Affected by GO-2022-0615
and 10 other vulnerabilities
GO-2022-0615 : Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector in github.com/hashicorp/consul
GO-2022-0894 : Hashicorp Consul Missing SSL Certificate Validation in github.com/hashicorp/consul
GO-2022-0895 : HashiCorp Consul L7 deny intention results in an allow action in github.com/hashicorp/consul
GO-2022-0953 : HashiCorp Consul Ingress Gateway Panic Can Shutdown Servers in github.com/hashicorp/consul
GO-2022-1029 : HashiCorp Consul vulnerable to authorization bypass in github.com/hashicorp/consul
GO-2023-1827 : Hashicorp Consul vulnerable to denial of service in github.com/hashicorp/consul
GO-2024-3241 : Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability in github.com/hashicorp/consul
GO-2024-3242 : Hashicorp Consul Cross-site Scripting vulnerability in github.com/hashicorp/consul
GO-2024-3243 : Hashicorp Consul Path Traversal vulnerability in github.com/hashicorp/consul
GO-2025-4081 : Consul key/value endpoint is vulnerable to denial of service in github.com/hashicorp/consul
GO-2025-4082 : Consul event endpoint is vulnerable to denial of service in github.com/hashicorp/consul
Discover Packages
github.com/hashicorp/consul
testrpc
package
Version:
v1.9.9
Opens a new window with list of versions in this module.
Published: Aug 27, 2021
License: MPL-2.0
Opens a new window with license information.
Imports: 4
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Jump to ...
Documentation
Index
Constants
Variables
Functions
WaitForACLReplication(t, rpc, dc, expectedReplicationType, ...)
WaitForActiveCARoot(t, rpc, dc, expect)
WaitForAntiEntropySync()
WaitForLeader(t, rpc, dc, options)
WaitForServiceIntentions(t, rpc, dc)
WaitForTestAgent(t, rpc, dc, options)
WaitUntilNoLeader(t, rpc, dc, options)
WithToken(token)
Types
Source Files
Documentation
Documentation
¶
func WaitForACLReplication(t *testing.T, rpc rpcFn, dc string, ...)
func WaitForActiveCARoot(t *testing.T, rpc rpcFn, dc string, expect *structs.CARoot)
func WaitForAntiEntropySync() waitOption
func WaitForLeader(t *testing.T, rpc rpcFn, dc string, options ...waitOption)
func WaitForServiceIntentions(t *testing.T, rpc rpcFn, dc string)
func WaitForTestAgent(t *testing.T, rpc rpcFn, dc string, options ...waitOption)
func WaitUntilNoLeader(t *testing.T, rpc rpcFn, dc string, options ...waitOption)
func WithToken(token string) waitOption
WaitForActiveCARoot polls until the server returns an active Connect root CA
with the same ID field as expect. If expect is nil, it just waits until _any_
active root is returned. This is useful because initializing CA happens after
raft leadership is gained so WaitForLeader isn't sufficient to be sure that
the CA is fully initialized.
func WaitForAntiEntropySync() waitOption
func WaitForLeader(t *testing .T , rpc rpcFn, dc string , options ...waitOption)
WaitForLeader ensures we have a leader and a node registration.
WaitForServiceIntentions waits until the server can accept config entry
kinds of service-intentions meaning any migration bootstrapping from pre-1.9
intentions has completed.
func WaitForTestAgent(t *testing .T , rpc rpcFn, dc string , options ...waitOption)
WaitForTestAgent ensures we have a node with serfHealth check registered
func WaitUntilNoLeader(t *testing .T , rpc rpcFn, dc string , options ...waitOption)
WaitUntilNoLeader ensures no leader is present, useful for testing lost leadership.
func WithToken(token string ) waitOption
Source Files
¶
Click to show internal directories.
Click to hide internal directories.