First, install local Certificate Authority:
# Install mkcert on macOS
brew install mkcert
brew install nss
For other operating systems, see the mkcert installation guide.
Then, create a local Certificate Authority and generate SSL certificates for the Helper development project:
# Generate SSL certificates
bin/generate_ssl_certificates
Copy apps/nextjs/.env.local.sample
to apps/nextjs/.env.local
.
Clerk
- Go to clerk.com and create a new app.
- Name the app and set login methods to: Email, Google, Apple, GitHub.
- Under "Configure > Email, phone, username", turn on "Personal information > Name"
- Under "Configure > Organization Management", turn on "Enable organizations"
- Under "Configure > API Keys", add
CLERK_SECRET_KEY
andNEXT_PUBLIC_CLERK_PUBLISHABLE_KEY
to your.env.local
file. - Under "Users", create a user with email
[email protected]
and passwordpassword
. Optionally create other users, e.g. with your email. - Add the user ID(s) to your
.env.local
file asCLERK_INITIAL_USER_IDS
. - Under "Organizations", create a new organization and add your user(s) to the "Members" list.
- Add the organization ID to your
.env.local
file asCLERK_INITIAL_ORGANIZATION_ID
.
OpenAI
- Create an account at openai.com.
- Create a new API key at platform.openai.com/api-keys.
- Add the API key to your
.env.local
file asOPENAI_API_KEY
.
Ably
- Go to ably.com and sign up or log in.
- Create a new app.
- Go to the "API Keys" tab for your new app.
- Copy the API key that has all capabilities enabled (usually the first one).
- Add the API key to your
.env.local
file asABLY_API_KEY
.
The app will start with placeholder values for Google services and Resend, but set these up if you want to test sending and receiving emails.
Resend (transactional emails)
- Go to resend.com and sign up or log in.
- Navigate to "API Keys".
- Click "Create API Key". Give it a name (e.g., "Helper Dev") and grant it "Sending access" permission.
- Add the API key to your
.env.local
file asRESEND_API_KEY
.
Google OAuth (sending via Gmail)
- Go to the Google Cloud Console.
- Create a new project or select an existing one.
- Navigate to "APIs & Services" > "Credentials".
- Click "Create Credentials" and select "OAuth client ID".
- Choose "Web application" as the application type.
- Add
https://helperai.dev/api/connect/google/callback
to the "Authorized redirect URIs". - Click "Create". You will be shown the Client ID and Client Secret.
- Add these values to your
.env.local
file asGOOGLE_CLIENT_ID
andGOOGLE_CLIENT_SECRET
. - Navigate to "APIs & Services" > "Library".
- Search for "Gmail API" and enable it for your project.
- Navigate to "APIs & Services" > "OAuth consent screen".
- Configure the consent screen. Under "Data access", add the
.../auth/gmail.send
scope. - Add your Google account email address as a Test User under "Audience" while the app is in testing mode.
Google Pub/Sub (receiving from Gmail)
This setup allows the app to receive real-time notifications (e.g., new emails) from Gmail during local development.
1. Set up and start Serveo, ngrok or similar to get a public forwarding URL pointing to localhost:3010
.
2. Set up Google Pub/Sub:
- Go to the Google Cloud Console and select the same project used for Google OAuth.
- Navigate to "Pub/Sub" > "Topics".
- Click "Create Topic". Give it a name (e.g.,
helper-email-dev
) and click "Create". - Add the topic name to your
.env.local
file asGOOGLE_PUBSUB_TOPIC_NAME
. - Grant the Gmail service account permission to publish to this topic:
- Go back to the "Topics" list and check the box next to your new topic.
- Click "Permissions" in the info panel on the right (or click the topic name and go to the Permissions tab).
- Click "Add Principal".
- In the "New principals" field, enter
[email protected]
. - Assign the role "Pub/Sub Publisher".
- Click "Save".
- Create a service account for the push subscription authentication:
- Go to "IAM & Admin" > "Service Accounts".
- Click "Create Service Account".
- Give it a name (e.g.,
pubsub-push-auth-dev
) and an ID. Click "Create and Continue". - Grant the service account the "Service Account Token Creator" role (
roles/iam.serviceAccountTokenCreator
). This allows it to generate OIDC tokens for authentication. Click "Continue" and "Done". - Add the service account email (e.g.,
pubsub-push-auth-dev@<your-project-id>.iam.gserviceaccount.com
) to your.env.local
file asGOOGLE_PUBSUB_CLAIM_EMAIL
- Create the push subscription:
- Navigate to "Pub/Sub" > "Subscriptions".
- Click "Create Subscription".
- Give it an ID (e.g.,
helper-email-subscription-dev
). - Select the Pub/Sub topic you created earlier (e.g.,
helper-email-dev
). - Under "Delivery type", select "Push".
- In the "Endpoint URL" field, enter your forwarding URL followed by the webhook path:
https://<your-forwarding-url>/api/webhooks/gmail
(replace<your-forwarding-url>
with the URL from step 1). - Check the box for "Enable authentication".
- Select the service account you just created (e.g.,
pubsub-push-auth-dev@<your-project-id>.iam.gserviceaccount.com
). - Leave other settings as default and click "Create".
Now linking your Gmail account from Settings → Integrations should grant Gmail access and webhooks for new emails should arrive on your local server.
Run the application and access it at helperai.dev:
bin/dev
# Run `LOCAL_DETACHED=false make local` first if you prefer to run Docker services in the foreground
Seed the database with sample data: (email/password: [email protected]
/ password
and user1,...,[email protected]
/ password
)
npm run db:reset
Generate/run database migrations:
npm run db:generate
npm run db:migrate
# Run all tests
npm test
# Run a specific test file
(cd apps/nextjs && npx vitest run tests/inngest/functions/postEmailToGmail.test.ts)
This project uses Inngest for background tasks. You can view the dashboard / development server at http://localhost:8288/.
While email sending/receiving in a customer's inbox happens through Gmail, all other emails get sent using Resend and are defined at src/emails
. To preview an email, you can visit http://localhost:3060. You can also send yourself a preview email (note that some assets like images may not properly display when sending a preview email during local development):
These integrations are optional but add more functionality to Helper.
Slack
Enables various features including messaging channels when tickets are received, messaging users when tickets are assigned, and an AI agent.
- Set up and start Serveo, ngrok or similar to get a public forwarding URL pointing to
localhost:3010
. - Go to api.slack.com/apps and create a new app.
- Under "Basic Information", find your app credentials.
- Add the following values to your
.env.local
file:SLACK_CLIENT_ID
: Client ID from Basic InformationSLACK_CLIENT_SECRET
: Client Secret from Basic InformationSLACK_SIGNING_SECRET
: Signing Secret from Basic Information
- Under "OAuth & Permissions", add all scopes listed in
apps/nextjs/src/lib/slack/constants.ts
- Under "Event Subscriptions", add
https://<your-forwarding-url>/api/webhooks/slack/event
as the event request URL - Also under "Event Subscriptions", subscribe to the following bot events:
app_mention
assistant_thread_started
message.channels
message.im
tokens_revoked
- Under "Interactivity & Shortcuts", add
https://<your-forwarding-url>/api/webhooks/slack/response
as the interactivity request URL - Under "Agents & AI Apps", check "Agent or Assistant"
- Under "App Home", check "Always Show My Bot as Online"
- Install the app to your workspace.
GitHub
Enables creating GitHub issues from tickets and replying to the customer when the issue is closed.
- Go to github.com/settings/apps and click "New GitHub App".
- Fill in the required fields, including a name for your app.
- Set the Callback URL to
https://<your-forwarding-url>/api/connect/github/callback
- Also set the post-installation Setup URL to
https://<your-forwarding-url>/api/connect/github/callback
and check "Redirect on update" - Set the following permissions:
- Repository permissions:
- Issues: Read & write
- Account permissions:
- Email addresses: Read-only
- Repository permissions:
- After creating the app, note the App ID and generate a private key.
- Add the following values to your
.env.local
file:GITHUB_APP_SLUG
: The slug of your GitHub app (from the URL; it should be a dasherized version of your app's name)GITHUB_APP_ID
: The App ID found in the app settingsGITHUB_CLIENT_SECRET
: The Client Secret from the app settingsGITHUB_PRIVATE_KEY
: The contents of the private key file you downloaded
Jina
Enables the widget to read the current page for better AI context.
- Go to jina.ai and create an account or log in.
- Navigate to the API section to generate an API token.
- Add the token to your
.env.local
file asJINA_API_TOKEN
.
Firecrawl
Enables linking an existing knowledge base website for the AI to reference.
- Go to firecrawl.dev and create an account or log in.
- Generate an API key from your account settings or dashboard.
- Add the API key to your
.env.local
file asFIRECRAWL_API_KEY
.
Asset Proxy
Enables passing email assets through an intermediate server to increase security.
- Set up a proxy server with HMAC authentication. Use the following CloudFlare Worker script for reference:
const SECRET_KEY = "<secret key>";
const EXPIRY_TIME = 300; // Signature expiry time in seconds (5 minutes)
async function verifySignature(request) {
const url = new URL(request.url);
const targetUrl = url.searchParams.get("url");
const passedSignature = url.searchParams.get("verify");
const expires = url.searchParams.get("expires");
if (!targetUrl || !passedSignature || !expires) {
return false;
}
const now = Math.floor(Date.now() / 1000); // Current time in seconds
if (now > parseInt(expires, 10)) {
return false; // Expired request
}
// Compute expected HMAC signature
const encoder = new TextEncoder();
const key = await crypto.subtle.importKey(
"raw",
encoder.encode(SECRET_KEY),
{ name: "HMAC", hash: "SHA-256" },
false,
["sign"],
);
const dataToSign = `${targetUrl}:${expires}`;
const signatureData = encoder.encode(dataToSign);
const signatureBuffer = await crypto.subtle.sign("HMAC", key, signatureData);
const expectedSignature = btoa(String.fromCharCode(...new Uint8Array(signatureBuffer)))
.replace(/\+/g, "-")
.replace(/\//g, "_")
.replace(/=+$/, ""); // URL-safe Base64 encoding
return expectedSignature === passedSignature;
}
export default {
async fetch(request) {
if (!(await verifySignature(request))) {
return new Response("Forbidden: Invalid or expired signature", { status: 403 });
}
const url = new URL(request.url);
const targetUrl = url.searchParams.get("url");
try {
const response = await fetch(targetUrl, {
method: request.method,
headers: request.headers,
});
const newHeaders = new Headers(response.headers);
const allowedOrigins = ["https://helper.ai", "https://helperai.dev"];
const origin = request.headers.get("Origin");
if (allowedOrigins.includes(origin)) {
newHeaders.set("Access-Control-Allow-Origin", origin);
}
newHeaders.set("Access-Control-Allow-Methods", "GET");
newHeaders.set("Access-Control-Allow-Headers", "*");
newHeaders.set("X-Proxy-By", "Helper Content Proxy");
return new Response(response.body, {
status: response.status,
headers: newHeaders,
});
} catch (error) {
return new Response(`Error: ${error.message}`, { status: 500 });
}
},
};
- Add the following values to your
.env.local
file:PROXY_URL
: The URL of your proxy serverPROXY_SECRET_KEY
: The same secret key you set in the script
Sentry
Enables error reporting and performance tracing.
- Go to sentry.io and create an account or log in.
- Create a new project for a Next.js application.
- In the project settings, find the DSN (Data Source Name).
- Add the DSN to your
.env.local
file asNEXT_PUBLIC_SENTRY_DSN
.