Loopback.Cloud
Documentation
DocumentationGit OAuth and webhooks

Git OAuth and webhooks

Bundles rely on read access to your repositories. Loopback integrates GitHub and GitLab through organization-level OAuth application routes and system ingress webhooks that receive push and pipeline events.


OAuth applications (organization)

Organization routes configure GitHub and GitLab OAuth clients:

  • Application ids, secrets, and self-hosted base URLs (GitLab, GitHub Enterprise patterns) stored as integration metadata.
  • Used when users authorize Loopback to clone and scan repositories for bundle discovery.

Secrets are stored by reference; never embed long-lived tokens in client-side code.


Webhooks (system ingress)

The API mounts ingress handlers for:

  • GitHub push and workflow events.
  • GitLab pipeline and push hooks.
  • Flux CD-style notifications where enabled.

Webhooks correlate external activity with bundle discovery, build, and deploy state machines. Exact HMAC validation and URL paths are deployment-specific; your operator publishes the public endpoint base.


Buyer checklist

  • Confirm which Git host editions are supported (github.com, GitLab SaaS, self-managed).
  • Map egress from Loopback workers to your Git IP allow lists.
  • Require least privilege OAuth scopes for repository read-only automation.

Loopback.Cloud
© Loopback.Cloud. All rights reserved.