Duplicating the cherry-pick from master 24/89524/1 dublin
authorShankar Narayanan <snarayanan@research.att.com>
Thu, 6 Jun 2019 14:28:15 +0000 (10:28 -0400)
committerShankar Narayanan <snarayanan@research.att.com>
Thu, 6 Jun 2019 14:30:56 +0000 (10:30 -0400)
Commit in master: https://gerrit.onap.org/r/c/optf/has/+/89442

Change-Id: I648cfb085b2cfd9829f541a844665ca5e2490330
Signed-off-by: Shankar Narayanan <snarayanan@research.att.com>
Issue-ID: OJSI-137

docs/sections/release-notes.rst

index 8e9b99a..10062de 100644 (file)
@@ -58,6 +58,8 @@ These are all issues with fix version: Dublin Release and status: open, in-progr
 
 *Known Security Issues*
 
+    * [`OJSI-137 <https://jira.onap.org/browse/OJSI-137>`_] In default deployment OPTFRA (oof-has-api) exposes HTTP port 30275 outside of cluster.
+
 *Known Vulnerabilities in Used Modules*
 
 OPTFRA code has been formally scanned during build time using NexusIQ and no Critical vulnerability was found. `project <https://wiki.onap.org/pages/viewpage.action?pageId=64005463>`_.