HackerOne Code
Visit HackerOne.comLog In
  • Introduction to HackerOne Code for On-Premise Integrations
  • Create User Account & Organization
  • Installing PullRequest Proxy
  • Configuring your Proxy to Connect to the PullRequest Server
  • Configure Posting User
    • Configure GitHub Posting User
    • Configure Bitbucket Posting User
    • Configure GitLab Posting User
    • Configure Azure DevOps Posting User
  • Configuring SSL
  • Start the PullRequest Proxy
  • Verify Data on HackerOne Code
  • Configure Webhooks
    • Configure GitHub Webhooks
    • Configure Bitbucket Webhooks
    • Configure GitLab Webhooks
    • Configure Azure DevOps Webhooks
  • Next Steps
    • Project Visibility in the HackerOne Code Dashboard
  • Manually Requesting Validation With Posting User
  • Upgrading PullRequest Proxy
  • PullRequest Proxy Dataflow Diagram
Powered by GitBook
On this page
  • Configure Webhooks
  • Applying on the Group level
  • Webhook Settings
  • Test Connection
  • Applying on the Project level
  • Webhook Settings
  • Test Connection
  1. Configure Webhooks

Configure GitLab Webhooks

After the GitLab posting user has been created and the repositories are populating in the HackerOne Code dashboard successfully, the GitLab webhooks can be configured.

PreviousConfigure Bitbucket WebhooksNextConfigure Azure DevOps Webhooks

Last updated 27 days ago

Configure Webhooks

GitLab allows webhooks to be configured on a GitLab Group level or per Project within a Group.

HackerOne strongly recommends configuring webhooks on the Group level so that new Projects your team creates will be immediately provisioned without service interruption.

  • (recommended)

Applying on the Group level

From your GitLab dashboard, select the desired GitLab Group -> Settings -> Webhooks:

Webhook Settings

URL

The base URL of your Proxy with the following:

/webhooks/gitlab

Triggers

SSL verification

OPTIONAL - Add a webhook secret. The secret will be used to sign your webhook requests as they are posted to the proxy:

  • You will need the same webhook secret for all of your repositories if you add one.

  • This secret must match the WEBHOOK_SECRET field when you configured the proxy.

Test Connection

Click the Add Webhook button; the webhook should appear in the Webhooks section at the bottom of the page.

Click the Test button to test the connection. You should receive a "Hook executed successfully:" message at the top of the screen.

If you received an error message, double-check the proxy base is valid and /webhooks/gitlab is added as a path.

Applying on the Project level

Webhooks can also be applied at the project level. The configuration is the same:

Webhook Settings

URL

The base URL of your Proxy with the following:

/webhooks/gitlab

Triggers

SSL verification

OPTIONAL - Add a webhook secret. The secret will be used to sign your webhook requests as they are posted to the proxy:

  • You will need the same webhook secret for all of your repositories if you add one.

  • Update your webhook secret in the PullRequest Proxy UI if you are adding one, otherwise the proxy will not be able to verify/process the webhooks.

Test Connection

Click the Add Webhook button; the webhook should appear in the Webhooks section at the bottom of the page.

Click the Test button to test the connection. This will expand a list of trigger types.

Select Merge request events from the list.

You should receive a "Hook executed successfully:" message at the top of the screen.

If you received an error message, double-check the proxy base is valid and /webhooks/gitlab is added as a path.

Repeat these steps for any other GitLab Projects listed in PullRequest that have not been configured.

Apply on the Group level
Apply to each Project individually
NOTE: GitLab's interface may change without notice