File tree Expand file tree Collapse file tree 2 files changed +4
-6
lines changed
src/content/cre/guides/workflow/using-triggers/http-trigger Expand file tree Collapse file tree 2 files changed +4
-6
lines changed Original file line number Diff line number Diff line change @@ -18,12 +18,11 @@ The HTTP trigger allows external systems to initiate your workflow execution by
1818
1919When you deploy a workflow with an HTTP trigger:
2020
21- 1 . ** Your workflow receives a unique endpoint ** managed by the CRE gateway
22- 1 . ** External systems send HTTP requests ** with JSON payloads to this endpoint
21+ 1 . ** External systems send HTTP POST requests ** to a CRE gateway
22+ 1 . ** The request specifies your workflow ID ** in the JSON-RPC body along with the input payload
23231 . ** Requests must be cryptographically signed** using a private key corresponding to an authorized EVM address
24241 . ** CRE validates the signature** against your configured ` authorizedKeys `
25251 . ** If authorized** , your workflow callback executes with the request payload
26- 1 . ** Your callback's return value** becomes the HTTP response sent back to the requester
2726
2827<Aside type = " note" title = " Security by design" >
2928 For ** deployed workflows** , HTTP triggers use cryptographic signatures to ensure only authorized addresses can execute
Original file line number Diff line number Diff line change @@ -18,12 +18,11 @@ The HTTP trigger allows external systems to initiate your workflow execution by
1818
1919When you deploy a workflow with an HTTP trigger:
2020
21- 1 . ** Your workflow receives a unique endpoint ** managed by the CRE gateway
22- 1 . ** External systems send HTTP requests ** with JSON payloads to this endpoint
21+ 1 . ** External systems send HTTP POST requests ** to a CRE gateway
22+ 1 . ** The request specifies your workflow ID ** in the JSON-RPC body along with the input payload
23231 . ** Requests must be cryptographically signed** using a private key corresponding to an authorized EVM address
24241 . ** CRE validates the signature** against your configured ` authorizedKeys `
25251 . ** If authorized** , your workflow callback executes with the request payload
26- 1 . ** Your callback's return value** becomes the HTTP response sent back to the requester
2726
2827<Aside type = " note" title = " Security by design" >
2928 For ** deployed workflows** , HTTP triggers use cryptographic signatures to ensure only authorized addresses can execute
You can’t perform that action at this time.
0 commit comments