A webhook ingestion and processing system built with Encore.ts, demonstrating Pub/Sub fan-out patterns.
This app has three services:
Both processor and notifications receive every event, but handle them differently. This is the fan-out pattern — one event published, multiple subscribers process it independently.
encore secret set --type dev,local,pr,prod WebhookSecretStripe
encore secret set --type dev,local,pr,prod WebhookSecretGitHub
encore run
The Postgres databases are provisioned automatically on startup. No manual database setup required.
Open http://localhost:4000 for usage instructions, or http://localhost:9400 for the Local Dashboard. When deployed to Encore Cloud, use the Service Catalog to call endpoints and view traces to see how requests flow between services.
When secrets are configured, incoming webhooks are verified using the official SDKs:
stripe.webhooks.constructEvent) to verify the Stripe-Signature header. Stripe signs payloads using a timestamp and HMAC-SHA256 signature in the format t=...,v1=....crypto.timingSafeEqual to verify the X-Hub-Signature-256 header. GitHub signs payloads with HMAC-SHA256, prefixed with sha256=.Without secrets configured, all webhooks are accepted without signature checks.
# Stripe webhook (without signature validation)
curl -X POST http://localhost:4000/webhooks/stripe \
-H "Content-Type: application/json" \
-d '{"type": "payment_intent.succeeded", "data": {"object": {"amount": 2000}}}'
# GitHub webhook (without signature validation)
curl -X POST http://localhost:4000/webhooks/github \
-H "Content-Type: application/json" \
-H "X-GitHub-Event: push" \
-d '{"ref": "refs/heads/main"}'
To test with signature validation, set the secrets and include the appropriate headers:
# GitHub with signature
SECRET="your-github-secret"
PAYLOAD='{"ref":"refs/heads/main"}'
SIG="sha256=$(echo -n "$PAYLOAD" | openssl dgst -sha256 -hmac "$SECRET" | awk '{print $2}')"
curl -X POST http://localhost:4000/webhooks/github \
-H "Content-Type: application/json" \
-H "X-Hub-Signature-256: $SIG" \
-H "X-GitHub-Event: push" \
-d "$PAYLOAD"
For Stripe, use the Stripe CLI to forward and sign webhooks locally:
stripe listen --forward-to localhost:4000/webhooks/stripe stripe trigger payment_intent.succeeded
curl http://localhost:4000/webhooks/events
curl http://localhost:4000/webhooks/events/1
curl http://localhost:4000/notifications
curl http://localhost:4000/notifications/stats