scirs2_core/validation/
cross_platform.rs

1//! Cross-platform validation utilities for consistent behavior across operating systems and architectures.
2//!
3//! This module provides validation utilities that handle platform-specific differences
4//! in numeric formats, file systems, memory models, and hardware capabilities to ensure
5//! consistent behavior across Windows, macOS, Linux, and different CPU architectures.
6
7use crate::error::{CoreError, CoreResult, ErrorContext};
8use crate::validation::production::{
9    ValidationContext, ValidationError, ValidationResult, ValidationSeverity,
10};
11use std::collections::HashMap;
12
13/// Platform information detected at runtime
14#[derive(Debug, Clone, PartialEq, Eq)]
15pub struct PlatformInfo {
16    /// Operating system family
17    pub os_family: OsFamily,
18    /// CPU architecture
19    pub arch: CpuArchitecture,
20    /// Available SIMD instruction sets
21    pub simd_support: SimdSupport,
22    /// Endianness of the target platform
23    pub endianness: Endianness,
24    /// Native path separator
25    pub path_separator: char,
26    /// Maximum file path length
27    pub max_path_length: usize,
28    /// Default memory page size
29    pub page_size: usize,
30    /// Whether the platform supports memory-mapped files
31    pub memory_mapping_support: bool,
32    /// Default floating-point precision behavior
33    pub fp_behavior: FloatingPointBehavior,
34}
35
36/// Operating system families
37#[derive(Debug, Clone, Copy, PartialEq, Eq)]
38pub enum OsFamily {
39    Windows,
40    Unix, // Linux, macOS, BSD, etc.
41    Wasm, // WebAssembly runtime
42    Unknown,
43}
44
45/// CPU architecture types
46#[derive(Debug, Clone, Copy, PartialEq, Eq)]
47pub enum CpuArchitecture {
48    X86_64,
49    AArch64, // ARM64
50    X86,     // 32-bit x86
51    ARM,     // 32-bit ARM
52    RISCV64,
53    PowerPC64,
54    Wasm32, // WebAssembly 32-bit
55    Wasm64, // WebAssembly 64-bit
56    Other(u32),
57}
58
59/// SIMD instruction set support
60#[derive(Debug, Clone, PartialEq, Eq)]
61pub struct SimdSupport {
62    /// SSE support levels (x86/x64)
63    pub sse: Option<SseLevel>,
64    /// AVX support levels (x86/x64)
65    pub avx: Option<AvxLevel>,
66    /// NEON support (ARM)
67    pub neon: bool,
68    /// SVE support (ARM)
69    pub sve: bool,
70    /// Vector extension support level
71    pub vector_width: usize,
72}
73
74/// SSE instruction set levels
75#[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord)]
76pub enum SseLevel {
77    Sse,
78    Sse2,
79    Sse3,
80    Ssse3,
81    Sse41,
82    Sse42,
83}
84
85/// AVX instruction set levels
86#[derive(Debug, Clone, Copy, PartialEq, Eq, PartialOrd, Ord)]
87pub enum AvxLevel {
88    Avx,
89    Avx2,
90    Avx512f,
91    Avx512bw,
92    Avx512dq,
93}
94
95/// Platform endianness
96#[derive(Debug, Clone, Copy, PartialEq, Eq)]
97pub enum Endianness {
98    Little,
99    Big,
100}
101
102/// Floating-point behavior characteristics
103#[derive(Debug, Clone, PartialEq, Eq)]
104pub struct FloatingPointBehavior {
105    /// Whether denormal numbers are supported
106    pub denormals_supported: bool,
107    /// Default rounding mode
108    pub rounding_mode: RoundingMode,
109    /// Whether NaN propagation is IEEE 754 compliant
110    pub nan_propagation: bool,
111    /// Whether infinity is supported
112    pub infinity_supported: bool,
113}
114
115/// Floating-point rounding modes
116#[derive(Debug, Clone, Copy, PartialEq, Eq)]
117pub enum RoundingMode {
118    ToNearest,
119    TowardZero,
120    TowardPositiveInfinity,
121    TowardNegativeInfinity,
122}
123
124/// Cross-platform validator with platform-aware validation rules
125pub struct CrossPlatformValidator {
126    /// Current platform information
127    platform_info: PlatformInfo,
128    /// Validation context
129    #[allow(dead_code)]
130    context: ValidationContext,
131    /// Cached validation results for performance
132    cache: HashMap<String, ValidationResult>,
133}
134
135impl CrossPlatformValidator {
136    /// Create a new cross-platform validator
137    pub fn new() -> CoreResult<Self> {
138        let platform_info = Self::detect_platform_info()?;
139        Ok(Self {
140            platform_info,
141            context: ValidationContext::default(),
142            cache: HashMap::new(),
143        })
144    }
145
146    /// Create a validator with custom context
147    pub fn with_context(context: ValidationContext) -> CoreResult<Self> {
148        let platform_info = Self::detect_platform_info()?;
149        Ok(Self {
150            platform_info,
151            context,
152            cache: HashMap::new(),
153        })
154    }
155
156    /// Detect platform information at runtime
157    fn detect_platform_info() -> CoreResult<PlatformInfo> {
158        let os_family = if cfg!(target_family = "wasm") {
159            OsFamily::Wasm
160        } else if cfg!(windows) {
161            OsFamily::Windows
162        } else if cfg!(unix) {
163            OsFamily::Unix
164        } else {
165            OsFamily::Unknown
166        };
167
168        let arch = if cfg!(target_arch = "wasm32") {
169            CpuArchitecture::Wasm32
170        } else if cfg!(target_arch = "wasm64") {
171            CpuArchitecture::Wasm64
172        } else if cfg!(target_arch = "x86_64") {
173            CpuArchitecture::X86_64
174        } else if cfg!(target_arch = "aarch64") {
175            CpuArchitecture::AArch64
176        } else if cfg!(target_arch = "x86") {
177            CpuArchitecture::X86
178        } else if cfg!(target_arch = "arm") {
179            CpuArchitecture::ARM
180        } else if cfg!(target_arch = "riscv64") {
181            CpuArchitecture::RISCV64
182        } else if cfg!(target_arch = "powerpc64") {
183            CpuArchitecture::PowerPC64
184        } else {
185            CpuArchitecture::Other(0)
186        };
187
188        let endianness = if cfg!(target_endian = "little") {
189            Endianness::Little
190        } else {
191            Endianness::Big
192        };
193
194        let path_separator = if cfg!(windows) {
195            '\\'
196        } else {
197            '/' // Unix-style paths for all non-Windows platforms (including WASM)
198        };
199
200        let max_path_length = if cfg!(target_family = "wasm") {
201            1024 // Conservative limit for WASM environments
202        } else if cfg!(windows) {
203            260 // MAX_PATH on Windows (unless long path support is enabled)
204        } else {
205            4096 // Common limit on Unix systems
206        };
207
208        // Detect SIMD support
209        let simd_support = Self::detect_simd_support(arch);
210
211        // Detect system page size
212        let page_size = Self::detect_page_size();
213
214        let memory_mapping_support = !cfg!(target_family = "wasm");
215
216        let fp_behavior = FloatingPointBehavior {
217            denormals_supported: true, // Most modern platforms support denormals
218            rounding_mode: RoundingMode::ToNearest,
219            nan_propagation: true,
220            infinity_supported: true,
221        };
222
223        Ok(PlatformInfo {
224            os_family,
225            arch,
226            simd_support,
227            endianness,
228            path_separator,
229            max_path_length,
230            page_size,
231            memory_mapping_support,
232            fp_behavior,
233        })
234    }
235
236    /// Detect SIMD instruction set support
237    fn detect_simd_support(arch: CpuArchitecture) -> SimdSupport {
238        match arch {
239            CpuArchitecture::X86_64 | CpuArchitecture::X86 => {
240                // For x86/x64, we'd normally use cpuid to detect features
241                // For now, provide conservative defaults
242                SimdSupport {
243                    sse: Some(SseLevel::Sse2), // SSE2 is guaranteed on x64
244                    avx: if cfg!(target_feature = "avx2") {
245                        Some(AvxLevel::Avx2)
246                    } else if cfg!(target_feature = "avx") {
247                        Some(AvxLevel::Avx)
248                    } else {
249                        None
250                    },
251                    neon: false,
252                    sve: false,
253                    vector_width: if cfg!(target_feature = "avx512f") {
254                        512
255                    } else if cfg!(target_feature = "avx2") {
256                        256
257                    } else {
258                        128
259                    },
260                }
261            }
262            CpuArchitecture::AArch64 | CpuArchitecture::ARM => {
263                SimdSupport {
264                    sse: None,
265                    avx: None,
266                    neon: true,        // NEON is standard on ARM64
267                    sve: false,        // SVE detection would require runtime checks
268                    vector_width: 128, // Default ARM NEON width
269                }
270            }
271            CpuArchitecture::Wasm32 | CpuArchitecture::Wasm64 => {
272                SimdSupport {
273                    sse: None,
274                    avx: None,
275                    neon: false,
276                    sve: false,
277                    vector_width: if cfg!(target_feature = "simd128") {
278                        128 // WASM SIMD128 support
279                    } else {
280                        64 // No SIMD support
281                    },
282                }
283            }
284            _ => {
285                SimdSupport {
286                    sse: None,
287                    avx: None,
288                    neon: false,
289                    sve: false,
290                    vector_width: 64, // Conservative default
291                }
292            }
293        }
294    }
295
296    /// Detect system page size
297    fn detect_page_size() -> usize {
298        #[cfg(unix)]
299        {
300            // Most Unix systems use 4KB pages, with some using 64KB (especially ARM64)
301            // For simplicity, we'll use 4KB as default since it's most common
302            4096
303        }
304        #[cfg(windows)]
305        {
306            // Windows typically uses 4KB pages, but can be 64KB on some systems
307            // For simplicity, use the common default
308            4096
309        }
310        #[cfg(not(any(unix, windows)))]
311        {
312            4096 // Default page size
313        }
314    }
315
316    /// Validate a file path for the current platform
317    pub fn validate_file_path(&mut self, path: &str) -> ValidationResult {
318        let mut result = ValidationResult {
319            is_valid: true,
320            errors: Vec::new(),
321            warnings: Vec::new(),
322            metrics: crate::validation::production::ValidationMetrics::default(),
323        };
324
325        // Check path length limits
326        if path.len() > self.platform_info.max_path_length {
327            result.is_valid = false;
328            result.errors.push(ValidationError {
329                code: "PATH_TOO_LONG".to_string(),
330                message: format!(
331                    "Path length {} exceeds platform maximum of {}",
332                    path.len(),
333                    self.platform_info.max_path_length
334                ),
335                field: Some(path.to_string()),
336                suggestion: Some("Use shorter path or enable long path support ".to_string()),
337                severity: ValidationSeverity::Error,
338            });
339        }
340
341        // Platform-specific path validation
342        match self.platform_info.os_family {
343            OsFamily::Windows => self.validate_windows_path(path, &mut result),
344            OsFamily::Unix => self.validate_unix_path(path, &mut result),
345            OsFamily::Wasm => self.validate_wasm_path(path, &mut result),
346            OsFamily::Unknown => {
347                result
348                    .warnings
349                    .push("Unknown platform - basic validation only ".to_string());
350            }
351        }
352
353        // Check for null bytes (invalid on all platforms)
354        if path.contains('\0') {
355            result.is_valid = false;
356            result.errors.push(ValidationError {
357                code: "NULL_BYTE_IN_PATH".to_string(),
358                message: "Path contains null byte ".to_string(),
359                field: Some(path.to_string()),
360                suggestion: Some("Remove null bytes from path ".to_string()),
361                severity: ValidationSeverity::Critical,
362            });
363        }
364
365        result
366    }
367
368    /// Validate Windows-specific path constraints
369    fn validate_windows_path(&self, path: &str, result: &mut ValidationResult) {
370        // Check for invalid characters
371        let invalid_chars = r#"<>:"|?*"#.chars().collect::<Vec<_>>();
372        for &ch in &invalid_chars {
373            if path.contains(ch) {
374                result.is_valid = false;
375                result.errors.push(ValidationError {
376                    code: "INVALID_WINDOWS_CHAR".to_string(),
377                    message: format!("Character '{ch}' is invalid in Windows paths"),
378                    field: Some(path.to_string()),
379                    suggestion: Some("Remove or replace invalid characters".to_string()),
380                    severity: ValidationSeverity::Error,
381                });
382                break;
383            }
384        }
385
386        // Check for reserved names
387        let reserved_names = [
388            "CON", "PRN", "AUX", "NUL", "COM1", "COM2", "COM3", "COM4", "COM5", "COM6", "COM7",
389            "COM8", "COM9", "LPT1", "LPT2", "LPT3", "LPT4", "LPT5", "LPT6", "LPT7", "LPT8", "LPT9",
390        ];
391
392        let path_upper = path.to_uppercase();
393        for &reserved in &reserved_names {
394            if path_upper == reserved || path_upper.starts_with(&format!("{reserved}.")) {
395                result.is_valid = false;
396                result.errors.push(ValidationError {
397                    code: "RESERVED_WINDOWS_NAME".to_string(),
398                    message: format!("'{reserved}' is a reserved name on Windows"),
399                    field: Some(path.to_string()),
400                    suggestion: Some("Use a different filename".to_string()),
401                    severity: ValidationSeverity::Error,
402                });
403                break;
404            }
405        }
406
407        // Check for trailing spaces or periods
408        if path.ends_with(' ') || path.ends_with('.') {
409            result.is_valid = false;
410            result.errors.push(ValidationError {
411                code: "INVALID_WINDOWS_ENDING".to_string(),
412                message: "Windows paths cannot end with spaces or periods".to_string(),
413                field: Some(path.to_string()),
414                suggestion: Some("Remove trailing spaces or periods".to_string()),
415                severity: ValidationSeverity::Error,
416            });
417        }
418    }
419
420    /// Validate Unix-specific path constraints
421    fn validate_unix_path(&self, path: &str, result: &mut ValidationResult) {
422        // Unix paths are generally more permissive, but check for some edge cases
423
424        // Check for double slashes (while technically valid, often unintended)
425        if path.contains("//") {
426            result
427                .warnings
428                .push("Path contains double slashes".to_string());
429        }
430
431        // Check if path starts with /dev/, /proc/, or /sys/ - potentially dangerous
432        let system_prefixes = ["/dev/", "/proc/", "/sys/"];
433        for &prefix in &system_prefixes {
434            if path.starts_with(prefix) {
435                result.warnings.push(format!(
436                    "Path accesses system directory '{prefix}' - ensure this is intended"
437                ));
438                break;
439            }
440        }
441
442        // Check for very long path components (while Unix supports long names,
443        // some filesystems have limits)
444        for component in path.split('/') {
445            if component.len() > 255 {
446                result
447                    .warnings
448                    .push("Path component exceeds 255 characters".to_string());
449                break;
450            }
451        }
452    }
453
454    /// Validate WebAssembly-specific path constraints
455    fn validate_wasm_path(&self, path: &str, result: &mut ValidationResult) {
456        // WebAssembly has very limited file system access
457
458        // Check if path is attempting to access outside the sandbox
459        if path.starts_with("../") || path.contains("/../") {
460            result.is_valid = false;
461            result.errors.push(ValidationError {
462                code: "WASM_SANDBOX_VIOLATION".to_string(),
463                message: "WebAssembly paths cannot escape sandbox with '..'".to_string(),
464                field: Some(path.to_string()),
465                suggestion: Some("Use paths relative to the WASM module".to_string()),
466                severity: ValidationSeverity::Critical,
467            });
468        }
469
470        // Check for absolute paths (typically not allowed in WASM)
471        if path.starts_with('/') {
472            result.warnings.push(
473                "Absolute paths may not be accessible in WebAssembly environment".to_string(),
474            );
475        }
476
477        // Check for special protocols that might not work in WASM
478        let special_prefixes = ["file://", "http://", "https://", "ftp://"];
479        for &prefix in &special_prefixes {
480            if path.starts_with(prefix) {
481                result.warnings.push(format!(
482                    "Protocol '{prefix}' may not be accessible in WebAssembly environment"
483                ));
484                break;
485            }
486        }
487
488        // WASM has stricter limits on path components
489        for component in path.split('/') {
490            if component.len() > 128 {
491                result.warnings.push(
492                    "Very long path components may not be supported in WebAssembly".to_string(),
493                );
494                break;
495            }
496        }
497
498        // Check for WASM-specific virtual file system conventions
499        if path.starts_with("/tmp/") || path.starts_with("/temp/") {
500            result.warnings.push(
501                "Temporary directories may have limited persistence in WebAssembly".to_string(),
502            );
503        }
504
505        // General warning about WASM file system limitations
506        result
507            .warnings
508            .push("WebAssembly environment has limited file system access".to_string());
509    }
510
511    /// Validate numeric value considering platform-specific floating-point behavior
512    pub fn validate_numeric_cross_platform<T>(
513        &mut self,
514        value: T,
515        fieldname: &str,
516    ) -> ValidationResult
517    where
518        T: PartialOrd + Copy + std::fmt::Debug + std::fmt::Display + 'static,
519    {
520        let mut result = ValidationResult {
521            is_valid: true,
522            errors: Vec::new(),
523            warnings: Vec::new(),
524            metrics: crate::validation::production::ValidationMetrics::default(),
525        };
526
527        // Check for platform-specific numeric issues
528        if std::any::TypeId::of::<T>() == std::any::TypeId::of::<f32>()
529            || std::any::TypeId::of::<T>() == std::any::TypeId::of::<f64>()
530        {
531            self.validate_floating_point_value(&value, fieldname, &mut result);
532        }
533
534        // Check for endianness-sensitive operations
535        if self.platform_info.endianness == Endianness::Big {
536            result.warnings.push(
537                "Running on big-endian platform - verify binary data compatibility".to_string(),
538            );
539        }
540
541        result
542    }
543
544    /// Validate floating-point value considering platform behavior
545    fn validate_floating_point_value<T>(
546        &self,
547        value: &T,
548        fieldname: &str,
549        result: &mut ValidationResult,
550    ) where
551        T: std::fmt::Debug + std::fmt::Display,
552    {
553        // This is a simplified check - in practice we'd need unsafe transmutation
554        // to properly inspect the floating-point representation
555        let value_str = format!("{value:?}");
556
557        if value_str.contains("inf") && !self.platform_info.fp_behavior.infinity_supported {
558            result.is_valid = false;
559            result.errors.push(ValidationError {
560                code: "INFINITY_NOT_SUPPORTED".to_string(),
561                message: format!("Infinity values not supported on this platform for {fieldname}"),
562                field: Some(fieldname.to_string()),
563                suggestion: Some("Use finite values only".to_string()),
564                severity: ValidationSeverity::Error,
565            });
566        }
567
568        if value_str.contains("nan") && !self.platform_info.fp_behavior.nan_propagation {
569            result.warnings.push(format!(
570                "NaN value in {fieldname} - platform may not handle NaN propagation correctly"
571            ));
572        }
573    }
574
575    /// Validate SIMD operation compatibility
576    pub fn validate_simd_operation(
577        &mut self,
578        operation: &str,
579        _data_size: usize,
580        vector_size: usize,
581    ) -> ValidationResult {
582        let mut result = ValidationResult {
583            is_valid: true,
584            errors: Vec::new(),
585            warnings: Vec::new(),
586            metrics: crate::validation::production::ValidationMetrics::default(),
587        };
588
589        // Check if requested vector size is supported
590        if vector_size > self.platform_info.simd_support.vector_width {
591            result.is_valid = false;
592            result.errors.push(ValidationError {
593                code: "SIMD_VECTOR_TOO_LARGE".to_string(),
594                message: format!(
595                    "Requested vector size {} exceeds platform maximum of {}",
596                    vector_size, self.platform_info.simd_support.vector_width
597                ),
598                field: Some(vector_size.to_string()),
599                suggestion: Some(format!(
600                    "Use vector size <= {}",
601                    self.platform_info.simd_support.vector_width
602                )),
603                severity: ValidationSeverity::Error,
604            });
605        }
606
607        // Check operation-specific requirements
608        if operation.contains("avx") && self.platform_info.simd_support.avx.is_none() {
609            result.is_valid = false;
610            result.errors.push(ValidationError {
611                code: "AVX_NOT_SUPPORTED".to_string(),
612                message: "AVX instructions not supported on this platform".to_string(),
613                field: Some(operation.to_string()),
614                suggestion: Some("Use SSE fallback or check platform capabilities".to_string()),
615                severity: ValidationSeverity::Error,
616            });
617        }
618
619        if operation.contains("neon") && !self.platform_info.simd_support.neon {
620            result.is_valid = false;
621            result.errors.push(ValidationError {
622                code: "NEON_NOT_SUPPORTED".to_string(),
623                message: "NEON instructions not supported on this platform".to_string(),
624                field: Some(operation.to_string()),
625                suggestion: Some("Use scalar fallback".to_string()),
626                severity: ValidationSeverity::Error,
627            });
628        }
629
630        result
631    }
632
633    /// Validate memory allocation size considering platform limits
634    pub fn validate_memory_allocation(&mut self, size: usize, purpose: &str) -> ValidationResult {
635        let mut result = ValidationResult {
636            is_valid: true,
637            errors: Vec::new(),
638            warnings: Vec::new(),
639            metrics: crate::validation::production::ValidationMetrics::default(),
640        };
641
642        // Check if allocation is aligned to page size for optimal performance
643        if size > self.platform_info.page_size && size % self.platform_info.page_size != 0 {
644            result.warnings.push(format!(
645                "Allocation size {} is not page-aligned (page size: {})",
646                size, self.platform_info.page_size
647            ));
648        }
649
650        // Platform-specific memory limits
651        let max_alloc_size = match self.platform_info.arch {
652            CpuArchitecture::X86 => 2usize.pow(31), // 2GB limit for 32-bit
653            CpuArchitecture::ARM => 2usize.pow(31),
654            CpuArchitecture::Wasm32 => 2usize.pow(31), // WASM32 has 32-bit address space
655            CpuArchitecture::Wasm64 => {
656                // WASM64 is limited by browser memory constraints
657                4usize.pow(30) // 1GB conservative limit for WASM64
658            }
659            _ => usize::MAX, // 64-bit platforms
660        };
661
662        if size > max_alloc_size {
663            result.is_valid = false;
664            result.errors.push(ValidationError {
665                code: "ALLOCATION_TOO_LARGE".to_string(),
666                message: format!(
667                    "Allocation size {size} exceeds platform maximum of {max_alloc_size} for {purpose}"
668                ),
669                field: Some(size.to_string()),
670                suggestion: Some("Reduce allocation size or use memory mapping".to_string()),
671                severity: ValidationSeverity::Error,
672            });
673        }
674
675        // Check if memory mapping is needed but not supported
676        if size > 100_000_000 && !self.platform_info.memory_mapping_support {
677            result.warnings.push(format!(
678                "Large allocation ({size} bytes) for {purpose} but memory mapping not supported"
679            ));
680        }
681
682        result
683    }
684
685    /// Get current platform information
686    pub fn platform_info(&self) -> &PlatformInfo {
687        &self.platform_info
688    }
689
690    /// Clear validation cache
691    pub fn clear_cache(&mut self) {
692        self.cache.clear();
693    }
694
695    /// Check if a specific platform feature is available
696    pub fn is_feature_available(&self, feature: PlatformFeature) -> bool {
697        match feature {
698            PlatformFeature::MemoryMapping => self.platform_info.memory_mapping_support,
699            PlatformFeature::Avx => self.platform_info.simd_support.avx.is_some(),
700            PlatformFeature::Neon => self.platform_info.simd_support.neon,
701            PlatformFeature::LongPaths => {
702                // This would require more sophisticated detection in practice
703                matches!(self.platform_info.os_family, OsFamily::Unix)
704            }
705            PlatformFeature::DenormalNumbers => self.platform_info.fp_behavior.denormals_supported,
706            PlatformFeature::WasmSimd128 => {
707                matches!(
708                    self.platform_info.arch,
709                    CpuArchitecture::Wasm32 | CpuArchitecture::Wasm64
710                ) && self.platform_info.simd_support.vector_width >= 128
711            }
712            PlatformFeature::ThreadSupport => {
713                // WASM traditionally doesn't support threads, but some environments do
714                !matches!(self.platform_info.os_family, OsFamily::Wasm)
715            }
716            PlatformFeature::FileSystemAccess => {
717                // WASM has very limited file system access
718                !matches!(self.platform_info.os_family, OsFamily::Wasm)
719            }
720        }
721    }
722}
723
724/// Platform features that can be queried
725#[derive(Debug, Clone, Copy, PartialEq, Eq)]
726pub enum PlatformFeature {
727    MemoryMapping,
728    Avx,
729    Neon,
730    LongPaths,
731    DenormalNumbers,
732    WasmSimd128,
733    ThreadSupport,
734    FileSystemAccess,
735}
736
737impl Default for CrossPlatformValidator {
738    fn default() -> Self {
739        Self::new().expect("Failed to create cross-platform validator")
740    }
741}
742
743/// Convenience functions for common cross-platform validations
744/// Validate that a path is appropriate for the current platform
745#[allow(dead_code)]
746pub fn validate_path(path: &str) -> CoreResult<()> {
747    let mut validator = CrossPlatformValidator::new()?;
748    let result = validator.validate_file_path(path);
749
750    if result.is_valid {
751        Ok(())
752    } else {
753        Err(CoreError::ValidationError(ErrorContext::new(format!(
754            "Path validation failed: {:?}",
755            result.errors
756        ))))
757    }
758}
759
760/// Validate SIMD capability for an operation
761#[allow(dead_code)]
762pub fn validate_simd_capability(operation: &str, size: usize) -> CoreResult<()> {
763    let mut validator = CrossPlatformValidator::new()?;
764    let result = validator.validate_simd_operation(operation, size, 128);
765
766    if result.is_valid {
767        Ok(())
768    } else {
769        Err(CoreError::ValidationError(ErrorContext::new(format!(
770            "SIMD validation failed: {:?}",
771            result.errors
772        ))))
773    }
774}
775
776/// Get platform information
777#[allow(dead_code)]
778pub fn get_platform_info() -> CoreResult<PlatformInfo> {
779    CrossPlatformValidator::detect_platform_info()
780}
781
782#[cfg(test)]
783mod tests {
784    use super::*;
785
786    #[test]
787    fn test_platform_detection() {
788        let info = CrossPlatformValidator::detect_platform_info().unwrap();
789
790        // Basic sanity checks
791        assert_ne!(info.os_family, OsFamily::Unknown);
792        assert!(info.page_size > 0);
793        assert!(info.max_path_length > 0);
794        assert!(info.simd_support.vector_width > 0);
795    }
796
797    #[test]
798    fn test_path_validation() {
799        let mut validator = CrossPlatformValidator::new().unwrap();
800
801        // Valid path
802        let result = validator.validate_file_path("/home/user/data.txt");
803        assert!(result.is_valid);
804
805        // Path with null byte
806        let result = validator.validate_file_path("/home/user\0/data.txt");
807        assert!(!result.is_valid);
808    }
809
810    #[cfg(windows)]
811    #[test]
812    fn test_windows_path_validation() {
813        let mut validator = CrossPlatformValidator::new().unwrap();
814
815        // Valid Windows path
816        let result = validator.validate_file_path("C:\\Users\\user\\data.txt");
817        assert!(result.is_valid);
818
819        // Invalid character
820        let result = validator.validate_file_path("C:\\Users\\user<data.txt");
821        assert!(!result.is_valid);
822
823        // Reserved name
824        let result = validator.validate_file_path("CON");
825        assert!(!result.is_valid);
826    }
827
828    #[cfg(unix)]
829    #[test]
830    fn test_unix_path_validation() {
831        let mut validator = CrossPlatformValidator::new().unwrap();
832
833        // Valid Unix path
834        let result = validator.validate_file_path("/home/user/data.txt");
835        assert!(result.is_valid);
836
837        // System directory warning
838        let result = validator.validate_file_path("/dev/null");
839        assert!(result.is_valid);
840        assert!(!result.warnings.is_empty());
841    }
842
843    #[test]
844    fn test_simd_validation() {
845        let mut validator = CrossPlatformValidator::new().unwrap();
846
847        // Valid vector size
848        let result = validator.validate_simd_operation("add", 128, 128);
849        assert!(result.is_valid);
850
851        // Too large vector size
852        let result = validator.validate_simd_operation("add", 10000, 10000);
853        assert!(!result.is_valid);
854    }
855
856    #[test]
857    fn test_memory_allocation_validation() {
858        let mut validator = CrossPlatformValidator::new().unwrap();
859
860        // Normal allocation
861        let result = validator.validate_memory_allocation(1024, "test");
862        assert!(result.is_valid);
863
864        // Very large allocation
865        let result = validator.validate_memory_allocation(usize::MAX - 1, "test");
866        // Result depends on platform - 32-bit will fail, 64-bit might succeed
867    }
868
869    #[test]
870    fn test_feature_availability() {
871        let validator = CrossPlatformValidator::new().unwrap();
872
873        // These should return boolean values without panicking
874        let memory_mapping = validator.is_feature_available(PlatformFeature::MemoryMapping);
875        let avx = validator.is_feature_available(PlatformFeature::Avx);
876        let neon = validator.is_feature_available(PlatformFeature::Neon);
877    }
878
879    #[test]
880    fn test_convenience_functions() {
881        // These should not panic
882        let _ = validate_path("/tmp/test.txt");
883        let _ = validate_simd_capability("add", 128);
884        let _ = get_platform_info();
885    }
886
887    #[test]
888    fn test_wasm_specific_features() {
889        let validator = CrossPlatformValidator::new().unwrap();
890
891        // Test WASM-specific feature detection
892        let wasm_simd = validator.is_feature_available(PlatformFeature::WasmSimd128);
893        let thread_support = validator.is_feature_available(PlatformFeature::ThreadSupport);
894        let fs_access = validator.is_feature_available(PlatformFeature::FileSystemAccess);
895
896        // These should return boolean values without panicking
897        // Test passes if we reach here without panicking
898    }
899
900    #[test]
901    fn test_wasm_path_validation() {
902        let mut validator = CrossPlatformValidator::new().unwrap();
903
904        // Simulate WASM environment for testing
905        // Note: This test will behave differently on actual WASM vs native platforms
906
907        // Test relative path (should be okay in WASM)
908        let result = validator.validate_file_path("data/input.txt");
909        // Should be valid but may have warnings in WASM
910
911        // Test sandbox escape attempt
912        let result = validator.validate_file_path("../../../etc/passwd");
913        // This would be rejected in actual WASM validation
914
915        // Just ensure these don't panic
916        // Test passes if we reach here without panicking
917    }
918
919    #[test]
920    fn test_platform_memory_limits() {
921        let validator = CrossPlatformValidator::new().unwrap();
922
923        // Test that memory allocation validation considers platform architecture
924        let small_alloc = validator.platform_info().page_size * 2;
925        let large_alloc = 2usize.pow(30); // 1GB
926
927        // These should not panic
928        let mut validator_mut = CrossPlatformValidator::new().unwrap();
929        let small_result = validator_mut.validate_memory_allocation(small_alloc, "test");
930        let large_result = validator_mut.validate_memory_allocation(large_alloc, "test");
931
932        // Test passes if we reach here without panicking
933    }
934
935    #[test]
936    fn test_simd_capabilities_cross_platform() {
937        let mut validator = CrossPlatformValidator::new().unwrap();
938
939        // Test SIMD validation across different architectures
940        let result = validator.validate_simd_operation("generic_add", 64, 64);
941        assert!(result.is_valid); // Should be supported on all platforms
942
943        let result = validator.validate_simd_operation("avx2_multiply", 256, 256);
944        // Result depends on platform - should not panic
945
946        let result = validator.validate_simd_operation("neon_add", 128, 128);
947        // Result depends on platform - should not panic
948
949        // Test passes if we reach here without panicking
950    }
951}