This section is the map for the rest of the book. The five stages introduced in the 1.1 chapter overview (parse, analyze/rewrite, plan, portal, execute) are traced here through the actual code: which functions implement each stage, and in what order they get called. The mechanics of each of the five stages are unpacked in later chapters. Here, only the skeleton matters: how a backend starts up, ho
A practical look at using tower as the middleware layer for Rust AWS Lambda functions, with examples that build up to a DynamoDB-backed per-IP rate limiter. It covers Service, Layer, stack ordering, short-circuiting, boxed async futures, and testing middleware without deploying a Lambda. Comments
PostgreSQL Internals · Chapter 1 Query Processing Suppose a client sends SELECT * FROM users WHERE id = 1. The path that single line travels before coming back as a result row is longer than you might expect. Inside the PostgreSQL backend, that SQL goes through a five-stage pipeline. Backend entry and dispatch. The backend receives the message from the client and decides which processing path it s
Comments
A hands-on dev review focused on i18n, date/number formatting, and non-ASCII edge cases. Why I Tested TestSprite for Locale Handling Specifically Most AI testing tools get reviewed for their core functionality — does it find bugs, does it write good test code, does it integrate with CI/CD. Those reviews exist. What I couldn't find was a focused review on how TestSprite handles locale-specific edge
SQL is widely known for data querying and manipulation but systems do grow; data becomes larger; processes become repetitive and operations become sensitive. SQL has some features which enables it to be considered a fully fledged programming language. Some of the features which I discuss in this article are procedures, functions and transactions. Each of these concepts serve distinct purposes. Sto
Introduction Placing RDS in a private subnet protects it from unauthorized external access — but it also means you can no longer connect directly from your developer machine. This article walks you through a step-by-step guide to securely connect to a private-subnet RDS (PostgreSQL) instance using AWS Client VPN. Developer PC │ │ UDP 443 (TLS / Mutual Certificate Authentication) ▼ Client