Developer
News and Updates
Get Support
Sign in
Get Support
Sign in
DOCUMENTATION
Cloud
Data Center
Resources
Sign in
Sign in
DOCUMENTATION
Cloud
Data Center
Resources
Sign in
Last updated May 3, 2026

Changelog

This changelog is the source of truth for all changes to the Bitbucket API and Bitbucket Connect API that affect people using Bitbucket Cloud and developing Bitbucket Cloud apps.

To ask any questions related to Bitbucket Cloud development please visit the Bitbucket Cloud developer community.

3 May 2026

Added Bitbucket Connect → Forge migration tooling: new addon clientKey endpoint

What’s changing
We’ve introduced a new Bitbucket REST API endpoint that allows a Forge app to retrieve the clientKey of its linked Connect app installation.

This endpoint supports the migration process from Connect to Forge. By retrieving the clientKey, the installed Forge app can identify the equivalent Connect app installation, enabling you to perform data migration or cleanup tasks effectively.

What you need to do
To use this endpoint, ensure you have configured the linkage between your Connect and Forge apps.

  • Add the forgeAppLink key to your Connect app descriptor.

  • Use the new endpoint to fetch the clientKey during your app's migration logic.

More details

1 May 2026

Deprecation Notice Deprecation and Removal of Legacy Bitbucket Cloud Code Search API

We are deprecating the Bitbucket Cloud legacy code search API endpoints effective May 1, 2026, with full removal on November 1, 2026.

The following endpoints are being decommissioned and will be removed on November 1, 2026:

  • GET /2.0/repositories/{workspace}/{repo_slug}/search/codeRepository-level code search

  • GET /2.0/workspaces/{workspace}/search/codeWorkspace-level code search

We are actively working on the new API which will be released ahead of the removal.

8 April 2026

Deprecation Notice Brownout Notice: OAuth 2.0 and API authentication changes for Bitbucket Cloud

As shared in our https://developer.atlassian.com/cloud/bitbucket/changelog/#CHANGE-3052, Bitbucket Cloud will fully deprecate / change behaviour for a small set of OAuth2 features on May 4, 2026. To help teams identify and migrate any remaining usage ahead of the enforcement date, we will run a series of controlled brownouts starting Apr 20, 2026, for two weeks, after which the functionality will be fully removed on May 4, 2026.

During each brownout window:

  • All OAuth authenticated requests directed at www.bitbucket.org will fail with an HTTP 401 error code

  • All OAuth authenticated requests which provide the OAuth access token in the access_token query parameters / POST body will fail with an HTTP 401 error code

  • The Client credentials grant flow will not issue refresh tokens in their token response.

  • OAuth token response payloads will return “scope"  instead of “scopes" (See notes)

Notes:

  • The minting of OAuth2 access tokens should always be made to https://bitbucket.org/site/oauth2/access_token. Bitbucket’s API does not mount these urls under the api subdomain.

  • In the week beginning Apr 12, 2026 the scope property will be returned alongside the scopes property, allowing time to onboard prior to the start of the brownout.

More details

Dates

Brownout duration per window

Brownout window start times (UTC)

Apr 20, 2026

15 minutes

00:00, 06:00, 12:00, 18:00

Apr 21, 2026

15 minutes

00:00, 06:00, 12:00, 18:00

Apr 22, 2026

30 minutes

00:00, 06:00, 12:00, 18:00

Apr 23, 2026

30 minutes

00:00, 06:00, 12:00, 18:00

Apr 24, 2026

1 hour

00:00, 06:00, 12:00, 18:00

Apr 25, 2026

1 hour

00:00, 06:00, 12:00, 18:00

Apr 26, 2026

2 hours

00:00, 06:00, 12:00, 18:00

Apr 27, 2026

2 hours

00:00, 06:00, 12:00, 18:00

Apr 28, 2026

3 hours

00:00, 06:00, 12:00, 18:00

Apr 29, 2026

3 hours

00:00, 06:00, 12:00, 18:00

Apr 30, 2026

4 hours

00:00, 06:00, 12:00, 18:00

May 1, 2026

4 hours

00:00, 06:00, 12:00, 18:00

May 2, 2026

5 hours

00:00, 06:00, 12:00, 18:00

May 3, 2026

5 hours

00:00, 06:00, 12:00, 18:00

May 4, 2026

Final removal

 

5 March 2026

Announcement Nominations for critical Connect -> Forge migration blockers now open

You can now nominate genuine migration blockers or major customer‑impact risks via the “Request review” flow on FRGE issues.

This flow will allow us to triage and assess requests to address remaining blockers to Forge migration before Connect end of support in December 2026. We’ll review requests over 3 monthly cycles, then freeze decisions.

Please review for existing tickets before creating new FRGE tickets. You may also review the announcement.

2 March 2026

Added Bitbucket deployment events are now available as Forge triggers

We've introduced three new Forge triggers for Bitbucket deployment events. These triggers allow your Forge app to respond to deployment lifecycle events in Bitbucket Pipelines.

The new triggers are:

  • avi:bitbucket:pending:deployment — Fires when a deployment is pending

  • avi:bitbucket:started:deployment — Fires when a deployment starts

  • avi:bitbucket:completed:deployment — Fires when a deployment completes

To use these triggers, add them to the trigger section of your app's manifest.yml file. Each trigger provides deployment event data including environment, state, and pipeline details.

For more information, see Bitbucket events.

1 March 2026

Removed Removal of Connect Inspector Service

Following this deprecation announcement on Feb 17, 2026, the Connect Inspector Service is now decommissoned.

We recommend migrating to Atlassian Forge for a more robust Events model, as Atlassian Connect will reach end of support in December 2026.

Developers who still need similar functionality can use the open‑sourced version of the tool.

26 February 2026

Deprecation Notice Brownout Notice: OAuth 1.0 and Implicit Grant Flows for Bitbucket Cloud

As shared in our https://developer.atlassian.com/cloud/bitbucket/changelog/#CHANGE-2887, Bitbucket Cloud will fully deprecate support for OAuth 1.0 and implicit grant flows on Feb 27, 2026. To help teams identify and migrate any remaining usage ahead of the enforcement date, we will run a series of controlled brownouts starting Feb 28, 2026, for two weeks, after which the functionality will be fully removed on Mar 14, 2026.

During each brownout window:

  • All requests to generate OAuth 1.0 or implicit grant access tokens will fail with an HTTP 400 error code.

  • All requests authenticated with existing OAuth 1.0 or implicit grant access tokens will fail with an HTTP 401 error code.

More details

Brownout schedule

Dates

Brownout duration per window

Brownout window start times (UTC)

Feb 28, 2026

15 minutes

00:00, 06:00, 12:00, 18:00

 

Mar 1, 2026

Mar 2, 2026

30 minutes

Mar 3, 2026

Mar 4, 2026

1 hour

Mar 5, 2026

Mar 6, 2026

2 hours

Mar 7, 2026

Mar 8, 2026

3 hours

Mar 9, 2026

Mar 10, 2026

4 hours

Mar 11, 2026

Mar 12, 2026

5 hours

Mar 13, 2026

Mar 14, 2026

Final removal

After the brownout schedule completes on Mar 14, 2026, OAuth 1.0 and implicit grant flows and existing access tokens will no longer be usable.

To maintain access, migrate to a supported OAuth 2.0 flow by following our OAuth 2.0 guide which provides complete details.

We understand these changes require effort, and we're here to support you. If you have questions, need migration guidance, or run into issues, please https://support.atlassian.com/contact/.

25 February 2026

Deprecation Notice Removal of Public REST APIs to retrieve various Bitbucket artifacts for a user

As shared in our previous announcement, Bitbucket Cloud will fully sunset the cross-workspace APIs on April 14, 2026. We had previously communicated an earlier date but have decided to postpone this due to feedback from our partners.

To see the full list of affected APIs and the corresponding alternative APIs that we suggest transitioning to, please follow the “More details” section of this prior announcement. Based on feedback, we have also released a new API that allows you to list repository permissions in a workspace for a user.

To help teams identify and migrate any remaining usage ahead of the enforcement date, we will run a series of controlled brownouts starting March 23, 2026, for three weeks. During each brownout window, requests using the old cross-workspace APIs will be rejected, and affected endpoints will return a 410 Gone error. If you have made the switch to the new APIs, announced here, then you will not be impacted during the brownouts.

More details

Brownout schedule

Date

Brownout duration per window

Brownout window start times (UTC)

March 24, 2026

15 minutes

00:00, 06:00, 12:00, 18:00

March 25, 2026

March 26, 2026

March 27, 2026

15 minutes

March 28, 2026

March 29, 2026

March 30, 2026

15 minutes

March 31, 2026

April 1, 2026

April 2, 2026

30 minutes

April 3, 2026

April 4, 2026

April 5, 2026

1 hour

April 6, 2026

April 7, 2026

April 8, 2026

2 hours

April 9, 2026

April 10, 2026

April 11, 2026

3 hours

April 12, 2026

April 13, 2026

April 14, 2026

Final removal

During the brownout, if you encounter an error, please contact your app vendor. They will need to switch to using the new, support cross-workspace APIs.

After the brownout schedule completes, requests to the old cross-workspace APIs will stop working entirely at all time will no longer be supported starting April 14, 2026.

We understand these changes require effort, and we're here to support you. If you have questions, need migration guidance, or run into issues, please contact Atlassian Support.

20 February 2026

Deprecation Notice Deprecation and Removal of native Bitbucket Issues

As part of our wider announcement for deprecation of native Bitbucket Cloud Issues and Wikis, we will be removing API endpoints that support Issue Tracker in mid-August, 2026.

Expand the More Details view below to see the full list of endpoints being removed.

More details

Here is the full list of endpoints for Issue Tracker that will be removed:

GET/repositories/{workspace}/{repo_slug}/components

GET/repositories/{workspace}/{repo_slug}/components/{component_id}

GET/repositories/{workspace}/{repo_slug}/issues

POST/repositories/{workspace}/{repo_slug}/issues

POST/repositories/{workspace}/{repo_slug}/issues/export

GET/repositories/{workspace}/{repo_slug}/issues/export/{repo_name}-issues-{task_id}.zip

GET/repositories/{workspace}/{repo_slug}/issues/import

POST/repositories/{workspace}/{repo_slug}/issues/import

GET/repositories/{workspace}/{repo_slug}/issues/{issue_id}

PUT/repositories/{workspace}/{repo_slug}/issues/{issue_id}

DEL/repositories/{workspace}/{repo_slug}/issues/{issue_id}

GET/repositories/{workspace}/{repo_slug}/issues/{issue_id}/attachments

POST/repositories/{workspace}/{repo_slug}/issues/{issue_id}/attachments

GET/repositories/{workspace}/{repo_slug}/issues/{issue_id}/attachments/{path}

DEL/repositories/{workspace}/{repo_slug}/issues/{issue_id}/attachments/{path}

GET/repositories/{workspace}/{repo_slug}/issues/{issue_id}/changes

POST/repositories/{workspace}/{repo_slug}/issues/{issue_id}/changes

GET/repositories/{workspace}/{repo_slug}/issues/{issue_id}/changes/{change_id}

GET/repositories/{workspace}/{repo_slug}/issues/{issue_id}/comments

POST/repositories/{workspace}/{repo_slug}/issues/{issue_id}/comments

GET/repositories/{workspace}/{repo_slug}/issues/{issue_id}/comments/{comment_id}

PUT/repositories/{workspace}/{repo_slug}/issues/{issue_id}/comments/{comment_id}

DEL/repositories/{workspace}/{repo_slug}/issues/{issue_id}/comments/{comment_id}

GET/repositories/{workspace}/{repo_slug}/issues/{issue_id}/vote

PUT/repositories/{workspace}/{repo_slug}/issues/{issue_id}/vote

DEL/repositories/{workspace}/{repo_slug}/issues/{issue_id}/vote

GET/repositories/{workspace}/{repo_slug}/issues/{issue_id}/watch

PUT/repositories/{workspace}/{repo_slug}/issues/{issue_id}/watch

DEL/repositories/{workspace}/{repo_slug}/issues/{issue_id}/watch

GET/repositories/{workspace}/{repo_slug}/milestones

GET/repositories/{workspace}/{repo_slug}/milestones/{milestone_id}

GET/repositories/{workspace}/{repo_slug}/versions

GET/repositories/{workspace}/{repo_slug}/versions/{version_id}

Announcement Upcoming AGC app security requirements and 2026 updates to Cloud App Security Requirements

We are introducing baseline security requirements for Atlassian Government Cloud (AGC) apps, which will take effect on Mar 31, 2026. If you have any questions regarding these new standards, please contact us here: https://ecosystem.atlassian.net/servicedesk/customer/portal/34/group/109/create/579

We’re also publishing our annual update to the general Cloud App Security Requirements for 2026, which includes new provisions for AI security, data protection, and supply chain security. See More details for highlights on this update.

More details

2026 updates to Cloud App Security Requirements

Key additions to the general Cloud App Security Requirements include:

  • AI Security: New requirements for apps using Forge Rovo actions and agents, including validating action inputs as untrusted, implementing permission checks for admin-level actions, and accurately configuring actionVerb values.

  • Data Protection:

    • External OAuth2 clients must use Forge's OAuth2 Providers and be configured as confidential clients where supported.

    • Application logs must strictly exclude PII, credentials, and sensitive data.

    • Apps must ensure strict tenant isolation during runtime.

    • Apps must not execute arbitrary code by spawning child processes (e.g., using Node.js child_process).

  • Application Security:

    • Apps using Forge SQL must use parameterized queries to mitigate SQL injection risks.

    • Updated guidance on Content Security Policy (CSP) regarding unsafe-inline and unsafe-eval directives.

  • Runtime Security:

    • Apps must not use EOL (end-of-life) Node.js runtimes.

18 February 2026

Added AtlassianIcon and AtlassianTile components available in Preview for UI Kit

We've introduced two new components to UI Kit, now available in Preview: AtlassianTile and AtlassianIcon. Use these components to display Atlassian object type icons—such as stories, tasks, epics, blogs, and more—with consistent styling that aligns with the Atlassian Design System.

Both components provide fixed color, size, and styling options for Atlassian object types. Any updates to icon or tile styling in the Atlassian Design System are automatically reflected in your app.

For implementation details and examples, see the Atlassian icon and Atlassian tile component documentation.

17 February 2026

Deprecation Notice Deprecating Connect Inspector Service

The Connect Inspector service is moving to open source and also being deprecated. This service will no longer allow the creation of new temporary apps. Already registered temporary apps will stop recording new events, and old events will be deleted. Any apps already installed on developer sites will not be uninstalled.

More details

Why is this deprecation necessary?

Connect Inspector helped developers better understand Atlassian Connect lifecycle events and web-triggers. This service allowed developers to generate a temporary and unique Atlassian Connect app, which could be installed on a cloud development environment. This, in turn, let developers inspect the full request flow of a Connect app.

However, usage of the Connect Inspector has decreased significantly due to the following:

Deprecating Connect Inspector allows the team to focus on Forge.

Dates and rollout

The Connect Inspector service will be discontinued by the end of February 2026.

Migration guidance

Developers who still need similar functionality can use the open‑sourced version of the tool.

Atlassian Connect will reach end of support in December 2026. Migrate to Atlassian Forge for a more robust Events model.

10 February 2026

Added rovo.isEnabled method now available in the Forge UI bridge

We’ve added a new rovo.isEnabled method to the Forge UI bridge API. This method returns a boolean indicating whether Rovo is enabled for the tenant. You can use it alongside the existing rovo.open method to conditionally invoke Rovo only when it’s available.

For more information, see the updated documentation for the Rovo bridge methods.

Added Height and width properties added to UI Kit Frame component

We've added optional height and width properties to the Frame component in UI Kit. Apps can now set explicit dimensions in pixels or percentages, instead of relying on automatic resizing. This gives you more control over your app's layout.

For more information, see the updated documentation for the Frame component.

5 February 2026

Deprecation Notice Removal of Public REST APIs related to Connect addon linkers feature

As part of end of support for Connect app, we will be deprecating addon linkers APIs.

On May 7, 2026 we will be removing the following endpoints:

  1. GET /2.0/addon/linkers

  2. GET /2.0/addon/linkers/{linker_key}

  3. GET /2.0/addon/linkers/{linker_key}/values

  4. PUT /2.0/addon/linkers/{linker_key}/values

  5. POST /2.0/addon/linkers/{linker_key}/values

  6. DEL /2.0/addon/linkers/{linker_key}/values

  7. GET /2.0/addon/linkers/{linker_key}/values/{value_id}

  8. DEL /2.0/addon/linkers/{linker_key}/values/{value_id}

Rate this page: