I don't use them myself for anything. But the API defines them, so some rogue user could conceivably write the equivalent of
    for each document
        emit it a million times
and cripple the server.

When I google "couchdb disable temporary view", nothing particularly useful comes back. When you suggest disabling them, do you mean using a proxy to block them? Or is there a couch-specific way to configure the couch server to refuse them (either totally or conditionally on the provision of admin credentials)?

    Kevin

On 2/21/2012 4:07 PM, Sam Bisbee wrote:
On Tue, Feb 21, 2012 at 5:01 PM, Kevin R. Coombes
<[email protected]>  wrote:
Our local sysadmins (who are doing their best to train me to be paranoid)
raised a question about couchdb applications. They  are worried about the
potential for DoS attacks (and if they had their way, would disable all POST
and PUT commands on everything...).

Is it possible to configure the server to require admin (or at least
database admin) credentials in order to post a temporary view? Is it
desirable?
If this is a production system then I would just disable temporary
views altogether, but leave them enabled on developer boxes/servers.
You should not be using temporary views for anything other than
development, using something like couchdb-lucene instead for adhoc
queries (https://github.com/rnewson/couchdb-lucene).

Cheers,

--
Sam Bisbee

Reply via email to