Webhooks

  • A webhook is a URL endpoint where the RBM platform sends messages and events via HTTPS POST requests.

  • Webhooks can be configured at either the partner level, applying to all agents, or at the agent level for individual agents with distinct behavior.

  • To configure an agent webhook, use the Business Communications Developer Console to set the URL and note the clientToken for verifying incoming messages.

  • You must verify incoming messages by comparing the X-Goog-Signature header with a hash generated using the message body and your clientToken.

  • It is crucial to design your webhook to process RBM events asynchronously to handle high rates of notifications and avoid delivery failures, which trigger a backoff and retry mechanism that lasts up to 7 days.

A webhook is a partner-specified URL where the RCS for Business platform posts messages and events. This URL acts as an endpoint that receives HTTPS POST requests containing data about the events. This means that data is sent to your application securely over HTTPS.

A webhook URL might look something like this: https://[your company name].com/api/rbm-events. Once you configure your webhook, you can start receiving messages and events.

Partner webhooks and agent webhooks

You can configure your webhook either at the partner level or at the agent level.

  • Your partner webhook applies to every agent you maintain. If your agents have similar behavior, or if you only have one agent, use the partner webhook.
  • Agent webhooks apply to individual agents. If you operate multiple agents with distinct behavior, you can set a different webhook for each agent.

If you've configured both a partner webhook and an agent webhook, the agent webhook takes precedence on its specific agent, while the partner webhook applies to any agents that don't have their own webhook.

Configure an agent webhook

You receive messages sent to your agent at your partner webhook. If you want messages for a specific agent to arrive at a different webhook instead, set an agent webhook.

  1. Open the Business Communications Developer Console and sign in with your RCS for Business partner Google Account.
  2. Click your agent.
  3. Click Integrations.
  4. For Webhook, click Configure.
  5. For Webhook endpoint URL, enter your webhook URL beginning with "https://".
  6. Note your clientToken value. You need it to verify that messages you receive are coming from Google.
  7. Configure your webhook to accept a POST request with the specified clientToken parameter and send a 200 OK response with the plain text value of the secret parameter as the response body.

    For example, if your webhook receives a POST request with the following body content

    {
      "clientToken":"SJENCPGJESMGUFPY",
      "secret":"1234567890"
    }
    

    then your webhook should confirm the clientToken value and, if clientToken is correct, return a 200 OK response with 1234567890 as the response body:

    // clientToken from Configure
    const myClientToken = "SJENCPGJESMGUFPY";
    
    // Example endpoint
    app.post("/rbm-webhook", (req, res) => {
      const msg = req.body;
      if (msg.clientToken === myClientToken) {
          res.status(200).send(msg.secret);
          return;
      }
      res.send(400);
    });
    
  8. In the Developer Console, click Verify. When RCS for Business verifies your webhook, the dialog closes.

Verify incoming messages

Because webhooks can receive messages from any sender, you should verify that Google sent incoming messages before processing message content.

To verify that Google sent a message you received, follow these steps:

  1. Extract the message's X-Goog-Signature header. This is a hashed, base64-encoded copy of the message body payload.
  2. Base-64-decode the RCS for Business payload in the message.body element of the request.
  3. Using your webhook's client token (which you specified when you set up your webhook) as a key, create a SHA512 HMAC of the bytes of the base-64 decoded message payload and base64-encode the result.
  4. Compare the X-Goog-Signature hash with the hash you created.
    • If the hashes match, you've confirmed that Google sent the message.
    • If the hashes don't match, check your hashing process on a known-good message.

      If your hashing process is working correctly and you receive a message that you believe was fraudulently sent to you, contact us.

Node.js

  if ((requestBody.hasOwnProperty('message')) && (requestBody.message.hasOwnProperty('data'))) {
    // Validate the received hash to ensure the message came from Google RBM
    let userEventString = Buffer.from(requestBody.message.data, 'base64');
    let hmac = crypto.createHmac('sha512', CLIENT_TOKEN);
    let data = hmac.update(userEventString);
    let genHash = data.digest('base64');
    let headerHash = req.header('X-Goog-Signature');

    if (headerHash === genHash) {
      let userEvent = JSON.parse(userEventString);

      console.log('userEventString: ' + userEventString);
      handleMessage(userEvent);
    } else {
      console.log('hash mismatch - ignoring message');
    }
  }

  res.sendStatus(200);
  

Message handling

Returning anything other than 200 OK from a webhook is considered a delivery failure.

Developers must be mindful that sending messages at high rates will generate webhook notifications at high rates and must design their code to handle notifications at the expected rate. It is important for developers to consider situations that may cause failure responses - including 500 responses from their web container, timeouts, or upstream failures. Things to consider include:

  • Verify that your DDoS protections are configured to handle the expected rate of webhook notifications.
  • Confirm that resources such as database connection pools don't run out and produce timeouts or 500 responses.

Developers should design their systems so the processing of RBM events occurs asynchronously and doesn't prevent the webhook from returning 200 OK.

Asynchronous webhook processing

It is important to not process the RBM event within the webhook itself. Any error or delay during processing may impact the webhook return code:

Synchronous webhook processing

Behavior on delivery failure

If your webhook returns anything other than a 200 OK status, the RCS for Business platform uses a backoff and retry mechanism to redeliver the data. This means the system progressively increases the delay between each delivery attempt, eventually reaching a maximum frequency of one retry every 10 minutes for each pending message. The retry cycle continues for seven days, after which the message is permanently deleted.

Implications of agent-level webhooks

RCS for Business queues messages for a partner on one queue. All agents under a single partner account share a single queue. Because of this, a failure in one webhook can block the entire queue, preventing user events for all agents from reaching the partner.

Several unacknowledged messages can cause a massive spike in retry events. For example, if an agent doesn't acknowledge 1,600 delivery receipts, and the retry frequency reaches the 10-minute limit, it can generate approximately 230,000 potential errors per day:

1,600 messages × 6 retries per hour × 24 hours per day = approximately 230,000 errors per day

This volume of retries can block the shared Pub/Sub queue and cause significant delays in receiving user events for all campaigns of a partner.

Best practices

To secure the reliability of your production traffic and avoid queue blockers, follow these best practices:

  • Return 200 OK immediately: The webhook should receive the message, store it in a local queue, and return a 200 OK response in under five seconds.
  • Decouple processing: Use separate background workers to process message logic from the local queue.
  • Monitor test agents: Treat development agents as production agents, because they can also block the shared partner queue if they fail.
  • Dedicated accounts for testing: Preferably use one developer account for production agents and a dedicated developer account for test agents.
  • Verify Google traffic: Use Reverse DNS or the X-Goog-Signature header rather than fixed IP allowlisting, as Google uses dynamic anycast IPs. For more information on manual verification and identifying Google IP ranges, see the Verify Google requests documentation and specifically JSON files for user-triggered fetchers and Google user-triggered fetchers.

Next steps

Once you configure your webhook, your agent can receive messages from your test devices. Send a message to validate your setup.