Re: pg_execute_from_file, patch v10 - Mailing list pgsql-hackers

From Itagaki Takahiro
Subject Re: pg_execute_from_file, patch v10
Date
Msg-id AANLkTikqKPvxkY6mhk=PbwHAvxi7vUjh4h7FnwyuoTc0@mail.gmail.com
Whole thread Raw
In response to Re: pg_execute_from_file, patch v10  (Dimitri Fontaine <dimitri@2ndQuadrant.fr>)
List pgsql-hackers
On Wed, Dec 15, 2010 at 04:39, Dimitri Fontaine <dimitri@2ndquadrant.fr> wrote:
> Well, in fact, the extension's code is using either execute_sql_file()
> or read_text_file_with_endoding() then @extschema@ replacement then
> execute_sql_string(), all those functions called directly thanks to
> #include "utils/genfile.h". No DirectFunctionCall'ing, we can easily
> remove SQL callable forms.
>
> So what we need is 2, 3 and 4 (because 4 builds on 2).

No, 3 is not needed. You can use SPI_exec() directly instead of
exporting execute_sql_string().

-- 
Itagaki Takahiro


pgsql-hackers by date:

Previous
From: Jan Urbański
Date:
Subject: Re: hstores in pl/python
Next
From: Koichi Suzuki
Date:
Subject: Re: WIP patch for parallel pg_dump