import _m0 from 'protobufjs/minimal'; export declare const protobufPackage = "yandex.cloud.mdb.postgresql.v1"; export declare enum UserPasswordEncryption { USER_PASSWORD_ENCRYPTION_UNSPECIFIED = 0, USER_PASSWORD_ENCRYPTION_MD5 = 1, USER_PASSWORD_ENCRYPTION_SCRAM_SHA_256 = 2, UNRECOGNIZED = -1 } export declare function userPasswordEncryptionFromJSON(object: any): UserPasswordEncryption; export declare function userPasswordEncryptionToJSON(object: UserPasswordEncryption): string; /** * A PostgreSQL User resource. For more information, see * the [Developer's Guide](/docs/managed-postgresql/concepts). */ export interface User { /** Name of the PostgreSQL user. */ name: string; /** ID of the PostgreSQL cluster the user belongs to. */ clusterId: string; /** Set of permissions granted to the user to access specific databases. */ permissions: Permission[]; /** * Maximum number of database connections available to the user. * * When used in session pooling, this setting limits the number of connections to every single host in PostgreSQL cluster. In this case, the setting's value must be greater than the total number of connections that backend services can open to access the PostgreSQL cluster. The setting's value should not exceed the value of the [Cluster.config.postgresql_config_12.effective_config.max_connections] setting. * * When used in transaction pooling, this setting limits the number of user's active transactions; therefore, in this mode user can open thousands of connections, but only `N` concurrent connections will be opened, where `N` is the value of the setting. * * Minimum value: `10` (default: `50`), when used in session pooling. */ connLimit: number; settings?: UserSettings; /** * This flag defines whether the user can login to a PostgreSQL database. * * Default value: `true` (login is allowed). */ login?: boolean; /** * A set of roles and privileges that are granted to the user. * * For more information, see [the documentation](/docs/managed-postgresql/operations/grant). */ grants: string[]; /** * Determines whether the user deletion protection is enabled. * * The default value is `unspecified`. In this case, the user configuration inherits the cluster's deletion protection settings. */ deletionProtection?: boolean; /** * Password-based authentication method for user. * Possible values are `` USER_PASSWORD_ENCRYPTION_MD5 `` or `` USER_PASSWORD_ENCRYPTION_SCRAM_SHA_256 ``. * The default is `` password_encryption `` setting for cluster. */ userPasswordEncryption: UserPasswordEncryption; /** Connection Manager Connection and settings associated with user. Read only field. */ connectionManager?: ConnectionManager; } export interface Permission { /** Name of the database that the permission grants access to. */ databaseName: string; } export interface ConnectionManager { /** ID of Connection Manager Connection */ connectionId: string; } export interface UserSpec { /** Name of the PostgreSQL user. */ name: string; /** Password of the PostgreSQL user. */ password: string; /** Set of permissions to grant to the user to access specific databases. */ permissions: Permission[]; /** * Maximum number of database connections that should be available to the user. * * When used in session pooling, this setting limits the number of connections to every single host in PostgreSQL cluster. In this case, the setting's value must be greater than the total number of connections that backend services can open to access the PostgreSQL cluster. The setting's value should not exceed the value of the [Cluster.config.postgresql_config_12.effective_config.max_connections] setting. * * When used in transaction pooling, this setting limits the number of user's active transactions; therefore, in this mode user can open thousands of connections, but only `N` concurrent connections will be opened, where `N` is the value of the setting. * * Minimum value: `10` (default: `50`), when used in session pooling. */ connLimit?: number; /** PostgreSQL settings for the user. */ settings?: UserSettings; /** * This flag defines whether the user can login to a PostgreSQL database. * * Default value: `true` (login is allowed). */ login?: boolean; /** * A set of roles and privileges that are granted to the user. * * For more information, see [the documentation](/docs/managed-postgresql/operations/grant). */ grants: string[]; /** * Deletion Protection inhibits deletion of the user * * Default value: `unspecified` (inherits cluster's deletion_protection) */ deletionProtection?: boolean; /** * Password-based authentication method for user. * Possible values are `` USER_PASSWORD_ENCRYPTION_MD5 `` or `` USER_PASSWORD_ENCRYPTION_SCRAM_SHA_256 ``. * The default is `` password_encryption `` setting for cluster. */ userPasswordEncryption: UserPasswordEncryption; /** Generate password using Connection Manager. */ generatePassword?: boolean; } export interface PGAuditSettings { /** * Defines which user queries will be written to the audit log. Corresponds to the [Pg audit log](https://yandex.cloud/en/docs/managed-postgresql/concepts/settings-list#setting-pg-audit-log) user setting. * * The possible values are the following: * * * PG_AUDIT_SETTINGS_LOG_READ: `SELECT` and `COPY` queries are logged if the data source is a relation or query. * * PG_AUDIT_SETTINGS_LOG_WRITE: `INSERT`, `UPDATE`, `DELETE`, `TRUNCATE`, and `COPY` queries are logged if the data target is a relation. * * PG_AUDIT_SETTINGS_LOG_FUNCTION: Function invocations and `DO` sections are logged. * * PG_AUDIT_SETTINGS_LOG_ROLE: Statements related to role and privilege management, such as `GRANT`, `REVOKE`, or `CREATE/ALTER/DROP ROLE`, are logged. * * PG_AUDIT_SETTINGS_LOG_DDL: Any `DDL` statements that do not belong to the `ROLE` class are logged. * * PG_AUDIT_SETTINGS_LOG_MISC: Miscellaneous commands, such as `DISCARD`, `FETCH`, `CHECKPOINT`, `VACUUM`, and `SET`, are logged. * * PG_AUDIT_SETTINGS_LOG_MISC_SET: Miscellaneous `SET` commands, e.g., `SET ROLE`, are logged. * * The default value is PG_AUDIT_SETTINGS_LOG_UNSPECIFIED. In this case, the parameter is not configured. */ log: PGAuditSettings_PGAuditSettingsLog[]; } export declare enum PGAuditSettings_PGAuditSettingsLog { PG_AUDIT_SETTINGS_LOG_UNSPECIFIED = 0, PG_AUDIT_SETTINGS_LOG_READ = 1, PG_AUDIT_SETTINGS_LOG_WRITE = 2, PG_AUDIT_SETTINGS_LOG_FUNCTION = 3, PG_AUDIT_SETTINGS_LOG_ROLE = 4, PG_AUDIT_SETTINGS_LOG_DDL = 5, PG_AUDIT_SETTINGS_LOG_MISC = 6, PG_AUDIT_SETTINGS_LOG_MISC_SET = 7, UNRECOGNIZED = -1 } export declare function pGAuditSettings_PGAuditSettingsLogFromJSON(object: any): PGAuditSettings_PGAuditSettingsLog; export declare function pGAuditSettings_PGAuditSettingsLogToJSON(object: PGAuditSettings_PGAuditSettingsLog): string; /** PostgreSQL user settings. */ export interface UserSettings { /** * SQL sets an isolation level for each transaction. * This setting defines the default isolation level to be set for all new SQL transactions. * * For more information, see the [PostgreSQL documentation](https://www.postgresql.org/docs/current/transaction-iso.html). */ defaultTransactionIsolation: UserSettings_TransactionIsolation; /** * The maximum time (in milliseconds) for any statement to wait for acquiring a lock on an table, index, row or other database object. * If the wait time is longer than the specified amount, then this statement is aborted. * * Default value: `0` (no control is enforced, a statement waiting time is unlimited). */ lockTimeout?: number; /** * This setting controls logging of the duration of statements. * * The duration of each completed statement will be logged if the statement ran for at least the specified amount of time (in milliseconds). * E.g., if this setting's value is set to `500`, a statement that took 300 milliseconds to complete will not be logged; on the other hand, the one that took 2000 milliseconds to complete, will be logged. * * Value of `0` forces PostgreSQL to log the duration of all statements. * * Value of `-1` (default) disables logging of the duration of statements. * * For more information, see the [PostgreSQL documentation](https://www.postgresql.org/docs/current/runtime-config-logging.html). */ logMinDurationStatement?: number; /** * This setting defines whether DBMS will commit transaction in a synchronous way. * * When synchronization is enabled, cluster waits for the synchronous operations to be completed prior to reporting `success` to the client. * These operations guarantee different levels of the data safety and visibility in the cluster. * * For more information, see the [PostgreSQL documentation](https://www.postgresql.org/docs/current/runtime-config-wal.html#GUC-SYNCHRONOUS-COMMIT). */ synchronousCommit: UserSettings_SynchronousCommit; /** * The maximum storage space size (in kilobytes) that a single process can use to create temporary files. * If a transaction exceeds this limit during execution, it will be aborted. * * A huge query may not fit into a server's RAM, therefore PostgreSQL will use some storage to store and execute such a query. Too big queries can make excessive use of the storage system, effectively making other quieries to run slow. This setting prevents execution of a big queries that can influence other queries by limiting size of temporary files. */ tempFileLimit?: number; /** * This setting specifies which SQL statements should be logged (on the user level). * * For more information, see the [PostgreSQL documentation](https://www.postgresql.org/docs/current/runtime-config-logging.html). */ logStatement: UserSettings_LogStatement; /** * Mode that the connection pooler is working in with specified user. * * For more information, see the [Odyssey documentation](https://github.com/yandex/odyssey/blob/master/documentation/configuration.md#pool-string). */ poolMode: UserSettings_PoolingMode; /** * User can use prepared statements with transaction pooling. * * For more information, see the [PostgreSQL documentation](https://www.postgresql.org/docs/current/sql-prepare.html). */ preparedStatementsPooling?: boolean; /** * The connection pooler setting. It determines the maximum allowed replication lag (in seconds). * Pooler will reject connections to the replica with a lag above this threshold. * It can be useful to prevent application from reading stale data. * * Default value: 0 * * Value of `0` disables this mechanism */ catchupTimeout?: number; /** * The maximum time (in milliseconds) to wait for WAL replication (can be set only for PostgreSQL 12+) * Terminate replication connections that are inactive for longer than this amount of time. * * Default value: `60000` (60 seconds). * * Value of `0` disables the timeout mechanism. * * For more information, see the [PostgreSQL documentation](https://www.postgresql.org/docs/current/runtime-config-replication.html). */ walSenderTimeout?: number; /** * Sets the maximum allowed idle time, in milliseconds, between queries while in a transaction. * * The default value is `0`, which disables the timeout. * * For more information, see the [PostgreSQL documentation](https://www.postgresql.org/docs/current/runtime-config-client.html). */ idleInTransactionSessionTimeout?: number; /** * The maximum time (in milliseconds) to wait for statement. * The timeout is measured from the time a command arrives at the server until it is completed by the server. * * If `log_min_error_statement` is set to ERROR or lower, the statement that timed out will also be logged. * * Value of `0` (default) disables the timeout * * For more information, see the [PostgreSQL documentation](https://www.postgresql.org/docs/current/runtime-config-client.html). */ statementTimeout?: number; /** Settings of the [PostgreSQL Audit Extension](https://www.pgaudit.org/) (pgaudit). */ pgaudit?: PGAuditSettings; } export declare enum UserSettings_SynchronousCommit { SYNCHRONOUS_COMMIT_UNSPECIFIED = 0, /** SYNCHRONOUS_COMMIT_ON - Success is reported to the client if the data is in WAL (Write-Ahead Log), and WAL is written to the storage of both the master and its synchronous standby server. Default value. */ SYNCHRONOUS_COMMIT_ON = 1, /** * SYNCHRONOUS_COMMIT_OFF - Success is reported to the client even if the data is not in WAL. * There is no synchronous write operation, data may be loss in case of storage subsystem failure. */ SYNCHRONOUS_COMMIT_OFF = 2, /** * SYNCHRONOUS_COMMIT_LOCAL - Success is reported to the client if the data is in WAL, and WAL is written to the storage of the master server. * The transaction may be lost due to storage subsystem failure on the master server. */ SYNCHRONOUS_COMMIT_LOCAL = 3, /** * SYNCHRONOUS_COMMIT_REMOTE_WRITE - Success is reported to the client if the data is in WAL, WAL is written to the storage of the master server, and the server's synchronous standby indicates that it has received WAL and written it out to its operating system. * The transaction may be lost due to simultaneous storage subsystem failure on the master and operating system's failure on the synchronous standby. */ SYNCHRONOUS_COMMIT_REMOTE_WRITE = 4, /** * SYNCHRONOUS_COMMIT_REMOTE_APPLY - Success is reported to the client if the data is in WAL (Write-Ahead Log), WAL is written to the storage of the master server, and its synchronous standby indicates that it has received WAL and applied it. * The transaction may be lost due to irrecoverably failure of both the master and its synchronous standby. */ SYNCHRONOUS_COMMIT_REMOTE_APPLY = 5, UNRECOGNIZED = -1 } export declare function userSettings_SynchronousCommitFromJSON(object: any): UserSettings_SynchronousCommit; export declare function userSettings_SynchronousCommitToJSON(object: UserSettings_SynchronousCommit): string; export declare enum UserSettings_LogStatement { LOG_STATEMENT_UNSPECIFIED = 0, /** LOG_STATEMENT_NONE - Logs none of SQL statements. Default value. */ LOG_STATEMENT_NONE = 1, /** LOG_STATEMENT_DDL - Logs all data definition statements (such as `CREATE`, `ALTER`, `DROP` and others). */ LOG_STATEMENT_DDL = 2, /** LOG_STATEMENT_MOD - Logs all statements that fall in the `LOG_STATEMENT_DDL` category plus data-modifying statements (such as `INSERT`, `UPDATE` and others). */ LOG_STATEMENT_MOD = 3, /** LOG_STATEMENT_ALL - Logs all SQL statements. */ LOG_STATEMENT_ALL = 4, UNRECOGNIZED = -1 } export declare function userSettings_LogStatementFromJSON(object: any): UserSettings_LogStatement; export declare function userSettings_LogStatementToJSON(object: UserSettings_LogStatement): string; export declare enum UserSettings_TransactionIsolation { TRANSACTION_ISOLATION_UNSPECIFIED = 0, /** TRANSACTION_ISOLATION_READ_UNCOMMITTED - This level behaves like `TRANSACTION_ISOLATION_READ_COMMITTED` in PostgreSQL. */ TRANSACTION_ISOLATION_READ_UNCOMMITTED = 1, /** TRANSACTION_ISOLATION_READ_COMMITTED - On this level query sees only data committed before the query began. Default value. */ TRANSACTION_ISOLATION_READ_COMMITTED = 2, /** TRANSACTION_ISOLATION_REPEATABLE_READ - On this level all subsequent queries in a transaction will see the same rows, that were read by the first `SELECT` or `INSERT` query in this transaction, unchanged (these rows are locked during the first query). */ TRANSACTION_ISOLATION_REPEATABLE_READ = 3, /** * TRANSACTION_ISOLATION_SERIALIZABLE - This level provides the strictest transaction isolation. * All queries in the current transaction see only the rows that were fixed prior to execution of the first `SELECT` or `INSERT` query in this transaction. * If read and write operations in a concurrent set of serializable transactions overlap and this may cause an inconsistency that is not possible during the serial transaction execution, then one of the transaction will be rolled back, triggering a serialization failure. */ TRANSACTION_ISOLATION_SERIALIZABLE = 4, UNRECOGNIZED = -1 } export declare function userSettings_TransactionIsolationFromJSON(object: any): UserSettings_TransactionIsolation; export declare function userSettings_TransactionIsolationToJSON(object: UserSettings_TransactionIsolation): string; export declare enum UserSettings_PoolingMode { POOLING_MODE_UNSPECIFIED = 0, /** SESSION - Server connection will be assigned to it for the whole duration the client stays connected. Default value. */ SESSION = 1, /** TRANSACTION - Server connection is assigned to a client only during a transaction. */ TRANSACTION = 2, /** STATEMENT - Server connection will be put back into the pool immediately after a query completes. */ STATEMENT = 3, UNRECOGNIZED = -1 } export declare function userSettings_PoolingModeFromJSON(object: any): UserSettings_PoolingMode; export declare function userSettings_PoolingModeToJSON(object: UserSettings_PoolingMode): string; export declare const User: { encode(message: User, writer?: _m0.Writer): _m0.Writer; decode(input: _m0.Reader | Uint8Array, length?: number): User; fromJSON(object: any): User; toJSON(message: User): unknown; fromPartial, never>)[] & Record, never>) | undefined; connLimit?: number | undefined; settings?: ({ defaultTransactionIsolation?: UserSettings_TransactionIsolation | undefined; lockTimeout?: number | undefined; logMinDurationStatement?: number | undefined; synchronousCommit?: UserSettings_SynchronousCommit | undefined; tempFileLimit?: number | undefined; logStatement?: UserSettings_LogStatement | undefined; poolMode?: UserSettings_PoolingMode | undefined; preparedStatementsPooling?: boolean | undefined; catchupTimeout?: number | undefined; walSenderTimeout?: number | undefined; idleInTransactionSessionTimeout?: number | undefined; statementTimeout?: number | undefined; pgaudit?: { log?: PGAuditSettings_PGAuditSettingsLog[] | undefined; } | undefined; } & { defaultTransactionIsolation?: UserSettings_TransactionIsolation | undefined; lockTimeout?: number | undefined; logMinDurationStatement?: number | undefined; synchronousCommit?: UserSettings_SynchronousCommit | undefined; tempFileLimit?: number | undefined; logStatement?: UserSettings_LogStatement | undefined; poolMode?: UserSettings_PoolingMode | undefined; preparedStatementsPooling?: boolean | undefined; catchupTimeout?: number | undefined; walSenderTimeout?: number | undefined; idleInTransactionSessionTimeout?: number | undefined; statementTimeout?: number | undefined; pgaudit?: ({ log?: PGAuditSettings_PGAuditSettingsLog[] | undefined; } & { log?: (PGAuditSettings_PGAuditSettingsLog[] & PGAuditSettings_PGAuditSettingsLog[] & Record, never>) | undefined; } & Record, never>) | undefined; } & Record, never>) | undefined; login?: boolean | undefined; grants?: (string[] & string[] & Record, never>) | undefined; deletionProtection?: boolean | undefined; userPasswordEncryption?: UserPasswordEncryption | undefined; connectionManager?: ({ connectionId?: string | undefined; } & { connectionId?: string | undefined; } & Record, never>) | undefined; } & Record, never>>(object: I): User; }; export declare const Permission: { encode(message: Permission, writer?: _m0.Writer): _m0.Writer; decode(input: _m0.Reader | Uint8Array, length?: number): Permission; fromJSON(object: any): Permission; toJSON(message: Permission): unknown; fromPartial, never>>(object: I): Permission; }; export declare const ConnectionManager: { encode(message: ConnectionManager, writer?: _m0.Writer): _m0.Writer; decode(input: _m0.Reader | Uint8Array, length?: number): ConnectionManager; fromJSON(object: any): ConnectionManager; toJSON(message: ConnectionManager): unknown; fromPartial, never>>(object: I): ConnectionManager; }; export declare const UserSpec: { encode(message: UserSpec, writer?: _m0.Writer): _m0.Writer; decode(input: _m0.Reader | Uint8Array, length?: number): UserSpec; fromJSON(object: any): UserSpec; toJSON(message: UserSpec): unknown; fromPartial, never>)[] & Record, never>) | undefined; connLimit?: number | undefined; settings?: ({ defaultTransactionIsolation?: UserSettings_TransactionIsolation | undefined; lockTimeout?: number | undefined; logMinDurationStatement?: number | undefined; synchronousCommit?: UserSettings_SynchronousCommit | undefined; tempFileLimit?: number | undefined; logStatement?: UserSettings_LogStatement | undefined; poolMode?: UserSettings_PoolingMode | undefined; preparedStatementsPooling?: boolean | undefined; catchupTimeout?: number | undefined; walSenderTimeout?: number | undefined; idleInTransactionSessionTimeout?: number | undefined; statementTimeout?: number | undefined; pgaudit?: { log?: PGAuditSettings_PGAuditSettingsLog[] | undefined; } | undefined; } & { defaultTransactionIsolation?: UserSettings_TransactionIsolation | undefined; lockTimeout?: number | undefined; logMinDurationStatement?: number | undefined; synchronousCommit?: UserSettings_SynchronousCommit | undefined; tempFileLimit?: number | undefined; logStatement?: UserSettings_LogStatement | undefined; poolMode?: UserSettings_PoolingMode | undefined; preparedStatementsPooling?: boolean | undefined; catchupTimeout?: number | undefined; walSenderTimeout?: number | undefined; idleInTransactionSessionTimeout?: number | undefined; statementTimeout?: number | undefined; pgaudit?: ({ log?: PGAuditSettings_PGAuditSettingsLog[] | undefined; } & { log?: (PGAuditSettings_PGAuditSettingsLog[] & PGAuditSettings_PGAuditSettingsLog[] & Record, never>) | undefined; } & Record, never>) | undefined; } & Record, never>) | undefined; login?: boolean | undefined; grants?: (string[] & string[] & Record, never>) | undefined; deletionProtection?: boolean | undefined; userPasswordEncryption?: UserPasswordEncryption | undefined; generatePassword?: boolean | undefined; } & Record, never>>(object: I): UserSpec; }; export declare const PGAuditSettings: { encode(message: PGAuditSettings, writer?: _m0.Writer): _m0.Writer; decode(input: _m0.Reader | Uint8Array, length?: number): PGAuditSettings; fromJSON(object: any): PGAuditSettings; toJSON(message: PGAuditSettings): unknown; fromPartial, never>) | undefined; } & Record, never>>(object: I): PGAuditSettings; }; export declare const UserSettings: { encode(message: UserSettings, writer?: _m0.Writer): _m0.Writer; decode(input: _m0.Reader | Uint8Array, length?: number): UserSettings; fromJSON(object: any): UserSettings; toJSON(message: UserSettings): unknown; fromPartial, never>) | undefined; } & Record, never>) | undefined; } & Record, never>>(object: I): UserSettings; }; type Builtin = Date | Function | Uint8Array | string | number | boolean | undefined; export type DeepPartial = T extends Builtin ? T : T extends Array ? Array> : T extends ReadonlyArray ? ReadonlyArray> : T extends {} ? { [K in keyof T]?: DeepPartial; } : Partial; type KeysOfUnion = T extends T ? keyof T : never; export type Exact = P extends Builtin ? P : P & { [K in keyof P]: Exact; } & Record>, never>; export {};