HackerOne Code
Visit HackerOne.comLog In
  • Introduction to HackerOne Code for On-Premise Integrations
  • Create User Account & Organization
  • Installing PullRequest Proxy
  • Configuring your Proxy to Connect to the PullRequest Server
  • Configure Posting User
    • Configure GitHub Posting User
    • Configure Bitbucket Posting User
    • Configure GitLab Posting User
    • Configure Azure DevOps Posting User
  • Configuring SSL
  • Start the PullRequest Proxy
  • Verify Data on HackerOne Code
  • Configure Webhooks
    • Configure GitHub Webhooks
    • Configure Bitbucket Webhooks
    • Configure GitLab Webhooks
    • Configure Azure DevOps Webhooks
  • Next Steps
    • Project Visibility in the HackerOne Code Dashboard
  • Manually Requesting Validation With Posting User
  • Upgrading PullRequest Proxy
  • PullRequest Proxy Dataflow Diagram
Powered by GitBook
On this page

Configure Webhooks

Webhooks allow the PullRequest application to be more responsive.

PreviousVerify Data on HackerOne CodeNextConfigure GitHub Webhooks

Last updated 1 year ago

Once the PullRequest Proxy service is running, it will start a webserver for fielding webhooks from the provider. For these, it's listening on port 5012 if not using SSL and on port 8443 if SSL is configured.

It's often useful to configure a DNS entry with a simple A record pointing at the IP address of this instance so that webhooks can be configured properly.

Below are links to configure webhooks for each of the providers. Go ahead and pick the provider you're using and follow the instructions. In order to configure a webhook secret to validate webhooks signed by the provider, the PROVIDER_WEBHOOK_SECRET field must be configured in the .env file that we edited earlier.

su pullrequest
cd $HOME/pullrequest_proxy
vim .env

Add any string to the following line:

PROVIDER_WEBHOOK_SECRET=<webhook_secret>

When configuring the PROVIDER_WEBHOOK_SECRET field for Azure DevOps, you actually need to configure two values - a username and a password. These should be formatted as such in this field: <username>:<password>

When you're finished editing the file, go ahead and exit the pullrequest user's shell and restart the service to pull in the new configuration.

exit
systemctl restart pullrequest-proxy

This field is optional. And if it's configured, this secret must be used when configuring webhooks for your provider or else it won't function properly.

Configure GitHub Webhooks
Configure GitLab Webhooks
Configure Bitbucket Webhooks
Configure Azure DevOps Webhooks