mirror of
https://github.com/koala73/worldmonitor.git
synced 2026-04-25 17:14:57 +02:00
* feat(seed-contract): PR 2a — runSeed envelope dual-write + 91 seeders migrated
Opt-in contract path in runSeed: when opts.declareRecords is provided, write
{_seed, data} envelope to the canonical key alongside legacy seed-meta:*
(dual-write). State machine: OK / OK_ZERO / RETRY with zeroIsValid opt.
declareRecords throws or returns non-integer → hard fail (contract violation).
extraKeys[*] support per-key declareRecords; each extra key writes its own
envelope. Legacy seeders (no declareRecords) entirely unchanged.
Migrated all 91 scripts/seed-*.mjs to contract mode. Each exports
declareRecords returning the canonical record count, and passes
schemaVersion: 1 + maxStaleMin (matched to api/health.js SEED_META, or 2.5x
interval where no registry entry exists). Contract conformance reports 84/86
seeders with full descriptor (2 pre-existing warnings).
Legacy seed-meta keys still written so unmigrated readers keep working;
follow-up slices flip health.js + readers to envelope-first.
Tests: 61/61 PR 1 tests still pass.
Next slices for PR 2:
- api/health.js registry collapse + 15 seed-bundle-*.mjs canonicalKey wiring
- reader migration (mcp, resilience, aviation, displacement, regional-snapshot)
- direct writers — ais-relay.cjs, consumer-prices-core publish.ts
- public-boundary stripSeedEnvelope + test migration
Plan: docs/plans/2026-04-14-002-fix-runseed-zero-record-lockout-plan.md
* fix(seed-contract): unwrap envelopes in internal cross-seed readers
After PR 2a enveloped 91 canonical keys as {_seed, data}, every script-side
reader that returned the raw parsed JSON started silently handing callers the
envelope instead of the bare payload. WoW baselines (bigmac, grocery-basket,
fear-greed) saw undefined .countries / .composite; seed-climate-anomalies saw
undefined .normals from climate:zone-normals:v1; seed-thermal-escalation saw
undefined .fireDetections from wildfire:fires:v1; seed-forecasts' ~40-key
pipeline batch returned envelopes for every input.
Fix: route every script-side reader through unwrapEnvelope(...).data. Legacy
bare-shape values pass through unchanged (unwrapEnvelope returns
{_seed: null, data: raw} for any non-envelope shape).
Changed:
- scripts/_seed-utils.mjs: import unwrapEnvelope; redisGet, readSeedSnapshot,
verifySeedKey all unwrap. Exported new readCanonicalValue() helper for
cross-seed consumers.
- 18 seed-*.mjs scripts with local redisGet-style helpers or inline fetch
patched to unwrap via the envelope source module (subagent sweep).
- scripts/seed-forecasts.mjs pipeline batch: parse() unwraps each result.
- scripts/seed-energy-spine.mjs redisMget: unwraps each result.
Tests:
- tests/seed-utils-envelope-reads.test.mjs: 7 new cases covering envelope
+ legacy + null paths for readSeedSnapshot and verifySeedKey.
- Full seed suite: 67/67 pass (was 61, +6 new).
Addresses both of user's P1 findings on PR #3097.
* feat(seed-contract): envelope-aware reads in server + api helpers
Every RPC and public-boundary reader now automatically strips _seed from
contract-mode canonical keys. Legacy bare-shape values pass through unchanged
(unwrapEnvelope no-ops on non-envelope shapes).
Changed helpers (one-place fix — unblocks ~60 call sites):
- server/_shared/redis.ts: getRawJson, getCachedJson, getCachedJsonBatch
unwrap by default. cachedFetchJson inherits via getCachedJson.
- api/_upstash-json.js: readJsonFromUpstash unwraps (covers api/mcp.ts
tool responses + all its canonical-key reads).
- api/bootstrap.js: getCachedJsonBatch unwraps (public-boundary —
clients never see envelope metadata).
Left intentionally unchanged:
- api/health.js / api/seed-health.js: read only seed-meta:* keys which
remain bare-shape during dual-write. unwrapEnvelope already imported at
the meta-read boundary (PR 1) as a defensive no-op.
Tests: 67/67 seed tests pass. typecheck + typecheck:api clean.
This is the blast-radius fix the PR #3097 review called out — external
readers that would otherwise see {_seed, data} after the writer side
migrated.
* fix(test): strip export keyword in vm.runInContext'd seed source
cross-source-signals-regulatory.test.mjs loads scripts/seed-cross-source-signals.mjs
via vm.runInContext, which cannot parse ESM `export` syntax. PR 2a added
`export function declareRecords` to every seeder, which broke this test's
static-analysis approach.
Fix: strip the `export` keyword from the declareRecords line in the
preprocessed source string so the function body still evaluates as a plain
declaration.
Full test:data suite: 5307/5307 pass. typecheck + typecheck:api clean.
* feat(seed-contract): consumer-prices publish.ts writes envelopes
Wrap the 5 canonical keys written by consumer-prices-core/src/jobs/publish.ts
(overview, movers:7d/30d, freshness, categories:7d/30d/90d, retailer-spread,
basket-series) in {_seed, data} envelopes. Legacy seed-meta:<key> writes
preserved for dual-write.
Inlined a buildEnvelope helper (10 lines) rather than taking a cross-package
dependency — consumer-prices-core is a standalone npm package. Documented the
four-file parity contract (mjs source, ts mirror, js edge mirror, this copy).
Contract fields: sourceVersion='consumer-prices-core-publish-v1', schemaVersion=1,
state='OK' (recordCount>0) or 'OK_ZERO' (legitimate zero).
Typecheck: no new errors in publish.ts.
* fix(seed-contract): 3 more server-side readers unwrap envelopes
Found during final audit:
- server/worldmonitor/resilience/v1/_shared.ts: resilience score reader
parsed cached GetResilienceScoreResponse raw. Contract-mode seed-resilience-scores
now envelopes those keys.
- server/worldmonitor/resilience/v1/get-resilience-ranking.ts: p05/p95
interval lookup parsed raw from seed-resilience-scores' extra-key path.
- server/worldmonitor/infrastructure/v1/_shared.ts: mgetJson() used for
count-source keys (wildfire:fires:v1, news:insights:v1) which are both
contract-mode now.
All three now unwrap via server/_shared/seed-envelope. Legacy shapes pass
through unchanged.
Typecheck clean.
* feat(seed-contract): ais-relay.cjs direct writes produce envelopes
32 canonical-key write sites in scripts/ais-relay.cjs now produce {_seed, data}
envelopes. Inlined buildEnvelope() (CJS module can't require ESM source) +
envelopeWrite(key, data, ttlSeconds, meta) wrapper. Enveloped keys span market
bootstrap, aviation, cyber-threats, theater-posture, weather-alerts, economic
spending/fred/worldbank, tech-events, corridor-risk, usni-fleet, shipping-stress,
social:reddit, wsb-tickers, pizzint, product-catalog, chokepoint transits,
ucdp-events, satellites, oref.
Left bare (not seeded data keys): seed-meta:* (dual-write legacy),
classifyCacheKey LLM cache, notam:prev-closed-state internal state,
wm:notif:scan-dedup flags.
Updated tests/ucdp-seed-resilience.test.mjs regex to accept both upstashSet
(pre-contract) and envelopeWrite (post-contract) call patterns.
* feat(seed-contract): 15 bundle files add canonicalKey for envelope gate
54 bundle sections across 12 files now declare canonicalKey alongside the
existing seedMetaKey. _bundle-runner.mjs (from PR 1) prefers canonicalKey
when both are present — gates section runs on envelope._seed.fetchedAt
read directly from the data key, eliminating the meta-outlives-data class
of bugs.
Files touched:
- climate (5), derived-signals (2), ecb-eu (3), energy-sources (6),
health (2), imf-extended (4), macro (10), market-backup (9),
portwatch (4), relay-backup (2), resilience-recovery (5), static-ref (2)
Skipped (14 sections, 3 whole bundles): multi-key writers, dynamic
templated keys (displacement year-scoped), or non-runSeed orchestrators
(regional brief cron, resilience-scores' 222-country publish, validation/
benchmark scripts). These continue to use seedMetaKey or their own gate.
seedMetaKey preserved everywhere — dual-write. _bundle-runner.mjs falls
back to legacy when canonicalKey is absent.
All 15 bundles pass node --check. test:data: 5307/5307. typecheck:all: clean.
* fix(seed-contract): 4 PR #3097 review P1s — transform/declareRecords mismatches + envelope leaks
Addresses both P1 findings and the extra-key seed-meta leak surfaced in review:
1. runSeed helper-level invariant: seed-meta:* keys NEVER envelope.
scripts/_seed-utils.mjs exports shouldEnvelopeKey(key) — returns false for
any key starting with 'seed-meta:'. Both atomicPublish (canonical) and
writeExtraKey (extras) gate the envelope wrap through this helper. Fixes
seed-iea-oil-stocks' ANALYSIS_META_EXTRA_KEY silently getting enveloped,
which broke health.js parsing the value as bare {fetchedAt, recordCount}.
Also defends against any future manual writeExtraKey(..., envelopeMeta)
call that happens to target a seed-meta:* key.
2. seed-token-panels canonical + extras fixed.
publishTransform returns data.defi (the defi panel itself, shape {tokens}).
Old declareRecords counted data.defi.tokens + data.ai.tokens + data.other.tokens
on the transformed payload → 0 → RETRY path → canonical market:defi-tokens:v1
never wrote, and because runSeed returned before the extraKeys loop,
market:ai-tokens:v1 + market:other-tokens:v1 stayed stale too.
New: declareRecords counts data.tokens on the transformed shape. AI_KEY +
OTHER_KEY extras reuse the same function (transforms return structurally
identical panels). Added isMain guard so test imports don't fire runSeed.
3. api/product-catalog.js cached reader unwraps envelope.
ais-relay.cjs now envelopes product-catalog:v2 via envelopeWrite(). The
edge reader did raw JSON.parse(result) and returned {_seed, data} to
clients, breaking the cached path. Fix: import unwrapEnvelope from
./_seed-envelope.js, apply after JSON.parse. One site — :238-241 is
downstream of getFromCache(), so the single reader fix covers both.
4. Regression lock tests/seed-contract-transform-regressions.test.mjs (11 cases):
- shouldEnvelopeKey invariant: seed-meta:* false, canonical true
- Token-panels declareRecords works on transformed shape (canonical + both extras)
- Explicit repro of pre-fix buggy signature returning 0 — guards against revert
- resolveRecordCount accepts 0, rejects non-integer
- Product-catalog envelope unwrap returns bare shape; legacy passes through
Verification:
- npm run test:data → 5318/5318 pass (was 5307 — 11 new regressions)
- npm run typecheck:all → clean
- node --check on every modified script
iea-oil-stocks canonical declareRecords was NOT broken (user confirmed during
review — buildIndex preserves .members); only its ANALYSIS_META_EXTRA_KEY
was affected, now covered generically by commit 1's helper invariant.
* fix(seed-contract): seed-token-panels validateFn also runs on post-transform shape
Review finding: fixing declareRecords wasn't sufficient — atomicPublish() runs
validateFn(publishData) on the transformed payload too. seed-token-panels'
validate() checked data.defi/.ai/.other on the transformed {tokens} shape,
returned false, and runSeed took the early skipped-write branch (before even
reaching the declareRecords RETRY logic). Net effect: same as before the
declareRecords fix — canonical + both extras stayed stale.
Fix: validate() now checks the canonical defi panel directly (Array.isArray
(data?.tokens) && has at least one t.price > 0). AI/OTHER panels are validated
implicitly by their own extraKey declareRecords on write.
Audited the other 9 seeders with publishTransform (bls-series, bis-extended,
bis-data, gdelt-intel, trade-flows, iea-oil-stocks, jodi-gas, sanctions-pressure,
forecasts): all validateFn's correctly target the post-transform shape. Only
token-panels regressed.
Added 4 regression tests (tests/seed-contract-transform-regressions.test.mjs):
- validate accepts transformed panel with priced tokens
- validate rejects all-zero-price tokens
- validate rejects empty/missing tokens
- Explicit pre-fix repro (buggy old signature fails on transformed shape)
Verification:
- npm run test:data → 5322/5322 pass (was 5318; +4 new)
- npm run typecheck:all → clean
- node --check clean
* feat(seed-contract): add /api/seed-contract-probe validation endpoint
Single machine-readable gate for 'is PR #3097 working in production'.
Replaces the curl/jq ritual with one authenticated edge call that returns
HTTP 200 ok:true or 503 + failing check list.
What it validates:
- 8 canonical keys have {_seed, data} envelopes with required data fields
and minRecords floors (fsi-eu, zone-normals, 3 token panels + minRecords
guard against token-panels RETRY regression, product-catalog, wildfire,
earthquakes).
- 2 seed-meta:* keys remain BARE (shouldEnvelopeKey invariant; guards
against iea-oil-stocks ANALYSIS_META_EXTRA_KEY-class regressions).
- /api/product-catalog + /api/bootstrap responses contain no '_seed' leak.
Auth: x-probe-secret header must match RELAY_SHARED_SECRET (reuses existing
Vercel↔Railway internal trust boundary).
Probe logic is exported (checkProbe, checkPublicBoundary, DEFAULT_PROBES) for
hermetic testing. tests/seed-contract-probe.test.mjs covers every branch:
envelope pass/fail on field/records/shape, bare pass/fail on shape/field,
missing/malformed JSON, Redis non-2xx, boundary seed-leak detection,
DEFAULT_PROBES sanity (seed-meta invariant present, token-panels minRecords
guard present).
Usage:
curl -H "x-probe-secret: $RELAY_SHARED_SECRET" \
https://api.worldmonitor.app/api/seed-contract-probe
PR 3 will extend the probe with a stricter mode that asserts seed-meta:*
keys are GONE (not just bare) once legacy dual-write is removed.
Verification:
- tests/seed-contract-probe.test.mjs → 15/15 pass
- npm run test:data → 5338/5338 (was 5322; +16 new incl. conformance)
- npm run typecheck:all → clean
* fix(seed-contract): tighten probe — minRecords on AI/OTHER + cache-path source header
Review P2 findings: the probe's stated guards were weaker than advertised.
1. market:ai-tokens:v1 + market:other-tokens:v1 probes claimed to guard the
token-panels extra-key RETRY regression but only checked shape='envelope'
+ dataHas:['tokens']. If an extra-key declareRecords regressed to 0, both
probes would still pass because checkProbe() only inspects _seed.recordCount
when minRecords is set. Now both enforce minRecords: 1.
2. /api/product-catalog boundary check only asserted no '_seed' leak — which
is also true for the static fallback path. A broken cached reader
(getFromCache returning null or throwing) could serve fallback silently
and still pass this probe. Now:
- api/product-catalog.js emits X-Product-Catalog-Source: cache|dodo|fallback
on the response (the json() helper gained an optional source param wired
to each of the three branches).
- checkPublicBoundary declaratively requires that header's value match
'cache' for /api/product-catalog, so a fallback-serve fails the probe
with reason 'source:fallback!=cache' or 'source:missing!=cache'.
Test updates (tests/seed-contract-probe.test.mjs):
- Boundary check reworked to use a BOUNDARY_CHECKS config with optional
requireSourceHeader per endpoint.
- New cases: served-from-cache passes, served-from-fallback fails with source
mismatch, missing header fails, seed-leak still takes precedence, bad
status fails.
- Token-panels sanity test now asserts minRecords≥1 on all 3 panels.
Verification:
- tests/seed-contract-probe.test.mjs → 17/17 pass (was 15, +2 net)
- npm run test:data → 5340/5340
- npm run typecheck:all → clean
287 lines
12 KiB
JavaScript
287 lines
12 KiB
JavaScript
#!/usr/bin/env node
|
|
|
|
import { loadEnvFile, CHROME_UA, runSeed, sleep, readSeedSnapshot, getSharedFxRates, SHARED_FX_FALLBACKS } from './_seed-utils.mjs';
|
|
|
|
loadEnvFile(import.meta.url);
|
|
|
|
const CANONICAL_KEY = 'economic:bigmac:v1';
|
|
const CACHE_TTL = 864000; // 10 days — weekly seed with 3-day cron-drift buffer
|
|
const EXA_DELAY_MS = 150;
|
|
|
|
const FX_FALLBACKS = SHARED_FX_FALLBACKS;
|
|
|
|
// WoW validation thresholds
|
|
const MIN_WOW_AGE_MS = 6 * 24 * 60 * 60 * 1000; // 6 days minimum between snapshots
|
|
const WOW_ANOMALY_THRESHOLD = 20; // % change that signals a data bug
|
|
|
|
// USD price sanity range for a Big Mac globally
|
|
const USD_MIN = 1.50;
|
|
const USD_MAX = 12.00;
|
|
|
|
const COUNTRIES = [
|
|
// Americas
|
|
{ code: 'US', name: 'United States', currency: 'USD', flag: '🇺🇸' },
|
|
{ code: 'CA', name: 'Canada', currency: 'CAD', flag: '🇨🇦' },
|
|
{ code: 'MX', name: 'Mexico', currency: 'MXN', flag: '🇲🇽' },
|
|
{ code: 'BR', name: 'Brazil', currency: 'BRL', flag: '🇧🇷' },
|
|
{ code: 'AR', name: 'Argentina', currency: 'ARS', flag: '🇦🇷' },
|
|
{ code: 'CO', name: 'Colombia', currency: 'COP', flag: '🇨🇴' },
|
|
{ code: 'CL', name: 'Chile', currency: 'CLP', flag: '🇨🇱' },
|
|
// Europe
|
|
{ code: 'GB', name: 'UK', currency: 'GBP', flag: '🇬🇧' },
|
|
{ code: 'DE', name: 'Germany', currency: 'EUR', flag: '🇩🇪' },
|
|
{ code: 'FR', name: 'France', currency: 'EUR', flag: '🇫🇷' },
|
|
{ code: 'IT', name: 'Italy', currency: 'EUR', flag: '🇮🇹' },
|
|
{ code: 'ES', name: 'Spain', currency: 'EUR', flag: '🇪🇸' },
|
|
{ code: 'CH', name: 'Switzerland', currency: 'CHF', flag: '🇨🇭' },
|
|
{ code: 'NO', name: 'Norway', currency: 'NOK', flag: '🇳🇴' },
|
|
{ code: 'SE', name: 'Sweden', currency: 'SEK', flag: '🇸🇪' },
|
|
{ code: 'DK', name: 'Denmark', currency: 'DKK', flag: '🇩🇰' },
|
|
{ code: 'PL', name: 'Poland', currency: 'PLN', flag: '🇵🇱' },
|
|
{ code: 'CZ', name: 'Czechia', currency: 'CZK', flag: '🇨🇿' },
|
|
{ code: 'HU', name: 'Hungary', currency: 'HUF', flag: '🇭🇺' },
|
|
{ code: 'RO', name: 'Romania', currency: 'RON', flag: '🇷🇴' },
|
|
{ code: 'UA', name: 'Ukraine', currency: 'UAH', flag: '🇺🇦' },
|
|
// Asia-Pacific
|
|
{ code: 'CN', name: 'China', currency: 'CNY', flag: '🇨🇳' },
|
|
{ code: 'JP', name: 'Japan', currency: 'JPY', flag: '🇯🇵' },
|
|
{ code: 'KR', name: 'South Korea', currency: 'KRW', flag: '🇰🇷' },
|
|
{ code: 'AU', name: 'Australia', currency: 'AUD', flag: '🇦🇺' },
|
|
{ code: 'NZ', name: 'New Zealand', currency: 'NZD', flag: '🇳🇿' },
|
|
{ code: 'SG', name: 'Singapore', currency: 'SGD', flag: '🇸🇬' },
|
|
{ code: 'HK', name: 'Hong Kong', currency: 'HKD', flag: '🇭🇰' },
|
|
{ code: 'TW', name: 'Taiwan', currency: 'TWD', flag: '🇹🇼' },
|
|
{ code: 'TH', name: 'Thailand', currency: 'THB', flag: '🇹🇭' },
|
|
{ code: 'MY', name: 'Malaysia', currency: 'MYR', flag: '🇲🇾' },
|
|
{ code: 'ID', name: 'Indonesia', currency: 'IDR', flag: '🇮🇩' },
|
|
{ code: 'PH', name: 'Philippines', currency: 'PHP', flag: '🇵🇭' },
|
|
{ code: 'VN', name: 'Vietnam', currency: 'VND', flag: '🇻🇳' },
|
|
{ code: 'IN', name: 'India', currency: 'INR', flag: '🇮🇳' },
|
|
{ code: 'PK', name: 'Pakistan', currency: 'PKR', flag: '🇵🇰' },
|
|
// Middle East
|
|
{ code: 'AE', name: 'UAE', currency: 'AED', flag: '🇦🇪' },
|
|
{ code: 'SA', name: 'Saudi Arabia', currency: 'SAR', flag: '🇸🇦' },
|
|
{ code: 'QA', name: 'Qatar', currency: 'QAR', flag: '🇶🇦' },
|
|
{ code: 'KW', name: 'Kuwait', currency: 'KWD', flag: '🇰🇼' },
|
|
{ code: 'BH', name: 'Bahrain', currency: 'BHD', flag: '🇧🇭' },
|
|
{ code: 'OM', name: 'Oman', currency: 'OMR', flag: '🇴🇲' },
|
|
{ code: 'EG', name: 'Egypt', currency: 'EGP', flag: '🇪🇬' },
|
|
{ code: 'JO', name: 'Jordan', currency: 'JOD', flag: '🇯🇴' },
|
|
{ code: 'LB', name: 'Lebanon', currency: 'LBP', flag: '🇱🇧' },
|
|
{ code: 'IL', name: 'Israel', currency: 'ILS', flag: '🇮🇱' },
|
|
// Africa
|
|
{ code: 'ZA', name: 'South Africa', currency: 'ZAR', flag: '🇿🇦' },
|
|
{ code: 'NG', name: 'Nigeria', currency: 'NGN', flag: '🇳🇬' },
|
|
{ code: 'KE', name: 'Kenya', currency: 'KES', flag: '🇰🇪' },
|
|
];
|
|
|
|
const FX_SYMBOLS = Object.fromEntries(
|
|
[...new Set(COUNTRIES.map(c => c.currency))].map(ccy => [ccy, `${ccy}USD=X`])
|
|
);
|
|
|
|
// Handle both plain numbers and thousands-separated (480,000 LBP or 12,000 KRW)
|
|
const NUM = '\\d{1,3}(?:[,\\s]\\d{3})*(?:\\.\\d{1,3})?';
|
|
const CCY = 'USD|GBP|EUR|JPY|CHF|CNY|INR|AUD|CAD|NZD|BRL|MXN|ZAR|TRY|KRW|SGD|HKD|TWD|THB|IDR|NOK|SEK|DKK|PLN|CZK|HUF|RON|PHP|VND|MYR|PKR|ILS|ARS|COP|CLP|UAH|NGN|KES|AED|SAR|QAR|KWD|BHD|OMR|EGP|JOD|LBP';
|
|
const PRICE_PATTERNS = [
|
|
new RegExp(`(${NUM})\\s*(${CCY})`, 'i'),
|
|
new RegExp(`(${CCY})\\s*(${NUM})`, 'i'),
|
|
];
|
|
|
|
function parseNum(s) { return parseFloat(s.replace(/[,\s]/g, '')); }
|
|
|
|
function matchPrice(text, url) {
|
|
for (const re of PRICE_PATTERNS) {
|
|
const match = text.match(re);
|
|
if (match) {
|
|
const [price, currency] = /^\d/.test(match[1])
|
|
? [parseNum(match[1]), match[2].toUpperCase()]
|
|
: [parseNum(match[2]), match[1].toUpperCase()];
|
|
if (price > 0 && price < 10_000_000) return { price, currency, source: url || '' };
|
|
}
|
|
}
|
|
return null;
|
|
}
|
|
|
|
async function searchExa(query, includeDomains = null) {
|
|
const apiKey = (process.env.EXA_API_KEYS || process.env.EXA_API_KEY || '').split(/[\n,]+/)[0].trim();
|
|
if (!apiKey) throw new Error('EXA_API_KEYS or EXA_API_KEY not set');
|
|
|
|
const body = {
|
|
query,
|
|
numResults: 5,
|
|
type: 'auto',
|
|
contents: { summary: { query: 'What is the current Big Mac price in local currency and USD?' } },
|
|
};
|
|
if (includeDomains) body.includeDomains = includeDomains;
|
|
|
|
const resp = await fetch('https://api.exa.ai/search', {
|
|
method: 'POST',
|
|
headers: { 'x-api-key': apiKey, 'Content-Type': 'application/json', 'User-Agent': CHROME_UA },
|
|
body: JSON.stringify(body),
|
|
signal: AbortSignal.timeout(15_000),
|
|
});
|
|
|
|
if (!resp.ok) {
|
|
const text = await resp.text().catch(() => '');
|
|
console.warn(` EXA ${resp.status}: ${text.slice(0, 100)}`);
|
|
return null;
|
|
}
|
|
return resp.json();
|
|
}
|
|
|
|
async function fetchBigMacPrices(prevSnapshot) {
|
|
const fxRates = await getSharedFxRates(FX_SYMBOLS, FX_FALLBACKS);
|
|
const results = [];
|
|
|
|
for (const country of COUNTRIES) {
|
|
await sleep(EXA_DELAY_MS);
|
|
console.log(`\n Processing ${country.flag} ${country.name} (${country.currency})...`);
|
|
|
|
const fxRate = fxRates[country.currency] ?? FX_FALLBACKS[country.currency] ?? null;
|
|
let localPrice = null;
|
|
let usdPrice = null;
|
|
let sourceSite = '';
|
|
|
|
try {
|
|
// Include currency code in query — helps EXA find per-country specialist pages
|
|
const query = `Big Mac price ${country.name} ${country.currency}`;
|
|
const SPECIALIST_SITES = ['theburgerindex.com', 'eatmyindex.com'];
|
|
|
|
// Specialist Big Mac Index sites only — clean, verified per-country data
|
|
const exaResult = await searchExa(query, SPECIALIST_SITES);
|
|
await sleep(EXA_DELAY_MS);
|
|
|
|
if (exaResult?.results?.length) {
|
|
for (const result of exaResult.results) {
|
|
const summary = result?.summary;
|
|
if (!summary || typeof summary !== 'string') continue;
|
|
const hit = matchPrice(summary, result.url || '');
|
|
if (hit?.currency === country.currency) {
|
|
localPrice = hit.price;
|
|
sourceSite = hit.source;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
} catch (err) {
|
|
console.warn(` [${country.code}] EXA error: ${err.message}`);
|
|
}
|
|
|
|
if (usdPrice === null) {
|
|
usdPrice = localPrice !== null && fxRate ? +(localPrice * fxRate).toFixed(4) : null;
|
|
}
|
|
|
|
// Sanity check: Big Mac USD price must be in a plausible global range
|
|
if (usdPrice !== null && (usdPrice < USD_MIN || usdPrice > USD_MAX)) {
|
|
console.warn(` [PRICE] ANOMALY ${country.flag} ${country.name}: $${usdPrice} out of range [$${USD_MIN}-$${USD_MAX}] — dropping price`);
|
|
usdPrice = null;
|
|
localPrice = null;
|
|
}
|
|
|
|
const status = localPrice !== null ? `${localPrice} ${country.currency} = $${usdPrice}` : 'N/A';
|
|
console.log(` Big Mac: ${status}`);
|
|
|
|
results.push({
|
|
code: country.code,
|
|
name: country.name,
|
|
currency: country.currency,
|
|
flag: country.flag,
|
|
localPrice: localPrice !== null ? +localPrice.toFixed(4) : null,
|
|
usdPrice,
|
|
fxRate: fxRate || 0,
|
|
sourceSite,
|
|
available: usdPrice !== null,
|
|
});
|
|
}
|
|
|
|
const withData = results.filter(r => r.usdPrice != null);
|
|
const cheapest = withData.length ? withData.reduce((a, b) => a.usdPrice < b.usdPrice ? a : b).code : '';
|
|
const mostExpensive = withData.length ? withData.reduce((a, b) => a.usdPrice > b.usdPrice ? a : b).code : '';
|
|
|
|
// Compute WoW per country — requires at least 6 days between snapshots
|
|
const prevAge = prevSnapshot?.fetchedAt ? Date.now() - new Date(prevSnapshot.fetchedAt).getTime() : 0;
|
|
const hasPrevData = prevSnapshot?.countries?.length > 0;
|
|
const prevTooRecent = prevAge > 0 && prevAge < MIN_WOW_AGE_MS;
|
|
|
|
if (hasPrevData && prevTooRecent) {
|
|
console.warn(` [WoW] Skipping WoW — previous snapshot is only ${Math.round(prevAge / 3600000)}h old (need 144h+)`);
|
|
}
|
|
|
|
let wowAvailable = hasPrevData && !prevTooRecent;
|
|
let suspiciousCount = 0;
|
|
let suspiciousNames = '';
|
|
|
|
if (wowAvailable) {
|
|
const prevMap = Object.fromEntries(prevSnapshot.countries.map(c => [c.code, c.usdPrice]));
|
|
const rawWowValues = []; // unfiltered — used for global anomaly check
|
|
|
|
for (const r of results) {
|
|
if (r.usdPrice != null && prevMap[r.code] != null && prevMap[r.code] > 0) {
|
|
const raw = +((r.usdPrice - prevMap[r.code]) / prevMap[r.code] * 100).toFixed(2);
|
|
rawWowValues.push(raw);
|
|
if (Math.abs(raw) > WOW_ANOMALY_THRESHOLD) {
|
|
console.warn(` [WoW] ANOMALY ${r.flag} ${r.name}: ${raw}% (prev=$${prevMap[r.code]} now=$${r.usdPrice}) — hiding WoW for this country`);
|
|
suspiciousCount++;
|
|
suspiciousNames += (suspiciousNames ? ', ' : '') + `${r.name} ${raw}%`;
|
|
r.wowPct = null;
|
|
} else {
|
|
r.wowPct = raw;
|
|
}
|
|
} else {
|
|
r.wowPct = null;
|
|
}
|
|
}
|
|
|
|
if (suspiciousCount > 0) {
|
|
console.error(` [WoW] ADMIN ALERT: ${suspiciousCount} country/ies had anomalous WoW (>±${WOW_ANOMALY_THRESHOLD}%): ${suspiciousNames}`);
|
|
}
|
|
|
|
// Global check uses unfiltered average — individual filtering bounds each value to ≤20%
|
|
// so the filtered average can never exceed the threshold (dead check). Use raw values instead.
|
|
const rawAvg = rawWowValues.length > 0
|
|
? +(rawWowValues.reduce((s, v) => s + v, 0) / rawWowValues.length).toFixed(2)
|
|
: 0;
|
|
if (Math.abs(rawAvg) > WOW_ANOMALY_THRESHOLD) {
|
|
console.error(` [WoW] ADMIN ALERT: Global WoW raw avg ${rawAvg}% exceeds ±${WOW_ANOMALY_THRESHOLD}% — disabling WoW entirely, likely systematic data bug`);
|
|
wowAvailable = false;
|
|
}
|
|
}
|
|
|
|
const wowCountries = wowAvailable ? results.filter(r => r.wowPct != null) : [];
|
|
const wowAvgPct = wowCountries.length > 0
|
|
? +(wowCountries.reduce((s, r) => s + r.wowPct, 0) / wowCountries.length).toFixed(2)
|
|
: 0;
|
|
|
|
return {
|
|
countries: results,
|
|
fetchedAt: new Date().toISOString(),
|
|
cheapestCountry: cheapest,
|
|
mostExpensiveCountry: mostExpensive,
|
|
wowAvgPct,
|
|
wowAvailable,
|
|
prevFetchedAt: wowAvailable ? (prevSnapshot.fetchedAt ?? '') : '',
|
|
};
|
|
}
|
|
|
|
const prevSnapshot = await readSeedSnapshot(CANONICAL_KEY);
|
|
|
|
export function declareRecords(data) {
|
|
return data?.countries?.filter(c => c.available).length || 0;
|
|
}
|
|
|
|
await runSeed('economic', 'bigmac', CANONICAL_KEY, () => fetchBigMacPrices(prevSnapshot), {
|
|
ttlSeconds: CACHE_TTL,
|
|
validateFn: (data) => data?.countries?.length > 0,
|
|
recordCount: (data) => data?.countries?.filter(c => c.available).length || 0,
|
|
declareRecords,
|
|
sourceVersion: 'economist-bigmac-v1',
|
|
schemaVersion: 1,
|
|
maxStaleMin: 10080,
|
|
extraKeys: prevSnapshot ? [{
|
|
key: `${CANONICAL_KEY}:prev`,
|
|
transform: () => prevSnapshot, // write PRE-overwrite snapshot; ignore new data
|
|
ttl: CACHE_TTL * 2,
|
|
declareRecords,
|
|
}] : undefined,
|
|
});
|