141 Commits

Author SHA256 Message Date
Danilo Spinella
5cc21f2fbb Accepting request 1175233 from home:AndreasStieger:branches:server:database
redis 7.2.5

OBS-URL: https://build.opensuse.org/request/show/1175233
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=244
2024-05-22 08:34:53 +00:00
Danilo Spinella
0fd9b817b5 Accepting request 1170509 from home:13ilya:branches:server:database
- Fixed privileges of /run/redis directory (rpm -qlv redis | grep /run).

OBS-URL: https://build.opensuse.org/request/show/1170509
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=242
2024-04-30 11:51:33 +00:00
Danilo Spinella
efe5dd46d7 Accepting request 1154883 from home:dspinella:branches:server:database
* redis-CVE-2023-45145.patch

OBS-URL: https://build.opensuse.org/request/show/1154883
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=240
2024-03-04 16:34:56 +00:00
Danilo Spinella
bac400fc7c Accepting request 1154881 from home:dspinella:branches:server:database
* bsc#1207448

OBS-URL: https://build.opensuse.org/request/show/1154881
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=239
2024-03-04 16:27:06 +00:00
Danilo Spinella
def0e3ef80 Accepting request 1154879 from home:dspinella:branches:server:database
- The following issue has been fixed in TW but has not been
  mentioned before:
  * bsc#1208235
  * redis-CVE-2022-24834.patch
  * redis-CVE-2022-36021.patch
  * redis-CVE-2023-25155.patch
  * redis-CVE-2023-45145.patch

OBS-URL: https://build.opensuse.org/request/show/1154879
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=238
2024-03-04 16:23:42 +00:00
Danilo Spinella
4240b3dba2 Accepting request 1154125 from home:dspinella:branches:server:database
- The following patch was removed from SLE:

OBS-URL: https://build.opensuse.org/request/show/1154125
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=237
2024-03-01 16:36:17 +00:00
fcc46f09e6 Accepting request 1153845 from home:dspinella:branches:server:database
- The following patches were removed from SLE:
  * bsc1198952.patch
  * bsc1198952-1.patch
  * bsc1198952-2.patch
  * bsc1198952-3.patch
  * bsc1198952-4.patch
  * cve-2022-3647.patch
  * redis-CVE-2022-35977.patch
  * redis-CVE-2023-22458.patch
  * redis-CVE-2023-28856.patch

OBS-URL: https://build.opensuse.org/request/show/1153845
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=236
2024-03-01 10:23:58 +00:00
Danilo Spinella
ff305e70ca Accepting request 1137728 from home:darix:apps
- redis 7.2.4: (boo#1218646)
  - Security fixes
    - (CVE-2023-41056) In some cases, Redis may incorrectly handle
      resizing of memory buffers which can result in incorrect
      accounting of buffer sizes and lead to heap overflow and
      potential remote code execution.
  - Bug fixes
    - Fix crashes of cluster commands clusters with mixed versions
      of 7.0 and 7.2 (#12805, #12832)
    - Fix slot ownership not being properly handled when deleting a
      slot from a node (#12564)
    - Fix atomicity issues with the RedisModuleEvent_Key module API
      event (#12733)

OBS-URL: https://build.opensuse.org/request/show/1137728
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=234
2024-01-09 13:21:34 +00:00
9792149f34 - redis 7.2.3:
- Fix file descriptor leak preventing deleted files from freeing
    disk space on replicas (#12693)
  - Fix a possible crash after cluster node removal (#12702)

OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=232
2023-11-03 23:46:21 +00:00
8d0af6be9e Accepting request 1119207 from home:dspinella:branches:server:database
- redis 7.2.2:
  * (CVE-2023-45145) The wrong order of listen(2) and chmod(2) calls creates a
    race condition that can be used by another process to bypass desired Unix
    socket permissions on startup, bsc#1216376
  * WAITAOF could timeout in the absence of write traffic in case a new AOF is
    created and an AOF rewrite can't immediately start
  * Fix crash when running rebalance command in a mixed cluster of 7.0 and 7.2
    nodes
  * Fix the return type of the slot number in cluster shards to integer, which
    makes it consistent with past behavior 
  * Fix CLUSTER commands are called from modules or scripts to return TLS info
    appropriately 
    redis-cli, fix crash on reconnect when in SUBSCRIBE mode 
  * Fix overflow calculation for next timer event

OBS-URL: https://build.opensuse.org/request/show/1119207
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=230
2023-10-23 13:27:44 +00:00
Danilo Spinella
8da6eb17e6 Accepting request 1109571 from home:dspinella:branches:server:database
- redis 7.2.1:
  * (CVE-2023-41053) Redis does not correctly identify keys accessed by SORT_RO and,
    as a result, may grant users executing this command access to keys that are not
    explicitly authorized by the ACL configuration. (bsc#1215094)
  * Fix crashes when joining a node to an existing 7.0 Redis Cluster
  * Correct request_policy and response_policy command tips on for some admin /
    configuration commands
- Refresh redis.hashes

OBS-URL: https://build.opensuse.org/request/show/1109571
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=229
2023-09-07 15:05:44 +00:00
dce9c50393 Accepting request 1104035 from home:darix:apps
- redis 7.2.0
  - Bug Fixes
    - redis-cli in cluster mode handles unknown-endpoint (#12273)
    - Update request / response policy hints for a few commands
      (#12417)
    - Ensure that the function load timeout is disabled during
      loading from RDB/AOF and on replicas. (#12451)
    - Fix false success and a memory leak for ACL selector with bad
      parenthesis combination (#12452)
    - Fix the assertion when script timeout occurs after it
      signaled a blocked client (#12459)
  - Fixes for issues in previous releases of Redis 7.2
    - Update MONITOR client's memory correctly for INFO and
      client-eviction (#12420)
    - The response of cluster nodes was unnecessarily adding an
      extra comma when no hostname was present. (#12411)
- refreshed redis-conf.patch:
- switch to autosetup now that we switched the last patch to patch
  level 1

OBS-URL: https://build.opensuse.org/request/show/1104035
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=228
2023-08-21 08:20:31 +00:00
9860c277c5 Accepting request 1098376 from home:dspinella:branches:server:database
- redis 7.0.12:
  * (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger
    a heap overflow in the cjson and cmsgpack libraries, and result in heap
    corruption and potentially remote code execution. The problem exists in all
    versions of Redis with Lua scripting support, starting from 2.6, and affects
    only authenticated and authorized users. (bsc#1213193)
  * (CVE-2023-36824) Extracting key names from a command and a list of arguments
    may, in some cases, trigger a heap overflow and result in reading random heap
    memory, heap corruption and potentially remote code execution. Specifically:
    using COMMAND GETKEYS* and validation of key names in ACL rules. (bsc#1213249)
  * Re-enable downscale rehashing while there is a fork child
  * Fix possible hang in HRANDFIELD, SRANDMEMBER, ZRANDMEMBER when used with <count>
  * Improve fairness issue in RANDOMKEY, HRANDFIELD, SRANDMEMBER, ZRANDMEMBER,
    SPOP, and eviction
  * Fix WAIT to be effective after a blocked module command being unblocked
  * Avoid unnecessary full sync after master restart in a rare case

OBS-URL: https://build.opensuse.org/request/show/1098376
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=226
2023-07-12 16:56:39 +00:00
4274ab24aa Accepting request 1087941 from home:jsrain:branches:server:database
- refresh redis-hashes from upstream source

OBS-URL: https://build.opensuse.org/request/show/1087941
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=224
2023-05-19 12:56:14 +00:00
9dcac58640 Accepting request 1080084 from home:AndreasStieger:branches:server:database
boo#1210548 reference

OBS-URL: https://build.opensuse.org/request/show/1080084
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=222
2023-04-19 07:04:34 +00:00
Danilo Spinella
43566b2085 Accepting request 1079989 from home:darix:apps
- redis 7.0.11
  - (CVE-2023-28856) Authenticated users can use the HINCRBYFLOAT
    command to create an invalid hash field that will crash Redis
    on access
  - Add a missing fsync of AOF file in rare cases (#11973)
  - Disconnect pub-sub subscribers when revoking allchannels
    permission (#11992)
  - Fix a compiler fortification induced crash when used with link
    time optimizations (#11982)
- Drop get-old-size-calculations.patch:
  replaced with proper fix

- Added get-old-size-calculations.patch:
  my workaround for https://github.com/redis/redis/issues/11965

OBS-URL: https://build.opensuse.org/request/show/1079989
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=221
2023-04-18 07:30:27 +00:00
Danilo Spinella
f000f09a92 Accepting request 1073382 from home:AndreasStieger:branches:server:database
redis 7.0.10 CVE-2023-28425 boo#1209528

OBS-URL: https://build.opensuse.org/request/show/1073382
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=220
2023-03-21 13:39:55 +00:00
10c7261c8d Accepting request 1068515 from home:vlefebvre:branches:server:database
Fix CVE-2022-36021 (bsc#1208790) & Fix CVE-2023-25155 (bsc#1208793)

OBS-URL: https://build.opensuse.org/request/show/1068515
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=218
2023-03-02 13:49:31 +00:00
09c75a9e67 Accepting request 1058769 from home:AndreasStieger:branches:server:database
redis 7.0.8
CVE-2022-35977 boo#1207202
CVE-2023-22458 boo#1207203

OBS-URL: https://build.opensuse.org/request/show/1058769
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=216
2023-01-17 07:53:17 +00:00
8afe396eb9 Accepting request 1043784 from home:AndreasStieger:branches:server:database
cl fixup

OBS-URL: https://build.opensuse.org/request/show/1043784
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=214
2022-12-19 15:13:50 +00:00
Danilo Spinella
1558bdc54e Accepting request 1043406 from home:AndreasStieger:branches:server:database
redis 7.0.7

OBS-URL: https://build.opensuse.org/request/show/1043406
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=213
2022-12-19 14:41:51 +00:00
82c1abcb9d Accepting request 1043342 from home:stroeder:sys
- Update to version 7.0.7
  * Fix regression from Redis 7.0.6 in distance replies
    of Geo commands (#11631)

OBS-URL: https://build.opensuse.org/request/show/1043342
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=212
2022-12-19 10:24:36 +00:00
07f0ab88a0 Accepting request 1043227 from home:AndreasStieger:branches:server:database
redis 7.0.6

OBS-URL: https://build.opensuse.org/request/show/1043227
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=211
2022-12-16 09:39:25 +00:00
Danilo Spinella
251b859c53 Accepting request 1030903 from home:dspinella:branches:server:database
- Fix CVE-2022-3647, crash in sigsegvHandler debug function
  (CVE-2022-3647, bsc#1204633)
  * cve-2022-3647.patch

OBS-URL: https://build.opensuse.org/request/show/1030903
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=209
2022-10-31 13:47:56 +00:00
Danilo Spinella
395445251d Accepting request 1003795 from home:schubi2:logrotate
- Migration to /usr/etc: Saving user changed configuration files
  in /etc and restoring them while an RPM update.

OBS-URL: https://build.opensuse.org/request/show/1003795
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=207
2022-10-06 09:53:23 +00:00
Danilo Spinella
500dfe6651 Accepting request 1005288 from home:stroeder:sys
- Update to version 7.0.5 (boo#1203638)
  + Security Fixes:
    * (CVE-2022-35951) Executing a XAUTOCLAIM command on a stream key in a specific
      state, with a specially crafted COUNT argument, may cause an integer overflow,
      a subsequent heap overflow, and potentially lead to remote code execution.
      The problem affects Redis versions 7.0.0 or newer
      [reported by Xion (SeungHyun Lee) of KAIST GoN].
  + Module API changes
    * Fix RM_Call execution of scripts when used with M/W/S flags to properly
      handle script flags (#11159)
    * Fix RM_SetAbsExpire and RM_GetAbsExpire API registration (#11025, #8564)
  + Bug Fixes
    * Fix a hang when eviction is combined with lazy-free and maxmemory-eviction-tenacity is set to 100 (#11237)
    * Fix a crash when a replica may attempt to set itself as its master as a result of a manual failover (#11263)
    * Fix a bug where a cluster-enabled replica node may permanently set its master's hostname to '?' (#10696)
    * Fix a crash when a Lua script returns a meta-table (#11032)
  + Fixes for issues in previous releases of Redis 7.0
    * Fix redis-cli to do DNS lookup before sending CLUSTER MEET (#11151)
    * Fix crash when a key is lazy expired during cluster key migration (#11176)
    * Fix AOF rewrite to fsync the old AOF file when a new one is created (#11004)
    * Fix some crashes involving a list containing entries larger than 1GB (#11242)
    * Correctly handle scripts with a non-read-only shebang on a cluster replica (#11223)
    * Fix memory leak when unloading a module (#11147)
    * Fix bug with scripts ignoring client tracking NOLOOP (#11052)
    * Fix client-side tracking breaking protocol when FLUSHDB / FLUSHALL / SWAPDB is used inside MULTI-EXEC (#11038)
    * Fix ACL: BITFIELD with GET and also SET / INCRBY can be executed with read-only key permission (#11086)
    * Fix missing sections for INFO ALL when also requesting a module info section (#11291)

OBS-URL: https://build.opensuse.org/request/show/1005288
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=205
2022-09-22 07:54:56 +00:00
Danilo Spinella
7bcd514b1e Accepting request 989997 from home:stroeder:branches:server:database
Security update to version 7.0.4 (CVE-2022-31144)

OBS-URL: https://build.opensuse.org/request/show/989997
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=203
2022-07-18 15:26:40 +00:00
b1950bfb18 Accepting request 988416 from home:stroeder:branches:server:database
Update to version 7.0.3

OBS-URL: https://build.opensuse.org/request/show/988416
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=201
2022-07-12 15:53:38 +00:00
Danilo Spinella
4d2f5087bc Accepting request 986598 from home:dspinella:branches:server:database
- Use bundled jemalloc to fix active defragmentation, fixes bsc#1200913.
- Remove patch:
  * Add-support-for-USE_SYSTEM_JEMALLOC-flag.patch

OBS-URL: https://build.opensuse.org/request/show/986598
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=199
2022-07-07 17:00:57 +00:00
Lars Vogdt
396485a714 Accepting request 985767 from home:schubi2
- Moved logrotate files from user specific directory /etc/logrotate.d
  to vendor specific directory /usr/etc/logrotate.d.

OBS-URL: https://build.opensuse.org/request/show/985767
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=197
2022-06-29 17:57:26 +00:00
089b021786 Accepting request 982226 from home:stroeder:branches:server:database
Update to version 7.0.2

OBS-URL: https://build.opensuse.org/request/show/982226
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=195
2022-06-13 14:46:11 +00:00
a31e8a3913 Accepting request 981377 from home:stroeder:branches:server:database
Update to version 7.0.1

OBS-URL: https://build.opensuse.org/request/show/981377
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=194
2022-06-09 06:07:20 +00:00
fc4b78ade5 Accepting request 976074 from home:dspinella:branches:server:database
- Unbundle jemalloc, fixes bsc#199164
  * Add-support-for-USE_SYSTEM_JEMALLOC-flag.patch

OBS-URL: https://build.opensuse.org/request/show/976074
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=192
2022-05-11 06:37:08 +00:00
80d020e454 Accepting request 976028 from home:jsegitz:branches:server:database
- Add ReadWritePaths=/etc/redis to redis-sentinel@.service (bsc#1199198)

OBS-URL: https://build.opensuse.org/request/show/976028
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=191
2022-05-11 06:36:28 +00:00
5b38ac3ccf Accepting request 975847 from home:dspinella:branches:server:database
- Update to version 7.0.0:
  https://raw.githubusercontent.com/redis/redis/7.0/00-RELEASENOTES
- Remove upstreamed patch:
  * getMcontextEip-return-value.patch

OBS-URL: https://build.opensuse.org/request/show/975847
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=190
2022-05-10 07:17:27 +00:00
81f406bdc6 Accepting request 973269 from home:AndreasStieger:branches:server:database
redis 6.2.7
CVE-2022-24736 boo#1198953
CVE-2022-24735 boo#1198952

OBS-URL: https://build.opensuse.org/request/show/973269
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=188
2022-04-28 06:51:05 +00:00
Danilo Spinella
ec1629769c Accepting request 932205 from home:jsegitz:branches:systemdhardening:server:database
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort

OBS-URL: https://build.opensuse.org/request/show/932205
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=187
2021-11-22 10:20:26 +00:00
Danilo Spinella
29b0e30afe Accepting request 923169 from home:stroeder:sys
OBS-URL: https://build.opensuse.org/request/show/923169
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=186
2021-10-05 09:57:51 +00:00
Danilo Spinella
2605e08052 Accepting request 907768 from home:AndreasStieger:branches:server:database
redis 6.2.5 CVE-2021-32761 boo#1188598

OBS-URL: https://build.opensuse.org/request/show/907768
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=185
2021-07-22 14:14:31 +00:00
61156a193e Accepting request 899019 from home:dirkmueller:Factory
- replaced /var/run with /run for all PID file paths (bsc#1185072)

OBS-URL: https://build.opensuse.org/request/show/899019
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=183
2021-06-14 07:08:16 +00:00
a7f41ef279 Accepting request 896855 from home:AndreasStieger:branches:server:database
redis 6.2.4 CVE-2021-32625 (boo#1186722)

OBS-URL: https://build.opensuse.org/request/show/896855
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=181
2021-06-02 08:13:15 +00:00
3ce31d79c5 Accepting request 894866 from home:jengelh:branches:server:database
- Move sysctl file to /usr/lib/sysctl.d, so that it can be
  overridden by an admin in /etc.

OBS-URL: https://build.opensuse.org/request/show/894866
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=179
2021-05-24 07:34:37 +00:00
9a644fe959 Accepting request 891111 from home:AndreasStieger:branches:server:database
redis 6.2.3 changelog

OBS-URL: https://build.opensuse.org/request/show/891111
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=177
2021-05-07 07:49:51 +00:00
52a01a7b99 Accepting request 890241 from home:stroeder:branches:server:database
redis 6.2.3 with security fixes

OBS-URL: https://build.opensuse.org/request/show/890241
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=176
2021-05-04 08:23:54 +00:00
e7aaf7f0f3 Accepting request 886928 from home:AndreasStieger:branches:server:database
- Usage of OPENSSL_INIT_ATFORK in tls.c raises the minimum version
  of OpenSSL 1.1.x to 1.1.1, say so in spec

OBS-URL: https://build.opensuse.org/request/show/886928
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=174
2021-04-20 10:04:45 +00:00
4dd269ce79 Accepting request 886894 from home:stroeder:branches:server:database
redis 6.2.2

OBS-URL: https://build.opensuse.org/request/show/886894
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=173
2021-04-20 08:19:36 +00:00
282322ff69 Accepting request 878769 from home:stroeder:branches:server:database
- replaced /var/run with /run for all PID file paths

OBS-URL: https://build.opensuse.org/request/show/878769
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=171
2021-03-18 14:23:57 +00:00
fcedb1225c Accepting request 877720 from home:gmccarter:branches:server:database
- redis 6.2.1
  Bug fixes:
  * Fix sanitize-dump-payload for stream with deleted records (#8568)
  * Prevent client-query-buffer-limit config from being set to lower than 1mb (#8557)
  Improvements:
  * Make port, tls-port and bind config options modifiable at runtime (#8510)
  Platform and deployment-related changes:
  * Fix compilation error on non-glibc systems if jemalloc is not used (#8533)
  * Improved memory consumption and memory usage tracking on FreeBSD (#8545)
  * Fix compilation on ARM64 MacOS with jemalloc (#8458)
  Modules:
  * New Module API for getting user name of a client (#8508)
  * Optimize RM_Call by utilizing a shared reusable client (#8516)
  * Fix crash running CLIENT INFO via RM_Call (#8560)
  
- includes changes from 6.2.0 GA:
  * Integer overflow on 32-bit systems (CVE-2021-21309)
  Bug fixes:
  * Avoid 32-bit overflows when proto-max-bulk-len is set high (#8522)
  * Fix broken protocol in client tracking tracking-redir-broken message (#8456)
  * Avoid unsafe field name characters in INFO commandstats, errorstats, modules (#8492)
  * XINFO able to access expired keys during CLIENT PAUSE WRITE (#8436)
  * Fix allowed length for REPLCONF ip-address, needed due to Sentinel's support for hostnames (#8517)
  * Fix broken protocol in redis-benchmark when used with -a or --dbnum (#8486)
  * XADD counts deleted records too when considering switching to a new listpack (#8390)
  Bug fixes that are only applicable to previous releases of Redis 6.2:
  * Fixes in GEOSEARCH bybox (accuracy and mismatch between width and height) (#8445)
  * Fix risk of OOM panic in HRANDFIELD, ZRANDMEMBER commands with huge negative count (#8429)
  * Fix duplicate replicas issue in Sentinel, needed due to hostname support (#8481)
  * Fix Sentinel configuration rewrite, an improvement of #8271 (#8480)

OBS-URL: https://build.opensuse.org/request/show/877720
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=169
2021-03-08 12:06:24 +00:00
9dc5eb117c Accepting request 876322 from home:13ilya:branches:server:database
- Added parameter -p to all install command in spec-file.
- Changed file redis.tmpfiles.d file, replaced from /var/run to /run.

OBS-URL: https://build.opensuse.org/request/show/876322
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=168
2021-03-03 07:13:07 +00:00
f104ee3389 Accepting request 876262 from home:AndreasStieger:branches:server:database
redis 6.0.12

OBS-URL: https://build.opensuse.org/request/show/876262
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=167
2021-03-03 07:12:30 +00:00