"calls": [],
"provides": []
},
- "parameters": [],
+ "parameters": [
+ {
+ "name": "logLevel",
+ "value": "DEBUG",
+ "description": "The logging level used for collector classes",
+ "sourced_at_deployment": false,
+ "policy_editable": false,
+ "designer_editable": false
+ },
+ {
+ "name": "server.listenPort",
+ "value": 6061,
+ "description": "The container listen port",
+ "sourced_at_deployment": false,
+ "policy_editable": false,
+ "designer_editable": false
+ },
+ {
+ "name": "server.idleTimeoutSec",
+ "value": 60,
+ "description": "Maximum inactive time in seconds for client connections after which client can be disconnected",
+ "sourced_at_deployment": false,
+ "policy_editable": false,
+ "designer_editable": false
+ },
+ {
+ "name": "cbs.firstRequestDelaySec",
+ "value": 10,
+ "description": "Delay in seconds after which the first CBS request will be made",
+ "sourced_at_deployment": false,
+ "policy_editable": false,
+ "designer_editable": false
+ },
+ {
+ "name": "cbs.requestIntervalSec",
+ "value": 5,
+ "description": "Interval in seconds of re-checking the CBS configuration",
+ "sourced_at_deployment": false,
+ "policy_editable": false,
+ "designer_editable": false
+ },
+ {
+ "name": "security.sslDisable",
+ "value": true,
+ "description": "Should be set to true in order to disable client authentication and tunnel encryption",
+ "sourced_at_deployment": false,
+ "policy_editable": false,
+ "designer_editable": false
+ },
+ {
+ "name": "security.keys.keyStoreFile",
+ "value": "/etc/ves-hv/ssl/keystore.p12",
+ "description": "Points to private key store file",
+ "sourced_at_deployment": false,
+ "policy_editable": false,
+ "designer_editable": false
+ },
+ {
+ "name": "security.keys.keyStorePassword",
+ "value": "onaponap",
+ "description": "Password for the key store",
+ "sourced_at_deployment": false,
+ "policy_editable": false,
+ "designer_editable": false
+ },
+ {
+ "name": "security.keys.trustStoreFile",
+ "value": "/etc/ves-hv/ssl/truststore.p12",
+ "description": "Points to trust store file which contains trusted client certificates and/or CAs",
+ "sourced_at_deployment": false,
+ "policy_editable": false,
+ "designer_editable": false
+ },
+ {
+ "name": "security.keys.trustStorePassword",
+ "value": "onaponap",
+ "description": "Password for the trust store",
+ "sourced_at_deployment": false,
+ "policy_editable": false,
+ "designer_editable": false
+ }
+ ],
"auxilary": {
"healthcheck": {
"type": "script",
import org.onap.dcae.collectors.veshv.utils.logging.Logger
import reactor.core.publisher.Mono
import reactor.netty.DisposableServer
+import java.time.Duration
/**
* @author Piotr Jaszczyk <piotr.jaszczyk@nokia.com>
.then(dispose())
private fun dispose(): Mono<Void> =
- Mono.create { callback ->
+ Mono.create<Int> { callback ->
logger.debug { "About to dispose NettyServer" }
ctx.dispose()
ctx.onDispose {
logger.debug { "Netty server disposed" }
- callback.success()
+ callback.success(1)
}
}
+ .delayElement(boundPortReleaseLatency)
+ .then()
override fun await(): Mono<Void> = Mono.create { callback ->
ctx.channel().closeFuture().addListener {
companion object {
private val logger = Logger(NettyServerHandle::class)
+ private val boundPortReleaseLatency = Duration.ofSeconds(1)
}
}