Skip to content

Commit

Permalink
Merge pull request #8 from zowe/v1-final
Browse files Browse the repository at this point in the history
Final updates for V1
  • Loading branch information
zFernand0 authored Aug 9, 2023
2 parents eb51a4e + cb31474 commit be2e3f3
Show file tree
Hide file tree
Showing 59 changed files with 355 additions and 422 deletions.
196 changes: 98 additions & 98 deletions package-lock.json

Large diffs are not rendered by default.

40 changes: 2 additions & 38 deletions packages/cli/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,45 +2,9 @@

All notable changes to the IBM® CICS® Plug-in for Zowe CLI will be documented in this file.

## `5.0.1`
## Recent Changes

- BugFix: Updated `xml2js` dependency to resolve security vulnerability.

## `5.0.0`

- Major: Updated for V2 compatibility. See the prerelease items below for more details.

## `5.0.0-next.202204141925`

- BugFix: Remove APIML Conn Lookup until the CICS definition for APIML is known.

## `5.0.0-next.202204111400`

- BugFix: Fixed daemon mode prompting

## `5.0.0-next.202202071745`

- BugFix: Pruned dev dependencies from npm-shrinkwrap file.

## `5.0.0-next.202201261655`

- BugFix: Updated dependencies to resolve security vulnerabilities.

## `5.0.0-next.202201241457`

- BugFix: Included an npm-shrinkwrap file to lock-down all transitive dependencies.

## `5.0.0-next.202107021819`

- Enhancement: Add apimlConnLookup properties to enable auto-config through APIML. A valid apiId must still be identified.

## `5.0.0-next.202104261510`

- Remove @zowe/cli peer dependency to better support NPM v7

## `5.0.0-next.202104141723`

- Publish `@next` tag that is compatible with team config profiles.
- BugFix: Migrated the package the CICS for Zowe Client Monorepo

## `4.0.7`

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,16 +6,17 @@ zosmf:
user: &user my-user-name
password: &pass my-password
host: &host zosmf-host
port: &port zosmf-port
port: 443
rejectUnauthorized: &ru false
cmci:
cics:
user: *user
password: *pass
host: *host
port: cics-port
protocol: https
port: 1443
rejectUnauthorized: *ru
csdGroup: cics-group
regionName: cics-region
protocol: https
cmci:
regionName: region-name
csdGroup: CSDGROUP
urimap:
certificate:
certificate: " "
5 changes: 0 additions & 5 deletions packages/cli/__tests__/__resources__/settings/imperative.json

This file was deleted.

16 changes: 8 additions & 8 deletions packages/cli/__tests__/__src__/environment/TempTestProfiles.ts
Original file line number Diff line number Diff line change
Expand Up @@ -83,17 +83,17 @@ export class TempTestProfiles {
*/
private static async createCicsProfile(testEnvironment: ITestEnvironment) {
const profileName: string = "tmp_cics" + uuidv4();
const cmciProps = testEnvironment.systemTestProperties.cmci;
const cicsProps = testEnvironment.systemTestProperties.cics;
let createProfileScript =
TemporaryScripts.SHEBANG +
`${TemporaryScripts.BRIGHT_BIN} profiles create cics ${profileName} --user ${cmciProps.user} -p ` +
`${cmciProps.password} ` +
` --host ${cmciProps.host} --port ${cmciProps.port}`;
if (cmciProps.protocol != null) {
createProfileScript += ` --protocol ${cmciProps.protocol}`;
`${TemporaryScripts.BRIGHT_BIN} profiles create cics ${profileName} --user ${cicsProps.user} -p ` +
`${cicsProps.password} ` +
` --host ${cicsProps.host} --port ${cicsProps.port}`;
if (cicsProps.protocol != null) {
createProfileScript += ` --protocol ${cicsProps.protocol}`;
}
if (cmciProps.rejectUnauthorized != null) {
createProfileScript += ` --reject-unauthorized ${cmciProps.rejectUnauthorized}`;
if (cicsProps.rejectUnauthorized != null) {
createProfileScript += ` --reject-unauthorized ${cicsProps.rejectUnauthorized}`;
}

const scriptPath = testEnvironment.workingDir + "_create_profile_" + profileName;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,45 +15,47 @@
*/
export interface ITestPropertiesSchema {
/**
* Properties related to connecting to CMCI
* Properties related to connecting to CICS
*/
cmci: {
cics: {
/**
* user ID to connect to CMCI
* user ID to connect to CICS
*/
user: string;
/**
* Password to connect to CMCI
* Password to connect to CICS
*/
password: string;
/**
* host name for CMCI
* host name
*/
host: string;
/**
* Port for CMCI
*/
port?: number;
/**
* CSD group to define resources to
* http or https protocol
*/
csdGroup?: string;
protocol?: string;

/**
* Name of the CICS region e.g. "CICSCMCI"
* Whether or not to reject slef-signed certs
*/
regionName?: string;
rejectUnauthorized?: boolean;
};

cmci: {
/**
* http or https protocol for CMCI
* CSD group to define resources to CMCI
*/
protocol?: string;
csdGroup?: string;

/**
* http or https protocol for CMCI
* Name of the CICS region e.g. "CICSCMCI"
*/
rejectUnauthorized?: boolean;
};
regionName?: string;
}

urimap: {
/**
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,12 +31,12 @@ describe("CICS add-to-list csdGroup command", () => {
});
csdGroup = TEST_ENVIRONMENT.systemTestProperties.cmci.csdGroup;
regionName = TEST_ENVIRONMENT.systemTestProperties.cmci.regionName;
host = TEST_ENVIRONMENT.systemTestProperties.cmci.host;
port = TEST_ENVIRONMENT.systemTestProperties.cmci.port;
user = TEST_ENVIRONMENT.systemTestProperties.cmci.user;
password = TEST_ENVIRONMENT.systemTestProperties.cmci.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cmci.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cmci.rejectUnauthorized;
host = TEST_ENVIRONMENT.systemTestProperties.cics.host;
port = TEST_ENVIRONMENT.systemTestProperties.cics.port;
user = TEST_ENVIRONMENT.systemTestProperties.cics.user;
password = TEST_ENVIRONMENT.systemTestProperties.cics.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cics.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cics.rejectUnauthorized;
});

afterAll(async () => {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,20 +33,20 @@ describe("CICS define program command", () => {
});
csdGroup = TEST_ENVIRONMENT.systemTestProperties.cmci.csdGroup;
regionName = TEST_ENVIRONMENT.systemTestProperties.cmci.regionName;
host = TEST_ENVIRONMENT.systemTestProperties.cmci.host;
port = TEST_ENVIRONMENT.systemTestProperties.cmci.port;
user = TEST_ENVIRONMENT.systemTestProperties.cmci.user;
password = TEST_ENVIRONMENT.systemTestProperties.cmci.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cmci.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cmci.rejectUnauthorized;
host = TEST_ENVIRONMENT.systemTestProperties.cics.host;
port = TEST_ENVIRONMENT.systemTestProperties.cics.port;
user = TEST_ENVIRONMENT.systemTestProperties.cics.user;
password = TEST_ENVIRONMENT.systemTestProperties.cics.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cics.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cics.rejectUnauthorized;
});

afterAll(async () => {
await TestEnvironment.cleanUp(TEST_ENVIRONMENT);
});

const deleteProgram = async (programName: string) => {
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cmci;
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cics;
const session = new Session({
type: "basic",
hostname: cmciProperties.host,
Expand All @@ -59,8 +59,8 @@ describe("CICS define program command", () => {

return CicsCmciRestClient.deleteExpectParsedXml(
session,
`/${CicsCmciConstants.CICS_SYSTEM_MANAGEMENT}/CICSDefinitionProgram/${cmciProperties.regionName}` +
`?CRITERIA=(NAME=${programName})&PARAMETER=CSDGROUP(${cmciProperties.csdGroup})`
`/${CicsCmciConstants.CICS_SYSTEM_MANAGEMENT}/CICSDefinitionProgram/${regionName}` +
`?CRITERIA=(NAME=${programName})&PARAMETER=CSDGROUP(${csdGroup})`
);
};

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,20 +33,20 @@ describe("CICS define transaction command", () => {
});
csdGroup = TEST_ENVIRONMENT.systemTestProperties.cmci.csdGroup;
regionName = TEST_ENVIRONMENT.systemTestProperties.cmci.regionName;
host = TEST_ENVIRONMENT.systemTestProperties.cmci.host;
port = TEST_ENVIRONMENT.systemTestProperties.cmci.port;
user = TEST_ENVIRONMENT.systemTestProperties.cmci.user;
password = TEST_ENVIRONMENT.systemTestProperties.cmci.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cmci.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cmci.rejectUnauthorized;
host = TEST_ENVIRONMENT.systemTestProperties.cics.host;
port = TEST_ENVIRONMENT.systemTestProperties.cics.port;
user = TEST_ENVIRONMENT.systemTestProperties.cics.user;
password = TEST_ENVIRONMENT.systemTestProperties.cics.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cics.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cics.rejectUnauthorized;
});

afterAll(async () => {
await TestEnvironment.cleanUp(TEST_ENVIRONMENT);
});

const deleteTransaction = async (transactionName: string) => {
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cmci;
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cics;
const session = new Session({
type: "basic",
hostname: cmciProperties.host,
Expand All @@ -59,8 +59,8 @@ describe("CICS define transaction command", () => {

return CicsCmciRestClient.deleteExpectParsedXml(
session,
`/${CicsCmciConstants.CICS_SYSTEM_MANAGEMENT}/${CicsCmciConstants.CICS_DEFINITION_TRANSACTION}/${cmciProperties.regionName}` +
`?CRITERIA=(NAME=${transactionName})&PARAMETER=CSDGROUP(${cmciProperties.csdGroup})`
`/${CicsCmciConstants.CICS_SYSTEM_MANAGEMENT}/${CicsCmciConstants.CICS_DEFINITION_TRANSACTION}/${regionName}` +
`?CRITERIA=(NAME=${transactionName})&PARAMETER=CSDGROUP(${csdGroup})`
);
};

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,15 +33,15 @@ describe("CICS define urimap-client command", () => {
installPlugin: true,
tempProfileTypes: ["cics"],
});
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cmci;
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cics;
csdGroup = TEST_ENVIRONMENT.systemTestProperties.cmci.csdGroup;
regionName = TEST_ENVIRONMENT.systemTestProperties.cmci.regionName;
host = TEST_ENVIRONMENT.systemTestProperties.cmci.host;
port = TEST_ENVIRONMENT.systemTestProperties.cmci.port;
user = TEST_ENVIRONMENT.systemTestProperties.cmci.user;
password = TEST_ENVIRONMENT.systemTestProperties.cmci.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cmci.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cmci.rejectUnauthorized;
host = TEST_ENVIRONMENT.systemTestProperties.cics.host;
port = TEST_ENVIRONMENT.systemTestProperties.cics.port;
user = TEST_ENVIRONMENT.systemTestProperties.cics.user;
password = TEST_ENVIRONMENT.systemTestProperties.cics.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cics.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cics.rejectUnauthorized;
certificate = TEST_ENVIRONMENT.systemTestProperties.urimap.certificate;
session = new Session({
type: "basic",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,15 +32,15 @@ describe("CICS define urimap-pipeline command", () => {
installPlugin: true,
tempProfileTypes: ["cics"],
});
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cmci;
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cics;
csdGroup = TEST_ENVIRONMENT.systemTestProperties.cmci.csdGroup;
regionName = TEST_ENVIRONMENT.systemTestProperties.cmci.regionName;
host = TEST_ENVIRONMENT.systemTestProperties.cmci.host;
port = TEST_ENVIRONMENT.systemTestProperties.cmci.port;
user = TEST_ENVIRONMENT.systemTestProperties.cmci.user;
password = TEST_ENVIRONMENT.systemTestProperties.cmci.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cmci.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cmci.rejectUnauthorized;
host = TEST_ENVIRONMENT.systemTestProperties.cics.host;
port = TEST_ENVIRONMENT.systemTestProperties.cics.port;
user = TEST_ENVIRONMENT.systemTestProperties.cics.user;
password = TEST_ENVIRONMENT.systemTestProperties.cics.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cics.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cics.rejectUnauthorized;
session = new Session({
type: "basic",
hostname: cmciProperties.host,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,15 +32,15 @@ describe("CICS define urimap-server command", () => {
installPlugin: true,
tempProfileTypes: ["cics"],
});
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cmci;
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cics;
csdGroup = TEST_ENVIRONMENT.systemTestProperties.cmci.csdGroup;
regionName = TEST_ENVIRONMENT.systemTestProperties.cmci.regionName;
host = TEST_ENVIRONMENT.systemTestProperties.cmci.host;
port = TEST_ENVIRONMENT.systemTestProperties.cmci.port;
user = TEST_ENVIRONMENT.systemTestProperties.cmci.user;
password = TEST_ENVIRONMENT.systemTestProperties.cmci.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cmci.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cmci.rejectUnauthorized;
host = TEST_ENVIRONMENT.systemTestProperties.cics.host;
port = TEST_ENVIRONMENT.systemTestProperties.cics.port;
user = TEST_ENVIRONMENT.systemTestProperties.cics.user;
password = TEST_ENVIRONMENT.systemTestProperties.cics.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cics.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cics.rejectUnauthorized;
session = new Session({
type: "basic",
hostname: cmciProperties.host,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,15 +34,15 @@ describe("CICS define web service command", () => {
installPlugin: true,
tempProfileTypes: ["cics"],
});
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cmci;
const cmciProperties = TEST_ENVIRONMENT.systemTestProperties.cics;
csdGroup = TEST_ENVIRONMENT.systemTestProperties.cmci.csdGroup;
regionName = TEST_ENVIRONMENT.systemTestProperties.cmci.regionName;
host = TEST_ENVIRONMENT.systemTestProperties.cmci.host;
port = TEST_ENVIRONMENT.systemTestProperties.cmci.port;
user = TEST_ENVIRONMENT.systemTestProperties.cmci.user;
password = TEST_ENVIRONMENT.systemTestProperties.cmci.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cmci.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cmci.rejectUnauthorized;
host = TEST_ENVIRONMENT.systemTestProperties.cics.host;
port = TEST_ENVIRONMENT.systemTestProperties.cics.port;
user = TEST_ENVIRONMENT.systemTestProperties.cics.user;
password = TEST_ENVIRONMENT.systemTestProperties.cics.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cics.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cics.rejectUnauthorized;
session = new Session({
type: "basic",
hostname: cmciProperties.host,
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,12 +31,12 @@ describe("CICS delete program command", () => {
});
csdGroup = TEST_ENVIRONMENT.systemTestProperties.cmci.csdGroup;
regionName = TEST_ENVIRONMENT.systemTestProperties.cmci.regionName;
host = TEST_ENVIRONMENT.systemTestProperties.cmci.host;
port = TEST_ENVIRONMENT.systemTestProperties.cmci.port;
user = TEST_ENVIRONMENT.systemTestProperties.cmci.user;
password = TEST_ENVIRONMENT.systemTestProperties.cmci.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cmci.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cmci.rejectUnauthorized;
host = TEST_ENVIRONMENT.systemTestProperties.cics.host;
port = TEST_ENVIRONMENT.systemTestProperties.cics.port;
user = TEST_ENVIRONMENT.systemTestProperties.cics.user;
password = TEST_ENVIRONMENT.systemTestProperties.cics.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cics.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cics.rejectUnauthorized;
});

afterAll(async () => {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,12 +33,12 @@ describe("CICS delete transaction command", () => {
});
csdGroup = TEST_ENVIRONMENT.systemTestProperties.cmci.csdGroup;
regionName = TEST_ENVIRONMENT.systemTestProperties.cmci.regionName;
host = TEST_ENVIRONMENT.systemTestProperties.cmci.host;
port = TEST_ENVIRONMENT.systemTestProperties.cmci.port;
user = TEST_ENVIRONMENT.systemTestProperties.cmci.user;
password = TEST_ENVIRONMENT.systemTestProperties.cmci.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cmci.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cmci.rejectUnauthorized;
host = TEST_ENVIRONMENT.systemTestProperties.cics.host;
port = TEST_ENVIRONMENT.systemTestProperties.cics.port;
user = TEST_ENVIRONMENT.systemTestProperties.cics.user;
password = TEST_ENVIRONMENT.systemTestProperties.cics.password;
protocol = TEST_ENVIRONMENT.systemTestProperties.cics.protocol;
rejectUnauthorized = TEST_ENVIRONMENT.systemTestProperties.cics.rejectUnauthorized;
});

afterAll(async () => {
Expand Down
Loading

0 comments on commit be2e3f3

Please sign in to comment.