diff options
author | Jimmy Forsyth <jf2512@att.com> | 2018-11-28 22:32:48 -0500 |
---|---|---|
committer | James Forsyth <jf2512@att.com> | 2018-11-29 12:24:05 +0000 |
commit | 7737fd1d14edd46b2417a1efc4b1e2c71924f608 (patch) | |
tree | 30c91804392380e924b35371a01c8c4f537bc14b /docs | |
parent | 49c37cdfbb9378cbc4531b8731c68c33c7cf1d18 (diff) |
Update aai release notes
Issue-ID: AAI-1914
Change-Id: Ief1f951c6b20543c5f2f16af07d27bb62f8d02a1
Signed-off-by: Jimmy Forsyth <jf2512@att.com>
(cherry picked from commit 73ff5292241bb2c58ef52fb06f373140481058db)
Diffstat (limited to 'docs')
-rw-r--r-- | docs/release-notes.rst | 19 |
1 files changed, 17 insertions, 2 deletions
diff --git a/docs/release-notes.rst b/docs/release-notes.rst index dcea52d9..f179af1f 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -9,7 +9,7 @@ AAI Release Notes Version: 1.3.0 -------------- -:Release Date: TBD +:Release Date: 2018-11-30 **New Features** @@ -17,7 +17,8 @@ The R3 Casablanca release of ONAP again focuses on platform maturity and deployablity. AAI continued to leverage oom and kubernetes, and added new data types in support of multiple R3 use cases. AAI added a new schema ingest library which moves AAI closer to being more -model-driven. +model-driven and a new microservice called "graphadmin" which provides +graph maintenance and configuration facilities. Authentication and Authorization is performed using AAF with the CADI framework. We use basic authentication with RBAC (Role Based Access @@ -39,6 +40,20 @@ Control) to secure the AAI REST APIs. - `AAI-1418 <https://jira.onap.org/browse/AAI-1418>`_ VLAN Tagging - `AAI-1419 <https://jira.onap.org/browse/AAI-1419>`_ Schema Ingest Library +**Known Issues** + +Please find at this link the list of issues that will be fixed in the `Casablanca Maintenance Release <https://jira.onap.org/issues/?jql=fixVersion%20%3D%20%22Casablanca%20Maintenance%20Release%22%20and%20type%20%3D%20Bug%20and%20project%20%3D%20%22Active%20and%20Available%20Inventory%22>`_ + +**Security Notes** + +AAI code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The AAI open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=38120427>`_. + +Quick Links: + +- `AAI project page <https://wiki.onap.org/display/DW/Active+and+Available+Inventory+Project>`_ +- `Passing Badge information for AAI <https://bestpractices.coreinfrastructure.org/en/projects/1591>`_ +- `Project Vulnerability Review Table for AAI <https://wiki.onap.org/pages/viewpage.action?pageId=38120427>`_ + Version: 1.2.0 -------------- |