logstash-input-http 3.9.2-java → 4.0.0-java
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +13 -0
- data/VERSION +1 -1
- data/docs/index.asciidoc +20 -82
- data/lib/logstash/inputs/http.rb +9 -82
- data/lib/logstash-input-http_jars.rb +1 -1
- data/logstash-input-http.gemspec +0 -1
- data/spec/fixtures/certs/generate.sh +3 -0
- data/spec/fixtures/certs/generated/client_from_root.crt +28 -28
- data/spec/fixtures/certs/generated/client_from_root.jks +0 -0
- data/spec/fixtures/certs/generated/client_from_root.key +52 -51
- data/spec/fixtures/certs/generated/client_from_root.key.pkcs8 +50 -50
- data/spec/fixtures/certs/generated/client_from_root.p12 +0 -0
- data/spec/fixtures/certs/generated/root.crt +28 -28
- data/spec/fixtures/certs/generated/root.key +52 -51
- data/spec/fixtures/certs/generated/root.key.pkcs8 +50 -50
- data/spec/fixtures/certs/generated/server_from_root.crt +29 -29
- data/spec/fixtures/certs/generated/server_from_root.key +52 -51
- data/spec/fixtures/certs/generated/server_from_root.key.pkcs8 +50 -50
- data/spec/fixtures/certs/generated/server_from_root.p12 +0 -0
- data/spec/fixtures/certs/generated/truststore.jks +0 -0
- data/spec/inputs/http_spec.rb +19 -154
- data/vendor/jar-dependencies/org/logstash/plugins/input/http/logstash-input-http/{3.9.2/logstash-input-http-3.9.2.jar → 4.0.0/logstash-input-http-4.0.0.jar} +0 -0
- metadata +3 -23
@@ -1,52 +1,52 @@
|
|
1
1
|
-----BEGIN PRIVATE KEY-----
|
2
|
-
|
3
|
-
|
4
|
-
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
+
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
/
|
18
|
-
|
19
|
-
/
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
/
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
2
|
+
MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQCrH44rj1Uq6ew0
|
3
|
+
YtX8oBOqhsAihGG0N1RnndFrTcQFeptkm8CebbRP4/Wi/4WeGW5UfRfiAfB6uQpB
|
4
|
+
qWVCNrCu5eTSucfcqkWAXbnU3akJAf2LeVJwHGTXybbDXyIEZcWy7hjnZRkC7hXU
|
5
|
+
RYZClCH9RHEAVjg8in+L264cOdvpF7vTkq1fz3YUyp3HdpsSrD4blnyIvg+MaX9v
|
6
|
+
c8/Vtp2Mm6Av1smMvMKnVYbmIHqXYo1MxznnFp2yAbSwLrQmGY7BrAUNzzOtq8tT
|
7
|
+
bedYd5ZiZ8ZI4TkPy4f4+cGmpxr4mRCi9UbyCgq+cl2JcE6ZgBlZQqMz70VQT9eS
|
8
|
+
bZB2FEE6+++s9WyLBdJCJnme1alVPAR4H/zsPaGmP8mIO81F5lQ4gOR4V9pHSw5p
|
9
|
+
vNhgdxbL0P16Mlhtgi+7KvaX3OwID+y/86pnR0ZgnQO329z/QSbvyyUG1opeS8ix
|
10
|
+
XDJGAYL7xULy7AbWHRuK+jpn4Tg0B5B7OOfUMK/caHIQI6oVnenGlv31BoAtKUVW
|
11
|
+
qdD0fJ/HlM/hSF0BpWMEoaIU29JnP6ma3LlZ7fSCXtUEZbq9O93Nqbflm5iBzQ/L
|
12
|
+
nf82hCg/YLEQku/IczncwkSiMCsONogGB1Yb+eUJ3LOE8we0wev887HYC8Axm4Mb
|
13
|
+
v0aaeA6skKLDSyD4+j+Sz6OL11+mrwIDAQABAoICAA0YOhHdQwAorFmJ4qQVP8wB
|
14
|
+
ybwaczuOLFhNfFQAvGpK6o81V/UHog+m+woBEaF6grXWaLhzu4o4lK9XnhcGBlkr
|
15
|
+
4Gm7q66YHP9orKq8V44H5/X/T66ijZjxp5mlsv2xKAK8M42pb9OIkoUO2OpJWZx+
|
16
|
+
20LSVjVTx9TU96rTRp+8oDPdeoTlZDzNEGvOCKnSImKMDnWMTbZJ8GV/8DyDX+T9
|
17
|
+
l7FxdzTc0OxrIAqGG7tv4C4q5KRpV6HifYgp2sE7nW/2kOBwpZy5k7KLq3Nam1hm
|
18
|
+
Zob3LR2nTn1f51CwYuD5HYvKxyYIXLAcIko9HNakNcxdzA1SVvSBV5at6asPe7o+
|
19
|
+
qmGeISq97HoUDYe1meqaSX4Pw0Cu/KMPLeo4+jV1swk3IypSfuSEDBnOOiNWhViO
|
20
|
+
ZSwlQcYSaGpbuS4Mdd5gneiYxdZqcpPSOCv0DDeeWncLxDJb+VLhzYmR25jffkv5
|
21
|
+
MsulcBQqzCLRW198JcDtWPxCl6EL4HJgTa2/ymRrA3bIxOVbnV3sl5f/cR73Gm/Y
|
22
|
+
/LausREpxUTNJXQDBr+Y2xJgE5rbLFz4yy4C/X/Ur2BabAO8vnZ8MM4agmcSaGIb
|
23
|
+
xd1b03Eb2XrXxEqZOa4UODOehL676yYVpDtXGLXK2Ga7DpIWGXSkY8pYl4vY3VOr
|
24
|
+
J9PM55EMjcCy/0FYOJdhAoIBAQDe8kbWocqte48oeHyO+jbfzDgV0iTWkLSSlvtV
|
25
|
+
NIZoVSdxQfqSCdxZCA2juXEWQ48isoT5XrIEEJtWccd2nNY+KpNpRJY2vIAgBmv4
|
26
|
+
efJHHz2T5Y/E+uXcIz5FHI8BCj9KBGwYKWZXpuXzlLFPqMSACX/CY5ZbH8QT5P4U
|
27
|
+
NkAuJVVW89gQZWJXO15pDbElZR/cToMJAFooXkOHTKrbM/MUwQPe4ArVXBqgHUmn
|
28
|
+
xrCtfOyoEGDh4zgJQmsZ5uCPE4bWAGu5kZEzDWnYajT6Ep/LCsQoVpL0AVnnXyDQ
|
29
|
+
J1XQCpOfRL2cRuvjeOsfplPizUPLh73w/q4D8y/VU2SxXZUxAoIBAQDEfmE+p/64
|
30
|
+
Ppre/Oi9VggK2J8ggnRjX9wx+L6tTNGrZxrASdm5tH6Z/ROlWXT8OlkGad1cnD+x
|
31
|
+
27QQKkTA+QkpSgzBMysl01HSmGtFVk5WrQQ8fkwhJVn0ZdN/XXMNyUOt5P+Xsdzd
|
32
|
+
YZKfuiPVVp3f8eT5DI4a6Q6KwpCh8yJK3dKvzCLBLuCRilKNlQt76Un6H3omQnmA
|
33
|
+
4EcUZjNOh1lJP05/WxLSMMXQ/BdVE7UNbGnfllvMVH3Zr8E71oG21OLM80DdNOwY
|
34
|
+
RqbQyElMirWvuYA2rZeWqg4mhc4x4bQqLOFeXWywU5zqMmCWi5ROcdNUxvLwF0Th
|
35
|
+
onBQVFJCPYHfAoIBAEhyEfLMwD9/VxWfkVoklJBEnDT7BF10yDiaNzGIz+Q3R4nW
|
36
|
+
FsY9zgxgQY5iRA0oBusPd4ZQ7yfC/bcpYdd5P2UUELK0RtuihT/i1lL3zXKvBCN7
|
37
|
+
BSzNGsRd724lyZJc8hPrO/Td/xOceDyepL9t5+xzKcDQ+5rAx8ZvMuD+f/x+xSxs
|
38
|
+
MFmjmEEgWZ1phZbRNXkxSgMyyhk0CF1+3EY+q06jKc7SnrKWK1C8M6MBPYgigARc
|
39
|
+
zh6Y5yybGJJiI7ZacgY4PMkgND6SrUJVwMFCLAqehP9WoooHpl842kDJh2kDBtVK
|
40
|
+
URLnON/B+yVdtwSMDuukQGR/XayK6ZA4eQ/piQECggEAa2PO7hmOw0+kAP8kjGY6
|
41
|
+
mwLtZS0nQzCe/ci/HaQAa7c8DZ/PGQmmr657UEFmCHwzL6goTXcv8Jrs/HC9huIU
|
42
|
+
ubY45lZ63H90Fq8q4Yhb5E9HI3C7Vto9Ia+NOezu9rfq/11Ku7N/zJaJNjbbYrum
|
43
|
+
KUDhLaRI/jgltHzF410oftZhUac1z3M5VRHOMIcm8Z/8yHDvp31pPqBU+Lcqj161
|
44
|
+
06x/0GcMEEiLtL4yWlMc/qsj6gkZPsFmztSZvYRs/Gm5Ut4Xs047QsFKZo0wUl71
|
45
|
+
EYdGpZuWX8etWCyFFwoOF4bT3Wkd//iSqATEeULr2Tuojor1N3bgNJk83QpYss8+
|
46
|
+
7QKCAQEAk4V3SJ9qoxFwHRPlLzzE7IR2zLsOFeyp3aj87O7YYsNqtsxBRSeT/ha3
|
47
|
+
CTaK10qfQroreE0FdUGw9zSdIeUTon/W+Vk56wDLY8KNjLf66oDXJ4FbVo3uKW/c
|
48
|
+
zvjynbeIvofI3NnOq6r0CyDNdQKBNc8ARDmbOAYMXowyid7Q+xTiJ1r7cZF3AXfX
|
49
|
+
pGRU3zalzsFeTrlsZmLgG/CPMm7OHkC5c9dvbWQ8jgW08mNuvjVbsMayZkU8PnF5
|
50
|
+
XTpGjmThiS+WA/UUjUBAwQtRfeLBoLu1Kf/oNv5I91it8XeJeGU5JTNGalaK2etE
|
51
|
+
uMAJFAIPeZ9MmXzkC4MrNGCd5E6vLw==
|
52
52
|
-----END PRIVATE KEY-----
|
Binary file
|
Binary file
|
data/spec/inputs/http_spec.rb
CHANGED
@@ -226,22 +226,7 @@ describe LogStash::Inputs::Http do
|
|
226
226
|
event = logstash_queue.pop
|
227
227
|
expect(event.get("message")).to eq("Hello")
|
228
228
|
end
|
229
|
-
|
230
|
-
end
|
231
|
-
|
232
|
-
context 'enforced TLSv1.3 (deprecated options)' do
|
233
|
-
|
234
|
-
let(:config) { super().merge 'tls_min_version' => 1.3,
|
235
|
-
'cipher_suites' => [ 'TLS_AES_128_GCM_SHA256' ] }
|
236
|
-
|
237
|
-
it "should parse the json body" do
|
238
|
-
expect(response.code).to eq(200)
|
239
|
-
event = logstash_queue.pop
|
240
|
-
expect(event.get("message")).to eq("Hello")
|
241
|
-
end
|
242
|
-
|
243
229
|
end
|
244
|
-
|
245
230
|
end if TLS13_ENABLED_BY_DEFAULT
|
246
231
|
|
247
232
|
end
|
@@ -561,16 +546,6 @@ describe LogStash::Inputs::Http do
|
|
561
546
|
subject.run(nil)
|
562
547
|
end
|
563
548
|
end
|
564
|
-
|
565
|
-
context "and `ssl_` settings provided" do
|
566
|
-
let(:ssc) { SelfSignedCertificate.new }
|
567
|
-
let(:config) { { "port" => 0, "ssl_enabled" => false, "ssl_certificate" => ssc.certificate.path, "ssl_client_authentication" => "none", "cipher_suites" => ["TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"] } }
|
568
|
-
|
569
|
-
it "should warn about not using the configs" do
|
570
|
-
expect(subject.logger).to receive(:warn).with(/^Configured SSL settings are not used when `ssl_enabled` is set to `false`: \[("ssl_certificate"(,\s)?|"ssl_client_authentication"(,\s)?|"cipher_suites"(,\s)?)*\]$/)
|
571
|
-
subject.register
|
572
|
-
end
|
573
|
-
end
|
574
549
|
end
|
575
550
|
|
576
551
|
context "with :ssl_enabled => true" do
|
@@ -628,31 +603,7 @@ describe LogStash::Inputs::Http do
|
|
628
603
|
expect { subject.register }.to_not raise_exception
|
629
604
|
end
|
630
605
|
end
|
631
|
-
["ssl_verify_mode", "verify_mode"].each do |config_name|
|
632
|
-
["peer", "force_peer"].each do |verify_mode|
|
633
|
-
context "with deprecated #{config_name} = #{verify_mode}" do
|
634
|
-
subject { LogStash::Inputs::Http.new("port" => port,
|
635
|
-
"ssl_enabled" => true,
|
636
|
-
"ssl_certificate" => ssl_certificate.path,
|
637
|
-
"ssl_certificate_authorities" => ssl_certificate.path,
|
638
|
-
"ssl_key" => ssl_key.path,
|
639
|
-
config_name => verify_mode
|
640
|
-
) }
|
641
|
-
it "should not raise exception" do
|
642
|
-
expect { subject.register }.to_not raise_exception
|
643
|
-
end
|
644
|
-
end
|
645
|
-
end
|
646
|
-
end
|
647
|
-
["ssl_verify_mode", "verify_mode"].each do |config_name|
|
648
|
-
context "with deprecated #{config_name} = none" do
|
649
|
-
subject { LogStash::Inputs::Http.new(config.merge(config_name => "none")) }
|
650
606
|
|
651
|
-
it "should not raise exception" do
|
652
|
-
expect { subject.register }.to_not raise_exception
|
653
|
-
end
|
654
|
-
end
|
655
|
-
end
|
656
607
|
context "with invalid ssl certificate" do
|
657
608
|
before do
|
658
609
|
cert = File.readlines path = config["ssl_certificate"]
|
@@ -700,76 +651,6 @@ describe LogStash::Inputs::Http do
|
|
700
651
|
end
|
701
652
|
end
|
702
653
|
|
703
|
-
context "with both verify_mode and ssl_verify_mode options set" do
|
704
|
-
let(:config) do
|
705
|
-
super().merge('verify_mode' => 'none', 'ssl_verify_mode' => 'none')
|
706
|
-
end
|
707
|
-
|
708
|
-
it "should raise a configuration error" do
|
709
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_verify_mode`.?/i
|
710
|
-
end
|
711
|
-
end
|
712
|
-
|
713
|
-
context "with both ssl_client_authentication and ssl_verify_mode options set" do
|
714
|
-
let(:config) do
|
715
|
-
super().merge('ssl_client_authentication' => 'optional', 'ssl_verify_mode' => 'none')
|
716
|
-
end
|
717
|
-
|
718
|
-
it "should raise a configuration error" do
|
719
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_client_authentication.?/i
|
720
|
-
end
|
721
|
-
end
|
722
|
-
|
723
|
-
context "with both ssl_client_authentication and verify_mode options set" do
|
724
|
-
let(:config) do
|
725
|
-
super().merge('ssl_client_authentication' => 'optional', 'verify_mode' => 'none')
|
726
|
-
end
|
727
|
-
|
728
|
-
it "should raise a configuration error" do
|
729
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_client_authentication.?/i
|
730
|
-
end
|
731
|
-
end
|
732
|
-
|
733
|
-
context "with ssl_cipher_suites and cipher_suites set" do
|
734
|
-
let(:config) do
|
735
|
-
super().merge('ssl_cipher_suites' => ['TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384'],
|
736
|
-
'cipher_suites' => ['TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384'])
|
737
|
-
end
|
738
|
-
|
739
|
-
it "should raise a configuration error" do
|
740
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_cipher_suites.?/i
|
741
|
-
end
|
742
|
-
end
|
743
|
-
|
744
|
-
context "with ssl_supported_protocols and tls_min_version set" do
|
745
|
-
let(:config) do
|
746
|
-
super().merge('ssl_supported_protocols' => ['TLSv1.2'], 'tls_min_version' => 1.0)
|
747
|
-
end
|
748
|
-
|
749
|
-
it "should raise a configuration error" do
|
750
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_supported_protocols.?/i
|
751
|
-
end
|
752
|
-
end
|
753
|
-
|
754
|
-
context "with ssl_supported_protocols and tls_max_version set" do
|
755
|
-
let(:config) do
|
756
|
-
super().merge('ssl_supported_protocols' => ['TLSv1.2'], 'tls_max_version' => 1.2)
|
757
|
-
end
|
758
|
-
|
759
|
-
it "should raise a configuration error" do
|
760
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_supported_protocols.?/i
|
761
|
-
end
|
762
|
-
end
|
763
|
-
|
764
|
-
context "with both ssl and ssl_enabled set" do
|
765
|
-
let(:config) do
|
766
|
-
super().merge('ssl' => true, 'ssl_enabled' => true )
|
767
|
-
end
|
768
|
-
|
769
|
-
it "should raise a configuration error" do
|
770
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_enabled.?/i
|
771
|
-
end
|
772
|
-
end
|
773
654
|
|
774
655
|
context "and with :ssl_keystore_path" do
|
775
656
|
let(:config) do
|
@@ -782,41 +663,6 @@ describe LogStash::Inputs::Http do
|
|
782
663
|
end
|
783
664
|
|
784
665
|
context "with ssl_client_authentication" do
|
785
|
-
context "normalized from ssl_verify_mode 'none'" do
|
786
|
-
let(:config) { super().merge("ssl_verify_mode" => "none") }
|
787
|
-
|
788
|
-
it "should transform the value to 'none'" do
|
789
|
-
subject.register
|
790
|
-
expect(subject.params).to match hash_including("ssl_client_authentication" => "none")
|
791
|
-
expect(subject.instance_variable_get(:@ssl_client_authentication)).to eql("none")
|
792
|
-
end
|
793
|
-
|
794
|
-
context "and ssl_certificate_authorities is set" do
|
795
|
-
let(:config) { super().merge("ssl_certificate_authorities" => [certificate_path( 'root.crt')]) }
|
796
|
-
it "raise a configuration error" do
|
797
|
-
expect { subject.register }.to raise_error(LogStash::ConfigurationError, "The configuration of `ssl_certificate_authorities` requires setting `ssl_verify_mode` to `peer` or 'force_peer'")
|
798
|
-
end
|
799
|
-
end
|
800
|
-
end
|
801
|
-
|
802
|
-
[%w[peer optional], %w[force_peer required]].each do |ssl_verify_mode, ssl_client_authentication|
|
803
|
-
context "normalized from ssl_verify_mode '#{ssl_verify_mode}'" do
|
804
|
-
let(:config) { super().merge("ssl_verify_mode" => ssl_verify_mode, "ssl_certificate_authorities" => [certificate_path( 'root.crt')]) }
|
805
|
-
|
806
|
-
it "should transform the value to '#{ssl_client_authentication}'" do
|
807
|
-
subject.register
|
808
|
-
expect(subject.params).to match hash_including("ssl_client_authentication" => ssl_client_authentication)
|
809
|
-
expect(subject.instance_variable_get(:@ssl_client_authentication)).to eql(ssl_client_authentication)
|
810
|
-
end
|
811
|
-
|
812
|
-
context "with no ssl_certificate_authorities set " do
|
813
|
-
let(:config) { super().reject { |key| "ssl_certificate_authorities".eql?(key) } }
|
814
|
-
it "raise a configuration error" do
|
815
|
-
expect {subject.register}.to raise_error(LogStash::ConfigurationError, "Using `ssl_verify_mode` set to `peer` or `force_peer`, requires the configuration of `ssl_certificate_authorities` or `ssl_truststore_path`")
|
816
|
-
end
|
817
|
-
end
|
818
|
-
end
|
819
|
-
end
|
820
666
|
|
821
667
|
context "configured to 'none'" do
|
822
668
|
let(:config) { super().merge("ssl_client_authentication" => "none") }
|
@@ -953,7 +799,26 @@ describe LogStash::Inputs::Http do
|
|
953
799
|
end
|
954
800
|
end
|
955
801
|
end
|
802
|
+
end
|
956
803
|
|
804
|
+
describe 'handling obsolete settings' do
|
805
|
+
[{:name => 'tls_min_version', :replacement => 'ssl_supported_protocols', :sample_value => 1.3},
|
806
|
+
{:name => 'tls_max_version', :replacement => 'ssl_supported_protocols', :sample_value => 1.3},
|
807
|
+
{:name => 'cipher_suites', :replacement => 'ssl_cipher_suites', :sample_value => ['TLS_AES_128_GCM_SHA256']},
|
808
|
+
{:name => 'ssl', :replacement => 'ssl_enabled', :sample_value => true},
|
809
|
+
{:name => 'keystore', :replacement => 'ssl_keystore_path', :sample_value => certificate_path( 'server_from_root.p12')},
|
810
|
+
{:name => 'keystore_password', :replacement => 'ssl_keystore_password', :sample_value => 'none'},
|
811
|
+
{:name => 'ssl_verify_mode', :replacement => 'ssl_client_authentication', :sample_value => 'peer'},
|
812
|
+
{:name => 'verify_mode', :replacement => 'ssl_client_authentication', :sample_value => 'peer'}].each do | obsolete_setting|
|
813
|
+
context "with obsolete #{obsolete_setting[:name]}" do
|
814
|
+
let (:deprecated_config) do
|
815
|
+
config.merge({obsolete_setting[:name] => obsolete_setting[:sample_value]})
|
816
|
+
end
|
817
|
+
it "should raise a config error with the appropriate message" do
|
818
|
+
expect { LogStash::Inputs::Http.new(deprecated_config).register }.to raise_error LogStash::ConfigurationError, /The setting `#{obsolete_setting[:name]}` in plugin `http` is obsolete and is no longer available. Set '#{obsolete_setting[:replacement]}' instead/i
|
819
|
+
end
|
820
|
+
end
|
821
|
+
end
|
957
822
|
end
|
958
823
|
end
|
959
824
|
|
Binary file
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: logstash-input-http
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version:
|
4
|
+
version: 4.0.0
|
5
5
|
platform: java
|
6
6
|
authors:
|
7
7
|
- Elastic
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-12-18 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
requirement: !ruby/object:Gem::Requirement
|
@@ -44,26 +44,6 @@ dependencies:
|
|
44
44
|
- - ">="
|
45
45
|
- !ruby/object:Gem::Version
|
46
46
|
version: '0'
|
47
|
-
- !ruby/object:Gem::Dependency
|
48
|
-
requirement: !ruby/object:Gem::Requirement
|
49
|
-
requirements:
|
50
|
-
- - "~>"
|
51
|
-
- !ruby/object:Gem::Version
|
52
|
-
version: '0.3'
|
53
|
-
- - ">="
|
54
|
-
- !ruby/object:Gem::Version
|
55
|
-
version: 0.3.4
|
56
|
-
name: jar-dependencies
|
57
|
-
type: :runtime
|
58
|
-
prerelease: false
|
59
|
-
version_requirements: !ruby/object:Gem::Requirement
|
60
|
-
requirements:
|
61
|
-
- - "~>"
|
62
|
-
- !ruby/object:Gem::Version
|
63
|
-
version: '0.3'
|
64
|
-
- - ">="
|
65
|
-
- !ruby/object:Gem::Version
|
66
|
-
version: 0.3.4
|
67
47
|
- !ruby/object:Gem::Dependency
|
68
48
|
requirement: !ruby/object:Gem::Requirement
|
69
49
|
requirements:
|
@@ -196,7 +176,7 @@ files:
|
|
196
176
|
- vendor/jar-dependencies/io/netty/netty-handler/4.1.115.Final/netty-handler-4.1.115.Final.jar
|
197
177
|
- vendor/jar-dependencies/io/netty/netty-transport-native-unix-common/4.1.115.Final/netty-transport-native-unix-common-4.1.115.Final.jar
|
198
178
|
- vendor/jar-dependencies/io/netty/netty-transport/4.1.115.Final/netty-transport-4.1.115.Final.jar
|
199
|
-
- vendor/jar-dependencies/org/logstash/plugins/input/http/logstash-input-http/
|
179
|
+
- vendor/jar-dependencies/org/logstash/plugins/input/http/logstash-input-http/4.0.0/logstash-input-http-4.0.0.jar
|
200
180
|
homepage: http://www.elastic.co/guide/en/logstash/current/index.html
|
201
181
|
licenses:
|
202
182
|
- Apache License (2.0)
|