c3e187190b
Initial command filter experiment.
2019-03-18 13:50:34 +02:00
cd2743c0e6
Fixes BZ[REV]POP's arity
2019-03-03 23:10:45 +02:00
b19e8b9a2c
Merge pull request #5875 from chendq8/partialsync
...
fix:Slave will do full sync when restart with SHUTDOWN SAVE on cluster mode
2019-03-01 17:29:19 +01:00
9b0b0b3942
Merge pull request #3649 from Alkorin/fixTypo
...
Fix typo (unsupproted => unsupported) in error message
2019-02-27 22:33:22 +01:00
8f7e97258b
fix replicationid will not change for server.masterhost==NULL in cluster mode when restart slave
2019-02-27 17:43:05 +08:00
a7780f716e
Merge branch 'gopher' into unstable
2019-02-25 18:16:58 +01:00
87594a7470
ACL: move AUTH implementation in acl.c.
2019-02-25 16:33:38 +01:00
3de9ccf190
Gopher: config setting to turn support on/off.
2019-02-21 17:28:53 +01:00
fd7484cde2
Merge pull request #5836 from soloestoy/fix-acl-warning
...
ACL: show categories in COMMAND reply
2019-02-13 18:59:59 +01:00
14507457a0
ACL: show categories in COMMAND reply
...
Adding another new filed categories at the end of
command reply, it's easy to read and distinguish
flags and categories, also compatible with old format.
2019-02-14 00:13:01 +08:00
e819c2ef5b
ACL: tag LASTSAVE as dangerous.
...
That's not REALLY needed, but... right now with LASTSAVE being the only
command tagged as "admin" but not "dangerous" what happens is that after
rewrites the rewrite engine will produce from the rules:
user default on +@all ~* -@dangerous nopass
The rewrite:
user default on nopass ~* +@all -@admin -@dangerous +lastsave
Which is correct but will have users wondering about why LASTSAVE has
something special.
Since LASTSAVE after all also leaks information about the underlying
server configuration, that may not be great for SAAS vendors, let's tag
it as dangerous as well and forget about this issue :-)
2019-02-13 16:30:44 +01:00
bfdcfbb3ed
ACL: fix setting of FAST flag.
2019-02-12 17:06:26 +01:00
f8a6132f15
ACL: refactor+fix AUTH check in processCommand().
...
The part that is fixed is that now if the default user is off whatever
is its configuration the user is not considered authenticated.
2019-02-11 16:47:02 +01:00
80f987726d
ACL: load ACL file at startup. Prevent silly configurations.
2019-02-07 17:20:03 +01:00
775bf6193d
ACL: implement rewriting of users in redis.conf.
2019-02-05 10:48:17 +01:00
623b17425e
ACL: load the defined users at server startup.
2019-02-04 16:39:07 +01:00
f99e0f59ef
ACL: populate category flags from command table.
2019-01-23 16:59:09 +01:00
c5e717c637
ACL: command categories added to the command table.
2019-01-23 12:15:10 +01:00
b8ff73894a
ACL: improve top comments of the command table.
2019-01-23 11:21:02 +01:00
932a1196d8
ACL: mark more commands as read-only commands.
2019-01-23 11:14:39 +01:00
e97481d4f4
ACL: remove no longer existing flag from comment.
2019-01-22 17:57:20 +01:00
82d194c1ab
ACL: populate command table with new flags.
2019-01-22 17:57:20 +01:00
9e4fb96ca1
ACL: review of Redis command table and new flags format.
...
However the code is yet not able to parse the new flags format.
2019-01-22 17:57:20 +01:00
2263d6e173
ACL: specify better the command denied error.
2019-01-22 17:57:20 +01:00
4dc69497f5
Refactoring: always kill AOF/RDB child via helper functions.
2019-01-21 11:28:44 +01:00
c8391388c2
ACL: remove server.requirepass + some refactoring.
2019-01-18 11:49:30 +01:00
b87815c1f8
ACL: AUTH + no default user password raises an error.
...
This way the behavior is very similar to the past one.
This is useful in order to remember the user she probably failed to
configure a password correctly.
2019-01-17 18:30:23 +01:00
636424c0ce
ACL: change requirepass stop condition to use ACLs.
2019-01-17 18:22:22 +01:00
4a3419acfc
ACL: fix and improve ACL key checking.
2019-01-16 18:31:05 +01:00
ff92c06947
ACL: fix command exec check by returning.
2019-01-15 18:28:43 +01:00
52e9922987
ACL: AUTH command new form, using the ACL subsystem.
2019-01-15 13:45:16 +01:00
7aea02fa87
ACL: initial implementation of the ACL command.
2019-01-15 09:36:12 +01:00
a0a4fb85ff
ACL: Fix compilation by adding prototype and c->cmd fix.
2019-01-14 13:22:56 +01:00
648411eb7d
ACL: Add hook in processCommand() to check the ACLs before call().
2019-01-14 13:20:45 +01:00
7f8314760a
ACL: modify comment from PR.
2019-01-11 11:30:09 +01:00
45952df700
fix segmentfault when server start
2019-01-11 19:12:06 +09:00
29c88a9ce5
ACL: initialization function.
2019-01-10 16:39:32 +01:00
7fc882c578
ACL: use a fixed table for command IDs.
2019-01-09 21:31:29 +01:00
010b24f864
ACL: set the command ID while populating the commands table.
2019-01-09 17:23:23 +01:00
91f1d8026b
ACL: introduce the concept of command ID.
2019-01-09 17:20:47 +01:00
42271cff2d
ACL: fix ACLCheckUserCredentials() usage in AUTH.
2019-01-09 17:09:30 +01:00
b43d70df56
ACL: refactoring of the original authentication code.
2019-01-09 17:00:30 +01:00
4d80b0e965
RESP3: allow HELLO during busy script and not authenticated states.
2019-01-09 17:00:30 +01:00
9018388c3f
RESP3: Allow any command in RESP3 Pub/Sub mode.
2019-01-09 17:00:30 +01:00
a4f8f4a824
RESP3: PING should reply normally in RESP3 Pub/Sub mode.
...
Because in RESP3 commands can be sent in the Pub/Sub connection without
problems, so it's better if in such mode there is no exception about
PING.
2019-01-09 17:00:30 +01:00
4f0860cbfd
RESP3: initial implementation of the HELLO command.
2019-01-09 17:00:29 +01:00
2ad6e875ba
RESP3: add shared.nullarray for better RESP2 compat.
2019-01-09 17:00:29 +01:00
317f8b9d38
RESP3: most null replies converted.
2019-01-09 17:00:29 +01:00
1b7298e66a
RESP3: addReplyNull() added.
2019-01-09 17:00:29 +01:00
fc9a3de97d
RESP3: remove other pointless shared object.
2019-01-09 17:00:29 +01:00