Policy Release Notes

Version: 5.0.1

Release Date:2019-09-30 (El Alto Release)

New Features

Artifacts released:

Repository Java Artifact Docker Image (if applicable)
policy/parent 3.0.0  
policy/common 1.5.0  
policy/models 2.1.2  
policy/api 2.1.1 onap/policy-api:2.1.1
policy/pap 2.1.1 onap/policy-pap:2.1.1
policy/drools-pdp 1.5.1 onap/policy-drools:1.5.1
policy/apex-pdp 2.2.1 onap/policy-apex-pdp:2.2.1
policy/xacml-pdp 2.1.1 onap/policy-xacml-pdp:2.1.1
policy/drools-applications 1.5.1 onap/policy-pdpd-cl:1.5.1
policy/engine 1.5.1 onap/policy-pe:1.5.1
policy/distribution 2.2.0 onap/policy-distribution:2.2.0
policy/docker 1.4.0 onap/policy-common-alpine:1.4.0 onap/policy/base-alpine:1.4.0

The El Alto release for POLICY delivered the following Epics. For a full list of stories and tasks delivered in the El Alto release, refer to JiraPolicyElAlto.

  • [POLICY-1727] - This epic covers technical debt left over from Dublin
    • POLICY-969 Docker improvement in policy framwork modules
    • POLICY-1121 RPM build for Apex
    • POLICY-1223 CII Silver Badging Requirements
    • POLICY-1465 Support configurable Heap Memory Settings for JVM processes
    • POLICY-1646 Replace uses of getCanonicalName() with getName()
    • POLICY-1653 Remove isNullVersion() method
    • POLICY-1732 Enable maven-checkstyle-plugin in apex-pdp
    • POLICY-1737 Upgrade oParent 2.0.0 - change daily jobs to staging jobs
    • POLICY-1742 Make HTTP return code handling configurable in APEX
    • POLICY-1744 Remove topic.properties and incorporate into overall properties
    • POLICY-1770 PAP REST API for PDPGroup Healthcheck
    • POLICY-1771 Boost policy/api JUnit code coverage
    • POLICY-1773 Enhance the policy/xacml-pdp S3P Stability and Performance tests
    • POLICY-1784 Better Handling of “version” field value with clients
    • POLICY-1785 Deploy same policy with a new version simply adds to the list
    • POLICY-1791 Address Sonar issues in new policy repos
    • POLICY-1795 PAP: bounced apex and xacml pdps show deleted instance in pdp status through APIs.
    • POLICY-1800 API|PAP components use different version formats
    • POLICY-1805 Build up stability test for api component to follow S3P requirements
    • POLICY-1806 Build up S3P performance test for api component
    • POLICY-1826 Move the dmaap and pdp simulator to policy/common
    • POLICY-1885 Apex-pdp: Extend CLIEditor to generate policy in ToscaServiceTemplate format
  • [POLICY-1823] - This epic covers the work to develop features that will be deployed dark in El Alto.
    • POLICY-1762 Create CDS API model implementation

Bug Fixes

The following bug fixes have been deployed with this release:

  • POLICY-1793 API|MODELS: Retrieving Legacy Operational Policy as a Tosca Policy with wrong version
  • POLICY-1801 Deploy/undeploy via integer version fails
  • POLICY-1802 Apex-pdp: context album is mandatory for policy model to compile
  • POLICY-1803 PAP should undeploy policies when subgroup is deleted
  • POLICY-1808 API|PAP|PDP-X [new] should publish docker images with the following tag X.Y-SNAPSHOT-latest
  • POLICY-1809 In the return of GET call to retrieve the >1 version of guard policy, “version” field is always “1.0.0”
  • POLICY-1818 APEX does not allow arbitrary Kafka parameters to be specified
  • POLICY-1830 Policy throws error parsing its Publish on APPC-CL topic
  • POLICY-1838 Drools-pdp error log is missing data in ErrorDescription field
  • POLICY-1839 Policy Model currently needs to be escaped
  • POLICY-1842 Fix documentation links
  • POLICY-1843 Decision API not returning monitoring policies when calling api with policy-type
  • POLICY-1844 XACML PDP does not update policy statistics
  • POLICY-1859 Drools rules should not timeout when given timeout=0 - should be treated as infinite
  • POLICY-1872 brmsgw fails building a jar - trafficgenerator dependency does not exist
  • POLICY-1876 ONAP-PAP-REST JUnit fail on Centos
  • POLICY-1879 ApexPDP - Build/Test fails in Nordix - InetAddress.getLocalHost() fails

Security Notes

Fixed Security Issues

Known Security Issues

Known Vulnerabilities in Used Modules

POLICY code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The POLICY open Critical security vulnerabilities and their risk assessment have been documented as part of the project (El Alto Release).

Quick Links:

Known Issues

The following known issues will be addressed in a future release:

POLICY-1276 JRuby interpreter shutdown fails on second and subsequent runs POLICY-1291 Maven Error when building Apex documentation in Windows POLICY-1725 XACML PDP returns 500 vs 400 for bad syntax JSON POLICY-1832 API|PAP: data race condition seem to appear sometimes when creating and deploying policy

Version: 4.0.0

Release Date:2019-06-26 (Dublin Release)

New Features

Artifacts released:

Repository Java Artifact Docker Image (if applicable)
policy/parent 2.1.0  
policy/common 1.4.0  
policy/models 2.0.2  
policy/api 2.0.1 onap/policy-api:2.0.1
policy/pap 2.0.1 onap/policy-pap:2.0.1
policy/drools-pdp 1.4.0 onap/policy-drools:1.4.0
policy/apex-pdp 2.1.0 onap/policy-apex-pdp:2.1.0
policy/xacml-pdp 2.1.0 onap/policy-xacml-pdp:2.1.0
policy/drools-applications 1.4.2 onap/policy-pdpd-cl:1.4.2
policy/engine 1.4.1 onap/policy-pe:1.4.1
policy/distribution 2.1.0 onap/policy-distribution:2.1.0
policy/docker 1.4.0 onap/policy-common-alpine:1.4.0 onap/policy/base-alpine:1.4.0

The Dublin release for POLICY delivered the following Epics. For a full list of stories and tasks delivered in the Dublin release, refer to JiraPolicyDublin.

  • [POLICY-1068] - This epic covers the work to cleanup, enhance, fix, etc. any Control Loop based code base.
    • POLICY-1195 Separate model code from drools-applications into other repositories
    • POLICY-1367 Spike - Experimentation for management of Drools templates and Operational Policies
    • POLICY-1397 PDP-D: NOOP Endpoints Support to test Operational Policies.
    • POLICY-1459 PDP-D [Control Loop] : Create a Control Loop flavored PDP-D image
  • [POLICY-1069] - This epic covers the work to harden the codebase for the Policy Framework project.
    • POLICY-1007 Remove Jackson from policy framework components
    • POLICY-1202 policy-engine & apex-pdp are using different version of eclipselink
    • POLICY-1250 Fix issues reported by sonar in policy modules
    • POLICY-1368 Remove hibernate from policy repos
    • POLICY-1457 Use Alpine in base docker images
  • [POLICY-1072] - This epic covers the work to support S3P Performance criteria.
    • S3P Performance related items
  • [POLICY-1171] - Enhance CLC Facility
    • POLICY-1173 High-level specification of coordination directives
  • [POLICY-1220] - This epic covers the work to support S3P Security criteria
    • POLICY-1538 Upgrade Elasticsearch to 6.4.x to clear security issue
  • [POLICY-1269] - R4 Dublin - ReBuild Policy Infrastructure
    • POLICY-1270 Policy Lifecycle API RESTful HealthCheck/Statistics Main Entry Point
    • POLICY-1271 PAP RESTful HealthCheck/Statistics Main Entry Point
    • POLICY-1272 Create the S3P JMeter tests for API, PAP, XACML (2nd Gen)
    • POLICY-1273 Policy Type Application Design Requirements
    • POLICY-1436 XACML PDP RESTful HealthCheck/Statistics Main Entry Point
    • POLICY-1440 XACML PDP RESTful Decision API Main Entry Point
    • POLICY-1441 Policy Lifecycle API RESTful Create/Read Main Entry Point for Policy Types
    • POLICY-1442 Policy Lifecycle API RESTful Create/Read Main Entry Point for Concrete Policies
    • POLICY-1443 PAP Dmaap PDP Register/UnRegister Main Entry Point
    • POLICY-1444 PAP Dmaap Policy Deploy/Undeploy Policies Main Entry Point
    • POLICY-1445 XACML PDP upgrade to xacml 2.0.0
    • POLICY-1446 Policy Lifecycle API RESTful Delete Main Entry Point for Policy Types
    • POLICY-1447 Policy Lifecycle API RESTful Delete Main Entry Point for Concrete Policies
    • POLICY-1449 XACML PDP Dmaap Register/UnRegister Functionality
    • POLICY-1451 XACML PDP Dmaap Deploy/UnDeploy Functionality
    • POLICY-1452 Apex PDP Dmaap Register/UnRegister Functionality
    • POLICY-1453 Apex PDP Dmaap Deploy/UnDeploy Functionality
    • POLICY-1454 Drools PDP Dmaap Register/UnRegister Functionality
    • POLICY-1455 Drools PDP Dmaap Deploy/UnDeploy Functionality
    • POLICY-1456 Policy Architecture and Roadmap Documentation
    • POLICY-1458 Create S3P JMeter Tests for Policy API
    • POLICY-1460 Create S3P JMeter Tests for PAP
    • POLICY-1461 Create S3P JMeter Tests for Policy XACML Engine (2nd Generation)
    • POLICY-1462 Create S3P JMeter Tests for Policy SDC Distribution
    • POLICY-1471 Policy Application Designer - Develop Guard and Control Loop Coordination Policy Type application
    • POLICY-1474 Modifications of Control Loop Operational Policy to support new Policy Lifecycle API
    • POLICY-1515 Prototype Policy Lifecycle API Swagger Entry Points
    • POLICY-1516 Prototype the Policy Decision API
    • POLICY-1541 PAP REST API for PDPGroup Query, Statistics & Delete
    • POLICY-1542 PAP REST API for PDPGroup Deployment, State Management & Health Check
  • [POLICY-1399] - This epic covers the work to support model drive control loop design as defined by the Control Loop Subcommittee
    • Model drive control loop related items
  • [POLICY-1404] - This epic covers the work to support the CCVPN Use Case for Dublin
    • POLICY-1405 Develop SDNC API for trigger bandwidth
  • [POLICY-1408] - This epic covers the work done with the Casablanca release
    • POLICY-1410 List Policy API
    • POLICY-1413 Dashboard enhancements
    • POLICY-1414 Push Policy and DeletePolicy API enhancement
    • POLICY-1416 Model enhancements to support CLAMP
    • POLICY-1417 Resiliency improvements
    • POLICY-1418 PDP APIs - make ClientAuth optional
    • POLICY-1419 Better multi-role support
    • POLICY-1420 Model enhancement to support embedded JSON
    • POLICY-1421 New audit data for push/delete
    • POLICY-1422 Enhanced encryption
    • POLICY-1423 Save original model file
    • POLICY-1427 Controller Logging Feature
    • POLICY-1489 PDP-D: Nested JSON Event Filtering support with JsonPath
    • POLICY-1499 Mdc Filter Feature
  • [POLICY-1438] - This epic covers the work to support 5G OOF PCI Use Case
    • POLICY-1463 Functional code changes in Policy for OOF SON use case
    • POLICY-1464 Config related aspects for OOF SON use case
  • [POLICY-1450] - This epic covers the work to support the Scale Out Use Case.
    • POLICY-1278 AAI named-queries are being deprecated and should be replaced with custom-queries
    • POLICY-1545 E2E Automation - Parse the newly added model ids from operation policy
  • Additional items delivered with the release.
    • POLICY-1159 Move expectException to policy-common/utils-test
    • POLICY-1176 Work on technical debt introduced by CLC POC
    • POLICY-1266 A&AI Modularity
    • POLICY-1274 further improvement in PSSD S3P test
    • POLICY-1401 Build onap.policies.Monitoring TOSCA Policy Template
    • POLICY-1465 Support configurable Heap Memory Settings for JVM processes

Bug Fixes

The following bug fixes have been deployed with this release:

  • [POLICY-1241] - Test failure in drools-pdp if JAVA_HOME is not set
  • [POLICY-1289] - Apex only considers 200 response codes as successful result codes
  • [POLICY-1437] - Fix issues in FileSystemReceptionHandler of policy-distribution component
  • [POLICY-1501] - policy-engine JUnit tests are not independent
  • [POLICY-1627] - APEX does not support specification of a partitioner class for Kafka

Security Notes

Fixed Security Issues

  • [OJSI-117] - In default deployment POLICY (nexus) exposes HTTP port 30236 outside of cluster.
  • [OJSI-157] - In default deployment POLICY (policy-api) exposes HTTP port 30240 outside of cluster.
  • [OJSI-118] - In default deployment POLICY (policy-apex-pdp) exposes HTTP port 30237 outside of cluster.
  • [OJSI-184] - In default deployment POLICY (brmsgw) exposes HTTP port 30216 outside of cluster.

Known Security Issues

Known Vulnerabilities in Used Modules

POLICY code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The POLICY open Critical security vulnerabilities and their risk assessment have been documented as part of the project (Dublin Release).

Quick Links:

Known Issues

The following known issues will be addressed in a future release:

  • [POLICY-1795] - PAP: bounced apex and xacml pdps show deleted instance in pdp status through APIs.
  • [POLICY-1810] - API: ensure that the REST APISs (URLs) are supported and consistent regardless the type of policy: operational, guard, tosca-compliant.
  • [POLICY-1277] - policy config takes too long time to become retrievable in PDP
  • [POLICY-1378] - add support to append value into policyScope while one policy could be used by several services
  • [POLICY-1650] - Policy UI doesn’t show left menu or any content
  • [POLICY-1671] - policy/engine JUnit tests now take over 30 minutes to run
  • [POLICY-1725] - XACML PDP returns 500 vs 400 for bad syntax JSON
  • [POLICY-1793] - API|MODELS: Retrieving Legacy Operational Policy as a Tosca Policy with wrong version
  • [POLICY-1800] - API|PAP components use different version formats
  • [POLICY-1802] - Apex-pdp: context album is mandatory for policy model to compile
  • [POLICY-1808] - API|PAP|PDP-X [new] should publish docker images with the following tag X.Y-SNAPSHOT-latest
  • [POLICY-1818] - APEX does not allow arbitrary Kafka parameters to be specified
  • [POLICY-1276] - JRuby interpreter shutdown fails on second and subsequent runs
  • [POLICY-1803] - PAP should undeploy policies when subgroup is deleted
  • [POLICY-1291] - Maven Error when building Apex documentation in Windows
  • [POLICY-1872] - brmsgw fails building a jar - trafficgenerator dependency does not exist

Version: 3.0.2

Release Date:2019-03-31 (Casablanca Maintenance Release #2)

The following items were deployed with the Casablanca Maintenance Release:

Bug Fixes

  • [POLICY-1522] - Policy doesn’t send “payload” field to APPC

Security Fixes

  • [POLICY-1538] - Upgrade Elasticsearch to 6.4.x to clear security issue

License Issues

  • [POLICY-1433] - Remove proprietary licenses in PSSD test CSAR

Known Issues

The following known issue will be addressed in a future release.

  • [POLICY-1650] - Policy UI doesn’t show left menu or any content

A workaround for this issue consists in bypassing the Portal UI when accessing the Policy UI. See PAP recipes for the specific procedure.

Version: 3.0.1

Release Date:2019-01-31 (Casablanca Maintenance Release)

The following items were deployed with the Casablanca Maintenance Release:

New Features

  • [POLICY-1221] - Policy distribution application to support HTTPS communication
  • [POLICY-1222] - Apex policy PDP to support HTTPS Communication

Bug Fixes

Version: 3.0.0

Release Date:2018-11-30 (Casablanca Release)

New Features

The Casablanca release for POLICY delivered the following Epics. For a full list of stories and tasks delivered in the Casablanca release, refer to JiraPolicyCasablanca (Note: Jira details can also be viewed from this link).

  • [POLICY-701] - This epic covers the work to integrate Policy into the SDC Service Distribution

The policy team introduced a new application into the framework that provides integration of the Service Distribution Notifications from SDC to Policy.

  • [POLICY-719] - This epic covers the work to build the Policy Lifecycle API
  • [POLICY-726] - This epic covers the work to distribute policy from the PAP to the PDPs into the ONAP platform
  • [POLICY-876] - This epics covers the work to re-build how the PAP organizes the PDP’s into groups.

The policy team did some forward looking spike work towards re-building the Software Architecture.

  • [POLICY-809] - Maintain and implement performance
  • [POLICY-814] - 72 hour stability testing (component and platform)

The policy team made enhancements to the Drools PDP to further support S3P Performance. For the new Policy SDC Distribution application and the newly ingested Apex PDP the team established S3P performance standard and performed 72 hour stability tests.

  • [POLICY-824] - maintain and implement security

The policy team established AAF Root Certificate for HTTPS communication and CADI/AAF integration into the MVP applications. In addition, many java dependencies were upgraded to clear CLM security issues.

  • [POLICY-840] - Flexible control loop coordination facility.

Work towards a POC for control loop coordination policies were implemented.

  • [POLICY-841] - Covers the work required to support HPA

Enhancements were made to support the HPA use case through the use of the new Policy SDC Service Distribution application.

  • [POLICY-842] - This epic covers the work to support the Auto Scale Out functional requirements

Enhancements were made to support Scale Out Use Case to enforce new guard policies and updated SO and A&AI APIs.

  • [POLICY-851] - This epic covers the work to bring in the Apex PDP code

A new Apex PDP engine was ingested into the platform and work was done to ensure code cleared CLM security issues, sonar issues, and checkstyle.

  • [POLICY-1081] - This epic covers the contribution for the 5G OOF PCI Optimization use case.

Policy templates changes were submitted that supported the 5G OOF PCI optimization use case.

  • [POLICY-1182] - Covers the work to support CCVPN use case

Policy templates changes were submitted that supported the CCVPN use case.

Bug Fixes

The following bug fixes have been deployed with this release:

  • [POLICY-799] - Policy API Validation Does Not Validate Required Parent Attributes in the Model
  • [POLICY-869] - Control Loop Drools Rules should not have exceptions as well as die upon an exception
  • [POLICY-872] - investigate potential race conditions during rules version upgrades during call loads
  • [POLICY-878] - pdp-d: feature-pooling disables policy-controllers preventing processing of onset events
  • [POLICY-909] - get_ZoneDictionaryDataByName class type error
  • [POLICY-920] - Hard-coded path in junit test
  • [POLICY-921] - XACML Junit test cannot find property file
  • [POLICY-1083] - Mismatch in action cases between Policy and APPC

Security Notes

POLICY code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The POLICY open Critical security vulnerabilities and their risk assessment have been documented as part of the project (Casablanca Release).

Quick Links:

Known Issues

Version: 2.0.0

Release Date:2018-06-07 (Beijing Release)

New Features

The Beijing release for POLICY delivered the following Epics. For a full list of stories and tasks delivered in the Beijing release, refer to JiraPolicyBeijing.

  • [POLICY-390] - This epic covers the work to harden the Policy platform software base (incl 50% JUnit coverage)
    • POLICY-238 policy/drools-applications: clean up maven structure
    • POLICY-336 Address Technical Debt
    • POLICY-338 Address JUnit Code Coverage
    • POLICY-377 Policy Create API should validate input matches DCAE microservice template
    • POLICY-389 Cleanup Jenkin’s CI/CD process’s
    • POLICY-449 Policy API + Console : Common Policy Validation
    • POLICY-568 Integration with org.onap AAF project
    • POLICY-610 Support vDNS scale out for multiple times in Beijing release
  • [POLICY-391] - This epic covers the work to support Release Planning activities
    • POLICY-552 ONAP Licensing Scan - Use Restrictions
  • [POLICY-392] - Platform Maturity Requirements - Performance Level 1
    • POLICY-529 Platform Maturity Performance - Drools PDP
    • POLICY-567 Platform Maturity Performance - PDP-X
  • [POLICY-394] - This epic covers the work required to support a Policy developer environment in which Policy Developers can create, update policy templates/rules separate from the policy Platform runtime platform.
    • POLICY-488 pap should not add rules to official template provided in drools applications
  • [POLICY-398] - This epic covers the body of work involved in supporting policy that is platform specific.
    • POLICY-434 need PDP /getConfig to return an indicator of where to find the config data - in config.content versus config field
  • [POLICY-399] - This epic covers the work required to policy enable Hardware Platform Enablement
    • POLICY-622 Integrate OOF Policy Model into Policy Platform
  • [POLICY-512] - This epic covers the work to support Platform Maturity Requirements - Stability Level 1
    • POLICY-525 Platform Maturity Stability - Drools PDP
    • POLICY-526 Platform Maturity Stability - XACML PDP
  • [POLICY-513] - Platform Maturity Requirements - Resiliency Level 2
    • POLICY-527 Platform Maturity Resiliency - Policy Engine GUI and PAP
    • POLICY-528 Platform Maturity Resiliency - Drools PDP
    • POLICY-569 Platform Maturity Resiliency - BRMS Gateway
    • POLICY-585 Platform Maturity Resiliency - XACML PDP
    • POLICY-586 Platform Maturity Resiliency - Planning
    • POLICY-681 Regression Test Use Cases
  • [POLICY-514] - This epic covers the work to support Platform Maturity Requirements - Security Level 1
    • POLICY-523 Platform Maturity Security - CII Badging - Project Website
  • [POLICY-515] - This epic covers the work to support Platform Maturity Requirements - Escalability Level 1
    • POLICY-531 Platform Maturity Scalability - XACML PDP
    • POLICY-532 Platform Maturity Scalability - Drools PDP
    • POLICY-623 Docker image re-design
  • [POLICY-516] - This epic covers the work to support Platform Maturity Requirements - Manageability Level 1
    • POLICY-533 Platform Maturity Manageability L1 - Logging
    • POLICY-534 Platform Maturity Manageability - Instantiation < 1 hour
  • [POLICY-517] - This epic covers the work to support Platform Maturity Requirements - Usability Level 1
    • POLICY-535 Platform Maturity Usability - User Guide
    • POLICY-536 Platform Maturity Usability - Deployment Documentation
    • POLICY-537 Platform Maturity Usability - API Documentation
  • [POLICY-546] - R2 Beijing - Various enhancements requested by clients to the way we handle TOSCA models.

Bug Fixes

The following bug fixes have been deployed with this release:

  • [POLICY-484] - Extend election handler run window and clean up error messages
  • [POLICY-494] - POLICY EELF Audit.log not in ECOMP Standards Compliance
  • [POLICY-501] - Fix issues blocking election handler and add directed interface for opstate
  • [POLICY-509] - Add IntelliJ file to .gitingore
  • [POLICY-510] - Do not enforce hostname validation
  • [POLICY-518] - StateManagement creation of EntityManagers.
  • [POLICY-519] - Correctly initialize the value of allSeemsWell in DroolsPdpsElectionHandler
  • [POLICY-629] - Fixed a bug on editor screen
  • [POLICY-684] - Fix regex for brmsgw dependency handling
  • [POLICY-707] - ONAO-PAP-REST unit tests fail on first build on clean checkout
  • [POLICY-717] - Fix a bug in checking required fields if the object has include function
  • [POLICY-734] - Fix Fortify Header Manipulation Issue
  • [POLICY-743] - Fixed data name since its name was changed on server side
  • [POLICY-753] - Policy Health Check failed with multi-node cluster
  • [POLICY-765] - junit test for guard fails intermittently

Security Notes

POLICY code has been formally scanned during build time using NexusIQ and all Critical vulnerabilities have been addressed, items that remain open have been assessed for risk and determined to be false positive. The POLICY open Critical security vulnerabilities and their risk assessment have been documented as part of the project.

Quick Links:

Known Issues

The following known issues will be addressed in a future release:

  • [POLICY-522] - PAP REST APIs undesired HTTP response body for 500 responses
  • [POLICY-608] - xacml components : remove hardcoded secret key from source code
  • [POLICY-764] - Policy Engine PIP Configuration JUnit Test fails intermittently
  • [POLICY-776] - OOF Policy TOSCA models are not correctly rendered
  • [POLICY-799] - Policy API Validation Does Not Validate Required Parent Attributes in the Model
  • [POLICY-801] - fields mismatch for OOF flavorFeatures between implementation and wiki
  • [POLICY-869] - Control Loop Drools Rules should not have exceptions as well as die upon an exception
  • [POLICY-872] - investigate potential race conditions during rules version upgrades during call loads

Version: 1.0.2

Release Date:2018-01-18 (Amsterdam Maintenance Release)

Bug Fixes

The following fixes were deployed with the Amsterdam Maintenance Release:

  • [POLICY-486] - pdp-x api pushPolicy fails to push latest version

Version: 1.0.1

Release Date:2017-11-16 (Amsterdam Release)

New Features

The Amsterdam release continued evolving the design driven architecture of and functionality for POLICY. The following is a list of Epics delivered with the release. For a full list of stories and tasks delivered in the Amsterdam release, refer to JiraPolicyAmsterdam.

  • [POLICY-31] - Stabilization of Seed Code
    • POLICY-25 Replace any remaining openecomp reference by onap
    • POLICY-32 JUnit test code coverage
    • POLICY-66 PDP-D Feature mechanism enhancements
    • POLICY-67 Rainy Day Decision Policy
    • POLICY-93 Notification API
    • POLICY-158 policy/engine: SQL injection Mitigation
    • POLICY-269 Policy API Support for Rainy Day Decision Policy and Dictionaries
  • [POLICY-33] - This epic covers the body of work involved in deploying the Policy Platform components
    • POLICY-40 MSB Integration
    • POLICY-124 Integration with oparent
    • POLICY-41 OOM Integration
    • POLICY-119 PDP-D: noop sinks
  • [POLICY-34] - This epic covers the work required to support a Policy developer environment in which Policy Developers can create, update policy templates/rules separate from the policy Platform runtime platform.
    • POLICY-57 VF-C Actor code development
    • POLICY-43 Amsterdam Use Case Template
    • POLICY-173 Deployment of Operational Policies Documentation
  • [POLICY-35] - This epic covers the body of work involved in supporting policy that is platform specific.
    • POLICY-68 TOSCA Parsing for nested objects for Microservice Policies
  • [POLICY-36] - This epic covers the work required to capture policy during VNF on-boarding.
  • [POLICY-37] - This epic covers the work required to capture, update, extend Policy(s) during Service Design.
    • POLICY-64 CLAMP Configuration and Operation Policies for vFW Use Case
    • POLICY-65 CLAMP Configuration and Operation Policies for vDNS Use Case
    • POLICY-48 CLAMP Configuration and Operation Policies for vCPE Use Case
    • POLICY-63 CLAMP Configuration and Operation Policies for VOLTE Use Case
  • [POLICY-38] - This epic covers the work required to support service distribution by SDC.
  • [POLICY-39] - This epic covers the work required to support the Policy Platform during runtime.
    • POLICY-61 vFW Use Case - Runtime
    • POLICY-62 vDNS Use Case - Runtime
    • POLICY-59 vCPE Use Case - Runtime
    • POLICY-60 VOLTE Use Case - Runtime
    • POLICY-51 Runtime Policy Update Support
    • POLICY-328 vDNS Use Case - Runtime Testing
    • POLICY-324 vFW Use Case - Runtime Testing
    • POLICY-320 VOLTE Use Case - Runtime Testing
    • POLICY-316 vCPE Use Case - Runtime Testing
  • [POLICY-76] - This epic covers the body of work involved in supporting R1 Amsterdam Milestone Release Planning Milestone Tasks.
    • POLICY-77 Functional Test case definition for Control Loops
    • POLICY-387 Deliver the released policy artifacts
Bug Fixes
  • This is technically the first release of POLICY, previous release was the seed code contribution. As such, the defects fixed in this release were raised during the course of the release. Anything not closed is captured below under Known Issues. For a list of defects fixed in the Amsterdam release, refer to JiraPolicyAmsterdam.
Known Issues
  • The operational policy template has been tested with the vFW, vCPE, vDNS and VOLTE use cases. Additional development may/may not be required for other scenarios.
  • For vLBS Use Case, the following steps are required to setup the service instance:
    • Create a Service Instance via VID.
    • Create a VNF Instance via VID.
    • Preload SDNC with topology data used for the actual VNF instantiation (both base and DNS scaling modules). NOTE: you may want to set “vlb_name_0” in the base VF module data to something unique. This is the vLB server name that DCAE will pass to Policy during closed loop. If the same name is used multiple times, the Policy name-query to AAI will show multiple entries, one for each occurrence of that vLB VM name in the OpenStack zone. Note that this is not a limitation, typically server names in a domain are supposed to be unique.
    • Instantiate the base VF module (vLB, vPacketGen, and one vDNS) via VID. NOTE: The name of the VF module MUST start with Vfmodule_. The same name MUST appear in the SDNC preload of the base VF module topology. We’ll relax this naming requirement for Beijing Release.
    • Run heatbridge from the Robot VM using Vfmodule_ … as stack name (it is the actual stack name in OpenStack)
    • Populate AAI with a dummy VF module for vDNS scaling.
Security Issues
  • None at this time
Other
  • None at this time

End of Release Notes