Skip to content

Webhook 驗證

概覽

當使用者回覆訊息時,BotBell 會透過 HTTP POST 將回覆傳送至您的 reply_url。驗證簽名以確保請求是真實的。

簽名 HeaderX-Webhook-Signature: sha256=...
時間戳 HeaderX-Webhook-Timestamp: 1234567890

運作原理

  1. 從 Header 中擷取 X-Webhook-Timestamp 和 X-Webhook-Signature
  2. 檢查時間戳是否在 5 分鐘內(防止重放攻擊)
  3. 用 webhook_secret 計算 {timestamp}.{body} 的 HMAC-SHA256
  4. 與簽名進行比較(常數時間比較)
signature = HMAC-SHA256(
  key: webhook_secret,
  message: "{timestamp}.{request_body}"
)

Python

from botbell import verify_webhook, WebhookVerificationError

try:
    verify_webhook(
        body=request.body,
        signature_header=request.headers["X-Webhook-Signature"],
        timestamp_header=request.headers["X-Webhook-Timestamp"],
        secret="your_webhook_secret",
    )
except WebhookVerificationError:
    return {"error": "Invalid signature"}, 401

# Signature valid — process the reply
data = json.loads(request.body)

JavaScript

import { verifyWebhook, WebhookVerificationError } from "@botbell/sdk";

try {
  verifyWebhook({
    body: req.body,
    signature: req.headers["x-webhook-signature"],
    timestamp: req.headers["x-webhook-timestamp"],
    secret: "your_webhook_secret",
  });
} catch (e) {
  if (e instanceof WebhookVerificationError) {
    return res.status(401).json({ error: e.message });
  }
  throw e;
}

// Signature valid — process the reply
const data = JSON.parse(req.body);