Supabase Database Webhook is a great way to trigger a function when a database event occurs. However, it is important to secure the webhook endpoint to prevent abuse.
What is a webhook signature?
A webhook signature is a way to verify that the webhook request is coming from Supabase. It is a signature that is generated using a secret key and the request body. The signature is then sent along with the request as a header. The receiver can then verify the signature using the secret key and the request body.
How to setup webhook signature with Supabase?
1. Generate a secret key
First, we'll need a secret key to use to sign the webhook request. We can generate a secret key using uuid generator for example.
bash489afdea-a951-4202-bdac-b9402b28af20
2. Create secrets in Supabase Vault
Next, we'll create two secrets in Supabase Vault. One for the secret key and another for the URL of our webhook endpoint (to allow for different secrets/endpoints per environments):
sql-- You can use the following SQL to create the secrets SELECT vault.create_secret('https://myendpoint.com/supabase/events', 'WEBHOOK_URL', 'Webhook endpoint URL'); SELECT vault.create_secret('489afdea-a951-4202-bdac-b9402b28af20', 'WEBHOOK_SECRET', 'Webhook secret key');
3. Create a function to generate the signature
Next, we'll create a function to generate the signature. This function will take the request body as an argument, generate a signature using the secret key and encode using base64:
sqlCREATE OR REPLACE FUNCTION generate_hmac(secret_key text, message text) RETURNS text LANGUAGE plpgsql AS $$ DECLARE hmac_result bytea; BEGIN hmac_result := hmac(message::bytea, secret_key::bytea, 'sha256'); RETURN encode(hmac_result, 'base64'); END; $$;
4. Create a function to send the webhook with the signature
Once we have our function to generate signature, we can create another function to send the webhook request with the signature:
sqlCREATE OR REPLACE FUNCTION public.webhook() RETURNS trigger SET search_path = public SECURITY DEFINER LANGUAGE 'plpgsql' AS $$ DECLARE url text; secret text; payload jsonb; request_id bigint; signature text; BEGIN -- Get the webhook URL and secret from the vault SELECT decrypted_secret INTO url FROM vault.decrypted_secrets WHERE name = 'WEBHOOK_URL' LIMIT 1; SELECT decrypted_secret INTO secret FROM vault.decrypted_secrets WHERE name = 'WEBHOOK_SECRET' LIMIT 1; -- Generate the payload payload = jsonb_build_object( 'old_record', old, 'record', new, 'type', tg_op, 'table', tg_table_name, 'schema', tg_table_schema ); -- Generate the signature signature = generate_hmac(secret, 'message'); -- Send the webhook request SELECT http_post INTO request_id FROM net.http_post( url, payload, '{}', jsonb_build_object( 'Content-Type', 'application/json', 'X-Supabase-Signature', signature ), '1000' ); -- Insert the request ID into the Supabase hooks table INSERT INTO supabase_functions.hooks (hook_table_id, hook_name, request_id) VALUES (tg_relid, tg_name, request_id); RETURN new; END; $$;
5. Create a database trigger
Finally, we can create a database trigger to call our webhook function when a database event occurs. In the next example, we'll create a trigger to call our webhook function when a new row is inserted into the todos
table:
sqlCREATE OR REPLACE TRIGGER todos_webhook AFTER INSERT ON public.todos FOR EACH ROW EXECUTE FUNCTION webhook();
Now, every time a new row is inserted into the todos
table, our webhook function will be called and the webhook request will be sent with the signature.
6. Verify the signature in your webhook endpoint
Finally, we can verify the signature in our webhook endpoint. We can do this by comparing the signature in the X-Supabase-Signature
header with the signature generated using the secret key and the request body. In this example, we are using Nest.js and a guard, but you can use any framework you like:
typescriptimport { CanActivate, ExecutionContext, Injectable, Logger, } from "@nestjs/common"; import { ConfigService } from "@nestjs/config"; import { Observable } from "rxjs"; import * as crypto from "crypto"; import { Request } from "express"; @Injectable() export class SupabaseEventHandlerHeaderGuard implements CanActivate { private readonly logger = new Logger(SupabaseEventHandlerHeaderGuard.name); constructor(@Inject(ConfigService) private readonly config: ConfigService) {} canActivate( context: ExecutionContext ): boolean | Promise<boolean> | Observable<boolean> { const request = context.switchToHttp().getRequest<Request>(); const signature = request.headers["x-supabase-signature"]; const body = request?.rawBody; const decodedSignature = Buffer.from(signature, "base64"); const calculatedSignature = crypto .createHmac("sha256", this.config.get<string>("WEBHOOK_SECRET_KEY")) .update(body) .digest(); const hmacMatch = crypto.timingSafeEqual( decodedSignature, calculatedSignature ); if (!hmacMatch) { this.logger.warn("Request could not be authentified."); return false; } return true; } }
That's it! Now we have secure webhooks with Supabase.
- Supabase
- Webhooks
- Nest.js