Skip to content

Conversation

@rjd15372
Copy link
Member

@rjd15372 rjd15372 commented Nov 7, 2025

The new module context flag VALKEYMODULE_CTX_SCRIPT_EXECUTION denotes that the module API function is being called in the context of a scripting engine execution.

@codecov
Copy link

codecov bot commented Nov 7, 2025

Codecov Report

❌ Patch coverage is 0% with 12 lines in your changes missing coverage. Please review.
✅ Project coverage is 72.41%. Comparing base (7f8c5b6) to head (16ba309).

Files with missing lines Patch % Lines
src/module.c 0.00% 12 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff            @@
##           unstable    #2818   +/-   ##
=========================================
  Coverage     72.40%   72.41%           
=========================================
  Files           128      128           
  Lines         70270    70272    +2     
=========================================
+ Hits          50880    50888    +8     
+ Misses        19390    19384    -6     
Files with missing lines Coverage Δ
src/module.c 9.78% <0.00%> (-0.01%) ⬇️

... and 11 files with indirect coverage changes

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

The new module context flag `VALKEYMODULE_CTX_SCRIPT_EXECUTION` denotes
that the module API function is being called in the context of a
scripting engine execution.

Signed-off-by: Ricardo Dias <ricardo.dias@percona.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

Status: No status

Development

Successfully merging this pull request may close these issues.

1 participant