Regression
com.sun.ts.tests.jacc.web.toolsContracts.Client.WebUserDataPermission_from_standalone (from authorization-tck)
Error Message
test result: Failed. Test case throws exception: WebUserDataPermission failed: unchecked policy statements verification failed
Stacktrace
test result: Failed. Test case throws exception: WebUserDataPermission failed: unchecked policy statements verification failed
Standard Output
#Test Results (version 2) #Tue Aug 18 05:33:16 UTC 2020 #-----testdescription----- $file=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/src/com/sun/ts/tests/jacc/web/toolsContracts/Client.java $root=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/src assertion_ids=JACC\:JAVADOC\:54 Creates a new WebRoleRefPermission with the specified name and actions.\nJACC\:JAVADOC\:56 Checks two WebUserDataPermission objects for equality. \n\t\t\t\t\t\t\t WebUserDataPermission objects are equivalent if they have case equivalent name and actions values. Two Permission objects, P1 and P2, are equivalent if and only if P1.implies(P2) AND P2.implies(P1).\nJACC\:JAVADOC\:58 Returns the hash code value for this WebUserDataPermission. \n\t\t\t\t\t\t\t The properties of the returned hash code must be as follows\: During the lifetime of an Java application, the hashCode method shall return the same integer value every time it is called on a WebUserDataPermission object. The value returned by hashCode for a particular EJBMethod permission need not remain consistent from one execution of an application to another. If two WebUserDataPermission objects are equal according to the equals method, then calling the hashCode method on each of the two Permission objects must produce the same integer result (within an application).\nJACC\:SPEC\:27 The declarative authorization policy statements derived from application or\nmodule deployment descriptor(s) must be translated to create instances of the \ncorresponding jakarta.security.jacc Permission classes.\nJACC\:SPEC\:28 Methods of the PolicyConfiguration interface must be used with the\npermissions resulting from the translation to create policy statements within the \nPolicyConfiguration objects.\nJACC\:SPEC\:34 A WebResourcePermission and a WebUserDataPermission object must be\ninstantiated for each distinct url-pattern occurring in the securityconstraint \nelements that contain an auth-constraint naming no roles (i.e\nan excluding auth-constraint). The permissions must be constructed using \nthe qualified (as defined in Qualified URL Pattern Names) pattern as their name\nand with actions defined by the union of the HTTP methods named or implied \nby all of the collections containing the pattern and occurring in a constraint with\nan excluding auth-constraint. The constructed permissions must be added to \nthe excluded policy statements by calling the addToExcludedPolicy method\non the PolicyConfiguration object.\nJACC\:SPEC\:41 A WebUserDataPermission must be instantiated for each distinct combination\nof url-pattern and acceptable connection type resulting from the processing \nof the security-constraint elements that do not contain an excluding\nauth-constraint. The mapping of security-constraint to acceptable \nconnection type must be as defined in Mapping Transport Guarantee to Connection\nType. Each WebUserDataPermission object must be constructed using the \nqualified pattern as its name and with actions defined by appending a\nrepresentation of the acceptable connection type to the union of the HTTP \nmethods named or implied by the collections containing the pattern and occurring\nin a security-constraint that maps to the connection type and that does not \ncontain an excluding auth-constraint. The resulting permissions must be\nadded to the unchecked policy statements by calling the \naddToUncheckedPolicy method on the PolicyConfiguration object.\nJACC\:SPEC\:42 A transport-guarantee (in a user-data-constraint) of NONE, or a\nsecurity-constraint without a user-data-constraint, indicates that \nthe associated URL patterns and HTTP methods may be accessed over any\n(including an unprotected) transport. A transport-guarantee of \nINTEGRAL indicates that acceptable connections are those deemed by the\ncontainer to be integrity protected. A transport-guarantee of \nCONFIDENTIAL indicates that acceptable connections are those deemed by the\ncontainer to be protected for confidentiality.\nJACC\:SPEC\:52 The application server's deployment tools must translate the declarative\nauthorization policy appearing in the application or module deployment \ndescriptor(s) into policy statements within the Policy providers used by the\ncontainers to which the components of the application or module are being \ndeployed. classname=com.sun.ts.tests.jacc.web.toolsContracts.Client direction=forward finder=cts id=WebUserDataPermission_from_standalone keywords=all jacc javaee jacc_web WebUserDataPermission standalone_vehicle forward service_eetest=yes testName=WebUserDataPermission testProps=\ log.file.location webServerHost webServerPort test_directory=com/sun/ts/tests/jacc/web/toolsContracts #-----environment----- JAVA_HOME=/opt/jdk1.8.0_191/jre SYSTEMROOT=${env.SystemRoot} TS_HOME=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../.. bin.dir=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../bin command.testExecute=com.sun.ts.lib.harness.ExecTSTestCmd CLASSPATH\=${ts.harness.classpath}\:${JAVA_HOME}/../lib/tools.jar DISPLAY\=${ts.display} HOME\="${user.home}" windir\=${windir} SYSTEMROOT\=${SYSTEMROOT} ${JAVA_HOME}/bin/java -Dcts.tmp\=$harness.temp.directory -Dlog.file.location\=${log.file.location} -Djava.security.policy\=${bin.dir}/harness.policy -Dcom.sun.aas.installRoot\=${jacc.home} -Djava.protocol.handler.pkgs\=javax.net.ssl -Djavax.net.ssl.keyStore\=${bin.dir}/certificates/clientcert.jks -Djavax.net.ssl.keyStorePassword\=changeit -Djavax.net.ssl.trustStore\=${jacc.home}/domains/domain1/config/cacerts.jks -Djava.ext.dirs\=${JAVA_HOME}/lib/ext -Ddeliverable.class\=${deliverable.class} $testExecuteClass $testExecuteArgs database.classes=${jdbc.lib.class.path}/derbyclient.jar deliverable.class=com.sun.ts.lib.deliverable.jacc.JACCDeliverable harness.executeMode=0 harness.log.delayseconds=1 harness.log.port=2000 harness.log.traceflag=true harness.socket.retry.count=10 harness.temp.directory=${ts.home}/tmp jacc.classes=${ri.lib}/jakarta.authorization-api.jar\:${ri.lib}/jakarta.security.auth.message-api.jar\:${ri.lib}/common-util.jar\:${ri.lib}/container-common.jar\:${ri.lib}/jakarta.annotation-api.jar\:${ri.lib}/jakarta.resource-api.jar\:${ri.lib}/jmxremote_optional-repackaged.jar\:${ri.lib}/ldapbp-repackaged.jar\:${ri.lib}/security.jar\:${ri.lib}/web-core.jar\:${ri.lib}/web-glue.jar\:${ri.lib}/websecurity.jar\:${ri.lib}/jakarta.servlet-api.jar\:${ri.lib}/jakarta.ejb-api.jar\:${ri.lib}/jakarta.persistence.jar\:${ri.lib}/jakarta.transaction-api.jar\:${ri.lib}/jakarta.jms-api.jar\:${ri.lib}/jakarta.servlet.jsp-api.jar jacc.home=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish jacc.host=localhost javaee.level=full jdbc.lib.class.path=${jacc.home}/javadb/lib lib.dir=${ts.home}/lib log.file.location=${jacc.home}/domains/domain1/logs porting.ts.url.class.1=com.sun.ts.lib.implementation.sun.common.SunRIURL ri.lib=${jacc.home}/modules ts.display=\:0.0 ts.harness.classpath=${lib.dir}/tsharness.jar\:${lib.dir}/sigtest.jar\:${lib.dir}/commons-logging-1.1.3.jar\:${lib.dir}/commons-httpclient-3.1.jar\:${ts.run.classpath}\:${lib.dir}/javatest.jar\:${ant.home}/lib/ant.jar ts.home=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../.. ts.run.classpath=${ts.home}/classes\:${database.classes}\:${jacc.classes} user.home=? webServerHost=${jacc.host} webServerPort=8080 windir=${env.windir} #-----testresult----- description=file\:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/src/com/sun/ts/tests/jacc/web/toolsContracts/Client.java\#WebUserDataPermission_from_standalone end=Tue Aug 18 05\:33\:16 UTC 2020 environment=ts_unix execStatus=Failed. Test case throws exception\: WebUserDataPermission failed\: unchecked policy statements verification failed harnessLoaderMode=Classpath Loader harnessVariety=Full Bundle javatestOS=Linux 3.10.0-1062.12.1.el7.x86_64 (amd64) javatestVersion=5.0 script=com.sun.ts.lib.harness.TSScript sections=script_messages TestRun start=Tue Aug 18 05\:33\:14 UTC 2020 test=com/sun/ts/tests/jacc/web/toolsContracts/Client.java\#WebUserDataPermission_from_standalone timeoutSeconds=600 totalTime=1552 work=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tckwork/authorization-tck/com/sun/ts/tests/jacc/web/toolsContracts #section:script_messages ----------messages:(0/0)---------- #section:TestRun ----------messages:(1/3847)---------- command: com.sun.ts.lib.harness.ExecTSTestCmd CLASSPATH=:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/tsharness.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/sigtest.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/commons-logging-1.1.3.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/commons-httpclient-3.1.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../classes:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/javadb/lib/derbyclient.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.authorization-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.security.auth.message-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/common-util.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/container-common.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.annotation-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.resource-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jmxremote_optional-repackaged.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/ldapbp-repackaged.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/security.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/web-core.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/web-glue.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/websecurity.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.servlet-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.ejb-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.persistence.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.transaction-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.jms-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.servlet.jsp-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/javatest.jar:/lib/ant.jar:/opt/jdk1.8.0_191/jre/../lib/tools.jar DISPLAY=:0.0 HOME=? windir= SYSTEMROOT= /opt/jdk1.8.0_191/jre/bin/java -Dcts.tmp=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../tmp -Dlog.file.location=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/domains/domain1/logs -Djava.security.policy=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../bin/harness.policy -Dcom.sun.aas.installRoot=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish -Djava.protocol.handler.pkgs=javax.net.ssl -Djavax.net.ssl.keyStore=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../bin/certificates/clientcert.jks -Djavax.net.ssl.keyStorePassword=changeit -Djavax.net.ssl.trustStore=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/domains/domain1/config/cacerts.jks -Djava.ext.dirs=/opt/jdk1.8.0_191/jre/lib/ext -Ddeliverable.class=com.sun.ts.lib.deliverable.jacc.JACCDeliverable com.sun.ts.tests.common.vehicle.VehicleClient -p /home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../tmp/tstest.jte -t WebUserDataPermission -vehicle standalone ----------log:(94/6187)---------- ************************************************************ * props file set to "/tmp/?-cts-props.txt" ************************************************************ 08-18-2020 05:33:14: TRACE: ####### Value of harness.socket.retry.count is "10" 08-18-2020 05:33:14: TRACE: ####### Value of harness.log.port is "2000" 08-18-2020 05:33:14: TRACE: ####### Actual bind value of harness.log.port is "2000" 08-18-2020 05:33:14: TRACE: in ServiceEETest.run() method 08-18-2020 05:33:14: TRACE: Vehicle to be used for this test is: standalone 08-18-2020 05:33:14: TRACE: in custom vehicle so call on EETest. 08-18-2020 05:33:14: TRACE: *** in EETest.run(argv,p) 08-18-2020 05:33:14: TRACE: TESTCLASS=com.sun.ts.tests.jacc.web.toolsContracts.Client 08-18-2020 05:33:14: TRACE: ** IN getRunMethod: testClass=com.sun.ts.tests.jacc.web.toolsContracts.Client 08-18-2020 05:33:14: TRACE: ** IN getRunMethod: testname=WebUserDataPermission 08-18-2020 05:33:14: TRACE: ** GOT RUN METHOD! 08-18-2020 05:33:14: TRACE: **runmethod=WebUserDataPermission 08-18-2020 05:33:14: TRACE: ABOUT TO GET SETUP METHOD! 08-18-2020 05:33:14: TRACE: No setupMethod annotation present 08-18-2020 05:33:14: TRACE: getSetupMethod - checking for testcase specific setup method: WebUserDataPermission_setup 08-18-2020 05:33:14: TRACE: getSetupMethod - checking for default class specific setup method 08-18-2020 05:33:14: TRACE: GOT SETUP METHOD! 08-18-2020 05:33:14: TRACE: No cleanupMethod annotation present 08-18-2020 05:33:14: TRACE: getCleanupMethod - checking for testcase specific cleanup method: WebUserDataPermission_cleanup 08-18-2020 05:33:14: TRACE: getCleanupMethod - checking for default class specific cleanup method 08-18-2020 05:33:14: TRACE: GOT CLEANUP METHOD! 08-18-2020 05:33:14: TRACE: ABOUT TO INVOKE SETUP METHOD! 08-18-2020 05:33:15: setting logFileLocation based on passed in Properties 08-18-2020 05:33:15: log.file.location = /home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/domains/domain1/logs 08-18-2020 05:33:15: Setup ok Log File : /home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/domains/domain1/logs/JACCLog.txt does not exists Check permissions for log file See User guide for Configuring log file permissions 08-18-2020 05:33:15: TRACE: INVOKED SETUP METHOD! 08-18-2020 05:33:15: TRACE: ABOUT TO INVOKE EETEST RUN METHOD! 08-18-2020 05:33:15: Server generated unchecked WebUserDataPermissions 08-18-2020 05:33:15: verifying unchecked policy statments: 08-18-2020 05:33:15: ERROR: The following permission doesn't match with server generated Permissions 08-18-2020 05:33:15: ERROR: permissionName = /excluded.jsp 08-18-2020 05:33:15: ERROR: permissionAction = !GET,POST 08-18-2020 05:33:15: ERROR: 08-18-2020 05:33:15: ERROR: Print Expected Permissions : 08-18-2020 05:33:15: ------------- 08-18-2020 05:33:15: 1) permissionType = jakarta.security.jacc.WebUserDataPermission 08-18-2020 05:33:15: 1) permissionName = /excluded.jsp 08-18-2020 05:33:15: 1) permissionAction = !GET,POST 08-18-2020 05:33:15: ------------- 08-18-2020 05:33:15: 2) permissionType = jakarta.security.jacc.WebUserDataPermission 08-18-2020 05:33:15: 2) permissionName = /:/unchecked.jsp:/secured.jsp:/sslprotected.jsp:/excluded.jsp:/anyauthuser.jsp 08-18-2020 05:33:15: 2) permissionAction = null 08-18-2020 05:33:15: ------------- 08-18-2020 05:33:15: 3) permissionType = jakarta.security.jacc.WebUserDataPermission 08-18-2020 05:33:15: 3) permissionName = /unchecked.jsp 08-18-2020 05:33:15: 3) permissionAction = null 08-18-2020 05:33:15: ------------- 08-18-2020 05:33:15: 4) permissionType = jakarta.security.jacc.WebUserDataPermission 08-18-2020 05:33:15: 4) permissionName = /anyauthuser.jsp 08-18-2020 05:33:15: 4) permissionAction = !GET,POST 08-18-2020 05:33:15: ------------- 08-18-2020 05:33:15: 5) permissionType = jakarta.security.jacc.WebUserDataPermission 08-18-2020 05:33:15: 5) permissionName = /sslprotected.jsp 08-18-2020 05:33:15: 5) permissionAction = GET,POST:CONFIDENTIAL 08-18-2020 05:33:15: ------------- 08-18-2020 05:33:15: 6) permissionType = jakarta.security.jacc.WebUserDataPermission 08-18-2020 05:33:15: 6) permissionName = /secured.jsp 08-18-2020 05:33:15: 6) permissionAction = null 08-18-2020 05:33:15: ------------- 08-18-2020 05:33:15: 7) permissionType = jakarta.security.jacc.WebUserDataPermission 08-18-2020 05:33:15: 7) permissionName = /sslprotected.jsp 08-18-2020 05:33:15: 7) permissionAction = !GET,POST 08-18-2020 05:33:15: ERROR: 08-18-2020 05:33:15: ERROR: Print Generated Permissions : 08-18-2020 05:33:15: ERROR: WebUserDataPermission failed: unchecked policy statements verification failed 08-18-2020 05:33:15: ERROR: Test case throws exception: WebUserDataPermission failed: unchecked policy statements verification failed 08-18-2020 05:33:15: ERROR: Exception at: 08-18-2020 05:33:15: ERROR: com.sun.ts.lib.harness.EETest$Fault: WebUserDataPermission failed: unchecked policy statements verification failed at com.sun.ts.tests.jacc.web.toolsContracts.Client.WebUserDataPermission(Client.java:548) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at com.sun.ts.lib.harness.EETest.run(EETest.java:596) at com.sun.ts.lib.harness.ServiceEETest.run(ServiceEETest.java:115) at com.sun.ts.tests.common.vehicle.EmptyVehicleRunner.run(EmptyVehicleRunner.java:40) at com.sun.ts.lib.harness.ServiceEETest.run(ServiceEETest.java:105) at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486) at com.sun.ts.lib.harness.ServiceEETest.run(ServiceEETest.java:209) at com.sun.ts.lib.harness.EETest.run(EETest.java:285) at com.sun.ts.tests.common.vehicle.VehicleClient.main(VehicleClient.java:38) 08-18-2020 05:33:16: TRACE: SLEPT FOR: 1000 STATUS:Failed.Test case throws exception: WebUserDataPermission failed: unchecked policy statements verification failed result: Failed. Test case throws exception: WebUserDataPermission failed: unchecked policy statements verification failed test result: Failed. Test case throws exception: WebUserDataPermission failed: unchecked policy statements verification failed