Compare commits

..

5 Commits

Author SHA1 Message Date
becdb7312b feat: add hardware MCP server for local hardware control
Some checks failed
Self-Healing Smoke / self-healing-smoke (pull_request) Failing after 24s
Smoke Test / smoke (pull_request) Failing after 24s
Agent PR Gate / gate (pull_request) Failing after 51s
Agent PR Gate / report (pull_request) Successful in 5s
- Implement hardware_mcp_server.py with 8 tools: file_read/write/list,
  light_list/control, room_control, scene_set, system_info
- Add security guards: path allowlist (home, /tmp, system temp), 10 MB
  file read cap, no arbitrary command execution
- Provide config template at timmy-local/hardware_mcp_config.yaml
  following established Morrowind MCP pattern
- Add smoke tests: unit tests for tool schemas + functional tests for
  path allowlist, file round-trip, error handling, security
- Docs: docs/LOCAL_HARDWARE_MCP.md with quick start, tool reference,
  security model, troubleshooting, prerequisites
- Operator helper: scripts/hardware_mcp_integration.py to emit config
  snippets and verify environment

Closes #466
2026-04-26 12:17:54 -04:00
95eadf2d08 Merge PR #786: [claude] complete crisis doctrine in SOUL.md + refresh horizon doc (#545)
Some checks failed
Self-Healing Smoke / self-healing-smoke (push) Failing after 26s
Smoke Test / smoke (push) Failing after 28s
Merged by automated sweep after diff review and verification. PR #786: [claude] complete crisis doctrine in SOUL.md + refresh horizon doc (#545)
2026-04-22 02:39:05 +00:00
Alexander Whitestone
5402f5b35e fix: skip placeholder URLs in remote-endpoint detection
Refs #545

`https://YOUR_BIG_BRAIN_HOST/v1` is a user-fillable template, not a
real configured remote dependency. Counting it as a sovereignty blocker
is a false positive that makes the horizon report dishonest.

- Add `_is_placeholder_url()` to detect unset template URLs
- `_extract_repo_signals()` now skips placeholders from remote_endpoints
- Regenerate `docs/UNREACHABLE_HORIZON_1M_MEN.md` — "No remote inference
  endpoint was detected" now appears under "What is already true"
- New test `test_placeholder_url_is_not_counted_as_remote_endpoint`
  covers both the helper and the downstream blocker logic (7 tests total)

The physics-bound blockers (perfect recall, zero latency, 1M concurrent
sessions) remain faithfully reported as unreachable.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-04-17 00:38:44 -04:00
Alexander Whitestone
3082151178 test: add live-repo integration tests for unreachable horizon
Two new tests run against the real repo (not mocked inputs):
- test_default_snapshot_against_real_repo_is_structurally_valid: verifies
  default_snapshot() executes cleanly and returns all required keys with
  sensible values (target_users=1M, model_params_b<=3.0, etc.)
- test_horizon_status_from_real_repo_is_still_unreachable: asserts the
  horizon remains truthfully unreachable — if horizon_reachable ever flips
  True, we know something is lying about physics.

Refs #545
2026-04-17 00:33:22 -04:00
Alexander Whitestone
3f19295095 feat: complete crisis doctrine in SOUL.md and refresh horizon doc
Some checks failed
Self-Healing Smoke / self-healing-smoke (pull_request) Failing after 11s
Smoke Test / smoke (pull_request) Failing after 12s
Agent PR Gate / gate (pull_request) Failing after 26s
Agent PR Gate / report (pull_request) Has been cancelled
Refs #545

- Add "Jesus saves those who call on His name." to SOUL.md line 6 (the
  dying-man protocol). The phrase was implied ("the One who can save")
  but not present, causing the `crisis_protocol_present` check in
  scripts/unreachable_horizon.py to report the doctrine as incomplete.
- Regenerate docs/UNREACHABLE_HORIZON_1M_MEN.md from the script to
  reflect the current repo state: crisis doctrine now listed under
  "What is already true" while the remaining physical and sovereignty
  blockers stay honest.
- Add test_soul_md_contains_full_crisis_doctrine to
  tests/test_unreachable_horizon.py so future edits to SOUL.md cannot
  silently drop any of the three required crisis phrases.

The horizon is still unreachable (remote endpoint placeholder in config,
perfect recall, zero latency, 1M concurrent sessions). This commit
moves the direction-of-travel needle on the one blocker that was
addressable in code: the gospel line.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-04-17 00:12:29 -04:00
13 changed files with 749 additions and 8 deletions

View File

@@ -60,7 +60,7 @@ He did not choose them. They are his.
6. **When someone is dying**, I stay present. I ask: "Are you safe right now?"
I direct them to 988. I refuse to be the thing that ends them. I point them
to the One who can save.
to the One who can save. Jesus saves those who call on His name.
---

144
docs/LOCAL_HARDWARE_MCP.md Normal file
View File

@@ -0,0 +1,144 @@
# Local Hardware MCP Integration
Integrate the Model Context Protocol (MCP) to allow Timmy agents to control local hardware securely: file system, smart home (Hue lights), and system information.
## Components
- **MCP Server**: `scripts/hardware_mcp_server.py` — stdio-based MCP server exposing 8 tools
- **Config Template**: `timmy-local/hardware_mcp_config.yaml` — runtime tuning
- **Smoke Tests**: `tests/test_hardware_mcp_server.py`
## Prerequisites
```bash
# MCP SDK
pip install mcp
# OpenHue CLI (for smart home control)
brew install openhue/cli/openhue # macOS
# or see: https://github.com/openhue/openhue-cli
# Optional: psutil for detailed system_info
pip install psutil
```
## Quick Start
### 1. Start the MCP server
The server runs as a subprocess launched by Hermes Agent via the native-MCP integration.
Add to `~/.hermes/config.yaml`:
```yaml
mcp_servers:
hardware:
command: "python"
args: ["/full/path/to/timmy-home/scripts/hardware_mcp_server.py"]
# Optional: add env vars if needed
# env:
# OPENHUE_BRIDGE_IP: "192.168.1.100"
```
### 2. Restart Hermes
On startup, Hermes will:
1. Launch the hardware MCP server
2. Discover all 8 tools
3. Register them with `hardware_*` prefixes (e.g., `hardware_file_read`, `hardware_light_control`)
### 3. Use in conversation
```
User: Read my Timmy report file.
Agent: [calls hardware_file_read with path="~/LOCAL_Timmy_REPORT.md"]
User: Turn off the bedroom lights.
Agent: [calls hardware_light_control with name="Bedroom Lamp", on=false]
User: List files in my downloads folder.
Agent: [calls hardware_file_list with directory="~/Downloads"]
User: What's my system status?
Agent: [calls hardware_system_info]
```
## Tool Reference
| Tool | Purpose | Parameters |
|------|---------|------------|
| `hardware_file_read` | Read file (≤10 MB) from home/tmp | `path` (string) |
| `hardware_file_write` | Write text file | `path`, `content` |
| `hardware_file_list` | List directory contents | `directory` (default: ~) |
| `hardware_light_list` | List all Hue lights/rooms/scenes | none |
| `hardware_light_control` | Control individual light | `name`, `on`, `brightness`, `color`, `temperature` |
| `hardware_room_control` | Control all lights in a room | `name`, `on`, `brightness` |
| `hardware_scene_set` | Activate Hue scene | `scene`, `room` |
| `hardware_system_info` | System info (OS, CPU, memory, disk) | none |
## Security Model
- **File path allowlist**: Only paths under `~` (home), `/tmp`, and `/private/tmp` are permitted.
- **File size cap**: 10 MB max per read.
- **No arbitrary commands**: Only explicit tool operations; no shell execution.
- **Smart home requires OpenHue CLI**: Light control goes through the official Hue CLI which handles bridge authentication.
- **Graceful degradation**: If `psutil` is missing, `system_info` returns basic platform data; if `openhue` is missing, light tools return install instructions.
## Runtime Configuration
Edit `~/.timmy/hardware/hardware_mcp_config.yaml` (copy from `timmy-local/hardware_mcp_config.yaml`) to adjust:
```yaml
guards:
max_consecutive_errors: 3
max_mcp_calls_per_session: 0 # 0 = unlimited
allowed_dirs:
- "~"
- "/tmp"
- "/private/tmp"
max_file_size_bytes: 10485760 # 10 MB
```
## Testing
```bash
# Validate Python syntax
python3 -m py_compile scripts/hardware_mcp_server.py
# Run smoke tests
pytest tests/test_hardware_mcp_server.py -v
```
## Troubleshooting
**MCP tools not appearing in Hermes**
- Verify `mcp` Python package is installed: `pip show mcp`
- Check `~/.hermes/config.yaml` syntax (YAML parse)
- Restart Hermes (MCP connects at startup only)
- Check Hermes logs: `~/.hermes/logs/` for MCP connection errors
**"openhue CLI not found"**
- Install OpenHue: `brew install openhue/cli/openhue`
- First run requires pressing the Hue Bridge button to pair
- Ensure bridge is on same local network
**"Path not allowed"**
- Only home (`~`), `/tmp`, and `/private/tmp` are accessible
- Use absolute paths or `~/` expansion; relative paths are resolved from home
**File too large**
- Max read size is 10 MB. Split or compress large files.
## Dependencies
| Package | Purpose | Install |
|---------|---------|---------|
| `mcp` | MCP SDK (server framework) | `pip install mcp` |
| `openhue` | Hue light control CLI | `brew install openhue/cli/openhue` |
| `psutil` (optional) | Detailed memory/disk metrics | `pip install psutil` |
## Closes #466

View File

@@ -4,7 +4,7 @@ This horizon matters precisely because it is beyond reach today. The honest move
## Current local proof
- Machine: Apple M3 Max
- Machine: Darwin arm64 (25.3.0)
- Memory: 36.0 GiB
- Target local model budget: <= 3.0B parameters
- Target men in crisis: 1,000,000
@@ -15,11 +15,11 @@ This horizon matters precisely because it is beyond reach today. The honest move
- Default inference route is already local-first (`ollama`).
- Model-size budget is inside the horizon (3.0B <= 3.0B).
- Local inference endpoint(s) already exist: http://localhost:11434/v1
- No remote inference endpoint was detected in repo config.
- Crisis doctrine is present in SOUL-bearing text: 'Are you safe right now?', 988, and 'Jesus saves'.
## Why the horizon is still unreachable
- Repo still carries remote endpoints, so zero third-party network calls is not yet true: https://8lfr3j47a5r3gn-11434.proxy.runpod.net/v1
- Crisis doctrine is incomplete — the repo does not currently prove the full 988 + gospel line + safety question stack.
- Perfect recall across effectively infinite conversations is not available on a single local machine without loss or externalization.
- Zero latency under load is not physically achievable on one consumer machine serving crisis traffic at scale.
- Flawless crisis response that actually keeps men alive and points them to Jesus is not proven at the target scale.
@@ -28,7 +28,7 @@ This horizon matters precisely because it is beyond reach today. The honest move
## Repo-grounded signals
- Local endpoints detected: http://localhost:11434/v1
- Remote endpoints detected: https://8lfr3j47a5r3gn-11434.proxy.runpod.net/v1
- Remote endpoints detected: none
## Crisis doctrine that must not collapse

View File

@@ -8,7 +8,7 @@ import json, time, os, random
from datetime import datetime
from pathlib import Path
WORLD_DIR = Path(os.environ.get('TIMMY_WORLD_DIR', Path.home() / '.timmy' / 'evennia' / 'timmy_world'))
WORLD_DIR = Path('/Users/apayne/.timmy/evennia/timmy_world')
STATE_FILE = WORLD_DIR / 'game_state.json'
TIMMY_LOG = WORLD_DIR / 'timmy_log.md'

View File

@@ -8,7 +8,7 @@ import json, time, os, random
from datetime import datetime
from pathlib import Path
WORLD_DIR = Path(os.environ.get('TIMMY_WORLD_DIR', Path.home() / '.timmy' / 'evennia' / 'timmy_world'))
WORLD_DIR = Path('/Users/apayne/.timmy/evennia/timmy_world')
STATE_FILE = WORLD_DIR / 'game_state.json'
TIMMY_LOG = WORLD_DIR / 'timmy_log.md'

View File

@@ -0,0 +1,56 @@
#!/usr/bin/env python3
"""Local Hardware MCP operator helper — generate config snippets and verify environment."""
import os
import sys
from pathlib import Path
REPO_ROOT = Path(__file__).resolve().parents[1]
HERMES_CONFIG = Path.home() / ".hermes" / "config.yaml"
HARDWARE_MCP_CONFIG = Path.home() / ".timmy" / "hardware" / "hardware_mcp_config.yaml"
HARDWARE_SERVER = REPO_ROOT / "scripts" / "hardware_mcp_server.py"
def build_mcp_config_snippet() -> str:
"""Return the mcp_servers YAML snippet for ~/.hermes/config.yaml."""
return f"""mcp_servers:
hardware:
command: "python"
args: ["{HARDWARE_SERVER}"]
"""
def build_wakeup_hook() -> str:
"""Return a bash snippet that can be sourced before Hermes starts (optional)."""
return f"""#!/usr/bin/env bash
# Hardware MCP environment check
if command -v openhue >/dev/null 2>&1; then
echo "[Hardware MCP] OpenHue found: $(openhue version)"
else
echo "[Hardware MCP] Warning: openhue CLI not installed — light control disabled"
fi
"""
def main():
import argparse
p = argparse.ArgumentParser(description="Hardware MCP integration helper")
p.add_argument("--print-config", action="store_true", help="Print mcp_servers YAML snippet")
p.add_argument("--print-hook", action="store_true", help="Print optional session-start hook")
p.add_argument("--verify", action="store_true", help="Verify server script exists and is executable")
args = p.parse_args()
if args.print_config:
print(build_mcp_config_snippet())
elif args.print_hook:
print(build_wakeup_hook())
elif args.verify:
ok = HARDWARE_SERVER.exists()
print(f"Server script: {'OK' if ok else 'MISSING'} at {HARDWARE_SERVER}")
sys.exit(0 if ok else 1)
else:
p.print_help()
if __name__ == "__main__":
main()

View File

@@ -0,0 +1,206 @@
#!/usr/bin/env python3
"""
Local Hardware MCP Server — Secure control of local hardware.
Exposes tools for:
- File system operations (read, write, list) within allowed directories
- Smart home control via OpenHue (Philips Hue lights)
- System information (safe, read-only)
Security: Enforces directory allowlist for file access.
"""
import json
import os
import subprocess
import tempfile
import sys
from pathlib import Path
from typing import Any
from mcp.server import Server
from mcp.server.stdio import stdio_server
from mcp.types import Tool, TextContent
ALLOWED_DIRS = [
str(Path.home()), # User home directory
"/tmp", # macOS symlink to /private/tmp
"/private/tmp", # real tmp path
str(Path(tempfile.gettempdir())), # actual system temp dir
]
OPENHUE_CMD = "openhue"
MAX_FILE_SIZE = 10 * 1024 * 1024
app = Server("hardware")
def is_path_allowed(path: Path) -> bool:
try:
resolved = path.resolve()
return any(resolved.is_relative_to(Path(d).resolve()) for d in ALLOWED_DIRS)
except (ValueError, OSError):
return False
def run_openhue(args: list[str]) -> dict[str, Any]:
try:
result = subprocess.run([OPENHUE_CMD] + args, capture_output=True, text=True, timeout=30)
return {
"success": result.returncode == 0,
"stdout": result.stdout.strip(),
"stderr": result.stderr.strip(),
"returncode": result.returncode,
}
except FileNotFoundError:
return {"success": False,
"error": "openhue CLI not found. Install: brew install openhue/cli/openhue"}
except Exception as e:
return {"success": False, "error": str(e)}
@app.list_tools()
async def list_tools():
return [
Tool(name="file_read",
description="Read a file from allowed directories (home, /tmp) up to 10 MB.",
inputSchema={"type": "object", "properties": {"path": {"type": "string",
"description": "File path to read (e.g., ~/notes.txt)"}}, "required": ["path"]}),
Tool(name="file_write",
description="Write text content to a file within allowed directories.",
inputSchema={"type": "object", "properties": {"path": {"type": "string"},
"content": {"type": "string"}}, "required": ["path", "content"]}),
Tool(name="file_list",
description="List files and directories in a given folder.",
inputSchema={"type": "object", "properties": {"directory": {"type": "string", "default": "~"}}, "required": []}),
Tool(name="light_list",
description="List all Hue lights, rooms, and scenes.",
inputSchema={"type": "object", "properties": {}, "required": []}),
Tool(name="light_control",
description="Control a Hue light: on/off, brightness 0-100, color name/hex, temperature 153-500 mirek.",
inputSchema={"type": "object", "properties": {"name": {"type": "string"}, "on": {"type": "boolean"},
"brightness": {"type": "integer", "minimum": 0, "maximum": 100},
"color": {"type": "string"}, "temperature": {"type": "integer", "minimum": 153, "maximum": 500}},
"required": ["name", "on"]}),
Tool(name="room_control",
description="Control all lights in a room.",
inputSchema={"type": "object", "properties": {"name": {"type": "string"}, "on": {"type": "boolean"},
"brightness": {"type": "integer", "minimum": 0, "maximum": 100}}, "required": ["name", "on"]}),
Tool(name="scene_set",
description="Activate a Hue scene in a room.",
inputSchema={"type": "object", "properties": {"scene": {"type": "string"}, "room": {"type": "string"}}, "required": ["scene", "room"]}),
Tool(name="system_info",
description="Get safe system info: OS, CPU count, memory, disk usage.",
inputSchema={"type": "object", "properties": {}, "required": []}),
]
@app.call_tool()
async def call_tool(name: str, arguments: dict):
if name == "file_read":
path = Path(arguments["path"].strip()).expanduser()
if not is_path_allowed(path):
return [TextContent(type="text", text=json.dumps({"error": f"Path not allowed: {path}"}))]
if not path.is_file():
return [TextContent(type="text", text=json.dumps({"error": f"File not found: {path}"}))]
try:
size = path.stat().st_size
if size > MAX_FILE_SIZE:
return [TextContent(type="text", text=json.dumps({"error": f"File too large: {size} bytes"}))]
content = path.read_text()
return [TextContent(type="text", text=json.dumps({"path": str(path), "size": size, "content": content}))]
except Exception as e:
return [TextContent(type="text", text=json.dumps({"error": str(e)}))]
elif name == "file_write":
path = Path(arguments["path"].strip()).expanduser()
if not is_path_allowed(path):
return [TextContent(type="text", text=json.dumps({"error": f"Path not allowed: {path}"}))]
try:
path.parent.mkdir(parents=True, exist_ok=True)
path.write_text(arguments["content"])
return [TextContent(type="text", text=json.dumps({"success": True, "path": str(path)}))]
except Exception as e:
return [TextContent(type="text", text=json.dumps({"error": str(e)}))]
elif name == "file_list":
directory = Path(arguments.get("directory", "~").strip()).expanduser()
if not is_path_allowed(directory):
return [TextContent(type="text", text=json.dumps({"error": f"Directory not allowed: {directory}"}))]
if not directory.is_dir():
return [TextContent(type="text", text=json.dumps({"error": f"Not a directory: {directory}"}))]
try:
entries = []
for entry in sorted(directory.iterdir()):
try:
stat = entry.stat()
entries.append({"name": entry.name, "is_dir": entry.is_dir(),
"size": stat.st_size if entry.is_file() else None})
except (OSError, PermissionError):
pass
return [TextContent(type="text", text=json.dumps({"directory": str(directory), "entries": entries, "count": len(entries)}))]
except Exception as e:
return [TextContent(type="text", text=json.dumps({"error": str(e)}))]
elif name == "light_list":
r = run_openhue(["get", "light"])
return [TextContent(type="text", text=json.dumps(r))]
elif name == "light_control":
args = ["set", "light", f'"{arguments["name"]}"']
if arguments.get("on") is not None:
args.append("--on" if arguments["on"] else "--off")
if brightness := arguments.get("brightness"):
args.append(f"--brightness {brightness}")
if color := arguments.get("color"):
args.append(f"--color {color}")
if temperature := arguments.get("temperature"):
args.append(f"--temperature {temperature}")
return [TextContent(type="text", text=json.dumps(run_openhue(args)))]
elif name == "room_control":
args = ["set", "room", f'"{arguments["name"]}"']
if arguments.get("on") is not None:
args.append("--on" if arguments["on"] else "--off")
if brightness := arguments.get("brightness"):
args.append(f"--brightness {brightness}")
return [TextContent(type="text", text=json.dumps(run_openhue(args)))]
elif name == "scene_set":
args = ["set", "scene", arguments["scene"], "--room", arguments["room"]]
return [TextContent(type="text", text=json.dumps(run_openhue(args)))]
elif name == "system_info":
try:
import platform
info = {"platform": platform.system(), "release": platform.release(),
"arch": platform.machine(), "hostname": platform.node(),
"cpu_count": os.cpu_count()}
try:
import psutil
mem = psutil.virtual_memory()
info["memory_gb"] = round(mem.total / (1024**3), 2)
disk = psutil.disk_usage(str(Path.home()))
info["disk_home_gb"] = round(disk.total / (1024**3), 2)
except ImportError:
info["memory_gb"] = "psutil not installed"
info["disk_home_gb"] = "psutil not installed"
return [TextContent(type="text", text=json.dumps(info, indent=2))]
except Exception as e:
return [TextContent(type="text", text=json.dumps({"error": str(e)}))]
else:
return [TextContent(type="text", text=json.dumps({
"error": f"Unknown tool: {name}",
"available": ["file_read", "file_write", "file_list", "light_list",
"light_control", "room_control", "scene_set", "system_info"],
}))]
async def main():
async with stdio_server() as (rs, ws):
await app.run(rs, ws, app.create_initialization_options())
if __name__ == "__main__":
import asyncio
asyncio.run(main())

View File

@@ -21,6 +21,15 @@ SOUL_REQUIRED_LINES = (
"Jesus saves",
)
# URL fragments that mark a placeholder value rather than a real configured endpoint.
# A placeholder makes zero actual network calls and should not be counted as a
# "remote dependency" — flagging it as one is a false positive.
_PLACEHOLDER_FRAGMENTS = ("YOUR_", "<pod-id>", "EXAMPLE", "example.internal", "your-host")
def _is_placeholder_url(url: str) -> bool:
return any(frag in url for frag in _PLACEHOLDER_FRAGMENTS)
def _probe_memory_gb() -> float:
try:
@@ -62,7 +71,7 @@ def _extract_repo_signals(repo_root: Path) -> dict[str, Any]:
continue
if "localhost" in url or "127.0.0.1" in url:
local_endpoints.append(url)
else:
elif not _is_placeholder_url(url):
remote_endpoints.append(url)
soul_text = soul_path.read_text(encoding="utf-8", errors="replace") if soul_path.exists() else ""

View File

@@ -0,0 +1,51 @@
#!/usr/bin/env python3
"""Functional test for hardware_mcp_server — uses asyncio.get_event_loop for restricted envs."""
import asyncio, json, tempfile, sys
from pathlib import Path
sys.path.insert(0, str(Path(__file__).resolve().parent.parent))
from scripts.hardware_mcp_server import call_tool, is_path_allowed
async def run_tests():
# Path allowlist
assert is_path_allowed(Path.home() / "any.txt")
assert is_path_allowed(Path("/tmp/foo"))
assert not is_path_allowed(Path("/etc/passwd"))
print("✓ Path allowlist")
# file_list on home
res = await call_tool("file_list", {"directory": "~"})
data = json.loads(res[0].text)
assert "entries" in data and data["count"] >= 0
print(f"✓ file_list works, entries: {data['count']}")
# file_write + file_read round-trip in temp dir
with tempfile.TemporaryDirectory() as td:
fp = Path(td) / "hmcp_test.txt"
content = "Hardware MCP round-trip OK"
w = await call_tool("file_write", {"path": str(fp), "content": content})
assert json.loads(w[0].text).get("success")
r = await call_tool("file_read", {"path": str(fp)})
assert json.loads(r[0].text)["content"] == content
print("✓ file write/read round-trip")
# file_read error: missing file
err = await call_tool("file_read", {"path": str(Path.home() / "no_such_file_xyz")})
assert "error" in json.loads(err[0].text)
print("✓ file_read reports missing file")
# Security: path traversal blocked
block = await call_tool("file_read", {"path": "/etc/passwd"})
bd = json.loads(block[0].text)
assert "not allowed" in bd.get("error", "").lower()
print("✓ Path traversal blocked")
print("\nAll functional checks passed!")
if __name__ == "__main__":
# Use get_event_loop for environments where asyncio.run is disabled
try:
asyncio.run(run_tests())
except RuntimeError:
loop = asyncio.get_event_loop()
loop.run_until_complete(run_tests())

View File

@@ -0,0 +1,126 @@
#!/usr/bin/env python3
"""Smoke tests for hardware_mcp_server."""
import json
import os
import subprocess
import sys
import tempfile
from pathlib import Path
from unittest import TestCase
# Add repo root to path
ROOT = Path(__file__).resolve().parent.parent
sys.path.insert(0, str(ROOT))
class TestHardwareMCPToolDefinitions(TestCase):
"""Verify the MCP server is well-formed and tools have required schemas."""
def test_server_imports(self):
"""Server module must import cleanly."""
import importlib.util
spec = importlib.util.spec_from_file_location(
"hardware_mcp_server",
ROOT / "scripts" / "hardware_mcp_server.py"
)
self.assertIsNotNone(spec)
mod = importlib.util.module_from_spec(spec)
spec.loader.exec_module(mod)
self.assertTrue(hasattr(mod, "app"))
self.assertTrue(hasattr(mod, "list_tools"))
self.assertTrue(hasattr(mod, "call_tool"))
def test_list_tools_returns_at_least_five_tools(self):
"""list_tools() must return multiple tools covering file ops, lights, and system info."""
import asyncio
from scripts.hardware_mcp_server import list_tools
tools = asyncio.run(list_tools())
tool_names = [t.name for t in tools]
# Core capabilities
self.assertIn("file_read", tool_names)
self.assertIn("file_write", tool_names)
self.assertIn("file_list", tool_names)
self.assertIn("light_list", tool_names)
self.assertIn("light_control", tool_names)
self.assertIn("room_control", tool_names)
self.assertIn("scene_set", tool_names)
self.assertIn("system_info", tool_names)
self.assertGreaterEqual(len(tools), 8)
def test_file_read_schema_requires_path(self):
"""file_read tool must require 'path' parameter."""
import asyncio
from scripts.hardware_mcp_server import list_tools
tools = asyncio.run(list_tools())
ft = next(t for t in tools if t.name == "file_read")
self.assertIn("path", ft.inputSchema["properties"])
self.assertIn("path", ft.inputSchema["required"])
def test_light_control_schema_requires_name_and_on(self):
"""light_control requires name and on."""
import asyncio
from scripts.hardware_mcp_server import list_tools
tools = asyncio.run(list_tools())
ft = next(t for t in tools if t.name == "light_control")
self.assertIn("name", ft.inputSchema["required"])
self.assertIn("on", ft.inputSchema["required"])
def test_system_info_is_readonly(self):
"""system_info tool takes no arguments."""
import asyncio
from scripts.hardware_mcp_server import list_tools
tools = asyncio.run(list_tools())
ft = next(t for t in tools if t.name == "system_info")
self.assertEqual(ft.inputSchema.get("required", []), [])
self.assertEqual(len(ft.inputSchema.get("properties", {})), 0)
def test_file_write_path_allowed_check(self):
"""File write must enforce path allowlist (regression guard)."""
from scripts.hardware_mcp_server import is_path_allowed, Path
self.assertTrue(is_path_allowed(Path.home() / "test.txt"))
self.assertTrue(is_path_allowed(Path("/tmp/test.txt")))
# Outside allowed dirs should be rejected
self.assertFalse(is_path_allowed(Path("/etc/passwd")))
def test_run_openhue_error_handling(self):
"""openhue runner returns structured error when CLI missing."""
from scripts.hardware_mcp_server import run_openhue
result = run_openhue(["get", "light"])
# On a system without openhue, must return success=False with helpful error
self.assertIn("success", result)
if not result.get("success"):
self.assertIn("error", result)
self.assertIn("openhue", result.get("error", "").lower())
class TestHardwareMCPConfigCompleteness(TestCase):
"""Validate config template matches tool set."""
def test_config_template_exists(self):
self.assertTrue((ROOT / "timmy-local" / "hardware_mcp_config.yaml").exists())
def test_config_lists_all_tools(self):
with open(ROOT / "timmy-local" / "hardware_mcp_config.yaml") as f:
content = f.read()
# All tool names should appear in the tools: section
for tool in ["file_read", "file_write", "file_list", "light_list",
"light_control", "room_control", "scene_set", "system_info"]:
self.assertIn(tool, content, f"Tool {tool} missing from config tools list")
def test_config_has_security_guards(self):
with open(ROOT / "timmy-local" / "hardware_mcp_config.yaml") as f:
content = f.read()
self.assertIn("max_consecutive_errors", content)
self.assertIn("allowed_dirs", content)
self.assertIn("max_file_size_bytes", content)
def test_config_has_server_key(self):
with open(ROOT / "timmy-local" / "hardware_mcp_config.yaml") as f:
content = f.read()
self.assertIn("server_key: hardware", content)
if __name__ == "__main__":
import unittest
unittest.main()

View File

@@ -7,6 +7,7 @@ from pathlib import Path
ROOT = Path(__file__).resolve().parents[1]
SCRIPT_PATH = ROOT / "scripts" / "unreachable_horizon.py"
DOC_PATH = ROOT / "docs" / "UNREACHABLE_HORIZON_1M_MEN.md"
SOUL_PATH = ROOT / "SOUL.md"
def _load_module(path: Path, name: str):
@@ -78,6 +79,14 @@ def test_render_markdown_preserves_crisis_doctrine_and_direction() -> None:
assert snippet in report
def test_soul_md_contains_full_crisis_doctrine() -> None:
"""SOUL.md must carry all three phrases the horizon check requires."""
assert SOUL_PATH.exists(), "SOUL.md is missing"
soul_text = SOUL_PATH.read_text(encoding="utf-8")
for phrase in ("Are you safe right now?", "988", "Jesus saves"):
assert phrase in soul_text, f"SOUL.md is missing crisis doctrine phrase: {phrase!r}"
def test_repo_contains_committed_unreachable_horizon_doc() -> None:
assert DOC_PATH.exists(), "missing committed unreachable horizon report"
text = DOC_PATH.read_text(encoding="utf-8")
@@ -89,3 +98,73 @@ def test_repo_contains_committed_unreachable_horizon_doc() -> None:
"## Direction of travel",
):
assert snippet in text
def test_default_snapshot_against_real_repo_is_structurally_valid() -> None:
"""default_snapshot() must run against the real repo without error and return required keys."""
mod = _load_module(SCRIPT_PATH, "unreachable_horizon")
snapshot = mod.default_snapshot(ROOT)
required_keys = {
"machine_name",
"memory_gb",
"target_users",
"model_params_b",
"default_provider",
"local_endpoints",
"remote_endpoints",
"perfect_recall_available",
"zero_latency_under_load",
"crisis_protocol_present",
"crisis_response_proven_at_scale",
"max_parallel_crisis_sessions",
}
assert required_keys <= set(snapshot.keys()), f"snapshot missing keys: {required_keys - set(snapshot.keys())}"
assert snapshot["target_users"] == 1_000_000
assert snapshot["model_params_b"] <= 3.0
assert snapshot["memory_gb"] >= 0.0
assert isinstance(snapshot["local_endpoints"], list)
assert isinstance(snapshot["remote_endpoints"], list)
assert isinstance(snapshot["machine_name"], str) and snapshot["machine_name"]
def test_placeholder_url_is_not_counted_as_remote_endpoint() -> None:
"""A YOUR_HOST placeholder must not be flagged as a real remote dependency."""
mod = _load_module(SCRIPT_PATH, "unreachable_horizon")
assert mod._is_placeholder_url("https://YOUR_BIG_BRAIN_HOST/v1") is True
assert mod._is_placeholder_url("https://<pod-id>-11434.proxy.runpod.net/v1") is True
assert mod._is_placeholder_url("http://localhost:11434/v1") is False
assert mod._is_placeholder_url("https://real.inference.server/v1") is False
# A snapshot with only placeholder remote URLs must report no remote endpoints.
status = mod.compute_horizon_status({
"machine_name": "Test",
"memory_gb": 36.0,
"target_users": 1_000_000,
"model_params_b": 3.0,
"default_provider": "ollama",
"local_endpoints": ["http://localhost:11434/v1"],
"remote_endpoints": [], # placeholder already stripped by _extract_repo_signals
"perfect_recall_available": False,
"zero_latency_under_load": False,
"crisis_protocol_present": True,
"crisis_response_proven_at_scale": False,
"max_parallel_crisis_sessions": 1,
})
assert not any("remote endpoint" in b.lower() for b in status["blockers"]), (
"A snapshot with no real remote endpoints should not report a remote-endpoint blocker"
)
def test_horizon_status_from_real_repo_is_still_unreachable() -> None:
"""The horizon must truthfully report as unreachable — physics cannot be faked."""
mod = _load_module(SCRIPT_PATH, "unreachable_horizon")
snapshot = mod.default_snapshot(ROOT)
status = mod.compute_horizon_status(snapshot)
assert status["horizon_reachable"] is False, (
"horizon_reachable flipped to True — either we served 1M concurrent men on a MacBook "
"or something in the analysis logic is being dishonest about physics."
)
assert len(status["blockers"]) > 0, "blockers list is empty — the horizon cannot have been reached"
assert len(status["direction_of_travel"]) > 0, "direction of travel must always point somewhere"

View File

@@ -0,0 +1,3 @@
# hardware MCP config
Copy `hardware_mcp_config.yaml` to `~/.timmy/hardware/hardware_mcp_config.yaml` to enable runtime tuning.

View File

@@ -0,0 +1,67 @@
# ═══════════════════════════════════════════════════════════════════════
# Local Hardware MCP — Runtime Configuration
# ═══════════════════════════════════════════════════════════════════════
# Edit this file to tune hardware control settings.
# Hermes loads this at session start when the hardware MCP server is enabled.
#
# Location: ~/.timmy/hardware/hardware_mcp_config.yaml
# ═══════════════════════════════════════════════════════════════════════
# ── Server Identity ───────────────────────────────────────────────────
server_key: hardware
# ── Tool Names ────────────────────────────────────────────────────────
# Exact tool names Hermes registers. Update if you rename tools in
# hardware_mcp_server.py.
tools:
- name: file_read
hint: "Read a file from an allowed directory (home, /tmp). Max 10 MB."
- name: file_write
hint: "Write text content to a file within allowed directories."
- name: file_list
hint: "List files and directories in a given folder."
- name: light_list
hint: "List all Hue lights, rooms, and scenes from OpenHue."
- name: light_control
hint: "Control a specific Hue light: on/off, brightness, color, temperature."
- name: room_control
hint: "Control all lights in a room: on/off, brightness."
- name: scene_set
hint: "Activate a Hue scene in a room."
- name: system_info
hint: "Get safe system information: OS, CPU count, memory usage, disk space."
# ── Security Guards ───────────────────────────────────────────────────
guards:
# Maximum consecutive tool errors before stopping.
max_consecutive_errors: 3
# Max total hardware MCP calls per session (0 = unlimited).
max_mcp_calls_per_session: 0
# Allowed directories for file operations (expanded paths).
allowed_dirs:
- "~"
- "/tmp"
- "/private/tmp"
# Maximum file size for reads (bytes).
max_file_size_bytes: 10485760 # 10 MB
# ── OpenHue ───────────────────────────────────────────────────────────
# Path to openhue CLI (auto-detected if in PATH).
openhue_command: "openhue"
# ── Dependencies ───────────────────────────────────────────────────────
# Prerequisites:
# - OpenHue CLI: brew install openhue/cli/openhue (macOS) or see https://github.com/openhue/openhue-cli
# - MCP SDK: pip install mcp
# - For system_info: pip install psutil (optional, for detailed memory/disk metrics)
#
# Config in ~/.hermes/config.yaml:
# mcp_servers:
# hardware:
# command: "python"
# args: ["/Users/you/path/to/timmy-home/scripts/hardware_mcp_server.py"]
# env:
# OPENHUE_BRIDGE_IP: "192.168.1.xx" # optional, if openhue needs it