logstash-input-http 3.9.2-java → 4.0.0-java

Sign up to get free protection for your applications and to get access to all the features.
@@ -1,52 +1,52 @@
1
1
  -----BEGIN PRIVATE KEY-----
2
- MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQC8/x0FJwObqR8+
3
- kblGd6XbgPv1Q0ZCorHjO1LB3ivlV5nOLuh08MLwXyoDka020KmVrS4hdIchl03Z
4
- 35E71eMAqfioWyZ2YVS3Bs3ifIW8nZdpQfZ0eocFblHAgL/HdX136TGikHtdU3eq
5
- rmWC7BaF4QJ2lAmp+jmAmLtt+RR2F4NLMQmbUnfnRvh2ZIg4zYud5d5O0Ej1Fyrq
6
- epiAba1IRGPyrg/JndGcIwfNeefLKSIQlwYJ3UKoRHCLbgJo2Mx1606pn/sPbPsC
7
- 8e/WoB+Ub43Bsp2QJqlRjZLEoKcPMu8yVLOiFUucBTwh/fRCudA/V6j8FtxhmuGE
8
- nq28xfWy8/jst4yRyPBRTUmvNNYIFFBo5y/yifpgQDOY6KetAr82iVeAkpi1mChF
9
- 5g726YfCgNWa2DLmJHeBd+AIVGEPil/Tpi+XGWVO5WO1UvCBa1J2I/7K6aafGsUi
10
- +6oOJ+Bd3qhaNl9vXXQwrsGYPqk2QclFPHTx2+jdMOU1kh4LNlxTsclud56cV8Gu
11
- iF5lMy8dAfqcUPjtG33c/jrK2QMGHJewEnoCPLsyzbsxmdGldMoi0FI8megOl3mC
12
- X3zTiEnIb9VILFkSZqyFlrZ1vnZMQ1h+9PNDt5RVHl3wbCf9oOaIK7eiNsGWG7Qp
13
- 8SImKUT37pPwczhnP8CQJ4SXw3vIXQIDAQABAoICAD0GPq+QNlkHlaAVW3aGYZZr
14
- om9CBqizca7GU+VnQFMwIuhxOvuvVbJZd+5pFj3RyEAdB/0jbBKLkUadKn7ghAiN
15
- 2U07CUNGEB184/OSc3hAhkglVVeszHYTdfArYkEcDaQvNqif8EVlEwmYgAxzAJ6/
16
- 1ZTGHgy1T+XW6wYKW/H5i5o2vjxZt3+E6esIcPeuXrtgIpTeKgCBN4k4ho9JWp8v
17
- /fm4/D4EaE76/KT7DL4LjQVATmHXAJPmbVSH8904y2Pz05Vvo5gKf04nImLxluDN
18
- 2D7H1ppZ8Wf0x4QXv3ln39YnhUz7hUteYVk0b68v4i7hth2XoBcf9FtnBQAkBz3u
19
- /CMkdjegYfBpSc1SikwhTI90vGiChoQPLKLHZDjB085IU1+Yhfi3gdK++TD22c69
20
- gKfG6lj7GW2ZS/ojagWWDorszZ9C2Hbcj1PcsWAg4ZqBn8+9zWv8bdxt7cYJY2mJ
21
- 2aurfvDDd7xEb5f0sfE92IP9l3w0nBY5z8k4Ca129gpSZ0R04Hl+4ZAjq8s+Dxb2
22
- zM99KJeIxhZY7wSHKXSZd0ATuKEvj/7uH624LkOtkApqcHE304ZRQqnhhrVUkoZS
23
- BOkFHlFTEuyElXnZbIgI+eTzPfal4vYvo2BmEYlBbctYQ3HrwMtVXB3kow97AtDX
24
- BFX3p9GU56Fo6rHD30P9AoIBAQD3zg5vRex8qMlrIOnyRFYjYCxw/6GmCb6xvlT5
25
- 1ZbTQzUMAsDvAscSNrZDLg9D/+tqjoQr5Yo+56NABjEfIHKnwMvRMGxP5pSWUYyw
26
- UsX7lV8zaQxMmyQs7VDpjukSg/93R3hORfTavXaQVhiljiXT6riQCCrkbz30FYNs
27
- xipgQvN6OoMC/tHK1/8pz7+jeiZQo1765z7YYhz4KhPTvaS5jFPK+R4CoGR5Zflk
28
- C0q+PwkyS6OdZ7AKbNXXU7PUwdJmKcjo8rUEGgwjM6zXuHECuhEWEn1GpdFKKZai
29
- C9yxt/sRrvkHhF1NUerSRxT0v2EJkGLZJ8LqD9oolibutJHXAoIBAQDDPy3IBgry
30
- qiqCq1iU/ttbR/vkfEAclMpH+vtrNZ/9dzCJOi7UmUrAIIurr7p2CadblK4U0BzK
31
- IalRcVjqRMxz2lV4lnLMmGovcfe2Nipq/Mqi/Hx0pgf9iSBn8vTlb7CRgyYl3PZs
32
- NLpiBhD8LNxWw/85wcQlk3Phaa/+nqTWAiH4BqcT1MM9NlkcF9YDuFawhVctZUFq
33
- GpyHWWqrbvmsjU7EOPWlNz3kqdtvLcFdRxMmu1d/gsZpnZEUcFIY1tbtjVAU8MT/
34
- UcTD+RIz4lyhp9R7XPjE/c48GuWMlOV2WWE/Kg97Arp0pkTes7lWqHT2ZWyG2CSG
35
- jOjx4G94KFjrAoIBADWzJ5mhc4AIK63Vch0YBfqgisDqBKOwlOx7rHp/eLHLbKFv
36
- r1OcLHub859XSeOYf/GVdLr2gSDknZHwRZDTPUVxGDn63l3qP+TbQzuqlFDSq9C+
37
- QPYQ4KQDwXb7izKB/Ehi6oU7z7XfPORGZAzsYvIreVdtDa53FNviFZrqzqARoiWo
38
- rF9nzRrB9/+dj4/jlo3++UQx/IJzsIduxuEpxZqX+EiR95jmHR/Zo1O0xru3eUy2
39
- 63vezl1T/HsvHldKsUeGYo1omyWKZ3rxZdFRnNvUaoN3+kHnCRWjMYtoOqkgj33j
40
- hv/EBVwOFm7/DGGFX4ftDB626RxD1yjYcRNlef0CggEARxz10crRpfzwqtM52lrR
41
- DngzeM8AkuhmnLz/YdcQRMNqvDCi6fBDV6MC/C9vHJr7h9Gpbg82zTBheTZtijYw
42
- uWmmg9tYSMiitFEwRf+Ih5s3OxH3So1Gj8OoN/Q32nFJwFYiSNwoLNUvpZBME21L
43
- e5a7mQ/IH1+Lb2iNH5Isu33fXXUe2Yw+6EapQiA0ZPp5KKYIUJJ2tuymYm3g+jvb
44
- WEvHipSsc9ahBm4PbHkf2peOlCbcAadiGQm409btL/rgIXm810OynMPthOttA9TI
45
- pGB6dcwxF57RxPaO8RsyUF7Rmq35IXam7uG4Z9zR/owwvaXHV33WH+Om3KJAN2WK
46
- rQKCAQEA7UXJ80kxH52DkxLXga24x0keFy3TG5XcC68HSphsdhpmdst/UBkVDujd
47
- /mi/8sNeBigsxoCQcTJuD7gH+Z7KRRslgEeozzZYyZtrCBz4JgtEMGtwlup9vu4G
48
- 9/+TxhHQqQYr9cidLbHTGWg9iYMUp5PealTWKvgw5C7ZU07jrU3EdrO/UVxv9GNl
49
- 57ALerwKyXAHN7R/k/KrAZiVW+tGnkbNiYe54uoHo/PbnTVzMTVClwknx9yYWpPC
50
- V+lAnmso4H0IPupFM6tU10MFB8tS7LECl4E0KboE3hMf0H8b7cwPurE3QUr3ppDD
51
- 2ovkeMh05cseiXfaeEaXgvoABDrwog==
2
+ MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQCrH44rj1Uq6ew0
3
+ YtX8oBOqhsAihGG0N1RnndFrTcQFeptkm8CebbRP4/Wi/4WeGW5UfRfiAfB6uQpB
4
+ qWVCNrCu5eTSucfcqkWAXbnU3akJAf2LeVJwHGTXybbDXyIEZcWy7hjnZRkC7hXU
5
+ RYZClCH9RHEAVjg8in+L264cOdvpF7vTkq1fz3YUyp3HdpsSrD4blnyIvg+MaX9v
6
+ c8/Vtp2Mm6Av1smMvMKnVYbmIHqXYo1MxznnFp2yAbSwLrQmGY7BrAUNzzOtq8tT
7
+ bedYd5ZiZ8ZI4TkPy4f4+cGmpxr4mRCi9UbyCgq+cl2JcE6ZgBlZQqMz70VQT9eS
8
+ bZB2FEE6+++s9WyLBdJCJnme1alVPAR4H/zsPaGmP8mIO81F5lQ4gOR4V9pHSw5p
9
+ vNhgdxbL0P16Mlhtgi+7KvaX3OwID+y/86pnR0ZgnQO329z/QSbvyyUG1opeS8ix
10
+ XDJGAYL7xULy7AbWHRuK+jpn4Tg0B5B7OOfUMK/caHIQI6oVnenGlv31BoAtKUVW
11
+ qdD0fJ/HlM/hSF0BpWMEoaIU29JnP6ma3LlZ7fSCXtUEZbq9O93Nqbflm5iBzQ/L
12
+ nf82hCg/YLEQku/IczncwkSiMCsONogGB1Yb+eUJ3LOE8we0wev887HYC8Axm4Mb
13
+ v0aaeA6skKLDSyD4+j+Sz6OL11+mrwIDAQABAoICAA0YOhHdQwAorFmJ4qQVP8wB
14
+ ybwaczuOLFhNfFQAvGpK6o81V/UHog+m+woBEaF6grXWaLhzu4o4lK9XnhcGBlkr
15
+ 4Gm7q66YHP9orKq8V44H5/X/T66ijZjxp5mlsv2xKAK8M42pb9OIkoUO2OpJWZx+
16
+ 20LSVjVTx9TU96rTRp+8oDPdeoTlZDzNEGvOCKnSImKMDnWMTbZJ8GV/8DyDX+T9
17
+ l7FxdzTc0OxrIAqGG7tv4C4q5KRpV6HifYgp2sE7nW/2kOBwpZy5k7KLq3Nam1hm
18
+ Zob3LR2nTn1f51CwYuD5HYvKxyYIXLAcIko9HNakNcxdzA1SVvSBV5at6asPe7o+
19
+ qmGeISq97HoUDYe1meqaSX4Pw0Cu/KMPLeo4+jV1swk3IypSfuSEDBnOOiNWhViO
20
+ ZSwlQcYSaGpbuS4Mdd5gneiYxdZqcpPSOCv0DDeeWncLxDJb+VLhzYmR25jffkv5
21
+ MsulcBQqzCLRW198JcDtWPxCl6EL4HJgTa2/ymRrA3bIxOVbnV3sl5f/cR73Gm/Y
22
+ /LausREpxUTNJXQDBr+Y2xJgE5rbLFz4yy4C/X/Ur2BabAO8vnZ8MM4agmcSaGIb
23
+ xd1b03Eb2XrXxEqZOa4UODOehL676yYVpDtXGLXK2Ga7DpIWGXSkY8pYl4vY3VOr
24
+ J9PM55EMjcCy/0FYOJdhAoIBAQDe8kbWocqte48oeHyO+jbfzDgV0iTWkLSSlvtV
25
+ NIZoVSdxQfqSCdxZCA2juXEWQ48isoT5XrIEEJtWccd2nNY+KpNpRJY2vIAgBmv4
26
+ efJHHz2T5Y/E+uXcIz5FHI8BCj9KBGwYKWZXpuXzlLFPqMSACX/CY5ZbH8QT5P4U
27
+ NkAuJVVW89gQZWJXO15pDbElZR/cToMJAFooXkOHTKrbM/MUwQPe4ArVXBqgHUmn
28
+ xrCtfOyoEGDh4zgJQmsZ5uCPE4bWAGu5kZEzDWnYajT6Ep/LCsQoVpL0AVnnXyDQ
29
+ J1XQCpOfRL2cRuvjeOsfplPizUPLh73w/q4D8y/VU2SxXZUxAoIBAQDEfmE+p/64
30
+ Ppre/Oi9VggK2J8ggnRjX9wx+L6tTNGrZxrASdm5tH6Z/ROlWXT8OlkGad1cnD+x
31
+ 27QQKkTA+QkpSgzBMysl01HSmGtFVk5WrQQ8fkwhJVn0ZdN/XXMNyUOt5P+Xsdzd
32
+ YZKfuiPVVp3f8eT5DI4a6Q6KwpCh8yJK3dKvzCLBLuCRilKNlQt76Un6H3omQnmA
33
+ 4EcUZjNOh1lJP05/WxLSMMXQ/BdVE7UNbGnfllvMVH3Zr8E71oG21OLM80DdNOwY
34
+ RqbQyElMirWvuYA2rZeWqg4mhc4x4bQqLOFeXWywU5zqMmCWi5ROcdNUxvLwF0Th
35
+ onBQVFJCPYHfAoIBAEhyEfLMwD9/VxWfkVoklJBEnDT7BF10yDiaNzGIz+Q3R4nW
36
+ FsY9zgxgQY5iRA0oBusPd4ZQ7yfC/bcpYdd5P2UUELK0RtuihT/i1lL3zXKvBCN7
37
+ BSzNGsRd724lyZJc8hPrO/Td/xOceDyepL9t5+xzKcDQ+5rAx8ZvMuD+f/x+xSxs
38
+ MFmjmEEgWZ1phZbRNXkxSgMyyhk0CF1+3EY+q06jKc7SnrKWK1C8M6MBPYgigARc
39
+ zh6Y5yybGJJiI7ZacgY4PMkgND6SrUJVwMFCLAqehP9WoooHpl842kDJh2kDBtVK
40
+ URLnON/B+yVdtwSMDuukQGR/XayK6ZA4eQ/piQECggEAa2PO7hmOw0+kAP8kjGY6
41
+ mwLtZS0nQzCe/ci/HaQAa7c8DZ/PGQmmr657UEFmCHwzL6goTXcv8Jrs/HC9huIU
42
+ ubY45lZ63H90Fq8q4Yhb5E9HI3C7Vto9Ia+NOezu9rfq/11Ku7N/zJaJNjbbYrum
43
+ KUDhLaRI/jgltHzF410oftZhUac1z3M5VRHOMIcm8Z/8yHDvp31pPqBU+Lcqj161
44
+ 06x/0GcMEEiLtL4yWlMc/qsj6gkZPsFmztSZvYRs/Gm5Ut4Xs047QsFKZo0wUl71
45
+ EYdGpZuWX8etWCyFFwoOF4bT3Wkd//iSqATEeULr2Tuojor1N3bgNJk83QpYss8+
46
+ 7QKCAQEAk4V3SJ9qoxFwHRPlLzzE7IR2zLsOFeyp3aj87O7YYsNqtsxBRSeT/ha3
47
+ CTaK10qfQroreE0FdUGw9zSdIeUTon/W+Vk56wDLY8KNjLf66oDXJ4FbVo3uKW/c
48
+ zvjynbeIvofI3NnOq6r0CyDNdQKBNc8ARDmbOAYMXowyid7Q+xTiJ1r7cZF3AXfX
49
+ pGRU3zalzsFeTrlsZmLgG/CPMm7OHkC5c9dvbWQ8jgW08mNuvjVbsMayZkU8PnF5
50
+ XTpGjmThiS+WA/UUjUBAwQtRfeLBoLu1Kf/oNv5I91it8XeJeGU5JTNGalaK2etE
51
+ uMAJFAIPeZ9MmXzkC4MrNGCd5E6vLw==
52
52
  -----END PRIVATE KEY-----
@@ -226,22 +226,7 @@ describe LogStash::Inputs::Http do
226
226
  event = logstash_queue.pop
227
227
  expect(event.get("message")).to eq("Hello")
228
228
  end
229
-
230
- end
231
-
232
- context 'enforced TLSv1.3 (deprecated options)' do
233
-
234
- let(:config) { super().merge 'tls_min_version' => 1.3,
235
- 'cipher_suites' => [ 'TLS_AES_128_GCM_SHA256' ] }
236
-
237
- it "should parse the json body" do
238
- expect(response.code).to eq(200)
239
- event = logstash_queue.pop
240
- expect(event.get("message")).to eq("Hello")
241
- end
242
-
243
229
  end
244
-
245
230
  end if TLS13_ENABLED_BY_DEFAULT
246
231
 
247
232
  end
@@ -561,16 +546,6 @@ describe LogStash::Inputs::Http do
561
546
  subject.run(nil)
562
547
  end
563
548
  end
564
-
565
- context "and `ssl_` settings provided" do
566
- let(:ssc) { SelfSignedCertificate.new }
567
- let(:config) { { "port" => 0, "ssl_enabled" => false, "ssl_certificate" => ssc.certificate.path, "ssl_client_authentication" => "none", "cipher_suites" => ["TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"] } }
568
-
569
- it "should warn about not using the configs" do
570
- expect(subject.logger).to receive(:warn).with(/^Configured SSL settings are not used when `ssl_enabled` is set to `false`: \[("ssl_certificate"(,\s)?|"ssl_client_authentication"(,\s)?|"cipher_suites"(,\s)?)*\]$/)
571
- subject.register
572
- end
573
- end
574
549
  end
575
550
 
576
551
  context "with :ssl_enabled => true" do
@@ -628,31 +603,7 @@ describe LogStash::Inputs::Http do
628
603
  expect { subject.register }.to_not raise_exception
629
604
  end
630
605
  end
631
- ["ssl_verify_mode", "verify_mode"].each do |config_name|
632
- ["peer", "force_peer"].each do |verify_mode|
633
- context "with deprecated #{config_name} = #{verify_mode}" do
634
- subject { LogStash::Inputs::Http.new("port" => port,
635
- "ssl_enabled" => true,
636
- "ssl_certificate" => ssl_certificate.path,
637
- "ssl_certificate_authorities" => ssl_certificate.path,
638
- "ssl_key" => ssl_key.path,
639
- config_name => verify_mode
640
- ) }
641
- it "should not raise exception" do
642
- expect { subject.register }.to_not raise_exception
643
- end
644
- end
645
- end
646
- end
647
- ["ssl_verify_mode", "verify_mode"].each do |config_name|
648
- context "with deprecated #{config_name} = none" do
649
- subject { LogStash::Inputs::Http.new(config.merge(config_name => "none")) }
650
606
 
651
- it "should not raise exception" do
652
- expect { subject.register }.to_not raise_exception
653
- end
654
- end
655
- end
656
607
  context "with invalid ssl certificate" do
657
608
  before do
658
609
  cert = File.readlines path = config["ssl_certificate"]
@@ -700,76 +651,6 @@ describe LogStash::Inputs::Http do
700
651
  end
701
652
  end
702
653
 
703
- context "with both verify_mode and ssl_verify_mode options set" do
704
- let(:config) do
705
- super().merge('verify_mode' => 'none', 'ssl_verify_mode' => 'none')
706
- end
707
-
708
- it "should raise a configuration error" do
709
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_verify_mode`.?/i
710
- end
711
- end
712
-
713
- context "with both ssl_client_authentication and ssl_verify_mode options set" do
714
- let(:config) do
715
- super().merge('ssl_client_authentication' => 'optional', 'ssl_verify_mode' => 'none')
716
- end
717
-
718
- it "should raise a configuration error" do
719
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_client_authentication.?/i
720
- end
721
- end
722
-
723
- context "with both ssl_client_authentication and verify_mode options set" do
724
- let(:config) do
725
- super().merge('ssl_client_authentication' => 'optional', 'verify_mode' => 'none')
726
- end
727
-
728
- it "should raise a configuration error" do
729
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_client_authentication.?/i
730
- end
731
- end
732
-
733
- context "with ssl_cipher_suites and cipher_suites set" do
734
- let(:config) do
735
- super().merge('ssl_cipher_suites' => ['TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384'],
736
- 'cipher_suites' => ['TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384'])
737
- end
738
-
739
- it "should raise a configuration error" do
740
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_cipher_suites.?/i
741
- end
742
- end
743
-
744
- context "with ssl_supported_protocols and tls_min_version set" do
745
- let(:config) do
746
- super().merge('ssl_supported_protocols' => ['TLSv1.2'], 'tls_min_version' => 1.0)
747
- end
748
-
749
- it "should raise a configuration error" do
750
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_supported_protocols.?/i
751
- end
752
- end
753
-
754
- context "with ssl_supported_protocols and tls_max_version set" do
755
- let(:config) do
756
- super().merge('ssl_supported_protocols' => ['TLSv1.2'], 'tls_max_version' => 1.2)
757
- end
758
-
759
- it "should raise a configuration error" do
760
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_supported_protocols.?/i
761
- end
762
- end
763
-
764
- context "with both ssl and ssl_enabled set" do
765
- let(:config) do
766
- super().merge('ssl' => true, 'ssl_enabled' => true )
767
- end
768
-
769
- it "should raise a configuration error" do
770
- expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_enabled.?/i
771
- end
772
- end
773
654
 
774
655
  context "and with :ssl_keystore_path" do
775
656
  let(:config) do
@@ -782,41 +663,6 @@ describe LogStash::Inputs::Http do
782
663
  end
783
664
 
784
665
  context "with ssl_client_authentication" do
785
- context "normalized from ssl_verify_mode 'none'" do
786
- let(:config) { super().merge("ssl_verify_mode" => "none") }
787
-
788
- it "should transform the value to 'none'" do
789
- subject.register
790
- expect(subject.params).to match hash_including("ssl_client_authentication" => "none")
791
- expect(subject.instance_variable_get(:@ssl_client_authentication)).to eql("none")
792
- end
793
-
794
- context "and ssl_certificate_authorities is set" do
795
- let(:config) { super().merge("ssl_certificate_authorities" => [certificate_path( 'root.crt')]) }
796
- it "raise a configuration error" do
797
- expect { subject.register }.to raise_error(LogStash::ConfigurationError, "The configuration of `ssl_certificate_authorities` requires setting `ssl_verify_mode` to `peer` or 'force_peer'")
798
- end
799
- end
800
- end
801
-
802
- [%w[peer optional], %w[force_peer required]].each do |ssl_verify_mode, ssl_client_authentication|
803
- context "normalized from ssl_verify_mode '#{ssl_verify_mode}'" do
804
- let(:config) { super().merge("ssl_verify_mode" => ssl_verify_mode, "ssl_certificate_authorities" => [certificate_path( 'root.crt')]) }
805
-
806
- it "should transform the value to '#{ssl_client_authentication}'" do
807
- subject.register
808
- expect(subject.params).to match hash_including("ssl_client_authentication" => ssl_client_authentication)
809
- expect(subject.instance_variable_get(:@ssl_client_authentication)).to eql(ssl_client_authentication)
810
- end
811
-
812
- context "with no ssl_certificate_authorities set " do
813
- let(:config) { super().reject { |key| "ssl_certificate_authorities".eql?(key) } }
814
- it "raise a configuration error" do
815
- expect {subject.register}.to raise_error(LogStash::ConfigurationError, "Using `ssl_verify_mode` set to `peer` or `force_peer`, requires the configuration of `ssl_certificate_authorities` or `ssl_truststore_path`")
816
- end
817
- end
818
- end
819
- end
820
666
 
821
667
  context "configured to 'none'" do
822
668
  let(:config) { super().merge("ssl_client_authentication" => "none") }
@@ -953,7 +799,26 @@ describe LogStash::Inputs::Http do
953
799
  end
954
800
  end
955
801
  end
802
+ end
956
803
 
804
+ describe 'handling obsolete settings' do
805
+ [{:name => 'tls_min_version', :replacement => 'ssl_supported_protocols', :sample_value => 1.3},
806
+ {:name => 'tls_max_version', :replacement => 'ssl_supported_protocols', :sample_value => 1.3},
807
+ {:name => 'cipher_suites', :replacement => 'ssl_cipher_suites', :sample_value => ['TLS_AES_128_GCM_SHA256']},
808
+ {:name => 'ssl', :replacement => 'ssl_enabled', :sample_value => true},
809
+ {:name => 'keystore', :replacement => 'ssl_keystore_path', :sample_value => certificate_path( 'server_from_root.p12')},
810
+ {:name => 'keystore_password', :replacement => 'ssl_keystore_password', :sample_value => 'none'},
811
+ {:name => 'ssl_verify_mode', :replacement => 'ssl_client_authentication', :sample_value => 'peer'},
812
+ {:name => 'verify_mode', :replacement => 'ssl_client_authentication', :sample_value => 'peer'}].each do | obsolete_setting|
813
+ context "with obsolete #{obsolete_setting[:name]}" do
814
+ let (:deprecated_config) do
815
+ config.merge({obsolete_setting[:name] => obsolete_setting[:sample_value]})
816
+ end
817
+ it "should raise a config error with the appropriate message" do
818
+ expect { LogStash::Inputs::Http.new(deprecated_config).register }.to raise_error LogStash::ConfigurationError, /The setting `#{obsolete_setting[:name]}` in plugin `http` is obsolete and is no longer available. Set '#{obsolete_setting[:replacement]}' instead/i
819
+ end
820
+ end
821
+ end
957
822
  end
958
823
  end
959
824
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: logstash-input-http
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.9.2
4
+ version: 4.0.0
5
5
  platform: java
6
6
  authors:
7
7
  - Elastic
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-11-18 00:00:00.000000000 Z
11
+ date: 2024-12-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  requirement: !ruby/object:Gem::Requirement
@@ -44,26 +44,6 @@ dependencies:
44
44
  - - ">="
45
45
  - !ruby/object:Gem::Version
46
46
  version: '0'
47
- - !ruby/object:Gem::Dependency
48
- requirement: !ruby/object:Gem::Requirement
49
- requirements:
50
- - - "~>"
51
- - !ruby/object:Gem::Version
52
- version: '0.3'
53
- - - ">="
54
- - !ruby/object:Gem::Version
55
- version: 0.3.4
56
- name: jar-dependencies
57
- type: :runtime
58
- prerelease: false
59
- version_requirements: !ruby/object:Gem::Requirement
60
- requirements:
61
- - - "~>"
62
- - !ruby/object:Gem::Version
63
- version: '0.3'
64
- - - ">="
65
- - !ruby/object:Gem::Version
66
- version: 0.3.4
67
47
  - !ruby/object:Gem::Dependency
68
48
  requirement: !ruby/object:Gem::Requirement
69
49
  requirements:
@@ -196,7 +176,7 @@ files:
196
176
  - vendor/jar-dependencies/io/netty/netty-handler/4.1.115.Final/netty-handler-4.1.115.Final.jar
197
177
  - vendor/jar-dependencies/io/netty/netty-transport-native-unix-common/4.1.115.Final/netty-transport-native-unix-common-4.1.115.Final.jar
198
178
  - vendor/jar-dependencies/io/netty/netty-transport/4.1.115.Final/netty-transport-4.1.115.Final.jar
199
- - vendor/jar-dependencies/org/logstash/plugins/input/http/logstash-input-http/3.9.2/logstash-input-http-3.9.2.jar
179
+ - vendor/jar-dependencies/org/logstash/plugins/input/http/logstash-input-http/4.0.0/logstash-input-http-4.0.0.jar
200
180
  homepage: http://www.elastic.co/guide/en/logstash/current/index.html
201
181
  licenses:
202
182
  - Apache License (2.0)