ExpressVPN is designed to bypass censorship and geo-restricted websites, as well as any other content your country has blocked for whatever reason. With over 45 different access points in 90 countries, now you can log on from almost any country on the planet to browse the web without restrictions or limitations. Reason 7 / 8 Factory & Orkester Soundbanks Factory and Orkester soundbanks for Reason 7 / 7.1 / 8 users who do not have a disc. Reason 6.5.3 update Free maintenance update for owners of Reason 6.5.
- Issues
Distributions
Use the links below to download a distribution of Apache Derby from one of our mirrors. You should alwaysverify the integrity of distribution files downloaded from a mirror.
There are four different distributions:
- bin distribution - contains the documentation, javadoc, and jar files for Derby.
- lib distribution - contains only the jar files for Derby.
- lib-debug distribution - contains jar files for Derby with source line numbers.
- src distribution - contains the Derby source tree at the point which the binaries were built.
db-derby-10.2.2.0-bin.zip [PGP] [MD5]
db-derby-10.2.2.0-bin.tar.gz [PGP] [MD5]
db-derby-10.2.2.0-lib.zip [PGP] [MD5]
db-derby-10.2.2.0-lib.tar.gz [PGP] [MD5]
db-derby-10.2.2.0-lib-debug.zip [PGP] [MD5]
db-derby-10.2.2.0-lib-debug.tar.gz [PGP] [MD5]
db-derby-10.2.2.0-src.zip [PGP] [MD5]
db-derby-10.2.2.0-src.tar.gz [PGP] [MD5]
There are two separate Eclipse plugins for Derby:
- derby_core_plugin - provides the Derby jar files to other plugins in Eclipse.
- derby_ui_plugin - provides an Apache Derby Nature in Eclipse for easy database application development.
derby_core_plugin_10.2.2.485682.zip [PGP] [MD5]
derby_ui_plugin_1.1.0.zip [PGP] [MD5]
Please note: both plugins must be installed for full functionality. For information on installing and using the Derby plugins for Eclipse, please see the Using the 10.2 Core and 1.1 UI Derby plug-ins page.
Release Overview
These notes describe the difference between Derby release 10.2.2.0 and the preceding release, 10.2.1.6. 10.2.2.0 is a bug-fix release. It includes compiled versions of Derby's JDBC4 drivers, which appeared in the previous release only as source code. In addition, 10.2.2.0 includes a number of bug fixes not found in the previous release. No new features appear in 10.2.2.0.
Derby is a pure Java relational database engine using standard SQL and JDBC as its APIs.
Derby functionality includes:
- Embedded engine with JDBC drivers
- Network Server
- Network client JDBC drivers
- Command line tools: ij (SQL scripting), dblook (schema dump) and sysinfo (system info)
SQL support:
- Schemas, tables, temporary tables, views, triggers, indexes, savepoints
- Java procedures and functions
- Standard datatypes including XML, BLOB, and CLOB
- Sub-queries and joins
- Primary key, foreign key, unique and check constraints
- Referential actions
- GRANT/REVOKE support for databases with SQL authorization.
Other features:
- Full ACID transaction support with all four isolation levels
- Row and table level locking
- Configurable authentication including LDAP support
- Import/Export
- On-line backup and recovery support
- Optional on-disk encryption including re-encryption of existing encrypted databases
- Platform independent database format
- Full support for Java 2 Security Manager
JDK/JDBC support:
- JDKs 1.3, 1.4, 1.5, and 1.6 plus J2ME J2ME/CDC/Foundation Profile
- JSR-169, JDBC 2.1, JDBC 3.0, and JDBC 4.0 support
New Features
Release 10.2.2.0 is a bug-fix release. No new features were added since 10.2.1.6.
Bug Fixes
The following bug fixes turn up in Derby 10.2.2.0 but not in the preceding 10.2.1.6 release.
Issue Id | Description |
DERBY-638 | Network driver setTransactionIsolation() causes a commit, but does not complete it locally |
DERBY-737 | SYSCS_UTIL.SYSCS_COMPRESS_TABLE should create statistics if they do not exist |
DERBY-912 | OutOfMemory error on continuous execution of SQL statement |
DERBY-1089 | Derby fails inserting a join into a table with a generated column |
DERBY-1204 | CREATE TRIGGER with an INSERT action statement with multiple rows and a referenced column throws a StringIndexOutOfBoundsException |
DERBY-1231 | LIKE does not match empty strings when used with a prepared statement |
DERBY-1495 | Attempt to modify an identity column error after resetting identity column |
DERBY-1645 | ALTER TABLE ... SET INCREMENT BY X... Turns off the 'Generated By Default' identity column constraint |
DERBY-1693 | Out of Memory Error with derby.language.logStatementText=true |
DERBY-1716 | Revoking select privilege from a user times out when that user still have a cursor open. |
DERBY-1732 | The language and store systems treat a JVM error such as OutOfMemoryError differently leading to the raw store protocol violation errors |
DERBY-1847 | SELECT statement asserts with XJ001 when attempted to select a newly added column in SQL authorization mode |
DERBY-1856 | Multiple communication failures when starting server with derby.drda.timeSlice |
DERBY-1894 | SQLSTATE 42X10 occurs when qualifying a column with a synonym in ORDER BY clause |
DERBY-1940 | Removed Ease of Development API |
DERBY-1967 | UNION (ALL) constraint violation problem |
DERBY-1991 | Misleading stack traces for exceptions raised by the JDBC 4.0 embedded driver |
DERBY-2008 | NullPointerException with LTRIM, RTRIM and 2-argument SUBSTR() call in GROUP BY clause. |
DERBY-2014 | NullPointerException with NULLIF in GROUP BY clause |
DERBY-2015 | NullPointerException in INSERT ... SELECT with self-joined table and IDENTITY column |
DERBY-2030 | 'set schema sys' followed by 'show tables' does not show tables in sys schema |
DERBY-2084 | getTransactionIsolation() in network client should not activate a transaction |
DERBY-2131 | External DTD files are accessed without a privileged block when Derby parses XML values that reference such DTDs. |
Issues
Applications which run against Derby 10.0 or 10.1 may rely on incorrect Derby behavior. After upgrading to 10.2, those applications may need some recoding so that they no longer rely on bad behavior which has been fixed. Please consult the following list of issues which may require some application recoding. Note that 10.2.2.0 does not introduce any additional issues beyond the issues introduced by 10.2.1.6:
DERBY-253
See DERBY-253.
Problem
PreparedStatement.setUnicodeStream() and ResultSet.getUnicodeStream() throw SQLException when invoked after upgrading to Apache Derby 10.2.
Symptoms
Calling either of these methods will result in an exception with SQLSTATE 0A000 and message: 'Feature not implemented: ...'
Cause
PreparedStatement.setUnicodeStream() and ResultSet.getUnicodeStream() have been deprecated since JDBC 2.0. Derby's implemetation of these methods was broken, and it was decided that the methods should throw a not-implemented exception instead of being fixed.
Solution
This was an intentional change. No Derby product solution is offered.
Workaround
Use setCharacterStream() and getCharacterStream() instead of setUnicodeStream() and getUnicodeStream().
DERBY-668
See DERBY-668.
Problem
Sysinfo needs special permissions when run under a Java security manager.
Symptoms
If you do not provide these permissions, you will see a message such as the following in your sysinfo output: Unable to analyze class path: access denied (java.util.PropertyPermission java.class.path read).
Cause
Such a message does not indicate an error; it simply means that the sysinfo tool was unable to provide detailed classpath information because it did not have permission to read the classpath. In prior releases, under these circumstances, sysinfo would silently print nothing, now it prints an informational message about the reason that it couldn't provide any classpath information.
Solution
The sysinfo tool now prints additional information about the origin of the classes and jars that it examines. The origin of a class might be: an entry in the application classpath, an entry in a class loader location list, a jar fetched due to being listed in the manifest entry of another jar, a standard extension in the JRE's extensions directory, a jar installed into the application server, or any of various other possibilities.
Workaround
Grant these permissions so that sysinfo can run correctly under the Java security manager.
DERBY-721
See DERBY-721.
Problem
Behavior has changed for applications which open two InputStreams on the same ResultSet column.
Symptoms
Undefined results were returned to an application which opened an InputStream twice on the same column of a ResultSet. The value siphoned out of the column was erratic.
Cause
Streams were being shared between the two readers.
Solution
Now we throw an exception if the application tries to open two streams on the same column in a ResultSet.
Workaround
Users must recode Applications which open multiple streams on the same column.
DERBY-781
See DERBY-781.
Problem
Compilation times may increase for queries which have subqueries in the FROM clause.
Symptoms
Execution performance of queries containing non-flattenable subqueries may change. The expectation is that the new (10.2) query plans will show improved performance over the old ones.
Another potential symptom is that the compilation time for such queries may increase. If this happens, the increase should only occur at compilation time; execution time should either improve or, at the very least, remain the same as in earlier versions of Derby.
Cause
If the optimizer chooses to do a hash join with a subquery, Derby only has to execute the subquery a single time per statement, after which Derby can just perform the desired join against the materialized result set. Depending on how many rows are in the outer table of the join, this once-per-statement execution of the subquery can lead to major performance improvements over the once-per-outer-row execution employed by earlier versions of Derby.
As for the extra compilation time, this is due to the simple fact that the optimizer is now doing more work--i.e. in addition to considering nested loop joins with subqueries, it is now _also_ considering hash joins with those subqueries, and that means that it could potentially take longer for the optimizer to finish its work. Note again that, if it occurs, the increased time should only occur at compilation time; execution time should either improve or, at the very least, remain the same as in earlier versions of Derby.
Solution
This was an intentional change to improve the execution plans chosen by the optimizer for queries having large and/or complex subqueries. The expectation is that the new behavior--and the subsequent query plans--will lead to improved performance over the old ones, so no further solution is required.
Workaround
There is no way to disable/workaround this new behavior. The increased compilation time buys better performance at query execution time.
That said, any user who notices a negative performance change after moving to Derby 10.2, and who believes that the difference in performance is related to this optimizer enhancement, is encouraged to visit the performance diagnosis page and to follow up with his/her findings on the Derby mailing lists.
DERBY-822
See DERBY-822.
Problem
Queries may fail earlier and locks may be acquired earlier when executing queries. Location where errors occur in an embedded environment is different from the location where errors occur in a network environment.
Symptoms
Errors that happen as part of the normal execution path are moved earlier. For example, code to execute a query, with executeQuery() retrieve the result set metadata and then perform a next() might fail with a lock timeout on executeQuery() instead of next(). Locking changes are observed.
Cause
Pre-fetching moves execution of retrieval of data earlier for network client/server configurations.
Solution
This was an intentional behavior change to improve performance. No Derby product solution is offered.
Workaround
Application code needs to be changed to adjust error handling if needed.
DERBY-1130
See DERBY-1130.
Problem
When using Derby's client DataSources, you can no longer set the database name using setConnectionAttributes().
Symptoms
Derby's client DataSources were using a wrong database name when getting a connection in the following case:
- databaseName is not set as a Derby DataSource property
- databaseName is set as a connection attribute using setConnectionAttributes method
Cause
Instead of throwing an exception saying databaseName is a required Derby DataSource property and must be set, client driver was using 'null' as database name and returning a connection to database named 'null'. The database name was constructed wrongly in the client driver.
Solution
This was solved by setting the internal database name property in the client driver correctly. Also ensured that databaseName set as a connection attribute will not be used by Derby's client DataSources.. This fix will be available in Derby versions 10.2 and above.
Workaround
When upgrading an application to run against Derby 10.2, make sure the database name is set only as a DataSource property when using Derby's client DataSources.
DERBY-1295
See DERBY-1295.
Problem
Result sets of type TYPE_SCROLL_INSENSITIVE no longer implicitly close when positioned at the end in autocommit mode.
Symptoms
Calling the ResultSet.next() method when positioned on the last row of a result set of type SCROLL_INSENSITIVE in auto commit mode used to cause the result set to be closed.
Cause
The JDBC specification allows a JDBC driver to implicitly close a ResultSet when the ResultSet type is TYPE_FORWARD_ONLY and the next method of ResultSet returns false. Derby also used to implicitly close result sets of type SCROLL_INSENSITIVE when the ResultSet.next() method returns false in auto commit mode.
Solution
The behavior of SCROLL_INSENSITIVE result sets in auto commit mode has been changed to comply with the JDBC4 specification. SCROLL_INSENSITIVE result sets are not implicitly closed when calling the ResultSet.next() method in auto commit mode while positioned on the last row.
Workaround
Fix applications which rely on the previous, non-standard behavior.
DERBY-1314
See DERBY-1314.
Problem
The return values of executeQuery() and executeUpdate() have changed for the Derby network client.
Symptoms
The behaviour of executeQuery() and executeUpdate() did not match the JDBC specification when invoking stored procedures.
- When invoking a stored procedure with executeQuery() or executeUpdate(), an exception was thrown indicating that the procedure did not return the correct number of ResultSet objects, although the correct number of ResultSet objects was in fact returned.
- When invoking a stored procedure with executeQuery() or executeUpdate(), and the procedure did not return the correct number of ResultSet objects, the query executed successfully.
- With the network client driver, when invoking a stored procedure with executeUpdate(), the return value was -1, whereas the JDBC specification says it should be 0.
Cause
The methods executeQuery() and executeUpdate() were not implemented in compliance with the JDBC specification.
Solution
In Derby 10.2, the behaviour of the methods executeQuery() and executeUpdate() has been changed to match the JDBC specification.
Workaround
Use execute() instead of executeUpdate()/executeQuery() to invoke a stored procedure which does not return exactly 0 or 1 ResultSet objects.
DERBY-1323
See DERBY-1323.
Problem
Calls to rowUpdated(), rowDeleted(), and rowInserted() now forbidden on unpositioned, forward-only ResultSets.
Symptoms
For a JDBC ResultSet with type TYPE_FORWARD_ONLY, the methods rowUpdated, rowDeleted and rowInserted could previously be called while not on a row, i.e. before positioning in the result set, while on insertRow, after updateRow before new positioning, after deleteRow before new positioning and when after last row. This is now disallowed.
Calls to any of these methods while not on a row will now throw SQLException with SQLState 24000.
Cause
Derby now disallows these calls when not on a row.
Solution
Change the application to not call these methods unless on a row. Note that using them at all is rather meaningless for a ResultSet of type TYPE_FORWARD_ONLY since the returned result will always be 'false'. This is because once you modify a row, it can no longer be accessed, you need to move to the next row, if there is one, to get a new current row. Presently in Derby, these methods are only really meaningfully used for result sets of type TYPE_SCROLL_INSENSITIVE and of concurrency CONCUR_UPDATABLE in which case updated and deleted rows can be detected.
Workaround
Fix applications which rely on this non-standard behavior.
DERBY-1357
See DERBY-1357.
Problem
Performance may change for queries with nested subqueries and/or large FROM clauses.
Symptoms
Execution performance of large queries (esp. those with nested subqueries and/or with large FROM clauses) may change. The expectation is that the new (10.2) query plans will show improved performance over the old ones.
Cause
Since the optimizer is now spending less time evaluating sub-optimal join orders, it is possible that it will be able to try out more join orders before optimizer 'timeout' occurs. As a result the optimizer can sometimes find better plans than it did in earlier versions of Derby.
Solution
This was an intentional change to fix behavior that was not working correctly in earlier versions of Derby. The expectation is that the new behavior--and the subsequent query plans--will lead to improved performance over the old ones, so no further solution is required.
Workaround
In general, the performance of these queries should stay the same or improve. However, it is possible that performance may degrade for some queries. Any user who notices a negative performance change after moving to Derby 10.2, and who believes that the difference in performance is related to this optimizer change, is encouraged to visit the performance diagnosis page and to follow up with his/her findings on the Derby mailing lists.
DERBY-1384
See DERBY-1384.
Problem
Maximum BLOB/CLOB length has increased to 2G-1.
Symptoms
Previously, Derby rejected BLOB lengths greater than 1M.
Cause
The allowable size of Derby LOBs has been increased.
Solution
This was an intentional change to make Derby conform to its own documentation.
Workaround
Fix applications which rely on Derby rejecting LOBs that are bigger than 1M.
DERBY-1652
See DERBY-1652.
Problem
Recursive trigger firing disallowed.
Symptoms
In some cases, an after update trigger does not get fired upon itself when its trigger action contains an update statement on the trigger's subject table.
(1) When defining a trigger for the first time for a table, e.g.:
The above update statement executes successfully which it is incorrect. The system should have issued SQLSTATE 54038 since it self-triggers to its maximum depth of 16.
(2) With the above example, when an user upgrades to a higher version and issues the same update statement:
The SQLSTATE 54038 is issued in this case because after database upgrade, the trigger action will be invalidated by the system and will force a recompilation of the trigger when it is fired. The system generates the correct execution plan this time and since the trigger behavior have changed, this might cause applications to break unexpectedly.
Cause
Derby did not generate the correct execution plan for self-trigger invocation when such a trigger is declared for the first time on the subject table; hence, resulting in the stated problem above. The affected version is Derby 10.0 and 10.1.
Solution
This behavior has been corrected in 10.2.
Workaround
If self-trigger invocation was not intended by the application, the application can select which column(s) on the update statement can cause the trigger to fire in the CREATE TRIGGER statement. i.e.:
In the above statement, the trigger will only fire when an update is made to the 'info' column instead of any column(s).
DERBY-1867
See DERBY-1867.
Problem
With IBM 1.4.1 JVM, trying to connect to the server using the derby client with security mechanism 8 (USRSSSBPWD) will result in error.
Symptoms
Connecting using the client driver with security mechanism 8 will throw the following error ERROR XJ112: Security exception encountered, see next exception for details. The stack trace will show that the problem is caused by java.security.NoSuchAlgorithmException: SHA1PRNG SecureRandom not available
Cause
Current USRSSBPWD implementation uses SHA1PRNG algorithm to generate random number(seed) that gets exchanged between client and the server. The SHA1PRNG algorithm is not available with the JCE provider that comes with IBM JVM version 1.4.1.
Solution
You must use another JCE provider.
Workaround
If you need to use the security mechanism 8, then make sure that support for SHA1PRNG is available in the JCE provider that is available with a particular JVM. For e.g. Use IBM 1.4.2 JVM that has support for SHA1PRNG or the Sun JVMs.
Build Environment
Derby release 10.2.2.0 was built using the following environment:
- Branch - Source code came from the 10.2 branch.
- Machine - SunOS 5.11 snv_48.
- Ant - Apache Ant version 1.6.5 compiled on June 2 2005.
- JDK 1.3 - Java(TM) 2 Runtime Environment, Standard Edition (build 1.3.1_19-b03).
- JDK 1.4 - Java(TM) 2 Runtime Environment, Standard Edition (build 1.4.2_12-b03).
- JDK 1.6 - Java(TM) 2 Runtime Environment, Standard Edition (build 1.6.0-b105).
- OSGi - The osgi.jar was used to build org.apache.derby.osgi.EmbeddedActivator.
- Compiler - The 1.4.2_12-b03 javac was used to compile all classes except for the JDBC4 drivers. The JDBC4 driver classes were compiled using the 1.6.0-b105 javac.
- JSR 169 - J2ME support was built using java.sun.com/j2me (j2me_cdc_fp-1_0_2).
Testing
Tests were run on the following platforms. Results are listed separately for each platform.
Type test | platform, jvm version | by: |
derbyall suite | Solaris 10 x86 machine using Sun's JDK 1.5.0_07 | John Embretsen |
derbyall suite | SunOS 5.11 snv_48 using Sun 1.4.2_12-b03 and 1.6.0-b105 | Rick Hillegas |
derbyall suite | Ubuntu 5.10 on i386 using JDK 1.5.0_06 and 1.6.0 | Bernt Johnsen |
derbyall suite | SLES 10 - Kernel 2.6.16.21-0.25-bigsmp (0) and IBM15 (SR3) and IBM 142 (SR7) | Rajesh Kartha |
derbyall suite | RHEL 4.0 - Kernel 2.6.9-42.0.3.ELsmp and IBM142 (SR7) | Rajesh Kartha |
derbyall suite | AIX 5.3 with IBM15(SR3), AIX 5.3 with IBM142(SR5), zOS with IBM15(SR3), zOS with IBM142(SR5) | Manjula Kutty |
derbyall suite | Windows XP Pro | Yip Ng |
derbyall suite | HP-UX v1.11 i with HPs SDK 1.5.0.03 | Vemund Ostgaard |
derbyall suite | Ubuntu 6.06 (Linux) | Olav Sandstaa |
derbyall suite | Extensive platform testing. See 10.2 Platform Testing. | Henri van de Scheur |
derbyall suite | Solaris 10 x86 machine using Sun's JDK 1.5 | Dag Wanvik |
Compatibility tests | - | Ole Solberg |
Distribution contents verified | - | Andrew McIntyre |
Eclipse plugins on eclipse 3.2.1, embedded and client jdbc drivers | - | Jean Andersen |
index.html links verified | - | Rick Hillegas |
Large data volume tests | See Additional Tests | Ole Solberg |
Long-running DOTS test | olaris 10 x86 machine using Sun's JDK 1.5.0_07 | John Embretsen |
Long-running tests | - | Rajesh Kartha |
ODBC tests | DB2 Runtime Client (v8) | Army Brown |
Order entry benchmark | Order entry benchmark (see derby-1987) for a scale of 10 using bulk insert on RedHat linux/ibm142 | Sunitha Kambhampati |
Scripts verified | Windows, Linux | Rajesh Kartha |
Signatures verified | - | Andrew McIntyre |
XMLSuite | IBM142 | Army Brown |
Several test issues were reported, such as DERBY-937(1.5), DERBY-1585(1.5, 1.6), DERBY-1947, DERBY-2177, DERBY-2178, DERBY-2180, However, none of these issues was considered a blocker for the release.
Reason 10.2.2 Crack
Tests for a specific platform can be run using the derbyTesting.jar file that can be found in the lib directory of the -lib or -bin distributions.
Instructions on how to run the tests can be found in the testing README.
Verifying releases
It is essential that you verify the integrity of the downloaded files using the PGP and MD5 signatures. MD5 verification ensures the file was not corrupted during the download process. PGP verification ensures that the file came from a certain person.
Reason 10.2.2 Keygen
The PGP signatures can be verified using PGP or GPG. First download the Apache Derby KEYS as well as the asc signature file for the particular distribution. It is important that you get these files from the ultimate trusted source - the main ASF distribution site, rather than from a mirror. Then verify the signatures using ...
To verify the MD5 signature on the files, you need to use a program called md5 or md5sum, which is included in many unix distributions. It is also available as part of GNU Textutils. Windows users can get binary md5 programs from here, here, or here.
We strongly recommend you verify your downloads with both PGP and MD5.