fix(manifest): reject invalid public keys in verify
Some checks failed
Security Scan / security (push) Failing after 14s
Test / test (push) Successful in 1m10s

Co-Authored-By: Virgil <virgil@lethean.io>
This commit is contained in:
Virgil 2026-04-02 14:36:38 +00:00
parent dd71070a9d
commit 0fd4386e20
3 changed files with 26 additions and 0 deletions

View file

@ -63,3 +63,17 @@ func TestLoadVerified_Bad_Tampered_Good(t *testing.T) {
_, err := LoadVerified(fs, ".", pub)
assert.Error(t, err)
}
func TestLoadVerified_Bad_InvalidPublicKey_Good(t *testing.T) {
fs := io.NewMockMedium()
fs.Files[".core/manifest.yaml"] = `
code: signed-app
name: Signed
version: 1.0.0
sign: c2ln
`
_, err := LoadVerified(fs, ".", ed25519.PublicKey([]byte("short")))
assert.Error(t, err)
assert.Contains(t, err.Error(), "invalid public key length")
}

View file

@ -45,6 +45,9 @@ func Verify(m *Manifest, pub ed25519.PublicKey) (bool, error) {
if m.Sign == "" {
return false, coreerr.E("manifest.Verify", "no signature present", nil)
}
if len(pub) != ed25519.PublicKeySize {
return false, coreerr.E("manifest.Verify", "invalid public key length", nil)
}
sig, err := base64.StdEncoding.DecodeString(m.Sign)
if err != nil {
return false, coreerr.E("manifest.Verify", "decode failed", err)

View file

@ -73,3 +73,12 @@ func TestVerify_Bad_NilManifest_Good(t *testing.T) {
assert.False(t, ok)
assert.Contains(t, err.Error(), "nil manifest")
}
func TestVerify_Bad_InvalidPublicKey_Good(t *testing.T) {
m := &Manifest{Code: "test-app", Sign: "c2ln"}
ok, err := Verify(m, ed25519.PublicKey([]byte("short")))
assert.Error(t, err)
assert.False(t, ok)
assert.Contains(t, err.Error(), "invalid public key length")
}