https://<Domain>/apimanager/xapi/v1/organizations/<Org_ID>/exchange-policy-templatesreturns empty [].
2019-10-10T00:00:00.000Z - error: <ID>
InvalidTokenError: Invalid token: TokenExpiredError: jwt expired
at /usr/src/app/api/middlewares/authenticationMiddleware.js:164:31
at tryCatcher (/usr/src/app/node_modules/bluebird/js/main/util.js:26:23)
at Promise._settlePromiseFromHandler (/usr/src/app/node_modules/bluebird/js/main/promise.js:503:31)
at Promise._settlePromiseAt (/usr/src/app/node_modules/bluebird/js/main/promise.js:577:18)
at Promise._settlePromises (/usr/src/app/node_modules/bluebird/js/main/promise.js:693:14)
at Async._drainQueue (/usr/src/app/node_modules/bluebird/js/main/async.js:123:16)
at Async._drainQueues (/usr/src/app/node_modules/bluebird/js/main/async.js:133:10)
at Immediate.Async.drainQueues [as _onImmediate] (/usr/src/app/node_modules/bluebird/js/main/async.js:15:14)
at processImmediate [as _immediateCallback] (timers.js:383:17)
psql -U stolon -h localhost api-platform select "name" from "ExchangePolicyTemplates";You should see that the result is empty.
DNS="<Insert_Your_DNS>"
echo "" | openssl s_client -servername ${DNS} -connect ${DNS}:443 | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > public.cert.pem
curl --cacert "public.cert.pem" https://${DNS}/
Please replace <Insert_Your_DNS> with the DNS defined in Configure DNS on Anypoint Platform PCE.openssl s_client -connect <DNS>:443Pay attention to depth=x. If depth is 1, there should be certificate chain 0, 1 similar to below:
--- Certificate chain 0 s:/C=US/ST=California/L=Sunnyvale/O=Oath Inc/CN=*.www.test.com i:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert SHA2 High Assurance Server CA 1 s:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert SHA2 High Assurance Server CA i:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert High Assurance EV Root CA ---If you would like to understand what is a valid certificate chain, you may use the third-party reference article.
kubectl get secrets -n default nginx-ssl -o json | jq -r '.data."cert.pem"' | base64 --decode
cat cert-bundle.pem | curl -v --cacert /dev/stdin https://<your PCE DNS>
openssl rsa -check -noout -in server.key | openssl md5replace server.key with your key. And check if it asks for
Enter pass phrase for server.key:If you are observing it asking you for pass phrase, please remove the pass phrase by following this reference article.
1. openssl pkey -in privateKey.key -pubout -outform pem | md5 2. openssl x509 -in certificate.crt -pubkey -noout -outform pem | md5The command is obtained from https://www.sslshopper.com/certificate-key-matcher.html. All result should return the same value. If they don't match, please re-generate your certificate.
-----BEGIN CERTIFICATE----- MIIDijCCAvOgAwIBAgIJAKRvtQxONVZoMA0GCSqGSIb3DQEBBAUAMIGLMQswCQYD VQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTESMBAGA1UEBxMJU3Vubnl2YWxl MSAwHgYDVQQKExdBcnViYSBXaXJlbGVzcyBOZXR3b3JrczEMMAoGA1UECxMDVEFD MSMwIQYDVQQDExpteXNlcnZlci5hcnViYW5ldHdvcmtzLmNvbTAeFw0wODA0MzAy MzM3MDJaFw0xMDA0MzAyMzM3MDJaMIGLMQswCQYDVQQGEwJVUzETMBEGA1UECBMK Q2FsaWZvcm5pYTESMBAGA1UEBxMJU3Vubnl2YWxlMSAwHgYDVQQKExdBcnViYSBX aXJlbGVzcyBOZXR3b3JrczEMMAoGA1UECxMDVEFDMSMwIQYDVQQDExpteXNlcnZl ci5hcnViYW5ldHdvcmtzLmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA zRwqc9prVXycGhHcsAjGPzC2MKU4DhXSr86Z89Jk8/cXEJBJ0C/NgdAqqDgxneUh nVyxGxODa7BNGAWSagdCsKLrbkchr479E3xLfgdc3UzAJITLGCXGiQ66NwQDyM5I G/xKYm4oqgyOE/lFTTkK0M8V0NmmJynyOCYC/AwQKjMCAwEAAaOB8zCB8DAdBgNV HQ4EFgQUM5btT6IlPGkLTTPvFccTVURO1p0wgcAGA1UdIwSBuDCBtYAUM5btT6Il PGkLTTPvFccTVURO1p2hgZGkgY4wgYsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpD YWxpZm9ybmlhMRIwEAYDVQQHEwlTdW5ueXZhbGUxIDAeBgNVBAoTF0FydWJhIFdp cmVsZXNzIE5ldHdvcmtzMQwwCgYDVQQLEwNUQUMxIzAhBgNVBAMTGm15c2VydmVy LmFydWJhbmV0d29ya3MuY29tggkApG+1DE41VmgwDAYDVR0TBAUwAwEB/zANBgkq hkiG9w0BAQQFAAOBgQBp71WeF6dKvqUSO1JFsVhBeUesbEgx9+tx6eP328uL0oSC fQ6EaiXZVbrQt+PMqG0F80+4wxVXug9EW5Ob9M/opaCGI+cgtpLCwSf6CjsmAcUc b6EjG/l4HW2BztYJfx15pk51M49TYS7okDKWYRT10y65xcyQdfUKvfDC1k5P9Q== -----END CERTIFICATE-----If the certificate is in text format, then it is in PEM format.
openssl x509 -in cert.crt -textIf the above command doest not return the certificate, you need to convert the certificate into PEM format for PCE to understand. You may use SSL Converter online to convert the certificate, or run the commands as listed in SSL Converter website. Pay special attention that if you are having chains, you will need to convert one by one, then concatenate the certificate as per Step 4. This Salesforce KB helps you to understand how a typical merged certificate looks like.
# openssl rsa -noout -modulus -in server.key | openssl md5 # openssl x509 -noout -modulus -in server.crt | openssl md58. Try taking PCE out of the picture and test with a simple openssl server (step 3 of this article: How to set up a minimal SSL/TLS server from the command line
001123172

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.