mirror of
https://github.com/adnanh/webhook.git
synced 2025-05-11 08:04:44 +00:00
Update Bitbucket example to reference Atlassian's outgoing IP subnets (#578)
* Update Bitbucket example to check all of Atlassian's outgoing IP ranges Co-authored-by: Marek Isalski <git@maz.nu>
This commit is contained in:
parent
36e77b1c7a
commit
c7f7163aaa
1 changed files with 18 additions and 6 deletions
|
@ -83,7 +83,7 @@ This example works on 2.8+ versions of Webhook - if you are on a previous series
|
||||||
|
|
||||||
## Incoming Bitbucket webhook
|
## Incoming Bitbucket webhook
|
||||||
|
|
||||||
Bitbucket does not pass any secrets back to the webhook. [Per their documentation](https://confluence.atlassian.com/bitbucket/manage-webhooks-735643732.html#Managewebhooks-trigger_webhookTriggeringwebhooks), in order to verify that the webhook came from Bitbucket you must whitelist the IP range `104.192.143.0/24`:
|
Bitbucket does not pass any secrets back to the webhook. [Per their documentation](https://support.atlassian.com/organization-administration/docs/ip-addresses-and-domains-for-atlassian-cloud-products/#Outgoing-Connections), in order to verify that the webhook came from Bitbucket you must whitelist a set of IP ranges:
|
||||||
|
|
||||||
```json
|
```json
|
||||||
[
|
[
|
||||||
|
@ -100,11 +100,23 @@ Bitbucket does not pass any secrets back to the webhook. [Per their documentati
|
||||||
],
|
],
|
||||||
"trigger-rule":
|
"trigger-rule":
|
||||||
{
|
{
|
||||||
"match":
|
"or":
|
||||||
{
|
[
|
||||||
"type": "ip-whitelist",
|
{ "match": { "type": "ip-whitelist", "ip-range": "13.52.5.96/28" } },
|
||||||
"ip-range": "104.192.143.0/24"
|
{ "match": { "type": "ip-whitelist", "ip-range": "13.236.8.224/28" } },
|
||||||
}
|
{ "match": { "type": "ip-whitelist", "ip-range": "18.136.214.96/28" } },
|
||||||
|
{ "match": { "type": "ip-whitelist", "ip-range": "18.184.99.224/28" } },
|
||||||
|
{ "match": { "type": "ip-whitelist", "ip-range": "18.234.32.224/28" } },
|
||||||
|
{ "match": { "type": "ip-whitelist", "ip-range": "18.246.31.224/28" } },
|
||||||
|
{ "match": { "type": "ip-whitelist", "ip-range": "52.215.192.224/28" } },
|
||||||
|
{ "match": { "type": "ip-whitelist", "ip-range": "104.192.137.240/28" } },
|
||||||
|
{ "match": { "type": "ip-whitelist", "ip-range": "104.192.138.240/28" } },
|
||||||
|
{ "match": { "type": "ip-whitelist", "ip-range": "104.192.140.240/28" } },
|
||||||
|
{ "match": { "type": "ip-whitelist", "ip-range": "104.192.142.240/28" } },
|
||||||
|
{ "match": { "type": "ip-whitelist", "ip-range": "104.192.143.240/28" } },
|
||||||
|
{ "match": { "type": "ip-whitelist", "ip-range": "185.166.143.240/28" } },
|
||||||
|
{ "match": { "type": "ip-whitelist", "ip-range": "185.166.142.240/28" } }
|
||||||
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
|
Loading…
Add table
Reference in a new issue