lib/logstash/inputs/tcp.rb in logstash-input-tcp-3.0.0 vs lib/logstash/inputs/tcp.rb in logstash-input-tcp-3.0.1
- old
+ new
@@ -36,11 +36,11 @@
# Verify the identity of the other end of the SSL connection against the CA.
# For input, sets the field `sslsubject` to that of the client certificate.
config :ssl_verify, :validate => :boolean, :default => true
# The SSL CA certificate, chainfile or CA path. The system CA path is automatically included.
- config :ssl_cacert, :validate => :path, :deprecated => "This setting is deprecated in favor of extra_chain_cert as it sets a more clear expectation to add more X509 certificates to the store"
+ config :ssl_cacert, :validate => :path, :deprecated => "This setting is deprecated in favor of ssl_extra_chain_certs as it sets a more clear expectation to add more X509 certificates to the store"
# SSL certificate path
config :ssl_cert, :validate => :path
# SSL key path
@@ -151,11 +151,11 @@
def handle_socket(socket, client_address, client_port, output_queue, codec)
while !stop?
codec.decode(read(socket)) do |event|
event["host"] ||= client_address
event["port"] ||= client_port
- event["sslsubject"] ||= socket.peer_cert.subject if @ssl_enable && @ssl_verify
+ event["sslsubject"] ||= socket.peer_cert.subject.to_s if @ssl_enable && @ssl_verify
decorate(event)
output_queue << event
end
end
rescue EOFError
@@ -174,10 +174,10 @@
socket.close rescue nil
codec.respond_to?(:flush) && codec.flush do |event|
event["host"] ||= client_address
event["port"] ||= client_port
- event["sslsubject"] ||= socket.peer_cert.subject if @ssl_enable && @ssl_verify
+ event["sslsubject"] ||= socket.peer_cert.subject.to_s if @ssl_enable && @ssl_verify
decorate(event)
output_queue << event
end
end