initializeSdk.tsx 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357
  1. // eslint-disable-next-line simple-import-sort/imports
  2. import {browserHistory, createRoutes, match} from 'react-router';
  3. import {extraErrorDataIntegration} from '@sentry/integrations';
  4. import * as Sentry from '@sentry/react';
  5. import {BrowserTracing} from '@sentry/react';
  6. import {_browserPerformanceTimeOriginMode} from '@sentry/utils';
  7. import {Event, IntegrationFn} from '@sentry/types';
  8. import {SENTRY_RELEASE_VERSION, SPA_DSN} from 'sentry/constants';
  9. import {Config} from 'sentry/types';
  10. import {addExtraMeasurements, addUIElementTag} from 'sentry/utils/performanceForSentry';
  11. import {normalizeUrl} from 'sentry/utils/withDomainRequired';
  12. import {getErrorDebugIds} from 'sentry/utils/getErrorDebugIds';
  13. const SPA_MODE_ALLOW_URLS = [
  14. 'localhost',
  15. 'dev.getsentry.net',
  16. 'sentry.dev',
  17. 'webpack-internal://',
  18. ];
  19. const SPA_MODE_TRACE_PROPAGATION_TARGETS = [
  20. 'localhost',
  21. 'dev.getsentry.net',
  22. 'sentry.dev',
  23. ];
  24. // We don't care about recording breadcrumbs for these hosts. These typically
  25. // pollute our breadcrumbs since they may occur a LOT.
  26. //
  27. // XXX(epurkhiser): Note some of these hosts may only apply to sentry.io.
  28. const IGNORED_BREADCRUMB_FETCH_HOSTS = ['amplitude.com', 'reload.getsentry.net'];
  29. // Ignore analytics in spans as well
  30. const IGNORED_SPANS_BY_DESCRIPTION = ['amplitude.com', 'reload.getsentry.net'];
  31. // We check for `window.__initialData.user` property and only enable profiling
  32. // for Sentry employees. This is to prevent a Violation error being visible in
  33. // the browser console for our users.
  34. const shouldOverrideBrowserProfiling = window?.__initialData?.user?.isSuperuser;
  35. /**
  36. * We accept a routes argument here because importing `static/routes`
  37. * is expensive in regards to bundle size. Some entrypoints may opt to forgo
  38. * having routing instrumentation in order to have a smaller bundle size.
  39. * (e.g. `static/views/integrationPipeline`)
  40. */
  41. function getSentryIntegrations(routes?: Function) {
  42. const integrations = [
  43. extraErrorDataIntegration({
  44. // 6 is arbitrary, seems like a nice number
  45. depth: 6,
  46. }),
  47. Sentry.metrics.metricsAggregatorIntegration(),
  48. new BrowserTracing({
  49. ...(typeof routes === 'function'
  50. ? {
  51. routingInstrumentation: Sentry.reactRouterV3Instrumentation(
  52. browserHistory as any,
  53. createRoutes(routes()),
  54. match
  55. ),
  56. }
  57. : {}),
  58. _experiments: {
  59. enableInteractions: true,
  60. onStartRouteTransaction: Sentry.onProfilingStartRouteTransaction,
  61. },
  62. }),
  63. new Sentry.BrowserProfilingIntegration(),
  64. JSONSerializationIntegration(),
  65. ];
  66. return integrations;
  67. }
  68. /**
  69. * Initialize the Sentry SDK
  70. *
  71. * If `routes` is passed, we will instrument react-router. Not all
  72. * entrypoints require this.
  73. */
  74. export function initializeSdk(config: Config, {routes}: {routes?: Function} = {}) {
  75. const {apmSampling, sentryConfig, userIdentity} = config;
  76. const tracesSampleRate = apmSampling ?? 0;
  77. const extraTracePropagationTargets = SPA_DSN
  78. ? SPA_MODE_TRACE_PROPAGATION_TARGETS
  79. : [...sentryConfig?.tracePropagationTargets];
  80. Sentry.init({
  81. ...sentryConfig,
  82. /**
  83. * For SPA mode, we need a way to overwrite the default DSN from backend
  84. * as well as `allowUrls`
  85. */
  86. dsn: SPA_DSN || sentryConfig?.dsn,
  87. /**
  88. * Frontend can be built with a `SENTRY_RELEASE_VERSION` environment
  89. * variable for release string, useful if frontend is deployed separately
  90. * from backend.
  91. */
  92. release: SENTRY_RELEASE_VERSION ?? sentryConfig?.release,
  93. allowUrls: SPA_DSN ? SPA_MODE_ALLOW_URLS : sentryConfig?.allowUrls,
  94. integrations: getSentryIntegrations(routes),
  95. tracesSampleRate,
  96. profilesSampleRate: shouldOverrideBrowserProfiling ? 1 : 0.1,
  97. tracePropagationTargets: ['localhost', /^\//, ...extraTracePropagationTargets],
  98. tracesSampler: context => {
  99. if (context.transactionContext.op?.startsWith('ui.action')) {
  100. return tracesSampleRate / 100;
  101. }
  102. return tracesSampleRate;
  103. },
  104. beforeSendTransaction(event) {
  105. addExtraMeasurements(event);
  106. addUIElementTag(event);
  107. event.spans = event.spans?.filter(span => {
  108. return IGNORED_SPANS_BY_DESCRIPTION.every(
  109. partialDesc => !span.description?.includes(partialDesc)
  110. );
  111. });
  112. if (event.transaction) {
  113. event.transaction = normalizeUrl(event.transaction, {forceCustomerDomain: true});
  114. }
  115. return event;
  116. },
  117. ignoreErrors: [
  118. /**
  119. * There is a bug in Safari, that causes `AbortError` when fetch is
  120. * aborted, and you are in the middle of reading the response. In Chrome
  121. * and other browsers, it is handled gracefully, where in Safari, it
  122. * produces additional error, that is jumping outside of the original
  123. * Promise chain and bubbles up to the `unhandledRejection` handler, that
  124. * we then captures as error.
  125. *
  126. * Ref: https://bugs.webkit.org/show_bug.cgi?id=215771
  127. */
  128. 'AbortError: Fetch is aborted',
  129. /**
  130. * React internal error thrown when something outside react modifies the DOM
  131. * This is usually because of a browser extension or chrome translate page
  132. */
  133. "NotFoundError: Failed to execute 'removeChild' on 'Node': The node to be removed is not a child of this node.",
  134. "NotFoundError: Failed to execute 'insertBefore' on 'Node': The node before which the new node is to be inserted is not a child of this node.",
  135. ],
  136. beforeBreadcrumb(crumb) {
  137. const isFetch = crumb.category === 'fetch' || crumb.category === 'xhr';
  138. // Ignore
  139. if (
  140. isFetch &&
  141. IGNORED_BREADCRUMB_FETCH_HOSTS.some(host => crumb.data?.url?.includes(host))
  142. ) {
  143. return null;
  144. }
  145. return crumb;
  146. },
  147. beforeSend(event, _hint) {
  148. if (isFilteredRequestErrorEvent(event) || isEventWithFileUrl(event)) {
  149. return null;
  150. }
  151. handlePossibleUndefinedResponseBodyErrors(event);
  152. addEndpointTagToRequestError(event);
  153. return event;
  154. },
  155. });
  156. if (process.env.NODE_ENV !== 'production') {
  157. if (sentryConfig.environment === 'development') {
  158. import('@spotlightjs/spotlight').then(Spotlight => {
  159. /* #__PURE__ */ Spotlight.init();
  160. });
  161. }
  162. }
  163. // Event processor to fill the debug_meta field with debug IDs based on the
  164. // files the error touched. (files inside the stacktrace)
  165. const debugIdPolyfillEventProcessor = async (event: Event, hint: Sentry.EventHint) => {
  166. if (!(hint.originalException instanceof Error)) {
  167. return event;
  168. }
  169. try {
  170. const debugIdMap = await getErrorDebugIds(hint.originalException);
  171. // Fill debug_meta information
  172. event.debug_meta = {};
  173. event.debug_meta.images = [];
  174. const images = event.debug_meta.images;
  175. Object.keys(debugIdMap).forEach(filename => {
  176. images.push({
  177. type: 'sourcemap',
  178. code_file: filename,
  179. debug_id: debugIdMap[filename],
  180. });
  181. });
  182. } catch (e) {
  183. event.extra = event.extra || {};
  184. event.extra.debug_id_fetch_error = String(e);
  185. }
  186. return event;
  187. };
  188. debugIdPolyfillEventProcessor.id = 'debugIdPolyfillEventProcessor';
  189. Sentry.addGlobalEventProcessor(debugIdPolyfillEventProcessor);
  190. // Track timeOrigin Selection by the SDK to see if it improves transaction durations
  191. Sentry.addGlobalEventProcessor((event: Sentry.Event, _hint?: Sentry.EventHint) => {
  192. event.tags = event.tags || {};
  193. event.tags['timeOrigin.mode'] = _browserPerformanceTimeOriginMode;
  194. return event;
  195. });
  196. if (userIdentity) {
  197. Sentry.setUser(userIdentity);
  198. }
  199. if (window.__SENTRY__VERSION) {
  200. Sentry.setTag('sentry_version', window.__SENTRY__VERSION);
  201. }
  202. const {customerDomain} = window.__initialData;
  203. if (customerDomain) {
  204. Sentry.setTag('isCustomerDomain', 'yes');
  205. Sentry.setTag('customerDomain.organizationUrl', customerDomain.organizationUrl);
  206. Sentry.setTag('customerDomain.sentryUrl', customerDomain.sentryUrl);
  207. Sentry.setTag('customerDomain.subdomain', customerDomain.subdomain);
  208. }
  209. }
  210. export function isFilteredRequestErrorEvent(event: Event): boolean {
  211. const exceptionValues = event.exception?.values;
  212. if (!exceptionValues) {
  213. return false;
  214. }
  215. // In case there's a chain, we take the last entry, because that's the one
  216. // passed to `captureException`, and the one right before that, since
  217. // `RequestError`s are used as the main error's `cause` value in
  218. // `handleXhrErrorResponse`
  219. const mainAndMaybeCauseErrors = exceptionValues.slice(-2);
  220. for (const error of mainAndMaybeCauseErrors) {
  221. const {type = '', value = ''} = error;
  222. const is200 =
  223. ['RequestError'].includes(type) && !!value.match('(GET|POST|PUT|DELETE) .* 200');
  224. const is400 =
  225. ['BadRequestError', 'RequestError'].includes(type) &&
  226. !!value.match('(GET|POST|PUT|DELETE) .* 400');
  227. const is401 =
  228. ['UnauthorizedError', 'RequestError'].includes(type) &&
  229. !!value.match('(GET|POST|PUT|DELETE) .* 401');
  230. const is403 =
  231. ['ForbiddenError', 'RequestError'].includes(type) &&
  232. !!value.match('(GET|POST|PUT|DELETE) .* 403');
  233. const is404 =
  234. ['NotFoundError', 'RequestError'].includes(type) &&
  235. !!value.match('(GET|POST|PUT|DELETE) .* 404');
  236. const is429 =
  237. ['TooManyRequestsError', 'RequestError'].includes(type) &&
  238. !!value.match('(GET|POST|PUT|DELETE) .* 429');
  239. if (is200 || is400 || is401 || is403 || is404 || is429) {
  240. return true;
  241. }
  242. }
  243. return false;
  244. }
  245. export function isEventWithFileUrl(event: Event): boolean {
  246. return !!event.request?.url?.startsWith('file://');
  247. }
  248. /** Tag and set fingerprint for UndefinedResponseBodyError events */
  249. function handlePossibleUndefinedResponseBodyErrors(event: Event): void {
  250. // One or both of these may be undefined, depending on the type of event
  251. const [mainError, causeError] = event.exception?.values?.slice(-2).reverse() || [];
  252. const mainErrorIsURBE = mainError?.type === 'UndefinedResponseBodyError';
  253. const causeErrorIsURBE = causeError?.type === 'UndefinedResponseBodyError';
  254. if (mainErrorIsURBE || causeErrorIsURBE) {
  255. mainError.type = 'UndefinedResponseBodyError';
  256. event.tags = {...event.tags, undefinedResponseBody: true};
  257. event.fingerprint = mainErrorIsURBE
  258. ? ['UndefinedResponseBodyError as main error']
  259. : ['UndefinedResponseBodyError as cause error'];
  260. }
  261. }
  262. export function addEndpointTagToRequestError(event: Event): void {
  263. const errorMessage = event.exception?.values?.[0].value || '';
  264. // The capturing group here turns `GET /dogs/are/great 500` into just `GET /dogs/are/great`
  265. const requestErrorRegex = new RegExp('^([A-Za-z]+ (/[^/]+)+/) \\d+$');
  266. const messageMatch = requestErrorRegex.exec(errorMessage);
  267. if (messageMatch) {
  268. event.tags = {...event.tags, endpoint: messageMatch[1]};
  269. }
  270. }
  271. /**
  272. * Custom Sentry integration to instrument JSON.stringify
  273. * and JSON.parse with spans.
  274. */
  275. const JSONSerializationIntegration = (() => {
  276. let patched = false;
  277. return {
  278. name: 'JSONSerialization',
  279. setupOnce(): void {
  280. if (patched) {
  281. return;
  282. }
  283. JSON.stringify = new Proxy(JSON.stringify, {
  284. apply(target, thisArg, args) {
  285. // Only attach JSON serialization spans to transactions for now
  286. const activeSpan = Sentry.getActiveSpan();
  287. if (!activeSpan) {
  288. return target.apply(thisArg, args);
  289. }
  290. return Sentry.startSpan({op: 'serialize', name: 'JSON.stringify'}, () =>
  291. target.apply(thisArg, args)
  292. );
  293. },
  294. });
  295. JSON.parse = new Proxy(JSON.parse, {
  296. apply(target, thisArg, args) {
  297. // Only attach JSON serialization spans to transactions for now
  298. const activeSpan = Sentry.getActiveSpan();
  299. if (!activeSpan) {
  300. return target.apply(thisArg, args);
  301. }
  302. return Sentry.startSpan({op: 'parse', name: 'JSON.parse'}, () =>
  303. target.apply(thisArg, args)
  304. );
  305. },
  306. });
  307. patched = true;
  308. },
  309. };
  310. }) satisfies IntegrationFn;