feat(SW-2859): Create trpc package * Add isEdge, safeTry and dataCache to new common package * Add eslint and move prettier config * Clean up tests * Create trpc package and move initialization * Move errors and a few procedures * Move telemetry to common package * Move tokenManager to common package * Add Sentry to procedures * Clean up procedures * Fix self-referencing imports * Add exports to packages and lint rule to prevent relative imports * Add env to trpc package * Add eslint to trpc package * Apply lint rules * Use direct imports from trpc package * Add lint-staged config to trpc * Move lang enum to common * Restructure trpc package folder structure * Fix lang imports Approved-by: Linus Flood
165 lines
4.2 KiB
TypeScript
165 lines
4.2 KiB
TypeScript
import * as Sentry from "@sentry/nextjs"
|
|
|
|
import { getServiceToken } from "@scandic-hotels/common/tokenManager"
|
|
|
|
import { env } from "../env/server"
|
|
import {
|
|
badRequestError,
|
|
internalServerError,
|
|
sessionExpiredError,
|
|
unauthorizedError,
|
|
} from "./errors"
|
|
import { langInput } from "./utils"
|
|
import { middleware, procedure } from "."
|
|
|
|
const sentryMiddleware = middleware(
|
|
Sentry.trpcMiddleware({
|
|
attachRpcInput: true,
|
|
})
|
|
)
|
|
|
|
export const baseProcedure = procedure.use(sentryMiddleware)
|
|
|
|
export const publicProcedure = baseProcedure
|
|
|
|
export const languageProcedure = baseProcedure.use(async function (opts) {
|
|
if (!opts.ctx.lang) {
|
|
// When fetching data client side with TRPC we don't pass through middlewares and therefore do not get the lang through headers
|
|
// We can then pass lang as an input in the request and set it to the context in the procedure
|
|
|
|
const input = await opts.getRawInput()
|
|
const parsedInput = langInput.safeParse(input)
|
|
if (!parsedInput.success) {
|
|
throw badRequestError("Missing Lang in tRPC context")
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
lang: parsedInput.data.lang,
|
|
},
|
|
})
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
lang: opts.ctx.lang,
|
|
},
|
|
})
|
|
})
|
|
|
|
export const contentstackBaseProcedure = languageProcedure
|
|
|
|
export const contentstackExtendedProcedureUID = contentstackBaseProcedure.use(
|
|
async function (opts) {
|
|
if (!opts.ctx.uid) {
|
|
throw badRequestError("Missing UID in tRPC context")
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
uid: opts.ctx.uid,
|
|
},
|
|
})
|
|
}
|
|
)
|
|
|
|
export const protectedProcedure = baseProcedure.use(async function (opts) {
|
|
const authRequired = opts.meta?.authRequired ?? true
|
|
const session = await opts.ctx.auth()
|
|
|
|
if (!authRequired && env.NODE_ENV === "development") {
|
|
console.info(
|
|
`❌❌❌❌ You are opting out of authorization, if its done on purpose maybe you should use the publicProcedure instead. ❌❌❌❌`
|
|
)
|
|
console.info(`path: ${opts.path} | type: ${opts.type}`)
|
|
}
|
|
|
|
if (!session) {
|
|
throw unauthorizedError()
|
|
}
|
|
|
|
if (session?.error === "RefreshAccessTokenError") {
|
|
throw sessionExpiredError()
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
session,
|
|
},
|
|
})
|
|
})
|
|
|
|
export const safeProtectedProcedure = baseProcedure.use(async function (opts) {
|
|
const authRequired = opts.meta?.authRequired ?? true
|
|
let session = await opts.ctx.auth()
|
|
if (!authRequired && env.NODE_ENV === "development") {
|
|
console.info(
|
|
`❌❌❌❌ You are opting out of authorization, if its done on purpose maybe you should use the publicProcedure instead. ❌❌❌❌`
|
|
)
|
|
console.info(`path: ${opts.path} | type: ${opts.type}`)
|
|
}
|
|
|
|
if (!session || session.error === "RefreshAccessTokenError") {
|
|
session = null
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
session,
|
|
},
|
|
})
|
|
})
|
|
|
|
export const serviceProcedure = baseProcedure.use(async (opts) => {
|
|
const token = await getServiceToken()
|
|
const { access_token } = token
|
|
if (!access_token) {
|
|
throw internalServerError(`[serviceProcedure] No service token`)
|
|
}
|
|
return opts.next({
|
|
ctx: {
|
|
serviceToken: access_token,
|
|
},
|
|
})
|
|
})
|
|
|
|
export const contentStackUidWithServiceProcedure =
|
|
contentstackExtendedProcedureUID.concat(serviceProcedure)
|
|
|
|
export const contentStackBaseWithServiceProcedure =
|
|
contentstackBaseProcedure.concat(serviceProcedure)
|
|
|
|
export const contentStackBaseWithProtectedProcedure =
|
|
contentstackBaseProcedure.concat(protectedProcedure)
|
|
|
|
export const safeProtectedServiceProcedure =
|
|
safeProtectedProcedure.concat(serviceProcedure)
|
|
|
|
export const languageProtectedProcedure =
|
|
protectedProcedure.concat(languageProcedure)
|
|
|
|
type ExperimentalProcedureCaller = ReturnType<
|
|
typeof baseProcedure.experimental_caller
|
|
>
|
|
export function getProtectedServerActionProcedure(
|
|
serverActionProcedure: ExperimentalProcedureCaller
|
|
) {
|
|
return serverActionProcedure.use(async (opts) => {
|
|
const session = await opts.ctx.auth()
|
|
if (!session) {
|
|
throw unauthorizedError()
|
|
}
|
|
|
|
if (session && session.error === "RefreshAccessTokenError") {
|
|
throw sessionExpiredError()
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
...opts.ctx,
|
|
session,
|
|
},
|
|
})
|
|
})
|
|
}
|