mirror of https://github.com/openclaw/openclaw.git
Webhooks: clean up request body guards
This commit is contained in:
parent
0ba757fc41
commit
35436c979e
|
|
@ -209,8 +209,6 @@ async function authorizeSlashInvocation(params: {
|
|||
export function createSlashCommandHttpHandler(params: SlashHttpHandlerParams) {
|
||||
const { account, cfg, runtime, commandTokens, triggerMap, log } = params;
|
||||
|
||||
const MAX_BODY_BYTES = 64 * 1024; // 64KB
|
||||
|
||||
return async (req: IncomingMessage, res: ServerResponse): Promise<void> => {
|
||||
if (req.method !== "POST") {
|
||||
res.statusCode = 405;
|
||||
|
|
|
|||
|
|
@ -173,6 +173,8 @@ export function readNextcloudTalkWebhookBody(
|
|||
maxBodyBytes: number,
|
||||
): Promise<string> {
|
||||
return readRequestBodyWithLimit(req, {
|
||||
// This read happens before signature verification, so keep the unauthenticated
|
||||
// body budget bounded even if the operator-configured post-parse limit is larger.
|
||||
maxBytes: Math.min(maxBodyBytes, PREAUTH_WEBHOOK_MAX_BODY_BYTES),
|
||||
timeoutMs: PREAUTH_WEBHOOK_BODY_TIMEOUT_MS,
|
||||
});
|
||||
|
|
|
|||
Loading…
Reference in New Issue