Handling Notifications

In this guide, we will look at how to consume notifications from the Buckets API. If you are looking for the Notification resource (including the list of events and how to create a Notification), see the Notifications Resource.

Consuming Notifications

When your app receives a notification request from Buckets, check the event attribute to see what event caused it. The first part of the event type will tell you the payload type, e.g., a bucket, user, etc.

Example notification payload

{
  "event": "file.uploaded",
  "fired_at": 692233200,
  "bucket_id": "bio_test_buc_1amaj5125as", // Only provided for bucket.* events
  "user_id": "bio_test_usr_1amaj5125as", // Only provided for user.* and file.* events
  "file_path": "/dir1/file_name.csv", // Only provided for file.* events
  "file_name": "file_name.csv", // Only provided for file.* events
  "file_contents": "..."
}

In the example above, a file was uploaded, and the payload type is a file.


Security

To know for sure that a notification was, in fact, sent by Buckets instead of a malicious actor, you can verify the request signature. Each notification request contains a header named x-buckets-signature, and you can verify this signature by using your secret notification key. The signature is an HMAC hash of the request payload hashed using your notification secret key. Here is an example of how to verify the signature in your app:

Verifying a request

const signature = req.headers['x-buckets-signature']
const hash = crypto.createHmac('sha256', secret).update(payload).digest('hex')

if (hash === signature) {
  // Request is verified
} else {
  // Request could not be verified
}

If your generated signature matches the x-buckets-signature header, you can be sure that the request was truly coming from Buckets. It's essential to keep your secret notifications key safe — otherwise, you can no longer be sure that a given notification was sent by Buckets. Don't commit your secret notification key to GitHub!