Validate HMAC in Golang.
GitHub, Patreon and some other parties will use HMAC signing with their outgoing webhooks so that you can verify the webhook is from the expected sender.
A few of the notable dependents on this package, but there are many more:
HMAC uses a symmetric key that both sender/receiver share ahead of time. The sender will generate a hash when wanting to transmit a message - this data is sent along with the payload. The recipient will then sign payload with the shared key and if the hash matches then the payload is assumed to be from the sender.
import "github.com/alexellis/hmac"
...
var input []byte
var signature string
var secret string
valid := hmac.Validate(input, signature, secret)
fmt.Printf("Valid HMAC? %t\n")