diff options
author | Krzysztof Opasiak <k.opasiak@samsung.com> | 2019-10-05 23:19:42 +0200 |
---|---|---|
committer | Krzysztof Opasiak <k.opasiak@samsung.com> | 2019-10-05 23:19:42 +0200 |
commit | 79bef7f1ca027a1aad11ebdbf8975a216d817b97 (patch) | |
tree | 1100e545740af48369d7992acc49e081e85d80c5 | |
parent | 602f77bf2e45936b0cd974788d2b58a5f5e2e397 (diff) |
Use OJSI identifier to document fixed vulnerability5.0.2-ONAPelalto
It's better to stick to the convention that OJSI ticket should be
mentioned in Fixed Security Issues section to ensure full traceability.
Issue-ID: OJSI-137
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
Change-Id: I3549e3853b5acd69df00500106ca35dc4002fe10
-rw-r--r-- | docs/sections/release-notes.rst | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/docs/sections/release-notes.rst b/docs/sections/release-notes.rst index 932b6df..b4b1fba 100644 --- a/docs/sections/release-notes.rst +++ b/docs/sections/release-notes.rst @@ -43,7 +43,8 @@ The El Alto release for OOF fixed the following Bugs. *Fixed Security Issues* - * [OPTFRA-521] oof-has-api exposes plain text HTTP endpoint using port 30275 + * [`OJSI-137 <https://jira.onap.org/browse/OJSI-137>`_] In default deployment OPTFRA (oof-has-api) exposes HTTP port 30275 outside of cluster. + This issue has been also described in "[OPTFRA-521] oof-has-api exposes plain text HTTP endpoint using port 30275" *Known Security Issues* |