Webhooks
receive webhook notifications about video status
Webhooks allow you to receive real-time notifications when certain events occur. You can create, edit, and delete webhooks through our user interface (UI). This guide will walk you through each of these processes.
Creating a Webhook
Navigate to the Webhooks Section
Click on the profile icon in the top right corner of the dashboard.
Select "Profile Settings" from the dropdown menu.
Scroll down to the "Account" section in the Profile Settings.
Click on the "Webhooks" tab.

Create a New Webhook
Click on the "Create Webhook" button.
Fill in the required fields:
Name: Give your webhook a descriptive name.
Description: Enter a Description
URL: Enter the URL where you want to receive the webhook notifications.
Events: Select the events that will trigger the webhook.
Click "Save" to create the webhook.
a webhook secret will automatically be generated

Editing a Webhook
Navigate to the Webhooks Section
Go to the dashboard and click on the "Webhooks" tab in the sidebar.
Select the Webhook to Edit
Find the webhook you want to edit from the list and click it.
Edit the Webhook
Update the necessary fields (Name, URL, Events).
Click "Save" to apply the changes.

Endpoint Status Options
Active:
Description: The endpoint is functioning normally and responding to events.
Effect: Events are sent to the endpoint as usual.
Inactive:
Description: The endpoint has consecutively failed to process events.
Effect: New events are discarded and not sent.
Reactivation: Retry failed or discarded event delivery. If successful, the endpoint returns to Active. Batch retry all previously failed events to resume normal operation.
Paused:
Description: The endpoint has been manually disabled to stop receiving events.
Effect: New events are discarded and not sent.
Reactivation: Un-pause the endpoint to set it back to Active.
Pending:
Description: The endpoint was previously Inactive, and an event delivery is being resent.
Effect: If the resent event is successfully processed, the endpoint returns to Active.
Additional Options for Managing Webhooks
Beyond creating and editing webhooks, you have several management options to ensure that your webhooks operate effectively and securely. These options include pausing or un-pausing a webhook, deleting it, and regenerating its secret. You can access all these options from a dropdown menu by clicking on the three dots icon next to each webhook.
Best Practices
Use Secure URLs: Always use HTTPS URLs for webhooks to ensure data is transmitted securely.
Validate Webhook Signatures: If using secrets, validate the webhook signatures on your server to ensure the payload is from a trusted source.
Webhooks Payloads
Webhook Response Model
The following is the model of the data received from a webhook. This model specifies the structure of the response payload when a webhook event is triggered.
WebHookEvent
This is the main model representing a webhook event.
Fields:
event_name
: Specifies the type of event that has occurred. For example,video_ready
indicates that a video is ready.data
: Contains detailed information about the event.:id
: The unique identifier for the video.req_id
: The request ID associated with the video processing.draft_id
: The draft ID related to the video, if applicable.status
: The current status of the video, e.g.,ready
, indicating the video is ready.
Webhook Signature
To ensure the authenticity and integrity of webhook requests, a signature is included in the header of every request. This signature allows you to verify that the request was indeed sent by our service and has not been tampered with.
Signature Header
The signature is sent in the HTTP header of each webhook request. The header key is typically named x-hourone-signature
, and its value is a hashed string that is used to validate the request.
Example Header:
How to Verify the Signature
Extract the Signature: Retrieve the signature value from the
x-hourone-signature
header.Calculate the Hash: Use the secret key provided when setting up the webhook to calculate the hash of the request payload. The hashing algorithm used should be the same as that employed by our service (HMAC-SHA256).
Compare the Hashes: Compare the hash you calculated with the signature provided in the header. If they match, the request is authentic. If not, the request may be fraudulent or tampered with.
Example Code for Verification
Here's a Python example using HMAC-SHA256:
Example in Javascript (Node JS)
Troubleshooting
Webhook Not Triggering: Ensure the URL is correct and the server is reachable.
Invalid Secret: If you're using a secret, make sure it matches the one expected by your server.
Event Not Selected: Double-check that the correct events are selected for the webhook.
Last updated