Commit Graph

42 Commits

Author SHA1 Message Date
Paweł Żak c4dbe65732
chore(linters): Bump golangci-lint to v1.56.1 (#14759) 2024-02-12 23:26:10 +01:00
Paweł Żak 3786cf2d72
chore(linters): Enable equalFold, preferStringWriter, and stringXbytes checkers for gocritic. (#14452) 2023-12-15 06:25:10 -07:00
Paweł Żak 8fbea28ab3
chore(linters): Fix findings found by testifylint: expected-actual (#14229) 2023-11-01 14:09:55 -06:00
Paweł Żak 34ae468a8c
chore(linters): Fix findings found by testifylint: len (#14203) 2023-10-31 10:29:53 +01:00
Paweł Żak 97f47c11dd
chore(linters): Fix findings found by testifylint: empty (#14179) 2023-10-25 15:09:13 -06:00
Joshua Powers 3415cc8c80
chore: Fix gosec G102 issues (#12923) 2023-03-28 11:40:29 +02:00
Joshua Powers 29916dfee0
test(inputs.x509_cert): fix missing tag (#12720) 2023-02-22 07:33:34 -07:00
Sven Rebhan d1d9737da6
feat(inputs.x509_cert): Add tag for certificate type-classification (#12656) 2023-02-22 13:39:15 +01:00
Jarno Huuskonen 54c091977c
feat(inputs.x509_cert): Add OCSP stapling information for leaf certificates (#10550) (#12444)
Co-authored-by: Josh Powers <powersj@fastmail.com>
2023-02-17 09:47:54 +01:00
Sven Rebhan ff89b7778b
fix(inputs.x509_cert): Fix Windows path handling (#12629) 2023-02-13 09:22:39 +01:00
Paweł Żak e84bc0c590
chore: clean up import shadowing issues (#12588) 2023-02-01 11:21:38 -07:00
Sven Rebhan 6f33711c38
chore(inputs.x509_cert): fix linter warning (#12577) 2023-01-31 12:05:05 -07:00
Sven Rebhan d3eec6166a
chore(inputs.x509_cert): Cleanup code (#12250) 2022-11-18 16:23:07 +01:00
Paweł Żak b98a76372a
chore: wrap long lines in plugins/inputs/[t-z]* (#12218) 2022-11-10 11:41:43 -07:00
Sven Rebhan 7bd9c91ebe
fix(inputs.x509): Multiple sources with non-overlapping DNS entries. (#11613) 2022-08-05 12:54:23 -06:00
Alexander Krantz 65a60855a0
feat(x509_cert): add proxy support (#9319) 2022-06-21 15:50:06 -05:00
Joshua Powers 3f65217f5e
test: mark integration tests correctly (#11317) 2022-06-16 14:10:11 -06:00
skillor 05285a1fdb
feat(inputs.x509_cert): add smtp protocol (#11271)
Co-authored-by: dreiekk <dreiekk@users.noreply.github.com>
2022-06-15 11:46:26 -05:00
Joshua Powers deb0c6e207
test: update mongodb output to use test containers (#11137) 2022-05-19 14:14:02 -06:00
Sebastian Spaink b355be5ccb
feat: migrate input plugins to new sample config format (M-Z) (#10926) 2022-04-11 16:32:25 -05:00
Jarno Huuskonen e906698bba
feat: add exclude_root_certs option to x509_cert plugin (#9822) 2021-12-22 13:39:36 -07:00
Sebastian Spaink 68233c5934
fix: mark TestGatherUDPCert as an integration test (#10279) 2021-12-15 18:48:18 -06:00
Paweł Żak 146fff3183
fix: Linter fixes for plugins/inputs/[t-z]* (#10105) 2021-11-18 07:22:43 -07:00
Eng Zer Jun 6a3b27126a
refactor: move from io/ioutil to io and os package (#9811) 2021-09-28 15:16:32 -06:00
Alexander Krantz 32d4234ae4
Prevent x509_cert from hanging on UDP connection (#9323) 2021-07-22 17:44:36 -07:00
Jarno Huuskonen ac9bf5a0ec
Fix x509_cert input plugin SNI support (#9289) 2021-06-22 11:41:45 -05:00
Sven Rebhan 9853bf6c54
Get rid of deprecated internal.{Duration,Size,Number} (#8969) 2021-04-09 13:15:04 -04:00
Sven Rebhan 8e7da355b3
Linter fixes (unhandled errors) -- Part 1 (#8992) 2021-04-08 11:43:39 -05:00
Paweł Żak 38c61c07ef
Revive fixes - part 4: (#8981)
empty-lines

Co-authored-by: Pawel Zak <Pawel Zak>
2021-03-12 14:21:51 -06:00
Helen Weller d41569caed
Integration test audit (#8725) 2021-01-26 11:06:12 -07:00
viperstars eda1dbc4dc
fix x509 cert timeout issue (#8741) 2021-01-26 13:02:23 -05:00
Andreas Fuchs 3c9c013f4b
common/tls: Allow specifying SNI hostnames (#7897)
* tls_config: Allow specifying SNI hostnames

Add a new configration field `tls_server_name` that allows specifying
the server name that'll be sent in the ClientHello when telegraf makes
a request to TLS servers. This allows checking against load balancers
responding to specific hostnames that otherwise wouldn't resolve to
their addresses.

Add the setting to the documentation of common TLS options, as well as
to the http_response plugin.

Fixes #7598.

* Adjust the x509_cert to allow usage of tls_server_name

This plugin has been using ServerName previously, and will have to
deal with the new setting, too: Extract the server-name choosing into
a method & add a test to ensure we choose the right value (and error
under the right circumstances). Also document that the two settings
are mutually exclusive.

* Improve documentation on what we try to accomplish in the nil return

Also get rid of the TODO, as I am fairly certain this behavior is the
correct one.

* Remove unused struct field in tests
2020-12-23 13:39:43 -06:00
Paweł Żak 0fcfee0caf
Fix tests for Windows - part 1 (#8414) 2020-11-23 10:40:32 -05:00
Daniel Nelson 1adc4f0f2a
Allow any key usage type on x509 certificate (#7760) 2020-06-30 00:31:07 -07:00
Benjamin Schweizer 875bd7743b Only parse certificate blocks in x509_cert input (#6893) 2020-01-13 10:49:14 -08:00
Yong Wen Chua 6eb21978e6 Add additional tags for x509 Input Plugin (#6686) 2019-11-26 10:04:55 -08:00
Jonathan Negrin c53d53826d Allow multiple certificates per file in x509_cert input (#6695) 2019-11-25 15:38:57 -08:00
Greg 3e50db904a Add certificate verification status to x509_cert input (#6143) 2019-07-22 16:10:40 -07:00
Greg 1137fa50ad Continue checking cert from other sources if error occurs (#5381) 2019-02-05 17:38:04 -08:00
Onur Güzel d33116381b Add certificate distinguished name as a tags in x509_cert input (#4873) 2018-10-18 23:32:43 -07:00
Fred Cox 48745c3171 Fix segfault in x509_cert (#4874) 2018-10-17 12:46:44 -06:00
Jiri Tyr a897b84049 Adding x509_cert input plugin (#3768) 2018-07-30 13:12:45 -06:00