Re: remaining sql/json patches

From: Erik Rijkers <er(at)xs4all(dot)nl>
To: Amit Langote <amitlangote09(at)gmail(dot)com>
Cc: Alvaro Herrera <alvherre(at)alvh(dot)no-ip(dot)org>, Andrew Dunstan <andrew(at)dunslane(dot)net>, PostgreSQL-development <pgsql-hackers(at)postgresql(dot)org>, jian he <jian(dot)universality(at)gmail(dot)com>
Subject: Re: remaining sql/json patches
Date: 2023-09-18 11:14:52
Message-ID: 92aa26e3-662b-3404-d92b-e88d42c18f23@xs4all.nl
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Op 9/18/23 om 12:20 schreef Amit Langote:
> Hi Erik,
>
>> I am sorry to be bothering you with these somewhat idiotic SQL
>> statements but I suppose somehow it needs to be made more solid.
>

For 60 datatypes, I ran this statement:

select json_query(jsonb'{"a":[{"a":[2,3]},{"a":[4,5]}]}',
'$.a[*].a?(@<=3)'returning ${datatype} with wrapper
);

against a 17devel server (a0a5) with json v15 patches and caught the
output, incl. 30+ crashes, in the attached .txt. I hope that's useful.

Erik

Attachment Content-Type Size
crash_20120918.txt text/plain 24.1 KB

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Zhijie Hou (Fujitsu) 2023-09-18 11:16:41 RE: [PoC] pg_upgrade: allow to upgrade publisher node
Previous Message Heikki Linnakangas 2023-09-18 11:09:43 Fix GIST readme on LSN vs NSN