diff --git a/tests/integration-tests/src/test/java/org/apache/activemq/artemis/tests/integration/security/SecurityTest.java b/tests/integration-tests/src/test/java/org/apache/activemq/artemis/tests/integration/security/SecurityTest.java index 3f814e4f90..6ff547b5b1 100644 --- a/tests/integration-tests/src/test/java/org/apache/activemq/artemis/tests/integration/security/SecurityTest.java +++ b/tests/integration-tests/src/test/java/org/apache/activemq/artemis/tests/integration/security/SecurityTest.java @@ -307,7 +307,7 @@ public class SecurityTest extends ActiveMQTestBase { session.createQueue(ADDRESS, DURABLE_QUEUE, true); Assert.fail("should throw exception here"); } catch (ActiveMQException e) { - // ignore + assertTrue(e.getMessage().contains("User: first does not have permission='CREATE_DURABLE_QUEUE' for queue durableQueue on address address")); } // DELETE_DURABLE_QUEUE @@ -315,7 +315,7 @@ public class SecurityTest extends ActiveMQTestBase { session.deleteQueue(DURABLE_QUEUE); Assert.fail("should throw exception here"); } catch (ActiveMQException e) { - // ignore + assertTrue(e.getMessage().contains("User: first does not have permission='DELETE_DURABLE_QUEUE' for queue durableQueue on address address")); } // CREATE_NON_DURABLE_QUEUE @@ -323,7 +323,7 @@ public class SecurityTest extends ActiveMQTestBase { session.createQueue(ADDRESS, NON_DURABLE_QUEUE, false); Assert.fail("should throw exception here"); } catch (ActiveMQException e) { - // ignore + assertTrue(e.getMessage().contains("User: first does not have permission='CREATE_NON_DURABLE_QUEUE' for queue nonDurableQueue on address address")); } // DELETE_NON_DURABLE_QUEUE @@ -331,7 +331,7 @@ public class SecurityTest extends ActiveMQTestBase { session.deleteQueue(NON_DURABLE_QUEUE); Assert.fail("should throw exception here"); } catch (ActiveMQException e) { - // ignore + assertTrue(e.getMessage().contains("User: first does not have permission='DELETE_NON_DURABLE_QUEUE' for queue nonDurableQueue on address address")); } // PRODUCE @@ -340,7 +340,7 @@ public class SecurityTest extends ActiveMQTestBase { producer.send(session.createMessage(true)); Assert.fail("should throw exception here"); } catch (ActiveMQException e) { - // ignore + assertTrue(e.getMessage().contains("User: first does not have permission='SEND' on address address")); } // CONSUME @@ -348,7 +348,7 @@ public class SecurityTest extends ActiveMQTestBase { ClientConsumer consumer = session.createConsumer(DURABLE_QUEUE); Assert.fail("should throw exception here"); } catch (ActiveMQException e) { - // ignore + assertTrue(e.getMessage().contains("User: first does not have permission='CONSUME' for queue durableQueue on address address")); } // MANAGE @@ -357,7 +357,7 @@ public class SecurityTest extends ActiveMQTestBase { producer.send(session.createMessage(true)); Assert.fail("should throw exception here"); } catch (ActiveMQException e) { - // ignore + assertTrue(e.getMessage().contains("User: first does not have permission='MANAGE' on address activemq.management")); } // BROWSE @@ -365,7 +365,7 @@ public class SecurityTest extends ActiveMQTestBase { ClientConsumer browser = session.createConsumer(DURABLE_QUEUE, true); Assert.fail("should throw exception here"); } catch (ActiveMQException e) { - // ignore + assertTrue(e.getMessage().contains("User: first does not have permission='BROWSE' for queue durableQueue on address address")); } }