nvl <-> coalesce decode <-> case x when bool then y when bool then z else zz end cube <-> contrib/crosstab (to some extent..) #### playtest=# select * from xl_odbc_test; col_1 | col_2 -------+--------------- 1 | a 2 | b 3 | c 10 | xx 20 | yy 30 | bb 100 | hundred 200 | two hundred 300 | three hundred (9 rows) #### select pl.decode(col_1,$$<75,,$$||col_2||$$<-value,,<250,,$$||col_1||$$,,default value$$) from xl_odbc_test; #### select case when col_1 < 75 then col_2 || '<-value' when col_1 < 250 then cast(col_1 as text) else 'default value' end from xl_odbc_test; #### decode --------------- a<-value b<-value c<-value xx<-value yy<-value bb<-value 100 200 default value (9 rows) #### CREATE OR REPLACE FUNCTION pl.decode(selector text, clauses text) RETURNS text AS $BODY$ ################################################################################ ## decode( selector text , clauses text ) ## ## plperlu rendition of Oracle's decode() function. ## ## Takes 2 args: ## ## 1. (selector). The item to check, and ## 2. (clauses) . A double comma (,,) separated string listing of ## items to match and items to return if the match is successful. ## The last entry in the string is the final "else" return value. ## The match sections may include standard perl boolean ## operations. ## ## USE DOLLAR QUOTING to setup the test/result string, ## it WILL save you much hair pulling. ## ## If you want a return item to be NULL for an option, use one of the ## following (case INSENSITVE) return values: ## null() or ## undef() ## ## decode() uses its own Safe.pm compartment for the reevalution of the ## match clauses. ## ################################################################################ use Safe; my $vault; # get / setup a safe "vault" from / in %_SHARED to reduce function start up time on a per session level if ( exists( $_SHARED{pl_vault} ) && defined( $_SHARED{pl_vault} ) ){ $vault = $_SHARED{pl_vault}; #elog( NOTICE , "plperlu: Preloaded safety vault being used." ); } else { # setup a safe vault using the same parameters as the SAFE_OK macro in postgresql's # http://developer.postgresql.org/cvsweb.cgi/pgsql/src/pl/plperl/plperl.c?rev=1.105 $vault = Safe->new; $vault->permit_only( qw/ :default :base_math !:base_io time sort / ); $_SHARED{pl_vault} = $vault; #elog( NOTICE , "plperlu: Setting up session safety vault."); } my $selector = $_[0]; my @in_clauses = split( /,,/ , $_[1] ); #reject @in_clauses argument if it doesn't contain an odd number of entries: ie - # ( '>10' , 'return#1' , 'final else' ) or ( '>10' , 'return#1' , '<10' , 'return#2' , 'final else' ) is OK # ( '>10' , 'return#1' ) is not die "pl.decode(): invalid clause argument, the number of entries was not odd.\n" unless ( scalar( @in_clauses ) % 2 ); my $final_else = pop @in_clauses; my $retval = undef; my $have_match = undef; ITERATIONS: while ( @in_clauses ){ my $match_clause = shift @in_clauses; my $then_clause = shift @in_clauses; my $result = $vault->reval( $selector . $match_clause ); if ( my $error = $@ ){ # safe reval error...clean up the error message then elog() and ignore it, # then move on and try the next set of match/result clauses... $error =~ s/ at line.+//; $error =~ s/trapped.+/deemed unsafe/; chomp $error; elog( NOTICE , "pl.decode(): potentially dangerous operation found, " . $error . ", skipping clause..." ); next ITERATIONS; } if ( $result ){ # we have the winner...set $retval and bail out...we only grab the first true result... $retval = $then_clause; $have_match = "yes"; last ITERATIONS; } # no $result? oh well try the next set... } if ( defined( $have_match ) ){ # last check to see if we've matched anything... # and if so return it...accounting for the case where # the wanted return is NULL... if ( $retval =~ m/^ (?: null || undef ) \( \) $ /ix ) { $retval=undef; } return $retval; } # if we get here we are returning the "default" result value # also accounting for the case where the wanted return is NULL... if ( $final_else =~ m/^ (?: null || undef ) \( \) $ /ix ) { $final_else=undef; } return $final_else; $BODY$ LANGUAGE 'plperlu' IMMUTABLE SECURITY DEFINER; GRANT EXECUTE ON FUNCTION pl.decode(selector text, clauses text) TO public;