Comment on page
Setup webhooks through the API in order to be notified of any Vibrant events.
curl -X 'POST' \
-H 'accept: application/json' \
-H 'apikey: vibrant_pos.YOUR_SECRET_KEY' \
-H 'Content-Type: application/json' \
"description": "My PI succeeded webhook",
It is possible to subscribe to one or more event types or
*to get all events.
Create a webhook
The endpoint to which the events will be posted.
If desired it is possible to add some meta data to the webhook that can be retrieved again when getting the webhook object. The meta data will not be attached to the events.
Here it is possible to
Each webhook created in Vibrant holds a secret key.
This can be used to verify that the events posted to your webhook url is actually coming from Vibrant.
The secret key can be used to calculate an expected hash from a received message, to validate that the message in fact is from Vibrant and to this unique webhook.
How to verify messages:
Messages to a webhook hold a header named
The signature holds a timestamp and a hash, with comma in between.
Follow these three steps to verify the Vibrant signature.
- 1.Create a string combining the value of timestamp
tthen a . and then the message body.
- 2.Compute a HMAC with the SHA256 hash function. Use the endpoint’s secret key as the key, and use the string from step 1. as the message.
- 3.Compare the Vibrant signature
v0from the header to the expected signature from step 2. For an equality match, compute the difference between the current timestamp and the received timestamp, then decide if the difference is within your tolerance.
The timestamp is used to prevent replay attacks resending a valid message to your endpoint. So you can check if the timestamp is too old.