@@ -49,7 +49,23 @@ def list(
4949 extra_body : Body | None = None ,
5050 timeout : float | httpx .Timeout | None | NotGiven = NOT_GIVEN ,
5151 ) -> IPRanges :
52- """List of all Edge Cloud Egress Public IPs."""
52+ """
53+ Returns the complete list of IPv4 and IPv6 address ranges that Cloud uses for
54+ outbound (egress) traffic. Typical reasons to call this endpoint:
55+
56+ - Host-file delivery workflows – You upload images or other assets to the Cloud
57+ and share a download link that points to your own infrastructure. Add these
58+ egress prefixes to your firewall or object-storage allow-list so our clients
59+ can fetch the files without being blocked.
60+ - Push integrations / webhooks – You subscribe to the user-actions event log and
61+ Cloud pushes events to your listener endpoint. Whitelisting the egress IP
62+ ranges lets you accept only traffic that originates from us.
63+ - General security controls, audit tooling, or SIEM rules that need to verify
64+ that traffic truly comes from the Cloud. The list is global (covers all
65+ regions) and refreshed automatically whenever Gcore allocates new egress IP
66+ space. The response is an array of CIDR blocks; duplicate prefixes are not
67+ returned.
68+ """
5369 return self ._get (
5470 "/cloud/public/v1/ipranges/egress" ,
5571 options = make_request_options (
@@ -89,7 +105,23 @@ async def list(
89105 extra_body : Body | None = None ,
90106 timeout : float | httpx .Timeout | None | NotGiven = NOT_GIVEN ,
91107 ) -> IPRanges :
92- """List of all Edge Cloud Egress Public IPs."""
108+ """
109+ Returns the complete list of IPv4 and IPv6 address ranges that Cloud uses for
110+ outbound (egress) traffic. Typical reasons to call this endpoint:
111+
112+ - Host-file delivery workflows – You upload images or other assets to the Cloud
113+ and share a download link that points to your own infrastructure. Add these
114+ egress prefixes to your firewall or object-storage allow-list so our clients
115+ can fetch the files without being blocked.
116+ - Push integrations / webhooks – You subscribe to the user-actions event log and
117+ Cloud pushes events to your listener endpoint. Whitelisting the egress IP
118+ ranges lets you accept only traffic that originates from us.
119+ - General security controls, audit tooling, or SIEM rules that need to verify
120+ that traffic truly comes from the Cloud. The list is global (covers all
121+ regions) and refreshed automatically whenever Gcore allocates new egress IP
122+ space. The response is an array of CIDR blocks; duplicate prefixes are not
123+ returned.
124+ """
93125 return await self ._get (
94126 "/cloud/public/v1/ipranges/egress" ,
95127 options = make_request_options (
0 commit comments