test_all.py 148 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604
  1. import unittest
  2. import sys
  3. try:
  4. from unit.utils import *
  5. import unit.log_output as log_output
  6. except ImportError: #for Python2
  7. from utils import *
  8. import log_output as log_output
  9. sys.path.append("wrappers")
  10. from modelverse import *
  11. import threading
  12. model_hierarchy = \
  13. {"formalisms/": {"SimpleClassDiagrams": {},
  14. "TypeMapping": {},
  15. "Tracability": {},
  16. "ProcessModel": {},
  17. "ActionLanguage": {},
  18. "ManualOperation": {},
  19. "Bottom": {},
  20. },
  21. "models/": {},
  22. "administration/": {"core": {},
  23. "CoreFormalism": {},
  24. },
  25. "users/": {"admin/": {},
  26. "LoLA/": {},
  27. "HUTN/": {},
  28. "files/": {},
  29. "DEVS/": {},
  30. "DEVS_batch/": {},
  31. "JSON/": {},
  32. },
  33. "type mappings/": {"1": {},
  34. "2": {},
  35. "3": {},
  36. "4": {},
  37. "5": {},
  38. "6": {},
  39. "7": {},
  40. "8": {},
  41. "9": {},
  42. },
  43. "merged/": {},
  44. "tmp/": {},
  45. "RAMified/": {},
  46. }
  47. def verify_clean():
  48. compare_locations("", set())
  49. compare_locations("models", set())
  50. compare_locations("formalisms", set())
  51. def get_model_list(location):
  52. try:
  53. location_parts = location.split("/")
  54. current = model_hierarchy
  55. while location_parts:
  56. l = location_parts.pop(0)
  57. if l != "":
  58. current = current[l + "/"]
  59. return set(current.keys())
  60. except:
  61. return set([])
  62. def compare_locations(location, extra_to_default):
  63. assert model_list(location) == get_model_list(location) | set(extra_to_default)
  64. def compare_unordered_lists(got, expected):
  65. assert len(got) == len(expected)
  66. for i in got:
  67. assert i in expected
  68. for i in expected:
  69. assert i in got
  70. class TestModelverse(unittest.TestCase):
  71. proc = None
  72. def runTest(self):
  73. pass
  74. @classmethod
  75. def setUpClass(self):
  76. TestModelverse.proc, address = start_mvc()
  77. init(address)
  78. login("user", "user")
  79. @classmethod
  80. def tearDownClass(self):
  81. try:
  82. kill(TestModelverse.proc)
  83. except:
  84. print("Got exception during teardown.")
  85. def setUp(self):
  86. verify_clean()
  87. folder_create("users/user/test")
  88. def tearDown(self):
  89. model_delete("users/user/test")
  90. verify_clean()
  91. pass
  92. def test_op_model_list(self):
  93. assert model_list("") == set(["formalisms/",
  94. "models/",
  95. "administration/",
  96. "type mappings/",
  97. "users/",
  98. "merged/",
  99. "RAMified/",
  100. "tmp/",
  101. ])
  102. assert model_list("formalisms") == set(["SimpleClassDiagrams",
  103. "ActionLanguage",
  104. "TypeMapping",
  105. "Tracability",
  106. "ProcessModel",
  107. "ManualOperation",
  108. "Bottom",
  109. ])
  110. assert model_list("formalisms/") == set(["SimpleClassDiagrams",
  111. "ActionLanguage",
  112. "TypeMapping",
  113. "Tracability",
  114. "ProcessModel",
  115. "ManualOperation",
  116. "Bottom",
  117. ])
  118. # Try unreadable location
  119. try:
  120. model_list("administration")
  121. self.fail()
  122. except ReadPermissionDenied:
  123. pass
  124. # Try non-existing location
  125. try:
  126. model_list("adfjafdla")
  127. self.fail()
  128. except UnknownLocation:
  129. pass
  130. def test_op_model_list_full(self):
  131. assert model_list_full("") == set([("formalisms/", "admin", "admin", "221"),
  132. ("models/", "admin", "admin", "221"),
  133. ("administration/", "admin", "admin", "110"),
  134. ("type mappings/", "admin", "admin", "221"),
  135. ("users/", "admin", "admin", "221"),
  136. ("merged/", "admin", "nobody", "222"),
  137. ("RAMified/", "admin", "nobody", "222"),
  138. ("tmp/", "admin", "nobody", "222"),
  139. ])
  140. assert model_list_full("formalisms") == set([("SimpleClassDiagrams", "admin", "admin", "221"),
  141. ("ActionLanguage", "admin", "admin", "221"),
  142. ("TypeMapping", "admin", "admin", "221"),
  143. ("Tracability", "admin", "admin", "221"),
  144. ("ProcessModel", "admin", "admin", "221"),
  145. ("ManualOperation", "admin", "admin", "221"),
  146. ("Bottom", "admin", "admin", "221"),
  147. ])
  148. # Try unreadable location
  149. try:
  150. model_list_full("administration")
  151. self.fail()
  152. except ReadPermissionDenied:
  153. pass
  154. # Try non-existing location
  155. try:
  156. model_list_full("adfjafdla")
  157. self.fail()
  158. except UnknownLocation:
  159. pass
  160. def test_op_verify(self):
  161. # Verify M3 --> M3
  162. assert verify("formalisms/SimpleClassDiagrams", "formalisms/SimpleClassDiagrams") == "OK"
  163. # Verify with bottom
  164. assert verify("formalisms/SimpleClassDiagrams", "formalisms/Bottom") == "OK"
  165. # Verify the type mapping models
  166. for tm in model_types("formalisms/SimpleClassDiagrams"):
  167. assert verify(tm[1], "formalisms/TypeMapping") == "OK"
  168. # Verify wrong
  169. try:
  170. verify("formalisms/SimpleClassDiagrams", "formalisms/ProcessModel")
  171. self.fail()
  172. except UnknownMetamodellingHierarchy:
  173. pass
  174. # Verify M2 --> M3
  175. assert verify("formalisms/ProcessModel", "formalisms/SimpleClassDiagrams") == "OK"
  176. assert verify("formalisms/ProcessModel", "formalisms/Bottom") == "OK"
  177. for tm in model_types("formalisms/ProcessModel"):
  178. assert verify(tm[1], "formalisms/TypeMapping") == "OK"
  179. try:
  180. verify("formalisms/ProcessModel", "formalisms/ProcessModel")
  181. self.fail()
  182. except UnknownMetamodellingHierarchy:
  183. pass
  184. # Verify M1 --> M2
  185. model_add("users/user/test/a", "formalisms/ProcessModel")
  186. # Fails with lacking instances of Start and Finish class
  187. assert verify("users/user/test/a", "formalisms/ProcessModel").startswith("Lower cardinality violated for class: ")
  188. instantiate("users/user/test/a", "Start")
  189. # Fails with lacking instances of Finish class
  190. assert verify("users/user/test/a", "formalisms/ProcessModel") == "Lower cardinality violated for class: Finish"
  191. instantiate("users/user/test/a", "Finish")
  192. # Succeeds
  193. assert verify("users/user/test/a", "formalisms/ProcessModel") == "OK"
  194. # Test unreadable model
  195. try:
  196. verify("administration/core", "formalisms/ProcessModel")
  197. self.fail()
  198. except ReadPermissionDenied:
  199. pass
  200. # Test unreadable metamodel
  201. try:
  202. verify("formalisms/Bottom", "administration/core")
  203. self.fail()
  204. except ReadPermissionDenied:
  205. pass
  206. # Test non-existing model
  207. try:
  208. verify("adfadf", "formalisms/SimpleClassDiagrams")
  209. self.fail()
  210. except UnknownModel:
  211. pass
  212. # Test non-existing metamodel
  213. try:
  214. verify("formalisms/SimpleClassDiagrams", "adfka")
  215. self.fail()
  216. except UnknownModel:
  217. pass
  218. def test_op_permission_modify(self):
  219. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  220. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  221. # Check that we can read
  222. element_list_nice("users/user/test/a")
  223. # Check that we can write
  224. instantiate("users/user/test/a", "Class")
  225. assert permission_modify("users/user/test/a", "100") == None
  226. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "100")])
  227. # Check that we can read
  228. element_list_nice("users/user/test/a")
  229. # Check that we can't write
  230. try:
  231. instantiate("users/user/test/a", "Class")
  232. self.fail()
  233. except WritePermissionDenied:
  234. pass
  235. assert permission_modify("users/user/test/a", "000") == None
  236. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "000")])
  237. # Check that we can't read
  238. try:
  239. element_list_nice("users/user/test/a")
  240. self.fail()
  241. except ReadPermissionDenied:
  242. pass
  243. # Check that we can't write
  244. try:
  245. instantiate("users/user/test/a", "Class")
  246. self.fail()
  247. except WritePermissionDenied:
  248. pass
  249. except ReadPermissionDenied:
  250. pass
  251. assert permission_modify("users/user/test/a", "200") == None
  252. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  253. # Check that we can read
  254. element_list_nice("users/user/test/a")
  255. # Check that we can write
  256. instantiate("users/user/test/a", "Class")
  257. # Cannot modify permissions if we don't own the model
  258. try:
  259. permission_modify("formalisms/SimpleClassDiagrams", "222")
  260. self.fail()
  261. except UserPermissionDenied:
  262. pass
  263. # Cannot modify permissions even if we have full access, as long as we are not the owner
  264. model_add("users/user/test/z", "formalisms/SimpleClassDiagrams")
  265. permission_owner("users/user/test/z", "admin")
  266. try:
  267. permission_modify("users/user/test/z", "222")
  268. self.fail()
  269. except UserPermissionDenied:
  270. pass
  271. try:
  272. permission_owner("users/user/test/z", "user")
  273. self.fail()
  274. except UserPermissionDenied:
  275. pass
  276. def test_op_model_add(self):
  277. assert model_list_full("users/user/test") == set([])
  278. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  279. # Test permissions of newly created empty model
  280. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  281. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", \
  282. """
  283. Class A {
  284. name = "A"
  285. }
  286. Class B {
  287. name = "B"
  288. abstract = True
  289. }
  290. """)
  291. # Test permissions of newly created non-empty model
  292. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  293. # Test content of newly created model with code upload
  294. lst = element_list_nice("users/user/test/b")
  295. assert len(lst) == 2
  296. assert {'__id': "A", "__type": "Class", "abstract": None, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "A"} in lst
  297. assert {'__id': "B", "__type": "Class", "abstract": True, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "B"} in lst
  298. try:
  299. # Cannot upload model to occupied location
  300. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  301. self.fail()
  302. except ModelExists:
  303. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  304. try:
  305. # Cannot upload model to unwritable location at root
  306. model_add("z", "formalisms/SimpleClassDiagrams")
  307. self.fail()
  308. except WritePermissionDenied:
  309. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  310. try:
  311. # Cannot upload model to unwritable location somewhere in hierarchy
  312. model_add("users/new_model", "formalisms/SimpleClassDiagrams")
  313. self.fail()
  314. except WritePermissionDenied:
  315. assert "new_model/" not in model_list("users/")
  316. try:
  317. # Cannot upload model to unwritable location somewhere in hierarchy with multiple new branches
  318. model_add("users/new_username/new_model", "formalisms/SimpleClassDiagrams")
  319. self.fail()
  320. except WritePermissionDenied:
  321. assert "new_username/" not in model_list("users/")
  322. model_add("users/user/test/c", "users/user/test/b", """
  323. A a {}
  324. """)
  325. try:
  326. # Cannot add this model, as it cannot be auto-typecasted to formalisms/SimpleClassDiagrams
  327. model_add("users/user/test/d", "users/user/test/c", """
  328. a c {}
  329. """)
  330. self.fail()
  331. except UnknownM3:
  332. assert model_list("users/user/test") == set(["a", "b", "c"])
  333. # We can add this model for multiple levels, as it can be automatically typecasted to formalisms/SimpleClassDiagrams, since it is empty
  334. model_add("users/user/test/d", "users/user/test/b")
  335. model_add("users/user/test/e", "users/user/test/d")
  336. model_add("users/user/test/f", "users/user/test/e")
  337. def test_op_model_add_compilation_error(self):
  338. try:
  339. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  340. abdfaefeaf
  341. """)
  342. self.fail()
  343. except CompilationError:
  344. pass
  345. try:
  346. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  347. Crass A {
  348. name = "b"
  349. }
  350. """)
  351. #TODO at the moment, this still succeeds!
  352. #self.fail()
  353. except:
  354. raise
  355. pass
  356. def test_op_model_move(self):
  357. # Test basic scenario
  358. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  359. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  360. assert model_move("users/user/test/a", "users/user/test/b") == None
  361. assert model_list_full("users/user/test") == set([("b", "user", "nobody", "200")])
  362. # Test if permissions are copied as well
  363. permission_modify("users/user/test/b", "222")
  364. assert model_list_full("users/user/test") == set([("b", "user", "nobody", "222")])
  365. assert model_move("users/user/test/b", "users/user/test/a") == None
  366. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222")])
  367. # Test move if destination exists
  368. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  369. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222"), ("b", "user", "nobody", "200")])
  370. try:
  371. model_move("users/user/test/a", "users/user/test/b")
  372. self.fail()
  373. except ModelExists:
  374. pass
  375. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222"), ("b", "user", "nobody", "200")])
  376. # Test move if source doesn't exist
  377. try:
  378. model_move("users/user/test/z", "users/user/test/y")
  379. self.fail()
  380. except UnknownModel:
  381. pass
  382. # Test if we can move a model we can't write to (i.e., not allowed to remove it)
  383. try:
  384. model_move("formalisms/ProcessModel", "users/user/test/x")
  385. self.fail()
  386. except WritePermissionDenied:
  387. pass
  388. # Test if we can move a model to a place we can't write to
  389. try:
  390. model_move("users/user/test/a", "administration/ProcessModel2")
  391. self.fail()
  392. except WritePermissionDenied:
  393. pass
  394. def test_op_model_delete(self):
  395. # Test basic delete
  396. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  397. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  398. assert model_delete("users/user/test/a") == None
  399. assert model_list_full("users/user/test") == set([])
  400. # Test delete of non-existing
  401. assert model_list_full("users/user/test") == set([])
  402. try:
  403. model_delete("users/user/test/a")
  404. self.fail()
  405. except UnknownModel:
  406. pass
  407. # Test delete of non-writable models
  408. try:
  409. model_delete("formalisms/SimpleClassDiagrams")
  410. self.fail()
  411. except WritePermissionDenied:
  412. pass
  413. def test_op_model_overwrite(self):
  414. # Test overwrite of simple model
  415. assert model_list_full("users/user/test") == set([])
  416. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  417. # Test permissions of newly created empty model
  418. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  419. assert element_list_nice("users/user/test/a") == []
  420. model_overwrite("users/user/test/a", \
  421. """
  422. Class A {
  423. name = "A"
  424. }
  425. Class B {
  426. name = "B"
  427. abstract = True
  428. }
  429. """)
  430. # Test permissions of newly created non-empty model
  431. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  432. # Test content of newly created model with code upload
  433. lst = element_list_nice("users/user/test/a")
  434. assert len(lst) == 2
  435. assert {'__id': "A", "__type": "Class", "abstract": None, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "A"} in lst
  436. assert {'__id': "B", "__type": "Class", "abstract": True, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "B"} in lst
  437. before = element_list_nice("formalisms/SimpleClassDiagrams")
  438. try:
  439. # Cannot overwrite non-writable model
  440. model_overwrite("formalisms/SimpleClassDiagrams", "")
  441. self.fail()
  442. except WritePermissionDenied:
  443. # No changes were made
  444. after = element_list_nice("formalisms/SimpleClassDiagrams")
  445. assert len(after) == len(before)
  446. for entry in after:
  447. assert entry in before
  448. def test_op_user_logout(self):
  449. try:
  450. element_list_nice("administration/core")
  451. self.fail()
  452. except ReadPermissionDenied:
  453. pass
  454. user_logout()
  455. login("admin", "admin")
  456. # Test user permissions
  457. assert len(element_list_nice("administration/core")) > 0
  458. user_logout()
  459. login("user", "user")
  460. try:
  461. element_list_nice("administration/core")
  462. self.fail()
  463. except ReadPermissionDenied:
  464. pass
  465. def test_op_all_instances(self):
  466. # Test M2 level
  467. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  468. Class A {}
  469. Class B : A {}
  470. Association C (A, B) {}
  471. """)
  472. assert all_instances("users/user/test/a", "Class") == set(["A", "B", "C"])
  473. assert all_instances("users/user/test/a", "Association") == set(["C"])
  474. # Test non-existing type
  475. try:
  476. all_instances("users/user/test/a", "non-existing")
  477. self.fail()
  478. except UnknownElement:
  479. pass
  480. # Test non-existing model
  481. try:
  482. all_instances("users/user/test/b", "Class")
  483. self.fail()
  484. except UnknownModel:
  485. pass
  486. # Test M1 level
  487. model_add("users/user/test/b", "users/user/test/a", """
  488. A a {}
  489. B b {}
  490. C c(a, b) {}
  491. A d {}
  492. """)
  493. assert all_instances("users/user/test/b", "A") == set(["a", "b", "d"])
  494. assert all_instances("users/user/test/b", "B") == set(["b"])
  495. assert all_instances("users/user/test/b", "C") == set(["c"])
  496. # No read permission
  497. try:
  498. all_instances("administration/core", "Class")
  499. self.fail()
  500. except ReadPermissionDenied:
  501. pass
  502. # No write permission, but can query
  503. assert type(all_instances("formalisms/SimpleClassDiagrams", "Class")) == set
  504. def test_op_admin_promote_demote(self):
  505. # Verify that user doesn't have admin permissions
  506. try:
  507. element_list("administration/core")
  508. self.fail()
  509. except ReadPermissionDenied:
  510. pass
  511. # Cannot do admin_promote ourselves
  512. try:
  513. admin_promote("user")
  514. except AdminPermissionDenied:
  515. pass
  516. # Cannot do admin_demote ourselves
  517. try:
  518. admin_demote("user")
  519. except AdminPermissionDenied:
  520. pass
  521. # Switch to admin for now
  522. self.do_as_user("admin", admin_promote, ["user"])
  523. # Verify that we can do admin operations
  524. assert len(element_list("administration/core")) > 0
  525. # And check that we can promote/demote other users
  526. admin_promote("HUTN")
  527. admin_demote("HUTN")
  528. # Can also demote ourselves again
  529. admin_demote("user")
  530. # Verify that user doesn't have admin permissions
  531. try:
  532. element_list("administration/core")
  533. self.fail()
  534. except ReadPermissionDenied:
  535. pass
  536. def test_op_model_types(self):
  537. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  538. # Read model types of simple model
  539. lst = model_types("users/user/test/a")
  540. assert len(lst) == 1
  541. entry = lst.pop()
  542. assert entry[0] == "formalisms/SimpleClassDiagrams"
  543. assert entry[1].startswith("type mappings/")
  544. assert entry[2] == None
  545. # Create bottom and query afterwards
  546. alter_context("users/user/test/a", "formalisms/Bottom")
  547. element_list_nice("users/user/test/a")
  548. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  549. lst = model_types("users/user/test/a")
  550. assert len(lst) == 2
  551. got = set()
  552. while lst:
  553. entry = lst.pop()
  554. assert entry[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  555. assert entry[0] not in got
  556. got.add(entry[0])
  557. assert entry[1].startswith("type mappings/")
  558. assert entry[2] == None
  559. # No type mapping for type mappings
  560. assert model_types(entry[1]) == set([("formalisms/TypeMapping", None, None)])
  561. # But there will be as soon as we open it
  562. element_list_nice(entry[1])
  563. lst = model_types(entry[1])
  564. assert len(lst) == 1
  565. entry = lst.pop()
  566. assert entry[0] == "formalisms/TypeMapping"
  567. assert entry[1].startswith("type mappings/")
  568. assert entry[2] == None
  569. def test_op_folder_create(self):
  570. # Create a folder
  571. assert folder_create("users/user/test/folder_a") == None
  572. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200")])
  573. # Create folder with trailing slash
  574. assert folder_create("users/user/test/folder_b/") == None
  575. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200"), ("folder_b/", "user", "nobody", "200")])
  576. assert model_list_full("users/user/test/folder_b") == set()
  577. # Create multiple folders
  578. assert folder_create("users/user/test/folder_a/folder_b/folder_c/folder_d") == None
  579. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200"), ("folder_b/", "user", "nobody", "200")])
  580. assert model_list_full("users/user/test/folder_a") == set([("folder_b/", "user", "nobody", "200")])
  581. assert model_list_full("users/user/test/folder_a/folder_b") == set([("folder_c/", "user", "nobody", "200")])
  582. assert model_list_full("users/user/test/folder_a/folder_b/folder_c") == set([("folder_d/", "user", "nobody", "200")])
  583. # Create folder in non-writable location
  584. try:
  585. folder_create("a")
  586. self.fail()
  587. except WritePermissionDenied:
  588. pass
  589. assert "a" not in model_list("")
  590. # Create folder that already exists
  591. try:
  592. folder_create("users/user/test/folder_a")
  593. self.fail()
  594. except FolderExists:
  595. pass
  596. def test_op_alter_context(self):
  597. # Create a model that we will use
  598. model_add("users/user/test/a", "formalisms/ProcessModel", """
  599. Start start {}
  600. Finish finish {}
  601. """)
  602. # List elements using default context, that of creation
  603. lst = element_list_nice("users/user/test/a")
  604. assert len(lst) == 2
  605. assert {"__id": "start", "__type": "Start"} in lst
  606. assert {"__id": "finish", "__type": "Finish"} in lst
  607. # List elements using bottom context
  608. alter_context("users/user/test/a", "formalisms/Bottom")
  609. lst = element_list_nice("users/user/test/a")
  610. assert len(lst) == 2
  611. assert {"__id": "start", "__type": "Node"} in lst
  612. assert {"__id": "finish", "__type": "Node"} in lst
  613. # Switch back to default context
  614. alter_context("users/user/test/a", "formalisms/ProcessModel")
  615. lst = element_list_nice("users/user/test/a")
  616. assert len(lst) == 2
  617. assert {"__id": "start", "__type": "Start"} in lst
  618. assert {"__id": "finish", "__type": "Finish"} in lst
  619. # Switch to a non-existing context
  620. alter_context("users/user/test/a", "non-existing")
  621. try:
  622. element_list_nice("users/user/test/a")
  623. self.fail()
  624. except UnknownModel:
  625. pass
  626. # Set context for an unknown model
  627. # Note that this will only register locally, without communicating with the Modelverse
  628. # as such, errors are not noticed until the element is accessed!
  629. alter_context("non-existing", "formalisms/SimpleClassDiagrams")
  630. def test_op_element_list(self):
  631. model_add("users/user/test/a", "formalisms/ProcessModel", """
  632. Start start {}
  633. Finish finish {}
  634. Next nxt (start, finish) {}
  635. """)
  636. # Basic operation
  637. lst = element_list("users/user/test/a")
  638. assert len(lst) == 3
  639. assert ("start", "Start") in lst
  640. assert ("finish", "Finish") in lst
  641. assert ("nxt", "Next") in lst
  642. # Try on non-existing model
  643. try:
  644. element_list("a")
  645. self.fail()
  646. except UnknownModel:
  647. pass
  648. # Try a non-readable model
  649. try:
  650. element_list("administration/core")
  651. self.fail()
  652. except ReadPermissionDenied:
  653. pass
  654. # No write permission, but can query
  655. assert type(element_list("formalisms/SimpleClassDiagrams")) == set
  656. def test_op_element_list_nice(self):
  657. # Test simple element_list_nice
  658. model_add("users/user/test/a", "formalisms/ProcessModel", """
  659. Start start {}
  660. Finish finish {}
  661. Next nxt (start, finish) {}
  662. """)
  663. # Basic operation
  664. lst = element_list_nice("users/user/test/a")
  665. assert len(lst) == 3
  666. assert {"__id": "start", "__type": "Start"} in lst
  667. assert {"__id": "finish", "__type": "Finish"} in lst
  668. assert {"__id": "nxt", "__type": "Next", "__source": "start", "__target": "finish"} in lst
  669. # Test a model with attributes
  670. model_add("users/user/test/b", "formalisms/ProcessModel", """
  671. Start start {}
  672. Exec exec1 {
  673. name = "first exec"
  674. }
  675. Finish finish {}
  676. Data d1 {
  677. name = "data 1"
  678. type = "type 1"
  679. }
  680. Next n1 (start, exec1) {}
  681. Next n2 (exec1, finish) {}
  682. Produces p1 (exec1, d1) {
  683. name = "producer"
  684. }
  685. """)
  686. lst = element_list_nice("users/user/test/b")
  687. assert len(lst) == 7
  688. assert {"__id": "start", "__type": "Start"} in lst
  689. assert {"__id": "finish", "__type": "Finish"} in lst
  690. assert {"__id": "exec1", "__type": "Exec", "name": "first exec"} in lst
  691. assert {"__id": "d1", "__type": "Data", "name": "data 1", "type": "type 1"} in lst
  692. assert {"__id": "n1", "__type": "Next", "__source": "start", "__target": "exec1"} in lst
  693. assert {"__id": "n2", "__type": "Next", "__source": "exec1", "__target": "finish"} in lst
  694. assert {"__id": "p1", "__type": "Produces", "__source": "exec1", "__target": "d1", "name": "producer"} in lst
  695. # Try one with defined attributes
  696. model_add("users/user/test/c", "formalisms/SimpleClassDiagrams", """
  697. SimpleAttribute Natural {
  698. name = "natural"
  699. }
  700. SimpleAttribute String {
  701. name = "string"
  702. }
  703. Class place {
  704. name = "Place"
  705. name : String
  706. capacity : Natural
  707. }
  708. Class transition {
  709. name = "Transition"
  710. name : String
  711. }
  712. Association p2t (place, transition) {
  713. name = "P2T"
  714. weight : Natural
  715. }
  716. Association t2p (transition, place) {
  717. name = "T2P"
  718. weight : Natural
  719. }
  720. """)
  721. lst = element_list_nice("users/user/test/c")
  722. assert len(lst) == 11
  723. assert {"__id": "Natural", "__type": "SimpleAttribute", "constraint": {"AL": ""}, "name": "natural"} in lst
  724. assert {"__id": "String", "__type": "SimpleAttribute", "constraint": {"AL": ""}, "name": "string"} in lst
  725. assert {"__id": "place", "name": "Place", "__type": "Class", "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "abstract": None} in lst
  726. assert {"__id": "transition", "name": "Transition", "__type": "Class", "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "abstract": None} in lst
  727. assert {"__id": "p2t", "name": "P2T", "__type": "Association", "__source": "place", "__target": "transition", "constraint": {"AL": ""}, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None} in lst
  728. assert {"__id": "t2p", "name": "T2P", "__type": "Association", "__source": "transition", "__target": "place", "constraint": {"AL": ""}, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None} in lst
  729. assert {"__id": "place_name", "__type": "AttributeLink", "__source": "place", "__target": "String", "name": "name", "optional": False, "constraint": {"AL": ""}} in lst
  730. assert {"__id": "place_capacity", "__type": "AttributeLink", "__source": "place", "__target": "Natural", "name": "capacity", "optional": False, "constraint": {"AL": ""}} in lst
  731. assert {"__id": "transition_name", "__type": "AttributeLink", "__source": "transition", "__target": "String", "name": "name", "optional": False, "constraint": {"AL": ""}} in lst
  732. assert {"__id": "p2t_weight", "__type": "AttributeLink", "__source": "p2t", "__target": "Natural", "name": "weight", "optional": False, "constraint": {"AL": ""}} in lst
  733. assert {"__id": "t2p_weight", "__type": "AttributeLink", "__source": "t2p", "__target": "Natural", "name": "weight", "optional": False, "constraint": {"AL": ""}} in lst
  734. # Try on non-existing model
  735. try:
  736. element_list_nice("a")
  737. self.fail()
  738. except UnknownModel:
  739. pass
  740. # Try a non-readable model
  741. try:
  742. element_list_nice("administration/core")
  743. self.fail()
  744. except ReadPermissionDenied:
  745. pass
  746. # No write permission, but can query
  747. assert type(element_list_nice("formalisms/SimpleClassDiagrams")) == list
  748. def test_op_types(self):
  749. # Try operation of unopened model
  750. assert types("formalisms/ProcessModel") == element_list("formalisms/SimpleClassDiagrams")
  751. # Try simple operation
  752. model_add("users/user/test/a", "formalisms/ProcessModel", """
  753. Start start {}
  754. Finish finish {}
  755. Next nxt (start, finish) {}
  756. """)
  757. assert types("users/user/test/a") == element_list("formalisms/ProcessModel")
  758. alter_context("users/user/test/a", "formalisms/Bottom")
  759. assert types("users/user/test/a") == element_list("formalisms/Bottom")
  760. # Try for model that we cannot read
  761. try:
  762. types("administration/core")
  763. self.fail()
  764. except ReadPermissionDenied:
  765. pass
  766. # Try for non-existing model
  767. try:
  768. types("a")
  769. self.fail()
  770. except UnknownModel:
  771. pass
  772. # Try for a metamodel that we are not allowed to read, although the model may be read
  773. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  774. assert types("users/user/test/b") == element_list("formalisms/SimpleClassDiagrams")
  775. alter_context("users/user/test/b", "administration/core")
  776. try:
  777. types("users/user/test/b")
  778. self.fail()
  779. except ReadPermissionDenied:
  780. pass
  781. # No write permission for either M or MM, but can query
  782. assert type(types("formalisms/SimpleClassDiagrams")) == set
  783. def test_op_read_info(self):
  784. # Basic case
  785. model_add("users/user/test/a", "formalisms/ProcessModel", """
  786. Start start {}
  787. Finish finish {}
  788. Next nxt (start, finish) {}
  789. """)
  790. assert read_info("users/user/test/a", "start") == ("Start", None)
  791. assert read_info("users/user/test/a", "finish") == ("Finish", None)
  792. assert read_info("users/user/test/a", "nxt") == ("Next", ("start", "finish"))
  793. # Read using different metamodel
  794. alter_context("users/user/test/a", "formalisms/Bottom")
  795. assert read_info("users/user/test/a", "start") == ("Node", None)
  796. assert read_info("users/user/test/a", "finish") == ("Node", None)
  797. assert read_info("users/user/test/a", "nxt") == ("Edge", ("start", "finish"))
  798. # Non-existing element
  799. try:
  800. read_info("users/user/test/a", "notthere")
  801. self.fail()
  802. except UnknownElement:
  803. pass
  804. # Non-existing model
  805. try:
  806. read_info("users/user/test/b", "start")
  807. self.fail()
  808. except UnknownModel:
  809. pass
  810. # No read permission
  811. try:
  812. read_info("administration/core", "administration")
  813. self.fail()
  814. except ReadPermissionDenied:
  815. pass
  816. # No write permission, but can query
  817. assert type(read_info("formalisms/SimpleClassDiagrams", "Class")) == tuple
  818. def test_op_read_attrs(self):
  819. # Basic behaviour
  820. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  821. SimpleAttribute Natural {
  822. name = "natural"
  823. }
  824. SimpleAttribute String {
  825. name = "string"
  826. }
  827. Class Place {
  828. name = "Place"
  829. name : String
  830. capacity : Natural
  831. }
  832. Class Transition {
  833. name = "Transition"
  834. name : String
  835. }
  836. Association P2T (Place, Transition) {
  837. name = "P2T"
  838. weight : Natural
  839. }
  840. Association T2P (Transition, Place) {
  841. name = "T2P"
  842. weight : Natural
  843. }
  844. """)
  845. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  846. assert read_attrs("users/user/test/a", "String") == {"constraint": {"AL": ""}, "name": "string"}
  847. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  848. assert read_attrs("users/user/test/a", "Transition") == {"constraint": {"AL": ""}, "name": "Transition", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  849. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  850. assert read_attrs("users/user/test/a", "T2P") == {"constraint": {"AL": ""}, "name": "T2P", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  851. model_add("users/user/test/b", "users/user/test/a", """
  852. Place p1 {
  853. name = "place 1"
  854. capacity = 2
  855. }
  856. Place p2 {
  857. name = "place 2"
  858. capacity = 1
  859. }
  860. Transition t1 {
  861. name = "transition"
  862. }
  863. P2T p2t (p1, t1) {
  864. weight = 4
  865. }
  866. T2P t2p (t1, p2) {
  867. weight = 10
  868. }
  869. """)
  870. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  871. assert read_attrs("users/user/test/b", "p2") == {"name": "place 2", "capacity": 1}
  872. assert read_attrs("users/user/test/b", "t1") == {"name": "transition"}
  873. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  874. assert read_attrs("users/user/test/b", "t2p") == {"weight": 10}
  875. # Non-existing model
  876. try:
  877. read_attrs("users/afa", "p1")
  878. self.fail()
  879. except UnknownModel:
  880. pass
  881. # Non-existing element
  882. try:
  883. read_attrs("users/user/test/a", "PPPPPPP")
  884. self.fail()
  885. except UnknownElement:
  886. pass
  887. # No read permissions
  888. try:
  889. read_attrs("administration/core", "formalisms")
  890. self.fail()
  891. except ReadPermissionDenied:
  892. pass
  893. # No write permissions, but can query
  894. assert type(read_attrs("formalisms/SimpleClassDiagrams", "Class")) == type(dict())
  895. def test_op_attr_assign(self):
  896. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  897. SimpleAttribute Natural {
  898. name = "natural"
  899. }
  900. SimpleAttribute String {
  901. name = "string"
  902. }
  903. Class Place {
  904. name = "Place"
  905. name : String
  906. capacity : Natural
  907. }
  908. Class Transition {
  909. name = "Transition"
  910. name : String
  911. }
  912. Association P2T (Place, Transition) {
  913. name = "P2T"
  914. weight : Natural
  915. }
  916. Association T2P (Transition, Place) {
  917. name = "T2P"
  918. weight : Natural
  919. }
  920. """)
  921. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  922. assert attr_assign("users/user/test/a", "Natural", "name", "nat") == None
  923. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "nat"}
  924. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  925. assert attr_assign("users/user/test/a", "Place", "name", "NewPlace") == None
  926. assert attr_assign("users/user/test/a", "Place", "abstract", False) == None
  927. assert attr_assign("users/user/test/a", "Place", "lower_cardinality", 4) == None
  928. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "NewPlace", "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  929. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  930. assert attr_assign("users/user/test/a", "P2T", "name", "PPP") == None
  931. assert attr_assign("users/user/test/a", "P2T", "source_lower_cardinality", 1) == None
  932. assert attr_assign("users/user/test/a", "P2T", "target_upper_cardinality", 10) == None
  933. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "PPP", "source_lower_cardinality": 1, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": 10, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  934. model_add("users/user/test/b", "users/user/test/a", """
  935. Place p1 {
  936. name = "place 1"
  937. capacity = 2
  938. }
  939. Place p2 {
  940. name = "place 2"
  941. capacity = 1
  942. }
  943. Transition t1 {
  944. name = "transition"
  945. }
  946. P2T p2t (p1, t1) {
  947. weight = 4
  948. }
  949. T2P t2p (t1, p2) {
  950. weight = 10
  951. }
  952. """)
  953. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  954. assert attr_assign("users/user/test/b", "p1", "name", "place 3") == None
  955. assert attr_assign("users/user/test/b", "p1", "capacity", 3) == None
  956. assert read_attrs("users/user/test/b", "p1") == {"name": "place 3", "capacity": 3}
  957. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  958. assert attr_assign("users/user/test/b", "p2t", "weight", 0) == None
  959. assert read_attrs("users/user/test/b", "p2t") == {"weight": 0}
  960. # Non-existing model
  961. try:
  962. attr_assign("users/afa", "p1", "name", "abc")
  963. self.fail()
  964. except UnknownModel:
  965. pass
  966. # Non-existing element
  967. try:
  968. attr_assign("users/user/test/a", "PPPPPPP", "name", "abc")
  969. self.fail()
  970. except UnknownElement:
  971. pass
  972. # No read permissions
  973. try:
  974. attr_assign("administration/core", "formalisms", "name", "abc")
  975. self.fail()
  976. except ReadPermissionDenied:
  977. pass
  978. # No write permissions
  979. try:
  980. attr_assign("formalisms/SimpleClassDiagrams", "Class", "name", "abc")
  981. self.fail()
  982. except WritePermissionDenied:
  983. pass
  984. # No such attribute
  985. try:
  986. attr_assign("users/user/test/a", "Place", "ddd", 1)
  987. self.fail()
  988. except UnknownAttribute:
  989. pass
  990. # Assign None, equals to attr_delete
  991. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "NewPlace", "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  992. attr_assign("users/user/test/a", "Place", "name", None)
  993. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": None, "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  994. def test_op_attr_delete(self):
  995. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  996. SimpleAttribute Natural {
  997. name = "natural"
  998. }
  999. SimpleAttribute String {
  1000. name = "string"
  1001. }
  1002. Class Place {
  1003. name = "Place"
  1004. name : String
  1005. capacity : Natural
  1006. }
  1007. Class Transition {
  1008. name = "Transition"
  1009. name : String
  1010. }
  1011. Association P2T (Place, Transition) {
  1012. name = "P2T"
  1013. weight : Natural
  1014. }
  1015. Association T2P (Transition, Place) {
  1016. name = "T2P"
  1017. weight : Natural
  1018. }
  1019. """)
  1020. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  1021. assert attr_delete("users/user/test/a", "Natural", "name") == None
  1022. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": None}
  1023. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1024. assert attr_delete("users/user/test/a", "Place", "name") == None
  1025. assert attr_delete("users/user/test/a", "Place", "abstract") == None
  1026. assert attr_delete("users/user/test/a", "Place", "lower_cardinality") == None
  1027. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1028. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1029. assert attr_delete("users/user/test/a", "P2T", "name") == None
  1030. assert attr_delete("users/user/test/a", "P2T", "source_lower_cardinality") == None
  1031. assert attr_delete("users/user/test/a", "P2T", "target_upper_cardinality") == None
  1032. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": None, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1033. model_add("users/user/test/b", "users/user/test/a", """
  1034. Place p1 {
  1035. name = "place 1"
  1036. capacity = 2
  1037. }
  1038. Place p2 {
  1039. name = "place 2"
  1040. capacity = 1
  1041. }
  1042. Transition t1 {
  1043. name = "transition"
  1044. }
  1045. P2T p2t (p1, t1) {
  1046. weight = 4
  1047. }
  1048. T2P t2p (t1, p2) {
  1049. weight = 10
  1050. }
  1051. """)
  1052. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  1053. assert attr_delete("users/user/test/b", "p1", "capacity") == None
  1054. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": None}
  1055. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  1056. assert attr_delete("users/user/test/b", "p2t", "weight") == None
  1057. assert read_attrs("users/user/test/b", "p2t") == {"weight": None}
  1058. # Non-existing model
  1059. try:
  1060. attr_delete("users/afa", "p1", "name")
  1061. self.fail()
  1062. except UnknownModel:
  1063. pass
  1064. # Non-existing element
  1065. try:
  1066. attr_delete("users/user/test/a", "PPPPPPP", "name")
  1067. self.fail()
  1068. except UnknownElement:
  1069. pass
  1070. # No read permissions
  1071. try:
  1072. attr_delete("administration/core", "formalisms", "name")
  1073. self.fail()
  1074. except ReadPermissionDenied:
  1075. pass
  1076. # No write permissions
  1077. try:
  1078. attr_delete("formalisms/SimpleClassDiagrams", "Class", "name")
  1079. self.fail()
  1080. except WritePermissionDenied:
  1081. pass
  1082. # No such attribute
  1083. try:
  1084. attr_delete("users/user/test/a", "Place", "ddd")
  1085. self.fail()
  1086. except UnknownAttribute:
  1087. pass
  1088. def test_op_attr_delete_code(self):
  1089. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1090. SimpleAttribute Natural {
  1091. name = "natural"
  1092. }
  1093. SimpleAttribute String {
  1094. name = "string"
  1095. }
  1096. Class Place {
  1097. name = "Place"
  1098. name : String
  1099. capacity : Natural
  1100. }
  1101. Class Transition {
  1102. name = "Transition"
  1103. name : String
  1104. }
  1105. Association P2T (Place, Transition) {
  1106. name = "P2T"
  1107. weight : Natural
  1108. }
  1109. Association T2P (Transition, Place) {
  1110. name = "T2P"
  1111. weight : Natural
  1112. }
  1113. """)
  1114. # Test what happens if removing a non-existing AL attribute
  1115. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1116. attr_delete("users/user/test/a", "Place", "constraint")
  1117. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1118. # Test what happens if removing an existing AL attribute
  1119. attr_assign_code("users/user/test/a", "Place", "constraint", """
  1120. String function a(value : Element):
  1121. return "OK"!
  1122. """)
  1123. attrs = read_attrs("users/user/test/a", "Place")
  1124. assert "AL" in attrs["constraint"]
  1125. assert attrs["constraint"]["AL"] != ""
  1126. attr_delete("users/user/test/a", "Place", "constraint")
  1127. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1128. def test_op_attr_assign_code(self):
  1129. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1130. SimpleAttribute Natural {
  1131. name = "natural"
  1132. }
  1133. SimpleAttribute String {
  1134. name = "string"
  1135. }
  1136. Class Place {
  1137. name = "Place"
  1138. name : String
  1139. capacity : Natural
  1140. }
  1141. Class Transition {
  1142. name = "Transition"
  1143. name : String
  1144. }
  1145. Association P2T (Place, Transition) {
  1146. name = "P2T"
  1147. weight : Natural
  1148. }
  1149. Association T2P (Transition, Place) {
  1150. name = "T2P"
  1151. weight : Natural
  1152. }
  1153. """)
  1154. # Test ordinary case
  1155. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1156. assert attr_assign_code("users/user/test/a", "Place", "constraint", """
  1157. String function a(value : Element):
  1158. return "OK"!
  1159. """) == None
  1160. attrs = read_attrs("users/user/test/a", "Place")
  1161. assert "AL" in attrs["constraint"]
  1162. assert attrs["constraint"]["AL"] != ""
  1163. assert AL_text(attrs["constraint"]["AL"]).strip() == """
  1164. String function a(value : Element):
  1165. return "OK"!
  1166. """.strip()
  1167. # Test assign when already assigned
  1168. attrs = read_attrs("users/user/test/a", "Place")
  1169. old_location = attrs["constraint"]["AL"]
  1170. old_text = AL_text(attrs["constraint"]["AL"])
  1171. assert attr_assign_code("users/user/test/a", "Place", "constraint", """
  1172. String function a(value : Element):
  1173. return "NOK"!
  1174. """) == None
  1175. attrs = read_attrs("users/user/test/a", "Place")
  1176. assert "AL" in attrs["constraint"]
  1177. assert attrs["constraint"]["AL"] != ""
  1178. assert attrs["constraint"]["AL"] != old_location
  1179. assert AL_text(attrs["constraint"]["AL"]).strip() == """
  1180. String function a(value : Element):
  1181. return "NOK"!
  1182. """.strip()
  1183. assert AL_text(attrs["constraint"]["AL"]).strip () != old_text.strip()
  1184. simple_code = \
  1185. """
  1186. String function a(value : Element):
  1187. return "OK"!
  1188. """
  1189. # Non-existing model
  1190. try:
  1191. attr_assign_code("users/afa", "p1", "name", simple_code)
  1192. self.fail()
  1193. except UnknownModel:
  1194. pass
  1195. # Non-existing element
  1196. try:
  1197. attr_assign_code("users/user/test/a", "PPPPPPP", "name", simple_code)
  1198. self.fail()
  1199. except UnknownElement:
  1200. pass
  1201. # No read permissions
  1202. try:
  1203. attr_assign_code("administration/core", "formalisms", "name", simple_code)
  1204. self.fail()
  1205. except ReadPermissionDenied:
  1206. pass
  1207. # No write permissions
  1208. try:
  1209. attr_assign_code("formalisms/SimpleClassDiagrams", "Class", "name", simple_code)
  1210. self.fail()
  1211. except WritePermissionDenied:
  1212. pass
  1213. # No such attribute
  1214. try:
  1215. attr_assign_code("users/user/test/a", "Place", "ddd", simple_code)
  1216. self.fail()
  1217. except UnknownAttribute:
  1218. pass
  1219. # Compilation error
  1220. try:
  1221. attr_assign_code("users/user/test/a", "Place", "constraint", "abc")
  1222. self.fail()
  1223. except CompilationError:
  1224. pass
  1225. def test_op_instantiate(self):
  1226. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  1227. assert element_list("users/user/test/a") == set([])
  1228. # Instantiate node element
  1229. ID = instantiate("users/user/test/a", "Class")
  1230. assert element_list("users/user/test/a") == set([(ID, "Class")])
  1231. assert read_info("users/user/test/a", ID) == ("Class", None)
  1232. # Instantiate node element with ID
  1233. ID2 = instantiate("users/user/test/a", "Class", ID="new_node")
  1234. assert ID2 == "new_node"
  1235. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class")])
  1236. assert read_info("users/user/test/a", ID2) == ("Class", None)
  1237. # Instantiate edge element
  1238. ID3 = instantiate("users/user/test/a", "Association", edge=(ID, ID2))
  1239. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association")])
  1240. assert read_info("users/user/test/a", ID3) == ("Association", (ID, ID2))
  1241. # Instantiate edge element with ID
  1242. ID4 = instantiate("users/user/test/a", "Association", edge=(ID, ID2), ID="new_edge")
  1243. assert ID4 == "new_edge"
  1244. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association")])
  1245. assert read_info("users/user/test/a", ID4) == ("Association", (ID, ID2))
  1246. # Instantiate edge from edge (source)
  1247. ID5 = instantiate("users/user/test/a", "Association", edge=(ID3, ID))
  1248. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association")])
  1249. assert read_info("users/user/test/a", ID5) == ("Association", (ID3, ID))
  1250. # Instantiate edge from edge (target)
  1251. ID6 = instantiate("users/user/test/a", "Association", edge=(ID, ID3))
  1252. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association"), (ID6, "Association")])
  1253. assert read_info("users/user/test/a", ID6) == ("Association", (ID, ID3))
  1254. # Instantiate edge from edge (source and target)
  1255. ID7 = instantiate("users/user/test/a", "Association", edge=(ID3, ID4))
  1256. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association"), (ID6, "Association"), (ID7, "Association")])
  1257. assert read_info("users/user/test/a", ID7) == ("Association", (ID3, ID4))
  1258. # Non-existing model
  1259. try:
  1260. instantiate("users/afa", "Association")
  1261. self.fail()
  1262. except UnknownModel:
  1263. pass
  1264. # Non-existing element
  1265. before = element_list("users/user/test/a")
  1266. try:
  1267. instantiate("users/user/test/a", "AAAAAAA")
  1268. self.fail()
  1269. except UnknownElement:
  1270. assert element_list("users/user/test/a") == before
  1271. # No read permissions
  1272. try:
  1273. instantiate("administration/core", "formalisms")
  1274. self.fail()
  1275. except ReadPermissionDenied:
  1276. pass
  1277. # No write permissions
  1278. before = element_list("users/user/test/a")
  1279. try:
  1280. instantiate("formalisms/SimpleClassDiagrams", "Class")
  1281. self.fail()
  1282. except WritePermissionDenied:
  1283. assert element_list("users/user/test/a") == before
  1284. # Pre-existing ID requested (node)
  1285. before = element_list("users/user/test/a")
  1286. try:
  1287. instantiate("users/user/test/a", "Class", ID=ID)
  1288. self.fail()
  1289. except ElementExists:
  1290. assert element_list("users/user/test/a") == before
  1291. # Pre-existing ID requested (edge)
  1292. before = element_list("users/user/test/a")
  1293. try:
  1294. instantiate("users/user/test/a", "Association", ID=ID, edge=(ID2, ID3))
  1295. self.fail()
  1296. except ElementExists:
  1297. assert element_list("users/user/test/a") == before
  1298. # Edge from non-existing ID
  1299. before = element_list("users/user/test/a")
  1300. try:
  1301. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", ID3))
  1302. self.fail()
  1303. except ElementExists:
  1304. assert element_list("users/user/test/a") == before
  1305. # Edge to non-existing ID
  1306. before = element_list("users/user/test/a")
  1307. try:
  1308. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", ID3))
  1309. self.fail()
  1310. except ElementExists:
  1311. assert element_list("users/user/test/a") == before
  1312. # Edge both non-existing ID
  1313. before = element_list("users/user/test/a")
  1314. try:
  1315. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", "non-existing2"))
  1316. self.fail()
  1317. except ElementExists:
  1318. assert element_list("users/user/test/a") == before
  1319. # Garbage type
  1320. before = element_list("users/user/test/a")
  1321. try:
  1322. instantiate("users/user/test/a", ("a", "b"))
  1323. self.fail()
  1324. except UnknownElement:
  1325. assert element_list("users/user/test/a") == before
  1326. # Garbage edge src
  1327. before = element_list("users/user/test/a")
  1328. try:
  1329. instantiate("users/user/test/a", "Association", edge=(('a', 'b'), "non-existing2"))
  1330. self.fail()
  1331. except UnknownElement:
  1332. assert element_list("users/user/test/a") == before
  1333. # Garbage edge dst
  1334. before = element_list("users/user/test/a")
  1335. try:
  1336. instantiate("users/user/test/a", "Association", edge=("non-existing", ('a', 'b')))
  1337. self.fail()
  1338. except UnknownElement:
  1339. assert element_list("users/user/test/a") == before
  1340. def test_op_delete_element(self):
  1341. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1342. Class A {}
  1343. """)
  1344. # Test simple delete
  1345. assert len(element_list_nice("users/user/test/a")) == 1
  1346. assert delete_element("users/user/test/a", "A") == None
  1347. assert len(element_list_nice("users/user/test/a")) == 0
  1348. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  1349. Class A {}
  1350. Class B {}
  1351. Association (A, B) {}
  1352. """)
  1353. # Test delete of element that causes other elements to be deleted as well
  1354. assert len(element_list_nice("users/user/test/b")) == 3
  1355. assert delete_element("users/user/test/b", "A") == None
  1356. assert len(element_list_nice("users/user/test/b")) == 1
  1357. model_add("users/user/test/c", "formalisms/SimpleClassDiagrams", """
  1358. Class A {}
  1359. Class B {}
  1360. Association C (A, B) {}
  1361. """)
  1362. # Test delete of edge that causes other elements to be deleted as well
  1363. assert len(element_list_nice("users/user/test/c")) == 3
  1364. assert delete_element("users/user/test/c", "C") == None
  1365. assert len(element_list_nice("users/user/test/c")) == 2
  1366. model_add("users/user/test/d", "formalisms/SimpleClassDiagrams", """
  1367. Class A {
  1368. name = "A"
  1369. }
  1370. """)
  1371. # Test delete of a "hidden" element
  1372. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": "A", "abstract": None}]
  1373. ID = [i for i in element_list("users/user/test/d") if i[1] == "Class_name"][0][0]
  1374. assert delete_element("users/user/test/d", ID) == None
  1375. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1376. # Non-existing model
  1377. try:
  1378. delete_element("users/afa", "Association")
  1379. self.fail()
  1380. except UnknownModel:
  1381. pass
  1382. # Non-existing element
  1383. before = element_list("users/user/test/a")
  1384. try:
  1385. delete_element("users/user/test/a", "AAAAAAA")
  1386. self.fail()
  1387. except UnknownElement:
  1388. assert element_list("users/user/test/a") == before
  1389. # No read permissions
  1390. try:
  1391. delete_element("administration/core", "formalisms")
  1392. self.fail()
  1393. except ReadPermissionDenied:
  1394. pass
  1395. # No write permissions
  1396. before = element_list("formalisms/SimpleClassDiagrams")
  1397. try:
  1398. delete_element("formalisms/SimpleClassDiagrams", "Class")
  1399. self.fail()
  1400. except WritePermissionDenied:
  1401. assert element_list("formalisms/SimpleClassDiagrams") == before
  1402. # Give garbage
  1403. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1404. try:
  1405. delete_element("users/user/test/d", ('abc', 'def'))
  1406. except UnknownElement:
  1407. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1408. def test_op_AL_text(self):
  1409. # Test normal situation with code provided by assignment
  1410. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  1411. Class A {}
  1412. """)
  1413. attr_assign_code("users/user/test/b", "A", "constraint", """
  1414. String function main(value : Element):
  1415. return "OK"!
  1416. """)
  1417. assert AL_text(read_attrs("users/user/test/b", "A")["constraint"]["AL"]).strip() == """
  1418. String function main(value : Element):
  1419. return "OK"!
  1420. """.strip()
  1421. # Test normal situation with code provided by HUTN parser (model)
  1422. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1423. Class A {
  1424. constraint = $
  1425. String function main(value : Element):
  1426. return "OK"!
  1427. $
  1428. }
  1429. """)
  1430. assert AL_text(read_attrs("users/user/test/a", "A")["constraint"]["AL"]).strip() == 'String function main(value : Element):\n\treturn "OK"!'
  1431. # Test AL_text on non-existing location
  1432. try:
  1433. AL_text("abc")
  1434. self.fail()
  1435. except UnknownLocation:
  1436. pass
  1437. # No permissions on locations directly, so there are no checks that have to be done
  1438. def test_op_read_outgoing(self):
  1439. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1440. SimpleAttribute String {}
  1441. Class A {
  1442. name : String
  1443. }
  1444. Class B {}
  1445. Association C (A, B) {}
  1446. Association D (C, B) {}
  1447. """)
  1448. # Test normal operation
  1449. assert read_outgoing("users/user/test/a", "A", "Association") == set(["C"])
  1450. assert read_outgoing("users/user/test/a", "A", "AttributeLink") == set(["A_name"])
  1451. # Test wildcard
  1452. assert read_outgoing("users/user/test/a", "A", "") == set(["A_name", "C"])
  1453. # Test association on association
  1454. assert read_outgoing("users/user/test/a", "C", "") == set(["D"])
  1455. # Test empty result
  1456. assert read_outgoing("users/user/test/a", "B", "") == set([])
  1457. # Test simpleattribute
  1458. assert read_outgoing("users/user/test/a", "String", "") == set([])
  1459. # Non-existing model
  1460. try:
  1461. read_outgoing("users/afa", "Association", "")
  1462. self.fail()
  1463. except UnknownModel:
  1464. pass
  1465. # Non-existing element
  1466. before = element_list("users/user/test/a")
  1467. try:
  1468. read_outgoing("users/user/test/a", "AAAAAAA", "")
  1469. self.fail()
  1470. except UnknownElement:
  1471. assert element_list("users/user/test/a") == before
  1472. # Non-existing type
  1473. before = element_list("users/user/test/a")
  1474. try:
  1475. read_outgoing("users/user/test/a", "A", "AAAAAAA")
  1476. self.fail()
  1477. except UnknownElement:
  1478. assert element_list("users/user/test/a") == before
  1479. # No read permissions
  1480. try:
  1481. read_outgoing("administration/core", "formalisms", "")
  1482. self.fail()
  1483. except ReadPermissionDenied:
  1484. pass
  1485. # No write permissions, but can query
  1486. assert type(read_outgoing("formalisms/SimpleClassDiagrams", "Class", "")) == type(set())
  1487. def test_op_read_incoming(self):
  1488. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1489. SimpleAttribute String {}
  1490. Class A {
  1491. name : String
  1492. }
  1493. Class B {}
  1494. Association C (A, B) {}
  1495. Association E (A, A) {}
  1496. Association D (C, B) {}
  1497. Association F (D, E) {}
  1498. """)
  1499. # Test normal operation
  1500. assert read_incoming("users/user/test/a", "B", "Association") == set(["C", "D"])
  1501. # Test wildcard
  1502. assert read_incoming("users/user/test/a", "B", "") == set(["C", "D"])
  1503. # Test association on association
  1504. assert read_incoming("users/user/test/a", "E", "") == set(["F"])
  1505. # Test double result
  1506. assert read_incoming("users/user/test/a", "A", "") == set(["E"])
  1507. # Test simpleattribute
  1508. assert read_incoming("users/user/test/a", "String", "") == set(["A_name"])
  1509. # Test empty result
  1510. assert read_incoming("users/user/test/a", "F", "") == set([])
  1511. # Non-existing model
  1512. try:
  1513. read_incoming("users/afa", "Association", "")
  1514. self.fail()
  1515. except UnknownModel:
  1516. pass
  1517. # Non-existing element
  1518. before = element_list("users/user/test/a")
  1519. try:
  1520. read_incoming("users/user/test/a", "AAAAAAA", "")
  1521. self.fail()
  1522. except UnknownElement:
  1523. assert element_list("users/user/test/a") == before
  1524. # Non-existing type
  1525. before = element_list("users/user/test/a")
  1526. try:
  1527. read_incoming("users/user/test/a", "A", "AAAAAAA")
  1528. self.fail()
  1529. except UnknownElement:
  1530. assert element_list("users/user/test/a") == before
  1531. # No read permissions
  1532. try:
  1533. read_incoming("administration/core", "formalisms", "")
  1534. self.fail()
  1535. except ReadPermissionDenied:
  1536. pass
  1537. # No write permissions, but can query
  1538. assert type(read_incoming("formalisms/SimpleClassDiagrams", "Class", "")) == type(set())
  1539. def test_op_read_association_source(self):
  1540. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1541. SimpleAttribute String {}
  1542. Class A {
  1543. name : String
  1544. }
  1545. Class B {}
  1546. Association C (A, B) {}
  1547. Association E (A, A) {}
  1548. Association D (C, B) {}
  1549. Association F (D, E) {}
  1550. """)
  1551. # Test normal operation
  1552. assert read_association_source("users/user/test/a", "C") == "A"
  1553. # Test association on association
  1554. assert read_association_source("users/user/test/a", "D") == "C"
  1555. # Test node
  1556. try:
  1557. assert read_association_source("users/user/test/a", "A")
  1558. self.fail()
  1559. except NotAnAssociation:
  1560. pass
  1561. # Non-existing model
  1562. try:
  1563. read_association_source("users/afa", "Association")
  1564. self.fail()
  1565. except UnknownModel:
  1566. pass
  1567. # Non-existing element
  1568. before = element_list("users/user/test/a")
  1569. try:
  1570. read_association_source("users/user/test/a", "AAAAAAA")
  1571. self.fail()
  1572. except UnknownElement:
  1573. assert element_list("users/user/test/a") == before
  1574. # No read permissions
  1575. try:
  1576. read_association_source("administration/core", "formalisms")
  1577. self.fail()
  1578. except ReadPermissionDenied:
  1579. pass
  1580. # No write permissions, but can query
  1581. assert read_association_source("formalisms/SimpleClassDiagrams", "Association") == "Class"
  1582. def test_op_read_association_destination(self):
  1583. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1584. SimpleAttribute String {}
  1585. Class A {
  1586. name : String
  1587. }
  1588. Class B {}
  1589. Association C (A, B) {}
  1590. Association E (A, A) {}
  1591. Association D (C, B) {}
  1592. Association F (D, E) {}
  1593. """)
  1594. # Test normal operation
  1595. assert read_association_destination("users/user/test/a", "C") == "B"
  1596. # Test association on association
  1597. assert read_association_destination("users/user/test/a", "F") == "E"
  1598. # Test node
  1599. try:
  1600. assert read_association_destination("users/user/test/a", "A")
  1601. self.fail()
  1602. except NotAnAssociation:
  1603. pass
  1604. # Non-existing model
  1605. try:
  1606. read_association_destination("users/afa", "Association")
  1607. self.fail()
  1608. except UnknownModel:
  1609. pass
  1610. # Non-existing element
  1611. before = element_list("users/user/test/a")
  1612. try:
  1613. read_association_destination("users/user/test/a", "AAAAAAA")
  1614. self.fail()
  1615. except UnknownElement:
  1616. assert element_list("users/user/test/a") == before
  1617. # No read permissions
  1618. try:
  1619. read_association_destination("administration/core", "formalisms")
  1620. self.fail()
  1621. except ReadPermissionDenied:
  1622. pass
  1623. # No write permissions, but can query
  1624. assert read_association_destination("formalisms/SimpleClassDiagrams", "Association") == "Class"
  1625. def test_op_connections_between(self):
  1626. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1627. SimpleAttribute String {}
  1628. Class A {
  1629. name1 : String
  1630. name2 : String
  1631. }
  1632. Class B {}
  1633. Association C (A, B) {}
  1634. Association D (A, B) {}
  1635. Association E (A, A) {}
  1636. Association F (C, B) {}
  1637. Association G (E, F) {}
  1638. """)
  1639. # Test normal operation
  1640. assert connections_between("users/user/test/a", "A", "A") == set(["Association", "Inheritance"])
  1641. assert connections_between("users/user/test/a", "A", "B") == set(["Association", "Inheritance"])
  1642. assert connections_between("users/user/test/a", "A", "C") == set(["Association", "Inheritance"])
  1643. # Test none allowed
  1644. assert connections_between("users/user/test/a", "A_name1", "A_name2") == set([])
  1645. # Non-existing model
  1646. try:
  1647. connections_between("users/afa", "A", "B")
  1648. self.fail()
  1649. except UnknownModel:
  1650. pass
  1651. # Non-existing element (1)
  1652. before = element_list("users/user/test/a")
  1653. try:
  1654. connections_between("users/user/test/a", "AA", "B")
  1655. self.fail()
  1656. except UnknownElement:
  1657. assert element_list("users/user/test/a") == before
  1658. # Non-existing element (2)
  1659. before = element_list("users/user/test/a")
  1660. try:
  1661. connections_between("users/user/test/a", "A", "BB")
  1662. self.fail()
  1663. except UnknownElement:
  1664. assert element_list("users/user/test/a") == before
  1665. # No read permissions
  1666. try:
  1667. connections_between("administration/core", "formalisms", "formalisms")
  1668. self.fail()
  1669. except ReadPermissionDenied:
  1670. pass
  1671. # No write permissions, but can query
  1672. assert connections_between("formalisms/SimpleClassDiagrams", "Association", "Association") == set(["Association", "Inheritance"])
  1673. def test_op_define_attribute(self):
  1674. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1675. SimpleAttribute String {}
  1676. SimpleAttribute Natural {}
  1677. Class A {}
  1678. Class B {}
  1679. Association C (A, B) {}
  1680. Association D (C, A) {}
  1681. """)
  1682. assert read_defined_attrs("users/user/test/a", "A") == ({}, {})
  1683. # Test normal operation
  1684. define_attribute("users/user/test/a", "A", "my_attr", "String")
  1685. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String"}, {})
  1686. # Test second attribute of same type
  1687. define_attribute("users/user/test/a", "A", "my_second_attr", "String")
  1688. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String", "my_second_attr": "String"}, {})
  1689. # Test third attribute with different type
  1690. define_attribute("users/user/test/a", "A", "a_third_one", "Natural")
  1691. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String", "my_second_attr": "String", "a_third_one": "Natural"}, {})
  1692. # Test same on associations
  1693. define_attribute("users/user/test/a", "C", "my_attr", "String")
  1694. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String"}, {})
  1695. # Test second attribute of same type
  1696. define_attribute("users/user/test/a", "C", "my_second_attr", "String")
  1697. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String", "my_second_attr": "String"}, {})
  1698. # Test third attribute with different type
  1699. define_attribute("users/user/test/a", "C", "a_third_one", "Natural")
  1700. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String", "my_second_attr": "String", "a_third_one": "Natural"}, {})
  1701. # Non-existing model
  1702. try:
  1703. define_attribute("users/afa", "A", "B", "C")
  1704. self.fail()
  1705. except UnknownModel:
  1706. pass
  1707. # Non-existing element (1)
  1708. before = element_list("users/user/test/a")
  1709. try:
  1710. define_attribute("users/user/test/a", "AA", "B", "Natural")
  1711. self.fail()
  1712. except UnknownElement:
  1713. assert element_list("users/user/test/a") == before
  1714. # Non-existing element (2)
  1715. before = element_list("users/user/test/a")
  1716. try:
  1717. define_attribute("users/user/test/a", "A", "B", "Natural2")
  1718. self.fail()
  1719. except UnknownElement:
  1720. assert element_list("users/user/test/a") == before
  1721. # Attribute exists
  1722. before = element_list("users/user/test/a")
  1723. try:
  1724. define_attribute("users/user/test/a", "A", "my_attr", "Natural")
  1725. self.fail()
  1726. except AttributeExists:
  1727. assert element_list("users/user/test/a") == before
  1728. # No read permissions
  1729. before = element_list("users/user/test/a")
  1730. try:
  1731. define_attribute("administration/core", "formalisms", "name", "A")
  1732. self.fail()
  1733. except ReadPermissionDenied:
  1734. assert element_list("users/user/test/a") == before
  1735. # No write permissions
  1736. before = element_list("users/user/test/a")
  1737. try:
  1738. define_attribute("formalisms/SimpleClassDiagrams", "Association", "new_name", "String")
  1739. self.fail()
  1740. except WritePermissionDenied:
  1741. assert element_list("users/user/test/a") == before
  1742. # None defined in non-SCD model
  1743. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  1744. try:
  1745. define_attribute("users/user/test/b", "a", "abc", "a")
  1746. self.fail()
  1747. except NoSimpleClassDiagramsModel:
  1748. pass
  1749. def test_op_read_defined_attrs(self):
  1750. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1751. SimpleAttribute String {}
  1752. SimpleAttribute Natural {}
  1753. Class A {
  1754. name = "ABC"
  1755. value : Natural
  1756. new_name ?: String
  1757. name : String
  1758. }
  1759. Association B (A, A) {
  1760. name = "DEF"
  1761. edge_value : Natural
  1762. name : String
  1763. other_value ?: String
  1764. }
  1765. Class C {}
  1766. Class D : A {
  1767. additional_attr : Natural
  1768. }
  1769. Association E : B (D, A) {
  1770. next_attr : String
  1771. }
  1772. """)
  1773. # Normal operation
  1774. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  1775. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  1776. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  1777. # Works with inheritance
  1778. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  1779. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  1780. # Non-existing model
  1781. try:
  1782. read_defined_attrs("users/afa", "A")
  1783. self.fail()
  1784. except UnknownModel:
  1785. pass
  1786. # Non-existing element
  1787. before = element_list("users/user/test/a")
  1788. try:
  1789. read_defined_attrs("users/user/test/a", "AA")
  1790. self.fail()
  1791. except UnknownElement:
  1792. assert element_list("users/user/test/a") == before
  1793. # No read permissions
  1794. before = element_list("users/user/test/a")
  1795. try:
  1796. read_defined_attrs("administration/core", "formalisms")
  1797. self.fail()
  1798. except ReadPermissionDenied:
  1799. assert element_list("users/user/test/a") == before
  1800. # No write permissions, but can still query
  1801. assert read_defined_attrs("formalisms/SimpleClassDiagrams", "Association") == ({"name": "String"}, {"abstract": "Boolean", "constraint": "ActionCode", "lower_cardinality": "Natural", "upper_cardinality": "Natural", "source_lower_cardinality": "Natural", "source_upper_cardinality": "Natural", "target_lower_cardinality": "Natural", "target_upper_cardinality": "Natural"})
  1802. # None defined in non-SCD model
  1803. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  1804. try:
  1805. read_defined_attrs("users/user/test/b", "a")
  1806. self.fail()
  1807. except NoSimpleClassDiagramsModel:
  1808. pass
  1809. def test_op_undefine_attribute(self):
  1810. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1811. SimpleAttribute String {}
  1812. SimpleAttribute Natural {}
  1813. Class A {
  1814. name = "ABC"
  1815. value : Natural
  1816. new_name ?: String
  1817. name : String
  1818. }
  1819. Association B (A, A) {
  1820. name = "DEF"
  1821. edge_value : Natural
  1822. name : String
  1823. other_value ?: String
  1824. }
  1825. Class C {}
  1826. Class D : A {
  1827. additional_attr : Natural
  1828. }
  1829. Association E : B (D, A) {
  1830. next_attr : String
  1831. }
  1832. """)
  1833. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  1834. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  1835. undefine_attribute("users/user/test/a", "A", "name")
  1836. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural"}, {"new_name": "String"})
  1837. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1838. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  1839. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  1840. undefine_attribute("users/user/test/a", "B", "other_value")
  1841. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {})
  1842. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {})
  1843. # Remove superclass definition
  1844. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1845. try:
  1846. undefine_attribute("users/user/test/a", "D", "value")
  1847. self.fail()
  1848. except SuperclassAttribute:
  1849. pass
  1850. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1851. # Non-existing model
  1852. try:
  1853. undefine_attribute("users/afa", "A", "B")
  1854. self.fail()
  1855. except UnknownModel:
  1856. pass
  1857. # Non-existing element
  1858. before = read_defined_attrs("users/user/test/a", "A")
  1859. try:
  1860. undefine_attribute("users/user/test/a", "AA", "B")
  1861. self.fail()
  1862. except UnknownElement:
  1863. assert read_defined_attrs("users/user/test/a", "A") == before
  1864. # Non-existing attribute
  1865. before = read_defined_attrs("users/user/test/a", "A")
  1866. try:
  1867. undefine_attribute("users/user/test/a", "A", "adfadf")
  1868. self.fail()
  1869. except UnknownAttribute:
  1870. assert read_defined_attrs("users/user/test/a", "A") == before
  1871. # No read permissions
  1872. try:
  1873. undefine_attribute("administration/core", "formalisms", "name")
  1874. self.fail()
  1875. except ReadPermissionDenied:
  1876. pass
  1877. # No write permissions
  1878. before = read_defined_attrs("formalisms/SimpleClassDiagrams", "Class")
  1879. try:
  1880. undefine_attribute("formalisms/SimpleClassDiagrams", "Class", "name")
  1881. self.fail()
  1882. except WritePermissionDenied:
  1883. assert read_defined_attrs("formalisms/SimpleClassDiagrams", "Class") == before
  1884. def test_op_attribute_optional(self):
  1885. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1886. SimpleAttribute String {}
  1887. SimpleAttribute Natural {}
  1888. Class A {
  1889. name = "ABC"
  1890. value : Natural
  1891. new_name ?: String
  1892. name : String
  1893. }
  1894. Association B (A, A) {
  1895. name = "DEF"
  1896. edge_value : Natural
  1897. name : String
  1898. other_value ?: String
  1899. }
  1900. Class C {}
  1901. Class D : A {
  1902. additional_attr : Natural
  1903. }
  1904. Association E : B (D, A) {
  1905. next_attr : String
  1906. }
  1907. """)
  1908. # Check initial situation
  1909. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  1910. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  1911. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  1912. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  1913. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  1914. # mandatory -> optional
  1915. attribute_optional("users/user/test/a", "A", "value", True)
  1916. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String"}, {"new_name": "String", "value": "Natural"})
  1917. # Check inheritance as well
  1918. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural"}, {"new_name": "String", "value": "Natural"})
  1919. # optional -> mandatory
  1920. attribute_optional("users/user/test/a", "A", "new_name", False)
  1921. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  1922. # Check inheritance as well
  1923. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  1924. # mandatory -> mandatory
  1925. attribute_optional("users/user/test/a", "A", "new_name", False)
  1926. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  1927. # Check inheritance as well
  1928. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  1929. # optional -> optional
  1930. attribute_optional("users/user/test/a", "A", "value", True)
  1931. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  1932. # Check inheritance as well
  1933. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  1934. # Non-existing model
  1935. try:
  1936. attribute_optional("users/afa", "A", "value", False)
  1937. self.fail()
  1938. except UnknownModel:
  1939. pass
  1940. # Non-existing element
  1941. before = element_list("users/user/test/a")
  1942. try:
  1943. attribute_optional("users/user/test/a", "AA", "value", False)
  1944. self.fail()
  1945. except UnknownElement:
  1946. assert element_list("users/user/test/a") == before
  1947. # No read permissions
  1948. try:
  1949. attribute_optional("administration/core", "formalisms", "name", True)
  1950. self.fail()
  1951. except ReadPermissionDenied:
  1952. pass
  1953. # No write permissions, but can still query
  1954. before = element_list("formalisms/SimpleClassDiagrams")
  1955. try:
  1956. attribute_optional("formalisms/SimpleClassDiagrams", "Class", "name", True)
  1957. self.fail()
  1958. except WritePermissionDenied:
  1959. assert element_list("formalisms/SimpleClassDiagrams") == before
  1960. # None defined in non-SCD model
  1961. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  1962. try:
  1963. attribute_optional("users/user/test/b", "a", "b", False)
  1964. self.fail()
  1965. except NoSimpleClassDiagramsModel:
  1966. pass
  1967. def test_op_attribute_type(self):
  1968. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1969. SimpleAttribute String {}
  1970. SimpleAttribute Natural {}
  1971. Class A {
  1972. name = "ABC"
  1973. value : Natural
  1974. new_name ?: String
  1975. name : String
  1976. }
  1977. Association B (A, A) {
  1978. name = "DEF"
  1979. edge_value : Natural
  1980. name : String
  1981. other_value ?: String
  1982. }
  1983. Class C {}
  1984. Class D : A {
  1985. additional_attr : Natural
  1986. }
  1987. Association E : B (D, A) {
  1988. next_attr : String
  1989. }
  1990. """)
  1991. # Check initial situation
  1992. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  1993. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  1994. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  1995. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  1996. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  1997. # Change type of node
  1998. attribute_type("users/user/test/a", "A", "value", "String")
  1999. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "String", "name": "String"}, {"new_name": "String"})
  2000. # Check inheritance as well
  2001. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "String", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2002. # Change type of edge
  2003. attribute_type("users/user/test/a", "B", "name", "Natural")
  2004. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "Natural"}, {"other_value": "String"})
  2005. # Check inheritance as well
  2006. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "Natural", "next_attr": "String"}, {"other_value": "String"})
  2007. # Non-existing model
  2008. try:
  2009. attribute_type("users/afa", "A", "value", "String")
  2010. self.fail()
  2011. except UnknownModel:
  2012. pass
  2013. # Non-existing element
  2014. before = element_list("users/user/test/a")
  2015. try:
  2016. attribute_type("users/user/test/a", "AA", "value", "String")
  2017. self.fail()
  2018. except UnknownElement:
  2019. assert element_list("users/user/test/a") == before
  2020. # Non-existing type
  2021. before = element_list("users/user/test/a")
  2022. try:
  2023. attribute_type("users/user/test/a", "A", "value", "SSS")
  2024. self.fail()
  2025. except UnknownElement:
  2026. assert element_list("users/user/test/a") == before
  2027. # No read permissions
  2028. try:
  2029. attribute_type("administration/core", "formalisms", "name", "Natural")
  2030. self.fail()
  2031. except ReadPermissionDenied:
  2032. pass
  2033. # No write permissions, but can still query
  2034. before = element_list("formalisms/SimpleClassDiagrams")
  2035. try:
  2036. attribute_type("formalisms/SimpleClassDiagrams", "Class", "name", "Natural")
  2037. self.fail()
  2038. except WritePermissionDenied:
  2039. assert element_list("formalisms/SimpleClassDiagrams") == before
  2040. # None defined in non-SCD model
  2041. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  2042. try:
  2043. attribute_type("users/user/test/b", "a", "b", "a")
  2044. self.fail()
  2045. except NoSimpleClassDiagramsModel:
  2046. pass
  2047. def test_op_attribute_name(self):
  2048. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2049. SimpleAttribute String {}
  2050. SimpleAttribute Natural {}
  2051. Class A {
  2052. name = "ABC"
  2053. value : Natural
  2054. new_name ?: String
  2055. name : String
  2056. }
  2057. Association B (A, A) {
  2058. name = "DEF"
  2059. edge_value : Natural
  2060. name : String
  2061. other_value ?: String
  2062. }
  2063. Class C {}
  2064. Class D : A {
  2065. additional_attr : Natural
  2066. }
  2067. Association E : B (D, A) {
  2068. next_attr : String
  2069. }
  2070. """)
  2071. # Check initial situation
  2072. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  2073. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  2074. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  2075. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2076. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  2077. # Change name of node
  2078. attribute_name("users/user/test/a", "A", "value", "new_value")
  2079. assert read_defined_attrs("users/user/test/a", "A") == ({"new_value": "Natural", "name": "String"}, {"new_name": "String"})
  2080. # Check inheritance as well
  2081. assert read_defined_attrs("users/user/test/a", "D") == ({"new_value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2082. # Change name of edge
  2083. attribute_name("users/user/test/a", "B", "name", "other_name")
  2084. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "other_name": "String"}, {"other_value": "String"})
  2085. # Check inheritance as well
  2086. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "other_name": "String", "next_attr": "String"}, {"other_value": "String"})
  2087. # Non-existing model
  2088. try:
  2089. attribute_name("users/afa", "A", "value", "str")
  2090. self.fail()
  2091. except UnknownModel:
  2092. pass
  2093. # Non-existing element
  2094. before = element_list("users/user/test/a")
  2095. try:
  2096. attribute_name("users/user/test/a", "AA", "value", "val2")
  2097. self.fail()
  2098. except UnknownElement:
  2099. assert element_list("users/user/test/a") == before
  2100. # Pre-existing name
  2101. before = element_list("users/user/test/a")
  2102. try:
  2103. attribute_name("users/user/test/a", "A", "new_value", "name")
  2104. self.fail()
  2105. except AttributeExists:
  2106. assert element_list("users/user/test/a") == before
  2107. # No read permissions
  2108. try:
  2109. attribute_name("administration/core", "formalisms", "name", "natural")
  2110. self.fail()
  2111. except ReadPermissionDenied:
  2112. pass
  2113. # No write permissions, but can still query
  2114. before = element_list("formalisms/SimpleClassDiagrams")
  2115. try:
  2116. attribute_name("formalisms/SimpleClassDiagrams", "Class", "name", "value")
  2117. self.fail()
  2118. except WritePermissionDenied:
  2119. assert element_list("formalisms/SimpleClassDiagrams") == before
  2120. # None defined in non-SCD model
  2121. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  2122. try:
  2123. attribute_name("users/user/test/b", "a", "b", "c")
  2124. self.fail()
  2125. except NoSimpleClassDiagramsModel:
  2126. pass
  2127. def test_op_group_create(self):
  2128. # Test normal operation
  2129. group_name_1 = "new_group"
  2130. group_name_2 = "group2"
  2131. group_name_3 = "other_group"
  2132. group_name_4 = "second_group"
  2133. assert group_list() == set([])
  2134. group_create(group_name_1)
  2135. assert group_list() == set([(group_name_1, True)])
  2136. # Test second group
  2137. assert group_list() == set([(group_name_1, True)])
  2138. group_create(group_name_2)
  2139. assert group_list() == set([(group_name_1, True), (group_name_2, True)])
  2140. # Test other groups
  2141. self.do_as_user("user2", group_create, [group_name_3])
  2142. self.do_as_user("user2", group_create, [group_name_4])
  2143. assert group_list() == set([(group_name_1, True), (group_name_2, True)])
  2144. # Test non-admin groups
  2145. self.do_as_user("user2", group_join, [group_name_3, "user"])
  2146. assert group_list() == set([(group_name_1, True), (group_name_2, True), (group_name_3, False)])
  2147. # Test create of existing group (member)
  2148. before = group_list()
  2149. try:
  2150. group_create(group_name_1)
  2151. self.fail()
  2152. except GroupExists:
  2153. assert group_list() == before
  2154. # Test create of existing group (non-member)
  2155. before = group_list()
  2156. try:
  2157. group_create(group_name_4)
  2158. self.fail()
  2159. except GroupExists:
  2160. assert group_list() == before
  2161. # Delete all groups again
  2162. self.do_as_user("admin", group_delete, [group_name_1])
  2163. self.do_as_user("admin", group_delete, [group_name_2])
  2164. self.do_as_user("admin", group_delete, [group_name_3])
  2165. self.do_as_user("admin", group_delete, [group_name_4])
  2166. def test_op_group_delete(self):
  2167. group_name_1 = "new_group" # Group with admin permissions
  2168. group_name_2 = "group2" # Group without permissions
  2169. group_name_3 = "other_group" # No member
  2170. group_name_4 = "second_group" # Non-existing group
  2171. # Ensure user2 exists
  2172. self.do_as_user("user2", lambda : 1, [])
  2173. # Create some groups first
  2174. group_create(group_name_1)
  2175. self.do_as_user("admin", group_create, [group_name_2])
  2176. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2177. self.do_as_user("admin", group_create, [group_name_3])
  2178. # Try to delete all
  2179. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2180. group_delete(group_name_1)
  2181. assert group_list() == set([(group_name_2, False)])
  2182. # Remove group that we don't own
  2183. try:
  2184. group_delete(group_name_2)
  2185. self.fail()
  2186. except GroupPermissionDenied:
  2187. assert group_list() == set([(group_name_2, False)])
  2188. # Remove group that we are not even member of
  2189. try:
  2190. group_delete(group_name_3)
  2191. self.fail()
  2192. except GroupPermissionDenied:
  2193. assert group_list() == set([(group_name_2, False)])
  2194. # Remove non-existing group
  2195. try:
  2196. group_delete(group_name_4)
  2197. except UnknownGroup:
  2198. assert group_list() == set([(group_name_2, False)])
  2199. # Test if other users can no longer see removed groups
  2200. group_create(group_name_1)
  2201. group_join(group_name_1, "user2")
  2202. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2203. group_delete(group_name_1)
  2204. assert self.do_as_user("user2", group_list, []) == set([])
  2205. # Delete all groups again
  2206. self.do_as_user("admin", group_delete, [group_name_2])
  2207. self.do_as_user("admin", group_delete, [group_name_3])
  2208. def test_op_group_list(self):
  2209. group_name_1 = "new_group" # Group with admin permissions
  2210. group_name_2 = "group2" # Group without permissions
  2211. group_name_3 = "other_group" # No member
  2212. group_name_4 = "second_group" # Non-existing group
  2213. # Ensure user2 exists
  2214. self.do_as_user("user2", lambda : 1, [])
  2215. # Create some groups first
  2216. group_create(group_name_1)
  2217. self.do_as_user("admin", group_create, [group_name_2])
  2218. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2219. self.do_as_user("admin", group_create, [group_name_3])
  2220. # Assure that groups of all users are correct
  2221. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2222. assert self.do_as_user("user2", group_list, []) == set([])
  2223. assert self.do_as_user("admin", group_list, []) == set([("admin", False), (group_name_2, True), (group_name_3, True)])
  2224. # Delete a group to check that everything is correctly listed afterwards
  2225. self.do_as_user("admin", group_delete, [group_name_2])
  2226. assert group_list() == set([(group_name_1, True)])
  2227. assert self.do_as_user("user2", group_list, []) == set([])
  2228. assert self.do_as_user("admin", group_list, []) == set([("admin", False), (group_name_3, True)])
  2229. # Delete all groups again
  2230. self.do_as_user("admin", group_delete, [group_name_1])
  2231. self.do_as_user("admin", group_delete, [group_name_3])
  2232. def do_as_user(self, username, operation, args):
  2233. user_logout()
  2234. login(username, username)
  2235. try:
  2236. result = operation(*args)
  2237. except:
  2238. user_logout()
  2239. login("user", "user")
  2240. raise
  2241. else:
  2242. user_logout()
  2243. login("user", "user")
  2244. return result
  2245. def test_op_group_join(self):
  2246. group_name_1 = "new_group" # Group with admin permissions
  2247. group_name_2 = "group2" # Group without permissions
  2248. group_name_3 = "other_group" # No member
  2249. group_name_4 = "second_group" # Non-existing group
  2250. # Ensure user2 exists
  2251. self.do_as_user("user2", lambda : 1, [])
  2252. # Create some groups first
  2253. group_create(group_name_1)
  2254. self.do_as_user("admin", group_create, [group_name_2])
  2255. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2256. self.do_as_user("admin", group_create, [group_name_3])
  2257. # Test for group join basic use, of group where we are admin
  2258. assert group_join(group_name_1, "user2") == None
  2259. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2260. # Test for group join of group where we are no admin
  2261. try:
  2262. group_join(group_name_2, "user2") == None
  2263. self.fail()
  2264. except GroupPermissionDenied:
  2265. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2266. # Test for group join of group where we are not even a member
  2267. try:
  2268. group_join(group_name_3, "user2") == None
  2269. self.fail()
  2270. except GroupPermissionDenied:
  2271. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2272. # Test for group join of group that already has user as member
  2273. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2274. try:
  2275. group_join(group_name_1, "user2") == None
  2276. self.fail()
  2277. except UserExists:
  2278. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2279. # Test for group join of non-existing user
  2280. try:
  2281. group_join(group_name_1, "user123") == None
  2282. self.fail()
  2283. except UnknownUser:
  2284. pass
  2285. # Test for group join of non-existing group
  2286. try:
  2287. group_join(group_name_4, "user2") == None
  2288. self.fail()
  2289. except UnknownGroup:
  2290. pass
  2291. # Delete all groups again
  2292. self.do_as_user("admin", group_delete, [group_name_1])
  2293. self.do_as_user("admin", group_delete, [group_name_2])
  2294. self.do_as_user("admin", group_delete, [group_name_3])
  2295. def test_op_group_kick(self):
  2296. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2297. group_name_1 = "new_group" # Group with admin permissions
  2298. group_name_2 = "group2" # Group without permissions
  2299. group_name_3 = "other_group" # No member
  2300. group_name_4 = "second_group" # Non-existing group
  2301. # Ensure user2 exists
  2302. self.do_as_user("user2", lambda : 1, [])
  2303. # Create some groups first
  2304. group_create(group_name_1)
  2305. self.do_as_user("admin", group_create, [group_name_2])
  2306. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2307. # Kick user from group
  2308. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2309. self.do_as_user("admin", group_kick, [group_name_2, "user"])
  2310. assert group_list() == set([(group_name_1, True)])
  2311. # Kick self (owner) from group
  2312. assert group_list() == set([(group_name_1, True)])
  2313. group_create(group_name_3)
  2314. assert group_list() == set([(group_name_1, True), (group_name_3, True)])
  2315. assert group_kick(group_name_3, "user") == None
  2316. assert group_list() == set([(group_name_1, True)])
  2317. # Empty groups are not deleted
  2318. self.do_as_user("admin", group_join, [group_name_3, "user"])
  2319. # Kick user not in group
  2320. try:
  2321. self.do_as_user("admin", group_kick, [group_name_2, "user2"])
  2322. self.fail()
  2323. except UserNotInGroup:
  2324. pass
  2325. self.do_as_user("admin", group_delete, [group_name_1])
  2326. self.do_as_user("admin", group_delete, [group_name_2])
  2327. self.do_as_user("admin", group_delete, [group_name_3])
  2328. def do_create_user(self, name):
  2329. self.do_as_user(name, lambda : 1, [])
  2330. def do_test_permission(self, model, expected_permissions):
  2331. for user, permission in expected_permissions.items():
  2332. assert self.do_as_user(user, read_permissions, [model]) == permission
  2333. def test_op_permission_owner_model(self):
  2334. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2335. group_create("users")
  2336. permission_group("users/user/test/a", "users")
  2337. permission_modify("users/user/test/a", "210")
  2338. self.do_create_user("group_user")
  2339. self.do_create_user("other_user")
  2340. group_join("users", "group_user")
  2341. # Test initial situation, where we have owners user:users with permission 210
  2342. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2343. # Change owner, but permissions stay the same
  2344. permission_owner("users/user/test/a", "group_user")
  2345. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2346. # Can no longer modify permissions: only owner can do that
  2347. try:
  2348. permission_owner("users/user/test/a", "admin")
  2349. self.fail()
  2350. except UserPermissionDenied:
  2351. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2352. # Change owner to admin, who always has RW permissions
  2353. self.do_as_user("group_user", permission_owner, ["users/user/test/a", "admin"])
  2354. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "R", "other_user": ""})
  2355. # Give permissions back to someone else, and test that admin can always do operations, even if not owner
  2356. self.do_as_user("admin", permission_owner, ["users/user/test/a", "group_user"])
  2357. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2358. self.do_as_user("admin", permission_owner, ["users/user/test/a", "user"])
  2359. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2360. # Test non-existing model
  2361. try:
  2362. permission_owner("adfadf", "admin")
  2363. self.fail()
  2364. except UnknownModel:
  2365. pass
  2366. # Test non-existing user
  2367. try:
  2368. self.do_as_user("admin", permission_owner, ["users/user/test/a", "dfadf"])
  2369. self.fail()
  2370. except UnknownUser:
  2371. pass
  2372. # Test assign to user who is already owner
  2373. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2374. self.do_as_user("admin", permission_owner, ["users/user/test/a", "user"])
  2375. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2376. group_delete("users")
  2377. def test_op_permission_owner_folder(self):
  2378. folder_create("users/user/test/a/b/c")
  2379. group_create("users")
  2380. self.do_create_user("group_user")
  2381. group_join("users", "group_user")
  2382. permission_group("users/user/test/a/b", "users")
  2383. permission_modify("users/user/test/a/b", "210")
  2384. # Test permissions
  2385. self.do_test_permission("users/user/test/", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2386. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2387. self.do_test_permission("users/user/test/a/b", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2388. self.do_test_permission("users/user/test/a/b/c", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2389. # But test if they are really applicable
  2390. try:
  2391. self.do_as_user("group_user", model_list, ["users/user/test"])
  2392. self.fail()
  2393. except ReadPermissionDenied:
  2394. pass
  2395. try:
  2396. self.do_as_user("group_user", model_list, ["users/user/test/a"])
  2397. self.fail()
  2398. except ReadPermissionDenied:
  2399. pass
  2400. self.do_as_user("group_user", model_list, ["users/user/test/a/b"])
  2401. try:
  2402. self.do_as_user("group_user", model_list, ["users/user/test/a/b/c"])
  2403. self.fail()
  2404. except ReadPermissionDenied:
  2405. pass
  2406. group_delete("users")
  2407. def test_op_read_permissions_model(self):
  2408. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2409. group_create("users")
  2410. self.do_create_user("group_user")
  2411. self.do_create_user("other_user")
  2412. group_join("users", "group_user")
  2413. permission_group("users/user/test/a", "users")
  2414. permission_modify("users/user/test/a", "210")
  2415. # Test all four cases
  2416. assert self.do_as_user("user", read_permissions, ["users/user/test/a"]) == "RW"
  2417. assert self.do_as_user("group_user", read_permissions, ["users/user/test/a"]) == "R"
  2418. assert self.do_as_user("other_user", read_permissions, ["users/user/test/a"]) == ""
  2419. assert self.do_as_user("admin", read_permissions, ["users/user/test/a"]) == "RW"
  2420. # Test same for root location (empty string)
  2421. assert self.do_as_user("user", read_permissions, [""]) == "R"
  2422. assert self.do_as_user("group_user", read_permissions, [""]) == "R"
  2423. assert self.do_as_user("other_user", read_permissions, [""]) == "R"
  2424. assert self.do_as_user("admin", read_permissions, [""]) == "RW"
  2425. # Test for non-existing location
  2426. try:
  2427. read_permissions("adfadsf")
  2428. self.fail()
  2429. except UnknownLocation:
  2430. pass
  2431. group_delete("users")
  2432. def test_op_read_permissions_folder(self):
  2433. folder_create("users/user/test/a")
  2434. group_create("users")
  2435. self.do_create_user("group_user")
  2436. self.do_create_user("other_user")
  2437. group_join("users", "group_user")
  2438. permission_group("users/user/test/a", "users")
  2439. permission_modify("users/user/test/a", "210")
  2440. # Test all four cases
  2441. assert self.do_as_user("user", read_permissions, ["users/user/test/a"]) == "RW"
  2442. assert self.do_as_user("group_user", read_permissions, ["users/user/test/a"]) == "R"
  2443. assert self.do_as_user("other_user", read_permissions, ["users/user/test/a"]) == ""
  2444. assert self.do_as_user("admin", read_permissions, ["users/user/test/a"]) == "RW"
  2445. # Test for non-existing location
  2446. try:
  2447. read_permissions("adfadsf")
  2448. self.fail()
  2449. except UnknownLocation:
  2450. pass
  2451. group_delete("users")
  2452. def test_op_permission_group_model(self):
  2453. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2454. group_create("users")
  2455. group_create("other_group")
  2456. permission_modify("users/user/test/a", "210")
  2457. self.do_create_user("group_user")
  2458. self.do_create_user("other_user")
  2459. group_join("users", "group_user")
  2460. # Test initial situation, where we have owners user:users with permission 210
  2461. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2462. # Change owner, but permissions stay the same
  2463. permission_group("users/user/test/a", "users")
  2464. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2465. # Only owner can modify group permissions
  2466. try:
  2467. self.do_as_user("group_user", permission_group, ["users/user/test/a", "other_group"])
  2468. self.fail()
  2469. except UserPermissionDenied:
  2470. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2471. # Test that admin can always do operations, even if not owner
  2472. # And test that user permissions still override group permissions
  2473. self.do_as_user("admin", permission_group, ["users/user/test/a", "admin"])
  2474. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2475. self.do_as_user("admin", permission_group, ["users/user/test/a", "other_group"])
  2476. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2477. self.do_as_user("admin", permission_group, ["users/user/test/a", "users"])
  2478. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2479. # Test non-existing model
  2480. try:
  2481. permission_group("adfadf", "admin")
  2482. self.fail()
  2483. except UnknownModel:
  2484. pass
  2485. # Test non-existing group
  2486. try:
  2487. self.do_as_user("admin", permission_group, ["users/user/test/a", "dfadf"])
  2488. self.fail()
  2489. except UnknownGroup:
  2490. pass
  2491. # Test assign to group which is already owning group, resulting in no change
  2492. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2493. self.do_as_user("admin", permission_group, ["users/user/test/a", "users"])
  2494. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2495. self.do_as_user("admin", group_delete, ["other_group"])
  2496. self.do_as_user("admin", group_delete, ["users"])
  2497. def test_op_permission_group_folder(self):
  2498. folder_create("users/user/test/a/b/c")
  2499. group_create("users")
  2500. self.do_create_user("group_user")
  2501. group_join("users", "group_user")
  2502. permission_group("users/user/test/a/b", "users")
  2503. permission_modify("users/user/test/a/b", "210")
  2504. # Test permissions
  2505. self.do_test_permission("users/user/test/", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2506. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2507. self.do_test_permission("users/user/test/a/b", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2508. self.do_test_permission("users/user/test/a/b/c", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2509. # But test if they are really applicable
  2510. try:
  2511. self.do_as_user("group_user", model_list, ["users/user/test"])
  2512. self.fail()
  2513. except ReadPermissionDenied:
  2514. pass
  2515. try:
  2516. self.do_as_user("group_user", model_list, ["users/user/test/a"])
  2517. self.fail()
  2518. except ReadPermissionDenied:
  2519. pass
  2520. self.do_as_user("group_user", model_list, ["users/user/test/a/b"])
  2521. try:
  2522. self.do_as_user("group_user", model_list, ["users/user/test/a/b/c"])
  2523. self.fail()
  2524. except ReadPermissionDenied:
  2525. pass
  2526. group_delete("users")
  2527. def test_op_group_owner_add(self):
  2528. group_create("group1")
  2529. group_create("group2")
  2530. group_create("group3")
  2531. self.do_create_user("new_user")
  2532. group_join("group1", "new_user")
  2533. # Basic use of group owner: promote a user
  2534. assert self.do_as_user("new_user", group_list, []) == set([("group1", False)])
  2535. assert group_owner_add("group1", "new_user") == None
  2536. assert self.do_as_user("new_user", group_list, []) == set([("group1", True)])
  2537. # Or instantaneously make owner, thereby also making a member
  2538. assert self.do_as_user("new_user", group_list, []) == set([("group1", True)])
  2539. assert group_owner_add("group2", "new_user") == None
  2540. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2541. # Test for user that is already an owner
  2542. assert group_owner_add("group1", "new_user") == None
  2543. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2544. # Test non-existing user
  2545. try:
  2546. group_owner_add("group1", "abc")
  2547. self.fail()
  2548. except UnknownUser:
  2549. pass
  2550. # Test non-existing group
  2551. try:
  2552. group_owner_add("group4", "new_user")
  2553. self.fail()
  2554. except UnknownGroup:
  2555. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2556. # Only an owner of the group can do this
  2557. group_owner_delete("group2", "new_user")
  2558. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2559. try:
  2560. self.do_as_user("new_user", group_owner_add, ["group2", "user"])
  2561. self.fail()
  2562. except GroupPermissionDenied:
  2563. pass
  2564. # Also non-members can't modify
  2565. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2566. try:
  2567. self.do_as_user("new_user", group_owner_add, ["group3", "user"])
  2568. self.fail()
  2569. except GroupPermissionDenied:
  2570. pass
  2571. # Delete all groups again
  2572. group_delete("group1")
  2573. group_delete("group2")
  2574. group_delete("group3")
  2575. def test_op_group_owner_delete(self):
  2576. group_create("group1")
  2577. group_create("group2")
  2578. group_create("group3")
  2579. self.do_create_user("new_user")
  2580. group_owner_add("group1", "new_user")
  2581. group_owner_add("group2", "new_user")
  2582. # Basic use: remove owner, but stay a member
  2583. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2584. assert group_owner_delete("group2", "new_user") == None
  2585. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2586. # Test for user that is already not an owner
  2587. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2588. assert group_owner_delete("group2", "new_user") == None
  2589. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2590. # Test for user that is not even a member
  2591. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2592. try:
  2593. group_owner_delete("group3", "new_user")
  2594. self.fail()
  2595. except UserNotInGroup:
  2596. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2597. # Test non-existing user
  2598. try:
  2599. group_owner_delete("group1", "abc")
  2600. self.fail()
  2601. except UnknownUser:
  2602. pass
  2603. # Test non-existing group
  2604. try:
  2605. group_owner_delete("group4", "new_user")
  2606. self.fail()
  2607. except UnknownGroup:
  2608. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2609. # Only an owner of the group can do this
  2610. group_owner_delete("group2", "new_user")
  2611. assert group_list() == set([("group1", True), ("group2", True), ("group3", True)])
  2612. try:
  2613. self.do_as_user("new_user", group_owner_delete, ["group2", "user"])
  2614. self.fail()
  2615. except GroupPermissionDenied:
  2616. assert group_list() == set([("group1", True), ("group2", True), ("group3", True)])
  2617. # Also non-members can't modify
  2618. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2619. try:
  2620. self.do_as_user("new_user", group_owner_delete, ["group3", "user"])
  2621. self.fail()
  2622. except GroupPermissionDenied:
  2623. pass
  2624. # Delete all groups again
  2625. group_delete("group1")
  2626. group_delete("group2")
  2627. group_delete("group3")
  2628. def test_op_conformance_add(self):
  2629. # Add some conformance relations
  2630. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2631. Class A {}
  2632. Class B {}
  2633. Association C (A, B) {}
  2634. """)
  2635. # Add conformance bottom relation
  2636. t = model_types("users/user/test/a")
  2637. assert len(t) == 1
  2638. t = t.pop()
  2639. print(t)
  2640. assert t[0] == "formalisms/SimpleClassDiagrams"
  2641. assert t[1] != None
  2642. assert t[2] == None
  2643. # Check if the type is added, but without any type mapping associated to it
  2644. conformance_add("users/user/test/a", "formalisms/Bottom")
  2645. ts = model_types("users/user/test/a")
  2646. assert len(ts) == 2
  2647. while ts:
  2648. t = ts.pop()
  2649. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2650. if t[0] == "formalisms/SimpleClassDiagrams":
  2651. assert t[1] != None
  2652. elif t[1] == "formalisms/Bottom":
  2653. # Type mapping is empty
  2654. assert t[1] == None
  2655. assert t[2] == None
  2656. # Check if a type mapping is created when model is opened as bottom
  2657. alter_context("users/user/test/a", "formalisms/Bottom")
  2658. element_list("users/user/test/a")
  2659. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2660. ts = model_types("users/user/test/a")
  2661. assert len(ts) == 2
  2662. while ts:
  2663. t = ts.pop()
  2664. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2665. assert t[1] != None
  2666. assert t[2] == None
  2667. # Check if we can add a second one to the same MM
  2668. conformance_add("users/user/test/a", "formalisms/Bottom")
  2669. ts = model_types("users/user/test/a")
  2670. assert len(ts) == 3
  2671. assert ("formalisms/Bottom", None, None) in ts
  2672. found = False
  2673. while ts:
  2674. t = ts.pop()
  2675. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2676. if t[0] == "formalisms/SimpleClassDiagrams":
  2677. assert t[1] != None
  2678. elif t[0] == "formalisms/Bottom":
  2679. # Type mapping is empty
  2680. if t[1] != None:
  2681. found = True
  2682. assert t[2] == None
  2683. assert found
  2684. # Check add of non-existing model
  2685. try:
  2686. conformance_add("users/user/test/b", "formalisms/Bottom")
  2687. self.fail()
  2688. except UnknownModel:
  2689. pass
  2690. # Check add of non-existing metamodel
  2691. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  2692. before = model_types("users/user/test/b")
  2693. try:
  2694. conformance_add("users/user/test/b", "formalisms/Bottom2")
  2695. self.fail()
  2696. except UnknownModel:
  2697. assert model_types("users/user/test/b") == before
  2698. def test_op_conformance_delete(self):
  2699. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2700. Class A {}
  2701. Class B {}
  2702. Association C (A, B) {}
  2703. """)
  2704. # Add conformance bottom relation
  2705. conformance_add("users/user/test/a", "formalisms/Bottom")
  2706. # Verify initial state
  2707. ts = model_types("users/user/test/a")
  2708. assert len(ts) == 2
  2709. while ts:
  2710. t = ts.pop()
  2711. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2712. if t[0] == "formalisms/SimpleClassDiagrams":
  2713. assert t[1] != None
  2714. elif t[1] == "formalisms/Bottom":
  2715. # Type mapping is empty
  2716. assert t[1] == None
  2717. assert t[2] == None
  2718. # Now remove it again
  2719. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2720. ts = model_types("users/user/test/a")
  2721. assert len(ts) == 1
  2722. t = ts.pop()
  2723. assert t[0] == "formalisms/SimpleClassDiagrams"
  2724. assert t[1] != None
  2725. assert t[2] == None
  2726. # Add conformance bottom relation twice
  2727. conformance_add("users/user/test/a", "formalisms/Bottom")
  2728. conformance_add("users/user/test/a", "formalisms/Bottom")
  2729. # Should be there twice, but set flattens it to once
  2730. ts = model_types("users/user/test/a")
  2731. assert len(ts) == 2
  2732. while ts:
  2733. t = ts.pop()
  2734. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2735. if t[0] == "formalisms/SimpleClassDiagrams":
  2736. assert t[1] != None
  2737. elif t[1] == "formalisms/Bottom":
  2738. # Type mapping is empty
  2739. assert t[1] == None
  2740. assert t[2] == None
  2741. # Now remove it (once called, but invoked for all occurences!)
  2742. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2743. ts = model_types("users/user/test/a")
  2744. assert len(ts) == 1
  2745. t = ts.pop()
  2746. assert t[0] == "formalisms/SimpleClassDiagrams"
  2747. assert t[1] != None
  2748. assert t[2] == None
  2749. # Now actually test filtering capabilities
  2750. alter_context("users/user/test/a", "formalisms/Bottom")
  2751. element_list("users/user/test/a")
  2752. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2753. # Model should be there with a type mapping model
  2754. ts = model_types("users/user/test/a")
  2755. assert len(ts) == 2
  2756. while ts:
  2757. t = ts.pop()
  2758. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2759. assert t[1] != None
  2760. assert t[2] == None
  2761. # Add a second bottom relation
  2762. conformance_add("users/user/test/a", "formalisms/Bottom")
  2763. # And remove the one without model, to make sure that it is not a wildcard!
  2764. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2765. ts = model_types("users/user/test/a")
  2766. assert len(ts) == 2
  2767. while ts:
  2768. t = ts.pop()
  2769. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2770. assert t[1] != None
  2771. assert t[2] == None
  2772. # Add again, but now remove the one with type mapping
  2773. conformance_add("users/user/test/a", "formalisms/Bottom")
  2774. # First try one that doesn't match...
  2775. conformance_delete("users/user/test/a", "formalisms/Bottom", "NOTHING")
  2776. ts = model_types("users/user/test/a")
  2777. assert len(ts) == 3
  2778. while ts:
  2779. t = ts.pop()
  2780. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2781. assert t[2] == None
  2782. # Now try one with the actual name
  2783. actual_name = [i for i in model_types("users/user/test/a") if i[0] == "formalisms/Bottom" and i[1] != None][0]
  2784. assert len(model_types("users/user/test/a")) == 3
  2785. conformance_delete("users/user/test/a", "formalisms/SimpleClassDiagrams", actual_name)
  2786. # Nothing removed, because of wrong TM model
  2787. assert len(model_types("users/user/test/a")) == 3
  2788. # Now remove correct one
  2789. conformance_delete("users/user/test/a", "formalisms/Bottom", actual_name)
  2790. ts = model_types("users/user/test/a")
  2791. assert len(ts) == 2
  2792. while ts:
  2793. t = ts.pop()
  2794. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2795. if t[0] == "formalisms/SimpleClassDiagrams":
  2796. assert t[1] != None
  2797. elif t[1] == "formalisms/Bottom":
  2798. # Type mapping is empty
  2799. assert t[1] == None
  2800. assert t[2] == None
  2801. # Check add of non-existing model
  2802. try:
  2803. conformance_add("users/user/test/b", "formalisms/Bottom")
  2804. self.fail()
  2805. except UnknownModel:
  2806. pass
  2807. # Check add of non-existing metamodel
  2808. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  2809. before = model_types("users/user/test/b")
  2810. try:
  2811. conformance_add("users/user/test/b", "formalisms/Bottom2")
  2812. self.fail()
  2813. except UnknownModel:
  2814. assert model_types("users/user/test/b") == before
  2815. """
  2816. def test_op_model_render(self):
  2817. def test_op_transformation_between(self):
  2818. def test_op_transformation_add_MT(self):
  2819. def test_op_transformation_add_AL(self):
  2820. def test_op_transformation_add_MANUAL(self):
  2821. def test_op_transformation_execute_MT(self):
  2822. def test_op_transformation_execute_AL(self):
  2823. def test_op_transformation_execute_MANUAL(self):
  2824. def test_op_transformation_signature(self):
  2825. def test_op_process_signature(self):
  2826. """
  2827. def test_modelling(self):
  2828. # Add a model
  2829. model_add("users/user/test/Empty", "formalisms/SimpleClassDiagrams")
  2830. # Check that it exists
  2831. compare_locations("users/user/test", set(["Empty"]))
  2832. # Check that it conforms
  2833. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  2834. # Check for permissions
  2835. assert model_list_full("users/user/test") == set([(name, "user", "nobody", "221") for name in get_model_list("users/user/test")]) | \
  2836. set([("Empty", "user", "nobody", "200")])
  2837. # Instantiate it further
  2838. model_add("users/user/test/my_empty", "users/user/test/Empty")
  2839. assert verify("users/user/test/my_empty", "users/user/test/Empty") == "OK"
  2840. # Check that it exists
  2841. compare_locations("users/user/test", set(["my_empty", "Empty"]))
  2842. # Check that an instantiate of "A" fails
  2843. try:
  2844. res = instantiate("users/user/test/my_empty", "A")
  2845. assert False
  2846. except UnknownIdentifier:
  2847. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  2848. # Create something in the formalism
  2849. instantiate("users/user/test/Empty", "Class", ID="A")
  2850. attr_assign("users/user/test/Empty", "A", "name", "A")
  2851. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  2852. # Now instantiate that in the model as well, which now works
  2853. instantiate("users/user/test/my_empty", "A")
  2854. assert verify("users/user/test/my_empty", "users/user/test/Empty") == "OK"
  2855. def test_overwrite(self):
  2856. model_add("users/user/test/Empty", "formalisms/SimpleClassDiagrams")
  2857. assert element_list("users/user/test/Empty") == set([])
  2858. instantiate("users/user/test/Empty", "Class", ID="A")
  2859. assert element_list("users/user/test/Empty") == set([("A", "Class")])
  2860. model_overwrite("users/user/test/Empty", "")
  2861. assert element_list("users/user/test/Empty") == set([])
  2862. compare_locations("users/user/test", set(["Empty"]))
  2863. assert element_list("users/user/test/Empty") == set([])
  2864. instantiate("users/user/test/Empty", "Class", ID="B")
  2865. compare_locations("users/user/test", set(["Empty"]))
  2866. def test_operations(self):
  2867. log = []
  2868. def manual_callback(model):
  2869. p1 = instantiate(model, "PetriNet_Runtime/Place")
  2870. p2 = instantiate(model, "PetriNet_Runtime/Place")
  2871. p3 = instantiate(model, "PetriNet_Runtime/Place")
  2872. t1 = instantiate(model, "PetriNet_Runtime/Transition")
  2873. p2t1 = instantiate(model, "PetriNet_Runtime/P2T", (p1, t1))
  2874. p2t2 = instantiate(model, "PetriNet_Runtime/P2T", (p2, t1))
  2875. t2p1 = instantiate(model, "PetriNet_Runtime/T2P", (t1, p3))
  2876. attr_assign(model, p1, "tokens", 1)
  2877. attr_assign(model, p1, "name", "p1")
  2878. attr_assign(model, p2, "tokens", 2)
  2879. attr_assign(model, p2, "name", "p2")
  2880. attr_assign(model, p3, "tokens", 3)
  2881. attr_assign(model, p3, "name", "p3")
  2882. attr_assign(model, t1, "name", "t1")
  2883. attr_assign(model, t1, "executing", False)
  2884. attr_assign(model, p2t1, "weight", 1)
  2885. attr_assign(model, p2t2, "weight", 1)
  2886. attr_assign(model, t2p1, "weight", 2)
  2887. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  2888. model_add("users/user/test/PetriNet_Runtime", "formalisms/SimpleClassDiagrams", open("integration/code/pn_runtime.mvc", "r").read())
  2889. model_add("users/user/test/my_pn", "users/user/test/PetriNet", open("integration/code/pn_design_model.mvc", "r").read())
  2890. def add_tracability_D2R(model):
  2891. instantiate(model, "Association", ("PetriNet/Place", "PetriNet_Runtime/Place"), ID="D2R_PlaceLink")
  2892. instantiate(model, "Association", ("PetriNet/Transition", "PetriNet_Runtime/Transition"), ID="D2R_TransitionLink")
  2893. def add_tracability_R2D(model):
  2894. instantiate(model, "Association", ("PetriNet_Runtime/Place", "PetriNet/Place"), ID="R2D_PlaceLink")
  2895. instantiate(model, "Association", ("PetriNet_Runtime/Transition", "PetriNet/Transition"), ID="R2D_TransitionLink")
  2896. transformation_add_MT({"PetriNet": "users/user/test/PetriNet"}, {}, "users/user/test/print_pn", open("integration/code/pn_print.mvc").read())
  2897. transformation_add_MANUAL({"PetriNet": "users/user/test/PetriNet"}, {"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, "users/user/test/pn_design_to_runtime", add_tracability_D2R)
  2898. transformation_add_AL({"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, {"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, "users/user/test/pn_simulate", open("integration/code/pn_simulate.alc").read())
  2899. transformation_add_MT({"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/pn_runtime_to_design", open("integration/code/pn_runtime_to_design.mvc").read(), add_tracability_R2D)
  2900. log = []
  2901. ctrl = log_output.Controller(log, keep_running=False)
  2902. thrd = threading.Thread(target=ctrl.start)
  2903. thrd.daemon = True
  2904. thrd.start()
  2905. assert transformation_execute_MT("users/user/test/print_pn", {"PetriNet": "users/user/test/my_pn"}, {}, (ctrl, "inp", "outp")) == True
  2906. thrd.join()
  2907. assert set(log) == set(['"p1" --> 1',
  2908. '"p2" --> 2',
  2909. '"p3" --> 3'])
  2910. assert transformation_execute_MANUAL("users/user/test/pn_design_to_runtime", {"PetriNet": "users/user/test/my_pn"}, {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, manual_callback) == True
  2911. assert transformation_execute_AL("users/user/test/pn_simulate", {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, {"PetriNet_Runtime": "users/user/test/my_pn_RT"}) == True
  2912. assert transformation_execute_MT("users/user/test/pn_runtime_to_design", {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, {"PetriNet": "users/user/test/my_pn"}) == True
  2913. log = []
  2914. ctrl = log_output.Controller(log, keep_running=False)
  2915. thrd = threading.Thread(target=ctrl.start)
  2916. thrd.daemon = True
  2917. thrd.start()
  2918. assert transformation_execute_MT("users/user/test/print_pn", {"PetriNet": "users/user/test/my_pn"}, {}, (ctrl, "inp", "outp")) == True
  2919. thrd.join()
  2920. assert set(log) == set(['"p1" --> 0',
  2921. '"p2" --> 1',
  2922. '"p3" --> 5'])
  2923. def test_process_model_trivial_pn_subfunction(self):
  2924. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  2925. model_add("users/user/test/ReachabilityGraph", "formalisms/SimpleClassDiagrams", open("integration/code/reachability_graph.mvc", "r").read())
  2926. model_add("users/user/test/pn_reachability", "formalisms/ProcessModel", open("integration/code/pm_pn_reachability.mvc", "r").read())
  2927. transformation_add_MT({}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/initialize_PN", open("integration/code/initialize_PN.mvc", "r").read())
  2928. transformation_add_MANUAL({"PetriNet": "users/user/test/PetriNet"}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/refine_PN")
  2929. transformation_add_AL({"PetriNet": "users/user/test/PetriNet"}, {"ReachabilityGraph": "users/user/test/ReachabilityGraph"}, "users/user/test/reachability", open("integration/code/reachability_subfunction.alc", "r").read())
  2930. transformation_add_MT({"ReachabilityGraph": "users/user/test/ReachabilityGraph"}, {}, "users/user/test/reachability_print", open("integration/code/reachabilitygraph_print.mvc", 'r').read())
  2931. def callback_refine_PN(model):
  2932. p1 = instantiate(model, "PetriNet/Place")
  2933. attr_assign(model, p1, "name", "p1")
  2934. attr_assign(model, p1, "tokens", 1)
  2935. t1 = instantiate(model, "PetriNet/Transition")
  2936. attr_assign(model, t1, "name", "t1")
  2937. p2t = instantiate(model, "PetriNet/P2T", (p1, t1))
  2938. attr_assign(model, p2t, "weight", 1)
  2939. log = []
  2940. ctrl = log_output.Controller(log, keep_running=False)
  2941. thrd = threading.Thread(target=ctrl.start)
  2942. thrd.daemon = True
  2943. thrd.start()
  2944. process_execute("users/user/test/pn_reachability", {}, {"users/user/test/refine_PN": callback_refine_PN, "users/user/test/reachability_print": (ctrl, "inp", "outp")})
  2945. thrd.join()
  2946. assert set(log) == set(['"0": {"p1": 1}',
  2947. '"1": {"p1": 0}',
  2948. '"0" --["t1"]--> "1"'])
  2949. def test_render(self):
  2950. model_add("users/user/test/CausalBlockDiagrams", "formalisms/SimpleClassDiagrams", open("integration/code/cbd_design.mvc", 'r').read())
  2951. model_add("users/user/test/MM_rendered_graphical", "formalisms/SimpleClassDiagrams", open("integration/code/MM_rendered_graphical.mvc", 'r').read())
  2952. model_add("users/user/test/my_CBD", "users/user/test/CausalBlockDiagrams", open("integration/code/my_cbd.mvc", 'r').read())
  2953. def add_tracability(model):
  2954. instantiate(model, "Association", ("abstract/Block", "rendered/Group"), ID="TracabilityLink")
  2955. transformation_add_MT({"abstract": "users/user/test/CausalBlockDiagrams", "rendered": "users/user/test/MM_rendered_graphical"}, {"abstract": "users/user/test/CausalBlockDiagrams", "rendered": "users/user/test/MM_rendered_graphical"}, "users/user/test/render_graphical_CBD", open("integration/code/CBD_mapper.mvc", 'r').read(), add_tracability)
  2956. result = model_render("users/user/test/my_CBD", "users/user/test/render_graphical_CBD", "users/user/test/my_perceptualized_CBD")
  2957. assert len(result) == 23
  2958. def test_SCCD_basic(self):
  2959. model_add("users/user/test/SCCD", "formalisms/SimpleClassDiagrams", open("integration/code/SCCD.mvc", 'r').read())
  2960. model_add("users/user/test/SCCD_Trace", "formalisms/SimpleClassDiagrams", open("integration/code/SCCD_Trace.mvc", 'r').read())
  2961. model_add("users/user/test/my_SCCD", "users/user/test/SCCD", open("integration/code/SCCD_all.mvc", 'r').read())
  2962. transformation_add_AL({"SCCD": "users/user/test/SCCD"}, {"trace": "users/user/test/SCCD_Trace"}, "users/user/test/SCCD_execute_afap", open("integration/code/SCCD_execute.alc", 'r').read().replace("afap = False", "afap = True"))
  2963. transformation_execute_AL("users/user/test/SCCD_execute_afap", {"SCCD": "users/user/test/my_SCCD"}, {"trace": "users/user/test/my_SCCD_trace"})
  2964. alter_context("users/user/test/my_SCCD_trace", "users/user/test/SCCD_Trace")
  2965. lst = element_list_nice("users/user/test/my_SCCD_trace")
  2966. lst.sort(key=lambda i: (i["timestamp"], i["name"]))
  2967. result = [(i["timestamp"], str(i["name"])) for i in lst if i["name"] not in ["updateTimerValue", "updateTimerColour", "resetTimer"]]
  2968. assert result == [(5.0, "displayRed"),
  2969. (20.0, "displayYellow"),
  2970. (20.5, "displayNone"),
  2971. (21.0, "displayYellow"),
  2972. (21.5, "displayNone"),
  2973. (22.0, "displayYellow"),
  2974. (22.5, "displayNone"),
  2975. (23.0, "displayYellow"),
  2976. (23.5, "displayNone"),
  2977. (24.0, "displayYellow"),
  2978. (24.5, "displayNone"),
  2979. (25.0, "displayYellow"),
  2980. (25.5, "displayNone"),
  2981. (26.0, "displayYellow"),
  2982. (26.5, "displayNone"),
  2983. (27.0, "displayYellow"),
  2984. (27.5, "displayNone"),
  2985. (28.0, "displayYellow"),
  2986. (28.5, "displayNone"),
  2987. (29.0, "displayYellow"),
  2988. (29.4, "displayNone"),
  2989. (29.4, "displayRed"),
  2990. (89.4, "displayGreen"),
  2991. (129.4, "displayNone"),
  2992. (129.4, "displayRed"),
  2993. (139.4, "displayYellow"),
  2994. (139.9, "displayNone"),
  2995. (140.4, "displayYellow"),
  2996. (140.9, "displayNone"),
  2997. (141.4, "displayYellow"),
  2998. (141.9, "displayNone"),
  2999. (142.4, "displayYellow"),
  3000. (142.9, "displayNone"),
  3001. (143.4, "displayYellow"),
  3002. (143.9, "displayNone"),
  3003. (144.4, "displayYellow"),
  3004. (144.9, "displayNone"),
  3005. (145.4, "displayYellow"),
  3006. (145.9, "displayNone"),
  3007. (146.4, "displayYellow"),
  3008. (146.9, "displayNone"),
  3009. (147.4, "displayYellow"),
  3010. (147.9, "displayNone"),
  3011. (148.4, "displayYellow"),
  3012. ]
  3013. def test_switch_MM(self):
  3014. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  3015. model_add("users/user/test/my_pn", "users/user/test/PetriNet", open("integration/code/pn_design_model.mvc", "r").read())
  3016. got = element_list_nice("users/user/test/PetriNet")
  3017. expected = \
  3018. [{'__id': 'Natural', '__type': 'SimpleAttribute', 'constraint': {'AL': ''}, 'name': 'Natural'},
  3019. {'__id': 'String', '__type': 'SimpleAttribute', 'constraint': {'AL': ''}, 'name': 'String'},
  3020. {'__id': 'Place', '__type': 'Class', 'lower_cardinality': None, 'upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'Place', 'abstract': None},
  3021. {'__id': 'Place_tokens', '__type': 'AttributeLink', '__source': 'Place', '__target': 'Natural', 'name': 'tokens', 'optional': False, 'constraint': {'AL': ''}},
  3022. {'__id': 'Place_name', '__type': 'AttributeLink', '__source': 'Place', '__target': 'String', 'name': 'name', 'optional': False, 'constraint': {'AL': ''}},
  3023. {'__id': 'Transition', '__type': 'Class', 'lower_cardinality': None, 'upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'Transition', 'abstract': None},
  3024. {'__id': 'Transition_name', '__type': 'AttributeLink', '__source': 'Transition', '__target': 'String', 'name': 'name', 'optional': False, 'constraint': {'AL': ''}},
  3025. {'__id': 'P2T', '__type': 'Association', '__source': 'Place', '__target': 'Transition', 'source_lower_cardinality': None, 'target_lower_cardinality': None, 'source_upper_cardinality': None, 'target_upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'P2T', "abstract": None, "lower_cardinality": None, "upper_cardinality": None},
  3026. {'__id': 'P2T_weight', '__type': 'AttributeLink', '__source': 'P2T', '__target': 'Natural', 'name': 'weight', 'optional': False, 'constraint': {'AL': ''}},
  3027. {'__id': 'T2P', '__type': 'Association', '__source': 'Transition', '__target': 'Place', 'source_lower_cardinality': None, 'target_lower_cardinality': None, 'source_upper_cardinality': None, 'target_upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'T2P', "abstract": None, "lower_cardinality": None, "upper_cardinality": None},
  3028. {'__id': 'T2P_weight', '__type': 'AttributeLink', '__source': 'T2P', '__target': 'Natural', 'name': 'weight', 'optional': False, 'constraint': {'AL': ''}},
  3029. ]
  3030. compare_unordered_lists(got, expected)
  3031. got = element_list_nice("users/user/test/my_pn")
  3032. expected = \
  3033. [{'__id': 'p1', '__type': 'Place', 'tokens': 1, 'name': 'p1'},
  3034. {'__id': 'p2', '__type': 'Place', 'tokens': 2, 'name': 'p2'},
  3035. {'__id': 'p3', '__type': 'Place', 'tokens': 3, 'name': 'p3'},
  3036. {'__id': 't1', '__type': 'Transition', 'name': 't1'},
  3037. {'__id': '__0', '__type': 'P2T', '__source': 'p1', '__target': 't1', 'weight': 1},
  3038. {'__id': '__1', '__type': 'P2T', '__source': 'p2', '__target': 't1', 'weight': 1},
  3039. {'__id': '__2', '__type': 'T2P', '__source': 't1', '__target': 'p3', 'weight': 2}
  3040. ]
  3041. compare_unordered_lists(got, expected)
  3042. alter_context("users/user/test/PetriNet", "formalisms/Bottom")
  3043. alter_context("users/user/test/my_pn", "formalisms/Bottom")
  3044. count_nodes = 0
  3045. count_edges = 0
  3046. for entry in element_list_nice("users/user/test/PetriNet"):
  3047. print(entry)
  3048. assert entry["__type"] in ["Node", "Edge"]
  3049. if entry["__type"] == "Node":
  3050. assert len(entry) == 2
  3051. count_nodes += 1
  3052. else:
  3053. assert len(entry) == 4
  3054. count_edges += 1
  3055. assert count_nodes == 20
  3056. assert count_edges == 23
  3057. count_nodes = 0
  3058. count_edges = 0
  3059. for entry in element_list_nice("users/user/test/my_pn"):
  3060. assert entry["__type"] in ["Node", "Edge"]
  3061. if entry["__type"] == "Node":
  3062. assert len(entry) == 2
  3063. count_nodes += 1
  3064. else:
  3065. assert len(entry) == 4
  3066. count_edges += 1
  3067. assert count_nodes == 14
  3068. assert count_edges == 13
  3069. alter_context("users/user/test/PetriNet", "users/user/test/PetriNet")
  3070. alter_context("users/user/test/my_pn", "formalisms/SimpleClassDiagrams")
  3071. try:
  3072. element_list_nice("users/user/test/PetriNet")
  3073. self.fail()
  3074. except:
  3075. pass
  3076. try:
  3077. element_list_nice("users/user/test/my_pn")
  3078. self.fail()
  3079. except:
  3080. pass