-
Notifications
You must be signed in to change notification settings - Fork 720
Add support for Bitbucket API tokens instead of access tokens #6337
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
✅ Deploy Preview for nextflow-docs-staging ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It would be preferable to keep support for user/password as a fallback even it deprecated.
https://www.nextflow.io/docs/latest/git.html#bitbucket-server
Consider also updating the corresponding docs
App passwords are still supported. ![]()
Docs to be updated in a separate PR. |
Ok, now I see it. Would not be better to give priority to the token over the pwd? |
Makes sense to me. I can change that. |
Can it be added one line mention in the docs about the new feature ? |
Signed-off-by: Paolo Di Tommaso <[email protected]>
Ok, I did. Please have a look when you have a chance |
Looks good to me. Thanks, Paolo. |
Description
In #6209, it turns out I mixed up Bitbucket access tokens with Bitbucket API tokens. API tokens are the chosen replacement for app passwords, which cannot longer be created starting from 2025-09-09 and will stop working as a whole starting from 2026-06-09 (source).
This PR adds actual support for API tokens instead of access tokens. Using access tokens, operations such as contacting the REST API were working correctly, but others such as cloning a repository weren't.
Guidelines for testing
scm_token.config
) with the following contents for API token authentication:scm_pass.config
) with the following contents for app password authentication: