Affected by GO-2022-0559
and 8 other vulnerabilities
GO-2022-0559: HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. in github.com/hashicorp/consul
GO-2022-0593: HashiCorp Consul Privilege Escalation Vulnerability in github.com/hashicorp/consul
GO-2022-0615: Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector in github.com/hashicorp/consul
GO-2022-0894: Hashicorp Consul Missing SSL Certificate Validation in github.com/hashicorp/consul
GO-2022-0895: HashiCorp Consul L7 deny intention results in an allow action in github.com/hashicorp/consul
GO-2022-0953: HashiCorp Consul Ingress Gateway Panic Can Shutdown Servers in github.com/hashicorp/consul
GO-2022-1029: HashiCorp Consul vulnerable to authorization bypass in github.com/hashicorp/consul
GO-2023-1827: Hashicorp Consul vulnerable to denial of service in github.com/hashicorp/consul
GO-2023-1851: HashiCorp Consul Cross-site Scripting vulnerability in github.com/hashicorp/consul
type Waiter struct {
// MinFailures before exponential backoff starts. Any failures before// MinFailures is reached will wait MinWait time.
MinFailures uint// MinWait time. Returned after the first failure. MinWait time.Duration// MaxWait time. MaxWait time.Duration// Jitter to add to each wait time. Jitter Jitter// Factor is the multiplier to use when calculating the delay. Defaults to// 1 second.
Factor time.Duration// contains filtered or unexported fields
}
Waiter records the number of failures and performs exponential backoff when
when there are consecutive failures.
Wait increase the number of failures by one, and then blocks until the context
is cancelled, or until the wait time is reached.
The wait time increases exponentially as the number of failures increases.
Wait will return ctx.Err() if the context is cancelled.