Webhooks
Webhooks
Mit Webhooks empfängst du Echtzeit-Benachrichtigungen, wenn Events in deinem Workspace auftreten — z.B. wenn ein QR-Code gescannt wird.
Webhook erstellen
POST /v1/webhooks{ "url": "https://example.com/webhooks/qr3", "events": ["qr.scanned", "qr.created"], "secret": "my-secret-key-min-16-chars"}Response
{ "id": "wh_abc123", "url": "https://example.com/webhooks/qr3", "events": ["qr.scanned", "qr.created"], "is_active": true, "secret": "my-secret-key-min-16-chars", "secret_hint": "my-s…", "created_at": "2026-03-15T10:00:00.000Z"}Event-Typen
| Event | Beschreibung |
|---|---|
* | Alle Events |
qr.created | QR-Code erstellt |
qr.updated | QR-Code aktualisiert (URL, Status, Tags) |
qr.deleted | QR-Code gelöscht |
qr.scanned | QR-Code gescannt |
qr.flagged | QR-Code als unsicher markiert |
scan.created | Scan-Event (alias für qr.scanned) |
workspace.updated | Workspace aktualisiert |
webhook.ping | Test-Ping (via /ping-Endpoint) |
Payload-Format
Alle Webhook-Payloads haben dieses Format:
{ "id": "evt_abc123xyz", "type": "qr.scanned", "created": "2026-03-15T10:00:00.000Z", "data": { "code_id": "qr_abc123", "short_code": "r7f3Kx", "scan_id": "scn_xyz", "country": "AT", "device_type": "mobile", "os": "iOS" }}Signaturverifikation
qr3.app signiert jeden Webhook-Request mit HMAC-SHA256:
X-QR3-Signature: sha256=a1b2c3d4e5f6...Verifikation implementieren
import crypto from "crypto";
function verifySignature( payload: string, signature: string, secret: string): boolean { const expected = crypto .createHmac("sha256", secret) .update(payload) .digest("hex"); const received = signature.replace("sha256=", ""); return crypto.timingSafeEqual( Buffer.from(expected, "hex"), Buffer.from(received, "hex") );}
// In Express:app.post("/webhooks/qr3", (req, res) => { const signature = req.headers["x-qr3-signature"] as string; const valid = verifySignature( JSON.stringify(req.body), signature, process.env.QR3_WEBHOOK_SECRET ); if (!valid) return res.status(401).json({ error: "Invalid signature" });
const event = req.body; console.log(event.type, event.data); res.json({ received: true });});import hmacimport hashlib
def verify_signature(payload: str, signature: str, secret: str) -> bool: expected = hmac.new( secret.encode(), payload.encode(), hashlib.sha256 ).hexdigest() received = signature.removeprefix("sha256=") return hmac.compare_digest(expected, received)Retry-Logik
Bei Fehlern (HTTP >= 300 oder Timeout) versucht qr3.app die Zustellung erneut:
| Versuch | Delay |
|---|---|
| 1 | Sofort |
| 2 | 1 Minute |
| 3 | 5 Minuten |
Nach 10 aufeinanderfolgenden Fehlern wird der Webhook automatisch deaktiviert.
Delivery-Logs
GET /v1/webhooks/:id/deliveries{ "data": [ { "id": "whd_abc123", "event_type": "qr.scanned", "status": "success", "status_code": 200, "response_time_ms": 145, "attempt": 1, "created_at": "2026-03-15T10:00:00.000Z" } ]}Test-Ping
Teste einen Webhook sofort:
POST /v1/webhooks/:id/pingDas sendet einen webhook.ping-Event an deine Endpoint-URL.