Merge branch 'paritosh-main1' of http://git.wdipl.com/Mayank.Mishra/MinglarBackendNestJS into mayankSprint2

This commit is contained in:
2026-02-19 14:51:37 +05:30
2 changed files with 110 additions and 0 deletions

View File

@@ -46,6 +46,21 @@ verifyOtpForUser:
path: /user/verify-otp
method: post
generateAccessFromRefreshToken:
handler: src/modules/user/handlers/authentication/generateRefereshToAccess.handler
memorySize: 384
package:
patterns:
- 'src/modules/user/**'
- ${file(./serverless/patterns/base.yml):pattern1}
- ${file(./serverless/patterns/base.yml):pattern2}
- ${file(./serverless/patterns/base.yml):pattern3}
- ${file(./serverless/patterns/base.yml):pattern4}
events:
- httpApi:
path: /user/generate-access-from-refresh
method: post
setPasscodeForMobile:
handler: src/modules/user/handlers/authentication/setPasscodeForMobile.handler

View File

@@ -0,0 +1,95 @@
import {
APIGatewayProxyEvent,
APIGatewayProxyResult,
Context,
} from 'aws-lambda';
import { JwtPayload } from 'jsonwebtoken';
import { prismaClient } from '../../../../common/database/prisma.lambda.service';
import { safeHandler } from '../../../../common/utils/handlers/safeHandler';
import ApiError from '../../../../common/utils/helper/ApiError';
import { TokenService } from '../../../host/services/token.service';
const tokenService = new TokenService(prismaClient);
export const handler = safeHandler(
async (
event: APIGatewayProxyEvent,
context?: Context,
): Promise<APIGatewayProxyResult> => {
// Parse request body
let body: { refreshToken?: string };
try {
body = event.body ? JSON.parse(event.body) : {};
} catch (error) {
throw new ApiError(400, 'Invalid JSON in request body');
}
const { refreshToken } = body;
if (!refreshToken) {
throw new ApiError(400, 'Refresh token is required');
}
// Verify refresh token
const decodedToken = await tokenService.verifyRefreshToken(refreshToken);
if (!decodedToken || typeof decodedToken === 'string') {
throw new ApiError(401, 'Invalid or expired refresh token');
}
const payload = decodedToken as JwtPayload;
if (payload.type !== 'refresh') {
throw new ApiError(401, 'Token is not a refresh token');
}
const userId = payload.sub;
if (!userId) {
throw new ApiError(401, 'Invalid token payload');
}
// Check if user exists
const user = await prismaClient.user.findUnique({
where: { id: parseInt(userId, 10) },
select: { id: true, isActive: true },
});
if (!user || !user.isActive) {
throw new ApiError(401, 'User not found or inactive');
}
// Check if refresh token exists in database and is not blacklisted
const tokenRecord = await prismaClient.token.findFirst({
where: {
token: refreshToken,
userXid: parseInt(userId, 10),
tokenType: 'refresh',
isBlackListed: false,
},
});
if (!tokenRecord) {
throw new ApiError(401, 'Refresh token is invalid or blacklisted');
}
// Generate new access token
const newAccessToken = await tokenService.generateAuthToken(Number(userId));
return {
statusCode: 200,
headers: {
'Content-Type': 'application/json',
'Access-Control-Allow-Origin': '*',
},
body: JSON.stringify({
success: true,
message: 'Access token generated successfully',
accessToken: newAccessToken.access.token,
accessTokenExpires: newAccessToken.access.expires,
data: null,
}),
};
},
);