2022-01-04 21:55:40 by Thomas Klausner | Files touched by this commit (1595) |
Log message:
*: bump PKGREVISION for egg.mk users
They now have a tool dependency on py-setuptools instead of a DEPENDS
|
2021-10-26 12:10:08 by Nia Alarie | Files touched by this commit (417) |
Log message:
databases: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
The following distfiles could not be fetched (some may be only fetched
conditionally):
./databases/cstore/distinfo D6.data.ros.gz
./databases/cstore/distinfo cstore0.2.tar.gz
./databases/cstore/distinfo data4.tar.gz
|
2021-10-07 15:35:53 by Nia Alarie | Files touched by this commit (417) |
Log message:
databases: Remove SHA1 distfile hashes
|
2020-06-08 14:51:59 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
py-redis: updated to 3.5.3
3.5.3:
* Restore try/except clauses to __del__ methods. These will be removed
in 4.0 when more explicit resource management if enforced.
* Update the master_address when Sentinels promote a new master.
* Update SentinelConnectionPool to not forcefully disconnect other in-use
connections which can negatively affect threaded applications.
|
2020-05-16 11:03:23 by Adam Ciarcinski | Files touched by this commit (11) |
Log message:
fix pytest versioned dep.
|
2020-05-16 10:47:54 by Adam Ciarcinski | Files touched by this commit (1) |
Log message:
py-redis: pytest from versioned depends
|
2020-05-16 09:09:57 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
py-redis: updated to 3.5.2
3.5.2:
* Tune the locking in ConnectionPool.get_connection so that the lock is
not held while waiting for the socket to establish and validate the
TCP connection.
|
2020-05-13 16:45:26 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
py-redis: updated to 3.5.1
3.5.1:
Fix for HSET argument validation to allow any non-None key.
|
2020-04-30 11:36:40 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
py-redis: updated to 3.5.0
3.5.0:
* Removed exception trapping from __del__ methods. redis-py objects that
hold various resources implement __del__ cleanup methods to release
those resources when the object goes out of scope. This provides a
fallback for when these objects aren't explicitly closed by user code.
Prior to this change any errors encountered in closing these resources
would be hidden from the user.
* Expanded support for connection strings specifying a username connecting
to pre-v6 servers.
* Optimized Lock's blocking_timeout and sleep. If the lock cannot be
acquired and the sleep value would cause the loop to sleep beyond
blocking_timeout, fail immediately.
* Added support for passing Python memoryviews to Redis command args that
expect strings or bytes. The memoryview instance is sent directly to
the socket such that there are zero copies made of the underlying data
during command packing.
* HSET command now can accept multiple pairs. HMSET has been marked as
deprecated now.
* Don't manually DISCARD when encountering an ExecAbortError.
* Reset the watched state of pipelines after calling exec. This saves
a roundtrip to the server by not having to call UNWATCH within
Pipeline.reset().
* Added the KEEPTTL option for the SET command.
* Added the MEMORY STATS command.
* Lock.extend() now has a new option, `replace_ttl`. When False (the
default), Lock.extend() adds the `additional_time` to the lock's existing
TTL. When replace_ttl=True, the lock's existing TTL is replaced with
the value of `additional_time`.
* Add testing and support for PyPy.
|
2020-02-04 17:38:23 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message:
py-redis: updated to 3.4.1
3.4.1
* Move the username argument in the Redis and Connection classes to the
end of the argument list. This helps those poor souls that specify all
their connection options as non-keyword arguments.
* Prior to ACL support, redis-py ignored the username component of
Connection URLs. With ACL support, usernames are no longer ignored and
are used to authenticate against an ACL rule. Some cloud vendors with
managed Redis instances (like Heroku) provide connection URLs with a
username component pre-ACL that is not intended to be used. Sending that
username to Redis servers < 6.0.0 results in an error. Attempt to detect
this condition and retry the AUTH command with only the password such
that authentication continues to work for these users.
* Removed the __eq__ hooks to Redis and ConnectionPool that were added
in 3.4.0. This ended up being a bad idea as two separate connection
pools be considered equal yet manage a completely separate set of
connections.
|