Skip to main content
Version: v2.13.x LTS

Version 2.12.0 (October 2023)

Version 2.12.0 (October 2023)

Welcome to the Zowe Version 2.12.0 release!

See New features and enhancements for a full list of changes to the functionality. See Bug fixes for a list of issues addressed in this release.

Download v2.12.0 build: Want to try new features as soon as possible? You can download the v2.12.0 build from Zowe.org.

New features and enhancements

Zowe Version 2.12.0 contains the enhancements that are described in the following topics.

find out more

To watch a demo of new enhancements and updated features included in a Zowe minor release, look for the release demo recording in the Zowe V2 System Demo playlist on YouTube.

System demos are typically held the week after a minor release becomes available. Check the Open Mainframe Project Calendar for the latest schedule.

Zowe Application Framework

Zlux App Server

  • New versions of the components can change the location of their plug-ins, as the app-server will now re-inspect the plugin locations on each startup. (#280)

ZLUX Server Framework

  • Auth plug-ins that are not requested by any dataservice found at startup are no longer loaded by the server. (#504)

ZSS

  • ZSS now defaults to using TLS 1.3, which requires a minimum of zOS Version 2.4. (#646)
  • Added configuration parameter components.zss.agent.https.maxTls to control which level of TLS to use, allowing downgrading to tls 1.2 if desired with value TLSv1.2. (#654)
  • Added configuration parameter components.zss.agent.https.trace which can be set to true if desired to capture a GSK trace, which will be put into the log directory. (#654)

Zowe API Mediation Layer

  • Added a Central API ML registry endpoint to the Cloud Gateway to access an aggregated view of all services from all domains. (#3076)
  • It is now possible to forward the client certificate from Central Gateway to Domain Gateway in the request header. (#3046)
  • You can now register the Gateway to an additional Discovery service. Clients outside of the API ML cluster can now know about other gateways to facilitate routing to clusters and domains. (#3068 and #3044)
  • You can now verify service SSO support from API ML. (#3054)

Zowe Explorer

Zowe Explorer (Core)

  • See the Zowe Explorer changelog for updates included in this release.

Zowe Explorer API

Zowe Explorer FTP Extension

Zowe Explorer ESLint Plug-in

Bug fixes

Zowe Version 2.12.0 contains the bug fixes that are described in the following topics.

Zowe Installation and packaging

  • Fixed a rare bug where zwe could hang when running a unix program. (#3590)

Zowe Application Framework

ZLUX App Server

  • Removed error message components/app-server/bin/configure.sh 26: .: FSUM6807 expression syntax error seen in startup of Zowe in Version 2.11.0, caused by incorrect shell syntax. (#283)

Zowe API Mediation Layer

  • Fixed normalization of baseUrl in ZAAS client. (#3123)
  • Added the JVM heap configuration to zowe.yaml. (#3087)
  • Fixed an error preventing the Catalog UI to load when a service does not have a required parameter. (#3050)
  • Fixed a navigation issue in the Catalog when using the browser back button. (#3135)

Zowe CLI

Zowe CLI (Core)

  • Fixed bug where encoding is not passed to the Download USS Directory API. (#1825)
  • Bumped Imperative to Version 5.18.2 to fix issues with normalizing newlines on file uploads. (#1815)
  • Bumped Secrets SDK to Version 7.18.6 to use core-foundation-rs instead of the now-archived security-framework crate; to include the edge-case bug fix for Linux; and to resolve build failures for FreeBSD users.

Zowe CLI Imperative Framework

  • Fixed normalization on stream chunk boundaries. (#1815)

Zowe Explorer

Zowe Explorer (Core)

Zowe Explorer API

Zowe Explorer FTP Extension

Zowe Explorer ESLint Plug-in

Vulnerabilities fixed

Zowe discloses fixed vulnerabilities in a timely manner giving you sufficient time to plan your upgrades. Zowe does not disclose the vulnerabilities fixed in the latest release as we respect the need for at least 45 days to decide when and how you upgrade Zowe. When a new release is published, Zowe publishes the vulnerabilities fixed in the previous release. For more information about the Zowe security policy, see the Security page on the Zowe website.

The following security issues were fixed by the Zowe security group in version 2.11.

  • CVE-2023-33546 (BDSA-2023-1535)
  • CVE-2023-34462 (BDSA-2023-1556)
  • BDSA-2023-1804
  • CVE-2023-26136