Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Formalising Behaviour-Preserving Object-Oriented Program Transformations Tom Mens( ) Postdoctoral Fellow – Fund for Scientific Research.

Similar presentations


Presentation on theme: "1 Formalising Behaviour-Preserving Object-Oriented Program Transformations Tom Mens( ) Postdoctoral Fellow – Fund for Scientific Research."— Presentation transcript:

1 1 Formalising Behaviour-Preserving Object-Oriented Program Transformations Tom Mens( ) Postdoctoral Fellow – Fund for Scientific Research (Flanders) Vrije Universiteit Brussel, Belgium in collaboration with Serge DemeyerDirk Janssens Universiteit Antwerpen, Belgium

2 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 2 What is refactoring?  Refactorings are software transformations that restructure an object-oriented application while preserving its behaviour.  According to Fowler (1999), refactoring  improves the design of software  makes software easier to understand  helps you find bugs  helps you program faster  Promising application area for graph rewriting

3 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 3 Goal  Improve tool support for refactoring object-oriented software …  more scalable (e.g., composite refactorings)  more language independent  guarantee behaviour preservation up to a certain degree  … by providing a formal model in terms of graph rewriting  intuitive description of transformation of complex graph-like structures  theoretical results help in the analysis of such structures  Show feasibility / limitations of graph rewriting for this purpose

4 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 4 workstation 1 fileserver 1 workstation 2 printer 1 workstation 3 1. originate(p) 2. send(p) 3. accept(p) 4. send(p) 5. accept(p) 6. send(p) 7. accept(p) 8.print(p) Feasibility study: LAN simulation See special session on case studies, Saturday, October 12, 16:30

5 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 5 UML class diagram originate(p:Packet) Workstation contents Packet accept(p:Packet) send(p:Packet) Node originator name print(p:Packet) PrintServer save(p:Packet) FileServer addressee nextNode

6 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 6 Java source code public class Node { public String name; public Node nextNode; public void accept(Packet p) { this.send(p); } protected void send(Packet p) { System.out.println( name + "sends to" + nextNode.name); nextNode.accept(p); } } public class Packet { public String contents; public Node originator; public Node addressee; } public class Printserver extends Node { public void print(Packet p) { System.out.println(p.contents); } public void accept(Packet p) { if(p.addressee == this) this.print(p); else super.accept(p); } public class Workstation extends Node { public void originate(Packet p) { p.originator = this; this.send(p); } public void accept(Packet p) { if(p.originator == this) System.err.println("no destination"); else super.accept(p); }

7 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 7 Two selected refactorings  Encapsulate Field  encapsulate public variables by making them private and providing accessor methods  Examples EncapsulateField(name,String getName(),setName(String)) EncapsulateField(nextNode,Node getNextNode(),setNextNode(Node))  Preconditions  accessor method signatures should not exist in inheritance chain  Pull up method  move similar methods in subclasses to common superclass  Preconditions  method to be pulled up should not refer to variables defined in subclass, and its signature should not exist in superclass

8 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 8 Refactoring – Encapsulate Field public class Node { private String name; private Node nextNode; public String getName() { return this.name; } public void setName(String s) { this.name = s; } public Node getNextNode() { return this.nextNode; } public void setNextNode(Node n) { this.nextNode = n; } public void accept(Packet p) { this.send(p); } protected void send(Packet p) { System.out.println( this.getName() + "sends to" + this.getNextNode().getName()); this.getNextNode().accept(p); } } public class Node { public String name; public Node nextNode; public void accept(Packet p) { this.send(p); } protected void send(Packet p) { System.out.println( name + "sends to" + nextNode.name); nextNode.accept(p); } }

9 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 9 Behaviour preservation  Only look at static structure of a program  Many different kinds of preservation  Access preserving  each method body (transitively) accesses at least the same variables as it did before the refactoring  Update preserving  each method body (transitively) performs at least the same variable updates as it did before the refactoring  Call preserving  each method body (transitively) performs at least the same method calls as it did before the refactoring

10 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 10 Graph notation – structure  program structure

11 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 11 Graph notation – behaviour  behaviour of class Node

12 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 12 Node type set TypeDescriptionExamples C Class Node, Workstation, PrintServer, Packet B method BodySystem.out.println(p.contents) V Variable name, nextNode, contents, originator S method Signature in lookup table accept, send, print P formal Parameter of a message p E (sub)Expression in method bodyp.contents

13 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 13 Edge type set TypeDescriptionExamples l: S  B dynamic method lookup i: C  C inheritanceclass PrintServer extends Node m: V|B  C class membership t: P|V|S  C typesend(Packet p), String getName() p: S  P formal parametersend(Packet p) p: E  E actual parameterSystem.out.println(nextNode.name) e: B  E expression in method body : E  E cascaded expressionnextNode.accept(p) d: E  S dynamic method callthis.send(p) a : E  P|V access of parameter of variable p.originator

14 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 14 Well-formedness contraints  Use type graph

15 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 15 Well-formedness constraints  Use forbidden subgraphs  WF-1: a variable with the same name cannot be defined twice in the same inheritance hierarchy  WF-2: a method with the same signature cannot be implemented twice in the same class  WF-3: a method cannot refer to variables in descendant classes

16 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 16 Graph production EncapsulateField  EncapsulateField(var,accessor,updater)  parameterised production  embedding mechanism takes context into account incoming edgesoutgoing edges (u,1)  (d,2)(m,1)  (m,1), (m,4), (m,5) (a,1)  (d,3)(t,1)  (t,1), (t,3), (t,6)

17 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 17 Graph production EncapsulateField  Application of the production in the context of the LAN simulation  EncapsulateField(name,getName,setName) m

18 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 18 Access preserving BV ?*a var V EE accessor S B 1 dlae var V 1 a 85 3 B ?* E B  Use graph expression  EncapsulateField preserves behaviour  access preserving: all attribute nodes can still be accessed via a transitive closure

19 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 19 Update preserving  Use graph expression  EncapsulateField preserves behaviour  update preserving: all attribute nodes can still be updated via a transitive closure var V EE updater S B 1 dlue var V 1 u BV ?*u 74 2 B ?* E B

20 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 20 Graph production PullUpMethod  PullUpMethod(parent,child,name)  has an effect on all subclasses  controlled graph rewriting needed

21 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 21 Graph production PullUpMethod d P1P2 repeat d succeed d fail precondition

22 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 22 Call preserving  Use graph expression  PullUpMethod preserves behaviour  call preserving: BS ?*d B l

23 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 23 Satisfying preconditions  All refactorings must satisfy well-formedness conditions  WF-1, WF-2, WF-3  Some refactorings require additional constraints  E.g. EncapsulateField may not introduce accessor/updater method if their signatures are defined in the inheritance chain (RC1)  Use negative application preconditions to fulfill these constraints  E.g., for EncapsulateField

24 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 24 Tool support  Java to graph parser  different graph formats (…GXL…)  Specified refactorings in Fujaba Java source code Parser Graph Visualisation tool Java source code Fujaba Refactoring transfos Check preservation refactor

25 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 25 Lessons learned  graph rewriting suitable for specifying effect of refactorings  language-independent  natural and precise way to specify transformations  behaviour preservation can be formally verified  better integration of existing graph techniques needed  well-formedness constraints (type graphs, forbidden subgraphs)  suitable graph constraint language?  infinite sets of productions (parameterisation and embedding)  restricting applicability (negative preconditions and controlled rewriting)  need to manipulate complex graph structures  e.g. push down method

26 ICGT, 10 October 2002, Barcelona © Tom Mens, Vrije Universiteit Brussel 26 Future work  many future research issues, to be addressed in research project  “A Formal Foundation for Software Refactoring”  starting on 1 January 2003  financed by Fund for Scientific Research – Flanders (Belgium)  more validation  more refactorings  more case studies  more kinds of behaviour preservation  time preservation (for time-critical systems)  memory and power preservation (for embedded systems)  further work on formalism  arbitrary evolution steps  language independence and scalability  refactoring in a dynamic evolution context?


Download ppt "1 Formalising Behaviour-Preserving Object-Oriented Program Transformations Tom Mens( ) Postdoctoral Fellow – Fund for Scientific Research."

Similar presentations


Ads by Google