logstash-input-elastic_serverless_forwarder 1.0.0-java → 2.0.0-java

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1266c6a7956193b8c7199743ebd440d559a3186fbcc3e0011a7dcbf0ac276776
4
- data.tar.gz: 886fb64c5bbe55ee366848eba4f9a4d433c162fcdbce1b8ac5b9df955fd8feb0
3
+ metadata.gz: f204bb5c1913588a871e0a0be5908c9664c18d157860794c639cbc9b5dc247de
4
+ data.tar.gz: 5b17ec074dc91d67738aed2f040d45fe0b76d0964fe035fe8559c7715968678a
5
5
  SHA512:
6
- metadata.gz: e8b3c9d8c2069350396e216748d7c923efbff12d6e1fc9d2a97bbfac0fdd21f43e134e983996af85c810596bae3917e1378246e4e2e658101a3ad205c0df0ebd
7
- data.tar.gz: 2ae77ad3c6e7ef912c2a09e6b3fceaa366b578e4cd42c426192a67305a0766e13d32f9a8c4d3487ac30de48b83f6561a0f24dc0d8feee1d729b0a7d6f339fcfa
6
+ metadata.gz: 45f17c94f95e83a914cd5790d214915af7a8eae257bc01816429d5028fc0406aac595b81ae079833f2f4d49d072942f2bfa445552f135f6d1238da327f530371
7
+ data.tar.gz: 9e9380649118d0d016bd55b4076f54229b5e5abe1f01b480c36978f889ff71358f53564c8c39fc8c2d56a1535e47da7e1e4edb8e4c9af1940f65588785a2509a
data/CHANGELOG.md CHANGED
@@ -1,3 +1,9 @@
1
+ ## 2.0.0
2
+ - SSL settings that were marked deprecated in version `0.1.3` are now marked obsolete, and will prevent the plugin from starting.
3
+ - These settings are:
4
+ - `ssl`, which should be replaced by `ssl_enabled`
5
+ - [#11](https://github.com/logstash-plugins/logstash-input-elastic_serverless_forwarder/pull/11)
6
+
1
7
  ## 1.0.0
2
8
  - Promote from technical preview to GA [#10](https://github.com/logstash-plugins/logstash-input-elastic_serverless_forwarder/pull/10)
3
9
 
data/docs/index.asciidoc CHANGED
@@ -159,6 +159,9 @@ filter {
159
159
 
160
160
  This plugin supports the following configuration options plus the <<plugins-{type}s-{plugin}-common-options>> described later.
161
161
 
162
+ NOTE: As of version `2.0.0` of this plugin, a previously deprecated SSL setting has been removed.
163
+ Please check out <<plugins-{type}s-{plugin}-obsolete-options>> for details.
164
+
162
165
  [cols="<,<,<",options="header",]
163
166
  |=======================================================================
164
167
  |Setting |Input type|Required
@@ -166,7 +169,6 @@ This plugin supports the following configuration options plus the <<plugins-{typ
166
169
  | <<plugins-{type}s-{plugin}-auth_basic_password>> |<<password,password>>|No
167
170
  | <<plugins-{type}s-{plugin}-host>> |<<string,string>>|No
168
171
  | <<plugins-{type}s-{plugin}-port>> |<<number,number>>|No
169
- | <<plugins-{type}s-{plugin}-ssl>> |<<boolean,boolean>>|__Deprecated__
170
172
  | <<plugins-{type}s-{plugin}-ssl_certificate>> |a valid filesystem path|No
171
173
  | <<plugins-{type}s-{plugin}-ssl_certificate_authorities>> |<<array,array>>|No
172
174
  | <<plugins-{type}s-{plugin}-ssl_client_authentication>> |<<string,string>>, one of `["none", "optional", "required"]`|No
@@ -218,17 +220,6 @@ The host or ip to bind
218
220
 
219
221
  The TCP port to bind to
220
222
 
221
- [id="plugins-{type}s-{plugin}-ssl"]
222
- ===== `ssl`
223
- deprecated[0.1.3, Replaced by <<plugins-{type}s-{plugin}-ssl_enabled>>]
224
-
225
- * Value type is <<boolean,boolean>>
226
- * Default value is `true`
227
-
228
- Events are by default sent over SSL, which requires configuring this plugin to present an identity certificate using <<plugins-{type}s-{plugin}-ssl_certificate>> and key using <<plugins-{type}s-{plugin}-ssl_key>>.
229
-
230
- You can disable SSL with `+ssl => false+`.
231
-
232
223
  [id="plugins-{type}s-{plugin}-ssl_certificate"]
233
224
  ===== `ssl_certificate`
234
225
 
@@ -355,6 +346,18 @@ When <<plugins-{type}s-{plugin}-ssl_client_authentication>> causes a client to p
355
346
  NOTE: Client identity is not typically validated using SSL because the receiving server only has access to the client's outbound-ip, which is not always constant and is frequently not represented in the certificate's subject or subjectAltNames extensions.
356
347
  For more information, see https://www.rfc-editor.org/rfc/rfc2818#section-3.1[RFC2818 § 3.2 (HTTP over TLS -- Client Identity)]
357
348
 
349
+ [id="plugins-{type}s-{plugin}-obsolete-options"]
350
+ ==== Elasticsearch Output Obsolete Configuration Options
351
+
352
+ WARNING: As of version `2.0.0` of this plugin, some configuration options have been replaced.
353
+ The plugin will fail to start if it contains any of these obsolete options.
354
+
355
+ [cols="<,<",options="header",]
356
+ |=======================================================================
357
+ |Setting|Replaced by
358
+ | ssl | <<plugins-{type}s-{plugin}-ssl_enabled>>
359
+ |=======================================================================
360
+
358
361
  [id="plugins-{type}s-{plugin}-common-options"]
359
362
  include::{include_path}/{type}.asciidoc[]
360
363
 
@@ -10,7 +10,6 @@ require 'logstash/codecs/json_lines'
10
10
 
11
11
  class LogStash::Inputs::ElasticServerlessForwarder < LogStash::Inputs::Base
12
12
  include LogStash::PluginMixins::PluginFactorySupport
13
- include LogStash::PluginMixins::NormalizeConfigSupport
14
13
 
15
14
  config_name "elastic_serverless_forwarder"
16
15
 
@@ -23,7 +22,6 @@ class LogStash::Inputs::ElasticServerlessForwarder < LogStash::Inputs::Base
23
22
  config :auth_basic_password, :validate => :password
24
23
 
25
24
  # ssl-config
26
- config :ssl, :validate => :boolean, :default => true, :deprecated => "Use 'ssl_enabled' instead."
27
25
  config :ssl_enabled, :validate => :boolean, :default => true
28
26
 
29
27
  # ssl-identity
@@ -41,11 +39,12 @@ class LogStash::Inputs::ElasticServerlessForwarder < LogStash::Inputs::Base
41
39
  config :ssl_supported_protocols, :validate => :string, :list => true
42
40
  config :ssl_handshake_timeout, :validate => :number, :default => 10_000
43
41
 
42
+ # obsolete config
43
+ config :ssl, :obsolete => "Use 'ssl_enabled' instead."
44
+
44
45
  def initialize(*a)
45
46
  super
46
47
 
47
- normalize_ssl_configs!
48
-
49
48
  if original_params.include?('codec')
50
49
  fail LogStash::ConfigurationError, 'The `elastic_serverless_forwarder` input does not have an externally-configurable `codec`'
51
50
  end
@@ -155,12 +154,6 @@ class LogStash::Inputs::ElasticServerlessForwarder < LogStash::Inputs::Base
155
154
  }
156
155
  end
157
156
 
158
- def normalize_ssl_configs!
159
- @ssl_enabled = normalize_config(:ssl_enabled) do |normalizer|
160
- normalizer.with_deprecated_alias(:ssl)
161
- end
162
- end
163
-
164
157
  class QueueWrapper
165
158
  def initialize(wrapped_queue)
166
159
  @wrapped_queue = wrapped_queue
@@ -2,7 +2,7 @@
2
2
 
3
3
  Gem::Specification.new do |s|
4
4
  s.name = 'logstash-input-elastic_serverless_forwarder'
5
- s.version = '1.0.0'
5
+ s.version = '2.0.0'
6
6
  s.licenses = ['Apache License (2.0)']
7
7
  s.summary = "Receives events from Elastic Serverless Forwarder over HTTP or HTTPS"
8
8
  s.description = "This gem is a Logstash plugin required to be installed on top of the Logstash core pipeline using $LS_HOME/bin/logstash-plugin install gemname. This gem is not a stand-alone program"
@@ -32,7 +32,7 @@ describe LogStash::Inputs::ElasticServerlessForwarder do
32
32
  let(:scheme) { 'http' }
33
33
 
34
34
  it_behaves_like "an interruptible input plugin" do
35
- let(:config) { { "port" => port, "ssl" => false } }
35
+ let(:config) { { "port" => port, "ssl_enabled" => false } }
36
36
  end
37
37
 
38
38
  after :each do
@@ -322,22 +322,11 @@ describe LogStash::Inputs::ElasticServerlessForwarder do
322
322
  end
323
323
  end
324
324
 
325
- describe 'deprecated SSL options' do
326
- let(:config) do
327
- super().merge({
328
- 'ssl_certificate' => generated_certs_directory.join('server_from_root.crt').to_path,
329
- 'ssl_key' => generated_certs_directory.join('server_from_root.key.pkcs8').to_path,
330
- })
331
- end
332
-
333
- [true, false].each do |enabled|
334
- context "when `ssl => #{enabled}`" do
335
- let(:config) { super().merge('ssl' => enabled) }
325
+ describe 'removed SSL options' do
326
+ let(:config) { super().merge('ssl' => true) }
336
327
 
337
- it "sets @ssl_enabled to `#{enabled}`" do
338
- expect(esf_input.instance_variable_get(:@ssl_enabled)).to be enabled
339
- end
340
- end
328
+ it "fails with message indicating ssl configuration option is obsolete" do
329
+ expect { described_class.new(config) }.to raise_error(LogStash::ConfigurationError, /Use 'ssl_enabled' instead/)
341
330
  end
342
331
  end
343
332
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: logstash-input-elastic_serverless_forwarder
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.0
4
+ version: 2.0.0
5
5
  platform: java
6
6
  authors:
7
7
  - Elastic
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-12-18 00:00:00.000000000 Z
11
+ date: 2024-12-23 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  requirement: !ruby/object:Gem::Requirement