logstash-input-http 3.9.2-java → 4.0.0-java

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,52 +1,52 @@
1
1
  -----BEGIN PRIVATE KEY-----
2
- MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQC8/x0FJwObqR8+
3
- kblGd6XbgPv1Q0ZCorHjO1LB3ivlV5nOLuh08MLwXyoDka020KmVrS4hdIchl03Z
4
- 35E71eMAqfioWyZ2YVS3Bs3ifIW8nZdpQfZ0eocFblHAgL/HdX136TGikHtdU3eq
5
- rmWC7BaF4QJ2lAmp+jmAmLtt+RR2F4NLMQmbUnfnRvh2ZIg4zYud5d5O0Ej1Fyrq
6
- epiAba1IRGPyrg/JndGcIwfNeefLKSIQlwYJ3UKoRHCLbgJo2Mx1606pn/sPbPsC
7
- 8e/WoB+Ub43Bsp2QJqlRjZLEoKcPMu8yVLOiFUucBTwh/fRCudA/V6j8FtxhmuGE
8
- nq28xfWy8/jst4yRyPBRTUmvNNYIFFBo5y/yifpgQDOY6KetAr82iVeAkpi1mChF
9
- 5g726YfCgNWa2DLmJHeBd+AIVGEPil/Tpi+XGWVO5WO1UvCBa1J2I/7K6aafGsUi
10
- +6oOJ+Bd3qhaNl9vXXQwrsGYPqk2QclFPHTx2+jdMOU1kh4LNlxTsclud56cV8Gu
11
- iF5lMy8dAfqcUPjtG33c/jrK2QMGHJewEnoCPLsyzbsxmdGldMoi0FI8megOl3mC
12
- X3zTiEnIb9VILFkSZqyFlrZ1vnZMQ1h+9PNDt5RVHl3wbCf9oOaIK7eiNsGWG7Qp
13
- 8SImKUT37pPwczhnP8CQJ4SXw3vIXQIDAQABAoICAD0GPq+QNlkHlaAVW3aGYZZr
14
- om9CBqizca7GU+VnQFMwIuhxOvuvVbJZd+5pFj3RyEAdB/0jbBKLkUadKn7ghAiN
15
- 2U07CUNGEB184/OSc3hAhkglVVeszHYTdfArYkEcDaQvNqif8EVlEwmYgAxzAJ6/
16
- 1ZTGHgy1T+XW6wYKW/H5i5o2vjxZt3+E6esIcPeuXrtgIpTeKgCBN4k4ho9JWp8v
17
- /fm4/D4EaE76/KT7DL4LjQVATmHXAJPmbVSH8904y2Pz05Vvo5gKf04nImLxluDN
18
- 2D7H1ppZ8Wf0x4QXv3ln39YnhUz7hUteYVk0b68v4i7hth2XoBcf9FtnBQAkBz3u
19
- /CMkdjegYfBpSc1SikwhTI90vGiChoQPLKLHZDjB085IU1+Yhfi3gdK++TD22c69
20
- gKfG6lj7GW2ZS/ojagWWDorszZ9C2Hbcj1PcsWAg4ZqBn8+9zWv8bdxt7cYJY2mJ
21
- 2aurfvDDd7xEb5f0sfE92IP9l3w0nBY5z8k4Ca129gpSZ0R04Hl+4ZAjq8s+Dxb2
22
- zM99KJeIxhZY7wSHKXSZd0ATuKEvj/7uH624LkOtkApqcHE304ZRQqnhhrVUkoZS
23
- BOkFHlFTEuyElXnZbIgI+eTzPfal4vYvo2BmEYlBbctYQ3HrwMtVXB3kow97AtDX
24
- BFX3p9GU56Fo6rHD30P9AoIBAQD3zg5vRex8qMlrIOnyRFYjYCxw/6GmCb6xvlT5
25
- 1ZbTQzUMAsDvAscSNrZDLg9D/+tqjoQr5Yo+56NABjEfIHKnwMvRMGxP5pSWUYyw
26
- UsX7lV8zaQxMmyQs7VDpjukSg/93R3hORfTavXaQVhiljiXT6riQCCrkbz30FYNs
27
- xipgQvN6OoMC/tHK1/8pz7+jeiZQo1765z7YYhz4KhPTvaS5jFPK+R4CoGR5Zflk
28
- C0q+PwkyS6OdZ7AKbNXXU7PUwdJmKcjo8rUEGgwjM6zXuHECuhEWEn1GpdFKKZai
29
- C9yxt/sRrvkHhF1NUerSRxT0v2EJkGLZJ8LqD9oolibutJHXAoIBAQDDPy3IBgry
30
- qiqCq1iU/ttbR/vkfEAclMpH+vtrNZ/9dzCJOi7UmUrAIIurr7p2CadblK4U0BzK
31
- IalRcVjqRMxz2lV4lnLMmGovcfe2Nipq/Mqi/Hx0pgf9iSBn8vTlb7CRgyYl3PZs
32
- NLpiBhD8LNxWw/85wcQlk3Phaa/+nqTWAiH4BqcT1MM9NlkcF9YDuFawhVctZUFq
33
- GpyHWWqrbvmsjU7EOPWlNz3kqdtvLcFdRxMmu1d/gsZpnZEUcFIY1tbtjVAU8MT/
34
- UcTD+RIz4lyhp9R7XPjE/c48GuWMlOV2WWE/Kg97Arp0pkTes7lWqHT2ZWyG2CSG
35
- jOjx4G94KFjrAoIBADWzJ5mhc4AIK63Vch0YBfqgisDqBKOwlOx7rHp/eLHLbKFv
36
- r1OcLHub859XSeOYf/GVdLr2gSDknZHwRZDTPUVxGDn63l3qP+TbQzuqlFDSq9C+
37
- QPYQ4KQDwXb7izKB/Ehi6oU7z7XfPORGZAzsYvIreVdtDa53FNviFZrqzqARoiWo
38
- rF9nzRrB9/+dj4/jlo3++UQx/IJzsIduxuEpxZqX+EiR95jmHR/Zo1O0xru3eUy2
39
- 63vezl1T/HsvHldKsUeGYo1omyWKZ3rxZdFRnNvUaoN3+kHnCRWjMYtoOqkgj33j
40
- hv/EBVwOFm7/DGGFX4ftDB626RxD1yjYcRNlef0CggEARxz10crRpfzwqtM52lrR
41
- DngzeM8AkuhmnLz/YdcQRMNqvDCi6fBDV6MC/C9vHJr7h9Gpbg82zTBheTZtijYw
42
- uWmmg9tYSMiitFEwRf+Ih5s3OxH3So1Gj8OoN/Q32nFJwFYiSNwoLNUvpZBME21L
43
- e5a7mQ/IH1+Lb2iNH5Isu33fXXUe2Yw+6EapQiA0ZPp5KKYIUJJ2tuymYm3g+jvb
44
- WEvHipSsc9ahBm4PbHkf2peOlCbcAadiGQm409btL/rgIXm810OynMPthOttA9TI
45
- pGB6dcwxF57RxPaO8RsyUF7Rmq35IXam7uG4Z9zR/owwvaXHV33WH+Om3KJAN2WK
46
- rQKCAQEA7UXJ80kxH52DkxLXga24x0keFy3TG5XcC68HSphsdhpmdst/UBkVDujd
47
- /mi/8sNeBigsxoCQcTJuD7gH+Z7KRRslgEeozzZYyZtrCBz4JgtEMGtwlup9vu4G
48
- 9/+TxhHQqQYr9cidLbHTGWg9iYMUp5PealTWKvgw5C7ZU07jrU3EdrO/UVxv9GNl
49
- 57ALerwKyXAHN7R/k/KrAZiVW+tGnkbNiYe54uoHo/PbnTVzMTVClwknx9yYWpPC
50
- V+lAnmso4H0IPupFM6tU10MFB8tS7LECl4E0KboE3hMf0H8b7cwPurE3QUr3ppDD
51
- 2ovkeMh05cseiXfaeEaXgvoABDrwog==
2
+ MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQCrH44rj1Uq6ew0
3
+ YtX8oBOqhsAihGG0N1RnndFrTcQFeptkm8CebbRP4/Wi/4WeGW5UfRfiAfB6uQpB
4
+ qWVCNrCu5eTSucfcqkWAXbnU3akJAf2LeVJwHGTXybbDXyIEZcWy7hjnZRkC7hXU
5
+ RYZClCH9RHEAVjg8in+L264cOdvpF7vTkq1fz3YUyp3HdpsSrD4blnyIvg+MaX9v
6
+ c8/Vtp2Mm6Av1smMvMKnVYbmIHqXYo1MxznnFp2yAbSwLrQmGY7BrAUNzzOtq8tT
7
+ bedYd5ZiZ8ZI4TkPy4f4+cGmpxr4mRCi9UbyCgq+cl2JcE6ZgBlZQqMz70VQT9eS
8
+ bZB2FEE6+++s9WyLBdJCJnme1alVPAR4H/zsPaGmP8mIO81F5lQ4gOR4V9pHSw5p
9
+ vNhgdxbL0P16Mlhtgi+7KvaX3OwID+y/86pnR0ZgnQO329z/QSbvyyUG1opeS8ix
10
+ XDJGAYL7xULy7AbWHRuK+jpn4Tg0B5B7OOfUMK/caHIQI6oVnenGlv31BoAtKUVW
11
+ qdD0fJ/HlM/hSF0BpWMEoaIU29JnP6ma3LlZ7fSCXtUEZbq9O93Nqbflm5iBzQ/L
12
+ nf82hCg/YLEQku/IczncwkSiMCsONogGB1Yb+eUJ3LOE8we0wev887HYC8Axm4Mb
13
+ v0aaeA6skKLDSyD4+j+Sz6OL11+mrwIDAQABAoICAA0YOhHdQwAorFmJ4qQVP8wB
14
+ ybwaczuOLFhNfFQAvGpK6o81V/UHog+m+woBEaF6grXWaLhzu4o4lK9XnhcGBlkr
15
+ 4Gm7q66YHP9orKq8V44H5/X/T66ijZjxp5mlsv2xKAK8M42pb9OIkoUO2OpJWZx+
16
+ 20LSVjVTx9TU96rTRp+8oDPdeoTlZDzNEGvOCKnSImKMDnWMTbZJ8GV/8DyDX+T9
17
+ l7FxdzTc0OxrIAqGG7tv4C4q5KRpV6HifYgp2sE7nW/2kOBwpZy5k7KLq3Nam1hm
18
+ Zob3LR2nTn1f51CwYuD5HYvKxyYIXLAcIko9HNakNcxdzA1SVvSBV5at6asPe7o+
19
+ qmGeISq97HoUDYe1meqaSX4Pw0Cu/KMPLeo4+jV1swk3IypSfuSEDBnOOiNWhViO
20
+ ZSwlQcYSaGpbuS4Mdd5gneiYxdZqcpPSOCv0DDeeWncLxDJb+VLhzYmR25jffkv5
21
+ MsulcBQqzCLRW198JcDtWPxCl6EL4HJgTa2/ymRrA3bIxOVbnV3sl5f/cR73Gm/Y
22
+ /LausREpxUTNJXQDBr+Y2xJgE5rbLFz4yy4C/X/Ur2BabAO8vnZ8MM4agmcSaGIb
23
+ xd1b03Eb2XrXxEqZOa4UODOehL676yYVpDtXGLXK2Ga7DpIWGXSkY8pYl4vY3VOr
24
+ J9PM55EMjcCy/0FYOJdhAoIBAQDe8kbWocqte48oeHyO+jbfzDgV0iTWkLSSlvtV
25
+ NIZoVSdxQfqSCdxZCA2juXEWQ48isoT5XrIEEJtWccd2nNY+KpNpRJY2vIAgBmv4
26
+ efJHHz2T5Y/E+uXcIz5FHI8BCj9KBGwYKWZXpuXzlLFPqMSACX/CY5ZbH8QT5P4U
27
+ NkAuJVVW89gQZWJXO15pDbElZR/cToMJAFooXkOHTKrbM/MUwQPe4ArVXBqgHUmn
28
+ xrCtfOyoEGDh4zgJQmsZ5uCPE4bWAGu5kZEzDWnYajT6Ep/LCsQoVpL0AVnnXyDQ
29
+ J1XQCpOfRL2cRuvjeOsfplPizUPLh73w/q4D8y/VU2SxXZUxAoIBAQDEfmE+p/64
30
+ Ppre/Oi9VggK2J8ggnRjX9wx+L6tTNGrZxrASdm5tH6Z/ROlWXT8OlkGad1cnD+x
31
+ 27QQKkTA+QkpSgzBMysl01HSmGtFVk5WrQQ8fkwhJVn0ZdN/XXMNyUOt5P+Xsdzd
32
+ YZKfuiPVVp3f8eT5DI4a6Q6KwpCh8yJK3dKvzCLBLuCRilKNlQt76Un6H3omQnmA
33
+ 4EcUZjNOh1lJP05/WxLSMMXQ/BdVE7UNbGnfllvMVH3Zr8E71oG21OLM80DdNOwY
34
+ RqbQyElMirWvuYA2rZeWqg4mhc4x4bQqLOFeXWywU5zqMmCWi5ROcdNUxvLwF0Th
35
+ onBQVFJCPYHfAoIBAEhyEfLMwD9/VxWfkVoklJBEnDT7BF10yDiaNzGIz+Q3R4nW
36
+ FsY9zgxgQY5iRA0oBusPd4ZQ7yfC/bcpYdd5P2UUELK0RtuihT/i1lL3zXKvBCN7
37
+ BSzNGsRd724lyZJc8hPrO/Td/xOceDyepL9t5+xzKcDQ+5rAx8ZvMuD+f/x+xSxs
38
+ MFmjmEEgWZ1phZbRNXkxSgMyyhk0CF1+3EY+q06jKc7SnrKWK1C8M6MBPYgigARc
39
+ zh6Y5yybGJJiI7ZacgY4PMkgND6SrUJVwMFCLAqehP9WoooHpl842kDJh2kDBtVK
40
+ URLnON/B+yVdtwSMDuukQGR/XayK6ZA4eQ/piQECggEAa2PO7hmOw0+kAP8kjGY6
41
+ mwLtZS0nQzCe/ci/HaQAa7c8DZ/PGQmmr657UEFmCHwzL6goTXcv8Jrs/HC9huIU
42
+ ubY45lZ63H90Fq8q4Yhb5E9HI3C7Vto9Ia+NOezu9rfq/11Ku7N/zJaJNjbbYrum
43
+ KUDhLaRI/jgltHzF410oftZhUac1z3M5VRHOMIcm8Z/8yHDvp31pPqBU+Lcqj161
44
+ 06x/0GcMEEiLtL4yWlMc/qsj6gkZPsFmztSZvYRs/Gm5Ut4Xs047QsFKZo0wUl71
45
+ EYdGpZuWX8etWCyFFwoOF4bT3Wkd//iSqATEeULr2Tuojor1N3bgNJk83QpYss8+
46
+ 7QKCAQEAk4V3SJ9qoxFwHRPlLzzE7IR2zLsOFeyp3aj87O7YYsNqtsxBRSeT/ha3
47
+ CTaK10qfQroreE0FdUGw9zSdIeUTon/W+Vk56wDLY8KNjLf66oDXJ4FbVo3uKW/c
48
+ zvjynbeIvofI3NnOq6r0CyDNdQKBNc8ARDmbOAYMXowyid7Q+xTiJ1r7cZF3AXfX
49
+ pGRU3zalzsFeTrlsZmLgG/CPMm7OHkC5c9dvbWQ8jgW08mNuvjVbsMayZkU8PnF5
50
+ XTpGjmThiS+WA/UUjUBAwQtRfeLBoLu1Kf/oNv5I91it8XeJeGU5JTNGalaK2etE
51
+ uMAJFAIPeZ9MmXzkC4MrNGCd5E6vLw==
52
52
  -----END PRIVATE KEY-----
@@ -226,22 +226,7 @@ describe LogStash::Inputs::Http do
226
226
  event = logstash_queue.pop
227
227
  expect(event.get("message")).to eq("Hello")
228
228
  end
229
-
230
- end
231
-
232
- context 'enforced TLSv1.3 (deprecated options)' do
233
-
234
- let(:config) { super().merge 'tls_min_version' => 1.3,
235
- 'cipher_suites' => [ 'TLS_AES_128_GCM_SHA256' ] }
236
-
237
- it "should parse the json body" do
238
- expect(response.code).to eq(200)
239
- event = logstash_queue.pop
240
- expect(event.get("message")).to eq("Hello")
241
- end
242
-
243
229
  end
244
-
245
230
  end if TLS13_ENABLED_BY_DEFAULT
246
231
 
247
232
  end
@@ -561,16 +546,6 @@ describe LogStash::Inputs::Http do
561
546
  subject.run(nil)
562
547
  end
563
548
  end
564
-
565
- context "and `ssl_` settings provided" do
566
- let(:ssc) { SelfSignedCertificate.new }
567
- let(:config) { { "port" => 0, "ssl_enabled" => false, "ssl_certificate" => ssc.certificate.path, "ssl_client_authentication" => "none", "cipher_suites" => ["TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"] } }
568
-
569
- it "should warn about not using the configs" do
570
- expect(subject.logger).to receive(:warn).with(/^Configured SSL settings are not used when `ssl_enabled` is set to `false`: \[("ssl_certificate"(,\s)?|"ssl_client_authentication"(,\s)?|"cipher_suites"(,\s)?)*\]$/)
571
- subject.register
572
- end
573
- end
574
549
  end
575
550
 
576
551
  context "with :ssl_enabled => true" do
@@ -628,31 +603,7 @@ describe LogStash::Inputs::Http do
628
603
  expect { subject.register }.to_not raise_exception
629
604
  end
630
605
  end
631
- ["ssl_verify_mode", "verify_mode"].each do |config_name|
632
- ["peer", "force_peer"].each do |verify_mode|
633
- context "with deprecated #{config_name} = #{verify_mode}" do
634
- subject { LogStash::Inputs::Http.new("port" => port,
635
- "ssl_enabled" => true,
636
- "ssl_certificate" => ssl_certificate.path,
637
- "ssl_certificate_authorities" => ssl_certificate.path,
638
- "ssl_key" => ssl_key.path,
639
- config_name => verify_mode
640
- ) }
641
- it "should not raise exception" do
642
- expect { subject.register }.to_not raise_exception
643
- end
644
- end
645
- end
646
- end
647
- ["ssl_verify_mode", "verify_mode"].each do |config_name|
648
- context "with deprecated #{config_name} = none" do
649
- subject { LogStash::Inputs::Http.new(config.merge(config_name => "none")) }
650
606
 
651
- it "should not raise exception" do
652
- expect { subject.register }.to_not raise_exception
653
- end
654
- end
655
- end
656
607
  context "with invalid ssl certificate" do
657
608
  before do
658
609
  cert = File.readlines path = config["ssl_certificate"]
@@ -700,76 +651,6 @@ describe LogStash::Inputs::Http do
700
651
  end
701
652
  end
702
653
 
703
- context "with both verify_mode and ssl_verify_mode options set" do
704
- let(:config) do
705
- super().merge('verify_mode' => 'none', 'ssl_verify_mode' => 'none')
706
- end
707
-
708
- it "should raise a configuration error" do
709
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_verify_mode`.?/i
710
- end
711
- end
712
-
713
- context "with both ssl_client_authentication and ssl_verify_mode options set" do
714
- let(:config) do
715
- super().merge('ssl_client_authentication' => 'optional', 'ssl_verify_mode' => 'none')
716
- end
717
-
718
- it "should raise a configuration error" do
719
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_client_authentication.?/i
720
- end
721
- end
722
-
723
- context "with both ssl_client_authentication and verify_mode options set" do
724
- let(:config) do
725
- super().merge('ssl_client_authentication' => 'optional', 'verify_mode' => 'none')
726
- end
727
-
728
- it "should raise a configuration error" do
729
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_client_authentication.?/i
730
- end
731
- end
732
-
733
- context "with ssl_cipher_suites and cipher_suites set" do
734
- let(:config) do
735
- super().merge('ssl_cipher_suites' => ['TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384'],
736
- 'cipher_suites' => ['TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384'])
737
- end
738
-
739
- it "should raise a configuration error" do
740
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_cipher_suites.?/i
741
- end
742
- end
743
-
744
- context "with ssl_supported_protocols and tls_min_version set" do
745
- let(:config) do
746
- super().merge('ssl_supported_protocols' => ['TLSv1.2'], 'tls_min_version' => 1.0)
747
- end
748
-
749
- it "should raise a configuration error" do
750
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_supported_protocols.?/i
751
- end
752
- end
753
-
754
- context "with ssl_supported_protocols and tls_max_version set" do
755
- let(:config) do
756
- super().merge('ssl_supported_protocols' => ['TLSv1.2'], 'tls_max_version' => 1.2)
757
- end
758
-
759
- it "should raise a configuration error" do
760
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_supported_protocols.?/i
761
- end
762
- end
763
-
764
- context "with both ssl and ssl_enabled set" do
765
- let(:config) do
766
- super().merge('ssl' => true, 'ssl_enabled' => true )
767
- end
768
-
769
- it "should raise a configuration error" do
770
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_enabled.?/i
771
- end
772
- end
773
654
 
774
655
  context "and with :ssl_keystore_path" do
775
656
  let(:config) do
@@ -782,41 +663,6 @@ describe LogStash::Inputs::Http do
782
663
  end
783
664
 
784
665
  context "with ssl_client_authentication" do
785
- context "normalized from ssl_verify_mode 'none'" do
786
- let(:config) { super().merge("ssl_verify_mode" => "none") }
787
-
788
- it "should transform the value to 'none'" do
789
- subject.register
790
- expect(subject.params).to match hash_including("ssl_client_authentication" => "none")
791
- expect(subject.instance_variable_get(:@ssl_client_authentication)).to eql("none")
792
- end
793
-
794
- context "and ssl_certificate_authorities is set" do
795
- let(:config) { super().merge("ssl_certificate_authorities" => [certificate_path( 'root.crt')]) }
796
- it "raise a configuration error" do
797
- expect { subject.register }.to raise_error(LogStash::ConfigurationError, "The configuration of `ssl_certificate_authorities` requires setting `ssl_verify_mode` to `peer` or 'force_peer'")
798
- end
799
- end
800
- end
801
-
802
- [%w[peer optional], %w[force_peer required]].each do |ssl_verify_mode, ssl_client_authentication|
803
- context "normalized from ssl_verify_mode '#{ssl_verify_mode}'" do
804
- let(:config) { super().merge("ssl_verify_mode" => ssl_verify_mode, "ssl_certificate_authorities" => [certificate_path( 'root.crt')]) }
805
-
806
- it "should transform the value to '#{ssl_client_authentication}'" do
807
- subject.register
808
- expect(subject.params).to match hash_including("ssl_client_authentication" => ssl_client_authentication)
809
- expect(subject.instance_variable_get(:@ssl_client_authentication)).to eql(ssl_client_authentication)
810
- end
811
-
812
- context "with no ssl_certificate_authorities set " do
813
- let(:config) { super().reject { |key| "ssl_certificate_authorities".eql?(key) } }
814
- it "raise a configuration error" do
815
- expect {subject.register}.to raise_error(LogStash::ConfigurationError, "Using `ssl_verify_mode` set to `peer` or `force_peer`, requires the configuration of `ssl_certificate_authorities` or `ssl_truststore_path`")
816
- end
817
- end
818
- end
819
- end
820
666
 
821
667
  context "configured to 'none'" do
822
668
  let(:config) { super().merge("ssl_client_authentication" => "none") }
@@ -953,7 +799,26 @@ describe LogStash::Inputs::Http do
953
799
  end
954
800
  end
955
801
  end
802
+ end
956
803
 
804
+ describe 'handling obsolete settings' do
805
+ [{:name => 'tls_min_version', :replacement => 'ssl_supported_protocols', :sample_value => 1.3},
806
+ {:name => 'tls_max_version', :replacement => 'ssl_supported_protocols', :sample_value => 1.3},
807
+ {:name => 'cipher_suites', :replacement => 'ssl_cipher_suites', :sample_value => ['TLS_AES_128_GCM_SHA256']},
808
+ {:name => 'ssl', :replacement => 'ssl_enabled', :sample_value => true},
809
+ {:name => 'keystore', :replacement => 'ssl_keystore_path', :sample_value => certificate_path( 'server_from_root.p12')},
810
+ {:name => 'keystore_password', :replacement => 'ssl_keystore_password', :sample_value => 'none'},
811
+ {:name => 'ssl_verify_mode', :replacement => 'ssl_client_authentication', :sample_value => 'peer'},
812
+ {:name => 'verify_mode', :replacement => 'ssl_client_authentication', :sample_value => 'peer'}].each do | obsolete_setting|
813
+ context "with obsolete #{obsolete_setting[:name]}" do
814
+ let (:deprecated_config) do
815
+ config.merge({obsolete_setting[:name] => obsolete_setting[:sample_value]})
816
+ end
817
+ it "should raise a config error with the appropriate message" do
818
+ expect { LogStash::Inputs::Http.new(deprecated_config).register }.to raise_error LogStash::ConfigurationError, /The setting `#{obsolete_setting[:name]}` in plugin `http` is obsolete and is no longer available. Set '#{obsolete_setting[:replacement]}' instead/i
819
+ end
820
+ end
821
+ end
957
822
  end
958
823
  end
959
824
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: logstash-input-http
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.9.2
4
+ version: 4.0.0
5
5
  platform: java
6
6
  authors:
7
7
  - Elastic
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-11-18 00:00:00.000000000 Z
11
+ date: 2024-12-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  requirement: !ruby/object:Gem::Requirement
@@ -44,26 +44,6 @@ dependencies:
44
44
  - - ">="
45
45
  - !ruby/object:Gem::Version
46
46
  version: '0'
47
- - !ruby/object:Gem::Dependency
48
- requirement: !ruby/object:Gem::Requirement
49
- requirements:
50
- - - "~>"
51
- - !ruby/object:Gem::Version
52
- version: '0.3'
53
- - - ">="
54
- - !ruby/object:Gem::Version
55
- version: 0.3.4
56
- name: jar-dependencies
57
- type: :runtime
58
- prerelease: false
59
- version_requirements: !ruby/object:Gem::Requirement
60
- requirements:
61
- - - "~>"
62
- - !ruby/object:Gem::Version
63
- version: '0.3'
64
- - - ">="
65
- - !ruby/object:Gem::Version
66
- version: 0.3.4
67
47
  - !ruby/object:Gem::Dependency
68
48
  requirement: !ruby/object:Gem::Requirement
69
49
  requirements:
@@ -196,7 +176,7 @@ files:
196
176
  - vendor/jar-dependencies/io/netty/netty-handler/4.1.115.Final/netty-handler-4.1.115.Final.jar
197
177
  - vendor/jar-dependencies/io/netty/netty-transport-native-unix-common/4.1.115.Final/netty-transport-native-unix-common-4.1.115.Final.jar
198
178
  - vendor/jar-dependencies/io/netty/netty-transport/4.1.115.Final/netty-transport-4.1.115.Final.jar
199
- - vendor/jar-dependencies/org/logstash/plugins/input/http/logstash-input-http/3.9.2/logstash-input-http-3.9.2.jar
179
+ - vendor/jar-dependencies/org/logstash/plugins/input/http/logstash-input-http/4.0.0/logstash-input-http-4.0.0.jar
200
180
  homepage: http://www.elastic.co/guide/en/logstash/current/index.html
201
181
  licenses:
202
182
  - Apache License (2.0)