WebHooks
Only webhooks belonging to the authenticated user's account are returned. Requires owner role to view webhook configurations.List of webhooks.
User is not authorized to list webhooks.
This operation cannot be undone. The webhook must belong to the authenticated user's account. Requires owner role.Webhook ID
The webhook has been successfully deleted.
User is not authorized to delete webhooks.
Webhook not found.
No content
The webhook must belong to the authenticated user's account. Updates take effect immediately for new event deliveries. Requires owner role.Webhook ID
A human-readable name for the webhook
Deploy to ProductionThe event that triggers this webhook
release.publishedTimeout in milliseconds
10000Number of retry attempts
3Delay between retries in milliseconds
60000Current status of the webhook
activePossible values: The webhook has been successfully updated.
Invalid webhook configuration.
User is not authorized to update webhooks.
Webhook not found.
This endpoint is useful for debugging webhook delivery issues or verifying webhook configuration. Requires owner role.Webhook ID
The webhook configuration.
User is not authorized to view webhooks.
Webhook not found.
This is the primary mechanism for event-driven webhook notifications in the system. Useful for manual event triggering or system integrations. Requires owner or application role.The event that triggers the webhooks
document.createdThe event payload
{"id":"doc123","name":"example.md","type":"markdown","createdBy":"[email protected]"}Webhook deliveries have been queued
Webhook deliveries have been queued
The webhook configuration includes:
- URL endpoint to receive HTTP POST requests
- Events to subscribe to (e.g., deployment.started, deployment.completed)
- Optional headers for authentication
- Active/inactive status
- Retry configuration for failed deliveries
Each webhook is associated with the creating account and can only be managed by users with owner role in that account.Repository identifier in format owner/repo
octocat/hello-worldURL where GitHub should send webhook events
https://example.com/webhookThe webhook has been successfully created.
Invalid webhook configuration.
User is not authorized to create webhooks.
The payload is queued for asynchronous delivery and will follow the webhook's retry configuration if delivery fails. Returns a delivery ID for tracking. Requires owner or application role.Webhook ID
The payload to deliver to the webhook endpoint
{"event":"deployment","environment":"production","status":"success"}Webhook delivery has been queued
Webhook delivery has been queued
This endpoint helps verify webhook configuration and troubleshoot webhook delivery issues. Requires owner role to view webhook configurations.List of webhooks for the repository
List of webhooks for the repository
A webhook secret is automatically generated if one doesn't exist for the repository. This secret is used to verify the authenticity of incoming webhook payloads. The secret is only returned in the response if it was newly generated.
Requires owner role to create webhooks.Repository identifier in format owner/repo
octocat/hello-worldURL where GitHub should send webhook events
https://example.com/webhookThe webhook has been successfully created
The webhook has been successfully created
This is useful when changing the webhook endpoint URL (e.g., after infrastructure changes) without needing to recreate the entire webhook configuration.
The existing webhook secret is reused for security continuity. Requires owner role to update webhooks.Repository identifier in format owner/repo
octocat/hello-worldURL where GitHub should send webhook events
https://example.com/webhookThe webhook has been successfully updated
The webhook has been successfully updated
If no webhook exists for the repository, the operation succeeds silently. This is useful for cleanup operations. Requires owner role to delete webhooks.The webhook has been successfully deleted
The webhook has been successfully deleted
No content
Supported events are automatically handled by registered handlers. This is a public endpoint as it needs to be accessible by GitHub's webhook delivery system. Authentication is performed via webhook signature validation.The webhook event has been processed successfully
No content
The webhook event has been processed successfully
No content
Last updated