Made mobile register and verify otp and submit personal info apis and added interest type images in the seeder

This commit is contained in:
2026-01-23 17:56:46 +05:30
parent 834d16a76e
commit 112fdab040
8 changed files with 174 additions and 26 deletions

View File

@@ -296,7 +296,7 @@ export class HostService {
async verifyHostOtp(email: string, otp: string): Promise<boolean> {
const user = await this.prisma.user.findUnique({
where: { emailAddress: email },
where: { emailAddress: email, isActive: true },
select: {
id: true,
emailAddress: true,

View File

@@ -44,13 +44,9 @@ export const handler = safeHandler(async (
const transactionResult = await prismaClient.$transaction(async (tx) => {
const user = await tx.user.findFirst({
where: { mobileNumber: mobileNumber, isActive: true },
select: { emailAddress: true, id: true, userPasscode: true, mobileNumber: true },
select: { id: true, userPasscode: true, mobileNumber: true },
});
if (user && user.userPasscode) {
throw new ApiError(409, 'User is already registered. Please login.');
}
let newUserLocal;
const referenceNumber = await generateUserRefNumber(tx);

View File

@@ -0,0 +1,51 @@
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
import { safeHandler } from '../../../../common/utils/handlers/safeHandler';
import { prismaClient } from '../../../../common/database/prisma.lambda.service';
import { UserService } from '../../services/user.service';
import ApiError from '../../../../common/utils/helper/ApiError';
import { TokenService } from '../../../host/services/token.service';
const userService = new UserService(prismaClient);
const tokenService = new TokenService(prismaClient);
export const handler = safeHandler(async (
event: APIGatewayProxyEvent,
context?: Context
): Promise<APIGatewayProxyResult> => {
// Parse request body
let body: { mobileNumber?: string; otp?: string };
try {
body = event.body ? JSON.parse(event.body) : {};
} catch (error) {
throw new ApiError(400, 'Invalid JSON in request body');
}
const { mobileNumber, otp } = body;
if (!mobileNumber || !otp) {
throw new ApiError(400, 'Mobile number and OTP are required');
}
await userService.verifyHostOtp(mobileNumber, otp);
const user = await userService.getUserByMobileNumber(mobileNumber);
const generateTokenForUser = await tokenService.generateAuthToken(
user.id
);
return {
statusCode: 200,
headers: {
'Content-Type': 'application/json',
'Access-Control-Allow-Origin': '*',
},
body: JSON.stringify({
success: true,
message: 'OTP verified successfully',
accessToken: generateTokenForUser.access.token,
refreshToken: generateTokenForUser.refresh.token,
data: null,
}),
};
});

View File

@@ -2,6 +2,7 @@ import { Injectable } from '@nestjs/common';
import { PrismaClient, User } from '@prisma/client';
import { AddPersonalInfoDTO } from '../dto/user.dto';
import ApiError from '@/common/utils/helper/ApiError';
import * as bcrypt from 'bcryptjs';
@Injectable()
export class UserService {
constructor(private prisma: PrismaClient) { }
@@ -12,16 +13,68 @@ export class UserService {
});
}
async addPersonalInfo(data: AddPersonalInfoDTO){
async addPersonalInfo(data: AddPersonalInfoDTO) {
return await this.prisma.$transaction(async (tx) => {
const addPersonalInfo = await tx.user.create({
const addPersonalInfo = await tx.user.create({
data,
});
});
if (!addPersonalInfo) {
if (!addPersonalInfo) {
throw new ApiError(400, 'Failed to add personal info');
}
})
}
}
})
}
async getUserByMobileNumber(mobileNumber: string): Promise<User | null> {
return this.prisma.user.findFirst({
where: { mobileNumber: mobileNumber, isActive: true },
});
}
async verifyHostOtp(mobileNumber: string, otp: string): Promise<boolean> {
const user = await this.prisma.user.findFirst({
where: { mobileNumber: mobileNumber, isActive: true },
select: {
id: true,
mobileNumber: true,
UserOtp: {
where: { isActive: true, isVerified: false },
orderBy: { createdAt: 'desc' },
take: 1,
},
},
});
if (!user) {
throw new ApiError(404, 'User not found.');
}
const userOtp = user.UserOtp[0];
if (!userOtp) {
throw new ApiError(400, 'No OTP found.');
}
if (new Date() > userOtp.expiresOn) {
throw new ApiError(400, 'OTP has expired.');
}
const isMatch = await bcrypt.compare(otp, userOtp.otpCode);
if (!isMatch) {
throw new ApiError(400, 'Invalid OTP.');
}
await this.prisma.userOtp.update({
where: { id: userOtp.id },
data: {
isVerified: true,
verifiedOn: new Date(),
isActive: false,
},
});
return true;
}
}