Branch: Tag:

2008-08-01

2008-08-01 13:52:40 by Stephen R. van den Berg <srb@cuci.nl>

pgsql tune docs

Rev: lib/modules/Sql.pmod/pgsql.pike:1.21

178:   //! yet. It is not cleared upon reading (can be invoked multiple   //! times, will return the same result until a new error occurs).   //! + //! During the execution of a statement, this function accumulates all + //! non-error messages (notices, warnings, etc.). If a statement does not + //! generate any errors, this function will return all collected messages + //! from the last statement. + //!   //! To clear the error, pass 1 as argument.   //!   //! @seealso
193:   //!   //! This function returns a string describing what host are we talking to,   //! and how (TCP/IP or UNIX sockets). -  + //! + //! @seealso + //! server_info   string host_info() {    return sprintf("Via fd:%d over TCP/IP to %s:%d",_c.query_fd(),host,port);   }
239:   //!   //! This function is PostgreSQL-specific, and thus it is not available   //! through the generic SQL-interface. + //! + //! @seealso + //! reload   void cancelquery() {    if(qstate==inquery) {    qstate=cancelpending;
397:    case 4:PD("CryptPassword\n");    if(msglen<2)    errtype=protocolerror; -  sendpass=_c.getstring(msglen);msglen=0; -  errtype=protocolunsupported; +  sendpass=_c.getstring(msglen);msglen=0; // salt +  errtype=protocolunsupported; // Pike lacks function that takes salt    break;    case 5:PD("MD5Password\n");    if(msglen<4)
750:   //!   //! Resets the connection to the database. Can be used for   //! a variety of reasons, for example to detect the status of a connection. + //! + //! @seealso + //! cancelquery   void reload(void|int special) {    mixed err;    int didsync;
884:   //! talking to. It has the form @expr{"servername/serverversion"@}   //! (like the HTTP protocol description) and is most useful in   //! conjunction with the generic SQL-server module. + //! + //! @seealso + //! host_info   string server_info () {    return DRIVERNAME"/"+(runtimeparameter->server_version||"unknown");   }
1147:   //! viewed as a limited protection against SQL-injection attacks.   //!   //! @seealso - //! @[Sql.Sql], @[Sql.sql_result] + //! @[Sql.Sql], @[Sql.sql_result], @[Sql.pgsql_util.pgsql_result]   object big_query(string q,void|mapping(string|int:mixed) bindings) {    string preparedname="";    string portalname="";