logstash-mixin-rabbitmq_connection 4.0.1-java → 4.1.0-java
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG +5 -0
- data/lib/logstash/plugin_mixins/rabbitmq_connection.rb +37 -10
- data/logstash-mixin-rabbitmq_connection.gemspec +2 -1
- data/spec/fixtures/client/cert.pem +18 -0
- data/spec/fixtures/client/key.pem +27 -0
- data/spec/fixtures/client/keycert.p12 +0 -0
- data/spec/fixtures/client/req.pem +15 -0
- data/spec/fixtures/password_for_files +1 -0
- data/spec/fixtures/server/cert.pem +18 -0
- data/spec/fixtures/server/key.pem +27 -0
- data/spec/fixtures/server/key_password +1 -0
- data/spec/fixtures/server/keycert.p12 +0 -0
- data/spec/fixtures/server/rabbitmq.config +10 -0
- data/spec/fixtures/server/req.pem +15 -0
- data/spec/fixtures/testca/cacert.cer +0 -0
- data/spec/fixtures/testca/cacert.pem +17 -0
- data/spec/fixtures/testca/certs/01.pem +18 -0
- data/spec/fixtures/testca/certs/02.pem +18 -0
- data/spec/fixtures/testca/index.txt +2 -0
- data/spec/fixtures/testca/index.txt.attr +1 -0
- data/spec/fixtures/testca/index.txt.attr.old +1 -0
- data/spec/fixtures/testca/index.txt.old +1 -0
- data/spec/fixtures/testca/openssl.cnf +53 -0
- data/spec/fixtures/testca/private/cakey.pem +27 -0
- data/spec/fixtures/testca/serial +1 -0
- data/spec/fixtures/testca/serial.old +1 -0
- data/spec/plugin_mixins/rabbitmq_connection_spec.rb +7 -6
- metadata +48 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 3180b6f7141951d8dfdc855f0e9f084042a72384
|
4
|
+
data.tar.gz: c4c34412be5a2d029c46626321aa2ce561ed8284
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b7719c3c4f1d6cb5493c6b5ce0ded6a30471100f45924d1f1c39272683e60985d42a6ce9d194154241a2d92c6d87d4ebeeec75ca07b0c7735ffb31d08e0dd688
|
7
|
+
data.tar.gz: eaa10a409af9933e2232a93a7347ef23de8a1ea7f73c1e27fd2d3ccba52e055d478c880c08011c376396811c1113c67fa21811ff9ddaa0a05b0492e9ba78976b
|
data/CHANGELOG
CHANGED
@@ -1,3 +1,8 @@
|
|
1
|
+
* 4.1.0
|
2
|
+
- Fix SSL option to be boolean once again
|
3
|
+
- Add separate ssl_version parameter
|
4
|
+
- Mark verify_ssl parameter as obsolete since it never worked
|
5
|
+
- Better checks for SSL argument consistency
|
1
6
|
* 2.4.0
|
2
7
|
- Add SSL/TLS Support
|
3
8
|
- Add support for "x-consistent-hash" and "x-modulus-hash" exchanges
|
@@ -36,12 +36,24 @@ module LogStash
|
|
36
36
|
# slash.
|
37
37
|
config :vhost, :validate => :string, :default => "/"
|
38
38
|
|
39
|
-
# Enable or disable SSL
|
40
|
-
#
|
41
|
-
|
39
|
+
# Enable or disable SSL.
|
40
|
+
# Note that by default remote certificate verification is off.
|
41
|
+
# Specify ssl_certificate_path and ssl_certificate_password if you need
|
42
|
+
# certificate verification
|
43
|
+
config :ssl, :validate => :boolean
|
42
44
|
|
43
|
-
#
|
44
|
-
config :
|
45
|
+
# Version of the SSL protocol to use.
|
46
|
+
config :ssl_version, :validate => :string, :default => "TLSv1.2"
|
47
|
+
|
48
|
+
config :verify_ssl, :validate => :boolean, :default => false,
|
49
|
+
:obsolete => "This function did not actually function correctly and was removed." +
|
50
|
+
"If you wish to validate SSL certs use the ssl_certificate_path and ssl_certificate_password options."
|
51
|
+
|
52
|
+
# Path to an SSL certificate in PKCS12 (.p12) format used for verifying the remote host
|
53
|
+
config :ssl_certificate_path, :validate => :path
|
54
|
+
|
55
|
+
# Password for the encrypted PKCS12 (.p12) certificate file specified in ssl_certificate_path
|
56
|
+
config :ssl_certificate_password, :validate => :string
|
45
57
|
|
46
58
|
# Enable or disable logging
|
47
59
|
config :debug, :validate => :boolean, :default => false, :deprecated => "Use the logstash --debug flag for this instead."
|
@@ -62,10 +74,10 @@ module LogStash
|
|
62
74
|
config :passive, :validate => :boolean, :default => false
|
63
75
|
|
64
76
|
# TLS certifcate path
|
65
|
-
config :tls_certificate_path, :validate => :path
|
77
|
+
config :tls_certificate_path, :validate => :path, :deprecated => true
|
66
78
|
|
67
79
|
# TLS certificate password
|
68
|
-
config :tls_certificate_password, :validate => :string
|
80
|
+
config :tls_certificate_password, :validate => :string, :deprecated => true
|
69
81
|
|
70
82
|
# Extra queue arguments as an array.
|
71
83
|
# To make a RabbitMQ queue mirrored, use: `{"x-ha-policy" => "all"}`
|
@@ -96,9 +108,22 @@ module LogStash
|
|
96
108
|
|
97
109
|
s[:timeout] = @connection_timeout || 0
|
98
110
|
s[:heartbeat] = @heartbeat || 0
|
99
|
-
|
100
|
-
|
101
|
-
|
111
|
+
|
112
|
+
if @ssl
|
113
|
+
s[:tls] = @ssl_version
|
114
|
+
|
115
|
+
cert_path = @ssl_certificate_path || @tls_certificate_path
|
116
|
+
cert_pass = @ssl_certificate_password || @tls_certificate_password
|
117
|
+
|
118
|
+
if !!cert_path ^ !!cert_pass
|
119
|
+
raise LogStash::ConfigurationError, "RabbitMQ requires both ssl_certificate_path AND ssl_certificate_password to be set!"
|
120
|
+
end
|
121
|
+
|
122
|
+
s[:tls_certificate_path] = cert_path
|
123
|
+
s[:tls_certificate_password] = cert_pass
|
124
|
+
end
|
125
|
+
|
126
|
+
|
102
127
|
@rabbitmq_settings = s
|
103
128
|
end
|
104
129
|
|
@@ -147,6 +172,8 @@ module LogStash
|
|
147
172
|
@logger.debug? && @logger.debug("Connecting to RabbitMQ. Settings: #{rabbitmq_settings.inspect}")
|
148
173
|
|
149
174
|
connection = MarchHare.connect(rabbitmq_settings)
|
175
|
+
|
176
|
+
|
150
177
|
connection.on_blocked { @logger.warn("RabbitMQ output blocked! Check your RabbitMQ instance!") }
|
151
178
|
connection.on_unblocked { @logger.warn("RabbitMQ output unblocked!") }
|
152
179
|
|
@@ -1,6 +1,7 @@
|
|
1
|
+
|
1
2
|
Gem::Specification.new do |s|
|
2
3
|
s.name = 'logstash-mixin-rabbitmq_connection'
|
3
|
-
s.version = '4.0
|
4
|
+
s.version = '4.1.0'
|
4
5
|
s.licenses = ['Apache License (2.0)']
|
5
6
|
s.summary = "Common functionality for RabbitMQ plugins"
|
6
7
|
s.description = "This gem is a Logstash plugin required to be installed on top of the Logstash core pipeline using $LS_HOME/bin/logstash-plugin install gemname. This gem is not a stand-alone program"
|
@@ -0,0 +1,18 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIC4jCCAcqgAwIBAgIBAjANBgkqhkiG9w0BAQsFADATMREwDwYDVQQDDAhNeVRl
|
3
|
+
c3RDQTAeFw0xNjA1MTAxNzAwMDFaFw0xNzA1MTAxNzAwMDFaMCUxEjAQBgNVBAMT
|
4
|
+
CWxvY2FsaG9zdDEPMA0GA1UEChMGY2xpZW50MIIBIjANBgkqhkiG9w0BAQEFAAOC
|
5
|
+
AQ8AMIIBCgKCAQEAo9dLuAbDY5jBAlx1UqsOQf480ni4BVbxOjEAL4PVBfIU4xmn
|
6
|
+
F3Z+tAvmcd3oNc9JYYxXVq5sKA/HE5eWhVdXdQWX0IrTHraJAXvRlHuu1TSuTvuq
|
7
|
+
7QgQVFbZdWzRfvukLoKPDm1DtI5BFJ7L83j8RJy6tyvek4KzsHtG3JKoVzoz5+Hz
|
8
|
+
7fL7gE76Dr82uH1t9WouZ5oXS2HgBR0l9CTYxARa6OMrr/+r4w1RoYDXnrlit5Ft
|
9
|
+
81mQAVibnei9dN3EXoECUflclQ1nip12XVuoH9GXF6AetzDsbhInYvRoxm1Q9pNz
|
10
|
+
g/L1QswPkF5MCuSIkkwgtHazZkIWlUKqPMVtIQIDAQABoy8wLTAJBgNVHRMEAjAA
|
11
|
+
MAsGA1UdDwQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAjANBgkqhkiG9w0BAQsF
|
12
|
+
AAOCAQEAuJ1ruPLP2WdRZz5bb/qgaBqADUVKJu3Ny9TsEK/oZzUwgWVc4hvsiFms
|
13
|
+
gj/JVmXy4f36s6VLfOiDNHI6jIb31wvfduYV58Z+IUXMyj9OV4ZxqpQBqS9YK1Gq
|
14
|
+
2AChr1wYUs+WmnNATwa4Q51ytTU4DcLdJTusZIfo5BAvnnz35QnQPsB11EEHRovA
|
15
|
+
1bnzvG6uKAG0MjxNvXpWRUImNXrIKrbRXnvu5FDXAVMPg674g1QMhaa6SlPO5bFP
|
16
|
+
meg4+1jH2tUMKR8qCS4KfOfbccNF/u09pRYcMJwiTXu++gCAu1il9jn0C5zxX3Ni
|
17
|
+
GKm0/sj2BpZf9D4Kl8LppAIxcphBUg==
|
18
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,27 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
MIIEogIBAAKCAQEAo9dLuAbDY5jBAlx1UqsOQf480ni4BVbxOjEAL4PVBfIU4xmn
|
3
|
+
F3Z+tAvmcd3oNc9JYYxXVq5sKA/HE5eWhVdXdQWX0IrTHraJAXvRlHuu1TSuTvuq
|
4
|
+
7QgQVFbZdWzRfvukLoKPDm1DtI5BFJ7L83j8RJy6tyvek4KzsHtG3JKoVzoz5+Hz
|
5
|
+
7fL7gE76Dr82uH1t9WouZ5oXS2HgBR0l9CTYxARa6OMrr/+r4w1RoYDXnrlit5Ft
|
6
|
+
81mQAVibnei9dN3EXoECUflclQ1nip12XVuoH9GXF6AetzDsbhInYvRoxm1Q9pNz
|
7
|
+
g/L1QswPkF5MCuSIkkwgtHazZkIWlUKqPMVtIQIDAQABAoIBAEFgfJdfI4JPhtzR
|
8
|
+
VgN5vEO7FjwJ7aw7yCAnQ2KyYUNxGMKSDum+38oqYXcYTDuEjkx9erBdA01tFkwM
|
9
|
+
FgT5GC3a4HxXmOzNe5f692Mfg2ESF2fu5oKU0CdHTJidpm7cLOReNoVUNksK5I88
|
10
|
+
2jc6FLewLpU+zR7hbaBDYMBNSR0cufli3/tEBC3UkDJUQhqBB99ZSF2qsvY4ayy+
|
11
|
+
SWWspwltPQFmTcrvcWdcfx3DCHgMRexjiFMF9ITxmsAIpwB8JHtqeDQNLyzXH3s5
|
12
|
+
Q5FQhMdzK0O5iKkukLALMlN6+VvZH92mvtN/216TbaKuFnDXwwUsHwBDfErAnyfc
|
13
|
+
KFmidwECgYEAz8/mYg/mnqvKiUDjqM28Bpiw8WEilXMlUPBnDWCh4uOn/EemFQIY
|
14
|
+
zF8isrrNjXmTLGO3Jidesr39VWVhMSdE8rABTj2JNyQyvgNc72E9+QRl4pp7lM6d
|
15
|
+
H9D56MGd3r20gGffjIlsWLCIHb43eAkfwJOyoW+kr+TNUSR3RMlYBNECgYEAydUx
|
16
|
+
GBZMMb04qVGd/rixEk8dbMSnGLzcqLet151jc5b/QmaqjPiK/0iTIQmginXERUJx
|
17
|
+
XI3xQXUkykCuFpNdJ1KgcU1KYH1aJ6j6i62TVzgVlOFWk+z9d1zKOGXJaw/9m11U
|
18
|
+
ThjCHz6WpH6BOy1RvRwGXLz6sU13TDwL9GVzN1ECgYBqIWUpY7GGC3pOioM6LIgA
|
19
|
+
Xm7Pd6ov5TSDl6Mpo9ZJh7a9EuJxDDcZ+ORBn0FnJVXSb8KTi7vDUWBWAoaWkdWW
|
20
|
+
k+i2ypqPPL9lZ1ZJMsJxsJtQFVFT+AkqvJFFG8zCeuP6SBJVNcHNsapydjjh5tb+
|
21
|
+
hO/PnrLe2d05uYPn72QyYQKBgC41HNRC5pbMl1hMUzup1QA4FKh+LTNAqdQGmUov
|
22
|
+
wkEIZNAy6QD1Nf1UBDsgFR0d8R1aJNHnvUAbLZ0QScrpWf5SsGDALTMB/83spc+s
|
23
|
+
oXrqYCaBoGylaTIWkEVxKDfWpV0YdOCcUnUMwzhNrhB6Q6hj7iD1Mv+8mH9fj+0X
|
24
|
+
/NTBAoGAcJoIVPUVI8/0WoaSyzJSS5PRYRyqBh7mMtWRJ9dn3yszaBLyzoItAwWF
|
25
|
+
MKjwvJJJ0E1fGx2gFsHoDEek69ZvwhjoVtzciy/BOkWbetNSXDoNFtj8fZmrDurY
|
26
|
+
6qZGKlG9NI2WN7SU1ZfWIIIV7dNkboKlSwLTwhdmZdr0dSosemc=
|
27
|
+
-----END RSA PRIVATE KEY-----
|
Binary file
|
@@ -0,0 +1,15 @@
|
|
1
|
+
-----BEGIN CERTIFICATE REQUEST-----
|
2
|
+
MIICajCCAVICAQAwJTESMBAGA1UEAxMJbG9jYWxob3N0MQ8wDQYDVQQKEwZjbGll
|
3
|
+
bnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCj10u4BsNjmMECXHVS
|
4
|
+
qw5B/jzSeLgFVvE6MQAvg9UF8hTjGacXdn60C+Zx3eg1z0lhjFdWrmwoD8cTl5aF
|
5
|
+
V1d1BZfQitMetokBe9GUe67VNK5O+6rtCBBUVtl1bNF++6Qugo8ObUO0jkEUnsvz
|
6
|
+
ePxEnLq3K96TgrOwe0bckqhXOjPn4fPt8vuATvoOvza4fW31ai5nmhdLYeAFHSX0
|
7
|
+
JNjEBFro4yuv/6vjDVGhgNeeuWK3kW3zWZABWJud6L103cRegQJR+VyVDWeKnXZd
|
8
|
+
W6gf0ZcXoB63MOxuEidi9GjGbVD2k3OD8vVCzA+QXkwK5IiSTCC0drNmQhaVQqo8
|
9
|
+
xW0hAgMBAAGgADANBgkqhkiG9w0BAQUFAAOCAQEAb2KtxPDC4D8KJywEVWGUw6Y9
|
10
|
+
wrlZGFLO1qkIjjQLfs4SBEhtTiRIlAUHT8hZWigBIBSmpEjRHzsc+EqM3OOjLtX4
|
11
|
+
n4eUmQHnKiGIOD7D7iLdvtNAm6eWpo7+ndgTpx+JRlBiT5/lTZf5W4Hgss3ijn6P
|
12
|
+
hT7sXajSeLlMeklG152lEdXgAtoSuhZbD9dQfm8DVS1W/Z6gJSlPY6URIENqlxK3
|
13
|
+
63yjDcPa4RG22RDr2YHFne9UBduSzhqvupdtaz9Hwq1yHObTAB0h9gupfasppgoP
|
14
|
+
fvxqepvJlg7Pbc5qci+bNUGfDkwkplqGab+jDOsFbpHLVM6tB8ZbaxumlJkBag==
|
15
|
+
-----END CERTIFICATE REQUEST-----
|
@@ -0,0 +1 @@
|
|
1
|
+
MySecretPassword
|
@@ -0,0 +1,18 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIC4jCCAcqgAwIBAgIBATANBgkqhkiG9w0BAQsFADATMREwDwYDVQQDDAhNeVRl
|
3
|
+
c3RDQTAeFw0xNjA1MTAxNjU3NTlaFw0xNzA1MTAxNjU3NTlaMCUxEjAQBgNVBAMT
|
4
|
+
CWxvY2FsaG9zdDEPMA0GA1UEChMGc2VydmVyMIIBIjANBgkqhkiG9w0BAQEFAAOC
|
5
|
+
AQ8AMIIBCgKCAQEAuey95MXuzVtVQlOtQ083r9fZjuJ2D6kMmu/KBAYf95dzLKa/
|
6
|
+
OhtUVWtyQOt9kvKFEhOjKrqEifhN/635zXNkHPGAwkAj0+wQVPbrR9QcjP/7Ifrm
|
7
|
+
GycYQ3fs7klsftcg9yplZ3haBosUoDrJ+5B3MOUjN+2XjUCdJygLRVFCz80C0ePU
|
8
|
+
pGKiq1Uh8jLpCho3HwXq8k6VQPGREq5avRrcTjTXSA5EuBZM8sdzPYix7+zyv3Qd
|
9
|
+
o5bHcHHfZg1FLmgH+pKThuudiq18ywCEeZpI6CqYrNbzNgmSmu1fUKq97VZFJjRQ
|
10
|
+
Tx7TQexLK8LG3H4Oqzb9NOlwRqOgjHp9BSwvCQIDAQABoy8wLTAJBgNVHRMEAjAA
|
11
|
+
MAsGA1UdDwQEAwIFIDATBgNVHSUEDDAKBggrBgEFBQcDATANBgkqhkiG9w0BAQsF
|
12
|
+
AAOCAQEAiN+aGl2gLGwnn9ja5aJ6es3zM7GuRkIhP0+UpUjt9j027KzXM88X5/pS
|
13
|
+
n1rDS/yp0sWwGKU+CfPO/9zrFihZ+V5fQKNJpMo4xBr6g9lhyK3U9iRv1CB+88kD
|
14
|
+
ad9C8HvPzftQgu+q6fv+8RfU9NbWjq/I0hW6izzOdcwK4zCN9segjfRGy6M+E9Oo
|
15
|
+
1QTfUHHqHCDowlRSR5iFJP1RopyfBILz8dAZ98jqneYFulkrKFc8MjNP+GoLJ3Je
|
16
|
+
2iVycYbOST4WjKurjaf7huXtYaqmFwY/dBaSDG8qrLVCGjYtf98PIFP2E+Tv8Yvw
|
17
|
+
8TIAsXtglo5qh1hnTntnZZ3yaFgrXg==
|
18
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,27 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
MIIEpQIBAAKCAQEAuey95MXuzVtVQlOtQ083r9fZjuJ2D6kMmu/KBAYf95dzLKa/
|
3
|
+
OhtUVWtyQOt9kvKFEhOjKrqEifhN/635zXNkHPGAwkAj0+wQVPbrR9QcjP/7Ifrm
|
4
|
+
GycYQ3fs7klsftcg9yplZ3haBosUoDrJ+5B3MOUjN+2XjUCdJygLRVFCz80C0ePU
|
5
|
+
pGKiq1Uh8jLpCho3HwXq8k6VQPGREq5avRrcTjTXSA5EuBZM8sdzPYix7+zyv3Qd
|
6
|
+
o5bHcHHfZg1FLmgH+pKThuudiq18ywCEeZpI6CqYrNbzNgmSmu1fUKq97VZFJjRQ
|
7
|
+
Tx7TQexLK8LG3H4Oqzb9NOlwRqOgjHp9BSwvCQIDAQABAoIBAQCZTYGOXz52iXaV
|
8
|
+
iBV3SJxsG5jB3izm4McKAeoaw0ochv5qtNs8eEhjXoMI0KPsRJhAvXxuwPiEIv99
|
9
|
+
cOBm7VyBGQjIIsbn+N/GjwqVYWphQLi73ftaLDQvfXUZTeVt+MivxH90f6ILfyZ0
|
10
|
+
r8TX7ti4slcFyJyL1dk+7h/M+iIS4FkYAkXUQdf8cYmF9vdUONQQ4owRshqmjB8+
|
11
|
+
CndHrz70DqfCMuwee7NXWt99DzlqpHqYr0s36SB+euepFrqWzPcfuajEjq42tz6l
|
12
|
+
d1VeRLCbyMKVOvGnUhEvQQo6JRebz55l7EYWA/gg9eh4n6qHuCfHf1gB1KZDBSjm
|
13
|
+
mvgdc4PZAoGBAOyop18aMwiUU9eSR6onePfGl3PPLIlYE1dNamtUzY6qcNQ/Cz2R
|
14
|
+
QiDYC9RuGVWDUyBL+tM/5+vDMD/PK2YWaYVm8PSHAkC8BnD6mMOo1SGPVH/1HshC
|
15
|
+
2nyUPSOqlrZ5gCTQy+jNgYQqg6Bbl/x9uWZcFAXXSNqDiFzoJwxys2nbAoGBAMke
|
16
|
+
owjEM6fuY4aKx9ngzOzK8PKwCqbNAiolVPby2/GOqsgDNcOZXHfjckMpJg1ZGil7
|
17
|
+
L9LGDIYyZjbm9isEhB1h5PJggonHDmjwTC/fJxJeFp5Ivj8VKXSipvqDZOhEP4N/
|
18
|
+
y4LGAOEL6m1xOCnZzgyju1yNGjtRLx+yEKX6zPnrAoGBANx5VswbvVWN0fov9gHI
|
19
|
+
GkNDSQ+D/6rIWeRoY+8wJvx1Pv4M6azm6aNtgr/Z/lITMVsSTc+GZsrWodmgaH8H
|
20
|
+
/DBisbItIOUsBhg07iLB5CUKwZ8fvhi1Z5TOCZNztkqzMLWbq4vsAHAfp1a6XgLF
|
21
|
+
IfcBa0nxwZaJGX3sbYyEQy8nAoGAY3may/g3UIVRhrdX2AUfdrN975tw+UWHH49t
|
22
|
+
ceN3NAgLongr/H37RXUjC+LrZki+7ut2IPtCMJH3Coq8EVTff6Tu148yobDqCK9q
|
23
|
+
D3eBXM1axJlYN91grsbQbjHVFCjFfWYVI66JusXpAo6wZ8rJ5miJgGJuKg6ijzvE
|
24
|
+
jkP5ZFcCgYEAxZFA5htznu0XDqhnlylo4N+V4ERfC86AjL3x0DDcFEYtzKKvI0AO
|
25
|
+
i7n9UQgT1YisFhG5nPJ+iMxliqACbHm00k5pua6ediBVWCUWEwVi9Uu4geQU7C6G
|
26
|
+
wLGiHPqLCzHGMFGWj1TSqg/Fd08meF0R/L36KlPI1na+EAbEvrefhXk=
|
27
|
+
-----END RSA PRIVATE KEY-----
|
@@ -0,0 +1 @@
|
|
1
|
+
MySecretPassword
|
Binary file
|
@@ -0,0 +1,15 @@
|
|
1
|
+
-----BEGIN CERTIFICATE REQUEST-----
|
2
|
+
MIICajCCAVICAQAwJTESMBAGA1UEAxMJbG9jYWxob3N0MQ8wDQYDVQQKEwZzZXJ2
|
3
|
+
ZXIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC57L3kxe7NW1VCU61D
|
4
|
+
Tzev19mO4nYPqQya78oEBh/3l3Mspr86G1RVa3JA632S8oUSE6MquoSJ+E3/rfnN
|
5
|
+
c2Qc8YDCQCPT7BBU9utH1ByM//sh+uYbJxhDd+zuSWx+1yD3KmVneFoGixSgOsn7
|
6
|
+
kHcw5SM37ZeNQJ0nKAtFUULPzQLR49SkYqKrVSHyMukKGjcfBeryTpVA8ZESrlq9
|
7
|
+
GtxONNdIDkS4Fkzyx3M9iLHv7PK/dB2jlsdwcd9mDUUuaAf6kpOG652KrXzLAIR5
|
8
|
+
mkjoKpis1vM2CZKa7V9Qqr3tVkUmNFBPHtNB7Esrwsbcfg6rNv006XBGo6CMen0F
|
9
|
+
LC8JAgMBAAGgADANBgkqhkiG9w0BAQUFAAOCAQEAFKV3mbWhNsvwi1h+Hhqt1Yyu
|
10
|
+
MPL+eXhcNSg4xev8Wf0TVRxNRXwlrXOqMWb75Q3ik0vvjR6LQSEEp20obwjuynQF
|
11
|
+
DnIoBza4M9QI8aanA5vlF8h9tNROER2PPsc7CHiCuh7Nga1IrCza286tPtaSHICJ
|
12
|
+
Rbis9EnVaAqF/haofqWzYoodz5RRU6tS4HXpkqtHGDMGA/dCIzZmTSOo+cSp+w5N
|
13
|
+
Nyx+DnI6w60VQDQJcwwMa+oIPvGdgAOEJ2tosiyJfVpbLNW5kaDun7kwqJ8eELV6
|
14
|
+
l/BxgRJAbg+SOq3BdY1c0v1kpym3IaaIc7hUHnEGsZw+8pinC2hiJDUo1sK7RA==
|
15
|
+
-----END CERTIFICATE REQUEST-----
|
Binary file
|
@@ -0,0 +1,17 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIICyDCCAbCgAwIBAgIJALRwatuOz4bfMA0GCSqGSIb3DQEBCwUAMBMxETAPBgNV
|
3
|
+
BAMMCE15VGVzdENBMCAXDTE2MDUxMDE2NTY0MFoYDzMwMTUwOTExMTY1NjQwWjAT
|
4
|
+
MREwDwYDVQQDDAhNeVRlc3RDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC
|
5
|
+
ggEBALj98fWtjaForBa3XSrHjiYq+Mb7yzz+uW1lB+ZfCpM7xuXPjTyn3MZM5R5n
|
6
|
+
vQd1lnRgd5cdW7sMrp2wHo5/VLsMHNUEANZMwRBmYMe7YL5lNAUbIBC9acHd7/UX
|
7
|
+
NnGcZja0AqsphljVKqOAX2jVZcaAh0ttxXJI8FCUX3JOeHN1qrLp04xOgqFbW2Ii
|
8
|
+
s7aeHwN/HiUci4MNW2SzrTSMko9X0SssKwrsaxo3Qe83fnP0nLAfGBBV8GBMdmvX
|
9
|
+
C96rZwa2yBIeldPRNnJyL7K3SC885OjrTbPTZ0gNFxnDDKwVhx7PojznT1/OdYp6
|
10
|
+
90BU56z1bZ+G5RjhnWXUekMDaNsCAwEAAaMdMBswDAYDVR0TBAUwAwEB/zALBgNV
|
11
|
+
HQ8EBAMCAQYwDQYJKoZIhvcNAQELBQADggEBACNRYKlkptU7WdhS7jfquHkHGAl2
|
12
|
+
ix53E3ifHWRLYqWqlcwSyIh8iqD094iUUK9awTWUTQu4ccL+XT3UhpaEOi4BiyUQ
|
13
|
+
4RN4OT15vmEl5pW9nzfsfvkgJtqfomnIgsWeV8qiCUeL1IbPW6LsAz8RQJFuOf+e
|
14
|
+
bt8O1JFGJNy+II/QdBouZwjlijQO6FHWeckAshI/n+snntkOqTsOF+7WPfaC4Grn
|
15
|
+
8pCP66XzN0/qPLnR3ZeHq7jhS0SZFfXSPC0iUMAIZq98MdPy2VJ4ayKv3QL3/T6S
|
16
|
+
/+fkS4KiPeQP2+tOGz757cdDHooFbdV2nYwSpuY/GzjL2Sh5Qc/+Ew6RVUw=
|
17
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,18 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIC4jCCAcqgAwIBAgIBATANBgkqhkiG9w0BAQsFADATMREwDwYDVQQDDAhNeVRl
|
3
|
+
c3RDQTAeFw0xNjA1MTAxNjU3NTlaFw0xNzA1MTAxNjU3NTlaMCUxEjAQBgNVBAMT
|
4
|
+
CWxvY2FsaG9zdDEPMA0GA1UEChMGc2VydmVyMIIBIjANBgkqhkiG9w0BAQEFAAOC
|
5
|
+
AQ8AMIIBCgKCAQEAuey95MXuzVtVQlOtQ083r9fZjuJ2D6kMmu/KBAYf95dzLKa/
|
6
|
+
OhtUVWtyQOt9kvKFEhOjKrqEifhN/635zXNkHPGAwkAj0+wQVPbrR9QcjP/7Ifrm
|
7
|
+
GycYQ3fs7klsftcg9yplZ3haBosUoDrJ+5B3MOUjN+2XjUCdJygLRVFCz80C0ePU
|
8
|
+
pGKiq1Uh8jLpCho3HwXq8k6VQPGREq5avRrcTjTXSA5EuBZM8sdzPYix7+zyv3Qd
|
9
|
+
o5bHcHHfZg1FLmgH+pKThuudiq18ywCEeZpI6CqYrNbzNgmSmu1fUKq97VZFJjRQ
|
10
|
+
Tx7TQexLK8LG3H4Oqzb9NOlwRqOgjHp9BSwvCQIDAQABoy8wLTAJBgNVHRMEAjAA
|
11
|
+
MAsGA1UdDwQEAwIFIDATBgNVHSUEDDAKBggrBgEFBQcDATANBgkqhkiG9w0BAQsF
|
12
|
+
AAOCAQEAiN+aGl2gLGwnn9ja5aJ6es3zM7GuRkIhP0+UpUjt9j027KzXM88X5/pS
|
13
|
+
n1rDS/yp0sWwGKU+CfPO/9zrFihZ+V5fQKNJpMo4xBr6g9lhyK3U9iRv1CB+88kD
|
14
|
+
ad9C8HvPzftQgu+q6fv+8RfU9NbWjq/I0hW6izzOdcwK4zCN9segjfRGy6M+E9Oo
|
15
|
+
1QTfUHHqHCDowlRSR5iFJP1RopyfBILz8dAZ98jqneYFulkrKFc8MjNP+GoLJ3Je
|
16
|
+
2iVycYbOST4WjKurjaf7huXtYaqmFwY/dBaSDG8qrLVCGjYtf98PIFP2E+Tv8Yvw
|
17
|
+
8TIAsXtglo5qh1hnTntnZZ3yaFgrXg==
|
18
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,18 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIC4jCCAcqgAwIBAgIBAjANBgkqhkiG9w0BAQsFADATMREwDwYDVQQDDAhNeVRl
|
3
|
+
c3RDQTAeFw0xNjA1MTAxNzAwMDFaFw0xNzA1MTAxNzAwMDFaMCUxEjAQBgNVBAMT
|
4
|
+
CWxvY2FsaG9zdDEPMA0GA1UEChMGY2xpZW50MIIBIjANBgkqhkiG9w0BAQEFAAOC
|
5
|
+
AQ8AMIIBCgKCAQEAo9dLuAbDY5jBAlx1UqsOQf480ni4BVbxOjEAL4PVBfIU4xmn
|
6
|
+
F3Z+tAvmcd3oNc9JYYxXVq5sKA/HE5eWhVdXdQWX0IrTHraJAXvRlHuu1TSuTvuq
|
7
|
+
7QgQVFbZdWzRfvukLoKPDm1DtI5BFJ7L83j8RJy6tyvek4KzsHtG3JKoVzoz5+Hz
|
8
|
+
7fL7gE76Dr82uH1t9WouZ5oXS2HgBR0l9CTYxARa6OMrr/+r4w1RoYDXnrlit5Ft
|
9
|
+
81mQAVibnei9dN3EXoECUflclQ1nip12XVuoH9GXF6AetzDsbhInYvRoxm1Q9pNz
|
10
|
+
g/L1QswPkF5MCuSIkkwgtHazZkIWlUKqPMVtIQIDAQABoy8wLTAJBgNVHRMEAjAA
|
11
|
+
MAsGA1UdDwQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAjANBgkqhkiG9w0BAQsF
|
12
|
+
AAOCAQEAuJ1ruPLP2WdRZz5bb/qgaBqADUVKJu3Ny9TsEK/oZzUwgWVc4hvsiFms
|
13
|
+
gj/JVmXy4f36s6VLfOiDNHI6jIb31wvfduYV58Z+IUXMyj9OV4ZxqpQBqS9YK1Gq
|
14
|
+
2AChr1wYUs+WmnNATwa4Q51ytTU4DcLdJTusZIfo5BAvnnz35QnQPsB11EEHRovA
|
15
|
+
1bnzvG6uKAG0MjxNvXpWRUImNXrIKrbRXnvu5FDXAVMPg674g1QMhaa6SlPO5bFP
|
16
|
+
meg4+1jH2tUMKR8qCS4KfOfbccNF/u09pRYcMJwiTXu++gCAu1il9jn0C5zxX3Ni
|
17
|
+
GKm0/sj2BpZf9D4Kl8LppAIxcphBUg==
|
18
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1 @@
|
|
1
|
+
unique_subject = yes
|
@@ -0,0 +1 @@
|
|
1
|
+
unique_subject = yes
|
@@ -0,0 +1 @@
|
|
1
|
+
V 170510165759Z 01 unknown /CN=localhost/O=server
|
@@ -0,0 +1,53 @@
|
|
1
|
+
[ ca ]
|
2
|
+
default_ca = testca
|
3
|
+
|
4
|
+
[ testca ]
|
5
|
+
dir = .
|
6
|
+
certificate = $dir/cacert.pem
|
7
|
+
database = $dir/index.txt
|
8
|
+
new_certs_dir = $dir/certs
|
9
|
+
private_key = $dir/private/cakey.pem
|
10
|
+
serial = $dir/serial
|
11
|
+
|
12
|
+
default_crl_days = 7
|
13
|
+
default_days = 365
|
14
|
+
default_md = sha256
|
15
|
+
|
16
|
+
policy = testca_policy
|
17
|
+
x509_extensions = certificate_extensions
|
18
|
+
|
19
|
+
[ testca_policy ]
|
20
|
+
commonName = supplied
|
21
|
+
stateOrProvinceName = optional
|
22
|
+
countryName = optional
|
23
|
+
emailAddress = optional
|
24
|
+
organizationName = optional
|
25
|
+
organizationalUnitName = optional
|
26
|
+
|
27
|
+
[ certificate_extensions ]
|
28
|
+
basicConstraints = CA:false
|
29
|
+
|
30
|
+
[ req ]
|
31
|
+
default_bits = 2048
|
32
|
+
default_keyfile = ./private/cakey.pem
|
33
|
+
default_md = sha256
|
34
|
+
prompt = yes
|
35
|
+
distinguished_name = root_ca_distinguished_name
|
36
|
+
x509_extensions = root_ca_extensions
|
37
|
+
|
38
|
+
[ root_ca_distinguished_name ]
|
39
|
+
commonName = hostname
|
40
|
+
|
41
|
+
[ root_ca_extensions ]
|
42
|
+
basicConstraints = CA:true
|
43
|
+
keyUsage = keyCertSign, cRLSign
|
44
|
+
|
45
|
+
[ client_ca_extensions ]
|
46
|
+
basicConstraints = CA:false
|
47
|
+
keyUsage = digitalSignature
|
48
|
+
extendedKeyUsage = 1.3.6.1.5.5.7.3.2
|
49
|
+
|
50
|
+
[ server_ca_extensions ]
|
51
|
+
basicConstraints = CA:false
|
52
|
+
keyUsage = keyEncipherment
|
53
|
+
extendedKeyUsage = 1.3.6.1.5.5.7.3.1
|
@@ -0,0 +1,27 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
MIIEpQIBAAKCAQEAuP3x9a2NoWisFrddKseOJir4xvvLPP65bWUH5l8KkzvG5c+N
|
3
|
+
PKfcxkzlHme9B3WWdGB3lx1buwyunbAejn9Uuwwc1QQA1kzBEGZgx7tgvmU0BRsg
|
4
|
+
EL1pwd3v9Rc2cZxmNrQCqymGWNUqo4BfaNVlxoCHS23FckjwUJRfck54c3WqsunT
|
5
|
+
jE6CoVtbYiKztp4fA38eJRyLgw1bZLOtNIySj1fRKywrCuxrGjdB7zd+c/ScsB8Y
|
6
|
+
EFXwYEx2a9cL3qtnBrbIEh6V09E2cnIvsrdILzzk6OtNs9NnSA0XGcMMrBWHHs+i
|
7
|
+
POdPX851inr3QFTnrPVtn4blGOGdZdR6QwNo2wIDAQABAoIBADoXZLflfChHmmK3
|
8
|
+
ygX5DGZn8B9sSnIo+0mjBEwPZF6/0sGv34ZAoE+VLg3SPcXt4wVAlc1aZsfiP6M8
|
9
|
+
/xt4WL80Gom57BlfmPDxdUrDSKoBVciUsAkRsfgzHXs1gt9CYcaj2IKvU4Tpy630
|
10
|
+
TgG5oXAoRFQncG1nAjALp71ZbvGyZDOK2+/Vjs0NITyC+4srnafiF8pwLXmgm0Zj
|
11
|
+
FVyCy8H/dwt7/pJKKkDX8Mq6kdvvROg8QDqTyCsTn3qAfDQUjO1BJje7x31E+lXW
|
12
|
+
/FgUqs43ATU2HVczP0fbBZeGeFFTRycypmmSXYb9eZ05mDf8cm93V8KMPkTVh4Pu
|
13
|
+
6/kF8AECgYEA8VpoTggar66f/0rfxX263q+L5YD8fwfuqcjLx/Bnuzpp1POhsTLD
|
14
|
+
Gv0W5FcAf4i1jfnBevrk9q9WFnnUpUvX7Y+e1cvK9M5BuVRs77C4mE5IQ7hcHN6I
|
15
|
+
vNgYihIK/PTVXYrT2j1EFLBwD2QWwO7BcV5aAiShlce7qC8fJeAhRtsCgYEAxDft
|
16
|
+
QIUHm2MIzZD25q6fkki1Rx0ifOjO7AlK0NIyxQ+gsxZQrrUsSqcgC/W3XJSONeCY
|
17
|
+
UjbHRQmhzkexA6ZFjgrL39qHL9x0kzle1dZ+oFGVQKiIMWn1WfEL0baDxMjFKDQt
|
18
|
+
xF0SWRHZsIDPUjZzPTyfaPf8I148pIoSILB7BgECgYEA3679ioxiRz5dlNqM59ku
|
19
|
+
DuK9klfoK8drPzoU+1nomZJ6sV2XFsZIIsQ7qiakFI7cTRgTZGoRODuqWqxRE11m
|
20
|
+
Ywq/l8AHermKGjyPtdmgS7AJs5Gy9SKdsf/JRnWQb35uHQLkc5hid5ZKVUla+TaO
|
21
|
+
XAao/uF6THnPhwEdKho+XQ8CgYEAiyQBiJQM/eIvVt4qRxCjNS975M7DKwJH4VcB
|
22
|
+
h6zWtajMUtJLKmhs3Q9ACVsXyH3LjmcSfJI9ojYfWFC8NJNOlVgQlE+5N3ZD8DZp
|
23
|
+
ioeMyZCwnuYjla7Gfh4RPIgJTpz0OfsuTSWWojSnQqNE4M6dz1nSzLO1RztHE4KZ
|
24
|
+
MjcTNgECgYEAmeEA8KJzfsSgjjbhOmzxEJwRxzq0HTknTmWyEIamQBgFhaQ3AqZ+
|
25
|
+
cZWkqS34foKxjLLXp3AMukpS50yRB98Wzaa7eoA/H0zXlRjA6id9qFuCXt+E9e/5
|
26
|
+
sjPhQphj8473SsviSndT29JadTHgY8nSmXtxx+whO29D9Ods0laGb8A=
|
27
|
+
-----END RSA PRIVATE KEY-----
|
@@ -0,0 +1 @@
|
|
1
|
+
03
|
@@ -0,0 +1 @@
|
|
1
|
+
02
|
@@ -34,9 +34,10 @@ describe LogStash::PluginMixins::RabbitMQConnection do
|
|
34
34
|
|
35
35
|
let(:rabbitmq_settings) { super.merge({"connection_timeout" => 123,
|
36
36
|
"heartbeat" => 456,
|
37
|
-
"ssl" =>
|
38
|
-
"
|
39
|
-
"
|
37
|
+
"ssl" => true,
|
38
|
+
"ssl_version" => "TLSv1.1",
|
39
|
+
"ssl_certificate_path" => path,
|
40
|
+
"ssl_certificate_password" => "123"}) }
|
40
41
|
|
41
42
|
it "should set the timeout to the expected value" do
|
42
43
|
expect(instance.rabbitmq_settings[:timeout]).to eql(rabbitmq_settings["connection_timeout"])
|
@@ -47,15 +48,15 @@ describe LogStash::PluginMixins::RabbitMQConnection do
|
|
47
48
|
end
|
48
49
|
|
49
50
|
it "should set tls to the expected value" do
|
50
|
-
expect(instance.rabbitmq_settings[:tls]).to eql(
|
51
|
+
expect(instance.rabbitmq_settings[:tls]).to eql("TLSv1.1")
|
51
52
|
end
|
52
53
|
|
53
54
|
it "should set tls_certificate_path to the expected value" do
|
54
|
-
expect(instance.rabbitmq_settings[:tls_certificate_path]).to eql(rabbitmq_settings["
|
55
|
+
expect(instance.rabbitmq_settings[:tls_certificate_path]).to eql(rabbitmq_settings["ssl_certificate_path"])
|
55
56
|
end
|
56
57
|
|
57
58
|
it "should set tls_certificate_password to the expected value" do
|
58
|
-
expect(instance.rabbitmq_settings[:tls_certificate_password]).to eql(rabbitmq_settings["
|
59
|
+
expect(instance.rabbitmq_settings[:tls_certificate_password]).to eql(rabbitmq_settings["ssl_certificate_password"])
|
59
60
|
end
|
60
61
|
end
|
61
62
|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: logstash-mixin-rabbitmq_connection
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 4.0
|
4
|
+
version: 4.1.0
|
5
5
|
platform: java
|
6
6
|
authors:
|
7
7
|
- Elastic
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2016-05-
|
11
|
+
date: 2016-05-12 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: logstash-core-plugin-api
|
@@ -111,6 +111,29 @@ files:
|
|
111
111
|
- Rakefile
|
112
112
|
- lib/logstash/plugin_mixins/rabbitmq_connection.rb
|
113
113
|
- logstash-mixin-rabbitmq_connection.gemspec
|
114
|
+
- spec/fixtures/client/cert.pem
|
115
|
+
- spec/fixtures/client/key.pem
|
116
|
+
- spec/fixtures/client/keycert.p12
|
117
|
+
- spec/fixtures/client/req.pem
|
118
|
+
- spec/fixtures/password_for_files
|
119
|
+
- spec/fixtures/server/cert.pem
|
120
|
+
- spec/fixtures/server/key.pem
|
121
|
+
- spec/fixtures/server/key_password
|
122
|
+
- spec/fixtures/server/keycert.p12
|
123
|
+
- spec/fixtures/server/rabbitmq.config
|
124
|
+
- spec/fixtures/server/req.pem
|
125
|
+
- spec/fixtures/testca/cacert.cer
|
126
|
+
- spec/fixtures/testca/cacert.pem
|
127
|
+
- spec/fixtures/testca/certs/01.pem
|
128
|
+
- spec/fixtures/testca/certs/02.pem
|
129
|
+
- spec/fixtures/testca/index.txt
|
130
|
+
- spec/fixtures/testca/index.txt.attr
|
131
|
+
- spec/fixtures/testca/index.txt.attr.old
|
132
|
+
- spec/fixtures/testca/index.txt.old
|
133
|
+
- spec/fixtures/testca/openssl.cnf
|
134
|
+
- spec/fixtures/testca/private/cakey.pem
|
135
|
+
- spec/fixtures/testca/serial
|
136
|
+
- spec/fixtures/testca/serial.old
|
114
137
|
- spec/plugin_mixins/rabbitmq_connection_spec.rb
|
115
138
|
homepage: http://www.elastic.co/guide/en/logstash/current/index.html
|
116
139
|
licenses:
|
@@ -137,4 +160,27 @@ signing_key:
|
|
137
160
|
specification_version: 4
|
138
161
|
summary: Common functionality for RabbitMQ plugins
|
139
162
|
test_files:
|
163
|
+
- spec/fixtures/client/cert.pem
|
164
|
+
- spec/fixtures/client/key.pem
|
165
|
+
- spec/fixtures/client/keycert.p12
|
166
|
+
- spec/fixtures/client/req.pem
|
167
|
+
- spec/fixtures/password_for_files
|
168
|
+
- spec/fixtures/server/cert.pem
|
169
|
+
- spec/fixtures/server/key.pem
|
170
|
+
- spec/fixtures/server/key_password
|
171
|
+
- spec/fixtures/server/keycert.p12
|
172
|
+
- spec/fixtures/server/rabbitmq.config
|
173
|
+
- spec/fixtures/server/req.pem
|
174
|
+
- spec/fixtures/testca/cacert.cer
|
175
|
+
- spec/fixtures/testca/cacert.pem
|
176
|
+
- spec/fixtures/testca/certs/01.pem
|
177
|
+
- spec/fixtures/testca/certs/02.pem
|
178
|
+
- spec/fixtures/testca/index.txt
|
179
|
+
- spec/fixtures/testca/index.txt.attr
|
180
|
+
- spec/fixtures/testca/index.txt.attr.old
|
181
|
+
- spec/fixtures/testca/index.txt.old
|
182
|
+
- spec/fixtures/testca/openssl.cnf
|
183
|
+
- spec/fixtures/testca/private/cakey.pem
|
184
|
+
- spec/fixtures/testca/serial
|
185
|
+
- spec/fixtures/testca/serial.old
|
140
186
|
- spec/plugin_mixins/rabbitmq_connection_spec.rb
|