@@ -308,8 +308,7 @@ def __init__(
308
308
if not self .__client .is_authenticated ():
309
309
raise self .AuthenticationError
310
310
311
- # Guess why this isn't a requests.Response?
312
- # https://github.com/hvac/hvac/pull/537#issuecomment-660304707
311
+ # https://github.com/hvac/hvac/issues/604
313
312
response = self .__client .secrets .transit .read_key (name = name )
314
313
self .__name = name
315
314
@@ -324,8 +323,6 @@ def __init__(
324
323
# NOTE: The documentation is not clear, but presumably the returned
325
324
# keys are different versions of keys under the same name. Therefore,
326
325
# we shall select the one with the latest version number.
327
- # NOTE: We are also taking it for granted that Vault will generate
328
- # public keys in formats TUF will recognize out of the box.
329
326
keys = data ['keys' ]
330
327
latest_version = data ['latest_version' ]
331
328
key = keys .get (str (latest_version ))
@@ -420,6 +417,7 @@ def verify(self, signed: BytesOrStr, signature: Dict) -> bool:
420
417
self .KeyTypes .RSA_3072 .value ,
421
418
self .KeyTypes .RSA_4096 .value
422
419
} and self .__signature_algorithm == self .SignatureAlgorithms .PSS .value :
420
+ # https://github.com/secure-systems-lab/securesystemslib/pull/262
423
421
return self .__ram_key ._verify_rsa_signature (
424
422
signed ,
425
423
signature ,
0 commit comments