Here is a second version for enhancing DB reverse engineering. The code now takes care of ref. integrity constraint rules and default values. See ya. Antonio
This archive was generated by hypermail 2.0.0 : Mon Dec 01 2003 - 04:46:56 EST