Skip to content

Commit 5c9ff00

Browse files
authored
Merge pull request #82 from packagist/private-networks-dns-outgoing
private-networks-and-firewalls: add info on outgoing.packagist.com
2 parents 68f0b8e + 7b552d7 commit 5c9ff00

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

docs/private-networks-and-firewalls.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ Private Packagist requires access to your source code for several reasons:
77
1. Private Packagist needs to collect the metadata from composer.json files stored in your version control system to make the information available to Composer commands.
88
1. Private packagist needs to export zip files of specific revisions of your packages' source code for fast installation through Composer without cloning or checking out your entire source code repository on CI or deployment systems.
99
1. If you wish to use an integration with your code hosting solution (e.g. GitHub Enterprise, GitLab Self-Managed, Bitbucket Server) Private Packagist will need access to their API to allow logins with OAuth and to provide listings of teams and repositories.
10+
1. Features like Update Review which comment on your pull requests or create pull requests need to access your code hosting solution via API and VCS to do so.
1011

1112
If the source code for your private packages is stored in your company's private network behind a firewall and you would like to use Private Packagist you have two options:
1213

@@ -19,4 +20,4 @@ If the source code for your private packages is stored in your company's private
1920
You will be adding packages to Private Packagist using a URL to the respective version control repository. You need to ensure that you either have public DNS records pointing to the machines on your internal network or you need to directly use the respective IP addresses. If your version control system server does not have a public IP, Private Packagist cannot connect to it.
2021

2122
### Firewall Configuration
22-
You need to allow connections from Private Packagist Cloud servers to servers behind your firewall. We recommend that you accept external connections from all IPs in the document at <https://packagist-network.s3.eu-west-1.amazonaws.com/ip-address-list>. This list is frequently updated automatically to contain a current list of our IP addresses used to access your source code or your code hosting solution. For this reason we recommend that you use your firewall's mechanism to reference an external list of IPs with this URL rather than manually copying the IPs which will require frequent maintenance on your end.
23+
You need to allow connections from Private Packagist Cloud servers to servers behind your firewall. We recommend that you accept external connections from all IPs in the document at <https://packagist-network.s3.eu-west-1.amazonaws.com/ip-address-list>. This list is updated automatically to contain a current list of our IP addresses used to access your source code or your code hosting solution. While it does not change frequently, we may modify it at any time. For this reason, we recommend that you use your firewall's mechanism to reference an external list of IPs with this URL rather than manually copying the IPs which will require frequent maintenance on your end. Additionally the DNS name `outgoing.packagist.com` resolves to a full list of all these IPv4 and IPv6 addresses as well, so if your firewall can use a DNS name instead to grant us access, you may use this record.

0 commit comments

Comments
 (0)