Files
openclaw/docs/plugins/webhooks.md
Mariano ebad21c94d plugins: add bundled webhooks TaskFlow bridge (#61892)
Merged via squash.

Prepared head SHA: ca58fb77a8
Co-authored-by: mbelinky <132747814+mbelinky@users.noreply.github.com>
Co-authored-by: mbelinky <132747814+mbelinky@users.noreply.github.com>
Reviewed-by: @mbelinky
2026-04-06 15:59:47 +02:00

195 lines
4.2 KiB
Markdown

---
summary: "Webhooks plugin: authenticated TaskFlow ingress for trusted external automation"
read_when:
- You want to trigger or drive TaskFlows from an external system
- You are configuring the bundled webhooks plugin
title: "Webhooks Plugin"
---
# Webhooks (plugin)
The Webhooks plugin adds authenticated HTTP routes that bind external
automation to OpenClaw TaskFlows.
Use it when you want a trusted system such as Zapier, n8n, a CI job, or an
internal service to create and drive managed TaskFlows without writing a custom
plugin first.
## Where it runs
The Webhooks plugin runs inside the Gateway process.
If your Gateway runs on another machine, install and configure the plugin on
that Gateway host, then restart the Gateway.
## Configure routes
Set config under `plugins.entries.webhooks.config`:
```json5
{
plugins: {
entries: {
webhooks: {
enabled: true,
config: {
routes: {
zapier: {
path: "/plugins/webhooks/zapier",
sessionKey: "agent:main:main",
secret: {
source: "env",
provider: "default",
id: "OPENCLAW_WEBHOOK_SECRET",
},
controllerId: "webhooks/zapier",
description: "Zapier TaskFlow bridge",
},
},
},
},
},
},
}
```
Route fields:
- `enabled`: optional, defaults to `true`
- `path`: optional, defaults to `/plugins/webhooks/<routeId>`
- `sessionKey`: required session that owns the bound TaskFlows
- `secret`: required shared secret or SecretRef
- `controllerId`: optional controller id for created managed flows
- `description`: optional operator note
Supported `secret` inputs:
- Plain string
- SecretRef with `source: "env" | "file" | "exec"`
If a secret-backed route cannot resolve its secret at startup, the plugin skips
that route and logs a warning instead of exposing a broken endpoint.
## Security model
Each route is trusted to act with the TaskFlow authority of its configured
`sessionKey`.
This means the route can inspect and mutate TaskFlows owned by that session, so
you should:
- Use a strong unique secret per route
- Prefer secret references over inline plaintext secrets
- Bind routes to the narrowest session that fits the workflow
- Expose only the specific webhook path you need
The plugin applies:
- Shared-secret authentication
- Request body size and timeout guards
- Fixed-window rate limiting
- In-flight request limiting
- Owner-bound TaskFlow access through `api.runtime.taskFlow.bindSession(...)`
## Request format
Send `POST` requests with:
- `Content-Type: application/json`
- `Authorization: Bearer <secret>` or `x-openclaw-webhook-secret: <secret>`
Example:
```bash
curl -X POST https://gateway.example.com/plugins/webhooks/zapier \
-H 'Content-Type: application/json' \
-H 'Authorization: Bearer YOUR_SHARED_SECRET' \
-d '{"action":"create_flow","goal":"Review inbound queue"}'
```
## Supported actions
The plugin currently accepts these JSON `action` values:
- `create_flow`
- `get_flow`
- `list_flows`
- `find_latest_flow`
- `resolve_flow`
- `get_task_summary`
- `set_waiting`
- `resume_flow`
- `finish_flow`
- `fail_flow`
- `request_cancel`
- `cancel_flow`
- `run_task`
### `create_flow`
Creates a managed TaskFlow for the route's bound session.
Example:
```json
{
"action": "create_flow",
"goal": "Review inbound queue",
"status": "queued",
"notifyPolicy": "done_only"
}
```
### `run_task`
Creates a managed child task inside an existing managed TaskFlow.
Allowed runtimes are:
- `subagent`
- `acp`
Example:
```json
{
"action": "run_task",
"flowId": "flow_123",
"runtime": "acp",
"childSessionKey": "agent:main:acp:worker",
"task": "Inspect the next message batch"
}
```
## Response shape
Successful responses return:
```json
{
"ok": true,
"routeId": "zapier",
"result": {}
}
```
Rejected requests return:
```json
{
"ok": false,
"routeId": "zapier",
"code": "not_found",
"error": "TaskFlow not found.",
"result": {}
}
```
The plugin intentionally scrubs owner/session metadata from webhook responses.
## Related docs
- [Plugin runtime SDK](/plugins/sdk-runtime)
- [Hooks and webhooks overview](/automation/hooks)
- [CLI webhooks](/cli/webhooks)