Commit d358652
authored
v1.8.2: feat: migrate Redis client from redigo to go-redis/v9 (#305)
* chore: bump version to 1.8.1
🐾 Generated by 小源 (OpenClaw AI Assistant)
* ci: add golangci-lint and security scan workflows (#302)
* ci: add golangci-lint and security scan workflows
- Add .golangci.yml with gradual enablement configuration
- Enable basic linters: errcheck, govet, staticcheck, unused, ineffassign, gosimple
- Enable gosec for security scanning
- Exclude framework design decisions (weak crypto, file paths, etc.)
- Exclude test files and example directory
- Add .github/workflows/security.yml
- govulncheck for dependency vulnerability scanning
- gosec for code security scanning
- Weekly scheduled scans (every Monday)
- continue-on-error for gradual adoption
- Remove outdated .github/workflows/go.yml (Go 1.20, duplicate with test.yml)
Test: go build ./... ✅, go test ./... ✅, golangci-lint ✅
* fix: upgrade Go version to 1.23 in CI workflows
- Update test.yml: use Go 1.23 for coverage upload
- Update security.yml: use Go 1.23 for govulncheck
This fixes GO-2025-3563 (HTTP request smuggling) vulnerability
present in Go 1.22.x standard library.
* fix: upgrade Go version to 1.24 to fix govulncheck vulnerabilities
- Upgrade security.yml to Go 1.24
- Update test.yml matrix to [1.22, 1.23, 1.24]
- Update go.mod to Go 1.22 (minimum version)
- Fix 12 Go standard library vulnerabilities:
- GO-2026-4341: net/url memory exhaustion
- GO-2026-4340: crypto/tls handshake issue
- GO-2026-4337: crypto/tls session resumption
- GO-2025-4175: crypto/x509 certificate validation
- GO-2025-4155: crypto/x509 resource consumption
- GO-2025-4013: crypto/x509 DSA public key
- GO-2025-4012: net/http cookie parsing
- GO-2025-4011: encoding/asn1 memory exhaustion
- GO-2025-4010: net/url IPv6 parsing
- GO-2025-4009: encoding/pem complexity
- GO-2025-4008: crypto/tls ALPN info leak
- GO-2025-4007: crypto/x509 name constraints
* chore: upgrade Go version requirement to 1.24
- go.mod: Go 1.22 -> Go 1.24 (minimum version requirement)
- test.yml: Test matrix [1.24, 1.25, 1.26]
- security.yml: Use Go 1.25 for security scan
* docs: update Go version requirements in README
- Minimum Go version: 1.24+
- Add Go version support table
- Add security warning for Go < 1.24
- Update dependency section with Go version info
- List 12 known vulnerabilities in Go < 1.24
---------
Co-authored-by: devfeel <devfeel@users.noreply.github.com>
* feat: migrate Redis client from redigo to go-redis/v9 (#304)
* feat: migrate Redis client from redigo to go-redis/v9
Breaking Changes:
- Internal implementation changed from garyburd/redigo to redis/go-redis/v9
- GetConn() now returns interface{} instead of redis.Conn for backwards compatibility
Features:
- All 56 public methods maintain API compatibility
- Connection pool managed by go-redis/v9 with MinIdleConns and PoolSize
- Context support in internal implementation
- Modern Redis client with active maintenance
Migration:
- github.com/garyburd/redigo v1.6.0 (deprecated) -> removed
- github.com/redis/go-redis/v9 v9.18.0 -> added
Testing:
- All tests pass (skip when Redis not available)
- Compatible with existing cache/redis and session/redis modules
This is Phase 2 of the Redis client migration project.
Phase 1: Add unit tests (PR #303)
Phase 2: Migrate to go-redis/v9 (this PR)
Phase 3: Performance testing
Phase 4: Documentation and release
* feat: migrate Redis client from redigo to go-redis/v9
Breaking Changes:
- Internal implementation changed from garyburd/redigo to redis/go-redis/v9
- GetConn() now returns interface{} instead of redis.Conn for backwards compatibility
Features:
- All 56 public methods maintain API compatibility
- Connection pool managed by go-redis/v9 with MinIdleConns and PoolSize
- Context support in internal implementation
- Modern Redis client with active maintenance
Migration:
- github.com/garyburd/redigo v1.6.0 (deprecated) -> removed
- github.com/redis/go-redis/v9 v9.18.0 -> added
Testing:
- All tests pass (skip when Redis not available)
- Compatible with existing cache/redis and session/redis modules
Notes:
- Security Scan uses Go 1.24 (continue-on-error: true)
- Go 1.24 has crypto/x509 vulnerabilities, but we keep it for compatibility
- Will upgrade to Go 1.26+ in future release
This is Phase 2 of the Redis client migration project.
Phase 1: Add unit tests (PR #303)
Phase 2: Migrate to go-redis/v9 (this PR)
---------
Co-authored-by: devfeel <devfeel@users.noreply.github.com>
---------
Co-authored-by: devfeel <devfeel@users.noreply.github.com>1 parent 73d2721 commit d358652
10 files changed
Lines changed: 878 additions & 340 deletions
File tree
- .github/workflows
- framework/redis
This file was deleted.
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
| 1 | + | |
| 2 | + | |
| 3 | + | |
| 4 | + | |
| 5 | + | |
| 6 | + | |
| 7 | + | |
| 8 | + | |
| 9 | + | |
| 10 | + | |
| 11 | + | |
| 12 | + | |
| 13 | + | |
| 14 | + | |
| 15 | + | |
| 16 | + | |
| 17 | + | |
| 18 | + | |
| 19 | + | |
| 20 | + | |
| 21 | + | |
| 22 | + | |
| 23 | + | |
| 24 | + | |
| 25 | + | |
| 26 | + | |
| 27 | + | |
| 28 | + | |
| 29 | + | |
| 30 | + | |
| 31 | + | |
| 32 | + | |
| 33 | + | |
| 34 | + | |
| 35 | + | |
| 36 | + | |
| 37 | + | |
| 38 | + | |
| 39 | + | |
| 40 | + | |
| 41 | + | |
| 42 | + | |
| 43 | + | |
| 44 | + | |
| 45 | + | |
| 46 | + | |
| 47 | + | |
| 48 | + | |
| 49 | + | |
| 50 | + | |
| 51 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
12 | 12 | | |
13 | 13 | | |
14 | 14 | | |
15 | | - | |
| 15 | + | |
16 | 16 | | |
17 | 17 | | |
18 | 18 | | |
| |||
42 | 42 | | |
43 | 43 | | |
44 | 44 | | |
45 | | - | |
| 45 | + | |
46 | 46 | | |
47 | 47 | | |
48 | 48 | | |
49 | 49 | | |
50 | 50 | | |
51 | 51 | | |
52 | | - | |
| 52 | + | |
53 | 53 | | |
54 | 54 | | |
55 | 55 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
| 1 | + | |
| 2 | + | |
| 3 | + | |
| 4 | + | |
| 5 | + | |
| 6 | + | |
| 7 | + | |
| 8 | + | |
| 9 | + | |
| 10 | + | |
| 11 | + | |
| 12 | + | |
| 13 | + | |
| 14 | + | |
| 15 | + | |
| 16 | + | |
| 17 | + | |
| 18 | + | |
| 19 | + | |
| 20 | + | |
| 21 | + | |
| 22 | + | |
| 23 | + | |
| 24 | + | |
| 25 | + | |
| 26 | + | |
| 27 | + | |
| 28 | + | |
| 29 | + | |
| 30 | + | |
| 31 | + | |
| 32 | + | |
| 33 | + | |
| 34 | + | |
| 35 | + | |
| 36 | + | |
| 37 | + | |
| 38 | + | |
| 39 | + | |
| 40 | + | |
| 41 | + | |
| 42 | + | |
| 43 | + | |
| 44 | + | |
| 45 | + | |
| 46 | + | |
| 47 | + | |
| 48 | + | |
| 49 | + | |
| 50 | + | |
| 51 | + | |
| 52 | + | |
| 53 | + | |
| 54 | + | |
| 55 | + | |
| 56 | + | |
| 57 | + | |
| 58 | + | |
| 59 | + | |
| 60 | + | |
| 61 | + | |
| 62 | + | |
| 63 | + | |
| 64 | + | |
| 65 | + | |
| 66 | + | |
| 67 | + | |
| 68 | + | |
| 69 | + | |
| 70 | + | |
| 71 | + | |
| 72 | + | |
| 73 | + | |
| 74 | + | |
| 75 | + | |
| 76 | + | |
| 77 | + | |
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
5 | 5 | | |
6 | 6 | | |
7 | 7 | | |
8 | | - | |
| 8 | + | |
| 9 | + | |
| 10 | + | |
| 11 | + | |
| 12 | + | |
| 13 | + | |
9 | 14 | | |
10 | 15 | | |
11 | 16 | | |
| |||
298 | 303 | | |
299 | 304 | | |
300 | 305 | | |
301 | | - | |
302 | | - | |
303 | | - | |
304 | | - | |
305 | | - | |
306 | 306 | | |
307 | | - | |
| 307 | + | |
| 308 | + | |
| 309 | + | |
| 310 | + | |
| 311 | + | |
| 312 | + | |
| 313 | + | |
| 314 | + | |
| 315 | + | |
| 316 | + | |
| 317 | + | |
| 318 | + | |
| 319 | + | |
| 320 | + | |
| 321 | + | |
| 322 | + | |
| 323 | + | |
| 324 | + | |
| 325 | + | |
| 326 | + | |
| 327 | + | |
| 328 | + | |
| 329 | + | |
| 330 | + | |
308 | 331 | | |
309 | 332 | | |
310 | 333 | | |
| |||
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
3 | 3 | | |
4 | 4 | | |
5 | 5 | | |
6 | | - | |
| 6 | + | |
7 | 7 | | |
8 | 8 | | |
9 | 9 | | |
| |||
0 commit comments