Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

log_detective_demo.gif is not present in the built production image #148

Closed
TomasTomecek opened this issue Aug 8, 2024 · 0 comments · Fixed by #153
Closed

log_detective_demo.gif is not present in the built production image #148

TomasTomecek opened this issue Aug 8, 2024 · 0 comments · Fixed by #153
Assignees

Comments

@TomasTomecek
Copy link
Collaborator

$ curl -vs https://logdetective.com/img/log_detective_demo.gif
* Host logdetective.com:443 was resolved.
* IPv6: (none)
* IPv4: 54.167.108.64, 54.166.220.230
*   Trying 54.167.108.64:443...
* Connected to logdetective.com (54.167.108.64) port 443
* ALPN: curl offers h2,http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
*  CAfile: /etc/pki/tls/certs/ca-bundle.crt
*  CApath: none
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / x25519 / id-ecPublicKey
* ALPN: server did not agree on a protocol. Uses default.
* Server certificate:
*  subject: CN=*.log-detective.com
*  start date: Jun  4 09:14:01 2024 GMT
*  expire date: Sep  2 09:14:00 2024 GMT
*  subjectAltName: host "logdetective.com" matched cert's "logdetective.com"
*  issuer: C=US; O=Let's Encrypt; CN=R3
*  SSL certificate verify ok.
*   Certificate level 0: Public key type EC/prime256v1 (256/128 Bits/secBits), signed using sha256WithRSAEncryption
*   Certificate level 1: Public key type RSA (2048/112 Bits/secBits), signed using sha256WithRSAEncryption
*   Certificate level 2: Public key type RSA (4096/152 Bits/secBits), signed using sha256WithRSAEncryption
* using HTTP/1.x
> GET /img/log_detective_demo.gif HTTP/1.1
> Host: logdetective.com
> User-Agent: curl/8.6.0
> Accept: */*
>
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
< HTTP/1.1 200 OK
< date: Thu, 08 Aug 2024 12:03:03 GMT
< server: uvicorn
< content-type: image/gif
< content-length: 133
< last-modified: Tue, 06 Aug 2024 11:56:23 GMT
< etag: f1915077e2cbf67590554c6acb6b7609
<
version https://git-lfs.github.com/spec/v1
oid sha256:1b36d81249a0076f3b7dd1650b996d8d6cdca20ebd1d684a0c9a4cff0569ffc7
size 24905850
* Connection #0 to host logdetective.com left intact

It seems we don't fetch that gif during the build process - github just references the git lfs ref.

@github-project-automation github-project-automation bot moved this to Needs triage in CPT Kanban Aug 8, 2024
@TomasTomecek TomasTomecek self-assigned this Aug 12, 2024
TomasTomecek added a commit to TomasTomecek/log-detective-website that referenced this issue Aug 12, 2024
so that the frontpage gif is present in the image

Fixes fedora-copr#148

Signed-off-by: Tomas Tomecek <[email protected]>
TomasTomecek added a commit to TomasTomecek/log-detective-website that referenced this issue Aug 12, 2024
so that the frontpage gif is present in the image

Fixes fedora-copr#148

Signed-off-by: Tomas Tomecek <[email protected]>
@nikromen nikromen moved this from Needs triage to Someday in future in CPT Kanban Aug 12, 2024
TomasTomecek added a commit that referenced this issue Aug 12, 2024
so that the frontpage gif is present in the image

Fixes #148

Signed-off-by: Tomas Tomecek <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Someday in future
Development

Successfully merging a pull request may close this issue.

1 participant