Permissions

Permissions Categories

ScriptRunner for Bitbucket classifies users into the following four categories:

Global Administrators

Global Administrators can access ALL ScriptRunner for Bitbucket features and modify them as required. They can allow Project and Repository Administrators to configure some of ScriptRunner's features as mentioned in Admin-Only Project and Repository Script Access.

Refer to Atlassian's documentation to read more on Global Permissions for Global Administrators (Users with System Admin or Admin permission).

Project Administrators

Refer to Atlassian's documentation to read more on Global Permissions for Project Administrators (Users with Project Creator permission) or Using Project Permissions (Users with Admin permission).

Repository Administrators

Refer to Atlassian's documentation to read more on Using Repository Permissions for Repository Administrators (Users with Repository Admin permission).

Scripts configured by Project and Repository Administrators are run in a sandboxed environment. You can read more information in Repository and Project Scripts for Administrators.

Users

Users (normal Bitbucket users without any of the above roles).

Feature Permissions

The table below lists the main ScriptRunner for Bitbucket features and details the permissions required to use each feature:

FeatureSpecificsGlobal Admin PermissionProject Admin PermissionRepository Admin Permission
Browse
(tick)

Script Editor
(tick)

Resources
(tick)

Fragments
(tick)

REST Endpoints
(tick)

Jobs
(tick)

Console
(tick)

Built-in Scripts
(tick)

Built-in ScriptsClone repository configuration(tick)(tick)
Built-in ScriptsRepository size report(tick)(tick)
Pre Hooks
(tick)

Pre HooksBranch and tag naming standards enforcement(tick)(tick)

(tick)

Pre HooksRestrict file size(tick)(tick)

(tick)

Pre HooksProtect git refs(tick)(tick)

(tick)

Pre HooksReject force push(tick)(tick)

(tick)

Pre HooksReject merge commits(tick)(tick)

(tick)

Pre HooksRequire commits to be associated with a valid Jira issue(tick)(tick)

(tick)

Pre HooksEnforce trusted commit authors(tick)(tick)

(tick)

Post Hooks
(tick)

Post HooksSend custom email following code push(tick)(tick)

(tick)

Post HooksRespond to pushes with a message(tick)(tick)

(tick)

Post HooksRespond to pushes if pull request is outdated or conflicted(tick)(tick)

(tick)

Merge Checks
(tick)

Merge ChecksPrevent merge of pull requests behind target branch(tick)(tick)

(tick)

Merge ChecksConditional merge check(tick)(tick)(tick)
Merge ChecksRequire that a pull request is associated with a valid Jira issue(tick)(tick)

(tick)

Merge ChecksRequire a minimum number of approvers(tick)(tick)

(tick)

Listeners
(tick)

ListenersAuto-add reviewers to pull requests(tick)(tick)

(tick)

ListenersCheck delete branch checkbox(tick)(tick)

(tick)

ListenersAuto-merge pull requests on approval(tick)(tick)

(tick)

ListenersBlock out-of-date pull requests(tick)(tick)

(tick)

ListenersAdd tasks to new pull requests(tick)(tick)

(tick)

ListenersDynamically add reviewers to pull requests(tick)(tick)

(tick)

ListenersWithdraw approvals when a pull request changes(tick)(tick)

(tick)

ListenersSend custom email on event(tick)(tick)

(tick)

For more information on each type of permission, please visit Atlassian's Controlling Access to Code documentation.


On this page