feat: Implement user passcode setting and verification functionality with new handler and service methods.

This commit is contained in:
paritosh18
2026-02-10 15:14:11 +05:30
parent 68facd1146
commit 62e7379306
3 changed files with 97 additions and 0 deletions

View File

@@ -62,6 +62,22 @@ setPasscodeForMobile:
path: /user/set-passcode
method: post
verifyPasscode:
handler: src/modules/user/handlers/authentication/verifyPasscode.handler
memorySize: 384
package:
patterns:
- 'src/modules/user/**'
- ${file(./serverless/patterns/base.yml):pattern1}
- ${file(./serverless/patterns/base.yml):pattern2}
- ${file(./serverless/patterns/base.yml):pattern3}
- ${file(./serverless/patterns/base.yml):pattern4}
events:
- httpApi:
path: /user/verify-passcode
method: post
setUserInterest:
handler: src/modules/user/handlers/authentication/SetuserInterest.handler
memorySize: 384

View File

@@ -0,0 +1,62 @@
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
import { prismaClient } from '../../../../common/database/prisma.lambda.service';
import { verifyUserToken } from '../../../../common/middlewares/jwt/authForUser';
import { safeHandler } from '../../../../common/utils/handlers/safeHandler';
import ApiError from '../../../../common/utils/helper/ApiError';
import { UserService } from '../../services/user.service';
const userService = new UserService(prismaClient);
export const handler = safeHandler(async (
event: APIGatewayProxyEvent,
context?: Context
): Promise<APIGatewayProxyResult> => {
// Extract token from headers
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
if (!token) {
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
}
// Authenticate user using verifyUserToken
const userInfo = await verifyUserToken(token);
const userId = userInfo.id;
if (Number.isNaN(userId)) {
throw new ApiError(400, 'User id must be a number');
}
// Parse request body
let body: { passcode?: string; };
try {
body = event.body ? JSON.parse(event.body) : {};
} catch (error) {
throw new ApiError(400, 'Invalid JSON in request body');
}
const { passcode } = body;
// Validate required fields
if (!passcode) {
throw new ApiError(400, 'passcode is required');
}
// Verify the passcode
const isValid = await userService.verifyUserPasscode(userId, passcode);
if (!isValid) {
throw new ApiError(400, 'Invalid passcode');
}
return {
statusCode: 200,
headers: {
'Content-Type': 'application/json',
'Access-Control-Allow-Origin': '*',
},
body: JSON.stringify({
success: true,
message: 'Passcode verified successfully',
}),
};
});

View File

@@ -279,6 +279,25 @@ export class UserService {
return updatedUser;
}
async verifyUserPasscode(userId: number, passcode: string): Promise<boolean> {
const user = await this.prisma.user.findUnique({
where: { id: userId, isActive: true },
select: { userPasscode: true },
});
if (!user || !user.userPasscode) {
throw new ApiError(404, 'User passcode not found');
}
const isMatch = await bcrypt.compare(passcode, user.userPasscode);
if (!isMatch) {
return false;
}
return true;
}
async setUserInterests(userId: number, interest_Xid: number[]): Promise<void> {
// Remove existing interests
await this.prisma.userInterests.deleteMany({