| title | Permission syncing |
|---|---|
| sidebarTitle | Permission syncing |
import LicenseKeyRequired from '/snippets/license-key-required.mdx'
Permission syncing allows you to sync Access Permission Lists (ACLs) from a code host to Sourcebot. When configured, users signed into Sourcebot will only be able to access repositories that they have access to on the code host. Practically, this means:
- Code Search results will only include repositories that the user has access to.
- Code navigation results will only include repositories that the user has access to.
- MCP results will only include results from repositories the user has access to.
- Ask Sourcebot (and the underlying LLM) will only have access to repositories that the user has access to.
- File browsing is scoped to the repositories that the user has access to.
Permission syncing can be enabled by setting the EXPERIMENT_EE_PERMISSION_SYNC_ENABLED environment variable to true.
docker run \
-e EXPERIMENT_EE_PERMISSION_SYNC_ENABLED=true \
/* additional args */ \
ghcr.io/sourcebot-dev/sourcebot:latestWe are actively working on supporting more code hosts. If you'd like to see a specific code host supported, please reach out.
| Platform | Permission syncing |
|---|---|
| GitHub (GHEC & GHEC Server) | ✅ |
| GitLab (Self-managed & Cloud) | ✅ |
| Bitbucket Cloud | 🟠 Partial |
| Bitbucket Data Center | 🛑 |
| Gitea | 🛑 |
| Gerrit | 🛑 |
| Generic git host | 🛑 |
Prerequisites:
- Configure GitHub as an external identity provider.
- If you are using a self-hosted GitHub instance, you must also set the
baseUrlproperty of thegithubidentity provider in the config file to the base URL of your GitHub instance (e.g.https://github.example.com).
Permission syncing works with GitHub.com, GitHub Enterprise Cloud, and GitHub Enterprise Server. For organization-owned repositories, users that have read-only access (or above) via the following methods will have their access synced to Sourcebot:
- Outside collaborators
- Organization members that are direct collaborators
- Organization members with access through team memberships
- Organization members with access through default organization permissions
- Organization owners.
Notes:
- A GitHub external identity provider must be configured to (1) correlate a Sourcebot user with a GitHub user, and (2) to list repositories that the user has access to for User driven syncing.
- OAuth tokens must assume the
reposcope in order to use the List repositories for the authenticated user API during User driven syncing. Sourcebot will only use this token for reads.
Prerequisites:
- Configure GitLab as an external identity provider.
- If you are using a self-hosted GitLab instance, you must also set the
baseUrlproperty of thegitlabidentity provider in the config file to the base URL of your GitLab instance (e.g.https://gitlab.example.com).
Permission syncing works with GitLab Self-managed and GitLab Cloud. Users with Guest role or above with membership to a group or project will have their access synced to Sourcebot. Both direct and indirect membership to a group or project will be synced with Sourcebot. For more details, see the GitLab docs.
Notes:
- A GitLab external identity provider must be configured to (1) correlate a Sourcebot user with a GitLab user, and (2) to list repositories that the user has access to for User driven syncing.
- OAuth tokens require the
read_apiscope in order to use the List projects for the authenticated user API during User driven syncing. - Internal GitLab projects are not enforced by permission syncing and therefore are visible to all users. Only private projects are enforced.
Prerequisites:
- Configure Bitbucket Cloud as an external identity provider.
Permission syncing works with Bitbucket Cloud. OAuth tokens must assume the account and repository scopes.
- Membership in a group that is added to the repository
- Membership in the project that contains the repository
- Membership in a group that is part of a project containing the repository
These users will still gain access via user-driven syncing, which fetches all private repositories accessible to each authenticated user. However, there may be a delay between when a repository is added and when affected users gain access in Sourcebot (up to the experiment_userDrivenPermissionSyncIntervalMs interval, which defaults to 24 hours).
If your workspace relies heavily on group or project-level permissions rather than direct user grants, we recommend reducing the experiment_userDrivenPermissionSyncIntervalMs interval to limit the window of delay.
Notes:
- A Bitbucket Cloud external identity provider must be configured to (1) correlate a Sourcebot user with a Bitbucket Cloud user, and (2) to list repositories that the user has access to for User driven syncing.
- OAuth tokens require the
accountandrepositoryscopes. Therepositoryscope is required to list private repositories during User driven syncing.
Permission syncing works by periodically syncing ACLs from the code host(s) to Sourcebot to build an internal mapping between Users and Repositories. This mapping is hydrated in two directions:
- User driven : fetches the list of all repositories that a given user has access to.
- Repo driven : fetches the list of all users that have access to a given repository.
User driven and repo driven syncing occurs every 24 hours by default. These intervals can be configured using the following settings in the config file:
| Setting | Type | Default | Minimum |
|---|---|---|---|
experiment_repoDrivenPermissionSyncIntervalMs |
number | 24 hours | 1 |
experiment_userDrivenPermissionSyncIntervalMs |
number | 24 hours | 1 |