Re: jsonpath: Missing Binary Execution Path?
От | David E. Wheeler |
---|---|
Тема | Re: jsonpath: Missing Binary Execution Path? |
Дата | |
Msg-id | CE1CA3EF-5714-4177-8026-79C4D27B6383@justatheory.com обсуждение исходный текст |
Ответ на | jsonpath: Missing Binary Execution Path? ("David E. Wheeler" <david@justatheory.com>) |
Ответы |
Re: jsonpath: Missing Binary Execution Path?
|
Список | pgsql-hackers |
On Jun 13, 2024, at 11:32, David E. Wheeler <david@justatheory.com> wrote: > Should && and || not also work on scalar operands? I see the same issue for unary !, too: david=# select jsonb_path_query('true', '!$'); ERROR: syntax error at or near "$" of jsonpath input LINE 1: select jsonb_path_query('true', '!$'); ^ david=# select jsonb_path_query('[1, 3, 7]', '$[*] ? (!true)'); ERROR: syntax error at end of jsonpath input LINE 1: select jsonb_path_query('[1, 3, 7]', '$[*] ? (!true)'); ^ david=# select jsonb_path_query('[1, 3, 7]', '$[*] ? (!@.boolean())'); ERROR: syntax error at or near "@" of jsonpath input LINE 1: select jsonb_path_query('[1, 3, 7]', '$[*] ? (!@.boolean())'... ^ Best, David
В списке pgsql-hackers по дате отправления: