]]>
1
@@ -252,7 +252,7 @@
Use this step to define the variables for ACF2.
For more information about security system setup and it's variables, please open via right-click in new tab or window and refer to security documentation
- configure ACF2 security certificates.
+ configure ACF2 security certificates.
]]>1Security Administrator
@@ -367,7 +367,7 @@
This step will load signed client authentication certificate from the ${instance-output_dataset} into ESM
]]>1
@@ -452,7 +452,7 @@ DCDSN(${instance-output_dataset}) TRUST
This step will load signed client authentication certificate from the ${instance-output_dataset} into ESM
For more information about security system setup and it's variables, please open via right-click in new tab or window and refer to security documentation
- configure ACF2 security certificates.
+ configure ACF2 security certificates.
]]>1Security Administrator
From b98256b3429aedd7d95a99975bcb5690e908ea3b Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Mon, 9 Dec 2024 10:56:13 -0500
Subject: [PATCH 090/121] change node_home_pattern
Signed-off-by: MarkAckert
---
.../cicd_test/prep7_more_test_prep/06_process_outputs.sh | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/.github/scripts/cicd_test/prep7_more_test_prep/06_process_outputs.sh b/.github/scripts/cicd_test/prep7_more_test_prep/06_process_outputs.sh
index bce1d40594..a3865351c8 100644
--- a/.github/scripts/cicd_test/prep7_more_test_prep/06_process_outputs.sh
+++ b/.github/scripts/cicd_test/prep7_more_test_prep/06_process_outputs.sh
@@ -13,7 +13,7 @@
# Set outputs
echo ZOWE_ARTIFACTORY_FINAL=$ZOWE_ARTIFACTORY_FINAL >>$GITHUB_OUTPUT
echo ZOWE_ARTIFACTORY_FINAL_FILENAME=$ZOWE_ARTIFACTORY_FINAL_FILENAME >>$GITHUB_OUTPUT
-echo NODE_HOME_PATTERN=/ZOWE/node/node-$ZOS_NODE_VERSION-os390-s390x >>$GITHUB_OUTPUT
+echo NODE_HOME_PATTERN=/ZOWE/node/node-$ZOS_NODE_VERSION >>$GITHUB_OUTPUT
echo TEST_SERVER=$TEST_SERVER >>$GITHUB_OUTPUT
echo TEST_SERVER_NICKNAME=$TEST_SERVER_NICKNAME >>$GITHUB_OUTPUT
echo EXTENSION_LIST=$EXTENSION_LIST >>$GITHUB_OUTPUT
@@ -28,4 +28,4 @@ printf "Zowe CLI artifactory path: ${CYAN}$ZOWE_CLI_ARTIFACTORY_FINAL${NC}\n"
printf "Zowe extension list: ${CYAN}$EXTENSION_LIST${NC}\n"
printf "Test server: ${CYAN}$TEST_SERVER${NC}\n"
printf "Test server nickname: ${CYAN}$TEST_SERVER_NICKNAME${NC}\n"
-printf "Node home pattern on z/OS: ${CYAN}/ZOWE/node/node-$ZOS_NODE_VERSION-os390-s390x${NC}\n"
+printf "Node home pattern on z/OS: ${CYAN}/ZOWE/node/node-$ZOS_NODE_VERSION${NC}\n"
From 1323392789750fb6eb30d5617976f12d5ae7c041 Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Mon, 9 Dec 2024 16:21:13 -0500
Subject: [PATCH 091/121] add node-v22 tests and add them to extended suite
Signed-off-by: MarkAckert
---
.github/scripts/cicd_test/make_matrix.sh | 4 ++
.github/workflows/cicd-test.yml | 4 +-
.../extended/node-versions/node-v22.ts | 44 +++++++++++++++++++
3 files changed, 51 insertions(+), 1 deletion(-)
create mode 100644 tests/installation/src/__tests__/extended/node-versions/node-v22.ts
diff --git a/.github/scripts/cicd_test/make_matrix.sh b/.github/scripts/cicd_test/make_matrix.sh
index 0af3d8cd77..4aea7a10ae 100644
--- a/.github/scripts/cicd_test/make_matrix.sh
+++ b/.github/scripts/cicd_test/make_matrix.sh
@@ -36,6 +36,10 @@ case $install_test_choice in
test_file="$ZOS_NODE_V20_TESTFILE"
;;
+"z/OS node v22")
+ test_file="$ZOS_NODE_V22_TESTFILE"
+ ;;
+
"Non-strict Verify External Certificate")
test_file="$NON_STRICT_VERIFY_EXTERNAL_CERTIFICATE_TESTFILE"
;;
diff --git a/.github/workflows/cicd-test.yml b/.github/workflows/cicd-test.yml
index f6812623e6..84571eaab5 100644
--- a/.github/workflows/cicd-test.yml
+++ b/.github/workflows/cicd-test.yml
@@ -32,6 +32,7 @@ on:
- Extensions
- Keyring
- z/OS node v20
+ - z/OS node v22
- Non-strict Verify External Certificate
- Install PTF Twice
- VSAM Caching Storage Method
@@ -81,6 +82,7 @@ env:
EXTENSIONS_TESTFILE: basic/install-ext.ts
KEYRING_TESTFILE: extended/keyring.ts
ZOS_NODE_V20_TESTFILE: extended/node-versions/node-v20.ts
+ ZOS_NODE_V22_TESTFILE: extended/node-versions/node-v22.ts
NON_STRICT_VERIFY_EXTERNAL_CERTIFICATE_TESTFILE: extended/certificates/nonstrict-verify-external-certificate.ts
INSTALL_PTF_TWICE_TESTFILE: extended/install-ptf-two-times.ts
VSAM_CACHING_STORAGE_METHOD_TESTFILE: extended/caching-storages/vsam-storage.ts
@@ -88,7 +90,7 @@ env:
CONFIG_MANAGER_TESTFILE: extended/config-manager/enable-config-manager.ts
GENERAL_API_DOCUMENTATION_TESTFILE: basic/install-api-gen.ts
ZOWE_NIGHTLY_TESTS_FULL: basic/install.ts(all);basic/install-fmid.ts(all)
- ZOWE_RELEASE_TESTS_FULL: basic/install.ts(all);basic/install-fmid.ts(all);basic/install-ext.ts(any);extended/keyring.ts(all);extended/node-versions/node-v20.ts(zzow11):extended/certificates/nonstrict-verify-external-certificate.ts(any);extended/caching-storages/infinispan-storage.ts(any);extended/config-manager/enable-config-manager.ts(any)
+ ZOWE_RELEASE_TESTS_FULL: basic/install.ts(all);basic/install-fmid.ts(all);basic/install-ext.ts(any);extended/keyring.ts(all);extended/node-versions/node-v20.ts(any);extended/node-versions/node-v22.ts(any);extended/certificates/nonstrict-verify-external-certificate.ts(any);extended/caching-storages/infinispan-storage.ts(any);extended/config-manager/enable-config-manager.ts(any)
jobs:
display-dispatch-event-id:
diff --git a/tests/installation/src/__tests__/extended/node-versions/node-v22.ts b/tests/installation/src/__tests__/extended/node-versions/node-v22.ts
new file mode 100644
index 0000000000..8375055f01
--- /dev/null
+++ b/tests/installation/src/__tests__/extended/node-versions/node-v22.ts
@@ -0,0 +1,44 @@
+/**
+ * This program and the accompanying materials are made available under the terms of the
+ * Eclipse Public License v2.0 which accompanies this distribution, and is available at
+ * https://www.eclipse.org/legal/epl-v20.html
+ *
+ * SPDX-License-Identifier: EPL-2.0
+ *
+ * Copyright Zowe Contributors 2024
+ */
+
+import {
+ checkMandatoryEnvironmentVariables,
+ installAndVerifyConvenienceBuild,
+ showZoweRuntimeLogs,
+} from '../../../utils';
+import { TEST_TIMEOUT_CONVENIENCE_BUILD } from '../../../constants';
+
+const testServer = process.env.TEST_SERVER;
+const testSuiteName = 'Test convenience build installation with node.js v22';
+describe(testSuiteName, () => {
+ beforeAll(() => {
+ // validate variables
+ checkMandatoryEnvironmentVariables([
+ 'ZOWE_BUILD_LOCAL',
+ ]);
+ });
+
+ test('install and verify', async () => {
+ await installAndVerifyConvenienceBuild(
+ testSuiteName,
+ testServer,
+ {
+ 'zowe_build_local': process.env['ZOWE_BUILD_LOCAL'],
+ 'zowe_custom_for_test': 'true',
+ 'zos_node_home': '/ZOWE/node/node-v22.10.0',
+ 'zowe_lock_keystore': 'false',
+ }
+ );
+ }, TEST_TIMEOUT_CONVENIENCE_BUILD);
+
+ afterAll(async () => {
+ await showZoweRuntimeLogs(testServer);
+ })
+});
From c4e72334a785f9f50916127662e1d48dea121b2c Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Tue, 10 Dec 2024 13:30:12 -0500
Subject: [PATCH 092/121] add comment describing the link checker workflow
Signed-off-by: MarkAckert
---
.github/workflows/link-check.yml | 3 +++
1 file changed, 3 insertions(+)
diff --git a/.github/workflows/link-check.yml b/.github/workflows/link-check.yml
index 04dda81ae7..d11b069c7a 100644
--- a/.github/workflows/link-check.yml
+++ b/.github/workflows/link-check.yml
@@ -1,3 +1,6 @@
+# This link checker focuses on covering end-user facing links, not developer documentation.
+# This means we cover the smp/e, pswi, and zwe content.
+# The lychee toml files are set to ignore links which popped up in comments or variables.
permissions: read-all
name: Link Check CI
From 9d459e1fac255f5ba1739c789ac56a796de4a2c9 Mon Sep 17 00:00:00 2001
From: OnnoVdT <49648041+OnnoVdT@users.noreply.github.com>
Date: Fri, 13 Dec 2024 14:19:43 -0500
Subject: [PATCH 093/121] new PTF numbers (#4109)
Signed-off-by: ONNO VAN DEN TROOST
---
smpe/bld/service/ptf-bucket.txt | 9 +++++++++
1 file changed, 9 insertions(+)
create mode 100644 smpe/bld/service/ptf-bucket.txt
diff --git a/smpe/bld/service/ptf-bucket.txt b/smpe/bld/service/ptf-bucket.txt
new file mode 100644
index 0000000000..c7884f8ddd
--- /dev/null
+++ b/smpe/bld/service/ptf-bucket.txt
@@ -0,0 +1,9 @@
+#----------------------------------------------------------------------#
+# NOTE FOR PULL REQUEST APPROVER: #
+# This file may only be updated when IBM provides more PTF numbers, or #
+# when a Release Candidate PTF is promoted. Reject ALL other updates. #
+#----------------------------------------------------------------------#
+#
+# format: - []
+UO90082 UO90083 - IO29468 IO29469 IO29470
+UO90084 UO90085 - IO29471 IO29472 IO29473
From bb648cc79de4e00799712003768bb1a1a730e018 Mon Sep 17 00:00:00 2001
From: Mark Ackert <35308966+MarkAckert@users.noreply.github.com>
Date: Mon, 16 Dec 2024 16:42:56 -0500
Subject: [PATCH 094/121] switch v3 nightly to ptf builds (#4110)
Signed-off-by: MarkAckert
---
.github/workflows/cicd-test.yml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/.github/workflows/cicd-test.yml b/.github/workflows/cicd-test.yml
index 84571eaab5..0e3a32e054 100644
--- a/.github/workflows/cicd-test.yml
+++ b/.github/workflows/cicd-test.yml
@@ -89,8 +89,8 @@ env:
INFINISPAN_CACHING_STORAGE_METHOD_TESTFILE: extended/caching-storages/infinispan-storage.ts
CONFIG_MANAGER_TESTFILE: extended/config-manager/enable-config-manager.ts
GENERAL_API_DOCUMENTATION_TESTFILE: basic/install-api-gen.ts
- ZOWE_NIGHTLY_TESTS_FULL: basic/install.ts(all);basic/install-fmid.ts(all)
- ZOWE_RELEASE_TESTS_FULL: basic/install.ts(all);basic/install-fmid.ts(all);basic/install-ext.ts(any);extended/keyring.ts(all);extended/node-versions/node-v20.ts(any);extended/node-versions/node-v22.ts(any);extended/certificates/nonstrict-verify-external-certificate.ts(any);extended/caching-storages/infinispan-storage.ts(any);extended/config-manager/enable-config-manager.ts(any)
+ ZOWE_NIGHTLY_TESTS_FULL: basic/install.ts(all);basic/install-ptf.ts(all)
+ ZOWE_RELEASE_TESTS_FULL: basic/install.ts(all);basic/install-ptf.ts(all);basic/install-ext.ts(any);extended/keyring.ts(all);extended/node-versions/node-v20.ts(any);extended/node-versions/node-v22.ts(any);extended/certificates/nonstrict-verify-external-certificate.ts(any);extended/caching-storages/infinispan-storage.ts(any);extended/config-manager/enable-config-manager.ts(any)
jobs:
display-dispatch-event-id:
From bd788d6f769e137dacb45402316a20aa3e753a85 Mon Sep 17 00:00:00 2001
From: Mark Ackert <35308966+MarkAckert@users.noreply.github.com>
Date: Wed, 18 Dec 2024 09:12:53 -0500
Subject: [PATCH 095/121] Fix v3 PTF Build (#4111)
* found some lingering azwe002 references
Signed-off-by: MarkAckert
* update cli package to v3
Signed-off-by: MarkAckert
* remove v2 holddata in playbook and replace it with no-op
Signed-off-by: MarkAckert
* dropped the PGM
Signed-off-by: MarkAckert
* update cli version in tests
Signed-off-by: MarkAckert
* fix the cli match string
Signed-off-by: MarkAckert
---------
Signed-off-by: MarkAckert
---
.github/workflows/build-packaging.yml | 2 +-
.github/workflows/cicd-test.yml | 2 +-
playbooks/install-fmid.yml | 2 +-
playbooks/roles/ptf/templates/HOLDDATA.jcl.j2 | 29 ++++---------------
tests/installation/src/constants.ts | 2 +-
tests/sanity/test/cli/test-01-version.js | 2 +-
6 files changed, 10 insertions(+), 29 deletions(-)
diff --git a/.github/workflows/build-packaging.yml b/.github/workflows/build-packaging.yml
index 73e526a4f3..a5bd922b52 100644
--- a/.github/workflows/build-packaging.yml
+++ b/.github/workflows/build-packaging.yml
@@ -351,7 +351,7 @@ jobs:
- name: '[PSWI 0] PSWI pre-build check for existing smpe'
if: env.INPUTS_BUILD_PSWI == 'true' && github.event.inputs.PSWI_SMPE_ARTIFACTORY_PATH != '' && github.event.inputs.PSWI_SMPE_AZWE_ARTIFACTORY_PATH != ''
run: |
- jfrog rt dl ${{github.event.inputs.PSWI_SMPE_AZWE_ARTIFACTORY_PATH}}/AZWE002*.zip --flat=true .pax/AZWE002.zip
+ jfrog rt dl ${{github.event.inputs.PSWI_SMPE_AZWE_ARTIFACTORY_PATH}}/AZWE003*.zip --flat=true .pax/AZWE003.zip
jfrog rt dl ${{github.event.inputs.PSWI_SMPE_ARTIFACTORY_PATH}}/zowe-smpe-*.zip --flat=true .pax/zowe-smpe.zip
- name: '[SMPE Pax 4] Build PSWI'
diff --git a/.github/workflows/cicd-test.yml b/.github/workflows/cicd-test.yml
index 0e3a32e054..191197433f 100644
--- a/.github/workflows/cicd-test.yml
+++ b/.github/workflows/cicd-test.yml
@@ -65,7 +65,7 @@ env:
SANITY_TEST_PATH: tests/sanity
DEFAULT_ZOWE_PAX_ARTIFACTORY_PATTERN: libs-snapshot-local/org/zowe/*zowe*{branch-name}*.pax
DEFAULT_ZOWE_SMPE_ARTIFACTORY_PATTERN: libs-snapshot-local/org/zowe/*zowe-smpe*{branch-name}*.zip
- DEFAULT_ZOWE_CLI_ARTIFACTORY_PATTERN: PLACE_HOLDER/org/zowe/cli/zowe-cli-package/*zowe-cli-package-2*.zip
+ DEFAULT_ZOWE_CLI_ARTIFACTORY_PATTERN: PLACE_HOLDER/org/zowe/cli/zowe-cli-package/*zowe-cli-package-3*.zip
DEFAULT_ZOWE_EXT_ARTIFACTORY_PATTERN: libs-snapshot-local/org/zowe/{ext-name}/{ext-version}/{ext-name}-*.pax
# below block can be overwritten, adjusted by DevOps only
diff --git a/playbooks/install-fmid.yml b/playbooks/install-fmid.yml
index 715838ec28..0c2602776b 100644
--- a/playbooks/install-fmid.yml
+++ b/playbooks/install-fmid.yml
@@ -60,7 +60,7 @@
# ============================================================================
# if zowe_build_remote is set, we copy the FMID from zowe_fmids_dir_remote to our work folder
- # the value of zowe_build_remote should be FMID like AZWE002
+ # the value of zowe_build_remote should be FMID like AZWE003
- name: Copy Zowe FMID files from {{ zowe_fmids_dir_remote }}/{{ zowe_build_remote }} if it has value
when: zowe_build_remote is defined
import_role:
diff --git a/playbooks/roles/ptf/templates/HOLDDATA.jcl.j2 b/playbooks/roles/ptf/templates/HOLDDATA.jcl.j2
index dcd56f1979..927a40c9d5 100644
--- a/playbooks/roles/ptf/templates/HOLDDATA.jcl.j2
+++ b/playbooks/roles/ptf/templates/HOLDDATA.jcl.j2
@@ -1,24 +1,5 @@
-//SZWELOAD JOB
-// EXPORT SYMLIST=(TZON,TRGT)
-// SET TRGT={{ zowe_smpe_hlq_tzone }}
-// SET SMPE={{ zowe_smpe_hlq_csi }}
-// SET TZON=TZONE
-//UCLIN EXEC PGM=GIMSMP,REGION=0M,COND=(4,LT)
-//SZWELOAD DD SPACE=(TRK,(30,15,15)),
-// UNIT=SYSALLDA,
-// DISP=(MOD,CATLG),
-// DSNTYPE=LIBRARY,
-// RECFM=U,
-// LRECL=0,
-// BLKSIZE=32760,
-// DSN=&TRGT..SZWELOAD
-//SMPCSI DD DISP=OLD,DSN={{ smpe_csi }}
-//SMPCNTL DD *,SYMBOLS=JCLONLY
- SET BDY(&TZON).
- UCLIN.
- ADD DDDEF (SZWELOAD)
- DATASET(&TRGT..SZWELOAD)
- UNIT(SYSALLDA)
- WAITFORDSN
- SHR .
- ENDUCL.
+//HOLDDATA JOB
+//* This job can be customized if holddata actions are added to Zowe PTFs
+//* For example, adding a new load module to an SMP/e-managed dataset.
+//DUMMY EXEC PGM=IEFBR14
+//*
diff --git a/tests/installation/src/constants.ts b/tests/installation/src/constants.ts
index c60aa86853..afe1dd8e07 100644
--- a/tests/installation/src/constants.ts
+++ b/tests/installation/src/constants.ts
@@ -13,7 +13,7 @@ import * as path from 'path';
// const debug = Debug('zowe-install-test:constants');
// the FMID we will use to test PTF
-export const ZOWE_FMID = 'AZWE002';
+export const ZOWE_FMID = 'AZWE003';
// where ansible playbooks located
export const ANSIBLE_ROOT_DIR: string = path.resolve(__dirname, '../../../playbooks');
diff --git a/tests/sanity/test/cli/test-01-version.js b/tests/sanity/test/cli/test-01-version.js
index 9b52be55ed..861fde287b 100644
--- a/tests/sanity/test/cli/test-01-version.js
+++ b/tests/sanity/test/cli/test-01-version.js
@@ -28,6 +28,6 @@ describe('cli version', function() {
expect(result).to.have.property('stderr');
expect(result.stderr).to.be.empty;
- expect(result.stdout).to.match(/^7\./);
+ expect(result.stdout).to.match(/^CLI Version: 8\./);
});
});
From c1c45a74907e1f05d2b872e21c12913ec488f81c Mon Sep 17 00:00:00 2001
From: zowe-robot
Date: Wed, 8 Jan 2025 11:43:28 +0000
Subject: [PATCH 096/121] Update component versions
Signed-off-by: zowe-robot
---
manifest.json.template | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/manifest.json.template b/manifest.json.template
index 53650d59eb..717998d018 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -205,7 +205,7 @@
"componentGroup": "Zowe CLI",
"entries": [{
"repository": "zowe-cli",
- "tag": "v8.0.0",
+ "tag": "v8.10.4",
"destinations": ["Zowe CLI Package"]
}]
}, {
@@ -219,7 +219,7 @@
"componentGroup": "IBM® Db2® Plug-in for Zowe CLI",
"entries": [{
"repository": "zowe-cli-db2-plugin",
- "tag": "v6.0.0",
+ "tag": "v6.1.0",
"destinations": ["Zowe CLI Package"]
}]
}, {
From a44cfabf582750d5deb8324d0cfe852010324914 Mon Sep 17 00:00:00 2001
From: Timothy Johnson
Date: Wed, 8 Jan 2025 08:36:11 -0500
Subject: [PATCH 097/121] Update manifest.json.template
Signed-off-by: Timothy Johnson
---
manifest.json.template | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/manifest.json.template b/manifest.json.template
index 717998d018..4b2fbb0396 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -212,7 +212,7 @@
"componentGroup": "IBM® CICS® Plug-in for Zowe CLI",
"entries": [{
"repository": "cics-for-zowe-client",
- "tag": "v6.0.0",
+ "tag": "v6.2.4",
"destinations": ["Zowe CLI Package"]
}]
}, {
From 45f1f5b47cb686f0ddb983757a10e6a76d6d2903 Mon Sep 17 00:00:00 2001
From: James Struga
Date: Wed, 8 Jan 2025 09:37:36 -0500
Subject: [PATCH 098/121] WebUI RC1 v3.1.0
Signed-off-by: James Struga
---
manifest.json.template | 58 +++++++++++++++++++++---------------------
1 file changed, 29 insertions(+), 29 deletions(-)
diff --git a/manifest.json.template b/manifest.json.template
index 53650d59eb..4f1f55f98f 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -1,6 +1,6 @@
{
"name": "Zowe",
- "version": "3.0.0",
+ "version": "3.1.0",
"description": "Zowe is an open source project created to host technologies that benefit the Z platform from all members of the Z community (Integrated Software Vendors, System Integrators and z/OS consumers). Zowe, like Mac or Windows, comes with a set of APIs and OS capabilities that applications build on and also includes some applications out of the box. Zowe offers modern interfaces to interact with z/OS and allows you to work with z/OS in a way that is similar to what you experience on cloud platforms today. You can use these interfaces as delivered or through plug-ins and extensions that are created by clients or third-party vendors.",
"license": "EPL-2.0",
"homepage": "https://zowe.org",
@@ -12,9 +12,9 @@
},
"binaryDependencies": {
"org.zowe.zlux.zlux-core": {
- "version": "3.0.0-RC",
+ "version": "3.1.0-RC",
"repository": "libs-snapshot-local",
- "artifact": "zlux-core-3.0.0-20240925.185019.pax"
+ "artifact": "zlux-core-3.1.0-20250107.161516.pax"
},
"org.zowe.zlux.sample-angular-app": {
"version": "2.18.0-V2.X-RC",
@@ -32,14 +32,14 @@
"artifact": "sample-react-app-2.18.0-20240814.141704.pax"
},
"org.zowe.zlux.tn3270-ng2": {
- "version": "3.0.0-V3.X-RC",
+ "version": "3.1.0-V3.X-RC",
"repository": "libs-snapshot-local",
- "artifact": "tn3270-ng2-3.0.0-20240919.130824.pax"
+ "artifact": "tn3270-ng2-3.1.0-20250108.141502.pax"
},
"org.zowe.zlux.vt-ng2": {
- "version": "3.0.0-V3.X-RC",
+ "version": "3.1.0-V3.X-RC",
"repository": "libs-snapshot-local",
- "artifact": "vt-ng2-3.0.0-20240919.130822.pax"
+ "artifact": "vt-ng2-3.1.0-20250108.141509.pax"
},
"org.zowe.zlux.zlux-editor": {
"version": "2.18.0-V2.X-RC",
@@ -47,9 +47,9 @@
"artifact": "zlux-editor-2.18.0-20240814.141840.pax"
},
"org.zowe.zss": {
- "version": "3.0.0-RC",
+ "version": "3.1.0-RC",
"repository": "libs-snapshot-local",
- "artifact": "zss-3.0.0-rc-1202-20240919131259.pax"
+ "artifact": "zss-3.1.0-rc-1249-20250108143217.pax"
},
"org.zowe.explorer-jes": {
"version": "3.0.0"
@@ -97,22 +97,22 @@
"artifact": "zaas-package-*.zip"
},
"org.zowe.getesm": {
- "version": "3.0.0-V3.X-RC",
+ "version": "3.1.0-V3.X-RC",
"repository": "libs-snapshot-local",
- "artifact": "getesm-3.0.0-2024091917.pax"
+ "artifact": "getesm-3.1.0-2025010749.pax"
},
"org.zowe.configmgr": {
- "version": "3.0.0-V3.X-RC",
+ "version": "3.1.0-V3.X-RC",
"repository": "libs-snapshot-local",
- "artifact": "configmgr-3.0.0-2024091929.pax"
+ "artifact": "configmgr-3.1.0-2025010752.pax"
},
"org.zowe.configmgr-rexx": {
- "version": "3.0.0-V3.X-RC",
+ "version": "3.1.0-V3.X-RC",
"repository": "libs-snapshot-local",
- "artifact": "configmgr-rexx-3.0.0-2024091935.pax"
+ "artifact": "configmgr-rexx-3.1.0-2025010754.pax"
},
"org.zowe.launcher": {
- "version": "3.0.0"
+ "version": "3.1.0"
},
"org.zowe.keyring-utilities": {
"version": "1.0.4",
@@ -147,12 +147,12 @@
"componentGroup": "Zowe Application Framework",
"entries": [{
"repository": "zlux-app-manager",
- "tag": "v3.0.0-RC1",
+ "tag": "v3.1.0-RC1",
"destinations": ["Zowe PAX"]
},
{
"repository": "zlux-app-server",
- "tag": "v3.0.0-RC1",
+ "tag": "v3.1.0-RC1",
"destinations": ["Zowe PAX"]
},
{
@@ -167,17 +167,17 @@
},
{
"repository": "zlux-platform",
- "tag": "v3.0.0-RC1",
+ "tag": "v3.1.0-RC1",
"destinations": ["Zowe PAX"]
},
{
"repository": "zlux-server-framework",
- "tag": "v3.0.0-RC1",
+ "tag": "v3.1.0-RC1",
"destinations": ["Zowe PAX"]
},
{
"repository": "zlux-shared",
- "tag": "v3.0.0-RC1",
+ "tag": "v3.1.0-RC1",
"destinations": ["Zowe PAX"]
},
{
@@ -187,17 +187,17 @@
},
{
"repository": "zlux-build",
- "tag": "v3.0.0-RC1",
+ "tag": "v3.1.0-RC1",
"destinations": ["Zowe PAX"]
},
{
"repository": "zss",
- "tag": "v3.0.0-RC1",
+ "tag": "v3.1.0-RC1",
"destinations": ["Zowe PAX"]
},
{
"repository": "zowe-common-c",
- "tag": "zss-v3.0.0-RC1",
+ "tag": "zss-v3.1.0-RC1",
"destinations": ["Zowe PAX"]
}
]
@@ -268,7 +268,7 @@
"componentGroup": "Zowe Desktop TN3270 Emulator Plug-in",
"entries": [{
"repository": "tn3270-ng2",
- "tag": "v3.0.0-RC1",
+ "tag": "v3.1.0-RC1",
"destinations": ["Zowe PAX"]
}]
}, {
@@ -299,7 +299,7 @@
"componentGroup": "Zowe Desktop VT Emulator Plugin-in",
"entries": [{
"repository": "vt-ng2",
- "tag": "v3.0.0-RC1",
+ "tag": "v3.1.0-RC1",
"destinations": ["Zowe PAX"]
}]
},
@@ -323,7 +323,7 @@
"destinations": ["Zowe PAX"]
}, {
"repository": "launcher",
- "tag": "v3.0.0",
+ "tag": "v3.1.0",
"destinations": ["Zowe PAX"]
}]
},
@@ -347,7 +347,7 @@
"componentGroup": "Configmgr",
"entries": [{
"repository": "zowe-common-c",
- "tag": "configmgr-v3.0.0-RC1",
+ "tag": "configmgr-v3.1.0-RC1",
"destinations": ["Zowe PAX"]
}]
}
@@ -387,7 +387,7 @@
"app-server": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/app-server",
- "tag" : "3.0.0-ubuntu"
+ "tag" : "3.1.0-ubuntu"
},
"explorer-ip": {
"kind": "job",
From cc258f75c5032530cbf21b82f2d3de04bb2347eb Mon Sep 17 00:00:00 2001
From: Pablo Carle
Date: Wed, 8 Jan 2025 17:30:47 +0100
Subject: [PATCH 099/121] z/OSMF static definition file processing (#4113)
* zosmf static def scheme in attls
Signed-off-by: Pablo Carle
* pr review
Signed-off-by: Pablo Carle
* quotes
Signed-off-by: Pablo Carle
* pr review
Signed-off-by: Pablo Carle
* pr review
Signed-off-by: Pablo Carle
---------
Signed-off-by: Pablo Carle
Co-authored-by: Pablo Carle
---
bin/libs/component.ts | 42 ++++++++++++++++++++++++++++++++++++++++++
1 file changed, 42 insertions(+)
diff --git a/bin/libs/component.ts b/bin/libs/component.ts
index 5f5bbe5160..4669741400 100644
--- a/bin/libs/component.ts
+++ b/bin/libs/component.ts
@@ -387,6 +387,32 @@ export function findAllLaunchComponents2(): string[] {
});
}
+function getBooleanEnv(variableName) {
+ const value = std.getenv(`${variableName}`);
+ if (value === "true") {
+ return true
+ }
+ if (value === "false") {
+ return false
+ }
+ return undefined
+}
+
+
+function isClientAttls() {
+ const clientGlobalAttls = getBooleanEnv('ZWE_zowe_network_client_tls_attls');
+ const serverGlobalAttls = getBooleanEnv('ZWE_zowe_network_server_tls_attls');
+ const clientLocalAttls = getBooleanEnv('ZWE_components_zaas_zowe_network_client_tls_attls');
+ const serverLocalAttls = getBooleanEnv('ZWE_components_zaas_zowe_network_server_tls_attls');
+ const clientAttls = clientGlobalAttls || clientLocalAttls;
+ if ((clientGlobalAttls !== false) && (clientLocalAttls !== false) && (!clientAttls)) {
+ // If client attls not explicitly false OR truthy, have client follow server attls variable. it simplifies common case in which users want both.
+ return serverGlobalAttls || serverLocalAttls;
+ } else {
+ return clientAttls;
+ }
+}
+
export function processComponentApimlStaticDefinitions(componentDir: string): boolean {
const STATIC_DEF_DIR=std.getenv('ZWE_STATIC_DEFINITIONS_DIR');
if (!STATIC_DEF_DIR) {
@@ -418,6 +444,22 @@ export function processComponentApimlStaticDefinitions(componentDir: string): bo
const contents = xplatform.loadFileUTF8(path,xplatform.AUTO_DETECT);
if (contents) {
+ const zosmfScheme = std.getenv("ZOSMF_SCHEME");
+ const attls = isClientAttls()
+ const schemeEnv = std.getenv("ZWE_zOSMF_scheme");
+
+ let scheme = "https";
+
+ if (zosmfScheme) {
+ scheme = zosmfScheme;
+ } else if (schemeEnv) {
+ scheme = schemeEnv;
+ } else if (attls) {
+ scheme = "http";
+ }
+
+ std.setenv('ZOSMF_SCHEME', scheme);
+
const resolvedContents = varlib.resolveShellTemplate(contents);
const zweCliParameterHaInstance=std.getenv("ZWE_CLI_PARAMETER_HA_INSTANCE");
From a5aa1b70e795d77e4005b07fa732ec192de4873c Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Wed, 8 Jan 2025 11:58:31 -0500
Subject: [PATCH 100/121] update client python sdk tag to latest dev release
(dev22)
Signed-off-by: MarkAckert
---
manifest.json.template | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/manifest.json.template b/manifest.json.template
index 6a87e5abba..3e34b78cb0 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -355,7 +355,7 @@
"entries": [{
"repository": "zowe-client-python-sdk",
"core": false,
- "tag": "main",
+ "tag": "91366a0e5cd1f2680c0ccf87e8493d099d9e35f7",
"destinations": ["Zowe Client Python SDK"]
}]
}
From f505c48ef3a28e310c105b3c11a943f79cfb3629 Mon Sep 17 00:00:00 2001
From: Pavel Jares
Date: Fri, 10 Jan 2025 16:09:22 +0100
Subject: [PATCH 101/121] update APIML versions
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Signed-off-by: Pavel Jareš
---
manifest.json.template | 22 +++++++++++-----------
1 file changed, 11 insertions(+), 11 deletions(-)
diff --git a/manifest.json.template b/manifest.json.template
index 63ddc708f6..6d2136e6c8 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -65,23 +65,23 @@
"artifact": "explorer-ip*.pax"
},
"org.zowe.apiml.api-catalog-package": {
- "version": "3.0.36",
+ "version": "3.1.0",
"artifact": "api-catalog-*.zip"
},
"org.zowe.apiml.discovery-package": {
- "version": "3.0.36",
+ "version": "3.1.0",
"artifact": "discovery-*.zip"
},
"org.zowe.apiml.gateway-package": {
- "version": "3.0.36",
+ "version": "3.1.0",
"artifact": "gateway-*.zip"
},
"org.zowe.apiml.caching-service-package": {
- "version": "3.0.36",
+ "version": "3.1.0",
"artifact": "caching-service-*.zip"
},
"org.zowe.apiml.apiml-common-lib-package": {
- "version": "3.0.36",
+ "version": "3.1.0",
"artifact": "apiml-common-lib-*.zip"
},
"org.zowe.apiml.sdk.common-java-lib-package": {
@@ -89,7 +89,7 @@
"artifact": "common-java-lib-*.zip"
},
"org.zowe.apiml.sdk.apiml-sample-extension-package": {
- "version": "3.0.36",
+ "version": "3.1.0",
"artifact": "apiml-sample-extension-*.zip"
},
"org.zowe.apiml.zaas-package": {
@@ -133,7 +133,7 @@
"componentGroup": "Zowe API Mediation Layer",
"entries": [{
"repository": "api-layer",
- "tag": "v3.0.36",
+ "tag": "v3.1.0",
"destinations": ["Zowe PAX"]
}]
}, {
@@ -369,23 +369,23 @@
"api-catalog": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/api-catalog-services",
- "tag" : "3.0.36-ubuntu"
+ "tag" : "3.1.0-ubuntu"
},
"gateway": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/gateway-service",
- "tag" : "3.0.36-ubuntu"
+ "tag" : "3.1.0-ubuntu"
},
"caching": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/caching-service",
- "tag" : "3.0.36-ubuntu"
+ "tag" : "3.1.0-ubuntu"
},
"discovery": {
"kind": "statefulset",
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/discovery-service",
- "tag" : "3.0.36-ubuntu"
+ "tag" : "3.1.0-ubuntu"
},
"zaas": {
"registry": "zowe-docker-release.jfrog.io",
From d2d3720d681f6166aa3010739c8bf60bc56e228a Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Pavel=20Jare=C5=A1?=
Date: Mon, 13 Jan 2025 10:51:32 +0100
Subject: [PATCH 102/121] fix ZAAS version
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Signed-off-by: Pavel Jareš
---
manifest.json.template | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/manifest.json.template b/manifest.json.template
index 6d2136e6c8..a3aa66b917 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -93,7 +93,7 @@
"artifact": "apiml-sample-extension-*.zip"
},
"org.zowe.apiml.zaas-package": {
- "version": "3.0.36",
+ "version": "3.1.0",
"artifact": "zaas-package-*.zip"
},
"org.zowe.getesm": {
@@ -390,7 +390,7 @@
"zaas": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/zaas-service",
- "tag" : "3.0.36-ubuntu"
+ "tag" : "3.1.0-ubuntu"
},
"app-server": {
"registry": "zowe-docker-release.jfrog.io",
From 10c4d30f68ce35ef517c56f1b9eeb8af91f11d1a Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Pavel=20Jare=C5=A1?=
Date: Tue, 14 Jan 2025 13:12:58 +0100
Subject: [PATCH 103/121] update to APIML 3.1.1
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Signed-off-by: Pavel Jareš
---
manifest.json.template | 26 +++++++++++++-------------
1 file changed, 13 insertions(+), 13 deletions(-)
diff --git a/manifest.json.template b/manifest.json.template
index a3aa66b917..d3a3d7c494 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -65,23 +65,23 @@
"artifact": "explorer-ip*.pax"
},
"org.zowe.apiml.api-catalog-package": {
- "version": "3.1.0",
+ "version": "3.1.1",
"artifact": "api-catalog-*.zip"
},
"org.zowe.apiml.discovery-package": {
- "version": "3.1.0",
+ "version": "3.1.1",
"artifact": "discovery-*.zip"
},
"org.zowe.apiml.gateway-package": {
- "version": "3.1.0",
+ "version": "3.1.1",
"artifact": "gateway-*.zip"
},
"org.zowe.apiml.caching-service-package": {
- "version": "3.1.0",
+ "version": "3.1.1",
"artifact": "caching-service-*.zip"
},
"org.zowe.apiml.apiml-common-lib-package": {
- "version": "3.1.0",
+ "version": "3.1.1",
"artifact": "apiml-common-lib-*.zip"
},
"org.zowe.apiml.sdk.common-java-lib-package": {
@@ -89,11 +89,11 @@
"artifact": "common-java-lib-*.zip"
},
"org.zowe.apiml.sdk.apiml-sample-extension-package": {
- "version": "3.1.0",
+ "version": "3.1.1",
"artifact": "apiml-sample-extension-*.zip"
},
"org.zowe.apiml.zaas-package": {
- "version": "3.1.0",
+ "version": "3.1.1",
"artifact": "zaas-package-*.zip"
},
"org.zowe.getesm": {
@@ -133,7 +133,7 @@
"componentGroup": "Zowe API Mediation Layer",
"entries": [{
"repository": "api-layer",
- "tag": "v3.1.0",
+ "tag": "v3.1.1",
"destinations": ["Zowe PAX"]
}]
}, {
@@ -369,28 +369,28 @@
"api-catalog": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/api-catalog-services",
- "tag" : "3.1.0-ubuntu"
+ "tag" : "3.1.1-ubuntu"
},
"gateway": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/gateway-service",
- "tag" : "3.1.0-ubuntu"
+ "tag" : "3.1.1-ubuntu"
},
"caching": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/caching-service",
- "tag" : "3.1.0-ubuntu"
+ "tag" : "3.1.1-ubuntu"
},
"discovery": {
"kind": "statefulset",
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/discovery-service",
- "tag" : "3.1.0-ubuntu"
+ "tag" : "3.1.1-ubuntu"
},
"zaas": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/zaas-service",
- "tag" : "3.1.0-ubuntu"
+ "tag" : "3.1.1-ubuntu"
},
"app-server": {
"registry": "zowe-docker-release.jfrog.io",
From 900fd03925e2d51e76a9839466a759b4b039de90 Mon Sep 17 00:00:00 2001
From: James Struga
Date: Tue, 14 Jan 2025 09:06:31 -0500
Subject: [PATCH 104/121] Update zlux-core with attls status
Signed-off-by: James Struga
---
manifest.json.template | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/manifest.json.template b/manifest.json.template
index 63ddc708f6..6d9a663d87 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -14,7 +14,7 @@
"org.zowe.zlux.zlux-core": {
"version": "3.1.0-RC",
"repository": "libs-snapshot-local",
- "artifact": "zlux-core-3.1.0-20250107.161516.pax"
+ "artifact": "zlux-core-3.1.0-20250114.140434.pax"
},
"org.zowe.zlux.sample-angular-app": {
"version": "2.18.0-V2.X-RC",
From 4fbdb4782eef8d59196579793589859d1e1830be Mon Sep 17 00:00:00 2001
From: James Struga
Date: Tue, 14 Jan 2025 09:25:20 -0500
Subject: [PATCH 105/121] Update manifest.json.template
Signed-off-by: James Struga
---
manifest.json.template | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/manifest.json.template b/manifest.json.template
index 6d9a663d87..189bf8217f 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -395,7 +395,7 @@
"app-server": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/app-server",
- "tag" : "3.1.0-ubuntu"
+ "tag" : "3.0.0-ubuntu"
},
"explorer-ip": {
"kind": "job",
From 5c6763c991c74d477a078c01d06b41b67f8161f0 Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Tue, 14 Jan 2025 15:54:45 -0500
Subject: [PATCH 106/121] update license version
Signed-off-by: MarkAckert
---
manifest.json.template | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/manifest.json.template b/manifest.json.template
index f96e11309d..65db9b3e54 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -124,7 +124,7 @@
"version": "2.0.3"
},
"org.zowe.licenses": {
- "version": "3.0.0",
+ "version": "3.1.0",
"artifact": "zowe_licenses_full.zip"
}
},
From 577163d4db43ca1f6e16ecb3a06e60b8f6842f0b Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Wed, 15 Jan 2025 16:18:39 -0500
Subject: [PATCH 107/121] check or ebcdic before converting certificate
Signed-off-by: MarkAckert
---
bin/libs/certificate.sh | 10 ++++++++--
1 file changed, 8 insertions(+), 2 deletions(-)
diff --git a/bin/libs/certificate.sh b/bin/libs/certificate.sh
index 1daf58fd49..e4ba426545 100644
--- a/bin/libs/certificate.sh
+++ b/bin/libs/certificate.sh
@@ -646,8 +646,14 @@ EOF
return 1
fi
if [ `uname` = "OS/390" ]; then
- iconv -f ISO8859-1 -t IBM-1047 "${keystore_dir}/${alias_lc}.cer" > "${keystore_dir}/${alias_lc}.cer-ebcdic"
- mv "${keystore_dir}/${alias_lc}.cer-ebcdic" "${keystore_dir}/${alias_lc}.cer"
+ # check if certificate is in EBCDIC before converting
+ if [[ "$(head -c 10 "./zosmf00.cer")" = "-----BEGIN" ]]; then
+ print_message ">>>> Certificate \"${keystore_dir}/${alias_lc}.cer is in EBCDIC."
+ else
+ print_message ">>>> Converting certificate \"${keystore_dir}/${alias_lc}.cer\" to EBCDIC."
+ iconv -f ISO8859-1 -t IBM-1047 "${keystore_dir}/${alias_lc}.cer" >"${keystore_dir}/${alias_lc}.cer-ebcdic"
+ mv "${keystore_dir}/${alias_lc}.cer-ebcdic" "${keystore_dir}/${alias_lc}.cer"
+ fi
ensure_file_encoding "${keystore_dir}/${alias_lc}.cer" "CERTIFICATE"
fi
fi
From 352e0e628ac2b7e7d8750e368af82dfee19621d2 Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Wed, 15 Jan 2025 16:24:33 -0500
Subject: [PATCH 108/121] remove hardcoded cer from testing
Signed-off-by: MarkAckert
---
bin/libs/certificate.sh | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/bin/libs/certificate.sh b/bin/libs/certificate.sh
index e4ba426545..621efaed37 100644
--- a/bin/libs/certificate.sh
+++ b/bin/libs/certificate.sh
@@ -647,7 +647,7 @@ EOF
fi
if [ `uname` = "OS/390" ]; then
# check if certificate is in EBCDIC before converting
- if [[ "$(head -c 10 "./zosmf00.cer")" = "-----BEGIN" ]]; then
+ if [[ "$(head -c 10 "${keystore_dir}/${alias_lc}.cer")" = "-----BEGIN" ]]; then
print_message ">>>> Certificate \"${keystore_dir}/${alias_lc}.cer is in EBCDIC."
else
print_message ">>>> Converting certificate \"${keystore_dir}/${alias_lc}.cer\" to EBCDIC."
From f0dbfe351ea9974d9ae43fb50a19ea1c1fa39aa5 Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Wed, 15 Jan 2025 16:25:39 -0500
Subject: [PATCH 109/121] fixed quote
Signed-off-by: MarkAckert
---
bin/libs/certificate.sh | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/bin/libs/certificate.sh b/bin/libs/certificate.sh
index 621efaed37..62bb3fce3d 100644
--- a/bin/libs/certificate.sh
+++ b/bin/libs/certificate.sh
@@ -647,7 +647,7 @@ EOF
fi
if [ `uname` = "OS/390" ]; then
# check if certificate is in EBCDIC before converting
- if [[ "$(head -c 10 "${keystore_dir}/${alias_lc}.cer")" = "-----BEGIN" ]]; then
+ if [[ "$(head -c 10 \"${keystore_dir}/${alias_lc}.cer\")" = "-----BEGIN" ]]; then
print_message ">>>> Certificate \"${keystore_dir}/${alias_lc}.cer is in EBCDIC."
else
print_message ">>>> Converting certificate \"${keystore_dir}/${alias_lc}.cer\" to EBCDIC."
From 755f921ad58171af8c7389134e290a27c2c9fc08 Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Wed, 15 Jan 2025 16:28:43 -0500
Subject: [PATCH 110/121] remove quotes
Signed-off-by: MarkAckert
---
bin/libs/certificate.sh | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/bin/libs/certificate.sh b/bin/libs/certificate.sh
index 62bb3fce3d..4d9981d612 100644
--- a/bin/libs/certificate.sh
+++ b/bin/libs/certificate.sh
@@ -647,7 +647,7 @@ EOF
fi
if [ `uname` = "OS/390" ]; then
# check if certificate is in EBCDIC before converting
- if [[ "$(head -c 10 \"${keystore_dir}/${alias_lc}.cer\")" = "-----BEGIN" ]]; then
+ if [[ "$(head -c 10 ${keystore_dir}/${alias_lc}.cer)" = "-----BEGIN" ]]; then
print_message ">>>> Certificate \"${keystore_dir}/${alias_lc}.cer is in EBCDIC."
else
print_message ">>>> Converting certificate \"${keystore_dir}/${alias_lc}.cer\" to EBCDIC."
From e81b5adc0562ba3fc9a03f59e4147cab8f70a2a8 Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Thu, 16 Jan 2025 14:04:03 -0500
Subject: [PATCH 111/121] update upload-artifact action version
Signed-off-by: MarkAckert
---
.github/workflows/cicd-test.yml | 2 +-
.github/workflows/diff-schema.yml | 2 +-
.github/workflows/diff-yaml | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/.github/workflows/cicd-test.yml b/.github/workflows/cicd-test.yml
index 191197433f..e2adc55541 100644
--- a/.github/workflows/cicd-test.yml
+++ b/.github/workflows/cicd-test.yml
@@ -382,7 +382,7 @@ jobs:
- name: '[After Test 2] Upload test report'
if: always()
- uses: actions/upload-artifact@v3
+ uses: actions/upload-artifact@v4
with:
name: InstallTestReports-${{ env.TEST_NAME }}-${{ steps.more-test-prep.outputs.TEST_SERVER_NICKNAME }}-${{ github.run_id }}-${{ env.CURRENT_TIME }}
path: ${{ env.INSTALL_TEST_PATH }}/reports/
diff --git a/.github/workflows/diff-schema.yml b/.github/workflows/diff-schema.yml
index ae8c8c4db7..3e47227461 100644
--- a/.github/workflows/diff-schema.yml
+++ b/.github/workflows/diff-schema.yml
@@ -34,7 +34,7 @@ jobs:
- name: '[Build] Make diff'
run: git diff ${{ env.FROM }} ${{ env.TO }} -- schemas > schemas.diff
- name: '[Upload]'
- uses: actions/upload-artifact@v3
+ uses: actions/upload-artifact@v4
with:
name: schemas.diff
path: schemas.diff
diff --git a/.github/workflows/diff-yaml b/.github/workflows/diff-yaml
index 52212e980a..032656ef78 100644
--- a/.github/workflows/diff-yaml
+++ b/.github/workflows/diff-yaml
@@ -34,7 +34,7 @@ jobs:
- name: '[Build] Make diff'
run: git diff ${{ env.FROM }} ${{ env.TO }} -- example-zowe.yaml > example-yaml.diff
- name: '[Upload]'
- uses: actions/upload-artifact@v3
+ uses: actions/upload-artifact@v4
with:
name: example-yaml.diff
path: example-yaml.diff
From 457b1fa6da295356b50392942146956cbcb62b4e Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Fri, 17 Jan 2025 10:01:12 -0500
Subject: [PATCH 112/121] add scp "-O" option for file transfer
Signed-off-by: MarkAckert
---
playbooks/roles/common/templates/scp.with-key.sh.j2 | 2 +-
playbooks/roles/common/templates/scp.with-pwd.sh.j2 | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/playbooks/roles/common/templates/scp.with-key.sh.j2 b/playbooks/roles/common/templates/scp.with-key.sh.j2
index e4eb9b7891..c61ac836c1 100644
--- a/playbooks/roles/common/templates/scp.with-key.sh.j2
+++ b/playbooks/roles/common/templates/scp.with-key.sh.j2
@@ -4,4 +4,4 @@ FILE_LOCAL=$1
FILE_REMOTE=$2
echo "SCP $FILE_LOCAL ==> $FILE_REMOTE"
-scp -oHostKeyAlgorithms=+ssh-rsa -P {{ hostvars[inventory_hostname].ansible_port | default('22') }} -i {{ hostvars[inventory_hostname].ansible_ssh_private_key_file }} $FILE_LOCAL {{ hostvars[inventory_hostname].ansible_user }}@{{ hostvars[inventory_hostname].ansible_ssh_host }}:$FILE_REMOTE
+scp -O -oHostKeyAlgorithms=+ssh-rsa -P {{ hostvars[inventory_hostname].ansible_port | default('22') }} -i {{ hostvars[inventory_hostname].ansible_ssh_private_key_file }} $FILE_LOCAL {{ hostvars[inventory_hostname].ansible_user }}@{{ hostvars[inventory_hostname].ansible_ssh_host }}:$FILE_REMOTE
diff --git a/playbooks/roles/common/templates/scp.with-pwd.sh.j2 b/playbooks/roles/common/templates/scp.with-pwd.sh.j2
index 7a3c48bf9a..d522b3bebe 100644
--- a/playbooks/roles/common/templates/scp.with-pwd.sh.j2
+++ b/playbooks/roles/common/templates/scp.with-pwd.sh.j2
@@ -4,4 +4,4 @@ FILE_LOCAL=$1
FILE_REMOTE=$2
echo "SCP $FILE_LOCAL ==> $FILE_REMOTE"
-sshpass -p "{{ hostvars[inventory_hostname].ansible_password }}" scp -oHostKeyAlgorithms=+ssh-rsa -P {{ hostvars[inventory_hostname].ansible_port | default('22') }} $FILE_LOCAL {{ hostvars[inventory_hostname].ansible_user }}@{{ hostvars[inventory_hostname].ansible_ssh_host }}:$FILE_REMOTE
+sshpass -p "{{ hostvars[inventory_hostname].ansible_password }}" scp -O -oHostKeyAlgorithms=+ssh-rsa -P {{ hostvars[inventory_hostname].ansible_port | default('22') }} $FILE_LOCAL {{ hostvars[inventory_hostname].ansible_user }}@{{ hostvars[inventory_hostname].ansible_ssh_host }}:$FILE_REMOTE
From dc6f753f51e2fb45a6566c29ed14496114b9c4e8 Mon Sep 17 00:00:00 2001
From: James Struga
Date: Fri, 17 Jan 2025 11:19:55 -0500
Subject: [PATCH 113/121] Updated zlux-core for RC2
Signed-off-by: James Struga
---
manifest.json.template | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/manifest.json.template b/manifest.json.template
index 65db9b3e54..0de42cb77b 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -14,7 +14,7 @@
"org.zowe.zlux.zlux-core": {
"version": "3.1.0-RC",
"repository": "libs-snapshot-local",
- "artifact": "zlux-core-3.1.0-20250114.140434.pax"
+ "artifact": "zlux-core-3.1.0-20250117.161154.pax"
},
"org.zowe.zlux.sample-angular-app": {
"version": "2.18.0-V2.X-RC",
@@ -172,7 +172,7 @@
},
{
"repository": "zlux-server-framework",
- "tag": "v3.1.0-RC1",
+ "tag": "v3.1.0-RC2",
"destinations": ["Zowe PAX"]
},
{
From be41470932c3e48db781da3207351c85af9573d7 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Pavel=20Jare=C5=A1?=
Date: Tue, 21 Jan 2025 16:02:04 +0100
Subject: [PATCH 114/121] update to APIML 3.1.3
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Signed-off-by: Pavel Jareš
---
manifest.json.template | 26 +++++++++++++-------------
1 file changed, 13 insertions(+), 13 deletions(-)
diff --git a/manifest.json.template b/manifest.json.template
index 65db9b3e54..3e391d1cf7 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -65,23 +65,23 @@
"artifact": "explorer-ip*.pax"
},
"org.zowe.apiml.api-catalog-package": {
- "version": "3.1.1",
+ "version": "3.1.3",
"artifact": "api-catalog-*.zip"
},
"org.zowe.apiml.discovery-package": {
- "version": "3.1.1",
+ "version": "3.1.3",
"artifact": "discovery-*.zip"
},
"org.zowe.apiml.gateway-package": {
- "version": "3.1.1",
+ "version": "3.1.3",
"artifact": "gateway-*.zip"
},
"org.zowe.apiml.caching-service-package": {
- "version": "3.1.1",
+ "version": "3.1.3",
"artifact": "caching-service-*.zip"
},
"org.zowe.apiml.apiml-common-lib-package": {
- "version": "3.1.1",
+ "version": "3.1.3",
"artifact": "apiml-common-lib-*.zip"
},
"org.zowe.apiml.sdk.common-java-lib-package": {
@@ -89,11 +89,11 @@
"artifact": "common-java-lib-*.zip"
},
"org.zowe.apiml.sdk.apiml-sample-extension-package": {
- "version": "3.1.1",
+ "version": "3.1.3",
"artifact": "apiml-sample-extension-*.zip"
},
"org.zowe.apiml.zaas-package": {
- "version": "3.1.1",
+ "version": "3.1.3",
"artifact": "zaas-package-*.zip"
},
"org.zowe.getesm": {
@@ -133,7 +133,7 @@
"componentGroup": "Zowe API Mediation Layer",
"entries": [{
"repository": "api-layer",
- "tag": "v3.1.1",
+ "tag": "v3.1.3",
"destinations": ["Zowe PAX"]
}]
}, {
@@ -369,28 +369,28 @@
"api-catalog": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/api-catalog-services",
- "tag" : "3.1.1-ubuntu"
+ "tag" : "3.1.3-ubuntu"
},
"gateway": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/gateway-service",
- "tag" : "3.1.1-ubuntu"
+ "tag" : "3.1.3-ubuntu"
},
"caching": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/caching-service",
- "tag" : "3.1.1-ubuntu"
+ "tag" : "3.1.3-ubuntu"
},
"discovery": {
"kind": "statefulset",
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/discovery-service",
- "tag" : "3.1.1-ubuntu"
+ "tag" : "3.1.3-ubuntu"
},
"zaas": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/zaas-service",
- "tag" : "3.1.1-ubuntu"
+ "tag" : "3.1.3-ubuntu"
},
"app-server": {
"registry": "zowe-docker-release.jfrog.io",
From 5411e8947548b67f94200d1719d1c2ac93ece263 Mon Sep 17 00:00:00 2001
From: pavelzlatnik <45940302+pavelzlatnik@users.noreply.github.com>
Date: Tue, 21 Jan 2025 21:25:05 +0100
Subject: [PATCH 115/121] User/zlatnikp/apimlwf second iteration of apiml
workflow for V3 (#4144)
* NewVersion based on different use case
Signed-off-by: pz636264
* middleUpdate
Signed-off-by: pz636264
* remainingChange
Signed-off-by: pz636264
* testNewPc
Signed-off-by: Pavel Zlatnik
* lastDemoUpdates
Signed-off-by: Pavel Zlatnik
* retrofitV3Updates
Signed-off-by: Pavel Zlatnik
* prefix desc update
Signed-off-by: Pavel Zlatnik
* updated prefix
Signed-off-by: Pavel Zlatnik
* portReorder and version
Signed-off-by: Pavel Zlatnik
---------
Signed-off-by: pz636264
Signed-off-by: Pavel Zlatnik
Signed-off-by: MarkAckert
---
workflows/files/ZWEAMLCF.xml | 1451 ++++++++++++++++++++++++++++++++++
1 file changed, 1451 insertions(+)
create mode 100644 workflows/files/ZWEAMLCF.xml
diff --git a/workflows/files/ZWEAMLCF.xml b/workflows/files/ZWEAMLCF.xml
new file mode 100644
index 0000000000..eb12c13736
--- /dev/null
+++ b/workflows/files/ZWEAMLCF.xml
@@ -0,0 +1,1451 @@
+
+
+ true
+
+
+ config_apiml_zowe_30
+ Configuration of APIML for Zowe 3.0
+ Use this simplified workflow to configure APIML for Zowe 3.0
+ ###ZOWE_VERSION###
+ Zowe
+
+
+
+
+
+ Prefix of existing SZWEEXEC Target libraries created during PSWI or SMP/E
+ Prefix of existing SZWEEXEC Target libraries created during PSWI or SMP/E installation phase
+ zowe
+
+
+
+ IBMUSER.ZWEV3
+
+
+
+
+ Where Zowe STCs will be copied over
+ Where Zowe STCs will be copied over
+ zowe
+
+
+
+ USER.PROCLIB
+
+
+
+
+ Zowe PARMLIB
+ Zowe parameter library
+ zowe
+
+
+
+ IBMUSER.ZWEV3.CUST.PARMLIB
+
+
+
+
+ Zowe ZIS plugins PARMLIB
+ Holds PARMLIB members for ZIS plugins
+ zowe
+
+
+
+ ZWESIP00
+
+
+
+
+ JCL library where Zowe will store temporary JCLs during initialization
+ JCL library where Zowe will store temporary JCLs during initialization
+ zowe
+
+
+
+ IBMUSER.ZWEV3.CUST.JCLLIB
+
+
+
+
+ Load library where Zowe stores libraries for Utilities for use by Zowe and extensions
+ Load library for Utilities for use by Zowe and extensions
+ zowe
+
+
+
+ IBMUSER.ZWEV3.SZWELOAD
+
+
+
+
+ APF authorized LOADLIB for Zowe
+ APF authorized LOADLIB for Zowe core
+ zowe
+
+
+
+ IBMUSER.ZWEV3.SZWEAUTH
+
+
+
+
+ APF authorized LOADLIB for Zowe ZIS Plugins
+ APF authorized LOADLIB for Zowe ZIS Plugins
+ zowe
+
+
+
+ IBMUSER.ZWEV3.CUST.ZWESAPL
+
+
+
+
+ Zowe runtime (root) directory with libraries
+ Existing Zowe runtime.<br />
+If you created ZOWE via PSWI, <br />
+zowe runtime is your Target Mount Point from PSWI deployment. <br />
+It is used by ZWESLSTC or by zwe command
+ zowe
+
+ ~?(\/[^\/]+)+
+ Please specify proper full USS path ending without a trailing slash.
+
+
+
+
+ Where to store runtime logs
+ Where to store runtime logs
+ zowe
+
+
+
+ /global/zowe/logs
+
+
+
+
+ Zowe runtime workspace directory
+ Zowe runtime workspace directory
+ zowe
+
+
+
+ /global/zowe/workspace
+
+
+
+
+ Where extensions are installed
+ zowe_extensionDirectory
+ zowe
+
+
+
+ /global/zowe/extensions
+
+
+
+
+ Zowe JES job name
+ Zowe JES job name
+ zowe
+
+
+
+ ZWE1SV
+
+
+
+
+ Prefix of component address space
+ Prefix of component address space
+ zowe
+
+
+
+ ZWE1
+
+
+
+
+ The list of external domains
+ Defines a list of external domains that will be used by the Zowe instance.
+ zowe
+
+
+
+ sample-domain.com
+
+
+
+
+ The port you use to access Zowe Gateway from your web browser
+ This is the port you use to access Zowe Gateway from your web browser.
+In many use cases, this should be same as <b>components.gateway.port</b>. But in
+some use cases, like containerization, this port could be different.
+ zowe
+
+
+
+ 7554
+
+
+
+
+ Set to "debug" or "trace" to display extra debug information
+ Set to "debug" or "trace" to display extra debug information
+ zowe
+
+
+ info
+ debug
+ trace
+ info
+
+
+
+
+ Set to "exit" or "warn" if any component has an error
+ Set to "exit" if you want startup to exit if any component has an error in the configuration stage, otherwise zwe will issue a warning but continue running.
+ zowe
+
+
+ warn
+ exit
+ warn
+
+
+
+
+ Enable on AT-TLS on inbound calls (server)
+ Enable aware mode of inbound AT-TLS rules of all Zowe components.
+ network
+
+
+
+ false
+
+
+
+
+ Enable on AT-TLS on outbound calls (client)
+ Enable aware mode of outbound AT-TLS rules of all Zowe components.
+ network
+
+
+
+ false
+
+
+
+
+ TLS minimum version
+ The default configuration of the minimal version of a security transport protocol for inbound calls.
+ TLS settings only apply when attls=false.
+ Else you must use AT-TLS configuration for TLS customization.
+
+ network
+
+
+ TLSv1.1
+ TLSv1.2
+ TLSv1.3
+ TLSv1.2
+
+
+
+
+ TLS maximum version
+ The default configuration of the maximum version of a security transport protocol for inbound calls.
+ TLS settings only apply when attls=false.
+ Else you must use AT-TLS configuration for TLS customization.
+
+ network
+
+
+ TLSv1.1
+ TLSv1.2
+ TLSv1.3
+ TLSv1.3
+
+
+
+
+ Certificate keystore type (PKCS12, JCERACFKS)
+ Certificate keystore type (PKCS12, JCERACFKS)
+ certificates
+
+
+
+ PKCS12
+ JCERACFKS
+ JCERACFKS
+
+
+
+
+ Zowe certificate keystore file. For keyring, the format is "safkeyring://OWNER/KEYRING".
+ Zowe certificate keystore file
+ certificates
+
+
+
+ safkeyring://OWNER/KEYRING
+
+
+
+
+ Certificate keystore password.
+ Certificate keystore password.
+ certificates
+
+
+ password
+
+
+
+
+ Alias for the certificate keystore
+ Alias for the certificate keystore
+ certificates
+
+
+
+ localhost
+
+
+
+
+ Zowe certificate truststore type
+ Zowe certificate truststore type
+ certificates
+
+
+
+ PKCS12
+ JCERACFKS
+ JCERACFKS
+
+
+
+
+ File location for certificate truststore. For keyring, the format is "safkeyring://OWNER/KEYRING"
+ File location for the certificate truststore
+ certificates
+
+
+
+ safkeyring://OWNER/KEYRING
+
+
+
+
+ Password for the certificate truststore
+ Password for the certificate truststore
+ certificates
+
+
+
+ password
+
+
+
+
+ Path to the JAVA home
+ Path to the JAVA home
+ java
+
+
+
+
+
+
+
+ Path to the Node.js home
+ Path to the Node.js home
+ Node.js
+
+
+
+
+
+
+
+ Hostname of the running z/OSMF instance
+ Hostname of the running z/OSMF instance
+ zOSMF
+
+
+
+ dvipa.my-company.com
+
+
+
+
+ Port of the z/OSMF instance
+ Port of the z/OSMF instance
+ zOSMF
+
+
+
+ 443
+
+
+
+
+ APPLID of the z/OSMF instance
+ APPLID of the z/OSMF instance
+ zOSMF
+
+
+
+ IZUDFLT
+
+
+
+
+ Port for APIML Gateway
+ Port for APIML Gateway
+ components
+
+
+
+ 7554
+
+
+
+
+ Port for APIML ZAAS
+ Port for APIML ZAAS
+ components
+
+
+
+ 7558
+
+
+
+
+ Port on which API Catalog should be running.
+ Port on which API Catalog should be running.
+ components
+
+
+
+ 7552
+
+
+
+
+ Port on which Discovery service should be running
+ Port on which Discovery service should be running
+ components
+
+
+
+ 7553
+
+
+
+
+ Port for Caching service
+ Port for Caching service
+ components
+
+
+
+ 7555
+
+
+
+
+ Port for jgroups
+ Port for jgroups. This is required if storage mode is infinispan.
+ components
+
+
+
+ 7559
+
+
+
+
+ Port for jgroups key exchange
+ Port for jgroups key exchange. This is required if storage mode is infinispan.
+ components
+
+
+
+ 7560
+
+
+
+
+ ID you use to separate multiple Zowe installs
+ ID when determining resource names used in RBAC authorization checks such as dataservices with RBAC expects this ID in SAF resources
+ zowe
+
+
+
+ 1
+
+
+
+
+ ID that can be used by servers to distinguish their cookies from unrelated Zowe installs
+ ID which allows multiple copies of Zowe to be used within the same client
+ zowe
+
+
+
+ 1
+
+
+
+
+ Security product name. Can be RACF, ACF2 or TSS
+ Security product name. Can be RACF, ACF2 or TSS
+ security
+
+
+
+
+ RACF
+ TSS
+ ACF2
+ RACF
+
+
+
+
+ Zowe admin user group
+ Zowe admin user group
+ security
+
+
+
+ ZWEADMIN
+
+
+
+
+
+ Zowe STC group
+ Zowe STC group
+ security
+
+
+
+
+ ZWEADMIN
+
+
+
+
+ Zowe SysProg group
+ Zowe SysProg group
+ security
+
+
+
+
+ ZWEADMIN
+
+
+
+
+ Zowe runtime user name of main service
+ Zowe runtime user name of main service
+ security
+
+
+
+
+ ZWESVUSR
+
+
+
+
+ Zowe runtime user name of ZIS
+ Zowe runtime user name of ZIS
+ security
+
+
+
+
+ ZWESIUSR
+
+
+
+
+ STC name of main service
+ STC name of main service
+ security
+
+
+
+
+ ZWESLSTC
+
+
+
+
+ STC name of ZIS
+ STC name of ZIS
+ security
+
+
+
+
+ ZWESISTC
+
+
+
+
+ STC name of Auxiliary Service
+ STC name of Auxiliary Service
+ security
+
+
+
+
+ ZWESASTC
+
+
+
+
+
+ Define variables
+ Use this step to define the variables for execution
+
+
+ Define the main variables
+ Use this step to define the main variables for Zowe
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Run this step to fill base variables.
+ 1
+ z/OS System Programmer
+ false
+ false
+
+
+
+ Ports
+ Specify ports variables for components
+
+
+
+
+
+
+
+
+ Run this step to specify ports variables for components
+ 1
+ z/OS System Programmer
+ false
+ false
+
+
+
+
+ Create configuration
+ Creates the configuration for the Zowe (APIML)
+
+
+
+
+ Generated yaml file is backward compatible with full Zowe,
+ this workflow is just simplified with focus on easier APIML configuration.
+ Ensure that the values are correct.
+ zowe.yaml file is created in the: ${instance-zowe_runtimeDirectory} directory
+ NOTE: If you run this workflow outside of PSWI (SMP/E or convenience build), you might encounter a folder write permission issue.
+ To solve the issue, run the following command in USS:
+ chmod 775 ${instance-zowe_runtimeDirectory}
+ and change the folder UID to the ID of the user who executes this workflow.
+ Issue the following command:
+ chown ${_workflow-workflowOwner} ${instance-zowe_runtimeDirectory}
+ Re-run the step.
+]]>
+ 1
+ z/OS System Programmer
+ false
+ false
+
+ "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# This program and the accompanying materials are made available under the terms of the' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# Eclipse Public License v2.0 which accompanies this distribution, and is available at' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# https://www.eclipse.org/legal/epl-v20.html' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# SPDX-License-Identifier: EPL-2.0' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# Copyright Contributors to the Zowe Project.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#[[################################################################################]]#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#===============================================================================' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# This is a YAML configuration file for a Zowe instance.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# YAML is a human-friendly data serialization language for all programming languages.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# To learn more about YAML specifications, please check https://yaml.org/.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# To learn more details about the content of this file, please check https://docs.zowe.org/.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# For first time users, or for the most common use cases, please pay more' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# attention to the entries marked with "**COMMONLY_CUSTOMIZED**". A "directory" refers' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# to a directory in z/OS Unix.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# If you modify any settings listed in "zwe init --help" command, you may need to' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# re-run the "zwe init" command to make them take effect.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#===============================================================================' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# Zowe global configurations' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# This section includes Zowe setup information used by `zwe install` and' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# `zwe init` command, as well as default configurations for Zowe runtime.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo 'zowe:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' #-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # These configurations are used by "zwe install" or "zwe init" commands.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' #-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' setup:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # MVS data set related configurations' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' dataset:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # where are existing Zowe SZWEEXEC Target libraries' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' prefix: $!{instance-zowe_setup_dataset_prefix}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # PROCLIB where Zowe STCs will be copied over' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' proclib: $!{instance-zowe_setup_dataset_proclib}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe PARMLIB' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' parmlib: $!{instance-zowe_setup_dataset_parmlib}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Holds Zowe PARMLIB members for plugins' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' parmlibMembers:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # For ZIS plugins' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zis: $!{instance-zowe_setup_dataset_libzis}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # JCL library where Zowe will store temporary JCLs during initialization' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' jcllib: $!{instance-zowe_setup_dataset_jcllib}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Utilities for use by Zowe and extensions' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' loadlib: $!{instance-zowe_setup_dataset_loadlibPlugin}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # APF authorized LOADLIB for Zowe' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' authLoadlib: $!{instance-zowe_setup_dataset_authLoadlib}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # APF authorized LOADLIB for Zowe ZIS Plugins' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' authPluginLib: $!{instance-zowe_setup_dataset_authPluginLib}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Security related configurations. This setup is optional.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' security:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # security product name. Can be RACF, ACF2 or TSS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' product: $!{instance-zowe_setup_security_product}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # security group name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' groups:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe admin user group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' admin: $!{instance-zowe_setup_security_groups_admin}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe STC group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' stc: $!{instance-zowe_setup_security_groups_stc}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe SysProg group' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' sysProg: $!{instance-zowe_setup_security_groups_sysProg}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # security user name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' users:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe runtime user name of main service' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zowe: $!{instance-zowe_setup_security_users_zowe}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe runtime user name of ZIS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zis: $!{instance-zowe_setup_security_users_zis}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # STC names' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' stcs:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # STC name of Zowe main service' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zowe: $!{instance-zowe_setup_security_stcs_zowe}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # STC name of Zowe ZIS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zis: $!{instance-zowe_setup_security_stcs_zis}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # STC name of Zowe ZIS Auxiliary Server' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' aux: $!{instance-zowe_setup_security_stcs_aux}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Certificate related configurations' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' #' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # There are 5 configurations cases. Please choose one from below.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>> Certificate setup scenario 1' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # PKCS12 (keystore) with Zowe generate certificates.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Type of certificate storage. Valid values are: PKCS12, JCEKS, JCECCAKS, JCERACFKS, JCECCARACFKS, or JCEHYBRIDRACFKS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # type: $!{instance-zowe_setup_certificate_type}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # pkcs12:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Keystore directory' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # directory: ' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Lock the keystore directory to only accessible by Zowe runtime user and group.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # lock: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Certificate alias name. Optional, default value is localhost.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Note: please use all lower cases as alias.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # name: localhost' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Keystore password. Optional, default value is password.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # password: password' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Alias name of self-signed certificate authority. Optional, default value is local_ca.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Note: please use all lower cases as alias.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # caAlias: local_ca' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Password of keystore stored self-signed certificate authority. Optional, default value is local_ca_password.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # caPassword: local_ca_password' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Distinguished name for Zowe generated certificates. All optional.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # dname:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # caCommonName: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # commonName: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # orgUnit: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # org: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # locality: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # state: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # country: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Validity days for Zowe generated certificates' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # validity: 3650' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Domain names and IPs should be added into certificate SAN' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # If this field is not defined, `zwe init` command will use' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # `zowe.externalDomains`.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # san:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # sample domain name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # - dvipa.my-company.com' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # sample IP address' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # - 12.34.56.78' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # >>>> Certificate setup scenario 2' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # PKCS12 (keystore) with importing certificate generated by other CA.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Type of certificate storage. Valid values are: PKCS12, JCERACFKS. APIML additionally supports: JCEKS, JCECCAKS, JCECCARACFKS, or JCEHYBRIDRACFKS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # type: PKCS12' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # pkcs12:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Keystore directory' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # directory: /var/zowe/keystore' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Lock the keystore directory to only accessible by Zowe runtime user and group.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # lock: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # Certificate alias name. Optional, default value is localhost.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # Note: please use all lower cases as alias.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # name: localhost' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # Keystore password. Optional, default value is password.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # password: password' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # import:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Existing PKCS12 keystore which holds the certificate issued by external CA.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # keystore: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Password of the above keystore' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # password: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Certificate alias will be imported' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Note: please use all lower cases as alias.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # alias: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # PEM format certificate authorities will also be imported and trusted.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # importCertificateAuthorities:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Path to the certificate authority signed the certificate will be imported.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # - ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # >>>> Certificate setup scenario 3' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Zowe generated z/OS Keyring with Zowe generated certificates.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Type of certificate storage. Valid values are: PKCS12, JCERACFKS. APIML additionally supports: JCEKS, JCECCAKS, JCECCARACFKS, or JCEHYBRIDRACFKS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # type: JCERACFKS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # keyring:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # keyring name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # name: ZoweKeyring' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # Label of Zowe certificate. Optional, default value is localhost.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # label: localhost' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # label of Zowe CA certificate. Optional, default value is localca.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # caLabel: localca' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # Distinguished name for Zowe generated certificates. All optional.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # dname:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # caCommonName: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # commonName: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # orgUnit: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # org: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # locality: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # state: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # country: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # Validity days for Zowe generated certificates' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # validity: 3650' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # Domain names and IPs should be added into certificate SAN' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # If this field is not defined, `zwe init` command will use' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # `zowe.externalDomains`.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # **NOTE**: due to the limitation of RACDCERT command, this field should' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # contain exactly 2 entries with the domain name and IP address.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # san:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # - dvipa.my-company.com' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # - 12.34.56.78' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # >>>> Certificate setup scenario 4' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Zowe generated z/OS Keyring and connect to existing certificate' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Type of certificate storage. Valid values are: PKCS12, JCERACFKS. APIML additionally supports: JCEKS, JCECCAKS, JCECCARACFKS, or JCEHYBRIDRACFKS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # type: JCERACFKS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # keyring:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # keyring name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # name: ZoweKeyring' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # connect:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Current owner of the existing certificate, can be SITE or an user ID.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # user: IBMUSER' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Label of the existing certificate will be connected to Zowe keyring.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # label: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # If you have other certificate authorities want to be trusted in Zowe keyring,' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # list the certificate labels here.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **NOTE**, due to the limitation of RACDCERT command, this field should' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # contain maximum 2 entries.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # importCertificateAuthorities:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # - ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # >>>> Certificate setup scenario 5' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Zowe generated z/OS Keyring with importing certificate stored in data set' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Type of certificate storage. Valid values are: PKCS12, JCERACFKS. APIML additionally supports: JCEKS, JCECCAKS, JCECCARACFKS, or JCEHYBRIDRACFKS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # type: JCERACFKS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # keyring:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # keyring name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # name: ZoweKeyring' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # # Label of Zowe certificate. Optional, default value is localhost.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # label: localhost' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # import:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Name of the data set holds the certificate issued by other CA.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # This data set should be in PKCS12 format and contain private key.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # dsName: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Password for the PKCS12 data set.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # password: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # VSAM configurations if you are using VSAM as Caching Service storage' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' vsam:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # VSAM data set with Record-Level-Sharing enabled or not' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Valid values could be: NONRLS or RLS.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' mode: NONRLS' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Volume name if you are using VSAM in NONRLS mode' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' volume: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Storage class name if you are using VSAM in RLS mode' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' storageClass: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe runtime (root) directory' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' #' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **NOTE**: ' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # 1. if it is not specified and you passed "--update-config" argument' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # when you ran "zwe init" command, this value will be updated with the Zowe' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # runtime where the "zwe" command is located.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' #' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # 2. the runtime directory is designed to be "read only". This is different from the' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # log, workspace, and extension directories. Setting those three to the same parent folder' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # as the runtime directory is unsupported & may cause issues' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' #' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # This value is required by ZWESLSTC to know where is Zowe runtime.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' runtimeDirectory: "$!{instance-zowe_runtimeDirectory}"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Where to store runtime logs' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' logDirectory: $!{instance-zowe_logDirectory}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe runtime workspace directory' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' workspaceDirectory: $!{instance-zowe_workspaceDirectory}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Where extensions are installed' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' extensionDirectory: $!{instance-zowe_extensionDirectory}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' configmgr:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # STRICT=quit on any error, including missing schema' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # COMPONENT-COMPAT=if component missing schema, skip it with warning instead of quit' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' validation: "COMPONENT-COMPAT"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # runtime z/OS job name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' job:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Zowe JES job name' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' name: $!{instance-zowe_job_name}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Prefix of component address space' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' prefix: $!{instance-zowe_job_prefix}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # This is an ID you use to separate multiple Zowe installs when determining' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # resource names used in RBAC authorization checks such as dataservices with RBAC' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # expects this ID in SAF resources' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' rbacProfileIdentifier: "$!{instance-zowe_rbacProfileId}"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # This is an ID that can be used by servers that distinguish their cookies from unrelated Zowe installs, ' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # for purposes such as to allow multiple copies of Zowe to be used within the same client' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' cookieIdentifier: "$!{instance-zowe_cookieId}"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # You can list your external domains on how you want to access Zowe.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # This should be the domain list you would like to put into your web browser'\''s' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # address bar.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' externalDomains:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # this should be the domain name to access Zowe APIML Gateway' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+#foreach($externalDomain in ${instance-zowe_externalDomains.split("\n")})
+echo ' - ${externalDomain}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+#end
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # This is the port you use to access Zowe Gateway from your web browser.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' #' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # In many use cases, this should be same as `components.gateway.port`. But in' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # some use cases, like containerization, this port could be different.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' externalPort: ${instance-zowe_externalPort}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' #' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # In this section, behavior such as which TLS levels, ciphers should be used, and if native TLS versus AT-TLS should be used.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # See the schema for options.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' #' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # This section applies to all components that support it.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # So far: "zss" and "app-server"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' #' >> "${instance-zowe_runtimeDirectory}/zowe.yaml" >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # This section can be overridden per-component by placing it' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Under a "zowe" subsection of a component, as in "components.zss.zowe.network"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' network:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' server:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' tls:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' attls: ${instance-zowe_network_server_attls}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # TLS settings only apply when attls=false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Else you must use AT-TLS configuration for TLS customization.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' minTls: "${instance-zowe_network_server_tls_min}"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' maxTls: "${instance-zowe_network_server_tls_max}"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' client:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' tls:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' attls: ${instance-zowe_network_client_attls}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # You can un-comment and define any extra environment variables as key/value' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # pairs here.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # environments:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Example of a global environment variable for all components' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # MY_ENV_VAR: my_env_val' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Another example to customize SSH port for VT Terminal Desktop app' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # ZWED_SSH_PORT: 22' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # ZWED_TN3270_PORT: 23' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # You can define any Zowe message portions to be checked for and the message added to the' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # system log upon its logging, truncated to 126 characters.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' sysMessages:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Zowe starting' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' - "ZWEL0021I"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Zowe started' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' - "ZWEL0018I"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' - "ZWEL0006I"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Zowe ready to use' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' - "ZWES1601I"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Zowe stopping' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' - "ZWEL0008I"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Zowe stopped' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' - "ZWEL0022I"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Zowe components starting' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' - "ZWEL0001I"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Zowe components stopped' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' - "ZWEL0002I"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # API ML components ready' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' - "ZWEAM000I"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # App server ready' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' - "ZWED0031I"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # ZSS ready' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' - "ZWES1013I"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # # Not limited to Zowe message ID'\''s, you can specify your own string for example:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # - "ERROR"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Enable debug mode for Zowe launch scripts' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' launchScript:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Set to "debug" or "trace" to display extra debug information' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' logLevel: "$!{instance-zowe_launchScript_logLevel}"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Set to "exit" if you'\''d like startup to exit if any component has an error in the configure stage, otherwise zwe will warn but continue.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' onComponentConfigureFail: "$!{instance-zowe_launchScript_CompConf}"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Default Zowe certificate' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' #' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **NOTE**: these fields can be updated automatically if you pass' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # `--update-config` to `zwe init` command. The generated value will base on' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # your setup in `zowe.setup.certificate` section.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' keystore:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' type: $!{instance-zowe_certificate_keystore_type}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # if keyrings, the format is safkeyring:////stcusername/KeyName' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' file: $!{instance-zowe_certificate_keystore_file}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # "password" should either be the value you set when PKCS12, or literally "password" for keyrings.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' password: $!{instance-zowe_certificate_keystore_password}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # alias is the name of your key/cert. When using keyrings, get the Case Sensitive, Space Sensitive value in a TSO list ring.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' alias: $!{instance-zowe_certificate_keystore_alias}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' truststore:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # truststore usually has same values as keystore (minus alias), but can be different if desired.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' type: $!{instance-zowe_certificate_truststore_type}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' file: $!{instance-zowe_certificate_truststore_file}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' password: $!{instance-zowe_certificate_truststore_password}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' pem:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' key: /global/zowe/keystore/localhost/localhost.key' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' certificate: /global/zowe/keystore/localhost/localhost.cer' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # if keyrings, the format is "safkeyring:////stcusername/KeyName&ca name"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' certificateAuthorities: /global/zowe/keystore/local_ca/local_ca.cer' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # How we want to verify SSL certificates of services. Valid values are:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # - STRICT: will validate if the certificate is trusted in our trust store and' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # if the certificate Command Name and Subject Alternative Name (SAN)' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # is validate. This is recommended for the best security.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # - NONSTRICT: will validate if the certificate is trusted in our trust store.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # This mode does not validate certificate Common Name and Subject' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Alternative Name (SAN).' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # - DISABLED: disable certificate validation. This is NOT recommended for' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # security.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' verifyCertificates: STRICT' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# Java configuration' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# Some Zowe components requires Java. Define the path where you have your Java' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# is installed.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# **NOTE**: this field can be updated automatically if you pass `--update-config`' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# to `zwe init` command.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo 'java:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Path to your Java home directory' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' home: "$!{instance-java_home}"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# Node.js configuration' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# Some Zowe components requires Node.js. Define the path where you have your' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# Node.js is installed.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# **NOTE**: this field can be updated automatically if you pass `--update-config`' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# to `zwe init` command.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo 'node:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Path to your Node.js home directory' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' home: "$!{instance-node_home}"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# z/OSMF configuration' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# If your Zowe instance is configured to use z/OSMF for authentication or other' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# features. You need to define how to access your z/OSMF instance.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo 'zOSMF:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Host name of your z/OSMF instance' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' host: $!{instance-zOSMF_host}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' port: ${instance-zOSMF_port}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' applId: $!{instance-zOSMF_applId}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# Zowe components default configurations' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# This section includes default configurations for all Zowe components installed' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# on the Zowe instance.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# Every component should define their own section under `components` with their' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# component ID.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# For each component, they can always have "enabled" property and "certificate"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# property. More configurations for each component can be found in component' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# manifest file.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo 'components:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' gateway:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' port: ${instance-components_gateway_port}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' debug: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' apiml:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' security:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' auth:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' provider: zosmf' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zosmf:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' jwtAutoconfiguration: jwt' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' serviceId: ibmzosmf' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' authorization:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' endpoint:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' provider: "native"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' x509:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # If we customize this to use different external certificate, than should also' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # define "server.internal.ssl.certificate" and enable "server.internal.ssl.enabled".' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # keystore:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # alias: ""' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zaas:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' port: ${instance-components_zaas_port}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' debug: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' api-catalog:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' port: ${instance-components_api_catalog_port}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' debug: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' discovery:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' port: ${instance-components_discovery_port}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' debug: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Define this value to match your number of Discovery StatefulSet if you are running containerized Zowe' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # replicas: 1' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' caching-service:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' port: ${instance-components_caching_service_port}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' debug: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' storage:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' evictionStrategy: reject' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # can be infinispan, inMemory, redis or VSAM(deprecated)' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' mode: infinispan' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' infinispan:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # this is required if storage mode is infinispan' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' jgroups:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' port: ${instance-components_caching_service_storage_infinispan_jgroups_port}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' keyExchange:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' port: ${instance-components_caching_service_storage_infinispan_jgroups_keyExchange_port}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' app-server:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' port: 7556' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' debug: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # we can customize any component with custom certificate' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # the missing definitions will be picked from "zowe.certificate"' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # certificate:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # keystore:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # alias: app-server' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # pem:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # key: /global/zowe/keystore/localhost/localhost.keystore.app-server.key' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # certificate: /global/zowe/keystore/localhost/localhost.keystore.app-server.cer-ebcdic' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' zss:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' port: 7557' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' crossMemoryServerName: ZWESIS_STD' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' agent:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' jwt:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' fallback: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' 64bit: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' explorer-jes:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' explorer-mvs:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' explorer-uss:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # Each extension can have dedicated definition similar to core components.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # my-extension:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # enabled: true' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# Zowe high availability instances customizations' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# This section includes customizations for each Zowe high availability instance.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# You can start each HA instance with `zwe start --ha-instance `.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#-------------------------------------------------------------------------------' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# haInstances:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # HA instance ID' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# lpar1:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # hostname where this instance will be started' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# hostname: lpar1.my-company.com' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # Your &SYSNAME for this LPAR' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # This sysname will be used to route your JES command to target system.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# sysname: LPR1' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # for this HA instance, we did not customize "components", so it will use default value.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # HA instance ID, we will start 2 instances on LPAR2' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # **NOTE**, we can only start one Gateway in same LPAR.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# lpar2a:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # hostname where this instance will be started' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# hostname: lpar2.my-company.com' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # Your &SYSNAME for this LPAR' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # This sysname will be used to route your JES command to target system.' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# sysname: LPR2' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # These configurations will overwrite highest level default "components" configuration' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# components:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# discovery:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # use customized port on this instance' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# port: 17553' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# api-catalog:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# port: 17552' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# app-server:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # no app-server in this instance' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# zss:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # no app-server in this instance' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# caching-service:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# port: 17555' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '#' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# lpar2b:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# hostname: lpar2.my-company.com' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # your &SYSNAME for this LPAR' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# sysname: LPR2' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# # These configurations will overwrite highest level default "components" configuration' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# components:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# zaas:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# gateway:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# discovery:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# api-catalog:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# app-server:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# port: 28544' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# zss:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# port: 28542' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# caching-service:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo '# enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+]]>
+ shell-JCL
+ 1024
+
+
+
+
+ Zowe installation
+ Zowe installation
+
+ Run scripts for Zowe initialization
+ Executes scripts for Zowe initialization
+
+
+
+
+ zwe init mvs -c ${instance-zowe_runtimeDirectory}/zowe.yml --allow-overwrite
+ zwe init stc -c ${instance-zowe_runtimeDirectory}/zowe.yml --allow-overwrite
+
+ NOTE:
+ Each zwe init sub-command defines a configuration.
+
+
mvs: Copy the data sets provided with Zowe to custom data sets.
+
stc: Configure the system to launch the Zowe started task.
+
+ ]]>
+ 1
+ z/OS System Programmer
+ false
+ false
+
+ set -e
+set -x
+
+export JAVA_HOME='${instance-java_home}'
+export NODE_HOME='${instance-node_home}'
+
+export PATH=$PATH:'${instance-zowe_runtimeDirectory}/bin'
+
+zwe init mvs -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
+zwe init stc -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
+
+ shell-JCL
+ 1024
+
+
+
+
+
From dffe29e805aae25ceece2bbb980304da7855b4b4 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Pavel=20Jare=C5=A1?=
Date: Thu, 23 Jan 2025 14:12:13 +0100
Subject: [PATCH 116/121] update apiml dependencies
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Signed-off-by: Pavel Jareš
---
manifest.json.template | 26 +++++++++++++-------------
1 file changed, 13 insertions(+), 13 deletions(-)
diff --git a/manifest.json.template b/manifest.json.template
index 38a7a507bd..5d187d53ef 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -65,23 +65,23 @@
"artifact": "explorer-ip*.pax"
},
"org.zowe.apiml.api-catalog-package": {
- "version": "3.1.3",
+ "version": "3.1.4",
"artifact": "api-catalog-*.zip"
},
"org.zowe.apiml.discovery-package": {
- "version": "3.1.3",
+ "version": "3.1.4",
"artifact": "discovery-*.zip"
},
"org.zowe.apiml.gateway-package": {
- "version": "3.1.3",
+ "version": "3.1.4",
"artifact": "gateway-*.zip"
},
"org.zowe.apiml.caching-service-package": {
- "version": "3.1.3",
+ "version": "3.1.4",
"artifact": "caching-service-*.zip"
},
"org.zowe.apiml.apiml-common-lib-package": {
- "version": "3.1.3",
+ "version": "3.1.4",
"artifact": "apiml-common-lib-*.zip"
},
"org.zowe.apiml.sdk.common-java-lib-package": {
@@ -89,11 +89,11 @@
"artifact": "common-java-lib-*.zip"
},
"org.zowe.apiml.sdk.apiml-sample-extension-package": {
- "version": "3.1.3",
+ "version": "3.1.4",
"artifact": "apiml-sample-extension-*.zip"
},
"org.zowe.apiml.zaas-package": {
- "version": "3.1.3",
+ "version": "3.1.4",
"artifact": "zaas-package-*.zip"
},
"org.zowe.getesm": {
@@ -133,7 +133,7 @@
"componentGroup": "Zowe API Mediation Layer",
"entries": [{
"repository": "api-layer",
- "tag": "v3.1.3",
+ "tag": "v3.1.4",
"destinations": ["Zowe PAX"]
}]
}, {
@@ -369,28 +369,28 @@
"api-catalog": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/api-catalog-services",
- "tag" : "3.1.3-ubuntu"
+ "tag" : "3.1.4-ubuntu"
},
"gateway": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/gateway-service",
- "tag" : "3.1.3-ubuntu"
+ "tag" : "3.1.4-ubuntu"
},
"caching": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/caching-service",
- "tag" : "3.1.3-ubuntu"
+ "tag" : "3.1.4-ubuntu"
},
"discovery": {
"kind": "statefulset",
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/discovery-service",
- "tag" : "3.1.3-ubuntu"
+ "tag" : "3.1.4-ubuntu"
},
"zaas": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/zaas-service",
- "tag" : "3.1.3-ubuntu"
+ "tag" : "3.1.4-ubuntu"
},
"app-server": {
"registry": "zowe-docker-release.jfrog.io",
From ae0448b4c97b73262e930064c4417206108c6a1c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Pavel=20Jare=C5=A1?=
Date: Fri, 24 Jan 2025 09:55:43 +0100
Subject: [PATCH 117/121] enable debug for the Gateway
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Signed-off-by: Pavel Jareš
---
playbooks/roles/custom_for_test/tasks/main.yml | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/playbooks/roles/custom_for_test/tasks/main.yml b/playbooks/roles/custom_for_test/tasks/main.yml
index ea85b09568..b735d87db3 100644
--- a/playbooks/roles/custom_for_test/tasks/main.yml
+++ b/playbooks/roles/custom_for_test/tasks/main.yml
@@ -161,7 +161,8 @@
# debug mode for troubleshooting/profiling
"zowe.launchScript.logLevel": "trace"
# # this must be commented out to avoid flooding spool
- # "components.gateway.debug": "true"
+ "components.gateway.debug": "true"
+ "components.gateway.sslDebug": "all"
# # trace java apps
# "zowe.environments.LOGGING_LEVEL_ORG_APACHE_HTTP": "TRACE"
# "zowe.environments.LOGGING_LEVEL_ORG_APACHE": "TRACE"
From 058714e52be2010b77ecf236b019e88940151d2c Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Pavel=20Jare=C5=A1?=
Date: Fri, 24 Jan 2025 17:21:32 +0100
Subject: [PATCH 118/121] update versions to 3.1.5
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Signed-off-by: Pavel Jareš
---
manifest.json.template | 26 +++++++++++++-------------
1 file changed, 13 insertions(+), 13 deletions(-)
diff --git a/manifest.json.template b/manifest.json.template
index 5d187d53ef..bb4c24389b 100644
--- a/manifest.json.template
+++ b/manifest.json.template
@@ -65,23 +65,23 @@
"artifact": "explorer-ip*.pax"
},
"org.zowe.apiml.api-catalog-package": {
- "version": "3.1.4",
+ "version": "3.1.5",
"artifact": "api-catalog-*.zip"
},
"org.zowe.apiml.discovery-package": {
- "version": "3.1.4",
+ "version": "3.1.5",
"artifact": "discovery-*.zip"
},
"org.zowe.apiml.gateway-package": {
- "version": "3.1.4",
+ "version": "3.1.5",
"artifact": "gateway-*.zip"
},
"org.zowe.apiml.caching-service-package": {
- "version": "3.1.4",
+ "version": "3.1.5",
"artifact": "caching-service-*.zip"
},
"org.zowe.apiml.apiml-common-lib-package": {
- "version": "3.1.4",
+ "version": "3.1.5",
"artifact": "apiml-common-lib-*.zip"
},
"org.zowe.apiml.sdk.common-java-lib-package": {
@@ -89,11 +89,11 @@
"artifact": "common-java-lib-*.zip"
},
"org.zowe.apiml.sdk.apiml-sample-extension-package": {
- "version": "3.1.4",
+ "version": "3.1.5",
"artifact": "apiml-sample-extension-*.zip"
},
"org.zowe.apiml.zaas-package": {
- "version": "3.1.4",
+ "version": "3.1.5",
"artifact": "zaas-package-*.zip"
},
"org.zowe.getesm": {
@@ -133,7 +133,7 @@
"componentGroup": "Zowe API Mediation Layer",
"entries": [{
"repository": "api-layer",
- "tag": "v3.1.4",
+ "tag": "v3.1.5",
"destinations": ["Zowe PAX"]
}]
}, {
@@ -369,28 +369,28 @@
"api-catalog": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/api-catalog-services",
- "tag" : "3.1.4-ubuntu"
+ "tag" : "3.1.5-ubuntu"
},
"gateway": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/gateway-service",
- "tag" : "3.1.4-ubuntu"
+ "tag" : "3.1.5-ubuntu"
},
"caching": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/caching-service",
- "tag" : "3.1.4-ubuntu"
+ "tag" : "3.1.5-ubuntu"
},
"discovery": {
"kind": "statefulset",
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/discovery-service",
- "tag" : "3.1.4-ubuntu"
+ "tag" : "3.1.5-ubuntu"
},
"zaas": {
"registry": "zowe-docker-release.jfrog.io",
"name": "ompzowe/zaas-service",
- "tag" : "3.1.4-ubuntu"
+ "tag" : "3.1.5-ubuntu"
},
"app-server": {
"registry": "zowe-docker-release.jfrog.io",
From 529bd4e4d8602d945c0ad11c5e3d4a1939ca77eb Mon Sep 17 00:00:00 2001
From: MarkAckert
Date: Fri, 24 Jan 2025 12:28:59 -0500
Subject: [PATCH 119/121] revert trace logs
Signed-off-by: MarkAckert
---
playbooks/roles/custom_for_test/tasks/main.yml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/playbooks/roles/custom_for_test/tasks/main.yml b/playbooks/roles/custom_for_test/tasks/main.yml
index b735d87db3..193f46397f 100644
--- a/playbooks/roles/custom_for_test/tasks/main.yml
+++ b/playbooks/roles/custom_for_test/tasks/main.yml
@@ -161,8 +161,8 @@
# debug mode for troubleshooting/profiling
"zowe.launchScript.logLevel": "trace"
# # this must be commented out to avoid flooding spool
- "components.gateway.debug": "true"
- "components.gateway.sslDebug": "all"
+ # "components.gateway.debug": "true"
+ # "components.gateway.sslDebug": "all"
# # trace java apps
# "zowe.environments.LOGGING_LEVEL_ORG_APACHE_HTTP": "TRACE"
# "zowe.environments.LOGGING_LEVEL_ORG_APACHE": "TRACE"
From 4c4c4de94de4a1a38638015ad4a28b977912c44d Mon Sep 17 00:00:00 2001
From: pavelzlatnik <45940302+pavelzlatnik@users.noreply.github.com>
Date: Fri, 24 Jan 2025 19:33:01 +0100
Subject: [PATCH 120/121] Merge pull request #4154 from
zowe/user/zlatnikp/wfpackage
add new APIML wf to PSWI
Signed-off-by: MarkAckert
---
pswi/03_create.sh | 8 +++++++-
pswi/scripts/deploy_test_2_3.py | 3 +++
2 files changed, 10 insertions(+), 1 deletion(-)
diff --git a/pswi/03_create.sh b/pswi/03_create.sh
index e339903577..115c2dafc8 100644
--- a/pswi/03_create.sh
+++ b/pswi/03_create.sh
@@ -29,7 +29,8 @@ echo "z/OSMF version :" $ZOSMF_V
ADD_SWI_JSON='{"name":"'${SWI_NAME}'","system":"'${ZOSMF_SYSTEM}'","description":"ZOWE v'${VERSION}' Portable Software Instance",
"globalzone":"'${GLOBAL_ZONE}'","targetzones":["'${TZONE}'"],"workflows":[{"name":"ZOWE Mount Workflow","description":"This workflow performs mount action of ZOWE zFS.",
"location": {"dsname":"'${WORKFLOW_DSN}'(ZWEWRF02)"}},{"name":"ZOWE Configuration of Zowe 3.0","description":"This workflow configures Zowe v3.0.",
-"location": {"dsname":"'${WORKFLOW_DSN}'(ZWECONF)"}},{"name":"ZOWE Creation of CSR request workflow","description":"This workflow creates a certificate sign request.",
+"location": {"dsname":"'${WORKFLOW_DSN}'(ZWECONF)"}},{"name":"ZOWE APIML optimized Configuration","description":"This simplified workflow configures APIML for Zowe 3.0.",
+"location": {"dsname":"'${WORKFLOW_DSN}'(ZWEAMLCF)"}},{"name":"ZOWE Creation of CSR request workflow","description":"This workflow creates a certificate sign request.",
"location": {"dsname":"'${WORKFLOW_DSN}'(ZWECRECR)"}},{"name":"ZOWE Sign a CSR request","description":"This workflow signs the certificate sign request by a local CA.",
"location": {"dsname":"'${WORKFLOW_DSN}'(ZWESIGNC)"}},{"name":"ZOWE Load Authentication Certificate into ESM","description":"This workflow loads a signed client authentication certificate to the ESM.",
"location": {"dsname":"'${WORKFLOW_DSN}'(ZWELOADC)"}},{"name":"ZOWE Define key ring and certificates","description":"This workflow defines key ring and certificates for Zowe.",
@@ -145,6 +146,11 @@ echo "target=\"//'${WORKFLOW_DSN}(ZWESIGNC)'\";" >>JCL
echo "iconv -f ISO8859-1 -t IBM-1047 \$source > _ZWESIGNC;" >>JCL
echo "sed 's|UTF-8|IBM-1047|g' _ZWESIGNC > ZWESIGNC;" >>JCL
echo "cp -T ZWESIGNC \$target;" >>JCL
+echo "source=\"${ZOWE_MOUNT}files/workflows/ZWEAMLCF.xml\";" >>JCL
+echo "target=\"//'${WORKFLOW_DSN}(ZWEAMLCF)'\";" >>JCL
+echo "iconv -f ISO8859-1 -t IBM-1047 \$source > _ZWEAMLCF;" >>JCL
+echo "sed 's|UTF-8|IBM-1047|g' _ZWEAMLCF > ZWEAMLCF;" >>JCL
+echo "cp -T ZWEAMLCF \$target;" >>JCL
echo "source=\"${ZOWE_MOUNT}files/workflows/ZWECONF.xml\";" >>JCL
echo "target=\"//'${WORKFLOW_DSN}(ZWECONF)'\";" >>JCL
echo "iconv -f ISO8859-1 -t IBM-1047 \$source > _ZWECONF;" >>JCL
diff --git a/pswi/scripts/deploy_test_2_3.py b/pswi/scripts/deploy_test_2_3.py
index aa51b4976d..4779653002 100644
--- a/pswi/scripts/deploy_test_2_3.py
+++ b/pswi/scripts/deploy_test_2_3.py
@@ -315,6 +315,9 @@ def create_swi(self):
{"name": "ZOWE Configuration of Zowe 3.0",
"description": "This workflow configures Zowe v3.0.",
"location": {"dsname": self.hlq + ".WORKFLOW(ZWECONF)"}},
+ {"name": "ZOWE APIML optimized Configuration",
+ "description": "This simplified workflow configures APIML for Zowe 3.0.",
+ "location": {"dsname": self.hlq + ".WORKFLOW(ZWEAMLCF)"}},
{"name": "ZOWE Creation of CSR request workflow",
"description": "This workflow creates a certificate sign request.",
"location": {"dsname": self.hlq + ".WORKFLOW(ZWECRECR)"}},
From 7fd82e7531c6a88099df1e91030f4db875df66c4 Mon Sep 17 00:00:00 2001
From: Mark Ackert <35308966+MarkAckert@users.noreply.github.com>
Date: Mon, 3 Feb 2025 14:42:45 -0500
Subject: [PATCH 121/121] Merge pull request #4161 from
zowe/user/zlatnikp/installstep (#4168)
User/zlatnikp/installstep
Signed-off-by: MarkAckert
Co-authored-by: pavelzlatnik <45940302+pavelzlatnik@users.noreply.github.com>
---
example-zowe.yaml | 2 +-
pswi/03_create.sh | 6 +--
pswi/scripts/deploy_test_2_3.py | 10 ++--
pswi/scripts/wf_run_test.sh | 4 +-
workflows/files/ZWEAMLCF.xml | 63 ++++++++++++++++++------
workflows/files/ZWECONF.properties | 9 ----
workflows/files/ZWECONF.xml | 79 ++++++++++++------------------
7 files changed, 90 insertions(+), 83 deletions(-)
diff --git a/example-zowe.yaml b/example-zowe.yaml
index 726cf64608..78d0ffb1c2 100644
--- a/example-zowe.yaml
+++ b/example-zowe.yaml
@@ -39,7 +39,7 @@ zowe:
# MVS data set related configurations
dataset:
# **COMMONLY_CUSTOMIZED**
- # where are existing Zowe SZWEEXEC Target libraries
+ # where Zowe MVS data sets will be installed
prefix: IBMUSER.ZWEV3
# **COMMONLY_CUSTOMIZED**
# PROCLIB where Zowe STCs will be copied over
diff --git a/pswi/03_create.sh b/pswi/03_create.sh
index 115c2dafc8..cacd595748 100644
--- a/pswi/03_create.sh
+++ b/pswi/03_create.sh
@@ -28,9 +28,9 @@ echo "z/OSMF version :" $ZOSMF_V
# JSONs
ADD_SWI_JSON='{"name":"'${SWI_NAME}'","system":"'${ZOSMF_SYSTEM}'","description":"ZOWE v'${VERSION}' Portable Software Instance",
"globalzone":"'${GLOBAL_ZONE}'","targetzones":["'${TZONE}'"],"workflows":[{"name":"ZOWE Mount Workflow","description":"This workflow performs mount action of ZOWE zFS.",
-"location": {"dsname":"'${WORKFLOW_DSN}'(ZWEWRF02)"}},{"name":"ZOWE Configuration of Zowe 3.0","description":"This workflow configures Zowe v3.0.",
-"location": {"dsname":"'${WORKFLOW_DSN}'(ZWECONF)"}},{"name":"ZOWE APIML optimized Configuration","description":"This simplified workflow configures APIML for Zowe 3.0.",
-"location": {"dsname":"'${WORKFLOW_DSN}'(ZWEAMLCF)"}},{"name":"ZOWE Creation of CSR request workflow","description":"This workflow creates a certificate sign request.",
+"location": {"dsname":"'${WORKFLOW_DSN}'(ZWEWRF02)"}},{"name":"Stand-alone Zowe API ML Configuration","description":"This workflow configures only API ML for Zowe 3.0.",
+"location": {"dsname":"'${WORKFLOW_DSN}'(ZWEAMLCF)"}},{"name":"Full Zowe server-side configuration for Zowe 3.0","description":"This workflow configures all Zowe server-side components for Zowe v3.0.",
+"location": {"dsname":"'${WORKFLOW_DSN}'(ZWECONF)"}},{"name":"ZOWE Creation of CSR request workflow","description":"This workflow creates a certificate sign request.",
"location": {"dsname":"'${WORKFLOW_DSN}'(ZWECRECR)"}},{"name":"ZOWE Sign a CSR request","description":"This workflow signs the certificate sign request by a local CA.",
"location": {"dsname":"'${WORKFLOW_DSN}'(ZWESIGNC)"}},{"name":"ZOWE Load Authentication Certificate into ESM","description":"This workflow loads a signed client authentication certificate to the ESM.",
"location": {"dsname":"'${WORKFLOW_DSN}'(ZWELOADC)"}},{"name":"ZOWE Define key ring and certificates","description":"This workflow defines key ring and certificates for Zowe.",
diff --git a/pswi/scripts/deploy_test_2_3.py b/pswi/scripts/deploy_test_2_3.py
index 4779653002..db4f94e85e 100644
--- a/pswi/scripts/deploy_test_2_3.py
+++ b/pswi/scripts/deploy_test_2_3.py
@@ -312,12 +312,12 @@ def create_swi(self):
{"name": "ZOWE Mount Workflow",
"description": "This workflow performs mount action of ZOWE zFS.",
"location": {"dsname": self.hlq + ".WORKFLOW(ZWEWRF02)"}},
- {"name": "ZOWE Configuration of Zowe 3.0",
- "description": "This workflow configures Zowe v3.0.",
- "location": {"dsname": self.hlq + ".WORKFLOW(ZWECONF)"}},
- {"name": "ZOWE APIML optimized Configuration",
- "description": "This simplified workflow configures APIML for Zowe 3.0.",
+ {"name": "Stand-alone Zowe API ML Configuration",
+ "description": "This workflow configures only API ML for Zowe 3.0.",
"location": {"dsname": self.hlq + ".WORKFLOW(ZWEAMLCF)"}},
+ {"name": "Full Zowe server-side configuration for Zowe 3.0",
+ "description": "This workflow configures all Zowe server-side components for Zowe v3.0.",
+ "location": {"dsname": self.hlq + ".WORKFLOW(ZWECONF)"}},
{"name": "ZOWE Creation of CSR request workflow",
"description": "This workflow creates a certificate sign request.",
"location": {"dsname": self.hlq + ".WORKFLOW(ZWECRECR)"}},
diff --git a/pswi/scripts/wf_run_test.sh b/pswi/scripts/wf_run_test.sh
index 7429c91a9a..ce60402338 100755
--- a/pswi/scripts/wf_run_test.sh
+++ b/pswi/scripts/wf_run_test.sh
@@ -83,8 +83,8 @@ if [ "$run" = "run" ]; then
echo "Checking if the workflow is ZWECONF" >>$LOG_DIR/report.txt
if [ "$ZWECONF" = "ZWECONF" ]; then
STEP_NAME=$(echo $RESP | grep -o '"currentStepName":".*"' | cut -f4 -d\")
- if [ "$STEP_NAME" = "init_zowe" ]; then
- echo "The workflow is ZWECONF and should end in step 'init_zowe'"
+ if [ "$STEP_NAME" = "install_zowe" ]; then
+ echo "The workflow is ZWECONF and should end in step 'install_zowe', first step of 'zowe_installation_steps'"
STATUS="FINISHED"
else
echo "The workflow is ZWECONF but ended in different step: '$STEP_NAME'" >>$LOG_DIR/report.txt
diff --git a/workflows/files/ZWEAMLCF.xml b/workflows/files/ZWEAMLCF.xml
index eb12c13736..d47f87945f 100644
--- a/workflows/files/ZWEAMLCF.xml
+++ b/workflows/files/ZWEAMLCF.xml
@@ -4,17 +4,17 @@
config_apiml_zowe_30
- Configuration of APIML for Zowe 3.0
- Use this simplified workflow to configure APIML for Zowe 3.0
+ Configuration of API ML for Zowe 3.0
+ Use this simplified workflow to configure API ML for Zowe 3.0###ZOWE_VERSION###Zowe
-
- Prefix of existing SZWEEXEC Target libraries created during PSWI or SMP/E
- Prefix of existing SZWEEXEC Target libraries created during PSWI or SMP/E installation phase
+
+ Prefix of datasets where remaining runtime datasets will be created
+ Prefix of datasets where remaining runtime libraries will be created within execution of Zowe install step (SZWEAUTH, SZWESAMP, SZWEEXEC, SZWELOAD)zowe
@@ -405,8 +405,8 @@ some use cases, like containerization, this port could be different.
- Port for APIML Gateway
- Port for APIML Gateway
+ Port for API ML Gateway
+ Port for API ML Gatewaycomponents
@@ -416,8 +416,8 @@ some use cases, like containerization, this port could be different.
- Port for APIML ZAAS
- Port for APIML ZAAS
+ Port for API ML ZAAS
+ Port for API ML ZAAScomponents
@@ -698,13 +698,13 @@ some use cases, like containerization, this port could be different.
Create configuration
- Creates the configuration for the Zowe (APIML)
+ Creates the configuration for the Zowe (API ML)
-
+
Generated yaml file is backward compatible with full Zowe,
- this workflow is just simplified with focus on easier APIML configuration.
+ this workflow is just simplified with focus on easier API ML configuration.
Ensure that the values are correct. zowe.yaml file is created in the: ${instance-zowe_runtimeDirectory} directory
NOTE: If you run this workflow outside of PSWI (SMP/E or convenience build), you might encounter a folder write permission issue.
@@ -767,7 +767,7 @@ echo ' setup:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # MVS data set related configurations' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' dataset:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # where are existing Zowe SZWEEXEC Target libraries' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # where Zowe MVS data sets will be installed' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' prefix: $!{instance-zowe_setup_dataset_prefix}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # PROCLIB where Zowe STCs will be copied over' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
@@ -1407,11 +1407,46 @@ echo '# enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
Zowe installation
- Zowe installation
+ Zowe installation
+
+ Run the Zowe install
+ Configure Zowe.
+
+
+
+ zwe install -c ${instance-zowe_runtimeDirectory}/zowe.yml
+ Will create remaining runtime data sets under zowe.setup.dataset.prefix definition,
+ i.e. under specified prefix ${instance-zowe_setup_dataset_prefix}:
+ SZWEAUTH contains few Zowe load modules (++PROGRAM).
+ SZWESAMP contains several sample configurations.
+ SZWEEXEC contains few utilities used by Zowe.
+ SZWELOAD contains config manager for REXX.
+ ]]>
+ 1
+ z/OS System Programmer
+ false
+ false
+
+ set -e
+set -x
+
+export JAVA_HOME='${instance-java_home}'
+export NODE_HOME='${instance-node_home}'
+
+export PATH=$PATH:'${instance-zowe_runtimeDirectory}/bin'
+
+zwe install -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
+ shell-JCL
+ 1024
+
+
+ Run scripts for Zowe initializationExecutes scripts for Zowe initialization
+
-
- Prefix of existing SZWEEXEC Target libraries created during PSWI or SMP/E
- Prefix of existing SZWEEXEC Target libraries created during PSWI or SMP/E installation phase
+
+ Prefix of datasets where remaining runtime datasets will be created
+ Prefix of datasets where remaining runtime libraries will be created within execution of Zowe install step (SZWEAUTH, SZWESAMP, SZWEEXEC, SZWELOAD)zowe
@@ -514,8 +514,8 @@ How we want to verify SSL certificates of services. Valid values are:
- Port for the APIML Gateway
- Port for the APIML Gateway
+ Port for the API ML Gateway
+ Port for the API ML Gatewaycomponents
@@ -535,9 +535,9 @@ How we want to verify SSL certificates of services. Valid values are:
-
- Check this option to enable APIML ZAAS
- Check this option to enable APIML ZAAS
+
+ Check this option to enable API ML ZAAS
+ Check this option to enable API ML ZAAScomponents
@@ -547,8 +547,8 @@ How we want to verify SSL certificates of services. Valid values are:
- Port for APIML ZAAS
- Port for APIML ZAAS
+ Port for API ML ZAAS
+ Port for API ML ZAAScomponents
@@ -568,7 +568,7 @@ How we want to verify SSL certificates of services. Valid values are:
-
+
Authorization provider for the GatewayAuthorization provider for the Gatewaycomponents
@@ -579,7 +579,7 @@ How we want to verify SSL certificates of services. Valid values are:
-
+
JWT auto configuration for Gateway security authJWT auto configuration for Gateway security authcomponents
@@ -592,7 +592,7 @@ How we want to verify SSL certificates of services. Valid values are:
-
+
Service ID for Gateway security authService ID for Gateway security authcomponents
@@ -603,7 +603,7 @@ How we want to verify SSL certificates of services. Valid values are:
-
+
Use this to enable the security authorization endpointUse this to enable the security authorization endpointcomponents
@@ -614,7 +614,7 @@ How we want to verify SSL certificates of services. Valid values are:
-
+
Security authorization provider for the GatewaySecurity authorization provider for the Gatewaycomponents
@@ -625,7 +625,7 @@ How we want to verify SSL certificates of services. Valid values are:
-
+
Check to enable the Gateway security x509Check to enable the Gateway security x509components
@@ -1067,20 +1067,7 @@ How we want to verify SSL certificates of services. Valid values are:
ZWESASTC
-
-
-
- Check to enable this run step with the zwe install command. For convenience build only.
- Check this option to enable the optional workflow step with zwe install command. After Zowe convenience build is extracted,
- you can enable this flag to run the zwe install command to install MVS data sets within this workflow run.
- This option is for convenience build only. SMP/E installs the MVS data sets during installation.
- installMVSDatasets
-
-
-
- false
-
-
+
@@ -1152,8 +1139,7 @@ How we want to verify SSL certificates of services. Valid values are:
-
-
+ Run this step to fill base variables.1z/OS System Programmer
@@ -1475,7 +1461,7 @@ echo ' setup:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # MVS data set related configurations' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' dataset:' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
-echo ' # where are existing Zowe SZWEEXEC Target libraries' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
+echo ' # where Zowe MVS data sets will be installed' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' prefix: $!{instance-zowe_setup_dataset_prefix}' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # **COMMONLY_CUSTOMIZED**' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
echo ' # PROCLIB where Zowe STCs will be copied over' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
@@ -2225,26 +2211,21 @@ echo '# enabled: false' >> "${instance-zowe_runtimeDirectory}/zowe.yaml"
Zowe installationZowe installation
-
- Run the Zowe install (only for convenience build)
- Configure Zowe.
+
+ Run the Zowe install
+ Configure Zowe.
-
- 1==1
- Always true
-
-
- Skips this step if Install the MVS data sets was not selected
- !${instance-zowe_setup_installStep_enabled}
- skipped
-
-
- zwe install -c ${instance-zowe_runtimeDirectory}/zowe.yml
+ This step runs the command: zwe install -c ${instance-zowe_runtimeDirectory}/zowe.yml
+ Will create remaining runtime data sets under zowe.setup.dataset.prefix definition,
+ i.e. under specified prefix ${instance-zowe_setup_dataset_prefix}:
+ SZWEAUTH contains few Zowe load modules (++PROGRAM).
+ SZWESAMP contains several sample configurations.
+ SZWEEXEC contains few utilities used by Zowe.
+ SZWELOAD contains config manager for REXX.
]]>1z/OS System Programmer
@@ -2264,7 +2245,7 @@ zwe install -c '${instance-zowe_runtimeDirectory}/zowe.yaml' --allow-overwrite
1024
-
+ Run scripts for Zowe initializationExecutes scripts for Zowe initialization