Made mobile register and verify otp and submit personal info apis and added interest type images in the seeder
This commit is contained in:
@@ -296,7 +296,7 @@ export class HostService {
|
||||
|
||||
async verifyHostOtp(email: string, otp: string): Promise<boolean> {
|
||||
const user = await this.prisma.user.findUnique({
|
||||
where: { emailAddress: email },
|
||||
where: { emailAddress: email, isActive: true },
|
||||
select: {
|
||||
id: true,
|
||||
emailAddress: true,
|
||||
|
||||
@@ -44,13 +44,9 @@ export const handler = safeHandler(async (
|
||||
const transactionResult = await prismaClient.$transaction(async (tx) => {
|
||||
const user = await tx.user.findFirst({
|
||||
where: { mobileNumber: mobileNumber, isActive: true },
|
||||
select: { emailAddress: true, id: true, userPasscode: true, mobileNumber: true },
|
||||
select: { id: true, userPasscode: true, mobileNumber: true },
|
||||
});
|
||||
|
||||
if (user && user.userPasscode) {
|
||||
throw new ApiError(409, 'User is already registered. Please login.');
|
||||
}
|
||||
|
||||
let newUserLocal;
|
||||
|
||||
const referenceNumber = await generateUserRefNumber(tx);
|
||||
|
||||
51
src/modules/user/handlers/authentication/verifyOtpForUser.ts
Normal file
51
src/modules/user/handlers/authentication/verifyOtpForUser.ts
Normal file
@@ -0,0 +1,51 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { safeHandler } from '../../../../common/utils/handlers/safeHandler';
|
||||
import { prismaClient } from '../../../../common/database/prisma.lambda.service';
|
||||
import { UserService } from '../../services/user.service';
|
||||
import ApiError from '../../../../common/utils/helper/ApiError';
|
||||
import { TokenService } from '../../../host/services/token.service';
|
||||
|
||||
const userService = new UserService(prismaClient);
|
||||
const tokenService = new TokenService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Parse request body
|
||||
let body: { mobileNumber?: string; otp?: string };
|
||||
|
||||
try {
|
||||
body = event.body ? JSON.parse(event.body) : {};
|
||||
} catch (error) {
|
||||
throw new ApiError(400, 'Invalid JSON in request body');
|
||||
}
|
||||
|
||||
const { mobileNumber, otp } = body;
|
||||
|
||||
if (!mobileNumber || !otp) {
|
||||
throw new ApiError(400, 'Mobile number and OTP are required');
|
||||
}
|
||||
|
||||
await userService.verifyHostOtp(mobileNumber, otp);
|
||||
const user = await userService.getUserByMobileNumber(mobileNumber);
|
||||
const generateTokenForUser = await tokenService.generateAuthToken(
|
||||
user.id
|
||||
);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'OTP verified successfully',
|
||||
accessToken: generateTokenForUser.access.token,
|
||||
refreshToken: generateTokenForUser.refresh.token,
|
||||
data: null,
|
||||
}),
|
||||
};
|
||||
});
|
||||
|
||||
@@ -2,6 +2,7 @@ import { Injectable } from '@nestjs/common';
|
||||
import { PrismaClient, User } from '@prisma/client';
|
||||
import { AddPersonalInfoDTO } from '../dto/user.dto';
|
||||
import ApiError from '@/common/utils/helper/ApiError';
|
||||
import * as bcrypt from 'bcryptjs';
|
||||
@Injectable()
|
||||
export class UserService {
|
||||
constructor(private prisma: PrismaClient) { }
|
||||
@@ -12,16 +13,68 @@ export class UserService {
|
||||
});
|
||||
}
|
||||
|
||||
async addPersonalInfo(data: AddPersonalInfoDTO){
|
||||
async addPersonalInfo(data: AddPersonalInfoDTO) {
|
||||
return await this.prisma.$transaction(async (tx) => {
|
||||
|
||||
const addPersonalInfo = await tx.user.create({
|
||||
const addPersonalInfo = await tx.user.create({
|
||||
data,
|
||||
});
|
||||
});
|
||||
|
||||
if (!addPersonalInfo) {
|
||||
if (!addPersonalInfo) {
|
||||
throw new ApiError(400, 'Failed to add personal info');
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
})
|
||||
}
|
||||
|
||||
async getUserByMobileNumber(mobileNumber: string): Promise<User | null> {
|
||||
return this.prisma.user.findFirst({
|
||||
where: { mobileNumber: mobileNumber, isActive: true },
|
||||
});
|
||||
}
|
||||
|
||||
async verifyHostOtp(mobileNumber: string, otp: string): Promise<boolean> {
|
||||
const user = await this.prisma.user.findFirst({
|
||||
where: { mobileNumber: mobileNumber, isActive: true },
|
||||
select: {
|
||||
id: true,
|
||||
mobileNumber: true,
|
||||
UserOtp: {
|
||||
where: { isActive: true, isVerified: false },
|
||||
orderBy: { createdAt: 'desc' },
|
||||
take: 1,
|
||||
},
|
||||
},
|
||||
});
|
||||
|
||||
if (!user) {
|
||||
throw new ApiError(404, 'User not found.');
|
||||
}
|
||||
|
||||
const userOtp = user.UserOtp[0];
|
||||
|
||||
if (!userOtp) {
|
||||
throw new ApiError(400, 'No OTP found.');
|
||||
}
|
||||
|
||||
if (new Date() > userOtp.expiresOn) {
|
||||
throw new ApiError(400, 'OTP has expired.');
|
||||
}
|
||||
|
||||
const isMatch = await bcrypt.compare(otp, userOtp.otpCode);
|
||||
|
||||
if (!isMatch) {
|
||||
throw new ApiError(400, 'Invalid OTP.');
|
||||
}
|
||||
|
||||
await this.prisma.userOtp.update({
|
||||
where: { id: userOtp.id },
|
||||
data: {
|
||||
isVerified: true,
|
||||
verifiedOn: new Date(),
|
||||
isActive: false,
|
||||
},
|
||||
});
|
||||
|
||||
return true;
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user