yandexcloud 0.363.0__py3-none-any.whl → 0.365.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of yandexcloud might be problematic. Click here for more details.

Files changed (76) hide show
  1. yandex/cloud/baremetal/v1alpha/rental_period_pb2.py +37 -0
  2. yandex/cloud/baremetal/v1alpha/rental_period_pb2.pyi +31 -0
  3. yandex/cloud/baremetal/v1alpha/rental_period_pb2_grpc.py +24 -0
  4. yandex/cloud/baremetal/v1alpha/rental_period_pb2_grpc.pyi +17 -0
  5. yandex/cloud/baremetal/v1alpha/rental_period_service_pb2.py +50 -0
  6. yandex/cloud/baremetal/v1alpha/rental_period_service_pb2.pyi +75 -0
  7. yandex/cloud/baremetal/v1alpha/rental_period_service_pb2_grpc.py +101 -0
  8. yandex/cloud/baremetal/v1alpha/rental_period_service_pb2_grpc.pyi +50 -0
  9. yandex/cloud/baremetal/v1alpha/server_service_pb2.pyi +8 -2
  10. yandex/cloud/dns/v1/dns_zone_service_pb2.py +37 -27
  11. yandex/cloud/dns/v1/dns_zone_service_pb2.pyi +42 -0
  12. yandex/cloud/dns/v1/dns_zone_service_pb2_grpc.py +44 -0
  13. yandex/cloud/dns/v1/dns_zone_service_pb2_grpc.pyi +20 -0
  14. yandex/cloud/gitlab/v1/package_options_pb2.py +35 -0
  15. yandex/cloud/gitlab/v1/package_options_pb2.pyi +8 -0
  16. yandex/cloud/gitlab/v1/package_options_pb2_grpc.py +24 -0
  17. yandex/cloud/gitlab/v1/package_options_pb2_grpc.pyi +17 -0
  18. yandex/cloud/iam/v1/workload/federated_credential_service_pb2.py +11 -11
  19. yandex/cloud/mdb/clickhouse/v1/cluster_service_pb2.py +184 -177
  20. yandex/cloud/mdb/clickhouse/v1/cluster_service_pb2_grpc.py +133 -0
  21. yandex/cloud/mdb/clickhouse/v1/cluster_service_pb2_grpc.pyi +61 -0
  22. yandex/cloud/mdb/greenplum/v1/cluster_service_pb2.py +98 -91
  23. yandex/cloud/mdb/greenplum/v1/cluster_service_pb2_grpc.py +133 -0
  24. yandex/cloud/mdb/greenplum/v1/cluster_service_pb2_grpc.pyi +61 -0
  25. yandex/cloud/mdb/kafka/v1/cluster_service_pb2.py +70 -63
  26. yandex/cloud/mdb/kafka/v1/cluster_service_pb2_grpc.py +133 -0
  27. yandex/cloud/mdb/kafka/v1/cluster_service_pb2_grpc.pyi +61 -0
  28. yandex/cloud/mdb/mongodb/v1/cluster_service_pb2.py +248 -241
  29. yandex/cloud/mdb/mongodb/v1/cluster_service_pb2_grpc.py +133 -0
  30. yandex/cloud/mdb/mongodb/v1/cluster_service_pb2_grpc.pyi +61 -0
  31. yandex/cloud/mdb/mysql/v1/cluster_service_pb2.py +110 -103
  32. yandex/cloud/mdb/mysql/v1/cluster_service_pb2_grpc.py +133 -0
  33. yandex/cloud/mdb/mysql/v1/cluster_service_pb2_grpc.pyi +61 -0
  34. yandex/cloud/mdb/opensearch/v1/cluster_service_pb2.py +146 -139
  35. yandex/cloud/mdb/opensearch/v1/cluster_service_pb2_grpc.py +133 -0
  36. yandex/cloud/mdb/opensearch/v1/cluster_service_pb2_grpc.pyi +61 -0
  37. yandex/cloud/mdb/postgresql/v1/cluster_service_pb2.py +114 -107
  38. yandex/cloud/mdb/postgresql/v1/cluster_service_pb2_grpc.py +133 -0
  39. yandex/cloud/mdb/postgresql/v1/cluster_service_pb2_grpc.pyi +61 -0
  40. yandex/cloud/mdb/postgresql/v1/user_pb2.py +27 -25
  41. yandex/cloud/mdb/postgresql/v1/user_pb2.pyi +27 -2
  42. yandex/cloud/mdb/postgresql/v1/user_service_pb2.py +33 -33
  43. yandex/cloud/mdb/postgresql/v1/user_service_pb2.pyi +5 -1
  44. yandex/cloud/mdb/redis/v1/cluster_service_pb2.py +132 -125
  45. yandex/cloud/mdb/redis/v1/cluster_service_pb2_grpc.py +133 -0
  46. yandex/cloud/mdb/redis/v1/cluster_service_pb2_grpc.pyi +61 -0
  47. yandex/cloud/mdb/spqr/v1/cluster_service_pb2.py +136 -129
  48. yandex/cloud/mdb/spqr/v1/cluster_service_pb2_grpc.py +133 -0
  49. yandex/cloud/mdb/spqr/v1/cluster_service_pb2_grpc.pyi +61 -0
  50. yandex/cloud/organizationmanager/v1/idp/application/__init__.py +0 -0
  51. yandex/cloud/organizationmanager/v1/idp/application/oauth/__init__.py +0 -0
  52. yandex/cloud/organizationmanager/v1/idp/application/oauth/application_pb2.py +55 -0
  53. yandex/cloud/organizationmanager/v1/idp/application/oauth/application_pb2.pyi +206 -0
  54. yandex/cloud/organizationmanager/v1/idp/application/oauth/application_pb2_grpc.py +24 -0
  55. yandex/cloud/organizationmanager/v1/idp/application/oauth/application_pb2_grpc.pyi +17 -0
  56. yandex/cloud/organizationmanager/v1/idp/application/oauth/application_service_pb2.py +178 -0
  57. yandex/cloud/organizationmanager/v1/idp/application/oauth/application_service_pb2.pyi +641 -0
  58. yandex/cloud/organizationmanager/v1/idp/application/oauth/application_service_pb2_grpc.py +634 -0
  59. yandex/cloud/organizationmanager/v1/idp/application/oauth/application_service_pb2_grpc.pyi +302 -0
  60. yandex/cloud/organizationmanager/v1/mfa_enforcement_pb2.py +41 -0
  61. yandex/cloud/organizationmanager/v1/mfa_enforcement_pb2.pyi +108 -0
  62. yandex/cloud/organizationmanager/v1/mfa_enforcement_pb2_grpc.py +24 -0
  63. yandex/cloud/organizationmanager/v1/mfa_enforcement_pb2_grpc.pyi +17 -0
  64. yandex/cloud/organizationmanager/v1/mfa_enforcement_service_pb2.py +156 -0
  65. yandex/cloud/organizationmanager/v1/mfa_enforcement_service_pb2.pyi +462 -0
  66. yandex/cloud/organizationmanager/v1/mfa_enforcement_service_pb2_grpc.py +446 -0
  67. yandex/cloud/organizationmanager/v1/mfa_enforcement_service_pb2_grpc.pyi +185 -0
  68. yandex/cloud/ytsaurus/v1/cluster_pb2.py +4 -2
  69. yandex/cloud/ytsaurus/v1/cluster_pb2.pyi +19 -1
  70. yandexcloud/__init__.py +1 -1
  71. {yandexcloud-0.363.0.dist-info → yandexcloud-0.365.0.dist-info}/METADATA +1 -1
  72. {yandexcloud-0.363.0.dist-info → yandexcloud-0.365.0.dist-info}/RECORD +76 -46
  73. {yandexcloud-0.363.0.dist-info → yandexcloud-0.365.0.dist-info}/AUTHORS +0 -0
  74. {yandexcloud-0.363.0.dist-info → yandexcloud-0.365.0.dist-info}/LICENSE +0 -0
  75. {yandexcloud-0.363.0.dist-info → yandexcloud-0.365.0.dist-info}/WHEEL +0 -0
  76. {yandexcloud-0.363.0.dist-info → yandexcloud-0.365.0.dist-info}/top_level.txt +0 -0
@@ -3,6 +3,7 @@
3
3
  import grpc
4
4
  import warnings
5
5
 
6
+ from yandex.cloud.access import access_pb2 as yandex_dot_cloud_dot_access_dot_access__pb2
6
7
  from yandex.cloud.mdb.postgresql.v1 import cluster_pb2 as yandex_dot_cloud_dot_mdb_dot_postgresql_dot_v1_dot_cluster__pb2
7
8
  from yandex.cloud.mdb.postgresql.v1 import cluster_service_pb2 as yandex_dot_cloud_dot_mdb_dot_postgresql_dot_v1_dot_cluster__service__pb2
8
9
  from yandex.cloud.operation import operation_pb2 as yandex_dot_cloud_dot_operation_dot_operation__pb2
@@ -137,6 +138,21 @@ class ClusterServiceStub(object):
137
138
  request_serializer=yandex_dot_cloud_dot_mdb_dot_postgresql_dot_v1_dot_cluster__service__pb2.UpdateClusterHostsRequest.SerializeToString,
138
139
  response_deserializer=yandex_dot_cloud_dot_operation_dot_operation__pb2.Operation.FromString,
139
140
  _registered_method=True)
141
+ self.ListAccessBindings = channel.unary_unary(
142
+ '/yandex.cloud.mdb.postgresql.v1.ClusterService/ListAccessBindings',
143
+ request_serializer=yandex_dot_cloud_dot_access_dot_access__pb2.ListAccessBindingsRequest.SerializeToString,
144
+ response_deserializer=yandex_dot_cloud_dot_access_dot_access__pb2.ListAccessBindingsResponse.FromString,
145
+ _registered_method=True)
146
+ self.SetAccessBindings = channel.unary_unary(
147
+ '/yandex.cloud.mdb.postgresql.v1.ClusterService/SetAccessBindings',
148
+ request_serializer=yandex_dot_cloud_dot_access_dot_access__pb2.SetAccessBindingsRequest.SerializeToString,
149
+ response_deserializer=yandex_dot_cloud_dot_operation_dot_operation__pb2.Operation.FromString,
150
+ _registered_method=True)
151
+ self.UpdateAccessBindings = channel.unary_unary(
152
+ '/yandex.cloud.mdb.postgresql.v1.ClusterService/UpdateAccessBindings',
153
+ request_serializer=yandex_dot_cloud_dot_access_dot_access__pb2.UpdateAccessBindingsRequest.SerializeToString,
154
+ response_deserializer=yandex_dot_cloud_dot_operation_dot_operation__pb2.Operation.FromString,
155
+ _registered_method=True)
140
156
 
141
157
 
142
158
  class ClusterServiceServicer(object):
@@ -286,6 +302,27 @@ class ClusterServiceServicer(object):
286
302
  context.set_details('Method not implemented!')
287
303
  raise NotImplementedError('Method not implemented!')
288
304
 
305
+ def ListAccessBindings(self, request, context):
306
+ """Retrieves a list of access bindings for the specified PostgreSQL cluster.
307
+ """
308
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
309
+ context.set_details('Method not implemented!')
310
+ raise NotImplementedError('Method not implemented!')
311
+
312
+ def SetAccessBindings(self, request, context):
313
+ """Sets access bindings for the specified PostgreSQL cluster.
314
+ """
315
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
316
+ context.set_details('Method not implemented!')
317
+ raise NotImplementedError('Method not implemented!')
318
+
319
+ def UpdateAccessBindings(self, request, context):
320
+ """Updates access bindings for the specified PostgreSQL cluster.
321
+ """
322
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
323
+ context.set_details('Method not implemented!')
324
+ raise NotImplementedError('Method not implemented!')
325
+
289
326
 
290
327
  def add_ClusterServiceServicer_to_server(servicer, server):
291
328
  rpc_method_handlers = {
@@ -389,6 +426,21 @@ def add_ClusterServiceServicer_to_server(servicer, server):
389
426
  request_deserializer=yandex_dot_cloud_dot_mdb_dot_postgresql_dot_v1_dot_cluster__service__pb2.UpdateClusterHostsRequest.FromString,
390
427
  response_serializer=yandex_dot_cloud_dot_operation_dot_operation__pb2.Operation.SerializeToString,
391
428
  ),
429
+ 'ListAccessBindings': grpc.unary_unary_rpc_method_handler(
430
+ servicer.ListAccessBindings,
431
+ request_deserializer=yandex_dot_cloud_dot_access_dot_access__pb2.ListAccessBindingsRequest.FromString,
432
+ response_serializer=yandex_dot_cloud_dot_access_dot_access__pb2.ListAccessBindingsResponse.SerializeToString,
433
+ ),
434
+ 'SetAccessBindings': grpc.unary_unary_rpc_method_handler(
435
+ servicer.SetAccessBindings,
436
+ request_deserializer=yandex_dot_cloud_dot_access_dot_access__pb2.SetAccessBindingsRequest.FromString,
437
+ response_serializer=yandex_dot_cloud_dot_operation_dot_operation__pb2.Operation.SerializeToString,
438
+ ),
439
+ 'UpdateAccessBindings': grpc.unary_unary_rpc_method_handler(
440
+ servicer.UpdateAccessBindings,
441
+ request_deserializer=yandex_dot_cloud_dot_access_dot_access__pb2.UpdateAccessBindingsRequest.FromString,
442
+ response_serializer=yandex_dot_cloud_dot_operation_dot_operation__pb2.Operation.SerializeToString,
443
+ ),
392
444
  }
393
445
  generic_handler = grpc.method_handlers_generic_handler(
394
446
  'yandex.cloud.mdb.postgresql.v1.ClusterService', rpc_method_handlers)
@@ -940,3 +992,84 @@ class ClusterService(object):
940
992
  timeout,
941
993
  metadata,
942
994
  _registered_method=True)
995
+
996
+ @staticmethod
997
+ def ListAccessBindings(request,
998
+ target,
999
+ options=(),
1000
+ channel_credentials=None,
1001
+ call_credentials=None,
1002
+ insecure=False,
1003
+ compression=None,
1004
+ wait_for_ready=None,
1005
+ timeout=None,
1006
+ metadata=None):
1007
+ return grpc.experimental.unary_unary(
1008
+ request,
1009
+ target,
1010
+ '/yandex.cloud.mdb.postgresql.v1.ClusterService/ListAccessBindings',
1011
+ yandex_dot_cloud_dot_access_dot_access__pb2.ListAccessBindingsRequest.SerializeToString,
1012
+ yandex_dot_cloud_dot_access_dot_access__pb2.ListAccessBindingsResponse.FromString,
1013
+ options,
1014
+ channel_credentials,
1015
+ insecure,
1016
+ call_credentials,
1017
+ compression,
1018
+ wait_for_ready,
1019
+ timeout,
1020
+ metadata,
1021
+ _registered_method=True)
1022
+
1023
+ @staticmethod
1024
+ def SetAccessBindings(request,
1025
+ target,
1026
+ options=(),
1027
+ channel_credentials=None,
1028
+ call_credentials=None,
1029
+ insecure=False,
1030
+ compression=None,
1031
+ wait_for_ready=None,
1032
+ timeout=None,
1033
+ metadata=None):
1034
+ return grpc.experimental.unary_unary(
1035
+ request,
1036
+ target,
1037
+ '/yandex.cloud.mdb.postgresql.v1.ClusterService/SetAccessBindings',
1038
+ yandex_dot_cloud_dot_access_dot_access__pb2.SetAccessBindingsRequest.SerializeToString,
1039
+ yandex_dot_cloud_dot_operation_dot_operation__pb2.Operation.FromString,
1040
+ options,
1041
+ channel_credentials,
1042
+ insecure,
1043
+ call_credentials,
1044
+ compression,
1045
+ wait_for_ready,
1046
+ timeout,
1047
+ metadata,
1048
+ _registered_method=True)
1049
+
1050
+ @staticmethod
1051
+ def UpdateAccessBindings(request,
1052
+ target,
1053
+ options=(),
1054
+ channel_credentials=None,
1055
+ call_credentials=None,
1056
+ insecure=False,
1057
+ compression=None,
1058
+ wait_for_ready=None,
1059
+ timeout=None,
1060
+ metadata=None):
1061
+ return grpc.experimental.unary_unary(
1062
+ request,
1063
+ target,
1064
+ '/yandex.cloud.mdb.postgresql.v1.ClusterService/UpdateAccessBindings',
1065
+ yandex_dot_cloud_dot_access_dot_access__pb2.UpdateAccessBindingsRequest.SerializeToString,
1066
+ yandex_dot_cloud_dot_operation_dot_operation__pb2.Operation.FromString,
1067
+ options,
1068
+ channel_credentials,
1069
+ insecure,
1070
+ call_credentials,
1071
+ compression,
1072
+ wait_for_ready,
1073
+ timeout,
1074
+ metadata,
1075
+ _registered_method=True)
@@ -8,6 +8,7 @@ import collections.abc
8
8
  import grpc
9
9
  import grpc.aio
10
10
  import typing
11
+ import yandex.cloud.access.access_pb2
11
12
  import yandex.cloud.mdb.postgresql.v1.cluster_pb2
12
13
  import yandex.cloud.mdb.postgresql.v1.cluster_service_pb2
13
14
  import yandex.cloud.operation.operation_pb2
@@ -148,6 +149,24 @@ class ClusterServiceStub:
148
149
  ]
149
150
  """Updates the specified hosts."""
150
151
 
152
+ ListAccessBindings: grpc.UnaryUnaryMultiCallable[
153
+ yandex.cloud.access.access_pb2.ListAccessBindingsRequest,
154
+ yandex.cloud.access.access_pb2.ListAccessBindingsResponse,
155
+ ]
156
+ """Retrieves a list of access bindings for the specified PostgreSQL cluster."""
157
+
158
+ SetAccessBindings: grpc.UnaryUnaryMultiCallable[
159
+ yandex.cloud.access.access_pb2.SetAccessBindingsRequest,
160
+ yandex.cloud.operation.operation_pb2.Operation,
161
+ ]
162
+ """Sets access bindings for the specified PostgreSQL cluster."""
163
+
164
+ UpdateAccessBindings: grpc.UnaryUnaryMultiCallable[
165
+ yandex.cloud.access.access_pb2.UpdateAccessBindingsRequest,
166
+ yandex.cloud.operation.operation_pb2.Operation,
167
+ ]
168
+ """Updates access bindings for the specified PostgreSQL cluster."""
169
+
151
170
  class ClusterServiceAsyncStub:
152
171
  """A set of methods for managing PostgreSQL Cluster resources."""
153
172
 
@@ -276,6 +295,24 @@ class ClusterServiceAsyncStub:
276
295
  ]
277
296
  """Updates the specified hosts."""
278
297
 
298
+ ListAccessBindings: grpc.aio.UnaryUnaryMultiCallable[
299
+ yandex.cloud.access.access_pb2.ListAccessBindingsRequest,
300
+ yandex.cloud.access.access_pb2.ListAccessBindingsResponse,
301
+ ]
302
+ """Retrieves a list of access bindings for the specified PostgreSQL cluster."""
303
+
304
+ SetAccessBindings: grpc.aio.UnaryUnaryMultiCallable[
305
+ yandex.cloud.access.access_pb2.SetAccessBindingsRequest,
306
+ yandex.cloud.operation.operation_pb2.Operation,
307
+ ]
308
+ """Sets access bindings for the specified PostgreSQL cluster."""
309
+
310
+ UpdateAccessBindings: grpc.aio.UnaryUnaryMultiCallable[
311
+ yandex.cloud.access.access_pb2.UpdateAccessBindingsRequest,
312
+ yandex.cloud.operation.operation_pb2.Operation,
313
+ ]
314
+ """Updates access bindings for the specified PostgreSQL cluster."""
315
+
279
316
  class ClusterServiceServicer(metaclass=abc.ABCMeta):
280
317
  """A set of methods for managing PostgreSQL Cluster resources."""
281
318
 
@@ -444,4 +481,28 @@ class ClusterServiceServicer(metaclass=abc.ABCMeta):
444
481
  ) -> typing.Union[yandex.cloud.operation.operation_pb2.Operation, collections.abc.Awaitable[yandex.cloud.operation.operation_pb2.Operation]]:
445
482
  """Updates the specified hosts."""
446
483
 
484
+ @abc.abstractmethod
485
+ def ListAccessBindings(
486
+ self,
487
+ request: yandex.cloud.access.access_pb2.ListAccessBindingsRequest,
488
+ context: _ServicerContext,
489
+ ) -> typing.Union[yandex.cloud.access.access_pb2.ListAccessBindingsResponse, collections.abc.Awaitable[yandex.cloud.access.access_pb2.ListAccessBindingsResponse]]:
490
+ """Retrieves a list of access bindings for the specified PostgreSQL cluster."""
491
+
492
+ @abc.abstractmethod
493
+ def SetAccessBindings(
494
+ self,
495
+ request: yandex.cloud.access.access_pb2.SetAccessBindingsRequest,
496
+ context: _ServicerContext,
497
+ ) -> typing.Union[yandex.cloud.operation.operation_pb2.Operation, collections.abc.Awaitable[yandex.cloud.operation.operation_pb2.Operation]]:
498
+ """Sets access bindings for the specified PostgreSQL cluster."""
499
+
500
+ @abc.abstractmethod
501
+ def UpdateAccessBindings(
502
+ self,
503
+ request: yandex.cloud.access.access_pb2.UpdateAccessBindingsRequest,
504
+ context: _ServicerContext,
505
+ ) -> typing.Union[yandex.cloud.operation.operation_pb2.Operation, collections.abc.Awaitable[yandex.cloud.operation.operation_pb2.Operation]]:
506
+ """Updates access bindings for the specified PostgreSQL cluster."""
507
+
447
508
  def add_ClusterServiceServicer_to_server(servicer: ClusterServiceServicer, server: typing.Union[grpc.Server, grpc.aio.Server]) -> None: ...
@@ -26,7 +26,7 @@ from google.protobuf import wrappers_pb2 as google_dot_protobuf_dot_wrappers__pb
26
26
  from yandex.cloud import validation_pb2 as yandex_dot_cloud_dot_validation__pb2
27
27
 
28
28
 
29
- DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n)yandex/cloud/mdb/postgresql/v1/user.proto\x12\x1eyandex.cloud.mdb.postgresql.v1\x1a\x1egoogle/protobuf/wrappers.proto\x1a\x1dyandex/cloud/validation.proto\"\xf5\x03\n\x04User\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\x12\n\ncluster_id\x18\x02 \x01(\t\x12?\n\x0bpermissions\x18\x03 \x03(\x0b\x32*.yandex.cloud.mdb.postgresql.v1.Permission\x12\x12\n\nconn_limit\x18\x04 \x01(\x03\x12>\n\x08settings\x18\x05 \x01(\x0b\x32,.yandex.cloud.mdb.postgresql.v1.UserSettings\x12)\n\x05login\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12)\n\x06grants\x18\x07 \x03(\tB\x19\xf2\xc7\x31\r[a-zA-Z0-9_]*\x8a\xc8\x31\x04<=63\x12\x37\n\x13\x64\x65letion_protection\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12X\n\x18user_password_encryption\x18\t \x01(\x0e\x32\x36.yandex.cloud.mdb.postgresql.v1.UserPasswordEncryption\x12M\n\x12\x63onnection_manager\x18\n \x01(\x0b\x32\x31.yandex.cloud.mdb.postgresql.v1.ConnectionManager\"#\n\nPermission\x12\x15\n\rdatabase_name\x18\x01 \x01(\t\"*\n\x11\x43onnectionManager\x12\x15\n\rconnection_id\x18\x01 \x01(\t\"\xb5\x04\n\x08UserSpec\x12,\n\x04name\x18\x01 \x01(\tB\x1e\xe8\xc7\x31\x01\xf2\xc7\x31\x0e[a-zA-Z0-9_-]*\x8a\xc8\x31\x04<=63\x12\x1f\n\x08password\x18\x02 \x01(\tB\r\xe8\xc7\x31\x01\x8a\xc8\x31\x05\x38-128\x12?\n\x0bpermissions\x18\x03 \x03(\x0b\x32*.yandex.cloud.mdb.postgresql.v1.Permission\x12\x39\n\nconn_limit\x18\x04 \x01(\x0b\x32\x1b.google.protobuf.Int64ValueB\x08\xfa\xc7\x31\x04>=10\x12>\n\x08settings\x18\x05 \x01(\x0b\x32,.yandex.cloud.mdb.postgresql.v1.UserSettings\x12)\n\x05login\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12)\n\x06grants\x18\x07 \x03(\tB\x19\xf2\xc7\x31\r[a-zA-Z0-9_]*\x8a\xc8\x31\x04<=63\x12\x37\n\x13\x64\x65letion_protection\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12X\n\x18user_password_encryption\x18\t \x01(\x0e\x32\x36.yandex.cloud.mdb.postgresql.v1.UserPasswordEncryption\x12\x35\n\x11generate_password\x18\n \x01(\x0b\x32\x1a.google.protobuf.BoolValue\"\x88\x03\n\x0fPGAuditSettings\x12O\n\x03log\x18\x01 \x03(\x0e\x32\x42.yandex.cloud.mdb.postgresql.v1.PGAuditSettings.PGAuditSettingsLog\"\xa3\x02\n\x12PGAuditSettingsLog\x12%\n!PG_AUDIT_SETTINGS_LOG_UNSPECIFIED\x10\x00\x12\x1e\n\x1aPG_AUDIT_SETTINGS_LOG_READ\x10\x01\x12\x1f\n\x1bPG_AUDIT_SETTINGS_LOG_WRITE\x10\x02\x12\"\n\x1ePG_AUDIT_SETTINGS_LOG_FUNCTION\x10\x03\x12\x1e\n\x1aPG_AUDIT_SETTINGS_LOG_ROLE\x10\x04\x12\x1d\n\x19PG_AUDIT_SETTINGS_LOG_DDL\x10\x05\x12\x1e\n\x1aPG_AUDIT_SETTINGS_LOG_MISC\x10\x06\x12\"\n\x1ePG_AUDIT_SETTINGS_LOG_MISC_SET\x10\x07\"\xcc\x0c\n\x0cUserSettings\x12h\n\x1d\x64\x65\x66\x61ult_transaction_isolation\x18\x01 \x01(\x0e\x32\x41.yandex.cloud.mdb.postgresql.v1.UserSettings.TransactionIsolation\x12\x31\n\x0clock_timeout\x18\x02 \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12?\n\x1alog_min_duration_statement\x18\x03 \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12Z\n\x12synchronous_commit\x18\x04 \x01(\x0e\x32>.yandex.cloud.mdb.postgresql.v1.UserSettings.SynchronousCommit\x12\x34\n\x0ftemp_file_limit\x18\x05 \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12P\n\rlog_statement\x18\x06 \x01(\x0e\x32\x39.yandex.cloud.mdb.postgresql.v1.UserSettings.LogStatement\x12K\n\tpool_mode\x18\x07 \x01(\x0e\x32\x38.yandex.cloud.mdb.postgresql.v1.UserSettings.PoolingMode\x12?\n\x1bprepared_statements_pooling\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12\x34\n\x0f\x63\x61tchup_timeout\x18\t \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12\x37\n\x12wal_sender_timeout\x18\n \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12Z\n#idle_in_transaction_session_timeout\x18\x0b \x01(\x0b\x32\x1b.google.protobuf.Int64ValueB\x10\xfa\xc7\x31\x0c\x30-2147483647\x12\x36\n\x11statement_timeout\x18\x0c \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12@\n\x07pgaudit\x18\r \x01(\x0b\x32/.yandex.cloud.mdb.postgresql.v1.PGAuditSettings\"\xd6\x01\n\x11SynchronousCommit\x12\"\n\x1eSYNCHRONOUS_COMMIT_UNSPECIFIED\x10\x00\x12\x19\n\x15SYNCHRONOUS_COMMIT_ON\x10\x01\x12\x1a\n\x16SYNCHRONOUS_COMMIT_OFF\x10\x02\x12\x1c\n\x18SYNCHRONOUS_COMMIT_LOCAL\x10\x03\x12#\n\x1fSYNCHRONOUS_COMMIT_REMOTE_WRITE\x10\x04\x12#\n\x1fSYNCHRONOUS_COMMIT_REMOTE_APPLY\x10\x05\"\x8a\x01\n\x0cLogStatement\x12\x1d\n\x19LOG_STATEMENT_UNSPECIFIED\x10\x00\x12\x16\n\x12LOG_STATEMENT_NONE\x10\x01\x12\x15\n\x11LOG_STATEMENT_DDL\x10\x02\x12\x15\n\x11LOG_STATEMENT_MOD\x10\x03\x12\x15\n\x11LOG_STATEMENT_ALL\x10\x04\"\xe6\x01\n\x14TransactionIsolation\x12%\n!TRANSACTION_ISOLATION_UNSPECIFIED\x10\x00\x12*\n&TRANSACTION_ISOLATION_READ_UNCOMMITTED\x10\x01\x12(\n$TRANSACTION_ISOLATION_READ_COMMITTED\x10\x02\x12)\n%TRANSACTION_ISOLATION_REPEATABLE_READ\x10\x03\x12&\n\"TRANSACTION_ISOLATION_SERIALIZABLE\x10\x04\"X\n\x0bPoolingMode\x12\x1c\n\x18POOLING_MODE_UNSPECIFIED\x10\x00\x12\x0b\n\x07SESSION\x10\x01\x12\x0f\n\x0bTRANSACTION\x10\x02\x12\r\n\tSTATEMENT\x10\x03*\x90\x01\n\x16UserPasswordEncryption\x12(\n$USER_PASSWORD_ENCRYPTION_UNSPECIFIED\x10\x00\x12 \n\x1cUSER_PASSWORD_ENCRYPTION_MD5\x10\x01\x12*\n&USER_PASSWORD_ENCRYPTION_SCRAM_SHA_256\x10\x02\x42s\n\"yandex.cloud.api.mdb.postgresql.v1ZMgithub.com/yandex-cloud/go-genproto/yandex/cloud/mdb/postgresql/v1;postgresqlb\x06proto3')
29
+ DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n)yandex/cloud/mdb/postgresql/v1/user.proto\x12\x1eyandex.cloud.mdb.postgresql.v1\x1a\x1egoogle/protobuf/wrappers.proto\x1a\x1dyandex/cloud/validation.proto\"\xb6\x04\n\x04User\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\x12\n\ncluster_id\x18\x02 \x01(\t\x12?\n\x0bpermissions\x18\x03 \x03(\x0b\x32*.yandex.cloud.mdb.postgresql.v1.Permission\x12\x12\n\nconn_limit\x18\x04 \x01(\x03\x12>\n\x08settings\x18\x05 \x01(\x0b\x32,.yandex.cloud.mdb.postgresql.v1.UserSettings\x12)\n\x05login\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12)\n\x06grants\x18\x07 \x03(\tB\x19\xf2\xc7\x31\r[a-zA-Z0-9_]*\x8a\xc8\x31\x04<=63\x12\x37\n\x13\x64\x65letion_protection\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12X\n\x18user_password_encryption\x18\t \x01(\x0e\x32\x36.yandex.cloud.mdb.postgresql.v1.UserPasswordEncryption\x12M\n\x12\x63onnection_manager\x18\n \x01(\x0b\x32\x31.yandex.cloud.mdb.postgresql.v1.ConnectionManager\x12?\n\x0b\x61uth_method\x18\x0b \x01(\x0e\x32*.yandex.cloud.mdb.postgresql.v1.AuthMethod\"#\n\nPermission\x12\x15\n\rdatabase_name\x18\x01 \x01(\t\"*\n\x11\x43onnectionManager\x12\x15\n\rconnection_id\x18\x01 \x01(\t\"\xf8\x04\n\x08UserSpec\x12.\n\x04name\x18\x01 \x01(\tB \xe8\xc7\x31\x01\xf2\xc7\x31\x10[a-zA-Z0-9_@.-]*\x8a\xc8\x31\x04<=63\x12\x1f\n\x08password\x18\x02 \x01(\tB\r\xe8\xc7\x31\x01\x8a\xc8\x31\x05\x38-128\x12?\n\x0bpermissions\x18\x03 \x03(\x0b\x32*.yandex.cloud.mdb.postgresql.v1.Permission\x12\x39\n\nconn_limit\x18\x04 \x01(\x0b\x32\x1b.google.protobuf.Int64ValueB\x08\xfa\xc7\x31\x04>=10\x12>\n\x08settings\x18\x05 \x01(\x0b\x32,.yandex.cloud.mdb.postgresql.v1.UserSettings\x12)\n\x05login\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12)\n\x06grants\x18\x07 \x03(\tB\x19\xf2\xc7\x31\r[a-zA-Z0-9_]*\x8a\xc8\x31\x04<=63\x12\x37\n\x13\x64\x65letion_protection\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12X\n\x18user_password_encryption\x18\t \x01(\x0e\x32\x36.yandex.cloud.mdb.postgresql.v1.UserPasswordEncryption\x12\x35\n\x11generate_password\x18\n \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12?\n\x0b\x61uth_method\x18\x0b \x01(\x0e\x32*.yandex.cloud.mdb.postgresql.v1.AuthMethod\"\x88\x03\n\x0fPGAuditSettings\x12O\n\x03log\x18\x01 \x03(\x0e\x32\x42.yandex.cloud.mdb.postgresql.v1.PGAuditSettings.PGAuditSettingsLog\"\xa3\x02\n\x12PGAuditSettingsLog\x12%\n!PG_AUDIT_SETTINGS_LOG_UNSPECIFIED\x10\x00\x12\x1e\n\x1aPG_AUDIT_SETTINGS_LOG_READ\x10\x01\x12\x1f\n\x1bPG_AUDIT_SETTINGS_LOG_WRITE\x10\x02\x12\"\n\x1ePG_AUDIT_SETTINGS_LOG_FUNCTION\x10\x03\x12\x1e\n\x1aPG_AUDIT_SETTINGS_LOG_ROLE\x10\x04\x12\x1d\n\x19PG_AUDIT_SETTINGS_LOG_DDL\x10\x05\x12\x1e\n\x1aPG_AUDIT_SETTINGS_LOG_MISC\x10\x06\x12\"\n\x1ePG_AUDIT_SETTINGS_LOG_MISC_SET\x10\x07\"\xcc\x0c\n\x0cUserSettings\x12h\n\x1d\x64\x65\x66\x61ult_transaction_isolation\x18\x01 \x01(\x0e\x32\x41.yandex.cloud.mdb.postgresql.v1.UserSettings.TransactionIsolation\x12\x31\n\x0clock_timeout\x18\x02 \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12?\n\x1alog_min_duration_statement\x18\x03 \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12Z\n\x12synchronous_commit\x18\x04 \x01(\x0e\x32>.yandex.cloud.mdb.postgresql.v1.UserSettings.SynchronousCommit\x12\x34\n\x0ftemp_file_limit\x18\x05 \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12P\n\rlog_statement\x18\x06 \x01(\x0e\x32\x39.yandex.cloud.mdb.postgresql.v1.UserSettings.LogStatement\x12K\n\tpool_mode\x18\x07 \x01(\x0e\x32\x38.yandex.cloud.mdb.postgresql.v1.UserSettings.PoolingMode\x12?\n\x1bprepared_statements_pooling\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12\x34\n\x0f\x63\x61tchup_timeout\x18\t \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12\x37\n\x12wal_sender_timeout\x18\n \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12Z\n#idle_in_transaction_session_timeout\x18\x0b \x01(\x0b\x32\x1b.google.protobuf.Int64ValueB\x10\xfa\xc7\x31\x0c\x30-2147483647\x12\x36\n\x11statement_timeout\x18\x0c \x01(\x0b\x32\x1b.google.protobuf.Int64Value\x12@\n\x07pgaudit\x18\r \x01(\x0b\x32/.yandex.cloud.mdb.postgresql.v1.PGAuditSettings\"\xd6\x01\n\x11SynchronousCommit\x12\"\n\x1eSYNCHRONOUS_COMMIT_UNSPECIFIED\x10\x00\x12\x19\n\x15SYNCHRONOUS_COMMIT_ON\x10\x01\x12\x1a\n\x16SYNCHRONOUS_COMMIT_OFF\x10\x02\x12\x1c\n\x18SYNCHRONOUS_COMMIT_LOCAL\x10\x03\x12#\n\x1fSYNCHRONOUS_COMMIT_REMOTE_WRITE\x10\x04\x12#\n\x1fSYNCHRONOUS_COMMIT_REMOTE_APPLY\x10\x05\"\x8a\x01\n\x0cLogStatement\x12\x1d\n\x19LOG_STATEMENT_UNSPECIFIED\x10\x00\x12\x16\n\x12LOG_STATEMENT_NONE\x10\x01\x12\x15\n\x11LOG_STATEMENT_DDL\x10\x02\x12\x15\n\x11LOG_STATEMENT_MOD\x10\x03\x12\x15\n\x11LOG_STATEMENT_ALL\x10\x04\"\xe6\x01\n\x14TransactionIsolation\x12%\n!TRANSACTION_ISOLATION_UNSPECIFIED\x10\x00\x12*\n&TRANSACTION_ISOLATION_READ_UNCOMMITTED\x10\x01\x12(\n$TRANSACTION_ISOLATION_READ_COMMITTED\x10\x02\x12)\n%TRANSACTION_ISOLATION_REPEATABLE_READ\x10\x03\x12&\n\"TRANSACTION_ISOLATION_SERIALIZABLE\x10\x04\"X\n\x0bPoolingMode\x12\x1c\n\x18POOLING_MODE_UNSPECIFIED\x10\x00\x12\x0b\n\x07SESSION\x10\x01\x12\x0f\n\x0bTRANSACTION\x10\x02\x12\r\n\tSTATEMENT\x10\x03*X\n\nAuthMethod\x12\x1b\n\x17\x41UTH_METHOD_UNSPECIFIED\x10\x00\x12\x18\n\x14\x41UTH_METHOD_PASSWORD\x10\x01\x12\x13\n\x0f\x41UTH_METHOD_IAM\x10\x02*\x90\x01\n\x16UserPasswordEncryption\x12(\n$USER_PASSWORD_ENCRYPTION_UNSPECIFIED\x10\x00\x12 \n\x1cUSER_PASSWORD_ENCRYPTION_MD5\x10\x01\x12*\n&USER_PASSWORD_ENCRYPTION_SCRAM_SHA_256\x10\x02\x42s\n\"yandex.cloud.api.mdb.postgresql.v1ZMgithub.com/yandex-cloud/go-genproto/yandex/cloud/mdb/postgresql/v1;postgresqlb\x06proto3')
30
30
 
31
31
  _globals = globals()
32
32
  _builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals)
@@ -37,7 +37,7 @@ if not _descriptor._USE_C_DESCRIPTORS:
37
37
  _globals['_USER'].fields_by_name['grants']._loaded_options = None
38
38
  _globals['_USER'].fields_by_name['grants']._serialized_options = b'\362\3071\r[a-zA-Z0-9_]*\212\3101\004<=63'
39
39
  _globals['_USERSPEC'].fields_by_name['name']._loaded_options = None
40
- _globals['_USERSPEC'].fields_by_name['name']._serialized_options = b'\350\3071\001\362\3071\016[a-zA-Z0-9_-]*\212\3101\004<=63'
40
+ _globals['_USERSPEC'].fields_by_name['name']._serialized_options = b'\350\3071\001\362\3071\020[a-zA-Z0-9_@.-]*\212\3101\004<=63'
41
41
  _globals['_USERSPEC'].fields_by_name['password']._loaded_options = None
42
42
  _globals['_USERSPEC'].fields_by_name['password']._serialized_options = b'\350\3071\001\212\3101\0058-128'
43
43
  _globals['_USERSPEC'].fields_by_name['conn_limit']._loaded_options = None
@@ -46,28 +46,30 @@ if not _descriptor._USE_C_DESCRIPTORS:
46
46
  _globals['_USERSPEC'].fields_by_name['grants']._serialized_options = b'\362\3071\r[a-zA-Z0-9_]*\212\3101\004<=63'
47
47
  _globals['_USERSETTINGS'].fields_by_name['idle_in_transaction_session_timeout']._loaded_options = None
48
48
  _globals['_USERSETTINGS'].fields_by_name['idle_in_transaction_session_timeout']._serialized_options = b'\372\3071\0140-2147483647'
49
- _globals['_USERPASSWORDENCRYPTION']._serialized_start=3304
50
- _globals['_USERPASSWORDENCRYPTION']._serialized_end=3448
49
+ _globals['_AUTHMETHOD']._serialized_start=3435
50
+ _globals['_AUTHMETHOD']._serialized_end=3523
51
+ _globals['_USERPASSWORDENCRYPTION']._serialized_start=3526
52
+ _globals['_USERPASSWORDENCRYPTION']._serialized_end=3670
51
53
  _globals['_USER']._serialized_start=141
52
- _globals['_USER']._serialized_end=642
53
- _globals['_PERMISSION']._serialized_start=644
54
- _globals['_PERMISSION']._serialized_end=679
55
- _globals['_CONNECTIONMANAGER']._serialized_start=681
56
- _globals['_CONNECTIONMANAGER']._serialized_end=723
57
- _globals['_USERSPEC']._serialized_start=726
58
- _globals['_USERSPEC']._serialized_end=1291
59
- _globals['_PGAUDITSETTINGS']._serialized_start=1294
60
- _globals['_PGAUDITSETTINGS']._serialized_end=1686
61
- _globals['_PGAUDITSETTINGS_PGAUDITSETTINGSLOG']._serialized_start=1395
62
- _globals['_PGAUDITSETTINGS_PGAUDITSETTINGSLOG']._serialized_end=1686
63
- _globals['_USERSETTINGS']._serialized_start=1689
64
- _globals['_USERSETTINGS']._serialized_end=3301
65
- _globals['_USERSETTINGS_SYNCHRONOUSCOMMIT']._serialized_start=2623
66
- _globals['_USERSETTINGS_SYNCHRONOUSCOMMIT']._serialized_end=2837
67
- _globals['_USERSETTINGS_LOGSTATEMENT']._serialized_start=2840
68
- _globals['_USERSETTINGS_LOGSTATEMENT']._serialized_end=2978
69
- _globals['_USERSETTINGS_TRANSACTIONISOLATION']._serialized_start=2981
70
- _globals['_USERSETTINGS_TRANSACTIONISOLATION']._serialized_end=3211
71
- _globals['_USERSETTINGS_POOLINGMODE']._serialized_start=3213
72
- _globals['_USERSETTINGS_POOLINGMODE']._serialized_end=3301
54
+ _globals['_USER']._serialized_end=707
55
+ _globals['_PERMISSION']._serialized_start=709
56
+ _globals['_PERMISSION']._serialized_end=744
57
+ _globals['_CONNECTIONMANAGER']._serialized_start=746
58
+ _globals['_CONNECTIONMANAGER']._serialized_end=788
59
+ _globals['_USERSPEC']._serialized_start=791
60
+ _globals['_USERSPEC']._serialized_end=1423
61
+ _globals['_PGAUDITSETTINGS']._serialized_start=1426
62
+ _globals['_PGAUDITSETTINGS']._serialized_end=1818
63
+ _globals['_PGAUDITSETTINGS_PGAUDITSETTINGSLOG']._serialized_start=1527
64
+ _globals['_PGAUDITSETTINGS_PGAUDITSETTINGSLOG']._serialized_end=1818
65
+ _globals['_USERSETTINGS']._serialized_start=1821
66
+ _globals['_USERSETTINGS']._serialized_end=3433
67
+ _globals['_USERSETTINGS_SYNCHRONOUSCOMMIT']._serialized_start=2755
68
+ _globals['_USERSETTINGS_SYNCHRONOUSCOMMIT']._serialized_end=2969
69
+ _globals['_USERSETTINGS_LOGSTATEMENT']._serialized_start=2972
70
+ _globals['_USERSETTINGS_LOGSTATEMENT']._serialized_end=3110
71
+ _globals['_USERSETTINGS_TRANSACTIONISOLATION']._serialized_start=3113
72
+ _globals['_USERSETTINGS_TRANSACTIONISOLATION']._serialized_end=3343
73
+ _globals['_USERSETTINGS_POOLINGMODE']._serialized_start=3345
74
+ _globals['_USERSETTINGS_POOLINGMODE']._serialized_end=3433
73
75
  # @@protoc_insertion_point(module_scope)
@@ -20,6 +20,23 @@ else:
20
20
 
21
21
  DESCRIPTOR: google.protobuf.descriptor.FileDescriptor
22
22
 
23
+ class _AuthMethod:
24
+ ValueType = typing.NewType("ValueType", builtins.int)
25
+ V: typing_extensions.TypeAlias = ValueType
26
+
27
+ class _AuthMethodEnumTypeWrapper(google.protobuf.internal.enum_type_wrapper._EnumTypeWrapper[_AuthMethod.ValueType], builtins.type):
28
+ DESCRIPTOR: google.protobuf.descriptor.EnumDescriptor
29
+ AUTH_METHOD_UNSPECIFIED: _AuthMethod.ValueType # 0
30
+ AUTH_METHOD_PASSWORD: _AuthMethod.ValueType # 1
31
+ AUTH_METHOD_IAM: _AuthMethod.ValueType # 2
32
+
33
+ class AuthMethod(_AuthMethod, metaclass=_AuthMethodEnumTypeWrapper): ...
34
+
35
+ AUTH_METHOD_UNSPECIFIED: AuthMethod.ValueType # 0
36
+ AUTH_METHOD_PASSWORD: AuthMethod.ValueType # 1
37
+ AUTH_METHOD_IAM: AuthMethod.ValueType # 2
38
+ global___AuthMethod = AuthMethod
39
+
23
40
  class _UserPasswordEncryption:
24
41
  ValueType = typing.NewType("ValueType", builtins.int)
25
42
  V: typing_extensions.TypeAlias = ValueType
@@ -55,6 +72,7 @@ class User(google.protobuf.message.Message):
55
72
  DELETION_PROTECTION_FIELD_NUMBER: builtins.int
56
73
  USER_PASSWORD_ENCRYPTION_FIELD_NUMBER: builtins.int
57
74
  CONNECTION_MANAGER_FIELD_NUMBER: builtins.int
75
+ AUTH_METHOD_FIELD_NUMBER: builtins.int
58
76
  name: builtins.str
59
77
  """Name of the PostgreSQL user."""
60
78
  cluster_id: builtins.str
@@ -73,6 +91,8 @@ class User(google.protobuf.message.Message):
73
91
  Possible values are `` USER_PASSWORD_ENCRYPTION_MD5 `` or `` USER_PASSWORD_ENCRYPTION_SCRAM_SHA_256 ``.
74
92
  The default is `` password_encryption `` setting for cluster.
75
93
  """
94
+ auth_method: global___AuthMethod.ValueType
95
+ """Auth method for user"""
76
96
  @property
77
97
  def permissions(self) -> google.protobuf.internal.containers.RepeatedCompositeFieldContainer[global___Permission]:
78
98
  """Set of permissions granted to the user to access specific databases."""
@@ -117,9 +137,10 @@ class User(google.protobuf.message.Message):
117
137
  deletion_protection: google.protobuf.wrappers_pb2.BoolValue | None = ...,
118
138
  user_password_encryption: global___UserPasswordEncryption.ValueType = ...,
119
139
  connection_manager: global___ConnectionManager | None = ...,
140
+ auth_method: global___AuthMethod.ValueType = ...,
120
141
  ) -> None: ...
121
142
  def HasField(self, field_name: typing.Literal["connection_manager", b"connection_manager", "deletion_protection", b"deletion_protection", "login", b"login", "settings", b"settings"]) -> builtins.bool: ...
122
- def ClearField(self, field_name: typing.Literal["cluster_id", b"cluster_id", "conn_limit", b"conn_limit", "connection_manager", b"connection_manager", "deletion_protection", b"deletion_protection", "grants", b"grants", "login", b"login", "name", b"name", "permissions", b"permissions", "settings", b"settings", "user_password_encryption", b"user_password_encryption"]) -> None: ...
143
+ def ClearField(self, field_name: typing.Literal["auth_method", b"auth_method", "cluster_id", b"cluster_id", "conn_limit", b"conn_limit", "connection_manager", b"connection_manager", "deletion_protection", b"deletion_protection", "grants", b"grants", "login", b"login", "name", b"name", "permissions", b"permissions", "settings", b"settings", "user_password_encryption", b"user_password_encryption"]) -> None: ...
123
144
 
124
145
  global___User = User
125
146
 
@@ -169,6 +190,7 @@ class UserSpec(google.protobuf.message.Message):
169
190
  DELETION_PROTECTION_FIELD_NUMBER: builtins.int
170
191
  USER_PASSWORD_ENCRYPTION_FIELD_NUMBER: builtins.int
171
192
  GENERATE_PASSWORD_FIELD_NUMBER: builtins.int
193
+ AUTH_METHOD_FIELD_NUMBER: builtins.int
172
194
  name: builtins.str
173
195
  """Name of the PostgreSQL user."""
174
196
  password: builtins.str
@@ -178,6 +200,8 @@ class UserSpec(google.protobuf.message.Message):
178
200
  Possible values are `` USER_PASSWORD_ENCRYPTION_MD5 `` or `` USER_PASSWORD_ENCRYPTION_SCRAM_SHA_256 ``.
179
201
  The default is `` password_encryption `` setting for cluster.
180
202
  """
203
+ auth_method: global___AuthMethod.ValueType
204
+ """Auth method for user"""
181
205
  @property
182
206
  def permissions(self) -> google.protobuf.internal.containers.RepeatedCompositeFieldContainer[global___Permission]:
183
207
  """Set of permissions to grant to the user to access specific databases."""
@@ -235,9 +259,10 @@ class UserSpec(google.protobuf.message.Message):
235
259
  deletion_protection: google.protobuf.wrappers_pb2.BoolValue | None = ...,
236
260
  user_password_encryption: global___UserPasswordEncryption.ValueType = ...,
237
261
  generate_password: google.protobuf.wrappers_pb2.BoolValue | None = ...,
262
+ auth_method: global___AuthMethod.ValueType = ...,
238
263
  ) -> None: ...
239
264
  def HasField(self, field_name: typing.Literal["conn_limit", b"conn_limit", "deletion_protection", b"deletion_protection", "generate_password", b"generate_password", "login", b"login", "settings", b"settings"]) -> builtins.bool: ...
240
- def ClearField(self, field_name: typing.Literal["conn_limit", b"conn_limit", "deletion_protection", b"deletion_protection", "generate_password", b"generate_password", "grants", b"grants", "login", b"login", "name", b"name", "password", b"password", "permissions", b"permissions", "settings", b"settings", "user_password_encryption", b"user_password_encryption"]) -> None: ...
265
+ def ClearField(self, field_name: typing.Literal["auth_method", b"auth_method", "conn_limit", b"conn_limit", "deletion_protection", b"deletion_protection", "generate_password", b"generate_password", "grants", b"grants", "login", b"login", "name", b"name", "password", b"password", "permissions", b"permissions", "settings", b"settings", "user_password_encryption", b"user_password_encryption"]) -> None: ...
241
266
 
242
267
  global___UserSpec = UserSpec
243
268
 
@@ -31,7 +31,7 @@ from yandex.cloud.mdb.postgresql.v1 import user_pb2 as yandex_dot_cloud_dot_mdb_
31
31
  from yandex.cloud.api import operation_pb2 as yandex_dot_cloud_dot_api_dot_operation__pb2
32
32
 
33
33
 
34
- DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n1yandex/cloud/mdb/postgresql/v1/user_service.proto\x12\x1eyandex.cloud.mdb.postgresql.v1\x1a\x1cgoogle/api/annotations.proto\x1a google/protobuf/field_mask.proto\x1a\x1egoogle/protobuf/wrappers.proto\x1a&yandex/cloud/operation/operation.proto\x1a\x1dyandex/cloud/validation.proto\x1a)yandex/cloud/mdb/postgresql/v1/user.proto\x1a yandex/cloud/api/operation.proto\"e\n\x0eGetUserRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x31\n\tuser_name\x18\x02 \x01(\tB\x1e\xe8\xc7\x31\x01\xf2\xc7\x31\x0e[a-zA-Z0-9_-]*\x8a\xc8\x31\x04<=63\"r\n\x10ListUsersRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x1d\n\tpage_size\x18\x02 \x01(\x03\x42\n\xfa\xc7\x31\x06<=1000\x12\x1d\n\npage_token\x18\x03 \x01(\tB\t\x8a\xc8\x31\x05<=100\"a\n\x11ListUsersResponse\x12\x33\n\x05users\x18\x01 \x03(\x0b\x32$.yandex.cloud.mdb.postgresql.v1.User\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\"x\n\x11\x43reateUserRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x41\n\tuser_spec\x18\x02 \x01(\x0b\x32(.yandex.cloud.mdb.postgresql.v1.UserSpecB\x04\xe8\xc7\x31\x01\";\n\x12\x43reateUserMetadata\x12\x12\n\ncluster_id\x18\x01 \x01(\t\x12\x11\n\tuser_name\x18\x02 \x01(\t\"\xf5\x04\n\x11UpdateUserRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x31\n\tuser_name\x18\x02 \x01(\tB\x1e\xe8\xc7\x31\x01\xf2\xc7\x31\x0e[a-zA-Z0-9_-]*\x8a\xc8\x31\x04<=63\x12/\n\x0bupdate_mask\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.FieldMask\x12\x1b\n\x08password\x18\x04 \x01(\tB\t\x8a\xc8\x31\x05\x38-128\x12?\n\x0bpermissions\x18\x05 \x03(\x0b\x32*.yandex.cloud.mdb.postgresql.v1.Permission\x12\x1c\n\nconn_limit\x18\x06 \x01(\x03\x42\x08\xfa\xc7\x31\x04>=10\x12>\n\x08settings\x18\x07 \x01(\x0b\x32,.yandex.cloud.mdb.postgresql.v1.UserSettings\x12)\n\x05login\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12)\n\x06grants\x18\t \x03(\tB\x19\xf2\xc7\x31\r[a-zA-Z0-9_]*\x8a\xc8\x31\x04<=63\x12\x37\n\x13\x64\x65letion_protection\x18\n \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12X\n\x18user_password_encryption\x18\x0b \x01(\x0e\x32\x36.yandex.cloud.mdb.postgresql.v1.UserPasswordEncryption\x12\x35\n\x11generate_password\x18\x0c \x01(\x0b\x32\x1a.google.protobuf.BoolValue\";\n\x12UpdateUserMetadata\x12\x12\n\ncluster_id\x18\x01 \x01(\t\x12\x11\n\tuser_name\x18\x02 \x01(\t\"h\n\x11\x44\x65leteUserRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x31\n\tuser_name\x18\x02 \x01(\tB\x1e\xe8\xc7\x31\x01\xf2\xc7\x31\x0e[a-zA-Z0-9_-]*\x8a\xc8\x31\x04<=63\";\n\x12\x44\x65leteUserMetadata\x12\x12\n\ncluster_id\x18\x01 \x01(\t\x12\x11\n\tuser_name\x18\x02 \x01(\t\"\xb7\x01\n\x1aGrantUserPermissionRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x31\n\tuser_name\x18\x02 \x01(\tB\x1e\xe8\xc7\x31\x01\xf2\xc7\x31\x0e[a-zA-Z0-9_-]*\x8a\xc8\x31\x04<=63\x12\x44\n\npermission\x18\x03 \x01(\x0b\x32*.yandex.cloud.mdb.postgresql.v1.PermissionB\x04\xe8\xc7\x31\x01\"D\n\x1bGrantUserPermissionMetadata\x12\x12\n\ncluster_id\x18\x01 \x01(\t\x12\x11\n\tuser_name\x18\x02 \x01(\t\"\xa9\x01\n\x1bRevokeUserPermissionRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x31\n\tuser_name\x18\x02 \x01(\tB\x1e\xe8\xc7\x31\x01\xf2\xc7\x31\x0e[a-zA-Z0-9_-]*\x8a\xc8\x31\x04<=63\x12\x35\n\rdatabase_name\x18\x03 \x01(\tB\x1e\xe8\xc7\x31\x01\xf2\xc7\x31\x0e[a-zA-Z0-9_-]*\x8a\xc8\x31\x04<=63\"E\n\x1cRevokeUserPermissionMetadata\x12\x12\n\ncluster_id\x18\x01 \x01(\t\x12\x11\n\tuser_name\x18\x02 \x01(\t2\xad\x0b\n\x0bUserService\x12\xa3\x01\n\x03Get\x12..yandex.cloud.mdb.postgresql.v1.GetUserRequest\x1a$.yandex.cloud.mdb.postgresql.v1.User\"F\x82\xd3\xe4\x93\x02@\x12>/managed-postgresql/v1/clusters/{cluster_id}/users/{user_name}\x12\xa7\x01\n\x04List\x12\x30.yandex.cloud.mdb.postgresql.v1.ListUsersRequest\x1a\x31.yandex.cloud.mdb.postgresql.v1.ListUsersResponse\":\x82\xd3\xe4\x93\x02\x34\x12\x32/managed-postgresql/v1/clusters/{cluster_id}/users\x12\xbb\x01\n\x06\x43reate\x12\x31.yandex.cloud.mdb.postgresql.v1.CreateUserRequest\x1a!.yandex.cloud.operation.Operation\"[\xb2\xd2*\x1a\n\x12\x43reateUserMetadata\x12\x04User\x82\xd3\xe4\x93\x02\x37\"2/managed-postgresql/v1/clusters/{cluster_id}/users:\x01*\x12\xc7\x01\n\x06Update\x12\x31.yandex.cloud.mdb.postgresql.v1.UpdateUserRequest\x1a!.yandex.cloud.operation.Operation\"g\xb2\xd2*\x1a\n\x12UpdateUserMetadata\x12\x04User\x82\xd3\xe4\x93\x02\x43\x32>/managed-postgresql/v1/clusters/{cluster_id}/users/{user_name}:\x01*\x12\xd5\x01\n\x06\x44\x65lete\x12\x31.yandex.cloud.mdb.postgresql.v1.DeleteUserRequest\x1a!.yandex.cloud.operation.Operation\"u\xb2\xd2*+\n\x12\x44\x65leteUserMetadata\x12\x15google.protobuf.Empty\x82\xd3\xe4\x93\x02@*>/managed-postgresql/v1/clusters/{cluster_id}/users/{user_name}\x12\xf3\x01\n\x0fGrantPermission\x12:.yandex.cloud.mdb.postgresql.v1.GrantUserPermissionRequest\x1a!.yandex.cloud.operation.Operation\"\x80\x01\xb2\xd2*#\n\x1bGrantUserPermissionMetadata\x12\x04User\x82\xd3\xe4\x93\x02S\"N/managed-postgresql/v1/clusters/{cluster_id}/users/{user_name}:grantPermission:\x01*\x12\xf7\x01\n\x10RevokePermission\x12;.yandex.cloud.mdb.postgresql.v1.RevokeUserPermissionRequest\x1a!.yandex.cloud.operation.Operation\"\x82\x01\xb2\xd2*$\n\x1cRevokeUserPermissionMetadata\x12\x04User\x82\xd3\xe4\x93\x02T\"O/managed-postgresql/v1/clusters/{cluster_id}/users/{user_name}:revokePermission:\x01*Bs\n\"yandex.cloud.api.mdb.postgresql.v1ZMgithub.com/yandex-cloud/go-genproto/yandex/cloud/mdb/postgresql/v1;postgresqlb\x06proto3')
34
+ DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile(b'\n1yandex/cloud/mdb/postgresql/v1/user_service.proto\x12\x1eyandex.cloud.mdb.postgresql.v1\x1a\x1cgoogle/api/annotations.proto\x1a google/protobuf/field_mask.proto\x1a\x1egoogle/protobuf/wrappers.proto\x1a&yandex/cloud/operation/operation.proto\x1a\x1dyandex/cloud/validation.proto\x1a)yandex/cloud/mdb/postgresql/v1/user.proto\x1a yandex/cloud/api/operation.proto\"g\n\x0eGetUserRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x33\n\tuser_name\x18\x02 \x01(\tB \xe8\xc7\x31\x01\xf2\xc7\x31\x10[a-zA-Z0-9_@.-]*\x8a\xc8\x31\x04<=63\"r\n\x10ListUsersRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x1d\n\tpage_size\x18\x02 \x01(\x03\x42\n\xfa\xc7\x31\x06<=1000\x12\x1d\n\npage_token\x18\x03 \x01(\tB\t\x8a\xc8\x31\x05<=100\"a\n\x11ListUsersResponse\x12\x33\n\x05users\x18\x01 \x03(\x0b\x32$.yandex.cloud.mdb.postgresql.v1.User\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\"x\n\x11\x43reateUserRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x41\n\tuser_spec\x18\x02 \x01(\x0b\x32(.yandex.cloud.mdb.postgresql.v1.UserSpecB\x04\xe8\xc7\x31\x01\";\n\x12\x43reateUserMetadata\x12\x12\n\ncluster_id\x18\x01 \x01(\t\x12\x11\n\tuser_name\x18\x02 \x01(\t\"\xb8\x05\n\x11UpdateUserRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x33\n\tuser_name\x18\x02 \x01(\tB \xe8\xc7\x31\x01\xf2\xc7\x31\x10[a-zA-Z0-9_@.-]*\x8a\xc8\x31\x04<=63\x12/\n\x0bupdate_mask\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.FieldMask\x12\x1b\n\x08password\x18\x04 \x01(\tB\t\x8a\xc8\x31\x05\x38-128\x12?\n\x0bpermissions\x18\x05 \x03(\x0b\x32*.yandex.cloud.mdb.postgresql.v1.Permission\x12\x1c\n\nconn_limit\x18\x06 \x01(\x03\x42\x08\xfa\xc7\x31\x04>=10\x12>\n\x08settings\x18\x07 \x01(\x0b\x32,.yandex.cloud.mdb.postgresql.v1.UserSettings\x12)\n\x05login\x18\x08 \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12)\n\x06grants\x18\t \x03(\tB\x19\xf2\xc7\x31\r[a-zA-Z0-9_]*\x8a\xc8\x31\x04<=63\x12\x37\n\x13\x64\x65letion_protection\x18\n \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12X\n\x18user_password_encryption\x18\x0b \x01(\x0e\x32\x36.yandex.cloud.mdb.postgresql.v1.UserPasswordEncryption\x12\x35\n\x11generate_password\x18\x0c \x01(\x0b\x32\x1a.google.protobuf.BoolValue\x12?\n\x0b\x61uth_method\x18\r \x01(\x0e\x32*.yandex.cloud.mdb.postgresql.v1.AuthMethod\";\n\x12UpdateUserMetadata\x12\x12\n\ncluster_id\x18\x01 \x01(\t\x12\x11\n\tuser_name\x18\x02 \x01(\t\"j\n\x11\x44\x65leteUserRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x33\n\tuser_name\x18\x02 \x01(\tB \xe8\xc7\x31\x01\xf2\xc7\x31\x10[a-zA-Z0-9_@.-]*\x8a\xc8\x31\x04<=63\";\n\x12\x44\x65leteUserMetadata\x12\x12\n\ncluster_id\x18\x01 \x01(\t\x12\x11\n\tuser_name\x18\x02 \x01(\t\"\xb9\x01\n\x1aGrantUserPermissionRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x33\n\tuser_name\x18\x02 \x01(\tB \xe8\xc7\x31\x01\xf2\xc7\x31\x10[a-zA-Z0-9_@.-]*\x8a\xc8\x31\x04<=63\x12\x44\n\npermission\x18\x03 \x01(\x0b\x32*.yandex.cloud.mdb.postgresql.v1.PermissionB\x04\xe8\xc7\x31\x01\"D\n\x1bGrantUserPermissionMetadata\x12\x12\n\ncluster_id\x18\x01 \x01(\t\x12\x11\n\tuser_name\x18\x02 \x01(\t\"\xab\x01\n\x1bRevokeUserPermissionRequest\x12 \n\ncluster_id\x18\x01 \x01(\tB\x0c\xe8\xc7\x31\x01\x8a\xc8\x31\x04<=50\x12\x33\n\tuser_name\x18\x02 \x01(\tB \xe8\xc7\x31\x01\xf2\xc7\x31\x10[a-zA-Z0-9_@.-]*\x8a\xc8\x31\x04<=63\x12\x35\n\rdatabase_name\x18\x03 \x01(\tB\x1e\xe8\xc7\x31\x01\xf2\xc7\x31\x0e[a-zA-Z0-9_-]*\x8a\xc8\x31\x04<=63\"E\n\x1cRevokeUserPermissionMetadata\x12\x12\n\ncluster_id\x18\x01 \x01(\t\x12\x11\n\tuser_name\x18\x02 \x01(\t2\xad\x0b\n\x0bUserService\x12\xa3\x01\n\x03Get\x12..yandex.cloud.mdb.postgresql.v1.GetUserRequest\x1a$.yandex.cloud.mdb.postgresql.v1.User\"F\x82\xd3\xe4\x93\x02@\x12>/managed-postgresql/v1/clusters/{cluster_id}/users/{user_name}\x12\xa7\x01\n\x04List\x12\x30.yandex.cloud.mdb.postgresql.v1.ListUsersRequest\x1a\x31.yandex.cloud.mdb.postgresql.v1.ListUsersResponse\":\x82\xd3\xe4\x93\x02\x34\x12\x32/managed-postgresql/v1/clusters/{cluster_id}/users\x12\xbb\x01\n\x06\x43reate\x12\x31.yandex.cloud.mdb.postgresql.v1.CreateUserRequest\x1a!.yandex.cloud.operation.Operation\"[\xb2\xd2*\x1a\n\x12\x43reateUserMetadata\x12\x04User\x82\xd3\xe4\x93\x02\x37\"2/managed-postgresql/v1/clusters/{cluster_id}/users:\x01*\x12\xc7\x01\n\x06Update\x12\x31.yandex.cloud.mdb.postgresql.v1.UpdateUserRequest\x1a!.yandex.cloud.operation.Operation\"g\xb2\xd2*\x1a\n\x12UpdateUserMetadata\x12\x04User\x82\xd3\xe4\x93\x02\x43\x32>/managed-postgresql/v1/clusters/{cluster_id}/users/{user_name}:\x01*\x12\xd5\x01\n\x06\x44\x65lete\x12\x31.yandex.cloud.mdb.postgresql.v1.DeleteUserRequest\x1a!.yandex.cloud.operation.Operation\"u\xb2\xd2*+\n\x12\x44\x65leteUserMetadata\x12\x15google.protobuf.Empty\x82\xd3\xe4\x93\x02@*>/managed-postgresql/v1/clusters/{cluster_id}/users/{user_name}\x12\xf3\x01\n\x0fGrantPermission\x12:.yandex.cloud.mdb.postgresql.v1.GrantUserPermissionRequest\x1a!.yandex.cloud.operation.Operation\"\x80\x01\xb2\xd2*#\n\x1bGrantUserPermissionMetadata\x12\x04User\x82\xd3\xe4\x93\x02S\"N/managed-postgresql/v1/clusters/{cluster_id}/users/{user_name}:grantPermission:\x01*\x12\xf7\x01\n\x10RevokePermission\x12;.yandex.cloud.mdb.postgresql.v1.RevokeUserPermissionRequest\x1a!.yandex.cloud.operation.Operation\"\x82\x01\xb2\xd2*$\n\x1cRevokeUserPermissionMetadata\x12\x04User\x82\xd3\xe4\x93\x02T\"O/managed-postgresql/v1/clusters/{cluster_id}/users/{user_name}:revokePermission:\x01*Bs\n\"yandex.cloud.api.mdb.postgresql.v1ZMgithub.com/yandex-cloud/go-genproto/yandex/cloud/mdb/postgresql/v1;postgresqlb\x06proto3')
35
35
 
36
36
  _globals = globals()
37
37
  _builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals)
@@ -42,7 +42,7 @@ if not _descriptor._USE_C_DESCRIPTORS:
42
42
  _globals['_GETUSERREQUEST'].fields_by_name['cluster_id']._loaded_options = None
43
43
  _globals['_GETUSERREQUEST'].fields_by_name['cluster_id']._serialized_options = b'\350\3071\001\212\3101\004<=50'
44
44
  _globals['_GETUSERREQUEST'].fields_by_name['user_name']._loaded_options = None
45
- _globals['_GETUSERREQUEST'].fields_by_name['user_name']._serialized_options = b'\350\3071\001\362\3071\016[a-zA-Z0-9_-]*\212\3101\004<=63'
45
+ _globals['_GETUSERREQUEST'].fields_by_name['user_name']._serialized_options = b'\350\3071\001\362\3071\020[a-zA-Z0-9_@.-]*\212\3101\004<=63'
46
46
  _globals['_LISTUSERSREQUEST'].fields_by_name['cluster_id']._loaded_options = None
47
47
  _globals['_LISTUSERSREQUEST'].fields_by_name['cluster_id']._serialized_options = b'\350\3071\001\212\3101\004<=50'
48
48
  _globals['_LISTUSERSREQUEST'].fields_by_name['page_size']._loaded_options = None
@@ -56,7 +56,7 @@ if not _descriptor._USE_C_DESCRIPTORS:
56
56
  _globals['_UPDATEUSERREQUEST'].fields_by_name['cluster_id']._loaded_options = None
57
57
  _globals['_UPDATEUSERREQUEST'].fields_by_name['cluster_id']._serialized_options = b'\350\3071\001\212\3101\004<=50'
58
58
  _globals['_UPDATEUSERREQUEST'].fields_by_name['user_name']._loaded_options = None
59
- _globals['_UPDATEUSERREQUEST'].fields_by_name['user_name']._serialized_options = b'\350\3071\001\362\3071\016[a-zA-Z0-9_-]*\212\3101\004<=63'
59
+ _globals['_UPDATEUSERREQUEST'].fields_by_name['user_name']._serialized_options = b'\350\3071\001\362\3071\020[a-zA-Z0-9_@.-]*\212\3101\004<=63'
60
60
  _globals['_UPDATEUSERREQUEST'].fields_by_name['password']._loaded_options = None
61
61
  _globals['_UPDATEUSERREQUEST'].fields_by_name['password']._serialized_options = b'\212\3101\0058-128'
62
62
  _globals['_UPDATEUSERREQUEST'].fields_by_name['conn_limit']._loaded_options = None
@@ -66,17 +66,17 @@ if not _descriptor._USE_C_DESCRIPTORS:
66
66
  _globals['_DELETEUSERREQUEST'].fields_by_name['cluster_id']._loaded_options = None
67
67
  _globals['_DELETEUSERREQUEST'].fields_by_name['cluster_id']._serialized_options = b'\350\3071\001\212\3101\004<=50'
68
68
  _globals['_DELETEUSERREQUEST'].fields_by_name['user_name']._loaded_options = None
69
- _globals['_DELETEUSERREQUEST'].fields_by_name['user_name']._serialized_options = b'\350\3071\001\362\3071\016[a-zA-Z0-9_-]*\212\3101\004<=63'
69
+ _globals['_DELETEUSERREQUEST'].fields_by_name['user_name']._serialized_options = b'\350\3071\001\362\3071\020[a-zA-Z0-9_@.-]*\212\3101\004<=63'
70
70
  _globals['_GRANTUSERPERMISSIONREQUEST'].fields_by_name['cluster_id']._loaded_options = None
71
71
  _globals['_GRANTUSERPERMISSIONREQUEST'].fields_by_name['cluster_id']._serialized_options = b'\350\3071\001\212\3101\004<=50'
72
72
  _globals['_GRANTUSERPERMISSIONREQUEST'].fields_by_name['user_name']._loaded_options = None
73
- _globals['_GRANTUSERPERMISSIONREQUEST'].fields_by_name['user_name']._serialized_options = b'\350\3071\001\362\3071\016[a-zA-Z0-9_-]*\212\3101\004<=63'
73
+ _globals['_GRANTUSERPERMISSIONREQUEST'].fields_by_name['user_name']._serialized_options = b'\350\3071\001\362\3071\020[a-zA-Z0-9_@.-]*\212\3101\004<=63'
74
74
  _globals['_GRANTUSERPERMISSIONREQUEST'].fields_by_name['permission']._loaded_options = None
75
75
  _globals['_GRANTUSERPERMISSIONREQUEST'].fields_by_name['permission']._serialized_options = b'\350\3071\001'
76
76
  _globals['_REVOKEUSERPERMISSIONREQUEST'].fields_by_name['cluster_id']._loaded_options = None
77
77
  _globals['_REVOKEUSERPERMISSIONREQUEST'].fields_by_name['cluster_id']._serialized_options = b'\350\3071\001\212\3101\004<=50'
78
78
  _globals['_REVOKEUSERPERMISSIONREQUEST'].fields_by_name['user_name']._loaded_options = None
79
- _globals['_REVOKEUSERPERMISSIONREQUEST'].fields_by_name['user_name']._serialized_options = b'\350\3071\001\362\3071\016[a-zA-Z0-9_-]*\212\3101\004<=63'
79
+ _globals['_REVOKEUSERPERMISSIONREQUEST'].fields_by_name['user_name']._serialized_options = b'\350\3071\001\362\3071\020[a-zA-Z0-9_@.-]*\212\3101\004<=63'
80
80
  _globals['_REVOKEUSERPERMISSIONREQUEST'].fields_by_name['database_name']._loaded_options = None
81
81
  _globals['_REVOKEUSERPERMISSIONREQUEST'].fields_by_name['database_name']._serialized_options = b'\350\3071\001\362\3071\016[a-zA-Z0-9_-]*\212\3101\004<=63'
82
82
  _globals['_USERSERVICE'].methods_by_name['Get']._loaded_options = None
@@ -94,31 +94,31 @@ if not _descriptor._USE_C_DESCRIPTORS:
94
94
  _globals['_USERSERVICE'].methods_by_name['RevokePermission']._loaded_options = None
95
95
  _globals['_USERSERVICE'].methods_by_name['RevokePermission']._serialized_options = b'\262\322*$\n\034RevokeUserPermissionMetadata\022\004User\202\323\344\223\002T\"O/managed-postgresql/v1/clusters/{cluster_id}/users/{user_name}:revokePermission:\001*'
96
96
  _globals['_GETUSERREQUEST']._serialized_start=329
97
- _globals['_GETUSERREQUEST']._serialized_end=430
98
- _globals['_LISTUSERSREQUEST']._serialized_start=432
99
- _globals['_LISTUSERSREQUEST']._serialized_end=546
100
- _globals['_LISTUSERSRESPONSE']._serialized_start=548
101
- _globals['_LISTUSERSRESPONSE']._serialized_end=645
102
- _globals['_CREATEUSERREQUEST']._serialized_start=647
103
- _globals['_CREATEUSERREQUEST']._serialized_end=767
104
- _globals['_CREATEUSERMETADATA']._serialized_start=769
105
- _globals['_CREATEUSERMETADATA']._serialized_end=828
106
- _globals['_UPDATEUSERREQUEST']._serialized_start=831
107
- _globals['_UPDATEUSERREQUEST']._serialized_end=1460
108
- _globals['_UPDATEUSERMETADATA']._serialized_start=1462
109
- _globals['_UPDATEUSERMETADATA']._serialized_end=1521
110
- _globals['_DELETEUSERREQUEST']._serialized_start=1523
111
- _globals['_DELETEUSERREQUEST']._serialized_end=1627
112
- _globals['_DELETEUSERMETADATA']._serialized_start=1629
113
- _globals['_DELETEUSERMETADATA']._serialized_end=1688
114
- _globals['_GRANTUSERPERMISSIONREQUEST']._serialized_start=1691
115
- _globals['_GRANTUSERPERMISSIONREQUEST']._serialized_end=1874
116
- _globals['_GRANTUSERPERMISSIONMETADATA']._serialized_start=1876
117
- _globals['_GRANTUSERPERMISSIONMETADATA']._serialized_end=1944
118
- _globals['_REVOKEUSERPERMISSIONREQUEST']._serialized_start=1947
119
- _globals['_REVOKEUSERPERMISSIONREQUEST']._serialized_end=2116
120
- _globals['_REVOKEUSERPERMISSIONMETADATA']._serialized_start=2118
121
- _globals['_REVOKEUSERPERMISSIONMETADATA']._serialized_end=2187
122
- _globals['_USERSERVICE']._serialized_start=2190
123
- _globals['_USERSERVICE']._serialized_end=3643
97
+ _globals['_GETUSERREQUEST']._serialized_end=432
98
+ _globals['_LISTUSERSREQUEST']._serialized_start=434
99
+ _globals['_LISTUSERSREQUEST']._serialized_end=548
100
+ _globals['_LISTUSERSRESPONSE']._serialized_start=550
101
+ _globals['_LISTUSERSRESPONSE']._serialized_end=647
102
+ _globals['_CREATEUSERREQUEST']._serialized_start=649
103
+ _globals['_CREATEUSERREQUEST']._serialized_end=769
104
+ _globals['_CREATEUSERMETADATA']._serialized_start=771
105
+ _globals['_CREATEUSERMETADATA']._serialized_end=830
106
+ _globals['_UPDATEUSERREQUEST']._serialized_start=833
107
+ _globals['_UPDATEUSERREQUEST']._serialized_end=1529
108
+ _globals['_UPDATEUSERMETADATA']._serialized_start=1531
109
+ _globals['_UPDATEUSERMETADATA']._serialized_end=1590
110
+ _globals['_DELETEUSERREQUEST']._serialized_start=1592
111
+ _globals['_DELETEUSERREQUEST']._serialized_end=1698
112
+ _globals['_DELETEUSERMETADATA']._serialized_start=1700
113
+ _globals['_DELETEUSERMETADATA']._serialized_end=1759
114
+ _globals['_GRANTUSERPERMISSIONREQUEST']._serialized_start=1762
115
+ _globals['_GRANTUSERPERMISSIONREQUEST']._serialized_end=1947
116
+ _globals['_GRANTUSERPERMISSIONMETADATA']._serialized_start=1949
117
+ _globals['_GRANTUSERPERMISSIONMETADATA']._serialized_end=2017
118
+ _globals['_REVOKEUSERPERMISSIONREQUEST']._serialized_start=2020
119
+ _globals['_REVOKEUSERPERMISSIONREQUEST']._serialized_end=2191
120
+ _globals['_REVOKEUSERPERMISSIONMETADATA']._serialized_start=2193
121
+ _globals['_REVOKEUSERPERMISSIONMETADATA']._serialized_end=2262
122
+ _globals['_USERSERVICE']._serialized_start=2265
123
+ _globals['_USERSERVICE']._serialized_end=3718
124
124
  # @@protoc_insertion_point(module_scope)
@@ -157,6 +157,7 @@ class UpdateUserRequest(google.protobuf.message.Message):
157
157
  DELETION_PROTECTION_FIELD_NUMBER: builtins.int
158
158
  USER_PASSWORD_ENCRYPTION_FIELD_NUMBER: builtins.int
159
159
  GENERATE_PASSWORD_FIELD_NUMBER: builtins.int
160
+ AUTH_METHOD_FIELD_NUMBER: builtins.int
160
161
  cluster_id: builtins.str
161
162
  """ID of the PostgreSQL cluster the user belongs to.
162
163
  To get the cluster ID use a [ClusterService.List] request.
@@ -180,6 +181,8 @@ class UpdateUserRequest(google.protobuf.message.Message):
180
181
  """New password-based authentication method for user.
181
182
  Possible values are `` USER_PASSWORD_ENCRYPTION_MD5 `` or `` USER_PASSWORD_ENCRYPTION_SCRAM_SHA_256 ``.
182
183
  """
184
+ auth_method: yandex.cloud.mdb.postgresql.v1.user_pb2.AuthMethod.ValueType
185
+ """User Auth method"""
183
186
  @property
184
187
  def update_mask(self) -> google.protobuf.field_mask_pb2.FieldMask:
185
188
  """Field mask that specifies which fields of the PostgreSQL User resource should be updated."""
@@ -230,9 +233,10 @@ class UpdateUserRequest(google.protobuf.message.Message):
230
233
  deletion_protection: google.protobuf.wrappers_pb2.BoolValue | None = ...,
231
234
  user_password_encryption: yandex.cloud.mdb.postgresql.v1.user_pb2.UserPasswordEncryption.ValueType = ...,
232
235
  generate_password: google.protobuf.wrappers_pb2.BoolValue | None = ...,
236
+ auth_method: yandex.cloud.mdb.postgresql.v1.user_pb2.AuthMethod.ValueType = ...,
233
237
  ) -> None: ...
234
238
  def HasField(self, field_name: typing.Literal["deletion_protection", b"deletion_protection", "generate_password", b"generate_password", "login", b"login", "settings", b"settings", "update_mask", b"update_mask"]) -> builtins.bool: ...
235
- def ClearField(self, field_name: typing.Literal["cluster_id", b"cluster_id", "conn_limit", b"conn_limit", "deletion_protection", b"deletion_protection", "generate_password", b"generate_password", "grants", b"grants", "login", b"login", "password", b"password", "permissions", b"permissions", "settings", b"settings", "update_mask", b"update_mask", "user_name", b"user_name", "user_password_encryption", b"user_password_encryption"]) -> None: ...
239
+ def ClearField(self, field_name: typing.Literal["auth_method", b"auth_method", "cluster_id", b"cluster_id", "conn_limit", b"conn_limit", "deletion_protection", b"deletion_protection", "generate_password", b"generate_password", "grants", b"grants", "login", b"login", "password", b"password", "permissions", b"permissions", "settings", b"settings", "update_mask", b"update_mask", "user_name", b"user_name", "user_password_encryption", b"user_password_encryption"]) -> None: ...
236
240
 
237
241
  global___UpdateUserRequest = UpdateUserRequest
238
242