16 Commits

Author SHA1 Message Date
2302632f11 1.3.2
Some checks failed
Default (tags) / security (push) Successful in 42s
Default (tags) / test (push) Failing after 2m25s
Default (tags) / release (push) Has been skipped
Default (tags) / metadata (push) Has been skipped
2025-08-16 20:37:59 +00:00
a8c36a64b7 fix(build): Bump dependencies, improve test/build scripts, expand documentation and add project metadata 2025-08-16 20:37:58 +00:00
a810338cc4 1.3.1
Some checks failed
Default (tags) / security (push) Successful in 51s
Default (tags) / test (push) Failing after 2m9s
Default (tags) / release (push) Has been skipped
Default (tags) / metadata (push) Has been skipped
2025-02-07 20:47:31 +01:00
c5049d5155 fix(core): Updated descriptions and keywords in package.json and npmextra.json. Improved README content for usage clarity. 2025-02-07 20:47:30 +01:00
6ddcfc8d90 1.3.0
Some checks failed
Default (tags) / security (push) Successful in 39s
Default (tags) / test (push) Failing after 1m5s
Default (tags) / release (push) Has been skipped
Default (tags) / metadata (push) Has been skipped
2025-02-05 10:52:36 +01:00
a2d8d1cbfd feat(ClamAvService): Add support for enhanced streaming methods in ClamAvService 2025-02-05 10:52:35 +01:00
6adfcc2201 1.2.0
Some checks failed
Default (tags) / security (push) Successful in 1m2s
Default (tags) / test (push) Failing after 1m11s
Default (tags) / release (push) Has been skipped
Default (tags) / metadata (push) Has been skipped
2025-02-05 10:49:46 +01:00
6300843616 feat(ClamAvService): Add stream scanning methods to ClamAvService 2025-02-05 10:49:46 +01:00
8acfedd7f3 1.1.2
Some checks failed
Default (tags) / security (push) Successful in 38s
Default (tags) / test (push) Failing after 2m53s
Default (tags) / release (push) Has been skipped
Default (tags) / metadata (push) Has been skipped
2025-02-03 13:56:42 +01:00
3ef7d69380 fix(documentation): Update readme with additional legal and trademark information 2025-02-03 13:56:42 +01:00
4266d76319 1.1.1
Some checks failed
Default (tags) / security (push) Successful in 53s
Default (tags) / test (push) Failing after 2m55s
Default (tags) / release (push) Has been skipped
Default (tags) / metadata (push) Has been skipped
2025-02-03 13:55:16 +01:00
4446f265cb fix(clamav.manager): Improve log handling and add timeout for log reception in ClamAV manager tests 2025-02-03 13:55:15 +01:00
e31e7cca44 1.1.0
Some checks failed
Default (tags) / security (push) Successful in 55s
Default (tags) / test (push) Failing after 1m32s
Default (tags) / release (push) Has been skipped
Default (tags) / metadata (push) Has been skipped
2025-02-03 13:34:52 +01:00
a19638b476 feat(ClamAvService): Add ClamAV Manager with Docker container management capabilities. 2025-02-03 13:34:52 +01:00
f71219f0ca 1.0.4
Some checks failed
Default (tags) / security (push) Successful in 39s
Default (tags) / test (push) Failing after 1m18s
Default (tags) / release (push) Has been skipped
Default (tags) / metadata (push) Has been skipped
2025-01-10 03:27:14 +01:00
e7e9cb30e7 fix(documentation): Removed redundant conclusion section in readme. 2025-01-10 03:27:13 +01:00
21 changed files with 4253 additions and 2302 deletions

Binary file not shown.

View File

@@ -0,0 +1,35 @@
# Code Style and Conventions
## Naming Conventions
- **Interfaces**: Prefix with `I` (e.g., `IUserData`)
- **Types**: Prefix with `T` (e.g., `TResponseType`)
- **Files**: Always lowercase (e.g., `classes.clamavservice.ts`)
- **Classes**: PascalCase (e.g., `ClamAvService`)
- **Methods/Functions**: camelCase (e.g., `scanBuffer`)
- Avoid ENums when possible
## TypeScript Patterns
- TypeScript-first approach with full type safety
- ES modules (type: "module" in package.json)
- Import dependencies in `ts/plugins.ts`
- Reference with full path: `plugins.myModule.myClass()`
## File Organization
- Source code in `ts/` directory
- Tests in `test/` directory
- Distribution in `dist_ts/` directory
- Use `.js` extensions in imports for ES modules
## Testing Patterns
- Use @git.zone/tstest framework
- Import expect from @push.rocks/tapbundle
- Test files end with `export default tap.start()`
- Test naming: `*.both.ts`, `*.node.ts`, `*.browser.ts`
- EICAR test string for antivirus verification
## General Principles
- Make RAZOR SHARP changes - every modification must be goal-oriented
- Improve elegance - changes should enhance clarity and maintainability
- Preserve necessary complexity - don't oversimplify
- Keep async patterns - maintain Promises where they add value
- Remove redundancy carefully while preserving functionality

View File

@@ -0,0 +1,31 @@
# SmartAntivirus Project Overview
## Purpose
SmartAntivirus (@push.rocks/smartantivirus) is a Node.js/TypeScript library that provides enterprise-grade antivirus scanning capabilities by integrating with ClamAV. It allows developers to scan files, buffers, strings, and streams for viruses in their applications.
## Tech Stack
- TypeScript (primary language)
- Node.js (runtime)
- ClamAV (antivirus engine)
- Docker (for containerized ClamAV deployment)
- Testing: @git.zone/tstest with @push.rocks/tapbundle
- Build: @git.zone/tsbuild
## Architecture
- **ClamAvService**: High-level interface for virus scanning operations
- Scan strings, buffers, Node.js streams, and Web Streams
- Auto-manages Docker container if needed
- Connects to ClamAV daemon on port 3310
- **ClamAVManager**: Low-level Docker container management
- Handles container lifecycle (start/stop)
- Updates virus definitions
- Provides log monitoring
## Key Features
- In-memory scanning without disk I/O
- Stream processing for large files
- TypeScript-first with full type safety
- Zero-config with sensible defaults
- Auto-updating virus definitions
- Docker-based or direct daemon connection

View File

@@ -0,0 +1,31 @@
# Suggested Commands for SmartAntivirus Development
## Build & Test Commands
- `pnpm test` - Run test suite with tapbundle
- `pnpm build` - Build TypeScript to JavaScript (uses tsbuild)
- `pnpm run buildDocs` - Generate documentation (tsdoc)
## Development Tools
- `tsbuild check test/**/* --skiplibcheck` - Type-check test files
- `tsx test/test.ts` - Run individual test file directly
## Version Control
- `git mv <old> <new>` - Move/rename files preserving history
- `git status` - Check current changes
- `git diff` - View uncommitted changes
## Package Management
- `pnpm install` - Install dependencies
- `pnpm install --save-dev <package>` - Add dev dependency
- `pnpm add <package>` - Add production dependency
## File Operations
- `ls` - List directory contents
- `cat <file>` - View file contents
- `find . -name "*.ts"` - Find TypeScript files
- `rg <pattern>` - Search codebase with ripgrep
## Docker Management (if testing locally)
- `docker ps` - List running containers
- `docker logs clamav` - View ClamAV container logs
- `docker stop clamav` - Stop ClamAV container

View File

@@ -0,0 +1,44 @@
# Task Completion Workflow
## Required Steps After Making Code Changes
1. **Build the Project**
```bash
pnpm build
```
Ensures TypeScript compiles without errors
2. **Run Tests**
```bash
pnpm test
```
Verifies functionality with test suite
3. **Type Check Test Files** (if tests were modified)
```bash
tsbuild check test/**/* --skiplibcheck
```
## Quality Checks
- Verify no TypeScript compilation errors
- Ensure all tests pass
- Check that new code follows existing patterns
- Verify imports use `.js` extensions for ES modules
- Confirm no hardcoded values that should be configurable
## Documentation Updates
- Update readme.md if API changes
- Add JSDoc comments for new public methods
- Update changelog.md for version changes
## Before Committing
- NEVER commit without explicit user approval
- Use `git status` to review changes
- Use `git diff` to verify modifications
- Create focused commits with clear messages
- Never commit secrets or API keys
## Important Notes
- The project uses pnpm exclusively (not npm or yarn)
- Always read documentation before using unfamiliar APIs
- Check existing code patterns before implementing new features

68
.serena/project.yml Normal file
View File

@@ -0,0 +1,68 @@
# language of the project (csharp, python, rust, java, typescript, go, cpp, or ruby)
# * For C, use cpp
# * For JavaScript, use typescript
# Special requirements:
# * csharp: Requires the presence of a .sln file in the project folder.
language: typescript
# whether to use the project's gitignore file to ignore files
# Added on 2025-04-07
ignore_all_files_in_gitignore: true
# list of additional paths to ignore
# same syntax as gitignore, so you can use * and **
# Was previously called `ignored_dirs`, please update your config if you are using that.
# Added (renamed) on 2025-04-07
ignored_paths: []
# whether the project is in read-only mode
# If set to true, all editing tools will be disabled and attempts to use them will result in an error
# Added on 2025-04-18
read_only: false
# list of tool names to exclude. We recommend not excluding any tools, see the readme for more details.
# Below is the complete list of tools for convenience.
# To make sure you have the latest list of tools, and to view their descriptions,
# execute `uv run scripts/print_tool_overview.py`.
#
# * `activate_project`: Activates a project by name.
# * `check_onboarding_performed`: Checks whether project onboarding was already performed.
# * `create_text_file`: Creates/overwrites a file in the project directory.
# * `delete_lines`: Deletes a range of lines within a file.
# * `delete_memory`: Deletes a memory from Serena's project-specific memory store.
# * `execute_shell_command`: Executes a shell command.
# * `find_referencing_code_snippets`: Finds code snippets in which the symbol at the given location is referenced.
# * `find_referencing_symbols`: Finds symbols that reference the symbol at the given location (optionally filtered by type).
# * `find_symbol`: Performs a global (or local) search for symbols with/containing a given name/substring (optionally filtered by type).
# * `get_current_config`: Prints the current configuration of the agent, including the active and available projects, tools, contexts, and modes.
# * `get_symbols_overview`: Gets an overview of the top-level symbols defined in a given file.
# * `initial_instructions`: Gets the initial instructions for the current project.
# Should only be used in settings where the system prompt cannot be set,
# e.g. in clients you have no control over, like Claude Desktop.
# * `insert_after_symbol`: Inserts content after the end of the definition of a given symbol.
# * `insert_at_line`: Inserts content at a given line in a file.
# * `insert_before_symbol`: Inserts content before the beginning of the definition of a given symbol.
# * `list_dir`: Lists files and directories in the given directory (optionally with recursion).
# * `list_memories`: Lists memories in Serena's project-specific memory store.
# * `onboarding`: Performs onboarding (identifying the project structure and essential tasks, e.g. for testing or building).
# * `prepare_for_new_conversation`: Provides instructions for preparing for a new conversation (in order to continue with the necessary context).
# * `read_file`: Reads a file within the project directory.
# * `read_memory`: Reads the memory with the given name from Serena's project-specific memory store.
# * `remove_project`: Removes a project from the Serena configuration.
# * `replace_lines`: Replaces a range of lines within a file with new content.
# * `replace_symbol_body`: Replaces the full definition of a symbol.
# * `restart_language_server`: Restarts the language server, may be necessary when edits not through Serena happen.
# * `search_for_pattern`: Performs a search for a pattern in the project.
# * `summarize_changes`: Provides instructions for summarizing the changes made to the codebase.
# * `switch_modes`: Activates modes by providing a list of their names
# * `think_about_collected_information`: Thinking tool for pondering the completeness of collected information.
# * `think_about_task_adherence`: Thinking tool for determining whether the agent is still on track with the current task.
# * `think_about_whether_you_are_done`: Thinking tool for determining whether the task is truly completed.
# * `write_memory`: Writes a named memory (for future reference) to Serena's project-specific memory store.
excluded_tools: []
# initial prompt for the project. It will always be given to the LLM upon activating the project
# (contrary to the memories, which are loaded on demand).
initial_prompt: ""
project_name: "smartantivirus"

View File

@@ -1,5 +1,62 @@
# Changelog
## 2025-08-16 - 1.3.2 - fix(build)
Bump dependencies, improve test/build scripts, expand documentation and add project metadata
- Updated devDependencies: bumped @git.zone/tsbuild, @git.zone/tsbundle, @git.zone/tstest, @push.rocks/tapbundle, @types/node and typescript to newer versions.
- Updated runtime dependencies: bumped @push.rocks/smartfile, @push.rocks/smartpath and axios; tar version updated.
- Adjusted npm scripts: test now runs with '(tstest test/ --web --verbose --logfile --timeout 120)'; build and docs scripts unchanged in behavior.
- Added packageManager entry (pnpm) and a pnpm-workspace.yaml with onlyBuiltDependencies configured.
- Expanded and rewrote README with detailed quick start, examples, API reference and troubleshooting guidance.
- Added local assistant/IDE metadata and memories (.claude/settings.local.json and .serena/*) to aid development tooling and project onboarding.
## 2025-02-07 - 1.3.1 - fix(core)
Updated descriptions and keywords in package.json and npmextra.json. Improved README content for usage clarity.
- Revised package.json description and keywords to better represent the project's features.
- Enhanced npmextra.json with updated module attributes.
- Improved README with clearer instructions and examples for using ClamAVManager and ClamAvService.
- Fixed incorrect import path in test.clamav.manager.ts.
## 2025-02-05 - 1.3.0 - feat(ClamAvService)
Add support for enhanced streaming methods in ClamAvService
- Add methods to ClamAvService: scanStream for NodeJS streams, scanWebStream for Web API streams, and scanFileFromWebAsStream for fetching and scanning files from URLs.
- Update usage examples in readme for new streaming methods.
## 2025-02-05 - 1.2.0 - feat(ClamAvService)
Add stream scanning methods to ClamAvService
- Added scanStream method to support scanning NodeJS streams directly.
- Introduced scanWebStream method for scanning web resources as streams.
- Integrated stream scanning into existing ClamAvService class.
## 2025-02-03 - 1.1.2 - fix(documentation)
Update readme with additional legal and trademark information
- Added legal information related to licensing and trademarks
- Provided company details of Task Venture Capital GmbH
## 2025-02-03 - 1.1.1 - fix(clamav.manager)
Improve log handling and add timeout for log reception in ClamAV manager tests
- Refined the log receiving mechanism in ClamAV manager tests to use promises for better control over log receipt timing.
- Introduced a timeout mechanism in the log receiving test case to avoid indefinite waiting.
- Fixed the test case setup to accurately reflect log receipt and database information verification.
## 2025-02-03 - 1.1.0 - feat(ClamAvService)
Add ClamAV Manager with Docker container management capabilities.
- Introduced ClamAVManager class to manage ClamAV Docker containers.
- Implemented startContainer and stopContainer methods in ClamAVManager.
- Integrated ClamAVManager into ClamAvService for managing container lifecycle.
- Added ClamAVManager test setups and helpers in test suite.
## 2025-01-10 - 1.0.4 - fix(documentation)
Removed redundant conclusion section in readme.
- Removed the conclusion section from the README file for conciseness.
## 2025-01-10 - 1.0.3 - fix(readme)
Fix formatting errors in the README file for consistent Markdown syntax.

View File

@@ -5,21 +5,23 @@
"githost": "code.foss.global",
"gitscope": "push.rocks",
"gitrepo": "smartantivirus",
"description": "A Node.js package for integrating antivirus scanning capabilities using ClamAV, allowing in-memory file and data scanning.",
"description": "A Node.js package providing integration with ClamAV for anti-virus scanning, facilitating both Docker containerized management and direct connection to a ClamAV daemon.",
"npmPackagename": "@push.rocks/smartantivirus",
"license": "MIT",
"projectDomain": "push.rocks",
"keywords": [
"antivirus",
"ClamAV",
"Node.js",
"ClamAV",
"virus scanning",
"security",
"buffer scanning",
"Docker",
"in-memory scanning",
"file scanning",
"stream scanning",
"data protection",
"HTTP requests",
"file handling",
"network communication",
"network security",
"buffer scanning",
"software testing"
]
}

View File

@@ -1,30 +1,32 @@
{
"name": "@push.rocks/smartantivirus",
"version": "1.0.3",
"version": "1.3.2",
"private": false,
"description": "A Node.js package for integrating antivirus scanning capabilities using ClamAV, allowing in-memory file and data scanning.",
"description": "A Node.js package providing integration with ClamAV for anti-virus scanning, facilitating both Docker containerized management and direct connection to a ClamAV daemon.",
"main": "dist_ts/index.js",
"typings": "dist_ts/index.d.ts",
"type": "module",
"author": "Task Venture Capital GmbH",
"license": "MIT",
"scripts": {
"test": "(tstest test/ --web)",
"test": "(tstest test/ --web --verbose --logfile --timeout 120)",
"build": "(tsbuild --web --allowimplicitany)",
"buildDocs": "(tsdoc)"
},
"devDependencies": {
"@git.zone/tsbuild": "^2.1.25",
"@git.zone/tsbundle": "^2.0.5",
"@git.zone/tsbuild": "^2.6.4",
"@git.zone/tsbundle": "^2.5.1",
"@git.zone/tsrun": "^1.2.46",
"@git.zone/tstest": "^1.0.44",
"@push.rocks/tapbundle": "^5.0.15",
"@types/node": "^20.8.7"
"@git.zone/tstest": "^2.3.4",
"@push.rocks/tapbundle": "^6.0.3",
"@types/node": "^24.3.0",
"typescript": "^5.9.2"
},
"dependencies": {
"@push.rocks/smartfile": "^11.1.5",
"@push.rocks/smartpath": "^5.0.18",
"axios": "^1.7.9",
"@push.rocks/smartfile": "^11.2.5",
"@push.rocks/smartpath": "^6.0.0",
"@push.rocks/smartstream": "^3.2.5",
"axios": "^1.11.0",
"tar": "^7.4.3"
},
"repository": {
@@ -49,15 +51,18 @@
],
"keywords": [
"antivirus",
"ClamAV",
"Node.js",
"ClamAV",
"virus scanning",
"security",
"buffer scanning",
"Docker",
"in-memory scanning",
"file scanning",
"stream scanning",
"data protection",
"HTTP requests",
"file handling",
"network communication",
"network security",
"buffer scanning",
"software testing"
]
],
"packageManager": "pnpm@10.14.0+sha512.ad27a79641b49c3e481a16a805baa71817a04bbe06a38d17e60e2eaee83f6a146c6a688125f5792e48dd5ba30e7da52a5cda4c3992b9ccf333f9ce223af84748"
}

5000
pnpm-lock.yaml generated

File diff suppressed because it is too large Load Diff

4
pnpm-workspace.yaml Normal file
View File

@@ -0,0 +1,4 @@
onlyBuiltDependencies:
- esbuild
- mongodb-memory-server
- puppeteer

412
readme.md
View File

@@ -1,124 +1,322 @@
# @push.rocks/smartantivirus
# @push.rocks/smartantivirus 🛡️
A package for performing antivirus testing, especially suitable for use with ClamAV.
**Enterprise-grade antivirus scanning for Node.js applications** - Seamlessly integrate ClamAV's powerful virus detection into your TypeScript/JavaScript projects with zero hassle.
## Why SmartAntivirus? 🚀
In today's digital landscape, security is paramount. Whether you're building a file-sharing platform, processing user uploads, or handling sensitive data streams, you need reliable virus protection that just works. SmartAntivirus gives you:
- **🐳 Docker-based or Direct Connection** - Choose your deployment style
- **⚡ In-memory Scanning** - Lightning-fast scanning without disk I/O
- **🌊 Stream Processing** - Scan data on-the-fly as it flows through your app
- **🎯 TypeScript First** - Full type safety and IntelliSense support
- **📦 Zero Config** - Works out of the box with sensible defaults
- **🔄 Auto-updating** - Virus definitions stay current automatically
## Install
Installing `@push.rocks/smartantivirus` is straightforward. You'll need Node.js and npm installed on your machine to get started. Once they are ready, you can add the `@push.rocks/smartantivirus` package to your project by running the following command:
```bash
npm install @push.rocks/smartantivirus
```
This will add the package to your project's dependencies and allow you to integrate antivirus scanning capabilities directly into your application.
## Usage
The `@push.rocks/smartantivirus` package provides tools to easily integrate antivirus scanning capabilities into your Node.js application by interfacing with the ClamAV daemon. Below is a comprehensive guide on how to use the features of this library.
### Setting Up the ClamAV Daemon
Before using this package, make sure you have ClamAV installed and running on your system. You can find installation instructions for various operating systems on the [ClamAV official website](https://www.clamav.net/documents/installing-clamav).
After installing ClamAV, start the ClamAV daemon (`clamd`). Make sure it is configured to listen on a port accessible to your Node.js application. You can configure this in the `clamd.conf` file, typically located in `/etc/clamav/clamd.conf`.
### Basic Usage
The primary interface provided by the package is the `ClamAvService` class. It allows you to scan data in memory or verify the connection to the ClamAV daemon.
```typescript
import { ClamAvService } from '@push.rocks/smartantivirus';
async function main() {
const clamService = new ClamAvService('127.0.0.1', 3310); // Replace with your ClamAV host and port
// Verify connection to ClamAV
const isConnected = await clamService.verifyConnection();
console.log(`Connection to ClamAV: ${isConnected ? 'successful' : 'failed'}`);
if (!isConnected) {
console.error('Could not connect to ClamAV daemon. Please check your configuration.');
return;
}
// Scan a text string
const testString = 'X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*';
const scanResult = await clamService.scanString(testString);
console.log('Scan Result:', scanResult);
}
main().catch(console.error);
```
**Breaking Down the Example:**
1. **Initialization**: We start by creating an instance of the `ClamAvService` class. It takes two optional parameters: the host and port where your ClamAV daemon is running. By default, it assumes `127.0.0.1` and `3310`.
2. **Verify Connection**: The `verifyConnection` method is called to ensure that our application can communicate with the ClamAV daemon. It returns a promise that resolves to `true` if the connection is successful, and `false` otherwise.
3. **Scan Strings**: We utilize the `scanString` method to scan a text string (in this example, the EICAR test virus string is used). This method converts the string to a buffer and sends it to the ClamAV daemon for scanning.
### Handling Buffers
Below is an example demonstrating scanning raw binary data in the form of buffers:
```typescript
import { ClamAvService } from '@push.rocks/smartantivirus';
async function scanBufferExample() {
const clamService = new ClamAvService();
// This buffer should represent the binary data you want to scan.
const buffer = Buffer.from('Sample buffer contents', 'utf8');
try {
const scanResult = await clamService.scanBuffer(buffer);
console.log('Buffer Scan Result:', scanResult);
} catch (error) {
console.error('Error scanning buffer:', error);
}
}
scanBufferExample();
```
**Explanation:**
- We create an instance of `ClamAvService`.
- A buffer is created and passed to the `scanBuffer` method, which scans the in-memory data for potential viruses.
### Error Handling and Debugging
The methods of `ClamAvService` throw errors if there are issues with communication or processing data. Wrap your code in try-catch blocks and use appropriate logging to handle errors gracefully.
```typescript
try {
const scanResult = await clamService.scanString('Some suspicious string...');
console.log(`Infection Status: ${scanResult.isInfected ? 'Infected' : 'Clean'}`);
if (scanResult.isInfected) {
console.log(`Reason: ${scanResult.reason}`);
}
} catch (error) {
console.error('An error occurred during the scanning process:', error);
}
```
### Testing your setup
A preconfigured test script is provided, which demonstrates how to use the package with the Tap bundle testing framework. You can find the test script in `test/test.ts`. This is configured to run with the default `@push.rocks/tapbundle` setup:
Or if you're using pnpm (recommended):
```bash
npm run test
pnpm add @push.rocks/smartantivirus
```
The tests include creating and utilizing a `ClamAvService` instance and attempts to scan the well-known EICAR test string. They ensure that the basic functionality of the package is working as intended.
## Quick Start 🏃‍♂️
### Advanced Usage and Integration
### The 5-Minute Setup
Beyond scanning strings and buffers, you can implement additional advanced use cases based on your specific application needs, such as integrating into web services or automating file scans in cloud environments. Consider building upon provided functionalities and adapting them to meet the requirements of your application architecture.
```typescript
import { ClamAvService } from '@push.rocks/smartantivirus';
With the help of Node.js worker threads or external task queues like RabbitMQ, you can distribute scanning tasks efficiently within high-traffic environments.
// That's it! The service automatically manages a Docker container
const scanner = new ClamAvService();
### Conclusion
// Scan a suspicious string
const result = await scanner.scanString('Is this text safe?');
console.log(result.isInfected ? '⚠️ Threat detected!' : '✅ All clear!');
`@push.rocks/smartantivirus` provides a simple yet effective way to incorporate antivirus checks into your Node.js applications, leveraging the robust ClamAV engine. With features like in-memory scanning and connection verification, you can seamlessly ensure your data security solutions are integrated into your application lifecycle.
// Scan a buffer
const fileBuffer = await fs.readFile('./upload.pdf');
const scanResult = await scanner.scanBuffer(fileBuffer);
```
## Core Concepts 💡
SmartAntivirus provides two main classes:
### 🎯 ClamAvService
The high-level interface for virus scanning. It handles all the complexity behind a simple, intuitive API.
### 🐳 ClamAVManager
Low-level Docker container management for advanced use cases. Most users won't need to interact with this directly.
## Real-World Examples 🌍
### Protecting File Uploads
```typescript
import { ClamAvService } from '@push.rocks/smartantivirus';
import express from 'express';
import multer from 'multer';
const app = express();
const scanner = new ClamAvService();
const upload = multer({ storage: multer.memoryStorage() });
app.post('/upload', upload.single('file'), async (req, res) => {
try {
// Scan the uploaded file buffer
const result = await scanner.scanBuffer(req.file.buffer);
if (result.isInfected) {
return res.status(400).json({
error: 'File rejected',
threat: result.reason
});
}
// File is safe, proceed with storage
await saveFile(req.file);
res.json({ message: 'File uploaded successfully' });
} catch (error) {
res.status(500).json({ error: 'Scan failed' });
}
});
```
### Streaming Large Files
Never load huge files into memory! Stream them instead:
```typescript
import { ClamAvService } from '@push.rocks/smartantivirus';
import { createReadStream } from 'fs';
const scanner = new ClamAvService();
async function scanLargeFile(filePath: string) {
const stream = createReadStream(filePath);
const result = await scanner.scanStream(stream);
if (result.isInfected) {
console.log(`🚨 Threat found: ${result.reason}`);
// Quarantine or delete the file
} else {
console.log('✅ File is clean');
}
}
```
### Scanning Remote Content
Perfect for proxies, CDNs, or content moderation:
```typescript
const scanner = new ClamAvService();
// Scan a file from a URL
const result = await scanner.scanFileFromWebAsStream('https://example.com/document.pdf');
// For browser environments using Web Streams API
async function scanInBrowser(url: string) {
const response = await fetch(url);
const webStream = response.body as ReadableStream<Uint8Array>;
if (webStream) {
const result = await scanner.scanWebStream(webStream);
return result;
}
}
```
### Advanced Container Management
For production environments requiring fine-grained control:
```typescript
import { ClamAVManager } from '@push.rocks/smartantivirus';
class AntivirusService {
private manager: ClamAVManager;
async initialize() {
this.manager = new ClamAVManager();
// Start the container
await this.manager.startContainer();
// Set up log monitoring
this.manager.on('log', (event) => {
if (event.type === 'error') {
console.error(`ClamAV Error: ${event.message}`);
// Send to your logging service
}
});
// Update virus definitions
await this.manager.updateDatabase();
// Get database info
const dbInfo = await this.manager.getDatabaseInfo();
console.log(`Virus DB Version: ${dbInfo}`);
}
async shutdown() {
await this.manager.stopContainer();
}
}
```
## Testing 🧪
We use the industry-standard EICAR test string for verification:
```typescript
import { ClamAvService } from '@push.rocks/smartantivirus';
const scanner = new ClamAvService();
// This is the EICAR test string - it's harmless but triggers antivirus
const EICAR = 'X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*';
const result = await scanner.scanString(EICAR);
console.log(result.isInfected); // true
console.log(result.reason); // 'Eicar-Test-Signature'
```
Run the test suite:
```bash
npm test
```
## API Reference 📚
### ClamAvService
#### Constructor
```typescript
new ClamAvService(host?: string, port?: number)
```
- `host` - ClamAV daemon host (default: '127.0.0.1')
- `port` - ClamAV daemon port (default: 3310)
#### Methods
##### `scanString(text: string): Promise<ScanResult>`
Scan a text string for threats.
##### `scanBuffer(buffer: Buffer): Promise<ScanResult>`
Scan binary data in a Buffer.
##### `scanStream(stream: NodeJS.ReadableStream): Promise<ScanResult>`
Scan a Node.js readable stream.
##### `scanWebStream(stream: ReadableStream<Uint8Array>): Promise<ScanResult>`
Scan a Web Streams API stream (browser-compatible).
##### `scanFileFromWebAsStream(url: string): Promise<ScanResult>`
Download and scan a file from a URL.
##### `verifyConnection(): Promise<boolean>`
Test the connection to ClamAV daemon.
#### ScanResult Type
```typescript
interface ScanResult {
isInfected: boolean;
reason?: string; // Threat name if infected
}
```
### ClamAVManager
Advanced container management for production deployments:
- `startContainer()` - Launch ClamAV in Docker
- `stopContainer()` - Gracefully shutdown
- `updateDatabase()` - Update virus definitions
- `getDatabaseInfo()` - Get current DB version
- `getLogs()` - Retrieve container logs
- Event: `'log'` - Real-time log streaming
## Production Considerations 🏭
### Performance Tips
1. **Reuse connections** - Create one `ClamAvService` instance and reuse it
2. **Stream large files** - Don't load them into memory
3. **Implement timeouts** - Protect against hanging scans
4. **Monitor logs** - Watch for database update failures
### Security Best Practices
- Run ClamAV container with limited resources
- Implement rate limiting on scan endpoints
- Log all detected threats for audit trails
- Regularly update virus definitions
- Use separate containers for different environments
### Deployment Options
#### Docker Compose
```yaml
services:
clamav:
image: clamav/clamav:latest
ports:
- "3310:3310"
volumes:
- clamav-db:/var/lib/clamav
```
#### Kubernetes
The service automatically manages containers, but you can also deploy ClamAV separately and connect directly to the daemon.
## Troubleshooting 🔧
### Common Issues
**Container won't start**
- Ensure Docker is running
- Check port 3310 isn't already in use
- Verify sufficient disk space for virus definitions
**Scans timing out**
- Large files may take time - implement appropriate timeouts
- Check container resources (CPU/Memory)
- Ensure virus database is not updating
**False positives**
- Some packers/obfuscators trigger detection
- Whitelist known-safe patterns if needed
- Keep virus definitions updated
## Contributing & Support 🤝
- 🐛 [Report Issues](https://code.foss.global/push.rocks/smartantivirus/issues)
- 📖 [Documentation](https://code.foss.global/push.rocks/smartantivirus)
- 💬 [Discussions](https://code.foss.global/push.rocks/smartantivirus/issues)
## License and Legal Information
This repository contains open-source code that is licensed under the MIT License. A copy of the MIT License can be found in the [license](license) file within this repository.
**Please note:** The MIT License does not grant permission to use the trade names, trademarks, service marks, or product names of the project, except as required for reasonable and customary use in describing the origin of the work and reproducing the content of the NOTICE file.
### Trademarks
This project is owned and maintained by Task Venture Capital GmbH. The names and logos associated with Task Venture Capital GmbH and any related products or services are trademarks of Task Venture Capital GmbH and are not included within the scope of the MIT license granted herein. Use of these trademarks must comply with Task Venture Capital GmbH's Trademark Guidelines, and any usage must be approved in writing by Task Venture Capital GmbH.
### Company Information
Task Venture Capital GmbH
Registered at District court Bremen HRB 35230 HB, Germany
For any legal inquiries or if you require further information, please contact us via email at hello@task.vc.
By using this repository, you acknowledge that you have read this section, agree to comply with its terms, and understand that the licensing of the code does not imply endorsement by Task Venture Capital GmbH of any derivative works.

View File

@@ -0,0 +1,90 @@
import { ClamAVManager } from '../../ts/classes.clamav.manager.js';
import { execAsync } from '../../ts/plugins.js';
let clamManager: ClamAVManager | null = null;
let isCleaningUp = false;
export async function getManager(): Promise<ClamAVManager> {
if (!clamManager) {
throw new Error('ClamAV manager not initialized');
}
return clamManager;
}
export async function setupClamAV(): Promise<ClamAVManager> {
console.log('[Helper] Setting up ClamAV...');
// First cleanup any existing containers
await forceCleanupContainer();
if (!clamManager) {
console.log('[Helper] Creating new ClamAV manager instance');
clamManager = new ClamAVManager();
await clamManager.startContainer();
console.log('[Helper] ClamAV manager initialized');
} else {
console.log('[Helper] Using existing ClamAV manager instance');
}
return clamManager;
}
export async function cleanupClamAV(): Promise<void> {
if (isCleaningUp) {
console.log('[Helper] Cleanup already in progress, skipping');
return;
}
isCleaningUp = true;
console.log('[Helper] Cleaning up ClamAV...');
try {
if (clamManager) {
await clamManager.stopContainer();
console.log('[Helper] ClamAV container stopped');
}
await forceCleanupContainer();
} catch (error) {
console.error('[Helper] Error during cleanup:', error);
throw error;
} finally {
clamManager = null;
isCleaningUp = false;
}
}
async function forceCleanupContainer(): Promise<void> {
try {
// Stop any existing container
await execAsync('docker stop clamav-daemon').catch(() => {});
// Remove any existing container
await execAsync('docker rm -f clamav-daemon').catch(() => {});
console.log('[Helper] Forced cleanup of existing containers complete');
} catch (error) {
// Ignore errors as the container might not exist
}
}
// Handle interrupts
process.on('SIGINT', async () => {
console.log('\n[Helper] Received SIGINT. Cleaning up...');
try {
await cleanupClamAV();
process.exit(0);
} catch (err) {
console.error('[Helper] Error during cleanup:', err);
process.exit(1);
}
});
// Ensure cleanup on process exit
process.on('exit', () => {
if (clamManager && !isCleaningUp) {
console.log('[Helper] Process exit detected, attempting cleanup');
// We can't use async functions in exit handler, so we do our best
try {
execAsync('docker stop clamav-daemon').catch(() => {});
execAsync('docker rm -f clamav-daemon').catch(() => {});
} catch {}
}
});

View File

@@ -0,0 +1,73 @@
import { expect, tap } from '@push.rocks/tapbundle';
import type { ClamAVLogEvent } from '../ts/classes.clamav.manager.js';
import { setupClamAV, cleanupClamAV, getManager } from './helpers/clamav.helper.js';
type ClamAVManager = Awaited<ReturnType<typeof setupClamAV>>;
let manager: ClamAVManager;
tap.test('setup', async () => {
manager = await setupClamAV();
expect(manager).toBeTruthy();
});
tap.test('should have initialized container and receive logs', async () => {
// Create a promise that resolves when we receive a log
const logPromise = new Promise<void>((resolve) => {
// First check if we already have logs
const existingLogs = manager.getLogs();
if (existingLogs.length > 0) {
console.log('[Test] Found existing logs:', existingLogs.map(log => `${log.type}: ${log.message}`).join('\n'));
resolve();
return;
}
// If no existing logs, wait for new ones
const handler = (event: ClamAVLogEvent) => {
console.log(`[Test] Received log event: ${event.type} - ${event.message}`);
manager.removeListener('log', handler);
resolve();
};
manager.on('log', handler);
});
// Wait for logs with timeout
const timeoutPromise = new Promise<void>((_, reject) => {
setTimeout(() => reject(new Error('Timeout waiting for logs')), 30000);
});
try {
await Promise.race([logPromise, timeoutPromise]);
} catch (error) {
console.error('Error waiting for logs:', error);
throw error;
}
console.log('Log received check passed');
// Verify container is running by checking if we can get database info
try {
const dbInfo = await manager.getDatabaseInfo();
expect(dbInfo).toBeTruthy();
console.log('Database info check passed');
} catch (error) {
console.error('Error getting database info:', error);
throw new Error('Failed to get database info - container may not be fully initialized');
}
});
tap.test('should get database info', async () => {
const dbInfo = await manager.getDatabaseInfo();
console.log('Database Info:', dbInfo);
expect(dbInfo).toBeTruthy();
});
tap.test('should update database', async () => {
await manager.updateDatabase();
});
tap.test('cleanup', async () => {
await cleanupClamAV();
});
tap.start();

View File

@@ -1,35 +1,40 @@
import { expect, expectAsync, tap } from '@push.rocks/tapbundle';
import { tap, expect } from '@push.rocks/tapbundle';
import * as smartantivirus from '../ts/index.js';
import { setupClamAV, cleanupClamAV } from './helpers/clamav.helper.js';
const EICAR_TEST_STRING = 'X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*';
let clamService: smartantivirus.ClamAvService;
tap.test('should create a ClamAvService instance', async () => {
clamService = new smartantivirus.ClamAvService();
expect(clamService).toBeDefined();
tap.test('setup', async () => {
await setupClamAV();
});
tap.test('should scan a string', async () => {
const scanResult = await clamService.scanString('X5O!P%@AP[4\PZX54(P^)7CC)7}' + '$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*');
tap.test('should create a ClamAvService instance and initialize ClamAV', async () => {
clamService = new smartantivirus.ClamAvService();
expect(clamService).toBeTruthy();
// The manager will start the container and wait for initialization
await clamService.verifyConnection();
});
tap.test('should detect EICAR test string', async () => {
const scanResult = await clamService.scanString(EICAR_TEST_STRING);
console.log('Scan Result:', scanResult);
// expect(scanResult).toEqual({ isInfected: true, reason: 'FOUND' });
expect(scanResult.isInfected).toEqual(true);
expect(scanResult.reason).toBeTruthy();
});
tap.test('should not detect clean string', async () => {
const scanResult = await clamService.scanString('This is a clean string with no virus signature');
console.log('Clean Scan Result:', scanResult);
expect(scanResult.isInfected).toEqual(false);
expect(scanResult.reason).toBeUndefined();
});
tap.test('cleanup', async () => {
await cleanupClamAV();
});
tap.start();
/* (async () => {
try {
await clamService.updateVirusDefinitions(); // Step 2: Update definitions
await clamService.startClamDaemon(); // Step 3: Start daemon
const scanResult = await clamService.scanString('EICAR test string...');
console.log('Scan Result:', scanResult);
} catch (error) {
console.error('Error:', error);
}
})(); */

View File

@@ -3,6 +3,6 @@
*/
export const commitinfo = {
name: '@push.rocks/smartantivirus',
version: '1.0.3',
description: 'A Node.js package for integrating antivirus scanning capabilities using ClamAV, allowing in-memory file and data scanning.'
version: '1.3.2',
description: 'A Node.js package providing integration with ClamAV for anti-virus scanning, facilitating both Docker containerized management and direct connection to a ClamAV daemon.'
}

View File

@@ -0,0 +1,281 @@
import { exec, spawn, net, promisify, EventEmitter, execAsync } from './plugins.js';
export interface ClamAVLogEvent {
timestamp: string;
message: string;
type: 'update' | 'scan' | 'system' | 'error';
}
export class ClamAVManager extends EventEmitter {
private containerId: string | null = null;
private containerName = 'clamav-daemon';
private imageTag = 'clamav/clamav:latest';
private port = 3310;
private logs: ClamAVLogEvent[] = [];
constructor() {
super();
}
public getLogs(): ClamAVLogEvent[] {
return this.logs;
}
/**
* Start the ClamAV container if it's not already running
*/
public async startContainer(): Promise<void> {
try {
console.log('[ClamAV] Starting container initialization...');
// Check if container is already running
const { stdout: psOutput } = await execAsync('docker ps --filter name=' + this.containerName);
if (psOutput.includes(this.containerName)) {
console.log('[ClamAV] Container is already running');
this.containerId = (await execAsync(`docker ps -q --filter name=${this.containerName}`)).stdout.trim();
console.log('[ClamAV] Container ID:', this.containerId);
this.attachLogWatcher();
await this.waitForInitialization();
return;
}
// Check if container exists but is stopped
const { stdout: psaOutput } = await execAsync('docker ps -a --filter name=' + this.containerName);
if (psaOutput.includes(this.containerName)) {
console.log('[ClamAV] Found stopped container, starting it...');
await execAsync(`docker start ${this.containerName}`);
this.containerId = (await execAsync(`docker ps -q --filter name=${this.containerName}`)).stdout.trim();
console.log('[ClamAV] Started existing container, ID:', this.containerId);
} else {
// Create and start new container
console.log('[ClamAV] Creating new container...');
const { stdout } = await execAsync(
`docker run -d --name ${this.containerName} -p ${this.port}:3310 ${this.imageTag}`
);
this.containerId = stdout.trim();
console.log('[ClamAV] Created new container, ID:', this.containerId);
}
this.attachLogWatcher();
console.log('[ClamAV] Waiting for initialization...');
await this.waitForInitialization();
console.log('[ClamAV] Container successfully initialized');
} catch (error) {
console.error('[ClamAV] Error starting container:', error);
throw error;
}
}
/**
* Stop the ClamAV container
*/
public async stopContainer(): Promise<void> {
if (!this.containerId) {
console.log('No ClamAV container is running');
return;
}
try {
await execAsync(`docker stop ${this.containerId}`);
console.log('Stopped ClamAV container');
} catch (error) {
console.error('Error stopping ClamAV container:', error);
throw error;
}
}
/**
* Manually trigger a database update
*/
public async updateDatabase(): Promise<void> {
if (!this.containerId) {
throw new Error('ClamAV container is not running');
}
try {
// First check if freshclam is already running
const { stdout: psOutput } = await execAsync(`docker exec ${this.containerId} ps aux | grep freshclam`);
if (psOutput.includes('/usr/local/sbin/freshclam -d')) {
console.log('Freshclam daemon is already running');
// Wait a bit to ensure database is updated
await new Promise(resolve => setTimeout(resolve, 2000));
return;
}
// If not running as daemon, try to update manually
const { stdout, stderr } = await execAsync(`docker exec ${this.containerId} freshclam --no-warnings`);
console.log('Database update output:', stdout);
if (stderr) {
console.error('Database update errors:', stderr);
}
} catch (error) {
// Check if the error is due to freshclam already running
if (error.stderr?.includes('ERROR: Problem with internal logger') ||
error.stdout?.includes('Resource temporarily unavailable')) {
console.log('Freshclam is already running, skipping manual update');
return;
}
console.error('Error updating ClamAV database:', error);
throw error;
}
}
/**
* Get the current database version information
*/
public async getDatabaseInfo(): Promise<string> {
if (!this.containerId) {
throw new Error('ClamAV container is not running');
}
try {
// Try both .cld and .cvd files since ClamAV can use either format
try {
const { stdout } = await execAsync(`docker exec ${this.containerId} sigtool --info /var/lib/clamav/daily.cld`);
return stdout;
} catch {
const { stdout } = await execAsync(`docker exec ${this.containerId} sigtool --info /var/lib/clamav/daily.cvd`);
return stdout;
}
} catch (error) {
console.error('Error getting database info:', error);
throw error;
}
}
/**
* Watch container logs and emit events for different types of log messages
*/
private attachLogWatcher(): void {
if (!this.containerId) return;
const logProcess = spawn('docker', ['logs', '-f', this.containerId]);
logProcess.stdout.on('data', (data) => {
const lines = data.toString().split('\n');
lines.forEach(line => {
if (!line.trim()) return;
const event: ClamAVLogEvent = {
timestamp: new Date().toISOString(),
message: line,
type: this.determineLogType(line)
};
this.logs.push(event);
this.emit('log', event);
console.log(`[ClamAV ${event.type}] ${event.message}`);
});
});
logProcess.stderr.on('data', (data) => {
const event: ClamAVLogEvent = {
timestamp: new Date().toISOString(),
message: data.toString(),
type: 'error'
};
this.logs.push(event);
this.emit('log', event);
console.error(`[ClamAV error] ${event.message}`);
});
logProcess.on('error', (error) => {
console.error('Error in log watcher:', error);
});
}
/**
* Determine the type of log message
*/
private determineLogType(logMessage: string): ClamAVLogEvent['type'] {
const lowerMessage = logMessage.toLowerCase();
if (lowerMessage.includes('update') || lowerMessage.includes('freshclam')) {
return 'update';
} else if (lowerMessage.includes('scan') || lowerMessage.includes('found')) {
return 'scan';
} else if (lowerMessage.includes('error') || lowerMessage.includes('warning')) {
return 'error';
}
return 'system';
}
/**
* Wait for ClamAV to initialize by checking both logs and service readiness
*/
private async waitForInitialization(): Promise<void> {
return new Promise((resolve, reject) => {
if (!this.containerId) {
reject(new Error('Container ID not set'));
return;
}
let timeout: NodeJS.Timeout;
let checkCount = 0;
const maxChecks = 60; // Check for 60 seconds
const startTime = Date.now();
// Check service readiness
const checkService = async () => {
try {
const elapsedTime = Math.round((Date.now() - startTime) / 1000);
console.log(`[ClamAV] Checking service readiness (attempt ${checkCount + 1}, ${elapsedTime}s elapsed)...`);
// First check if the service is accepting connections
const client = new net.Socket();
await new Promise<void>((resolveConn, rejectConn) => {
const connectTimeout = setTimeout(() => {
client.destroy();
rejectConn(new Error('Connection timeout'));
}, 1000);
client.connect(this.port, 'localhost', () => {
clearTimeout(connectTimeout);
client.end();
resolveConn();
});
client.on('error', (err) => {
clearTimeout(connectTimeout);
rejectConn(err);
});
});
// Verify the service is responding to commands
const { stdout } = await execAsync(`echo PING | nc localhost ${this.port}`);
if (!stdout.includes('PONG')) {
throw new Error('Service not responding to commands');
}
// If we can connect and get a PONG, the service is ready
console.log('[ClamAV] Service is accepting connections and responding to commands');
cleanup();
resolve();
} catch (error) {
// Service not ready yet, will retry
if (checkCount >= maxChecks) {
cleanup();
reject(new Error(`ClamAV initialization timed out after ${maxChecks} seconds. Last error: ${error.message}`));
return;
}
checkCount++;
}
};
const cleanup = () => {
clearTimeout(timeout);
clearInterval(serviceCheck);
};
const serviceCheck = setInterval(checkService, 1000);
timeout = setTimeout(() => {
cleanup();
reject(new Error('ClamAV initialization timed out after 60 seconds'));
}, 60000);
// Start initial service check
checkService();
});
}
}

187
ts/classes.clamavservice.ts Normal file
View File

@@ -0,0 +1,187 @@
import * as plugins from './plugins.js';
import * as paths from './paths.js';
import { net } from './plugins.js';
import { ClamAVManager } from './classes.clamav.manager.js';
export class ClamAvService {
private host: string;
private port: number;
private manager: ClamAVManager;
constructor(host: string = '127.0.0.1', port: number = 3310) {
this.host = host;
this.port = port;
this.manager = new ClamAVManager();
// Listen to ClamAV logs
this.manager.on('log', (event) => {
if (event.type === 'scan') {
console.log(`[ClamAV Scan] ${event.message}`);
}
});
}
private async ensureContainerStarted(): Promise<void> {
await this.manager.startContainer();
}
/**
* Scans an in-memory Buffer using ClamAV daemon's INSTREAM command.
*/
public async scanBuffer(buffer: Buffer): Promise<{ isInfected: boolean; reason?: string }> {
await this.ensureContainerStarted();
return new Promise((resolve, reject) => {
const client = new net.Socket();
client.connect(this.port, this.host, () => {
console.log('Connected to ClamAV daemon');
client.write('zINSTREAM\0'); // Start the INSTREAM command
const chunkSize = 1024;
let offset = 0;
// Send data in chunks
while (offset < buffer.length) {
const chunk = buffer.slice(offset, offset + chunkSize);
console.log('Sending chunk:', chunk.toString('utf8'));
const sizeBuf = Buffer.alloc(4);
sizeBuf.writeUInt32BE(chunk.length, 0);
client.write(sizeBuf);
client.write(chunk);
offset += chunkSize;
}
// Send end-of-stream signal
const endOfStream = Buffer.alloc(4);
endOfStream.writeUInt32BE(0, 0);
console.log('Sending end-of-stream signal');
client.write(endOfStream);
});
client.on('data', (data) => {
const response = data.toString();
console.log('Raw Response from ClamAV:', response);
const isInfected = response.includes('FOUND');
const reason = isInfected ? response.split('FOUND')[0].trim() : undefined;
resolve({ isInfected, reason });
client.end();
});
client.on('error', (err) => {
console.error('Error communicating with ClamAV:', err);
reject(err);
});
client.on('close', () => {
console.log('Connection to ClamAV daemon closed');
});
});
}
/**
* Scans a string by converting it to a Buffer and using scanBuffer.
*/
public async scanString(input: string): Promise<{ isInfected: boolean; reason?: string }> {
console.log('Scanning string:', input); // Debug the input string
const buffer = Buffer.from(input, 'utf8');
console.log('Converted buffer:', buffer.toString('utf8')); // Debug the converted buffer
return this.scanBuffer(buffer);
}
/**
* Verifies the ClamAV daemon is reachable.
*/
public async verifyConnection(): Promise<boolean> {
await this.ensureContainerStarted();
return new Promise((resolve, reject) => {
const client = new net.Socket();
client.connect(this.port, this.host, () => {
console.log('Successfully connected to ClamAV daemon');
client.end();
resolve(true);
});
client.on('error', (err) => {
console.error('Failed to connect to ClamAV daemon:', err);
reject(err);
});
});
}
/**
* Scans data from a NodeJS stream using ClamAV daemon's INSTREAM command.
*/
public async scanStream(stream: NodeJS.ReadableStream): Promise<{ isInfected: boolean; reason?: string }> {
await this.ensureContainerStarted();
return new Promise((resolve, reject) => {
const client = new net.Socket();
client.connect(this.port, this.host, () => {
console.log('Connected to ClamAV daemon for stream scanning');
client.write('zINSTREAM\0');
stream.on('data', (chunk: Buffer) => {
const buf = Buffer.isBuffer(chunk) ? chunk : Buffer.from(chunk);
const sizeBuf = Buffer.alloc(4);
sizeBuf.writeUInt32BE(buf.length, 0);
client.write(sizeBuf);
client.write(buf);
});
stream.on('end', () => {
const endOfStream = Buffer.alloc(4);
endOfStream.writeUInt32BE(0, 0);
console.log('Stream ended, sending end-of-stream signal');
client.write(endOfStream);
});
stream.on('error', (err) => {
console.error('Error reading stream:', err);
reject(err);
});
});
client.on('data', (data) => {
const response = data.toString();
console.log('Raw Response from ClamAV (stream):', response);
const isInfected = response.includes('FOUND');
const reason = isInfected ? response.split('FOUND')[0].trim() : undefined;
resolve({ isInfected, reason });
client.end();
});
client.on('error', (err) => {
console.error('Error with ClamAV stream scanning:', err);
reject(err);
});
});
}
/**
* Scans a file from a web URL as a stream using ClamAV daemon's INSTREAM command.
*/
public async scanFileFromWebAsStream(url: string): Promise<{ isInfected: boolean; reason?: string }> {
return new Promise((resolve, reject) => {
const protocol = url.startsWith('https') ? plugins.https : plugins.http;
protocol.get(url, (response) => {
this.scanStream(response).then(resolve).catch(reject);
}).on('error', (err) => {
console.error('Error fetching URL:', err);
reject(err);
});
});
}
/**
* Scans a web resource by URL using ClamAV daemon's INSTREAM command.
*/
public async scanWebStream(webstreamArg: ReadableStream): Promise<{ isInfected: boolean; reason?: string }> {
// Convert the web ReadableStream to a NodeJS ReadableStream
const nodeStream = plugins.smartstream.nodewebhelpers.convertWebReadableToNodeReadable(webstreamArg);
return this.scanStream(nodeStream);
}
}

View File

@@ -1,103 +0,0 @@
import * as plugins from './plugins.js';
import * as paths from './paths.js';
import { exec } from 'child_process';
import net from 'net';
import { promisify } from 'util';
const execAsync = promisify(exec);
export class ClamAvService {
private host: string;
private port: number;
constructor(host: string = '127.0.0.1', port: number = 3310) {
this.host = host;
this.port = port;
}
/**
* Scans an in-memory Buffer using ClamAV daemon's INSTREAM command.
*/
public async scanBuffer(buffer: Buffer): Promise<{ isInfected: boolean; reason?: string }> {
return new Promise((resolve, reject) => {
const client = new net.Socket();
client.connect(this.port, this.host, () => {
console.log('Connected to ClamAV daemon');
client.write('zINSTREAM\0'); // Start the INSTREAM command
const chunkSize = 1024;
let offset = 0;
// Send data in chunks
while (offset < buffer.length) {
const chunk = buffer.slice(offset, offset + chunkSize);
console.log('Sending chunk:', chunk.toString('utf8'));
const sizeBuf = Buffer.alloc(4);
sizeBuf.writeUInt32BE(chunk.length, 0);
client.write(sizeBuf);
client.write(chunk);
offset += chunkSize;
}
// Send end-of-stream signal
const endOfStream = Buffer.alloc(4);
endOfStream.writeUInt32BE(0, 0);
console.log('Sending end-of-stream signal');
client.write(endOfStream);
});
client.on('data', (data) => {
const response = data.toString();
console.log('Raw Response from ClamAV:', response);
const isInfected = response.includes('FOUND');
const reason = isInfected ? response.split('FOUND')[0].trim() : undefined;
resolve({ isInfected, reason });
client.end();
});
client.on('error', (err) => {
console.error('Error communicating with ClamAV:', err);
reject(err);
});
client.on('close', () => {
console.log('Connection to ClamAV daemon closed');
});
});
}
/**
* Scans a string by converting it to a Buffer and using scanBuffer.
*/
public async scanString(input: string): Promise<{ isInfected: boolean; reason?: string }> {
console.log('Scanning string:', input); // Debug the input string
const buffer = Buffer.from(input, 'utf8');
console.log('Converted buffer:', buffer.toString('utf8')); // Debug the converted buffer
return this.scanBuffer(buffer);
}
/**
* Verifies the ClamAV daemon is reachable.
*/
public async verifyConnection(): Promise<boolean> {
return new Promise((resolve, reject) => {
const client = new net.Socket();
client.connect(this.port, this.host, () => {
console.log('Successfully connected to ClamAV daemon');
client.end();
resolve(true);
});
client.on('error', (err) => {
console.error('Failed to connect to ClamAV daemon:', err);
reject(err);
});
});
}
}

View File

@@ -1 +1,2 @@
export * from './classes.smartantivirus.js';
export * from './classes.clamavservice.js';
export * from './classes.clamav.manager.js';

View File

@@ -1,24 +1,42 @@
// node native scope
// Node.js built-in modules
import * as fs from 'fs';
import * as path from 'path';
import { exec, spawn } from 'child_process';
import { promisify } from 'util';
import { EventEmitter } from 'events';
import net from 'net';
import * as http from 'http';
import * as https from 'https';
export {
fs,
path,
}
exec,
spawn,
promisify,
EventEmitter,
net,
http,
https
};
// @push.rocks scope
import * as smartpath from '@push.rocks/smartpath';
import * as smartfile from '@push.rocks/smartfile';
import * as smartstream from '@push.rocks/smartstream';
export {
smartpath,
smartfile,
}
smartstream,
};
// third party scope
// Third party scope
import axios from 'axios';
export {
axios,
}
axios
};
// Common utilities
export const execAsync = promisify(exec);