2013-04-04 14:30:05 +02:00
|
|
|
# Redis configuration for testing.
|
2010-05-14 17:31:11 +02:00
|
|
|
|
2016-12-19 16:49:58 +01:00
|
|
|
always-show-logo yes
|
2013-01-25 17:34:52 +01:00
|
|
|
notify-keyspace-events KEA
|
2010-05-14 17:31:11 +02:00
|
|
|
daemonize no
|
2011-01-09 16:49:52 +01:00
|
|
|
pidfile /var/run/redis.pid
|
2010-05-14 17:31:11 +02:00
|
|
|
port 6379
|
2013-02-05 12:02:36 +01:00
|
|
|
timeout 0
|
2012-12-10 18:21:10 +01:00
|
|
|
bind 127.0.0.1
|
2010-05-14 17:31:11 +02:00
|
|
|
loglevel verbose
|
2013-05-15 10:14:36 +02:00
|
|
|
logfile ''
|
2010-05-14 17:31:11 +02:00
|
|
|
databases 16
|
2014-07-10 15:04:34 +02:00
|
|
|
latency-monitor-threshold 1
|
2010-05-14 17:31:11 +02:00
|
|
|
|
|
|
|
save 900 1
|
|
|
|
save 300 10
|
|
|
|
save 60 10000
|
|
|
|
|
|
|
|
rdbcompression yes
|
|
|
|
dbfilename dump.rdb
|
2011-01-09 16:49:52 +01:00
|
|
|
dir ./
|
2010-05-14 17:31:11 +02:00
|
|
|
|
2011-01-09 16:49:52 +01:00
|
|
|
slave-serve-stale-data yes
|
2010-05-14 17:31:11 +02:00
|
|
|
appendonly no
|
|
|
|
appendfsync everysec
|
2011-01-09 16:49:52 +01:00
|
|
|
no-appendfsync-on-rewrite no
|
2010-05-14 17:31:11 +02:00
|
|
|
activerehashing yes
|
Protected configs and sensitive commands (#9920)
Block sensitive configs and commands by default.
* `enable-protected-configs` - block modification of configs with the new `PROTECTED_CONFIG` flag.
Currently we add this flag to `dbfilename`, and `dir` configs,
all of which are non-mutable configs that can set a file redis will write to.
* `enable-debug-command` - block the `DEBUG` command
* `enable-module-command` - block the `MODULE` command
These have a default value set to `no`, so that these features are not
exposed by default to client connections, and can only be set by modifying the config file.
Users can change each of these to either `yes` (allow all access), or `local` (allow access from
local TCP connections and unix domain connections)
Note that this is a **breaking change** (specifically the part about MODULE command being disabled by default).
I.e. we don't consider DEBUG command being blocked as an issue (people shouldn't have been using it),
and the few configs we protected are unlikely to have been set at runtime anyway.
On the other hand, it's likely to assume some users who use modules, load them from the config file anyway.
Note that's the whole point of this PR, for redis to be more secure by default and reduce the attack surface on
innocent users, so secure defaults will necessarily mean a breaking change.
2021-12-19 10:46:16 +02:00
|
|
|
|
|
|
|
enable-protected-configs yes
|
|
|
|
enable-debug-command yes
|
|
|
|
enable-module-command yes
|