Skip to content

Commit ea5d3f5

Browse files
authored
Merge branch 'main' into sg-next-apr-2025
2 parents 5c8e732 + 684aefb commit ea5d3f5

File tree

4 files changed

+18
-15
lines changed

4 files changed

+18
-15
lines changed

docs/admin/config/authorization_and_authentication.mdx

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -112,13 +112,7 @@ And configure the identity provider to pass the email address as the `nameID`.
112112

113113
### Bitbucket Server / Bitbucket Data Center authorization
114114

115-
We do not currently support OAuth for Bitbucket Server or Bitbucket Data Center. You will need to combine permissions syncing from Bitbucket Server / Bitbucket Data Center with another authentication mechanism (SAML, built-in auth, HTTP authentication proxies). Bitbucket Server and Bitbucket Data Center only pass usernames to Sourcegraph, so you’ll need to make sure that those usernames are matched by whatever mechanism you choose to use for access.
116-
117-
Follow the steps to [sync Bitbucket Server / Bitbucket Data Center permissions](/admin/code_hosts/bitbucket_server#repository-permissions). Then, do one of the following:
118-
119-
1. Create the user accounts in Sourcegraph with matching usernames. (Access using `builtin` auth.)
120-
2. [Configure SAML authentication](/admin/auth/saml/). If you are using Bitbucket Server / Bitbucket Data Center, the `login` attribute is _not_ optional. You need to pass the Bitbucket Server username as the `login` attribute.
121-
3. [Configure an HTTP authentication proxy](/admin/auth/#http-authentication-proxies), passing the Bitbucket Server username value as the `usernameHeader`.
115+
We support authentication through OAuth for Bitbucket Server / Bitbucket Data Center. See the [Bitbucket Server auth provider docs](/admin/auth/#bitbucket-server).
122116

123117
### Azure DevOps Services
124118

docs/batch-changes/faq.mdx

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,17 @@ However, [steps](/batch-changes/batch-spec-yaml-reference#steps-run) can run any
6565
- [Jira tickets](https://github.com/sourcegraph/batch-change-examples/blob/main/ticketing-systems/jira-tickets/README)
6666
- [GitHub issues](https://github.com/sourcegraph/batch-change-examples/blob/main/ticketing-systems/github-issues/README)
6767

68+
## Can I use GitHub/GitLab runners to automate my batch changes?
69+
To an extent, yes, you can use GitHub Actions or GitLab CI/CD runners to automate Sourcegraph batch changes to allow you to trigger batch changes automatically after events like library updates or on a schedule.
70+
The implementation requirements are network access where your CI/CD runners must be able to reach your Sourcegraph instance and have authentication through a Sourcegraph access token for API access along with appropriate permissions to create batch changes.
71+
72+
If you'd want to implement this automation:
73+
74+
The best way would be to contact your SRE/Infrastructure team to verify if your CI/CD runners can access your Sourcegraph instance and if access is not available, work with your SRE team to request this capability.
75+
Once access is confirmed, you can proceed with implementing the automation
76+
77+
However, this requires your CI/CD runners to have network access to your Sourcegraph instance. In many enterprise environments, this access may be restricted by default.
78+
6879
## What happens to the preview page if the batch spec is not applied?
6980

7081
Unapplied batch specs are removed from the database after **seven days**.

public/llms.txt

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -105600,13 +105600,7 @@ And configure the identity provider to pass the email address as the `nameID`.
105600105600

105601105601
### Bitbucket Server / Bitbucket Data Center authorization
105602105602

105603-
We do not currently support OAuth for Bitbucket Server or Bitbucket Data Center. You will need to combine permissions syncing from Bitbucket Server / Bitbucket Data Center with another authentication mechanism (SAML, built-in auth, HTTP authentication proxies). Bitbucket Server and Bitbucket Data Center only pass usernames to Sourcegraph, so you’ll need to make sure that those usernames are matched by whatever mechanism you choose to use for access.
105604-
105605-
Follow the steps to [sync Bitbucket Server / Bitbucket Data Center permissions](/admin/code_hosts/bitbucket_server#repository-permissions). Then, do one of the following:
105606-
105607-
1. Create the user accounts in Sourcegraph with matching usernames. (Access using `builtin` auth.)
105608-
2. [Configure SAML authentication](/admin/auth/saml/). If you are using Bitbucket Server / Bitbucket Data Center, the `login` attribute is _not_ optional. You need to pass the Bitbucket Server username as the `login` attribute.
105609-
3. [Configure an HTTP authentication proxy](/admin/auth/#http-authentication-proxies), passing the Bitbucket Server username value as the `usernameHeader`.
105603+
We support authentication through OAuth for Bitbucket Server / Bitbucket Data Center. See the [Bitbucket Server auth provider docs](/admin/auth/#bitbucket-server).
105610105604

105611105605
### Azure DevOps Services
105612105606

src/data/redirects.ts

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,9 @@
11
const redirectsData = [
2-
2+
{
3+
source: "/docs/admin/deploy_executors",
4+
destination: "https://sourcegraph.com/docs/admin/executors/deploy_executors",
5+
permanent: true
6+
},
37
{
48
source: "/dev/roadmap",
59
destination: "https://sourcegraph.com/direction",

0 commit comments

Comments
 (0)