About this document:
This manual is for BPEL2oWFN, Version 1.0, a tool translating business processes described in BPEL to open workflow nets (oWFN), last updated 16 January 2006. This manual does not explain how to setup or install BPEL2oWFN. For this information please read the Installation Manual which is part of the distribution or can be downloaded from the website of BPEL2oWFN (http://www.informatik.hu-berlin.de/top/tools4bpel/bpel2owfn).
Copyright © 2005, 2006 Niels Lohmann
Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved.
BPEL2oWFN is licensed under the GNU General Public License.
Copyright © 2005, 2006 Niels Lohmann, Christian Gierds and Dennis Reinert.
BPEL2oWFN is part of the Tools4BPEL project funded by the Bundesministerium für Bildung und Forschung. See http://www.informatik.hu-berlin.de/top/tools4bpel for details.
BPEL2oWFN is a compiler translating a business processes expressed in BPEL (Business Process Execution Language for Web Services) [ACD^+03] to an oWFN (open Workflow Net) [MRS05]. This oWFN can be used to:
In future versions of BPEL2oWFN static analysis is used to find the smallest oWFN to analyze a chosen property. This is called flexible model generation (see Future Work).
BPEL2oWFN was written by Niels Lohmann, Christian Gierds and Dennis Reinert. It is part of the Tools4BPEL project funded by the Bundesministerium für Bildung und Forschung. See http://www.informatik.hu-berlin.de/top/tools4bpel for details.
The translation process of the BPEL business process is performed in six steps which we describe briefly in this section:
In this section we describe the main concepts of BPEL2oWFN used to realize the translation. Reading this section is not necessary for using BPEL2oWFN, yet knowing the underlying algorithms and data structures not only helps to locate bugs, but also helps you to customize BPEL2oWFN or request a feature.
The AST (abstract syntax tree) is an abstraction of the syntax tree generated while parsing the BPEL process: any unnecessary information (e.g. indention, brackets or other “syntax-supporting” elements) is omitted. It is the central data structure of BPEL2oWFN. The nodes of the AST are annotated during the analysis steps. These annotations are used to select the most compact Petri net pattern from the pattern database to check a given property.
The idea of flexible model generation is to find the most compact model to check a given property. The patterns of the Petri net semantics of [Sta05] are designed to fit in any given context. However when the context is known some behavior modeled in the patterns (i.e. some of the nodes) can be safely removed without changing its semantics. BPEL2oWFN is designed to hold several sets of Petri net patterns each suitable in certain contexts. These patterns are collected in a pattern database.
BPEL2oWFN provides many algorithms and data structures to build, represent, modify and simplify Petri nets and open workflow nets, resp. They are the interface between the pattern database and the file output for the model checking tool. The functions are collected in an extensible class allowing to add more output file formats (e.g. PNML (Petri Net Markup Language), PEP notation, etc.), structural simplification rules (optimized to preserve certain properties such as deadlock freedom or liveness) or abstractions (e.g. abstraction from variables, abstraction from external behavior).
The standard invocation of BPEL2oWFN is:
bpel2owfn -f inputfile.bpel -O2F
where inputfile.bpel is a BPEL process. The option
-O2F
causes BPEL2oWFN to generate an open workflow
net named inputfile.owfn and a file inputfile.info
describing the places and transitions of the net. For more examples,
see Examples.
BPEL2oWFN supports the following command-line options:
When invoking BPEL2oWFN several output modes are possible. While the -pn-mode can be implied by other options the other modes have to be set explicitly. Either way, at most one of these options can be chosen.
These options imply the -pn-option. When BPEL2oWFN is run with the -pn-option reading a file input.bpel, a file input.info holding the information about the nodes of the created Petri net is generated. See Naming Conventions for more information.
In this section we show some examples how BPEL2oWFN can be invoked.
When BPEL2oWFN is invoked and run without any error, the exit value is 0.
An example:
Error while parsing syntax error, unexpected X_SLASH, expecting X_OPEN Error in `example.bpel' in line 12: token/text last read was `/' |
Please note that the indicated position (i.e. the line number) may
be fuzzy — it should be understood as a hint to the erroneous
line.
An example:
An error has occurred while parsing "example.bpel"! Exception #2 occurred! File `example.bpel' not found. |
An example:
An error has occurred while parsing "example.bpel"! Exception #10 occurred! Chosen parameters cannot work together (see parameter -h). Additional information: LoLA and dot output on stdout are confusing, chose one! |
An example:
An error has occurred while parsing "example.bpel"! Exception #41 occurred! Place with role `1.internal.final' already defined. |
Please report the occurrence of any exception with numbers 30–50 since it indicates a bug in BPEL2oWFN we would like to fix immediately (see Reporting Bugs).
BPEL2oWFN can generate several file formats:
A (low-level) place/transition net as described in [LoLA]. The places and transitions are named using the internal (numeric) name of each node. Furthermore, the first entry of the history of each node is added as a comment.
{ Petri net created by BPEL2oWFN reading filename.bpel } PLACE a comma-separated list of places MARKING the initial marking a comma-separated list of transitions { END OF FILE } |
For more information on the node naming conventions of BPEL2oWFN, see Naming Conventions.
An open workflow net is a Petri net with an interface, i.e. two sets of places: input places and output places. To represent oWFNs the LoLA format was extended to implement this categorization:
{ oWFN created by BPEL2oWFN reading filename.bpel } PLACE INPUT a comma-separated list of input places OUTPUT a comma-separated list of output places INTERNAL a comma-separated list of internal places MARKING the initial marking a comma-separated list of transitions { END OF FILE } |
Additionally an open workflow net has a set of final markings. Since there exist no tools reading oWFNs yet, the representation of final markings is not implemented.
The Info-files are generated when any command-line option is used which imply Petri net-generation. When reading from a file process.bpel a file process.info is generated. This file sums up all places and transitions together with their internal (numeric) name and their complete history:
PLACES: ID TYPE ROLES a list of places TRANSITIONS: ID GUARD ROLES a list of transitions |
These files are generated to document the connection between the generated output file and the chosen Petri net patterns. In future distributions of BPEL2oWFN the Info-files will be used to annotate witness and counter-example paths, resp. and to “re-translate” Petri net properties (e.g. a dead transition) to the input BPEL process.
For more information on the node naming conventions of BPEL2oWFN, see Naming Conventions.
BPEL2oWFN generates the output Petri net by creating and merging parameterized patterns of the Petri net semantics defined in [Sta05]. Due to merging and simplifying the Petri net nodes “belong” to more than one pattern. For example, in a sequence the initial place of the sequence and the initial place of its first activity are merged so that the final Petri net contains one place with two roles.
The roles of each place are collected during the Petri net generation. They form the history of the node. It is used to locate errors of the modeled business process: If, for example, BPEL2oWFN generates a Petri net of a business process and the model checker LoLA finds a dead transition, its history helps to find which BPEL constructs are affected and in this case will never be executed.
The roles are named using the following conventions:
For example, BPEL's activity process has the identifier 1, so that all nodes of the process pattern begin with 1.. To find out the identifiers of a given process use the --xml command-line option which prints the id of each activity as an XML attribute.
The same schema is used for fault handlers (id.internal.faultHandler.), compensation handlers (id.internal.compensationHandler.) and event handlers (id.internal.eventHandler.), resp.
To bugfix1 the implemented Petri net patterns BPEL2oWFN implements a graph representation of the generate Petri net.
In version 1.0 of BPEL2oWFN the following Petri net patterns are implemented:
The Petri net semantics for BPEL4WS from Christian Stahl (Humboldt-Universität zu Berlin) published in [Sta04].
Feature complete semantics covering both positive control flow with event handling and negative control flow (fault and compensation handling).
We tried to stick as close to the Petri net patterns of [Sta05] as possible. However, the implemented patterns in the pattern database sometimes differ to the given patterns due to discovery of bugs or implementation decisions. In this subsection we sum up these changes to help you understand the generated Petri net model.
Furthermore, all failed places of the activities were removed. In the original Petri net semantics, all faults of a scope were collected on the fault_in of the stop-pattern and then classified as being the first fault of the scope, a following fault, a fault from the fault handler, a fault from the compensation handler, or a fault from a child scope. In our implementation, new places (fh_fault_in and ch_fault_in) were introduced and each activity throws its faults to the “correct” place automatically.
To ensure that at most one error can occur (i.e. at most one token is produced on any fault place) the fault places are guarded by state places: To throw a fault from an activity enclosed in a scope, the state of that scope has to be Active. The first thrown fault changes the state to !Active thus preventing more faults to occur. The places fh_fault_in and ch_fault_in, resp. are guarded by !FHFaulted/FHFaulted and !CHFaulted/CHFaulted, resp.
Moreover, the generated Petri nets have less nodes than those generated by BPEL2PN [SHS05] since an unfolding of the reset arcs in not necessary any more.
Beside performance (e.g. only 1 bit is needed to store the marking of a place) and compatibility issues (e.g. 1-safety is a prerequisite to use the Model Checking Kit [MCK]), features not supported by the Petri net semantics can be discovered since the generated net will most likely violate 1-safety when an unsupported BPEL feature is used. If, for example, a scope is enclosed in a while loop (which would model instantiation which is not supported by the Petri net semantics Limitations of the semantics), the state places of that scope would not be 1-safe.
The assign activities are sufficiently short-lived that they are allowed to complete rather than being interrupted when termination is forced.
This change fixes a bug in the Petri net semantics.
In future versions of BPEL2oWFN these found deadlocks shall be mapped back into the BPEL code to highlight the “unreasonable” activities (i.e. a cycle-closing link).
Currently implemented Petri net-specific functions:
These structural reduction rules are implemented in the command-line option --simplify, see Invoking BPEL2oWFN).
These abstractions are implemented in the command-line option --low-level.
The following places are initially marked to ensure a deadlock-free model of processes with “reasonable” control-flow (e.g. with an acyclic link structure):
All interleavings should end in a livelock-marking which covers 1.internal.final and in which only transition 1.internal.finishloop can fire. All livelock-markings differ in the marking of the state places of the process and its child scopes.
Deadlocks indicate modeling mistakes (e.g. a cyclic link structure). Non-1-safe markings indicate the usage of an unsupported feature of the Petri net semantics (e.g. instantiation, see Limitations of the semantics).
The current version of BPEL2oWFN underlies several limitations:
As this is the first public version of BPEL2oWFN the translation from a BPEL process to an open workflow net might be unstable or incorrect in some few scenarios:
Solution: Each communicating activity (i.e. invoke
,
receive
, reply
) should be defined with (input/output)
variables.
Solution: Avoid using the -s mode in this case.
bpws
'. Processes using these elements are rejected with a
syntax error message.
Solution: Try removing or commenting these elements.
If you find a bug in BPEL2oWFN, please first check that it is not a known bug listed in `Known Bugs'. Otherwise please send us an electronic mail to nlohmann@informatik.hu-berlin.de. Include the version number which you can find by running bpel2owfn --version. Also include in your message the input BPEL process and the output that the program produced. We will try to answer your mail within a week.
If you have other questions, comments or suggestions about BPEL2oWFN, contact us via electronic mail to nlohmann@informatik.hu-berlin.de.
Niels Lohmann
Humboldt-Universität zu Berlin
Institut für Informatik
Unter den Linden 6
10099 Berlin, Germany
For future releases of BPEL2oWFN the following features are planned:
Copyright © 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software—to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and “any later version,” you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found.
one line to give the program's name and an idea of what it does. Copyright (C) 19yy name of author This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307, USA.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) 20yy name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details.
The hypothetical commands show w and show c should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than show w and show c; they could even be mouse-clicks or menu items—whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a “copyright disclaimer” for the program, if necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. signature of Ty Coon, 1 April 1989 Ty Coon, President of Vice
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License.
[1] The Petri nets usually have a large number of nodes so that the graphical representation of a `real world' process would not be suitable to process, read or understand. That is why the Dot output shall be seen as a means to debug small patterns.
[2] Tool available at http://www.informatik.hu-berlin.de/top/bpel2pn
[3] http://www.informatik.hu-berlin.de/top/lola/doku.ps
[4] http://www.fmi.uni-stuttgart.de/szs/tools/mckit
[5] http://www.informatik.hu-berlin.de/top/download/publications/MassutheReisigSchmidt-OGApproach.ps
[6] http://www.informatik.hu-berlin.de/Institut/struktur/systemanalyse/preprint/stahl188.pdf
[7] http://www.informatik.hu-berlin.de/top/download/publications/weinberg04.pdf