logstash-input-http 3.9.2-java → 4.0.0-java
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +13 -0
- data/VERSION +1 -1
- data/docs/index.asciidoc +20 -82
- data/lib/logstash/inputs/http.rb +9 -82
- data/lib/logstash-input-http_jars.rb +1 -1
- data/logstash-input-http.gemspec +0 -1
- data/spec/fixtures/certs/generate.sh +3 -0
- data/spec/fixtures/certs/generated/client_from_root.crt +28 -28
- data/spec/fixtures/certs/generated/client_from_root.jks +0 -0
- data/spec/fixtures/certs/generated/client_from_root.key +52 -51
- data/spec/fixtures/certs/generated/client_from_root.key.pkcs8 +50 -50
- data/spec/fixtures/certs/generated/client_from_root.p12 +0 -0
- data/spec/fixtures/certs/generated/root.crt +28 -28
- data/spec/fixtures/certs/generated/root.key +52 -51
- data/spec/fixtures/certs/generated/root.key.pkcs8 +50 -50
- data/spec/fixtures/certs/generated/server_from_root.crt +29 -29
- data/spec/fixtures/certs/generated/server_from_root.key +52 -51
- data/spec/fixtures/certs/generated/server_from_root.key.pkcs8 +50 -50
- data/spec/fixtures/certs/generated/server_from_root.p12 +0 -0
- data/spec/fixtures/certs/generated/truststore.jks +0 -0
- data/spec/inputs/http_spec.rb +19 -154
- data/vendor/jar-dependencies/org/logstash/plugins/input/http/logstash-input-http/{3.9.2/logstash-input-http-3.9.2.jar → 4.0.0/logstash-input-http-4.0.0.jar} +0 -0
- metadata +3 -23
@@ -1,52 +1,52 @@
|
|
1
1
|
-----BEGIN PRIVATE KEY-----
|
2
|
-
|
3
|
-
|
4
|
-
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
+
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
|
15
|
-
|
16
|
-
|
17
|
-
/
|
18
|
-
|
19
|
-
/
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
35
|
-
|
36
|
-
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
43
|
-
|
44
|
-
|
45
|
-
|
46
|
-
|
47
|
-
/
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
2
|
+
MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQCrH44rj1Uq6ew0
|
3
|
+
YtX8oBOqhsAihGG0N1RnndFrTcQFeptkm8CebbRP4/Wi/4WeGW5UfRfiAfB6uQpB
|
4
|
+
qWVCNrCu5eTSucfcqkWAXbnU3akJAf2LeVJwHGTXybbDXyIEZcWy7hjnZRkC7hXU
|
5
|
+
RYZClCH9RHEAVjg8in+L264cOdvpF7vTkq1fz3YUyp3HdpsSrD4blnyIvg+MaX9v
|
6
|
+
c8/Vtp2Mm6Av1smMvMKnVYbmIHqXYo1MxznnFp2yAbSwLrQmGY7BrAUNzzOtq8tT
|
7
|
+
bedYd5ZiZ8ZI4TkPy4f4+cGmpxr4mRCi9UbyCgq+cl2JcE6ZgBlZQqMz70VQT9eS
|
8
|
+
bZB2FEE6+++s9WyLBdJCJnme1alVPAR4H/zsPaGmP8mIO81F5lQ4gOR4V9pHSw5p
|
9
|
+
vNhgdxbL0P16Mlhtgi+7KvaX3OwID+y/86pnR0ZgnQO329z/QSbvyyUG1opeS8ix
|
10
|
+
XDJGAYL7xULy7AbWHRuK+jpn4Tg0B5B7OOfUMK/caHIQI6oVnenGlv31BoAtKUVW
|
11
|
+
qdD0fJ/HlM/hSF0BpWMEoaIU29JnP6ma3LlZ7fSCXtUEZbq9O93Nqbflm5iBzQ/L
|
12
|
+
nf82hCg/YLEQku/IczncwkSiMCsONogGB1Yb+eUJ3LOE8we0wev887HYC8Axm4Mb
|
13
|
+
v0aaeA6skKLDSyD4+j+Sz6OL11+mrwIDAQABAoICAA0YOhHdQwAorFmJ4qQVP8wB
|
14
|
+
ybwaczuOLFhNfFQAvGpK6o81V/UHog+m+woBEaF6grXWaLhzu4o4lK9XnhcGBlkr
|
15
|
+
4Gm7q66YHP9orKq8V44H5/X/T66ijZjxp5mlsv2xKAK8M42pb9OIkoUO2OpJWZx+
|
16
|
+
20LSVjVTx9TU96rTRp+8oDPdeoTlZDzNEGvOCKnSImKMDnWMTbZJ8GV/8DyDX+T9
|
17
|
+
l7FxdzTc0OxrIAqGG7tv4C4q5KRpV6HifYgp2sE7nW/2kOBwpZy5k7KLq3Nam1hm
|
18
|
+
Zob3LR2nTn1f51CwYuD5HYvKxyYIXLAcIko9HNakNcxdzA1SVvSBV5at6asPe7o+
|
19
|
+
qmGeISq97HoUDYe1meqaSX4Pw0Cu/KMPLeo4+jV1swk3IypSfuSEDBnOOiNWhViO
|
20
|
+
ZSwlQcYSaGpbuS4Mdd5gneiYxdZqcpPSOCv0DDeeWncLxDJb+VLhzYmR25jffkv5
|
21
|
+
MsulcBQqzCLRW198JcDtWPxCl6EL4HJgTa2/ymRrA3bIxOVbnV3sl5f/cR73Gm/Y
|
22
|
+
/LausREpxUTNJXQDBr+Y2xJgE5rbLFz4yy4C/X/Ur2BabAO8vnZ8MM4agmcSaGIb
|
23
|
+
xd1b03Eb2XrXxEqZOa4UODOehL676yYVpDtXGLXK2Ga7DpIWGXSkY8pYl4vY3VOr
|
24
|
+
J9PM55EMjcCy/0FYOJdhAoIBAQDe8kbWocqte48oeHyO+jbfzDgV0iTWkLSSlvtV
|
25
|
+
NIZoVSdxQfqSCdxZCA2juXEWQ48isoT5XrIEEJtWccd2nNY+KpNpRJY2vIAgBmv4
|
26
|
+
efJHHz2T5Y/E+uXcIz5FHI8BCj9KBGwYKWZXpuXzlLFPqMSACX/CY5ZbH8QT5P4U
|
27
|
+
NkAuJVVW89gQZWJXO15pDbElZR/cToMJAFooXkOHTKrbM/MUwQPe4ArVXBqgHUmn
|
28
|
+
xrCtfOyoEGDh4zgJQmsZ5uCPE4bWAGu5kZEzDWnYajT6Ep/LCsQoVpL0AVnnXyDQ
|
29
|
+
J1XQCpOfRL2cRuvjeOsfplPizUPLh73w/q4D8y/VU2SxXZUxAoIBAQDEfmE+p/64
|
30
|
+
Ppre/Oi9VggK2J8ggnRjX9wx+L6tTNGrZxrASdm5tH6Z/ROlWXT8OlkGad1cnD+x
|
31
|
+
27QQKkTA+QkpSgzBMysl01HSmGtFVk5WrQQ8fkwhJVn0ZdN/XXMNyUOt5P+Xsdzd
|
32
|
+
YZKfuiPVVp3f8eT5DI4a6Q6KwpCh8yJK3dKvzCLBLuCRilKNlQt76Un6H3omQnmA
|
33
|
+
4EcUZjNOh1lJP05/WxLSMMXQ/BdVE7UNbGnfllvMVH3Zr8E71oG21OLM80DdNOwY
|
34
|
+
RqbQyElMirWvuYA2rZeWqg4mhc4x4bQqLOFeXWywU5zqMmCWi5ROcdNUxvLwF0Th
|
35
|
+
onBQVFJCPYHfAoIBAEhyEfLMwD9/VxWfkVoklJBEnDT7BF10yDiaNzGIz+Q3R4nW
|
36
|
+
FsY9zgxgQY5iRA0oBusPd4ZQ7yfC/bcpYdd5P2UUELK0RtuihT/i1lL3zXKvBCN7
|
37
|
+
BSzNGsRd724lyZJc8hPrO/Td/xOceDyepL9t5+xzKcDQ+5rAx8ZvMuD+f/x+xSxs
|
38
|
+
MFmjmEEgWZ1phZbRNXkxSgMyyhk0CF1+3EY+q06jKc7SnrKWK1C8M6MBPYgigARc
|
39
|
+
zh6Y5yybGJJiI7ZacgY4PMkgND6SrUJVwMFCLAqehP9WoooHpl842kDJh2kDBtVK
|
40
|
+
URLnON/B+yVdtwSMDuukQGR/XayK6ZA4eQ/piQECggEAa2PO7hmOw0+kAP8kjGY6
|
41
|
+
mwLtZS0nQzCe/ci/HaQAa7c8DZ/PGQmmr657UEFmCHwzL6goTXcv8Jrs/HC9huIU
|
42
|
+
ubY45lZ63H90Fq8q4Yhb5E9HI3C7Vto9Ia+NOezu9rfq/11Ku7N/zJaJNjbbYrum
|
43
|
+
KUDhLaRI/jgltHzF410oftZhUac1z3M5VRHOMIcm8Z/8yHDvp31pPqBU+Lcqj161
|
44
|
+
06x/0GcMEEiLtL4yWlMc/qsj6gkZPsFmztSZvYRs/Gm5Ut4Xs047QsFKZo0wUl71
|
45
|
+
EYdGpZuWX8etWCyFFwoOF4bT3Wkd//iSqATEeULr2Tuojor1N3bgNJk83QpYss8+
|
46
|
+
7QKCAQEAk4V3SJ9qoxFwHRPlLzzE7IR2zLsOFeyp3aj87O7YYsNqtsxBRSeT/ha3
|
47
|
+
CTaK10qfQroreE0FdUGw9zSdIeUTon/W+Vk56wDLY8KNjLf66oDXJ4FbVo3uKW/c
|
48
|
+
zvjynbeIvofI3NnOq6r0CyDNdQKBNc8ARDmbOAYMXowyid7Q+xTiJ1r7cZF3AXfX
|
49
|
+
pGRU3zalzsFeTrlsZmLgG/CPMm7OHkC5c9dvbWQ8jgW08mNuvjVbsMayZkU8PnF5
|
50
|
+
XTpGjmThiS+WA/UUjUBAwQtRfeLBoLu1Kf/oNv5I91it8XeJeGU5JTNGalaK2etE
|
51
|
+
uMAJFAIPeZ9MmXzkC4MrNGCd5E6vLw==
|
52
52
|
-----END PRIVATE KEY-----
|
Binary file
|
Binary file
|
data/spec/inputs/http_spec.rb
CHANGED
@@ -226,22 +226,7 @@ describe LogStash::Inputs::Http do
|
|
226
226
|
event = logstash_queue.pop
|
227
227
|
expect(event.get("message")).to eq("Hello")
|
228
228
|
end
|
229
|
-
|
230
|
-
end
|
231
|
-
|
232
|
-
context 'enforced TLSv1.3 (deprecated options)' do
|
233
|
-
|
234
|
-
let(:config) { super().merge 'tls_min_version' => 1.3,
|
235
|
-
'cipher_suites' => [ 'TLS_AES_128_GCM_SHA256' ] }
|
236
|
-
|
237
|
-
it "should parse the json body" do
|
238
|
-
expect(response.code).to eq(200)
|
239
|
-
event = logstash_queue.pop
|
240
|
-
expect(event.get("message")).to eq("Hello")
|
241
|
-
end
|
242
|
-
|
243
229
|
end
|
244
|
-
|
245
230
|
end if TLS13_ENABLED_BY_DEFAULT
|
246
231
|
|
247
232
|
end
|
@@ -561,16 +546,6 @@ describe LogStash::Inputs::Http do
|
|
561
546
|
subject.run(nil)
|
562
547
|
end
|
563
548
|
end
|
564
|
-
|
565
|
-
context "and `ssl_` settings provided" do
|
566
|
-
let(:ssc) { SelfSignedCertificate.new }
|
567
|
-
let(:config) { { "port" => 0, "ssl_enabled" => false, "ssl_certificate" => ssc.certificate.path, "ssl_client_authentication" => "none", "cipher_suites" => ["TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"] } }
|
568
|
-
|
569
|
-
it "should warn about not using the configs" do
|
570
|
-
expect(subject.logger).to receive(:warn).with(/^Configured SSL settings are not used when `ssl_enabled` is set to `false`: \[("ssl_certificate"(,\s)?|"ssl_client_authentication"(,\s)?|"cipher_suites"(,\s)?)*\]$/)
|
571
|
-
subject.register
|
572
|
-
end
|
573
|
-
end
|
574
549
|
end
|
575
550
|
|
576
551
|
context "with :ssl_enabled => true" do
|
@@ -628,31 +603,7 @@ describe LogStash::Inputs::Http do
|
|
628
603
|
expect { subject.register }.to_not raise_exception
|
629
604
|
end
|
630
605
|
end
|
631
|
-
["ssl_verify_mode", "verify_mode"].each do |config_name|
|
632
|
-
["peer", "force_peer"].each do |verify_mode|
|
633
|
-
context "with deprecated #{config_name} = #{verify_mode}" do
|
634
|
-
subject { LogStash::Inputs::Http.new("port" => port,
|
635
|
-
"ssl_enabled" => true,
|
636
|
-
"ssl_certificate" => ssl_certificate.path,
|
637
|
-
"ssl_certificate_authorities" => ssl_certificate.path,
|
638
|
-
"ssl_key" => ssl_key.path,
|
639
|
-
config_name => verify_mode
|
640
|
-
) }
|
641
|
-
it "should not raise exception" do
|
642
|
-
expect { subject.register }.to_not raise_exception
|
643
|
-
end
|
644
|
-
end
|
645
|
-
end
|
646
|
-
end
|
647
|
-
["ssl_verify_mode", "verify_mode"].each do |config_name|
|
648
|
-
context "with deprecated #{config_name} = none" do
|
649
|
-
subject { LogStash::Inputs::Http.new(config.merge(config_name => "none")) }
|
650
606
|
|
651
|
-
it "should not raise exception" do
|
652
|
-
expect { subject.register }.to_not raise_exception
|
653
|
-
end
|
654
|
-
end
|
655
|
-
end
|
656
607
|
context "with invalid ssl certificate" do
|
657
608
|
before do
|
658
609
|
cert = File.readlines path = config["ssl_certificate"]
|
@@ -700,76 +651,6 @@ describe LogStash::Inputs::Http do
|
|
700
651
|
end
|
701
652
|
end
|
702
653
|
|
703
|
-
context "with both verify_mode and ssl_verify_mode options set" do
|
704
|
-
let(:config) do
|
705
|
-
super().merge('verify_mode' => 'none', 'ssl_verify_mode' => 'none')
|
706
|
-
end
|
707
|
-
|
708
|
-
it "should raise a configuration error" do
|
709
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_verify_mode`.?/i
|
710
|
-
end
|
711
|
-
end
|
712
|
-
|
713
|
-
context "with both ssl_client_authentication and ssl_verify_mode options set" do
|
714
|
-
let(:config) do
|
715
|
-
super().merge('ssl_client_authentication' => 'optional', 'ssl_verify_mode' => 'none')
|
716
|
-
end
|
717
|
-
|
718
|
-
it "should raise a configuration error" do
|
719
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_client_authentication.?/i
|
720
|
-
end
|
721
|
-
end
|
722
|
-
|
723
|
-
context "with both ssl_client_authentication and verify_mode options set" do
|
724
|
-
let(:config) do
|
725
|
-
super().merge('ssl_client_authentication' => 'optional', 'verify_mode' => 'none')
|
726
|
-
end
|
727
|
-
|
728
|
-
it "should raise a configuration error" do
|
729
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_client_authentication.?/i
|
730
|
-
end
|
731
|
-
end
|
732
|
-
|
733
|
-
context "with ssl_cipher_suites and cipher_suites set" do
|
734
|
-
let(:config) do
|
735
|
-
super().merge('ssl_cipher_suites' => ['TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384'],
|
736
|
-
'cipher_suites' => ['TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384'])
|
737
|
-
end
|
738
|
-
|
739
|
-
it "should raise a configuration error" do
|
740
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_cipher_suites.?/i
|
741
|
-
end
|
742
|
-
end
|
743
|
-
|
744
|
-
context "with ssl_supported_protocols and tls_min_version set" do
|
745
|
-
let(:config) do
|
746
|
-
super().merge('ssl_supported_protocols' => ['TLSv1.2'], 'tls_min_version' => 1.0)
|
747
|
-
end
|
748
|
-
|
749
|
-
it "should raise a configuration error" do
|
750
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_supported_protocols.?/i
|
751
|
-
end
|
752
|
-
end
|
753
|
-
|
754
|
-
context "with ssl_supported_protocols and tls_max_version set" do
|
755
|
-
let(:config) do
|
756
|
-
super().merge('ssl_supported_protocols' => ['TLSv1.2'], 'tls_max_version' => 1.2)
|
757
|
-
end
|
758
|
-
|
759
|
-
it "should raise a configuration error" do
|
760
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_supported_protocols.?/i
|
761
|
-
end
|
762
|
-
end
|
763
|
-
|
764
|
-
context "with both ssl and ssl_enabled set" do
|
765
|
-
let(:config) do
|
766
|
-
super().merge('ssl' => true, 'ssl_enabled' => true )
|
767
|
-
end
|
768
|
-
|
769
|
-
it "should raise a configuration error" do
|
770
|
-
expect { subject.register }.to raise_error LogStash::ConfigurationError, /Use only .?ssl_enabled.?/i
|
771
|
-
end
|
772
|
-
end
|
773
654
|
|
774
655
|
context "and with :ssl_keystore_path" do
|
775
656
|
let(:config) do
|
@@ -782,41 +663,6 @@ describe LogStash::Inputs::Http do
|
|
782
663
|
end
|
783
664
|
|
784
665
|
context "with ssl_client_authentication" do
|
785
|
-
context "normalized from ssl_verify_mode 'none'" do
|
786
|
-
let(:config) { super().merge("ssl_verify_mode" => "none") }
|
787
|
-
|
788
|
-
it "should transform the value to 'none'" do
|
789
|
-
subject.register
|
790
|
-
expect(subject.params).to match hash_including("ssl_client_authentication" => "none")
|
791
|
-
expect(subject.instance_variable_get(:@ssl_client_authentication)).to eql("none")
|
792
|
-
end
|
793
|
-
|
794
|
-
context "and ssl_certificate_authorities is set" do
|
795
|
-
let(:config) { super().merge("ssl_certificate_authorities" => [certificate_path( 'root.crt')]) }
|
796
|
-
it "raise a configuration error" do
|
797
|
-
expect { subject.register }.to raise_error(LogStash::ConfigurationError, "The configuration of `ssl_certificate_authorities` requires setting `ssl_verify_mode` to `peer` or 'force_peer'")
|
798
|
-
end
|
799
|
-
end
|
800
|
-
end
|
801
|
-
|
802
|
-
[%w[peer optional], %w[force_peer required]].each do |ssl_verify_mode, ssl_client_authentication|
|
803
|
-
context "normalized from ssl_verify_mode '#{ssl_verify_mode}'" do
|
804
|
-
let(:config) { super().merge("ssl_verify_mode" => ssl_verify_mode, "ssl_certificate_authorities" => [certificate_path( 'root.crt')]) }
|
805
|
-
|
806
|
-
it "should transform the value to '#{ssl_client_authentication}'" do
|
807
|
-
subject.register
|
808
|
-
expect(subject.params).to match hash_including("ssl_client_authentication" => ssl_client_authentication)
|
809
|
-
expect(subject.instance_variable_get(:@ssl_client_authentication)).to eql(ssl_client_authentication)
|
810
|
-
end
|
811
|
-
|
812
|
-
context "with no ssl_certificate_authorities set " do
|
813
|
-
let(:config) { super().reject { |key| "ssl_certificate_authorities".eql?(key) } }
|
814
|
-
it "raise a configuration error" do
|
815
|
-
expect {subject.register}.to raise_error(LogStash::ConfigurationError, "Using `ssl_verify_mode` set to `peer` or `force_peer`, requires the configuration of `ssl_certificate_authorities` or `ssl_truststore_path`")
|
816
|
-
end
|
817
|
-
end
|
818
|
-
end
|
819
|
-
end
|
820
666
|
|
821
667
|
context "configured to 'none'" do
|
822
668
|
let(:config) { super().merge("ssl_client_authentication" => "none") }
|
@@ -953,7 +799,26 @@ describe LogStash::Inputs::Http do
|
|
953
799
|
end
|
954
800
|
end
|
955
801
|
end
|
802
|
+
end
|
956
803
|
|
804
|
+
describe 'handling obsolete settings' do
|
805
|
+
[{:name => 'tls_min_version', :replacement => 'ssl_supported_protocols', :sample_value => 1.3},
|
806
|
+
{:name => 'tls_max_version', :replacement => 'ssl_supported_protocols', :sample_value => 1.3},
|
807
|
+
{:name => 'cipher_suites', :replacement => 'ssl_cipher_suites', :sample_value => ['TLS_AES_128_GCM_SHA256']},
|
808
|
+
{:name => 'ssl', :replacement => 'ssl_enabled', :sample_value => true},
|
809
|
+
{:name => 'keystore', :replacement => 'ssl_keystore_path', :sample_value => certificate_path( 'server_from_root.p12')},
|
810
|
+
{:name => 'keystore_password', :replacement => 'ssl_keystore_password', :sample_value => 'none'},
|
811
|
+
{:name => 'ssl_verify_mode', :replacement => 'ssl_client_authentication', :sample_value => 'peer'},
|
812
|
+
{:name => 'verify_mode', :replacement => 'ssl_client_authentication', :sample_value => 'peer'}].each do | obsolete_setting|
|
813
|
+
context "with obsolete #{obsolete_setting[:name]}" do
|
814
|
+
let (:deprecated_config) do
|
815
|
+
config.merge({obsolete_setting[:name] => obsolete_setting[:sample_value]})
|
816
|
+
end
|
817
|
+
it "should raise a config error with the appropriate message" do
|
818
|
+
expect { LogStash::Inputs::Http.new(deprecated_config).register }.to raise_error LogStash::ConfigurationError, /The setting `#{obsolete_setting[:name]}` in plugin `http` is obsolete and is no longer available. Set '#{obsolete_setting[:replacement]}' instead/i
|
819
|
+
end
|
820
|
+
end
|
821
|
+
end
|
957
822
|
end
|
958
823
|
end
|
959
824
|
|
Binary file
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: logstash-input-http
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version:
|
4
|
+
version: 4.0.0
|
5
5
|
platform: java
|
6
6
|
authors:
|
7
7
|
- Elastic
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-12-18 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
requirement: !ruby/object:Gem::Requirement
|
@@ -44,26 +44,6 @@ dependencies:
|
|
44
44
|
- - ">="
|
45
45
|
- !ruby/object:Gem::Version
|
46
46
|
version: '0'
|
47
|
-
- !ruby/object:Gem::Dependency
|
48
|
-
requirement: !ruby/object:Gem::Requirement
|
49
|
-
requirements:
|
50
|
-
- - "~>"
|
51
|
-
- !ruby/object:Gem::Version
|
52
|
-
version: '0.3'
|
53
|
-
- - ">="
|
54
|
-
- !ruby/object:Gem::Version
|
55
|
-
version: 0.3.4
|
56
|
-
name: jar-dependencies
|
57
|
-
type: :runtime
|
58
|
-
prerelease: false
|
59
|
-
version_requirements: !ruby/object:Gem::Requirement
|
60
|
-
requirements:
|
61
|
-
- - "~>"
|
62
|
-
- !ruby/object:Gem::Version
|
63
|
-
version: '0.3'
|
64
|
-
- - ">="
|
65
|
-
- !ruby/object:Gem::Version
|
66
|
-
version: 0.3.4
|
67
47
|
- !ruby/object:Gem::Dependency
|
68
48
|
requirement: !ruby/object:Gem::Requirement
|
69
49
|
requirements:
|
@@ -196,7 +176,7 @@ files:
|
|
196
176
|
- vendor/jar-dependencies/io/netty/netty-handler/4.1.115.Final/netty-handler-4.1.115.Final.jar
|
197
177
|
- vendor/jar-dependencies/io/netty/netty-transport-native-unix-common/4.1.115.Final/netty-transport-native-unix-common-4.1.115.Final.jar
|
198
178
|
- vendor/jar-dependencies/io/netty/netty-transport/4.1.115.Final/netty-transport-4.1.115.Final.jar
|
199
|
-
- vendor/jar-dependencies/org/logstash/plugins/input/http/logstash-input-http/
|
179
|
+
- vendor/jar-dependencies/org/logstash/plugins/input/http/logstash-input-http/4.0.0/logstash-input-http-4.0.0.jar
|
200
180
|
homepage: http://www.elastic.co/guide/en/logstash/current/index.html
|
201
181
|
licenses:
|
202
182
|
- Apache License (2.0)
|