Skip to main content

Webhooks

We can send notifications about the progress of certain async processes to a URL of your choice. You can configure the webhook URL in the Heron dashboard.

This is an example structure of our webhooks:

{
"topic": "end_user.processed",
"created": "2021-05-20T09:23:53+00:00",
"data": {
"heron_id": "eus_Eqio3Y4dhyNiMphrXwG58p",
"end_user_id": "myenduser",
"status": "processed"
},
"meta": null
}

Where:

  • topic is the topic of this webhook in the format <resource>.<event>. Currently we support webhooks for the following topics:

    • end_user.processed, triggered when asynchronous automated processing of an end user has finished. Processing is started after the EndUser status is set to "ready".
    • end_user.reviewed, triggered when an underwriter / Heron has manually reviewed a company and set the EndUser status to "reviewed"
    • end_user.transactions_updated, triggered within 10 minutes of the last change on transactions for a given end user (e.g. after feedback on category).
  • created is the UTC datetime when the webhook was sent, in ISO format.

  • data contains the data of the resource which relates to this event.

  • meta (optional) contains further information about the event.

Verification#

We send a Heron-Signature header in every webhook request. This header is a base64-encoded HMAC SHA256 digest of your shared secret and the webhook's payload.

To verify the webhook was sent by us, calculate the digital signature using the same algorithm and compare it to the Heron-Signature header.

Here is an example of how to calculate the signature in Python:

import base64
import hashlib
import hmac
import json
secret = "sec_..." # shared secret, *not* your API credentials
data = {"topic": "end_user.processed", ...}
message = json.dumps(data, separators=(",", ":"))
dig = hmac.new(
secret.encode("utf-8"),
msg=message.encode("utf-8"),
digestmod=hashlib.sha256,
).digest()
signature = base64.b64encode(dig).decode()

And in JavaScript (Node):

const crypto = require('crypto')
const secret = 'sec_...'
const data = {"topic": "end_user.processed", ...}
const signature = crypto
.createHmac('sha256', secret)
.update(JSON.stringify(data))
.digest('base64')