aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto
diff options
context:
space:
mode:
authoriddqd <iddqd@yandex-team.com>2024-06-11 10:12:13 +0300
committeriddqd <iddqd@yandex-team.com>2024-06-11 10:22:43 +0300
commit07f57e35443ab7f09471caf2dbf1afbcced4d9f7 (patch)
treea4a7b66ead62e83fa988a2ec2ce6576311c1f4b1 /contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto
parent6db3b8ca95e44179e48306a58656fb1f9317d9c3 (diff)
downloadydb-07f57e35443ab7f09471caf2dbf1afbcced4d9f7.tar.gz
add contrib/python/yandexcloud to import
03b7d3cad2237366b55b393e18d4dc5eb222798c
Diffstat (limited to 'contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto')
-rw-r--r--contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto91
1 files changed, 91 insertions, 0 deletions
diff --git a/contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto b/contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto
new file mode 100644
index 0000000000..de12ce03a3
--- /dev/null
+++ b/contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto
@@ -0,0 +1,91 @@
+syntax = "proto3";
+
+package yandex.cloud.mdb.sqlserver.v1;
+
+import "yandex/cloud/validation.proto";
+
+option go_package = "github.com/yandex-cloud/go-genproto/yandex/cloud/mdb/sqlserver/v1;sqlserver";
+option java_outer_classname = "PSU";
+option java_package = "yandex.cloud.api.mdb.sqlserver.v1";
+
+// An SQL Server user.
+message User {
+ // Name of the SQL Server user.
+ string name = 1;
+
+ // ID of the SQL Server cluster the user belongs to.
+ string cluster_id = 2;
+
+ // Set of permissions granted to the user.
+ repeated Permission permissions = 3;
+
+ //Set of server roles granted to the login.
+ repeated ServerRole server_roles = 4;
+}
+
+message Permission {
+
+ // Role granted to the user within the database.
+ enum Role {
+ ROLE_UNSPECIFIED = 0;
+
+ // Members of this fixed database role can perform all configuration and maintenance activities on a database and can also drop a database in SQL Server.
+ DB_OWNER = 1;
+
+ // Members of this fixed database role can modify role membership for custom roles only and manage permissions. They can potentially elevate their privileges and their actions should be monitored.
+ DB_SECURITYADMIN = 2;
+
+ // Members of this fixed database role can add or remove access to a database for Windows logins, Windows groups, and SQL Server logins.
+ DB_ACCESSADMIN = 3;
+
+ // Members of this fixed database role can back up the database.
+ DB_BACKUPOPERATOR = 4;
+
+ // Members of this fixed database role can run any Data Definition Language (DDL) command in a database.
+ DB_DDLADMIN = 5;
+
+ // Members of this fixed database role can add, delete, or change data in all user tables.
+ DB_DATAWRITER = 6;
+
+ // Members of this fixed database role can read all data from all user tables.
+ DB_DATAREADER = 7;
+
+ // Members of this fixed database role cannot add, modify, or delete any data in the user tables within a database. A denial has a higher priority than a grant, so you can use this role to quickly restrict one's privileges without explicitly revoking permissions or roles.
+ DB_DENYDATAWRITER = 8;
+
+ // Members of this fixed database role cannot read any data in the user tables within a database. A denial has a higher priority than a grant, so you can use this role to quickly restrict one's privileges without explicitly revoking permissions or roles.
+ DB_DENYDATAREADER = 9;
+ }
+
+ // Name of the database the permission grants access to.
+ string database_name = 1;
+
+ // Roles granted to the user within the database.
+ repeated Role roles = 2 [(size) = ">=1"];
+}
+
+message UserSpec {
+ // Name of the SQL Server user.
+ string name = 1 [(required) = true, (length) = "<=32", (pattern) = "[a-zA-Z0-9_]*"];
+
+ // Password of the SQL Server user.
+ string password = 2 [(required) = true, (length) = "8-128"];
+
+ // Set of permissions to grant to the user.
+ repeated Permission permissions = 3;
+
+ // Set of server roles.
+ repeated ServerRole server_roles = 4;
+}
+
+// Set of server roles.
+enum ServerRole {
+ SERVER_ROLE_UNSPECIFIED = 0;
+
+ // Effectively grants VIEW SERVER STATE to the login.
+ //
+ // That gives an ability to use various dynamic management views to monitor server state, including Activity Monitor tool that is built-in into SSMS.
+ //
+ // No intrusive actions are allowed, so this is pretty safe to grant.
+ MDB_MONITOR = 1;
+}