Roland opened a bug "Documentation indicates some MYSQL_FIELD->flags are deprecated which aren't."
The MySQL protocol uses the string values of ENUM
- and SET
-fields. To indicate that this string
originated from a ENUM- or SET-column the ENUM_FLAG
and SET_FLAG
are used
in the Column Defintion
Same as Roland ...
more ...Now that forge.mysql.com
is shutdown the protocol documentation found a new/old home at:
http://dev.mysql.com/doc/internals/en/client-server-protocol.html
It documents the early days of MySQL 3.20
as seen in:
up to the features ...
more ...We are proud to announce the release of
MySQL Proxy 0.8.3 (alpha)
which updates MySQL Proxy for the protocol changes introduced in MySQL 5.5 and 5.6.
All users of MySQL Proxy 0.8.x are recommend to upgrade.
Today a little history lesson.
I was on a quest to find the origin of this line in include/mysql_com.h:
#define CLIENT_LONG_PASSWORD 1 /* new more secure passwords */
"new" ? "more secure" ?
These CLIENT_*
flags are used between client and server to negotiate what capabilities they support. It allows the server ...
I'm preparing the code for my MySQLConf 2010 session "MySQL Proxy meets: Memcache" where I'll present how to replicate from MySQL to memcache by using the MySQL Proxy.
Part of it will be using the semi-sync replication support for MySQL 5.5 to implement a synchronous MySQL-to-Memcache replication ...
more ...MySQL Proxy 0.8.0 has been released at http://dev.mysql.com/downloads/mysql-proxy/
While it took a while to get it out, it contains a lot of good stuff and will make a few more things possible for the future. First of all, it is the first release ...
more ...I'll be at the OpenSQLCamp 2009 which is part of the FrosCon this weekend and give a talk about drumroll MySQL Proxy.
http://programm.froscon.org/2009/track/OpenSQLCamp/index.de.html has all the sessions incl. my
MySQL Proxy: a MySQL toolbox
Architecture and Concepts of misuse
It ...
more ...In MySQL Proxy 0.8 we are added a multi-threaded network-subsystem allowing several networks events be processed in parallel. Early benchmarks show that what we have in trunk basicly works.
But the benchmarks weren't as good as we expected. That's the time where you prepare to get dirty ...
more ...On the MySQL Proxy channel we get questions from time to time if the authentication can be intercepted and replaced data from a external source.
From now on, you can. For example if you want to get data from a external source (like LDAP) or want to implement roles.