Versions in this module Expand all Collapse all v8 v8.0.2 Oct 4, 2024 GO-2025-4033 GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol v8.0.2-rc0 Sep 27, 2024 GO-2024-3358 +1 more GO-2024-3358: SQL injection in Apache Traffic Control in github.com/apache/trafficcontrol GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol v8.0.1 Mar 21, 2024 GO-2024-3358 +1 more GO-2024-3358: SQL injection in Apache Traffic Control in github.com/apache/trafficcontrol GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol v8.0.1-rc1 Mar 21, 2024 GO-2024-3358 +1 more GO-2024-3358: SQL injection in Apache Traffic Control in github.com/apache/trafficcontrol GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol v8.0.1-rc0 Mar 21, 2024 GO-2024-3358 +1 more GO-2024-3358: SQL injection in Apache Traffic Control in github.com/apache/trafficcontrol GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol v8.0.0 Jan 30, 2024 GO-2024-3358 +1 more GO-2024-3358: SQL injection in Apache Traffic Control in github.com/apache/trafficcontrol GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol Changes in this version + const BitsPerByte + const ConstantBackoffDuration + const DefaultFactor + const MSPerNS + func AESDecrypt(bytesToDecrypt []byte, aesKey []byte) ([]byte, error) + func AESEncrypt(bytesToEncrypt []byte, aesKey []byte) ([]byte, error) + func BoolPtr(b bool) *bool + func BytesLenSplit(s []byte, n int) [][]byte + func CIDRIsSubset(na *net.IPNet, nb *net.IPNet) bool + func CamelToSnakeCase(s string) string + func CoalesceCIDRs(cidrs []*net.IPNet, coalesceNumber int, coalesceMaskLen int) []*net.IPNet + func CoalesceIPs(ips []net.IP, coalesceNumber int, coalesceMaskLen int) []*net.IPNet + func CoalesceToDefault[T any](p *T) T + func Coalesce[T any](p *T, def T) T + func ContainsStr(a []string, x string) bool + func ConvertTimeFormat(t time.Time, format string) (*time.Time, error) + func CopyIfNotNil[T any](p *T) *T + func CopyMap[T comparable, U any](original map[T]U) map[T]U + func ErrsToStrs(errs []error) []string + func FirstIP(ipn *net.IPNet) net.IP + func FloatPtr(f float64) *float64 + func HashInts(ints []int, sortIntsBeforeHashing bool) []byte + func IP4InRange(ip, ipRange string) (bool, error) + func IP4ToNum(ip string) (uint32, error) + func IPToCIDR(ip net.IP) *net.IPNet + func Int64Ptr(i int64) *int64 + func IntPtr(i int) *int + func IntSliceToMap(s []int) map[int]struct + func InterfacePtr(i any) *any + func JoinErrs(errs []error) error + func JoinErrsSep(errs []error, separator string) error + func JoinErrsStr(errs []error) string + func LastIP(ipn *net.IPNet) net.IP + func Ptr[T any](v T) *T + func RangeStr(ipn *net.IPNet) string + func RemoveStrDuplicates(inputStrings []string, seenStrings map[string]struct{}) ([]string, map[string]struct{}) + func RemoveStrFromArray(strs []string, s string) []string + func SliceToSet[T comparable](sl []T) map[T]struct + func Stacktrace() []byte + func StrInArray(strs []string, s string) bool + func StrPtr(str string) *string + func StripAllWhitespace(s string) string + func TimePtr(t time.Time) *time.Time + func ToNumeric(v interface{}) (float64, bool) + func UInt64Ptr(u uint64) *uint64 + func UIntPtr(u uint) *uint + func Uint64Ptr(u uint64) *uint64 + func ValidateAESKey(keyBytes []byte) error + func WrapError(context string, e error) error + type Backoff interface + BackoffDuration func() time.Duration + Reset func() + func NewBackoff(min time.Duration, max time.Duration, factor float64) (Backoff, error) + func NewConstantBackoff(d time.Duration) Backoff + type BodyInterceptor struct + BodyBytes []byte + W http.ResponseWriter + func (i *BodyInterceptor) Body() []byte + func (i *BodyInterceptor) Header() http.Header + func (i *BodyInterceptor) RealWrite(b []byte) (int, error) + func (i *BodyInterceptor) Write(b []byte) (int, error) + func (i *BodyInterceptor) WriteHeader(rc int) + type Interceptor struct + ByteCount int + Code int + W http.ResponseWriter + func (i *Interceptor) Header() http.Header + func (i *Interceptor) Write(b []byte) (int, error) + func (i *Interceptor) WriteHeader(rc int) + type JSONIntStr int64 + func (i *JSONIntStr) UnmarshalJSON(d []byte) error + func (i JSONIntStr) String() string + func (i JSONIntStr) ToInt64() int64 + type JSONNameOrIDStr struct + ID *int + Name *string + func (i *JSONNameOrIDStr) UnmarshalJSON(d []byte) error + func (i JSONNameOrIDStr) MarshalJSON() ([]byte, error) v8.0.0-rc6 Jan 24, 2024 GO-2025-4033 GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol v8.0.0-rc5 Jan 17, 2024 GO-2025-4033 GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol v8.0.0-rc4 Oct 23, 2023 GO-2025-4033 GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol v8.0.0-rc3 Oct 3, 2023 GO-2025-4033 GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol v8.0.0-rc2 Sep 25, 2023 GO-2025-4033 GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol v8.0.0-rc1 Sep 22, 2023 GO-2025-4033 GO-2025-4033: Apache Traffic Control has an Inefficient Regular Expression Complexity vulnerability in github.com/apache/trafficcontrol Other modules containing this package github.com/apache/trafficcontrol