Skip to main content
Version: 6.x

Webhooks

If you've used IFTTT, Pipedream, or Zapier then you're familiar with how webhooks can give your app the power to create complex workflows, build one-to-one automation, and sync data between apps. RedwoodJS helps you work with webhooks by giving you the tools to both receive and verify incoming webhooks and sign outgoing ones with ease.

What is a webhook

Simply put, webhooks are a common way that third-party services notify your RedwoodJS application when an event of interest happens. They are a form of messaging and automation allowing distinct web applications to communicate with each other and send real-time data from one application to another whenever a given event occurs.

The third-party considers these "outgoing Webhooks" and therefore your application receives "incoming Webhooks".

When the api side of your Redwood app receives a webhook, it can parse it, process it, save it to replay later, or any other action needed.

Webhooks are different from other integration methods in that the third-party pushes new events to your app instead of your app constantly pulling or polling for new data.

Examples of Webhooks

Some examples of outgoing Webhooks are:

If you were to subscribe to one of these webhooks, you'd point it to an endpoint in your RedwoodJS api -- ie, a serverless function. But, because that function is out "in the cloud" you need to ensure that these run only when they should. That means your function must:

  • verify it comes from the place you expect
  • trust the party
  • know the payload sent in the hook hasn't been tampered with
  • ensure that the hook isn't reprocessed or replayed (sometimes)

That is, you need to verify your incoming webhooks.

Verifying Webhooks with RedwoodJS Made Easy

The RedwoodJS api/webhooks package makes it easy to receive and verify incoming webhooks by implementing many of the most commonly used Webhook signature verifiers.

Webhook Verification

Webhooks have a few ways of letting you know they should be trusted. The most common is by sending along a "signature" header. They typically sign their payload with a secret key (in a few ways) and expect you to validate the signature before processing it.

Webhook Signature Verifiers

Common signature verification methods are:

RedwoodJS adds a way to do no verification as well of testing or in the case your third party doesn't sign the payload.

  • SkipVerifier (bypass verification, or no verification)

RedwoodJS implements signatureVerifiers for each of these so you can get started integrating your app with third-parties right away.

export type SupportedVerifiers =
| SkipVerifier
| SecretKeyVerifier
| Sha1Verifier
| Sha256Verifier
| Base64Sha1Verifier
| Base64Sha256Verifier
| TimestampSchemeVerifier
| JwtVerifier

Each SupportedVerifier implements a method to sign and verify a payload with a secret (if needed).

When the webhook needs creates a verifier in order to verifyEvent, verifySignature or signPayload it does so via:

createVerifier(type, options)

where type is one of the supported verifiers and VerifyOptions sets the options the verifier needs to sign or verify.

/**
* VerifyOptions
*
* Used when verifying a signature based on the verifier's requirements
*
* @param {string} signatureHeader - Optional Header that contains the signature
* to verify. Will default to DEFAULT_WEBHOOK_SIGNATURE_HEADER
* @param {(signature: string) => string} signatureTransformer - Optional
* function that receives the signature from the headers and returns a new
* signature to use in the Verifier
* @param {number} currentTimestampOverride - Optional timestamp to use as the
* "current" timestamp, in msec
* @param {number} eventTimestamp - Optional timestamp to use as the event
* timestamp, in msec. If this is provided the webhook verification will fail
* if the eventTimestamp is too far from the current time (or the time passed
* as the `currentTimestampOverride` option)
* @param {number} tolerance - Optional tolerance in msec
* @param {string} issuer - Options JWT issuer for JWTVerifier
*/
export interface VerifyOptions {
signatureHeader?: string
signatureTransformer?: (signature: string) => string
currentTimestampOverride?: number
eventTimestamp?: number
tolerance?: number
issuer?: string
}

How to Receive and Verify an Incoming Webhook

The api/webhooks package exports verifyEvent and verifySignature to apply verification methods and verify the event or some portion of the event payload with a signature as defined in its VerifyOptions. If the signature fails verification, a WebhookSignError is raised which can be caught to return a 401 unauthorized.

Typically, for each integration you'll define 1) the events that triggers the webhook or the schedule via cron/conditions to send the webhook, 2) a secret, and 3) the endpoint to send the webhook to (ie, your endpoint).

When the third-party creates the outgoing webhook payload, they'll sign it (typically the event request body) and add that signature to the request headers with some key.

When your endpoint receives the request (incoming webhook), it can extract the signature using the signature header key set in VerifyOptions, transform it using the signatureTransformer function also defined in VerifyOptions, use the appropriate verifier, and validate the payload to ensure it comes from a trusted source.

Note that:

  • verifyEvent will detect if the event body is base64 encoded, then decode and validate the payload with the signature verifier
  • signatureHeader specified in VerifyOptions will be converted to lowercase when fetching the signature from the event headers

You can then use the payload data with confidence in your function.

SHA256 Verifier (used by GitHub, Discourse)

SHA256 HMAC is one of the most popular signatures. It's used by Discourse and GitHub.

When your secret token is set, GitHub uses it to create a hash signature with each payload. This hash signature is included with the headers of each request as X-Hub-Signature-256.

For Discourse, when an event is triggered, it POSTs a webhook with X-Discourse-Event-Signature in the HTTP header to your endpoint. It’s computed by SHA256.

import type { APIGatewayEvent } from 'aws-lambda'
import {
verifyEvent,
VerifyOptions,
WebhookVerificationError,
} from '@redwoodjs/api/webhooks'

import { logger } from 'src/lib/logger'

export const handler = async (event: APIGatewayEvent) => {
const discourseInfo = { webhook: 'discourse' }
const webhookLogger = logger.child({ discourseInfo })

webhookLogger.trace('Invoked discourseWebhook function')

try {
const options = {
signatureHeader: 'X-Discourse-Event-Signature',
} as VerifyOptions

verifyEvent('sha256Verifier', {
event,
secret: process.env.DISCOURSE_WEBHOOK_SECRET,
options,
})

webhookLogger.debug({ headers: event.headers }, 'Headers')

const payload = JSON.parse(event.body)

webhookLogger.debug({ payload }, 'Body payload')

// Safely use the validated webhook payload

return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 200,
body: JSON.stringify({
data: payload,
}),
}
} catch (error) {
if (error instanceof WebhookVerificationError) {
webhookLogger.warn('Unauthorized')

return {
statusCode: 401,
}
} else {
webhookLogger.error({ error }, error.message)

return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 500,
body: JSON.stringify({
error: error.message,
}),
}
}
}
}

Base64 SHA256 Verifier (used by Svix, Clerk)

This is a variation on the SHA256 HMAC verification that works with binary buffers encoded with base64. It's used by Svix and Clerk.

Svix (and by extension, Clerk) gives you a secret token that it uses to create a hash signature with each payload. This hash signature is included with the headers of each request as svix-signature.

Some production environments, like Vercel, might base64 encode the request body string. In that case, the body must be conditionally parsed.

export const handler = async (event: APIGatewayEvent) => {
const body = event.isBase64Encoded
? Buffer.from(event.body, 'base64').toString('utf-8')
: event.body
import type { APIGatewayEvent } from 'aws-lambda'
import {
verifyEvent,
VerifyOptions,
WebhookVerificationError,
} from '@redwoodjs/api/webhooks'

import { logger } from 'src/lib/logger'

export const handler = async (event: APIGatewayEvent) => {
const clerkInfo = { webhook: 'clerk' }
const webhookLogger = logger.child({ clerkInfo })

webhookLogger.trace('Invoked clerkWebhook function')

try {
const options: VerifyOptions = {
signatureHeader: 'svix-signature',
signatureTransformer: (signature: string) => {
// Clerk can pass a space separated list of signatures.
// Let's just use the first one that's of version 1
const passedSignatures = signature.split(' ')

for (const versionedSignature of passedSignatures) {
const [version, signature] = versionedSignature.split(',')

if (version === 'v1') {
return signature
}
}
},
}

const svix_id = event.headers['svix-id']
const svix_timestamp = event.headers['svix-timestamp']

verifyEvent('base64Sha256Verifier', {
event,
secret: process.env.CLERK_WH_SECRET.slice(6),
payload: `${svix_id}.${svix_timestamp}.${event.body}`,
options,
})

webhookLogger.debug({ headers: event.headers }, 'Headers')

const payload = JSON.parse(event.body)

webhookLogger.debug({ payload }, 'Body payload')

// Safely use the validated webhook payload

return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 200,
body: JSON.stringify({
data: payload,
}),
}
} catch (error) {
if (error instanceof WebhookVerificationError) {
webhookLogger.warn('Unauthorized')

return {
statusCode: 401,
}
} else {
webhookLogger.error({ error }, error.message)

return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 500,
body: JSON.stringify({
error: error.message,
}),
}
}
}
}

SHA1 Verifier (used by Vercel)

Vercel signs its webhooks with SHA also base64 encodes the event.

RedwoodJS verifyEvent will detect is the event is base64 encoded, decode and then validate the payload with the signature.

import type { APIGatewayEvent } from 'aws-lambda'
import {
verifyEvent,
VerifyOptions,
WebhookVerificationError,
} from '@redwoodjs/api/webhooks'

import { logger } from 'src/lib/logger'

export const handler = async (event: APIGatewayEvent) => {
const vercelInfo = { webhook: 'vercel' }
const webhookLogger = logger.child({ vercelInfo })

webhookLogger.trace('Invoked vercelWebhook function')

try {
const options = {
signatureHeader: 'x-vercel-signature',
} as VerifyOptions

verifyEvent('sha256Verifier', {
event,
secret: process.env.DISCOURSE_WEBHOOK_SECRET,
options,
})

webhookLogger.debug({ headers: event.headers }, 'Headers')

const payload = JSON.parse(event.body)

webhookLogger.debug({ payload }, 'Body payload')

// Safely use the validated webhook payload

return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 200,
body: JSON.stringify({
data: payload,
}),
}
} catch (error) {
if (error instanceof WebhookVerificationError) {
webhookLogger.warn('Unauthorized')

return {
statusCode: 401,
}
} else {
webhookLogger.error({ error }, error.message)

return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 500,
body: JSON.stringify({
error: error.message,
}),
}
}
}
}

TimestampScheme Verifier (used by Stripe)

The TimestampScheme verifier not only signs the payload with a secret (SHA256), but also includes a timestamp to prevent replay attacks and a scheme (i.e., a version) to further protect webhooks.

A replay attack is when an attacker intercepts a valid payload and its signature, then re-transmits them. To mitigate such attacks, third-parties like Stripe includes a timestamp in the Stripe-Signature header. Because this timestamp is part of the signed payload, it is also verified by the signature, so an attacker cannot change the timestamp without invalidating the signature. If the signature is valid but the timestamp is too old, you can have your application reject the payload.

When verifying, there is a default tolerance of five minutes between the event timestamp and the current time but you can override this default by setting the tolerance option in the VerifyOptions passed to the verifier to another value (in milliseconds).

Also, if for some reason you need to adjust the timestamp used to compare the tolerance to a different time (say in the past), then you may override this by setting the currentTimestampOverride option in the VerifyOptions passed to the verifier.

  • Stripe
  • Used in a Cron Job that triggers a Webhook periodically to background task via a serverless function

The TimestampScheme is particularly useful when used with cron jobs because if for some reason the webhook is delayed between when it is created and sent/received your app can discard it and thus old information would not risk overwriting newer data.

import type { APIGatewayEvent } from 'aws-lambda'

import {
verifyEvent,
VerifyOptions,
WebhookVerificationError,
} from '@redwoodjs/api/webhooks'
import { logger } from 'src/lib/logger'
import { perform } from 'src/lib/orbit/jobs/loadActivitiesJob'

/**
* The handler function is your code that processes http request events.
* You can use return and throw to send a response or error, respectively.
*
* @typedef { import('aws-lambda').APIGatewayEvent } APIGatewayEvent
* @typedef { import('aws-lambda').Context } Context
* @param { APIGatewayEvent } event - an object which contains information from the invoker.
* @param { Context } context - contains information about the invocation,
* function, and execution environment.
*/
export const handler = async (event: APIGatewayEvent) => {
const webhookInfo = { webhook: 'loadOrbitActivities-background' }

const webhookLogger = logger.child({ webhookInfo })

webhookLogger.trace('>> in loadOrbitActivities-background')

try {
const options = {
signatureHeader: 'RW-Webhook-Signature',
// You may override these defaults
// tolerance: 60_000,
// timestamp: new Date().getDate() - 1,
} as VerifyOptions

verifyEvent('timestampSchemeVerifier', {
event,
secret: process.env.WEBHOOK_SECRET,
options,
})

await perform()

return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 200,
body: JSON.stringify({
data: `loadOrbitActivities scheduled job invoked at ${Date.now()}`,
}),
}
} catch (error) {
if (error instanceof WebhookVerificationError) {
webhookLogger.warn(
{ webhook: 'loadOrbitActivities-background' },
'Unauthorized'
)
return {
statusCode: 401,
}
} else {
webhookLogger.error(
{ webhook: 'loadOrbitActivities-background', error },
error.message
)
return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 500,
body: JSON.stringify({
error: error.message,
}),
}
}
}
}

JWT Signature (used by Netlify)

The JSON Web Token (JWT) Verifier not only cryptographically compares the signature to the payload to ensure it hasn't been tampered with, but also gives the added JWT claims like issuer and expires — you can trust that the Webhook was sent by a trusted sounds and isn't out of date.

Here, the VerifyOptions not only specify the expected signature header, but allow will check that the iss claim is netlify.

    const options = {
signatureHeader: 'X-Webhook-Signature',
issuer: 'netlify',
} as VerifyOptions

See: Introduction to JSON Web Tokens for more information.

import type { APIGatewayEvent } from 'aws-lambda'
import {
verifyEvent,
VerifyOptions,
WebhookVerificationError,
} from '@redwoodjs/api/webhooks'

import { logger } from 'src/lib/logger'

/**
* The handler function is your code that processes http request events.
* You can use return and throw to send a response or error, respectively.
*
* @typedef { import('aws-lambda').APIGatewayEvent } APIGatewayEvent
* @typedef { import('aws-lambda').Context } Context
* @param { APIGatewayEvent } event - an object which contains information from the invoker.
* @param { Context } context - contains information about the invocation,
* function, and execution environment.
*/
export const handler = async (event: APIGatewayEvent) => {
const netlifyInfo = {
webhook: 'verifyNetlifyWebhook',
headers: event.headers['x-netlify-event'],
}
const webhookLogger = logger.child({ netlifyInfo })

try {
webhookLogger.debug('Received Netlify event')

const options = {
signatureHeader: 'X-Webhook-Signature',
issuer: 'netlify',
} as VerifyOptions

verifyEvent('jwtVerifier', {
event,
secret: process.env.NETLIFY_DEPLOY_WEBHOOK_SECRET,
options,
})
const payload = JSON.parse(event.body)

// Safely use the validated webhook payload

webhookLogger.debug({ payload }, 'Now I can do things with the payload')

return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 200,
body: JSON.stringify({
data: payload,
}),
}
} catch (error) {
if (error instanceof WebhookVerificationError) {
webhookLogger.warn('Unauthorized')
return {
statusCode: 401,
}
} else {
webhookLogger.error({ error }, error.message)
return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 500,
body: JSON.stringify({
error: error.message,
}),
}
}
}
}

Secret Key Verifier (used by Orbit)

The Secret Key verifiers used by Orbit acts very much like a password. It doesn't perform some cryptographic comparison of the signature with the payload received, but rather simple checks if the expected key or token is present.

//import type { APIGatewayEvent, Context } from 'aws-lambda'
import {
verifyEvent,
// VerifyOptions,
WebhookVerificationError,
} from '@redwoodjs/api/webhooks'

import { deserialize } from 'deserialize-json-api'
import { parser, persister } from 'src/lib/orbit/loaders/activityLoader'

import { logger } from 'src/lib/logger'

const webhookDetails = (event) => {
const webhook = 'orbitWebhook-background'
const orbitEvent = event.headers['x-orbit-event'] || ''
const orbitEventId = event.headers['x-orbit-event-id'] || ''
const orbitEventType = event.headers['x-orbit-event-type'] || ''
const orbitUserAgent = event.headers['user-agent'] || ''
const orbitSignature = event.headers['x-orbit-signature'] || ''

return {
webhook,
orbitEvent,
orbitEventId,
orbitEventType,
orbitUserAgent,
orbitSignature,
}
}

/**
* The handler function is your code that processes http request events.
* You can use return and throw to send a response or error, respectively.
*
* Important: When deployed, a custom serverless function is an open API endpoint and
* is your responsibility to secure appropriately.
*
* @see {@link https://redwoodjs.com/docs/serverless-functions#security-considerations|Serverless Function Considerations}
* in the RedwoodJS documentation for more information.
*
* @typedef { import('aws-lambda').APIGatewayEvent } APIGatewayEvent
* @typedef { import('aws-lambda').Context } Context
* @param { APIGatewayEvent } event - an object which contains information from the invoker.
* @param { Context } context - contains information about the invocation,
* function, and execution environment.
*/
export const handler = async (event) => {
const orbitInfo = webhookDetails(event)

const webhookLogger = logger.child({ orbitInfo })

webhookLogger.info(`>> in webhook`)

try {
const options = {
signatureHeader: 'X-Orbit-Signature',
}
verifyEvent('secretKeyVerifier', {
event,
secret: process.env.ORBIT_WEBHOOK_SECRET,
options,
})

if (orbitInfo.orbitEventType === 'activity:created') {
const parsedActivity = parseEventPayload(event)

// Safely use the validated webhook payload

return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 200,
body: JSON.stringify({
data: 'orbitWebhook done',
}),
}
} else {
webhookLogger.warn(`Unsupported Orbit Event Type: ${orbitInfo.orbitEventType}`)
return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 400,
body: JSON.stringify({
data: `Unsupported Orbit Event Type: ${orbitInfo.orbitEventType}`,
}),
}
}
} catch (error) {
if (error instanceof WebhookVerificationError) {
webhookLogger.warn('Unauthorized')
return {
statusCode: 401,
}
} else {
webhookLogger.error({ error }, error.message)
return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 500,
body: JSON.stringify({
error: error.message,
}),
}
}
}
}

Skip Verifier (used by Livestorm)

Livestorm sends webhooks but doesn't sign them with a secret.

Here, you can use the skipVerifier -- or choose not to validate altogether, but setting up to verifyEvent would let you quickly change the verification method if their changes.

You can also use the skipVerifier in testing or in dev so that you needn't share your secrets with other developers.

In that case, you might set WEBHOOK_VERIFICATION=skipVerifier and use the envar in verifyEvent(process.env.WEBHOOK_VERIFICATION, { event }).

import type { APIGatewayEvent } from 'aws-lambda'
import { verifyEvent, WebhookVerificationError } from '@redwoodjs/api/webhooks'

import { logger } from 'src/lib/logger'

/**
* The handler function is your code that processes http request events.
* You can use return and throw to send a response or error, respectively.
*
* @typedef { import('aws-lambda').APIGatewayEvent } APIGatewayEvent
* @typedef { import('aws-lambda').Context } Context
* @param { APIGatewayEvent } event - an object which contains information from the invoker.
* @param { Context } context - contains information about the invocation,
* function, and execution environment.
*/
export const handler = async (event: APIGatewayEvent) => {
const livestormInfo = { webhook: 'livestorm' }
const webhookLogger = logger.child({ livestormInfo })

webhookLogger.trace('Livestorm')

webhookLogger.debug({ event: event }, 'The Livestorm event')

// Use the webhook payload
// Note: since the payload is not signed, you may want to validate other header info

try {
verifyEvent('skipVerifier', { event })

const data = JSON.parse(event.body)

webhookLogger.debug({ payload: data }, 'Data from Livestorm')

return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 200,
body: JSON.stringify({
data,
}),
}
} catch (error) {
if (error instanceof WebhookVerificationError) {
webhookLogger.warn('Unauthorized')

return {
statusCode: 401,
}
} else {
webhookLogger.error({ error }, error.message)

return {
headers: {
'Content-Type': 'application/json',
},
statusCode: 500,
body: JSON.stringify({
error: error.message,
}),
}
}
}
}

Signing a Payload for an Outgoing Webhook

To sign a payload for an outgoing webhook, the api/webhooks package exports signPayload, a function that signs a payload using a verification method, creating your "webhook signature". Once you have the signature, you can add it to your request's http headers with a name of your choosing, and then post the request to the endpoint:

import got from 'got'
import { signPayload } from '@redwoodjs/api/webhooks'

const YOUR_OUTGOING_WEBHOOK_DESTINATION_URL = 'https://example.com/receive'
const YOUR_WEBHOOK_SIGNATURE = process.env.WEBHOOK_SIGNATURE

export const sendOutGoingWebhooks = async ({ payload }) => {
const signature = signPayload('timestampSchemeVerifier', {
payload,
secret,
})

await got.post(YOUR_OUTGOING_WEBHOOK_DESTINATION_URL, {
responseType: 'json',

json: {
payload,
},
headers: {
YOUR_WEBHOOK_SIGNATURE: signature,
},
})
}

How To Test Webhooks

Because your webhook is typically sent from a third-party's system, manually testing webhooks can be difficult and time-consuming. See How To Test Webhooks to learn how to write tests that can automate tests and help you implement your webhook handler.

More Information

Want to learn more about webhooks?