X-Git-Url: https://gerrit.onap.org/r/gitweb?a=blobdiff_plain;f=docs%2Frelease-notes.rst;h=fd90a37428cf40f7e219c93396a4999f0e35ea81;hb=5d63a33e1c4f8510912af1387a7eb1ce95e03292;hp=4972492afc3c322daeaa14e5ac1e8d0ce286bee2;hpb=7f68e58cda64be4cf24091840a86b9e8ee6a60b6;p=oom.git diff --git a/docs/release-notes.rst b/docs/release-notes.rst index 4972492afc..fd90a37428 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -7,16 +7,82 @@ .. Links .. _release-notes-label: -Release Notes -============= +ONAP Operations Manager Release Notes +===================================== -Version 4.0.0 Dublin Release ----------------------------- +Version 5.0.1 (El Alto Release) +---------------------------------- -:Release Date: 2019-06-10 +:Release Date: 2019-10-10 Summary -======= +------- + +The focus of this release was on maintanence and as such no new features were delivered. +A list of issues resolved in this release can be found here: https://jira.onap.org/projects/OOM/versions/10726 + +**New Features** + +**Bug Fixes** + +* 25 defects addressed (see link above) + +**Known Issues** + +The following known issues will be addressed in a future release: + +* [`OOM-1480 `_] - postgres chart does not set root password when installing on an existing database instances +* [`OOM-1966 `_] - ONAP on HA Kubernetes Cluster - Documentation update +* [`OOM-1995 `_] - Mariadb Galera cluster pods keep failing +* [`OOM-2061 `_] - Details Missing for installing the kubectl section +* [`OOM-2075 `_] - Invalid MTU for Canal CNI interfaces +* [`OOM-2080 `_] - Need for "ReadWriteMany" access on storage when deploying on Kubernetes? +* [`OOM-2091 `_] - incorrect release deployed +* [`OOM-2132 `_] - Common Galera server.cnf does not contain Camunda required settings + +**Security Notes** + +*Fixed Security Issues* + +*Known Security Issues* + +* In default deployment OOM (consul-server-ui) exposes HTTP port 30270 outside of cluster. [`OJSI-134 `_] +* Hard coded password used for all oom deployments [`OJSI-188 `_] +* CVE-2019-12127 - OOM exposes unprotected API/UI on port 30270 [`OJSI-202 `_] + +*Known Vulnerabilities in Used Modules* + +OOM code has been formally scanned during build time using NexusIQ and no +Critical vulnerability was found. + +Quick Links: + + - `OOM project page `_ + + - `Passing Badge information for OOM `_ + + + +Version 5.0.0 (El Alto Early Drop) +---------------------------------- + +:Release Date: 2019-08-19 + +Summary +------- + +**Software Requirements** + +* Upgraded to Kubernetes 1.15.x and Helm 1.14.x + + +Version 4.0.0 (Dublin Release) +------------------------------ + +:Release Date: 2019-06-26 + +Summary +------- **Platform Resiliency** @@ -49,6 +115,16 @@ Summary **Security Notes** +*Fixed Security Issues* + +*Known Security Issues* + +* In default deployment OOM (consul-server-ui) exposes HTTP port 30270 outside of cluster. [`OJSI-134 `_] +* Hard coded password used for all oom deployments [`OJSI-188 `_] +* CVE-2019-12127 - OOM exposes unprotected API/UI on port 30270 [`OJSI-202 `_] + +*Known Vulnerabilities in Used Modules* + OOM code has been formally scanned during build time using NexusIQ and no Critical vulnerability was found. @@ -69,7 +145,7 @@ Version 3.0.0 Casablanca Release :Release Date: 2018-11-30 Summary -======= +------- The focus of this release was on incremental improvements in the following areas: