This webhook uses Telnyx headers (telnyx-timestamp, telnyx-signature-ed25519) that are compatible with Standard Webhooks specification for SDK generation. Custom validation logic can map these to standard webhook-timestamp and webhook-signature equivalents. See https://github.com/standard-webhooks/standard-webhooks for details.
Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
Unix timestamp (seconds since epoch) of when the webhook was sent - compatible with webhook-timestamp Unix timestamp for replay attack prevention
Base64 encoded Ed25519 signature for webhook verification - compatible with webhook-signature Ed25519 signature of timestamp|payload for verification
{
"record_type": "event",
"event_type": "siprec.started",
"id": "7d743d69-f7e8-4761-b7d4-8cacf9d3c031",
"occurred_at": "2021-12-15T14:06:32.059436Z",
"payload": {
"call_control_id": "31f19208-5db0-11ec-9ea7-02420a0d3a69",
"connection_id": "7267xxxxxxxxxxxxxx",
"call_leg_id": "31f19208-5db0-11ec-9ea7-02420a0d3a69",
"call_session_id": "31f19208-5db0-11ec-9ea7-02420a0d3a69",
"client_state": "aGF2ZSBhIG5pY2UgZGF5ID1d"
}
}The server must return an HTTP 200, otherwise we will reattempt delivery at the failover webhook URL.