Becoming an A
PI
• Security
• Performance
• Idempotence
Slide 21
Slide 21 text
SECURITY
Slide 22
Slide 22 text
USE HTTPS
Slide 23
Slide 23 text
WEBHOOK PROVIDERS
SIGN THEIR REQUESTS
Slide 24
Slide 24 text
VERIFY THE SIGNA
TURE
Slide 25
Slide 25 text
SOME WEBHOOK
PROVIDERS DON'
T SIGN
THEIR REQUESTS
Slide 26
Slide 26 text
¯
\_(
ツ
)_/¯
Slide 27
Slide 27 text
SHA
RE SECRETS
Slide 28
Slide 28 text
PERFORMA
NCE
Slide 29
Slide 29 text
BE GOOD TO YOURSELF
A
ND THE WEBHOOK
Slide 30
Slide 30 text
DELA
Y LONG RUNNING
TA
SKS
Slide 31
Slide 31 text
IDEMPOTENCE
Slide 32
Slide 32 text
F(
F(
X)) =
F(
X)
Slide 33
Slide 33 text
RETRIES A
RE
WONDERFUL BUT...
Slide 34
Slide 34 text
SENDING HUNDREDS OF
SMS IS NOT
Slide 35
Slide 35 text
Webhooks
• Use Webhooks instead of polling
• Use ngrok, or similar, for development
• Secure your Webhooks!
• Respond quickly to Webhooks
• Idempotence (idempotence, idempotence...)
Slide 36
Slide 36 text
Image credits
• Polling Station - secretlondon123
Slide 37
Slide 37 text
Help me!
On a scale of 0 to 10, how likely is it that you would
recommend this talk to a friend or colleague?
(+48) 732 483 234
Slide 38
Slide 38 text
Thanks!
@philnash
http://philna.sh
philnash@twilio.com
On a scale of 0 to 10, how likely is it that you
would recommend this talk to a friend or
colleague?
(+48) 732 483 234