Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix 349 #385

Merged
merged 4 commits into from
Feb 10, 2023
Merged

Fix 349 #385

merged 4 commits into from
Feb 10, 2023

Conversation

mboudet
Copy link
Contributor

@mboudet mboudet commented Feb 10, 2023

Should close #349

This PR directly manage the sparql endpoint where queries are sent, instead of letting sparqlwrapper decide.
(Since 'Askomics' contains 'ask', it was not accurate anyway)

This means that any 'user' constructed query (namely, from the ask interface and the sparql console) will be set to the unauthentified endpoint, which does not have write access.

This means that a malicious user cannot delete data through the sparql console.

@mboudet mboudet merged commit f6597ba into askomics:dev Feb 10, 2023
@mboudet mboudet deleted the fix_349 branch April 15, 2024 12:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Better management of query type
1 participant