Skip to main content

cc_audit/engine/
scanner.rs

1//! Scanner traits and configuration for the detection layer (L5).
2//!
3//! This module provides file-system oriented scanning interfaces:
4//! - `Scanner` trait for scanning files and directories
5//! - `ContentScanner` trait for content-based scanning
6//! - `ScannerConfig` for common scanner configuration
7
8use crate::error::{AuditError, Result};
9use crate::ignore::IgnoreFilter;
10use crate::rules::{DynamicRule, Finding, RuleEngine};
11use std::fs;
12use std::path::Path;
13use tracing::{debug, trace};
14
15/// Core trait for all security scanners.
16///
17/// Scanners implement this trait to provide file and directory scanning capabilities.
18/// The default `scan_path` implementation handles path validation and delegates to
19/// either `scan_file` or `scan_directory` based on the path type.
20pub trait Scanner {
21    /// Scan a single file and return findings.
22    fn scan_file(&self, path: &Path) -> Result<Vec<Finding>>;
23
24    /// Scan a directory and return findings.
25    fn scan_directory(&self, dir: &Path) -> Result<Vec<Finding>>;
26
27    /// Scan a path (file or directory).
28    ///
29    /// This is the main entry point for scanning. It validates the path
30    /// and delegates to either `scan_file` or `scan_directory`.
31    fn scan_path(&self, path: &Path) -> Result<Vec<Finding>> {
32        trace!(path = %path.display(), "Scanning path");
33
34        if !path.exists() {
35            debug!(path = %path.display(), "Path not found");
36            return Err(AuditError::FileNotFound(path.display().to_string()));
37        }
38
39        if path.is_file() {
40            trace!(path = %path.display(), "Scanning as file");
41            return self.scan_file(path);
42        }
43
44        if !path.is_dir() {
45            debug!(path = %path.display(), "Path is not a directory");
46            return Err(AuditError::NotADirectory(path.display().to_string()));
47        }
48
49        trace!(path = %path.display(), "Scanning as directory");
50        self.scan_directory(path)
51    }
52}
53
54/// Extended trait for scanners that support content-based scanning.
55///
56/// This trait provides a unified interface for scanning raw content strings,
57/// which is useful for testing and for scanners that parse structured files
58/// (like JSON) before applying rules.
59pub trait ContentScanner: Scanner {
60    /// Returns a reference to the scanner's configuration.
61    fn config(&self) -> &ScannerConfig;
62
63    /// Scans content and returns findings.
64    ///
65    /// Default implementation delegates to ScannerConfig::check_content.
66    /// Override this method for scanners that need custom content processing
67    /// (e.g., JSON parsing, frontmatter extraction).
68    fn scan_content(&self, content: &str, file_path: &str) -> Result<Vec<Finding>> {
69        Ok(self.config().check_content(content, file_path))
70    }
71}
72
73/// Type alias for progress callback function.
74/// Called each time a file is scanned to report progress.
75/// Uses Arc to allow cloning and sharing across threads.
76pub type ProgressCallback = std::sync::Arc<dyn Fn() + Send + Sync>;
77
78/// Common configuration shared by all scanners.
79///
80/// This struct provides a unified way to manage RuleEngine settings,
81/// ignore filters, and common file operations across different scanner implementations.
82pub struct ScannerConfig {
83    engine: RuleEngine,
84    ignore_filter: Option<IgnoreFilter>,
85    skip_comments: bool,
86    strict_secrets: bool,
87    recursive: bool,
88    progress_callback: Option<ProgressCallback>,
89}
90
91impl ScannerConfig {
92    /// Creates a new ScannerConfig with default settings.
93    pub fn new() -> Self {
94        Self {
95            engine: RuleEngine::new(),
96            ignore_filter: None,
97            skip_comments: false,
98            strict_secrets: false,
99            recursive: true,
100            progress_callback: None,
101        }
102    }
103
104    /// Enables or disables recursive scanning.
105    /// When disabled, only scans the immediate directory (max_depth = 1).
106    pub fn with_recursive(mut self, recursive: bool) -> Self {
107        self.recursive = recursive;
108        self
109    }
110
111    /// Returns whether recursive scanning is enabled.
112    pub fn is_recursive(&self) -> bool {
113        self.recursive
114    }
115
116    /// Returns the max_depth for directory walking based on recursive setting.
117    /// - recursive = true: None (unlimited depth)
118    /// - recursive = false: Some(3) (default depth for reasonable scanning)
119    pub fn max_depth(&self) -> Option<usize> {
120        if self.recursive { None } else { Some(3) }
121    }
122
123    /// Enables or disables comment skipping during scanning.
124    pub fn with_skip_comments(mut self, skip: bool) -> Self {
125        self.skip_comments = skip;
126        self.engine = self.engine.with_skip_comments(skip);
127        self
128    }
129
130    /// Enables or disables strict secrets mode.
131    /// When enabled, dummy key heuristics are disabled for test files.
132    pub fn with_strict_secrets(mut self, strict: bool) -> Self {
133        self.strict_secrets = strict;
134        self.engine = self.engine.with_strict_secrets(strict);
135        self
136    }
137
138    /// Sets an ignore filter for file filtering.
139    pub fn with_ignore_filter(mut self, filter: IgnoreFilter) -> Self {
140        self.ignore_filter = Some(filter);
141        self
142    }
143
144    /// Adds dynamic rules loaded from custom YAML files.
145    pub fn with_dynamic_rules(mut self, rules: Vec<DynamicRule>) -> Self {
146        self.engine = self.engine.with_dynamic_rules(rules);
147        self
148    }
149
150    /// Sets a progress callback that will be called for each scanned file.
151    pub fn with_progress_callback(mut self, callback: ProgressCallback) -> Self {
152        self.progress_callback = Some(callback);
153        self
154    }
155
156    /// Reports progress by calling the progress callback if set.
157    /// This should be called by scanners after processing each file.
158    pub fn report_progress(&self) {
159        if let Some(ref callback) = self.progress_callback {
160            callback();
161        }
162    }
163
164    /// Returns whether the given path should be ignored.
165    pub fn is_ignored(&self, path: &Path) -> bool {
166        self.ignore_filter
167            .as_ref()
168            .is_some_and(|f| f.is_ignored(path))
169    }
170
171    /// Reads a file and returns its content as a string.
172    pub fn read_file(&self, path: &Path) -> Result<String> {
173        trace!(path = %path.display(), "Reading file");
174        fs::read_to_string(path).map_err(|e| {
175            debug!(path = %path.display(), error = %e, "Failed to read file");
176            AuditError::ReadError {
177                path: path.display().to_string(),
178                source: e,
179            }
180        })
181    }
182
183    /// Checks the content against all rules and returns findings.
184    pub fn check_content(&self, content: &str, file_path: &str) -> Vec<Finding> {
185        trace!(
186            file = file_path,
187            content_len = content.len(),
188            "Checking content"
189        );
190        let findings = self.engine.check_content(content, file_path);
191        if !findings.is_empty() {
192            debug!(file = file_path, count = findings.len(), "Found issues");
193        }
194        findings
195    }
196
197    /// Checks YAML frontmatter for specific rules (e.g., OP-001).
198    pub fn check_frontmatter(&self, frontmatter: &str, file_path: &str) -> Vec<Finding> {
199        self.engine.check_frontmatter(frontmatter, file_path)
200    }
201
202    /// Returns whether skip_comments is enabled.
203    pub fn skip_comments(&self) -> bool {
204        self.skip_comments
205    }
206
207    /// Returns whether strict_secrets is enabled.
208    pub fn strict_secrets(&self) -> bool {
209        self.strict_secrets
210    }
211
212    /// Returns a reference to the underlying RuleEngine.
213    pub fn engine(&self) -> &RuleEngine {
214        &self.engine
215    }
216}
217
218impl Default for ScannerConfig {
219    fn default() -> Self {
220        Self::new()
221    }
222}
223
224#[cfg(test)]
225mod tests {
226    use super::*;
227    use std::sync::Arc;
228    use tempfile::TempDir;
229
230    #[test]
231    fn test_new_config() {
232        let config = ScannerConfig::new();
233        assert!(!config.skip_comments());
234    }
235
236    #[test]
237    fn test_progress_callback_is_called() {
238        use std::sync::Mutex;
239        // Track how many times progress callback is called
240        let call_count = Arc::new(Mutex::new(0));
241        let call_count_clone = Arc::clone(&call_count);
242
243        let progress_fn = move || {
244            let mut count = call_count_clone.lock().unwrap();
245            *count += 1;
246        };
247
248        let config = ScannerConfig::new().with_progress_callback(Arc::new(progress_fn));
249
250        // Simulate file scanning
251        config.report_progress();
252        config.report_progress();
253
254        let final_count = *call_count.lock().unwrap();
255        assert_eq!(final_count, 2, "Progress callback should be called twice");
256    }
257
258    #[test]
259    fn test_with_skip_comments() {
260        let config = ScannerConfig::new().with_skip_comments(true);
261        assert!(config.skip_comments());
262    }
263
264    #[test]
265    fn test_default_config() {
266        let config = ScannerConfig::default();
267        assert!(!config.skip_comments());
268    }
269
270    #[test]
271    fn test_is_ignored_without_filter() {
272        let config = ScannerConfig::new();
273        assert!(!config.is_ignored(Path::new("test.rs")));
274    }
275
276    #[test]
277    fn test_read_file_success() {
278        let dir = TempDir::new().unwrap();
279        let file_path = dir.path().join("test.txt");
280        fs::write(&file_path, "test content").unwrap();
281
282        let config = ScannerConfig::new();
283        let content = config.read_file(&file_path).unwrap();
284        assert_eq!(content, "test content");
285    }
286
287    #[test]
288    fn test_read_file_not_found() {
289        let config = ScannerConfig::new();
290        let result = config.read_file(Path::new("/nonexistent/file.txt"));
291        assert!(result.is_err());
292    }
293
294    #[test]
295    fn test_check_content_detects_sudo() {
296        let config = ScannerConfig::new();
297        let findings = config.check_content("sudo rm -rf /", "test.sh");
298        assert!(findings.iter().any(|f| f.id == "PE-001"));
299    }
300
301    #[test]
302    fn test_check_content_skip_comments() {
303        let config = ScannerConfig::new().with_skip_comments(true);
304        let findings = config.check_content("# sudo rm -rf /", "test.sh");
305        assert!(findings.iter().all(|f| f.id != "PE-001"));
306    }
307
308    #[test]
309    fn test_check_frontmatter_wildcard() {
310        let config = ScannerConfig::new();
311        let findings = config.check_frontmatter("allowed-tools: *", "SKILL.md");
312        assert!(findings.iter().any(|f| f.id == "OP-001"));
313    }
314
315    #[test]
316    fn test_engine_accessor() {
317        let config = ScannerConfig::new();
318        let _engine = config.engine();
319    }
320}