active
state and events
, use "Get a repository webhook."read:repo_hook
or repo
scope, and GitHub Apps must have the repository_hooks:read
permission.curl --location --request GET 'https://api.github.com/repos///hooks//config'
{
"content_type": "\"json\"",
"insecure_ssl": "\"0\"",
"secret": "\"********\"",
"url": "https://example.com/webhook"
}
json
and form
. The default is form
.url
will be verified when delivering payloads. Supported values include 0
(verification is performed) and 1
(verification is not performed). The default is 0
. We strongly recommend not setting this to 1
as you are subject to man-in-the-middle and other attacks.secret
will be used as the key
to generate the HMAC hex digest value for delivery signature headers.