-
-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implemented PSETEX command #207
Implemented PSETEX command #207
Conversation
Codecov ReportBase: 80.31% // Head: 80.33% // Increases project coverage by
Additional details and impacted files@@ Coverage Diff @@
## main #207 +/- ##
==========================================
+ Coverage 80.31% 80.33% +0.02%
==========================================
Files 132 133 +1
Lines 7993 8012 +19
==========================================
+ Hits 6419 6436 +17
- Misses 1574 1576 +2
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. ☔ View full report at Codecov. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As for the SETEX command, just an additional check oh the value passed by the user is needed and nothing else
bool return_res = false; | ||
bool key_and_value_owned = false; | ||
module_redis_command_psetex_context_t *context = connection_context->command.context; | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Add a check to valiate that the value passed in greater than 0, if not the following error has to be returned
ERR invalid expire time in 'psetex' command
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done 👍
No description provided.