Hello, tried the UYUM update which prompted to allow 3 certs from CentOS (x2) and one from what appeared to be rockstor. I assumed this is what you anticipated. After update the error remains. It seems more to do with the redirect than the certs?
Traceback (most recent call last):
- File “/opt/rockstor/src/rockstor/rest_framework_custom/generic_view.py”, line 41, in _handle_exception*
- yield*
- File “/opt/rockstor/src/rockstor/storageadmin/views/rockon.py”, line 395, in _get_available*
- response = requests.get(remote_root, timeout=10)*
- File “/opt/rockstor/eggs/requests-1.1.0-py2.7.egg/requests/api.py”, line 55, in get*
- return request(‘get’, url, *kwargs)
- File “/opt/rockstor/eggs/requests-1.1.0-py2.7.egg/requests/api.py”, line 44, in request*
- return session.request(method=method, url=url, *kwargs)
- File “/opt/rockstor/eggs/requests-1.1.0-py2.7.egg/requests/sessions.py”, line 289, in request*
- history = [r for r in gen] if allow_redirects else []*
- File “/opt/rockstor/eggs/requests-1.1.0-py2.7.egg/requests/sessions.py”, line 133, in resolve_redirects*
- proxies=proxies*
- File “/opt/rockstor/eggs/requests-1.1.0-py2.7.egg/requests/sessions.py”, line 279, in request*
- resp = self.send(prep, stream=stream, timeout=timeout, verify=verify, cert=cert, proxies=proxies)*
- File “/opt/rockstor/eggs/requests-1.1.0-py2.7.egg/requests/sessions.py”, line 374, in send*
- r = adapter.send(request, *kwargs)
- File “/opt/rockstor/eggs/requests-1.1.0-py2.7.egg/requests/adapters.py”, line 213, in send*
- raise SSLError(e)*
SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:618)
Alternately, couldn’t the JSON file be placed on the server so the app doesn’t have to retrieve it? Once the list has been retrieved and unless Rockstor updates the Rock-On repo it should be static, correct?
We had a product that performed FLAWLESSLY up until about 3 to 4 weeks ago. I see Rockstor stopped Incident Based Support for Rockstor 3 on the commercial side. What are we to do, we cant even pay you to fix this
Thanks!