When running the /Y/usr/lpp/zowe/zowe-1.16.0/bin/zowe-setup-certificates.sh -p /home/bc6608/zowe-setup-keyring-certificates.env -l /tmp command I get the above error.
All output from the command:
/home/bc6608:/home/bc6608/zowe-setup-keyring-certificates.env -l /tmp <
Log file created: /tmp/zowe-setup-certificates-2020-11-11-16-59-23.log
Loading default variables from /Y/usr/lpp/zowe/zowe-1.16.0/bin/zowe-setup-certificates.env file.
Loading /home/bc6608/zowe-setup-keyring-certificates.env file and overriding default variables.
error : dig found hostname ZOSMFGS.danskenet.net and IP but IP did not match 10.192.75.131
ZOWE_IP_ADDRESS variable value=10.192.75.131
ZOWE_EXPLORER_HOST variable value=ZOSMFGS.danskenet.net
Creating certificates and keystores... STARTED
Generating certificates for the keyring is skipped.
z/OSMF certificate fingerprint:
Owner: O=Danske Bank A/S SandBox, ST=DK, L=Copenhagen, C=DK, CN=zosmfgs.danskenet.net
MD5: 19:BD:ED:8D:B0:B7:8C:59:C0:95:89:D7:4F:0B:EE:CF
SHA1: A4:9A:B1:38:1A:F5:22:4B:E0:70:4E:E8:81:19:12:F2:1F:2E:05:17
SHA256: B3:F4:C9:62:2D:6C:14:B5:4F:E8:74:CF:94:D7:01:AB:28:EC:BE:81:71:96:5A:31:36:B6:DA:0F:36:3C:BB:AE
Owner: CN=Danske Bank Internal CA Intermediate HW - MSSSL, OU=Danske Bank A/S, DC=danskenet, DC=net, L=Copenhagen, C=DK
MD5: 9D:4A:34:2B:A9:9B:01:14:CA:08:9F:3C:74:C7:C1:BA
SHA1: 7D:6D:F0:ED:A2:DE:BE:91:82:6F:F6:D1:18:0D:D8:C5:F6:90:57:81
SHA256: 36:07:42:DC:F1:64:2C:4A:13:41:45:CE:85:F9:23:B6:DF:B8:65:D2:AD:EF:2E:7D:3C:2A:55:75:F3:03:9D:72
Owner: CN=Danske Bank Internal Root CA HW, OU=Danske Bank A/S, DC=danskenet, DC=net, L=Copenhagen, C=DK
MD5: 77:7F:F6:3F:EC:64:C9:67:78:34:14:56:90:63:EE:42
SHA1: 3D:2C:AC:F3:7B:6E:42:16:AA:7A:1A:77:BD:80:D3:1A:B7:FA:CC:10
SHA256: 9B:73:5C:F8:F2:AF:0C:6D:08:A8:65:9E:72:E1:7A:50:3C:92:CB:4A:9C:8B:63:E0:4D:A8:3B:57:A9:91:B9:A2
Error: Could not find or load main class org.springframework.boot.loader.PropertiesLauncher
apiml_cm.sh --action trust-zosmf has failed. See /tmp/zowe-setup-certificates-2020-11-11-16-59-23.log for more details
ERROR: z/OSMF is not trusted by the API Mediation Layer. Make sure ZOWE_ZOSMF_HOST and ZOWE_ZOSMF_PORT variables define the desired z/OSMF instance.
ZOWE_ZOSMF_HOST=zosmfgs.danskenet.net ZOWE_ZOSMF_PORT=443
You can also specify z/OSMF certificate explicitly in the ZOSMF_CERTIFICATE environmental variable in the zowe-setup-certificates.env file.
The log file:
/home/bc6608:cat /tmp/zowe-setup-certificates-2020-11-11-16-59-23.log
<zowe-setup-certificates.sh>
<zowe-init.sh>
ZOWE_ZOSMF_PORT variable value=443
Java version 1.8.0_261 is supported
JAVA_HOME variable value=/usr/lpp/java/current_64
ZOWE_EXPLORER_HOST variable value=ZOSMFGS.danskenet.net
ZOWE_ZOSMF_HOST variable value=zosmfgs.danskenet.net
</zowe-init.sh>
Getting certificates from z/OSMF host
Calling keytool -printcert -sslserver zosmfgs.danskenet.net:443 -J-Dfile.encoding=UTF8 -rfc
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
keytool returned: 0
z/OSMF certificate fingerprint: keytool returned: 0
z/OSMF certificate to temp file: keytool returned: 0
Import a certificate to the truststore:
Calling keytool -importcert -v -trustcacerts -noprompt -file /global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/temp/zosmf00 -alias zosmf00 -keystore /global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/DefaultzOSMFCert.IZUZ0001.truststore.p12 -storepass password -storetype PKCS12
Certificate was added to keystore
[Storing /global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/DefaultzOSMFCert.IZUZ0001.truststore.p12]
keytool returned: 0
Import a certificate to the truststore:
Calling keytool -importcert -v -trustcacerts -noprompt -file /global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/temp/zosmf01 -alias zosmf01 -keystore /global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/DefaultzOSMFCert.IZUZ0001.truststore.p12 -storepass password -storetype PKCS12
Certificate was added to keystore
[Storing /global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/DefaultzOSMFCert.IZUZ0001.truststore.p12]
keytool returned: 0
Import a certificate to the truststore:
Calling keytool -importcert -v -trustcacerts -noprompt -file /global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/temp/zosmf02 -alias zosmf02 -keystore /global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/DefaultzOSMFCert.IZUZ0001.truststore.p12 -storepass password -storetype PKCS12
Certificate was added to keystore
[Storing /global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/DefaultzOSMFCert.IZUZ0001.truststore.p12]
keytool returned: 0
Calling keytool -export -rfc -alias jwtsecret -keystore safkeyring://C006850/IZUKeyring.IZUDFLT.GS -storetype JCERACFKS -file /global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/DefaultzOSMFCert.IZUZ0001.keystore.jwtsecret.pem -J-Djava.protocol.handler.pkgs=com.ibm.crypto.provider
Certificate stored in file </global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/DefaultzOSMFCert.IZUZ0001.keystore.jwtsecret.pem>
keytool returned: 0
Retrieves z/OSMF JWT public key and stores it to /global/zowe/keystore/DefaultzOSMFCert.IZUZ0001/DefaultzOSMFCert.IZUZ0001.keystore.jwtsecret.pem
Generate keystore with the CA private key and CA public certificate:
Calling keytool -genkeypair -v -alias localca -keyalg RSA -keysize 2048 -keystore /global/zowe/keystore/local_ca/localca.keystore.p12 -dname CN=Zowe Development Instances Certificate Authority, OU=API Mediation Layer, O=Zowe Sample, L=Prague, S=Prague, C=CZ -keypass local_ca_password -storepass local_ca_password -storetype PKCS12 -validity 3650 -ext KeyUsage=keyCertSign -ext BasicConstraints:critical=ca:true
Generating 2,048 bit RSA key pair and self-signed certificate (SHA256WithRSA)
for: CN=Zowe Development Instances Certificate Authority, OU=API Mediation Layer, O=Zowe Sample, L=Prague, ST=Prague, C=CZ
New certificate (self-signed):
[
[
Version: V3
Subject: CN=Zowe Development Instances Certificate Authority, OU=API Mediation Layer, O=Zowe Sample, L=Prague, ST=Prague, C=CZ
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
Key: IBMJCE RSA Public Key:
modulus:
24555996548398596864665166806999825215493352812274968459629648849664219187516311493223724139430780348453236040469002764826358921811636626757399329283926817836966323811681898331793121099334264679095421158305632128226817527554479104460841331828711543478718078556660302670748023149140340109650792867284398490323104542038620154938504101299299727378955375577240877567070320879903668053903205632220957717942428586448924939825375126640418279674537917095798851948365170819557430799859053144371795857078438283451981727834513896753084585052028734659977014774491875618258794598597287846982272514589187583144970062212224177837549
public exponent:
65537
Validity: [From: Wed Nov 11 16:59:46 GMT+01:00 2020,
To: Sat Nov 09 16:59:46 GMT+01:00 2030]
Issuer: CN=Zowe Development Instances Certificate Authority, OU=API Mediation Layer, O=Zowe Sample, L=Prague, ST=Prague, C=CZ
SerialNumber: [1311440940]
Certificate Extensions: 3
[1]: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
Key_CertSign
]
[2]: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 6d 46 4f 3d 25 c3 a2 32 a7 96 78 5f 59 18 0b f1 mFO....2..x.Y...
0010: 1e 57 7e 3e .W..
]
]
[3]: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
CA:true
PathLen:2147483647
]
]
Algorithm: [SHA256withRSA]
Signature:
0000: 40 18 20 11 6c 4d 7e 33 b8 95 4c 9f e6 2e 3d be ....lM.3..L.....
0010: df 54 0c a6 f1 61 fc eb 48 05 85 92 b9 e6 63 fd .T...a..H.....c.
0020: fa d1 1e e9 7c 84 9c e5 e1 a1 a2 76 27 5f 4f 6a ...........v..Oj
0030: 94 da 88 ca 49 2d 2f 76 04 90 43 08 2c 99 c0 3e ....I..v..C.....
0040: ab a8 bd 7c 28 22 d7 cb 2e 85 2d 09 f5 d8 bc d7 ................
0050: c0 c5 3d 0f 89 1b 72 0a f3 71 f8 f3 e7 ec f1 19 ......r..q......
0060: cc 4a 00 b5 d2 98 86 ee bf eb 04 ba 17 d2 dc 17 .J..............
0070: 3f b9 1a bd 42 84 8e 64 15 b9 a4 eb 29 c4 23 f2 ....B..d........
0080: 0f 3e 9a 3f 9c 32 52 27 16 02 bb 8c 2d bb d6 72 .....2R........r
0090: 35 58 88 25 a8 4e 1a 05 9c f6 51 7e df 16 4c 88 5X...N....Q...L.
00a0: af fa 94 6e 26 24 ca 5d 4d 0c ad 25 6d 25 6e d8 ...n....M...m.n.
00b0: 2e d9 40 7b 05 5d d1 1c 7c 7a f1 f7 2d 94 4e f4 .........z....N.
00c0: 3a b4 dd 9a 82 9f eb 2e 1b 01 c4 37 a6 6d 66 80 ...........7.mf.
00d0: 1c af e9 69 a0 58 be 33 25 39 76 5d c6 ea 37 05 ...i.X.3.9v...7.
00e0: 8a cd 98 e0 a1 5f c8 db 1b a5 84 5f 39 39 da c5 ............99..
00f0: 35 ed ff b1 2b e8 24 ca a8 07 a8 c3 92 6c bd 50 5............l.P
]
[Storing /global/zowe/keystore/local_ca/localca.keystore.p12]
keytool returned: 0
Export the CA public certificate:
Calling keytool -export -v -alias localca -file /global/zowe/keystore/local_ca/localca.cer -keystore /global/zowe/keystore/local_ca/localca.keystore.p12 -rfc -keypass local_ca_password -storepass local_ca_password -storetype PKCS12
Certificate stored in file </global/zowe/keystore/local_ca/localca.cer>
keytool returned: 0
apiml_cm.sh --action trust-zosmf returned: 1
</zowe-setup-certificates.sh>
z/OS 2.4
Zowe 1.16
Node 12.18.0
Env:
PATH=/usr/lpp/java/current_64/bin:/usr/lpp/java/current_64/bin:/bin:/home/bc6608:/usr/lpp/java/current_31/bin:/Utilities_DB/bin:/usr/sbin:/usr/lpp/skrb/bin:/usr/lpp/mqm/java/bin:/usr/lpp/zowe-1.16.0/bin/:/usr/lpp/nodejs/node-v12.18.0-os390-s390x/bin:/usr/lpp/ant/apache-ant-1.10.6/bin:/usr/lpp/zowe-1.16.0/bin/:/usr/lpp/nodejs/node-v12.18.0-os390-s390x/bin:/usr/lpp/ant/apache-ant-1.10.6/bin
NODE_HOME=/usr/lpp/nodejs/node-v12.18.0-os390-s390x
/Y/usr/lpp/ant:cat /home/bc6608/zowe-setup-keyring-certificates.env
# TODO - do we need a workflow for keyrings?
# The hostname of the system running API Mediation. If the hostname is
# omitted, the configuration script attempts to calculate the value on
# its own. You can specify multiple domains separated by comma.
HOSTNAME=ZOSMFGS.danskenet.net,ycpu.danskenet.net,zosmfgs.danskenet.net
# The IP address of the system running API Mediation. If the IP address
# is omitted, the configuration script attempts to calculate the value
# on its own. You can specify multiple IPs separated by comma.
IPADDRESS=10.192.75.131,10.192.75.130
# Should APIML verify certificates of services it uses - true/false
VERIFY_CERTIFICATES=true
# If APIML SSO token not present, Zowe components are allowed to attempt authentication with other user-provided data
SSO_FALLBACK_TO_NATIVE_AUTH=true
# optional - PKCS#11 token name for SSO. Must already exist
PKCS11_TOKEN_NAME=
# optional - PKCS#11 token label for SSO. Must not already exist
PKCS11_TOKEN_LABEL=
# Location for generated certificates and/or JWT token
KEYSTORE_DIRECTORY=/global/zowe/keystore
# This variable has to be set to the Zowe certificate's LABEL specified in the JCL.
ZOWE_CERTIFICATE_LABEL=DefaultzOSMFCert.IZUZ0001
# Specify zowe user id to set up ownership of the generated certificates.
# Set the variable to the same user id as in the jcl.
ZOWE_USER_ID=C006850
# Specify zowe keyring that keeps zowe certificates, set
# the variable to the same keyring that you used in the jcl.
ZOWE_KEYRING=IZUKeyring.IZUDFLT.GS
# Option to generate certificates in zowe-setup-certificates, rather than ZWEKRING jcl
# If ZWEKRING is used then set this variable to false (defaults to false)
GENERATE_CERTS_FOR_KEYRING=false
Closing this issue as stale. If you still encounter this on later versions of the v1 release line (v1.26+) or v2 LTS line, please re-open the issue with logs.
When running the /Y/usr/lpp/zowe/zowe-1.16.0/bin/zowe-setup-certificates.sh -p /home/bc6608/zowe-setup-keyring-certificates.env -l /tmp command I get the above error.
All output from the command: