Proxy Operator/Client Developer Rejects Unsigned Incoming Stripe Webhooks Events #66
Open
1 of 13 tasks
Labels
code
Work that will require some amount of programming
enhancement
New feature or request
epic
Work that will will likely cover a number of use cases.
security
Hone your security skills!
Stripe, by design, has a method for signing and verifying messages sent to its API. This kind of security should be applied to the proxy when receiving messages and (perhaps also sending messages to the forwarded event listener endpoint).
Feature Definition
There are two scenarios in play here, one is for the Operator of the Compensated Proxy, and the other is for a Client Developer.
Here's the one for the Proxy
And here's one for the Core library:
We may want to split this into two issues; so that it's easier to close; or we can leave it as one big issue with as many patches as it takes to get this across the finish line.
This Issue May Be Closed When
compensated-ruby
library can verify incoming Stripe Event's Signaturecompensated-ruby/CHANGELOG.md
indicates that this feature existscompensated-ruby
library.compensated-proxy
application can verify incoming Stripe Event's signaturecompensated-proxy/CHANGELOG.md
indicates that this feature existscompensated-proxy
applicationThe text was updated successfully, but these errors were encountered: