Handle Webhook
This guide shows how to receive, validate, and process webhook events using your prefered language
Requirements
An HTTPS endpoint that accepts
POSTPHP, Python, NodeJS, Java...
Secure & Handle Webhook
When your server receives a webhook, you should verify the signature before processing it. This ensures the request really comes from the platform and not from someone else.
Example payload (short)
Here is an example of the data you will receive, it contains all the necessary data related to the payment: user identifiers, basket contents, price, payment ID...
{
"mode": "live",
"event": "payment.success",
"created_at": "2025-09-04T13:45:44-04:00",
"request_id": "51b97ba5891ec220e8b64385a00c3826",
"webhook_id": "458",
"store_id": "7541",
"data": {
"id": 71134,
"transaction_id": "68B9D0471D02A",
"gateway": "paypal",
"amount": { "total_paid": 12, "currency": "EUR" },
"user": { "email": "[email protected]", "discord_id": "123", "username": "Player" },
"basket": [{ "id": 183, "name": "VIP Rank", "price": 10, "quantity": 1 }],
"actions": { "...": "..." }
}
}Create an endpoint
Create a file in your chosen language and start a server that listens for POST requests using the following examples:
<?php
// Secret key (Tip4serv Dashboard -> Webhook -> Custom Webhook)
$webhookSecretBase64 = "y2x3...==";
// 1. Read the raw request body (JSON string)
$requestBody = file_get_contents('php://input');
// 2. Read headers sent by the platform
$timestampHeader = $_SERVER['HTTP_X_PAY_TIMESTAMP'] ?? '';
$signatureHeader = $_SERVER['HTTP_X_PAY_SIGNATURE'] ?? '';
// 3. Reject if the webhook is too old (max 5 minutes)
if (abs(time() - intval($timestampHeader)) > 300) {
http_response_code(401);
exit("invalid timestamp");
}
// 4. Recalculate the expected signature
$baseString = $timestampHeader . "." . $requestBody;
$secretBinary = base64_decode($webhookSecretBase64);
$expectedSignature = hash_hmac('sha256', $baseString, $secretBinary);
// 5. Compare signatures
if (!hash_equals($expectedSignature, $signatureHeader)) {
http_response_code(401);
exit("invalid signature");
}
// 6. If we’re here, the webhook is authentic
$event = json_decode($requestBody, true);
// Example: handle payment update
if ($event['event'] === 'payment.success') {
$paymentId = $event['data']['id'];
$discord_id = $event['data']['user']['discord_id'];
// TODO: update your database here
}
http_response_code(200);How it works
Read the body → the raw JSON payload sent by the platform.
Get headers →
X-Pay-TimestampandX-Pay-Signature(provided in every request).Check freshness → reject if older than 5 minutes.
Recalculate signature →
HMAC-SHA256(timestamp.body, secret).Compare signatures → use
hash_equalsto prevent timing attacks.Process event → decode JSON and handle it (e.g., update DB).
import express from "express";
import crypto from "crypto";
const app = express();
const PORT = 3000;
// Secret key (Tip4serv Dashboard -> Webhook -> Custom Webhook)
const WEBHOOK_SECRET = "y2x3...==";
// Middleware to capture raw body (important for signature verification)
app.use(express.raw({ type: "application/json" }));
app.post("/webhook", (req, res) => {
const body = req.body.toString("utf8");
const timestamp = req.header("X-Pay-Timestamp") || "";
const signature = req.header("X-Pay-Signature") || "";
// 1) Check freshness (max 5 minutes)
if (Math.abs(Date.now() / 1000 - parseInt(timestamp)) > 300) {
return res.status(401).send("Invalid timestamp");
}
// 2) Recalculate expected signature
const baseString = `${timestamp}.${body}`;
const secret = Buffer.from(WEBHOOK_SECRET, "base64");
const expected = crypto
.createHmac("sha256", secret)
.update(baseString)
.digest("hex");
// 3) Verify signature
if (!crypto.timingSafeEqual(Buffer.from(expected), Buffer.from(signature))) {
return res.status(401).send("Invalid signature");
}
// 4) Parse JSON
const event = JSON.parse(body);
// Example: handle payment status update
if (event.event === "payment.success") {
const paymentId = event.data.id;
const discord_id = event.data.user.discord_id;
// TODO: update your database here
}
res.status(200).send("ok");
});
app.listen(PORT, () => {
console.log(`Webhook server running on http://localhost:${PORT}`);
});How it works
Raw body is required — don’t use
express.json()directly, otherwise the signature check will fail.Check timestamp (
X-Pay-Timestamp) — reject if older than 5 minutes.Recalculate signature:
HMAC-SHA256(timestamp.body, secret)with the base64-decoded secret.Compare with
X-Pay-Signatureusingcrypto.timingSafeEqualfor safety.Process the event (decode JSON and apply business logic).
from flask import Flask, request, abort
import time, hmac, hashlib, base64, json
app = Flask(__name__)
# Secret key (Tip4serv Dashboard -> Webhook -> Custom Webhook)
WEBHOOK_SECRET_BASE64 = "y2x3...=="
@app.route("/webhook", methods=["POST"])
def webhook():
# 1) Read the raw request body (JSON string)
body = request.data.decode("utf-8")
# 2) Read headers sent by the platform
timestamp = request.headers.get("X-Pay-Timestamp", "")
signature = request.headers.get("X-Pay-Signature", "")
# 3) Reject if the webhook is too old (max 5 minutes)
if abs(time.time() - int(timestamp)) > 300:
abort(401, "invalid timestamp")
# 4) Recalculate the expected signature
base_string = f"{timestamp}.{body}"
secret_binary = base64.b64decode(WEBHOOK_SECRET_BASE64)
expected_signature = hmac.new(secret_binary, base_string.encode(), hashlib.sha256).hexdigest()
# 5) Compare signatures
if not hmac.compare_digest(expected_signature, signature):
abort(401, "invalid signature")
# 6) If we’re here, the webhook is authentic
event = json.loads(body)
# Example: handle payment update
if event.get("event") == "payment.success":
payment_id = event["data"]["id"]
discord_id = event["data"]["user"]["discord_id"]
# TODO: update your database here
return "ok", 200
if __name__ == "__main__":
app.run(port=3000, debug=True)How it works
Read the body → the raw JSON payload sent by Tip4Serv.
Get headers →
X-Pay-TimestampandX-Pay-Signature(sent with every request).Check freshness → reject if the webhook is older than 5 minutes.
Recalculate signature →
HMAC-SHA256(timestamp.body, secret)using your Base64-decoded secret.Compare signatures → use
hmac.compare_digestto avoid timing attacks.Process event → decode JSON and handle it (e.g., update your database).
import org.springframework.web.bind.annotation.*;
import org.springframework.http.ResponseEntity;
import javax.crypto.Mac;
import javax.crypto.spec.SecretKeySpec;
import java.util.Base64;
import java.util.Map;
@RestController
public class WebhookController {
// Secret key (Tip4serv Dashboard -> Webhook -> Custom Webhook)
private static final String WEBHOOK_SECRET_BASE64 = "y2x3...==";
@PostMapping("/webhook")
public ResponseEntity<String> handleWebhook(
@RequestBody String body,
@RequestHeader(value = "X-Pay-Timestamp", required = false) String timestamp,
@RequestHeader(value = "X-Pay-Signature", required = false) String signature
) {
try {
// 1) Reject if timestamp missing or too old (max 5 min)
if (timestamp == null || Math.abs(System.currentTimeMillis() / 1000 - Long.parseLong(timestamp)) > 300) {
return ResponseEntity.status(401).body("invalid timestamp");
}
// 2) Recalculate expected signature
String baseString = timestamp + "." + body;
byte[] secret = Base64.getDecoder().decode(WEBHOOK_SECRET_BASE64);
Mac hmac = Mac.getInstance("HmacSHA256");
hmac.init(new SecretKeySpec(secret, "HmacSHA256"));
String expected = bytesToHex(hmac.doFinal(baseString.getBytes()));
// 3) Compare signatures
if (signature == null || !expected.equals(signature)) {
return ResponseEntity.status(401).body("invalid signature");
}
// 4) Webhook is authentic → parse JSON
com.fasterxml.jackson.databind.ObjectMapper mapper = new com.fasterxml.jackson.databind.ObjectMapper();
Map<String, Object> event = mapper.readValue(body, Map.class);
// Example: handle payment.success
if ("payment.success".equals(event.get("event"))) {
Map<String, Object> data = (Map<String, Object>) event.get("data");
String paymentId = String.valueOf(data.get("id"));
// TODO: update your database
}
return ResponseEntity.ok("ok");
} catch (Exception e) {
e.printStackTrace();
return ResponseEntity.status(500).body("error");
}
}
// Helper: convert bytes to hex string
private static String bytesToHex(byte[] bytes) {
StringBuilder sb = new StringBuilder();
for (byte b : bytes) sb.append(String.format("%02x", b));
return sb.toString();
}
}
How it works
Read the body →
@RequestBody String bodycontains the raw JSON payload.Get headers →
X-Pay-TimestampandX-Pay-Signatureare extracted with@RequestHeader.Check freshness → reject if the timestamp is more than 5 minutes old.
Recalculate signature → compute
HMAC-SHA256(timestamp.body, secret)with your Base64-decoded secret.Compare signatures → ensure
expected == signaturebefore processing.Process event → parse JSON with Jackson (
ObjectMapper) and act on theevent.
Tips & best practices
Respond fast (under a few seconds). Offload heavy work to a queue/worker.
Treat optional fields defensively: not every
useridentifier orcustom_fieldswill be present.Log the raw payload (with privacy in mind) to help debugging.
Last updated