Re: Read-only connection mode for AI workflows.

From: Andres Freund <andres(at)anarazel(dot)de>
To: Peter Eisentraut <peter(at)eisentraut(dot)org>
Cc: Andrei Lepikhov <lepihov(at)gmail(dot)com>, Bruce Momjian <bruce(at)momjian(dot)us>, Jack Bonatakis <jack(at)bonatak(dot)is>, pgsql-hackers <pgsql-hackers(at)postgresql(dot)org>
Subject: Re: Read-only connection mode for AI workflows.
Date: 2026-03-18 14:26:26
Message-ID: wf3p4636lgu67rwatc7pdnvmz36guljm3lzatvvy45ew3adtvw@ip7yivjxqqy6
Views: Whole Thread | Raw Message | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

Hi,

On 2026-03-18 14:48:41 +0100, Peter Eisentraut wrote:
> On 17.03.26 15:05, Andrei Lepikhov wrote:
> > On 17/3/26 14:52, Bruce Momjian wrote:
> > > On Tue, Mar 17, 2026 at 11:04:25AM +0100, Andrei Lepikhov wrote:
> > > > On 16/3/26 22:25, Bruce Momjian wrote:
> > > > > On Mon, Mar 16, 2026 at 10:01:22PM +0100, Andrei Lepikhov wrote:
> > > > > > > I do think the underlying problem of safely exposing databases to
> > > > > > > automated agents is becoming increasingly common, so it seems like a
> > > > > > > useful area to explore.
> > > > >
> > > > > I agree the need a read-only sessions is going to get more urgent with
> > > > > MCP.  Why doesn't the community code have a read-only session option
> > > > > that can't be changed?
> > > >
> > > > The pg_readonly project aims to answer this question: if it is easy and
> > > > cheap to implement as an extension, why do we need to touch the core?
> > >
> > > I think it is a fundamental feature the database should have by default.
> > >
> >
> > Why wasn’t read-only mode set up like this from the start? - I haven’t
> > seen any other DBMSs, aside from SQLite, offer this kind of guarantee.
> > If we want to move forward, it makes sense to use a session parameter
> > and add backend code to prevent violations.
> > Postgres architecture looks well-suited for this feature. However, the
> > request is to block all backend changes, not just the usual XactReadOnly
> > limitations, but also things like vacuum, etc (temporary tables?).
> > Should we also consider cluster-wide restrictions?
>
> Read-only mode is a transaction property, not an access control system.
>
> If you want to control who can read what, there is an access control system
> for that. If it's insufficient, let's enhance it. But let's keep these
> things separate.

I don't agree that this need can be entirely addressed by access control.

Regardless of the AI angle it's quite useful to be able to put a server into
read only mode, e.g. in preparation for a planned failover where you can
continue to allow reads but don't want any more writes. Or in preparation for
a shutdown you want to prevent further writes (so the shutdown checkpoint is
quick), but you do want to allow further reads (to reduce the scope of the
downtime, by allowing reads while doing a CHECKPOINT before the actual
shutdown).

It doesn't make sense to implement stuff like that by changing all the access
controls of the system, because it'll often be a temporary thing. So you have
to figure out all the DDL to temporarily revoke permissions, have to somehow
wait till those changes have taken hold for everything, then you have to
figure out DDL to revert all those changes.

Greetings,

Andres

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Ilia Evdokimov 2026-03-18 14:26:51 Re: Reduce planning time for large NOT IN lists containing NULL
Previous Message Daniel Gustafsson 2026-03-18 14:25:13 Re: Serverside SNI support in libpq