Re: BUG #17660: JSONPATH issue using like_regex followed by the && operator

Поиск
Список
Период
Сортировка
От Tom Lane
Тема Re: BUG #17660: JSONPATH issue using like_regex followed by the && operator
Дата
Msg-id 3541494.1666539105@sss.pgh.pa.us
обсуждение исходный текст
Ответ на Re: BUG #17660: JSONPATH issue using like_regex followed by the && operator  (Shahar Belizon <shahar@cybear.co>)
Список pgsql-bugs
Shahar Belizon <shahar@cybear.co> writes:
> Well, I see what you are saying, but still, when checking the result of *SELECT
> 'a' ~ '\$$'* I'm getting a *FALSE, *so I expect the JSONPATH parser to work
> the same way.

I don't think you did grasp the point.  There's an additional level of
literal-parsing and backslash-stripping involved in the jsonpath case,
because the jsonpath path string contains an embedded string literal,
which has to have some kind of escaping behavior.  Otherwise, how could
you search for a pattern that includes a double-quote?

The underlying regex behavior is the same either way; it's the surface
syntax that's different because of the extra parsing layer.

            regards, tom lane



В списке pgsql-bugs по дате отправления:

Предыдущее
От: Shahar Belizon
Дата:
Сообщение: Re: BUG #17660: JSONPATH issue using like_regex followed by the && operator
Следующее
От: PG Bug reporting form
Дата:
Сообщение: BUG #17662: Error on UPDATE with ()