1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117
|
package main
import (
"encoding/json"
"errors"
"fmt"
"io"
"log"
"net/http"
"strings"
"gitlab.com/gitlab-org/api/client-go"
)
// webhook is a HTTP Handler for Gitlab Webhook events.
type webhook struct {
Secret string
EventsToAccept []gitlab.EventType
}
// webhookExample shows how to create a Webhook server to parse Gitlab events.
func webhookExample() {
wh := webhook{
Secret: "your-gitlab-secret",
EventsToAccept: []gitlab.EventType{gitlab.EventTypeMergeRequest, gitlab.EventTypePipeline},
}
mux := http.NewServeMux()
mux.Handle("/webhook", wh)
if err := http.ListenAndServe("0.0.0.0:8080", mux); err != nil {
log.Fatalf("HTTP server ListenAndServe: %v", err)
}
}
// ServeHTTP tries to parse Gitlab events sent and calls handle function
// with the successfully parsed events.
func (hook webhook) ServeHTTP(writer http.ResponseWriter, request *http.Request) {
event, err := hook.parse(request)
if err != nil {
writer.WriteHeader(500)
fmt.Fprintf(writer, "could parse the webhook event: %v", err)
return
}
// Handle the event before we return.
if err := hook.handle(event); err != nil {
writer.WriteHeader(500)
fmt.Fprintf(writer, "error handling the event: %v", err)
return
}
// Write a response when were done.
writer.WriteHeader(204)
}
func (hook webhook) handle(event interface{}) error {
str, err := json.Marshal(event)
if err != nil {
return fmt.Errorf("could not marshal json event for logging: %v", err)
}
// Just write the event for this example.
fmt.Println(string(str))
return nil
}
// parse verifies and parses the events specified in the request and
// returns the parsed event or an error.
func (hook webhook) parse(r *http.Request) (interface{}, error) {
defer func() {
if _, err := io.Copy(io.Discard, r.Body); err != nil {
log.Printf("could discard request body: %v", err)
}
if err := r.Body.Close(); err != nil {
log.Printf("could not close request body: %v", err)
}
}()
if r.Method != http.MethodPost {
return nil, errors.New("invalid HTTP Method")
}
// If we have a secret set, we should check if the request matches it.
if len(hook.Secret) > 0 {
signature := r.Header.Get("X-Gitlab-Token")
if signature != hook.Secret {
return nil, errors.New("token validation failed")
}
}
event := r.Header.Get("X-Gitlab-Event")
if strings.TrimSpace(event) == "" {
return nil, errors.New("missing X-Gitlab-Event Header")
}
eventType := gitlab.EventType(event)
if !isEventSubscribed(eventType, hook.EventsToAccept) {
return nil, errors.New("event not defined to be parsed")
}
payload, err := io.ReadAll(r.Body)
if err != nil || len(payload) == 0 {
return nil, errors.New("error reading request body")
}
return gitlab.ParseWebhook(eventType, payload)
}
func isEventSubscribed(event gitlab.EventType, events []gitlab.EventType) bool {
for _, e := range events {
if event == e {
return true
}
}
return false
}
|