FruxonDocs
IntegrationsWebhooks

Handles an inbound webhook call authenticated via HMAC signature verification

Variant of `POST WebhookInbound` for providers that sign payloads (Stripe, GitHub, Slack, etc.) — the route does not act as a credential, and instead the provider-specific signature header is verified against the secret stored on the webhook. A failed verification returns 401; a successful one dispatches to subscribers identically to the API-key flow, returning the provider's expected ack body or 204. Anonymous endpoint, since the signature is the authentication.

POST
/v1/tenants/{tenant}/webhooks/{webhookProvider}/{webhookId}

Path Parameters

webhookProvider*string

The webhook provider name (e.g. github, stripe).

webhookId*string

The webhook ID embedded in the route for routing.

tenant*string

The tenant identifier

Response Body

curl -X POST "https://api.fruxon.com/v1/tenants/string/webhooks/string/string"
Empty
{
  "type": "string",
  "title": "string",
  "status": 0,
  "detail": "string",
  "instance": "string",
  "property1": null,
  "property2": null
}
{
  "type": "string",
  "title": "string",
  "status": 0,
  "detail": "string",
  "instance": "string",
  "property1": null,
  "property2": null
}