Skip to content

Conversation

@delasource
Copy link

fixes #162 and #133
(and also probably heroiclabs/nakama#400 )

even though you could argue that you throw the payload part of a GET request away by intention, using POST for server-to-server calls is even a security bonus, as the possibility to sniff query params gets eliminated.

Also nowhere in the docs it is mentioned, that "input" is not a thing in these rpcHttpKey-calls. This PR fixes that and makes the "input" param actually behave the same way, that session-authorized rpc's do.

@CLAassistant
Copy link

CLAassistant commented Jul 14, 2023

CLA assistant check
All committers have signed the CLA.

@lugehorsam
Copy link
Contributor

lugehorsam commented Mar 19, 2024

Hey @delasource we cannot modify the existing rpcHttpKey from GET to POST because it would subtly break users' server runtime functions that are expecting query parameters.

Would introducing a new rpcHttpKeyPost function solve your issue?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Possible Bug in server to server RPC calls

3 participants