Replies: 3 comments
-
I think this would be something that would have to be implemented on a server-side level - if it's a wasm-level client-side restriction then it could be bypassed fairly easily. |
Beta Was this translation helpful? Give feedback.
-
I am not sure I get what the intended behaviour is, but... If the question is avoid duckdb-wasm modifying / uploading files (and you are dealing with coworkers that are not trying to hack their way in) one version of this is basically changing network behaviour to fail on writes, this would allow to forbid people changing served resources on random S3 buckets. That plus changing the default database to be read-only should make more or less what you want. Avoiding writes (that forbid This can be probably enough I think. Does this makes sense? And if so, a PR is very welcome adding a setting that propagates read-only setting to duckdb. |
Beta Was this translation helpful? Give feedback.
-
Yes I think the "ATTACHED" being read-only would be what I'm looking for |
Beta Was this translation helpful? Give feedback.
-
My use-case is adding duckdb-wasm on an intranet to allow BI people and engineers to make queries, it would connect to mutiple databases (parquet files, Postgres, etc)
I'd like it to be a "query only" connection, and that they cannot create table, insert elements, drop table, etc
would it be possible to add a flags to the extensions to disallow such statements?
Beta Was this translation helpful? Give feedback.
All reactions