drifter 0.1.11

A TUI-based S3 multipart uploader featuring resumable transfers and ClamAV integration.
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
use crate::core::config::{Config, ScanMode};
use anyhow::{Context, Result};
use std::net::SocketAddr;
use tokio::fs::File as TokioFile;
use tokio::io::{AsyncReadExt, AsyncSeekExt, AsyncWriteExt};
use tokio::net::TcpStream;
use tracing::{error, info, warn};

#[derive(Debug, Clone, PartialEq)]
pub enum ScanResult {
    Clean,
    Infected(String),
}

#[derive(Clone)]
pub struct Scanner {
    mode: ScanMode,
    clamd_host: String,
    clamd_port: u16,
    scan_chunk_size_mb: u64,
    concurrency: usize,
}

impl Scanner {
    pub fn new(config: &Config) -> Self {
        Self {
            mode: config.scan_mode.clone(),
            clamd_host: config.clamd_host.clone(),
            clamd_port: config.clamd_port,
            scan_chunk_size_mb: config.scan_chunk_size_mb,
            concurrency: config.concurrency_scan_parts.max(1),
        }
    }

    pub async fn scan_file(&self, path: &str) -> Result<ScanResult> {
        match self.mode {
            ScanMode::Skip => {
                info!("Scanning skipped for: {}", path);
                Ok(ScanResult::Clean)
            }
            ScanMode::Stream => self.scan_chunked(path).await,
            ScanMode::Full => self.scan_chunked(path).await,
        }
    }

    async fn scan_chunked(&self, path: &str) -> Result<ScanResult> {
        use tokio::task::JoinSet;

        info!("Starting chunked scan for: {}", path);
        let chunk_size = Self::calculate_effective_chunk_size(self.scan_chunk_size_mb);
        let concurrency = self.concurrency.max(1);

        let file = TokioFile::open(path).await.context("Failed to open file")?;
        let file_len = file.metadata().await?.len();

        // Calculate all chunk offsets
        let offsets = Self::calculate_chunk_offsets(file_len, self.scan_chunk_size_mb);

        let mut join_set = JoinSet::new();
        let mut offsets_iter = offsets.into_iter();

        // Fill initial queue
        for _ in 0..concurrency {
            if let Some(chunk_offset) = offsets_iter.next() {
                let path = path.to_string();
                let host = self.clamd_host.clone();
                let port = self.clamd_port;

                join_set.spawn(async move {
                    scan_chunk_at_offset(&path, chunk_offset, chunk_size, &host, port).await
                });
            }
        }

        // Process results and spawn remaining
        while let Some(res) = join_set.join_next().await {
            match res {
                Ok(Ok(ScanResult::Infected(virus))) => {
                    warn!("Infection detected in file: {} ({})", path, virus);
                    join_set.abort_all();
                    return Ok(ScanResult::Infected(virus)); // Infection found - stop scanning
                }
                Ok(Ok(ScanResult::Clean)) => {
                    // Clean, continue

                    // Spawn next chunk if available
                    if let Some(chunk_offset) = offsets_iter.next() {
                        let path = path.to_string();
                        let host = self.clamd_host.clone();
                        let port = self.clamd_port;

                        join_set.spawn(async move {
                            scan_chunk_at_offset(&path, chunk_offset, chunk_size, &host, port).await
                        });
                    }
                }
                Ok(Err(e)) => {
                    error!("Scan chunk error: {}", e);
                    join_set.abort_all();
                    return Err(e);
                }
                Err(e) => {
                    error!("Scan task failed: {}", e);
                    join_set.abort_all();
                    return Err(anyhow::anyhow!("Scan task failed: {}", e));
                }
            }
        }

        info!("Scan complete (clean) for: {}", path);
        Ok(ScanResult::Clean)
    }

    pub async fn check_connection(&self) -> Result<String> {
        let address = format!("{}:{}", self.clamd_host, self.clamd_port);
        let addr: SocketAddr = address.parse().context("Invalid clamd address")?;

        let mut stream = TcpStream::connect(addr)
            .await
            .context("Failed to connect to clamd")?;
        stream
            .write_all(b"PING")
            .await
            .context("Failed to send PING")?;

        let mut response = Vec::new();
        stream
            .read_to_end(&mut response)
            .await
            .context("Failed to read response")?;
        let response_str = String::from_utf8_lossy(&response);

        if response_str.trim() == "PONG" {
            Ok("Connected to ClamAV successfully".to_string())
        } else {
            Err(anyhow::anyhow!(
                "Unexpected response from ClamAV: '{}'",
                response_str.trim()
            ))
        }
    }
}

impl Scanner {
    /// Calculate chunk offsets for scanning a file
    /// Returns a vector of byte offsets where each chunk should start
    /// Chunks overlap by 1MB to ensure malware spanning chunk boundaries is detected
    pub fn calculate_chunk_offsets(file_size: u64, chunk_size_mb: u64) -> Vec<u64> {
        let chunk_size = (chunk_size_mb * 1024 * 1024) as usize;
        let overlap = 1024 * 1024; // 1MB overlap
        let chunk_size = chunk_size.max(overlap + 1024);

        let mut offsets = Vec::new();
        let mut offset = 0u64;
        while offset < file_size {
            offsets.push(offset);
            offset += (chunk_size as u64) - (overlap as u64);
        }

        offsets
    }

    /// Calculate the actual chunk size used for scanning
    /// Ensures minimum size to accommodate overlap
    pub fn calculate_effective_chunk_size(chunk_size_mb: u64) -> usize {
        let chunk_size = (chunk_size_mb * 1024 * 1024) as usize;
        let overlap = 1024 * 1024; // 1MB overlap
        chunk_size.max(overlap + 1024)
    }
}

/// Standalone function for parallel chunk scanning
async fn scan_chunk_at_offset(
    path: &str,
    offset: u64,
    chunk_size: usize,
    host: &str,
    port: u16,
) -> Result<ScanResult> {
    use std::io::SeekFrom;

    let mut file = TokioFile::open(path).await.context("Failed to open file")?;
    file.seek(SeekFrom::Start(offset))
        .await
        .context("Failed to seek")?;

    let mut buffer = vec![0u8; chunk_size];
    let mut bytes_read = 0;

    while bytes_read < chunk_size {
        let n = file
            .read(&mut buffer[bytes_read..])
            .await
            .context("Failed to read file")?;
        if n == 0 {
            break;
        }
        bytes_read += n;
    }

    if bytes_read == 0 {
        return Ok(ScanResult::Clean); // Empty chunk, nothing to scan
    }

    // Send to ClamAV
    let address = format!("{}:{}", host, port);
    let addr: SocketAddr = address.parse().context("Invalid clamd address")?;

    let mut stream = TcpStream::connect(addr)
        .await
        .context("Failed to connect to clamd")?;
    stream
        .write_all(b"zINSTREAM\0")
        .await
        .context("Failed to send zINSTREAM")?;

    let mut cursor = 0;
    while cursor < bytes_read {
        let end = (cursor + 32768).min(bytes_read);
        let chunk = &buffer[cursor..end];
        let len_bytes = (chunk.len() as u32).to_be_bytes();

        stream
            .write_all(&len_bytes)
            .await
            .context("Failed to write chunk len")?;
        stream
            .write_all(chunk)
            .await
            .context("Failed to write chunk")?;

        cursor = end;
    }

    stream
        .write_all(&[0u8; 4])
        .await
        .context("Failed to write stream end")?;

    let mut response = Vec::new();
    stream
        .read_to_end(&mut response)
        .await
        .context("Failed to read response")?;
    let response_str = String::from_utf8_lossy(&response);

    if response_str.contains("FOUND") {
        // Parse virus name: "stream: Win.Test.EICAR_HDB-1 FOUND"
        let parts: Vec<&str> = response_str.split("FOUND").collect();
        let name_part = parts.first().unwrap_or(&"Unknown");
        let virus_name = name_part.trim().replace("stream: ", "").trim().to_string();
        Ok(ScanResult::Infected(virus_name))
    } else if response_str.contains("OK") {
        Ok(ScanResult::Clean)
    } else {
        Err(anyhow::anyhow!("ClamAV Error: {}", response_str.trim()))
    }
}

#[cfg(test)]
mod tests {
    use super::*;

    // --- Chunk Size Calculation Tests ---

    #[test]
    fn test_calculate_effective_chunk_size_default() {
        // Default config is usually 10MB
        let chunk_size = Scanner::calculate_effective_chunk_size(10);
        assert_eq!(
            chunk_size,
            10 * 1024 * 1024,
            "10MB config should give 10MB chunks"
        );
    }

    #[test]
    fn test_calculate_effective_chunk_size_minimum_enforced() {
        // Very small config should be bumped up to minimum (1MB overlap + 1KB)
        let chunk_size = Scanner::calculate_effective_chunk_size(1);
        let min_size = 1024 * 1024 + 1024; // 1MB + 1KB

        // 1MB config = 1048576 bytes
        // Should use config size since 1048576 > 1049600
        // Actually, let me check the logic: chunk_size.max(overlap + 1024)
        // 1MB = 1048576, overlap + 1024 = 1049600
        // So max should be 1049600
        assert!(chunk_size >= min_size, "Should enforce minimum chunk size");
    }

    #[test]
    fn test_calculate_effective_chunk_size_large_value() {
        // Large config (100MB)
        let chunk_size = Scanner::calculate_effective_chunk_size(100);
        assert_eq!(chunk_size, 100 * 1024 * 1024);
    }

    // --- Chunk Offset Calculation Tests ---

    #[test]
    fn test_calculate_chunk_offsets_single_chunk() {
        // File smaller than chunk size -> single chunk at offset 0
        let file_size = 5 * 1024 * 1024; // 5MB
        let chunk_size_mb = 10; // 10MB chunks

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);

        assert_eq!(offsets.len(), 1, "Small file should have 1 chunk");
        assert_eq!(offsets[0], 0, "First chunk starts at offset 0");
    }

    #[test]
    fn test_calculate_chunk_offsets_exact_multiple() {
        // File that's exactly 2x chunk size (accounting for overlap)
        let chunk_size_mb = 10;
        let effective_chunk_size = Scanner::calculate_effective_chunk_size(chunk_size_mb);
        let overlap = 1024 * 1024;
        let stride = effective_chunk_size - overlap;

        let file_size = (stride * 2) as u64;

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);

        // Should have 2 chunks
        assert_eq!(offsets.len(), 2);
        assert_eq!(offsets[0], 0);
        assert_eq!(offsets[1], stride as u64);
    }

    #[test]
    fn test_calculate_chunk_offsets_with_overlap() {
        // Verify that chunks overlap by 1MB
        let chunk_size_mb = 10; // 10MB
        let file_size = 50 * 1024 * 1024; // 50MB file

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);

        let effective_chunk_size = Scanner::calculate_effective_chunk_size(chunk_size_mb);
        let overlap = 1024 * 1024; // 1MB
        let stride = effective_chunk_size - overlap;

        // Verify stride between chunks
        for i in 1..offsets.len() {
            let diff = offsets[i] - offsets[i - 1];
            assert_eq!(
                diff, stride as u64,
                "Chunks should be spaced by stride (chunk_size - overlap)"
            );
        }
    }

    #[test]
    fn test_calculate_chunk_offsets_coverage() {
        // Verify all chunks together cover the entire file
        let chunk_size_mb = 10;
        let file_size = 35 * 1024 * 1024; // 35MB

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);
        let effective_chunk_size = Scanner::calculate_effective_chunk_size(chunk_size_mb);

        // Last chunk should start before file_size
        let last_offset = offsets.last().unwrap();
        assert!(
            *last_offset < file_size,
            "Last chunk should start before EOF"
        );

        // Last chunk should cover end of file
        let last_chunk_end = last_offset + effective_chunk_size as u64;
        assert!(
            last_chunk_end >= file_size,
            "Last chunk should cover end of file"
        );
    }

    #[test]
    fn test_calculate_chunk_offsets_empty_file() {
        let offsets = Scanner::calculate_chunk_offsets(0, 10);
        assert_eq!(offsets.len(), 0, "Empty file should have no chunks");
    }

    #[test]
    fn test_calculate_chunk_offsets_tiny_file() {
        // File smaller than 1KB
        let file_size = 512; // 512 bytes
        let offsets = Scanner::calculate_chunk_offsets(file_size, 10);

        assert_eq!(offsets.len(), 1, "Tiny file should have 1 chunk");
        assert_eq!(offsets[0], 0);
    }

    #[test]
    fn test_calculate_chunk_offsets_large_file() {
        // 1GB file with 10MB chunks
        let file_size = 1024 * 1024 * 1024u64; // 1GB
        let chunk_size_mb = 10;

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);

        let effective_chunk_size = Scanner::calculate_effective_chunk_size(chunk_size_mb);
        let overlap = 1024 * 1024;
        let stride = effective_chunk_size - overlap;

        // Calculate expected number of chunks
        // Formula: ceil(file_size / stride)
        let expected_chunks = ((file_size as f64) / (stride as f64)).ceil() as usize;

        assert_eq!(
            offsets.len(),
            expected_chunks,
            "Large file should have correct number of chunks"
        );
    }

    #[test]
    fn test_calculate_chunk_offsets_overlap_detection() {
        // Verify that a signature spanning chunk boundaries is covered
        let chunk_size_mb = 10;
        let file_size = 25 * 1024 * 1024; // 25MB

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);
        let effective_chunk_size = Scanner::calculate_effective_chunk_size(chunk_size_mb);

        // Check that each pair of consecutive chunks overlaps
        for i in 1..offsets.len() {
            let prev_chunk_end = offsets[i - 1] + effective_chunk_size as u64;
            let current_chunk_start = offsets[i];

            assert!(
                prev_chunk_end > current_chunk_start,
                "Chunks {} and {} should overlap",
                i - 1,
                i
            );

            // Verify overlap is at least 1MB
            let overlap_size = prev_chunk_end - current_chunk_start;
            assert!(
                overlap_size >= 1024 * 1024,
                "Overlap should be at least 1MB, got {} bytes",
                overlap_size
            );
        }
    }

    // --- Chunk Boundary Tests ---

    #[test]
    fn test_chunk_boundaries_first_chunk() {
        let file_size = 50 * 1024 * 1024;
        let chunk_size_mb = 10;

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);
        let effective_chunk_size = Scanner::calculate_effective_chunk_size(chunk_size_mb);

        // First chunk
        let start = offsets[0];
        let end = start + effective_chunk_size as u64;

        assert_eq!(start, 0);
        assert_eq!(end, 10 * 1024 * 1024);
    }

    #[test]
    fn test_chunk_boundaries_middle_chunk() {
        let file_size = 50 * 1024 * 1024;
        let chunk_size_mb = 10;

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);
        let effective_chunk_size = Scanner::calculate_effective_chunk_size(chunk_size_mb);

        if offsets.len() >= 3 {
            let middle_idx = offsets.len() / 2;
            let start = offsets[middle_idx];
            let end = start + effective_chunk_size as u64;

            // Middle chunk should be within file bounds
            assert!(start < file_size);
            assert!(end > start);
        }
    }

    #[test]
    fn test_chunk_boundaries_last_chunk() {
        let file_size = 25 * 1024 * 1024; // 25MB
        let chunk_size_mb = 10;

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);
        let last_offset = offsets.last().unwrap();

        // Last chunk should start before EOF
        assert!(*last_offset < file_size);

        // But should be positioned to cover the end
        let effective_chunk_size = Scanner::calculate_effective_chunk_size(chunk_size_mb);
        let last_chunk_end = last_offset + effective_chunk_size as u64;
        assert!(
            last_chunk_end >= file_size,
            "Last chunk should cover EOF: chunk_end={}, file_size={}",
            last_chunk_end,
            file_size
        );
    }

    // --- Scan Mode Tests ---

    #[test]
    fn test_scan_mode_values() {
        // Verify ScanMode enum values exist
        let _skip = ScanMode::Skip;
        let _stream = ScanMode::Stream;
        let _full = ScanMode::Full;
    }

    #[test]
    fn test_scan_result_clean() {
        let result = ScanResult::Clean;
        assert_eq!(result, ScanResult::Clean);
    }

    #[test]
    fn test_scan_result_infected() {
        let result = ScanResult::Infected("TestVirus".to_string());

        match result {
            ScanResult::Infected(name) => assert_eq!(name, "TestVirus"),
            _ => panic!("Expected Infected result"),
        }
    }

    #[test]
    fn test_scan_result_equality() {
        assert_eq!(ScanResult::Clean, ScanResult::Clean);
        assert_eq!(
            ScanResult::Infected("Virus1".to_string()),
            ScanResult::Infected("Virus1".to_string())
        );
        assert_ne!(ScanResult::Clean, ScanResult::Infected("Virus".to_string()));
    }

    // --- Configuration Tests ---

    #[test]
    fn test_scanner_effective_chunk_size_consistency() {
        // Test various config values
        let test_cases = vec![
            (1, 1024 * 1024 + 1024),  // 1MB -> minimum enforced
            (5, 5 * 1024 * 1024),     // 5MB -> normal
            (10, 10 * 1024 * 1024),   // 10MB -> normal (default)
            (50, 50 * 1024 * 1024),   // 50MB -> normal
            (100, 100 * 1024 * 1024), // 100MB -> normal
        ];

        for (config_mb, expected_min) in test_cases {
            let chunk_size = Scanner::calculate_effective_chunk_size(config_mb);
            assert!(
                chunk_size >= expected_min,
                "Config {}MB should produce chunk size >= {} bytes, got {}",
                config_mb,
                expected_min,
                chunk_size
            );
        }
    }

    // --- Edge Cases ---

    #[test]
    fn test_chunk_offsets_exactly_one_chunk_size() {
        // File exactly equal to chunk size
        // Due to overlap logic, this will create 2 chunks (second chunk for overlap coverage)
        let chunk_size_mb = 10;
        let effective_chunk_size = Scanner::calculate_effective_chunk_size(chunk_size_mb);
        let file_size = effective_chunk_size as u64;

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);

        // With overlap, we expect 2 chunks even for file size = chunk size
        // This ensures the entire file is scanned with proper overlap
        assert_eq!(
            offsets.len(),
            2,
            "File equal to chunk size creates 2 chunks (for overlap)"
        );
    }

    #[test]
    fn test_chunk_offsets_one_byte_over_chunk_size() {
        // File just barely larger than chunk size
        let chunk_size_mb = 10;
        let effective_chunk_size = Scanner::calculate_effective_chunk_size(chunk_size_mb);
        let file_size = effective_chunk_size as u64 + 1;

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);

        assert!(
            offsets.len() >= 2,
            "File slightly larger than chunk size should have 2+ chunks"
        );
    }

    #[test]
    fn test_chunk_calculation_realistic_scenario() {
        // Realistic scenario: 500MB file with 50MB chunks
        let file_size = 500 * 1024 * 1024u64;
        let chunk_size_mb = 50;

        let offsets = Scanner::calculate_chunk_offsets(file_size, chunk_size_mb);
        let effective_chunk_size = Scanner::calculate_effective_chunk_size(chunk_size_mb);

        // Verify reasonable number of chunks (should be around 10-11)
        assert!(
            offsets.len() >= 10 && offsets.len() <= 15,
            "500MB file with 50MB chunks should have 10-15 chunks, got {}",
            offsets.len()
        );

        // Verify all chunks except last are evenly spaced
        let overlap = 1024 * 1024;
        let expected_stride = effective_chunk_size - overlap;

        for i in 1..offsets.len().min(3) {
            let actual_stride = offsets[i] - offsets[i - 1];
            assert_eq!(
                actual_stride, expected_stride as u64,
                "Chunks should be evenly spaced"
            );
        }
    }
}