Allow any key usage type on x509 certificate (#7760)
This commit is contained in:
parent
b6560c8b01
commit
1adc4f0f2a
|
|
@ -211,6 +211,7 @@ func (c *X509Cert) Gather(acc telegraf.Accumulator) error {
|
||||||
// name validation against the URL hostname.
|
// name validation against the URL hostname.
|
||||||
opts := x509.VerifyOptions{
|
opts := x509.VerifyOptions{
|
||||||
Intermediates: x509.NewCertPool(),
|
Intermediates: x509.NewCertPool(),
|
||||||
|
KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageAny},
|
||||||
}
|
}
|
||||||
if i == 0 {
|
if i == 0 {
|
||||||
if c.ServerName == "" {
|
if c.ServerName == "" {
|
||||||
|
|
|
||||||
|
|
@ -142,6 +142,7 @@ func TestGatherLocal(t *testing.T) {
|
||||||
{name: "not a certificate", mode: 0640, content: "test", error: true},
|
{name: "not a certificate", mode: 0640, content: "test", error: true},
|
||||||
{name: "wrong certificate", mode: 0640, content: wrongCert, error: true},
|
{name: "wrong certificate", mode: 0640, content: wrongCert, error: true},
|
||||||
{name: "correct certificate", mode: 0640, content: pki.ReadServerCert()},
|
{name: "correct certificate", mode: 0640, content: pki.ReadServerCert()},
|
||||||
|
{name: "correct client certificate", mode: 0640, content: pki.ReadClientCert()},
|
||||||
{name: "correct certificate and extra trailing space", mode: 0640, content: pki.ReadServerCert() + " "},
|
{name: "correct certificate and extra trailing space", mode: 0640, content: pki.ReadServerCert() + " "},
|
||||||
{name: "correct certificate and extra leading space", mode: 0640, content: " " + pki.ReadServerCert()},
|
{name: "correct certificate and extra leading space", mode: 0640, content: " " + pki.ReadServerCert()},
|
||||||
{name: "correct multiple certificates", mode: 0640, content: pki.ReadServerCert() + pki.ReadCACert()},
|
{name: "correct multiple certificates", mode: 0640, content: pki.ReadServerCert() + pki.ReadCACert()},
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue