summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-extended/redis
Commit message (Collapse)AuthorAgeFilesLines
* redis: upgrade 7.0.12 -> 7.0.13Polampalli, Archana2023-09-2310-1/+1
| | | | | | | | | | | | | | | | | | | | | This release has only security and bug fixes. ChangeLog: https://github.com/redis/redis/releases/tag/7.0.13 Security Fixes: https://nvd.nist.gov/vuln/detail/CVE-2023-41053 $ git log --oneline 7.0.12..7.0.13 49dbedb1d (tag: 7.0.13, origin/7.0) Redis 7.0.13 0f14d3279 Fix sort_ro get-keys function return wrong key number (#12522) 4d67bb6af do not call handleClientsBlockedOnKeys inside yielding command (#12459) 37599fe75 Ensure that the function load timeout is disabled during loading from RDB/AOF and on replicas. (#12451) ea1bc6f62 Process loss of slot ownership in cluster bus (#12344) 646069a90 Skip test for sdsRemoveFreeSpace when mem_allocator is not jemalloc (#11878) Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster@mvista.com>
* redis: upgrade 7.0.11 -> 7.0.12Polampalli, Archana2023-08-0310-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | This release has only security and bug fixes. ChangeLog: https://github.com/redis/redis/releases/tag/7.0.12 Security Fixes: https://nvd.nist.gov/vuln/detail/CVE-2023-36824 https://nvd.nist.gov/vuln/detail/CVE-2022-24834 $ git log --oneline 7.0.11..7.0.12 8e73f9d34 (tag: 7.0.12, origin/7.0) Redis 7.0.12 f90ecfb1f Fix compile errors when building with gcc-12 or clang (partial #12035) bd1dac0c6 Fix possible crash in command getkeys (#12380) 25f610fc2 Use Reservoir Sampling for random sampling of dict, and fix hang during fork (#12276) eb64a97d3 Add missing return on -UNKILLABLE sent by master case (#12277) 2ba8de9d5 Fix WAIT for clients being blocked in a module command (#12220) 1d2839a83 Fix memory leak when RM_Call's RUN_AS_USER fails (#12158) c340fd5a3 Prevent repetitive backlog trimming (#12155) 88682ca30 Free backlog only if rsi is invalid when master reboot (#12088) f6a7c9f9e Lua cjson and cmsgpack integer overflow issues (CVE-2022-24834) Signed-off-by: Archana Polampalli <archana.polampalli@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: use the files path correctlyChen Qi2023-06-1510-2/+0
| | | | | | | | | | | | | | | | | | | | | Recipes are not expected to set FILESPATH directly, they are expected to use FILESEXTRAPATH. I can see the seting of FILESPATH in this recipe only wants to find redis-7 specific patches and files. This could be easily achieved by using redis-7.0.11/ directory to hold all those files. Using FILESPATH in this way removes the possibility of overriding some files (e.g., the redis service file) from other layers via FILESEXTRAPATH:prepend, which is kind of a common practice and is actually working for basically all other recipes. This is because we have: meta/classes-global/base.bbclass:FILESPATH = "${@base_set_filespath(["${FILE_DIRNAME}/${BP}", "${FILE_DIRNAME}/${BPN}", "${FILE_DIRNAME}/files"], d)}" And FILESEXTRAPATH is handled in base_set_filespath. Signed-off-by: Chen Qi <Qi.Chen@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: fix do_patch fuzz warningChangqing Li2023-05-062-2/+2
| | | | | | | | | | | | | | Fix: WARNING: lib32-redis-7.0.4-r0 do_patch: Fuzz detected: Applying patch GNU_SOURCE.patch patching file src/zmalloc.c Hunk #1 succeeded at 32 with fuzz 2 (offset 4 lines). There are two version of redis, and need different GNU_SOURCE.patch Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0.10 -> 7.0.11Changqing Li2023-04-281-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0.9 -> 7.0.10Changqing Li2023-04-281-1/+1
| | | | | | | | | | | | | | | | | | | Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: * (CVE-2023-28425) Specially crafted MSETNX command can lead to assertion and denial-of-service Bug Fixes ========= * Large blocks of replica client output buffer may lead to psync loops and unnecessary memory usage (#11666) * Fix CLIENT REPLY OFF|SKIP to not silence push notifications (#11875) * Trim excessive memory usage in stream nodes when exceeding `stream-node-max-bytes` (#11885) * Fix module RM_Call commands failing with OOM when maxmemory is changed to zero (#11319) Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 6.2.11 -> 6.2.12Changqing Li2023-04-281-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 6.2.8 -> 6.2.11Changqing Li2023-03-131-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0.7 -> 7.0.9Changqing Li2023-03-071-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: 7.0.5 -> 7.0.7Changqing Li2023-01-252-10/+12
| | | | | | | | | This upgrade include fix for CVE-2022-3647 Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit d869383b0f9848a07ab3d7fbb5b7f687dce7744a) Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0.4 to 7.0.5Changqing Li2023-01-251-1/+1
| | | | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit c8d9407eec21e1eb3e34b66cac8d11fe13c6e63e) Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: 6.2.7 -> 6.2.8Changqing Li2023-01-252-7/+10
| | | | | | | This upgrade include fix for CVE-2022-3647 Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: build with USE_SYSTEMD=yes when systemd is enabledZheng Qiu2022-11-192-2/+7
| | | | | | | | | | | | | Compile redis with full systemd support when the chosen init system is systemd. Enabling systemd supervision allows redis to communicate the actual server status (i.e. "Loading dataset", "Waiting for master<->replica sync") to systemd, instead of declaring readiness right after initializing the server process. Signed-off-by: Zheng Qiu <zheng.qiu@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0.2 -> 7.0.4wangmy2022-07-261-1/+1
| | | | | | | | | | | | | | | | | Changelog: ========== Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: ---------------- (CVE-2022-31144) A specially crafted XAUTOCLAIM command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. The problem affects Redis versions 7.0.0 or newer. Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit d9f8d015a45188c3cf2d6841ea05319032930dbc) Signed-off-by: Armin Kuster <akuster808@gmail.com>
* redis: upgrade 7.0-rc3 -> 7.0.2Changqing Li2022-07-181-1/+1
| | | | | | | | This upgrade include CVE fix: CVE-2022-24735 CVE-2022-24736 Signed-off-by: Changqing Li <changqing.li@windriver.com>
* redis: upgrade 6.2.6 -> 6.2.7Changqing Li2022-07-182-7/+9
| | | | | | | | This upgrade include CVE fix: CVE-2022-24735 CVE-2022-24736 Signed-off-by: Changqing Li <changqing.li@windriver.com>
* redis: upgrade to 7.0-rc3Oleksandr Kravchuk2022-04-131-1/+1
| | | | | Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: remove fuzz warningMingli Yu2022-03-091-4/+14
| | | | | | | | | | | | Fixes: WARNING: lib32-redis-7.0-rc1-r0 do_patch: Fuzz detected: Applying patch GNU_SOURCE.patch patching file src/zmalloc.c Hunk #1 succeeded at 32 with fuzz 2 (offset 4 lines). Signed-off-by: Mingli Yu <mingli.yu@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: add recipe for 7.0-rc1Oleksandr Kravchuk2022-02-0310-0/+1702
| | | | | | | | | Redis 7.0 "includes changes that potentially break backwards compatibility with older versions", so let's let folks some time to test 7.0 and later decide which version(s) we want to keep. Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.5 -> 6.2.6wangmy2021-10-141-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: (CVE-2021-41099) Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value [reported by yiyuaner]. (CVE-2021-32762) Integer to heap buffer overflow issue in redis-cli and redis-sentinel parsing large multi-bulk replies on some older and less common platforms [reported by Microsoft Vulnerability Research]. (CVE-2021-32687) Integer to heap buffer overflow with intsets, when set-max-intset-entries is manually configured to a non-default, very large value [reported by Pawel Wieczorkiewicz, AWS]. (CVE-2021-32675) Denial Of Service when processing RESP request payloads with a large number of elements on many connections. (CVE-2021-32672) Random heap reading issue with Lua Debugger [reported by Meir Shpilraien]. (CVE-2021-32628) Integer to heap buffer overflow handling ziplist-encoded data types, when configuring a large, non-default value for hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value [reported by sundb]. (CVE-2021-32627) Integer to heap buffer overflow issue with streams, when configuring a non-default, large value for proto-max-bulk-len and client-query-buffer-limit [reported by sundb]. (CVE-2021-32626) Specially crafted Lua scripts may result with Heap buffer overflow [reported by Meir Shpilraien]. Bug fixes that involve behavior changes: GEO* STORE with empty source key deletes the destination key and return 0 (#9271) Previously it would have returned an empty array like the non-STORE variant. PUBSUB NUMPAT replies with number of patterns rather than number of subscriptions (#9209) This actually changed in 6.2.0 but was overlooked and omitted from the release notes. Bug fixes that are only applicable to previous releases of Redis 6.2: Fix CLIENT PAUSE, used an old timeout from previous PAUSE (#9477) Fix CLIENT PAUSE in a replica would mess the replication offset (#9448) Add some missing error statistics in INFO errorstats (#9328) Other bug fixes: Fix incorrect reply of COMMAND command key positions for MIGRATE command (#9455) Fix appendfsync to always guarantee fsync before reply, on MacOS and FreeBSD (kqueue) (#9416) Fix the wrong mis-detection of sync_file_range system call, affecting performance (#9371) CLI tools: When redis-cli received ASK response, it didn't handle it (#8930) Improvements: Add latency monitor sample when key is deleted via lazy expire (#9317) Sanitize corrupt payload improvements (#9321, #9399) Delete empty keys when loading RDB file or handling a RESTORE command (#9297, #9349) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: advance to version 6.2.5Joe Slater2021-09-091-1/+1
| | | | | | | Pull in fix for CVE-2021-32761. Signed-off-by: Joe Slater <joe.slater@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* Convert to new override syntaxMartin Jansa2021-08-031-10/+10
| | | | | | | | | | This is the result of automated script (0.9.1) conversion: oe-core/scripts/contrib/convert-overrides.py . converting the metadata to use ":" as the override character instead of "_". Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* redis: upgrade to 6.2.4Tony Tascioglu2021-06-301-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Upstream changelog: Upgrade urgency: SECURITY, Contains fixes to security issues that affect authenticated client connections. MODERATE otherwise. Fix integer overflow in STRALGO LCS (CVE-2021-32625) An integer overflow bug in Redis version 6.0 or newer can be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. Bug fixes that are only applicable to previous releases of Redis 6.2: Fix crash after a diskless replication fork child is terminated (#8991) Fix redis-benchmark crash on unsupported configs (#8916) Other bug fixes: Fix crash in UNLINK on a stream key with deleted consumer groups (#8932) SINTERSTORE: Add missing keyspace del event when none of the sources exist (#8949) Sentinel: Fix CONFIG SET of empty string sentinel-user/sentinel-pass configs (#8958) Enforce client output buffer soft limit when no traffic (#8833) Improvements: Hide AUTH passwords in MIGRATE command from slowlog (#8859) Signed-off-by: Tony Tascioglu <tony.tascioglu@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.2 -> 6.2.3Andreas Müller2021-05-222-7/+5
| | | | | Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.1 -> 6.2.2zangrc2021-04-231-1/+1
| | | | | Signed-off-by: Zang Ruochen <zangrc.fnst@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.0.9 -> 6.2.1Yi Fan Yu2021-04-135-76/+62
| | | | | | | | | | Refresh 3 patches. Removed Patch: ilp32.patch fixed by upstream 0719388cfb1a79160204314beb1de1f9c29a3684 Signed-off-by: Yi Fan Yu <yifan.yu@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Update to 6.0.9Khem Raj2020-12-141-3/+1
| | | | Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Fix build on 32bit targets and clangKhem Raj2020-11-022-0/+30
| | | | Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Fix build with clang on riscv32Khem Raj2020-10-272-0/+49
| | | | | | | | | clang defines __ILP32__ for rv32 but gcc does not as a result backtracing gets enabled when using clang but not when using gcc so clang build exposes a porting error. Therefore add code to return correct mcontext on rv32 Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.0.7 -> 6.0.8Zang Ruochen2020-09-171-2/+2
| | | | | Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.0.6 -> 6.0.7Zang Ruochen2020-09-101-2/+2
| | | | | Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.0.5 -> 6.0.6Zang Ruochen2020-08-071-3/+3
| | | | | | | -License-Update: Copyright year updated to 2020. Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.0.4 -> 6.0.5Zang Ruochen2020-06-301-2/+2
| | | | | Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 5.0.9 -> 6.0.4Andreas Müller2020-06-192-10/+15
| | | | | Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 5.0.8 -> 5.0.9Wang Mingyu2020-04-251-2/+2
| | | | | Signed-off-by: Wang Mingyu <wangmy@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 5.0.7 -> 5.0.8Zang Ruochen2020-03-173-32/+4
| | | | | | | | | | | -Refresh the following patch: 0001-src-Do-not-reset-FINAL_LIBS.patch -0005-Mark-extern-definition-of-SDS_NOINIT-in-sds.h.patch Removed since this is included in 5.0.8 Signed-off-by: Zang Ruochen <zangrc.fnst@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade to 5.0.7Khem Raj2019-12-235-128/+58
| | | | | | | | Remove an upstreamed patch Add patches to build with new glibc/gcc Drop atomic removal patch and link with libatomic when needed Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Clarify BSD license variantChristophe PRIOUZEAU2019-10-251-1/+1
| | | | | | | The License of redis is BSD-3-Clause. Signed-off-by: Christophe Priouzeau <christophe.priouzeau@st.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Fix build with clang/x86Khem Raj2019-09-102-1/+36
| | | | | | | | | Need to link with libatomics for 64bit atomics support Fixes i686-yoe-linux/i686-yoe-linux-ld: networking.o: in function `createClient': | /usr/src/debug/redis/4.0.14-r0/redis-4.0.14/src/networking.c:103: undefined reference to `__atomic_fetch_add_8' Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: backport a fix for stack trace generation on aarch64Martin Jansa2019-08-122-0/+46
| | | | | Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade to 4.0.14Khem Raj2019-04-141-4/+4
| | | | | | | Add needed depends Do not build jemalloc Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Fix ocasional parallel build failureKhem Raj2019-04-071-0/+4
| | | | | | | | | | | Sometimes with high parallel build we see compile errors e.g. clang-8: error: linker command failed with exit code 1 (use -v to see invocation) make[3]: *** [Makefile:52: lua] Error 1 Therefore try to build dependencies before main build Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Update to 4.0.12Khem Raj2018-12-231-2/+3
| | | | | | Exclude atomics on ppc as well Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: fix build for qemuarm disabling atomicsAndrea Adami2018-10-251-0/+1
| | | | | | | | | | | | Apply the same patch used for mips. Fix |ld: networking.o: in function `createClient': | /usr/src/debug/redis/4.0.8-r0/redis-4.0.8/src/networking.c:93: undefined reference to `__atomic_fetch_add_8' Signed-off-by: Andrea Adami <andrea.adami@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Update to 4.0.8Alistair Francis2018-05-296-138/+956
| | | | | | | | Update redis to the latest 4.0.8 release. This also involves updating the redis.conf while maintaining some OE specific config options. Signed-off-by: Alistair Francis <alistair.francis@wdc.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: increase the max number of fds to actually match redis.confFrank Meerkoetter2016-12-091-0/+1
| | | | | | | | | | Now that the processes no longer runs as root, we need to increase the limit for it. This only affects systemd based systems. Signed-off-by: Frank Meerkoetter <frank@meerkoetter.org> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* redis: do not run as rootFrank Meerkoetter2016-12-092-3/+9
| | | | | | | | | | | | | | | Running a network facing daemon written in C as root is not a good idea. Introduce a redis system user/group for that. A drawback is that now redis can no longer increase the number of open fds to 10000 (MaxClients). If this is needed the ulimit needs to be tweaked in the init script or systemd unit file. This only affects systemd based systems. Signed-off-by: Frank Meerkoetter <frank@meerkoetter.org> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* redis: log to syslogFrank Meerkoetter2016-12-091-3/+3
| | | | | | | | | | | Creating /var/log/redis.log requires root permissions to create the file. Use syslog instead so redis does not require root. This affects both sysv and systemd based systems. Signed-off-by: Frank Meerkoetter <frank@meerkoetter.org> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* redis: do not expose the service to the network by defaultFrank Meerkoetter2016-12-091-1/+1
| | | | | | | | Binding it to localhost is a safe default. This affects both sysv and systemd based systems. Signed-off-by: Frank Meerkoetter <frank@meerkoetter.org> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* redis: add a systemd service fileFrank Meerkoetter2016-12-092-1/+28
| | | | | | | | | The redis.conf is changed on the fly to not daemonize redis. The reason for that is that with this appraoch we don't need special permissions to write to /var/run/. Signed-off-by: Frank Meerkoetter <frank@meerkoetter.org> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>