Skip to content

Commit fa73dd8

Browse files
committed
add http trigger guides
1 parent 29794e4 commit fa73dd8

File tree

2 files changed

+4
-6
lines changed

2 files changed

+4
-6
lines changed

src/content/cre/guides/workflow/using-triggers/http-trigger/overview-go.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,11 @@ The HTTP trigger allows external systems to initiate your workflow execution by
1818

1919
When you deploy a workflow with an HTTP trigger:
2020

21-
1. **Your workflow receives a unique endpoint** managed by the CRE gateway
22-
1. **External systems send HTTP requests** with JSON payloads to this endpoint
21+
1. **External systems send HTTP POST requests** to a CRE gateway
22+
1. **The request specifies your workflow ID** in the JSON-RPC body along with the input payload
2323
1. **Requests must be cryptographically signed** using a private key corresponding to an authorized EVM address
2424
1. **CRE validates the signature** against your configured `authorizedKeys`
2525
1. **If authorized**, your workflow callback executes with the request payload
26-
1. **Your callback's return value** becomes the HTTP response sent back to the requester
2726

2827
<Aside type="note" title="Security by design">
2928
For **deployed workflows**, HTTP triggers use cryptographic signatures to ensure only authorized addresses can execute

src/content/cre/guides/workflow/using-triggers/http-trigger/overview-ts.mdx

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,11 @@ The HTTP trigger allows external systems to initiate your workflow execution by
1818

1919
When you deploy a workflow with an HTTP trigger:
2020

21-
1. **Your workflow receives a unique endpoint** managed by the CRE gateway
22-
1. **External systems send HTTP requests** with JSON payloads to this endpoint
21+
1. **External systems send HTTP POST requests** to a CRE gateway
22+
1. **The request specifies your workflow ID** in the JSON-RPC body along with the input payload
2323
1. **Requests must be cryptographically signed** using a private key corresponding to an authorized EVM address
2424
1. **CRE validates the signature** against your configured `authorizedKeys`
2525
1. **If authorized**, your workflow callback executes with the request payload
26-
1. **Your callback's return value** becomes the HTTP response sent back to the requester
2726

2827
<Aside type="note" title="Security by design">
2928
For **deployed workflows**, HTTP triggers use cryptographic signatures to ensure only authorized addresses can execute

0 commit comments

Comments
 (0)