Re: jsonpath: Missing Binary Execution Path?

From: "David E(dot) Wheeler" <david(at)justatheory(dot)com>
To: PostgreSQL Hackers <pgsql-hackers(at)lists(dot)postgresql(dot)org>
Subject: Re: jsonpath: Missing Binary Execution Path?
Date: 2024-06-13 15:37:00
Message-ID: CE1CA3EF-5714-4177-8026-79C4D27B6383@justatheory.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On Jun 13, 2024, at 11:32, David E. Wheeler <david(at)justatheory(dot)com> wrote:

> Should && and || not also work on scalar operands?

I see the same issue for unary !, too:

david=# select jsonb_path_query('true', '!$');
ERROR: syntax error at or near "$" of jsonpath input
LINE 1: select jsonb_path_query('true', '!$');
^
david=# select jsonb_path_query('[1, 3, 7]', '$[*] ? (!true)');
ERROR: syntax error at end of jsonpath input
LINE 1: select jsonb_path_query('[1, 3, 7]', '$[*] ? (!true)');
^
david=# select jsonb_path_query('[1, 3, 7]', '$[*] ? (!(at)(dot)boolean())');
ERROR: syntax error at or near "@" of jsonpath input
LINE 1: select jsonb_path_query('[1, 3, 7]', '$[*] ? (!(at)(dot)boolean())'...
^

Best,

David

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Heikki Linnakangas 2024-06-13 16:04:19 Re: MultiXactMemberFreezeThreshold can make autovacuum *less* aggressive
Previous Message Dmitry Dolgov 2024-06-13 15:33:57 Re: libpq contention due to gss even when not using gss