commit_msg
stringlengths 1
24.2k
| commit_hash
stringlengths 2
84
⌀ | project
stringlengths 2
40
| source
stringclasses 4
values | labels
int64 0
1
| repo_url
stringlengths 26
70
⌀ | commit_url
stringlengths 74
118
⌀ | commit_date
stringlengths 25
25
⌀ |
---|---|---|---|---|---|---|---|
check WRONGTYPE in BITFIELD before looping on the operations.
optimization: lookup key only once, and grow at once to the max need
fixes #3259 and #3221, and also an early return if wrongtype is discovered by SET
| 5d96b7ed4ffc1b90195fd4074ead331236e8e28f | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/5d96b7ed4ffc1b90195fd4074ead331236e8e28f | 2016-05-24 23:31:36+03:00 |
fix comment error about zslDeleteRangeByScore range (#8075)
Co-authored-by: Oran Agra <[email protected]> | 0b1d89d7ae61cc9f2546cf4dbbfc5fcd7d29b518 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/0b1d89d7ae61cc9f2546cf4dbbfc5fcd7d29b518 | 2020-11-22 20:56:45+08:00 |
block: format code
| 9a65f9cd3e09468c0178782bfac0fe1c8f445a20 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/9a65f9cd3e09468c0178782bfac0fe1c8f445a20 | 2018-08-14 20:59:32+08:00 |
Merge pull request #2530 from FuGangqiang/unstable
fix sds.c | 8af99d0c09324598faf9f8e5b9aa300fc913ff3c | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/8af99d0c09324598faf9f8e5b9aa300fc913ff3c | 2015-05-04 13:00:02+02:00 |
Merge pull request #4779 from charsyam/feature/fix-streamPropagateXCLAIM
fix memory leak for streamPropagateXCLAIM | 3851d30ada437fbeedec70badc7624757f092f21 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/3851d30ada437fbeedec70badc7624757f092f21 | 2018-03-22 09:02:37+01:00 |
fix potentical memory leak in redis-cli
| 86691ccff51b0065d430836e15c81464cc691765 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/86691ccff51b0065d430836e15c81464cc691765 | 2020-03-18 09:33:52-04:00 |
sort Command lookupKeyRead and lookupKeyWrite are used on the opposite (#8283)
This is a recent problem, introduced by 7471743 (redis 6.0)
The implications are:
The sole difference between LookupKeyRead and LookupKeyWrite is for command
executed on a replica, which are not received from its master client. (for the master,
and for the master client on the replica, these two functions behave the same)!
Since SORT is a write command, this bug only implicates a writable-replica.
And these are its implications:
- SORT STORE will behave as it did before the above mentioned commit (like before
redis 6.0). on a writable-replica an already logically expired the key would have
appeared missing. (store dest key would be deleted, instead of being populated
with the data from the already logically expired key)
- SORT (the non store variant, which in theory could have been executed on
read-only-replica if it weren't for the write flag), will (in redis 6.0) have a new bug
and return the data from the already logically expired key instead of empty response. | 08ad6abd04c5aafe5471fa754000e512ae6b0f05 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/08ad6abd04c5aafe5471fa754000e512ae6b0f05 | 2021-01-04 16:28:47+08:00 |
Signal systemd readiness atfer Partial Resync
"Partial Resynchronization" is a special variant of replication success
that we have to tell systemd about if it is managing redis-server via a
Type=Notify service unit.
| dfb598cf3304818e608ceb6b5d9529a293345c4a | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/dfb598cf3304818e608ceb6b5d9529a293345c4a | 2019-12-19 21:47:24+01:00 |
redis-benchmark: Add RPUSH and RPOP tests
| 60a9418ed9adaff7844113b89fd4a4c01100f0b9 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/60a9418ed9adaff7844113b89fd4a4c01100f0b9 | 2014-11-25 12:19:58-05:00 |
Fix false positive leak reported by GCC ASAN (#9816)
Leak found by the corrupt-dump-fuzzer when using GCC ASAN, which seems
to falsely report leaks on pointers kept only on the stack when calling exit.
Instead we now use _exit on panic / assert to skip these leak checks.
Additionally, check for sanitizer warnings in the corrupt-dump-fuzzer between iterations,
so that when something is found we know which test to relate it too (and it prints reproduction command list) | 183b90a6254cbff960f912ba36896c09226d9dfe | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/183b90a6254cbff960f912ba36896c09226d9dfe | 2021-11-21 18:47:10+02:00 |
Bump freebsd-vm version to fix CI failures (#8876)
Specifically we had issues with NTP sync failure which was resolved here: https://github.com/vmactions/freebsd-vm/commit/457af7345642e154a79d219971a2d4a7c7fe2118 | 2e88b0639689a3019e27f55dfa40578847443eeb | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/2e88b0639689a3019e27f55dfa40578847443eeb | 2021-04-27 16:22:22+03:00 |
Add check for the MADV_FREE/fork arm64 Linux kernel bug (#8224)
Older arm64 Linux kernels have a bug that could lead to data corruption during
background save under the following scenario:
1) jemalloc uses MADV_FREE on a page,
2) jemalloc reuses and writes the page,
3) Redis forks the background save process, and
4) Linux performs page reclamation.
Under these conditions, Linux will reclaim the page wrongfully and the
background save process will read zeros when it tries to read the page.
The bug has been fixed in Linux with commit:
ff1712f953e27f0b0718762ec17d0adb15c9fd0b ("arm64: pgtable: Ensure dirty bit is
preserved across pte_wrprotect()")
This Commit adds an ignore-warnings config, when not found, redis will
print a warning and exit on startup (default behavior).
Co-authored-by: Oran Agra <[email protected]> | b02780c41dbc5b28d265b5cf141c03c1a7383ef9 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/b02780c41dbc5b28d265b5cf141c03c1a7383ef9 | 2021-01-07 09:06:05-06:00 |
Remove some dead code (#8605)
| 367ba4125fa08440f1e33799ccf2fedfe88129aa | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/367ba4125fa08440f1e33799ccf2fedfe88129aa | 2021-03-06 01:54:34+08:00 |
fix a bufferoverflow bug
| 0298d3ad1833c0085ebc26baeda58dc3a511de25 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/0298d3ad1833c0085ebc26baeda58dc3a511de25 | 2019-03-10 15:30:32+08:00 |
Fix EVAL timeout test failed on freebsd (#10098)
* Refactor EVAL timeout test
* since the test used r config set appendonly yes which generates a rewrite, it missed it's purpose
* Fix the bug that start_server returns before redis starts ready, which affects when multiple tests share the same dir.
* Elapsed time tracking no loner needed
Co-authored-by: Oran Agra <[email protected]> | fa600496482dcfdbf4b5af7c27b7a2eda02ac586 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/fa600496482dcfdbf4b5af7c27b7a2eda02ac586 | 2022-01-25 04:31:35+08:00 |
FLUSHDB and FLUSHALL add call forceCommandPropagation / FLUSHALL reset dirty counter to 0 if we enable save (#10691)
## FLUSHALL
We used to restore the dirty counter after `rdbSave` zeroed it if we enable save.
Otherwise FLUSHALL will not be replicated nor put into the AOF.
And then we do increment it again below.
Without that extra dirty++, when db was already empty, FLUSHALL
will not be replicated nor put into the AOF.
We now gonna replace all that dirty counter magic with a call
to forceCommandPropagation (REPL and AOF), instead of all the
messing around with the dirty counter.
Added tests to cover three part (dirty counter, REPL, AOF).
One benefit other than cleaner code is that the `rdb_changes_since_last_save` is correct in this case.
## FLUSHDB
FLUSHDB was not replicated nor put into the AOF when db was already empty.
Unlike DEL on a non-existing key, FLUSHDB always does something, and that's to call the module hook.
So basically FLUSHDB is never a NOP, and thus it should always be propagated.
Not doing that, could mean that if a module does something in that hook, and wants to
avoid issues of that hook being missing on the replica if the db is empty, it'll need to do complicated things.
So now FLUSHDB add call forceCommandPropagation, we will always propagate FLUSHDB.
Always propagating FLUSHDB seems like a safe approach that shouldn't have any drawbacks (other than looking odd)
This was mentioned in #8972
## Test section:
We actually found it while solving a race condition in the BGSAVE test (other.tcl).
It was found in extra_ci Daily Arm64 (test-libc-malloc).
```
[exception]: Executing test client: ERR Background save already in progress.
ERR Background save already in progress
```
It look like `r flushdb` trigger (schedule) a bgsave right after `waitForBgsave r` and before `r save`.
Changing flushdb to flushall, FLUSHALL will do a foreground save and then set the dirty counter to 0. | 783b210db4b79cdd1313a8196ea58fa5ad999fd1 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/783b210db4b79cdd1313a8196ea58fa5ad999fd1 | 2022-05-11 16:21:16+08:00 |
Fix TLS certificate loading for chained certificates.
This impacts client verification for chained certificates (such as Lets
Encrypt certificates). Client Verify requires the full chain in order to
properly verify the certificate.
| 151b12a80fe60e671604433876af4fd2a1f7084d | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/151b12a80fe60e671604433876af4fd2a1f7084d | 2020-05-27 08:53:29-04:00 |
Fix errors with sentinel leaked fds test. (#8482)
* Don't run test script on non-Linux.
* Verify that reported fds do indeed exist also in parent, to avoid
false negatives on some systems (namely CentOS).
Co-authored-by: Andy Pan <[email protected]> | 8c42d1257f8b6d7a1a8f30e37eef9b55785b2426 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/8c42d1257f8b6d7a1a8f30e37eef9b55785b2426 | 2021-02-11 15:25:01+02:00 |
tests: fix a typo (#9294)
Signed-off-by: Long Dai <[email protected]> | 89fdcbec8c446cfbf8befb54bf41e694c8290619 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/89fdcbec8c446cfbf8befb54bf41e694c8290619 | 2021-07-30 15:00:07+08:00 |
stop ping when client pause
| 11f2c6b115e108202bd9c3c7e94038d4afd029a8 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/11f2c6b115e108202bd9c3c7e94038d4afd029a8 | 2019-04-17 21:20:10+08:00 |
Merge pull request #5795 from zhicheng/fix-double-free-issue
fix clusterManagerGetAntiAffinityScore double free otypes | ed356c3a79e2e83e00d29914b7b4958793d68d35 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/ed356c3a79e2e83e00d29914b7b4958793d68d35 | 2019-01-22 17:28:45+01:00 |
Fix typo in deps/README.md (#7553)
| 9fc8a5efe5541a4461cd889340fda46184a4b0f2 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/9fc8a5efe5541a4461cd889340fda46184a4b0f2 | 2020-07-22 17:33:57+09:00 |
Make nodename test more consistent (#12330)
To determine when everything was stable, we couldn't just query the nodename since they aren't API visible by design. Instead, we were using a proxy piece of information which was bumping the epoch and waiting for everyone to observe that. This works for making source Node 0 and Node 1 had pinged, and Node 0 and Node 2 had pinged, but did not guarantee that Node 1 and Node 2 had pinged. Although unlikely, this can cause this failure message. To fix it I hijacked hostnames and used its validation that it has been propagated, since we know that it is stable.
I also noticed while stress testing this sometimes the test took almost 4.5 seconds to finish, which is really close to the current 5 second limit of the log check, so I bumped that up as well just to make it a bit more consistent. | 73cf0243df5063aa9167c3fc3049d54b2772e29b | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/73cf0243df5063aa9167c3fc3049d54b2772e29b | 2023-06-20 18:00:55-07:00 |
Correct proceding -> proceeding typo.
| 7560d347da90dad0ff8b13872aeb48de609d3c9f | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/7560d347da90dad0ff8b13872aeb48de609d3c9f | 2017-07-14 22:53:14+01:00 |
Merge pull request #4609 from Qinch/unstable
fix assert problem in ZIP_DECODE_PREVLENSIZE macro | 81401878de92d15f0d3529144e27a1106ad489c2 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/81401878de92d15f0d3529144e27a1106ad489c2 | 2018-01-17 10:45:11+01:00 |
PSYNC2: bugfixing pre release.
1. Master replication offset was cleared after switching configuration
to some other slave, since it was assumed you can't PSYNC after a
switch. Note the case anymore and when we successfully PSYNC we need to
have our offset untouched.
2. Secondary replication ID was not reset to "000..." pattern at
startup.
3. Master in error state replying -LOADING or other transient errors
forced the slave to discard the cached master and full resync. This is
now fixed.
4. Better logging of what's happening on failed PSYNCs.
| 5b7d42fff32ba4e8cf1f415b104bfec086023a86 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/5b7d42fff32ba4e8cf1f415b104bfec086023a86 | 2016-11-23 16:12:20+01:00 |
fix streams memory estimation, missing raxSeek
| 20e10dc7b8eeff9aa5356fd123a7c70e994e6eb4 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/20e10dc7b8eeff9aa5356fd123a7c70e994e6eb4 | 2018-06-21 17:58:29+03:00 |
New detailed key-spec flags (RO, RW, OW, RM, ACCESS, UPDATE, INSERT, DELETE) (#10122)
The new ACL key based permissions in #9974 require the key-specs (#8324) to have more
explicit flags rather than just READ and WRITE. See discussion in #10040
This PR defines two groups of flags:
One about how redis internally handles the key (mutually-exclusive).
The other is about the logical operation done from the user's point of view (3 mutually exclusive
write flags, and one read flag, all optional).
In both groups, if we can't explicitly flag something as explicit read-only, delete-only, or
insert-only, we flag it as `RW` or `UPDATE`.
here's the definition from the code:
```
/* Key-spec flags *
* -------------- */
/* The following refer what the command actually does with the value or metadata
* of the key, and not necessarily the user data or how it affects it.
* Each key-spec may must have exaclty one of these. Any operation that's not
* distinctly deletion, overwrite or read-only would be marked as RW. */
#define CMD_KEY_RO (1ULL<<0) /* Read-Only - Reads the value of the key, but
* doesn't necessarily returns it. */
#define CMD_KEY_RW (1ULL<<1) /* Read-Write - Modifies the data stored in the
* value of the key or its metadata. */
#define CMD_KEY_OW (1ULL<<2) /* Overwrite - Overwrites the data stored in
* the value of the key. */
#define CMD_KEY_RM (1ULL<<3) /* Deletes the key. */
/* The follwing refer to user data inside the value of the key, not the metadata
* like LRU, type, cardinality. It refers to the logical operation on the user's
* data (actual input strings / TTL), being used / returned / copied / changed,
* It doesn't refer to modification or returning of metadata (like type, count,
* presence of data). Any write that's not INSERT or DELETE, would be an UPADTE.
* Each key-spec may have one of the writes with or without access, or none: */
#define CMD_KEY_ACCESS (1ULL<<4) /* Returns, copies or uses the user data from
* the value of the key. */
#define CMD_KEY_UPDATE (1ULL<<5) /* Updates data to the value, new value may
* depend on the old value. */
#define CMD_KEY_INSERT (1ULL<<6) /* Adds data to the value with no chance of,
* modification or deletion of existing data. */
#define CMD_KEY_DELETE (1ULL<<7) /* Explicitly deletes some content
* from the value of the key. */
```
Unrelated changes:
- generate-command-code.py is only compatible with python3 (modified the shabang)
- generate-command-code.py print file on json parsing error
- rename `shard_channel` key-spec flag to just `channel`.
- add INCOMPLETE flag in input spec of SORT and SORT_RO | eef9c6b0ee17fe5a42cd16a812d43864868247af | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/eef9c6b0ee17fe5a42cd16a812d43864868247af | 2022-01-18 16:00:00+02:00 |
Fixed a rounding bug in geo.tcl
| b00e1891c04bd375bb7d9877397c675335f8b40c | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/b00e1891c04bd375bb7d9877397c675335f8b40c | 2019-01-15 07:26:19+00:00 |
Typo fix | f06f10e66bfe5afdb013798e02c6aec7937435a5 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/f06f10e66bfe5afdb013798e02c6aec7937435a5 | 2017-07-27 15:27:46+09:00 |
fix pingoff test race
| c480af900764cefbd60ac037d01065aad1b123d1 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/c480af900764cefbd60ac037d01065aad1b123d1 | 2020-05-31 15:51:52+03:00 |
fix missed call on freeaddrinfo
| 46f767aa19f2915cda124575958ea650ec28a12f | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/46f767aa19f2915cda124575958ea650ec28a12f | 2018-03-21 15:34:13+08:00 |
Fix typos & grammar in clusterBumpConfigEpochWithoutConsensus() comment.
| 36704d653bdb26c1e801eac904828242ad37d11c | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/36704d653bdb26c1e801eac904828242ad37d11c | 2016-01-08 12:07:52+01:00 |
Tests: add a few missing needs:debug tags. (#9806)
| 366d5101d3d3c268157860feca6696a64b77fe59 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/366d5101d3d3c268157860feca6696a64b77fe59 | 2021-11-18 23:01:56+02:00 |
CG: Add JUSTID to XCLAIM propagation to reduce CPU usage.
| 2ba9a57c9aa5a44d042338518bfd3da30dc60fc3 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/2ba9a57c9aa5a44d042338518bfd3da30dc60fc3 | 2018-03-20 11:25:49+01:00 |
Cleanup: Get rid of server.core_propagates (#11572)
1. Get rid of server.core_propagates - we can just rely on module/call nesting levels
2. Rename in_nested_call to execution_nesting and update the comment
3. Remove module_ctx_nesting (redundant, we can use execution_nesting)
4. Modify postExecutionUnitOperations according to the comment (The main purpose of this PR)
5. trackingHandlePendingKeyInvalidations: Check the nesting level inside this function
| 9c7c6924a019b902996fc4b608541f475daa649d | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/9c7c6924a019b902996fc4b608541f475daa649d | 2022-12-20 13:21:50+05:30 |
Fix RedisModule_Call tests on 32bit (#9481)
| 05e6b97bed17a5e5ba9864d4a08ef6bfa45ce222 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/05e6b97bed17a5e5ba9864d4a08ef6bfa45ce222 | 2021-09-09 23:03:02+03:00 |
Fix missing brackets around encoding variable in ZIP_DECODE_LENGTH macro
| 7c64e8896393f2fe4859a4a039e95c6ff0047fce | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/7c64e8896393f2fe4859a4a039e95c6ff0047fce | 2016-12-19 17:37:41-05:00 |
SORT memory leak fixed.
| 34e489cb8cee04b52b5cbbfe53280ad8419d0a96 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/34e489cb8cee04b52b5cbbfe53280ad8419d0a96 | 2015-09-04 10:09:32+02:00 |
HyperLogLog: fix the fix of a corruption bug.
| b2079cb508a1944841abf39715d8a2d522452467 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/b2079cb508a1944841abf39715d8a2d522452467 | 2019-07-31 10:36:23+02:00 |
Remove AOF optimization to skip expired keys.
Basically we cannot be sure that if the key is expired while writing the
AOF, the main thread will surely find the key expired. There are
possible race conditions like the moment at which the "now" is sampled,
and the fact that time may jump backward.
Think about the following:
SET a 5
EXPIRE a 1
AOF rewrite starts after about 1 second. The child process finds the key
expired, while in the main thread instead an INCR command is called
against the key "a" immediately after a fork, and the scheduler was
faster to give execution time to the main thread, so "a" is yet not
expired.
The main thread will generate an INCR a command to the AOF log that will
be appended to the rewritten AOF file, but that INCR command will target
a non existin "a" key, so a new non volatile key "a" will be created.
Two observations:
A) In theory by computing "now" before the fork, we should be sure that
if a key is expired at that time, it will be expired later when the
main thread will try to access to such key. However this does not take
into account the fact that the computer time may jump backward.
B) Technically we may still make the process safe by using a monotonic
time source.
However there were other similar related bugs, and in general the new
"vision" is that Redis persistence files should represent the memory
state without trying to be too smart: this makes the design more
consistent, bugs less likely to arise from complex interactions, and in
the end what is to fix is the Redis expire process to have less expired
keys in RAM.
Thanks to Oran Agra and Guy Benoish for writing me an email outlining
this problem, after they conducted a Redis 5 code review.
| ba92b517b8c22a4d62c583c0a6ac94fb9a0c2486 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/ba92b517b8c22a4d62c583c0a6ac94fb9a0c2486 | 2018-06-19 15:43:06+02:00 |
Fix invalid access in lpFind on corrupted listpack (#9819)
Issue found by corrupt-dump-fuzzer test with ASAN.
The problem was that lpSkip and lpGetWithSize could read the next listpack entry without validating that it's in range.
Similarly even the memcmp in lpFind could do that and possibly crash on segfault and now they'll crash on assert first.
The naive fix of using lpAssertValidEntry every time, resulted in 30% degradation in the lpFind benchmark of the unit test.
The final fix with the condition at the bottom has no performance implications. | f07dedf73facfed5044efaf2a7a780581bf73ffa | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/f07dedf73facfed5044efaf2a7a780581bf73ffa | 2021-11-22 15:30:00+02:00 |
Adds pub/sub channel patterns to ACL (#7993)
Fixes #7923.
This PR appropriates the special `&` symbol (because `@` and `*` are taken),
followed by a literal value or pattern for describing the Pub/Sub patterns that
an ACL user can interact with. It is similar to the existing key patterns
mechanism in function (additive) and implementation (copy-pasta). It also adds
the allchannels and resetchannels ACL keywords, naturally.
The default user is given allchannels permissions, whereas new users get
whatever is defined by the acl-pubsub-default configuration directive. For
backward compatibility in 6.2, the default of this directive is allchannels but
this is likely to be changed to resetchannels in the next major version for
stronger default security settings.
Unless allchannels is set for the user, channel access permissions are checked
as follows :
* Calls to both PUBLISH and SUBSCRIBE will fail unless a pattern matching the
argumentative channel name(s) exists for the user.
* Calls to PSUBSCRIBE will fail unless the pattern(s) provided as an argument
literally exist(s) in the user's list.
Such failures are logged to the ACL log.
Runtime changes to channel permissions for a user with existing subscribing
clients cause said clients to disconnect unless the new permissions permit the
connections to continue. Note, however, that PSUBSCRIBErs' patterns are matched
literally, so given the change bar:* -> b*, pattern subscribers to bar:* will be
disconnected.
Notes/questions:
* UNSUBSCRIBE, PUNSUBSCRIBE and PUBSUB remain unprotected due to lack of reasons
for touching them.
| c1b1e8c329567e90ec0edcb8c176e9f58a7d7435 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/c1b1e8c329567e90ec0edcb8c176e9f58a7d7435 | 2020-12-01 14:21:39+02:00 |
RM_ZsetRem: Delete key if empty (#8453)
Without this fix, RM_ZsetRem can leave empty sorted sets which are
not allowed to exist.
Removing from a sorted set while iterating seems to work (while
inserting causes failed assetions). RM_ZsetRangeEndReached is
modified to return 1 if the key doesn't exist, to terminate
iteration when the last element has been removed. | aea6e71ef82701e07177744e600e1ef20d60b7d0 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/aea6e71ef82701e07177744e600e1ef20d60b7d0 | 2021-02-05 18:54:01+01:00 |
fix string to double conversion, stopped parsing on \0 even if the string has more data.
getLongLongFromObject calls string2ll which has this line:
/* Return if not all bytes were used. */
so if you pass an sds with 3 characters "1\01" it will fail.
but getLongDoubleFromObject calls strtold, and considers it ok if eptr[0]==`\0`
i.e. if the end of the string found by strtold ends with null terminator
127.0.0.1:6379> set a 1
OK
127.0.0.1:6379> setrange a 2 2
(integer) 3
127.0.0.1:6379> get a
"1\x002"
127.0.0.1:6379> incrbyfloat a 2
"3"
127.0.0.1:6379> get a
"3"
| adf2701cc95085a4a9980da7b7367b1836c5a0f2 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/adf2701cc95085a4a9980da7b7367b1836c5a0f2 | 2017-11-23 16:42:15+02:00 |
Fix redis-cli cluster add-node race in cli.tcl (#11349)
There is a race condition in the test:
```
*** [err]: redis-cli --cluster add-node with cluster-port in tests/unit/cluster/cli.tcl
Expected '5' to be equal to '4' {assert_equal 5 [CI 0 cluster_known_nodes]} proc ::test)
```
When using cli to add node, there can potentially be a race condition
in which all nodes presenting cluster state o.k even though the added
node did not yet meet all cluster nodes.
This comment and the fix were taken from #11221. Also apply it in several
other similar places. | a549b78c48121c698c84536d25404a23f01c167d | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/a549b78c48121c698c84536d25404a23f01c167d | 2022-10-03 14:21:41+08:00 |
Fix integer overflow in STRALGO LCS (CVE-2021-32625) (#9011)
An integer overflow bug in Redis version 6.0 or newer can be exploited using the
STRALGO LCS command to corrupt the heap and potentially result with remote code
execution. This is a result of an incomplete fix by CVE-2021-29477. | 1ddecf1958924b178b76a31d989ef1e05af81964 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/1ddecf1958924b178b76a31d989ef1e05af81964 | 2021-06-01 09:12:45+03:00 |
Fixes segfault on calling trackingGetTotalKeys
... with CSC disabled
| 8a44b2cc7ee15fedbacceced5d4a64d1b2a917c5 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/8a44b2cc7ee15fedbacceced5d4a64d1b2a917c5 | 2020-02-14 17:13:58+02:00 |
Prevent LCS from allocating temp memory over proto-max-bulk-len (#9817)
LCS can allocate immense amount of memory (sizes of two inputs multiplied by each other).
In the past this caused some possible security issues due to overflows, which we solved
and also added use of `trymalloc` to return "Insufficient memory" instead of OOM panic zmalloc.
But in case overcommit is enabled, it could be that we won't get the OOM panic, and zmalloc
will succeed, and then we can get OOM killed by the kernel.
The solution here is to prevent LCS from allocating transient memory that's bigger than
`proto-max-bulk-len` config.
This config is not directly related to transient memory, but using a hard coded value ad well as
introducing a specific config seems wrong.
This comes to solve an error in the corrupt-dump-fuzzer test that started in the daily CI see #9799 | 14176484697dc96df62c76630eef2b97a89bb8d0 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/14176484697dc96df62c76630eef2b97a89bb8d0 | 2021-11-21 14:30:20+02:00 |
Sanitize dump payload: fuzz tester and fixes for segfaults and leaks it exposed
The test creates keys with various encodings, DUMP them, corrupt the payload
and RESTORES it.
It utilizes the recently added use-exit-on-panic config to distinguish between
asserts and segfaults.
If the restore succeeds, it runs random commands on the key to attempt to
trigger a crash.
It runs in two modes, one with deep sanitation enabled and one without.
In the first one we don't expect any assertions or segfaults, in the second one
we expect assertions, but no segfaults.
We also check for leaks and invalid reads using valgrind, and if we find them
we print the commands that lead to that issue.
Changes in the code (other than the test):
- Replace a few NPD (null pointer deference) flows and division by zero with an
assertion, so that it doesn't fail the test. (since we set the server to use
`exit` rather than `abort` on assertion).
- Fix quite a lot of flows in rdb.c that could have lead to memory leaks in
RESTORE command (since it now responds with an error rather than panic)
- Add a DEBUG flag for SET-SKIP-CHECKSUM-VALIDATION so that the test don't need
to bother with faking a valid checksum
- Remove a pile of code in serverLogObjectDebugInfo which is actually unsafe to
run in the crash report (see comments in the code)
- fix a missing boundary check in lzf_decompress
test suite infra improvements:
- be able to run valgrind checks before the process terminates
- rotate log files when restarting servers
| c31055db617a7fedb20c28c245ddad8ed2b11931 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/c31055db617a7fedb20c28c245ddad8ed2b11931 | 2020-08-14 16:05:34+03:00 |
fixed stop condition in RM_ZsetRangeNext and RM_ZsetRangePrev
| 7f9b9512b877af96ded1c9758c23c075bab36f8d | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/7f9b9512b877af96ded1c9758c23c075bab36f8d | 2016-12-15 00:07:20+02:00 |
Ziplist: insertion bug under particular conditions fixed.
Ziplists had a bug that was discovered while investigating a different
issue, resulting in a corrupted ziplist representation, and a likely
segmentation foult and/or data corruption of the last element of the
ziplist, once the ziplist is accessed again.
The bug happens when a specific set of insertions / deletions is
performed so that an entry is encoded to have a "prevlen" field (the
length of the previous entry) of 5 bytes but with a count that could be
encoded in a "prevlen" field of a since byte. This could happen when the
"cascading update" process called by ziplistInsert()/ziplistDelete() in
certain contitious forces the prevlen to be bigger than necessary in
order to avoid too much data moving around.
Once such an entry is generated, inserting a very small entry
immediately before it will result in a resizing of the ziplist for a
count smaller than the current ziplist length (which is a violation,
inserting code expects the ziplist to get bigger actually). So an FF
byte is inserted in a misplaced position. Moreover a realloc() is
performed with a count smaller than the ziplist current length so the
final bytes could be trashed as well.
SECURITY IMPLICATIONS:
Currently it looks like an attacker can only crash a Redis server by
providing specifically choosen commands. However a FF byte is written
and there are other memory operations that depend on a wrong count, so
even if it is not immediately apparent how to mount an attack in order
to execute code remotely, it is not impossible at all that this could be
done. Attacks always get better... and we did not spent enough time in
order to think how to exploit this issue, but security researchers
or malicious attackers could.
| c495d095ae495ea5253443ee4562aaa30681a854 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/c495d095ae495ea5253443ee4562aaa30681a854 | 2017-01-30 16:34:08+01:00 |
Fix ziplist and listpack overflows and truncations (CVE-2021-32627, CVE-2021-32628) (#9589)
- fix possible heap corruption in ziplist and listpack resulting by trying to
allocate more than the maximum size of 4GB.
- prevent ziplist (hash and zset) from reaching size of above 1GB, will be
converted to HT encoding, that's not a useful size.
- prevent listpack (stream) from reaching size of above 1GB.
- XADD will start a new listpack if the new record may cause the previous
listpack to grow over 1GB.
- XADD will respond with an error if a single stream record is over 1GB
- List type (ziplist in quicklist) was truncating strings that were over 4GB,
now it'll respond with an error.
Co-authored-by: sundb <[email protected]> | c5e6a6204c4cf57f85e7c83a9b4e99f1a7204fd2 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/c5e6a6204c4cf57f85e7c83a9b4e99f1a7204fd2 | 2021-10-04 12:11:02+03:00 |
String pattern matching had exponential time complexity on pathological patterns (CVE-2022-36021) (#11858)
Authenticated users can use string matching commands with a
specially crafted pattern to trigger a denial-of-service attack on Redis,
causing it to hang and consume 100% CPU time.
Co-authored-by: Tom Levy <[email protected]> | dcbfcb916ca1a269b3feef86ee86835294758f84 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84 | 2023-02-28 15:15:26+02:00 |
Fix crash when overcommit_memory is inaccessible (#10848)
When `/proc/sys/vm/overcommit_memory` is inaccessible, fp is NULL.
`checkOvercommit` will return -1 without setting err_msg, and then
the err_msg is used to print the log, crash the server.
Set the err_msg variables to Null when declaring it, seems safer.
And the overcommit_memory error log will print two "WARNING",
like `WARNING WARNING overcommit_memory is set to 0!`, this PR
also removes the second WARNING in `checkOvercommit`.
Reported in #10846. Fixes #10846. Introduced in #10636 (7.0.1) | 62ac1ab007b9ba25588671fdefd0025028030504 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/62ac1ab007b9ba25588671fdefd0025028030504 | 2022-06-12 03:27:44+08:00 |
Cluster Manager: fixed infinite loop in rebalance (Issue #4941).
| 4bce88b11fdf68ab754cf9125ffaac02c6428ff5 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/4bce88b11fdf68ab754cf9125ffaac02c6428ff5 | 2018-05-28 17:23:42+02:00 |
Adds isolated netstats for replication. (#10062)
The amount of `server.stat_net_output_bytes/server.stat_net_input_bytes`
is actually the sum of replication flow and users' data flow.
It may cause confusions like this:
"Why does my server get such a large output_bytes while I am doing nothing? ".
After discussions and revisions, now here is the change about what this
PR brings (final version before merge):
- 2 server variables to count the network bytes during replication,
including fullsync and propagate bytes.
- `server.stat_net_repl_output_bytes`/`server.stat_net_repl_input_bytes`
- 3 info fields to print the input and output of repl bytes and instantaneous
value of total repl bytes.
- `total_net_repl_input_bytes` / `total_net_repl_output_bytes`
- `instantaneous_repl_total_kbps`
- 1 new API `rioCheckType()` to check the type of rio. So we can use this
to distinguish between diskless and diskbased replication
- 2 new counting items to keep network statistics consistent between master
and slave
- rdb portion during diskless replica. in `rdbLoadProgressCallback()`
- first line of the full sync payload. in `readSyncBulkPayload()`
Co-authored-by: Oran Agra <[email protected]> | bb1de082eac26d5242733eb0b40959bd9de2e15b | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/bb1de082eac26d5242733eb0b40959bd9de2e15b | 2022-05-31 13:07:33+08:00 |
Fix Integer overflow issue with intsets (CVE-2021-32687) (#9586)
The vulnerability involves changing the default set-max-intset-entries
configuration parameter to a very large value and constructing specially
crafted commands to manipulate sets | 7cb89a5a1cc8ee0b003a36b2eba42573c09c45f9 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/7cb89a5a1cc8ee0b003a36b2eba42573c09c45f9 | 2021-10-04 12:09:25+03:00 |
Fix edge-case when a module client is unblocked (#8618)
Scenario:
1. A module client is blocked on keys with a timeout
2. Shortly before the timeout expires, the key is being populated and signaled
as ready
3. Redis calls moduleTryServeClientBlockedOnKey (which replies to client) and
then moduleUnblockClient
4. moduleUnblockClient doesn't really unblock the client, it writes to
server.module_blocked_pipe and only marks the BC as unblocked.
5. beforeSleep kics in, by this time the client still exists and techincally
timed-out. beforeSleep replies to the timeout client (double reply) and
only then moduleHandleBlockedClients is called, reading from module_blocked_pipe
and calling unblockClient
The solution is similar to what was done in moduleTryServeClientBlockedOnKey: we
should avoid re-processing an already-unblocked client | e58118cda6cacb5a845a9cf8eda45074470e31b2 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/e58118cda6cacb5a845a9cf8eda45074470e31b2 | 2021-03-08 18:00:19+01:00 |
Streams: free lp if all elements are deleted
| c9324f81a209c49c795d41ab2af8cb06b72d87c9 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/c9324f81a209c49c795d41ab2af8cb06b72d87c9 | 2018-07-16 15:57:41+08:00 |
Client side caching: config option for table fill rate.
| 32efd9adf8d9ea2005495433f77fdbd4fac09c3a | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/32efd9adf8d9ea2005495433f77fdbd4fac09c3a | 2019-07-24 11:35:01+02:00 |
Fix preprocessor if/else chain broken in order to fix #3927.
| f47607af0242c31a113e6ff9c0a884acec036757 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/f47607af0242c31a113e6ff9c0a884acec036757 | 2017-04-11 16:54:27+02:00 |
ACL: check patterns instead of passwords in ACLCheckCommandPerm
| 8fc0079366fcf7c75cbfd4864c448ca9aae5c835 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/8fc0079366fcf7c75cbfd4864c448ca9aae5c835 | 2019-01-25 19:06:18+08:00 |
Another typo in protected mode error message.
| 1e7a8f8221aa37bf2d6454e833b005e2bb9c6465 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/1e7a8f8221aa37bf2d6454e833b005e2bb9c6465 | 2016-01-07 22:42:43+01:00 |
Implement Multi Part AOF mechanism to avoid AOFRW overheads. (#9788)
Implement Multi-Part AOF mechanism to avoid overheads during AOFRW.
Introducing a folder with multiple AOF files tracked by a manifest file.
The main issues with the the original AOFRW mechanism are:
* buffering of commands that are processed during rewrite (consuming a lot of RAM)
* freezes of the main process when the AOFRW completes to drain the remaining part of the buffer and fsync it.
* double disk IO for the data that arrives during AOFRW (had to be written to both the old and new AOF files)
The main modifications of this PR:
1. Remove the AOF rewrite buffer and related code.
2. Divide the AOF into multiple files, they are classified as two types, one is the the `BASE` type,
it represents the full amount of data (Maybe AOF or RDB format) after each AOFRW, there is only
one `BASE` file at most. The second is `INCR` type, may have more than one. They represent the
incremental commands since the last AOFRW.
3. Use a AOF manifest file to record and manage these AOF files mentioned above.
4. The original configuration of `appendfilename` will be the base part of the new file name, for example:
`appendonly.aof.1.base.rdb` and `appendonly.aof.2.incr.aof`
5. Add manifest-related TCL tests, and modified some existing tests that depend on the `appendfilename`
6. Remove the `aof_rewrite_buffer_length` field in info.
7. Add `aof-disable-auto-gc` configuration. By default we're automatically deleting HISTORY type AOFs.
It also gives users the opportunity to preserve the history AOFs. just for testing use now.
8. Add AOFRW limiting measure. When the AOFRW failures reaches the threshold (3 times now),
we will delay the execution of the next AOFRW by 1 minute. If the next AOFRW also fails, it will be
delayed by 2 minutes. The next is 4, 8, 16, the maximum delay is 60 minutes (1 hour). During the limit
period, we can still use the 'bgrewriteaof' command to execute AOFRW immediately.
9. Support upgrade (load) data from old version redis.
10. Add `appenddirname` configuration, as the directory name of the append only files. All AOF files and
manifest file will be placed in this directory.
11. Only the last AOF file (BASE or INCR) can be truncated. Otherwise redis will exit even if
`aof-load-truncated` is enabled.
Co-authored-by: Oran Agra <[email protected]> | 87789fae0b767e47fef78ee994434554f2bf2f31 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/87789fae0b767e47fef78ee994434554f2bf2f31 | 2022-01-04 01:14:13+08:00 |
MULTI: OOM err if cannot free enough memory in MULTI/EXEC context
| e2de7e75248a928280d6c739e9020d8c8adc1c0f | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/e2de7e75248a928280d6c739e9020d8c8adc1c0f | 2018-10-17 16:40:45+08:00 |
Merge pull request #7264 from oranagra/test_for_7205
add regression test for the race in #7205 | 08d00dad5297440ea0680faf236a03d7390e9e51 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/08d00dad5297440ea0680faf236a03d7390e9e51 | 2020-05-17 17:59:14+02:00 |
handleClientsBlockedOnKeys() refactoring.
| a092f20d87f6e435c5b68b8e217ae0d54dd12715 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/a092f20d87f6e435c5b68b8e217ae0d54dd12715 | 2019-09-06 12:24:26+02:00 |
Streams: export iteration API.
| 01ea018c4080e24b00d36e1cbf36c4d98b82ff40 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/01ea018c4080e24b00d36e1cbf36c4d98b82ff40 | 2017-09-15 12:17:25+02:00 |
Use chi-square for random distributivity verification in test (#8709)
Problem:
Currently, when performing random distribution verification, we determine
the probability of each element occurring in the sum, but the probability is
only an estimate, these tests had rare sporadic failures, and we cannot verify
what the probability of failure will be.
Solution:
Using the chi-square distribution instead of the original random distribution
validation makes the test more reasonable and easier to find problems. | 569a3f4548cc525aac8bd246da213eb48a17f0e1 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/569a3f4548cc525aac8bd246da213eb48a17f0e1 | 2021-04-01 13:20:15+08:00 |
Minor improvements to module blocked on keys (#7903)
- Clarify some documentation comments
- Make sure blocked-on-keys client privdata is accessible
from withing the timeout callback
- Handle blocked clients in beforeSleep - In case a key
becomes "ready" outside of processCommand
See #7879 #7880 | addf47dcacec596eb7f6e1500846331d3e13fff4 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/addf47dcacec596eb7f6e1500846331d3e13fff4 | 2020-10-12 16:13:38+02:00 |
Fix integer overflow in STRALGO LCS (CVE-2021-29477)
An integer overflow bug in Redis version 6.0 or newer could be exploited using
the STRALGO LCS command to corrupt the heap and potentially result with remote
code execution.
| f0c5f920d0f88bd8aa376a2c05af4902789d1ef9 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/f0c5f920d0f88bd8aa376a2c05af4902789d1ef9 | 2021-05-03 08:32:31+03:00 |
Merge pull request #4154 from liangsijian/unstable
Fix lua ldb command log | 7c3c472b5e5861787055c74b189e6a8b590e9e81 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/7c3c472b5e5861787055c74b189e6a8b590e9e81 | 2017-07-24 14:11:10+02:00 |
Add test verifying PUBSUB NUMPAT behavior (#9209)
| 8b8f05c86c1f1f002caa1f4e1877020389f167e4 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/8b8f05c86c1f1f002caa1f4e1877020389f167e4 | 2021-09-03 15:52:39-07:00 |
Cluster Manager: 'backup' command
| fb020ab090f6059bc8dbcfae3d333f9997fba5c3 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/fb020ab090f6059bc8dbcfae3d333f9997fba5c3 | 2019-02-15 20:37:18+01:00 |
Normalize the style of help information with other documentation (#10965)
| 8221d481656e3bc109d85dd6523e723d63024ae6 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/8221d481656e3bc109d85dd6523e723d63024ae6 | 2022-07-12 12:56:02-04:00 |
Add missing calls to raxStop (#7532)
Since the dynamic allocations in raxIterator are only used for deep walks, memory
leak due to missing call to raxStop can only happen for rax with key names longer
than 32 bytes.
Out of all the missing calls, the only ones that may lead to a leak are the rax
for consumer groups and consumers, and these were only in AOFRW and rdbSave, which
normally only happen in fork or at shutdown. | 4e8f2d6881a38397bfbf0d7d161959163a5f6e88 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/4e8f2d6881a38397bfbf0d7d161959163a5f6e88 | 2020-07-21 01:13:05-04:00 |
Cluster: ability to prevent slaves from failing over their masters.
This commit, in some parts derived from PR #3041 which is no longer
possible to merge (because the user deleted the original branch),
implements the ability of slaves to have a special configuration
preventing that they try to start a failover when the master is failing.
There are multiple reasons for wanting this, and the feautre was
requested in issue #3021 time ago.
The differences between this patch and the original PR are the
following:
1. The flag is saved/loaded on the nodes configuration.
2. The 'myself' node is now flag-aware, the flag is updated as needed
when the configuration is changed via CONFIG SET.
3. The flag name uses NOFAILOVER instead of NO_FAILOVER to be consistent
with existing NOADDR.
4. The redis.conf documentation was rewritten.
Thanks to @deep011 for the original patch.
| 432bf4770e8f2c11e63477620e4765abfbdf91f5 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/432bf4770e8f2c11e63477620e4765abfbdf91f5 | 2018-03-14 13:46:36+01:00 |
Stabilize bgsave test that sometimes fails with valgrind (#7559)
on ci.redis.io the test fails a lot, reporting that bgsave didn't end.
increaseing the timeout we wait for that bgsave to get aborted.
in addition to that, i also verify that it indeed got aborted by
checking that the save counter wasn't reset.
add another test to verify that a successful bgsave indeed resets the
change counter. | 8a57969fd75db01b881d438200911d95bdead293 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/8a57969fd75db01b881d438200911d95bdead293 | 2020-07-23 13:06:24+03:00 |
Use fchmod to update command history file. (#9447)
This is considered a safer approach as it prevents a race condition that
could lead to chmod executed on a different file.
Not a major risk, but CodeQL alerted this so it makes sense to fix. | c9931ddba53f43c291cb61b6976a91496976e2fd | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/c9931ddba53f43c291cb61b6976a91496976e2fd | 2021-09-02 10:00:00+03:00 |
Remove Duplicate Processing
| c76b9b644c11f8b7284755664670d9baa64f1907 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/c76b9b644c11f8b7284755664670d9baa64f1907 | 2016-10-13 15:17:07+09:00 |
wait command optimization (#7333)
Client that issued WAIT last will most likely have the highest replication offset, so imagine a probably common case where all clients are waiting for the same number of replicas. we prefer the loop to start from the last client (one waiting for the highest offset), so that the optimization in the function will call replicationCountAcksByOffset for each client until it found a good one, and stop calling it for the rest of the clients.
the way the loop was implemented would mean that in such case it is likely to call replicationCountAcksByOffset for all clients.
Note: the change from > to >= is not directly related to the above.
Co-authored-by: 曹正斌 <[email protected]> | d10b2f3173ebfcc673d4ec36efef512802e3a535 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/d10b2f3173ebfcc673d4ec36efef512802e3a535 | 2020-08-13 19:30:51+08:00 |
Fixed a bug in the emptyDb() new implementation.
| 535969679673f8b3cb904eef3de0f8104cacf072 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/535969679673f8b3cb904eef3de0f8104cacf072 | 2015-09-28 11:07:24+02:00 |
fix: fix benchmark cannot exit when NOAUTH err happens
| ad223e204222dca7758eb540a455bca93e62b861 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/ad223e204222dca7758eb540a455bca93e62b861 | 2019-03-13 20:46:33+08:00 |
Lua debugger: redis-cli error when --ldb is without --eval.
Otherwise the result is a messed CLI without prompt.
Thanks to Itamar Haber for reporting this issue.
| 6de2306add95460a488d76e57b5cf2b5db17d5da | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/6de2306add95460a488d76e57b5cf2b5db17d5da | 2015-11-16 12:07:08+01:00 |
Make tcp-keepalive default to 300 in internal conf.
We already changed the default in the redis.conf template, but I forgot
to change the internal config as well.
| b99ad1bd808fcfa5f57301a65c875d8c16d7cf71 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/b99ad1bd808fcfa5f57301a65c875d8c16d7cf71 | 2016-07-04 12:08:37+02:00 |
make sort/ro commands validate external keys access patterns (#10106) (#10340)
Currently the sort and sort_ro can access external keys via `GET` and `BY`
in order to make sure the user cannot violate the authorization ACL
rules, the decision is to reject external keys access patterns unless ACL allows
SORT full access to all keys.
I.e. for backwards compatibility, SORT with GET/BY keeps working, but
if ACL has restrictions to certain keys, these features get permission denied.
### Implemented solution
We have discussed several potential solutions and decided to only allow the GET and BY
arguments when the user has all key permissions with the SORT command. The reasons
being that SORT with GET or BY is problematic anyway, for instance it is not supported in
cluster mode since it doesn't declare keys, and we're not sure the combination of that feature
with ACL key restriction is really required.
**HOWEVER** If in the fullness of time we will identify a real need for fine grain access
support for SORT, we would implement the complete solution which is the alternative
described below.
### Alternative (Completion solution):
Check sort ACL rules after executing it and before committing output (either via store or
to COB). it would require making several changes to the sort command itself. and would
potentially cause performance degradation since we will have to collect all the get keys
instead of just applying them to a temp array and then scan the access keys against the
ACL selectors. This solution can include an optimization to avoid the overheads of collecting
the key names, in case the ACL rules grant SORT full key-access, or if the ACL key pattern
literal matches the one used in GET/BY. It would also mean that authorization would be
O(nlogn) since we will have to complete most of the command execution before we can
perform verification
Co-authored-by: Madelyn Olson <[email protected]>
Co-authored-by: Oran Agra <[email protected]> | 1078e30c5ff0e13e18192faada8efe3e97299db3 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/1078e30c5ff0e13e18192faada8efe3e97299db3 | 2022-03-15 17:14:53+02:00 |
Streams: basic XADD tests.
| 7a41b402c1a5caae30dcd234d3d01c7f76ca5757 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/7a41b402c1a5caae30dcd234d3d01c7f76ca5757 | 2017-09-15 15:54:18+02:00 |
Add expire.c and evict.c.
| 4a140d320f7a8e1a63f9c3ca588f61f21838f3ac | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/4a140d320f7a8e1a63f9c3ca588f61f21838f3ac | 2016-07-06 15:28:18+02:00 |
improve malloc efficiency: reduce call times of zrealloc (#10533)
* improve malloc efficiency: reduce call times of zrealloc
Co-authored-by: Madelyn Olson <[email protected]> | ee17e7af8da0c6e482bc24ad1e2197d94cba1e1f | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/ee17e7af8da0c6e482bc24ad1e2197d94cba1e1f | 2022-04-10 10:52:36+08:00 |
fix memory leak in processInlineBuffer error handling code (#8295)
This code path is normally executed only when v6.0 and above replicates from v2.4 | cfcd0fa6f71af4e224c1d86be55b6b01f2288be2 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/cfcd0fa6f71af4e224c1d86be55b6b01f2288be2 | 2021-01-06 14:20:53-05:00 |
Fix TLS issues with large replies (#10909)
This problem was introduced by 496375f and seems to more easily reproduce on macOS since OpenSSL writes more frequently return with EAGAIN. | 0b645d63193fb18a6646def558c37f6c7ee5d740 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/0b645d63193fb18a6646def558c37f6c7ee5d740 | 2022-07-03 13:35:58+03:00 |
Fix missing separator in module info line (usedby and using lists) (#9241)
Fix module info genModulesInfoStringRenderModulesList lack separator when there's more than one module in the list.
Co-authored-by: Oran Agra <[email protected]> | 1895e134a77efd789b1a6daee76a6ba5ec90e516 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/1895e134a77efd789b1a6daee76a6ba5ec90e516 | 2021-07-19 16:10:25+08:00 |
fix sprintf and snprintf format string
There are some cases of printing unsigned integer with %d conversion
specificator and vice versa (signed integer with %u specificator).
Patch by Sergey Polovko. Backported to Redis from Disque.
| 96628cc40df778716b70f4b661ceb1bd329591dd | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/96628cc40df778716b70f4b661ceb1bd329591dd | 2015-11-28 09:05:41+01:00 |
Fix the bug that CLIENT REPLY OFF|SKIP cannot receive push notifications (#11875)
This bug seems to be there forever, CLIENT REPLY OFF|SKIP will
mark the client with CLIENT_REPLY_OFF or CLIENT_REPLY_SKIP flags.
With these flags, prepareClientToWrite called by addReply* will
return C_ERR directly. So the client can't receive the Pub/Sub
messages and any other push notifications, e.g client side tracking.
In this PR, we adding a CLIENT_PUSHING flag, disables the reply
silencing flags. When adding push replies, set the flag, after the reply,
clear the flag. Then add the flag check in prepareClientToWrite.
Fixes #11874
Note, the SUBSCRIBE command response is a bit awkward,
see https://github.com/redis/redis-doc/pull/2327
Co-authored-by: Oran Agra <[email protected]> | 416842e6c004dbd951e398a8651df6c56a030a23 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/416842e6c004dbd951e398a8651df6c56a030a23 | 2023-03-12 23:50:44+08:00 |
Remove dead code from lpStringToInt64() (#8863)
| bcf1b384e3a2cc83124684a9d952682b713fe2f0 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/bcf1b384e3a2cc83124684a9d952682b713fe2f0 | 2021-04-27 07:40:58+08:00 |
Fix redis_check_rdb() hang when rdb is FIFO (#12022)
When loading RDB over the named piped, redis_check_rdb() is hung at fopen, because fopen blocks until another process opens the FIFO for writing. The fix is to check if RDB is FIFO. If yes, return an error. | d5d56d0d95d295ed7fb6bff1bc6b0c182dacbfa2 | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/d5d56d0d95d295ed7fb6bff1bc6b0c182dacbfa2 | 2023-04-14 19:14:27-04:00 |
Fixes `CLUSTER COUNTKEYSINSLOT` (#9672)
Introduced via typo in #9504.
Also adds a sanity test for coverage. | 48e4d7709961f7e1ca94dea86ff3b57c4b9710ec | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/48e4d7709961f7e1ca94dea86ff3b57c4b9710ec | 2021-10-24 12:32:53+03:00 |
Better error message const correctness. (#8348)
| 3f3cb9d09b815869764e74dd52af1994fed55fe6 | redis | neuralsentry | 0 | https://github.com/redis/redis | https://github.com/redis/redis/commit/3f3cb9d09b815869764e74dd52af1994fed55fe6 | 2021-01-21 11:56:08+02:00 |
GEOSEARCH bybox bug fixes and new fuzzy tester (#8445)
Fix errors of GEOSEARCH bybox search due to:
1. projection of the box to a trapezoid (when the meter box is converted to long / lat it's no longer a box).
2. width and height mismatch
Changes:
- New GEOSEARCH point in rectangle algorithm
- Fix GEOSEARCH bybox width and height mismatch bug
- Add GEOSEARCH bybox testing to the existing "GEOADD + GEORANGE randomized test"
- Add new fuzzy test to stress test the bybox corners and edges
- Add some tests for edge cases of the bybox algorithm
Co-authored-by: Oran Agra <[email protected]> | ded1655d49950afd02bb3c5199bd33caac995e7c | redis | neuralsentry | 1 | https://github.com/redis/redis | https://github.com/redis/redis/commit/ded1655d49950afd02bb3c5199bd33caac995e7c | 2021-02-05 00:08:35+08:00 |
Subsets and Splits