Skip to content

Instantly share code, notes, and snippets.

@richtera
Created September 6, 2019 11:49
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save richtera/663661767073f18ef756fbb86776c508 to your computer and use it in GitHub Desktop.
Save richtera/663661767073f18ef756fbb86776c508 to your computer and use it in GitHub Desktop.
$ curl -v https://iars360.iars.org/.netlify/functions/token
* Trying 142.93.122.177...
* TCP_NODELAY set
* Connected to iars360.iars.org (142.93.122.177) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem
CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=iars360.iars.org
* start date: Sep 3 14:08:39 2019 GMT
* expire date: Dec 2 14:08:39 2019 GMT
* subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org"
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
* SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360.iars.org
> User-Agent: curl/7.61.0
> Accept: */*
>
< HTTP/1.1 503 Service Unavailable
< Date: Fri, 06 Sep 2019 11:44:11 GMT
< Content-Length: 0
< Age: 28
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: eadfb0e3-3a6b-48ef-ab4c-ae4e2c2aee4d-1541084
<
* Connection #0 to host iars360.iars.org left intact
$ curl -v https://iars360.iars.org/.netlify/functions/token
* Trying 104.248.120.187...
* TCP_NODELAY set
* Connected to iars360.iars.org (104.248.120.187) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem
CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=iars360.iars.org
* start date: Sep 3 14:08:39 2019 GMT
* expire date: Dec 2 14:08:39 2019 GMT
* subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org"
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
* SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360.iars.org
> User-Agent: curl/7.61.0
> Accept: */*
>
< HTTP/1.1 503 Service Unavailable
< Date: Fri, 06 Sep 2019 11:47:14 GMT
< Content-Length: 0
< Age: 28
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: 3a5fd36d-3ec7-400e-842e-96f8329ddb23-1824051
<
* Connection #0 to host iars360.iars.org left intact
andreas-mbp:IARS360-gatsby andy$ curl -v https://iars360.iars.org/.netlify/functions/token
* Trying 142.93.122.177...
* TCP_NODELAY set
* Connected to iars360.iars.org (142.93.122.177) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem
CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=iars360.iars.org
* start date: Sep 3 14:08:39 2019 GMT
* expire date: Dec 2 14:08:39 2019 GMT
* subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org"
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
* SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360.iars.org
> User-Agent: curl/7.61.0
> Accept: */*
>
< HTTP/1.1 503 Service Unavailable
< Date: Fri, 06 Sep 2019 11:47:48 GMT
< Content-Length: 0
< Age: 28
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: eadfb0e3-3a6b-48ef-ab4c-ae4e2c2aee4d-1646395
<
* Connection #0 to host iars360.iars.org left intact
$ curl -v https://iars360.iars.org/.netlify/functions/token
* Trying 104.248.120.187...
* TCP_NODELAY set
* Connected to iars360.iars.org (104.248.120.187) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
* CAfile: /Users/andy/anaconda3/ssl/cacert.pem
CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=iars360.iars.org
* start date: Sep 3 14:08:39 2019 GMT
* expire date: Dec 2 14:08:39 2019 GMT
* subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org"
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
* SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360.iars.org
> User-Agent: curl/7.61.0
> Accept: */*
>
< HTTP/1.1 403 Forbidden
< Access-Control-Allow-Headers: Authorization,Content-Type,x-version,x-pr,x-repo,x-owner,x-branch,x-course,x-site,x-email,x-name,x-token
< Access-Control-Allow-Methods: DELETE,PUT,POST,GET,PATCH
< Access-Control-Allow-Origin: *
< Cache-Control: no-cache
< Content-Type: application/json
< Set-Cookie: nf_jwt=; Path=/; Expires=Fri, 06 Sep 2019 11:47:52 GMT; HttpOnly
< Date: Fri, 06 Sep 2019 11:47:52 GMT
< Content-Length: 40
< Age: 2
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: 3a5fd36d-3ec7-400e-842e-96f8329ddb23-1859437
<
{
"error": "You have been logged off"
* Connection #0 to host iars360.iars.org left intact
}
@richtera
Copy link
Author

richtera commented Sep 6, 2019

# DIG for the addresses above
$ dig -x 142.93.122.177

; <<>> DiG 9.10.6 <<>> -x 142.93.122.177
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28663
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;177.122.93.142.in-addr.arpa.	IN	PTR

;; AUTHORITY SECTION:
122.93.142.in-addr.arpa. 60	IN	SOA	ns1.digitalocean.com. hostmaster.122.93.142.in-addr.arpa. 1567699898 10800 3600 604800 1800

;; Query time: 14 msec
;; SERVER: 192.168.86.1#53(192.168.86.1)
;; WHEN: Fri Sep 06 07:50:31 EDT 2019
;; MSG SIZE  rcvd: 123



$ dig -x 104.248.120.187

; <<>> DiG 9.10.6 <<>> -x 104.248.120.187
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53481
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;187.120.248.104.in-addr.arpa.	IN	PTR

;; AUTHORITY SECTION:
120.248.104.in-addr.arpa. 552	IN	SOA	ns1.digitalocean.com. hostmaster.120.248.104.in-addr.arpa. 1567733688 10800 3600 604800 1800

;; Query time: 20 msec
;; SERVER: 192.168.86.1#53(192.168.86.1)
;; WHEN: Fri Sep 06 07:50:45 EDT 2019
;; MSG SIZE  rcvd: 124



$ dig -x 142.93.122.177

; <<>> DiG 9.10.6 <<>> -x 142.93.122.177
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1744
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;177.122.93.142.in-addr.arpa.	IN	PTR

;; AUTHORITY SECTION:
122.93.142.in-addr.arpa. 113	IN	SOA	ns1.digitalocean.com. hostmaster.122.93.142.in-addr.arpa. 1567699898 10800 3600 604800 1800

;; Query time: 92 msec
;; SERVER: 192.168.86.1#53(192.168.86.1)
;; WHEN: Fri Sep 06 07:51:04 EDT 2019
;; MSG SIZE  rcvd: 123

@richtera
Copy link
Author

richtera commented Sep 6, 2019

Another failure

$curl -v https://iars360.iars.org/.netlify/functions/token
*   Trying 142.93.122.177...
* TCP_NODELAY set
* Connected to iars360.iars.org (142.93.122.177) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
*   CAfile: /Users/andy/anaconda3/ssl/cacert.pem
  CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: CN=iars360.iars.org
*  start date: Sep  3 14:08:39 2019 GMT
*  expire date: Dec  2 14:08:39 2019 GMT
*  subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org"
*  issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
*  SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360.iars.org
> User-Agent: curl/7.61.0
> Accept: */*
> 
< HTTP/1.1 503 Service Unavailable
< Date: Fri, 06 Sep 2019 12:08:27 GMT
< Content-Length: 0
< Age: 28
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: eadfb0e3-3a6b-48ef-ab4c-ae4e2c2aee4d-2283452
< 
* Connection #0 to host iars360.iars.org left intact
andreas-mbp:IARS360-gatsby andy$ dig -x 142.93.122.177

; <<>> DiG 9.10.6 <<>> -x 142.93.122.177
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30195
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;177.122.93.142.in-addr.arpa.	IN	PTR

;; AUTHORITY SECTION:
122.93.142.in-addr.arpa. 915	IN	SOA	ns1.digitalocean.com. hostmaster.122.93.142.in-addr.arpa. 1567699898 10800 3600 604800 1800

;; Query time: 23 msec
;; SERVER: 192.168.86.1#53(192.168.86.1)
;; WHEN: Fri Sep 06 08:08:51 EDT 2019
;; MSG SIZE  rcvd: 123

@richtera
Copy link
Author

richtera commented Sep 6, 2019

Our review site is currently running on google cloud and is working right away

$ curl -v https://iars360-review.selfstudy.app/.netlify/functions/token
*   Trying 35.231.152.169...
* TCP_NODELAY set
* Connected to iars360-review.selfstudy.app (35.231.152.169) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
*   CAfile: /Users/andy/anaconda3/ssl/cacert.pem
  CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: CN=*.selfstudy.app
*  start date: Aug  2 11:08:36 2019 GMT
*  expire date: Oct 31 11:08:36 2019 GMT
*  subjectAltName: host "iars360-review.selfstudy.app" matched cert's "*.selfstudy.app"
*  issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
*  SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360-review.selfstudy.app
> User-Agent: curl/7.61.0
> Accept: */*
> 
< HTTP/1.1 403 Forbidden
< Access-Control-Allow-Headers: Authorization,Content-Type,x-version,x-pr,x-repo,x-owner,x-branch,x-course,x-site,x-email,x-name,x-token
< Access-Control-Allow-Methods: DELETE,PUT,POST,GET,PATCH
< Access-Control-Allow-Origin: *
< Cache-Control: no-cache
< Content-Type: application/json
< Set-Cookie: nf_jwt=; Path=/; Expires=Fri, 06 Sep 2019 12:06:51 GMT; HttpOnly
< Date: Fri, 06 Sep 2019 12:06:51 GMT
< Content-Length: 40
< Age: 12
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: 940ad471-3070-4fcc-839f-3322dea28c6d-22794351
< 
{
 "error": "You have been logged off"
* Connection #0 to host iars360-review.selfstudy.app left intact
}andreas-mbp:IARS360-gatsby andy$ dig -x 35.231.152.169

; <<>> DiG 9.10.6 <<>> -x 35.231.152.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42051
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;169.152.231.35.in-addr.arpa.	IN	PTR

;; ANSWER SECTION:
169.152.231.35.in-addr.arpa. 119 IN	PTR	169.152.231.35.bc.googleusercontent.com.

;; Query time: 38 msec
;; SERVER: 192.168.86.1#53(192.168.86.1)
;; WHEN: Fri Sep 06 08:07:14 EDT 2019
;; MSG SIZE  rcvd: 109

@richtera
Copy link
Author

richtera commented Sep 6, 2019

Another failure and associated info in log

$ curl -v https://iars360.iars.org/.netlify/functions/token
*   Trying 167.99.4.63...
* TCP_NODELAY set
* Connected to iars360.iars.org (167.99.4.63) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
*   CAfile: /Users/andy/anaconda3/ssl/cacert.pem
  CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: CN=iars360.iars.org
*  start date: Sep  3 14:08:39 2019 GMT
*  expire date: Dec  2 14:08:39 2019 GMT
*  subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org"
*  issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
*  SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360.iars.org
> User-Agent: curl/7.61.0
> Accept: */*
> 
< HTTP/1.1 503 Service Unavailable
< Date: Fri, 06 Sep 2019 12:19:07 GMT
< Content-Length: 0
< Age: 28
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: bc01104b-ed3f-4609-8471-e40f729a3de3-934209
< 
* Connection #0 to host iars360.iars.org left intact

$ curl -v https://iars360.iars.org/.netlify/functions/token
*   Trying 104.248.120.187...
* TCP_NODELAY set
* Connected to iars360.iars.org (104.248.120.187) port 443 (#0)
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
* successfully set certificate verify locations:
*   CAfile: /Users/andy/anaconda3/ssl/cacert.pem
  CApath: none
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
*  subject: CN=iars360.iars.org
*  start date: Sep  3 14:08:39 2019 GMT
*  expire date: Dec  2 14:08:39 2019 GMT
*  subjectAltName: host "iars360.iars.org" matched cert's "iars360.iars.org"
*  issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
*  SSL certificate verify ok.
> GET /.netlify/functions/token HTTP/1.1
> Host: iars360.iars.org
> User-Agent: curl/7.61.0
> Accept: */*
> 
< HTTP/1.1 403 Forbidden
< Access-Control-Allow-Headers: Authorization,Content-Type,x-version,x-pr,x-repo,x-owner,x-branch,x-course,x-site,x-email,x-name,x-token
< Access-Control-Allow-Methods: DELETE,PUT,POST,GET,PATCH
< Access-Control-Allow-Origin: *
< Cache-Control: no-cache
< Content-Type: application/json
< Set-Cookie: nf_jwt=; Path=/; Expires=Fri, 06 Sep 2019 12:20:23 GMT; HttpOnly
< Date: Fri, 06 Sep 2019 12:20:23 GMT
< Content-Length: 40
< Age: 0
< Connection: keep-alive
< Server: Netlify
< X-NF-Request-ID: 3a5fd36d-3ec7-400e-842e-96f8329ddb23-2928139
< 
{
 "error": "You have been logged off"
* Connection #0 to host iars360.iars.org left intact

The last one is a success and shows up correctly in the log

8:05:21 AM: token invoked
8:05:22 AM: XRAY TraceId: 1-5d724b81-74723e592b7206efe3cdc3d4	SegmentId: 4fe0463b642aee0a	Sampled: false	
8:20:23 AM: token invoked
8:20:23 AM: XRAY TraceId: 1-5d724f07-6d840163b9c0b26ddb8e1fed	SegmentId: 2bd0485022271833	Sampled: false	

The failures happened between 8:05 and 8:20 and the 8:20 is the X-NF-Request-ID: 3a5fd36d-3ec7-400e-842e-96f8329ddb23-2928139 request.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment