1. 30 4月, 2020 1 次提交
  2. 29 4月, 2020 1 次提交
  3. 17 4月, 2020 1 次提交
    • J
      Switch to flake8 for static code analysis (#1328) · 05548a37
      Jon Dufresne 提交于
      flake8 catches a wider net of mistakes than pycodestyle and is more
      commonly used by the larger community. For example, it catches unused
      imports, a few of which existed. These have since been removed.
      
      Two "noqa" comments were added. One ignores the _compat.py file as it
      has a large amount of Python version specific code. The second is in
      utils.py which intentionally does not use an import.
      05548a37
  4. 14 4月, 2020 5 次提交
  5. 12 4月, 2020 3 次提交
  6. 10 4月, 2020 3 次提交
  7. 05 4月, 2020 1 次提交
  8. 25 3月, 2020 1 次提交
  9. 13 3月, 2020 2 次提交
  10. 11 3月, 2020 2 次提交
  11. 04 3月, 2020 2 次提交
  12. 26 2月, 2020 1 次提交
  13. 25 2月, 2020 3 次提交
  14. 13 2月, 2020 5 次提交
  15. 08 2月, 2020 1 次提交
  16. 02 2月, 2020 2 次提交
    • A
      3.4.1 · 4b7f562f
      Andy McCurdy 提交于
      4b7f562f
    • A
      remove Redis and ConnectionPool __eq__ comparison · 1b050753
      Andy McCurdy 提交于
      After further thought this was a bad idea. Just because two connection
      pools share the same connection arguments does not make them equal.
      It would seem quite odd if pool_a == pool_b yet pool_a.disconnect() doesn't
      close all of pool_b's connections.
      
      Ref #1240
      Fixes #1277
      Fixes #1275
      Fixes #1267
      Fixes #1273
      1b050753
  17. 01 2月, 2020 2 次提交
    • A
      Move the username argument in the Redis and Connection classes to the end · 5a1f3c44
      Andy McCurdy 提交于
      This helps those poor souls that specify all their connection options as
      non-keyword arguments.
      
      Fixes #1276
      5a1f3c44
    • A
      Provide AUTH fallback support for connection URLs with a username component · e39ae455
      Andy McCurdy 提交于
      Prior to ACL support, redis-py ignored the username component of
      Connection URLs. With ACL support, usernames are no longer ignored and
      are used to authenticate against an ACL rule. Some cloud vendors with
      managed Redis instances (like Heroku) provide connection URLs with a
      username component pre-ACL that is not intended to be used. Sending that
      username to Redis servers < 6.0.0 results in an error. Attempt to detect
      this condition and retry the AUTH command with only the password such
      that authentication continues to work for these users.
      
      Fixes #1274
      e39ae455
  18. 31 1月, 2020 4 次提交