From 0e83a2c84dd3468384965bab9f3061784a1f9179 Mon Sep 17 00:00:00 2001 From: 1000TurquoisePogs Date: Thu, 27 Jul 2023 16:17:42 -0400 Subject: [PATCH] Allow bypassing zos version check with env var ZWE_zowe_launcher_unsafeDisableZosVersionCheck Signed-off-by: 1000TurquoisePogs --- c/le.c | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/c/le.c b/c/le.c index 575dcdf77..09c7dc034 100644 --- a/c/le.c +++ b/c/le.c @@ -120,9 +120,15 @@ void abortIfUnsupportedCAA() { unsigned int zosVersion = ecvt->ecvtpseq; #ifndef METTLE if (zosVersion > LE_MAX_SUPPORTED_ZOS) { - printf("error: z/OS version = 0x%08X, max supported version = 0x%08X - " - "CAA fields require verification\n", zosVersion, LE_MAX_SUPPORTED_ZOS); - abort(); + const char *continueWithWarning = getenv("ZWE_zowe_launcher_unsafeDisableZosVersionCheck"); + if (!strcmp(continueWithWarning, "true")) { + printf("warning: z/OS version = 0x%08X, max supported version = 0x%08X - " + "CAA fields require verification\n", zosVersion, LE_MAX_SUPPORTED_ZOS); + } else { + printf("error: z/OS version = 0x%08X, max supported version = 0x%08X - " + "CAA fields require verification\n", zosVersion, LE_MAX_SUPPORTED_ZOS); + abort(); + } } #else /* Metal uses its own copy of CAA, reserved fields will always be available */