Commercial distributions of MySQL now include two plugins that enable MySQL Server to use external authentication methods to authenticate MySQL users:
PAM (Pluggable Authentication Modules) enables a system to access various kinds of authentication methods through a standard interface. A PAM authentication plugin enables MySQL Server to use PAM to authenticate MySQL users.
The PAM plugin uses the information passed to it by the MySQL server (such as user name, host name, password, and authentication string), plus whatever is available for PAM lookup (such as Unix passwords or an LDAP directory). The plugin checks the user credentials against PAM and returns success or failure.
The PAM authentication plugin has been tested on Linux and OS X.Note
The PAM plugin works with a client-side plugin that simply sends the password to the server in clear text so it can be passed to PAM. This may be a security problem in some configurations, but is necessary to use the server-side PAM library. To avoid problems if there is any possibility that the password would be intercepted, clients should connect to MySQL Server using SSL. See The Cleartext Client-Side Authentication Plugin.
Distributions of MySQL for Windows include an authentication plugin that enables MySQL Server to use native Windows services to authenticate client connections. Users who have logged in to Windows can connect from MySQL client programs to the server based on the information in their environment without specifying an additional password.
The client and server exchange data packets in the authentication handshake. As a result of this exchange, the server creates a security context object that represents the identity of the client in the Windows OS. This identity includes the name of the client account. The Windows authentication plugin uses the identity of the client to check whether it is a given account or a member of a group. By default, negotiation uses Kerberos to authenticate, then NTLM if Kerberos is unavailable.
The Windows authentication plugin should work on Windows 2000 Professional
These authentication plugins enable MySQL Server to accept connections from users defined outside the MySQL grant tables. They also support the MySQL proxy-user capability. Each plugin can return to MySQL a user name different from the login user, which means that the plugin can return the MySQL user that defines the privileges the externally authenticated user should have. For example, an external user named
joecan connect and have the privileges of the MySQL user named
The server-side PAM and Windows authentication plugins are included only in commercial distributions. They are not included in MySQL community distributions. The client-side plugins with which they communicate are included in all distributions, including community distributions. This permits clients from any release to connect to a server that has the server-side plugin loaded.
For more information about these plugins, see The PAM Authentication Plugin, and The Windows Native Authentication Plugin. For general information about pluggable authentication in MySQL, see Pluggable Authentication. For proxy user information, see Proxy Users.
The default thread-handling model in MySQL Server executes statements using one thread per client connection. As more clients connect to the server and execute statements, overall performance degrades. Commercial distributions of MySQL now include a thread pool plugin that provides an alternative thread-handling model designed to reduce overhead and improve performance. The plugin implements a thread pool that increases server performance by efficiently managing statement execution threads for large numbers of client connections.
The thread pool addresses several problems of the one thread per connection model:
Too many thread stacks make CPU caches almost useless in highly parallel execution workloads. The thread pool promotes thread stack reuse to minimize the CPU cache footprint.
With too many threads executing in parallel, context switching overhead is high. This also presents a challenging task to the operating system scheduler. The thread pool controls the number of active threads to keep the parallelism within the MySQL server at a level that it can handle and that is appropriate for the server host on which MySQL is executing.
Too many transactions executing in parallel increases resource contention. In
InnoDB, this increases the time spent holding central mutexes. The thread pool controls when transactions start to ensure that not too many execute in parallel.
On Windows, the thread pool plugin requires Windows Vista or newer. On Linux, the plugin requires kernel 2.6.9 or newer.
For more information, see MySQL Enterprise Thread Pool.
Important Change; Replication: The
RESET SLAVEstatement has been extended with an
ALLkeyword. In addition to deleting the
relay-log.info, and all relay log files,
RESET SLAVE ALLalso clears all connection information otherwise held in memory following execution of
RESET SLAVE. (Bug #11809016, Bug #11763210)
The thread pool plugin should be loaded at server startup, and not loaded or unloaded at runtime. An error now occurs for attempts to load or unload it with the
Some plugins operate in such a matter that they should be loaded at server startup, and not loaded or unloaded at runtime. The plugin API now supports marking plugins this way. The
st_mysql_pluginstructure now has a
flagsmember, which can be set to the OR of the applicable flags. The
PLUGIN_OPT_NO_INSTALLflag indicates that the plugin cannot be loaded at runtime with the
INSTALL PLUGINstatement. This is appropriate for plugins that must be loaded at server startup with the
PLUGIN_OPT_NO_UNINSTALLflag indicates that the plugin cannot be unloaded at runtime with the
The new member changes the interface, so the plugin interface version,
MYSQL_PLUGIN_INTERFACE_VERSION, has been incremented from
0x0103. Plugins that require access to the new member must be recompiled to use version
A new utility, mysql_plugin, enables MySQL administrators to manage which plugins a MySQL server loads. It provides an alternative to manually specifying the
--plugin-loadoption at server startup or using the
UNINSTALL PLUGINstatements at runtime. See mysql_plugin — Configure MySQL Server Plugins.
Performance; InnoDB: This fix improves the performance of operations on
Nis declared as a large value but the actual string values in the table are short. (Bug #12835650)
Performance; InnoDB: The “random read-ahead” feature that was removed from the
InnoDBPlugin is now available again. Because it is only helpful for certain workloads, it is turned off by default. To turn it on, enable the
innodb_random_read_aheadconfiguration option. Because this feature can improve performance in some cases and reduce performance in others, before relying on this setting, benchmark both with and without the setting enabled. (Bug #12356373)
Now the affected-rows value per row is 1 if the row is inserted as a new row, 2 if an existing row is updated, and 0 if an existing row is set to its current values. If you specify the
mysql_real_connect()when connecting to mysqld, the affected-rows value is 1 (not 0) if an existing row is set to its current values. (Bug #46675, Bug #11754979)
Incompatible Change: Handling of a date-related assertion was modified.
However, a consequence of this change is that several functions become more strict when passed a
DATE()function value as their argument and reject incomplete dates with a day part of zero. These functions are affected:
YEARWEEK(). Because this changes date-handling behavior in General Availability-status series (MySQL 5.1 and 5.5), it was reverted in 5.1.62 and 5.5.21. The change is retained in MySQL 5.6.
References: See also: Bug #13458237.
DATA_LENGTHcolumn in the
INFORMATION_SCHEMA.TABLEStable now correctly reports the on-disk sizes of tablespaces for
InnoDBcompressed tables. (Bug #12770537)
InnoDB: With the configuration settings
innodb_file_format=Barracuda, inserting a column value greater than half the page size, and including that column in a secondary index, could cause a crash when that column value was updated. (Bug #12637786)
InnoDB: Unused functions were removed from the internal
InnoDBcode related to mini-transactions, to clarify the logic. (Bug #12626794, Bug #61240)
Replication: Processing of corrupted table map events could cause the server to crash. This was especially likely if the events mapped different tables to the same identifier, such as could happen due to Bug #56226.
Now, before applying a table map event, the server checks whether the table has already been mapped with different settings, and if so, an error is raised and the slave SQL thread stops. If it has been mapped with the same settings, or if the table is set to be ignored by filtering rules, there is no change in behavior: the event is skipped and IDs are not checked. (Bug #44360, Bug #11753004)
References: See also: Bug #56226, Bug #11763509.
The metadata locking subsystem added too much overhead for
INFORMATION_SCHEMAqueries that were processed by opening only
.TRGfiles and had to scan many tables. For example,
SELECT COUNT(*) FROM INFORMATION_SCHEMA.TRIGGERSwas affected. (Bug #12828477)
Compilation failed on OS X 10.7 (Lion) with a warning:
Implicit declaration of function 'pthread_init'(Bug #12779790)
With profiling disabled or not compiled in,
set_thd_proc_info()unnecessarily checked file name lengths. (Bug #12756017)
References: This issue is a regression of: Bug #59273.
DBUG_ASSERTadded by Bug #11792200 was overly aggressive in raising assertions. (Bug #12537160)
References: See also: Bug #11792200.
REPAIR TABLEfailed to find problems with
MERGEtables that had underlying tables missing or with the wrong storage engine. Issues were reported only for the first underlying table. (Bug #11754210)
(5 DIV 2)and
(5.0 DIV 2)produced different results (2 versus 3) because the result of the latter expression was not truncated before conversion to integer. This differed from the behavior in MySQL 5.0 and 5.1. Now both expressions produce 2. (Bug #61676, Bug #12711164)
lower_case_table_namesvalue of 1 or 2 and a database having a mixed-case name, calling a stored function using a fully qualified name including the database name failed. (Bug #60347, Bug #11840395)
SELECT DISTINCTwith a deterministic stored function in the
WHEREclause could produce incorrect results. (Bug #59736, Bug #11766594)
The embedded server crashed when
argc = 0. (Bug #57931, Bug #12561297)
CREATE TABLEwithout an
ENGINEoption determined the default engine at parse rather than execution time. This led to incorrect results if the statement was executed within a stored program and the default engine had been changed in the meantime. (Bug #50614, Bug #11758414)
Upgrades using an RPM package recreated the
testdatabase, which is undesirable when the DBA had removed it. (Bug #45415, Bug #11753896)