Skip to content

Failed

com.sun.ts.tests.jacc.web.toolsContracts.Client.WebRoleRefPermission_from_standalone (from authorization-tck)

Failing for the past 1 build (Since #57 )
Took 1 sec.

Error Message

test result: Failed. Test case throws exception: WebRoleRefPermission failed: addToRole policy statements verification failed

Stacktrace

test result: Failed. Test case throws exception: WebRoleRefPermission failed: addToRole policy statements verification failed

Standard Output

#Test Results (version 2)
#Tue Jul 21 15:36:27 UTC 2020
#-----testdescription-----
$file=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/src/com/sun/ts/tests/jacc/web/toolsContracts/Client.java
$root=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/src
assertion_ids=JACC\:JAVADOC\:50  Checks two WebRoleRefPermission objects for equality.                             \n\t\t\t\t\t\t\t  WebRoleRefPermission objects are equivalent if they have case  equivalent name and actions values.    Two Permission objects, P1 and P2, are equivalent if and only if  P1.implies(P2) AND P2.implies(P1).    The name and actions comparisons described above are case sensitive.\nJACC\:SPEC\:27  The declarative authorization policy statements derived from application or\nmodule deployment descriptor(s) must be translated to create instances of the \ncorresponding jakarta.security.jacc Permission classes.\nJACC\:SPEC\:28  Methods of the PolicyConfiguration interface must be used with the\npermissions resulting from the translation to create policy statements within the \nPolicyConfiguration objects.\nJACC\:SPEC\:36  Each WebResourcePermission object must be constructed using the qualified pattern as\nits name and with actions defined by the union of the HTTP methods named or \nimplied by the collections containing the pattern and occurring in a constraint that\nnames (or implies via "*") the role to which the permission is being added. The  \nresulting permissions must be added to the corresponding roles by calling the\naddToRole method on the PolicyConfiguration object.\nJACC\:SPEC\:38  A WebResourcePermission must be instantiated for each distinct urlpattern\noccurring in the security-constraint elements that do not \ncontain an auth-constraint. Each WebResourcePermission object must be\nconstructed using the qualified pattern as its name and with actions defined by the \nunion of the HTTP methods named or implied by the collections containing the\npattern and occurring in a security-constraint without an authconstraint. \nThe resulting permissions must be added to the unchecked policy\nstatements by calling the addToUncheckedPolicy method on the \nPolicyConfiguration object.\nJACC\:SPEC\:43  For each security-role-ref appearing in the deployment descriptor a\ncorresponding WebRoleRefPermission must be created. The name used in the \nconstruction of each WebRoleRefPermission must be the servlet-name in\nwhose context the security-role-ref is defined. The actions used to \nconstruct the permission must be the value of the role-name (that is the\nreference), appearing in the security-role-ref.\nJACC\:SPEC\:44  The deployment tools must call the addToRole method on the\n PolicyConfiguration object to add the WebRoleRefPermission object \n resulting from the translation to the role identified in the role-link\n appearing in the security-role-ref.\nJACC\:SPEC\:45  For each servlet element in the deployment descriptor a WebRoleRefPermission must\nbe crea ted for each security-role whose name does not appear as the rolename\nin a security-role-ref within the servlet element. Each such \nWebRoleRefPermission must be created with action (that is, reference)\ncorresponding to the role-name and added to the role with the same name (as \nthe reference) by calling the addToRole method on the\nPolicyConfiguration object.\nJACC\:SPEC\:52  The application server's deployment tools must translate the declarative\nauthorization policy appearing in the application or module deployment \ndescriptor(s) into policy statements within the Policy providers used by the\ncontainers to which the components of the application or module are being \ndeployed.\nJACC\:SPEC\:75  When a call is made from a web resource to isUserInRole(String\nroleName) the implementation of this method must construct (or reuse) a \nWebRoleRefPermission object using the servlet-name of the calling web resource\nas the name and with actions equal to the roleName used in the call.\nJACC\:SPEC\:112  A reference WebRoleRefPermission implies an argument permission if all of the\nfollowing are true. \n- The argument permission is an instanceof WebRoleRefPermission.\n- The name of the argument permission is equivalent to the name of the reference \npermission.\n- The actions (i.e role reference) of the argument permission is equivalent to the \nactions (i.e role reference) of the reference permission.\nThe comparisons described above are case sensitive.\nJACC\:SPEC\:128  If the any authenticated user role-name, **, occurs in an auth-constraint, \n                            a WebResourcePermission must also be added to the ** role.\nJACC\:SPEC\:131  For each security-role defined in the deployment descriptor and the\n                            any uthenticated user role, **, an additional WebRoleRefPermission  \n                            must be added to the corresponding role by calling the addToRole method \n                            on the PolicyConfiguration object.
classname=com.sun.ts.tests.jacc.web.toolsContracts.Client
direction=forward
finder=cts
id=WebRoleRefPermission_from_standalone
keywords=all jacc javaee jacc_web WebRoleRefPermission standalone_vehicle forward
service_eetest=yes
testName=WebRoleRefPermission
testProps=\ log.file.location  webServerHost  webServerPort
test_directory=com/sun/ts/tests/jacc/web/toolsContracts

#-----environment-----
JAVA_HOME=/opt/jdk1.8.0_191/jre
SYSTEMROOT=${env.SystemRoot}
TS_HOME=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../..
bin.dir=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../bin
command.testExecute=com.sun.ts.lib.harness.ExecTSTestCmd CLASSPATH\=${ts.harness.classpath}\:${JAVA_HOME}/../lib/tools.jar DISPLAY\=${ts.display} HOME\="${user.home}" windir\=${windir} SYSTEMROOT\=${SYSTEMROOT} ${JAVA_HOME}/bin/java -Dcts.tmp\=$harness.temp.directory -Dlog.file.location\=${log.file.location} -Djava.security.policy\=${bin.dir}/harness.policy -Dcom.sun.aas.installRoot\=${jacc.home} -Djava.protocol.handler.pkgs\=javax.net.ssl -Djavax.net.ssl.keyStore\=${bin.dir}/certificates/clientcert.jks -Djavax.net.ssl.keyStorePassword\=changeit -Djavax.net.ssl.trustStore\=${jacc.home}/domains/domain1/config/cacerts.jks -Djava.ext.dirs\=${JAVA_HOME}/lib/ext -Ddeliverable.class\=${deliverable.class} $testExecuteClass $testExecuteArgs
database.classes=${jdbc.lib.class.path}/derbyclient.jar
deliverable.class=com.sun.ts.lib.deliverable.jacc.JACCDeliverable
harness.executeMode=0
harness.log.delayseconds=1
harness.log.port=2000
harness.log.traceflag=true
harness.socket.retry.count=10
harness.temp.directory=${ts.home}/tmp
jacc.classes=${ri.lib}/jakarta.authorization-api.jar\:${ri.lib}/jakarta.security.auth.message-api.jar\:${ri.lib}/common-util.jar\:${ri.lib}/container-common.jar\:${ri.lib}/jakarta.annotation-api.jar\:${ri.lib}/jakarta.resource-api.jar\:${ri.lib}/jmxremote_optional-repackaged.jar\:${ri.lib}/ldapbp-repackaged.jar\:${ri.lib}/security.jar\:${ri.lib}/web-core.jar\:${ri.lib}/web-glue.jar\:${ri.lib}/websecurity.jar\:${ri.lib}/jakarta.servlet-api.jar\:${ri.lib}/jakarta.ejb-api.jar\:${ri.lib}/jakarta.persistence.jar\:${ri.lib}/jakarta.transaction-api.jar\:${ri.lib}/jakarta.jms-api.jar\:${ri.lib}/jakarta.servlet.jsp-api.jar
jacc.home=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish
jacc.host=localhost
javaee.level=full
jdbc.lib.class.path=${jacc.home}/javadb/lib
lib.dir=${ts.home}/lib
log.file.location=${jacc.home}/domains/domain1/logs
porting.ts.url.class.1=com.sun.ts.lib.implementation.sun.common.SunRIURL
ri.lib=${jacc.home}/modules
ts.display=\:0.0
ts.harness.classpath=${lib.dir}/tsharness.jar\:${lib.dir}/sigtest.jar\:${lib.dir}/commons-logging-1.1.3.jar\:${lib.dir}/commons-httpclient-3.1.jar\:${ts.run.classpath}\:${lib.dir}/javatest.jar\:${ant.home}/lib/ant.jar
ts.home=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../..
ts.run.classpath=${ts.home}/classes\:${database.classes}\:${jacc.classes}
user.home=?
webServerHost=${jacc.host}
webServerPort=8080
windir=${env.windir}

#-----testresult-----
description=file\:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/src/com/sun/ts/tests/jacc/web/toolsContracts/Client.java\#WebRoleRefPermission_from_standalone
end=Tue Jul 21 15\:36\:27 UTC 2020
environment=ts_unix
execStatus=Failed. Test case throws exception\: WebRoleRefPermission failed\: addToRole policy statements verification failed
harnessLoaderMode=Classpath Loader
harnessVariety=Full Bundle
javatestOS=Linux 3.10.0-1062.12.1.el7.x86_64 (amd64)
javatestVersion=5.0
script=com.sun.ts.lib.harness.TSScript
sections=script_messages TestRun
start=Tue Jul 21 15\:36\:26 UTC 2020
test=com/sun/ts/tests/jacc/web/toolsContracts/Client.java\#WebRoleRefPermission_from_standalone
timeoutSeconds=600
totalTime=1547
work=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tckwork/authorization-tck/com/sun/ts/tests/jacc/web/toolsContracts

#section:script_messages
----------messages:(0/0)----------

#section:TestRun
----------messages:(1/3846)----------
command: com.sun.ts.lib.harness.ExecTSTestCmd CLASSPATH=:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/tsharness.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/sigtest.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/commons-logging-1.1.3.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/commons-httpclient-3.1.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../classes:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/javadb/lib/derbyclient.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.authorization-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.security.auth.message-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/common-util.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/container-common.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.annotation-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.resource-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jmxremote_optional-repackaged.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/ldapbp-repackaged.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/security.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/web-core.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/web-glue.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/websecurity.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.servlet-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.ejb-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.persistence.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.transaction-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.jms-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.servlet.jsp-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/javatest.jar:/lib/ant.jar:/opt/jdk1.8.0_191/jre/../lib/tools.jar DISPLAY=:0.0 HOME=? windir= SYSTEMROOT= /opt/jdk1.8.0_191/jre/bin/java -Dcts.tmp=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../tmp -Dlog.file.location=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/domains/domain1/logs -Djava.security.policy=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../bin/harness.policy -Dcom.sun.aas.installRoot=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish -Djava.protocol.handler.pkgs=javax.net.ssl -Djavax.net.ssl.keyStore=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../bin/certificates/clientcert.jks -Djavax.net.ssl.keyStorePassword=changeit -Djavax.net.ssl.trustStore=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/domains/domain1/config/cacerts.jks -Djava.ext.dirs=/opt/jdk1.8.0_191/jre/lib/ext -Ddeliverable.class=com.sun.ts.lib.deliverable.jacc.JACCDeliverable com.sun.ts.tests.common.vehicle.VehicleClient -p /home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../tmp/tstest.jte -t WebRoleRefPermission -vehicle standalone
----------log:(150/9304)----------
************************************************************
* props file set to "/tmp/?-cts-props.txt"
************************************************************
07-21-2020 15:36:26:  TRACE: #######  Value of harness.socket.retry.count is "10"
07-21-2020 15:36:26:  TRACE: #######  Value of harness.log.port is "2000"
07-21-2020 15:36:26:  TRACE: #######  Actual bind value of harness.log.port is "2000"
07-21-2020 15:36:26:  TRACE: in ServiceEETest.run() method
07-21-2020 15:36:26:  TRACE: Vehicle to be used for this test is:  standalone
07-21-2020 15:36:26:  TRACE: in custom vehicle so call on EETest.
07-21-2020 15:36:26:  TRACE: *** in EETest.run(argv,p)
07-21-2020 15:36:26:  TRACE: TESTCLASS=com.sun.ts.tests.jacc.web.toolsContracts.Client
07-21-2020 15:36:26:  TRACE: ** IN getRunMethod: testClass=com.sun.ts.tests.jacc.web.toolsContracts.Client
07-21-2020 15:36:26:  TRACE: ** IN getRunMethod: testname=WebRoleRefPermission
07-21-2020 15:36:26:  TRACE: ** GOT RUN METHOD!
07-21-2020 15:36:26:  TRACE: **runmethod=WebRoleRefPermission
07-21-2020 15:36:26:  TRACE: ABOUT TO GET SETUP METHOD!
07-21-2020 15:36:26:  TRACE: No setupMethod annotation present
07-21-2020 15:36:26:  TRACE: getSetupMethod - checking for testcase specific setup method:  WebRoleRefPermission_setup
07-21-2020 15:36:26:  TRACE: getSetupMethod - checking for default class specific setup method
07-21-2020 15:36:26:  TRACE: GOT SETUP METHOD!
07-21-2020 15:36:26:  TRACE: No cleanupMethod annotation present
07-21-2020 15:36:26:  TRACE: getCleanupMethod - checking for testcase specific cleanup method:  WebRoleRefPermission_cleanup
07-21-2020 15:36:26:  TRACE: getCleanupMethod - checking for default class specific cleanup method
07-21-2020 15:36:26:  TRACE: GOT CLEANUP METHOD!
07-21-2020 15:36:26:  TRACE: ABOUT TO INVOKE SETUP METHOD!
07-21-2020 15:36:26:  setting logFileLocation based on passed in Properties
07-21-2020 15:36:26:  log.file.location = /home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/domains/domain1/logs
07-21-2020 15:36:26:  Setup ok
Log File : /home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/domains/domain1/logs/JACCLog.txt does not exists
Check permissions for log file 
See User guide for Configuring log file permissions
07-21-2020 15:36:26:  TRACE: INVOKED SETUP METHOD!
07-21-2020 15:36:26:  TRACE: ABOUT TO INVOKE EETEST RUN METHOD!
07-21-2020 15:36:26:  Server generated addToRole WebRoleRefPermissions
07-21-2020 15:36:26:  verifying addToRole policy statments:
07-21-2020 15:36:26:  ERROR: The following permission doesn't match with server generated Permissions
07-21-2020 15:36:26:  ERROR: permissionName   = unchecked
07-21-2020 15:36:26:  ERROR: permissionAction = Manager
07-21-2020 15:36:26:  ERROR: 


07-21-2020 15:36:26:  ERROR: Print Expected Permissions :
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  1) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  1) permissionName   = unchecked
07-21-2020 15:36:26:  1) permissionAction = Manager
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  2) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  2) permissionName   = sslprotected
07-21-2020 15:36:26:  2) permissionAction = Employee
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  3) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  3) permissionName   = sslprotected
07-21-2020 15:36:26:  3) permissionAction = MGR
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  4) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  4) permissionName   = excluded
07-21-2020 15:36:26:  4) permissionAction = Manager
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  5) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  5) permissionName   = secured
07-21-2020 15:36:26:  5) permissionAction = Administrator
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  6) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  6) permissionName   = 
07-21-2020 15:36:26:  6) permissionAction = Employee
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  7) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  7) permissionName   = excluded
07-21-2020 15:36:26:  7) permissionAction = Employee
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  8) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  8) permissionName   = 
07-21-2020 15:36:26:  8) permissionAction = Manager
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  9) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  9) permissionName   = secured
07-21-2020 15:36:26:  9) permissionAction = ADM
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  10) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  10) permissionName   = secured
07-21-2020 15:36:26:  10) permissionAction = Employee
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  11) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  11) permissionName   = anyauthuser
07-21-2020 15:36:26:  11) permissionAction = Administrator
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  12) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  12) permissionName   = sslprotected
07-21-2020 15:36:26:  12) permissionAction = ADM
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  13) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  13) permissionName   = 
07-21-2020 15:36:26:  13) permissionAction = Administrator
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  14) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  14) permissionName   = sslprotected
07-21-2020 15:36:26:  14) permissionAction = Administrator
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  15) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  15) permissionName   = unchecked
07-21-2020 15:36:26:  15) permissionAction = Employee
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  16) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  16) permissionName   = excluded
07-21-2020 15:36:26:  16) permissionAction = Administrator
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  17) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  17) permissionName   = anyauthuser
07-21-2020 15:36:26:  17) permissionAction = Manager
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  18) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  18) permissionName   = secured
07-21-2020 15:36:26:  18) permissionAction = Manager
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  19) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  19) permissionName   = anyauthuser
07-21-2020 15:36:26:  19) permissionAction = Employee
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  20) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  20) permissionName   = sslprotected
07-21-2020 15:36:26:  20) permissionAction = Manager
07-21-2020 15:36:26:  -------------
07-21-2020 15:36:26:  21) permissionType   = jakarta.security.jacc.WebRoleRefPermission
07-21-2020 15:36:26:  21) permissionName   = unchecked
07-21-2020 15:36:26:  21) permissionAction = Administrator
07-21-2020 15:36:26:  ERROR: 


07-21-2020 15:36:26:  ERROR: Print Generated Permissions :
07-21-2020 15:36:26:  ERROR: WebRoleRefPermission failed: addToRole policy statements verification failed
07-21-2020 15:36:26:  ERROR: Test case throws exception: WebRoleRefPermission failed: addToRole policy statements verification failed
07-21-2020 15:36:26:  ERROR: Exception at:  
07-21-2020 15:36:26:  ERROR: com.sun.ts.lib.harness.EETest$Fault: WebRoleRefPermission failed: addToRole policy statements verification failed
	at com.sun.ts.tests.jacc.web.toolsContracts.Client.WebRoleRefPermission(Client.java:308)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:498)
	at com.sun.ts.lib.harness.EETest.run(EETest.java:596)
	at com.sun.ts.lib.harness.ServiceEETest.run(ServiceEETest.java:115)
	at com.sun.ts.tests.common.vehicle.EmptyVehicleRunner.run(EmptyVehicleRunner.java:40)
	at com.sun.ts.lib.harness.ServiceEETest.run(ServiceEETest.java:105)
	at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
	at com.sun.ts.lib.harness.ServiceEETest.run(ServiceEETest.java:209)
	at com.sun.ts.lib.harness.EETest.run(EETest.java:285)
	at com.sun.ts.tests.common.vehicle.VehicleClient.main(VehicleClient.java:38)

07-21-2020 15:36:27:  TRACE: SLEPT FOR:  1000
STATUS:Failed.Test case throws exception: WebRoleRefPermission failed: addToRole policy statements verification failed
result: Failed. Test case throws exception: WebRoleRefPermission failed: addToRole policy statements verification failed


test result: Failed. Test case throws exception: WebRoleRefPermission failed: addToRole policy statements verification failed