This webhook uses Telnyx headers (telnyx-timestamp, telnyx-signature-ed25519) that are compatible with Standard Webhooks specification for SDK generation. Custom validation logic can map these to standard webhook-timestamp and webhook-signature equivalents. See https://github.com/standard-webhooks/standard-webhooks for details.
Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
Unix timestamp (seconds since epoch) of when the webhook was sent - compatible with webhook-timestamp Unix timestamp for replay attack prevention
Base64 encoded Ed25519 signature for webhook verification - compatible with webhook-signature Ed25519 signature of timestamp|payload for verification
{
"record_type": "event",
"event_type": "siprec.failed",
"id": "25dc3731-e51e-4927-a50d-a61cc25984b1",
"occurred_at": "2021-12-15T14:11:24.613295Z",
"payload": {
"call_control_id": "31f19208-5db0-11ec-9ea7-02420a0d3a69",
"connection_id": "7267xxxxxxxxxxxxxx",
"call_leg_id": "31f19208-5db0-11ec-9ea7-02420a0d3a69",
"call_session_id": "31f19208-5db0-11ec-9ea7-02420a0d3a69",
"client_state": "aGF2ZSBhIG5pY2UgZGF5ID1d",
"failure_cause": "no_answer"
}
}The server must return an HTTP 200, otherwise we will reattempt delivery at the failover webhook URL.