'use client'; import DOMPurify from 'dompurify'; export interface ParsedEmail { subject: string | null; from: string | null; to: string | null; cc: string | null; bcc: string | null; date: Date | null; html: string | null; text: string | null; attachments: Array<{ filename: string; contentType: string; size: number; }>; headers: Record; } export async function decodeEmail(emailContent: string): Promise { try { // Ensure the email content is properly formatted const formattedContent = emailContent?.trim(); if (!formattedContent) { return { subject: null, from: null, to: null, cc: null, bcc: null, date: null, html: null, text: 'No content available', attachments: [], headers: {} }; } const response = await fetch('/api/parse-email', { method: 'POST', headers: { 'Content-Type': 'application/json', }, body: JSON.stringify({ email: formattedContent }), }); const data = await response.json(); if (!response.ok) { console.error('API Error:', data); return { subject: null, from: null, to: null, cc: null, bcc: null, date: null, html: null, text: data.error || 'Failed to parse email', attachments: [], headers: {} }; } // If we have a successful response but no content if (!data.html && !data.text) { return { ...data, date: data.date ? new Date(data.date) : null, html: null, text: 'No content available', attachments: data.attachments || [], headers: data.headers || {} }; } return { ...data, date: data.date ? new Date(data.date) : null, text: data.text || null, html: data.html || null, attachments: data.attachments || [], headers: data.headers || {} }; } catch (error) { console.error('Error parsing email:', error); return { subject: null, from: null, to: null, cc: null, bcc: null, date: null, html: null, text: 'Error parsing email content', attachments: [], headers: {} }; } } /** * Cleans HTML content by removing potentially harmful elements while preserving styling. * This is the centralized HTML sanitization function to be used across the application. * * Key features: * - Safely removes scripts, iframes, and other potentially harmful elements * - Optionally preserves and scopes CSS styles to prevent them from affecting the rest of the page * - Fixes self-closing tags that might break in React or contentEditable contexts * - Can add a wrapper div with isolation for additional safety * * @param html HTML content to sanitize * @param options Configuration options: * - preserveStyles: Whether to keep ${processedHtml} `; } else { return `${processedHtml}`; } } // Just wrap the content if needed if (defaultOptions.addWrapper) { return ``; } return processedHtml; } catch (error) { console.error('Error cleaning HTML:', error); // Return something safe in case of error return `
Error processing HTML content
`; } }