Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump aHash to v0.8.6 #966

Merged
merged 4 commits into from
Dec 1, 2023
Merged

Bump aHash to v0.8.6 #966

merged 4 commits into from
Dec 1, 2023

Conversation

aumetra
Copy link
Contributor

@aumetra aumetra commented Oct 3, 2023

This is a breaking change, bumping the ahash dependency in a semver-incompatible way

@jaymell
Copy link
Contributor

jaymell commented Oct 20, 2023

Hi, can you explain the reason for the breaking changes?

@aumetra
Copy link
Contributor Author

aumetra commented Oct 20, 2023

Sure! The first breaking change here is the bump from v0.7 to v0.8 itself. That's done to simply stay up-to-date with the newest release and to include a fix for their use of AES instructions on aarch64 architectures (which will be needed in the future)

The second breaking change is the removal of the RandomState parameter from AHashMap. The reason behind this is two-fold:

  1. The AHashMap only implements FromIterator with the ahash::RandomState as the hasher, so this restriction keeps the internals a bit cleaner
  2. The only way to instantiate an ahash::AHasher hasher via the current API (apart from the Default impl) is via ahash::RandomState, so having the parameter freely choosable is somewhat unnecessary anyways (and could be brought back with a future release without breaking semver)

So technically it's only one breaking change, but for consistency's sake, this PR is making two.

If the second change (the removal of the hash state parameter) isn't desired, I could probably just implement that with a fold over the iterator

@jaymell
Copy link
Contributor

jaymell commented Nov 17, 2023

Thanks for the explanation, which certainly sounds reasonable to me. We still need to figure out our next release and whether it's breaking, so I'm going to leave this un-merged for now. @aumetra do you mind updating the version specified to a non-yanked version?

@jaymell jaymell mentioned this pull request Nov 17, 2023
22 tasks
@nihohit nihohit changed the title Bump aHash to v0.8.3 Bump aHash to v0.8.6 Nov 19, 2023
@jaymell jaymell merged commit f4f5344 into redis-rs:main Dec 1, 2023
9 of 10 checks passed
@aumetra aumetra deleted the bump-ahash branch December 1, 2023 06:44
barshaul pushed a commit to amazon-contributing/redis-rs that referenced this pull request Dec 7, 2023
* Disable JSON module tests for redis 6.2.4. (redis-rs#980)

This happens due to a consistent crash -
RedisJSON/RedisJSON#1124

* Implement `FromRedisValue` for `Box<[T]>` and `Arc<[T]>` (redis-rs#799)

* Update minimal rust version to 1.6.5 (redis-rs#982)

It's required by regex v1.10.2.
https://github.com/redis-rs/redis-rs/actions/runs/6760188489/job/18373652560?pr=981

* Support Mutual TLS (redis-rs#858)

Add support for mutual TLS. Enable specifying client
certificate and key and (optional) root certificate.

* changing timeouts from usize and isize to f64 (redis-rs#988)

Co-authored-by: Eythor Helgason <eytorhelgason@gmail.com>

* Accept iterator at `ClusterClient` initialization (redis-rs#987)

* Prefer routing to primary in a transaction. (redis-rs#986)

* Rename route_pipeline to route_for_pipeline.

There are 2 `route_pipeline` functions in the file, so we change one to
avoid confusion.

* Prefer routing to primary in a transaction.

* CrossSlot error on pipeline with many routes.

* Sync Pub/Sub - cache received pub/sub messages. (redis-rs#910)

When sending subscibre/unsubscribe messages to the server, the pub/sub
client might receive messages that it can mistake to be the response,
and not return to the next `get_message` call. This fix ensures that
pub/sub messages will be queued until the next `get_message` call, so
that no message will be missed.

* Fix sync cluster behavior with transactions. (redis-rs#983)

The leading MULTI prevents the transaction from being properly routed.
In order to route the request correctly, we drop the leading MULTI from
the routable.

* Release redis 0.23.4 / redis-test 0.2.4 (redis-rs#992)

* Tests: Add retries to test cluster creation (redis-rs#994)

* Revert redis-test versioning changes (redis-rs#993)

Publishing to crates.io without the version specification
is currently not possible. Reverting these changes for now
until we have a better solution/workaround.

* Fix features for `load_native_certs`. (redis-rs#996)

The directive now matches the directives wrapping `load_native_certs`'s
`use` statements. This would fail compilation for anyone accidentally
using the "tls" feature with rustls.

* Bump aHash to v0.8.6 (redis-rs#966)

* Update Command expiration values to be an appropriate type (redis-rs#589)

This change updates expiration values provided to some commands in the
`Command` trait to be of type `i64` or `u64` where appropriate,
replacing the previously used `usize` type.

More specifically, the commands that are updated are

- SETEX, PSETEX
  - Expiration value changed from `usize` to `u64`
- EXPIRE, PEXPIRE, EXPIREAT, PEXPIREAT
  - Expiration value changed from `usize` to `i64`

For the `*SETEX` commands, there is no mention of supporting negative
values. And indeed, providing a negative value through redis-cli returns
an error message.

For the `*EXPIRE*` commands, I couldn't find the paragraph in the docs
referenced in redis-rs#575, nor any other mention that the commands accept a
negative expiration argument. However, in testing with redis-cli it
seems a negative expiration value is valid and in checking the code I
found it to confirm these observations. See [here][code1] and
[here][code2].

Note that this is a breaking change.

[code1]: https://github.com/redis/redis/blob/e3ef73dc2a557232c60c732705e8e6ff2050eba9/src/expire.c#L570-L571
[code2]: https://github.com/redis/redis/blob/e3ef73dc2a557232c60c732705e8e6ff2050eba9/src/expire.c#L483-L491

* Fix StreamId::contains_key signature (redis-rs#783)

* Order in usage of ClusterParams. (redis-rs#997)

* Move `tls_params` into `ClusterParams`.

The two objects are used together, so it makes sense to join them.

* Cluster: Contain `ClusterParams` internally.

This matches the async cluster's structure, and ensures that fields that
are added to `ClusterParams` are automatically added to the sync cluster

* Release redis 0.24.0 / redis-test 0.3.0 (redis-rs#998)

---------

Co-authored-by: Jacob O'Toole <jacob@jotpot.co.uk>
Co-authored-by: spaceangel <129979014+sp-angel@users.noreply.github.com>
Co-authored-by: eythorhel19 <70693645+eythorhel19@users.noreply.github.com>
Co-authored-by: Eythor Helgason <eytorhelgason@gmail.com>
Co-authored-by: Ruan Petterson <ruan@petterson.eng.br>
Co-authored-by: James Lucas <jaymell@users.noreply.github.com>
Co-authored-by: aumetra <aumetra@cryptolab.net>
Co-authored-by: Josh Leeb-du Toit <mail@joshleeb.com>
Co-authored-by: Ayush <ayushsingh1325@gmail.com>
barshaul pushed a commit to barshaul/redis-rs that referenced this pull request Jul 11, 2024
* Fix a file.

Signed-off-by: Yury-Fridlyand <yury.fridlyand@improving.com>

* Add CI check.

Signed-off-by: Yury-Fridlyand <yury.fridlyand@improving.com>

---------

Signed-off-by: Yury-Fridlyand <yury.fridlyand@improving.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants