f4b8197060
Merge pull request #6052 from jtru/better-systemd-integration-v2
...
Better systemd integration v2
2019-12-19 08:54:22 +01:00
c5bc1c14c0
Modules: rewrite top function doc of AvoidReplicaTraffic().
2019-12-18 17:11:03 +01:00
ef0b45ece8
Merge pull request #6497 from oranagra/avoid_replica_traffic
...
Add config and module API for AvoidReplicaTraffic
2019-12-18 17:06:05 +01:00
5a72c5058c
Fix GEOHASH negative shifting in a more compatible way.
2019-12-18 12:57:32 +01:00
e6e58e455c
Revert "Geo: output 10 chars of geohash, not 11."
...
This reverts commit 009862ab7e
.
2019-12-18 12:54:46 +01:00
5b9d3ac6c6
Avoid changing setKey() API after #6679 fix.
2019-12-18 11:58:02 +01:00
9d1baa0705
Merge pull request #6679 from soloestoy/keepttl
...
Add a new SET option KEEPTTL and fix issue #5256
2019-12-18 11:52:08 +01:00
58554396d6
incrbyfloat: fix issue #5256 ttl lost after propagate
2019-12-18 15:44:51 +08:00
24044f3356
add a new SET option KEEPTTL that doesn't remove expire time
2019-12-18 15:20:36 +08:00
b7c78b7651
Merge pull request #5916 from madolson/dev-unstable-acl-module-pr
...
Add module APIs for custom authentication
2019-12-17 09:58:26 +01:00
4348d25fc4
Add some comment to PR #6144 changes.
2019-12-17 09:19:47 +01:00
f3d67b3842
Merge pull request #6144 from madolson/dev-unstable-cluster-down
...
Add configuration option for allowing reads on cluster down
2019-12-17 09:15:20 +01:00
7f04a15311
Removed old auth context reference
2019-12-17 07:51:19 +00:00
a511a37bb7
Fixed some documentation
2019-12-17 07:49:21 +00:00
7b3e3d6a13
Resolved merge miss
2019-12-16 23:40:19 -08:00
12caffee61
Added a missed space in lua errors
2019-12-16 23:38:31 -08:00
576a08908b
Split error message so dependandent callers give a useful result
2019-12-16 23:34:37 -08:00
44aa22c635
Added better exception handling around scripting and module
2019-12-16 23:33:53 -08:00
c95a582a74
Add configuration option for allowing reads on cluster down
2019-12-16 23:33:16 -08:00
f891b64a83
Tweaking the documentation
2019-12-17 07:28:55 +00:00
67aa527b22
Added some documentation and fixed a test
2019-12-17 07:15:04 +00:00
034dcf185c
Add module APIs for custom authentication
2019-12-17 06:59:59 +00:00
e9b99c78df
Merge pull request #6649 from chaten/unstable
...
Fix outdated information on max memory policies
2019-12-16 11:25:53 +01:00
901b7469b9
Clarify change in #6662 .
2019-12-16 11:24:19 +01:00
aa3f13761f
Merge branch 'unstable' of github.com:/antirez/redis into unstable
2019-12-16 11:18:20 +01:00
276a093753
Merge pull request #6662 from oranagra/fix_hz_div0
...
init server.hz early to avoid div by 0 during config file loading
2019-12-16 11:18:08 +01:00
096592506e
Modules: allow to execute RM_Call() from the module init function.
2019-12-13 17:34:37 +01:00
ba28738083
Merge pull request #6663 from yossigo/fix-replace-value
...
Improve RM_ModuleTypeReplaceValue() API.
2019-12-12 18:00:07 +01:00
0283db5883
Improve RM_ModuleTypeReplaceValue() API.
...
With the previous API, a NULL return value was ambiguous and could
represent either an old value of NULL or an error condition. The new API
returns a status code and allows the old value to be returned
by-reference.
This commit also includes test coverage based on
tests/modules/datatype.c which did not exist at the time of the original
commit.
2019-12-12 18:50:11 +02:00
ef6e263fde
init server.hz early to avoid div by 0 during config file loading
...
since the refactory of config.c, it was initialized from config_hz in initServer
but apparently that's too late since the config file loading creates objects
which call LRU_CLOCK
2019-12-12 17:56:02 +02:00
118db9eeae
Merge pull request #6516 from IAmATeaPot418/patch-2
...
Add no-slowlog to acl command to prevent passwords
2019-12-12 09:41:19 +01:00
d7a87d0ea4
redis-cli: some refactoring about not logging AUTH & co.
2019-12-12 09:40:36 +01:00
81dc180323
Merge pull request #6524 from itamarhaber/acl-cli
...
Omits `ACL SETUSER` from redis-cli's history
2019-12-12 09:33:48 +01:00
476333d192
Remove useless space from moduleLoad().
2019-12-12 09:29:10 +01:00
c227f5e7bd
Merge pull request #6257 from JohnSully/ModuleSecurity
...
Modules must have execute permissions to load
2019-12-12 09:27:47 +01:00
2968d8e3cb
Merge branch 'unstable' into ModuleSecurity
2019-12-12 09:27:14 +01:00
b5f3247ca5
Add module API for AvoidReplicaTraffic
...
This is useful to tell redis and modules to try to avoid doing things that may
increment the replication offset, and should be used when draining a master
and waiting for replicas to be in perfect sync before a failover.
2019-12-12 08:38:09 +02:00
c6fb9d0963
Merge pull request #6656 from oranagra/leak_rm_load_from_str
...
fix leak in RM_LoadDataTypeFromString, and save
2019-12-11 11:39:27 +01:00
a37cca3644
fix leak in RM_LoadDataTypeFromString, and save
2019-12-11 12:35:00 +02:00
25b36f8d65
Merge branch 'unstable' of github.com:/antirez/redis into unstable
2019-12-11 10:18:15 +01:00
441cd9713c
Clients connected and bytes used is too spammy for verbose.
...
This message is there for ten years, but is hardly useful.
Moreover it is likely that it will fill an entire disk if log ratation
is not configured, for no good reasons.
2019-12-11 10:17:23 +01:00
29fddf3291
create-cluster script tailall option.
2019-12-11 10:16:25 +01:00
389faae58e
Change description to be agnostic to the number of policies.
2019-12-09 11:27:53 -08:00
e4b6070c0f
Modules: more clarification about disconnection callback.
2019-12-09 12:15:38 +01:00
14045adf92
Merge pull request #6653 from oranagra/client_tracking_flag
...
Add ULL suffix to CLIENT_TRACKING flag to prevent sign extension
2019-12-09 10:41:14 +01:00
5941730c37
Add ULL suffix to CLIENT_TRACKING flag to prevent sign extension
...
the code in:
c->flags &= ~(CLIENT_TRACKING|CLIENT_TRACKING_BROKEN_REDIR);
will do sign extension and turn on all the high 31 bits
no damage so far since we don't have any yet
2019-12-09 10:03:23 +02:00
52d83d57f9
Fix outdated information on max memory policies
2019-12-06 11:56:52 -08:00
7e24e219fd
Merge pull request #6645 from eliblight/fix-memcpy
...
Fix memcpy of id from key to be slightly safer.
2019-12-05 16:51:42 +01:00
08c3fe8063
- memcpy(&id,ri.key,ri.key_len);
...
+ memcpy(&id,ri.key,sizeof(id));
The memcpy from the key to the id reliease on the fact that this key
*should* be 8 bytes long as it was entered as such a few lines up the
code.
BUT if someone will change the code to the point this is no longer true,
current code can trash the stack which makes debugging very hard
while this fix will result in some garbage id, or even page fault.
Both are preferable to stack mangaling.
2019-12-05 13:37:11 +00:00
2271cf03f5
Modules: clarify when the disconnection callback is called.
2019-12-05 10:38:18 +01:00