logstash-output-tcp 6.2.1 → 7.0.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 12843c570af7ef789c697435e55375ecda6d6ed85a63181ae0501cc21298bbeb
4
- data.tar.gz: 95a41abe82bb81210646428fb6d228a390a7ba87043e817dab5a75b19405195e
3
+ metadata.gz: d6f831af52dc575cf49b8bd64ac494753bbc852bb8cdc37df12ff7c1b0b40a7f
4
+ data.tar.gz: c0fd08ae08b9b9518f37164539db57a137ffea4c1a92b82915b2678f329b4247
5
5
  SHA512:
6
- metadata.gz: 50d788801e0d243a7e3ba77cf4c96fb31e5a273656a99a6f5b5714076cb1bc4a5a0b5c3dcf8b3d36c7402d38a442129ebaf72b1f9cce7ec4dd22a532a7cd72ec
7
- data.tar.gz: 43e9a8f1c6e401801eb8ead0fc6773ff39c3f2efa0f112cbf63075050769f2acb09f870734001c9678ee679fd2f633243c22cdb3d4cf8455ea6ae69f672d5fcc
6
+ metadata.gz: 3d2bf294da64059cdfd5d25ab58172e8b0d02011b9657fc72bbda2e4839d71ef64465405af9320fbaff72c2c4e76308fd696577f84c4eabad7e52bd8011ce6ca
7
+ data.tar.gz: 6ec47a3647e01a3324ddfdf9c0804d14aafa610e5e648d65fa90e37c89831cf1a8f5e3c3f709c564d9ae3bd55a794af62d9bbca8f2d098e0963e347e7a5ed85e
data/CHANGELOG.md CHANGED
@@ -1,3 +1,11 @@
1
+ ## 7.0.0
2
+ - SSL settings that were marked deprecated in version `6.2.0` are now marked obsolete, and will prevent the plugin from starting.
3
+ - These settings are:
4
+ - `ssl_cert`, which should be replaced by `ssl_certificate`
5
+ - `ssl_cacert`, which should be replaced by `ssl_certificate_authorities`
6
+ - `ssl_enable`, which should be replaced by `ssl_enabled`
7
+ - `ssl_verify`, which should be replaced by `ssl_client_authentication` when `mode` is `server` or `ssl_verification_mode`when mode is `client`
8
+ - [58](https://github.com/logstash-plugins/logstash-output-tcp/pull/58)
1
9
  ## 6.2.1
2
10
  - Document correct default plugin codec [#54](https://github.com/logstash-plugins/logstash-output-tcp/pull/54)
3
11
 
data/docs/index.asciidoc CHANGED
@@ -33,6 +33,10 @@ depending on `mode`.
33
33
 
34
34
  This plugin supports the following configuration options plus the <<plugins-{type}s-{plugin}-common-options>> described later.
35
35
 
36
+ NOTE: As of version `7.0.0` of this plugin, a number of previously deprecated settings related to SSL have been removed. Please see the
37
+ <<plugins-{type}s-{plugin}-obsolete-options>> for more details.
38
+
39
+
36
40
  [cols="<,<,<",options="header",]
37
41
  |=======================================================================
38
42
  |Setting |Input type|Required
@@ -40,19 +44,15 @@ This plugin supports the following configuration options plus the <<plugins-{typ
40
44
  | <<plugins-{type}s-{plugin}-mode>> |<<string,string>>, one of `["server", "client"]`|No
41
45
  | <<plugins-{type}s-{plugin}-port>> |<<number,number>>|Yes
42
46
  | <<plugins-{type}s-{plugin}-reconnect_interval>> |<<number,number>>|No
43
- | <<plugins-{type}s-{plugin}-ssl_cacert>> |a valid filesystem path|__Deprecated__
44
- | <<plugins-{type}s-{plugin}-ssl_cert>> |a valid filesystem path|__Deprecated__
45
47
  | <<plugins-{type}s-{plugin}-ssl_certificate>> |a valid filesystem path|No
46
48
  | <<plugins-{type}s-{plugin}-ssl_certificate_authorities>> |<<array,array>>|No
47
49
  | <<plugins-{type}s-{plugin}-ssl_cipher_suites>> |<<string,string>>|No
48
50
  | <<plugins-{type}s-{plugin}-ssl_client_authentication>> |<<string,string>>, one of `["none", "optional", "required"]`|No
49
- | <<plugins-{type}s-{plugin}-ssl_enable>> |<<boolean,boolean>>|__Deprecated__
50
51
  | <<plugins-{type}s-{plugin}-ssl_enabled>> |<<boolean,boolean>>|No
51
52
  | <<plugins-{type}s-{plugin}-ssl_key>> |a valid filesystem path|No
52
53
  | <<plugins-{type}s-{plugin}-ssl_key_passphrase>> |<<password,password>>|No
53
54
  | <<plugins-{type}s-{plugin}-ssl_supported_protocols>> |<<string,string>>|No
54
55
  | <<plugins-{type}s-{plugin}-ssl_verification_mode>> |<<string,string>>, one of `["full", "none"]`|No
55
- | <<plugins-{type}s-{plugin}-ssl_verify>> |<<boolean,boolean>>|No
56
56
  |=======================================================================
57
57
 
58
58
  Also see <<plugins-{type}s-{plugin}-common-options>> for a list of options supported by all
@@ -97,24 +97,6 @@ When mode is `client`, the port to connect to.
97
97
 
98
98
  When connect failed,retry interval in sec.
99
99
 
100
- [id="plugins-{type}s-{plugin}-ssl_cacert"]
101
- ===== `ssl_cacert`
102
- deprecated[6.2.0, Replaced by <<plugins-{type}s-{plugin}-ssl_certificate_authorities>>]
103
-
104
- * Value type is <<path,path>>
105
- * There is no default value for this setting.
106
-
107
- The SSL CA certificate, chainfile or CA path. The system CA path is automatically included.
108
-
109
- [id="plugins-{type}s-{plugin}-ssl_cert"]
110
- ===== `ssl_cert`
111
- deprecated[6.2.0, Replaced by <<plugins-{type}s-{plugin}-ssl_certificate>>]
112
-
113
- * Value type is <<path,path>>
114
- * There is no default value for this setting.
115
-
116
- SSL certificate path
117
-
118
100
  [id="plugins-{type}s-{plugin}-ssl_certificate"]
119
101
  ===== `ssl_certificate`
120
102
 
@@ -160,15 +142,6 @@ Please note that the server does not validate the client certificate CN (Common
160
142
  NOTE: This setting can be used only if <<plugins-{type}s-{plugin}-mode>> is `server` and <<plugins-{type}s-{plugin}-ssl_certificate_authorities>> is set.
161
143
 
162
144
 
163
- [id="plugins-{type}s-{plugin}-ssl_enable"]
164
- ===== `ssl_enable`
165
- deprecated[6.2.0, Replaced by <<plugins-{type}s-{plugin}-ssl_enabled>>]
166
-
167
- * Value type is <<boolean,boolean>>
168
- * Default value is `false`
169
-
170
- Enable SSL (must be set for other `ssl_` options to take effect).
171
-
172
145
  [id="plugins-{type}s-{plugin}-ssl_enabled"]
173
146
  ===== `ssl_enabled`
174
147
 
@@ -223,15 +196,21 @@ has a hostname or IP address that matches the names within the certificate.
223
196
 
224
197
  NOTE: This setting can be used only if <<plugins-{type}s-{plugin}-mode>> is `client`.
225
198
 
226
- [id="plugins-{type}s-{plugin}-ssl_verify"]
227
- ===== `ssl_verify`
228
- deprecated[6.2.0, Replaced by <<plugins-{type}s-{plugin}-ssl_client_authentication>> and <<plugins-{type}s-{plugin}-ssl_verification_mode>>]
199
+ [id="plugins-{type}s-{plugin}-obsolete-options"]
200
+ ==== TCP Output Obsolete Configuration Options
201
+
202
+ WARNING: As of version `6.0.0` of this plugin, some configuration options have been replaced.
203
+ The plugin will fail to start if it contains any of these obsolete options.
229
204
 
230
- * Value type is <<boolean,boolean>>
231
- * Default value is `false`
232
205
 
233
- Verify the identity of the other end of the SSL connection against the CA.
234
- For input, sets the field `sslsubject` to that of the client certificate.
206
+ [cols="<,<",options="header",]
207
+ |=======================================================================
208
+ |Setting|Replaced by
209
+ | ssl_cacert |<<plugins-{type}s-{plugin}-ssl_certificate_authorities>>
210
+ | ssl_cert |<<plugins-{type}s-{plugin}-ssl_certificate>>
211
+ | ssl_enable |<<plugins-{type}s-{plugin}-ssl_enabled>>
212
+ | ssl_verify |<<plugins-{type}s-{plugin}-ssl_client_authentication>> in `server` mode and <<plugins-{type}s-{plugin}-ssl_verification_mode>> in `client` mode
213
+ |=======================================================================
235
214
 
236
215
  [id="plugins-{type}s-{plugin}-common-options"]
237
216
  include::{include_path}/{type}.asciidoc[]
@@ -3,7 +3,6 @@ require "logstash/outputs/base"
3
3
  require "logstash/namespace"
4
4
  require "thread"
5
5
  require "logstash/util/socket_peer"
6
- require "logstash/plugin_mixins/normalize_config_support"
7
6
 
8
7
  # Write events over a TCP socket.
9
8
  #
@@ -13,8 +12,6 @@ require "logstash/plugin_mixins/normalize_config_support"
13
12
  # depending on `mode`.
14
13
  class LogStash::Outputs::Tcp < LogStash::Outputs::Base
15
14
 
16
- include LogStash::PluginMixins::NormalizeConfigSupport
17
-
18
15
  config_name "tcp"
19
16
  concurrency :single
20
17
 
@@ -35,9 +32,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
35
32
  # `client` connects to a server.
36
33
  config :mode, :validate => ["server", "client"], :default => "client"
37
34
 
38
- # Enable SSL (must be set for other `ssl_` options to take effect).
39
- config :ssl_enable, :validate => :boolean, :default => false, :deprecated => "Use 'ssl_enabled' instead."
40
-
41
35
  # Enable SSL (must be set for other `ssl_` options to take effect).
42
36
  config :ssl_enabled, :validate => :boolean, :default => false
43
37
 
@@ -48,10 +42,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
48
42
  # This option needs to be used with `ssl_certificate_authorities` and a defined list of CAs.
49
43
  config :ssl_client_authentication, :validate => %w[none optional required], :default => 'none'
50
44
 
51
- # Verify the identity of the other end of the SSL connection against the CA.
52
- # For input, sets the field `sslsubject` to that of the client certificate.
53
- config :ssl_verify, :validate => :boolean, :default => false, :deprecated => "Use 'ssl_client_authentication' when `mode` is 'server' or 'ssl_verification_mode' when mode is `client`"
54
-
55
45
  # Options to verify the server's certificate.
56
46
  # "full": validates that the provided certificate has an issue date that’s within the not_before and not_after dates;
57
47
  # chains to a trusted Certificate Authority (CA); has a hostname or IP address that matches the names within the certificate.
@@ -59,16 +49,11 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
59
49
  # "none": performs no certificate validation. Disabling this severely compromises security (https://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf)
60
50
  config :ssl_verification_mode, :validate => %w[full none], :default => 'full'
61
51
 
62
- # The SSL CA certificate, chainfile or CA path. The system CA path is automatically included.
63
- config :ssl_cacert, :validate => :path, :deprecated => "Use 'ssl_certificate_authorities' instead."
64
52
 
65
53
  # Validate client certificate or certificate chain against these authorities. You can define multiple files.
66
54
  # All the certificates will be read and added to the trust store.
67
55
  config :ssl_certificate_authorities, :validate => :path, :list => true
68
56
 
69
- # SSL certificate path
70
- config :ssl_cert, :validate => :path, :deprecated => "Use 'ssl_certificate' instead."
71
-
72
57
  # SSL certificate path
73
58
  config :ssl_certificate, :validate => :path
74
59
 
@@ -84,6 +69,11 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
84
69
  # The list of ciphers suite to use
85
70
  config :ssl_cipher_suites, :validate => :string, :list => true
86
71
 
72
+ config :ssl_enable, :obsolete => "Use 'ssl_enabled' instead."
73
+ config :ssl_verify, :obsolete => "Use 'ssl_client_authentication' when `mode` is 'server' or 'ssl_verification_mode' when mode is `client`"
74
+ config :ssl_cacert, :obsolete => "Use 'ssl_certificate_authorities' instead."
75
+ config :ssl_cert, :obsolete => "Use 'ssl_certificate' instead."
76
+
87
77
  class Client
88
78
 
89
79
  ##
@@ -189,11 +179,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
189
179
  end
190
180
  private :load_cert_store
191
181
 
192
- def initialize(*args)
193
- super(*args)
194
- setup_ssl_params!
195
- end
196
-
197
182
  # @overload Base#register
198
183
  def register
199
184
  require "socket"
@@ -405,47 +390,6 @@ class LogStash::Outputs::Tcp < LogStash::Outputs::Base
405
390
  original_params.include?('ssl_enable') ? 'ssl_enable' : 'ssl_enabled'
406
391
  end
407
392
 
408
- def setup_ssl_params!
409
- @ssl_enabled = normalize_config(:ssl_enabled) do |normalizer|
410
- normalizer.with_deprecated_alias(:ssl_enable)
411
- end
412
-
413
- @ssl_certificate = normalize_config(:ssl_certificate) do |normalizer|
414
- normalizer.with_deprecated_alias(:ssl_cert)
415
- end
416
-
417
- if server?
418
- @ssl_client_authentication = normalize_config(:ssl_client_authentication) do |normalizer|
419
- normalizer.with_deprecated_mapping(:ssl_verify) do |ssl_verify|
420
- ssl_verify == true ? 'required' : 'none'
421
- end
422
- end
423
- else
424
- @ssl_verification_mode = normalize_config(:ssl_verification_mode) do |normalize|
425
- normalize.with_deprecated_mapping(:ssl_verify) do |ssl_verify|
426
- ssl_verify == true ? 'full' : 'none'
427
- end
428
- end
429
-
430
- # Keep backwards compatibility with the default :ssl_verify value (false)
431
- if !original_params.include?('ssl_verify') && !original_params.include?('ssl_verification_mode')
432
- @ssl_verification_mode = 'none'
433
- end
434
- end
435
-
436
- @ssl_certificate_authorities = normalize_config(:ssl_certificate_authorities) do |normalize|
437
- normalize.with_deprecated_mapping(:ssl_cacert) do |ssl_cacert|
438
- if File.directory?(ssl_cacert)
439
- Dir.children(ssl_cacert)
440
- .map{ |f| File.join(ssl_cacert, f) }
441
- .reject{ |f| File.directory?(f) || File.basename(f).start_with?('.') }
442
- else
443
- [ssl_cacert]
444
- end
445
- end
446
- end
447
- end
448
-
449
393
  def server?
450
394
  @mode == "server"
451
395
  end # def server?
@@ -1,7 +1,7 @@
1
1
  Gem::Specification.new do |s|
2
2
 
3
3
  s.name = 'logstash-output-tcp'
4
- s.version = '6.2.1'
4
+ s.version = '7.0.0'
5
5
  s.licenses = ['Apache License (2.0)']
6
6
  s.summary = "Writes events over a TCP socket"
7
7
  s.description = "This gem is a Logstash plugin required to be installed on top of the Logstash core pipeline using $LS_HOME/bin/logstash-plugin install gemname. This gem is not a stand-alone program"
@@ -24,7 +24,6 @@ Gem::Specification.new do |s|
24
24
  s.add_runtime_dependency 'logstash-core', '>= 8.1.0'
25
25
  s.add_runtime_dependency 'logstash-codec-json'
26
26
  s.add_runtime_dependency 'stud'
27
- s.add_runtime_dependency 'logstash-mixin-normalize_config_support', '~>1.0'
28
27
 
29
28
  s.add_runtime_dependency 'jruby-openssl', '>= 0.12.2' # 0.12 supports TLSv1.3
30
29
 
@@ -24,6 +24,25 @@ describe LogStash::Outputs::Tcp do
24
24
 
25
25
  let(:event) { LogStash::Event.new('message' => 'foo bar') }
26
26
 
27
+ ['server', 'client'].each do |mode|
28
+ describe "handling obsolete settings for #{mode} mode" do
29
+ [{:name => 'ssl_cert', :replacement => 'ssl_certificate', :sample_value => "certificate_path"},
30
+ {:name => 'ssl_cacert', :replacement => 'ssl_certificate_authorities', :sample_value => "certificate_path"},
31
+ {:name => 'ssl_enable', :replacement => 'ssl_enabled', :sample_value => true},
32
+ {:name => 'ssl_verify', :replacement => 'ssl_client_authentication', :sample_value => 'peer'}].each do | obsolete_setting |
33
+ context "with obsolete #{obsolete_setting[:name]}" do
34
+ let (:deprecated_config) do
35
+ config.merge({'mode' => mode, obsolete_setting[:name] => obsolete_setting[:sample_value]})
36
+ end
37
+
38
+ it "should raise a config error with the appropriate message" do
39
+ expect { LogStash::Outputs::Tcp.new(deprecated_config).register }.to raise_error LogStash::ConfigurationError, /The setting `#{obsolete_setting[:name]}` in plugin `tcp` is obsolete and is no longer available. Use '#{obsolete_setting[:replacement]}'/i
40
+ end
41
+ end
42
+ end
43
+ end
44
+ end
45
+
27
46
  context 'failing to connect' do
28
47
 
29
48
  before { subject.register }
@@ -214,7 +233,7 @@ describe LogStash::Outputs::Tcp do
214
233
 
215
234
  context 'with supported protocol' do
216
235
 
217
- let(:config) { super().merge("ssl_supported_protocols" => ['TLSv1.2']) }
236
+ let(:config) { super().merge("ssl_supported_protocols" => ['TLSv1.2'], "ssl_verification_mode" => "none") }
218
237
 
219
238
  let(:server_min_version) { 'TLS1_2' }
220
239
 
@@ -277,7 +296,7 @@ describe LogStash::Outputs::Tcp do
277
296
  context "and protocol is TLSv1.3" do
278
297
  let(:key_file) { File.join(FIXTURES_PATH, 'plaintext/instance.key') }
279
298
  let(:crt_file) { File.join(FIXTURES_PATH, 'plaintext/instance.crt') }
280
- let(:config) { super().merge("ssl_certificate" => crt_file, "ssl_key" => key_file) }
299
+ let(:config) { super().merge("ssl_certificate" => crt_file, "ssl_key" => key_file, "ssl_verification_mode" => "none") }
281
300
 
282
301
  let(:secure_server) do
283
302
  ssl_context = OpenSSL::SSL::SSLContext.new
@@ -374,16 +393,6 @@ describe LogStash::Outputs::Tcp do
374
393
  end
375
394
  end
376
395
 
377
- context "with deprecated ssl_verify = true and no ssl_certificate_authorities" do
378
- let(:config) { super().merge(
379
- 'ssl_verify' => true,
380
- 'ssl_certificate_authorities' => []
381
- ) }
382
-
383
- it "should register without errors" do
384
- expect { subject.register }.to_not raise_error
385
- end
386
- end
387
396
 
388
397
  %w[required optional].each do |ssl_client_authentication|
389
398
  context "with ssl_client_authentication = `#{ssl_client_authentication}` and no ssl_certificate_authorities" do
@@ -409,53 +418,6 @@ describe LogStash::Outputs::Tcp do
409
418
  end
410
419
  end
411
420
 
412
- context "with deprecated settings" do
413
- let(:ssl_verify) { true }
414
- let(:certificate_path) { File.join(FIXTURES_PATH, 'plaintext/instance.crt') }
415
- let(:config) do
416
- {
417
- "host" => "127.0.0.1",
418
- "port" => port,
419
- "ssl_enable" => true,
420
- "ssl_cert" => certificate_path,
421
- "ssl_key" => File.join(FIXTURES_PATH, 'plaintext/instance.key'),
422
- "ssl_verify" => ssl_verify
423
- }
424
- end
425
-
426
- context "and mode is server" do
427
- let(:config) { super().merge("mode" => 'server') }
428
- [true, false].each do |verify|
429
- context "and ssl_verify is #{verify}" do
430
- let(:ssl_verify) { verify }
431
-
432
- it "should set new configs variables" do
433
- subject.register
434
- expect(subject.instance_variable_get(:@ssl_enabled)).to eql(true)
435
- expect(subject.instance_variable_get(:@ssl_client_authentication)).to eql(verify ? 'required' : 'none')
436
- expect(subject.instance_variable_get(:@ssl_certificate)).to eql(certificate_path)
437
- end
438
- end
439
- end
440
- end
441
-
442
- context "and mode is client" do
443
- let(:config) { super().merge("mode" => 'client') }
444
- [true, false].each do |verify|
445
- context "and ssl_verify is #{verify}" do
446
- let(:ssl_verify) { verify }
447
-
448
- it "should set new configs variables" do
449
- subject.register
450
- expect(subject.instance_variable_get(:@ssl_enabled)).to eql(true)
451
- expect(subject.instance_variable_get(:@ssl_verification_mode)).to eql(verify ? 'full' : 'none')
452
- expect(subject.instance_variable_get(:@ssl_certificate)).to eql(certificate_path)
453
- end
454
- end
455
- end
456
- end
457
- end
458
-
459
421
  context "with ssl_client_authentication" do
460
422
  let(:config) do
461
423
  super().merge 'ssl_client_authentication' => 'required'
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: logstash-output-tcp
3
3
  version: !ruby/object:Gem::Version
4
- version: 6.2.1
4
+ version: 7.0.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Elastic
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-06-05 00:00:00.000000000 Z
11
+ date: 2025-01-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  requirement: !ruby/object:Gem::Requirement
@@ -20,8 +20,8 @@ dependencies:
20
20
  - !ruby/object:Gem::Version
21
21
  version: '2.99'
22
22
  name: logstash-core-plugin-api
23
- prerelease: false
24
23
  type: :runtime
24
+ prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
26
26
  requirements:
27
27
  - - ">="
@@ -37,8 +37,8 @@ dependencies:
37
37
  - !ruby/object:Gem::Version
38
38
  version: 8.1.0
39
39
  name: logstash-core
40
- prerelease: false
41
40
  type: :runtime
41
+ prerelease: false
42
42
  version_requirements: !ruby/object:Gem::Requirement
43
43
  requirements:
44
44
  - - ">="
@@ -51,8 +51,8 @@ dependencies:
51
51
  - !ruby/object:Gem::Version
52
52
  version: '0'
53
53
  name: logstash-codec-json
54
- prerelease: false
55
54
  type: :runtime
55
+ prerelease: false
56
56
  version_requirements: !ruby/object:Gem::Requirement
57
57
  requirements:
58
58
  - - ">="
@@ -65,27 +65,13 @@ dependencies:
65
65
  - !ruby/object:Gem::Version
66
66
  version: '0'
67
67
  name: stud
68
- prerelease: false
69
68
  type: :runtime
69
+ prerelease: false
70
70
  version_requirements: !ruby/object:Gem::Requirement
71
71
  requirements:
72
72
  - - ">="
73
73
  - !ruby/object:Gem::Version
74
74
  version: '0'
75
- - !ruby/object:Gem::Dependency
76
- requirement: !ruby/object:Gem::Requirement
77
- requirements:
78
- - - "~>"
79
- - !ruby/object:Gem::Version
80
- version: '1.0'
81
- name: logstash-mixin-normalize_config_support
82
- prerelease: false
83
- type: :runtime
84
- version_requirements: !ruby/object:Gem::Requirement
85
- requirements:
86
- - - "~>"
87
- - !ruby/object:Gem::Version
88
- version: '1.0'
89
75
  - !ruby/object:Gem::Dependency
90
76
  requirement: !ruby/object:Gem::Requirement
91
77
  requirements:
@@ -93,8 +79,8 @@ dependencies:
93
79
  - !ruby/object:Gem::Version
94
80
  version: 0.12.2
95
81
  name: jruby-openssl
96
- prerelease: false
97
82
  type: :runtime
83
+ prerelease: false
98
84
  version_requirements: !ruby/object:Gem::Requirement
99
85
  requirements:
100
86
  - - ">="
@@ -107,8 +93,8 @@ dependencies:
107
93
  - !ruby/object:Gem::Version
108
94
  version: '0'
109
95
  name: logstash-devutils
110
- prerelease: false
111
96
  type: :development
97
+ prerelease: false
112
98
  version_requirements: !ruby/object:Gem::Requirement
113
99
  requirements:
114
100
  - - ">="
@@ -121,8 +107,8 @@ dependencies:
121
107
  - !ruby/object:Gem::Version
122
108
  version: '0'
123
109
  name: logstash-codec-plain
124
- prerelease: false
125
110
  type: :development
111
+ prerelease: false
126
112
  version_requirements: !ruby/object:Gem::Requirement
127
113
  requirements:
128
114
  - - ">="
@@ -135,8 +121,8 @@ dependencies:
135
121
  - !ruby/object:Gem::Version
136
122
  version: '0'
137
123
  name: flores
138
- prerelease: false
139
124
  type: :development
125
+ prerelease: false
140
126
  version_requirements: !ruby/object:Gem::Requirement
141
127
  requirements:
142
128
  - - ">="
@@ -185,7 +171,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
185
171
  - !ruby/object:Gem::Version
186
172
  version: '0'
187
173
  requirements: []
188
- rubygems_version: 3.2.33
174
+ rubygems_version: 3.3.26
189
175
  signing_key:
190
176
  specification_version: 4
191
177
  summary: Writes events over a TCP socket