1
0
mirror of https://github.com/goreleaser/goreleaser.git synced 2025-01-20 03:59:26 +02:00
Carlos Alexandro Becker ec2db4a727
feat!: rename module to /v2 (#4894)
<!--

Hi, thanks for contributing!

Please make sure you read our CONTRIBUTING guide.

Also, add tests and the respective documentation changes as well.

-->


<!-- If applied, this commit will... -->

...

<!-- Why is this change being made? -->

...

<!-- # Provide links to any relevant tickets, URLs or other resources
-->

...

---------

Signed-off-by: Carlos Alexandro Becker <caarlos0@users.noreply.github.com>
2024-05-26 15:02:57 -03:00

120 lines
3.4 KiB
Go

package webhook
import (
"crypto/tls"
"errors"
"fmt"
"io"
"net/http"
"net/url"
"strings"
"github.com/caarlos0/env/v11"
"github.com/caarlos0/log"
"github.com/goreleaser/goreleaser/v2/internal/tmpl"
"github.com/goreleaser/goreleaser/v2/pkg/context"
)
const (
defaultMessageTemplate = `{ "message": "{{ .ProjectName }} {{ .Tag }} is out! Check it out at {{ .ReleaseURL }}"}`
ContentTypeHeaderKey = "Content-Type"
UserAgentHeaderKey = "User-Agent"
UserAgentHeaderValue = "goreleaser"
AuthorizationHeaderKey = "Authorization"
DefaultContentType = "application/json; charset=utf-8"
)
type Pipe struct{}
func (Pipe) String() string { return "webhook" }
func (Pipe) Skip(ctx *context.Context) bool { return !ctx.Config.Announce.Webhook.Enabled }
type Config struct {
BasicAuthHeader string `env:"BASIC_AUTH_HEADER_VALUE"`
BearerTokenHeader string `env:"BEARER_TOKEN_HEADER_VALUE"`
}
func (p Pipe) Default(ctx *context.Context) error {
if ctx.Config.Announce.Webhook.MessageTemplate == "" {
ctx.Config.Announce.Webhook.MessageTemplate = defaultMessageTemplate
}
if ctx.Config.Announce.Webhook.ContentType == "" {
ctx.Config.Announce.Webhook.ContentType = DefaultContentType
}
return nil
}
func (p Pipe) Announce(ctx *context.Context) error {
cfg, err := env.ParseAs[Config]()
if err != nil {
return fmt.Errorf("webhook: %w", err)
}
endpointURLConfig, err := tmpl.New(ctx).Apply(ctx.Config.Announce.Webhook.EndpointURL)
if err != nil {
return fmt.Errorf("webhook: %w", err)
}
if len(endpointURLConfig) == 0 {
return errors.New("webhook: no endpoint url")
}
if _, err := url.ParseRequestURI(endpointURLConfig); err != nil {
return fmt.Errorf("webhook: %w", err)
}
endpointURL, err := url.Parse(endpointURLConfig)
if err != nil {
return fmt.Errorf("webhook: %w", err)
}
msg, err := tmpl.New(ctx).Apply(ctx.Config.Announce.Webhook.MessageTemplate)
if err != nil {
return fmt.Errorf("webhook: %w", err)
}
log.Infof("posting: '%s'", msg)
customTransport := http.DefaultTransport.(*http.Transport).Clone()
customTransport.TLSClientConfig = &tls.Config{
InsecureSkipVerify: ctx.Config.Announce.Webhook.SkipTLSVerify,
}
client := &http.Client{
Transport: customTransport,
}
req, err := http.NewRequest(http.MethodPost, endpointURL.String(), strings.NewReader(msg))
if err != nil {
return fmt.Errorf("webhook: %w", err)
}
req.Header.Add(ContentTypeHeaderKey, ctx.Config.Announce.Webhook.ContentType)
req.Header.Add(UserAgentHeaderKey, UserAgentHeaderValue)
if cfg.BasicAuthHeader != "" {
log.Debugf("set basic auth header")
req.Header.Add(AuthorizationHeaderKey, cfg.BasicAuthHeader)
} else if cfg.BearerTokenHeader != "" {
log.Debugf("set bearer token header")
req.Header.Add(AuthorizationHeaderKey, cfg.BearerTokenHeader)
}
for key, value := range ctx.Config.Announce.Webhook.Headers {
log.Debugf("Header Key %s / Value %s", key, value)
req.Header.Add(key, value)
}
resp, err := client.Do(req)
if err != nil {
return fmt.Errorf("webhook: %w", err)
}
defer resp.Body.Close()
switch resp.StatusCode {
case http.StatusOK, http.StatusCreated, http.StatusAccepted, http.StatusNoContent:
log.Infof("Post OK: '%v'", resp.StatusCode)
body, _ := io.ReadAll(resp.Body)
log.Infof("Response : %v\n", string(body))
return nil
default:
return fmt.Errorf("request failed with status %v", resp.Status)
}
}