Singapay Home Page
Logo Icon
  1. Webhooks
  2. Payment Link Transaction

Information

MethodPathFormatAuthentication
POSThttps://your-webhook-url/callbackjsonHMAC SHA512 Signature

This webhook sends a POST request to your configured transaction_notif_url when a Payment Link transaction is successfully processed.

Transaction Notification URL Configuration

The transaction_notif_url configuration can be accessed from the settings page as shown in the screenshot above.

Request Details

When a Payment Link transaction is completed, Singa Payment Gateway will send a webhook notification to your registered callback URL. The request includes security headers for verification.

Headers Structure

FieldValueTypeMandatoryLengthDescriptionExample
Content-Typeapplication/jsonAlphabeticMandatorySpecifies JSON format for the request bodyapplication/json
User-AgentSingaPaymentGateway/1.0AlphabeticMandatoryIdentifies the source of the webhookSingaPaymentGateway/1.0
X-SignatureAlphanumericOptional*128HMAC SHA512 signature for request verification (included when signature security is enabled)5f4dcc3b5aa765d61d8327deb882cf99…
X-TimestampNumericOptional*10Unix timestamp in seconds when the request was sent (included when signature security is enabled)1695711945
AuthorizationBearer <access_token>AlphanumericOptional*Bearer token for authentication (included when signature security is enabled)Bearer a1b2c3d4e5f6g7h8i9j0k1l2m3n4o5p6

* Note: Headers marked as “Optional” are included when you enable signature-based security. See the Security Mechanisms section below to understand the different security options available.


Body Structure

FieldTypeMandatoryLengthDescriptionExample
statusNumericMandatory3HTTP Status Code200
successBooleanMandatory1Indicates if the transaction was successfultrue
eventStringMandatory-Event type identifierpayment-link-transaction
timestampStringMandatory-Event timestamp in format “d M Y H:i:s”26 Dec 2025 14:30:45
dataObjectMandatory-Container for transaction, customer, and payment details-
> transactionObjectMandatory-Transaction details-
>> reff_noAlphanumericMandatory26Unique transaction reference number3211120250926133543246
>> typeStringMandatory-Transaction type (always “pl” for Payment Link)pl
>> statusStringMandatory-Transaction status (always “paid” for this webhook)paid
>> amountObjectMandatory-Transaction amount details-
>>> valueNumericMandatory-Transaction amount value100000
>>> currencyStringMandatory3Currency codeIDR
>> tipNullMandatory-Tip amount (always null for Payment Link)null
>> post_timestampStringMandatory-Transaction post time26 Dec 2025 14:30:43
>> processed_timestampStringMandatory-Transaction processed time26 Dec 2025 14:30:45
> customerObjectMandatory-Customer details (if provided during payment)-
>> idNullMandatory-Customer unique ID (always null for Payment Link)null
>> nameStringOptional-Customer name (if provided)John Doe
>> emailStringOptional-Customer email address (if provided)john@example.com
>> phoneStringOptional-Customer phone number (if provided)08123456789
> paymentObjectMandatory-Payment method details-
>> methodStringMandatory-Payment method (always “payment_link”)payment_link
>> additional_infoObjectMandatory-Payment method specific information-
>>> payment_linkObjectMandatory-Payment Link details-
>>>> idNumericMandatory-Payment Link ID123
>>>> reff_noAlphanumericMandatory26Payment Link reference numberPL3211120250926133543246
>>>> titleStringMandatory-Payment Link titleInvoice #INV-001
>>>> payment_dateStringOptional-Actual payment date2025-12-26 14:30:45
>>>> payment_urlStringMandatory-Payment Link URLhttps://pay.singapay.id/abc123
>>>> statusStringMandatory-Payment Link statusactive
>>>> required_customer_detailBooleanMandatory-Whether customer details are requiredtrue
>>>> max_usageNumericOptional-Maximum usage limit (null for unlimited)10
>>>> current_usageNumericMandatory-Current usage count5
>>>> expired_atStringOptional-Expiration date (null if no expiration)2025-12-31 23:59:59
>>>> total_amountNumericMandatory-Total amount for this Payment Link100000
>>>> account_idNumericMandatory-Associated account ID456
>>>> created_atStringMandatory-Payment Link creation date2025-12-20 10:00:00
>>>> updated_atStringMandatory-Last update date2025-12-26 14:30:45

Body Example

Success: Here’s an example of a successful webhook payload.

{
  "status": 200,
  "success": true,
  "event": "payment-link-transaction",
  "timestamp": "26 Dec 2025 14:30:45",
  "data": {
    "transaction": {
      "reff_no": "3211120250926133543246",
      "type": "pl",
      "status": "paid",
      "amount": {
        "value": 100000,
        "currency": "IDR"
      },
      "tip": null,
      "post_timestamp": "26 Dec 2025 14:30:43",
      "processed_timestamp": "26 Dec 2025 14:30:45"
    },
    "customer": {
      "id": null,
      "name": "John Doe",
      "email": "john@example.com",
      "phone": "08123456789"
    },
    "payment": {
      "method": "payment_link",
      "additional_info": {
        "payment_link": {
          "id": 123,
          "reff_no": "PL3211120250926133543246",
          "title": "Invoice #INV-001",
          "payment_date": "2025-12-26 14:30:45",
          "payment_url": "https://pay.singapay.id/abc123",
          "status": "active",
          "required_customer_detail": true,
          "max_usage": 10,
          "current_usage": 5,
          "expired_at": "2025-12-31 23:59:59",
          "total_amount": 100000,
          "account_id": 456,
          "created_at": "2025-12-20 10:00:00",
          "updated_at": "2025-12-26 14:30:45"
        }
      }
    }
  }
}

Security Mechanisms

Overview

To ensure the security and authenticity of webhook requests from Singa Payment Gateway, we provide two recommended security mechanisms. You can choose one or combine both for maximum protection.

Important Note: Signature validation is optional but highly recommended. You can secure your webhook endpoint using either IP whitelisting, signature validation, or both methods together.

Security Options

Option 1: IP Whitelist (Simpler Approach)

This is the simplest security method where you restrict webhook access to only authorized IP addresses from Singa Payment Gateway.

How it works:

  • Configure your firewall or application to only accept requests from specific IP addresses
  • Singa Payment Gateway will provide you with our official IP addresses
  • Any requests from unauthorized IPs will be automatically rejected

Pros:

  • ✅ Simple to implement
  • ✅ No complex cryptographic operations required
  • ✅ Works well for basic security needs

Cons:

  • ❌ Less secure if IP addresses are compromised
  • ❌ Requires manual updates if our IPs change
  • ❌ Cannot verify request integrity (body tampering)

Implementation Example (Nginx):

location /webhook/payment-link {
    # Only allow Singa Payment Gateway IPs
    allow 103.xxx.xxx.xxx;  # Replace with actual IPs from Singa
    allow 103.xxx.xxx.xxx;  # Replace with actual IPs from Singa
    deny all;

    proxy_pass http://your-backend;
}

Implementation Example (PHP):

<?php
// Define allowed IPs (get these from Singa Payment Gateway)
$allowedIPs = [
    '103.xxx.xxx.xxx',
    '103.xxx.xxx.xxx',
];

$requestIP = $_SERVER['REMOTE_ADDR'];

if (!in_array($requestIP, $allowedIPs)) {
    http_response_code(403);
    echo json_encode(['status' => 'error', 'message' => 'Access denied']);
    exit;
}

// Process webhook...
?>

This method uses cryptographic signatures to verify that:

  1. The request actually comes from Singa Payment Gateway
  2. The request body has not been tampered with during transmission

How it works:

  • Singa Payment Gateway signs each webhook request using HMAC-SHA512
  • You validate the signature using your Client Secret
  • Only requests with valid signatures are processed

Pros:

  • ✅ Highest security level
  • ✅ Verifies both authenticity and integrity
  • ✅ Protects against man-in-the-middle attacks
  • ✅ No dependency on IP addresses

Cons:

  • ❌ Requires implementation of signature validation logic
  • ❌ Slightly more complex to implement

When to use: Production environments, handling sensitive transactions, or when maximum security is required.

See the detailed implementation guide in the “How to Validate Signature” section below.

For production environments, we strongly recommend using both IP whitelisting and signature validation together.

Implementation order:

  1. First layer: Check IP whitelist (fast, blocks unauthorized IPs immediately)
  2. Second layer: Validate signature (ensures request integrity)

Benefits:

  • ✅ Defense in depth - multiple security layers
  • ✅ Protection against both unauthorized access and tampering
  • ✅ Industry best practice for webhook security

Example Implementation:

<?php
// Layer 1: IP Whitelist
$allowedIPs = ['103.xxx.xxx.xxx', '103.xxx.xxx.xxx'];
$requestIP = $_SERVER['REMOTE_ADDR'];

if (!in_array($requestIP, $allowedIPs)) {
    http_response_code(403);
    exit;
}

// Layer 2: Signature Validation
$requestBody = file_get_contents('php://input');
$headers = getallheaders();
$clientSecret = 'your-client-secret';
$endpoint = '/webhook/payment-link';

if (!validateWebhookSignature($requestBody, $headers, $clientSecret, $endpoint)) {
    http_response_code(401);
    exit;
}

// Both checks passed - process webhook
$payload = json_decode($requestBody, true);
// ... process transaction ...
?>

Which Option Should You Choose?

Recommended ApproachReason
IP Whitelist onlySimple to implement, easy to debug, suitable for testing environments
Signature validation onlyHigher security, good for testing signature implementation
IP Whitelist + SignatureMaximum security, industry best practice, recommended for production
IP Whitelist + Signature + Timestamp validationAdditional protection against replay attacks for high-security requirements

Getting Singa Payment Gateway IP Addresses

To implement IP whitelisting, contact our support team or check your merchant dashboard for the official list of Singa Payment Gateway IP addresses.

Note: We will notify you in advance if our IP addresses change.


Overview

The X-Signature header is a security mechanism that ensures the webhook request is authentic and comes from Singa Payment Gateway. This signature is generated using HMAC SHA512 algorithm.

Note: While signature validation is optional, we strongly recommend implementing it, especially for production environments, to ensure maximum security and data integrity.

Signature Algorithm: HMAC SHA512

The signature is created using a multi-step process that combines the request method, endpoint, access token, hashed body, and timestamp.

Step-by-Step Validation Guide

Step 1: Extract Headers

Extract the following headers from the incoming webhook request:

  • X-Signature - The signature to validate
  • X-Timestamp - Unix timestamp (in seconds)
  • Authorization - Bearer token (extract the token part)

Step 2: Get Your Client Secret

Retrieve your Client Secret from the merchant dashboard. This is the same secret used for API authentication and is required as the HMAC key for signature verification.

Important: The Client Secret must be kept secure and never exposed in client-side code or logs.

Step 3: Extract Endpoint Path

Extract the endpoint path from your webhook URL. For example:

  • Full URL: https://yourdomain.com/webhook/payment-link?param=value
  • Endpoint: /webhook/payment-link?param=value

The endpoint includes the path and any query parameters.

Step 4: Normalize and Hash the Request Body

The request body must be normalized before hashing to ensure consistent results:

  1. Parse JSON: Decode the JSON body into an object/array
  2. Sort Keys Recursively: Sort all object keys alphabetically at every level
  3. Re-encode JSON: Encode back to JSON with these flags:
    • JSON_UNESCAPED_UNICODE - Don’t escape Unicode characters
    • JSON_UNESCAPED_SLASHES - Don’t escape forward slashes
  4. Hash with SHA-256: Generate SHA-256 hash of the normalized JSON

Example:

Original JSON: {"status":200,"success":true,"data":{"transaction":{"reff_no":"123"}}}
After sorting: {"data":{"transaction":{"reff_no":"123"}},"status":200,"success":true}
SHA-256 Hash: 5f4dcc3b5aa765d61d8327deb882cf99acd3d28e5cf0e661c02c8e8e6e8e6f9a

Step 5: Build the String to Sign

Concatenate the following values with colon (:) as separator:

StringToSign = METHOD + ":" + ENDPOINT + ":" + ACCESS_TOKEN + ":" + HASHED_BODY + ":" + TIMESTAMP

Example:

Method:       POST
Endpoint:     /webhook/payment-link
Access Token: a1b2c3d4e5f6g7h8i9j0k1l2m3n4o5p6
Hashed Body:  5f4dcc3b5aa765d61d8327deb882cf99acd3d28e5cf0e661c02c8e8e6e8e6f9a
Timestamp:    1695711945

StringToSign = POST:/webhook/payment-link:a1b2c3d4e5f6g7h8i9j0k1l2m3n4o5p6:5f4dcc3b5aa765d61d8327deb882cf99acd3d28e5cf0e661c02c8e8e6e8e6f9a:1695711945

Step 6: Generate HMAC SHA512 Signature

Use your Client Secret as the HMAC key and hash the string to sign:

Calculated Signature = HMAC-SHA512(StringToSign, Client Secret)

Step 7: Compare Signatures

Compare the calculated signature with the signature from the X-Signature header using a constant-time comparison to prevent timing attacks.

Important: Use hash_equals() in PHP, crypto.timingSafeEqual() in Node.js, or hmac.compare_digest() in Python for secure comparison.

if (hash_equals($calculatedSignature, $receivedSignature)) {
    // Signature is valid - process webhook
} else {
    // Signature is invalid - reject request
}

Implementation Examples

PHP

<?php

/**
 * Validate webhook signature from Singa Payment Gateway
 */
function validateWebhookSignature($requestBody, $headers, $clientSecret, $endpoint) {
    // Step 1: Extract headers
    $receivedSignature = $headers['X-Signature'] ?? '';
    $timestamp = $headers['X-Timestamp'] ?? '';
    $authorization = $headers['Authorization'] ?? '';

    // Extract access token from "Bearer {token}"
    $accessToken = str_replace('Bearer ', '', $authorization);

    // Step 2: Normalize and hash the request body
    $bodyArray = json_decode($requestBody, true);

    if (json_last_error() !== JSON_ERROR_NONE) {
        return false; // Invalid JSON
    }

    // Sort keys recursively
    function sortRecursive(&$array) {
        ksort($array, SORT_STRING);
        foreach ($array as &$value) {
            if (is_array($value)) {
                sortRecursive($value);
            }
        }
    }

    sortRecursive($bodyArray);

    // Re-encode with specific flags
    $normalizedJson = json_encode($bodyArray, JSON_UNESCAPED_UNICODE | JSON_UNESCAPED_SLASHES);

    // Hash with SHA-256
    $hashedBody = hash('sha256', $normalizedJson);

    // Step 3: Build string to sign
    $method = 'POST'; // Webhooks always use POST
    $stringToSign = "{$method}:{$endpoint}:{$accessToken}:{$hashedBody}:{$timestamp}";

    // Step 4: Generate HMAC SHA512 signature
    $calculatedSignature = hash_hmac('sha512', $stringToSign, $clientSecret);

    // Step 5: Compare signatures using constant-time comparison
    return hash_equals($calculatedSignature, $receivedSignature);
}

// Usage example
$requestBody = file_get_contents('php://input');
$headers = getallheaders();
$clientSecret = 'your-client-secret-from-dashboard'; // Get from merchant dashboard
$endpoint = '/webhook/payment-link'; // Your webhook endpoint path

if (validateWebhookSignature($requestBody, $headers, $clientSecret, $endpoint)) {
    // Signature is valid - process webhook
    $payload = json_decode($requestBody, true);

    // Process the transaction
    $reffNo = $payload['data']['transaction']['reff_no'];
    $amount = $payload['data']['transaction']['amount']['value'];
    $paymentLinkId = $payload['data']['payment']['additional_info']['payment_link']['id'];
    $customerName = $payload['data']['customer']['name'] ?? 'Guest';

    // Update your database, send notifications, etc.

    // Return success response
    http_response_code(200);
    echo json_encode(['status' => 'success']);
} else {
    // Signature is invalid - reject request
    http_response_code(401);
    echo json_encode(['status' => 'error', 'message' => 'Invalid signature']);
}
?>

Python

import hmac
import hashlib
import json
from flask import Flask, request, jsonify

app = Flask(__name__)

def sort_dict_recursive(data):
    """Recursively sort dictionary keys"""
    if isinstance(data, dict):
        return {k: sort_dict_recursive(v) for k, v in sorted(data.items())}
    elif isinstance(data, list):
        return [sort_dict_recursive(item) for item in data]
    else:
        return data

def validate_webhook_signature(request_body, headers, client_secret, endpoint):
    """Validate webhook signature from Singa Payment Gateway"""

    # Step 1: Extract headers
    received_signature = headers.get('X-Signature', '')
    timestamp = headers.get('X-Timestamp', '')
    authorization = headers.get('Authorization', '')

    # Extract access token from "Bearer {token}"
    access_token = authorization.replace('Bearer ', '')

    # Step 2: Parse and normalize JSON
    try:
        body_dict = json.loads(request_body)
    except json.JSONDecodeError:
        return False

    # Sort keys recursively
    sorted_body = sort_dict_recursive(body_dict)

    # Re-encode with specific settings
    normalized_json = json.dumps(sorted_body, ensure_ascii=False, separators=(',', ':'))

    # Hash with SHA-256
    hashed_body = hashlib.sha256(normalized_json.encode('utf-8')).hexdigest()

    # Step 3: Build string to sign
    method = 'POST'  # Webhooks always use POST
    string_to_sign = f"{method}:{endpoint}:{access_token}:{hashed_body}:{timestamp}"

    # Step 4: Generate HMAC SHA512 signature
    calculated_signature = hmac.new(
        client_secret.encode('utf-8'),
        string_to_sign.encode('utf-8'),
        hashlib.sha512
    ).hexdigest()

    # Step 5: Compare signatures using constant-time comparison
    return hmac.compare_digest(calculated_signature, received_signature)

@app.route('/webhook/payment-link', methods=['POST'])
def webhook_payment_link():
    """Handle Payment Link transaction webhook"""

    request_body = request.get_data(as_text=True)
    headers = dict(request.headers)
    client_secret = 'your-client-secret-from-dashboard'  # Get from merchant dashboard
    endpoint = '/webhook/payment-link'  # Your webhook endpoint path

    if validate_webhook_signature(request_body, headers, client_secret, endpoint):
        # Signature is valid - process webhook
        payload = json.loads(request_body)

        # Process the transaction
        reff_no = payload['data']['transaction']['reff_no']
        amount = payload['data']['transaction']['amount']['value']
        payment_link_id = payload['data']['payment']['additional_info']['payment_link']['id']
        customer_name = payload['data']['customer'].get('name', 'Guest')

        # Update your database, send notifications, etc.

        # Return success response
        return jsonify({'status': 'success'}), 200
    else:
        # Signature is invalid - reject request
        return jsonify({'status': 'error', 'message': 'Invalid signature'}), 401

if __name__ == '__main__':
    app.run(port=3000)

JavaScript (Node.js with Express)

const express = require('express');
const crypto = require('crypto');

const app = express();

// Middleware to capture raw body for signature validation
app.use(express.json({
    verify: (req, res, buf) => {
        req.rawBody = buf.toString('utf8');
    }
}));

/**
 * Recursively sort object keys
 */
function sortObjectRecursive(obj) {
    if (typeof obj !== 'object' || obj === null) {
        return obj;
    }

    if (Array.isArray(obj)) {
        return obj.map(sortObjectRecursive);
    }

    const sorted = {};
    Object.keys(obj).sort().forEach(key => {
        sorted[key] = sortObjectRecursive(obj[key]);
    });

    return sorted;
}

/**
 * Validate webhook signature from Singa Payment Gateway
 */
function validateWebhookSignature(requestBody, headers, clientSecret, endpoint) {
    // Step 1: Extract headers
    const receivedSignature = headers['x-signature'] || '';
    const timestamp = headers['x-timestamp'] || '';
    const authorization = headers['authorization'] || '';

    // Extract access token from "Bearer {token}"
    const accessToken = authorization.replace('Bearer ', '');

    // Step 2: Parse and normalize JSON
    let bodyObject;
    try {
        bodyObject = JSON.parse(requestBody);
    } catch (e) {
        return false; // Invalid JSON
    }

    // Sort keys recursively
    const sortedBody = sortObjectRecursive(bodyObject);

    // Re-encode JSON (no escaping for unicode and slashes)
    const normalizedJson = JSON.stringify(sortedBody);

    // Hash with SHA-256
    const hashedBody = crypto
        .createHash('sha256')
        .update(normalizedJson)
        .digest('hex');

    // Step 3: Build string to sign
    const method = 'POST'; // Webhooks always use POST
    const stringToSign = `${method}:${endpoint}:${accessToken}:${hashedBody}:${timestamp}`;

    // Step 4: Generate HMAC SHA512 signature
    const calculatedSignature = crypto
        .createHmac('sha512', clientSecret)
        .update(stringToSign)
        .digest('hex');

    // Step 5: Compare signatures using constant-time comparison
    return crypto.timingSafeEqual(
        Buffer.from(calculatedSignature),
        Buffer.from(receivedSignature)
    );
}

// Webhook endpoint
app.post('/webhook/payment-link', (req, res) => {
    const requestBody = req.rawBody;
    const headers = req.headers;
    const clientSecret = 'your-client-secret-from-dashboard'; // Get from merchant dashboard
    const endpoint = '/webhook/payment-link'; // Your webhook endpoint path

    if (validateWebhookSignature(requestBody, headers, clientSecret, endpoint)) {
        // Signature is valid - process webhook
        const payload = req.body;

        // Process the transaction
        const reffNo = payload.data.transaction.reff_no;
        const amount = payload.data.transaction.amount.value;
        const paymentLinkId = payload.data.payment.additional_info.payment_link.id;
        const customerName = payload.data.customer.name || 'Guest';

        // Update your database, send notifications, etc.

        // Return success response
        res.status(200).json({ status: 'success' });
    } else {
        // Signature is invalid - reject request
        res.status(401).json({ status: 'error', message: 'Invalid signature' });
    }
});

app.listen(3000, () => {
    console.log('Webhook server running on port 3000');
});

Important Notes

Best Practices

  • Always validate signatures: Never process webhook requests without validating the signature first
  • Use constant-time comparison: Prevents timing attacks (use hash_equals(), crypto.timingSafeEqual(), or hmac.compare_digest())
  • Validate timestamp: Check that the timestamp is recent (within 5 minutes) to prevent replay attacks
  • Preserve raw body: Don’t parse the JSON before validation - use the raw request body for hashing
  • Case sensitivity: The signature is case-sensitive (lowercase hex)
  • Character encoding: Use UTF-8 encoding for all strings
  • HMAC key: Always use your client_secret as the HMAC key
  • Secure storage: Store your Client Secret securely (environment variables, secure vault)
  • HTTPS only: Always use HTTPS for your webhook endpoints

Common Mistakes to Avoid

  • ❌ Not sorting JSON keys before hashing (order matters!)
  • ❌ Using wrong hash algorithm (must use SHA-256 for body, SHA-512 for signature)
  • ❌ Wrong separator in string to sign (must use :, not _ or -)
  • ❌ Using API Key instead of Client Secret
  • ❌ Not preserving raw request body (parsing JSON before validation)
  • ❌ Using simple string comparison instead of constant-time comparison
  • ❌ Wrong order in string to sign (must be: METHOD:ENDPOINT:TOKEN:HASH:TIMESTAMP)
  • ❌ Forgetting to extract Bearer token from Authorization header
  • ❌ Not including query parameters in endpoint path
  • ❌ Processing webhook without validating signature first

Troubleshooting

If signature validation fails:

  1. Check string to sign format: Must be METHOD:ENDPOINT:ACCESS_TOKEN:HASHED_BODY:TIMESTAMP
  2. Verify JSON normalization: Keys must be sorted recursively, use correct JSON encoding flags
  3. Check hash algorithm: SHA-256 for body hash, SHA-512 for HMAC signature
  4. Verify HMAC key: Must use Client Secret (not API Key)
  5. Check endpoint path: Must match exactly including query parameters
  6. Verify timestamp: Should be a valid Unix timestamp in seconds
  7. Check access token: Extract correctly from Authorization header (remove “Bearer ” prefix)
  8. Log values for debugging: Log stringToSign, hashedBody, and calculatedSignature (in development only)

Security Considerations

  • Prevent replay attacks: Validate that X-Timestamp is recent (within 5 minutes of current time)
  • Use HTTPS: Always use HTTPS for webhook endpoints to prevent man-in-the-middle attacks
  • Rate limiting: Implement rate limiting on webhook endpoints
  • IP whitelisting: Consider whitelisting Singa Payment Gateway IP addresses
  • Error handling: Don’t expose detailed error messages to webhook sender
  • Idempotency: Handle duplicate webhooks gracefully (use reff_no to detect duplicates)
  • Logging: Log all webhook requests (with signatures removed) for audit purposes

Response Requirements

Your webhook endpoint must return an appropriate HTTP response:

Success Response

When the webhook is processed successfully:

Status Code: 200 OK

{
  "status": "success"
}

Error Responses

Invalid Signature (401 Unauthorized):

{
  "status": "error",
  "message": "Invalid signature"
}

Processing Error (500 Internal Server Error):

{
  "status": "error",
  "message": "Failed to process webhook"
}

Important: Singa Payment Gateway will retry failed webhooks (non-200 responses) up to 3 times with exponential backoff.

Customer Data

Customer information (name, email, phone) in the webhook payload depends on your Payment Link configuration:

  • If required_customer_detail is true: Customer must provide their details before payment, and these will be included in the webhook
  • If required_customer_detail is false: Customer details may be null or omitted

Important: Always check if customer fields exist before using them in your code:

// PHP example
$customerName = $payload['data']['customer']['name'] ?? 'Guest';
$customerEmail = $payload['data']['customer']['email'] ?? null;
// JavaScript example
const customerName = payload.data.customer.name || 'Guest';
const customerEmail = payload.data.customer.email || null;

The payment_link object in additional_info contains the complete Payment Link details at the time of payment. You can use this to:

  • Track payment link usage (current_usage vs max_usage)
  • Check if the payment link has reached its limit
  • Verify expiration status
  • Match the payment to the original payment link in your system using payment_link.reff_no or payment_link.id

Usage Tracking

After each successful payment:

  • current_usage is automatically incremented
  • If current_usage reaches max_usage, the payment link becomes inactive
  • The webhook includes the updated current_usage value

Example - Check if payment link is at capacity:

$paymentLink = $payload['data']['payment']['additional_info']['payment_link'];

if ($paymentLink['max_usage'] !== null &&
    $paymentLink['current_usage'] >= $paymentLink['max_usage']) {
    // Payment link has reached maximum usage
    // Consider deactivating it in your system
}