Daniel House @ Seeking Opportunities

Results 42 comments of Daniel House @ Seeking Opportunities

It seems to me that we need to preserve the external behaviors of the AUTH and HELLO commands while allowing them to use different authentication methods (either internally or by...

Here are some high level design thoughts. Please let me know what you think. The current ACL code is built around two key functions: `ACLCheckPasswordHash` and `ACLHashPassword`. `ACLCheckPasswordHash` is used...

Interceptors would be a major advancement for module writers and they deserve to be added to https://github.com/redis/redis/issues/8157. They would have so much power and flexibility, and such a wide range...

The `#include "hiredis.h"` seems to be suggesting that I delete the functions in sentinel.c that are identical with the functions in deps/hiredis/adapters/ae.h and rely on `#include "hiredis.h"` to replace them....

It seems to me that when "redis" is part of a protocol/api, it is not being used as a trademark. When it appears in documentation or on a web-site refering...

I find the template config, `.../src/redis.conf`, to be the best (sometimes only) documentation for the configuration parameters. It is supposed to also agree with the default settings that you get...

Oh, I don't object to renaming it. In fact, I think it is **disgusting** to find the best documentation is in an example config file. I just fear losing such...

I like the word `deterministic`. If the output is not sorted it can't be either deterministic or canonical, so I like it being sorted. Clearly you feel that the fields...

The problem seems to be > Currently, some clients rely on a single-node perspective to obtain cluster topology, which may not accurately reflect the entire cluster's state. The rest of...

There was some discussion of cluster V2 in https://github.com/valkey-io/valkey/issues/58 . Could someone link information about cluster V2 into this issue? I don't know anything about it except what I gathered...