AltDentifier is able to send webhooks to a server controlled by you for sharing verification status!
Authorization
AltDentifier will send a HMAC hexdigest using your server's signature as key and the stringified payload as it's body. Make sure to not share your signature. If you happen to do so accidentally, make sure to regenerate the signature.
Python Example:
import hmacimport jsontoken = request.headers.get('Digest').split(=",1)[1]new_digest = hmac.new(key=b'yourkeyhere', msg=request.data).hexdigest()comparison = hmac.compare_digest(token, new_digest)# NOTE: Never use new_digest == token as your comparision.
Note: Webhooks will be sent using a proxy. Do not rely on IP Addresses for verification.
Webhook
POSThttps://yourserver.com/webhook
An example of the webhook AltDentifier will generate
"steam": Steam Verification
"reddit": Reddit Verification
"twitter": Twitter Verification
"overwatch": Overwatch Verification
"captcha": "Google Captcha Verification"
"xbox": "Xbox Live Verification"
"youtube": "YouTube Verification"
"bypass": "A moderator allowed the user to skip verification
Timeout Actions
"kick": "Member will be kicked from the server by AltDentifier"
"ban": "Member will be banned from the server by AltDentifier"
"role": "Member will be given the timeout role by AltDentifier"
"nothing": "AltDentifier will take no action"
keyId="hmac-key-1",algorithm="hmac-md5","signature"=Base64(HMAC-MD5(signing string))
See https://tools.ietf.org/id/draft-cavage-http-signatures-07.html for more information
member
object
Member object of the user being verified.
incorrect_account
string
Member object of the account the user attempted to verify with. Only sent with OP 4
reason
string
Reason for verification failing. Only sent with OP 2.
method
string
Verification method used. Only sent with OP 1 and 2.
timeout_role
string
Timeout role. Only sent with OP 3 if action is "timeout"
action
string
Timeout action taken. Only sent with OP 3.
OP
integer
The OP code for this webhook. See above for more info