@@ -49,23 +49,7 @@ def list(
4949 extra_body : Body | None = None ,
5050 timeout : float | httpx .Timeout | None | NotGiven = NOT_GIVEN ,
5151 ) -> IPRanges :
52- """
53- Returns the complete list of IPv4 and IPv6 address ranges that Cloud uses for
54- outbound (egress) traffic. Typical reasons to call this endpoint:
55-
56- - Host-file delivery workflows – You upload images or other assets to the Cloud
57- and share a download link that points to your own infrastructure. Add these
58- egress prefixes to your firewall or object-storage allow-list so our clients
59- can fetch the files without being blocked.
60- - Push integrations / webhooks – You subscribe to the user-actions event log and
61- Cloud pushes events to your listener endpoint. Whitelisting the egress IP
62- ranges lets you accept only traffic that originates from us.
63- - General security controls, audit tooling, or SIEM rules that need to verify
64- that traffic truly comes from the Cloud. The list is global (covers all
65- regions) and refreshed automatically whenever Gcore allocates new egress IP
66- space. The response is an array of CIDR blocks; duplicate prefixes are not
67- returned.
68- """
52+ """List of all Edge Cloud Egress Public IPs."""
6953 return self ._get (
7054 "/cloud/public/v1/ipranges/egress" ,
7155 options = make_request_options (
@@ -105,23 +89,7 @@ async def list(
10589 extra_body : Body | None = None ,
10690 timeout : float | httpx .Timeout | None | NotGiven = NOT_GIVEN ,
10791 ) -> IPRanges :
108- """
109- Returns the complete list of IPv4 and IPv6 address ranges that Cloud uses for
110- outbound (egress) traffic. Typical reasons to call this endpoint:
111-
112- - Host-file delivery workflows – You upload images or other assets to the Cloud
113- and share a download link that points to your own infrastructure. Add these
114- egress prefixes to your firewall or object-storage allow-list so our clients
115- can fetch the files without being blocked.
116- - Push integrations / webhooks – You subscribe to the user-actions event log and
117- Cloud pushes events to your listener endpoint. Whitelisting the egress IP
118- ranges lets you accept only traffic that originates from us.
119- - General security controls, audit tooling, or SIEM rules that need to verify
120- that traffic truly comes from the Cloud. The list is global (covers all
121- regions) and refreshed automatically whenever Gcore allocates new egress IP
122- space. The response is an array of CIDR blocks; duplicate prefixes are not
123- returned.
124- """
92+ """List of all Edge Cloud Egress Public IPs."""
12593 return await self ._get (
12694 "/cloud/public/v1/ipranges/egress" ,
12795 options = make_request_options (
0 commit comments