Firebird 3.0 Developer's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Firebird 3.0 Developer's Guide Firebird 3.0 Developer’s Guide Denis Simonov Version 1.1, 27 June 2020 Preface Author of the written material and creator of the sample project on five development platforms, originally as a series of magazine articles: Denis Simonov Translation of original Russian text to English: Dmitry Borodin (MegaTranslations Ltd) Editor of the translated text: Helen Borrie Copyright © 2017-2020 Firebird Project and all contributing authors, under the Public Documentation License Version 1.0. Please refer to the License Notice in the Appendix This volume consists of chapters that walk through the development of a simple application for several language platforms, notably Delphi, Microsoft Entity Framework and MVC.NET (“Model-View-Controller”) for web applications, PHP and Java with the Spring framework. It is hoped that the work will grow in time, with contributions from authors using other stacks with Firebird. 1 Table of Contents Table of Contents 1. About the Firebird Developer’s Guide: for Firebird 3.0 . 6 1.1. About the Author . 6 1.1.1. Translation… . 6 1.1.2. … and More Translation . 6 1.2. Acknowledgments . 6 2. The examples.fdb Database . 8 2.1. Database Creation Script. 8 2.1.1. Database Aliases . 9 2.2. Creating the Database Objects. 10 2.2.1. Domains . 10 2.2.2. Primary Tables. 11 2.2.3. Secondary Tables . 13 2.2.4. Stored Procedures. 17 2.2.5. Roles and Privileges for Users . 25 2.3. Saving and Running the Script . 26 2.4. Loading Test Data . 27 3. Developing Firebird Applications in Delphi . 28 3.1. Starting a Project . 28 3.2. TFDConnection Component . 28 3.3. Path to the Client Library . 28 3.3.1. Developing for Embedded Applications . 29 3.4. Connection parameters. 29 3.4.1. Connection Parameters in a Configuration File . 31 3.4.2. Connecting to the database. 32 3.5. Working with Transactions . 33 3.5.1. TFDTransaction Component. 33 3.6. Datasets. 37 3.6.1. TFDQuery Component . 38 3.6.2. TFDUpdateSQL component . 42 3.7. TFDCommand component . 45 3.7.1. Types of Command . 45 3.8. Creating the Primary Modules . 46 3.8.1. The Read-only Transaction. 48 3.8.2. The Read/Write Transaction. 49 3.8.3. Configuring the Customer Module for Editing. 49 3.8.4. Implementing the Customer Module . 51 3.8.5. Using a RETURNING Clause to Acquire an Autoinc Value. 54 3.9. Creating a Secondary Module . 55 2 Table of Contents 3.9.1. The Transactions for Invoice Data . 56 3.9.2. A Filter for the Data . 56 3.9.3. Configuring the Module. 56 3.9.4. Doing the Work . 58 3.9.5. The Invoice Details . 63 3.10. The Result. 70 3.11. Conclusion . 70 3.12. Source Code . 71 4. Developing Firebird Applications with Microsoft Entity Framework. 72 4.1. Methods of Interacting with a Database . 72 4.2. Setting Up for Firebird in Visual Studio 2015 . 72 4.2.1. The Installation Process . 73 4.3. Creating a Project . 76 4.3.1. Adding Packages to the Project . 76 4.4. Creating an Entity Data Model (EDM) . 78 4.4.1. The EDM Files . 85 4.5. Creating a User Interface . ..
Recommended publications
  • A Fast Implementation of Parallel Snapshot Isolation
    A FAST IMPLEMENTATION OF PARALLEL SNAPSHOT ISOLATION UNA IMPLEMENTACIÓN RÁPIDA DE PARALLEL SNAPSHOT ISOLATION Borja Arnau de Régil Basáñez Trabajo de Fin de Grado del Grado en Ingeniería Informática Facultad de Informática, Universidad Complutense de Madrid Junio 2020 Director: Maria Victoria López López Co-director: Alexey Gotsman Contents Acknowledgements iv Abstract v Resumen vi 1. Introduction1 1.1. Motivation . .1 1.2. Goals . .2 1.3. Work Plan . .3 1.4. Document Structure . .3 1.5. Sources and Repositories . .4 1.6. Related Program Courses . .4 2. Preliminaries5 2.1. Notation . .5 2.1.1. Objects and Replication . .5 2.1.2. Transactions . .5 2.1.3. Histories . .6 2.2. Consistency Models . .6 2.2.1. Read Committed (RC) . .7 2.2.2. Serialisability (SER) . .8 2.2.3. Snapshot Isolation (SI) . .9 2.2.4. Parallel Snapshot Isolation (PSI) . 10 2.2.5. Non-Monotonic Snapshot Isolation (NMSI) . 11 2.2.6. Anomaly Comparison . 11 3. The fastPSI protocol 12 3.1. Consistency Guarantees . 12 3.2. Overview and System Model . 13 3.3. Server data structures . 14 3.4. Protocol Description . 16 3.4.1. Transaction Execution . 16 3.4.2. Transaction Termination . 20 3.5. Consistency Tradeoffs and Read Aborts . 23 ii 4. Implementation and Evaluation 26 4.1. Implementation . 26 4.2. Evaluation . 27 4.2.1. Performance & Scalability Limits . 28 4.2.2. Abort Ratio . 31 5. Related Work 35 6. Conclusions and Future Work 37 6.1. Conclusions . 37 6.2. Future Work . 37 A. Serialisable and Read Committed Protocols 39 A.1.
    [Show full text]
  • One-Copy Serializability with Snapshot Isolation Under the Hood
    One-Copy Serializability with Snapshot Isolation under the Hood Mihaela A. Bornea 1, Orion Hodson 2, Sameh Elnikety 2, Alan Fekete 3 1Athens U. of Econ and Business, 2Microsoft Research, 3University of Sydney Abstract—This paper presents a method that allows a repli- With careful design and engineering, SI engines can be cated database system to provide a global isolation level stronger replicated to get even higher performance with a replicated than the isolation level provided on each individual database form of SI such as Generalized Snapshot Isolation (GSI) [13], replica. We propose a new multi-version concurrency control al- gorithm called, serializable generalized snapshot isolation (SGSI), which is also not serializable. The objective of this paper is that targets middleware replicated database systems. Each replica to provide a concurrency control algorithm for replicated SI runs snapshot isolation locally and the replication middleware databases that achieves almost the same performance as GSI guarantees global one-copy serializability. We introduce novel while providing global one-copy-serializability (1SR). techniques to provide a stronger global isolation level, namely To guarantee serializability, concurrency control algorithms readset extraction and enhanced certification that prevents read- write and write-write conflicts in a replicated setting. We prove typically require access to data read and written in update the correctness of the proposed algorithm, and build a proto- transactions. Accessing this data is especially difficult in a type replicated database system to evaluate SGSI performance replicated database system since built-in facilities inside a experimentally. Extensive experiments with an 8 replica database centralized DBMS, like the lock manager, are not available system under the TPC-W workload mixes demonstrate the at a global level.
    [Show full text]
  • Making Snapshot Isolation Serializable
    Making Snapshot Isolation Serializable ALAN FEKETE University of Sydney DIMITRIOS LIAROKAPIS, ELIZABETH O’NEIL, and PATRICK O’NEIL University of Massachusetts and DENNIS SHASHA Courant Institute Snapshot Isolation (SI) is a multiversion concurrency control algorithm, first described in Berenson et al. [1995]. SI is attractive because it provides an isolation level that avoids many of the com- mon concurrency anomalies, and has been implemented by Oracle and Microsoft SQL Server (with certain minor variations). SI does not guarantee serializability in all cases, but the TPC-C benchmark application [TPC-C], for example, executes under SI without serialization anoma- lies. All major database system products are delivered with default nonserializable isolation levels, often ones that encounter serialization anomalies more commonly than SI, and we sus- pect that numerous isolation errors occur each day at many large sites because of this, lead- ing to corrupt data sometimes noted in data warehouse applications. The classical justification for lower isolation levels is that applications can be run under such levels to improve efficiency when they can be shown not to result in serious errors, but little or no guidance has been of- fered to application programmers and DBAs by vendors as to how to avoid such errors. This article develops a theory that characterizes when nonserializable executions of applications can occur under SI. Near the end of the article, we apply this theory to demonstrate that the TPC-C benchmark application has no serialization anomalies under SI, and then discuss how this demon- stration can be generalized to other applications. We also present a discussion on how to modify the program logic of applications that are nonserializable under SI so that serializability will be guaranteed.
    [Show full text]
  • Language Reference
    InterBase 6 Language Reference Borland/INPRISE 100 Enterprise Way, Scotts Valley, CA 95066 http://www.interbase.com Inprise/Borland may have patents and/or pending patent applications covering subject matter in this document. The furnishing of this document does not convey any license to these patents. Copyright 1999 Inprise/Borland. All rights reserved. All InterBase products are trademarks or registered trademarks of Inprise/Borland. All Borland products are trademarks or registered trademarks of Inprise/Borland. Other brand and product names are trademarks or registered trademarks of their respective holders. 1INT0055WW21004 6E1R0699 Table of Contents List of Tables.....................................xi CHAPTER 1 Using the InterBase Language Reference Who should use this book .....................13 Topics covered in this book .....................14 CHAPTER 2 SQL Statement and Function Reference Database object naming conventions ...............16 Statement list .............................17 Function list .............................18 Datatypes ...............................19 Error handling ............................20 Using statement and function definitions .............21 ALTER DATABASE ..........................22 ALTER DOMAIN ...........................23 ALTER EXCEPTION .........................25 ALTER INDEX ............................26 ALTER PROCEDURE .........................27 ALTER TABLE .............................28 ALTER TRIGGER ...........................35 AVG( ) .................................36 BASED
    [Show full text]
  • Ensuring Consistency Under the Snapshot Isolation
    World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:8, No:7, 2014 Ensuring Consistency under the Snapshot Isolation Carlos Roberto Valencio,ˆ Fabio´ Renato de Almeida, Thatiane Kawabata, Leandro Alves Neves, Julio Cesar Momente, Mario Luiz Tronco, Angelo Cesar Colombini Abstract—By running transactions under the SNAPSHOT isolation both transactions write the same data item, giving rise to we can achieve a good level of concurrency, specially in databases a write-write conflict. In turn, a temporal overlap occurs with high-intensive read workloads. However, SNAPSHOT is not < when Ti and Tj run concurrently, that is tsi tcj and immune to all the problems that arise from competing transactions < and therefore no serialization warranty exists. We propose in this tsj tci [2]. Thus, a transaction Ti under the SNAPSHOT paper a technique to obtain data consistency with SNAPSHOT by using isolation is allowed to commit only if no other transaction with δ <δ< some special triggers that we named DAEMON TRIGGERS. Besides commit-timestamp in the running time of Ti (tsi tci ) keeping the benefits of the SNAPSHOT isolation, the technique is wrote a data item also written by Ti [4]. specially useful for those database systems that do not have an Implementations of the SNAPSHOT isolation have the isolation level that ensures serializability, like Firebird and Oracle. We describe all the anomalies that might arise when using the SNAPSHOT advantage that writes of a transaction do not block the isolation and show how to preclude them with DAEMON TRIGGERS. reads of others.
    [Show full text]
  • Development of Cross-Platform Problem-Oriented Systems Using Specifications of Database Applications ?
    Development of cross-platform problem-oriented systems using specifications of database applications ? Alexei Hmelnov1;2[0000−0002−0125−1130] and Evgeny Fereferov1;2[0000−0002−7316−444X] 1 Matrosov Institute for System Dynamics and Control Theory of Siberian Branch of Russian Academy of Sciences, 134 Lermontov st. Irkutsk, Russia [email protected] http://idstu.irk.ru 2 Institute of Mathematics, Economics and Informatics, Irkutsk State University, Gagarin Blvd. 20, Irkutsk, Russia Abstract. We consider the approach to development of AIS (automated information system) using declarative specifications of database applica- tions (SDA). The specifications of database applications contain all the information about database structure, which is required to build a typical AIS. The information is represented in its pure form, so the specifications are rather concise. The AIS'es are implemented using general algorithms, which are directed by the specifications. We have developed algorithms for such tasks as: user interface generation, query building, report gener- ation, GIS interaction. Using the specifications of database applications and the algorithms the software system GeoARM was implemented. The technology considered was well-tried by use of the system GeoARM for development of several dozens of true-life AIS for different purposes. In this article we'll describe the approach, that we use for creation of several versions of the GeoARM engine, which use different data access libraries, from the common source code base. The resulting versions of the GeoARM engine allow us to create problem-oriented AIS'es for all the supported platforms from the single SDA. Keywords: Specifications of database applications · automated infor- mation systems · rapid application development · data access technology · source code structuring.
    [Show full text]
  • An Overview of the Usage of Default Passwords (Extended Version)
    An Overview of the Usage of Default Passwords (extended version) Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, and Ibrahim Baggili Cyber Forensics Research and Education Group (UNHcFREG) Tagliatela College of Engineering University of New Haven, West Haven CT, 06516, United States fbknie1, [email protected],fXZhang, FBreitinger, [email protected] Summary. The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem in 2017. In this study we investigated several common applications and their pass- word policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). In order to understand the developer decision to implement default passwords, we raised this question on many online platforms or contacted professionals. Default passwords are still a significant problem. 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 char- acter. Key words: Default passwords, applications, usage, security 1 Introduction Security is often disregarded or perceived as optional to the average consumer which can be a drawback. For instance, in October 2016 a large section of the In- ternet came under attack. This attack was perpetuated by approximately 100,000 Internet of Things (IoT) appliances, refrigerators, and microwaves which were compromised and formed the Mirai botnet. Targets of this attack included Twit- ter, reddit and The New York Times all of which shut down for hours.
    [Show full text]
  • Ibsurgeon Interbase/Firebird Database Information Tool
    IBSurgeon Free Tools: User Guide © IBSurgeon, 2015, www.ib-aid.com IBSurgeon Free Tools: User Guide IBSurgeon Free Tools is a set of 3 tools for Firebird and InterBase administrators and developers, designed to facilitate several typical tasks: 1) measure response time of specific SQL query to find time when query runs slower than usual (“Response Checker”), 2) view how much data, indices, blobs, etc, are stored in your Firebird or InterBase database (“DBInfo”) 3) investigate Firebird log for errors and warnings, (“Log Viewer”) These tools are simple to use, below you can find their short overview and frequently asked questions. IBSurgeon Response Checker 1. Why do you need Response Checker? If you are trying to improve Firebird database performance, the first thing you need to define is criteria of performance optimization. And, Firebird database performance has such criteria: Average response time Maximum response time Response time should be measured with your real-world application and with your production database (or in test environment which simulates production close enough). There is no reason to measure average response time out of the scope of your real application, until you want some abstract «optimization» - or you are using test environment which is proven to be very close or even identical to your production database. Response time is what your end users will refer as «slow», «very slow» or «good enough» (end users never say that your software is «fast»). How to measure the average and maximum response times in real-world production environments running Firebird? For the basic response time measurement you can use IBSurgeon Response Checker.
    [Show full text]
  • Interbase 2020 Award Winning Multi-Device Secure Embeddable Database
    InterBase 2020 Award winning Multi-device Secure Embeddable Database © Embarcadero Technologies, Inc. Embarcadero® InterBase® 2020 is a full-featured, high-performance, encryptable, multiplatform and scalable relational database for developers who are looking to embed a low-cost, zero admin, lightweight secure database into their cross-platform connected applications. With InterBase 2020 you get powerful access control, data change management, disaster recovery and journaling, as well as support for popular database drivers for increased deployment flexibility. SMALL, ULTRAFAST, HIGHLY EFFICIENT, SECURE FireMonkey comes with hundreds of controls and components, covering all of the functionality you need. Responsive UIs can use the platform native style, or a single cross- platform look and feel, letting you rapidly create visually stunning designs perfect for your app that highlight your brand across platforms. CHANGE VIEWS™ Many frameworks mimic controls, but FireMonkey provides pixelperfect, platform-specific styling. Real, platform-native controls on Windows, iOS, and Android are also available. Cross-platform design does not have to mean generic: give your users a real, native look-andfeel. BUILT FOR MODERN CPU ARCHITECTURES Without FireMonkey, other developers recreate their UI for each platform, using a different language and separate IDE. With FireMonkey, you can build a single visually stunning responsive platform aware UI once in a single language and deploy it to every platform. Rapidly design your UI, directly connected to your code and easily make platform and device-specific changes to cut development and maintenance times in half or more! SPEED UP TO LOWER RISK DEVELOPMENT AND DEPLOYMENT A UI should be fast, responsive, and snappy, with awesome rendering quality and smooth animations.
    [Show full text]
  • An Empirical Study of Local Database Usage in Android Applications
    2017 IEEE International Conference on Software Maintenance and Evolution An Empirical Study of Local Database Usage in Android Applications Yingjun Lyu∗, Jiaping Gui∗, Mian Wan, William G.J. Halfond Department of Computer Science University of Southern California Email: {yingjunl, jgui, mianwan, halfond}@usc.edu For example, both local and remote databases can be attacked Abstract—Local databases have become an important compo- using SQL injection (SQLI) attacks, if developers do not nent within mobile applications. Developers use local databases follow best practices for validating user input and interacting to provide mobile users with a responsive and secure service for data storage and access. However, using local databases comes with the databases [4], [5], [6]. However, some of the problems with a cost. Studies have shown that they are one of the most are unique to the context in which mobile devices operate. energy consuming components on mobile devices and misuse Many database operations, such as transactions, require file of their APIs can lead to performance and security problems. locking and rollback capability. This means that the use of In this paper, we report the results of a large scale empirical such operations is resource intensive, requiring CPU time, study on 1,000 top ranked apps from the Google Play app store. Our results present a detailed look into the practices, costs, memory, and I/O access. Unsurprisingly, the use of these and potential problems associated with local database usage in operations means that the use of local databases also comes deployed apps. We distill our findings into actionable guidance with a high energy cost; recent studies have found that they are for developers and motivate future areas of research related to among the top two or three energy consumers of all services on techniques to support mobile app developers.
    [Show full text]
  • Firebird 3 Quick Start Guide
    Firebird 3 Quick Start Guide IBPhoenix Editors, Firebird Project Members Version 5.4, 27 June 2020 Table of Contents Table of Contents 1. About this guide . 3 2. The Firebird licenses . 4 3. Installing Firebird . 5 3.1. Installation kits . 5 3.2. Installing the Firebird server. 5 3.2.1. Before installation. 5 3.2.2. Installation drives . 6 3.2.3. Installation script or program . 6 3.2.4. Server modes . 6 3.2.5. Installing on Windows. 7 3.2.6. Installing on Linux and other Unix-like platforms . 8 3.3. Installing multiple servers . 8 3.4. Testing your installation . 9 3.4.1. Pinging the server . 9 3.4.2. Making sure that the Firebird server is running. 9 3.5. Performing a client-only install . 12 3.5.1. Windows . 12 3.5.2. Linux and some other Posix clients . 12 4. Default disk locations . 14 4.1. Linux . 14 4.2. Windows. 14 5. Server configuration and management . 17 5.1. User management . 17 5.1.1. Changing the SYSDBA password . 17 5.1.2. Adding Firebird user accounts . 18 5.1.3. The security database . 19 5.1.4. Appointing co-administrators . 19 5.2. Security . 21 5.3. Administration tools . 26 6. Working with databases . 27 6.1. Connection strings . 27 6.1.1. Local connection strings . 27 6.1.2. TCP/IP connection strings . 28 6.1.3. NetBEUI connection strings . 29 6.1.4. URL-style connection strings . 30 6.1.5. Third-party programs . 31 6.2. Connecting to an existing database .
    [Show full text]
  • Where We Are Snapshot Isolation Snapshot Isolation
    Where We Are • ACID properties of transactions CSE 444: Database Internals • Concept of serializability • How to provide serializability with locking • Lowers level of isolation with locking • How to provide serializability with optimistic cc Lectures 16 – Timestamps/Multiversion or Validation Transactions: Snapshot Isolation • Today: lower level of isolation with multiversion cc – Snapshot isolation Magda Balazinska - CSE 444, Spring 2012 1 Magda Balazinska - CSE 444, Spring 2012 2 Snapshot Isolation Snapshot Isolation • Not described in the book, but good overview in Wikipedia • A type of multiversion concurrency control algorithm • Provides yet another level of isolation • Very efficient, and very popular – Oracle, PostgreSQL, SQL Server 2005 • Prevents many classical anomalies BUT… • Not serializable (!), yet ORACLE and PostgreSQL use it even for SERIALIZABLE transactions! – But “serializable snapshot isolation” now in PostgreSQL Magda Balazinska - CSE 444, Fall 2010 3 Magda Balazinska - CSE 444, Fall 2010 4 Snapshot Isolation Rules Snapshot Isolation (Details) • Multiversion concurrency control: • Each transactions receives a timestamp TS(T) – Versions of X: Xt1, Xt2, Xt3, . • Transaction T sees snapshot at time TS(T) of the database • When T reads X, return XTS(T). • When T commits, updated pages are written to disk • When T writes X: if other transaction updated X, abort – Not faithful to “first committer” rule, because the other transaction U might have committed after T. But once we abort • Write/write conflicts resolved by “first
    [Show full text]