apache > db
Apache DB Project
 
Font size:      

Apache Derby 10.2.2.0 Release

Distributions

Use the links below to download a distribution of Apache Derby from one of our mirrors. You should always verify the integrity of distribution files downloaded from a mirror.

There are four different distributions:

  • bin distribution - contains the documentation, javadoc, and jar files for Derby.
  • lib distribution - contains only the jar files for Derby.
  • lib-debug distribution - contains jar files for Derby with source line numbers.
  • src distribution - contains the Derby source tree at the point which the binaries were built.

db-derby-10.2.2.0-bin.zip [PGP] [MD5]
db-derby-10.2.2.0-bin.tar.gz [PGP] [MD5]

db-derby-10.2.2.0-lib.zip [PGP] [MD5]
db-derby-10.2.2.0-lib.tar.gz [PGP] [MD5]

db-derby-10.2.2.0-lib-debug.zip [PGP] [MD5]
db-derby-10.2.2.0-lib-debug.tar.gz [PGP] [MD5]

db-derby-10.2.2.0-src.zip [PGP] [MD5]
db-derby-10.2.2.0-src.tar.gz [PGP] [MD5]

There are two separate Eclipse plugins for Derby:

  • derby_core_plugin - provides the Derby jar files to other plugins in Eclipse.
  • derby_ui_plugin - provides an Apache Derby Nature in Eclipse for easy database application development.

derby_core_plugin_10.2.2.485682.zip [PGP] [MD5]
derby_ui_plugin_1.1.0.zip [PGP] [MD5]

Please note: both plugins must be installed for full functionality. For information on installing and using the Derby plugins for Eclipse, please see the Using the 10.2 Core and 1.1 UI Derby plug-ins page.

Release Overview

These notes describe the difference between Derby release 10.2.2.0 and the preceding release, 10.2.1.6. 10.2.2.0 is a bug-fix release. It includes compiled versions of Derby's JDBC4 drivers, which appeared in the previous release only as source code. In addition, 10.2.2.0 includes a number of bug fixes not found in the previous release. No new features appear in 10.2.2.0.

Derby is a pure Java relational database engine using standard SQL and JDBC as its APIs.

Derby functionality includes:

  • Embedded engine with JDBC drivers
  • Network Server
  • Network client JDBC drivers
  • Command line tools: ij (SQL scripting), dblook (schema dump) and sysinfo (system info)

SQL support:

  • Schemas, tables, temporary tables, views, triggers, indexes, savepoints
  • Java procedures and functions
  • Standard datatypes including XML, BLOB, and CLOB
  • Sub-queries and joins
  • Primary key, foreign key, unique and check constraints
  • Referential actions
  • GRANT/REVOKE support for databases with SQL authorization.

Other features:

  • Full ACID transaction support with all four isolation levels
  • Row and table level locking
  • Configurable authentication including LDAP support
  • Import/Export
  • On-line backup and recovery support
  • Optional on-disk encryption including re-encryption of existing encrypted databases
  • Platform independent database format
  • Full support for Java 2 Security Manager

JDK/JDBC support:

  • JDKs 1.3, 1.4, 1.5, and 1.6 plus J2ME J2ME/CDC/Foundation Profile
  • JSR-169, JDBC 2.1, JDBC 3.0, and JDBC 4.0 support

New Features

Release 10.2.2.0 is a bug-fix release. No new features were added since 10.2.1.6.

Bug Fixes

The following bug fixes turn up in Derby 10.2.2.0 but not in the preceding 10.2.1.6 release.

Issue IdDescription
DERBY-638Network driver setTransactionIsolation() causes a commit, but does not complete it locally
DERBY-737SYSCS_UTIL.SYSCS_COMPRESS_TABLE should create statistics if they do not exist
DERBY-912OutOfMemory error on continuous execution of SQL statement
DERBY-1089Derby fails inserting a join into a table with a generated column
DERBY-1204CREATE TRIGGER with an INSERT action statement with multiple rows and a referenced column throws a StringIndexOutOfBoundsException
DERBY-1231LIKE does not match empty strings when used with a prepared statement
DERBY-1495Attempt to modify an identity column error after resetting identity column
DERBY-1645ALTER TABLE ... SET INCREMENT BY X... Turns off the "Generated By Default" identity column constraint
DERBY-1693Out of Memory Error with derby.language.logStatementText=true
DERBY-1716Revoking select privilege from a user times out when that user still have a cursor open.
DERBY-1732The language and store systems treat a JVM error such as OutOfMemoryError differently leading to the raw store protocol violation errors
DERBY-1847SELECT statement asserts with XJ001 when attempted to select a newly added column in SQL authorization mode
DERBY-1856Multiple communication failures when starting server with derby.drda.timeSlice
DERBY-1894SQLSTATE 42X10 occurs when qualifying a column with a synonym in ORDER BY clause
DERBY-1940Removed Ease of Development API
DERBY-1967UNION (ALL) constraint violation problem
DERBY-1991Misleading stack traces for exceptions raised by the JDBC 4.0 embedded driver
DERBY-2008NullPointerException with LTRIM, RTRIM and 2-argument SUBSTR() call in GROUP BY clause.
DERBY-2014NullPointerException with NULLIF in GROUP BY clause
DERBY-2015NullPointerException in INSERT ... SELECT with self-joined table and IDENTITY column
DERBY-2030'set schema sys' followed by 'show tables' does not show tables in sys schema
DERBY-2084getTransactionIsolation() in network client should not activate a transaction
DERBY-2131External DTD files are accessed without a privileged block when Derby parses XML values that reference such DTDs.

Issues

Applications which run against Derby 10.0 or 10.1 may rely on incorrect Derby behavior. After upgrading to 10.2, those applications may need some recoding so that they no longer rely on bad behavior which has been fixed. Please consult the following list of issues which may require some application recoding. Note that 10.2.2.0 does not introduce any additional issues beyond the issues introduced by 10.2.1.6:


DERBY-253

See DERBY-253.

Problem

PreparedStatement.setUnicodeStream() and ResultSet.getUnicodeStream() throw SQLException when invoked after upgrading to Apache Derby 10.2.

Symptoms

Calling either of these methods will result in an exception with SQLSTATE 0A000 and message: "Feature not implemented: ..."

Cause

PreparedStatement.setUnicodeStream() and ResultSet.getUnicodeStream() have been deprecated since JDBC 2.0. Derby's implemetation of these methods was broken, and it was decided that the methods should throw a not-implemented exception instead of being fixed.

Solution

This was an intentional change. No Derby product solution is offered.

Workaround

Use setCharacterStream() and getCharacterStream() instead of setUnicodeStream() and getUnicodeStream().


DERBY-668

See DERBY-668.

Problem

Sysinfo needs special permissions when run under a Java security manager.

Symptoms

If you do not provide these permissions, you will see a message such as the following in your sysinfo output: Unable to analyze class path: access denied (java.util.PropertyPermission java.class.path read).

Cause

Such a message does not indicate an error; it simply means that the sysinfo tool was unable to provide detailed classpath information because it did not have permission to read the classpath. In prior releases, under these circumstances, sysinfo would silently print nothing, now it prints an informational message about the reason that it couldn't provide any classpath information.

Solution

The sysinfo tool now prints additional information about the origin of the classes and jars that it examines. The origin of a class might be: an entry in the application classpath, an entry in a class loader location list, a jar fetched due to being listed in the manifest entry of another jar, a standard extension in the JRE's extensions directory, a jar installed into the application server, or any of various other possibilities.

Workaround

Grant these permissions so that sysinfo can run correctly under the Java security manager.


DERBY-721

See DERBY-721.

Problem

Behavior has changed for applications which open two InputStreams on the same ResultSet column.

Symptoms

Undefined results were returned to an application which opened an InputStream twice on the same column of a ResultSet. The value siphoned out of the column was erratic.

Cause

Streams were being shared between the two readers.

Solution

Now we throw an exception if the application tries to open two streams on the same column in a ResultSet.

Workaround

Users must recode Applications which open multiple streams on the same column.


DERBY-781

See DERBY-781.

Problem

Compilation times may increase for queries which have subqueries in the FROM clause.

Symptoms

Execution performance of queries containing non-flattenable subqueries may change. The expectation is that the new (10.2) query plans will show improved performance over the old ones.

Another potential symptom is that the compilation time for such queries may increase. If this happens, the increase should only occur at compilation time; execution time should either improve or, at the very least, remain the same as in earlier versions of Derby.

Cause

If the optimizer chooses to do a hash join with a subquery, Derby only has to execute the subquery a single time per statement, after which Derby can just perform the desired join against the materialized result set. Depending on how many rows are in the outer table of the join, this once-per-statement execution of the subquery can lead to major performance improvements over the once-per-outer-row execution employed by earlier versions of Derby.

As for the extra compilation time, this is due to the simple fact that the optimizer is now doing more work--i.e. in addition to considering nested loop joins with subqueries, it is now _also_ considering hash joins with those subqueries, and that means that it could potentially take longer for the optimizer to finish its work. Note again that, if it occurs, the increased time should only occur at compilation time; execution time should either improve or, at the very least, remain the same as in earlier versions of Derby.

Solution

This was an intentional change to improve the execution plans chosen by the optimizer for queries having large and/or complex subqueries. The expectation is that the new behavior--and the subsequent query plans--will lead to improved performance over the old ones, so no further solution is required.

Workaround

There is no way to disable/workaround this new behavior. The increased compilation time buys better performance at query execution time.

That said, any user who notices a negative performance change after moving to Derby 10.2, and who believes that the difference in performance is related to this optimizer enhancement, is encouraged to visit the performance diagnosis page and to follow up with his/her findings on the Derby mailing lists.


DERBY-822

See DERBY-822.

Problem

Queries may fail earlier and locks may be acquired earlier when executing queries. Location where errors occur in an embedded environment is different from the location where errors occur in a network environment.

Symptoms

Errors that happen as part of the normal execution path are moved earlier. For example, code to execute a query, with executeQuery() retrieve the result set metadata and then perform a next() might fail with a lock timeout on executeQuery() instead of next(). Locking changes are observed.

Cause

Pre-fetching moves execution of retrieval of data earlier for network client/server configurations.

Solution

This was an intentional behavior change to improve performance. No Derby product solution is offered.

Workaround

Application code needs to be changed to adjust error handling if needed.


DERBY-1130

See DERBY-1130.

Problem

When using Derby's client DataSources, you can no longer set the database name using setConnectionAttributes().

Symptoms

Derby's client DataSources were using a wrong database name when getting a connection in the following case:

  • databaseName is not set as a Derby DataSource property
  • databaseName is set as a connection attribute using setConnectionAttributes method

Cause

Instead of throwing an exception saying databaseName is a required Derby DataSource property and must be set, client driver was using "null" as database name and returning a connection to database named "null". The database name was constructed wrongly in the client driver.

Solution

This was solved by setting the internal database name property in the client driver correctly. Also ensured that databaseName set as a connection attribute will not be used by Derby's client DataSources.. This fix will be available in Derby versions 10.2 and above.

Workaround

When upgrading an application to run against Derby 10.2, make sure the database name is set only as a DataSource property when using Derby's client DataSources.


DERBY-1295

See DERBY-1295.

Problem

Result sets of type TYPE_SCROLL_INSENSITIVE no longer implicitly close when positioned at the end in autocommit mode.

Symptoms

Calling the ResultSet.next() method when positioned on the last row of a result set of type SCROLL_INSENSITIVE in auto commit mode used to cause the result set to be closed.

Cause

The JDBC specification allows a JDBC driver to implicitly close a ResultSet when the ResultSet type is TYPE_FORWARD_ONLY and the next method of ResultSet returns false. Derby also used to implicitly close result sets of type SCROLL_INSENSITIVE when the ResultSet.next() method returns false in auto commit mode.

Solution

The behavior of SCROLL_INSENSITIVE result sets in auto commit mode has been changed to comply with the JDBC4 specification. SCROLL_INSENSITIVE result sets are not implicitly closed when calling the ResultSet.next() method in auto commit mode while positioned on the last row.

Workaround

Fix applications which rely on the previous, non-standard behavior.


DERBY-1314

See DERBY-1314.

Problem

The return values of executeQuery() and executeUpdate() have changed for the Derby network client.

Symptoms

The behaviour of executeQuery() and executeUpdate() did not match the JDBC specification when invoking stored procedures.

  • When invoking a stored procedure with executeQuery() or executeUpdate(), an exception was thrown indicating that the procedure did not return the correct number of ResultSet objects, although the correct number of ResultSet objects was in fact returned.
  • When invoking a stored procedure with executeQuery() or executeUpdate(), and the procedure did not return the correct number of ResultSet objects, the query executed successfully.
  • With the network client driver, when invoking a stored procedure with executeUpdate(), the return value was -1, whereas the JDBC specification says it should be 0.

Cause

The methods executeQuery() and executeUpdate() were not implemented in compliance with the JDBC specification.

Solution

In Derby 10.2, the behaviour of the methods executeQuery() and executeUpdate() has been changed to match the JDBC specification.

Workaround

Use execute() instead of executeUpdate()/executeQuery() to invoke a stored procedure which does not return exactly 0 or 1 ResultSet objects.


DERBY-1323

See DERBY-1323.

Problem

Calls to rowUpdated(), rowDeleted(), and rowInserted() now forbidden on unpositioned, forward-only ResultSets.

Symptoms

For a JDBC ResultSet with type TYPE_FORWARD_ONLY, the methods rowUpdated, rowDeleted and rowInserted could previously be called while not on a row, i.e. before positioning in the result set, while on insertRow, after updateRow before new positioning, after deleteRow before new positioning and when after last row. This is now disallowed.

Calls to any of these methods while not on a row will now throw SQLException with SQLState 24000.

Cause

Derby now disallows these calls when not on a row.

Solution

Change the application to not call these methods unless on a row. Note that using them at all is rather meaningless for a ResultSet of type TYPE_FORWARD_ONLY since the returned result will always be 'false'. This is because once you modify a row, it can no longer be accessed, you need to move to the next row, if there is one, to get a new current row. Presently in Derby, these methods are only really meaningfully used for result sets of type TYPE_SCROLL_INSENSITIVE and of concurrency CONCUR_UPDATABLE in which case updated and deleted rows can be detected.

Workaround

Fix applications which rely on this non-standard behavior.


DERBY-1357

See DERBY-1357.

Problem

Performance may change for queries with nested subqueries and/or large FROM clauses.

Symptoms

Execution performance of large queries (esp. those with nested subqueries and/or with large FROM clauses) may change. The expectation is that the new (10.2) query plans will show improved performance over the old ones.

Cause

Since the optimizer is now spending less time evaluating sub-optimal join orders, it is possible that it will be able to try out more join orders before optimizer "timeout" occurs. As a result the optimizer can sometimes find better plans than it did in earlier versions of Derby.

Solution

This was an intentional change to fix behavior that was not working correctly in earlier versions of Derby. The expectation is that the new behavior--and the subsequent query plans--will lead to improved performance over the old ones, so no further solution is required.

Workaround

In general, the performance of these queries should stay the same or improve. However, it is possible that performance may degrade for some queries. Any user who notices a negative performance change after moving to Derby 10.2, and who believes that the difference in performance is related to this optimizer change, is encouraged to visit the performance diagnosis page and to follow up with his/her findings on the Derby mailing lists.


DERBY-1384

See DERBY-1384.

Problem

Maximum BLOB/CLOB length has increased to 2G-1.

Symptoms

Previously, Derby rejected BLOB lengths greater than 1M.

Cause

The allowable size of Derby LOBs has been increased.

Solution

This was an intentional change to make Derby conform to its own documentation.

Workaround

Fix applications which rely on Derby rejecting LOBs that are bigger than 1M.


DERBY-1652

See DERBY-1652.

Problem

Recursive trigger firing disallowed.

Symptoms

In some cases, an after update trigger does not get fired upon itself when its trigger action contains an update statement on the trigger's subject table.

(1) When defining a trigger for the first time for a table, e.g.:

  
        CREATE TABLE "TEST" ("TESTID" INTEGER NOT NULL GENERATED ALWAYS AS IDENTITY (START WITH 1, INCREMENT BY 1),
                             "INFO" INTEGER NOT NULL,
                             "TIMESTAMP" TIMESTAMP NOT NULL DEFAULT '1980-01-01-00.00.00.000000');
    
        CREATE TRIGGER UPDATE_TEST
        AFTER UPDATE ON TEST
        REFERENCING OLD AS OLD
        FOR EACH ROW MODE DB2SQL
            UPDATE TEST SET TIMESTAMP = CURRENT_TIMESTAMP WHERE TESTID = OLD.TESTID;
  
        INSERT INTO TEST (INFO) VALUES (1), (2), (3);

        UPDATE TEST SET INFO = 1 WHERE TESTID = 2;

The above update statement executes successfully which it is incorrect. The system should have issued SQLSTATE 54038 since it self-triggers to its maximum depth of 16.

(2) With the above example, when an user upgrades to a higher version and issues the same update statement:

        UPDATE TEST SET INFO = 1 WHERE TESTID = 2;
        ERROR 54038: Maximum depth of nested triggers was exceeded.

The SQLSTATE 54038 is issued in this case because after database upgrade, the trigger action will be invalidated by the system and will force a recompilation of the trigger when it is fired. The system generates the correct execution plan this time and since the trigger behavior have changed, this might cause applications to break unexpectedly.

Cause

Derby did not generate the correct execution plan for self-trigger invocation when such a trigger is declared for the first time on the subject table; hence, resulting in the stated problem above. The affected version is Derby 10.0 and 10.1.

Solution

This behavior has been corrected in 10.2.

Workaround

If self-trigger invocation was not intended by the application, the application can select which column(s) on the update statement can cause the trigger to fire in the CREATE TRIGGER statement. i.e.:

   CREATE TRIGGER update_test
   AFTER UPDATE OF INFO ON test
   REFERENCING OLD AS old
   FOR EACH ROW MODE DB2SQL
       UPDATE test SET timestamp=current_timestamp WHERE testid=old.testid;

In the above statement, the trigger will only fire when an update is made to the "info" column instead of any column(s).


DERBY-1867

See DERBY-1867.

Problem

With IBM 1.4.1 JVM, trying to connect to the server using the derby client with security mechanism 8 (USRSSSBPWD) will result in error.

Symptoms

Connecting using the client driver with security mechanism 8 will throw the following error ERROR XJ112: Security exception encountered, see next exception for details. The stack trace will show that the problem is caused by java.security.NoSuchAlgorithmException: SHA1PRNG SecureRandom not available

Cause

Current USRSSBPWD implementation uses SHA1PRNG algorithm to generate random number(seed) that gets exchanged between client and the server. The SHA1PRNG algorithm is not available with the JCE provider that comes with IBM JVM version 1.4.1.

Solution

You must use another JCE provider.

Workaround

If you need to use the security mechanism 8, then make sure that support for SHA1PRNG is available in the JCE provider that is available with a particular JVM. For e.g. Use IBM 1.4.2 JVM that has support for SHA1PRNG or the Sun JVMs.

Build Environment

Derby release 10.2.2.0 was built using the following environment:

  • Branch - Source code came from the 10.2 branch.
  • Machine - SunOS 5.11 snv_48.
  • Ant - Apache Ant version 1.6.5 compiled on June 2 2005.
  • JDK 1.3 - Java(TM) 2 Runtime Environment, Standard Edition (build 1.3.1_19-b03).
  • JDK 1.4 - Java(TM) 2 Runtime Environment, Standard Edition (build 1.4.2_12-b03).
  • JDK 1.6 - Java(TM) 2 Runtime Environment, Standard Edition (build 1.6.0-b105).
  • OSGi - The osgi.jar was used to build org.apache.derby.osgi.EmbeddedActivator.
  • Compiler - The 1.4.2_12-b03 javac was used to compile all classes except for the JDBC4 drivers. The JDBC4 driver classes were compiled using the 1.6.0-b105 javac.
  • JSR 169 - J2ME support was built using java.sun.com/j2me (j2me_cdc_fp-1_0_2).

Testing

Tests were run on the following platforms. Results are listed separately for each platform.

Type testplatform, jvm versionby:
derbyall suiteSolaris 10 x86 machine using Sun's JDK 1.5.0_07John Embretsen
derbyall suiteSunOS 5.11 snv_48 using Sun 1.4.2_12-b03 and 1.6.0-b105Rick Hillegas
derbyall suiteUbuntu 5.10 on i386 using JDK 1.5.0_06 and 1.6.0Bernt Johnsen
derbyall suiteSLES 10 - Kernel 2.6.16.21-0.25-bigsmp (0) and IBM15 (SR3) and IBM 142 (SR7)Rajesh Kartha
derbyall suiteRHEL 4.0 - Kernel 2.6.9-42.0.3.ELsmp and IBM142 (SR7)Rajesh Kartha
derbyall suiteAIX 5.3 with IBM15(SR3), AIX 5.3 with IBM142(SR5), zOS with IBM15(SR3), zOS with IBM142(SR5)Manjula Kutty
derbyall suiteWindows XP ProYip Ng
derbyall suiteHP-UX v1.11 i with HPs SDK 1.5.0.03Vemund Ostgaard
derbyall suiteUbuntu 6.06 (Linux)Olav Sandstaa
derbyall suiteExtensive platform testing. See 10.2 Platform Testing.Henri van de Scheur
derbyall suiteSolaris 10 x86 machine using Sun's JDK 1.5Dag Wanvik
Compatibility tests-Ole Solberg
Distribution contents verified-Andrew McIntyre
Eclipse plugins on eclipse 3.2.1, embedded and client jdbc drivers-Jean Andersen
index.html links verified-Rick Hillegas
Large data volume testsSee Additional TestsOle Solberg
Long-running DOTS testolaris 10 x86 machine using Sun's JDK 1.5.0_07John Embretsen
Long-running tests-Rajesh Kartha
ODBC testsDB2 Runtime Client (v8)Army Brown
Order entry benchmarkOrder entry benchmark (see derby-1987) for a scale of 10 using bulk insert on RedHat linux/ibm142Sunitha Kambhampati
Scripts verifiedWindows, LinuxRajesh Kartha
Signatures verified-Andrew McIntyre
XMLSuiteIBM142Army Brown

Several test issues were reported, such as DERBY-937(1.5), DERBY-1585(1.5, 1.6), DERBY-1947, DERBY-2177, DERBY-2178, DERBY-2180, However, none of these issues was considered a blocker for the release.

Tests for a specific platform can be run using the derbyTesting.jar file that can be found in the lib directory of the -lib or -bin distributions.

Instructions on how to run the tests can be found in the testing README.

Verifying releases

It is essential that you verify the integrity of the downloaded files using the PGP and MD5 signatures. MD5 verification ensures the file was not corrupted during the download process. PGP verification ensures that the file came from a certain person.

The PGP signatures can be verified using PGP or GPG. First download the Apache Derby KEYS as well as the asc signature file for the particular distribution. It is important that you get these files from the ultimate trusted source - the main ASF distribution site, rather than from a mirror. Then verify the signatures using ...

% pgpk -a KEYS
% pgpv db-derby-X.Y.tar.gz.asc

or

% pgp -ka KEYS
% pgp db-derby-X.Y.tar.gz.asc

or

% gpg --import KEYS
% gpg --verify db-derby-X.Y.tar.gz.asc

To verify the MD5 signature on the files, you need to use a program called md5 or md5sum, which is included in many unix distributions. It is also available as part of GNU Textutils. Windows users can get binary md5 programs from here, here, or here.

We strongly recommend you verify your downloads with both PGP and MD5.