Excerpts from Alex Hunsaker's message of vie feb 10 16:53:05 -0300 2012: > Seems like we missed the fact that we still did SvUTF8_on() in sv2cstr > and SvPVUTF8() when turning a perl string into a cstring.
Right. So I played a bit with this patch, and touched it a bit mainly just to add some more comments; and while at it I noticed that some of the functions in Util.xs might leak some memory, so I made an attempt to plug them, as in the attached patch (which supersedes yours). Now, with my version of the patch applied and using a SQL_ASCII database to test the problem in the original report, I notice that we now have a regression failure: *** /pgsql/source/HEAD/src/pl/plperl/expected/plperl.out 2012-05-16 13:38:02.495647259 -0400 --- /home/alvherre/Code/pgsql/build/HEAD/src/pl/plperl/results/plperl.out 2012-06-20 15:09:19.869778824 -0400 *************** *** 658,664 **** return "abcd\0efg"; $$ LANGUAGE plperl; SELECT perl_zerob(); ! ERROR: invalid byte sequence for encoding "UTF8": 0x00 CONTEXT: PL/Perl function "perl_zerob" -- make sure functions marked as VOID without an explicit return work CREATE OR REPLACE FUNCTION myfuncs() RETURNS void AS $$ --- 658,664 ---- return "abcd\0efg"; $$ LANGUAGE plperl; SELECT perl_zerob(); ! ERROR: invalid byte sequence for encoding "SQL_ASCII": 0x00 CONTEXT: PL/Perl function "perl_zerob" -- make sure functions marked as VOID without an explicit return work CREATE OR REPLACE FUNCTION myfuncs() RETURNS void AS $$ ====================================================================== I'm not really sure what to do here -- maybe have a second expected file for that test is a good enough answer? Or should I just take the test out? Opinions please. -- Álvaro Herrera <alvhe...@commandprompt.com> The PostgreSQL Company - Command Prompt, Inc. PostgreSQL Replication, Consulting, Custom Development, 24x7 support
plperl_sql_ascii-2.patch
Description: Binary data
-- Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers