test_all.py 151 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714
  1. import unittest
  2. import sys
  3. try:
  4. from unit.utils import *
  5. import unit.log_output as log_output
  6. except ImportError: #for Python2
  7. from utils import *
  8. import log_output as log_output
  9. sys.path.append("wrappers")
  10. from modelverse import *
  11. import threading
  12. model_hierarchy = \
  13. {"formalisms/": {"SimpleClassDiagrams": {},
  14. "TypeMapping": {},
  15. "Tracability": {},
  16. "ProcessModel": {},
  17. "ActionLanguage": {},
  18. "ManualOperation": {},
  19. "Bottom": {},
  20. },
  21. "models/": {},
  22. "administration/": {"core": {},
  23. "CoreFormalism": {},
  24. },
  25. "users/": {"admin/": {},
  26. "LoLA/": {},
  27. "HUTN/": {},
  28. "files/": {},
  29. "DEVS/": {},
  30. "DEVS_batch/": {},
  31. "JSON/": {},
  32. },
  33. "type mappings/": {"1": {},
  34. "2": {},
  35. "3": {},
  36. "4": {},
  37. "5": {},
  38. "6": {},
  39. "7": {},
  40. "8": {},
  41. "9": {},
  42. },
  43. "merged/": {},
  44. "tmp/": {},
  45. "RAMified/": {},
  46. }
  47. def verify_clean():
  48. compare_locations("", set())
  49. compare_locations("models", set())
  50. compare_locations("formalisms", set())
  51. def get_model_list(location):
  52. try:
  53. location_parts = location.split("/")
  54. current = model_hierarchy
  55. while location_parts:
  56. l = location_parts.pop(0)
  57. if l != "":
  58. current = current[l + "/"]
  59. return set(current.keys())
  60. except:
  61. return set([])
  62. def compare_locations(location, extra_to_default):
  63. assert model_list(location) == get_model_list(location) | set(extra_to_default)
  64. def compare_unordered_lists(got, expected):
  65. assert len(got) == len(expected)
  66. for i in got:
  67. assert i in expected
  68. for i in expected:
  69. assert i in got
  70. class TestModelverse(unittest.TestCase):
  71. proc = None
  72. def runTest(self):
  73. pass
  74. @classmethod
  75. def setUpClass(self):
  76. TestModelverse.proc, address = start_mvc()
  77. init(address)
  78. login("user", "user")
  79. @classmethod
  80. def tearDownClass(self):
  81. try:
  82. kill(TestModelverse.proc)
  83. except:
  84. print("Got exception during teardown.")
  85. def setUp(self):
  86. verify_clean()
  87. folder_create("users/user/test")
  88. def tearDown(self):
  89. model_delete("users/user/test")
  90. verify_clean()
  91. pass
  92. def test_op_model_list(self):
  93. assert model_list("") == set(["formalisms/",
  94. "models/",
  95. "administration/",
  96. "type mappings/",
  97. "users/",
  98. "merged/",
  99. "RAMified/",
  100. "tmp/",
  101. ])
  102. assert model_list("formalisms") == set(["SimpleClassDiagrams",
  103. "ActionLanguage",
  104. "TypeMapping",
  105. "Tracability",
  106. "ProcessModel",
  107. "ManualOperation",
  108. "Bottom",
  109. ])
  110. assert model_list("formalisms/") == set(["SimpleClassDiagrams",
  111. "ActionLanguage",
  112. "TypeMapping",
  113. "Tracability",
  114. "ProcessModel",
  115. "ManualOperation",
  116. "Bottom",
  117. ])
  118. # Try unreadable location
  119. try:
  120. model_list("administration")
  121. self.fail()
  122. except ReadPermissionDenied:
  123. pass
  124. # Try non-existing location
  125. try:
  126. model_list("adfjafdla")
  127. self.fail()
  128. except UnknownLocation:
  129. pass
  130. # Try model list of a model itself
  131. assert model_list("formalisms/SimpleClassDiagrams") == set([])
  132. def test_op_model_list_full(self):
  133. assert model_list_full("") == set([("formalisms/", "admin", "admin", "221"),
  134. ("models/", "admin", "admin", "221"),
  135. ("administration/", "admin", "admin", "110"),
  136. ("type mappings/", "admin", "admin", "221"),
  137. ("users/", "admin", "admin", "221"),
  138. ("merged/", "admin", "nobody", "222"),
  139. ("RAMified/", "admin", "nobody", "222"),
  140. ("tmp/", "admin", "nobody", "222"),
  141. ])
  142. assert model_list_full("formalisms") == set([("SimpleClassDiagrams", "admin", "admin", "221"),
  143. ("ActionLanguage", "admin", "admin", "221"),
  144. ("TypeMapping", "admin", "admin", "221"),
  145. ("Tracability", "admin", "admin", "221"),
  146. ("ProcessModel", "admin", "admin", "221"),
  147. ("ManualOperation", "admin", "admin", "221"),
  148. ("Bottom", "admin", "admin", "221"),
  149. ])
  150. # Try unreadable location
  151. try:
  152. model_list_full("administration")
  153. self.fail()
  154. except ReadPermissionDenied:
  155. pass
  156. # Try non-existing location
  157. try:
  158. model_list_full("adfjafdla")
  159. self.fail()
  160. except UnknownLocation:
  161. pass
  162. # Try model list of a model itself
  163. assert model_list_full("formalisms/SimpleClassDiagrams") == set([])
  164. def test_op_verify(self):
  165. # Verify M3 --> M3
  166. assert verify("formalisms/SimpleClassDiagrams", "formalisms/SimpleClassDiagrams") == "OK"
  167. # Verify with bottom
  168. assert verify("formalisms/SimpleClassDiagrams", "formalisms/Bottom") == "OK"
  169. # Verify the type mapping models
  170. for tm in model_types("formalisms/SimpleClassDiagrams"):
  171. assert verify(tm[1], "formalisms/TypeMapping") == "OK"
  172. # Verify wrong
  173. try:
  174. verify("formalisms/SimpleClassDiagrams", "formalisms/ProcessModel")
  175. self.fail()
  176. except UnknownMetamodellingHierarchy:
  177. pass
  178. # Verify M2 --> M3
  179. assert verify("formalisms/ProcessModel", "formalisms/SimpleClassDiagrams") == "OK"
  180. assert verify("formalisms/ProcessModel", "formalisms/Bottom") == "OK"
  181. for tm in model_types("formalisms/ProcessModel"):
  182. assert verify(tm[1], "formalisms/TypeMapping") == "OK"
  183. try:
  184. verify("formalisms/ProcessModel", "formalisms/ProcessModel")
  185. self.fail()
  186. except UnknownMetamodellingHierarchy:
  187. pass
  188. # Verify M1 --> M2
  189. model_add("users/user/test/a", "formalisms/ProcessModel")
  190. # Fails with lacking instances of Start and Finish class
  191. assert verify("users/user/test/a", "formalisms/ProcessModel").startswith("Lower cardinality violated for class: ")
  192. instantiate("users/user/test/a", "Start")
  193. # Fails with lacking instances of Finish class
  194. assert verify("users/user/test/a", "formalisms/ProcessModel") == "Lower cardinality violated for class: Finish"
  195. instantiate("users/user/test/a", "Finish")
  196. # Succeeds
  197. assert verify("users/user/test/a", "formalisms/ProcessModel") == "OK"
  198. # Test unreadable model
  199. try:
  200. verify("administration/core", "formalisms/ProcessModel")
  201. self.fail()
  202. except ReadPermissionDenied:
  203. pass
  204. # Test unreadable metamodel
  205. try:
  206. verify("formalisms/Bottom", "administration/core")
  207. self.fail()
  208. except ReadPermissionDenied:
  209. pass
  210. # Test non-existing model
  211. try:
  212. verify("adfadf", "formalisms/SimpleClassDiagrams")
  213. self.fail()
  214. except UnknownModel:
  215. pass
  216. # Test non-existing metamodel
  217. try:
  218. verify("formalisms/SimpleClassDiagrams", "adfka")
  219. self.fail()
  220. except UnknownModel:
  221. pass
  222. def test_op_permission_modify(self):
  223. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  224. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  225. # Check that we can read
  226. element_list_nice("users/user/test/a")
  227. # Check that we can write
  228. instantiate("users/user/test/a", "Class")
  229. assert permission_modify("users/user/test/a", "100") == None
  230. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "100")])
  231. # Check that we can read
  232. element_list_nice("users/user/test/a")
  233. # Check that we can't write
  234. try:
  235. instantiate("users/user/test/a", "Class")
  236. self.fail()
  237. except WritePermissionDenied:
  238. pass
  239. assert permission_modify("users/user/test/a", "000") == None
  240. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "000")])
  241. # Check that we can't read
  242. try:
  243. element_list_nice("users/user/test/a")
  244. self.fail()
  245. except ReadPermissionDenied:
  246. pass
  247. # Check that we can't write
  248. try:
  249. instantiate("users/user/test/a", "Class")
  250. self.fail()
  251. except WritePermissionDenied:
  252. pass
  253. except ReadPermissionDenied:
  254. pass
  255. assert permission_modify("users/user/test/a", "200") == None
  256. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  257. # Check that we can read
  258. element_list_nice("users/user/test/a")
  259. # Check that we can write
  260. instantiate("users/user/test/a", "Class")
  261. # Cannot modify permissions if we don't own the model
  262. try:
  263. permission_modify("formalisms/SimpleClassDiagrams", "222")
  264. self.fail()
  265. except UserPermissionDenied:
  266. pass
  267. # Cannot modify permissions even if we have full access, as long as we are not the owner
  268. model_add("users/user/test/z", "formalisms/SimpleClassDiagrams")
  269. permission_owner("users/user/test/z", "admin")
  270. try:
  271. permission_modify("users/user/test/z", "222")
  272. self.fail()
  273. except UserPermissionDenied:
  274. pass
  275. try:
  276. permission_owner("users/user/test/z", "user")
  277. self.fail()
  278. except UserPermissionDenied:
  279. pass
  280. # Cannot change non-existing model
  281. before = model_list("")
  282. try:
  283. permission_modify("adfadf", "111")
  284. self.fail()
  285. except UnknownModel:
  286. assert model_list("") == before
  287. # Check for type of permission string
  288. # Too long
  289. try:
  290. permission_modify("users/user/test/a", "1111")
  291. self.fail()
  292. except IncorrectFormat:
  293. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  294. # Above 2
  295. try:
  296. permission_modify("users/user/test/a", "131")
  297. self.fail()
  298. except IncorrectFormat:
  299. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  300. # Below 0
  301. try:
  302. permission_modify("users/user/test/a", "-111")
  303. self.fail()
  304. except IncorrectFormat:
  305. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  306. # Non-integer
  307. try:
  308. permission_modify("users/user/test/a", "2a1")
  309. self.fail()
  310. except IncorrectFormat:
  311. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  312. def test_op_model_add(self):
  313. assert model_list_full("users/user/test") == set([])
  314. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  315. # Test permissions of newly created empty model
  316. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  317. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", \
  318. """
  319. Class A {
  320. name = "A"
  321. }
  322. Class B {
  323. name = "B"
  324. abstract = True
  325. }
  326. """)
  327. # Test permissions of newly created non-empty model
  328. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  329. # Test content of newly created model with code upload
  330. lst = element_list_nice("users/user/test/b")
  331. assert len(lst) == 2
  332. assert {'__id': "A", "__type": "Class", "abstract": None, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "A"} in lst
  333. assert {'__id': "B", "__type": "Class", "abstract": True, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "B"} in lst
  334. try:
  335. # Cannot upload model to occupied location
  336. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  337. self.fail()
  338. except ModelExists:
  339. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  340. try:
  341. # Cannot upload model to unwritable location at root
  342. model_add("z", "formalisms/SimpleClassDiagrams")
  343. self.fail()
  344. except WritePermissionDenied:
  345. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  346. try:
  347. # Cannot upload model to unwritable location somewhere in hierarchy
  348. model_add("users/new_model", "formalisms/SimpleClassDiagrams")
  349. self.fail()
  350. except WritePermissionDenied:
  351. assert "new_model/" not in model_list("users/")
  352. try:
  353. # Cannot upload model to unwritable location somewhere in hierarchy with multiple new branches
  354. model_add("users/new_username/new_model", "formalisms/SimpleClassDiagrams")
  355. self.fail()
  356. except WritePermissionDenied:
  357. assert "new_username/" not in model_list("users/")
  358. model_add("users/user/test/c", "users/user/test/b", """
  359. A a {}
  360. """)
  361. try:
  362. # Cannot add this model, as it cannot be auto-typecasted to formalisms/SimpleClassDiagrams
  363. model_add("users/user/test/d", "users/user/test/c", """
  364. a c {}
  365. """)
  366. self.fail()
  367. except UnknownM3:
  368. assert model_list("users/user/test") == set(["a", "b", "c"])
  369. # We can add this model for multiple levels, as it can be automatically typecasted to formalisms/SimpleClassDiagrams, since it is empty
  370. model_add("users/user/test/d", "users/user/test/b")
  371. model_add("users/user/test/e", "users/user/test/d")
  372. model_add("users/user/test/f", "users/user/test/e")
  373. def test_op_model_add_compilation_error(self):
  374. try:
  375. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  376. abdfaefeaf
  377. """)
  378. self.fail()
  379. except CompilationError:
  380. pass
  381. try:
  382. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  383. Crass A {
  384. name = "b"
  385. }
  386. """)
  387. #TODO at the moment, this still succeeds!
  388. #self.fail()
  389. except:
  390. raise
  391. pass
  392. def test_op_model_move(self):
  393. # Test basic scenario
  394. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  395. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  396. assert model_move("users/user/test/a", "users/user/test/b") == None
  397. assert model_list_full("users/user/test") == set([("b", "user", "nobody", "200")])
  398. # Test if permissions are copied as well
  399. permission_modify("users/user/test/b", "222")
  400. assert model_list_full("users/user/test") == set([("b", "user", "nobody", "222")])
  401. assert model_move("users/user/test/b", "users/user/test/a") == None
  402. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222")])
  403. # Test move if destination exists
  404. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  405. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222"), ("b", "user", "nobody", "200")])
  406. try:
  407. model_move("users/user/test/a", "users/user/test/b")
  408. self.fail()
  409. except ModelExists:
  410. pass
  411. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222"), ("b", "user", "nobody", "200")])
  412. # Test move if source doesn't exist
  413. try:
  414. model_move("users/user/test/z", "users/user/test/y")
  415. self.fail()
  416. except UnknownModel:
  417. pass
  418. # Test if we can move a model we can't write to (i.e., not allowed to remove it)
  419. try:
  420. model_move("formalisms/ProcessModel", "users/user/test/x")
  421. self.fail()
  422. except WritePermissionDenied:
  423. pass
  424. # Test if we can move a model to a place we can't write to
  425. try:
  426. model_move("users/user/test/a", "administration/ProcessModel2")
  427. self.fail()
  428. except WritePermissionDenied:
  429. pass
  430. def test_op_model_delete(self):
  431. # Test basic delete
  432. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  433. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  434. assert model_delete("users/user/test/a") == None
  435. assert model_list_full("users/user/test") == set([])
  436. # Test delete of non-existing
  437. assert model_list_full("users/user/test") == set([])
  438. try:
  439. model_delete("users/user/test/a")
  440. self.fail()
  441. except UnknownModel:
  442. pass
  443. # Test delete of non-writable models
  444. try:
  445. model_delete("formalisms/SimpleClassDiagrams")
  446. self.fail()
  447. except WritePermissionDenied:
  448. pass
  449. # Try delete of a folder
  450. folder_create("users/user/test/b/c/d")
  451. model_add("users/user/test/b/c/d/e", "formalisms/SimpleClassDiagrams")
  452. assert model_list("users/user/test") == set(["b/"])
  453. assert model_list("users/user/test/b") == set(["c/"])
  454. assert model_list("users/user/test/b/c") == set(["d/"])
  455. assert model_list("users/user/test/b/c/d") == set(["e"])
  456. assert model_delete("users/user/test/b/c") == None
  457. # Removes recursively all subfolders and containing models
  458. assert model_list("users/user/test") == set(["b/"])
  459. assert model_list("users/user/test/b") == set([])
  460. try:
  461. model_list("users/user/test/b/c")
  462. self.fail()
  463. except UnknownLocation:
  464. pass
  465. try:
  466. element_list("users/user/test/b/c/d/e")
  467. self.fail()
  468. except UnknownModel:
  469. pass
  470. def test_op_model_overwrite(self):
  471. # Test overwrite of simple model
  472. assert model_list_full("users/user/test") == set([])
  473. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  474. # Test permissions of newly created empty model
  475. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  476. assert element_list_nice("users/user/test/a") == []
  477. model_overwrite("users/user/test/a", \
  478. """
  479. Class A {
  480. name = "A"
  481. }
  482. Class B {
  483. name = "B"
  484. abstract = True
  485. }
  486. """)
  487. # Test permissions of newly created non-empty model
  488. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  489. # Test content of newly created model with code upload
  490. lst = element_list_nice("users/user/test/a")
  491. assert len(lst) == 2
  492. assert {'__id': "A", "__type": "Class", "abstract": None, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "A"} in lst
  493. assert {'__id': "B", "__type": "Class", "abstract": True, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "B"} in lst
  494. # Test non-writable model
  495. before = element_list("formalisms/SimpleClassDiagrams")
  496. try:
  497. model_overwrite("formalisms/SimpleClassDiagrams", "")
  498. self.fail()
  499. except WritePermissionDenied:
  500. # No changes were made
  501. assert element_list("formalisms/SimpleClassDiagrams") == before
  502. # Test non-existing model
  503. assert "adfafd" not in model_list("")
  504. try:
  505. model_overwrite("adfafd", "")
  506. self.fail()
  507. except UnknownModel:
  508. assert "adfafd" not in model_list("")
  509. # Test compilation error
  510. before = element_list_nice("users/user/test/a")
  511. try:
  512. model_overwrite("users/user/test/a", "afajk")
  513. self.fail()
  514. except CompilationError:
  515. assert element_list_nice("users/user/test/a") == before
  516. # Test overwrite of non-model location
  517. before = model_list("users/user/test")
  518. try:
  519. model_overwrite("users/user/test", "")
  520. self.fail()
  521. except UnknownMetamodellingHierarchy:
  522. assert model_list("users/user/test") == before
  523. def test_op_user_logout(self):
  524. try:
  525. element_list_nice("administration/core")
  526. self.fail()
  527. except ReadPermissionDenied:
  528. pass
  529. user_logout()
  530. login("admin", "admin")
  531. # Test user permissions
  532. assert len(element_list_nice("administration/core")) > 0
  533. user_logout()
  534. login("user", "user")
  535. try:
  536. element_list_nice("administration/core")
  537. self.fail()
  538. except ReadPermissionDenied:
  539. pass
  540. def test_op_all_instances(self):
  541. # Test M2 level
  542. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  543. Class A {}
  544. Class B : A {}
  545. Association C (A, B) {}
  546. """)
  547. assert all_instances("users/user/test/a", "Class") == set(["A", "B", "C"])
  548. assert all_instances("users/user/test/a", "Association") == set(["C"])
  549. # Test non-existing type
  550. try:
  551. all_instances("users/user/test/a", "non-existing")
  552. self.fail()
  553. except UnknownElement:
  554. pass
  555. # Test non-existing model
  556. try:
  557. all_instances("users/user/test/b", "Class")
  558. self.fail()
  559. except UnknownModel:
  560. pass
  561. # Test M1 level
  562. model_add("users/user/test/b", "users/user/test/a", """
  563. A a {}
  564. B b {}
  565. C c(a, b) {}
  566. A d {}
  567. """)
  568. assert all_instances("users/user/test/b", "A") == set(["a", "b", "d"])
  569. assert all_instances("users/user/test/b", "B") == set(["b"])
  570. assert all_instances("users/user/test/b", "C") == set(["c"])
  571. # No read permission
  572. try:
  573. all_instances("administration/core", "Class")
  574. self.fail()
  575. except ReadPermissionDenied:
  576. pass
  577. # No write permission, but can query
  578. assert type(all_instances("formalisms/SimpleClassDiagrams", "Class")) == set
  579. def test_op_admin_promote_demote(self):
  580. # Verify that user doesn't have admin permissions
  581. try:
  582. element_list("administration/core")
  583. self.fail()
  584. except ReadPermissionDenied:
  585. pass
  586. # Cannot do admin_promote ourselves
  587. try:
  588. admin_promote("user")
  589. except AdminPermissionDenied:
  590. pass
  591. # Cannot do admin_demote ourselves
  592. try:
  593. admin_demote("user")
  594. except AdminPermissionDenied:
  595. pass
  596. # Switch to admin for now
  597. self.do_as_user("admin", admin_promote, ["user"])
  598. # Verify that we can do admin operations
  599. assert len(element_list("administration/core")) > 0
  600. # And check that we can promote/demote other users
  601. admin_promote("HUTN")
  602. admin_demote("HUTN")
  603. # Can also demote ourselves again
  604. admin_demote("user")
  605. # Verify that user doesn't have admin permissions
  606. try:
  607. element_list("administration/core")
  608. self.fail()
  609. except ReadPermissionDenied:
  610. pass
  611. def test_op_model_types(self):
  612. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  613. # Read model types of simple model
  614. lst = model_types("users/user/test/a")
  615. assert len(lst) == 1
  616. entry = lst.pop()
  617. assert entry[0] == "formalisms/SimpleClassDiagrams"
  618. assert entry[1].startswith("type mappings/")
  619. assert entry[2] == None
  620. # Create bottom and query afterwards
  621. alter_context("users/user/test/a", "formalisms/Bottom")
  622. element_list_nice("users/user/test/a")
  623. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  624. lst = model_types("users/user/test/a")
  625. assert len(lst) == 2
  626. got = set()
  627. while lst:
  628. entry = lst.pop()
  629. assert entry[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  630. assert entry[0] not in got
  631. got.add(entry[0])
  632. assert entry[1].startswith("type mappings/")
  633. assert entry[2] == None
  634. # No type mapping for type mappings
  635. assert model_types(entry[1]) == set([("formalisms/TypeMapping", None, None)])
  636. # But there will be as soon as we open it
  637. element_list_nice(entry[1])
  638. lst = model_types(entry[1])
  639. assert len(lst) == 1
  640. entry = lst.pop()
  641. assert entry[0] == "formalisms/TypeMapping"
  642. assert entry[1].startswith("type mappings/")
  643. assert entry[2] == None
  644. def test_op_folder_create(self):
  645. # Create a folder
  646. assert folder_create("users/user/test/folder_a") == None
  647. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200")])
  648. # Create folder with trailing slash
  649. assert folder_create("users/user/test/folder_b/") == None
  650. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200"), ("folder_b/", "user", "nobody", "200")])
  651. assert model_list_full("users/user/test/folder_b") == set()
  652. # Create multiple folders
  653. assert folder_create("users/user/test/folder_a/folder_b/folder_c/folder_d") == None
  654. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200"), ("folder_b/", "user", "nobody", "200")])
  655. assert model_list_full("users/user/test/folder_a") == set([("folder_b/", "user", "nobody", "200")])
  656. assert model_list_full("users/user/test/folder_a/folder_b") == set([("folder_c/", "user", "nobody", "200")])
  657. assert model_list_full("users/user/test/folder_a/folder_b/folder_c") == set([("folder_d/", "user", "nobody", "200")])
  658. # Create folder in non-writable location
  659. try:
  660. folder_create("a")
  661. self.fail()
  662. except WritePermissionDenied:
  663. pass
  664. assert "a" not in model_list("")
  665. # Create folder that already exists
  666. try:
  667. folder_create("users/user/test/folder_a")
  668. self.fail()
  669. except FolderExists:
  670. pass
  671. def test_op_alter_context(self):
  672. # Create a model that we will use
  673. model_add("users/user/test/a", "formalisms/ProcessModel", """
  674. Start start {}
  675. Finish finish {}
  676. """)
  677. # List elements using default context, that of creation
  678. lst = element_list_nice("users/user/test/a")
  679. assert len(lst) == 2
  680. assert {"__id": "start", "__type": "Start"} in lst
  681. assert {"__id": "finish", "__type": "Finish"} in lst
  682. # List elements using bottom context
  683. alter_context("users/user/test/a", "formalisms/Bottom")
  684. lst = element_list_nice("users/user/test/a")
  685. assert len(lst) == 2
  686. assert {"__id": "start", "__type": "Node"} in lst
  687. assert {"__id": "finish", "__type": "Node"} in lst
  688. # Switch back to default context
  689. alter_context("users/user/test/a", "formalisms/ProcessModel")
  690. lst = element_list_nice("users/user/test/a")
  691. assert len(lst) == 2
  692. assert {"__id": "start", "__type": "Start"} in lst
  693. assert {"__id": "finish", "__type": "Finish"} in lst
  694. # Switch to a non-existing context
  695. alter_context("users/user/test/a", "non-existing")
  696. try:
  697. element_list_nice("users/user/test/a")
  698. self.fail()
  699. except UnknownModel:
  700. pass
  701. # Set context for an unknown model
  702. # Note that this will only register locally, without communicating with the Modelverse
  703. # as such, errors are not noticed until the element is accessed!
  704. alter_context("non-existing", "formalisms/SimpleClassDiagrams")
  705. def test_op_element_list(self):
  706. model_add("users/user/test/a", "formalisms/ProcessModel", """
  707. Start start {}
  708. Finish finish {}
  709. Next nxt (start, finish) {}
  710. """)
  711. # Basic operation
  712. lst = element_list("users/user/test/a")
  713. assert len(lst) == 3
  714. assert ("start", "Start") in lst
  715. assert ("finish", "Finish") in lst
  716. assert ("nxt", "Next") in lst
  717. # Try on non-existing model
  718. try:
  719. element_list("a")
  720. self.fail()
  721. except UnknownModel:
  722. pass
  723. # Try a non-readable model
  724. try:
  725. element_list("administration/core")
  726. self.fail()
  727. except ReadPermissionDenied:
  728. pass
  729. # No write permission, but can query
  730. assert type(element_list("formalisms/SimpleClassDiagrams")) == set
  731. def test_op_element_list_nice(self):
  732. # Test simple element_list_nice
  733. model_add("users/user/test/a", "formalisms/ProcessModel", """
  734. Start start {}
  735. Finish finish {}
  736. Next nxt (start, finish) {}
  737. """)
  738. # Basic operation
  739. lst = element_list_nice("users/user/test/a")
  740. assert len(lst) == 3
  741. assert {"__id": "start", "__type": "Start"} in lst
  742. assert {"__id": "finish", "__type": "Finish"} in lst
  743. assert {"__id": "nxt", "__type": "Next", "__source": "start", "__target": "finish"} in lst
  744. # Test a model with attributes
  745. model_add("users/user/test/b", "formalisms/ProcessModel", """
  746. Start start {}
  747. Exec exec1 {
  748. name = "first exec"
  749. }
  750. Finish finish {}
  751. Data d1 {
  752. name = "data 1"
  753. type = "type 1"
  754. }
  755. Next n1 (start, exec1) {}
  756. Next n2 (exec1, finish) {}
  757. Produces p1 (exec1, d1) {
  758. name = "producer"
  759. }
  760. """)
  761. lst = element_list_nice("users/user/test/b")
  762. assert len(lst) == 7
  763. assert {"__id": "start", "__type": "Start"} in lst
  764. assert {"__id": "finish", "__type": "Finish"} in lst
  765. assert {"__id": "exec1", "__type": "Exec", "name": "first exec"} in lst
  766. assert {"__id": "d1", "__type": "Data", "name": "data 1", "type": "type 1"} in lst
  767. assert {"__id": "n1", "__type": "Next", "__source": "start", "__target": "exec1"} in lst
  768. assert {"__id": "n2", "__type": "Next", "__source": "exec1", "__target": "finish"} in lst
  769. assert {"__id": "p1", "__type": "Produces", "__source": "exec1", "__target": "d1", "name": "producer"} in lst
  770. # Try one with defined attributes
  771. model_add("users/user/test/c", "formalisms/SimpleClassDiagrams", """
  772. SimpleAttribute Natural {
  773. name = "natural"
  774. }
  775. SimpleAttribute String {
  776. name = "string"
  777. }
  778. Class place {
  779. name = "Place"
  780. name : String
  781. capacity : Natural
  782. }
  783. Class transition {
  784. name = "Transition"
  785. name : String
  786. }
  787. Association p2t (place, transition) {
  788. name = "P2T"
  789. weight : Natural
  790. }
  791. Association t2p (transition, place) {
  792. name = "T2P"
  793. weight : Natural
  794. }
  795. """)
  796. lst = element_list_nice("users/user/test/c")
  797. assert len(lst) == 11
  798. assert {"__id": "Natural", "__type": "SimpleAttribute", "constraint": {"AL": ""}, "name": "natural"} in lst
  799. assert {"__id": "String", "__type": "SimpleAttribute", "constraint": {"AL": ""}, "name": "string"} in lst
  800. assert {"__id": "place", "name": "Place", "__type": "Class", "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "abstract": None} in lst
  801. assert {"__id": "transition", "name": "Transition", "__type": "Class", "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "abstract": None} in lst
  802. assert {"__id": "p2t", "name": "P2T", "__type": "Association", "__source": "place", "__target": "transition", "constraint": {"AL": ""}, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None} in lst
  803. assert {"__id": "t2p", "name": "T2P", "__type": "Association", "__source": "transition", "__target": "place", "constraint": {"AL": ""}, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None} in lst
  804. assert {"__id": "place_name", "__type": "AttributeLink", "__source": "place", "__target": "String", "name": "name", "optional": False, "constraint": {"AL": ""}} in lst
  805. assert {"__id": "place_capacity", "__type": "AttributeLink", "__source": "place", "__target": "Natural", "name": "capacity", "optional": False, "constraint": {"AL": ""}} in lst
  806. assert {"__id": "transition_name", "__type": "AttributeLink", "__source": "transition", "__target": "String", "name": "name", "optional": False, "constraint": {"AL": ""}} in lst
  807. assert {"__id": "p2t_weight", "__type": "AttributeLink", "__source": "p2t", "__target": "Natural", "name": "weight", "optional": False, "constraint": {"AL": ""}} in lst
  808. assert {"__id": "t2p_weight", "__type": "AttributeLink", "__source": "t2p", "__target": "Natural", "name": "weight", "optional": False, "constraint": {"AL": ""}} in lst
  809. # Try on non-existing model
  810. try:
  811. element_list_nice("a")
  812. self.fail()
  813. except UnknownModel:
  814. pass
  815. # Try a non-readable model
  816. try:
  817. element_list_nice("administration/core")
  818. self.fail()
  819. except ReadPermissionDenied:
  820. pass
  821. # No write permission, but can query
  822. assert type(element_list_nice("formalisms/SimpleClassDiagrams")) == list
  823. def test_op_types(self):
  824. # Try operation of unopened model
  825. assert types("formalisms/ProcessModel") == element_list("formalisms/SimpleClassDiagrams")
  826. # Try simple operation
  827. model_add("users/user/test/a", "formalisms/ProcessModel", """
  828. Start start {}
  829. Finish finish {}
  830. Next nxt (start, finish) {}
  831. """)
  832. assert types("users/user/test/a") == element_list("formalisms/ProcessModel")
  833. alter_context("users/user/test/a", "formalisms/Bottom")
  834. assert types("users/user/test/a") == element_list("formalisms/Bottom")
  835. # Try for model that we cannot read
  836. try:
  837. types("administration/core")
  838. self.fail()
  839. except ReadPermissionDenied:
  840. pass
  841. # Try for non-existing model
  842. try:
  843. types("a")
  844. self.fail()
  845. except UnknownModel:
  846. pass
  847. # Try for a metamodel that we are not allowed to read, although the model may be read
  848. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  849. assert types("users/user/test/b") == element_list("formalisms/SimpleClassDiagrams")
  850. alter_context("users/user/test/b", "administration/core")
  851. try:
  852. types("users/user/test/b")
  853. self.fail()
  854. except ReadPermissionDenied:
  855. pass
  856. # No write permission for either M or MM, but can query
  857. assert type(types("formalisms/SimpleClassDiagrams")) == set
  858. def test_op_read_info(self):
  859. # Basic case
  860. model_add("users/user/test/a", "formalisms/ProcessModel", """
  861. Start start {}
  862. Finish finish {}
  863. Next nxt (start, finish) {}
  864. """)
  865. assert read_info("users/user/test/a", "start") == ("Start", None)
  866. assert read_info("users/user/test/a", "finish") == ("Finish", None)
  867. assert read_info("users/user/test/a", "nxt") == ("Next", ("start", "finish"))
  868. # Read using different metamodel
  869. alter_context("users/user/test/a", "formalisms/Bottom")
  870. assert read_info("users/user/test/a", "start") == ("Node", None)
  871. assert read_info("users/user/test/a", "finish") == ("Node", None)
  872. assert read_info("users/user/test/a", "nxt") == ("Edge", ("start", "finish"))
  873. # Non-existing element
  874. try:
  875. read_info("users/user/test/a", "notthere")
  876. self.fail()
  877. except UnknownElement:
  878. pass
  879. # Non-existing model
  880. try:
  881. read_info("users/user/test/b", "start")
  882. self.fail()
  883. except UnknownModel:
  884. pass
  885. # No read permission
  886. try:
  887. read_info("administration/core", "administration")
  888. self.fail()
  889. except ReadPermissionDenied:
  890. pass
  891. # No write permission, but can query
  892. assert type(read_info("formalisms/SimpleClassDiagrams", "Class")) == tuple
  893. def test_op_read_attrs(self):
  894. # Basic behaviour
  895. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  896. SimpleAttribute Natural {
  897. name = "natural"
  898. }
  899. SimpleAttribute String {
  900. name = "string"
  901. }
  902. Class Place {
  903. name = "Place"
  904. name : String
  905. capacity : Natural
  906. }
  907. Class Transition {
  908. name = "Transition"
  909. name : String
  910. }
  911. Association P2T (Place, Transition) {
  912. name = "P2T"
  913. weight : Natural
  914. }
  915. Association T2P (Transition, Place) {
  916. name = "T2P"
  917. weight : Natural
  918. }
  919. """)
  920. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  921. assert read_attrs("users/user/test/a", "String") == {"constraint": {"AL": ""}, "name": "string"}
  922. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  923. assert read_attrs("users/user/test/a", "Transition") == {"constraint": {"AL": ""}, "name": "Transition", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  924. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  925. assert read_attrs("users/user/test/a", "T2P") == {"constraint": {"AL": ""}, "name": "T2P", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  926. model_add("users/user/test/b", "users/user/test/a", """
  927. Place p1 {
  928. name = "place 1"
  929. capacity = 2
  930. }
  931. Place p2 {
  932. name = "place 2"
  933. capacity = 1
  934. }
  935. Transition t1 {
  936. name = "transition"
  937. }
  938. P2T p2t (p1, t1) {
  939. weight = 4
  940. }
  941. T2P t2p (t1, p2) {
  942. weight = 10
  943. }
  944. """)
  945. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  946. assert read_attrs("users/user/test/b", "p2") == {"name": "place 2", "capacity": 1}
  947. assert read_attrs("users/user/test/b", "t1") == {"name": "transition"}
  948. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  949. assert read_attrs("users/user/test/b", "t2p") == {"weight": 10}
  950. # Non-existing model
  951. try:
  952. read_attrs("users/afa", "p1")
  953. self.fail()
  954. except UnknownModel:
  955. pass
  956. # Non-existing element
  957. try:
  958. read_attrs("users/user/test/a", "PPPPPPP")
  959. self.fail()
  960. except UnknownElement:
  961. pass
  962. # No read permissions
  963. try:
  964. read_attrs("administration/core", "formalisms")
  965. self.fail()
  966. except ReadPermissionDenied:
  967. pass
  968. # No write permissions, but can query
  969. assert type(read_attrs("formalisms/SimpleClassDiagrams", "Class")) == type(dict())
  970. def test_op_attr_assign(self):
  971. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  972. SimpleAttribute Natural {
  973. name = "natural"
  974. }
  975. SimpleAttribute String {
  976. name = "string"
  977. }
  978. Class Place {
  979. name = "Place"
  980. name : String
  981. capacity : Natural
  982. }
  983. Class Transition {
  984. name = "Transition"
  985. name : String
  986. }
  987. Association P2T (Place, Transition) {
  988. name = "P2T"
  989. weight : Natural
  990. }
  991. Association T2P (Transition, Place) {
  992. name = "T2P"
  993. weight : Natural
  994. }
  995. """)
  996. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  997. assert attr_assign("users/user/test/a", "Natural", "name", "nat") == None
  998. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "nat"}
  999. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1000. assert attr_assign("users/user/test/a", "Place", "name", "NewPlace") == None
  1001. assert attr_assign("users/user/test/a", "Place", "abstract", False) == None
  1002. assert attr_assign("users/user/test/a", "Place", "lower_cardinality", 4) == None
  1003. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "NewPlace", "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  1004. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1005. assert attr_assign("users/user/test/a", "P2T", "name", "PPP") == None
  1006. assert attr_assign("users/user/test/a", "P2T", "source_lower_cardinality", 1) == None
  1007. assert attr_assign("users/user/test/a", "P2T", "target_upper_cardinality", 10) == None
  1008. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "PPP", "source_lower_cardinality": 1, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": 10, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1009. model_add("users/user/test/b", "users/user/test/a", """
  1010. Place p1 {
  1011. name = "place 1"
  1012. capacity = 2
  1013. }
  1014. Place p2 {
  1015. name = "place 2"
  1016. capacity = 1
  1017. }
  1018. Transition t1 {
  1019. name = "transition"
  1020. }
  1021. P2T p2t (p1, t1) {
  1022. weight = 4
  1023. }
  1024. T2P t2p (t1, p2) {
  1025. weight = 10
  1026. }
  1027. """)
  1028. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  1029. assert attr_assign("users/user/test/b", "p1", "name", "place 3") == None
  1030. assert attr_assign("users/user/test/b", "p1", "capacity", 3) == None
  1031. assert read_attrs("users/user/test/b", "p1") == {"name": "place 3", "capacity": 3}
  1032. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  1033. assert attr_assign("users/user/test/b", "p2t", "weight", 0) == None
  1034. assert read_attrs("users/user/test/b", "p2t") == {"weight": 0}
  1035. # Non-existing model
  1036. try:
  1037. attr_assign("users/afa", "p1", "name", "abc")
  1038. self.fail()
  1039. except UnknownModel:
  1040. pass
  1041. # Non-existing element
  1042. try:
  1043. attr_assign("users/user/test/a", "PPPPPPP", "name", "abc")
  1044. self.fail()
  1045. except UnknownElement:
  1046. pass
  1047. # No read permissions
  1048. try:
  1049. attr_assign("administration/core", "formalisms", "name", "abc")
  1050. self.fail()
  1051. except ReadPermissionDenied:
  1052. pass
  1053. # No write permissions
  1054. try:
  1055. attr_assign("formalisms/SimpleClassDiagrams", "Class", "name", "abc")
  1056. self.fail()
  1057. except WritePermissionDenied:
  1058. pass
  1059. # No such attribute
  1060. try:
  1061. attr_assign("users/user/test/a", "Place", "ddd", 1)
  1062. self.fail()
  1063. except UnknownAttribute:
  1064. pass
  1065. # Assign None, equals to attr_delete
  1066. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "NewPlace", "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  1067. attr_assign("users/user/test/a", "Place", "name", None)
  1068. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": None, "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  1069. def test_op_attr_delete(self):
  1070. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1071. SimpleAttribute Natural {
  1072. name = "natural"
  1073. }
  1074. SimpleAttribute String {
  1075. name = "string"
  1076. }
  1077. Class Place {
  1078. name = "Place"
  1079. name : String
  1080. capacity : Natural
  1081. }
  1082. Class Transition {
  1083. name = "Transition"
  1084. name : String
  1085. }
  1086. Association P2T (Place, Transition) {
  1087. name = "P2T"
  1088. weight : Natural
  1089. }
  1090. Association T2P (Transition, Place) {
  1091. name = "T2P"
  1092. weight : Natural
  1093. }
  1094. """)
  1095. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  1096. assert attr_delete("users/user/test/a", "Natural", "name") == None
  1097. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": None}
  1098. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1099. assert attr_delete("users/user/test/a", "Place", "name") == None
  1100. assert attr_delete("users/user/test/a", "Place", "abstract") == None
  1101. assert attr_delete("users/user/test/a", "Place", "lower_cardinality") == None
  1102. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1103. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1104. assert attr_delete("users/user/test/a", "P2T", "name") == None
  1105. assert attr_delete("users/user/test/a", "P2T", "source_lower_cardinality") == None
  1106. assert attr_delete("users/user/test/a", "P2T", "target_upper_cardinality") == None
  1107. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": None, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1108. model_add("users/user/test/b", "users/user/test/a", """
  1109. Place p1 {
  1110. name = "place 1"
  1111. capacity = 2
  1112. }
  1113. Place p2 {
  1114. name = "place 2"
  1115. capacity = 1
  1116. }
  1117. Transition t1 {
  1118. name = "transition"
  1119. }
  1120. P2T p2t (p1, t1) {
  1121. weight = 4
  1122. }
  1123. T2P t2p (t1, p2) {
  1124. weight = 10
  1125. }
  1126. """)
  1127. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  1128. assert attr_delete("users/user/test/b", "p1", "capacity") == None
  1129. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": None}
  1130. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  1131. assert attr_delete("users/user/test/b", "p2t", "weight") == None
  1132. assert read_attrs("users/user/test/b", "p2t") == {"weight": None}
  1133. # Non-existing model
  1134. try:
  1135. attr_delete("users/afa", "p1", "name")
  1136. self.fail()
  1137. except UnknownModel:
  1138. pass
  1139. # Non-existing element
  1140. try:
  1141. attr_delete("users/user/test/a", "PPPPPPP", "name")
  1142. self.fail()
  1143. except UnknownElement:
  1144. pass
  1145. # No read permissions
  1146. try:
  1147. attr_delete("administration/core", "formalisms", "name")
  1148. self.fail()
  1149. except ReadPermissionDenied:
  1150. pass
  1151. # No write permissions
  1152. try:
  1153. attr_delete("formalisms/SimpleClassDiagrams", "Class", "name")
  1154. self.fail()
  1155. except WritePermissionDenied:
  1156. pass
  1157. # No such attribute
  1158. try:
  1159. attr_delete("users/user/test/a", "Place", "ddd")
  1160. self.fail()
  1161. except UnknownAttribute:
  1162. pass
  1163. def test_op_attr_delete_code(self):
  1164. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1165. SimpleAttribute Natural {
  1166. name = "natural"
  1167. }
  1168. SimpleAttribute String {
  1169. name = "string"
  1170. }
  1171. Class Place {
  1172. name = "Place"
  1173. name : String
  1174. capacity : Natural
  1175. }
  1176. Class Transition {
  1177. name = "Transition"
  1178. name : String
  1179. }
  1180. Association P2T (Place, Transition) {
  1181. name = "P2T"
  1182. weight : Natural
  1183. }
  1184. Association T2P (Transition, Place) {
  1185. name = "T2P"
  1186. weight : Natural
  1187. }
  1188. """)
  1189. # Test what happens if removing a non-existing AL attribute
  1190. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1191. attr_delete("users/user/test/a", "Place", "constraint")
  1192. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1193. # Test what happens if removing an existing AL attribute
  1194. attr_assign_code("users/user/test/a", "Place", "constraint", """
  1195. String function a(value : Element):
  1196. return "OK"!
  1197. """)
  1198. attrs = read_attrs("users/user/test/a", "Place")
  1199. assert "AL" in attrs["constraint"]
  1200. assert attrs["constraint"]["AL"] != ""
  1201. attr_delete("users/user/test/a", "Place", "constraint")
  1202. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1203. def test_op_attr_assign_code(self):
  1204. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1205. SimpleAttribute Natural {
  1206. name = "natural"
  1207. }
  1208. SimpleAttribute String {
  1209. name = "string"
  1210. }
  1211. Class Place {
  1212. name = "Place"
  1213. name : String
  1214. capacity : Natural
  1215. }
  1216. Class Transition {
  1217. name = "Transition"
  1218. name : String
  1219. }
  1220. Association P2T (Place, Transition) {
  1221. name = "P2T"
  1222. weight : Natural
  1223. }
  1224. Association T2P (Transition, Place) {
  1225. name = "T2P"
  1226. weight : Natural
  1227. }
  1228. """)
  1229. # Test ordinary case
  1230. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1231. assert attr_assign_code("users/user/test/a", "Place", "constraint", """
  1232. String function a(value : Element):
  1233. return "OK"!
  1234. """) == None
  1235. attrs = read_attrs("users/user/test/a", "Place")
  1236. assert "AL" in attrs["constraint"]
  1237. assert attrs["constraint"]["AL"] != ""
  1238. assert AL_text(attrs["constraint"]["AL"]).strip() == """
  1239. String function a(value : Element):
  1240. return "OK"!
  1241. """.strip()
  1242. # Test assign when already assigned
  1243. attrs = read_attrs("users/user/test/a", "Place")
  1244. old_location = attrs["constraint"]["AL"]
  1245. old_text = AL_text(attrs["constraint"]["AL"])
  1246. assert attr_assign_code("users/user/test/a", "Place", "constraint", """
  1247. String function a(value : Element):
  1248. return "NOK"!
  1249. """) == None
  1250. attrs = read_attrs("users/user/test/a", "Place")
  1251. assert "AL" in attrs["constraint"]
  1252. assert attrs["constraint"]["AL"] != ""
  1253. assert attrs["constraint"]["AL"] != old_location
  1254. assert AL_text(attrs["constraint"]["AL"]).strip() == """
  1255. String function a(value : Element):
  1256. return "NOK"!
  1257. """.strip()
  1258. assert AL_text(attrs["constraint"]["AL"]).strip () != old_text.strip()
  1259. simple_code = \
  1260. """
  1261. String function a(value : Element):
  1262. return "OK"!
  1263. """
  1264. # Non-existing model
  1265. try:
  1266. attr_assign_code("users/afa", "p1", "name", simple_code)
  1267. self.fail()
  1268. except UnknownModel:
  1269. pass
  1270. # Non-existing element
  1271. try:
  1272. attr_assign_code("users/user/test/a", "PPPPPPP", "name", simple_code)
  1273. self.fail()
  1274. except UnknownElement:
  1275. pass
  1276. # No read permissions
  1277. try:
  1278. attr_assign_code("administration/core", "formalisms", "name", simple_code)
  1279. self.fail()
  1280. except ReadPermissionDenied:
  1281. pass
  1282. # No write permissions
  1283. try:
  1284. attr_assign_code("formalisms/SimpleClassDiagrams", "Class", "name", simple_code)
  1285. self.fail()
  1286. except WritePermissionDenied:
  1287. pass
  1288. # No such attribute
  1289. try:
  1290. attr_assign_code("users/user/test/a", "Place", "ddd", simple_code)
  1291. self.fail()
  1292. except UnknownAttribute:
  1293. pass
  1294. # Compilation error
  1295. try:
  1296. attr_assign_code("users/user/test/a", "Place", "constraint", "abc")
  1297. self.fail()
  1298. except CompilationError:
  1299. pass
  1300. def test_op_instantiate(self):
  1301. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  1302. assert element_list("users/user/test/a") == set([])
  1303. # Instantiate node element
  1304. ID = instantiate("users/user/test/a", "Class")
  1305. assert element_list("users/user/test/a") == set([(ID, "Class")])
  1306. assert read_info("users/user/test/a", ID) == ("Class", None)
  1307. # Instantiate node element with ID
  1308. ID2 = instantiate("users/user/test/a", "Class", ID="new_node")
  1309. assert ID2 == "new_node"
  1310. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class")])
  1311. assert read_info("users/user/test/a", ID2) == ("Class", None)
  1312. # Instantiate edge element
  1313. ID3 = instantiate("users/user/test/a", "Association", edge=(ID, ID2))
  1314. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association")])
  1315. assert read_info("users/user/test/a", ID3) == ("Association", (ID, ID2))
  1316. # Instantiate edge element with ID
  1317. ID4 = instantiate("users/user/test/a", "Association", edge=(ID, ID2), ID="new_edge")
  1318. assert ID4 == "new_edge"
  1319. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association")])
  1320. assert read_info("users/user/test/a", ID4) == ("Association", (ID, ID2))
  1321. # Instantiate edge from edge (source)
  1322. ID5 = instantiate("users/user/test/a", "Association", edge=(ID3, ID))
  1323. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association")])
  1324. assert read_info("users/user/test/a", ID5) == ("Association", (ID3, ID))
  1325. # Instantiate edge from edge (target)
  1326. ID6 = instantiate("users/user/test/a", "Association", edge=(ID, ID3))
  1327. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association"), (ID6, "Association")])
  1328. assert read_info("users/user/test/a", ID6) == ("Association", (ID, ID3))
  1329. # Instantiate edge from edge (source and target)
  1330. ID7 = instantiate("users/user/test/a", "Association", edge=(ID3, ID4))
  1331. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association"), (ID6, "Association"), (ID7, "Association")])
  1332. assert read_info("users/user/test/a", ID7) == ("Association", (ID3, ID4))
  1333. # Non-existing model
  1334. try:
  1335. instantiate("users/afa", "Association")
  1336. self.fail()
  1337. except UnknownModel:
  1338. pass
  1339. # Non-existing element
  1340. before = element_list("users/user/test/a")
  1341. try:
  1342. instantiate("users/user/test/a", "AAAAAAA")
  1343. self.fail()
  1344. except UnknownElement:
  1345. assert element_list("users/user/test/a") == before
  1346. # No read permissions
  1347. try:
  1348. instantiate("administration/core", "formalisms")
  1349. self.fail()
  1350. except ReadPermissionDenied:
  1351. pass
  1352. # No write permissions
  1353. before = element_list("users/user/test/a")
  1354. try:
  1355. instantiate("formalisms/SimpleClassDiagrams", "Class")
  1356. self.fail()
  1357. except WritePermissionDenied:
  1358. assert element_list("users/user/test/a") == before
  1359. # Pre-existing ID requested (node)
  1360. before = element_list("users/user/test/a")
  1361. try:
  1362. instantiate("users/user/test/a", "Class", ID=ID)
  1363. self.fail()
  1364. except ElementExists:
  1365. assert element_list("users/user/test/a") == before
  1366. # Pre-existing ID requested (edge)
  1367. before = element_list("users/user/test/a")
  1368. try:
  1369. instantiate("users/user/test/a", "Association", ID=ID, edge=(ID2, ID3))
  1370. self.fail()
  1371. except ElementExists:
  1372. assert element_list("users/user/test/a") == before
  1373. # Edge from non-existing ID
  1374. before = element_list("users/user/test/a")
  1375. try:
  1376. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", ID3))
  1377. self.fail()
  1378. except ElementExists:
  1379. assert element_list("users/user/test/a") == before
  1380. # Edge to non-existing ID
  1381. before = element_list("users/user/test/a")
  1382. try:
  1383. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", ID3))
  1384. self.fail()
  1385. except ElementExists:
  1386. assert element_list("users/user/test/a") == before
  1387. # Edge both non-existing ID
  1388. before = element_list("users/user/test/a")
  1389. try:
  1390. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", "non-existing2"))
  1391. self.fail()
  1392. except ElementExists:
  1393. assert element_list("users/user/test/a") == before
  1394. # Garbage type
  1395. before = element_list("users/user/test/a")
  1396. try:
  1397. instantiate("users/user/test/a", ("a", "b"))
  1398. self.fail()
  1399. except UnknownElement:
  1400. assert element_list("users/user/test/a") == before
  1401. # Garbage edge src
  1402. before = element_list("users/user/test/a")
  1403. try:
  1404. instantiate("users/user/test/a", "Association", edge=(('a', 'b'), "non-existing2"))
  1405. self.fail()
  1406. except UnknownElement:
  1407. assert element_list("users/user/test/a") == before
  1408. # Garbage edge dst
  1409. before = element_list("users/user/test/a")
  1410. try:
  1411. instantiate("users/user/test/a", "Association", edge=("non-existing", ('a', 'b')))
  1412. self.fail()
  1413. except UnknownElement:
  1414. assert element_list("users/user/test/a") == before
  1415. def test_op_delete_element(self):
  1416. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1417. Class A {}
  1418. """)
  1419. # Test simple delete
  1420. assert len(element_list_nice("users/user/test/a")) == 1
  1421. assert delete_element("users/user/test/a", "A") == None
  1422. assert len(element_list_nice("users/user/test/a")) == 0
  1423. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  1424. Class A {}
  1425. Class B {}
  1426. Association (A, B) {}
  1427. """)
  1428. # Test delete of element that causes other elements to be deleted as well
  1429. assert len(element_list_nice("users/user/test/b")) == 3
  1430. assert delete_element("users/user/test/b", "A") == None
  1431. assert len(element_list_nice("users/user/test/b")) == 1
  1432. model_add("users/user/test/c", "formalisms/SimpleClassDiagrams", """
  1433. Class A {}
  1434. Class B {}
  1435. Association C (A, B) {}
  1436. """)
  1437. # Test delete of edge that causes other elements to be deleted as well
  1438. assert len(element_list_nice("users/user/test/c")) == 3
  1439. assert delete_element("users/user/test/c", "C") == None
  1440. assert len(element_list_nice("users/user/test/c")) == 2
  1441. model_add("users/user/test/d", "formalisms/SimpleClassDiagrams", """
  1442. Class A {
  1443. name = "A"
  1444. }
  1445. """)
  1446. # Test delete of a "hidden" element
  1447. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": "A", "abstract": None}]
  1448. ID = [i for i in element_list("users/user/test/d") if i[1] == "Class_name"][0][0]
  1449. assert delete_element("users/user/test/d", ID) == None
  1450. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1451. # Non-existing model
  1452. try:
  1453. delete_element("users/afa", "Association")
  1454. self.fail()
  1455. except UnknownModel:
  1456. pass
  1457. # Non-existing element
  1458. before = element_list("users/user/test/a")
  1459. try:
  1460. delete_element("users/user/test/a", "AAAAAAA")
  1461. self.fail()
  1462. except UnknownElement:
  1463. assert element_list("users/user/test/a") == before
  1464. # No read permissions
  1465. try:
  1466. delete_element("administration/core", "formalisms")
  1467. self.fail()
  1468. except ReadPermissionDenied:
  1469. pass
  1470. # No write permissions
  1471. before = element_list("formalisms/SimpleClassDiagrams")
  1472. try:
  1473. delete_element("formalisms/SimpleClassDiagrams", "Class")
  1474. self.fail()
  1475. except WritePermissionDenied:
  1476. assert element_list("formalisms/SimpleClassDiagrams") == before
  1477. # Give garbage
  1478. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1479. try:
  1480. delete_element("users/user/test/d", ('abc', 'def'))
  1481. except UnknownElement:
  1482. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1483. def test_op_AL_text(self):
  1484. # Test normal situation with code provided by assignment
  1485. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  1486. Class A {}
  1487. """)
  1488. attr_assign_code("users/user/test/b", "A", "constraint", """
  1489. String function main(value : Element):
  1490. return "OK"!
  1491. """)
  1492. assert AL_text(read_attrs("users/user/test/b", "A")["constraint"]["AL"]).strip() == """
  1493. String function main(value : Element):
  1494. return "OK"!
  1495. """.strip()
  1496. # Test normal situation with code provided by HUTN parser (model)
  1497. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1498. Class A {
  1499. constraint = $
  1500. String function main(value : Element):
  1501. return "OK"!
  1502. $
  1503. }
  1504. """)
  1505. assert AL_text(read_attrs("users/user/test/a", "A")["constraint"]["AL"]).strip() == 'String function main(value : Element):\n\treturn "OK"!'
  1506. # Test AL_text on non-existing location
  1507. try:
  1508. AL_text("abc")
  1509. self.fail()
  1510. except UnknownLocation:
  1511. pass
  1512. # No permissions on locations directly, so there are no checks that have to be done
  1513. def test_op_read_outgoing(self):
  1514. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1515. SimpleAttribute String {}
  1516. Class A {
  1517. name : String
  1518. }
  1519. Class B {}
  1520. Association C (A, B) {}
  1521. Association D (C, B) {}
  1522. """)
  1523. # Test normal operation
  1524. assert read_outgoing("users/user/test/a", "A", "Association") == set(["C"])
  1525. assert read_outgoing("users/user/test/a", "A", "AttributeLink") == set(["A_name"])
  1526. # Test wildcard
  1527. assert read_outgoing("users/user/test/a", "A", "") == set(["A_name", "C"])
  1528. # Test association on association
  1529. assert read_outgoing("users/user/test/a", "C", "") == set(["D"])
  1530. # Test empty result
  1531. assert read_outgoing("users/user/test/a", "B", "") == set([])
  1532. # Test simpleattribute
  1533. assert read_outgoing("users/user/test/a", "String", "") == set([])
  1534. # Non-existing model
  1535. try:
  1536. read_outgoing("users/afa", "Association", "")
  1537. self.fail()
  1538. except UnknownModel:
  1539. pass
  1540. # Non-existing element
  1541. before = element_list("users/user/test/a")
  1542. try:
  1543. read_outgoing("users/user/test/a", "AAAAAAA", "")
  1544. self.fail()
  1545. except UnknownElement:
  1546. assert element_list("users/user/test/a") == before
  1547. # Non-existing type
  1548. before = element_list("users/user/test/a")
  1549. try:
  1550. read_outgoing("users/user/test/a", "A", "AAAAAAA")
  1551. self.fail()
  1552. except UnknownElement:
  1553. assert element_list("users/user/test/a") == before
  1554. # No read permissions
  1555. try:
  1556. read_outgoing("administration/core", "formalisms", "")
  1557. self.fail()
  1558. except ReadPermissionDenied:
  1559. pass
  1560. # No write permissions, but can query
  1561. assert type(read_outgoing("formalisms/SimpleClassDiagrams", "Class", "")) == type(set())
  1562. def test_op_read_incoming(self):
  1563. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1564. SimpleAttribute String {}
  1565. Class A {
  1566. name : String
  1567. }
  1568. Class B {}
  1569. Association C (A, B) {}
  1570. Association E (A, A) {}
  1571. Association D (C, B) {}
  1572. Association F (D, E) {}
  1573. """)
  1574. # Test normal operation
  1575. assert read_incoming("users/user/test/a", "B", "Association") == set(["C", "D"])
  1576. # Test wildcard
  1577. assert read_incoming("users/user/test/a", "B", "") == set(["C", "D"])
  1578. # Test association on association
  1579. assert read_incoming("users/user/test/a", "E", "") == set(["F"])
  1580. # Test double result
  1581. assert read_incoming("users/user/test/a", "A", "") == set(["E"])
  1582. # Test simpleattribute
  1583. assert read_incoming("users/user/test/a", "String", "") == set(["A_name"])
  1584. # Test empty result
  1585. assert read_incoming("users/user/test/a", "F", "") == set([])
  1586. # Non-existing model
  1587. try:
  1588. read_incoming("users/afa", "Association", "")
  1589. self.fail()
  1590. except UnknownModel:
  1591. pass
  1592. # Non-existing element
  1593. before = element_list("users/user/test/a")
  1594. try:
  1595. read_incoming("users/user/test/a", "AAAAAAA", "")
  1596. self.fail()
  1597. except UnknownElement:
  1598. assert element_list("users/user/test/a") == before
  1599. # Non-existing type
  1600. before = element_list("users/user/test/a")
  1601. try:
  1602. read_incoming("users/user/test/a", "A", "AAAAAAA")
  1603. self.fail()
  1604. except UnknownElement:
  1605. assert element_list("users/user/test/a") == before
  1606. # No read permissions
  1607. try:
  1608. read_incoming("administration/core", "formalisms", "")
  1609. self.fail()
  1610. except ReadPermissionDenied:
  1611. pass
  1612. # No write permissions, but can query
  1613. assert type(read_incoming("formalisms/SimpleClassDiagrams", "Class", "")) == type(set())
  1614. def test_op_read_association_source(self):
  1615. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1616. SimpleAttribute String {}
  1617. Class A {
  1618. name : String
  1619. }
  1620. Class B {}
  1621. Association C (A, B) {}
  1622. Association E (A, A) {}
  1623. Association D (C, B) {}
  1624. Association F (D, E) {}
  1625. """)
  1626. # Test normal operation
  1627. assert read_association_source("users/user/test/a", "C") == "A"
  1628. # Test association on association
  1629. assert read_association_source("users/user/test/a", "D") == "C"
  1630. # Test node
  1631. try:
  1632. assert read_association_source("users/user/test/a", "A")
  1633. self.fail()
  1634. except NotAnAssociation:
  1635. pass
  1636. # Non-existing model
  1637. try:
  1638. read_association_source("users/afa", "Association")
  1639. self.fail()
  1640. except UnknownModel:
  1641. pass
  1642. # Non-existing element
  1643. before = element_list("users/user/test/a")
  1644. try:
  1645. read_association_source("users/user/test/a", "AAAAAAA")
  1646. self.fail()
  1647. except UnknownElement:
  1648. assert element_list("users/user/test/a") == before
  1649. # No read permissions
  1650. try:
  1651. read_association_source("administration/core", "formalisms")
  1652. self.fail()
  1653. except ReadPermissionDenied:
  1654. pass
  1655. # No write permissions, but can query
  1656. assert read_association_source("formalisms/SimpleClassDiagrams", "Association") == "Class"
  1657. def test_op_read_association_destination(self):
  1658. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1659. SimpleAttribute String {}
  1660. Class A {
  1661. name : String
  1662. }
  1663. Class B {}
  1664. Association C (A, B) {}
  1665. Association E (A, A) {}
  1666. Association D (C, B) {}
  1667. Association F (D, E) {}
  1668. """)
  1669. # Test normal operation
  1670. assert read_association_destination("users/user/test/a", "C") == "B"
  1671. # Test association on association
  1672. assert read_association_destination("users/user/test/a", "F") == "E"
  1673. # Test node
  1674. try:
  1675. assert read_association_destination("users/user/test/a", "A")
  1676. self.fail()
  1677. except NotAnAssociation:
  1678. pass
  1679. # Non-existing model
  1680. try:
  1681. read_association_destination("users/afa", "Association")
  1682. self.fail()
  1683. except UnknownModel:
  1684. pass
  1685. # Non-existing element
  1686. before = element_list("users/user/test/a")
  1687. try:
  1688. read_association_destination("users/user/test/a", "AAAAAAA")
  1689. self.fail()
  1690. except UnknownElement:
  1691. assert element_list("users/user/test/a") == before
  1692. # No read permissions
  1693. try:
  1694. read_association_destination("administration/core", "formalisms")
  1695. self.fail()
  1696. except ReadPermissionDenied:
  1697. pass
  1698. # No write permissions, but can query
  1699. assert read_association_destination("formalisms/SimpleClassDiagrams", "Association") == "Class"
  1700. def test_op_connections_between(self):
  1701. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1702. SimpleAttribute String {}
  1703. Class A {
  1704. name1 : String
  1705. name2 : String
  1706. }
  1707. Class B {}
  1708. Association C (A, B) {}
  1709. Association D (A, B) {}
  1710. Association E (A, A) {}
  1711. Association F (C, B) {}
  1712. Association G (E, F) {}
  1713. """)
  1714. # Test normal operation
  1715. assert connections_between("users/user/test/a", "A", "A") == set(["Association", "Inheritance"])
  1716. assert connections_between("users/user/test/a", "A", "B") == set(["Association", "Inheritance"])
  1717. assert connections_between("users/user/test/a", "A", "C") == set(["Association", "Inheritance"])
  1718. # Test none allowed
  1719. assert connections_between("users/user/test/a", "A_name1", "A_name2") == set([])
  1720. # Non-existing model
  1721. try:
  1722. connections_between("users/afa", "A", "B")
  1723. self.fail()
  1724. except UnknownModel:
  1725. pass
  1726. # Non-existing element (1)
  1727. before = element_list("users/user/test/a")
  1728. try:
  1729. connections_between("users/user/test/a", "AA", "B")
  1730. self.fail()
  1731. except UnknownElement:
  1732. assert element_list("users/user/test/a") == before
  1733. # Non-existing element (2)
  1734. before = element_list("users/user/test/a")
  1735. try:
  1736. connections_between("users/user/test/a", "A", "BB")
  1737. self.fail()
  1738. except UnknownElement:
  1739. assert element_list("users/user/test/a") == before
  1740. # No read permissions
  1741. try:
  1742. connections_between("administration/core", "formalisms", "formalisms")
  1743. self.fail()
  1744. except ReadPermissionDenied:
  1745. pass
  1746. # No write permissions, but can query
  1747. assert connections_between("formalisms/SimpleClassDiagrams", "Association", "Association") == set(["Association", "Inheritance"])
  1748. def test_op_define_attribute(self):
  1749. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1750. SimpleAttribute String {}
  1751. SimpleAttribute Natural {}
  1752. Class A {}
  1753. Class B {}
  1754. Association C (A, B) {}
  1755. Association D (C, A) {}
  1756. """)
  1757. assert read_defined_attrs("users/user/test/a", "A") == ({}, {})
  1758. # Test normal operation
  1759. define_attribute("users/user/test/a", "A", "my_attr", "String")
  1760. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String"}, {})
  1761. # Test second attribute of same type
  1762. define_attribute("users/user/test/a", "A", "my_second_attr", "String")
  1763. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String", "my_second_attr": "String"}, {})
  1764. # Test third attribute with different type
  1765. define_attribute("users/user/test/a", "A", "a_third_one", "Natural")
  1766. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String", "my_second_attr": "String", "a_third_one": "Natural"}, {})
  1767. # Test same on associations
  1768. define_attribute("users/user/test/a", "C", "my_attr", "String")
  1769. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String"}, {})
  1770. # Test second attribute of same type
  1771. define_attribute("users/user/test/a", "C", "my_second_attr", "String")
  1772. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String", "my_second_attr": "String"}, {})
  1773. # Test third attribute with different type
  1774. define_attribute("users/user/test/a", "C", "a_third_one", "Natural")
  1775. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String", "my_second_attr": "String", "a_third_one": "Natural"}, {})
  1776. # Non-existing model
  1777. try:
  1778. define_attribute("users/afa", "A", "B", "C")
  1779. self.fail()
  1780. except UnknownModel:
  1781. pass
  1782. # Non-existing element (1)
  1783. before = element_list("users/user/test/a")
  1784. try:
  1785. define_attribute("users/user/test/a", "AA", "B", "Natural")
  1786. self.fail()
  1787. except UnknownElement:
  1788. assert element_list("users/user/test/a") == before
  1789. # Non-existing element (2)
  1790. before = element_list("users/user/test/a")
  1791. try:
  1792. define_attribute("users/user/test/a", "A", "B", "Natural2")
  1793. self.fail()
  1794. except UnknownElement:
  1795. assert element_list("users/user/test/a") == before
  1796. # Attribute exists
  1797. before = element_list("users/user/test/a")
  1798. try:
  1799. define_attribute("users/user/test/a", "A", "my_attr", "Natural")
  1800. self.fail()
  1801. except AttributeExists:
  1802. assert element_list("users/user/test/a") == before
  1803. # No read permissions
  1804. before = element_list("users/user/test/a")
  1805. try:
  1806. define_attribute("administration/core", "formalisms", "name", "A")
  1807. self.fail()
  1808. except ReadPermissionDenied:
  1809. assert element_list("users/user/test/a") == before
  1810. # No write permissions
  1811. before = element_list("users/user/test/a")
  1812. try:
  1813. define_attribute("formalisms/SimpleClassDiagrams", "Association", "new_name", "String")
  1814. self.fail()
  1815. except WritePermissionDenied:
  1816. assert element_list("users/user/test/a") == before
  1817. # None defined in non-SCD model
  1818. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  1819. try:
  1820. define_attribute("users/user/test/b", "a", "abc", "a")
  1821. self.fail()
  1822. except NoSimpleClassDiagramsModel:
  1823. pass
  1824. def test_op_read_defined_attrs(self):
  1825. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1826. SimpleAttribute String {}
  1827. SimpleAttribute Natural {}
  1828. Class A {
  1829. name = "ABC"
  1830. value : Natural
  1831. new_name ?: String
  1832. name : String
  1833. }
  1834. Association B (A, A) {
  1835. name = "DEF"
  1836. edge_value : Natural
  1837. name : String
  1838. other_value ?: String
  1839. }
  1840. Class C {}
  1841. Class D : A {
  1842. additional_attr : Natural
  1843. }
  1844. Association E : B (D, A) {
  1845. next_attr : String
  1846. }
  1847. """)
  1848. # Normal operation
  1849. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  1850. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  1851. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  1852. # Works with inheritance
  1853. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  1854. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  1855. # Non-existing model
  1856. try:
  1857. read_defined_attrs("users/afa", "A")
  1858. self.fail()
  1859. except UnknownModel:
  1860. pass
  1861. # Non-existing element
  1862. before = element_list("users/user/test/a")
  1863. try:
  1864. read_defined_attrs("users/user/test/a", "AA")
  1865. self.fail()
  1866. except UnknownElement:
  1867. assert element_list("users/user/test/a") == before
  1868. # No read permissions
  1869. before = element_list("users/user/test/a")
  1870. try:
  1871. read_defined_attrs("administration/core", "formalisms")
  1872. self.fail()
  1873. except ReadPermissionDenied:
  1874. assert element_list("users/user/test/a") == before
  1875. # No write permissions, but can still query
  1876. assert read_defined_attrs("formalisms/SimpleClassDiagrams", "Association") == ({"name": "String"}, {"abstract": "Boolean", "constraint": "ActionCode", "lower_cardinality": "Natural", "upper_cardinality": "Natural", "source_lower_cardinality": "Natural", "source_upper_cardinality": "Natural", "target_lower_cardinality": "Natural", "target_upper_cardinality": "Natural"})
  1877. # None defined in non-SCD model
  1878. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  1879. try:
  1880. read_defined_attrs("users/user/test/b", "a")
  1881. self.fail()
  1882. except NoSimpleClassDiagramsModel:
  1883. pass
  1884. def test_op_undefine_attribute(self):
  1885. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1886. SimpleAttribute String {}
  1887. SimpleAttribute Natural {}
  1888. Class A {
  1889. name = "ABC"
  1890. value : Natural
  1891. new_name ?: String
  1892. name : String
  1893. }
  1894. Association B (A, A) {
  1895. name = "DEF"
  1896. edge_value : Natural
  1897. name : String
  1898. other_value ?: String
  1899. }
  1900. Class C {}
  1901. Class D : A {
  1902. additional_attr : Natural
  1903. }
  1904. Association E : B (D, A) {
  1905. next_attr : String
  1906. }
  1907. """)
  1908. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  1909. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  1910. undefine_attribute("users/user/test/a", "A", "name")
  1911. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural"}, {"new_name": "String"})
  1912. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1913. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  1914. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  1915. undefine_attribute("users/user/test/a", "B", "other_value")
  1916. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {})
  1917. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {})
  1918. # Remove superclass definition
  1919. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1920. try:
  1921. undefine_attribute("users/user/test/a", "D", "value")
  1922. self.fail()
  1923. except SuperclassAttribute:
  1924. pass
  1925. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1926. # Non-existing model
  1927. try:
  1928. undefine_attribute("users/afa", "A", "B")
  1929. self.fail()
  1930. except UnknownModel:
  1931. pass
  1932. # Non-existing element
  1933. before = read_defined_attrs("users/user/test/a", "A")
  1934. try:
  1935. undefine_attribute("users/user/test/a", "AA", "B")
  1936. self.fail()
  1937. except UnknownElement:
  1938. assert read_defined_attrs("users/user/test/a", "A") == before
  1939. # Non-existing attribute
  1940. before = read_defined_attrs("users/user/test/a", "A")
  1941. try:
  1942. undefine_attribute("users/user/test/a", "A", "adfadf")
  1943. self.fail()
  1944. except UnknownAttribute:
  1945. assert read_defined_attrs("users/user/test/a", "A") == before
  1946. # No read permissions
  1947. try:
  1948. undefine_attribute("administration/core", "formalisms", "name")
  1949. self.fail()
  1950. except ReadPermissionDenied:
  1951. pass
  1952. # No write permissions
  1953. before = read_defined_attrs("formalisms/SimpleClassDiagrams", "Class")
  1954. try:
  1955. undefine_attribute("formalisms/SimpleClassDiagrams", "Class", "name")
  1956. self.fail()
  1957. except WritePermissionDenied:
  1958. assert read_defined_attrs("formalisms/SimpleClassDiagrams", "Class") == before
  1959. def test_op_attribute_optional(self):
  1960. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1961. SimpleAttribute String {}
  1962. SimpleAttribute Natural {}
  1963. Class A {
  1964. name = "ABC"
  1965. value : Natural
  1966. new_name ?: String
  1967. name : String
  1968. }
  1969. Association B (A, A) {
  1970. name = "DEF"
  1971. edge_value : Natural
  1972. name : String
  1973. other_value ?: String
  1974. }
  1975. Class C {}
  1976. Class D : A {
  1977. additional_attr : Natural
  1978. }
  1979. Association E : B (D, A) {
  1980. next_attr : String
  1981. }
  1982. """)
  1983. # Check initial situation
  1984. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  1985. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  1986. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  1987. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  1988. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  1989. # mandatory -> optional
  1990. attribute_optional("users/user/test/a", "A", "value", True)
  1991. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String"}, {"new_name": "String", "value": "Natural"})
  1992. # Check inheritance as well
  1993. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural"}, {"new_name": "String", "value": "Natural"})
  1994. # optional -> mandatory
  1995. attribute_optional("users/user/test/a", "A", "new_name", False)
  1996. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  1997. # Check inheritance as well
  1998. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  1999. # mandatory -> mandatory
  2000. attribute_optional("users/user/test/a", "A", "new_name", False)
  2001. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  2002. # Check inheritance as well
  2003. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  2004. # optional -> optional
  2005. attribute_optional("users/user/test/a", "A", "value", True)
  2006. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  2007. # Check inheritance as well
  2008. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  2009. # Non-existing model
  2010. try:
  2011. attribute_optional("users/afa", "A", "value", False)
  2012. self.fail()
  2013. except UnknownModel:
  2014. pass
  2015. # Non-existing element
  2016. before = element_list("users/user/test/a")
  2017. try:
  2018. attribute_optional("users/user/test/a", "AA", "value", False)
  2019. self.fail()
  2020. except UnknownElement:
  2021. assert element_list("users/user/test/a") == before
  2022. # No read permissions
  2023. try:
  2024. attribute_optional("administration/core", "formalisms", "name", True)
  2025. self.fail()
  2026. except ReadPermissionDenied:
  2027. pass
  2028. # No write permissions, but can still query
  2029. before = element_list("formalisms/SimpleClassDiagrams")
  2030. try:
  2031. attribute_optional("formalisms/SimpleClassDiagrams", "Class", "name", True)
  2032. self.fail()
  2033. except WritePermissionDenied:
  2034. assert element_list("formalisms/SimpleClassDiagrams") == before
  2035. # None defined in non-SCD model
  2036. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  2037. try:
  2038. attribute_optional("users/user/test/b", "a", "b", False)
  2039. self.fail()
  2040. except NoSimpleClassDiagramsModel:
  2041. pass
  2042. def test_op_attribute_type(self):
  2043. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2044. SimpleAttribute String {}
  2045. SimpleAttribute Natural {}
  2046. Class A {
  2047. name = "ABC"
  2048. value : Natural
  2049. new_name ?: String
  2050. name : String
  2051. }
  2052. Association B (A, A) {
  2053. name = "DEF"
  2054. edge_value : Natural
  2055. name : String
  2056. other_value ?: String
  2057. }
  2058. Class C {}
  2059. Class D : A {
  2060. additional_attr : Natural
  2061. }
  2062. Association E : B (D, A) {
  2063. next_attr : String
  2064. }
  2065. """)
  2066. # Check initial situation
  2067. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  2068. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  2069. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  2070. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2071. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  2072. # Change type of node
  2073. attribute_type("users/user/test/a", "A", "value", "String")
  2074. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "String", "name": "String"}, {"new_name": "String"})
  2075. # Check inheritance as well
  2076. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "String", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2077. # Change type of edge
  2078. attribute_type("users/user/test/a", "B", "name", "Natural")
  2079. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "Natural"}, {"other_value": "String"})
  2080. # Check inheritance as well
  2081. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "Natural", "next_attr": "String"}, {"other_value": "String"})
  2082. # Non-existing model
  2083. try:
  2084. attribute_type("users/afa", "A", "value", "String")
  2085. self.fail()
  2086. except UnknownModel:
  2087. pass
  2088. # Non-existing element
  2089. before = element_list("users/user/test/a")
  2090. try:
  2091. attribute_type("users/user/test/a", "AA", "value", "String")
  2092. self.fail()
  2093. except UnknownElement:
  2094. assert element_list("users/user/test/a") == before
  2095. # Non-existing type
  2096. before = element_list("users/user/test/a")
  2097. try:
  2098. attribute_type("users/user/test/a", "A", "value", "SSS")
  2099. self.fail()
  2100. except UnknownElement:
  2101. assert element_list("users/user/test/a") == before
  2102. # No read permissions
  2103. try:
  2104. attribute_type("administration/core", "formalisms", "name", "Natural")
  2105. self.fail()
  2106. except ReadPermissionDenied:
  2107. pass
  2108. # No write permissions, but can still query
  2109. before = element_list("formalisms/SimpleClassDiagrams")
  2110. try:
  2111. attribute_type("formalisms/SimpleClassDiagrams", "Class", "name", "Natural")
  2112. self.fail()
  2113. except WritePermissionDenied:
  2114. assert element_list("formalisms/SimpleClassDiagrams") == before
  2115. # None defined in non-SCD model
  2116. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  2117. try:
  2118. attribute_type("users/user/test/b", "a", "b", "a")
  2119. self.fail()
  2120. except NoSimpleClassDiagramsModel:
  2121. pass
  2122. def test_op_attribute_name(self):
  2123. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2124. SimpleAttribute String {}
  2125. SimpleAttribute Natural {}
  2126. Class A {
  2127. name = "ABC"
  2128. value : Natural
  2129. new_name ?: String
  2130. name : String
  2131. }
  2132. Association B (A, A) {
  2133. name = "DEF"
  2134. edge_value : Natural
  2135. name : String
  2136. other_value ?: String
  2137. }
  2138. Class C {}
  2139. Class D : A {
  2140. additional_attr : Natural
  2141. }
  2142. Association E : B (D, A) {
  2143. next_attr : String
  2144. }
  2145. """)
  2146. # Check initial situation
  2147. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  2148. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  2149. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  2150. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2151. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  2152. # Change name of node
  2153. attribute_name("users/user/test/a", "A", "value", "new_value")
  2154. assert read_defined_attrs("users/user/test/a", "A") == ({"new_value": "Natural", "name": "String"}, {"new_name": "String"})
  2155. # Check inheritance as well
  2156. assert read_defined_attrs("users/user/test/a", "D") == ({"new_value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2157. # Change name of edge
  2158. attribute_name("users/user/test/a", "B", "name", "other_name")
  2159. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "other_name": "String"}, {"other_value": "String"})
  2160. # Check inheritance as well
  2161. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "other_name": "String", "next_attr": "String"}, {"other_value": "String"})
  2162. # Non-existing model
  2163. try:
  2164. attribute_name("users/afa", "A", "value", "str")
  2165. self.fail()
  2166. except UnknownModel:
  2167. pass
  2168. # Non-existing element
  2169. before = element_list("users/user/test/a")
  2170. try:
  2171. attribute_name("users/user/test/a", "AA", "value", "val2")
  2172. self.fail()
  2173. except UnknownElement:
  2174. assert element_list("users/user/test/a") == before
  2175. # Pre-existing name
  2176. before = element_list("users/user/test/a")
  2177. try:
  2178. attribute_name("users/user/test/a", "A", "new_value", "name")
  2179. self.fail()
  2180. except AttributeExists:
  2181. assert element_list("users/user/test/a") == before
  2182. # No read permissions
  2183. try:
  2184. attribute_name("administration/core", "formalisms", "name", "natural")
  2185. self.fail()
  2186. except ReadPermissionDenied:
  2187. pass
  2188. # No write permissions, but can still query
  2189. before = element_list("formalisms/SimpleClassDiagrams")
  2190. try:
  2191. attribute_name("formalisms/SimpleClassDiagrams", "Class", "name", "value")
  2192. self.fail()
  2193. except WritePermissionDenied:
  2194. assert element_list("formalisms/SimpleClassDiagrams") == before
  2195. # None defined in non-SCD model
  2196. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  2197. try:
  2198. attribute_name("users/user/test/b", "a", "b", "c")
  2199. self.fail()
  2200. except NoSimpleClassDiagramsModel:
  2201. pass
  2202. def test_op_group_create(self):
  2203. # Test normal operation
  2204. group_name_1 = "new_group"
  2205. group_name_2 = "group2"
  2206. group_name_3 = "other_group"
  2207. group_name_4 = "second_group"
  2208. assert group_list() == set([])
  2209. group_create(group_name_1)
  2210. assert group_list() == set([(group_name_1, True)])
  2211. # Test second group
  2212. assert group_list() == set([(group_name_1, True)])
  2213. group_create(group_name_2)
  2214. assert group_list() == set([(group_name_1, True), (group_name_2, True)])
  2215. # Test other groups
  2216. self.do_as_user("user2", group_create, [group_name_3])
  2217. self.do_as_user("user2", group_create, [group_name_4])
  2218. assert group_list() == set([(group_name_1, True), (group_name_2, True)])
  2219. # Test non-admin groups
  2220. self.do_as_user("user2", group_join, [group_name_3, "user"])
  2221. assert group_list() == set([(group_name_1, True), (group_name_2, True), (group_name_3, False)])
  2222. # Test create of existing group (member)
  2223. before = group_list()
  2224. try:
  2225. group_create(group_name_1)
  2226. self.fail()
  2227. except GroupExists:
  2228. assert group_list() == before
  2229. # Test create of existing group (non-member)
  2230. before = group_list()
  2231. try:
  2232. group_create(group_name_4)
  2233. self.fail()
  2234. except GroupExists:
  2235. assert group_list() == before
  2236. # Delete all groups again
  2237. self.do_as_user("admin", group_delete, [group_name_1])
  2238. self.do_as_user("admin", group_delete, [group_name_2])
  2239. self.do_as_user("admin", group_delete, [group_name_3])
  2240. self.do_as_user("admin", group_delete, [group_name_4])
  2241. def test_op_group_delete(self):
  2242. group_name_1 = "new_group" # Group with admin permissions
  2243. group_name_2 = "group2" # Group without permissions
  2244. group_name_3 = "other_group" # No member
  2245. group_name_4 = "second_group" # Non-existing group
  2246. # Ensure user2 exists
  2247. self.do_as_user("user2", lambda : 1, [])
  2248. # Create some groups first
  2249. group_create(group_name_1)
  2250. self.do_as_user("admin", group_create, [group_name_2])
  2251. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2252. self.do_as_user("admin", group_create, [group_name_3])
  2253. # Try to delete all
  2254. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2255. group_delete(group_name_1)
  2256. assert group_list() == set([(group_name_2, False)])
  2257. # Remove group that we don't own
  2258. try:
  2259. group_delete(group_name_2)
  2260. self.fail()
  2261. except GroupPermissionDenied:
  2262. assert group_list() == set([(group_name_2, False)])
  2263. # Remove group that we are not even member of
  2264. try:
  2265. group_delete(group_name_3)
  2266. self.fail()
  2267. except GroupPermissionDenied:
  2268. assert group_list() == set([(group_name_2, False)])
  2269. # Remove non-existing group
  2270. try:
  2271. group_delete(group_name_4)
  2272. except UnknownGroup:
  2273. assert group_list() == set([(group_name_2, False)])
  2274. # Test if other users can no longer see removed groups
  2275. group_create(group_name_1)
  2276. group_join(group_name_1, "user2")
  2277. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2278. group_delete(group_name_1)
  2279. assert self.do_as_user("user2", group_list, []) == set([])
  2280. # Delete all groups again
  2281. self.do_as_user("admin", group_delete, [group_name_2])
  2282. self.do_as_user("admin", group_delete, [group_name_3])
  2283. def test_op_group_list(self):
  2284. group_name_1 = "new_group" # Group with admin permissions
  2285. group_name_2 = "group2" # Group without permissions
  2286. group_name_3 = "other_group" # No member
  2287. group_name_4 = "second_group" # Non-existing group
  2288. # Ensure user2 exists
  2289. self.do_as_user("user2", lambda : 1, [])
  2290. # Create some groups first
  2291. group_create(group_name_1)
  2292. self.do_as_user("admin", group_create, [group_name_2])
  2293. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2294. self.do_as_user("admin", group_create, [group_name_3])
  2295. # Assure that groups of all users are correct
  2296. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2297. assert self.do_as_user("user2", group_list, []) == set([])
  2298. assert self.do_as_user("admin", group_list, []) == set([("admin", False), (group_name_2, True), (group_name_3, True)])
  2299. # Delete a group to check that everything is correctly listed afterwards
  2300. self.do_as_user("admin", group_delete, [group_name_2])
  2301. assert group_list() == set([(group_name_1, True)])
  2302. assert self.do_as_user("user2", group_list, []) == set([])
  2303. assert self.do_as_user("admin", group_list, []) == set([("admin", False), (group_name_3, True)])
  2304. # Delete all groups again
  2305. self.do_as_user("admin", group_delete, [group_name_1])
  2306. self.do_as_user("admin", group_delete, [group_name_3])
  2307. def do_as_user(self, username, operation, args):
  2308. user_logout()
  2309. login(username, username)
  2310. try:
  2311. result = operation(*args)
  2312. except:
  2313. user_logout()
  2314. login("user", "user")
  2315. raise
  2316. else:
  2317. user_logout()
  2318. login("user", "user")
  2319. return result
  2320. def test_op_group_join(self):
  2321. group_name_1 = "new_group" # Group with admin permissions
  2322. group_name_2 = "group2" # Group without permissions
  2323. group_name_3 = "other_group" # No member
  2324. group_name_4 = "second_group" # Non-existing group
  2325. # Ensure user2 exists
  2326. self.do_as_user("user2", lambda : 1, [])
  2327. # Create some groups first
  2328. group_create(group_name_1)
  2329. self.do_as_user("admin", group_create, [group_name_2])
  2330. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2331. self.do_as_user("admin", group_create, [group_name_3])
  2332. # Test for group join basic use, of group where we are admin
  2333. assert group_join(group_name_1, "user2") == None
  2334. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2335. # Test for group join of group where we are no admin
  2336. try:
  2337. group_join(group_name_2, "user2") == None
  2338. self.fail()
  2339. except GroupPermissionDenied:
  2340. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2341. # Test for group join of group where we are not even a member
  2342. try:
  2343. group_join(group_name_3, "user2") == None
  2344. self.fail()
  2345. except GroupPermissionDenied:
  2346. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2347. # Test for group join of group that already has user as member
  2348. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2349. try:
  2350. group_join(group_name_1, "user2") == None
  2351. self.fail()
  2352. except UserExists:
  2353. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2354. # Test for group join of non-existing user
  2355. try:
  2356. group_join(group_name_1, "user123") == None
  2357. self.fail()
  2358. except UnknownUser:
  2359. pass
  2360. # Test for group join of non-existing group
  2361. try:
  2362. group_join(group_name_4, "user2") == None
  2363. self.fail()
  2364. except UnknownGroup:
  2365. pass
  2366. # Delete all groups again
  2367. self.do_as_user("admin", group_delete, [group_name_1])
  2368. self.do_as_user("admin", group_delete, [group_name_2])
  2369. self.do_as_user("admin", group_delete, [group_name_3])
  2370. def test_op_group_kick(self):
  2371. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2372. group_name_1 = "new_group" # Group with admin permissions
  2373. group_name_2 = "group2" # Group without permissions
  2374. group_name_3 = "other_group" # No member
  2375. group_name_4 = "second_group" # Non-existing group
  2376. # Ensure user2 exists
  2377. self.do_as_user("user2", lambda : 1, [])
  2378. # Create some groups first
  2379. group_create(group_name_1)
  2380. self.do_as_user("admin", group_create, [group_name_2])
  2381. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2382. # Kick user from group
  2383. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2384. self.do_as_user("admin", group_kick, [group_name_2, "user"])
  2385. assert group_list() == set([(group_name_1, True)])
  2386. # Kick self (owner) from group
  2387. assert group_list() == set([(group_name_1, True)])
  2388. group_create(group_name_3)
  2389. assert group_list() == set([(group_name_1, True), (group_name_3, True)])
  2390. assert group_kick(group_name_3, "user") == None
  2391. assert group_list() == set([(group_name_1, True)])
  2392. # Empty groups are not deleted
  2393. self.do_as_user("admin", group_join, [group_name_3, "user"])
  2394. # Kick user not in group
  2395. try:
  2396. self.do_as_user("admin", group_kick, [group_name_2, "user2"])
  2397. self.fail()
  2398. except UserNotInGroup:
  2399. pass
  2400. # Non-existing user
  2401. try:
  2402. group_kick(group_name_1, "adfafd")
  2403. self.fail()
  2404. except UnknownUser:
  2405. pass
  2406. # Non-existing group
  2407. try:
  2408. group_kick("adfadf", "user")
  2409. self.fail()
  2410. except UnknownGroup:
  2411. pass
  2412. # Not admin of group
  2413. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2414. self.do_as_user("admin", group_join, [group_name_2, "user2"])
  2415. assert group_list() == set([(group_name_1, True), (group_name_2, False), (group_name_3, False)])
  2416. assert self.do_as_user("user2", group_list, []) == set([(group_name_2, False)])
  2417. try:
  2418. group_kick(group_name_2, "user2")
  2419. self.fail()
  2420. except GroupPermissionDenied:
  2421. assert self.do_as_user("user2", group_list, []) == set([(group_name_2, False)])
  2422. self.do_as_user("admin", group_delete, [group_name_1])
  2423. self.do_as_user("admin", group_delete, [group_name_2])
  2424. self.do_as_user("admin", group_delete, [group_name_3])
  2425. def do_create_user(self, name):
  2426. self.do_as_user(name, lambda : 1, [])
  2427. def do_test_permission(self, model, expected_permissions):
  2428. for user, permission in expected_permissions.items():
  2429. assert self.do_as_user(user, read_permissions, [model]) == permission
  2430. def test_op_permission_owner_model(self):
  2431. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2432. group_create("users")
  2433. permission_group("users/user/test/a", "users")
  2434. permission_modify("users/user/test/a", "210")
  2435. self.do_create_user("group_user")
  2436. self.do_create_user("other_user")
  2437. group_join("users", "group_user")
  2438. # Test initial situation, where we have owners user:users with permission 210
  2439. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2440. # Change owner, but permissions stay the same
  2441. permission_owner("users/user/test/a", "group_user")
  2442. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2443. # Can no longer modify permissions: only owner can do that
  2444. try:
  2445. permission_owner("users/user/test/a", "admin")
  2446. self.fail()
  2447. except UserPermissionDenied:
  2448. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2449. # Change owner to admin, who always has RW permissions
  2450. self.do_as_user("group_user", permission_owner, ["users/user/test/a", "admin"])
  2451. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "R", "other_user": ""})
  2452. # Give permissions back to someone else, and test that admin can always do operations, even if not owner
  2453. self.do_as_user("admin", permission_owner, ["users/user/test/a", "group_user"])
  2454. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2455. self.do_as_user("admin", permission_owner, ["users/user/test/a", "user"])
  2456. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2457. # Test non-existing model
  2458. try:
  2459. permission_owner("adfadf", "admin")
  2460. self.fail()
  2461. except UnknownModel:
  2462. pass
  2463. # Test non-existing user
  2464. try:
  2465. self.do_as_user("admin", permission_owner, ["users/user/test/a", "dfadf"])
  2466. self.fail()
  2467. except UnknownUser:
  2468. pass
  2469. # Test assign to user who is already owner
  2470. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2471. self.do_as_user("admin", permission_owner, ["users/user/test/a", "user"])
  2472. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2473. group_delete("users")
  2474. def test_op_permission_owner_folder(self):
  2475. folder_create("users/user/test/a/b/c")
  2476. group_create("users")
  2477. self.do_create_user("group_user")
  2478. group_join("users", "group_user")
  2479. permission_group("users/user/test/a/b", "users")
  2480. permission_modify("users/user/test/a/b", "210")
  2481. # Test permissions
  2482. self.do_test_permission("users/user/test/", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2483. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2484. self.do_test_permission("users/user/test/a/b", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2485. self.do_test_permission("users/user/test/a/b/c", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2486. # But test if they are really applicable
  2487. try:
  2488. self.do_as_user("group_user", model_list, ["users/user/test"])
  2489. self.fail()
  2490. except ReadPermissionDenied:
  2491. pass
  2492. try:
  2493. self.do_as_user("group_user", model_list, ["users/user/test/a"])
  2494. self.fail()
  2495. except ReadPermissionDenied:
  2496. pass
  2497. self.do_as_user("group_user", model_list, ["users/user/test/a/b"])
  2498. try:
  2499. self.do_as_user("group_user", model_list, ["users/user/test/a/b/c"])
  2500. self.fail()
  2501. except ReadPermissionDenied:
  2502. pass
  2503. group_delete("users")
  2504. def test_op_read_permissions_model(self):
  2505. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2506. group_create("users")
  2507. self.do_create_user("group_user")
  2508. self.do_create_user("other_user")
  2509. group_join("users", "group_user")
  2510. permission_group("users/user/test/a", "users")
  2511. permission_modify("users/user/test/a", "210")
  2512. # Test all four cases
  2513. assert self.do_as_user("user", read_permissions, ["users/user/test/a"]) == "RW"
  2514. assert self.do_as_user("group_user", read_permissions, ["users/user/test/a"]) == "R"
  2515. assert self.do_as_user("other_user", read_permissions, ["users/user/test/a"]) == ""
  2516. assert self.do_as_user("admin", read_permissions, ["users/user/test/a"]) == "RW"
  2517. # Test same for root location (empty string)
  2518. assert self.do_as_user("user", read_permissions, [""]) == "R"
  2519. assert self.do_as_user("group_user", read_permissions, [""]) == "R"
  2520. assert self.do_as_user("other_user", read_permissions, [""]) == "R"
  2521. assert self.do_as_user("admin", read_permissions, [""]) == "RW"
  2522. # Test for non-existing location
  2523. try:
  2524. read_permissions("adfadsf")
  2525. self.fail()
  2526. except UnknownLocation:
  2527. pass
  2528. group_delete("users")
  2529. def test_op_read_permissions_folder(self):
  2530. folder_create("users/user/test/a")
  2531. group_create("users")
  2532. self.do_create_user("group_user")
  2533. self.do_create_user("other_user")
  2534. group_join("users", "group_user")
  2535. permission_group("users/user/test/a", "users")
  2536. permission_modify("users/user/test/a", "210")
  2537. # Test all four cases
  2538. assert self.do_as_user("user", read_permissions, ["users/user/test/a"]) == "RW"
  2539. assert self.do_as_user("group_user", read_permissions, ["users/user/test/a"]) == "R"
  2540. assert self.do_as_user("other_user", read_permissions, ["users/user/test/a"]) == ""
  2541. assert self.do_as_user("admin", read_permissions, ["users/user/test/a"]) == "RW"
  2542. # Test for non-existing location
  2543. try:
  2544. read_permissions("adfadsf")
  2545. self.fail()
  2546. except UnknownLocation:
  2547. pass
  2548. group_delete("users")
  2549. def test_op_permission_group_model(self):
  2550. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2551. group_create("users")
  2552. group_create("other_group")
  2553. permission_modify("users/user/test/a", "210")
  2554. self.do_create_user("group_user")
  2555. self.do_create_user("other_user")
  2556. group_join("users", "group_user")
  2557. # Test initial situation, where we have owners user:users with permission 210
  2558. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2559. # Change owner, but permissions stay the same
  2560. permission_group("users/user/test/a", "users")
  2561. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2562. # Only owner can modify group permissions
  2563. try:
  2564. self.do_as_user("group_user", permission_group, ["users/user/test/a", "other_group"])
  2565. self.fail()
  2566. except UserPermissionDenied:
  2567. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2568. # Test that admin can always do operations, even if not owner
  2569. # And test that user permissions still override group permissions
  2570. self.do_as_user("admin", permission_group, ["users/user/test/a", "admin"])
  2571. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2572. self.do_as_user("admin", permission_group, ["users/user/test/a", "other_group"])
  2573. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2574. self.do_as_user("admin", permission_group, ["users/user/test/a", "users"])
  2575. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2576. # Test non-existing model
  2577. try:
  2578. permission_group("adfadf", "admin")
  2579. self.fail()
  2580. except UnknownModel:
  2581. pass
  2582. # Test non-existing group
  2583. try:
  2584. self.do_as_user("admin", permission_group, ["users/user/test/a", "dfadf"])
  2585. self.fail()
  2586. except UnknownGroup:
  2587. pass
  2588. # Test assign to group which is already owning group, resulting in no change
  2589. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2590. self.do_as_user("admin", permission_group, ["users/user/test/a", "users"])
  2591. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2592. self.do_as_user("admin", group_delete, ["other_group"])
  2593. self.do_as_user("admin", group_delete, ["users"])
  2594. def test_op_permission_group_folder(self):
  2595. folder_create("users/user/test/a/b/c")
  2596. group_create("users")
  2597. self.do_create_user("group_user")
  2598. group_join("users", "group_user")
  2599. permission_group("users/user/test/a/b", "users")
  2600. permission_modify("users/user/test/a/b", "210")
  2601. # Test permissions
  2602. self.do_test_permission("users/user/test/", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2603. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2604. self.do_test_permission("users/user/test/a/b", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2605. self.do_test_permission("users/user/test/a/b/c", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2606. # But test if they are really applicable
  2607. try:
  2608. self.do_as_user("group_user", model_list, ["users/user/test"])
  2609. self.fail()
  2610. except ReadPermissionDenied:
  2611. pass
  2612. try:
  2613. self.do_as_user("group_user", model_list, ["users/user/test/a"])
  2614. self.fail()
  2615. except ReadPermissionDenied:
  2616. pass
  2617. self.do_as_user("group_user", model_list, ["users/user/test/a/b"])
  2618. try:
  2619. self.do_as_user("group_user", model_list, ["users/user/test/a/b/c"])
  2620. self.fail()
  2621. except ReadPermissionDenied:
  2622. pass
  2623. group_delete("users")
  2624. def test_op_group_owner_add(self):
  2625. group_create("group1")
  2626. group_create("group2")
  2627. group_create("group3")
  2628. self.do_create_user("new_user")
  2629. group_join("group1", "new_user")
  2630. # Basic use of group owner: promote a user
  2631. assert self.do_as_user("new_user", group_list, []) == set([("group1", False)])
  2632. assert group_owner_add("group1", "new_user") == None
  2633. assert self.do_as_user("new_user", group_list, []) == set([("group1", True)])
  2634. # Or instantaneously make owner, thereby also making a member
  2635. assert self.do_as_user("new_user", group_list, []) == set([("group1", True)])
  2636. assert group_owner_add("group2", "new_user") == None
  2637. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2638. # Test for user that is already an owner
  2639. assert group_owner_add("group1", "new_user") == None
  2640. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2641. # Test non-existing user
  2642. try:
  2643. group_owner_add("group1", "abc")
  2644. self.fail()
  2645. except UnknownUser:
  2646. pass
  2647. # Test non-existing group
  2648. try:
  2649. group_owner_add("group4", "new_user")
  2650. self.fail()
  2651. except UnknownGroup:
  2652. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2653. # Only an owner of the group can do this
  2654. group_owner_delete("group2", "new_user")
  2655. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2656. try:
  2657. self.do_as_user("new_user", group_owner_add, ["group2", "user"])
  2658. self.fail()
  2659. except GroupPermissionDenied:
  2660. pass
  2661. # Also non-members can't modify
  2662. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2663. try:
  2664. self.do_as_user("new_user", group_owner_add, ["group3", "user"])
  2665. self.fail()
  2666. except GroupPermissionDenied:
  2667. pass
  2668. # Delete all groups again
  2669. group_delete("group1")
  2670. group_delete("group2")
  2671. group_delete("group3")
  2672. def test_op_group_owner_delete(self):
  2673. group_create("group1")
  2674. group_create("group2")
  2675. group_create("group3")
  2676. self.do_create_user("new_user")
  2677. group_owner_add("group1", "new_user")
  2678. group_owner_add("group2", "new_user")
  2679. # Basic use: remove owner, but stay a member
  2680. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2681. assert group_owner_delete("group2", "new_user") == None
  2682. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2683. # Test for user that is already not an owner
  2684. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2685. assert group_owner_delete("group2", "new_user") == None
  2686. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2687. # Test for user that is not even a member
  2688. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2689. try:
  2690. group_owner_delete("group3", "new_user")
  2691. self.fail()
  2692. except UserNotInGroup:
  2693. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2694. # Test non-existing user
  2695. try:
  2696. group_owner_delete("group1", "abc")
  2697. self.fail()
  2698. except UnknownUser:
  2699. pass
  2700. # Test non-existing group
  2701. try:
  2702. group_owner_delete("group4", "new_user")
  2703. self.fail()
  2704. except UnknownGroup:
  2705. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2706. # Only an owner of the group can do this
  2707. group_owner_delete("group2", "new_user")
  2708. assert group_list() == set([("group1", True), ("group2", True), ("group3", True)])
  2709. try:
  2710. self.do_as_user("new_user", group_owner_delete, ["group2", "user"])
  2711. self.fail()
  2712. except GroupPermissionDenied:
  2713. assert group_list() == set([("group1", True), ("group2", True), ("group3", True)])
  2714. # Also non-members can't modify
  2715. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2716. try:
  2717. self.do_as_user("new_user", group_owner_delete, ["group3", "user"])
  2718. self.fail()
  2719. except GroupPermissionDenied:
  2720. pass
  2721. # Delete all groups again
  2722. group_delete("group1")
  2723. group_delete("group2")
  2724. group_delete("group3")
  2725. def test_op_conformance_add(self):
  2726. # Add some conformance relations
  2727. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2728. Class A {}
  2729. Class B {}
  2730. Association C (A, B) {}
  2731. """)
  2732. # Add conformance bottom relation
  2733. t = model_types("users/user/test/a")
  2734. assert len(t) == 1
  2735. t = t.pop()
  2736. print(t)
  2737. assert t[0] == "formalisms/SimpleClassDiagrams"
  2738. assert t[1] != None
  2739. assert t[2] == None
  2740. # Check if the type is added, but without any type mapping associated to it
  2741. conformance_add("users/user/test/a", "formalisms/Bottom")
  2742. ts = model_types("users/user/test/a")
  2743. assert len(ts) == 2
  2744. while ts:
  2745. t = ts.pop()
  2746. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2747. if t[0] == "formalisms/SimpleClassDiagrams":
  2748. assert t[1] != None
  2749. elif t[1] == "formalisms/Bottom":
  2750. # Type mapping is empty
  2751. assert t[1] == None
  2752. assert t[2] == None
  2753. # Check if a type mapping is created when model is opened as bottom
  2754. alter_context("users/user/test/a", "formalisms/Bottom")
  2755. element_list("users/user/test/a")
  2756. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2757. ts = model_types("users/user/test/a")
  2758. assert len(ts) == 2
  2759. while ts:
  2760. t = ts.pop()
  2761. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2762. assert t[1] != None
  2763. assert t[2] == None
  2764. # Check if we can add a second one to the same MM
  2765. conformance_add("users/user/test/a", "formalisms/Bottom")
  2766. ts = model_types("users/user/test/a")
  2767. assert len(ts) == 3
  2768. assert ("formalisms/Bottom", None, None) in ts
  2769. found = False
  2770. while ts:
  2771. t = ts.pop()
  2772. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2773. if t[0] == "formalisms/SimpleClassDiagrams":
  2774. assert t[1] != None
  2775. elif t[0] == "formalisms/Bottom":
  2776. # Type mapping is empty
  2777. if t[1] != None:
  2778. found = True
  2779. assert t[2] == None
  2780. assert found
  2781. # Check add of non-existing model
  2782. try:
  2783. conformance_add("users/user/test/b", "formalisms/Bottom")
  2784. self.fail()
  2785. except UnknownModel:
  2786. pass
  2787. # Check add of non-existing metamodel
  2788. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  2789. before = model_types("users/user/test/b")
  2790. try:
  2791. conformance_add("users/user/test/b", "formalisms/Bottom2")
  2792. self.fail()
  2793. except UnknownModel:
  2794. assert model_types("users/user/test/b") == before
  2795. def test_op_conformance_delete(self):
  2796. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2797. Class A {}
  2798. Class B {}
  2799. Association C (A, B) {}
  2800. """)
  2801. # Add conformance bottom relation
  2802. conformance_add("users/user/test/a", "formalisms/Bottom")
  2803. # Verify initial state
  2804. ts = model_types("users/user/test/a")
  2805. assert len(ts) == 2
  2806. while ts:
  2807. t = ts.pop()
  2808. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2809. if t[0] == "formalisms/SimpleClassDiagrams":
  2810. assert t[1] != None
  2811. elif t[1] == "formalisms/Bottom":
  2812. # Type mapping is empty
  2813. assert t[1] == None
  2814. assert t[2] == None
  2815. # Now remove it again
  2816. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2817. ts = model_types("users/user/test/a")
  2818. assert len(ts) == 1
  2819. t = ts.pop()
  2820. assert t[0] == "formalisms/SimpleClassDiagrams"
  2821. assert t[1] != None
  2822. assert t[2] == None
  2823. # Add conformance bottom relation twice
  2824. conformance_add("users/user/test/a", "formalisms/Bottom")
  2825. conformance_add("users/user/test/a", "formalisms/Bottom")
  2826. # Should be there twice, but set flattens it to once
  2827. ts = model_types("users/user/test/a")
  2828. assert len(ts) == 2
  2829. while ts:
  2830. t = ts.pop()
  2831. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2832. if t[0] == "formalisms/SimpleClassDiagrams":
  2833. assert t[1] != None
  2834. elif t[1] == "formalisms/Bottom":
  2835. # Type mapping is empty
  2836. assert t[1] == None
  2837. assert t[2] == None
  2838. # Now remove it (once called, but invoked for all occurences!)
  2839. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2840. ts = model_types("users/user/test/a")
  2841. assert len(ts) == 1
  2842. t = ts.pop()
  2843. assert t[0] == "formalisms/SimpleClassDiagrams"
  2844. assert t[1] != None
  2845. assert t[2] == None
  2846. # Now actually test filtering capabilities
  2847. alter_context("users/user/test/a", "formalisms/Bottom")
  2848. element_list("users/user/test/a")
  2849. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2850. # Model should be there with a type mapping model
  2851. ts = model_types("users/user/test/a")
  2852. assert len(ts) == 2
  2853. while ts:
  2854. t = ts.pop()
  2855. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2856. assert t[1] != None
  2857. assert t[2] == None
  2858. # Add a second bottom relation
  2859. conformance_add("users/user/test/a", "formalisms/Bottom")
  2860. # And remove the one without model, to make sure that it is not a wildcard!
  2861. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2862. ts = model_types("users/user/test/a")
  2863. assert len(ts) == 2
  2864. while ts:
  2865. t = ts.pop()
  2866. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2867. assert t[1] != None
  2868. assert t[2] == None
  2869. # Add again, but now remove the one with type mapping
  2870. conformance_add("users/user/test/a", "formalisms/Bottom")
  2871. # First try one that doesn't match...
  2872. conformance_delete("users/user/test/a", "formalisms/Bottom", "NOTHING")
  2873. ts = model_types("users/user/test/a")
  2874. assert len(ts) == 3
  2875. while ts:
  2876. t = ts.pop()
  2877. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2878. assert t[2] == None
  2879. # Now try one with the actual name
  2880. actual_name = [i for i in model_types("users/user/test/a") if i[0] == "formalisms/Bottom" and i[1] != None][0]
  2881. assert len(model_types("users/user/test/a")) == 3
  2882. conformance_delete("users/user/test/a", "formalisms/SimpleClassDiagrams", actual_name)
  2883. # Nothing removed, because of wrong TM model
  2884. assert len(model_types("users/user/test/a")) == 3
  2885. # Now remove correct one
  2886. conformance_delete("users/user/test/a", "formalisms/Bottom", actual_name)
  2887. ts = model_types("users/user/test/a")
  2888. assert len(ts) == 2
  2889. while ts:
  2890. t = ts.pop()
  2891. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2892. if t[0] == "formalisms/SimpleClassDiagrams":
  2893. assert t[1] != None
  2894. elif t[1] == "formalisms/Bottom":
  2895. # Type mapping is empty
  2896. assert t[1] == None
  2897. assert t[2] == None
  2898. # Check add of non-existing model
  2899. try:
  2900. conformance_add("users/user/test/b", "formalisms/Bottom")
  2901. self.fail()
  2902. except UnknownModel:
  2903. pass
  2904. # Check add of non-existing metamodel
  2905. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  2906. before = model_types("users/user/test/b")
  2907. try:
  2908. conformance_add("users/user/test/b", "formalisms/Bottom2")
  2909. self.fail()
  2910. except UnknownModel:
  2911. assert model_types("users/user/test/b") == before
  2912. """
  2913. def test_op_model_render(self):
  2914. def test_op_transformation_between(self):
  2915. def test_op_transformation_add_MT(self):
  2916. def test_op_transformation_add_AL(self):
  2917. def test_op_transformation_add_MANUAL(self):
  2918. def test_op_transformation_execute_MT(self):
  2919. def test_op_transformation_execute_AL(self):
  2920. def test_op_transformation_execute_MANUAL(self):
  2921. def test_op_transformation_signature(self):
  2922. def test_op_process_signature(self):
  2923. """
  2924. def test_modelling(self):
  2925. # Add a model
  2926. model_add("users/user/test/Empty", "formalisms/SimpleClassDiagrams")
  2927. # Check that it exists
  2928. compare_locations("users/user/test", set(["Empty"]))
  2929. # Check that it conforms
  2930. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  2931. # Check for permissions
  2932. assert model_list_full("users/user/test") == set([(name, "user", "nobody", "221") for name in get_model_list("users/user/test")]) | \
  2933. set([("Empty", "user", "nobody", "200")])
  2934. # Instantiate it further
  2935. model_add("users/user/test/my_empty", "users/user/test/Empty")
  2936. assert verify("users/user/test/my_empty", "users/user/test/Empty") == "OK"
  2937. # Check that it exists
  2938. compare_locations("users/user/test", set(["my_empty", "Empty"]))
  2939. # Check that an instantiate of "A" fails
  2940. try:
  2941. res = instantiate("users/user/test/my_empty", "A")
  2942. assert False
  2943. except UnknownIdentifier:
  2944. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  2945. # Create something in the formalism
  2946. instantiate("users/user/test/Empty", "Class", ID="A")
  2947. attr_assign("users/user/test/Empty", "A", "name", "A")
  2948. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  2949. # Now instantiate that in the model as well, which now works
  2950. instantiate("users/user/test/my_empty", "A")
  2951. assert verify("users/user/test/my_empty", "users/user/test/Empty") == "OK"
  2952. def test_overwrite(self):
  2953. model_add("users/user/test/Empty", "formalisms/SimpleClassDiagrams")
  2954. assert element_list("users/user/test/Empty") == set([])
  2955. instantiate("users/user/test/Empty", "Class", ID="A")
  2956. assert element_list("users/user/test/Empty") == set([("A", "Class")])
  2957. model_overwrite("users/user/test/Empty", "")
  2958. assert element_list("users/user/test/Empty") == set([])
  2959. compare_locations("users/user/test", set(["Empty"]))
  2960. assert element_list("users/user/test/Empty") == set([])
  2961. instantiate("users/user/test/Empty", "Class", ID="B")
  2962. compare_locations("users/user/test", set(["Empty"]))
  2963. def test_operations(self):
  2964. log = []
  2965. def manual_callback(model):
  2966. p1 = instantiate(model, "PetriNet_Runtime/Place")
  2967. p2 = instantiate(model, "PetriNet_Runtime/Place")
  2968. p3 = instantiate(model, "PetriNet_Runtime/Place")
  2969. t1 = instantiate(model, "PetriNet_Runtime/Transition")
  2970. p2t1 = instantiate(model, "PetriNet_Runtime/P2T", (p1, t1))
  2971. p2t2 = instantiate(model, "PetriNet_Runtime/P2T", (p2, t1))
  2972. t2p1 = instantiate(model, "PetriNet_Runtime/T2P", (t1, p3))
  2973. attr_assign(model, p1, "tokens", 1)
  2974. attr_assign(model, p1, "name", "p1")
  2975. attr_assign(model, p2, "tokens", 2)
  2976. attr_assign(model, p2, "name", "p2")
  2977. attr_assign(model, p3, "tokens", 3)
  2978. attr_assign(model, p3, "name", "p3")
  2979. attr_assign(model, t1, "name", "t1")
  2980. attr_assign(model, t1, "executing", False)
  2981. attr_assign(model, p2t1, "weight", 1)
  2982. attr_assign(model, p2t2, "weight", 1)
  2983. attr_assign(model, t2p1, "weight", 2)
  2984. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  2985. model_add("users/user/test/PetriNet_Runtime", "formalisms/SimpleClassDiagrams", open("integration/code/pn_runtime.mvc", "r").read())
  2986. model_add("users/user/test/my_pn", "users/user/test/PetriNet", open("integration/code/pn_design_model.mvc", "r").read())
  2987. def add_tracability_D2R(model):
  2988. instantiate(model, "Association", ("PetriNet/Place", "PetriNet_Runtime/Place"), ID="D2R_PlaceLink")
  2989. instantiate(model, "Association", ("PetriNet/Transition", "PetriNet_Runtime/Transition"), ID="D2R_TransitionLink")
  2990. def add_tracability_R2D(model):
  2991. instantiate(model, "Association", ("PetriNet_Runtime/Place", "PetriNet/Place"), ID="R2D_PlaceLink")
  2992. instantiate(model, "Association", ("PetriNet_Runtime/Transition", "PetriNet/Transition"), ID="R2D_TransitionLink")
  2993. transformation_add_MT({"PetriNet": "users/user/test/PetriNet"}, {}, "users/user/test/print_pn", open("integration/code/pn_print.mvc").read())
  2994. transformation_add_MANUAL({"PetriNet": "users/user/test/PetriNet"}, {"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, "users/user/test/pn_design_to_runtime", add_tracability_D2R)
  2995. transformation_add_AL({"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, {"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, "users/user/test/pn_simulate", open("integration/code/pn_simulate.alc").read())
  2996. transformation_add_MT({"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/pn_runtime_to_design", open("integration/code/pn_runtime_to_design.mvc").read(), add_tracability_R2D)
  2997. log = []
  2998. ctrl = log_output.Controller(log, keep_running=False)
  2999. thrd = threading.Thread(target=ctrl.start)
  3000. thrd.daemon = True
  3001. thrd.start()
  3002. assert transformation_execute_MT("users/user/test/print_pn", {"PetriNet": "users/user/test/my_pn"}, {}, (ctrl, "inp", "outp")) == True
  3003. thrd.join()
  3004. assert set(log) == set(['"p1" --> 1',
  3005. '"p2" --> 2',
  3006. '"p3" --> 3'])
  3007. assert transformation_execute_MANUAL("users/user/test/pn_design_to_runtime", {"PetriNet": "users/user/test/my_pn"}, {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, manual_callback) == True
  3008. assert transformation_execute_AL("users/user/test/pn_simulate", {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, {"PetriNet_Runtime": "users/user/test/my_pn_RT"}) == True
  3009. assert transformation_execute_MT("users/user/test/pn_runtime_to_design", {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, {"PetriNet": "users/user/test/my_pn"}) == True
  3010. log = []
  3011. ctrl = log_output.Controller(log, keep_running=False)
  3012. thrd = threading.Thread(target=ctrl.start)
  3013. thrd.daemon = True
  3014. thrd.start()
  3015. assert transformation_execute_MT("users/user/test/print_pn", {"PetriNet": "users/user/test/my_pn"}, {}, (ctrl, "inp", "outp")) == True
  3016. thrd.join()
  3017. assert set(log) == set(['"p1" --> 0',
  3018. '"p2" --> 1',
  3019. '"p3" --> 5'])
  3020. def test_process_model_trivial_pn_subfunction(self):
  3021. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  3022. model_add("users/user/test/ReachabilityGraph", "formalisms/SimpleClassDiagrams", open("integration/code/reachability_graph.mvc", "r").read())
  3023. model_add("users/user/test/pn_reachability", "formalisms/ProcessModel", open("integration/code/pm_pn_reachability.mvc", "r").read())
  3024. transformation_add_MT({}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/initialize_PN", open("integration/code/initialize_PN.mvc", "r").read())
  3025. transformation_add_MANUAL({"PetriNet": "users/user/test/PetriNet"}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/refine_PN")
  3026. transformation_add_AL({"PetriNet": "users/user/test/PetriNet"}, {"ReachabilityGraph": "users/user/test/ReachabilityGraph"}, "users/user/test/reachability", open("integration/code/reachability_subfunction.alc", "r").read())
  3027. transformation_add_MT({"ReachabilityGraph": "users/user/test/ReachabilityGraph"}, {}, "users/user/test/reachability_print", open("integration/code/reachabilitygraph_print.mvc", 'r').read())
  3028. def callback_refine_PN(model):
  3029. p1 = instantiate(model, "PetriNet/Place")
  3030. attr_assign(model, p1, "name", "p1")
  3031. attr_assign(model, p1, "tokens", 1)
  3032. t1 = instantiate(model, "PetriNet/Transition")
  3033. attr_assign(model, t1, "name", "t1")
  3034. p2t = instantiate(model, "PetriNet/P2T", (p1, t1))
  3035. attr_assign(model, p2t, "weight", 1)
  3036. log = []
  3037. ctrl = log_output.Controller(log, keep_running=False)
  3038. thrd = threading.Thread(target=ctrl.start)
  3039. thrd.daemon = True
  3040. thrd.start()
  3041. process_execute("users/user/test/pn_reachability", {}, {"users/user/test/refine_PN": callback_refine_PN, "users/user/test/reachability_print": (ctrl, "inp", "outp")})
  3042. thrd.join()
  3043. assert set(log) == set(['"0": {"p1": 1}',
  3044. '"1": {"p1": 0}',
  3045. '"0" --["t1"]--> "1"'])
  3046. def test_render(self):
  3047. model_add("users/user/test/CausalBlockDiagrams", "formalisms/SimpleClassDiagrams", open("integration/code/cbd_design.mvc", 'r').read())
  3048. model_add("users/user/test/MM_rendered_graphical", "formalisms/SimpleClassDiagrams", open("integration/code/MM_rendered_graphical.mvc", 'r').read())
  3049. model_add("users/user/test/my_CBD", "users/user/test/CausalBlockDiagrams", open("integration/code/my_cbd.mvc", 'r').read())
  3050. def add_tracability(model):
  3051. instantiate(model, "Association", ("abstract/Block", "rendered/Group"), ID="TracabilityLink")
  3052. transformation_add_MT({"abstract": "users/user/test/CausalBlockDiagrams", "rendered": "users/user/test/MM_rendered_graphical"}, {"abstract": "users/user/test/CausalBlockDiagrams", "rendered": "users/user/test/MM_rendered_graphical"}, "users/user/test/render_graphical_CBD", open("integration/code/CBD_mapper.mvc", 'r').read(), add_tracability)
  3053. result = model_render("users/user/test/my_CBD", "users/user/test/render_graphical_CBD", "users/user/test/my_perceptualized_CBD")
  3054. assert len(result) == 23
  3055. def test_SCCD_basic(self):
  3056. model_add("users/user/test/SCCD", "formalisms/SimpleClassDiagrams", open("integration/code/SCCD.mvc", 'r').read())
  3057. model_add("users/user/test/SCCD_Trace", "formalisms/SimpleClassDiagrams", open("integration/code/SCCD_Trace.mvc", 'r').read())
  3058. model_add("users/user/test/my_SCCD", "users/user/test/SCCD", open("integration/code/SCCD_all.mvc", 'r').read())
  3059. transformation_add_AL({"SCCD": "users/user/test/SCCD"}, {"trace": "users/user/test/SCCD_Trace"}, "users/user/test/SCCD_execute_afap", open("integration/code/SCCD_execute.alc", 'r').read().replace("afap = False", "afap = True"))
  3060. transformation_execute_AL("users/user/test/SCCD_execute_afap", {"SCCD": "users/user/test/my_SCCD"}, {"trace": "users/user/test/my_SCCD_trace"})
  3061. alter_context("users/user/test/my_SCCD_trace", "users/user/test/SCCD_Trace")
  3062. lst = element_list_nice("users/user/test/my_SCCD_trace")
  3063. lst.sort(key=lambda i: (i["timestamp"], i["name"]))
  3064. result = [(i["timestamp"], str(i["name"])) for i in lst if i["name"] not in ["updateTimerValue", "updateTimerColour", "resetTimer"]]
  3065. assert result == [(5.0, "displayRed"),
  3066. (20.0, "displayYellow"),
  3067. (20.5, "displayNone"),
  3068. (21.0, "displayYellow"),
  3069. (21.5, "displayNone"),
  3070. (22.0, "displayYellow"),
  3071. (22.5, "displayNone"),
  3072. (23.0, "displayYellow"),
  3073. (23.5, "displayNone"),
  3074. (24.0, "displayYellow"),
  3075. (24.5, "displayNone"),
  3076. (25.0, "displayYellow"),
  3077. (25.5, "displayNone"),
  3078. (26.0, "displayYellow"),
  3079. (26.5, "displayNone"),
  3080. (27.0, "displayYellow"),
  3081. (27.5, "displayNone"),
  3082. (28.0, "displayYellow"),
  3083. (28.5, "displayNone"),
  3084. (29.0, "displayYellow"),
  3085. (29.4, "displayNone"),
  3086. (29.4, "displayRed"),
  3087. (89.4, "displayGreen"),
  3088. (129.4, "displayNone"),
  3089. (129.4, "displayRed"),
  3090. (139.4, "displayYellow"),
  3091. (139.9, "displayNone"),
  3092. (140.4, "displayYellow"),
  3093. (140.9, "displayNone"),
  3094. (141.4, "displayYellow"),
  3095. (141.9, "displayNone"),
  3096. (142.4, "displayYellow"),
  3097. (142.9, "displayNone"),
  3098. (143.4, "displayYellow"),
  3099. (143.9, "displayNone"),
  3100. (144.4, "displayYellow"),
  3101. (144.9, "displayNone"),
  3102. (145.4, "displayYellow"),
  3103. (145.9, "displayNone"),
  3104. (146.4, "displayYellow"),
  3105. (146.9, "displayNone"),
  3106. (147.4, "displayYellow"),
  3107. (147.9, "displayNone"),
  3108. (148.4, "displayYellow"),
  3109. ]
  3110. def test_switch_MM(self):
  3111. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  3112. model_add("users/user/test/my_pn", "users/user/test/PetriNet", open("integration/code/pn_design_model.mvc", "r").read())
  3113. got = element_list_nice("users/user/test/PetriNet")
  3114. expected = \
  3115. [{'__id': 'Natural', '__type': 'SimpleAttribute', 'constraint': {'AL': ''}, 'name': 'Natural'},
  3116. {'__id': 'String', '__type': 'SimpleAttribute', 'constraint': {'AL': ''}, 'name': 'String'},
  3117. {'__id': 'Place', '__type': 'Class', 'lower_cardinality': None, 'upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'Place', 'abstract': None},
  3118. {'__id': 'Place_tokens', '__type': 'AttributeLink', '__source': 'Place', '__target': 'Natural', 'name': 'tokens', 'optional': False, 'constraint': {'AL': ''}},
  3119. {'__id': 'Place_name', '__type': 'AttributeLink', '__source': 'Place', '__target': 'String', 'name': 'name', 'optional': False, 'constraint': {'AL': ''}},
  3120. {'__id': 'Transition', '__type': 'Class', 'lower_cardinality': None, 'upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'Transition', 'abstract': None},
  3121. {'__id': 'Transition_name', '__type': 'AttributeLink', '__source': 'Transition', '__target': 'String', 'name': 'name', 'optional': False, 'constraint': {'AL': ''}},
  3122. {'__id': 'P2T', '__type': 'Association', '__source': 'Place', '__target': 'Transition', 'source_lower_cardinality': None, 'target_lower_cardinality': None, 'source_upper_cardinality': None, 'target_upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'P2T', "abstract": None, "lower_cardinality": None, "upper_cardinality": None},
  3123. {'__id': 'P2T_weight', '__type': 'AttributeLink', '__source': 'P2T', '__target': 'Natural', 'name': 'weight', 'optional': False, 'constraint': {'AL': ''}},
  3124. {'__id': 'T2P', '__type': 'Association', '__source': 'Transition', '__target': 'Place', 'source_lower_cardinality': None, 'target_lower_cardinality': None, 'source_upper_cardinality': None, 'target_upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'T2P', "abstract": None, "lower_cardinality": None, "upper_cardinality": None},
  3125. {'__id': 'T2P_weight', '__type': 'AttributeLink', '__source': 'T2P', '__target': 'Natural', 'name': 'weight', 'optional': False, 'constraint': {'AL': ''}},
  3126. ]
  3127. compare_unordered_lists(got, expected)
  3128. got = element_list_nice("users/user/test/my_pn")
  3129. expected = \
  3130. [{'__id': 'p1', '__type': 'Place', 'tokens': 1, 'name': 'p1'},
  3131. {'__id': 'p2', '__type': 'Place', 'tokens': 2, 'name': 'p2'},
  3132. {'__id': 'p3', '__type': 'Place', 'tokens': 3, 'name': 'p3'},
  3133. {'__id': 't1', '__type': 'Transition', 'name': 't1'},
  3134. {'__id': '__0', '__type': 'P2T', '__source': 'p1', '__target': 't1', 'weight': 1},
  3135. {'__id': '__1', '__type': 'P2T', '__source': 'p2', '__target': 't1', 'weight': 1},
  3136. {'__id': '__2', '__type': 'T2P', '__source': 't1', '__target': 'p3', 'weight': 2}
  3137. ]
  3138. compare_unordered_lists(got, expected)
  3139. alter_context("users/user/test/PetriNet", "formalisms/Bottom")
  3140. alter_context("users/user/test/my_pn", "formalisms/Bottom")
  3141. count_nodes = 0
  3142. count_edges = 0
  3143. for entry in element_list_nice("users/user/test/PetriNet"):
  3144. print(entry)
  3145. assert entry["__type"] in ["Node", "Edge"]
  3146. if entry["__type"] == "Node":
  3147. assert len(entry) == 2
  3148. count_nodes += 1
  3149. else:
  3150. assert len(entry) == 4
  3151. count_edges += 1
  3152. assert count_nodes == 20
  3153. assert count_edges == 23
  3154. count_nodes = 0
  3155. count_edges = 0
  3156. for entry in element_list_nice("users/user/test/my_pn"):
  3157. assert entry["__type"] in ["Node", "Edge"]
  3158. if entry["__type"] == "Node":
  3159. assert len(entry) == 2
  3160. count_nodes += 1
  3161. else:
  3162. assert len(entry) == 4
  3163. count_edges += 1
  3164. assert count_nodes == 14
  3165. assert count_edges == 13
  3166. alter_context("users/user/test/PetriNet", "users/user/test/PetriNet")
  3167. alter_context("users/user/test/my_pn", "formalisms/SimpleClassDiagrams")
  3168. try:
  3169. element_list_nice("users/user/test/PetriNet")
  3170. self.fail()
  3171. except:
  3172. pass
  3173. try:
  3174. element_list_nice("users/user/test/my_pn")
  3175. self.fail()
  3176. except:
  3177. pass