summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRemi Collet <remi@remirepo.net>2026-03-18 09:43:08 +0100
committerRemi Collet <remi@php.net>2026-03-18 09:43:08 +0100
commitf749de279c602dde6a49cc046a7f2bc03f2defcc (patch)
tree72677a5bfae5740897edffc69df828145c966c32
parent6ffb9d1eaa5a5858f7d9139844488ec23c4e7db7 (diff)
Valkey 9.1.0-rc1HEADmaster
Lua scripting engine moved into a Valkey module
-rw-r--r--valkey-bindnow.patch51
-rw-r--r--valkey-conf.patch8
-rw-r--r--valkey-loadmod.patch63
-rw-r--r--valkey-lua.patch54
-rw-r--r--valkey-rdma.patch26
-rw-r--r--valkey.spec33
6 files changed, 148 insertions, 87 deletions
diff --git a/valkey-bindnow.patch b/valkey-bindnow.patch
deleted file mode 100644
index ba4bdd5..0000000
--- a/valkey-bindnow.patch
+++ /dev/null
@@ -1,51 +0,0 @@
-Adapted for 8.1/9.0 from
-
-
-From 8051de740dd38172476b04e892e5517630e3eaed Mon Sep 17 00:00:00 2001
-From: Remi Collet <remi@remirepo.net>
-Date: Wed, 11 Mar 2026 11:40:15 +0100
-Subject: [PATCH] Inherit LDFLAGS for TLS and RDMA modules (#3344)
-
-With current Makefile, `LDFLAGS` are not used for modules.
-
-This results in security options not applied.
-
-```
-$ annocheck /usr/lib64/valkey/modules/rdma.so
-annocheck: Version 12.99.
-Hardened: rdma.so: FAIL: bind-now test because not linked with -Wl,-z,now
-Hardened: Rerun annocheck with --verbose to see more information on the tests.
-Hardened: rdma.so: Overall: FAIL.
-```
-
-With this patch
-
-```
-$ annocheck /usr/lib64/valkey/modules/rdma.so
-annocheck: Version 12.99.
-Hardened: rdma.so: PASS.
-```
-
-Signed-off-by: Remi Collet <remi@remirepo.net>
----
- src/Makefile | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/src/Makefile b/src/Makefile
-index eb4a6e939a..5d3814d019 100644
---- a/src/Makefile
-+++ b/src/Makefile
-@@ -524,11 +524,11 @@ $(ENGINE_CHECK_AOF_NAME): $(SERVER_NAME)
-
- # valkey-tls.so
- $(TLS_MODULE_NAME): $(SERVER_NAME)
-- $(QUIET_CC)$(CC) -o $@ tls.c -shared -fPIC $(TLS_MODULE_CFLAGS) $(TLS_CLIENT_LIBS)
-+ $(QUIET_CC)$(CC) $(LDFLAGS) -o $@ tls.c -shared -fPIC $(TLS_MODULE_CFLAGS) $(TLS_CLIENT_LIBS)
-
- # valkey-rdma.so
- $(RDMA_MODULE_NAME): $(SERVER_NAME)
-- $(QUIET_CC)$(CC) -o $@ rdma.c -shared -fPIC $(RDMA_MODULE_CFLAGS)
-+ $(QUIET_CC)$(CC) $(LDFLAGS) -o $@ rdma.c -shared -fPIC $(RDMA_MODULE_CFLAGS)
-
- # valkey-cli
- $(ENGINE_CLI_NAME): $(ENGINE_CLI_OBJ)
diff --git a/valkey-conf.patch b/valkey-conf.patch
index 93696f4..06455de 100644
--- a/valkey-conf.patch
+++ b/valkey-conf.patch
@@ -32,7 +32,7 @@ diff -up ./valkey.conf.rpm ./valkey.conf
################################## MODULES #####################################
-@@ -163,7 +166,7 @@ tcp-backlog 511
+@@ -163,7 +166,7 @@
# incoming connections. There is no default, so the server will not listen
# on a unix socket when not specified.
#
@@ -41,7 +41,7 @@ diff -up ./valkey.conf.rpm ./valkey.conf
# unixsocketgroup wheel
# unixsocketperm 700
-@@ -409,7 +412,7 @@ daemonize no
+@@ -425,7 +428,7 @@
#
# Note that on modern Linux systems "/run/valkey.pid" is more conforming
# and should be used instead.
@@ -50,7 +50,7 @@ diff -up ./valkey.conf.rpm ./valkey.conf
# Specify the server verbosity level.
# This can be one of:
-@@ -440,7 +443,7 @@ loglevel notice
+@@ -457,7 +460,7 @@
# Specify the log file name. Also the empty string can be used to force
# the server to log on the standard output. Note that if you use standard
# output for logging but daemonize, logs will be sent to /dev/null
@@ -59,7 +59,7 @@ diff -up ./valkey.conf.rpm ./valkey.conf
# To enable logging to the system logger, just set 'syslog-enabled' to yes,
# and optionally update the other syslog parameters to suit your needs.
-@@ -631,7 +634,7 @@ rdb-del-sync-files no
+@@ -661,7 +664,7 @@
# Note that modifying 'dir' during runtime may have unexpected behavior,
# for example when a child process is running, related file operations may
# have unexpected effects.
diff --git a/valkey-loadmod.patch b/valkey-loadmod.patch
index dad9cb9..74c016e 100644
--- a/valkey-loadmod.patch
+++ b/valkey-loadmod.patch
@@ -1,4 +1,4 @@
-From b40ab88996d0bbe9bdd366af9426f7400b21e19c Mon Sep 17 00:00:00 2001
+From cae829f497550d175331d3d6cd0bbf4aed0965a4 Mon Sep 17 00:00:00 2001
From: Remi Collet <remi@remirepo.net>
Date: Sat, 4 Oct 2025 07:23:52 +0200
Subject: [PATCH] Fix #2678 don't add loadmodule when from config
@@ -10,13 +10,14 @@ Signed-off-by: Remi Collet <remi@remirepo.net>
src/config.c | 8 ++++++--
src/module.c | 17 ++++++++++++-----
src/module.h | 4 ++--
- 3 files changed, 20 insertions(+), 9 deletions(-)
+ src/server.c | 2 +-
+ 4 files changed, 21 insertions(+), 10 deletions(-)
diff --git a/src/config.c b/src/config.c
-index d0158b2c4d..ab453056df 100644
+index 93ef289e3..dc4116383 100644
--- a/src/config.c
+++ b/src/config.c
-@@ -448,6 +448,8 @@ static int updateClientOutputBufferLimit(sds *args, int arg_len, const char **er
+@@ -450,6 +450,8 @@ static int updateClientOutputBufferLimit(sds *args, int arg_len, const char **er
* within conf file parsing. This is only needed to support the deprecated
* abnormal aggregate `save T C` functionality. Remove in the future. */
static int reading_config_file;
@@ -25,7 +26,7 @@ index d0158b2c4d..ab453056df 100644
void loadServerConfigFromString(sds config) {
deprecatedConfig deprecated_configs[] = {
-@@ -539,7 +541,9 @@ void loadServerConfigFromString(sds config) {
+@@ -541,7 +543,9 @@ void loadServerConfigFromString(sds config) {
/* Execute config directives */
if (!strcasecmp(argv[0], "include") && argc == 2) {
@@ -35,7 +36,7 @@ index d0158b2c4d..ab453056df 100644
} else if (!strcasecmp(argv[0], "rename-command") && argc == 3) {
struct serverCommand *cmd = lookupCommandBySds(argv[1]);
-@@ -572,7 +576,7 @@ void loadServerConfigFromString(sds config) {
+@@ -574,7 +578,7 @@ void loadServerConfigFromString(sds config) {
goto loaderr;
}
} else if (!strcasecmp(argv[0], "loadmodule") && argc >= 2) {
@@ -44,7 +45,7 @@ index d0158b2c4d..ab453056df 100644
} else if (strchr(argv[0], '.')) {
if (argc < 2) {
err = "Module config specified without value";
-@@ -1605,7 +1609,7 @@ void rewriteConfigLoadmoduleOption(struct rewriteConfigState *state) {
+@@ -1618,7 +1622,7 @@ void rewriteConfigLoadmoduleOption(struct rewriteConfigState *state) {
while ((de = dictNext(di)) != NULL) {
struct ValkeyModule *module = dictGetVal(de);
line = moduleLoadQueueEntryToLoadmoduleOptionStr(module, "loadmodule");
@@ -54,7 +55,7 @@ index d0158b2c4d..ab453056df 100644
dictReleaseIterator(di);
/* Mark "loadmodule" as processed in case modules is empty. */
diff --git a/src/module.c b/src/module.c
-index e5afa952fa..f18bc3c6bf 100644
+index de5a5510e..2638268e1 100644
--- a/src/module.c
+++ b/src/module.c
@@ -84,6 +84,7 @@
@@ -65,7 +66,7 @@ index e5afa952fa..f18bc3c6bf 100644
int argc;
robj **argv;
};
-@@ -670,7 +671,7 @@ void freeClientModuleData(client *c) {
+@@ -679,7 +680,7 @@ void freeClientModuleData(client *c) {
c->module_data = NULL;
}
@@ -74,7 +75,7 @@ index e5afa952fa..f18bc3c6bf 100644
int i;
struct moduleLoadQueueEntry *loadmod;
-@@ -678,6 +679,7 @@ void moduleEnqueueLoadModule(sds path, sds *argv, int argc) {
+@@ -687,6 +688,7 @@ void moduleEnqueueLoadModule(sds path, sds *argv, int argc) {
loadmod->argv = argc ? zmalloc(sizeof(robj *) * argc) : NULL;
loadmod->path = sdsnew(path);
loadmod->argc = argc;
@@ -82,7 +83,7 @@ index e5afa952fa..f18bc3c6bf 100644
for (i = 0; i < argc; i++) {
loadmod->argv[i] = createRawStringObject(argv[i], sdslen(argv[i]));
}
-@@ -688,6 +690,10 @@ sds moduleLoadQueueEntryToLoadmoduleOptionStr(ValkeyModule *module,
+@@ -697,6 +699,10 @@ sds moduleLoadQueueEntryToLoadmoduleOptionStr(ValkeyModule *module,
const char *config_option_str) {
sds line;
@@ -93,7 +94,7 @@ index e5afa952fa..f18bc3c6bf 100644
line = sdsnew(config_option_str);
line = sdscatlen(line, " ", 1);
line = sdscatsds(line, module->loadmod->path);
-@@ -12350,7 +12356,7 @@ void moduleLoadFromQueue(void) {
+@@ -12629,7 +12635,7 @@ void moduleLoadFromQueue(void) {
listRewind(server.loadmodule_queue, &li);
while ((ln = listNext(&li))) {
struct moduleLoadQueueEntry *loadmod = ln->value;
@@ -102,7 +103,7 @@ index e5afa952fa..f18bc3c6bf 100644
serverLog(LL_WARNING, "Can't load module from %s: server aborting", loadmod->path);
exit(1);
}
-@@ -12531,7 +12537,7 @@ void moduleUnregisterCleanup(ValkeyModule *module) {
+@@ -12818,7 +12824,7 @@ void moduleUnregisterCleanup(ValkeyModule *module) {
/* Load a module and initialize it. On success C_OK is returned, otherwise
* C_ERR is returned. */
@@ -111,7 +112,7 @@ index e5afa952fa..f18bc3c6bf 100644
int (*onload)(void *, void **, int);
void *handle;
-@@ -12606,6 +12612,7 @@ int moduleLoad(const char *path, void **module_argv, int module_argc, int is_loa
+@@ -12893,6 +12899,7 @@ int moduleLoad(const char *path, void **module_argv, int module_argc, int is_loa
ctx.module->loadmod->path = sdsnew(path);
ctx.module->loadmod->argv = module_argc ? zmalloc(sizeof(robj *) * module_argc) : NULL;
ctx.module->loadmod->argc = module_argc;
@@ -119,26 +120,26 @@ index e5afa952fa..f18bc3c6bf 100644
for (int i = 0; i < module_argc; i++) {
ctx.module->loadmod->argv[i] = module_argv[i];
incrRefCount(ctx.module->loadmod->argv[i]);
-@@ -13529,7 +13536,7 @@ void moduleCommand(client *c) {
+@@ -13961,7 +13968,7 @@ void moduleCommand(client *c) {
argv = &c->argv[3];
}
-- if (moduleLoad(c->argv[2]->ptr, (void **)argv, argc, 0) == C_OK)
-+ if (moduleLoad(c->argv[2]->ptr, (void **)argv, argc, 0, 0) == C_OK)
+- if (moduleLoad(objectGetVal(c->argv[2]), (void **)argv, argc, 0) == C_OK)
++ if (moduleLoad(objectGetVal(c->argv[2]), (void **)argv, argc, 0, 0) == C_OK)
addReply(c, shared.ok);
else
addReplyError(c, "Error loading the extension. Please check the server logs.");
-@@ -13544,7 +13551,7 @@ void moduleCommand(client *c) {
+@@ -13976,7 +13983,7 @@ void moduleCommand(client *c) {
/* If this is a loadex command we want to populate server.module_configs_queue with
* sds NAME VALUE pairs. We also want to increment argv to just after ARGS, if supplied. */
if (parseLoadexArguments((ValkeyModuleString ***)&argv, &argc) == VALKEYMODULE_OK &&
-- moduleLoad(c->argv[2]->ptr, (void **)argv, argc, 1) == C_OK)
-+ moduleLoad(c->argv[2]->ptr, (void **)argv, argc, 1, 0) == C_OK)
+- moduleLoad(objectGetVal(c->argv[2]), (void **)argv, argc, 1) == C_OK)
++ moduleLoad(objectGetVal(c->argv[2]), (void **)argv, argc, 1, 0) == C_OK)
addReply(c, shared.ok);
else {
dictEmpty(server.module_configs_queue, NULL);
diff --git a/src/module.h b/src/module.h
-index f6c266b592..1f9e729e56 100644
+index c7ad384c6..3b12efbaf 100644
--- a/src/module.h
+++ b/src/module.h
@@ -169,7 +169,7 @@ static inline void moduleInitDigestContext(ValkeyModuleDigest *mdvar) {
@@ -150,12 +151,28 @@ index f6c266b592..1f9e729e56 100644
sds moduleLoadQueueEntryToLoadmoduleOptionStr(ValkeyModule *module,
const char *config_option_str);
ValkeyModuleCtx *moduleAllocateContext(void);
-@@ -180,7 +180,7 @@ void moduleFreeContext(ValkeyModuleCtx *ctx);
+@@ -181,7 +181,7 @@ void moduleFreeContext(ValkeyModuleCtx *ctx);
void moduleInitModulesSystem(void);
void moduleInitModulesSystemLast(void);
void modulesCron(void);
-int moduleLoad(const char *path, void **argv, int argc, int is_loadex);
+int moduleLoad(const char *path, void **argv, int argc, int is_loadex, int from_include);
int moduleUnload(sds name, const char **errmsg);
+ void moduleUnloadAllModules(void);
void moduleLoadFromQueue(void);
- int moduleGetCommandKeysViaAPI(struct serverCommand *cmd, robj **argv, int argc, getKeysResult *result);
+diff --git a/src/server.c b/src/server.c
+index 881d83bad..a21d3ca9e 100644
+--- a/src/server.c
++++ b/src/server.c
+@@ -7630,7 +7630,7 @@ __attribute__((weak)) int main(int argc, char **argv) {
+ #ifdef LUA_ENABLED
+ #define LUA_LIB_STR STRINGIFY(LUA_LIB)
+ if (scriptingEngineManagerFind("lua") == NULL) {
+- if (moduleLoad(LUA_LIB_STR, NULL, 0, 0) != C_OK) {
++ if (moduleLoad(LUA_LIB_STR, NULL, 0, 0, 1) != C_OK) {
+ serverPanic("Lua engine initialization failed, check the server logs.");
+ }
+ }
+--
+2.53.0
+
diff --git a/valkey-lua.patch b/valkey-lua.patch
new file mode 100644
index 0000000..7e6d8f2
--- /dev/null
+++ b/valkey-lua.patch
@@ -0,0 +1,54 @@
+diff -up ./src/Makefile.old ./src/Makefile
+--- ./src/Makefile.old 2026-03-17 16:49:22.086043863 +0100
++++ ./src/Makefile 2026-03-17 17:02:31.748498351 +0100
+@@ -63,7 +63,7 @@ endif
+
+ PREFIX?=/usr/local
+ INSTALL_BIN=$(PREFIX)/bin
+-INSTALL_LIB=$(PREFIX)/lib
++INSTALL_LIB=$(PREFIX)/lib64
+ INSTALL=install
+ PKG_CONFIG?=pkg-config
+
+@@ -263,12 +263,10 @@ else
+ LUA_MODULE_INSTALL=install-lua-module
+
+ current_dir = $(shell pwd)
+- FINAL_CFLAGS+=-DLUA_ENABLED -DLUA_LIB=libvalkeylua.so
++ FINAL_CFLAGS+=-DLUA_ENABLED -DLUA_LIB=libvalkeylua.so -DLUA_LIB_PATH=/usr/lib64/valkey/modules/lua.so
+ ifeq ($(uname_S),Darwin)
+ FINAL_LDFLAGS+= -Wl,-rpath,$(PREFIX)/lib
+ FINAL_LDFLAGS+= -Wl,-rpath,$(current_dir)/modules/lua
+-else
+- FINAL_LDFLAGS+= -Wl,-rpath,$(PREFIX)/lib:$(current_dir)/modules/lua -Wl,--disable-new-dtags
+ endif
+ endif
+
+@@ -836,8 +834,8 @@ install: all $(LUA_MODULE_INSTALL)
+ $(call MAYBE_INSTALL_REDIS_SYMLINK,$(ENGINE_SENTINEL_NAME),$(INSTALL_BIN))
+
+ install-lua-module: $(LUA_MODULE)
+- @mkdir -p $(INSTALL_LIB)
+- $(call MAKE_INSTALL,$(LUA_MODULE),$(INSTALL_LIB))
++ @mkdir -p $(INSTALL_LIB)/valkey/modules
++ $(call MAKE_INSTALL,$(LUA_MODULE),$(INSTALL_LIB)/valkey/modules/lua.so)
+
+ uninstall:
+ @rm -f $(INSTALL_BIN)/{$(SERVER_NAME),$(ENGINE_BENCHMARK_NAME),$(ENGINE_CLI_NAME),$(ENGINE_CHECK_RDB_NAME),$(ENGINE_CHECK_AOF_NAME),$(ENGINE_SENTINEL_NAME)}
+diff -up ./src/server.c.old ./src/server.c
+--- ./src/server.c.old 2026-03-17 16:50:55.410170510 +0100
++++ ./src/server.c 2026-03-17 16:58:39.140382232 +0100
+@@ -7628,9 +7628,12 @@ __attribute__((weak)) int main(int argc,
+
+ /* Initialize the LUA scripting engine. */
+ #ifdef LUA_ENABLED
++/* LUA_LIB_PATH ini installation dir, LUA_LIB_STR in sources dir */
++#define LUA_LIB_PATH_STR STRINGIFY(LUA_LIB_PATH)
+ #define LUA_LIB_STR STRINGIFY(LUA_LIB)
+ if (scriptingEngineManagerFind("lua") == NULL) {
+- if (moduleLoad(LUA_LIB_STR, NULL, 0, 0, 1) != C_OK) {
++ if (moduleLoad(LUA_LIB_PATH_STR, NULL, 0, 0, 1) != C_OK &&
++ moduleLoad(LUA_LIB_STR, NULL, 0, 0, 1) != C_OK) {
+ serverPanic("Lua engine initialization failed, check the server logs.");
+ }
+ }
diff --git a/valkey-rdma.patch b/valkey-rdma.patch
new file mode 100644
index 0000000..edfd6ee
--- /dev/null
+++ b/valkey-rdma.patch
@@ -0,0 +1,26 @@
+diff --git a/deps/Makefile b/deps/Makefile
+index 94d938552..0e3466e68 100644
+--- a/deps/Makefile
++++ b/deps/Makefile
+@@ -54,7 +54,7 @@ endif
+ ifneq (,$(filter $(BUILD_RDMA),yes module))
+ LIBVALKEY_MAKE_FLAGS += USE_RDMA=1
+ ifneq (,$(filter $(BUILD_RDMA),module))
+- LIBVALKEY_MAKE_FLAGS += USE_DLOPEN_RDMA=1
++ LIBVALKEY_MAKE_FLAGS += USE_DLOPEN_RDMA=0
+ endif
+ endif
+
+diff --git a/src/Makefile b/src/Makefile
+index 73815ac2b..db2938ed4 100644
+--- a/src/Makefile
++++ b/src/Makefile
+@@ -373,7 +373,7 @@ RDMA_MODULE_NAME:=valkey-rdma$(PROG_SUFFIX).so
+ RDMA_MODULE_CFLAGS:=$(FINAL_CFLAGS)
+ ifeq ($(BUILD_RDMA),module)
+ FINAL_CFLAGS+=-DUSE_RDMA=$(BUILD_MODULE)
+- RDMA_CLIENT_LIBS = ../deps/libvalkey/lib/libvalkey_rdma.a
++ RDMA_CLIENT_LIBS = ../deps/libvalkey/lib/libvalkey_rdma.a $(RDMA_LIBS)
+ RDMA_MODULE=$(RDMA_MODULE_NAME)
+ RDMA_MODULE_CFLAGS+=-DUSE_RDMA=$(BUILD_MODULE) -DBUILD_RDMA_MODULE=$(BUILD_MODULE) $(RDMA_LIBS)
+ endif
diff --git a/valkey.spec b/valkey.spec
index 859c981..9b67f07 100644
--- a/valkey.spec
+++ b/valkey.spec
@@ -7,12 +7,12 @@
# See https://github.com/valkey-io/valkey-doc/tags
%global doc_version 9.0.2
-%global upstream_version 9.0.3
-#global upstream_prever rc3
+%global upstream_version 9.1.0
+%global upstream_prever rc1
Name: valkey
Version: %{upstream_version}%{?upstream_prever:~%{upstream_prever}}
-Release: 2%{?dist}
+Release: 1%{?dist}
Summary: A persistent key-value database
# valkey: BSD-3-Clause
# libvalkey: BSD-3-Clause
@@ -33,9 +33,11 @@ Source50: https://github.com/valkey-io/%{name}-doc/archive/%{doc_versio
Patch0: %{name}-conf.patch
# Workaround to https://github.com/valkey-io/valkey/issues/2678
Patch1: %{name}-loadmod.patch
-# Properly inherits linker flags for modules
-# See https://github.com/valkey-io/valkey/pull/3344
-Patch2: %{name}-bindnow.patch
+# clean rpath and set lua module path
+Patch2: %{name}-lua.patch
+# don't dlopen librdmacm libibverbs
+# for proper package dependencies
+Patch3: %{name}-rdma.patch
ExcludeArch: %{ix86}
@@ -52,7 +54,8 @@ BuildRequires: systemd-devel
BuildRequires: epel-rpm-macros
%endif
BuildRequires: systemd-rpm-macros
-BuildRequires: rdma-core-devel
+BuildRequires: pkgconfig(librdmacm)
+BuildRequires: pkgconfig(libibverbs)
BuildRequires: openssl-devel
%if %{with docs}
# for docs/man pages
@@ -85,6 +88,8 @@ Provides: valkey(modules_abi)%{?_isa} = %{valkey_modules_abi}
# sub-package was dropped
Obsoletes: valkey-tls < %{version}-%{release}
Provides: valkey-tls = %{version}-%{release}
+# mandatory, in main package
+Provides: valkey-lua = %{version}-%{release}
%description
@@ -149,7 +154,8 @@ See https://valkey.io/topics/RDMA/
%setup -qn %{name}-%{upstream_version}%{?upstream_prever:-%{upstream_prever}} -a50
%patch -P0 -p1 -b .rpm
%patch -P1 -p1 -b .loadmod
-%patch -P2 -p1 -b .bindnow
+%patch -P2 -p1 -b .lua
+%patch -P3 -p1 -b .rdma
mv deps/lua/COPYRIGHT COPYRIGHT-lua
mv deps/jemalloc/COPYING COPYING-jemalloc
@@ -268,8 +274,12 @@ install -pm755 src/valkey-rdma.so %{buildroot}%{valkey_modules_dir}/rdma.so
install -pm640 rdma.conf %{buildroot}%{valkey_modules_cfg}/rdma.conf
-%check
%if %{with tests}
+%check
+# Search path for libvalkeylua.so
+LD_LIBRARY_PATH=src/modules/lua
+export LD_LIBRARY_PATH
+
# https://github.com/redis/redis/issues/1417 (for "taskset -c 1")
taskset -c 1 ./runtest --clients 50 --skiptest "Active defrag - AOF loading"
@@ -312,6 +322,7 @@ exit 0
%attr(0640, valkey, root) %config(noreplace) %{_sysconfdir}/%{name}/sentinel.conf
%dir %{_libdir}/%{name}
%dir %{valkey_modules_dir}
+%{valkey_modules_dir}/lua.so
%dir %attr(0750, valkey, valkey) %{_sharedstatedir}/%{name}
%dir %attr(0750, valkey, valkey) %{_localstatedir}/log/%{name}
%{_bindir}/%{name}-*
@@ -344,6 +355,10 @@ exit 0
%changelog
+* Tue Mar 17 2026 Remi Collet <remi@remirepo.net> - 9.1.0~rc1
+- Valkey 9.1.0-rc1
+- Lua scripting engine moved into a Valkey module
+
* Wed Mar 11 2026 Remi Collet <remi@remirepo.net> - 9.0.3-2
- fix module linker flags using patch from
https://github.com/valkey-io/valkey/pull/3344