Files
worldmonitor/scripts/seed-climate-disasters.mjs
Elie Habib 044598346e feat(seed-contract): PR 2a — runSeed envelope dual-write + 91 seeders migrated (#3097)
* feat(seed-contract): PR 2a — runSeed envelope dual-write + 91 seeders migrated

Opt-in contract path in runSeed: when opts.declareRecords is provided, write
{_seed, data} envelope to the canonical key alongside legacy seed-meta:*
(dual-write). State machine: OK / OK_ZERO / RETRY with zeroIsValid opt.
declareRecords throws or returns non-integer → hard fail (contract violation).
extraKeys[*] support per-key declareRecords; each extra key writes its own
envelope. Legacy seeders (no declareRecords) entirely unchanged.

Migrated all 91 scripts/seed-*.mjs to contract mode. Each exports
declareRecords returning the canonical record count, and passes
schemaVersion: 1 + maxStaleMin (matched to api/health.js SEED_META, or 2.5x
interval where no registry entry exists). Contract conformance reports 84/86
seeders with full descriptor (2 pre-existing warnings).

Legacy seed-meta keys still written so unmigrated readers keep working;
follow-up slices flip health.js + readers to envelope-first.

Tests: 61/61 PR 1 tests still pass.

Next slices for PR 2:
- api/health.js registry collapse + 15 seed-bundle-*.mjs canonicalKey wiring
- reader migration (mcp, resilience, aviation, displacement, regional-snapshot)
- direct writers — ais-relay.cjs, consumer-prices-core publish.ts
- public-boundary stripSeedEnvelope + test migration

Plan: docs/plans/2026-04-14-002-fix-runseed-zero-record-lockout-plan.md

* fix(seed-contract): unwrap envelopes in internal cross-seed readers

After PR 2a enveloped 91 canonical keys as {_seed, data}, every script-side
reader that returned the raw parsed JSON started silently handing callers the
envelope instead of the bare payload. WoW baselines (bigmac, grocery-basket,
fear-greed) saw undefined .countries / .composite; seed-climate-anomalies saw
undefined .normals from climate:zone-normals:v1; seed-thermal-escalation saw
undefined .fireDetections from wildfire:fires:v1; seed-forecasts' ~40-key
pipeline batch returned envelopes for every input.

Fix: route every script-side reader through unwrapEnvelope(...).data. Legacy
bare-shape values pass through unchanged (unwrapEnvelope returns
{_seed: null, data: raw} for any non-envelope shape).

Changed:
- scripts/_seed-utils.mjs: import unwrapEnvelope; redisGet, readSeedSnapshot,
  verifySeedKey all unwrap. Exported new readCanonicalValue() helper for
  cross-seed consumers.
- 18 seed-*.mjs scripts with local redisGet-style helpers or inline fetch
  patched to unwrap via the envelope source module (subagent sweep).
- scripts/seed-forecasts.mjs pipeline batch: parse() unwraps each result.
- scripts/seed-energy-spine.mjs redisMget: unwraps each result.

Tests:
- tests/seed-utils-envelope-reads.test.mjs: 7 new cases covering envelope
  + legacy + null paths for readSeedSnapshot and verifySeedKey.
- Full seed suite: 67/67 pass (was 61, +6 new).

Addresses both of user's P1 findings on PR #3097.

* feat(seed-contract): envelope-aware reads in server + api helpers

Every RPC and public-boundary reader now automatically strips _seed from
contract-mode canonical keys. Legacy bare-shape values pass through unchanged
(unwrapEnvelope no-ops on non-envelope shapes).

Changed helpers (one-place fix — unblocks ~60 call sites):
- server/_shared/redis.ts: getRawJson, getCachedJson, getCachedJsonBatch
  unwrap by default. cachedFetchJson inherits via getCachedJson.
- api/_upstash-json.js: readJsonFromUpstash unwraps (covers api/mcp.ts
  tool responses + all its canonical-key reads).
- api/bootstrap.js: getCachedJsonBatch unwraps (public-boundary —
  clients never see envelope metadata).

Left intentionally unchanged:
- api/health.js / api/seed-health.js: read only seed-meta:* keys which
  remain bare-shape during dual-write. unwrapEnvelope already imported at
  the meta-read boundary (PR 1) as a defensive no-op.

Tests: 67/67 seed tests pass. typecheck + typecheck:api clean.

This is the blast-radius fix the PR #3097 review called out — external
readers that would otherwise see {_seed, data} after the writer side
migrated.

* fix(test): strip export keyword in vm.runInContext'd seed source

cross-source-signals-regulatory.test.mjs loads scripts/seed-cross-source-signals.mjs
via vm.runInContext, which cannot parse ESM `export` syntax. PR 2a added
`export function declareRecords` to every seeder, which broke this test's
static-analysis approach.

Fix: strip the `export` keyword from the declareRecords line in the
preprocessed source string so the function body still evaluates as a plain
declaration.

Full test:data suite: 5307/5307 pass. typecheck + typecheck:api clean.

* feat(seed-contract): consumer-prices publish.ts writes envelopes

Wrap the 5 canonical keys written by consumer-prices-core/src/jobs/publish.ts
(overview, movers:7d/30d, freshness, categories:7d/30d/90d, retailer-spread,
basket-series) in {_seed, data} envelopes. Legacy seed-meta:<key> writes
preserved for dual-write.

Inlined a buildEnvelope helper (10 lines) rather than taking a cross-package
dependency — consumer-prices-core is a standalone npm package. Documented the
four-file parity contract (mjs source, ts mirror, js edge mirror, this copy).

Contract fields: sourceVersion='consumer-prices-core-publish-v1', schemaVersion=1,
state='OK' (recordCount>0) or 'OK_ZERO' (legitimate zero).

Typecheck: no new errors in publish.ts.

* fix(seed-contract): 3 more server-side readers unwrap envelopes

Found during final audit:

- server/worldmonitor/resilience/v1/_shared.ts: resilience score reader
  parsed cached GetResilienceScoreResponse raw. Contract-mode seed-resilience-scores
  now envelopes those keys.
- server/worldmonitor/resilience/v1/get-resilience-ranking.ts: p05/p95
  interval lookup parsed raw from seed-resilience-scores' extra-key path.
- server/worldmonitor/infrastructure/v1/_shared.ts: mgetJson() used for
  count-source keys (wildfire:fires:v1, news:insights:v1) which are both
  contract-mode now.

All three now unwrap via server/_shared/seed-envelope. Legacy shapes pass
through unchanged.

Typecheck clean.

* feat(seed-contract): ais-relay.cjs direct writes produce envelopes

32 canonical-key write sites in scripts/ais-relay.cjs now produce {_seed, data}
envelopes. Inlined buildEnvelope() (CJS module can't require ESM source) +
envelopeWrite(key, data, ttlSeconds, meta) wrapper. Enveloped keys span market
bootstrap, aviation, cyber-threats, theater-posture, weather-alerts, economic
spending/fred/worldbank, tech-events, corridor-risk, usni-fleet, shipping-stress,
social:reddit, wsb-tickers, pizzint, product-catalog, chokepoint transits,
ucdp-events, satellites, oref.

Left bare (not seeded data keys): seed-meta:* (dual-write legacy),
classifyCacheKey LLM cache, notam:prev-closed-state internal state,
wm:notif:scan-dedup flags.

Updated tests/ucdp-seed-resilience.test.mjs regex to accept both upstashSet
(pre-contract) and envelopeWrite (post-contract) call patterns.

* feat(seed-contract): 15 bundle files add canonicalKey for envelope gate

54 bundle sections across 12 files now declare canonicalKey alongside the
existing seedMetaKey. _bundle-runner.mjs (from PR 1) prefers canonicalKey
when both are present — gates section runs on envelope._seed.fetchedAt
read directly from the data key, eliminating the meta-outlives-data class
of bugs.

Files touched:
- climate (5), derived-signals (2), ecb-eu (3), energy-sources (6),
  health (2), imf-extended (4), macro (10), market-backup (9),
  portwatch (4), relay-backup (2), resilience-recovery (5), static-ref (2)

Skipped (14 sections, 3 whole bundles): multi-key writers, dynamic
templated keys (displacement year-scoped), or non-runSeed orchestrators
(regional brief cron, resilience-scores' 222-country publish, validation/
benchmark scripts). These continue to use seedMetaKey or their own gate.

seedMetaKey preserved everywhere — dual-write. _bundle-runner.mjs falls
back to legacy when canonicalKey is absent.

All 15 bundles pass node --check. test:data: 5307/5307. typecheck:all: clean.

* fix(seed-contract): 4 PR #3097 review P1s — transform/declareRecords mismatches + envelope leaks

Addresses both P1 findings and the extra-key seed-meta leak surfaced in review:

1. runSeed helper-level invariant: seed-meta:* keys NEVER envelope.
   scripts/_seed-utils.mjs exports shouldEnvelopeKey(key) — returns false for
   any key starting with 'seed-meta:'. Both atomicPublish (canonical) and
   writeExtraKey (extras) gate the envelope wrap through this helper. Fixes
   seed-iea-oil-stocks' ANALYSIS_META_EXTRA_KEY silently getting enveloped,
   which broke health.js parsing the value as bare {fetchedAt, recordCount}.
   Also defends against any future manual writeExtraKey(..., envelopeMeta)
   call that happens to target a seed-meta:* key.

2. seed-token-panels canonical + extras fixed.
   publishTransform returns data.defi (the defi panel itself, shape {tokens}).
   Old declareRecords counted data.defi.tokens + data.ai.tokens + data.other.tokens
   on the transformed payload → 0 → RETRY path → canonical market:defi-tokens:v1
   never wrote, and because runSeed returned before the extraKeys loop,
   market:ai-tokens:v1 + market:other-tokens:v1 stayed stale too.
   New: declareRecords counts data.tokens on the transformed shape. AI_KEY +
   OTHER_KEY extras reuse the same function (transforms return structurally
   identical panels). Added isMain guard so test imports don't fire runSeed.

3. api/product-catalog.js cached reader unwraps envelope.
   ais-relay.cjs now envelopes product-catalog:v2 via envelopeWrite(). The
   edge reader did raw JSON.parse(result) and returned {_seed, data} to
   clients, breaking the cached path. Fix: import unwrapEnvelope from
   ./_seed-envelope.js, apply after JSON.parse. One site — :238-241 is
   downstream of getFromCache(), so the single reader fix covers both.

4. Regression lock tests/seed-contract-transform-regressions.test.mjs (11 cases):
   - shouldEnvelopeKey invariant: seed-meta:* false, canonical true
   - Token-panels declareRecords works on transformed shape (canonical + both extras)
   - Explicit repro of pre-fix buggy signature returning 0 — guards against revert
   - resolveRecordCount accepts 0, rejects non-integer
   - Product-catalog envelope unwrap returns bare shape; legacy passes through

Verification:
- npm run test:data → 5318/5318 pass (was 5307 — 11 new regressions)
- npm run typecheck:all → clean
- node --check on every modified script

iea-oil-stocks canonical declareRecords was NOT broken (user confirmed during
review — buildIndex preserves .members); only its ANALYSIS_META_EXTRA_KEY
was affected, now covered generically by commit 1's helper invariant.

* fix(seed-contract): seed-token-panels validateFn also runs on post-transform shape

Review finding: fixing declareRecords wasn't sufficient — atomicPublish() runs
validateFn(publishData) on the transformed payload too. seed-token-panels'
validate() checked data.defi/.ai/.other on the transformed {tokens} shape,
returned false, and runSeed took the early skipped-write branch (before even
reaching the declareRecords RETRY logic). Net effect: same as before the
declareRecords fix — canonical + both extras stayed stale.

Fix: validate() now checks the canonical defi panel directly (Array.isArray
(data?.tokens) && has at least one t.price > 0). AI/OTHER panels are validated
implicitly by their own extraKey declareRecords on write.

Audited the other 9 seeders with publishTransform (bls-series, bis-extended,
bis-data, gdelt-intel, trade-flows, iea-oil-stocks, jodi-gas, sanctions-pressure,
forecasts): all validateFn's correctly target the post-transform shape. Only
token-panels regressed.

Added 4 regression tests (tests/seed-contract-transform-regressions.test.mjs):
- validate accepts transformed panel with priced tokens
- validate rejects all-zero-price tokens
- validate rejects empty/missing tokens
- Explicit pre-fix repro (buggy old signature fails on transformed shape)

Verification:
- npm run test:data → 5322/5322 pass (was 5318; +4 new)
- npm run typecheck:all → clean
- node --check clean

* feat(seed-contract): add /api/seed-contract-probe validation endpoint

Single machine-readable gate for 'is PR #3097 working in production'.
Replaces the curl/jq ritual with one authenticated edge call that returns
HTTP 200 ok:true or 503 + failing check list.

What it validates:
- 8 canonical keys have {_seed, data} envelopes with required data fields
  and minRecords floors (fsi-eu, zone-normals, 3 token panels + minRecords
  guard against token-panels RETRY regression, product-catalog, wildfire,
  earthquakes).
- 2 seed-meta:* keys remain BARE (shouldEnvelopeKey invariant; guards
  against iea-oil-stocks ANALYSIS_META_EXTRA_KEY-class regressions).
- /api/product-catalog + /api/bootstrap responses contain no '_seed' leak.

Auth: x-probe-secret header must match RELAY_SHARED_SECRET (reuses existing
Vercel↔Railway internal trust boundary).

Probe logic is exported (checkProbe, checkPublicBoundary, DEFAULT_PROBES) for
hermetic testing. tests/seed-contract-probe.test.mjs covers every branch:
envelope pass/fail on field/records/shape, bare pass/fail on shape/field,
missing/malformed JSON, Redis non-2xx, boundary seed-leak detection,
DEFAULT_PROBES sanity (seed-meta invariant present, token-panels minRecords
guard present).

Usage:
  curl -H "x-probe-secret: $RELAY_SHARED_SECRET" \
       https://api.worldmonitor.app/api/seed-contract-probe

PR 3 will extend the probe with a stricter mode that asserts seed-meta:*
keys are GONE (not just bare) once legacy dual-write is removed.

Verification:
- tests/seed-contract-probe.test.mjs → 15/15 pass
- npm run test:data → 5338/5338 (was 5322; +16 new incl. conformance)
- npm run typecheck:all → clean

* fix(seed-contract): tighten probe — minRecords on AI/OTHER + cache-path source header

Review P2 findings: the probe's stated guards were weaker than advertised.

1. market:ai-tokens:v1 + market:other-tokens:v1 probes claimed to guard the
   token-panels extra-key RETRY regression but only checked shape='envelope'
   + dataHas:['tokens']. If an extra-key declareRecords regressed to 0, both
   probes would still pass because checkProbe() only inspects _seed.recordCount
   when minRecords is set. Now both enforce minRecords: 1.

2. /api/product-catalog boundary check only asserted no '_seed' leak — which
   is also true for the static fallback path. A broken cached reader
   (getFromCache returning null or throwing) could serve fallback silently
   and still pass this probe. Now:
   - api/product-catalog.js emits X-Product-Catalog-Source: cache|dodo|fallback
     on the response (the json() helper gained an optional source param wired
     to each of the three branches).
   - checkPublicBoundary declaratively requires that header's value match
     'cache' for /api/product-catalog, so a fallback-serve fails the probe
     with reason 'source:fallback!=cache' or 'source:missing!=cache'.

Test updates (tests/seed-contract-probe.test.mjs):
- Boundary check reworked to use a BOUNDARY_CHECKS config with optional
  requireSourceHeader per endpoint.
- New cases: served-from-cache passes, served-from-fallback fails with source
  mismatch, missing header fails, seed-leak still takes precedence, bad
  status fails.
- Token-panels sanity test now asserts minRecords≥1 on all 3 panels.

Verification:
- tests/seed-contract-probe.test.mjs → 17/17 pass (was 15, +2 net)
- npm run test:data → 5340/5340
- npm run typecheck:all → clean
2026-04-15 09:16:27 +04:00

508 lines
17 KiB
JavaScript

#!/usr/bin/env node
import { loadEnvFile, runSeed, CHROME_UA, verifySeedKey, loadSharedConfig } from './_seed-utils.mjs';
import { extractCountryCode } from './shared/geo-extract.mjs';
import { readFileSync } from 'node:fs';
import { dirname, join } from 'node:path';
import { fileURLToPath, pathToFileURL } from 'node:url';
loadEnvFile(import.meta.url);
const CANONICAL_KEY = 'climate:disasters:v1';
const NATURAL_EVENTS_KEY = 'natural:events:v1';
const CACHE_TTL = 64800; // 18h — 3x the 6h cron interval (gold standard)
const RELIEFWEB_ENDPOINTS = [
'https://api.reliefweb.int/v1/disasters',
'https://api.reliefweb.int/v2/disasters',
];
const RELIEFWEB_TYPE_TO_CANONICAL = {
FL: 'flood',
TC: 'cyclone',
DR: 'drought',
HT: 'heatwave',
WF: 'wildfire',
};
const COUNTRY_BBOXES = loadSharedConfig('country-bboxes.json');
const __dirname = dirname(fileURLToPath(import.meta.url));
const ISO3_TO_ISO2 = loadSharedConfig('iso3-to-iso2.json');
const COUNTRY_NAMES_RAW = loadSharedConfig('country-names.json');
function titleCase(str) {
return str.replace(/\b\w/g, (c) => c.toUpperCase());
}
const COUNTRY_NAME_BY_CODE = {};
for (const [name, iso2] of Object.entries(COUNTRY_NAMES_RAW)) {
const code = String(iso2 || '').trim().toUpperCase();
if (/^[A-Z]{2}$/.test(code) && name && !COUNTRY_NAME_BY_CODE[code]) {
COUNTRY_NAME_BY_CODE[code] = titleCase(name);
}
}
const COUNTRY_CODES_BY_BBOX_AREA = Object.entries(COUNTRY_BBOXES)
.filter(([, bbox]) => Array.isArray(bbox) && bbox.length === 4)
.sort(([, a], [, b]) => {
const areaA = Math.abs((Number(a[2]) - Number(a[0])) * (Number(a[3]) - Number(a[1])));
const areaB = Math.abs((Number(b[2]) - Number(b[0])) * (Number(b[3]) - Number(b[1])));
return areaA - areaB;
})
.map(([code]) => code);
function asArray(value) {
if (Array.isArray(value)) return value;
if (value == null) return [];
return [value];
}
function stableHash(str) {
let h = 0;
for (let i = 0; i < str.length; i++) h = (Math.imul(31, h) + str.charCodeAt(i)) | 0;
return Math.abs(h).toString(36);
}
function parseTimestamp(value) {
const ts = new Date(value || '').getTime();
return Number.isFinite(ts) && ts > 0 ? ts : Date.now();
}
function normalizeStatus(status) {
const value = String(status || '').toLowerCase().trim();
if (value === 'current') return 'ongoing';
if (value === 'alert' || value === 'ongoing' || value === 'past') return value;
return 'ongoing';
}
function normalizeDisasterName(value) {
return String(value || '')
.replace(/^[\u{1F534}\u{1F7E0}\u{1F7E2}\s-]+/u, '')
.trim();
}
function mapReliefType(typeCode, typeName) {
const code = String(typeCode || '').toUpperCase();
if (RELIEFWEB_TYPE_TO_CANONICAL[code]) return RELIEFWEB_TYPE_TO_CANONICAL[code];
const lower = String(typeName || '').toLowerCase();
if (lower.includes('flood')) return 'flood';
if (lower.includes('cyclone') || lower.includes('hurricane') || lower.includes('typhoon') || lower.includes('storm')) return 'cyclone';
if (lower.includes('drought')) return 'drought';
if (lower.includes('heat')) return 'heatwave';
if (lower.includes('wildfire') || lower.includes('fire')) return 'wildfire';
return '';
}
function getNaturalSourceMeta(event) {
const name = String(event?.sourceName || '').toLowerCase();
const url = String(event?.sourceUrl || '').toLowerCase();
const id = String(event?.id || '');
if (name === 'nasa firms' || name.startsWith('firms') || url.includes('firms.modaps.')) return { source: 'NASA FIRMS' };
if (name === 'gdacs' || name.startsWith('gdacs') || url.includes('gdacs.org') || id.startsWith('gdacs-')) return { source: 'GDACS' };
if (url.includes('eonet.') || id.startsWith('EONET_') || name.startsWith('eonet')) return { source: 'EONET' };
if (name || url) return { source: 'OTHER' };
return null;
}
const CLIMATE_CATEGORIES = new Set(['floods', 'wildfires', 'volcanoes', 'drought']);
function isClimateNaturalEvent(event) {
if (!event || typeof event !== 'object') return false;
const sourceMeta = getNaturalSourceMeta(event);
if (!sourceMeta) return false;
if (CLIMATE_CATEGORIES.has(event.category)) return true;
if (event.category !== 'severeStorms') return false;
if (sourceMeta.source !== 'GDACS') return false;
const text = `${event.categoryTitle || ''} ${event.classification || ''} ${event.title || ''}`.toLowerCase();
if (event.stormId || event.stormName) return true;
return /tropical|cyclone|hurricane|typhoon|depression/.test(text);
}
function mapNaturalType(event) {
if (event.category === 'floods') return 'flood';
if (event.category === 'wildfires') return 'wildfire';
if (event.category === 'severeStorms') return 'cyclone';
if (event.category === 'volcanoes') return 'volcano';
if (event.category === 'drought') return 'drought';
return '';
}
function mapNaturalSource(event) {
return getNaturalSourceMeta(event)?.source || '';
}
function mapNaturalSeverity(event, source) {
const title = String(event.title || '');
const desc = String(event.description || '').toLowerCase();
const stormCategory = Number(event.stormCategory);
if (title.includes('\u{1F534}') || /\bred\b/.test(desc)) return 'red';
if (title.includes('\u{1F7E0}') || /\borange\b/.test(desc)) return 'orange';
if (Number.isFinite(stormCategory)) {
if (stormCategory >= 3) return 'red';
if (stormCategory >= 1) return 'orange';
}
if (source === 'NASA FIRMS') {
const magnitude = Number(event.magnitude || 0);
if (magnitude >= 400) return 'red';
if (magnitude >= 300) return 'orange';
}
return 'green';
}
function mapNaturalStatus(event, severity) {
if (event.closed === true) return 'past';
if (severity === 'red' || severity === 'orange') return 'alert';
return 'ongoing';
}
function getCountryCenter(countryCode) {
const bbox = COUNTRY_BBOXES[countryCode];
if (!Array.isArray(bbox) || bbox.length !== 4) return { lat: 0, lng: 0 };
return {
lat: (Number(bbox[0]) + Number(bbox[2])) / 2,
lng: (Number(bbox[1]) + Number(bbox[3])) / 2,
};
}
function normalizeCountryCode(code) {
const value = String(code || '').toUpperCase();
return /^[A-Z]{2}$/.test(value) ? value : '';
}
function getCountryName(countryCode) {
return COUNTRY_NAME_BY_CODE[normalizeCountryCode(countryCode)] || '';
}
function getCountryCodeFromIso3(code) {
const value = String(code || '').toUpperCase();
return /^[A-Z]{3}$/.test(value) ? (ISO3_TO_ISO2[value] || '') : '';
}
function findCountryCodeByCoordinates(lat, lng) {
const latNum = Number(lat);
const lngNum = Number(lng);
if (!Number.isFinite(latNum) || !Number.isFinite(lngNum)) return '';
for (const code of COUNTRY_CODES_BY_BBOX_AREA) {
const bbox = COUNTRY_BBOXES[code];
if (!Array.isArray(bbox) || bbox.length !== 4) continue;
const [minLat, minLng, maxLat, maxLng] = bbox.map(Number);
if (latNum >= minLat && latNum <= maxLat && lngNum >= minLng && lngNum <= maxLng) {
return code;
}
}
return '';
}
function resolveCountryInfo({ code = '', iso3 = '', name = '', lat = NaN, lng = NaN, fallbackText = '' } = {}) {
const normalizedName = String(name || '').trim();
const fromIso2 = normalizeCountryCode(code);
const fromIso3 = getCountryCodeFromIso3(iso3);
const fromText = normalizeCountryCode(extractCountryCode(`${normalizedName} ${fallbackText}`));
const fromPoint = findCountryCodeByCoordinates(lat, lng);
const countryCode = fromIso2 || fromIso3 || fromText || fromPoint;
return {
countryCode,
country: normalizedName || getCountryName(countryCode),
};
}
// Railway must set RELIEFWEB_APPNAME to an approved ReliefWeb appname
// before enabling this seed, or ReliefWeb fetches will fail closed.
function getReliefWebAppname() {
const appname = String(process.env.RELIEFWEB_APPNAME || process.env.RELIEFWEB_APP_NAME || '').trim();
if (!appname) return null;
return appname;
}
function buildReliefWebRequestBodies() {
return [
{
limit: 250,
sort: ['date.event:desc'],
fields: {
include: ['name', 'country', 'primary_country', 'primary_type', 'type', 'date', 'glide', 'status', 'url'],
},
filter: {
operator: 'AND',
conditions: [
{ field: 'status', value: ['alert', 'current', 'ongoing'], operator: 'OR' },
{ field: 'type.code', value: ['FL', 'TC', 'DR', 'HT', 'WF'], operator: 'OR' },
],
},
},
];
}
function mapReliefItem(item) {
const fields = item?.fields || {};
const typedEntries = asArray(fields.type);
const primaryType = typedEntries.find((entry) => entry?.primary) || typedEntries[0] || {};
const fallbackPrimaryType = asArray(fields.primary_type)[0] || {};
const type = mapReliefType(primaryType.code, primaryType.name || fallbackPrimaryType.name);
if (!type) return null;
const status = normalizeStatus(fields.status);
if (status !== 'alert' && status !== 'ongoing') return null;
const countries = [
...asArray(fields.primary_country),
...asArray(fields.country),
];
const countryEntry = countries.find((country) => country?.primary) || countries[0] || {};
const { country, countryCode } = resolveCountryInfo({
code: countryEntry.code,
iso3: countryEntry.iso3,
name: countryEntry.shortname || countryEntry.name,
fallbackText: fields.name,
});
if (!countryCode) return null;
const coords = getCountryCenter(countryCode);
const startedAt = parseTimestamp(fields?.date?.event || fields?.date?.created || fields?.date?.changed);
const name = normalizeDisasterName(fields.name || '');
const reliefId = fields.glide || item?.id || stableHash(`${name}-${country}-${startedAt}`);
return {
id: `reliefweb-${reliefId}`,
type,
name,
country,
countryCode,
lat: coords.lat,
lng: coords.lng,
severity: status === 'alert' ? 'high' : 'medium',
startedAt,
status,
affectedPopulation: 0,
source: 'ReliefWeb',
sourceUrl: String(fields.url || '').trim(),
};
}
async function fetchReliefWeb() {
const appname = getReliefWebAppname();
if (!appname) {
console.log(' [ReliefWeb] RELIEFWEB_APPNAME not set, skipping ReliefWeb fetch');
return [];
}
console.log(` [ReliefWeb] Fetching with appname="${appname}"`);
const requestBodies = buildReliefWebRequestBodies();
let lastError = null;
for (const endpoint of RELIEFWEB_ENDPOINTS) {
for (const body of requestBodies) {
try {
const url = `${endpoint}?appname=${encodeURIComponent(appname)}`;
const response = await fetch(url, {
method: 'POST',
headers: {
Accept: 'application/json',
'Content-Type': 'application/json',
'User-Agent': CHROME_UA,
},
body: JSON.stringify(body),
signal: AbortSignal.timeout(20_000),
});
if (!response.ok) {
const text = await response.text().catch(() => '');
throw new Error(`HTTP ${response.status} ${text.slice(0, 160)}`);
}
const payload = await response.json();
const rows = asArray(payload?.data);
if (!rows.length) continue;
const mapped = rows.map(mapReliefItem).filter(Boolean);
if (mapped.length > 0) {
console.log(` [ReliefWeb] ${mapped.length} disasters from ${rows.length} rows`);
return mapped;
}
if (rows.length > 0) console.log(` [ReliefWeb] ${rows.length} rows returned but all mapped to null`);
} catch (err) {
lastError = err;
const message = String(err?.message || err);
if (/approved appname/i.test(message) || /HTTP 40[13]/.test(message)) {
const cfgErr = new Error(`ReliefWeb rejected RELIEFWEB_APPNAME="${appname}" — configure an approved appname`);
cfgErr.isConfigError = true;
throw cfgErr;
}
}
}
}
if (lastError) throw lastError;
throw new Error('ReliefWeb returned no climate disaster rows');
}
function mapNaturalEvent(event) {
const type = mapNaturalType(event);
if (!type) return null;
const source = mapNaturalSource(event);
if (!source) return null;
const severity = mapNaturalSeverity(event, source);
const status = mapNaturalStatus(event, severity);
const lat = Number(event.lat);
const lng = Number(event.lon);
const { country, countryCode } = resolveCountryInfo({
lat,
lng,
fallbackText: `${event.title || ''} ${event.description || ''}`,
});
if (!countryCode) return null;
const startedAt = parseTimestamp(event.date);
return {
id: String(event.id || stableHash(`${event.title || ''}-${startedAt}`)),
type,
name: normalizeDisasterName(event.title || event.stormName || event.categoryTitle || 'Untitled disaster'),
country,
countryCode,
lat: Number.isFinite(lat) ? lat : 0,
lng: Number.isFinite(lng) ? lng : 0,
severity,
startedAt,
status,
affectedPopulation: 0,
source,
sourceUrl: String(event.sourceUrl || '').trim(),
};
}
async function fetchNaturalClimateDisasters() {
let data;
try {
data = await verifySeedKey(NATURAL_EVENTS_KEY);
} catch (err) {
console.warn(` [NaturalEvents] Redis read failed: ${err?.message || err}`);
return [];
}
if (!data) {
console.warn(' [NaturalEvents] natural:events:v1 key is empty or missing in Redis');
return [];
}
const events = asArray(data?.events);
console.log(` [NaturalEvents] ${events.length} raw events from natural:events:v1`);
const climate = events.filter(isClimateNaturalEvent);
console.log(` [NaturalEvents] ${climate.length} matched climate filter`);
return climate.map(mapNaturalEvent).filter(Boolean);
}
function dedupeAndSort(entries) {
const byId = new Set();
const byFingerprint = new Set();
const deduped = [];
for (const entry of entries) {
const idKey = `${entry.source}:${entry.id}`;
if (byId.has(idKey)) continue;
byId.add(idKey);
const dayBucket = Math.floor(Number(entry.startedAt || 0) / 86_400_000);
const fingerprint = [
entry.type,
entry.countryCode || entry.country || '',
String(entry.name || '').toLowerCase(),
dayBucket,
].join('|');
if (byFingerprint.has(fingerprint)) continue;
byFingerprint.add(fingerprint);
deduped.push(entry);
}
deduped.sort((a, b) => Number(b.startedAt || 0) - Number(a.startedAt || 0));
return deduped.slice(0, 300);
}
function toRedisDisaster(entry) {
return {
id: String(entry.id || ''),
type: String(entry.type || ''),
name: String(entry.name || ''),
country: String(entry.country || ''),
countryCode: String(entry.countryCode || ''),
lat: Number(entry.lat || 0),
lng: Number(entry.lng || 0),
severity: String(entry.severity || ''),
startedAt: Number(entry.startedAt || 0),
status: String(entry.status || ''),
affectedPopulation: Number(entry.affectedPopulation || 0),
source: String(entry.source || ''),
sourceUrl: String(entry.sourceUrl || ''),
};
}
function collectDisasterSourceResults(results) {
const failures = [];
const combined = [];
for (const result of results) {
if (result.status === 'fulfilled') {
combined.push(...asArray(result.value));
continue;
}
const err = result.reason;
if (err?.isConfigError) throw err;
failures.push(err);
const message = String(err?.message || err || 'unknown source failure');
console.log(` [seed-climate-disasters] partial source failure: ${message}`);
}
const disasters = dedupeAndSort(combined);
if (disasters.length > 0) return disasters;
const errorMessages = failures
.map((err) => String(err?.message || err || '').trim())
.filter(Boolean);
throw new Error(errorMessages[0] || 'No climate disaster sources returned data');
}
async function fetchClimateDisasters() {
const results = await Promise.allSettled([
fetchReliefWeb(),
fetchNaturalClimateDisasters(),
]);
return { disasters: collectDisasterSourceResults(results).map(toRedisDisaster) };
}
export {
buildReliefWebRequestBodies,
collectDisasterSourceResults,
getNaturalSourceMeta,
getReliefWebAppname,
isClimateNaturalEvent,
findCountryCodeByCoordinates,
mapNaturalEvent,
toRedisDisaster,
};
function isMain() {
return Boolean(process.argv[1]) && import.meta.url === pathToFileURL(process.argv[1]).href;
}
export function declareRecords(data) {
return Array.isArray(data?.disasters) ? data.disasters.length : 0;
}
if (isMain()) {
runSeed('climate', 'disasters', CANONICAL_KEY, fetchClimateDisasters, {
validateFn: (data) => Array.isArray(data?.disasters) && data.disasters.length > 0,
recordCount: (data) => data?.disasters?.length || 0,
ttlSeconds: CACHE_TTL,
sourceVersion: 'reliefweb+natural-cache-v1',
declareRecords,
schemaVersion: 1,
maxStaleMin: 720,
}).catch((err) => {
const _cause = err.cause ? ` (cause: ${err.cause.message || err.cause.code || err.cause})` : '';
console.error('FATAL:', (err.message || err) + _cause);
process.exit(1);
});
}