test_all.py 153 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778
  1. import unittest
  2. import sys
  3. try:
  4. from unit.utils import *
  5. import unit.log_output as log_output
  6. except ImportError: #for Python2
  7. from utils import *
  8. import log_output as log_output
  9. sys.path.append("wrappers")
  10. from modelverse import *
  11. import threading
  12. model_hierarchy = \
  13. {"formalisms/": {"SimpleClassDiagrams": {},
  14. "TypeMapping": {},
  15. "Tracability": {},
  16. "ProcessModel": {},
  17. "ActionLanguage": {},
  18. "ManualOperation": {},
  19. "Bottom": {},
  20. },
  21. "models/": {},
  22. "administration/": {"core": {},
  23. "CoreFormalism": {},
  24. },
  25. "users/": {"admin/": {},
  26. "LoLA/": {},
  27. "HUTN/": {},
  28. "files/": {},
  29. "DEVS/": {},
  30. "DEVS_batch/": {},
  31. "JSON/": {},
  32. },
  33. "type mappings/": {"1": {},
  34. "2": {},
  35. "3": {},
  36. "4": {},
  37. "5": {},
  38. "6": {},
  39. "7": {},
  40. "8": {},
  41. "9": {},
  42. },
  43. "merged/": {},
  44. "tmp/": {},
  45. "RAMified/": {},
  46. }
  47. def verify_clean():
  48. compare_locations("", set())
  49. compare_locations("models", set())
  50. compare_locations("formalisms", set())
  51. def get_model_list(location):
  52. try:
  53. location_parts = location.split("/")
  54. current = model_hierarchy
  55. while location_parts:
  56. l = location_parts.pop(0)
  57. if l != "":
  58. current = current[l + "/"]
  59. return set(current.keys())
  60. except:
  61. return set([])
  62. def compare_locations(location, extra_to_default):
  63. assert model_list(location) == get_model_list(location) | set(extra_to_default)
  64. def compare_unordered_lists(got, expected):
  65. assert len(got) == len(expected)
  66. for i in got:
  67. assert i in expected
  68. for i in expected:
  69. assert i in got
  70. class TestModelverse(unittest.TestCase):
  71. proc = None
  72. def runTest(self):
  73. pass
  74. @classmethod
  75. def setUpClass(self):
  76. TestModelverse.proc, address = start_mvc()
  77. init(address)
  78. login("user", "user")
  79. @classmethod
  80. def tearDownClass(self):
  81. try:
  82. kill(TestModelverse.proc)
  83. except:
  84. print("Got exception during teardown.")
  85. def setUp(self):
  86. verify_clean()
  87. folder_create("users/user/test")
  88. def tearDown(self):
  89. model_delete("users/user/test")
  90. verify_clean()
  91. pass
  92. def test_op_model_list(self):
  93. assert model_list("") == set(["formalisms/",
  94. "models/",
  95. "administration/",
  96. "type mappings/",
  97. "users/",
  98. "merged/",
  99. "RAMified/",
  100. "tmp/",
  101. ])
  102. assert model_list("formalisms") == set(["SimpleClassDiagrams",
  103. "ActionLanguage",
  104. "TypeMapping",
  105. "Tracability",
  106. "ProcessModel",
  107. "ManualOperation",
  108. "Bottom",
  109. ])
  110. assert model_list("formalisms/") == set(["SimpleClassDiagrams",
  111. "ActionLanguage",
  112. "TypeMapping",
  113. "Tracability",
  114. "ProcessModel",
  115. "ManualOperation",
  116. "Bottom",
  117. ])
  118. # Try unreadable location
  119. try:
  120. model_list("administration")
  121. self.fail()
  122. except ReadPermissionDenied:
  123. pass
  124. # Try non-existing location
  125. try:
  126. model_list("adfjafdla")
  127. self.fail()
  128. except UnknownLocation:
  129. pass
  130. # Try model list of a model itself
  131. assert model_list("formalisms/SimpleClassDiagrams") == set([])
  132. def test_op_model_list_full(self):
  133. assert model_list_full("") == set([("formalisms/", "admin", "admin", "221"),
  134. ("models/", "admin", "admin", "221"),
  135. ("administration/", "admin", "admin", "110"),
  136. ("type mappings/", "admin", "admin", "221"),
  137. ("users/", "admin", "admin", "221"),
  138. ("merged/", "admin", "nobody", "222"),
  139. ("RAMified/", "admin", "nobody", "222"),
  140. ("tmp/", "admin", "nobody", "222"),
  141. ])
  142. assert model_list_full("formalisms") == set([("SimpleClassDiagrams", "admin", "admin", "221"),
  143. ("ActionLanguage", "admin", "admin", "221"),
  144. ("TypeMapping", "admin", "admin", "221"),
  145. ("Tracability", "admin", "admin", "221"),
  146. ("ProcessModel", "admin", "admin", "221"),
  147. ("ManualOperation", "admin", "admin", "221"),
  148. ("Bottom", "admin", "admin", "221"),
  149. ])
  150. # Try unreadable location
  151. try:
  152. model_list_full("administration")
  153. self.fail()
  154. except ReadPermissionDenied:
  155. pass
  156. # Try non-existing location
  157. try:
  158. model_list_full("adfjafdla")
  159. self.fail()
  160. except UnknownLocation:
  161. pass
  162. # Try model list of a model itself
  163. assert model_list_full("formalisms/SimpleClassDiagrams") == set([])
  164. def test_op_verify(self):
  165. # Verify M3 --> M3
  166. assert verify("formalisms/SimpleClassDiagrams", "formalisms/SimpleClassDiagrams") == "OK"
  167. # Verify with bottom
  168. assert verify("formalisms/SimpleClassDiagrams", "formalisms/Bottom") == "OK"
  169. # Verify the type mapping models
  170. for tm in model_types("formalisms/SimpleClassDiagrams"):
  171. assert verify(tm[1], "formalisms/TypeMapping") == "OK"
  172. # Verify wrong
  173. try:
  174. verify("formalisms/SimpleClassDiagrams", "formalisms/ProcessModel")
  175. self.fail()
  176. except UnknownMetamodellingHierarchy:
  177. pass
  178. # Verify M2 --> M3
  179. assert verify("formalisms/ProcessModel", "formalisms/SimpleClassDiagrams") == "OK"
  180. assert verify("formalisms/ProcessModel", "formalisms/Bottom") == "OK"
  181. for tm in model_types("formalisms/ProcessModel"):
  182. assert verify(tm[1], "formalisms/TypeMapping") == "OK"
  183. try:
  184. verify("formalisms/ProcessModel", "formalisms/ProcessModel")
  185. self.fail()
  186. except UnknownMetamodellingHierarchy:
  187. pass
  188. # Verify M1 --> M2
  189. model_add("users/user/test/a", "formalisms/ProcessModel")
  190. # Fails with lacking instances of Start and Finish class
  191. assert verify("users/user/test/a", "formalisms/ProcessModel").startswith("Lower cardinality violated for class: ")
  192. instantiate("users/user/test/a", "Start")
  193. # Fails with lacking instances of Finish class
  194. assert verify("users/user/test/a", "formalisms/ProcessModel") == "Lower cardinality violated for class: Finish"
  195. instantiate("users/user/test/a", "Finish")
  196. # Succeeds
  197. assert verify("users/user/test/a", "formalisms/ProcessModel") == "OK"
  198. # Test unreadable model
  199. try:
  200. verify("administration/core", "formalisms/ProcessModel")
  201. self.fail()
  202. except ReadPermissionDenied:
  203. pass
  204. # Test unreadable metamodel
  205. try:
  206. verify("formalisms/Bottom", "administration/core")
  207. self.fail()
  208. except ReadPermissionDenied:
  209. pass
  210. # Test non-existing model
  211. try:
  212. verify("adfadf", "formalisms/SimpleClassDiagrams")
  213. self.fail()
  214. except UnknownModel:
  215. pass
  216. # Test non-existing metamodel
  217. try:
  218. verify("formalisms/SimpleClassDiagrams", "adfka")
  219. self.fail()
  220. except UnknownModel:
  221. pass
  222. def test_op_permission_modify(self):
  223. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  224. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  225. # Check that we can read
  226. element_list_nice("users/user/test/a")
  227. # Check that we can write
  228. instantiate("users/user/test/a", "Class")
  229. assert permission_modify("users/user/test/a", "100") == None
  230. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "100")])
  231. # Check that we can read
  232. element_list_nice("users/user/test/a")
  233. # Check that we can't write
  234. try:
  235. instantiate("users/user/test/a", "Class")
  236. self.fail()
  237. except WritePermissionDenied:
  238. pass
  239. assert permission_modify("users/user/test/a", "000") == None
  240. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "000")])
  241. # Check that we can't read
  242. try:
  243. element_list_nice("users/user/test/a")
  244. self.fail()
  245. except ReadPermissionDenied:
  246. pass
  247. # Check that we can't write
  248. try:
  249. instantiate("users/user/test/a", "Class")
  250. self.fail()
  251. except WritePermissionDenied:
  252. pass
  253. except ReadPermissionDenied:
  254. pass
  255. assert permission_modify("users/user/test/a", "200") == None
  256. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  257. # Check that we can read
  258. element_list_nice("users/user/test/a")
  259. # Check that we can write
  260. instantiate("users/user/test/a", "Class")
  261. # Cannot modify permissions if we don't own the model
  262. try:
  263. permission_modify("formalisms/SimpleClassDiagrams", "222")
  264. self.fail()
  265. except UserPermissionDenied:
  266. pass
  267. # Cannot modify permissions even if we have full access, as long as we are not the owner
  268. model_add("users/user/test/z", "formalisms/SimpleClassDiagrams")
  269. permission_owner("users/user/test/z", "admin")
  270. try:
  271. permission_modify("users/user/test/z", "222")
  272. self.fail()
  273. except UserPermissionDenied:
  274. pass
  275. try:
  276. permission_owner("users/user/test/z", "user")
  277. self.fail()
  278. except UserPermissionDenied:
  279. pass
  280. # Cannot change non-existing model
  281. before = model_list("")
  282. try:
  283. permission_modify("adfadf", "111")
  284. self.fail()
  285. except UnknownModel:
  286. assert model_list("") == before
  287. # Check for type of permission string
  288. # Too long
  289. try:
  290. permission_modify("users/user/test/a", "1111")
  291. self.fail()
  292. except IncorrectFormat:
  293. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  294. # Above 2
  295. try:
  296. permission_modify("users/user/test/a", "131")
  297. self.fail()
  298. except IncorrectFormat:
  299. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  300. # Below 0
  301. try:
  302. permission_modify("users/user/test/a", "-111")
  303. self.fail()
  304. except IncorrectFormat:
  305. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  306. # Non-integer
  307. try:
  308. permission_modify("users/user/test/a", "2a1")
  309. self.fail()
  310. except IncorrectFormat:
  311. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  312. def test_op_model_add(self):
  313. assert model_list_full("users/user/test") == set([])
  314. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  315. # Test permissions of newly created empty model
  316. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  317. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", \
  318. """
  319. Class A {
  320. name = "A"
  321. }
  322. Class B {
  323. name = "B"
  324. abstract = True
  325. }
  326. """)
  327. # Test permissions of newly created non-empty model
  328. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  329. # Test content of newly created model with code upload
  330. lst = element_list_nice("users/user/test/b")
  331. assert len(lst) == 2
  332. assert {'__id': "A", "__type": "Class", "abstract": None, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "A"} in lst
  333. assert {'__id': "B", "__type": "Class", "abstract": True, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "B"} in lst
  334. try:
  335. # Cannot upload model to occupied location
  336. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  337. self.fail()
  338. except ModelExists:
  339. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  340. try:
  341. # Cannot upload model to unwritable location at root
  342. model_add("z", "formalisms/SimpleClassDiagrams")
  343. self.fail()
  344. except WritePermissionDenied:
  345. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  346. try:
  347. # Cannot upload model to unwritable location somewhere in hierarchy
  348. model_add("users/new_model", "formalisms/SimpleClassDiagrams")
  349. self.fail()
  350. except WritePermissionDenied:
  351. assert "new_model/" not in model_list("users/")
  352. try:
  353. # Cannot upload model to unwritable location somewhere in hierarchy with multiple new branches
  354. model_add("users/new_username/new_model", "formalisms/SimpleClassDiagrams")
  355. self.fail()
  356. except WritePermissionDenied:
  357. assert "new_username/" not in model_list("users/")
  358. model_add("users/user/test/c", "users/user/test/b", """
  359. A a {}
  360. """)
  361. try:
  362. # Cannot add this model, as it cannot be auto-typecasted to formalisms/SimpleClassDiagrams
  363. model_add("users/user/test/d", "users/user/test/c", """
  364. a c {}
  365. """)
  366. self.fail()
  367. except UnknownM3:
  368. assert model_list("users/user/test") == set(["a", "b", "c"])
  369. # We can add this model for multiple levels, as it can be automatically typecasted to formalisms/SimpleClassDiagrams, since it is empty
  370. model_add("users/user/test/d", "users/user/test/b")
  371. model_add("users/user/test/e", "users/user/test/d")
  372. model_add("users/user/test/f", "users/user/test/e")
  373. def test_op_model_add_compilation_error(self):
  374. try:
  375. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  376. abdfaefeaf
  377. """)
  378. self.fail()
  379. except CompilationError:
  380. pass
  381. try:
  382. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  383. Crass A {
  384. name = "b"
  385. }
  386. """)
  387. #TODO at the moment, this still succeeds!
  388. #self.fail()
  389. except:
  390. raise
  391. pass
  392. def test_op_model_move(self):
  393. # Test basic scenario
  394. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  395. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  396. assert model_move("users/user/test/a", "users/user/test/b") == None
  397. assert model_list_full("users/user/test") == set([("b", "user", "nobody", "200")])
  398. # Test if permissions are copied as well
  399. permission_modify("users/user/test/b", "222")
  400. assert model_list_full("users/user/test") == set([("b", "user", "nobody", "222")])
  401. assert model_move("users/user/test/b", "users/user/test/a") == None
  402. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222")])
  403. # Test move if destination exists
  404. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  405. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222"), ("b", "user", "nobody", "200")])
  406. try:
  407. model_move("users/user/test/a", "users/user/test/b")
  408. self.fail()
  409. except ModelExists:
  410. pass
  411. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222"), ("b", "user", "nobody", "200")])
  412. # Test move if source doesn't exist
  413. try:
  414. model_move("users/user/test/z", "users/user/test/y")
  415. self.fail()
  416. except UnknownModel:
  417. pass
  418. # Test if we can move a model we can't write to (i.e., not allowed to remove it)
  419. try:
  420. model_move("formalisms/ProcessModel", "users/user/test/x")
  421. self.fail()
  422. except WritePermissionDenied:
  423. pass
  424. # Test if we can move a model to a place we can't write to
  425. try:
  426. model_move("users/user/test/a", "administration/ProcessModel2")
  427. self.fail()
  428. except WritePermissionDenied:
  429. pass
  430. def test_op_model_delete(self):
  431. # Test basic delete
  432. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  433. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  434. assert model_delete("users/user/test/a") == None
  435. assert model_list_full("users/user/test") == set([])
  436. # Test delete of non-existing
  437. assert model_list_full("users/user/test") == set([])
  438. try:
  439. model_delete("users/user/test/a")
  440. self.fail()
  441. except UnknownModel:
  442. pass
  443. # Test delete of non-writable models
  444. try:
  445. model_delete("formalisms/SimpleClassDiagrams")
  446. self.fail()
  447. except WritePermissionDenied:
  448. pass
  449. # Try delete of a folder
  450. folder_create("users/user/test/b/c/d")
  451. model_add("users/user/test/b/c/d/e", "formalisms/SimpleClassDiagrams")
  452. assert model_list("users/user/test") == set(["b/"])
  453. assert model_list("users/user/test/b") == set(["c/"])
  454. assert model_list("users/user/test/b/c") == set(["d/"])
  455. assert model_list("users/user/test/b/c/d") == set(["e"])
  456. assert model_delete("users/user/test/b/c") == None
  457. # Removes recursively all subfolders and containing models
  458. assert model_list("users/user/test") == set(["b/"])
  459. assert model_list("users/user/test/b") == set([])
  460. try:
  461. model_list("users/user/test/b/c")
  462. self.fail()
  463. except UnknownLocation:
  464. pass
  465. try:
  466. element_list("users/user/test/b/c/d/e")
  467. self.fail()
  468. except UnknownModel:
  469. pass
  470. def test_op_model_overwrite(self):
  471. # Test overwrite of simple model
  472. assert model_list_full("users/user/test") == set([])
  473. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  474. # Test permissions of newly created empty model
  475. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  476. assert element_list_nice("users/user/test/a") == []
  477. model_overwrite("users/user/test/a", \
  478. """
  479. Class A {
  480. name = "A"
  481. }
  482. Class B {
  483. name = "B"
  484. abstract = True
  485. }
  486. """)
  487. # Test permissions of newly created non-empty model
  488. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  489. # Test content of newly created model with code upload
  490. lst = element_list_nice("users/user/test/a")
  491. assert len(lst) == 2
  492. assert {'__id': "A", "__type": "Class", "abstract": None, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "A"} in lst
  493. assert {'__id': "B", "__type": "Class", "abstract": True, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "B"} in lst
  494. # Test non-writable model
  495. before = element_list("formalisms/SimpleClassDiagrams")
  496. try:
  497. model_overwrite("formalisms/SimpleClassDiagrams", "")
  498. self.fail()
  499. except WritePermissionDenied:
  500. # No changes were made
  501. assert element_list("formalisms/SimpleClassDiagrams") == before
  502. # Test non-existing model
  503. assert "adfafd" not in model_list("")
  504. try:
  505. model_overwrite("adfafd", "")
  506. self.fail()
  507. except UnknownModel:
  508. assert "adfafd" not in model_list("")
  509. # Test compilation error
  510. before = element_list_nice("users/user/test/a")
  511. try:
  512. model_overwrite("users/user/test/a", "afajk")
  513. self.fail()
  514. except CompilationError:
  515. assert element_list_nice("users/user/test/a") == before
  516. # Test overwrite of non-model location
  517. before = model_list("users/user/test")
  518. try:
  519. model_overwrite("users/user/test", "")
  520. self.fail()
  521. except UnknownMetamodellingHierarchy:
  522. assert model_list("users/user/test") == before
  523. def test_op_user_logout(self):
  524. try:
  525. element_list_nice("administration/core")
  526. self.fail()
  527. except ReadPermissionDenied:
  528. pass
  529. user_logout()
  530. login("admin", "admin")
  531. # Test user permissions
  532. assert len(element_list_nice("administration/core")) > 0
  533. user_logout()
  534. login("user", "user")
  535. try:
  536. element_list_nice("administration/core")
  537. self.fail()
  538. except ReadPermissionDenied:
  539. pass
  540. def test_op_all_instances(self):
  541. # Test M2 level
  542. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  543. Class A {}
  544. Class B : A {}
  545. Association C (A, B) {}
  546. """)
  547. assert all_instances("users/user/test/a", "Class") == set(["A", "B", "C"])
  548. assert all_instances("users/user/test/a", "Association") == set(["C"])
  549. # Test non-existing type
  550. try:
  551. all_instances("users/user/test/a", "non-existing")
  552. self.fail()
  553. except UnknownElement:
  554. pass
  555. # Test non-existing model
  556. try:
  557. all_instances("users/user/test/b", "Class")
  558. self.fail()
  559. except UnknownModel:
  560. pass
  561. # Test M1 level
  562. model_add("users/user/test/b", "users/user/test/a", """
  563. A a {}
  564. B b {}
  565. C c(a, b) {}
  566. A d {}
  567. """)
  568. assert all_instances("users/user/test/b", "A") == set(["a", "b", "d"])
  569. assert all_instances("users/user/test/b", "B") == set(["b"])
  570. assert all_instances("users/user/test/b", "C") == set(["c"])
  571. # No read permission
  572. try:
  573. all_instances("administration/core", "Class")
  574. self.fail()
  575. except ReadPermissionDenied:
  576. pass
  577. # No write permission, but can query
  578. assert type(all_instances("formalisms/SimpleClassDiagrams", "Class")) == set
  579. def test_op_admin_promote_demote(self):
  580. # Verify that user doesn't have admin permissions
  581. try:
  582. element_list("administration/core")
  583. self.fail()
  584. except ReadPermissionDenied:
  585. pass
  586. # Cannot do admin_promote ourselves
  587. try:
  588. admin_promote("user")
  589. except AdminPermissionDenied:
  590. pass
  591. # Cannot do admin_demote ourselves
  592. try:
  593. admin_demote("user")
  594. except AdminPermissionDenied:
  595. pass
  596. # Switch to admin for now
  597. self.do_as_user("admin", admin_promote, ["user"])
  598. # Verify that we can do admin operations
  599. assert len(element_list("administration/core")) > 0
  600. # And check that we can promote/demote other users
  601. admin_promote("HUTN")
  602. admin_demote("HUTN")
  603. # Unknown user
  604. try:
  605. admin_promote("user3")
  606. self.fail()
  607. except UnknownUser:
  608. pass
  609. try:
  610. admin_demote("user4")
  611. self.fail()
  612. except UnknownUser:
  613. pass
  614. # Can also demote ourselves again
  615. admin_demote("user")
  616. # Verify that user doesn't have admin permissions
  617. try:
  618. element_list("administration/core")
  619. self.fail()
  620. except ReadPermissionDenied:
  621. pass
  622. def test_op_user_password(self):
  623. # Test initial password
  624. user_logout()
  625. try:
  626. login("user", "user2")
  627. self.fail()
  628. except PermissionDenied:
  629. pass
  630. login("user", "user")
  631. # Change it to user2
  632. user_password("user", "user2")
  633. user_logout()
  634. try:
  635. login("user", "user")
  636. self.fail()
  637. except PermissionDenied:
  638. pass
  639. login("user", "user2")
  640. # Reset for further tests
  641. user_password("user", "user")
  642. # Change other users password
  643. try:
  644. user_password("user2", "user10")
  645. self.fail()
  646. except UserPermissionDenied:
  647. user_logout()
  648. login("user2", "user2")
  649. user_logout()
  650. login("user", "user")
  651. # But admin can do that
  652. self.do_as_user("admin", user_password, ["user2", "user10"])
  653. user_logout()
  654. login("user2", "user10")
  655. user_logout()
  656. login("user", "user")
  657. # Admin cannot change password of non-existing user
  658. try:
  659. self.do_as_user("admin", user_password, ["user10", "user10"])
  660. self.fail()
  661. except UnknownUser:
  662. user_logout()
  663. # Check that we can still create the new user with whatever password we want
  664. login("user10", "user11")
  665. user_logout()
  666. login("user", "user")
  667. def test_op_model_types(self):
  668. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  669. # Read model types of simple model
  670. lst = model_types("users/user/test/a")
  671. assert len(lst) == 1
  672. entry = lst.pop()
  673. assert entry[0] == "formalisms/SimpleClassDiagrams"
  674. assert entry[1].startswith("type mappings/")
  675. assert entry[2] == None
  676. # Create bottom and query afterwards
  677. alter_context("users/user/test/a", "formalisms/Bottom")
  678. element_list_nice("users/user/test/a")
  679. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  680. lst = model_types("users/user/test/a")
  681. assert len(lst) == 2
  682. got = set()
  683. while lst:
  684. entry = lst.pop()
  685. assert entry[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  686. assert entry[0] not in got
  687. got.add(entry[0])
  688. assert entry[1].startswith("type mappings/")
  689. assert entry[2] == None
  690. # No type mapping for type mappings
  691. assert model_types(entry[1]) == set([("formalisms/TypeMapping", None, None)])
  692. # But there will be as soon as we open it
  693. element_list_nice(entry[1])
  694. lst = model_types(entry[1])
  695. assert len(lst) == 1
  696. entry = lst.pop()
  697. assert entry[0] == "formalisms/TypeMapping"
  698. assert entry[1].startswith("type mappings/")
  699. assert entry[2] == None
  700. def test_op_folder_create(self):
  701. # Create a folder
  702. assert folder_create("users/user/test/folder_a") == None
  703. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200")])
  704. # Create folder with trailing slash
  705. assert folder_create("users/user/test/folder_b/") == None
  706. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200"), ("folder_b/", "user", "nobody", "200")])
  707. assert model_list_full("users/user/test/folder_b") == set()
  708. # Create multiple folders
  709. assert folder_create("users/user/test/folder_a/folder_b/folder_c/folder_d") == None
  710. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200"), ("folder_b/", "user", "nobody", "200")])
  711. assert model_list_full("users/user/test/folder_a") == set([("folder_b/", "user", "nobody", "200")])
  712. assert model_list_full("users/user/test/folder_a/folder_b") == set([("folder_c/", "user", "nobody", "200")])
  713. assert model_list_full("users/user/test/folder_a/folder_b/folder_c") == set([("folder_d/", "user", "nobody", "200")])
  714. # Create folder in non-writable location
  715. try:
  716. folder_create("a")
  717. self.fail()
  718. except WritePermissionDenied:
  719. pass
  720. assert "a" not in model_list("")
  721. # Create folder that already exists
  722. try:
  723. folder_create("users/user/test/folder_a")
  724. self.fail()
  725. except FolderExists:
  726. pass
  727. def test_op_alter_context(self):
  728. # Create a model that we will use
  729. model_add("users/user/test/a", "formalisms/ProcessModel", """
  730. Start start {}
  731. Finish finish {}
  732. """)
  733. # List elements using default context, that of creation
  734. lst = element_list_nice("users/user/test/a")
  735. assert len(lst) == 2
  736. assert {"__id": "start", "__type": "Start"} in lst
  737. assert {"__id": "finish", "__type": "Finish"} in lst
  738. # List elements using bottom context
  739. alter_context("users/user/test/a", "formalisms/Bottom")
  740. lst = element_list_nice("users/user/test/a")
  741. assert len(lst) == 2
  742. assert {"__id": "start", "__type": "Node"} in lst
  743. assert {"__id": "finish", "__type": "Node"} in lst
  744. # Switch back to default context
  745. alter_context("users/user/test/a", "formalisms/ProcessModel")
  746. lst = element_list_nice("users/user/test/a")
  747. assert len(lst) == 2
  748. assert {"__id": "start", "__type": "Start"} in lst
  749. assert {"__id": "finish", "__type": "Finish"} in lst
  750. # Switch to a non-existing context
  751. alter_context("users/user/test/a", "non-existing")
  752. try:
  753. element_list_nice("users/user/test/a")
  754. self.fail()
  755. except UnknownModel:
  756. pass
  757. # Set context for an unknown model
  758. # Note that this will only register locally, without communicating with the Modelverse
  759. # as such, errors are not noticed until the element is accessed!
  760. alter_context("non-existing", "formalisms/SimpleClassDiagrams")
  761. def test_op_element_list(self):
  762. model_add("users/user/test/a", "formalisms/ProcessModel", """
  763. Start start {}
  764. Finish finish {}
  765. Next nxt (start, finish) {}
  766. """)
  767. # Basic operation
  768. lst = element_list("users/user/test/a")
  769. assert len(lst) == 3
  770. assert ("start", "Start") in lst
  771. assert ("finish", "Finish") in lst
  772. assert ("nxt", "Next") in lst
  773. # Try on non-existing model
  774. try:
  775. element_list("a")
  776. self.fail()
  777. except UnknownModel:
  778. pass
  779. # Try a non-readable model
  780. try:
  781. element_list("administration/core")
  782. self.fail()
  783. except ReadPermissionDenied:
  784. pass
  785. # No write permission, but can query
  786. assert type(element_list("formalisms/SimpleClassDiagrams")) == set
  787. def test_op_element_list_nice(self):
  788. # Test simple element_list_nice
  789. model_add("users/user/test/a", "formalisms/ProcessModel", """
  790. Start start {}
  791. Finish finish {}
  792. Next nxt (start, finish) {}
  793. """)
  794. # Basic operation
  795. lst = element_list_nice("users/user/test/a")
  796. assert len(lst) == 3
  797. assert {"__id": "start", "__type": "Start"} in lst
  798. assert {"__id": "finish", "__type": "Finish"} in lst
  799. assert {"__id": "nxt", "__type": "Next", "__source": "start", "__target": "finish"} in lst
  800. # Test a model with attributes
  801. model_add("users/user/test/b", "formalisms/ProcessModel", """
  802. Start start {}
  803. Exec exec1 {
  804. name = "first exec"
  805. }
  806. Finish finish {}
  807. Data d1 {
  808. name = "data 1"
  809. type = "type 1"
  810. }
  811. Next n1 (start, exec1) {}
  812. Next n2 (exec1, finish) {}
  813. Produces p1 (exec1, d1) {
  814. name = "producer"
  815. }
  816. """)
  817. lst = element_list_nice("users/user/test/b")
  818. assert len(lst) == 7
  819. assert {"__id": "start", "__type": "Start"} in lst
  820. assert {"__id": "finish", "__type": "Finish"} in lst
  821. assert {"__id": "exec1", "__type": "Exec", "name": "first exec"} in lst
  822. assert {"__id": "d1", "__type": "Data", "name": "data 1", "type": "type 1"} in lst
  823. assert {"__id": "n1", "__type": "Next", "__source": "start", "__target": "exec1"} in lst
  824. assert {"__id": "n2", "__type": "Next", "__source": "exec1", "__target": "finish"} in lst
  825. assert {"__id": "p1", "__type": "Produces", "__source": "exec1", "__target": "d1", "name": "producer"} in lst
  826. # Try one with defined attributes
  827. model_add("users/user/test/c", "formalisms/SimpleClassDiagrams", """
  828. SimpleAttribute Natural {
  829. name = "natural"
  830. }
  831. SimpleAttribute String {
  832. name = "string"
  833. }
  834. Class place {
  835. name = "Place"
  836. name : String
  837. capacity : Natural
  838. }
  839. Class transition {
  840. name = "Transition"
  841. name : String
  842. }
  843. Association p2t (place, transition) {
  844. name = "P2T"
  845. weight : Natural
  846. }
  847. Association t2p (transition, place) {
  848. name = "T2P"
  849. weight : Natural
  850. }
  851. """)
  852. lst = element_list_nice("users/user/test/c")
  853. assert len(lst) == 11
  854. assert {"__id": "Natural", "__type": "SimpleAttribute", "constraint": {"AL": ""}, "name": "natural"} in lst
  855. assert {"__id": "String", "__type": "SimpleAttribute", "constraint": {"AL": ""}, "name": "string"} in lst
  856. assert {"__id": "place", "name": "Place", "__type": "Class", "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "abstract": None} in lst
  857. assert {"__id": "transition", "name": "Transition", "__type": "Class", "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "abstract": None} in lst
  858. assert {"__id": "p2t", "name": "P2T", "__type": "Association", "__source": "place", "__target": "transition", "constraint": {"AL": ""}, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None} in lst
  859. assert {"__id": "t2p", "name": "T2P", "__type": "Association", "__source": "transition", "__target": "place", "constraint": {"AL": ""}, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None} in lst
  860. assert {"__id": "place_name", "__type": "AttributeLink", "__source": "place", "__target": "String", "name": "name", "optional": False, "constraint": {"AL": ""}} in lst
  861. assert {"__id": "place_capacity", "__type": "AttributeLink", "__source": "place", "__target": "Natural", "name": "capacity", "optional": False, "constraint": {"AL": ""}} in lst
  862. assert {"__id": "transition_name", "__type": "AttributeLink", "__source": "transition", "__target": "String", "name": "name", "optional": False, "constraint": {"AL": ""}} in lst
  863. assert {"__id": "p2t_weight", "__type": "AttributeLink", "__source": "p2t", "__target": "Natural", "name": "weight", "optional": False, "constraint": {"AL": ""}} in lst
  864. assert {"__id": "t2p_weight", "__type": "AttributeLink", "__source": "t2p", "__target": "Natural", "name": "weight", "optional": False, "constraint": {"AL": ""}} in lst
  865. # Try on non-existing model
  866. try:
  867. element_list_nice("a")
  868. self.fail()
  869. except UnknownModel:
  870. pass
  871. # Try a non-readable model
  872. try:
  873. element_list_nice("administration/core")
  874. self.fail()
  875. except ReadPermissionDenied:
  876. pass
  877. # No write permission, but can query
  878. assert type(element_list_nice("formalisms/SimpleClassDiagrams")) == list
  879. def test_op_types(self):
  880. # Try operation of unopened model
  881. assert types("formalisms/ProcessModel") == element_list("formalisms/SimpleClassDiagrams")
  882. # Try simple operation
  883. model_add("users/user/test/a", "formalisms/ProcessModel", """
  884. Start start {}
  885. Finish finish {}
  886. Next nxt (start, finish) {}
  887. """)
  888. assert types("users/user/test/a") == element_list("formalisms/ProcessModel")
  889. alter_context("users/user/test/a", "formalisms/Bottom")
  890. assert types("users/user/test/a") == element_list("formalisms/Bottom")
  891. # Try for model that we cannot read
  892. try:
  893. types("administration/core")
  894. self.fail()
  895. except ReadPermissionDenied:
  896. pass
  897. # Try for non-existing model
  898. try:
  899. types("a")
  900. self.fail()
  901. except UnknownModel:
  902. pass
  903. # Try for a metamodel that we are not allowed to read, although the model may be read
  904. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  905. assert types("users/user/test/b") == element_list("formalisms/SimpleClassDiagrams")
  906. alter_context("users/user/test/b", "administration/core")
  907. try:
  908. types("users/user/test/b")
  909. self.fail()
  910. except ReadPermissionDenied:
  911. pass
  912. # No write permission for either M or MM, but can query
  913. assert type(types("formalisms/SimpleClassDiagrams")) == set
  914. def test_op_read_info(self):
  915. # Basic case
  916. model_add("users/user/test/a", "formalisms/ProcessModel", """
  917. Start start {}
  918. Finish finish {}
  919. Next nxt (start, finish) {}
  920. """)
  921. assert read_info("users/user/test/a", "start") == ("Start", None)
  922. assert read_info("users/user/test/a", "finish") == ("Finish", None)
  923. assert read_info("users/user/test/a", "nxt") == ("Next", ("start", "finish"))
  924. # Read using different metamodel
  925. alter_context("users/user/test/a", "formalisms/Bottom")
  926. assert read_info("users/user/test/a", "start") == ("Node", None)
  927. assert read_info("users/user/test/a", "finish") == ("Node", None)
  928. assert read_info("users/user/test/a", "nxt") == ("Edge", ("start", "finish"))
  929. # Non-existing element
  930. try:
  931. read_info("users/user/test/a", "notthere")
  932. self.fail()
  933. except UnknownElement:
  934. pass
  935. # Non-existing model
  936. try:
  937. read_info("users/user/test/b", "start")
  938. self.fail()
  939. except UnknownModel:
  940. pass
  941. # No read permission
  942. try:
  943. read_info("administration/core", "administration")
  944. self.fail()
  945. except ReadPermissionDenied:
  946. pass
  947. # No write permission, but can query
  948. assert type(read_info("formalisms/SimpleClassDiagrams", "Class")) == tuple
  949. def test_op_read_attrs(self):
  950. # Basic behaviour
  951. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  952. SimpleAttribute Natural {
  953. name = "natural"
  954. }
  955. SimpleAttribute String {
  956. name = "string"
  957. }
  958. Class Place {
  959. name = "Place"
  960. name : String
  961. capacity : Natural
  962. }
  963. Class Transition {
  964. name = "Transition"
  965. name : String
  966. }
  967. Association P2T (Place, Transition) {
  968. name = "P2T"
  969. weight : Natural
  970. }
  971. Association T2P (Transition, Place) {
  972. name = "T2P"
  973. weight : Natural
  974. }
  975. """)
  976. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  977. assert read_attrs("users/user/test/a", "String") == {"constraint": {"AL": ""}, "name": "string"}
  978. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  979. assert read_attrs("users/user/test/a", "Transition") == {"constraint": {"AL": ""}, "name": "Transition", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  980. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  981. assert read_attrs("users/user/test/a", "T2P") == {"constraint": {"AL": ""}, "name": "T2P", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  982. model_add("users/user/test/b", "users/user/test/a", """
  983. Place p1 {
  984. name = "place 1"
  985. capacity = 2
  986. }
  987. Place p2 {
  988. name = "place 2"
  989. capacity = 1
  990. }
  991. Transition t1 {
  992. name = "transition"
  993. }
  994. P2T p2t (p1, t1) {
  995. weight = 4
  996. }
  997. T2P t2p (t1, p2) {
  998. weight = 10
  999. }
  1000. """)
  1001. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  1002. assert read_attrs("users/user/test/b", "p2") == {"name": "place 2", "capacity": 1}
  1003. assert read_attrs("users/user/test/b", "t1") == {"name": "transition"}
  1004. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  1005. assert read_attrs("users/user/test/b", "t2p") == {"weight": 10}
  1006. # Non-existing model
  1007. try:
  1008. read_attrs("users/afa", "p1")
  1009. self.fail()
  1010. except UnknownModel:
  1011. pass
  1012. # Non-existing element
  1013. try:
  1014. read_attrs("users/user/test/a", "PPPPPPP")
  1015. self.fail()
  1016. except UnknownElement:
  1017. pass
  1018. # No read permissions
  1019. try:
  1020. read_attrs("administration/core", "formalisms")
  1021. self.fail()
  1022. except ReadPermissionDenied:
  1023. pass
  1024. # No write permissions, but can query
  1025. assert type(read_attrs("formalisms/SimpleClassDiagrams", "Class")) == type(dict())
  1026. def test_op_attr_assign(self):
  1027. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1028. SimpleAttribute Natural {
  1029. name = "natural"
  1030. }
  1031. SimpleAttribute String {
  1032. name = "string"
  1033. }
  1034. Class Place {
  1035. name = "Place"
  1036. name : String
  1037. capacity : Natural
  1038. }
  1039. Class Transition {
  1040. name = "Transition"
  1041. name : String
  1042. }
  1043. Association P2T (Place, Transition) {
  1044. name = "P2T"
  1045. weight : Natural
  1046. }
  1047. Association T2P (Transition, Place) {
  1048. name = "T2P"
  1049. weight : Natural
  1050. }
  1051. """)
  1052. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  1053. assert attr_assign("users/user/test/a", "Natural", "name", "nat") == None
  1054. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "nat"}
  1055. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1056. assert attr_assign("users/user/test/a", "Place", "name", "NewPlace") == None
  1057. assert attr_assign("users/user/test/a", "Place", "abstract", False) == None
  1058. assert attr_assign("users/user/test/a", "Place", "lower_cardinality", 4) == None
  1059. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "NewPlace", "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  1060. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1061. assert attr_assign("users/user/test/a", "P2T", "name", "PPP") == None
  1062. assert attr_assign("users/user/test/a", "P2T", "source_lower_cardinality", 1) == None
  1063. assert attr_assign("users/user/test/a", "P2T", "target_upper_cardinality", 10) == None
  1064. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "PPP", "source_lower_cardinality": 1, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": 10, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1065. model_add("users/user/test/b", "users/user/test/a", """
  1066. Place p1 {
  1067. name = "place 1"
  1068. capacity = 2
  1069. }
  1070. Place p2 {
  1071. name = "place 2"
  1072. capacity = 1
  1073. }
  1074. Transition t1 {
  1075. name = "transition"
  1076. }
  1077. P2T p2t (p1, t1) {
  1078. weight = 4
  1079. }
  1080. T2P t2p (t1, p2) {
  1081. weight = 10
  1082. }
  1083. """)
  1084. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  1085. assert attr_assign("users/user/test/b", "p1", "name", "place 3") == None
  1086. assert attr_assign("users/user/test/b", "p1", "capacity", 3) == None
  1087. assert read_attrs("users/user/test/b", "p1") == {"name": "place 3", "capacity": 3}
  1088. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  1089. assert attr_assign("users/user/test/b", "p2t", "weight", 0) == None
  1090. assert read_attrs("users/user/test/b", "p2t") == {"weight": 0}
  1091. # Non-existing model
  1092. try:
  1093. attr_assign("users/afa", "p1", "name", "abc")
  1094. self.fail()
  1095. except UnknownModel:
  1096. pass
  1097. # Non-existing element
  1098. try:
  1099. attr_assign("users/user/test/a", "PPPPPPP", "name", "abc")
  1100. self.fail()
  1101. except UnknownElement:
  1102. pass
  1103. # No read permissions
  1104. try:
  1105. attr_assign("administration/core", "formalisms", "name", "abc")
  1106. self.fail()
  1107. except ReadPermissionDenied:
  1108. pass
  1109. # No write permissions
  1110. try:
  1111. attr_assign("formalisms/SimpleClassDiagrams", "Class", "name", "abc")
  1112. self.fail()
  1113. except WritePermissionDenied:
  1114. pass
  1115. # No such attribute
  1116. try:
  1117. attr_assign("users/user/test/a", "Place", "ddd", 1)
  1118. self.fail()
  1119. except UnknownAttribute:
  1120. pass
  1121. # Assign None, equals to attr_delete
  1122. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "NewPlace", "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  1123. attr_assign("users/user/test/a", "Place", "name", None)
  1124. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": None, "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  1125. def test_op_attr_delete(self):
  1126. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1127. SimpleAttribute Natural {
  1128. name = "natural"
  1129. }
  1130. SimpleAttribute String {
  1131. name = "string"
  1132. }
  1133. Class Place {
  1134. name = "Place"
  1135. name : String
  1136. capacity : Natural
  1137. }
  1138. Class Transition {
  1139. name = "Transition"
  1140. name : String
  1141. }
  1142. Association P2T (Place, Transition) {
  1143. name = "P2T"
  1144. weight : Natural
  1145. }
  1146. Association T2P (Transition, Place) {
  1147. name = "T2P"
  1148. weight : Natural
  1149. }
  1150. """)
  1151. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  1152. assert attr_delete("users/user/test/a", "Natural", "name") == None
  1153. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": None}
  1154. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1155. assert attr_delete("users/user/test/a", "Place", "name") == None
  1156. assert attr_delete("users/user/test/a", "Place", "abstract") == None
  1157. assert attr_delete("users/user/test/a", "Place", "lower_cardinality") == None
  1158. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1159. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1160. assert attr_delete("users/user/test/a", "P2T", "name") == None
  1161. assert attr_delete("users/user/test/a", "P2T", "source_lower_cardinality") == None
  1162. assert attr_delete("users/user/test/a", "P2T", "target_upper_cardinality") == None
  1163. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": None, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1164. model_add("users/user/test/b", "users/user/test/a", """
  1165. Place p1 {
  1166. name = "place 1"
  1167. capacity = 2
  1168. }
  1169. Place p2 {
  1170. name = "place 2"
  1171. capacity = 1
  1172. }
  1173. Transition t1 {
  1174. name = "transition"
  1175. }
  1176. P2T p2t (p1, t1) {
  1177. weight = 4
  1178. }
  1179. T2P t2p (t1, p2) {
  1180. weight = 10
  1181. }
  1182. """)
  1183. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  1184. assert attr_delete("users/user/test/b", "p1", "capacity") == None
  1185. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": None}
  1186. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  1187. assert attr_delete("users/user/test/b", "p2t", "weight") == None
  1188. assert read_attrs("users/user/test/b", "p2t") == {"weight": None}
  1189. # Non-existing model
  1190. try:
  1191. attr_delete("users/afa", "p1", "name")
  1192. self.fail()
  1193. except UnknownModel:
  1194. pass
  1195. # Non-existing element
  1196. try:
  1197. attr_delete("users/user/test/a", "PPPPPPP", "name")
  1198. self.fail()
  1199. except UnknownElement:
  1200. pass
  1201. # No read permissions
  1202. try:
  1203. attr_delete("administration/core", "formalisms", "name")
  1204. self.fail()
  1205. except ReadPermissionDenied:
  1206. pass
  1207. # No write permissions
  1208. try:
  1209. attr_delete("formalisms/SimpleClassDiagrams", "Class", "name")
  1210. self.fail()
  1211. except WritePermissionDenied:
  1212. pass
  1213. # No such attribute
  1214. try:
  1215. attr_delete("users/user/test/a", "Place", "ddd")
  1216. self.fail()
  1217. except UnknownAttribute:
  1218. pass
  1219. def test_op_attr_delete_code(self):
  1220. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1221. SimpleAttribute Natural {
  1222. name = "natural"
  1223. }
  1224. SimpleAttribute String {
  1225. name = "string"
  1226. }
  1227. Class Place {
  1228. name = "Place"
  1229. name : String
  1230. capacity : Natural
  1231. }
  1232. Class Transition {
  1233. name = "Transition"
  1234. name : String
  1235. }
  1236. Association P2T (Place, Transition) {
  1237. name = "P2T"
  1238. weight : Natural
  1239. }
  1240. Association T2P (Transition, Place) {
  1241. name = "T2P"
  1242. weight : Natural
  1243. }
  1244. """)
  1245. # Test what happens if removing a non-existing AL attribute
  1246. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1247. attr_delete("users/user/test/a", "Place", "constraint")
  1248. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1249. # Test what happens if removing an existing AL attribute
  1250. attr_assign_code("users/user/test/a", "Place", "constraint", """
  1251. String function a(value : Element):
  1252. return "OK"!
  1253. """)
  1254. attrs = read_attrs("users/user/test/a", "Place")
  1255. assert "AL" in attrs["constraint"]
  1256. assert attrs["constraint"]["AL"] != ""
  1257. attr_delete("users/user/test/a", "Place", "constraint")
  1258. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1259. def test_op_attr_assign_code(self):
  1260. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1261. SimpleAttribute Natural {
  1262. name = "natural"
  1263. }
  1264. SimpleAttribute String {
  1265. name = "string"
  1266. }
  1267. Class Place {
  1268. name = "Place"
  1269. name : String
  1270. capacity : Natural
  1271. }
  1272. Class Transition {
  1273. name = "Transition"
  1274. name : String
  1275. }
  1276. Association P2T (Place, Transition) {
  1277. name = "P2T"
  1278. weight : Natural
  1279. }
  1280. Association T2P (Transition, Place) {
  1281. name = "T2P"
  1282. weight : Natural
  1283. }
  1284. """)
  1285. # Test ordinary case
  1286. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1287. assert attr_assign_code("users/user/test/a", "Place", "constraint", """
  1288. String function a(value : Element):
  1289. return "OK"!
  1290. """) == None
  1291. attrs = read_attrs("users/user/test/a", "Place")
  1292. assert "AL" in attrs["constraint"]
  1293. assert attrs["constraint"]["AL"] != ""
  1294. assert AL_text(attrs["constraint"]["AL"]).strip() == """
  1295. String function a(value : Element):
  1296. return "OK"!
  1297. """.strip()
  1298. # Test assign when already assigned
  1299. attrs = read_attrs("users/user/test/a", "Place")
  1300. old_location = attrs["constraint"]["AL"]
  1301. old_text = AL_text(attrs["constraint"]["AL"])
  1302. assert attr_assign_code("users/user/test/a", "Place", "constraint", """
  1303. String function a(value : Element):
  1304. return "NOK"!
  1305. """) == None
  1306. attrs = read_attrs("users/user/test/a", "Place")
  1307. assert "AL" in attrs["constraint"]
  1308. assert attrs["constraint"]["AL"] != ""
  1309. assert attrs["constraint"]["AL"] != old_location
  1310. assert AL_text(attrs["constraint"]["AL"]).strip() == """
  1311. String function a(value : Element):
  1312. return "NOK"!
  1313. """.strip()
  1314. assert AL_text(attrs["constraint"]["AL"]).strip () != old_text.strip()
  1315. simple_code = \
  1316. """
  1317. String function a(value : Element):
  1318. return "OK"!
  1319. """
  1320. # Non-existing model
  1321. try:
  1322. attr_assign_code("users/afa", "p1", "name", simple_code)
  1323. self.fail()
  1324. except UnknownModel:
  1325. pass
  1326. # Non-existing element
  1327. try:
  1328. attr_assign_code("users/user/test/a", "PPPPPPP", "name", simple_code)
  1329. self.fail()
  1330. except UnknownElement:
  1331. pass
  1332. # No read permissions
  1333. try:
  1334. attr_assign_code("administration/core", "formalisms", "name", simple_code)
  1335. self.fail()
  1336. except ReadPermissionDenied:
  1337. pass
  1338. # No write permissions
  1339. try:
  1340. attr_assign_code("formalisms/SimpleClassDiagrams", "Class", "name", simple_code)
  1341. self.fail()
  1342. except WritePermissionDenied:
  1343. pass
  1344. # No such attribute
  1345. try:
  1346. attr_assign_code("users/user/test/a", "Place", "ddd", simple_code)
  1347. self.fail()
  1348. except UnknownAttribute:
  1349. pass
  1350. # Compilation error
  1351. try:
  1352. attr_assign_code("users/user/test/a", "Place", "constraint", "abc")
  1353. self.fail()
  1354. except CompilationError:
  1355. pass
  1356. def test_op_instantiate(self):
  1357. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  1358. assert element_list("users/user/test/a") == set([])
  1359. # Instantiate node element
  1360. ID = instantiate("users/user/test/a", "Class")
  1361. assert element_list("users/user/test/a") == set([(ID, "Class")])
  1362. assert read_info("users/user/test/a", ID) == ("Class", None)
  1363. # Instantiate node element with ID
  1364. ID2 = instantiate("users/user/test/a", "Class", ID="new_node")
  1365. assert ID2 == "new_node"
  1366. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class")])
  1367. assert read_info("users/user/test/a", ID2) == ("Class", None)
  1368. # Instantiate edge element
  1369. ID3 = instantiate("users/user/test/a", "Association", edge=(ID, ID2))
  1370. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association")])
  1371. assert read_info("users/user/test/a", ID3) == ("Association", (ID, ID2))
  1372. # Instantiate edge element with ID
  1373. ID4 = instantiate("users/user/test/a", "Association", edge=(ID, ID2), ID="new_edge")
  1374. assert ID4 == "new_edge"
  1375. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association")])
  1376. assert read_info("users/user/test/a", ID4) == ("Association", (ID, ID2))
  1377. # Instantiate edge from edge (source)
  1378. ID5 = instantiate("users/user/test/a", "Association", edge=(ID3, ID))
  1379. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association")])
  1380. assert read_info("users/user/test/a", ID5) == ("Association", (ID3, ID))
  1381. # Instantiate edge from edge (target)
  1382. ID6 = instantiate("users/user/test/a", "Association", edge=(ID, ID3))
  1383. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association"), (ID6, "Association")])
  1384. assert read_info("users/user/test/a", ID6) == ("Association", (ID, ID3))
  1385. # Instantiate edge from edge (source and target)
  1386. ID7 = instantiate("users/user/test/a", "Association", edge=(ID3, ID4))
  1387. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association"), (ID6, "Association"), (ID7, "Association")])
  1388. assert read_info("users/user/test/a", ID7) == ("Association", (ID3, ID4))
  1389. # Non-existing model
  1390. try:
  1391. instantiate("users/afa", "Association")
  1392. self.fail()
  1393. except UnknownModel:
  1394. pass
  1395. # Non-existing element
  1396. before = element_list("users/user/test/a")
  1397. try:
  1398. instantiate("users/user/test/a", "AAAAAAA")
  1399. self.fail()
  1400. except UnknownElement:
  1401. assert element_list("users/user/test/a") == before
  1402. # No read permissions
  1403. try:
  1404. instantiate("administration/core", "formalisms")
  1405. self.fail()
  1406. except ReadPermissionDenied:
  1407. pass
  1408. # No write permissions
  1409. before = element_list("users/user/test/a")
  1410. try:
  1411. instantiate("formalisms/SimpleClassDiagrams", "Class")
  1412. self.fail()
  1413. except WritePermissionDenied:
  1414. assert element_list("users/user/test/a") == before
  1415. # Pre-existing ID requested (node)
  1416. before = element_list("users/user/test/a")
  1417. try:
  1418. instantiate("users/user/test/a", "Class", ID=ID)
  1419. self.fail()
  1420. except ElementExists:
  1421. assert element_list("users/user/test/a") == before
  1422. # Pre-existing ID requested (edge)
  1423. before = element_list("users/user/test/a")
  1424. try:
  1425. instantiate("users/user/test/a", "Association", ID=ID, edge=(ID2, ID3))
  1426. self.fail()
  1427. except ElementExists:
  1428. assert element_list("users/user/test/a") == before
  1429. # Edge from non-existing ID
  1430. before = element_list("users/user/test/a")
  1431. try:
  1432. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", ID3))
  1433. self.fail()
  1434. except ElementExists:
  1435. assert element_list("users/user/test/a") == before
  1436. # Edge to non-existing ID
  1437. before = element_list("users/user/test/a")
  1438. try:
  1439. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", ID3))
  1440. self.fail()
  1441. except ElementExists:
  1442. assert element_list("users/user/test/a") == before
  1443. # Edge both non-existing ID
  1444. before = element_list("users/user/test/a")
  1445. try:
  1446. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", "non-existing2"))
  1447. self.fail()
  1448. except ElementExists:
  1449. assert element_list("users/user/test/a") == before
  1450. # Garbage type
  1451. before = element_list("users/user/test/a")
  1452. try:
  1453. instantiate("users/user/test/a", ("a", "b"))
  1454. self.fail()
  1455. except UnknownElement:
  1456. assert element_list("users/user/test/a") == before
  1457. # Garbage edge src
  1458. before = element_list("users/user/test/a")
  1459. try:
  1460. instantiate("users/user/test/a", "Association", edge=(('a', 'b'), "non-existing2"))
  1461. self.fail()
  1462. except UnknownElement:
  1463. assert element_list("users/user/test/a") == before
  1464. # Garbage edge dst
  1465. before = element_list("users/user/test/a")
  1466. try:
  1467. instantiate("users/user/test/a", "Association", edge=("non-existing", ('a', 'b')))
  1468. self.fail()
  1469. except UnknownElement:
  1470. assert element_list("users/user/test/a") == before
  1471. def test_op_delete_element(self):
  1472. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1473. Class A {}
  1474. """)
  1475. # Test simple delete
  1476. assert len(element_list_nice("users/user/test/a")) == 1
  1477. assert delete_element("users/user/test/a", "A") == None
  1478. assert len(element_list_nice("users/user/test/a")) == 0
  1479. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  1480. Class A {}
  1481. Class B {}
  1482. Association (A, B) {}
  1483. """)
  1484. # Test delete of element that causes other elements to be deleted as well
  1485. assert len(element_list_nice("users/user/test/b")) == 3
  1486. assert delete_element("users/user/test/b", "A") == None
  1487. assert len(element_list_nice("users/user/test/b")) == 1
  1488. model_add("users/user/test/c", "formalisms/SimpleClassDiagrams", """
  1489. Class A {}
  1490. Class B {}
  1491. Association C (A, B) {}
  1492. """)
  1493. # Test delete of edge that causes other elements to be deleted as well
  1494. assert len(element_list_nice("users/user/test/c")) == 3
  1495. assert delete_element("users/user/test/c", "C") == None
  1496. assert len(element_list_nice("users/user/test/c")) == 2
  1497. model_add("users/user/test/d", "formalisms/SimpleClassDiagrams", """
  1498. Class A {
  1499. name = "A"
  1500. }
  1501. """)
  1502. # Test delete of a "hidden" element
  1503. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": "A", "abstract": None}]
  1504. ID = [i for i in element_list("users/user/test/d") if i[1] == "Class_name"][0][0]
  1505. assert delete_element("users/user/test/d", ID) == None
  1506. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1507. # Non-existing model
  1508. try:
  1509. delete_element("users/afa", "Association")
  1510. self.fail()
  1511. except UnknownModel:
  1512. pass
  1513. # Non-existing element
  1514. before = element_list("users/user/test/a")
  1515. try:
  1516. delete_element("users/user/test/a", "AAAAAAA")
  1517. self.fail()
  1518. except UnknownElement:
  1519. assert element_list("users/user/test/a") == before
  1520. # No read permissions
  1521. try:
  1522. delete_element("administration/core", "formalisms")
  1523. self.fail()
  1524. except ReadPermissionDenied:
  1525. pass
  1526. # No write permissions
  1527. before = element_list("formalisms/SimpleClassDiagrams")
  1528. try:
  1529. delete_element("formalisms/SimpleClassDiagrams", "Class")
  1530. self.fail()
  1531. except WritePermissionDenied:
  1532. assert element_list("formalisms/SimpleClassDiagrams") == before
  1533. # Give garbage
  1534. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1535. try:
  1536. delete_element("users/user/test/d", ('abc', 'def'))
  1537. except UnknownElement:
  1538. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1539. def test_op_AL_text(self):
  1540. # Test normal situation with code provided by assignment
  1541. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  1542. Class A {}
  1543. """)
  1544. attr_assign_code("users/user/test/b", "A", "constraint", """
  1545. String function main(value : Element):
  1546. return "OK"!
  1547. """)
  1548. assert AL_text(read_attrs("users/user/test/b", "A")["constraint"]["AL"]).strip() == """
  1549. String function main(value : Element):
  1550. return "OK"!
  1551. """.strip()
  1552. # Test normal situation with code provided by HUTN parser (model)
  1553. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1554. Class A {
  1555. constraint = $
  1556. String function main(value : Element):
  1557. return "OK"!
  1558. $
  1559. }
  1560. """)
  1561. assert AL_text(read_attrs("users/user/test/a", "A")["constraint"]["AL"]).strip() == 'String function main(value : Element):\n\treturn "OK"!'
  1562. # Test AL_text on non-existing location
  1563. try:
  1564. AL_text("abc")
  1565. self.fail()
  1566. except UnknownLocation:
  1567. pass
  1568. # No permissions on locations directly, so there are no checks that have to be done
  1569. def test_op_read_outgoing(self):
  1570. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1571. SimpleAttribute String {}
  1572. Class A {
  1573. name : String
  1574. }
  1575. Class B {}
  1576. Association C (A, B) {}
  1577. Association D (C, B) {}
  1578. """)
  1579. # Test normal operation
  1580. assert read_outgoing("users/user/test/a", "A", "Association") == set(["C"])
  1581. assert read_outgoing("users/user/test/a", "A", "AttributeLink") == set(["A_name"])
  1582. # Test wildcard
  1583. assert read_outgoing("users/user/test/a", "A", "") == set(["A_name", "C"])
  1584. # Test association on association
  1585. assert read_outgoing("users/user/test/a", "C", "") == set(["D"])
  1586. # Test empty result
  1587. assert read_outgoing("users/user/test/a", "B", "") == set([])
  1588. # Test simpleattribute
  1589. assert read_outgoing("users/user/test/a", "String", "") == set([])
  1590. # Non-existing model
  1591. try:
  1592. read_outgoing("users/afa", "Association", "")
  1593. self.fail()
  1594. except UnknownModel:
  1595. pass
  1596. # Non-existing element
  1597. before = element_list("users/user/test/a")
  1598. try:
  1599. read_outgoing("users/user/test/a", "AAAAAAA", "")
  1600. self.fail()
  1601. except UnknownElement:
  1602. assert element_list("users/user/test/a") == before
  1603. # Non-existing type
  1604. before = element_list("users/user/test/a")
  1605. try:
  1606. read_outgoing("users/user/test/a", "A", "AAAAAAA")
  1607. self.fail()
  1608. except UnknownElement:
  1609. assert element_list("users/user/test/a") == before
  1610. # No read permissions
  1611. try:
  1612. read_outgoing("administration/core", "formalisms", "")
  1613. self.fail()
  1614. except ReadPermissionDenied:
  1615. pass
  1616. # No write permissions, but can query
  1617. assert type(read_outgoing("formalisms/SimpleClassDiagrams", "Class", "")) == type(set())
  1618. def test_op_read_incoming(self):
  1619. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1620. SimpleAttribute String {}
  1621. Class A {
  1622. name : String
  1623. }
  1624. Class B {}
  1625. Association C (A, B) {}
  1626. Association E (A, A) {}
  1627. Association D (C, B) {}
  1628. Association F (D, E) {}
  1629. """)
  1630. # Test normal operation
  1631. assert read_incoming("users/user/test/a", "B", "Association") == set(["C", "D"])
  1632. # Test wildcard
  1633. assert read_incoming("users/user/test/a", "B", "") == set(["C", "D"])
  1634. # Test association on association
  1635. assert read_incoming("users/user/test/a", "E", "") == set(["F"])
  1636. # Test double result
  1637. assert read_incoming("users/user/test/a", "A", "") == set(["E"])
  1638. # Test simpleattribute
  1639. assert read_incoming("users/user/test/a", "String", "") == set(["A_name"])
  1640. # Test empty result
  1641. assert read_incoming("users/user/test/a", "F", "") == set([])
  1642. # Non-existing model
  1643. try:
  1644. read_incoming("users/afa", "Association", "")
  1645. self.fail()
  1646. except UnknownModel:
  1647. pass
  1648. # Non-existing element
  1649. before = element_list("users/user/test/a")
  1650. try:
  1651. read_incoming("users/user/test/a", "AAAAAAA", "")
  1652. self.fail()
  1653. except UnknownElement:
  1654. assert element_list("users/user/test/a") == before
  1655. # Non-existing type
  1656. before = element_list("users/user/test/a")
  1657. try:
  1658. read_incoming("users/user/test/a", "A", "AAAAAAA")
  1659. self.fail()
  1660. except UnknownElement:
  1661. assert element_list("users/user/test/a") == before
  1662. # No read permissions
  1663. try:
  1664. read_incoming("administration/core", "formalisms", "")
  1665. self.fail()
  1666. except ReadPermissionDenied:
  1667. pass
  1668. # No write permissions, but can query
  1669. assert type(read_incoming("formalisms/SimpleClassDiagrams", "Class", "")) == type(set())
  1670. def test_op_read_association_source(self):
  1671. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1672. SimpleAttribute String {}
  1673. Class A {
  1674. name : String
  1675. }
  1676. Class B {}
  1677. Association C (A, B) {}
  1678. Association E (A, A) {}
  1679. Association D (C, B) {}
  1680. Association F (D, E) {}
  1681. """)
  1682. # Test normal operation
  1683. assert read_association_source("users/user/test/a", "C") == "A"
  1684. # Test association on association
  1685. assert read_association_source("users/user/test/a", "D") == "C"
  1686. # Test node
  1687. try:
  1688. assert read_association_source("users/user/test/a", "A")
  1689. self.fail()
  1690. except NotAnAssociation:
  1691. pass
  1692. # Non-existing model
  1693. try:
  1694. read_association_source("users/afa", "Association")
  1695. self.fail()
  1696. except UnknownModel:
  1697. pass
  1698. # Non-existing element
  1699. before = element_list("users/user/test/a")
  1700. try:
  1701. read_association_source("users/user/test/a", "AAAAAAA")
  1702. self.fail()
  1703. except UnknownElement:
  1704. assert element_list("users/user/test/a") == before
  1705. # No read permissions
  1706. try:
  1707. read_association_source("administration/core", "formalisms")
  1708. self.fail()
  1709. except ReadPermissionDenied:
  1710. pass
  1711. # No write permissions, but can query
  1712. assert read_association_source("formalisms/SimpleClassDiagrams", "Association") == "Class"
  1713. def test_op_read_association_destination(self):
  1714. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1715. SimpleAttribute String {}
  1716. Class A {
  1717. name : String
  1718. }
  1719. Class B {}
  1720. Association C (A, B) {}
  1721. Association E (A, A) {}
  1722. Association D (C, B) {}
  1723. Association F (D, E) {}
  1724. """)
  1725. # Test normal operation
  1726. assert read_association_destination("users/user/test/a", "C") == "B"
  1727. # Test association on association
  1728. assert read_association_destination("users/user/test/a", "F") == "E"
  1729. # Test node
  1730. try:
  1731. assert read_association_destination("users/user/test/a", "A")
  1732. self.fail()
  1733. except NotAnAssociation:
  1734. pass
  1735. # Non-existing model
  1736. try:
  1737. read_association_destination("users/afa", "Association")
  1738. self.fail()
  1739. except UnknownModel:
  1740. pass
  1741. # Non-existing element
  1742. before = element_list("users/user/test/a")
  1743. try:
  1744. read_association_destination("users/user/test/a", "AAAAAAA")
  1745. self.fail()
  1746. except UnknownElement:
  1747. assert element_list("users/user/test/a") == before
  1748. # No read permissions
  1749. try:
  1750. read_association_destination("administration/core", "formalisms")
  1751. self.fail()
  1752. except ReadPermissionDenied:
  1753. pass
  1754. # No write permissions, but can query
  1755. assert read_association_destination("formalisms/SimpleClassDiagrams", "Association") == "Class"
  1756. def test_op_connections_between(self):
  1757. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1758. SimpleAttribute String {}
  1759. Class A {
  1760. name1 : String
  1761. name2 : String
  1762. }
  1763. Class B {}
  1764. Association C (A, B) {}
  1765. Association D (A, B) {}
  1766. Association E (A, A) {}
  1767. Association F (C, B) {}
  1768. Association G (E, F) {}
  1769. """)
  1770. # Test normal operation
  1771. assert connections_between("users/user/test/a", "A", "A") == set(["Association", "Inheritance"])
  1772. assert connections_between("users/user/test/a", "A", "B") == set(["Association", "Inheritance"])
  1773. assert connections_between("users/user/test/a", "A", "C") == set(["Association", "Inheritance"])
  1774. # Test none allowed
  1775. assert connections_between("users/user/test/a", "A_name1", "A_name2") == set([])
  1776. # Non-existing model
  1777. try:
  1778. connections_between("users/afa", "A", "B")
  1779. self.fail()
  1780. except UnknownModel:
  1781. pass
  1782. # Non-existing element (1)
  1783. before = element_list("users/user/test/a")
  1784. try:
  1785. connections_between("users/user/test/a", "AA", "B")
  1786. self.fail()
  1787. except UnknownElement:
  1788. assert element_list("users/user/test/a") == before
  1789. # Non-existing element (2)
  1790. before = element_list("users/user/test/a")
  1791. try:
  1792. connections_between("users/user/test/a", "A", "BB")
  1793. self.fail()
  1794. except UnknownElement:
  1795. assert element_list("users/user/test/a") == before
  1796. # No read permissions
  1797. try:
  1798. connections_between("administration/core", "formalisms", "formalisms")
  1799. self.fail()
  1800. except ReadPermissionDenied:
  1801. pass
  1802. # No write permissions, but can query
  1803. assert connections_between("formalisms/SimpleClassDiagrams", "Association", "Association") == set(["Association", "Inheritance"])
  1804. def test_op_define_attribute(self):
  1805. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1806. SimpleAttribute String {}
  1807. SimpleAttribute Natural {}
  1808. Class A {}
  1809. Class B {}
  1810. Association C (A, B) {}
  1811. Association D (C, A) {}
  1812. """)
  1813. assert read_defined_attrs("users/user/test/a", "A") == ({}, {})
  1814. # Test normal operation
  1815. define_attribute("users/user/test/a", "A", "my_attr", "String")
  1816. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String"}, {})
  1817. # Test second attribute of same type
  1818. define_attribute("users/user/test/a", "A", "my_second_attr", "String")
  1819. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String", "my_second_attr": "String"}, {})
  1820. # Test third attribute with different type
  1821. define_attribute("users/user/test/a", "A", "a_third_one", "Natural")
  1822. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String", "my_second_attr": "String", "a_third_one": "Natural"}, {})
  1823. # Test same on associations
  1824. define_attribute("users/user/test/a", "C", "my_attr", "String")
  1825. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String"}, {})
  1826. # Test second attribute of same type
  1827. define_attribute("users/user/test/a", "C", "my_second_attr", "String")
  1828. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String", "my_second_attr": "String"}, {})
  1829. # Test third attribute with different type
  1830. define_attribute("users/user/test/a", "C", "a_third_one", "Natural")
  1831. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String", "my_second_attr": "String", "a_third_one": "Natural"}, {})
  1832. # Non-existing model
  1833. try:
  1834. define_attribute("users/afa", "A", "B", "C")
  1835. self.fail()
  1836. except UnknownModel:
  1837. pass
  1838. # Non-existing element (1)
  1839. before = element_list("users/user/test/a")
  1840. try:
  1841. define_attribute("users/user/test/a", "AA", "B", "Natural")
  1842. self.fail()
  1843. except UnknownElement:
  1844. assert element_list("users/user/test/a") == before
  1845. # Non-existing element (2)
  1846. before = element_list("users/user/test/a")
  1847. try:
  1848. define_attribute("users/user/test/a", "A", "B", "Natural2")
  1849. self.fail()
  1850. except UnknownElement:
  1851. assert element_list("users/user/test/a") == before
  1852. # Attribute exists
  1853. before = element_list("users/user/test/a")
  1854. try:
  1855. define_attribute("users/user/test/a", "A", "my_attr", "Natural")
  1856. self.fail()
  1857. except AttributeExists:
  1858. assert element_list("users/user/test/a") == before
  1859. # No read permissions
  1860. before = element_list("users/user/test/a")
  1861. try:
  1862. define_attribute("administration/core", "formalisms", "name", "A")
  1863. self.fail()
  1864. except ReadPermissionDenied:
  1865. assert element_list("users/user/test/a") == before
  1866. # No write permissions
  1867. before = element_list("users/user/test/a")
  1868. try:
  1869. define_attribute("formalisms/SimpleClassDiagrams", "Association", "new_name", "String")
  1870. self.fail()
  1871. except WritePermissionDenied:
  1872. assert element_list("users/user/test/a") == before
  1873. # None defined in non-SCD model
  1874. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  1875. try:
  1876. define_attribute("users/user/test/b", "a", "abc", "a")
  1877. self.fail()
  1878. except NoSimpleClassDiagramsModel:
  1879. pass
  1880. def test_op_read_defined_attrs(self):
  1881. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1882. SimpleAttribute String {}
  1883. SimpleAttribute Natural {}
  1884. Class A {
  1885. name = "ABC"
  1886. value : Natural
  1887. new_name ?: String
  1888. name : String
  1889. }
  1890. Association B (A, A) {
  1891. name = "DEF"
  1892. edge_value : Natural
  1893. name : String
  1894. other_value ?: String
  1895. }
  1896. Class C {}
  1897. Class D : A {
  1898. additional_attr : Natural
  1899. }
  1900. Association E : B (D, A) {
  1901. next_attr : String
  1902. }
  1903. """)
  1904. # Normal operation
  1905. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  1906. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  1907. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  1908. # Works with inheritance
  1909. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  1910. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  1911. # Non-existing model
  1912. try:
  1913. read_defined_attrs("users/afa", "A")
  1914. self.fail()
  1915. except UnknownModel:
  1916. pass
  1917. # Non-existing element
  1918. before = element_list("users/user/test/a")
  1919. try:
  1920. read_defined_attrs("users/user/test/a", "AA")
  1921. self.fail()
  1922. except UnknownElement:
  1923. assert element_list("users/user/test/a") == before
  1924. # No read permissions
  1925. before = element_list("users/user/test/a")
  1926. try:
  1927. read_defined_attrs("administration/core", "formalisms")
  1928. self.fail()
  1929. except ReadPermissionDenied:
  1930. assert element_list("users/user/test/a") == before
  1931. # No write permissions, but can still query
  1932. assert read_defined_attrs("formalisms/SimpleClassDiagrams", "Association") == ({"name": "String"}, {"abstract": "Boolean", "constraint": "ActionCode", "lower_cardinality": "Natural", "upper_cardinality": "Natural", "source_lower_cardinality": "Natural", "source_upper_cardinality": "Natural", "target_lower_cardinality": "Natural", "target_upper_cardinality": "Natural"})
  1933. # None defined in non-SCD model
  1934. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  1935. try:
  1936. read_defined_attrs("users/user/test/b", "a")
  1937. self.fail()
  1938. except NoSimpleClassDiagramsModel:
  1939. pass
  1940. def test_op_undefine_attribute(self):
  1941. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1942. SimpleAttribute String {}
  1943. SimpleAttribute Natural {}
  1944. Class A {
  1945. name = "ABC"
  1946. value : Natural
  1947. new_name ?: String
  1948. name : String
  1949. }
  1950. Association B (A, A) {
  1951. name = "DEF"
  1952. edge_value : Natural
  1953. name : String
  1954. other_value ?: String
  1955. }
  1956. Class C {}
  1957. Class D : A {
  1958. additional_attr : Natural
  1959. }
  1960. Association E : B (D, A) {
  1961. next_attr : String
  1962. }
  1963. """)
  1964. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  1965. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  1966. undefine_attribute("users/user/test/a", "A", "name")
  1967. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural"}, {"new_name": "String"})
  1968. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1969. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  1970. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  1971. undefine_attribute("users/user/test/a", "B", "other_value")
  1972. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {})
  1973. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {})
  1974. # Remove superclass definition
  1975. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1976. try:
  1977. undefine_attribute("users/user/test/a", "D", "value")
  1978. self.fail()
  1979. except SuperclassAttribute:
  1980. pass
  1981. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1982. # Non-existing model
  1983. try:
  1984. undefine_attribute("users/afa", "A", "B")
  1985. self.fail()
  1986. except UnknownModel:
  1987. pass
  1988. # Non-existing element
  1989. before = read_defined_attrs("users/user/test/a", "A")
  1990. try:
  1991. undefine_attribute("users/user/test/a", "AA", "B")
  1992. self.fail()
  1993. except UnknownElement:
  1994. assert read_defined_attrs("users/user/test/a", "A") == before
  1995. # Non-existing attribute
  1996. before = read_defined_attrs("users/user/test/a", "A")
  1997. try:
  1998. undefine_attribute("users/user/test/a", "A", "adfadf")
  1999. self.fail()
  2000. except UnknownAttribute:
  2001. assert read_defined_attrs("users/user/test/a", "A") == before
  2002. # No read permissions
  2003. try:
  2004. undefine_attribute("administration/core", "formalisms", "name")
  2005. self.fail()
  2006. except ReadPermissionDenied:
  2007. pass
  2008. # No write permissions
  2009. before = read_defined_attrs("formalisms/SimpleClassDiagrams", "Class")
  2010. try:
  2011. undefine_attribute("formalisms/SimpleClassDiagrams", "Class", "name")
  2012. self.fail()
  2013. except WritePermissionDenied:
  2014. assert read_defined_attrs("formalisms/SimpleClassDiagrams", "Class") == before
  2015. def test_op_attribute_optional(self):
  2016. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2017. SimpleAttribute String {}
  2018. SimpleAttribute Natural {}
  2019. Class A {
  2020. name = "ABC"
  2021. value : Natural
  2022. new_name ?: String
  2023. name : String
  2024. }
  2025. Association B (A, A) {
  2026. name = "DEF"
  2027. edge_value : Natural
  2028. name : String
  2029. other_value ?: String
  2030. }
  2031. Class C {}
  2032. Class D : A {
  2033. additional_attr : Natural
  2034. }
  2035. Association E : B (D, A) {
  2036. next_attr : String
  2037. }
  2038. """)
  2039. # Check initial situation
  2040. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  2041. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  2042. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  2043. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2044. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  2045. # mandatory -> optional
  2046. attribute_optional("users/user/test/a", "A", "value", True)
  2047. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String"}, {"new_name": "String", "value": "Natural"})
  2048. # Check inheritance as well
  2049. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural"}, {"new_name": "String", "value": "Natural"})
  2050. # optional -> mandatory
  2051. attribute_optional("users/user/test/a", "A", "new_name", False)
  2052. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  2053. # Check inheritance as well
  2054. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  2055. # mandatory -> mandatory
  2056. attribute_optional("users/user/test/a", "A", "new_name", False)
  2057. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  2058. # Check inheritance as well
  2059. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  2060. # optional -> optional
  2061. attribute_optional("users/user/test/a", "A", "value", True)
  2062. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  2063. # Check inheritance as well
  2064. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  2065. # Non-existing model
  2066. try:
  2067. attribute_optional("users/afa", "A", "value", False)
  2068. self.fail()
  2069. except UnknownModel:
  2070. pass
  2071. # Non-existing element
  2072. before = element_list("users/user/test/a")
  2073. try:
  2074. attribute_optional("users/user/test/a", "AA", "value", False)
  2075. self.fail()
  2076. except UnknownElement:
  2077. assert element_list("users/user/test/a") == before
  2078. # No read permissions
  2079. try:
  2080. attribute_optional("administration/core", "formalisms", "name", True)
  2081. self.fail()
  2082. except ReadPermissionDenied:
  2083. pass
  2084. # No write permissions, but can still query
  2085. before = element_list("formalisms/SimpleClassDiagrams")
  2086. try:
  2087. attribute_optional("formalisms/SimpleClassDiagrams", "Class", "name", True)
  2088. self.fail()
  2089. except WritePermissionDenied:
  2090. assert element_list("formalisms/SimpleClassDiagrams") == before
  2091. # None defined in non-SCD model
  2092. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  2093. try:
  2094. attribute_optional("users/user/test/b", "a", "b", False)
  2095. self.fail()
  2096. except NoSimpleClassDiagramsModel:
  2097. pass
  2098. def test_op_attribute_type(self):
  2099. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2100. SimpleAttribute String {}
  2101. SimpleAttribute Natural {}
  2102. Class A {
  2103. name = "ABC"
  2104. value : Natural
  2105. new_name ?: String
  2106. name : String
  2107. }
  2108. Association B (A, A) {
  2109. name = "DEF"
  2110. edge_value : Natural
  2111. name : String
  2112. other_value ?: String
  2113. }
  2114. Class C {}
  2115. Class D : A {
  2116. additional_attr : Natural
  2117. }
  2118. Association E : B (D, A) {
  2119. next_attr : String
  2120. }
  2121. """)
  2122. # Check initial situation
  2123. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  2124. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  2125. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  2126. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2127. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  2128. # Change type of node
  2129. attribute_type("users/user/test/a", "A", "value", "String")
  2130. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "String", "name": "String"}, {"new_name": "String"})
  2131. # Check inheritance as well
  2132. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "String", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2133. # Change type of edge
  2134. attribute_type("users/user/test/a", "B", "name", "Natural")
  2135. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "Natural"}, {"other_value": "String"})
  2136. # Check inheritance as well
  2137. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "Natural", "next_attr": "String"}, {"other_value": "String"})
  2138. # Non-existing model
  2139. try:
  2140. attribute_type("users/afa", "A", "value", "String")
  2141. self.fail()
  2142. except UnknownModel:
  2143. pass
  2144. # Non-existing element
  2145. before = element_list("users/user/test/a")
  2146. try:
  2147. attribute_type("users/user/test/a", "AA", "value", "String")
  2148. self.fail()
  2149. except UnknownElement:
  2150. assert element_list("users/user/test/a") == before
  2151. # Non-existing type
  2152. before = element_list("users/user/test/a")
  2153. try:
  2154. attribute_type("users/user/test/a", "A", "value", "SSS")
  2155. self.fail()
  2156. except UnknownElement:
  2157. assert element_list("users/user/test/a") == before
  2158. # No read permissions
  2159. try:
  2160. attribute_type("administration/core", "formalisms", "name", "Natural")
  2161. self.fail()
  2162. except ReadPermissionDenied:
  2163. pass
  2164. # No write permissions, but can still query
  2165. before = element_list("formalisms/SimpleClassDiagrams")
  2166. try:
  2167. attribute_type("formalisms/SimpleClassDiagrams", "Class", "name", "Natural")
  2168. self.fail()
  2169. except WritePermissionDenied:
  2170. assert element_list("formalisms/SimpleClassDiagrams") == before
  2171. # None defined in non-SCD model
  2172. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  2173. try:
  2174. attribute_type("users/user/test/b", "a", "b", "a")
  2175. self.fail()
  2176. except NoSimpleClassDiagramsModel:
  2177. pass
  2178. def test_op_attribute_name(self):
  2179. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2180. SimpleAttribute String {}
  2181. SimpleAttribute Natural {}
  2182. Class A {
  2183. name = "ABC"
  2184. value : Natural
  2185. new_name ?: String
  2186. name : String
  2187. }
  2188. Association B (A, A) {
  2189. name = "DEF"
  2190. edge_value : Natural
  2191. name : String
  2192. other_value ?: String
  2193. }
  2194. Class C {}
  2195. Class D : A {
  2196. additional_attr : Natural
  2197. }
  2198. Association E : B (D, A) {
  2199. next_attr : String
  2200. }
  2201. """)
  2202. # Check initial situation
  2203. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  2204. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  2205. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  2206. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2207. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  2208. # Change name of node
  2209. attribute_name("users/user/test/a", "A", "value", "new_value")
  2210. assert read_defined_attrs("users/user/test/a", "A") == ({"new_value": "Natural", "name": "String"}, {"new_name": "String"})
  2211. # Check inheritance as well
  2212. assert read_defined_attrs("users/user/test/a", "D") == ({"new_value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2213. # Change name of edge
  2214. attribute_name("users/user/test/a", "B", "name", "other_name")
  2215. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "other_name": "String"}, {"other_value": "String"})
  2216. # Check inheritance as well
  2217. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "other_name": "String", "next_attr": "String"}, {"other_value": "String"})
  2218. # Non-existing model
  2219. try:
  2220. attribute_name("users/afa", "A", "value", "str")
  2221. self.fail()
  2222. except UnknownModel:
  2223. pass
  2224. # Non-existing element
  2225. before = element_list("users/user/test/a")
  2226. try:
  2227. attribute_name("users/user/test/a", "AA", "value", "val2")
  2228. self.fail()
  2229. except UnknownElement:
  2230. assert element_list("users/user/test/a") == before
  2231. # Pre-existing name
  2232. before = element_list("users/user/test/a")
  2233. try:
  2234. attribute_name("users/user/test/a", "A", "new_value", "name")
  2235. self.fail()
  2236. except AttributeExists:
  2237. assert element_list("users/user/test/a") == before
  2238. # No read permissions
  2239. try:
  2240. attribute_name("administration/core", "formalisms", "name", "natural")
  2241. self.fail()
  2242. except ReadPermissionDenied:
  2243. pass
  2244. # No write permissions, but can still query
  2245. before = element_list("formalisms/SimpleClassDiagrams")
  2246. try:
  2247. attribute_name("formalisms/SimpleClassDiagrams", "Class", "name", "value")
  2248. self.fail()
  2249. except WritePermissionDenied:
  2250. assert element_list("formalisms/SimpleClassDiagrams") == before
  2251. # None defined in non-SCD model
  2252. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  2253. try:
  2254. attribute_name("users/user/test/b", "a", "b", "c")
  2255. self.fail()
  2256. except NoSimpleClassDiagramsModel:
  2257. pass
  2258. def test_op_group_create(self):
  2259. # Test normal operation
  2260. group_name_1 = "new_group"
  2261. group_name_2 = "group2"
  2262. group_name_3 = "other_group"
  2263. group_name_4 = "second_group"
  2264. assert group_list() == set([])
  2265. group_create(group_name_1)
  2266. assert group_list() == set([(group_name_1, True)])
  2267. # Test second group
  2268. assert group_list() == set([(group_name_1, True)])
  2269. group_create(group_name_2)
  2270. assert group_list() == set([(group_name_1, True), (group_name_2, True)])
  2271. # Test other groups
  2272. self.do_as_user("user2", group_create, [group_name_3])
  2273. self.do_as_user("user2", group_create, [group_name_4])
  2274. assert group_list() == set([(group_name_1, True), (group_name_2, True)])
  2275. # Test non-admin groups
  2276. self.do_as_user("user2", group_join, [group_name_3, "user"])
  2277. assert group_list() == set([(group_name_1, True), (group_name_2, True), (group_name_3, False)])
  2278. # Test create of existing group (member)
  2279. before = group_list()
  2280. try:
  2281. group_create(group_name_1)
  2282. self.fail()
  2283. except GroupExists:
  2284. assert group_list() == before
  2285. # Test create of existing group (non-member)
  2286. before = group_list()
  2287. try:
  2288. group_create(group_name_4)
  2289. self.fail()
  2290. except GroupExists:
  2291. assert group_list() == before
  2292. # Delete all groups again
  2293. self.do_as_user("admin", group_delete, [group_name_1])
  2294. self.do_as_user("admin", group_delete, [group_name_2])
  2295. self.do_as_user("admin", group_delete, [group_name_3])
  2296. self.do_as_user("admin", group_delete, [group_name_4])
  2297. def test_op_group_delete(self):
  2298. group_name_1 = "new_group" # Group with admin permissions
  2299. group_name_2 = "group2" # Group without permissions
  2300. group_name_3 = "other_group" # No member
  2301. group_name_4 = "second_group" # Non-existing group
  2302. # Ensure user2 exists
  2303. self.do_as_user("user2", lambda : 1, [])
  2304. # Create some groups first
  2305. group_create(group_name_1)
  2306. self.do_as_user("admin", group_create, [group_name_2])
  2307. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2308. self.do_as_user("admin", group_create, [group_name_3])
  2309. # Try to delete all
  2310. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2311. group_delete(group_name_1)
  2312. assert group_list() == set([(group_name_2, False)])
  2313. # Remove group that we don't own
  2314. try:
  2315. group_delete(group_name_2)
  2316. self.fail()
  2317. except GroupPermissionDenied:
  2318. assert group_list() == set([(group_name_2, False)])
  2319. # Remove group that we are not even member of
  2320. try:
  2321. group_delete(group_name_3)
  2322. self.fail()
  2323. except GroupPermissionDenied:
  2324. assert group_list() == set([(group_name_2, False)])
  2325. # Remove non-existing group
  2326. try:
  2327. group_delete(group_name_4)
  2328. except UnknownGroup:
  2329. assert group_list() == set([(group_name_2, False)])
  2330. # Test if other users can no longer see removed groups
  2331. group_create(group_name_1)
  2332. group_join(group_name_1, "user2")
  2333. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2334. group_delete(group_name_1)
  2335. assert self.do_as_user("user2", group_list, []) == set([])
  2336. # Delete all groups again
  2337. self.do_as_user("admin", group_delete, [group_name_2])
  2338. self.do_as_user("admin", group_delete, [group_name_3])
  2339. def test_op_group_list(self):
  2340. group_name_1 = "new_group" # Group with admin permissions
  2341. group_name_2 = "group2" # Group without permissions
  2342. group_name_3 = "other_group" # No member
  2343. group_name_4 = "second_group" # Non-existing group
  2344. # Ensure user2 exists
  2345. self.do_as_user("user2", lambda : 1, [])
  2346. # Create some groups first
  2347. group_create(group_name_1)
  2348. self.do_as_user("admin", group_create, [group_name_2])
  2349. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2350. self.do_as_user("admin", group_create, [group_name_3])
  2351. # Assure that groups of all users are correct
  2352. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2353. assert self.do_as_user("user2", group_list, []) == set([])
  2354. assert self.do_as_user("admin", group_list, []) == set([("admin", False), (group_name_2, True), (group_name_3, True)])
  2355. # Delete a group to check that everything is correctly listed afterwards
  2356. self.do_as_user("admin", group_delete, [group_name_2])
  2357. assert group_list() == set([(group_name_1, True)])
  2358. assert self.do_as_user("user2", group_list, []) == set([])
  2359. assert self.do_as_user("admin", group_list, []) == set([("admin", False), (group_name_3, True)])
  2360. # Delete all groups again
  2361. self.do_as_user("admin", group_delete, [group_name_1])
  2362. self.do_as_user("admin", group_delete, [group_name_3])
  2363. def do_as_user(self, username, operation, args):
  2364. user_logout()
  2365. login(username, username)
  2366. try:
  2367. result = operation(*args)
  2368. except:
  2369. user_logout()
  2370. login("user", "user")
  2371. raise
  2372. else:
  2373. user_logout()
  2374. login("user", "user")
  2375. return result
  2376. def test_op_group_join(self):
  2377. group_name_1 = "new_group" # Group with admin permissions
  2378. group_name_2 = "group2" # Group without permissions
  2379. group_name_3 = "other_group" # No member
  2380. group_name_4 = "second_group" # Non-existing group
  2381. # Ensure user2 exists
  2382. self.do_as_user("user2", lambda : 1, [])
  2383. # Create some groups first
  2384. group_create(group_name_1)
  2385. self.do_as_user("admin", group_create, [group_name_2])
  2386. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2387. self.do_as_user("admin", group_create, [group_name_3])
  2388. # Test for group join basic use, of group where we are admin
  2389. assert group_join(group_name_1, "user2") == None
  2390. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2391. # Test for group join of group where we are no admin
  2392. try:
  2393. group_join(group_name_2, "user2") == None
  2394. self.fail()
  2395. except GroupPermissionDenied:
  2396. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2397. # Test for group join of group where we are not even a member
  2398. try:
  2399. group_join(group_name_3, "user2") == None
  2400. self.fail()
  2401. except GroupPermissionDenied:
  2402. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2403. # Test for group join of group that already has user as member
  2404. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2405. try:
  2406. group_join(group_name_1, "user2") == None
  2407. self.fail()
  2408. except UserExists:
  2409. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2410. # Test for group join of non-existing user
  2411. try:
  2412. group_join(group_name_1, "user123") == None
  2413. self.fail()
  2414. except UnknownUser:
  2415. pass
  2416. # Test for group join of non-existing group
  2417. try:
  2418. group_join(group_name_4, "user2") == None
  2419. self.fail()
  2420. except UnknownGroup:
  2421. pass
  2422. # Delete all groups again
  2423. self.do_as_user("admin", group_delete, [group_name_1])
  2424. self.do_as_user("admin", group_delete, [group_name_2])
  2425. self.do_as_user("admin", group_delete, [group_name_3])
  2426. def test_op_group_kick(self):
  2427. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2428. group_name_1 = "new_group" # Group with admin permissions
  2429. group_name_2 = "group2" # Group without permissions
  2430. group_name_3 = "other_group" # No member
  2431. group_name_4 = "second_group" # Non-existing group
  2432. # Ensure user2 exists
  2433. self.do_as_user("user2", lambda : 1, [])
  2434. # Create some groups first
  2435. group_create(group_name_1)
  2436. self.do_as_user("admin", group_create, [group_name_2])
  2437. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2438. # Kick user from group
  2439. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2440. self.do_as_user("admin", group_kick, [group_name_2, "user"])
  2441. assert group_list() == set([(group_name_1, True)])
  2442. # Kick self (owner) from group
  2443. assert group_list() == set([(group_name_1, True)])
  2444. group_create(group_name_3)
  2445. assert group_list() == set([(group_name_1, True), (group_name_3, True)])
  2446. assert group_kick(group_name_3, "user") == None
  2447. assert group_list() == set([(group_name_1, True)])
  2448. # Empty groups are not deleted
  2449. self.do_as_user("admin", group_join, [group_name_3, "user"])
  2450. # Kick user not in group
  2451. try:
  2452. self.do_as_user("admin", group_kick, [group_name_2, "user2"])
  2453. self.fail()
  2454. except UserNotInGroup:
  2455. pass
  2456. # Non-existing user
  2457. try:
  2458. group_kick(group_name_1, "adfafd")
  2459. self.fail()
  2460. except UnknownUser:
  2461. pass
  2462. # Non-existing group
  2463. try:
  2464. group_kick("adfadf", "user")
  2465. self.fail()
  2466. except UnknownGroup:
  2467. pass
  2468. # Not admin of group
  2469. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2470. self.do_as_user("admin", group_join, [group_name_2, "user2"])
  2471. assert group_list() == set([(group_name_1, True), (group_name_2, False), (group_name_3, False)])
  2472. assert self.do_as_user("user2", group_list, []) == set([(group_name_2, False)])
  2473. try:
  2474. group_kick(group_name_2, "user2")
  2475. self.fail()
  2476. except GroupPermissionDenied:
  2477. assert self.do_as_user("user2", group_list, []) == set([(group_name_2, False)])
  2478. self.do_as_user("admin", group_delete, [group_name_1])
  2479. self.do_as_user("admin", group_delete, [group_name_2])
  2480. self.do_as_user("admin", group_delete, [group_name_3])
  2481. def do_create_user(self, name):
  2482. self.do_as_user(name, lambda : 1, [])
  2483. def do_test_permission(self, model, expected_permissions):
  2484. for user, permission in expected_permissions.items():
  2485. assert self.do_as_user(user, read_permissions, [model]) == permission
  2486. def test_op_permission_owner_model(self):
  2487. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2488. group_create("users")
  2489. permission_group("users/user/test/a", "users")
  2490. permission_modify("users/user/test/a", "210")
  2491. self.do_create_user("group_user")
  2492. self.do_create_user("other_user")
  2493. group_join("users", "group_user")
  2494. # Test initial situation, where we have owners user:users with permission 210
  2495. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2496. # Change owner, but permissions stay the same
  2497. permission_owner("users/user/test/a", "group_user")
  2498. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2499. # Can no longer modify permissions: only owner can do that
  2500. try:
  2501. permission_owner("users/user/test/a", "admin")
  2502. self.fail()
  2503. except UserPermissionDenied:
  2504. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2505. # Change owner to admin, who always has RW permissions
  2506. self.do_as_user("group_user", permission_owner, ["users/user/test/a", "admin"])
  2507. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "R", "other_user": ""})
  2508. # Give permissions back to someone else, and test that admin can always do operations, even if not owner
  2509. self.do_as_user("admin", permission_owner, ["users/user/test/a", "group_user"])
  2510. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2511. self.do_as_user("admin", permission_owner, ["users/user/test/a", "user"])
  2512. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2513. # Test non-existing model
  2514. try:
  2515. permission_owner("adfadf", "admin")
  2516. self.fail()
  2517. except UnknownModel:
  2518. pass
  2519. # Test non-existing user
  2520. try:
  2521. self.do_as_user("admin", permission_owner, ["users/user/test/a", "dfadf"])
  2522. self.fail()
  2523. except UnknownUser:
  2524. pass
  2525. # Test assign to user who is already owner
  2526. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2527. self.do_as_user("admin", permission_owner, ["users/user/test/a", "user"])
  2528. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2529. group_delete("users")
  2530. def test_op_permission_owner_folder(self):
  2531. folder_create("users/user/test/a/b/c")
  2532. group_create("users")
  2533. self.do_create_user("group_user")
  2534. group_join("users", "group_user")
  2535. permission_group("users/user/test/a/b", "users")
  2536. permission_modify("users/user/test/a/b", "210")
  2537. # Test permissions
  2538. self.do_test_permission("users/user/test/", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2539. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2540. self.do_test_permission("users/user/test/a/b", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2541. self.do_test_permission("users/user/test/a/b/c", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2542. # But test if they are really applicable
  2543. try:
  2544. self.do_as_user("group_user", model_list, ["users/user/test"])
  2545. self.fail()
  2546. except ReadPermissionDenied:
  2547. pass
  2548. try:
  2549. self.do_as_user("group_user", model_list, ["users/user/test/a"])
  2550. self.fail()
  2551. except ReadPermissionDenied:
  2552. pass
  2553. self.do_as_user("group_user", model_list, ["users/user/test/a/b"])
  2554. try:
  2555. self.do_as_user("group_user", model_list, ["users/user/test/a/b/c"])
  2556. self.fail()
  2557. except ReadPermissionDenied:
  2558. pass
  2559. group_delete("users")
  2560. def test_op_read_permissions_model(self):
  2561. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2562. group_create("users")
  2563. self.do_create_user("group_user")
  2564. self.do_create_user("other_user")
  2565. group_join("users", "group_user")
  2566. permission_group("users/user/test/a", "users")
  2567. permission_modify("users/user/test/a", "210")
  2568. # Test all four cases
  2569. assert self.do_as_user("user", read_permissions, ["users/user/test/a"]) == "RW"
  2570. assert self.do_as_user("group_user", read_permissions, ["users/user/test/a"]) == "R"
  2571. assert self.do_as_user("other_user", read_permissions, ["users/user/test/a"]) == ""
  2572. assert self.do_as_user("admin", read_permissions, ["users/user/test/a"]) == "RW"
  2573. # Test same for root location (empty string)
  2574. assert self.do_as_user("user", read_permissions, [""]) == "R"
  2575. assert self.do_as_user("group_user", read_permissions, [""]) == "R"
  2576. assert self.do_as_user("other_user", read_permissions, [""]) == "R"
  2577. assert self.do_as_user("admin", read_permissions, [""]) == "RW"
  2578. # Test for non-existing location
  2579. try:
  2580. read_permissions("adfadsf")
  2581. self.fail()
  2582. except UnknownLocation:
  2583. pass
  2584. group_delete("users")
  2585. def test_op_read_permissions_folder(self):
  2586. folder_create("users/user/test/a")
  2587. group_create("users")
  2588. self.do_create_user("group_user")
  2589. self.do_create_user("other_user")
  2590. group_join("users", "group_user")
  2591. permission_group("users/user/test/a", "users")
  2592. permission_modify("users/user/test/a", "210")
  2593. # Test all four cases
  2594. assert self.do_as_user("user", read_permissions, ["users/user/test/a"]) == "RW"
  2595. assert self.do_as_user("group_user", read_permissions, ["users/user/test/a"]) == "R"
  2596. assert self.do_as_user("other_user", read_permissions, ["users/user/test/a"]) == ""
  2597. assert self.do_as_user("admin", read_permissions, ["users/user/test/a"]) == "RW"
  2598. # Test for non-existing location
  2599. try:
  2600. read_permissions("adfadsf")
  2601. self.fail()
  2602. except UnknownLocation:
  2603. pass
  2604. group_delete("users")
  2605. def test_op_permission_group_model(self):
  2606. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2607. group_create("users")
  2608. group_create("other_group")
  2609. permission_modify("users/user/test/a", "210")
  2610. self.do_create_user("group_user")
  2611. self.do_create_user("other_user")
  2612. group_join("users", "group_user")
  2613. # Test initial situation, where we have owners user:users with permission 210
  2614. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2615. # Change owner, but permissions stay the same
  2616. permission_group("users/user/test/a", "users")
  2617. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2618. # Only owner can modify group permissions
  2619. try:
  2620. self.do_as_user("group_user", permission_group, ["users/user/test/a", "other_group"])
  2621. self.fail()
  2622. except UserPermissionDenied:
  2623. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2624. # Test that admin can always do operations, even if not owner
  2625. # And test that user permissions still override group permissions
  2626. self.do_as_user("admin", permission_group, ["users/user/test/a", "admin"])
  2627. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2628. self.do_as_user("admin", permission_group, ["users/user/test/a", "other_group"])
  2629. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2630. self.do_as_user("admin", permission_group, ["users/user/test/a", "users"])
  2631. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2632. # Test non-existing model
  2633. try:
  2634. permission_group("adfadf", "admin")
  2635. self.fail()
  2636. except UnknownModel:
  2637. pass
  2638. # Test non-existing group
  2639. try:
  2640. self.do_as_user("admin", permission_group, ["users/user/test/a", "dfadf"])
  2641. self.fail()
  2642. except UnknownGroup:
  2643. pass
  2644. # Test assign to group which is already owning group, resulting in no change
  2645. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2646. self.do_as_user("admin", permission_group, ["users/user/test/a", "users"])
  2647. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2648. self.do_as_user("admin", group_delete, ["other_group"])
  2649. self.do_as_user("admin", group_delete, ["users"])
  2650. def test_op_permission_group_folder(self):
  2651. folder_create("users/user/test/a/b/c")
  2652. group_create("users")
  2653. self.do_create_user("group_user")
  2654. group_join("users", "group_user")
  2655. permission_group("users/user/test/a/b", "users")
  2656. permission_modify("users/user/test/a/b", "210")
  2657. # Test permissions
  2658. self.do_test_permission("users/user/test/", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2659. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2660. self.do_test_permission("users/user/test/a/b", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2661. self.do_test_permission("users/user/test/a/b/c", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2662. # But test if they are really applicable
  2663. try:
  2664. self.do_as_user("group_user", model_list, ["users/user/test"])
  2665. self.fail()
  2666. except ReadPermissionDenied:
  2667. pass
  2668. try:
  2669. self.do_as_user("group_user", model_list, ["users/user/test/a"])
  2670. self.fail()
  2671. except ReadPermissionDenied:
  2672. pass
  2673. self.do_as_user("group_user", model_list, ["users/user/test/a/b"])
  2674. try:
  2675. self.do_as_user("group_user", model_list, ["users/user/test/a/b/c"])
  2676. self.fail()
  2677. except ReadPermissionDenied:
  2678. pass
  2679. group_delete("users")
  2680. def test_op_group_owner_add(self):
  2681. group_create("group1")
  2682. group_create("group2")
  2683. group_create("group3")
  2684. self.do_create_user("new_user")
  2685. group_join("group1", "new_user")
  2686. # Basic use of group owner: promote a user
  2687. assert self.do_as_user("new_user", group_list, []) == set([("group1", False)])
  2688. assert group_owner_add("group1", "new_user") == None
  2689. assert self.do_as_user("new_user", group_list, []) == set([("group1", True)])
  2690. # Or instantaneously make owner, thereby also making a member
  2691. assert self.do_as_user("new_user", group_list, []) == set([("group1", True)])
  2692. assert group_owner_add("group2", "new_user") == None
  2693. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2694. # Test for user that is already an owner
  2695. assert group_owner_add("group1", "new_user") == None
  2696. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2697. # Test non-existing user
  2698. try:
  2699. group_owner_add("group1", "abc")
  2700. self.fail()
  2701. except UnknownUser:
  2702. pass
  2703. # Test non-existing group
  2704. try:
  2705. group_owner_add("group4", "new_user")
  2706. self.fail()
  2707. except UnknownGroup:
  2708. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2709. # Only an owner of the group can do this
  2710. group_owner_delete("group2", "new_user")
  2711. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2712. try:
  2713. self.do_as_user("new_user", group_owner_add, ["group2", "user"])
  2714. self.fail()
  2715. except GroupPermissionDenied:
  2716. pass
  2717. # Also non-members can't modify
  2718. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2719. try:
  2720. self.do_as_user("new_user", group_owner_add, ["group3", "user"])
  2721. self.fail()
  2722. except GroupPermissionDenied:
  2723. pass
  2724. # Delete all groups again
  2725. group_delete("group1")
  2726. group_delete("group2")
  2727. group_delete("group3")
  2728. def test_op_group_owner_delete(self):
  2729. group_create("group1")
  2730. group_create("group2")
  2731. group_create("group3")
  2732. self.do_create_user("new_user")
  2733. group_owner_add("group1", "new_user")
  2734. group_owner_add("group2", "new_user")
  2735. # Basic use: remove owner, but stay a member
  2736. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2737. assert group_owner_delete("group2", "new_user") == None
  2738. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2739. # Test for user that is already not an owner
  2740. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2741. assert group_owner_delete("group2", "new_user") == None
  2742. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2743. # Test for user that is not even a member
  2744. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2745. try:
  2746. group_owner_delete("group3", "new_user")
  2747. self.fail()
  2748. except UserNotInGroup:
  2749. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2750. # Test non-existing user
  2751. try:
  2752. group_owner_delete("group1", "abc")
  2753. self.fail()
  2754. except UnknownUser:
  2755. pass
  2756. # Test non-existing group
  2757. try:
  2758. group_owner_delete("group4", "new_user")
  2759. self.fail()
  2760. except UnknownGroup:
  2761. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2762. # Only an owner of the group can do this
  2763. group_owner_delete("group2", "new_user")
  2764. assert group_list() == set([("group1", True), ("group2", True), ("group3", True)])
  2765. try:
  2766. self.do_as_user("new_user", group_owner_delete, ["group2", "user"])
  2767. self.fail()
  2768. except GroupPermissionDenied:
  2769. assert group_list() == set([("group1", True), ("group2", True), ("group3", True)])
  2770. # Also non-members can't modify
  2771. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2772. try:
  2773. self.do_as_user("new_user", group_owner_delete, ["group3", "user"])
  2774. self.fail()
  2775. except GroupPermissionDenied:
  2776. pass
  2777. # Delete all groups again
  2778. group_delete("group1")
  2779. group_delete("group2")
  2780. group_delete("group3")
  2781. def test_op_conformance_add(self):
  2782. # Add some conformance relations
  2783. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2784. Class A {}
  2785. Class B {}
  2786. Association C (A, B) {}
  2787. """)
  2788. # Add conformance bottom relation
  2789. t = model_types("users/user/test/a")
  2790. assert len(t) == 1
  2791. t = t.pop()
  2792. print(t)
  2793. assert t[0] == "formalisms/SimpleClassDiagrams"
  2794. assert t[1] != None
  2795. assert t[2] == None
  2796. # Check if the type is added, but without any type mapping associated to it
  2797. conformance_add("users/user/test/a", "formalisms/Bottom")
  2798. ts = model_types("users/user/test/a")
  2799. assert len(ts) == 2
  2800. while ts:
  2801. t = ts.pop()
  2802. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2803. if t[0] == "formalisms/SimpleClassDiagrams":
  2804. assert t[1] != None
  2805. elif t[1] == "formalisms/Bottom":
  2806. # Type mapping is empty
  2807. assert t[1] == None
  2808. assert t[2] == None
  2809. # Check if a type mapping is created when model is opened as bottom
  2810. alter_context("users/user/test/a", "formalisms/Bottom")
  2811. element_list("users/user/test/a")
  2812. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2813. ts = model_types("users/user/test/a")
  2814. assert len(ts) == 2
  2815. while ts:
  2816. t = ts.pop()
  2817. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2818. assert t[1] != None
  2819. assert t[2] == None
  2820. # Check if we can add a second one to the same MM
  2821. conformance_add("users/user/test/a", "formalisms/Bottom")
  2822. ts = model_types("users/user/test/a")
  2823. assert len(ts) == 3
  2824. assert ("formalisms/Bottom", None, None) in ts
  2825. found = False
  2826. while ts:
  2827. t = ts.pop()
  2828. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2829. if t[0] == "formalisms/SimpleClassDiagrams":
  2830. assert t[1] != None
  2831. elif t[0] == "formalisms/Bottom":
  2832. # Type mapping is empty
  2833. if t[1] != None:
  2834. found = True
  2835. assert t[2] == None
  2836. assert found
  2837. # Check add of non-existing model
  2838. try:
  2839. conformance_add("users/user/test/b", "formalisms/Bottom")
  2840. self.fail()
  2841. except UnknownModel:
  2842. pass
  2843. # Check add of non-existing metamodel
  2844. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  2845. before = model_types("users/user/test/b")
  2846. try:
  2847. conformance_add("users/user/test/b", "formalisms/Bottom2")
  2848. self.fail()
  2849. except UnknownModel:
  2850. assert model_types("users/user/test/b") == before
  2851. def test_op_conformance_delete(self):
  2852. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2853. Class A {}
  2854. Class B {}
  2855. Association C (A, B) {}
  2856. """)
  2857. # Add conformance bottom relation
  2858. conformance_add("users/user/test/a", "formalisms/Bottom")
  2859. # Verify initial state
  2860. ts = model_types("users/user/test/a")
  2861. assert len(ts) == 2
  2862. while ts:
  2863. t = ts.pop()
  2864. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2865. if t[0] == "formalisms/SimpleClassDiagrams":
  2866. assert t[1] != None
  2867. elif t[1] == "formalisms/Bottom":
  2868. # Type mapping is empty
  2869. assert t[1] == None
  2870. assert t[2] == None
  2871. # Now remove it again
  2872. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2873. ts = model_types("users/user/test/a")
  2874. assert len(ts) == 1
  2875. t = ts.pop()
  2876. assert t[0] == "formalisms/SimpleClassDiagrams"
  2877. assert t[1] != None
  2878. assert t[2] == None
  2879. # Add conformance bottom relation twice
  2880. conformance_add("users/user/test/a", "formalisms/Bottom")
  2881. conformance_add("users/user/test/a", "formalisms/Bottom")
  2882. # Should be there twice, but set flattens it to once
  2883. ts = model_types("users/user/test/a")
  2884. assert len(ts) == 2
  2885. while ts:
  2886. t = ts.pop()
  2887. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2888. if t[0] == "formalisms/SimpleClassDiagrams":
  2889. assert t[1] != None
  2890. elif t[1] == "formalisms/Bottom":
  2891. # Type mapping is empty
  2892. assert t[1] == None
  2893. assert t[2] == None
  2894. # Now remove it (once called, but invoked for all occurences!)
  2895. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2896. ts = model_types("users/user/test/a")
  2897. assert len(ts) == 1
  2898. t = ts.pop()
  2899. assert t[0] == "formalisms/SimpleClassDiagrams"
  2900. assert t[1] != None
  2901. assert t[2] == None
  2902. # Now actually test filtering capabilities
  2903. alter_context("users/user/test/a", "formalisms/Bottom")
  2904. element_list("users/user/test/a")
  2905. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2906. # Model should be there with a type mapping model
  2907. ts = model_types("users/user/test/a")
  2908. assert len(ts) == 2
  2909. while ts:
  2910. t = ts.pop()
  2911. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2912. assert t[1] != None
  2913. assert t[2] == None
  2914. # Add a second bottom relation
  2915. conformance_add("users/user/test/a", "formalisms/Bottom")
  2916. # And remove the one without model, to make sure that it is not a wildcard!
  2917. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2918. ts = model_types("users/user/test/a")
  2919. assert len(ts) == 2
  2920. while ts:
  2921. t = ts.pop()
  2922. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2923. assert t[1] != None
  2924. assert t[2] == None
  2925. # Add again, but now remove the one with type mapping
  2926. conformance_add("users/user/test/a", "formalisms/Bottom")
  2927. # First try one that doesn't match...
  2928. conformance_delete("users/user/test/a", "formalisms/Bottom", "NOTHING")
  2929. ts = model_types("users/user/test/a")
  2930. assert len(ts) == 3
  2931. while ts:
  2932. t = ts.pop()
  2933. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2934. assert t[2] == None
  2935. # Now try one with the actual name
  2936. actual_name = [i for i in model_types("users/user/test/a") if i[0] == "formalisms/Bottom" and i[1] != None][0]
  2937. assert len(model_types("users/user/test/a")) == 3
  2938. conformance_delete("users/user/test/a", "formalisms/SimpleClassDiagrams", actual_name)
  2939. # Nothing removed, because of wrong TM model
  2940. assert len(model_types("users/user/test/a")) == 3
  2941. # Now remove correct one
  2942. conformance_delete("users/user/test/a", "formalisms/Bottom", actual_name)
  2943. ts = model_types("users/user/test/a")
  2944. assert len(ts) == 2
  2945. while ts:
  2946. t = ts.pop()
  2947. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2948. if t[0] == "formalisms/SimpleClassDiagrams":
  2949. assert t[1] != None
  2950. elif t[1] == "formalisms/Bottom":
  2951. # Type mapping is empty
  2952. assert t[1] == None
  2953. assert t[2] == None
  2954. # Check add of non-existing model
  2955. try:
  2956. conformance_add("users/user/test/b", "formalisms/Bottom")
  2957. self.fail()
  2958. except UnknownModel:
  2959. pass
  2960. # Check add of non-existing metamodel
  2961. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  2962. before = model_types("users/user/test/b")
  2963. try:
  2964. conformance_add("users/user/test/b", "formalisms/Bottom2")
  2965. self.fail()
  2966. except UnknownModel:
  2967. assert model_types("users/user/test/b") == before
  2968. """
  2969. def test_op_model_render(self):
  2970. def test_op_transformation_between(self):
  2971. def test_op_transformation_add_MT(self):
  2972. def test_op_transformation_add_AL(self):
  2973. def test_op_transformation_add_MANUAL(self):
  2974. def test_op_transformation_execute_MT(self):
  2975. def test_op_transformation_execute_AL(self):
  2976. def test_op_transformation_execute_MANUAL(self):
  2977. def test_op_transformation_signature(self):
  2978. def test_op_process_signature(self):
  2979. """
  2980. def test_modelling(self):
  2981. # Add a model
  2982. model_add("users/user/test/Empty", "formalisms/SimpleClassDiagrams")
  2983. # Check that it exists
  2984. compare_locations("users/user/test", set(["Empty"]))
  2985. # Check that it conforms
  2986. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  2987. # Check for permissions
  2988. assert model_list_full("users/user/test") == set([(name, "user", "nobody", "221") for name in get_model_list("users/user/test")]) | \
  2989. set([("Empty", "user", "nobody", "200")])
  2990. # Instantiate it further
  2991. model_add("users/user/test/my_empty", "users/user/test/Empty")
  2992. assert verify("users/user/test/my_empty", "users/user/test/Empty") == "OK"
  2993. # Check that it exists
  2994. compare_locations("users/user/test", set(["my_empty", "Empty"]))
  2995. # Check that an instantiate of "A" fails
  2996. try:
  2997. res = instantiate("users/user/test/my_empty", "A")
  2998. assert False
  2999. except UnknownIdentifier:
  3000. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  3001. # Create something in the formalism
  3002. instantiate("users/user/test/Empty", "Class", ID="A")
  3003. attr_assign("users/user/test/Empty", "A", "name", "A")
  3004. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  3005. # Now instantiate that in the model as well, which now works
  3006. instantiate("users/user/test/my_empty", "A")
  3007. assert verify("users/user/test/my_empty", "users/user/test/Empty") == "OK"
  3008. def test_overwrite(self):
  3009. model_add("users/user/test/Empty", "formalisms/SimpleClassDiagrams")
  3010. assert element_list("users/user/test/Empty") == set([])
  3011. instantiate("users/user/test/Empty", "Class", ID="A")
  3012. assert element_list("users/user/test/Empty") == set([("A", "Class")])
  3013. model_overwrite("users/user/test/Empty", "")
  3014. assert element_list("users/user/test/Empty") == set([])
  3015. compare_locations("users/user/test", set(["Empty"]))
  3016. assert element_list("users/user/test/Empty") == set([])
  3017. instantiate("users/user/test/Empty", "Class", ID="B")
  3018. compare_locations("users/user/test", set(["Empty"]))
  3019. def test_operations(self):
  3020. log = []
  3021. def manual_callback(model):
  3022. p1 = instantiate(model, "PetriNet_Runtime/Place")
  3023. p2 = instantiate(model, "PetriNet_Runtime/Place")
  3024. p3 = instantiate(model, "PetriNet_Runtime/Place")
  3025. t1 = instantiate(model, "PetriNet_Runtime/Transition")
  3026. p2t1 = instantiate(model, "PetriNet_Runtime/P2T", (p1, t1))
  3027. p2t2 = instantiate(model, "PetriNet_Runtime/P2T", (p2, t1))
  3028. t2p1 = instantiate(model, "PetriNet_Runtime/T2P", (t1, p3))
  3029. attr_assign(model, p1, "tokens", 1)
  3030. attr_assign(model, p1, "name", "p1")
  3031. attr_assign(model, p2, "tokens", 2)
  3032. attr_assign(model, p2, "name", "p2")
  3033. attr_assign(model, p3, "tokens", 3)
  3034. attr_assign(model, p3, "name", "p3")
  3035. attr_assign(model, t1, "name", "t1")
  3036. attr_assign(model, t1, "executing", False)
  3037. attr_assign(model, p2t1, "weight", 1)
  3038. attr_assign(model, p2t2, "weight", 1)
  3039. attr_assign(model, t2p1, "weight", 2)
  3040. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  3041. model_add("users/user/test/PetriNet_Runtime", "formalisms/SimpleClassDiagrams", open("integration/code/pn_runtime.mvc", "r").read())
  3042. model_add("users/user/test/my_pn", "users/user/test/PetriNet", open("integration/code/pn_design_model.mvc", "r").read())
  3043. def add_tracability_D2R(model):
  3044. instantiate(model, "Association", ("PetriNet/Place", "PetriNet_Runtime/Place"), ID="D2R_PlaceLink")
  3045. instantiate(model, "Association", ("PetriNet/Transition", "PetriNet_Runtime/Transition"), ID="D2R_TransitionLink")
  3046. def add_tracability_R2D(model):
  3047. instantiate(model, "Association", ("PetriNet_Runtime/Place", "PetriNet/Place"), ID="R2D_PlaceLink")
  3048. instantiate(model, "Association", ("PetriNet_Runtime/Transition", "PetriNet/Transition"), ID="R2D_TransitionLink")
  3049. transformation_add_MT({"PetriNet": "users/user/test/PetriNet"}, {}, "users/user/test/print_pn", open("integration/code/pn_print.mvc").read())
  3050. transformation_add_MANUAL({"PetriNet": "users/user/test/PetriNet"}, {"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, "users/user/test/pn_design_to_runtime", add_tracability_D2R)
  3051. transformation_add_AL({"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, {"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, "users/user/test/pn_simulate", open("integration/code/pn_simulate.alc").read())
  3052. transformation_add_MT({"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/pn_runtime_to_design", open("integration/code/pn_runtime_to_design.mvc").read(), add_tracability_R2D)
  3053. log = []
  3054. ctrl = log_output.Controller(log, keep_running=False)
  3055. thrd = threading.Thread(target=ctrl.start)
  3056. thrd.daemon = True
  3057. thrd.start()
  3058. assert transformation_execute_MT("users/user/test/print_pn", {"PetriNet": "users/user/test/my_pn"}, {}, (ctrl, "inp", "outp")) == True
  3059. thrd.join()
  3060. assert set(log) == set(['"p1" --> 1',
  3061. '"p2" --> 2',
  3062. '"p3" --> 3'])
  3063. assert transformation_execute_MANUAL("users/user/test/pn_design_to_runtime", {"PetriNet": "users/user/test/my_pn"}, {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, manual_callback) == True
  3064. assert transformation_execute_AL("users/user/test/pn_simulate", {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, {"PetriNet_Runtime": "users/user/test/my_pn_RT"}) == True
  3065. assert transformation_execute_MT("users/user/test/pn_runtime_to_design", {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, {"PetriNet": "users/user/test/my_pn"}) == True
  3066. log = []
  3067. ctrl = log_output.Controller(log, keep_running=False)
  3068. thrd = threading.Thread(target=ctrl.start)
  3069. thrd.daemon = True
  3070. thrd.start()
  3071. assert transformation_execute_MT("users/user/test/print_pn", {"PetriNet": "users/user/test/my_pn"}, {}, (ctrl, "inp", "outp")) == True
  3072. thrd.join()
  3073. assert set(log) == set(['"p1" --> 0',
  3074. '"p2" --> 1',
  3075. '"p3" --> 5'])
  3076. def test_process_model_trivial_pn_subfunction(self):
  3077. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  3078. model_add("users/user/test/ReachabilityGraph", "formalisms/SimpleClassDiagrams", open("integration/code/reachability_graph.mvc", "r").read())
  3079. model_add("users/user/test/pn_reachability", "formalisms/ProcessModel", open("integration/code/pm_pn_reachability.mvc", "r").read())
  3080. transformation_add_MT({}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/initialize_PN", open("integration/code/initialize_PN.mvc", "r").read())
  3081. transformation_add_MANUAL({"PetriNet": "users/user/test/PetriNet"}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/refine_PN")
  3082. transformation_add_AL({"PetriNet": "users/user/test/PetriNet"}, {"ReachabilityGraph": "users/user/test/ReachabilityGraph"}, "users/user/test/reachability", open("integration/code/reachability_subfunction.alc", "r").read())
  3083. transformation_add_MT({"ReachabilityGraph": "users/user/test/ReachabilityGraph"}, {}, "users/user/test/reachability_print", open("integration/code/reachabilitygraph_print.mvc", 'r').read())
  3084. def callback_refine_PN(model):
  3085. p1 = instantiate(model, "PetriNet/Place")
  3086. attr_assign(model, p1, "name", "p1")
  3087. attr_assign(model, p1, "tokens", 1)
  3088. t1 = instantiate(model, "PetriNet/Transition")
  3089. attr_assign(model, t1, "name", "t1")
  3090. p2t = instantiate(model, "PetriNet/P2T", (p1, t1))
  3091. attr_assign(model, p2t, "weight", 1)
  3092. log = []
  3093. ctrl = log_output.Controller(log, keep_running=False)
  3094. thrd = threading.Thread(target=ctrl.start)
  3095. thrd.daemon = True
  3096. thrd.start()
  3097. process_execute("users/user/test/pn_reachability", {}, {"users/user/test/refine_PN": callback_refine_PN, "users/user/test/reachability_print": (ctrl, "inp", "outp")})
  3098. thrd.join()
  3099. assert set(log) == set(['"0": {"p1": 1}',
  3100. '"1": {"p1": 0}',
  3101. '"0" --["t1"]--> "1"'])
  3102. def test_render(self):
  3103. model_add("users/user/test/CausalBlockDiagrams", "formalisms/SimpleClassDiagrams", open("integration/code/cbd_design.mvc", 'r').read())
  3104. model_add("users/user/test/MM_rendered_graphical", "formalisms/SimpleClassDiagrams", open("integration/code/MM_rendered_graphical.mvc", 'r').read())
  3105. model_add("users/user/test/my_CBD", "users/user/test/CausalBlockDiagrams", open("integration/code/my_cbd.mvc", 'r').read())
  3106. def add_tracability(model):
  3107. instantiate(model, "Association", ("abstract/Block", "rendered/Group"), ID="TracabilityLink")
  3108. transformation_add_MT({"abstract": "users/user/test/CausalBlockDiagrams", "rendered": "users/user/test/MM_rendered_graphical"}, {"abstract": "users/user/test/CausalBlockDiagrams", "rendered": "users/user/test/MM_rendered_graphical"}, "users/user/test/render_graphical_CBD", open("integration/code/CBD_mapper.mvc", 'r').read(), add_tracability)
  3109. result = model_render("users/user/test/my_CBD", "users/user/test/render_graphical_CBD", "users/user/test/my_perceptualized_CBD")
  3110. assert len(result) == 23
  3111. def test_SCCD_basic(self):
  3112. model_add("users/user/test/SCCD", "formalisms/SimpleClassDiagrams", open("integration/code/SCCD.mvc", 'r').read())
  3113. model_add("users/user/test/SCCD_Trace", "formalisms/SimpleClassDiagrams", open("integration/code/SCCD_Trace.mvc", 'r').read())
  3114. model_add("users/user/test/my_SCCD", "users/user/test/SCCD", open("integration/code/SCCD_all.mvc", 'r').read())
  3115. transformation_add_AL({"SCCD": "users/user/test/SCCD"}, {"trace": "users/user/test/SCCD_Trace"}, "users/user/test/SCCD_execute_afap", open("integration/code/SCCD_execute.alc", 'r').read().replace("afap = False", "afap = True"))
  3116. transformation_execute_AL("users/user/test/SCCD_execute_afap", {"SCCD": "users/user/test/my_SCCD"}, {"trace": "users/user/test/my_SCCD_trace"})
  3117. alter_context("users/user/test/my_SCCD_trace", "users/user/test/SCCD_Trace")
  3118. lst = element_list_nice("users/user/test/my_SCCD_trace")
  3119. lst.sort(key=lambda i: (i["timestamp"], i["name"]))
  3120. result = [(i["timestamp"], str(i["name"])) for i in lst if i["name"] not in ["updateTimerValue", "updateTimerColour", "resetTimer"]]
  3121. assert result == [(5.0, "displayRed"),
  3122. (20.0, "displayYellow"),
  3123. (20.5, "displayNone"),
  3124. (21.0, "displayYellow"),
  3125. (21.5, "displayNone"),
  3126. (22.0, "displayYellow"),
  3127. (22.5, "displayNone"),
  3128. (23.0, "displayYellow"),
  3129. (23.5, "displayNone"),
  3130. (24.0, "displayYellow"),
  3131. (24.5, "displayNone"),
  3132. (25.0, "displayYellow"),
  3133. (25.5, "displayNone"),
  3134. (26.0, "displayYellow"),
  3135. (26.5, "displayNone"),
  3136. (27.0, "displayYellow"),
  3137. (27.5, "displayNone"),
  3138. (28.0, "displayYellow"),
  3139. (28.5, "displayNone"),
  3140. (29.0, "displayYellow"),
  3141. (29.4, "displayNone"),
  3142. (29.4, "displayRed"),
  3143. (89.4, "displayGreen"),
  3144. (129.4, "displayNone"),
  3145. (129.4, "displayRed"),
  3146. (139.4, "displayYellow"),
  3147. (139.9, "displayNone"),
  3148. (140.4, "displayYellow"),
  3149. (140.9, "displayNone"),
  3150. (141.4, "displayYellow"),
  3151. (141.9, "displayNone"),
  3152. (142.4, "displayYellow"),
  3153. (142.9, "displayNone"),
  3154. (143.4, "displayYellow"),
  3155. (143.9, "displayNone"),
  3156. (144.4, "displayYellow"),
  3157. (144.9, "displayNone"),
  3158. (145.4, "displayYellow"),
  3159. (145.9, "displayNone"),
  3160. (146.4, "displayYellow"),
  3161. (146.9, "displayNone"),
  3162. (147.4, "displayYellow"),
  3163. (147.9, "displayNone"),
  3164. (148.4, "displayYellow"),
  3165. ]
  3166. def test_switch_MM(self):
  3167. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  3168. model_add("users/user/test/my_pn", "users/user/test/PetriNet", open("integration/code/pn_design_model.mvc", "r").read())
  3169. got = element_list_nice("users/user/test/PetriNet")
  3170. expected = \
  3171. [{'__id': 'Natural', '__type': 'SimpleAttribute', 'constraint': {'AL': ''}, 'name': 'Natural'},
  3172. {'__id': 'String', '__type': 'SimpleAttribute', 'constraint': {'AL': ''}, 'name': 'String'},
  3173. {'__id': 'Place', '__type': 'Class', 'lower_cardinality': None, 'upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'Place', 'abstract': None},
  3174. {'__id': 'Place_tokens', '__type': 'AttributeLink', '__source': 'Place', '__target': 'Natural', 'name': 'tokens', 'optional': False, 'constraint': {'AL': ''}},
  3175. {'__id': 'Place_name', '__type': 'AttributeLink', '__source': 'Place', '__target': 'String', 'name': 'name', 'optional': False, 'constraint': {'AL': ''}},
  3176. {'__id': 'Transition', '__type': 'Class', 'lower_cardinality': None, 'upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'Transition', 'abstract': None},
  3177. {'__id': 'Transition_name', '__type': 'AttributeLink', '__source': 'Transition', '__target': 'String', 'name': 'name', 'optional': False, 'constraint': {'AL': ''}},
  3178. {'__id': 'P2T', '__type': 'Association', '__source': 'Place', '__target': 'Transition', 'source_lower_cardinality': None, 'target_lower_cardinality': None, 'source_upper_cardinality': None, 'target_upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'P2T', "abstract": None, "lower_cardinality": None, "upper_cardinality": None},
  3179. {'__id': 'P2T_weight', '__type': 'AttributeLink', '__source': 'P2T', '__target': 'Natural', 'name': 'weight', 'optional': False, 'constraint': {'AL': ''}},
  3180. {'__id': 'T2P', '__type': 'Association', '__source': 'Transition', '__target': 'Place', 'source_lower_cardinality': None, 'target_lower_cardinality': None, 'source_upper_cardinality': None, 'target_upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'T2P', "abstract": None, "lower_cardinality": None, "upper_cardinality": None},
  3181. {'__id': 'T2P_weight', '__type': 'AttributeLink', '__source': 'T2P', '__target': 'Natural', 'name': 'weight', 'optional': False, 'constraint': {'AL': ''}},
  3182. ]
  3183. compare_unordered_lists(got, expected)
  3184. got = element_list_nice("users/user/test/my_pn")
  3185. expected = \
  3186. [{'__id': 'p1', '__type': 'Place', 'tokens': 1, 'name': 'p1'},
  3187. {'__id': 'p2', '__type': 'Place', 'tokens': 2, 'name': 'p2'},
  3188. {'__id': 'p3', '__type': 'Place', 'tokens': 3, 'name': 'p3'},
  3189. {'__id': 't1', '__type': 'Transition', 'name': 't1'},
  3190. {'__id': '__0', '__type': 'P2T', '__source': 'p1', '__target': 't1', 'weight': 1},
  3191. {'__id': '__1', '__type': 'P2T', '__source': 'p2', '__target': 't1', 'weight': 1},
  3192. {'__id': '__2', '__type': 'T2P', '__source': 't1', '__target': 'p3', 'weight': 2}
  3193. ]
  3194. compare_unordered_lists(got, expected)
  3195. alter_context("users/user/test/PetriNet", "formalisms/Bottom")
  3196. alter_context("users/user/test/my_pn", "formalisms/Bottom")
  3197. count_nodes = 0
  3198. count_edges = 0
  3199. for entry in element_list_nice("users/user/test/PetriNet"):
  3200. print(entry)
  3201. assert entry["__type"] in ["Node", "Edge"]
  3202. if entry["__type"] == "Node":
  3203. assert len(entry) == 2
  3204. count_nodes += 1
  3205. else:
  3206. assert len(entry) == 4
  3207. count_edges += 1
  3208. assert count_nodes == 20
  3209. assert count_edges == 23
  3210. count_nodes = 0
  3211. count_edges = 0
  3212. for entry in element_list_nice("users/user/test/my_pn"):
  3213. assert entry["__type"] in ["Node", "Edge"]
  3214. if entry["__type"] == "Node":
  3215. assert len(entry) == 2
  3216. count_nodes += 1
  3217. else:
  3218. assert len(entry) == 4
  3219. count_edges += 1
  3220. assert count_nodes == 14
  3221. assert count_edges == 13
  3222. alter_context("users/user/test/PetriNet", "users/user/test/PetriNet")
  3223. alter_context("users/user/test/my_pn", "formalisms/SimpleClassDiagrams")
  3224. try:
  3225. element_list_nice("users/user/test/PetriNet")
  3226. self.fail()
  3227. except:
  3228. pass
  3229. try:
  3230. element_list_nice("users/user/test/my_pn")
  3231. self.fail()
  3232. except:
  3233. pass