2011-12-19 04:21:50 -05:00
|
|
|
start_server {tags {"introspection"}} {
|
2022-01-23 03:05:06 -05:00
|
|
|
test "PING" {
|
|
|
|
assert_equal {PONG} [r ping]
|
|
|
|
assert_equal {redis} [r ping redis]
|
|
|
|
assert_error {*wrong number of arguments for 'ping' command} {r ping hello redis}
|
|
|
|
}
|
|
|
|
|
2011-12-19 04:21:50 -05:00
|
|
|
test {CLIENT LIST} {
|
|
|
|
r client list
|
2022-01-23 03:05:06 -05:00
|
|
|
} {id=* addr=*:* laddr=*:* fd=* name=* age=* idle=* flags=N db=* sub=0 psub=0 multi=-1 qbuf=26 qbuf-free=* argv-mem=* multi-mem=0 obl=0 oll=0 omem=0 tot-mem=* events=r cmd=client|list user=* redir=-1 resp=2*}
|
2020-12-07 07:24:05 -05:00
|
|
|
|
|
|
|
test {CLIENT LIST with IDs} {
|
|
|
|
set myid [r client id]
|
|
|
|
set cl [split [r client list id $myid] "\r\n"]
|
2022-01-23 03:05:06 -05:00
|
|
|
assert_match "id=$myid * cmd=client|list *" [lindex $cl 0]
|
2020-12-07 07:24:05 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
test {CLIENT INFO} {
|
|
|
|
r client info
|
2022-01-23 03:05:06 -05:00
|
|
|
} {id=* addr=*:* laddr=*:* fd=* name=* age=* idle=* flags=N db=* sub=0 psub=0 multi=-1 qbuf=26 qbuf-free=* argv-mem=* multi-mem=0 obl=0 oll=0 omem=0 tot-mem=* events=r cmd=client|info user=* redir=-1 resp=2*}
|
2012-04-07 05:26:24 -04:00
|
|
|
|
2021-11-29 16:35:36 -05:00
|
|
|
test {CLIENT KILL with illegal arguments} {
|
2022-01-23 03:05:06 -05:00
|
|
|
assert_error "ERR wrong number of arguments for 'client|kill' command" {r client kill}
|
2021-11-29 16:35:36 -05:00
|
|
|
assert_error "ERR syntax error*" {r client kill id 10 wrong_arg}
|
|
|
|
|
|
|
|
assert_error "ERR*greater than 0*" {r client kill id str}
|
|
|
|
assert_error "ERR*greater than 0*" {r client kill id -1}
|
|
|
|
assert_error "ERR*greater than 0*" {r client kill id 0}
|
|
|
|
|
|
|
|
assert_error "ERR Unknown client type*" {r client kill type wrong_type}
|
|
|
|
|
|
|
|
assert_error "ERR No such user*" {r client kill user wrong_user}
|
|
|
|
|
|
|
|
assert_error "ERR syntax error*" {r client kill skipme yes_or_no}
|
|
|
|
}
|
|
|
|
|
|
|
|
test {CLIENT KILL SKIPME YES/NO will kill all clients} {
|
|
|
|
# Kill all clients except `me`
|
|
|
|
set rd1 [redis_deferring_client]
|
|
|
|
set rd2 [redis_deferring_client]
|
|
|
|
set connected_clients [s connected_clients]
|
|
|
|
assert {$connected_clients >= 3}
|
|
|
|
set res [r client kill skipme yes]
|
|
|
|
assert {$res == $connected_clients - 1}
|
|
|
|
|
|
|
|
# Kill all clients, including `me`
|
|
|
|
set rd3 [redis_deferring_client]
|
|
|
|
set rd4 [redis_deferring_client]
|
|
|
|
set connected_clients [s connected_clients]
|
|
|
|
assert {$connected_clients == 3}
|
|
|
|
set res [r client kill skipme no]
|
|
|
|
assert_equal $res $connected_clients
|
|
|
|
|
|
|
|
# After killing `me`, the first ping will throw an error
|
|
|
|
assert_error "*I/O error*" {r ping}
|
|
|
|
assert_equal "PONG" [r ping]
|
|
|
|
}
|
|
|
|
|
2012-04-07 05:26:24 -04:00
|
|
|
test {MONITOR can log executed commands} {
|
|
|
|
set rd [redis_deferring_client]
|
|
|
|
$rd monitor
|
2015-08-12 01:56:17 -04:00
|
|
|
assert_match {*OK*} [$rd read]
|
2012-04-07 05:26:24 -04:00
|
|
|
r set foo bar
|
|
|
|
r get foo
|
2021-11-15 04:07:43 -05:00
|
|
|
set res [list [$rd read] [$rd read]]
|
|
|
|
$rd close
|
|
|
|
set _ $res
|
2015-08-12 01:56:17 -04:00
|
|
|
} {*"set" "foo"*"get" "foo"*}
|
2012-04-07 05:26:24 -04:00
|
|
|
|
|
|
|
test {MONITOR can log commands issued by the scripting engine} {
|
|
|
|
set rd [redis_deferring_client]
|
|
|
|
$rd monitor
|
|
|
|
$rd read ;# Discard the OK
|
2015-08-12 01:56:17 -04:00
|
|
|
r eval {redis.call('set',KEYS[1],ARGV[1])} 1 foo bar
|
2012-04-07 05:26:24 -04:00
|
|
|
assert_match {*eval*} [$rd read]
|
|
|
|
assert_match {*lua*"set"*"foo"*"bar"*} [$rd read]
|
2021-11-15 04:07:43 -05:00
|
|
|
$rd close
|
2012-04-07 05:26:24 -04:00
|
|
|
}
|
2013-01-14 04:19:20 -05:00
|
|
|
|
2021-05-19 11:23:54 -04:00
|
|
|
test {MONITOR supports redacting command arguments} {
|
|
|
|
set rd [redis_deferring_client]
|
|
|
|
$rd monitor
|
|
|
|
$rd read ; # Discard the OK
|
|
|
|
|
|
|
|
r migrate [srv 0 host] [srv 0 port] key 9 5000
|
|
|
|
r migrate [srv 0 host] [srv 0 port] key 9 5000 AUTH user
|
|
|
|
r migrate [srv 0 host] [srv 0 port] key 9 5000 AUTH2 user password
|
|
|
|
catch {r auth not-real} _
|
|
|
|
catch {r auth not-real not-a-password} _
|
|
|
|
catch {r hello 2 AUTH not-real not-a-password} _
|
|
|
|
|
|
|
|
assert_match {*"key"*"9"*"5000"*} [$rd read]
|
|
|
|
assert_match {*"key"*"9"*"5000"*"(redacted)"*} [$rd read]
|
|
|
|
assert_match {*"key"*"9"*"5000"*"(redacted)"*"(redacted)"*} [$rd read]
|
|
|
|
assert_match {*"auth"*"(redacted)"*} [$rd read]
|
|
|
|
assert_match {*"auth"*"(redacted)"*"(redacted)"*} [$rd read]
|
|
|
|
assert_match {*"hello"*"2"*"AUTH"*"(redacted)"*"(redacted)"*} [$rd read]
|
|
|
|
$rd close
|
2021-06-09 08:13:24 -04:00
|
|
|
} {0} {needs:repl}
|
2021-05-19 11:23:54 -04:00
|
|
|
|
|
|
|
test {MONITOR correctly handles multi-exec cases} {
|
|
|
|
set rd [redis_deferring_client]
|
|
|
|
$rd monitor
|
|
|
|
$rd read ; # Discard the OK
|
|
|
|
|
|
|
|
# Make sure multi-exec statements are ordered
|
|
|
|
# correctly
|
|
|
|
r multi
|
|
|
|
r set foo bar
|
|
|
|
r exec
|
|
|
|
assert_match {*"multi"*} [$rd read]
|
|
|
|
assert_match {*"set"*"foo"*"bar"*} [$rd read]
|
|
|
|
assert_match {*"exec"*} [$rd read]
|
|
|
|
|
|
|
|
# Make sure we close multi statements on errors
|
|
|
|
r multi
|
|
|
|
catch {r syntax error} _
|
|
|
|
catch {r exec} _
|
|
|
|
|
|
|
|
assert_match {*"multi"*} [$rd read]
|
|
|
|
assert_match {*"exec"*} [$rd read]
|
|
|
|
|
|
|
|
$rd close
|
|
|
|
}
|
|
|
|
|
2013-01-14 04:19:20 -05:00
|
|
|
test {CLIENT GETNAME should return NIL if name is not assigned} {
|
|
|
|
r client getname
|
|
|
|
} {}
|
|
|
|
|
|
|
|
test {CLIENT LIST shows empty fields for unassigned names} {
|
|
|
|
r client list
|
|
|
|
} {*name= *}
|
2014-07-31 14:39:49 -04:00
|
|
|
|
2013-01-14 04:19:20 -05:00
|
|
|
test {CLIENT SETNAME does not accept spaces} {
|
|
|
|
catch {r client setname "foo bar"} e
|
|
|
|
set e
|
|
|
|
} {ERR*}
|
|
|
|
|
|
|
|
test {CLIENT SETNAME can assign a name to this connection} {
|
|
|
|
assert_equal [r client setname myname] {OK}
|
|
|
|
r client list
|
|
|
|
} {*name=myname*}
|
|
|
|
|
|
|
|
test {CLIENT SETNAME can change the name of an existing connection} {
|
|
|
|
assert_equal [r client setname someothername] {OK}
|
|
|
|
r client list
|
|
|
|
} {*name=someothername*}
|
|
|
|
|
|
|
|
test {After CLIENT SETNAME, connection can still be closed} {
|
|
|
|
set rd [redis_deferring_client]
|
|
|
|
$rd client setname foobar
|
|
|
|
assert_equal [$rd read] "OK"
|
|
|
|
assert_match {*foobar*} [r client list]
|
|
|
|
$rd close
|
|
|
|
# Now the client should no longer be listed
|
2013-02-12 07:27:24 -05:00
|
|
|
wait_for_condition 50 100 {
|
|
|
|
[string match {*foobar*} [r client list]] == 0
|
|
|
|
} else {
|
|
|
|
fail "Client still listed in CLIENT LIST after SETNAME."
|
|
|
|
}
|
|
|
|
}
|
2019-11-28 04:24:57 -05:00
|
|
|
|
2020-09-09 08:12:57 -04:00
|
|
|
test {CONFIG save params special case handled properly} {
|
|
|
|
# No "save" keyword - defaults should apply
|
|
|
|
start_server {config "minimal.conf"} {
|
|
|
|
assert_match [r config get save] {save {3600 1 300 100 60 10000}}
|
|
|
|
}
|
|
|
|
|
|
|
|
# First "save" keyword overrides defaults
|
|
|
|
start_server {config "minimal.conf" overrides {save {100 100}}} {
|
|
|
|
# Defaults
|
|
|
|
assert_match [r config get save] {save {100 100}}
|
|
|
|
}
|
2021-06-09 08:13:24 -04:00
|
|
|
} {} {external:skip}
|
2020-09-09 08:12:57 -04:00
|
|
|
|
2019-11-28 04:24:57 -05:00
|
|
|
test {CONFIG sanity} {
|
|
|
|
# Do CONFIG GET, CONFIG SET and then CONFIG GET again
|
|
|
|
# Skip immutable configs, one with no get, and other complicated configs
|
|
|
|
set skip_configs {
|
|
|
|
rdbchecksum
|
|
|
|
daemonize
|
|
|
|
io-threads-do-reads
|
2019-12-26 06:59:58 -05:00
|
|
|
tcp-backlog
|
2019-11-28 04:24:57 -05:00
|
|
|
always-show-logo
|
|
|
|
syslog-enabled
|
|
|
|
cluster-enabled
|
|
|
|
aclfile
|
|
|
|
unixsocket
|
|
|
|
pidfile
|
|
|
|
syslog-ident
|
|
|
|
appendfilename
|
Implement Multi Part AOF mechanism to avoid AOFRW overheads. (#9788)
Implement Multi-Part AOF mechanism to avoid overheads during AOFRW.
Introducing a folder with multiple AOF files tracked by a manifest file.
The main issues with the the original AOFRW mechanism are:
* buffering of commands that are processed during rewrite (consuming a lot of RAM)
* freezes of the main process when the AOFRW completes to drain the remaining part of the buffer and fsync it.
* double disk IO for the data that arrives during AOFRW (had to be written to both the old and new AOF files)
The main modifications of this PR:
1. Remove the AOF rewrite buffer and related code.
2. Divide the AOF into multiple files, they are classified as two types, one is the the `BASE` type,
it represents the full amount of data (Maybe AOF or RDB format) after each AOFRW, there is only
one `BASE` file at most. The second is `INCR` type, may have more than one. They represent the
incremental commands since the last AOFRW.
3. Use a AOF manifest file to record and manage these AOF files mentioned above.
4. The original configuration of `appendfilename` will be the base part of the new file name, for example:
`appendonly.aof.1.base.rdb` and `appendonly.aof.2.incr.aof`
5. Add manifest-related TCL tests, and modified some existing tests that depend on the `appendfilename`
6. Remove the `aof_rewrite_buffer_length` field in info.
7. Add `aof-disable-auto-gc` configuration. By default we're automatically deleting HISTORY type AOFs.
It also gives users the opportunity to preserve the history AOFs. just for testing use now.
8. Add AOFRW limiting measure. When the AOFRW failures reaches the threshold (3 times now),
we will delay the execution of the next AOFRW by 1 minute. If the next AOFRW also fails, it will be
delayed by 2 minutes. The next is 4, 8, 16, the maximum delay is 60 minutes (1 hour). During the limit
period, we can still use the 'bgrewriteaof' command to execute AOFRW immediately.
9. Support upgrade (load) data from old version redis.
10. Add `appenddirname` configuration, as the directory name of the append only files. All AOF files and
manifest file will be placed in this directory.
11. Only the last AOF file (BASE or INCR) can be truncated. Otherwise redis will exit even if
`aof-load-truncated` is enabled.
Co-authored-by: Oran Agra <oran@redislabs.com>
2022-01-03 12:14:13 -05:00
|
|
|
appenddirname
|
2019-11-28 04:24:57 -05:00
|
|
|
supervised
|
|
|
|
syslog-facility
|
|
|
|
databases
|
2020-07-10 04:33:47 -04:00
|
|
|
io-threads
|
2019-11-28 04:24:57 -05:00
|
|
|
logfile
|
|
|
|
unixsocketperm
|
2021-08-21 22:43:18 -04:00
|
|
|
replicaof
|
2019-11-28 04:24:57 -05:00
|
|
|
slaveof
|
|
|
|
requirepass
|
Support setcpuaffinity on linux/bsd
Currently, there are several types of threads/child processes of a
redis server. Sometimes we need deeply optimise the performance of
redis, so we would like to isolate threads/processes.
There were some discussion about cpu affinity cases in the issue:
https://github.com/antirez/redis/issues/2863
So implement cpu affinity setting by redis.conf in this patch, then
we can config server_cpulist/bio_cpulist/aof_rewrite_cpulist/
bgsave_cpulist by cpu list.
Examples of cpulist in redis.conf:
server_cpulist 0-7:2 means cpu affinity 0,2,4,6
bio_cpulist 1,3 means cpu affinity 1,3
aof_rewrite_cpulist 8-11 means cpu affinity 8,9,10,11
bgsave_cpulist 1,10-11 means cpu affinity 1,10,11
Test on linux/freebsd, both work fine.
Signed-off-by: zhenwei pi <pizhenwei@bytedance.com>
2020-05-02 08:05:39 -04:00
|
|
|
server_cpulist
|
|
|
|
bio_cpulist
|
|
|
|
aof_rewrite_cpulist
|
|
|
|
bgsave_cpulist
|
Add 'set-proc-title' config so that this mechanism can be disabled (#3623)
if option `set-proc-title' is no, then do nothing for proc title.
The reason has been explained long ago, see following:
We update redis to 2.8.8, then found there are some side effect when
redis always change the process title.
We run several slave instance on one computer, and all these salves
listen on unix socket only, then ps will show:
1 S redis 18036 1 0 80 0 - 56130 ep_pol 14:02 ? 00:00:31 /usr/sbin/redis-server *:0
1 S redis 23949 1 0 80 0 - 11074 ep_pol 15:41 ? 00:00:00 /usr/sbin/redis-server *:0
for redis 2.6 the output of ps is like following:
1 S redis 18036 1 0 80 0 - 56130 ep_pol 14:02 ? 00:00:31 /usr/sbin/redis-server /etc/redis/a.conf
1 S redis 23949 1 0 80 0 - 11074 ep_pol 15:41 ? 00:00:00 /usr/sbin/redis-server /etc/redis/b.conf
Later is more informational in our case. The situation
is worse when we manage the config and process running
state by salt. Salt check the process by running "ps |
grep SIG" (for Gentoo System) to check the running
state, where SIG is the string to search for when
looking for the service process with ps. Previously, we
define sig as "/usr/sbin/redis-server
/etc/redis/a.conf". Since the ps output is identical for
our case, so we have no way to check the state of
specified redis instance.
So, for our case, we prefer the old behavior, i.e, do
not change the process title for the main redis process.
Or add an option such as "set-proc-title [yes|no]" to
control this behavior.
Co-authored-by: Yossi Gottlieb <yossigo@gmail.com>
Co-authored-by: Oran Agra <oran@redislabs.com>
2021-01-28 04:12:39 -05:00
|
|
|
set-proc-title
|
2021-10-08 01:32:40 -04:00
|
|
|
cluster-config-file
|
2021-10-19 01:28:27 -04:00
|
|
|
cluster-port
|
2021-12-02 11:18:18 -05:00
|
|
|
oom-score-adj
|
|
|
|
oom-score-adj-values
|
Protected configs and sensitive commands (#9920)
Block sensitive configs and commands by default.
* `enable-protected-configs` - block modification of configs with the new `PROTECTED_CONFIG` flag.
Currently we add this flag to `dbfilename`, and `dir` configs,
all of which are non-mutable configs that can set a file redis will write to.
* `enable-debug-command` - block the `DEBUG` command
* `enable-module-command` - block the `MODULE` command
These have a default value set to `no`, so that these features are not
exposed by default to client connections, and can only be set by modifying the config file.
Users can change each of these to either `yes` (allow all access), or `local` (allow access from
local TCP connections and unix domain connections)
Note that this is a **breaking change** (specifically the part about MODULE command being disabled by default).
I.e. we don't consider DEBUG command being blocked as an issue (people shouldn't have been using it),
and the few configs we protected are unlikely to have been set at runtime anyway.
On the other hand, it's likely to assume some users who use modules, load them from the config file anyway.
Note that's the whole point of this PR, for redis to be more secure by default and reduce the attack surface on
innocent users, so secure defaults will necessarily mean a breaking change.
2021-12-19 03:46:16 -05:00
|
|
|
enable-protected-configs
|
|
|
|
enable-debug-command
|
|
|
|
enable-module-command
|
|
|
|
dbfilename
|
|
|
|
logfile
|
|
|
|
dir
|
2019-11-28 04:24:57 -05:00
|
|
|
}
|
|
|
|
|
2020-07-10 04:33:47 -04:00
|
|
|
if {!$::tls} {
|
|
|
|
append skip_configs {
|
|
|
|
tls-prefer-server-ciphers
|
|
|
|
tls-session-cache-timeout
|
|
|
|
tls-session-cache-size
|
|
|
|
tls-session-caching
|
|
|
|
tls-cert-file
|
|
|
|
tls-key-file
|
2020-12-11 11:31:40 -05:00
|
|
|
tls-client-cert-file
|
|
|
|
tls-client-key-file
|
2020-07-10 04:33:47 -04:00
|
|
|
tls-dh-params-file
|
|
|
|
tls-ca-cert-file
|
|
|
|
tls-ca-cert-dir
|
|
|
|
tls-protocols
|
|
|
|
tls-ciphers
|
|
|
|
tls-ciphersuites
|
2021-03-01 09:04:44 -05:00
|
|
|
tls-port
|
2020-07-10 04:33:47 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-28 04:24:57 -05:00
|
|
|
set configs {}
|
|
|
|
foreach {k v} [r config get *] {
|
|
|
|
if {[lsearch $skip_configs $k] != -1} {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
dict set configs $k $v
|
|
|
|
# try to set the config to the same value it already has
|
|
|
|
r config set $k $v
|
|
|
|
}
|
|
|
|
|
|
|
|
set newconfigs {}
|
|
|
|
foreach {k v} [r config get *] {
|
|
|
|
if {[lsearch $skip_configs $k] != -1} {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
dict set newconfigs $k $v
|
|
|
|
}
|
|
|
|
|
|
|
|
dict for {k v} $configs {
|
|
|
|
set vv [dict get $newconfigs $k]
|
|
|
|
if {$v != $vv} {
|
|
|
|
fail "config $k mismatch, expecting $v but got $vv"
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
2020-09-09 08:43:11 -04:00
|
|
|
|
|
|
|
# Do a force-all config rewrite and make sure we're able to parse
|
|
|
|
# it.
|
|
|
|
test {CONFIG REWRITE sanity} {
|
|
|
|
# Capture state of config before
|
|
|
|
set configs {}
|
|
|
|
foreach {k v} [r config get *] {
|
|
|
|
dict set configs $k $v
|
|
|
|
}
|
|
|
|
|
|
|
|
# Rewrite entire configuration, restart and confirm the
|
|
|
|
# server is able to parse it and start.
|
|
|
|
assert_equal [r debug config-rewrite-force-all] "OK"
|
2021-02-23 13:28:03 -05:00
|
|
|
restart_server 0 true false
|
2021-05-18 10:10:06 -04:00
|
|
|
wait_done_loading r
|
2020-09-09 08:43:11 -04:00
|
|
|
|
|
|
|
# Verify no changes were introduced
|
|
|
|
dict for {k v} $configs {
|
|
|
|
assert_equal $v [lindex [r config get $k] 1]
|
|
|
|
}
|
2021-06-09 08:13:24 -04:00
|
|
|
} {} {external:skip}
|
2020-09-09 08:43:11 -04:00
|
|
|
|
2021-03-29 11:53:20 -04:00
|
|
|
test {CONFIG REWRITE handles save properly} {
|
|
|
|
r config set save "3600 1 300 100 60 10000"
|
|
|
|
r config rewrite
|
|
|
|
restart_server 0 true false
|
|
|
|
assert_equal [r config get save] {save {3600 1 300 100 60 10000}}
|
|
|
|
|
|
|
|
r config set save ""
|
|
|
|
r config rewrite
|
|
|
|
restart_server 0 true false
|
|
|
|
assert_equal [r config get save] {save {}}
|
2021-03-30 15:49:06 -04:00
|
|
|
|
|
|
|
start_server {config "minimal.conf"} {
|
|
|
|
assert_equal [r config get save] {save {3600 1 300 100 60 10000}}
|
|
|
|
r config set save ""
|
|
|
|
r config rewrite
|
|
|
|
restart_server 0 true false
|
|
|
|
assert_equal [r config get save] {save {}}
|
|
|
|
}
|
2021-06-09 08:13:24 -04:00
|
|
|
} {} {external:skip}
|
2021-12-01 03:15:11 -05:00
|
|
|
|
|
|
|
test {CONFIG SET with multiple args} {
|
|
|
|
set some_configs {maxmemory 10000001 repl-backlog-size 10000002 save {3000 5}}
|
|
|
|
|
|
|
|
# Backup
|
|
|
|
set backups {}
|
|
|
|
foreach c [dict keys $some_configs] {
|
|
|
|
lappend backups $c [lindex [r config get $c] 1]
|
|
|
|
}
|
|
|
|
|
|
|
|
# multi config set and veirfy
|
|
|
|
assert_equal [eval "r config set $some_configs"] "OK"
|
|
|
|
dict for {c val} $some_configs {
|
|
|
|
assert_equal [lindex [r config get $c] 1] $val
|
|
|
|
}
|
|
|
|
|
|
|
|
# Restore backup
|
|
|
|
assert_equal [eval "r config set $backups"] "OK"
|
|
|
|
}
|
|
|
|
|
|
|
|
test {CONFIG SET rollback on set error} {
|
|
|
|
# This test passes an invalid percent value to maxmemory-clients which should cause an
|
|
|
|
# input verification failure during the "set" phase before trying to apply the
|
|
|
|
# configuration. We want to make sure the correct failure happens and everything
|
|
|
|
# is rolled back.
|
|
|
|
# backup maxmemory config
|
|
|
|
set mm_backup [lindex [r config get maxmemory] 1]
|
|
|
|
set mmc_backup [lindex [r config get maxmemory-clients] 1]
|
|
|
|
set qbl_backup [lindex [r config get client-query-buffer-limit] 1]
|
|
|
|
# Set some value to maxmemory
|
|
|
|
assert_equal [r config set maxmemory 10000002] "OK"
|
|
|
|
# Set another value to maxmeory together with another invalid config
|
2021-12-15 02:46:32 -05:00
|
|
|
assert_error "ERR CONFIG SET failed (possibly related to argument 'maxmemory-clients') - percentage argument must be less or equal to 100" {
|
2021-12-01 03:15:11 -05:00
|
|
|
r config set maxmemory 10000001 maxmemory-clients 200% client-query-buffer-limit invalid
|
|
|
|
}
|
|
|
|
# Validate we rolled back to original values
|
|
|
|
assert_equal [lindex [r config get maxmemory] 1] 10000002
|
|
|
|
assert_equal [lindex [r config get maxmemory-clients] 1] $mmc_backup
|
|
|
|
assert_equal [lindex [r config get client-query-buffer-limit] 1] $qbl_backup
|
|
|
|
# Make sure we revert back to the previous maxmemory
|
|
|
|
assert_equal [r config set maxmemory $mm_backup] "OK"
|
|
|
|
}
|
|
|
|
|
|
|
|
test {CONFIG SET rollback on apply error} {
|
|
|
|
# This test tries to configure a used port number in redis. This is expected
|
|
|
|
# to pass the `CONFIG SET` validity checking implementation but fail on
|
|
|
|
# actual "apply" of the setting. This will validate that after an "apply"
|
|
|
|
# failure we rollback to the previous values.
|
|
|
|
proc dummy_accept {chan addr port} {}
|
2021-12-02 11:18:18 -05:00
|
|
|
|
2021-12-01 03:15:11 -05:00
|
|
|
set some_configs {maxmemory 10000001 port 0 client-query-buffer-limit 10m}
|
2021-12-02 11:18:18 -05:00
|
|
|
|
2021-12-01 03:15:11 -05:00
|
|
|
# On Linux we also set the oom score adj which has an apply function. This is
|
|
|
|
# used to verify that even successful applies are rolled back if some other
|
|
|
|
# config's apply fails.
|
|
|
|
set oom_adj_avail [expr {!$::external && [exec uname] == "Linux"}]
|
|
|
|
if {$oom_adj_avail} {
|
|
|
|
proc get_oom_score_adj {} {
|
|
|
|
set pid [srv 0 pid]
|
|
|
|
set fd [open "/proc/$pid/oom_score_adj" "r"]
|
|
|
|
set val [gets $fd]
|
|
|
|
close $fd
|
|
|
|
return $val
|
|
|
|
}
|
|
|
|
set some_configs [linsert $some_configs 0 oom-score-adj yes oom-score-adj-values {1 1 1}]
|
|
|
|
set read_oom_adj [get_oom_score_adj]
|
|
|
|
}
|
|
|
|
|
|
|
|
# Backup
|
|
|
|
set backups {}
|
|
|
|
foreach c [dict keys $some_configs] {
|
|
|
|
lappend backups $c [lindex [r config get $c] 1]
|
|
|
|
}
|
|
|
|
|
2021-12-02 11:18:18 -05:00
|
|
|
set used_port [find_available_port $::baseport $::portcount]
|
2021-12-01 03:15:11 -05:00
|
|
|
dict set some_configs port $used_port
|
|
|
|
|
|
|
|
# Run a dummy server on used_port so we know we can't configure redis to
|
|
|
|
# use it. It's ok for this to fail because that means used_port is invalid
|
|
|
|
# anyway
|
2021-12-02 11:18:18 -05:00
|
|
|
catch {socket -server dummy_accept -myaddr 127.0.0.1 $used_port} e
|
|
|
|
if {$::verbose} { puts "dummy_accept: $e" }
|
|
|
|
|
2021-12-01 03:15:11 -05:00
|
|
|
# Try to listen on the used port, pass some more configs to make sure the
|
|
|
|
# returned failure message is for the first bad config and everything is rolled back.
|
2021-12-15 02:46:32 -05:00
|
|
|
assert_error "ERR CONFIG SET failed (possibly related to argument 'port') - Unable to listen on this port*" {
|
2021-12-01 03:15:11 -05:00
|
|
|
eval "r config set $some_configs"
|
|
|
|
}
|
2021-12-02 11:18:18 -05:00
|
|
|
|
2021-12-01 03:15:11 -05:00
|
|
|
# Make sure we reverted back to previous configs
|
|
|
|
dict for {conf val} $backups {
|
|
|
|
assert_equal [lindex [r config get $conf] 1] $val
|
|
|
|
}
|
2021-12-02 11:18:18 -05:00
|
|
|
|
2021-12-01 03:15:11 -05:00
|
|
|
if {$oom_adj_avail} {
|
|
|
|
assert_equal [get_oom_score_adj] $read_oom_adj
|
|
|
|
}
|
2021-12-02 11:18:18 -05:00
|
|
|
|
2021-12-01 03:15:11 -05:00
|
|
|
# Make sure we can still communicate with the server (on the original port)
|
|
|
|
set r1 [redis_client]
|
|
|
|
assert_equal [$r1 ping] "PONG"
|
|
|
|
$r1 close
|
|
|
|
}
|
|
|
|
|
|
|
|
test {CONFIG SET duplicate configs} {
|
|
|
|
assert_error "ERR*duplicate*" {r config set maxmemory 10000001 maxmemory 10000002}
|
|
|
|
}
|
|
|
|
|
|
|
|
test {CONFIG SET set immutable} {
|
|
|
|
assert_error "ERR*immutable*" {r config set daemonize yes}
|
|
|
|
}
|
2021-03-29 11:53:20 -04:00
|
|
|
|
2021-12-08 05:44:10 -05:00
|
|
|
test {CONFIG GET hidden configs} {
|
|
|
|
set hidden_config "key-load-delay"
|
|
|
|
|
|
|
|
# When we use a pattern we shouldn't get the hidden config
|
|
|
|
assert {![dict exists [r config get *] $hidden_config]}
|
|
|
|
|
|
|
|
# When we explicitly request the hidden config we should get it
|
|
|
|
assert {[dict exists [r config get $hidden_config] "$hidden_config"]}
|
|
|
|
}
|
|
|
|
|
2021-12-16 02:01:13 -05:00
|
|
|
test {CONFIG GET multiple args} {
|
|
|
|
set res [r config get maxmemory maxmemory* bind *of]
|
|
|
|
|
|
|
|
# Verify there are no duplicates in the result
|
|
|
|
assert_equal [expr [llength [dict keys $res]]*2] [llength $res]
|
|
|
|
|
|
|
|
# Verify we got both name and alias in result
|
|
|
|
assert {[dict exists $res slaveof] && [dict exists $res replicaof]}
|
|
|
|
|
|
|
|
# Verify pattern found multiple maxmemory* configs
|
|
|
|
assert {[dict exists $res maxmemory] && [dict exists $res maxmemory-samples] && [dict exists $res maxmemory-clients]}
|
|
|
|
|
|
|
|
# Verify we also got the explicit config
|
|
|
|
assert {[dict exists $res bind]}
|
|
|
|
}
|
|
|
|
|
2021-06-10 08:39:33 -04:00
|
|
|
# Config file at this point is at a weird state, and includes all
|
2020-09-09 08:43:11 -04:00
|
|
|
# known keywords. Might be a good idea to avoid adding tests here.
|
2011-12-19 04:21:50 -05:00
|
|
|
}
|
Protected configs and sensitive commands (#9920)
Block sensitive configs and commands by default.
* `enable-protected-configs` - block modification of configs with the new `PROTECTED_CONFIG` flag.
Currently we add this flag to `dbfilename`, and `dir` configs,
all of which are non-mutable configs that can set a file redis will write to.
* `enable-debug-command` - block the `DEBUG` command
* `enable-module-command` - block the `MODULE` command
These have a default value set to `no`, so that these features are not
exposed by default to client connections, and can only be set by modifying the config file.
Users can change each of these to either `yes` (allow all access), or `local` (allow access from
local TCP connections and unix domain connections)
Note that this is a **breaking change** (specifically the part about MODULE command being disabled by default).
I.e. we don't consider DEBUG command being blocked as an issue (people shouldn't have been using it),
and the few configs we protected are unlikely to have been set at runtime anyway.
On the other hand, it's likely to assume some users who use modules, load them from the config file anyway.
Note that's the whole point of this PR, for redis to be more secure by default and reduce the attack surface on
innocent users, so secure defaults will necessarily mean a breaking change.
2021-12-19 03:46:16 -05:00
|
|
|
|
|
|
|
start_server {tags {"introspection external:skip"} overrides {enable-protected-configs {no} enable-debug-command {no}}} {
|
|
|
|
test {cannot modify protected configuration - no} {
|
|
|
|
assert_error "ERR*protected*" {r config set dir somedir}
|
|
|
|
assert_error "ERR*DEBUG command not allowed*" {r DEBUG HELP}
|
|
|
|
} {} {needs:debug}
|
|
|
|
}
|
|
|
|
|
|
|
|
start_server {config "minimal.conf" tags {"introspection external:skip"} overrides {protected-mode {no} enable-protected-configs {local} enable-debug-command {local}}} {
|
|
|
|
test {cannot modify protected configuration - local} {
|
|
|
|
# verify that for local connection it doesn't error
|
|
|
|
r config set dbfilename somename
|
|
|
|
r DEBUG HELP
|
|
|
|
|
|
|
|
# Get a non-loopback address of this instance for this test.
|
|
|
|
set myaddr [get_nonloopback_addr]
|
|
|
|
if {$myaddr != "" && ![string match {127.*} $myaddr]} {
|
|
|
|
# Non-loopback client should fail
|
|
|
|
set r2 [get_nonloopback_client]
|
|
|
|
assert_error "ERR*protected*" {$r2 config set dir somedir}
|
|
|
|
assert_error "ERR*DEBUG command not allowed*" {$r2 DEBUG HELP}
|
|
|
|
}
|
|
|
|
} {} {needs:debug}
|
Allow most CONFIG SET during loading, block some commands in async-loading (#9878)
## background
Till now CONFIG SET was blocked during loading.
(In the not so distant past, GET was disallowed too)
We recently (not released yet) added an async-loading mode, see #9323,
and during that time it'll serve CONFIG SET and any other command.
And now we realized (#9770) that some configs, and commands are dangerous
during async-loading.
## changes
* Allow most CONFIG SET during loading (both on async-loading and normal loading)
* Allow CONFIG REWRITE and CONFIG RESETSTAT during loading
* Block a few config during loading (`appendonly`, `repl-diskless-load`, and `dir`)
* Block a few commands during loading (list below)
## the blocked commands:
* SAVE - obviously we don't wanna start a foregreound save during loading 8-)
* BGSAVE - we don't mind to schedule one, but we don't wanna fork now
* BGREWRITEAOF - we don't mind to schedule one, but we don't wanna fork now
* MODULE - we obviously don't wanna unload a module during replication / rdb loading
(MODULE HELP and MODULE LIST are not blocked)
* SYNC / PSYNC - we're in the middle of RDB loading from master, must not allow sync
requests now.
* REPLICAOF / SLAVEOF - we're in the middle of replicating, maybe it makes sense to let
the user abort it, but he couldn't do that so far, i don't wanna take any risk of bugs due to odd state.
* CLUSTER - only allow [HELP, SLOTS, NODES, INFO, MYID, LINKS, KEYSLOT, COUNTKEYSINSLOT,
GETKEYSINSLOT, RESET, REPLICAS, COUNT_FAILURE_REPORTS], for others, preserve the status quo
## other fixes
* processEventsWhileBlocked had an issue when being nested, this could happen with a busy script
during async loading (new), but also in a busy script during AOF loading (old). this lead to a crash in
the scenario described in #6988
2021-12-22 07:11:16 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
test {config during loading} {
|
2022-01-05 06:49:01 -05:00
|
|
|
start_server [list overrides [list key-load-delay 50 loading-process-events-interval-bytes 1024 rdbcompression no]] {
|
Allow most CONFIG SET during loading, block some commands in async-loading (#9878)
## background
Till now CONFIG SET was blocked during loading.
(In the not so distant past, GET was disallowed too)
We recently (not released yet) added an async-loading mode, see #9323,
and during that time it'll serve CONFIG SET and any other command.
And now we realized (#9770) that some configs, and commands are dangerous
during async-loading.
## changes
* Allow most CONFIG SET during loading (both on async-loading and normal loading)
* Allow CONFIG REWRITE and CONFIG RESETSTAT during loading
* Block a few config during loading (`appendonly`, `repl-diskless-load`, and `dir`)
* Block a few commands during loading (list below)
## the blocked commands:
* SAVE - obviously we don't wanna start a foregreound save during loading 8-)
* BGSAVE - we don't mind to schedule one, but we don't wanna fork now
* BGREWRITEAOF - we don't mind to schedule one, but we don't wanna fork now
* MODULE - we obviously don't wanna unload a module during replication / rdb loading
(MODULE HELP and MODULE LIST are not blocked)
* SYNC / PSYNC - we're in the middle of RDB loading from master, must not allow sync
requests now.
* REPLICAOF / SLAVEOF - we're in the middle of replicating, maybe it makes sense to let
the user abort it, but he couldn't do that so far, i don't wanna take any risk of bugs due to odd state.
* CLUSTER - only allow [HELP, SLOTS, NODES, INFO, MYID, LINKS, KEYSLOT, COUNTKEYSINSLOT,
GETKEYSINSLOT, RESET, REPLICAS, COUNT_FAILURE_REPORTS], for others, preserve the status quo
## other fixes
* processEventsWhileBlocked had an issue when being nested, this could happen with a busy script
during async loading (new), but also in a busy script during AOF loading (old). this lead to a crash in
the scenario described in #6988
2021-12-22 07:11:16 -05:00
|
|
|
# create a big rdb that will take long to load. it is important
|
|
|
|
# for keys to be big since the server processes events only once in 2mb.
|
|
|
|
# 100mb of rdb, 100k keys will load in more than 5 seconds
|
|
|
|
r debug populate 100000 key 1000
|
|
|
|
|
|
|
|
restart_server 0 false false
|
|
|
|
|
|
|
|
# make sure it's still loading
|
|
|
|
assert_equal [s loading] 1
|
|
|
|
|
|
|
|
# verify some configs are allowed during loading
|
|
|
|
r config set loglevel debug
|
|
|
|
assert_equal [lindex [r config get loglevel] 1] debug
|
|
|
|
|
|
|
|
# verify some configs are forbidden during loading
|
|
|
|
assert_error {LOADING*} {r config set dir asdf}
|
|
|
|
|
|
|
|
# make sure it's still loading
|
|
|
|
assert_equal [s loading] 1
|
|
|
|
|
|
|
|
# no need to keep waiting for loading to complete
|
|
|
|
exec kill [srv 0 pid]
|
|
|
|
}
|
|
|
|
} {} {external:skip}
|