Skip to content

Failed

com.sun.ts.tests.jacc.ejb.mr.Client.EjbIsAuthz_from_ejblitesecuredjsp (from authorization-tck)

Failing for the past 1 build (Since #96 )
Took 1 sec.

Error Message

test result: Failed.

Stacktrace

test result: Failed.

Standard Output

#Test Results (version 2)
#Thu Oct 08 19:23:49 UTC 2020
#-----testdescription-----
$file=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/src/com/sun/ts/tests/jacc/ejb/mr/Client.java
$root=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/src
assertion_ids=EJB\:SPEC\:827  The general security enforcement requirements for the EJB\n     Container follow\:   \n     \n\t  The EJB Container must provide enforcement of the client access \n\t  control per the policy defined by the Deployer.  A caller is allowed\n\t  to invoke a method if, and only if, the method is specified as unchecked \n\t  or the caller is assigned at least one of the security roles that includes\n\t  the method in its method permissions definition.  (That is, it is not meant that the \n\t  caller must be assigned all the roles associated with the method.)  If\n\t  the Container denies a client access to a business method, the \n\t  Container must throw the java.rmi.RemoteException (or its subclass,\n\t  the java.rmi.AccessException) to the client if the client is a remote \n\t  client, or the jakarta.ejb.EJBException (or its subclass, the\n\t  jakarta.ejb.AccessLocalExcep-tion) if the client is a local client. \n\n\t  The EJB Container must isolate an enterprise bean instance from other\n\t  instances and other application components running on the server.  The \n\t  EJB Container must ensure that other enter-prise bean instance s and\n\t  other application components are allowed to access an enterprise bean \n\t  only via the enterprise bean s component, home, and/or web service\n\t  endpoint interfaces. \n\n\n\t  The EJB Container must isolate an enterprise bean instance at runtime\n\t  such that the instance does not gain unauthorized access to privileged \n\t  system information.  Such information includes the internal\n\t  implementation classes of the container, the various runtime state and \n\t  context maintained by the container, object references of other\n\t  enterprise bean instances, or resource managers used by other \n\t  enterprise bean instances.  The EJB Container must ensure that the\n\t  interactions between the enterprise beans and the container are only \n\t  through the EJB archi-tected interfaces.\n\n\t  The EJB Container must ensure the security of the persistent state of \n\t  the enterprise beans.  " The EJB Container must manage the mapping of\n\t  principals on calls to other enterprise beans or on access to resource \n\t  managers according to the security policy defined by the Deployer.\n\n\t  The Container must allow the same enterprise bean to be deployed \n\t  independently multiple times, each time with a different security\n\t  policy .  The Contain er must allow multiple- deployed enterprise\n\t  beans to co-exist at runtime.\nJACC\:SPEC\:103  A container must determine if the caller has been granted a permission by\nevaluating the permission in the context of an AccessControlContext, \nProtectionDomain, or Subject containing the principals of (only) the caller. If the\ncaller's identity has been asserted or vouched for by a trusted authority (other than \nthe caller), the principals of the authority must not be included in the principals of\nthe caller.A container must use one of the following techniques to determine if a \npermission has been granted to the caller.\n\nThe container calls AccessControlContext.checkPermission with \nthe permission as argument. The call to checkPermission must be made on\nan AccessControlContext that contains the principals of the caller. If \ncheckPermission throws an AccessControlException, the permission is not\ngranted to the caller. Otherwise the permission is granted. \n\nThe container calls AccessController.checkPermission with the \npermission as argument. The AccessControlContext associated with the thread\non which the call to checkPermission is made must contain the principals \nof the caller. If checkPermission throws an AccessControlException, the\npermission is not granted to the caller. Otherwise the permission is granted. \n\nThe container calls SecurityManager.checkPermission with the\npermission as argument. The AccessControlContext associated with the thread \non which the call to checkPermission is made must contain the principals\nof the caller. If checkPermission throws an AccessControlException, the \npermission is not granted to the caller. Otherwise the permission is granted.\n\nThe container calls Policy.implies with two arguments; the \npermission being checked and a ProtectionDomain constructed with the\nprincipals of the caller. The boolean result returned by Policy.implies \nindicates whether or not the permission has been granted to the caller.\n\nThe container calls \njava.security.Policy.getPermissions with an argument\nProtectionDomain that was constructed with the principals of the caller. The \ncontainer must call the implies method on the returned\nPermissionCollection using the permission being checked as argument. If the \nPermissionCollection implies the permission being tested, the permission has\nbeen granted to the caller. Otherwise it has not. This technique is supported but \nnot recommended.
classname=com.sun.ts.tests.jacc.ejb.mr.Client
direction=forward
finder=cts
id=EjbIsAuthz_from_ejblitesecuredjsp
keywords=all jacc javaee jacc_ejb EjbIsAuthz ejblitesecuredjsp_vehicle forward
service_eetest=yes
testName=EjbIsAuthz
testProps=\ user  password  authuser
test_directory=com/sun/ts/tests/jacc/ejb/mr

#-----environment-----
JAVA_HOME=/opt/jdk1.8.0_191/jre
SYSTEMROOT=${env.SystemRoot}
TS_HOME=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../..
authuser=javajoe
bin.dir=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../bin
command.testExecute=com.sun.ts.lib.harness.ExecTSTestCmd CLASSPATH\=${ts.harness.classpath}\:${JAVA_HOME}/../lib/tools.jar DISPLAY\=${ts.display} HOME\="${user.home}" windir\=${windir} SYSTEMROOT\=${SYSTEMROOT} ${JAVA_HOME}/bin/java -Dcts.tmp\=$harness.temp.directory -Dlog.file.location\=${log.file.location} -Djava.security.policy\=${bin.dir}/harness.policy -Dcom.sun.aas.installRoot\=${jacc.home} -Djava.protocol.handler.pkgs\=javax.net.ssl -Djavax.net.ssl.keyStore\=${bin.dir}/certificates/clientcert.jks -Djavax.net.ssl.keyStorePassword\=changeit -Djavax.net.ssl.trustStore\=${jacc.home}/domains/domain1/config/cacerts.jks -Djava.ext.dirs\=${JAVA_HOME}/lib/ext -Ddeliverable.class\=${deliverable.class} $testExecuteClass $testExecuteArgs
database.classes=${jdbc.lib.class.path}/derbyclient.jar
deliverable.class=com.sun.ts.lib.deliverable.jacc.JACCDeliverable
harness.executeMode=0
harness.log.delayseconds=1
harness.log.port=2000
harness.log.traceflag=true
harness.socket.retry.count=10
harness.temp.directory=${ts.home}/tmp
jacc.classes=${ri.lib}/jakarta.authorization-api.jar\:${ri.lib}/jakarta.security.auth.message-api.jar\:${ri.lib}/common-util.jar\:${ri.lib}/container-common.jar\:${ri.lib}/jakarta.annotation-api.jar\:${ri.lib}/jakarta.resource-api.jar\:${ri.lib}/jmxremote_optional-repackaged.jar\:${ri.lib}/ldapbp-repackaged.jar\:${ri.lib}/security.jar\:${ri.lib}/web-core.jar\:${ri.lib}/web-glue.jar\:${ri.lib}/websecurity.jar\:${ri.lib}/jakarta.servlet-api.jar\:${ri.lib}/jakarta.ejb-api.jar\:${ri.lib}/jakarta.persistence.jar\:${ri.lib}/jakarta.transaction-api.jar\:${ri.lib}/jakarta.jms-api.jar\:${ri.lib}/jakarta.servlet.jsp-api.jar
jacc.home=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish
jacc.host=localhost
javaee.level=full
jdbc.lib.class.path=${jacc.home}/javadb/lib
lib.dir=${ts.home}/lib
log.file.location=${jacc.home}/domains/domain1/logs
password=j2ee
porting.ts.url.class.1=com.sun.ts.lib.implementation.sun.common.SunRIURL
ri.lib=${jacc.home}/modules
ts.display=\:0.0
ts.harness.classpath=${lib.dir}/tsharness.jar\:${lib.dir}/sigtest.jar\:${lib.dir}/commons-logging-1.1.3.jar\:${lib.dir}/commons-httpclient-3.1.jar\:${ts.run.classpath}\:${lib.dir}/javatest.jar\:${ant.home}/lib/ant.jar
ts.home=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../..
ts.run.classpath=${ts.home}/classes\:${database.classes}\:${jacc.classes}
user=j2ee
user.home=?
webServerHost=${jacc.host}
webServerPort=8080
windir=${env.windir}

#-----testresult-----
description=file\:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/src/com/sun/ts/tests/jacc/ejb/mr/Client.java\#EjbIsAuthz_from_ejblitesecuredjsp
end=Thu Oct 08 19\:23\:49 UTC 2020
environment=ts_unix
execStatus=Failed.
harnessLoaderMode=Classpath Loader
harnessVariety=Full Bundle
javatestOS=Linux 3.10.0-1062.12.1.el7.x86_64 (amd64)
javatestVersion=5.0
script=com.sun.ts.lib.harness.TSScript
sections=script_messages TestRun
start=Thu Oct 08 19\:23\:48 UTC 2020
test=com/sun/ts/tests/jacc/ejb/mr/Client.java\#EjbIsAuthz_from_ejblitesecuredjsp
timeoutSeconds=600
totalTime=1579
work=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tckwork/authorization-tck/com/sun/ts/tests/jacc/ejb/mr

#section:script_messages
----------messages:(0/0)----------

#section:TestRun
----------messages:(1/3843)----------
command: com.sun.ts.lib.harness.ExecTSTestCmd CLASSPATH=:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/tsharness.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/sigtest.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/commons-logging-1.1.3.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/commons-httpclient-3.1.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../classes:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/javadb/lib/derbyclient.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.authorization-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.security.auth.message-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/common-util.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/container-common.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.annotation-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.resource-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jmxremote_optional-repackaged.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/ldapbp-repackaged.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/security.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/web-core.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/web-glue.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/websecurity.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.servlet-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.ejb-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.persistence.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.transaction-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.jms-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/modules/jakarta.servlet.jsp-api.jar:/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../lib/javatest.jar:/lib/ant.jar:/opt/jdk1.8.0_191/jre/../lib/tools.jar DISPLAY=:0.0 HOME=? windir= SYSTEMROOT= /opt/jdk1.8.0_191/jre/bin/java -Dcts.tmp=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../tmp -Dlog.file.location=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/domains/domain1/logs -Djava.security.policy=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../bin/harness.policy -Dcom.sun.aas.installRoot=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish -Djava.protocol.handler.pkgs=javax.net.ssl -Djavax.net.ssl.keyStore=/home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../bin/certificates/clientcert.jks -Djavax.net.ssl.keyStorePassword=changeit -Djavax.net.ssl.trustStore=/home/jenkins/agent/workspace/jakartaee-tck_master/glassfish6/glassfish/domains/domain1/config/cacerts.jks -Djava.ext.dirs=/opt/jdk1.8.0_191/jre/lib/ext -Ddeliverable.class=com.sun.ts.lib.deliverable.jacc.JACCDeliverable com.sun.ts.tests.common.vehicle.VehicleClient -p /home/jenkins/agent/workspace/jakartaee-tck_master/authorization-tck/bin/xml/../../tmp/tstest.jte -t EjbIsAuthz -vehicle ejblitesecuredjsp
----------log:(37/2592)----------
************************************************************
* props file set to "/tmp/?-cts-props.txt"
************************************************************
10-08-2020 19:23:48:  TRACE: #######  Value of harness.socket.retry.count is "10"
10-08-2020 19:23:48:  TRACE: #######  Value of harness.log.port is "2000"
10-08-2020 19:23:48:  TRACE: #######  Actual bind value of harness.log.port is "2000"
10-08-2020 19:23:48:  TRACE: in ServiceEETest.run() method
10-08-2020 19:23:48:  TRACE: Vehicle to be used for this test is:  ejblitesecuredjsp
Oct 08, 2020 7:23:48 PM com.sun.ts.tests.common.vehicle.ejbliteshare.EJBLiteSecuredWebVehicleRunner run
INFO: Connecting http://localhost:8080/jacc_ejb_mr_ejblitesecuredjsp_vehicle_web/ejblitesecuredjsp_vehicle.jsp?testName=EjbIsAuthz
Failed to connect to the test webapp.java.net.ConnectException: Connection refused (Connection refused)
	at java.net.PlainSocketImpl.socketConnect(Native Method)
	at java.net.AbstractPlainSocketImpl.doConnect(AbstractPlainSocketImpl.java:350)
	at java.net.AbstractPlainSocketImpl.connectToAddress(AbstractPlainSocketImpl.java:206)
	at java.net.AbstractPlainSocketImpl.connect(AbstractPlainSocketImpl.java:188)
	at java.net.SocksSocketImpl.connect(SocksSocketImpl.java:392)
	at java.net.Socket.connect(Socket.java:589)
	at java.net.Socket.connect(Socket.java:538)
	at sun.net.NetworkClient.doConnect(NetworkClient.java:180)
	at sun.net.www.http.HttpClient.openServer(HttpClient.java:463)
	at sun.net.www.http.HttpClient.openServer(HttpClient.java:558)
	at sun.net.www.http.HttpClient.<init>(HttpClient.java:242)
	at sun.net.www.http.HttpClient.New(HttpClient.java:339)
	at sun.net.www.http.HttpClient.New(HttpClient.java:357)
	at sun.net.www.protocol.http.HttpURLConnection.getNewHttpClient(HttpURLConnection.java:1220)
	at sun.net.www.protocol.http.HttpURLConnection.plainConnect0(HttpURLConnection.java:1156)
	at sun.net.www.protocol.http.HttpURLConnection.plainConnect(HttpURLConnection.java:1050)
	at sun.net.www.protocol.http.HttpURLConnection.connect(HttpURLConnection.java:984)
	at com.sun.ts.tests.common.vehicle.ejbliteshare.EJBLiteSecuredWebVehicleRunner.run(EJBLiteSecuredWebVehicleRunner.java:75)
	at com.sun.ts.lib.harness.ServiceEETest.run(ServiceEETest.java:105)
	at com.sun.ts.lib.harness.EETest.getPropsReady(EETest.java:486)
	at com.sun.ts.lib.harness.ServiceEETest.run(ServiceEETest.java:209)
	at com.sun.ts.lib.harness.EETest.run(EETest.java:285)
	at com.sun.ts.tests.common.vehicle.VehicleClient.main(VehicleClient.java:38)

10-08-2020 19:23:49:  TRACE: SLEPT FOR:  1000
STATUS:Failed.
result: Failed.


test result: Failed.