Re: jsonpath: Missing Binary Execution Path?
| От | David E. Wheeler |
|---|---|
| Тема | Re: jsonpath: Missing Binary Execution Path? |
| Дата | |
| Msg-id | CE1CA3EF-5714-4177-8026-79C4D27B6383@justatheory.com обсуждение исходный текст |
| Ответ на | jsonpath: Missing Binary Execution Path? ("David E. Wheeler" <david@justatheory.com>) |
| Ответы |
Re: jsonpath: Missing Binary Execution Path?
|
| Список | pgsql-hackers |
On Jun 13, 2024, at 11:32, David E. Wheeler <david@justatheory.com> wrote:
> Should && and || not also work on scalar operands?
I see the same issue for unary !, too:
david=# select jsonb_path_query('true', '!$');
ERROR: syntax error at or near "$" of jsonpath input
LINE 1: select jsonb_path_query('true', '!$');
^
david=# select jsonb_path_query('[1, 3, 7]', '$[*] ? (!true)');
ERROR: syntax error at end of jsonpath input
LINE 1: select jsonb_path_query('[1, 3, 7]', '$[*] ? (!true)');
^
david=# select jsonb_path_query('[1, 3, 7]', '$[*] ? (!@.boolean())');
ERROR: syntax error at or near "@" of jsonpath input
LINE 1: select jsonb_path_query('[1, 3, 7]', '$[*] ? (!@.boolean())'...
^
Best,
David
В списке pgsql-hackers по дате отправления: