Commit Graph

46 Commits

Author SHA1 Message Date
Paweł Żak 9415d8e7e9
chore(linters): Enable `import-alias-naming` and `redundant-import-alias` rules for revive (#15836) 2024-10-01 13:49:53 -05:00
Joshua Powers f55e02e8fd
test(linters): Enable sloppyLen (#15512) 2024-06-17 16:23:32 +02:00
Paweł Żak ae7fbc5082
chore(linters): Replace 'fmt.Errorf' with 'errors.New' wherever possible (#14698) 2024-02-08 11:32:30 -06:00
Paweł Żak e2a510f157
chore: Fix linter findings for errorlint (part7) (#12772)
Co-authored-by: Pawel Zak <Pawel Zak>
2023-03-03 10:11:54 +01:00
Thomas Casteleyn 6a2f6f301f
chore: eliminate unnecessary use of quoted strings in printf (#12722) 2023-02-23 06:49:36 -07:00
Sven Rebhan d1d9737da6
feat(inputs.x509_cert): Add tag for certificate type-classification (#12656) 2023-02-22 13:39:15 +01:00
Jarno Huuskonen 54c091977c
feat(inputs.x509_cert): Add OCSP stapling information for leaf certificates (#10550) (#12444)
Co-authored-by: Josh Powers <powersj@fastmail.com>
2023-02-17 09:47:54 +01:00
Sven Rebhan ff89b7778b
fix(inputs.x509_cert): Fix Windows path handling (#12629) 2023-02-13 09:22:39 +01:00
Sven Rebhan 6f33711c38
chore(inputs.x509_cert): fix linter warning (#12577) 2023-01-31 12:05:05 -07:00
Sven Rebhan d9820bfd7b
fix(inputs.x509_cert): fix off-by-one when adding intermediate certificates (#12404) 2022-12-15 07:52:36 -07:00
Sven Rebhan d3eec6166a
chore(inputs.x509_cert): Cleanup code (#12250) 2022-11-18 16:23:07 +01:00
Sebastian Spaink d67f75e557
docs: Remove warning not to remove go:embed (#11797)
Co-authored-by: Joshua Powers <powersj@fastmail.com>
2022-09-13 12:47:58 -05:00
Sven Rebhan 7bd9c91ebe
fix(inputs.x509): Multiple sources with non-overlapping DNS entries. (#11613) 2022-08-05 12:54:23 -06:00
Alexander Krantz 65a60855a0
feat(x509_cert): add proxy support (#9319) 2022-06-21 15:50:06 -05:00
skillor 05285a1fdb
feat(inputs.x509_cert): add smtp protocol (#11271)
Co-authored-by: dreiekk <dreiekk@users.noreply.github.com>
2022-06-15 11:46:26 -05:00
Joshua Powers 2fc19fa308
chore: correctly spell embed (#11200) 2022-05-27 07:13:47 -06:00
Sven Rebhan 56eb914998
chore: Embed sample configurations into README for inputs (#11136) 2022-05-24 08:49:47 -05:00
Sebastian Spaink b355be5ccb
feat: migrate input plugins to new sample config format (M-Z) (#10926) 2022-04-11 16:32:25 -05:00
Jarno Huuskonen e906698bba
feat: add exclude_root_certs option to x509_cert plugin (#9822) 2021-12-22 13:39:36 -07:00
Eng Zer Jun 6a3b27126a
refactor: move from io/ioutil to io and os package (#9811) 2021-09-28 15:16:32 -06:00
Alexander Krantz 32d4234ae4
Prevent x509_cert from hanging on UDP connection (#9323) 2021-07-22 17:44:36 -07:00
Sven Rebhan d63a7010d9
Fix messing up the 'source' tag for https sources. (#9400) 2021-06-22 13:45:03 -05:00
Jarno Huuskonen ac9bf5a0ec
Fix x509_cert input plugin SNI support (#9289) 2021-06-22 11:41:45 -05:00
Sven Rebhan 9853bf6c54
Get rid of deprecated internal.{Duration,Size,Number} (#8969) 2021-04-09 13:15:04 -04:00
Paweł Żak 099ccda3f9
Linter fixes - gosimple (#9046) 2021-03-25 13:57:01 -04:00
jaroug b2b361356e
Wildcard support for x509_cert files (#6952)
* Accept standard unix glob matching rules

* comply with indentation

* update readme

* move globing expand and url parsing into Init()

* chore: rebase branch on upstream master

* rename refreshFilePaths to expandFilePaths
* expandFilePaths handles '/path/to/*.pem' and 'files:///path/to/*.pem'
* update sample config

* fix: recompile files globing pattern at every gather tic

 * add var globFilePathsToUrls to stack files path
 * add var globpaths to stack compiled globpath
 * rework sourcesToURLs to compile files path and stack them
 * rename expandFilePaths to expandFilePathsToUrls
 * rework expandFilePathsToUrls to only match compiled globpath
 * rework the `Gather` ticker to match globpath at each call

* fix: comply with requested changes

 * add specifics regarding relative paths in sample config
 * add logger and use it in expandFilePathsToUrls()
 * precompile glob for `files://`, `/` and `://`

* fix: update README to match last changes

* fix: comply with last requested changes

 * rename expandFilePathsToUrls() to collectCertURLs()
 * collectCertURLs() now returns []*url.URL to avoid extra field
globFilePathsToUrls in structure
 * update the Gather() ticker accordingly

* fix(windows): do not try to compile glopath for windows path as it's not supposed to be supported by the OS

* fix(ci): apply go fmt

* fix(ci): empty-lines/import-shadowing

Co-authored-by: Anthony LE BERRE <aleberre@vente-privee.com>
2021-03-23 17:31:15 -04:00
viperstars fe16d56a3e
inputs.x509_cert: Fix timeout issue (#8824)
* reproduce timeout issue #8809

* fix timeout issue #8809

* set default timeout to 5s

* closes #8809

Co-authored-by: 彭浩 <penghao@qiyi.com>
2021-02-16 12:11:53 -05:00
viperstars eda1dbc4dc
fix x509 cert timeout issue (#8741) 2021-01-26 13:02:23 -05:00
Andreas Fuchs 3c9c013f4b
common/tls: Allow specifying SNI hostnames (#7897)
* tls_config: Allow specifying SNI hostnames

Add a new configration field `tls_server_name` that allows specifying
the server name that'll be sent in the ClientHello when telegraf makes
a request to TLS servers. This allows checking against load balancers
responding to specific hostnames that otherwise wouldn't resolve to
their addresses.

Add the setting to the documentation of common TLS options, as well as
to the http_response plugin.

Fixes #7598.

* Adjust the x509_cert to allow usage of tls_server_name

This plugin has been using ServerName previously, and will have to
deal with the new setting, too: Extract the server-name choosing into
a method & add a test to ensure we choose the right value (and error
under the right circumstances). Also document that the two settings
are mutually exclusive.

* Improve documentation on what we try to accomplish in the nil return

Also get rid of the TODO, as I am fairly certain this behavior is the
correct one.

* Remove unused struct field in tests
2020-12-23 13:39:43 -06:00
Paweł Żak 0fcfee0caf
Fix tests for Windows - part 1 (#8414) 2020-11-23 10:40:32 -05:00
Daniel Nelson 1adc4f0f2a
Allow any key usage type on x509 certificate (#7760) 2020-06-30 00:31:07 -07:00
Daniel Nelson c73ed8ca6c
Export internal/tls package for use in execd plugins (#7697) 2020-06-25 11:44:22 -07:00
Josh Soref bf1eb291f2
Fix assorted spelling mistakes (#7507) 2020-05-15 15:43:32 -07:00
Daniel Nelson 9747fa7f07
Update changelog 2020-01-21 17:11:50 -08:00
James Beckett 916f39d285 Add server_name override for x509_cert plugin (#6917) 2020-01-21 17:06:58 -08:00
Benjamin Schweizer 875bd7743b Only parse certificate blocks in x509_cert input (#6893) 2020-01-13 10:49:14 -08:00
Yong Wen Chua 6eb21978e6 Add additional tags for x509 Input Plugin (#6686) 2019-11-26 10:04:55 -08:00
Jonathan Negrin c53d53826d Allow multiple certificates per file in x509_cert input (#6695) 2019-11-25 15:38:57 -08:00
Greg 004b2cf578 Add intermediates when verifying cert in x509 input (#6159) 2019-07-31 16:59:54 -07:00
Greg 3e50db904a Add certificate verification status to x509_cert input (#6143) 2019-07-22 16:10:40 -07:00
Greg 1137fa50ad Continue checking cert from other sources if error occurs (#5381) 2019-02-05 17:38:04 -08:00
Onur Güzel d33116381b Add certificate distinguished name as a tags in x509_cert input (#4873) 2018-10-18 23:32:43 -07:00
Fred Cox 48745c3171 Fix segfault in x509_cert (#4874) 2018-10-17 12:46:44 -06:00
Onur Güzel a21524c6b3 Add hostname to TLS config for SNI support (#4747) 2018-09-26 19:16:39 -07:00
Greg Linton 3d1c650c54 Update changelog 2018-07-30 13:14:55 -06:00
Jiri Tyr a897b84049 Adding x509_cert input plugin (#3768) 2018-07-30 13:12:45 -06:00