Skip to main content

Lightweight webhook monitoring SDK for Python

Project description

outworx-hooks

Lightweight webhook monitoring SDK for Python -- know exactly when your webhooks break.

Works with FastAPI, Flask, and Django. Monitor everything from your dashboard at hooks.outworx.io.

Installation

pip install outworx-hooks

Quick Start

1. Initialize

Add your API key once at app startup, or set the OUTWORX_HOOKS_API_KEY environment variable.

import outworx_hooks

outworx_hooks.init(api_key="your-api-key")

Or via environment variable:

OUTWORX_HOOKS_API_KEY=your-api-key

2. Wrap Your Webhook Handler

FastAPI

from fastapi import FastAPI
from outworx_hooks.integrations.fastapi import OutworxHooksMiddleware
from outworx_hooks import TrackOptions

app = FastAPI()

app.add_middleware(
    OutworxHooksMiddleware,
    options=TrackOptions(provider="stripe", event_type_field="type")
)

@app.post("/webhooks/stripe")
async def handle_webhook():
    # ... process webhook
    return {"status": "ok"}

Flask

from flask import Flask
from outworx_hooks.integrations.flask import with_webhook_monitoring
from outworx_hooks import TrackOptions

app = Flask(__name__)

@app.route("/webhooks/stripe", methods=["POST"])
@with_webhook_monitoring(TrackOptions(provider="stripe", event_type_field="type"))
def handle_webhook():
    # ... process webhook
    return {"status": "ok"}

Django

Add the middleware to your MIDDLEWARE setting:

# settings.py
MIDDLEWARE = [
    ...
    'outworx_hooks.integrations.django.OutworxHooksMiddleware',
]

OUTWORX_HOOKS_OPTIONS = {
    'provider': 'stripe',
    'event_type_field': 'type',
    'capture_body': True
}

Silent drop detection (v1.5+)

The most common webhook bug nobody tells you about: your handler returns 200 OK, the provider thinks delivery succeeded, but your business logic short-circuited (early return inside an if, swallowed exception in a try/except, missing await). Provider doesn't retry. Dashboard says success. State is wrong. Hours later, a customer notices.

Outworx 1.5 catches this. Opt in by setting require_processing_mark=True and calling track.processed() once your handler actually finishes:

FastAPI

from fastapi import FastAPI, Request
from outworx_hooks import init, TrackOptions
from outworx_hooks.integrations.fastapi import OutworxHooksMiddleware

init(api_key=os.environ["OUTWORX_HOOKS_API_KEY"])
app = FastAPI()

app.add_middleware(
    OutworxHooksMiddleware,
    options=TrackOptions(
        provider="stripe",
        signature_secret=os.environ["STRIPE_WEBHOOK_SECRET"],
        require_processing_mark=True,   # opt in to silent-drop detection
    ),
)

@app.post("/webhooks/stripe")
async def stripe_webhook(request: Request):
    body = await request.json()
    if body["type"] != "charge.succeeded":
        return {"received": True}      # silent_drop if unintended
    charge_customer(body["data"]["object"])
    request.state.outworx_track.processed()   # explicit ack
    return {"received": True}

Flask

from flask import Flask, g, request
from outworx_hooks import init, TrackOptions
from outworx_hooks.integrations.flask import with_webhook_monitoring

init(api_key=os.environ["OUTWORX_HOOKS_API_KEY"])
app = Flask(__name__)

@app.route("/webhooks/stripe", methods=["POST"])
@with_webhook_monitoring(TrackOptions(
    provider="stripe",
    signature_secret=os.environ["STRIPE_WEBHOOK_SECRET"],
    require_processing_mark=True,
))
def stripe_webhook():
    body = request.get_json()
    charge_customer(body)
    g.outworx_track.processed()
    return {"received": True}

Django

# views.py
def stripe_webhook(request):
    charge_customer(json.loads(request.body))
    request.outworx_track.processed()
    return JsonResponse({"received": True})

# settings.py
OUTWORX_HOOKS_OPTIONS = {
    "provider": "stripe",
    "signature_secret": os.environ["STRIPE_WEBHOOK_SECRET"],
    "require_processing_mark": True,
}

You can also explicitly mark application-level failures with track.failed("reason") — handler returns 200 (so the provider doesn't retry) but the event is flagged as not actually processed.

Signature failure diagnostics (v1.5+)

When signature verification fails, Outworx now tells you why. Each failure includes a stable reason code and a developer-facing hint, surfaced on the event detail page in the dashboard:

Reason Meaning Fix
missing_header Provider's signature header was absent Confirm endpoint URL in provider dashboard
malformed_header Header was present but didn't match expected format Check for proxies/middleware mutating headers
timestamp_drift Signed timestamp outside tolerance Sync server clock (NTP)
hmac_mismatch Signature didn't verify against your secret Wrong/rotated secret, or modified body
parsed_body Body looks like json.dumps output rather than raw bytes Verify against the raw request body
unsupported_provider No built-in verifier for this provider Use a custom signature_verifier function
verifier_threw Verifier threw an exception Check error_message on the event

To use the structured form programmatically:

from outworx_hooks.security import verify_stripe_signature_detailed

result = verify_stripe_signature_detailed(
    raw_body=raw_body,
    header=request.headers.get("stripe-signature"),
    secret=secret,
)
if not result.valid:
    print(f"signature failed: {result.reason}{result.hint}")

The boolean form (verify_stripe_signature(...)) still works unchanged.

Local tunnel (outworx forward)

Develop against real provider webhooks without deploying. Installing the package adds an outworx console script:

pip install outworx-hooks
outworx forward 3000
  outworx forward  →  http://localhost:3000
  Public URL:  https://hooks.outworx.io/t/8b3a9f1c2d4e5067
  Expires:     2026-11-07T16:18:42Z
  Press Ctrl+C to stop.

  16:18:51  POST /webhooks/stripe  200  42ms
  16:18:52  POST /webhooks/stripe  200  31ms

Point your provider (Stripe, GitHub, Shopify, …) at the printed Public URL. Inbound requests are forwarded to your local server, and the response your handler returns is relayed back to the provider.

# Auth — set OUTWORX_API_KEY or pass --api-key
export OUTWORX_API_KEY=sk_live_...
outworx forward http://localhost:3000

# Shorthands
outworx forward 3000              # → http://localhost:3000
outworx forward localhost:8080    # → http://localhost:8080

# Override the Outworx server (self-hosted / staging)
outworx forward 3000 --endpoint=https://hooks.staging.example.com

# Module form, e.g. inside virtualenvs without console scripts
python -m outworx_hooks.cli forward 3000

Sessions auto-expire after 24 hours. Hop-by-hop headers are stripped on both legs; the relayed response includes X-Outworx-Tunnel: <slug> so your handler can detect tunneled traffic if needed.

Configuration

import outworx_hooks

outworx_hooks.init(
    api_key="your-api-key",
    endpoint="https://hooks.outworx.io/api/ingest", # default
    debug=True, # log events to console
    timeout=3000, # HTTP timeout in ms
    on_error=lambda err: print(err), # error callback
)

Track Options

Each adapter accepts TrackOptions:

Option Type Default Description
provider str -- Webhook provider name (e.g., "stripe", "shopify")
event_type_header str -- Header name to extract event type from
event_type_field str -- Body field to extract event type from (e.g., "type")
capture_body bool False Capture request + response bodies (disabled by default for privacy)
capture_headers bool True Capture request headers (sensitive ones redacted)
metadata dict -- Custom metadata attached to every event
signature_secret str -- Auto-verify signature (see below)
signature_verifier callable -- Custom verifier function
reject_invalid_signatures bool True Respond with 401 when verification fails
signature_tolerance int 300 Replay-attack window (seconds) for timestamp providers
idempotency_key callable -- Extract a dedup key from the request (see below)
idempotency_ttl int 86400 TTL (seconds) for idempotency cache. Max 604800 (7d)

Signature Verification

Built-in support for verifying webhook signatures for Stripe, GitHub, Shopify, Svix / Clerk, and Slack. When you provide a signature_secret, the SDK:

  1. Computes the expected HMAC-SHA256 signature
  2. Compares it with the one in the request header (timing-safe, via hmac.compare_digest)
  3. Rejects replay attacks (for timestamp-based providers)
  4. Returns 401 Invalid webhook signature without calling your handler
  5. Reports signature_valid to your Outworx dashboard for every request

FastAPI

from fastapi import FastAPI, Request
from outworx_hooks import init, TrackOptions
from outworx_hooks.integrations.fastapi import OutworxHooksMiddleware

init(api_key=os.environ["OUTWORX_HOOKS_API_KEY"])

app = FastAPI()
app.add_middleware(
    OutworxHooksMiddleware,
    options=TrackOptions(
        provider="stripe",
        signature_secret=os.environ["STRIPE_WEBHOOK_SECRET"],
    ),
)

@app.post("/webhooks/stripe")
async def stripe_webhook(request: Request):
    # Signature has already been verified
    body = await request.json()
    return {"received": True}

Flask

from flask import Flask, request
from outworx_hooks import init, TrackOptions
from outworx_hooks.integrations.flask import with_webhook_monitoring

init(api_key=os.environ["OUTWORX_HOOKS_API_KEY"])

app = Flask(__name__)

@app.route("/webhooks/stripe", methods=["POST"])
@with_webhook_monitoring(TrackOptions(
    provider="stripe",
    signature_secret=os.environ["STRIPE_WEBHOOK_SECRET"],
))
def stripe_webhook():
    return {"received": True}

Django

# settings.py
OUTWORX_HOOKS_OPTIONS = {
    "provider": "stripe",
    "signature_secret": os.environ["STRIPE_WEBHOOK_SECRET"],
}

MIDDLEWARE = [
    "outworx_hooks.integrations.django.OutworxHooksMiddleware",
    # ...
]

Custom verifier

For providers not in the built-in list, pass your own function:

from outworx_hooks import TrackOptions

options = TrackOptions(
    provider="my-service",
    signature_verifier=lambda raw_body, headers: my_check(
        raw_body, headers.get("X-My-Signature")
    ),
)

Standalone verifiers

Import and call the per-provider verifiers directly:

from outworx_hooks.security import verify_stripe_signature

valid = verify_stripe_signature(
    raw_body=raw_body,
    header=request.headers.get("stripe-signature"),
    secret=os.environ["STRIPE_WEBHOOK_SECRET"],
)

Idempotency

Webhook providers retry deliveries when your handler times out or returns a non-2xx response — which can cause you to double-process the same event (double-charge the customer, send duplicate emails, etc.). Pass an idempotency_key function and the SDK will short-circuit retries with the cached response from the first successful delivery.

FastAPI

from outworx_hooks import init, TrackOptions
from outworx_hooks.integrations.fastapi import OutworxHooksMiddleware

init(api_key=os.environ["OUTWORX_HOOKS_API_KEY"])

app = FastAPI()
app.add_middleware(
    OutworxHooksMiddleware,
    options=TrackOptions(
        provider="stripe",
        signature_secret=os.environ["STRIPE_WEBHOOK_SECRET"],
        # Dedupe on the Stripe event ID. Retries of the same event return
        # the cached response without re-invoking the handler.
        idempotency_key=lambda req, body, headers: body.get("id") if body else None,
    ),
)

Flask

@app.route("/webhooks/stripe", methods=["POST"])
@with_webhook_monitoring(TrackOptions(
    provider="stripe",
    idempotency_key=lambda req, body, headers: body.get("id") if body else None,
))
def stripe_webhook():
    ...

Recommended keys per provider

# Stripe — event ID in the body
idempotency_key=lambda req, body, headers: body.get("id") if body else None

# GitHub — delivery ID header
idempotency_key=lambda req, body, headers: headers.get("x-github-delivery")

# Shopify — webhook ID header
idempotency_key=lambda req, body, headers: headers.get("x-shopify-webhook-id")

# Svix / Clerk — message ID header
idempotency_key=lambda req, body, headers: headers.get("svix-id")

Returning None from the function skips idempotency for that request.

Failure behavior

If the Outworx backend is unreachable when the SDK tries to check for duplicates, the check fails open — your handler runs as normal. Idempotency failures never block webhook delivery.

If your handler throws or returns 5xx, the idempotency key is not committed, so the next retry is free to re-run the handler. Stale reservations older than 30 seconds are automatically cleared.

Dashboard

View your webhook activity at hooks.outworx.io.

License

Business Source License 1.1 — see LICENSE for full text.

Free to use in production with the Outworx Hooks service. You may not use this SDK or any derivative work to offer a hosted webhook monitoring, analytics, or alerting service that competes with Outworx. The license converts to Apache 2.0 on 2030-04-17.

For commercial licensing inquiries, contact licensing@outworx.io.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

outworx_hooks-1.5.0.tar.gz (33.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

outworx_hooks-1.5.0-py3-none-any.whl (35.2 kB view details)

Uploaded Python 3

File details

Details for the file outworx_hooks-1.5.0.tar.gz.

File metadata

  • Download URL: outworx_hooks-1.5.0.tar.gz
  • Upload date:
  • Size: 33.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.3

File hashes

Hashes for outworx_hooks-1.5.0.tar.gz
Algorithm Hash digest
SHA256 b14c5364c3d8431adf58a26324c6469afe3cdeccb68eb88f38ad8d435138a141
MD5 89755687c2e0589a04da4f32f390f630
BLAKE2b-256 4aff7faf4be3ba9e92137d03091867aec742805fbc3ef0fc1315be5afe74c15b

See more details on using hashes here.

File details

Details for the file outworx_hooks-1.5.0-py3-none-any.whl.

File metadata

  • Download URL: outworx_hooks-1.5.0-py3-none-any.whl
  • Upload date:
  • Size: 35.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.3

File hashes

Hashes for outworx_hooks-1.5.0-py3-none-any.whl
Algorithm Hash digest
SHA256 1125bd3b5736286a9deecd6d21575caabe68c99b92aa23647c2715fb3bc74e06
MD5 9968ea5f34307e7b335ebfc197ad5548
BLAKE2b-256 15141a05eafb22933b4a8ce06df815da7cc9e341e1f0c3e886a0160247aee2fa

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page