Create and manage webhooks
This topic describes how to implement webhooks in HashiCorp Cloud Platform (HCP) that notify external systems about a project resource's lifecycle events.
Viewing and managing webhooks
Click on a project in the HCP sidebar and choose Project settings > Webhooks to open the Webhooks page. The page shows any existing webhooks.
Creating a webhook
Complete the following steps to create a webhook:
- Click Project settings > Webhooks. The Webhooks page appears.
- Click Create webhook. The Create webhook page appears.
- Configure the following fields:
- Name: Specify a name for the webhook. This field is required.
- Description: Add a description for the webhook. Descriptions are useful for helping others understand the purpose of the webhook. This field is optional.
- Webhook URL: Specify the destination for the webhook payload. The destination must accept HTTP or HTTPS
POST
requests and should be able to use the payload. This field is required. - Token: Specify an arbitrary secret string that HCP uses to sign its webhook requests. Refer to Webhook Authenticity for details. You cannot view the token after you save the webhook configuration. This field is optional
- Events: Specify the events that you want to send to the destination specified in the Webhook URL field. You can send payloads for all events or only for specific events. The events that are available to send are specific to the services that own the resources. Refer to the service's webhook documentation for events type and payloads.
- Click Create webhook.
Enabling and verifying a webhook
To enable or disable a webhook:
- Click Project settings > Webhooks. The Webhooks page appears.
- Click the ellipses menu next to the webhook you want to manage. Depending on the current state of the webhook, one of the following options appears:
- Enable webhook: Enables the webhook. HCP attempts to verify the webhook configuration by sending a verification payload, and only enables the webhook if the verification succeeds. For a verification to be successful, the destination must respond with an HTTP response code in the 200 - 299 range. If verification fails, HCP displays the error message and the configuration remains disabled.
- Disable webhook: Disables the webhook. HCP stops delivering payloads to the destination URL.
Webhook payload
Webhook payloads contain the following information:
- Resource ID: The ID of the resource the event is related to.
- Resource name: The resource name of the resource the event is related to.
- Event ID: The unique identifier for the event generated by the services with the format
<service>.event:<random string>
. For example,packer.event:t79BRg8WhTmDPBRM
. - Event action: The type of action of this event. For example,
create
. - Event description: The event description. For example,
Created version
. - Event source: The source of the event. For example,
hashicorp.packer.version
. Event source might not be the same type as the resource that the webhook is subscribed to if the event is from a descendant resource. For example, webhooks are subscribed to ahashicorp.packer.registry
and receive events for descendent resources such as ahashicorp.packer.version
. - Event version: The version of the event payload that is being sent.
- Event payload: The payload with the information about the resource's lifecycle event.
The service that owns the resource writes the payload. Refer to the service's webhook documentation linked in HCP Webhook Events Documentation for details about specific payloads.
Third-party services may require additional fields that are outside of the HCP webhook payload. To integrate with these types of services, you must integrate a middleware webhook capable of translating payloads. The middleware must respond 200 OK
to HCP webhook requests and forward the translated payload to the third-party destination URL. Refer to the documentation for your third-party services for assistance.
The following example payload is from the hashicorp.packer.version
resource:
Verification payload
HCP verifies that the webhook configuration is valid before creating, enabling, or updating a webhook URL and token. For the verification to be successful, the destination must respond to the verification payload with an HTTP response code in the 200 - 299 range.
The event_id
is unique to each verification payload.
Webhook authenticity
For webhook configurations that include a secret token, HCP webhook requests include an X-HCP-Webhook-Signature
header, which contains an HMAC signature computed from the token using the SHA-512 digest algorithm.
The receiving service is responsible for validating the signature.
The following example verifies the HMAC using Ruby:
Managing webhooks with Terraform
You can create and manage webhooks using the HCP Terraform provider. For more information, see the HCP Terraform provider hcp_notifications_webhook resource documentation.
HCP Webhook Events Documentation
For more information about the events that are available to send, refer to the service's webhook documentation.