[MonetDB-users] mapi_query with MAL code?
Hello. I've been using an embedded SQL with moderate success with my OCaml binding. Essentially passing the SQL statement through the mapi_query() function call. I would now like to try out some MAL code in a similar setting: embedded MonetDB, code passed via mapi_query(). Could someone provide me with a simple "Hello world" MAL code to try? For now, all I've been able to achieve with MAL are segfaults... All the best, -- Guillaume Yziquel http://yziquel.homelinux.org/
Op 17-01-10 02:25, Guillaume Yziquel schreef:
I would now like to try out some MAL code in a similar setting: embedded MonetDB, code passed via mapi_query(). Could someone provide me with a simple "Hello world" MAL code to try? For now, all I've been able to achieve with MAL are segfaults...
sql>\f raw sql>explain select 'hello world'; % .explain # table_name % mal # name % clob # type % 0 # length function user.s3_1{autoCommit=true}():void; sql.exportValue(1,".hello world","hello world","char",11,0,3,"hello world",""); end s3_1; Stefan
participants (2)
-
Guillaume Yziquel
-
Stefan de Konink