lib/logstash/inputs/tcp.rb in logstash-input-tcp-3.0.0 vs lib/logstash/inputs/tcp.rb in logstash-input-tcp-3.0.1

- old
+ new

@@ -36,11 +36,11 @@ # Verify the identity of the other end of the SSL connection against the CA. # For input, sets the field `sslsubject` to that of the client certificate. config :ssl_verify, :validate => :boolean, :default => true # The SSL CA certificate, chainfile or CA path. The system CA path is automatically included. - config :ssl_cacert, :validate => :path, :deprecated => "This setting is deprecated in favor of extra_chain_cert as it sets a more clear expectation to add more X509 certificates to the store" + config :ssl_cacert, :validate => :path, :deprecated => "This setting is deprecated in favor of ssl_extra_chain_certs as it sets a more clear expectation to add more X509 certificates to the store" # SSL certificate path config :ssl_cert, :validate => :path # SSL key path @@ -151,11 +151,11 @@ def handle_socket(socket, client_address, client_port, output_queue, codec) while !stop? codec.decode(read(socket)) do |event| event["host"] ||= client_address event["port"] ||= client_port - event["sslsubject"] ||= socket.peer_cert.subject if @ssl_enable && @ssl_verify + event["sslsubject"] ||= socket.peer_cert.subject.to_s if @ssl_enable && @ssl_verify decorate(event) output_queue << event end end rescue EOFError @@ -174,10 +174,10 @@ socket.close rescue nil codec.respond_to?(:flush) && codec.flush do |event| event["host"] ||= client_address event["port"] ||= client_port - event["sslsubject"] ||= socket.peer_cert.subject if @ssl_enable && @ssl_verify + event["sslsubject"] ||= socket.peer_cert.subject.to_s if @ssl_enable && @ssl_verify decorate(event) output_queue << event end end