You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/stale.yaml
+2Lines changed: 2 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,7 @@ on:
11
11
env:
12
12
DAYS_BEFORE_PR_STALE: 7
13
13
DAYS_BEFORE_PR_CLOSE: 7
14
+
EXEMPT_PR_LABELS: "ignore-stale"
14
15
15
16
permissions:
16
17
issues: write
@@ -30,6 +31,7 @@ jobs:
30
31
close-pr-message: "This PR was closed automatically because it has been stalled for ${{ env.DAYS_BEFORE_PR_CLOSE }} days with no activity. Feel free to re-open it at any time."
Copy file name to clipboardExpand all lines: AUTHENTICATION.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ This document describes how you can configure authentication for the STACKIT CLI
4
4
5
5
## Service account
6
6
7
-
You can use a [service account](https://docs.stackit.cloud/stackit/en/service-accounts-134415819.html) to authenticate to the STACKIT CLI.
7
+
You can use a [service account](https://docs.stackit.cloud/platform/access-and-identity/service-accounts/) to authenticate to the STACKIT CLI.
8
8
The CLI will search for service account credentials similarly to the [STACKIT SDK](https://github.com/stackitcloud/stackit-sdk-go) and [STACKIT Terraform Provider](https://github.com/stackitcloud/terraform-provider-stackit), so if you have already set up your environment for those tools, you can just run:
9
9
10
10
```bash
@@ -47,14 +47,14 @@ To use the key flow, you need to have a service account key, which must have an
47
47
48
48
When creating the service account key, a new RSA key-pair can be created automatically, which will be included in the service account key. This will make it much easier to configure the key flow authentication in the CLI, by just providing the service account key.
49
49
50
-
**Optionally**, you can provide your own private key when creating the service account key, which will then require you to also provide it explicitly to the CLI, additionally to the service account key. Check the STACKIT Knowledge Base for an [example of how to create your own key-pair](https://docs.stackit.cloud/stackit/en/usage-of-the-service-account-keys-in-stackit-175112464.html#UsageoftheserviceaccountkeysinSTACKIT-CreatinganRSAkey-pair).
50
+
**Optionally**, you can provide your own private key when creating the service account key, which will then require you to also provide it explicitly to the CLI, additionally to the service account key. Check the STACKIT Docs for an [example of how to create your own key-pair](https://docs.stackit.cloud/platform/access-and-identity/service-accounts/how-tos/manage-service-account-keys/).
51
51
52
52
To configure the key flow, follow this steps:
53
53
54
54
1. Create a service account key:
55
55
56
56
- In the CLI, run `stackit service-account key create --email <SERVICE_ACCOUNT_EMAIL>`
57
-
- As an alternative, use the [STACKIT Portal](https://portal.stackit.cloud/): go to the `Service Accounts` tab, choose a `Service Account` and go to `Service Account Keys` to create a key. For more details, see [Create a service account key](https://docs.stackit.cloud/stackit/en/create-a-service-account-key-175112456.html)
57
+
- As an alternative, use the [STACKIT Portal](https://portal.stackit.cloud/): go to the `Service Accounts` tab, choose a `Service Account` and go to `Service Account Keys` to create a key. For more details, see [Create a service account key](https://docs.stackit.cloud/platform/access-and-identity/service-accounts/how-tos/manage-service-account-keys/)
58
58
59
59
2. Save the content of the service account key by copying it and saving it in a JSON file.
Copy file name to clipboardExpand all lines: docs/stackit_beta_sqlserverflex_user_create.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ Creates a SQLServer Flex user for an instance.
9
9
The password is only visible upon creation and cannot be retrieved later.
10
10
Alternatively, you can reset the password and access the new one by running:
11
11
$ stackit beta sqlserverflex user reset-password USER_ID --instance-id INSTANCE_ID
12
-
Please refer to https://docs.stackit.cloud/stackit/en/creating-logins-and-users-in-sqlserver-flex-instances-210862358.html for additional information.
12
+
Please refer to https://docs.stackit.cloud/products/databases/sqlserver-flex/how-tos/create-logins-and-users-in-sqlserver-flex-instances/ for additional information.
13
13
14
14
The allowed user roles for your instance can be obtained by running:
Copy file name to clipboardExpand all lines: docs/stackit_config_set.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ stackit config set [flags]
56
56
--serverbackup-custom-endpoint string Server Backup API base URL, used in calls to this API
57
57
--service-account-custom-endpoint string Service Account API base URL, used in calls to this API
58
58
--service-enablement-custom-endpoint string Service Enablement API base URL, used in calls to this API
59
-
--session-time-limit string Maximum time before authentication is required again. After this time, you will be prompted to login again to execute commands that require authentication. Can't be larger than 24h. Requires authentication after being set to take effect. Examples: 3h, 5h30m40s (BETA: currently values greater than 2h have no effect)
59
+
--session-time-limit string Maximum time before authentication is required again. After this time, you will be prompted to login again to execute commands that require authentication. Can't be larger than 24h. Requires authentication after being set to take effect. Examples: 3h, 5h30m40s
60
60
--ske-custom-endpoint string SKE API base URL, used in calls to this API
61
61
--sqlserverflex-custom-endpoint string SQLServer Flex API base URL, used in calls to this API
62
62
--token-custom-endpoint string Custom token endpoint of the Service Account API, which is used to request access tokens when the service account authentication is activated. Not relevant for user authentication.
Copy file name to clipboardExpand all lines: docs/stackit_config_unset.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ stackit config unset [flags]
57
57
--serverbackup-custom-endpoint Server Backup base URL. If unset, uses the default base URL
58
58
--service-account-custom-endpoint Service Account API base URL. If unset, uses the default base URL
59
59
--service-enablement-custom-endpoint Service Enablement API base URL. If unset, uses the default base URL
60
-
--session-time-limit Maximum time before authentication is required again. If unset, defaults to 2h
60
+
--session-time-limit Maximum time before authentication is required again. If unset, defaults to 12h
61
61
--ske-custom-endpoint SKE API base URL. If unset, uses the default base URL
62
62
--sqlserverflex-custom-endpoint SQLServer Flex API base URL. If unset, uses the default base URL
63
63
--token-custom-endpoint Custom token endpoint of the Service Account API, which is used to request access tokens when the service account authentication is activated. Not relevant for user authentication.
0 commit comments