UNPKG

@open-condo/miniapp-utils

Version:

A set of helper functions / components / hooks used to build new condo apps fast

467 lines (450 loc) 15.4 kB
// src/helpers/analytics/instance.ts import { Analytics as DefaultAnalytics } from "analytics"; // src/helpers/analytics/middlewares/grouping.ts function _addGroupingProperties(data) { const { instance } = data; for (const groupName of instance.groups) { const groupKey = Analytics.getGroupKey(groupName); const groupValue = instance.storage.getItem(groupKey); if (typeof groupValue === "string") { const groupAttrName = `groups.${groupName}`; data.payload.properties[groupAttrName] = groupValue; } } return data; } var GroupingMiddlewarePlugin = { name: "analytics-plugin-grouping", track: _addGroupingProperties, page: _addGroupingProperties }; // src/helpers/analytics/middlewares/identity.ts var IDENTITY_PROPERTIES = ["app", "version"]; function _addIdentityProperties(data) { const { instance } = data; for (const contextPropertyName of IDENTITY_PROPERTIES) { const propertyValue = instance.getState(`context.${contextPropertyName}`); if (typeof propertyValue === "string") { data.payload.properties[contextPropertyName] = propertyValue; } } return data; } var IdentityMiddlewarePlugin = { name: "analytics-plugin-identity", track: _addIdentityProperties, page: _addIdentityProperties }; // src/helpers/analytics/instance.ts var Analytics = class _Analytics { constructor(config) { this._groups = /* @__PURE__ */ new Set(); this._analytics = DefaultAnalytics({ ...config, plugins: [ IdentityMiddlewarePlugin, GroupingMiddlewarePlugin, ...config.plugins || [] ] }); this._analytics.groups = this._groups; } /** * Tracks type-safe business events. Recommended to use in most cases in app's codebase. * To add an event, modify "Events" generic. */ async track(eventName, eventData) { await this._analytics.track(eventName, eventData); } /** * Tracks untyped analytics events, used mainly for external sources (bridge / ui-kit / messages, etc.) * @deprecated It's not recommended to use this in your business logic, consider using typed "track" instead */ async trackUntyped(eventName, eventData) { await this._analytics.track(eventName, eventData); } /** * Tracks page changing in SPAs */ async pageView(data) { await this._analytics.page(data); } /** * Identifies user in analytics provider. * To specify all possible shape of user's data, modify "UserData" generic * * NOTE: Analytics plugins don't have a fixed behavior on how to handle consecutive identify calls. * Some of them affect only subsequent events, others affect all user events. * Therefore, it is not recommended to put cohort-specific data (organization, address, language, etc.) here. * Instead, use something like "group" method if your plugins supports it. */ async identify(userId, userData) { await this._analytics.identify(userId, userData); } /** * Resets analytics providers */ async reset() { for (const groupName of this._groups) { const groupKey = _Analytics.getGroupKey(groupName); this._analytics.storage.removeItem(groupKey); } this._groups.clear(); await this._analytics.reset(); } static getGroupKey(groupName) { return ["analytics", "groups", groupName].join(":"); } /** * Associates the user with a group, adding the attributes `groups.${groupName} = groupId` * to all subsequent analytic queries for the user * @example * analytics.setGroup('organization', organizationId) */ setGroup(groupName, groupId) { const groupKey = _Analytics.getGroupKey(groupName); this._groups.add(groupName); this._analytics.storage.setItem(groupKey, groupId); } /** * Removes the current user from the group, stripping the “groups.${groupName}” * attribute from all subsequent eventualities * @example * deleteOrganization() * .then(() => analytics.removeGroup('organization')) */ removeGroup(groupName) { const groupKey = _Analytics.getGroupKey(groupName); this._analytics.storage.removeItem(groupKey); this._groups.delete(groupName); } }; // src/helpers/apollo.ts import { parse as parseCookieString, serialize as serializeCookie } from "cookie"; import { setCookie as setCookie2, getCookies } from "cookies-next"; // src/helpers/proxying/utils.ts import jwt from "jsonwebtoken"; import proxyAddr from "proxy-addr"; import { z } from "zod"; var _ipSchema = z.union([z.ipv4(), z.ipv6()]); var _timeStampBasicRegexp = /^\d+$/; var DEFAULT_PROXY_TIMEOUT_IN_MS = 5e3; var X_PROXY_ID_HEADER = "x-proxy-id"; var X_PROXY_IP_HEADER = "x-proxy-ip"; var X_PROXY_TIMESTAMP_HEADER = "x-proxy-timestamp"; var X_PROXY_SIGNATURE_HEADER = "x-proxy-signature"; function _getTimestampFromHeader(timestamp) { if (!_timeStampBasicRegexp.test(timestamp)) return Number.NaN; return new Date(parseInt(timestamp)).getTime(); } function getRequestIp(req, trustProxyFn, knownProxies) { const originalIP = proxyAddr(req, trustProxyFn); if (!knownProxies) return originalIP; const xProxyId = req.headers[X_PROXY_ID_HEADER]; const xProxyIp = req.headers[X_PROXY_IP_HEADER]; const xProxyTimestamp = req.headers[X_PROXY_TIMESTAMP_HEADER]; const xProxySignature = req.headers[X_PROXY_SIGNATURE_HEADER]; if (typeof xProxyId !== "string" || typeof xProxyIp !== "string" || typeof xProxyTimestamp !== "string" || typeof xProxySignature !== "string") { return originalIP; } const { success: isValidIp } = _ipSchema.safeParse(xProxyIp); if (!isValidIp) { return originalIP; } const timestamp = _getTimestampFromHeader(xProxyTimestamp); const now = Date.now(); if (Number.isNaN(timestamp) || timestamp > now || now - timestamp > DEFAULT_PROXY_TIMEOUT_IN_MS) { return originalIP; } if (!Object.hasOwn(knownProxies, xProxyId)) { return originalIP; } const proxyConfig = knownProxies[xProxyId]; const isRequestFromProxy = Array.isArray(proxyConfig.address) ? proxyConfig.address.includes(originalIP) : proxyConfig.address === originalIP; if (!isRequestFromProxy) { return originalIP; } try { const jwtPayload = jwt.verify(xProxySignature, proxyConfig.secret, { algorithms: ["HS256"] }); const expectedPayloadSchema = z.object({ [X_PROXY_TIMESTAMP_HEADER]: z.literal(xProxyTimestamp), [X_PROXY_IP_HEADER]: z.literal(xProxyIp), [X_PROXY_ID_HEADER]: z.literal(xProxyId), method: z.literal(req.method), url: z.literal(req.url) }); const { success: isMatchingSignature } = expectedPayloadSchema.safeParse(jwtPayload); return isMatchingSignature ? xProxyIp : originalIP; } catch { return originalIP; } } // src/helpers/proxying/proxy.ts import httpProxy from "http-proxy"; // src/helpers/sender.ts import { getCookie, setCookie } from "cookies-next"; // src/helpers/uuid.ts import { randomBytes } from "crypto"; function generateUUIDv4() { let randomValues; if (typeof crypto !== "undefined" && typeof crypto.randomUUID === "function") { return crypto.randomUUID(); } else if (typeof window !== "undefined" && window.crypto && window.crypto.getRandomValues) { randomValues = new Uint8Array(16); window.crypto.getRandomValues(randomValues); } else { randomValues = randomBytes(16); } randomValues[6] = randomValues[6] & 15 | 64; randomValues[8] = randomValues[8] & 63 | 128; return [...randomValues].map((value, index) => { const hex = value.toString(16).padStart(2, "0"); if (index === 4 || index === 6 || index === 8 || index === 10) { return `-${hex}`; } return hex; }).join(""); } // src/helpers/sender.ts var FINGERPRINT_ID_COOKIE_NAME = "fingerprint"; var FINGERPRINT_ID_LENGTH = 12; function makeId(length) { const croppedLength = Math.min(length, 32); return generateUUIDv4().replaceAll("-", "").substring(0, croppedLength); } function generateFingerprint() { return makeId(FINGERPRINT_ID_LENGTH); } function getClientSideFingerprint() { let fingerprint = getCookie(FINGERPRINT_ID_COOKIE_NAME); if (!fingerprint) { fingerprint = generateFingerprint(); setCookie(FINGERPRINT_ID_COOKIE_NAME, fingerprint); } return fingerprint; } function getClientSideSenderInfo() { return { dv: 1, fingerprint: getClientSideFingerprint() }; } // src/helpers/apollo.ts var SSR_DEFAULT_FINGERPRINT = "webAppSSR"; var COOKIE_HEADER_NAME = "cookie"; var REMOTE_APP_HEADER_NAME = "x-remote-app"; var REMOTE_VERSION_HEADER_NAME = "x-remote-version"; var REMOTE_CLIENT_HEADER_NANE = "x-remote-client"; var REMOTE_ENV_HEADER_NAME = "x-remote-env"; var TARGET_HEADER_NAME = "x-target"; var START_REQUEST_ID_HEADER_NAME = "x-start-request-id"; var PARENT_REQUEST_ID_HEADER_NAME = "x-parent-request-id"; function generateRequestId() { return `BR${generateUUIDv4().replaceAll("-", "")}`; } function getTracingMiddleware(options) { return function(operation, forward) { operation.setContext((previousContext) => { const { headers: previousHeaders } = previousContext; const reqId = generateRequestId(); const headers = { ...previousHeaders, [REMOTE_APP_HEADER_NAME]: options.serviceUrl, [REMOTE_VERSION_HEADER_NAME]: options.codeVersion, [PARENT_REQUEST_ID_HEADER_NAME]: reqId, [START_REQUEST_ID_HEADER_NAME]: reqId }; if (options.target) { headers[TARGET_HEADER_NAME] = options.target; } headers[REMOTE_ENV_HEADER_NAME] = typeof document === "undefined" ? "SSR" : "CSR"; if (typeof document !== "undefined" && document.cookie) { headers[REMOTE_CLIENT_HEADER_NANE] = getClientSideFingerprint(); } else if (headers[COOKIE_HEADER_NAME]) { const ssrCookies = parseCookieString(headers[COOKIE_HEADER_NAME]); headers[REMOTE_CLIENT_HEADER_NANE] = ssrCookies[FINGERPRINT_ID_COOKIE_NAME] || SSR_DEFAULT_FINGERPRINT; } return { ...previousContext, headers }; }); return forward(operation); }; } function prepareSSRContext(req, res) { if (!req) { return { headers: {}, defaultContext: {} }; } const requestCookies = getCookies({ req, res }); if (!requestCookies[FINGERPRINT_ID_COOKIE_NAME]) { const fingerprint = generateFingerprint(); requestCookies[FINGERPRINT_ID_COOKIE_NAME] = fingerprint; setCookie2(FINGERPRINT_ID_COOKIE_NAME, fingerprint, { req, res }); } const cookieHeader = Object.entries(requestCookies).map(([name, value]) => value ? serializeCookie(name, value) : null).filter(Boolean).join(";"); const clientIp = getRequestIp(req, () => true); return { headers: { cookie: cookieHeader }, defaultContext: { clientIp } }; } // src/helpers/collections.ts function nonNull(val) { return val !== null && val !== void 0; } // src/helpers/cookies.ts import { getCookie as getCookie2 } from "cookies-next"; import { createContext, useContext } from "react"; var SSR_COOKIES_DEFAULT_PROP_NAME = "__SSR_COOKIES__"; var SSRCookiesHelper = class { constructor(allowedCookies, propName) { this.allowedCookies = allowedCookies; this.propName = propName || SSR_COOKIES_DEFAULT_PROP_NAME; this.defaultValues = Object.fromEntries(allowedCookies.map((key) => [key, null])); this.context = createContext(this.defaultValues); this.extractSSRCookies = this.extractSSRCookies.bind(this); } getContext() { return this.context; } generateUseSSRCookiesExtractorHook() { const defaultValues = this.defaultValues; const propName = this.propName; return function useSSRCookiesExtractor(pageProps) { return pageProps[propName] || defaultValues; }; } generateUseSSRCookiesHook() { const context = this.context; return function useSSRCookies() { return useContext(context); }; } extractSSRCookies(req, res, pageParams) { return { ...pageParams, props: { ...pageParams.props, [this.propName]: Object.fromEntries( Object.keys(this.defaultValues).map((key) => [ key, getCookie2(key, { req, res }) || null ]) ) } }; } }; // src/helpers/environment.ts function isSSR() { return typeof window === "undefined"; } function isDebug() { return process.env.NODE_ENV === "development"; } // src/helpers/posthog.ts var POSTHOG_CLOUD_HOST_BASE = "i.posthog.com"; var POSTHOG_CLOUD_HOST_MATCHER = new RegExp(`^(\\w+)\\.${POSTHOG_CLOUD_HOST_BASE.replaceAll(".", "\\.")}$`); function getPosthogEndpoint(posthogDomain, requestedPath) { const posthogURL = new URL(posthogDomain); const cloudMatch = posthogURL.host.match(POSTHOG_CLOUD_HOST_MATCHER); if (cloudMatch && cloudMatch.length > 1) { const region = cloudMatch[1]; if (requestedPath.length && requestedPath[0] === "static") { posthogURL.host = `${region}-assets.${POSTHOG_CLOUD_HOST_BASE}`; posthogURL.pathname = requestedPath.slice(1).join("/"); return posthogURL.toString(); } } posthogURL.pathname = requestedPath.join("/"); return posthogURL.toString(); } // src/hooks/useEffectOnce.ts import { useEffect } from "react"; function useEffectOnce(cb) { useEffect(cb, []); } // src/hooks/useIntersectionObserver.ts import { useEffect as useEffect2, useRef, useState } from "react"; function useIntersectionObserver({ threshold = 0, root = null, rootMargin = "0%", onChange } = {}) { const [ref, setRef] = useState(null); const [state, setState] = useState(() => ({ isIntersecting: false, entry: void 0 })); const callbackRef = useRef(); callbackRef.current = onChange; useEffect2(() => { if (!ref) return; if (!("IntersectionObserver" in window)) return; const observer = new IntersectionObserver((entries) => { const thresholds = observer.thresholds; entries.forEach((entry) => { const isIntersecting = entry.isIntersecting && thresholds.some((threshold2) => entry.intersectionRatio >= threshold2); setState({ isIntersecting, entry }); if (callbackRef.current) { callbackRef.current(isIntersecting, entry); } }); }, { threshold, root, rootMargin }); observer.observe(ref); return () => { observer.disconnect(); }; }, [ref, root, rootMargin, threshold]); const prevRef = useRef(null); useEffect2(() => { var _a; if (!ref && ((_a = state.entry) == null ? void 0 : _a.target) && prevRef.current !== state.entry.target) { prevRef.current = state.entry.target; setState({ isIntersecting: false, entry: void 0 }); } }, [ref, state.entry]); return { entry: state.entry, ref: setRef, isIntersecting: state.isIntersecting }; } // src/hooks/usePrevious.ts import { useEffect as useEffect3, useRef as useRef2 } from "react"; function usePrevious(state) { const ref = useRef2(); useEffect3(() => { ref.current = state; }); return ref.current; } export { Analytics, FINGERPRINT_ID_COOKIE_NAME, FINGERPRINT_ID_LENGTH, SSRCookiesHelper, generateFingerprint, generateUUIDv4, getClientSideFingerprint, getClientSideSenderInfo, getPosthogEndpoint, getTracingMiddleware, isDebug, isSSR, nonNull, prepareSSRContext, useEffectOnce, useIntersectionObserver, usePrevious }; //# sourceMappingURL=index.mjs.map