v6.3.2
版本发布时间: 2023-01-23 04:55:51
Snapchat/KeyDB最新发布版本:v6.3.4(2023-10-31 04:26:08)
KeyDB v6.3.2 Release
This release contains Beta level support for KeyDB FLASH, new ASYNC commands, latency improvements and a number of bug fixes.
KeyDB FLASH Support
KeyDB FLASH is included as a Beta feature with this release. Enabling this feature avoids the need to store all data in memory, allowing you to store more data at a lower cost. KeyDB will persist data to the storage medium it is written to avoiding the need for AOF/RDB files. KeyDB uses RocksDB as the persistent storage provider and can be enabled with config storage-provider flash /path/to/flash/output
. Read more at https://docs.keydb.dev/docs/flash/
New ASYNC Commands
In addition to GET/MGET support released with v6.3.0, ASYNC support has been added for the following commands: HGET, HMGET, HKEYS, HVALS, HGETALL, HSCAN and can be enabled with config enable-async-commands yes
Jammy & Bookworm Support
Packaging support for Ubuntu 22.04 (Jammy) and Debian 12 (Bookworm) has been included with this release and will be maintained moving forwards. For details on installation please refer to https://docs.keydb.dev/docs/ppa-deb
Other Improvements & Bug Fixes
- Added new soft shutdown feature, can be enabled with config "soft-shutdown yes".
- If soft shutdown is enabled, instead of shutting down right away, the server will wait until all clients have disconnected, and will reject all new connection attempts.
- Fixed memory leak with tls certificates when tls allowlist is enabled
- Fixed bug in rdb load with flash enabled to ensure all dbs are safe to load (previously only checked db[0])
- Fixed race conditions in rdb load and replication
- Fixed memory access of rdb file after it should have been deleted
- Fixed integer overflow bug in flash(Issue #486)
- Improve TLS latency by queueing new commands before executing instead of after
- Removed O(n) count of memory usage from info command(replaced by O(1) estimate)
- Improved latency of clearing large number of flash DBs(Thanks to Paul Chen for this fix)(Issue #516)
- replaced sprintf with snprintf to avoid potential security bugs
- Fixed bug where a failed move due to key already existing in move target would result in the key being removed from move source(Thanks to Paul Chen for this fix)(Issue #497)
- Fixed usage of deprecated OpenSSL api in OpenSSL v>3.0.1(Issue #392)
- Imported security fixes from Redis (CVE-2023-22458 CVE-2022-35977)
- Other fixed issues: #480 #477 #454 #452 #303 #425 #492 #541