bugzilla-daemon at main.slony.info bugzilla-daemon at main.slony.info
Wed May 22 14:01:57 PDT 2013
http://www.slony.info/bugzilla/show_bug.cgi?id=151

--- Comment #2 from Jan Wieck <janwieck at yahoo.com> 2013-05-22 14:01:57 PDT ---
Pretty old issue, but since I am actually working on this and Steve pointed me
towards this entry, why not comment on it.

What I have in mind of implementing is

EXECUTE SCRIPT (SQL='<string>', ...);

Any language that is even remotely useful for doing anything with a database
can properly escape an SQL literal value (string in single quotes). The Slonik
parser can deal with them on the flex level. So this should be very easy to
implement as well as use.

Do we really need the dollar quoting?

-- 
Configure bugmail: http://www.slony.info/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
You are the assignee for the bug.


More information about the Slony1-bugs mailing list