You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/deployment/managed-scanning/gitlab.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,8 @@ You can enabled managed scanning for additional repositories after onboarding us
66
66
67
67
### If the page doesn't display any repositories
68
68
69
-
1. Ensure that you've connected your GitLab account by following the steps in [Connect a source code manager](/deployment/connect-scm) and confirm the PAT is created with the required `API` scope and [a role of, at minimum, Reporter](https://docs.gitlab.com/ee/user/permissions.html#roles).
69
+
1. Ensure that you've connected your GitLab account by following the steps in [Connect a source code manager](/deployment/connect-scm) and confirm the [PAT is created with the required `API` scope](https://docs.gitlab.com/user/profile/personal_access_tokens/#personal-access-token-scopes) by someone assigned the [role of **Maintainer** or **Owner**](https://docs.gitlab.com/ee/user/permissions.html#roles).
70
+
1. Once you successfully create the connection, the role for the person who owns the token can be downgraded to **Developer**.
70
71
2. In Semgrep AppSec Platform, click **<iclass="fa-solid fa-folder-open"></i> Projects**.
71
72
3. If the page doesn't display the repository you want to add, click **Can't find your project? > Sync projects**.
72
73
4. If the page doesn't display any repositories, click **Sync projects**.
Copy file name to clipboardExpand all lines: docs/semgrep-appsec-platform/bitbucket-data-center-pr-comments.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ PR comments appear for the following types of scans under these conditions:
47
47
### Prerequisites
48
48
49
49
In addition to finishing the previous steps in your deployment journey, it is recommended that you complete a **full scan** on your **default branch** for the repository in which you want to receive comments.
50
-
- You must have a Bitbucket Data Center HTTP access token. Ensure that the [token HTTP access token that you create](https://confluence.atlassian.com/bitbucketserver/http-access-tokens-939515499.html) has been granted **Project write** permissions. You'll provide this token to your CI provider during the setup process.
50
+
- You must have a Bitbucket Data Center HTTP access token. Ensure that the [HTTP access token that you create](https://confluence.atlassian.com/bitbucketserver/http-access-tokens-939515499.html) has been granted **Project write** permissions. You'll provide this token to your CI provider during the setup process.
51
51
- Semgrep has been tested with Bitbucket Data Center v8.19. If you are using a different version of BBDC and there are issues, please contact [<iclass="fa-regular fa-envelope"></i> support@semgrep.com](mailto:support@semgrep.com).
Copy file name to clipboardExpand all lines: docs/semgrep-appsec-platform/gitlab-mr-comments.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,10 +57,11 @@ To enable MR comments, connect your GitLab organization to Semgrep AppSec Platfo
57
57
1. Sign in to [<iclass="fas fa-external-link fa-xs"></i> Semgrep AppSec Platform](https://semgrep.dev/login?return_path=/manage/projects).
58
58
1. Go to **Settings > Source code managers**.
59
59
1. Click **Add connection** and select **GitLab**.
60
-
3. Create a GitLab personal access token (PAT) with `api` scope:
61
-
1. Log in to your GitLab account, and go to [<iclass="fas fa-external-link fa-xs"></i> Profile > Access Tokens](https://gitlab.com/-/profile/personal_access_tokens).
62
-
2. Add a token with `api` scope.
63
-
3. Copy the generated token.
60
+
3. Create a GitLab [personal access token (PAT) with `api` scope](https://docs.gitlab.com/user/profile/personal_access_tokens/#personal-access-token-scopes):
61
+
1. Ensure that you're using an account that has been [assigned a role of `Developer` or higher](https://docs.gitlab.com/user/permissions/#roles), and log in to GitLab.
62
+
2. Go to [<iclass="fas fa-external-link fa-xs"></i> Profile > Access Tokens](https://gitlab.com/-/profile/personal_access_tokens).
63
+
3. Add a token with `api` scope.
64
+
4. Copy the generated token.
64
65
4. Return to Semgrep AppSec Platform, and in the **Add connection** form:
65
66
1. Enter the **Name of your GitHub Organization**.
Copy file name to clipboardExpand all lines: docs/semgrep-ci/network-broker.md
+26-1Lines changed: 26 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ Ensure that you are logged in to the server where you want to run Semgrep Networ
48
48
49
49
<TabItemvalue='current'>
50
50
51
-
Create a `config.yaml` file similar to the following snippet, or copy a starting config from the Semgrep AppSec Platform at **Settings > Broker**. The steps required to generate values for the placeholders `SEMGREP_LOCAL_ADDRESS`, `YOUR_PRIVATE_KEY`, and `YOUR_BASE_URL` are provided in subsequent steps of this guide.
51
+
Create a `config.yaml` file similar to the following snippet, or copy a starting config from the Semgrep AppSec Platform at **Settings > Broker**. The steps required to generate values for the placeholders `SEMGREP_LOCAL_ADDRESS`, `YOUR_PRIVATE_KEY`, and `YOUR_BASE_URL`, as well as the scopes required for the access tokens, are provided in subsequent steps of this guide.
Semgrep recommends providing the access token when you [connect the source code manager](/deployment/connect-scm#connect-to-cloud-hosted-orgs) instead of in the Network Broker configuration. However, if you must provide the token in the network broker configuration, see [Prerequisites](/semgrep-appsec-platform/azure-pr-comments#prerequisites) for access token requirements.
Semgrep recommends providing the access token when you [connect the source code manager](/deployment/connect-scm) instead of in the Network Broker configuration. However, if you must provide the token in the network broker configuration, see Prerequisites for access token requirements:
Semgrep recommends providing the access token when you [connect the source code manager](/deployment/connect-scm#connect-to-cloud-hosted-orgs) instead of in the Network Broker configuration. However, if you must provide the token in the network broker configuration, see [Prerequisites](/semgrep-appsec-platform/gitlab-mr-comments#prerequisites) for access token requirements.
197
+
:::
198
+
186
199
</TabItem>
187
200
</Tabs>
188
201
@@ -275,6 +288,10 @@ azuredevops:
275
288
allowCodeAccess: true
276
289
</code></pre>
277
290
291
+
:::info Access tokens
292
+
Semgrep recommends providing the access token when you [connect the source code manager](/deployment/connect-scm#connect-to-cloud-hosted-orgs) instead of in the Network Broker configuration. However, if you must provide the token in the network broker configuration, see [Prerequisites and permissions](/deployment/managed-scanning/azure#prerequisites-and-permissions) for access token requirements.
293
+
:::
294
+
278
295
</TabItem>
279
296
280
297
<TabItem value='bb'>
@@ -286,6 +303,10 @@ bitbucket:
286
303
allowCodeAccess: true
287
304
</code></pre>
288
305
306
+
:::info Access tokens
307
+
Semgrep recommends providing the access token when you [connect the source code manager](/deployment/connect-scm#connect-to-cloud-hosted-orgs) instead of in the Network Broker configuration. However, if you must provide the token in the network broker configuration, see [Prerequisites and permissions](/deployment/managed-scanning/bitbucket#prerequisites-and-permissions) for access token requirements.
308
+
:::
309
+
289
310
</TabItem>
290
311
<TabItem value='gh'>
291
312
@@ -306,6 +327,10 @@ gitlab:
306
327
allowCodeAccess: true
307
328
</code></pre>
308
329
330
+
:::info Access tokens
331
+
Semgrep recommends providing the access token when you [connect the source code manager](/deployment/connect-scm#connect-to-cloud-hosted-orgs) instead of in the Network Broker configuration. However, if you must provide the token in the network broker configuration, see [Prerequisites and permissions](/deployment/managed-scanning/gitlab#prerequisites-and-permissions) for access token requirements.
0 commit comments