logstash-mixin-rabbitmq_connection 4.0.1-java → 4.1.0-java
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG +5 -0
- data/lib/logstash/plugin_mixins/rabbitmq_connection.rb +37 -10
- data/logstash-mixin-rabbitmq_connection.gemspec +2 -1
- data/spec/fixtures/client/cert.pem +18 -0
- data/spec/fixtures/client/key.pem +27 -0
- data/spec/fixtures/client/keycert.p12 +0 -0
- data/spec/fixtures/client/req.pem +15 -0
- data/spec/fixtures/password_for_files +1 -0
- data/spec/fixtures/server/cert.pem +18 -0
- data/spec/fixtures/server/key.pem +27 -0
- data/spec/fixtures/server/key_password +1 -0
- data/spec/fixtures/server/keycert.p12 +0 -0
- data/spec/fixtures/server/rabbitmq.config +10 -0
- data/spec/fixtures/server/req.pem +15 -0
- data/spec/fixtures/testca/cacert.cer +0 -0
- data/spec/fixtures/testca/cacert.pem +17 -0
- data/spec/fixtures/testca/certs/01.pem +18 -0
- data/spec/fixtures/testca/certs/02.pem +18 -0
- data/spec/fixtures/testca/index.txt +2 -0
- data/spec/fixtures/testca/index.txt.attr +1 -0
- data/spec/fixtures/testca/index.txt.attr.old +1 -0
- data/spec/fixtures/testca/index.txt.old +1 -0
- data/spec/fixtures/testca/openssl.cnf +53 -0
- data/spec/fixtures/testca/private/cakey.pem +27 -0
- data/spec/fixtures/testca/serial +1 -0
- data/spec/fixtures/testca/serial.old +1 -0
- data/spec/plugin_mixins/rabbitmq_connection_spec.rb +7 -6
- metadata +48 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 3180b6f7141951d8dfdc855f0e9f084042a72384
|
4
|
+
data.tar.gz: c4c34412be5a2d029c46626321aa2ce561ed8284
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b7719c3c4f1d6cb5493c6b5ce0ded6a30471100f45924d1f1c39272683e60985d42a6ce9d194154241a2d92c6d87d4ebeeec75ca07b0c7735ffb31d08e0dd688
|
7
|
+
data.tar.gz: eaa10a409af9933e2232a93a7347ef23de8a1ea7f73c1e27fd2d3ccba52e055d478c880c08011c376396811c1113c67fa21811ff9ddaa0a05b0492e9ba78976b
|
data/CHANGELOG
CHANGED
@@ -1,3 +1,8 @@
|
|
1
|
+
* 4.1.0
|
2
|
+
- Fix SSL option to be boolean once again
|
3
|
+
- Add separate ssl_version parameter
|
4
|
+
- Mark verify_ssl parameter as obsolete since it never worked
|
5
|
+
- Better checks for SSL argument consistency
|
1
6
|
* 2.4.0
|
2
7
|
- Add SSL/TLS Support
|
3
8
|
- Add support for "x-consistent-hash" and "x-modulus-hash" exchanges
|
@@ -36,12 +36,24 @@ module LogStash
|
|
36
36
|
# slash.
|
37
37
|
config :vhost, :validate => :string, :default => "/"
|
38
38
|
|
39
|
-
# Enable or disable SSL
|
40
|
-
#
|
41
|
-
|
39
|
+
# Enable or disable SSL.
|
40
|
+
# Note that by default remote certificate verification is off.
|
41
|
+
# Specify ssl_certificate_path and ssl_certificate_password if you need
|
42
|
+
# certificate verification
|
43
|
+
config :ssl, :validate => :boolean
|
42
44
|
|
43
|
-
#
|
44
|
-
config :
|
45
|
+
# Version of the SSL protocol to use.
|
46
|
+
config :ssl_version, :validate => :string, :default => "TLSv1.2"
|
47
|
+
|
48
|
+
config :verify_ssl, :validate => :boolean, :default => false,
|
49
|
+
:obsolete => "This function did not actually function correctly and was removed." +
|
50
|
+
"If you wish to validate SSL certs use the ssl_certificate_path and ssl_certificate_password options."
|
51
|
+
|
52
|
+
# Path to an SSL certificate in PKCS12 (.p12) format used for verifying the remote host
|
53
|
+
config :ssl_certificate_path, :validate => :path
|
54
|
+
|
55
|
+
# Password for the encrypted PKCS12 (.p12) certificate file specified in ssl_certificate_path
|
56
|
+
config :ssl_certificate_password, :validate => :string
|
45
57
|
|
46
58
|
# Enable or disable logging
|
47
59
|
config :debug, :validate => :boolean, :default => false, :deprecated => "Use the logstash --debug flag for this instead."
|
@@ -62,10 +74,10 @@ module LogStash
|
|
62
74
|
config :passive, :validate => :boolean, :default => false
|
63
75
|
|
64
76
|
# TLS certifcate path
|
65
|
-
config :tls_certificate_path, :validate => :path
|
77
|
+
config :tls_certificate_path, :validate => :path, :deprecated => true
|
66
78
|
|
67
79
|
# TLS certificate password
|
68
|
-
config :tls_certificate_password, :validate => :string
|
80
|
+
config :tls_certificate_password, :validate => :string, :deprecated => true
|
69
81
|
|
70
82
|
# Extra queue arguments as an array.
|
71
83
|
# To make a RabbitMQ queue mirrored, use: `{"x-ha-policy" => "all"}`
|
@@ -96,9 +108,22 @@ module LogStash
|
|
96
108
|
|
97
109
|
s[:timeout] = @connection_timeout || 0
|
98
110
|
s[:heartbeat] = @heartbeat || 0
|
99
|
-
|
100
|
-
|
101
|
-
|
111
|
+
|
112
|
+
if @ssl
|
113
|
+
s[:tls] = @ssl_version
|
114
|
+
|
115
|
+
cert_path = @ssl_certificate_path || @tls_certificate_path
|
116
|
+
cert_pass = @ssl_certificate_password || @tls_certificate_password
|
117
|
+
|
118
|
+
if !!cert_path ^ !!cert_pass
|
119
|
+
raise LogStash::ConfigurationError, "RabbitMQ requires both ssl_certificate_path AND ssl_certificate_password to be set!"
|
120
|
+
end
|
121
|
+
|
122
|
+
s[:tls_certificate_path] = cert_path
|
123
|
+
s[:tls_certificate_password] = cert_pass
|
124
|
+
end
|
125
|
+
|
126
|
+
|
102
127
|
@rabbitmq_settings = s
|
103
128
|
end
|
104
129
|
|
@@ -147,6 +172,8 @@ module LogStash
|
|
147
172
|
@logger.debug? && @logger.debug("Connecting to RabbitMQ. Settings: #{rabbitmq_settings.inspect}")
|
148
173
|
|
149
174
|
connection = MarchHare.connect(rabbitmq_settings)
|
175
|
+
|
176
|
+
|
150
177
|
connection.on_blocked { @logger.warn("RabbitMQ output blocked! Check your RabbitMQ instance!") }
|
151
178
|
connection.on_unblocked { @logger.warn("RabbitMQ output unblocked!") }
|
152
179
|
|
@@ -1,6 +1,7 @@
|
|
1
|
+
|
1
2
|
Gem::Specification.new do |s|
|
2
3
|
s.name = 'logstash-mixin-rabbitmq_connection'
|
3
|
-
s.version = '4.0
|
4
|
+
s.version = '4.1.0'
|
4
5
|
s.licenses = ['Apache License (2.0)']
|
5
6
|
s.summary = "Common functionality for RabbitMQ plugins"
|
6
7
|
s.description = "This gem is a Logstash plugin required to be installed on top of the Logstash core pipeline using $LS_HOME/bin/logstash-plugin install gemname. This gem is not a stand-alone program"
|
@@ -0,0 +1,18 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIC4jCCAcqgAwIBAgIBAjANBgkqhkiG9w0BAQsFADATMREwDwYDVQQDDAhNeVRl
|
3
|
+
c3RDQTAeFw0xNjA1MTAxNzAwMDFaFw0xNzA1MTAxNzAwMDFaMCUxEjAQBgNVBAMT
|
4
|
+
CWxvY2FsaG9zdDEPMA0GA1UEChMGY2xpZW50MIIBIjANBgkqhkiG9w0BAQEFAAOC
|
5
|
+
AQ8AMIIBCgKCAQEAo9dLuAbDY5jBAlx1UqsOQf480ni4BVbxOjEAL4PVBfIU4xmn
|
6
|
+
F3Z+tAvmcd3oNc9JYYxXVq5sKA/HE5eWhVdXdQWX0IrTHraJAXvRlHuu1TSuTvuq
|
7
|
+
7QgQVFbZdWzRfvukLoKPDm1DtI5BFJ7L83j8RJy6tyvek4KzsHtG3JKoVzoz5+Hz
|
8
|
+
7fL7gE76Dr82uH1t9WouZ5oXS2HgBR0l9CTYxARa6OMrr/+r4w1RoYDXnrlit5Ft
|
9
|
+
81mQAVibnei9dN3EXoECUflclQ1nip12XVuoH9GXF6AetzDsbhInYvRoxm1Q9pNz
|
10
|
+
g/L1QswPkF5MCuSIkkwgtHazZkIWlUKqPMVtIQIDAQABoy8wLTAJBgNVHRMEAjAA
|
11
|
+
MAsGA1UdDwQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAjANBgkqhkiG9w0BAQsF
|
12
|
+
AAOCAQEAuJ1ruPLP2WdRZz5bb/qgaBqADUVKJu3Ny9TsEK/oZzUwgWVc4hvsiFms
|
13
|
+
gj/JVmXy4f36s6VLfOiDNHI6jIb31wvfduYV58Z+IUXMyj9OV4ZxqpQBqS9YK1Gq
|
14
|
+
2AChr1wYUs+WmnNATwa4Q51ytTU4DcLdJTusZIfo5BAvnnz35QnQPsB11EEHRovA
|
15
|
+
1bnzvG6uKAG0MjxNvXpWRUImNXrIKrbRXnvu5FDXAVMPg674g1QMhaa6SlPO5bFP
|
16
|
+
meg4+1jH2tUMKR8qCS4KfOfbccNF/u09pRYcMJwiTXu++gCAu1il9jn0C5zxX3Ni
|
17
|
+
GKm0/sj2BpZf9D4Kl8LppAIxcphBUg==
|
18
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,27 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
MIIEogIBAAKCAQEAo9dLuAbDY5jBAlx1UqsOQf480ni4BVbxOjEAL4PVBfIU4xmn
|
3
|
+
F3Z+tAvmcd3oNc9JYYxXVq5sKA/HE5eWhVdXdQWX0IrTHraJAXvRlHuu1TSuTvuq
|
4
|
+
7QgQVFbZdWzRfvukLoKPDm1DtI5BFJ7L83j8RJy6tyvek4KzsHtG3JKoVzoz5+Hz
|
5
|
+
7fL7gE76Dr82uH1t9WouZ5oXS2HgBR0l9CTYxARa6OMrr/+r4w1RoYDXnrlit5Ft
|
6
|
+
81mQAVibnei9dN3EXoECUflclQ1nip12XVuoH9GXF6AetzDsbhInYvRoxm1Q9pNz
|
7
|
+
g/L1QswPkF5MCuSIkkwgtHazZkIWlUKqPMVtIQIDAQABAoIBAEFgfJdfI4JPhtzR
|
8
|
+
VgN5vEO7FjwJ7aw7yCAnQ2KyYUNxGMKSDum+38oqYXcYTDuEjkx9erBdA01tFkwM
|
9
|
+
FgT5GC3a4HxXmOzNe5f692Mfg2ESF2fu5oKU0CdHTJidpm7cLOReNoVUNksK5I88
|
10
|
+
2jc6FLewLpU+zR7hbaBDYMBNSR0cufli3/tEBC3UkDJUQhqBB99ZSF2qsvY4ayy+
|
11
|
+
SWWspwltPQFmTcrvcWdcfx3DCHgMRexjiFMF9ITxmsAIpwB8JHtqeDQNLyzXH3s5
|
12
|
+
Q5FQhMdzK0O5iKkukLALMlN6+VvZH92mvtN/216TbaKuFnDXwwUsHwBDfErAnyfc
|
13
|
+
KFmidwECgYEAz8/mYg/mnqvKiUDjqM28Bpiw8WEilXMlUPBnDWCh4uOn/EemFQIY
|
14
|
+
zF8isrrNjXmTLGO3Jidesr39VWVhMSdE8rABTj2JNyQyvgNc72E9+QRl4pp7lM6d
|
15
|
+
H9D56MGd3r20gGffjIlsWLCIHb43eAkfwJOyoW+kr+TNUSR3RMlYBNECgYEAydUx
|
16
|
+
GBZMMb04qVGd/rixEk8dbMSnGLzcqLet151jc5b/QmaqjPiK/0iTIQmginXERUJx
|
17
|
+
XI3xQXUkykCuFpNdJ1KgcU1KYH1aJ6j6i62TVzgVlOFWk+z9d1zKOGXJaw/9m11U
|
18
|
+
ThjCHz6WpH6BOy1RvRwGXLz6sU13TDwL9GVzN1ECgYBqIWUpY7GGC3pOioM6LIgA
|
19
|
+
Xm7Pd6ov5TSDl6Mpo9ZJh7a9EuJxDDcZ+ORBn0FnJVXSb8KTi7vDUWBWAoaWkdWW
|
20
|
+
k+i2ypqPPL9lZ1ZJMsJxsJtQFVFT+AkqvJFFG8zCeuP6SBJVNcHNsapydjjh5tb+
|
21
|
+
hO/PnrLe2d05uYPn72QyYQKBgC41HNRC5pbMl1hMUzup1QA4FKh+LTNAqdQGmUov
|
22
|
+
wkEIZNAy6QD1Nf1UBDsgFR0d8R1aJNHnvUAbLZ0QScrpWf5SsGDALTMB/83spc+s
|
23
|
+
oXrqYCaBoGylaTIWkEVxKDfWpV0YdOCcUnUMwzhNrhB6Q6hj7iD1Mv+8mH9fj+0X
|
24
|
+
/NTBAoGAcJoIVPUVI8/0WoaSyzJSS5PRYRyqBh7mMtWRJ9dn3yszaBLyzoItAwWF
|
25
|
+
MKjwvJJJ0E1fGx2gFsHoDEek69ZvwhjoVtzciy/BOkWbetNSXDoNFtj8fZmrDurY
|
26
|
+
6qZGKlG9NI2WN7SU1ZfWIIIV7dNkboKlSwLTwhdmZdr0dSosemc=
|
27
|
+
-----END RSA PRIVATE KEY-----
|
Binary file
|
@@ -0,0 +1,15 @@
|
|
1
|
+
-----BEGIN CERTIFICATE REQUEST-----
|
2
|
+
MIICajCCAVICAQAwJTESMBAGA1UEAxMJbG9jYWxob3N0MQ8wDQYDVQQKEwZjbGll
|
3
|
+
bnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCj10u4BsNjmMECXHVS
|
4
|
+
qw5B/jzSeLgFVvE6MQAvg9UF8hTjGacXdn60C+Zx3eg1z0lhjFdWrmwoD8cTl5aF
|
5
|
+
V1d1BZfQitMetokBe9GUe67VNK5O+6rtCBBUVtl1bNF++6Qugo8ObUO0jkEUnsvz
|
6
|
+
ePxEnLq3K96TgrOwe0bckqhXOjPn4fPt8vuATvoOvza4fW31ai5nmhdLYeAFHSX0
|
7
|
+
JNjEBFro4yuv/6vjDVGhgNeeuWK3kW3zWZABWJud6L103cRegQJR+VyVDWeKnXZd
|
8
|
+
W6gf0ZcXoB63MOxuEidi9GjGbVD2k3OD8vVCzA+QXkwK5IiSTCC0drNmQhaVQqo8
|
9
|
+
xW0hAgMBAAGgADANBgkqhkiG9w0BAQUFAAOCAQEAb2KtxPDC4D8KJywEVWGUw6Y9
|
10
|
+
wrlZGFLO1qkIjjQLfs4SBEhtTiRIlAUHT8hZWigBIBSmpEjRHzsc+EqM3OOjLtX4
|
11
|
+
n4eUmQHnKiGIOD7D7iLdvtNAm6eWpo7+ndgTpx+JRlBiT5/lTZf5W4Hgss3ijn6P
|
12
|
+
hT7sXajSeLlMeklG152lEdXgAtoSuhZbD9dQfm8DVS1W/Z6gJSlPY6URIENqlxK3
|
13
|
+
63yjDcPa4RG22RDr2YHFne9UBduSzhqvupdtaz9Hwq1yHObTAB0h9gupfasppgoP
|
14
|
+
fvxqepvJlg7Pbc5qci+bNUGfDkwkplqGab+jDOsFbpHLVM6tB8ZbaxumlJkBag==
|
15
|
+
-----END CERTIFICATE REQUEST-----
|
@@ -0,0 +1 @@
|
|
1
|
+
MySecretPassword
|
@@ -0,0 +1,18 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIC4jCCAcqgAwIBAgIBATANBgkqhkiG9w0BAQsFADATMREwDwYDVQQDDAhNeVRl
|
3
|
+
c3RDQTAeFw0xNjA1MTAxNjU3NTlaFw0xNzA1MTAxNjU3NTlaMCUxEjAQBgNVBAMT
|
4
|
+
CWxvY2FsaG9zdDEPMA0GA1UEChMGc2VydmVyMIIBIjANBgkqhkiG9w0BAQEFAAOC
|
5
|
+
AQ8AMIIBCgKCAQEAuey95MXuzVtVQlOtQ083r9fZjuJ2D6kMmu/KBAYf95dzLKa/
|
6
|
+
OhtUVWtyQOt9kvKFEhOjKrqEifhN/635zXNkHPGAwkAj0+wQVPbrR9QcjP/7Ifrm
|
7
|
+
GycYQ3fs7klsftcg9yplZ3haBosUoDrJ+5B3MOUjN+2XjUCdJygLRVFCz80C0ePU
|
8
|
+
pGKiq1Uh8jLpCho3HwXq8k6VQPGREq5avRrcTjTXSA5EuBZM8sdzPYix7+zyv3Qd
|
9
|
+
o5bHcHHfZg1FLmgH+pKThuudiq18ywCEeZpI6CqYrNbzNgmSmu1fUKq97VZFJjRQ
|
10
|
+
Tx7TQexLK8LG3H4Oqzb9NOlwRqOgjHp9BSwvCQIDAQABoy8wLTAJBgNVHRMEAjAA
|
11
|
+
MAsGA1UdDwQEAwIFIDATBgNVHSUEDDAKBggrBgEFBQcDATANBgkqhkiG9w0BAQsF
|
12
|
+
AAOCAQEAiN+aGl2gLGwnn9ja5aJ6es3zM7GuRkIhP0+UpUjt9j027KzXM88X5/pS
|
13
|
+
n1rDS/yp0sWwGKU+CfPO/9zrFihZ+V5fQKNJpMo4xBr6g9lhyK3U9iRv1CB+88kD
|
14
|
+
ad9C8HvPzftQgu+q6fv+8RfU9NbWjq/I0hW6izzOdcwK4zCN9segjfRGy6M+E9Oo
|
15
|
+
1QTfUHHqHCDowlRSR5iFJP1RopyfBILz8dAZ98jqneYFulkrKFc8MjNP+GoLJ3Je
|
16
|
+
2iVycYbOST4WjKurjaf7huXtYaqmFwY/dBaSDG8qrLVCGjYtf98PIFP2E+Tv8Yvw
|
17
|
+
8TIAsXtglo5qh1hnTntnZZ3yaFgrXg==
|
18
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,27 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
MIIEpQIBAAKCAQEAuey95MXuzVtVQlOtQ083r9fZjuJ2D6kMmu/KBAYf95dzLKa/
|
3
|
+
OhtUVWtyQOt9kvKFEhOjKrqEifhN/635zXNkHPGAwkAj0+wQVPbrR9QcjP/7Ifrm
|
4
|
+
GycYQ3fs7klsftcg9yplZ3haBosUoDrJ+5B3MOUjN+2XjUCdJygLRVFCz80C0ePU
|
5
|
+
pGKiq1Uh8jLpCho3HwXq8k6VQPGREq5avRrcTjTXSA5EuBZM8sdzPYix7+zyv3Qd
|
6
|
+
o5bHcHHfZg1FLmgH+pKThuudiq18ywCEeZpI6CqYrNbzNgmSmu1fUKq97VZFJjRQ
|
7
|
+
Tx7TQexLK8LG3H4Oqzb9NOlwRqOgjHp9BSwvCQIDAQABAoIBAQCZTYGOXz52iXaV
|
8
|
+
iBV3SJxsG5jB3izm4McKAeoaw0ochv5qtNs8eEhjXoMI0KPsRJhAvXxuwPiEIv99
|
9
|
+
cOBm7VyBGQjIIsbn+N/GjwqVYWphQLi73ftaLDQvfXUZTeVt+MivxH90f6ILfyZ0
|
10
|
+
r8TX7ti4slcFyJyL1dk+7h/M+iIS4FkYAkXUQdf8cYmF9vdUONQQ4owRshqmjB8+
|
11
|
+
CndHrz70DqfCMuwee7NXWt99DzlqpHqYr0s36SB+euepFrqWzPcfuajEjq42tz6l
|
12
|
+
d1VeRLCbyMKVOvGnUhEvQQo6JRebz55l7EYWA/gg9eh4n6qHuCfHf1gB1KZDBSjm
|
13
|
+
mvgdc4PZAoGBAOyop18aMwiUU9eSR6onePfGl3PPLIlYE1dNamtUzY6qcNQ/Cz2R
|
14
|
+
QiDYC9RuGVWDUyBL+tM/5+vDMD/PK2YWaYVm8PSHAkC8BnD6mMOo1SGPVH/1HshC
|
15
|
+
2nyUPSOqlrZ5gCTQy+jNgYQqg6Bbl/x9uWZcFAXXSNqDiFzoJwxys2nbAoGBAMke
|
16
|
+
owjEM6fuY4aKx9ngzOzK8PKwCqbNAiolVPby2/GOqsgDNcOZXHfjckMpJg1ZGil7
|
17
|
+
L9LGDIYyZjbm9isEhB1h5PJggonHDmjwTC/fJxJeFp5Ivj8VKXSipvqDZOhEP4N/
|
18
|
+
y4LGAOEL6m1xOCnZzgyju1yNGjtRLx+yEKX6zPnrAoGBANx5VswbvVWN0fov9gHI
|
19
|
+
GkNDSQ+D/6rIWeRoY+8wJvx1Pv4M6azm6aNtgr/Z/lITMVsSTc+GZsrWodmgaH8H
|
20
|
+
/DBisbItIOUsBhg07iLB5CUKwZ8fvhi1Z5TOCZNztkqzMLWbq4vsAHAfp1a6XgLF
|
21
|
+
IfcBa0nxwZaJGX3sbYyEQy8nAoGAY3may/g3UIVRhrdX2AUfdrN975tw+UWHH49t
|
22
|
+
ceN3NAgLongr/H37RXUjC+LrZki+7ut2IPtCMJH3Coq8EVTff6Tu148yobDqCK9q
|
23
|
+
D3eBXM1axJlYN91grsbQbjHVFCjFfWYVI66JusXpAo6wZ8rJ5miJgGJuKg6ijzvE
|
24
|
+
jkP5ZFcCgYEAxZFA5htznu0XDqhnlylo4N+V4ERfC86AjL3x0DDcFEYtzKKvI0AO
|
25
|
+
i7n9UQgT1YisFhG5nPJ+iMxliqACbHm00k5pua6ediBVWCUWEwVi9Uu4geQU7C6G
|
26
|
+
wLGiHPqLCzHGMFGWj1TSqg/Fd08meF0R/L36KlPI1na+EAbEvrefhXk=
|
27
|
+
-----END RSA PRIVATE KEY-----
|
@@ -0,0 +1 @@
|
|
1
|
+
MySecretPassword
|
Binary file
|
@@ -0,0 +1,15 @@
|
|
1
|
+
-----BEGIN CERTIFICATE REQUEST-----
|
2
|
+
MIICajCCAVICAQAwJTESMBAGA1UEAxMJbG9jYWxob3N0MQ8wDQYDVQQKEwZzZXJ2
|
3
|
+
ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC57L3kxe7NW1VCU61D
|
4
|
+
Tzev19mO4nYPqQya78oEBh/3l3Mspr86G1RVa3JA632S8oUSE6MquoSJ+E3/rfnN
|
5
|
+
c2Qc8YDCQCPT7BBU9utH1ByM//sh+uYbJxhDd+zuSWx+1yD3KmVneFoGixSgOsn7
|
6
|
+
kHcw5SM37ZeNQJ0nKAtFUULPzQLR49SkYqKrVSHyMukKGjcfBeryTpVA8ZESrlq9
|
7
|
+
GtxONNdIDkS4Fkzyx3M9iLHv7PK/dB2jlsdwcd9mDUUuaAf6kpOG652KrXzLAIR5
|
8
|
+
mkjoKpis1vM2CZKa7V9Qqr3tVkUmNFBPHtNB7Esrwsbcfg6rNv006XBGo6CMen0F
|
9
|
+
LC8JAgMBAAGgADANBgkqhkiG9w0BAQUFAAOCAQEAFKV3mbWhNsvwi1h+Hhqt1Yyu
|
10
|
+
MPL+eXhcNSg4xev8Wf0TVRxNRXwlrXOqMWb75Q3ik0vvjR6LQSEEp20obwjuynQF
|
11
|
+
DnIoBza4M9QI8aanA5vlF8h9tNROER2PPsc7CHiCuh7Nga1IrCza286tPtaSHICJ
|
12
|
+
Rbis9EnVaAqF/haofqWzYoodz5RRU6tS4HXpkqtHGDMGA/dCIzZmTSOo+cSp+w5N
|
13
|
+
Nyx+DnI6w60VQDQJcwwMa+oIPvGdgAOEJ2tosiyJfVpbLNW5kaDun7kwqJ8eELV6
|
14
|
+
l/BxgRJAbg+SOq3BdY1c0v1kpym3IaaIc7hUHnEGsZw+8pinC2hiJDUo1sK7RA==
|
15
|
+
-----END CERTIFICATE REQUEST-----
|
Binary file
|
@@ -0,0 +1,17 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIICyDCCAbCgAwIBAgIJALRwatuOz4bfMA0GCSqGSIb3DQEBCwUAMBMxETAPBgNV
|
3
|
+
BAMMCE15VGVzdENBMCAXDTE2MDUxMDE2NTY0MFoYDzMwMTUwOTExMTY1NjQwWjAT
|
4
|
+
MREwDwYDVQQDDAhNeVRlc3RDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
|
5
|
+
ggEBALj98fWtjaForBa3XSrHjiYq+Mb7yzz+uW1lB+ZfCpM7xuXPjTyn3MZM5R5n
|
6
|
+
vQd1lnRgd5cdW7sMrp2wHo5/VLsMHNUEANZMwRBmYMe7YL5lNAUbIBC9acHd7/UX
|
7
|
+
NnGcZja0AqsphljVKqOAX2jVZcaAh0ttxXJI8FCUX3JOeHN1qrLp04xOgqFbW2Ii
|
8
|
+
s7aeHwN/HiUci4MNW2SzrTSMko9X0SssKwrsaxo3Qe83fnP0nLAfGBBV8GBMdmvX
|
9
|
+
C96rZwa2yBIeldPRNnJyL7K3SC885OjrTbPTZ0gNFxnDDKwVhx7PojznT1/OdYp6
|
10
|
+
90BU56z1bZ+G5RjhnWXUekMDaNsCAwEAAaMdMBswDAYDVR0TBAUwAwEB/zALBgNV
|
11
|
+
HQ8EBAMCAQYwDQYJKoZIhvcNAQELBQADggEBACNRYKlkptU7WdhS7jfquHkHGAl2
|
12
|
+
ix53E3ifHWRLYqWqlcwSyIh8iqD094iUUK9awTWUTQu4ccL+XT3UhpaEOi4BiyUQ
|
13
|
+
4RN4OT15vmEl5pW9nzfsfvkgJtqfomnIgsWeV8qiCUeL1IbPW6LsAz8RQJFuOf+e
|
14
|
+
bt8O1JFGJNy+II/QdBouZwjlijQO6FHWeckAshI/n+snntkOqTsOF+7WPfaC4Grn
|
15
|
+
8pCP66XzN0/qPLnR3ZeHq7jhS0SZFfXSPC0iUMAIZq98MdPy2VJ4ayKv3QL3/T6S
|
16
|
+
/+fkS4KiPeQP2+tOGz757cdDHooFbdV2nYwSpuY/GzjL2Sh5Qc/+Ew6RVUw=
|
17
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,18 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIC4jCCAcqgAwIBAgIBATANBgkqhkiG9w0BAQsFADATMREwDwYDVQQDDAhNeVRl
|
3
|
+
c3RDQTAeFw0xNjA1MTAxNjU3NTlaFw0xNzA1MTAxNjU3NTlaMCUxEjAQBgNVBAMT
|
4
|
+
CWxvY2FsaG9zdDEPMA0GA1UEChMGc2VydmVyMIIBIjANBgkqhkiG9w0BAQEFAAOC
|
5
|
+
AQ8AMIIBCgKCAQEAuey95MXuzVtVQlOtQ083r9fZjuJ2D6kMmu/KBAYf95dzLKa/
|
6
|
+
OhtUVWtyQOt9kvKFEhOjKrqEifhN/635zXNkHPGAwkAj0+wQVPbrR9QcjP/7Ifrm
|
7
|
+
GycYQ3fs7klsftcg9yplZ3haBosUoDrJ+5B3MOUjN+2XjUCdJygLRVFCz80C0ePU
|
8
|
+
pGKiq1Uh8jLpCho3HwXq8k6VQPGREq5avRrcTjTXSA5EuBZM8sdzPYix7+zyv3Qd
|
9
|
+
o5bHcHHfZg1FLmgH+pKThuudiq18ywCEeZpI6CqYrNbzNgmSmu1fUKq97VZFJjRQ
|
10
|
+
Tx7TQexLK8LG3H4Oqzb9NOlwRqOgjHp9BSwvCQIDAQABoy8wLTAJBgNVHRMEAjAA
|
11
|
+
MAsGA1UdDwQEAwIFIDATBgNVHSUEDDAKBggrBgEFBQcDATANBgkqhkiG9w0BAQsF
|
12
|
+
AAOCAQEAiN+aGl2gLGwnn9ja5aJ6es3zM7GuRkIhP0+UpUjt9j027KzXM88X5/pS
|
13
|
+
n1rDS/yp0sWwGKU+CfPO/9zrFihZ+V5fQKNJpMo4xBr6g9lhyK3U9iRv1CB+88kD
|
14
|
+
ad9C8HvPzftQgu+q6fv+8RfU9NbWjq/I0hW6izzOdcwK4zCN9segjfRGy6M+E9Oo
|
15
|
+
1QTfUHHqHCDowlRSR5iFJP1RopyfBILz8dAZ98jqneYFulkrKFc8MjNP+GoLJ3Je
|
16
|
+
2iVycYbOST4WjKurjaf7huXtYaqmFwY/dBaSDG8qrLVCGjYtf98PIFP2E+Tv8Yvw
|
17
|
+
8TIAsXtglo5qh1hnTntnZZ3yaFgrXg==
|
18
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,18 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIC4jCCAcqgAwIBAgIBAjANBgkqhkiG9w0BAQsFADATMREwDwYDVQQDDAhNeVRl
|
3
|
+
c3RDQTAeFw0xNjA1MTAxNzAwMDFaFw0xNzA1MTAxNzAwMDFaMCUxEjAQBgNVBAMT
|
4
|
+
CWxvY2FsaG9zdDEPMA0GA1UEChMGY2xpZW50MIIBIjANBgkqhkiG9w0BAQEFAAOC
|
5
|
+
AQ8AMIIBCgKCAQEAo9dLuAbDY5jBAlx1UqsOQf480ni4BVbxOjEAL4PVBfIU4xmn
|
6
|
+
F3Z+tAvmcd3oNc9JYYxXVq5sKA/HE5eWhVdXdQWX0IrTHraJAXvRlHuu1TSuTvuq
|
7
|
+
7QgQVFbZdWzRfvukLoKPDm1DtI5BFJ7L83j8RJy6tyvek4KzsHtG3JKoVzoz5+Hz
|
8
|
+
7fL7gE76Dr82uH1t9WouZ5oXS2HgBR0l9CTYxARa6OMrr/+r4w1RoYDXnrlit5Ft
|
9
|
+
81mQAVibnei9dN3EXoECUflclQ1nip12XVuoH9GXF6AetzDsbhInYvRoxm1Q9pNz
|
10
|
+
g/L1QswPkF5MCuSIkkwgtHazZkIWlUKqPMVtIQIDAQABoy8wLTAJBgNVHRMEAjAA
|
11
|
+
MAsGA1UdDwQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAjANBgkqhkiG9w0BAQsF
|
12
|
+
AAOCAQEAuJ1ruPLP2WdRZz5bb/qgaBqADUVKJu3Ny9TsEK/oZzUwgWVc4hvsiFms
|
13
|
+
gj/JVmXy4f36s6VLfOiDNHI6jIb31wvfduYV58Z+IUXMyj9OV4ZxqpQBqS9YK1Gq
|
14
|
+
2AChr1wYUs+WmnNATwa4Q51ytTU4DcLdJTusZIfo5BAvnnz35QnQPsB11EEHRovA
|
15
|
+
1bnzvG6uKAG0MjxNvXpWRUImNXrIKrbRXnvu5FDXAVMPg674g1QMhaa6SlPO5bFP
|
16
|
+
meg4+1jH2tUMKR8qCS4KfOfbccNF/u09pRYcMJwiTXu++gCAu1il9jn0C5zxX3Ni
|
17
|
+
GKm0/sj2BpZf9D4Kl8LppAIxcphBUg==
|
18
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1 @@
|
|
1
|
+
unique_subject = yes
|
@@ -0,0 +1 @@
|
|
1
|
+
unique_subject = yes
|
@@ -0,0 +1 @@
|
|
1
|
+
V 170510165759Z 01 unknown /CN=localhost/O=server
|
@@ -0,0 +1,53 @@
|
|
1
|
+
[ ca ]
|
2
|
+
default_ca = testca
|
3
|
+
|
4
|
+
[ testca ]
|
5
|
+
dir = .
|
6
|
+
certificate = $dir/cacert.pem
|
7
|
+
database = $dir/index.txt
|
8
|
+
new_certs_dir = $dir/certs
|
9
|
+
private_key = $dir/private/cakey.pem
|
10
|
+
serial = $dir/serial
|
11
|
+
|
12
|
+
default_crl_days = 7
|
13
|
+
default_days = 365
|
14
|
+
default_md = sha256
|
15
|
+
|
16
|
+
policy = testca_policy
|
17
|
+
x509_extensions = certificate_extensions
|
18
|
+
|
19
|
+
[ testca_policy ]
|
20
|
+
commonName = supplied
|
21
|
+
stateOrProvinceName = optional
|
22
|
+
countryName = optional
|
23
|
+
emailAddress = optional
|
24
|
+
organizationName = optional
|
25
|
+
organizationalUnitName = optional
|
26
|
+
|
27
|
+
[ certificate_extensions ]
|
28
|
+
basicConstraints = CA:false
|
29
|
+
|
30
|
+
[ req ]
|
31
|
+
default_bits = 2048
|
32
|
+
default_keyfile = ./private/cakey.pem
|
33
|
+
default_md = sha256
|
34
|
+
prompt = yes
|
35
|
+
distinguished_name = root_ca_distinguished_name
|
36
|
+
x509_extensions = root_ca_extensions
|
37
|
+
|
38
|
+
[ root_ca_distinguished_name ]
|
39
|
+
commonName = hostname
|
40
|
+
|
41
|
+
[ root_ca_extensions ]
|
42
|
+
basicConstraints = CA:true
|
43
|
+
keyUsage = keyCertSign, cRLSign
|
44
|
+
|
45
|
+
[ client_ca_extensions ]
|
46
|
+
basicConstraints = CA:false
|
47
|
+
keyUsage = digitalSignature
|
48
|
+
extendedKeyUsage = 1.3.6.1.5.5.7.3.2
|
49
|
+
|
50
|
+
[ server_ca_extensions ]
|
51
|
+
basicConstraints = CA:false
|
52
|
+
keyUsage = keyEncipherment
|
53
|
+
extendedKeyUsage = 1.3.6.1.5.5.7.3.1
|
@@ -0,0 +1,27 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
MIIEpQIBAAKCAQEAuP3x9a2NoWisFrddKseOJir4xvvLPP65bWUH5l8KkzvG5c+N
|
3
|
+
PKfcxkzlHme9B3WWdGB3lx1buwyunbAejn9Uuwwc1QQA1kzBEGZgx7tgvmU0BRsg
|
4
|
+
EL1pwd3v9Rc2cZxmNrQCqymGWNUqo4BfaNVlxoCHS23FckjwUJRfck54c3WqsunT
|
5
|
+
jE6CoVtbYiKztp4fA38eJRyLgw1bZLOtNIySj1fRKywrCuxrGjdB7zd+c/ScsB8Y
|
6
|
+
EFXwYEx2a9cL3qtnBrbIEh6V09E2cnIvsrdILzzk6OtNs9NnSA0XGcMMrBWHHs+i
|
7
|
+
POdPX851inr3QFTnrPVtn4blGOGdZdR6QwNo2wIDAQABAoIBADoXZLflfChHmmK3
|
8
|
+
ygX5DGZn8B9sSnIo+0mjBEwPZF6/0sGv34ZAoE+VLg3SPcXt4wVAlc1aZsfiP6M8
|
9
|
+
/xt4WL80Gom57BlfmPDxdUrDSKoBVciUsAkRsfgzHXs1gt9CYcaj2IKvU4Tpy630
|
10
|
+
TgG5oXAoRFQncG1nAjALp71ZbvGyZDOK2+/Vjs0NITyC+4srnafiF8pwLXmgm0Zj
|
11
|
+
FVyCy8H/dwt7/pJKKkDX8Mq6kdvvROg8QDqTyCsTn3qAfDQUjO1BJje7x31E+lXW
|
12
|
+
/FgUqs43ATU2HVczP0fbBZeGeFFTRycypmmSXYb9eZ05mDf8cm93V8KMPkTVh4Pu
|
13
|
+
6/kF8AECgYEA8VpoTggar66f/0rfxX263q+L5YD8fwfuqcjLx/Bnuzpp1POhsTLD
|
14
|
+
Gv0W5FcAf4i1jfnBevrk9q9WFnnUpUvX7Y+e1cvK9M5BuVRs77C4mE5IQ7hcHN6I
|
15
|
+
vNgYihIK/PTVXYrT2j1EFLBwD2QWwO7BcV5aAiShlce7qC8fJeAhRtsCgYEAxDft
|
16
|
+
QIUHm2MIzZD25q6fkki1Rx0ifOjO7AlK0NIyxQ+gsxZQrrUsSqcgC/W3XJSONeCY
|
17
|
+
UjbHRQmhzkexA6ZFjgrL39qHL9x0kzle1dZ+oFGVQKiIMWn1WfEL0baDxMjFKDQt
|
18
|
+
xF0SWRHZsIDPUjZzPTyfaPf8I148pIoSILB7BgECgYEA3679ioxiRz5dlNqM59ku
|
19
|
+
DuK9klfoK8drPzoU+1nomZJ6sV2XFsZIIsQ7qiakFI7cTRgTZGoRODuqWqxRE11m
|
20
|
+
Ywq/l8AHermKGjyPtdmgS7AJs5Gy9SKdsf/JRnWQb35uHQLkc5hid5ZKVUla+TaO
|
21
|
+
XAao/uF6THnPhwEdKho+XQ8CgYEAiyQBiJQM/eIvVt4qRxCjNS975M7DKwJH4VcB
|
22
|
+
h6zWtajMUtJLKmhs3Q9ACVsXyH3LjmcSfJI9ojYfWFC8NJNOlVgQlE+5N3ZD8DZp
|
23
|
+
ioeMyZCwnuYjla7Gfh4RPIgJTpz0OfsuTSWWojSnQqNE4M6dz1nSzLO1RztHE4KZ
|
24
|
+
MjcTNgECgYEAmeEA8KJzfsSgjjbhOmzxEJwRxzq0HTknTmWyEIamQBgFhaQ3AqZ+
|
25
|
+
cZWkqS34foKxjLLXp3AMukpS50yRB98Wzaa7eoA/H0zXlRjA6id9qFuCXt+E9e/5
|
26
|
+
sjPhQphj8473SsviSndT29JadTHgY8nSmXtxx+whO29D9Ods0laGb8A=
|
27
|
+
-----END RSA PRIVATE KEY-----
|
@@ -0,0 +1 @@
|
|
1
|
+
03
|
@@ -0,0 +1 @@
|
|
1
|
+
02
|
@@ -34,9 +34,10 @@ describe LogStash::PluginMixins::RabbitMQConnection do
|
|
34
34
|
|
35
35
|
let(:rabbitmq_settings) { super.merge({"connection_timeout" => 123,
|
36
36
|
"heartbeat" => 456,
|
37
|
-
"ssl" =>
|
38
|
-
"
|
39
|
-
"
|
37
|
+
"ssl" => true,
|
38
|
+
"ssl_version" => "TLSv1.1",
|
39
|
+
"ssl_certificate_path" => path,
|
40
|
+
"ssl_certificate_password" => "123"}) }
|
40
41
|
|
41
42
|
it "should set the timeout to the expected value" do
|
42
43
|
expect(instance.rabbitmq_settings[:timeout]).to eql(rabbitmq_settings["connection_timeout"])
|
@@ -47,15 +48,15 @@ describe LogStash::PluginMixins::RabbitMQConnection do
|
|
47
48
|
end
|
48
49
|
|
49
50
|
it "should set tls to the expected value" do
|
50
|
-
expect(instance.rabbitmq_settings[:tls]).to eql(
|
51
|
+
expect(instance.rabbitmq_settings[:tls]).to eql("TLSv1.1")
|
51
52
|
end
|
52
53
|
|
53
54
|
it "should set tls_certificate_path to the expected value" do
|
54
|
-
expect(instance.rabbitmq_settings[:tls_certificate_path]).to eql(rabbitmq_settings["
|
55
|
+
expect(instance.rabbitmq_settings[:tls_certificate_path]).to eql(rabbitmq_settings["ssl_certificate_path"])
|
55
56
|
end
|
56
57
|
|
57
58
|
it "should set tls_certificate_password to the expected value" do
|
58
|
-
expect(instance.rabbitmq_settings[:tls_certificate_password]).to eql(rabbitmq_settings["
|
59
|
+
expect(instance.rabbitmq_settings[:tls_certificate_password]).to eql(rabbitmq_settings["ssl_certificate_password"])
|
59
60
|
end
|
60
61
|
end
|
61
62
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: logstash-mixin-rabbitmq_connection
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 4.0
|
4
|
+
version: 4.1.0
|
5
5
|
platform: java
|
6
6
|
authors:
|
7
7
|
- Elastic
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2016-05-
|
11
|
+
date: 2016-05-12 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: logstash-core-plugin-api
|
@@ -111,6 +111,29 @@ files:
|
|
111
111
|
- Rakefile
|
112
112
|
- lib/logstash/plugin_mixins/rabbitmq_connection.rb
|
113
113
|
- logstash-mixin-rabbitmq_connection.gemspec
|
114
|
+
- spec/fixtures/client/cert.pem
|
115
|
+
- spec/fixtures/client/key.pem
|
116
|
+
- spec/fixtures/client/keycert.p12
|
117
|
+
- spec/fixtures/client/req.pem
|
118
|
+
- spec/fixtures/password_for_files
|
119
|
+
- spec/fixtures/server/cert.pem
|
120
|
+
- spec/fixtures/server/key.pem
|
121
|
+
- spec/fixtures/server/key_password
|
122
|
+
- spec/fixtures/server/keycert.p12
|
123
|
+
- spec/fixtures/server/rabbitmq.config
|
124
|
+
- spec/fixtures/server/req.pem
|
125
|
+
- spec/fixtures/testca/cacert.cer
|
126
|
+
- spec/fixtures/testca/cacert.pem
|
127
|
+
- spec/fixtures/testca/certs/01.pem
|
128
|
+
- spec/fixtures/testca/certs/02.pem
|
129
|
+
- spec/fixtures/testca/index.txt
|
130
|
+
- spec/fixtures/testca/index.txt.attr
|
131
|
+
- spec/fixtures/testca/index.txt.attr.old
|
132
|
+
- spec/fixtures/testca/index.txt.old
|
133
|
+
- spec/fixtures/testca/openssl.cnf
|
134
|
+
- spec/fixtures/testca/private/cakey.pem
|
135
|
+
- spec/fixtures/testca/serial
|
136
|
+
- spec/fixtures/testca/serial.old
|
114
137
|
- spec/plugin_mixins/rabbitmq_connection_spec.rb
|
115
138
|
homepage: http://www.elastic.co/guide/en/logstash/current/index.html
|
116
139
|
licenses:
|
@@ -137,4 +160,27 @@ signing_key:
|
|
137
160
|
specification_version: 4
|
138
161
|
summary: Common functionality for RabbitMQ plugins
|
139
162
|
test_files:
|
163
|
+
- spec/fixtures/client/cert.pem
|
164
|
+
- spec/fixtures/client/key.pem
|
165
|
+
- spec/fixtures/client/keycert.p12
|
166
|
+
- spec/fixtures/client/req.pem
|
167
|
+
- spec/fixtures/password_for_files
|
168
|
+
- spec/fixtures/server/cert.pem
|
169
|
+
- spec/fixtures/server/key.pem
|
170
|
+
- spec/fixtures/server/key_password
|
171
|
+
- spec/fixtures/server/keycert.p12
|
172
|
+
- spec/fixtures/server/rabbitmq.config
|
173
|
+
- spec/fixtures/server/req.pem
|
174
|
+
- spec/fixtures/testca/cacert.cer
|
175
|
+
- spec/fixtures/testca/cacert.pem
|
176
|
+
- spec/fixtures/testca/certs/01.pem
|
177
|
+
- spec/fixtures/testca/certs/02.pem
|
178
|
+
- spec/fixtures/testca/index.txt
|
179
|
+
- spec/fixtures/testca/index.txt.attr
|
180
|
+
- spec/fixtures/testca/index.txt.attr.old
|
181
|
+
- spec/fixtures/testca/index.txt.old
|
182
|
+
- spec/fixtures/testca/openssl.cnf
|
183
|
+
- spec/fixtures/testca/private/cakey.pem
|
184
|
+
- spec/fixtures/testca/serial
|
185
|
+
- spec/fixtures/testca/serial.old
|
140
186
|
- spec/plugin_mixins/rabbitmq_connection_spec.rb
|