Update release notes
[ccsdk/distribution.git] / docs / release-notes.rst
1 .. This work is licensed under a Creative Commons Attribution 4.0 International License.
2
3 Release Notes
4 =============
5
6 Version: 0.1.1
7 --------------
8
9
10 :Release Date: 2018-01-18
11
12
13 **Bug Fixes**
14    - `CCSDK-153 <https://jira.onap.org/browse/CCSDK-153>`_ dmaap listener container exitting
15    - `CCSDK-148 <https://jira.onap.org/browse/CCSDK-148>`_ Daily release builds no longer working
16
17
18 Version: 0.1.0
19 --------------
20
21
22 :Release Date: 2017-11-16
23
24
25
26 **New Features**
27
28 The Common Controller SDK provides the following functionality :
29    - Service Logic Interpreter
30    - Database access library (dblib)
31    - Service Logic test api (sliapi)
32    - MD-SAL data query adaptor
33    - SQL query adaptor
34    - Resource allocator
35    - SDC interface
36    - DMAAP interface
37    - REST API adaptor
38
39
40 **Bug Fixes**
41
42 **Known Issues**
43    - `CCSDK-110 <https://jira.onap.org/browse/CCSDK-110>`_ Resolve license issues in dashboard project
44    - `CCSDK-136 <https://jira.onap.org/browse/CCSDK-136>`_ pgaas is dependent on location_prefix being all lowercase
45    - `CCSDK-137 <https://jira.onap.org/browse/CCSDK-137>`_ isolate deprecated methods
46
47 **Security Issues**
48    - `CVE-2011-4969 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4969>`
49    - `CVE-2013-1624 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1624>`
50    - `CVE-2014-0114 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114>`
51    - `CVE-2015-0254 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0254>`
52    - `CVE-2015-5211 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5211>`
53    - `CVE-2015-5262 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5262>`
54    - `CVE-2015-7940 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7940>`
55    - `CVE-2016-3674 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3674>`
56    - `CVE-2016-9878 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9878>`
57    - `CVE-2016-1000338 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000338>`
58    - `CVE-2016-1000339 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000339>`
59    - `CVE-2016-1000341 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000341>`
60    - `CVE-2016-1000342 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000342>`
61    - `CVE-2016-1000343 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000343>`
62    - `CVE-2016-1000344 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000344>`
63    - `CVE-2016-1000345 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000345>`
64    - `CVE-2016-1000352 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000352>`
65    - `CVE-2017-5929 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929>`
66    - `CVE-2017-7525 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7525>`
67    - `CVE-2017-7536 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7536>`
68    - `CVE-2017-7957 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7957>`
69
70
71 **Upgrade Notes**
72
73 **Deprecation Notes**
74
75 **Other**
76
77 ===========