SHA256
1
0
forked from pool/redis
Go to file
Martin Pluskal f1b7afa805 Accepting request 800054 from home:darix:apps
- add BR pkgconfig(libsystemd) for the rewritten systemd support
  and force building with it

- Update to 6.0.1
  * https://raw.githubusercontent.com/antirez/redis/6.0.1/00-RELEASENOTES
  * XCLAIM AOF/replicas propagation fixed.
  * Client side caching: new NOLOOP option to avoid getting
    notified about changes performed by ourselves.
  * ACL GENPASS now uses HMAC-SHA256 and have an optional
    "bits" argument.  It means you can use it as a general purpose
    "secure random strings" primitive!
  * Cluster "SLOTS" subcommand memory optimization.
  * The LCS command is now a subcommand of STRALGO.
  * Meaningful offset for replicas as well. More successful
    partial resynchronizations.
  * Optimize memory usage of deferred replies.
  * Faster CRC64 algorithm for faster RDB loading.
  * XINFO STREAM FULL, a new subcommand to get the whole stream
    state.
  * CLIENT KILL USER <username>.
  * MIGRATE AUTH2 option, for ACL style authentication support.
  * Other random bugfixes.

OBS-URL: https://build.opensuse.org/request/show/800054
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=143
2020-05-04 14:42:41 +00:00
.gitattributes osc copypac from project:server:database package:regis revision:2 2010-02-24 22:49:48 +00:00
.gitignore osc copypac from project:server:database package:regis revision:2 2010-02-24 22:49:48 +00:00
ppc-atomic.patch Accepting request 799525 from home:Andreas_Schwab:Factory 2020-05-02 07:44:32 +00:00
README.SUSE Accepting request 633784 from home:darix:apps 2018-09-06 19:15:00 +00:00
redis-6.0.1.tar.gz Accepting request 800054 from home:darix:apps 2020-05-04 14:42:41 +00:00
redis-conf.patch - update to 5.0.5 2019-06-06 20:59:06 +00:00
redis-disable_integration_logging.patch Accepting request 597685 from home:Guillaume_G:branches:openSUSE:Factory:ARM 2018-04-18 07:10:52 +00:00
redis-enable-bactrace-on-x86-ia64-and_arm32_only.patch - update to 5.0.5 2019-06-06 20:59:06 +00:00
redis-sentinel.target Accepting request 633784 from home:darix:apps 2018-09-06 19:15:00 +00:00
redis-sentinel@.service Accepting request 772349 from home:darix:apps 2020-02-08 21:38:07 +00:00
redis-user.conf Accepting request 760070 from home:kukuk:ei-demo 2019-12-31 08:22:02 +00:00
redis.changes Accepting request 800054 from home:darix:apps 2020-05-04 14:42:41 +00:00
redis.hashes Accepting request 800054 from home:darix:apps 2020-05-04 14:42:41 +00:00
redis.logrotate Accepting request 180755 from home:vjt:ifad 2013-07-01 08:22:41 +00:00
redis.spec Accepting request 800054 from home:darix:apps 2020-05-04 14:42:41 +00:00
redis.sysctl Accepting request 505518 from home:computersalat:devel:database 2017-06-23 11:36:02 +00:00
redis.target Accepting request 294021 from home:darix:apps 2015-04-01 16:53:07 +00:00
redis.tmpfiles.d Accepting request 294021 from home:darix:apps 2015-04-01 16:53:07 +00:00
redis@.service Accepting request 772349 from home:darix:apps 2020-02-08 21:38:07 +00:00
reproducible.patch Accepting request 752707 from home:13ilya 2019-12-02 09:15:27 +00:00

 README.SUSE
-------------

 Redis Server
==============

1. cp -a /etc/redis/default.conf.example /etc/redis/instancename.conf

We use the "cp -a" here, so that our permissions are preserved.
In case you copied the file with out the "-a"

chown root:redis  /etc/redis/instancename.conf
chmod u=rw,g=r,o= /etc/redis/instancename.conf

2. change at least pidfile, logfile and dir setting
# the pid file *has* to match your config filename without the ".conf"

pidfile /var/run/redis/instancename.pid
logfile /var/log/redis/instancename.log
dir /var/lib/redis/instancename/

If you want to run more than one instance you also have to change the
socket path and/or the ip:port combination.
 e.g. /var/run/redis/instancename.sock

Also make sure if you copy configurations from somewhere, that "daemonize"
should be set to "no".

3. create the database dir:
$ install -d -o redis -g redis -m 0750 /var/lib/redis/instancename/

4. systemctl start redis@instancename
5. systemctl enable redis@instancename

6. To stop/restart all instances at the same time use:

systemctl restart redis.target
systemctl stop redis.target

 Redis Sentinel
================

1. cp -a /etc/redis/sentinel.conf.example /etc/redis/sentinel-instancename.conf

We use the "cp -a" here, so that our permissions are preserved.
In case you copied the file with out the "-a"

chown root:redis  /etc/redis/sentinel-instancename.conf
chmod u=rw,g=rw,o= /etc/redis/sentinel-instancename.conf

Please note that the sentinel config needs write permissions for the group.
The chmod line differs from the line for the normal redis server.

2. change at least pidfile, logfile setting
# the pid file *has* to match your config filename without the ".conf"

pidfile /var/run/redis/instancename.pid
logfile /var/log/redis/instancename.log

If you want to run more than one instance you also have to change the
socket path and/or the ip:port combination.
 e.g. /var/run/redis/instancename.sock

Also make sure if you copy configurations from somewhere, that "daemonize"
should be set to "no".

4. systemctl start redis-sentinel@instancename
5. systemctl enable redis-sentinel@instancename

6. To stop/restart all instances at the same time use:

systemctl restart redis-sentinel.target
systemctl stop redis-sentinel.target

 Integration with apache when using unix domain sockets
=========================================================

If you plan to use redis in combination with apache, then you should
add 'redis' to apache group and set 'unixsocketperm 770':
$ usermod -a -G redis wwwrun
$ systemctl restart apache2
then apache is able to connect to redis socket