On 2017/04/18 15:31, Kang Yuzhe wrote:
> My question is why is that there is a lot of hands-on about PG application
> development(eg. connecting to PG using JAVA/JDBC) but almost nothing about
> PG hacking hands-on lessons. For example, I wanna add the keyword
> "Encrypted" in CREATE TABLE t1(a int, b int encrypted) or CREATE TABLE t1(a
> int, b int) encrypted. Alas, its not easy task.

Regarding this part, at one of the links shared above [1], you can find
presentations with hands-on instructions about how to implement a new SQL
functionality by modifying various parts of the source code.  See these:

Implementing a TABLESAMPLE clause (by Neil Conway)
http://www.neilconway.org/talks/hacking/ottawa/ottawa_slides.pdf

Add support for the WHEN clause to the CREATE TRIGGER statement (by Neil
Conway)
http://www.neilconway.org/talks/hacking/hack_slides.pdf

(by Gavin Sherry)
https://linux.org.au/conf/2007/att_data/Miniconfs(2f)PostgreSQL/attachments/hacking_intro.pdf

Handout: The Implementation of TABLESAMPLE
http://www.neilconway.org/talks/hacking/ottawa/ottawa_handout.pdf

Handout: Adding WHEN clause to CREATE TRIGGER
http://www.neilconway.org/talks/hacking/hack_handout.pdf

Some of the details might be dated, because they were written more than 10
years ago, but will definitely get you motivated to dive more into the
source code.

Thanks,
Amit

[1] http://www.neilconway.org/talks/hacking/



-- 
Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org)
To make changes to your subscription:
http://www.postgresql.org/mailpref/pgsql-hackers

Reply via email to