diff options
author | Instrumental <jonathan.gathman@att.com> | 2018-11-15 10:01:18 -0600 |
---|---|---|
committer | Instrumental <jonathan.gathman@att.com> | 2018-11-15 10:01:26 -0600 |
commit | 1923c885559a64c66d91a9e5c1368b39b93ac72d (patch) | |
tree | 4f5ab29f34e756305fec952f287442c6143c35b3 /docs/sections | |
parent | 230727c305d88560ec9d61a7048b0194a81650e2 (diff) |
Casablanca Release Notes
Issue-ID: AAF-633
Change-Id: I498b2e740999fc9b8a4d1e936eff96bfc1169abc
Signed-off-by: Instrumental <jonathan.gathman@att.com>
Diffstat (limited to 'docs/sections')
-rw-r--r-- | docs/sections/release-notes.rst | 77 |
1 files changed, 52 insertions, 25 deletions
diff --git a/docs/sections/release-notes.rst b/docs/sections/release-notes.rst index 460e8732..b31635ff 100644 --- a/docs/sections/release-notes.rst +++ b/docs/sections/release-notes.rst @@ -8,45 +8,67 @@ Release Notes -Version: 2.1.0 --------------- - - -:Release Date: 2018-06-07 +Version: 2.1.8 (casablanca, 3.0.0-ONAP) +---------------------------------------- +:Release Date: 2018-11-27 **New Features** -This release fixes the packaging and security issues. + - AAF created a local CA and CA Strategy to be utilized for ONAP Test Environments that can instantiated daily, yet have continuity over time and environments. (REAL ONAP instantiations should use their *own* CAs outside of initial tests.) + - AAF has auto-creation of configurations and certificates. This is expected to be done inside an "agent" container, and used by Apps. + - AAF stores and creates "Bootstrap Data" for all users of AAF in ONAP. This simplifies the efforts of ONAP components to organize their Authorizations, and so that various Test Environments can start with correct data every time. + - Refactored all of AAF instantiations to use the above, and have consistency between the 5 ways to start AAF. + - Ability for CADI Clients to map previous User/Password combinations to current credentials for migration purposes. This is applied to Shiro Plugin as well + - CADI Coarse Grain Enforcement Point (Authorize API access). + - Created Backward compatibility features, both for DB (Cassandra) and for API access. + **Bug Fixes** - NA + - AAF in OOM was not stable coming out of Beijing. AAF OOM was refactored using above Container based Configurations. + - `AAF-617 <https://jira.onap.org/browse/AAF-617>`_ LOCATE Proxy DELETE not working + - `AAF-605 <https://jira.onap.org/browse/AAF-605>`_ DB Stoppage not causing Reset of Connection + - `AAF-601 <https://jira.onap.org/browse/AAF-601>`_ Agent "showpass" errors on optional "chal" file, when not exists + - `AAF-600 <https://jira.onap.org/browse/AAF-600>`_ Bad Data for APPC in AAF Test Evironment + - `AAF-598 <https://jira.onap.org/browse/AAF-598>`_ Inconsistent Startup with truly persistent Cass Data + - `AAF-597 <https://jira.onap.org/browse/AAF-597>`_ Please change default appc@appc.onap.org permission + - `AAF-592 <https://jira.onap.org/browse/AAF-592>`_ SDNC not able to authenticate with BAth username/password + - `AAF-530 <https://jira.onap.org/browse/AAF-530>`_ AAF inside Kubernetes inaccessible for clients from outside + **Known Issues** - NA + N/A + +**Other** + - REAL ONAP versus ONAP Test Environment + - CA used in ONAP Test Environment should (of course) NOT be used by individual companies in REAL deployments. + - Cassandra Instance in Kubernetes ONAP Test environment is a single instance. REAL deployments should follow global, multi-datacenter deployment strategies per Cassandra recommendations. + - AAF team organized all the Identities, all the Credentials, etc, on behalf of ONAP Apps. **Security Notes** + - AAF has achieved clean scans for everything in authz.git repo + - In the cadi.git (used for Adaptors), there is a Shiro adapter. Shiro itself has security flags, *NOT* the adapter, so understand the security issues of Shiro before use. -AAF code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The AAF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=28380057>`_. + - AAF code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The AAF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=28380057>`_. -Quick Links: +**Quick Links:** - `AAF project page <https://wiki.onap.org/display/DW/Application+Authorization+Framework+Project>`_ - - - `Passing Badge information for AAF <https://bestpractices.coreinfrastructure.org/en/projects/1758>`_ - - - `Project Vulnerability Review Table for AAF <https://wiki.onap.org/pages/viewpage.action?pageId=28380057>`_ + - `CII Best Practices Silver Badge information for AAF <https://bestpractices.coreinfrastructure.org/en/projects/2303?criteria_level=1>`_ + - `CII Best Practices Passing Badge information for AAF <https://bestpractices.coreinfrastructure.org/en/projects/2303?criteria_level=0>`_ + - `Project Vulnerability Review Table for AAF <https://wiki.onap.org/pages/viewpage.action?pageId=43385140>`_ **Upgrade Notes** NA **Deprecation Notes** -Version: 1.0.1 +Version: 2.1.1 (beijing, 2.0.0-ONAP) +-------------------------------------- -Release Date: 2017-11-16 +:Release Date: 2017-06-05 -New Features: +**New Features:** - Service (primary) – All the Authorization information (more on that in a bit) - Locate – how to find ANY OR ALL AAF instances across any geographic distribution @@ -56,18 +78,23 @@ New Features: - FS – File Server to provide access to distributable elements (like well known certs) - Hello - Test your client access (certs, OAuth 2.0, etc) - - - -Bug Fixes - - `AAF-290 <https://jira.onap.org/browse/AAF-290>`_ Fix aaf trusrstore +**Bug Fixes** + - `AAF-290 <https://jira.onap.org/browse/AAF-290>`_ Fix aaf truststore - `AAF-270 <https://jira.onap.org/browse/AAF-270>`_ AAF fails health check on HEAT deployment - `AAF-286 <https://jira.onap.org/browse/AAF-286>`_ SMS fails health check on OOM deployment - `AAF-273 <https://jira.onap.org/browse/AAF-273>`_ Cassandra pod running over 8G heap - or 10% of ONAP ram (for 135 other pods on 256G 4 node cluster) -Known Issues - - +**Known Issues** + N/A -Other +**Other** + - REAL ONAP versus ONAP Test Environment + - Cassandra Instance in Kubernetes ONAP Test environment is a single instance. REAL deployments should follow global, multi-datacenter deployment strategies per Cassandra recommendations. + + +**Quick Links:** + - `AAF project page <https://wiki.onap.org/display/DW/Application+Authorization+Framework+Project>`_ + - `CII Best Practices Passing Badge information for AAF <https://bestpractices.coreinfrastructure.org/en/projects/2303?criteria_level=0>`_ + - `Project Vulnerability Review Table for AAF <https://wiki.onap.org/pages/viewpage.action?pageId=43385140>`_ |