First steps towards the SAS partnership * otp flow now pretends to do the linking * Update LinkAccountForm header * Update redirect times * Clean up comments * Set maxAge on sas cookies * make all SAS routes protected * Merge remote-tracking branch 'refs/remotes/origin/feature/sas-login' into feature/sas-login * Require auth for sas link flow * Fix resend otp * Add error support to OneTimePasswordForm * Add Sentry to SAS error boundary * Move SAS_REQUEST_OTP_STATE_STORAGE_COOKIE_NAME * Add missing translations * Merge branch 'master' of bitbucket.org:scandic-swap/web into feature/sas-login * Merge branch 'feature/sas-login' of bitbucket.org:scandic-swap/web into feature/sas-login * Add TooManyCodesError component * Refactor GenericError to support new errors * Add FailedAttemptsError * remove removed component <VWOScript/> * Merge branch 'feature/sas-login' of bitbucket.org:scandic-swap/web into feature/sas-login * remove local cookie-bot reference * Fix sas campaign logo scaling * feature toggle the SAS stuff * Merge branch 'feature/sas-login' of bitbucket.org:scandic-swap/web into feature/sas-login * fix: use env vars for SAS endpoints Approved-by: Linus Flood
208 lines
5.4 KiB
TypeScript
208 lines
5.4 KiB
TypeScript
import * as Sentry from "@sentry/node"
|
|
import { initTRPC } from "@trpc/server"
|
|
import { experimental_nextAppDirCaller } from "@trpc/server/adapters/next-app-dir"
|
|
import { ZodError } from "zod"
|
|
|
|
import { env } from "@/env/server"
|
|
|
|
import {
|
|
badRequestError,
|
|
internalServerError,
|
|
sessionExpiredError,
|
|
unauthorizedError,
|
|
} from "./errors/trpc"
|
|
import { type Context, createContext } from "./context"
|
|
import { getServiceToken } from "./tokenManager"
|
|
import { transformer } from "./transformer"
|
|
import { langInput } from "./utils"
|
|
|
|
import type { Session } from "next-auth"
|
|
|
|
import type { Meta } from "@/types/trpc/meta"
|
|
|
|
const t = initTRPC
|
|
.context<Context>()
|
|
.meta<Meta>()
|
|
.create({
|
|
transformer,
|
|
errorFormatter({ shape, error }) {
|
|
return {
|
|
...shape,
|
|
data: {
|
|
...shape.data,
|
|
cause:
|
|
error.cause instanceof ZodError
|
|
? undefined
|
|
: JSON.parse(JSON.stringify(error.cause)),
|
|
zodError:
|
|
error.cause instanceof ZodError ? error.cause.flatten() : null,
|
|
},
|
|
}
|
|
},
|
|
})
|
|
|
|
const sentryMiddleware = t.middleware(
|
|
Sentry.trpcMiddleware({
|
|
attachRpcInput: true,
|
|
})
|
|
)
|
|
|
|
export const { createCallerFactory, mergeRouters, router } = t
|
|
const baseProcedure = t.procedure.use(sentryMiddleware)
|
|
|
|
export const publicProcedure = baseProcedure
|
|
|
|
export const contentstackBaseProcedure = baseProcedure.use(
|
|
async function (opts) {
|
|
if (!opts.ctx.lang) {
|
|
// When fetching data client side with TRPC we don't pass through middlewares and therefore do not get the lang through headers
|
|
// We can then pass lang as an input in the request and set it to the context in the procedure
|
|
const input = await opts.getRawInput()
|
|
const parsedInput = langInput.safeParse(input)
|
|
if (!parsedInput.success) {
|
|
throw badRequestError("Missing Lang in tRPC context")
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
lang: parsedInput.data.lang,
|
|
},
|
|
})
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
lang: opts.ctx.lang,
|
|
},
|
|
})
|
|
}
|
|
)
|
|
export const contentstackExtendedProcedureUID = contentstackBaseProcedure.use(
|
|
async function (opts) {
|
|
if (!opts.ctx.uid) {
|
|
throw badRequestError("Missing UID in tRPC context")
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
uid: opts.ctx.uid,
|
|
},
|
|
})
|
|
}
|
|
)
|
|
export const protectedProcedure = baseProcedure.use(async function (opts) {
|
|
const authRequired = opts.meta?.authRequired ?? true
|
|
const session = await opts.ctx.auth()
|
|
if (!authRequired && env.NODE_ENV === "development") {
|
|
console.info(
|
|
`❌❌❌❌ You are opting out of authorization, if its done on purpose maybe you should use the publicProcedure instead. ❌❌❌❌`
|
|
)
|
|
console.info(`path: ${opts.path} | type: ${opts.type}`)
|
|
}
|
|
|
|
if (!session) {
|
|
throw unauthorizedError()
|
|
}
|
|
|
|
if (session?.error === "RefreshAccessTokenError") {
|
|
throw sessionExpiredError()
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
session,
|
|
},
|
|
})
|
|
})
|
|
|
|
export const safeProtectedProcedure = baseProcedure.use(async function (opts) {
|
|
const authRequired = opts.meta?.authRequired ?? true
|
|
|
|
let session: Session | null = await opts.ctx.auth()
|
|
if (!authRequired && env.NODE_ENV === "development") {
|
|
console.info(
|
|
`❌❌❌❌ You are opting out of authorization, if its done on purpose maybe you should use the publicProcedure instead. ❌❌❌❌`
|
|
)
|
|
console.info(`path: ${opts.path} | type: ${opts.type}`)
|
|
}
|
|
|
|
if (!session || session.error === "RefreshAccessTokenError") {
|
|
session = null
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
session,
|
|
},
|
|
})
|
|
})
|
|
|
|
export const serviceProcedure = baseProcedure.use(async (opts) => {
|
|
const { access_token } = await getServiceToken()
|
|
if (!access_token) {
|
|
throw internalServerError(`[serviceProcedure] No service token`)
|
|
}
|
|
return opts.next({
|
|
ctx: {
|
|
serviceToken: access_token,
|
|
},
|
|
})
|
|
})
|
|
|
|
export const serverActionProcedure = baseProcedure.experimental_caller(
|
|
experimental_nextAppDirCaller({
|
|
createContext,
|
|
normalizeFormData: true,
|
|
})
|
|
)
|
|
|
|
export const serviceServerActionProcedure = serverActionProcedure.use(
|
|
async (opts) => {
|
|
const { access_token } = await getServiceToken()
|
|
if (!access_token) {
|
|
throw internalServerError(
|
|
"[serviceServerActionProcedure]: No service token"
|
|
)
|
|
}
|
|
return opts.next({
|
|
ctx: {
|
|
serviceToken: access_token,
|
|
},
|
|
})
|
|
}
|
|
)
|
|
|
|
export const protectedServerActionProcedure = serverActionProcedure.use(
|
|
async (opts) => {
|
|
const session = await opts.ctx.auth()
|
|
if (!session) {
|
|
throw unauthorizedError()
|
|
}
|
|
|
|
if (session && session.error === "RefreshAccessTokenError") {
|
|
throw sessionExpiredError()
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
...opts.ctx,
|
|
session,
|
|
},
|
|
})
|
|
}
|
|
)
|
|
|
|
// NOTE: This is actually safe to use, just the implementation could change
|
|
// in minor version bumps. Please read: https://trpc.io/docs/faq#unstable
|
|
export const contentStackUidWithServiceProcedure =
|
|
contentstackExtendedProcedureUID.unstable_concat(serviceProcedure)
|
|
|
|
export const contentStackBaseWithServiceProcedure =
|
|
contentstackBaseProcedure.unstable_concat(serviceProcedure)
|
|
|
|
export const contentStackBaseWithProtectedProcedure =
|
|
contentstackBaseProcedure.unstable_concat(protectedProcedure)
|
|
|
|
export const safeProtectedServiceProcedure =
|
|
safeProtectedProcedure.unstable_concat(serviceProcedure)
|