Gosmee
Command line server and client for webhooks deliveries (and https://smee.io)
Install / Use
/learn @chmouel/GosmeeREADME
gosmee - A webhook forwarder, relayer, and replayer
<img align="right" alt="gosmee logo" src="https://github.com/user-attachments/assets/f032b06f-480b-4a47-9fe3-2e350adf98fb" width="120">Gosmee is a webhook relayer that runs anywhere with ease. It also serves as a GitHub Hooks replayer using the GitHub API.
Description
Gosmee enables you to relay webhooks from itself (as a server) or from https://smee.io to your local laptop or infrastructure hidden from the public internet.
It makes exposing services on your local network (like localhost) or behind a VPN quite straightforward. This allows public services, such as GitHub, to push webhooks directly to your local environment.
Here's how it works:
- Configure your webhook to send events to a https://smee.io/ URL or to your publicly accessible Gosmee server.
- Run the Gosmee client on your local machine to fetch these events and forward them to your local service.
This creates a proper bridge between GitHub webhooks and your local development environment.
Alternatively, if you'd rather not use a relay server, you can use the GitHub API to replay webhook deliveries directly. (beta)
Diagram
For those who prefer a visual explanation of how gosmee works:
Simple

Detailed
sequenceDiagram
participant SP as Service Provider (e.g., GitHub)
participant GS as Gosmee Server (Public URL / smee.io)
participant GC as Gosmee Client (Local / Private Network)
participant LS as Local Service (e.g., localhost:3000)
Note over GC, LS: Runs in private network/local machine
Note over SP, GS: Accessible on the public internet
GC->>+GS: 1. Connect & Listen via SSE
SP->>+GS: 2. Event triggers -> Sends Webhook Payload (HTTP POST)
GS->>-GC: 3. Relays Webhook Payload (via SSE connection)
GC->>+LS: 4. Forwards Webhook Payload (HTTP POST)
LS-->>-GC: 5. (Optional) HTTP Response
GS-->>-SP: 6. (Optional) HTTP Response (e.g., 200 OK)
Blog Post
Learn more about the background and features of this project in this blog post: https://blog.chmouel.com/posts/gosmee-webhook-forwarder-relayer
Screenshot

Live Event Feed
The web interface of the gosmee server features a live event feed that shows webhook events in real-time:
- Live status indicator showing connection state
- Event counter showing number of received events
- JSON tree viewer for easy payload inspection
- Copy buttons for headers and payloads
- Replay functionality to resend events to your endpoint
- Clear button to remove all events from the feed
Each event in the feed shows:
- Event ID and timestamp
- Headers with copy functionality
- Payload in both tree view and raw JSON formats
- Option to replay individual events
Installation
Release
Please visit the release page and choose the appropriate archive or package for your platform.
Homebrew
brew tap chmouel/gosmee https://github.com/chmouel/gosmee
brew install gosmee
Arch
yay -S gosmee-bin
Docker
Gosmee client with Docker
docker run ghcr.io/chmouel/gosmee:latest
Gosmee server with Docker
docker run -d -p 3026:3026 --restart always --name example.org ghcr.io/chmouel/gosmee:latest server --port 3026 --address 0.0.0.0 --public-url https://example.org
GO
go install -v github.com/chmouel/gosmee@latest
Git
Clone the repository and use:
-$ make build
-$ ./bin/gosmee --help
Nix/NixOS
Gosmee is available from nixpkgs.
nix-env -iA gosmee
nix run nixpkgs#gosmee -- --help # your args are here
System Services
System service example files for macOS and Linux are available in the misc directory.
Kubernetes
You can deploy gosmee on Kubernetes to relay webhooks to your internal services.
Two deployment configurations are available:
- gosmee-server-deployment.yaml - For deploying the public-facing server component
- gosmee-client-deployment.yaml - For deploying the client component that forwards to internal services
Server Deployment
The server deployment exposes a public webhook endpoint to receive incoming webhook events:
kubectl apply -f misc/gosmee-server-deployment.yaml
Key configuration:
- Set
--public-urlto your actual domain where the service will be exposed - Configure an Ingress with TLS or use a service mesh for production use
- For security, consider using
--webhook-signatureand--allowed-ipsoptions
Client Deployment
The client deployment connects to a gosmee server (either your own or smee.io) and forwards webhook events to internal services:
kubectl apply -f misc/gosmee-client-deployment.yaml
Key configuration:
- Adjust the first argument to your gosmee server URL or smee.io channel
- Change the second argument to your internal service URL (e.g.,
http://service.namespace:8080) - The
--saveDirflag enables saving webhook payloads to/tmp/savefor later inspection
For detailed configuration options, please refer to the documentation comments in each deployment file.
Shell completion
Shell completions are available for gosmee:
# BASH
source <(gosmee completion bash)
# ZSH
source <(gosmee completion zsh)
Usage
Client
If you plan to use the https://smee.io service, you can generate your own smee URL by visiting https://smee.io/new.
If you want to use the https://hook.pipelinesascode.com service then you can directly generate a URL with the -u / --new-url flag.
Once you have the relay URL, the basic usage is:
gosmee client https://smee.io/aBcDeF https://localhost:8080
This command will relay all payloads received by the smee URL to a service running on http://localhost:8080.
You can also save all relays as shell scripts for easy replay:
gosmee client --saveDir /tmp/savedreplay https://smee.io/aBcDeF https://localhost:8080
This command saves the JSON data of new payloads to /tmp/savedreplay/timestamp.json and creates shell scripts with cURL options at /tmp/savedreplay/timestamp.sh. Replay webhooks easily by running these scripts.
You can configure the SSE client buffer size (in bytes) with the --sse-buffer-size flag. The default is 1048576 (1MB).
Protected channels
Protected channels are optional and only apply to channel IDs listed in the server's --encrypted-channels-file.
Plaintext gosmee channels still work without a key file:
gosmee client https://myserverurl/plain-channel https://localhost:8080
When connecting to a protected channel on your own gosmee server, the client must use a pre-generated keypair file. There is no client-side auto-generation during gosmee client startup.
Generate a keypair once:
gosmee keygen --key-file ~/.config/gosmee/client-key.json
This writes the private key file and prints the corresponding public key to stdout. Add that public key to the server's protected-channel config.
Then connect with the key file:
gosmee client --encryption-key-file ~/.config/gosmee/client-key.json https://myserverurl/CHANNEL_ID https://localhost:8080
Notes:
- This protected-channel flow only works with gosmee's own SSE endpoint.
https://smee.iodoes not use client keys. - For gosmee channels that are not listed in
--encrypted-channels-file,--encryption-key-fileis not needed and payloads stay plaintext. - Payloads are encrypted from the gosmee server to authorized clients. The gosmee server still sees plaintext when it receives the webhook.
- Saved payloads from
--saveDirare written after decryption on the client side.
For those who prefer HTTPie over cURL, you can generate HTTPie-based replay scripts:
gosmee client --httpie --saveDir /tmp/savedreplay https://smee.io/aBcDeF https://localhost:8080
This will create replay scripts that use the http command instead of curl. The generated scripts support the same features as cURL scripts; the output will be rather nicer and presented in colour.
You can ignore certain events (identified by GitLab/GitHub/Bitbucket) with one or more --ignore-event flags.
If you only want to save payloads without replaying them, use --noReplay.
By default, you'll get colourful output unless you specify --nocolor.
Output logs as JSON with --output json (which implies --nocolor).
Executing commands on webhook events
You can execute a shell command whenever a webhook event is received using --exec:
gosmee client --exec 'jq . $GOSMEE_PAYLOAD_FILE' https://smee.io/aBcDeF http://localhost:8080
The payload and headers are written to temporary files (automatically cleaned up after the command finishes). The following environment variables are set:
| Variable | Description |
|---|---|
| GOSMEE_EVENT_TYPE | The event type (e.g., push, pull_request) |
| GOSMEE_EVENT_ID | The delivery ID |
| GOSMEE_CONTENT_TYPE | The content type of the payload |
| GOSMEE_TIMESTAMP | The timestamp of the event |
| GOSMEE_PAYLOAD_FILE | Path to a temporary file containing the JSON payload body |
| GOSMEE_HEADERS_FILE | Path to a temporary file containing the webhook headers as JSON |
To only run the command for specific event types, use --exec-on-events:
gosmee client --exec './handle-push.sh' --exec-on-events push --exec-on-events pull_request https://smee.io/aBcDeF http://localhost:8080
The --exec command runs synchronously after the webhook is forwarded to the target URL (if replay is enabled). A slow command will delay processing of subsequent events. If you nee
