Commit Graph

27 Commits

Author SHA1 Message Date
Paulo Dias d231442040
feat(inputs.x509_cert): Add support for JKS and PKCS#12 keystores (#16508)
Signed-off-by: Paulo Dias <paulodias.gm@gmail.com>
2025-03-10 02:11:57 -05:00
Sven Rebhan c38792949d
chore(inputs): Fix line-length in READMEs for `t` to `z` (#16485) 2025-02-06 14:11:18 -06:00
Dane Strandboge 7f1c5d31aa
fix(inputs.x509_cert): Add config to left-pad serial number to 128-bits (#16447) 2025-02-04 09:57:13 -06:00
Igør cfabd62f4e
docs(inputs.x509_cert): Explain expiry field (#15099) 2024-04-03 07:24:17 -06:00
r3inbowari 19c4316694
chore: Update README.md (#12989) 2023-04-04 13:43:49 +02:00
Sven Rebhan d1d9737da6
feat(inputs.x509_cert): Add tag for certificate type-classification (#12656) 2023-02-22 13:39:15 +01:00
Jarno Huuskonen 54c091977c
feat(inputs.x509_cert): Add OCSP stapling information for leaf certificates (#10550) (#12444)
Co-authored-by: Josh Powers <powersj@fastmail.com>
2023-02-17 09:47:54 +01:00
Thomas Casteleyn 61523bd4b9
feat(tools/readme_linter): Check for global configuration section (#12426) 2023-01-12 16:55:21 +01:00
Sven Rebhan 404c0475d0
docs(inputs.x509_cert): Add documentation for 'exclude_root_certs' option. (#12249) 2022-11-16 06:37:13 -07:00
Joshua Powers 49ac03fa80
docs: add global configuration header (#12107) 2022-10-26 14:58:36 -05:00
Alexander Krantz 65a60855a0
feat(x509_cert): add proxy support (#9319) 2022-06-21 15:50:06 -05:00
skillor 05285a1fdb
feat(inputs.x509_cert): add smtp protocol (#11271)
Co-authored-by: dreiekk <dreiekk@users.noreply.github.com>
2022-06-15 11:46:26 -05:00
reimda f7aab29381
chore: Fix readme linter errors for input plugins M-Z (#11274) 2022-06-08 15:22:56 -06:00
Sven Rebhan 56eb914998
chore: Embed sample configurations into README for inputs (#11136) 2022-05-24 08:49:47 -05:00
Mya 7d3531a29b
chore: clean up markdown lint errors input plugins w to z (#10166) 2021-11-24 11:50:22 -07:00
Alexander Krantz 32d4234ae4
Prevent x509_cert from hanging on UDP connection (#9323) 2021-07-22 17:44:36 -07:00
jaroug b2b361356e
Wildcard support for x509_cert files (#6952)
* Accept standard unix glob matching rules

* comply with indentation

* update readme

* move globing expand and url parsing into Init()

* chore: rebase branch on upstream master

* rename refreshFilePaths to expandFilePaths
* expandFilePaths handles '/path/to/*.pem' and 'files:///path/to/*.pem'
* update sample config

* fix: recompile files globing pattern at every gather tic

 * add var globFilePathsToUrls to stack files path
 * add var globpaths to stack compiled globpath
 * rework sourcesToURLs to compile files path and stack them
 * rename expandFilePaths to expandFilePathsToUrls
 * rework expandFilePathsToUrls to only match compiled globpath
 * rework the `Gather` ticker to match globpath at each call

* fix: comply with requested changes

 * add specifics regarding relative paths in sample config
 * add logger and use it in expandFilePathsToUrls()
 * precompile glob for `files://`, `/` and `://`

* fix: update README to match last changes

* fix: comply with last requested changes

 * rename expandFilePathsToUrls() to collectCertURLs()
 * collectCertURLs() now returns []*url.URL to avoid extra field
globFilePathsToUrls in structure
 * update the Gather() ticker accordingly

* fix(windows): do not try to compile glopath for windows path as it's not supposed to be supported by the OS

* fix(ci): apply go fmt

* fix(ci): empty-lines/import-shadowing

Co-authored-by: Anthony LE BERRE <aleberre@vente-privee.com>
2021-03-23 17:31:15 -04:00
Andreas Fuchs 3c9c013f4b
common/tls: Allow specifying SNI hostnames (#7897)
* tls_config: Allow specifying SNI hostnames

Add a new configration field `tls_server_name` that allows specifying
the server name that'll be sent in the ClientHello when telegraf makes
a request to TLS servers. This allows checking against load balancers
responding to specific hostnames that otherwise wouldn't resolve to
their addresses.

Add the setting to the documentation of common TLS options, as well as
to the http_response plugin.

Fixes #7598.

* Adjust the x509_cert to allow usage of tls_server_name

This plugin has been using ServerName previously, and will have to
deal with the new setting, too: Extract the server-name choosing into
a method & add a test to ensure we choose the right value (and error
under the right circumstances). Also document that the two settings
are mutually exclusive.

* Improve documentation on what we try to accomplish in the nil return

Also get rid of the TODO, as I am fairly certain this behavior is the
correct one.

* Remove unused struct field in tests
2020-12-23 13:39:43 -06:00
Russ Savage 40c6d189fe
fix(readmes): standarize first line of readmes (#7973) 2020-08-11 16:10:41 -04:00
Daniel Nelson 9747fa7f07
Update changelog 2020-01-21 17:11:50 -08:00
James Beckett 916f39d285 Add server_name override for x509_cert plugin (#6917) 2020-01-21 17:06:58 -08:00
Yong Wen Chua 6eb21978e6 Add additional tags for x509 Input Plugin (#6686) 2019-11-26 10:04:55 -08:00
Greg 3e50db904a Add certificate verification status to x509_cert input (#6143) 2019-07-22 16:10:40 -07:00
Daniel Nelson 1af2cf902c
Add new DN tags to x509_cert readme 2018-10-18 23:34:59 -07:00
Fred Cox 48745c3171 Fix segfault in x509_cert (#4874) 2018-10-17 12:46:44 -06:00
Greg Linton 3d1c650c54 Update changelog 2018-07-30 13:14:55 -06:00
Jiri Tyr a897b84049 Adding x509_cert input plugin (#3768) 2018-07-30 13:12:45 -06:00