Home

Awesome

Teradata SQL Driver for Python

This package enables Python applications to connect to the Teradata Database.

This package implements the PEP-249 Python Database API Specification 2.0.

This package requires 64-bit Python 3.7 or later, and runs on Windows, macOS, and Linux. 32-bit Python is not supported.

For community support, please visit Teradata Community.

For Teradata customer support, please visit Teradata Customer Service.

Please note, this driver may contain beta/preview features ("Beta Features"). As such, by downloading and/or using the driver, in addition to agreeing to the licensing terms below, you acknowledge that the Beta Features are experimental in nature and that the Beta Features are provided "AS IS" and may not be functional on any machine or in any environment.

Copyright 2024 Teradata. All Rights Reserved.

Table of Contents

<a id="Features"></a>

Features

The Teradata SQL Driver for Python is a DBAPI Driver that enables Python applications to connect to the Teradata Database. The driver implements the PEP-249 Python Database API Specification 2.0.

The driver is a young product that offers a basic feature set. We are working diligently to add features to the driver, and our goal is feature parity with the Teradata JDBC Driver.

At the present time, the driver offers the following features.

<a id="Limitations"></a>

Limitations

<a id="Installation"></a>

Installation

The teradatasql package depends on the pycryptodome package which is available from PyPI.

Use pip install to download and install the driver and its dependencies automatically.

PlatformCommand
macOS or Linuxpip install teradatasql
Windowspy -3 -m pip install teradatasql

When upgrading to a new version of the driver, you may need to use pip install's --no-cache-dir option to force the download of the new version.

PlatformCommand
macOS or Linuxpip install --no-cache-dir -U teradatasql
Windowspy -3 -m pip install --no-cache-dir -U teradatasql

The teradatasql package depends on the pycryptodome package, because one of the included sample programs (TJEncryptPassword.py) uses pycryptodome. The driver itself does not use pycryptodome.

If you want to avoid installing pycryptodome, you can use the --no-deps option of pip install to avoid installing pycryptodome. Without pycryptodome, you will not be able to run the TJEncryptPassword.py sample program.

PlatformCommand
macOS or Linuxpip install --no-deps teradatasql
Windowspy -3 -m pip install --no-deps teradatasql

<a id="License"></a>

License

Use of the driver is governed by the License Agreement for the Teradata SQL Driver for Python.

When the driver is installed, the LICENSE and THIRDPARTYLICENSE files are placed in the teradatasql directory under your Python installation directory.

In addition to the license terms, the driver may contain beta/preview features ("Beta Features"). As such, by downloading and/or using the driver, in addition to the licensing terms, you acknowledge that the Beta Features are experimental in nature and that the Beta Features are provided "AS IS" and may not be functional on any machine or in any environment.

<a id="Documentation"></a>

Documentation

When the driver is installed, the README.md file is placed in the teradatasql directory under your Python installation directory. This permits you to view the documentation offline, when you are not connected to the Internet.

The README.md file is a plain text file containing the documentation for the driver. While the file can be viewed with any text file viewer or editor, your viewing experience will be best with an editor that understands Markdown format.

<a id="SamplePrograms"></a>

Sample Programs

Sample programs are provided to demonstrate how to use the driver. When the driver is installed, the sample programs are placed in the teradatasql/samples directory under your Python installation directory.

The sample programs are coded with a fake database hostname whomooz, username guest, and password please. Substitute your actual database hostname and credentials before running a sample program.

ProgramPurpose
AGKRBatchInsert.pyDemonstrates how to insert a batch of rows with Auto-Generated Key Retrieval (AGKR)
AGKRInsertSelect.pyDemonstrates Insert/Select with Auto-Generated Key Retrieval (AGKR)
BatchInsert.pyDemonstrates how to insert a batch of rows
BatchInsertCSV.pyDemonstrates how to insert a batch of rows from a CSV file
BatchInsPerf.pyMeasures time to insert one million rows
CancelSleep.pyDemonstrates how to use the cancel method to interrupt a query
CharPadding.pyDemonstrates the database's Character Export Width behavior
CommitRollback.pyDemonstrates commit and rollback methods with auto-commit off.
DecimalDigits.pyDemonstrates how to format decimal.Decimal values.
DriverDatabaseVersion.pyDisplays the driver version and database version
ElicitFile.pyDemonstrates C source file upload to create a User-Defined Function (UDF)
ExportCSVResult.pyDemonstrates how to export a query result set to a CSV file
ExportCSVResults.pyDemonstrates how to export multiple query result sets to CSV files
FakeExportCSVResults.pyDemonstrates how to export multiple query result sets with the metadata to CSV files
FakeResultSetCon.pyDemonstrates connection parameter for fake result sets
FakeResultSetEsc.pyDemonstrates escape function for fake result sets
FastExportCSV.pyDemonstrates how to FastExport rows from a table to a CSV file
FastExportTable.pyDemonstrates how to FastExport rows from a table
FastLoadBatch.pyDemonstrates how to FastLoad batches of rows
FastLoadCSV.pyDemonstrates how to FastLoad batches of rows from a CSV file
HelpSession.pyDisplays session information
IgnoreErrors.pyDemonstrates how to ignore errors
InsertLob.pyDemonstrates how to insert BLOB and CLOB values
InsertXML.pyDemonstrates how to insert and retrieve XML values
LoadCSVFile.pyDemonstrates how to load data from a CSV file into a table
LobLocators.pyDemonstrates how to use LOB locators
MetadataFromPrepare.pyDemonstrates how to prepare a SQL request and obtain SQL statement metadata
MonitorAbort.pyDemonstrates how to use the Monitor partition to abort a session
MonitorQueries.pyDemonstrates how to execute Monitor partition queries
MultiThread.pyDemonstrates how to use multiple threads to load data in parallel
ParamDataTypes.pyDemonstrates how to specify data types for parameter marker bind values
ShowCommand.pyDisplays the results from the SHOW command
StoredProc.pyDemonstrates how to create and call a SQL stored procedure
TJEncryptPassword.pyCreates encrypted password files

<a id="Using"></a>

Using the Driver

Your Python script must import the teradatasql package in order to use the driver.

import teradatasql

After importing the teradatasql package, your Python script calls the teradatasql.connect function to open a connection to the database.

You may specify connection parameters as a JSON string, as kwargs, or using a combination of the two approaches. The teradatasql.connect function's first argument is an optional JSON string. The teradatasql.connect function's second and subsequent arguments are optional kwargs.

Connection parameters specified only as kwargs:

con = teradatasql.connect(host="whomooz", user="guest", password="please")

Connection parameters specified only as a JSON string:

con = teradatasql.connect('{"host":"whomooz","user":"guest","password":"please"}')

Connection parameters specified using a combination:

con = teradatasql.connect('{"host":"whomooz"}', user="guest", password="please")

When a combination of parameters are specified, connection parameters specified as kwargs take precedence over same-named connection parameters specified in the JSON string.

<a id="ConnectionParameters"></a>

Connection Parameters

The following table lists the connection parameters currently offered by the driver. Connection parameter values are case-sensitive unless stated otherwise.

Our goal is consistency for the connection parameters offered by this driver and the Teradata JDBC Driver, with respect to connection parameter names and functionality. For comparison, Teradata JDBC Driver connection parameters are documented here.

ParameterDefaultTypeDescription
accountstringSpecifies the database account. Equivalent to the Teradata JDBC Driver ACCOUNT connection parameter.
browserstringSpecifies the command to open the browser for Browser Authentication when logmech is BROWSER. Browser Authentication is supported for Windows and macOS. Equivalent to the Teradata JDBC Driver BROWSER connection parameter.<br/>The specified command must include a placeholder token, literally specified as PLACEHOLDER, which the driver will replace with the Identity Provider authorization endpoint URL. The PLACEHOLDER token is case-sensitive and must be specified in uppercase.<br/>• On Windows, the default command is cmd /c start "title" "PLACEHOLDER". Windows command syntax requires the quoted title to precede the quoted URL.<br/>• On macOS, the default command is open PLACEHOLDER. macOS command syntax does not allow the URL to be quoted.
browser_tab_timeout"5"quoted integerSpecifies the number of seconds to wait before closing the browser tab after Browser Authentication is completed. The default is 5 seconds. The behavior is under the browser's control, and not all browsers support automatic closing of browser tabs. Typically, the tab used to log on will remain open indefinitely, but the second and subsequent tabs will be automatically closed. Specify 0 (zero) to close the tab immediately. Specify -1 to turn off automatic closing of browser tabs. Browser Authentication is supported for Windows and macOS. Equivalent to the Teradata JDBC Driver BROWSER_TAB_TIMEOUT connection parameter.
browser_timeout"180"quoted integerSpecifies the number of seconds that the driver will wait for Browser Authentication to complete. The default is 180 seconds (3 minutes). Browser Authentication is supported for Windows and macOS. Equivalent to the Teradata JDBC Driver BROWSER_TIMEOUT connection parameter.
code_append_file"-out"stringSpecifies how to display the verification URL and code. Optional when logmech is CODE and ignored for other logmech values. The default -out prints the verification URL and code to stdout. Specify -err to print the verification URL and code to stderr. Specify a file name to append the verification URL and code to an existing file or create a new file if the file does not exist. Equivalent to the Teradata JDBC Driver CODE_APPEND_FILE connection parameter.
column_name"false"quoted booleanControls the behavior of cursor .description sequence name items. Equivalent to the Teradata JDBC Driver COLUMN_NAME connection parameter. False specifies that a cursor .description sequence name item provides the AS-clause name if available, or the column name if available, or the column title. True specifies that a cursor .description sequence name item provides the column name if available, but has no effect when StatementInfo parcel support is unavailable.
connect_failure_ttl"0"quoted integerSpecifies the time-to-live in seconds to remember the most recent connection failure for each IP address/port combination. The driver subsequently skips connection attempts to that IP address/port for the duration of the time-to-live. The default value of zero disables this feature. The recommended value is half the database restart time. Equivalent to the Teradata JDBC Driver CONNECT_FAILURE_TTL connection parameter.
connect_function"0"quoted integerSpecifies whether the database should allocate a Logon Sequence Number (LSN) for this session, or associate this session with an existing LSN. Specify 0 for a session with no LSN (the default). Specify 1 to allocate a new LSN for the session. Specify 2 to associate the session with the existing LSN identified by the logon_sequence_number connection parameter. The database only permits sessions for the same user to share an LSN. Equivalent to the Teradata JDBC Driver CONNECT_FUNCTION connection parameter.
connect_timeout"10000"quoted integerSpecifies the timeout in milliseconds for establishing a TCP socket connection. Specify 0 for no timeout. The default is 10 seconds (10000 milliseconds).
cop"true"quoted booleanSpecifies whether COP Discovery is performed. Equivalent to the Teradata JDBC Driver COP connection parameter.
coplast"false"quoted booleanSpecifies how COP Discovery determines the last COP hostname. Equivalent to the Teradata JDBC Driver COPLAST connection parameter. When coplast is false or omitted, or COP Discovery is turned off, then no DNS lookup occurs for the coplast hostname. When coplast is true, and COP Discovery is turned on, then a DNS lookup occurs for a coplast hostname.
databasestringSpecifies the initial database to use after logon, instead of the user's default database. Equivalent to the Teradata JDBC Driver DATABASE connection parameter.
dbs_port"1025"quoted integerSpecifies the database port number. Equivalent to the Teradata JDBC Driver DBS_PORT connection parameter.
encryptdata"false"quoted booleanControls encryption of data exchanged between the driver and the database. Equivalent to the Teradata JDBC Driver ENCRYPTDATA connection parameter.
error_query_count"21"quoted integerSpecifies how many times the driver will attempt to query FastLoad Error Table 1 after a FastLoad operation. Equivalent to the Teradata JDBC Driver ERROR_QUERY_COUNT connection parameter.
error_query_interval"500"quoted integerSpecifies how many milliseconds the driver will wait between attempts to query FastLoad Error Table 1. Equivalent to the Teradata JDBC Driver ERROR_QUERY_INTERVAL connection parameter.
error_table_1_suffix"_ERR_1"stringSpecifies the suffix for the name of FastLoad Error Table 1. Equivalent to the Teradata JDBC Driver ERROR_TABLE_1_SUFFIX connection parameter.
error_table_2_suffix"_ERR_2"stringSpecifies the suffix for the name of FastLoad Error Table 2. Equivalent to the Teradata JDBC Driver ERROR_TABLE_2_SUFFIX connection parameter.
error_table_databasestringSpecifies the database name for the FastLoad error tables. By default, FastLoad error tables reside in the same database as the destination table being loaded. Equivalent to the Teradata JDBC Driver ERROR_TABLE_DATABASE connection parameter.
fake_result_sets"false"quoted booleanControls whether a fake result set containing statement metadata precedes each real result set.
field_quote"\""stringSpecifies a single character string used to quote fields in a CSV file.
field_sep","stringSpecifies a single character string used to separate fields in a CSV file. Equivalent to the Teradata JDBC Driver FIELD_SEP connection parameter.
govern"true"quoted booleanControls FastLoad and FastExport throttling by Teradata workload management rules. When set to true (the default), workload management rules may delay a FastLoad or FastExport. When set to false, workload management rules will reject rather than delay a FastLoad or FastExport. Equivalent to the Teradata JDBC Driver GOVERN connection parameter.
hoststringSpecifies the database hostname.
http_proxystringSpecifies the proxy server URL for HTTP connections to TLS certificate verification CRL and OCSP endpoints. The URL must begin with http:// and must include a colon : and port number.
http_proxy_passwordstringSpecifies the proxy server password for the proxy server identified by the http_proxy parameter. This parameter may only be specified in conjunction with the http_proxy parameter. When this parameter is omitted, no proxy server password is provided to the proxy server identified by the http_proxy parameter.
http_proxy_userstringSpecifies the proxy server username for the proxy server identified by the http_proxy parameter. This parameter may only be specified in conjunction with the http_proxy parameter. When this parameter is omitted, no proxy server username is provided to the proxy server identified by the http_proxy parameter.
https_port"443"quoted integerSpecifies the database port number for HTTPS/TLS connections. Equivalent to the Teradata JDBC Driver HTTPS_PORT connection parameter.
https_proxystringSpecifies the proxy server URL for HTTPS/TLS connections to the database and to Identity Provider endpoints. The URL must begin with http:// and must include a colon : and port number. The driver connects to the proxy server using a non-TLS HTTP connection, then uses the HTTP CONNECT method to establish an HTTPS/TLS connection to the destination. Equivalent to the Teradata JDBC Driver HTTPS_PROXY connection parameter.
https_proxy_passwordstringSpecifies the proxy server password for the proxy server identified by the https_proxy parameter. This parameter may only be specified in conjunction with the https_proxy parameter. When this parameter is omitted, no proxy server password is provided to the proxy server identified by the https_proxy parameter. Equivalent to the Teradata JDBC Driver HTTPS_PROXY_PASSWORD connection parameter.
https_proxy_userstringSpecifies the proxy server username for the proxy server identified by the https_proxy parameter. This parameter may only be specified in conjunction with the https_proxy parameter. When this parameter is omitted, no proxy server username is provided to the proxy server identified by the https_proxy parameter. Equivalent to the Teradata JDBC Driver HTTPS_PROXY_USER connection parameter.
jws_algorithm"RS256"stringSpecifies the JSON Web Signature (JWS) algorithm to sign the JWT Bearer Token for client authentication. Optional when logmech is BEARER and ignored for other logmech values. The default RS256 is RSASSA-PKCS1-v1_5 using SHA-256. Specify RS384 for RSASSA-PKCS1-v1_5 using SHA-384. Specify RS512 for RSASSA-PKCS1-v1_5 using SHA-512. Equivalent to the Teradata JDBC Driver JWS_ALGORITHM connection parameter.
jws_certstringSpecifies the file name of the X.509 certificate PEM file that contains the public key corresponding to the private key from jws_private_key. Optional when logmech is BEARER and ignored for other logmech values. When this parameter is specified, the "x5t" header thumbprint is added to the JWT Bearer Token for the Identity Provider to select the public key for JWT signature verification. Some Identity Providers, such as Microsoft Entra ID, require this. When this parameter is omitted, the "x5t" header thumbprint is not added to the JWT Bearer Token. Some Identity Providers do not require the "x5t" header thumbprint. Equivalent to the Teradata JDBC Driver JWS_CERT connection parameter.
jws_private_keystringSpecifies the file name of the PEM or JWK file containing the private key to sign the JWT Bearer Token for client authentication. Required when logmech is BEARER and ignored for other logmech values. PEM and JWK file formats are supported. The private key filename must end with the .pem or .jwk extension. A PEM file must contain the BEGIN/END PRIVATE KEY header and trailer. If a JWK file contains a "kid" (key identifier) parameter, the "kid" header is added to the JWT Bearer Token for the Identity Provider to select the public key for JWT signature verification. Equivalent to the Teradata JDBC Driver JWS_PRIVATE_KEY connection parameter.
lob_support"true"quoted booleanControls LOB support. Equivalent to the Teradata JDBC Driver LOB_SUPPORT connection parameter.
log"0"quoted integerControls debug logging. Somewhat equivalent to the Teradata JDBC Driver LOG connection parameter. This parameter's behavior is subject to change in the future. This parameter's value is currently defined as an integer in which the 1-bit governs function and method tracing, the 2-bit governs debug logging, the 4-bit governs transmit and receive message hex dumps, and the 8-bit governs timing. Compose the value by adding together 1, 2, 4, and/or 8.
logdatastringSpecifies extra data for the chosen logon authentication method. Equivalent to the Teradata JDBC Driver LOGDATA connection parameter.
logmech"TD2"stringSpecifies the logon authentication method. Equivalent to the Teradata JDBC Driver LOGMECH connection parameter. The database user must have the "logon with null password" permission for KRB5 Single Sign On (SSO) or any of the OpenID Connect (OIDC) methods BEARER, BROWSER, CODE, CRED, JWT, ROPC, or SECRET. GSS-API methods are KRB5, LDAP, TD2, and TDNEGO. Values are case-insensitive.<br/>BEARER uses OIDC Client Credentials Grant with JWT Bearer Token for client authentication.<br/>BROWSER uses Browser Authentication, supported for Windows and macOS.<br/>CODE uses OIDC Device Code Flow, also known as OIDC Device Authorization Grant.<br/>CRED uses OIDC Client Credentials Grant with client_secret_post for client authentication.<br/>JWT uses JSON Web Token.<br/>KRB5 uses Kerberos V5.<br/>LDAP uses Lightweight Directory Access Protocol.<br/>ROPC uses OIDC Resource Owner Password Credentials (ROPC).<br/>SECRET uses OIDC Client Credentials Grant with client_secret_basic for client authentication.<br/>TD2 uses Teradata Method 2.<br/>TDNEGO automatically selects an appropriate GSS-API logon authentication method. OIDC methods are not selected.
logon_sequence_numberquoted integerAssociates this session with an existing Logon Sequence Number (LSN) when connect_function is 2. The database only permits sessions for the same user to share an LSN. An LSN groups multiple sessions together for workload management. Using an LSN is a three-step process. First, establish a control session with connect_function as 1, which allocates a new LSN. Second, obtain the LSN from the control session using the escape function {fn teradata_logon_sequence_number}. Third, establish an associated session with connect_function as 2 and the logon sequence number. Equivalent to the Teradata JDBC Driver LOGON_SEQUENCE_NUMBER connection parameter.
logon_timeout"0"quoted integerSpecifies the logon timeout in seconds. Zero means no timeout.
manage_error_tables"true"quoted booleanControls whether the driver manages the FastLoad error tables.
max_message_body"2097000"quoted integerSpecifies the maximum Response Message size in bytes. Equivalent to the Teradata JDBC Driver MAX_MESSAGE_BODY connection parameter.
oidc_clientidstringSpecifies the OpenID Connect (OIDC) Client ID to use for Browser Authentication and other OIDC methods. When omitted, the default Client ID comes from the database's TdgssUserConfigFile.xml file. Browser Authentication is supported for Windows and macOS. Equivalent to the Teradata JDBC Driver OIDC_CLIENTID connection parameter.
oidc_scope"openid"stringSpecifies the OpenID Connect (OIDC) scope to use for Browser Authentication. Beginning with Teradata Database 17.20.03.11, the default scope can be specified in the database's TdgssUserConfigFile.xml file, using the IdPConfig element's Scope attribute. Browser Authentication is supported for Windows and macOS. Equivalent to the Teradata JDBC Driver OIDC_SCOPE connection parameter.
oidc_sslmodestringSpecifies the mode for HTTPS connections to the Identity Provider. Equivalent to the Teradata JDBC Driver OIDC_SSLMODE connection parameter. Values are case-insensitive. When this parameter is omitted, the default is the value of the sslmode connection parameter.<br/>ALLOW does not perform certificate verification for HTTPS connections to the Identity Provider.<br/>VERIFY-CA verifies that the server certificate is valid and trusted.<br/>VERIFY-FULL verifies that the server certificate is valid and trusted, and verifies that the server certificate matches the Identity Provider hostname.
oidc_token"access_token"stringSpecifies the kind of OIDC token to use for Browser Authentication. Specify id_token to use the id_token instead of the access_token. Browser Authentication is supported for Windows and macOS. Equivalent to the Teradata JDBC Driver OIDC_TOKEN connection parameter.
partition"DBC/SQL"stringSpecifies the database partition. Equivalent to the Teradata JDBC Driver PARTITION connection parameter.
passwordstringSpecifies the database password. Equivalent to the Teradata JDBC Driver PASSWORD connection parameter.
proxy_bypass_hostsstringSpecifies a matching pattern for hostnames and addresses to bypass the proxy server identified by the http_proxy and/or https_proxy parameter. This parameter may only be specified in conjunction with the http_proxy and/or https_proxy parameter. Separate multiple hostnames and addresses with a vertical bar | character. Specify an asterisk * as a wildcard character. When this parameter is omitted, the default pattern localhost|127.*|[::1] bypasses the proxy server identified by the http_proxy and/or https_proxy parameter for common variations of the loopback address. Equivalent to the Teradata JDBC Driver PROXY_BYPASS_HOSTS connection parameter.
request_timeout"0"quoted integerSpecifies the timeout for executing each SQL request. Zero means no timeout.
runstartup"false"quoted booleanControls whether the user's STARTUP SQL request is executed after logon. For more information, refer to User STARTUP SQL Request. Equivalent to the Teradata JDBC Driver RUNSTARTUP connection parameter.
sessionsquoted integerSpecifies the number of data transfer connections for FastLoad or FastExport. The default (recommended) lets the database choose the appropriate number of connections. Equivalent to the Teradata JDBC Driver SESSIONS connection parameter.
sip_support"true"quoted booleanControls whether StatementInfo parcel is used. Equivalent to the Teradata JDBC Driver SIP_SUPPORT connection parameter.
sp_spl"true"quoted booleanControls whether stored procedure source code is saved in the database when a SQL stored procedure is created. Equivalent to the Teradata JDBC Driver SP_SPL connection parameter.
sslcastringSpecifies the file name of a PEM file that contains Certificate Authority (CA) certificates for use with sslmode or oidc_sslmode values VERIFY-CA or VERIFY-FULL. Equivalent to the Teradata JDBC Driver SSLCA connection parameter.
sslcapathstringSpecifies a directory of PEM files that contain Certificate Authority (CA) certificates for use with sslmode or oidc_sslmode values VERIFY-CA or VERIFY-FULL. Only files with an extension of .pem are used. Other files in the specified directory are not used. Equivalent to the Teradata JDBC Driver SSLCAPATH connection parameter.
sslcipherstringSpecifies the TLS cipher for HTTPS/TLS connections. Equivalent to the Teradata JDBC Driver SSLCIPHER connection parameter.
sslcrc"ALLOW"stringControls TLS certificate revocation checking (CRC) for HTTPS/TLS connections. Equivalent to the Teradata JDBC Driver SSLCRC connection parameter. Values are case-insensitive.<br/>ALLOW performs CRC for sslmode or oidc_sslmode VERIFY-CA and VERIFY-FULL, and provides soft fail CRC for VERIFY-CA and VERIFY-FULL to ignore CRC communication failures.<br/>PREFER performs CRC for all HTTPS connections, and provides soft fail CRC for VERIFY-CA and VERIFY-FULL to ignore CRC communication failures.<br/>REQUIRE performs CRC for all HTTPS connections, and requires CRC for VERIFY-CA and VERIFY-FULL.
sslcrl"true"quoted booleanControls the use of Certificate Revocation List (CRL) for TLS certificate revocation checking for HTTPS/TLS connections. Online Certificate Status Protocol (OCSP) is preferred over CRL, so CRL is used when OSCP is unavailable. Equivalent to the Teradata JDBC Driver SSLCRL connection parameter.
sslmode"PREFER"stringSpecifies the mode for connections to the database. Equivalent to the Teradata JDBC Driver SSLMODE connection parameter. Values are case-insensitive.<br/>DISABLE disables HTTPS/TLS connections and uses only non-TLS connections.<br/>ALLOW uses non-TLS connections unless the database requires HTTPS/TLS connections.<br/>PREFER uses HTTPS/TLS connections unless the database does not offer HTTPS/TLS connections.<br/>REQUIRE uses only HTTPS/TLS connections.<br/>VERIFY-CA uses only HTTPS/TLS connections and verifies that the server certificate is valid and trusted.<br/>VERIFY-FULL uses only HTTPS/TLS connections, verifies that the server certificate is valid and trusted, and verifies that the server certificate matches the database hostname.
sslocsp"true"quoted booleanControls the use of Online Certificate Status Protocol (OCSP) for TLS certificate revocation checking for HTTPS/TLS connections. Equivalent to the Teradata JDBC Driver SSLOCSP connection parameter.
sslprotocol"TLSv1.2"stringSpecifies the TLS protocol for HTTPS/TLS connections. Equivalent to the Teradata JDBC Driver SSLPROTOCOL connection parameter.
teradata_values"true"quoted booleanControls whether str or a more specific Python data type is used for certain result set column value types. Refer to the Data Types table below for details.
tmode"DEFAULT"stringSpecifies the transaction mode. Equivalent to the Teradata JDBC Driver TMODE connection parameter. Possible values are DEFAULT (the default), ANSI, or TERA.
userstringSpecifies the database username. Equivalent to the Teradata JDBC Driver USER connection parameter.

<a id="COPDiscovery"></a>

COP Discovery

The driver provides Communications Processor (COP) discovery behavior when the cop connection parameter is true or omitted. COP Discovery is turned off when the cop connection parameter is false.

A database system can be composed of multiple database nodes. One or more of the database nodes can be configured to run the database Gateway process. Each database node that runs the database Gateway process is termed a Communications Processor, or COP. COP Discovery refers to the procedure of identifying all the available COP hostnames and their IP addresses. COP hostnames can be defined in DNS, or can be defined in the client system's hosts file. Teradata strongly recommends that COP hostnames be defined in DNS, rather than the client system's hosts file. Defining COP hostnames in DNS provides centralized administration, and enables centralized changes to COP hostnames if and when the database is reconfigured.

The coplast connection parameter specifies how COP Discovery determines the last COP hostname.

Specifying coplast as true can improve performance with DNS that is slow to respond for DNS lookup failures, and is necessary for DNS that never returns a DNS lookup failure.

When performing COP Discovery, the driver starts with cop1, which is appended to the database hostname, and then proceeds with cop2, cop3, ..., copN. The driver supports domain-name qualification for COP Discovery and the coplast hostname. Domain-name qualification is recommended, because it can improve performance by avoiding unnecessary DNS lookups for DNS search suffixes.

The following table illustrates the DNS lookups performed for a hypothetical three-node database system named "whomooz".

 No domain name qualificationWith domain name qualification<br/>(Recommended)
Application-specified<br/>database hostnamewhomoozwhomooz.domain.com
Default: COP Discovery turned on, and coplast is false or omitted,<br/>perform DNS lookups until unknown COP hostname is encounteredwhomoozcop110.0.0.1<br/>whomoozcop210.0.0.2<br/>whomoozcop310.0.0.3<br/>whomoozcop4→undefinedwhomoozcop1.domain.com10.0.0.1<br/>whomoozcop2.domain.com10.0.0.2<br/>whomoozcop3.domain.com10.0.0.3<br/>whomoozcop4.domain.com→undefined
COP Discovery turned on, and coplast is true,<br/>perform DNS lookups until COP hostname is found whose IP address matches the coplast hostname, or unknown COP hostname is encounteredwhomoozcoplast10.0.0.3<br/>whomoozcop110.0.0.1<br/>whomoozcop210.0.0.2<br/>whomoozcop310.0.0.3whomoozcoplast.domain.com10.0.0.3<br/>whomoozcop1.domain.com10.0.0.1<br/>whomoozcop2.domain.com10.0.0.2<br/>whomoozcop3.domain.com10.0.0.3
COP Discovery turned off and round-robin DNS,<br/>perform one DNS lookup that returns multiple IP addresseswhomooz10.0.0.1, 10.0.0.2, 10.0.0.3whomooz.domain.com10.0.0.1, 10.0.0.2, 10.0.0.3

Round-robin DNS rotates the list of IP addresses automatically to provide load distribution. Round-robin is only possible with DNS, not with the client system hosts file.

The driver supports the definition of multiple IP addresses for COP hostnames and non-COP hostnames.

For the first connection to a particular database system, the driver generates a random number to index into the list of COPs. For each subsequent connection, the driver increments the saved index until it wraps around to the first position. This behavior provides load distribution across all discovered COPs.

The driver masks connection failures to down COPs, thereby hiding most connection failures from the client application. An exception is thrown to the application only when all the COPs are down for that database. If a COP is down, the next COP in the sequence (including a wrap-around to the first COP) receives extra connections that were originally destined for the down COP. When multiple IP addresses are defined in DNS for a COP, the driver will attempt to connect to each of the COP's IP addresses, and the COP is considered down only when connection attempts fail to all of the COP's IP addresses.

If COP Discovery is turned off, or no COP hostnames are defined in DNS, the driver connects directly to the hostname specified in the host connection parameter. This permits load distribution schemes other than the COP Discovery approach. For example, round-robin DNS or a TCP/IP load distribution product can be used. COP Discovery takes precedence over simple database hostname lookup. To use an alternative load distribution scheme, either ensure that no COP hostnames are defined in DNS, or turn off COP Discovery with cop as false.

<a id="StoredPasswordProtection"></a>

Stored Password Protection

Overview

Stored Password Protection enables an application to provide a connection password in encrypted form to the driver.

An encrypted password may be specified in the following contexts:

If the password, however specified, begins with the prefix ENCRYPTED_PASSWORD( then the specified password must follow this format:

ENCRYPTED_PASSWORD(file:PasswordEncryptionKeyFileName,file:EncryptedPasswordFileName)

Each filename must be preceded by the file: prefix. The PasswordEncryptionKeyFileName must be separated from the EncryptedPasswordFileName by a single comma.

The PasswordEncryptionKeyFileName specifies the name of a file that contains the password encryption key and associated information. The EncryptedPasswordFileName specifies the name of a file that contains the encrypted password and associated information. The two files are described below.

Stored Password Protection is offered by this driver, the Teradata JDBC Driver, and the Teradata SQL Driver for R. These drivers use the same file format.

Program TJEncryptPassword

TJEncryptPassword.py is a sample program to create encrypted password files for use with Stored Password Protection. When the driver is installed, the sample programs are placed in the teradatasql/samples directory under your Python installation directory.

This program works in conjunction with Stored Password Protection offered by the driver. This program creates the files containing the password encryption key and encrypted password, which can be subsequently specified via the ENCRYPTED_PASSWORD( syntax.

You are not required to use this program to create the files containing the password encryption key and encrypted password. You can develop your own software to create the necessary files. You may also use the TJEncryptPassword.java sample program that is available with the Teradata JDBC Driver Reference. The only requirement is that the files must match the format expected by the driver, which is documented below.

This program encrypts the password and then immediately decrypts the password, in order to verify that the password can be successfully decrypted. This program mimics the password decryption of the driver, and is intended to openly illustrate its operation and enable scrutiny by the community.

The encrypted password is only as safe as the two files. You are responsible for restricting access to the files containing the password encryption key and encrypted password. If an attacker obtains both files, the password can be decrypted. The operating system file permissions for the two files should be as limited and restrictive as possible, to ensure that only the intended operating system userid has access to the files.

The two files can be kept on separate physical volumes, to reduce the risk that both files might be lost at the same time. If either or both of the files are located on a network volume, then an encrypted wire protocol can be used to access the network volume, such as sshfs, encrypted NFSv4, or encrypted SMB 3.0.

This program accepts eight command-line arguments:

ArgumentExampleDescription
TransformationAES/CBC/NoPaddingSpecifies the transformation in the form Algorithm/Mode/Padding. Supported transformations are listed in a table below.
KeySizeInBits256Specifies the algorithm key size, which governs the encryption strength.
MACHmacSHA256Specifies the message authentication code (MAC) algorithm HmacSHA1 or HmacSHA256.
PasswordEncryptionKeyFileNamePassKey.propertiesSpecifies a filename in the current directory, a relative pathname, or an absolute pathname. The file is created by this program. If the file already exists, it will be overwritten by the new file.
EncryptedPasswordFileNameEncPass.propertiesSpecifies a filename in the current directory, a relative pathname, or an absolute pathname. The filename or pathname that must differ from the PasswordEncryptionKeyFileName. The file is created by this program. If the file already exists, it will be overwritten by the new file.
HostnamewhomoozSpecifies the database hostname.
UsernameguestSpecifies the database username.
PasswordpleaseSpecifies the database password to be encrypted. Unicode characters in the password can be specified with the \uXXXX escape sequence.

Example Commands

The TJEncryptPassword program uses the driver to log on to the specified database using the encrypted password, so the driver must have been installed with the pip install teradatasql command.

The following commands assume that the TJEncryptPassword.py program file is located in the current directory. When the driver is installed, the sample programs are placed in the teradatasql/samples directory under your Python installation directory. Change your current directory to the teradatasql/samples directory under your Python installation directory.

The following example commands illustrate using a 256-bit AES key, and using the HmacSHA256 algorithm.

PlatformCommand
macOS or Linuxpython TJEncryptPassword.py AES/CBC/NoPadding 256 HmacSHA256 PassKey.properties EncPass.properties whomooz guest please
Windowspy -3 TJEncryptPassword.py AES/CBC/NoPadding 256 HmacSHA256 PassKey.properties EncPass.properties whomooz guest please

Password Encryption Key File Format

You are not required to use the TJEncryptPassword program to create the files containing the password encryption key and encrypted password. You can develop your own software to create the necessary files, but the files must match the format expected by the driver.

The password encryption key file is a text file in Java Properties file format, using the ISO 8859-1 character encoding.

The file must contain the following string properties:

PropertyDescription
version=1The version number must be 1. This property is required.
transformation=Algorithm/Mode/PaddingSpecifies the transformation in the form Algorithm/Mode/Padding. Supported transformations are listed in a table below. This property is required.
algorithm=AlgorithmThis value must correspond to the Algorithm portion of the transformation. This property is required.
match=MatchValueThe password encryption key and encrypted password files must contain the same match value. The match values are compared to ensure that the two specified files are related to each other, serving as a "sanity check" to help avoid configuration errors. This property is required.
key=HexDigitsThis value is the password encryption key, encoded as hex digits. This property is required.
mac=MACAlgorithmSpecifies the message authentication code (MAC) algorithm HmacSHA1 or HmacSHA256. Stored Password Protection performs Encrypt-then-MAC for protection from a padding oracle attack. This property is required.
mackey=HexDigitsThis value is the MAC key, encoded as hex digits. This property is required.

The TJEncryptPassword program uses a timestamp as a shared match value, but a timestamp is not required. Any shared string can serve as a match value. The timestamp is not related in any way to the encryption of the password, and the timestamp cannot be used to decrypt the password.

Encrypted Password File Format

The encrypted password file is a text file in Java Properties file format, using the ISO 8859-1 character encoding.

The file must contain the following string properties:

PropertyDescription
version=1The version number must be 1. This property is required.
match=MatchValueThe password encryption key and encrypted password files must contain the same match value. The match values are compared to ensure that the two specified files are related to each other, serving as a "sanity check" to help avoid configuration errors. This property is required.
password=HexDigitsThis value is the encrypted password, encoded as hex digits. This property is required.
params=HexDigitsThis value contains the cipher algorithm parameters, if any, encoded as hex digits. Some ciphers need algorithm parameters that cannot be derived from the key, such as an initialization vector. This property is optional, depending on whether the cipher algorithm has associated parameters.
hash=HexDigitsThis value is the expected message authentication code (MAC), encoded as hex digits. After encryption, the expected MAC is calculated using the ciphertext, transformation name, and algorithm parameters if any. Before decryption, the driver calculates the MAC using the ciphertext, transformation name, and algorithm parameters if any, and verifies that the calculated MAC matches the expected MAC. If the calculated MAC differs from the expected MAC, then either or both of the files may have been tampered with. This property is required.

While params is technically optional, an initialization vector is required by all three block cipher modes CBC, CFB, and OFB that are supported by the driver. ECB (Electronic Codebook) does not require params, but ECB is not supported by the driver.

Transformation, Key Size, and MAC

A transformation is a string that describes the set of operations to be performed on the given input, to produce transformed output. A transformation specifies the name of a cryptographic algorithm such AES, followed by a feedback mode and padding scheme.

The driver supports the following transformations and key sizes.

TransformationKey Size
AES/CBC/NoPadding128
AES/CBC/NoPadding192
AES/CBC/NoPadding256
AES/CBC/PKCS5Padding128
AES/CBC/PKCS5Padding192
AES/CBC/PKCS5Padding256
AES/CFB/NoPadding128
AES/CFB/NoPadding192
AES/CFB/NoPadding256
AES/CFB/PKCS5Padding128
AES/CFB/PKCS5Padding192
AES/CFB/PKCS5Padding256
AES/OFB/NoPadding128
AES/OFB/NoPadding192
AES/OFB/NoPadding256
AES/OFB/PKCS5Padding128
AES/OFB/PKCS5Padding192
AES/OFB/PKCS5Padding256

Stored Password Protection uses a symmetric encryption algorithm such as AES, in which the same secret key is used for encryption and decryption of the password. Stored Password Protection does not use an asymmetric encryption algorithm such as RSA, with separate public and private keys.

CBC (Cipher Block Chaining) is a block cipher encryption mode. With CBC, each ciphertext block is dependent on all plaintext blocks processed up to that point. CBC is suitable for encrypting data whose total byte count exceeds the algorithm's block size, and is therefore suitable for use with Stored Password Protection.

Stored Password Protection hides the password length in the encrypted password file by extending the length of the UTF8-encoded password with trailing null bytes. The length is extended to the next 512-byte boundary.

The strength of the encryption depends on your choice of cipher algorithm and key size.

Sharing Files with the Teradata JDBC Driver

This driver and the Teradata JDBC Driver can share the files containing the password encryption key and encrypted password, if you use a transformation, key size, and MAC algorithm that is supported by both drivers.

File Locations

For the ENCRYPTED_PASSWORD( syntax of the driver, each filename must be preceded by the file: prefix. The PasswordEncryptionKeyFileName must be separated from the EncryptedPasswordFileName by a single comma. The files can be located in the current directory, specified with a relative path, or specified with an absolute path.

Example for files in the current directory:

ENCRYPTED_PASSWORD(file:JohnDoeKey.properties,file:JohnDoePass.properties)

Example with relative paths:

ENCRYPTED_PASSWORD(file:../dir1/JohnDoeKey.properties,file:../dir2/JohnDoePass.properties)

Example with absolute paths on Windows:

ENCRYPTED_PASSWORD(file:c:/dir1/JohnDoeKey.properties,file:c:/dir2/JohnDoePass.properties)

Example with absolute paths on Linux:

ENCRYPTED_PASSWORD(file:/dir1/JohnDoeKey.properties,file:/dir2/JohnDoePass.properties)

Processing Sequence

The two filenames specified for an encrypted password must be accessible to the driver and must conform to the properties file formats described above. The driver raises an exception if the file is not accessible, or the file does not conform to the required file format.

The driver verifies that the match values in the two files are present, and match each other. The driver raises an exception if the match values differ from each other. The match values are compared to ensure that the two specified files are related to each other, serving as a "sanity check" to help avoid configuration errors. The TJEncryptPassword program uses a timestamp as a shared match value, but a timestamp is not required. Any shared string can serve as a match value. The timestamp is not related in any way to the encryption of the password, and the timestamp cannot be used to decrypt the password.

Before decryption, the driver calculates the MAC using the ciphertext, transformation name, and algorithm parameters if any, and verifies that the calculated MAC matches the expected MAC. The driver raises an exception if the calculated MAC differs from the expected MAC, to indicate that either or both of the files may have been tampered with.

Finally, the driver uses the decrypted password to log on to the database.

<a id="LogonMethods"></a>

Logon Authentication Methods

The following table describes the logon authentication methods selected by the logmech connection parameter.

logmechDescriptionUsage and Requirements
BEAREROIDC Client Credentials Grant with JWT Bearer Token for client authenticationuser, password, and logdata must all be omitted when using this method.<br/>jws_private_key is required when using this method. jws_cert is also needed for Identity Providers that require an "x5t" header thumbprint.<br/>oidc_clientid is commonly used to override the default Client ID when using this method.<br/>oidc_scope, oidc_token, and jws_algorithm are optional parameters when using this method.<br/>The database user must have the "logon with null password" permission.<br/>The database must be configured with Identity Provider information for Federated Authentication. These tasks are covered in the reference Teradata Vantage™ Security Administration.
BROWSERBrowser Authentication, also known as OIDC Authorization Code Flow with Proof Key for Code Exchange (PKCE)user, password, and logdata must all be omitted when using Browser Authentication.<br/>browser, browser_tab_timeout, browser_timeout, oidc_clientid, oidc_scope, and oidc_token are optional parameters when using this method.<br/>Browser Authentication is supported for Windows and macOS. Browser Authentication is not supported for other operating systems.<br/>The database user must have the "logon with null password" permission.<br/>The database must be configured with Identity Provider information for Federated Authentication. These tasks are covered in the reference Teradata Vantage™ Security Administration.
CODEOIDC Device Code Flow, also known as OIDC Device Authorization Grantuser, password, and logdata must all be omitted when using this method.<br/>code_append_file, oidc_clientid, oidc_scope, and oidc_token are optional parameters when using this method.<br/>The database user must have the "logon with null password" permission.<br/>The database must be configured with Identity Provider information for Federated Authentication. These tasks are covered in the reference Teradata Vantage™ Security Administration.
CREDOIDC Client Credentials Grant with client_secret_post for client authenticationuser, password, oidc_clientid, and oidc_scope must all be omitted when using this method.<br/>logdata must contain the Client Credentials Grant request HTTP POST Form Data encoded as Content-Type application/x-www-form-urlencoded.<br/>oidc_token is an optional parameter when using this method.<br/>The database user must have the "logon with null password" permission.<br/>The database must be configured with Identity Provider information for Federated Authentication. These tasks are covered in the reference Teradata Vantage™ Security Administration.
JWTJSON Web Token (JWT)logdata must contain token= followed by the JSON Web Token.<br/>The database user must have the "logon with null password" permission.<br/>Your application must obtain a valid JWT from a User Service that is accessible to your application. The database must be configured to trust JWTs issued by your User Service. These tasks are covered in the reference Teradata Vantage™ Security Administration.
KRB5GSS-API Kerberos V5Requires a significant number of administration tasks on the machine that is running the driver.<br/>For Kerberos Single Sign On (SSO), the database user must have the "logon with null password" permission.
LDAPGSS-API Lightweight Directory Access Protocol (LDAP)Requires a significant administration effort to set up the LDAP environment. These tasks are covered in the reference Teradata Vantage™ Security Administration.<br/>Once they are complete, LDAP can be used without any additional work required on the machine that is running the driver.
ROPCOIDC Resource Owner Password Credentials (ROPC)logdata must be omitted when using this method.<br/>user and password are required when using this method.<br/>oidc_clientid, oidc_scope, and oidc_token are optional parameters when using this method.<br/>The database user must have the "logon with null password" permission.<br/>The database must be configured with Identity Provider information for Federated Authentication. These tasks are covered in the reference Teradata Vantage™ Security Administration.
SECRETOIDC Client Credentials Grant with client_secret_basic for client authenticationuser and password must be omitted when using this method.<br/>logdata must contain the client secret.<br/>oidc_clientid is commonly used to override the default Client ID when using this method.<br/>oidc_scope and oidc_token are optional parameters when using this method.<br/>The database user must have the "logon with null password" permission.<br/>The database must be configured with Identity Provider information for Federated Authentication. These tasks are covered in the reference Teradata Vantage™ Security Administration.
TD2GSS-API Teradata Method 2Does not require any special setup, and can be used immediately.
TDNEGOGSS-API Teradata Negotiating MechanismAutomatically selects an appropriate GSS-API logon authentication method. OIDC methods are not selected.

<a id="ClientAttributes"></a>

Client Attributes

Client Attributes record a variety of information about the client system and client software in the system tables DBC.SessionTbl and DBC.EventLog. Client Attributes are intended to be a replacement for the information recorded in the LogonSource column of the system tables DBC.SessionTbl and DBC.EventLog.

The Client Attributes are recorded at session logon time. Subsequently, the system views DBC.SessionInfoV and DBC.LogOnOffV can be queried to obtain information about the client system and client software on a per-session basis. Client Attribute values may be recorded in the database in either mixed-case or in uppercase, depending on the session character set and other factors. Analysis of recorded Client Attributes must flexibly accommodate either mixed-case or uppercase values.

Warning: The information in this section is subject to change in future releases of the driver. Client Attributes can be "mined" for information about client system demographics; however, any applications that parse Client Attribute values must be changed if Client Attribute formats are changed in the future.

Client Attributes are not intended to be used for workload management. Instead, query bands are intended for workload management. Any use of Client Attributes for workload management may break if Client Attributes are changed, or augmented, in the future.

Client AttributeSourceDescription
MechanismNamedatabaseThe connection's logon mechanism; for example, TD2, LDAP, etc.
ClientIpAddressdatabaseThe client IP address, as determined by the database
ClientTcpPortNumberdatabaseThe connection's client TCP port number, as determined by the database
ClientIPAddrByClientdriverThe client IP address, as determined by the driver
ClientPortByClientdriverThe connection's client TCP port number, as determined by the driver
ClientInterfaceKinddriverThe value P to indicate Python, available beginning with Teradata Database 17.20.03.19
ClientInterfaceVersiondriverThe driver version, available beginning with Teradata Database 17.20.03.19
ClientProgramNamedriverThe client program name, followed by a streamlined call stack
ClientSystemUserIddriverThe client user name
ClientOsNamedriverThe client operating system name
ClientProcThreadIddriverThe client process ID
ClientVmNamedriverPython runtime information
ClientTdHostNamedriverThe database hostname as specified by the application, without any COP suffix
ClientCOPSuffixedHostNamedriverThe COP-suffixed database hostname chosen by the driver
ServerIPAddrByClientdriverThe database node's IP address, as determined by the driver
ServerPortByClientdriverThe destination port number of the TCP connection to the database node, as determined by the driver
ClientConfTypedriverThe confidentiality type, as determined by the driver<br/>V - TLS used for encryption, with full certificate verification<br/>C - TLS used for encryption, with Certificate Authority (CA) verification<br/>R - TLS used for encryption, with no certificate verification<br/>E - TLS was not attempted, and TDGSS used for encryption<br/>U - TLS was not attempted, and TDGSS encryption depends on central administration<br/>F - TLS was attempted, but the TLS handshake failed, so this is a fallback to using TDGSS for encryption<br/>H - SSLMODE was set to PREFER, but a non-TLS connection was made, and TDGSS encryption depends on central administration
ServerConfTypedatabaseThe confidentiality type, as determined by the database<br/>T - TLS used for encryption<br/>E - TDGSS used for encryption<br/>U - Data transfer is unencrypted
ClientConfVersiondatabaseThe TLS version as determined by the database, if this is an HTTPS/TLS connection
ClientConfCipherSuitedatabaseThe TLS cipher as determined by the database, if this is an HTTPS/TLS connection
ClientAttributesExdriverAdditional Client Attributes are available in this column as a list of name=value pairs, each terminated by a semicolon. Individual values can be accessed using the NVP system function.<br/>PYTHON - The Python version<br/>TZ - The Python current time zone<br/>GO - The Go version<br/>SCS - The session character set<br/>CCS - The client character set<br/>LOB - Y/N indicator for LOB support<br/>SIP - Y/N indicator for StatementInfo parcel support<br/>TM - The transaction mode indicator A (ANSI) or T (TERA)<br/>ENC - Y/N indicator for encryptdata connection parameter<br/>DP - The dbs_port connection parameter<br/>HP - The https_port connection parameter<br/>OSL - Numeric level corresponding to oidc_sslmode<br/>OSM - The oidc_sslmode connection parameter<br/>SSL - Numeric level corresponding to sslmode<br/>SSLM - The sslmode connection parameter<br/>CRC - The sslcrc connection parameter<br/>OCSP - Y/N indicator for sslocsp connection parameter<br/>CRL - Y/N indicator for sslcrl connection parameter<br/>CERT - The database TLS certificate status<br/>BA - Y/N indicator for Browser Authentication<br/>LM - The logon authentication method<br/>JWS - The JSON Web Signature (JWS) algorithm<br/>JH - JWT header parameters to identify signature key<br/>IDPC - The Identity Provider TLS certificate status<br/><br/>The CERT and IDPC attributes indicate the TLS certificate status of an HTTPS/TLS connection. When the attribute indicates the TLS certificate is valid (V) or invalid (I), then additional TLS certificate status details are provided as a series of comma-separated two-letter codes.<br/>U - the TLS certificate status is unavailable<br/>V - the TLS certificate status is valid<br/>I - the TLS certificate status is invalid<br/>PU - sslca PEM file is unavailable for server certificate verification<br/>PA - server certificate was verified using sslca PEM file<br/>PR - server certificate was rejected using sslca PEM file<br/>DU - sslcapath PEM directory is unavailable for server certificate verification<br/>DA - server certificate was verified using sslcapath PEM directory<br/>DR - server certificate was rejected using sslcapath PEM directory<br/>TA - server certificate was verified by the system<br/>TR - server certificate was rejected by the system<br/>CY - server certificate passed VERIFY-CA check<br/>CN - server certificate failed VERIFY-CA check<br/>HU - server hostname is unavailable for server certificate matching, because database IP address was specified<br/>HY - server hostname matches server certificate<br/>HN - server hostname does not match server certificate<br/>RU - resolved server hostname is unavailable for server certificate matching, because database IP address was specified<br/>RY - resolved server hostname matches server certificate<br/>RN - resolved server hostname does not match server certificate<br/>IY - IP address matches server certificate<br/>IN - IP address does not match server certificate<br/>FY - server certificate passed VERIFY-FULL check<br/>FN - server certificate failed VERIFY-FULL check<br/>SU - certificate revocation check status is unavailable<br/>SG - certificate revocation check status is good<br/>SR - certificate revocation check status is revoked

LogonSource Column

The LogonSource column is obsolete and has been superseded by Client Attributes. The LogonSource column may be deprecated and subsequently removed in future releases of the database.

When the driver establishes a connection to the database, the driver composes a string value that is stored in the LogonSource column of the system tables DBC.SessionTbl and DBC.EventLog. The LogonSource column is included in system views such as DBC.SessionInfoV and DBC.LogOnOffV. All LogonSource values are recorded in the database in uppercase.

The driver follows the format documented in the Teradata Data Dictionary, section "System Views Columns Reference", for network-attached LogonSource values. Network-attached LogonSource values have eight fields, separated by whitespace. The database composes fields 1 through 3, and the driver composes fields 4 through 8.

FieldSourceDescription
1databaseThe string (TCP/IP) to indicate the connection type
2databaseThe connection's client TCP port number, in hexadecimal
3databaseThe client IP address, as determined by the database
4driverThe database hostname as specified by the application, without any COP suffix
5driverThe client process ID
6driverThe client user name
7driverThe client program name
8driverThe string 01 LSS to indicate the LogonSource string version 01

<a id="UserStartup"></a>

User STARTUP SQL Request

CREATE USER and MODIFY USER commands provide STARTUP clauses for specifying SQL commands to establish initial session settings. The following table lists several of the SQL commands that may be used to establish initial session settings.

CategorySQL command
Diagnostic settingsDIAGNOSTIC ... FOR SESSION
Session query bandSET QUERY_BAND ... FOR SESSION
Unicode Pass ThroughSET SESSION CHARACTER SET UNICODE PASS THROUGH ON
Transaction isolationSET SESSION CHARACTERISTICS AS TRANSACTION ISOLATION LEVEL
Collation sequenceSET SESSION COLLATION
Temporal qualifierSET SESSION CURRENT VALIDTIME AND CURRENT TRANSACTIONTIME
Date formatSET SESSION DATEFORM
Function tracingSET SESSION FUNCTION TRACE
Session time zoneSET TIME ZONE

For example, the following command sets a STARTUP SQL request for user susan to establish read-uncommitted transaction isolation after logon.

MODIFY USER susan AS STARTUP='SET SESSION CHARACTERISTICS AS TRANSACTION ISOLATION LEVEL RU'

The driver's runstartup connection parameter must be true to execute the user's STARTUP SQL request after logon. The default for runstartup is false. If the runstartup connection parameter is omitted or false, then the user's STARTUP SQL request will not be executed.

<a id="TransactionMode"></a>

Transaction Mode

The tmode connection parameter enables an application to specify the transaction mode for the connection.

While ANSI mode is generally recommended, please note that every application is different, and some applications may need to use TERA mode. The following differences between ANSI and TERA mode might affect a typical user or application:

  1. Silent truncation of inserted data occurs in TERA mode, but not ANSI mode. In ANSI mode, the database returns an error instead of truncating data.
  2. Tables created in ANSI mode are MULTISET by default. Tables created in TERA mode are SET tables by default.
  3. For tables created in ANSI mode, character columns are CASESPECIFIC by default. For tables created in TERA mode, character columns are NOT CASESPECIFIC by default.
  4. In ANSI mode, character literals are CASESPECIFIC. In TERA mode, character literals are NOT CASESPECIFIC.

The last two behavior differences, taken together, may cause character data comparisons (such as in WHERE clause conditions) to be case-insensitive in TERA mode, but case-sensitive in ANSI mode. This, in turn, can produce different query results in ANSI mode versus TERA mode. Comparing two NOT CASESPECIFIC expressions is case-insensitive regardless of mode, and comparing a CASESPECIFIC expression to another expression of any kind is case-sensitive regardless of mode. You may explicitly CAST an expression to be CASESPECIFIC or NOT CASESPECIFIC to obtain the character data comparison required by your application.

The Teradata Reference / SQL Request and Transaction Processing recommends that ANSI mode be used for all new applications. The primary benefit of using ANSI mode is that inadvertent data truncation is avoided. In contrast, when using TERA mode, silent data truncation can occur when data is inserted, because silent data truncation is a feature of TERA mode.

A drawback of using ANSI mode is that you can only call stored procedures that were created using ANSI mode, and you cannot call stored procedures that were created using TERA mode. It may not be possible to switch over to ANSI mode exclusively, because you may have some legacy applications that require TERA mode to work properly. You can work around this drawback by creating your stored procedures twice, in two different users/databases, once using ANSI mode, and once using TERA mode.

Refer to the Teradata Reference / SQL Request and Transaction Processing for complete information regarding the differences between ANSI and TERA transaction modes.

<a id="AutoCommit"></a>

Auto-Commit

The driver provides auto-commit on and off functionality for both ANSI and TERA mode.

When a connection is first established, it begins with the default auto-commit setting, which is on. When auto-commit is on, the driver is solely responsible for managing transactions, and the driver commits each SQL request that is successfully executed. An application should not execute any transaction management SQL commands when auto-commit is on. An application should not call the commit method or the rollback method when auto-commit is on.

An application can manage transactions itself by setting the connection's .autocommit attribute to False to turn off auto-commit.

con.autocommit = False

When auto-commit is off, the driver leaves the current transaction open after each SQL request is executed, and the application is responsible for committing or rolling back the transaction by calling the commit or the rollback method, respectively.

Auto-commit remains turned off until the application turns it back on by setting the connection's .autocommit attribute to True.

con.autocommit = True

Best practices recommend that an application avoid executing database-vendor-specific transaction management commands such as BT, ET, ABORT, COMMIT, or ROLLBACK, because such commands differ from one vendor to another. (They even differ between Teradata's two modes ANSI and TERA.) Instead, best practices recommend that an application only call the standard methods commit and rollback for transaction management.

  1. When auto-commit is on in ANSI mode, the driver automatically executes COMMIT after every successful SQL request.
  2. When auto-commit is off in ANSI mode, the driver does not automatically execute COMMIT. When the application calls the commit method, then the driver executes COMMIT.
  3. When auto-commit is on in TERA mode, the driver does not execute BT or ET, unless the application explicitly executes BT or ET commands itself, which is not recommended.
  4. When auto-commit is off in TERA mode, the driver executes BT before submitting the application's first SQL request of a new transaction. When the application calls the commit method, then the driver executes ET until the transaction is complete.

As part of the wire protocol between the database and Teradata client interface software (such as this driver), each message transmitted from the database to the client has a bit designated to indicate whether the session has a transaction in progress or not. Thus, the client interface software is kept informed as to whether the session has a transaction in progress or not.

In TERA mode with auto-commit off, when the application uses the driver to execute a SQL request, if the session does not have a transaction in progress, then the driver automatically executes BT before executing the application's SQL request. Subsequently, in TERA mode with auto-commit off, when the application uses the driver to execute another SQL request, and the session already has a transaction in progress, then the driver has no need to execute BT before executing the application's SQL request.

In TERA mode, BT and ET pairs can be nested, and the database keeps track of the nesting level. The outermost BT/ET pair defines the transaction scope; inner BT/ET pairs have no effect on the transaction because the database does not provide actual transaction nesting. To commit the transaction, ET commands must be repeatedly executed until the nesting is unwound. The Teradata wire protocol bit (mentioned earlier) indicates when the nesting is unwound and the transaction is complete. When the application calls the commit method in TERA mode, the driver repeatedly executes ET commands until the nesting is unwound and the transaction is complete.

In rare cases, an application may not follow best practices and may explicitly execute transaction management commands. Such an application must turn off auto-commit before executing transaction management commands such as BT, ET, ABORT, COMMIT, or ROLLBACK. The application is responsible for executing the appropriate commands for the transaction mode in effect. TERA mode commands are BT, ET, and ABORT. ANSI mode commands are COMMIT and ROLLBACK. An application must take special care when opening a transaction in TERA mode with auto-commit off. In TERA mode with auto-commit off, when the application executes a SQL request, if the session does not have a transaction in progress, then the driver automatically executes BT before executing the application's SQL request. Therefore, the application should not begin a transaction by executing BT.

# TERA mode example showing undesirable BT/ET nesting
con.autocommit = False
cur.execute("BT") # BT automatically executed by the driver before this, and produces a nested BT
cur.execute("insert into mytable1 values(1, 2)")
cur.execute("insert into mytable2 values(3, 4)")
cur.execute("ET") # unwind nesting
cur.execute("ET") # complete transaction

# TERA mode example showing how to avoid BT/ET nesting
con.autocommit = False
cur.execute("insert into mytable1 values(1, 2)") # BT automatically executed by the driver before this
cur.execute("insert into mytable2 values(3, 4)")
cur.execute("ET") # complete transaction

Please note that neither previous example shows best practices. Best practices recommend that an application only call the standard methods commit and rollback for transaction management.

# Example showing best practice
con.autocommit = False
cur.execute("insert into mytable1 values(1, 2)")
cur.execute("insert into mytable2 values(3, 4)")
con.commit()

<a id="DataTypes"></a>

Data Types

The table below lists the database data types supported by the driver, and indicates the corresponding Python data type returned in result set rows.

Database data typeResult set Python data typeWith teradata_values as false
BIGINTint
BLOBbytes
BYTEbytes
BYTEINTint
CHARstr
CLOBstr
DATEdatetime.datestr
DECIMALdecimal.Decimalstr
FLOATfloat
INTEGERint
INTERVAL YEARstr
INTERVAL YEAR TO MONTHstr
INTERVAL MONTHstr
INTERVAL DAYstr
INTERVAL DAY TO HOURstr
INTERVAL DAY TO MINUTEstr
INTERVAL DAY TO SECONDstr
INTERVAL HOURstr
INTERVAL HOUR TO MINUTEstr
INTERVAL HOUR TO SECONDstr
INTERVAL MINUTEstr
INTERVAL MINUTE TO SECONDstr
INTERVAL SECONDstr
NUMBERdecimal.Decimalstr
PERIOD(DATE)str
PERIOD(TIME)str
PERIOD(TIME WITH TIME ZONE)str
PERIOD(TIMESTAMP)str
PERIOD(TIMESTAMP WITH TIME ZONE)str
SMALLINTint
TIMEdatetime.timestr
TIME WITH TIME ZONEdatetime.time with tzinfostr
TIMESTAMPdatetime.datetimestr
TIMESTAMP WITH TIME ZONEdatetime.datetime with tzinfostr
VARBYTEbytes
VARCHARstr
XMLstr

The table below lists the parameterized SQL bind-value Python data types supported by the driver, and indicates the corresponding database data type transmitted to the server.

Bind-value Python data typeDatabase data type
bytesVARBYTE
datetime.dateDATE
datetime.datetimeTIMESTAMP
datetime.datetime with tzinfoTIMESTAMP WITH TIME ZONE
datetime.timeTIME
datetime.time with tzinfoTIME WITH TIME ZONE
datetime.timedeltaVARCHAR format compatible with INTERVAL DAY TO SECOND
decimal.DecimalNUMBER
floatFLOAT
intBIGINT
strVARCHAR

Transforms are used for SQL ARRAY data values, and they can be transferred to and from the database as VARCHAR values.

Transforms are used for structured UDT data values, and they can be transferred to and from the database as VARCHAR values.

<a id="NullValues"></a>

Null Values

SQL NULL values received from the database are returned in result set rows as Python None values.

A Python None value bound to a question-mark parameter marker is transmitted to the database as a NULL VARCHAR value.

The database does not provide automatic or implicit conversion of a NULL VARCHAR value to a different destination data type.

Given a table with a destination column of BYTE(4), the database would reject the following SQL with database error 3532 "Conversion between BYTE data and other types is illegal."

cur.execute("update mytable set bytecolumn = ?", [None]) # fails with database error 3532

To avoid database error 3532 in this situation, your application must use the the teradata_parameter escape function to specify the data type for the question-mark parameter marker.

cur.execute("{fn teradata_parameter(1, BYTE(4))}update mytable set bytecolumn = ?", [None])

<a id="CharacterExportWidth"></a>

Character Export Width

The driver always uses the UTF8 session character set, and the charset connection parameter is not supported. Be aware of the database's Character Export Width behavior that adds trailing space padding to fixed-width CHAR data type result set column values when using the UTF8 session character set.

The database CHAR(n) data type is a fixed-width data type (holding n characters), and the database reserves a fixed number of bytes for the CHAR(n) data type in response spools and in network message traffic.

UTF8 is a variable-width character encoding scheme that requires a varying number of bytes for each character. When the UTF8 session character set is used, the database reserves the maximum number of bytes that the CHAR(n) data type could occupy in response spools and in network message traffic. When the UTF8 session character set is used, the database appends padding characters to the tail end of CHAR(n) values smaller than the reserved maximum size, so that the CHAR(n) values all occupy the same fixed number of bytes in response spools and in network message traffic.

Work around this drawback by using CAST or TRIM in SQL SELECT statements, or in views, to convert fixed-width CHAR data types to VARCHAR.

Given a table with fixed-width CHAR columns:

CREATE TABLE MyTable (c1 CHAR(10), c2 CHAR(10))

Original query that produces trailing space padding:

SELECT c1, c2 FROM MyTable

Modified query with either CAST or TRIM to avoid trailing space padding:

SELECT CAST(c1 AS VARCHAR(10)), TRIM(TRAILING FROM c2) FROM MyTable

Or wrap query in a view with CAST or TRIM to avoid trailing space padding:

CREATE VIEW MyView (c1, c2) AS SELECT CAST(c1 AS VARCHAR(10)), TRIM(TRAILING FROM c2) FROM MyTable

SELECT c1, c2 FROM MyView

This technique is also demonstrated in sample program CharPadding.py.

<a id="ModuleConstructors"></a>

Module Constructors

teradatasql.connect( JSONConnectionString , Parameters... )

Creates a connection to the database and returns a Connection object.

The first parameter is an optional JSON string that defaults to None. The second and subsequent arguments are optional kwargs. Specify connection parameters as a JSON string, as kwargs, or a combination of the two.

When a combination of parameters are specified, connection parameters specified as kwargs take precedence over same-named connection parameters specified in the JSON string.


teradatasql.Date( Year , Month , Day )

Creates and returns a datetime.date value.


teradatasql.DateFromTicks( Seconds )

Creates and returns a datetime.date value corresponding to the specified number of seconds after 1970-01-01 00:00:00.


teradatasql.Time( Hour , Minute , Second )

Creates and returns a datetime.time value.


teradatasql.TimeFromTicks( Seconds )

Creates and returns a datetime.time value corresponding to the specified number of seconds after 1970-01-01 00:00:00.


teradatasql.Timestamp( Year , Month , Day , Hour , Minute , Second )

Creates and returns a datetime.datetime value.


teradatasql.TimestampFromTicks( Seconds )

Creates and returns a datetime.datetime value corresponding to the specified number of seconds after 1970-01-01 00:00:00.

<a id="ModuleFunctions"></a>

Module Functions

teradatasql.main( SequenceOfStrings )

Provides programmatic access to the command line interface.

<a id="ModuleGlobals"></a>

Module Globals

teradatasql.__version__

The package version number.


teradatasql.apilevel

String constant "2.0" indicating that the driver implements the PEP-249 Python Database API Specification 2.0.


teradatasql.threadsafety

Integer constant 2 indicating that threads may share this module, and threads may share connections, but threads must not share cursors.


teradatasql.paramstyle

String constant "qmark" indicating that prepared SQL requests use question-mark parameter markers.

<a id="ModuleExceptions"></a>

Module Exceptions

teradatasql.Error is the base class for other exceptions.

<a id="ConnectionAttributes"></a>

Connection Attributes

.autocommit

Read/write bool attribute for the connection's auto-commit setting. Defaults to True meaning auto-commit is turned on.

<a id="ConnectionMethods"></a>

Connection Methods

.cancel()

Attempts to cancel the currently executing SQL request, if one is currently executing. Does nothing if called when no SQL request is executing.

This method must be called from a thread other than the thread which is blocked while executing the SQL request.


.close()

Closes the Connection.


.commit()

Commits the current transaction.


.cursor()

Creates and returns a new Cursor object for the Connection.


.rollback()

Rolls back the current transaction.

<a id="CursorAttributes"></a>

Cursor Attributes

.activityname

Read-only str attribute indicating the activity name of the current SQL statement, such as Select, Insert, or Update.

The value unknown indicates the database provided an activity type code that the driver does not recognize.


.activitytype

Read-only int attribute indicating the activity type code of the current SQL statement, such as 1 for Select, 2 for Insert, or 3 for Update.

Activity type codes are documented in the Activity Type section of the Teradata Call-Level Interface Version 2 Reference.


.arraysize

Read/write int attribute specifying the number of rows to fetch at a time with the .fetchmany() method. Defaults to 1 meaning fetch a single row at a time.


.columntypename

Read-only attribute consisting of a sequence of result set column type names, available after a SQL request is executed.


.connection

Read-only attribute indicating the Cursor's parent Connection object.


.description

Read-only attribute consisting of a sequence of seven-item sequences that each describe a result set column, available after a SQL request is executed.


.rowcount

Read-only int attribute indicating the number of rows returned from, or affected by, the current SQL statement.

<a id="CursorMethods"></a>

Cursor Methods

.callproc( ProcedureName , OptionalSequenceOfParameterValues )

Calls the stored procedure specified by ProcedureName. Provide the second argument as a sequence of IN and INOUT parameter values to bind the values to question-mark parameter markers in the SQL request. Specifying parameter values as a mapping is not supported. Returns a result set consisting of the INOUT parameter output values, if any, followed by any dynamic result sets.

OUT parameters are not supported by this method. Use .execute to call a stored procedure with OUT parameters.


.close()

Closes the Cursor.


.execute( SQLRequest , OptionalSequenceOfParameterValues , ignoreErrors= OptionalSequenceOfIgnoredErrorCodes )

Executes the SQL request. If a sequence of parameter values is provided as the second argument, the values will be bound to question-mark parameter markers in the SQL request. Specifying parameter values as a mapping is not supported.

The ignoreErrors parameter is optional. The ignored error codes must be specified as a sequence of integers.


.executemany( SQLRequest , SequenceOfSequencesOfParameterValues , ignoreErrors= OptionalSequenceOfIgnoredErrorCodes )

Executes the SQL request as an iterated SQL request for the batch of parameter values. The batch of parameter values must be specified as a sequence of sequences. Specifying parameter values as a mapping is not supported.

The ignoreErrors parameter is optional. The ignored error codes must be specified as a sequence of integers.


.fetchall()

Fetches all remaining rows of the current result set. Returns a sequence of sequences of column values.


.fetchmany( OptionalRowCount )

Fetches the next series of rows of the current result set. The argument specifies the number of rows to fetch. If no argument is provided, then the Cursor's .arraysize attribute will determine the number of rows to fetch. Returns a sequence of sequences of column values, or an empty sequence to indicate that all rows have been fetched.


.fetchone()

Fetches the next row of the current result set. Returns a sequence of column values, or None to indicate that all rows have been fetched.


.nextset()

Advances to the next result set. Returns True if another result set is available, or None to indicate that all result sets have been fetched.


.setinputsizes( SequenceOfTypesOrSizes )

Has no effect.


.setoutputsize( Size , OptionalColumnIndex )

Has no effect.

<a id="TypeObjects"></a>

Type Objects

teradatasql.BINARY

Identifies a SQL BLOB, BYTE, or VARBYTE column as a binary data type when compared with the Cursor's description attribute.

.description[Column][1] == teradatasql.BINARY


teradatasql.DATETIME

Identifies a SQL DATE, TIME, TIME WITH TIME ZONE, TIMESTAMP, or TIMESTAMP WITH TIME ZONE column as a date/time data type when compared with the Cursor's description attribute.

.description[Column][1] == teradatasql.DATETIME


teradatasql.NUMBER

Identifies a SQL BIGINT, BYTEINT, DECIMAL, FLOAT, INTEGER, NUMBER, or SMALLINT column as a numeric data type when compared with the Cursor's description attribute.

.description[Column][1] == teradatasql.NUMBER


teradatasql.STRING

Identifies a SQL CHAR, CLOB, INTERVAL, PERIOD, or VARCHAR column as a character data type when compared with the Cursor's description attribute.

.description[Column][1] == teradatasql.STRING

<a id="EscapeSyntax"></a>

Escape Syntax

The driver accepts most of the JDBC escape clauses offered by the Teradata JDBC Driver.

Date and Time Literals

Date and time literal escape clauses are replaced by the corresponding SQL literal before the SQL request text is transmitted to the database.

Literal TypeFormat
Date{d 'yyyy-mm-dd'}
Time{t 'hh:mm:ss'}
Timestamp{ts 'yyyy-mm-dd hh:mm:ss'}
Timestamp{ts 'yyyy-mm-dd hh:mm:ss.f'}

For timestamp literal escape clauses, the decimal point and fractional digits may be omitted, or 1 to 6 fractional digits f may be specified after a decimal point.

Scalar Functions

Scalar function escape clauses are replaced by the corresponding SQL expression before the SQL request text is transmitted to the database.

Numeric FunctionReturns
{fn ABS(number)}Absolute value of number
{fn ACOS(float)}Arccosine, in radians, of float
{fn ASIN(float)}Arcsine, in radians, of float
{fn ATAN(float)}Arctangent, in radians, of float
{fn ATAN2(y,x)}Arctangent, in radians, of y / x
{fn CEILING(number)}Smallest integer greater than or equal to number
{fn COS(float)}Cosine of float radians
{fn COT(float)}Cotangent of float radians
{fn DEGREES(number)}Degrees in number radians
{fn EXP(float)}e raised to the power of float
{fn FLOOR(number)}Largest integer less than or equal to number
{fn LOG(float)}Natural (base e) logarithm of float
{fn LOG10(float)}Base 10 logarithm of float
{fn MOD(integer1,integer2)}Remainder for integer1 / integer2
{fn PI()}The constant pi, approximately equal to 3.14159...
{fn POWER(number,integer)}number raised to integer power
{fn RADIANS(number)}Radians in number degrees
{fn RAND(seed)}A random float value such that 0 ≤ value < 1, and seed is ignored
{fn ROUND(number,places)}number rounded to places
{fn SIGN(number)}-1 if number is negative; 0 if number is 0; 1 if number is positive
{fn SIN(float)}Sine of float radians
{fn SQRT(float)}Square root of float
{fn TAN(float)}Tangent of float radians
{fn TRUNCATE(number,places)}number truncated to places
String FunctionReturns
{fn ASCII(string)}ASCII code of the first character in string
{fn CHAR(code)}Character with ASCII code
{fn CHAR_LENGTH(string)}Length in characters of string
{fn CHARACTER_LENGTH(string)}Length in characters of string
{fn CONCAT(string1,string2)}String formed by concatenating string1 and string2
{fn DIFFERENCE(string1,string2)}A number from 0 to 4 that indicates the phonetic similarity of string1 and string2 based on their Soundex codes, such that a larger return value indicates greater phonetic similarity; 0 indicates no similarity, 4 indicates strong similarity
{fn INSERT(string1,position,length,string2)}String formed by replacing the length-character segment of string1 at position with string2, available beginning with Teradata Database 15.0
{fn LCASE(string)}String formed by replacing all uppercase characters in string with their lowercase equivalents
{fn LEFT(string,count)}Leftmost count characters of string
{fn LENGTH(string)}Length in characters of string
{fn LOCATE(string1,string2)}Position in string2 of the first occurrence of string1, or 0 if string2 does not contain string1
{fn LTRIM(string)}String formed by removing leading spaces from string
{fn OCTET_LENGTH(string)}Length in octets (bytes) of string
{fn POSITION(string1INstring2)}Position in string2 of the first occurrence of string1, or 0 if string2 does not contain string1
{fn REPEAT(string,count)}String formed by repeating string count times, available beginning with Teradata Database 15.0
{fn REPLACE(string1,string2,string3)}String formed by replacing all occurrences of string2 in string1 with string3
{fn RIGHT(string,count)}Rightmost count characters of string, available beginning with Teradata Database 15.0
{fn RTRIM(string)}String formed by removing trailing spaces from string
{fn SOUNDEX(string)}Soundex code for string
{fn SPACE(count)}String consisting of count spaces
{fn SUBSTRING(string,position,length)}The length-character segment of string at position
{fn UCASE(string)}String formed by replacing all lowercase characters in string with their uppercase equivalents
System FunctionReturns
{fn DATABASE()}Current default database name
{fn IFNULL(expression,value)}expression if expression is not NULL, or value if expression is NULL
{fn USER()}Logon user name, which may differ from the current authorized user name after SET QUERY_BAND sets a proxy user
Time/Date FunctionReturns
{fn CURDATE()}Current date
{fn CURRENT_DATE()}Current date
{fn CURRENT_TIME()}Current time
{fn CURRENT_TIMESTAMP()}Current date and time
{fn CURTIME()}Current time
{fn DAYOFMONTH(date)}Integer from 1 to 31 indicating the day of month in date
{fn EXTRACT(YEAR FROM value)}The year component of the date and/or time value
{fn EXTRACT(MONTH FROM value)}The month component of the date and/or time value
{fn EXTRACT(DAY FROM value)}The day component of the date and/or time value
{fn EXTRACT(HOUR FROM value)}The hour component of the date and/or time value
{fn EXTRACT(MINUTE FROM value)}The minute component of the date and/or time value
{fn EXTRACT(SECOND FROM value)}The second component of the date and/or time value
{fn HOUR(time)}Integer from 0 to 23 indicating the hour of time
{fn MINUTE(time)}Integer from 0 to 59 indicating the minute of time
{fn MONTH(date)}Integer from 1 to 12 indicating the month of date
{fn NOW()}Current date and time
{fn SECOND(time)}Integer from 0 to 59 indicating the second of time
{fn TIMESTAMPADD(SQL_TSI_YEAR,count,timestamp)}Timestamp formed by adding count years to timestamp
{fn TIMESTAMPADD(SQL_TSI_MONTH,count,timestamp)}Timestamp formed by adding count months to timestamp
{fn TIMESTAMPADD(SQL_TSI_DAY,count,timestamp)}Timestamp formed by adding count days to timestamp
{fn TIMESTAMPADD(SQL_TSI_HOUR,count,timestamp)}Timestamp formed by adding count hours to timestamp
{fn TIMESTAMPADD(SQL_TSI_MINUTE,count,timestamp)}Timestamp formed by adding count minutes to timestamp
{fn TIMESTAMPADD(SQL_TSI_SECOND,count,timestamp)}Timestamp formed by adding count seconds to timestamp
{fn TIMESTAMPDIFF(SQL_TSI_YEAR,timestamp1,timestamp2)}Number of years by which timestamp2 exceeds timestamp1
{fn TIMESTAMPDIFF(SQL_TSI_MONTH,timestamp1,timestamp2)}Number of months by which timestamp2 exceeds timestamp1
{fn TIMESTAMPDIFF(SQL_TSI_DAY,timestamp1,timestamp2)}Number of days by which timestamp2 exceeds timestamp1
{fn TIMESTAMPDIFF(SQL_TSI_HOUR,timestamp1,timestamp2)}Number of hours by which timestamp2 exceeds timestamp1
{fn TIMESTAMPDIFF(SQL_TSI_MINUTE,timestamp1,timestamp2)}Number of minutes by which timestamp2 exceeds timestamp1
{fn TIMESTAMPDIFF(SQL_TSI_SECOND,timestamp1,timestamp2)}Number of seconds by which timestamp2 exceeds timestamp1
{fn YEAR(date)}The year of date

Conversion Functions

Conversion function escape clauses are replaced by the corresponding SQL expression before the SQL request text is transmitted to the database.

Conversion FunctionReturns
{fn CONVERT(value, SQL_BIGINT)}value converted to SQL BIGINT
{fn CONVERT(value, SQL_BINARY(size))}value converted to SQL BYTE(size)
{fn CONVERT(value, SQL_CHAR(size))}value converted to SQL CHAR(size)
{fn CONVERT(value, SQL_DATE)}value converted to SQL DATE
{fn CONVERT(value, SQL_DECIMAL(precision,scale))}value converted to SQL DECIMAL(precision,scale)
{fn CONVERT(value, SQL_DOUBLE)}value converted to SQL DOUBLE PRECISION, a synonym for FLOAT
{fn CONVERT(value, SQL_FLOAT)}value converted to SQL FLOAT
{fn CONVERT(value, SQL_INTEGER)}value converted to SQL INTEGER
{fn CONVERT(value, SQL_LONGVARBINARY)}value converted to SQL VARBYTE(64000)
{fn CONVERT(value, SQL_LONGVARCHAR)}value converted to SQL LONG VARCHAR
{fn CONVERT(value, SQL_NUMERIC)}value converted to SQL NUMBER
{fn CONVERT(value, SQL_SMALLINT)}value converted to SQL SMALLINT
{fn CONVERT(value, SQL_TIME(scale))}value converted to SQL TIME(scale)
{fn CONVERT(value, SQL_TIMESTAMP(scale))}value converted to SQL TIMESTAMP(scale)
{fn CONVERT(value, SQL_TINYINT)}value converted to SQL BYTEINT
{fn CONVERT(value, SQL_VARBINARY(size))}value converted to SQL VARBYTE(size)
{fn CONVERT(value, SQL_VARCHAR(size))}value converted to SQL VARCHAR(size)

LIKE Predicate Escape Character

Within a LIKE predicate's pattern argument, the characters % (percent) and _ (underscore) serve as wildcards. To interpret a particular wildcard character literally in a LIKE predicate's pattern argument, the wildcard character must be preceded by an escape character, and the escape character must be indicated in the LIKE predicate's ESCAPE clause.

LIKE predicate escape character escape clauses are replaced by the corresponding SQL clause before the SQL request text is transmitted to the database.

{escape 'EscapeCharacter'}

The escape clause must be specified immediately after the LIKE predicate that it applies to.

Outer Joins

Outer join escape clauses are replaced by the corresponding SQL clause before the SQL request text is transmitted to the database.

{oj TableName OptionalCorrelationName LEFT OUTER JOIN TableName OptionalCorrelationName ON JoinCondition}

{oj TableName OptionalCorrelationName RIGHT OUTER JOIN TableName OptionalCorrelationName ON JoinCondition}

{oj TableName OptionalCorrelationName FULL OUTER JOIN TableName OptionalCorrelationName ON JoinCondition}

Stored Procedure Calls

Stored procedure call escape clauses are replaced by the corresponding SQL clause before the SQL request text is transmitted to the database.

{call ProcedureName}

{call ProcedureName(CommaSeparatedParameterValues...)}

Native SQL

When a SQL request contains the native SQL escape clause, all escape clauses are replaced in the SQL request text, and the modified SQL request text is returned to the application as a result set containing a single row and a single VARCHAR column. The SQL request text is not transmitted to the database, and the SQL request is not executed. The native SQL escape clause mimics the functionality of the JDBC API Connection.nativeSQL method.

{fn teradata_nativesql}

Connection Functions

The following table lists connection function escape clauses that are intended for use with the native SQL escape clause {fn teradata_nativesql}.

These functions provide information about the connection, or control the behavior of the connection. Functions that provide information return locally-cached information and avoid a round-trip to the database. Connection function escape clauses are replaced by the returned information before the SQL request text is transmitted to the database.

Connection FunctionReturns
{fn teradata_amp_count}Number of AMPs of the database system
{fn teradata_connected}true or false indicating whether this connection has logged on
{fn teradata_database_version}Version number of the database
{fn teradata_driver_version}Version number of the driver
{fn teradata_get_errors}Errors from the most recent batch operation
{fn teradata_get_warnings}Warnings from an operation that completed with warnings
{fn teradata_getloglevel}Current log level
{fn teradata_go_runtime}Go runtime version for the Teradata GoSQL Driver
{fn teradata_logon_sequence_number}Session's Logon Sequence Number, if available
{fn teradata_program_name}Executable program name
{fn teradata_provide(config_response)}Config Response parcel contents in JSON format
{fn teradata_provide(connection_id)}Connection's unique identifier within the process
{fn teradata_provide(default_connection)}false indicating this is not a stored procedure default connection
{fn teradata_provide(dhke)}Number of round trips for non-TLS Diffie-Hellman key exchange (DHKE) or 0 for TLS with database DHKE bypass
{fn teradata_provide(gateway_config)}Gateway Config parcel contents in JSON format
{fn teradata_provide(governed)}true or false indicating the govern connection parameter setting
{fn teradata_provide(host_id)}Session's host ID
{fn teradata_provide(java_charset_name)}UTF8
{fn teradata_provide(lob_support)}true or false indicating this connection's LOB support
{fn teradata_provide(local_address)}Local address of the connection's TCP socket
{fn teradata_provide(local_port)}Local port of the connection's TCP socket
{fn teradata_provide(original_hostname)}Original specified database hostname
{fn teradata_provide(redrive_active)}true or false indicating whether this connection has Redrive active
{fn teradata_provide(remote_address)}Hostname (if available) and IP address of the connected database node
{fn teradata_provide(remote_port)}TCP port number of the database
{fn teradata_provide(rnp_active)}true or false indicating whether this connection has Recoverable Network Protocol active
{fn teradata_provide(session_charset_code)}Session character set code 191
{fn teradata_provide(session_charset_name)}Session character set name UTF8
{fn teradata_provide(sip_support)}true or false indicating this connection's StatementInfo parcel support
{fn teradata_provide(transaction_mode)}Session's transaction mode, ANSI or TERA
{fn teradata_provide(uses_check_workload)}true or false indicating whether this connection uses CHECK WORKLOAD
{fn teradata_session_number}Session number

Request-Scope Functions

The following table lists request-scope function escape clauses that are intended for use with the Cursor .execute or .executemany methods.

These functions control the behavior of the corresponding Cursor, and are limited in scope to the particular SQL request in which they are specified. Request-scope function escape clauses are removed before the SQL request text is transmitted to the database.

Request-Scope FunctionEffect
{fn teradata_agkr(Option)}Executes the SQL request with Auto-Generated Key Retrieval (AGKR) Option C (identity column value) or R (entire row)
{fn teradata_clobtranslate(Option)}Executes the SQL request with CLOB translate Option U (unlocked) or the default L (locked)
{fn teradata_error_query_count(Number)}Specifies how many times the driver will attempt to query FastLoad Error Table 1 after a FastLoad operation. Takes precedence over the error_query_count connection parameter.
{fn teradata_error_query_interval(Milliseconds)}Specifies how many milliseconds the driver will wait between attempts to query FastLoad Error Table 1. Takes precedence over the error_query_interval connection parameter.
{fn teradata_error_table_1_suffix(Suffix)}Specifies the suffix to append to the name of FastLoad error table 1. Takes precedence over the error_table_1_suffix connection parameter.
{fn teradata_error_table_2_suffix(Suffix)}Specifies the suffix to append to the name of FastLoad error table 2. Takes precedence over the error_table_2_suffix connection parameter.
{fn teradata_error_table_database(DbName)}Specifies the parent database name for FastLoad error tables 1 and 2. Takes precedence over the error_table_database connection parameter.
{fn teradata_failfast}Reject ("fail fast") this SQL request rather than delay by a workload management rule or throttle
{fn teradata_fake_result_sets}A fake result set containing statement metadata precedes each real result set. Takes precedence over the fake_result_sets connection parameter.
{fn teradata_fake_result_sets_off}Turns off fake result sets for this SQL request. Takes precedence over the fake_result_sets connection parameter.
{fn teradata_field_quote(String)}Specifies a single-character string used to quote fields in a CSV file. Takes precedence over the field_quote connection parameter.
{fn teradata_field_sep(String)}Specifies a single-character string used to separate fields in a CSV file. Takes precedence over the field_sep connection parameter.
{fn teradata_govern_off}Teradata workload management rules will reject rather than delay a FastLoad or FastExport. Takes precedence over the govern connection parameter.
{fn teradata_govern_on}Teradata workload management rules may delay a FastLoad or FastExport. Takes precedence over the govern connection parameter.
{fn teradata_lobselect(Option)}Executes the SQL request with LOB select Option S (spool-scoped LOB locators), T (transaction-scoped LOB locators), or the default I (inline materialized LOB values)
{fn teradata_manage_error_tables_off}Turns off FastLoad error table management for this request. Takes precedence over the manage_error_tables connection parameter.
{fn teradata_manage_error_tables_on}Turns on FastLoad error table management for this request. Takes precedence over the manage_error_tables connection parameter.
{fn teradata_parameter(Index,DataType)Transmits parameter Index bind values as DataType
{fn teradata_provide(request_scope_column_name_off)}Provides the default column name behavior for this SQL request. Takes precedence over the column_name connection parameter.
{fn teradata_provide(request_scope_lob_support_off)}Turns off LOB support for this SQL request. Takes precedence over the lob_support connection parameter.
{fn teradata_provide(request_scope_refresh_rsmd)}Executes the SQL request with the default request processing option B (both)
{fn teradata_provide(request_scope_sip_support_off)}Turns off StatementInfo parcel support for this SQL request. Takes precedence over the sip_support connection parameter.
{fn teradata_read_csv(CSVFileName)}Executes a batch insert using the bind parameter values read from the specified CSV file for either a SQL batch insert or a FastLoad
{fn teradata_request_timeout(Seconds)}Specifies the timeout for executing the SQL request. Zero means no timeout. Takes precedence over the request_timeout connection parameter.
{fn teradata_require_fastexport}Specifies that FastExport is required for the SQL request
{fn teradata_require_fastload}Specifies that FastLoad is required for the SQL request
{fn teradata_rpo(RequestProcessingOption)}Executes the SQL request with RequestProcessingOption S (prepare), E (execute), or the default B (both)
{fn teradata_sessions(Number)}Specifies the Number of data transfer connections for FastLoad or FastExport. Takes precedence over the sessions connection parameter.
{fn teradata_try_fastexport}Tries to use FastExport for the SQL request
{fn teradata_try_fastload}Tries to use FastLoad for the SQL request
{fn teradata_untrusted}Marks the SQL request as untrusted; not implemented yet
{fn teradata_values_off}Turns off teradata_values for this SQL request. Takes precedence over the teradata_values connection parameter. Refer to the Data Types table for details.
{fn teradata_values_on}Turns on teradata_values for this SQL request. Takes precedence over the teradata_values connection parameter. Refer to the Data Types table for details.
{fn teradata_write_csv(CSVFileName)}Exports one or more result sets from a SQL request or a FastExport to the specified CSV file or files

The teradata_field_sep and teradata_field_quote escape functions have a single-character string argument. The string argument must follow SQL literal syntax. The string argument may be enclosed in single-quote (') characters or double-quote (") characters.

To represent a single-quote character in a string enclosed in single-quote characters, you must repeat the single-quote character.

{fn teradata_field_quote('''')}

To represent a double-quote character in a string enclosed in double-quote characters, you must repeat the double-quote character.

{fn teradata_field_quote("""")}

<a id="FastLoad"></a>

FastLoad

The driver offers FastLoad, which opens multiple database connections to transfer data in parallel.

Please be aware that this is an early release of the FastLoad feature. Think of it as a beta or preview version. It works, but does not yet offer all the features that JDBC FastLoad offers. FastLoad is still under active development, and we will continue to enhance it in subsequent builds.

FastLoad has limitations and cannot be used in all cases as a substitute for SQL batch insert:

Your application can bind a single row of data for FastLoad, but that is not recommended because the overhead of opening additional connections causes FastLoad to be slower than a regular SQL INSERT for a single row.

How to use FastLoad:

FastLoad opens multiple data transfer connections to the database. FastLoad evenly distributes each batch of rows across the available data transfer connections, and uses overlapped I/O to send and receive messages in parallel.

To use FastLoad, your application must prepend one of the following escape functions to the INSERT statement:

Your application can prepend other optional escape functions to the INSERT statement:

After beginning a FastLoad, your application can obtain the Logon Sequence Number (LSN) assigned to the FastLoad by prepending the following escape functions to the INSERT statement:

FastLoad does not stop for data errors such as constraint violations or unique primary index violations. After inserting each batch of rows, your application must obtain warning and error information by prepending the following escape functions to the INSERT statement:

Your application ends FastLoad by committing or rolling back the current transaction. After commit or rollback, your application must obtain warning and error information by prepending the following escape functions to the INSERT statement:

Warning and error information remains available until the next batch is inserted or until the commit or rollback. Each batch execution clears the prior warnings and errors. Each commit or rollback clears the prior warnings and errors.

<a id="FastExport"></a>

FastExport

The driver offers FastExport, which opens multiple database connections to transfer data in parallel.

Please be aware that this is an early release of the FastExport feature. Think of it as a beta or preview version. It works, but does not yet offer all the features that JDBC FastExport offers. FastExport is still under active development, and we will continue to enhance it in subsequent builds.

FastExport has limitations and cannot be used in all cases as a substitute for SQL queries:

FastExport opens multiple data transfer connections to the database. FastExport uses overlapped I/O to send and receive messages in parallel.

To use FastExport, your application must prepend one of the following escape functions to the query:

Your application can prepend other optional escape functions to the query:

After beginning a FastExport, your application can obtain the Logon Sequence Number (LSN) assigned to the FastExport by prepending the following escape functions to the query:

<a id="CSVBatchInserts"></a>

CSV Batch Inserts

The driver can read batch insert bind values from a CSV (comma separated values) file. This feature can be used with SQL batch inserts and with FastLoad.

To specify batch insert bind values in a CSV file, the application prepends the escape function {fn teradata_read_csv(CSVFileName)} to the INSERT statement.

The application can specify batch insert bind values in a CSV file, or specify bind parameter values, but not both together. The driver returns an error if both are specified together.

Considerations when using a CSV file:

Limitations when using CSV batch inserts:

<a id="CSVExportResults"></a>

CSV Export Results

The driver can export query results to CSV files. This feature can be used with SQL query results, with calls to stored procedures, and with FastExport.

To export a result set to a CSV file, the application prepends the escape function {fn teradata_write_csv(CSVFileName)} to the SQL request text.

If the query returns multiple result sets, each result set will be written to a separate file. The file name is varied by inserting the string "_N" between the specified file name and file type extension (e.g. fileName.csv, fileName_1.csv, fileName_2.csv). If no file type extension is specified, then the suffix "_N" is appended to the end of the file name (e.g. fileName, fileName_1, fileName_2).

A stored procedure call that produces multiple dynamic result sets behaves like other SQL requests that return multiple result sets. The stored procedures's output parameter values are exported as the first CSV file.

Example of a SQL request that returns multiple results:

{fn teradata_write_csv(myFile.csv)}select 'abc' ; select 123

CSV File NameContent
myFile.csvFirst result set
myFile_1.csvSecond result set

To obtain the metadata for each result set, use the escape function {fn teradata_fake_result_sets}. A fake result set containing the metadata will be written to a file preceding each real result set.

Example of a query that returns multiple result sets with metadata:

{fn teradata_fake_result_sets}{fn teradata_write_csv(myFile.csv)}select 'abc' ; select 123

CSV File NameContent
myFile.csvFake result set containing the metadata for the first result set
myFile_1.csvFirst result set
myFile_2.csvFake result set containing the metadata for the second result set
myFile_3.csvSecond result set

Exported CSV files have the following characteristics:

Limitations when exporting to CSV files:

<a id="CommandLineInterface"></a>

Command Line Interface

The teradatasql module provides a command line interface via the python -m option.

Running the teradatasql module without additional arguments prints a usage message.

PlatformCommand
macOS or Linuxpython -m teradatasql
Windowspy -3 -m teradatasql

Any number of arguments can follow the teradatasql module name on the command line, and arguments can be repeated on the command line.

The command line interface can print the teradatasql version number.

PlatformCommand
macOS or Linuxpython -m teradatasql version
Windowspy -3 -m teradatasql version

Specify connection parameters to connect to a database.

Connection parameters begin with host= and consist of comma-separated key=value pairs. A repeated comma ,, in a connection parameter value is treated as a single literal comma.

PlatformCommand
macOS or Linuxpython -m teradatasql host=whomooz,user=guest,password=please
Windowspy -3 -m teradatasql host=whomooz,user=guest,password=please

This feature serves as a database connectivity test.

SQL requests can be executed after a database connection is established.

PlatformCommand
macOS or Linuxpython -m teradatasql host=whomooz,user=guest,password=please "select * from DBC.DBCInfo"
Windowspy -3 -m teradatasql host=whomooz,user=guest,password=please "select * from DBC.DBCInfo"

<a id="ChangeLog"></a>

Change Log

20.0.0.20 - October 25, 2024

20.0.0.19 - October 11, 2024

20.0.0.18 - October 7, 2024

20.0.0.17 - October 1, 2024

20.0.0.16 - September 27, 2024

20.0.0.15 - July 31, 2024

20.0.0.14 - July 26, 2024

20.0.0.13 - June 24, 2024

20.0.0.12 - April 30, 2024

20.0.0.11 - April 25, 2024

20.0.0.10 - April 10, 2024

20.0.0.9 - April 2, 2024

20.0.0.8 - March 18, 2024

20.0.0.7 - February 1, 2024

20.0.0.6 - January 19, 2024

20.0.0.5 - January 17, 2024

20.0.0.4 - January 9, 2024

20.0.0.2 - December 8, 2023

20.0.0.1 - November 16, 2023

20.0.0.0 - November 7, 2023

17.20.0.32 - October 23, 2023

17.20.0.31 - September 27, 2023

17.20.0.30 - September 19, 2023

17.20.0.29 - September 5, 2023

17.20.0.28 - July 21, 2023

17.20.0.27 - June 23, 2023

17.20.0.26 - June 15, 2023

17.20.0.25 - June 2, 2023

17.20.0.24 - May 23, 2023

17.20.0.23 - May 19, 2023

17.20.0.22 - May 16, 2023

17.20.0.21 - May 15, 2023

17.20.0.20 - May 5, 2023

17.20.0.19 - March 30, 2023

17.20.0.18 - March 27, 2023

17.20.0.17 - March 24, 2023

17.20.0.16 - February 21, 2023

17.20.0.15 - February 16, 2023

17.20.0.14 - January 19, 2023

17.20.0.13 - January 17, 2023

17.20.0.12 - December 2, 2022

17.20.0.11 - November 1, 2022

17.20.0.10 - October 27, 2022

17.20.0.9 - October 25, 2022

17.20.0.8 - October 19, 2022

17.20.0.7 - September 27, 2022

17.20.0.6 - September 19, 2022

17.20.0.5 - September 15, 2022

17.20.0.4 - September 14, 2022

17.20.0.3 - September 6, 2022

17.20.0.2 - August 23, 2022

17.20.0.1 - August 11, 2022

17.20.0.0 - June 16, 2022

17.10.0.16 - June 6, 2022

17.10.0.15 - June 2, 2022

17.10.0.14 - May 18, 2022

17.10.0.13 - May 16, 2022

17.10.0.12 - April 15, 2022

17.10.0.11 - April 7, 2022

17.10.0.10 - March 24, 2022

17.10.0.9 - March 18, 2022

17.10.0.8 - March 9, 2022

17.10.0.7 - February 23, 2022

17.10.0.6 - February 4, 2022

17.10.0.5 - January 10, 2022

17.10.0.4 - December 13, 2021

17.10.0.3 - November 30, 2021

17.10.0.2 - July 2, 2021

17.10.0.1 - June 9, 2021

17.10.0.0 - June 8, 2021

17.0.0.8 - December 18, 2020

17.0.0.7 - December 18, 2020

17.0.0.6 - October 9, 2020

17.0.0.5 - August 26, 2020

17.0.0.4 - August 18, 2020

17.0.0.3 - July 30, 2020

17.0.0.2 - June 10, 2020

17.0.0.1 - June 4, 2020

16.20.0.62 - May 12, 2020

16.20.0.61 - Apr 30, 2020

16.20.0.60 - Mar 27, 2020

16.20.0.59 - Jan 8, 2020

16.20.0.58 - Dec 11, 2019

16.20.0.57 - Dec 10, 2019

16.20.0.56 - Dec 4, 2019

16.20.0.55 - Nov 26, 2019

16.20.0.54 - Nov 21, 2019

16.20.0.53 - Nov 15, 2019

16.20.0.52 - Oct 18, 2019

16.20.0.51 - Oct 16, 2019

16.20.0.50 - Oct 7, 2019

16.20.0.49 - Oct 3, 2019

16.20.0.48 - Sep 6, 2019

16.20.0.47 - Aug 27, 2019

16.20.0.46 - Aug 16, 2019

16.20.0.45 - Aug 12, 2019

16.20.0.44 - Aug 7, 2019

16.20.0.43 - Jul 29, 2019

16.20.0.42 - Jun 7, 2019

16.20.0.41 - Feb 14, 2019

16.20.0.40 - Feb 8, 2019

16.20.0.39 - Oct 26, 2018

16.20.0.38 - Oct 25, 2018

16.20.0.37 - Oct 22, 2018

16.20.0.36 - Oct 22, 2018

16.20.0.35 - Oct 22, 2018

16.20.0.34 - Oct 15, 2018

16.20.0.33 - Oct 12, 2018

16.20.0.32 - Sep 19, 2018

16.20.0.31 - Sep 19, 2018

16.20.0.30 - Sep 14, 2018

16.20.0.29 - Sep 14, 2018

16.20.0.28 - Sep 13, 2018

16.20.0.27 - Sep 12, 2018

16.20.0.26 - Sep 11, 2018

16.20.0.25 - Sep 10, 2018

16.20.0.24 - Sep 6, 2018

16.20.0.23 - Aug 31, 2018

16.20.0.22 - Aug 30, 2018

16.20.0.21 - Aug 29, 2018

16.20.0.20 - Aug 28, 2018

16.20.0.19 - Aug 22, 2018

16.20.0.18 - Aug 21, 2018

16.20.0.17 - Aug 20, 2018

16.20.0.16 - Aug 17, 2018

16.20.0.15 - Aug 17, 2018

16.20.0.14 - Aug 10, 2018

16.20.0.13 - Aug 9, 2018

16.20.0.12 - Aug 9, 2018

16.20.0.11 - Aug 8, 2018

16.20.0.10 - Aug 8, 2018

16.20.0.9 - Aug 7, 2018

16.20.0.8 - Aug 7, 2018

16.20.0.7 - Jul 30, 2018

16.20.0.6 - Jul 25, 2018

16.20.0.5 - Jul 25, 2018

16.20.0.4 - Jul 23, 2018

16.20.0.3 - Jul 19, 2018

16.20.0.2 - Jul 19, 2018

16.20.0.1 - Jul 18, 2018

16.20.0.0 - Jul 18, 2018