From 2aa640f89b77e57038421b99976737417bae8365 Mon Sep 17 00:00:00 2001 From: Jakob Schlyter Date: Thu, 5 Dec 2024 21:38:04 +0100 Subject: [PATCH] use same terminology --- nodeman/nodes.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/nodeman/nodes.py b/nodeman/nodes.py index 7056cc3..074c690 100644 --- a/nodeman/nodes.py +++ b/nodeman/nodes.py @@ -235,7 +235,7 @@ async def enroll_node( logger.debug("Valid data signature from %s", name, extra={"nodename": name}) except InvalidJWSSignature as exc: logger.warning("Invalid data signature from %s", name, extra={"nodename": name}) - raise HTTPException(status.HTTP_401_UNAUTHORIZED, detail="Invalid proof-of-possession signature") from exc + raise HTTPException(status.HTTP_401_UNAUTHORIZED, detail="Invalid data signature") from exc node.public_key = public_key.export(as_dict=True, private_key=False) # Verify X.509 CSR and issue certificate @@ -294,7 +294,7 @@ async def renew_node( logger.debug("Valid data signature from %s", name, extra={"nodename": name}) except InvalidJWSSignature as exc: logger.warning("Invalid data signature from %s", name, extra={"nodename": name}) - raise HTTPException(status.HTTP_401_UNAUTHORIZED, detail="Invalid proof-of-possession signature") from exc + raise HTTPException(status.HTTP_401_UNAUTHORIZED, detail="Invalid data signature") from exc message = RenewalRequest.model_validate_json(jws.payload) # Verify X.509 CSR and issue certificate