Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

API ML v3 #3708

Merged
merged 65 commits into from
Mar 27, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
65 commits
Select commit Hold shift + click to select a range
2e5842e
accept different keyring types
achmelo Jan 19, 2024
da3b458
enable java 17
achmelo Jan 19, 2024
46ccd88
point to java17 v3 components
taban03 Jan 22, 2024
9a44dbc
fix
taban03 Jan 22, 2024
2d68033
fix manifest
taban03 Jan 22, 2024
679ca85
attempt
taban03 Jan 22, 2024
b914956
attempt
taban03 Jan 22, 2024
e73f248
fix cs path
taban03 Jan 22, 2024
b9499c9
test - point to new build
taban03 Jan 30, 2024
dd4af3b
revert manifest.json back
taban03 Feb 2, 2024
9fe698e
Merge branch 'v3.x/staging' into apiml/init-v3-apiml
MarkAckert Feb 2, 2024
52fcc5d
Merge branch 'v3.x/staging' into apiml/init-v3-apiml
taban03 Feb 6, 2024
447e143
apiml v3
achmelo Feb 8, 2024
b3c04bc
pax with gateway v2
Feb 14, 2024
f1e306a
gateway v3 package
Feb 14, 2024
c93ce2c
print ca cert
achmelo Feb 15, 2024
7dd446b
use print_message
achmelo Feb 15, 2024
44c0606
convert to ebcdic for print
achmelo Feb 15, 2024
2fffaba
remove ensure encoding
achmelo Feb 15, 2024
7b3dbbe
export cert in binary
achmelo Feb 16, 2024
4dcd98e
revert rfc list
achmelo Feb 16, 2024
5a9bb63
legacy flag as default
achmelo Feb 16, 2024
43a8028
try to detect java version and adjust cert behavior
MarkAckert Feb 16, 2024
b342dbf
remove debug, remove cert iconv when using Java8
MarkAckert Feb 16, 2024
8917c59
update RACFInputStream package location
MarkAckert Feb 16, 2024
051dd8f
use java17 to create PAX
MarkAckert Feb 16, 2024
611e728
convert to ebcdic trustedcerts exports only
achmelo Feb 19, 2024
9006658
use correct serviceid for zosmf
achmelo Feb 19, 2024
737e29e
use zosmf endpoint for test instead of jobs
achmelo Feb 20, 2024
dfbfa24
use java 17 only
achmelo Feb 20, 2024
4b24fdc
use only keytool flags valid for java 17
achmelo Feb 20, 2024
4e2c2ef
print java version before running command
achmelo Feb 20, 2024
64430b6
more debug logs for java version
achmelo Feb 20, 2024
5602b5e
revert metrics
achmelo Feb 20, 2024
53b9512
remove jobs and dataset tests
achmelo Feb 20, 2024
836940e
pass config as argument to verify-fingerprints
achmelo Feb 20, 2024
509efeb
replace jobs call with direct zosmf alternative
achmelo Feb 20, 2024
fe12eb8
comma
achmelo Feb 21, 2024
9dbc82a
add csrf zosmf header
achmelo Feb 21, 2024
c37bc63
remove debug messages
achmelo Feb 21, 2024
9180a78
Merge branch 'v3.x/staging' into apiml/init-v3-apiml
MarkAckert Feb 21, 2024
da9e01e
Merge remote-tracking branch 'origin/apiml/init-v3-apiml' into apiml/…
achmelo Feb 21, 2024
d2c0c04
apiml keyring test build
achmelo Mar 6, 2024
7bd0e4c
zlux v3
achmelo Mar 6, 2024
63426d2
specific artifact
achmelo Mar 6, 2024
ca94ab5
not tar
achmelo Mar 6, 2024
55e22a2
2 slashes in keyring path
achmelo Mar 8, 2024
a9fffdb
do not enable jobs and files
achmelo Mar 11, 2024
4bdc747
remove deprecated components
pj892031 Mar 12, 2024
a7274c1
update number of components
pj892031 Mar 12, 2024
1199ae0
remove jobs, dataset, metrics and ims
pj892031 Mar 12, 2024
ac6bded
Revert "remove jobs, dataset, metrics and ims"
pj892031 Mar 14, 2024
172ac59
Revert "update number of components"
pj892031 Mar 14, 2024
f75840b
Revert "remove deprecated components"
pj892031 Mar 14, 2024
eeaa3ed
revert Zlux core dependency
pj892031 Mar 14, 2024
fa26fb4
Merge branch 'v3.x/staging' into apiml/init-v3-apiml
pj892031 Mar 18, 2024
3e89a87
make java17 default and explicit for all playbooks in v3
MarkAckert Mar 22, 2024
f43a9c9
test fix for zosmf
taban03 Mar 22, 2024
dddce50
update sanity
taban03 Mar 25, 2024
585dcb2
fix tests
taban03 Mar 25, 2024
ff4c949
fix tests
taban03 Mar 25, 2024
8a54275
revert manifest json
taban03 Mar 26, 2024
9e697a9
revert manifest json
taban03 Mar 26, 2024
88935d9
test custom build
taban03 Mar 27, 2024
5f353fd
set manifest json back
taban03 Mar 27, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 2 additions & 1 deletion .pax/pre-packaging.sh
Original file line number Diff line number Diff line change
Expand Up @@ -192,7 +192,8 @@ BASE_DIR=$(

# use node v16 to build
export NODE_HOME=/ZOWE/node/node-v16.20.1-os390-s390x

export JAVA_HOME=/ZOWE/node/J17.0_64
export PATH=$JAVA_HOME/bin:$PATH
ZOWE_ROOT_DIR="${BASE_DIR}/content"

cd "${BASE_DIR}"
Expand Down
16 changes: 8 additions & 8 deletions bin/commands/init/certificate/index.sh
Original file line number Diff line number Diff line change
Expand Up @@ -340,7 +340,7 @@ elif [[ "${cert_type}" == JCE*KS ]]; then
# should we clean up before creating new
if [ "${ZWE_CLI_PARAMETER_ALLOW_OVERWRITE}" = "true" ]; then
# warning
print_message "Warning ZWEL0300W: Keyring \"safkeyring:///${keyring_owner}/${keyring_name}\" will be overwritten during configuration."
print_message "Warning ZWEL0300W: Keyring \"safkeyring://${keyring_owner}/${keyring_name}\" will be overwritten during configuration."

zwecli_inline_execute_command \
certificate keyring-jcl clean \
Expand Down Expand Up @@ -384,7 +384,7 @@ elif [[ "${cert_type}" == JCE*KS ]]; then

yaml_keyring_label="${keyring_label}"
# keyring string for self-signed CA
yaml_pem_cas="safkeyring:////${keyring_owner}/${keyring_name}&${keyring_caLabel}"
yaml_pem_cas="safkeyring://${keyring_owner}/${keyring_name}&${keyring_caLabel}"
;;
2)
# connect existing certs to zowe keyring
Expand Down Expand Up @@ -433,9 +433,9 @@ elif [[ "${cert_type}" == JCE*KS ]]; then
item=$(echo "${item}" | trim)
if [ -n "${item}" ]; then
if [ -n "${yaml_pem_cas}" ]; then
yaml_pem_cas="${yaml_pem_cas},safkeyring:////${keyring_owner}/${keyring_name}&${item}"
yaml_pem_cas="${yaml_pem_cas},safkeyring://${keyring_owner}/${keyring_name}&${item}"
else
yaml_pem_cas="safkeyring:////${keyring_owner}/${keyring_name}&${item}"
yaml_pem_cas="safkeyring://${keyring_owner}/${keyring_name}&${item}"
fi
fi
done <<EOF
Expand All @@ -447,12 +447,12 @@ EOF
if [ "${ZWE_CLI_PARAMETER_UPDATE_CONFIG}" = "true" ]; then
print_level1_message "Update certificate configuration to ${ZWE_CLI_PARAMETER_CONFIG}"
update_zowe_yaml "${ZWE_CLI_PARAMETER_CONFIG}" "zowe.certificate.keystore.type" "${cert_type:-JCERACFKS}"
update_zowe_yaml "${ZWE_CLI_PARAMETER_CONFIG}" "zowe.certificate.keystore.file" "safkeyring:////${keyring_owner}/${keyring_name}"
update_zowe_yaml "${ZWE_CLI_PARAMETER_CONFIG}" "zowe.certificate.keystore.file" "safkeyring://${keyring_owner}/${keyring_name}"
# we must set a dummy value here, other JDK will complain wrong parameter
update_zowe_yaml "${ZWE_CLI_PARAMETER_CONFIG}" "zowe.certificate.keystore.password" "password"
update_zowe_yaml "${ZWE_CLI_PARAMETER_CONFIG}" "zowe.certificate.keystore.alias" "${yaml_keyring_label}"
update_zowe_yaml "${ZWE_CLI_PARAMETER_CONFIG}" "zowe.certificate.truststore.type" "${cert_type:-JCERACFKS}"
update_zowe_yaml "${ZWE_CLI_PARAMETER_CONFIG}" "zowe.certificate.truststore.file" "safkeyring:////${keyring_owner}/${keyring_name}"
update_zowe_yaml "${ZWE_CLI_PARAMETER_CONFIG}" "zowe.certificate.truststore.file" "safkeyring://${keyring_owner}/${keyring_name}"
# we must set a dummy value here, other JDK will complain wrong parameter
update_zowe_yaml "${ZWE_CLI_PARAMETER_CONFIG}" "zowe.certificate.truststore.password" "password"
update_zowe_yaml "${ZWE_CLI_PARAMETER_CONFIG}" "zowe.certificate.pem.key" ""
Expand All @@ -467,12 +467,12 @@ EOF
print_message " certificate:"
print_message " keystore:"
print_message " type: ${cert_type:-JCERACFKS}"
print_message " file: \"safkeyring:////${keyring_owner}/${keyring_name}\""
print_message " file: \"safkeyring://${keyring_owner}/${keyring_name}\""
print_message " password: \"password\""
print_message " alias: \"${yaml_keyring_label}\""
print_message " truststore:"
print_message " type: ${cert_type:-JCERACFKS}"
print_message " file: \"safkeyring:////${keyring_owner}/${keyring_name}\""
print_message " file: \"safkeyring://${keyring_owner}/${keyring_name}\""
print_message " password: \"password\""
print_message " pem:"
print_message " key: \"\""
Expand Down
42 changes: 14 additions & 28 deletions bin/libs/certificate.sh
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,8 @@ ZWE_PRIVATE_DEFAULT_CERTIFICATE_VALIDITY="3650"
ZWE_PRIVATE_DEFAULT_CERTIFICATE_KEY_USAGE="keyEncipherment,digitalSignature,nonRepudiation,dataEncipherment"
ZWE_PRIVATE_DEFAULT_CERTIFICATE_EXTENDED_KEY_USAGE="clientAuth,serverAuth"

JAVA_KEYTOOL_FLAG=" -J-Dkeystore.pkcs12.legacy "

#######################################################################
# Notes: some keyring related functions, like ncert, are using R_datalib behind the scene. It requires proper
# permission setup on the server.
Expand Down Expand Up @@ -199,8 +201,6 @@ pkcs12_create_certificate_authority() {
password="${3}"
common_name=${4:-${ZWE_PRIVATE_DEFAULT_CERTIFICATE_CA_COMMON_NAME}}

flags=$(get_java_pkcs12_keystore_flag)

print_message ">>>> Generate PKCS12 format local CA with alias ${alias}:"
mkdir -p "${keystore_dir}/${alias}"
result=$(pkeytool -genkeypair -v \
Expand All @@ -212,7 +212,7 @@ pkcs12_create_certificate_authority() {
-storepass "${password}" \
-storetype "PKCS12" \
-validity "${ZWE_PRIVATE_CERTIFICATE_CA_VALIDITY:-${ZWE_PRIVATE_DEFAULT_CERTIFICATE_CA_VALIDITY}}" \
${flags} \
${JAVA_KEYTOOL_FLAG} \
-ext KeyUsage="keyCertSign" \
-ext BasicConstraints:"critical=ca:true")
if [ $? -ne 0 ]; then
Expand All @@ -237,11 +237,9 @@ pkcs12_create_certificate_and_sign() {

print_message ">>>> Generate certificate \"${alias}\" in the keystore ${keystore_name}:"

flags=$(get_java_pkcs12_keystore_flag)

mkdir -p "${keystore_dir}/${keystore_name}"
result=$(pkeytool -genkeypair -v \
${flags} \
${JAVA_KEYTOOL_FLAG} \
-alias "${alias}" \
-keyalg RSA -keysize 2048 \
-keystore "${keystore_dir}/${keystore_name}/${keystore_name}.keystore.p12" \
Expand All @@ -259,7 +257,7 @@ pkcs12_create_certificate_and_sign() {
fi

print_message ">>>> Generate CSR for the certificate \"${alias}\" in the keystore \"${keystore_name}\":"
result=$(pkeytool ${flags} \
result=$(pkeytool ${JAVA_KEYTOOL_FLAG} \
-certreq -v \
-alias "${alias}" \
-keystore "${keystore_dir}/${keystore_name}/${keystore_name}.keystore.p12" \
Expand Down Expand Up @@ -288,7 +286,7 @@ pkcs12_create_certificate_and_sign() {
san="${san}dns:localhost.localdomain,dns:localhost,ip:127.0.0.1"

print_message ">>>> Sign the CSR using the Certificate Authority \"${ca_alias}\":"
result=$(pkeytool ${flags} \
result=$(pkeytool ${JAVA_KEYTOOL_FLAG} \
-gencert -v \
-infile "${keystore_dir}/${keystore_name}/${alias}.csr" \
-outfile "${keystore_dir}/${keystore_name}/${alias}.signed.cer" \
Expand Down Expand Up @@ -325,7 +323,7 @@ pkcs12_create_certificate_and_sign() {
>/dev/null 2>/dev/null
if [ "$?" != "0" ]; then
print_message ">>>> Import the Certificate Authority \"${ca_alias}\" to the keystore \"${keystore_name}\":"
result=$(pkeytool ${flags} \
result=$(pkeytool ${JAVA_KEYTOOL_FLAG} \
-importcert -v \
-trustcacerts -noprompt \
-file "${ca_cert_file}" \
Expand All @@ -344,7 +342,7 @@ pkcs12_create_certificate_and_sign() {
>/dev/null 2>/dev/null
if [ "$?" != "0" ]; then
print_message ">>>> Import the Certificate Authority \"${ca_alias}\" to the truststore \"${keystore_name}\":"
result=$(pkeytool ${flags} \
result=$(pkeytool ${JAVA_KEYTOOL_FLAG} \
-importcert -v \
-trustcacerts -noprompt \
-file "${ca_cert_file}" \
Expand All @@ -360,7 +358,7 @@ pkcs12_create_certificate_and_sign() {
fi

print_message ">>>> Import the signed CSR to the keystore \"${keystore_name}\":"
result=$(pkeytool ${flags} \
result=$(pkeytool ${JAVA_KEYTOOL_FLAG} \
-importcert -v \
-trustcacerts -noprompt \
-file "${keystore_dir}/${keystore_name}/${alias}.signed.cer" \
Expand Down Expand Up @@ -477,9 +475,7 @@ pkcs12_import_pkcs12_keystore() {
return 1
fi

flags=$(get_java_pkcs12_keystore_flag)

result=$(pkeytool ${flags} \
result=$(pkeytool ${JAVA_KEYTOOL_FLAG} \
-importkeystore -v \
-noprompt \
-deststoretype "PKCS12" \
Expand Down Expand Up @@ -508,14 +504,12 @@ pkcs12_import_certificates() {
ca_files="${3}"
alias="${4:-extca}"

flags=$(get_java_pkcs12_keystore_flag)

ca_index=1
while read -r ca_file; do
ca_file=$(echo "${ca_file}" | trim)
if [ -n "${ca_file}" ]; then
print_message ">>>> Import \"${ca_file}\" to the keystore \"${dest_keystore}\":"
result=$(pkeytool ${flags} \
result=$(pkeytool ${JAVA_KEYTOOL_FLAG} \
-importcert -v \
-trustcacerts -noprompt \
-file "${ca_file}" \
Expand Down Expand Up @@ -568,8 +562,6 @@ pkcs12_trust_service() {
return 1
fi

flags=$(get_java_pkcs12_keystore_flag)

# parse keytool output into separate files
csplit -s -k -f "${keystore_dir}/${keystore_name}/${service_alias}" "${tmp_file}" /-----END\ CERTIFICATE-----/1 \
{$(expr `grep -c -e '-----END CERTIFICATE-----' "${tmp_file}"` - 1)}
Expand All @@ -578,7 +570,7 @@ pkcs12_trust_service() {
cert_file=$(basename "${cert}")
cert_alias=${cert_file%.cer}
echo ">>>> Import a certificate \"${cert_alias}\" to the truststore:"
result=$(pkeytool ${flags} \
result=$(pkeytool ${JAVA_KEYTOOL_FLAG} \
-importcert -v \
-trustcacerts \
-noprompt \
Expand Down Expand Up @@ -633,11 +625,6 @@ pkcs12_export_pem() {
if [ $? -ne 0 ]; then
return 1
fi
if [ `uname` = "OS/390" ]; then
iconv -f ISO8859-1 -t IBM-1047 "${keystore_dir}/${alias_lc}.cer" > "${keystore_dir}/${alias_lc}.cer-ebcdic"
mv "${keystore_dir}/${alias_lc}.cer-ebcdic" "${keystore_dir}/${alias_lc}.cer"
ensure_file_encoding "${keystore_dir}/${alias_lc}.cer" "CERTIFICATE"
fi
fi
done <<EOF
$(echo "${aliases}")
Expand Down Expand Up @@ -1195,12 +1182,11 @@ keyring_export_to_pkcs12() {

print_debug ">>>> Export certificate \"${label}\" from safkeyring:////${keyring_owner}/${keyring_name} to PKCS#12 keystore ${keystore_file}"

flags=$(get_java_pkcs12_keystore_flag)

# create keystore if it doesn't exist
if [ -f "${keystore_file}" ]; then
print_debug "- Create keystore with dummy certificate ${dummy_cert}"
result=$(pkeytool ${flags} \
result=$(pkeytool ${JAVA_KEYTOOL_FLAG} \
-genkeypair \
-alias "${dummy_cert}" \
-dname "CN=Zowe Dummy Cert, OU=ZWELS, O=Zowe, C=US" \
Expand Down Expand Up @@ -1237,7 +1223,7 @@ keyring_export_to_pkcs12() {
if [ "${cert_only}" = "true" ]; then
# use keytool to import certificate
print_debug "- Import certificate into keystore as \"${label}\""
result=$(pkeytool ${flags} \
result=$(pkeytool ${JAVA_KEYTOOL_FLAG} \
-import -v \
-trustcacerts -noprompt \
-alias "${label}" \
Expand Down
35 changes: 3 additions & 32 deletions bin/libs/java.sh
Original file line number Diff line number Diff line change
Expand Up @@ -57,12 +57,12 @@ detect_java_home() {
break
fi
done
)
)
fi

# fall back to the most well-known java path
if [ -z "${java_home}" -a -f /usr/lpp/java/J8.0_64/bin/java ]; then
java_home=/usr/lpp/java/J8.0_64
if [ -z "${java_home}" -a -f /usr/lpp/java/J17.0_64/bin/java ]; then
java_home=/usr/lpp/java/J17.0_64
fi

if [ -n "${java_home}" ]; then
Expand Down Expand Up @@ -132,32 +132,3 @@ validate_java_home() {

print_debug "Java check is successful."
}

get_java_pkcs12_keystore_flag() {
java_version=$("${JAVA_HOME}/bin/java" -version 2>&1) # Capture stderr to stdout, so we can print below if error


# As we know the java -version command works then strip out the line we need
java_version_short=$(echo "${java_version}" | grep ^"java version" | sed -e "s/java version //g"| sed -e "s/\"//g")
if [[ $java_version_short == "" ]]; then
java_version_short=$(echo "${java_version}" | grep ^"openjdk version" | sed -e "s/openjdk version //g"| sed -e "s/\"//g")
fi
java_major_version=$(echo "${java_version_short}" | cut -d '.' -f 1)
java_minor_version=$(echo "${java_version_short}" | cut -d '.' -f 2)
java_fix_version=$(echo "${java_version_short}" | cut -d '_' -f 2)

if [ ${java_major_version} -eq 1 -a ${java_minor_version} -eq 8 ]; then
if [ ${java_fix_version} -lt 341 ]; then
printf " "
elif [ ${java_fix_version} -lt 361 ]; then
printf " -J-Dkeystore.pkcs12.certProtectionAlgorithm=PBEWithSHAAnd40BitRC2 -J-Dkeystore.pkcs12.certPbeIterationCount=50000 -J-Dkeystore.pkcs12.keyProtectionAlgorithm=PBEWithSHAAnd3KeyTripleDES -J-Dkeystore.pkcs12.keyPbeIterationCount=50000 "
else
printf " -J-Dkeystore.pkcs12.legacy "
fi
elif [ ${java_major_version} -eq 1 -a ${java_minor_version} -gt 8 ]; then
printf " -J-Dkeystore.pkcs12.legacy "
else
printf " "
fi
}

6 changes: 3 additions & 3 deletions bin/libs/java.ts
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ import * as common from './common';
import * as shell from './shell';
import * as config from './config';

const JAVA_MIN_VERSION=8;
const JAVA_MIN_VERSION=17;

export function ensureJavaIsOnPath(): void {
let path=std.getenv('PATH') || '/bin:.:/usr/bin';
Expand Down Expand Up @@ -48,8 +48,8 @@ export function detectJavaHome(): string|undefined {
}
}

if (!javaBinHome && fs.fileExists('/usr/lpp/java/J8.0_64/bin/java')) {
return '/usr/lpp/java/J8.0_64';
if (!javaBinHome && fs.fileExists('/usr/lpp/java/J17.0_64/bin/java')) {
return '/usr/lpp/java/J17.0_64';
}
return undefined;
}
Expand Down
2 changes: 1 addition & 1 deletion bin/utils/ExportPrivateKeyZos.java
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@
import java.security.Key;
import java.security.KeyStore;
import java.util.Base64;
import com.ibm.crypto.provider.RACFInputStream;
import com.ibm.crypto.zsecurity.provider.RACFInputStream;

public class ExportPrivateKeyZos {
private String keystoreName;
Expand Down
22 changes: 11 additions & 11 deletions manifest.json.template
Original file line number Diff line number Diff line change
Expand Up @@ -57,27 +57,27 @@
"artifact": "*.pax"
},
"org.zowe.apiml.api-catalog-package": {
"version": "^2.1.1-SNAPSHOT",
"version": "^3.0.3-SNAPSHOT",
"artifact": "api-catalog-*.zip",
"exclusions": ["*PR*.zip"]
},
"org.zowe.apiml.discovery-package": {
"version": "^2.1.1-SNAPSHOT",
"version": "^3.0.3-SNAPSHOT",
"artifact": "discovery-*.zip",
"exclusions": ["*PR*.zip"]
},
"org.zowe.apiml.gateway-package": {
"version": "^2.1.1-SNAPSHOT",
"version": "^3.0.3-SNAPSHOT",
"artifact": "gateway-*.zip",
"exclusions": ["*PR*.zip"]
},
"org.zowe.apiml.caching-service-package": {
"version": "^2.1.1-SNAPSHOT",
"version": "^3.0.3-SNAPSHOT",
"artifact": "caching-service-*.zip",
"exclusions": ["*PR*.zip"]
},
"org.zowe.apiml.apiml-common-lib-package": {
"version": "^2.1.1-SNAPSHOT",
"version": "^3.0.3-SNAPSHOT",
"artifact": "apiml-common-lib-*.zip",
"exclusions": ["*PR*.zip"]
},
Expand All @@ -87,12 +87,12 @@
"exclusions": ["*PR*.zip"]
},
"org.zowe.apiml.sdk.apiml-sample-extension-package": {
"version": "^2.1.1-SNAPSHOT",
"version": "^3.0.3-SNAPSHOT",
"artifact": "apiml-sample-extension-*.zip",
"exclusions": ["*PR*.zip"]
},
"org.zowe.apiml.cloud-gateway-package": {
"version": "^2.4.4-SNAPSHOT",
"version": "^3.0.3-SNAPSHOT",
"artifact": "cloud-gateway-*.zip",
"exclusions": ["*PR*.zip"]
},
Expand Down Expand Up @@ -365,23 +365,23 @@
"api-catalog": {
"registry": "zowe-docker-snapshot.jfrog.io",
"name": "ompzowe/api-catalog-services",
"tag" : "2.1.1-SNAPSHOT-ubuntu.v2-x-x"
"tag" : "3.0.0-SNAPSHOT-ubuntu.v2-x-x"
},
"caching": {
"registry": "zowe-docker-snapshot.jfrog.io",
"name": "ompzowe/caching-service",
"tag" : "2.1.1-SNAPSHOT-ubuntu.v2-x-x"
"tag" : "3.0.0-SNAPSHOT-ubuntu.v2-x-x"
},
"discovery": {
"kind": "statefulset",
"registry": "zowe-docker-snapshot.jfrog.io",
"name": "ompzowe/discovery-service",
"tag" : "2.1.1-SNAPSHOT-ubuntu.v2-x-x"
"tag" : "3.0.0-SNAPSHOT-ubuntu.v2-x-x"
},
"gateway": {
"registry": "zowe-docker-snapshot.jfrog.io",
"name": "ompzowe/gateway-service",
"tag" : "2.1.1-SNAPSHOT-ubuntu.v2-x-x"
"tag" : "3.0.0-SNAPSHOT-ubuntu.v2-x-x"
},
"app-server": {
"registry": "zowe-docker-snapshot.jfrog.io",
Expand Down
Loading
Loading