Compare commits
14 Commits
Author | SHA1 | Date | |
---|---|---|---|
2302632f11 | |||
a8c36a64b7 | |||
a810338cc4 | |||
c5049d5155 | |||
6ddcfc8d90 | |||
a2d8d1cbfd | |||
6adfcc2201 | |||
6300843616 | |||
8acfedd7f3 | |||
3ef7d69380 | |||
4266d76319 | |||
4446f265cb | |||
e31e7cca44 | |||
a19638b476 |
BIN
.serena/cache/typescript/document_symbols_cache_v23-06-25.pkl
vendored
Normal file
BIN
.serena/cache/typescript/document_symbols_cache_v23-06-25.pkl
vendored
Normal file
Binary file not shown.
35
.serena/memories/code_style_conventions.md
Normal file
35
.serena/memories/code_style_conventions.md
Normal file
@@ -0,0 +1,35 @@
|
||||
# Code Style and Conventions
|
||||
|
||||
## Naming Conventions
|
||||
- **Interfaces**: Prefix with `I` (e.g., `IUserData`)
|
||||
- **Types**: Prefix with `T` (e.g., `TResponseType`)
|
||||
- **Files**: Always lowercase (e.g., `classes.clamavservice.ts`)
|
||||
- **Classes**: PascalCase (e.g., `ClamAvService`)
|
||||
- **Methods/Functions**: camelCase (e.g., `scanBuffer`)
|
||||
- Avoid ENums when possible
|
||||
|
||||
## TypeScript Patterns
|
||||
- TypeScript-first approach with full type safety
|
||||
- ES modules (type: "module" in package.json)
|
||||
- Import dependencies in `ts/plugins.ts`
|
||||
- Reference with full path: `plugins.myModule.myClass()`
|
||||
|
||||
## File Organization
|
||||
- Source code in `ts/` directory
|
||||
- Tests in `test/` directory
|
||||
- Distribution in `dist_ts/` directory
|
||||
- Use `.js` extensions in imports for ES modules
|
||||
|
||||
## Testing Patterns
|
||||
- Use @git.zone/tstest framework
|
||||
- Import expect from @push.rocks/tapbundle
|
||||
- Test files end with `export default tap.start()`
|
||||
- Test naming: `*.both.ts`, `*.node.ts`, `*.browser.ts`
|
||||
- EICAR test string for antivirus verification
|
||||
|
||||
## General Principles
|
||||
- Make RAZOR SHARP changes - every modification must be goal-oriented
|
||||
- Improve elegance - changes should enhance clarity and maintainability
|
||||
- Preserve necessary complexity - don't oversimplify
|
||||
- Keep async patterns - maintain Promises where they add value
|
||||
- Remove redundancy carefully while preserving functionality
|
31
.serena/memories/project_overview.md
Normal file
31
.serena/memories/project_overview.md
Normal file
@@ -0,0 +1,31 @@
|
||||
# SmartAntivirus Project Overview
|
||||
|
||||
## Purpose
|
||||
SmartAntivirus (@push.rocks/smartantivirus) is a Node.js/TypeScript library that provides enterprise-grade antivirus scanning capabilities by integrating with ClamAV. It allows developers to scan files, buffers, strings, and streams for viruses in their applications.
|
||||
|
||||
## Tech Stack
|
||||
- TypeScript (primary language)
|
||||
- Node.js (runtime)
|
||||
- ClamAV (antivirus engine)
|
||||
- Docker (for containerized ClamAV deployment)
|
||||
- Testing: @git.zone/tstest with @push.rocks/tapbundle
|
||||
- Build: @git.zone/tsbuild
|
||||
|
||||
## Architecture
|
||||
- **ClamAvService**: High-level interface for virus scanning operations
|
||||
- Scan strings, buffers, Node.js streams, and Web Streams
|
||||
- Auto-manages Docker container if needed
|
||||
- Connects to ClamAV daemon on port 3310
|
||||
|
||||
- **ClamAVManager**: Low-level Docker container management
|
||||
- Handles container lifecycle (start/stop)
|
||||
- Updates virus definitions
|
||||
- Provides log monitoring
|
||||
|
||||
## Key Features
|
||||
- In-memory scanning without disk I/O
|
||||
- Stream processing for large files
|
||||
- TypeScript-first with full type safety
|
||||
- Zero-config with sensible defaults
|
||||
- Auto-updating virus definitions
|
||||
- Docker-based or direct daemon connection
|
31
.serena/memories/suggested_commands.md
Normal file
31
.serena/memories/suggested_commands.md
Normal file
@@ -0,0 +1,31 @@
|
||||
# Suggested Commands for SmartAntivirus Development
|
||||
|
||||
## Build & Test Commands
|
||||
- `pnpm test` - Run test suite with tapbundle
|
||||
- `pnpm build` - Build TypeScript to JavaScript (uses tsbuild)
|
||||
- `pnpm run buildDocs` - Generate documentation (tsdoc)
|
||||
|
||||
## Development Tools
|
||||
- `tsbuild check test/**/* --skiplibcheck` - Type-check test files
|
||||
- `tsx test/test.ts` - Run individual test file directly
|
||||
|
||||
## Version Control
|
||||
- `git mv <old> <new>` - Move/rename files preserving history
|
||||
- `git status` - Check current changes
|
||||
- `git diff` - View uncommitted changes
|
||||
|
||||
## Package Management
|
||||
- `pnpm install` - Install dependencies
|
||||
- `pnpm install --save-dev <package>` - Add dev dependency
|
||||
- `pnpm add <package>` - Add production dependency
|
||||
|
||||
## File Operations
|
||||
- `ls` - List directory contents
|
||||
- `cat <file>` - View file contents
|
||||
- `find . -name "*.ts"` - Find TypeScript files
|
||||
- `rg <pattern>` - Search codebase with ripgrep
|
||||
|
||||
## Docker Management (if testing locally)
|
||||
- `docker ps` - List running containers
|
||||
- `docker logs clamav` - View ClamAV container logs
|
||||
- `docker stop clamav` - Stop ClamAV container
|
44
.serena/memories/task_completion_workflow.md
Normal file
44
.serena/memories/task_completion_workflow.md
Normal file
@@ -0,0 +1,44 @@
|
||||
# Task Completion Workflow
|
||||
|
||||
## Required Steps After Making Code Changes
|
||||
|
||||
1. **Build the Project**
|
||||
```bash
|
||||
pnpm build
|
||||
```
|
||||
Ensures TypeScript compiles without errors
|
||||
|
||||
2. **Run Tests**
|
||||
```bash
|
||||
pnpm test
|
||||
```
|
||||
Verifies functionality with test suite
|
||||
|
||||
3. **Type Check Test Files** (if tests were modified)
|
||||
```bash
|
||||
tsbuild check test/**/* --skiplibcheck
|
||||
```
|
||||
|
||||
## Quality Checks
|
||||
- Verify no TypeScript compilation errors
|
||||
- Ensure all tests pass
|
||||
- Check that new code follows existing patterns
|
||||
- Verify imports use `.js` extensions for ES modules
|
||||
- Confirm no hardcoded values that should be configurable
|
||||
|
||||
## Documentation Updates
|
||||
- Update readme.md if API changes
|
||||
- Add JSDoc comments for new public methods
|
||||
- Update changelog.md for version changes
|
||||
|
||||
## Before Committing
|
||||
- NEVER commit without explicit user approval
|
||||
- Use `git status` to review changes
|
||||
- Use `git diff` to verify modifications
|
||||
- Create focused commits with clear messages
|
||||
- Never commit secrets or API keys
|
||||
|
||||
## Important Notes
|
||||
- The project uses pnpm exclusively (not npm or yarn)
|
||||
- Always read documentation before using unfamiliar APIs
|
||||
- Check existing code patterns before implementing new features
|
68
.serena/project.yml
Normal file
68
.serena/project.yml
Normal file
@@ -0,0 +1,68 @@
|
||||
# language of the project (csharp, python, rust, java, typescript, go, cpp, or ruby)
|
||||
# * For C, use cpp
|
||||
# * For JavaScript, use typescript
|
||||
# Special requirements:
|
||||
# * csharp: Requires the presence of a .sln file in the project folder.
|
||||
language: typescript
|
||||
|
||||
# whether to use the project's gitignore file to ignore files
|
||||
# Added on 2025-04-07
|
||||
ignore_all_files_in_gitignore: true
|
||||
# list of additional paths to ignore
|
||||
# same syntax as gitignore, so you can use * and **
|
||||
# Was previously called `ignored_dirs`, please update your config if you are using that.
|
||||
# Added (renamed) on 2025-04-07
|
||||
ignored_paths: []
|
||||
|
||||
# whether the project is in read-only mode
|
||||
# If set to true, all editing tools will be disabled and attempts to use them will result in an error
|
||||
# Added on 2025-04-18
|
||||
read_only: false
|
||||
|
||||
|
||||
# list of tool names to exclude. We recommend not excluding any tools, see the readme for more details.
|
||||
# Below is the complete list of tools for convenience.
|
||||
# To make sure you have the latest list of tools, and to view their descriptions,
|
||||
# execute `uv run scripts/print_tool_overview.py`.
|
||||
#
|
||||
# * `activate_project`: Activates a project by name.
|
||||
# * `check_onboarding_performed`: Checks whether project onboarding was already performed.
|
||||
# * `create_text_file`: Creates/overwrites a file in the project directory.
|
||||
# * `delete_lines`: Deletes a range of lines within a file.
|
||||
# * `delete_memory`: Deletes a memory from Serena's project-specific memory store.
|
||||
# * `execute_shell_command`: Executes a shell command.
|
||||
# * `find_referencing_code_snippets`: Finds code snippets in which the symbol at the given location is referenced.
|
||||
# * `find_referencing_symbols`: Finds symbols that reference the symbol at the given location (optionally filtered by type).
|
||||
# * `find_symbol`: Performs a global (or local) search for symbols with/containing a given name/substring (optionally filtered by type).
|
||||
# * `get_current_config`: Prints the current configuration of the agent, including the active and available projects, tools, contexts, and modes.
|
||||
# * `get_symbols_overview`: Gets an overview of the top-level symbols defined in a given file.
|
||||
# * `initial_instructions`: Gets the initial instructions for the current project.
|
||||
# Should only be used in settings where the system prompt cannot be set,
|
||||
# e.g. in clients you have no control over, like Claude Desktop.
|
||||
# * `insert_after_symbol`: Inserts content after the end of the definition of a given symbol.
|
||||
# * `insert_at_line`: Inserts content at a given line in a file.
|
||||
# * `insert_before_symbol`: Inserts content before the beginning of the definition of a given symbol.
|
||||
# * `list_dir`: Lists files and directories in the given directory (optionally with recursion).
|
||||
# * `list_memories`: Lists memories in Serena's project-specific memory store.
|
||||
# * `onboarding`: Performs onboarding (identifying the project structure and essential tasks, e.g. for testing or building).
|
||||
# * `prepare_for_new_conversation`: Provides instructions for preparing for a new conversation (in order to continue with the necessary context).
|
||||
# * `read_file`: Reads a file within the project directory.
|
||||
# * `read_memory`: Reads the memory with the given name from Serena's project-specific memory store.
|
||||
# * `remove_project`: Removes a project from the Serena configuration.
|
||||
# * `replace_lines`: Replaces a range of lines within a file with new content.
|
||||
# * `replace_symbol_body`: Replaces the full definition of a symbol.
|
||||
# * `restart_language_server`: Restarts the language server, may be necessary when edits not through Serena happen.
|
||||
# * `search_for_pattern`: Performs a search for a pattern in the project.
|
||||
# * `summarize_changes`: Provides instructions for summarizing the changes made to the codebase.
|
||||
# * `switch_modes`: Activates modes by providing a list of their names
|
||||
# * `think_about_collected_information`: Thinking tool for pondering the completeness of collected information.
|
||||
# * `think_about_task_adherence`: Thinking tool for determining whether the agent is still on track with the current task.
|
||||
# * `think_about_whether_you_are_done`: Thinking tool for determining whether the task is truly completed.
|
||||
# * `write_memory`: Writes a named memory (for future reference) to Serena's project-specific memory store.
|
||||
excluded_tools: []
|
||||
|
||||
# initial prompt for the project. It will always be given to the LLM upon activating the project
|
||||
# (contrary to the memories, which are loaded on demand).
|
||||
initial_prompt: ""
|
||||
|
||||
project_name: "smartantivirus"
|
52
changelog.md
52
changelog.md
@@ -1,5 +1,57 @@
|
||||
# Changelog
|
||||
|
||||
## 2025-08-16 - 1.3.2 - fix(build)
|
||||
Bump dependencies, improve test/build scripts, expand documentation and add project metadata
|
||||
|
||||
- Updated devDependencies: bumped @git.zone/tsbuild, @git.zone/tsbundle, @git.zone/tstest, @push.rocks/tapbundle, @types/node and typescript to newer versions.
|
||||
- Updated runtime dependencies: bumped @push.rocks/smartfile, @push.rocks/smartpath and axios; tar version updated.
|
||||
- Adjusted npm scripts: test now runs with '(tstest test/ --web --verbose --logfile --timeout 120)'; build and docs scripts unchanged in behavior.
|
||||
- Added packageManager entry (pnpm) and a pnpm-workspace.yaml with onlyBuiltDependencies configured.
|
||||
- Expanded and rewrote README with detailed quick start, examples, API reference and troubleshooting guidance.
|
||||
- Added local assistant/IDE metadata and memories (.claude/settings.local.json and .serena/*) to aid development tooling and project onboarding.
|
||||
|
||||
## 2025-02-07 - 1.3.1 - fix(core)
|
||||
Updated descriptions and keywords in package.json and npmextra.json. Improved README content for usage clarity.
|
||||
|
||||
- Revised package.json description and keywords to better represent the project's features.
|
||||
- Enhanced npmextra.json with updated module attributes.
|
||||
- Improved README with clearer instructions and examples for using ClamAVManager and ClamAvService.
|
||||
- Fixed incorrect import path in test.clamav.manager.ts.
|
||||
|
||||
## 2025-02-05 - 1.3.0 - feat(ClamAvService)
|
||||
Add support for enhanced streaming methods in ClamAvService
|
||||
|
||||
- Add methods to ClamAvService: scanStream for NodeJS streams, scanWebStream for Web API streams, and scanFileFromWebAsStream for fetching and scanning files from URLs.
|
||||
- Update usage examples in readme for new streaming methods.
|
||||
|
||||
## 2025-02-05 - 1.2.0 - feat(ClamAvService)
|
||||
Add stream scanning methods to ClamAvService
|
||||
|
||||
- Added scanStream method to support scanning NodeJS streams directly.
|
||||
- Introduced scanWebStream method for scanning web resources as streams.
|
||||
- Integrated stream scanning into existing ClamAvService class.
|
||||
|
||||
## 2025-02-03 - 1.1.2 - fix(documentation)
|
||||
Update readme with additional legal and trademark information
|
||||
|
||||
- Added legal information related to licensing and trademarks
|
||||
- Provided company details of Task Venture Capital GmbH
|
||||
|
||||
## 2025-02-03 - 1.1.1 - fix(clamav.manager)
|
||||
Improve log handling and add timeout for log reception in ClamAV manager tests
|
||||
|
||||
- Refined the log receiving mechanism in ClamAV manager tests to use promises for better control over log receipt timing.
|
||||
- Introduced a timeout mechanism in the log receiving test case to avoid indefinite waiting.
|
||||
- Fixed the test case setup to accurately reflect log receipt and database information verification.
|
||||
|
||||
## 2025-02-03 - 1.1.0 - feat(ClamAvService)
|
||||
Add ClamAV Manager with Docker container management capabilities.
|
||||
|
||||
- Introduced ClamAVManager class to manage ClamAV Docker containers.
|
||||
- Implemented startContainer and stopContainer methods in ClamAVManager.
|
||||
- Integrated ClamAVManager into ClamAvService for managing container lifecycle.
|
||||
- Added ClamAVManager test setups and helpers in test suite.
|
||||
|
||||
## 2025-01-10 - 1.0.4 - fix(documentation)
|
||||
Removed redundant conclusion section in readme.
|
||||
|
||||
|
@@ -5,21 +5,23 @@
|
||||
"githost": "code.foss.global",
|
||||
"gitscope": "push.rocks",
|
||||
"gitrepo": "smartantivirus",
|
||||
"description": "A Node.js package for integrating antivirus scanning capabilities using ClamAV, allowing in-memory file and data scanning.",
|
||||
"description": "A Node.js package providing integration with ClamAV for anti-virus scanning, facilitating both Docker containerized management and direct connection to a ClamAV daemon.",
|
||||
"npmPackagename": "@push.rocks/smartantivirus",
|
||||
"license": "MIT",
|
||||
"projectDomain": "push.rocks",
|
||||
"keywords": [
|
||||
"antivirus",
|
||||
"ClamAV",
|
||||
"Node.js",
|
||||
"ClamAV",
|
||||
"virus scanning",
|
||||
"security",
|
||||
"buffer scanning",
|
||||
"Docker",
|
||||
"in-memory scanning",
|
||||
"file scanning",
|
||||
"stream scanning",
|
||||
"data protection",
|
||||
"HTTP requests",
|
||||
"file handling",
|
||||
"network communication",
|
||||
"network security",
|
||||
"buffer scanning",
|
||||
"software testing"
|
||||
]
|
||||
}
|
||||
|
39
package.json
39
package.json
@@ -1,30 +1,32 @@
|
||||
{
|
||||
"name": "@push.rocks/smartantivirus",
|
||||
"version": "1.0.4",
|
||||
"version": "1.3.2",
|
||||
"private": false,
|
||||
"description": "A Node.js package for integrating antivirus scanning capabilities using ClamAV, allowing in-memory file and data scanning.",
|
||||
"description": "A Node.js package providing integration with ClamAV for anti-virus scanning, facilitating both Docker containerized management and direct connection to a ClamAV daemon.",
|
||||
"main": "dist_ts/index.js",
|
||||
"typings": "dist_ts/index.d.ts",
|
||||
"type": "module",
|
||||
"author": "Task Venture Capital GmbH",
|
||||
"license": "MIT",
|
||||
"scripts": {
|
||||
"test": "(tstest test/ --web)",
|
||||
"test": "(tstest test/ --web --verbose --logfile --timeout 120)",
|
||||
"build": "(tsbuild --web --allowimplicitany)",
|
||||
"buildDocs": "(tsdoc)"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@git.zone/tsbuild": "^2.1.25",
|
||||
"@git.zone/tsbundle": "^2.0.5",
|
||||
"@git.zone/tsbuild": "^2.6.4",
|
||||
"@git.zone/tsbundle": "^2.5.1",
|
||||
"@git.zone/tsrun": "^1.2.46",
|
||||
"@git.zone/tstest": "^1.0.44",
|
||||
"@push.rocks/tapbundle": "^5.0.15",
|
||||
"@types/node": "^20.8.7"
|
||||
"@git.zone/tstest": "^2.3.4",
|
||||
"@push.rocks/tapbundle": "^6.0.3",
|
||||
"@types/node": "^24.3.0",
|
||||
"typescript": "^5.9.2"
|
||||
},
|
||||
"dependencies": {
|
||||
"@push.rocks/smartfile": "^11.1.5",
|
||||
"@push.rocks/smartpath": "^5.0.18",
|
||||
"axios": "^1.7.9",
|
||||
"@push.rocks/smartfile": "^11.2.5",
|
||||
"@push.rocks/smartpath": "^6.0.0",
|
||||
"@push.rocks/smartstream": "^3.2.5",
|
||||
"axios": "^1.11.0",
|
||||
"tar": "^7.4.3"
|
||||
},
|
||||
"repository": {
|
||||
@@ -49,15 +51,18 @@
|
||||
],
|
||||
"keywords": [
|
||||
"antivirus",
|
||||
"ClamAV",
|
||||
"Node.js",
|
||||
"ClamAV",
|
||||
"virus scanning",
|
||||
"security",
|
||||
"buffer scanning",
|
||||
"Docker",
|
||||
"in-memory scanning",
|
||||
"file scanning",
|
||||
"stream scanning",
|
||||
"data protection",
|
||||
"HTTP requests",
|
||||
"file handling",
|
||||
"network communication",
|
||||
"network security",
|
||||
"buffer scanning",
|
||||
"software testing"
|
||||
]
|
||||
],
|
||||
"packageManager": "pnpm@10.14.0+sha512.ad27a79641b49c3e481a16a805baa71817a04bbe06a38d17e60e2eaee83f6a146c6a688125f5792e48dd5ba30e7da52a5cda4c3992b9ccf333f9ce223af84748"
|
||||
}
|
||||
|
5000
pnpm-lock.yaml
generated
5000
pnpm-lock.yaml
generated
File diff suppressed because it is too large
Load Diff
4
pnpm-workspace.yaml
Normal file
4
pnpm-workspace.yaml
Normal file
@@ -0,0 +1,4 @@
|
||||
onlyBuiltDependencies:
|
||||
- esbuild
|
||||
- mongodb-memory-server
|
||||
- puppeteer
|
412
readme.md
412
readme.md
@@ -1,120 +1,322 @@
|
||||
# @push.rocks/smartantivirus
|
||||
# @push.rocks/smartantivirus 🛡️
|
||||
|
||||
A package for performing antivirus testing, especially suitable for use with ClamAV.
|
||||
**Enterprise-grade antivirus scanning for Node.js applications** - Seamlessly integrate ClamAV's powerful virus detection into your TypeScript/JavaScript projects with zero hassle.
|
||||
|
||||
## Why SmartAntivirus? 🚀
|
||||
|
||||
In today's digital landscape, security is paramount. Whether you're building a file-sharing platform, processing user uploads, or handling sensitive data streams, you need reliable virus protection that just works. SmartAntivirus gives you:
|
||||
|
||||
- **🐳 Docker-based or Direct Connection** - Choose your deployment style
|
||||
- **⚡ In-memory Scanning** - Lightning-fast scanning without disk I/O
|
||||
- **🌊 Stream Processing** - Scan data on-the-fly as it flows through your app
|
||||
- **🎯 TypeScript First** - Full type safety and IntelliSense support
|
||||
- **📦 Zero Config** - Works out of the box with sensible defaults
|
||||
- **🔄 Auto-updating** - Virus definitions stay current automatically
|
||||
|
||||
## Install
|
||||
|
||||
Installing `@push.rocks/smartantivirus` is straightforward. You'll need Node.js and npm installed on your machine to get started. Once they are ready, you can add the `@push.rocks/smartantivirus` package to your project by running the following command:
|
||||
|
||||
```bash
|
||||
npm install @push.rocks/smartantivirus
|
||||
```
|
||||
|
||||
This will add the package to your project's dependencies and allow you to integrate antivirus scanning capabilities directly into your application.
|
||||
|
||||
## Usage
|
||||
|
||||
The `@push.rocks/smartantivirus` package provides tools to easily integrate antivirus scanning capabilities into your Node.js application by interfacing with the ClamAV daemon. Below is a comprehensive guide on how to use the features of this library.
|
||||
|
||||
### Setting Up the ClamAV Daemon
|
||||
|
||||
Before using this package, make sure you have ClamAV installed and running on your system. You can find installation instructions for various operating systems on the [ClamAV official website](https://www.clamav.net/documents/installing-clamav).
|
||||
|
||||
After installing ClamAV, start the ClamAV daemon (`clamd`). Make sure it is configured to listen on a port accessible to your Node.js application. You can configure this in the `clamd.conf` file, typically located in `/etc/clamav/clamd.conf`.
|
||||
|
||||
### Basic Usage
|
||||
|
||||
The primary interface provided by the package is the `ClamAvService` class. It allows you to scan data in memory or verify the connection to the ClamAV daemon.
|
||||
|
||||
```typescript
|
||||
import { ClamAvService } from '@push.rocks/smartantivirus';
|
||||
|
||||
async function main() {
|
||||
const clamService = new ClamAvService('127.0.0.1', 3310); // Replace with your ClamAV host and port
|
||||
|
||||
// Verify connection to ClamAV
|
||||
const isConnected = await clamService.verifyConnection();
|
||||
console.log(`Connection to ClamAV: ${isConnected ? 'successful' : 'failed'}`);
|
||||
|
||||
if (!isConnected) {
|
||||
console.error('Could not connect to ClamAV daemon. Please check your configuration.');
|
||||
return;
|
||||
}
|
||||
|
||||
// Scan a text string
|
||||
const testString = 'X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*';
|
||||
const scanResult = await clamService.scanString(testString);
|
||||
console.log('Scan Result:', scanResult);
|
||||
}
|
||||
|
||||
main().catch(console.error);
|
||||
```
|
||||
|
||||
**Breaking Down the Example:**
|
||||
|
||||
1. **Initialization**: We start by creating an instance of the `ClamAvService` class. It takes two optional parameters: the host and port where your ClamAV daemon is running. By default, it assumes `127.0.0.1` and `3310`.
|
||||
|
||||
2. **Verify Connection**: The `verifyConnection` method is called to ensure that our application can communicate with the ClamAV daemon. It returns a promise that resolves to `true` if the connection is successful, and `false` otherwise.
|
||||
|
||||
3. **Scan Strings**: We utilize the `scanString` method to scan a text string (in this example, the EICAR test virus string is used). This method converts the string to a buffer and sends it to the ClamAV daemon for scanning.
|
||||
|
||||
### Handling Buffers
|
||||
|
||||
Below is an example demonstrating scanning raw binary data in the form of buffers:
|
||||
|
||||
```typescript
|
||||
import { ClamAvService } from '@push.rocks/smartantivirus';
|
||||
|
||||
async function scanBufferExample() {
|
||||
const clamService = new ClamAvService();
|
||||
|
||||
// This buffer should represent the binary data you want to scan.
|
||||
const buffer = Buffer.from('Sample buffer contents', 'utf8');
|
||||
|
||||
try {
|
||||
const scanResult = await clamService.scanBuffer(buffer);
|
||||
console.log('Buffer Scan Result:', scanResult);
|
||||
} catch (error) {
|
||||
console.error('Error scanning buffer:', error);
|
||||
}
|
||||
}
|
||||
|
||||
scanBufferExample();
|
||||
```
|
||||
|
||||
**Explanation:**
|
||||
|
||||
- We create an instance of `ClamAvService`.
|
||||
- A buffer is created and passed to the `scanBuffer` method, which scans the in-memory data for potential viruses.
|
||||
|
||||
### Error Handling and Debugging
|
||||
|
||||
The methods of `ClamAvService` throw errors if there are issues with communication or processing data. Wrap your code in try-catch blocks and use appropriate logging to handle errors gracefully.
|
||||
|
||||
```typescript
|
||||
try {
|
||||
const scanResult = await clamService.scanString('Some suspicious string...');
|
||||
console.log(`Infection Status: ${scanResult.isInfected ? 'Infected' : 'Clean'}`);
|
||||
if (scanResult.isInfected) {
|
||||
console.log(`Reason: ${scanResult.reason}`);
|
||||
}
|
||||
} catch (error) {
|
||||
console.error('An error occurred during the scanning process:', error);
|
||||
}
|
||||
```
|
||||
|
||||
### Testing your setup
|
||||
|
||||
A preconfigured test script is provided, which demonstrates how to use the package with the Tap bundle testing framework. You can find the test script in `test/test.ts`. This is configured to run with the default `@push.rocks/tapbundle` setup:
|
||||
Or if you're using pnpm (recommended):
|
||||
|
||||
```bash
|
||||
npm run test
|
||||
pnpm add @push.rocks/smartantivirus
|
||||
```
|
||||
|
||||
The tests include creating and utilizing a `ClamAvService` instance and attempts to scan the well-known EICAR test string. They ensure that the basic functionality of the package is working as intended.
|
||||
## Quick Start 🏃♂️
|
||||
|
||||
### Advanced Usage and Integration
|
||||
### The 5-Minute Setup
|
||||
|
||||
Beyond scanning strings and buffers, you can implement additional advanced use cases based on your specific application needs, such as integrating into web services or automating file scans in cloud environments. Consider building upon provided functionalities and adapting them to meet the requirements of your application architecture.
|
||||
```typescript
|
||||
import { ClamAvService } from '@push.rocks/smartantivirus';
|
||||
|
||||
With the help of Node.js worker threads or external task queues like RabbitMQ, you can distribute scanning tasks efficiently within high-traffic environments.
|
||||
// That's it! The service automatically manages a Docker container
|
||||
const scanner = new ClamAvService();
|
||||
|
||||
// Scan a suspicious string
|
||||
const result = await scanner.scanString('Is this text safe?');
|
||||
console.log(result.isInfected ? '⚠️ Threat detected!' : '✅ All clear!');
|
||||
|
||||
// Scan a buffer
|
||||
const fileBuffer = await fs.readFile('./upload.pdf');
|
||||
const scanResult = await scanner.scanBuffer(fileBuffer);
|
||||
```
|
||||
|
||||
## Core Concepts 💡
|
||||
|
||||
SmartAntivirus provides two main classes:
|
||||
|
||||
### 🎯 ClamAvService
|
||||
The high-level interface for virus scanning. It handles all the complexity behind a simple, intuitive API.
|
||||
|
||||
### 🐳 ClamAVManager
|
||||
Low-level Docker container management for advanced use cases. Most users won't need to interact with this directly.
|
||||
|
||||
## Real-World Examples 🌍
|
||||
|
||||
### Protecting File Uploads
|
||||
|
||||
```typescript
|
||||
import { ClamAvService } from '@push.rocks/smartantivirus';
|
||||
import express from 'express';
|
||||
import multer from 'multer';
|
||||
|
||||
const app = express();
|
||||
const scanner = new ClamAvService();
|
||||
const upload = multer({ storage: multer.memoryStorage() });
|
||||
|
||||
app.post('/upload', upload.single('file'), async (req, res) => {
|
||||
try {
|
||||
// Scan the uploaded file buffer
|
||||
const result = await scanner.scanBuffer(req.file.buffer);
|
||||
|
||||
if (result.isInfected) {
|
||||
return res.status(400).json({
|
||||
error: 'File rejected',
|
||||
threat: result.reason
|
||||
});
|
||||
}
|
||||
|
||||
// File is safe, proceed with storage
|
||||
await saveFile(req.file);
|
||||
res.json({ message: 'File uploaded successfully' });
|
||||
} catch (error) {
|
||||
res.status(500).json({ error: 'Scan failed' });
|
||||
}
|
||||
});
|
||||
```
|
||||
|
||||
### Streaming Large Files
|
||||
|
||||
Never load huge files into memory! Stream them instead:
|
||||
|
||||
```typescript
|
||||
import { ClamAvService } from '@push.rocks/smartantivirus';
|
||||
import { createReadStream } from 'fs';
|
||||
|
||||
const scanner = new ClamAvService();
|
||||
|
||||
async function scanLargeFile(filePath: string) {
|
||||
const stream = createReadStream(filePath);
|
||||
const result = await scanner.scanStream(stream);
|
||||
|
||||
if (result.isInfected) {
|
||||
console.log(`🚨 Threat found: ${result.reason}`);
|
||||
// Quarantine or delete the file
|
||||
} else {
|
||||
console.log('✅ File is clean');
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### Scanning Remote Content
|
||||
|
||||
Perfect for proxies, CDNs, or content moderation:
|
||||
|
||||
```typescript
|
||||
const scanner = new ClamAvService();
|
||||
|
||||
// Scan a file from a URL
|
||||
const result = await scanner.scanFileFromWebAsStream('https://example.com/document.pdf');
|
||||
|
||||
// For browser environments using Web Streams API
|
||||
async function scanInBrowser(url: string) {
|
||||
const response = await fetch(url);
|
||||
const webStream = response.body as ReadableStream<Uint8Array>;
|
||||
|
||||
if (webStream) {
|
||||
const result = await scanner.scanWebStream(webStream);
|
||||
return result;
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### Advanced Container Management
|
||||
|
||||
For production environments requiring fine-grained control:
|
||||
|
||||
```typescript
|
||||
import { ClamAVManager } from '@push.rocks/smartantivirus';
|
||||
|
||||
class AntivirusService {
|
||||
private manager: ClamAVManager;
|
||||
|
||||
async initialize() {
|
||||
this.manager = new ClamAVManager();
|
||||
|
||||
// Start the container
|
||||
await this.manager.startContainer();
|
||||
|
||||
// Set up log monitoring
|
||||
this.manager.on('log', (event) => {
|
||||
if (event.type === 'error') {
|
||||
console.error(`ClamAV Error: ${event.message}`);
|
||||
// Send to your logging service
|
||||
}
|
||||
});
|
||||
|
||||
// Update virus definitions
|
||||
await this.manager.updateDatabase();
|
||||
|
||||
// Get database info
|
||||
const dbInfo = await this.manager.getDatabaseInfo();
|
||||
console.log(`Virus DB Version: ${dbInfo}`);
|
||||
}
|
||||
|
||||
async shutdown() {
|
||||
await this.manager.stopContainer();
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
## Testing 🧪
|
||||
|
||||
We use the industry-standard EICAR test string for verification:
|
||||
|
||||
```typescript
|
||||
import { ClamAvService } from '@push.rocks/smartantivirus';
|
||||
|
||||
const scanner = new ClamAvService();
|
||||
|
||||
// This is the EICAR test string - it's harmless but triggers antivirus
|
||||
const EICAR = 'X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*';
|
||||
|
||||
const result = await scanner.scanString(EICAR);
|
||||
console.log(result.isInfected); // true
|
||||
console.log(result.reason); // 'Eicar-Test-Signature'
|
||||
```
|
||||
|
||||
Run the test suite:
|
||||
|
||||
```bash
|
||||
npm test
|
||||
```
|
||||
|
||||
## API Reference 📚
|
||||
|
||||
### ClamAvService
|
||||
|
||||
#### Constructor
|
||||
```typescript
|
||||
new ClamAvService(host?: string, port?: number)
|
||||
```
|
||||
- `host` - ClamAV daemon host (default: '127.0.0.1')
|
||||
- `port` - ClamAV daemon port (default: 3310)
|
||||
|
||||
#### Methods
|
||||
|
||||
##### `scanString(text: string): Promise<ScanResult>`
|
||||
Scan a text string for threats.
|
||||
|
||||
##### `scanBuffer(buffer: Buffer): Promise<ScanResult>`
|
||||
Scan binary data in a Buffer.
|
||||
|
||||
##### `scanStream(stream: NodeJS.ReadableStream): Promise<ScanResult>`
|
||||
Scan a Node.js readable stream.
|
||||
|
||||
##### `scanWebStream(stream: ReadableStream<Uint8Array>): Promise<ScanResult>`
|
||||
Scan a Web Streams API stream (browser-compatible).
|
||||
|
||||
##### `scanFileFromWebAsStream(url: string): Promise<ScanResult>`
|
||||
Download and scan a file from a URL.
|
||||
|
||||
##### `verifyConnection(): Promise<boolean>`
|
||||
Test the connection to ClamAV daemon.
|
||||
|
||||
#### ScanResult Type
|
||||
```typescript
|
||||
interface ScanResult {
|
||||
isInfected: boolean;
|
||||
reason?: string; // Threat name if infected
|
||||
}
|
||||
```
|
||||
|
||||
### ClamAVManager
|
||||
|
||||
Advanced container management for production deployments:
|
||||
|
||||
- `startContainer()` - Launch ClamAV in Docker
|
||||
- `stopContainer()` - Gracefully shutdown
|
||||
- `updateDatabase()` - Update virus definitions
|
||||
- `getDatabaseInfo()` - Get current DB version
|
||||
- `getLogs()` - Retrieve container logs
|
||||
- Event: `'log'` - Real-time log streaming
|
||||
|
||||
## Production Considerations 🏭
|
||||
|
||||
### Performance Tips
|
||||
|
||||
1. **Reuse connections** - Create one `ClamAvService` instance and reuse it
|
||||
2. **Stream large files** - Don't load them into memory
|
||||
3. **Implement timeouts** - Protect against hanging scans
|
||||
4. **Monitor logs** - Watch for database update failures
|
||||
|
||||
### Security Best Practices
|
||||
|
||||
- Run ClamAV container with limited resources
|
||||
- Implement rate limiting on scan endpoints
|
||||
- Log all detected threats for audit trails
|
||||
- Regularly update virus definitions
|
||||
- Use separate containers for different environments
|
||||
|
||||
### Deployment Options
|
||||
|
||||
#### Docker Compose
|
||||
```yaml
|
||||
services:
|
||||
clamav:
|
||||
image: clamav/clamav:latest
|
||||
ports:
|
||||
- "3310:3310"
|
||||
volumes:
|
||||
- clamav-db:/var/lib/clamav
|
||||
```
|
||||
|
||||
#### Kubernetes
|
||||
The service automatically manages containers, but you can also deploy ClamAV separately and connect directly to the daemon.
|
||||
|
||||
## Troubleshooting 🔧
|
||||
|
||||
### Common Issues
|
||||
|
||||
**Container won't start**
|
||||
- Ensure Docker is running
|
||||
- Check port 3310 isn't already in use
|
||||
- Verify sufficient disk space for virus definitions
|
||||
|
||||
**Scans timing out**
|
||||
- Large files may take time - implement appropriate timeouts
|
||||
- Check container resources (CPU/Memory)
|
||||
- Ensure virus database is not updating
|
||||
|
||||
**False positives**
|
||||
- Some packers/obfuscators trigger detection
|
||||
- Whitelist known-safe patterns if needed
|
||||
- Keep virus definitions updated
|
||||
|
||||
## Contributing & Support 🤝
|
||||
|
||||
- 🐛 [Report Issues](https://code.foss.global/push.rocks/smartantivirus/issues)
|
||||
- 📖 [Documentation](https://code.foss.global/push.rocks/smartantivirus)
|
||||
- 💬 [Discussions](https://code.foss.global/push.rocks/smartantivirus/issues)
|
||||
|
||||
## License and Legal Information
|
||||
|
||||
This repository contains open-source code that is licensed under the MIT License. A copy of the MIT License can be found in the [license](license) file within this repository.
|
||||
|
||||
**Please note:** The MIT License does not grant permission to use the trade names, trademarks, service marks, or product names of the project, except as required for reasonable and customary use in describing the origin of the work and reproducing the content of the NOTICE file.
|
||||
|
||||
### Trademarks
|
||||
|
||||
This project is owned and maintained by Task Venture Capital GmbH. The names and logos associated with Task Venture Capital GmbH and any related products or services are trademarks of Task Venture Capital GmbH and are not included within the scope of the MIT license granted herein. Use of these trademarks must comply with Task Venture Capital GmbH's Trademark Guidelines, and any usage must be approved in writing by Task Venture Capital GmbH.
|
||||
|
||||
### Company Information
|
||||
|
||||
Task Venture Capital GmbH
|
||||
Registered at District court Bremen HRB 35230 HB, Germany
|
||||
|
||||
For any legal inquiries or if you require further information, please contact us via email at hello@task.vc.
|
||||
|
||||
By using this repository, you acknowledge that you have read this section, agree to comply with its terms, and understand that the licensing of the code does not imply endorsement by Task Venture Capital GmbH of any derivative works.
|
90
test/helpers/clamav.helper.ts
Normal file
90
test/helpers/clamav.helper.ts
Normal file
@@ -0,0 +1,90 @@
|
||||
import { ClamAVManager } from '../../ts/classes.clamav.manager.js';
|
||||
import { execAsync } from '../../ts/plugins.js';
|
||||
|
||||
let clamManager: ClamAVManager | null = null;
|
||||
let isCleaningUp = false;
|
||||
|
||||
export async function getManager(): Promise<ClamAVManager> {
|
||||
if (!clamManager) {
|
||||
throw new Error('ClamAV manager not initialized');
|
||||
}
|
||||
return clamManager;
|
||||
}
|
||||
|
||||
export async function setupClamAV(): Promise<ClamAVManager> {
|
||||
console.log('[Helper] Setting up ClamAV...');
|
||||
|
||||
// First cleanup any existing containers
|
||||
await forceCleanupContainer();
|
||||
|
||||
if (!clamManager) {
|
||||
console.log('[Helper] Creating new ClamAV manager instance');
|
||||
clamManager = new ClamAVManager();
|
||||
await clamManager.startContainer();
|
||||
console.log('[Helper] ClamAV manager initialized');
|
||||
} else {
|
||||
console.log('[Helper] Using existing ClamAV manager instance');
|
||||
}
|
||||
|
||||
return clamManager;
|
||||
}
|
||||
|
||||
export async function cleanupClamAV(): Promise<void> {
|
||||
if (isCleaningUp) {
|
||||
console.log('[Helper] Cleanup already in progress, skipping');
|
||||
return;
|
||||
}
|
||||
|
||||
isCleaningUp = true;
|
||||
console.log('[Helper] Cleaning up ClamAV...');
|
||||
|
||||
try {
|
||||
if (clamManager) {
|
||||
await clamManager.stopContainer();
|
||||
console.log('[Helper] ClamAV container stopped');
|
||||
}
|
||||
await forceCleanupContainer();
|
||||
} catch (error) {
|
||||
console.error('[Helper] Error during cleanup:', error);
|
||||
throw error;
|
||||
} finally {
|
||||
clamManager = null;
|
||||
isCleaningUp = false;
|
||||
}
|
||||
}
|
||||
|
||||
async function forceCleanupContainer(): Promise<void> {
|
||||
try {
|
||||
// Stop any existing container
|
||||
await execAsync('docker stop clamav-daemon').catch(() => {});
|
||||
// Remove any existing container
|
||||
await execAsync('docker rm -f clamav-daemon').catch(() => {});
|
||||
console.log('[Helper] Forced cleanup of existing containers complete');
|
||||
} catch (error) {
|
||||
// Ignore errors as the container might not exist
|
||||
}
|
||||
}
|
||||
|
||||
// Handle interrupts
|
||||
process.on('SIGINT', async () => {
|
||||
console.log('\n[Helper] Received SIGINT. Cleaning up...');
|
||||
try {
|
||||
await cleanupClamAV();
|
||||
process.exit(0);
|
||||
} catch (err) {
|
||||
console.error('[Helper] Error during cleanup:', err);
|
||||
process.exit(1);
|
||||
}
|
||||
});
|
||||
|
||||
// Ensure cleanup on process exit
|
||||
process.on('exit', () => {
|
||||
if (clamManager && !isCleaningUp) {
|
||||
console.log('[Helper] Process exit detected, attempting cleanup');
|
||||
// We can't use async functions in exit handler, so we do our best
|
||||
try {
|
||||
execAsync('docker stop clamav-daemon').catch(() => {});
|
||||
execAsync('docker rm -f clamav-daemon').catch(() => {});
|
||||
} catch {}
|
||||
}
|
||||
});
|
73
test/test.clamav.manager.ts
Normal file
73
test/test.clamav.manager.ts
Normal file
@@ -0,0 +1,73 @@
|
||||
import { expect, tap } from '@push.rocks/tapbundle';
|
||||
import type { ClamAVLogEvent } from '../ts/classes.clamav.manager.js';
|
||||
import { setupClamAV, cleanupClamAV, getManager } from './helpers/clamav.helper.js';
|
||||
|
||||
type ClamAVManager = Awaited<ReturnType<typeof setupClamAV>>;
|
||||
|
||||
let manager: ClamAVManager;
|
||||
|
||||
tap.test('setup', async () => {
|
||||
manager = await setupClamAV();
|
||||
expect(manager).toBeTruthy();
|
||||
});
|
||||
|
||||
tap.test('should have initialized container and receive logs', async () => {
|
||||
// Create a promise that resolves when we receive a log
|
||||
const logPromise = new Promise<void>((resolve) => {
|
||||
// First check if we already have logs
|
||||
const existingLogs = manager.getLogs();
|
||||
if (existingLogs.length > 0) {
|
||||
console.log('[Test] Found existing logs:', existingLogs.map(log => `${log.type}: ${log.message}`).join('\n'));
|
||||
resolve();
|
||||
return;
|
||||
}
|
||||
|
||||
// If no existing logs, wait for new ones
|
||||
const handler = (event: ClamAVLogEvent) => {
|
||||
console.log(`[Test] Received log event: ${event.type} - ${event.message}`);
|
||||
manager.removeListener('log', handler);
|
||||
resolve();
|
||||
};
|
||||
manager.on('log', handler);
|
||||
});
|
||||
|
||||
// Wait for logs with timeout
|
||||
const timeoutPromise = new Promise<void>((_, reject) => {
|
||||
setTimeout(() => reject(new Error('Timeout waiting for logs')), 30000);
|
||||
});
|
||||
|
||||
try {
|
||||
await Promise.race([logPromise, timeoutPromise]);
|
||||
} catch (error) {
|
||||
console.error('Error waiting for logs:', error);
|
||||
throw error;
|
||||
}
|
||||
|
||||
console.log('Log received check passed');
|
||||
|
||||
// Verify container is running by checking if we can get database info
|
||||
try {
|
||||
const dbInfo = await manager.getDatabaseInfo();
|
||||
expect(dbInfo).toBeTruthy();
|
||||
console.log('Database info check passed');
|
||||
} catch (error) {
|
||||
console.error('Error getting database info:', error);
|
||||
throw new Error('Failed to get database info - container may not be fully initialized');
|
||||
}
|
||||
});
|
||||
|
||||
tap.test('should get database info', async () => {
|
||||
const dbInfo = await manager.getDatabaseInfo();
|
||||
console.log('Database Info:', dbInfo);
|
||||
expect(dbInfo).toBeTruthy();
|
||||
});
|
||||
|
||||
tap.test('should update database', async () => {
|
||||
await manager.updateDatabase();
|
||||
});
|
||||
|
||||
tap.test('cleanup', async () => {
|
||||
await cleanupClamAV();
|
||||
});
|
||||
|
||||
tap.start();
|
49
test/test.ts
49
test/test.ts
@@ -1,35 +1,40 @@
|
||||
import { expect, expectAsync, tap } from '@push.rocks/tapbundle';
|
||||
import { tap, expect } from '@push.rocks/tapbundle';
|
||||
import * as smartantivirus from '../ts/index.js';
|
||||
import { setupClamAV, cleanupClamAV } from './helpers/clamav.helper.js';
|
||||
|
||||
const EICAR_TEST_STRING = 'X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*';
|
||||
let clamService: smartantivirus.ClamAvService;
|
||||
|
||||
tap.test('should create a ClamAvService instance', async () => {
|
||||
clamService = new smartantivirus.ClamAvService();
|
||||
expect(clamService).toBeDefined();
|
||||
tap.test('setup', async () => {
|
||||
await setupClamAV();
|
||||
});
|
||||
|
||||
tap.test('should scan a string', async () => {
|
||||
const scanResult = await clamService.scanString('X5O!P%@AP[4\PZX54(P^)7CC)7}' + '$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*');
|
||||
tap.test('should create a ClamAvService instance and initialize ClamAV', async () => {
|
||||
clamService = new smartantivirus.ClamAvService();
|
||||
expect(clamService).toBeTruthy();
|
||||
// The manager will start the container and wait for initialization
|
||||
await clamService.verifyConnection();
|
||||
});
|
||||
|
||||
tap.test('should detect EICAR test string', async () => {
|
||||
const scanResult = await clamService.scanString(EICAR_TEST_STRING);
|
||||
console.log('Scan Result:', scanResult);
|
||||
// expect(scanResult).toEqual({ isInfected: true, reason: 'FOUND' });
|
||||
expect(scanResult.isInfected).toEqual(true);
|
||||
expect(scanResult.reason).toBeTruthy();
|
||||
});
|
||||
|
||||
tap.test('should not detect clean string', async () => {
|
||||
const scanResult = await clamService.scanString('This is a clean string with no virus signature');
|
||||
console.log('Clean Scan Result:', scanResult);
|
||||
expect(scanResult.isInfected).toEqual(false);
|
||||
expect(scanResult.reason).toBeUndefined();
|
||||
});
|
||||
|
||||
tap.test('cleanup', async () => {
|
||||
await cleanupClamAV();
|
||||
});
|
||||
|
||||
tap.start();
|
||||
|
||||
|
||||
/* (async () => {
|
||||
|
||||
try {
|
||||
|
||||
await clamService.updateVirusDefinitions(); // Step 2: Update definitions
|
||||
await clamService.startClamDaemon(); // Step 3: Start daemon
|
||||
|
||||
const scanResult = await clamService.scanString('EICAR test string...');
|
||||
console.log('Scan Result:', scanResult);
|
||||
} catch (error) {
|
||||
console.error('Error:', error);
|
||||
}
|
||||
})(); */
|
||||
|
||||
|
||||
|
||||
|
@@ -3,6 +3,6 @@
|
||||
*/
|
||||
export const commitinfo = {
|
||||
name: '@push.rocks/smartantivirus',
|
||||
version: '1.0.4',
|
||||
description: 'A Node.js package for integrating antivirus scanning capabilities using ClamAV, allowing in-memory file and data scanning.'
|
||||
version: '1.3.2',
|
||||
description: 'A Node.js package providing integration with ClamAV for anti-virus scanning, facilitating both Docker containerized management and direct connection to a ClamAV daemon.'
|
||||
}
|
||||
|
281
ts/classes.clamav.manager.ts
Normal file
281
ts/classes.clamav.manager.ts
Normal file
@@ -0,0 +1,281 @@
|
||||
import { exec, spawn, net, promisify, EventEmitter, execAsync } from './plugins.js';
|
||||
|
||||
export interface ClamAVLogEvent {
|
||||
timestamp: string;
|
||||
message: string;
|
||||
type: 'update' | 'scan' | 'system' | 'error';
|
||||
}
|
||||
|
||||
export class ClamAVManager extends EventEmitter {
|
||||
private containerId: string | null = null;
|
||||
private containerName = 'clamav-daemon';
|
||||
private imageTag = 'clamav/clamav:latest';
|
||||
private port = 3310;
|
||||
private logs: ClamAVLogEvent[] = [];
|
||||
|
||||
constructor() {
|
||||
super();
|
||||
}
|
||||
|
||||
public getLogs(): ClamAVLogEvent[] {
|
||||
return this.logs;
|
||||
}
|
||||
|
||||
/**
|
||||
* Start the ClamAV container if it's not already running
|
||||
*/
|
||||
public async startContainer(): Promise<void> {
|
||||
try {
|
||||
console.log('[ClamAV] Starting container initialization...');
|
||||
|
||||
// Check if container is already running
|
||||
const { stdout: psOutput } = await execAsync('docker ps --filter name=' + this.containerName);
|
||||
if (psOutput.includes(this.containerName)) {
|
||||
console.log('[ClamAV] Container is already running');
|
||||
this.containerId = (await execAsync(`docker ps -q --filter name=${this.containerName}`)).stdout.trim();
|
||||
console.log('[ClamAV] Container ID:', this.containerId);
|
||||
this.attachLogWatcher();
|
||||
await this.waitForInitialization();
|
||||
return;
|
||||
}
|
||||
|
||||
// Check if container exists but is stopped
|
||||
const { stdout: psaOutput } = await execAsync('docker ps -a --filter name=' + this.containerName);
|
||||
if (psaOutput.includes(this.containerName)) {
|
||||
console.log('[ClamAV] Found stopped container, starting it...');
|
||||
await execAsync(`docker start ${this.containerName}`);
|
||||
this.containerId = (await execAsync(`docker ps -q --filter name=${this.containerName}`)).stdout.trim();
|
||||
console.log('[ClamAV] Started existing container, ID:', this.containerId);
|
||||
} else {
|
||||
// Create and start new container
|
||||
console.log('[ClamAV] Creating new container...');
|
||||
const { stdout } = await execAsync(
|
||||
`docker run -d --name ${this.containerName} -p ${this.port}:3310 ${this.imageTag}`
|
||||
);
|
||||
this.containerId = stdout.trim();
|
||||
console.log('[ClamAV] Created new container, ID:', this.containerId);
|
||||
}
|
||||
|
||||
this.attachLogWatcher();
|
||||
console.log('[ClamAV] Waiting for initialization...');
|
||||
await this.waitForInitialization();
|
||||
console.log('[ClamAV] Container successfully initialized');
|
||||
} catch (error) {
|
||||
console.error('[ClamAV] Error starting container:', error);
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Stop the ClamAV container
|
||||
*/
|
||||
public async stopContainer(): Promise<void> {
|
||||
if (!this.containerId) {
|
||||
console.log('No ClamAV container is running');
|
||||
return;
|
||||
}
|
||||
|
||||
try {
|
||||
await execAsync(`docker stop ${this.containerId}`);
|
||||
console.log('Stopped ClamAV container');
|
||||
} catch (error) {
|
||||
console.error('Error stopping ClamAV container:', error);
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Manually trigger a database update
|
||||
*/
|
||||
public async updateDatabase(): Promise<void> {
|
||||
if (!this.containerId) {
|
||||
throw new Error('ClamAV container is not running');
|
||||
}
|
||||
|
||||
try {
|
||||
// First check if freshclam is already running
|
||||
const { stdout: psOutput } = await execAsync(`docker exec ${this.containerId} ps aux | grep freshclam`);
|
||||
if (psOutput.includes('/usr/local/sbin/freshclam -d')) {
|
||||
console.log('Freshclam daemon is already running');
|
||||
// Wait a bit to ensure database is updated
|
||||
await new Promise(resolve => setTimeout(resolve, 2000));
|
||||
return;
|
||||
}
|
||||
|
||||
// If not running as daemon, try to update manually
|
||||
const { stdout, stderr } = await execAsync(`docker exec ${this.containerId} freshclam --no-warnings`);
|
||||
console.log('Database update output:', stdout);
|
||||
if (stderr) {
|
||||
console.error('Database update errors:', stderr);
|
||||
}
|
||||
} catch (error) {
|
||||
// Check if the error is due to freshclam already running
|
||||
if (error.stderr?.includes('ERROR: Problem with internal logger') ||
|
||||
error.stdout?.includes('Resource temporarily unavailable')) {
|
||||
console.log('Freshclam is already running, skipping manual update');
|
||||
return;
|
||||
}
|
||||
console.error('Error updating ClamAV database:', error);
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Get the current database version information
|
||||
*/
|
||||
public async getDatabaseInfo(): Promise<string> {
|
||||
if (!this.containerId) {
|
||||
throw new Error('ClamAV container is not running');
|
||||
}
|
||||
|
||||
try {
|
||||
// Try both .cld and .cvd files since ClamAV can use either format
|
||||
try {
|
||||
const { stdout } = await execAsync(`docker exec ${this.containerId} sigtool --info /var/lib/clamav/daily.cld`);
|
||||
return stdout;
|
||||
} catch {
|
||||
const { stdout } = await execAsync(`docker exec ${this.containerId} sigtool --info /var/lib/clamav/daily.cvd`);
|
||||
return stdout;
|
||||
}
|
||||
} catch (error) {
|
||||
console.error('Error getting database info:', error);
|
||||
throw error;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Watch container logs and emit events for different types of log messages
|
||||
*/
|
||||
private attachLogWatcher(): void {
|
||||
if (!this.containerId) return;
|
||||
|
||||
const logProcess = spawn('docker', ['logs', '-f', this.containerId]);
|
||||
|
||||
logProcess.stdout.on('data', (data) => {
|
||||
const lines = data.toString().split('\n');
|
||||
lines.forEach(line => {
|
||||
if (!line.trim()) return;
|
||||
|
||||
const event: ClamAVLogEvent = {
|
||||
timestamp: new Date().toISOString(),
|
||||
message: line,
|
||||
type: this.determineLogType(line)
|
||||
};
|
||||
|
||||
this.logs.push(event);
|
||||
this.emit('log', event);
|
||||
console.log(`[ClamAV ${event.type}] ${event.message}`);
|
||||
});
|
||||
});
|
||||
|
||||
logProcess.stderr.on('data', (data) => {
|
||||
const event: ClamAVLogEvent = {
|
||||
timestamp: new Date().toISOString(),
|
||||
message: data.toString(),
|
||||
type: 'error'
|
||||
};
|
||||
|
||||
this.logs.push(event);
|
||||
this.emit('log', event);
|
||||
console.error(`[ClamAV error] ${event.message}`);
|
||||
});
|
||||
|
||||
logProcess.on('error', (error) => {
|
||||
console.error('Error in log watcher:', error);
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Determine the type of log message
|
||||
*/
|
||||
private determineLogType(logMessage: string): ClamAVLogEvent['type'] {
|
||||
const lowerMessage = logMessage.toLowerCase();
|
||||
if (lowerMessage.includes('update') || lowerMessage.includes('freshclam')) {
|
||||
return 'update';
|
||||
} else if (lowerMessage.includes('scan') || lowerMessage.includes('found')) {
|
||||
return 'scan';
|
||||
} else if (lowerMessage.includes('error') || lowerMessage.includes('warning')) {
|
||||
return 'error';
|
||||
}
|
||||
return 'system';
|
||||
}
|
||||
|
||||
/**
|
||||
* Wait for ClamAV to initialize by checking both logs and service readiness
|
||||
*/
|
||||
private async waitForInitialization(): Promise<void> {
|
||||
return new Promise((resolve, reject) => {
|
||||
if (!this.containerId) {
|
||||
reject(new Error('Container ID not set'));
|
||||
return;
|
||||
}
|
||||
|
||||
let timeout: NodeJS.Timeout;
|
||||
let checkCount = 0;
|
||||
const maxChecks = 60; // Check for 60 seconds
|
||||
const startTime = Date.now();
|
||||
|
||||
// Check service readiness
|
||||
const checkService = async () => {
|
||||
try {
|
||||
const elapsedTime = Math.round((Date.now() - startTime) / 1000);
|
||||
console.log(`[ClamAV] Checking service readiness (attempt ${checkCount + 1}, ${elapsedTime}s elapsed)...`);
|
||||
|
||||
// First check if the service is accepting connections
|
||||
const client = new net.Socket();
|
||||
await new Promise<void>((resolveConn, rejectConn) => {
|
||||
const connectTimeout = setTimeout(() => {
|
||||
client.destroy();
|
||||
rejectConn(new Error('Connection timeout'));
|
||||
}, 1000);
|
||||
|
||||
client.connect(this.port, 'localhost', () => {
|
||||
clearTimeout(connectTimeout);
|
||||
client.end();
|
||||
resolveConn();
|
||||
});
|
||||
|
||||
client.on('error', (err) => {
|
||||
clearTimeout(connectTimeout);
|
||||
rejectConn(err);
|
||||
});
|
||||
});
|
||||
|
||||
// Verify the service is responding to commands
|
||||
const { stdout } = await execAsync(`echo PING | nc localhost ${this.port}`);
|
||||
if (!stdout.includes('PONG')) {
|
||||
throw new Error('Service not responding to commands');
|
||||
}
|
||||
|
||||
// If we can connect and get a PONG, the service is ready
|
||||
console.log('[ClamAV] Service is accepting connections and responding to commands');
|
||||
cleanup();
|
||||
resolve();
|
||||
} catch (error) {
|
||||
// Service not ready yet, will retry
|
||||
if (checkCount >= maxChecks) {
|
||||
cleanup();
|
||||
reject(new Error(`ClamAV initialization timed out after ${maxChecks} seconds. Last error: ${error.message}`));
|
||||
return;
|
||||
}
|
||||
checkCount++;
|
||||
}
|
||||
};
|
||||
|
||||
const cleanup = () => {
|
||||
clearTimeout(timeout);
|
||||
clearInterval(serviceCheck);
|
||||
};
|
||||
|
||||
const serviceCheck = setInterval(checkService, 1000);
|
||||
|
||||
timeout = setTimeout(() => {
|
||||
cleanup();
|
||||
reject(new Error('ClamAV initialization timed out after 60 seconds'));
|
||||
}, 60000);
|
||||
|
||||
// Start initial service check
|
||||
checkService();
|
||||
});
|
||||
}
|
||||
}
|
187
ts/classes.clamavservice.ts
Normal file
187
ts/classes.clamavservice.ts
Normal file
@@ -0,0 +1,187 @@
|
||||
import * as plugins from './plugins.js';
|
||||
import * as paths from './paths.js';
|
||||
import { net } from './plugins.js';
|
||||
import { ClamAVManager } from './classes.clamav.manager.js';
|
||||
|
||||
export class ClamAvService {
|
||||
private host: string;
|
||||
private port: number;
|
||||
private manager: ClamAVManager;
|
||||
|
||||
constructor(host: string = '127.0.0.1', port: number = 3310) {
|
||||
this.host = host;
|
||||
this.port = port;
|
||||
this.manager = new ClamAVManager();
|
||||
|
||||
// Listen to ClamAV logs
|
||||
this.manager.on('log', (event) => {
|
||||
if (event.type === 'scan') {
|
||||
console.log(`[ClamAV Scan] ${event.message}`);
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
private async ensureContainerStarted(): Promise<void> {
|
||||
await this.manager.startContainer();
|
||||
}
|
||||
|
||||
/**
|
||||
* Scans an in-memory Buffer using ClamAV daemon's INSTREAM command.
|
||||
*/
|
||||
public async scanBuffer(buffer: Buffer): Promise<{ isInfected: boolean; reason?: string }> {
|
||||
await this.ensureContainerStarted();
|
||||
return new Promise((resolve, reject) => {
|
||||
const client = new net.Socket();
|
||||
|
||||
client.connect(this.port, this.host, () => {
|
||||
console.log('Connected to ClamAV daemon');
|
||||
client.write('zINSTREAM\0'); // Start the INSTREAM command
|
||||
const chunkSize = 1024;
|
||||
let offset = 0;
|
||||
|
||||
// Send data in chunks
|
||||
while (offset < buffer.length) {
|
||||
const chunk = buffer.slice(offset, offset + chunkSize);
|
||||
console.log('Sending chunk:', chunk.toString('utf8'));
|
||||
|
||||
const sizeBuf = Buffer.alloc(4);
|
||||
sizeBuf.writeUInt32BE(chunk.length, 0);
|
||||
client.write(sizeBuf);
|
||||
client.write(chunk);
|
||||
|
||||
offset += chunkSize;
|
||||
}
|
||||
|
||||
// Send end-of-stream signal
|
||||
const endOfStream = Buffer.alloc(4);
|
||||
endOfStream.writeUInt32BE(0, 0);
|
||||
console.log('Sending end-of-stream signal');
|
||||
client.write(endOfStream);
|
||||
});
|
||||
|
||||
client.on('data', (data) => {
|
||||
const response = data.toString();
|
||||
console.log('Raw Response from ClamAV:', response);
|
||||
|
||||
const isInfected = response.includes('FOUND');
|
||||
const reason = isInfected ? response.split('FOUND')[0].trim() : undefined;
|
||||
|
||||
resolve({ isInfected, reason });
|
||||
client.end();
|
||||
});
|
||||
|
||||
client.on('error', (err) => {
|
||||
console.error('Error communicating with ClamAV:', err);
|
||||
reject(err);
|
||||
});
|
||||
|
||||
client.on('close', () => {
|
||||
console.log('Connection to ClamAV daemon closed');
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Scans a string by converting it to a Buffer and using scanBuffer.
|
||||
*/
|
||||
public async scanString(input: string): Promise<{ isInfected: boolean; reason?: string }> {
|
||||
console.log('Scanning string:', input); // Debug the input string
|
||||
const buffer = Buffer.from(input, 'utf8');
|
||||
console.log('Converted buffer:', buffer.toString('utf8')); // Debug the converted buffer
|
||||
return this.scanBuffer(buffer);
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies the ClamAV daemon is reachable.
|
||||
*/
|
||||
public async verifyConnection(): Promise<boolean> {
|
||||
await this.ensureContainerStarted();
|
||||
return new Promise((resolve, reject) => {
|
||||
const client = new net.Socket();
|
||||
|
||||
client.connect(this.port, this.host, () => {
|
||||
console.log('Successfully connected to ClamAV daemon');
|
||||
client.end();
|
||||
resolve(true);
|
||||
});
|
||||
|
||||
client.on('error', (err) => {
|
||||
console.error('Failed to connect to ClamAV daemon:', err);
|
||||
reject(err);
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Scans data from a NodeJS stream using ClamAV daemon's INSTREAM command.
|
||||
*/
|
||||
public async scanStream(stream: NodeJS.ReadableStream): Promise<{ isInfected: boolean; reason?: string }> {
|
||||
await this.ensureContainerStarted();
|
||||
return new Promise((resolve, reject) => {
|
||||
const client = new net.Socket();
|
||||
|
||||
client.connect(this.port, this.host, () => {
|
||||
console.log('Connected to ClamAV daemon for stream scanning');
|
||||
client.write('zINSTREAM\0');
|
||||
|
||||
stream.on('data', (chunk: Buffer) => {
|
||||
const buf = Buffer.isBuffer(chunk) ? chunk : Buffer.from(chunk);
|
||||
const sizeBuf = Buffer.alloc(4);
|
||||
sizeBuf.writeUInt32BE(buf.length, 0);
|
||||
client.write(sizeBuf);
|
||||
client.write(buf);
|
||||
});
|
||||
|
||||
stream.on('end', () => {
|
||||
const endOfStream = Buffer.alloc(4);
|
||||
endOfStream.writeUInt32BE(0, 0);
|
||||
console.log('Stream ended, sending end-of-stream signal');
|
||||
client.write(endOfStream);
|
||||
});
|
||||
|
||||
stream.on('error', (err) => {
|
||||
console.error('Error reading stream:', err);
|
||||
reject(err);
|
||||
});
|
||||
});
|
||||
|
||||
client.on('data', (data) => {
|
||||
const response = data.toString();
|
||||
console.log('Raw Response from ClamAV (stream):', response);
|
||||
const isInfected = response.includes('FOUND');
|
||||
const reason = isInfected ? response.split('FOUND')[0].trim() : undefined;
|
||||
resolve({ isInfected, reason });
|
||||
client.end();
|
||||
});
|
||||
|
||||
client.on('error', (err) => {
|
||||
console.error('Error with ClamAV stream scanning:', err);
|
||||
reject(err);
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Scans a file from a web URL as a stream using ClamAV daemon's INSTREAM command.
|
||||
*/
|
||||
public async scanFileFromWebAsStream(url: string): Promise<{ isInfected: boolean; reason?: string }> {
|
||||
return new Promise((resolve, reject) => {
|
||||
const protocol = url.startsWith('https') ? plugins.https : plugins.http;
|
||||
protocol.get(url, (response) => {
|
||||
this.scanStream(response).then(resolve).catch(reject);
|
||||
}).on('error', (err) => {
|
||||
console.error('Error fetching URL:', err);
|
||||
reject(err);
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Scans a web resource by URL using ClamAV daemon's INSTREAM command.
|
||||
*/
|
||||
public async scanWebStream(webstreamArg: ReadableStream): Promise<{ isInfected: boolean; reason?: string }> {
|
||||
// Convert the web ReadableStream to a NodeJS ReadableStream
|
||||
const nodeStream = plugins.smartstream.nodewebhelpers.convertWebReadableToNodeReadable(webstreamArg);
|
||||
return this.scanStream(nodeStream);
|
||||
}
|
||||
}
|
@@ -1,103 +0,0 @@
|
||||
import * as plugins from './plugins.js';
|
||||
import * as paths from './paths.js';
|
||||
|
||||
import { exec } from 'child_process';
|
||||
import net from 'net';
|
||||
import { promisify } from 'util';
|
||||
|
||||
const execAsync = promisify(exec);
|
||||
|
||||
export class ClamAvService {
|
||||
private host: string;
|
||||
private port: number;
|
||||
|
||||
constructor(host: string = '127.0.0.1', port: number = 3310) {
|
||||
this.host = host;
|
||||
this.port = port;
|
||||
}
|
||||
|
||||
/**
|
||||
* Scans an in-memory Buffer using ClamAV daemon's INSTREAM command.
|
||||
*/
|
||||
public async scanBuffer(buffer: Buffer): Promise<{ isInfected: boolean; reason?: string }> {
|
||||
return new Promise((resolve, reject) => {
|
||||
const client = new net.Socket();
|
||||
|
||||
client.connect(this.port, this.host, () => {
|
||||
console.log('Connected to ClamAV daemon');
|
||||
client.write('zINSTREAM\0'); // Start the INSTREAM command
|
||||
const chunkSize = 1024;
|
||||
let offset = 0;
|
||||
|
||||
// Send data in chunks
|
||||
while (offset < buffer.length) {
|
||||
const chunk = buffer.slice(offset, offset + chunkSize);
|
||||
console.log('Sending chunk:', chunk.toString('utf8'));
|
||||
|
||||
const sizeBuf = Buffer.alloc(4);
|
||||
sizeBuf.writeUInt32BE(chunk.length, 0);
|
||||
client.write(sizeBuf);
|
||||
client.write(chunk);
|
||||
|
||||
offset += chunkSize;
|
||||
}
|
||||
|
||||
// Send end-of-stream signal
|
||||
const endOfStream = Buffer.alloc(4);
|
||||
endOfStream.writeUInt32BE(0, 0);
|
||||
console.log('Sending end-of-stream signal');
|
||||
client.write(endOfStream);
|
||||
});
|
||||
|
||||
client.on('data', (data) => {
|
||||
const response = data.toString();
|
||||
console.log('Raw Response from ClamAV:', response);
|
||||
|
||||
const isInfected = response.includes('FOUND');
|
||||
const reason = isInfected ? response.split('FOUND')[0].trim() : undefined;
|
||||
|
||||
resolve({ isInfected, reason });
|
||||
client.end();
|
||||
});
|
||||
|
||||
client.on('error', (err) => {
|
||||
console.error('Error communicating with ClamAV:', err);
|
||||
reject(err);
|
||||
});
|
||||
|
||||
client.on('close', () => {
|
||||
console.log('Connection to ClamAV daemon closed');
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
/**
|
||||
* Scans a string by converting it to a Buffer and using scanBuffer.
|
||||
*/
|
||||
public async scanString(input: string): Promise<{ isInfected: boolean; reason?: string }> {
|
||||
console.log('Scanning string:', input); // Debug the input string
|
||||
const buffer = Buffer.from(input, 'utf8');
|
||||
console.log('Converted buffer:', buffer.toString('utf8')); // Debug the converted buffer
|
||||
return this.scanBuffer(buffer);
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies the ClamAV daemon is reachable.
|
||||
*/
|
||||
public async verifyConnection(): Promise<boolean> {
|
||||
return new Promise((resolve, reject) => {
|
||||
const client = new net.Socket();
|
||||
|
||||
client.connect(this.port, this.host, () => {
|
||||
console.log('Successfully connected to ClamAV daemon');
|
||||
client.end();
|
||||
resolve(true);
|
||||
});
|
||||
|
||||
client.on('error', (err) => {
|
||||
console.error('Failed to connect to ClamAV daemon:', err);
|
||||
reject(err);
|
||||
});
|
||||
});
|
||||
}
|
||||
}
|
@@ -1 +1,2 @@
|
||||
export * from './classes.smartantivirus.js';
|
||||
export * from './classes.clamavservice.js';
|
||||
export * from './classes.clamav.manager.js';
|
@@ -1,24 +1,42 @@
|
||||
// node native scope
|
||||
// Node.js built-in modules
|
||||
import * as fs from 'fs';
|
||||
import * as path from 'path';
|
||||
import { exec, spawn } from 'child_process';
|
||||
import { promisify } from 'util';
|
||||
import { EventEmitter } from 'events';
|
||||
import net from 'net';
|
||||
import * as http from 'http';
|
||||
import * as https from 'https';
|
||||
|
||||
export {
|
||||
fs,
|
||||
path,
|
||||
}
|
||||
exec,
|
||||
spawn,
|
||||
promisify,
|
||||
EventEmitter,
|
||||
net,
|
||||
http,
|
||||
https
|
||||
};
|
||||
|
||||
// @push.rocks scope
|
||||
import * as smartpath from '@push.rocks/smartpath';
|
||||
import * as smartfile from '@push.rocks/smartfile';
|
||||
import * as smartstream from '@push.rocks/smartstream';
|
||||
|
||||
export {
|
||||
smartpath,
|
||||
smartfile,
|
||||
}
|
||||
smartstream,
|
||||
};
|
||||
|
||||
// third party scope
|
||||
// Third party scope
|
||||
import axios from 'axios';
|
||||
|
||||
export {
|
||||
axios,
|
||||
}
|
||||
axios
|
||||
};
|
||||
|
||||
// Common utilities
|
||||
export const execAsync = promisify(exec);
|
Reference in New Issue
Block a user