diff options
author | iddqd <iddqd@yandex-team.com> | 2024-06-11 10:12:13 +0300 |
---|---|---|
committer | iddqd <iddqd@yandex-team.com> | 2024-06-11 10:22:43 +0300 |
commit | 07f57e35443ab7f09471caf2dbf1afbcced4d9f7 (patch) | |
tree | a4a7b66ead62e83fa988a2ec2ce6576311c1f4b1 /contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto | |
parent | 6db3b8ca95e44179e48306a58656fb1f9317d9c3 (diff) | |
download | ydb-07f57e35443ab7f09471caf2dbf1afbcced4d9f7.tar.gz |
add contrib/python/yandexcloud to import
03b7d3cad2237366b55b393e18d4dc5eb222798c
Diffstat (limited to 'contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto')
-rw-r--r-- | contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto | 91 |
1 files changed, 91 insertions, 0 deletions
diff --git a/contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto b/contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto new file mode 100644 index 0000000000..de12ce03a3 --- /dev/null +++ b/contrib/libs/yandex-cloud-api-protos/yandex/cloud/mdb/sqlserver/v1/user.proto @@ -0,0 +1,91 @@ +syntax = "proto3"; + +package yandex.cloud.mdb.sqlserver.v1; + +import "yandex/cloud/validation.proto"; + +option go_package = "github.com/yandex-cloud/go-genproto/yandex/cloud/mdb/sqlserver/v1;sqlserver"; +option java_outer_classname = "PSU"; +option java_package = "yandex.cloud.api.mdb.sqlserver.v1"; + +// An SQL Server user. +message User { + // Name of the SQL Server user. + string name = 1; + + // ID of the SQL Server cluster the user belongs to. + string cluster_id = 2; + + // Set of permissions granted to the user. + repeated Permission permissions = 3; + + //Set of server roles granted to the login. + repeated ServerRole server_roles = 4; +} + +message Permission { + + // Role granted to the user within the database. + enum Role { + ROLE_UNSPECIFIED = 0; + + // Members of this fixed database role can perform all configuration and maintenance activities on a database and can also drop a database in SQL Server. + DB_OWNER = 1; + + // Members of this fixed database role can modify role membership for custom roles only and manage permissions. They can potentially elevate their privileges and their actions should be monitored. + DB_SECURITYADMIN = 2; + + // Members of this fixed database role can add or remove access to a database for Windows logins, Windows groups, and SQL Server logins. + DB_ACCESSADMIN = 3; + + // Members of this fixed database role can back up the database. + DB_BACKUPOPERATOR = 4; + + // Members of this fixed database role can run any Data Definition Language (DDL) command in a database. + DB_DDLADMIN = 5; + + // Members of this fixed database role can add, delete, or change data in all user tables. + DB_DATAWRITER = 6; + + // Members of this fixed database role can read all data from all user tables. + DB_DATAREADER = 7; + + // Members of this fixed database role cannot add, modify, or delete any data in the user tables within a database. A denial has a higher priority than a grant, so you can use this role to quickly restrict one's privileges without explicitly revoking permissions or roles. + DB_DENYDATAWRITER = 8; + + // Members of this fixed database role cannot read any data in the user tables within a database. A denial has a higher priority than a grant, so you can use this role to quickly restrict one's privileges without explicitly revoking permissions or roles. + DB_DENYDATAREADER = 9; + } + + // Name of the database the permission grants access to. + string database_name = 1; + + // Roles granted to the user within the database. + repeated Role roles = 2 [(size) = ">=1"]; +} + +message UserSpec { + // Name of the SQL Server user. + string name = 1 [(required) = true, (length) = "<=32", (pattern) = "[a-zA-Z0-9_]*"]; + + // Password of the SQL Server user. + string password = 2 [(required) = true, (length) = "8-128"]; + + // Set of permissions to grant to the user. + repeated Permission permissions = 3; + + // Set of server roles. + repeated ServerRole server_roles = 4; +} + +// Set of server roles. +enum ServerRole { + SERVER_ROLE_UNSPECIFIED = 0; + + // Effectively grants VIEW SERVER STATE to the login. + // + // That gives an ability to use various dynamic management views to monitor server state, including Activity Monitor tool that is built-in into SSMS. + // + // No intrusive actions are allowed, so this is pretty safe to grant. + MDB_MONITOR = 1; +} |