Migrate to a monorepo setup - step 1 * Move web to subfolder /apps/scandic-web * Yarn + transitive deps - Move to yarn - design-system package removed for now since yarn doesn't support the parameter for token (ie project currently broken) - Add missing transitive dependencies as Yarn otherwise prevents these imports - VS Code doesn't pick up TS path aliases unless you open /apps/scandic-web instead of root (will be fixed with monorepo) * Pin framer-motion to temporarily fix typing issue https://github.com/adobe/react-spectrum/issues/7494 * Pin zod to avoid typ error There seems to have been a breaking change in the types returned by zod where error is now returned as undefined instead of missing in the type. We should just handle this but to avoid merge conflicts just pin the dependency for now. * Pin react-intl version Pin version of react-intl to avoid tiny type issue where formatMessage does not accept a generic any more. This will be fixed in a future commit, but to avoid merge conflicts just pin for now. * Pin typescript version Temporarily pin version as newer versions as stricter and results in a type error. Will be fixed in future commit after merge. * Setup workspaces * Add design-system as a monorepo package * Remove unused env var DESIGN_SYSTEM_ACCESS_TOKEN * Fix husky for monorepo setup * Update netlify.toml * Add lint script to root package.json * Add stub readme * Fix react-intl formatMessage types * Test netlify.toml in root * Remove root toml * Update netlify.toml publish path * Remove package-lock.json * Update build for branch/preview builds Approved-by: Linus Flood
208 lines
5.4 KiB
TypeScript
208 lines
5.4 KiB
TypeScript
import * as Sentry from "@sentry/node"
|
|
import { initTRPC } from "@trpc/server"
|
|
import { experimental_nextAppDirCaller } from "@trpc/server/adapters/next-app-dir"
|
|
import { ZodError } from "zod"
|
|
|
|
import { env } from "@/env/server"
|
|
|
|
import {
|
|
badRequestError,
|
|
internalServerError,
|
|
sessionExpiredError,
|
|
unauthorizedError,
|
|
} from "./errors/trpc"
|
|
import { type Context, createContext } from "./context"
|
|
import { getServiceToken } from "./tokenManager"
|
|
import { transformer } from "./transformer"
|
|
import { langInput } from "./utils"
|
|
|
|
import type { Session } from "next-auth"
|
|
|
|
import type { Meta } from "@/types/trpc/meta"
|
|
|
|
const t = initTRPC
|
|
.context<Context>()
|
|
.meta<Meta>()
|
|
.create({
|
|
transformer,
|
|
errorFormatter({ shape, error }) {
|
|
return {
|
|
...shape,
|
|
data: {
|
|
...shape.data,
|
|
cause:
|
|
error.cause instanceof ZodError
|
|
? undefined
|
|
: JSON.parse(JSON.stringify(error.cause)),
|
|
zodError:
|
|
error.cause instanceof ZodError ? error.cause.flatten() : null,
|
|
},
|
|
}
|
|
},
|
|
})
|
|
|
|
const sentryMiddleware = t.middleware(
|
|
Sentry.trpcMiddleware({
|
|
attachRpcInput: true,
|
|
})
|
|
)
|
|
|
|
export const { createCallerFactory, mergeRouters, router } = t
|
|
const baseProcedure = t.procedure.use(sentryMiddleware)
|
|
|
|
export const publicProcedure = baseProcedure
|
|
|
|
export const contentstackBaseProcedure = baseProcedure.use(
|
|
async function (opts) {
|
|
if (!opts.ctx.lang) {
|
|
// When fetching data client side with TRPC we don't pass through middlewares and therefore do not get the lang through headers
|
|
// We can then pass lang as an input in the request and set it to the context in the procedure
|
|
|
|
const input = await opts.getRawInput()
|
|
const parsedInput = langInput.safeParse(input)
|
|
if (!parsedInput.success) {
|
|
throw badRequestError("Missing Lang in tRPC context")
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
lang: parsedInput.data.lang,
|
|
},
|
|
})
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
lang: opts.ctx.lang,
|
|
},
|
|
})
|
|
}
|
|
)
|
|
export const contentstackExtendedProcedureUID = contentstackBaseProcedure.use(
|
|
async function (opts) {
|
|
if (!opts.ctx.uid) {
|
|
throw badRequestError("Missing UID in tRPC context")
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
uid: opts.ctx.uid,
|
|
},
|
|
})
|
|
}
|
|
)
|
|
export const protectedProcedure = baseProcedure.use(async function (opts) {
|
|
const authRequired = opts.meta?.authRequired ?? true
|
|
const session = await opts.ctx.auth()
|
|
if (!authRequired && env.NODE_ENV === "development") {
|
|
console.info(
|
|
`❌❌❌❌ You are opting out of authorization, if its done on purpose maybe you should use the publicProcedure instead. ❌❌❌❌`
|
|
)
|
|
console.info(`path: ${opts.path} | type: ${opts.type}`)
|
|
}
|
|
|
|
if (!session) {
|
|
throw unauthorizedError()
|
|
}
|
|
|
|
if (session?.error === "RefreshAccessTokenError") {
|
|
throw sessionExpiredError()
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
session,
|
|
},
|
|
})
|
|
})
|
|
|
|
export const safeProtectedProcedure = baseProcedure.use(async function (opts) {
|
|
const authRequired = opts.meta?.authRequired ?? true
|
|
let session: Session | null = await opts.ctx.auth()
|
|
if (!authRequired && env.NODE_ENV === "development") {
|
|
console.info(
|
|
`❌❌❌❌ You are opting out of authorization, if its done on purpose maybe you should use the publicProcedure instead. ❌❌❌❌`
|
|
)
|
|
console.info(`path: ${opts.path} | type: ${opts.type}`)
|
|
}
|
|
|
|
if (!session || session.error === "RefreshAccessTokenError") {
|
|
session = null
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
session,
|
|
},
|
|
})
|
|
})
|
|
|
|
export const serviceProcedure = baseProcedure.use(async (opts) => {
|
|
const { access_token } = await getServiceToken()
|
|
if (!access_token) {
|
|
throw internalServerError(`[serviceProcedure] No service token`)
|
|
}
|
|
return opts.next({
|
|
ctx: {
|
|
serviceToken: access_token,
|
|
},
|
|
})
|
|
})
|
|
|
|
export const serverActionProcedure = baseProcedure.experimental_caller(
|
|
experimental_nextAppDirCaller({
|
|
createContext,
|
|
normalizeFormData: true,
|
|
})
|
|
)
|
|
|
|
export const serviceServerActionProcedure = serverActionProcedure.use(
|
|
async (opts) => {
|
|
const { access_token } = await getServiceToken()
|
|
if (!access_token) {
|
|
throw internalServerError(
|
|
"[serviceServerActionProcedure]: No service token"
|
|
)
|
|
}
|
|
return opts.next({
|
|
ctx: {
|
|
serviceToken: access_token,
|
|
},
|
|
})
|
|
}
|
|
)
|
|
|
|
export const protectedServerActionProcedure = serverActionProcedure.use(
|
|
async (opts) => {
|
|
const session = await opts.ctx.auth()
|
|
if (!session) {
|
|
throw unauthorizedError()
|
|
}
|
|
|
|
if (session && session.error === "RefreshAccessTokenError") {
|
|
throw sessionExpiredError()
|
|
}
|
|
|
|
return opts.next({
|
|
ctx: {
|
|
...opts.ctx,
|
|
session,
|
|
},
|
|
})
|
|
}
|
|
)
|
|
|
|
// NOTE: This is actually safe to use, just the implementation could change
|
|
// in minor version bumps. Please read: https://trpc.io/docs/faq#unstable
|
|
export const contentStackUidWithServiceProcedure =
|
|
contentstackExtendedProcedureUID.unstable_concat(serviceProcedure)
|
|
|
|
export const contentStackBaseWithServiceProcedure =
|
|
contentstackBaseProcedure.unstable_concat(serviceProcedure)
|
|
|
|
export const contentStackBaseWithProtectedProcedure =
|
|
contentstackBaseProcedure.unstable_concat(protectedProcedure)
|
|
|
|
export const safeProtectedServiceProcedure =
|
|
safeProtectedProcedure.unstable_concat(serviceProcedure)
|