summaryrefslogtreecommitdiffstats
path: root/docs/sections/release-notes.rst
diff options
context:
space:
mode:
authorGildas Lanilis <gildas.lanilis@huawei.com>2018-11-21 16:42:19 -0800
committerGildas Lanilis <gildas.lanilis@huawei.com>2018-11-21 16:42:19 -0800
commit60868269442f7ceb778753b5c08116c908ecb46b (patch)
treefa2ccba194af4b66c797d7f00d816af90cb992e4 /docs/sections/release-notes.rst
parentf95fc5f7ae9cf1832eae2451be883477bbd08f16 (diff)
Update Release Note
Update Vulnerability report links within the RN toward the wiki centralized place. Change-Id: Ie28e6ae2a3c18d02ffb681a23e68f01b14264cd5 Issue-ID: DOC-333 Signed-off-by: Gildas Lanilis <gildas.lanilis@huawei.com>
Diffstat (limited to 'docs/sections/release-notes.rst')
-rw-r--r--docs/sections/release-notes.rst10
1 files changed, 5 insertions, 5 deletions
diff --git a/docs/sections/release-notes.rst b/docs/sections/release-notes.rst
index b31635ff..341eb019 100644
--- a/docs/sections/release-notes.rst
+++ b/docs/sections/release-notes.rst
@@ -8,11 +8,11 @@ Release Notes
-Version: 2.1.8 (casablanca, 3.0.0-ONAP)
+Version: 2.1.8 (Casablanca, 3.0.0-ONAP)
----------------------------------------
-:Release Date: 2018-11-27
+:Release Date: 2018-11-30
**New Features**
@@ -49,20 +49,20 @@ Version: 2.1.8 (casablanca, 3.0.0-ONAP)
- AAF has achieved clean scans for everything in authz.git repo
- In the cadi.git (used for Adaptors), there is a Shiro adapter. Shiro itself has security flags, *NOT* the adapter, so understand the security issues of Shiro before use.
- - AAF code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The AAF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=28380057>`_.
+ - AAF code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The AAF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=43386201>`_.
**Quick Links:**
- `AAF project page <https://wiki.onap.org/display/DW/Application+Authorization+Framework+Project>`_
- `CII Best Practices Silver Badge information for AAF <https://bestpractices.coreinfrastructure.org/en/projects/2303?criteria_level=1>`_
- `CII Best Practices Passing Badge information for AAF <https://bestpractices.coreinfrastructure.org/en/projects/2303?criteria_level=0>`_
- - `Project Vulnerability Review Table for AAF <https://wiki.onap.org/pages/viewpage.action?pageId=43385140>`_
+ - `Project Vulnerability Review Table for AAF <https://wiki.onap.org/pages/viewpage.action?pageId=43386201>`_
**Upgrade Notes**
NA
**Deprecation Notes**
-Version: 2.1.1 (beijing, 2.0.0-ONAP)
+Version: 2.1.1 (Beijing, 2.0.0-ONAP)
--------------------------------------
:Release Date: 2017-06-05