logstash-output-tcp 6.2.1 → 7.0.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +8 -0
- data/docs/index.asciidoc +17 -38
- data/lib/logstash/outputs/tcp.rb +5 -61
- data/logstash-output-tcp.gemspec +1 -2
- data/spec/outputs/tcp_spec.rb +21 -59
- metadata +11 -25
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: d6f831af52dc575cf49b8bd64ac494753bbc852bb8cdc37df12ff7c1b0b40a7f
|
4
|
+
data.tar.gz: c0fd08ae08b9b9518f37164539db57a137ffea4c1a92b82915b2678f329b4247
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 3d2bf294da64059cdfd5d25ab58172e8b0d02011b9657fc72bbda2e4839d71ef64465405af9320fbaff72c2c4e76308fd696577f84c4eabad7e52bd8011ce6ca
|
7
|
+
data.tar.gz: 6ec47a3647e01a3324ddfdf9c0804d14aafa610e5e648d65fa90e37c89831cf1a8f5e3c3f709c564d9ae3bd55a794af62d9bbca8f2d098e0963e347e7a5ed85e
|
data/CHANGELOG.md
CHANGED
@@ -1,3 +1,11 @@
|
|
1
|
+
## 7.0.0
|
2
|
+
- SSL settings that were marked deprecated in version `6.2.0` are now marked obsolete, and will prevent the plugin from starting.
|
3
|
+
- These settings are:
|
4
|
+
- `ssl_cert`, which should be replaced by `ssl_certificate`
|
5
|
+
- `ssl_cacert`, which should be replaced by `ssl_certificate_authorities`
|
6
|
+
- `ssl_enable`, which should be replaced by `ssl_enabled`
|
7
|
+
- `ssl_verify`, which should be replaced by `ssl_client_authentication` when `mode` is `server` or `ssl_verification_mode`when mode is `client`
|
8
|
+
- [58](https://github.com/logstash-plugins/logstash-output-tcp/pull/58)
|
1
9
|
## 6.2.1
|
2
10
|
- Document correct default plugin codec [#54](https://github.com/logstash-plugins/logstash-output-tcp/pull/54)
|
3
11
|
|
data/docs/index.asciidoc
CHANGED
@@ -33,6 +33,10 @@ depending on `mode`.
|
|
33
33
|
|
34
34
|
This plugin supports the following configuration options plus the <<plugins-{type}s-{plugin}-common-options>> described later.
|
35
35
|
|
36
|
+
NOTE: As of version `7.0.0` of this plugin, a number of previously deprecated settings related to SSL have been removed. Please see the
|
37
|
+
<<plugins-{type}s-{plugin}-obsolete-options>> for more details.
|
38
|
+
|
39
|
+
|
36
40
|
[cols="<,<,<",options="header",]
|
37
41
|
|=======================================================================
|
38
42
|
|Setting |Input type|Required
|
@@ -40,19 +44,15 @@ This plugin supports the following configuration options plus the <<plugins-{typ
|
|
40
44
|
| <<plugins-{type}s-{plugin}-mode>> |<<string,string>>, one of `["server", "client"]`|No
|
41
45
|
| <<plugins-{type}s-{plugin}-port>> |<<number,number>>|Yes
|
42
46
|
| <<plugins-{type}s-{plugin}-reconnect_interval>> |<<number,number>>|No
|
43
|
-
| <<plugins-{type}s-{plugin}-ssl_cacert>> |a valid filesystem path|__Deprecated__
|
44
|
-
| <<plugins-{type}s-{plugin}-ssl_cert>> |a valid filesystem path|__Deprecated__
|
45
47
|
| <<plugins-{type}s-{plugin}-ssl_certificate>> |a valid filesystem path|No
|
46
48
|
| <<plugins-{type}s-{plugin}-ssl_certificate_authorities>> |<<array,array>>|No
|
47
49
|
| <<plugins-{type}s-{plugin}-ssl_cipher_suites>> |<<string,string>>|No
|
48
50
|
| <<plugins-{type}s-{plugin}-ssl_client_authentication>> |<<string,string>>, one of `["none", "optional", "required"]`|No
|
49
|
-
| <<plugins-{type}s-{plugin}-ssl_enable>> |<<boolean,boolean>>|__Deprecated__
|
50
51
|
| <<plugins-{type}s-{plugin}-ssl_enabled>> |<<boolean,boolean>>|No
|
51
52
|
| <<plugins-{type}s-{plugin}-ssl_key>> |a valid filesystem path|No
|
52
53
|
| <<plugins-{type}s-{plugin}-ssl_key_passphrase>> |<<password,password>>|No
|
53
54
|
| <<plugins-{type}s-{plugin}-ssl_supported_protocols>> |<<string,string>>|No
|
54
55
|
| <<plugins-{type}s-{plugin}-ssl_verification_mode>> |<<string,string>>, one of `["full", "none"]`|No
|
55
|
-
| <<plugins-{type}s-{plugin}-ssl_verify>> |<<boolean,boolean>>|No
|
56
56
|
|=======================================================================
|
57
57
|
|
58
58
|
Also see <<plugins-{type}s-{plugin}-common-options>> for a list of options supported by all
|
@@ -97,24 +97,6 @@ When mode is `client`, the port to connect to.
|
|
97
97
|
|
98
98
|
When connect failed,retry interval in sec.
|
99
99
|
|
100
|
-
[id="plugins-{type}s-{plugin}-ssl_cacert"]
|
101
|
-
===== `ssl_cacert`
|
102
|
-
deprecated[6.2.0, Replaced by <<plugins-{type}s-{plugin}-ssl_certificate_authorities>>]
|
103
|
-
|
104
|
-
* Value type is <<path,path>>
|
105
|
-
* There is no default value for this setting.
|
106
|
-
|
107
|
-
The SSL CA certificate, chainfile or CA path. The system CA path is automatically included.
|
108
|
-
|
109
|
-
[id="plugins-{type}s-{plugin}-ssl_cert"]
|
110
|
-
===== `ssl_cert`
|
111
|
-
deprecated[6.2.0, Replaced by <<plugins-{type}s-{plugin}-ssl_certificate>>]
|
112
|
-
|
113
|
-
* Value type is <<path,path>>
|
114
|
-
* There is no default value for this setting.
|
115
|
-
|
116
|
-
SSL certificate path
|
117
|
-
|
118
100
|
[id="plugins-{type}s-{plugin}-ssl_certificate"]
|
119
101
|
===== `ssl_certificate`
|
120
102
|
|
@@ -160,15 +142,6 @@ Please note that the server does not validate the client certificate CN (Common
|
|
160
142
|
NOTE: This setting can be used only if <<plugins-{type}s-{plugin}-mode>> is `server` and <<plugins-{type}s-{plugin}-ssl_certificate_authorities>> is set.
|
161
143
|
|
162
144
|
|
163
|
-
[id="plugins-{type}s-{plugin}-ssl_enable"]
|
164
|
-
===== `ssl_enable`
|
165
|
-
deprecated[6.2.0, Replaced by <<plugins-{type}s-{plugin}-ssl_enabled>>]
|
166
|
-
|
167
|
-
* Value type is <<boolean,boolean>>
|
168
|
-
* Default value is `false`
|
169
|
-
|
170
|
-
Enable SSL (must be set for other `ssl_` options to take effect).
|
171
|
-
|
172
145
|
[id="plugins-{type}s-{plugin}-ssl_enabled"]
|
173
146
|
===== `ssl_enabled`
|
174
147
|
|
@@ -223,15 +196,21 @@ has a hostname or IP address that matches the names within the certificate.
|
|
223
196
|
|
224
197
|
NOTE: This setting can be used only if <<plugins-{type}s-{plugin}-mode>> is `client`.
|
225
198
|
|
226
|
-
[id="plugins-{type}s-{plugin}-
|
227
|
-
|
228
|
-
|
199
|
+
[id="plugins-{type}s-{plugin}-obsolete-options"]
|
200
|
+
==== TCP Output Obsolete Configuration Options
|
201
|
+
|
202
|
+
WARNING: As of version `6.0.0` of this plugin, some configuration options have been replaced.
|
203
|
+
The plugin will fail to start if it contains any of these obsolete options.
|
229
204
|
|
230
|
-
* Value type is <<boolean,boolean>>
|
231
|
-
* Default value is `false`
|
232
205
|
|
233
|
-
|
234
|
-
|
206
|
+
[cols="<,<",options="header",]
|
207
|
+
|=======================================================================
|
208
|
+
|Setting|Replaced by
|
209
|
+
| ssl_cacert |<<plugins-{type}s-{plugin}-ssl_certificate_authorities>>
|
210
|
+
| ssl_cert |<<plugins-{type}s-{plugin}-ssl_certificate>>
|
211
|
+
| ssl_enable |<<plugins-{type}s-{plugin}-ssl_enabled>>
|
212
|
+
| ssl_verify |<<plugins-{type}s-{plugin}-ssl_client_authentication>> in `server` mode and <<plugins-{type}s-{plugin}-ssl_verification_mode>> in `client` mode
|
213
|
+
|=======================================================================
|
235
214
|
|
236
215
|
[id="plugins-{type}s-{plugin}-common-options"]
|
237
216
|
include::{include_path}/{type}.asciidoc[]
|
data/lib/logstash/outputs/tcp.rb
CHANGED
@@ -3,7 +3,6 @@ require "logstash/outputs/base"
|
|
3
3
|
require "logstash/namespace"
|
4
4
|
require "thread"
|
5
5
|
require "logstash/util/socket_peer"
|
6
|
-
require "logstash/plugin_mixins/normalize_config_support"
|
7
6
|
|
8
7
|
# Write events over a TCP socket.
|
9
8
|
#
|
@@ -13,8 +12,6 @@ require "logstash/plugin_mixins/normalize_config_support"
|
|
13
12
|
# depending on `mode`.
|
14
13
|
class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
15
14
|
|
16
|
-
include LogStash::PluginMixins::NormalizeConfigSupport
|
17
|
-
|
18
15
|
config_name "tcp"
|
19
16
|
concurrency :single
|
20
17
|
|
@@ -35,9 +32,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
35
32
|
# `client` connects to a server.
|
36
33
|
config :mode, :validate => ["server", "client"], :default => "client"
|
37
34
|
|
38
|
-
# Enable SSL (must be set for other `ssl_` options to take effect).
|
39
|
-
config :ssl_enable, :validate => :boolean, :default => false, :deprecated => "Use 'ssl_enabled' instead."
|
40
|
-
|
41
35
|
# Enable SSL (must be set for other `ssl_` options to take effect).
|
42
36
|
config :ssl_enabled, :validate => :boolean, :default => false
|
43
37
|
|
@@ -48,10 +42,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
48
42
|
# This option needs to be used with `ssl_certificate_authorities` and a defined list of CAs.
|
49
43
|
config :ssl_client_authentication, :validate => %w[none optional required], :default => 'none'
|
50
44
|
|
51
|
-
# Verify the identity of the other end of the SSL connection against the CA.
|
52
|
-
# For input, sets the field `sslsubject` to that of the client certificate.
|
53
|
-
config :ssl_verify, :validate => :boolean, :default => false, :deprecated => "Use 'ssl_client_authentication' when `mode` is 'server' or 'ssl_verification_mode' when mode is `client`"
|
54
|
-
|
55
45
|
# Options to verify the server's certificate.
|
56
46
|
# "full": validates that the provided certificate has an issue date that’s within the not_before and not_after dates;
|
57
47
|
# chains to a trusted Certificate Authority (CA); has a hostname or IP address that matches the names within the certificate.
|
@@ -59,16 +49,11 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
59
49
|
# "none": performs no certificate validation. Disabling this severely compromises security (https://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf)
|
60
50
|
config :ssl_verification_mode, :validate => %w[full none], :default => 'full'
|
61
51
|
|
62
|
-
# The SSL CA certificate, chainfile or CA path. The system CA path is automatically included.
|
63
|
-
config :ssl_cacert, :validate => :path, :deprecated => "Use 'ssl_certificate_authorities' instead."
|
64
52
|
|
65
53
|
# Validate client certificate or certificate chain against these authorities. You can define multiple files.
|
66
54
|
# All the certificates will be read and added to the trust store.
|
67
55
|
config :ssl_certificate_authorities, :validate => :path, :list => true
|
68
56
|
|
69
|
-
# SSL certificate path
|
70
|
-
config :ssl_cert, :validate => :path, :deprecated => "Use 'ssl_certificate' instead."
|
71
|
-
|
72
57
|
# SSL certificate path
|
73
58
|
config :ssl_certificate, :validate => :path
|
74
59
|
|
@@ -84,6 +69,11 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
84
69
|
# The list of ciphers suite to use
|
85
70
|
config :ssl_cipher_suites, :validate => :string, :list => true
|
86
71
|
|
72
|
+
config :ssl_enable, :obsolete => "Use 'ssl_enabled' instead."
|
73
|
+
config :ssl_verify, :obsolete => "Use 'ssl_client_authentication' when `mode` is 'server' or 'ssl_verification_mode' when mode is `client`"
|
74
|
+
config :ssl_cacert, :obsolete => "Use 'ssl_certificate_authorities' instead."
|
75
|
+
config :ssl_cert, :obsolete => "Use 'ssl_certificate' instead."
|
76
|
+
|
87
77
|
class Client
|
88
78
|
|
89
79
|
##
|
@@ -189,11 +179,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
189
179
|
end
|
190
180
|
private :load_cert_store
|
191
181
|
|
192
|
-
def initialize(*args)
|
193
|
-
super(*args)
|
194
|
-
setup_ssl_params!
|
195
|
-
end
|
196
|
-
|
197
182
|
# @overload Base#register
|
198
183
|
def register
|
199
184
|
require "socket"
|
@@ -405,47 +390,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
|
|
405
390
|
original_params.include?('ssl_enable') ? 'ssl_enable' : 'ssl_enabled'
|
406
391
|
end
|
407
392
|
|
408
|
-
def setup_ssl_params!
|
409
|
-
@ssl_enabled = normalize_config(:ssl_enabled) do |normalizer|
|
410
|
-
normalizer.with_deprecated_alias(:ssl_enable)
|
411
|
-
end
|
412
|
-
|
413
|
-
@ssl_certificate = normalize_config(:ssl_certificate) do |normalizer|
|
414
|
-
normalizer.with_deprecated_alias(:ssl_cert)
|
415
|
-
end
|
416
|
-
|
417
|
-
if server?
|
418
|
-
@ssl_client_authentication = normalize_config(:ssl_client_authentication) do |normalizer|
|
419
|
-
normalizer.with_deprecated_mapping(:ssl_verify) do |ssl_verify|
|
420
|
-
ssl_verify == true ? 'required' : 'none'
|
421
|
-
end
|
422
|
-
end
|
423
|
-
else
|
424
|
-
@ssl_verification_mode = normalize_config(:ssl_verification_mode) do |normalize|
|
425
|
-
normalize.with_deprecated_mapping(:ssl_verify) do |ssl_verify|
|
426
|
-
ssl_verify == true ? 'full' : 'none'
|
427
|
-
end
|
428
|
-
end
|
429
|
-
|
430
|
-
# Keep backwards compatibility with the default :ssl_verify value (false)
|
431
|
-
if !original_params.include?('ssl_verify') && !original_params.include?('ssl_verification_mode')
|
432
|
-
@ssl_verification_mode = 'none'
|
433
|
-
end
|
434
|
-
end
|
435
|
-
|
436
|
-
@ssl_certificate_authorities = normalize_config(:ssl_certificate_authorities) do |normalize|
|
437
|
-
normalize.with_deprecated_mapping(:ssl_cacert) do |ssl_cacert|
|
438
|
-
if File.directory?(ssl_cacert)
|
439
|
-
Dir.children(ssl_cacert)
|
440
|
-
.map{ |f| File.join(ssl_cacert, f) }
|
441
|
-
.reject{ |f| File.directory?(f) || File.basename(f).start_with?('.') }
|
442
|
-
else
|
443
|
-
[ssl_cacert]
|
444
|
-
end
|
445
|
-
end
|
446
|
-
end
|
447
|
-
end
|
448
|
-
|
449
393
|
def server?
|
450
394
|
@mode == "server"
|
451
395
|
end # def server?
|
data/logstash-output-tcp.gemspec
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
Gem::Specification.new do |s|
|
2
2
|
|
3
3
|
s.name = 'logstash-output-tcp'
|
4
|
-
s.version = '
|
4
|
+
s.version = '7.0.0'
|
5
5
|
s.licenses = ['Apache License (2.0)']
|
6
6
|
s.summary = "Writes events over a TCP socket"
|
7
7
|
s.description = "This gem is a Logstash plugin required to be installed on top of the Logstash core pipeline using $LS_HOME/bin/logstash-plugin install gemname. This gem is not a stand-alone program"
|
@@ -24,7 +24,6 @@ Gem::Specification.new do |s|
|
|
24
24
|
s.add_runtime_dependency 'logstash-core', '>= 8.1.0'
|
25
25
|
s.add_runtime_dependency 'logstash-codec-json'
|
26
26
|
s.add_runtime_dependency 'stud'
|
27
|
-
s.add_runtime_dependency 'logstash-mixin-normalize_config_support', '~>1.0'
|
28
27
|
|
29
28
|
s.add_runtime_dependency 'jruby-openssl', '>= 0.12.2' # 0.12 supports TLSv1.3
|
30
29
|
|
data/spec/outputs/tcp_spec.rb
CHANGED
@@ -24,6 +24,25 @@ describe LogStash::Outputs::Tcp do
|
|
24
24
|
|
25
25
|
let(:event) { LogStash::Event.new('message' => 'foo bar') }
|
26
26
|
|
27
|
+
['server', 'client'].each do |mode|
|
28
|
+
describe "handling obsolete settings for #{mode} mode" do
|
29
|
+
[{:name => 'ssl_cert', :replacement => 'ssl_certificate', :sample_value => "certificate_path"},
|
30
|
+
{:name => 'ssl_cacert', :replacement => 'ssl_certificate_authorities', :sample_value => "certificate_path"},
|
31
|
+
{:name => 'ssl_enable', :replacement => 'ssl_enabled', :sample_value => true},
|
32
|
+
{:name => 'ssl_verify', :replacement => 'ssl_client_authentication', :sample_value => 'peer'}].each do | obsolete_setting |
|
33
|
+
context "with obsolete #{obsolete_setting[:name]}" do
|
34
|
+
let (:deprecated_config) do
|
35
|
+
config.merge({'mode' => mode, obsolete_setting[:name] => obsolete_setting[:sample_value]})
|
36
|
+
end
|
37
|
+
|
38
|
+
it "should raise a config error with the appropriate message" do
|
39
|
+
expect { LogStash::Outputs::Tcp.new(deprecated_config).register }.to raise_error LogStash::ConfigurationError, /The setting `#{obsolete_setting[:name]}` in plugin `tcp` is obsolete and is no longer available. Use '#{obsolete_setting[:replacement]}'/i
|
40
|
+
end
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
44
|
+
end
|
45
|
+
|
27
46
|
context 'failing to connect' do
|
28
47
|
|
29
48
|
before { subject.register }
|
@@ -214,7 +233,7 @@ describe LogStash::Outputs::Tcp do
|
|
214
233
|
|
215
234
|
context 'with supported protocol' do
|
216
235
|
|
217
|
-
let(:config) { super().merge("ssl_supported_protocols" => ['TLSv1.2']) }
|
236
|
+
let(:config) { super().merge("ssl_supported_protocols" => ['TLSv1.2'], "ssl_verification_mode" => "none") }
|
218
237
|
|
219
238
|
let(:server_min_version) { 'TLS1_2' }
|
220
239
|
|
@@ -277,7 +296,7 @@ describe LogStash::Outputs::Tcp do
|
|
277
296
|
context "and protocol is TLSv1.3" do
|
278
297
|
let(:key_file) { File.join(FIXTURES_PATH, 'plaintext/instance.key') }
|
279
298
|
let(:crt_file) { File.join(FIXTURES_PATH, 'plaintext/instance.crt') }
|
280
|
-
let(:config) { super().merge("ssl_certificate" => crt_file, "ssl_key" => key_file) }
|
299
|
+
let(:config) { super().merge("ssl_certificate" => crt_file, "ssl_key" => key_file, "ssl_verification_mode" => "none") }
|
281
300
|
|
282
301
|
let(:secure_server) do
|
283
302
|
ssl_context = OpenSSL::SSL::SSLContext.new
|
@@ -374,16 +393,6 @@ describe LogStash::Outputs::Tcp do
|
|
374
393
|
end
|
375
394
|
end
|
376
395
|
|
377
|
-
context "with deprecated ssl_verify = true and no ssl_certificate_authorities" do
|
378
|
-
let(:config) { super().merge(
|
379
|
-
'ssl_verify' => true,
|
380
|
-
'ssl_certificate_authorities' => []
|
381
|
-
) }
|
382
|
-
|
383
|
-
it "should register without errors" do
|
384
|
-
expect { subject.register }.to_not raise_error
|
385
|
-
end
|
386
|
-
end
|
387
396
|
|
388
397
|
%w[required optional].each do |ssl_client_authentication|
|
389
398
|
context "with ssl_client_authentication = `#{ssl_client_authentication}` and no ssl_certificate_authorities" do
|
@@ -409,53 +418,6 @@ describe LogStash::Outputs::Tcp do
|
|
409
418
|
end
|
410
419
|
end
|
411
420
|
|
412
|
-
context "with deprecated settings" do
|
413
|
-
let(:ssl_verify) { true }
|
414
|
-
let(:certificate_path) { File.join(FIXTURES_PATH, 'plaintext/instance.crt') }
|
415
|
-
let(:config) do
|
416
|
-
{
|
417
|
-
"host" => "127.0.0.1",
|
418
|
-
"port" => port,
|
419
|
-
"ssl_enable" => true,
|
420
|
-
"ssl_cert" => certificate_path,
|
421
|
-
"ssl_key" => File.join(FIXTURES_PATH, 'plaintext/instance.key'),
|
422
|
-
"ssl_verify" => ssl_verify
|
423
|
-
}
|
424
|
-
end
|
425
|
-
|
426
|
-
context "and mode is server" do
|
427
|
-
let(:config) { super().merge("mode" => 'server') }
|
428
|
-
[true, false].each do |verify|
|
429
|
-
context "and ssl_verify is #{verify}" do
|
430
|
-
let(:ssl_verify) { verify }
|
431
|
-
|
432
|
-
it "should set new configs variables" do
|
433
|
-
subject.register
|
434
|
-
expect(subject.instance_variable_get(:@ssl_enabled)).to eql(true)
|
435
|
-
expect(subject.instance_variable_get(:@ssl_client_authentication)).to eql(verify ? 'required' : 'none')
|
436
|
-
expect(subject.instance_variable_get(:@ssl_certificate)).to eql(certificate_path)
|
437
|
-
end
|
438
|
-
end
|
439
|
-
end
|
440
|
-
end
|
441
|
-
|
442
|
-
context "and mode is client" do
|
443
|
-
let(:config) { super().merge("mode" => 'client') }
|
444
|
-
[true, false].each do |verify|
|
445
|
-
context "and ssl_verify is #{verify}" do
|
446
|
-
let(:ssl_verify) { verify }
|
447
|
-
|
448
|
-
it "should set new configs variables" do
|
449
|
-
subject.register
|
450
|
-
expect(subject.instance_variable_get(:@ssl_enabled)).to eql(true)
|
451
|
-
expect(subject.instance_variable_get(:@ssl_verification_mode)).to eql(verify ? 'full' : 'none')
|
452
|
-
expect(subject.instance_variable_get(:@ssl_certificate)).to eql(certificate_path)
|
453
|
-
end
|
454
|
-
end
|
455
|
-
end
|
456
|
-
end
|
457
|
-
end
|
458
|
-
|
459
421
|
context "with ssl_client_authentication" do
|
460
422
|
let(:config) do
|
461
423
|
super().merge 'ssl_client_authentication' => 'required'
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: logstash-output-tcp
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version:
|
4
|
+
version: 7.0.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Elastic
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2025-01-10 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
requirement: !ruby/object:Gem::Requirement
|
@@ -20,8 +20,8 @@ dependencies:
|
|
20
20
|
- !ruby/object:Gem::Version
|
21
21
|
version: '2.99'
|
22
22
|
name: logstash-core-plugin-api
|
23
|
-
prerelease: false
|
24
23
|
type: :runtime
|
24
|
+
prerelease: false
|
25
25
|
version_requirements: !ruby/object:Gem::Requirement
|
26
26
|
requirements:
|
27
27
|
- - ">="
|
@@ -37,8 +37,8 @@ dependencies:
|
|
37
37
|
- !ruby/object:Gem::Version
|
38
38
|
version: 8.1.0
|
39
39
|
name: logstash-core
|
40
|
-
prerelease: false
|
41
40
|
type: :runtime
|
41
|
+
prerelease: false
|
42
42
|
version_requirements: !ruby/object:Gem::Requirement
|
43
43
|
requirements:
|
44
44
|
- - ">="
|
@@ -51,8 +51,8 @@ dependencies:
|
|
51
51
|
- !ruby/object:Gem::Version
|
52
52
|
version: '0'
|
53
53
|
name: logstash-codec-json
|
54
|
-
prerelease: false
|
55
54
|
type: :runtime
|
55
|
+
prerelease: false
|
56
56
|
version_requirements: !ruby/object:Gem::Requirement
|
57
57
|
requirements:
|
58
58
|
- - ">="
|
@@ -65,27 +65,13 @@ dependencies:
|
|
65
65
|
- !ruby/object:Gem::Version
|
66
66
|
version: '0'
|
67
67
|
name: stud
|
68
|
-
prerelease: false
|
69
68
|
type: :runtime
|
69
|
+
prerelease: false
|
70
70
|
version_requirements: !ruby/object:Gem::Requirement
|
71
71
|
requirements:
|
72
72
|
- - ">="
|
73
73
|
- !ruby/object:Gem::Version
|
74
74
|
version: '0'
|
75
|
-
- !ruby/object:Gem::Dependency
|
76
|
-
requirement: !ruby/object:Gem::Requirement
|
77
|
-
requirements:
|
78
|
-
- - "~>"
|
79
|
-
- !ruby/object:Gem::Version
|
80
|
-
version: '1.0'
|
81
|
-
name: logstash-mixin-normalize_config_support
|
82
|
-
prerelease: false
|
83
|
-
type: :runtime
|
84
|
-
version_requirements: !ruby/object:Gem::Requirement
|
85
|
-
requirements:
|
86
|
-
- - "~>"
|
87
|
-
- !ruby/object:Gem::Version
|
88
|
-
version: '1.0'
|
89
75
|
- !ruby/object:Gem::Dependency
|
90
76
|
requirement: !ruby/object:Gem::Requirement
|
91
77
|
requirements:
|
@@ -93,8 +79,8 @@ dependencies:
|
|
93
79
|
- !ruby/object:Gem::Version
|
94
80
|
version: 0.12.2
|
95
81
|
name: jruby-openssl
|
96
|
-
prerelease: false
|
97
82
|
type: :runtime
|
83
|
+
prerelease: false
|
98
84
|
version_requirements: !ruby/object:Gem::Requirement
|
99
85
|
requirements:
|
100
86
|
- - ">="
|
@@ -107,8 +93,8 @@ dependencies:
|
|
107
93
|
- !ruby/object:Gem::Version
|
108
94
|
version: '0'
|
109
95
|
name: logstash-devutils
|
110
|
-
prerelease: false
|
111
96
|
type: :development
|
97
|
+
prerelease: false
|
112
98
|
version_requirements: !ruby/object:Gem::Requirement
|
113
99
|
requirements:
|
114
100
|
- - ">="
|
@@ -121,8 +107,8 @@ dependencies:
|
|
121
107
|
- !ruby/object:Gem::Version
|
122
108
|
version: '0'
|
123
109
|
name: logstash-codec-plain
|
124
|
-
prerelease: false
|
125
110
|
type: :development
|
111
|
+
prerelease: false
|
126
112
|
version_requirements: !ruby/object:Gem::Requirement
|
127
113
|
requirements:
|
128
114
|
- - ">="
|
@@ -135,8 +121,8 @@ dependencies:
|
|
135
121
|
- !ruby/object:Gem::Version
|
136
122
|
version: '0'
|
137
123
|
name: flores
|
138
|
-
prerelease: false
|
139
124
|
type: :development
|
125
|
+
prerelease: false
|
140
126
|
version_requirements: !ruby/object:Gem::Requirement
|
141
127
|
requirements:
|
142
128
|
- - ">="
|
@@ -185,7 +171,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
185
171
|
- !ruby/object:Gem::Version
|
186
172
|
version: '0'
|
187
173
|
requirements: []
|
188
|
-
rubygems_version: 3.
|
174
|
+
rubygems_version: 3.3.26
|
189
175
|
signing_key:
|
190
176
|
specification_version: 4
|
191
177
|
summary: Writes events over a TCP socket
|