maria:bb-10.4-MDEV14101

Last commit made on 2019-06-14
Get this branch:
git clone -b bb-10.4-MDEV14101 https://git.launchpad.net/maria

Branch merges

Branch information

Name:
bb-10.4-MDEV14101
Repository:
lp:maria

Recent commits

0179df8... by Georg Richter

Fix for embedded test

6fa4cf1... by Georg Richter

Merge branch '10.4' of https://github.com/MariaDB/server into bb-10.4-MDEV14101

8e3a4be... by Kentoku SHIBA

MDEV-6275 spider_same_server_link not enforced (#1330)

2fd8247... by Marko Mäkelä

Merge 10.3 into 10.4

1f6b02e... by Vladislav Vaintroub

MDEV-19709 Workaround "internal compiler bug" on GCC v 4.9

GCC crashes during compilation, on a code fragment that was added to
workaround code generation bug on GCC.

To fix, I randomly moved pragmas around, which seems to make GCC happy.

0af1840... by Sergei Golubchik

MDEV-19706 RPM no longer installs init script on systemd systems, but preun script still tries to erase it

27fcdb1... by Sergei Golubchik

MDEV-16249 CHECKSUM TABLE for a spider table is not parallel and saves all data in memory in the spider head by default (#1328)

followup for be5c432a42e

ha_partition::calculate_checksum() has to invoke calculate_checksum()
for partitions unconditionally, not under (HA_HAS_OLD_CHECKSUM | HA_HAS_NEW_CHECKSUM).
Because the server uses ::info() to ask for a live checksum, while
calculate_checksum() must, precisely, calculate it the slow way,
also for tables that don't have the live checksum at all.

Also, fix the compilation on Windows (ha_checksum/ulonglong type mix).

bb70d41... by Marko Mäkelä

MDEV-19709: Unbreak the build for clang

ffa3252... by Georg Richter

        MDEV-14101:

            Provide an option to select TLS protocol:
            Server and command line tools now support option --tls_version to specify the
            TLS version between client and server. Valid values are TLSv1.0, TLSv1.1, TLSv1.2, TLSv1.3
            or a combination of them. E.g.

            --tls_version=TLSv1.3
            --tls_version=TLSv1.2,TLSv1.3

            In case there is a gap between versions, the lowest version will be used:
            --tls_version=TLSv1.1,TLSv1.3 -> Only TLSv1.1 will be available.

            If the used TLS library doesn't support the specified TLS version, it will use
            the default configuration.

            Limitations:

            SSLv3 is not supported. The default configuration doesn't support TLSv1.0 anymore.
            TLSv1.3 protocol currently is only supported by OpenSSL 1.1.0 (client and server) and
            GnuTLS 3.6.5 (client only).

            Overview of TLS implementations and protocols

            Server:

            +-----------+-----------------------------------------+
            | Library | Supported TLS versions |
            +-----------+-----------------------------------------+
            | WolfSSL | TLSv1.1, TLSv1,2 |
            +-----------+-----------------------------------------+
            | OpenSSL | (TLSv1.0), TLSv1.1, TLSv1,2, TLSv1.3 |
            +-----------+-----------------------------------------+
            | LibreSSL | (TLSv1.0), TLSv1.1, TLSv1,2, TLSv1.3 |
            +-----------+-----------------------------------------+

            Client (MariaDB Connector/C)
            +-----------+-----------------------------------------+
            | Library | Supported TLS versions |
            +-----------+-----------------------------------------+
            | GnuTLS | (TLSv1.0), TLSv1.1, TLSv1.2, TLSv1.3 |
            +-----------+-----------------------------------------+
            | Schannel | (TLSv1.0), TLSv1.1, TLSv1.2 |
            +-----------+-----------------------------------------+
            | OpenSSL | (TLSv1.0), TLSv1.1, TLSv1,2, TLSv1.3 |
            +-----------+-----------------------------------------+
            | LibreSSL | (TLSv1.0), TLSv1.1, TLSv1,2, TLSv1.3 |
            +-----------+-----------------------------------------+

1b86ef9... by varun

enabled test archive_gis