Webhooks

Configure webhooks from your git provider to enable automation features.

Overview

Webhooks allow Forkline to receive real-time repository events such as:

  • Issue and pull request comments
  • Issue, pull request, and merge request lifecycle updates
  • CI pipeline, check, and status failures

Info: Webhooks are required for bot mentions, CI auto-fix, merge conflict automation, and auto review.

Webhook routing
GitHub

App-managed events

Issues, PRs, comments, checks, and status arrive automatically.

GitLab

Manual project webhook

Configure issue, comment, MR, and pipeline events.

Forgejo

Manual repo webhook

Configure issue, PR, comment, action, and status events.

Forkline

Event normalization

Forkline verifies the secret, classifies the event, and selects the matching automation workflow.

Outcome

Bot Mentions

Thread-triggered tasks from issues and pull requests.

Outcome

Auto Review

Reviews started from new PR or MR activity.

Outcome

CI + Conflict Fixes

Failures and mergeability changes become follow-up work.

Always configure a webhook secret GitHub App connectors auto-install webhooks GitLab and Forgejo need manual webhook setup
Different providers emit different event names, but they all feed the same Forkline automation engine.

How It Works

When you activate a repository in Forkline, GitHub App connectors create the needed webhooks automatically. GitLab and Forgejo connectors expose a webhook URL that you configure manually on the provider side.

Supported Events

Forkline uses webhooks for these flows:

FeatureWebhook usage
Bot mentionsComments and new issue or pull request bodies
Auto review and trigger policiesIssue, pull request, and merge request updates
Merge conflict automationPull request or merge request updates
CI auto-fixPipeline, check, or status failures

The exact event names depend on your git provider.

GitHub

GitHub App connectors automatically configure both webhooks and permissions. When you accept the installation, Forkline receives the events it needs without any extra manual steps.

The Forkline GitHub App requests:

  • Contents (write): Clone repositories, push commits, manage branches
  • Issues (write): Read issues, create comments, manage issue metadata
  • Pull requests (write): Create PRs, read PR details, comment, approve, and reject

These permissions are fixed because Forkline needs to push code and create PRs on your behalf.

GitLab

For GitLab connectors, configure the project webhook manually:

  1. Go to your project Settings -> Webhooks
  2. Enter your Forkline webhook URL
  3. Set a secret token
  4. Select the trigger events
  5. Save

Enable these GitLab trigger events:

GitLab triggerRequiredUsed for
Issues eventsYesBot mentions in issue bodies and issue-based automation
Comments eventsYesBot mentions in issue and merge request comments
Merge request eventsYesAuto review, merge conflict automation, merge request body triggers, and merge request policy updates
Pipeline eventsOptionalCI auto-fix for failed GitLab pipelines

Note: Forkline currently handles GitLab’s Issue Hook, Note Hook, Merge Request Hook, and, for CI auto-fix, Pipeline Hook.

Forgejo

For Forgejo, Gitea, and Codeberg connectors:

  1. Go to your repository Settings -> Webhooks
  2. Click Add webhook -> Forgejo webhook or Gitea webhook
  3. Enter your Forkline webhook URL
  4. Set content type to application/json
  5. Configure a secret
  6. Select trigger events
  7. Save

Enable these Forgejo trigger events:

Forgejo triggerRequiredUsed for
IssuesYesBot mentions in issue bodies and issue-based automation
Issue commentsYesBot mentions in issue comments
Pull requestsYesAuto review, merge conflict automation, pull request body triggers, and pull request policy updates
Pull request commentsYesBot mentions in pull request comments
Check runsOptionalCI auto-fix for Forgejo Actions checks
Action run eventsOptionalCI auto-fix on instances that expose action run webhook events
StatusOptionalCI auto-fix when your repository uses external commit status checks

Note: Use the same webhook secret in both your Forgejo settings and your Forkline connector configuration.

Webhook Security

Always configure webhook secrets:

ProviderHeaderVerification
GitHubX-Hub-Signature-256HMAC-SHA256
GitLabX-Gitlab-TokenToken comparison
ForgejoX-Gitea-SignatureHMAC-SHA256

Warning: Without secrets, webhook requests can be spoofed.

Next Steps