extending-mysql-5.7-en.a4
extending-mysql-5.7-en.a4
7
Abstract
This document describes what you need to know when working on the MySQL 5.7 code. To track or contribute
to MySQL development, follow the instructions in Installing MySQL Using a Development Source Tree. If you
are interested in MySQL internals, you should also join the MySQL Community Slack. Feel free to ask questions
about the code and to send patches that you would like to contribute to the MySQL project!
For help with using MySQL, please visit the MySQL Forums, where you can discuss your issues with other
MySQL users.
iii
iv
Preface and Legal Notices
This document describes what you need to know when working on the MySQL 5.7 code. To track or
contribute to MySQL development, follow the instructions in Installing MySQL Using a Development
Source Tree. If you are interested in MySQL internals, you should also join the MySQL Community
Slack. Feel free to ask questions about the code and to send patches that you would like to contribute
to the MySQL project!
Legal Notices
Copyright © 1997, 2025, Oracle and/or its affiliates.
License Restrictions
This software and related documentation are provided under a license agreement containing
restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly
permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate,
broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any
form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless
required by law for interoperability, is prohibited.
Warranty Disclaimer
The information contained herein is subject to change without notice and is not warranted to be error-
free. If you find any errors, please report them to us in writing.
If this is software, software documentation, data (as defined in the Federal Acquisition Regulation), or
related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the
U.S. Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated
software, any programs embedded, installed, or activated on delivered hardware, and modifications
of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed
by U.S. Government end users are "commercial computer software," "commercial computer software
documentation," or "limited rights data" pursuant to the applicable Federal Acquisition Regulation and
agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display,
disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs
(including any operating system, integrated software, any programs embedded, installed, or activated
on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/
or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in
the applicable contract. The terms governing the U.S. Government's use of Oracle cloud services
are defined by the applicable contract for such services. No other rights are granted to the U.S.
Government.
This software or hardware is developed for general use in a variety of information management
applications. It is not developed or intended for use in any inherently dangerous applications, including
applications that may create a risk of personal injury. If you use this software or hardware in dangerous
applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and
other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any
damages caused by use of this software or hardware in dangerous applications.
Trademark Notice
Oracle, Java, MySQL, and NetSuite are registered trademarks of Oracle and/or its affiliates. Other
names may be trademarks of their respective owners.
v
Documentation Accessibility
Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC
trademarks are used under license and are trademarks or registered trademarks of SPARC
International, Inc. AMD, Epyc, and the AMD logo are trademarks or registered trademarks of Advanced
Micro Devices. UNIX is a registered trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content,
products, and services from third parties. Oracle Corporation and its affiliates are not responsible
for and expressly disclaim all warranties of any kind with respect to third-party content, products,
and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle
Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to
your access to or use of third-party content, products, or services, except as set forth in an applicable
agreement between you and Oracle.
This documentation is NOT distributed under a GPL license. Use of this documentation is subject to the
following terms:
You may create a printed copy of this documentation solely for your own personal use. Conversion
to other formats is allowed as long as the actual content is not altered or edited in any way. You shall
not publish or distribute this documentation in any form or on any media, except if you distribute the
documentation in a manner similar to how Oracle disseminates it (that is, electronically for download
on a Web site with the software) or on a CD-ROM or similar medium, provided however that the
documentation is disseminated together with the software on the same medium. Any other use, such
as any dissemination of printed copies or use of this documentation, in whole or in part, in another
publication, requires the prior written consent from an authorized representative of Oracle. Oracle and/
or its affiliates reserve any and all rights to this documentation not expressly granted above.
Documentation Accessibility
For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program
website at
http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc.
vi
Chapter 1 Introduction
This document describes what you need to know when working on the MySQL code. To track or
contribute to MySQL development, follow the instructions in Installing MySQL Using a Development
Source Tree. If you are interested in MySQL internals, you should also join the MySQL Community
Slack. Feel free to ask questions about the code and to send patches that you would like to contribute
to the MySQL project!
1
2
Chapter 2 MySQL Threads
The MySQL server creates the following threads:
• Connection manager threads handle client connection requests on the network interfaces that
the server listens to. On all platforms, one manager thread handles TCP/IP connection requests.
On Unix, this manager thread also handles Unix socket file connection requests. On Windows, a
manager thread handles shared-memory connection requests, and another handles named-pipe
connection requests. The server does not create threads to handle interfaces that it does not listen
to. For example, a Windows server that does not have support for named-pipe connections enabled
does not create a thread to handle them.
• Connection manager threads associate each client connection with a thread dedicated to it that
handles authentication and request processing for that connection. Manager threads create a new
thread when necessary but try to avoid doing so by consulting the thread cache first to see whether
it contains a thread that can be used for the connection. When a connection ends, its thread is
returned to the thread cache if the cache is not full.
For information about tuning the parameters that control thread resources, see Connection
Interfaces.
• On a source replication server, connections from replica servers are handled like client connections:
There is one thread per connected replica.
• On a replica server, an I/O thread is started to connect to the source server and read updates
from it. An SQL thread is started to apply updates read from the source. These two threads run
independently and can be started and stopped independently.
• A signal thread handles all signals. This thread also normally handles alarms and calls
process_alarm() to force timeouts on connections that have been idle too long.
• If InnoDB is used, there will be additional read and write threads by default. The number of these are
controlled by the innodb_read_io_threads and innodb_write_io_threads parameters. See
InnoDB Startup Options and System Variables.
• If the server is started with the --flush_time=val option, a dedicated thread is created to flush all
tables every val seconds.
• If the event scheduler is active, there is one thread for the scheduler, and a thread for each event
currently running. See Event Scheduler Overview.
mysqladmin processlist only shows the connection, replication, and event threads.
3
4
Chapter 3 The MySQL Test Suite
The test system that is included in Unix source and binary distributions makes it possible for users and
developers to perform regression tests on the MySQL code. These tests can be run on Unix.
You can also write your own test cases. For information, including system requirements, see
The MySQL Test Framework in the MySQL Server Doxygen documentation, available at https://
dev.mysql.com/doc/index-other.html.
The current set of test cases does not test everything in MySQL, but it should catch most obvious
bugs in the SQL processing code, operating system or library issues, and is quite thorough in testing
replication. Our goal is to have the tests cover 100% of the code. We welcome contributions to our test
suite. You may especially want to contribute tests that examine the functionality critical to your system
because this ensures that all future MySQL releases work well with your applications.
The test system consists of a test language interpreter (mysqltest), a Perl script to run all tests
(mysql-test-run.pl), the actual test cases written in a special test language, and their expected
results. To run the test suite on your system after a build, type make test from the source root
directory, or change location to the mysql-test directory and type ./mysql-test-run.pl. If you
have installed a binary distribution, change location to the mysql-test directory under the installation
root directory (for example, /usr/local/mysql/mysql-test), and run ./mysql-test-run.pl.
All tests should succeed. If any do not, feel free to try to find out why and report the problem if it
indicates a bug in MySQL. See How to Report Bugs or Problems.
If one test fails, you should run mysql-test-run.pl with the --force option to check whether any
other tests fail.
If you have a copy of mysqld running on the machine where you want to run the test suite, you do
not have to stop it, as long as it is not using ports 9306 or 9307. If either of those ports is taken, you
should set the MTR_BUILD_THREAD environment variable to an appropriate value, and the test suite
will use a different set of ports for source, replica, and NDB). For example:
$> export MTR_BUILD_THREAD=31
$> ./mysql-test-run.pl [options] [test_name]
In the mysql-test directory, you can run an individual test case with ./mysql-test-run.pl
test_name.
If you have a question about the test suite, or have a test case to contribute, join the MySQL
Community Slack.
5
6
Chapter 4 The MySQL Plugin API
Table of Contents
4.1 Types of Plugins ..................................................................................................................... 7
4.2 Plugin API Characteristics ..................................................................................................... 12
4.3 Plugin API Components ........................................................................................................ 13
4.4 Writing Plugins ...................................................................................................................... 14
4.4.1 Overview of Plugin Writing .......................................................................................... 15
4.4.2 Plugin Data Structures ................................................................................................ 16
4.4.3 Compiling and Installing Plugin Libraries ..................................................................... 27
4.4.4 Writing Full-Text Parser Plugins .................................................................................. 28
4.4.5 Writing Daemon Plugins ............................................................................................. 36
4.4.6 Writing INFORMATION_SCHEMA Plugins ................................................................... 37
4.4.7 Writing Semisynchronous Replication Plugins .............................................................. 39
4.4.8 Writing Audit Plugins .................................................................................................. 41
4.4.9 Writing Authentication Plugins ..................................................................................... 51
4.4.10 Writing Password-Validation Plugins .......................................................................... 60
4.4.11 Writing Protocol Trace Plugins .................................................................................. 62
4.4.12 Writing Keyring Plugins ............................................................................................. 67
MySQL supports a plugin API that enables creation of server components. Plugins can be loaded at
server startup, or loaded and unloaded at runtime without restarting the server. The API is generic and
does not specify what plugins can do. The components supported by this interface include, but are not
limited to, storage engines, full-text parser plugins, and server extensions.
For example, full-text parser plugins can be used to replace or augment the built-in full-text parser.
A plugin can parse text into words using rules that differ from those used by the built-in parser. This
can be useful if you need to parse text with characteristics different from those expected by the built-in
parser.
The plugin interface is more general than the older loadable function interface.
The plugin interface uses the plugin table in the mysql database to record information about plugins
that have been installed permanently with the INSTALL PLUGIN statement. This table is created as
part of the MySQL installation process. Plugins can also be installed for a single server invocation with
the --plugin-load option. Plugins installed this way are not recorded in the plugin table. See
Installing and Uninstalling Plugins.
MySQL supports an API for client plugins in addition to that for server plugins. This is used, for
example, by authentication plugins where a server-side plugin and a client-side plugin cooperate to
enable clients to connect to the server through a variety of authentication methods.
Additional Resources
The book MySQL 5.1 Plugin Development by Sergei Golubchik and Andrew Hutchings provides a
wealth of detail about the plugin API. Despite the fact that the book's title refers to MySQL Server 5.1,
most of the information in it applies to later versions as well.
• Storage engines
• Full-text parsers
7
Loadable Function (UDF) Plugins
• Daemons
• INFORMATION_SCHEMA tables
• Semisynchronous replication
• Auditing
• Authentication
• Protocol tracing
• Query rewriting
• Daemon Plugins
• INFORMATION_SCHEMA Plugins
• Audit Plugins
• Authentication Plugins
• Password-Validation Plugins
• Keyring Plugins
For information about using the MySQL interface for loadable functions, see Section 6.2, “Adding
a Loadable Function”. The steps to compile and install loadable function plugins are described in
Loadable Function Compiling and Installing.
Note
8
Full-Text Parser Plugins
For information on how to use the plugin API to write storage engines, see MySQL Internals: Writing a
Custom Storage Engine.
MySQL also has a character-based ngram full-text parser that supports Chinese, Japanese, and
Korean (CJK), and a word-based MeCab parser plugin that supports Japanese, for use with InnoDB
and MyISAM tables.
For full-text processing, “parsing” means extracting words (or “tokens”, in the case of an n-gram
character-based parser) from text or a query string based on rules that define which character
sequences make up a word and where word boundaries lie.
When parsing for indexing purposes, the parser passes each word to the server, which adds it to a full-
text index. When parsing a query string, the parser passes each word to the server, which accumulates
the words for use in a search.
The parsing properties of the built-in full-text parser are described in Full-Text Search Functions. These
properties include rules for determining how to extract words from text. The parser is influenced by
certain system variables that cause words shorter or longer to be excluded, and by the stopword list
that identifies common words to be ignored. For more information, see Full-Text Stopwords, and Fine-
Tuning MySQL Full-Text Search.
The plugin API enables you to use a full-text parser other than the default built-in full-text parser. For
example, if you are working with Japanese, you may choose to use the MeCab full-text parser. The
plugin API also enables you to provide a full-text parser of your own so that you have control over the
basic duties of a parser. A parser plugin can operate in either of two roles:
• The plugin can replace the built-in parser. In this role, the plugin reads the input to be parsed, splits
it up into words, and passes the words to the server (either for indexing or for token accumulation).
The ngram and MeCab parsers operate as replacements for the built-in full-text parser.
You may choose to provide your own full-text parser if you need to use different rules from those of
the built-in parser for determining how to split up input into words. For example, the built-in parser
considers the text “case-sensitive” to consist of two words “case” and “sensitive,” whereas an
application might need to treat the text as a single word.
• The plugin can act in conjunction with the built-in parser by serving as a front end for it. In this role,
the plugin extracts text from the input and passes the text to the parser, which splits up the text into
words using its normal parsing rules. This parsing is affected by the innodb_ft_xxx or ft_xxx
system variables and the stopword list.
One reason to use a parser this way is that you need to index content such as PDF documents, XML
documents, or .doc files. The built-in parser is not intended for those types of input but a plugin can
pull out the text from these input sources and pass it to the built-in parser.
It is also possible for a parser plugin to operate in both roles. That is, it could extract text from
noncleartext input (the front end role), and also parse the text into words (thus replacing the built-in
parser).
A full-text plugin is associated with full-text indexes on a per-index basis. That is, when you install a
parser plugin initially, that does not cause it to be used for any full-text operations. It simply becomes
available. For example, a full-text parser plugin becomes available to be named in a WITH PARSER
clause when creating individual FULLTEXT indexes. To create such an index at table-creation time, do
this:
CREATE TABLE t
9
Daemon Plugins
(
doc CHAR(255),
FULLTEXT INDEX (doc) WITH PARSER parser_name
) ENGINE=InnoDB;
Or you can add the index after the table has been created:
ALTER TABLE t ADD FULLTEXT INDEX (doc) WITH PARSER parser_name;
The only SQL change for associating the parser with the index is the WITH PARSER clause. Searches
are specified as before, with no changes needed for queries.
When you associate a parser plugin with a FULLTEXT index, the plugin is required for using the index.
If the parser plugin is dropped, any index associated with it becomes unusable. Any attempt to use a
table for which a plugin is not available results in an error, although DROP TABLE is still possible.
For more information about full-text plugins, see Section 4.4.4, “Writing Full-Text Parser Plugins”.
MySQL 5.7 supports full-text plugins with MyISAM and InnoDB.
Daemon Plugins
A daemon plugin is a simple type of plugin used for code that should be run by the server but that does
not communicate with it. MySQL distributions include an example daemon plugin that writes periodic
heartbeat messages to a file.
For more information about daemon plugins, see Section 4.4.5, “Writing Daemon Plugins”.
INFORMATION_SCHEMA Plugins
INFORMATION_SCHEMA plugins enable the creation of tables containing server metadata that
are exposed to users through the INFORMATION_SCHEMA database. For example, InnoDB uses
INFORMATION_SCHEMA plugins to provide tables that contain information about current transactions
and locks.
For more information about INFORMATION_SCHEMA plugins, see Section 4.4.6, “Writing
INFORMATION_SCHEMA Plugins”.
For more information about semisynchronous replication plugins, see Section 4.4.7, “Writing
Semisynchronous Replication Plugins”.
Audit Plugins
The MySQL server provides a pluggable audit interface that enables information about server
operations to be reported to interested parties. Audit notification occurs for these operations (although
the interface is general and the server could be modified to report others):
• Write a message to the general query log (if the log is enabled)
Audit plugins may register with the audit interface to receive notification about server operations. When
an auditable event occurs within the server, the server determines whether notification is needed. For
10
Authentication Plugins
each registered audit plugin, the server checks the event against those event classes in which the
plugin is interested and passes the event to the plugin if there is a match.
This interface enables audit plugins to receive notifications only about operations in event classes they
consider significant and to ignore others. The interface provides for categorization of operations into
event classes and further division into event subclasses within each class.
When an audit plugin is notified of an auditable event, it receives a pointer to the current THD structure
and a pointer to a structure that contains information about the event. The plugin can examine the
event and perform whatever auditing actions are appropriate. For example, the plugin can see what
statement produced a result set or was logged, the number of rows in a result, who the current user
was for an operation, or the error code for failed operations.
For more information about audit plugins, see Section 4.4.8, “Writing Audit Plugins”.
Authentication Plugins
MySQL supports pluggable authentication. Authentication plugins exist on both the server and client
sides. Plugins on the server side implement authentication methods for use by clients when they
connect to the server. A plugin on the client side communicates with a server-side plugin to provide the
authentication information that it requires. A client-side plugin may interact with the user, performing
tasks such as soliciting a password or other authentication credentials to be sent to the server. See
Pluggable Authentication.
Pluggable authentication also enables proxy user capability, in which one user takes the identity of
another user. A server-side authentication plugin can return to the server the name of the user whose
identity the connecting user should have. See Proxy Users.
For more information about authentication plugins, see Section 4.4.9, “Writing Authentication Plugins”.
Password-Validation Plugins
The MySQL server provides an interface for writing plugins that test passwords. Such a plugin
implements two capabilities:
• Rejection of too-weak passwords in statements that assign passwords (such as CREATE USER and
ALTER USER statements), and passwords given as arguments to the PASSWORD() function.
For information about writing this type of plugin, see Section 4.4.10, “Writing Password-Validation
Plugins”.
For more information about protocol trace plugins, see Section 4.4.11, “Writing Protocol Trace Plugins”.
• The plugin enables rewriting of SQL statements arriving at the server before the server processes
them.
11
Keyring Plugins
• The plugin receives a statement string and may return a different string.
• The server parses each statement and passes its parse tree to the plugin, which may traverse
the tree. The plugin can return the original tree to the server for further processing, or construct a
different tree and return that instead.
• The plugin can use the mysql_parser plugin service for these purposes:
• To activate statement digest calculation and obtain the normalized version of statements
independent of whether the Performance Schema produces digests.
• To parse statements. This is useful if the plugin constructs a new statement string from the parse
tree. The plugin can have the server parse the string to produce a new tree, then return that tree
as the representation of the rewritten statement.
For more information about plugin services, see MySQL Plugin Services.
• If a query rewrite plugin is installed, the --log-raw option affects statement logging as follows:
• Without --log-raw, the server logs the statement returned by the query rewrite plugin. This may
differ from the statement as received.
• If a plugin rewrites a statement, the server decides whether to write it to the binary log (and thus to
any replicas) based on the rewritten statement, not the original statement. If a plugin rewrites only
SELECT statements to SELECT statements, there is no impact on binary logging because the server
does not write SELECT statements to the binary log.
• If a plugin rewrites a statement, the server produces a Note message that the client can view
using SHOW WARNINGS. Messages have this format, where stmt_in is the original statement and
stmt_out is the rewritten statement:
Query 'stmt_in' rewritten to 'stmt_out' by a query rewrite plugin
MySQL distributions include a postparse query rewrite plugin named Rewriter. This plugin is rule
based. You can add rows to its rules table to cause SELECT statement rewriting. For more information,
see The Rewriter Query Rewrite Plugin.
Query rewrite plugins use the same API as audit plugins. For more information about audit plugins, see
Section 4.4.8, “Writing Audit Plugins”.
Keyring Plugins
As of MySQL 5.7.11, MySQL Server supports keyring plugins that enable internal server components
and plugins to securely store sensitive information for later retrieval.
All MySQL distributions include a keyring plugin named keyring_file. MySQL Enterprise Edition
distributions include additional keyring plugins. See The MySQL Keyring.
For more information about keyring plugins, see Section 4.4.12, “Writing Keyring Plugins”.
12
Plugin API Components
Each plugin has a name that it can be referred to in SQL statements, as well as other metadata such
as an author and a description that provide other information. This information can be examined in
the INFORMATION_SCHEMA.PLUGINS table or using the SHOW PLUGINS statement.
Although some aspects of the plugin API are common to all types of plugins, the API also permits
type-specific interface elements so that different types of plugins can be created. A plugin with one
purpose can have an interface most appropriate to its own requirements and not the requirements of
some other plugin type.
Interfaces for several types of plugins exist, such as storage engines, full-text parser, and
INFORMATION_SCHEMA tables. Others can be added.
A plugin can implement system and status variables that are available through the SHOW
VARIABLES and SHOW STATUS statements.
The version information included in the plugin API enables a plugin library and each plugin that it
contains to be self-identifying with respect to the API version that was used to build the library. If the
API changes over time, the version numbers will change, but a server can examine a given plugin
library's version information to determine whether it supports the plugins in the library.
There are two types of version numbers. The first is the version for the general plugin framework
itself. Each plugin library includes this kind of version number. The second type of version applies
to individual plugins. Each specific type of plugin has a version for its interface, so each plugin in a
library has a type-specific version number. For example, a library containing a full-text parser plugin
has a general plugin API version number, and the plugin has a version number specific to the full-text
plugin interface.
A plugin library must be installed in a specific dedicated directory for which the location is controlled
by the server and cannot be changed at runtime. Also, the library must contain specific symbols that
identify it as a plugin library. The server will not load something as a plugin if it was not built as a
plugin.
The services interface exposes server functionality that plugins can access using ordinary function
calls. For details, see MySQL Plugin Services.
In some respects, the server plugin API is similar to the older loadable function API that it supersedes,
but the plugin API has several advantages over the older interface. For example, loadable functions
had no versioning information. Also, the newer plugin interface eliminates the security issues of the
older loadable function interface. The older interface for writing nonplugin loadable functions permitted
libraries to be loaded from any directory searched by the system's dynamic linker, and the symbols that
identified the loadable function library were relatively nonspecific.
The client plugin API has similar architectural characteristics, but client plugins have no direct access to
the server the way server plugins do.
13
Writing Plugins
SQL statements:
• INSTALL PLUGIN registers a plugin in the mysql.plugin table and loads the plugin code.
• UNINSTALL PLUGIN unregisters a plugin from the mysql.plugin table and unloads the plugin
code.
• The WITH PARSER clause for full-text index creation associates a full-text parser plugin with a given
FULLTEXT index.
• The plugin_dir system variable indicates the location of the directory where all plugins
must be installed. The value of this variable can be specified at server startup with a --
plugin_dir=dir_name option. mysql_config --plugindir displays the default plugin
directory path name.
For additional information about plugin loading, see Installing and Uninstalling Plugins.
Plugin-related tables:
• The mysql.plugin table lists each plugin that was installed with INSTALL PLUGIN and is required
for plugin use. For new MySQL installations, this table is created during the installation process.
To examine how MySQL implements plugins, consult the following source files in a MySQL source
distribution:
• In the include/mysql directory, plugin.h exposes the public plugin API. This file should be
examined by anyone who wants to write a plugin library. plugin_xxx.h files provide additional
information that pertains to specific types of plugins. client_plugin.h contains information
specific to client plugins.
• In the sql directory, sql_plugin.h and sql_plugin.cc comprise the internal plugin
implementation. sql_acl.cc is where the server uses authentication plugins. These files need not
be consulted by plugin developers. They may be of interest for those who want to know more about
how the server handles plugins.
• In the sql-common directory, client_plugin.h implements the C API client plugin functions, and
client.c implements client authentication support. These files need not be consulted by plugin
developers. They may be of interest for those who want to know more about how the server handles
plugins.
Every server plugin must have a general descriptor that provides information to the plugin API, and a
type-specific descriptor that provides information about the plugin interface for a given type of plugin.
14
Overview of Plugin Writing
The structure of the general descriptor is the same for all plugin types. The structure of the type-
specific descriptor varies among plugin types and is determined by the requirements of what the plugin
needs to do. The server plugin interface also enables plugins to expose status and system variables.
These variables become visible through the SHOW STATUS and SHOW VARIABLES statements and the
corresponding INFORMATION_SCHEMA tables.
For client-side plugins, the architecture is a bit different. Each plugin must have a descriptor, but there
is no division into separate general and type-specific descriptors. Instead, the descriptor begins with a
fixed set of members common to all client plugin types, and the common members are followed by any
additional members required to implement the specific plugin type.
You can write plugins in C or C++ (or another language that can use C calling conventions). Plugins
are loaded and unloaded dynamically, so your operating system must support dynamic loading and you
must have compiled the calling application dynamically (not statically). For server plugins, this means
that mysqld must be linked dynamically.
A server plugin contains code that becomes part of the running server, so when you write the plugin,
you are bound by any and all constraints that otherwise apply to writing server code. For example, you
may have problems if you attempt to use functions from the libstdc++ library. These constraints may
change in future versions of the server, so it is possible that server upgrades will require revisions to
plugins originally written for older servers. For information about these constraints, see MySQL Source-
Configuration Options, and Dealing with Problems Compiling MySQL.
Client plugin writers should avoid dependencies on what symbols the calling application has because
you cannot be sure what applications will use the plugin.
1. In the plugin source file, include the header files that the plugin library needs. The plugin.h file is
required, and the library might require other files as well. For example:
#include <stdlib.h>
#include <ctype.h>
#include <mysql/plugin.h>
2. Set up the descriptor information for the plugin library file. For server plugins, write the library
descriptor, which must contain the general plugin descriptor for each server plugin in the file. For
more information, see Section 4.4.2.1, “Server Plugin Library and Plugin Descriptors”. In addition,
set up the type-specific descriptor for each server plugin in the library. Each plugin's general
descriptor points to its type-specific descriptor.
For client plugins, write the client descriptor. For more information, see Section 4.4.2.3, “Client
Plugin Descriptors”.
3. Write the plugin interface functions for each plugin. For example, each plugin's general plugin
descriptor points to the initialization and deinitialization functions that the server should invoke when
it loads and unloads the plugin. The plugin's type-specific description may also point to interface
functions.
4. For server plugins, set up the status and system variables, if there are any.
5. Compile the plugin library as a shared library and install it in the plugin directory. For more
information, see Section 4.4.3, “Compiling and Installing Plugin Libraries”.
6. For server plugins, register the plugin with the server. For more information, see Installing and
Uninstalling Plugins.
15
Plugin Data Structures
If the plugin library contains any server plugins, it must include the following descriptor information:
• A library descriptor indicates the general server plugin API version number used by the library and
contains a general plugin descriptor for each server plugin in the library. To provide the framework
for this descriptor, invoke two macros from the plugin.h header file:
mysql_declare_plugin(name)
... one or more server plugin descriptors here ...
mysql_declare_plugin_end;
The macros expand to provide a declaration for the API version automatically. You must provide the
plugin descriptors.
• Within the library descriptor, each general server plugin is described by a st_mysql_plugin
structure. This plugin descriptor structure contains information that is common to every type of server
plugin: A value that indicates the plugin type; the plugin name, author, description, and license type;
pointers to the initialization and deinitialization functions that the server invokes when it loads and
unloads the plugin, and pointers to any status or system variables the plugin implements.
• Each general server plugin descriptor within the library descriptor also contains a pointer to a type-
specific plugin descriptor. The structure of the type-specific descriptors varies from one plugin type to
another because each type of plugin can have its own API. A type-specific plugin descriptor contains
a type-specific API version number and pointers to the functions that are needed to implement that
plugin type. For example, a full-text parser plugin has initialization and deinitialization functions, and
a main parsing function. The server invokes these functions when it uses the plugin to parse text.
The plugin library also contains the interface functions that are referenced by the general and type-
specific descriptors for each plugin in the library.
If the plugin library contains a client plugin, it must include a descriptor for the plugin. The descriptor
begins with a fixed set of members common to all client plugins, followed by any members specific to
the plugin type. To provide the descriptor framework, invoke two macros from the client_plugin.h
header file:
mysql_declare_client_plugin(plugin_type)
... members common to all client plugins ...
... type-specific extra members ...
mysql_end_client_plugin;
The plugin library also contains any interface functions referenced by the client descriptor.
When a client program looks for a client plugin that is in a plugin library and not built into
libmysqlclient, it looks for a file with a base name that is the same as the plugin name. For
16
Plugin Data Structures
example, if a program needs to use a client authentication plugin named auth_xxx on a system that
uses .so as the library suffix, it looks in the file named auth_xxx.so. (On macOS, the program looks
first for auth_xxx.dylib, then for auth_xxx.so.) For this reason, if a plugin library contains a client
plugin, the library must have the same base name as that plugin.
The same is not true for a library that contains server plugins. The --plugin-load option and the
INSTALL PLUGIN statement provide the library file name explicitly, so there need be no explicit
relationship between the library name and the name of any server plugins it contains.
If the server does not find those two symbols in a library, it does not accept it as a legal plugin library
and rejects it with an error. This prevents use of a library for plugin purposes unless it was built
specifically as a plugin library.
The conventional way to define the two required symbols is by using the mysql_declare_plugin()
and mysql_declare_plugin_end macros from the plugin.h file:
mysql_declare_plugin(name)
... one or more server plugin descriptors here ...
mysql_declare_plugin_end;
Each server plugin must have a general descriptor that provides information to the server plugin API.
The general descriptor has the same structure for all plugin types. The st_mysql_plugin structure in
the plugin.h file defines this descriptor:
struct st_mysql_plugin
{
int type; /* the plugin type (a MYSQL_XXX_PLUGIN value) */
void *info; /* pointer to type-specific plugin descriptor */
const char *name; /* plugin name */
const char *author; /* plugin author (for I_S.PLUGINS) */
const char *descr; /* general descriptive text (for I_S.PLUGINS) */
int license; /* the plugin license (PLUGIN_LICENSE_XXX) */
int (*init)(void *); /* the function to invoke when plugin is loaded */
int (*deinit)(void *);/* the function to invoke when plugin is unloaded */
unsigned int version; /* plugin version (for I_S.PLUGINS) */
struct st_mysql_show_var *status_vars;
struct st_mysql_sys_var **system_vars;
void * __reserved1; /* reserved for dependency checking */
unsigned long flags; /* flags for plugin */
};
The st_mysql_plugin descriptor structure members are used as follows. char * members should
be specified as null-terminated strings.
• type: The plugin type. This must be one of the plugin-type values from plugin.h:
/*
17
Plugin Data Structures
For example, for a full-text parser plugin, the type value is MYSQL_FTPARSER_PLUGIN.
• info: A pointer to the type-specific descriptor for the plugin. This descriptor's structure depends on
the particular type of plugin, unlike that of the general plugin descriptor structure. For version-control
purposes, the first member of the type-specific descriptor for every plugin type is expected to be the
interface version for the type. This enables the server to check the type-specific version for every
plugin no matter its type. Following the version number, the descriptor includes any other members
needed, such as callback functions and other information needed by the server to invoke the plugin
properly. Later sections on writing particular types of server plugins describe the structure of their
type-specific descriptors.
• name: A string that gives the plugin name. This is the name that will be listed in the mysql.plugin
table and by which you refer to the plugin in SQL statements such as INSTALL PLUGIN and
UNINSTALL PLUGIN, or with the --plugin-load option. The name is also visible in the
INFORMATION_SCHEMA.PLUGINS table or the output from SHOW PLUGINS.
The plugin name should not begin with the name of any server option. If it does, the server will fail
to initialize it. For example, the server has a --socket option, so you should not use a plugin name
such as socket, socket_plugin, and so forth.
• author: A string naming the plugin author. This can be whatever you like.
• desc: A string that provides a general description of the plugin. This can be whatever you like.
• license: The plugin license type. The value can be one of PLUGIN_LICENSE_PROPRIETARY,
PLUGIN_LICENSE_GPL, or PLUGIN_LICENSE_BSD.
• init: A once-only initialization function, or NULL if there is no such function. The server executes
this function when it loads the plugin, which happens for INSTALL PLUGIN or, for plugins listed
in the mysql.plugin table, at server startup. The function takes one argument that points to the
internal structure used to identify the plugin. It returns zero for success and nonzero for failure.
• deinit: A once-only deinitialization function, or NULL if there is no such function. The server
executes this function when it unloads the plugin, which happens for UNINSTALL PLUGIN or, for
plugins listed in the mysql.plugin table, at server shutdown. The function takes one argument that
points to the internal structure used to identify the plugin It returns zero for success and nonzero for
failure.
• version: The plugin version number. When the plugin is installed, this value can be retrieved from
the INFORMATION_SCHEMA.PLUGINS table. The value includes major and minor numbers. If you
write the value as a hex constant, the format is 0xMMNN, where MM and NN are the major and minor
numbers, respectively. For example, 0x0302 represents version 3.2.
• status_vars: A pointer to a structure for status variables associated with the plugin, or NULL if
there are no such variables. When the plugin is installed, these variables are displayed in the output
of the SHOW STATUS statement.
The status_vars member, if not NULL, points to an array of st_mysql_show_var structures that
describe status variables. See Section 4.4.2.2, “Server Plugin Status and System Variables”.
18
Plugin Data Structures
• system_vars: A pointer to a structure for system variables associated with the plugin, or NULL
if there are no such variables. These options and system variables can be used to help initialize
variables within the plugin. When the plugin is installed, these variables are displayed in the output of
the SHOW VARIABLES statement.
The system_vars member, if not NULL, points to an array of st_mysql_sys_var structures that
describe system variables. See Section 4.4.2.2, “Server Plugin Status and System Variables”.
• flags: Plugin flags. Individual bits correspond to different flags. The value should be set to the OR
of the applicable flags. These flags are available:
#define PLUGIN_OPT_NO_INSTALL 1UL /* Not dynamically loadable */
#define PLUGIN_OPT_NO_UNINSTALL 2UL /* Not dynamically unloadable */
• PLUGIN_OPT_NO_INSTALL: The plugin cannot be loaded at runtime with the INSTALL PLUGIN
statement. This is appropriate for plugins that must be loaded at server startup with the --
plugin-load or --plugin-load-add option.
The server invokes the init and deinit functions in the general plugin descriptor only when loading
and unloading the plugin. They have nothing to do with use of the plugin such as happens when an
SQL statement causes the plugin to be invoked.
For example, the descriptor information for a library that contains a single full-text parser plugin named
simple_parser looks like this:
mysql_declare_plugin(ftexample)
{
MYSQL_FTPARSER_PLUGIN, /* type */
&simple_parser_descriptor, /* descriptor */
"simple_parser", /* name */
"Oracle Corporation", /* author */
"Simple Full-Text Parser", /* description */
PLUGIN_LICENSE_GPL, /* plugin license */
simple_parser_plugin_init, /* init function (when loaded) */
simple_parser_plugin_deinit,/* deinit function (when unloaded) */
0x0001, /* version */
simple_status, /* status variables */
simple_system_variables, /* system variables */
NULL,
0
}
mysql_declare_plugin_end;
For a full-text parser plugin, the type must be MYSQL_FTPARSER_PLUGIN. This is the value that
identifies the plugin as being legal for use in a WITH PARSER clause when creating a FULLTEXT index.
(No other plugin type is legal for this clause.)
19
Plugin Data Structures
#define mysql_declare_plugin(NAME) \
__MYSQL_DECLARE_PLUGIN(NAME, \
builtin_ ## NAME ## _plugin_interface_version, \
builtin_ ## NAME ## _sizeof_struct_st_plugin, \
builtin_ ## NAME ## _plugin)
Note
When the macros are used as just shown, they expand to the following code, which
defines both of the required symbols (_mysql_plugin_interface_version_ and
_mysql_plugin_declarations_):
int _mysql_plugin_interface_version_= MYSQL_PLUGIN_INTERFACE_VERSION;
int _mysql_sizeof_struct_st_plugin_= sizeof(struct st_mysql_plugin);
struct st_mysql_plugin _mysql_plugin_declarations_[]= {
{
MYSQL_FTPARSER_PLUGIN, /* type */
&simple_parser_descriptor, /* descriptor */
"simple_parser", /* name */
"Oracle Corporation", /* author */
"Simple Full-Text Parser", /* description */
PLUGIN_LICENSE_GPL, /* plugin license */
simple_parser_plugin_init, /* init function (when loaded) */
simple_parser_plugin_deinit,/* deinit function (when unloaded) */
0x0001, /* version */
simple_status, /* status variables */
simple_system_variables, /* system variables */
NULL,
0
}
,{0,0,0,0,0,0,0,0,0,0,0,0}}
};
The preceding example declares a single plugin in the general descriptor, but it is possible to declare
multiple plugins. List the declarations one after the other between mysql_declare_plugin() and
mysql_declare_plugin_end, separated by commas.
MySQL server plugins can be written in C or C++ (or another language that can use C calling
conventions). If you write a C++ plugin, one C++ feature that you should not use is nonconstant
variables to initialize global structures. Members of structures such as the st_mysql_plugin
structure should be initialized only with constant variables. The simple_parser descriptor shown
earlier is permissible in a C++ plugin because it satisfies that requirement:
mysql_declare_plugin(ftexample)
{
MYSQL_FTPARSER_PLUGIN, /* type */
&simple_parser_descriptor, /* descriptor */
"simple_parser", /* name */
"Oracle Corporation", /* author */
"Simple Full-Text Parser", /* description */
PLUGIN_LICENSE_GPL, /* plugin license */
simple_parser_plugin_init, /* init function (when loaded) */
simple_parser_plugin_deinit,/* deinit function (when unloaded) */
0x0001, /* version */
simple_status, /* status variables */
simple_system_variables, /* system variables */
NULL,
0
20
Plugin Data Structures
}
mysql_declare_plugin_end;
Here is another valid way to write the general descriptor. It uses constant variables to indicate the
plugin name, author, and description:
const char *simple_parser_name = "simple_parser";
const char *simple_parser_author = "Oracle Corporation";
const char *simple_parser_description = "Simple Full-Text Parser";
mysql_declare_plugin(ftexample)
{
MYSQL_FTPARSER_PLUGIN, /* type */
&simple_parser_descriptor, /* descriptor */
simple_parser_name, /* name */
simple_parser_author, /* author */
simple_parser_description, /* description */
PLUGIN_LICENSE_GPL, /* plugin license */
simple_parser_plugin_init, /* init function (when loaded) */
simple_parser_plugin_deinit,/* deinit function (when unloaded) */
0x0001, /* version */
simple_status, /* status variables */
simple_system_variables, /* system variables */
NULL,
0
}
mysql_declare_plugin_end;
However, the following general descriptor is invalid. It uses structure members to indicate the plugin
name, author, and description, but structures are not considered constant initializers in C++:
typedef struct
{
const char *name;
const char *author;
const char *description;
} plugin_info;
plugin_info parser_info = {
"simple_parser",
"Oracle Corporation",
"Simple Full-Text Parser"
};
mysql_declare_plugin(ftexample)
{
MYSQL_FTPARSER_PLUGIN, /* type */
&simple_parser_descriptor, /* descriptor */
parser_info.name, /* name */
parser_info.author, /* author */
parser_info.description, /* description */
PLUGIN_LICENSE_GPL, /* plugin license */
simple_parser_plugin_init, /* init function (when loaded) */
simple_parser_plugin_deinit,/* deinit function (when unloaded) */
0x0001, /* version */
simple_status, /* status variables */
simple_system_variables, /* system variables */
NULL,
0
}
mysql_declare_plugin_end;
The status_vars member of the general plugin descriptor, if not 0, points to an array of
st_mysql_show_var structures, each of which describes one status variable, followed by a structure
with all members set to 0. The st_mysql_show_var structure has this definition:
21
Plugin Data Structures
struct st_mysql_show_var {
const char *name;
char *value;
enum enum_mysql_show_type type;
};
The following table shows the permissible status variable type values and what the corresponding
variable should be.
For the SHOW_FUNC type, the function is called and fills in its out parameter, which then provides
information about the variable to be displayed. The function has this signature:
#define SHOW_VAR_FUNC_BUFF_SIZE 1024
For convenience, a number of macros are defined that make creating new system variables within a
plugin much simpler.
• varname: The identifier for the static variable. Where not available, it is the same as the name field.
• opt: Additional use flags for the system variable. The following table shows the permissible flags.
22
Plugin Data Structures
• comment: A descriptive comment to be displayed in the server help message. NULL if this variable is
to be hidden.
• blocksize: The variable block size. When the value is set, it is rounded to the nearest multiple of
blocksize.
A system variable may be accessed either by using the static variable directly or by using the
SYSVAR()accessor macro. The SYSVAR() macro is provided for completeness. Usually it should be
used only when the code cannot directly access the underlying variable.
For example:
static int my_foo;
static MYSQL_SYSVAR_INT(foo_var, my_foo,
PLUGIN_VAR_RQCMDARG, "foo comment",
NULL, NULL, 0, 0, INT_MAX, 0);
...
SYSVAR(foo_var)= value;
value= SYSVAR(foo_var);
my_foo= value;
value= my_foo;
Session variables may be accessed only through the THDVAR() accessor macro. For example:
static MYSQL_THDVAR_BOOL(some_flag,
PLUGIN_VAR_NOCMDARG, "flag comment",
NULL, NULL, FALSE);
...
if (THDVAR(thd, some_flag))
{
do_something();
THDVAR(thd, some_flag)= FALSE;
}
All global and session system variables must be published to mysqld before use. This is done by
constructing a NULL-terminated array of the variables and linking to it in the plugin public interface. For
example:
static struct st_mysql_sys_var *my_plugin_vars[]= {
MYSQL_SYSVAR(foo_var),
23
Plugin Data Structures
MYSQL_SYSVAR(some_flag),
NULL
};
mysql_declare_plugin(fooplug)
{
MYSQL_..._PLUGIN,
&plugin_data,
"fooplug",
"foo author",
"This does foo!",
PLUGIN_LICENSE_GPL,
foo_init,
foo_fini,
0x0001,
NULL,
my_plugin_vars,
NULL,
0
}
mysql_declare_plugin_end;
The following convenience macros enable you to declare different types of system variables:
• Boolean system variables of type my_bool, which is a 1-byte boolean. (0 = FALSE, 1 = TRUE)
MYSQL_THDVAR_BOOL(name, opt, comment, check, update, default)
MYSQL_SYSVAR_BOOL(name, varname, opt, comment, check, update, default)
• An unsigned long system variable, which is typically either a 4- or 8-byte unsigned word.
MYSQL_THDVAR_ULONG(name, opt, comment, check, update, default, min, max, blk)
MYSQL_SYSVAR_ULONG(name, varname, opt, comment, check, update, default,
minimum, maximum, blocksize)
• An unsigned long long system variable, which is typically an 8-byte unsigned word.
MYSQL_THDVAR_ULONGLONG(name, opt, comment, check, update,
default, minimum, maximum, blocksize)
24
Plugin Data Structures
• An unsigned long system variable, which is typically either a 4- or 8-byte unsigned word. The
range of possible values is an ordinal of the number of elements in the typelib, starting from 0.
MYSQL_THDVAR_ENUM(name, opt, comment, check, update, default, typelib)
MYSQL_SYSVAR_ENUM(name, varname, opt, comment, check, update,
default, typelib)
• An unsigned long long system variable, which is typically an 8-byte unsigned word. Each bit
represents an element in the typelib.
MYSQL_THDVAR_SET(name, opt, comment, check, update, default, typelib)
MYSQL_SYSVAR_SET(name, varname, opt, comment, check, update,
default, typelib)
Internally, all mutable and plugin system variables are stored in a HASH structure.
Display of the server command-line help text is handled by compiling a DYNAMIC_ARRAY of all
variables relevant to command-line options, sorting them, and then iterating through them to display
each option.
When a command-line option has been handled, it is then removed from the argv by the
handle_option() function (my_getopt.c); in effect, it is consumed.
The server processes command-line options during the plugin installation process, immediately after
the plugin has been successfully loaded but before the plugin initialization function has been called
Plugins loaded at runtime do not benefit from any configuration options and must have usable defaults.
Once they are installed, they are loaded at mysqld initialization time and configuration options can be
set at the command line or within my.cnf.
25
Plugin Data Structures
The common st_mysql_client_plugin descriptor structure members are used as follows. char *
members should be specified as null-terminated strings.
• type: The plugin type. This must be one of the plugin-type values from client_plugin.h, such as
MYSQL_CLIENT_AUTHENTICATION_PLUGIN.
• name: A string that gives the plugin name. This is the name by which you refer to the plugin when
you call mysql_options() with the MYSQL_DEFAULT_AUTH option or specify the --default-
auth option to a MySQL client program.
• author: A string naming the plugin author. This can be whatever you like.
• desc: A string that provides a general description of the plugin. This can be whatever you like.
• version: The plugin version as an array of three integers indicating the major, minor, and teeny
versions. For example, {1,2,3} indicates version 1.2.3.
• init: A once-only initialization function, or NULL if there is no such function. The client library
executes this function when it loads the plugin. The function returns zero for success and nonzero for
failure.
The init function uses its first two arguments to return an error message if an error occurs. The first
argument is a pointer to a char buffer, and the second argument indicates the buffer length. Any
message returned by the init function must be null-terminated, so the maximum message length is
the buffer length minus one. The next arguments are passed to mysql_load_plugin(). The first
indicates how many more arguments there are (0 if none), followed by any remaining arguments.
• deinit: A once-only deinitialization function, or NULL if there is no such function. The client library
executes this function when it unloads the plugin. The function takes no arguments. It returns zero
for success and nonzero for failure.
• options: A function for handling options passed to the plugin, or NULL if there is no such function.
The function takes two arguments representing the option name and a pointer to its value. The
function returns zero for success and nonzero for failure.
For a given client plugin type, the common descriptor members may be followed by
additional members necessary to implement plugins of that type. For example, the
st_mysql_client_plugin_AUTHENTICATION structure for authentication plugins has a function at
the end that the client library calls to perform authentication.
26
Compiling and Installing Plugin Libraries
"GPL",
NULL,
my_auth_init,
my_auth_deinit,
my_auth_options,
my_auth_main
mysql_end_client_plugin;
This declaration uses the AUTHENTICATION argument to set the type and
interface_version members to MYSQL_CLIENT_AUTHENTICATION_PLUGIN and
MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION.
Depending on the plugin type, the descriptor may have other members following the common
members. For example, for an authentication plugin, there is a function (my_auth_main() in the
descriptor just shown) that handles communication with the server. See Section 4.4.9, “Writing
Authentication Plugins”.
Normally, a client program that supports the use of authentication plugins causes a plugin to be loaded
by calling mysql_options() to set the MYSQL_DEFAULT_AUTH and MYSQL_PLUGIN_DIR options:
char *plugin_dir = "path_to_plugin_dir";
char *default_auth = "plugin_name";
Typically, the program will also accept --plugin-dir and --default-auth options that enable
users to override the default values.
Should a client program require lower-level plugin management, the client library contains functions
that take an st_mysql_client_plugin argument. See C API Client Plugin Interface.
To use CMake, you'll need to set up the configuration files to enable the plugin to be compiled and
installed. Use the plugin examples under the plugin directory of a MySQL source distribution as a
guide.
When CMake generates the Makefile, it should take care of passing to the compilation command
the -DMYSQL_DYNAMIC_PLUGIN flag, and passing to the linker the -lmysqlservices flag, which
is needed to link in any functions from services provided through the plugin services interface. See
MySQL Plugin Services.
If you need to specify configuration options to CMake, see MySQL Source-Configuration Options, for
a list. For example, you might want to specify CMAKE_INSTALL_PREFIX to indicate the MySQL base
directory under which the plugin should be installed. You can see what value to use for this option with
SHOW VARIABLES:
27
Writing Full-Text Parser Plugins
The location of the plugin directory where you should install the library is given by the plugin_dir
system variable. For example:
mysql> SHOW VARIABLES LIKE 'plugin_dir';
+---------------+-----------------------------------+
| Variable_name | Value |
+---------------+-----------------------------------+
| plugin_dir | /usr/local/mysql/lib/mysql/plugin |
+---------------+-----------------------------------+
Verify that make install installed the plugin library in the proper directory. After installing it, make
sure that the library permissions permit it to be executed by the server.
A full-text parser plugin can be used to replace or modify the built-in full-text parser. This section
describes how to write a full-text parser plugin named simple_parser. This plugin performs parsing
based on simpler rules than those used by the MySQL built-in full-text parser: Words are nonempty
runs of whitespace characters.
The instructions use the source code in the plugin/fulltext directory of MySQL source
distributions, so change location into that directory. The following procedure describes how the plugin
library is created:
1. To write a full-text parser plugin, include the following header file in the plugin source file. Other
MySQL or general header files might also be needed, depending on the plugin capabilities and
requirements.
#include <mysql/plugin.h>
plugin.h defines the MYSQL_FTPARSER_PLUGIN server plugin type and the data structures
needed to declare the plugin.
This descriptor contains the general plugin descriptor for the server plugin. For a full-text parser
plugin, the type must be MYSQL_FTPARSER_PLUGIN. This is the value that identifies the plugin as
being legal for use in a WITH PARSER clause when creating a FULLTEXT index. (No other plugin
type is legal for this clause.)
For example, the library descriptor for a library that contains a single full-text parser plugin named
simple_parser looks like this:
mysql_declare_plugin(ftexample)
{
MYSQL_FTPARSER_PLUGIN, /* type */
&simple_parser_descriptor, /* descriptor */
"simple_parser", /* name */
"Oracle Corporation", /* author */
"Simple Full-Text Parser", /* description */
PLUGIN_LICENSE_GPL, /* plugin license */
28
Writing Full-Text Parser Plugins
The name member (simple_parser) indicates the name to use for references to the plugin in
statements such as INSTALL PLUGIN or UNINSTALL PLUGIN. This is also the name displayed
by SHOW PLUGINS or INFORMATION_SCHEMA.PLUGINS.
For more information, see Section 4.4.2.1, “Server Plugin Library and Plugin Descriptors”.
Each general plugin descriptor in the library descriptor points to a type-specific descriptor. For a full-
text parser plugin, the type-specific descriptor is an instance of the st_mysql_ftparser structure
in the plugin.h file:
struct st_mysql_ftparser
{
int interface_version;
int (*parse)(MYSQL_FTPARSER_PARAM *param);
int (*init)(MYSQL_FTPARSER_PARAM *param);
int (*deinit)(MYSQL_FTPARSER_PARAM *param);
};
As shown by the structure definition, the descriptor has an interface version number and contains
pointers to three functions.
The interface version number is specified using a symbol, which is in the form:
MYSQL_xxx_INTERFACE_VERSION. For full-text parser plugins, the symbol is
MYSQL_FTPARSER_INTERFACE_VERSION. In the source code, you will find the actual interface
version number for the full-text parser plugin defined in include/mysql/plugin_ftparser.h.
With the introduction of full-text parser plugin support for InnoDB, the interface version number was
incremented in MySQL 5.7 from 0x0100 to 0x0101.
The init and deinit members should point to a function or be set to 0 if the function is not
needed. The parse member must point to the function that performs the parsing.
A full-text parser plugin is used in two different contexts, indexing and searching. In both contexts,
the server calls the initialization and deinitialization functions at the beginning and end of
processing each SQL statement that causes the plugin to be invoked. However, during statement
processing, the server calls the main parsing function in context-specific fashion:
• For indexing, the server calls the parser for each column value to be indexed.
• For searching, the server calls the parser to parse the search string. The parser might also be
called for rows processed by the statement. In natural language mode, there is no need for the
29
Writing Full-Text Parser Plugins
server to call the parser. For boolean mode phrase searches or natural language searches with
query expansion, the parser is used to parse column values for information that is not in the
index. Also, if a boolean mode search is done for a column that has no FULLTEXT index, the
built-in parser will be called. (Plugins are associated with specific indexes. If there is no index, no
plugin is used.)
The plugin declaration in the general plugin descriptor has init and deinit members that point
initialization and deinitialization functions, and so does the type-specific plugin descriptor to which
it points. However, these pairs of functions have different purposes and are invoked for different
reasons:
• For the plugin declaration in the general plugin descriptor, the initialization and deinitialization
functions are invoked when the plugin is loaded and unloaded.
• For the type-specific plugin descriptor, the initialization and deinitialization functions are invoked
per SQL statement for which the plugin is used.
Each interface function named in the plugin descriptor should return zero for success or nonzero
for failure, and each of them receives an argument that points to a MYSQL_FTPARSER_PARAM
structure containing the parsing context. The structure has this definition:
• mysql_parse: A pointer to a callback function that invokes the server's built-in parser. Use
this callback when the plugin acts as a front end to the built-in parser. That is, when the plugin
parsing function is called, it should process the input to extract the text and pass the text to the
mysql_parse callback.
The first parameter for this callback function should be the param value itself:
param->mysql_parse(param, ...);
A front end plugin can extract text and pass it all at once to the built-in parser, or it can extract
and pass text to the built-in parser a piece at a time. However, in this case, the built-in parser
treats the pieces of text as though there are implicit word breaks between them.
• mysql_add_word: A pointer to a callback function that adds a word to a full-text index or to the
list of search terms. Use this callback when the parser plugin replaces the built-in parser. That
is, when the plugin parsing function is called, it should parse the input into words and invoke the
mysql_add_word callback for each word.
The first parameter for this callback function should be the param value itself:
param->mysql_add_word(param, ...);
• ftparser_state: This is a generic pointer. The plugin can set it to point to information to be
used internally for its own purposes.
30
Writing Full-Text Parser Plugins
• mysql_ftparam: This is set by the server. It is passed as the first argument to the
mysql_parse or mysql_add_word callback.
• cs: A pointer to information about the character set of the text, or 0 if no information is available.
• flags: Parser flags. This is zero if there are no special flags. The only nonzero flag is
MYSQL_FTFLAGS_NEED_COPY, which means that mysql_add_word() must save a copy of
the word (that is, it cannot use a pointer to the word because the word is in a buffer that will be
overwritten.)
This flag might be set or reset by MySQL before calling the parser plugin, by the parser plugin
itself, or by the mysql_parse() function.
• mode: The parsing mode. This value will be one of the following constants:
• MYSQL_FTPARSER_SIMPLE_MODE: Parse in fast and simple mode, which is used for indexing
and for natural language queries. The parser should pass to the server only those words that
should be indexed. If the parser uses length limits or a stopword list to determine which words
to ignore, it should not pass such words to the server.
Note
31
Writing Full-Text Parser Plugins
char wasign;
char trunc;
int position;
/* These are parser state and must be removed. */
char prev;
char *quot;
} MYSQL_FTPARSER_BOOLEAN_INFO;
• type: The token type. The following table shows the permissible types.
• yesno: Whether the word must be present for a match to occur. 0 means that the word is
optional but increases the match relevance if it is present. Values larger than 0 mean that the
word must be present. Values smaller than 0 mean that the word must not be present.
• weight_adjust: A weighting factor that determines how much a match for the word counts. It
can be used to increase or decrease the word's importance in relevance calculations. A value
of zero indicates no weight adjustment. Values greater than or less than zero mean higher or
lower weight, respectively. The examples at Boolean Full-Text Searches, that use the < and >
operators illustrate how weighting works.
• wasign: The sign of the weighting factor. A negative value acts like the ~ boolean-search
operator, which causes the word's contribution to the relevance to be negative.
• trunc: Whether matching should be done as if the boolean-mode * truncation operator had
been given.
• position: Start position of the word in the document, in bytes. Used by InnoDB full-text search.
For existing plugins that are called in boolean mode, support must be added for the position
member.
Plugins should not use the prev and quot members of the MYSQL_FTPARSER_BOOLEAN_INFO
structure.
Note
• A leading plus sign (+) or minus sign (-) boolean operator followed by a
space and then a word ('+ apple' or '- apple'). The leading plus or
minus sign must be directly adjacent to the word, for example: '+apple'
or '-apple'.
For information about boolean full-text search operators, see Boolean Full-
Text Searches.
32
Writing Full-Text Parser Plugins
The general plugin descriptor in the library descriptor names the initialization and deinitialization
functions that the server should invoke when it loads and unloads the plugin. For simple_parser,
these functions do nothing but return zero to indicate that they succeeded:
Because those functions do not actually do anything, you could omit them and specify 0 for each of
them in the plugin declaration.
The type-specific plugin descriptor for simple_parser names the initialization, deinitialization,
and parsing functions that the server invokes when the plugin is used. For simple_parser, the
initialization and deinitialization functions do nothing:
Here too, because those functions do nothing, you could omit them and specify 0 for each of them
in the plugin descriptor.
The main parsing function, simple_parser_parse(), acts as a replacement for the built-in
full-text parser, so it needs to split text into words and pass each word to the server. The parsing
function's first argument is a pointer to a structure that contains the parsing context. This structure
has a doc member that points to the text to be parsed, and a length member that indicates how
long the text is. The simple parsing done by the plugin considers nonempty runs of whitespace
characters to be words, so it identifies words like this:
33
Writing Full-Text Parser Plugins
As the parser finds each word, it invokes a function add_word() to pass the word to the server.
add_word() is a helper function only; it is not part of the plugin interface. The parser passes the
parsing context pointer to add_word(), as well as a pointer to the word and a length value:
static void add_word(MYSQL_FTPARSER_PARAM *param, char *word, size_t len)
{
MYSQL_FTPARSER_BOOLEAN_INFO bool_info=
{ FT_TOKEN_WORD, 0, 0, 0, 0, 0, ' ', 0 };
For boolean-mode parsing, add_word() fills in the members of the bool_info structure as
described earlier in the discussion of the st_mysql_ftparser_boolean_info structure.
5. Set up the status variables. For the simple_parser plugin, the following status variable array sets
up one status variable with a value that is static text, and another with a value that is stored in a
long integer variable:
long number_of_calls= 0;
By using status variable names that begin with the plugin name, you can easily display the
variables for a plugin with SHOW STATUS:
mysql> SHOW STATUS LIKE 'simple_parser%';
+----------------------+--------------------+
| Variable_name | Value |
+----------------------+--------------------+
| simple_parser_static | just a static text |
| simple_parser_called | 0 |
+----------------------+--------------------+
6. To compile and install a plugin library file, use the instructions in Section 4.4.3, “Compiling and
Installing Plugin Libraries”. To make the library file available for use, install it in the plugin directory
(the directory named by the plugin_dir system variable). For the simple_parser plugin,
it is compiled and installed when you build MySQL from source. It is also included in binary
distributions. The build process produces a shared object library with a name of mypluglib.so
(the .so suffix might differ depending on your platform).
7. To use the plugin, register it with the server. For example, to register the plugin at runtime, use this
statement, adjusting the .so suffix for your platform as necessary:
INSTALL PLUGIN simple_parser SONAME 'mypluglib.so';
For additional information about plugin loading, see Installing and Uninstalling Plugins.
8. To verify plugin installation, examine the INFORMATION_SCHEMA.PLUGINS table or use the SHOW
PLUGINS statement. See Obtaining Server Plugin Information.
Create a table that contains a string column and associate the parser plugin with a FULLTEXT index
on the column:
mysql> CREATE TABLE t (c VARCHAR(255),
-> FULLTEXT (c) WITH PARSER simple_parser
-> ) ENGINE=MyISAM;
Query OK, 0 rows affected (0.01 sec)
34
Writing Full-Text Parser Plugins
Insert some text into the table and try some searches. These should verify that the parser plugin
treats all nonwhitespace characters as word characters:
+-------------------------------------------------+
| c |
+-------------------------------------------------+
| latin1_general_cs is a case-sensitive collation |
| I'd like a case of oranges |
| this is sensitive information |
| another row |
| yet another row |
+-------------------------------------------------+
5 rows in set (0.00 sec)
35
Writing Daemon Plugins
Neither “case” nor “insensitive” match “case-insensitive” the way that they would for the built-in
parser.
To write a daemon plugin, include the following header file in the plugin source file. Other MySQL or
general header files might also be needed, depending on the plugin capabilities and requirements.
#include <mysql/plugin.h>
plugin.h defines the MYSQL_DAEMON_PLUGIN server plugin type and the data structures needed to
declare the plugin.
The daemon_example.cc file sets up the library descriptor as follows. The library descriptor includes
a single general server plugin descriptor.
mysql_declare_plugin(daemon_example)
{
MYSQL_DAEMON_PLUGIN,
&daemon_example_plugin,
"daemon_example",
"Brian Aker",
"Daemon example, creates a heartbeat beat file in mysql-heartbeat.log",
PLUGIN_LICENSE_GPL,
daemon_example_plugin_init, /* Plugin Init */
daemon_example_plugin_deinit, /* Plugin Deinit */
0x0100 /* 1.0 */,
NULL, /* status variables */
NULL, /* system variables */
NULL, /* config options */
0, /* flags */
}
mysql_declare_plugin_end;
The name member (daemon_example) indicates the name to use for references to the plugin in
statements such as INSTALL PLUGIN or UNINSTALL PLUGIN. This is also the name displayed by
SHOW PLUGINS or INFORMATION_SCHEMA.PLUGINS.
The second member of the plugin descriptor, daemon_example_plugin, points to the type-specific
daemon plugin descriptor. This structure consists only of the type-specific API version number:
struct st_mysql_daemon daemon_example_plugin=
{ MYSQL_DAEMON_INTERFACE_VERSION };
The type-specific structure has no interface functions. There is no communication between the server
and the plugin, except that the server calls the initialization and deinitialization functions from the
general plugin descriptor to start and stop the plugin:
• daemon_example_plugin_init() opens the heartbeat file and spawns a thread that wakes up
periodically and writes the next message to the file.
To compile and install a plugin library file, use the instructions in Section 4.4.3, “Compiling and
Installing Plugin Libraries”. To make the library file available for use, install it in the plugin directory (the
36
Writing INFORMATION_SCHEMA Plugins
directory named by the plugin_dir system variable). For the daemon_example plugin, it is compiled
and installed when you build MySQL from source. It is also included in binary distributions. The build
process produces a shared object library with a name of libdaemon_example.so (the .so suffix
might differ depending on your platform).
To use the plugin, register it with the server. For example, to register the plugin at runtime, use this
statement, adjusting the .so suffix for your platform as necessary:
INSTALL PLUGIN daemon_example SONAME 'libdaemon_example.so';
For additional information about plugin loading, see Installing and Uninstalling Plugins.
To verify plugin installation, examine the INFORMATION_SCHEMA.PLUGINS table or use the SHOW
PLUGINS statement. See Obtaining Server Plugin Information.
While the plugin is loaded, it writes a heartbeat string at regular intervals to a file named mysql-
heartbeat.log in the data directory. This file grows without limit, so after you have satistifed yourself
that the plugin operates correctly, unload it:
UNINSTALL PLUGIN daemon_example;
To write an INFORMATION_SCHEMA table plugin, include the following header files in the plugin source
file. Other MySQL or general header files might also be needed, depending on the plugin capabilities
and requirements.
#include <sql_class.h>
#include <table.h>
These header files are located in the sql directory of MySQL source distributions. They contain C++
structures, so the source file for an INFORMATION_SCHEMA plugin must be compiled as C++ (not C)
code.
The source file for the example plugin developed here is named simple_i_s_table.cc. It creates a
simple INFORMATION_SCHEMA table named SIMPLE_I_S_TABLE that has two columns named NAME
and VALUE. The general descriptor for a plugin library that implements the table looks like this:
mysql_declare_plugin(simple_i_s_library)
{
MYSQL_INFORMATION_SCHEMA_PLUGIN,
&simple_table_info, /* type-specific descriptor */
"SIMPLE_I_S_TABLE", /* table name */
"Author Name", /* author */
"Simple INFORMATION_SCHEMA table", /* description */
PLUGIN_LICENSE_GPL, /* license type */
simple_table_init, /* init function */
NULL,
0x0100, /* version = 1.0 */
NULL, /* no status variables */
NULL, /* no system variables */
NULL, /* no reserved information */
0 /* no flags */
}
mysql_declare_plugin_end;
The name member (SIMPLE_I_S_TABLE) indicates the name to use for references to the plugin in
statements such as INSTALL PLUGIN or UNINSTALL PLUGIN. This is also the name displayed by
SHOW PLUGINS or INFORMATION_SCHEMA.PLUGINS.
37
Writing INFORMATION_SCHEMA Plugins
The simple_table_info member of the general descriptor points to the type-specific descriptor,
which consists only of the type-specific API version number:
static struct st_mysql_information_schema simple_table_info =
{ MYSQL_INFORMATION_SCHEMA_INTERFACE_VERSION };
• The initialization function provides information about the table structure and a function that populates
the table.
• The deinitialization function performs any required cleanup. If no cleanup is needed, this descriptor
member can be NULL (as in the example shown).
The initialization function should return 0 for success, 1 if an error occurs. The function receives a
generic pointer, which it should interpret as a pointer to the table structure:
static int table_init(void *ptr)
{
ST_SCHEMA_TABLE *schema_table= (ST_SCHEMA_TABLE*)ptr;
schema_table->fields_info= simple_table_fields;
schema_table->fill_table= simple_fill_table;
return 0;
}
The function should set these two members of the table structure:
• fields_info: An array of ST_FIELD_INFO structures that contain information about each column.
The array pointed to by fields_info should contain one element per column of the
INFORMATION_SCHEMA plus a terminating element. The following simple_table_fields array for
the example plugin indicates that SIMPLE_I_S_TABLE has two columns. NAME is string-valued with a
length of 10 and VALUE is integer-valued with a display width of 20. The last structure marks the end of
the array.
static ST_FIELD_INFO simple_table_fields[]=
{
{"NAME", 10, MYSQL_TYPE_STRING, 0, 0 0, 0},
{"VALUE", 6, MYSQL_TYPE_LONG, 0, MY_I_S_UNSIGNED, 0, 0},
{0, 0, MYSQL_TYPE_NULL, 0, 0, 0, 0}
};
For more information about the column information structure, see the definition of ST_FIELD_INFO in
the table.h header file. The permissible MYSQL_TYPE_xxx type values are those used in the C API;
see C API Basic Data Structures.
The fill_table member should be set to a function that populates the table and returns 0 for
success, 1 if an error occurs. For the example plugin, the simple_fill_table() function looks like
this:
static int simple_fill_table(THD *thd, TABLE_LIST *tables, Item *cond)
{
TABLE *table= tables->table;
38
Writing Semisynchronous Replication Plugins
For each row of the INFORMATION_SCHEMA table, this function initializes each column, then calls
schema_table_store_record() to install the row. The store() method arguments depend on
the type of value to be stored. For column 0 (NAME, a string), store() takes a pointer to a string, its
length, and information about the character set of the string:
store(const char *to, uint length, CHARSET_INFO *cs);
For column 1 (VALUE, an integer), store() takes the value and a flag indicating whether it is
unsigned:
store(longlong nr, bool unsigned_value);
For other examples of how to populate INFORMATION_SCHEMA tables, search for instances of
schema_table_store_record() in sql_show.cc.
To compile and install a plugin library file, use the instructions in Section 4.4.3, “Compiling and
Installing Plugin Libraries”. To make the library file available for use, install it in the plugin directory (the
directory named by the plugin_dir system variable).
Uninstall it:
mysql> UNINSTALL PLUGIN SIMPLE_I_S_TABLE;
To write a semisynchronous replication plugin, include the following header file in the plugin source file.
Other MySQL or general header files might also be needed, depending on the plugin capabilities and
requirements.
#include <mysql/plugin.h>
plugin.h defines the MYSQL_REPLICATION_PLUGIN server plugin type and the data structures
needed to declare the plugin.
For the source side, semisync_master_plugin.cc contains this general descriptor for a plugin
named rpl_semi_sync_master:
39
Writing Semisynchronous Replication Plugins
mysql_declare_plugin(semi_sync_master)
{
MYSQL_REPLICATION_PLUGIN,
&semi_sync_master_plugin,
"rpl_semi_sync_master",
"He Zhenxing",
"Semi-synchronous replication master",
PLUGIN_LICENSE_GPL,
semi_sync_master_plugin_init, /* Plugin Init */
semi_sync_master_plugin_deinit, /* Plugin Deinit */
0x0100 /* 1.0 */,
semi_sync_master_status_vars, /* status variables */
semi_sync_master_system_vars, /* system variables */
NULL, /* config options */
0, /* flags */
}
mysql_declare_plugin_end;
For the replica side, semisync_slave_plugin.cc contains this general descriptor for a plugin
named rpl_semi_sync_slave:
mysql_declare_plugin(semi_sync_slave)
{
MYSQL_REPLICATION_PLUGIN,
&semi_sync_slave_plugin,
"rpl_semi_sync_slave",
"He Zhenxing",
"Semi-synchronous replication slave",
PLUGIN_LICENSE_GPL,
semi_sync_slave_plugin_init, /* Plugin Init */
semi_sync_slave_plugin_deinit, /* Plugin Deinit */
0x0100 /* 1.0 */,
semi_sync_slave_status_vars, /* status variables */
semi_sync_slave_system_vars, /* system variables */
NULL, /* config options */
0, /* flags */
}
mysql_declare_plugin_end;
For both the source and replica plugins, the general descriptor has pointers to the type-specific
descriptor, the initialization and deinitialization functions, and to the status and system variables
implemented by the plugin. For information about variable setup, see Section 4.4.2.2, “Server Plugin
Status and System Variables”. The following remarks discuss the type-specific descriptor and the
initialization and deinitialization functions for the source plugin but apply similarly to the replica plugin.
The semi_sync_master_plugin member of the source general descriptor points to the type-specific
descriptor, which consists only of the type-specific API version number:
struct Mysql_replication semi_sync_master_plugin= {
MYSQL_REPLICATION_INTERFACE_VERSION
};
The initialization function uses the pointer to register transaction and binary logging “observers”
with the server. After successful initialization, the server takes care of invoking the observers at the
appropriate times. (For details on the observers, see the source files.) The deinitialization function
cleans up by deregistering the observers. Each function returns 0 for success or 1 if an error occurs.
To compile and install a plugin library file, use the instructions in Section 4.4.3, “Compiling and
Installing Plugin Libraries”. To make the library file available for use, install it in the plugin directory
(the directory named by the plugin_dir system variable). For the rpl_semi_sync_master and
rpl_semi_sync_slave plugins, they are compiled and installed when you build MySQL from source.
They are also included in binary distributions. The build process produces shared object libraries with
40
Writing Audit Plugins
names of semisync_master.so and semisync_slave.so (the .so suffix might differ depending
on your platform).
Note
Other examples of plugins that use the audit plugin API are the query rewrite
plugin (see The Rewriter Query Rewrite Plugin) and the Version Tokens plugin
(see Version Tokens).
Within the server, the pluggable audit interface is implemented in the sql_audit.h and
sql_audit.cc files in the sql directory of MySQL source distributions. Additionally, several places in
the server call the audit interface when an auditable event occurs, so that registered audit plugins can
be notified about the event if necessary. To see where such calls occur, search the server source files
for invocations of functions with names of the form mysql_audit_xxx(). Audit notification occurs for
server operations such as these:
• Writing a message to the general query log (if the log is enabled)
To write an audit plugin, include the following header file in the plugin source file. Other MySQL or
general header files might also be needed, depending on the plugin capabilities and requirements.
#include <mysql/plugin_audit.h>
plugin_audit.h includes plugin.h, so you need not include the latter file explicitly. plugin.h
defines the MYSQL_AUDIT_PLUGIN server plugin type and the data structures needed to declare the
plugin. plugin_audit.h defines data structures specific to audit plugins.
41
Writing Audit Plugins
The name member (NULL_AUDIT) indicates the name to use for references to the plugin in
statements such as INSTALL PLUGIN or UNINSTALL PLUGIN. This is also the name displayed by
INFORMATION_SCHEMA.PLUGINS or SHOW PLUGINS.
The audit_null_plugin_init initialization function performs plugin initialization when the plugin is
loaded. The audit_null_plugin_deinit function performs cleanup when the plugin is unloaded.
The general plugin descriptor also refers to simple_status and system_variables, structures
that expose several status and system variables. When the plugin is enabled, these variables can be
inspected using SHOW statements (SHOW STATUS, SHOW VARIABLES) or the appropriate Performance
Schema tables.
The simple_status structure declares several status variables with names of the form
Audit_null_xxx. NULL_AUDIT increments the Audit_null_called status variable for every
notification that it receives. The other status variables are more specific and NULL_AUDIT increments
them only for notifications of specific events.
• release_thd: A function that the server calls to inform the plugin that it is being dissociated from its
thread context. This should be NULL if there is no such function.
• event_notify: A function that the server calls to notify the plugin that an auditable event has
occurred. This function should not be NULL; that would not make sense because no auditing would
occur.
42
Writing Audit Plugins
The server uses the event_notify and release_thd functions together. They are called within
the context of a specific thread, and a thread might perform an activity that produces several event
notifications. The first time the server calls event_notify for a thread, it creates a binding of the
plugin to the thread. The plugin cannot be uninstalled while this binding exists. When no more events
for the thread will occur, the server informs the plugin of this by calling the release_thd function,
and then destroys the binding. For example, when a client issues a statement, the thread processing
the statement might notify audit plugins about the result set produced by the statement and about the
statement being logged. After these notifications occur, the server releases the plugin before putting
the thread to sleep until the client issues another statement.
This design enables the plugin to allocate resources needed for a given thread in the first call to the
event_notify function and release them in the release_thd function:
event_notify function:
if memory is needed to service the thread
allocate memory
... rest of notification processing ...
release_thd function:
if memory was allocated
release memory
... rest of release processing ...
That is more efficient than allocating and releasing memory repeatedly in the notification function.
For the NULL_AUDIT audit plugin, the type-specific plugin descriptor looks like this:
static struct st_mysql_audit audit_null_descriptor=
{
MYSQL_AUDIT_INTERFACE_VERSION, /* interface version */
NULL, /* release_thd function */
audit_null_notify, /* notify function */
{ (unsigned long) MYSQL_AUDIT_GENERAL_ALL,
(unsigned long) MYSQL_AUDIT_CONNECTION_ALL,
(unsigned long) MYSQL_AUDIT_PARSE_ALL,
(unsigned long) MYSQL_AUDIT_AUTHORIZATION_ALL,
(unsigned long) MYSQL_AUDIT_TABLE_ACCESS_ALL,
(unsigned long) MYSQL_AUDIT_GLOBAL_VARIABLE_ALL,
(unsigned long) MYSQL_AUDIT_SERVER_STARTUP_ALL,
(unsigned long) MYSQL_AUDIT_SERVER_SHUTDOWN_ALL,
(unsigned long) MYSQL_AUDIT_COMMAND_ALL,
(unsigned long) MYSQL_AUDIT_QUERY_ALL,
(unsigned long) MYSQL_AUDIT_STORED_PROGRAM_ALL }
};
The server calls audit_null_notify() to pass audit event information to the plugin. The plugin has
no release_thd function.
The class_mask member is an array that indicates which event classes the plugin subscribes to. As
shown, the array contents subscribe to all subclasses of all event classes that are available. To ignore
all notifications for a given event class, specify the corresponding class_mask element as 0.
The number of class_mask elements corresponds to the number of event classes, each of which is
listed in the mysql_event_class_t enumeration defined in plugin_audit.h:
typedef enum
{
MYSQL_AUDIT_GENERAL_CLASS = 0,
MYSQL_AUDIT_CONNECTION_CLASS = 1,
MYSQL_AUDIT_PARSE_CLASS = 2,
MYSQL_AUDIT_AUTHORIZATION_CLASS = 3,
MYSQL_AUDIT_TABLE_ACCESS_CLASS = 4,
43
Writing Audit Plugins
MYSQL_AUDIT_GLOBAL_VARIABLE_CLASS = 5,
MYSQL_AUDIT_SERVER_STARTUP_CLASS = 6,
MYSQL_AUDIT_SERVER_SHUTDOWN_CLASS = 7,
MYSQL_AUDIT_COMMAND_CLASS = 8,
MYSQL_AUDIT_QUERY_CLASS = 9,
MYSQL_AUDIT_STORED_PROGRAM_CLASS = 10,
/* This item must be last in the list. */
MYSQL_AUDIT_CLASS_MASK_SIZE
} mysql_event_class_t;
For any given event class, plugin_audit.h defines bitmask symbols for individual event subclasses,
as well as an xxx_ALL symbol that is the union of the all subclass bitmasks. For example, for
MYSQL_AUDIT_CONNECTION_CLASS (the class that covers connect and disconnect events),
plugin_audit.h defines these symbols:
typedef enum
{
/** occurs after authentication phase is completed. */
MYSQL_AUDIT_CONNECTION_CONNECT = 1 << 0,
/** occurs after connection is terminated. */
MYSQL_AUDIT_CONNECTION_DISCONNECT = 1 << 1,
/** occurs after COM_CHANGE_USER RPC is completed. */
MYSQL_AUDIT_CONNECTION_CHANGE_USER = 1 << 2,
/** occurs before authentication. */
MYSQL_AUDIT_CONNECTION_PRE_AUTHENTICATE = 1 << 3
} mysql_event_connection_subclass_t;
To subscribe to all subclasses of the connection event class (as the NULL_AUDIT plugin does), a
plugin specifies MYSQL_AUDIT_CONNECTION_ALL in the corresponding class_mask element
(class_mask[1] in this case). To subscribe to only some subclasses, the plugin sets the
class_mask element to the union of the subclasses of interest. For example, to subscribe only to the
connect and change-user subclasses, the plugin sets class_mask[1] to this value:
MYSQL_AUDIT_CONNECTION_CONNECT | MYSQL_AUDIT_CONNECTION_CHANGE_USER
The second and third parameters of the event_notify function prototype represent the event class
and a generic pointer to an event structure. (Events in different classes have different structures.
The notification function can use the event class value to determine which event structure applies.)
The function processes the event and returns a status indicating whether the server should continue
processing the event or terminate it.
number_of_calls++;
if (event_class == MYSQL_AUDIT_GENERAL_CLASS)
44
Writing Audit Plugins
{
const struct mysql_event_general *event_general=
(const struct mysql_event_general *)event;
...
}
else if (event_class == MYSQL_AUDIT_CONNECTION_CLASS)
{
const struct mysql_event_connection *event_connection=
(const struct mysql_event_connection *) event;
...
}
else if (event_class == MYSQL_AUDIT_PARSE_CLASS)
{
const struct mysql_event_parse *event_parse =
(const struct mysql_event_parse *)event;
...
}
...
}
The notification function interprets the event argument according to the value of event_class. The
event argument is a generic pointer to the event record, the structure of which differs per event class.
(The plugin_audit.h file contains the structures that define the contents of each event class.) For
each class, audit_null_notify() casts the event to the appropriate class-specific structure and
then checks its subclass to determine which subclass counter to increment. For example, the code to
handle events in the connection-event class looks like this:
else if (event_class == MYSQL_AUDIT_CONNECTION_CLASS)
{
const struct mysql_event_connection *event_connection=
(const struct mysql_event_connection *) event;
switch (event_connection->event_subclass)
{
case MYSQL_AUDIT_CONNECTION_CONNECT:
number_of_calls_connection_connect++;
break;
case MYSQL_AUDIT_CONNECTION_DISCONNECT:
number_of_calls_connection_disconnect++;
break;
case MYSQL_AUDIT_CONNECTION_CHANGE_USER:
number_of_calls_connection_change_user++;
break;
case MYSQL_AUDIT_CONNECTION_PRE_AUTHENTICATE:
number_of_calls_connection_pre_authenticate++;
break;
default:
break;
}
}
Note
For some event classes, the NULL_AUDIT plugin performs other processing in addition to incrementing
a counter. In any case, when the notification function finishes processing the event, it should return a
status indicating whether the server should continue processing the event or terminate it.
• Use the notification function return value. In this case, the function returns zero if the server should
continue processing the event, or nonzero if the server should terminate the event.
45
Writing Audit Plugins
• Call the my_message() function to set the error state before returning from the notification function.
In this case, the notification function return value is ignored and the server aborts the event and
terminates event processing with an error. The my_message() arguments indicate which error to
report, and its message. For example:
my_message(ER_AUDIT_API_ABORT, "This is my error message.", MYF(0));
Some events cannot be aborted. A nonzero return value is not taken into consideration and the
my_message() error call must follow an is_error() check. For example:
if (!thd->get_stmt_da()->is_error())
{
my_message(ER_AUDIT_API_ABORT, "This is my error message.", MYF(0));
}
• MYSQL_AUDIT_COMMAND_END: This event provides the status of a command that has finished
executing, so there is no purpose to terminating it.
If an audit plugin returns nonzero status for a nonterminable event, the server ignores the status and
continues processing the event. This is also true if an audit plugin uses the my_message() function to
terminate a nonterminable event.
To register the plugin at runtime, use this statement, adjusting the .so suffix for your platform as
necessary:
INSTALL PLUGIN NULL_AUDIT SONAME 'adt_null.so';
For additional information about plugin loading, see Installing and Uninstalling Plugins.
To verify plugin installation, examine the INFORMATION_SCHEMA.PLUGINS table or use the SHOW
PLUGINS statement. See Obtaining Server Plugin Information.
While the NULL_AUDIT audit plugin is installed, it exposes status variables that indicate the events for
which the plugin has been called:
mysql> SHOW STATUS LIKE 'Audit_null%';
+----------------------------------------+--------+
| Variable_name | Value |
+----------------------------------------+--------+
| Audit_null_authorization_column | 0 |
| Audit_null_authorization_db | 0 |
| Audit_null_authorization_procedure | 0 |
| Audit_null_authorization_proxy | 0 |
| Audit_null_authorization_table | 0 |
| Audit_null_authorization_user | 0 |
| Audit_null_called | 185547 |
| Audit_null_command_end | 20999 |
| Audit_null_command_start | 21001 |
| Audit_null_connection_change_user | 0 |
| Audit_null_connection_connect | 5823 |
| Audit_null_connection_disconnect | 5818 |
| Audit_null_connection_pre_authenticate | 5823 |
| Audit_null_general_error | 1 |
46
Writing Audit Plugins
| Audit_null_general_log | 26559 |
| Audit_null_general_result | 19922 |
| Audit_null_general_status | 21000 |
| Audit_null_global_variable_get | 0 |
| Audit_null_global_variable_set | 0 |
| Audit_null_parse_postparse | 14648 |
| Audit_null_parse_preparse | 14648 |
| Audit_null_query_nested_start | 6 |
| Audit_null_query_nested_status_end | 6 |
| Audit_null_query_start | 14648 |
| Audit_null_query_status_end | 14647 |
| Audit_null_server_shutdown | 0 |
| Audit_null_server_startup | 1 |
| Audit_null_table_access_delete | 104 |
| Audit_null_table_access_insert | 2839 |
| Audit_null_table_access_read | 97842 |
| Audit_null_table_access_update | 278 |
+----------------------------------------+--------+
Audit_null_called counts all events, and the other variables count instances of specific event
subclasses. For example, the preceding SHOW STATUS statement causes the server to send a result
to the client and to write a message to the general query log if that log is enabled. Thus, a client that
issues the statement repeatedly causes Audit_null_called, Audit_null_general_result,
and Audit_null_general_log to be incremented each time.
The status variables values are global and aggregated across all sessions. There are no counters for
individual sessions.
NULL_AUDIT exposes several system variables that enable communication with the plugin at runtime:
mysql> SHOW VARIABLES LIKE 'null_audit%';
+---------------------------------------------------+-------+
| Variable_name | Value |
+---------------------------------------------------+-------+
| null_audit_abort_message | |
| null_audit_abort_value | 1 |
| null_audit_event_order_check | |
| null_audit_event_order_check_consume_ignore_count | 0 |
| null_audit_event_order_check_exact | 1 |
| null_audit_event_order_started | 0 |
| null_audit_event_record | |
| null_audit_event_record_def | |
+---------------------------------------------------+-------+
• null_audit_event_order_check: Prior to event matching, the expected event order. After event
matching, the matching outcome.
• null_audit_event_record_def: The names of the start and end events to match when
recording events, separated by a semicolon. The value must be set before each statement for which
events are recorded.
47
Writing Audit Plugins
To demonstrate use of those system variables, suppose that a table db1.t1 exists, created as follows:
CREATE DATABASE db1;
CREATE TABLE db1.t1 (a VARCHAR(255));
For test-creation purposes, it is possible to record events that pass through the plugin. To start
recording, specify the start and end events in the null_audit_event_record_def variable. For
example:
SET @@null_audit_event_record_def =
'MYSQL_AUDIT_COMMAND_START;MYSQL_AUDIT_COMMAND_END';
After a statement occurs that matches those start and end events, the null_audit_event_record
system variable contains the resulting event sequence. For example, after recording the events for a
SELECT 1 statement, null_audit_event_record is a string that has a value consisting of a set of
event strings:
MYSQL_AUDIT_COMMAND_START;command_id="3";
MYSQL_AUDIT_PARSE_PREPARSE;;
MYSQL_AUDIT_PARSE_POSTPARSE;;
MYSQL_AUDIT_GENERAL_LOG;;
MYSQL_AUDIT_QUERY_START;sql_command_id="0";
MYSQL_AUDIT_QUERY_STATUS_END;sql_command_id="0";
MYSQL_AUDIT_GENERAL_RESULT;;
MYSQL_AUDIT_GENERAL_STATUS;;
MYSQL_AUDIT_COMMAND_END;command_id="3";
After recording the events for an INSERT INTO db1.t1 VALUES ('some data') statement,
null_audit_event_record has this value:
MYSQL_AUDIT_COMMAND_START;command_id="3";
MYSQL_AUDIT_PARSE_PREPARSE;;
MYSQL_AUDIT_PARSE_POSTPARSE;;
MYSQL_AUDIT_GENERAL_LOG;;
MYSQL_AUDIT_QUERY_START;sql_command_id="5";
MYSQL_AUDIT_TABLE_ACCESS_INSERT;db="db1" table="t1";
MYSQL_AUDIT_QUERY_STATUS_END;sql_command_id="5";
MYSQL_AUDIT_GENERAL_RESULT;;
MYSQL_AUDIT_GENERAL_STATUS;;
MYSQL_AUDIT_COMMAND_END;command_id="3";
Each event string has this format, with semicolons separating the string parts:
event_name;event_data;command
• event_data: Empty, or, as described later, data associated with the event.
• command: Empty, or, as described later, a command to execute when the event is matched.
Note
A limitation of the NULL_AUDIT plugin is that event recording works for a single
session only. Once you record events in a given session, event recording in
subsequent sessions yields a null_audit_event_record value of NULL. To
record events again, it is necessary to restart the plugin.
To check the order of audit API calls, set the null_audit_event_order_check variable to the
expected event order for a particular operation, listing one or more event strings, each containing two
semicolons internally, with additional semicolons separating adjacent event strings:
event_name;event_data;command [;event_name;event_data;command] ...
For example:
48
Writing Audit Plugins
SET @@null_audit_event_order_check =
'MYSQL_AUDIT_CONNECTION_PRE_AUTHENTICATE;;;'
'MYSQL_AUDIT_GENERAL_LOG;;;'
'MYSQL_AUDIT_CONNECTION_CONNECT;;';
For better readability, the statement takes advantage of the SQL syntax that concatenates adjacent
strings into a single string.
After you set the null_audit_event_order_check variable to a list of event strings, the next
matching operation replaces the variable value with a value that indicates the operation outcome:
• If the expected event order failed with unexpected data, the resulting
null_audit_event_order_check value is EVENT-ORDER-INVALID-DATA. This occurs, for
example, if an event was specified as expected to affect table t1 but actually affected t2.
MYSQL_AUDIT_COMMAND_END
MYSQL_AUDIT_GLOBAL_VARIABLE_GET name="var_value" value="var_value"
MYSQL_AUDIT_GLOBAL_VARIABLE_SET
MYSQL_AUDIT_QUERY_NESTED_START sql_command_id="id_value"
MYSQL_AUDIT_QUERY_NESTED_STATUS_END
MYSQL_AUDIT_QUERY_START
MYSQL_AUDIT_QUERY_STATUS_END
MYSQL_AUDIT_TABLE_ACCESS_DELETE db="db_name" table="table_name"
MYSQL_AUDIT_TABLE_ACCESS_INSERT
MYSQL_AUDIT_TABLE_ACCESS_READ
MYSQL_AUDIT_TABLE_ACCESS_UPDATE
49
Writing Audit Plugins
MYSQL_AUDIT_GENERAL_STATUS;;
MYSQL_AUDIT_COMMAND_END;command_id="3";
It is not necesary to list events that are expected to occur after the event string that contains a
command value of ABORT_RET.
After the audit plugin matches the preceding sequence, it aborts event processing and sends an error
message to the client. It also sets null_audit_event_order_check to EVENT-ORDER-ABORT:
mysql> INSERT INTO db1.t1 VALUES ('some data');
ERROR 3164 (HY000): Aborted by Audit API ('MYSQL_AUDIT_QUERY_STATUS_END';1).
mysql> SELECT @@null_audit_event_order_check;
+--------------------------------+
| @@null_audit_event_order_check |
+--------------------------------+
| EVENT-ORDER-ABORT |
+--------------------------------+
Returning a nonzero value from the audit API notification routine is the standard way to
abort event execution. It is also possible to specify a custom error code by setting the
null_audit_abort_value variable to the value that the notification routine should return:
SET @@null_audit_abort_value = 123;
Aborting a sequence results in a standard message with the custom error code. Suppose that you
set audit log system variables like this, to abort on a match for the events that occur for a SELECT 1
statement:
SET @@null_audit_abort_value = 123;
SET @@null_audit_event_order_check =
'MYSQL_AUDIT_COMMAND_START;command_id="3";;'
'MYSQL_AUDIT_PARSE_PREPARSE;;;'
'MYSQL_AUDIT_PARSE_POSTPARSE;;;'
'MYSQL_AUDIT_GENERAL_LOG;;;'
'MYSQL_AUDIT_QUERY_START;sql_command_id="0";ABORT_RET';
Then execution of SELECT 1 results in this error message that includes the custom error code:
mysql> SELECT 1;
ERROR 3164 (HY000): Aborted by Audit API ('MYSQL_AUDIT_QUERY_START';123).
An event can be also aborted with a custom message, specified by setting the
null_audit_abort_message variable. Suppose that you set audit log system variables like this:
SET @@null_audit_abort_message = 'Custom error text.';
SET @@null_audit_event_order_check =
'MYSQL_AUDIT_COMMAND_START;command_id="3";;'
'MYSQL_AUDIT_PARSE_PREPARSE;;;'
50
Writing Authentication Plugins
'MYSQL_AUDIT_PARSE_POSTPARSE;;;'
'MYSQL_AUDIT_GENERAL_LOG;;;'
'MYSQL_AUDIT_QUERY_START;sql_command_id="0";ABORT_RET';
To disable the NULL_AUDIT plugin after testing it, use this statement to unload it:
UNINSTALL PLUGIN NULL_AUDIT;
An authentication plugin can be written for the server side or the client side. Server-side plugins use the
same plugin API that is used for the other server plugin types such as full-text parser or audit plugins
(although with a different type-specific descriptor). Client-side plugins use the client plugin API.
• client_plugin.h: Defines the API for client plugins. This includes the client plugin descriptor and
function prototypes for client plugin C API calls (see C API Client Plugin Interface).
• plugin_auth.h: Defines the part of the server plugin API specific to authentication plugins.
This includes the type-specific descriptor for server-side authentication plugins and the
MYSQL_SERVER_AUTH_INFO structure.
To write an authentication plugin, include the following header files in the plugin source file. Other
MySQL or general header files might also be needed, depending on the plugin capabilities and
requirements.
• For a source file that implements a server authentication plugin, include this file:
#include <mysql/plugin_auth.h>
• For a source file that implements a client authentication plugin, or both client and server plugins,
include these files:
#include <mysql/plugin_auth.h>
#include <mysql/client_plugin.h>
#include <mysql.h>
plugin_auth.h includes plugin.h and plugin_auth_common.h, so you need not include the
latter files explicitly.
51
Writing Authentication Plugins
This section describes how to write a pair of simple server and client authentication plugins that work
together.
Warning
These plugins accept any non-empty password and the password is sent as
cleartext. This is insecure, so the plugins should not be used in production
environments.
The server-side and client-side plugins developed here both are named auth_simple. As described
in Section 4.4.2, “Plugin Data Structures”, the plugin library file must have the same base name
as the client plugin, so the source file name is auth_simple.c and produces a library named
auth_simple.so (assuming that your system uses .so as the suffix for library files).
In MySQL source distributions, authentication plugin source is located in the plugin/auth directory
and can be examined as a guide to writing other authentication plugins. Also, to see how the built-
in authentication plugins are implemented, see sql/sql_acl.cc for plugins that are built in to the
MySQL server and sql-common/client.c for plugins that are built in to the libmysqlclient
client library. (For the built-in client plugins, note that the auth_plugin_t structures used there differ
from the structures used with the usual client plugin declaration macros. In particular, the first two
members are provided explicitly, not by declaration macros.)
The name member (auth_simple) indicates the name to use for references to the plugin in
statements such as INSTALL PLUGIN or UNINSTALL PLUGIN. This is also the name displayed by
SHOW PLUGINS or INFORMATION_SCHEMA.PLUGINS.
The auth_simple_handler member of the general descriptor points to the type-specific descriptor.
For an authentication plugin, the type-specific descriptor is an instance of the st_mysql_auth
structure (defined in plugin_auth.h):
struct st_mysql_auth
{
int interface_version;
const char *client_auth_plugin;
int (*authenticate_user)(MYSQL_PLUGIN_VIO *vio, MYSQL_SERVER_AUTH_INFO *info);
int (*generate_authentication_string)(char *outbuf,
unsigned int *outbuflen, const char *inbuf, unsigned int inbuflen);
int (*validate_authentication_string)(char* const inbuf, unsigned int buflen);
int (*set_salt)(const char *password, unsigned int password_len,
unsigned char* salt, unsigned char *salt_len);
const unsigned long authentication_flags;
};
52
Writing Authentication Plugins
• authenticate_user: A pointer to the main plugin function that communicates with the client
• set_salt: A pointer to a plugin function that converts a scrambled password to binary form
The client_auth_plugin member should indicate the name of the client plugin if a specific plugin is
required. A value of NULL means “any plugin.” In the latter case, whatever plugin the client uses will do.
This is useful if the server plugin does not care about the client plugin or what user name or password
it sends. For example, this might be true if the server plugin authenticates only local clients and uses
some property of the operating system rather than the information sent by the client plugin.
The main function, auth_simple_server(), takes two arguments representing an I/O structure and
a MYSQL_SERVER_AUTH_INFO structure. The structure definition, found in plugin_auth.h, looks
like this:
typedef struct st_mysql_server_auth_info
{
char *user_name;
unsigned int user_name_length;
const char *auth_string;
unsigned long auth_string_length;
char authenticated_as[MYSQL_USERNAME_LENGTH+1];
char external_user[512];
int password_used;
const char *host_or_ip;
unsigned int host_or_ip_length;
} MYSQL_SERVER_AUTH_INFO;
The character set for string members is UTF-8. If there is a _length member associated with a string,
it indicates the string length in bytes. Strings are also null-terminated.
• user_name: The user name sent by the client. The value becomes the USER() function value.
53
Writing Authentication Plugins
• auth_string: The value of the authentication_string column of the row in the mysql.user
system table for the matching account name (that is, the row that matches the client user name and
host name and that the server uses to determine how to authenticate the client).
When my_user connects from the local host, the server invokes my_plugin and passes
'my_auth_string' to it as the auth_string value.
• authenticated_as: The server sets this to the user name (the value of user_name). The plugin
can alter it to indicate that the client should have the privileges of a different user. For example, if
the plugin supports proxy users, the initial value is the name of the connecting (proxy) user, and the
plugin can change this member to the proxied user name. The server then treats the proxy user as
having the privileges of the proxied user (assuming that the other conditions for proxy user support
are satisfied; see Section 4.4.9.4, “Implementing Proxy User Support in Authentication Plugins”). The
value is represented as a string at most MYSQL_USER_NAME_LENGTH bytes long, plus a terminating
null. The value becomes the CURRENT_USER() function value.
• external_user: The server sets this to the empty string (null terminated). Its value becomes the
external_user system variable value. If the plugin wants that system variable to have a different
value, it should set this member accordingly (for example, to the connecting user name). The value is
represented as a string at most 511 bytes long, plus a terminating null.
• password_used: This member applies when authentication fails. The plugin can set it or ignore it.
The value is used to construct the failure error message of Authentication fails. Password
used: %s. The value of password_used determines how %s is handled, as shown in the following
table.
password_used %s Handling
0 NO
1 YES
2 There will be no %s
• host_or_ip: The name of the client host if it can be resolved, or the IP address otherwise.
54
Writing Authentication Plugins
info->password_used= PASSWORD_USED_YES;
return CR_OK;
}
The main function should return one of the error codes shown in the following table.
For an example of how the handshake works, see the plugin/auth/dialog.c source file.
The server counts plugin errors in the Performance Schema host_cache table.
auth_simple_server() is so basic that it does not use the authentication information structure
except to set the member that indicates whether a password was received.
A plugin that supports proxy users must return to the server the name of the proxied user (the
MySQL user whose privileges the client user should get). To do this, the plugin must set the info-
>authenticated_as member to the proxied user name. For information about proxying, see Proxy
Users, and Section 4.4.9.4, “Implementing Proxy User Support in Authentication Plugins”.
The generate_authentication_string member of the plugin descriptor takes the password and
generates a password hash (digest) from it:
• The first two arguments are pointers to the output buffer and its maximum length in bytes. The
function should write the password hash to the output buffer and reset the length to the actual hash
length.
• The second two arguments indicate the password input buffer and its length in bytes.
• The arguments are a pointer to the password hash and its length in bytes.
• The function returns 0 for success, 1 if the password hash cannot be validated.
55
Writing Authentication Plugins
The set_salt member of the plugin descriptor is used only by the mysql_native_password
plugin (see Native Pluggable Authentication). For other authentication plugins, you can use this trivial
implementation:
int set_salt(const char* password __attribute__((unused)),
unsigned int password_len __attribute__((unused)),
unsigned char* salt __attribute__((unused)),
unsigned char* salt_len)
{
*salt_len= 0;
return 0; /* success */
}
The authentication_flags member of the plugin descriptor contains flags that affect plugin
operation. The permitted flags are:
The descriptor members from the plugin name through the option-handling function are common to all
client plugin types. (For descriptions, see Section 4.4.2.3, “Client Plugin Descriptors”.) Following the
common members, the descriptor has an additional member specific to authentication plugins. This is
the “main” function, which handles communication with the server. The function takes two arguments
representing an I/O structure and a connection handler. For our simple any-password plugin, the main
function does nothing but write to the server the password provided by the user:
static int auth_simple_client (MYSQL_PLUGIN_VIO *vio, MYSQL *mysql)
{
int res;
56
Writing Authentication Plugins
strlen(mysql->passwd) + 1);
The main function should return one of the error codes shown in the following table.
CR_OK_HANDSHAKE_COMPLETE indicates that the client has done its part successfully and has read
the last packet. A client plugin may return CR_OK_HANDSHAKE_COMPLETE if the number of round
trips in the authentication protocol is not known in advance and the plugin must read another packet to
determine whether authentication is finished.
Register the server-side plugin with the server. For example, to load the plugin at server startup, use a
--plugin-load=auth_simple.so option, adjusting the .so suffix for your platform as necessary.
Create a user for whom the server will use the auth_simple plugin for authentication:
mysql> CREATE USER 'x'@'localhost'
-> IDENTIFIED WITH auth_simple;
Use a client program to connect to the server as user x. The server-side auth_simple plugin
communicates with the client program that it should use the client-side auth_simple plugin, and
the latter sends the password to the server. The server plugin should reject connections that send an
empty password and accept connections that send a nonempty password. Invoke the client program
each way to verify this:
$> mysql --user=x --skip-password
ERROR 1045 (28000): Access denied for user 'x'@'localhost' (using password: NO)
Because the server plugin accepts any nonempty password, it should be considered insecure. After
testing the plugin to verify that it works, restart the server without the --plugin-load option so as not
to indavertently leave the server running with an insecure authentication plugin loaded. Also, drop the
user with DROP USER 'x'@'localhost'.
For additional information about loading and using authentication plugins, see Installing and
Uninstalling Plugins, and Pluggable Authentication.
If you are writing a client program that supports the use of authentication plugins, normally
such a program causes a plugin to be loaded by calling mysql_options() to set the
MYSQL_DEFAULT_AUTH and MYSQL_PLUGIN_DIR options:
char *plugin_dir = "path_to_plugin_dir";
char *default_auth = "plugin_name";
57
Writing Authentication Plugins
Typically, the program will also accept --plugin-dir and --default-auth options that enable
users to override the default values.
Should a client program require lower-level plugin management, the client library contains functions
that take an st_mysql_client_plugin argument. See C API Client Plugin Interface.
• When a connecting client should be treated as a proxy user, the plugin must return a different name
in the authenticated_as member of the MYSQL_SERVER_AUTH_INFO structure, to indicate the
proxied user name. It may also optionally set the external_user member, to set the value of the
external_user system variable.
• Proxy user accounts must be set up to be authenticated by the plugin. Use the CREATE USER or
GRANT statement to associate accounts with plugins.
• Proxy user accounts must have the PROXY privilege for the proxied accounts. Use the GRANT
statement to grant this privilege.
In other words, the only aspect of proxy user support required of the plugin is that it set
authenticated_as to the proxied user name. The rest is optional (setting external_user) or done
by the DBA using SQL statements.
How does an authentication plugin determine which proxied user to return when the proxy user
connects? That depends on the plugin. Typically, the plugin maps clients to proxied users based on the
authentication string passed to it by the server. This string comes from the AS part of the IDENTIFIED
WITH clause of the CREATE USER statement that specifies use of the plugin for authentication.
The plugin developer determines the syntax rules for the authentication string and implements the
plugin according to those rules. Suppose that a plugin takes a comma-separated list of pairs that map
external users to MySQL users. For example:
CREATE USER ''@'%.example.com'
IDENTIFIED WITH my_plugin AS 'extuser1=mysqlusera, extuser2=mysqluserb'
CREATE USER ''@'%.example.org'
IDENTIFIED WITH my_plugin AS 'extuser1=mysqluserc, extuser2=mysqluserd'
When the server invokes a plugin to authenticate a client, it passes the appropriate authentication
string to the plugin. The plugin is responsible to:
1. Parse the string into its components to determine the mapping to use
For example, if extuser2 connects from an example.com host, the server passes
'extuser1=mysqlusera, extuser2=mysqluserb' to the plugin, and the plugin should copy
mysqluserb into authenticated_as, with a terminating null byte. If extuser2 connects from an
example.org host, the server passes 'extuser1=mysqluserc, extuser2=mysqluserd', and
the plugin should copy mysqluserd instead.
If there is no match in the mapping, the action depends on the plugin. If a match is required, the plugin
likely will return an error. Or the plugin might simply return the client name; in this case, it should not
change authenticated_as, and the server will not treat the client as a proxy.
The following example demonstrates how to handle proxy users using a plugin named
auth_simple_proxy. Like the auth_simple plugin described earlier, auth_simple_proxy
accepts any nonempty password as valid (and thus should not be used in production environments). In
58
Writing Authentication Plugins
addition, it examines the auth_string authentication string member and uses these very simple rules
for interpreting it:
• If the string is empty, the plugin returns the user name as given and no proxying occurs. That is, the
plugin leaves the value of authenticated_as unchanged.
• If the string is nonempty, the plugin treats it as the name of the proxied user and copies it to
authenticated_as so that proxying occurs.
For testing, set up one account that is not proxied according to the preceding rules, and one that is.
This means that one account has no AS clause, and one includes an AS clause that names the proxied
user:
CREATE USER 'plugin_user1'@'localhost'
IDENTIFIED WITH auth_simple_proxy;
CREATE USER 'plugin_user2'@'localhost'
IDENTIFIED WITH auth_simple_proxy AS 'proxied_user';
In addition, create an account for the proxied user and grant plugin_user2 the PROXY privilege for it:
CREATE USER 'proxied_user'@'localhost'
IDENTIFIED BY 'proxied_user_pass';
GRANT PROXY
ON 'proxied_user'@'localhost'
TO 'plugin_user2'@'localhost';
Before the server invokes an authentication plugin, it sets authenticated_as to the client user
name. To indicate that the user is a proxy, the plugin should set authenticated_as to the proxied
user name. For auth_simple_proxy, this means that it must examine the auth_string value, and,
if the value is nonempty, copy it to the authenticated_as member to return it as the name of the
proxied user. In addition, when proxying occurs, the plugin sets the external_user member to the
client user name; this becomes the value of the external_user system variable.
static int auth_simple_proxy_server (MYSQL_PLUGIN_VIO *vio,
MYSQL_SERVER_AUTH_INFO *info)
{
unsigned char *pkt;
int pkt_len;
return CR_OK;
}
After a successful connection, the USER() function should indicate the connecting client user and host
name, and CURRENT_USER() should indicate the account whose privileges apply during the session.
The latter value should be the connecting user account if no proxying occurs or the proxied account if
proxying does occur.
59
Writing Password-Validation Plugins
Compile and install the plugin, then test it. First, connect as plugin_user1:
$> mysql --user=plugin_user1 --password
Enter password: x
To write a password-validation plugin, include the following header file in the plugin source file. Other
MySQL or general header files might also be needed, depending on the plugin capabilities and
requirements.
#include <mysql/plugin_validate_password.h>
plugin_validate_password.h includes plugin.h, so you need not include the latter file
explicitly. plugin.h defines the MYSQL_VALIDATE_PASSWORD_PLUGIN server plugin type and
the data structures needed to declare the plugin. plugin_validate_password.h defines data
structures specific to password-validation plugins.
A password-validation plugin, like any MySQL server plugin, has a general plugin descriptor (see
Section 4.4.2.1, “Server Plugin Library and Plugin Descriptors”). In validate_password.cc, the
general descriptor for validate_password looks like this:
mysql_declare_plugin(validate_password)
{
MYSQL_VALIDATE_PASSWORD_PLUGIN, /* type */
&validate_password_descriptor, /* descriptor */
"validate_password", /* name */
"Oracle Corporation", /* author */
"check password strength", /* description */
PLUGIN_LICENSE_GPL,
validate_password_init, /* init function (when loaded) */
validate_password_deinit, /* deinit function (when unloaded) */
0x0100, /* version */
NULL,
validate_password_system_variables, /* system variables */
NULL,
0,
}
60
Writing Password-Validation Plugins
mysql_declare_plugin_end;
The name member (validate_password) indicates the name to use for references to the plugin in
statements such as INSTALL PLUGIN or UNINSTALL PLUGIN. This is also the name displayed by
INFORMATION_SCHEMA.PLUGINS or SHOW PLUGINS.
The validate_password_init initialization function reads the dictionary file if one was specified,
and the validate_password_deinit function frees data structures associated with the file.
• validate_password: A function that the server calls to test whether a password satisfies the
current password policy. It returns 1 if the password is okay and 0 otherwise. The argument
is the password, passed as a mysql_string_handle value. This data type is implemented
by the mysql_string server service. For details, see the string_service.h and
string_service.cc source files in the sql directory.
• get_password_strength: A function that the server calls to assess the strength of a password.
It returns a value from 0 (weak) to 100 (strong). The argument is the password, passed as a
mysql_string_handle value.
For the validate_password plugin, the type-specific descriptor looks like this:
static struct st_mysql_validate_password validate_password_descriptor=
{
MYSQL_VALIDATE_PASSWORD_INTERFACE_VERSION,
validate_password, /* validate function */
get_password_strength /* validate strength function */
};
61
Writing Protocol Trace Plugins
To compile and install a plugin library file, use the instructions in Section 4.4.3, “Compiling and
Installing Plugin Libraries”. To make the library file available for use, install it in the plugin directory
(the directory named by the plugin_dir system variable). For the validate_password plugin, it
is compiled and installed when you build MySQL from source. It is also included in binary distributions.
The build process produces a shared object library with a name of validate_password.so (the .so
suffix might differ depending on your platform).
To register the plugin at runtime, use this statement, adjusting the .so suffix for your platform as
necessary:
INSTALL PLUGIN validate_password SONAME 'validate_password.so';
For additional information about plugin loading, see Installing and Uninstalling Plugins.
To verify plugin installation, examine the INFORMATION_SCHEMA.PLUGINS table or use the SHOW
PLUGINS statement. See Obtaining Server Plugin Information.
While the validate_password plugin is installed, it exposes system variables that indicate the
password-checking parameters:
mysql> SHOW VARIABLES LIKE 'validate_password%';
+--------------------------------------+--------+
| Variable_name | Value |
+--------------------------------------+--------+
| validate_password_dictionary_file | |
| validate_password_length | 8 |
| validate_password_mixed_case_count | 1 |
| validate_password_number_count | 1 |
| validate_password_policy | MEDIUM |
| validate_password_special_char_count | 1 |
+--------------------------------------+--------+
For descriptions of these variables, see Password Validation Plugin Options and Variables.
To disable the plugin after testing it, use this statement to unload it:
UNINSTALL PLUGIN validate_password;
Enable the test protocol trace plugin by configuring MySQL with the WITH_TEST_TRACE_PLUGIN
CMake option enabled. This causes the test trace plugin to be built and MySQL client programs to load
it, but the plugin has no effect by default. Control the plugin using these environment variables:
• MYSQL_TEST_TRACE_DEBUG: Set this variable to a value other than 0 to cause the test plugin to
produce diagnostic output on stderr.
• MYSQL_TEST_TRACE_CRASH: Set this variable to a value other than 0 to cause the test plugin to
abort the client program if it detects an invalid trace event.
Caution
Diagnostic output from the test protocol trace plugin can disclose passwords
and other sensitive information.
62
Writing Protocol Trace Plugins
Given a MySQL installation built from source with the test plugin enabled, you can see a trace of the
communication between the mysql client and the MySQL server as follows:
$> export MYSQL_TEST_TRACE_DEBUG=1
shqll> mysql
test_trace: Test trace plugin initialized
test_trace: Starting tracing in stage CONNECTING
test_trace: stage: CONNECTING, event: CONNECTING
test_trace: stage: CONNECTING, event: CONNECTED
test_trace: stage: WAIT_FOR_INIT_PACKET, event: READ_PACKET
test_trace: stage: WAIT_FOR_INIT_PACKET, event: PACKET_RECEIVED
test_trace: packet received: 87 bytes
0A 35 2E 37 2E 33 2D 6D 31 33 2D 64 65 62 75 67 .5.7.3-m13-debug
2D 6C 6F 67 00 04 00 00 00 2B 7C 4F 55 3F 79 67 -log.....+|OU?yg
test_trace: 004: stage: WAIT_FOR_INIT_PACKET, event: INIT_PACKET_RECEIVED
test_trace: 004: stage: AUTHENTICATE, event: AUTH_PLUGIN
test_trace: 004: Using authentication plugin: mysql_native_password
test_trace: 004: stage: AUTHENTICATE, event: SEND_AUTH_RESPONSE
test_trace: 004: sending packet: 188 bytes
85 A6 7F 00 00 00 00 01 21 00 00 00 00 00 00 00 .?......!.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
...
mysql> quit
test_trace: 008: stage: READY_FOR_COMMAND, event: SEND_COMMAND
test_trace: 008: QUIT
test_trace: 008: stage: READY_FOR_COMMAND, event: PACKET_SENT
test_trace: 008: packet sent: 0 bytes
test_trace: 008: stage: READY_FOR_COMMAND, event: DISCONNECTED
test_trace: 008: Connection closed
test_trace: 008: Tracing connection has ended
Bye
test_trace: Test trace plugin de-initialized
To use your own protocol trace plugins, you must configure MySQL with the
WITH_TEST_TRACE_PLUGIN CMake option disabled because only one protocol
trace plugin can be loaded at a time and an error occurs for attempts to load a
second one. If you have already built MySQL with the test protocol trace plugin
enabled to see how it works, you must rebuild MySQL without it before you can
use your own plugins.
This section discusses how to write a basic protocol trace plugin named simple_trace. This
plugin provides a framework showing how to set up the client plugin descriptor and create
the trace-related callback functions. In simple_trace, these functions are rudimentary and
do little other than illustrate the arguments required. To see in detail how a trace plugin can
make use of trace event information, check the source file for the test protocol trace plugin
(test_trace_plugin.cc in the libmysql directory of a MySQL source distribution). However, note
that the st_mysql_client_plugin_TRACE structure used there differs from the structures used with
the usual client plugin declaration macros. In particular, the first two members are defined explicitly, not
implicitly by declaration macros.
• client_plugin.h: Defines the API for client plugins. This includes the client plugin descriptor and
function prototypes for client plugin C API calls (see C API Client Plugin Interface).
63
Writing Protocol Trace Plugins
To write a protocol trace plugin, include the following header files in the plugin source file. Other
MySQL or general header files might also be needed, depending on the plugin capabilities and
requirements.
#include <mysql/plugin_trace.h>
#include <mysql.h>
plugin_trace.h includes client_plugin.h, so you need not include the latter file explicitly.
The descriptor members from the plugin name through the option-handling function are common to all
client plugin types. The members following the common members implement trace event handling.
Function members for which the plugin needs no processing can be declared as NULL in the
descriptor, in which case you need not write any corresponding function. For illustration purposes and
to show the argument syntax, the following discussion implements all functions listed in the descriptor,
even though some of them do nothing,
The initialization, deinitialization, and options functions common to all client plugins are declared as
follows. For a description of the arguments and return values, see Section 4.4.2.3, “Client Plugin
Descriptors”.
static int
plugin_init(char *errbuf, size_t errbuf_len, int argc, va_list args)
{
return 0;
}
static int
plugin_deinit()
{
return 0;
}
static int
plugin_options(const char *option, const void *value)
{
return 0;
}
The trace-specific members of the client plugin descriptor are callback functions. The following
descriptions provide more detail on how they are used. Each has a first argument that is a pointer to
the plugin instance in case your implementation needs to access it.
trace_start(): This function is called at the start of each traced connection (each connection that
starts after the plugin is loaded). It is passed the connection handler and the protocol stage at which
tracing starts. trace_start() allocates memory needed by the trace_event() function, if any,
and returns a pointer to it. If no memory is needed, this function returns NULL.
64
Writing Protocol Trace Plugins
static void*
trace_start(struct st_mysql_client_plugin_TRACE *self,
MYSQL *conn,
enum protocol_stage stage)
{
struct st_trace_data *plugin_data= malloc(sizeof(struct st_trace_data));
trace_stop(): This function is called when tracing of the connection ends. That usually happens
when the connection is closed, but can happen earlier. For example, trace_event() can return a
nonzero value at any time and that causes tracing of the connection to terminate. trace_stop() is
then called even though the connection has not ended.
trace_stop() is passed the connection handler and a pointer to the memory allocated by
trace_start() (NULL if none). If the pointer is non-NULL, trace_stop() should deallocate the
memory. This function returns no value.
static void
trace_stop(struct st_mysql_client_plugin_TRACE *self,
MYSQL *conn,
void *plugin_data)
{
fprintf(stderr, "Terminating trace\n");
if (plugin_data)
free(plugin_data);
}
trace_event(): This function is called for each event occurrence. It is passed a pointer to the
memory allocated by trace_start() (NULL if none), the connection handler, the current protocol
stage and event codes, and event data. This function returns 0 to continue tracing, nonzero if tracing
should stop.
static int
trace_event(struct st_mysql_client_plugin_TRACE *self,
void *plugin_data,
MYSQL *conn,
enum protocol_stage stage,
enum trace_event event,
struct st_trace_event_args args)
{
fprintf(stderr, "Trace event received: stage %d, event %d\n", stage, event);
if (event == TRACE_EVENT_DISCONNECTED)
fprintf(stderr, "Connection closed\n");
return 0;
}
The tracing framework shuts down tracing of the connection when the connection ends, so
trace_event() should return nonzero only if you want to terminate tracing of the connection early.
Suppose that you want to trace only connections for a certain MySQL account. After authentication,
you can check the user name for the connection and stop tracing if it is not the user in whom you are
interested.
For each call to trace_event(), the st_trace_event_args structure contains the event data. It
has this definition:
struct st_trace_event_args
{
const char *plugin_name;
65
Writing Protocol Trace Plugins
int cmd;
const unsigned char *hdr;
size_t hdr_len;
const unsigned char *pkt;
size_t pkt_len;
};
For different event types, the st_trace_event_args structure contains the information described
following. All lengths are in bytes. Unused members are set to 0/NULL.
AUTH_PLUGIN event:
plugin_name The name of the plugin
SEND_COMMAND event:
cmd The command code
hdr Pointer to the command packet header
hdr_len Length of the header
pkt Pointer to the command arguments
pkt_len Length of the arguments
PACKET_SENT event:
pkt_len Number of bytes sent
To compile and install a plugin library file, use the instructions in Section 4.4.3, “Compiling and
Installing Plugin Libraries”. To make the library file available for use, install it in the plugin directory (the
directory named by the plugin_dir system variable).
After the plugin library file is compiled and installed in the plugin directory, you can test it easily by
setting the LIBMYSQL_PLUGINS environment variable to the plugin name, which affects any client
program that uses that variable. mysql is one such program:
$> export LIBMYSQL_PLUGINS=simple_trace
shqll> mysql
Initializing trace: stage 0
Trace initialized
Trace event received: stage 0, event 1
Trace event received: stage 0, event 2
...
Welcome to the MySQL monitor. Commands end with ; or \g.
Trace event received
Trace event received
...
mysql> SELECT 1;
Trace event received: stage 4, event 12
Trace event received: stage 4, event 16
...
Trace event received: stage 8, event 14
Trace event received: stage 8, event 15
+---+
| 1 |
+---+
| 1 |
+---+
1 row in set (0.00 sec)
mysql> quit
Trace event received: stage 4, event 12
Trace event received: stage 4, event 16
Trace event received: stage 4, event 3
Connection closed
Terminating trace
Bye
66
Writing Keyring Plugins
It is also possible to write client programs that directly load the plugin. You can tell the client where the
plugin directory is located by calling mysql_options() to set the MYSQL_PLUGIN_DIR option:
char *plugin_dir = "path_to_plugin_dir";
Typically, the program will also accept a --plugin-dir option that enables users to override the
default value.
Should a client program require lower-level plugin management, the client library contains functions
that take an st_mysql_client_plugin argument. See C API Client Plugin Interface.
The instructions here are based on the source code in the plugin/keyring directory of MySQL
source distributions. The source files in that directory implement a plugin named keyring_file that
uses a file local to the server host for data storage.
To write a keyring plugin, include the following header file in the plugin source file. Other MySQL or
general header files might also be needed, depending on the plugin capabilities and requirements.
#include <mysql/plugin_keyring.h>
plugin_keyring.h includes plugin.h, so you need not include the latter file explicitly. plugin.h
defines the MYSQL_KEYRING_PLUGIN server plugin type and the data structures needed to declare
the plugin. plugin_keyring.h defines data structures specific to keyring plugins.
A keyring plugin, like any MySQL server plugin, has a general plugin descriptor (see Section 4.4.2.1,
“Server Plugin Library and Plugin Descriptors”). In keyring.cc, the general descriptor for
keyring_file looks like this:
mysql_declare_plugin(keyring_file)
{
MYSQL_KEYRING_PLUGIN, /* type */
&keyring_descriptor, /* descriptor */
"keyring_file", /* name */
"Oracle Corporation", /* author */
"store/fetch authentication data to/from a flat file", /* description */
PLUGIN_LICENSE_GPL,
keyring_init, /* init function (when loaded) */
keyring_deinit, /* deinit function (when unloaded) */
0x0100, /* version */
NULL, /* status variables */
keyring_system_variables, /* system variables */
NULL,
0,
}
mysql_declare_plugin_end;
The name member (keyring_file) indicates the plugin name. This is the name displayed by
INFORMATION_SCHEMA.PLUGINS or SHOW PLUGINS.
67
Writing Keyring Plugins
The keyring_init initialization function creates the data file if it does not exist, then reads it and
initializes the keystore. The keyring_deinit function frees data structures associated with the file.
The keyring_descriptor value in the general descriptor points to the type-specific descriptor. For
keyring plugins, this descriptor has the following structure:
struct st_mysql_keyring
{
int interface_version;
my_bool (*mysql_key_store)(const char *key_id, const char *key_type,
const char* user_id, const void *key, size_t key_len);
my_bool (*mysql_key_fetch)(const char *key_id, char **key_type,
const char *user_id, void **key, size_t *key_len);
my_bool (*mysql_key_remove)(const char *key_id, const char *user_id);
my_bool (*mysql_key_generate)(const char *key_id, const char *key_type,
const char *user_id, size_t key_len);
};
• mysql_key_fetch: A function that deobfuscates and retrieves a key from the keyring.
• mysql_key_generate: A function that generates a new random key and stores it in the keyring.
For the keyring_file plugin, the type-specific descriptor looks like this:
static struct st_mysql_keyring keyring_descriptor=
{
MYSQL_KEYRING_INTERFACE_VERSION,
mysql_key_store,
mysql_key_fetch,
mysql_key_remove,
mysql_key_generate
};
The mysql_key_xxx functions implemented by a keyring plugin are analogous to the my_key_xxx
functions exposed by the keyring service API. For example, the mysql_key_store plugin function
is analogous to the my_key_store keyring service function. For information about the arguments to
keyring service functions and how they are used, see The Keyring Service.
To compile and install a plugin library file, use the instructions in Section 4.4.3, “Compiling and
Installing Plugin Libraries”. To make the library file available for use, install it in the plugin directory (the
directory named by the plugin_dir system variable). For the keyring_file plugin, it is compiled
and installed when you build MySQL from source. It is also included in binary distributions. The build
process produces a shared object library with a name of keyring_file.so (the .so suffix might
differ depending on your platform).
Keyring plugins typically are loaded early during the server startup process so that they are available to
built-in plugins and storage engines that might depend on them. For keyring_file, use these lines in
the server my.cnf file, adjusting the .so suffix for your platform as necessary:
68
Writing Keyring Plugins
[mysqld]
early-plugin-load=keyring_file.so
For additional information about plugin loading, see Installing and Uninstalling Plugins.
To verify plugin installation, examine the INFORMATION_SCHEMA.PLUGINS table or use the SHOW
PLUGINS statement (see Obtaining Server Plugin Information). For example:
mysql> SELECT PLUGIN_NAME, PLUGIN_STATUS
FROM INFORMATION_SCHEMA.PLUGINS
WHERE PLUGIN_NAME LIKE 'keyring%';
+--------------+---------------+
| PLUGIN_NAME | PLUGIN_STATUS |
+--------------+---------------+
| keyring_file | ACTIVE |
+--------------+---------------+
While the keyring_file plugin is installed, it exposes a system variable that indicates the location of
the data file it uses for secure information storage:
mysql> SHOW VARIABLES LIKE 'keyring_file%';
+-------------------+----------------------------------+
| Variable_name | Value |
+-------------------+----------------------------------+
| keyring_file_data | /usr/local/mysql/keyring/keyring |
+-------------------+----------------------------------+
To disable the plugin after testing it, restart the server without an --early-plugin-load option that
names the plugin.
69
70
Chapter 5 MySQL Services for Plugins
MySQL server plugins have access to server “plugin services.” The plugin services interface exposes
server functionality that plugins can call. It complements the plugin API and has these characteristics:
• Services enable plugins to access code inside the server using ordinary function calls. Services are
also available to loadable functions.
• The interface includes a versioning mechanism so that service versions supported by the server
can be checked at load time against plugin versions. Versioning protects against incompatibilities
between the version of a service that the server provides and the version of the service expected or
required by a plugin.
• For information about plugins for testing plugin services, see the Plugins for Testing Plugin Services
section of the MySQL Server Doxygen documentation, available at https://dev.mysql.com/doc/index-
other.html.
The plugin services interface differs from the plugin API as follows:
• The plugin API enables plugins to be used by the server. The calling initiative lies with the server to
invoke plugins. This enables plugins to extend server functionality or register to receive notifications
about server processing.
• The plugin services interface enables plugins to call code inside the server. The calling initiative lies
with plugins to invoke service functions. This enables functionality already implemented in the server
to be used by many plugins; they need not individually implement it themselves.
To determine what services exist and what functions they provide, look in the include/mysql
directory of a MySQL source distribution. The relevant files are:
• plugin.h includes services.h, which is the “umbrella” header that includes all available service-
specific header files.
Each service-specific header should contain comments that provide full usage documentation for a
given service, including what service functions are available, their calling sequences, and return values.
For developers who wish to modify the server to add a new service, see MySQL Internals: MySQL
Services for Plugins.
• locking_service: A service that implements locks with three attributes: Lock namespace, lock
name, and lock mode. This locking interface is accessible at two levels: 1) At the SQL level, as a set
of loadable functions that each map onto calls to the service routines; 2) As a C language interface,
callable as a plugin service from server plugins or loadable functions. For more information, see The
Locking Service.
• my_plugin_log_service: A service that enables plugins to report errors and specify error
messages. The server writes the messages to its error log.
• mysql_keyring: A service for keyring storage, accessible at two levels: 1) At the SQL level, as
a set of loadable functions that each map onto calls to the service routines; 2) As a C language
interface, callable as a plugin service from server plugins or loadable functions. For more
information, see The Keyring Service.
71
• mysql_password_policy: A service for password validation and strength checking.
• thd_wait: A service for plugins to report when they are going to sleep or stall.
The remainder of this section describes how a plugin uses server functionality that is available as a
service. See also the source for the “daemon” example plugin, which uses the my_snprintf service.
Within a MySQL source distribution, that plugin is located in the plugin/daemon_example directory.
To use a service or services from within a plugin, the plugin source file must include the plugin.h
header file to access service-related information:
#include <mysql/plugin.h>
This does not represent any additional setup cost. A plugin must include that file anyway because it
contains definitions and structures that every plugin needs.
To access a service, a plugin calls service functions like any other function. For example, to format a
string into a buffer for printing, call the my_snprintf() function provided by the service of the same
name:
char buffer[BUFFER_SIZE];
To report an error that the server will write to it error log, first choose an error level. mysql/
service_my_plugin_log.h defines these levels:
enum plugin_log_level
{
MY_ERROR_LEVEL,
MY_WARNING_LEVEL,
MY_INFORMATION_LEVEL
};
For example:
my_plugin_log_message(plugin_ptr, MY_ERROR_LEVEL, "Cannot initialize plugin");
Some services for plugins may be provided by plugins and thus are available only if the service-
providing plugin is loaded. Any MySQL component that uses such a service should check whether the
service is available.
When you build your plugin, use the -lmysqlservices flag at link time to link in the
libmysqlservices library. For example, for CMake, put this in the top-level CMakeLists.txt file:
FIND_LIBRARY(MYSQLSERVICES_LIB mysqlservices
PATHS "${MYSQL_SRCDIR}/libservices" NO_DEFAULT_PATH)
Put this in the CMakeLists.txt file in the directory containing the plugin source:
# the plugin needs the mysql services library for error logging
72
TARGET_LINK_LIBRARIES (your_plugin_library_name ${MYSQLSERVICES_LIB})
73
74
Chapter 6 Adding Functions to MySQL
Table of Contents
6.1 Adding a Native Function ...................................................................................................... 75
6.2 Adding a Loadable Function .................................................................................................. 77
• Create a stored function (a type of stored object). A stored function is written using SQL statements
rather than by compiling object code. The syntax for writing stored functions is not covered here. See
Using Stored Routines.
• Create a native (built-in) MySQL function. A native function is added by modifying the MySQL source
code to be compiled into the mysqld server and become available on a permanent basis. See
Section 6.1, “Adding a Native Function”.
• Use the loadable function interface. A loadable function is compiled as a library file and then loaded
and unloaded from the server dynamically using the CREATE FUNCTION and DROP FUNCTION
statements. See Section 6.2, “Adding a Loadable Function”.
Note
• Adding a native function requires modifying a source distribution. Adding a loadable function does
not; it can be added to a binary MySQL distribution with no access to MySQL source necessary.
• A loadable function is contained in an object file that you must install in addition to the server itself.
For a function compiled into the server, that is unnecessary.
• If you upgrade your MySQL distribution, you can continue to use previously installed loadable
functions, unless you upgrade to a newer MySQL version for which the loadable function interface
changes. For native functions, you must repeat your source code modifications each time you
upgrade.
Regardless of the method used to add a function, it can be invoked in SQL statements just like native
functions such as ABS() or SOUNDEX().
For the rules describing how the server interprets references to different kinds of functions, see
Function Name Parsing and Resolution.
The following sections describe features of the loadable function interface, provide instructions for
writing loadable functions, discuss security precautions that MySQL takes to prevent loadable function
misuse, and describe how to add native MySQL functions.
For example source code that illustrates how to write loadable functions, take a look at the sql/
udf_example.cc file that is provided in MySQL source distributions.
75
Adding a Native Function
To add a native MySQL function, use the procedure described here, which requires that you use a
source distribution. You cannot add native functions to a binary distribution because it is necessary to
modify MySQL source code and compile MySQL from the modified source. If you migrate to another
version of MySQL (for example, when a new version is released), you must repeat the procedure with
the new version.
If the native function will be referred to in statements that will be replicated to replicas, you must ensure
that every replica also has the function available. Otherwise, replication will fail on the replicas when
they attempt to invoke the function.
To add a native function, follow these steps to modify source files in the sql directory:
2. To provide a name by which the function can be referred to in SQL statements, register the name in
item_create.cc by adding a line to this array:
static Native_func_registry func_array[]
You can register several names for the same function. For example, see the lines for "LCASE" and
"LOWER", which are aliases for Create_func_lcase.
4. In item_func.cc, add one of the following declarations, depending on whether you are defining a
numeric or string function:
double Item_func_newname::val()
longlong Item_func_newname::val_int()
String *Item_func_newname::Str(String *str)
If you inherit your object from any of the standard items (like Item_num_func), you probably only
have to define one of these functions and let the parent object take care of the other functions. For
example, the Item_str_func class defines a val() function that executes atof() on the value
returned by ::str().
5. If the function is nondeterministic, include the following statement in the item constructor to indicate
that function results should not be cached:
current_thd->lex->safe_to_cache_query=0;
A function is nondeterministic if, given fixed values for its arguments, it can return different results
for different invocations.
This function should at least calculate max_length based on the given arguments. max_length
is the maximum number of characters the function may return. This function should also set
maybe_null = 0 if the main function cannot return a NULL value. The function can check whether
any of the function arguments can return NULL by checking the arguments' maybe_null variable.
Look at Item_func_mod::fix_length_and_dec for a typical example of how to do this.
76
Adding a Loadable Function
All functions must be thread-safe. In other words, do not use any global or static variables in the
functions without protecting them with mutexes.
If you want to return NULL from ::val(), ::val_int(), or ::str(), you should set null_value
to 1 and return 0.
• The String *str argument provides a string buffer that may be used to hold the result. (For more
information about the String type, take a look at the sql_string.h file.)
• The ::str() function should return the string that holds the result, or (char*) 0 if the result is
NULL.
• All current string functions try to avoid allocating any memory unless absolutely necessary!
• Functions can return string, integer, or real values and can accept arguments of those same types.
• You can define simple functions that operate on a single row at a time, or aggregate functions that
operate on groups of rows.
• Information is provided to functions that enables them to check the number, types, and names of the
arguments passed to them.
• You can tell MySQL to coerce arguments to a given type before passing them to a function.
• You can indicate that a function returns NULL or that an error occurred.
For the loadable function mechanism to work, functions must be written in C or C++ and your
operating system must support dynamic loading. MySQL source distributions include a file sql/
udf_example.cc that defines five loadable function interface functions. Consult this file to see how
loadable function calling conventions work. The include/mysql_com.h header file defines loadable
function-related symbols and data structures, although you need not include this header file directly; it
is included by mysql.h.
A loadable function contains code that becomes part of the running server, so when you write a
loadable function, you are bound by any and all constraints that apply to writing server code. For
example, you may have problems if you attempt to use functions from the libstdc++ library. These
constraints may change in future versions of the server, so it is possible that server upgrades will
require revisions to loadable functions that were originally written for older servers. For information
about these constraints, see MySQL Source-Configuration Options, and Dealing with Problems
Compiling MySQL.
To be able to use loadable functions, you must link mysqld dynamically. If you want to use a loadable
function that needs to access symbols from mysqld (for example, the metaphone function in sql/
udf_example.cc uses default_charset_info), you must link the program with -rdynamic (see
man dlopen).
For each function that you want to use in SQL statements, you should define corresponding C (or C
++) functions. In the following discussion, the name “xxx” is used for an example function name. To
distinguish between SQL and C/C++ usage, XXX() (uppercase) indicates an SQL function call, and
xxx() (lowercase) indicates a C/C++ function call.
Note
77
Loadable Function Interface Functions
This ensures that your C++ function names remain readable in the completed
function.
• xxx()
The main function. This is where the function result is computed. The correspondence between the
SQL function data type and the return type of your C/C++ function is shown here.
It is also possible to declare a DECIMAL function, but the value is returned as a string, so you should
write the function as though it were a STRING function. ROW functions are not implemented.
• xxx_init()
The initialization function for xxx(). If present, it can be used for the following purposes:
• To verify that the arguments are of a required type or, alternatively, to tell MySQL to coerce
arguments to the required types when the main function is called.
• To specify (for REAL functions) the maximum number of decimal places in the result.
• xxx_deinit()
The deinitialization function for xxx(). If present, it should deallocate any memory allocated by the
initialization function.
78
Loadable Function Calling Sequences for Simple Functions
When an SQL statement invokes XXX(), MySQL calls the initialization function xxx_init() to let
it perform any required setup, such as argument checking or memory allocation. If xxx_init()
returns an error, MySQL aborts the SQL statement with an error message and does not call the main
or deinitialization functions. Otherwise, MySQL calls the main function xxx() once for each row. After
all rows have been processed, MySQL calls the deinitialization function xxx_deinit() so that it can
perform any required cleanup.
For aggregate functions that work like SUM(), you must also provide the following functions:
• xxx_clear()
Reset the current aggregate value but do not insert the argument as the initial aggregate value for a
new group.
• xxx_add()
1. Call xxx_init() to let the aggregate function allocate any memory it needs for storing results.
4. Call xxx_add() for each row that belongs in the same group.
5. Call xxx() to get the result for the aggregate when the group changes or after the last row has
been processed.
7. Call xxx_deinit() to let the function free any memory it has allocated.
All functions must be thread-safe. This includes not just the main function, but the initialization and
deinitialization functions as well, and also the additional functions required by aggregate functions. A
consequence of this requirement is that you are not permitted to allocate any global or static variables
that change! If you need memory, you must allocate it in xxx_init() and free it in xxx_deinit().
The main xxx() function should be declared as shown in this section. Note that the return type and
parameters differ, depending on whether you declare the SQL function XXX() to return STRING,
INTEGER, or REAL in the CREATE FUNCTION statement:
79
Loadable Function Calling Sequences for Simple Functions
DECIMAL functions return string values and are declared the same way as STRING functions. ROW
functions are not implemented.
The initid parameter is passed to all three functions. It points to a UDF_INIT structure that is
used to communicate information between functions. The UDF_INIT structure members follow. The
initialization function should fill in any members that it wishes to change. (To use the default for a
member, leave it unchanged.)
• my_bool maybe_null
xxx_init() should set maybe_null to 1 if xxx() can return NULL. The default value is 1 if any of
the arguments are declared maybe_null.
The number of decimal digits to the right of the decimal point. The default value is the maximum
number of decimal digits in the arguments passed to the main function. For example, if the function is
passed 1.34, 1.345, and 1.3, the default would be 3, because 1.345 has 3 decimal digits.
For arguments that have no fixed number of decimals, the decimals value is set to 31, which is 1
more than the maximum number of decimals permitted for the DECIMAL, FLOAT, and DOUBLE data
types. This value is available as the constant NOT_FIXED_DEC in the mysql_com.h header file.
A decimals value of 31 is used for arguments in cases such as a FLOAT or DOUBLE column
declared without an explicit number of decimals (for example, FLOAT rather than FLOAT(10,3))
and for floating-point constants such as 1345E-3. It is also used for string and other nonnumber
arguments that might be converted within the function to numeric form.
The value to which the decimals member is initialized is only a default. It can be changed within the
function to reflect the actual calculation performed. The default is determined such that the largest
number of decimals of the arguments is used. If the number of decimals is NOT_FIXED_DEC for even
one of the arguments, that is the value used for decimals.
The maximum length of the result. The default max_length value differs depending on the result
type of the function. For string functions, the default is the length of the longest argument. For integer
functions, the default is 21 digits. For real functions, the default is 13 plus the number of decimal
digits indicated by initid->decimals. (For numeric functions, the length includes any sign or
decimal point characters.)
If you want to return a blob value, you can set max_length to 65KB or 16MB. This memory is not
allocated, but the value is used to decide which data type to use if there is a need to temporarily
store the data.
• char *ptr
A pointer that the function can use for its own purposes. For example, functions can use initid-
>ptr to communicate allocated memory among themselves. xxx_init() should allocate the
memory and assign it to this pointer:
initid->ptr = allocated_memory;
80
Loadable Function Calling Sequences for Aggregate Functions
• my_bool const_item
xxx_init() should set const_item to 1 if xxx() always returns the same value and to 0
otherwise.
• xxx_reset()
This function is called when MySQL finds the first row in a new group. It should reset any internal
summary variables and then use the given UDF_ARGS argument as the first value in your internal
summary value for the group. Declare xxx_reset() as follows:
void xxx_reset(UDF_INIT *initid, UDF_ARGS *args,
char *is_null, char *error);
xxx_reset() is not needed or used in MySQL 5.7, in which the loadable function interface uses
xxx_clear() instead. However, you can define both xxx_reset() and xxx_clear() if you want
to have your function work with older versions of the server. (If you do include both functions, the
xxx_reset() function in many cases can be implemented internally by calling xxx_clear() to
reset all variables, and then calling xxx_add() to add the UDF_ARGS argument as the first value in
the group.)
• xxx_clear()
This function is called when MySQL needs to reset the summary results. It is called at the beginning
for each new group but can also be called to reset the values for a query where there were no
matching rows. Declare xxx_clear() as follows:
void xxx_clear(UDF_INIT *initid, char *is_null, char *error);
If something went wrong, you can store a value in the variable to which the error argument points.
error points to a single-byte variable, not to a string buffer.
• xxx_add()
This function is called for all rows that belong to the same group. You should use it to add the value
in the UDF_ARGS argument to your internal summary variable.
void xxx_add(UDF_INIT *initid, UDF_ARGS *args,
char *is_null, char *error);
The xxx() function for an aggregate loadable function should be declared the same way as for a
nonaggregate loadable function. See Loadable Function Calling Sequences for Simple Functions.
For an aggregate loadable function, MySQL calls the xxx() function after all rows in the group have
been processed. You should normally never access its UDF_ARGS argument here but instead return a
value based on your internal summary variables.
Return value handling in xxx() should be done the same way as for a nonaggregate loadable
function. See Loadable Function Return Values and Error Handling.
The xxx_reset() and xxx_add() functions handle their UDF_ARGS argument the same way as
functions for nonaggregate loadable functions. See Loadable Function Argument Processing.
81
Loadable Function Argument Processing
The pointer arguments to is_null and error are the same for all calls to xxx_reset(),
xxx_clear(), xxx_add() and xxx(). You can use this to remember that you got an error or
whether the xxx() function should return NULL. You should not store a string into *error! error
points to a single-byte variable, not to a string buffer.
*is_null is reset for each group (before calling xxx_clear()). *error is never reset.
If *is_null or *error are set when xxx() returns, MySQL returns NULL as the result for the group
function.
The number of arguments. Check this value in the initialization function if you require your function to
be called with a particular number of arguments. For example:
if (args->arg_count != 2)
{
strcpy(message,"XXX() requires two arguments");
return 1;
}
For other UDF_ARGS member values that are arrays, array references are zero-based. That is, refer
to array members using index values from 0 to args->arg_count − 1.
A pointer to an array containing the types for each argument. The possible type values are
STRING_RESULT, INT_RESULT, REAL_RESULT, and DECIMAL_RESULT.
To make sure that arguments are of a given type and return an error if they are not, check the
arg_type array in the initialization function. For example:
if (args->arg_type[0] != STRING_RESULT ||
args->arg_type[1] != INT_RESULT)
{
strcpy(message,"XXX() requires a string and an integer");
return 1;
}
Arguments of type DECIMAL_RESULT are passed as strings, so you handle them the same way as
STRING_RESULT values.
As an alternative to requiring your function's arguments to be of particular types, you can use the
initialization function to set the arg_type elements to the types you want. This causes MySQL to
coerce arguments to those types for each call to xxx(). For example, to specify that the first two
arguments should be coerced to string and integer, respectively, do this in xxx_init():
args->arg_type[0] = STRING_RESULT;
args->arg_type[1] = INT_RESULT;
Exact-value decimal arguments such as 1.3 or DECIMAL column values are passed with a type
of DECIMAL_RESULT. However, the values are passed as strings. To receive a number, use the
initialization function to specify that the argument should be coerced to a REAL_RESULT value:
args->arg_type[2] = REAL_RESULT;
• char **args
args->args communicates information to the initialization function about the general nature of
the arguments passed to your function. For a constant argument i, args->args[i] points to the
82
Loadable Function Argument Processing
argument value. (See later for instructions on how to access the value properly.) For a nonconstant
argument, args->args[i] is 0. A constant argument is an expression that uses only constants,
such as 3 or 4*7-2 or SIN(3.14). A nonconstant argument is an expression that refers to
values that may change from row to row, such as column names or functions that are called with
nonconstant arguments.
For each invocation of the main function, args->args contains the actual arguments that are
passed for the row currently being processed.
If argument i represents NULL, args->args[i] is a null pointer (0). If the argument is not NULL,
functions can refer to it as follows:
• An argument of type STRING_RESULT is given as a string pointer plus a length, to enable handling
of binary data or data of arbitrary length. The string contents are available as args->args[i]
and the string length is args->lengths[i]. Do not assume that the string is null-terminated.
• For an argument of type INT_RESULT, you must cast args->args[i] to a long long value:
long long int_val;
int_val = *((long long*) args->args[i]);
• For an argument of type REAL_RESULT, you must cast args->args[i] to a double value:
double real_val;
real_val = *((double*) args->args[i]);
• For an argument of type DECIMAL_RESULT, the value is passed as a string and should be
handled like a STRING_RESULT value.
For the initialization function, the lengths array indicates the maximum string length for each
argument. You should not change these. For each invocation of the main function, lengths
contains the actual lengths of any string arguments that are passed for the row currently being
processed. For arguments of types INT_RESULT or REAL_RESULT, lengths still contains the
maximum length of the argument (as for the initialization function).
• char *maybe_null
For the initialization function, the maybe_null array indicates for each argument whether the
argument value might be null (0 if no, 1 if yes).
• char **attributes
args->attributes communicates information about the names of the function arguments. For
argument i, the attribute name is available as a string in args->attributes[i] and the attribute
length is args->attribute_lengths[i]. Do not assume that the string is null-terminated.
By default, the name of a function argument is the text of the expression used to specify the
argument. For loadable functions, an argument may also have an optional [AS] alias_name
clause, in which case the argument name is alias_name. The attributes value for each
argument thus depends on whether an alias was given.
In this case, the attributes and attribute_lengths arrays will have these values:
args->attributes[0] = "expr1"
args->attribute_lengths[0] = 5
83
Loadable Function Return Values and Error Handling
args->attributes[1] = "alias1"
args->attribute_lengths[1] = 6
args->attributes[2] = "alias2"
args->attribute_lengths[2] = 6
The return value of the main function xxx() is the function value, for long long and double
functions. A string function should return a pointer to the result and set *length to the length (in bytes)
of the return value. For example:
memcpy(result, "result string", 13);
*length = 13;
MySQL passes a buffer to the xxx() function using the result parameter. This buffer is sufficiently
long to hold 255 characters, which can be multibyte characters. The xxx() function can store the
result in this buffer if it fits, in which case the return value should be a pointer to the buffer. If the
function stores the result in a different buffer, it should return a pointer to that buffer.
If your string function does not use the supplied buffer (for example, if it needs to return a string
longer than 255 characters), you must allocate the space for your own buffer with malloc() in the
xxx_init() function or the xxx() function and free it in your xxx_deinit() function. You can store
the allocated memory in the ptr slot in the UDF_INIT structure for reuse by future xxx() calls. See
Loadable Function Calling Sequences for Simple Functions.
If xxx() sets *error to 1 for any row, the function value is NULL for the current row and for any
subsequent rows processed by the statement in which XXX() was invoked. (xxx() is not even called
for subsequent rows.)
If a loadable function will be referred to in statements that will be replicated to replicas, you must
ensure that every replica also has the function available. Otherwise, replication fails on the replicas
when they attempt to invoke the function.
• metaphon() returns a metaphon string of the string argument. This is something like a soundex
string, but it is more tuned for English.
84
Loadable Function Compiling and Installing
• myfunc_double() returns the sum of the ASCII values of the characters in its arguments, divided
by the sum of the length of its arguments.
• sequence([const int]) returns a sequence starting from the given number or 1 if no number
has been given.
• reverse_lookup() returns the host name for an IP address. The function may be called either
with a single string argument of the form 'xxx.xxx.xxx.xxx' or with four numbers.
On Unix and Unix-like systems, compile loadable functions using the following procedure:
A dynamically loadable file should be compiled as a sharable library file, using a command something
like this:
gcc -shared -o udf_example.so udf_example.cc
If you are using gcc with CMake (which is how MySQL itself is configured), you should be able to
create udf_example.so with a simpler command:
make udf_example
After compiling a shared object containing loadable functions, you must install it and tell MySQL
about it. Compiling a shared object from udf_example.cc using gcc directly produces a file
named udf_example.so. Copy the shared object to the server's plugin directory and name it
udf_example.so. This directory is given by the value of the plugin_dir system variable.
On some systems, the ldconfig program that configures the dynamic linker does not recognize
a shared object unless its name begins with lib. In this case you should rename a file such as
udf_example.so to libudf_example.so.
2. Obtain the CMake build utility, if necessary, from http://www.cmake.org. (Version 2.6 or later is
required).
3. In the source tree, look in the sql directory for files named udf_example.def and
udf_example.cc. Copy both files from this directory to your working directory.
ADD_DEFINITIONS("-DHAVE_DLOPEN")
ADD_LIBRARY(udf_example MODULE udf_example.cc udf_example.def)
TARGET_LINK_LIBRARIES(udf_example wsock32)
5. Create the VC project and solution files, substituting an appropriate generator value:
cmake -G "generator"
6. Create udf_example.dll:
85
Loadable Function Security Precautions
On all platforms, after the shared library file has been copied to the plugin_dir directory, notify
mysqld about the new functions with the following statements. The file name suffix differs per platform
(for example, .so for Unix and Unix-like systems, .dll for Windows), so adjust the .so suffix for your
platform as necessary.
CREATE FUNCTION metaphon RETURNS STRING
SONAME 'udf_example.so';
CREATE FUNCTION myfunc_double RETURNS REAL
SONAME 'udf_example.so';
CREATE FUNCTION myfunc_int RETURNS INTEGER
SONAME 'udf_example.so';
CREATE FUNCTION sequence RETURNS INTEGER
SONAME 'udf_example.so';
CREATE FUNCTION lookup RETURNS STRING
SONAME 'udf_example.so';
CREATE FUNCTION reverse_lookup RETURNS STRING
SONAME 'udf_example.so';
CREATE AGGREGATE FUNCTION avgcost RETURNS REAL
SONAME 'udf_example.so';
The CREATE FUNCTION and DROP FUNCTION statements update the mysql.func system table that
serves as a loadable function registry. These statements require the INSERT and DELETE privilege,
respectively, for the mysql database.
During the normal startup sequence, the server loads functions registered in the mysql.func table. If
the server is started with the --skip-grant-tables option, functions registered in the table are not
loaded and are unavailable.
Loadable function library files cannot be placed in arbitrary directories. They must be located in the
server's plugin directory. This directory is given by the value of the plugin_dir system variable.
To use CREATE FUNCTION or DROP FUNCTION, you must have the INSERT or DELETE privilege,
respectively, for the mysql database. This is necessary because those statements add and delete
rows from the mysql.func table.
Loadable functions should have at least one symbol defined in addition to the xxx symbol that
corresponds to the main xxx() function. These auxiliary symbols correspond to the xxx_init(),
xxx_deinit(), xxx_reset(), xxx_clear(), and xxx_add() functions. mysqld also supports
an --allow-suspicious-udfs option that controls whether Loadable functions that have only an
xxx symbol can be loaded. By default, the option is disabled, to prevent attempts at loading functions
from shared library files other than those containing legitimate Loadable functions. If you have older
Loadable functions that contain only the xxx symbol and that cannot be recompiled to include an
auxiliary symbol, it may be necessary to specify the --allow-suspicious-udfs option. Otherwise,
you should avoid enabling it.
86
Chapter 7 Porting MySQL
Before attempting to port MySQL to other operating systems, check the list of currently supported
operating systems first. See https://www.mysql.com/support/supportedplatforms/database.html.
Note
If you create a new port of MySQL, you are free to copy and distribute it under
the GPL license, but it does not make you a copyright holder of MySQL.
To build MySQL from source, your system must satisfy the tool requirements listed at Installing MySQL
from Source.
Important
If you are trying to build MySQL 5.7 with icc on the IA64 platform, and need
support for NDB Cluster, you should first ensure that you are using icc version
9.1.043 or later. (For details, see Bug #21875.)
If you run into problems with a new port, you may have to do some debugging of MySQL! See
Debugging a MySQL Server.
Note
Before you start debugging mysqld, first get the test program mysys/
thr_lock to work. This ensures that your thread installation has even a remote
chance to work!
87
88
compiling, 84
Index return values, 84
locking_service service, 71
A
adding M
loadable functions, 77 MySQL internals, 1
native functions, 75 mysqltest
argument processing, 82 MySQL Test Suite, 5
audit plugins, 10 mysql_keyring service, 71
authentication plugins, 11 mysql_password_policy service, 72
MYSQL_SERVER_AUTH_INFO plugin structure, 53
C mysql_string service, 72
calling sequences for aggregate functions MYSQL_TEST_TRACE_CRASH environment variable,
loadable functions, 81 62
calling sequences for simple functions MYSQL_TEST_TRACE_DEBUG environment variable,
loadable functions, 79 62
compiling my_plugin_log_service service, 71
loadable functions, 84 my_snprintf service, 71
my_thd_scheduler service, 71
D
daemon plugins, 10 N
native functions
E adding, 75
environment variable NDB Cluster
MYSQL_TEST_TRACE_CRASH, 62 compiling with icc, 87
MYSQL_TEST_TRACE_DEBUG, 62
errors P
handling for loadable functions, 84 plugin API, 7
plugin service
F locking_service, 71
full-text parser plugins, 9 mysql_keyring, 71
functions mysql_password_policy, 72
adding, 75 mysql_string, 72
loadable, 75 my_plugin_log_service, 71
adding, 77 my_snprintf, 71
native my_thd_scheduler, 71
adding, 75 security_context, 72
thd_alloc, 72
H thd_wait, 72
handling plugin services, 71
errors, 84 plugins
adding, 7
I audit, 10
authentication, 11
icc
daemon, 10
and NDB Cluster support, 87
full-text parser, 9
INFORMATION_SCHEMA plugins, 10
INFORMATION_SCHEMA, 10
installing
keyring, 12, 67
loadable functions, 84
Loadable function (UDF), 8
protocol trace, 11
K protocol trace plugin, 62
keyring plugins, 12, 67 query rewrite, 11
semisynchronous replication, 10
L storage engine, 8
Loadable function (UDF) plugins, 8 test protocol trace plugin, 62
loadable functions, 75 porting
adding, 77 to other systems, 87
89
processing
arguments, 82
protocol trace plugins, 11
Q
query rewrite plugins, 11
R
return values
loadable functions, 84
S
security_context service, 72
semisynchronous replication plugins, 10
services
for plugins, 71
storage engine plugins, 8
T
test protocol trace plugin, 62
testing mysqld
mysqltest, 5
thd_alloc service, 72
thd_wait service, 72
threads, 3
U
UDFs (see loadable functions)
user-defined functions (see loadable functions)
90