RDK Resources
[*RDK Preferred*]
Code Management Facility
RDK Forums
[RDK Conferences]
RDK Support
Archives
Papers & Presentations Archive
...
Code Block | ||
---|---|---|
| ||
{ "fqdn": "192.168.30.105", "server": "192.168.30.105", "version": "0.1.1-228", "region": "india", "flavor": "lab", "primary": { "address": ":6003" }, "health": { "address": ":6004", "logInterval": "60s", "options": [ "PayloadsOverZero", "PayloadsOverHundred", "PayloadsOverThousand", "PayloadsOverTenThousand" ] }, "pprof": { "address": ":6005" }, "metrics": { "address": ":8082" }, "log": { "file" : "tr1d1um.log", "level" : "DEBUG", "maxSize" : 52428800, "maxBackup" : 10, "json" : true }, "aws": { "accessKey": "fake-accessKey", "secretKey": "fake-secretKey", "env": "fake-env", "sns": { "region": "fake-region", "topicArn": "fake-sns-topic", "urlPath" : "/api/v2/aws/sns" } }, "targetURL": "http://192.168.30.105:6000", "supportedServices": ["config"], "authHeader": "d2VicGFAMTIzNDU2Nzg5MA==" } |
Parodus is the client-end service running on the RDK-V CPE devices which establishes a connection with webPA service on device boot-up and delivers request-response between the webPA server & CPE device services. Parodus provides following functionalities in a CPE device.
Websocket client: Nopoll library used as Websocket Client. It allows building pure WebSocket solutions or to provide WebSocket support to existing TCP oriented applications. Nopoll handles all the messages coming from or to the server asynchronously.
Nanomsg Server: Parodus acts as Nanomsg server to distribute messages upstream and downstream.
Edit parodus startup script for enabling the CPE device to use local webPA server
--webpa-url : Set with IP Address and Port of talaria service
--force-ipv4 : Force use of IPv4 for communication.
Code Block |
---|
vi /lib/rdk/startParodus.sh
/bin/systemctl set-environment PARODUS_CMD=" --hw-mac=$HwMac --webpa-ping-time=$PingWaitTime --webpa-interface-used=$NwInterface --webpa-url=http://192.168.30.105 --partner-id=comcast --webpa-backoff-max=9 --force-ipv4 --ssl-cert-path=$SSL_CERT_FILE" |