Results

By type

          Starting Stunnel with configuration:
pid = /tmp/stunnel.pid
foreground = yes
debug = notice
sslVersion = TLSv1.2
[zookeeper-2181]
client = yes
CAfile = /tmp/cluster-ca.crt
cert = /etc/eto-certs/entity-operator.crt
key = /etc/eto-certs/entity-operator.key
accept = 127.0.0.1:2181
connect = onap-strimzi-zookeeper-client:2181
delay = yes
verify = 2


+ exec /usr/bin/tini -w -e 143 -- /usr/bin/stunnel /tmp/stunnel.conf
2023.06.27 03:37:54 LOG5[ui]: stunnel 5.56 on x86_64-redhat-linux-gnu platform
2023.06.27 03:37:54 LOG5[ui]: Compiled with OpenSSL 1.1.1g FIPS  21 Apr 2020
2023.06.27 03:37:54 LOG5[ui]: Running  with OpenSSL 1.1.1k  FIPS 25 Mar 2021
2023.06.27 03:37:54 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,FIPS,OCSP,PSK,SNI
2023.06.27 03:37:54 LOG5[ui]: Reading configuration from file /tmp/stunnel.conf
2023.06.27 03:37:54 LOG5[ui]: UTF-8 byte order mark not detected
2023.06.27 03:37:54 LOG5[ui]: FIPS mode disabled
2023.06.27 03:37:54 LOG4[ui]: Insecure file permissions on /etc/eto-certs/entity-operator.key
2023.06.27 03:37:54 LOG4[ui]: Service [zookeeper-2181] uses "verifyChain" without subject checks
2023.06.27 03:37:54 LOG4[ui]: Use "checkHost" or "checkIP" to restrict trusted certificates
2023.06.27 03:37:54 LOG5[ui]: Configuration successful
2023.06.27 03:37:58 LOG5[0]: Service [zookeeper-2181] accepted connection from 127.0.0.1:40310
2023.06.27 03:37:58 LOG5[0]: s_connect: connected 10.233.60.199:2181
2023.06.27 03:37:58 LOG5[0]: Service [zookeeper-2181] connected remote server from 10.233.66.70:46664
2023.06.27 03:37:58 LOG5[0]: Certificate accepted at depth=0: O=io.strimzi, CN=onap-strimzi-zookeeper