This webhook uses Telnyx headers (telnyx-timestamp, telnyx-signature-ed25519) that are compatible with Standard Webhooks specification for SDK generation. Custom validation logic can map these to standard webhook-timestamp and webhook-signature equivalents. See https://github.com/standard-webhooks/standard-webhooks for details.
Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
Unix timestamp (seconds since epoch) of when the webhook was sent - compatible with webhook-timestamp Unix timestamp for replay attack prevention
Base64 encoded Ed25519 signature for webhook verification - compatible with webhook-signature Ed25519 signature of timestamp|payload for verification
{
"record_type": "event",
"event_type": "call.transcription",
"id": "0ccc7b54-4df3-4bca-a65a-3da1ecc777f0",
"occurred_at": "2018-02-02T22:25:27.521992Z",
"payload": {
"call_control_id": "v2:7subYr8fLrXmaAXm8egeAMpoSJ72J3SGPUuome81-hQuaKRf9b7hKA",
"call_leg_id": "5ca81340-5beb-11eb-ae45-02420a0f8b69",
"call_session_id": "5ca81eee-5beb-11eb-ba6c-02420a0f8b69",
"connection_id": "1240401930086254526",
"transcription_data": {
"confidence": 0.977219,
"is_final": true,
"transcript": "hello this is a test speech"
}
}
}
The server must return an HTTP 200, otherwise we will reattempt delivery at the failover webhook URL.