test_all.py 153 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776
  1. import unittest
  2. import sys
  3. try:
  4. from unit.utils import *
  5. import unit.log_output as log_output
  6. except ImportError: #for Python2
  7. from utils import *
  8. import log_output as log_output
  9. sys.path.append("wrappers")
  10. from modelverse import *
  11. import threading
  12. model_hierarchy = \
  13. {"formalisms/": {"SimpleClassDiagrams": {},
  14. "TypeMapping": {},
  15. "Tracability": {},
  16. "ProcessModel": {},
  17. "ActionLanguage": {},
  18. "ManualOperation": {},
  19. "Bottom": {},
  20. },
  21. "models/": {},
  22. "administration/": {"core": {},
  23. "CoreFormalism": {},
  24. },
  25. "users/": {"admin/": {},
  26. "LoLA/": {},
  27. "HUTN/": {},
  28. "files/": {},
  29. "DEVS/": {},
  30. "DEVS_batch/": {},
  31. "JSON/": {},
  32. },
  33. "type mappings/": {"1": {},
  34. "2": {},
  35. "3": {},
  36. "4": {},
  37. "5": {},
  38. "6": {},
  39. "7": {},
  40. "8": {},
  41. "9": {},
  42. },
  43. "merged/": {},
  44. "tmp/": {},
  45. "RAMified/": {},
  46. }
  47. def verify_clean():
  48. compare_locations("", set())
  49. compare_locations("models", set())
  50. compare_locations("formalisms", set())
  51. def get_model_list(location):
  52. try:
  53. location_parts = location.split("/")
  54. current = model_hierarchy
  55. while location_parts:
  56. l = location_parts.pop(0)
  57. if l != "":
  58. current = current[l + "/"]
  59. return set(current.keys())
  60. except:
  61. return set([])
  62. def compare_locations(location, extra_to_default):
  63. assert model_list(location) == get_model_list(location) | set(extra_to_default)
  64. def compare_unordered_lists(got, expected):
  65. assert len(got) == len(expected)
  66. for i in got:
  67. assert i in expected
  68. for i in expected:
  69. assert i in got
  70. class TestModelverse(unittest.TestCase):
  71. proc = None
  72. def runTest(self):
  73. pass
  74. @classmethod
  75. def setUpClass(self):
  76. TestModelverse.proc, address = start_mvc()
  77. init(address)
  78. login("user", "user")
  79. @classmethod
  80. def tearDownClass(self):
  81. try:
  82. kill(TestModelverse.proc)
  83. except:
  84. print("Got exception during teardown.")
  85. def setUp(self):
  86. verify_clean()
  87. folder_create("users/user/test")
  88. def tearDown(self):
  89. model_delete("users/user/test")
  90. verify_clean()
  91. pass
  92. def test_op_model_list(self):
  93. assert model_list("") == set(["formalisms/",
  94. "models/",
  95. "administration/",
  96. "type mappings/",
  97. "users/",
  98. "merged/",
  99. "RAMified/",
  100. "tmp/",
  101. ])
  102. assert model_list("formalisms") == set(["SimpleClassDiagrams",
  103. "ActionLanguage",
  104. "TypeMapping",
  105. "Tracability",
  106. "ProcessModel",
  107. "ManualOperation",
  108. "Bottom",
  109. ])
  110. assert model_list("formalisms/") == set(["SimpleClassDiagrams",
  111. "ActionLanguage",
  112. "TypeMapping",
  113. "Tracability",
  114. "ProcessModel",
  115. "ManualOperation",
  116. "Bottom",
  117. ])
  118. # Try unreadable location
  119. try:
  120. model_list("administration")
  121. self.fail()
  122. except ReadPermissionDenied:
  123. pass
  124. # Try non-existing location
  125. try:
  126. model_list("adfjafdla")
  127. self.fail()
  128. except UnknownLocation:
  129. pass
  130. # Try model list of a model itself
  131. assert model_list("formalisms/SimpleClassDiagrams") == set([])
  132. def test_op_model_list_full(self):
  133. assert model_list_full("") == set([("formalisms/", "admin", "admin", "221"),
  134. ("models/", "admin", "admin", "221"),
  135. ("administration/", "admin", "admin", "110"),
  136. ("type mappings/", "admin", "admin", "221"),
  137. ("users/", "admin", "admin", "221"),
  138. ("merged/", "admin", "nobody", "222"),
  139. ("RAMified/", "admin", "nobody", "222"),
  140. ("tmp/", "admin", "nobody", "222"),
  141. ])
  142. assert model_list_full("formalisms") == set([("SimpleClassDiagrams", "admin", "admin", "221"),
  143. ("ActionLanguage", "admin", "admin", "221"),
  144. ("TypeMapping", "admin", "admin", "221"),
  145. ("Tracability", "admin", "admin", "221"),
  146. ("ProcessModel", "admin", "admin", "221"),
  147. ("ManualOperation", "admin", "admin", "221"),
  148. ("Bottom", "admin", "admin", "221"),
  149. ])
  150. # Try unreadable location
  151. try:
  152. model_list_full("administration")
  153. self.fail()
  154. except ReadPermissionDenied:
  155. pass
  156. # Try non-existing location
  157. try:
  158. model_list_full("adfjafdla")
  159. self.fail()
  160. except UnknownLocation:
  161. pass
  162. # Try model list of a model itself
  163. assert model_list_full("formalisms/SimpleClassDiagrams") == set([])
  164. def test_op_verify(self):
  165. # Verify M3 --> M3
  166. assert verify("formalisms/SimpleClassDiagrams", "formalisms/SimpleClassDiagrams") == "OK"
  167. # Verify with bottom
  168. assert verify("formalisms/SimpleClassDiagrams", "formalisms/Bottom") == "OK"
  169. # Verify the type mapping models
  170. for tm in model_types("formalisms/SimpleClassDiagrams"):
  171. assert verify(tm[1], "formalisms/TypeMapping") == "OK"
  172. # Verify wrong
  173. try:
  174. verify("formalisms/SimpleClassDiagrams", "formalisms/ProcessModel")
  175. self.fail()
  176. except UnknownMetamodellingHierarchy:
  177. pass
  178. # Verify M2 --> M3
  179. assert verify("formalisms/ProcessModel", "formalisms/SimpleClassDiagrams") == "OK"
  180. assert verify("formalisms/ProcessModel", "formalisms/Bottom") == "OK"
  181. for tm in model_types("formalisms/ProcessModel"):
  182. assert verify(tm[1], "formalisms/TypeMapping") == "OK"
  183. try:
  184. verify("formalisms/ProcessModel", "formalisms/ProcessModel")
  185. self.fail()
  186. except UnknownMetamodellingHierarchy:
  187. pass
  188. # Verify M1 --> M2
  189. model_add("users/user/test/a", "formalisms/ProcessModel")
  190. # Fails with lacking instances of Start and Finish class
  191. assert verify("users/user/test/a", "formalisms/ProcessModel").startswith("Lower cardinality violated for class: ")
  192. instantiate("users/user/test/a", "Start")
  193. # Fails with lacking instances of Finish class
  194. assert verify("users/user/test/a", "formalisms/ProcessModel") == "Lower cardinality violated for class: Finish"
  195. instantiate("users/user/test/a", "Finish")
  196. # Succeeds
  197. assert verify("users/user/test/a", "formalisms/ProcessModel") == "OK"
  198. # Test unreadable model
  199. try:
  200. verify("administration/core", "formalisms/ProcessModel")
  201. self.fail()
  202. except ReadPermissionDenied:
  203. pass
  204. # Test unreadable metamodel
  205. try:
  206. verify("formalisms/Bottom", "administration/core")
  207. self.fail()
  208. except ReadPermissionDenied:
  209. pass
  210. # Test non-existing model
  211. try:
  212. verify("adfadf", "formalisms/SimpleClassDiagrams")
  213. self.fail()
  214. except UnknownModel:
  215. pass
  216. # Test non-existing metamodel
  217. try:
  218. verify("formalisms/SimpleClassDiagrams", "adfka")
  219. self.fail()
  220. except UnknownModel:
  221. pass
  222. def test_op_permission_modify(self):
  223. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  224. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  225. # Check that we can read
  226. element_list_nice("users/user/test/a")
  227. # Check that we can write
  228. instantiate("users/user/test/a", "Class")
  229. assert permission_modify("users/user/test/a", "100") == None
  230. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "100")])
  231. # Check that we can read
  232. element_list_nice("users/user/test/a")
  233. # Check that we can't write
  234. try:
  235. instantiate("users/user/test/a", "Class")
  236. self.fail()
  237. except WritePermissionDenied:
  238. pass
  239. assert permission_modify("users/user/test/a", "000") == None
  240. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "000")])
  241. # Check that we can't read
  242. try:
  243. element_list_nice("users/user/test/a")
  244. self.fail()
  245. except ReadPermissionDenied:
  246. pass
  247. # Check that we can't write
  248. try:
  249. instantiate("users/user/test/a", "Class")
  250. self.fail()
  251. except WritePermissionDenied:
  252. pass
  253. except ReadPermissionDenied:
  254. pass
  255. assert permission_modify("users/user/test/a", "200") == None
  256. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  257. # Check that we can read
  258. element_list_nice("users/user/test/a")
  259. # Check that we can write
  260. instantiate("users/user/test/a", "Class")
  261. # Cannot modify permissions if we don't own the model
  262. try:
  263. permission_modify("formalisms/SimpleClassDiagrams", "222")
  264. self.fail()
  265. except UserPermissionDenied:
  266. pass
  267. # Cannot modify permissions even if we have full access, as long as we are not the owner
  268. model_add("users/user/test/z", "formalisms/SimpleClassDiagrams")
  269. permission_owner("users/user/test/z", "admin")
  270. try:
  271. permission_modify("users/user/test/z", "222")
  272. self.fail()
  273. except UserPermissionDenied:
  274. pass
  275. try:
  276. permission_owner("users/user/test/z", "user")
  277. self.fail()
  278. except UserPermissionDenied:
  279. pass
  280. # Cannot change non-existing model
  281. before = model_list("")
  282. try:
  283. permission_modify("adfadf", "111")
  284. self.fail()
  285. except UnknownModel:
  286. assert model_list("") == before
  287. # Check for type of permission string
  288. # Too long
  289. try:
  290. permission_modify("users/user/test/a", "1111")
  291. self.fail()
  292. except IncorrectFormat:
  293. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  294. # Above 2
  295. try:
  296. permission_modify("users/user/test/a", "131")
  297. self.fail()
  298. except IncorrectFormat:
  299. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  300. # Below 0
  301. try:
  302. permission_modify("users/user/test/a", "-111")
  303. self.fail()
  304. except IncorrectFormat:
  305. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  306. # Non-integer
  307. try:
  308. permission_modify("users/user/test/a", "2a1")
  309. self.fail()
  310. except IncorrectFormat:
  311. assert [i[3] for i in model_list_full("users/user/test/") if i[0] == "a"][0] == "200"
  312. def test_op_model_add(self):
  313. assert model_list_full("users/user/test") == set([])
  314. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  315. # Test permissions of newly created empty model
  316. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  317. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", \
  318. """
  319. Class A {
  320. name = "A"
  321. }
  322. Class B {
  323. name = "B"
  324. abstract = True
  325. }
  326. """)
  327. # Test permissions of newly created non-empty model
  328. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  329. # Test content of newly created model with code upload
  330. lst = element_list_nice("users/user/test/b")
  331. assert len(lst) == 2
  332. assert {'__id': "A", "__type": "Class", "abstract": None, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "A"} in lst
  333. assert {'__id': "B", "__type": "Class", "abstract": True, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "B"} in lst
  334. try:
  335. # Cannot upload model to occupied location
  336. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  337. self.fail()
  338. except ModelExists:
  339. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  340. try:
  341. # Cannot upload model to unwritable location at root
  342. model_add("z", "formalisms/SimpleClassDiagrams")
  343. self.fail()
  344. except WritePermissionDenied:
  345. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200"), ("b", "user", "nobody", "200")])
  346. try:
  347. # Cannot upload model to unwritable location somewhere in hierarchy
  348. model_add("users/new_model", "formalisms/SimpleClassDiagrams")
  349. self.fail()
  350. except WritePermissionDenied:
  351. assert "new_model/" not in model_list("users/")
  352. try:
  353. # Cannot upload model to unwritable location somewhere in hierarchy with multiple new branches
  354. model_add("users/new_username/new_model", "formalisms/SimpleClassDiagrams")
  355. self.fail()
  356. except WritePermissionDenied:
  357. assert "new_username/" not in model_list("users/")
  358. model_add("users/user/test/c", "users/user/test/b", """
  359. A a {}
  360. """)
  361. try:
  362. # Cannot add this model, as it cannot be auto-typecasted to formalisms/SimpleClassDiagrams
  363. model_add("users/user/test/d", "users/user/test/c", """
  364. a c {}
  365. """)
  366. self.fail()
  367. except UnknownM3:
  368. assert model_list("users/user/test") == set(["a", "b", "c"])
  369. # We can add this model for multiple levels, as it can be automatically typecasted to formalisms/SimpleClassDiagrams, since it is empty
  370. model_add("users/user/test/d", "users/user/test/b")
  371. model_add("users/user/test/e", "users/user/test/d")
  372. model_add("users/user/test/f", "users/user/test/e")
  373. def test_op_model_add_compilation_error(self):
  374. try:
  375. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  376. abdfaefeaf
  377. """)
  378. self.fail()
  379. except CompilationError:
  380. pass
  381. try:
  382. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  383. Crass A {
  384. name = "b"
  385. }
  386. """)
  387. #TODO at the moment, this still succeeds!
  388. #self.fail()
  389. except:
  390. raise
  391. pass
  392. def test_op_model_move(self):
  393. # Test basic scenario
  394. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  395. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  396. assert model_move("users/user/test/a", "users/user/test/b") == None
  397. assert model_list_full("users/user/test") == set([("b", "user", "nobody", "200")])
  398. # Test if permissions are copied as well
  399. permission_modify("users/user/test/b", "222")
  400. assert model_list_full("users/user/test") == set([("b", "user", "nobody", "222")])
  401. assert model_move("users/user/test/b", "users/user/test/a") == None
  402. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222")])
  403. # Test move if destination exists
  404. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  405. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222"), ("b", "user", "nobody", "200")])
  406. try:
  407. model_move("users/user/test/a", "users/user/test/b")
  408. self.fail()
  409. except ModelExists:
  410. pass
  411. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "222"), ("b", "user", "nobody", "200")])
  412. # Test move if source doesn't exist
  413. try:
  414. model_move("users/user/test/z", "users/user/test/y")
  415. self.fail()
  416. except UnknownModel:
  417. pass
  418. # Test if we can move a model we can't write to (i.e., not allowed to remove it)
  419. try:
  420. model_move("formalisms/ProcessModel", "users/user/test/x")
  421. self.fail()
  422. except WritePermissionDenied:
  423. pass
  424. # Test if we can move a model to a place we can't write to
  425. try:
  426. model_move("users/user/test/a", "administration/ProcessModel2")
  427. self.fail()
  428. except WritePermissionDenied:
  429. pass
  430. def test_op_model_delete(self):
  431. # Test basic delete
  432. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  433. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  434. assert model_delete("users/user/test/a") == None
  435. assert model_list_full("users/user/test") == set([])
  436. # Test delete of non-existing
  437. assert model_list_full("users/user/test") == set([])
  438. try:
  439. model_delete("users/user/test/a")
  440. self.fail()
  441. except UnknownModel:
  442. pass
  443. # Test delete of non-writable models
  444. try:
  445. model_delete("formalisms/SimpleClassDiagrams")
  446. self.fail()
  447. except WritePermissionDenied:
  448. pass
  449. # Try delete of a folder
  450. folder_create("users/user/test/b/c/d")
  451. model_add("users/user/test/b/c/d/e", "formalisms/SimpleClassDiagrams")
  452. assert model_list("users/user/test") == set(["b/"])
  453. assert model_list("users/user/test/b") == set(["c/"])
  454. assert model_list("users/user/test/b/c") == set(["d/"])
  455. assert model_list("users/user/test/b/c/d") == set(["e"])
  456. assert model_delete("users/user/test/b/c") == None
  457. # Removes recursively all subfolders and containing models
  458. assert model_list("users/user/test") == set(["b/"])
  459. assert model_list("users/user/test/b") == set([])
  460. try:
  461. model_list("users/user/test/b/c")
  462. self.fail()
  463. except UnknownLocation:
  464. pass
  465. try:
  466. element_list("users/user/test/b/c/d/e")
  467. self.fail()
  468. except UnknownModel:
  469. pass
  470. def test_op_model_overwrite(self):
  471. # Test overwrite of simple model
  472. assert model_list_full("users/user/test") == set([])
  473. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  474. # Test permissions of newly created empty model
  475. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  476. assert element_list_nice("users/user/test/a") == []
  477. model_overwrite("users/user/test/a", \
  478. """
  479. Class A {
  480. name = "A"
  481. }
  482. Class B {
  483. name = "B"
  484. abstract = True
  485. }
  486. """)
  487. # Test permissions of newly created non-empty model
  488. assert model_list_full("users/user/test") == set([("a", "user", "nobody", "200")])
  489. # Test content of newly created model with code upload
  490. lst = element_list_nice("users/user/test/a")
  491. assert len(lst) == 2
  492. assert {'__id': "A", "__type": "Class", "abstract": None, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "A"} in lst
  493. assert {'__id': "B", "__type": "Class", "abstract": True, "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "name": "B"} in lst
  494. # Test non-writable model
  495. before = element_list("formalisms/SimpleClassDiagrams")
  496. try:
  497. model_overwrite("formalisms/SimpleClassDiagrams", "")
  498. self.fail()
  499. except WritePermissionDenied:
  500. # No changes were made
  501. assert element_list("formalisms/SimpleClassDiagrams") == before
  502. # Test non-existing model
  503. assert "adfafd" not in model_list("")
  504. try:
  505. model_overwrite("adfafd", "")
  506. self.fail()
  507. except UnknownModel:
  508. assert "adfafd" not in model_list("")
  509. # Test compilation error
  510. before = element_list_nice("users/user/test/a")
  511. try:
  512. model_overwrite("users/user/test/a", "afajk")
  513. self.fail()
  514. except CompilationError:
  515. assert element_list_nice("users/user/test/a") == before
  516. # Test overwrite of non-model location
  517. before = model_list("users/user/test")
  518. try:
  519. model_overwrite("users/user/test", "")
  520. self.fail()
  521. except UnknownMetamodellingHierarchy:
  522. assert model_list("users/user/test") == before
  523. def test_op_user_logout(self):
  524. try:
  525. element_list_nice("administration/core")
  526. self.fail()
  527. except ReadPermissionDenied:
  528. pass
  529. user_logout()
  530. login("admin", "admin")
  531. # Test user permissions
  532. assert len(element_list_nice("administration/core")) > 0
  533. user_logout()
  534. login("user", "user")
  535. try:
  536. element_list_nice("administration/core")
  537. self.fail()
  538. except ReadPermissionDenied:
  539. pass
  540. def test_op_all_instances(self):
  541. # Test M2 level
  542. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  543. Class A {}
  544. Class B : A {}
  545. Association C (A, B) {}
  546. """)
  547. assert all_instances("users/user/test/a", "Class") == set(["A", "B", "C"])
  548. assert all_instances("users/user/test/a", "Association") == set(["C"])
  549. # Test non-existing type
  550. try:
  551. all_instances("users/user/test/a", "non-existing")
  552. self.fail()
  553. except UnknownElement:
  554. pass
  555. # Test non-existing model
  556. try:
  557. all_instances("users/user/test/b", "Class")
  558. self.fail()
  559. except UnknownModel:
  560. pass
  561. # Test M1 level
  562. model_add("users/user/test/b", "users/user/test/a", """
  563. A a {}
  564. B b {}
  565. C c(a, b) {}
  566. A d {}
  567. """)
  568. assert all_instances("users/user/test/b", "A") == set(["a", "b", "d"])
  569. assert all_instances("users/user/test/b", "B") == set(["b"])
  570. assert all_instances("users/user/test/b", "C") == set(["c"])
  571. # No read permission
  572. try:
  573. all_instances("administration/core", "Class")
  574. self.fail()
  575. except ReadPermissionDenied:
  576. pass
  577. # No write permission, but can query
  578. assert type(all_instances("formalisms/SimpleClassDiagrams", "Class")) == set
  579. def test_op_admin_promote_demote(self):
  580. # Verify that user doesn't have admin permissions
  581. try:
  582. element_list("administration/core")
  583. self.fail()
  584. except ReadPermissionDenied:
  585. pass
  586. # Cannot do admin_promote ourselves
  587. try:
  588. admin_promote("user")
  589. except AdminPermissionDenied:
  590. pass
  591. # Cannot do admin_demote ourselves
  592. try:
  593. admin_demote("user")
  594. except AdminPermissionDenied:
  595. pass
  596. # Switch to admin for now
  597. self.do_as_user("admin", admin_promote, ["user"])
  598. # Verify that we can do admin operations
  599. assert len(element_list("administration/core")) > 0
  600. # And check that we can promote/demote other users
  601. admin_promote("HUTN")
  602. admin_demote("HUTN")
  603. # Unknown user
  604. try:
  605. admin_promote("user3")
  606. self.fail()
  607. except UnknownUser:
  608. pass
  609. try:
  610. admin_demote("user4")
  611. self.fail()
  612. except UnknownUser:
  613. pass
  614. # Can also demote ourselves again
  615. admin_demote("user")
  616. # Verify that user doesn't have admin permissions
  617. try:
  618. element_list("administration/core")
  619. self.fail()
  620. except ReadPermissionDenied:
  621. pass
  622. def test_op_user_password(self):
  623. # Test initial password
  624. user_logout()
  625. try:
  626. login("user", "user2")
  627. self.fail()
  628. except PermissionDenied:
  629. pass
  630. login("user", "user")
  631. # Change it to user2
  632. user_password("user", "user2")
  633. user_logout()
  634. try:
  635. login("user", "user")
  636. self.fail()
  637. except PermissionDenied:
  638. pass
  639. login("user", "user2")
  640. # Reset for further tests
  641. user_password("user", "user")
  642. # Change other users password
  643. try:
  644. user_password("user2", "user10")
  645. self.fail()
  646. except UserPermissionDenied:
  647. user_logout()
  648. login("user2", "user2")
  649. user_logout()
  650. # But admin can do that
  651. self.do_as_user("admin", user_password, ["user2", "user10"])
  652. user_logout()
  653. login("user2", "user10")
  654. user_logout()
  655. login("user", "user")
  656. # Admin cannot change password of non-existing user
  657. try:
  658. self.do_as_user("admin", user_password, ["user10", "user10"])
  659. self.fail()
  660. except UnknownUser:
  661. user_logout()
  662. # Check that we can still create the new user with whatever password we want
  663. login("user10", "user11")
  664. user_logout()
  665. def test_op_model_types(self):
  666. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  667. # Read model types of simple model
  668. lst = model_types("users/user/test/a")
  669. assert len(lst) == 1
  670. entry = lst.pop()
  671. assert entry[0] == "formalisms/SimpleClassDiagrams"
  672. assert entry[1].startswith("type mappings/")
  673. assert entry[2] == None
  674. # Create bottom and query afterwards
  675. alter_context("users/user/test/a", "formalisms/Bottom")
  676. element_list_nice("users/user/test/a")
  677. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  678. lst = model_types("users/user/test/a")
  679. assert len(lst) == 2
  680. got = set()
  681. while lst:
  682. entry = lst.pop()
  683. assert entry[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  684. assert entry[0] not in got
  685. got.add(entry[0])
  686. assert entry[1].startswith("type mappings/")
  687. assert entry[2] == None
  688. # No type mapping for type mappings
  689. assert model_types(entry[1]) == set([("formalisms/TypeMapping", None, None)])
  690. # But there will be as soon as we open it
  691. element_list_nice(entry[1])
  692. lst = model_types(entry[1])
  693. assert len(lst) == 1
  694. entry = lst.pop()
  695. assert entry[0] == "formalisms/TypeMapping"
  696. assert entry[1].startswith("type mappings/")
  697. assert entry[2] == None
  698. def test_op_folder_create(self):
  699. # Create a folder
  700. assert folder_create("users/user/test/folder_a") == None
  701. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200")])
  702. # Create folder with trailing slash
  703. assert folder_create("users/user/test/folder_b/") == None
  704. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200"), ("folder_b/", "user", "nobody", "200")])
  705. assert model_list_full("users/user/test/folder_b") == set()
  706. # Create multiple folders
  707. assert folder_create("users/user/test/folder_a/folder_b/folder_c/folder_d") == None
  708. assert model_list_full("users/user/test/") == set([("folder_a/", "user", "nobody", "200"), ("folder_b/", "user", "nobody", "200")])
  709. assert model_list_full("users/user/test/folder_a") == set([("folder_b/", "user", "nobody", "200")])
  710. assert model_list_full("users/user/test/folder_a/folder_b") == set([("folder_c/", "user", "nobody", "200")])
  711. assert model_list_full("users/user/test/folder_a/folder_b/folder_c") == set([("folder_d/", "user", "nobody", "200")])
  712. # Create folder in non-writable location
  713. try:
  714. folder_create("a")
  715. self.fail()
  716. except WritePermissionDenied:
  717. pass
  718. assert "a" not in model_list("")
  719. # Create folder that already exists
  720. try:
  721. folder_create("users/user/test/folder_a")
  722. self.fail()
  723. except FolderExists:
  724. pass
  725. def test_op_alter_context(self):
  726. # Create a model that we will use
  727. model_add("users/user/test/a", "formalisms/ProcessModel", """
  728. Start start {}
  729. Finish finish {}
  730. """)
  731. # List elements using default context, that of creation
  732. lst = element_list_nice("users/user/test/a")
  733. assert len(lst) == 2
  734. assert {"__id": "start", "__type": "Start"} in lst
  735. assert {"__id": "finish", "__type": "Finish"} in lst
  736. # List elements using bottom context
  737. alter_context("users/user/test/a", "formalisms/Bottom")
  738. lst = element_list_nice("users/user/test/a")
  739. assert len(lst) == 2
  740. assert {"__id": "start", "__type": "Node"} in lst
  741. assert {"__id": "finish", "__type": "Node"} in lst
  742. # Switch back to default context
  743. alter_context("users/user/test/a", "formalisms/ProcessModel")
  744. lst = element_list_nice("users/user/test/a")
  745. assert len(lst) == 2
  746. assert {"__id": "start", "__type": "Start"} in lst
  747. assert {"__id": "finish", "__type": "Finish"} in lst
  748. # Switch to a non-existing context
  749. alter_context("users/user/test/a", "non-existing")
  750. try:
  751. element_list_nice("users/user/test/a")
  752. self.fail()
  753. except UnknownModel:
  754. pass
  755. # Set context for an unknown model
  756. # Note that this will only register locally, without communicating with the Modelverse
  757. # as such, errors are not noticed until the element is accessed!
  758. alter_context("non-existing", "formalisms/SimpleClassDiagrams")
  759. def test_op_element_list(self):
  760. model_add("users/user/test/a", "formalisms/ProcessModel", """
  761. Start start {}
  762. Finish finish {}
  763. Next nxt (start, finish) {}
  764. """)
  765. # Basic operation
  766. lst = element_list("users/user/test/a")
  767. assert len(lst) == 3
  768. assert ("start", "Start") in lst
  769. assert ("finish", "Finish") in lst
  770. assert ("nxt", "Next") in lst
  771. # Try on non-existing model
  772. try:
  773. element_list("a")
  774. self.fail()
  775. except UnknownModel:
  776. pass
  777. # Try a non-readable model
  778. try:
  779. element_list("administration/core")
  780. self.fail()
  781. except ReadPermissionDenied:
  782. pass
  783. # No write permission, but can query
  784. assert type(element_list("formalisms/SimpleClassDiagrams")) == set
  785. def test_op_element_list_nice(self):
  786. # Test simple element_list_nice
  787. model_add("users/user/test/a", "formalisms/ProcessModel", """
  788. Start start {}
  789. Finish finish {}
  790. Next nxt (start, finish) {}
  791. """)
  792. # Basic operation
  793. lst = element_list_nice("users/user/test/a")
  794. assert len(lst) == 3
  795. assert {"__id": "start", "__type": "Start"} in lst
  796. assert {"__id": "finish", "__type": "Finish"} in lst
  797. assert {"__id": "nxt", "__type": "Next", "__source": "start", "__target": "finish"} in lst
  798. # Test a model with attributes
  799. model_add("users/user/test/b", "formalisms/ProcessModel", """
  800. Start start {}
  801. Exec exec1 {
  802. name = "first exec"
  803. }
  804. Finish finish {}
  805. Data d1 {
  806. name = "data 1"
  807. type = "type 1"
  808. }
  809. Next n1 (start, exec1) {}
  810. Next n2 (exec1, finish) {}
  811. Produces p1 (exec1, d1) {
  812. name = "producer"
  813. }
  814. """)
  815. lst = element_list_nice("users/user/test/b")
  816. assert len(lst) == 7
  817. assert {"__id": "start", "__type": "Start"} in lst
  818. assert {"__id": "finish", "__type": "Finish"} in lst
  819. assert {"__id": "exec1", "__type": "Exec", "name": "first exec"} in lst
  820. assert {"__id": "d1", "__type": "Data", "name": "data 1", "type": "type 1"} in lst
  821. assert {"__id": "n1", "__type": "Next", "__source": "start", "__target": "exec1"} in lst
  822. assert {"__id": "n2", "__type": "Next", "__source": "exec1", "__target": "finish"} in lst
  823. assert {"__id": "p1", "__type": "Produces", "__source": "exec1", "__target": "d1", "name": "producer"} in lst
  824. # Try one with defined attributes
  825. model_add("users/user/test/c", "formalisms/SimpleClassDiagrams", """
  826. SimpleAttribute Natural {
  827. name = "natural"
  828. }
  829. SimpleAttribute String {
  830. name = "string"
  831. }
  832. Class place {
  833. name = "Place"
  834. name : String
  835. capacity : Natural
  836. }
  837. Class transition {
  838. name = "Transition"
  839. name : String
  840. }
  841. Association p2t (place, transition) {
  842. name = "P2T"
  843. weight : Natural
  844. }
  845. Association t2p (transition, place) {
  846. name = "T2P"
  847. weight : Natural
  848. }
  849. """)
  850. lst = element_list_nice("users/user/test/c")
  851. assert len(lst) == 11
  852. assert {"__id": "Natural", "__type": "SimpleAttribute", "constraint": {"AL": ""}, "name": "natural"} in lst
  853. assert {"__id": "String", "__type": "SimpleAttribute", "constraint": {"AL": ""}, "name": "string"} in lst
  854. assert {"__id": "place", "name": "Place", "__type": "Class", "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "abstract": None} in lst
  855. assert {"__id": "transition", "name": "Transition", "__type": "Class", "constraint": {"AL": ""}, "lower_cardinality": None, "upper_cardinality": None, "abstract": None} in lst
  856. assert {"__id": "p2t", "name": "P2T", "__type": "Association", "__source": "place", "__target": "transition", "constraint": {"AL": ""}, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None} in lst
  857. assert {"__id": "t2p", "name": "T2P", "__type": "Association", "__source": "transition", "__target": "place", "constraint": {"AL": ""}, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None} in lst
  858. assert {"__id": "place_name", "__type": "AttributeLink", "__source": "place", "__target": "String", "name": "name", "optional": False, "constraint": {"AL": ""}} in lst
  859. assert {"__id": "place_capacity", "__type": "AttributeLink", "__source": "place", "__target": "Natural", "name": "capacity", "optional": False, "constraint": {"AL": ""}} in lst
  860. assert {"__id": "transition_name", "__type": "AttributeLink", "__source": "transition", "__target": "String", "name": "name", "optional": False, "constraint": {"AL": ""}} in lst
  861. assert {"__id": "p2t_weight", "__type": "AttributeLink", "__source": "p2t", "__target": "Natural", "name": "weight", "optional": False, "constraint": {"AL": ""}} in lst
  862. assert {"__id": "t2p_weight", "__type": "AttributeLink", "__source": "t2p", "__target": "Natural", "name": "weight", "optional": False, "constraint": {"AL": ""}} in lst
  863. # Try on non-existing model
  864. try:
  865. element_list_nice("a")
  866. self.fail()
  867. except UnknownModel:
  868. pass
  869. # Try a non-readable model
  870. try:
  871. element_list_nice("administration/core")
  872. self.fail()
  873. except ReadPermissionDenied:
  874. pass
  875. # No write permission, but can query
  876. assert type(element_list_nice("formalisms/SimpleClassDiagrams")) == list
  877. def test_op_types(self):
  878. # Try operation of unopened model
  879. assert types("formalisms/ProcessModel") == element_list("formalisms/SimpleClassDiagrams")
  880. # Try simple operation
  881. model_add("users/user/test/a", "formalisms/ProcessModel", """
  882. Start start {}
  883. Finish finish {}
  884. Next nxt (start, finish) {}
  885. """)
  886. assert types("users/user/test/a") == element_list("formalisms/ProcessModel")
  887. alter_context("users/user/test/a", "formalisms/Bottom")
  888. assert types("users/user/test/a") == element_list("formalisms/Bottom")
  889. # Try for model that we cannot read
  890. try:
  891. types("administration/core")
  892. self.fail()
  893. except ReadPermissionDenied:
  894. pass
  895. # Try for non-existing model
  896. try:
  897. types("a")
  898. self.fail()
  899. except UnknownModel:
  900. pass
  901. # Try for a metamodel that we are not allowed to read, although the model may be read
  902. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  903. assert types("users/user/test/b") == element_list("formalisms/SimpleClassDiagrams")
  904. alter_context("users/user/test/b", "administration/core")
  905. try:
  906. types("users/user/test/b")
  907. self.fail()
  908. except ReadPermissionDenied:
  909. pass
  910. # No write permission for either M or MM, but can query
  911. assert type(types("formalisms/SimpleClassDiagrams")) == set
  912. def test_op_read_info(self):
  913. # Basic case
  914. model_add("users/user/test/a", "formalisms/ProcessModel", """
  915. Start start {}
  916. Finish finish {}
  917. Next nxt (start, finish) {}
  918. """)
  919. assert read_info("users/user/test/a", "start") == ("Start", None)
  920. assert read_info("users/user/test/a", "finish") == ("Finish", None)
  921. assert read_info("users/user/test/a", "nxt") == ("Next", ("start", "finish"))
  922. # Read using different metamodel
  923. alter_context("users/user/test/a", "formalisms/Bottom")
  924. assert read_info("users/user/test/a", "start") == ("Node", None)
  925. assert read_info("users/user/test/a", "finish") == ("Node", None)
  926. assert read_info("users/user/test/a", "nxt") == ("Edge", ("start", "finish"))
  927. # Non-existing element
  928. try:
  929. read_info("users/user/test/a", "notthere")
  930. self.fail()
  931. except UnknownElement:
  932. pass
  933. # Non-existing model
  934. try:
  935. read_info("users/user/test/b", "start")
  936. self.fail()
  937. except UnknownModel:
  938. pass
  939. # No read permission
  940. try:
  941. read_info("administration/core", "administration")
  942. self.fail()
  943. except ReadPermissionDenied:
  944. pass
  945. # No write permission, but can query
  946. assert type(read_info("formalisms/SimpleClassDiagrams", "Class")) == tuple
  947. def test_op_read_attrs(self):
  948. # Basic behaviour
  949. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  950. SimpleAttribute Natural {
  951. name = "natural"
  952. }
  953. SimpleAttribute String {
  954. name = "string"
  955. }
  956. Class Place {
  957. name = "Place"
  958. name : String
  959. capacity : Natural
  960. }
  961. Class Transition {
  962. name = "Transition"
  963. name : String
  964. }
  965. Association P2T (Place, Transition) {
  966. name = "P2T"
  967. weight : Natural
  968. }
  969. Association T2P (Transition, Place) {
  970. name = "T2P"
  971. weight : Natural
  972. }
  973. """)
  974. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  975. assert read_attrs("users/user/test/a", "String") == {"constraint": {"AL": ""}, "name": "string"}
  976. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  977. assert read_attrs("users/user/test/a", "Transition") == {"constraint": {"AL": ""}, "name": "Transition", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  978. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  979. assert read_attrs("users/user/test/a", "T2P") == {"constraint": {"AL": ""}, "name": "T2P", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  980. model_add("users/user/test/b", "users/user/test/a", """
  981. Place p1 {
  982. name = "place 1"
  983. capacity = 2
  984. }
  985. Place p2 {
  986. name = "place 2"
  987. capacity = 1
  988. }
  989. Transition t1 {
  990. name = "transition"
  991. }
  992. P2T p2t (p1, t1) {
  993. weight = 4
  994. }
  995. T2P t2p (t1, p2) {
  996. weight = 10
  997. }
  998. """)
  999. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  1000. assert read_attrs("users/user/test/b", "p2") == {"name": "place 2", "capacity": 1}
  1001. assert read_attrs("users/user/test/b", "t1") == {"name": "transition"}
  1002. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  1003. assert read_attrs("users/user/test/b", "t2p") == {"weight": 10}
  1004. # Non-existing model
  1005. try:
  1006. read_attrs("users/afa", "p1")
  1007. self.fail()
  1008. except UnknownModel:
  1009. pass
  1010. # Non-existing element
  1011. try:
  1012. read_attrs("users/user/test/a", "PPPPPPP")
  1013. self.fail()
  1014. except UnknownElement:
  1015. pass
  1016. # No read permissions
  1017. try:
  1018. read_attrs("administration/core", "formalisms")
  1019. self.fail()
  1020. except ReadPermissionDenied:
  1021. pass
  1022. # No write permissions, but can query
  1023. assert type(read_attrs("formalisms/SimpleClassDiagrams", "Class")) == type(dict())
  1024. def test_op_attr_assign(self):
  1025. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1026. SimpleAttribute Natural {
  1027. name = "natural"
  1028. }
  1029. SimpleAttribute String {
  1030. name = "string"
  1031. }
  1032. Class Place {
  1033. name = "Place"
  1034. name : String
  1035. capacity : Natural
  1036. }
  1037. Class Transition {
  1038. name = "Transition"
  1039. name : String
  1040. }
  1041. Association P2T (Place, Transition) {
  1042. name = "P2T"
  1043. weight : Natural
  1044. }
  1045. Association T2P (Transition, Place) {
  1046. name = "T2P"
  1047. weight : Natural
  1048. }
  1049. """)
  1050. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  1051. assert attr_assign("users/user/test/a", "Natural", "name", "nat") == None
  1052. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "nat"}
  1053. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1054. assert attr_assign("users/user/test/a", "Place", "name", "NewPlace") == None
  1055. assert attr_assign("users/user/test/a", "Place", "abstract", False) == None
  1056. assert attr_assign("users/user/test/a", "Place", "lower_cardinality", 4) == None
  1057. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "NewPlace", "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  1058. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1059. assert attr_assign("users/user/test/a", "P2T", "name", "PPP") == None
  1060. assert attr_assign("users/user/test/a", "P2T", "source_lower_cardinality", 1) == None
  1061. assert attr_assign("users/user/test/a", "P2T", "target_upper_cardinality", 10) == None
  1062. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "PPP", "source_lower_cardinality": 1, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": 10, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1063. model_add("users/user/test/b", "users/user/test/a", """
  1064. Place p1 {
  1065. name = "place 1"
  1066. capacity = 2
  1067. }
  1068. Place p2 {
  1069. name = "place 2"
  1070. capacity = 1
  1071. }
  1072. Transition t1 {
  1073. name = "transition"
  1074. }
  1075. P2T p2t (p1, t1) {
  1076. weight = 4
  1077. }
  1078. T2P t2p (t1, p2) {
  1079. weight = 10
  1080. }
  1081. """)
  1082. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  1083. assert attr_assign("users/user/test/b", "p1", "name", "place 3") == None
  1084. assert attr_assign("users/user/test/b", "p1", "capacity", 3) == None
  1085. assert read_attrs("users/user/test/b", "p1") == {"name": "place 3", "capacity": 3}
  1086. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  1087. assert attr_assign("users/user/test/b", "p2t", "weight", 0) == None
  1088. assert read_attrs("users/user/test/b", "p2t") == {"weight": 0}
  1089. # Non-existing model
  1090. try:
  1091. attr_assign("users/afa", "p1", "name", "abc")
  1092. self.fail()
  1093. except UnknownModel:
  1094. pass
  1095. # Non-existing element
  1096. try:
  1097. attr_assign("users/user/test/a", "PPPPPPP", "name", "abc")
  1098. self.fail()
  1099. except UnknownElement:
  1100. pass
  1101. # No read permissions
  1102. try:
  1103. attr_assign("administration/core", "formalisms", "name", "abc")
  1104. self.fail()
  1105. except ReadPermissionDenied:
  1106. pass
  1107. # No write permissions
  1108. try:
  1109. attr_assign("formalisms/SimpleClassDiagrams", "Class", "name", "abc")
  1110. self.fail()
  1111. except WritePermissionDenied:
  1112. pass
  1113. # No such attribute
  1114. try:
  1115. attr_assign("users/user/test/a", "Place", "ddd", 1)
  1116. self.fail()
  1117. except UnknownAttribute:
  1118. pass
  1119. # Assign None, equals to attr_delete
  1120. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "NewPlace", "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  1121. attr_assign("users/user/test/a", "Place", "name", None)
  1122. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": None, "abstract": False, "lower_cardinality": 4, "upper_cardinality": None}
  1123. def test_op_attr_delete(self):
  1124. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1125. SimpleAttribute Natural {
  1126. name = "natural"
  1127. }
  1128. SimpleAttribute String {
  1129. name = "string"
  1130. }
  1131. Class Place {
  1132. name = "Place"
  1133. name : String
  1134. capacity : Natural
  1135. }
  1136. Class Transition {
  1137. name = "Transition"
  1138. name : String
  1139. }
  1140. Association P2T (Place, Transition) {
  1141. name = "P2T"
  1142. weight : Natural
  1143. }
  1144. Association T2P (Transition, Place) {
  1145. name = "T2P"
  1146. weight : Natural
  1147. }
  1148. """)
  1149. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": "natural"}
  1150. assert attr_delete("users/user/test/a", "Natural", "name") == None
  1151. assert read_attrs("users/user/test/a", "Natural") == {"constraint": {"AL": ""}, "name": None}
  1152. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1153. assert attr_delete("users/user/test/a", "Place", "name") == None
  1154. assert attr_delete("users/user/test/a", "Place", "abstract") == None
  1155. assert attr_delete("users/user/test/a", "Place", "lower_cardinality") == None
  1156. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1157. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": "P2T", "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1158. assert attr_delete("users/user/test/a", "P2T", "name") == None
  1159. assert attr_delete("users/user/test/a", "P2T", "source_lower_cardinality") == None
  1160. assert attr_delete("users/user/test/a", "P2T", "target_upper_cardinality") == None
  1161. assert read_attrs("users/user/test/a", "P2T") == {"constraint": {"AL": ""}, "name": None, "source_lower_cardinality": None, "source_upper_cardinality": None, "target_lower_cardinality": None, "target_upper_cardinality": None, "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1162. model_add("users/user/test/b", "users/user/test/a", """
  1163. Place p1 {
  1164. name = "place 1"
  1165. capacity = 2
  1166. }
  1167. Place p2 {
  1168. name = "place 2"
  1169. capacity = 1
  1170. }
  1171. Transition t1 {
  1172. name = "transition"
  1173. }
  1174. P2T p2t (p1, t1) {
  1175. weight = 4
  1176. }
  1177. T2P t2p (t1, p2) {
  1178. weight = 10
  1179. }
  1180. """)
  1181. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": 2}
  1182. assert attr_delete("users/user/test/b", "p1", "capacity") == None
  1183. assert read_attrs("users/user/test/b", "p1") == {"name": "place 1", "capacity": None}
  1184. assert read_attrs("users/user/test/b", "p2t") == {"weight": 4}
  1185. assert attr_delete("users/user/test/b", "p2t", "weight") == None
  1186. assert read_attrs("users/user/test/b", "p2t") == {"weight": None}
  1187. # Non-existing model
  1188. try:
  1189. attr_delete("users/afa", "p1", "name")
  1190. self.fail()
  1191. except UnknownModel:
  1192. pass
  1193. # Non-existing element
  1194. try:
  1195. attr_delete("users/user/test/a", "PPPPPPP", "name")
  1196. self.fail()
  1197. except UnknownElement:
  1198. pass
  1199. # No read permissions
  1200. try:
  1201. attr_delete("administration/core", "formalisms", "name")
  1202. self.fail()
  1203. except ReadPermissionDenied:
  1204. pass
  1205. # No write permissions
  1206. try:
  1207. attr_delete("formalisms/SimpleClassDiagrams", "Class", "name")
  1208. self.fail()
  1209. except WritePermissionDenied:
  1210. pass
  1211. # No such attribute
  1212. try:
  1213. attr_delete("users/user/test/a", "Place", "ddd")
  1214. self.fail()
  1215. except UnknownAttribute:
  1216. pass
  1217. def test_op_attr_delete_code(self):
  1218. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1219. SimpleAttribute Natural {
  1220. name = "natural"
  1221. }
  1222. SimpleAttribute String {
  1223. name = "string"
  1224. }
  1225. Class Place {
  1226. name = "Place"
  1227. name : String
  1228. capacity : Natural
  1229. }
  1230. Class Transition {
  1231. name = "Transition"
  1232. name : String
  1233. }
  1234. Association P2T (Place, Transition) {
  1235. name = "P2T"
  1236. weight : Natural
  1237. }
  1238. Association T2P (Transition, Place) {
  1239. name = "T2P"
  1240. weight : Natural
  1241. }
  1242. """)
  1243. # Test what happens if removing a non-existing AL attribute
  1244. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1245. attr_delete("users/user/test/a", "Place", "constraint")
  1246. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1247. # Test what happens if removing an existing AL attribute
  1248. attr_assign_code("users/user/test/a", "Place", "constraint", """
  1249. String function a(value : Element):
  1250. return "OK"!
  1251. """)
  1252. attrs = read_attrs("users/user/test/a", "Place")
  1253. assert "AL" in attrs["constraint"]
  1254. assert attrs["constraint"]["AL"] != ""
  1255. attr_delete("users/user/test/a", "Place", "constraint")
  1256. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1257. def test_op_attr_assign_code(self):
  1258. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1259. SimpleAttribute Natural {
  1260. name = "natural"
  1261. }
  1262. SimpleAttribute String {
  1263. name = "string"
  1264. }
  1265. Class Place {
  1266. name = "Place"
  1267. name : String
  1268. capacity : Natural
  1269. }
  1270. Class Transition {
  1271. name = "Transition"
  1272. name : String
  1273. }
  1274. Association P2T (Place, Transition) {
  1275. name = "P2T"
  1276. weight : Natural
  1277. }
  1278. Association T2P (Transition, Place) {
  1279. name = "T2P"
  1280. weight : Natural
  1281. }
  1282. """)
  1283. # Test ordinary case
  1284. assert read_attrs("users/user/test/a", "Place") == {"constraint": {"AL": ""}, "name": "Place", "abstract": None, "lower_cardinality": None, "upper_cardinality": None}
  1285. assert attr_assign_code("users/user/test/a", "Place", "constraint", """
  1286. String function a(value : Element):
  1287. return "OK"!
  1288. """) == None
  1289. attrs = read_attrs("users/user/test/a", "Place")
  1290. assert "AL" in attrs["constraint"]
  1291. assert attrs["constraint"]["AL"] != ""
  1292. assert AL_text(attrs["constraint"]["AL"]).strip() == """
  1293. String function a(value : Element):
  1294. return "OK"!
  1295. """.strip()
  1296. # Test assign when already assigned
  1297. attrs = read_attrs("users/user/test/a", "Place")
  1298. old_location = attrs["constraint"]["AL"]
  1299. old_text = AL_text(attrs["constraint"]["AL"])
  1300. assert attr_assign_code("users/user/test/a", "Place", "constraint", """
  1301. String function a(value : Element):
  1302. return "NOK"!
  1303. """) == None
  1304. attrs = read_attrs("users/user/test/a", "Place")
  1305. assert "AL" in attrs["constraint"]
  1306. assert attrs["constraint"]["AL"] != ""
  1307. assert attrs["constraint"]["AL"] != old_location
  1308. assert AL_text(attrs["constraint"]["AL"]).strip() == """
  1309. String function a(value : Element):
  1310. return "NOK"!
  1311. """.strip()
  1312. assert AL_text(attrs["constraint"]["AL"]).strip () != old_text.strip()
  1313. simple_code = \
  1314. """
  1315. String function a(value : Element):
  1316. return "OK"!
  1317. """
  1318. # Non-existing model
  1319. try:
  1320. attr_assign_code("users/afa", "p1", "name", simple_code)
  1321. self.fail()
  1322. except UnknownModel:
  1323. pass
  1324. # Non-existing element
  1325. try:
  1326. attr_assign_code("users/user/test/a", "PPPPPPP", "name", simple_code)
  1327. self.fail()
  1328. except UnknownElement:
  1329. pass
  1330. # No read permissions
  1331. try:
  1332. attr_assign_code("administration/core", "formalisms", "name", simple_code)
  1333. self.fail()
  1334. except ReadPermissionDenied:
  1335. pass
  1336. # No write permissions
  1337. try:
  1338. attr_assign_code("formalisms/SimpleClassDiagrams", "Class", "name", simple_code)
  1339. self.fail()
  1340. except WritePermissionDenied:
  1341. pass
  1342. # No such attribute
  1343. try:
  1344. attr_assign_code("users/user/test/a", "Place", "ddd", simple_code)
  1345. self.fail()
  1346. except UnknownAttribute:
  1347. pass
  1348. # Compilation error
  1349. try:
  1350. attr_assign_code("users/user/test/a", "Place", "constraint", "abc")
  1351. self.fail()
  1352. except CompilationError:
  1353. pass
  1354. def test_op_instantiate(self):
  1355. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  1356. assert element_list("users/user/test/a") == set([])
  1357. # Instantiate node element
  1358. ID = instantiate("users/user/test/a", "Class")
  1359. assert element_list("users/user/test/a") == set([(ID, "Class")])
  1360. assert read_info("users/user/test/a", ID) == ("Class", None)
  1361. # Instantiate node element with ID
  1362. ID2 = instantiate("users/user/test/a", "Class", ID="new_node")
  1363. assert ID2 == "new_node"
  1364. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class")])
  1365. assert read_info("users/user/test/a", ID2) == ("Class", None)
  1366. # Instantiate edge element
  1367. ID3 = instantiate("users/user/test/a", "Association", edge=(ID, ID2))
  1368. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association")])
  1369. assert read_info("users/user/test/a", ID3) == ("Association", (ID, ID2))
  1370. # Instantiate edge element with ID
  1371. ID4 = instantiate("users/user/test/a", "Association", edge=(ID, ID2), ID="new_edge")
  1372. assert ID4 == "new_edge"
  1373. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association")])
  1374. assert read_info("users/user/test/a", ID4) == ("Association", (ID, ID2))
  1375. # Instantiate edge from edge (source)
  1376. ID5 = instantiate("users/user/test/a", "Association", edge=(ID3, ID))
  1377. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association")])
  1378. assert read_info("users/user/test/a", ID5) == ("Association", (ID3, ID))
  1379. # Instantiate edge from edge (target)
  1380. ID6 = instantiate("users/user/test/a", "Association", edge=(ID, ID3))
  1381. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association"), (ID6, "Association")])
  1382. assert read_info("users/user/test/a", ID6) == ("Association", (ID, ID3))
  1383. # Instantiate edge from edge (source and target)
  1384. ID7 = instantiate("users/user/test/a", "Association", edge=(ID3, ID4))
  1385. assert element_list("users/user/test/a") == set([(ID, "Class"), (ID2, "Class"), (ID3, "Association"), (ID4, "Association"), (ID5, "Association"), (ID6, "Association"), (ID7, "Association")])
  1386. assert read_info("users/user/test/a", ID7) == ("Association", (ID3, ID4))
  1387. # Non-existing model
  1388. try:
  1389. instantiate("users/afa", "Association")
  1390. self.fail()
  1391. except UnknownModel:
  1392. pass
  1393. # Non-existing element
  1394. before = element_list("users/user/test/a")
  1395. try:
  1396. instantiate("users/user/test/a", "AAAAAAA")
  1397. self.fail()
  1398. except UnknownElement:
  1399. assert element_list("users/user/test/a") == before
  1400. # No read permissions
  1401. try:
  1402. instantiate("administration/core", "formalisms")
  1403. self.fail()
  1404. except ReadPermissionDenied:
  1405. pass
  1406. # No write permissions
  1407. before = element_list("users/user/test/a")
  1408. try:
  1409. instantiate("formalisms/SimpleClassDiagrams", "Class")
  1410. self.fail()
  1411. except WritePermissionDenied:
  1412. assert element_list("users/user/test/a") == before
  1413. # Pre-existing ID requested (node)
  1414. before = element_list("users/user/test/a")
  1415. try:
  1416. instantiate("users/user/test/a", "Class", ID=ID)
  1417. self.fail()
  1418. except ElementExists:
  1419. assert element_list("users/user/test/a") == before
  1420. # Pre-existing ID requested (edge)
  1421. before = element_list("users/user/test/a")
  1422. try:
  1423. instantiate("users/user/test/a", "Association", ID=ID, edge=(ID2, ID3))
  1424. self.fail()
  1425. except ElementExists:
  1426. assert element_list("users/user/test/a") == before
  1427. # Edge from non-existing ID
  1428. before = element_list("users/user/test/a")
  1429. try:
  1430. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", ID3))
  1431. self.fail()
  1432. except ElementExists:
  1433. assert element_list("users/user/test/a") == before
  1434. # Edge to non-existing ID
  1435. before = element_list("users/user/test/a")
  1436. try:
  1437. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", ID3))
  1438. self.fail()
  1439. except ElementExists:
  1440. assert element_list("users/user/test/a") == before
  1441. # Edge both non-existing ID
  1442. before = element_list("users/user/test/a")
  1443. try:
  1444. instantiate("users/user/test/a", "Association", ID=ID, edge=("non-existing", "non-existing2"))
  1445. self.fail()
  1446. except ElementExists:
  1447. assert element_list("users/user/test/a") == before
  1448. # Garbage type
  1449. before = element_list("users/user/test/a")
  1450. try:
  1451. instantiate("users/user/test/a", ("a", "b"))
  1452. self.fail()
  1453. except UnknownElement:
  1454. assert element_list("users/user/test/a") == before
  1455. # Garbage edge src
  1456. before = element_list("users/user/test/a")
  1457. try:
  1458. instantiate("users/user/test/a", "Association", edge=(('a', 'b'), "non-existing2"))
  1459. self.fail()
  1460. except UnknownElement:
  1461. assert element_list("users/user/test/a") == before
  1462. # Garbage edge dst
  1463. before = element_list("users/user/test/a")
  1464. try:
  1465. instantiate("users/user/test/a", "Association", edge=("non-existing", ('a', 'b')))
  1466. self.fail()
  1467. except UnknownElement:
  1468. assert element_list("users/user/test/a") == before
  1469. def test_op_delete_element(self):
  1470. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1471. Class A {}
  1472. """)
  1473. # Test simple delete
  1474. assert len(element_list_nice("users/user/test/a")) == 1
  1475. assert delete_element("users/user/test/a", "A") == None
  1476. assert len(element_list_nice("users/user/test/a")) == 0
  1477. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  1478. Class A {}
  1479. Class B {}
  1480. Association (A, B) {}
  1481. """)
  1482. # Test delete of element that causes other elements to be deleted as well
  1483. assert len(element_list_nice("users/user/test/b")) == 3
  1484. assert delete_element("users/user/test/b", "A") == None
  1485. assert len(element_list_nice("users/user/test/b")) == 1
  1486. model_add("users/user/test/c", "formalisms/SimpleClassDiagrams", """
  1487. Class A {}
  1488. Class B {}
  1489. Association C (A, B) {}
  1490. """)
  1491. # Test delete of edge that causes other elements to be deleted as well
  1492. assert len(element_list_nice("users/user/test/c")) == 3
  1493. assert delete_element("users/user/test/c", "C") == None
  1494. assert len(element_list_nice("users/user/test/c")) == 2
  1495. model_add("users/user/test/d", "formalisms/SimpleClassDiagrams", """
  1496. Class A {
  1497. name = "A"
  1498. }
  1499. """)
  1500. # Test delete of a "hidden" element
  1501. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": "A", "abstract": None}]
  1502. ID = [i for i in element_list("users/user/test/d") if i[1] == "Class_name"][0][0]
  1503. assert delete_element("users/user/test/d", ID) == None
  1504. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1505. # Non-existing model
  1506. try:
  1507. delete_element("users/afa", "Association")
  1508. self.fail()
  1509. except UnknownModel:
  1510. pass
  1511. # Non-existing element
  1512. before = element_list("users/user/test/a")
  1513. try:
  1514. delete_element("users/user/test/a", "AAAAAAA")
  1515. self.fail()
  1516. except UnknownElement:
  1517. assert element_list("users/user/test/a") == before
  1518. # No read permissions
  1519. try:
  1520. delete_element("administration/core", "formalisms")
  1521. self.fail()
  1522. except ReadPermissionDenied:
  1523. pass
  1524. # No write permissions
  1525. before = element_list("formalisms/SimpleClassDiagrams")
  1526. try:
  1527. delete_element("formalisms/SimpleClassDiagrams", "Class")
  1528. self.fail()
  1529. except WritePermissionDenied:
  1530. assert element_list("formalisms/SimpleClassDiagrams") == before
  1531. # Give garbage
  1532. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1533. try:
  1534. delete_element("users/user/test/d", ('abc', 'def'))
  1535. except UnknownElement:
  1536. assert element_list_nice("users/user/test/d") == [{"__type" : "Class", "__id": "A", "lower_cardinality": None, "upper_cardinality": None, "constraint": {"AL": ""}, "name": None, "abstract": None}]
  1537. def test_op_AL_text(self):
  1538. # Test normal situation with code provided by assignment
  1539. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams", """
  1540. Class A {}
  1541. """)
  1542. attr_assign_code("users/user/test/b", "A", "constraint", """
  1543. String function main(value : Element):
  1544. return "OK"!
  1545. """)
  1546. assert AL_text(read_attrs("users/user/test/b", "A")["constraint"]["AL"]).strip() == """
  1547. String function main(value : Element):
  1548. return "OK"!
  1549. """.strip()
  1550. # Test normal situation with code provided by HUTN parser (model)
  1551. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1552. Class A {
  1553. constraint = $
  1554. String function main(value : Element):
  1555. return "OK"!
  1556. $
  1557. }
  1558. """)
  1559. assert AL_text(read_attrs("users/user/test/a", "A")["constraint"]["AL"]).strip() == 'String function main(value : Element):\n\treturn "OK"!'
  1560. # Test AL_text on non-existing location
  1561. try:
  1562. AL_text("abc")
  1563. self.fail()
  1564. except UnknownLocation:
  1565. pass
  1566. # No permissions on locations directly, so there are no checks that have to be done
  1567. def test_op_read_outgoing(self):
  1568. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1569. SimpleAttribute String {}
  1570. Class A {
  1571. name : String
  1572. }
  1573. Class B {}
  1574. Association C (A, B) {}
  1575. Association D (C, B) {}
  1576. """)
  1577. # Test normal operation
  1578. assert read_outgoing("users/user/test/a", "A", "Association") == set(["C"])
  1579. assert read_outgoing("users/user/test/a", "A", "AttributeLink") == set(["A_name"])
  1580. # Test wildcard
  1581. assert read_outgoing("users/user/test/a", "A", "") == set(["A_name", "C"])
  1582. # Test association on association
  1583. assert read_outgoing("users/user/test/a", "C", "") == set(["D"])
  1584. # Test empty result
  1585. assert read_outgoing("users/user/test/a", "B", "") == set([])
  1586. # Test simpleattribute
  1587. assert read_outgoing("users/user/test/a", "String", "") == set([])
  1588. # Non-existing model
  1589. try:
  1590. read_outgoing("users/afa", "Association", "")
  1591. self.fail()
  1592. except UnknownModel:
  1593. pass
  1594. # Non-existing element
  1595. before = element_list("users/user/test/a")
  1596. try:
  1597. read_outgoing("users/user/test/a", "AAAAAAA", "")
  1598. self.fail()
  1599. except UnknownElement:
  1600. assert element_list("users/user/test/a") == before
  1601. # Non-existing type
  1602. before = element_list("users/user/test/a")
  1603. try:
  1604. read_outgoing("users/user/test/a", "A", "AAAAAAA")
  1605. self.fail()
  1606. except UnknownElement:
  1607. assert element_list("users/user/test/a") == before
  1608. # No read permissions
  1609. try:
  1610. read_outgoing("administration/core", "formalisms", "")
  1611. self.fail()
  1612. except ReadPermissionDenied:
  1613. pass
  1614. # No write permissions, but can query
  1615. assert type(read_outgoing("formalisms/SimpleClassDiagrams", "Class", "")) == type(set())
  1616. def test_op_read_incoming(self):
  1617. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1618. SimpleAttribute String {}
  1619. Class A {
  1620. name : String
  1621. }
  1622. Class B {}
  1623. Association C (A, B) {}
  1624. Association E (A, A) {}
  1625. Association D (C, B) {}
  1626. Association F (D, E) {}
  1627. """)
  1628. # Test normal operation
  1629. assert read_incoming("users/user/test/a", "B", "Association") == set(["C", "D"])
  1630. # Test wildcard
  1631. assert read_incoming("users/user/test/a", "B", "") == set(["C", "D"])
  1632. # Test association on association
  1633. assert read_incoming("users/user/test/a", "E", "") == set(["F"])
  1634. # Test double result
  1635. assert read_incoming("users/user/test/a", "A", "") == set(["E"])
  1636. # Test simpleattribute
  1637. assert read_incoming("users/user/test/a", "String", "") == set(["A_name"])
  1638. # Test empty result
  1639. assert read_incoming("users/user/test/a", "F", "") == set([])
  1640. # Non-existing model
  1641. try:
  1642. read_incoming("users/afa", "Association", "")
  1643. self.fail()
  1644. except UnknownModel:
  1645. pass
  1646. # Non-existing element
  1647. before = element_list("users/user/test/a")
  1648. try:
  1649. read_incoming("users/user/test/a", "AAAAAAA", "")
  1650. self.fail()
  1651. except UnknownElement:
  1652. assert element_list("users/user/test/a") == before
  1653. # Non-existing type
  1654. before = element_list("users/user/test/a")
  1655. try:
  1656. read_incoming("users/user/test/a", "A", "AAAAAAA")
  1657. self.fail()
  1658. except UnknownElement:
  1659. assert element_list("users/user/test/a") == before
  1660. # No read permissions
  1661. try:
  1662. read_incoming("administration/core", "formalisms", "")
  1663. self.fail()
  1664. except ReadPermissionDenied:
  1665. pass
  1666. # No write permissions, but can query
  1667. assert type(read_incoming("formalisms/SimpleClassDiagrams", "Class", "")) == type(set())
  1668. def test_op_read_association_source(self):
  1669. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1670. SimpleAttribute String {}
  1671. Class A {
  1672. name : String
  1673. }
  1674. Class B {}
  1675. Association C (A, B) {}
  1676. Association E (A, A) {}
  1677. Association D (C, B) {}
  1678. Association F (D, E) {}
  1679. """)
  1680. # Test normal operation
  1681. assert read_association_source("users/user/test/a", "C") == "A"
  1682. # Test association on association
  1683. assert read_association_source("users/user/test/a", "D") == "C"
  1684. # Test node
  1685. try:
  1686. assert read_association_source("users/user/test/a", "A")
  1687. self.fail()
  1688. except NotAnAssociation:
  1689. pass
  1690. # Non-existing model
  1691. try:
  1692. read_association_source("users/afa", "Association")
  1693. self.fail()
  1694. except UnknownModel:
  1695. pass
  1696. # Non-existing element
  1697. before = element_list("users/user/test/a")
  1698. try:
  1699. read_association_source("users/user/test/a", "AAAAAAA")
  1700. self.fail()
  1701. except UnknownElement:
  1702. assert element_list("users/user/test/a") == before
  1703. # No read permissions
  1704. try:
  1705. read_association_source("administration/core", "formalisms")
  1706. self.fail()
  1707. except ReadPermissionDenied:
  1708. pass
  1709. # No write permissions, but can query
  1710. assert read_association_source("formalisms/SimpleClassDiagrams", "Association") == "Class"
  1711. def test_op_read_association_destination(self):
  1712. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1713. SimpleAttribute String {}
  1714. Class A {
  1715. name : String
  1716. }
  1717. Class B {}
  1718. Association C (A, B) {}
  1719. Association E (A, A) {}
  1720. Association D (C, B) {}
  1721. Association F (D, E) {}
  1722. """)
  1723. # Test normal operation
  1724. assert read_association_destination("users/user/test/a", "C") == "B"
  1725. # Test association on association
  1726. assert read_association_destination("users/user/test/a", "F") == "E"
  1727. # Test node
  1728. try:
  1729. assert read_association_destination("users/user/test/a", "A")
  1730. self.fail()
  1731. except NotAnAssociation:
  1732. pass
  1733. # Non-existing model
  1734. try:
  1735. read_association_destination("users/afa", "Association")
  1736. self.fail()
  1737. except UnknownModel:
  1738. pass
  1739. # Non-existing element
  1740. before = element_list("users/user/test/a")
  1741. try:
  1742. read_association_destination("users/user/test/a", "AAAAAAA")
  1743. self.fail()
  1744. except UnknownElement:
  1745. assert element_list("users/user/test/a") == before
  1746. # No read permissions
  1747. try:
  1748. read_association_destination("administration/core", "formalisms")
  1749. self.fail()
  1750. except ReadPermissionDenied:
  1751. pass
  1752. # No write permissions, but can query
  1753. assert read_association_destination("formalisms/SimpleClassDiagrams", "Association") == "Class"
  1754. def test_op_connections_between(self):
  1755. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1756. SimpleAttribute String {}
  1757. Class A {
  1758. name1 : String
  1759. name2 : String
  1760. }
  1761. Class B {}
  1762. Association C (A, B) {}
  1763. Association D (A, B) {}
  1764. Association E (A, A) {}
  1765. Association F (C, B) {}
  1766. Association G (E, F) {}
  1767. """)
  1768. # Test normal operation
  1769. assert connections_between("users/user/test/a", "A", "A") == set(["Association", "Inheritance"])
  1770. assert connections_between("users/user/test/a", "A", "B") == set(["Association", "Inheritance"])
  1771. assert connections_between("users/user/test/a", "A", "C") == set(["Association", "Inheritance"])
  1772. # Test none allowed
  1773. assert connections_between("users/user/test/a", "A_name1", "A_name2") == set([])
  1774. # Non-existing model
  1775. try:
  1776. connections_between("users/afa", "A", "B")
  1777. self.fail()
  1778. except UnknownModel:
  1779. pass
  1780. # Non-existing element (1)
  1781. before = element_list("users/user/test/a")
  1782. try:
  1783. connections_between("users/user/test/a", "AA", "B")
  1784. self.fail()
  1785. except UnknownElement:
  1786. assert element_list("users/user/test/a") == before
  1787. # Non-existing element (2)
  1788. before = element_list("users/user/test/a")
  1789. try:
  1790. connections_between("users/user/test/a", "A", "BB")
  1791. self.fail()
  1792. except UnknownElement:
  1793. assert element_list("users/user/test/a") == before
  1794. # No read permissions
  1795. try:
  1796. connections_between("administration/core", "formalisms", "formalisms")
  1797. self.fail()
  1798. except ReadPermissionDenied:
  1799. pass
  1800. # No write permissions, but can query
  1801. assert connections_between("formalisms/SimpleClassDiagrams", "Association", "Association") == set(["Association", "Inheritance"])
  1802. def test_op_define_attribute(self):
  1803. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1804. SimpleAttribute String {}
  1805. SimpleAttribute Natural {}
  1806. Class A {}
  1807. Class B {}
  1808. Association C (A, B) {}
  1809. Association D (C, A) {}
  1810. """)
  1811. assert read_defined_attrs("users/user/test/a", "A") == ({}, {})
  1812. # Test normal operation
  1813. define_attribute("users/user/test/a", "A", "my_attr", "String")
  1814. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String"}, {})
  1815. # Test second attribute of same type
  1816. define_attribute("users/user/test/a", "A", "my_second_attr", "String")
  1817. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String", "my_second_attr": "String"}, {})
  1818. # Test third attribute with different type
  1819. define_attribute("users/user/test/a", "A", "a_third_one", "Natural")
  1820. assert read_defined_attrs("users/user/test/a", "A") == ({"my_attr": "String", "my_second_attr": "String", "a_third_one": "Natural"}, {})
  1821. # Test same on associations
  1822. define_attribute("users/user/test/a", "C", "my_attr", "String")
  1823. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String"}, {})
  1824. # Test second attribute of same type
  1825. define_attribute("users/user/test/a", "C", "my_second_attr", "String")
  1826. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String", "my_second_attr": "String"}, {})
  1827. # Test third attribute with different type
  1828. define_attribute("users/user/test/a", "C", "a_third_one", "Natural")
  1829. assert read_defined_attrs("users/user/test/a", "C") == ({"my_attr": "String", "my_second_attr": "String", "a_third_one": "Natural"}, {})
  1830. # Non-existing model
  1831. try:
  1832. define_attribute("users/afa", "A", "B", "C")
  1833. self.fail()
  1834. except UnknownModel:
  1835. pass
  1836. # Non-existing element (1)
  1837. before = element_list("users/user/test/a")
  1838. try:
  1839. define_attribute("users/user/test/a", "AA", "B", "Natural")
  1840. self.fail()
  1841. except UnknownElement:
  1842. assert element_list("users/user/test/a") == before
  1843. # Non-existing element (2)
  1844. before = element_list("users/user/test/a")
  1845. try:
  1846. define_attribute("users/user/test/a", "A", "B", "Natural2")
  1847. self.fail()
  1848. except UnknownElement:
  1849. assert element_list("users/user/test/a") == before
  1850. # Attribute exists
  1851. before = element_list("users/user/test/a")
  1852. try:
  1853. define_attribute("users/user/test/a", "A", "my_attr", "Natural")
  1854. self.fail()
  1855. except AttributeExists:
  1856. assert element_list("users/user/test/a") == before
  1857. # No read permissions
  1858. before = element_list("users/user/test/a")
  1859. try:
  1860. define_attribute("administration/core", "formalisms", "name", "A")
  1861. self.fail()
  1862. except ReadPermissionDenied:
  1863. assert element_list("users/user/test/a") == before
  1864. # No write permissions
  1865. before = element_list("users/user/test/a")
  1866. try:
  1867. define_attribute("formalisms/SimpleClassDiagrams", "Association", "new_name", "String")
  1868. self.fail()
  1869. except WritePermissionDenied:
  1870. assert element_list("users/user/test/a") == before
  1871. # None defined in non-SCD model
  1872. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  1873. try:
  1874. define_attribute("users/user/test/b", "a", "abc", "a")
  1875. self.fail()
  1876. except NoSimpleClassDiagramsModel:
  1877. pass
  1878. def test_op_read_defined_attrs(self):
  1879. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1880. SimpleAttribute String {}
  1881. SimpleAttribute Natural {}
  1882. Class A {
  1883. name = "ABC"
  1884. value : Natural
  1885. new_name ?: String
  1886. name : String
  1887. }
  1888. Association B (A, A) {
  1889. name = "DEF"
  1890. edge_value : Natural
  1891. name : String
  1892. other_value ?: String
  1893. }
  1894. Class C {}
  1895. Class D : A {
  1896. additional_attr : Natural
  1897. }
  1898. Association E : B (D, A) {
  1899. next_attr : String
  1900. }
  1901. """)
  1902. # Normal operation
  1903. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  1904. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  1905. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  1906. # Works with inheritance
  1907. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  1908. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  1909. # Non-existing model
  1910. try:
  1911. read_defined_attrs("users/afa", "A")
  1912. self.fail()
  1913. except UnknownModel:
  1914. pass
  1915. # Non-existing element
  1916. before = element_list("users/user/test/a")
  1917. try:
  1918. read_defined_attrs("users/user/test/a", "AA")
  1919. self.fail()
  1920. except UnknownElement:
  1921. assert element_list("users/user/test/a") == before
  1922. # No read permissions
  1923. before = element_list("users/user/test/a")
  1924. try:
  1925. read_defined_attrs("administration/core", "formalisms")
  1926. self.fail()
  1927. except ReadPermissionDenied:
  1928. assert element_list("users/user/test/a") == before
  1929. # No write permissions, but can still query
  1930. assert read_defined_attrs("formalisms/SimpleClassDiagrams", "Association") == ({"name": "String"}, {"abstract": "Boolean", "constraint": "ActionCode", "lower_cardinality": "Natural", "upper_cardinality": "Natural", "source_lower_cardinality": "Natural", "source_upper_cardinality": "Natural", "target_lower_cardinality": "Natural", "target_upper_cardinality": "Natural"})
  1931. # None defined in non-SCD model
  1932. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  1933. try:
  1934. read_defined_attrs("users/user/test/b", "a")
  1935. self.fail()
  1936. except NoSimpleClassDiagramsModel:
  1937. pass
  1938. def test_op_undefine_attribute(self):
  1939. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  1940. SimpleAttribute String {}
  1941. SimpleAttribute Natural {}
  1942. Class A {
  1943. name = "ABC"
  1944. value : Natural
  1945. new_name ?: String
  1946. name : String
  1947. }
  1948. Association B (A, A) {
  1949. name = "DEF"
  1950. edge_value : Natural
  1951. name : String
  1952. other_value ?: String
  1953. }
  1954. Class C {}
  1955. Class D : A {
  1956. additional_attr : Natural
  1957. }
  1958. Association E : B (D, A) {
  1959. next_attr : String
  1960. }
  1961. """)
  1962. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  1963. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  1964. undefine_attribute("users/user/test/a", "A", "name")
  1965. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural"}, {"new_name": "String"})
  1966. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1967. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  1968. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  1969. undefine_attribute("users/user/test/a", "B", "other_value")
  1970. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {})
  1971. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {})
  1972. # Remove superclass definition
  1973. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1974. try:
  1975. undefine_attribute("users/user/test/a", "D", "value")
  1976. self.fail()
  1977. except SuperclassAttribute:
  1978. pass
  1979. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "additional_attr": "Natural"}, {"new_name": "String"})
  1980. # Non-existing model
  1981. try:
  1982. undefine_attribute("users/afa", "A", "B")
  1983. self.fail()
  1984. except UnknownModel:
  1985. pass
  1986. # Non-existing element
  1987. before = read_defined_attrs("users/user/test/a", "A")
  1988. try:
  1989. undefine_attribute("users/user/test/a", "AA", "B")
  1990. self.fail()
  1991. except UnknownElement:
  1992. assert read_defined_attrs("users/user/test/a", "A") == before
  1993. # Non-existing attribute
  1994. before = read_defined_attrs("users/user/test/a", "A")
  1995. try:
  1996. undefine_attribute("users/user/test/a", "A", "adfadf")
  1997. self.fail()
  1998. except UnknownAttribute:
  1999. assert read_defined_attrs("users/user/test/a", "A") == before
  2000. # No read permissions
  2001. try:
  2002. undefine_attribute("administration/core", "formalisms", "name")
  2003. self.fail()
  2004. except ReadPermissionDenied:
  2005. pass
  2006. # No write permissions
  2007. before = read_defined_attrs("formalisms/SimpleClassDiagrams", "Class")
  2008. try:
  2009. undefine_attribute("formalisms/SimpleClassDiagrams", "Class", "name")
  2010. self.fail()
  2011. except WritePermissionDenied:
  2012. assert read_defined_attrs("formalisms/SimpleClassDiagrams", "Class") == before
  2013. def test_op_attribute_optional(self):
  2014. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2015. SimpleAttribute String {}
  2016. SimpleAttribute Natural {}
  2017. Class A {
  2018. name = "ABC"
  2019. value : Natural
  2020. new_name ?: String
  2021. name : String
  2022. }
  2023. Association B (A, A) {
  2024. name = "DEF"
  2025. edge_value : Natural
  2026. name : String
  2027. other_value ?: String
  2028. }
  2029. Class C {}
  2030. Class D : A {
  2031. additional_attr : Natural
  2032. }
  2033. Association E : B (D, A) {
  2034. next_attr : String
  2035. }
  2036. """)
  2037. # Check initial situation
  2038. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  2039. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  2040. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  2041. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2042. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  2043. # mandatory -> optional
  2044. attribute_optional("users/user/test/a", "A", "value", True)
  2045. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String"}, {"new_name": "String", "value": "Natural"})
  2046. # Check inheritance as well
  2047. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural"}, {"new_name": "String", "value": "Natural"})
  2048. # optional -> mandatory
  2049. attribute_optional("users/user/test/a", "A", "new_name", False)
  2050. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  2051. # Check inheritance as well
  2052. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  2053. # mandatory -> mandatory
  2054. attribute_optional("users/user/test/a", "A", "new_name", False)
  2055. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  2056. # Check inheritance as well
  2057. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  2058. # optional -> optional
  2059. attribute_optional("users/user/test/a", "A", "value", True)
  2060. assert read_defined_attrs("users/user/test/a", "A") == ({"name": "String", "new_name": "String"}, {"value": "Natural"})
  2061. # Check inheritance as well
  2062. assert read_defined_attrs("users/user/test/a", "D") == ({"name": "String", "additional_attr": "Natural", "new_name": "String"}, {"value": "Natural"})
  2063. # Non-existing model
  2064. try:
  2065. attribute_optional("users/afa", "A", "value", False)
  2066. self.fail()
  2067. except UnknownModel:
  2068. pass
  2069. # Non-existing element
  2070. before = element_list("users/user/test/a")
  2071. try:
  2072. attribute_optional("users/user/test/a", "AA", "value", False)
  2073. self.fail()
  2074. except UnknownElement:
  2075. assert element_list("users/user/test/a") == before
  2076. # No read permissions
  2077. try:
  2078. attribute_optional("administration/core", "formalisms", "name", True)
  2079. self.fail()
  2080. except ReadPermissionDenied:
  2081. pass
  2082. # No write permissions, but can still query
  2083. before = element_list("formalisms/SimpleClassDiagrams")
  2084. try:
  2085. attribute_optional("formalisms/SimpleClassDiagrams", "Class", "name", True)
  2086. self.fail()
  2087. except WritePermissionDenied:
  2088. assert element_list("formalisms/SimpleClassDiagrams") == before
  2089. # None defined in non-SCD model
  2090. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  2091. try:
  2092. attribute_optional("users/user/test/b", "a", "b", False)
  2093. self.fail()
  2094. except NoSimpleClassDiagramsModel:
  2095. pass
  2096. def test_op_attribute_type(self):
  2097. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2098. SimpleAttribute String {}
  2099. SimpleAttribute Natural {}
  2100. Class A {
  2101. name = "ABC"
  2102. value : Natural
  2103. new_name ?: String
  2104. name : String
  2105. }
  2106. Association B (A, A) {
  2107. name = "DEF"
  2108. edge_value : Natural
  2109. name : String
  2110. other_value ?: String
  2111. }
  2112. Class C {}
  2113. Class D : A {
  2114. additional_attr : Natural
  2115. }
  2116. Association E : B (D, A) {
  2117. next_attr : String
  2118. }
  2119. """)
  2120. # Check initial situation
  2121. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  2122. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  2123. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  2124. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2125. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  2126. # Change type of node
  2127. attribute_type("users/user/test/a", "A", "value", "String")
  2128. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "String", "name": "String"}, {"new_name": "String"})
  2129. # Check inheritance as well
  2130. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "String", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2131. # Change type of edge
  2132. attribute_type("users/user/test/a", "B", "name", "Natural")
  2133. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "Natural"}, {"other_value": "String"})
  2134. # Check inheritance as well
  2135. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "Natural", "next_attr": "String"}, {"other_value": "String"})
  2136. # Non-existing model
  2137. try:
  2138. attribute_type("users/afa", "A", "value", "String")
  2139. self.fail()
  2140. except UnknownModel:
  2141. pass
  2142. # Non-existing element
  2143. before = element_list("users/user/test/a")
  2144. try:
  2145. attribute_type("users/user/test/a", "AA", "value", "String")
  2146. self.fail()
  2147. except UnknownElement:
  2148. assert element_list("users/user/test/a") == before
  2149. # Non-existing type
  2150. before = element_list("users/user/test/a")
  2151. try:
  2152. attribute_type("users/user/test/a", "A", "value", "SSS")
  2153. self.fail()
  2154. except UnknownElement:
  2155. assert element_list("users/user/test/a") == before
  2156. # No read permissions
  2157. try:
  2158. attribute_type("administration/core", "formalisms", "name", "Natural")
  2159. self.fail()
  2160. except ReadPermissionDenied:
  2161. pass
  2162. # No write permissions, but can still query
  2163. before = element_list("formalisms/SimpleClassDiagrams")
  2164. try:
  2165. attribute_type("formalisms/SimpleClassDiagrams", "Class", "name", "Natural")
  2166. self.fail()
  2167. except WritePermissionDenied:
  2168. assert element_list("formalisms/SimpleClassDiagrams") == before
  2169. # None defined in non-SCD model
  2170. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  2171. try:
  2172. attribute_type("users/user/test/b", "a", "b", "a")
  2173. self.fail()
  2174. except NoSimpleClassDiagramsModel:
  2175. pass
  2176. def test_op_attribute_name(self):
  2177. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2178. SimpleAttribute String {}
  2179. SimpleAttribute Natural {}
  2180. Class A {
  2181. name = "ABC"
  2182. value : Natural
  2183. new_name ?: String
  2184. name : String
  2185. }
  2186. Association B (A, A) {
  2187. name = "DEF"
  2188. edge_value : Natural
  2189. name : String
  2190. other_value ?: String
  2191. }
  2192. Class C {}
  2193. Class D : A {
  2194. additional_attr : Natural
  2195. }
  2196. Association E : B (D, A) {
  2197. next_attr : String
  2198. }
  2199. """)
  2200. # Check initial situation
  2201. assert read_defined_attrs("users/user/test/a", "A") == ({"value": "Natural", "name": "String"}, {"new_name": "String"})
  2202. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "name": "String"}, {"other_value": "String"})
  2203. assert read_defined_attrs("users/user/test/a", "C") == ({}, {})
  2204. assert read_defined_attrs("users/user/test/a", "D") == ({"value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2205. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "name": "String", "next_attr": "String"}, {"other_value": "String"})
  2206. # Change name of node
  2207. attribute_name("users/user/test/a", "A", "value", "new_value")
  2208. assert read_defined_attrs("users/user/test/a", "A") == ({"new_value": "Natural", "name": "String"}, {"new_name": "String"})
  2209. # Check inheritance as well
  2210. assert read_defined_attrs("users/user/test/a", "D") == ({"new_value": "Natural", "name": "String", "additional_attr": "Natural"}, {"new_name": "String"})
  2211. # Change name of edge
  2212. attribute_name("users/user/test/a", "B", "name", "other_name")
  2213. assert read_defined_attrs("users/user/test/a", "B") == ({"edge_value": "Natural", "other_name": "String"}, {"other_value": "String"})
  2214. # Check inheritance as well
  2215. assert read_defined_attrs("users/user/test/a", "E") == ({"edge_value": "Natural", "other_name": "String", "next_attr": "String"}, {"other_value": "String"})
  2216. # Non-existing model
  2217. try:
  2218. attribute_name("users/afa", "A", "value", "str")
  2219. self.fail()
  2220. except UnknownModel:
  2221. pass
  2222. # Non-existing element
  2223. before = element_list("users/user/test/a")
  2224. try:
  2225. attribute_name("users/user/test/a", "AA", "value", "val2")
  2226. self.fail()
  2227. except UnknownElement:
  2228. assert element_list("users/user/test/a") == before
  2229. # Pre-existing name
  2230. before = element_list("users/user/test/a")
  2231. try:
  2232. attribute_name("users/user/test/a", "A", "new_value", "name")
  2233. self.fail()
  2234. except AttributeExists:
  2235. assert element_list("users/user/test/a") == before
  2236. # No read permissions
  2237. try:
  2238. attribute_name("administration/core", "formalisms", "name", "natural")
  2239. self.fail()
  2240. except ReadPermissionDenied:
  2241. pass
  2242. # No write permissions, but can still query
  2243. before = element_list("formalisms/SimpleClassDiagrams")
  2244. try:
  2245. attribute_name("formalisms/SimpleClassDiagrams", "Class", "name", "value")
  2246. self.fail()
  2247. except WritePermissionDenied:
  2248. assert element_list("formalisms/SimpleClassDiagrams") == before
  2249. # None defined in non-SCD model
  2250. model_add("users/user/test/b", "users/user/test/a", "A a {}")
  2251. try:
  2252. attribute_name("users/user/test/b", "a", "b", "c")
  2253. self.fail()
  2254. except NoSimpleClassDiagramsModel:
  2255. pass
  2256. def test_op_group_create(self):
  2257. # Test normal operation
  2258. group_name_1 = "new_group"
  2259. group_name_2 = "group2"
  2260. group_name_3 = "other_group"
  2261. group_name_4 = "second_group"
  2262. assert group_list() == set([])
  2263. group_create(group_name_1)
  2264. assert group_list() == set([(group_name_1, True)])
  2265. # Test second group
  2266. assert group_list() == set([(group_name_1, True)])
  2267. group_create(group_name_2)
  2268. assert group_list() == set([(group_name_1, True), (group_name_2, True)])
  2269. # Test other groups
  2270. self.do_as_user("user2", group_create, [group_name_3])
  2271. self.do_as_user("user2", group_create, [group_name_4])
  2272. assert group_list() == set([(group_name_1, True), (group_name_2, True)])
  2273. # Test non-admin groups
  2274. self.do_as_user("user2", group_join, [group_name_3, "user"])
  2275. assert group_list() == set([(group_name_1, True), (group_name_2, True), (group_name_3, False)])
  2276. # Test create of existing group (member)
  2277. before = group_list()
  2278. try:
  2279. group_create(group_name_1)
  2280. self.fail()
  2281. except GroupExists:
  2282. assert group_list() == before
  2283. # Test create of existing group (non-member)
  2284. before = group_list()
  2285. try:
  2286. group_create(group_name_4)
  2287. self.fail()
  2288. except GroupExists:
  2289. assert group_list() == before
  2290. # Delete all groups again
  2291. self.do_as_user("admin", group_delete, [group_name_1])
  2292. self.do_as_user("admin", group_delete, [group_name_2])
  2293. self.do_as_user("admin", group_delete, [group_name_3])
  2294. self.do_as_user("admin", group_delete, [group_name_4])
  2295. def test_op_group_delete(self):
  2296. group_name_1 = "new_group" # Group with admin permissions
  2297. group_name_2 = "group2" # Group without permissions
  2298. group_name_3 = "other_group" # No member
  2299. group_name_4 = "second_group" # Non-existing group
  2300. # Ensure user2 exists
  2301. self.do_as_user("user2", lambda : 1, [])
  2302. # Create some groups first
  2303. group_create(group_name_1)
  2304. self.do_as_user("admin", group_create, [group_name_2])
  2305. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2306. self.do_as_user("admin", group_create, [group_name_3])
  2307. # Try to delete all
  2308. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2309. group_delete(group_name_1)
  2310. assert group_list() == set([(group_name_2, False)])
  2311. # Remove group that we don't own
  2312. try:
  2313. group_delete(group_name_2)
  2314. self.fail()
  2315. except GroupPermissionDenied:
  2316. assert group_list() == set([(group_name_2, False)])
  2317. # Remove group that we are not even member of
  2318. try:
  2319. group_delete(group_name_3)
  2320. self.fail()
  2321. except GroupPermissionDenied:
  2322. assert group_list() == set([(group_name_2, False)])
  2323. # Remove non-existing group
  2324. try:
  2325. group_delete(group_name_4)
  2326. except UnknownGroup:
  2327. assert group_list() == set([(group_name_2, False)])
  2328. # Test if other users can no longer see removed groups
  2329. group_create(group_name_1)
  2330. group_join(group_name_1, "user2")
  2331. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2332. group_delete(group_name_1)
  2333. assert self.do_as_user("user2", group_list, []) == set([])
  2334. # Delete all groups again
  2335. self.do_as_user("admin", group_delete, [group_name_2])
  2336. self.do_as_user("admin", group_delete, [group_name_3])
  2337. def test_op_group_list(self):
  2338. group_name_1 = "new_group" # Group with admin permissions
  2339. group_name_2 = "group2" # Group without permissions
  2340. group_name_3 = "other_group" # No member
  2341. group_name_4 = "second_group" # Non-existing group
  2342. # Ensure user2 exists
  2343. self.do_as_user("user2", lambda : 1, [])
  2344. # Create some groups first
  2345. group_create(group_name_1)
  2346. self.do_as_user("admin", group_create, [group_name_2])
  2347. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2348. self.do_as_user("admin", group_create, [group_name_3])
  2349. # Assure that groups of all users are correct
  2350. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2351. assert self.do_as_user("user2", group_list, []) == set([])
  2352. assert self.do_as_user("admin", group_list, []) == set([("admin", False), (group_name_2, True), (group_name_3, True)])
  2353. # Delete a group to check that everything is correctly listed afterwards
  2354. self.do_as_user("admin", group_delete, [group_name_2])
  2355. assert group_list() == set([(group_name_1, True)])
  2356. assert self.do_as_user("user2", group_list, []) == set([])
  2357. assert self.do_as_user("admin", group_list, []) == set([("admin", False), (group_name_3, True)])
  2358. # Delete all groups again
  2359. self.do_as_user("admin", group_delete, [group_name_1])
  2360. self.do_as_user("admin", group_delete, [group_name_3])
  2361. def do_as_user(self, username, operation, args):
  2362. user_logout()
  2363. login(username, username)
  2364. try:
  2365. result = operation(*args)
  2366. except:
  2367. user_logout()
  2368. login("user", "user")
  2369. raise
  2370. else:
  2371. user_logout()
  2372. login("user", "user")
  2373. return result
  2374. def test_op_group_join(self):
  2375. group_name_1 = "new_group" # Group with admin permissions
  2376. group_name_2 = "group2" # Group without permissions
  2377. group_name_3 = "other_group" # No member
  2378. group_name_4 = "second_group" # Non-existing group
  2379. # Ensure user2 exists
  2380. self.do_as_user("user2", lambda : 1, [])
  2381. # Create some groups first
  2382. group_create(group_name_1)
  2383. self.do_as_user("admin", group_create, [group_name_2])
  2384. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2385. self.do_as_user("admin", group_create, [group_name_3])
  2386. # Test for group join basic use, of group where we are admin
  2387. assert group_join(group_name_1, "user2") == None
  2388. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2389. # Test for group join of group where we are no admin
  2390. try:
  2391. group_join(group_name_2, "user2") == None
  2392. self.fail()
  2393. except GroupPermissionDenied:
  2394. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2395. # Test for group join of group where we are not even a member
  2396. try:
  2397. group_join(group_name_3, "user2") == None
  2398. self.fail()
  2399. except GroupPermissionDenied:
  2400. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2401. # Test for group join of group that already has user as member
  2402. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2403. try:
  2404. group_join(group_name_1, "user2") == None
  2405. self.fail()
  2406. except UserExists:
  2407. assert self.do_as_user("user2", group_list, []) == set([(group_name_1, False)])
  2408. # Test for group join of non-existing user
  2409. try:
  2410. group_join(group_name_1, "user123") == None
  2411. self.fail()
  2412. except UnknownUser:
  2413. pass
  2414. # Test for group join of non-existing group
  2415. try:
  2416. group_join(group_name_4, "user2") == None
  2417. self.fail()
  2418. except UnknownGroup:
  2419. pass
  2420. # Delete all groups again
  2421. self.do_as_user("admin", group_delete, [group_name_1])
  2422. self.do_as_user("admin", group_delete, [group_name_2])
  2423. self.do_as_user("admin", group_delete, [group_name_3])
  2424. def test_op_group_kick(self):
  2425. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2426. group_name_1 = "new_group" # Group with admin permissions
  2427. group_name_2 = "group2" # Group without permissions
  2428. group_name_3 = "other_group" # No member
  2429. group_name_4 = "second_group" # Non-existing group
  2430. # Ensure user2 exists
  2431. self.do_as_user("user2", lambda : 1, [])
  2432. # Create some groups first
  2433. group_create(group_name_1)
  2434. self.do_as_user("admin", group_create, [group_name_2])
  2435. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2436. # Kick user from group
  2437. assert group_list() == set([(group_name_1, True), (group_name_2, False)])
  2438. self.do_as_user("admin", group_kick, [group_name_2, "user"])
  2439. assert group_list() == set([(group_name_1, True)])
  2440. # Kick self (owner) from group
  2441. assert group_list() == set([(group_name_1, True)])
  2442. group_create(group_name_3)
  2443. assert group_list() == set([(group_name_1, True), (group_name_3, True)])
  2444. assert group_kick(group_name_3, "user") == None
  2445. assert group_list() == set([(group_name_1, True)])
  2446. # Empty groups are not deleted
  2447. self.do_as_user("admin", group_join, [group_name_3, "user"])
  2448. # Kick user not in group
  2449. try:
  2450. self.do_as_user("admin", group_kick, [group_name_2, "user2"])
  2451. self.fail()
  2452. except UserNotInGroup:
  2453. pass
  2454. # Non-existing user
  2455. try:
  2456. group_kick(group_name_1, "adfafd")
  2457. self.fail()
  2458. except UnknownUser:
  2459. pass
  2460. # Non-existing group
  2461. try:
  2462. group_kick("adfadf", "user")
  2463. self.fail()
  2464. except UnknownGroup:
  2465. pass
  2466. # Not admin of group
  2467. self.do_as_user("admin", group_join, [group_name_2, "user"])
  2468. self.do_as_user("admin", group_join, [group_name_2, "user2"])
  2469. assert group_list() == set([(group_name_1, True), (group_name_2, False), (group_name_3, False)])
  2470. assert self.do_as_user("user2", group_list, []) == set([(group_name_2, False)])
  2471. try:
  2472. group_kick(group_name_2, "user2")
  2473. self.fail()
  2474. except GroupPermissionDenied:
  2475. assert self.do_as_user("user2", group_list, []) == set([(group_name_2, False)])
  2476. self.do_as_user("admin", group_delete, [group_name_1])
  2477. self.do_as_user("admin", group_delete, [group_name_2])
  2478. self.do_as_user("admin", group_delete, [group_name_3])
  2479. def do_create_user(self, name):
  2480. self.do_as_user(name, lambda : 1, [])
  2481. def do_test_permission(self, model, expected_permissions):
  2482. for user, permission in expected_permissions.items():
  2483. assert self.do_as_user(user, read_permissions, [model]) == permission
  2484. def test_op_permission_owner_model(self):
  2485. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2486. group_create("users")
  2487. permission_group("users/user/test/a", "users")
  2488. permission_modify("users/user/test/a", "210")
  2489. self.do_create_user("group_user")
  2490. self.do_create_user("other_user")
  2491. group_join("users", "group_user")
  2492. # Test initial situation, where we have owners user:users with permission 210
  2493. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2494. # Change owner, but permissions stay the same
  2495. permission_owner("users/user/test/a", "group_user")
  2496. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2497. # Can no longer modify permissions: only owner can do that
  2498. try:
  2499. permission_owner("users/user/test/a", "admin")
  2500. self.fail()
  2501. except UserPermissionDenied:
  2502. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2503. # Change owner to admin, who always has RW permissions
  2504. self.do_as_user("group_user", permission_owner, ["users/user/test/a", "admin"])
  2505. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "R", "other_user": ""})
  2506. # Give permissions back to someone else, and test that admin can always do operations, even if not owner
  2507. self.do_as_user("admin", permission_owner, ["users/user/test/a", "group_user"])
  2508. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "R", "group_user": "RW", "other_user": ""})
  2509. self.do_as_user("admin", permission_owner, ["users/user/test/a", "user"])
  2510. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2511. # Test non-existing model
  2512. try:
  2513. permission_owner("adfadf", "admin")
  2514. self.fail()
  2515. except UnknownModel:
  2516. pass
  2517. # Test non-existing user
  2518. try:
  2519. self.do_as_user("admin", permission_owner, ["users/user/test/a", "dfadf"])
  2520. self.fail()
  2521. except UnknownUser:
  2522. pass
  2523. # Test assign to user who is already owner
  2524. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2525. self.do_as_user("admin", permission_owner, ["users/user/test/a", "user"])
  2526. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2527. group_delete("users")
  2528. def test_op_permission_owner_folder(self):
  2529. folder_create("users/user/test/a/b/c")
  2530. group_create("users")
  2531. self.do_create_user("group_user")
  2532. group_join("users", "group_user")
  2533. permission_group("users/user/test/a/b", "users")
  2534. permission_modify("users/user/test/a/b", "210")
  2535. # Test permissions
  2536. self.do_test_permission("users/user/test/", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2537. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2538. self.do_test_permission("users/user/test/a/b", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2539. self.do_test_permission("users/user/test/a/b/c", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2540. # But test if they are really applicable
  2541. try:
  2542. self.do_as_user("group_user", model_list, ["users/user/test"])
  2543. self.fail()
  2544. except ReadPermissionDenied:
  2545. pass
  2546. try:
  2547. self.do_as_user("group_user", model_list, ["users/user/test/a"])
  2548. self.fail()
  2549. except ReadPermissionDenied:
  2550. pass
  2551. self.do_as_user("group_user", model_list, ["users/user/test/a/b"])
  2552. try:
  2553. self.do_as_user("group_user", model_list, ["users/user/test/a/b/c"])
  2554. self.fail()
  2555. except ReadPermissionDenied:
  2556. pass
  2557. group_delete("users")
  2558. def test_op_read_permissions_model(self):
  2559. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2560. group_create("users")
  2561. self.do_create_user("group_user")
  2562. self.do_create_user("other_user")
  2563. group_join("users", "group_user")
  2564. permission_group("users/user/test/a", "users")
  2565. permission_modify("users/user/test/a", "210")
  2566. # Test all four cases
  2567. assert self.do_as_user("user", read_permissions, ["users/user/test/a"]) == "RW"
  2568. assert self.do_as_user("group_user", read_permissions, ["users/user/test/a"]) == "R"
  2569. assert self.do_as_user("other_user", read_permissions, ["users/user/test/a"]) == ""
  2570. assert self.do_as_user("admin", read_permissions, ["users/user/test/a"]) == "RW"
  2571. # Test same for root location (empty string)
  2572. assert self.do_as_user("user", read_permissions, [""]) == "R"
  2573. assert self.do_as_user("group_user", read_permissions, [""]) == "R"
  2574. assert self.do_as_user("other_user", read_permissions, [""]) == "R"
  2575. assert self.do_as_user("admin", read_permissions, [""]) == "RW"
  2576. # Test for non-existing location
  2577. try:
  2578. read_permissions("adfadsf")
  2579. self.fail()
  2580. except UnknownLocation:
  2581. pass
  2582. group_delete("users")
  2583. def test_op_read_permissions_folder(self):
  2584. folder_create("users/user/test/a")
  2585. group_create("users")
  2586. self.do_create_user("group_user")
  2587. self.do_create_user("other_user")
  2588. group_join("users", "group_user")
  2589. permission_group("users/user/test/a", "users")
  2590. permission_modify("users/user/test/a", "210")
  2591. # Test all four cases
  2592. assert self.do_as_user("user", read_permissions, ["users/user/test/a"]) == "RW"
  2593. assert self.do_as_user("group_user", read_permissions, ["users/user/test/a"]) == "R"
  2594. assert self.do_as_user("other_user", read_permissions, ["users/user/test/a"]) == ""
  2595. assert self.do_as_user("admin", read_permissions, ["users/user/test/a"]) == "RW"
  2596. # Test for non-existing location
  2597. try:
  2598. read_permissions("adfadsf")
  2599. self.fail()
  2600. except UnknownLocation:
  2601. pass
  2602. group_delete("users")
  2603. def test_op_permission_group_model(self):
  2604. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2605. group_create("users")
  2606. group_create("other_group")
  2607. permission_modify("users/user/test/a", "210")
  2608. self.do_create_user("group_user")
  2609. self.do_create_user("other_user")
  2610. group_join("users", "group_user")
  2611. # Test initial situation, where we have owners user:users with permission 210
  2612. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2613. # Change owner, but permissions stay the same
  2614. permission_group("users/user/test/a", "users")
  2615. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2616. # Only owner can modify group permissions
  2617. try:
  2618. self.do_as_user("group_user", permission_group, ["users/user/test/a", "other_group"])
  2619. self.fail()
  2620. except UserPermissionDenied:
  2621. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2622. # Test that admin can always do operations, even if not owner
  2623. # And test that user permissions still override group permissions
  2624. self.do_as_user("admin", permission_group, ["users/user/test/a", "admin"])
  2625. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2626. self.do_as_user("admin", permission_group, ["users/user/test/a", "other_group"])
  2627. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2628. self.do_as_user("admin", permission_group, ["users/user/test/a", "users"])
  2629. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2630. # Test non-existing model
  2631. try:
  2632. permission_group("adfadf", "admin")
  2633. self.fail()
  2634. except UnknownModel:
  2635. pass
  2636. # Test non-existing group
  2637. try:
  2638. self.do_as_user("admin", permission_group, ["users/user/test/a", "dfadf"])
  2639. self.fail()
  2640. except UnknownGroup:
  2641. pass
  2642. # Test assign to group which is already owning group, resulting in no change
  2643. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2644. self.do_as_user("admin", permission_group, ["users/user/test/a", "users"])
  2645. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2646. self.do_as_user("admin", group_delete, ["other_group"])
  2647. self.do_as_user("admin", group_delete, ["users"])
  2648. def test_op_permission_group_folder(self):
  2649. folder_create("users/user/test/a/b/c")
  2650. group_create("users")
  2651. self.do_create_user("group_user")
  2652. group_join("users", "group_user")
  2653. permission_group("users/user/test/a/b", "users")
  2654. permission_modify("users/user/test/a/b", "210")
  2655. # Test permissions
  2656. self.do_test_permission("users/user/test/", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2657. self.do_test_permission("users/user/test/a", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2658. self.do_test_permission("users/user/test/a/b", {"admin": "RW", "user": "RW", "group_user": "R", "other_user": ""})
  2659. self.do_test_permission("users/user/test/a/b/c", {"admin": "RW", "user": "RW", "group_user": "", "other_user": ""})
  2660. # But test if they are really applicable
  2661. try:
  2662. self.do_as_user("group_user", model_list, ["users/user/test"])
  2663. self.fail()
  2664. except ReadPermissionDenied:
  2665. pass
  2666. try:
  2667. self.do_as_user("group_user", model_list, ["users/user/test/a"])
  2668. self.fail()
  2669. except ReadPermissionDenied:
  2670. pass
  2671. self.do_as_user("group_user", model_list, ["users/user/test/a/b"])
  2672. try:
  2673. self.do_as_user("group_user", model_list, ["users/user/test/a/b/c"])
  2674. self.fail()
  2675. except ReadPermissionDenied:
  2676. pass
  2677. group_delete("users")
  2678. def test_op_group_owner_add(self):
  2679. group_create("group1")
  2680. group_create("group2")
  2681. group_create("group3")
  2682. self.do_create_user("new_user")
  2683. group_join("group1", "new_user")
  2684. # Basic use of group owner: promote a user
  2685. assert self.do_as_user("new_user", group_list, []) == set([("group1", False)])
  2686. assert group_owner_add("group1", "new_user") == None
  2687. assert self.do_as_user("new_user", group_list, []) == set([("group1", True)])
  2688. # Or instantaneously make owner, thereby also making a member
  2689. assert self.do_as_user("new_user", group_list, []) == set([("group1", True)])
  2690. assert group_owner_add("group2", "new_user") == None
  2691. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2692. # Test for user that is already an owner
  2693. assert group_owner_add("group1", "new_user") == None
  2694. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2695. # Test non-existing user
  2696. try:
  2697. group_owner_add("group1", "abc")
  2698. self.fail()
  2699. except UnknownUser:
  2700. pass
  2701. # Test non-existing group
  2702. try:
  2703. group_owner_add("group4", "new_user")
  2704. self.fail()
  2705. except UnknownGroup:
  2706. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2707. # Only an owner of the group can do this
  2708. group_owner_delete("group2", "new_user")
  2709. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2710. try:
  2711. self.do_as_user("new_user", group_owner_add, ["group2", "user"])
  2712. self.fail()
  2713. except GroupPermissionDenied:
  2714. pass
  2715. # Also non-members can't modify
  2716. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2717. try:
  2718. self.do_as_user("new_user", group_owner_add, ["group3", "user"])
  2719. self.fail()
  2720. except GroupPermissionDenied:
  2721. pass
  2722. # Delete all groups again
  2723. group_delete("group1")
  2724. group_delete("group2")
  2725. group_delete("group3")
  2726. def test_op_group_owner_delete(self):
  2727. group_create("group1")
  2728. group_create("group2")
  2729. group_create("group3")
  2730. self.do_create_user("new_user")
  2731. group_owner_add("group1", "new_user")
  2732. group_owner_add("group2", "new_user")
  2733. # Basic use: remove owner, but stay a member
  2734. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", True)])
  2735. assert group_owner_delete("group2", "new_user") == None
  2736. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2737. # Test for user that is already not an owner
  2738. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2739. assert group_owner_delete("group2", "new_user") == None
  2740. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2741. # Test for user that is not even a member
  2742. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2743. try:
  2744. group_owner_delete("group3", "new_user")
  2745. self.fail()
  2746. except UserNotInGroup:
  2747. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2748. # Test non-existing user
  2749. try:
  2750. group_owner_delete("group1", "abc")
  2751. self.fail()
  2752. except UnknownUser:
  2753. pass
  2754. # Test non-existing group
  2755. try:
  2756. group_owner_delete("group4", "new_user")
  2757. self.fail()
  2758. except UnknownGroup:
  2759. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2760. # Only an owner of the group can do this
  2761. group_owner_delete("group2", "new_user")
  2762. assert group_list() == set([("group1", True), ("group2", True), ("group3", True)])
  2763. try:
  2764. self.do_as_user("new_user", group_owner_delete, ["group2", "user"])
  2765. self.fail()
  2766. except GroupPermissionDenied:
  2767. assert group_list() == set([("group1", True), ("group2", True), ("group3", True)])
  2768. # Also non-members can't modify
  2769. assert self.do_as_user("new_user", group_list, []) == set([("group1", True), ("group2", False)])
  2770. try:
  2771. self.do_as_user("new_user", group_owner_delete, ["group3", "user"])
  2772. self.fail()
  2773. except GroupPermissionDenied:
  2774. pass
  2775. # Delete all groups again
  2776. group_delete("group1")
  2777. group_delete("group2")
  2778. group_delete("group3")
  2779. def test_op_conformance_add(self):
  2780. # Add some conformance relations
  2781. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2782. Class A {}
  2783. Class B {}
  2784. Association C (A, B) {}
  2785. """)
  2786. # Add conformance bottom relation
  2787. t = model_types("users/user/test/a")
  2788. assert len(t) == 1
  2789. t = t.pop()
  2790. print(t)
  2791. assert t[0] == "formalisms/SimpleClassDiagrams"
  2792. assert t[1] != None
  2793. assert t[2] == None
  2794. # Check if the type is added, but without any type mapping associated to it
  2795. conformance_add("users/user/test/a", "formalisms/Bottom")
  2796. ts = model_types("users/user/test/a")
  2797. assert len(ts) == 2
  2798. while ts:
  2799. t = ts.pop()
  2800. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2801. if t[0] == "formalisms/SimpleClassDiagrams":
  2802. assert t[1] != None
  2803. elif t[1] == "formalisms/Bottom":
  2804. # Type mapping is empty
  2805. assert t[1] == None
  2806. assert t[2] == None
  2807. # Check if a type mapping is created when model is opened as bottom
  2808. alter_context("users/user/test/a", "formalisms/Bottom")
  2809. element_list("users/user/test/a")
  2810. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2811. ts = model_types("users/user/test/a")
  2812. assert len(ts) == 2
  2813. while ts:
  2814. t = ts.pop()
  2815. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2816. assert t[1] != None
  2817. assert t[2] == None
  2818. # Check if we can add a second one to the same MM
  2819. conformance_add("users/user/test/a", "formalisms/Bottom")
  2820. ts = model_types("users/user/test/a")
  2821. assert len(ts) == 3
  2822. assert ("formalisms/Bottom", None, None) in ts
  2823. found = False
  2824. while ts:
  2825. t = ts.pop()
  2826. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2827. if t[0] == "formalisms/SimpleClassDiagrams":
  2828. assert t[1] != None
  2829. elif t[0] == "formalisms/Bottom":
  2830. # Type mapping is empty
  2831. if t[1] != None:
  2832. found = True
  2833. assert t[2] == None
  2834. assert found
  2835. # Check add of non-existing model
  2836. try:
  2837. conformance_add("users/user/test/b", "formalisms/Bottom")
  2838. self.fail()
  2839. except UnknownModel:
  2840. pass
  2841. # Check add of non-existing metamodel
  2842. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  2843. before = model_types("users/user/test/b")
  2844. try:
  2845. conformance_add("users/user/test/b", "formalisms/Bottom2")
  2846. self.fail()
  2847. except UnknownModel:
  2848. assert model_types("users/user/test/b") == before
  2849. def test_op_conformance_delete(self):
  2850. model_add("users/user/test/a", "formalisms/SimpleClassDiagrams", """
  2851. Class A {}
  2852. Class B {}
  2853. Association C (A, B) {}
  2854. """)
  2855. # Add conformance bottom relation
  2856. conformance_add("users/user/test/a", "formalisms/Bottom")
  2857. # Verify initial state
  2858. ts = model_types("users/user/test/a")
  2859. assert len(ts) == 2
  2860. while ts:
  2861. t = ts.pop()
  2862. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2863. if t[0] == "formalisms/SimpleClassDiagrams":
  2864. assert t[1] != None
  2865. elif t[1] == "formalisms/Bottom":
  2866. # Type mapping is empty
  2867. assert t[1] == None
  2868. assert t[2] == None
  2869. # Now remove it again
  2870. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2871. ts = model_types("users/user/test/a")
  2872. assert len(ts) == 1
  2873. t = ts.pop()
  2874. assert t[0] == "formalisms/SimpleClassDiagrams"
  2875. assert t[1] != None
  2876. assert t[2] == None
  2877. # Add conformance bottom relation twice
  2878. conformance_add("users/user/test/a", "formalisms/Bottom")
  2879. conformance_add("users/user/test/a", "formalisms/Bottom")
  2880. # Should be there twice, but set flattens it to once
  2881. ts = model_types("users/user/test/a")
  2882. assert len(ts) == 2
  2883. while ts:
  2884. t = ts.pop()
  2885. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2886. if t[0] == "formalisms/SimpleClassDiagrams":
  2887. assert t[1] != None
  2888. elif t[1] == "formalisms/Bottom":
  2889. # Type mapping is empty
  2890. assert t[1] == None
  2891. assert t[2] == None
  2892. # Now remove it (once called, but invoked for all occurences!)
  2893. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2894. ts = model_types("users/user/test/a")
  2895. assert len(ts) == 1
  2896. t = ts.pop()
  2897. assert t[0] == "formalisms/SimpleClassDiagrams"
  2898. assert t[1] != None
  2899. assert t[2] == None
  2900. # Now actually test filtering capabilities
  2901. alter_context("users/user/test/a", "formalisms/Bottom")
  2902. element_list("users/user/test/a")
  2903. alter_context("users/user/test/a", "formalisms/SimpleClassDiagrams")
  2904. # Model should be there with a type mapping model
  2905. ts = model_types("users/user/test/a")
  2906. assert len(ts) == 2
  2907. while ts:
  2908. t = ts.pop()
  2909. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2910. assert t[1] != None
  2911. assert t[2] == None
  2912. # Add a second bottom relation
  2913. conformance_add("users/user/test/a", "formalisms/Bottom")
  2914. # And remove the one without model, to make sure that it is not a wildcard!
  2915. conformance_delete("users/user/test/a", "formalisms/Bottom", "")
  2916. ts = model_types("users/user/test/a")
  2917. assert len(ts) == 2
  2918. while ts:
  2919. t = ts.pop()
  2920. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2921. assert t[1] != None
  2922. assert t[2] == None
  2923. # Add again, but now remove the one with type mapping
  2924. conformance_add("users/user/test/a", "formalisms/Bottom")
  2925. # First try one that doesn't match...
  2926. conformance_delete("users/user/test/a", "formalisms/Bottom", "NOTHING")
  2927. ts = model_types("users/user/test/a")
  2928. assert len(ts) == 3
  2929. while ts:
  2930. t = ts.pop()
  2931. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2932. assert t[2] == None
  2933. # Now try one with the actual name
  2934. actual_name = [i for i in model_types("users/user/test/a") if i[0] == "formalisms/Bottom" and i[1] != None][0]
  2935. assert len(model_types("users/user/test/a")) == 3
  2936. conformance_delete("users/user/test/a", "formalisms/SimpleClassDiagrams", actual_name)
  2937. # Nothing removed, because of wrong TM model
  2938. assert len(model_types("users/user/test/a")) == 3
  2939. # Now remove correct one
  2940. conformance_delete("users/user/test/a", "formalisms/Bottom", actual_name)
  2941. ts = model_types("users/user/test/a")
  2942. assert len(ts) == 2
  2943. while ts:
  2944. t = ts.pop()
  2945. assert t[0] in ["formalisms/SimpleClassDiagrams", "formalisms/Bottom"]
  2946. if t[0] == "formalisms/SimpleClassDiagrams":
  2947. assert t[1] != None
  2948. elif t[1] == "formalisms/Bottom":
  2949. # Type mapping is empty
  2950. assert t[1] == None
  2951. assert t[2] == None
  2952. # Check add of non-existing model
  2953. try:
  2954. conformance_add("users/user/test/b", "formalisms/Bottom")
  2955. self.fail()
  2956. except UnknownModel:
  2957. pass
  2958. # Check add of non-existing metamodel
  2959. model_add("users/user/test/b", "formalisms/SimpleClassDiagrams")
  2960. before = model_types("users/user/test/b")
  2961. try:
  2962. conformance_add("users/user/test/b", "formalisms/Bottom2")
  2963. self.fail()
  2964. except UnknownModel:
  2965. assert model_types("users/user/test/b") == before
  2966. """
  2967. def test_op_model_render(self):
  2968. def test_op_transformation_between(self):
  2969. def test_op_transformation_add_MT(self):
  2970. def test_op_transformation_add_AL(self):
  2971. def test_op_transformation_add_MANUAL(self):
  2972. def test_op_transformation_execute_MT(self):
  2973. def test_op_transformation_execute_AL(self):
  2974. def test_op_transformation_execute_MANUAL(self):
  2975. def test_op_transformation_signature(self):
  2976. def test_op_process_signature(self):
  2977. """
  2978. def test_modelling(self):
  2979. # Add a model
  2980. model_add("users/user/test/Empty", "formalisms/SimpleClassDiagrams")
  2981. # Check that it exists
  2982. compare_locations("users/user/test", set(["Empty"]))
  2983. # Check that it conforms
  2984. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  2985. # Check for permissions
  2986. assert model_list_full("users/user/test") == set([(name, "user", "nobody", "221") for name in get_model_list("users/user/test")]) | \
  2987. set([("Empty", "user", "nobody", "200")])
  2988. # Instantiate it further
  2989. model_add("users/user/test/my_empty", "users/user/test/Empty")
  2990. assert verify("users/user/test/my_empty", "users/user/test/Empty") == "OK"
  2991. # Check that it exists
  2992. compare_locations("users/user/test", set(["my_empty", "Empty"]))
  2993. # Check that an instantiate of "A" fails
  2994. try:
  2995. res = instantiate("users/user/test/my_empty", "A")
  2996. assert False
  2997. except UnknownIdentifier:
  2998. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  2999. # Create something in the formalism
  3000. instantiate("users/user/test/Empty", "Class", ID="A")
  3001. attr_assign("users/user/test/Empty", "A", "name", "A")
  3002. assert verify("users/user/test/Empty", "formalisms/SimpleClassDiagrams") == "OK"
  3003. # Now instantiate that in the model as well, which now works
  3004. instantiate("users/user/test/my_empty", "A")
  3005. assert verify("users/user/test/my_empty", "users/user/test/Empty") == "OK"
  3006. def test_overwrite(self):
  3007. model_add("users/user/test/Empty", "formalisms/SimpleClassDiagrams")
  3008. assert element_list("users/user/test/Empty") == set([])
  3009. instantiate("users/user/test/Empty", "Class", ID="A")
  3010. assert element_list("users/user/test/Empty") == set([("A", "Class")])
  3011. model_overwrite("users/user/test/Empty", "")
  3012. assert element_list("users/user/test/Empty") == set([])
  3013. compare_locations("users/user/test", set(["Empty"]))
  3014. assert element_list("users/user/test/Empty") == set([])
  3015. instantiate("users/user/test/Empty", "Class", ID="B")
  3016. compare_locations("users/user/test", set(["Empty"]))
  3017. def test_operations(self):
  3018. log = []
  3019. def manual_callback(model):
  3020. p1 = instantiate(model, "PetriNet_Runtime/Place")
  3021. p2 = instantiate(model, "PetriNet_Runtime/Place")
  3022. p3 = instantiate(model, "PetriNet_Runtime/Place")
  3023. t1 = instantiate(model, "PetriNet_Runtime/Transition")
  3024. p2t1 = instantiate(model, "PetriNet_Runtime/P2T", (p1, t1))
  3025. p2t2 = instantiate(model, "PetriNet_Runtime/P2T", (p2, t1))
  3026. t2p1 = instantiate(model, "PetriNet_Runtime/T2P", (t1, p3))
  3027. attr_assign(model, p1, "tokens", 1)
  3028. attr_assign(model, p1, "name", "p1")
  3029. attr_assign(model, p2, "tokens", 2)
  3030. attr_assign(model, p2, "name", "p2")
  3031. attr_assign(model, p3, "tokens", 3)
  3032. attr_assign(model, p3, "name", "p3")
  3033. attr_assign(model, t1, "name", "t1")
  3034. attr_assign(model, t1, "executing", False)
  3035. attr_assign(model, p2t1, "weight", 1)
  3036. attr_assign(model, p2t2, "weight", 1)
  3037. attr_assign(model, t2p1, "weight", 2)
  3038. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  3039. model_add("users/user/test/PetriNet_Runtime", "formalisms/SimpleClassDiagrams", open("integration/code/pn_runtime.mvc", "r").read())
  3040. model_add("users/user/test/my_pn", "users/user/test/PetriNet", open("integration/code/pn_design_model.mvc", "r").read())
  3041. def add_tracability_D2R(model):
  3042. instantiate(model, "Association", ("PetriNet/Place", "PetriNet_Runtime/Place"), ID="D2R_PlaceLink")
  3043. instantiate(model, "Association", ("PetriNet/Transition", "PetriNet_Runtime/Transition"), ID="D2R_TransitionLink")
  3044. def add_tracability_R2D(model):
  3045. instantiate(model, "Association", ("PetriNet_Runtime/Place", "PetriNet/Place"), ID="R2D_PlaceLink")
  3046. instantiate(model, "Association", ("PetriNet_Runtime/Transition", "PetriNet/Transition"), ID="R2D_TransitionLink")
  3047. transformation_add_MT({"PetriNet": "users/user/test/PetriNet"}, {}, "users/user/test/print_pn", open("integration/code/pn_print.mvc").read())
  3048. transformation_add_MANUAL({"PetriNet": "users/user/test/PetriNet"}, {"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, "users/user/test/pn_design_to_runtime", add_tracability_D2R)
  3049. transformation_add_AL({"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, {"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, "users/user/test/pn_simulate", open("integration/code/pn_simulate.alc").read())
  3050. transformation_add_MT({"PetriNet_Runtime": "users/user/test/PetriNet_Runtime"}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/pn_runtime_to_design", open("integration/code/pn_runtime_to_design.mvc").read(), add_tracability_R2D)
  3051. log = []
  3052. ctrl = log_output.Controller(log, keep_running=False)
  3053. thrd = threading.Thread(target=ctrl.start)
  3054. thrd.daemon = True
  3055. thrd.start()
  3056. assert transformation_execute_MT("users/user/test/print_pn", {"PetriNet": "users/user/test/my_pn"}, {}, (ctrl, "inp", "outp")) == True
  3057. thrd.join()
  3058. assert set(log) == set(['"p1" --> 1',
  3059. '"p2" --> 2',
  3060. '"p3" --> 3'])
  3061. assert transformation_execute_MANUAL("users/user/test/pn_design_to_runtime", {"PetriNet": "users/user/test/my_pn"}, {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, manual_callback) == True
  3062. assert transformation_execute_AL("users/user/test/pn_simulate", {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, {"PetriNet_Runtime": "users/user/test/my_pn_RT"}) == True
  3063. assert transformation_execute_MT("users/user/test/pn_runtime_to_design", {"PetriNet_Runtime": "users/user/test/my_pn_RT"}, {"PetriNet": "users/user/test/my_pn"}) == True
  3064. log = []
  3065. ctrl = log_output.Controller(log, keep_running=False)
  3066. thrd = threading.Thread(target=ctrl.start)
  3067. thrd.daemon = True
  3068. thrd.start()
  3069. assert transformation_execute_MT("users/user/test/print_pn", {"PetriNet": "users/user/test/my_pn"}, {}, (ctrl, "inp", "outp")) == True
  3070. thrd.join()
  3071. assert set(log) == set(['"p1" --> 0',
  3072. '"p2" --> 1',
  3073. '"p3" --> 5'])
  3074. def test_process_model_trivial_pn_subfunction(self):
  3075. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  3076. model_add("users/user/test/ReachabilityGraph", "formalisms/SimpleClassDiagrams", open("integration/code/reachability_graph.mvc", "r").read())
  3077. model_add("users/user/test/pn_reachability", "formalisms/ProcessModel", open("integration/code/pm_pn_reachability.mvc", "r").read())
  3078. transformation_add_MT({}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/initialize_PN", open("integration/code/initialize_PN.mvc", "r").read())
  3079. transformation_add_MANUAL({"PetriNet": "users/user/test/PetriNet"}, {"PetriNet": "users/user/test/PetriNet"}, "users/user/test/refine_PN")
  3080. transformation_add_AL({"PetriNet": "users/user/test/PetriNet"}, {"ReachabilityGraph": "users/user/test/ReachabilityGraph"}, "users/user/test/reachability", open("integration/code/reachability_subfunction.alc", "r").read())
  3081. transformation_add_MT({"ReachabilityGraph": "users/user/test/ReachabilityGraph"}, {}, "users/user/test/reachability_print", open("integration/code/reachabilitygraph_print.mvc", 'r').read())
  3082. def callback_refine_PN(model):
  3083. p1 = instantiate(model, "PetriNet/Place")
  3084. attr_assign(model, p1, "name", "p1")
  3085. attr_assign(model, p1, "tokens", 1)
  3086. t1 = instantiate(model, "PetriNet/Transition")
  3087. attr_assign(model, t1, "name", "t1")
  3088. p2t = instantiate(model, "PetriNet/P2T", (p1, t1))
  3089. attr_assign(model, p2t, "weight", 1)
  3090. log = []
  3091. ctrl = log_output.Controller(log, keep_running=False)
  3092. thrd = threading.Thread(target=ctrl.start)
  3093. thrd.daemon = True
  3094. thrd.start()
  3095. process_execute("users/user/test/pn_reachability", {}, {"users/user/test/refine_PN": callback_refine_PN, "users/user/test/reachability_print": (ctrl, "inp", "outp")})
  3096. thrd.join()
  3097. assert set(log) == set(['"0": {"p1": 1}',
  3098. '"1": {"p1": 0}',
  3099. '"0" --["t1"]--> "1"'])
  3100. def test_render(self):
  3101. model_add("users/user/test/CausalBlockDiagrams", "formalisms/SimpleClassDiagrams", open("integration/code/cbd_design.mvc", 'r').read())
  3102. model_add("users/user/test/MM_rendered_graphical", "formalisms/SimpleClassDiagrams", open("integration/code/MM_rendered_graphical.mvc", 'r').read())
  3103. model_add("users/user/test/my_CBD", "users/user/test/CausalBlockDiagrams", open("integration/code/my_cbd.mvc", 'r').read())
  3104. def add_tracability(model):
  3105. instantiate(model, "Association", ("abstract/Block", "rendered/Group"), ID="TracabilityLink")
  3106. transformation_add_MT({"abstract": "users/user/test/CausalBlockDiagrams", "rendered": "users/user/test/MM_rendered_graphical"}, {"abstract": "users/user/test/CausalBlockDiagrams", "rendered": "users/user/test/MM_rendered_graphical"}, "users/user/test/render_graphical_CBD", open("integration/code/CBD_mapper.mvc", 'r').read(), add_tracability)
  3107. result = model_render("users/user/test/my_CBD", "users/user/test/render_graphical_CBD", "users/user/test/my_perceptualized_CBD")
  3108. assert len(result) == 23
  3109. def test_SCCD_basic(self):
  3110. model_add("users/user/test/SCCD", "formalisms/SimpleClassDiagrams", open("integration/code/SCCD.mvc", 'r').read())
  3111. model_add("users/user/test/SCCD_Trace", "formalisms/SimpleClassDiagrams", open("integration/code/SCCD_Trace.mvc", 'r').read())
  3112. model_add("users/user/test/my_SCCD", "users/user/test/SCCD", open("integration/code/SCCD_all.mvc", 'r').read())
  3113. transformation_add_AL({"SCCD": "users/user/test/SCCD"}, {"trace": "users/user/test/SCCD_Trace"}, "users/user/test/SCCD_execute_afap", open("integration/code/SCCD_execute.alc", 'r').read().replace("afap = False", "afap = True"))
  3114. transformation_execute_AL("users/user/test/SCCD_execute_afap", {"SCCD": "users/user/test/my_SCCD"}, {"trace": "users/user/test/my_SCCD_trace"})
  3115. alter_context("users/user/test/my_SCCD_trace", "users/user/test/SCCD_Trace")
  3116. lst = element_list_nice("users/user/test/my_SCCD_trace")
  3117. lst.sort(key=lambda i: (i["timestamp"], i["name"]))
  3118. result = [(i["timestamp"], str(i["name"])) for i in lst if i["name"] not in ["updateTimerValue", "updateTimerColour", "resetTimer"]]
  3119. assert result == [(5.0, "displayRed"),
  3120. (20.0, "displayYellow"),
  3121. (20.5, "displayNone"),
  3122. (21.0, "displayYellow"),
  3123. (21.5, "displayNone"),
  3124. (22.0, "displayYellow"),
  3125. (22.5, "displayNone"),
  3126. (23.0, "displayYellow"),
  3127. (23.5, "displayNone"),
  3128. (24.0, "displayYellow"),
  3129. (24.5, "displayNone"),
  3130. (25.0, "displayYellow"),
  3131. (25.5, "displayNone"),
  3132. (26.0, "displayYellow"),
  3133. (26.5, "displayNone"),
  3134. (27.0, "displayYellow"),
  3135. (27.5, "displayNone"),
  3136. (28.0, "displayYellow"),
  3137. (28.5, "displayNone"),
  3138. (29.0, "displayYellow"),
  3139. (29.4, "displayNone"),
  3140. (29.4, "displayRed"),
  3141. (89.4, "displayGreen"),
  3142. (129.4, "displayNone"),
  3143. (129.4, "displayRed"),
  3144. (139.4, "displayYellow"),
  3145. (139.9, "displayNone"),
  3146. (140.4, "displayYellow"),
  3147. (140.9, "displayNone"),
  3148. (141.4, "displayYellow"),
  3149. (141.9, "displayNone"),
  3150. (142.4, "displayYellow"),
  3151. (142.9, "displayNone"),
  3152. (143.4, "displayYellow"),
  3153. (143.9, "displayNone"),
  3154. (144.4, "displayYellow"),
  3155. (144.9, "displayNone"),
  3156. (145.4, "displayYellow"),
  3157. (145.9, "displayNone"),
  3158. (146.4, "displayYellow"),
  3159. (146.9, "displayNone"),
  3160. (147.4, "displayYellow"),
  3161. (147.9, "displayNone"),
  3162. (148.4, "displayYellow"),
  3163. ]
  3164. def test_switch_MM(self):
  3165. model_add("users/user/test/PetriNet", "formalisms/SimpleClassDiagrams", open("integration/code/pn_design.mvc", "r").read())
  3166. model_add("users/user/test/my_pn", "users/user/test/PetriNet", open("integration/code/pn_design_model.mvc", "r").read())
  3167. got = element_list_nice("users/user/test/PetriNet")
  3168. expected = \
  3169. [{'__id': 'Natural', '__type': 'SimpleAttribute', 'constraint': {'AL': ''}, 'name': 'Natural'},
  3170. {'__id': 'String', '__type': 'SimpleAttribute', 'constraint': {'AL': ''}, 'name': 'String'},
  3171. {'__id': 'Place', '__type': 'Class', 'lower_cardinality': None, 'upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'Place', 'abstract': None},
  3172. {'__id': 'Place_tokens', '__type': 'AttributeLink', '__source': 'Place', '__target': 'Natural', 'name': 'tokens', 'optional': False, 'constraint': {'AL': ''}},
  3173. {'__id': 'Place_name', '__type': 'AttributeLink', '__source': 'Place', '__target': 'String', 'name': 'name', 'optional': False, 'constraint': {'AL': ''}},
  3174. {'__id': 'Transition', '__type': 'Class', 'lower_cardinality': None, 'upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'Transition', 'abstract': None},
  3175. {'__id': 'Transition_name', '__type': 'AttributeLink', '__source': 'Transition', '__target': 'String', 'name': 'name', 'optional': False, 'constraint': {'AL': ''}},
  3176. {'__id': 'P2T', '__type': 'Association', '__source': 'Place', '__target': 'Transition', 'source_lower_cardinality': None, 'target_lower_cardinality': None, 'source_upper_cardinality': None, 'target_upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'P2T', "abstract": None, "lower_cardinality": None, "upper_cardinality": None},
  3177. {'__id': 'P2T_weight', '__type': 'AttributeLink', '__source': 'P2T', '__target': 'Natural', 'name': 'weight', 'optional': False, 'constraint': {'AL': ''}},
  3178. {'__id': 'T2P', '__type': 'Association', '__source': 'Transition', '__target': 'Place', 'source_lower_cardinality': None, 'target_lower_cardinality': None, 'source_upper_cardinality': None, 'target_upper_cardinality': None, 'constraint': {'AL': ''}, 'name': 'T2P', "abstract": None, "lower_cardinality": None, "upper_cardinality": None},
  3179. {'__id': 'T2P_weight', '__type': 'AttributeLink', '__source': 'T2P', '__target': 'Natural', 'name': 'weight', 'optional': False, 'constraint': {'AL': ''}},
  3180. ]
  3181. compare_unordered_lists(got, expected)
  3182. got = element_list_nice("users/user/test/my_pn")
  3183. expected = \
  3184. [{'__id': 'p1', '__type': 'Place', 'tokens': 1, 'name': 'p1'},
  3185. {'__id': 'p2', '__type': 'Place', 'tokens': 2, 'name': 'p2'},
  3186. {'__id': 'p3', '__type': 'Place', 'tokens': 3, 'name': 'p3'},
  3187. {'__id': 't1', '__type': 'Transition', 'name': 't1'},
  3188. {'__id': '__0', '__type': 'P2T', '__source': 'p1', '__target': 't1', 'weight': 1},
  3189. {'__id': '__1', '__type': 'P2T', '__source': 'p2', '__target': 't1', 'weight': 1},
  3190. {'__id': '__2', '__type': 'T2P', '__source': 't1', '__target': 'p3', 'weight': 2}
  3191. ]
  3192. compare_unordered_lists(got, expected)
  3193. alter_context("users/user/test/PetriNet", "formalisms/Bottom")
  3194. alter_context("users/user/test/my_pn", "formalisms/Bottom")
  3195. count_nodes = 0
  3196. count_edges = 0
  3197. for entry in element_list_nice("users/user/test/PetriNet"):
  3198. print(entry)
  3199. assert entry["__type"] in ["Node", "Edge"]
  3200. if entry["__type"] == "Node":
  3201. assert len(entry) == 2
  3202. count_nodes += 1
  3203. else:
  3204. assert len(entry) == 4
  3205. count_edges += 1
  3206. assert count_nodes == 20
  3207. assert count_edges == 23
  3208. count_nodes = 0
  3209. count_edges = 0
  3210. for entry in element_list_nice("users/user/test/my_pn"):
  3211. assert entry["__type"] in ["Node", "Edge"]
  3212. if entry["__type"] == "Node":
  3213. assert len(entry) == 2
  3214. count_nodes += 1
  3215. else:
  3216. assert len(entry) == 4
  3217. count_edges += 1
  3218. assert count_nodes == 14
  3219. assert count_edges == 13
  3220. alter_context("users/user/test/PetriNet", "users/user/test/PetriNet")
  3221. alter_context("users/user/test/my_pn", "formalisms/SimpleClassDiagrams")
  3222. try:
  3223. element_list_nice("users/user/test/PetriNet")
  3224. self.fail()
  3225. except:
  3226. pass
  3227. try:
  3228. element_list_nice("users/user/test/my_pn")
  3229. self.fail()
  3230. except:
  3231. pass