- 22 6月, 2020 1 次提交
-
-
由 hwware 提交于
-
- 20 4月, 2020 1 次提交
-
-
由 antirez 提交于
Related to #7113.
-
- 18 4月, 2020 1 次提交
-
-
由 omg-by 提交于
when trigger a always fail scripts, sentinel.running_scripts will increase ten times, however it only decrease one times onretry the maximum. and it will't reset, when it become SENTINEL_SCRIPT_MAX_RUNNING, sentinel don't trigger scripts.
-
- 16 3月, 2020 2 次提交
- 07 1月, 2020 1 次提交
-
-
由 yz1509 提交于
-
- 17 12月, 2019 1 次提交
-
-
由 Madelyn Olson 提交于
-
- 19 11月, 2019 1 次提交
-
-
由 antirez 提交于
-
- 07 11月, 2019 1 次提交
-
-
由 Patrick Valsecchi 提交于
When a redis instance becomes a slave, sentinel also kills pubsub clients. Closes #6545
-
- 15 10月, 2019 1 次提交
-
-
由 Yossi Gottlieb 提交于
-
- 08 10月, 2019 2 次提交
-
-
由 Yossi Gottlieb 提交于
Add configuration options for TLS protocol versions, ciphers/cipher suites selection, etc.
-
由 Yossi Gottlieb 提交于
* Introduce a connection abstraction layer for all socket operations and integrate it across the code base. * Provide an optional TLS connections implementation based on OpenSSL. * Pull a newer version of hiredis with TLS support. * Tests, redis-cli updates for TLS support.
-
- 27 2月, 2019 2 次提交
-
-
由 vattezhang 提交于
-
由 vattezhang 提交于
-
- 18 1月, 2019 1 次提交
-
-
由 antirez 提交于
-
- 10 1月, 2019 3 次提交
- 31 10月, 2018 2 次提交
-
-
由 antirez 提交于
So far it was not possible to setup Sentinel with authentication enabled. This commit introduces this feature: every Sentinel will try to authenticate with other sentinels using the same password it is configured to accept clients with. So for instance if a Sentinel has a "requirepass" configuration statemnet set to "foo", it will use the "foo" password to authenticate with every other Sentinel it connects to. So basically to add the "requirepass" to all the Sentinels configurations is enough in order to make sure that: 1) Clients will require the password to access the Sentinels instances. 2) Each Sentinel will use the same password to connect and authenticate with every other Sentinel in the group. Related to #3279 and #3329.
-
由 antirez 提交于
Sentinel must be exposed, so protected mode is just an issue for users in case Redis was started in Sentinel mode. Related to #3279 and #3329.
-
- 11 9月, 2018 1 次提交
-
-
由 antirez 提交于
SENTINEL REPLICAS was added as an alias, in the configuration rewriting now it uses known-replica, however all the rest is basically at API level of logged events and messages having to do with the protocol, so there is very little to do here compared to the Redis core itself, to preserve compatibility.
-
- 26 8月, 2018 1 次提交
-
-
由 Chris Lamb 提交于
-
- 04 7月, 2018 1 次提交
-
-
由 Jack Drogon 提交于
-
- 28 6月, 2018 2 次提交
-
-
由 zhaozhao.zz 提交于
-
由 shenlongxing 提交于
-
- 26 6月, 2018 1 次提交
-
-
由 antirez 提交于
Thanks to @shenlongxing for reporting the problem. Related to #5062.
-
- 25 6月, 2018 9 次提交
-
-
由 antirez 提交于
Instead of telling the user to set the renamed command to "" to remove the renaming, to the obvious thing when a command is renamed to itself. So if I want to remove the renaming of PING, I just rename it to PING again.
-
由 antirez 提交于
-
由 antirez 提交于
-
由 antirez 提交于
-
由 antirez 提交于
-
由 antirez 提交于
-
由 antirez 提交于
-
由 antirez 提交于
-
由 antirez 提交于
-
- 15 6月, 2018 1 次提交
-
-
由 antirez 提交于
The ability of "SENTINEL SET" to change the reconfiguration script at runtime is a problem even in the security model of Redis: any client inside the network may set any executable to be ran once a failover is triggered. This option adds protection for this problem: by default the two SENTINEL SET subcommands modifying scripts paths are denied. However the user is still able to rever that using the Sentinel configuration file in order to allow such a feature.
-
- 23 5月, 2018 1 次提交
-
-
由 antirez 提交于
See issue #2819 for details. The gist is that when we want to send INFO because we are over the time, we used to send only INFO commands, no longer sending PING commands. However if a master fails exactly when we are about to send an INFO command, the PING times will result zero because the PONG reply was already received, and we'll fail to send more PINGs, since we try only to send INFO commands: the failure detector will delay until the connection is closed and re-opened for "long timeout". This commit changes the logic so that we can send the three kind of messages regardless of the fact we sent another one already in the same code path. It could happen that we go over the message limit for the link by a few messages, but this is not significant. However now we'll not introduce delays in sending commands just because there was something else to send at the same time.
-
- 21 2月, 2017 1 次提交
-
-
由 antirez 提交于
This change attempts to switch to an hash function which mitigates the effects of the HashDoS attack (denial of service attack trying to force data structures to worst case behavior) while at the same time providing Redis with an hash function that does not expect the input data to be word aligned, a condition no longer true now that sds.c strings have a varialbe length header. Note that it is possible sometimes that even using an hash function for which collisions cannot be generated without knowing the seed, special implementation details or the exposure of the seed in an indirect way (for example the ability to add elements to a Set and check the return in which Redis returns them with SMEMBERS) may make the attacker's life simpler in the process of trying to guess the correct seed, however the next step would be to switch to a log(N) data structure when too many items in a single bucket are detected: this seems like an overkill in the case of Redis. SPEED REGRESION TESTS: In order to verify that switching from MurmurHash to SipHash had no impact on speed, a set of benchmarks involving fast insertion of 5 million of keys were performed. The result shows Redis with SipHash in high pipelining conditions to be about 4% slower compared to using the previous hash function. However this could partially be related to the fact that the current implementation does not attempt to hash whole words at a time but reads single bytes, in order to have an output which is endian-netural and at the same time working on systems where unaligned memory accesses are a problem. Further X86 specific optimizations should be tested, the function may easily get at the same level of MurMurHash2 if a few optimizations are performed.
-
- 14 9月, 2016 1 次提交
-
-
由 antirez 提交于
-
- 12 9月, 2016 1 次提交
-
-
由 oranagra 提交于
(Change cherry-picked and modified by @antirez from a larger commit provided by @oranagra in PR #3223).
-