Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sara/quickfix/bbdc patch only #2031

Merged
merged 2 commits into from
Mar 18, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 8 additions & 0 deletions docs/deployment/managed-scanning/bitbucket.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,8 @@ Semgrep Managed Scanning requires one of the following plans:
- Bitbucket Cloud Premium
- Bitbucket Data Center

### Bitbucket Cloud

You must provide a Bitbucket [workspace access token](https://support.atlassian.com/bitbucket-cloud/docs/workspace-access-tokens/) to Semgrep, which can be created by a user with the `Product Admin` role. Once you have Managed Scanning fully configured, you can update the token provided to Semgrep to one that's more restrictive. The scopes you must assign to the token include:

- `webhook (read and write)`
Expand All @@ -34,6 +36,12 @@ You must provide a Bitbucket [workspace access token](https://support.atlassian.

See [Pre-deployment checklist > Permissions](/deployment/checklist#permissions) for more information about the permissions used by Semgrep.

### Bitbucket Data Center

You must provide a Bitbucket [HTTP access token](https://confluence.atlassian.com/bitbucketserver/http-access-tokens-939515499.html) to Semgrep, which can be created by a user with the `Product Admin` role. This access token must be created with with `PROJECT_ADMIN` permissions.

See [Pre-deployment checklist > Permissions](/deployment/checklist#permissions) for more information about the permissions used by Semgrep.

## Enable Managed Scanning and scan your first repository

<!-- vale off -->
Expand Down
19 changes: 12 additions & 7 deletions docs/getting-started/quickstart-sms.md
Original file line number Diff line number Diff line change
Expand Up @@ -122,15 +122,20 @@ Admin access to your Bitbucket organization.

### Requirements

Read access is granted through a [workspace access token](https://support.atlassian.com/bitbucket-cloud/docs/workspace-access-tokens/) you generate on Bitbucket. You can provide this token by [adding Bitbucket as a source code manager](/deployment/connect-scm#bitbucket-cloud).
#### Bitbucket Cloud

The user generating the workspace token must be a **Product Admin** for the workspace. The scopes you must assign to the token include:
- Read access is granted through a [workspace access token](https://support.atlassian.com/bitbucket-cloud/docs/workspace-access-tokens/) you generate on Bitbucket. You can provide this token by [adding Bitbucket as a source code manager](/deployment/connect-scm#connect-to-cloud-hosted-orgs).
- The user generating the workspace token must be a **Product Admin** for the workspace. The scopes you must assign to the token include:
- `webhook (read and write)`
- `repository (read and write)`
- `pullrequest (read and write)`
- `project (admin)`
- `account (read)`

- `webhook (read and write)`
- `repository (read and write)`
- `pullrequest (read and write)`
- `project (admin)`
- `account (read)`
#### Bitbucket Data Center

- Read access is granted through an [HTTP access token](https://confluence.atlassian.com/bitbucketserver/http-access-tokens-939515499.html) you generate on Bitbucket. You can provide this token by [adding Bitbucket as a source code manager](/deployment/connect-scm#bitbucket-cloud).
- The user generating the workspace token must be a **Product Admin** for the workspace. The token must be created with `PROJECT_ADMIN` permissions.

### Add a repository

Expand Down