summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJimmy Forsyth <jf2512@att.com>2018-11-28 22:32:48 -0500
committerJames Forsyth <jf2512@att.com>2018-11-29 12:24:05 +0000
commit7737fd1d14edd46b2417a1efc4b1e2c71924f608 (patch)
tree30c91804392380e924b35371a01c8c4f537bc14b
parent49c37cdfbb9378cbc4531b8731c68c33c7cf1d18 (diff)
Update aai release notes
Issue-ID: AAI-1914 Change-Id: Ief1f951c6b20543c5f2f16af07d27bb62f8d02a1 Signed-off-by: Jimmy Forsyth <jf2512@att.com> (cherry picked from commit 73ff5292241bb2c58ef52fb06f373140481058db)
-rw-r--r--docs/release-notes.rst19
1 files changed, 17 insertions, 2 deletions
diff --git a/docs/release-notes.rst b/docs/release-notes.rst
index dcea52d9..f179af1f 100644
--- a/docs/release-notes.rst
+++ b/docs/release-notes.rst
@@ -9,7 +9,7 @@ AAI Release Notes
Version: 1.3.0
--------------
-:Release Date: TBD
+:Release Date: 2018-11-30
**New Features**
@@ -17,7 +17,8 @@ The R3 Casablanca release of ONAP again focuses on platform maturity
and deployablity. AAI continued to leverage oom and kubernetes, and
added new data types in support of multiple R3 use cases. AAI added a
new schema ingest library which moves AAI closer to being more
-model-driven.
+model-driven and a new microservice called "graphadmin" which provides
+graph maintenance and configuration facilities.
Authentication and Authorization is performed using AAF with the CADI
framework. We use basic authentication with RBAC (Role Based Access
@@ -39,6 +40,20 @@ Control) to secure the AAI REST APIs.
- `AAI-1418 <https://jira.onap.org/browse/AAI-1418>`_ VLAN Tagging
- `AAI-1419 <https://jira.onap.org/browse/AAI-1419>`_ Schema Ingest Library
+**Known Issues**
+
+Please find at this link the list of issues that will be fixed in the `Casablanca Maintenance Release <https://jira.onap.org/issues/?jql=fixVersion%20%3D%20%22Casablanca%20Maintenance%20Release%22%20and%20type%20%3D%20Bug%20and%20project%20%3D%20%22Active%20and%20Available%20Inventory%22>`_
+
+**Security Notes**
+
+AAI code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The AAI open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=38120427>`_.
+
+Quick Links:
+
+- `AAI project page <https://wiki.onap.org/display/DW/Active+and+Available+Inventory+Project>`_
+- `Passing Badge information for AAI <https://bestpractices.coreinfrastructure.org/en/projects/1591>`_
+- `Project Vulnerability Review Table for AAI <https://wiki.onap.org/pages/viewpage.action?pageId=38120427>`_
+
Version: 1.2.0
--------------