Skip to content

Commit 1009a47

Browse files
committed
Add detailed IP allowlisting explanation for all Git providers
1 parent fb80255 commit 1009a47

File tree

3 files changed

+54
-0
lines changed

3 files changed

+54
-0
lines changed

docs/bitbucket-installation.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,24 @@ description: Install gitStream to your Bitbucket workspace.
1919
- 13.56.203.235
2020
- 54.151.81.98
2121

22+
!!! Info "Understanding IP Allowlisting for gitStream"
23+
When setting up IP allowlists in Bitbucket, you're specifying which source IP addresses are permitted to interact with your repositories and APIs. This affects both gitStream and your CI/CD runners.
24+
25+
There are two primary cases where this matters for gitStream:
26+
1. **Webhook Event Handling by gitStream**
27+
When Bitbucket triggers a webhook event (e.g., a pull request opened), gitStream may need to make follow-up API calls to Bitbucket. This can include fetching additional metadata, posting comments to the PR, or performing other actions. These calls are made from the LinearB/gitStream service, which uses a fixed set of IP addresses. These IPs must be added to your Bitbucket allowlist to ensure proper operation.
28+
2. **Outbound Requests from Your CI Runner**
29+
When your pipeline runs gitStream, that runner might also make outbound calls to Bitbucket—for example, to clone a repository or retrieve commit history. These requests will originate from the runner's IP address.
30+
31+
If you encounter errors due to blocked IPs during your CI runs, it's likely that the runner is using an IP that is not part of the configured allowlist.
32+
33+
**Recommended Solution**
34+
To ensure reliability:
35+
- Add LinearB/gitStream service IPs to your Bitbucket allowlist (listed above).
36+
- Use self-hosted runners or runners with static IPs so you can manage and allowlist their addresses explicitly.
37+
38+
This combination ensures that both gitStream's internal operations and your CI runners' interactions with Bitbucket function without network restrictions.
39+
2240
Bitbucket Installation Overview
2341

2442
1. Designate a gitStream user account.

docs/github-installation.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,24 @@ description: Install gitStream to your GitHub organization.
1010
- 13.56.203.235
1111
- 54.151.81.98
1212

13+
!!! Info "Understanding IP Allowlisting for gitStream"
14+
When setting up IP allowlists in GitHub, you're specifying which source IP addresses are permitted to interact with your repositories and APIs. This affects both gitStream and your CI/CD runners.
15+
16+
There are two primary cases where this matters for gitStream:
17+
1. **Webhook Event Handling by gitStream**
18+
When GitHub triggers a webhook event (e.g., a pull request opened), gitStream may need to make follow-up API calls to GitHub. This can include fetching additional metadata, posting comments to the PR, or performing other actions. These calls are made from the LinearB/gitStream service, which uses a fixed set of IP addresses. These IPs must be added to your GitHub allowlist to ensure proper operation.
19+
2. **Outbound Requests from Your CI Runner**
20+
When your pipeline runs gitStream (e.g., via a GitHub Action), that runner might also make outbound calls to GitHub—for example, to clone a repository or retrieve commit history. These requests will originate from the runner's IP address.
21+
22+
If you encounter errors due to blocked IPs during your CI runs, it's likely that the runner is using an IP that is not part of the configured allowlist. This is a common issue with GitHub-hosted runners, as their IPs can be dynamic and change frequently.
23+
24+
**Recommended Solution**
25+
To ensure reliability:
26+
- Add LinearB/gitStream service IPs to your GitHub allowlist (listed above).
27+
- Use self-hosted runners or runners with static IPs so you can manage and allowlist their addresses explicitly.
28+
29+
This combination ensures that both gitStream's internal operations and your CI runners' interactions with GitHub function without network restrictions.
30+
1331
!!! Warning "Install gitStream"
1432

1533
Before you can complete the gitStream setup process, you need to install the gitStream app to your [GitHub organization](https://github.com/apps/gitstream-cm/installations/new){ .md-button }.

docs/gitlab-installation.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,24 @@ description: Install gitStream to your GitLab organization.
1313
- 13.56.203.235
1414
- 54.151.81.98
1515

16+
!!! Info "Understanding IP Allowlisting for gitStream"
17+
When setting up IP allowlists in GitLab, you're specifying which source IP addresses are permitted to interact with your repositories and APIs. This affects both gitStream and your CI/CD runners.
18+
19+
There are two primary cases where this matters for gitStream:
20+
1. **Webhook Event Handling by gitStream**
21+
When GitLab triggers a webhook event (e.g., a merge request opened), gitStream may need to make follow-up API calls to GitLab. This can include fetching additional metadata, posting comments to the MR, or performing other actions. These calls are made from the LinearB/gitStream service, which uses a fixed set of IP addresses. These IPs must be added to your GitLab allowlist to ensure proper operation.
22+
2. **Outbound Requests from Your CI Runner**
23+
When your pipeline runs gitStream, that runner might also make outbound calls to GitLab—for example, to clone a repository or retrieve commit history. These requests will originate from the runner's IP address.
24+
25+
If you encounter errors due to blocked IPs during your CI runs, it's likely that the runner is using an IP that is not part of the configured allowlist.
26+
27+
**Recommended Solution**
28+
To ensure reliability:
29+
- Add LinearB/gitStream service IPs to your GitLab allowlist (listed above).
30+
- Use self-hosted runners or runners with static IPs so you can manage and allowlist their addresses explicitly.
31+
32+
This combination ensures that both gitStream's internal operations and your CI runners' interactions with GitLab function without network restrictions.
33+
1634
GitLab Installation Overview
1735

1836
1. Designate a gitStream user account.

0 commit comments

Comments
 (0)