logstash-output-tcp 6.2.0 → 7.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +11 -0
- data/docs/index.asciidoc +18 -39
- data/lib/logstash/outputs/tcp.rb +5 -61
- data/logstash-output-tcp.gemspec +1 -2
- data/spec/outputs/tcp_spec.rb +21 -59
- metadata +11 -25
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: d6f831af52dc575cf49b8bd64ac494753bbc852bb8cdc37df12ff7c1b0b40a7f
|
4
|
+
data.tar.gz: c0fd08ae08b9b9518f37164539db57a137ffea4c1a92b82915b2678f329b4247
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 3d2bf294da64059cdfd5d25ab58172e8b0d02011b9657fc72bbda2e4839d71ef64465405af9320fbaff72c2c4e76308fd696577f84c4eabad7e52bd8011ce6ca
|
7
|
+
data.tar.gz: 6ec47a3647e01a3324ddfdf9c0804d14aafa610e5e648d65fa90e37c89831cf1a8f5e3c3f709c564d9ae3bd55a794af62d9bbca8f2d098e0963e347e7a5ed85e
|
data/CHANGELOG.md
CHANGED
@@ -1,3 +1,14 @@
|
|
1
|
+
## 7.0.0
|
2
|
+
- SSL settings that were marked deprecated in version `6.2.0` are now marked obsolete, and will prevent the plugin from starting.
|
3
|
+
- These settings are:
|
4
|
+
- `ssl_cert`, which should be replaced by `ssl_certificate`
|
5
|
+
- `ssl_cacert`, which should be replaced by `ssl_certificate_authorities`
|
6
|
+
- `ssl_enable`, which should be replaced by `ssl_enabled`
|
7
|
+
- `ssl_verify`, which should be replaced by `ssl_client_authentication` when `mode` is `server` or `ssl_verification_mode`when mode is `client`
|
8
|
+
- [58](https://github.com/logstash-plugins/logstash-output-tcp/pull/58)
|
9
|
+
## 6.2.1
|
10
|
+
- Document correct default plugin codec [#54](https://github.com/logstash-plugins/logstash-output-tcp/pull/54)
|
11
|
+
|
1
12
|
## 6.2.0
|
2
13
|
- Reviewed and deprecated SSL settings to comply with Logstash's naming convention [#53](https://github.com/logstash-plugins/logstash-output-tcp/pull/53)
|
3
14
|
- Deprecated `ssl_enable` in favor of `ssl_enabled`
|
data/docs/index.asciidoc
CHANGED
@@ -23,7 +23,7 @@ include::{include_path}/plugin_header.asciidoc[]
|
|
23
23
|
|
24
24
|
Write events over a TCP socket.
|
25
25
|
|
26
|
-
|
26
|
+
By default this plugin uses the `json` codec. In order to have each event json separated by a newline, use the `json_lines` codec.
|
27
27
|
|
28
28
|
Can either accept connections from clients or connect to a server,
|
29
29
|
depending on `mode`.
|
@@ -33,6 +33,10 @@ depending on `mode`.
|
|
33
33
|
|
34
34
|
This plugin supports the following configuration options plus the <<plugins-{type}s-{plugin}-common-options>> described later.
|
35
35
|
|
36
|
+
NOTE: As of version `7.0.0` of this plugin, a number of previously deprecated settings related to SSL have been removed. Please see the
|
37
|
+
<<plugins-{type}s-{plugin}-obsolete-options>> for more details.
|
38
|
+
|
39
|
+
|
36
40
|
[cols="<,<,<",options="header",]
|
37
41
|
|=======================================================================
|
38
42
|
|Setting |Input type|Required
|
@@ -40,19 +44,15 @@ This plugin supports the following configuration options plus the <<plugins-{typ
|
|
40
44
|
| <<plugins-{type}s-{plugin}-mode>> |<<string,string>>, one of `["server", "client"]`|No
|
41
45
|
| <<plugins-{type}s-{plugin}-port>> |<<number,number>>|Yes
|
42
46
|
| <<plugins-{type}s-{plugin}-reconnect_interval>> |<<number,number>>|No
|
43
|
-
| <<plugins-{type}s-{plugin}-ssl_cacert>> |a valid filesystem path|__Deprecated__
|
44
|
-
| <<plugins-{type}s-{plugin}-ssl_cert>> |a valid filesystem path|__Deprecated__
|
45
47
|
| <<plugins-{type}s-{plugin}-ssl_certificate>> |a valid filesystem path|No
|
46
48
|
| <<plugins-{type}s-{plugin}-ssl_certificate_authorities>> |<<array,array>>|No
|
47
49
|
| <<plugins-{type}s-{plugin}-ssl_cipher_suites>> |<<string,string>>|No
|
48
50
|
| <<plugins-{type}s-{plugin}-ssl_client_authentication>> |<<string,string>>, one of `["none", "optional", "required"]`|No
|
49
|
-
| <<plugins-{type}s-{plugin}-ssl_enable>> |<<boolean,boolean>>|__Deprecated__
|
50
51
|
| <<plugins-{type}s-{plugin}-ssl_enabled>> |<<boolean,boolean>>|No
|
51
52
|
| <<plugins-{type}s-{plugin}-ssl_key>> |a valid filesystem path|No
|
52
53
|
| <<plugins-{type}s-{plugin}-ssl_key_passphrase>> |<<password,password>>|No
|
53
54
|
| <<plugins-{type}s-{plugin}-ssl_supported_protocols>> |<<string,string>>|No
|
54
55
|
| <<plugins-{type}s-{plugin}-ssl_verification_mode>> |<<string,string>>, one of `["full", "none"]`|No
|
55
|
-
| <<plugins-{type}s-{plugin}-ssl_verify>> |<<boolean,boolean>>|No
|
56
56
|
|=======================================================================
|
57
57
|
|
58
58
|
Also see <<plugins-{type}s-{plugin}-common-options>> for a list of options supported by all
|
@@ -97,24 +97,6 @@ When mode is `client`, the port to connect to.
|
|
97
97
|
|
98
98
|
When connect failed,retry interval in sec.
|
99
99
|
|
100
|
-
[id="plugins-{type}s-{plugin}-ssl_cacert"]
|
101
|
-
===== `ssl_cacert`
|
102
|
-
deprecated[6.2.0, Replaced by <<plugins-{type}s-{plugin}-ssl_certificate_authorities>>]
|
103
|
-
|
104
|
-
* Value type is <<path,path>>
|
105
|
-
* There is no default value for this setting.
|
106
|
-
|
107
|
-
The SSL CA certificate, chainfile or CA path. The system CA path is automatically included.
|
108
|
-
|
109
|
-
[id="plugins-{type}s-{plugin}-ssl_cert"]
|
110
|
-
===== `ssl_cert`
|
111
|
-
deprecated[6.2.0, Replaced by <<plugins-{type}s-{plugin}-ssl_certificate>>]
|
112
|
-
|
113
|
-
* Value type is <<path,path>>
|
114
|
-
* There is no default value for this setting.
|
115
|
-
|
116
|
-
SSL certificate path
|
117
|
-
|
118
100
|
[id="plugins-{type}s-{plugin}-ssl_certificate"]
|
119
101
|
===== `ssl_certificate`
|
120
102
|
|
@@ -160,15 +142,6 @@ Please note that the server does not validate the client certificate CN (Common
|
|
160
142
|
NOTE: This setting can be used only if <<plugins-{type}s-{plugin}-mode>> is `server` and <<plugins-{type}s-{plugin}-ssl_certificate_authorities>> is set.
|
161
143
|
|
162
144
|
|
163
|
-
[id="plugins-{type}s-{plugin}-ssl_enable"]
|
164
|
-
===== `ssl_enable`
|
165
|
-
deprecated[6.2.0, Replaced by <<plugins-{type}s-{plugin}-ssl_enabled>>]
|
166
|
-
|
167
|
-
* Value type is <<boolean,boolean>>
|
168
|
-
* Default value is `false`
|
169
|
-
|
170
|
-
Enable SSL (must be set for other `ssl_` options to take effect).
|
171
|
-
|
172
145
|
[id="plugins-{type}s-{plugin}-ssl_enabled"]
|
173
146
|
===== `ssl_enabled`
|
174
147
|
|
@@ -223,15 +196,21 @@ has a hostname or IP address that matches the names within the certificate.
|
|
223
196
|
|
224
197
|
NOTE: This setting can be used only if <<plugins-{type}s-{plugin}-mode>> is `client`.
|
225
198
|
|
226
|
-
[id="plugins-{type}s-{plugin}-
|
227
|
-
|
228
|
-
|
199
|
+
[id="plugins-{type}s-{plugin}-obsolete-options"]
|
200
|
+
==== TCP Output Obsolete Configuration Options
|
201
|
+
|
202
|
+
WARNING: As of version `6.0.0` of this plugin, some configuration options have been replaced.
|
203
|
+
The plugin will fail to start if it contains any of these obsolete options.
|
229
204
|
|
230
|
-
* Value type is <<boolean,boolean>>
|
231
|
-
* Default value is `false`
|
232
205
|
|
233
|
-
|
234
|
-
|
206
|
+
[cols="<,<",options="header",]
|
207
|
+
|=======================================================================
|
208
|
+
|Setting|Replaced by
|
209
|
+
| ssl_cacert |<<plugins-{type}s-{plugin}-ssl_certificate_authorities>>
|
210
|
+
| ssl_cert |<<plugins-{type}s-{plugin}-ssl_certificate>>
|
211
|
+
| ssl_enable |<<plugins-{type}s-{plugin}-ssl_enabled>>
|
212
|
+
| ssl_verify |<<plugins-{type}s-{plugin}-ssl_client_authentication>> in `server` mode and <<plugins-{type}s-{plugin}-ssl_verification_mode>> in `client` mode
|
213
|
+
|=======================================================================
|
235
214
|
|
236
215
|
[id="plugins-{type}s-{plugin}-common-options"]
|
237
216
|
include::{include_path}/{type}.asciidoc[]
|
data/lib/logstash/outputs/tcp.rb
CHANGED
@@ -3,7 +3,6 @@ require "logstash/outputs/base"
|
|
3
3
|
require "logstash/namespace"
|
4
4
|
require "thread"
|
5
5
|
require "logstash/util/socket_peer"
|
6
|
-
require "logstash/plugin_mixins/normalize_config_support"
|
7
6
|
|
8
7
|
# Write events over a TCP socket.
|
9
8
|
#
|
@@ -13,8 +12,6 @@ require "logstash/plugin_mixins/normalize_config_support"
|
|
13
12
|
# depending on `mode`.
|
14
13
|
class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
15
14
|
|
16
|
-
include LogStash::PluginMixins::NormalizeConfigSupport
|
17
|
-
|
18
15
|
config_name "tcp"
|
19
16
|
concurrency :single
|
20
17
|
|
@@ -35,9 +32,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
35
32
|
# `client` connects to a server.
|
36
33
|
config :mode, :validate => ["server", "client"], :default => "client"
|
37
34
|
|
38
|
-
# Enable SSL (must be set for other `ssl_` options to take effect).
|
39
|
-
config :ssl_enable, :validate => :boolean, :default => false, :deprecated => "Use 'ssl_enabled' instead."
|
40
|
-
|
41
35
|
# Enable SSL (must be set for other `ssl_` options to take effect).
|
42
36
|
config :ssl_enabled, :validate => :boolean, :default => false
|
43
37
|
|
@@ -48,10 +42,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
48
42
|
# This option needs to be used with `ssl_certificate_authorities` and a defined list of CAs.
|
49
43
|
config :ssl_client_authentication, :validate => %w[none optional required], :default => 'none'
|
50
44
|
|
51
|
-
# Verify the identity of the other end of the SSL connection against the CA.
|
52
|
-
# For input, sets the field `sslsubject` to that of the client certificate.
|
53
|
-
config :ssl_verify, :validate => :boolean, :default => false, :deprecated => "Use 'ssl_client_authentication' when `mode` is 'server' or 'ssl_verification_mode' when mode is `client`"
|
54
|
-
|
55
45
|
# Options to verify the server's certificate.
|
56
46
|
# "full": validates that the provided certificate has an issue date that’s within the not_before and not_after dates;
|
57
47
|
# chains to a trusted Certificate Authority (CA); has a hostname or IP address that matches the names within the certificate.
|
@@ -59,16 +49,11 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
59
49
|
# "none": performs no certificate validation. Disabling this severely compromises security (https://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf)
|
60
50
|
config :ssl_verification_mode, :validate => %w[full none], :default => 'full'
|
61
51
|
|
62
|
-
# The SSL CA certificate, chainfile or CA path. The system CA path is automatically included.
|
63
|
-
config :ssl_cacert, :validate => :path, :deprecated => "Use 'ssl_certificate_authorities' instead."
|
64
52
|
|
65
53
|
# Validate client certificate or certificate chain against these authorities. You can define multiple files.
|
66
54
|
# All the certificates will be read and added to the trust store.
|
67
55
|
config :ssl_certificate_authorities, :validate => :path, :list => true
|
68
56
|
|
69
|
-
# SSL certificate path
|
70
|
-
config :ssl_cert, :validate => :path, :deprecated => "Use 'ssl_certificate' instead."
|
71
|
-
|
72
57
|
# SSL certificate path
|
73
58
|
config :ssl_certificate, :validate => :path
|
74
59
|
|
@@ -84,6 +69,11 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
84
69
|
# The list of ciphers suite to use
|
85
70
|
config :ssl_cipher_suites, :validate => :string, :list => true
|
86
71
|
|
72
|
+
config :ssl_enable, :obsolete => "Use 'ssl_enabled' instead."
|
73
|
+
config :ssl_verify, :obsolete => "Use 'ssl_client_authentication' when `mode` is 'server' or 'ssl_verification_mode' when mode is `client`"
|
74
|
+
config :ssl_cacert, :obsolete => "Use 'ssl_certificate_authorities' instead."
|
75
|
+
config :ssl_cert, :obsolete => "Use 'ssl_certificate' instead."
|
76
|
+
|
87
77
|
class Client
|
88
78
|
|
89
79
|
##
|
@@ -189,11 +179,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
189
179
|
end
|
190
180
|
private :load_cert_store
|
191
181
|
|
192
|
-
def initialize(*args)
|
193
|
-
super(*args)
|
194
|
-
setup_ssl_params!
|
195
|
-
end
|
196
|
-
|
197
182
|
# @overload Base#register
|
198
183
|
def register
|
199
184
|
require "socket"
|
@@ -405,47 +390,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
405
390
|
original_params.include?('ssl_enable') ? 'ssl_enable' : 'ssl_enabled'
|
406
391
|
end
|
407
392
|
|
408
|
-
def setup_ssl_params!
|
409
|
-
@ssl_enabled = normalize_config(:ssl_enabled) do |normalizer|
|
410
|
-
normalizer.with_deprecated_alias(:ssl_enable)
|
411
|
-
end
|
412
|
-
|
413
|
-
@ssl_certificate = normalize_config(:ssl_certificate) do |normalizer|
|
414
|
-
normalizer.with_deprecated_alias(:ssl_cert)
|
415
|
-
end
|
416
|
-
|
417
|
-
if server?
|
418
|
-
@ssl_client_authentication = normalize_config(:ssl_client_authentication) do |normalizer|
|
419
|
-
normalizer.with_deprecated_mapping(:ssl_verify) do |ssl_verify|
|
420
|
-
ssl_verify == true ? 'required' : 'none'
|
421
|
-
end
|
422
|
-
end
|
423
|
-
else
|
424
|
-
@ssl_verification_mode = normalize_config(:ssl_verification_mode) do |normalize|
|
425
|
-
normalize.with_deprecated_mapping(:ssl_verify) do |ssl_verify|
|
426
|
-
ssl_verify == true ? 'full' : 'none'
|
427
|
-
end
|
428
|
-
end
|
429
|
-
|
430
|
-
# Keep backwards compatibility with the default :ssl_verify value (false)
|
431
|
-
if !original_params.include?('ssl_verify') && !original_params.include?('ssl_verification_mode')
|
432
|
-
@ssl_verification_mode = 'none'
|
433
|
-
end
|
434
|
-
end
|
435
|
-
|
436
|
-
@ssl_certificate_authorities = normalize_config(:ssl_certificate_authorities) do |normalize|
|
437
|
-
normalize.with_deprecated_mapping(:ssl_cacert) do |ssl_cacert|
|
438
|
-
if File.directory?(ssl_cacert)
|
439
|
-
Dir.children(ssl_cacert)
|
440
|
-
.map{ |f| File.join(ssl_cacert, f) }
|
441
|
-
.reject{ |f| File.directory?(f) || File.basename(f).start_with?('.') }
|
442
|
-
else
|
443
|
-
[ssl_cacert]
|
444
|
-
end
|
445
|
-
end
|
446
|
-
end
|
447
|
-
end
|
448
|
-
|
449
393
|
def server?
|
450
394
|
@mode == "server"
|
451
395
|
end # def server?
|
data/logstash-output-tcp.gemspec
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
Gem::Specification.new do |s|
|
2
2
|
|
3
3
|
s.name = 'logstash-output-tcp'
|
4
|
-
s.version = '
|
4
|
+
s.version = '7.0.0'
|
5
5
|
s.licenses = ['Apache License (2.0)']
|
6
6
|
s.summary = "Writes events over a TCP socket"
|
7
7
|
s.description = "This gem is a Logstash plugin required to be installed on top of the Logstash core pipeline using $LS_HOME/bin/logstash-plugin install gemname. This gem is not a stand-alone program"
|
@@ -24,7 +24,6 @@ Gem::Specification.new do |s|
|
|
24
24
|
s.add_runtime_dependency 'logstash-core', '>= 8.1.0'
|
25
25
|
s.add_runtime_dependency 'logstash-codec-json'
|
26
26
|
s.add_runtime_dependency 'stud'
|
27
|
-
s.add_runtime_dependency 'logstash-mixin-normalize_config_support', '~>1.0'
|
28
27
|
|
29
28
|
s.add_runtime_dependency 'jruby-openssl', '>= 0.12.2' # 0.12 supports TLSv1.3
|
30
29
|
|
data/spec/outputs/tcp_spec.rb
CHANGED
@@ -24,6 +24,25 @@ describe LogStash::Outputs::Tcp do
|
|
24
24
|
|
25
25
|
let(:event) { LogStash::Event.new('message' => 'foo bar') }
|
26
26
|
|
27
|
+
['server', 'client'].each do |mode|
|
28
|
+
describe "handling obsolete settings for #{mode} mode" do
|
29
|
+
[{:name => 'ssl_cert', :replacement => 'ssl_certificate', :sample_value => "certificate_path"},
|
30
|
+
{:name => 'ssl_cacert', :replacement => 'ssl_certificate_authorities', :sample_value => "certificate_path"},
|
31
|
+
{:name => 'ssl_enable', :replacement => 'ssl_enabled', :sample_value => true},
|
32
|
+
{:name => 'ssl_verify', :replacement => 'ssl_client_authentication', :sample_value => 'peer'}].each do | obsolete_setting |
|
33
|
+
context "with obsolete #{obsolete_setting[:name]}" do
|
34
|
+
let (:deprecated_config) do
|
35
|
+
config.merge({'mode' => mode, obsolete_setting[:name] => obsolete_setting[:sample_value]})
|
36
|
+
end
|
37
|
+
|
38
|
+
it "should raise a config error with the appropriate message" do
|
39
|
+
expect { LogStash::Outputs::Tcp.new(deprecated_config).register }.to raise_error LogStash::ConfigurationError, /The setting `#{obsolete_setting[:name]}` in plugin `tcp` is obsolete and is no longer available. Use '#{obsolete_setting[:replacement]}'/i
|
40
|
+
end
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
44
|
+
end
|
45
|
+
|
27
46
|
context 'failing to connect' do
|
28
47
|
|
29
48
|
before { subject.register }
|
@@ -214,7 +233,7 @@ describe LogStash::Outputs::Tcp do
|
|
214
233
|
|
215
234
|
context 'with supported protocol' do
|
216
235
|
|
217
|
-
let(:config) { super().merge("ssl_supported_protocols" => ['TLSv1.2']) }
|
236
|
+
let(:config) { super().merge("ssl_supported_protocols" => ['TLSv1.2'], "ssl_verification_mode" => "none") }
|
218
237
|
|
219
238
|
let(:server_min_version) { 'TLS1_2' }
|
220
239
|
|
@@ -277,7 +296,7 @@ describe LogStash::Outputs::Tcp do
|
|
277
296
|
context "and protocol is TLSv1.3" do
|
278
297
|
let(:key_file) { File.join(FIXTURES_PATH, 'plaintext/instance.key') }
|
279
298
|
let(:crt_file) { File.join(FIXTURES_PATH, 'plaintext/instance.crt') }
|
280
|
-
let(:config) { super().merge("ssl_certificate" => crt_file, "ssl_key" => key_file) }
|
299
|
+
let(:config) { super().merge("ssl_certificate" => crt_file, "ssl_key" => key_file, "ssl_verification_mode" => "none") }
|
281
300
|
|
282
301
|
let(:secure_server) do
|
283
302
|
ssl_context = OpenSSL::SSL::SSLContext.new
|
@@ -374,16 +393,6 @@ describe LogStash::Outputs::Tcp do
|
|
374
393
|
end
|
375
394
|
end
|
376
395
|
|
377
|
-
context "with deprecated ssl_verify = true and no ssl_certificate_authorities" do
|
378
|
-
let(:config) { super().merge(
|
379
|
-
'ssl_verify' => true,
|
380
|
-
'ssl_certificate_authorities' => []
|
381
|
-
) }
|
382
|
-
|
383
|
-
it "should register without errors" do
|
384
|
-
expect { subject.register }.to_not raise_error
|
385
|
-
end
|
386
|
-
end
|
387
396
|
|
388
397
|
%w[required optional].each do |ssl_client_authentication|
|
389
398
|
context "with ssl_client_authentication = `#{ssl_client_authentication}` and no ssl_certificate_authorities" do
|
@@ -409,53 +418,6 @@ describe LogStash::Outputs::Tcp do
|
|
409
418
|
end
|
410
419
|
end
|
411
420
|
|
412
|
-
context "with deprecated settings" do
|
413
|
-
let(:ssl_verify) { true }
|
414
|
-
let(:certificate_path) { File.join(FIXTURES_PATH, 'plaintext/instance.crt') }
|
415
|
-
let(:config) do
|
416
|
-
{
|
417
|
-
"host" => "127.0.0.1",
|
418
|
-
"port" => port,
|
419
|
-
"ssl_enable" => true,
|
420
|
-
"ssl_cert" => certificate_path,
|
421
|
-
"ssl_key" => File.join(FIXTURES_PATH, 'plaintext/instance.key'),
|
422
|
-
"ssl_verify" => ssl_verify
|
423
|
-
}
|
424
|
-
end
|
425
|
-
|
426
|
-
context "and mode is server" do
|
427
|
-
let(:config) { super().merge("mode" => 'server') }
|
428
|
-
[true, false].each do |verify|
|
429
|
-
context "and ssl_verify is #{verify}" do
|
430
|
-
let(:ssl_verify) { verify }
|
431
|
-
|
432
|
-
it "should set new configs variables" do
|
433
|
-
subject.register
|
434
|
-
expect(subject.instance_variable_get(:@ssl_enabled)).to eql(true)
|
435
|
-
expect(subject.instance_variable_get(:@ssl_client_authentication)).to eql(verify ? 'required' : 'none')
|
436
|
-
expect(subject.instance_variable_get(:@ssl_certificate)).to eql(certificate_path)
|
437
|
-
end
|
438
|
-
end
|
439
|
-
end
|
440
|
-
end
|
441
|
-
|
442
|
-
context "and mode is client" do
|
443
|
-
let(:config) { super().merge("mode" => 'client') }
|
444
|
-
[true, false].each do |verify|
|
445
|
-
context "and ssl_verify is #{verify}" do
|
446
|
-
let(:ssl_verify) { verify }
|
447
|
-
|
448
|
-
it "should set new configs variables" do
|
449
|
-
subject.register
|
450
|
-
expect(subject.instance_variable_get(:@ssl_enabled)).to eql(true)
|
451
|
-
expect(subject.instance_variable_get(:@ssl_verification_mode)).to eql(verify ? 'full' : 'none')
|
452
|
-
expect(subject.instance_variable_get(:@ssl_certificate)).to eql(certificate_path)
|
453
|
-
end
|
454
|
-
end
|
455
|
-
end
|
456
|
-
end
|
457
|
-
end
|
458
|
-
|
459
421
|
context "with ssl_client_authentication" do
|
460
422
|
let(:config) do
|
461
423
|
super().merge 'ssl_client_authentication' => 'required'
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: logstash-output-tcp
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version:
|
4
|
+
version: 7.0.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Elastic
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2025-01-10 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
requirement: !ruby/object:Gem::Requirement
|
@@ -20,8 +20,8 @@ dependencies:
|
|
20
20
|
- !ruby/object:Gem::Version
|
21
21
|
version: '2.99'
|
22
22
|
name: logstash-core-plugin-api
|
23
|
-
prerelease: false
|
24
23
|
type: :runtime
|
24
|
+
prerelease: false
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
26
26
|
requirements:
|
27
27
|
- - ">="
|
@@ -37,8 +37,8 @@ dependencies:
|
|
37
37
|
- !ruby/object:Gem::Version
|
38
38
|
version: 8.1.0
|
39
39
|
name: logstash-core
|
40
|
-
prerelease: false
|
41
40
|
type: :runtime
|
41
|
+
prerelease: false
|
42
42
|
version_requirements: !ruby/object:Gem::Requirement
|
43
43
|
requirements:
|
44
44
|
- - ">="
|
@@ -51,8 +51,8 @@ dependencies:
|
|
51
51
|
- !ruby/object:Gem::Version
|
52
52
|
version: '0'
|
53
53
|
name: logstash-codec-json
|
54
|
-
prerelease: false
|
55
54
|
type: :runtime
|
55
|
+
prerelease: false
|
56
56
|
version_requirements: !ruby/object:Gem::Requirement
|
57
57
|
requirements:
|
58
58
|
- - ">="
|
@@ -65,27 +65,13 @@ dependencies:
|
|
65
65
|
- !ruby/object:Gem::Version
|
66
66
|
version: '0'
|
67
67
|
name: stud
|
68
|
-
prerelease: false
|
69
68
|
type: :runtime
|
69
|
+
prerelease: false
|
70
70
|
version_requirements: !ruby/object:Gem::Requirement
|
71
71
|
requirements:
|
72
72
|
- - ">="
|
73
73
|
- !ruby/object:Gem::Version
|
74
74
|
version: '0'
|
75
|
-
- !ruby/object:Gem::Dependency
|
76
|
-
requirement: !ruby/object:Gem::Requirement
|
77
|
-
requirements:
|
78
|
-
- - "~>"
|
79
|
-
- !ruby/object:Gem::Version
|
80
|
-
version: '1.0'
|
81
|
-
name: logstash-mixin-normalize_config_support
|
82
|
-
prerelease: false
|
83
|
-
type: :runtime
|
84
|
-
version_requirements: !ruby/object:Gem::Requirement
|
85
|
-
requirements:
|
86
|
-
- - "~>"
|
87
|
-
- !ruby/object:Gem::Version
|
88
|
-
version: '1.0'
|
89
75
|
- !ruby/object:Gem::Dependency
|
90
76
|
requirement: !ruby/object:Gem::Requirement
|
91
77
|
requirements:
|
@@ -93,8 +79,8 @@ dependencies:
|
|
93
79
|
- !ruby/object:Gem::Version
|
94
80
|
version: 0.12.2
|
95
81
|
name: jruby-openssl
|
96
|
-
prerelease: false
|
97
82
|
type: :runtime
|
83
|
+
prerelease: false
|
98
84
|
version_requirements: !ruby/object:Gem::Requirement
|
99
85
|
requirements:
|
100
86
|
- - ">="
|
@@ -107,8 +93,8 @@ dependencies:
|
|
107
93
|
- !ruby/object:Gem::Version
|
108
94
|
version: '0'
|
109
95
|
name: logstash-devutils
|
110
|
-
prerelease: false
|
111
96
|
type: :development
|
97
|
+
prerelease: false
|
112
98
|
version_requirements: !ruby/object:Gem::Requirement
|
113
99
|
requirements:
|
114
100
|
- - ">="
|
@@ -121,8 +107,8 @@ dependencies:
|
|
121
107
|
- !ruby/object:Gem::Version
|
122
108
|
version: '0'
|
123
109
|
name: logstash-codec-plain
|
124
|
-
prerelease: false
|
125
110
|
type: :development
|
111
|
+
prerelease: false
|
126
112
|
version_requirements: !ruby/object:Gem::Requirement
|
127
113
|
requirements:
|
128
114
|
- - ">="
|
@@ -135,8 +121,8 @@ dependencies:
|
|
135
121
|
- !ruby/object:Gem::Version
|
136
122
|
version: '0'
|
137
123
|
name: flores
|
138
|
-
prerelease: false
|
139
124
|
type: :development
|
125
|
+
prerelease: false
|
140
126
|
version_requirements: !ruby/object:Gem::Requirement
|
141
127
|
requirements:
|
142
128
|
- - ">="
|
@@ -185,7 +171,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
185
171
|
- !ruby/object:Gem::Version
|
186
172
|
version: '0'
|
187
173
|
requirements: []
|
188
|
-
rubygems_version: 3.
|
174
|
+
rubygems_version: 3.3.26
|
189
175
|
signing_key:
|
190
176
|
specification_version: 4
|
191
177
|
summary: Writes events over a TCP socket
|