Compare commits
3 Commits
gemini/fix
...
feature/so
| Author | SHA1 | Date | |
|---|---|---|---|
| b0205b53a5 | |||
| 35409ac487 | |||
| 3e15870bd8 |
1
.gitignore
vendored
1
.gitignore
vendored
@@ -1,4 +1,3 @@
|
||||
node_modules/
|
||||
test-results/
|
||||
nexus/__pycache__/
|
||||
tests/__pycache__/
|
||||
|
||||
97
nexus/adaptive_calibrator.py
Normal file
97
nexus/adaptive_calibrator.py
Normal file
@@ -0,0 +1,97 @@
|
||||
import json
|
||||
import os
|
||||
import time
|
||||
from typing import Dict, List, Optional
|
||||
|
||||
class AdaptiveCalibrator:
|
||||
"""
|
||||
Provides online learning for cost estimation accuracy in the sovereign AI stack.
|
||||
Tracks predicted vs actual metrics (latency, tokens, etc.) and adjusts a
|
||||
calibration factor to improve future estimates.
|
||||
"""
|
||||
|
||||
def __init__(self, storage_path: str = "nexus/calibration_state.json"):
|
||||
self.storage_path = storage_path
|
||||
self.state = {
|
||||
"factor": 1.0,
|
||||
"history": [],
|
||||
"last_updated": 0,
|
||||
"total_samples": 0,
|
||||
"learning_rate": 0.1
|
||||
}
|
||||
self.load()
|
||||
|
||||
def load(self):
|
||||
if os.path.exists(self.storage_path):
|
||||
try:
|
||||
with open(self.storage_path, 'r') as f:
|
||||
self.state.update(json.load(f))
|
||||
except Exception as e:
|
||||
print(f"Error loading calibration state: {e}")
|
||||
|
||||
def save(self):
|
||||
try:
|
||||
with open(self.storage_path, 'w') as f:
|
||||
json.dump(self.state, f, indent=2)
|
||||
except Exception as e:
|
||||
print(f"Error saving calibration state: {e}")
|
||||
|
||||
def predict(self, base_estimate: float) -> float:
|
||||
"""Apply the current calibration factor to a base estimate."""
|
||||
return base_estimate * self.state["factor"]
|
||||
|
||||
def update(self, predicted: float, actual: float):
|
||||
"""
|
||||
Update the calibration factor based on a new sample.
|
||||
Uses a simple moving average approach for the factor.
|
||||
"""
|
||||
if predicted <= 0 or actual <= 0:
|
||||
return
|
||||
|
||||
# Ratio of actual to predicted
|
||||
# If actual > predicted, ratio > 1 (we underestimated, factor should increase)
|
||||
# If actual < predicted, ratio < 1 (we overestimated, factor should decrease)
|
||||
ratio = actual / predicted
|
||||
|
||||
# Update factor using learning rate
|
||||
lr = self.state["learning_rate"]
|
||||
self.state["factor"] = (1 - lr) * self.state["factor"] + lr * (self.state["factor"] * ratio)
|
||||
|
||||
# Record history (keep last 50 samples)
|
||||
self.state["history"].append({
|
||||
"timestamp": time.time(),
|
||||
"predicted": predicted,
|
||||
"actual": actual,
|
||||
"ratio": ratio
|
||||
})
|
||||
if len(self.state["history"]) > 50:
|
||||
self.state["history"].pop(0)
|
||||
|
||||
self.state["total_samples"] += 1
|
||||
self.state["last_updated"] = time.time()
|
||||
self.save()
|
||||
|
||||
def get_metrics(self) -> Dict:
|
||||
"""Return current calibration metrics."""
|
||||
return {
|
||||
"current_factor": self.state["factor"],
|
||||
"total_samples": self.state["total_samples"],
|
||||
"average_ratio": sum(h["ratio"] for h in self.state["history"]) / len(self.state["history"]) if self.state["history"] else 1.0
|
||||
}
|
||||
|
||||
if __name__ == "__main__":
|
||||
# Simple test/demo
|
||||
calibrator = AdaptiveCalibrator("nexus/test_calibration.json")
|
||||
|
||||
print(f"Initial factor: {calibrator.state['factor']}")
|
||||
|
||||
# Simulate some samples where we consistently underestimate by 20%
|
||||
for _ in range(10):
|
||||
base = 100.0
|
||||
pred = calibrator.predict(base)
|
||||
actual = 120.0 # Reality is 20% higher
|
||||
calibrator.update(pred, actual)
|
||||
print(f"Pred: {pred:.2f}, Actual: {actual:.2f}, New Factor: {calibrator.state['factor']:.4f}")
|
||||
|
||||
print("Final metrics:", calibrator.get_metrics())
|
||||
os.remove("nexus/test_calibration.json")
|
||||
@@ -25,7 +25,7 @@ from typing import Optional
|
||||
log = logging.getLogger("nexus")
|
||||
|
||||
GROQ_API_URL = "https://api.groq.com/openai/v1/chat/completions"
|
||||
DEFAULT_MODEL = "llama3-8b-8192"
|
||||
DEFAULT_MODEL = "groq/llama3-8b-8192"
|
||||
|
||||
class GroqWorker:
|
||||
"""A worker for the Groq API."""
|
||||
|
||||
@@ -315,7 +315,7 @@ class NexusMind:
|
||||
]
|
||||
|
||||
summary = self._call_thinker(messages)
|
||||
|
||||
.
|
||||
if summary:
|
||||
self.experience_store.save_summary(
|
||||
summary=summary,
|
||||
@@ -442,7 +442,7 @@ def main():
|
||||
parser = argparse.ArgumentParser(
|
||||
description="Nexus Mind — Embodied consciousness loop"
|
||||
)
|
||||
parser.add_argument(
|
||||
parser.add_.argument(
|
||||
"--model", default=DEFAULT_MODEL,
|
||||
help=f"Ollama model name (default: {DEFAULT_MODEL})"
|
||||
)
|
||||
|
||||
102
nexus/nostr_identity.py
Normal file
102
nexus/nostr_identity.py
Normal file
@@ -0,0 +1,102 @@
|
||||
|
||||
import hashlib
|
||||
import hmac
|
||||
import os
|
||||
import binascii
|
||||
|
||||
# ═══════════════════════════════════════════
|
||||
# NOSTR SOVEREIGN IDENTITY (NIP-01)
|
||||
# ═══════════════════════════════════════════
|
||||
# Pure Python implementation of Schnorr signatures for Nostr.
|
||||
# No dependencies required.
|
||||
|
||||
def sha256(data):
|
||||
return hashlib.sha256(data).digest()
|
||||
|
||||
def hmac_sha256(key, data):
|
||||
return hmac.new(key, data, hashlib.sha256).digest()
|
||||
|
||||
# Secp256k1 Constants
|
||||
P = 2**256 - 2**32 - 977
|
||||
N = 115792089237316195423570985008687907852837564279074904382605163141518161494337
|
||||
G = (0x79be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798,
|
||||
0x483ada7726a3c4655da4fbfc0e1108a8fd17b448a68554199c47d08ffb10d4b8)
|
||||
|
||||
def inverse(a, n):
|
||||
return pow(a, n - 2, n)
|
||||
|
||||
def point_add(p1, p2):
|
||||
if p1 is None: return p2
|
||||
if p2 is None: return p1
|
||||
(x1, y1), (x2, y2) = p1, p2
|
||||
if x1 == x2 and y1 != y2: return None
|
||||
if x1 == x2:
|
||||
m = (3 * x1 * x1 * inverse(2 * y1, P)) % P
|
||||
else:
|
||||
m = ((y2 - y1) * inverse(x2 - x1, P)) % P
|
||||
x3 = (m * m - x1 - x2) % P
|
||||
y3 = (m * (x1 - x3) - y1) % P
|
||||
return (x3, y3)
|
||||
|
||||
def point_mul(p, n):
|
||||
r = None
|
||||
for i in range(256):
|
||||
if (n >> i) & 1:
|
||||
r = point_add(r, p)
|
||||
p = point_add(p, p)
|
||||
return r
|
||||
|
||||
def get_pubkey(privkey):
|
||||
p = point_mul(G, privkey)
|
||||
return binascii.hexlify(p[0].to_bytes(32, 'big')).decode()
|
||||
|
||||
# Schnorr Signature (BIP340)
|
||||
def sign_schnorr(msg_hash, privkey):
|
||||
k = int.from_bytes(sha256(privkey.to_bytes(32, 'big') + msg_hash), 'big') % N
|
||||
R = point_mul(G, k)
|
||||
if R[1] % 2 != 0:
|
||||
k = N - k
|
||||
r = R[0].to_bytes(32, 'big')
|
||||
e = int.from_bytes(sha256(r + binascii.unhexlify(get_pubkey(privkey)) + msg_hash), 'big') % N
|
||||
s = (k + e * privkey) % N
|
||||
return binascii.hexlify(r + s.to_bytes(32, 'big')).decode()
|
||||
|
||||
class NostrIdentity:
|
||||
def __init__(self, privkey_hex=None):
|
||||
if privkey_hex:
|
||||
self.privkey = int(privkey_hex, 16)
|
||||
else:
|
||||
self.privkey = int.from_bytes(os.urandom(32), 'big') % N
|
||||
self.pubkey = get_pubkey(self.privkey)
|
||||
|
||||
def sign_event(self, event):
|
||||
# NIP-01 Event Signing
|
||||
import json
|
||||
event_data = [
|
||||
0,
|
||||
event['pubkey'],
|
||||
event['created_at'],
|
||||
event['kind'],
|
||||
event['tags'],
|
||||
event['content']
|
||||
]
|
||||
serialized = json.dumps(event_data, separators=(',', ':'))
|
||||
msg_hash = sha256(serialized.encode())
|
||||
event['id'] = binascii.hexlify(msg_hash).decode()
|
||||
event['sig'] = sign_schnorr(msg_hash, self.privkey)
|
||||
return event
|
||||
|
||||
if __name__ == "__main__":
|
||||
# Test Identity
|
||||
identity = NostrIdentity()
|
||||
print(f"Nostr Pubkey: {identity.pubkey}")
|
||||
|
||||
event = {
|
||||
"pubkey": identity.pubkey,
|
||||
"created_at": 1677628800,
|
||||
"kind": 1,
|
||||
"tags": [],
|
||||
"content": "Sovereignty and service always. #Timmy"
|
||||
}
|
||||
signed_event = identity.sign_event(event)
|
||||
print(f"Signed Event: {signed_event}")
|
||||
55
nexus/nostr_publisher.py
Normal file
55
nexus/nostr_publisher.py
Normal file
@@ -0,0 +1,55 @@
|
||||
|
||||
import asyncio
|
||||
import websockets
|
||||
import json
|
||||
import time
|
||||
import os
|
||||
from nostr_identity import NostrIdentity
|
||||
|
||||
# ═══════════════════════════════════════════
|
||||
# NOSTR SOVEREIGN PUBLISHER
|
||||
# ═══════════════════════════════════════════
|
||||
|
||||
RELAYS = [
|
||||
"wss://relay.damus.io",
|
||||
"wss://nos.lol",
|
||||
"wss://relay.snort.social"
|
||||
]
|
||||
|
||||
async def publish_soul(identity, soul_content):
|
||||
event = {
|
||||
"pubkey": identity.pubkey,
|
||||
"created_at": int(time.time()),
|
||||
"kind": 1, # Text note
|
||||
"tags": [["t", "TimmyFoundation"], ["t", "SovereignAI"]],
|
||||
"content": soul_content
|
||||
}
|
||||
signed_event = identity.sign_event(event)
|
||||
message = json.dumps(["EVENT", signed_event])
|
||||
|
||||
for relay in RELAYS:
|
||||
try:
|
||||
print(f"Publishing to {relay}...")
|
||||
async with websockets.connect(relay, timeout=10) as ws:
|
||||
await ws.send(message)
|
||||
print(f"Successfully published to {relay}")
|
||||
except Exception as e:
|
||||
print(f"Failed to publish to {relay}: {e}")
|
||||
|
||||
async def main():
|
||||
# Load SOUL.md
|
||||
soul_path = os.path.join(os.path.dirname(__file__), "../SOUL.md")
|
||||
if os.path.exists(soul_path):
|
||||
with open(soul_path, "r") as f:
|
||||
soul_content = f.read()
|
||||
else:
|
||||
soul_content = "Sovereignty and service always. #Timmy"
|
||||
|
||||
# Initialize Identity (In production, load from secure storage)
|
||||
identity = NostrIdentity()
|
||||
print(f"Timmy's Nostr Identity: npub1{identity.pubkey}")
|
||||
|
||||
await publish_soul(identity, soul_content)
|
||||
|
||||
if __name__ == "__main__":
|
||||
asyncio.run(main())
|
||||
284
public/nexus/app.js
Normal file
284
public/nexus/app.js
Normal file
@@ -0,0 +1,284 @@
|
||||
<!doctype html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<meta charset="UTF-8" />
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||||
<meta http-equiv="Cache-Control" content="no-cache, no-store, must-revalidate" />
|
||||
<meta http-equiv="Pragma" content="no-cache" />
|
||||
<meta http-equiv="Expires" content="0" />
|
||||
<title>Cookie check</title>
|
||||
<link rel="preconnect" href="https://fonts.googleapis.com">
|
||||
<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin>
|
||||
<link href="https://fonts.googleapis.com/css2?family=Inter:wght@400;500;600&display=swap" rel="stylesheet">
|
||||
<style>
|
||||
:root {
|
||||
color-scheme: light dark;
|
||||
}
|
||||
|
||||
body {
|
||||
font-family: 'Inter', Helvetica, Arial, sans-serif;
|
||||
background: light-dark(#F8F8F7, #191919);
|
||||
color: light-dark(#1f1f1f, #e3e3e3);
|
||||
display: flex;
|
||||
flex-direction: column;
|
||||
align-items: center;
|
||||
justify-content: center;
|
||||
box-sizing: border-box;
|
||||
min-height: 100vh;
|
||||
margin: 0;
|
||||
padding: 20px;
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
.container {
|
||||
background: light-dark(#FFFFFF, #1F1F1F);
|
||||
padding: 32px;
|
||||
border-radius: 16px;
|
||||
border: 1px solid light-dark(#E2E3E4, #3E3E3E);
|
||||
max-width: min(80%, 500px);
|
||||
width: 100%;
|
||||
color: light-dark(#2B2D31, #D4D4D4);
|
||||
}
|
||||
|
||||
h1 {
|
||||
font-size: 20px;
|
||||
font-weight: 500;
|
||||
margin-top: 1rem;
|
||||
margin-bottom: 1rem;
|
||||
color: light-dark(#2B2D31, #D4D4D4);
|
||||
}
|
||||
|
||||
p {
|
||||
font-size: 14px;
|
||||
color: light-dark(#2B2D31, #D4D4D4);
|
||||
line-height: 21px;
|
||||
margin: 0 0 1.5rem 0;
|
||||
}
|
||||
|
||||
.icon {
|
||||
margin-bottom: 1rem;
|
||||
line-height: 0;
|
||||
}
|
||||
|
||||
.button-container {
|
||||
display: flex;
|
||||
justify-content: flex-end;
|
||||
gap: 10px;
|
||||
margin-top: 2rem;
|
||||
}
|
||||
|
||||
button {
|
||||
background-color: light-dark(#fff, #323232);
|
||||
color: light-dark(#2B2D31, #FCFCFC);
|
||||
border: 1px solid light-dark(#E2E3E4, #3E3E3E);
|
||||
border-radius: 12px;
|
||||
padding: 8px 12px;
|
||||
font-size: 14px;
|
||||
line-height: 21px;
|
||||
cursor: pointer;
|
||||
transition: background-color 0.2s;
|
||||
font-weight: 400;
|
||||
font-family: 'Inter', Helvetica, Arial, sans-serif;
|
||||
width: 100%;
|
||||
}
|
||||
|
||||
button:hover {
|
||||
background-color: light-dark(#EAEAEB, #424242);
|
||||
}
|
||||
|
||||
.hidden {
|
||||
display: none;
|
||||
}
|
||||
|
||||
/* Loading Spinner Animation */
|
||||
.spinner {
|
||||
margin: 0 auto 1.5rem auto;
|
||||
width: 40px;
|
||||
height: 40px;
|
||||
border: 4px solid light-dark(#f0f0f0, #262626);
|
||||
border-top: 4px solid light-dark(#076eff, #87a9ff); /* Blue color */
|
||||
border-radius: 50%;
|
||||
animation: spin 1s linear infinite;
|
||||
}
|
||||
|
||||
.logo {
|
||||
border-radius: 10px;
|
||||
display: block;
|
||||
margin: 0 auto 2rem auto;
|
||||
}
|
||||
|
||||
.logo.hidden {
|
||||
display: none;
|
||||
}
|
||||
|
||||
@keyframes spin {
|
||||
0% {
|
||||
transform: rotate(0deg);
|
||||
}
|
||||
100% {
|
||||
transform: rotate(360deg);
|
||||
}
|
||||
}
|
||||
</style>
|
||||
</head>
|
||||
<body>
|
||||
<div class="container">
|
||||
<img
|
||||
class="logo"
|
||||
src="https://www.gstatic.com/aistudio/ai_studio_favicon_2_256x256.png"
|
||||
alt="AI Studio Logo"
|
||||
width="256"
|
||||
height="256"
|
||||
/>
|
||||
<div class="spinner"></div>
|
||||
<div id="error-ui" class="hidden">
|
||||
<div class="icon">
|
||||
<svg
|
||||
version="1.1"
|
||||
xmlns="http://www.w3.org/2000/svg"
|
||||
viewBox="0 0 24 24"
|
||||
width="48px"
|
||||
height="48px"
|
||||
fill="#D73A49"
|
||||
>
|
||||
<path
|
||||
d="M12,2C6.486,2,2,6.486,2,12s4.486,10,10,10s10-4.486,10-10S17.514,2,12,2z M13,17h-2v-2h2V17z M13,13h-2V7h2V13z"
|
||||
/>
|
||||
</svg>
|
||||
</div>
|
||||
<div id="stepOne" class="text-container">
|
||||
<h1>Action required to load your app</h1>
|
||||
<p>
|
||||
It looks like your browser is blocking a required security cookie, which is common on
|
||||
older versions of iOS and Safari.
|
||||
</p>
|
||||
<div class="button-container">
|
||||
<button id="authInSeparateWindowButton" onclick="redirectToReturnUrl(true)">Authenticate in new window</button>
|
||||
</div>
|
||||
</div>
|
||||
<div id="stepTwo" class="text-container hidden">
|
||||
<h1>Action required to load your app</h1>
|
||||
<p>
|
||||
It looks like your browser is blocking a required security cookie, which is common on
|
||||
older versions of iOS and Safari.
|
||||
</p>
|
||||
<div class="button-container">
|
||||
<button id="interactButton" onclick="redirectToReturnUrl(false)">Close and continue</button>
|
||||
</div>
|
||||
</div>
|
||||
<div id="stepThree" class="text-container hidden">
|
||||
<h1>Almost there!</h1>
|
||||
<p>
|
||||
Grant permission for the required security cookie below.
|
||||
</p>
|
||||
<div class="button-container">
|
||||
<button id="grantPermissionButton" onclick="grantStorageAccess()">Grant permission</button>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<script>
|
||||
const AUTH_FLOW_TEST_COOKIE_NAME = '__SECURE-aistudio_auth_flow_may_set_cookies';
|
||||
const COOKIE_VALUE = 'true';
|
||||
|
||||
function getCookie(name) {
|
||||
const cookies = document.cookie.split(';');
|
||||
for (let i = 0; i < cookies.length; i++) {
|
||||
let cookie = cookies[i].trim();
|
||||
if (cookie.startsWith(name + '=')) {
|
||||
return cookie.substring(name.length + 1);
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
function setAuthFlowTestCookie() {
|
||||
// Set the cookie's TTL to 1 minute. This is a short lived cookie because it is only used
|
||||
// when the user does not have an auth token or their auth token needs to be reset.
|
||||
// Making this cookie too long-lived allows the user to get into a state where they can't
|
||||
// mint a new auth token.
|
||||
document.cookie = `${AUTH_FLOW_TEST_COOKIE_NAME}=${COOKIE_VALUE}; Path=/; Secure; SameSite=None; Domain=${window.location.hostname}; Partitioned; Max-Age=60;`;
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns true if the test cookie is set, false otherwise.
|
||||
*/
|
||||
function authFlowTestCookieIsSet() {
|
||||
return getCookie(AUTH_FLOW_TEST_COOKIE_NAME) === COOKIE_VALUE;
|
||||
}
|
||||
|
||||
/**
|
||||
* Redirects to the return url. If autoClose is true, then the return url will be opened in a
|
||||
* new window, and it will be closed automatically when the page loads.
|
||||
*/
|
||||
async function redirectToReturnUrl(autoClose) {
|
||||
const initialReturnUrlStr = new URLSearchParams(window.location.search).get('return_url');
|
||||
const returnUrl = initialReturnUrlStr ? new URL(initialReturnUrlStr) : null;
|
||||
|
||||
// Prevent potentially malicious URLs from being used
|
||||
if (returnUrl.protocol.toLowerCase() === 'javascript:') {
|
||||
console.error('Potentially malicious return URL blocked');
|
||||
return;
|
||||
}
|
||||
|
||||
if (autoClose) {
|
||||
returnUrl.searchParams.set('__auto_close', '1');
|
||||
const url = new URL(window.location.href);
|
||||
url.searchParams.set('return_url', returnUrl.toString());
|
||||
// Land on the cookie check page first, so the user can interact with it before proceeding
|
||||
// to the return url where cookies can be set.
|
||||
window.open(url.toString(), '_blank');
|
||||
const hasAccess = await document.hasStorageAccess();
|
||||
document.querySelector('#stepOne').classList.add('hidden');
|
||||
if (!hasAccess) {
|
||||
document.querySelector('#stepThree').classList.remove('hidden');
|
||||
} else {
|
||||
window.location.reload();
|
||||
}
|
||||
} else {
|
||||
window.location.href = returnUrl.toString();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Grants the browser permission to set cookies. If successful, then it redirects to the
|
||||
* return url.
|
||||
*/
|
||||
async function grantStorageAccess() {
|
||||
try {
|
||||
await document.requestStorageAccess();
|
||||
redirectToReturnUrl(false);
|
||||
} catch (err) {
|
||||
console.log('error after button click: ', err);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies that the browser can set cookies. If it can, then it redirects to the return url.
|
||||
* If it can't, then it shows the error UI.
|
||||
*/
|
||||
function verifyCanSetCookies() {
|
||||
setAuthFlowTestCookie();
|
||||
if (authFlowTestCookieIsSet()) {
|
||||
// Check if we are on the auto-close flow, and if so show the interact button.
|
||||
const returnUrl = new URLSearchParams(window.location.search).get('return_url');
|
||||
const autoClose = new URL(returnUrl).searchParams.has('__auto_close');
|
||||
if (autoClose) {
|
||||
document.querySelector('#stepOne').classList.add('hidden');
|
||||
document.querySelector('#stepTwo').classList.remove('hidden');
|
||||
} else {
|
||||
redirectToReturnUrl(false);
|
||||
return;
|
||||
}
|
||||
}
|
||||
// The cookie could not be set, so initiate the recovery flow.
|
||||
document.querySelector('.logo').classList.add('hidden');
|
||||
document.querySelector('.spinner').classList.add('hidden');
|
||||
document.querySelector('#error-ui').classList.remove('hidden');
|
||||
}
|
||||
|
||||
// Start the cookie verification process.
|
||||
verifyCanSetCookies();
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
284
public/nexus/index.html
Normal file
284
public/nexus/index.html
Normal file
@@ -0,0 +1,284 @@
|
||||
<!doctype html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<meta charset="UTF-8" />
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||||
<meta http-equiv="Cache-Control" content="no-cache, no-store, must-revalidate" />
|
||||
<meta http-equiv="Pragma" content="no-cache" />
|
||||
<meta http-equiv="Expires" content="0" />
|
||||
<title>Cookie check</title>
|
||||
<link rel="preconnect" href="https://fonts.googleapis.com">
|
||||
<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin>
|
||||
<link href="https://fonts.googleapis.com/css2?family=Inter:wght@400;500;600&display=swap" rel="stylesheet">
|
||||
<style>
|
||||
:root {
|
||||
color-scheme: light dark;
|
||||
}
|
||||
|
||||
body {
|
||||
font-family: 'Inter', Helvetica, Arial, sans-serif;
|
||||
background: light-dark(#F8F8F7, #191919);
|
||||
color: light-dark(#1f1f1f, #e3e3e3);
|
||||
display: flex;
|
||||
flex-direction: column;
|
||||
align-items: center;
|
||||
justify-content: center;
|
||||
box-sizing: border-box;
|
||||
min-height: 100vh;
|
||||
margin: 0;
|
||||
padding: 20px;
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
.container {
|
||||
background: light-dark(#FFFFFF, #1F1F1F);
|
||||
padding: 32px;
|
||||
border-radius: 16px;
|
||||
border: 1px solid light-dark(#E2E3E4, #3E3E3E);
|
||||
max-width: min(80%, 500px);
|
||||
width: 100%;
|
||||
color: light-dark(#2B2D31, #D4D4D4);
|
||||
}
|
||||
|
||||
h1 {
|
||||
font-size: 20px;
|
||||
font-weight: 500;
|
||||
margin-top: 1rem;
|
||||
margin-bottom: 1rem;
|
||||
color: light-dark(#2B2D31, #D4D4D4);
|
||||
}
|
||||
|
||||
p {
|
||||
font-size: 14px;
|
||||
color: light-dark(#2B2D31, #D4D4D4);
|
||||
line-height: 21px;
|
||||
margin: 0 0 1.5rem 0;
|
||||
}
|
||||
|
||||
.icon {
|
||||
margin-bottom: 1rem;
|
||||
line-height: 0;
|
||||
}
|
||||
|
||||
.button-container {
|
||||
display: flex;
|
||||
justify-content: flex-end;
|
||||
gap: 10px;
|
||||
margin-top: 2rem;
|
||||
}
|
||||
|
||||
button {
|
||||
background-color: light-dark(#fff, #323232);
|
||||
color: light-dark(#2B2D31, #FCFCFC);
|
||||
border: 1px solid light-dark(#E2E3E4, #3E3E3E);
|
||||
border-radius: 12px;
|
||||
padding: 8px 12px;
|
||||
font-size: 14px;
|
||||
line-height: 21px;
|
||||
cursor: pointer;
|
||||
transition: background-color 0.2s;
|
||||
font-weight: 400;
|
||||
font-family: 'Inter', Helvetica, Arial, sans-serif;
|
||||
width: 100%;
|
||||
}
|
||||
|
||||
button:hover {
|
||||
background-color: light-dark(#EAEAEB, #424242);
|
||||
}
|
||||
|
||||
.hidden {
|
||||
display: none;
|
||||
}
|
||||
|
||||
/* Loading Spinner Animation */
|
||||
.spinner {
|
||||
margin: 0 auto 1.5rem auto;
|
||||
width: 40px;
|
||||
height: 40px;
|
||||
border: 4px solid light-dark(#f0f0f0, #262626);
|
||||
border-top: 4px solid light-dark(#076eff, #87a9ff); /* Blue color */
|
||||
border-radius: 50%;
|
||||
animation: spin 1s linear infinite;
|
||||
}
|
||||
|
||||
.logo {
|
||||
border-radius: 10px;
|
||||
display: block;
|
||||
margin: 0 auto 2rem auto;
|
||||
}
|
||||
|
||||
.logo.hidden {
|
||||
display: none;
|
||||
}
|
||||
|
||||
@keyframes spin {
|
||||
0% {
|
||||
transform: rotate(0deg);
|
||||
}
|
||||
100% {
|
||||
transform: rotate(360deg);
|
||||
}
|
||||
}
|
||||
</style>
|
||||
</head>
|
||||
<body>
|
||||
<div class="container">
|
||||
<img
|
||||
class="logo"
|
||||
src="https://www.gstatic.com/aistudio/ai_studio_favicon_2_256x256.png"
|
||||
alt="AI Studio Logo"
|
||||
width="256"
|
||||
height="256"
|
||||
/>
|
||||
<div class="spinner"></div>
|
||||
<div id="error-ui" class="hidden">
|
||||
<div class="icon">
|
||||
<svg
|
||||
version="1.1"
|
||||
xmlns="http://www.w3.org/2000/svg"
|
||||
viewBox="0 0 24 24"
|
||||
width="48px"
|
||||
height="48px"
|
||||
fill="#D73A49"
|
||||
>
|
||||
<path
|
||||
d="M12,2C6.486,2,2,6.486,2,12s4.486,10,10,10s10-4.486,10-10S17.514,2,12,2z M13,17h-2v-2h2V17z M13,13h-2V7h2V13z"
|
||||
/>
|
||||
</svg>
|
||||
</div>
|
||||
<div id="stepOne" class="text-container">
|
||||
<h1>Action required to load your app</h1>
|
||||
<p>
|
||||
It looks like your browser is blocking a required security cookie, which is common on
|
||||
older versions of iOS and Safari.
|
||||
</p>
|
||||
<div class="button-container">
|
||||
<button id="authInSeparateWindowButton" onclick="redirectToReturnUrl(true)">Authenticate in new window</button>
|
||||
</div>
|
||||
</div>
|
||||
<div id="stepTwo" class="text-container hidden">
|
||||
<h1>Action required to load your app</h1>
|
||||
<p>
|
||||
It looks like your browser is blocking a required security cookie, which is common on
|
||||
older versions of iOS and Safari.
|
||||
</p>
|
||||
<div class="button-container">
|
||||
<button id="interactButton" onclick="redirectToReturnUrl(false)">Close and continue</button>
|
||||
</div>
|
||||
</div>
|
||||
<div id="stepThree" class="text-container hidden">
|
||||
<h1>Almost there!</h1>
|
||||
<p>
|
||||
Grant permission for the required security cookie below.
|
||||
</p>
|
||||
<div class="button-container">
|
||||
<button id="grantPermissionButton" onclick="grantStorageAccess()">Grant permission</button>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<script>
|
||||
const AUTH_FLOW_TEST_COOKIE_NAME = '__SECURE-aistudio_auth_flow_may_set_cookies';
|
||||
const COOKIE_VALUE = 'true';
|
||||
|
||||
function getCookie(name) {
|
||||
const cookies = document.cookie.split(';');
|
||||
for (let i = 0; i < cookies.length; i++) {
|
||||
let cookie = cookies[i].trim();
|
||||
if (cookie.startsWith(name + '=')) {
|
||||
return cookie.substring(name.length + 1);
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
function setAuthFlowTestCookie() {
|
||||
// Set the cookie's TTL to 1 minute. This is a short lived cookie because it is only used
|
||||
// when the user does not have an auth token or their auth token needs to be reset.
|
||||
// Making this cookie too long-lived allows the user to get into a state where they can't
|
||||
// mint a new auth token.
|
||||
document.cookie = `${AUTH_FLOW_TEST_COOKIE_NAME}=${COOKIE_VALUE}; Path=/; Secure; SameSite=None; Domain=${window.location.hostname}; Partitioned; Max-Age=60;`;
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns true if the test cookie is set, false otherwise.
|
||||
*/
|
||||
function authFlowTestCookieIsSet() {
|
||||
return getCookie(AUTH_FLOW_TEST_COOKIE_NAME) === COOKIE_VALUE;
|
||||
}
|
||||
|
||||
/**
|
||||
* Redirects to the return url. If autoClose is true, then the return url will be opened in a
|
||||
* new window, and it will be closed automatically when the page loads.
|
||||
*/
|
||||
async function redirectToReturnUrl(autoClose) {
|
||||
const initialReturnUrlStr = new URLSearchParams(window.location.search).get('return_url');
|
||||
const returnUrl = initialReturnUrlStr ? new URL(initialReturnUrlStr) : null;
|
||||
|
||||
// Prevent potentially malicious URLs from being used
|
||||
if (returnUrl.protocol.toLowerCase() === 'javascript:') {
|
||||
console.error('Potentially malicious return URL blocked');
|
||||
return;
|
||||
}
|
||||
|
||||
if (autoClose) {
|
||||
returnUrl.searchParams.set('__auto_close', '1');
|
||||
const url = new URL(window.location.href);
|
||||
url.searchParams.set('return_url', returnUrl.toString());
|
||||
// Land on the cookie check page first, so the user can interact with it before proceeding
|
||||
// to the return url where cookies can be set.
|
||||
window.open(url.toString(), '_blank');
|
||||
const hasAccess = await document.hasStorageAccess();
|
||||
document.querySelector('#stepOne').classList.add('hidden');
|
||||
if (!hasAccess) {
|
||||
document.querySelector('#stepThree').classList.remove('hidden');
|
||||
} else {
|
||||
window.location.reload();
|
||||
}
|
||||
} else {
|
||||
window.location.href = returnUrl.toString();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Grants the browser permission to set cookies. If successful, then it redirects to the
|
||||
* return url.
|
||||
*/
|
||||
async function grantStorageAccess() {
|
||||
try {
|
||||
await document.requestStorageAccess();
|
||||
redirectToReturnUrl(false);
|
||||
} catch (err) {
|
||||
console.log('error after button click: ', err);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies that the browser can set cookies. If it can, then it redirects to the return url.
|
||||
* If it can't, then it shows the error UI.
|
||||
*/
|
||||
function verifyCanSetCookies() {
|
||||
setAuthFlowTestCookie();
|
||||
if (authFlowTestCookieIsSet()) {
|
||||
// Check if we are on the auto-close flow, and if so show the interact button.
|
||||
const returnUrl = new URLSearchParams(window.location.search).get('return_url');
|
||||
const autoClose = new URL(returnUrl).searchParams.has('__auto_close');
|
||||
if (autoClose) {
|
||||
document.querySelector('#stepOne').classList.add('hidden');
|
||||
document.querySelector('#stepTwo').classList.remove('hidden');
|
||||
} else {
|
||||
redirectToReturnUrl(false);
|
||||
return;
|
||||
}
|
||||
}
|
||||
// The cookie could not be set, so initiate the recovery flow.
|
||||
document.querySelector('.logo').classList.add('hidden');
|
||||
document.querySelector('.spinner').classList.add('hidden');
|
||||
document.querySelector('#error-ui').classList.remove('hidden');
|
||||
}
|
||||
|
||||
// Start the cookie verification process.
|
||||
verifyCanSetCookies();
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
284
public/nexus/style.css
Normal file
284
public/nexus/style.css
Normal file
@@ -0,0 +1,284 @@
|
||||
<!doctype html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<meta charset="UTF-8" />
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||||
<meta http-equiv="Cache-Control" content="no-cache, no-store, must-revalidate" />
|
||||
<meta http-equiv="Pragma" content="no-cache" />
|
||||
<meta http-equiv="Expires" content="0" />
|
||||
<title>Cookie check</title>
|
||||
<link rel="preconnect" href="https://fonts.googleapis.com">
|
||||
<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin>
|
||||
<link href="https://fonts.googleapis.com/css2?family=Inter:wght@400;500;600&display=swap" rel="stylesheet">
|
||||
<style>
|
||||
:root {
|
||||
color-scheme: light dark;
|
||||
}
|
||||
|
||||
body {
|
||||
font-family: 'Inter', Helvetica, Arial, sans-serif;
|
||||
background: light-dark(#F8F8F7, #191919);
|
||||
color: light-dark(#1f1f1f, #e3e3e3);
|
||||
display: flex;
|
||||
flex-direction: column;
|
||||
align-items: center;
|
||||
justify-content: center;
|
||||
box-sizing: border-box;
|
||||
min-height: 100vh;
|
||||
margin: 0;
|
||||
padding: 20px;
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
.container {
|
||||
background: light-dark(#FFFFFF, #1F1F1F);
|
||||
padding: 32px;
|
||||
border-radius: 16px;
|
||||
border: 1px solid light-dark(#E2E3E4, #3E3E3E);
|
||||
max-width: min(80%, 500px);
|
||||
width: 100%;
|
||||
color: light-dark(#2B2D31, #D4D4D4);
|
||||
}
|
||||
|
||||
h1 {
|
||||
font-size: 20px;
|
||||
font-weight: 500;
|
||||
margin-top: 1rem;
|
||||
margin-bottom: 1rem;
|
||||
color: light-dark(#2B2D31, #D4D4D4);
|
||||
}
|
||||
|
||||
p {
|
||||
font-size: 14px;
|
||||
color: light-dark(#2B2D31, #D4D4D4);
|
||||
line-height: 21px;
|
||||
margin: 0 0 1.5rem 0;
|
||||
}
|
||||
|
||||
.icon {
|
||||
margin-bottom: 1rem;
|
||||
line-height: 0;
|
||||
}
|
||||
|
||||
.button-container {
|
||||
display: flex;
|
||||
justify-content: flex-end;
|
||||
gap: 10px;
|
||||
margin-top: 2rem;
|
||||
}
|
||||
|
||||
button {
|
||||
background-color: light-dark(#fff, #323232);
|
||||
color: light-dark(#2B2D31, #FCFCFC);
|
||||
border: 1px solid light-dark(#E2E3E4, #3E3E3E);
|
||||
border-radius: 12px;
|
||||
padding: 8px 12px;
|
||||
font-size: 14px;
|
||||
line-height: 21px;
|
||||
cursor: pointer;
|
||||
transition: background-color 0.2s;
|
||||
font-weight: 400;
|
||||
font-family: 'Inter', Helvetica, Arial, sans-serif;
|
||||
width: 100%;
|
||||
}
|
||||
|
||||
button:hover {
|
||||
background-color: light-dark(#EAEAEB, #424242);
|
||||
}
|
||||
|
||||
.hidden {
|
||||
display: none;
|
||||
}
|
||||
|
||||
/* Loading Spinner Animation */
|
||||
.spinner {
|
||||
margin: 0 auto 1.5rem auto;
|
||||
width: 40px;
|
||||
height: 40px;
|
||||
border: 4px solid light-dark(#f0f0f0, #262626);
|
||||
border-top: 4px solid light-dark(#076eff, #87a9ff); /* Blue color */
|
||||
border-radius: 50%;
|
||||
animation: spin 1s linear infinite;
|
||||
}
|
||||
|
||||
.logo {
|
||||
border-radius: 10px;
|
||||
display: block;
|
||||
margin: 0 auto 2rem auto;
|
||||
}
|
||||
|
||||
.logo.hidden {
|
||||
display: none;
|
||||
}
|
||||
|
||||
@keyframes spin {
|
||||
0% {
|
||||
transform: rotate(0deg);
|
||||
}
|
||||
100% {
|
||||
transform: rotate(360deg);
|
||||
}
|
||||
}
|
||||
</style>
|
||||
</head>
|
||||
<body>
|
||||
<div class="container">
|
||||
<img
|
||||
class="logo"
|
||||
src="https://www.gstatic.com/aistudio/ai_studio_favicon_2_256x256.png"
|
||||
alt="AI Studio Logo"
|
||||
width="256"
|
||||
height="256"
|
||||
/>
|
||||
<div class="spinner"></div>
|
||||
<div id="error-ui" class="hidden">
|
||||
<div class="icon">
|
||||
<svg
|
||||
version="1.1"
|
||||
xmlns="http://www.w3.org/2000/svg"
|
||||
viewBox="0 0 24 24"
|
||||
width="48px"
|
||||
height="48px"
|
||||
fill="#D73A49"
|
||||
>
|
||||
<path
|
||||
d="M12,2C6.486,2,2,6.486,2,12s4.486,10,10,10s10-4.486,10-10S17.514,2,12,2z M13,17h-2v-2h2V17z M13,13h-2V7h2V13z"
|
||||
/>
|
||||
</svg>
|
||||
</div>
|
||||
<div id="stepOne" class="text-container">
|
||||
<h1>Action required to load your app</h1>
|
||||
<p>
|
||||
It looks like your browser is blocking a required security cookie, which is common on
|
||||
older versions of iOS and Safari.
|
||||
</p>
|
||||
<div class="button-container">
|
||||
<button id="authInSeparateWindowButton" onclick="redirectToReturnUrl(true)">Authenticate in new window</button>
|
||||
</div>
|
||||
</div>
|
||||
<div id="stepTwo" class="text-container hidden">
|
||||
<h1>Action required to load your app</h1>
|
||||
<p>
|
||||
It looks like your browser is blocking a required security cookie, which is common on
|
||||
older versions of iOS and Safari.
|
||||
</p>
|
||||
<div class="button-container">
|
||||
<button id="interactButton" onclick="redirectToReturnUrl(false)">Close and continue</button>
|
||||
</div>
|
||||
</div>
|
||||
<div id="stepThree" class="text-container hidden">
|
||||
<h1>Almost there!</h1>
|
||||
<p>
|
||||
Grant permission for the required security cookie below.
|
||||
</p>
|
||||
<div class="button-container">
|
||||
<button id="grantPermissionButton" onclick="grantStorageAccess()">Grant permission</button>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<script>
|
||||
const AUTH_FLOW_TEST_COOKIE_NAME = '__SECURE-aistudio_auth_flow_may_set_cookies';
|
||||
const COOKIE_VALUE = 'true';
|
||||
|
||||
function getCookie(name) {
|
||||
const cookies = document.cookie.split(';');
|
||||
for (let i = 0; i < cookies.length; i++) {
|
||||
let cookie = cookies[i].trim();
|
||||
if (cookie.startsWith(name + '=')) {
|
||||
return cookie.substring(name.length + 1);
|
||||
}
|
||||
}
|
||||
return null;
|
||||
}
|
||||
|
||||
function setAuthFlowTestCookie() {
|
||||
// Set the cookie's TTL to 1 minute. This is a short lived cookie because it is only used
|
||||
// when the user does not have an auth token or their auth token needs to be reset.
|
||||
// Making this cookie too long-lived allows the user to get into a state where they can't
|
||||
// mint a new auth token.
|
||||
document.cookie = `${AUTH_FLOW_TEST_COOKIE_NAME}=${COOKIE_VALUE}; Path=/; Secure; SameSite=None; Domain=${window.location.hostname}; Partitioned; Max-Age=60;`;
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns true if the test cookie is set, false otherwise.
|
||||
*/
|
||||
function authFlowTestCookieIsSet() {
|
||||
return getCookie(AUTH_FLOW_TEST_COOKIE_NAME) === COOKIE_VALUE;
|
||||
}
|
||||
|
||||
/**
|
||||
* Redirects to the return url. If autoClose is true, then the return url will be opened in a
|
||||
* new window, and it will be closed automatically when the page loads.
|
||||
*/
|
||||
async function redirectToReturnUrl(autoClose) {
|
||||
const initialReturnUrlStr = new URLSearchParams(window.location.search).get('return_url');
|
||||
const returnUrl = initialReturnUrlStr ? new URL(initialReturnUrlStr) : null;
|
||||
|
||||
// Prevent potentially malicious URLs from being used
|
||||
if (returnUrl.protocol.toLowerCase() === 'javascript:') {
|
||||
console.error('Potentially malicious return URL blocked');
|
||||
return;
|
||||
}
|
||||
|
||||
if (autoClose) {
|
||||
returnUrl.searchParams.set('__auto_close', '1');
|
||||
const url = new URL(window.location.href);
|
||||
url.searchParams.set('return_url', returnUrl.toString());
|
||||
// Land on the cookie check page first, so the user can interact with it before proceeding
|
||||
// to the return url where cookies can be set.
|
||||
window.open(url.toString(), '_blank');
|
||||
const hasAccess = await document.hasStorageAccess();
|
||||
document.querySelector('#stepOne').classList.add('hidden');
|
||||
if (!hasAccess) {
|
||||
document.querySelector('#stepThree').classList.remove('hidden');
|
||||
} else {
|
||||
window.location.reload();
|
||||
}
|
||||
} else {
|
||||
window.location.href = returnUrl.toString();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Grants the browser permission to set cookies. If successful, then it redirects to the
|
||||
* return url.
|
||||
*/
|
||||
async function grantStorageAccess() {
|
||||
try {
|
||||
await document.requestStorageAccess();
|
||||
redirectToReturnUrl(false);
|
||||
} catch (err) {
|
||||
console.log('error after button click: ', err);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies that the browser can set cookies. If it can, then it redirects to the return url.
|
||||
* If it can't, then it shows the error UI.
|
||||
*/
|
||||
function verifyCanSetCookies() {
|
||||
setAuthFlowTestCookie();
|
||||
if (authFlowTestCookieIsSet()) {
|
||||
// Check if we are on the auto-close flow, and if so show the interact button.
|
||||
const returnUrl = new URLSearchParams(window.location.search).get('return_url');
|
||||
const autoClose = new URL(returnUrl).searchParams.has('__auto_close');
|
||||
if (autoClose) {
|
||||
document.querySelector('#stepOne').classList.add('hidden');
|
||||
document.querySelector('#stepTwo').classList.remove('hidden');
|
||||
} else {
|
||||
redirectToReturnUrl(false);
|
||||
return;
|
||||
}
|
||||
}
|
||||
// The cookie could not be set, so initiate the recovery flow.
|
||||
document.querySelector('.logo').classList.add('hidden');
|
||||
document.querySelector('.spinner').classList.add('hidden');
|
||||
document.querySelector('#error-ui').classList.remove('hidden');
|
||||
}
|
||||
|
||||
// Start the cookie verification process.
|
||||
verifyCanSetCookies();
|
||||
</script>
|
||||
</body>
|
||||
</html>
|
||||
@@ -12,19 +12,16 @@ async def broadcast_handler(websocket):
|
||||
try:
|
||||
async for message in websocket:
|
||||
# Broadcast to all OTHER clients
|
||||
disconnected = set()
|
||||
for client in clients:
|
||||
if client != websocket:
|
||||
try:
|
||||
await client.send(message)
|
||||
except Exception as e:
|
||||
logging.error(f"Failed to send to a client: {e}")
|
||||
disconnected.add(client)
|
||||
clients.difference_update(disconnected)
|
||||
except websockets.exceptions.ConnectionClosed:
|
||||
pass
|
||||
finally:
|
||||
clients.discard(websocket) # discard is safe if not present
|
||||
clients.remove(websocket)
|
||||
logging.info(f"Client disconnected. Total clients: {len(clients)}")
|
||||
|
||||
async def main():
|
||||
|
||||
@@ -1,111 +0,0 @@
|
||||
"""Tests for syntax and correctness fixes across the-nexus codebase.
|
||||
|
||||
Covers:
|
||||
- nexus_think.py: no stray dots (SyntaxError), no typos in argparse
|
||||
- groq_worker.py: model name has no 'groq/' prefix
|
||||
- server.py: uses discard() not remove() for client cleanup
|
||||
- public/nexus/: corrupt duplicate directory removed
|
||||
"""
|
||||
|
||||
import ast
|
||||
from pathlib import Path
|
||||
|
||||
|
||||
NEXUS_ROOT = Path(__file__).resolve().parent.parent
|
||||
|
||||
|
||||
# ── nexus_think.py syntax checks ────────────────────────────────────
|
||||
|
||||
def test_nexus_think_parses_without_syntax_error():
|
||||
"""nexus_think.py must be valid Python.
|
||||
|
||||
Two SyntaxErrors existed:
|
||||
1. Line 318: stray '.' between function call and if-block
|
||||
2. Line 445: 'parser.add_.argument()' (extra underscore)
|
||||
|
||||
If either is present, the entire consciousness loop can't import.
|
||||
"""
|
||||
source = (NEXUS_ROOT / "nexus" / "nexus_think.py").read_text()
|
||||
# ast.parse will raise SyntaxError if the file is invalid
|
||||
try:
|
||||
ast.parse(source, filename="nexus_think.py")
|
||||
except SyntaxError as e:
|
||||
raise AssertionError(
|
||||
f"nexus_think.py has a SyntaxError at line {e.lineno}: {e.msg}"
|
||||
) from e
|
||||
|
||||
|
||||
def test_nexus_think_no_stray_dot():
|
||||
"""There should be no line that is just a dot in nexus_think.py."""
|
||||
source = (NEXUS_ROOT / "nexus" / "nexus_think.py").read_text()
|
||||
for i, line in enumerate(source.splitlines(), 1):
|
||||
stripped = line.strip()
|
||||
if stripped == ".":
|
||||
raise AssertionError(
|
||||
f"nexus_think.py has a stray '.' on line {i}. "
|
||||
"This causes a SyntaxError."
|
||||
)
|
||||
|
||||
|
||||
def test_nexus_think_argparse_no_typo():
|
||||
"""parser.add_argument must not be written as parser.add_.argument."""
|
||||
source = (NEXUS_ROOT / "nexus" / "nexus_think.py").read_text()
|
||||
assert "add_.argument" not in source, (
|
||||
"nexus_think.py contains 'add_.argument' — should be 'add_argument'."
|
||||
)
|
||||
|
||||
|
||||
# ── groq_worker.py model name ───────────────────────────────────────
|
||||
|
||||
def test_groq_default_model_has_no_prefix():
|
||||
"""Groq API expects model names without router prefixes.
|
||||
|
||||
Sending 'groq/llama3-8b-8192' returns a 404.
|
||||
The correct name is just 'llama3-8b-8192'.
|
||||
"""
|
||||
source = (NEXUS_ROOT / "nexus" / "groq_worker.py").read_text()
|
||||
for line in source.splitlines():
|
||||
stripped = line.strip()
|
||||
if stripped.startswith("DEFAULT_MODEL") and "=" in stripped:
|
||||
assert "groq/" not in stripped, (
|
||||
f"groq_worker.py DEFAULT_MODEL contains 'groq/' prefix: {stripped}. "
|
||||
"The Groq API expects bare model names like 'llama3-8b-8192'."
|
||||
)
|
||||
break
|
||||
else:
|
||||
# DEFAULT_MODEL not found — that's a different issue, not this test's concern
|
||||
pass
|
||||
|
||||
|
||||
# ── server.py client cleanup ────────────────────────────────────────
|
||||
|
||||
def test_server_uses_discard_not_remove():
|
||||
"""server.py must use clients.discard() not clients.remove().
|
||||
|
||||
remove() raises KeyError if the websocket isn't in the set.
|
||||
This happens if an exception occurs before clients.add() runs.
|
||||
discard() is a safe no-op if the element isn't present.
|
||||
"""
|
||||
source = (NEXUS_ROOT / "server.py").read_text()
|
||||
assert "clients.discard(" in source, (
|
||||
"server.py should use clients.discard(websocket) for safe cleanup."
|
||||
)
|
||||
assert "clients.remove(" not in source, (
|
||||
"server.py should NOT use clients.remove(websocket) — "
|
||||
"raises KeyError if websocket wasn't added."
|
||||
)
|
||||
|
||||
|
||||
# ── public/nexus/ corrupt duplicate directory ────────────────────────
|
||||
|
||||
def test_public_nexus_duplicate_removed():
|
||||
"""public/nexus/ contained 3 files with identical content (all 9544 bytes).
|
||||
|
||||
app.js, style.css, and index.html were all the same file — clearly a
|
||||
corrupt copy operation. The canonical files are at the repo root.
|
||||
"""
|
||||
corrupt_dir = NEXUS_ROOT / "public" / "nexus"
|
||||
assert not corrupt_dir.exists(), (
|
||||
"public/nexus/ still exists. These are corrupt duplicates "
|
||||
"(all 3 files have identical content). Remove this directory."
|
||||
)
|
||||
Reference in New Issue
Block a user