You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,8 +7,11 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
7
7
8
8
## [Unreleased]
9
9
10
+
## [4.5.2] - 2025-07-19
11
+
10
12
### Changed
11
13
- Fixed typos in UI, docs, code [#369](https://github.com/sourcebot-dev/sourcebot/pull/369)
14
+
- Add anonymous access option to core and deprecate the `enablePublicAccess` config setting. [#385](https://github.com/sourcebot-dev/sourcebot/pull/385)
There are various settings to control how users access your Sourcebot deployment.
7
+
8
+
# Anonymous access
9
+
10
+
<Note>Anonymous access cannot be enabled if you have an enterprise license. If you have any questions about this restriction [reach out to us](https://www.sourcebot.dev/contact).</Note>
11
+
12
+
By default, your Sourcebot deployment is gated with a login page. If you'd like users to access the deployment anonymously, you can enable anonymous access.
13
+
14
+
This can be enabled by navigating to **Settings -> Access** or by setting the `FORCE_ENABLE_ANONYMOUS_ACCESS` environment variable.
15
+
16
+
When accessing Sourcebot anonymously, a user's permissions are limited to that of the [Guest](/docs/configuration/auth/roles-and-permissions) role.
17
+
18
+
# Member Approval
19
+
20
+
By default, Sourcebot requires new members to be approved by the owner of the deployment. This section explains how approvals work and how
21
+
to configure this behavior.
22
+
23
+
### Configuration
24
+
Member approval can be configured by the owner of the deployment by navigating to **Settings -> Members**:
If member approval is enabled, new members will be asked to submit a join request after signing up. They will not have access to the Sourcebot deployment
31
+
until this request is approved by the owner.
32
+
33
+
The owner can see and manage all pending join requests by navigating to **Settings -> Members**.
34
+
35
+
## Invite link
36
+
37
+
If member approval is required, an owner of the deployment can enable an invite link. When enabled, users
38
+
can use this invite link to register and be automatically added to the organization without approval:
39
+
40
+

Copy file name to clipboardExpand all lines: docs/docs/configuration/auth/roles-and-permissions.mdx
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,4 +10,5 @@ Each member has a role which defines their permissions within an organization:
10
10
| Role | Permission |
11
11
| :--- | :--------- |
12
12
|`Owner`| Each organization has a single `Owner`. This user has full access rights, including: connection management, organization management, and inviting new members. |
13
-
|`Member`| Read-only access to the organization. A `Member` can search across the repos indexed by an organization's connections, but may not manage the organization or its connections. |
13
+
|`Member`| Read-only access to the organization. A `Member` can search across the repos indexed by an organization's connections, as well as view the organizations configuration and member list. However, they cannot modify this configuration or invite new members. |
14
+
|`Guest`| When accessing Sourcebot [anonymously](/docs/configuration/auth/access-settings#anonymous-access), a user has the `Guest` role. `Guest`'s can search across repos indexed by an organization's connections, but cannot view any information regarding the organizations configuration or members. |
Copy file name to clipboardExpand all lines: docs/docs/configuration/environment-variables.mdx
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,7 @@ The following environment variables allow you to configure your Sourcebot deploy
21
21
|`DATABASE_DATA_DIR`|`$DATA_CACHE_DIR/db`| <p>The data directory for the default Postgres database.</p> |
22
22
|`DATABASE_URL`|`postgresql://postgres@ localhost:5432/sourcebot`| <p>Connection string of your Postgres database. By default, a Postgres database is automatically provisioned at startup within the container.</p><p>If you'd like to use a non-default schema, you can provide it as a parameter in the database url </p> |
23
23
|`EMAIL_FROM_ADDRESS`|`-`| <p>The email address that transactional emails will be sent from. See [this doc](/docs/configuration/transactional-emails) for more info.</p> |
24
+
| `FORCE_ENABLE_ANONYMOUS_ACCESS` | `false` | <p>When enabled, [anonymous access](/docs/configuration/auth/access-settings#anonymous-access) to the organization will always be enabled</p>
24
25
|`REDIS_DATA_DIR`|`$DATA_CACHE_DIR/redis`| <p>The data directory for the default Redis instance.</p> |
25
26
|`REDIS_URL`|`redis://localhost:6379`| <p>Connection string of your Redis instance. By default, a Redis database is automatically provisioned at startup within the container.</p> |
26
27
|`REDIS_REMOVE_ON_COMPLETE`|`0`| <p>Controls how many completed jobs are allowed to remain in Redis queues</p> |
Copy file name to clipboardExpand all lines: docs/docs/connections/github.mdx
+21-3Lines changed: 21 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -104,11 +104,29 @@ Sourcebot can sync code from GitHub.com, GitHub Enterprise Server, and GitHub En
104
104
105
105
## Authenticating with GitHub
106
106
107
-
In order to index private repositories, you'll need to generate a GitHub Personal Access Token (PAT). Create a new PAT [here](https://github.com/settings/tokens/new) and make sure you select the `repo` scope:
107
+
In order to index private repositories, you'll need to generate a access token and provide it to Sourcebot. GitHub provides [two types](https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/managing-your-personal-access-tokens#types-of-personal-access-tokens) of access tokens:
108
108
109
-

110
109
111
-
Next, provide the PAT via the `token` property, either as an environment variable or a secret:
110
+
<AccordionGroup>
111
+
<Accordiontitle="Fine-grained personal access tokens"defaultOpen>
112
+
Create a new fine-grained PAT [here](https://github.com/settings/personal-access-tokens/new). First, select the resource owner and the repositories that you want Sourcebot to have access to.
113
+
114
+
Next, under "Repository permissions", select permissions `Contents` and `Metadata` with access `Read-only`. The permissions should look like the following:
115
+
116
+

Copy file name to clipboardExpand all lines: docs/docs/deployment-guide.mdx
-17Lines changed: 0 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,23 +7,6 @@ import SupportedPlatforms from '/snippets/platform-support.mdx'
7
7
The following guide will walk you through the steps to deploy Sourcebot on your own infrastructure. Sourcebot is distributed as a [single docker container](/docs/overview#architecture) that can be deployed to a k8s cluster, a VM, or any platform that supports docker.
8
8
9
9
10
-
## Walkthrough video
11
-
---
12
-
13
-
Watch this quick walkthrough video to learn how to deploy Sourcebot using Docker.
<Note>Hit an issue? Please let us know on [GitHub discussions](https://github.com/sourcebot-dev/sourcebot/discussions/categories/support) or by [emailing us](mailto:[email protected]).</Note>
0 commit comments