Needed a small change to your patch:

Line 126 in boto/https_connection.py  in connect function needs to be
protected by check::

    126         if self.key_file:
    127             context.load_cert_chain(certfile=self.cert_file,
keyfile=self.key_file)


otherwise I got:

  File "/usr/lib/python2.7/httplib.py", line 844, in send
    self.connect()
  File "/usr/lib/python2.7/dist-packages/boto/https_connection.py", line
126, in connect
    context.load_cert_chain(certfile=self.cert_file, keyfile=self.key_file)
 TypeError: coercing to Unicode: need string or buffer, NoneType found


This is because I do not use client certificates.

After that I got duplicity working again and it connects just fine now.


sob., 29 wrz 2018 o 21:54 Sebastian Andrzej Siewior <sebast...@breakpoint.cc>
napisał(a):

> control: tags -1 patch
>
> On 2018-09-25 03:04:49 [+0200], Witold Baryluk wrote:
> > Now it takes few minutes on any command, and then errors out:
> > Cleaning older backups
> > Traceback (innermost last):
> …
> >  SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed
> (_ssl.c:726)
>
> It looks like missing SNI support.
> Could you please try if the patch attached works? It is completly
> untested it just looks like it might work…
>
> Sebastian
>


-- 
Witold Baryluk
My PGP keys for 2017-02-17 - 2019-02-17:
5B8C 48CB 8B2F CF53 CA55  0995 16D9 6FA2 20A8 F130
https://functor.xyz/pgp/witold.baryluk-gmail.gpg.asc
https://keys.mailvelope.com/pks/lookup?op=get&search=0x16D96FA220A8F130

Reply via email to