logstash-integration-logstash 0.0.1-java
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/CHANGELOG.md +4 -0
- data/Gemfile +11 -0
- data/LICENSE +202 -0
- data/NOTICE.TXT +2 -0
- data/README.md +98 -0
- data/VERSION +1 -0
- data/docs/index.asciidoc +71 -0
- data/docs/input-logstash.asciidoc +252 -0
- data/docs/output-logstash.asciidoc +271 -0
- data/lib/logstash/inputs/logstash.rb +185 -0
- data/lib/logstash/outputs/logstash.rb +162 -0
- data/logstash-integration-logstash.gemspec +36 -0
- data/spec/fixtures/certs/generate.sh +69 -0
- data/spec/fixtures/certs/generated/README.txt +2 -0
- data/spec/fixtures/certs/generated/client_from_root.jks +0 -0
- data/spec/fixtures/certs/generated/client_from_root.key.pem +52 -0
- data/spec/fixtures/certs/generated/client_from_root.key.pkcs8.pem +54 -0
- data/spec/fixtures/certs/generated/client_from_root.p12 +0 -0
- data/spec/fixtures/certs/generated/client_from_root.pem +35 -0
- data/spec/fixtures/certs/generated/client_from_untrusted.jks +0 -0
- data/spec/fixtures/certs/generated/client_from_untrusted.key.pem +52 -0
- data/spec/fixtures/certs/generated/client_from_untrusted.key.pkcs8.pem +54 -0
- data/spec/fixtures/certs/generated/client_from_untrusted.p12 +0 -0
- data/spec/fixtures/certs/generated/client_from_untrusted.pem +35 -0
- data/spec/fixtures/certs/generated/client_self_signed.jks +0 -0
- data/spec/fixtures/certs/generated/client_self_signed.key.pem +52 -0
- data/spec/fixtures/certs/generated/client_self_signed.key.pkcs8.pem +54 -0
- data/spec/fixtures/certs/generated/client_self_signed.p12 +0 -0
- data/spec/fixtures/certs/generated/client_self_signed.pem +32 -0
- data/spec/fixtures/certs/generated/root.key.pem +52 -0
- data/spec/fixtures/certs/generated/root.pem +32 -0
- data/spec/fixtures/certs/generated/server_from_root-key-pkcs8.pem +52 -0
- data/spec/fixtures/certs/generated/server_from_root.jks +0 -0
- data/spec/fixtures/certs/generated/server_from_root.key.pem +52 -0
- data/spec/fixtures/certs/generated/server_from_root.key.pkcs8.pem +54 -0
- data/spec/fixtures/certs/generated/server_from_root.p12 +0 -0
- data/spec/fixtures/certs/generated/server_from_root.pem +37 -0
- data/spec/fixtures/certs/generated/untrusted.key.pem +52 -0
- data/spec/fixtures/certs/generated/untrusted.pem +32 -0
- data/spec/fixtures/certs/openssl.cnf +57 -0
- data/spec/spec_helper.rb +22 -0
- data/spec/unit/full_transmission_spec.rb +202 -0
- data/spec/unit/logstash_input_spec.rb +151 -0
- data/spec/unit/logstash_output_spec.rb +170 -0
- metadata +243 -0
@@ -0,0 +1,151 @@
|
|
1
|
+
# encoding: utf-8
|
2
|
+
|
3
|
+
require_relative "../spec_helper"
|
4
|
+
require "logstash/devutils/rspec/shared_examples"
|
5
|
+
require "logstash/inputs/logstash"
|
6
|
+
|
7
|
+
describe LogStash::Inputs::Logstash do
|
8
|
+
|
9
|
+
subject(:plugin) { LogStash::Inputs::Logstash.new(config) }
|
10
|
+
|
11
|
+
describe "a plugin class" do
|
12
|
+
subject { described_class }
|
13
|
+
|
14
|
+
it { is_expected.to be_a_kind_of Class }
|
15
|
+
it { is_expected.to be <= LogStash::Inputs::Base }
|
16
|
+
it { is_expected.to have_attributes(:config_name => "logstash") }
|
17
|
+
end
|
18
|
+
|
19
|
+
describe "a plugin instance with minimal config" do
|
20
|
+
subject(:instance) { described_class.new({ "port" => 123, "ssl_enabled" => false }) }
|
21
|
+
|
22
|
+
it { is_expected.to respond_to(:register).with(0).arguments }
|
23
|
+
it { is_expected.to respond_to(:run).with(1).argument }
|
24
|
+
it { is_expected.to respond_to(:stop).with(0).arguments }
|
25
|
+
it { is_expected.to respond_to(:close).with(0).arguments }
|
26
|
+
end
|
27
|
+
|
28
|
+
describe "plugin register" do
|
29
|
+
let(:config) {{ "port" => 123 }}
|
30
|
+
|
31
|
+
let(:registered_plugin) { plugin.tap(&:register) }
|
32
|
+
|
33
|
+
context "username and password auth" do
|
34
|
+
let(:config) { super().merge("host" => "my-ls-upstream.com", "ssl_enabled" => false) }
|
35
|
+
|
36
|
+
context "with `username`" do
|
37
|
+
let(:config) { super().merge("username" => "test_user") }
|
38
|
+
|
39
|
+
it "requires `password`" do
|
40
|
+
expected_message = "`password` is REQUIRED when `username` is provided"
|
41
|
+
expect{ plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
42
|
+
end
|
43
|
+
end
|
44
|
+
|
45
|
+
context "with `password`" do
|
46
|
+
let(:config) { super().merge("password" => "pa$$") }
|
47
|
+
|
48
|
+
it "requires `username`" do
|
49
|
+
expected_message = "`password` not allowed unless `username` is configured"
|
50
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
51
|
+
end
|
52
|
+
end
|
53
|
+
end
|
54
|
+
|
55
|
+
context "SSL disabled" do
|
56
|
+
let(:config) { super().merge("ssl_enabled" => false) }
|
57
|
+
|
58
|
+
context "with SSL related configs" do
|
59
|
+
let(:config) { super().merge("ssl_keystore_path" => cert_fixture!('client_from_root.jks'), "ssl_certificate_authorities" => cert_fixture!('root.pem')) }
|
60
|
+
|
61
|
+
it "does not allow and raises an error" do
|
62
|
+
expected_message = 'Explicit SSL-related settings not supported because `ssl_enabled => false`: ["ssl_keystore_path", "ssl_certificate_authorities"]'
|
63
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
64
|
+
end
|
65
|
+
end
|
66
|
+
|
67
|
+
end
|
68
|
+
|
69
|
+
context "self identity" do
|
70
|
+
let(:config) { super().merge("ssl_enabled" => true) }
|
71
|
+
|
72
|
+
it "requires SSL identity" do
|
73
|
+
expected_message = 'SSL identity MUST be configured with either `ssl_certificate`/`ssl_key` or `ssl_keystore_*`'
|
74
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
75
|
+
end
|
76
|
+
|
77
|
+
context "SSL certificate" do
|
78
|
+
let(:config) { super().merge("ssl_certificate" => cert_fixture!('server_from_root.pem')) }
|
79
|
+
|
80
|
+
context "with keystore" do
|
81
|
+
let(:config) { super().merge("ssl_keystore_path" => cert_fixture!('client_from_root.jks')) }
|
82
|
+
|
83
|
+
it "cannot be used together" do
|
84
|
+
expected_message = 'SSL identity can be configured with EITHER `ssl_certificate` OR `ssl_keystore_*`, but not both'
|
85
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
86
|
+
end
|
87
|
+
end
|
88
|
+
|
89
|
+
context "without `ssl_key`" do
|
90
|
+
let(:config) { super().merge("ssl_key_passphrase" => "pa$$w0rd") }
|
91
|
+
|
92
|
+
it "is not allowed" do
|
93
|
+
expected_message = '`ssl_key` is required when `ssl_certificate` is configured'
|
94
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
95
|
+
end
|
96
|
+
end
|
97
|
+
end
|
98
|
+
|
99
|
+
context "`ssl_key`" do
|
100
|
+
let(:config) { super().merge("ssl_key" => cert_fixture!('server_from_root.key.pkcs8.pem')) }
|
101
|
+
|
102
|
+
it "requires SSL certificate" do
|
103
|
+
expected_message = '`ssl_key` is not allowed unless `ssl_certificate` is configured'
|
104
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
105
|
+
end
|
106
|
+
end
|
107
|
+
|
108
|
+
context "`ssl_key_passphrase`" do
|
109
|
+
let(:config) { super().merge("ssl_key_passphrase" => "pa$$w0rd") }
|
110
|
+
|
111
|
+
it "requires SSL key" do
|
112
|
+
expected_message = '`ssl_key_passphrase` is not allowed unless `ssl_key` is configured'
|
113
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
114
|
+
end
|
115
|
+
end
|
116
|
+
|
117
|
+
context "`ssl_keystore_path`" do
|
118
|
+
let(:config) { super().merge("ssl_keystore_path" => cert_fixture!('server_from_root.jks')) }
|
119
|
+
|
120
|
+
it "requires `ssl_keystore_password`" do
|
121
|
+
expected_message = '`ssl_keystore_password` is REQUIRED when `ssl_keystore_path` is configured'
|
122
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
123
|
+
end
|
124
|
+
end
|
125
|
+
|
126
|
+
context "`ssl_keystore_password`" do
|
127
|
+
let(:config) { super().merge("ssl_keystore_password" => "pa$$w0rd") }
|
128
|
+
|
129
|
+
it "requires `ssl_keystore_path`" do
|
130
|
+
expected_message = '`ssl_keystore_password` is not allowed unless `ssl_keystore_path` is configured'
|
131
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
132
|
+
end
|
133
|
+
end
|
134
|
+
end
|
135
|
+
|
136
|
+
context "trust with CA" do
|
137
|
+
let(:config) { super().merge(
|
138
|
+
"ssl_enabled" => true,
|
139
|
+
"ssl_certificate_authorities" => cert_fixture!('root.pem'),
|
140
|
+
"ssl_keystore_path" => cert_fixture!('server_from_root.jks'),
|
141
|
+
"ssl_keystore_password" => "pa$$w0rd"
|
142
|
+
# default `ssl_client_authentication` is 'none'
|
143
|
+
) }
|
144
|
+
|
145
|
+
it "requires SSL Client Authentication" do
|
146
|
+
expected_message = '`ssl_certificate_authorities` is not supported because `ssl_client_authentication => none`'
|
147
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
148
|
+
end
|
149
|
+
end
|
150
|
+
end
|
151
|
+
end
|
@@ -0,0 +1,170 @@
|
|
1
|
+
# encoding: utf-8
|
2
|
+
|
3
|
+
require_relative "../spec_helper"
|
4
|
+
require "logstash/devutils/rspec/shared_examples"
|
5
|
+
require "logstash/outputs/logstash"
|
6
|
+
|
7
|
+
describe LogStash::Outputs::Logstash do
|
8
|
+
|
9
|
+
let(:config) {{ "host" => "127.0.0.1", "port" => 123 }}
|
10
|
+
|
11
|
+
subject(:plugin) { LogStash::Outputs::Logstash.new(config) }
|
12
|
+
|
13
|
+
describe "a plugin class" do
|
14
|
+
subject { described_class }
|
15
|
+
|
16
|
+
it { is_expected.to be_a_kind_of Class }
|
17
|
+
it { is_expected.to be <= LogStash::Outputs::Base }
|
18
|
+
it { is_expected.to have_attributes(:config_name => "logstash") }
|
19
|
+
end
|
20
|
+
|
21
|
+
describe "a plugin instance with minimal config" do
|
22
|
+
subject(:instance) { described_class.new(config) }
|
23
|
+
|
24
|
+
it { is_expected.to respond_to(:register).with(0).arguments }
|
25
|
+
it { is_expected.to respond_to(:multi_receive).with(1).argument }
|
26
|
+
it { is_expected.to respond_to(:stop).with(0).arguments }
|
27
|
+
it { is_expected.to respond_to(:close).with(0).arguments }
|
28
|
+
end
|
29
|
+
|
30
|
+
describe "plugin register" do
|
31
|
+
let(:registered_plugin) { plugin.tap(&:register) }
|
32
|
+
|
33
|
+
describe "username and password auth" do
|
34
|
+
let(:config) { super().merge("host" => "my-ls-downstream.com", "ssl_enabled" => false) }
|
35
|
+
|
36
|
+
context "with `username`" do
|
37
|
+
let(:config) { super().merge("username" => "test_user") }
|
38
|
+
|
39
|
+
it "requires `password`" do
|
40
|
+
expected_message = "`password` is REQUIRED when `username` is provided"
|
41
|
+
expect{ plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
42
|
+
end
|
43
|
+
end
|
44
|
+
|
45
|
+
context "with `password`" do
|
46
|
+
let(:config) { super().merge("password" => "pa$$") }
|
47
|
+
|
48
|
+
it "requires `username`" do
|
49
|
+
expected_message = "`password` not allowed unless `username` is configured"
|
50
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
51
|
+
end
|
52
|
+
end
|
53
|
+
end
|
54
|
+
|
55
|
+
context "SSL disabled" do
|
56
|
+
let(:config) { super().merge("ssl_enabled" => false) }
|
57
|
+
|
58
|
+
context "with SSL related configs" do
|
59
|
+
let(:config) { super().merge("ssl_keystore_path" => cert_fixture!('client_from_root.jks'), "ssl_certificate_authorities" => cert_fixture!('root.pem')) }
|
60
|
+
|
61
|
+
it "does not allow and raises an error" do
|
62
|
+
expected_message = 'Explicit SSL-related settings not supported because `ssl_enabled => false`: ["ssl_keystore_path", "ssl_certificate_authorities"]'
|
63
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
64
|
+
end
|
65
|
+
end
|
66
|
+
end
|
67
|
+
|
68
|
+
context "self identity" do
|
69
|
+
let(:config) { super().merge("ssl_enabled" => true) }
|
70
|
+
|
71
|
+
context "SSL certificate" do
|
72
|
+
let(:config) { super().merge("ssl_certificate" => cert_fixture!('server_from_root.pem')) }
|
73
|
+
|
74
|
+
it "requires `ssl_key`" do
|
75
|
+
expected_message = '`ssl_key` is REQUIRED when `ssl_certificate` is provided'
|
76
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
77
|
+
end
|
78
|
+
|
79
|
+
context "with keystore" do
|
80
|
+
let(:config) { super().merge("ssl_keystore_path" => cert_fixture!('client_from_root.jks')) }
|
81
|
+
|
82
|
+
it "cannot be used together" do
|
83
|
+
expected_message = 'SSL identity can be configured with EITHER `ssl_certificate` OR `ssl_keystore_*`, but not both'
|
84
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
85
|
+
end
|
86
|
+
end
|
87
|
+
end
|
88
|
+
|
89
|
+
context "`ssl_key`" do
|
90
|
+
let(:config) { super().merge("ssl_key" => cert_fixture!('server_from_root.key.pkcs8.pem')) }
|
91
|
+
|
92
|
+
it "requires SSL certificate" do
|
93
|
+
expected_message = '`ssl_key` is not allowed unless `ssl_certificate` is configured'
|
94
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
95
|
+
end
|
96
|
+
end
|
97
|
+
|
98
|
+
context "`ssl_keystore_path`" do
|
99
|
+
let(:config) { super().merge("ssl_keystore_path" => cert_fixture!('server_from_root.jks')) }
|
100
|
+
|
101
|
+
it "requires `ssl_keystore_password`" do
|
102
|
+
expected_message = '`ssl_keystore_password` is REQUIRED when `ssl_keystore_path` is provided'
|
103
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
104
|
+
end
|
105
|
+
end
|
106
|
+
|
107
|
+
context "`ssl_keystore_password`" do
|
108
|
+
let(:config) { super().merge("ssl_keystore_password" => "pa$$w0rd") }
|
109
|
+
|
110
|
+
it "requires `ssl_keystore_path`" do
|
111
|
+
expected_message = '`ssl_keystore_password` is not allowed unless `ssl_keystore_path` is configured'
|
112
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
113
|
+
end
|
114
|
+
end
|
115
|
+
end
|
116
|
+
|
117
|
+
context "trust" do
|
118
|
+
let(:config) { super().merge("ssl_enabled" => true) }
|
119
|
+
|
120
|
+
context "with CA" do
|
121
|
+
let(:config) { super().merge("ssl_certificate_authorities" => cert_fixture!('root.pem')) }
|
122
|
+
|
123
|
+
context "and `ssl_verification_mode` is 'none'" do
|
124
|
+
let(:config) { super().merge("ssl_verification_mode" => "none") }
|
125
|
+
|
126
|
+
it "not allowed" do
|
127
|
+
expected_message = 'SSL Certificate Authorities cannot be configured when `ssl_verification_mode => none`'
|
128
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
129
|
+
end
|
130
|
+
end
|
131
|
+
|
132
|
+
context "and truststore" do
|
133
|
+
let(:config) { super().merge("ssl_truststore_path" => cert_fixture!('client_self_signed.jks')) }
|
134
|
+
|
135
|
+
it "not allowed" do
|
136
|
+
expected_message = 'SSL trust can be configured with EITHER `ssl_certificate_authorities` OR `ssl_truststore_*`, but not both'
|
137
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
138
|
+
end
|
139
|
+
end
|
140
|
+
end
|
141
|
+
|
142
|
+
context "truststore" do
|
143
|
+
let(:config) { super().merge("ssl_truststore_path" => cert_fixture!('client_self_signed.jks')) }
|
144
|
+
|
145
|
+
it "requires truststore password" do
|
146
|
+
expected_message = '`ssl_truststore_password` is REQUIRED when `ssl_truststore_path` is provided'
|
147
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
148
|
+
end
|
149
|
+
|
150
|
+
context "and `ssl_verification_mode` is 'none'" do
|
151
|
+
let(:config) { super().merge("ssl_verification_mode" => "none") }
|
152
|
+
|
153
|
+
it "not allowed" do
|
154
|
+
expected_message = 'SSL Truststore cannot be configured when `ssl_verification_mode => none`'
|
155
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
156
|
+
end
|
157
|
+
end
|
158
|
+
end
|
159
|
+
|
160
|
+
context "password without truststore path" do
|
161
|
+
let(:config) { super().merge("ssl_truststore_password" => "pa$$w0rd") }
|
162
|
+
|
163
|
+
it "not allowed" do
|
164
|
+
expected_message = '`ssl_truststore_password` not allowed unless `ssl_truststore_path` is configured'
|
165
|
+
expect{ registered_plugin }.to raise_error(LogStash::ConfigurationError).with_message(expected_message)
|
166
|
+
end
|
167
|
+
end
|
168
|
+
end
|
169
|
+
end
|
170
|
+
end
|
metadata
ADDED
@@ -0,0 +1,243 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: logstash-integration-logstash
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.0.1
|
5
|
+
platform: java
|
6
|
+
authors:
|
7
|
+
- Elastic
|
8
|
+
autorequire:
|
9
|
+
bindir: bin
|
10
|
+
cert_chain: []
|
11
|
+
date: 2023-09-25 00:00:00.000000000 Z
|
12
|
+
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
requirement: !ruby/object:Gem::Requirement
|
15
|
+
requirements:
|
16
|
+
- - ">="
|
17
|
+
- !ruby/object:Gem::Version
|
18
|
+
version: 2.1.12
|
19
|
+
- - "<="
|
20
|
+
- !ruby/object:Gem::Version
|
21
|
+
version: '2.99'
|
22
|
+
name: logstash-core-plugin-api
|
23
|
+
prerelease: false
|
24
|
+
type: :runtime
|
25
|
+
version_requirements: !ruby/object:Gem::Requirement
|
26
|
+
requirements:
|
27
|
+
- - ">="
|
28
|
+
- !ruby/object:Gem::Version
|
29
|
+
version: 2.1.12
|
30
|
+
- - "<="
|
31
|
+
- !ruby/object:Gem::Version
|
32
|
+
version: '2.99'
|
33
|
+
- !ruby/object:Gem::Dependency
|
34
|
+
requirement: !ruby/object:Gem::Requirement
|
35
|
+
requirements:
|
36
|
+
- - "~>"
|
37
|
+
- !ruby/object:Gem::Version
|
38
|
+
version: '1.0'
|
39
|
+
name: logstash-mixin-plugin_factory_support
|
40
|
+
prerelease: false
|
41
|
+
type: :runtime
|
42
|
+
version_requirements: !ruby/object:Gem::Requirement
|
43
|
+
requirements:
|
44
|
+
- - "~>"
|
45
|
+
- !ruby/object:Gem::Version
|
46
|
+
version: '1.0'
|
47
|
+
- !ruby/object:Gem::Dependency
|
48
|
+
requirement: !ruby/object:Gem::Requirement
|
49
|
+
requirements:
|
50
|
+
- - "~>"
|
51
|
+
- !ruby/object:Gem::Version
|
52
|
+
version: '3.1'
|
53
|
+
name: logstash-codec-json_lines
|
54
|
+
prerelease: false
|
55
|
+
type: :runtime
|
56
|
+
version_requirements: !ruby/object:Gem::Requirement
|
57
|
+
requirements:
|
58
|
+
- - "~>"
|
59
|
+
- !ruby/object:Gem::Version
|
60
|
+
version: '3.1'
|
61
|
+
- !ruby/object:Gem::Dependency
|
62
|
+
requirement: !ruby/object:Gem::Requirement
|
63
|
+
requirements:
|
64
|
+
- - ">="
|
65
|
+
- !ruby/object:Gem::Version
|
66
|
+
version: 3.7.0
|
67
|
+
name: logstash-input-http
|
68
|
+
prerelease: false
|
69
|
+
type: :runtime
|
70
|
+
version_requirements: !ruby/object:Gem::Requirement
|
71
|
+
requirements:
|
72
|
+
- - ">="
|
73
|
+
- !ruby/object:Gem::Version
|
74
|
+
version: 3.7.0
|
75
|
+
- !ruby/object:Gem::Dependency
|
76
|
+
requirement: !ruby/object:Gem::Requirement
|
77
|
+
requirements:
|
78
|
+
- - ">="
|
79
|
+
- !ruby/object:Gem::Version
|
80
|
+
version: 5.6.0
|
81
|
+
name: logstash-output-http
|
82
|
+
prerelease: false
|
83
|
+
type: :runtime
|
84
|
+
version_requirements: !ruby/object:Gem::Requirement
|
85
|
+
requirements:
|
86
|
+
- - ">="
|
87
|
+
- !ruby/object:Gem::Version
|
88
|
+
version: 5.6.0
|
89
|
+
- !ruby/object:Gem::Dependency
|
90
|
+
requirement: !ruby/object:Gem::Requirement
|
91
|
+
requirements:
|
92
|
+
- - ">="
|
93
|
+
- !ruby/object:Gem::Version
|
94
|
+
version: '0'
|
95
|
+
name: logstash-devutils
|
96
|
+
prerelease: false
|
97
|
+
type: :development
|
98
|
+
version_requirements: !ruby/object:Gem::Requirement
|
99
|
+
requirements:
|
100
|
+
- - ">="
|
101
|
+
- !ruby/object:Gem::Version
|
102
|
+
version: '0'
|
103
|
+
- !ruby/object:Gem::Dependency
|
104
|
+
requirement: !ruby/object:Gem::Requirement
|
105
|
+
requirements:
|
106
|
+
- - ">="
|
107
|
+
- !ruby/object:Gem::Version
|
108
|
+
version: '0'
|
109
|
+
name: rspec-collection_matchers
|
110
|
+
prerelease: false
|
111
|
+
type: :development
|
112
|
+
version_requirements: !ruby/object:Gem::Requirement
|
113
|
+
requirements:
|
114
|
+
- - ">="
|
115
|
+
- !ruby/object:Gem::Version
|
116
|
+
version: '0'
|
117
|
+
- !ruby/object:Gem::Dependency
|
118
|
+
requirement: !ruby/object:Gem::Requirement
|
119
|
+
requirements:
|
120
|
+
- - ">="
|
121
|
+
- !ruby/object:Gem::Version
|
122
|
+
version: '0'
|
123
|
+
name: random-port
|
124
|
+
prerelease: false
|
125
|
+
type: :development
|
126
|
+
version_requirements: !ruby/object:Gem::Requirement
|
127
|
+
requirements:
|
128
|
+
- - ">="
|
129
|
+
- !ruby/object:Gem::Version
|
130
|
+
version: '0'
|
131
|
+
description: This gem is a Logstash plugin required to be installed on top of the
|
132
|
+
Logstash core pipeline using $LS_HOME/bin/logstash-plugin install gemname. This
|
133
|
+
gem is not a stand-alone program
|
134
|
+
email: info@elastic.co
|
135
|
+
executables: []
|
136
|
+
extensions: []
|
137
|
+
extra_rdoc_files: []
|
138
|
+
files:
|
139
|
+
- CHANGELOG.md
|
140
|
+
- Gemfile
|
141
|
+
- LICENSE
|
142
|
+
- NOTICE.TXT
|
143
|
+
- README.md
|
144
|
+
- VERSION
|
145
|
+
- docs/index.asciidoc
|
146
|
+
- docs/input-logstash.asciidoc
|
147
|
+
- docs/output-logstash.asciidoc
|
148
|
+
- lib/logstash/inputs/logstash.rb
|
149
|
+
- lib/logstash/outputs/logstash.rb
|
150
|
+
- logstash-integration-logstash.gemspec
|
151
|
+
- spec/fixtures/certs/generate.sh
|
152
|
+
- spec/fixtures/certs/generated/README.txt
|
153
|
+
- spec/fixtures/certs/generated/client_from_root.jks
|
154
|
+
- spec/fixtures/certs/generated/client_from_root.key.pem
|
155
|
+
- spec/fixtures/certs/generated/client_from_root.key.pkcs8.pem
|
156
|
+
- spec/fixtures/certs/generated/client_from_root.p12
|
157
|
+
- spec/fixtures/certs/generated/client_from_root.pem
|
158
|
+
- spec/fixtures/certs/generated/client_from_untrusted.jks
|
159
|
+
- spec/fixtures/certs/generated/client_from_untrusted.key.pem
|
160
|
+
- spec/fixtures/certs/generated/client_from_untrusted.key.pkcs8.pem
|
161
|
+
- spec/fixtures/certs/generated/client_from_untrusted.p12
|
162
|
+
- spec/fixtures/certs/generated/client_from_untrusted.pem
|
163
|
+
- spec/fixtures/certs/generated/client_self_signed.jks
|
164
|
+
- spec/fixtures/certs/generated/client_self_signed.key.pem
|
165
|
+
- spec/fixtures/certs/generated/client_self_signed.key.pkcs8.pem
|
166
|
+
- spec/fixtures/certs/generated/client_self_signed.p12
|
167
|
+
- spec/fixtures/certs/generated/client_self_signed.pem
|
168
|
+
- spec/fixtures/certs/generated/root.key.pem
|
169
|
+
- spec/fixtures/certs/generated/root.pem
|
170
|
+
- spec/fixtures/certs/generated/server_from_root-key-pkcs8.pem
|
171
|
+
- spec/fixtures/certs/generated/server_from_root.jks
|
172
|
+
- spec/fixtures/certs/generated/server_from_root.key.pem
|
173
|
+
- spec/fixtures/certs/generated/server_from_root.key.pkcs8.pem
|
174
|
+
- spec/fixtures/certs/generated/server_from_root.p12
|
175
|
+
- spec/fixtures/certs/generated/server_from_root.pem
|
176
|
+
- spec/fixtures/certs/generated/untrusted.key.pem
|
177
|
+
- spec/fixtures/certs/generated/untrusted.pem
|
178
|
+
- spec/fixtures/certs/openssl.cnf
|
179
|
+
- spec/spec_helper.rb
|
180
|
+
- spec/unit/full_transmission_spec.rb
|
181
|
+
- spec/unit/logstash_input_spec.rb
|
182
|
+
- spec/unit/logstash_output_spec.rb
|
183
|
+
homepage: https://www.elastic.co/logstash
|
184
|
+
licenses:
|
185
|
+
- Apache-2.0
|
186
|
+
metadata:
|
187
|
+
logstash_plugin: 'true'
|
188
|
+
logstash_group: integration
|
189
|
+
integration_plugins: logstash-input-logstash,logstash-output-logstash
|
190
|
+
post_install_message:
|
191
|
+
rdoc_options: []
|
192
|
+
require_paths:
|
193
|
+
- lib
|
194
|
+
- vendor/jar-dependencies
|
195
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
196
|
+
requirements:
|
197
|
+
- - ">="
|
198
|
+
- !ruby/object:Gem::Version
|
199
|
+
version: '0'
|
200
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
201
|
+
requirements:
|
202
|
+
- - ">="
|
203
|
+
- !ruby/object:Gem::Version
|
204
|
+
version: '0'
|
205
|
+
requirements: []
|
206
|
+
rubygems_version: 3.2.33
|
207
|
+
signing_key:
|
208
|
+
specification_version: 4
|
209
|
+
summary: Collection of Logstash plugins that enable sending events from one Logstash
|
210
|
+
pipeline to another
|
211
|
+
test_files:
|
212
|
+
- spec/fixtures/certs/generate.sh
|
213
|
+
- spec/fixtures/certs/generated/README.txt
|
214
|
+
- spec/fixtures/certs/generated/client_from_root.jks
|
215
|
+
- spec/fixtures/certs/generated/client_from_root.key.pem
|
216
|
+
- spec/fixtures/certs/generated/client_from_root.key.pkcs8.pem
|
217
|
+
- spec/fixtures/certs/generated/client_from_root.p12
|
218
|
+
- spec/fixtures/certs/generated/client_from_root.pem
|
219
|
+
- spec/fixtures/certs/generated/client_from_untrusted.jks
|
220
|
+
- spec/fixtures/certs/generated/client_from_untrusted.key.pem
|
221
|
+
- spec/fixtures/certs/generated/client_from_untrusted.key.pkcs8.pem
|
222
|
+
- spec/fixtures/certs/generated/client_from_untrusted.p12
|
223
|
+
- spec/fixtures/certs/generated/client_from_untrusted.pem
|
224
|
+
- spec/fixtures/certs/generated/client_self_signed.jks
|
225
|
+
- spec/fixtures/certs/generated/client_self_signed.key.pem
|
226
|
+
- spec/fixtures/certs/generated/client_self_signed.key.pkcs8.pem
|
227
|
+
- spec/fixtures/certs/generated/client_self_signed.p12
|
228
|
+
- spec/fixtures/certs/generated/client_self_signed.pem
|
229
|
+
- spec/fixtures/certs/generated/root.key.pem
|
230
|
+
- spec/fixtures/certs/generated/root.pem
|
231
|
+
- spec/fixtures/certs/generated/server_from_root-key-pkcs8.pem
|
232
|
+
- spec/fixtures/certs/generated/server_from_root.jks
|
233
|
+
- spec/fixtures/certs/generated/server_from_root.key.pem
|
234
|
+
- spec/fixtures/certs/generated/server_from_root.key.pkcs8.pem
|
235
|
+
- spec/fixtures/certs/generated/server_from_root.p12
|
236
|
+
- spec/fixtures/certs/generated/server_from_root.pem
|
237
|
+
- spec/fixtures/certs/generated/untrusted.key.pem
|
238
|
+
- spec/fixtures/certs/generated/untrusted.pem
|
239
|
+
- spec/fixtures/certs/openssl.cnf
|
240
|
+
- spec/spec_helper.rb
|
241
|
+
- spec/unit/full_transmission_spec.rb
|
242
|
+
- spec/unit/logstash_input_spec.rb
|
243
|
+
- spec/unit/logstash_output_spec.rb
|