i use XAMPP(apache webserver) to run PHP scripts, and i can run php scripts with no problem.
so i think there is something wrong with the connection between LFSLapper and the Webserver.
i'm not into php stuff but , there is a way to check if the script receives any $_GET["uname"] data in realtime?
Like auto pagerefresh when data is being received.
i checked google already, but couldnt find what i'm looking for.
oke that outputs the username of the OnMSO event, as it should.
but i need to check my console more often, because it outputs everything i send/receive to the web. dont think this is normal.
but that is not how i code the command and php script.
I never see my HTTP commands on the console, so that's probably because you have it in a ![cmd] event.
Could you try to go to a SUB from the ![cmd] and put the HTTP command in the SUB?
and i have to apologize about this request for help.
I looked into the sourcecode. Because something this simple isnt working, so it could be the sourcecode.
Well, it turns out that some lines were disabled (for a long time) that handles returning webrequests. I think it happend during a fix for TechEdison about sending http requests as non player.
Ah, that must have happened at some point then.
As you know I still am on a rather old version of Lapper and that HTTP function is working like a dream there.
You can make the webpage talk back to Lapper, using Lapper commands and make them by echoed by PHP.
As long as the syntax is right for Lapper, it will do what you want it to do.
OK another lesson learned, after some experimenting.
The person who own the website, putt the phpcode between HTML tags. I didnt know that.
So Lapper sees the string differently when its between HTML tags.
I understand the security concerns, but LFS players won't see Lapper executing the HTTP command, so they have no knowlegde to what URL it is sending data. From the other side no data can been seen, when someone would get hold of the URL, as PHP is executed server-side and only displays the outcome on a website (if there is anything to display), so unless someone gets the actual PHP-file, this is pretty safe.