SHA256
1
0
forked from pool/redis
Commit Graph

123 Commits

Author SHA256 Message Date
28bbf52e79 - redis 7.2.3:
- Fix file descriptor leak preventing deleted files from freeing
    disk space on replicas (#12693)
  - Fix a possible crash after cluster node removal (#12702)

OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=232
2023-11-03 23:46:21 +00:00
9a6b379be3 Accepting request 1119207 from home:dspinella:branches:server:database
- redis 7.2.2:
  * (CVE-2023-45145) The wrong order of listen(2) and chmod(2) calls creates a
    race condition that can be used by another process to bypass desired Unix
    socket permissions on startup, bsc#1216376
  * WAITAOF could timeout in the absence of write traffic in case a new AOF is
    created and an AOF rewrite can't immediately start
  * Fix crash when running rebalance command in a mixed cluster of 7.0 and 7.2
    nodes
  * Fix the return type of the slot number in cluster shards to integer, which
    makes it consistent with past behavior 
  * Fix CLUSTER commands are called from modules or scripts to return TLS info
    appropriately 
    redis-cli, fix crash on reconnect when in SUBSCRIBE mode 
  * Fix overflow calculation for next timer event

OBS-URL: https://build.opensuse.org/request/show/1119207
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=230
2023-10-23 13:27:44 +00:00
Danilo Spinella
8b2bf3dac8 Accepting request 1109571 from home:dspinella:branches:server:database
- redis 7.2.1:
  * (CVE-2023-41053) Redis does not correctly identify keys accessed by SORT_RO and,
    as a result, may grant users executing this command access to keys that are not
    explicitly authorized by the ACL configuration. (bsc#1215094)
  * Fix crashes when joining a node to an existing 7.0 Redis Cluster
  * Correct request_policy and response_policy command tips on for some admin /
    configuration commands
- Refresh redis.hashes

OBS-URL: https://build.opensuse.org/request/show/1109571
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=229
2023-09-07 15:05:44 +00:00
Martin Pluskal
1afa5bfe4b Accepting request 1104035 from home:darix:apps
- redis 7.2.0
  - Bug Fixes
    - redis-cli in cluster mode handles unknown-endpoint (#12273)
    - Update request / response policy hints for a few commands
      (#12417)
    - Ensure that the function load timeout is disabled during
      loading from RDB/AOF and on replicas. (#12451)
    - Fix false success and a memory leak for ACL selector with bad
      parenthesis combination (#12452)
    - Fix the assertion when script timeout occurs after it
      signaled a blocked client (#12459)
  - Fixes for issues in previous releases of Redis 7.2
    - Update MONITOR client's memory correctly for INFO and
      client-eviction (#12420)
    - The response of cluster nodes was unnecessarily adding an
      extra comma when no hostname was present. (#12411)
- refreshed redis-conf.patch:
- switch to autosetup now that we switched the last patch to patch
  level 1

OBS-URL: https://build.opensuse.org/request/show/1104035
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=228
2023-08-21 08:20:31 +00:00
Martin Pluskal
165dbec1e9 Accepting request 1098376 from home:dspinella:branches:server:database
- redis 7.0.12:
  * (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger
    a heap overflow in the cjson and cmsgpack libraries, and result in heap
    corruption and potentially remote code execution. The problem exists in all
    versions of Redis with Lua scripting support, starting from 2.6, and affects
    only authenticated and authorized users. (bsc#1213193)
  * (CVE-2023-36824) Extracting key names from a command and a list of arguments
    may, in some cases, trigger a heap overflow and result in reading random heap
    memory, heap corruption and potentially remote code execution. Specifically:
    using COMMAND GETKEYS* and validation of key names in ACL rules. (bsc#1213249)
  * Re-enable downscale rehashing while there is a fork child
  * Fix possible hang in HRANDFIELD, SRANDMEMBER, ZRANDMEMBER when used with <count>
  * Improve fairness issue in RANDOMKEY, HRANDFIELD, SRANDMEMBER, ZRANDMEMBER,
    SPOP, and eviction
  * Fix WAIT to be effective after a blocked module command being unblocked
  * Avoid unnecessary full sync after master restart in a rare case

OBS-URL: https://build.opensuse.org/request/show/1098376
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=226
2023-07-12 16:56:39 +00:00
Danilo Spinella
037bb9e55f Accepting request 1079989 from home:darix:apps
- redis 7.0.11
  - (CVE-2023-28856) Authenticated users can use the HINCRBYFLOAT
    command to create an invalid hash field that will crash Redis
    on access
  - Add a missing fsync of AOF file in rare cases (#11973)
  - Disconnect pub-sub subscribers when revoking allchannels
    permission (#11992)
  - Fix a compiler fortification induced crash when used with link
    time optimizations (#11982)
- Drop get-old-size-calculations.patch:
  replaced with proper fix

- Added get-old-size-calculations.patch:
  my workaround for https://github.com/redis/redis/issues/11965

OBS-URL: https://build.opensuse.org/request/show/1079989
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=221
2023-04-18 07:30:27 +00:00
Danilo Spinella
f703ac4735 Accepting request 1073382 from home:AndreasStieger:branches:server:database
redis 7.0.10 CVE-2023-28425 boo#1209528

OBS-URL: https://build.opensuse.org/request/show/1073382
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=220
2023-03-21 13:39:55 +00:00
Martin Pluskal
7616b2211a Accepting request 1068515 from home:vlefebvre:branches:server:database
Fix CVE-2022-36021 (bsc#1208790) & Fix CVE-2023-25155 (bsc#1208793)

OBS-URL: https://build.opensuse.org/request/show/1068515
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=218
2023-03-02 13:49:31 +00:00
Martin Pluskal
580642cadf Accepting request 1058769 from home:AndreasStieger:branches:server:database
redis 7.0.8
CVE-2022-35977 boo#1207202
CVE-2023-22458 boo#1207203

OBS-URL: https://build.opensuse.org/request/show/1058769
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=216
2023-01-17 07:53:17 +00:00
Martin Pluskal
dfaff87b91 Accepting request 1043342 from home:stroeder:sys
- Update to version 7.0.7
  * Fix regression from Redis 7.0.6 in distance replies
    of Geo commands (#11631)

OBS-URL: https://build.opensuse.org/request/show/1043342
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=212
2022-12-19 10:24:36 +00:00
Martin Pluskal
0144920764 Accepting request 1043227 from home:AndreasStieger:branches:server:database
redis 7.0.6

OBS-URL: https://build.opensuse.org/request/show/1043227
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=211
2022-12-16 09:39:25 +00:00
Danilo Spinella
d6b5cd5c6f Accepting request 1030903 from home:dspinella:branches:server:database
- Fix CVE-2022-3647, crash in sigsegvHandler debug function
  (CVE-2022-3647, bsc#1204633)
  * cve-2022-3647.patch

OBS-URL: https://build.opensuse.org/request/show/1030903
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=209
2022-10-31 13:47:56 +00:00
Danilo Spinella
ce00deb62d Accepting request 1003795 from home:schubi2:logrotate
- Migration to /usr/etc: Saving user changed configuration files
  in /etc and restoring them while an RPM update.

OBS-URL: https://build.opensuse.org/request/show/1003795
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=207
2022-10-06 09:53:23 +00:00
Danilo Spinella
1be7f74178 Accepting request 1005288 from home:stroeder:sys
- Update to version 7.0.5 (boo#1203638)
  + Security Fixes:
    * (CVE-2022-35951) Executing a XAUTOCLAIM command on a stream key in a specific
      state, with a specially crafted COUNT argument, may cause an integer overflow,
      a subsequent heap overflow, and potentially lead to remote code execution.
      The problem affects Redis versions 7.0.0 or newer
      [reported by Xion (SeungHyun Lee) of KAIST GoN].
  + Module API changes
    * Fix RM_Call execution of scripts when used with M/W/S flags to properly
      handle script flags (#11159)
    * Fix RM_SetAbsExpire and RM_GetAbsExpire API registration (#11025, #8564)
  + Bug Fixes
    * Fix a hang when eviction is combined with lazy-free and maxmemory-eviction-tenacity is set to 100 (#11237)
    * Fix a crash when a replica may attempt to set itself as its master as a result of a manual failover (#11263)
    * Fix a bug where a cluster-enabled replica node may permanently set its master's hostname to '?' (#10696)
    * Fix a crash when a Lua script returns a meta-table (#11032)
  + Fixes for issues in previous releases of Redis 7.0
    * Fix redis-cli to do DNS lookup before sending CLUSTER MEET (#11151)
    * Fix crash when a key is lazy expired during cluster key migration (#11176)
    * Fix AOF rewrite to fsync the old AOF file when a new one is created (#11004)
    * Fix some crashes involving a list containing entries larger than 1GB (#11242)
    * Correctly handle scripts with a non-read-only shebang on a cluster replica (#11223)
    * Fix memory leak when unloading a module (#11147)
    * Fix bug with scripts ignoring client tracking NOLOOP (#11052)
    * Fix client-side tracking breaking protocol when FLUSHDB / FLUSHALL / SWAPDB is used inside MULTI-EXEC (#11038)
    * Fix ACL: BITFIELD with GET and also SET / INCRBY can be executed with read-only key permission (#11086)
    * Fix missing sections for INFO ALL when also requesting a module info section (#11291)

OBS-URL: https://build.opensuse.org/request/show/1005288
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=205
2022-09-22 07:54:56 +00:00
Danilo Spinella
65723e8e97 Accepting request 989997 from home:stroeder:branches:server:database
Security update to version 7.0.4 (CVE-2022-31144)

OBS-URL: https://build.opensuse.org/request/show/989997
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=203
2022-07-18 15:26:40 +00:00
Martin Pluskal
cd30b3c68c Accepting request 988416 from home:stroeder:branches:server:database
Update to version 7.0.3

OBS-URL: https://build.opensuse.org/request/show/988416
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=201
2022-07-12 15:53:38 +00:00
Danilo Spinella
3c8696bb7a Accepting request 986598 from home:dspinella:branches:server:database
- Use bundled jemalloc to fix active defragmentation, fixes bsc#1200913.
- Remove patch:
  * Add-support-for-USE_SYSTEM_JEMALLOC-flag.patch

OBS-URL: https://build.opensuse.org/request/show/986598
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=199
2022-07-07 17:00:57 +00:00
Lars Vogdt
0a57623dd0 Accepting request 985767 from home:schubi2
- Moved logrotate files from user specific directory /etc/logrotate.d
  to vendor specific directory /usr/etc/logrotate.d.

OBS-URL: https://build.opensuse.org/request/show/985767
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=197
2022-06-29 17:57:26 +00:00
Martin Pluskal
fd18857a95 Accepting request 982226 from home:stroeder:branches:server:database
Update to version 7.0.2

OBS-URL: https://build.opensuse.org/request/show/982226
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=195
2022-06-13 14:46:11 +00:00
Martin Pluskal
962129d107 Accepting request 981377 from home:stroeder:branches:server:database
Update to version 7.0.1

OBS-URL: https://build.opensuse.org/request/show/981377
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=194
2022-06-09 06:07:20 +00:00
Danilo Spinella
87bf38c7d5 Accepting request 976688 from home:AndreasStieger:branches:server:database
I think this may breaks the following macro

OBS-URL: https://build.opensuse.org/request/show/976688
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=193
2022-05-12 17:08:30 +00:00
Martin Pluskal
0c2859cd9c Accepting request 976074 from home:dspinella:branches:server:database
- Unbundle jemalloc, fixes bsc#199164
  * Add-support-for-USE_SYSTEM_JEMALLOC-flag.patch

OBS-URL: https://build.opensuse.org/request/show/976074
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=192
2022-05-11 06:37:08 +00:00
Martin Pluskal
6dee8279e6 Accepting request 975847 from home:dspinella:branches:server:database
- Update to version 7.0.0:
  https://raw.githubusercontent.com/redis/redis/7.0/00-RELEASENOTES
- Remove upstreamed patch:
  * getMcontextEip-return-value.patch

OBS-URL: https://build.opensuse.org/request/show/975847
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=190
2022-05-10 07:17:27 +00:00
Martin Pluskal
cd6af81f26 Accepting request 973269 from home:AndreasStieger:branches:server:database
redis 6.2.7
CVE-2022-24736 boo#1198953
CVE-2022-24735 boo#1198952

OBS-URL: https://build.opensuse.org/request/show/973269
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=188
2022-04-28 06:51:05 +00:00
Danilo Spinella
31a9681e63 Accepting request 923169 from home:stroeder:sys
OBS-URL: https://build.opensuse.org/request/show/923169
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=186
2021-10-05 09:57:51 +00:00
Danilo Spinella
4de6b48e75 Accepting request 907768 from home:AndreasStieger:branches:server:database
redis 6.2.5 CVE-2021-32761 boo#1188598

OBS-URL: https://build.opensuse.org/request/show/907768
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=185
2021-07-22 14:14:31 +00:00
Martin Pluskal
1ca5869704 Accepting request 896855 from home:AndreasStieger:branches:server:database
redis 6.2.4 CVE-2021-32625 (boo#1186722)

OBS-URL: https://build.opensuse.org/request/show/896855
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=181
2021-06-02 08:13:15 +00:00
Martin Pluskal
feec8a2e04 Accepting request 894866 from home:jengelh:branches:server:database
- Move sysctl file to /usr/lib/sysctl.d, so that it can be
  overridden by an admin in /etc.

OBS-URL: https://build.opensuse.org/request/show/894866
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=179
2021-05-24 07:34:37 +00:00
Martin Pluskal
7dd39d8d34 Accepting request 890241 from home:stroeder:branches:server:database
redis 6.2.3 with security fixes

OBS-URL: https://build.opensuse.org/request/show/890241
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=176
2021-05-04 08:23:54 +00:00
Martin Pluskal
ef2fff1142 Accepting request 886928 from home:AndreasStieger:branches:server:database
- Usage of OPENSSL_INIT_ATFORK in tls.c raises the minimum version
  of OpenSSL 1.1.x to 1.1.1, say so in spec

OBS-URL: https://build.opensuse.org/request/show/886928
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=174
2021-04-20 10:04:45 +00:00
Martin Pluskal
8eaaab7f5c Accepting request 886894 from home:stroeder:branches:server:database
redis 6.2.2

OBS-URL: https://build.opensuse.org/request/show/886894
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=173
2021-04-20 08:19:36 +00:00
Martin Pluskal
a5451d0ee4 Accepting request 877720 from home:gmccarter:branches:server:database
- redis 6.2.1
  Bug fixes:
  * Fix sanitize-dump-payload for stream with deleted records (#8568)
  * Prevent client-query-buffer-limit config from being set to lower than 1mb (#8557)
  Improvements:
  * Make port, tls-port and bind config options modifiable at runtime (#8510)
  Platform and deployment-related changes:
  * Fix compilation error on non-glibc systems if jemalloc is not used (#8533)
  * Improved memory consumption and memory usage tracking on FreeBSD (#8545)
  * Fix compilation on ARM64 MacOS with jemalloc (#8458)
  Modules:
  * New Module API for getting user name of a client (#8508)
  * Optimize RM_Call by utilizing a shared reusable client (#8516)
  * Fix crash running CLIENT INFO via RM_Call (#8560)
  
- includes changes from 6.2.0 GA:
  * Integer overflow on 32-bit systems (CVE-2021-21309)
  Bug fixes:
  * Avoid 32-bit overflows when proto-max-bulk-len is set high (#8522)
  * Fix broken protocol in client tracking tracking-redir-broken message (#8456)
  * Avoid unsafe field name characters in INFO commandstats, errorstats, modules (#8492)
  * XINFO able to access expired keys during CLIENT PAUSE WRITE (#8436)
  * Fix allowed length for REPLCONF ip-address, needed due to Sentinel's support for hostnames (#8517)
  * Fix broken protocol in redis-benchmark when used with -a or --dbnum (#8486)
  * XADD counts deleted records too when considering switching to a new listpack (#8390)
  Bug fixes that are only applicable to previous releases of Redis 6.2:
  * Fixes in GEOSEARCH bybox (accuracy and mismatch between width and height) (#8445)
  * Fix risk of OOM panic in HRANDFIELD, ZRANDMEMBER commands with huge negative count (#8429)
  * Fix duplicate replicas issue in Sentinel, needed due to hostname support (#8481)
  * Fix Sentinel configuration rewrite, an improvement of #8271 (#8480)

OBS-URL: https://build.opensuse.org/request/show/877720
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=169
2021-03-08 12:06:24 +00:00
Martin Pluskal
e929178189 Accepting request 876322 from home:13ilya:branches:server:database
- Added parameter -p to all install command in spec-file.
- Changed file redis.tmpfiles.d file, replaced from /var/run to /run.

OBS-URL: https://build.opensuse.org/request/show/876322
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=168
2021-03-03 07:13:07 +00:00
Martin Pluskal
cfb0e5acdd Accepting request 876262 from home:AndreasStieger:branches:server:database
redis 6.0.12

OBS-URL: https://build.opensuse.org/request/show/876262
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=167
2021-03-03 07:12:30 +00:00
Martin Pluskal
60b40902c0 Accepting request 874857 from home:AndreasStieger:branches:server:database
redis 6.0.11 CVE-2021-21309 boo#1182657

OBS-URL: https://build.opensuse.org/request/show/874857
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=164
2021-02-25 06:40:00 +00:00
Martin Pluskal
8645445949 Accepting request 872712 from home:msmeissn:branches:server:database
this resyncs SLES changes

- Enable TLS support and add BuildRequires libopenssl-devel (bsc#1181830)
- Make tests run by adding BuildRequires tcl and procps

OBS-URL: https://build.opensuse.org/request/show/872712
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=162
2021-02-16 15:30:52 +00:00
Martin Pluskal
7e6755b7bc Accepting request 862707 from home:stroeder:branches:server:database
- HTTPS download link for source
- redis 6.0.10

OBS-URL: https://build.opensuse.org/request/show/862707
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=160
2021-01-13 06:23:01 +00:00
ae648284a9 Accepting request 844547 from home:AndreasStieger:branches:server:database
redis 6.0.9

OBS-URL: https://build.opensuse.org/request/show/844547
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=158
2020-10-28 13:13:44 +00:00
Martin Pluskal
b9069d4452 Accepting request 833670 from home:AndreasStieger:branches:server:database
redis 6.0.8

OBS-URL: https://build.opensuse.org/request/show/833670
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=154
2020-09-11 09:12:35 +00:00
Lars Vogdt
035521204a Accepting request 822886 from home:AndreasStieger:branches:server:database
redis 6.0.6

OBS-URL: https://build.opensuse.org/request/show/822886
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=152
2020-07-27 19:38:03 +00:00
Lars Vogdt
2c45f34107 Accepting request 813274 from home:AndreasStieger:branches:server:database
redis 6.0.5

OBS-URL: https://build.opensuse.org/request/show/813274
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=150
2020-06-10 18:15:04 +00:00
Lars Vogdt
544071eb8f Accepting request 810027 from home:AndreasStieger:branches:server:database
redis 6.0.4

OBS-URL: https://build.opensuse.org/request/show/810027
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=148
2020-05-28 22:43:04 +00:00
Martin Pluskal
9ed0b9567c Accepting request 806158 from home:AndreasStieger:branches:server:database
redis 6.0.3

OBS-URL: https://build.opensuse.org/request/show/806158
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=147
2020-05-17 12:52:53 +00:00
Martin Pluskal
b8dd4fac98 Accepting request 802246 from home:Andreas_Schwab:Factory
- redis-disable_integration_logging.patch: remove
- redis-enable-bactrace-on-x86-ia64-and_arm32_only.patch: remove
- getMcontextEip-return-value.patch: Add missing return value

OBS-URL: https://build.opensuse.org/request/show/802246
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=145
2020-05-11 05:21:40 +00:00
Martin Pluskal
f1b7afa805 Accepting request 800054 from home:darix:apps
- add BR pkgconfig(libsystemd) for the rewritten systemd support
  and force building with it

- Update to 6.0.1
  * https://raw.githubusercontent.com/antirez/redis/6.0.1/00-RELEASENOTES
  * XCLAIM AOF/replicas propagation fixed.
  * Client side caching: new NOLOOP option to avoid getting
    notified about changes performed by ourselves.
  * ACL GENPASS now uses HMAC-SHA256 and have an optional
    "bits" argument.  It means you can use it as a general purpose
    "secure random strings" primitive!
  * Cluster "SLOTS" subcommand memory optimization.
  * The LCS command is now a subcommand of STRALGO.
  * Meaningful offset for replicas as well. More successful
    partial resynchronizations.
  * Optimize memory usage of deferred replies.
  * Faster CRC64 algorithm for faster RDB loading.
  * XINFO STREAM FULL, a new subcommand to get the whole stream
    state.
  * CLIENT KILL USER <username>.
  * MIGRATE AUTH2 option, for ACL style authentication support.
  * Other random bugfixes.

OBS-URL: https://build.opensuse.org/request/show/800054
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=143
2020-05-04 14:42:41 +00:00
Martin Pluskal
d9278ffdf6 Accepting request 799525 from home:Andreas_Schwab:Factory
- ppc-atomic.patch: use libatomic also on ppc

OBS-URL: https://build.opensuse.org/request/show/799525
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=141
2020-05-02 07:44:32 +00:00
Martin Pluskal
c5b6f52ad7 Accepting request 799414 from home:AndreasStieger:branches:server:database
- add hash file from redis-hashes and verify it during build

OBS-URL: https://build.opensuse.org/request/show/799414
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=140
2020-05-01 08:17:12 +00:00
Martin Pluskal
c8e611d2d5 Accepting request 795322 from home:AndreasStieger:branches:server:database
redis 5.0.9

OBS-URL: https://build.opensuse.org/request/show/795322
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=138
2020-04-18 08:40:15 +00:00
Martin Pluskal
13bd5ed972 Accepting request 787910 from home:kukuk:branches:server:database
- Use the tmpfiles macros instead of calling systemd-tempfiles
  direct and build wrong macro paths.

OBS-URL: https://build.opensuse.org/request/show/787910
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=136
2020-03-25 07:11:31 +00:00
Martin Pluskal
f57cc26716 Accepting request 786036 from home:13ilya:branches:server:database
- Refresh spec-file with spec-cleaner and manual optimizations
  * Remove Group tag.
  * Replace make by %make_build macros.
- Update to 5.0.8
  * https://raw.githubusercontent.com/antirez/redis/5.0.8/00-RELEASENOTES
  * Fix Pi building needing -latomic, backport.
  * Fix impl of aof-child whitelist SIGUSR1 feature.
  * Fix ThreadSafeContext lock/unlock function names.
  * XREADGROUP should propagate XCALIM/SETID in MULTI/EXEC.
  * Fix client flags to be int64 in module.c.
  * Fix small bugs related to replica and monitor ambiguity.
  * Fix lua related memory leak.
  * Simplify #6379 changes.
  * Free allocated sds in pfdebugCommand() to avoid memory leak.
  * Jump to right label on AOF parsing error.
  * Free fakeclient argv on AOF error.
  * Fix potential memory leak of rioWriteBulkStreamID().
  * Fix potential memory leak of clusterLoadConfig().
  * Fix bug on KEYS command where pattern starts with * followed by \x00.
  * Blocking XREAD[GROUP] should always reply with valid data.
  * XCLAIM: Create the consumer only on successful claims.
  * Stream: Handle streamID-related edge cases.
  * Fix ip and missing mode in RM_GetClusterNodeInfo().
  * Inline protocol: handle empty strings well.
  * Mark extern definition of SDS_NOINIT in sds.h.
  * Fix revisit CVE-2015-8080 vulnerability.
  * Avoid sentinel changes promoted_slave to be its own replica.

OBS-URL: https://build.opensuse.org/request/show/786036
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=135
2020-03-18 06:14:14 +00:00