123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307 |
- // eslint-disable-next-line simple-import-sort/imports
- import {browserHistory, createRoutes, match} from 'react-router';
- import {ExtraErrorData} from '@sentry/integrations';
- import * as Sentry from '@sentry/react';
- import {BrowserTracing} from '@sentry/react';
- import {_browserPerformanceTimeOriginMode} from '@sentry/utils';
- import {Event} from '@sentry/types';
- import {SENTRY_RELEASE_VERSION, SPA_DSN} from 'sentry/constants';
- import {Config} from 'sentry/types';
- import {addExtraMeasurements, addUIElementTag} from 'sentry/utils/performanceForSentry';
- import {normalizeUrl} from 'sentry/utils/withDomainRequired';
- import {HTTPTimingIntegration} from 'sentry/utils/performanceForSentry/integrations';
- import {getErrorDebugIds} from 'sentry/utils/getErrorDebugIds';
- const SPA_MODE_ALLOW_URLS = [
- 'localhost',
- 'dev.getsentry.net',
- 'sentry.dev',
- 'webpack-internal://',
- ];
- const SPA_MODE_TRACE_PROPAGATION_TARGETS = [
- 'localhost',
- 'dev.getsentry.net',
- 'sentry.dev',
- ];
- // We don't care about recording breadcrumbs for these hosts. These typically
- // pollute our breadcrumbs since they may occur a LOT.
- //
- // XXX(epurkhiser): Note some of these hosts may only apply to sentry.io.
- const IGNORED_BREADCRUMB_FETCH_HOSTS = ['amplitude.com', 'reload.getsentry.net'];
- // Ignore analytics in spans as well
- const IGNORED_SPANS_BY_DESCRIPTION = ['amplitude.com', 'reload.getsentry.net'];
- // We check for `window.__initialData.user` property and only enable profiling
- // for Sentry employees. This is to prevent a Violation error being visible in
- // the browser console for our users.
- const shouldEnableBrowserProfiling = window?.__initialData?.user?.isSuperuser;
- /**
- * We accept a routes argument here because importing `static/routes`
- * is expensive in regards to bundle size. Some entrypoints may opt to forgo
- * having routing instrumentation in order to have a smaller bundle size.
- * (e.g. `static/views/integrationPipeline`)
- */
- function getSentryIntegrations(sentryConfig: Config['sentryConfig'], routes?: Function) {
- const extraTracePropagationTargets = SPA_DSN
- ? SPA_MODE_TRACE_PROPAGATION_TARGETS
- : [...sentryConfig?.tracePropagationTargets];
- const integrations = [
- new ExtraErrorData({
- // 6 is arbitrary, seems like a nice number
- depth: 6,
- }),
- new BrowserTracing({
- ...(typeof routes === 'function'
- ? {
- routingInstrumentation: Sentry.reactRouterV3Instrumentation(
- browserHistory as any,
- createRoutes(routes()),
- match
- ),
- }
- : {}),
- _experiments: {
- enableInteractions: true,
- onStartRouteTransaction: Sentry.onProfilingStartRouteTransaction,
- },
- tracePropagationTargets: ['localhost', /^\//, ...extraTracePropagationTargets],
- }),
- new Sentry.BrowserProfilingIntegration(),
- new HTTPTimingIntegration(),
- ];
- return integrations;
- }
- /**
- * Initialize the Sentry SDK
- *
- * If `routes` is passed, we will instrument react-router. Not all
- * entrypoints require this.
- */
- export function initializeSdk(config: Config, {routes}: {routes?: Function} = {}) {
- const {apmSampling, sentryConfig, userIdentity} = config;
- const tracesSampleRate = apmSampling ?? 0;
- Sentry.init({
- ...sentryConfig,
- /**
- * For SPA mode, we need a way to overwrite the default DSN from backend
- * as well as `allowUrls`
- */
- dsn: SPA_DSN || sentryConfig?.dsn,
- /**
- * Frontend can be built with a `SENTRY_RELEASE_VERSION` environment
- * variable for release string, useful if frontend is deployed separately
- * from backend.
- */
- release: SENTRY_RELEASE_VERSION ?? sentryConfig?.release,
- allowUrls: SPA_DSN ? SPA_MODE_ALLOW_URLS : sentryConfig?.allowUrls,
- integrations: getSentryIntegrations(sentryConfig, routes),
- tracesSampleRate,
- // @ts-expect-error not part of browser SDK types yet
- profilesSampleRate: shouldEnableBrowserProfiling ? 1 : 0,
- tracesSampler: context => {
- if (context.transactionContext.op?.startsWith('ui.action')) {
- return tracesSampleRate / 100;
- }
- return tracesSampleRate;
- },
- beforeSendTransaction(event) {
- addExtraMeasurements(event);
- addUIElementTag(event);
- event.spans = event.spans?.filter(span => {
- return IGNORED_SPANS_BY_DESCRIPTION.every(
- partialDesc => !span.description?.includes(partialDesc)
- );
- });
- if (event.transaction) {
- event.transaction = normalizeUrl(event.transaction, {forceCustomerDomain: true});
- }
- return event;
- },
- ignoreErrors: [
- /**
- * There is a bug in Safari, that causes `AbortError` when fetch is
- * aborted, and you are in the middle of reading the response. In Chrome
- * and other browsers, it is handled gracefully, where in Safari, it
- * produces additional error, that is jumping outside of the original
- * Promise chain and bubbles up to the `unhandledRejection` handler, that
- * we then captures as error.
- *
- * Ref: https://bugs.webkit.org/show_bug.cgi?id=215771
- */
- 'AbortError: Fetch is aborted',
- /**
- * Thrown when firefox prevents an add-on from refrencing a DOM element
- * that has been removed.
- */
- "TypeError: can't access dead object",
- /**
- * React internal error thrown when something outside react modifies the DOM
- * This is usually because of a browser extension or chrome translate page
- */
- "NotFoundError: Failed to execute 'removeChild' on 'Node': The node to be removed is not a child of this node.",
- "NotFoundError: Failed to execute 'insertBefore' on 'Node': The node before which the new node is to be inserted is not a child of this node.",
- ],
- beforeBreadcrumb(crumb) {
- const isFetch = crumb.category === 'fetch' || crumb.category === 'xhr';
- // Ignore
- if (
- isFetch &&
- IGNORED_BREADCRUMB_FETCH_HOSTS.some(host => crumb.data?.url?.includes(host))
- ) {
- return null;
- }
- return crumb;
- },
- beforeSend(event, _hint) {
- if (isFilteredRequestErrorEvent(event) || isEventWithFileUrl(event)) {
- return null;
- }
- handlePossibleUndefinedResponseBodyErrors(event);
- addEndpointTagToRequestError(event);
- return event;
- },
- });
- // Event processor to fill the debug_meta field with debug IDs based on the
- // files the error touched. (files inside the stacktrace)
- const debugIdPolyfillEventProcessor = async (event: Event, hint: Sentry.EventHint) => {
- if (!(hint.originalException instanceof Error)) {
- return event;
- }
- try {
- const debugIdMap = await getErrorDebugIds(hint.originalException);
- // Fill debug_meta information
- event.debug_meta = {};
- event.debug_meta.images = [];
- const images = event.debug_meta.images;
- Object.keys(debugIdMap).forEach(filename => {
- images.push({
- type: 'sourcemap',
- code_file: filename,
- debug_id: debugIdMap[filename],
- });
- });
- } catch (e) {
- event.extra = event.extra || {};
- event.extra.debug_id_fetch_error = String(e);
- }
- return event;
- };
- debugIdPolyfillEventProcessor.id = 'debugIdPolyfillEventProcessor';
- Sentry.addGlobalEventProcessor(debugIdPolyfillEventProcessor);
- // Track timeOrigin Selection by the SDK to see if it improves transaction durations
- Sentry.addGlobalEventProcessor((event: Sentry.Event, _hint?: Sentry.EventHint) => {
- event.tags = event.tags || {};
- event.tags['timeOrigin.mode'] = _browserPerformanceTimeOriginMode;
- return event;
- });
- if (userIdentity) {
- Sentry.setUser(userIdentity);
- }
- if (window.__SENTRY__VERSION) {
- Sentry.setTag('sentry_version', window.__SENTRY__VERSION);
- }
- const {customerDomain} = window.__initialData;
- if (customerDomain) {
- Sentry.setTag('isCustomerDomain', 'yes');
- Sentry.setTag('customerDomain.organizationUrl', customerDomain.organizationUrl);
- Sentry.setTag('customerDomain.sentryUrl', customerDomain.sentryUrl);
- Sentry.setTag('customerDomain.subdomain', customerDomain.subdomain);
- }
- }
- export function isFilteredRequestErrorEvent(event: Event): boolean {
- const exceptionValues = event.exception?.values;
- if (!exceptionValues) {
- return false;
- }
- // In case there's a chain, we take the last entry, because that's the one
- // passed to `captureException`, and the one right before that, since
- // `RequestError`s are used as the main error's `cause` value in
- // `handleXhrErrorResponse`
- const mainAndMaybeCauseErrors = exceptionValues.slice(-2);
- for (const error of mainAndMaybeCauseErrors) {
- const {type = '', value = ''} = error;
- const is200 =
- ['RequestError'].includes(type) && !!value.match('(GET|POST|PUT|DELETE) .* 200');
- const is401 =
- ['UnauthorizedError', 'RequestError'].includes(type) &&
- !!value.match('(GET|POST|PUT|DELETE) .* 401');
- const is403 =
- ['ForbiddenError', 'RequestError'].includes(type) &&
- !!value.match('(GET|POST|PUT|DELETE) .* 403');
- const is404 =
- ['NotFoundError', 'RequestError'].includes(type) &&
- !!value.match('(GET|POST|PUT|DELETE) .* 404');
- const is429 =
- ['TooManyRequestsError', 'RequestError'].includes(type) &&
- !!value.match('(GET|POST|PUT|DELETE) .* 429');
- if (is200 || is401 || is403 || is404 || is429) {
- return true;
- }
- }
- return false;
- }
- export function isEventWithFileUrl(event: Event): boolean {
- return !!event.request?.url?.startsWith('file://');
- }
- /** Tag and set fingerprint for UndefinedResponseBodyError events */
- function handlePossibleUndefinedResponseBodyErrors(event: Event): void {
- // One or both of these may be undefined, depending on the type of event
- const [mainError, causeError] = event.exception?.values?.slice(-2).reverse() || [];
- const mainErrorIsURBE = mainError?.type === 'UndefinedResponseBodyError';
- const causeErrorIsURBE = causeError?.type === 'UndefinedResponseBodyError';
- if (mainErrorIsURBE || causeErrorIsURBE) {
- mainError.type = 'UndefinedResponseBodyError';
- event.tags = {...event.tags, undefinedResponseBody: true};
- event.fingerprint = mainErrorIsURBE
- ? ['UndefinedResponseBodyError as main error']
- : ['UndefinedResponseBodyError as cause error'];
- }
- }
- export function addEndpointTagToRequestError(event: Event): void {
- const errorMessage = event.exception?.values?.[0].value || '';
- // The capturing group here turns `GET /dogs/are/great 500` into just `GET /dogs/are/great`
- const requestErrorRegex = new RegExp('^([A-Za-z]+ (/[^/]+)+/) \\d+$');
- const messageMatch = requestErrorRegex.exec(errorMessage);
- if (messageMatch) {
- event.tags = {...event.tags, endpoint: messageMatch[1]};
- }
- }
|