blob: cacdc241cf2e6dbaa2efffd1a7e9e7b13ae0c5c7 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
|
.. This work is licensed under a Creative Commons Attribution 4.0 International License.
Release Notes
=============
Version: 0.1.1
--------------
:Release Date: 2018-01-18
**Bug Fixes**
- `CCSDK-153 <https://jira.onap.org/browse/CCSDK-153>`_ dmaap listener container exitting
- `CCSDK-148 <https://jira.onap.org/browse/CCSDK-148>`_ Daily release builds no longer working
Version: 0.1.0
--------------
:Release Date: 2017-11-16
**New Features**
The Common Controller SDK provides the following functionality :
- Service Logic Interpreter
- Database access library (dblib)
- Service Logic test api (sliapi)
- MD-SAL data query adaptor
- SQL query adaptor
- Resource allocator
- SDC interface
- DMAAP interface
- REST API adaptor
**Bug Fixes**
**Known Issues**
- `CCSDK-110 <https://jira.onap.org/browse/CCSDK-110>`_ Resolve license issues in dashboard project
- `CCSDK-136 <https://jira.onap.org/browse/CCSDK-136>`_ pgaas is dependent on location_prefix being all lowercase
- `CCSDK-137 <https://jira.onap.org/browse/CCSDK-137>`_ isolate deprecated methods
**Security Issues**
- `CVE-2011-4969 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4969>`
- `CVE-2013-1624 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1624>`
- `CVE-2014-0114 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114>`
- `CVE-2015-0254 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0254>`
- `CVE-2015-5211 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5211>`
- `CVE-2015-5262 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5262>`
- `CVE-2015-7940 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7940>`
- `CVE-2016-3674 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3674>`
- `CVE-2016-9878 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9878>`
- `CVE-2016-1000338 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000338>`
- `CVE-2016-1000339 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000339>`
- `CVE-2016-1000341 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000341>`
- `CVE-2016-1000342 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000342>`
- `CVE-2016-1000343 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000343>`
- `CVE-2016-1000344 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000344>`
- `CVE-2016-1000345 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000345>`
- `CVE-2016-1000352 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000352>`
- `CVE-2017-5929 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929>`
- `CVE-2017-7525 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7525>`
- `CVE-2017-7536 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7536>`
- `CVE-2017-7957 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7957>`
**Upgrade Notes**
**Deprecation Notes**
**Other**
===========
|