Antonio Teixeira 8b50993174 Update to 8.0.6
- Update to 8.0.6:
  - Security fixes
    * (CVE-2025-49844, bsc#1250995) A Lua script may lead to remote code execution
    * (CVE-2025-46817, bsc#1250995) A Lua script may lead to integer overflow and potential RCE
    * (CVE-2025-46818, bsc#1250995) A Lua script can be executed in the context of another user
    * (CVE-2025-46819, bsc#1250995) LUA out-of-bound read
  - Bug fixes
    * Fix accounting for dual channel RDB bytes in replication stats (#2614)
    * Fix EVAL to report unknown error when empty error table is provided (#2229)
    * Fix use-after-free when active expiration triggers hashtable to shrink (#2257)
    * Fix MEMORY USAGE to account for embedded keys (#2290)
    * Fix memory leak when shrinking a hashtable without entries (#2288)
    * Prevent potential assertion in active defrag handling large allocations (#2353)
    * Prevent bad memory access when NOTOUCH client gets unblocked (#2347)
    * Converge divergent shard-id persisted in nodes.conf to primary's shard id (#2174)
    * Fix client tracking memory overhead calculation (#2360)
    * Fix RDB load per slot memory pre-allocation when loading from RDB snapshot (#2466)
    * Don't use AVX2 instructions if the CPU doesn't support it (#2571)
    * Fix bug where active defrag may be unable to defrag sparsely filled pages (#2656)
- Changes from 8.0.5:
  https://github.com/valkey-io/valkey/releases/tag/8.0.5
- Drop patches included in upstream release
  * CVE-2025-27151.patch
  * CVE-2025-49112.patch
  * valkey-ssl_new-null-return.patc
2025-10-06 17:19:20 -03:00
2025-10-06 17:19:20 -03:00
2025-10-06 17:19:20 -03:00
2025-10-06 17:19:20 -03:00

 README.SUSE
-------------

 Valkey Server
==============

1. cp -a /etc/valkey/default.conf.example /etc/valkey/instancename.conf

We use the "cp -a" here, so that our permissions are preserved.
In case you copied the file with out the "-a"

chown root:valkey  /etc/valkey/instancename.conf
chmod u=rw,g=r,o= /etc/valkey/instancename.conf

2. change at least pidfile, logfile and dir setting
# the pid file *has* to match your config filename without the ".conf"

pidfile /run/valkey/instancename.pid
logfile /var/log/valkey/instancename.log
dir /var/lib/valkey/instancename/

If you want to run more than one instance you also have to change the
socket path and/or the ip:port combination.
 e.g. /run/valkey/instancename.sock

Also make sure if you copy configurations from somewhere, that "daemonize"
should be set to "no".

3. create the database dir:
$ install -d -o valkey -g valkey -m 0750 /var/lib/valkey/instancename/

4. systemctl start valkey@instancename
5. systemctl enable valkey@instancename

6. To stop/restart all instances at the same time use:

systemctl restart valkey.target
systemctl stop valkey.target

 Valkey Sentinel
================

1. cp -a /etc/valkey/sentinel.conf.example /etc/valkey/sentinel-instancename.conf

We use the "cp -a" here, so that our permissions are preserved.
In case you copied the file with out the "-a"

chown root:valkey  /etc/valkey/sentinel-instancename.conf
chmod u=rw,g=rw,o= /etc/valkey/sentinel-instancename.conf

Please note that the sentinel config needs write permissions for the group.
The chmod line differs from the line for the normal valkey server.

2. change at least pidfile, logfile setting
# the pid file *has* to match your config filename without the ".conf"

pidfile /run/valkey/instancename.pid
logfile /var/log/valkey/instancename.log

If you want to run more than one instance you also have to change the
socket path and/or the ip:port combination.
 e.g. /run/valkey/instancename.sock

Also make sure if you copy configurations from somewhere, that "daemonize"
should be set to "no".

4. systemctl start valkey-sentinel@instancename
5. systemctl enable valkey-sentinel@instancename

6. To stop/restart all instances at the same time use:

systemctl restart valkey-sentinel.target
systemctl stop valkey-sentinel.target

 Integration with apache when using unix domain sockets
=========================================================

If you plan to use valkey in combination with apache, then you should
add 'valkey' to apache group and set 'unixsocketperm 770':
$ usermod -a -G valkey wwwrun
$ systemctl restart apache2
then apache is able to connect to valkey socket


 Migrating from Redis
=======================

Migrating from Redis to Valkey is simple to execute. Just install "valkey-compat-redis" package.

The scriptlet should automatically take care of the necessary transitions.
Description
No description provided
Readme 14 MiB
Languages
Shell 93.7%
Makefile 6.3%