SSH Tunneling in Connector/Net

A couple of years ago, MySQL Connector/Net shipped with a feature that allowed the connector to automatically create a SSH “tunnel” to a remote MySQL host. This could be useful in that it allows a remote MySQL host to only run with a secure port and a local client could connect to a local port to access it. We wrote about that feature in a blog post you can read here.

Today we are announcing that starting with the 8.0.24 release we are removing that feature. We decided to take this action for a few reasons. First, very few people were actually using the feature. Including a security sensitive feature that few people use is something we always want to examine. In addition, we were starting to encounter some friction between the encryption methods and ciphers that library supported and those that we wanted to support as an official Oracle product. And lastly, and as I’ll demonstrate with the following code, using the library to create your own tunnels is incredibly easy. By removing this library from our connector it helps to simplify our code paths possibly resulting in faster connections and fewer bugs and makes it clearer in your application code exactly what is happening.

To demonstrate how easy it is to create your own tunnels, do the following. First install the SSH.Net library found at https://github.com/sshnet/SSH.NET/. Then in your code you can do something like the following:

var key = new PrivateKeyFile(PrivateKeyPath,SSHServerPassword);
var method = new PrivateKeyAuthenticationMethod(SSHServerUserName, key);
ConnectionInfo conn = new ConnectionInfo(SSHServerHost, SSHServerPort, SSHServerUserName, method);

SshClient = new SshClient(conn);
SshClient.Connect();

ForwardedPortLocal forwardedPortLocal = new ForwardedPortLocal("127.0.0.1",3306, MySQLHost, MySQLPort);
SshClient.AddForwardedPort(forwardedPortLocal);
forwardedPortLocal.Start();

// Connector/Net can now connect to 127.0.0.1:3306 to connect to the remote MySQL host.

By splitting out the library it allows the end user to use all the features of the tunneling library to create the tunnel in just the way that is required and upgrade the tunneling library at the speed they are comfortable with.

We’re sorry for any inconvenience this might cause but we feel like this serves our customers better.

MySQL Shell 8.0.24 for MySQL Server 8.0 and 5.7 has been released

Dear MySQL users,

MySQL Shell 8.0.24 is a maintenance release of MySQL Shell 8.0 Series (a
component of the MySQL Server). The MySQL Shell is provided under Oracle’s
dual-license.

MySQL Shell 8.0 is highly recommended for use with MySQL Server 8.0 and 5.7.
Please upgrade to MySQL Shell 8.0.24.

MySQL Shell is an interactive JavaScript, Python and SQL console interface,
supporting development and administration for the MySQL Server. It provides
APIs implemented in JavaScript and Python that enable you to work with MySQL
InnoDB Cluster and use MySQL as a document store.

The AdminAPI enables you to work with MySQL InnoDB Cluster and InnoDB
ReplicaSet, providing integrated solutions for high availability and
scalability using InnoDB based MySQL databases, without requiring advanced
MySQL expertise.  For more information about how to configure and work with
MySQL InnoDB Cluster and MySQL InnoDB ReplicaSet see

https://dev.mysql.com/doc/mysql-shell/8.0/en/admin-api-userguide.html

The X DevAPI enables you to create “schema-less” JSON document collections and
perform Create, Update, Read, Delete (CRUD) operations on those collections
from your favorite scripting language.  For more information about how to use
MySQL Shell and the MySQL Document Store support see

https://dev.mysql.com/doc/refman/en/document-store.html

For more information about the X DevAPI see

https://dev.mysql.com/doc/x-devapi-userguide/en/

If you want to write applications that use the the CRUD based X DevAPI you can
also use the latest MySQL Connectors for your language of choice. For more
information about Connectors see

https://dev.mysql.com/doc/index-connectors.html

For more information on the APIs provided with MySQL Shell see

https://dev.mysql.com/doc/dev/mysqlsh-api-javascript/8.0/

and

https://dev.mysql.com/doc/dev/mysqlsh-api-python/8.0/

Using MySQL Shell’s SQL mode you can communicate with servers using the legacy
MySQL protocol. Additionally, MySQL Shell provides partial compatibility with
the mysql client by supporting many of the same command line options.

For full documentation on MySQL Server, MySQL Shell and related topics, see

https://dev.mysql.com/doc/mysql-shell/8.0/en/

For more information about how to download MySQL Shell 8.0.24, see the “General
Availability (GA) Releases” tab at

http://dev.mysql.com/downloads/shell/

We welcome and appreciate your feedback and bug reports, see

http://bugs.mysql.com/

Enjoy!

Changes in MySQL Shell 8.0.24 (2021-04-20, General Availability)


     * AdminAPI Added or Changed Functionality

     * AdminAPI Bugs Fixed

     * Functionality Added or Changed

     * Bugs Fixed

AdminAPI Added or Changed Functionality


     * The API command-line integration, used for scripting
       MySQL Shell, has been improved to use the function and
       option metadata to properly parse arguments and associate
       them to the corresponding parameter in the API call.
       Previously, the command-line integration was processing
       all the arguments as strings, causing errors using
       operations such as:

mysqlsh user@hostname:3306 — cluster setOption “autoRejoinTries”  5

       The command-line integration now interprets the data
       being passed in based on what the API functions expect to
       receive. This enhancement also introduces support for
       lists in command-line integration calls.
       Additionally, you can now access the MySQL Shell online
       help from the command-line integration. For example, to
       get help on the shell.options functions, issue:
$ mysqlsh — shell options –help

       For more information, see API Command Line Integration
(https://dev.mysql.com/doc/mysql-shell/8.0/en/mysql-shell-command-line-integration.html).
       In addition, when registering a new MySQL Shell extension
       function, the new boolean cli option is supported by the
       shell.addExtensionObjectMember() operation. When an
       operation is registered with the cli option set to true,
       the object and the functions are made available for the
       command-line integration. This enables you to extend the
       scripting possibilities of MySQL Shell. (Bug #31186637)

AdminAPI Bugs Fixed


     * Most of the AdminAPI operations contain metadata
       preconditions to determine if it is valid or not to
       execute them. When this check was being done, it was
       adding two entries to the log, one to indicate the check
       was about to be done, and another to indicate the
       metadata state. This meant that operations such as
       monitoring a cluster, which implies executing regular
       status requests, resulted in a large number of log
       entries. Now, these two log messages have been merged
       into a single entry that gets logged at the info level
       when the metadata state is not correct, and as debug info
       when the state is correct. In other words, if the
       metadata state is correct, the message is only logged
       when log_level=debug. (Bug #32582745)

     * The memberRole is now included in the default output of
       Cluster.status(). Previously, this information was only
       included when the extended option had a value of 1 or
       higher. This makes it easier to know what an instance’s
       role is in the cluster, regardless of whether its
       operating mode is R/W or R/O. (Bug #32381513)

     * dba.checkInstanceConfiguration() was performing an
       incorrect validation regarding the required privileges.
       This resulted in an endless loop where the operation
       detected missing privileges, you would give the grants as
       specified by the interactive help, but the operation
       would fail, indicating that the grants were missing. Now,
       the verification checks the correct list. Additionally,
       the internal list of required grants included SUPER,
       which is deprecated in 8.0. The fix replaces the SUPER
       grant with the fine-grained grants. (Bug #32287986)

     * The memberSslMode option did not support the VERIFY_CA
       and VERIFY_IDENTITY modes for the following operations:

          + dba.createCluster()

          + Cluster.addInstance()

          + Cluster.rejoinInstance()
       Now, the memberSslMode option supports these modes, and
       when they are used there is a validation to ensure that
       the CA certificates are supplied. If you choose to use
       the VERIFY_CA or VERIFY_IDENTITY mode, on each cluster
       instance you must manually supply the CA certificates
       using the ssl_ca and/or ssl_capath option. For more
       information, see Securing your Cluster
(https://dev.mysql.com/doc/mysql-shell/8.0/en/configuring-innodb-cluster.html#mysql-innodb-cluster-securing).
       Thanks to Daniël van Eeden for the contribution. (Bug
       #32247631, Bug #32241000)

     * In version 8.0.23, a check was added to verify if the
       server_id of all cluster instances is registered in the
       metadata as an instance attribute, and if not then the
       metadata is updated accordingly. This check is executed
       on add, rejoin and rescan operations. However, when
       upgrading a cluster from a version earlier than 8.0.23 to
       version 8.0.23 and higher, the server_id was not
       registered in the metadata unless you performed a manual
       rejoin. This was being silently ignored because it was
       not included in any diagnostic messages. Now, a new
       verification checks if the server_id of cluster instances
       is missing from the metadata and includes a note message
       in the instanceErrors attribute in the output of
       Cluster.status() indicating to use Cluster.rescan() to
       fix it. (Bug #32226871)

     * From MySQL Shell version 8.0.17, AdminAPI stores the
       replication or recovery accounts used for each added
       instance in the metadata schema, in the instances table.
       However, the specific transaction could fail or that
       entry might have been manually removed from the metadata
       schema, resulting in failures when trying to add other
       instances to the cluster, and there was no way to resolve
       this using AdminAPI. In such a situation, if you tried to
       add an instance the operation failed with an error. Now,
       AdminAPI tries to detect problems in the metadata related
       to these accounts for an InnoDB Cluster or InnoDB
       ReplicaSet. The status() operation prints a message if
       the required account is missing in the metadata schema,
       and also if it is not the one actually used. In such
       situations, the MySQL Shell help instructs you to either
       re-add the instance or run rescan() based on the detected
       problem. The addInstance() operation also prints a hint
       to call rescan() if any missing recovery users are found
       in the metadata. (Bug #32157182)

     * Cluster.addInstance() was permitting usage of the
       expelTimeout and consistency options when it should not.
       These options are cluster level settings that can only be
       set using dba.createCluster() and Cluster.setOption().
       (Bug #29779995)

     * The dba.checkInstanceConfiguration() operation detects if
       the instance has any tables that do not have a primary
       key. Group Replication requires every table that is to be
       replicated by the group to have a defined primary key.
       However, this does not mean that having a table without a
       primary key causes Group Replication to block or fail.
       Rather, the outcome is that changes to that table are not
       replicated but the group continues operating. Previously,
       if the dba.checkInstanceConfiguration() operation
       detected a table without a primary key, the operation
       returned with a status of ok and only mentioned tables
       with a missing primary key and unsupported engines. Now,
       if the operation detects such a table, it returns with a
       status of error. As part of this work, the
       dba.createCluster() operation has been changed to fail if
       it finds such tables. (Bug #29771457)

     * As part of the fix for Bug#28701263, AdminAPI started
       setting and persisting a default value of READ_ONLY for
       the group_replication_exit_state_action system variable.
       The default used by Group Replication was ABORT_SERVER.
       However, in MySQL Server 8.0.16 the default value of
       group_replication_exit_state_action became READ_ONLY so
       AdminAPI should not change and persist it. Now, on
       instances running 8.0.16 and later, the value of
       group_replication_exit_state_action is not modified. (Bug
       #29037274)

     * The exception information listed in the online help had
       become outdated and unwieldy for the interactive MySQL
       Shell, so it has been removed. (Bug #28542904)
       References: See also: Bug #29853828, Bug #32426083, Bug
       #32157120, Bug #28825389.

     * Using the allowRootFrom option with the
       dba.deploySandboxInstance() operation was creating a
       different remote root account depending on whether MySQL
       Shell was running in interactive mode or not. Now, the
       default value of allowRootFrom is consistent between both
       modes, and the account is created as root@% in both
       interactive and non-interactive mode. (Bug #27369121)

     * When you issue dba.createCluster() and
       dba.createReplica(), tables are created to store the
       metadata. If the default storage engine was not InnoDB,
       these operations could fail. Now, metadata creation
       operations always use the InnoDB storage engine. (Bug
       #101446, Bug #32110085)

Functionality Added or Changed


     * From MySQL 8.0.24, SQL statements that you issue in MySQL
       Shell’s SQL mode can be sent to the operating system’s
       system logging facility (syslog on Unix, or the Windows
       Event Log). You can select this option by specifying the
       –syslog command-line option when starting MySQL Shell,
       or by setting the history.sql.syslog MySQL Shell
       configuration option. SQL statements that would be
       excluded from the MySQL Shell code history are also
       excluded from the system logging facility. (Bug
       #31995742, Bug #31514599)

     * MySQL Shell’s instance dump utility util.dumpInstance(),
       schema dump utility util.dumpSchemas(), and table dump
       utility util.dumpTables() can now check for tables that
       do not contain primary keys. The check is carried out
       when the ocimds option is enabled for checking
       compatibility with MySQL Database Service, and an error
       is reported for every table included in the dump that
       does not have a primary key. The compatibility option,
       which implements appropriate measures for compatibility,
       has two new modification choices to notify MySQL Shell’s
       dump loading utility to create primary keys in invisible
       columns for tables that do not have them, or to ignore
       the missing primary keys. Primary keys are required for
       MySQL Database Service High Availability, which uses
       Group Replication.

Bugs Fixed


     * Previously, MySQL Shell retried requests to Oracle Cloud
       Infrastructure Object Storage a maximum of 5 times, with
       a 30 second wait in between retries, and a maximum
       overall wait of 5 minutes. The retry strategy has now
       been changed to increase the wait window and reduce the
       possibility of a dump or load operation failing. MySQL
       Shell now retries a maximum of 10 times, with a 1 minute
       wait in between retries, and a maximum overall wait of 10
       minutes. (Bug #32592962)

     * MySQL Shell’s instance dump utility util.dumpInstance()
       stopped with an error if the last schema to be dumped was
       a schema that contained no tables. The issue has now been
       fixed. (Bug #32540460)

     * MySQL Shell’s instance dump utility util.dumpInstance()
       has been optimized so that it can still be used
       successfully if there are limitations on the server’s
       resources such as disk space or the thread stack. To
       handle such situations, the queries from the utility can
       be repeated to retrieve smaller chunks of data if
       required, and file sorting is avoided. (Bug #32528186)

     * MySQL Shell’s instance dump utility util.dumpInstance()
       incorrectly removed grants of all privileges to users.
       The utility now expands GRANT ALL statements in the dump
       to list all privileges granted on all schemas and tables
       (*.*), and to list allowed privileges for system schemas.
       The dump loading utility util.loadDump() now extracts the
       lists of allowed and revoked global privileges during
       loading, and strips these from GRANT statements relating
       to system schemas and to all schemas and tables. (Bug
       #32526567)

     * MySQL Shell’s dump loading utility util.loadDump() now
       grants privileges after all the data is loaded.
       Previously, an error could occur if the utility tried to
       grant a privilege on a routine that did not yet exist.
       (Bug #32526496)

     * MySQL Shell’s instance dump utility util.dumpInstance(),
       schema dump utility util.dumpSchemas(), and table dump
       utility util.dumpTables() could not complete the dump if
       the gtid_executed system variable or the Information
       Schema’s COLUMN_STATISTICS table was unavailable. The
       utilities now display a warning message and log a
       detailed error message in this situation. These items are
       not required for a successful dump. (Bug #32515696)

     * MySQL Shell’s handling and formatting has been improved
       for the help text that you provide for dictionary
       parameters and their options when you register a Python
       plugin. (Bug #32509309)

     * MySQL Shell’s instance dump utility util.dumpInstance(),
       schema dump utility util.dumpSchemas(), and table dump
       utility util.dumpTables() no longer write a FLUSH TABLES
       statement to the binary log, as this can interfere with
       replication. (Bug #32490714)

     * From MySQL 8.0.23, MySQL Server supports replication from
       a source server that does not have GTIDs enabled and does
       not use GTID-based replication, to a replica that has
       GTIDs enabled, using the
       ASSIGN_GTIDS_TO_ANONYMOUS_TRANSACTIONS option of the
       CHANGE REPLICATION SOURCE TO statement. MySQL Shell’s
       instance dump utility util.dumpInstance(), schema dump
       utility util.dumpSchemas(), and table dump utility
       util.dumpTables() now support this functionality by
       storing the binary log file name and position in the dump
       metadata, in addition to the gtid_executed GTID set. The
       additional privilege REPLICATION CLIENT is required in
       order for the utilities to be able to collect this
       information, although if the user ID does not have that
       privilege, the dump continues but without the binary log
       information.
       The binary log information can be used after loading the
       dumped data into the replica server to set up replication
       with a non-GTID source server. MySQL Shell’s dump loading
       utility util.loadDump() prints the binary log and GTID
       set information from the dump metadata (in YAML format)
       when you specify the new option showMetadata: true. (Bug
       #32430402)

     * MySQL Shell did not correctly handle an empty array that
       was added to a collection. The result set normally
       returned from the server is now skipped in this
       situation. (Bug #32377134)

     * MySQL Shell’s instance dump utility util.dumpInstance(),
       schema dump utility util.dumpSchemas(), and table dump
       utility util.dumpTables() were unable to chunk table data
       from a MySQL 5.6 server instance, due to differences in
       the output of the EXPLAIN SELECT statement for that
       version. The utilities now account for the difference,
       and also cache the server version information for faster
       access. (Bug #32376447)

     * MySQL Shell’s parallel table import utility
       util.importTable() set a zero exit code if a non-critical
       error occurred that did not interrupt the import, such as
       a directory or file not being found. The utility now sets
       a non-zero error code instead when the first non-critical
       error is observed. (Bug #32286186)

     * MySQL Shell’s upgrade checker utility
       util.checkForServerUpgrade() now checks for spatial data
       columns that were originally created in MySQL 5.6. The
       underlying data type for such columns in MySQL 5.6 does
       not match their underlying data type in MySQL 8.0, so
       upgrade of the table is prohibited, and it must be
       recreated. (Bug #32257211, Bug #101944)

     * When MySQL Shell casts a string to a boolean value, the
       operation is now case insensitive. Previously, the
       results could differ between platforms. (Bug #32217910)

     * When MySQL Shell’s \warnings command was used to show
       warnings after each statement, warnings were not
       displayed for a classic MySQL protocol connection. (Bug
       #32151137)

     * MySQL Shell’s parallel table import utility
       util.importTable() now checks whether an uploaded object
       is a directory, and excludes these from wildcard matching
       that was specified for files. (Bug #31991122)

     * MySQL Shell’s dump loading utility util.loadDump() can
       split oversized chunks of data into smaller chunks for
       upload. Previously, if loading was stopped then resumed
       partway through this stage, the rows in the smaller
       chunks that were already loaded were not taken into
       account and skipped, which could lead to deadlocks. The
       utility’s progress file now records the smaller chunks
       individually so that they can be skipped if the load is
       stopped and resumed. (Bug #31961688)

     * An event that contained a sequence of two semi-colons
       caused MySQL Shell’s instance dump utility
       util.dumpInstance(), schema dump utility
       util.dumpSchemas(), and table dump utility
       util.dumpTables() to enter an infinite loop looking for
       delimiters. (Bug #31820571)

     * The decodeColumns option for MySQL Shell’s parallel table
       import utility util.importTable() could be specified
       without an accompanying columns option, resulting in the
       import stopping with an error. (Bug #31407058)

     * If a script that was run interactively in MySQL Shell’s
       Python mode did not have a newline character at the end,
       and the script ended with a multiline command, MySQL
       Shell waited for input instead of processing the command.
       The user had to press Enter to finish running the script,
       and the last line of the script was incorrectly saved in
       MySQL Shell’s code history. MySQL Shell now adds an empty
       line after processing a script input stream, to ensure
       that this situation does not occur. (Bug #30765725)

     * MySQL Shell used a different character set for collations
       depending on whether X Protocol or classic MySQL protocol
       was used to connect to the MySQL server instance, leading
       to inconsistency and in some situations, errors. For
       MySQL 5.7 instances, MySQL Shell now uses a SET NAMES
       statement to set all the relevant session system
       variables to the utf8mb4 character set. For MySQL 8.0
       instances, MySQL Shell now sets the collation_connection
       system variable to the utf8mb4_0900_ai_ci character set.
       (Bug #30516645)

Enjoy and thanks for the support!

On Behalf of the MySQL Engineering Team,
Nawaz Nazeer Ahamed

MySQL Connector/J 8.0.24 has been released

Dear MySQL users,

MySQL Connector/J 8.0.24 is the latest General Availability release of the
MySQL Connector/J 8.0 series.  It is suitable for use with MySQL Server
versions 8.0 and 5.7.  It supports the Java Database Connectivity (JDBC)
4.2 API, and implements the X DevAPI.

This release includes the following new features and changes, also described in
more detail on

https://dev.mysql.com/doc/relnotes/connector-j/8.0/en/news-8-0-24.html

As always, we recommend that you check the “CHANGES” file in the download
archive to be aware of changes in behavior that might affect your application.

To download MySQL Connector/J 8.0.24 GA, see the “General Availability (GA)
Releases” tab at http://dev.mysql.com/downloads/connector/j/

Enjoy!

Changes in MySQL Connector/J 8.0.24 (2021-04-20, General Availability)

     * Functionality Added or Changed

     * Bugs Fixed

Functionality Added or Changed


     * X DevAPI: For X Protocol connections, the Server now
       provides three new kinds of notifications for
       disconnections:

          + Server shutdown: This is due to a server shutdown.
            It causes Connector/J to terminate all active and
            idle sessions connected to the server in the
            connection pool with the error message “Server
            shutdown in progress”.

          + Connection idle: This is due to the connection
            idling for longer than the relevant timeout
            settings. It causes Connector/J to close the current
            connection with the error message “IO Read error:
            read_timeout exceeded”.

          + Connection killed: This is due to the connection
            being killed by another client session. It causes
            Connector/J to close the connection in the current
            session with the error message “Session was killed”.

     * A new connection property, scrollTolerantForwardOnly, has
       been introduced, which preserved the legacy behavior of
       Connector/J 8.0.17 and earlier by tolerating backward and
       absolute cursor movements on result sets of type
       ResultSet.TYPE_FORWARD_ONLY. This is for maintaining
       compatibility with legacy code that took advantage of the
       old behavior. See the description for
       scrollTolerantForwardOnly for details. (Bug #31747910)
       References: See also: Bug #30474158.

     * Connector/J now supports “userless” authentication for
       JDBC connections: When the user for the connection is
       unspecified, Connector/J uses the name of the OS user who
       runs the application for authentication with the MySQL
       server. See Connector/J: Obtaining a connection from the
       DriverManager
(https://dev.mysql.com/doc/connector-j/8.0/en/connector-j-usagenotes-connect-drivermanager.html#connector-j-examples-connection-drivermanager)
       for more details.

     * Starting from this release, whenever an authentication
       plugin is explicitly set for the connection property
       defaultAuthenticationPlugin
(https://dev.mysql.com/doc/connector-j/8.0/en/connector-j-connp-props-connection.html#cj-conn-prop_defaultAuthenticationPlugin),
       the specified plugin takes precedence over
       the server’s default when Connector/J negotiates a plugin
       with the server. There is no behavioral change for
       Connector/J if no value is explicitly set for the
       property, in which case the server’s choice of default
       plugin takes precedence over the implicit default of
       mysql_native_password for Connector/J. See the
       description of defaultAuthenticationPlugin
(https://dev.mysql.com/doc/connector-j/8.0/en/connector-j-connp-props-connection.html#cj-conn-prop_defaultAuthenticationPlugin)
       for details.

     * In the past, for JDBC connections, when the server closed
       a session because a client was idling beyond the period
       specified by the server’s wait_timeout system variable,
       Connector/J returned a generic IO error. Connector/J now
       relays a clearer error message from the server.

Bugs Fixed


     * X DevAPI: Concurrently getting and closing multiple
       sessions from the same X DevAPI Client object might
       result in a ConcurrentModificationException thrown by
       Connector/J at the closing of a session. (Bug #31699993)

     * X DevAPI: Under some specific conditions, when using
       Deflate as the algorithm for compression of X Protocol
       connections, Connector/J threw an
       AssertionFailedException (ASSERTION FAILED: Unknown
       message type: 57). It was because when a compressed
       packet was just a few bytes longer than the size of some
       internal buffer used by a Java InflaterInputStream, the
       leftover bytes from the inflate procedure were being
       discarded by Connector/J, causing inflation of subsequent packets
       to fail. With this fix, no data bytes are discarded, and
       the inflation works as expected. (Bug #31510398, Bug
       #99708)

     * When a SecurityManager was in place, connections to a
       MySQL Server could not be established unless the client
       had been properly configured to use SASL-based LDAP
       authentication. It was because the
       AuthenticationLdapSaslClientPlugin in Connector/J
       requires a special permission to load the provider
       MySQLScramShaSasl when a SecurityManager is in place; but
       since the provider was loaded by a static initializer
       during initialization for the plugin, the lack of the
       permission was causing an error and then failures for all
       connections, even if the plugin was never used or
       enabled. This fix changes how the provider is loaded: the
       loading now happens only at the plugin instance’s
       initialization and the initialization was deferred to the
       time when the plugin is actually needed, so that
       connections that do not use SASL-based LDAP
       authentication are unaffected by security settings
       regarding the plugin. (Bug #32526663, Bug #102188)

     * When using Connector/J 8.0.23,
       ResultSetMetaData.getColumnClassName() did not return the
       correct class name corresponding to DATETIME columns.
       (Bug #32405590, Bug #102321)

     * Creation of an UpdatableResultSet failed with a
       NullPointerException when it was generated by querying a
       view with a derived value. (Bug #32338451, Bug #102131)

     * Using getLong() on the CHAR_OCTET_LENGTH column of the
       ResultSet for DatabaseMetaData.getProcedureColumns() (or
       getFunctionColumns()) resulted in a NumberOutOfRange
       exception when the column’s value exceeded 2^32 − 1. With
       this patch, the value of 2^32 − 1 is returned in the
       situation. (Bug #32329915, Bug #102076)

     * Connections to a server could not be established when the
       user supplied an implementation of the
       ConnectionPropertiesTransform interface using the
       connection property propertiesTransform. This was because
       Connector/J called PropertyKey.PORT.getKeyName() instead
       of PropertyKey.HOST.getKeyName() for getting the host
       name, and that has been corrected by this fix. (Bug
       #32151143, Bug #101596)

     * A NullPointerException was returned when a statement that
       could not be used as a ServerPreparedStatement was
       executed and the connection property useUsageAdvisor
(https://dev.mysql.com/doc/connector-j/8.0/en/connector-j-connp-props-debugging-profiling.html#cj-conn-prop_useUsageAdvisor)
       was set to true. With this fix, a SQLException
       is returned instead. (Bug #32141210, Bug #101558)

     * Using the setSessionMaxRows() method on a closed
       connection resulted in a NullPointerException. With this
       fix, a SQLNonTransientConnectionException is thrown
       instead, with the error message “No operations allowed
       after connection closed.” (Bug #22508715)

     * Using the setObject() method for a target type of
       Types.TIME resulted in a SQLException when the value to
       be set had a fractional part, or when the value did not
       fit any pattern described in Date and Time Literals
(https://dev.mysql.com/doc/refman/8.0/en/date-and-time-literals.html).
       This patch introduced a new logic that can
       handle fractional parts; also, it performs the conversion
       according to the patterns of the literals and, when
       needed, the target data type. (Bug #20391832)

Enjoy and thanks for the support!

On Behalf of the MySQL Engineering Team,
Nawaz Nazeer Ahamed

MySQL Connector/C++ 8.0.24 has been released

Dear MySQL users,

MySQL Connector/C++ 8.0.24 is a new release version of the MySQL
Connector/C++ 8.0 series.

Connector/C++ 8.0 can be used to access MySQL implementing Document
Store or in a traditional way, using SQL queries. It allows writing
both C++ and plain C applications using X DevAPI and X DevAPI for C.
It also supports the legacy API of Connector/C++ 1.1 based on JDBC4.

To learn more about how to write applications using X DevAPI, see
“X DevAPI User Guide” at

https://dev.mysql.com/doc/x-devapi-userguide/en/

See also “X DevAPI Reference” at

https://dev.mysql.com/doc/dev/connector-cpp/devapi_ref.html

and “X DevAPI for C Reference” at

https://dev.mysql.com/doc/dev/connector-cpp/xapi_ref.html

For generic information on using Connector/C++ 8.0, see

https://dev.mysql.com/doc/dev/connector-cpp/

For general documentation about how to get started using MySQL
as a document store, see

http://dev.mysql.com/doc/refman/8.0/en/document-store.html

To download MySQL Connector/C++ 8.0.24, see the “General Availability (GA)
Releases” tab at

https://dev.mysql.com/downloads/connector/cpp/

Changes in MySQL Connector/C++ 8.0.24 (2021-04-20, General
Availability)

Connection Management Notes

   * Previously, for client applications that use the legacy
     JDBC API (that is, not X DevAPI or X DevAPI for C), if
     the connection to the server was not used within the
     period specified by the wait_timeout system variable and
     the server closed the connection, the client received no
     notification of the reason. Typically, the client would
     see Lost connection to MySQL server during query
     (CR_SERVER_LOST) or MySQL server has gone away
     (CR_SERVER_GONE_ERROR).
     In such cases, the server now writes the reason to the
     connection before closing it, and client receives a more
     informative error message, The client was disconnected by
     the server because of inactivity. See wait_timeout and
     interactive_timeout for configuring this behavior.
     (ER_CLIENT_INTERACTION_TIMEOUT).
     The previous behavior still applies for client
     connections to older servers and connections to the
     server by older clients.

   * For connections made using X Plugin, if client with a
     connection to a server remains idle (not sending to the
     server) for longer than the relevant X Plugin timeout
     setting (read, write, or wait timeout), X Plugin closes
     the connection. If any of these timeouts occur, the
     plugin returns a warning notice with the error code
     ER_IO_READ_ERROR to the client application.
     For such connections, X Plugin now also sends a warning
     notice if a connection is actively closed due to a server
     shutdown, or by the connection being killed from another
     client session. In the case of a server shutdown, the
     warning notice is sent to all authenticated X Protocol
     clients with open connections, with the
     ER_SERVER_SHUTDOWN error code. In the case of a killed
     connection, the warning notice is sent to the relevant
     client with the ER_SESSION_WAS_KILLED error code, unless
     the connection was killed during SQL execution, in which
     case a fatal error is returned with the
     ER_QUERY_INTERRUPTED error code.
     If connection pooling is used and a connection close
     notice is received in a session as a result of a server
     shutdown, all other idle sessions that are connected to
     the same endpoint are removed from the pool.
     Client applications can use the warning notices to
     display to users, or to analyze the reason for
     disconnection and decide whether to attempt reconnection
     to the same server, or to a different server.

Packaging Notes

   * Connector/C++ packages now include sasl2 modules due to
     connection failures for accounts that use the
     authentication_ldap_sasl authentication plugin. (Bug
     #32175836)

Bugs Fixed

   * Upon connecting to the server, Connector/C++ executed a
     number of SHOW [SESSION] VARIABLES statements to retrieve
     system variable values. Such statements involve locking
     in the server, so they are now avoided in favor of SELECT
     @@var_name statements.
     Additionally, Connector/C++ was trying to fetch the value
     of the max_statement_time system variable, which has been
     renamed to max_execution_time. Connector/C++ now uses the
     correct variable name, with the result that
     getQueryTimeout() and setQueryTimeout() now work properly
     for both Statement and Prepared Statement objects. (Bug
     #28928712, Bug #93201)

   * DatabaseMetaData.getProcedures() failed when the
     metadataUseInfoSchema connection option was false. (Bug
     #24371558)

On Behalf of the Oracle/MySQL Engineering Team,
Tvarita Jain

MySQL Connector/NET 8.0.24 has been released

Dear MySQL users,

MySQL Connector/NET 8.0.24 is the latest General Availability release
of the MySQL Connector/NET 8.0 series. This version supports .NET 5.0
and the X DevAPI, which enables application developers to write code
that combines the strengths of the relational and document models
using a modern, NoSQL-like syntax that does not assume previous
experience writing traditional SQL.

To learn more about how to write applications using the X DevAPI, see

http://dev.mysql.com/doc/x-devapi-userguide/en/

For more information about how the X DevAPI is implemented in
Connector/NET, see

http://dev.mysql.com/doc/dev/connector-net

NuGet packages provide functionality at a project level. To get the
full set of features available in Connector/NET such as availability
in the GAC, integration with Visual Studio’s Entity Framework Designer
and integration with MySQL for Visual Studio, installation through the
MySQL Installer or the stand-alone MSI is required.

Please note that the X DevAPI requires at least MySQL Server version
8.0 or higher with the X Plugin enabled. For general documentation
about how to get started using MySQL as a document store, see

http://dev.mysql.com/doc/refman/8.0/en/document-store.html

To download MySQL Connector/NET 8.0.24, see

http://dev.mysql.com/downloads/connector/net/

Installation instructions can be found at

https://dev.mysql.com/doc/connector-net/en/connector-net-installation.html

Changes in MySQL Connector/NET 8.0.24 (2021-04-20, General
Availability)

Functionality Added or Changed

   * The IgnorePrepare connection-string option was deprecated
     in the Connector/NET 8.0.23 release and removed in the
     Connector/NET 8.0.24 release.
     The removed option instructed Connector/NET to ignore all
     calls to MySqlCommand.Prepare() that were made using the
     classic MySQL protocol. (Bug #31872906)

   * Improved server disconnection handling of X Protocol
     connections now creates a log entry and returns an error
     message, as needed, after Connector/NET receives a
     connection-close notice from the server. Connector/NET
     detects three new types of warning notices.

     Connection idle notice.  This notice applies to a server
     connection that remains idle for longer than the relevant
     timeout setting. Connector/NET closes the connection when
     it receives the notice in an active session or while a
     new session is being created. An attempt to use the
     invalid session returns the “Connection closed. Reason:
     connection idle too long” error message.

     Server shutdown notice.  If a connection-close notice is
     received in a session as a result of a server shutdown,
     Connector/NET terminates the session with the “Connection
     closed. Reason: server shutdown” error message. All other
     sessions that are connected to the same endpoint are
     removed from the pool, if connection pooling is used.

     Connection killed notice.  If the connection being killed
     from another client session, Connector/NET closes the
     connection when it receives the notice in an active
     session or while a new session is being created. An
     attempt to use the invalid session returns the
     “Connection closed. Reason: connection killed by a
     different session” error message.

   * If a classic MySQL protocol connection experiences a
     server timeout, Connector/NET now reports more precise
     disconnection information to affected .NET applications
     when the server provides improved error messages.

   * Previously, Connector/NET added client support for the
     MySQL Enterprise Edition SASL LDAP authentication plugin
     with SCRAM-SHA-1 and SCRAM-SHA-256 as authentication
     methods. Connector/NET now also supports GSSAPI/Kerberos
     as an alternative authentication method for classic MySQL
     protocol connections. SASL-based LDAP authentication does
     not apply to clients running macOS.

   * The SSH Tunneling (port forwarding) feature, which was
     added to support MySQL products in making secure
     connections on Windows, is no longer needed by other
     products. Now, using an alternative such as OCI or
     SSH.NET to create a tunnel is preferred. The related
     connection options (SshHostName, SshKeyFile,
     SshPassPhrase, SshPassword, SshPort, and SshUserName) are
     no longer valid when making Connector/NET connections,
     starting with this release.

Bugs Fixed

   * Pound symbols in JSON columns were interpreted improperly
     when using accent-sensitive collation. (Bug #32429236)

   * Several data types could not be mapped by running
     Scaffold-DbContext on valid MySQL tables. This fix
     upgrades Microsoft Entity Framework libraries to the
     latest and also adds all previously excluded mappings to
     the EFCore and EFCore5 projects. (Bug #32424742, Bug
     #102381)

   * Constructing a regular expression for each read
     diminished the performance of Connector/NET. This fix
     limits the construction to one instance, which now is
     reused. (Bug #32386454, Bug #101714)

   * A data table declared using valid database.table syntax
     within an Entity Framework model could have extra
     database names in the generated query (for example,
     database.database.table). (Bug #32358174, Bug #101236)

   * Incomplete GUID mapping in the Entity Framework Core
     implementation caused an error when the Contains method
     was used to filter records. (Bug #32173133, Bug #93398)

   * Additional error codes now prevent unexpected exceptions
     after a query. Thanks to Stanislav Revin for the patch.
     (Bug #32150115, Bug #101592)

   * An exception was thrown if any CHAR(36) columns
     containing a NULL value were referenced in a query. New
     validation now checks for NULL values when the
     MySqlDbType member is Guid. (Bug #32049837, Bug #101252)

On Behalf of Oracle/MySQL Engineering Team,
Tvarita Jain

MySQL Connector/Node.js 8.0.24 has been released

Dear MySQL users,

MySQL Connector/Node.js is a new Node.js driver for use with the X

DevAPI. This release, v8.0.24, is a maintenance release of the

MySQL Connector/Node.js 8.0 series.

The X DevAPI enables application developers to write code that combines

the strengths of the relational and document models using a modern,

NoSQL-like syntax that does not assume previous experience writing

traditional SQL.

MySQL Connector/Node.js can be downloaded through npm (see

  https://www.npmjs.com/package/@mysql/xdevapi for details) or from

https://dev.mysql.com/downloads/connector/nodejs/.

To learn more about how to write applications using the X DevAPI, see

http://dev.mysql.com/doc/x-devapi-userguide/en/.

For more information about how the X DevAPI is implemented in MySQL

Connector/Node.js, and its usage, see

http://dev.mysql.com/doc/dev/connector-nodejs/.

Please note that the X DevAPI requires at least MySQL Server version

8.0 or higher with the X Plugin enabled. For general documentation

about how to get started using MySQL as a document store, see

http://dev.mysql.com/doc/refman/8.0/en/document-store.html.

Changes in MySQL Connector/Node.js 8.0.24 (2021-04-20, General Availability)

     * Functionality Added or Changed

     * Bugs Fixed

Functionality Added or Changed

     * Important Change: Starting in this version,

       Connector/Node.js will ignore compatibility with

       End-of-life Node.js versions. If you are planning to

       upgrade, make sure you are using Node.js 12.0.0 or

       higher.

     * Connector/Node.js no longer guarantees compatibility with

       End-of-life Node.js versions. Today this means only

       Node.js 12.0.0 or higher are officially supported.

     * Improved the inline documentation and added functionality

       for users to generate it locally using JSDoc. See

       CONTRIBUTING.md for instructions on how to generate the

       HTML documentation.

     * Improved server disconnection handling of X Protocol

       connections now creates a log entry and returns an error

       message, as needed, after Connector/Node.js receives a

       connection-close notice from the server.

       Connector/Node.js detects three new types of warning

       notices.

          + Connection idle notice: This notice applies to a

            server connection that remains idle for longer than

            the relevant timeout setting. Connector/Node.js

            closes the connection when it receives the notice in

            an active session or while a new session is being

            created. An attempt to use the invalid session

            returns the “Connection closed. Reason: connection

            idle too long” error message.

          + Server shutdown notice: If a connection-close notice

            is received in a session as a result of a server

            shutdown, Connector/Node.js terminates the session

            with the “Connection closed. Reason: server

            shutdown” error message. All other sessions that are

            connected to the same endpoint are removed from the

            pool, if connection pooling is used.

          + Connection killed notice: If the connection being

            killed from another client session,

            Connector/Node.js closes the connection when it

            receives the notice in an active session or while a

            new session is being created. An attempt to use the

            invalid session returns the “Connection closed.

            Reason: connection killed by a different session”

            error message.

Bugs Fixed

     * The getSession() method now executes release() if a

       getSession() exception is raised; as ot was not releasing

       the connection to the pool. (Bug #32366743, Bug #101928)

     * The Session.getDefaultSchema() method now returned

       ‘undefined’ instead of a valid Schema instance if a

       default schema is not set. (Bug #32136490)

On Behalf of the MySQL Engineering Team,

Sreedhar S

MySQL Connector/ODBC 8.0.24 has been released

Dear MySQL users,

MySQL Connector/ODBC 8.0.24 is a new version in the MySQL Connector/ODBC
8.0 series, the ODBC driver for the MySQL Server.

The available downloads include both a Unicode driver and an ANSI driver
based on the same modern codebase. Please select the driver type you
need based on the type of your application – Unicode or ANSI.
Server-side prepared statements are enabled by default. It is suitable
for use with the latest MySQL server version 8.0.

This release of the MySQL ODBC driver is conforming to the ODBC 3.8
specification. It contains implementations of key 3.8 features,
including self-identification as a ODBC 3.8 driver, streaming of out (for
binary types only), and support of the SQL_ATTR_RESET_CONNECTION
connection attribute (for the Unicode driver only).

The release is now available in source and binary form for a number of
platforms from our download pages at

https://dev.mysql.com/downloads/connector/odbc/

For information on installing, please see the documentation at

https://dev.mysql.com/doc/connector-odbc/en/connector-odbc-installation.html

Enjoy and thanks for your support!


Changes in MySQL Connector/ODBC 8.0.24 (2021-04-20, General Availability)

Functionality Added or Changed


     * Previously, if the connection to the server was not used
       within the period specified by the wait_timeout system
       variable and the server closed the connection, the client
       received no notification of the reason. Typically, the
       client would see Lost connection to MySQL server during
       query (CR_SERVER_LOST) or MySQL server has gone away
       (CR_SERVER_GONE_ERROR).
       In such cases, the server now writes the reason to the
       connection before closing it, and the client receives a
       more informative error message: The client was
       disconnected by the server because of inactivity. See
       wait_timeout and interactive_timeout for configuring this
       behavior. (ER_CLIENT_INTERACTION_TIMEOUT).
       The previous behavior still applies for client
       connections to older servers and connections to the
       server by older clients.

     * If a classic MySQL protocol connection experiences a
       server timeout, Connector/ODBC now reports more precise
       disconnection information from the server.

Bugs Fixed


     * The ODBC SQLProcedureColumns function returns incomplete
       results, fetches after usage would only return the first
       40 parameters.
       The workaround was to increase the group_concat_max_len
       size, for example ‘group-concat-max-len = 1000000’ under
       [mysqld]. (Bug #32504915, Bug #102589)

     * MySQL 8.0.24 added a new ER_CLIENT_INTERACTION_TIMEOUT
       error code, and it caused the ODBC driver to report the
       wrong SQLSTATE HY000 instead of 08S01 after the
       connection is terminated on the server by
       wait_/_interactive timeout. The ODBC driver is now linked
       against libmysqlclient 8.0.24 to handle this situation.
       (Bug #32394545)

On Behalf of Oracle/MySQL Engineering Team,
Gipson Pulla

MySQL Connector/Python 8.0.24 has been released


Dear MySQL users,

MySQL Connector/Python 8.0.24 is the latest GA release version of the
MySQL Connector Python 8.0 series. The X DevAPI enables application
developers to write code that combines the strengths of the relational
and document models using a modern, NoSQL-like syntax that does not
assume previous experience writing traditional SQL.

To learn more about how to write applications using the X DevAPI, see

  http://dev.mysql.com/doc/x-devapi-userguide/en/

For more information about how the X DevAPI is implemented in MySQL
Connector/Python, and its usage, see

  http://dev.mysql.com/doc/dev/connector-python

Please note that the X DevAPI requires at least MySQL Server version 8.0
or higher with the X Plugin enabled. For general documentation about how
to get started using MySQL as a document store, see

  http://dev.mysql.com/doc/refman/8.0/en/document-store.html

To download MySQL Connector/Python 8.0.24, see the “General Availability
(GA) Releases” tab at

  http://dev.mysql.com/downloads/connector/python/

Enjoy!

Changes in MySQL Connector/Python 8.0.24 (2021-04-20, General Availability)

Functionality Added or Changed

  • Removed Python 2.7 and 3.5 support, and added Python 3.9
    support. (Bug #32144255, Bug #32192619, Bug #32001787)
  • Improved server disconnection handling of X Protocol
    connections now creates a log entry and returns an error
    message, as needed, after Connector/Python receives a
    connection-close notice from the server. Connector/Python
    detects three new types of warning notices.
    Connection idle notice. This notice applies to a server
    connection that remains idle for longer than the relevant
    timeout setting. Connector/Python closes the connection
    when it receives the notice in an active session or while
    a new session is being created. An attempt to use the
    invalid session returns the “Connection closed. Reason:
    connection idle too long” error message.
    Server shutdown notice. If a connection-close notice is
    received in a session as a result of a server shutdown,
    Connector/Python terminates the session with the
    “Connection closed. Reason: server shutdown” error
    message. All other sessions that are connected to the
    same endpoint are removed from the pool, if connection
    pooling is used.
    Connection killed notice. If the connection being killed
    from another client session, Connector/Python closes the
    connection when it receives the notice in an active
    session or while a new session is being created. An
    attempt to use the invalid session returns the
    “Connection closed. Reason: connection killed by a
    different session” error message.
  • If a classic MySQL protocol connection experiences a
    server timeout, Connector/Python now reports more precise
    disconnection information from the server.

Bugs Fixed

  • For the C-extension, executing prepared statements
    emitted errors when placeholders were defined without
    associated parameters. Now they are not executed. (Bug 32497631)
  • For prepared statements any type or argument was
    accepted, which could produce undesired results. Now the
    use of list or type objects for the argument is enforced,
    and passing in other types raise an error. (Bug 32496788)
  • Added Django 3.2 support while preserving compatibility
    with Django 2.2, 3.0, and 3.1. (Bug #32435181)
  • Added context manager support for pooled connections; a
    feature added to standard connections in 8.0.21. (Bug 32029891)
  • Replaced the deprecated PyUnicode_GetSize with
    PyUnicode_GET_LENGTH to fix the casting of Python’s
    unicode to std::string. (Bug #31490101, Bug #99866)
  • Binary columns were returned as strings instead of
    ‘bytes’ or ‘bytearray’. (Bug #30416704, Bug #97177)


Enjoy and thanks for the support!

On Behalf of the MySQL Engineering Team,
Balasubramanian Kandasamy