diff options
-rw-r--r-- | catalog-dao/src/test/java/org/openecomp/sdc/be/dao/cassandra/schema/SdcSchemaUtilsTest.java | 23 | ||||
-rw-r--r-- | docs/release-notes.rst | 72 |
2 files changed, 72 insertions, 23 deletions
diff --git a/catalog-dao/src/test/java/org/openecomp/sdc/be/dao/cassandra/schema/SdcSchemaUtilsTest.java b/catalog-dao/src/test/java/org/openecomp/sdc/be/dao/cassandra/schema/SdcSchemaUtilsTest.java index 39a19641f0..126881381a 100644 --- a/catalog-dao/src/test/java/org/openecomp/sdc/be/dao/cassandra/schema/SdcSchemaUtilsTest.java +++ b/catalog-dao/src/test/java/org/openecomp/sdc/be/dao/cassandra/schema/SdcSchemaUtilsTest.java @@ -156,27 +156,4 @@ public class SdcSchemaUtilsTest { Assert.assertNull(cluster); } } - - @Test - public void testCreateClusterWithAuthSsl() { - Configuration.CassandrConfig cfg = new Configuration.CassandrConfig(); - cfg.setAuthenticate(true); - cfg.setCassandraHosts(CASSANDRA_HOSTS); - cfg.setCassandraPort(CASSANDRA_PORT); - cfg.setUsername(CASSANDRA_USERNAME); - cfg.setPassword(CASSANDRA_PASSWORD); - cfg.setSsl(true); - cfg.setTruststorePath(TRUSTSTORE_PATH); - cfg.setTruststorePassword(TRUSTSTORE_PASSWORD); - - SdcSchemaUtils sdcSchemaUtils = Mockito.mock(SdcSchemaUtils.class); - when(sdcSchemaUtils.getCassandraConfig()).thenReturn(cfg); - when(sdcSchemaUtils.createCluster()).thenCallRealMethod(); - - try(Cluster cluster = sdcSchemaUtils.createCluster()) { - Assert.assertNotNull(cluster); - Assert.assertEquals(System.getProperty("javax.net.ssl.trustStore"), TRUSTSTORE_PATH); - Assert.assertEquals(System.getProperty("javax.net.ssl.trustStorePassword"), TRUSTSTORE_PASSWORD); - } - } }
\ No newline at end of file diff --git a/docs/release-notes.rst b/docs/release-notes.rst index 1475975b12..e2fcb1e78a 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -4,6 +4,78 @@ Release Notes ============= +Version: 1.5.3 +============== + +:Release Date: 2020-08-24 + +SDC SDKs Versions +----------------- + +- sdc-distribution-client + + :Version: 1.4.0 + +- sdc-tosca + + :Version: 1.6.2 + +SDC DCAE-D Versions +----------------- +DCAE DS containers upgraded to 1.3.2-1 + + +Release Purpose +---------------- + +El Alto Maintenance release is meant to fix expiring SSL certificates on El Alto build + +**Stories/Bugs/Tasks implemented** + +- [`SDC-3157`_] - fix el alto certificates for maintenance release +- [`SDC-3162`_] - Update pom to 1.5.3 for new elato maintenance release +- [`SDC-3174`_] - Update DCAE-Ds pom to 1.3.2-1 for El alto maintenance +- [`SDC-3199`_] - release elalto maintenance release on OOM + +.. _SDC-3157: https://jira.onap.org/browse/SDC-3157 +.. _SDC-3162: https://jira.onap.org/browse/SDC-3162 +.. _SDC-3174: https://jira.onap.org/browse/SDC-3174 +.. _SDC-3199: https://jira.onap.org/browse/SDC-3199 + +Security Notes +-------------- + +*Fixed Security Issues* + +*Known Security Issues* + +- [`OJSI-90 <https://jira.onap.org/browse/OJSI-90>`__\ ] - SDC exposes unprotected API for user creation +- [`OJSI-94 <https://jira.onap.org/browse/OJSI-94>`__\ ] - sdc-wfd-fe allows to impersonate any user by setting USER_ID +- [`OJSI-126 <https://jira.onap.org/browse/OJSI-126>`__\ ] - In default deployment SDC (sdc-wfd-fe) exposes HTTP port 30256 outside of cluster. +- [`OJSI-127 <https://jira.onap.org/browse/OJSI-127>`__\ ] - In default deployment SDC (sdc-wfd-be) exposes HTTP port 30257 outside of cluster. + +*Known Vulnerabilities in Used Modules* + +Quick Links: + +- `SDC project page <https://wiki.onap.org/pages/viewpage.action?pageId=6592847>`__ +- `Passing Badge information for SDC <https://bestpractices.coreinfrastructure.org/en/projects/1629>`__ + +**Known Issues** + +- [`SDC-2541 <https://jira.onap.org/browse/SDC-2541>`__\ ] - Custom WF not present in the CSAR package + +**Upgrade Notes** + + N/A + +**Deprecation Notes** + + N/A + +**Other** + + N/A Version: 1.5.2 ============== |