration project starting method as claimed in any of claims 1 to 7 in one of claims.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has at least one
Instruction, at least one described instruction realize that exploration project as claimed in any one of claims 1 to 7 opens when being executed by processor
Dynamic method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910528779.7A CN110413336B (en) | 2019-06-18 | 2019-06-18 | Development project starting method, device, server and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910528779.7A CN110413336B (en) | 2019-06-18 | 2019-06-18 | Development project starting method, device, server and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110413336A true CN110413336A (en) | 2019-11-05 |
CN110413336B CN110413336B (en) | 2024-03-15 |
Family
ID=68359265
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910528779.7A Active CN110413336B (en) | 2019-06-18 | 2019-06-18 | Development project starting method, device, server and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110413336B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020129333A1 (en) * | 2000-06-05 | 2002-09-12 | Sundeep Chandhoke | System and method for programmatically generating a graphical program based on a sequence of motion control, machine vision, and data acquisition (DAQ) operations |
CN101625647A (en) * | 2009-08-06 | 2010-01-13 | 青岛海信电器股份有限公司 | Method for accelerating starting speed of embedded software system |
US8930940B2 (en) * | 2011-08-19 | 2015-01-06 | Yongyong Xu | Online software execution platform |
-
2019
- 2019-06-18 CN CN201910528779.7A patent/CN110413336B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020129333A1 (en) * | 2000-06-05 | 2002-09-12 | Sundeep Chandhoke | System and method for programmatically generating a graphical program based on a sequence of motion control, machine vision, and data acquisition (DAQ) operations |
CN101625647A (en) * | 2009-08-06 | 2010-01-13 | 青岛海信电器股份有限公司 | Method for accelerating starting speed of embedded software system |
US8930940B2 (en) * | 2011-08-19 | 2015-01-06 | Yongyong Xu | Online software execution platform |
Also Published As
Publication number | Publication date |
---|---|
CN110413336B (en) | 2024-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Arlow et al. | Enterprise patterns and MDA: building better software with archetype patterns and UML | |
US10581949B2 (en) | Systems, methods and computer program products for dynamic user profile enrichment and data integration | |
Goncalves | Beginning Java EE 6 Platform with GlassFish 3: from novice to professional | |
US7861222B2 (en) | Discoscript: a simplified distributed computing scripting language | |
US20070067418A1 (en) | Object oriented web application framework | |
CA2506233A1 (en) | System and method for integrating disparate data sources and application sources using a web services orchestration platform with business process execution language (bpel) | |
Mackey | Introducing. NET 4.0: With Visual Studio 2010 | |
Jaworski et al. | Expert Python Programming: Become a master in Python by learning coding best practices and advanced programming concepts in Python 3.7 | |
CN107608672B (en) | UI module manager, UI module management method and system | |
US20230083849A1 (en) | Parsing tool for optimizing code for deployment on a serverless platform | |
CN110413336A (en) | Exploration project starts method, apparatus, server and storage medium | |
US8010955B2 (en) | Reducing the run-time cost of incorporating custom tags in a server page | |
US20180181382A1 (en) | Consuming persistent library bundles | |
Juneau | JavaServer Faces: introduction by example | |
Hoffman | Building Microservices with ASP. NET Core: Develop, Test, and Deploy Cross-platform Services in the Cloud | |
Han et al. | Reconstructing Software Architecture for J2EE Web Applications. | |
Anurag | Distributed computing with Go: practical concurrency and parallelism for Go applications | |
CN112199080A (en) | Webpack construction method and equipment for vuejs project | |
Pasquali et al. | Mastering Node. js: build robust and scalable real-time server-side web applications efficiently | |
Lukavsky | Building Big Data Pipelines with Apache Beam: Use a single programming model for both batch and stream data processing | |
Kainulainen | Spring Data Standard Guide | |
Hautaviita | Developing a web application on the MEVN stack: the architecture of a full-stack JavaScript application | |
Gupta | Java 11 and 12–New Features: Learn about Project Amber and the latest developments in the Java language and platform | |
Doglio et al. | Node. js and REST | |
Davis | Learning Groovy 3: Java-Based Dynamic Scripting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |