Marcelo Magallon [Fri, 16 Apr 2021 15:08:32 +0000 (09:08 -0600)]
Merge pull request #776 from prometheus/repo_sync
Synchronize common files from prometheus/prometheus
prombot [Wed, 14 Apr 2021 00:02:28 +0000 (00:02 +0000)]
Update common Prometheus files
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Marcelo Magallon [Wed, 31 Mar 2021 18:37:39 +0000 (12:37 -0600)]
Merge pull request #770 from prometheus/repo_sync
Synchronize common files from prometheus/prometheus
prombot [Wed, 31 Mar 2021 00:02:11 +0000 (00:02 +0000)]
Update common Prometheus files
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Ben Kochie [Mon, 22 Mar 2021 08:25:56 +0000 (09:25 +0100)]
Merge pull request #768 from prometheus/repo_sync
Synchronize common files from prometheus/prometheus
prombot [Mon, 22 Mar 2021 00:01:40 +0000 (00:01 +0000)]
Update common Prometheus files
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Marcelo Magallon [Thu, 18 Mar 2021 01:24:43 +0000 (19:24 -0600)]
Merge pull request #758 from kgersen/master
http probe - fix how the tls phase is calculated
Marcelo Magallon [Thu, 18 Mar 2021 01:23:16 +0000 (19:23 -0600)]
Merge pull request #767 from prometheus/repo_sync
Synchronize common files from prometheus/prometheus
prombot [Thu, 18 Mar 2021 00:01:34 +0000 (00:01 +0000)]
Update common Prometheus files
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Marcelo Magallon [Tue, 16 Mar 2021 15:40:16 +0000 (09:40 -0600)]
Merge pull request #752 from Jimdo/add-health-endpoint
Add health endpoint
Marcelo Magallon [Tue, 16 Mar 2021 15:34:25 +0000 (09:34 -0600)]
Merge pull request #745 from prometheus/fix_738
Update golangci-lint to 1.36.0
kgersen [Tue, 16 Mar 2021 12:23:12 +0000 (13:23 +0100)]
- revert 'connect' phase duration
Signed-off-by: kgersen <kgersen@hotmail.com>
kgersen [Sun, 14 Mar 2021 17:38:43 +0000 (18:38 +0100)]
- fix how tls phase is computed
Signed-off-by: kgersen <kgersen@hotmail.com>
Mitja Adebahr [Thu, 25 Feb 2021 10:51:14 +0000 (11:51 +0100)]
Add health endpoint
The root endpoint exposes too much data. So it cannot be used as public
health check endpoint.
Signed-off-by: Mitja Adebahr <extern.mitja.adebahr@jimdo.com>
Marcelo E. Magallon [Wed, 3 Feb 2021 20:43:07 +0000 (14:43 -0600)]
makefile: update Makefile.common with newer version
This updates golangci-lint from version 1.18.0 to 1.36.0. Newer versions
flag a possible nil pointer dereference, so rework some of the logic to
make sure that's not the case.
Add a test that covers the case of the changed code.
Closes #738
Signed-off-by: Marcelo E. Magallon <marcelo.magallon@grafana.com>
Ben Kochie [Tue, 9 Mar 2021 12:50:19 +0000 (13:50 +0100)]
Merge pull request #755 from prometheus/superq/vendor
Update build
Ben Kochie [Tue, 9 Mar 2021 11:26:17 +0000 (12:26 +0100)]
Update build
* Drop /vendor.
* Update go deps.
* Update to Go 1.16.
Signed-off-by: Ben Kochie <superq@gmail.com>
Björn Rabenstein [Tue, 2 Feb 2021 15:23:12 +0000 (16:23 +0100)]
Merge pull request #744 from prometheus/beorn7/maintainers
Change maintainer from @brian-brazil to @roidelapluie, @mem, @electron0zero
beorn7 [Fri, 29 Jan 2021 19:34:38 +0000 (20:34 +0100)]
Change maintainer from @brian-brazil to @roidelapluie, @mem, @electron0zero
Signed-off-by: beorn7 <beorn@grafana.com>
Julien Pivotto [Fri, 15 Jan 2021 14:42:31 +0000 (15:42 +0100)]
Merge pull request #737 from roidelapluie/security-dot-md
Add SECURITY.md
Julien Pivotto [Fri, 15 Jan 2021 00:01:11 +0000 (01:01 +0100)]
Add SECURITY.md
This commit adds a security policy to this repository. SECURITY.md files
are handled in a special way by GitHub, helping users to know how to
best submit security issues for the projects.
In this case, we simply point to our existing documentation on
prometheus.io.
The content of this file will be synced automatically with the
prometheus/prometheus repository, as our security policy covers all the
repositories. This sync is automated with prombot, like other files
(LICENSE, Makefile.common).
https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/adding-a-security-policy-to-your-repository
Signed-off-by: Julien Pivotto <roidelapluie@inuits.eu>
Julien Pivotto [Wed, 13 Jan 2021 21:38:48 +0000 (22:38 +0100)]
Merge pull request #735 from roidelapluie/toolkit-update
Update exporter-toolkit to 0.5.0
Julien Pivotto [Wed, 13 Jan 2021 20:53:54 +0000 (21:53 +0100)]
Update exporter-toolkit to 0.5.0
The exporter-toolkit has a new release that renames the https package to
web to make it more meaningful.
Signed-off-by: Julien Pivotto <roidelapluie@inuits.eu>
Yuchen Ying [Thu, 7 Jan 2021 19:39:06 +0000 (11:39 -0800)]
Improve the test code. (#733)
Signed-off-by: Yuchen Ying <github.com@yegle.net>
Julien Pivotto [Wed, 6 Jan 2021 19:34:11 +0000 (20:34 +0100)]
Enable TLS and basic authentication (#730)
Signed-off-by: Julien Pivotto <roidelapluie@inuits.eu>
Suzuki Shota [Wed, 6 Jan 2021 13:52:00 +0000 (22:52 +0900)]
Solve #717 Validating config should try to compile regexes (#729)
* Solve issue: #717:Validating config includes trying to compile regexes
Signed-off-by: sshota0809 <8736380+sshota0809@users.noreply.github.com>
Yuchen Ying [Tue, 5 Jan 2021 10:02:02 +0000 (02:02 -0800)]
Use preferred protocol first when resolving hostname (#728)
* Use preferred protocol first when resolving hostname
Prior to this change, LookupIPAddr() is used to do the DNS query,
which sends two DNS queries for A/AAAA records, even if the config has
preferred protocol set to ip4 and does not allow fallback protocol.
This change will change to use LookupIP() with the preferred protocol,
and only try fallback protocol if it's set to true. In most cases doing
this will save one RTT of DNS query.
Signed-off-by: Yuchen Ying <github.com@yegle.net>
Julien Pivotto [Mon, 14 Dec 2020 23:14:43 +0000 (00:14 +0100)]
http prober: Fix error checking (#723)
Not sure if that can be triggered in real scenarios.
Signed-off-by: Julien Pivotto <roidelapluie@inuits.eu>
Ben Kochie [Tue, 8 Dec 2020 15:06:44 +0000 (16:06 +0100)]
Merge pull request #722 from prometheus/superq/update_build
Update build
Ben Kochie [Fri, 4 Dec 2020 10:36:48 +0000 (11:36 +0100)]
Update build
* Move make test from Travis to CircleCI.
* Drop Travis testing.
* Bump prometheus orb to latest.
* Update Makefile.common.
* Use default build target list.
* Switch CI prober tests env var to generic "CI" variable.
Signed-off-by: Ben Kochie <superq@gmail.com>
Julien Pivotto [Wed, 2 Dec 2020 09:48:03 +0000 (10:48 +0100)]
Fix version flag in github template (#718)
Signed-off-by: Julien Pivotto <roidelapluie@inuits.eu>
gavk34 [Fri, 27 Nov 2020 20:55:49 +0000 (20:55 +0000)]
Resolve #715 Metric for unknown probe (#716)
Co-authored-by: Gavin Kelly <gkelly@newsweaver.com>
Björn Fischer [Thu, 29 Oct 2020 11:38:48 +0000 (12:38 +0100)]
make smtp examples compliant to spec (#706)
Signed-off-by: Björn Fischer <bjoern.fischer@inovex.de>
Brian Candler [Mon, 12 Oct 2020 12:55:25 +0000 (13:55 +0100)]
Correct formatting of build_context log message at startup (#700)
Fixes #699
Signed-off-by: Brian Candler <b.candler@pobox.com>
Brian Brazil [Mon, 12 Oct 2020 09:45:17 +0000 (10:45 +0100)]
Release 0.18.0
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
Luiz Angelo Daros de Luca [Thu, 8 Oct 2020 10:50:21 +0000 (07:50 -0300)]
Add probe_icmp_reply_hop_limit (#694)
IPv6 hop limit (IPv4 TTL) tells how many remaining hops the reply
datagram has. When the target uses a well known initial hop limit,
it can be used to count the number of hops from the target to the
prober and detect routing problems.
Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
Brian Brazil [Wed, 2 Sep 2020 16:14:20 +0000 (17:14 +0100)]
Log http version string we compare with, rather than float we put in metric. (#659)
See #658
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
Marcelo Magallon [Sat, 29 Aug 2020 08:18:35 +0000 (02:18 -0600)]
Fix issue #673: incorrect content length reporting (#674)
Without regexp validations, the current code reads the response from the
server in order to figure out the number of bytes we received. With
regular expression validations, it's necessary to read the whole
response in order verify it if matches or not. In this case, since the
response is completely consumed, the current code is reporting a length
of 0.
Modify the code so that we can keep track of the content length in
either case: wrap the io.ReadCloser that corresponds to the response
body with another io.ReadCloser that keeps track of the number of bytes
read. After completely consuming the reponse, the wrapper is able to
report the total number of bytes read.
Add TestContentLength that checks the content lenght is reported
correctly.
Rework existing TestFailIfBodyMatchesRegexp to reduce repetiiton; add
expectations to avoid regressing issue 673.
Fixes #673
Signed-off-by: Marcelo E. Magallon <marcelo.magallon@grafana.com>
Marcelo Magallon [Sat, 29 Aug 2020 08:16:22 +0000 (02:16 -0600)]
Fix panic when running ICMPv4 probe with DontFragment (#686)
A recent change modified the way an IPv4 raw socket is created and BBE
is panicing when ICMPv4 is used with DontFragment set.
golang.org/x/net doesn't seem to have a way to create the necessary
socket, so fall back to the previous method for that case in particular
(ICMP, IPv4, DontFragment=true).
Fixes #685
Signed-off-by: Marcelo E. Magallon <marcelo.magallon@grafana.com>
Rob Best [Thu, 20 Aug 2020 12:40:14 +0000 (13:40 +0100)]
prober/tls: fix probe_ssl_last_chain_expiry_timestamp_seconds (#681)
* prober/tls: fix probe_ssl_last_chain_expiry_timestamp_seconds
This metric should report the earliest expiry of the chain that expires
the latest out of all the verified chains. Presently, it reports the
earliest expiry of the chain that expires first.
The current test for this metric was using an expired root certificate which
is omitted from the verified chain, so the test was passing despite this
bug. I've changed it to use a root that is still valid but expires before a
root held by the client.
* prober/tls: improve verified cert test
Include the older root certificate in the chain presented by the server
as well as in the client root CAs. This ensures that the peer
certificate metric identifies the older root CA as the earliest expiry
while it is ignored by the verified metric in favour of the longer-lived
chain.
Signed-off-by: Rob Best <robertbest89@gmail.com>
Felix Ehrenpfort [Tue, 18 Aug 2020 22:55:48 +0000 (00:55 +0200)]
prober/tls: adding metric to expose certificate fingerprint info (#678)
this change adds a new metric `probe_ssl_fingerprint_info` to both tcp
and http probes. the metric always returns 1 similar to the tls version
metric and contains the leaf certificates sha256 fingerprint (hex) as a
label value.
this change allows users to validate in prometheus if a particular
certificate is being served.
Signed-off-by: xinau <felix.ehrenpfort@protonmail.com>
Julien Pivotto [Fri, 14 Aug 2020 17:09:37 +0000 (19:09 +0200)]
Update to go 1.15 (#677)
Signed-off-by: Julien Pivotto <roidelapluie@inuits.eu>
Pedro Araújo [Wed, 29 Jul 2020 16:07:30 +0000 (17:07 +0100)]
Update default timeout in README (#668)
Since #509 (
4bf18924d4645453ec3e240d01842b7f15db537c) the default
timeout was changed to 2m. This change updates the README to reflect it.
Signed-off-by: Pedro Araujo <phcrva@gmail.com>
Marcelo Magallon [Mon, 13 Jul 2020 10:30:52 +0000 (04:30 -0600)]
Expose probe_dns_duration_seconds metric (#662)
* Expose probe_dns_duration_seconds metric
This follows the same pattern as probe_http_duration_seconds and
probe_icmp_duration_seconds: it captures the time it takes to perform
the actual request, excluding the time it takes to set up things.
probe_duration_seconds includes the time to perform the request as well
as all the time it takes to set it up. probe_dns_lookup_time_seconds
refers to the time it takes to resolve the target's address, so it
doesn't capture the time it takes to make one request for that target.
Follow probe_http_duration_seconds and add a "phase" label to
probe_dns_duration_seconds, which splits the time it takes to complete
the check into "resolve" (time to resolve the target name), "connect"
(time to connect to the DNS server) and "request" (time to send the
query and retrieve the response).
Signed-off-by: Marcelo E. Magallon <marcelo.magallon@grafana.com>
Kakashi Liu [Fri, 26 Jun 2020 16:41:23 +0000 (00:41 +0800)]
Change DoT default port to 853 (#655)
Signed-off-by: Kakashi Liu <kakashi1000@gmail.com>
PrometheusBot [Tue, 23 Jun 2020 10:11:15 +0000 (13:11 +0300)]
Update common Prometheus files (#648)
Signed-off-by: prombot <prometheus-team@googlegroups.com>
André Cruz [Fri, 19 Jun 2020 15:42:01 +0000 (16:42 +0100)]
Deal with URLs with literal IPv6 addresses (#645)
Recent versions of Go have started enforcing the usage of
brackets in URLs with literal IPv6 addresses. This change
prevents the attempt to resolve an address in the form
[address]. URL.Hostname() takes care of striping the brackets.
Signed-off-by: André Cruz <acruz@cloudflare.com>
Brian Brazil [Fri, 19 Jun 2020 11:30:27 +0000 (12:30 +0100)]
Release 0.17.0
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
André Cruz [Thu, 18 Jun 2020 08:54:54 +0000 (09:54 +0100)]
Add option to disable TLS certificate check in DoT (#644)
Signed-off-by: André Cruz <acruz@cloudflare.com>
André Cruz [Wed, 17 Jun 2020 13:59:50 +0000 (14:59 +0100)]
Add support for DoT to DNS probes (#643)
Signed-off-by: André Cruz <acruz@cloudflare.com>
David Leadbeater [Tue, 16 Jun 2020 14:38:05 +0000 (15:38 +0100)]
Add support for "rootless" ping (#642)
This works for Linux and Darwin.
On Linux the user running the exporter needs to be a member of a group
with an ID in the range specified in the sysctl
net.ipv4.ping_group_range.
Signed-off-by: David Leadbeater <dgl@dgl.cx>
Brian Brazil [Mon, 15 Jun 2020 15:42:51 +0000 (16:42 +0100)]
Update deps (#639)
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
Brian Brazil [Mon, 15 Jun 2020 13:14:32 +0000 (14:14 +0100)]
Seed RNG to ensure different ICMP ids. (#638)
Fixes #632
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
Baptiste Courtois [Sun, 14 Jun 2020 10:35:33 +0000 (12:35 +0200)]
[dns] Allow to specify query Class (#635)
* [dns] validate query_class and query_type config values
This allows to catch simple config errors earlier.
Signed-off-by: Baptiste Courtois <b.courtois@criteo.com>
Julien Pivotto [Wed, 10 Jun 2020 08:21:34 +0000 (10:21 +0200)]
Update prometheus/common to v0.10.0 (#622)
Enable HTTP/2.
Fixes #617
Add support for "0" duration.
Signed-off-by: Julien Pivotto <roidelapluie@inuits.eu>
Takuya Kosugiyama [Wed, 10 Jun 2020 08:20:54 +0000 (17:20 +0900)]
Add new probe_ssl_last_chain_expiry_timestamp_seconds metric (#636)
* Add new probe_ssl_latest_verified_chain_expiry metric
Resolves https://github.com/prometheus/blackbox_exporter/issues/340
Based on the discussion in the issue above, this metric will help determine
when the SSL/TLS certificate expiration error actually happens on clients
like a browser that attempts to verify certificates by building one or
more chains from peer certificates.
Signed-off-by: Takuya Kosugiyama <re@itkq.jp>
Simon THOBY [Fri, 5 Jun 2020 16:38:55 +0000 (18:38 +0200)]
fix the example.yml file: HTTP/2 is shown as HTTP/2.0 in the golang http client (#633)
Signed-off-by: Simon Thoby <simon.thoby@bleemeo.com>
PrometheusBot [Tue, 19 May 2020 08:23:22 +0000 (11:23 +0300)]
makefile: update Makefile.common with newer version (#627)
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Julien Pivotto [Fri, 1 May 2020 16:06:00 +0000 (18:06 +0200)]
Bump go version to 1.14 (#611)
Signed-off-by: Julien Pivotto <roidelapluie@inuits.eu>
tottoto [Wed, 22 Apr 2020 12:20:32 +0000 (21:20 +0900)]
Add password file field to document (#605)
Signed-off-by: tottoto <tottotodev@gmail.com>
David Collom [Tue, 14 Apr 2020 12:51:49 +0000 (13:51 +0100)]
Bumping DNS dependency to 1.1.25 (#597)
Bump other deps too.
Signed-off-by: David Collom <david.collom@creditkarma.com>
Ben Kochie [Sun, 29 Mar 2020 14:13:47 +0000 (16:13 +0200)]
Merge pull request #587 from carlosedp/ppc64le
Add image build for ppc64le architecture
Carlos de Paula [Sun, 29 Mar 2020 13:40:41 +0000 (10:40 -0300)]
Add image build for ppc64le architecture
Signed-off-by: Carlos de Paula <me@carlosedp.com>
Wei He [Wed, 18 Mar 2020 12:30:59 +0000 (21:30 +0900)]
add probe_ip_addr_hash to detect if the IP changes (#584)
* add probe_ip_addr_hash to detect if the IP changes
Signed-off-by: Wing924 <weihe924stephen@gmail.com>
PrometheusBot [Tue, 25 Feb 2020 09:13:01 +0000 (11:13 +0200)]
makefile: update Makefile.common with newer version (#574)
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Daniel Swarbrick [Fri, 3 Jan 2020 13:08:14 +0000 (14:08 +0100)]
Skip network dependent test in short mode (#566)
Signed-off-by: Daniel Swarbrick <daniel.swarbrick@cloud.ionos.com>
Paul Wood [Thu, 21 Nov 2019 15:13:04 +0000 (15:13 +0000)]
Add none/all matches to DNS RRset validation (#552)
Signed-off-by: Paul Wood <pauwood@ebay.com>
Brian Brazil [Mon, 11 Nov 2019 16:25:58 +0000 (16:25 +0000)]
Release 0.16.0
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
Brian Brazil [Thu, 7 Nov 2019 11:49:35 +0000 (11:49 +0000)]
Fix logging of IP addresseses in resolve code. (#548)
Also add logging missing from one code path.
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
genofire [Wed, 23 Oct 2019 12:03:30 +0000 (14:03 +0200)]
[BUGFIX] disable ip protocol fallback and tests (#540)
Signed-off-by: Martin/Geno <geno+dev@fireorbit.de>
Silke Hofstra [Mon, 14 Oct 2019 08:27:37 +0000 (10:27 +0200)]
Export TLS version (#538)
* Add a metric for the TLS version used
Signed-off-by: Silke Hofstra <silke@slxh.eu>
Brian Brazil [Fri, 11 Oct 2019 11:29:41 +0000 (12:29 +0100)]
Add locking around tracer.
It can be called concurrently, and after the request has finished.
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
Brian Brazil [Fri, 27 Sep 2019 12:44:49 +0000 (13:44 +0100)]
Better handling of HTTP redirects.
If the redirect is to a different host, don't set ServerName.
Fixes #237.
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
Anton Markelov [Tue, 8 Oct 2019 08:23:02 +0000 (18:23 +1000)]
add probe_http_uncompressed_body_length metric (#535)
Signed-off-by: Anton Markelov <doublic@gmail.com>
Brian Brazil [Tue, 17 Sep 2019 12:28:58 +0000 (13:28 +0100)]
Release 0.15.1
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
Simon Pasquier [Fri, 13 Sep 2019 10:48:09 +0000 (12:48 +0200)]
Bump golang 1.13 (#522)
*: bump Go version to 1.13
* Fix go.mod and vendor/
Signed-off-by: Simon Pasquier <spasquie@redhat.com>
PrometheusBot [Thu, 12 Sep 2019 10:38:53 +0000 (12:38 +0200)]
makefile: update Makefile.common with newer version (#521)
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Chris Siebenmann [Wed, 11 Sep 2019 16:48:52 +0000 (12:48 -0400)]
Change the front page links to probe logs into relative links (#520)
The front page contains a table of links to logs from the most recent
probes. These links were accidentally changed to absolute links in
252a878, in a form that doesn't work when using --web.external-url.
Rather than prefixing these with the external URL (if set), we return
them to being relative links, as they are meant to be (per issue #519).
Fixes #519
Signed-off-by: Chris Siebenmann <cks.git01@cs.toronto.edu>
Brian Brazil [Wed, 11 Sep 2019 12:51:05 +0000 (13:51 +0100)]
Release 0.15.0
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
Sven Nebel [Wed, 11 Sep 2019 12:36:17 +0000 (13:36 +0100)]
Adding web.external-url and web.route-prefix flags (#515)
Signed-off-by: Sven Nebel <nebel.sven@gmail.com>
Jake Utley [Tue, 10 Sep 2019 11:48:50 +0000 (04:48 -0700)]
Add separate history for expired failed probe results (#517)
Signed-off-by: Jake Utley <jutley@hiya.com>
Simon Pasquier [Mon, 2 Sep 2019 15:44:43 +0000 (17:44 +0200)]
prober: remove duplicated tests (#324)
Signed-off-by: Simon Pasquier <spasquie@redhat.com>
PrometheusBot [Sat, 31 Aug 2019 00:23:25 +0000 (02:23 +0200)]
makefile: update Makefile.common with newer version (#514)
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Brian Brazil [Fri, 16 Aug 2019 12:58:30 +0000 (13:58 +0100)]
Use HTTP request's context, so cancellation works. (#510)
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
Brian Brazil [Fri, 16 Aug 2019 12:43:30 +0000 (13:43 +0100)]
Bump default timeout to 2m (#509)
The current default of 10s is problematic when testing slower probes
from a browser. Cancellation will still work as a fallback,
including for older Prometheus servers that don't send the timeout
header, so there shouldn't be a big buildup of ongoing probes.
Fixes #259
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
Brian Brazil [Tue, 6 Aug 2019 20:52:23 +0000 (21:52 +0100)]
Don't put v4 addresses in brackets (#506)
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
CodeLingo Team [Tue, 6 Aug 2019 17:27:12 +0000 (05:27 +1200)]
Fix function comments based on best practices from Effective Go (#428)
Signed-off-by: CodeLingo Bot <bot@codelingo.io>
Simon Pasquier [Wed, 3 Jul 2019 07:42:52 +0000 (09:42 +0200)]
Build ARM container images (#496)
It also updates the Circle CI configuration to use the Prometheus orb.
Signed-off-by: Simon Pasquier <spasquie@redhat.com>
PrometheusBot [Wed, 26 Jun 2019 07:50:48 +0000 (09:50 +0200)]
makefile: update Makefile.common with newer version (#494)
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Ben Kochie [Sun, 23 Jun 2019 06:39:45 +0000 (08:39 +0200)]
Merge pull request #493 from prometheus/makefile_common
Synchronize Makefile.common from prometheus/prometheus
prombot [Sun, 23 Jun 2019 00:00:48 +0000 (00:00 +0000)]
makefile: update Makefile.common with newer version
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Tomas Dabasinskas [Fri, 21 Jun 2019 13:24:31 +0000 (16:24 +0300)]
Do not apply offsets for explicit timeouts (#492)
Signed-off-by: Tomas Dabasinskas <tomas@dabasinskas.net>
Brian Brazil [Tue, 18 Jun 2019 12:06:49 +0000 (13:06 +0100)]
Update dependencies. (#490)
Signed-off-by: Brian Brazil <brian.brazil@robustperception.io>
PrometheusBot [Fri, 14 Jun 2019 09:30:25 +0000 (10:30 +0100)]
makefile: update Makefile.common with newer version (#488)
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Ben Kochie [Fri, 7 Jun 2019 06:57:14 +0000 (08:57 +0200)]
Merge pull request #484 from prometheus/makefile_common
Synchronize Makefile.common from prometheus/prometheus
prombot [Fri, 7 Jun 2019 00:01:34 +0000 (00:01 +0000)]
makefile: update Makefile.common with newer version
Signed-off-by: prombot <prometheus-team@googlegroups.com>
Simon Pasquier [Wed, 29 May 2019 16:20:10 +0000 (18:20 +0200)]
Use Circle CI's org context (#482)
Signed-off-by: Simon Pasquier <spasquie@redhat.com>
Simon Pasquier [Thu, 23 May 2019 08:14:14 +0000 (10:14 +0200)]
Fix CircleCI job to publish container images (#478)
Signed-off-by: Simon Pasquier <spasquie@redhat.com>
Brian Brazil [Wed, 15 May 2019 06:56:15 +0000 (07:56 +0100)]
Merge pull request #476 from prometheus/makefile_common
Synchronize Makefile.common from prometheus/prometheus
Ben Kochie [Wed, 15 May 2019 00:02:10 +0000 (02:02 +0200)]
Remove obsolete release tool.
Signed-off-by: Ben Kochie <superq@gmail.com>