Even if it is a 'cookie' problem then it means that user sourced data is not going through an appropriate sanitisation before inclusion in a sql query. This is how sql injection attacks happen. From ...
asset = 'summary_data' query = "select * from summary_data" batch_request = RuntimeBatchRequest( datasource_name='sql_server_datasource', data_connector_name='sql_gx ...
SQL Server doesn't support :: casting. dbt_utils default__current_timestamp() uses :: to perform the cast. I think this adapter, dbt-sqlserver, should adjust to support this case and any others ...