From: Thomas G. Lockhart Date: Sun, 25 Oct 1998 00:29:01 +0000 (+0000) Subject: Small adjustments in markup getting ready for hardcopy release. X-Git-Tag: REL6_4_2~145 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=20a07132646bc8cf1585a410cfd0bc62535e5598;p=postgresql Small adjustments in markup getting ready for hardcopy release. Jan did a nice job of initial markup so it was pretty easy! --- diff --git a/doc/src/sgml/rules.sgml b/doc/src/sgml/rules.sgml index 29a4c1d682..bbd451777f 100644 --- a/doc/src/sgml/rules.sgml +++ b/doc/src/sgml/rules.sgml @@ -2,19 +2,24 @@ The <ProductName>Postgres</ProductName> Rule System - Production rule systems are conceptually simple, but + Production rule systems are conceptually simple, but there are many subtle points involved in actually using - them. Consequently, we will not attempt to explain the - actual syntax and operation of the Postgres rule system - here. Instead, you should read -[] to understand - some of these points and the theoretical foundations of - the Postgres rule system before trying to use rules. - The discussion in this section is intended to provide - an overview of the Postgres rule system and point the - user at helpful references and examples. - - The "query rewrite" rule system modifies queries to + them. Some of these points and + the theoretical foundations of the Postgres + rule system can be found in +[]. + + + + Some other database systems define active database rules. These + are usually stored procedures and triggers and are implemented + in Postgres as functions and triggers. + + + + The query rewrite rule system (the "rule system" from now on) + is totally different from stored procedures and triggers. + It modifies queries to take rules into consideration, and then passes the modified query to the query optimizer for execution. It is very powerful, and can be used for many things such @@ -23,297 +28,2094 @@ [] as well as []. + + +What is a Querytree? + + + To understand how the rule system works it is necessary to know + when it is invoked and what it's input and results are. + + + + The rule system is located between the query parser and the optimizer. + It takes the output of the parser, one querytree, and the rewrite + rules from the pg_rewrite catalog, which are + querytrees too with some extra information, and creates zero or many + querytrees as result. So it's input and output are always things + the parser itself could have produced and thus, anything it sees + is basically representable as an SQL statement. + + Now what is a querytree? It is an internal representation of an + SQL statement where the single parts that built + it are stored separately. These querytrees are visible when starting + the Postgres backend with debuglevel 4 + and typing queries into the interactive backend interface. The rule + actions in the pg_rewrite system catalog are + also stored as querytrees. They are not formatted like the debug + output, but they contain exactly the same information. + + + + Reading a querytree requires some experience and it was a hard + time when I started to work on the rule system. I can remember + that I was standing at the coffee machine and I saw the cup + in a targetlist, water and coffee powder in a rangetable and all + the buttons in a qualification expression. Since + SQL representations of querytrees are + sufficient to understand the rule system, this document will + not teach how to read them. It might help to learn + it and the naming conventions are required in the later following + descriptions. + + + +The Parts of a Querytree + + + When reading the SQL representations of the + querytrees in this document it is necessary to be able to identify + the parts the statement is broken into when it is in the querytree + structure. The parts of a querytree are + + + + + + + the commandtype + + + + This is a simple value telling which command + (SELECT, INSERT, UPDATE, DELETE) produced the parsetree. + + + + + + + the rangetable + + + + The rangtable is a list of relations that are used in the query. + In a SELECT statement that are the relations given after + the FROM keyword. + + + + Every rangetable entry identifies a table or view and tells + by which name it is called in the other parts of the query. + In the querytree the rangetable entries are referenced by + index rather than by name, so here it doesn't matter if there + are duplicate names as it would in an SQL + statement. This can happen after the rangetables of rules + have been merged in. The examples in this document will not have + this situation. + + + + + + + the resultrelation + + + + This is an index into the rangetable that identifies the + relation where the results of the query go. + + + + SELECT queries + normally don't have a result relation. The special case + of a SELECT INTO is mostly identical to a CREATE TABLE, + INSERT ... SELECT sequence and is not discussed separately + here. + + + + On INSERT, UPDATE and DELETE queries the resultrelation + is the table (or view!) where the changes take effect. + + + + + + + the targetlist + + + + The targetlist is a list of expressions that define the result + of the query. In the case of a SELECT, the expressions are what + builds the final output of the query. They are the expressions + between the SELECT and the FROM keywords (* is just an + abbreviation for all the attribute names of a relation). + + + + DELETE queries don't need a targetlist because they don't + produce any result. In fact the optimizer will add a special + entry to the empty targetlist. But this is after the rule + system and will be discussed later. For the rule system the + targetlist is empty. + + + + In INSERT queries the targetlist describes the new rows that + should go into the resultrelation. Missing columns of the + resultrelation will be added by the optimizer with a constant + NULL expression. It are the expressions in the VALUES clause + or the ones from the SELECT clause on INSERT ... SELECT. + + + + On UPDATE queries, it describes the new rows that should + replace the old ones. Here now the optimizer will add missing + columns by inserting expressions that put the values from the + old rows into the new one. And it will add the special entry + like for DELETE too. It are the expressions from the + SET attribute = expression part of the query. + + + + Every entry in the targetlist contains an expression that can + be a constant value, a variable pointing to an attribute of one + of the relations in the rangetable, a parameter or an expression + tree made of function calls, constants, variables, operators etc. + + + + + + + the qualification + + + + The queries qualification is an expression much like one of those + contained in the targetlist entries. The result value of this + expression is a boolean that tells if the operation + (INSERT, UPDATE, DELETE or SELECT) for the final result row should be + executed or not. It is the WHERE clause of an + SQL statement. + + + + + + + the others + + + + The other parts of the querytree like the ORDER BY + clause arent of interest here. The rule system + substitutes entries there while applying rules, but that + doesn't have much to do with the fundamentals of the rule + system. GROUP BY is a special thing when it appears in + a view definition and still needs to be documented. + + + + + + + + -The Goodness of Rules +Views and the Rule System + + +Implementation of Views in <ProductName>Postgres</ProductName> + + + Views in Postgres are implemented + using the rule system. In fact there is absolutely no difference + between a + + + CREATE VIEW myview AS SELECT * FROM mytab; + + + compared against the two commands + + + CREATE TABLE myview (same attribute list as for mytab); + CREATE RULE "_RETmyview" AS ON SELECT TO myview DO INSTEAD + SELECT * FROM mytab; + + + because this is exactly what the CREATE VIEW command does internally. + This has some side effects. One of them is that + the information about a view in the Postgres + system catalogs is exactly the same as it is for a table. So for the + query parsers, there is absolutely no difference between + a table and a view. They are the same thing - relations. That is the + important one for now. + + + + +How SELECT Rules Work - -Editor's Note -This information resulted from an exchange of e-mail on 1998-02-20/22 between -Jan Wieck, -Andreas Zeugswetter, -and -Vadim B. Mikheev -on the subject. + Rules ON SELECT are applied to all queries as the + last step, even if the command + given is an INSERT, UPDATE or DELETE. And they have different + semantics from the others in that they modify the parsetree in + place instead of creating a new one. + So SELECT rules are described first. - + Currently, there could be only one action and it must be a + SELECT action that is INSTEAD. This restriction was required + to make rules safe enough to open them for ordinary users and + it restricts rules ON SELECT to real view rules. + + + + The example for this document are two join views that do some calculations + and some more views using them in turn. + One of the two first views is customized later by adding rules for + INSERT, UPDATE and DELETE operations so that the final result will + be a view that behaves like a real table with some magic functionality. + It is not such a simple example to start from and this makes things + harder to get into. But it's better to have one example that covers + all the points discussed step by step rather than having many + different ones that might mix up in mind. + + + + The database needed to play on the examples is named al_bundy. + You'll see soon why this is the database name. And it needs the + procedural language PL/pgSQL installed, because + we need a little min() function returning the lower of 2 + integer values. We create that as + -From: Zeugswetter Andreas SARZ -To: Jan Wieck + CREATE FUNCTION min(integer, integer) RETURNS integer AS + 'BEGIN + IF $1 < $2 THEN + RETURN $1; + END IF; + RETURN $2; + END;' + LANGUAGE 'plpgsql'; + -Since we have so little documentation on the rules, I think we should save -every -little word describing them, so could you simply put the following into a -rules.readme -(undigested is still better than not adding it) + The real tables we need in the first two rule system descripitons + are these: - -Rewrite Rules versus Triggers + + CREATE TABLE shoe_data ( + shoename char(10), -- primary key + sh_avail integer, -- available # of pairs + slcolor char(10), -- preferred shoelace color + slminlen float, -- miminum shoelace length + slmaxlen float, -- maximum shoelace length + slunit char(8) -- length unit + ); + + CREATE TABLE shoelace_data ( + sl_name char(10), -- primary key + sl_avail integer, -- available # of pairs + sl_color char(10), -- shoelace color + sl_len float, -- shoelace length + sl_unit char(8) -- length unit + ); + + CREATE TABLE unit ( + un_name char(8), -- the primary key + un_fact float -- factor to transform to cm + ); + + + I think most of us wear shoes and can realize that this is + really useful data. Well there are shoes out in the world + that don't require shoelaces, but this doesn't make Al's + life easier and so we ignore it. + -> > Why I like the rewrite system is: -The benefits of the rewrite rules system include: + The views are created as - - - -Select Rewrite Possible - - - -A select trigger would be no good, due to optimizer concerns. - - -Exactly that's what is done if you create a view. Postgres -creates a regular table (look at pg_class and into the -database directory) and then sets up a relation level instead -rewrite rule on select. - - - - - -Dumb Client Possible - - - -The client can be really dumb, like MS Access or some other -standard ODBC tool -which does not know anything about funcs procs and the like -(even without using passthrough). - - -The client must not know why and how and where the -data is left and coming from. But that's true in any case - a -trigger for each row on insert can do anything different and -push the data wherever it wants. - - - - - -Rewrite rules are more powerful than views - - - -Views are only one special rule case in Postgres. - - - - - -Optimizer Used - - - -It allows the optimizer to get involved (this is where triggers -fail per definition). - - - - - -Simple to use - - - -Once understood it is very easy to use; -easier than triggers with C stored procedures at least. - - - - + + CREATE VIEW shoe AS + SELECT sh.shoename, + sh.sh_avail, + sh.slcolor, + sh.slminlen, + sh.slminlen * un.un_fact AS slminlen_cm, + sh.slmaxlen, + sh.slmaxlen * un.un_fact AS slmaxlen_cm, + sh.slunit + FROM shoe_data sh, unit un + WHERE sh.slunit = un.un_name; + + CREATE VIEW shoelace AS + SELECT s.sl_name, + s.sl_avail, + s.sl_color, + s.sl_len, + s.sl_unit, + s.sl_len * u.un_fact AS sl_len_cm + FROM shoelace_data s, unit u + WHERE s.sl_unit = u.un_name; + + CREATE VIEW shoe_ready AS + SELECT rsh.shoename, + rsh.sh_avail, + rsl.sl_name, + rsl.sl_avail, + min(rsh.sh_avail, rsl.sl_avail) AS total_avail + FROM shoe rsh, shoelace rsl + WHERE rsl.sl_color = rsh.slcolor + AND rsl.sl_len_cm >= rsh.slminlen_cm + AND rsl.sl_len_cm <= rsh.slmaxlen_cm; + + + The CREATE VIEW command for the shoelace + view (which is the simplest one we have) + will create a relation shoelace and an entry + in pg_rewrite + that tells that there is a rewrite rule that must be applied + whenever the relation shoelace is referenced in a queries rangetable. + The rule has no rule qualification (discussed in the + non SELECT rules since SELECT rules currently cannot have them) and + it is INSTEAD. Note that rule qualifications are not the same as + query qualifications! The rules action has a qualification. + + + + The rules action is one querytree that is an exact copy of the + SELECT statement in the view creation command. + + + Note + + The two extra range + table entries for NEW and OLD (named *NEW* and *CURRENT* for + historical reasons in the printed querytree) you can see in + the pg_rewrite entry aren't of interest + for SELECT rules. + + + + Now we populate unit, shoe_data + and shoelace_data and Al types the first + SELECT in his life: + + + al_bundy=> INSERT INTO unit VALUES ('cm', 1.0); + al_bundy=> INSERT INTO unit VALUES ('m', 100.0); + al_bundy=> INSERT INTO unit VALUES ('inch', 2.54); + al_bundy=> + al_bundy=> INSERT INTO shoe_data VALUES + al_bundy-> ('sh1', 2, 'black', 70.0, 90.0, 'cm'); + al_bundy=> INSERT INTO shoe_data VALUES + al_bundy-> ('sh2', 0, 'black', 30.0, 40.0, 'inch'); + al_bundy=> INSERT INTO shoe_data VALUES + al_bundy-> ('sh3', 4, 'brown', 50.0, 65.0, 'cm'); + al_bundy=> INSERT INTO shoe_data VALUES + al_bundy-> ('sh4', 3, 'brown', 40.0, 50.0, 'inch'); + al_bundy=> + al_bundy=> INSERT INTO shoelace_data VALUES + al_bundy-> ('sl1', 5, 'black', 80.0, 'cm'); + al_bundy=> INSERT INTO shoelace_data VALUES + al_bundy-> ('sl2', 6, 'black', 100.0, 'cm'); + al_bundy=> INSERT INTO shoelace_data VALUES + al_bundy-> ('sl3', 0, 'black', 35.0 , 'inch'); + al_bundy=> INSERT INTO shoelace_data VALUES + al_bundy-> ('sl4', 8, 'black', 40.0 , 'inch'); + al_bundy=> INSERT INTO shoelace_data VALUES + al_bundy-> ('sl5', 4, 'brown', 1.0 , 'm'); + al_bundy=> INSERT INTO shoelace_data VALUES + al_bundy-> ('sl6', 0, 'brown', 0.9 , 'm'); + al_bundy=> INSERT INTO shoelace_data VALUES + al_bundy-> ('sl7', 7, 'brown', 60 , 'cm'); + al_bundy=> INSERT INTO shoelace_data VALUES + al_bundy-> ('sl8', 1, 'brown', 40 , 'inch'); + al_bundy=> + al_bundy=> SELECT * FROM shoelace; + sl_name |sl_avail|sl_color |sl_len|sl_unit |sl_len_cm + ----------+--------+----------+------+--------+--------- + sl1 | 5|black | 80|cm | 80 + sl2 | 6|black | 100|cm | 100 + sl7 | 7|brown | 60|cm | 60 + sl3 | 0|black | 35|inch | 88.9 + sl4 | 8|black | 40|inch | 101.6 + sl8 | 1|brown | 40|inch | 101.6 + sl5 | 4|brown | 1|m | 100 + sl6 | 0|brown | 0.9|m | 90 + (8 rows) + + + It's the simplest SELECT Al can do on our views, so we take this + to explain the basics of view rules. + The 'SELECT * FROM shoelace' was interpreted by the parser and + produced the parsetree + + + SELECT shoelace.sl_name, shoelace.sl_avail, + shoelace.sl_color, shoelace.sl_len, + shoelace.sl_unit, shoelace.sl_len_cm + FROM shoelace shoelace; + + + and this is given to the rule system. The rule system walks through the + rangetable and checks if there are rules in pg_rewrite + for any relation. When processing the rangetable entry for + shoelace (the only one up to now) it finds the + rule '_RETshoelace' with the parsetree + + + SELECT s.sl_name, s.sl_avail, + s.sl_color, s.sl_len, s.sl_unit, + float8mul(s.sl_len, u.un_fact) AS sl_len_cm + FROM shoelace *OLD*, shoelace *NEW*, + shoelace_data s, unit u + WHERE bpchareq(s.sl_unit, u.un_name); + + + Note that the parser changed the calculation and qualification into + calls to the appropriate functions. But + in fact this changes nothing. + The first step in rewriting is merging the two rangetables. The resulting + parsetree then reads + + + SELECT shoelace.sl_name, shoelace.sl_avail, + shoelace.sl_color, shoelace.sl_len, + shoelace.sl_unit, shoelace.sl_len_cm + FROM shoelace shoelace, shoelace *OLD*, + shoelace *NEW*, shoelace_data s, + unit u; + + + In step 2 it adds the qualification from the rule action to the + parsetree resulting in + + + SELECT shoelace.sl_name, shoelace.sl_avail, + shoelace.sl_color, shoelace.sl_len, + shoelace.sl_unit, shoelace.sl_len_cm + FROM shoelace shoelace, shoelace *OLD*, + shoelace *NEW*, shoelace_data s, + unit u + WHERE bpchareq(s.sl_unit, u.un_name); + + + And in step 3 it replaces all the variables in the parsetree, that + reference the rangetable entry (the one for + shoelace that is currently processed) + by the corresponding targetlist expressions + from the rule action. This results in the final query + + + SELECT s.sl_name, s.sl_avail, + s.sl_color, s.sl_len, + s.sl_unit, float8mul(s.sl_len, u.un_fact) AS sl_len_cm + FROM shoelace shoelace, shoelace *OLD*, + shoelace *NEW*, shoelace_data s, + unit u + WHERE bpchareq(s.sl_unit, u.un_name); + + + Turning this back into a real SQL statement a human + user would type reads + + + SELECT s.sl_name, s.sl_avail, + s.sl_color, s.sl_len, + s.sl_unit, s.sl_len * u.un_fact AS sl_len_cm + FROM shoelace_data s, unit u + WHERE s.sl_unit = u.un_name; + + + That was the first rule applied. While this was done, the rangetable has + grown. So the rule system continues checking the range table entries. + The next one is number 2 (shoelace *OLD*). + Relation shoelace + has a rule, but this rangetable entry isn't referenced + in any of the variables of the parsetree, so it is ignored. Since all the + remaining rangetable entries either have no rules in + pg_rewrite or aren't referenced, + it reaches the end of the rangetable. + Rewriting is complete and the above is the final result given into + the optimizer. + The optimizer ignores the extra rangetable entries that aren't + referenced by variables in the parsetree and the plan produced + by the planner/optimizer would be exactly the same as if Al had typed + the above SELECT query instead of the view selection. + + + + Now we face Al with the problem that the Blues Brothers appear + in his shop and + want to buy some new shoes, and as the Blues Brothers are, + they want to wear the same shoes. And they want to wear them + immediately, so they need shoelaces too. + + + + Al needs to know for which shoes currently in the store + he has the matching shoelaces (color and size) and where the + total number of exactly matching pairs is greater or equal to two. + We theach him how to do and he asks his database: + + + al_bundy=> SELECT * FROM shoe_ready WHERE total_avail >= 2; + shoename |sh_avail|sl_name |sl_avail|total_avail + ----------+--------+----------+--------+----------- + sh1 | 2|sl1 | 5| 2 + sh3 | 4|sl7 | 7| 4 + (2 rows) + + + Al is a shoe guru and so he knows that only shoes of type sh1 + would fit (shoelace sl7 is brown and shoes that need brown shoelaces + aren't shoes the Blues Brothers would ever wear). + + + + The output of the parser this time is the parsetree + + + SELECT shoe_ready.shoename, shoe_ready.sh_avail, + shoe_ready.sl_name, shoe_ready.sl_avail, + shoe_ready.total_avail + FROM shoe_ready shoe_ready + WHERE int4ge(shoe_ready.total_avail, 2); + + + The first rule applied will be that one for the + shoe_ready relation and it results in the + parsetree + + + SELECT rsh.shoename, rsh.sh_avail, + rsl.sl_name, rsl.sl_avail, + min(rsh.sh_avail, rsl.sl_avail) AS total_avail + FROM shoe_ready shoe_ready, shoe_ready *OLD*, + shoe_ready *NEW*, shoe rsh, + shoelace rsl + WHERE int4ge(min(rsh.sh_avail, rsl.sl_avail), 2) + AND (bpchareq(rsl.sl_color, rsh.slcolor) + AND float8ge(rsl.sl_len_cm, rsh.slminlen_cm) + AND float8le(rsl.sl_len_cm, rsh.slmaxlen_cm) + ); + + + In reality the AND clauses in the qualification will be + operator nodes of type AND with a left and right expression. But + that makes it lesser readable as it already is, and there are more + rules to apply. So I only put them into some parantheses to group + them into logical units in the order they where added and we continue + with the rule for relation + shoe as it is the next rangetable entry + that is referenced and has a rule. The result of applying it is + + + SELECT sh.shoename, sh.sh_avail, + rsl.sl_name, rsl.sl_avail, + min(sh.sh_avail, rsl.sl_avail) AS total_avail, + FROM shoe_ready shoe_ready, shoe_ready *OLD*, + shoe_ready *NEW*, shoe rsh, + shoelace rsl, shoe *OLD*, + shoe *NEW*, shoe_data sh, + unit un + WHERE (int4ge(min(sh.sh_avail, rsl.sl_avail), 2) + AND (bpchareq(rsl.sl_color, sh.slcolor) + AND float8ge(rsl.sl_len_cm, + float8mul(sh.slminlen, un.un_fact)) + AND float8le(rsl.sl_len_cm, + float8mul(sh.slmaxlen, un.un_fact)) + ) + ) + AND bpchareq(sh.slunit, un.un_name); + + + And finally we apply the already well known rule for + shoelace (this time on a parsetree that is + a little more complex) and get + + + SELECT sh.shoename, sh.sh_avail, + s.sl_name, s.sl_avail, + min(sh.sh_avail, s.sl_avail) AS total_avail + FROM shoe_ready shoe_ready, shoe_ready *OLD*, + shoe_ready *NEW*, shoe rsh, + shoelace rsl, shoe *OLD*, + shoe *NEW*, shoe_data sh, + unit un, shoelace *OLD*, + shoelace *NEW*, shoelace_data s, + unit u + WHERE ( (int4ge(min(sh.sh_avail, s.sl_avail), 2) + AND (bpchareq(s.sl_color, sh.slcolor) + AND float8ge(float8mul(s.sl_len, u.un_fact), + float8mul(sh.slminlen, un.un_fact)) + AND float8le(float8mul(s.sl_len, u.un_fact), + float8mul(sh.slmaxlen, un.un_fact)) + ) + ) + AND bpchareq(sh.slunit, un.un_name) + ) + AND bpchareq(s.sl_unit, u.un_name); + + + Again we reduce it to a real SQL statement + that is equivalent to the final output of the rule system: + + + SELECT sh.shoename, sh.sh_avail, + s.sl_name, s.sl_avail, + min(sh.sh_avail, s.sl_avail) AS total_avail + FROM shoe_data sh, shoelace_data s, unit u, unit un + WHERE min(sh.sh_avail, s.sl_avail) >= 2 + AND s.sl_color = sh.slcolor + AND s.sl_len * u.un_fact >= sh.slminlen * un.un_fact + AND s.sl_len * u.un_fact <= sh.slmaxlen * un.un_fact + AND sh.sl_unit = un.un_name + AND s.sl_unit = u.un_name; + + + Recursive processing of rules rewrote one SELECT from a view + into a parsetree, that is equivalent to exactly that what Al + had to type if there would be no views at all. + + + Note + + There is currently no recursion stopping mechanism for view + rules in the rule system (only for the other rules). + This doesn't hurt much, because the only way to push this + into an endless loop (blowing up the + backend until it reaches the memory limit) + is to create tables and then setup the + view rules by hand with CREATE RULE in such a way, that + one selects from the other that selects from the one. + This could never happen if CREATE VIEW is used because + on the first CREATE VIEW, the second relation does not exist + and thus the first view cannot select from the second. + + + + + + + +View Rules in Non-SELECT Statements -Optimizing again and again. If the rules aren't instead, the -querytree get's additional queries for every rule appended. -Have a table field that references an entry in another table -and this entry should have a refcount. So on update you must -decrease the refcount from the old ref and increase it on the -new. You create two rules so the UPDATE will result in 1 -scan and 2 nestloops with scans inside - really optimized if -the referenced value doesn't change. And don't think that a -rule qual of NEW != CURRENT might help - that will result in -2 mergejoins where the scanned tuples are compared. + Two details of the parsetree aren't touched in the description of + view rules above. These are the commandtype and the resultrelation. + In fact, view rules don't need these informations. + - -I fought that like a windmill, I guess it would be better to kill the -CURRENT keyword -with this meaning alltogether, since it only has the same meaning as the -tablename itself. -I have already crossed it out of my mind and don't miss anything. + There are only a few differences between a parsetree for a SELECT + and one for any other command. Obviously they have another commandtype + and this time the resultrelation points to the rangetable entry where + the result should go. Anything else is absolutely the same. + So having two tables t1 and t2 with attributes + a and b, the parsetrees for the two statements + + + SELECT t2.b FROM t1, t2 WHERE t1.a = t2.a; + + UPDATE t1 SET b = t2.b WHERE t1.a = t2.a; + + + are nearly identical. + + + + + The rangetables contain entries for the tables t1 and t2. + + + + + + The targetlists contain one variable that points to attribute + b of the rangetable entry for table t2. + + + + + + The qualification expressions compare the attributes a of both + ranges for equality. + + + + + The consequence is, that both parsetrees result in similar execution + plans. They are both joins over the two tables. For the UPDATE + the missing columns from t1 are added to the targetlist by the optimizer + and the final parsetree will read as + + + UPDATE t1 SET a = t1.a, b = t2.b WHERE t1.a = t2.a; + + + and thus the executor run over the join will produce exactly the + same result set as a + + + SELECT t1.a, t2.b FROM t1, t2 WHERE t1.a = t2.a; + + + will do. But there is a little problem in UPDATE. The executor does + not care what the results from the join it is doing are meant + for. It just produces a result set of rows. The difference that one + is a SELECT command and the other is an UPDATE is handled in the + caller of the executor. The caller still knows (looking at the + parsetree) that this is an UPDATE, and he knows that this result + should go into table t1. But which of the 666 rows that are there + has to be replaced by the new row? The plan executed is a join + with a qualification that potentially could produce any number of + rows between 0 and 666 in unknown order. - -I think there should instead be an OLD and NEW keyword -like in triggers: + + To resolve this problem, another entry is added to the targetlist + in UPDATE and DELETE statements. The current tuple ID (ctid). This + is a system attribute with a special feature. It contains the + block and position in the block for the row. Knowing the table, + the ctid can be used to find one specific row in a 1.5GB sized table + containing millions of rows by fetching one single data block. + After adding the ctid to the targetlist, the final result set + could be defined as + -referencing old as oldname new as newname + SELECT t1.a, t2.b, t1.ctid FROM t1, t2 WHERE t1.a = t2.a; -that only reference the tuples in memory. + + Now another detail of Postgres enters the + stage. At this moment, table rows aren't overwritten and this is why + ABORT TRANSACTION is fast. In an UPDATE, the new result row is inserted + into the table (after stripping ctid) and in the tuple header of the row + that ctid pointed to the cmax and xmax entries are set to the current + command counter and current transaction ID. Thus the old row is hidden + and after the transaction commited the vacuum cleaner can really move + it out. + -BTW, this sample doesn't work currently because the rules -queries are appended at the end of the querytree, thus the -decrement scan having the same qual will not find the old -tuple at all because it's already outdated -(command_counter_increment between processing the queries). -Referencing CURRENT in a rule is not what most people think -it is. + Knowing that all, we can simply apply view rules in absolutely + the same way to any command. There is no difference. + + + + +The Power of Views in <ProductName>Postgres</ProductName> + + + The above demonstrates how the rule system incorporates + view definitions into the original parsetree. In the second example + a simple SELECT from one view created a final parsetree that is + a join of 4 tables (unit is used twice with different names). + + + +Benefits -The old 4.2 postgres had a second, instance level rule system -(prs2 stubs) that fired the rules actions when actually the -old tuple and the new projected tuple where handy. There you -could have made also things like 'UPDATE NEW SET a = 4' that -really modified the in memory tuple in the executors -expression context. Who the hell removed all that? It was so -nice :-( + The benefit of implementing views with the rule system is, + that the optimizer has all + the information about which tables have to be scanned plus the + relationships between these tables plus the restrictive + qualifications from the views plus the qualifications from + the original query + in one single parsetree. And this is still the situation + when the original query is already a join over views. + Now the optimizer has to decide which is + the best path to execute the query. The more information + the optimizer has, the better this decision can be. And + the rule system as implemented in Postgres + ensures, that this is all information available about the query + up to now. + + + + +Concerns - -Editor's Note -This feature was removed by Jolly et. al. prior to v1.0.x. + There was a long time where the Postgres + rule system was considered broken. The use of rules was not + recommended and the only part working where view rules. And also + these view rules made problems because the rule system wasn't able + to apply them properly on other statements than a SELECT (for + example an UPDATE + that used data from a view didn't work). - -Absolutely ! I did cry up when that was done, but nobody responded :-( -Well to be honest Vadim did respond with the trigger code, which made me -feel comfortable again. + During that time, development moved on and many features where + added to the parser and optimizer. The rule system got more and more + out of sync with their capabilities and it became harder and harder + to start fixing it. Thus, noone did. + -A really simple to write trigger can compare old != new and -only if send down the other two queries. This time they wont -be nestloops, they are simple scans. And the trigger can -arrange that the queries it uses are only parsed on it's -first of all calls and store the generated execution plans -permanently for quick execution (look at SPI_prepare). + For 6.4, someone locked the door, took a deep breath and shuffled + that damned thing up. What came out was a rule system with the + capabilities described in this document. But there are still some + constructs not handled and some where it fails due to + things that are currently not + supported by the Postgres query + optimizer. + + + + + Views with aggregate columns have bad problems. Aggregate + expressions in qualifications must be used in subselects. + Currently it is not possible to do a join of two views, + each having an aggregate column, and compare the two aggregate values + in the qualification. In the meantime it is possible to + put these aggregate expressions into functions with + the appropriate arguments and use + them in the view definition. + + + + + + Views of unions are currently not supported. Well it's easy + to rewrite a simple SELECT into a union. But it is a little + difficult if the view is part of a join doing an update. + + + + + + ORDER BY clauses in view definitions aren't supported. + + + + + + DISTINCT isn't supported in view definitions. + + + + + There is no good reason why the optimizer should not + handle parsetree constructs that the parser could never produce + due to limitations in the SQL syntax. + The author hopes that these items disappear in the future. + + + + + +Implementation Side Effects -For the stored C procedures you're totally right. I don't -like the C functions because it requires postgres superuser -rights to develop them and thus I created PL/Tcl where joe -user can hack around without having complete access to the -whole database (look at src/pl/tcl). And someday after 6.3 -release I'll really start on a plain PL/pgSQL implementation -that would give a normal user the opportunity to create -functions and triggers on a high level. There is light at the -end of the tunnel - hope that it isn't the coming train :-) + Using the described rule system to implement views has a funny + side effect. The following does not seem to work: + + + al_bundy=> INSERT INTO shoe (shoename, sh_avail, slcolor) + al_bundy-> VALUES ('sh5', 0, 'black'); + INSERT 20128 1 + al_bundy=> SELECT shoename, sh_avail, slcolor FROM shoe_data; + shoename |sh_avail|slcolor + ----------+--------+---------- + sh1 | 2|black + sh3 | 4|brown + sh2 | 0|black + sh4 | 3|brown + (4 rows) + + + The interesting thing is that the return code for INSERT gave + us an object ID and told that 1 row has been inserted. + But it doesn't appear in shoe_data. + Looking into the database + directory we can see, that the database file for the + view relation shoe seems now to have + a data block. And that is definitely the case. + -I guess if triggers could also trigger simple select statements, I could -do -most of what I want using triggers except of course the select stuff. -But as I said I like the rules system very much, especially after your -recent -fixes Jan :-) So please stick to supporting all 3: triggers, views and -rules. Wow :-) + We can also issue a DELETE and if it does not have + a qualification, it tells us that rows have been deleted + and the next vacuum run will reset the file to zero size. + -Well - a trigger cannot build a view. The relation underlying -the view doesn't contain any tuples and a select trigger will -never be fired. As long as there is no possibility to return -tuple sets from non-SQL functions. But a trigger can do -things like the pg_hide_passwd stuff much more powerful. You -could define the trigger so that it checks if the user is a -superuser and overwrite the passwd value only in the case -where he/she isn't. If fired at the right place it would too -work for things like the copy command etc. + The reason for that behaviour is, that the parsetree for the + INSERT does not reference the shoe relation + in any variable. The targetlist contains only constant values. + So there is no rule to apply and it goes + down unchanged into execution and the row is inserted. And + so for the DELETE. + -We must stay with all 3 features. And I will take a look at -the INSERT ... SELECT view problem really soon as it is a -rule system problem that breaks views. But this is only the -SELECT rewriting part of the rule system which I really like -(optimizable). The other areas (insert, update, delete) of -the rule system are dangerous and I really think a powerful -PL/pgSQL language could make them obsolete. + To change this we can define rules that modify the behaviour + of non-SELECT queries. This is the topic of the next section. + + + + -Summary from Andreas +Rules on INSERT, UPDATE and DELETE + + +Differences to View Rules -Ok, to sum it up: + Rules that are defined ON INSERT, UPDATE and DELETE are + totally different from the view rules described + in the previous section. First, their CREATE RULE + command allows more: + + + + + They can have no action. + + + + + + They can have multiple actions. + + + + + + The keyword INSTEAD is optional. + + + + + + The pseudo relations NEW and OLD become useful. + + + + + + They can have rule qualifications. + + + + + Second, they don't modify the parsetree in place. Instead they + create zero or many new parsetrees and can throw away the + original one. + + + +How These Rules Work - - -We need and want the select part of the rewrite rules. + Keep the syntax + + + CREATE RULE rule_name AS ON event + TO object [WHERE rule_qualification] + DO [INSTEAD] [action | (actions) | NOTHING]; + + + in mind. + In the following, "update rules" means rules that are defined + ON INSERT, UPDATE or DELETE. - - -For the insert/update/delete rules the old instance rules system - was much more appropriate. TODO: dig up the old code - and merge it with the current trigger Implementation; - it must be pretty much the wanted functionality (it -supported SQL). + Update rules get applied by the rule system when the result + relation and the commandtype of a parsetree are equal to the + object and event given in the CREATE RULE command. + For update rules, the rule system creates a list of parsetrees. + Initially the parsetree list is empty. + There can be zero (NOTHING keyword), one or multiple actions. + To simplify, we look at a rule with one action. This rule + can have a qualification or not and it can be INSTEAD or not. + - -Vadim's Note -Old instance rules system was removed by Jolly & Andrew and so -it never supported SQL. I hope that Jan will give us PL/pgSQL soon -and it will be used for triggers, without changing current trigger -implementation... + What is a rule qualification? It is a restriction that tells + when the actions of the rule should be done and when not. This + qualification can only reference the NEW and/or OLD pseudo relations + which are basically the relation given as object (but with a + special meaning). - + + So we have four cases that produce the following parsetrees for + a one-action rule. - + + + + + No qualification and not INSTEAD: + + + + The parsetree from the rule action where the + original parsetrees qualification has been added. + + + + + + + + + No qualification but INSTEAD: + + + + The parsetree from the rule action where the + original parsetrees qualification has been added. + + + + + + + + + Qualification given and not INSTEAD: + + + + The parsetree from the rule action where the rule + qualification and the original parsetrees + qualification have been added. + + + + + + + + + Qualification given and INSTEAD: + + + + The parsetree from the rule action where the rule + qualification and the original parsetrees + qualification have been added. + + + + + + The original parsetree where the negated rule + qualification has been added. + + + + + + - -The CURRENT keyword in the i/u/d rewrite rules is stupid -and should be disabled - destroyed and burned in hell. + Finally, if the rule is not INSTEAD, the unchanged original parsetree is + added to the list. Since only qualified INSTEAD rules already add the + original parsetree, we end up with a total maximum of two parsetrees + for a rule with one action. + - -Vadim's Note -Agreed, if standard hasn't it. I know that OLD & NEW are in standard, -for triggers atleast. + The parsetrees generated from rule actions are thrown into the + rewrite system again and maybe more rules get applied resulting + in more or less parsetrees. + So the parsetrees in the rule actions must have either another commandtype + or another resultrelation. Otherwise this recursive process will end up in a loop. + There is a compiled in recursion limit of currently 10 iterations. + If after 10 iterations there are still update rules to apply the + rule system assumes a loop over multiple rule definitions and aborts the + transaction. - + + The parsetrees found in the actions of the pg_rewrite + system catalog are only templates. Since they can reference the + rangetable entries for NEW and OLD, some substitutions have to be made + before they can be used. For any reference to NEW, the targetlist of + the original query is searched for a corresponding entry. If found, + that entries expression is placed into the reference. Otherwise + NEW means the same as OLD. Any reference to OLD is replaced by a + reference to the rangetable entry which is the resultrelation. - - + +A First Rule Step by Step + -To stick to the mainstream we should enhance the trigger -syntax, - and forget the rule stuff for i/u/d - + We want to trace changes to the sl_avail column in the + shoelace_data relation. So we setup a + log table and a rule that writes us entries every time + and UPDATE is performed on shoelace_data. + - create trigger passwd_utr - .......... - referencing old as o new as n - for each row (statement, statement, statement, procedure, - ...... all PL/pgSQL syntax allowed ); + CREATE TABLE shoelace_log ( + sl_name char(10), -- shoelace changed + sl_avail integer, -- new available value + log_who name, -- who did it + log_when datetime -- when + ); + + CREATE RULE log_shoelace AS ON UPDATE TO shoelace_data + WHERE NEW.sl_avail != OLD.sl_avail + DO INSERT INTO shoelace_log VALUES ( + NEW.sl_name, + NEW.sl_avail, + getpgusername(), + 'now'::text + ); -with a syntax to modify the new tuple in memory. - -Vadim's Note + One interesting detail is the casting of 'now' in the rules + INSERT action to type text. Without that, the parser would see + at CREATE RULE time, that the target type in shoelace_log + is a datetime and tries to make a constant from it - with success. + So a constant datetime value would be stored in the rule action + and all log entries would have the time of the CREATE RULE statement. + Not exactly what we want. The casting causes that the parser + constructs a datetime('now'::text) from it and this will be + evaluated when the rule is executed. + + -Yes. Statement level triggers give the same functionality as rewrite -i/u/d rules. We could let them to return something special to skip -user' i/u/d itself, isn't it the same as INSTEAD ? + Now Al does + + + al_bundy=> UPDATE shoelace_data SET sl_avail = 6 + al_bundy-> WHERE sl_name = 'sl7'; + + + and we look at the logtable. + + + al_bundy=> SELECT * FROM shoelace_log; + sl_name |sl_avail|log_who|log_when + ----------+--------+-------+-------------------------------- + sl7 | 6|Al |Tue Oct 20 16:14:45 1998 MET DST + (1 row) + + + That's what we expected. What happened in the background is the following. + The parser created the parsetree (this time the parts of the original + parsetree are highlighted because the base of operations is the + rule action for update rules). + + + UPDATE shoelace_data SET sl_avail = 6 + FROM shoelace_data shoelace_data + WHERE bpchareq(shoelace_data.sl_name, 'sl7'); + + + There is a rule 'log_shoelace' that is ON UPDATE with the rule + qualification expression + + + int4ne(NEW.sl_avail, OLD.sl_avail) + + + and one action + + + INSERT INTO shoelace_log SELECT + *NEW*.sl_name, *NEW*.sl_avail, + getpgusername(), datetime('now'::text) + FROM shoelace_data *NEW*, shoelace_data *OLD*, + shoelace_log shoelace_log; + + + Don't trust the output of the pg_rules system view. It specially + handles the situation that there are only references to NEW + and OLD in the INSERT and outputs the VALUES format of INSERT. + In fact there is no difference between an INSERT ... VALUES + and an INSERT ... SELECT on parsetree level. They both have + rangetables, targetlists and maybe qualifications etc. The + optimizer later decides, if to create an execution plan of + type result, seqscan, indexscan, join or whatever for that + parsetree. If there are no references to + rangetable entries leftin the parsetree , it becomes + a result execution plan + (the INSERT ... VALUES version). The rule action above can + truely result in both variants. - + + The rule is a qualified non-INSTEAD rule, so the rule system + has to return two parsetrees. The modified rule action and the original + parsetree. In the first step the rangetable of the original query is + incorporated into the rules action parsetree. This results in + + + INSERT INTO shoelace_log SELECT + *NEW*.sl_name, *NEW*.sl_avai, + getpgusername(), datetime('now'::text) + FROM shoelace_data shoelace_data, shoelace_data *NEW*, + shoelace_data *OLD*, shoelace_log shoelace_log; + + + In step 2 the rule qualification is added to it, so the result set + is restricted to rows where sl_avail changes. + + + INSERT INTO shoelace_log SELECT + *NEW*.sl_name, *NEW*.sl_avai, + getpgusername(), datetime('now'::text) + FROM shoelace_data shoelace_data, shoelace_data *NEW*, + shoelace_data *OLD*, shoelace_log shoelace_log + WHERE int4ne(*NEW*.sl_avail, *OLD*.sl_avail); + + + In step 3 the original parsetrees qualification is added, + restricting the resultset further to only the rows touched + by the original parsetree. + + + INSERT INTO shoelace_log SELECT + *NEW*.sl_name, *NEW*.sl_avai, + getpgusername(), datetime('now'::text) + FROM shoelace_data shoelace_data, shoelace_data *NEW*, + shoelace_data *OLD*, shoelace_log shoelace_log + WHERE int4ne(*NEW*.sl_avail, *OLD*.sl_avail) + AND bpchareq(shoelace_data.sl_name, 'sl7'); + + + Step 4 substitutes NEW references by the targetlist entries from the + original parsetree or with the matching variable references + from the result relation. + + + INSERT INTO shoelace_log SELECT + shoelace_data.sl_name, 6, + getpgusername(), datetime('now'::text) + FROM shoelace_data shoelace_data, shoelace_data *NEW*, + shoelace_data *OLD*, shoelace_log shoelace_log + WHERE int4ne(6, *OLD*.sl_avail) + AND bpchareq(shoelace_data.sl_name, 'sl7'); + + + Step 5 replaces OLD references into resultrelation references. + + + INSERT INTO shoelace_log SELECT + shoelace_data.sl_name, 6, + getpgusername(), datetime('now'::text) + FROM shoelace_data shoelace_data, shoelace_data *NEW*, + shoelace_data *OLD*, shoelace_log shoelace_log + WHERE int4ne(6, shoelace_data.sl_avail) + AND bpchareq(shoelace_data.sl_name, 'sl7'); + + + That's it. So reduced to the max the return from the rule system + is a list of two parsetrees that are the same as the statements: + + + INSERT INTO shoelace_log SELECT + shoelace_data.sl_name, 6, + getpgusername(), 'now' + FROM shoelace_data + WHERE 6 != shoelace_data.sl_avail + AND shoelace_data.sl_name = 'sl7'; + + UPDATE shoelace_data SET sl_avail = 6 + WHERE sl_name = 'sl7'; + + + These are executed in this order and that is exactly what + the rule defines. The subtitutions and the qualifications + added ensure, that if the original query would be an + + + UPDATE shoelace_data SET sl_color = 'green' + WHERE sl_name = 'sl7'; + + + No log entry would get written because due to the fact that this + time the original parsetree does not contain a targetlist + entry for sl_avail, NEW.sl_avail will get replaced by + shoelace_data.sl_avail resulting in the extra query + + + INSERT INTO shoelace_log SELECT + shoelace_data.sl_name, shoelace_data.sl_avail, + getpgusername(), 'now' + FROM shoelace_data + WHERE shoelace_data.sl_avail != shoelace_data.sl_avail + AND shoelace_data.sl_name = 'sl7'; + + + and that qualification will never be true. Since the is no + difference on parsetree level between an INSERT ... SELECT, + and an INSERT ... VALUES, it will also + work if the original query modifies multiple rows. So if Al + would issue the command + + + UPDATE shoelace_data SET sl_avail = 0 + WHERE sl_color = 'black'; + + + four rows in fact get updated (sl1, sl2, sl3 and sl4). + But sl3 already has sl_avail = 0. This time, the original + parsetrees qualification is different and that results + in the extra parsetree + + + INSERT INTO shoelace_log SELECT + shoelace_data.sl_name, 0, + getpgusername(), 'now' + FROM shoelace_data + WHERE 0 != shoelace_data.sl_avail + AND shoelace_data.sl_color = 'black'; + + + This parsetree will surely insert three new log entries. And + that's absolutely correct. + + + + It is important, that the original parsetree is executed last. + The Postgres "traffic cop" does + a command counter increment between the execution of the two + parsetrees so the second one can see changes made by the first. + If the UPDATE would have been executed first, all the rows + are already set to zero, so the logging INSERT + would not find any row where 0 != shoelace_data.sl_avail. + + + + + + +Cooperation with Views + + + A simple way to protect view relations from the mentioned + possibility that someone can INSERT, UPDATE and DELETE + invisible data on them is to let those parsetrees get + thrown away. We create the rules + + + CREATE RULE shoe_ins_protect AS ON INSERT TO shoe + DO INSTEAD NOTHING; + CREATE RULE shoe_upd_protect AS ON UPDATE TO shoe + DO INSTEAD NOTHING; + CREATE RULE shoe_del_protect AS ON DELETE TO shoe + DO INSTEAD NOTHING; + + + If Al now tries to do any of these operations on the view + relation shoe, the rule system will + apply the rules. Since the rules have + no actions and are INSTEAD, the resulting list of + parsetrees will be empty and the whole query will become + nothing because there is nothing left to be optimized or + executed after the rule system is done with it. + + + Note + + This fact might irritate frontend applications because + absolutely nothing happened on the database and thus, the + backend will not return anything for the query. Not + even a PGRES_EMPTY_QUERY or so will be available in libpq. + In psql, nothing happens. This might change in the future. + + + + + + + A more sophisticated way to use the rule system is to + create rules that rewrite the parsetree into one that + does the right operation on the real tables. To do that + on the shoelace view, we create + the following rules: + + + CREATE RULE shoelace_ins AS ON INSERT TO shoelace + DO INSTEAD + INSERT INTO shoelace_data VALUES ( + NEW.sl_name, + NEW.sl_avail, + NEW.sl_color, + NEW.sl_len, + NEW.sl_unit); + + CREATE RULE shoelace_upd AS ON UPDATE TO shoelace + DO INSTEAD + UPDATE shoelace_data SET + sl_name = NEW.sl_name, + sl_avail = NEW.sl_avail, + sl_color = NEW.sl_color, + sl_len = NEW.sl_len, + sl_unit = NEW.sl_unit + WHERE sl_name = OLD.sl_name; + + CREATE RULE shoelace_del AS ON DELETE TO shoelace + DO INSTEAD + DELETE FROM shoelace_data + WHERE sl_name = OLD.sl_name; + + + Now there is a pack of shoelaces arriving in Al's shop and it has + a big partlist. Al is not that good in calculating and so + we don't want him to manually update the shoelace view. + Instead we setup two little tables, one where he can + insert the items from the partlist and one with a special + trick. The create commands for anything are: + + + CREATE TABLE shoelace_arrive ( + arr_name char(10), + arr_quant integer + ); + + CREATE TABLE shoelace_ok ( + ok_name char(10), + ok_quant integer + ); + + CREATE RULE shoelace_ok_ins AS ON INSERT TO shoelace_ok + DO INSTEAD + UPDATE shoelace SET + sl_avail = sl_avail + NEW.ok_quant + WHERE sl_name = NEW.ok_name; + + + Now Al can sit down and do whatever until + + + al_bundy=> SELECT * FROM shoelace_arrive; + arr_name |arr_quant + ----------+--------- + sl3 | 10 + sl6 | 20 + sl8 | 20 + (3 rows) + + + is exactly that what's on the part list. We take a quick look + at the current data, + + + al_bundy=> SELECT * FROM shoelace ORDER BY sl_name; + sl_name |sl_avail|sl_color |sl_len|sl_unit |sl_len_cm + ----------+--------+----------+------+--------+--------- + sl1 | 5|black | 80|cm | 80 + sl2 | 6|black | 100|cm | 100 + sl7 | 6|brown | 60|cm | 60 + sl3 | 0|black | 35|inch | 88.9 + sl4 | 8|black | 40|inch | 101.6 + sl8 | 1|brown | 40|inch | 101.6 + sl5 | 4|brown | 1|m | 100 + sl6 | 0|brown | 0.9|m | 90 + (8 rows) + + + move the arrived shoelaces in + + + al_bundy=> INSERT INTO shoelace_ok SELECT * FROM shoelace_arrive; + + + and check the results + + + al_bundy=> SELECT * FROM shoelace ORDER BY sl_name; + sl_name |sl_avail|sl_color |sl_len|sl_unit |sl_len_cm + ----------+--------+----------+------+--------+--------- + sl1 | 5|black | 80|cm | 80 + sl2 | 6|black | 100|cm | 100 + sl7 | 6|brown | 60|cm | 60 + sl4 | 8|black | 40|inch | 101.6 + sl3 | 10|black | 35|inch | 88.9 + sl8 | 21|brown | 40|inch | 101.6 + sl5 | 4|brown | 1|m | 100 + sl6 | 20|brown | 0.9|m | 90 + (8 rows) + + al_bundy=> SELECT * FROM shoelace_log; + sl_name |sl_avail|log_who|log_when + ----------+--------+-------+-------------------------------- + sl7 | 6|Al |Tue Oct 20 19:14:45 1998 MET DST + sl3 | 10|Al |Tue Oct 20 19:25:16 1998 MET DST + sl6 | 20|Al |Tue Oct 20 19:25:16 1998 MET DST + sl8 | 21|Al |Tue Oct 20 19:25:16 1998 MET DST + (4 rows) + + + It's a long way from the one INSERT ... SELECT to these + results. And it's description will be the last in this + document (but not the last example :-). First there was the parsers output + + + INSERT INTO shoelace_ok SELECT + shoelace_arrive.arr_name, shoelace_arrive.arr_quant + FROM shoelace_arrive shoelace_arrive, shoelace_ok shoelace_ok; + + + Now the first rule 'shoelace_ok_ins' is applied and turns it + into + + + UPDATE shoelace SET + sl_avail = int4pl(shoelace.sl_avail, shoelace_arrive.arr_quant) + FROM shoelace_arrive shoelace_arrive, shoelace_ok shoelace_ok, + shoelace_ok *OLD*, shoelace_ok *NEW*, + shoelace shoelace + WHERE bpchareq(shoelace.sl_name, showlace_arrive.arr_name); + + + and throws away the original INSERT on shoelace_ok. + This rewritten query is passed to the rule system again and + the second applied rule 'shoelace_upd' produced + + + UPDATE shoelace_data SET + sl_name = shoelace.sl_name, + sl_avail = int4pl(shoelace.sl_avail, shoelace_arrive.arr_quant), + sl_color = shoelace.sl_color, + sl_len = shoelace.sl_len, + sl_unit = shoelace.sl_unit + FROM shoelace_arrive shoelace_arrive, shoelace_ok shoelace_ok, + shoelace_ok *OLD*, shoelace_ok *NEW*, + shoelace shoelace, shoelace *OLD*, + shoelace *NEW*, shoelace_data showlace_data + WHERE bpchareq(shoelace.sl_name, showlace_arrive.arr_name) + AND bpchareq(shoelace_data.sl_name, shoelace.sl_name); + + + Again it's an INSTEAD rule and the previous parsetree is trashed. + Note that this query sill uses the view shoelace + But the rule system isn't finished with this loop so it continues + and applies the rule '_RETshoelace' on it and we get + + + UPDATE shoelace_data SET + sl_name = s.sl_name, + sl_avail = int4pl(s.sl_avail, shoelace_arrive.arr_quant), + sl_color = s.sl_color, + sl_len = s.sl_len, + sl_unit = s.sl_unit + FROM shoelace_arrive shoelace_arrive, shoelace_ok shoelace_ok, + shoelace_ok *OLD*, shoelace_ok *NEW*, + shoelace shoelace, shoelace *OLD*, + shoelace *NEW*, shoelace_data showlace_data, + shoelace *OLD*, shoelace *NEW*, + shoelace_data s, unit u + WHERE bpchareq(s.sl_name, showlace_arrive.arr_name) + AND bpchareq(shoelace_data.sl_name, s.sl_name); + + + Again an update rule has been applied and so the wheel + turns on and we are in rewrite round 3. This time rule + 'log_shoelace' gets applied what produces the extra + parsetree + + + INSERT INTO shoelace_log SELECT + s.sl_name, + int4pl(s.sl_avail, shoelace_arrive.arr_quant), + getpgusername(), + datetime('now'::text) + FROM shoelace_arrive shoelace_arrive, shoelace_ok shoelace_ok, + shoelace_ok *OLD*, shoelace_ok *NEW*, + shoelace shoelace, shoelace *OLD*, + shoelace *NEW*, shoelace_data showlace_data, + shoelace *OLD*, shoelace *NEW*, + shoelace_data s, unit u, + shoelace_data *OLD*, shoelace_data *NEW* + shoelace_log shoelace_log + WHERE bpchareq(s.sl_name, showlace_arrive.arr_name) + AND bpchareq(shoelace_data.sl_name, s.sl_name); + AND int4ne(int4pl(s.sl_avail, shoelace_arrive.arr_quant), + s.sl_avail); + + + After that the rule system runs out of rules and returns the + generated parsetrees. + So we end up with two final parsetrees that are equal to the + SQL statements + + + INSERT INTO shoelace_log SELECT + s.sl_name, + s.sl_avail + shoelace_arrive.arr_quant, + getpgusername(), + 'now' + FROM shoelace_arrive shoelace_arrive, shoelace_data shoelace_data, + shoelace_data s + WHERE s.sl_name = shoelace_arrive.arr_name + AND shoelace_data.sl_name = s.sl_name + AND s.sl_avail + shoelace_arrive.arr_quant != s.sl_avail; + + UPDATE shoelace_data SET + sl_avail = shoelace_data.sl_avail + shoelace_arrive.arr_quant + FROM shoelace_arrive shoelace_arrive, shoelace_data shoelace_data, + shoelace_data s + WHERE s.sl_name = shoelace_arrive.sl_name + AND shoelace_data.sl_name = s.sl_name; + + + The result is that data coming from one relation inserted into another, + changed into updates on a third, changed into updating + a fourth plus logging that final update in a fifth + gets reduced into two queries. + + + + There is a little detail that's a bit ugly. Looking at + the two queries turns out, that the shoelace_data + relation appears twice in the rangetable where it could definitely + be reduced to one. The optimizer does not handle it and so the + execution plan for the rule systems output of the INSERT will be + + +Nested Loop + -> Merge Join + -> Seq Scan + -> Sort + -> Seq Scan on s + -> Seq Scan + -> Sort + -> Seq Scan on shoelace_arrive + -> Seq Scan on shoelace_data + + + while omitting the extra rangetable entry would result in a + + +Merge Join + -> Seq Scan + -> Sort + -> Seq Scan on s + -> Seq Scan + -> Sort + -> Seq Scan on shoelace_arrive + + + that totally produces the same entries in the log relation. + Thus, the rule system caused one extra scan on the + shoelace_data relation that is + absolutely not necessary. And the same obsolete scan + is done once more in the UPDATE. But it was a really hard + job to make that all possible at all. + + + + A final demonstration of the Postgres + rule system and it's power. There is a cute blonde that + sells shoelaces. And what Al could never realize, she's not + only cute, she's smart too - a little too smart. Thus, it + happens from time to time that Al orders shoelaces that + are absolutely not sellable. This time he ordered 1000 pairs + of magenta shoelaces and since another kind is currently not + available but he committed to buy some, he also prepared + his database for pink ones. + + + al_bundy=> INSERT INTO shoelace VALUES + al_bundy-> ('sl9', 0, 'pink', 35.0, 'inch', 0.0); + al_bundy=> INSERT INTO shoelace VALUES + al_bundy-> ('sl10', 1000, 'magenta', 40.0, 'inch', 0.0); + + + Since this happens often, we must lookup for shoelace entries, + that fit for absolutely no shoe sometimes. We could do that in + a complicated statement every time, or we can setup a view + for it. The view for this is + + + CREATE VIEW shoelace_obsolete AS + SELECT * FROM shoelace WHERE NOT EXISTS + (SELECT shoename FROM shoe WHERE slcolor = sl_color); + + + It's output is + + + al_bundy=> SELECT * FROM shoelace_obsolete; + sl_name |sl_avail|sl_color |sl_len|sl_unit |sl_len_cm + ----------+--------+----------+------+--------+--------- + sl9 | 0|pink | 35|inch | 88.9 + sl10 | 1000|magenta | 40|inch | 101.6 + + + For the 1000 magenta shoelaces we must debt Al before we can + throw 'em away, but that's another problem. The pink entry we delete. + To make it a little harder for Postgres, + we don't delete it directly. Instead we create one more view + + + CREATE VIEW shoelace_candelete AS + SELECT * FROM shoelace_obsolete WHERE sl_avail = 0; + + + and do it this way: + + + DELETE FROM shoelace WHERE EXISTS + (SELECT * FROM shoelace_candelete + WHERE sl_name = shoelace.sl_name); + + + Voila: + + + al_bundy=> SELECT * FROM shoelace; + sl_name |sl_avail|sl_color |sl_len|sl_unit |sl_len_cm + ----------+--------+----------+------+--------+--------- + sl1 | 5|black | 80|cm | 80 + sl2 | 6|black | 100|cm | 100 + sl7 | 6|brown | 60|cm | 60 + sl4 | 8|black | 40|inch | 101.6 + sl3 | 10|black | 35|inch | 88.9 + sl8 | 21|brown | 40|inch | 101.6 + sl10 | 1000|magenta | 40|inch | 101.6 + sl5 | 4|brown | 1|m | 100 + sl6 | 20|brown | 0.9|m | 90 + (9 rows) + + + A DELETE on a view, with a subselect qualification that + in total uses 4 nesting/joined views, where one of them + itself has a subselect qualification containing a view + and where calculated view columns are used, + gets rewritten into + one single parsetree that deletes the requested data + from a real table. + + + + I think there are only a few situations out in the real + world, where such a construct is necessary. But + it makes me feel comfortable that it works. + + + The truth is + + Doing this I found one more bug while writing this document. + But after fixing that I was a little amazed that it works at all. + + + + + + + + +Rules and Permissions + + + Due to rewriting of queries by the Postgres + rule system, other tables/views than those used in the original + query get accessed. Using update rules, this can include write access + to tables. + + + + Rewrite rules don't have a separate owner. The owner of + a relation (table or view) is automatically the owner of the + rewrite rules that are defined for it. + The Postgres rule system changes the + behaviour of the default access control system. Relations that + are used due to rules get checked during the rewrite against the + permissions of the relation owner, the rule is defined on. + This means, that a user does only need the required permissions + for the tables/views he names in his queries. + + + + For example: A user has a list of phone numbers where some of + them are private, the others are of interest for the secretary of the office. + He can construct the following: + + + CREATE TABLE phone_data (person text, phone text, private bool); + CREATE VIEW phone_number AS + SELECT person, phone FROM phone_data WHERE NOT private; + GRANT SELECT ON phone_number TO secretary; + + + Nobody except him (and the database superusers) can access the + phone_data table. But due to the GRANT, the secretary can SELECT from the + phone_number view. The rule system will rewrite + the SELECT from phone_number into a SELECT from phone_data and add the qualification + that only entries where private is false are wanted. Since the + user is the owner of phone_number, the read access to phone_data + is now checked against his permissions and the query is considered + granted. The check for accessing phone_number is still performed, + so nobody than the secretary can use it. + + + + The permissions are checked rule by rule. So the secretary is for now the + only one who can see the public phone numbers. But the secretary can setup + another view and grant access to that to public. Then, anyone + can see the phone_number data through the secretaries view. + What the secretary cannot do is to create a view that directly + accesses phone_data (actually he can, but it will not work since + every access aborts the transaction during the permission checks). + And as soon as the user will notice, that the secretary opened + his phone_number view, he can REVOKE his access. Immediately any + access to the secretaries view will fail. + + + + Someone might think that this rule by rule checking is a security + hole, but in fact it isn't. If this would not work, the secretary + could setup a table with the same columns as phone_number and + copy the data to there once per day. Then it's his own data and + he can grant access to everyone he wants. A GRANT means "I trust you". + If someone you trust does the thing above, it's time to + think it over and then REVOKE. + + + + This mechanism does also work for update rules. In the examples + of the previous section, the owner of the tables in Al's database + could GRANT SELECT, INSERT, UPDATE and DELETE on the shoelace view to al. + But only SELECT on shoelace_log. The rule action to write log entries + will still be executed successfull. And Al could see the log entries. + But he cannot create fake entries, nor could he manipulate or remove + existing ones. + + + Warning + + GRANT ALL currently includes RULE permission. This means the granted + user could drop the rule, do the changes and reinstall it. I think + this should get changed quickly. + + + + + + +Rules versus Triggers + + + Many things that can be done using triggers can also be + implemented using the Postgres + rule system. What currently cannot be implemented by + rules are some kinds of constraints. It is possible, + to place a qualified rule that rewrites a query to NOTHING + if the value of a column does not appear in another table. + But then the data is silently thrown away and that's + not a good idea. If checks for valid values are required, + and in the case of an invalid value an error message should + be generated, it must be done by a trigger for now. + + + + On the other hand a trigger that is fired on INSERT + on a view can do the same as a rule, put the data somewhere + else and suppress the insert in the view. But it cannot + do the same thing on UPDATE or DELETE, because there is + no real data in the view relation that could be scanned + and thus the trigger would never get called. Only a rule + will help. + + + + For the things that can be implemented by both, + it depends on the usage of the database, which is the best. + A trigger is fired for any row affected once. A rule manipulates + the parsetree or generates an additional one. So if many + rows are affected in one statement, a rule issuing one extra + query would usually do a better job than a trigger that is + called for any single row and must execute his operations + this many times. + + + + For example: There are two tables + + + CREATE TABLE computer ( + hostname text -- indexed + manufacturer text -- indexed + ); + + CREATE TABLE software ( + software text, -- indexed + hostname text -- indexed + ); + + + Both tables have many + thousands of rows and the index on hostname is unique. + The hostname column contains the full qualified domain + name of the computer. The rule/trigger should constraint + delete rows from software that reference the deleted host. + Since the trigger is called for each individual row + deleted from computer, it can use the statement + + + DELETE FROM software WHERE hostname = $1; + + + in a prepared and saved plan and pass the hostname in + the parameter. The rule would be written as + + + CREATE RULE computer_del AS ON DELETE TO computer + DO DELETE FROM software WHERE hostname = OLD.hostname; + + + Now we look at different types of deletes. In the case of a + + + DELETE FROM computer WHERE hostname = 'mypc.local.net'; + + + the table computer is scanned by index (fast) and the + query issued by the trigger would also be an index scan (fast too). + The extra query from the rule would be a + + + DELETE FROM software WHERE computer.hostname = 'mypc.local.net' + AND software.hostname = computer.hostname; + + + Since there are appropriate indices setup, the optimizer + will create a plan of + + + Nestloop + -> Index Scan using comp_hostidx on computer + -> Index Scan using soft_hostidx on software + + + So there would be not that much difference in speed between + the trigger and the rule implementation. With the next delete + we want to get rid of all the 2000 computers where the hostname starts + with 'old'. There are two possible queries to do that. One is + + + DELETE FROM computer WHERE hostname >= 'old' + AND hostname < 'ole' + + + Where the plan for the rule query will be a + + + Hash Join + -> Seq Scan on software + -> Hash + -> Index Scan using comp_hostidx on computer + + + The other possible query is a + + + DELETE FROM computer WHERE hostname ~ '^old'; + + + with the execution plan + + + Nestloop + -> Index Scan using comp_hostidx on computer + -> Index Scan using soft_hostidx on software + + + This shows, that the optimizer does not realize that the + qualification for the hostname on computer could also be + used for an index scan on software when there are + multiple qualification expressions combined with AND, what + he does in the regexp version of the query. The trigger will + get invoked once for any of the 2000 old computers that + have to be deleted and that will result in one index scan + over computer and 2000 index scans for the software. The + rule implementation will do it with two queries over indices. + And it depends on the overall size of the software table if + the rule will still be faster in the seqscan situation. 2000 + query executions over the SPI manager take some time, even + if all the index blocks to look them up will soon appear in + the cache. + + + + The last query we look at is a + + + DELETE FROM computer WHERE manufacurer = 'bim'; + + + Again this could result in many rows to be deleted from + computer. So the trigger will again fire many queries into + the executor. But the rule plan will again be the Nestloop over + two IndexScan's. Only using another index on computer: + + + Nestloop + -> Index Scan using comp_manufidx on computer + -> Index Scan using soft_hostidx on software + + + resulting from the rules query + + + DELETE FROM software WHERE computer.manufacurer = 'bim' + AND software.hostname = computer.hostname; + + + In any of these cases, the extra queries from the rule system will be + more or less independent from the number of affected rows + in a query. + + + + Another situation are cases on UPDATE where it depends on the + change of an attribute if an action should be performed or + not. In Postgres version 6.4, the + attribute specification for rule events is disabled (it will have + it's comeback latest in 6.5, maybe earlier + - stay tuned). So for now the only way to + create a rule as in the shoelace_log example is to do it with + a rule qualification. That results in an extra query that is + performed allways, even if the attribute of interest cannot + change at all because it does not appear in the targetlist + of the initial query. When this is enabled again, it will be + one more advantage of rules over triggers. Optimization of + a trigger must fail by definition in this case, because the + fact that it's actions will only be done when a specific attribute + is updated is hidden in it's functionality. The definition of + a trigger only allows to specify it on row level, so whenever a + row is touched, the trigger must be called to make it's + decision. The rule system will know it by looking up the + targetlist and will suppress the additional query completely + if the attribute isn't touched. So the rule, qualified or not, + will only do it's scan's if there ever could be something to do. + + + + Rules will only be significant slower than triggers if + their actions result in large and bad qualified joins, a situation + where the optimizer fails. They are a big hammer. + Using a big hammer without caution can cause big damage. But + used with the right touch, they can hit any nail on the head. - - + diff --git a/doc/src/sgml/xplang.sgml b/doc/src/sgml/xplang.sgml index 8a0e6e860c..742d6a3ba6 100644 --- a/doc/src/sgml/xplang.sgml +++ b/doc/src/sgml/xplang.sgml @@ -7,7 +7,8 @@ --> - Since version 6.3 Postgres supports + Beginning with the release of version 6.3, + Postgres supports the definition of procedural languages. In the case of a function or trigger procedure defined in a procedural language, the database has @@ -25,13 +26,17 @@ --> -Installing procedural languages +Installing Procedural Languages - A procedural language is installed in the database in three steps. + Procedural Language Installation + + + A procedural language is installed in the database in three steps. + The shared object for the language handler @@ -63,7 +68,7 @@ The PL must be declared with the command - CREATE [TRUSTED] PROCEDURAL LANGUAGE 'language-name' + CREATE [ TRUSTED ] PROCEDURAL LANGUAGE 'language-name' HANDLER handler_function_name LANCOMPILER 'description'; @@ -153,7 +158,7 @@ Overview - The design rules of PL/pgSQL where to create a loadable procedural + The design goals of PL/pgSQL were to create a loadable procedural language that @@ -178,7 +183,7 @@ - can be defined trusted, + can be defined to be trusted by the server, @@ -228,7 +233,7 @@ The PL/pgSQL language is case insensitive. All keywords and - identifiers can be used in upper-/lowercase mixed. + identifiers can be used in mixed upper- and lowercase. PL/pgSQL is a block oriented language. A block is defined as @@ -236,9 +241,9 @@ [<<label>>] [DECLARE - -- declarations] + declarations] BEGIN - -- statements + statements END; @@ -291,7 +296,7 @@ -name [CONSTANT] type [NOT NULL] [DEFAULT | := value]; +name [ CONSTANT ] type [ NOT NULL ] [ DEFAULT | := value ]; @@ -314,7 +319,7 @@ -name class%ROWTYPE; +name class%ROWTYPE; @@ -395,7 +400,7 @@ RENAME oldname TO newname; -Data types +Data Types The type of a varible can be any of the existing basetypes of @@ -411,19 +416,20 @@ RENAME oldname TO newname; - variable%TYPE + variable%TYPE - class.field%TYPE + class.field%TYPE - variable is the name of a previously in the - same function declared variable that is visible at this point. + variable is the name of a variable, +previously declared in the + same function, that is visible at this point. class is the name of an existing table @@ -431,7 +437,7 @@ RENAME oldname TO newname; an attribute. - Using the class.field%TYPE + Using the class.field%TYPE causes PL/pgSQL to lookup the attributes definitions at the first call to the funciton during the lifetime of a backend. Have a table with a char(20) attribute and some PL/pgSQL functions @@ -441,7 +447,7 @@ RENAME oldname TO newname; char(40) and restores the data. Ha - he forgot about the funcitons. The computations inside them will truncate the values to 20 characters. But if they are defined using the - class.field%TYPE + class.field%TYPE declarations, they will automagically handle the size change or if the new table schema defines the attribute as text type. @@ -454,22 +460,24 @@ RENAME oldname TO newname; All expressions used in PL/pgSQL statements are processed using - the backends executor. Since even a constant looking expression - can have a totally different meaning for a particular data type - (as 'now' for datetime), it is impossible for the PL/pgSQL parser + the backends executor. Expressions which appear to contain +constants may in fact require run-time evaluation (e.g. 'now' for the +datetime type) so +it is impossible for the PL/pgSQL parser to identify real constant values other than the NULL keyword. All expressions are evaluated internally by executing a query SELECT expression - over the SPI manager. In the expression, occurences of variable + using the SPI manager. In the expression, occurences of variable identifiers are substituted by parameters and the actual values from the variables are passed to the executor in the parameter array. All expressions used in a PL/pgSQL function are only prepared and saved once. - The type checking done by the postgres main parser has some side + The type checking done by the Postgres + main parser has some side effects to the interpretation of constant values. In detail there is a difference between what the two functions @@ -553,7 +561,7 @@ Assignment - An assignment of a value to a varable or row/record field is + An assignment of a value to a variable or row/record field is written as identifier := expression; @@ -587,7 +595,7 @@ Assignment SELECT * INTO myrec FROM EMP WHERE empname = myname; IF NOT FOUND THEN - RAISE EXCEPTION ''employee % not found'', myname; + RAISE EXCEPTION ''employee % not found'', myname; END IF; @@ -650,13 +658,13 @@ Aborting and messages can throw messages into the Postgres elog mechanism. - RAISE level ''format'' [, identifier [...]]; + RAISE level ''format'' [, identifier [...]]; - Inside the format, % is used as a placeholder for the - following, comma separated identifiers. Possible levels are - DEBUG (silently suppressed in productional running databases), NOTICE + Inside the format, % is used as a placeholder for the + subsequent comma-separated identifiers. Possible levels are + DEBUG (silently suppressed in production running databases), NOTICE (written into the database log and forwarded to the client application) - and EXCEPTION (written into the database log and aborting the transaction). + and EXCEPTION (written into the database log and aborting the transaction). @@ -669,9 +677,9 @@ Conditionals IF expression THEN - -- statements + statements [ELSE - -- statements] + statements] END IF; The expression must return a value that @@ -690,7 +698,7 @@ Loops [<<label>>] LOOP - -- statements + statements END LOOP; An unconditional loop that must be terminated explicitly @@ -700,15 +708,15 @@ Loops [<<label>>] WHILE expression LOOP - -- statements + statements END LOOP; A conditional loop that is executed as long as the evaluation of expression is true. [<<label>>] - FOR name IN [REVERSE] expression .. expression LOOP - -- statements + FOR name IN [ REVERSE ] expression .. expression LOOP + statements END LOOP; A loop that iterates over a range of integer values. The variable @@ -719,7 +727,7 @@ Loops [<<label>>] FOR record | row IN select_clause LOOP - -- statements + statements END LOOP; The record or row is assigned all the rows resulting from the select @@ -727,10 +735,12 @@ Loops with an EXIT statement, the last assigned row is still accessible after the loop. - EXIT [label] [WHEN expression]; + EXIT [ label ] [ WHEN expression ]; - If no label given, the innermost loop is terminated and the - statement following END LOOP is executed next. If label is given, it + If no label given, + the innermost loop is terminated and the + statement following END LOOP is executed next. + If label is given, it must be the label of the current or an upper level of nested loop blocks. Then the named loop or block is terminated and control continues with the statement after the loops/blocks corresponding @@ -746,7 +756,7 @@ Loops -Trigger procedures +Trigger Procedures PL/pgSQL can be used to define trigger procedures. They are created @@ -956,7 +966,7 @@ upward compatible. -Some simple PL/pgSQL functions +Some Simple PL/pgSQL Functions The following two PL/pgSQL functions are identical to their @@ -982,7 +992,7 @@ upward compatible. -PL/pgSQL function on composite type +PL/pgSQL Function on Composite Type Again it is the PL/pgSQL equivalent to the example from @@ -1006,7 +1016,7 @@ upward compatible. -PL/pgSQL trigger procedure +PL/pgSQL Trigger Procedure This trigger ensures, that any time a row is inserted or updated @@ -1028,12 +1038,12 @@ upward compatible. RAISE EXCEPTION ''empname cannot be NULL value''; END IF; IF NEW.salary ISNULL THEN - RAISE EXCEPTION ''% cannot have NULL salary'', NEW.empname; + RAISE EXCEPTION ''% cannot have NULL salary'', NEW.empname; END IF; -- Who works for us when she must pay for? IF NEW.salary < 0 THEN - RAISE EXCEPTION ''% cannot have a negative salary'', NEW.empname; + RAISE EXCEPTION ''% cannot have a negative salary'', NEW.empname; END IF; -- Remember who changed the payroll when @@ -1099,8 +1109,8 @@ upward compatible. The shared object for the PL/Tcl call handler is automatically built and installed in the Postgres - owners library directory if the Tcl/Tk support is specified - in the configure run. + library directory if the Tcl/Tk support is specified + in the configuration step of the installation procedure. @@ -1110,7 +1120,7 @@ upward compatible. Description -<ProductName>Postgres</ProductName> functions and Tcl procedure names +<ProductName>Postgres</ProductName> Functions and Tcl Procedure Names In Postgres, one and the @@ -1126,7 +1136,7 @@ upward compatible. -Defining functions in PL/Tcl +Defining Functions in PL/Tcl To create a function in the PL/Tcl language, use the known syntax @@ -1172,7 +1182,7 @@ upward compatible. -Global data in PL/Tcl +Global Data in PL/Tcl Sometimes (especially when using the SPI functions described later) it @@ -1188,7 +1198,7 @@ upward compatible. -Trigger procedures in PL/Tcl +Trigger Procedures in PL/Tcl Trigger procedures are defined in Postgres @@ -1366,7 +1376,7 @@ $args -Database access from PL/Tcl +Database Access from PL/Tcl The following commands are available to access the database from @@ -1420,7 +1430,7 @@ quote string and has to be written as - "SELECT '[quote $val]' AS ret" + "SELECT '[ quote $val ]' AS ret" @@ -1516,13 +1526,13 @@ spi_exec ?-count n? ?-array name CREATE FUNCTION t1_count(int4, int4) RETURNS int4 AS ' - if {![info exists GD(plan)]} { + if {![ info exists GD(plan) ]} { # prepare the saved plan on the first call - set GD(plan) [spi_prepare \\ + set GD(plan) [ spi_prepare \\ "SELECT count(*) AS cnt FROM t1 WHERE num >= \\$1 AND num <= \\$2" \\ - int4] + int4 ] } - spi_execp -count 1 $GD(plan) [list $1 $2] + spi_execp -count 1 $GD(plan) [ list $1 $2 ] return $cnt ' LANGUAGE 'pltcl';