HTTP Request Trigger
The HTTP Request trigger automatically creates a custom endpoint that accepts HTTP POST requests to trigger your flow. This is perfect for integrating QuivaWorks flows with your application, external services, or any system that can make HTTP requests. When you add an HTTP Request trigger, QuivaWorks automatically generates a unique endpoint URL. You can then send JSON data to this endpoint from anywhere.How It Works
Add the trigger to your flow, and QuivaWorks generates a unique endpoint. Make an HTTP POST request from your application. Your flow receives the request data and executes all steps. The endpoint returns a response based on your configuration.Configuration
Endpoint URL
When you add the trigger, QuivaWorks automatically generates a unique endpoint URL. Click “Copy Endpoint URL” in the trigger configuration. Use this URL in your application code. The URL is stable and doesn’t change unless you regenerate it.Request Method
HTTP Request triggers only accept POST requests with JSON body. POST can send complex data structures and is the standard for triggering actions. GET, PUT, PATCH, and DELETE methods are not supported.Request Body
The request body must be valid JSON. All fields are available under$.trigger in your flow.
Example request:
Response Mode
Choose between synchronous and asynchronous execution. Wait for Completion (Synchronous): The endpoint waits for the entire flow to complete before responding. Best for API integrations needing immediate results, workflows under 30 seconds, and when caller needs response data. Response includes status, execution ID, results, and execution time. Requests timeout after 30 seconds. Use background mode for longer flows. Run in Background (Asynchronous): The endpoint responds immediately and the flow runs in the background. Best for long-running processes over 10 seconds, webhook handlers, and fire-and-forget operations. Response includes execution ID for tracking and immediate acknowledgment.Security
Public Access
By default, HTTP Request triggers are public and don’t require authentication. Use for internal services within secure network, testing and development, or low-risk operations. Public endpoints should be used carefully. Consider rate limiting and monitoring for production use.API Key Authentication
Enable API key authentication to secure your endpoint. Toggle “Secure with API Key” in trigger configuration. Click “Generate API Key” to create a unique key for this endpoint. Include the API key in the Authorization header:Use Cases
Backend Integration
Trigger flows from your application backend:Frontend Integration
Call flows from your frontend application. For frontend calls, either use public endpoints for non-sensitive operations, or proxy through your backend to keep API keys secure.Request Examples
Basic Request:Response Format
Synchronous Success:- 200 OK: Success (sync mode)
- 202 Accepted: Queued (async mode)
- 400 Bad Request: Invalid request data
- 401 Unauthorized: Invalid API key
- 404 Not Found: Flow not found
- 429 Too Many Requests: Rate limit exceeded
- 500 Internal Server Error: Server error
- 504 Gateway Timeout: Request timed out
Testing
Enable Test Mode in the trigger configuration. Copy the test endpoint URL. Send test request using curl, Postman, or your preferred tool. View execution in flow logs.Best Practices
Security:- Enable API key authentication for all production endpoints
- Store keys in secure environment variables
- Use different keys for dev, staging, and production
- Rotate keys regularly
- Monitor for unauthorized access