f91d97c220
Add TOC to README
2019-09-21 10:28:49 +01:00
cfab972f8f
Use https or tcp client based on target address
...
There are some advantages to using a http client over tcp. For instance,
using http allows you to take advatange of a http proxy, which may be necessary
in some environments.
This commit puts the http client back, alongside tcp, and decides which one to use
based on the target address.
2019-09-21 10:28:49 +01:00
10353fe7fb
Merge pull request #7 from ricardbejarano/docker-image
...
Rewritten Dockerfile into a better image
2019-08-21 12:55:24 +01:00
5a1b013445
rewritten dockerfile
2019-07-05 15:44:06 +02:00
215029534e
Improve tests and remove reliance on external websites
2019-04-10 14:24:18 +01:00
30c8ffb7c3
Fix private key decryption in tests
v0.5.0
2019-03-24 20:43:14 +00:00
4c3308f819
Update Makefile and build process to match recent prometheus projects. Address issues thrown up by new tests.
2019-03-24 19:34:32 +00:00
a36358fd5d
Fix tests
2019-03-24 18:47:16 +00:00
b65beeb21f
Fix subject_ou length check typo
2019-03-22 12:40:51 +00:00
bbc543bc36
Add the compiled binary to .gitignore
2019-03-22 12:10:26 +00:00
f20e251345
Add a few tests around the scheme parsing
2019-03-22 12:10:06 +00:00
be072f46c9
Update version
2019-03-22 12:00:56 +00:00
ba94fb8386
Maintain backwards compatibility by parsing URL scheme into default port values
2019-03-22 12:00:28 +00:00
d1bbe73a08
Update README and examples for tls changes
2019-03-20 18:07:18 +00:00
e45a499637
Support protocols other than HTTPS by reimplementing the exporter as a TLS client
2019-03-20 14:04:24 +00:00
1bb799094c
Update VERSION
v0.4.0
2019-03-19 13:59:29 +00:00
39c4ef7937
Update and add to tests for client authentication
2019-03-18 12:28:10 +00:00
f17849f9b2
Update documentation for client authentication
2019-03-11 18:43:21 +00:00
7e59584659
Remove the relationship between client authentication and the alternative ca cert bundle.
...
Client authentication isn't the only situation where you might want to override the system ca bundle with an alternative.
2019-03-11 17:53:21 +00:00
645d7a6e42
Add defaults for the cert and key file flags. This could help reduce the number of flags passed to the exporter if the user is able to adhere to default.
2019-03-11 17:51:29 +00:00
1af3b2a3b2
Add initial support for client authentication
2019-03-11 17:21:22 +00:00
7e95d03166
Some cosmetic fixes
...
* Add comments to exports
* Update incorrect metric description text
* Rename variables that break typical golang conventions
2019-03-11 17:13:29 +00:00
380d1bf2f9
Merge pull request #2 from tdabasinskas/org
...
Add support for Organization Unit field
v0.3.0
2019-01-25 08:41:15 +00:00
0abd32fac6
Rename ou variable
2019-01-25 10:34:41 +02:00
41450add27
Update docs
2019-01-25 09:56:38 +02:00
b992e2c307
Support organization units
2019-01-25 08:14:56 +02:00
7aafd0d61c
Fix the example target
2019-01-25 08:05:17 +02:00
fc34b37f2a
Add gitIgnore
2019-01-25 07:58:15 +02:00
1fab18aeb0
Update docker instructions in the README
v0.2.0
2017-12-03 12:51:40 +00:00
0763cff093
Increment version
2017-12-03 12:47:26 +00:00
1bc71085ad
It looks like there's a standard approach most Prometheus exporters use when building Dockerfiles, so I'm going to adhere to that. Rather than building the binary inside the container, it's built outside and then copied into the bin dir.
2017-12-02 19:03:36 +00:00
a3d8b34adf
Add a Makefile that adheres to the Prometheus conventions
2017-12-02 18:55:31 +00:00
c40c4829b2
Add dependencies to a vendor folder, like a good go project does
2017-12-02 18:54:08 +00:00
7572af9013
Adding some basic tests
2017-12-02 15:38:30 +00:00
607378a8c1
Merge pull request #1 from matthope/feature/add_dockerfile
...
Add Dockerfile
2017-12-02 13:39:18 +00:00
0774ba2e0a
Add Dockerfile
2017-12-02 00:06:37 +11:00
4b08b71d0c
Remove duplicate certificates from the list of peer certificates. Otherwise we could run the risk of registering duplicate series.
v0.1.0
2017-11-06 14:48:34 +00:00
a28d8f7be1
Switch to kingpin flags
2017-10-08 18:28:48 +01:00
e036e6415a
Fix a segmentation fault that would occur when a https URL redirected to http. I've also added a block to catch cases where the response is unencrypted and removed the checks against the tagret parameter. If the target is invalid it will be caught when we make the request.
2017-10-08 18:01:03 +01:00
57063a77df
Initial commit
2017-08-20 19:41:00 +01:00