Policy Life Cycle API¶
The purpose of this API is to support CRUD of TOSCA PolicyType and Policy entities. This API is provided by the PolicyDevelopment component of the Policy Framework, see the The ONAP Policy Framework Architecture page. The Policy design API backend is running in an independent building block component of the policy framework that provides REST services for the aforementioned CRUD behaviors. The Policy design API component interacts with a policy database for storing and fetching new policies or policy types as needed. Apart from CRUD, an API is also exposed for clients to retrieve healthcheck status of the API REST service and statistics report including a variety of counters that reflect the history of API invocation.
We strictly follow TOSCA Specification to define policy types and policies. A policy type defines the schema for a policy, expressing the properties, targets, and triggers that a policy may have. The type (string, int etc) and constraints (such as the range of legal values) of each property is defined in the Policy Type. Both Policy Type and policy are included in a TOSCA Service Template, which is used as the entity passed into an API POST call and the entity returned by API GET and DELETE calls. More details are presented in following sections. Policy Types and Policies can be composed for any given domain of application. All Policy Types and Policies must be composed as well-formed TOSCA Service Templates. One Service Template can contain multiple policies and policy types.
Child policy types can inherit from parent policy types, so a hierarchy of policy types can be built up. For example, the HpaPolicy Policy Type in the table below is a child of a Resource Policy Type, which is a child of an Optimization policy. See also the examples in Github.
onap.policies.Optimization.yaml
onap.policies.optimization.Resource.yaml
onap.policies.optimization.resource.AffinityPolicy.yaml
onap.policies.optimization.resource.DistancePolicy.yaml
onap.policies.optimization.resource.HpaPolicy.yaml
onap.policies.optimization.resource.OptimizationPolicy.yaml
onap.policies.optimization.resource.PciPolicy.yaml
onap.policies.optimization.resource.Vim_fit.yaml
onap.policies.optimization.resource.VnfPolicy.yaml
onap.policies.optimization.Service.yaml
onap.policies.optimization.service.QueryPolicy.yaml
onap.policies.optimization.service.SubscriberPolicy.yaml
Custom data types can be defined in TOSCA for properties specified in Policy Types. Data types can also inherit from parents, so a hierarchy of data types can also be built up.
Warning
When creating a Policy Type, the ancestors of the Policy Type and all its custom Data Type definitions and ancestors MUST either already exist in the database or MUST also be defined in the incoming TOSCA Service Template. Requests with missing or bad references are rejected by the API.
Each Policy Type can have multiple Policy instances created from it. Therefore, many Policy instances of the HpaPolicy Policy Type above can be created. When a policy is created, its Policy Type is specified in the type and type_version fields of the policy.
Warning
The Policy Type specified for a Policy MUST exist in the database before the policy can be created. Requests with missing or bad Policy Type references are rejected by the API.
The API allows applications to create, update, delete, and query PolicyType entities so that they become available for use in ONAP by applications such as CLAMP. Some Policy Type entities are preloaded in the Policy Framework.
Warning
If a TOSCA entity (Data Type, Policy Type, or Policy with a certain version) already exists in the database and an attempt is made to re-create the entity with different fields, the API will reject the request with the error message “entity in incoming fragment does not equal existing entity”. In such cases, delete the Policy or Policy Type and re-create it using the API.
The TOSCA fields below are valid on API calls:
Field |
GET |
POST |
DELETE |
Comment |
---|---|---|---|---|
(name) |
M |
M |
M |
The definition of the reference to the Policy Type, GET allows ranges to be specified |
version |
O |
M |
C |
GET allows ranges to be specified, must be specified if more than one version of the Policy Type exists and a specific version is required |
description |
R |
O |
N/A |
Desciption of the Policy Type |
derived_from |
R |
C |
N/A |
Must be specified when a Policy Type is derived from another Policy Type such as in the case of derived Monitoring Policy Types. The referenced Policy Type must either already exist in the database or be defined as another policy type in the incoming TOSCA service template |
metadata |
R |
O |
N/A |
Metadata for the Policy Type |
properties |
R |
M |
N/A |
This field holds the specification of the specific Policy Type in ONAP. Any user defined data types specified on properties must either already exist in the database or be defined in the incoming TOSCA service template |
targets |
R |
O |
N/A |
A list of node types and/or group types to which the Policy Type can be applied |
triggers |
R |
O |
N/A |
Specification of policy triggers, not currently supported in ONAP |
Note
On this and subsequent tables, use the following legend: M-Mandatory, O-Optional, R-Read-only, C-Conditional. Conditional means the field is mandatory when some other field is present.
Note
Preloaded policy types may only be queried over this API, modification or deletion of preloaded policy type implementations is disabled.
Note
Policy types that are in use (referenced by defined Policies and/or child policy types) may not be deleted.
Note
The group types of targets in TOSCA are groups of TOSCA nodes, not PDP groups; the target concept in TOSCA is equivalent to the Policy Enforcement Point (PEP) concept
To ease policy creation, we preload several widely used policy types in policy database. Below is a table listing the preloaded policy types.
Policy Type Name |
Payload |
---|---|
Monitoring.TCA |
|
Monitoring.Collectors |
onap.policies.monitoring.dcaegen2.collectors.datafile.datafile-app-server.yaml |
Optimization |
|
Optimization.Resource |
|
Optimization.Resource.AffinityPolicy |
|
Optimization.Resource.DistancePolicy |
|
Optimization.Resource.HpaPolicy |
|
Optimization.Resource.OptimizationPolicy |
|
Optimization.Resource.PciPolicy |
|
Optimization.Resource.Vim_fit |
|
Optimization.Resource.VnfPolicy |
|
Optimization.Service |
|
Optimization.Service.QueryPolicy |
|
Optimization.Service.SubscriberPolicy |
|
Controlloop.Guard.Common |
|
Controlloop.Guard.Common.Blacklist |
|
Controlloop.Guard.Common.FrequencyLimiter |
onap.policies.controlloop.guard.common.FrequencyLimiter.yaml |
Controlloop.Guard.Common.MinMax |
|
Controlloop.Guard.Common.Filter |
|
Controlloop.Guard.Coordination.FirstBlocksSecond |
onap.policies.controlloop.guard.coordination.FirstBlocksSecond.yaml |
Controlloop.Operational.Common |
|
Controlloop.Operational.Common.Apex |
|
Controlloop.Operational.Common.Drools |
|
Naming |
|
Native.Drools |
|
Native.Xacml |
|
Native.Apex |
We also preload a policy in the policy database. Below is a table listing the preloaded polic(ies).
Policy Type Name |
Payload |
---|---|
SDNC.Naming |
Below is a table containing sample well-formed TOSCA compliant policies.
Policy Name |
Payload |
---|---|
vCPE.Monitoring.Tosca |
vCPE.policy.monitoring.input.tosca.yaml vCPE.policy.monitoring.input.tosca.json |
vCPE.Optimization.Tosca |
vCPE.policies.optimization.input.tosca.yaml vCPE.policies.optimization.input.tosca.json |
vCPE.Operational.Tosca |
vCPE.policy.operational.input.tosca.yaml vCPE.policy.operational.input.tosca.json |
vDNS.Guard.FrequencyLimiting.Tosca |
|
vDNS.Guard.MinMax.Tosca |
|
vDNS.Guard.Blacklist.Tosca |
|
vDNS.Monitoring.Tosca |
vDNS.policy.monitoring.input.tosca.yaml vDNS.policy.monitoring.input.tosca.json |
vDNS.Operational.Tosca |
vDNS.policy.operational.input.tosca.yaml vDNS.policy.operational.input.tosca.json |
vFirewall.Monitoring.Tosca |
vFirewall.policy.monitoring.input.tosca.yaml vFirewall.policy.monitoring.input.tosca.json |
vFirewall.Operational.Tosca |
vFirewall.policy.operational.input.tosca.yaml vFirewall.policy.operational.input.tosca.json |
vFirewallCDS.Operational.Tosca |
Below is a global API table from where swagger JSON for different types of policy design API can be downloaded.
Global API Table¶
API name |
Swagger JSON |
---|---|
Healthcheck API |
|
Statistics API |
|
Tosca Policy Type API |
|
Tosca Policy API |
API Swagger¶
It is worth noting that we use basic authorization for API access with username and password set to healthcheck and zb!XztG34 respectively. Also, the new APIs support both http and https.
For every API call, client is encouraged to insert an uuid-type requestID as parameter. It is helpful for tracking each http transaction and facilitates debugging. Mostly importantly, it complies with Logging requirements v1.2. If a client does not provide the requestID in API call, one will be randomly generated and attached to response header x-onap-requestid.
In accordance with ONAP API Common Versioning Strategy Guidelines, in the response of each API call, several custom headers are added:
x-latestversion: 1.0.0
x-minorversion: 0
x-patchversion: 0
x-onap-requestid: e1763e61-9eef-4911-b952-1be1edd9812b
x-latestversion is used only to communicate an API's latest version.
x-minorversion is used to request or communicate a MINOR version back from the client to the server, and from the server back to the client.
x-patchversion is used only to communicate a PATCH version in a response for troubleshooting purposes only, and will not be provided by the client on request.
x-onap-requestid is used to track REST transactions for logging purpose, as described above.
HealthCheck¶
GET /policy/api/v1/healthcheck
Perform a system healthcheck
Description: Returns healthy status of the Policy API component
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; Healthcheck report will be returned.
401 - Authentication Error
403 - Authorization Error
500 - Internal Server Error
Statistics¶
GET /policy/api/v1/statistics
Retrieve current statistics
Description: Returns current statistics including the counters of API invocation
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; All statistics counters of API invocation will be returned.
401 - Authentication Error
403 - Authorization Error
500 - Internal Server Error
PolicyType¶
GET /policy/api/v1/policytypes
Retrieve existing policy types
Description: Returns a list of existing policy types stored in Policy Framework
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; All policy types will be returned.
401 - Authentication Error
403 - Authorization Error
500 - Internal Server Error
POST /policy/api/v1/policytypes
Create a new policy type
Description: Create a new policy type. Client should provide TOSCA body of the new policy type
Consumes: [‘application/json’, ‘application/yaml’]
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
body |
body |
Entity body of policy type |
ToscaServiceTemplate |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; The newly created policy type will be returned.
400 - Invalid Body
401 - Authentication Error
403 - Authorization Error
406 - Not Acceptable Version
500 - Internal Server Error
GET /policy/api/v1/policytypes/{policyTypeId}
Retrieve all available versions of a policy type
Description: Returns a list of all available versions for the specified policy type
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyTypeId |
path |
ID of policy type |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; All versions of specified policy type will be returned.
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
500 - Internal Server Error
GET /policy/api/v1/policytypes/{policyTypeId}/versions/{versionId}
Retrieve one particular version of a policy type
Description: Returns a particular version for the specified policy type
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyTypeId |
path |
ID of policy type |
string |
versionId |
path |
Version of policy type |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; One specified version of specified policy type will be returned.
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
500 - Internal Server Error
DELETE /policy/api/v1/policytypes/{policyTypeId}/versions/{versionId}
Delete one version of a policy type
Description: Delete one version of a policy type. It must follow two rules. Rule 1: pre-defined policy types cannot be deleted; Rule 2: policy types that are in use (parameterized by a TOSCA policy) cannot be deleted. The parameterizing TOSCA policies must be deleted first.
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyTypeId |
path |
ID of policy type |
string |
versionId |
path |
Version of policy type |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; Newly deleted policy type will be returned.
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
409 - Delete Conflict, Rule Violation
500 - Internal Server Error
GET /policy/api/v1/policytypes/{policyTypeId}/versions/latest
Retrieve latest version of a policy type
Description: Returns latest version for the specified policy type
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyTypeId |
path |
ID of policy type |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; Latest version of specified policy type will be returned.
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
500 - Internal Server Error
Policy¶
GET /policy/api/v1/policytypes/{policyTypeId}/versions/{policyTypeVersion}/policies
Retrieve all versions of a policy created for a particular policy type version
Description: Returns a list of all versions of specified policy created for the specified policy type version
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyTypeId |
path |
ID of policy type |
string |
policyTypeVersion |
path |
Version of policy type |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; All policies matching specified policy type will be returned.
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
500 - Internal Server Error
POST /policy/api/v1/policytypes/{policyTypeId}/versions/{policyTypeVersion}/policies
Create a new policy for a policy type version
Description: Create a new policy for a policy type. Client should provide TOSCA body of the new policy
Consumes: [‘application/json’, ‘application/yaml’]
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyTypeId |
path |
ID of policy type |
string |
policyTypeVersion |
path |
Version of policy type |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
body |
body |
Entity body of policy |
ToscaServiceTemplate |
Responses
200 - successful operation; Newly created policy matching specified policy type will be returned.
400 - Invalid Body
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
406 - Not Acceptable Version
500 - Internal Server Error
GET /policy/api/v1/policytypes/{policyTypeId}/versions/{policyTypeVersion}/policies/{policyId}
Retrieve all version details of a policy created for a particular policy type version
Description: Returns a list of all version details of the specified policy
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyTypeId |
path |
ID of policy type |
string |
policyTypeVersion |
path |
Version of policy type |
string |
policyId |
path |
ID of policy |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; All versions of specified policy matching specified policy type will be returned.
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
500 - Internal Server Error
GET /policy/api/v1/policytypes/{policyTypeId}/versions/{policyTypeVersion}/policies/{policyId}/versions/{policyVersion}
Retrieve one version of a policy created for a particular policy type version
Description: Returns a particular version of specified policy created for the specified policy type version
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyTypeId |
path |
ID of policy type |
string |
policyTypeVersion |
path |
Version of policy type |
string |
policyId |
path |
ID of policy |
string |
policyVersion |
path |
Version of policy |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; The specified policy matching specified policy type will be returned.
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
500 - Internal Server Error
DELETE /policy/api/v1/policytypes/{policyTypeId}/versions/{policyTypeVersion}/policies/{policyId}/versions/{policyVersion}
Delete a particular version of a policy
Description: Delete a particular version of a policy. It must follow one rule. Rule: the version that has been deployed in PDP group(s) cannot be deleted
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyTypeId |
path |
PolicyType ID |
string |
policyTypeVersion |
path |
Version of policy type |
string |
policyId |
path |
ID of policy |
string |
policyVersion |
path |
Version of policy |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; Newly deleted policy matching specified policy type will be returned.
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
409 - Delete Conflict, Rule Violation
500 - Internal Server Error
GET /policy/api/v1/policytypes/{policyTypeId}/versions/{policyTypeVersion}/policies/{policyId}/versions/latest
Retrieve the latest version of a particular policy
Description: Returns the latest version of specified policy
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyTypeId |
path |
ID of policy type |
string |
policyTypeVersion |
path |
Version of policy type |
string |
policyId |
path |
ID of policy |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation; Latest version of specified policy matching specified policy type will be returned.
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
500 - Internal Server Error
GET /policy/api/v1/policies/{policyId}/versions/{policyVersion}
Retrieve specific version of a specified policy
Description: Returns a particular version of specified policy
Consumes: [‘application/json’, ‘application/yaml’]
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyId |
path |
Name of policy |
string |
policyVersion |
path |
Version of policy |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
mode |
query |
Fetch mode for policies, BARE for bare policies (default), REFERENCED for fully referenced policies |
string |
Responses
200 - successful operation
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
500 - Internal Server Error
DELETE /policy/api/v1/policies/{policyId}/versions/{policyVersion}
Delete a particular version of a policy
Description: Rule: the version that has been deployed in PDP group(s) cannot be deleted
Consumes: [‘application/json’, ‘application/yaml’]
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
policyId |
path |
ID of policy |
string |
policyVersion |
path |
Version of policy |
string |
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
Responses
200 - successful operation
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
409 - Delete Conflict, Rule Violation
500 - Internal Server Error
GET /policy/api/v1/policies
Retrieve all versions of available policies
Description: Returns all version of available policies
Consumes: [‘application/json’, ‘application/yaml’]
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
mode |
query |
Fetch mode for policies, BARE for bare policies (default), REFERENCED for fully referenced policies |
string |
Responses
200 - successful operation
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
500 - Internal Server Error
POST /policy/api/v1/policies
Create one or more new policies
Description: Create one or more new policies. Client should provide TOSCA body of the new policies
Consumes: [‘application/json’, ‘application/yaml’]
Produces: [‘application/json’, ‘application/yaml’]
Parameters
Name |
Position |
Description |
Type |
---|---|---|---|
X-ONAP-RequestID |
header |
RequestID for http transaction |
string |
body |
body |
Entity body of policies |
ToscaServiceTemplate |
Responses
200 - successful operation; Newly created policies will be returned.
400 - Invalid Body
401 - Authentication Error
403 - Authorization Error
404 - Resource Not Found
406 - Not Acceptable Version
500 - Internal Server Error
When making a POST policy API call, the client must not only provide well-formed JSON/YAML, but also must conform to the TOSCA specification. For example. the “type” field for a TOSCA policy should strictly match the policy type name it derives. Please check out the sample policies in above policy table.
Also, in the POST payload passed into each policy or policy type creation call (i.e. POST API invocation), the client needs to explicitly specify the version of the policy or policy type to create. That being said, the “version” field is mandatory in the TOSCA service template formatted policy or policy type payload. If the version is missing, that POST call will return “406 - Not Acceptable” and the policy or policy type to create will not be stored in the database.
To avoid inconsistent versions between the database and policies deployed in the PDPs, policy API REST service employs some enforcement rules that validate the version specified in the POST payload when a new version is to create or an existing version to update. Policy API will not blindly override the version of the policy or policy type to create/update. Instead, we encourage the client to carefully select a version for the policy or policy type to change and meanwhile policy API will check the validity of the version and feed an informative warning back to the client if the specified version is not good. To be specific, the following rules are implemented to enforce the version:
If the incoming version is not in the database, we simply insert it. For example: if policy version 1.0.0 is stored in the database and now a client wants to create the same policy with updated version 3.0.0, this POST call will succeed and return “200” to the client.
If the incoming version is already in the database and the incoming payload is different from the same version in the database, “406 - Not Acceptable” will be returned. This forces the client to update the version of the policy if the policy is changed.
If a client creates a version of a policy and wishes to update a property on the policy, they must delete that version of the policy and re-create it.
If multiple policies are included in the POST payload, policy API will also check if duplicate version exists in between any two policies or policy types provided in the payload. For example, a client provides a POST payload which includes two policies with the same name and version but different policy properties. This POST call will fail and return “406” error back to the calling application along with a message such as “duplicate policy {name}:{version} found in the payload”.
The same version validation is applied to policy types too.
To avoid unnecessary id/version inconsistency between the ones specified in the entity fields and the ones returned in the metadata field, “policy-id” and “policy-version” in the metadata will only be set by policy API. Any incoming explicit specification in the POST payload will be ignored. For example, A POST payload has a policy with name “sample-policy-name1” and version “1.0.0” specified. In this policy, the metadata also includes “policy-id”: “sample-policy-name2” and “policy-version”: “2.0.0”. The 200 return of this POST call will have this created policy with metadata including “policy-id”: “sample-policy-name1” and “policy-version”: “1.0.0”.
Regarding DELETE APIs for TOSCA compliant policies, we only expose API to delete one particular version of policy or policy type at a time for safety purpose. If client has the need to delete multiple or a group of policies or policy types, they will need to delete them one by one.
Sample API Curl Commands¶
From an API client perspective, using http or https does not make much difference to the curl command. Here we list some sample curl commands (using http) for POST, GET and DELETE monitoring and operational policies that are used in vFirewall use case. JSON payload for POST calls can be downloaded from policy table above.
If you are accessing the api from the container, the default ip and port would be https:/policy-api:6969/policy/api/v1/.
- Create vFirewall Monitoring Policy::
curl –user ‘healthcheck:zb!XztG34’ -X POST “http://{ip}:{port}/policy/api/v1/policytypes/onap.policies.monitoring.tcagen2/versions/1.0.0/policies” -H “Accept: application/json” -H “Content-Type: application/json” -d @vFirewall.policy.monitoring.input.tosca.json
- Get vFirewall Monitoring Policy::
curl –user ‘healthcheck:zb!XztG34’ -X GET “http://{ip}:{port}/policy/api/v1/policytypes/onap.policies.monitoring.tcagen2/versions/1.0.0/policies/onap.vfirewall.tca/versions/1.0.0” -H “Accept: application/json” -H “Content-Type: application/json”
- Delete vFirewall Monitoring Policy::
curl –user ‘healthcheck:zb!XztG34’ -X DELETE “http://{ip}:{port}/policy/api/v1/policytypes/onap.policies.monitoring.tcagen2/versions/1.0.0/policies/onap.vfirewall.tca/versions/1.0.0” -H “Accept: application/json” -H “Content-Type: application/json”
- Create vFirewall Operational Policy::
curl –user ‘healthcheck:zb!XztG34’ -X POST “http://{ip}:{port}/policy/api/v1/policytypes/onap.policies.controlloop.operational.common.Drools/versions/1.0.0/policies” -H “Accept: application/json” -H “Content-Type: application/json” -d @vFirewall.policy.operational.input.tosca.json
- Get vFirewall Operational Policy::
curl –user ‘healthcheck:zb!XztG34’ -X GET “http://{ip}:{port}/policy/api/v1/policytypes/onap.policies.controlloop.operational.common.Drools/versions/1.0.0/policies/operational.modifyconfig/versions/1.0.0” -H “Accept: application/json” -H “Content-Type: application/json”
- Delete vFirewall Operational Policy::
curl –user ‘healthcheck:zb!XztG34’ -X DELETE “http://{ip}:{port}/policy/api/v1/policytypes/onap.policies.controlloop.operational.common.Drools/versions/1.0.0/policies/operational.modifyconfig/versions/1.0.0” -H “Accept: application/json” -H “Content-Type: application/json”
- Get all available policies::
curl –user ‘healthcheck:zb!XztG34’ -X GET “http://{ip}:{port}/policy/api/v1/policies” -H “Accept: application/json” -H “Content-Type: application/json”
- Get version 1.0.0 of vFirewall Monitoring Policy::
curl –user ‘healthcheck:zb!XztG34’ -X GET “http://{ip}:{port}/policy/api/v1/policies/onap.vfirewall.tca/versions/1.0.0” -H “Accept: application/json” -H “Content-Type: application/json”
- Delete version 1.0.0 of vFirewall Monitoring Policy::
curl –user ‘healthcheck:zb!XztG34’ -X DELETE “http://{ip}:{port}/policy/api/v1/policies/onap.vfirewall.tca/versions/1.0.0” -H “Accept: application/json” -H “Content-Type: application/json”