summaryrefslogtreecommitdiffstats
path: root/packages/base/src/files
AgeCommit message (Collapse)AuthorFilesLines
2018-11-08Fix R3 model for OOF Policy OptimizationliboNet1-1/+1
Models with duplicate keys(directives) cannot use dataOrderInfo, it's a limitation so update the data from the record which is generated after use GUI to load the model first. Change-Id: Ie01872858e3ed8728ada90ba3205075b41a74703 Issue-ID: POLICY-1236 Signed-off-by: liboNet <libo.zhu@intel.com>
2018-11-01Modified to make AAF configurable in policy/engineMichael Mokry1-0/+3
Added property to enable or disable AAF Added logic to the code to check the property and use old authentication logic to authenticate the user rather than AAF if disabled. Fixed license issue Modified cadi_truststore_password value to use proper variable Added comment to local development enviroment properties file Modified test resources to fix Junit failures Change-Id: I962895154716092c9cc0bc6c48f6419f3b5900fe Issue-ID: POLICY-1217 Signed-off-by: Michael Mokry <michael.mokry@att.com>
2018-11-01Support R3 model for OOF Policy OptimizationliboNet2-0/+42
I added an INSERT to the sql upgrade file for model 1.0 and delete for downgrade Change-Id: I56a0045a75fef2c2cafe6c32ab87f2c9e1c0aa5e Issue-ID: POLICY-1226 Signed-off-by: liboNet <libo.zhu@intel.com> (cherry picked from commit 52f2c099fe6123381a9f4f528ff5acacb37b3ecd)
2018-10-17Fix exceptions related to invalid db schemaMichael Mokry1-0/+5
Modified db upgrade script to alter systemlogdb table to allow null values for "remote" column. Change-Id: Ib1bba59a38084bef8f89245d3725d18a02b303dc Issue-ID: POLICY-1204 Signed-off-by: Michael Mokry <michael.mokry@att.com>
2018-10-11Updated the keystore to include pdp wildcard.Jorge Hernandez1-0/+0
This allows to talk directly to OOM PDP-X pods without going through the service. Change-Id: I09bd5253a79142f6566806b97be4bb6c223826f4 Issue-ID: POLICY-1198 Signed-off-by: Jorge Hernandez <jorge.hernandez-herrero@att.com>
2018-10-09Regenerate policy keystore1.3.0Jorge Hernandez1-0/+0
The keystore has been regenerated using the latest tooling from AAF. Previous versions seem to add a bogus " fqdn" which makes the particular policy.api.simpledemo.onap.org invalid. The latest version does not append it. Change-Id: I96e4d272e8f0ab6eb84a12384645bf9a49dbbd09 Issue-ID: POLICY-1193 Signed-off-by: Jorge Hernandez <jh1730@att.com>
2018-10-09Modify portal properties in PEMichael Mokry1-2/+1
Modified the portal.properties with new role_access_centralized property. Modified the conf file with updated values for the ONAP redirect and REST URL properties Made changes for comments Change-Id: Id2624cbb440ea5830520c5e82436d112989b62c4 Issue-ID: POLICY-1192 Signed-off-by: Michael Mokry <michael.mokry@att.com>
2018-10-05Add SDNC actor to dependencyPamela Dragosh1-0/+8
So BRMS gateway can add this dependency during runtime. Issue-ID: POLICY-1183 Change-Id: I82127fca5e0d644463e82d543b6331dde8c32042 Signed-off-by: Pamela Dragosh <pdragosh@research.att.com>
2018-10-02Recreate latest keystore.Jorge Hernandez1-0/+0
Some changes have been made since the first set of stores were generated from the cert manager tooling in the windriver test instance used for this purpose. Change-Id: I976333df7e020bda76c5cbdc9c0be752e5a88778 Issue-ID: POLICY-1156 Signed-off-by: Jorge Hernandez <jh1730@att.com>
2018-09-27Add Sdnr Actor codePamela Dragosh1-0/+8
These need to be defined for BRMS Gateway to re-created the artifacts. Issue-ID: POLICY-1155 Change-Id: I424be9976fa129a42e0020870af01ba30e0c0d47 Signed-off-by: Pamela Dragosh <pdragosh@research.att.com>
2018-09-25CADI AAF changes for policy/engineMichael Mokry2-4/+49
Added cadi properties and modified policy aaf client code. Fixed issue with namespace and modified code to reverse it for structuring the username sent in AAF API call Added properties for keystore and keystore password after getting error response from AAF when setting up the connection to AAF Missed a fix for one of Jorge's comments in last patch, here it is. Change-Id: Ic164ade8aa34da95a560c1592656e0caf990a595 Issue-ID: POLICY-913 Signed-off-by: Michael Mokry <mm117s@att.com>
2018-09-18Merge "AAF integration in Policy SDK"Pamela Dragosh2-1/+29
2018-09-17AAF integration in Policy SDKrb71472-1/+29
Upgraded SDK version. Added SQL script with encrypt key. Added a function to save role on reading from session in PolicyController.java Addressed Check Style warnings in PolicyController.java Issue-ID: POLICY-1088 Change-Id: I446b6c1a0db2a989ad3f4e982e5cdba845f81045 Signed-off-by: rb7147 <rb7147@att.com>
2018-09-14Fixed incorrect model nameMichael Mokry1-1/+1
Changed the model name of the script to be the correct SDNC-GenerateName version CSIT to fix the failed CSIT test cases Change-Id: I8974202cfc8cea3a19e102813fbf2a4f449cd11b Issue-ID: POLICY-983 Signed-off-by: Michael Mokry <mm117s@att.com>
2018-09-12Added SQL to import SDNC naming modelMichael Mokry1-0/+3
Modified the script to inlcude an insert statement to add the SDNCGenerate Naming model to the microservicemodels table during installation This will need to be merged before I add the CSIT test to Integration Change-Id: I1620ce3f1097d45111bddb08c12b5b8c12bb1b2e Issue-ID: POLICY-983 Signed-off-by: Michael Mokry <mm117s@att.com>
2018-08-28Merge "Enhancement on Dashboard"Pamela Dragosh1-0/+24
2018-08-23Enhancement on DashboardWang,Frank(gw1218)1-0/+24
Enhancement on dashboard by including more info related to CRUD actions on policies and also providing an advanced search feature. Issue-ID: POLICY-1042 Change-Id: I987e0ca13824413f90299a366fb4464fca7de06a Signed-off-by: Wang,Frank(gw1218) <gw1218@att.com>
2018-08-22policy/engine changes to support PE httpsMichael Mokry3-21/+21
Enabled https connector in server.xml and modified the docker-install.sh to fix the default variable name for policy truststore Change-Id: I6db6a6d2353130c91c1f344ea7927d187150adca Issue-ID: POLICY-781 Signed-off-by: Michael Mokry <mm117s@att.com>
2018-08-17https certs with aaf+pe containers compatibilityJorge Hernandez9-11/+58
Change-Id: I21ed7a0fea5ea7d62857a077fa2568da4af99d26 Issue-ID: POLICY-1057 Signed-off-by: Jorge Hernandez <jh1730@att.com>
2018-07-12Upgrade Portal SDK to resolve Security IssuesMichael Mokry2-0/+100
Upgraded version in pom to 2.3.1 Added SQL scripts from Portal to Upgrade Portal related db tables Added SQL downgrade script and license header Sorted SQL commands in upgrade script by function_cd per Jim Change-Id: Id6bef295956b6ec5b13d8fbd0006bbfe98c1c0ac Issue-ID: POLICY-918 Signed-off-by: Mike Mokry <mm117s@att.com>
2018-06-12Use POLICY_LOGS env variable in logging.propertiesJim Hahn3-12/+21
Some logger.properties have /var/log/onap hard-coded; changed those to use $POLICY_LOGS. Other logger.properties had ${POLICY_LOGS} instead of ${{POLICY_LOGS}}; fixed those, too. Change-Id: I56faf5982abf520ee364b54a3560313d0f15cc2a Issue-ID: POLICY-784 Signed-off-by: Jim Hahn <jrh3@att.com>
2018-06-05Update engine to SNAPSHOT-1.3.0liamfallon1-1/+1
Snapshot updated for Casablanca. Change-Id: Ieb2c9a990c0f36f31c974038465e7d38aaa21e5d Issue-ID: POLICY-875 Signed-off-by: liamfallon <liam.fallon@ericsson.com>
2018-05-24Merge "Replace LOGPATH with LOGSUFFIX"Pamela Dragosh10-16/+30
2018-05-23Replace LOGPATH with LOGSUFFIXJim Hahn11-17/+31
docker-install.sh does not expand ${{xxx}} values in .conf files before using them to update target files. Consequently, replaced LOGPATH with LOGSUFFIX in .conf files and updated target files to use ${{POLICY_LOGS}}${{LOGSUFFIX}} instead. Replace "${POLICY_HOME}/logs" in auxiliary files (e.g., logrotate) with "${POLICY_LOGS}/policy". Update license dates. In .sh files, changed ${{POLICY_LOGS}} to ${POLICY_LOGS}, and ensured that env.sh is sourced. Use hard-coded paths in conf files instead of replacing LOGPATH with LOGSUFFIX. Update license dates. Repoint path for IntegrityMonitor.log, as we cannot easily move since it's in common. Replace hard-coded log path in docker-install.sh. Undo hard-coded log paths where possible, and modify scripts to pass $POLICY_LOGS to JVM. Change-Id: I027d8d2173ae97fef73b0daff1d6a87452857f93 Issue-ID: POLICY-759 Signed-off-by: Jim Hahn <jrh3@att.com>
2018-05-22Merge "Update yml to use $POLICY_LOGS"Pamela Dragosh1-1/+1
2018-05-22Update yml to use $POLICY_LOGSJim Hahn1-1/+1
Change-Id: I4fec68b7bd50f8e71e36510bf595126435726677 Issue-ID: POLICY-759 Signed-off-by: Jim Hahn <jrh3@att.com>
2018-05-21Update Policy Engine to 1.2.3-SNAPSHOTliamfallon1-1/+1
These reviews must be merged in order because of layering. This review should be merged FOURTH. Change-Id: Ifca8e33b79085a4032164b44dae3401f8179f5f6 Issue-ID: POLICY-844 Signed-off-by: liamfallon <liam.fallon@ericsson.com>
2018-05-16Upgrade SNAPSHOT to 1.2.2liamfallon1-1/+1
These reviews must be merged in order because of layering. This review should be merged SECOND Note: In order to get past the following layering problems, there are temporary chages to the following POMs to temporarily use 1.2.1-SNAPSHOT for those dependencies. They are ONAP-PAP-REST/pom.xml org.onap.policy.drools-applications.controlloop.common.policy-yaml ONAP-PDP/pom.xml org.onap.policy.drools-pdp.policy-endpoints A separate review will be used to restore these dependencies to 1.2.2-SNAPSHOT once the drools-pdp and drools-applications reviews are submitted and merged PLD added version.properties Issue-ID: POLICY-798 Change-Id: Id7e83f2ba12181c63cc8845b7eeccf2004d2bab9 Signed-off-by: liamfallon <liam.fallon@ericsson.com> Signed-off-by: Pamela Dragosh <pdragosh@research.att.com> Signed-off-by: liamfallon <liam.fallon@ericsson.com>
2018-05-15Fix BRMS Gateway version on propertiesliamfallon1-1/+1
Incorrect snapshot version showed up on scan of source code for snapshots Issue-ID: POLICY-780 Change-Id: I7fb838a88fc50ce8b566aa9b9ad0b4b7e3188b3a Signed-off-by: liamfallon <liam.fallon@ericsson.com>
2018-05-08Convert license header to SQL commentliamfallon10-196/+186
Changed comment from Java style to SQL style Change-Id: Ia0ac3991cd58939f5efc0c752148b11931136a4f Issue-ID: POLICY-773 Signed-off-by: liamfallon <liam.fallon@ericsson.com>
2018-04-25cook policy-keystore into pe imageJorge Hernandez1-0/+0
OOM team reported issues with ONAP installation in terms of config map sizes. After discussion with OOM team, one solution is to cook it in the docker image itself. This will solve the size issue on the OOM side. Change-Id: I2ca20bdc3aa8ee959c5e4c1d07483fe5f0c14607 Issue-ID: POLICY-747 Signed-off-by: Jorge Hernandez <jh1730@att.com>
2018-04-19Add license to policy-engine filesJim Hahn8-0/+160
Added license to various files. Updated XACMLPolicyScanner to work even when license comment is added to the Policy.xml file. Moved DOCTYPE before license in html files. Removed license from css files, as many are generated or come from third-party software. Removed license from other generated files. Change-Id: I9d98ca9f552a6eae17e80ef27fc7045cc4f27b8e Issue-ID: POLICY-741 Signed-off-by: Jim Hahn <jrh3@att.com>
2018-04-10Modified DB Upgrade script for OptimizationModelsMichael Mokry1-1/+1
Changed the incorrect column 'dataorder' to 'dataorderinfo' Made changes to pom and AAF client code per AAF API changes in new depedency. Change-Id: Ic9bf0edec8282cc0f96d6fedd62fa9253d52070f Issue-ID: POLICY-731 Signed-off-by: Michael Mokry <mm117s@att.com>
2018-04-04ONAP log files consolidationChou, Joseph (JC2555)2-1/+3
Check in changes for pap,pdp,console,brmsgw,paplp and pdplp Change-Id: I5b51368f8fed2d0ede848f1aa7f2f70c866dfe8b Issue-ID: POLICY-562 Signed-off-by: Chou, Joseph (JC2555) <jc2555@att.com>
2018-04-03ONAP log files consolidationChou, Joseph (JC2555)17-28/+261
Check in changes for pap,pdp,console,brmsgw,paplp and pdplp Change-Id: I23525a44e0f269d04d9870c3eed18b6b8daacb2c Issue-ID: POLICY-562 Signed-off-by: Chou, Joseph (JC2555) <jc2555@att.com>
2018-04-02Support CSIT tests for OOF PolicyMichael Mokry1-0/+3
I added an INSERT to the sql upgrade file and some sonar fixes and Junits Change-Id: I37139d5a8ad78d9d46ee01f81c2edd052672712e Issue-ID: POLICY-639 Signed-off-by: Michael Mokry <mm117s@att.com>
2018-03-28Merge "ONAP code change for log files consolidation"Jorge Hernandez12-62/+20
2018-03-28ONAP code change for log files consolidationChou, Joseph (JC2555)12-62/+20
Undo the change so this would not block other test activity Change-Id: I4f7dd2e14f30034eefbf958be3c912af2962e8a2 Issue-ID: POLICY-562 Signed-off-by: Chou, Joseph (JC2555) <jc2555@att.com>
2018-03-26Merge "New Optimization Policy"Pamela Dragosh3-0/+78
2018-03-26New Optimization PolicyMichael Mokry3-0/+78
This is the new Optimization Policy to support the Integration of the OOF Policy Model into the Policy Platform. Added changes from Frank Wang to fix the following issues with existing Model Parser: 1. TOSCA Rendering issues 2. Matching Attributes support 3. ImportModelAPI to support TOSCA model upload via REST API Running local Sonar tonight to start fixing Sonar issues Added changes per review comments and fixed Sonar issues Change-Id: Ia8ce09c28a718ce4460475e76a750caef774bd6b Issue-ID: POLICY-622 Signed-off-by: Michael Mokry <mm117s@att.com>
2018-03-23ONAP code change for log files consolidationChou, Joseph (JC2555)12-25/+67
Code change for log files consolidation of PAP, PDP, BRMSGW, Console and db script Issue-ID: POLICY-562 Change-Id: I416ba7748b841bb2b1a31682e2b1631e279549e8 Signed-off-by: Chou, Joseph (JC2555) <jc2555@att.com>
2018-03-19Fix Another Typo in dependency.jsondc443y1-1/+1
Unresolveable maven coordinates when building the rules jar caused by a missing s in drools-applications. Issue-ID: POLICY-660 Change-Id: I3e78fec9c9e58c10f2a9366d15447e8a3998d343 Signed-off-by: dc443y <dc443y@att.com>
2018-03-16Fix type in dependency.jsondc443y1-1/+1
The BRMSGW was unable to generate rules artifacts during docker installation due to an unresolved dependency. A typo was discovered in the problematic dependency which was causing the error. Issue-ID: POLICY-660 Change-Id: If4dbe5e640f10d063fa5643112338b10fd29187d Signed-off-by: Daniel Cruz <dc443y@att.com>
2018-02-27remove mariadb superuser sql statementsJorge Hernandez1-4/+1
PE installation as part of data upgrade invokes "set global" statements that are typically used by priviledged accounts as the "root" mariadb user. As part of the effort to clean up the mariadb docker install, only permissions to a regular mariadb user (policy_user by default) are given in 3 databases: onap_sdk, log, and support. This account cannot do changes outside those. In any case the usage of the global timeouts is questionable. We should keep an eye if there's any potential bad side effect, and correct it if it doesn't. It's preferable to keep "policy_user" with a restricted set of privileges, instead of being a superuser (otherwise can plainly user the root account). Change-Id: I17b1a6a2cb62a319464e1db4b3aafbc1dbf20d78 Issue-ID: POLICY-650 Signed-off-by: Jorge Hernandez <jh1730@att.com>
2018-02-19Rename maven modules in drools-applicationsliamfallon1-26/+26
All found references to drools-applications module names changed to new names Issue-ID: POLICY-238 Change-Id: I3cd453c91194699434a71c1a12d2dcccfa5df234 Signed-off-by: liamfallon <liam.fallon@ericsson.com>
2018-02-08MS Model Input ValidationMichael Mokry1-2/+2
- Provides validation for MS policy input content body that matches the GUI validations when create/update MS policy from API - Added changes to satisfy review comments and updated copywright headers for modified and new files Change-Id: I02bfa639bffb48520badd0e4fa34eb36418547ae Issue-ID: POLICY-377 Signed-off-by: Michael Mokry <mm117s@att.com>
2018-01-17Resolved Security Vulnerability issuesrb71473-1/+67
Issue-ID: POLICY-553 Change-Id: I3e0e6a31226e561cef9ec578790659d57b2f65f4 Signed-off-by: rb7147 <rb7147@att.com>
2018-01-16Restrict file upload size in policy editorMagnusen, Drew (dm741q)1-1/+4
Restrict file upload size in Policy Editory using a configurable value (in bytes) set in xacml.admin.properties. Default value is 30MB. Issue-ID: POLICY-538 Change-Id: I4d8539ab33320446aed250ea4fdc51de585d5f2a Signed-off-by: Magnusen, Drew (dm741q) <dm741q@att.com>
2017-12-14Policy Elastic Search Validation Enhancementsrb71471-0/+5
Issue-ID: POLICY-497 Change-Id: If97fe30706bcdbeeafaf28e5cca8fae31998cb7c Signed-off-by: rb7147 <rb7147@att.com>
2017-12-12Add ELK SecurityTemoc Rodriguez1-3/+3
Add security to ELk such that only localhost is able to access ELK. All other hosts will be denied service. This fixes the open elastic serach security vulnerability. Issue-ID: POLICY-495 Change-Id: I7f5d6fef5963f984c2bce6933c8b214c0bd3be2b Signed-off-by: Temoc Rodriguez <cr056n@att.com>