made the role based access system for the host panel
This commit is contained in:
60
src/modules/host/handlers/settings/getPermissionMasters.ts
Normal file
60
src/modules/host/handlers/settings/getPermissionMasters.ts
Normal file
@@ -0,0 +1,60 @@
|
||||
import {
|
||||
APIGatewayProxyEvent,
|
||||
APIGatewayProxyResult,
|
||||
Context,
|
||||
} from 'aws-lambda';
|
||||
|
||||
import { prismaClient } from '../../../../common/database/prisma.lambda.service';
|
||||
import { verifyHostToken } from '../../../../common/middlewares/jwt/authForHost';
|
||||
import { safeHandler } from '../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../common/utils/helper/ApiError';
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context,
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
|
||||
if (!token) {
|
||||
throw new ApiError(
|
||||
400,
|
||||
'This is a protected route. Please provide a valid token.',
|
||||
);
|
||||
}
|
||||
|
||||
await verifyHostToken(token);
|
||||
|
||||
const permissionMasters = await prismaClient.hostPermissionMasters.findMany({
|
||||
where: {
|
||||
isActive: true,
|
||||
deletedAt: null,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
permissionKey: true,
|
||||
permissionGroup: true,
|
||||
permissionSection: true,
|
||||
permissionAction: true,
|
||||
displayLabel: true,
|
||||
displayOrder: true,
|
||||
},
|
||||
orderBy: {
|
||||
displayOrder: 'asc',
|
||||
},
|
||||
});
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Permission masters fetched successfully',
|
||||
data: {
|
||||
permissionMasters,
|
||||
},
|
||||
}),
|
||||
};
|
||||
});
|
||||
111
src/modules/host/handlers/settings/inviteMember.ts
Normal file
111
src/modules/host/handlers/settings/inviteMember.ts
Normal file
@@ -0,0 +1,111 @@
|
||||
import {
|
||||
APIGatewayProxyEvent,
|
||||
APIGatewayProxyResult,
|
||||
Context,
|
||||
} from 'aws-lambda';
|
||||
|
||||
import { prismaClient } from '../../../../common/database/prisma.lambda.service';
|
||||
import { verifyHostToken } from '../../../../common/middlewares/jwt/authForHost';
|
||||
import { safeHandler } from '../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../common/utils/helper/ApiError';
|
||||
import { HostMemberService } from '../../services/hostMember.service';
|
||||
import { sendHostMemberInvitationEmail } from '../../services/sendHostMemberInvitationEmail.service';
|
||||
|
||||
const hostMemberService = new HostMemberService(prismaClient);
|
||||
|
||||
interface InviteMemberBody {
|
||||
emailAddress: string;
|
||||
roleXid: number;
|
||||
permissionMasterXid: number;
|
||||
activityXids: number[];
|
||||
}
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context,
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
|
||||
if (!token) {
|
||||
throw new ApiError(
|
||||
400,
|
||||
'This is a protected route. Please provide a valid token.',
|
||||
);
|
||||
}
|
||||
|
||||
const userInfo = await verifyHostToken(token);
|
||||
|
||||
let body: Partial<InviteMemberBody> = {};
|
||||
if (event.body) {
|
||||
try {
|
||||
body = JSON.parse(event.body);
|
||||
} catch {
|
||||
throw new ApiError(400, 'Invalid JSON body');
|
||||
}
|
||||
}
|
||||
|
||||
const emailAddress =
|
||||
typeof body.emailAddress === 'string' ? body.emailAddress.trim() : '';
|
||||
const roleXid = Number(body.roleXid);
|
||||
const permissionMasterXid = Number(body.permissionMasterXid);
|
||||
const activityXids = Array.isArray(body.activityXids)
|
||||
? body.activityXids
|
||||
: [];
|
||||
|
||||
if (!emailAddress) {
|
||||
throw new ApiError(400, 'emailAddress is required.');
|
||||
}
|
||||
|
||||
if (!Number.isInteger(roleXid) || roleXid <= 0) {
|
||||
throw new ApiError(400, 'roleXid is required.');
|
||||
}
|
||||
|
||||
if (!Number.isInteger(permissionMasterXid) || permissionMasterXid <= 0) {
|
||||
throw new ApiError(400, 'permissionMasterXid is required.');
|
||||
}
|
||||
|
||||
if (!activityXids.length) {
|
||||
throw new ApiError(400, 'activityXids is required.');
|
||||
}
|
||||
|
||||
const inviteResult = await hostMemberService.inviteMember({
|
||||
inviterUserXid: userInfo.id,
|
||||
emailAddress,
|
||||
roleXid,
|
||||
permissionMasterXid,
|
||||
activityXids,
|
||||
});
|
||||
|
||||
await sendHostMemberInvitationEmail(
|
||||
inviteResult.user.emailAddress ?? emailAddress,
|
||||
inviteResult.host.companyName,
|
||||
inviteResult.permissionMaster.role.roleName,
|
||||
inviteResult.permissionDetails.map((permission) => permission.displayLabel),
|
||||
inviteResult.activities.map((activity) => activity.activityTitle ?? `Activity #${activity.id}`),
|
||||
);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Host member invited successfully',
|
||||
data: {
|
||||
hostMemberId: inviteResult.hostMember.id,
|
||||
hostXid: inviteResult.hostMember.hostXid,
|
||||
userXid: inviteResult.hostMember.userXid,
|
||||
emailAddress: inviteResult.user.emailAddress,
|
||||
roleXid: inviteResult.hostMember.roleXid,
|
||||
permissionMasterXid: inviteResult.hostMember.hostRolePermissionMasterXid,
|
||||
permissionMasterXids: inviteResult.permissionMaster.permissionMasterXids,
|
||||
permissionLabels: inviteResult.permissionDetails.map((permission) => permission.displayLabel),
|
||||
activityXids: inviteResult.activities.map((activity) => activity.id),
|
||||
activityNames: inviteResult.activities.map((activity) => activity.activityTitle ?? null),
|
||||
memberStatus: inviteResult.hostMember.memberStatus,
|
||||
},
|
||||
}),
|
||||
};
|
||||
});
|
||||
81
src/modules/host/handlers/settings/saveRolePermissions.ts
Normal file
81
src/modules/host/handlers/settings/saveRolePermissions.ts
Normal file
@@ -0,0 +1,81 @@
|
||||
import {
|
||||
APIGatewayProxyEvent,
|
||||
APIGatewayProxyResult,
|
||||
Context,
|
||||
} from 'aws-lambda';
|
||||
|
||||
import { prismaClient } from '../../../../common/database/prisma.lambda.service';
|
||||
import { verifyHostToken } from '../../../../common/middlewares/jwt/authForHost';
|
||||
import { safeHandler } from '../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../common/utils/helper/ApiError';
|
||||
import { HostRolePermissionService } from '../../services/hostRolePermission.service';
|
||||
|
||||
const hostRolePermissionService = new HostRolePermissionService(prismaClient);
|
||||
|
||||
interface SaveRolePermissionsBody {
|
||||
roleXid: number;
|
||||
permissionMasterXids: number[];
|
||||
}
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context,
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
|
||||
if (!token) {
|
||||
throw new ApiError(
|
||||
400,
|
||||
'This is a protected route. Please provide a valid token.',
|
||||
);
|
||||
}
|
||||
|
||||
const userInfo = await verifyHostToken(token);
|
||||
|
||||
let body: Partial<SaveRolePermissionsBody> = {};
|
||||
if (event.body) {
|
||||
try {
|
||||
body = JSON.parse(event.body);
|
||||
} catch {
|
||||
throw new ApiError(400, 'Invalid JSON body');
|
||||
}
|
||||
}
|
||||
|
||||
const roleXid = Number(body.roleXid);
|
||||
const permissionMasterXids = Array.isArray(body.permissionMasterXids)
|
||||
? body.permissionMasterXids
|
||||
: [];
|
||||
|
||||
if (!Number.isInteger(roleXid) || roleXid <= 0) {
|
||||
throw new ApiError(400, 'roleXid is required.');
|
||||
}
|
||||
|
||||
if (!permissionMasterXids.length) {
|
||||
throw new ApiError(400, 'permissionMasterXids is required.');
|
||||
}
|
||||
|
||||
const result = await hostRolePermissionService.saveRolePermissions({
|
||||
hostUserXid: userInfo.id,
|
||||
roleXid,
|
||||
permissionMasterXids,
|
||||
});
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Role permissions saved successfully',
|
||||
data: {
|
||||
permissionMasterXid: result.saved.id,
|
||||
hostXid: result.saved.hostXid,
|
||||
roleXid: result.saved.roleXid,
|
||||
permissionMasterXids: result.saved.permissionMasterXids,
|
||||
selectedPermissions: result.selectedPermissions,
|
||||
},
|
||||
}),
|
||||
};
|
||||
});
|
||||
292
src/modules/host/services/hostMember.service.ts
Normal file
292
src/modules/host/services/hostMember.service.ts
Normal file
@@ -0,0 +1,292 @@
|
||||
import { Injectable } from '@nestjs/common';
|
||||
import { PrismaClient } from '@prisma/client';
|
||||
|
||||
import { ROLE, USER_STATUS } from '../../../common/utils/constants/common.constant';
|
||||
import ApiError from '../../../common/utils/helper/ApiError';
|
||||
|
||||
const ALLOWED_MEMBER_ROLES = new Set([ROLE.CO_ADMIN, ROLE.OPERATOR]);
|
||||
|
||||
function normalizeIdArray(values: unknown): number[] {
|
||||
if (!Array.isArray(values)) {
|
||||
return [];
|
||||
}
|
||||
|
||||
return Array.from(
|
||||
new Set(
|
||||
values
|
||||
.map((item) => Number(item))
|
||||
.filter((item) => Number.isInteger(item) && item > 0),
|
||||
),
|
||||
);
|
||||
}
|
||||
|
||||
@Injectable()
|
||||
export class HostMemberService {
|
||||
constructor(private prisma: PrismaClient) {}
|
||||
|
||||
async inviteMember(input: {
|
||||
inviterUserXid: number;
|
||||
emailAddress: string;
|
||||
roleXid: number;
|
||||
permissionMasterXid: number;
|
||||
activityXids: unknown;
|
||||
}) {
|
||||
const normalizedEmail = input.emailAddress.trim().toLowerCase();
|
||||
const roleXid = Number(input.roleXid);
|
||||
const permissionMasterXid = Number(input.permissionMasterXid);
|
||||
const activityXids = normalizeIdArray(input.activityXids);
|
||||
|
||||
if (!normalizedEmail) {
|
||||
throw new ApiError(400, 'emailAddress is required.');
|
||||
}
|
||||
|
||||
if (!Number.isInteger(roleXid) || !ALLOWED_MEMBER_ROLES.has(roleXid)) {
|
||||
throw new ApiError(
|
||||
400,
|
||||
'roleXid must be one of CO_ADMIN or OPERATOR.',
|
||||
);
|
||||
}
|
||||
|
||||
if (!Number.isInteger(permissionMasterXid) || permissionMasterXid <= 0) {
|
||||
throw new ApiError(400, 'permissionMasterXid is required.');
|
||||
}
|
||||
|
||||
if (!activityXids.length) {
|
||||
throw new ApiError(400, 'At least one activity is required.');
|
||||
}
|
||||
|
||||
return this.prisma.$transaction(async (tx) => {
|
||||
const host = await tx.hostHeader.findFirst({
|
||||
where: {
|
||||
userXid: input.inviterUserXid,
|
||||
isActive: true,
|
||||
deletedAt: null,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
companyName: true,
|
||||
userXid: true,
|
||||
},
|
||||
});
|
||||
|
||||
if (!host) {
|
||||
throw new ApiError(404, 'Host company not found for the logged-in user.');
|
||||
}
|
||||
|
||||
if (host.userXid !== input.inviterUserXid) {
|
||||
throw new ApiError(403, 'Only the host owner can invite members.');
|
||||
}
|
||||
|
||||
const permissionMaster = await tx.hostRolePermissionMasters.findFirst({
|
||||
where: {
|
||||
id: permissionMasterXid,
|
||||
hostXid: host.id,
|
||||
roleXid,
|
||||
isActive: true,
|
||||
deletedAt: null,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
hostXid: true,
|
||||
roleXid: true,
|
||||
permissionMasterXids: true,
|
||||
role: {
|
||||
select: {
|
||||
id: true,
|
||||
roleName: true,
|
||||
},
|
||||
},
|
||||
},
|
||||
});
|
||||
|
||||
if (!permissionMaster) {
|
||||
throw new ApiError(
|
||||
404,
|
||||
'Permission master not found for the selected host and role.',
|
||||
);
|
||||
}
|
||||
|
||||
const selectedPermissionMasterXids = normalizeIdArray(
|
||||
permissionMaster.permissionMasterXids,
|
||||
);
|
||||
|
||||
const permissionDetails = await tx.hostPermissionMasters.findMany({
|
||||
where: {
|
||||
id: { in: selectedPermissionMasterXids },
|
||||
isActive: true,
|
||||
deletedAt: null,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
permissionKey: true,
|
||||
permissionGroup: true,
|
||||
permissionSection: true,
|
||||
permissionAction: true,
|
||||
displayLabel: true,
|
||||
displayOrder: true,
|
||||
},
|
||||
orderBy: {
|
||||
displayOrder: 'asc',
|
||||
},
|
||||
});
|
||||
|
||||
if (permissionDetails.length !== selectedPermissionMasterXids.length) {
|
||||
throw new ApiError(
|
||||
400,
|
||||
'One or more saved permission XIDs no longer exist in the master table.',
|
||||
);
|
||||
}
|
||||
|
||||
const activities = await tx.activities.findMany({
|
||||
where: {
|
||||
id: { in: activityXids },
|
||||
hostXid: host.id,
|
||||
isActive: true,
|
||||
deletedAt: null,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
activityTitle: true,
|
||||
},
|
||||
});
|
||||
|
||||
if (activities.length !== activityXids.length) {
|
||||
throw new ApiError(
|
||||
400,
|
||||
'One or more selected activities are invalid for this host.',
|
||||
);
|
||||
}
|
||||
|
||||
const existingUser = await tx.user.findFirst({
|
||||
where: {
|
||||
emailAddress: normalizedEmail,
|
||||
isActive: true,
|
||||
deletedAt: null,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
emailAddress: true,
|
||||
roleXid: true,
|
||||
userStatus: true,
|
||||
},
|
||||
});
|
||||
|
||||
let user =
|
||||
existingUser ??
|
||||
(await tx.user.create({
|
||||
data: {
|
||||
emailAddress: normalizedEmail,
|
||||
roleXid: ROLE.HOST,
|
||||
userStatus: USER_STATUS.INVITED,
|
||||
isActive: true,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
emailAddress: true,
|
||||
roleXid: true,
|
||||
userStatus: true,
|
||||
},
|
||||
}));
|
||||
|
||||
if (existingUser && existingUser.roleXid !== ROLE.HOST) {
|
||||
user = await tx.user.update({
|
||||
where: { id: existingUser.id },
|
||||
data: {
|
||||
roleXid: ROLE.HOST,
|
||||
userStatus: USER_STATUS.INVITED,
|
||||
isActive: true,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
emailAddress: true,
|
||||
roleXid: true,
|
||||
userStatus: true,
|
||||
},
|
||||
});
|
||||
}
|
||||
|
||||
const existingMembership = await tx.hostMembers.findFirst({
|
||||
where: {
|
||||
userXid: user.id,
|
||||
isActive: true,
|
||||
deletedAt: null,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
hostXid: true,
|
||||
},
|
||||
});
|
||||
|
||||
if (existingMembership && existingMembership.hostXid !== host.id) {
|
||||
throw new ApiError(
|
||||
409,
|
||||
'This person is already invited or assigned to another host company.',
|
||||
);
|
||||
}
|
||||
|
||||
const membershipData = {
|
||||
hostXid: host.id,
|
||||
userXid: user.id,
|
||||
roleXid,
|
||||
hostRolePermissionMasterXid: permissionMaster.id,
|
||||
memberStatus: 'invited',
|
||||
invitedByXid: input.inviterUserXid,
|
||||
invitedOn: new Date(),
|
||||
acceptedOn: null,
|
||||
isActive: true,
|
||||
};
|
||||
|
||||
const hostMember = existingMembership
|
||||
? await tx.hostMembers.update({
|
||||
where: { id: existingMembership.id },
|
||||
data: membershipData,
|
||||
select: {
|
||||
id: true,
|
||||
hostXid: true,
|
||||
userXid: true,
|
||||
roleXid: true,
|
||||
hostRolePermissionMasterXid: true,
|
||||
memberStatus: true,
|
||||
invitedByXid: true,
|
||||
invitedOn: true,
|
||||
},
|
||||
})
|
||||
: await tx.hostMembers.create({
|
||||
data: membershipData,
|
||||
select: {
|
||||
id: true,
|
||||
hostXid: true,
|
||||
userXid: true,
|
||||
roleXid: true,
|
||||
hostRolePermissionMasterXid: true,
|
||||
memberStatus: true,
|
||||
invitedByXid: true,
|
||||
invitedOn: true,
|
||||
},
|
||||
});
|
||||
|
||||
await tx.hostMemberActivities.deleteMany({
|
||||
where: {
|
||||
hostMemberXid: hostMember.id,
|
||||
},
|
||||
});
|
||||
|
||||
await tx.hostMemberActivities.createMany({
|
||||
data: activities.map((activity) => ({
|
||||
hostMemberXid: hostMember.id,
|
||||
activityXid: activity.id,
|
||||
isActive: true,
|
||||
})),
|
||||
});
|
||||
|
||||
return {
|
||||
host,
|
||||
user,
|
||||
hostMember,
|
||||
permissionMaster,
|
||||
permissionDetails,
|
||||
activities,
|
||||
};
|
||||
});
|
||||
}
|
||||
}
|
||||
129
src/modules/host/services/hostRolePermission.service.ts
Normal file
129
src/modules/host/services/hostRolePermission.service.ts
Normal file
@@ -0,0 +1,129 @@
|
||||
import { Injectable } from '@nestjs/common';
|
||||
import { PrismaClient } from '@prisma/client';
|
||||
|
||||
import ApiError from '../../../common/utils/helper/ApiError';
|
||||
|
||||
function normalizeIdArray(values: unknown): number[] {
|
||||
if (!Array.isArray(values)) {
|
||||
return [];
|
||||
}
|
||||
|
||||
return Array.from(
|
||||
new Set(
|
||||
values
|
||||
.map((item) => Number(item))
|
||||
.filter((item) => Number.isInteger(item) && item > 0),
|
||||
),
|
||||
);
|
||||
}
|
||||
|
||||
@Injectable()
|
||||
export class HostRolePermissionService {
|
||||
constructor(private prisma: PrismaClient) {}
|
||||
|
||||
async saveRolePermissions(input: {
|
||||
hostUserXid: number;
|
||||
roleXid: number;
|
||||
permissionMasterXids: unknown;
|
||||
}) {
|
||||
const permissionMasterXids = normalizeIdArray(input.permissionMasterXids);
|
||||
|
||||
if (!permissionMasterXids.length) {
|
||||
throw new ApiError(400, 'permissionMasterXids is required.');
|
||||
}
|
||||
|
||||
return this.prisma.$transaction(async (tx) => {
|
||||
const host = await tx.hostHeader.findFirst({
|
||||
where: {
|
||||
userXid: input.hostUserXid,
|
||||
isActive: true,
|
||||
deletedAt: null,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
companyName: true,
|
||||
userXid: true,
|
||||
},
|
||||
});
|
||||
|
||||
if (!host) {
|
||||
throw new ApiError(404, 'Host company not found for the logged-in user.');
|
||||
}
|
||||
|
||||
const role = await tx.roles.findFirst({
|
||||
where: {
|
||||
id: input.roleXid,
|
||||
isActive: true,
|
||||
deletedAt: null,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
roleName: true,
|
||||
},
|
||||
});
|
||||
|
||||
if (!role) {
|
||||
throw new ApiError(400, 'Invalid roleXid.');
|
||||
}
|
||||
|
||||
const selectedPermissions = await tx.hostPermissionMasters.findMany({
|
||||
where: {
|
||||
id: { in: permissionMasterXids },
|
||||
isActive: true,
|
||||
deletedAt: null,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
permissionKey: true,
|
||||
permissionGroup: true,
|
||||
permissionSection: true,
|
||||
permissionAction: true,
|
||||
displayLabel: true,
|
||||
displayOrder: true,
|
||||
},
|
||||
orderBy: {
|
||||
displayOrder: 'asc',
|
||||
},
|
||||
});
|
||||
|
||||
if (selectedPermissions.length !== permissionMasterXids.length) {
|
||||
throw new ApiError(400, 'One or more permissionMasterXids are invalid.');
|
||||
}
|
||||
|
||||
const saved = await tx.hostRolePermissionMasters.upsert({
|
||||
where: {
|
||||
hostXid_roleXid: {
|
||||
hostXid: host.id,
|
||||
roleXid: role.id,
|
||||
},
|
||||
},
|
||||
create: {
|
||||
hostXid: host.id,
|
||||
roleXid: role.id,
|
||||
permissionMasterXids,
|
||||
isActive: true,
|
||||
},
|
||||
update: {
|
||||
permissionMasterXids,
|
||||
isActive: true,
|
||||
deletedAt: null,
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
hostXid: true,
|
||||
roleXid: true,
|
||||
permissionMasterXids: true,
|
||||
createdAt: true,
|
||||
updatedAt: true,
|
||||
},
|
||||
});
|
||||
|
||||
return {
|
||||
host,
|
||||
role,
|
||||
saved,
|
||||
selectedPermissions,
|
||||
};
|
||||
});
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,51 @@
|
||||
import { brevoService } from '../../../common/email/brevoApi';
|
||||
import ApiError from '../../../common/utils/helper/ApiError';
|
||||
import config from '../../../config/config';
|
||||
|
||||
export async function sendHostMemberInvitationEmail(
|
||||
emailAddress: string,
|
||||
hostName: string,
|
||||
memberRole: string,
|
||||
permissionLabels: string[],
|
||||
activityNames: string[],
|
||||
): Promise<{
|
||||
sent: boolean;
|
||||
}> {
|
||||
const subject = `Invitation to join ${hostName} on Minglar Host`;
|
||||
|
||||
const permissionsHtml = permissionLabels.length
|
||||
? `<ul>${permissionLabels.map((permission) => `<li>${permission}</li>`).join('')}</ul>`
|
||||
: '<p>No permissions were assigned.</p>';
|
||||
|
||||
const activitiesHtml = activityNames.length
|
||||
? `<ul>${activityNames.map((activity) => `<li>${activity}</li>`).join('')}</ul>`
|
||||
: '<p>No activities were assigned.</p>';
|
||||
|
||||
const htmlContent = `
|
||||
<p>Hi there,</p>
|
||||
<p>You have been invited by <strong>${hostName}</strong> to join the Minglar Host portal as <strong>${memberRole}</strong>.</p>
|
||||
<p>The following permissions have been assigned to your account:</p>
|
||||
${permissionsHtml}
|
||||
<p>The following activities have been assigned to you:</p>
|
||||
${activitiesHtml}
|
||||
<p>You can access the host portal using the link below:</p>
|
||||
<p><a href="${config.HOST_LINK}" target="_blank">${config.HOST_LINK}</a></p>
|
||||
<p>If you were not expecting this invitation, you can ignore this email.</p>
|
||||
<p>Warm regards,<br/>Team Minglar</p>
|
||||
`;
|
||||
|
||||
try {
|
||||
await brevoService.sendEmail({
|
||||
recipients: [{ email: emailAddress }],
|
||||
subject,
|
||||
htmlContent,
|
||||
});
|
||||
|
||||
return {
|
||||
sent: true,
|
||||
};
|
||||
} catch (err) {
|
||||
console.error('Brevo email send failed:', err);
|
||||
throw new ApiError(500, 'Failed to send host member invitation email.');
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user