Compare commits
539 Commits
main
...
split-sche
| Author | SHA1 | Date | |
|---|---|---|---|
| 50f93bbeae | |||
| 3ce9d1d180 | |||
| cb819088a0 | |||
| 8f5f01c287 | |||
| e4a2a04045 | |||
| 50ce8e39c5 | |||
| 19e57f0e7f | |||
| ad5e343b66 | |||
| 8c3ece6ebd | |||
| 092f425bb3 | |||
| b1a3afd3a1 | |||
| 97f431260d | |||
| bf6d9ae00b | |||
| 518ec4eb21 | |||
| 95b061b400 | |||
| 92992797ab | |||
| c96e3b0c1a | |||
| f23b93801c | |||
| f1801a3210 | |||
| 2588ca4317 | |||
| e809ba4480 | |||
| 678be7c905 | |||
| 08b4231e5f | |||
|
|
4a61e2c412 | ||
| a3ab9db5a2 | |||
|
|
7167eae07e | ||
|
|
4f3d7fd737 | ||
|
|
199013b0f5 | ||
| 0b81dbf7b1 | |||
|
|
9722e1988c | ||
| cf2bbbf138 | |||
|
|
2ca785248f | ||
| 0aa2b9b53e | |||
| b5cdb20c4f | |||
| 00e07113e5 | |||
| c8f0f93792 | |||
| 87779664d1 | |||
| 5b31e5f2a9 | |||
| 2a073c44a2 | |||
|
|
220d309087 | ||
| f45c33ba83 | |||
| 22b3593150 | |||
| d186681ee4 | |||
| 8f428fc1cb | |||
| 0b503cf8bb | |||
| 7110d0462c | |||
| 96648fe37e | |||
|
|
2095f8e124 | ||
| 21c8799502 | |||
|
|
ad9e8e1a3f | ||
| b200e2cb94 | |||
| cae66237d2 | |||
| 25be8a5647 | |||
| 7a4aecdd45 | |||
| 5cced2981a | |||
|
|
b9fbab3717 | ||
|
|
90c897ad48 | ||
| 4a069cc67a | |||
|
|
5d046c4bcf | ||
| accfc4b769 | |||
| e149884f72 | |||
| a31ec97640 | |||
| 0c97412057 | |||
|
|
b4ff39c0d7 | ||
| bb5da7647b | |||
| 3f19bb4087 | |||
| be8b9cef7d | |||
|
|
77cef98091 | ||
| 97f9c2b26e | |||
|
|
b93cd6b32c | ||
|
|
51319a69fc | ||
| 5ad46309ef | |||
|
|
781212277a | ||
| 6b0ee461c5 | |||
| cc2fa3eb6b | |||
| fe6bb59cc7 | |||
| 3fa5b8a3dd | |||
| 414400f034 | |||
|
|
eaae2557c0 | ||
|
|
f1829a6d14 | ||
| 9d64759097 | |||
| 5d879542a1 | |||
| ea9938a736 | |||
|
|
84608cc025 | ||
|
|
9921edfea7 | ||
|
|
26a8e997f1 | ||
| b98b8cf864 | |||
| 85437ebc2e | |||
| 2b7b2b240f | |||
| 0242799eb5 | |||
|
|
c7408711a4 | ||
|
|
db2dc7532a | ||
| 485bdee063 | |||
| 0c9ff76fe4 | |||
| 0edcf3d515 | |||
| eb34edaedb | |||
| 41d33b72a3 | |||
|
|
f3076aaec3 | ||
|
|
e49d08fb14 | ||
|
|
23bbb39af3 | ||
|
|
c4fd797e31 | ||
|
|
3f96dd4ae1 | ||
|
|
89f1bf55bc | ||
| e736cdaa7b | |||
| 7703dba2d9 | |||
| a3e906a779 | |||
| 3145037238 | |||
|
|
ced8bdcbad | ||
| b22324539a | |||
| aa3e6fd3d1 | |||
|
|
5ec07d4480 | ||
|
|
1fbcf1dddc | ||
| c50c4b1c5a | |||
|
|
ca4def4695 | ||
| 4f8217c95a | |||
| 81994d97ff | |||
| 28b4145ce9 | |||
| e351dbf4b9 | |||
| d8475de70f | |||
|
|
2b0c1f4ae4 | ||
| 23932be637 | |||
| 84678bc00e | |||
|
|
a905cc7aee | ||
|
|
340d47a708 | ||
| b0eb2863cd | |||
|
|
b002077381 | ||
|
|
a43cc1e36a | ||
| 3e711cee18 | |||
| 4d3d95f906 | |||
| 6bac257a75 | |||
| af891834a7 | |||
| 77fee0cc04 | |||
|
|
95e1838303 | ||
|
|
f8b6f277a1 | ||
| 3f2e553947 | |||
| 7569b54d60 | |||
| 0a11c78351 | |||
| b4af010316 | |||
|
|
b35cb4e178 | ||
| bf9055c10a | |||
| d1e2c649c3 | |||
|
|
9c45d924e6 | ||
| 9846d40bfb | |||
| a0b015d900 | |||
|
|
ebeb4e5d06 | ||
| 036f7ab130 | |||
| e154be70ad | |||
|
|
62e7379306 | ||
|
|
68facd1146 | ||
|
|
1dcce8084c | ||
|
|
6e0d795348 | ||
| b1d0e0f52e | |||
|
|
76fdc42428 | ||
|
|
c216d128a6 | ||
| 5ccdcdedae | |||
| 73c528d1cc | |||
| 171a3aded6 | |||
| 42c1f2a268 | |||
| 00d53adf3d | |||
| 93fb58f4f4 | |||
|
|
1f53180b4e | ||
|
|
558cb214c0 | ||
| f414bc42f9 | |||
| e92eb230a0 | |||
|
|
5ca8ca266a | ||
| cb92fbe400 | |||
| d861e402e9 | |||
| 8ed0df7424 | |||
| 745e4fa73f | |||
|
|
46c8432582 | ||
|
|
9bbd8f0c9a | ||
| 07f0212b62 | |||
|
|
50d2242b55 | ||
| 3adbadc3ee | |||
|
|
3f92c6ca30 | ||
| ef7564f5a4 | |||
| 8be2eebaba | |||
| 1d90675d19 | |||
| 855cafb30f | |||
| 6bc68ddd04 | |||
|
|
003ce54465 | ||
|
|
4525e969e6 | ||
| 68f0dfe124 | |||
| 112fdab040 | |||
| 834d16a76e | |||
| f20e4191ee | |||
| 6d377296fc | |||
| 8534ac6c7d | |||
| 89ee19f35d | |||
|
|
b4db2a3bc2 | ||
| 5d93945729 | |||
| aa00e1585c | |||
| 9c10833856 | |||
|
|
905350406f | ||
|
|
bc0470cf52 | ||
|
|
39e03ce4c7 | ||
|
|
4953a179a6 | ||
|
|
82ba980b6f | ||
|
|
5ec819b881 | ||
| f7cc925e6f | |||
| 16c901b64b | |||
| e65ed8babc | |||
|
|
fa1359a1c9 | ||
|
|
2c965bfb92 | ||
| da4e2547ce | |||
| c6b6608ca6 | |||
| 4a6292d108 | |||
| 45aab89747 | |||
| 183614f45a | |||
|
|
3ddaad0a46 | ||
| e286cffa49 | |||
| fafb5d06a7 | |||
| 5482599e96 | |||
| e0086393b4 | |||
|
|
9161e224cc | ||
|
|
c2fa769220 | ||
|
|
aeea3d0ca8 | ||
|
|
c2d3ab9da2 | ||
|
|
401734096d | ||
|
|
ed3aaab961 | ||
| 8199ce327a | |||
| 5ce3dd3780 | |||
|
|
245af71705 | ||
| 2c81e949ca | |||
| 738b2c6608 | |||
|
|
999c5ff616 | ||
| 8dad4bfd2a | |||
| 65fc472902 | |||
|
|
6359d64b63 | ||
| b3e051bd63 | |||
| 80c552a3d5 | |||
|
|
e6d37e04f9 | ||
|
|
0c71ae3ccf | ||
| 716ce3363f | |||
|
|
ddc2e46dd2 | ||
|
|
927649b4f6 | ||
|
|
4f9955d9f4 | ||
| 745e827d22 | |||
| 8c86e72346 | |||
|
|
9b3fcd8cbe | ||
| d4b5153814 | |||
|
|
6440fc2440 | ||
|
|
95f823e749 | ||
| 60ee1f5f21 | |||
| bf16a31ae6 | |||
|
|
1540688b7d | ||
| cab4408dc8 | |||
| be65a6c021 | |||
|
|
f13e90ce39 | ||
|
|
5a223f126f | ||
|
|
2e4f318684 | ||
|
|
53785bd5f2 | ||
| c9b507f969 | |||
| 91871d1f44 | |||
| 05e48063c9 | |||
| a906dc5635 | |||
| 8ec8cf4854 | |||
| fab7642302 | |||
| 4d3796c5f3 | |||
| 2f3c531c56 | |||
| a2907929d4 | |||
|
|
ef2b23ef83 | ||
| 2767d29d79 | |||
| 46daec00ce | |||
| 43e494780d | |||
| 0da18b18f7 | |||
| b5304b3c26 | |||
| 82340c2918 | |||
| b8f5f92c98 | |||
| 3652d851f7 | |||
|
|
6166075967 | ||
|
|
b6cb5831c2 | ||
|
|
a39cc1c3c8 | ||
|
|
ae76618f7a | ||
| e957fc5c50 | |||
|
|
856db687c3 | ||
| a020a28993 | |||
| 1a520ae9e1 | |||
| d5d6951e64 | |||
| bbd55562af | |||
| 9abadba8f5 | |||
| 747566497c | |||
| 6c3e5ccd60 | |||
| ca9ba601ad | |||
| eab6565e12 | |||
| 6a84876518 | |||
| d8fb4b242d | |||
| 51b053310f | |||
| 06010ef6e8 | |||
| 7b9763c668 | |||
| 4c1a04d043 | |||
|
|
ecf45c3e7c | ||
|
|
20a931ab27 | ||
| 6a84fbc0c3 | |||
| 9fc8336bd9 | |||
| b049146664 | |||
| 963f84681c | |||
| ab9e02972e | |||
| 33b330a15b | |||
| d898dcd8ff | |||
|
|
ff18fcbf9f | ||
|
|
a872ed89e4 | ||
| 759eeb298c | |||
| 1b72e65a71 | |||
| 4a7e5fbb1e | |||
| ca5936d0db | |||
| c0d607a321 | |||
| 1d684b7de6 | |||
| 16b16ac7ca | |||
| 0e0c63e31a | |||
| 822b425c1d | |||
| 42e2d7a579 | |||
|
|
78f49b35dd | ||
|
|
930ae708a1 | ||
|
|
8fb3f16d18 | ||
| 3d6226ddac | |||
| 38c616a7af | |||
| c6ab3e57c0 | |||
|
|
776c03911e | ||
|
|
781058c443 | ||
| 3b723e5d1f | |||
|
|
56ebf44d37 | ||
| 4f8274adb9 | |||
| 39f182b8e9 | |||
| d9f7cd9a0f | |||
| 4772c320ba | |||
|
|
f19f5e46c4 | ||
|
|
156aed2429 | ||
|
|
fb77111e34 | ||
| 6b673a173d | |||
| 3c4b0db39f | |||
| e72c260b18 | |||
|
|
9a777eb3f9 | ||
|
|
c3f0a1d82a | ||
| 3f921febe0 | |||
|
|
4bc5eb8d4d | ||
| f3f0b2a81b | |||
|
|
6f0cdb4e0a | ||
| ce9c8174d8 | |||
| c72e757bf3 | |||
|
|
6aaf49bf72 | ||
|
|
1b31ca4a83 | ||
| 140f70615c | |||
| 32f4c7ce42 | |||
|
|
067d1a1f1b | ||
|
|
470298a3fb | ||
| 1d7d0749b3 | |||
|
|
d3fb1c85fb | ||
| e723e680ab | |||
|
|
0e50b8b187 | ||
|
|
bbe725dd9e | ||
| e5861654e9 | |||
|
|
b9c90b488f | ||
| d1eef782a2 | |||
| c16a7bb95e | |||
|
|
626ea34a63 | ||
|
|
31e0b3ff2d | ||
| 07f6f0159c | |||
| b1a70acfa8 | |||
| 5ad17869be | |||
| 8961e49dac | |||
| 8d8702dfb6 | |||
|
|
576c749b34 | ||
|
|
649fccb81b | ||
| 15b8afd9b2 | |||
| 84c4b1f2b9 | |||
|
|
933addd60f | ||
|
|
18ff254e8d | ||
| ae7b453abd | |||
| 7bec950096 | |||
| 6b2b211990 | |||
| 2d36ca5dd7 | |||
| f75993f738 | |||
| 264f2fa29c | |||
| e0b841b437 | |||
| 54613534db | |||
| 6cac8fb163 | |||
| 6147b0f476 | |||
| 71e3f2a933 | |||
| 174f13300c | |||
| 3f324bc1fc | |||
|
|
27e19bd921 | ||
|
|
82cbaddce1 | ||
| 80bd926e16 | |||
| 15c1458f02 | |||
| 0cedcec109 | |||
| 9e47d861a2 | |||
| 4f3adff517 | |||
| 8ccbdc8f32 | |||
| 75077c00da | |||
| abe512b0c2 | |||
| 326ea2f96b | |||
| b0bae33b6e | |||
| 030ec9225d | |||
|
|
83c3a39cc9 | ||
|
|
6b0884b070 | ||
|
|
9e0f12117f | ||
| 67da5b57e6 | |||
|
|
dcc0fbbcf6 | ||
| fb392369a5 | |||
|
|
870aaca557 | ||
| 62637ecc9a | |||
| f421a1e88a | |||
| 7beebc16b3 | |||
|
|
6fa96c3fb0 | ||
| e63e906f62 | |||
| a01a93680a | |||
|
|
7be03b6c27 | ||
|
|
abae9d9ac2 | ||
| a0ed3b9faa | |||
| 14ddc94765 | |||
| 498c4cbe46 | |||
|
|
d14948b344 | ||
|
|
c9b4269e9a | ||
| 930605e22e | |||
|
|
263d06949e | ||
| 8e25c5c4a2 | |||
| 917a1f1ee9 | |||
|
|
089d022267 | ||
|
|
d65f7f5368 | ||
| 7056f32e24 | |||
| c4e470be05 | |||
|
|
fca4991577 | ||
| 2ab046fbd2 | |||
|
|
12420f6b51 | ||
|
|
fbd3b12937 | ||
|
|
1c83cc5910 | ||
| d21dcacd7b | |||
| 38d3b4ca6a | |||
| d0fd8e6691 | |||
| 6d48eeb25b | |||
| b1623343c8 | |||
|
|
3fb6961e7c | ||
| 5e0ba4c8e8 | |||
| 1377e0ba9a | |||
|
|
d0b2de3f18 | ||
| 3b1aac921f | |||
| e7c94a1b19 | |||
| d351a632bf | |||
| 0d858f5411 | |||
|
|
15c85686c6 | ||
| 976c9fc686 | |||
| 4665cb7ca4 | |||
| 1fea4f18f6 | |||
| 29cc335a07 | |||
|
|
2ffb9ca242 | ||
| 577471e7f1 | |||
| e21ffd08f1 | |||
|
|
76e2bd542a | ||
| 926ea67e41 | |||
| ee9c0027de | |||
| 8f25bb87e6 | |||
| e366bb4a70 | |||
| 2c3b1af754 | |||
|
|
4c17e1b269 | ||
| 78592dafec | |||
| 5dc0445a61 | |||
| 2ba9b7778b | |||
|
|
3e12419985 | ||
| 041c28ea99 | |||
| 5f37455290 | |||
|
|
00dd080ee0 | ||
|
|
f61287a11d | ||
|
|
1a0fe5768c | ||
| e7234c29ad | |||
| 6bbcb36b10 | |||
|
|
3a29e70b2b | ||
|
|
a3ac533d96 | ||
|
|
5a9d0d6155 | ||
| 13ffee5f7e | |||
| 99cbe55a70 | |||
|
|
5e061f33a1 | ||
|
|
803a11cdda | ||
| 58053e061d | |||
| 4ea9aa8afa | |||
| 60e3a0e72e | |||
| c544c2ac06 | |||
|
|
d65fc684db | ||
| 5fac8b0156 | |||
| 4664eae896 | |||
| 844ebb4672 | |||
| 74b1420b8a | |||
|
|
b1068e7106 | ||
| ee38391d1e | |||
| 05f97d33e7 | |||
| b2bfed756d | |||
| 5506b5d5cc | |||
|
|
94143bd4d0 | ||
| e42a98f723 | |||
|
|
c402c76096 | ||
| db65abf693 | |||
|
|
a54f61e8c8 | ||
| 7ed225a3f0 | |||
|
|
d24fe70046 | ||
|
|
cb70b078e5 | ||
|
|
508487c3a3 | ||
|
|
399c520985 | ||
| 008bcf7c79 | |||
| ce4af2ea3b | |||
| 4ee0819051 | |||
|
|
54c024fc4f | ||
| e9496d3868 | |||
|
|
d0e6629466 | ||
|
|
50878e6374 | ||
| 5d7ce4455e | |||
| 8e91fee8ee | |||
|
|
7e0f5b3162 | ||
|
|
d2045ae0b8 | ||
| b2298e0fb1 | |||
|
|
f23ff39f2e | ||
|
|
d8f08bf564 | ||
|
|
f8a405204f | ||
| 8dda773b90 | |||
| 3e64e50385 | |||
|
|
ecb866c836 | ||
| 0353982ff4 | |||
| 8c48db854e | |||
|
|
73a1f0b375 | ||
| 03c2e729a0 | |||
| 43a2a1c2b1 | |||
|
|
096613f1e2 | ||
| 6b3d2ae7cf | |||
| fb9a92984b | |||
|
|
224e62ef45 | ||
| 6f75d912eb | |||
| fb044a4535 | |||
|
|
ac494455b5 | ||
| 8d1955f357 | |||
| 8587016ad5 | |||
| 8f12151ef1 | |||
| 477f8d229d | |||
| 3ac0a591df | |||
|
|
2ed5435a15 | ||
|
|
ceacdbddcb | ||
|
|
fb72feb20e | ||
| 72f9e26ca6 | |||
|
|
a14f1388f6 | ||
| 8e19bb566d | |||
| c0e58fe1ce |
44
.env.example
Normal file
44
.env.example
Normal file
@@ -0,0 +1,44 @@
|
||||
# Environment Configuration Template
|
||||
# Copy this file to .env.dev, .env.test, or .env.uat and fill in the values
|
||||
|
||||
# Database
|
||||
DATABASE_URL=
|
||||
DB_USERNAME=
|
||||
DB_PASSWORD=
|
||||
DB_DATABASE_NAME=
|
||||
DB_HOSTNAME=
|
||||
DB_PORT=5432
|
||||
|
||||
# Email Bypass (set to true for dev/test, false for production-like environments)
|
||||
BY_PASS_EMAIL=
|
||||
BYPASS_OTP=
|
||||
|
||||
# Brevo Email Configuration
|
||||
BREVO_EMAIL_API_KEY=
|
||||
BREVO_API_BASEURL=https://api.brevo.com
|
||||
BREVO_FROM_EMAIL=
|
||||
BREVO_SMTP_HOST=smtp-relay.brevo.com
|
||||
BREVO_SMTP_PORT=587
|
||||
BREVO_SMTP_USER=
|
||||
BREVO_SMTP_PASS=
|
||||
|
||||
# JWT Configuration
|
||||
REFRESH_TOKEN_SECRET=
|
||||
JWT_SECRET=
|
||||
JWT_ACCESS_EXPIRATION_MINUTES=30
|
||||
JWT_REFRESH_EXPIRATION_DAYS=7
|
||||
JWT_RESET_PASSWORD_EXPIRATION_MINUTES=15
|
||||
JWT_VERIFY_EMAIL_EXPIRATION_MINUTES=15
|
||||
|
||||
# Security
|
||||
SALT_ROUNDS=
|
||||
NODE_ENV=
|
||||
|
||||
# AWS S3
|
||||
S3_BUCKET_NAME=
|
||||
|
||||
# Admin Configuration
|
||||
MINGLAR_ADMIN_NAME=
|
||||
MINGLAR_ADMIN_EMAIL=
|
||||
AM_INVITATION_LINK=
|
||||
HOST_LINK=
|
||||
7
.gitignore
vendored
7
.gitignore
vendored
@@ -40,10 +40,14 @@ lerna-debug.log*
|
||||
.env.test.local
|
||||
.env.production.local
|
||||
.env.local
|
||||
.env.dev
|
||||
.env.test
|
||||
.env.uat
|
||||
|
||||
# temp
|
||||
.tmp
|
||||
.temp
|
||||
undefined/
|
||||
|
||||
# Runtime data
|
||||
pids
|
||||
@@ -86,6 +90,9 @@ web_modules/
|
||||
# Optional npm cache directory
|
||||
.npm
|
||||
|
||||
#package.lock.json
|
||||
.package-lock.json
|
||||
|
||||
# Optional eslint cache
|
||||
.eslintcache
|
||||
|
||||
|
||||
115
CURL_EXAMPLE.md
Normal file
115
CURL_EXAMPLE.md
Normal file
@@ -0,0 +1,115 @@
|
||||
# CURL Command for Testing addCompanyDetails Lambda
|
||||
|
||||
## Prerequisites
|
||||
1. Replace `YOUR_API_URL` with your actual API Gateway URL
|
||||
2. Replace `YOUR_AUTH_TOKEN` with a valid JWT token
|
||||
3. Replace file paths with actual document files on your system
|
||||
|
||||
## Form Data Structure
|
||||
|
||||
The endpoint expects:
|
||||
- `companyDetails`: JSON string containing company information
|
||||
- `documents`: JSON string containing array of document metadata
|
||||
- File fields: One file field per document (e.g., `panFile`, `gstFile`, etc.)
|
||||
|
||||
## CURL Command
|
||||
|
||||
```bash
|
||||
curl -X POST "YOUR_API_URL/minglaradmin/add-company-details" \
|
||||
-H "x-auth-token: YOUR_AUTH_TOKEN" \
|
||||
-F "companyDetails={\"companyName\":\"Test Company\",\"hostRefNumber\":\"HOST001\",\"address1\":\"123 Main St\",\"address2\":\"Suite 100\",\"cityXid\":1,\"stateXid\":1,\"countryXid\":1,\"pinCode\":\"12345\",\"isSubsidairy\":false,\"registrationNumber\":\"REG123456\",\"panNumber\":\"ABCDE1234F\",\"gstNumber\":\"27ABCDE1234F1Z5\",\"formationDate\":\"2020-01-01\",\"companyType\":\"Private Limited\",\"currencyXid\":1}" \
|
||||
-F "documents=[{\"documentTypeXid\":1,\"documentName\":\"pan.pdf\",\"fieldName\":\"panFile\"},{\"documentTypeXid\":2,\"documentName\":\"gst.pdf\",\"fieldName\":\"gstFile\"},{\"documentTypeXid\":3,\"documentName\":\"registration.pdf\",\"fieldName\":\"registrationFile\"},{\"documentTypeXid\":4,\"documentName\":\"aadhaar.pdf\",\"fieldName\":\"aadhaarFile\"}]" \
|
||||
-F "panFile=@/path/to/pan.pdf" \
|
||||
-F "gstFile=@/path/to/gst.pdf" \
|
||||
-F "registrationFile=@/path/to/registration.pdf" \
|
||||
-F "aadhaarFile=@/path/to/aadhaar.pdf"
|
||||
```
|
||||
|
||||
## Example with Real Values
|
||||
|
||||
```bash
|
||||
curl -X POST "https://abc123.execute-api.ap-south-1.amazonaws.com/minglaradmin/add-company-details" \
|
||||
-H "x-auth-token: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..." \
|
||||
-F "companyDetails={\"companyName\":\"Acme Corp\",\"hostRefNumber\":\"HOST001\",\"address1\":\"123 Business Park\",\"address2\":\"Building A\",\"cityXid\":1,\"stateXid\":1,\"countryXid\":1,\"pinCode\":\"400001\",\"isSubsidairy\":false,\"registrationNumber\":\"U12345MH2020PTC123456\",\"panNumber\":\"ABCDE1234F\",\"gstNumber\":\"27ABCDE1234F1Z5\",\"formationDate\":\"2020-01-15\",\"companyType\":\"Private Limited\",\"websiteUrl\":\"https://acme.com\",\"currencyXid\":1}" \
|
||||
-F "documents=[{\"documentTypeXid\":1,\"documentName\":\"pan-certificate.pdf\",\"fieldName\":\"panFile\"},{\"documentTypeXid\":2,\"documentName\":\"gst-certificate.pdf\",\"fieldName\":\"gstFile\"},{\"documentTypeXid\":3,\"documentName\":\"registration-certificate.pdf\",\"fieldName\":\"registrationFile\"},{\"documentTypeXid\":4,\"documentName\":\"aadhaar.pdf\",\"fieldName\":\"aadhaarFile\"}]" \
|
||||
-F "panFile=@./documents/pan.pdf" \
|
||||
-F "gstFile=@./documents/gst.pdf" \
|
||||
-F "registrationFile=@./documents/registration.pdf" \
|
||||
-F "aadhaarFile=@./documents/aadhaar.pdf"
|
||||
```
|
||||
|
||||
## Postman Setup
|
||||
|
||||
1. **Method**: POST
|
||||
2. **URL**: `YOUR_API_URL/minglaradmin/add-company-details`
|
||||
3. **Headers**:
|
||||
- `x-auth-token`: `YOUR_AUTH_TOKEN`
|
||||
4. **Body**: Select `form-data`
|
||||
5. **Add Fields**:
|
||||
- `companyDetails` (Text): JSON string with company details
|
||||
- `documents` (Text): JSON array string with document metadata
|
||||
- `panFile` (File): Select PDF file
|
||||
- `gstFile` (File): Select PDF file
|
||||
- `registrationFile` (File): Select PDF file
|
||||
- `aadhaarFile` (File): Select PDF file
|
||||
|
||||
## Required Document Types
|
||||
|
||||
Based on `REQUIRED_DOC_TYPES`:
|
||||
- `documentTypeXid: 1` - PAN
|
||||
- `documentTypeXid: 2` - GST
|
||||
- `documentTypeXid: 3` - REGISTRATION
|
||||
- `documentTypeXid: 4` - AADHAAR
|
||||
|
||||
## Company Details JSON Structure
|
||||
|
||||
```json
|
||||
{
|
||||
"companyName": "string (required)",
|
||||
"hostRefNumber": "string (required)",
|
||||
"address1": "string (required)",
|
||||
"address2": "string (optional)",
|
||||
"cityXid": "number (required)",
|
||||
"stateXid": "number (required)",
|
||||
"countryXid": "number (required)",
|
||||
"pinCode": "string (required, min 4 chars)",
|
||||
"logoPath": "string (optional)",
|
||||
"isSubsidairy": "boolean (required)",
|
||||
"registrationNumber": "string (required)",
|
||||
"panNumber": "string (required)",
|
||||
"gstNumber": "string (optional)",
|
||||
"formationDate": "string (required, ISO date)",
|
||||
"companyType": "string (required)",
|
||||
"websiteUrl": "string (optional, must be valid URL)",
|
||||
"instagramUrl": "string (optional, must be valid URL)",
|
||||
"facebookUrl": "string (optional, must be valid URL)",
|
||||
"linkedinUrl": "string (optional, must be valid URL)",
|
||||
"twitterUrl": "string (optional, must be valid URL)",
|
||||
"currencyXid": "number (required)"
|
||||
}
|
||||
```
|
||||
|
||||
## Documents JSON Structure
|
||||
|
||||
```json
|
||||
[
|
||||
{
|
||||
"documentTypeXid": 1,
|
||||
"documentName": "pan.pdf",
|
||||
"fieldName": "panFile"
|
||||
},
|
||||
{
|
||||
"documentTypeXid": 2,
|
||||
"documentName": "gst.pdf",
|
||||
"fieldName": "gstFile"
|
||||
}
|
||||
]
|
||||
```
|
||||
|
||||
## Notes
|
||||
|
||||
- All 4 required document types (PAN, GST, REGISTRATION, AADHAAR) must be provided
|
||||
- File field names in the `documents` array must match the form field names
|
||||
- Files can be PDF, images, or any other document type
|
||||
- The endpoint supports both `multipart/form-data` and JSON (for backward compatibility)
|
||||
|
||||
62
Dockerfile
62
Dockerfile
@@ -1,62 +0,0 @@
|
||||
# Multi-stage build for NestJS Serverless Application
|
||||
FROM node:18-alpine AS builder
|
||||
|
||||
# Set working directory
|
||||
WORKDIR /app
|
||||
|
||||
# Copy package files
|
||||
COPY package*.json ./
|
||||
COPY prisma ./prisma/
|
||||
|
||||
# Install dependencies
|
||||
RUN npm ci --only=production && npm cache clean --force
|
||||
|
||||
# Copy source code
|
||||
COPY . .
|
||||
|
||||
# Generate Prisma client
|
||||
RUN npx prisma generate
|
||||
|
||||
# Build the application
|
||||
RUN npm run build
|
||||
|
||||
# Production stage
|
||||
FROM node:18-alpine AS production
|
||||
|
||||
# Set working directory
|
||||
WORKDIR /app
|
||||
|
||||
# Install serverless framework globally
|
||||
RUN npm install -g serverless
|
||||
|
||||
# Copy package files
|
||||
COPY package*.json ./
|
||||
|
||||
# Install production dependencies
|
||||
RUN npm ci --only=production && npm cache clean --force
|
||||
|
||||
# Copy built application
|
||||
COPY --from=builder /app/dist ./dist
|
||||
COPY --from=builder /app/prisma ./prisma
|
||||
COPY --from=builder /app/node_modules/.prisma ./node_modules/.prisma
|
||||
|
||||
# Copy serverless configuration
|
||||
COPY serverless*.yml ./
|
||||
|
||||
# Create non-root user
|
||||
RUN addgroup -g 1001 -S nodejs
|
||||
RUN adduser -S nestjs -u 1001
|
||||
|
||||
# Change ownership
|
||||
RUN chown -R nestjs:nodejs /app
|
||||
USER nestjs
|
||||
|
||||
# Expose port
|
||||
EXPOSE 3000
|
||||
|
||||
# Health check
|
||||
HEALTHCHECK --interval=30s --timeout=3s --start-period=5s --retries=3 \
|
||||
CMD curl -f http://localhost:3000/health || exit 1
|
||||
|
||||
# Start the application
|
||||
CMD ["npm", "run", "start:prod"]
|
||||
490
LAMBDA_OPTIMIZATION_GUIDE.md
Normal file
490
LAMBDA_OPTIMIZATION_GUIDE.md
Normal file
@@ -0,0 +1,490 @@
|
||||
# AWS Lambda Bundle Size Optimization Guide
|
||||
|
||||
## Overview
|
||||
|
||||
This guide documents how to optimize AWS Lambda function bundle sizes when using:
|
||||
- **Serverless Framework v4** (with built-in esbuild)
|
||||
- **Prisma ORM** (with driver adapters)
|
||||
- **NestJS** or any Node.js framework
|
||||
|
||||
## Problem
|
||||
|
||||
Lambda functions can become bloated (25+ MB) due to:
|
||||
1. **Prisma binary engines** (~50MB uncompressed)
|
||||
2. **AWS SDK v3** being bundled (~5-10MB)
|
||||
3. **Dependencies copied to node_modules** instead of being bundled
|
||||
|
||||
## Solution Architecture
|
||||
|
||||
```
|
||||
┌─────────────────────────────────────────────────────────┐
|
||||
│ Lambda Function │
|
||||
│ ┌─────────────────────────────────────────────────┐ │
|
||||
│ │ Your Code (bundled by esbuild) ~50-500 KB │ │
|
||||
│ └─────────────────────────────────────────────────┘ │
|
||||
│ │ │
|
||||
│ ▼ │
|
||||
│ ┌─────────────────────────────────────────────────┐ │
|
||||
│ │ Prisma Layer (shared) ~15 MB │ │
|
||||
│ │ - @prisma/client │ │
|
||||
│ │ - @prisma/adapter-pg │ │
|
||||
│ │ - .prisma/client (generated) │ │
|
||||
│ │ - pg driver │ │
|
||||
│ └─────────────────────────────────────────────────┘ │
|
||||
│ │ │
|
||||
│ ▼ │
|
||||
│ ┌─────────────────────────────────────────────────┐ │
|
||||
│ │ AWS Lambda Runtime │ │
|
||||
│ │ - AWS SDK v3 (built-in for Node.js 18+) │ │
|
||||
│ └─────────────────────────────────────────────────┘ │
|
||||
└─────────────────────────────────────────────────────────┘
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Step-by-Step Setup
|
||||
|
||||
### 1. Project Structure
|
||||
|
||||
```
|
||||
your-project/
|
||||
├── serverless.yml
|
||||
├── package.json
|
||||
├── prisma/
|
||||
│ └── schema.prisma
|
||||
├── layers/
|
||||
│ └── prisma/
|
||||
│ └── nodejs/
|
||||
│ └── package.json
|
||||
├── src/
|
||||
│ └── ... your code
|
||||
└── build-prisma-layer.ps1 (or .sh for Linux/Mac)
|
||||
```
|
||||
|
||||
### 2. Prisma Schema Configuration
|
||||
|
||||
**`prisma/schema.prisma`**
|
||||
```prisma
|
||||
generator client {
|
||||
provider = "prisma-client-js"
|
||||
// For Prisma 7+ with driver adapters, no binary targets needed
|
||||
// The WASM-based query engine is used automatically
|
||||
}
|
||||
|
||||
datasource db {
|
||||
provider = "postgresql"
|
||||
url = env("DATABASE_URL")
|
||||
}
|
||||
```
|
||||
|
||||
> **Note**: Prisma 7+ uses WASM-based query compiler instead of binary engines when using driver adapters, which is much smaller.
|
||||
|
||||
### 3. Layer Package.json
|
||||
|
||||
**`layers/prisma/nodejs/package.json`**
|
||||
```json
|
||||
{
|
||||
"name": "prisma-layer",
|
||||
"version": "1.0.0",
|
||||
"description": "Lambda layer for Prisma with pg driver adapter",
|
||||
"dependencies": {
|
||||
"@prisma/client": "^7.0.0",
|
||||
"@prisma/adapter-pg": "^7.0.0",
|
||||
"pg": "^8.13.0"
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
### 4. Serverless Configuration
|
||||
|
||||
**`serverless.yml`**
|
||||
```yaml
|
||||
service: your-service-name
|
||||
|
||||
provider:
|
||||
name: aws
|
||||
runtime: nodejs22.x
|
||||
region: your-region
|
||||
memorySize: 512
|
||||
# Apply Prisma layer to ALL functions
|
||||
layers:
|
||||
- !Ref PrismaLambdaLayer
|
||||
environment:
|
||||
DATABASE_URL: ${env:DATABASE_URL}
|
||||
# ... other env vars
|
||||
|
||||
# esbuild configuration (Serverless v4 built-in)
|
||||
build:
|
||||
esbuild:
|
||||
bundle: true
|
||||
minify: true
|
||||
sourcemap: false
|
||||
target: node20
|
||||
platform: node
|
||||
# Mark packages as external (not bundled into JS)
|
||||
external:
|
||||
- '@prisma/client'
|
||||
- '@prisma/adapter-pg'
|
||||
- '.prisma/client'
|
||||
- '.prisma'
|
||||
- 'pg'
|
||||
- '@aws-sdk/*'
|
||||
- '@smithy/*'
|
||||
- '@aws-crypto/*'
|
||||
# Exclude from npm install in zip (CRITICAL!)
|
||||
exclude:
|
||||
- 'aws-sdk'
|
||||
- '@aws-sdk/*'
|
||||
- '@smithy/*'
|
||||
- '@aws-crypto/*'
|
||||
- '@prisma/client'
|
||||
- '@prisma/adapter-pg'
|
||||
- '.prisma'
|
||||
- '.prisma/client'
|
||||
- 'pg'
|
||||
- 'pg-*'
|
||||
- 'postgres-*'
|
||||
- 'pgpass'
|
||||
- 'split2'
|
||||
- 'xtend'
|
||||
|
||||
# Define the Prisma layer
|
||||
layers:
|
||||
prisma:
|
||||
path: layers/prisma
|
||||
name: ${self:service}-prisma-layer-${sls:stage}
|
||||
description: Prisma client with pg driver adapter
|
||||
compatibleRuntimes:
|
||||
- nodejs22.x
|
||||
retain: false
|
||||
|
||||
# Package configuration
|
||||
package:
|
||||
individually: true
|
||||
patterns:
|
||||
- '!node_modules/**'
|
||||
- '!node_modules/@prisma/**'
|
||||
- '!node_modules/.prisma/**'
|
||||
- '!**/*.test.js'
|
||||
- '!**/*.spec.js'
|
||||
- '!**/test/**'
|
||||
- '!**/__tests__/**'
|
||||
- '!package-lock.json'
|
||||
- '!yarn.lock'
|
||||
- '!README.md'
|
||||
- '!.git/**'
|
||||
|
||||
functions:
|
||||
myFunction:
|
||||
handler: src/handlers/myHandler.handler
|
||||
events:
|
||||
- httpApi:
|
||||
path: /my-endpoint
|
||||
method: get
|
||||
|
||||
plugins:
|
||||
- serverless-offline
|
||||
```
|
||||
|
||||
### 5. Build Script for Prisma Layer
|
||||
|
||||
**Windows (PowerShell) - `build-prisma-layer.ps1`**
|
||||
```powershell
|
||||
# Build Prisma Lambda Layer
|
||||
$layerPath = "layers\prisma\nodejs"
|
||||
|
||||
Write-Host "Building Prisma Lambda Layer..." -ForegroundColor Cyan
|
||||
|
||||
# 1. Clean existing node_modules in layer
|
||||
Write-Host "Cleaning layer node_modules..."
|
||||
if (Test-Path "$layerPath\node_modules") {
|
||||
Remove-Item -Recurse -Force "$layerPath\node_modules"
|
||||
}
|
||||
|
||||
# 2. Install dependencies in layer
|
||||
Write-Host "Installing layer dependencies..."
|
||||
Push-Location $layerPath
|
||||
npm install --omit=dev
|
||||
Pop-Location
|
||||
|
||||
# 3. Generate Prisma client
|
||||
Write-Host "Generating Prisma client..."
|
||||
npx prisma generate
|
||||
|
||||
# 4. Copy .prisma/client to layer
|
||||
Write-Host "Copying generated Prisma client to layer..."
|
||||
$sourcePrisma = "node_modules\.prisma"
|
||||
$destPrisma = "$layerPath\node_modules\.prisma"
|
||||
|
||||
if (Test-Path $sourcePrisma) {
|
||||
if (Test-Path $destPrisma) {
|
||||
Remove-Item -Recurse -Force $destPrisma
|
||||
}
|
||||
Copy-Item -Recurse $sourcePrisma $destPrisma
|
||||
Write-Host "Copied .prisma/client successfully!" -ForegroundColor Green
|
||||
} else {
|
||||
Write-Host "ERROR: .prisma folder not found. Run 'npx prisma generate' first." -ForegroundColor Red
|
||||
exit 1
|
||||
}
|
||||
|
||||
# 5. Show layer size
|
||||
$layerSize = (Get-ChildItem "$layerPath\node_modules" -Recurse | Measure-Object -Property Length -Sum).Sum / 1MB
|
||||
Write-Host "`nTotal layer size: $([math]::Round($layerSize, 2)) MB" -ForegroundColor Yellow
|
||||
Write-Host "Prisma layer built successfully!" -ForegroundColor Green
|
||||
```
|
||||
|
||||
**Linux/Mac (Bash) - `build-prisma-layer.sh`**
|
||||
```bash
|
||||
#!/bin/bash
|
||||
set -e
|
||||
|
||||
LAYER_PATH="layers/prisma/nodejs"
|
||||
|
||||
echo "Building Prisma Lambda Layer..."
|
||||
|
||||
# 1. Clean existing node_modules in layer
|
||||
echo "Cleaning layer node_modules..."
|
||||
rm -rf "$LAYER_PATH/node_modules"
|
||||
|
||||
# 2. Install dependencies in layer
|
||||
echo "Installing layer dependencies..."
|
||||
cd "$LAYER_PATH"
|
||||
npm install --omit=dev
|
||||
cd -
|
||||
|
||||
# 3. Generate Prisma client
|
||||
echo "Generating Prisma client..."
|
||||
npx prisma generate
|
||||
|
||||
# 4. Copy .prisma/client to layer
|
||||
echo "Copying generated Prisma client to layer..."
|
||||
if [ -d "node_modules/.prisma" ]; then
|
||||
rm -rf "$LAYER_PATH/node_modules/.prisma"
|
||||
cp -r "node_modules/.prisma" "$LAYER_PATH/node_modules/.prisma"
|
||||
echo "Copied .prisma/client successfully!"
|
||||
else
|
||||
echo "ERROR: .prisma folder not found. Run 'npx prisma generate' first."
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# 5. Show layer size
|
||||
LAYER_SIZE=$(du -sm "$LAYER_PATH/node_modules" | cut -f1)
|
||||
echo "Total layer size: ${LAYER_SIZE} MB"
|
||||
echo "Prisma layer built successfully!"
|
||||
```
|
||||
|
||||
### 6. Prisma Client Usage
|
||||
|
||||
**`src/common/database/prisma.client.ts`**
|
||||
```typescript
|
||||
import { PrismaClient } from '@prisma/client';
|
||||
import { PrismaPg } from '@prisma/adapter-pg';
|
||||
import { Pool } from 'pg';
|
||||
|
||||
// Connection pool for serverless
|
||||
const pool = new Pool({
|
||||
connectionString: process.env.DATABASE_URL,
|
||||
max: 5, // Limit connections in Lambda
|
||||
});
|
||||
|
||||
const adapter = new PrismaPg(pool);
|
||||
|
||||
// Single instance for Lambda warm starts
|
||||
let prisma: PrismaClient;
|
||||
|
||||
export function getPrismaClient(): PrismaClient {
|
||||
if (!prisma) {
|
||||
prisma = new PrismaClient({
|
||||
adapter,
|
||||
log: process.env.NODE_ENV === 'development' ? ['query', 'error', 'warn'] : ['error'],
|
||||
});
|
||||
}
|
||||
return prisma;
|
||||
}
|
||||
|
||||
export { prisma };
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Deployment Workflow
|
||||
|
||||
```bash
|
||||
# 1. Build the Prisma layer (run after schema changes)
|
||||
./build-prisma-layer.ps1 # Windows
|
||||
# or
|
||||
./build-prisma-layer.sh # Linux/Mac
|
||||
|
||||
# 2. Deploy
|
||||
npx serverless deploy --stage=dev
|
||||
|
||||
# 3. Deploy single function (faster, uses existing layer)
|
||||
npx serverless deploy function -f myFunction --stage=dev
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Key Configuration Explained
|
||||
|
||||
### esbuild `external` vs `exclude`
|
||||
|
||||
| Property | Purpose |
|
||||
|----------|---------|
|
||||
| `external` | Tells esbuild NOT to bundle these into the JS file. They become `require()` calls. |
|
||||
| `exclude` | Tells Serverless NOT to `npm install` these packages into the function zip. |
|
||||
|
||||
**Both are required!**
|
||||
- `external` alone = esbuild doesn't bundle, but Serverless still installs to node_modules
|
||||
- `exclude` alone = Serverless doesn't install, but esbuild bundles the code
|
||||
|
||||
### Layer Reference
|
||||
|
||||
```yaml
|
||||
# This creates a CloudFormation reference to the layer defined in the same stack
|
||||
layers:
|
||||
- !Ref PrismaLambdaLayer
|
||||
```
|
||||
|
||||
The `PrismaLambdaLayer` name comes from the layer key (`prisma`) converted to PascalCase + `LambdaLayer`.
|
||||
|
||||
### Why Exclude pg-* packages?
|
||||
|
||||
When `pg` is external, its dependencies still get installed:
|
||||
- `pg-connection-string`
|
||||
- `pg-pool`
|
||||
- `pg-protocol`
|
||||
- `pg-types`
|
||||
- etc.
|
||||
|
||||
These must all be in the `exclude` list to prevent duplication.
|
||||
|
||||
---
|
||||
|
||||
## Expected Results
|
||||
|
||||
| Function Type | Before | After |
|
||||
|---------------|--------|-------|
|
||||
| Simple handlers | 25+ MB | **50-100 kB** |
|
||||
| With validation (zod/yup) | 25+ MB | **300-500 kB** |
|
||||
| With S3 uploads | 30+ MB | **1-2 MB** |
|
||||
|
||||
---
|
||||
|
||||
## Troubleshooting
|
||||
|
||||
### 1. "Cannot find module '@prisma/client'"
|
||||
|
||||
**Cause**: Layer doesn't have the generated `.prisma/client`
|
||||
|
||||
**Fix**: Run `build-prisma-layer.ps1` to regenerate the layer
|
||||
|
||||
### 2. Function size still large
|
||||
|
||||
**Debug**: Extract and inspect the zip:
|
||||
```powershell
|
||||
Expand-Archive ".serverless\build\your-function.zip" -DestinationPath "extracted"
|
||||
Get-ChildItem "extracted\node_modules" -Directory
|
||||
```
|
||||
|
||||
If you see `@prisma` or `pg` folders, the `exclude` config isn't working.
|
||||
|
||||
### 3. "Cannot resolve CloudFormation reference"
|
||||
|
||||
**Cause**: Using `${cf:...}` reference before first deploy
|
||||
|
||||
**Fix**: Use `!Ref PrismaLambdaLayer` instead (works on first deploy)
|
||||
|
||||
### 4. Cold starts still slow
|
||||
|
||||
Consider:
|
||||
- **Provisioned Concurrency**: Pre-warm instances
|
||||
- **Reduce memory**: Sometimes lower memory = same speed, lower cost
|
||||
- **Connection pooling**: Use tools like PgBouncer for RDS
|
||||
|
||||
---
|
||||
|
||||
## Additional Optimizations
|
||||
|
||||
### 1. Remove duplicate validation libraries
|
||||
|
||||
Pick ONE of: `zod`, `yup`, or `class-validator`. Don't use all three.
|
||||
|
||||
### 2. Tree-shake NestJS
|
||||
|
||||
If not using full NestJS, import only what you need:
|
||||
```typescript
|
||||
// Instead of
|
||||
import { Controller, Get } from '@nestjs/common';
|
||||
|
||||
// For Lambda handlers, you might not need NestJS at all
|
||||
```
|
||||
|
||||
### 3. Use AWS SDK v3 selectively
|
||||
|
||||
```yaml
|
||||
external:
|
||||
- '@aws-sdk/*' # Exclude all
|
||||
```
|
||||
|
||||
Then in code:
|
||||
```typescript
|
||||
// AWS SDK v3 is available in Lambda runtime (Node.js 18+)
|
||||
import { S3Client } from '@aws-sdk/client-s3';
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Quick Reference
|
||||
|
||||
```yaml
|
||||
# Minimal serverless.yml for Prisma + Lambda optimization
|
||||
build:
|
||||
esbuild:
|
||||
bundle: true
|
||||
minify: true
|
||||
external:
|
||||
- '@prisma/client'
|
||||
- '@prisma/adapter-pg'
|
||||
- '.prisma/client'
|
||||
- '.prisma'
|
||||
- 'pg'
|
||||
- '@aws-sdk/*'
|
||||
exclude:
|
||||
- '@prisma/client'
|
||||
- '@prisma/adapter-pg'
|
||||
- '.prisma'
|
||||
- '.prisma/client'
|
||||
- 'pg'
|
||||
- 'pg-*'
|
||||
- 'postgres-*'
|
||||
- 'pgpass'
|
||||
- 'split2'
|
||||
- 'xtend'
|
||||
- '@aws-sdk/*'
|
||||
|
||||
layers:
|
||||
prisma:
|
||||
path: layers/prisma
|
||||
name: ${self:service}-prisma-${sls:stage}
|
||||
compatibleRuntimes:
|
||||
- nodejs22.x
|
||||
|
||||
provider:
|
||||
layers:
|
||||
- !Ref PrismaLambdaLayer
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
## Version Compatibility
|
||||
|
||||
| Tool | Tested Version |
|
||||
|------|----------------|
|
||||
| Serverless Framework | v4.x |
|
||||
| Prisma | v7.x |
|
||||
| Node.js | 20.x, 22.x |
|
||||
| AWS Lambda Runtime | nodejs20.x, nodejs22.x |
|
||||
|
||||
---
|
||||
|
||||
*Last updated: December 2025*
|
||||
51
build-prisma-layer.ps1
Normal file
51
build-prisma-layer.ps1
Normal file
@@ -0,0 +1,51 @@
|
||||
# Build Prisma Lambda Layer
|
||||
# Run this script before deploying to ensure the layer has the generated client
|
||||
|
||||
$layerPath = "layers\prisma\nodejs"
|
||||
|
||||
Write-Host "Building Prisma Lambda Layer..." -ForegroundColor Cyan
|
||||
|
||||
# 1. Clean existing node_modules in layer
|
||||
Write-Host "Cleaning layer node_modules..."
|
||||
if (Test-Path "$layerPath\node_modules") {
|
||||
Remove-Item -Recurse -Force "$layerPath\node_modules"
|
||||
}
|
||||
|
||||
# 2. Install dependencies in layer
|
||||
Write-Host "Installing layer dependencies..."
|
||||
Push-Location $layerPath
|
||||
npm install --omit=dev
|
||||
Pop-Location
|
||||
|
||||
# 3. Generate Prisma client into the layer
|
||||
Write-Host "Generating Prisma client into layer..."
|
||||
# Set the output directory for Prisma client
|
||||
$env:PRISMA_GENERATE_DATAPROXY = "false"
|
||||
|
||||
# Generate client - this creates .prisma/client
|
||||
npx prisma generate
|
||||
|
||||
# 4. Copy .prisma/client to layer
|
||||
Write-Host "Copying generated Prisma client to layer..."
|
||||
$sourcePrisma = "node_modules\.prisma"
|
||||
$destPrisma = "$layerPath\node_modules\.prisma"
|
||||
|
||||
if (Test-Path $sourcePrisma) {
|
||||
if (Test-Path $destPrisma) {
|
||||
Remove-Item -Recurse -Force $destPrisma
|
||||
}
|
||||
Copy-Item -Recurse $sourcePrisma $destPrisma
|
||||
Write-Host "Copied .prisma/client successfully!" -ForegroundColor Green
|
||||
} else {
|
||||
Write-Host "ERROR: .prisma folder not found. Run 'npx prisma generate' first." -ForegroundColor Red
|
||||
exit 1
|
||||
}
|
||||
|
||||
# 5. Show layer size
|
||||
Write-Host "`nLayer contents:"
|
||||
Get-ChildItem "$layerPath\node_modules" -Directory | Select-Object Name
|
||||
$layerSize = (Get-ChildItem "$layerPath\node_modules" -Recurse | Measure-Object -Property Length -Sum).Sum / 1MB
|
||||
Write-Host "`nTotal layer size: $([math]::Round($layerSize, 2)) MB" -ForegroundColor Yellow
|
||||
|
||||
Write-Host "`nPrisma layer built successfully!" -ForegroundColor Green
|
||||
Write-Host "Run 'serverless deploy' to deploy with the updated layer."
|
||||
@@ -1,86 +0,0 @@
|
||||
version: '3.8'
|
||||
|
||||
services:
|
||||
# PostgreSQL Database
|
||||
postgres:
|
||||
image: postgres:15-alpine
|
||||
container_name: nestjs-postgres
|
||||
restart: unless-stopped
|
||||
environment:
|
||||
POSTGRES_DB: nestjs_user_crud
|
||||
POSTGRES_USER: postgres
|
||||
POSTGRES_PASSWORD: postgres
|
||||
ports:
|
||||
- "5432:5432"
|
||||
volumes:
|
||||
- postgres_data:/var/lib/postgresql/data
|
||||
- ./init.sql:/docker-entrypoint-initdb.d/init.sql
|
||||
networks:
|
||||
- nestjs-network
|
||||
|
||||
# Redis for caching (optional)
|
||||
redis:
|
||||
image: redis:7-alpine
|
||||
container_name: nestjs-redis
|
||||
restart: unless-stopped
|
||||
ports:
|
||||
- "6379:6379"
|
||||
volumes:
|
||||
- redis_data:/data
|
||||
networks:
|
||||
- nestjs-network
|
||||
|
||||
# NestJS Application
|
||||
app:
|
||||
build:
|
||||
context: .
|
||||
dockerfile: Dockerfile
|
||||
target: production
|
||||
container_name: nestjs-app
|
||||
restart: unless-stopped
|
||||
ports:
|
||||
- "3000:3000"
|
||||
environment:
|
||||
NODE_ENV: development
|
||||
DATABASE_URL: postgresql://postgres:postgres@postgres:5432/nestjs_user_crud?schema=public
|
||||
JWT_SECRET: docker-jwt-secret-key
|
||||
JWT_EXPIRES_IN: 7d
|
||||
API_PREFIX: api/v1
|
||||
API_VERSION: 1.0.0
|
||||
THROTTLE_TTL: 60
|
||||
THROTTLE_LIMIT: 10
|
||||
CORS_ORIGIN: http://localhost:3000
|
||||
depends_on:
|
||||
- postgres
|
||||
- redis
|
||||
networks:
|
||||
- nestjs-network
|
||||
volumes:
|
||||
- ./src:/app/src
|
||||
- ./prisma:/app/prisma
|
||||
|
||||
# Prisma Studio
|
||||
prisma-studio:
|
||||
image: node:18-alpine
|
||||
container_name: nestjs-prisma-studio
|
||||
restart: unless-stopped
|
||||
ports:
|
||||
- "5555:5555"
|
||||
environment:
|
||||
DATABASE_URL: postgresql://postgres:postgres@postgres:5432/nestjs_user_crud?schema=public
|
||||
working_dir: /app
|
||||
volumes:
|
||||
- .:/app
|
||||
command: sh -c "npm install && npx prisma generate && npx prisma studio --hostname 0.0.0.0"
|
||||
depends_on:
|
||||
- postgres
|
||||
networks:
|
||||
- nestjs-network
|
||||
|
||||
volumes:
|
||||
postgres_data:
|
||||
redis_data:
|
||||
|
||||
networks:
|
||||
nestjs-network:
|
||||
driver: bridge
|
||||
19
init.sql
19
init.sql
@@ -1,19 +0,0 @@
|
||||
-- Initialize database for NestJS Serverless Application
|
||||
-- This file is executed when the PostgreSQL container starts
|
||||
|
||||
-- Create database if it doesn't exist
|
||||
SELECT 'CREATE DATABASE nestjs_user_crud'
|
||||
WHERE NOT EXISTS (SELECT FROM pg_database WHERE datname = 'nestjs_user_crud')\gexec
|
||||
|
||||
-- Connect to the database
|
||||
\c nestjs_user_crud;
|
||||
|
||||
-- Create extensions if needed
|
||||
CREATE EXTENSION IF NOT EXISTS "uuid-ossp";
|
||||
|
||||
-- Set timezone
|
||||
SET timezone = 'UTC';
|
||||
|
||||
-- Create a user for the application (optional)
|
||||
-- CREATE USER nestjs_user WITH PASSWORD 'nestjs_password';
|
||||
-- GRANT ALL PRIVILEGES ON DATABASE nestjs_user_crud TO nestjs_user;
|
||||
53
insertCities.js
Normal file
53
insertCities.js
Normal file
@@ -0,0 +1,53 @@
|
||||
import { PrismaClient } from '@prisma/client';
|
||||
import fs from 'fs';
|
||||
import path from 'path';
|
||||
|
||||
const prisma = new PrismaClient();
|
||||
|
||||
async function insertCities() {
|
||||
try {
|
||||
const statesFolder = path.join(process.cwd(), 'states-cities');
|
||||
const files = fs.readdirSync(statesFolder);
|
||||
|
||||
for (const file of files) {
|
||||
if (!file.endsWith('.json')) continue;
|
||||
|
||||
const stateName = file.replace('.json', '');
|
||||
|
||||
const state = await prisma.states.findFirst({
|
||||
where: { stateName },
|
||||
});
|
||||
|
||||
if (!state) {
|
||||
console.log(`❌ State not found: ${stateName}`);
|
||||
continue;
|
||||
}
|
||||
|
||||
const filePath = path.join(statesFolder, file);
|
||||
const citiesData = JSON.parse(
|
||||
fs.readFileSync(filePath, 'utf-8')
|
||||
);
|
||||
|
||||
await prisma.cities.createMany({
|
||||
data: citiesData.map((city) => ({
|
||||
stateXid: state.id,
|
||||
cityName:
|
||||
typeof city === 'string'
|
||||
? city.trim()
|
||||
: city.cityName.trim(),
|
||||
})),
|
||||
skipDuplicates: true,
|
||||
});
|
||||
|
||||
console.log(`✅ ${stateName} cities inserted`);
|
||||
}
|
||||
|
||||
console.log('🎉 All cities inserted successfully');
|
||||
} catch (error) {
|
||||
console.error('Error inserting cities:', error);
|
||||
} finally {
|
||||
await prisma.$disconnect();
|
||||
}
|
||||
}
|
||||
|
||||
insertCities();
|
||||
217
layers/prisma/nodejs/package-lock.json
generated
Normal file
217
layers/prisma/nodejs/package-lock.json
generated
Normal file
@@ -0,0 +1,217 @@
|
||||
{
|
||||
"name": "prisma-layer",
|
||||
"version": "1.0.0",
|
||||
"lockfileVersion": 3,
|
||||
"requires": true,
|
||||
"packages": {
|
||||
"": {
|
||||
"name": "prisma-layer",
|
||||
"version": "1.0.0",
|
||||
"dependencies": {
|
||||
"@prisma/adapter-pg": "^7.0.1",
|
||||
"@prisma/client": "^7.0.1",
|
||||
"pg": "^8.13.0",
|
||||
"zod": "^4.1.12"
|
||||
}
|
||||
},
|
||||
"node_modules/@prisma/adapter-pg": {
|
||||
"version": "7.2.0",
|
||||
"resolved": "https://registry.npmjs.org/@prisma/adapter-pg/-/adapter-pg-7.2.0.tgz",
|
||||
"integrity": "sha512-euIdQ13cRB2wZ3jPsnDnFhINquo1PYFPCg6yVL8b2rp3EdinQHsX9EDdCtRr489D5uhphcRk463OdQAFlsCr0w==",
|
||||
"dependencies": {
|
||||
"@prisma/driver-adapter-utils": "7.2.0",
|
||||
"pg": "^8.16.3",
|
||||
"postgres-array": "3.0.4"
|
||||
}
|
||||
},
|
||||
"node_modules/@prisma/client": {
|
||||
"version": "7.2.0",
|
||||
"resolved": "https://registry.npmjs.org/@prisma/client/-/client-7.2.0.tgz",
|
||||
"integrity": "sha512-JdLF8lWZ+LjKGKpBqyAlenxd/kXjd1Abf/xK+6vUA7R7L2Suo6AFTHFRpPSdAKCan9wzdFApsUpSa/F6+t1AtA==",
|
||||
"dependencies": {
|
||||
"@prisma/client-runtime-utils": "7.2.0"
|
||||
},
|
||||
"engines": {
|
||||
"node": "^20.19 || ^22.12 || >=24.0"
|
||||
},
|
||||
"peerDependencies": {
|
||||
"prisma": "*",
|
||||
"typescript": ">=5.4.0"
|
||||
},
|
||||
"peerDependenciesMeta": {
|
||||
"prisma": {
|
||||
"optional": true
|
||||
},
|
||||
"typescript": {
|
||||
"optional": true
|
||||
}
|
||||
}
|
||||
},
|
||||
"node_modules/@prisma/client-runtime-utils": {
|
||||
"version": "7.2.0",
|
||||
"resolved": "https://registry.npmjs.org/@prisma/client-runtime-utils/-/client-runtime-utils-7.2.0.tgz",
|
||||
"integrity": "sha512-dn7oB53v0tqkB0wBdMuTNFNPdEbfICEUe82Tn9FoKAhJCUkDH+fmyEp0ClciGh+9Hp2Tuu2K52kth2MTLstvmA=="
|
||||
},
|
||||
"node_modules/@prisma/debug": {
|
||||
"version": "7.2.0",
|
||||
"resolved": "https://registry.npmjs.org/@prisma/debug/-/debug-7.2.0.tgz",
|
||||
"integrity": "sha512-YSGTiSlBAVJPzX4ONZmMotL+ozJwQjRmZweQNIq/ER0tQJKJynNkRB3kyvt37eOfsbMCXk3gnLF6J9OJ4QWftw=="
|
||||
},
|
||||
"node_modules/@prisma/driver-adapter-utils": {
|
||||
"version": "7.2.0",
|
||||
"resolved": "https://registry.npmjs.org/@prisma/driver-adapter-utils/-/driver-adapter-utils-7.2.0.tgz",
|
||||
"integrity": "sha512-gzrUcbI9VmHS24Uf+0+7DNzdIw7keglJsD5m/MHxQOU68OhGVzlphQRobLiDMn8CHNA2XN8uugwKjudVtnfMVQ==",
|
||||
"dependencies": {
|
||||
"@prisma/debug": "7.2.0"
|
||||
}
|
||||
},
|
||||
"node_modules/pg": {
|
||||
"version": "8.16.3",
|
||||
"resolved": "https://registry.npmjs.org/pg/-/pg-8.16.3.tgz",
|
||||
"integrity": "sha512-enxc1h0jA/aq5oSDMvqyW3q89ra6XIIDZgCX9vkMrnz5DFTw/Ny3Li2lFQ+pt3L6MCgm/5o2o8HW9hiJji+xvw==",
|
||||
"dependencies": {
|
||||
"pg-connection-string": "^2.9.1",
|
||||
"pg-pool": "^3.10.1",
|
||||
"pg-protocol": "^1.10.3",
|
||||
"pg-types": "2.2.0",
|
||||
"pgpass": "1.0.5"
|
||||
},
|
||||
"engines": {
|
||||
"node": ">= 16.0.0"
|
||||
},
|
||||
"optionalDependencies": {
|
||||
"pg-cloudflare": "^1.2.7"
|
||||
},
|
||||
"peerDependencies": {
|
||||
"pg-native": ">=3.0.1"
|
||||
},
|
||||
"peerDependenciesMeta": {
|
||||
"pg-native": {
|
||||
"optional": true
|
||||
}
|
||||
}
|
||||
},
|
||||
"node_modules/pg-cloudflare": {
|
||||
"version": "1.2.7",
|
||||
"resolved": "https://registry.npmjs.org/pg-cloudflare/-/pg-cloudflare-1.2.7.tgz",
|
||||
"integrity": "sha512-YgCtzMH0ptvZJslLM1ffsY4EuGaU0cx4XSdXLRFae8bPP4dS5xL1tNB3k2o/N64cHJpwU7dxKli/nZ2lUa5fLg==",
|
||||
"optional": true
|
||||
},
|
||||
"node_modules/pg-connection-string": {
|
||||
"version": "2.9.1",
|
||||
"resolved": "https://registry.npmjs.org/pg-connection-string/-/pg-connection-string-2.9.1.tgz",
|
||||
"integrity": "sha512-nkc6NpDcvPVpZXxrreI/FOtX3XemeLl8E0qFr6F2Lrm/I8WOnaWNhIPK2Z7OHpw7gh5XJThi6j6ppgNoaT1w4w=="
|
||||
},
|
||||
"node_modules/pg-int8": {
|
||||
"version": "1.0.1",
|
||||
"resolved": "https://registry.npmjs.org/pg-int8/-/pg-int8-1.0.1.tgz",
|
||||
"integrity": "sha512-WCtabS6t3c8SkpDBUlb1kjOs7l66xsGdKpIPZsg4wR+B3+u9UAum2odSsF9tnvxg80h4ZxLWMy4pRjOsFIqQpw==",
|
||||
"engines": {
|
||||
"node": ">=4.0.0"
|
||||
}
|
||||
},
|
||||
"node_modules/pg-pool": {
|
||||
"version": "3.10.1",
|
||||
"resolved": "https://registry.npmjs.org/pg-pool/-/pg-pool-3.10.1.tgz",
|
||||
"integrity": "sha512-Tu8jMlcX+9d8+QVzKIvM/uJtp07PKr82IUOYEphaWcoBhIYkoHpLXN3qO59nAI11ripznDsEzEv8nUxBVWajGg==",
|
||||
"peerDependencies": {
|
||||
"pg": ">=8.0"
|
||||
}
|
||||
},
|
||||
"node_modules/pg-protocol": {
|
||||
"version": "1.10.3",
|
||||
"resolved": "https://registry.npmjs.org/pg-protocol/-/pg-protocol-1.10.3.tgz",
|
||||
"integrity": "sha512-6DIBgBQaTKDJyxnXaLiLR8wBpQQcGWuAESkRBX/t6OwA8YsqP+iVSiond2EDy6Y/dsGk8rh/jtax3js5NeV7JQ=="
|
||||
},
|
||||
"node_modules/pg-types": {
|
||||
"version": "2.2.0",
|
||||
"resolved": "https://registry.npmjs.org/pg-types/-/pg-types-2.2.0.tgz",
|
||||
"integrity": "sha512-qTAAlrEsl8s4OiEQY69wDvcMIdQN6wdz5ojQiOy6YRMuynxenON0O5oCpJI6lshc6scgAY8qvJ2On/p+CXY0GA==",
|
||||
"dependencies": {
|
||||
"pg-int8": "1.0.1",
|
||||
"postgres-array": "~2.0.0",
|
||||
"postgres-bytea": "~1.0.0",
|
||||
"postgres-date": "~1.0.4",
|
||||
"postgres-interval": "^1.1.0"
|
||||
},
|
||||
"engines": {
|
||||
"node": ">=4"
|
||||
}
|
||||
},
|
||||
"node_modules/pg-types/node_modules/postgres-array": {
|
||||
"version": "2.0.0",
|
||||
"resolved": "https://registry.npmjs.org/postgres-array/-/postgres-array-2.0.0.tgz",
|
||||
"integrity": "sha512-VpZrUqU5A69eQyW2c5CA1jtLecCsN2U/bD6VilrFDWq5+5UIEVO7nazS3TEcHf1zuPYO/sqGvUvW62g86RXZuA==",
|
||||
"engines": {
|
||||
"node": ">=4"
|
||||
}
|
||||
},
|
||||
"node_modules/pgpass": {
|
||||
"version": "1.0.5",
|
||||
"resolved": "https://registry.npmjs.org/pgpass/-/pgpass-1.0.5.tgz",
|
||||
"integrity": "sha512-FdW9r/jQZhSeohs1Z3sI1yxFQNFvMcnmfuj4WBMUTxOrAyLMaTcE1aAMBiTlbMNaXvBCQuVi0R7hd8udDSP7ug==",
|
||||
"dependencies": {
|
||||
"split2": "^4.1.0"
|
||||
}
|
||||
},
|
||||
"node_modules/postgres-array": {
|
||||
"version": "3.0.4",
|
||||
"resolved": "https://registry.npmjs.org/postgres-array/-/postgres-array-3.0.4.tgz",
|
||||
"integrity": "sha512-nAUSGfSDGOaOAEGwqsRY27GPOea7CNipJPOA7lPbdEpx5Kg3qzdP0AaWC5MlhTWV9s4hFX39nomVZ+C4tnGOJQ==",
|
||||
"engines": {
|
||||
"node": ">=12"
|
||||
}
|
||||
},
|
||||
"node_modules/postgres-bytea": {
|
||||
"version": "1.0.1",
|
||||
"resolved": "https://registry.npmjs.org/postgres-bytea/-/postgres-bytea-1.0.1.tgz",
|
||||
"integrity": "sha512-5+5HqXnsZPE65IJZSMkZtURARZelel2oXUEO8rH83VS/hxH5vv1uHquPg5wZs8yMAfdv971IU+kcPUczi7NVBQ==",
|
||||
"engines": {
|
||||
"node": ">=0.10.0"
|
||||
}
|
||||
},
|
||||
"node_modules/postgres-date": {
|
||||
"version": "1.0.7",
|
||||
"resolved": "https://registry.npmjs.org/postgres-date/-/postgres-date-1.0.7.tgz",
|
||||
"integrity": "sha512-suDmjLVQg78nMK2UZ454hAG+OAW+HQPZ6n++TNDUX+L0+uUlLywnoxJKDou51Zm+zTCjrCl0Nq6J9C5hP9vK/Q==",
|
||||
"engines": {
|
||||
"node": ">=0.10.0"
|
||||
}
|
||||
},
|
||||
"node_modules/postgres-interval": {
|
||||
"version": "1.2.0",
|
||||
"resolved": "https://registry.npmjs.org/postgres-interval/-/postgres-interval-1.2.0.tgz",
|
||||
"integrity": "sha512-9ZhXKM/rw350N1ovuWHbGxnGh/SNJ4cnxHiM0rxE4VN41wsg8P8zWn9hv/buK00RP4WvlOyr/RBDiptyxVbkZQ==",
|
||||
"dependencies": {
|
||||
"xtend": "^4.0.0"
|
||||
},
|
||||
"engines": {
|
||||
"node": ">=0.10.0"
|
||||
}
|
||||
},
|
||||
"node_modules/split2": {
|
||||
"version": "4.2.0",
|
||||
"resolved": "https://registry.npmjs.org/split2/-/split2-4.2.0.tgz",
|
||||
"integrity": "sha512-UcjcJOWknrNkF6PLX83qcHM6KHgVKNkV62Y8a5uYDVv9ydGQVwAHMKqHdJje1VTWpljG0WYpCDhrCdAOYH4TWg==",
|
||||
"engines": {
|
||||
"node": ">= 10.x"
|
||||
}
|
||||
},
|
||||
"node_modules/xtend": {
|
||||
"version": "4.0.2",
|
||||
"resolved": "https://registry.npmjs.org/xtend/-/xtend-4.0.2.tgz",
|
||||
"integrity": "sha512-LKYU1iAXJXUgAXn9URjiu+MWhyUXHsvfp7mcuYm9dSUKK0/CjtrUwFAxD82/mCWbtLsGjFIad0wIsod4zrTAEQ==",
|
||||
"engines": {
|
||||
"node": ">=0.4"
|
||||
}
|
||||
},
|
||||
"node_modules/zod": {
|
||||
"version": "4.2.1",
|
||||
"resolved": "https://registry.npmjs.org/zod/-/zod-4.2.1.tgz",
|
||||
"integrity": "sha512-0wZ1IRqGGhMP76gLqz8EyfBXKk0J2qo2+H3fi4mcUP/KtTocoX08nmIAHl1Z2kJIZbZee8KOpBCSNPRgauucjw==",
|
||||
"funding": {
|
||||
"url": "https://github.com/sponsors/colinhacks"
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
11
layers/prisma/nodejs/package.json
Normal file
11
layers/prisma/nodejs/package.json
Normal file
@@ -0,0 +1,11 @@
|
||||
{
|
||||
"name": "prisma-layer",
|
||||
"version": "1.0.0",
|
||||
"description": "Lambda layer for Prisma 7 with pg driver adapter and zod",
|
||||
"dependencies": {
|
||||
"@prisma/client": "^7.0.1",
|
||||
"@prisma/adapter-pg": "^7.0.1",
|
||||
"pg": "^8.13.0",
|
||||
"zod": "^4.1.12"
|
||||
}
|
||||
}
|
||||
8805
package-lock.json
generated
8805
package-lock.json
generated
File diff suppressed because it is too large
Load Diff
40
package.json
40
package.json
@@ -22,9 +22,16 @@
|
||||
"prisma:push": "prisma db push",
|
||||
"prisma:migrate": "prisma migrate dev",
|
||||
"prisma:studio": "prisma studio",
|
||||
"prisma:seed": "ts-node prisma/seed.ts"
|
||||
"prisma:seed": "ts-node prisma/seed.ts",
|
||||
"seeder": "tsx prisma/seed.ts"
|
||||
},
|
||||
"dependencies": {
|
||||
"@aws-crypto/crc32c": "^5.2.0",
|
||||
"@aws-crypto/sha256-browser": "^5.2.0",
|
||||
"@aws-crypto/sha256-js": "^5.2.0",
|
||||
"@aws-sdk/client-s3": "^3.928.0",
|
||||
"@aws-sdk/s3-request-presigner": "^3.928.0",
|
||||
"@aws/lambda-invoke-store": "^0.2.1",
|
||||
"@nestjs/common": "^10.3.0",
|
||||
"@nestjs/config": "^3.1.1",
|
||||
"@nestjs/core": "^10.3.0",
|
||||
@@ -33,23 +40,44 @@
|
||||
"@nestjs/platform-express": "^10.3.0",
|
||||
"@nestjs/swagger": "^7.1.17",
|
||||
"@nestjs/throttler": "^5.1.1",
|
||||
"@prisma/client": "^5.8.1",
|
||||
"@prisma/adapter-pg": "^7.0.1",
|
||||
"@prisma/client": "^7.0.1",
|
||||
"@smithy/middleware-stack": "^4.2.5",
|
||||
"@smithy/protocol-http": "^5.3.5",
|
||||
"@smithy/types": "^4.9.0",
|
||||
"@types/http-status": "^1.1.2",
|
||||
"ajv": "8.12.0",
|
||||
"aws-lambda": "^1.0.7",
|
||||
"aws-sdk": "^2.1692.0",
|
||||
"bcrypt": "^6.0.0",
|
||||
"bcryptjs": "^2.4.3",
|
||||
"class-transformer": "^0.5.1",
|
||||
"class-validator": "^0.14.0",
|
||||
"date-fns": "^4.1.0",
|
||||
"dayjs": "^1.11.19",
|
||||
"docx": "^9.6.0",
|
||||
"docxtemplater": "^3.68.3",
|
||||
"fast-xml-parser": "^5.3.1",
|
||||
"fs": "^0.0.1-security",
|
||||
"helmet": "^7.1.0",
|
||||
"http-status": "^2.1.0",
|
||||
"moment": "^2.30.1",
|
||||
"number-to-words": "^1.2.4",
|
||||
"passport": "^0.7.0",
|
||||
"passport-jwt": "^4.0.1",
|
||||
"passport-local": "^1.0.0",
|
||||
"path": "^0.12.7",
|
||||
"pdf-lib": "^1.17.1",
|
||||
"pizzip": "^3.2.0",
|
||||
"prisma": "^7.0.1",
|
||||
"reflect-metadata": "^0.1.13",
|
||||
"rxjs": "^7.8.1",
|
||||
"serverless": "4.17.0",
|
||||
"serverless": "4.24.0",
|
||||
"swagger-ui-express": "^5.0.0",
|
||||
"yup": "^1.7.1"
|
||||
"tslib": "^2.8.1",
|
||||
"uuid": "^13.0.0",
|
||||
"yup": "^1.7.1",
|
||||
"zod": "^4.1.12"
|
||||
},
|
||||
"devDependencies": {
|
||||
"@nestjs/cli": "^10.3.0",
|
||||
@@ -69,14 +97,16 @@
|
||||
"eslint-plugin-prettier": "^5.1.3",
|
||||
"jest": "^29.7.0",
|
||||
"prettier": "^3.2.5",
|
||||
"prisma": "^5.8.1",
|
||||
"serverless-esbuild": "^1.55.1",
|
||||
"serverless-offline": "^14.4.0",
|
||||
"serverless-plugin-split-stacks": "^1.14.0",
|
||||
"source-map-support": "^0.5.21",
|
||||
"supertest": "^6.3.4",
|
||||
"ts-jest": "^29.1.2",
|
||||
"ts-loader": "^9.5.1",
|
||||
"ts-node": "^10.9.2",
|
||||
"tsconfig-paths": "^4.2.0",
|
||||
"tsx": "^4.20.6",
|
||||
"typescript": "^5.3.3"
|
||||
},
|
||||
"jest": {
|
||||
|
||||
12
prisma.config.ts
Normal file
12
prisma.config.ts
Normal file
@@ -0,0 +1,12 @@
|
||||
import 'dotenv/config'
|
||||
import { defineConfig, env } from 'prisma/config'
|
||||
|
||||
export default defineConfig({
|
||||
schema: 'prisma/schema.prisma',
|
||||
migrations: {
|
||||
path: 'prisma/migrations',
|
||||
},
|
||||
datasource: {
|
||||
url: env('DATABASE_URL'),
|
||||
},
|
||||
})
|
||||
64
prisma/citiesSeeder.ts
Normal file
64
prisma/citiesSeeder.ts
Normal file
@@ -0,0 +1,64 @@
|
||||
import fs from 'fs'
|
||||
import path from 'path'
|
||||
import { PrismaClient } from '@prisma/client'
|
||||
|
||||
export async function seedCities(prisma: PrismaClient) {
|
||||
|
||||
const statesFolder = path.join(process.cwd(), 'states-cities')
|
||||
const files = fs.readdirSync(statesFolder)
|
||||
|
||||
for (const file of files) {
|
||||
if (!file.endsWith('.json')) continue
|
||||
|
||||
const stateName = file.replace('.json', '')
|
||||
|
||||
const state = await prisma.states.findFirst({
|
||||
where: {
|
||||
stateName: {
|
||||
equals: stateName,
|
||||
mode: 'insensitive',
|
||||
},
|
||||
},
|
||||
})
|
||||
|
||||
if (!state) {
|
||||
console.log(`❌ State not found: ${stateName}`)
|
||||
continue
|
||||
}
|
||||
|
||||
const filePath = path.join(statesFolder, file)
|
||||
const rawData = JSON.parse(fs.readFileSync(filePath, 'utf-8'))
|
||||
|
||||
if (!rawData.districts) {
|
||||
console.log(`❌ Invalid structure in ${file}`)
|
||||
continue
|
||||
}
|
||||
|
||||
const allVillages: string[] = []
|
||||
|
||||
for (const district of rawData.districts) {
|
||||
for (const sub of district.subDistricts || []) {
|
||||
for (const village of sub.villages || []) {
|
||||
if (village && village.trim()) {
|
||||
allVillages.push(village.trim())
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
console.log(`📦 Total villages found in ${stateName}:`, allVillages.length)
|
||||
|
||||
const result = await prisma.cities.createMany({
|
||||
data: allVillages.map((village) => ({
|
||||
stateXid: state.id,
|
||||
cityName: village,
|
||||
})),
|
||||
skipDuplicates: true,
|
||||
})
|
||||
|
||||
console.log(`✅ ${stateName} inserted: ${result.count}`)
|
||||
}
|
||||
|
||||
console.log('🎉 All states processed successfully!')
|
||||
}
|
||||
|
||||
1801
prisma/migrations/20251120120035_varcharaddition/migration.sql
Normal file
1801
prisma/migrations/20251120120035_varcharaddition/migration.sql
Normal file
File diff suppressed because it is too large
Load Diff
3
prisma/migrations/migration_lock.toml
Normal file
3
prisma/migrations/migration_lock.toml
Normal file
@@ -0,0 +1,3 @@
|
||||
# Please do not edit this file manually
|
||||
# It should be added in your version-control system (i.e. Git)
|
||||
provider = "postgresql"
|
||||
10
prisma/prisma.ts
Normal file
10
prisma/prisma.ts
Normal file
@@ -0,0 +1,10 @@
|
||||
// prisma.ts
|
||||
// Re-export from the main singleton for consistency
|
||||
import { prisma } from '../src/common/database/prisma.client';
|
||||
|
||||
export { prisma };
|
||||
|
||||
process.on('SIGINT', async () => {
|
||||
await prisma.$disconnect();
|
||||
process.exit(0);
|
||||
});
|
||||
File diff suppressed because it is too large
Load Diff
1679
prisma/seed.ts
Normal file
1679
prisma/seed.ts
Normal file
File diff suppressed because it is too large
Load Diff
13
serverless.host.yml
Normal file
13
serverless.host.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
service: minglar-host
|
||||
|
||||
useDotenv: ${file(./serverless/common.yml):useDotenv}
|
||||
params: ${file(./serverless/common.yml):params}
|
||||
provider: ${file(./serverless/common.yml):provider}
|
||||
build: ${file(./serverless/common.yml):build}
|
||||
package: ${file(./serverless/common.yml):package}
|
||||
plugins: ${file(./serverless/common.yml):plugins}
|
||||
custom: ${file(./serverless/common.yml):custom}
|
||||
|
||||
functions:
|
||||
- ${file(./serverless/functions/host.yml)}
|
||||
|
||||
13
serverless.minglaradmin.yml
Normal file
13
serverless.minglaradmin.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
service: minglar-admin
|
||||
|
||||
useDotenv: ${file(./serverless/common.yml):useDotenv}
|
||||
params: ${file(./serverless/common.yml):params}
|
||||
provider: ${file(./serverless/common.yml):provider}
|
||||
build: ${file(./serverless/common.yml):build}
|
||||
package: ${file(./serverless/common.yml):package}
|
||||
plugins: ${file(./serverless/common.yml):plugins}
|
||||
custom: ${file(./serverless/common.yml):custom}
|
||||
|
||||
functions:
|
||||
- ${file(./serverless/functions/minglaradmin.yml)}
|
||||
|
||||
13
serverless.prepopulate.yml
Normal file
13
serverless.prepopulate.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
service: minglar-prepopulate
|
||||
|
||||
useDotenv: ${file(./serverless/common.yml):useDotenv}
|
||||
params: ${file(./serverless/common.yml):params}
|
||||
provider: ${file(./serverless/common.yml):provider}
|
||||
build: ${file(./serverless/common.yml):build}
|
||||
package: ${file(./serverless/common.yml):package}
|
||||
plugins: ${file(./serverless/common.yml):plugins}
|
||||
custom: ${file(./serverless/common.yml):custom}
|
||||
|
||||
functions:
|
||||
- ${file(./serverless/functions/prepopulate.yml)}
|
||||
|
||||
32
serverless.prisma-layer.yml
Normal file
32
serverless.prisma-layer.yml
Normal file
@@ -0,0 +1,32 @@
|
||||
service: minglar-prisma-layer
|
||||
|
||||
useDotenv: true
|
||||
|
||||
params:
|
||||
dev:
|
||||
stage: dev
|
||||
test:
|
||||
stage: test
|
||||
uat:
|
||||
stage: uat
|
||||
|
||||
provider:
|
||||
name: aws
|
||||
runtime: nodejs22.x
|
||||
region: ap-south-1
|
||||
stage: ${opt:stage, 'dev'}
|
||||
deploymentBucket:
|
||||
# use a fixed bucket name to prevent Serverless from creating/quashing a resource
|
||||
name: serverless-framework-deployments-ap-south-1-50264b8e-d2b9
|
||||
# optionally uncomment below to enable serverless to create if missing
|
||||
# serverSideEncryption: AES256
|
||||
versionFunctions: false
|
||||
|
||||
layers:
|
||||
prisma:
|
||||
path: layers/prisma
|
||||
name: ${self:service}-prisma-layer-${sls:stage}
|
||||
description: Prisma 7 client with pg driver adapter (no binary engines)
|
||||
compatibleRuntimes:
|
||||
- nodejs22.x
|
||||
retain: false
|
||||
13
serverless.user.yml
Normal file
13
serverless.user.yml
Normal file
@@ -0,0 +1,13 @@
|
||||
service: minglar-user
|
||||
|
||||
useDotenv: ${file(./serverless/common.yml):useDotenv}
|
||||
params: ${file(./serverless/common.yml):params}
|
||||
provider: ${file(./serverless/common.yml):provider}
|
||||
build: ${file(./serverless/common.yml):build}
|
||||
package: ${file(./serverless/common.yml):package}
|
||||
plugins: ${file(./serverless/common.yml):plugins}
|
||||
custom: ${file(./serverless/common.yml):custom}
|
||||
|
||||
functions:
|
||||
- ${file(./serverless/functions/user.yml)}
|
||||
|
||||
171
serverless.yml
171
serverless.yml
@@ -1,12 +1,47 @@
|
||||
service: minglarDev
|
||||
# Legacy monolith config. For new deployments use serverless.*.yml files.
|
||||
service: minglar
|
||||
|
||||
|
||||
useDotenv: true
|
||||
|
||||
params:
|
||||
dev:
|
||||
stage: dev
|
||||
test:
|
||||
stage: test
|
||||
uat:
|
||||
stage: uat
|
||||
|
||||
provider:
|
||||
name: aws
|
||||
runtime: nodejs20.x
|
||||
runtime: nodejs22.x
|
||||
region: ap-south-1
|
||||
stage: ${opt:stage, 'dev'}
|
||||
deploymentBucket:
|
||||
# use a fixed bucket name to prevent Serverless from creating/quashing a resource
|
||||
name: serverless-framework-deployments-ap-south-1-50264b8e-d2b9
|
||||
# optionally uncomment below to enable serverless to create if missing
|
||||
# serverSideEncryption: AES256
|
||||
versionFunctions: false
|
||||
memorySize: 512
|
||||
# Apply Prisma layer to all functions
|
||||
# Reference the layer defined in this stack using CloudFormation Ref
|
||||
layers:
|
||||
# Use the exported stack output so deploy function works (expects a string ARN)
|
||||
# For offline/local, fall back to an empty string so the CF lookup is optional.
|
||||
- ${cf:${self:service}-${sls:stage}.PrismaLambdaLayerQualifiedArn, ''}
|
||||
apiGateway:
|
||||
binaryMediaTypes:
|
||||
- '*/*'
|
||||
minimumCompressionSize: 1024
|
||||
|
||||
environment:
|
||||
DATABASE_URL: ${env:DATABASE_URL}
|
||||
DB_USERNAME: ${env:DB_USERNAME}
|
||||
DB_PASSWORD: ${env:DB_PASSWORD}
|
||||
DB_DATABASE_NAME: ${env:DB_DATABASE_NAME}
|
||||
DB_HOSTNAME: ${env:DB_HOSTNAME}
|
||||
DB_PORT: ${env:DB_PORT}
|
||||
BY_PASS_EMAIL: ${env:BY_PASS_EMAIL}
|
||||
BYPASS_OTP: ${env:BYPASS_OTP}
|
||||
BREVO_EMAIL_API_KEY: ${env:BREVO_EMAIL_API_KEY}
|
||||
@@ -18,56 +53,112 @@ provider:
|
||||
BREVO_SMTP_PASS: ${env:BREVO_SMTP_PASS}
|
||||
REFRESH_TOKEN_SECRET: ${env:REFRESH_TOKEN_SECRET}
|
||||
JWT_SECRET: ${env:JWT_SECRET}
|
||||
JWT_ACCESS_EXPIRATION_MINUTES: ${env:JWT_ACCESS_EXPIRATION_MINUTES}
|
||||
JWT_REFRESH_EXPIRATION_DAYS: ${env:JWT_REFRESH_EXPIRATION_DAYS}
|
||||
JWT_RESET_PASSWORD_EXPIRATION_MINUTES: ${env:JWT_RESET_PASSWORD_EXPIRATION_MINUTES}
|
||||
JWT_VERIFY_EMAIL_EXPIRATION_MINUTES: ${env:JWT_VERIFY_EMAIL_EXPIRATION_MINUTES}
|
||||
SALT_ROUNDS: ${env:SALT_ROUNDS}
|
||||
NODE_ENV: ${env:NODE_ENV}
|
||||
S3_BUCKET_NAME: ${env:S3_BUCKET_NAME}
|
||||
MINGLAR_ADMIN_NAME: ${env:MINGLAR_ADMIN_NAME}
|
||||
MINGLAR_ADMIN_EMAIL: ${env:MINGLAR_ADMIN_EMAIL}
|
||||
AM_INVITATION_LINK: ${env:AM_INVITATION_LINK}
|
||||
HOST_LINK: ${env:HOST_LINK}
|
||||
HOST_LINK_PQ: ${env:HOST_LINK_PQ}
|
||||
|
||||
httpApi:
|
||||
cors:
|
||||
allowedOrigins: ['*']
|
||||
allowedHeaders:
|
||||
- Content-Type
|
||||
- X-Amz-Date
|
||||
- Authorization
|
||||
- X-Api-Key
|
||||
- X-Auth-Token
|
||||
allowCredentials: false
|
||||
iam:
|
||||
role:
|
||||
statements:
|
||||
- Effect: Allow
|
||||
Action:
|
||||
- s3:PutObject
|
||||
- s3:GetObject
|
||||
- s3:DeleteObject
|
||||
- s3:ListBucket
|
||||
Resource:
|
||||
- 'arn:aws:s3:::${env:S3_BUCKET_NAME}'
|
||||
- 'arn:aws:s3:::${env:S3_BUCKET_NAME}/*'
|
||||
|
||||
custom:
|
||||
build:
|
||||
esbuild:
|
||||
bundle: true
|
||||
minify: false
|
||||
minify: true
|
||||
sourcemap: false
|
||||
exclude: ['aws-sdk']
|
||||
target: node20
|
||||
platform: node
|
||||
concurrency: 10
|
||||
outdir: dist
|
||||
# Mark as external so they're not bundled into the JS
|
||||
external:
|
||||
- '@prisma/client'
|
||||
- '.prisma/client'
|
||||
- '.prisma'
|
||||
- '@prisma/adapter-pg'
|
||||
- 'pg'
|
||||
- 'zod'
|
||||
- '@aws-sdk/*'
|
||||
- '@smithy/*'
|
||||
- '@aws-crypto/*'
|
||||
# Exclude prevents npm install of these packages in the zip
|
||||
exclude:
|
||||
- 'aws-sdk'
|
||||
- '@aws-sdk/*'
|
||||
- '@smithy/*'
|
||||
- '@aws-crypto/*'
|
||||
- '@prisma/adapter-pg'
|
||||
- '@prisma/client'
|
||||
- '.prisma'
|
||||
- '.prisma/client'
|
||||
- 'pg'
|
||||
- 'zod'
|
||||
- 'pg-*'
|
||||
- 'postgres-*'
|
||||
- 'pgpass'
|
||||
- 'split2'
|
||||
- 'xtend'
|
||||
|
||||
# Define layers
|
||||
layers:
|
||||
prisma:
|
||||
path: layers/prisma
|
||||
name: ${self:service}-prisma-layer-${sls:stage}
|
||||
description: Prisma 7 client with pg driver adapter (no binary engines)
|
||||
compatibleRuntimes:
|
||||
- nodejs22.x
|
||||
retain: false
|
||||
|
||||
package:
|
||||
individually: true
|
||||
patterns:
|
||||
- '!node_modules/**' # exclude all node_modules first
|
||||
- '!**/*.spec.ts'
|
||||
- '!**/*.test.ts'
|
||||
- '!**/*.log'
|
||||
- 'src/**' # include all source files
|
||||
- 'common/**' # include common modules
|
||||
- 'node_modules/@prisma/client/**'
|
||||
- 'node_modules/.prisma/client/**'
|
||||
- 'prisma/schema.prisma'
|
||||
- '!node_modules/**'
|
||||
- '!node_modules/@prisma/**'
|
||||
- '!node_modules/.prisma/**'
|
||||
- '!**/*.test.js'
|
||||
- '!**/*.spec.js'
|
||||
- '!**/test/**'
|
||||
- '!**/__tests__/**'
|
||||
- '!package-lock.json'
|
||||
- '!yarn.lock'
|
||||
- '!README.md'
|
||||
- '!*.config.js'
|
||||
- '!.git/**'
|
||||
- '!.github/**'
|
||||
|
||||
# Import function definitions from separate files organized by module
|
||||
functions:
|
||||
# 👇 Example Lambda for Host Module
|
||||
- ${file(./serverless/functions/host.yml)}
|
||||
- ${file(./serverless/functions/minglaradmin.yml)}
|
||||
- ${file(./serverless/functions/prepopulate.yml)}
|
||||
- ${file(./serverless/functions/user.yml)}
|
||||
|
||||
getHosts:
|
||||
handler: src/modules/host/handlers/host.handler
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/**'
|
||||
- 'common/**'
|
||||
- 'node_modules/.prisma/client/libquery_engine-rhel-openssl-3.0.x.so.node'
|
||||
- 'node_modules/@prisma/client/**'
|
||||
- 'prisma/schema.prisma'
|
||||
events:
|
||||
- httpApi:
|
||||
path: /host
|
||||
method: get
|
||||
plugins:
|
||||
- serverless-offline
|
||||
- serverless-plugin-split-stacks
|
||||
|
||||
custom:
|
||||
serverless-offline:
|
||||
reloadHandler: true
|
||||
|
||||
# split-stacks configuration to avoid CloudFormation resource limit
|
||||
splitStacks:
|
||||
perFunction: true
|
||||
perType: true
|
||||
perGroupFunction: false
|
||||
|
||||
134
serverless/common.yml
Normal file
134
serverless/common.yml
Normal file
@@ -0,0 +1,134 @@
|
||||
useDotenv: true
|
||||
|
||||
params:
|
||||
dev:
|
||||
stage: dev
|
||||
test:
|
||||
stage: test
|
||||
uat:
|
||||
stage: uat
|
||||
|
||||
provider:
|
||||
name: aws
|
||||
runtime: nodejs22.x
|
||||
region: ap-south-1
|
||||
stage: ${opt:stage, 'dev'}
|
||||
deploymentBucket:
|
||||
# use a fixed bucket name to prevent Serverless from creating/quashing a resource
|
||||
name: serverless-framework-deployments-ap-south-1-50264b8e-d2b9
|
||||
# optionally uncomment below to enable serverless to create if missing
|
||||
# serverSideEncryption: AES256
|
||||
versionFunctions: false
|
||||
memorySize: 512
|
||||
# Apply Prisma layer to all functions
|
||||
# Reference the layer defined in the dedicated layer stack
|
||||
layers:
|
||||
- ${cf:minglar-prisma-layer-${sls:stage}.PrismaLambdaLayerQualifiedArn}
|
||||
apiGateway:
|
||||
binaryMediaTypes:
|
||||
- '*/*'
|
||||
minimumCompressionSize: 1024
|
||||
|
||||
environment:
|
||||
DATABASE_URL: ${env:DATABASE_URL}
|
||||
DB_USERNAME: ${env:DB_USERNAME}
|
||||
DB_PASSWORD: ${env:DB_PASSWORD}
|
||||
DB_DATABASE_NAME: ${env:DB_DATABASE_NAME}
|
||||
DB_HOSTNAME: ${env:DB_HOSTNAME}
|
||||
DB_PORT: ${env:DB_PORT}
|
||||
BY_PASS_EMAIL: ${env:BY_PASS_EMAIL}
|
||||
BYPASS_OTP: ${env:BYPASS_OTP}
|
||||
BREVO_EMAIL_API_KEY: ${env:BREVO_EMAIL_API_KEY}
|
||||
BREVO_API_BASEURL: ${env:BREVO_API_BASEURL}
|
||||
BREVO_FROM_EMAIL: ${env:BREVO_FROM_EMAIL}
|
||||
BREVO_SMTP_HOST: ${env:BREVO_SMTP_HOST}
|
||||
BREVO_SMTP_PORT: ${env:BREVO_SMTP_PORT}
|
||||
BREVO_SMTP_USER: ${env:BREVO_SMTP_USER}
|
||||
BREVO_SMTP_PASS: ${env:BREVO_SMTP_PASS}
|
||||
REFRESH_TOKEN_SECRET: ${env:REFRESH_TOKEN_SECRET}
|
||||
JWT_SECRET: ${env:JWT_SECRET}
|
||||
JWT_ACCESS_EXPIRATION_MINUTES: ${env:JWT_ACCESS_EXPIRATION_MINUTES}
|
||||
JWT_REFRESH_EXPIRATION_DAYS: ${env:JWT_REFRESH_EXPIRATION_DAYS}
|
||||
JWT_RESET_PASSWORD_EXPIRATION_MINUTES: ${env:JWT_RESET_PASSWORD_EXPIRATION_MINUTES}
|
||||
JWT_VERIFY_EMAIL_EXPIRATION_MINUTES: ${env:JWT_VERIFY_EMAIL_EXPIRATION_MINUTES}
|
||||
SALT_ROUNDS: ${env:SALT_ROUNDS}
|
||||
NODE_ENV: ${env:NODE_ENV}
|
||||
S3_BUCKET_NAME: ${env:S3_BUCKET_NAME}
|
||||
MINGLAR_ADMIN_NAME: ${env:MINGLAR_ADMIN_NAME}
|
||||
MINGLAR_ADMIN_EMAIL: ${env:MINGLAR_ADMIN_EMAIL}
|
||||
AM_INVITATION_LINK: ${env:AM_INVITATION_LINK}
|
||||
HOST_LINK: ${env:HOST_LINK}
|
||||
HOST_LINK_PQ: ${env:HOST_LINK_PQ}
|
||||
|
||||
iam:
|
||||
role:
|
||||
statements:
|
||||
- Effect: Allow
|
||||
Action:
|
||||
- s3:PutObject
|
||||
- s3:GetObject
|
||||
- s3:DeleteObject
|
||||
- s3:ListBucket
|
||||
Resource:
|
||||
- 'arn:aws:s3:::${env:S3_BUCKET_NAME}'
|
||||
- 'arn:aws:s3:::${env:S3_BUCKET_NAME}/*'
|
||||
|
||||
build:
|
||||
esbuild:
|
||||
bundle: true
|
||||
minify: true
|
||||
sourcemap: false
|
||||
target: node20
|
||||
platform: node
|
||||
# Mark as external so they're not bundled into the JS
|
||||
external:
|
||||
- '@prisma/client'
|
||||
- '.prisma/client'
|
||||
- '.prisma'
|
||||
- '@prisma/adapter-pg'
|
||||
- 'pg'
|
||||
- 'zod'
|
||||
- '@aws-sdk/*'
|
||||
- '@smithy/*'
|
||||
- '@aws-crypto/*'
|
||||
# Exclude prevents npm install of these packages in the zip
|
||||
exclude:
|
||||
- 'aws-sdk'
|
||||
- '@aws-sdk/*'
|
||||
- '@smithy/*'
|
||||
- '@aws-crypto/*'
|
||||
- '@prisma/adapter-pg'
|
||||
- '@prisma/client'
|
||||
- '.prisma'
|
||||
- '.prisma/client'
|
||||
- 'pg'
|
||||
- 'zod'
|
||||
- 'pg-*'
|
||||
- 'postgres-*'
|
||||
- 'pgpass'
|
||||
- 'split2'
|
||||
- 'xtend'
|
||||
|
||||
package:
|
||||
individually: true
|
||||
patterns:
|
||||
- '!node_modules/**'
|
||||
- '!node_modules/@prisma/**'
|
||||
- '!node_modules/.prisma/**'
|
||||
- '!**/*.test.js'
|
||||
- '!**/*.spec.js'
|
||||
- '!**/test/**'
|
||||
- '!**/__tests__/**'
|
||||
- '!package-lock.json'
|
||||
- '!yarn.lock'
|
||||
- '!README.md'
|
||||
- '!*.config.js'
|
||||
- '!.git/**'
|
||||
- '!.github/**'
|
||||
|
||||
plugins:
|
||||
- serverless-offline
|
||||
|
||||
custom:
|
||||
serverless-offline:
|
||||
reloadHandler: true
|
||||
587
serverless/functions/host.yml
Normal file
587
serverless/functions/host.yml
Normal file
@@ -0,0 +1,587 @@
|
||||
# Host Module Functions
|
||||
# All authentication and host management endpoints
|
||||
|
||||
getHosts:
|
||||
handler: src/modules/host/handlers/host.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/host.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /
|
||||
method: get
|
||||
|
||||
verifyOTP:
|
||||
handler: src/modules/host/handlers/Host_Admin/onboarding/verifyOTP.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/verifyOtp.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Host_Admin/onboarding/verify-otp
|
||||
method: post
|
||||
|
||||
login:
|
||||
handler: src/modules/host/handlers/Host_Admin/onboarding/login.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/loginForHost.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Host_Admin/onboarding/login
|
||||
method: post
|
||||
|
||||
signUp:
|
||||
handler: src/modules/host/handlers/Host_Admin/onboarding/signUp.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/registration.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Host_Admin/onboarding/registration
|
||||
method: post
|
||||
|
||||
createPassword:
|
||||
handler: src/modules/host/handlers/Host_Admin/onboarding/createPassword.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/createPassword.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Host_Admin/onboarding/create-password
|
||||
method: post
|
||||
|
||||
updateBankDetails:
|
||||
handler: src/modules/host/handlers/Host_Admin/onboarding/updateBankDetails.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/addPaymentDetails.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Host_Admin/onboarding/add-payment-details
|
||||
method: post
|
||||
|
||||
saveActivity_ForPQQ:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/saveActivity_ForPQQ.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/addActivity.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/add-activity
|
||||
method: post
|
||||
|
||||
getHostById:
|
||||
handler: src/modules/host/handlers/getbyidhandler.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/getbyidhandler.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /getById
|
||||
method: get
|
||||
|
||||
getPQQ_ByQuestionId:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/getPQQ_ByQuestionId.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/getByIdPQQ.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/get-pqq-question-details
|
||||
method: get
|
||||
|
||||
getPQQ_LastUpdatedQuestion:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/getPQQ_LastUpdatedQuestion.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/getLatestQuestionDetailsPQQ.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/get-latest-pqq-question-details
|
||||
method: get
|
||||
|
||||
prePopulateNewActivity:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/getAllActivityType.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/getActivityType.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/prepopulate-new-activity
|
||||
method: get
|
||||
|
||||
createNewActivity:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/CreateNewActivity.handler
|
||||
memorySize: 1024
|
||||
timeout: 30
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/OnBoarding/CreateNewActivity.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/create-new-activity
|
||||
method: patch
|
||||
|
||||
showSuggestion:
|
||||
handler: src/modules/host/handlers/Host_Admin/onboarding/showSuggestion.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Host_Admin/onboarding/showSuggestion.handler.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /get-suggestion
|
||||
method: get
|
||||
|
||||
getAllActivitySuggestion:
|
||||
handler: src/modules/host/handlers/Host_Admin/onboarding/getAllActvitySuggestion.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Host_Admin/onboarding/getAllActvitySuggestion.handler.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /get-Activity-suggestion
|
||||
method: get
|
||||
|
||||
getAllHostActivity:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/getAllHostActivity.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/OnBoarding/getAllHostActivity.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/get-all-host-activity
|
||||
method: get
|
||||
|
||||
acceptAggrement:
|
||||
handler: src/modules/host/handlers/Host_Admin/onboarding/acceptAggrement.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/acceptAgreement.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Host_Admin/onboarding/accept-agreement
|
||||
method: patch
|
||||
|
||||
getLatestAgreement:
|
||||
handler: src/modules/host/handlers/Host_Admin/onboarding/getLatestAgreement.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Host_Admin/onboarding/getLatestAgreement.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Host_Admin/onboarding/get-latest-agreement
|
||||
method: get
|
||||
|
||||
getStepperInfo:
|
||||
handler: src/modules/host/handlers/getStepper.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/getStepper.*'
|
||||
- 'src/common/utils/handlers/safeHandler.*'
|
||||
- 'src/common/database/**'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /stepper
|
||||
method: get
|
||||
|
||||
updateHostProfile:
|
||||
handler: src/modules/host/handlers/updateHostProfile.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/updateHostProfile.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /profile
|
||||
method: patch
|
||||
|
||||
# Functions with S3/AWS SDK dependencies
|
||||
submitCompanyDetails:
|
||||
handler: src/modules/host/handlers/Host_Admin/onboarding/submitCompanyDetails.handler
|
||||
memorySize: 1024
|
||||
timeout: 30
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/addCompanyDetails.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- 'src/common/**'
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Host_Admin/onboarding/add-company-details
|
||||
method: patch
|
||||
|
||||
submitPQQ_Answer:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/submitPQQ_Answer.handler
|
||||
memorySize: 1024
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/submitPqqAns.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/submit-pqq-answer
|
||||
method: patch
|
||||
|
||||
updatePQQ_LastAnswer:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/getPQQScore.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/submitPqqAns.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/submit-final-pqq-answer
|
||||
method: post
|
||||
|
||||
submitPQQForReview:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/submitPQQForReview.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/OnBoarding/submitPQQForReview.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/submit-pqq-for-review
|
||||
method: patch
|
||||
|
||||
getAllPQQwithSubmittedAns:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/getAllPQQwithSubmittedAns.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/prepopulate/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/get-all-pqq-ques-submited-ans
|
||||
method: get
|
||||
|
||||
getAllDetailsOfActivityAndVenue:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/getAllDetailsOfActivityAndVenue.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/OnBoarding/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/get-all-details-activity-venue/{activityXid}
|
||||
method: get
|
||||
|
||||
updateSuggestionAsReviewed:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/updateSuggestionAsReviewed.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/OnBoarding/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/update-suggestion-reviewed
|
||||
method: patch
|
||||
|
||||
resendOTPmail:
|
||||
handler: src/modules/host/handlers/resendOtp.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/resendOtp/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /resend-otp
|
||||
method: post
|
||||
|
||||
|
||||
mediaUploadTos3:
|
||||
handler: src/modules/host/handlers/mediaUploadToS3.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/mediaUploadToS3/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /media/upload/activity/{activityXid}
|
||||
method: post
|
||||
|
||||
|
||||
venueMediaUploadTos3:
|
||||
handler: src/modules/host/handlers/mediaUploadForVenueToS3.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/mediaUploadForVenueToS3/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /media/upload/venue/activity/{activityXid}
|
||||
method: post
|
||||
|
||||
|
||||
mediaDeleteFroms3:
|
||||
handler: src/modules/host/handlers/mediaDeleteFromS3.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/mediaDeleteFromS3/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /media/delete
|
||||
method: delete
|
||||
|
||||
createSchedulingForAct:
|
||||
handler: src/modules/host/handlers/Activity_Hub/Scheduling/createSchedulingOfAct.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/Scheduling/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /scheduling/create
|
||||
method: post
|
||||
|
||||
getActivitiesByStatus:
|
||||
handler: src/modules/host/handlers/Activity_Hub/Scheduling/getSchedulingOfAct.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/Scheduling/getSchedulingOfAct.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /scheduling/get-all-activities
|
||||
method: get
|
||||
|
||||
getVenueDurationByAct:
|
||||
handler: src/modules/host/handlers/Activity_Hub/Scheduling/getVenueDurationByAct.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/Scheduling/getVenueDurationByAct.*'
|
||||
- 'src/modules/host/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /scheduling/get-venue-duration/{activityXid}
|
||||
method: get
|
||||
|
||||
cancelSlotForActivity:
|
||||
handler: src/modules/host/handlers/Activity_Hub/Scheduling/cancelSlot.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/Scheduling/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /scheduling/cancel-slot
|
||||
method: post
|
||||
|
||||
openCanceledSlotForActivity:
|
||||
handler: src/modules/host/handlers/Activity_Hub/Scheduling/openCanceledSlot.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/Scheduling/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /scheduling/open-canceled-slot
|
||||
method: patch
|
||||
|
||||
createActivityAndAllQuestionsEntry:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/createActivityAndAllQuestionsEntry.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/OnBoarding/createActivityAndAllQuestionsEntry**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/create-activity
|
||||
method: post
|
||||
|
||||
submitPQAnswer:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/submitPQAnswer.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/OnBoarding/submitPQAnswer**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /Activity_Hub/OnBoarding/submit-pq-answer
|
||||
method: patch
|
||||
472
serverless/functions/minglaradmin.yml
Normal file
472
serverless/functions/minglaradmin.yml
Normal file
@@ -0,0 +1,472 @@
|
||||
# Minglar Admin Module Functions
|
||||
# Admin dashboard and management endpoints
|
||||
|
||||
minglarRegistration:
|
||||
handler: src/modules/minglaradmin/handlers/registration.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /registration
|
||||
method: post
|
||||
|
||||
minglarLoginForAdmin:
|
||||
handler: src/modules/minglaradmin/handlers/loginForMinglar.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /login
|
||||
method: post
|
||||
|
||||
minglarCreatePassword:
|
||||
handler: src/modules/minglaradmin/handlers/createPassword.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /create-password
|
||||
method: post
|
||||
|
||||
updateMinglarProfile:
|
||||
handler: src/modules/minglaradmin/handlers/updateProfile.handler
|
||||
memorySize: 1024
|
||||
timeout: 30
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/updateProfile.*'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /update-profile
|
||||
method: patch
|
||||
|
||||
prepopulateRole:
|
||||
handler: src/modules/minglaradmin/handlers/prepopulateRole.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /prepopulate-Roles
|
||||
method: get
|
||||
|
||||
getHostDetailsById:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/hosts/getByIdHostDetails.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/hosts/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/hosts/get-host-details/{host_xid}
|
||||
method: get
|
||||
|
||||
inviteTeammate:
|
||||
handler: src/modules/minglaradmin/handlers/settings/teammates/inviteTeammate.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/settings/teammates/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /settings/teammates/invite-teammate
|
||||
method: post
|
||||
|
||||
getAllHostApplication:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/hosts/getAllHostApplicationForAM.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/hosts/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/hosts/get-all-host-applications-am
|
||||
method: get
|
||||
|
||||
getAllHostActivityForAdmin:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/onboarding/getAllActivityOfHost.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/onboarding/getAllActivityOfHost.handler.*'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /get-all-activity-of-host/{id}
|
||||
method: get
|
||||
|
||||
getAllOnboardingHostApplications:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/onboarding/getAllOnboardingHosts.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/onboarding/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/onboarding/get-all-host-applications-admin
|
||||
method: get
|
||||
|
||||
getAllOnboardingHostApplications_New:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/onboarding/getOnboardingNewApplications.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/onboarding/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/onboarding/get-all-host-applications-admin-new
|
||||
method: get
|
||||
|
||||
getAllInvitationDetails:
|
||||
handler: src/modules/minglaradmin/handlers/settings/teammates/getAllInvitationDetails.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/settings/teammates**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /settings/teammates/get-all-invitation-details
|
||||
method: get
|
||||
|
||||
addSuggestion:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/hosts/addSuggestion.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/hosts/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/hosts/add-suggestion
|
||||
method: post
|
||||
|
||||
getAllCoadminAndAMDetails:
|
||||
handler: src/modules/minglaradmin/handlers/settings/teammates/getAllCoadminAndAM.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/settings/teammates/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /settings/teammates/get-all-coadmin-am
|
||||
method: get
|
||||
|
||||
getAllInvitedCoadminAndAMDetails:
|
||||
handler: src/modules/minglaradmin/handlers/settings/teammates/getAllInvitedCoadminAndAM.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/settings/teammates/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /settings/teammates/get-all-invited-coadmin-am
|
||||
method: get
|
||||
|
||||
getAmDetailsbyId:
|
||||
handler: src/modules/minglaradmin/handlers/getAmDetail_ById.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/settings/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /settings/teammates/get-am-details-by-id/{amXid}
|
||||
method: get
|
||||
|
||||
assignAMToHost:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/onboarding/assignAM.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/onboarding/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/onboarding/assign-am
|
||||
method: patch
|
||||
|
||||
editAgreementDetailsAndAccept:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/onboarding/editAgreementDetailsAndAccept.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/onboarding/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/onboarding/edit-agreement-accept-host
|
||||
method: patch
|
||||
|
||||
getAllPqqQuesAnsForAM:
|
||||
handler: src/modules/host/handlers/Activity_Hub/OnBoarding/getAllPQQwithSubmittedAns.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/host/handlers/Activity_Hub/OnBoarding/getAllPQQwithSubmittedAns**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/onboarding/get-all-pqq-ques-ans-for-am
|
||||
method: get
|
||||
|
||||
acceptHostApplication:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/hosts/acceptHostApplication.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/hosts/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/hosts/accept-host-application
|
||||
method: patch
|
||||
|
||||
RejectPQQByAM:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/hosts/rejectPQQbyAM.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/hosts/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/hosts/reject-pq-by-am
|
||||
method: patch
|
||||
|
||||
rejectActivityDetailsApplicationByAM:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/hosts/rejectActivityApplicationByAM.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/hosts/rejectActivityApplicationByAM**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/hosts/reject-activity-application-by-am
|
||||
method: patch
|
||||
|
||||
acceptPQByAM:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/hosts/acceptPQByAM.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/hosts/acceptPQByAM**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/hosts/accept-pq-by-am
|
||||
method: patch
|
||||
|
||||
acceptActivityDetailsApplicationByAM:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/hosts/acceptActivityApplicationByAM.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/hosts/acceptActivityApplicationByAM**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/hosts/accept-activity-application-by-am
|
||||
method: patch
|
||||
|
||||
rejectHostApplication:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/onboarding/rejectHostApplication.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/onboarding/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/onboarding/reject-host-application
|
||||
method: patch
|
||||
|
||||
rejectHostApplicationAM:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/hosts/rejectHostApplicationAM.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/hosts/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/hosts/reject-host-application-am
|
||||
method: patch
|
||||
|
||||
addPQQSuggestion:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/hosts/addPQQSuggestion.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/hosts/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/hosts/add-Pqq-suggestion
|
||||
method: post
|
||||
|
||||
addActivitySuggestion:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/hosts/addActivtiySuggestion.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/hosts/**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/hosts/add-Activity-suggestion
|
||||
method: post
|
||||
|
||||
getAllPQPDetailsForAM:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/pqp/getAllPQPDetailsForAM.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/pqp/getAllPQPDetailsForAM**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/pqp/pqp-details-for-am/{activityXid}
|
||||
method: get
|
||||
|
||||
getSuggestionsForAM:
|
||||
handler: src/modules/minglaradmin/handlers/hosthub/onboarding/showSuggestionToAM.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/minglaradmin/handlers/hosthub/onboarding/showSuggestionToAM**'
|
||||
- 'src/modules/minglaradmin/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /hosthub/onboarding/show-suggestion-to-am/{hostXid}
|
||||
method: get
|
||||
109
serverless/functions/prepopulate.yml
Normal file
109
serverless/functions/prepopulate.yml
Normal file
@@ -0,0 +1,109 @@
|
||||
# Prepopulate Module Functions
|
||||
# Reference data and lookup endpoints
|
||||
|
||||
getAllBankAndCurrencyDetails:
|
||||
handler: src/modules/prepopulate/handlers/getAllBankDetails.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/prepopulate/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /get-all-bank-currency-details
|
||||
method: get
|
||||
|
||||
getCityByState:
|
||||
handler: src/modules/prepopulate/handlers/getCityByState.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/prepopulate/handlers/getCityByState.*'
|
||||
- 'src/modules/prepopulate/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /get-city-by-state
|
||||
method: get
|
||||
|
||||
getBranchByBankXid:
|
||||
handler: src/modules/prepopulate/handlers/getBranchByBank.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/prepopulate/handlers/getBranchByBank.*'
|
||||
- 'src/modules/prepopulate/services/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /get-branch-by-bank
|
||||
method: get
|
||||
|
||||
getAllDocumentCountryStateCityDetails:
|
||||
handler: src/modules/prepopulate/handlers/getAllDocTypeWithCountryState.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/prepopulate/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /get-all-doc-country
|
||||
method: get
|
||||
|
||||
getAllPqqQuesAns:
|
||||
handler: src/modules/prepopulate/handlers/getAllPQQQuesWithAns.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/prepopulate/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /get-all-pqq-ques-ans
|
||||
method: get
|
||||
|
||||
getFrequenciesOfActivity:
|
||||
handler: src/modules/prepopulate/handlers/getAllFrequencies.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/prepopulate/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /get-all-Frequencies
|
||||
method: get
|
||||
|
||||
getAddActivityPrePopulate:
|
||||
handler: src/modules/prepopulate/handlers/getAddActivityPrePopulate.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/prepopulate/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /get-add-activity-prepopulate
|
||||
method: get
|
||||
484
serverless/functions/user.yml
Normal file
484
serverless/functions/user.yml
Normal file
@@ -0,0 +1,484 @@
|
||||
# Prepopulate Module Functions
|
||||
# Reference data and lookup endpoints
|
||||
|
||||
registerUser:
|
||||
handler: src/modules/user/handlers/authentication/registration.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /register
|
||||
method: post
|
||||
|
||||
submitPersonalInfo:
|
||||
handler: src/modules/user/handlers/authentication/submitPersonalInfo.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /submit-personal-info
|
||||
method: post
|
||||
|
||||
verifyOtpForUser:
|
||||
handler: src/modules/user/handlers/authentication/verifyOtpForUser.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /verify-otp
|
||||
method: post
|
||||
|
||||
generateAccessFromRefreshToken:
|
||||
handler: src/modules/user/handlers/authentication/generateRefereshToAccess.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /generate-access-from-refresh
|
||||
method: post
|
||||
|
||||
|
||||
setPasscodeForMobile:
|
||||
handler: src/modules/user/handlers/authentication/setPasscodeForMobile.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /set-passcode
|
||||
method: post
|
||||
|
||||
|
||||
verifyPasscode:
|
||||
handler: src/modules/user/handlers/authentication/verifyPasscode.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /verify-passcode
|
||||
method: post
|
||||
|
||||
setUserInterest:
|
||||
handler: src/modules/user/handlers/authentication/SetuserInterest.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /set-interests
|
||||
method: post
|
||||
|
||||
setUserLocationss:
|
||||
handler: src/modules/user/handlers/authentication/SetLocationofUser.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /set-location-user
|
||||
method: post
|
||||
|
||||
getLandingPageDetails:
|
||||
handler: src/modules/user/handlers/activities/landingPageAllDetails.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/activities/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/get-landing-page-details
|
||||
method: get
|
||||
|
||||
getSurpriseMePageDetails:
|
||||
handler: src/modules/user/handlers/activities/surpriseMePage.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/activities/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/get-surprise-me-page-details
|
||||
method: get
|
||||
|
||||
getActivityDetailsById:
|
||||
handler: src/modules/user/handlers/activities/getByIdActivityDetails.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/activities/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/get-activity-details-by-id/{activity_xid}
|
||||
method: get
|
||||
|
||||
checkAvailabilityDetails:
|
||||
handler: src/modules/user/handlers/activities/checkAvailabilityDetails.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/activities/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/check-availability/{activity_xid}
|
||||
method: get
|
||||
|
||||
searchActivities:
|
||||
handler: src/modules/user/handlers/activities/getSpecificSearchApi.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/activities/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/specific-search
|
||||
method: get
|
||||
|
||||
searchSchoolsAndCompanies:
|
||||
handler: src/modules/user/handlers/connections/getSchoolCompanyName.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/connections/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /connections/search-schools-companies
|
||||
method: get
|
||||
|
||||
searchCities:
|
||||
handler: src/modules/user/handlers/connections/searchCities.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/connections/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /connections/search-cities
|
||||
method: get
|
||||
|
||||
addSchoolCompanyDetail:
|
||||
handler: src/modules/user/handlers/connections/addSchoolCompanyDetail.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/connections/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /connections/add-school-company
|
||||
method: post
|
||||
|
||||
removeConnectionDetails:
|
||||
handler: src/modules/user/handlers/connections/removeConnectionDetails.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/connections/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /connections/remove-connection-details
|
||||
method: delete
|
||||
|
||||
getAllConnectionOfUser:
|
||||
handler: src/modules/user/handlers/connections/getAllConnectionDetailsOfUser.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/connections/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /connections/get-all-connections-details
|
||||
method: get
|
||||
|
||||
getActivityFromConnectionsInterest:
|
||||
handler: src/modules/user/handlers/connections/getActivityFromConnectionsInterest.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/connections/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /connections/get-activity-from-connections-interest
|
||||
method: get
|
||||
|
||||
searchConnectionPeople:
|
||||
handler: src/modules/user/handlers/connections/searchConnectionPeople.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/connections/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /connections/search-connection-people
|
||||
method: get
|
||||
|
||||
viewMoreActivitiesByInterest:
|
||||
handler: src/modules/user/handlers/activities/viewMoreActivities.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/activities/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/view-more-activities
|
||||
method: get
|
||||
|
||||
viewMoreActivitiesUpperSection:
|
||||
handler: src/modules/user/handlers/activities/viewMoreUpperSection.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/activities/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/view-more-activities-upper-section
|
||||
method: get
|
||||
|
||||
getRandomActiveActivity:
|
||||
handler: src/modules/user/handlers/activities/getRandomActiveActivity.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/activities/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/get-random-active-activity
|
||||
method: get
|
||||
|
||||
getNearbyActivities:
|
||||
handler: src/modules/user/handlers/activities/getNearbyActivities.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/activities/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/get-nearby-activities
|
||||
method: get
|
||||
|
||||
addActivityToBucketInterested:
|
||||
handler: src/modules/user/handlers/activities/addToBucketInterested.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/activities/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/add-to-bucket-interested
|
||||
method: post
|
||||
|
||||
removeActivityFromBucketInterested:
|
||||
handler: src/modules/user/handlers/activities/removeFromBucketInterested.handler
|
||||
memorySize: 384
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/handlers/activities/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/remove-from-bucket-interested
|
||||
method: post
|
||||
|
||||
getFilteredLandingPageAllDetails:
|
||||
handler: src/modules/user/handlers/activities/filteredLandingPageAllDetails.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/get-filtered-landing-page-details
|
||||
method: get
|
||||
|
||||
getAllBucketActivities:
|
||||
handler: src/modules/user/handlers/activities/getAllBucketActivities.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /activities/get-all-bucket-activities
|
||||
method: get
|
||||
|
||||
getUserItineraryDetails:
|
||||
handler: src/modules/user/handlers/itinerary/getUserItineraryDetails.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /itinerary/get-user-itinerary-details
|
||||
method: get
|
||||
|
||||
saveUserItinerary:
|
||||
handler: src/modules/user/handlers/itinerary/saveUserItinerary.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /itinerary/save-user-itinerary
|
||||
method: post
|
||||
|
||||
getAllUserSavedItineraries:
|
||||
handler: src/modules/user/handlers/itinerary/getAllUserSavedItineraries.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /itinerary/get-all-user-saved-itineraries
|
||||
method: get
|
||||
|
||||
getMatchingBucketInterestedActivities:
|
||||
handler: src/modules/user/handlers/itinerary/getMatchingBucketInterestedActivities.handler
|
||||
memorySize: 512
|
||||
package:
|
||||
patterns:
|
||||
- 'src/modules/user/**'
|
||||
- ${file(./serverless/patterns/base.yml):pattern1}
|
||||
- ${file(./serverless/patterns/base.yml):pattern2}
|
||||
- ${file(./serverless/patterns/base.yml):pattern3}
|
||||
- ${file(./serverless/patterns/base.yml):pattern4}
|
||||
events:
|
||||
- httpApi:
|
||||
path: /itinerary/get-matching-bucket-interested-activities
|
||||
method: post
|
||||
18
serverless/patterns/aws-s3.yml
Normal file
18
serverless/patterns/aws-s3.yml
Normal file
@@ -0,0 +1,18 @@
|
||||
# AWS S3 SDK packaging patterns (merged from aws-s3.yml and aws-s3-full.yml)
|
||||
# Comprehensive list of AWS S3 dependencies for Lambda packaging
|
||||
pattern1: 'node_modules/@aws-sdk/client-s3/**'
|
||||
pattern2: 'node_modules/@aws-sdk/s3-request-presigner/**'
|
||||
pattern3: 'node_modules/@aws-sdk/types/**'
|
||||
pattern4: 'node_modules/@aws-sdk/middleware-logger/**'
|
||||
pattern5: 'node_modules/@aws-sdk/**'
|
||||
pattern6: 'node_modules/@smithy/**'
|
||||
pattern7: 'node_modules/tslib/**'
|
||||
pattern8: 'node_modules/uuid/**'
|
||||
pattern9: 'node_modules/@aws-crypto/**'
|
||||
pattern10: 'node_modules/@aws/smithy-client/**'
|
||||
pattern11: 'node_modules/@aws/util-uri-escape/**'
|
||||
pattern12: 'node_modules/@aws/util-middleware/**'
|
||||
pattern13: 'node_modules/@aws/lambda-invoke-store/**'
|
||||
pattern14: 'node_modules/busboy/**'
|
||||
pattern15: 'node_modules/lambda-multipart-parser/**'
|
||||
pattern16: 'node_modules/fast-xml-parser/**'
|
||||
9
serverless/patterns/base.yml
Normal file
9
serverless/patterns/base.yml
Normal file
@@ -0,0 +1,9 @@
|
||||
# Base packaging patterns shared across all functions
|
||||
pattern1: 'src/common/**'
|
||||
pattern2: 'common/**'
|
||||
# REMOVED: Prisma is now provided by Lambda layer - DO NOT include in function packages
|
||||
# pattern3: 'node_modules/@prisma/client/**'
|
||||
# pattern4: 'node_modules/.prisma/client/libquery_engine-rhel-openssl-3.0.x.so.node'
|
||||
pattern3: '!node_modules/@prisma/**'
|
||||
pattern4: '!node_modules/.prisma/**'
|
||||
pattern5: '!node_modules/.prisma/client/libquery_engine*'
|
||||
29
src/common/database/prisma.client.ts
Normal file
29
src/common/database/prisma.client.ts
Normal file
@@ -0,0 +1,29 @@
|
||||
import { PrismaClient } from '@prisma/client';
|
||||
import { PrismaPg } from '@prisma/adapter-pg';
|
||||
|
||||
// Singleton pattern for Prisma client - prevents "Too many database connections" error
|
||||
const globalForPrisma = globalThis as unknown as {
|
||||
prisma: PrismaClient | undefined;
|
||||
};
|
||||
|
||||
function createPrismaClient() {
|
||||
const adapter = new PrismaPg({ connectionString: process.env.DATABASE_URL });
|
||||
|
||||
return new PrismaClient({
|
||||
adapter,
|
||||
log: process.env.NODE_ENV === 'dev' ? ['query', 'info', 'warn', 'error'] : ['error'],
|
||||
});
|
||||
}
|
||||
|
||||
export const prisma = globalForPrisma.prisma ?? createPrismaClient();
|
||||
|
||||
if (process.env.NODE_ENV !== 'production') {
|
||||
globalForPrisma.prisma = prisma;
|
||||
}
|
||||
|
||||
// For serverless environments, always cache the client
|
||||
if (process.env.IS_OFFLINE || process.env.AWS_LAMBDA_FUNCTION_NAME) {
|
||||
globalForPrisma.prisma = prisma;
|
||||
}
|
||||
|
||||
|
||||
5
src/common/database/prisma.lambda.service.ts
Normal file
5
src/common/database/prisma.lambda.service.ts
Normal file
@@ -0,0 +1,5 @@
|
||||
// Re-export the singleton prisma client for Lambda handlers
|
||||
// This ensures all Lambda functions use the same cached connection
|
||||
import { prisma } from './prisma.client';
|
||||
|
||||
export const prismaClient = prisma;
|
||||
@@ -1,5 +1,5 @@
|
||||
import { Global, Module } from '@nestjs/common';
|
||||
import { PrismaService } from './prisma.service';
|
||||
import { PrismaService } from './prisma.service'; // correct export location
|
||||
|
||||
@Global()
|
||||
@Module({
|
||||
|
||||
@@ -1,17 +1,13 @@
|
||||
import { Injectable, OnModuleInit, OnModuleDestroy, INestApplication } from '@nestjs/common';
|
||||
import { Injectable, OnModuleInit, OnModuleDestroy } from '@nestjs/common';
|
||||
import { PrismaClient } from '@prisma/client';
|
||||
import { prisma } from './prisma.client';
|
||||
|
||||
@Injectable()
|
||||
export class PrismaService extends PrismaClient implements OnModuleInit, OnModuleDestroy {
|
||||
constructor() {
|
||||
super({
|
||||
datasources: {
|
||||
db: {
|
||||
url: process.env.DATABASE_URL,
|
||||
},
|
||||
},
|
||||
log: process.env.NODE_ENV === 'dev' ? ['query', 'info', 'warn', 'error'] : ['error'],
|
||||
});
|
||||
super();
|
||||
// Use the singleton instance
|
||||
Object.assign(this, prisma);
|
||||
}
|
||||
|
||||
async onModuleInit() {
|
||||
@@ -21,11 +17,4 @@ export class PrismaService extends PrismaClient implements OnModuleInit, OnModul
|
||||
async onModuleDestroy() {
|
||||
await this.$disconnect();
|
||||
}
|
||||
|
||||
async enableShutdownHooks(app: INestApplication) {
|
||||
process.on('beforeExit', async () => {
|
||||
await app.close();
|
||||
});
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
46
src/common/email/brevoApi.ts
Normal file
46
src/common/email/brevoApi.ts
Normal file
@@ -0,0 +1,46 @@
|
||||
import axios, { AxiosInstance } from 'axios';
|
||||
import config from '../../config/config';
|
||||
|
||||
interface EmailRecipient {
|
||||
email: string;
|
||||
name?: string;
|
||||
}
|
||||
|
||||
interface EmailOptions {
|
||||
recipients: EmailRecipient[];
|
||||
subject: string;
|
||||
htmlContent: string;
|
||||
}
|
||||
|
||||
class BrevoService {
|
||||
private readonly instance: AxiosInstance;
|
||||
|
||||
constructor() {
|
||||
this.instance = axios.create({
|
||||
baseURL: config.email.BrevobaseURL,
|
||||
headers: {
|
||||
'api-key': config.email.api_key,
|
||||
'Content-Type': 'application/json',
|
||||
},
|
||||
});
|
||||
}
|
||||
|
||||
async sendEmail(options: EmailOptions): Promise<{ messageId: string }> {
|
||||
const response = await this.instance.post('/smtp/email', {
|
||||
sender: {
|
||||
name: 'Minglar',
|
||||
email: 'minglar.admin@minglargroup.com',
|
||||
},
|
||||
to: options.recipients,
|
||||
subject: options.subject,
|
||||
htmlContent: options.htmlContent,
|
||||
replyTo: {
|
||||
email: 'minglar.admin@minglargroup.com',
|
||||
},
|
||||
});
|
||||
|
||||
return response.data;
|
||||
}
|
||||
}
|
||||
|
||||
export const brevoService = new BrevoService();
|
||||
18
src/common/middlewares/aws/getPreSignedUrl.ts
Normal file
18
src/common/middlewares/aws/getPreSignedUrl.ts
Normal file
@@ -0,0 +1,18 @@
|
||||
// common/utils/awsPresign.ts
|
||||
import config from "@/config/config";
|
||||
import { S3Client, GetObjectCommand } from "@aws-sdk/client-s3";
|
||||
import { getSignedUrl } from "@aws-sdk/s3-request-presigner";
|
||||
|
||||
const s3 = new S3Client({
|
||||
region: config.aws.region, // e.g. ap-south-1
|
||||
});
|
||||
|
||||
export const getPresignedUrl = async (bucket: string, key: string) => {
|
||||
const command = new GetObjectCommand({
|
||||
Bucket: bucket,
|
||||
Key: key,
|
||||
});
|
||||
|
||||
// URL valid for 1 hour
|
||||
return await getSignedUrl(s3, command, { expiresIn: 3600 });
|
||||
};
|
||||
@@ -1,14 +1,14 @@
|
||||
import jwt from 'jsonwebtoken';
|
||||
import httpStatus from 'http-status';
|
||||
import { Request, Response, NextFunction } from 'express';
|
||||
import { PrismaClient } from '@prisma/client';
|
||||
import ApiError from '../../utils/helper/ApiError';
|
||||
import config from '../../../config/config';
|
||||
|
||||
const prisma = new PrismaClient();
|
||||
import { ROLE } from '@/common/utils/constants/common.constant';
|
||||
import { prisma } from '../../database/prisma.client';
|
||||
|
||||
interface DecodedToken {
|
||||
id: number;
|
||||
id?: number;
|
||||
sub?: string | number;
|
||||
role?: string;
|
||||
iat: number;
|
||||
exp: number;
|
||||
@@ -26,7 +26,70 @@ declare module 'express-serve-static-core' {
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies JWT and validates Host user (role_xid = 3)
|
||||
* Core authentication function - verifies JWT and validates Host user
|
||||
* Can be used by both Express middleware and Lambda handlers
|
||||
*/
|
||||
export async function verifyHostToken(token: string): Promise<{ id: number; role?: string }> {
|
||||
if (!token) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Please authenticate');
|
||||
}
|
||||
|
||||
try {
|
||||
const decoded = jwt.verify(token, config.jwt.secret) as unknown as DecodedToken;
|
||||
|
||||
const userId = decoded.id ?? (decoded.sub ? Number(decoded.sub) : null);
|
||||
|
||||
if (!userId) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Invalid token payload');
|
||||
}
|
||||
|
||||
// ✅ Fetch user from Prisma (Host user only)
|
||||
const user = await prisma.user.findUnique({
|
||||
where: { id: userId },
|
||||
include: { role: true },
|
||||
});
|
||||
|
||||
const latestToken = await prisma.token.findFirst({
|
||||
where: {
|
||||
userXid: userId
|
||||
},
|
||||
orderBy: { id: 'desc' }
|
||||
})
|
||||
|
||||
if (latestToken.isBlackListed == true) {
|
||||
throw new ApiError(401, "This session is expired. Please login.")
|
||||
}
|
||||
|
||||
if (!user) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'User not found');
|
||||
}
|
||||
|
||||
// ✅ Check if user is active
|
||||
if (user.isActive === false) {
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Your account is deactivated by admin.');
|
||||
}
|
||||
|
||||
// ✅ Check Host role (role_xid = 4)
|
||||
if (user.roleXid !== ROLE.HOST) {
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Access denied.');
|
||||
}
|
||||
|
||||
return { id: user.id, role: user.role?.roleName };
|
||||
} catch (error) {
|
||||
if (error instanceof jwt.TokenExpiredError) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Your session has expired. Please log in again.');
|
||||
}
|
||||
|
||||
if (error instanceof ApiError) {
|
||||
throw error;
|
||||
}
|
||||
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Invalid or expired authentication token.');
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies JWT and validates Host user (role_xid = 4)
|
||||
*/
|
||||
const verifyCallback = async (
|
||||
req: Request,
|
||||
@@ -35,62 +98,22 @@ const verifyCallback = async (
|
||||
) => {
|
||||
const token = req.header('x-auth-token') || req.cookies?.accessToken;
|
||||
|
||||
if (!token) {
|
||||
return reject(new ApiError(httpStatus.UNAUTHORIZED, 'Please authenticate'));
|
||||
}
|
||||
|
||||
try {
|
||||
const decoded = jwt.verify(token, config.jwt.secret) as DecodedToken;
|
||||
|
||||
if (!decoded?.id) {
|
||||
return reject(new ApiError(httpStatus.UNAUTHORIZED, 'Invalid token payload'));
|
||||
}
|
||||
|
||||
// ✅ Fetch user from Prisma (Host user only)
|
||||
const user = await prisma.user.findUnique({
|
||||
where: { id: decoded.id },
|
||||
include: { role: true },
|
||||
});
|
||||
|
||||
if (!user) {
|
||||
return reject(new ApiError(httpStatus.UNAUTHORIZED, 'User not found'));
|
||||
}
|
||||
|
||||
// ✅ Check if user is active
|
||||
if (!user.isActive) {
|
||||
return reject(
|
||||
new ApiError(httpStatus.FORBIDDEN, 'Your account is deactivated by admin.')
|
||||
);
|
||||
}
|
||||
|
||||
// ✅ Check Host role (role_xid = 3)
|
||||
if (user.roleXid !== 3) {
|
||||
return reject(
|
||||
new ApiError(httpStatus.FORBIDDEN, 'Access restricted to host users only')
|
||||
);
|
||||
}
|
||||
const userInfo = await verifyHostToken(token);
|
||||
|
||||
// Attach user to request
|
||||
req.user = { id: user.id.toString(), role: user.role?.roleName };
|
||||
req.user = { id: userInfo.id.toString(), role: userInfo.role };
|
||||
|
||||
resolve();
|
||||
} catch (error) {
|
||||
if (error instanceof jwt.TokenExpiredError) {
|
||||
return reject(
|
||||
new ApiError(httpStatus.UNAUTHORIZED, 'Your session has expired. Please log in again.')
|
||||
);
|
||||
}
|
||||
|
||||
return reject(
|
||||
new ApiError(httpStatus.FORBIDDEN, 'Invalid or expired authentication token.')
|
||||
);
|
||||
return reject(error as Error);
|
||||
}
|
||||
};
|
||||
|
||||
/**
|
||||
* Express middleware — use as `auth()` in routes
|
||||
*/
|
||||
const auth =
|
||||
const authForHost =
|
||||
() =>
|
||||
async (req: Request, res: Response, next: NextFunction) => {
|
||||
return new Promise((resolve, reject) => {
|
||||
@@ -100,4 +123,4 @@ const auth =
|
||||
.catch((err) => next(err));
|
||||
};
|
||||
|
||||
export default auth;
|
||||
export default authForHost;
|
||||
|
||||
@@ -1,14 +1,14 @@
|
||||
import jwt from 'jsonwebtoken';
|
||||
import httpStatus from 'http-status';
|
||||
import { Request, Response, NextFunction } from 'express';
|
||||
import { PrismaClient } from '@prisma/client';
|
||||
import ApiError from '../../utils/helper/ApiError';
|
||||
import config from '../../../config/config';
|
||||
|
||||
const prisma = new PrismaClient();
|
||||
import { ROLE } from '@/common/utils/constants/common.constant';
|
||||
import { prisma } from '../../database/prisma.client';
|
||||
|
||||
interface DecodedToken {
|
||||
id: number;
|
||||
id?: number;
|
||||
sub?: string | number;
|
||||
role?: string;
|
||||
iat: number;
|
||||
exp: number;
|
||||
@@ -26,7 +26,71 @@ declare module 'express-serve-static-core' {
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies JWT and validates Host user (role_xid = 3)
|
||||
* Core authentication function - verifies JWT and validates Host user
|
||||
* Can be used by both Express middleware and Lambda handlers
|
||||
*/
|
||||
export async function verifyMinglarAdminToken(token: string): Promise<{ id: number; role?: string }> {
|
||||
if (!token) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Please authenticate');
|
||||
}
|
||||
|
||||
try {
|
||||
const decoded = jwt.verify(token, config.jwt.secret) as unknown as DecodedToken;
|
||||
|
||||
const userId = decoded.id ?? (decoded.sub ? Number(decoded.sub) : null);
|
||||
|
||||
if (!userId) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Invalid token payload');
|
||||
}
|
||||
|
||||
// ✅ Fetch user from Prisma (Host user only)
|
||||
const user = await prisma.user.findUnique({
|
||||
where: { id: userId },
|
||||
include: { role: true },
|
||||
});
|
||||
|
||||
const latestToken = await prisma.token.findFirst({
|
||||
where: {
|
||||
userXid: userId
|
||||
},
|
||||
orderBy: { id: 'desc' }
|
||||
})
|
||||
|
||||
if (latestToken.isBlackListed == true) {
|
||||
throw new ApiError(401, "This session is expired. Please login.")
|
||||
}
|
||||
|
||||
if (!user) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'User not found');
|
||||
}
|
||||
|
||||
// ✅ Check if user is active
|
||||
if (user.isActive === false) {
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Your account is deactivated by admin.');
|
||||
}
|
||||
|
||||
// ✅ Check Minglar Roles (role_xid = 1, 2, 3)
|
||||
if (![ROLE.MINGLAR_ADMIN, ROLE.CO_ADMIN, ROLE.ACCOUNT_MANAGER].includes(user.roleXid)) {
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Access denied.');
|
||||
}
|
||||
|
||||
|
||||
return { id: user.id, role: user.role?.roleName };
|
||||
} catch (error) {
|
||||
if (error instanceof jwt.TokenExpiredError) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Your session has expired. Please log in again.');
|
||||
}
|
||||
|
||||
if (error instanceof ApiError) {
|
||||
throw error;
|
||||
}
|
||||
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Invalid or expired authentication token.');
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies JWT and validates Host user (role_xid = 1)
|
||||
*/
|
||||
const verifyCallback = async (
|
||||
req: Request,
|
||||
@@ -35,62 +99,22 @@ const verifyCallback = async (
|
||||
) => {
|
||||
const token = req.header('x-auth-token') || req.cookies?.accessToken;
|
||||
|
||||
if (!token) {
|
||||
return reject(new ApiError(httpStatus.UNAUTHORIZED, 'Please authenticate'));
|
||||
}
|
||||
|
||||
try {
|
||||
const decoded = jwt.verify(token, config.jwt.secret) as DecodedToken;
|
||||
|
||||
if (!decoded?.id) {
|
||||
return reject(new ApiError(httpStatus.UNAUTHORIZED, 'Invalid token payload'));
|
||||
}
|
||||
|
||||
// ✅ Fetch user from Prisma (Host user only)
|
||||
const user = await prisma.user.findUnique({
|
||||
where: { id: decoded.id },
|
||||
include: { role: true },
|
||||
});
|
||||
|
||||
if (!user) {
|
||||
return reject(new ApiError(httpStatus.UNAUTHORIZED, 'User not found'));
|
||||
}
|
||||
|
||||
// ✅ Check if user is active
|
||||
if (!user.isActive) {
|
||||
return reject(
|
||||
new ApiError(httpStatus.FORBIDDEN, 'Your account is deactivated by admin.')
|
||||
);
|
||||
}
|
||||
|
||||
// ✅ Check Admin role (role_xid = 2)
|
||||
if (user.roleXid !== 2) {
|
||||
return reject(
|
||||
new ApiError(httpStatus.FORBIDDEN, 'Access restricted to host users only')
|
||||
);
|
||||
}
|
||||
const userInfo = await verifyMinglarAdminToken(token);
|
||||
|
||||
// Attach user to request
|
||||
req.user = { id: user.id.toString(), role: user.role?.roleName };
|
||||
req.user = { id: userInfo.id.toString(), role: userInfo.role };
|
||||
|
||||
resolve();
|
||||
} catch (error) {
|
||||
if (error instanceof jwt.TokenExpiredError) {
|
||||
return reject(
|
||||
new ApiError(httpStatus.UNAUTHORIZED, 'Your session has expired. Please log in again.')
|
||||
);
|
||||
}
|
||||
|
||||
return reject(
|
||||
new ApiError(httpStatus.FORBIDDEN, 'Invalid or expired authentication token.')
|
||||
);
|
||||
return reject(error as Error);
|
||||
}
|
||||
};
|
||||
|
||||
/**
|
||||
* Express middleware — use as `auth()` in routes
|
||||
*/
|
||||
const auth =
|
||||
const authForHost =
|
||||
() =>
|
||||
async (req: Request, res: Response, next: NextFunction) => {
|
||||
return new Promise((resolve, reject) => {
|
||||
@@ -100,4 +124,4 @@ const auth =
|
||||
.catch((err) => next(err));
|
||||
};
|
||||
|
||||
export default auth;
|
||||
export default authForHost;
|
||||
|
||||
129
src/common/middlewares/jwt/authForMinglarAdminHost.ts
Normal file
129
src/common/middlewares/jwt/authForMinglarAdminHost.ts
Normal file
@@ -0,0 +1,129 @@
|
||||
import jwt from 'jsonwebtoken';
|
||||
import httpStatus from 'http-status';
|
||||
import { Request, Response, NextFunction } from 'express';
|
||||
import ApiError from '../../utils/helper/ApiError';
|
||||
import config from '../../../config/config';
|
||||
import { ROLE } from '@/common/utils/constants/common.constant';
|
||||
import { prisma } from '../../database/prisma.client';
|
||||
|
||||
|
||||
|
||||
interface DecodedToken {
|
||||
id?: number;
|
||||
sub?: string | number;
|
||||
role?: string;
|
||||
iat: number;
|
||||
exp: number;
|
||||
}
|
||||
|
||||
interface UserPayload {
|
||||
id: string;
|
||||
role?: string;
|
||||
}
|
||||
|
||||
declare module 'express-serve-static-core' {
|
||||
interface Request {
|
||||
user?: UserPayload;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Core authentication function - verifies JWT and validates Host user
|
||||
* Can be used by both Express middleware and Lambda handlers
|
||||
*/
|
||||
export async function verifyMinglarAdminHostToken(token: string): Promise<{ id: number; role?: string }> {
|
||||
if (!token) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Please authenticate');
|
||||
}
|
||||
|
||||
try {
|
||||
const decoded = jwt.verify(token, config.jwt.secret) as unknown as DecodedToken;
|
||||
|
||||
const userId = decoded.id ?? (decoded.sub ? Number(decoded.sub) : null);
|
||||
|
||||
if (!userId) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Invalid token payload');
|
||||
}
|
||||
|
||||
// ✅ Fetch user from Prisma (Host user only)
|
||||
const user = await prisma.user.findUnique({
|
||||
where: { id: userId },
|
||||
include: { role: true },
|
||||
});
|
||||
|
||||
const latestToken = await prisma.token.findFirst({
|
||||
where: {
|
||||
userXid: userId
|
||||
},
|
||||
orderBy: { id: 'desc' }
|
||||
})
|
||||
|
||||
if (latestToken.isBlackListed == true) {
|
||||
throw new ApiError(401, "This session is expired. Please login.")
|
||||
}
|
||||
|
||||
if (!user) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'User not found');
|
||||
}
|
||||
|
||||
// ✅ Check if user is active
|
||||
if (user.isActive === false) {
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Your account is deactivated by admin.');
|
||||
}
|
||||
|
||||
// ✅ Check Minglar Roles (role_xid = 1, 2, 3)
|
||||
if (![ROLE.MINGLAR_ADMIN, ROLE.CO_ADMIN, ROLE.ACCOUNT_MANAGER, ROLE.HOST].includes(user.roleXid)) {
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Access denied.');
|
||||
}
|
||||
|
||||
|
||||
return { id: user.id, role: user.role?.roleName };
|
||||
} catch (error) {
|
||||
if (error instanceof jwt.TokenExpiredError) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Your session has expired. Please log in again.');
|
||||
}
|
||||
|
||||
if (error instanceof ApiError) {
|
||||
throw error;
|
||||
}
|
||||
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Invalid or expired authentication token.');
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies JWT and validates Host user (role_xid = 1)
|
||||
*/
|
||||
const verifyCallback = async (
|
||||
req: Request,
|
||||
resolve: (value?: unknown) => void,
|
||||
reject: (reason?: Error) => void
|
||||
) => {
|
||||
const token = req.header('x-auth-token') || req.cookies?.accessToken;
|
||||
|
||||
try {
|
||||
const userInfo = await verifyMinglarAdminHostToken(token);
|
||||
|
||||
// Attach user to request
|
||||
req.user = { id: userInfo.id.toString(), role: userInfo.role };
|
||||
|
||||
resolve();
|
||||
} catch (error) {
|
||||
return reject(error as Error);
|
||||
}
|
||||
};
|
||||
|
||||
/**
|
||||
* Express middleware — use as `auth()` in routes
|
||||
*/
|
||||
const authForHost =
|
||||
() =>
|
||||
async (req: Request, res: Response, next: NextFunction) => {
|
||||
return new Promise((resolve, reject) => {
|
||||
verifyCallback(req, resolve, reject);
|
||||
})
|
||||
.then(() => next())
|
||||
.catch((err) => next(err));
|
||||
};
|
||||
|
||||
export default authForHost;
|
||||
127
src/common/middlewares/jwt/authForOnlyMinglarAdmin.ts
Normal file
127
src/common/middlewares/jwt/authForOnlyMinglarAdmin.ts
Normal file
@@ -0,0 +1,127 @@
|
||||
import jwt from 'jsonwebtoken';
|
||||
import httpStatus from 'http-status';
|
||||
import { Request, Response, NextFunction } from 'express';
|
||||
import ApiError from '../../utils/helper/ApiError';
|
||||
import config from '../../../config/config';
|
||||
import { ROLE } from '@/common/utils/constants/common.constant';
|
||||
import { prisma } from '../../database/prisma.client';
|
||||
|
||||
interface DecodedToken {
|
||||
id?: number;
|
||||
sub?: string | number;
|
||||
role?: string;
|
||||
iat: number;
|
||||
exp: number;
|
||||
}
|
||||
|
||||
interface UserPayload {
|
||||
id: string;
|
||||
role?: string;
|
||||
}
|
||||
|
||||
declare module 'express-serve-static-core' {
|
||||
interface Request {
|
||||
user?: UserPayload;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Core authentication function - verifies JWT and validates Host user
|
||||
* Can be used by both Express middleware and Lambda handlers
|
||||
*/
|
||||
export async function verifyOnlyMinglarAdminToken(token: string): Promise<{ id: number; role?: string }> {
|
||||
if (!token) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Please authenticate');
|
||||
}
|
||||
|
||||
try {
|
||||
const decoded = jwt.verify(token, config.jwt.secret) as unknown as DecodedToken;
|
||||
|
||||
const userId = decoded.id ?? (decoded.sub ? Number(decoded.sub) : null);
|
||||
|
||||
if (!userId) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Invalid token payload');
|
||||
}
|
||||
|
||||
// ✅ Fetch user from Prisma (Host user only)
|
||||
const user = await prisma.user.findUnique({
|
||||
where: { id: userId },
|
||||
include: { role: true },
|
||||
});
|
||||
|
||||
const latestToken = await prisma.token.findFirst({
|
||||
where: {
|
||||
userXid: userId
|
||||
},
|
||||
orderBy: { id: 'desc' }
|
||||
})
|
||||
|
||||
if (latestToken.isBlackListed == true) {
|
||||
throw new ApiError(401, "This session is expired. Please login.")
|
||||
}
|
||||
|
||||
if (!user) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'User not found');
|
||||
}
|
||||
|
||||
// ✅ Check if user is active
|
||||
if (user.isActive === false) {
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Your account is deactivated by admin.');
|
||||
}
|
||||
|
||||
// ✅ Check Minglar Roles (role_xid = 1)
|
||||
if (user.roleXid !== ROLE.MINGLAR_ADMIN) {
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Access denied.');
|
||||
}
|
||||
|
||||
|
||||
return { id: user.id, role: user.role?.roleName };
|
||||
} catch (error) {
|
||||
if (error instanceof jwt.TokenExpiredError) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Your session has expired. Please log in again.');
|
||||
}
|
||||
|
||||
if (error instanceof ApiError) {
|
||||
throw error;
|
||||
}
|
||||
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Invalid or expired authentication token.');
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies JWT and validates Host user (role_xid = 1)
|
||||
*/
|
||||
const verifyCallback = async (
|
||||
req: Request,
|
||||
resolve: (value?: unknown) => void,
|
||||
reject: (reason?: Error) => void
|
||||
) => {
|
||||
const token = req.header('x-auth-token') || req.cookies?.accessToken;
|
||||
|
||||
try {
|
||||
const userInfo = await verifyOnlyMinglarAdminToken(token);
|
||||
|
||||
// Attach user to request
|
||||
req.user = { id: userInfo.id.toString(), role: userInfo.role };
|
||||
|
||||
resolve();
|
||||
} catch (error) {
|
||||
return reject(error as Error);
|
||||
}
|
||||
};
|
||||
|
||||
/**
|
||||
* Express middleware — use as `auth()` in routes
|
||||
*/
|
||||
const authForHost =
|
||||
() =>
|
||||
async (req: Request, res: Response, next: NextFunction) => {
|
||||
return new Promise((resolve, reject) => {
|
||||
verifyCallback(req, resolve, reject);
|
||||
})
|
||||
.then(() => next())
|
||||
.catch((err) => next(err));
|
||||
};
|
||||
|
||||
export default authForHost;
|
||||
@@ -1,14 +1,15 @@
|
||||
import jwt from 'jsonwebtoken';
|
||||
import httpStatus from 'http-status';
|
||||
import { Request, Response, NextFunction } from 'express';
|
||||
import { PrismaClient } from '@prisma/client';
|
||||
import ApiError from '../../utils/helper/ApiError';
|
||||
import config from '../../../config/config';
|
||||
import { ROLE } from '@/common/utils/constants/common.constant';
|
||||
|
||||
const prisma = new PrismaClient();
|
||||
import { prisma } from '../../database/prisma.client';
|
||||
|
||||
interface DecodedToken {
|
||||
id: number;
|
||||
id?: number;
|
||||
sub?: string | number;
|
||||
role?: string;
|
||||
iat: number;
|
||||
exp: number;
|
||||
@@ -26,7 +27,70 @@ declare module 'express-serve-static-core' {
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies JWT and validates Host user (role_xid = 3)
|
||||
* Core authentication function - verifies JWT and validates Host user
|
||||
* Can be used by both Express middleware and Lambda handlers
|
||||
*/
|
||||
export async function verifyUserToken(token: string): Promise<{ id: number; role?: string }> {
|
||||
if (!token) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Please authenticate');
|
||||
}
|
||||
|
||||
try {
|
||||
const decoded = jwt.verify(token, config.jwt.secret) as unknown as DecodedToken;
|
||||
|
||||
const userId = decoded.id ?? (decoded.sub ? Number(decoded.sub) : null);
|
||||
|
||||
if (!userId) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Invalid token payload');
|
||||
}
|
||||
|
||||
// ✅ Fetch user from Prisma (Host user only)
|
||||
const user = await prisma.user.findUnique({
|
||||
where: { id: userId },
|
||||
include: { role: true },
|
||||
});
|
||||
|
||||
const latestToken = await prisma.token.findFirst({
|
||||
where: {
|
||||
userXid: userId
|
||||
},
|
||||
orderBy: { id: 'desc' }
|
||||
})
|
||||
|
||||
if (latestToken.isBlackListed == true) {
|
||||
throw new ApiError(401, "This session is expired. Please login.")
|
||||
}
|
||||
|
||||
if (!user) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'User not found');
|
||||
}
|
||||
|
||||
// ✅ Check if user is active
|
||||
if (user.isActive === false) {
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Your account is deactivated by admin.');
|
||||
}
|
||||
|
||||
// ✅ Check Host role (role_xid = 6)
|
||||
if (user.roleXid !== ROLE.USER) {
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Access denied.');
|
||||
}
|
||||
|
||||
return { id: user.id, role: user.role?.roleName };
|
||||
} catch (error) {
|
||||
if (error instanceof jwt.TokenExpiredError) {
|
||||
throw new ApiError(httpStatus.UNAUTHORIZED, 'Your session has expired. Please log in again.');
|
||||
}
|
||||
|
||||
if (error instanceof ApiError) {
|
||||
throw error;
|
||||
}
|
||||
|
||||
throw new ApiError(httpStatus.FORBIDDEN, 'Invalid or expired authentication token.');
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Verifies JWT and validates Host user (role_xid = 4)
|
||||
*/
|
||||
const verifyCallback = async (
|
||||
req: Request,
|
||||
@@ -35,62 +99,22 @@ const verifyCallback = async (
|
||||
) => {
|
||||
const token = req.header('x-auth-token') || req.cookies?.accessToken;
|
||||
|
||||
if (!token) {
|
||||
return reject(new ApiError(httpStatus.UNAUTHORIZED, 'Please authenticate'));
|
||||
}
|
||||
|
||||
try {
|
||||
const decoded = jwt.verify(token, config.jwt.secret) as DecodedToken;
|
||||
|
||||
if (!decoded?.id) {
|
||||
return reject(new ApiError(httpStatus.UNAUTHORIZED, 'Invalid token payload'));
|
||||
}
|
||||
|
||||
// ✅ Fetch user from Prisma (Host user only)
|
||||
const user = await prisma.user.findUnique({
|
||||
where: { id: decoded.id },
|
||||
include: { role: true },
|
||||
});
|
||||
|
||||
if (!user) {
|
||||
return reject(new ApiError(httpStatus.UNAUTHORIZED, 'User not found'));
|
||||
}
|
||||
|
||||
// ✅ Check if user is active
|
||||
if (!user.isActive) {
|
||||
return reject(
|
||||
new ApiError(httpStatus.FORBIDDEN, 'Your account is deactivated by admin.')
|
||||
);
|
||||
}
|
||||
|
||||
// ✅ Check User role (role_xid = 1)
|
||||
if (user.roleXid !== 1) {
|
||||
return reject(
|
||||
new ApiError(httpStatus.FORBIDDEN, 'Access restricted to host users only')
|
||||
);
|
||||
}
|
||||
const userInfo = await verifyUserToken(token);
|
||||
|
||||
// Attach user to request
|
||||
req.user = { id: user.id.toString(), role: user.role?.roleName };
|
||||
req.user = { id: userInfo.id.toString(), role: userInfo.role };
|
||||
|
||||
resolve();
|
||||
} catch (error) {
|
||||
if (error instanceof jwt.TokenExpiredError) {
|
||||
return reject(
|
||||
new ApiError(httpStatus.UNAUTHORIZED, 'Your session has expired. Please log in again.')
|
||||
);
|
||||
}
|
||||
|
||||
return reject(
|
||||
new ApiError(httpStatus.FORBIDDEN, 'Invalid or expired authentication token.')
|
||||
);
|
||||
return reject(error as Error);
|
||||
}
|
||||
};
|
||||
|
||||
/**
|
||||
* Express middleware — use as `auth()` in routes
|
||||
*/
|
||||
const auth =
|
||||
const authForHost =
|
||||
() =>
|
||||
async (req: Request, res: Response, next: NextFunction) => {
|
||||
return new Promise((resolve, reject) => {
|
||||
@@ -100,4 +124,4 @@ const auth =
|
||||
.catch((err) => next(err));
|
||||
};
|
||||
|
||||
export default auth;
|
||||
export default authForHost;
|
||||
|
||||
357
src/common/utils/constants/agreementTemplate.ts
Normal file
357
src/common/utils/constants/agreementTemplate.ts
Normal file
@@ -0,0 +1,357 @@
|
||||
export const AGREEMENT_TEMPLATE = `
|
||||
MINGLAR HOST AGREEMENT
|
||||
Effective Date: [EFFECTIVE_DATE]
|
||||
|
||||
BETWEEN
|
||||
|
||||
Minglar India Private Limited, a company incorporated under the Companies Act, 2013, having its registered office at 602, Aaradhya Avenue X Eve, Naidu Colony, Pant Nagar, Ghatkopar (East), Mumbai 400075 (hereinafter referred to as “Minglar India Private Limited”, which expression shall include its successors and permitted assigns);
|
||||
|
||||
AND
|
||||
|
||||
[HOST_LEGAL_NAME], a [COMPANY_TYPE], having its principal place of business at [FULL_ADDRESS] (hereinafter referred to as “Host”, which expression shall include its owners, partners, directors, employees, representatives, and permitted assigns).
|
||||
|
||||
Minglar India Private Limited and Host are individually referred to as a “Party” and collectively as the “Parties”.
|
||||
|
||||
1. PURPOSE AND RELATIONSHIP
|
||||
|
||||
1.1 Platform Overview
|
||||
Minglar India Private Limited operates a curated digital marketplace under the brand “Minglar” that enables users (“Users”) to discover, review, and book experiential activities, events, workshops, tours, and related services (“Activities”) offered by independent Hosts.
|
||||
|
||||
1.2 Engagement
|
||||
The Host desires to list and provide its Activities on the Minglar platform subject to the terms and standards set forth in this Agreement.
|
||||
|
||||
1.3 Independent Contractor
|
||||
Nothing in this Agreement shall be construed as creating a partnership under the Indian Partnership Act, 1932, joint venture, agency, employment, franchise, or profit-sharing arrangement. The Host operates strictly as an independent contractor and shall have full operational control over execution of its Activities.
|
||||
|
||||
2. TERM
|
||||
|
||||
2.1 Duration
|
||||
This Agreement shall remain valid for a fixed term of [DURATION_TEXT] and shall automatically expire on [EXPIRY_DATE], unless terminated earlier in accordance with Section 16.
|
||||
|
||||
2.2 Renewal
|
||||
Renewal shall be subject to mutual agreement. Commission adjustments, if any, shall apply only at renewal due to inflation or additional expenses incurred by Minglar India Private Limited for platform upgrades or new features.
|
||||
|
||||
3. HOST RESPONSIBILITIES
|
||||
|
||||
3.1 Legal Compliance and Document Submission
|
||||
3.1.1 Compliance
|
||||
The Host shall obtain, maintain, and keep valid at all times all licenses, permits, approvals, registrations, certifications, insurance policies, and governmental permissions required under applicable laws for the lawful conduct of the Activities.
|
||||
|
||||
3.1.2 Document Upload
|
||||
The Host shall, at the time of onboarding on the Minglar platform, upload true, complete, and legible copies of licenses, permits, registrations, tax certificates (including GST registration, where applicable), identity proof, business registration documents, insurance certificates, and any other documents reasonably required by Minglar India Private Limited for verification purposes.
|
||||
|
||||
3.1.3 Accuracy and Updates
|
||||
The Host represents and warrants that all documents submitted are authentic, valid, and up to date. The Host shall promptly upload updated copies whenever any document expires, is renewed, modified, or replaced. Failure to provide valid documentation may result in suspension, delisting, or termination of this Agreement at the sole discretion of Minglar India Private Limited.
|
||||
|
||||
3.1.4 Verification
|
||||
Minglar India Private Limited shall have the right to verify such documents and request additional documentation if required for regulatory, compliance, safety, or audit purposes.
|
||||
|
||||
3.2 Accurate Listing and Host Anonymity
|
||||
3.2.1 Activity Details
|
||||
The Host shall provide complete, accurate, and up-to-date descriptions for each Activity, including inclusions, exclusions, duration, safety requirements, pricing, and applicable tax percentages at the time of onboarding. The Host shall ensure that all information remains current throughout the term of this Agreement.
|
||||
|
||||
3.2.2 Host Content
|
||||
Hosts retain ownership of original content they upload (such as activity descriptions, images, and videos).
|
||||
However, by uploading content, the Host grants Minglar a:
|
||||
- Worldwide
|
||||
- Non-exclusive
|
||||
- Royalty-free
|
||||
- Transferable
|
||||
- Sub-licensable
|
||||
license to use, reproduce, modify, adapt, publish, translate, distribute and display such content for purposes of operating, marketing and promoting the platform.
|
||||
This license continues for as long as the content remains on the platform.
|
||||
|
||||
3.2.3 Unique Activity Name
|
||||
The Host shall provide a unique name for each Activity during onboarding. The Host’s actual company name, personal name, or brand shall not be visible to Users on the activity card or in any public-facing listing.
|
||||
|
||||
3.2.4 Prohibition on Branding and Contact
|
||||
The Host shall not display, embed, or otherwise reveal its contact information, company name, logo, website, email, or other identifiable details in any photos, videos, descriptions, chat messages, or other content shared with Users via the Minglar platform.
|
||||
|
||||
3.2.5 Breach and Suspension
|
||||
Any attempt to circumvent these provisions or display unauthorized branding or contact details shall be considered a material breach of this Agreement. Minglar India Private Limited reserves the right to suspend or delist the Activity immediately and take other remedial actions as necessary.
|
||||
|
||||
3.3 Taxes
|
||||
3.3.1 Tax Responsibility
|
||||
The total Activity price listed shall be inclusive of all applicable taxes. Minglar India Private Limited shall collect such taxes from Users and transfer them to the Host. The Host shall be solely responsible for depositing and complying with tax obligations before local authorities.
|
||||
|
||||
4. SAFETY AND OPERATIONAL STANDARDS
|
||||
|
||||
4.1 General Duty of Care
|
||||
The Host shall conduct all Activities in a safe, hygienic, and controlled manner ensuring the well-being of Users at all times.
|
||||
|
||||
4.2 Risk Management
|
||||
The Host shall conduct risk assessments, maintain standard operating procedures, provide safety briefings, and ensure trained and competent personnel supervise Activities.
|
||||
|
||||
4.3 Transportation
|
||||
If the Host provides pick-up, drop-off, or in-Activity transportation, such transportation shall be safe, clean, reasonably comfortable, and legally compliant. The Host shall remain responsible for User safety during transport.
|
||||
|
||||
4.4 SOS Emergency Protocol
|
||||
During execution of Activities, Minglar’s SOS feature shall be active. If activated by a User, the Host Operator shall receive immediate notification and live location details. The Host Operator shall immediately contact and reach the User. The emergency shall be cleared only after ensuring the User is safe. The Host Operator shall be the first point of contact for all emergencies.
|
||||
|
||||
4.5 Equipment Standards
|
||||
The Host shall ensure that all equipment, tools, and materials used for conducting any Activity are:
|
||||
1. Maintained in accordance with the manufacturer’s recommendations and operational guidelines.
|
||||
2. Tested regularly to confirm they are safe and functional before each Activity.
|
||||
3. Kept clean, hygienic, and in good working order at all times.
|
||||
4. Adequate for the number of Users participating, ensuring no overuse or overcrowding that may compromise safety.
|
||||
The Host shall be solely responsible for any incidents, accidents, or injuries caused due to faulty, poorly maintained, unhygienic, or unsafe equipment. Failure to comply may result in suspension, delisting, or immediate termination of this Agreement under Section 16.
|
||||
|
||||
5. QUALITY AND PUNCTUALITY
|
||||
|
||||
5.1 Quality Standards
|
||||
The Host shall maintain consistently high service standards and continuously strive to improve user experience toward achieving five-star ratings.
|
||||
|
||||
5.2 Timeliness
|
||||
The Host shall ensure timely check-in, commencement, and completion of Activities. Delays impacting Users’ onward travel or other bookings shall constitute service failure.
|
||||
|
||||
6. INSURANCE
|
||||
|
||||
The Host shall obtain, maintain, and keep valid insurance coverage appropriate for the risk associated with the respective Activities. Coverage shall be sufficient to protect Users, the Host, and Minglar India Private Limited against claims arising from accidents, injuries, fatalities, or property damage.
|
||||
|
||||
6.1 Risk-Based Coverage
|
||||
The Host shall maintain Public Liability Insurance appropriate to the risk and scale of the respective Activities.
|
||||
|
||||
6.2 Coverage Amount
|
||||
For high-risk or multi-participant Activities, coverage is recommended up to INR 5 Crores or an amount appropriate to cover potential claims arising from injury, death, or property damage.
|
||||
|
||||
6.3 Additional Insured
|
||||
Policies shall name Minglar India Private Limited and Minglar Group Pte Ltd, Singapore as Additional Insured.
|
||||
|
||||
6.4 Proof
|
||||
Valid insurance certificates must be submitted prior to onboarding and maintained throughout the Agreement term.
|
||||
|
||||
7. USER WAIVERS
|
||||
The Host shall ensure that Users acknowledge and accept all standard waivers, terms, and risk disclosures prior to participation in any Activity, as provided by the Minglar platform.
|
||||
|
||||
8. INDEMNITY
|
||||
The Host shall indemnify, defend, and hold harmless Minglar India Private Limited, its affiliates, employees, directors, and representatives from any claims, losses, damages, liabilities, fines, or expenses arising directly or indirectly from the Host’s failure to comply with laws, negligence, or breach of this Agreement.
|
||||
|
||||
9. LIMITATION OF LIABILITY
|
||||
The total aggregate liability of Minglar India Private Limited arising out of or in connection with any claim relating to a specific Activity shall not exceed the total commission earned by Minglar India Private Limited from that particular Activity (or substantially similar activity category) conducted by the Host during the three (3) months immediately preceding the date of the claim.
|
||||
If the Host lists multiple different Activities, the liability cap applies only to the commission earned from the specific Activity giving rise to the claim and does not include commission earned from other unrelated Activities.
|
||||
Under no circumstances shall Minglar India Private Limited be liable for indirect, incidental, consequential, punitive, or special damages, including loss of profits, goodwill, reputation, or business opportunity.
|
||||
|
||||
10. PAYMENT AND COMMISSION
|
||||
|
||||
10.1 Commission
|
||||
10.1.1 Standard Commission
|
||||
A [COMMISSION_TEXT] commission shall be charged by Minglar India Private Limited on the Activity revenue (after deduction of applicable taxes).
|
||||
|
||||
10.1.2 Fixed During Term
|
||||
The term of this agreement is [DURATION_TEXT]. This commission shall remain unchanged during the term of this Agreement.
|
||||
|
||||
10.1.3 Renewal Adjustment
|
||||
At the time of renewal, Minglar India Private Limited reserves the right to adjust commission rates due to inflation or platform upgrades.
|
||||
|
||||
10.2 Host Payout
|
||||
10.2.1 Timing
|
||||
Minglar India Private Limited shall remit payments to the Host 24 hours after check-in completion or no-show.
|
||||
|
||||
10.2.2 Monthly Commission Invoice
|
||||
Minglar India Private Limited shall issue a monthly invoice to the Host detailing the commission earned. GST shall be charged extra.
|
||||
|
||||
10.2.3 Banking and Gateway Charges
|
||||
All banking, payment gateway, and transaction fees arising from normal bookings shall be borne by the Host.
|
||||
|
||||
11. BOOKING CANCELLATION
|
||||
|
||||
11.1 Host-Related Cancellation
|
||||
If an Activity is cancelled due to host health, extreme weather, natural disasters, government restrictions, venue issues, equipment failure, team/partner unavailability, or other uncontrollable circumstances, the Host shall pay the applicable cancellation fee charged by the payment gateway. No payment will be remitted to the Host, and 100% of the booking amount including taxes shall be refunded to Users.
|
||||
|
||||
11.2 User-Initiated Cancellation
|
||||
If Users cancel within the permitted period, the platform fee shall be deducted and the remaining amount refunded to Users. The Host will not receive payment for such cancellations.
|
||||
|
||||
12. PARTICIPATION OF MINGLAR ACCOUNT MANAGER FOR AUDIT
|
||||
In case of low performance, low bookings, or safety/quality issues reported by Users that remain unresolved for more than one week, Minglar India Private Limited may send an Account Manager to audit the Activity at the Host’s location.
|
||||
The date and slot for such an audit shall be coordinated by the Account Manager and the Host.
|
||||
The participation of the Account Manager is free of charge. If the audit requires overnight stay or the Activity duration exceeds one day, the Host shall provide accommodation.
|
||||
Transportation costs for the Account Manager shall be shared 50% by the Host.
|
||||
Minglar India Private Limited reserves the right to send an Account Manager once per year or sooner in case of low performance, safety concerns, or user complaints with less than 2-star ratings.
|
||||
|
||||
13. DATA PROTECTION, PRIVACY & INFORMATION SECURITY
|
||||
|
||||
13.1 Compliance with Applicable Laws
|
||||
The Parties acknowledge that Minglar Group Pte. Ltd. (Singapore) and/or Minglar India Private Limited (India) collects and processes personal data in compliance with applicable laws, including:
|
||||
- The Personal Data Protection Act 2012 (“PDPA”); and
|
||||
- The Digital Personal Data Protection Act 2023 (“DPDP Act”).
|
||||
Each Party agrees to comply with all applicable privacy and data protection laws in the jurisdiction where the Activity is conducted.
|
||||
|
||||
13.2 Roles of the Parties
|
||||
a) Minglar shall act as the Data Fiduciary / Data Controller for personal data collected via the Minglar platform.
|
||||
b) The Host shall act as a Data Processor / Authorized Data Recipient when processing User personal data solely for the purpose of conducting booked Activities.
|
||||
The Host shall not independently determine the purpose or means of processing User personal data without prior written authorization from Minglar.
|
||||
|
||||
PART A – USER PERSONAL DATA
|
||||
|
||||
13.3 Categories of User Data Collected
|
||||
The Host acknowledges that Minglar may collect and process the following categories of User personal data through the platform:
|
||||
a) Full name
|
||||
b) Date of birth
|
||||
c) Mobile number and email address
|
||||
d) Gender
|
||||
e) Height and weight (where Activity eligibility or safety restrictions apply)
|
||||
f) School and college information
|
||||
g) Profile photograph
|
||||
h) Home location and/or real-time GPS location
|
||||
i) Check-in and check-out data
|
||||
j) SOS or emergency alerts
|
||||
k) Payment method details and transaction information
|
||||
l) Spending preferences or monthly budget indicators
|
||||
m) Biometric verification data (including facial verification, where applicable)
|
||||
n) Medical conditions or health disclosures (Phase 2 implementation)
|
||||
o) Attendance logs and activity participation records
|
||||
|
||||
13.4 Sensitive Personal Data
|
||||
Certain categories of data may constitute sensitive personal data, including:
|
||||
- Biometric data
|
||||
- Medical or health information
|
||||
- Real-time location data
|
||||
- Financial/payment information
|
||||
- Profile photographs capable of biometric identification
|
||||
Such data shall:
|
||||
a) Be processed only where necessary for safety, verification, compliance, or Activity execution;
|
||||
b) Be accessed strictly on a need-to-know basis;
|
||||
c) Be protected using enhanced security measures;
|
||||
d) Not be downloaded, stored externally, or retained by the Host beyond the Activity duration unless legally required.
|
||||
The Host shall not independently collect additional medical, biometric, or financial data outside the Minglar platform without prior written approval.
|
||||
|
||||
13.5 Confidentiality and Use Restrictions
|
||||
The Host shall treat all User and platform data as strictly confidential, including attendance logs, SOS alerts, emergency records, and location data collected during Activities.
|
||||
User data shall:
|
||||
a) Be used solely for Activity execution and safety;
|
||||
b) Not be shared with third parties without prior written consent from Minglar India Private Limited;
|
||||
c) Not be used for independent marketing, profiling, or database creation;
|
||||
d) Not be retained after completion of the Activity unless legally required.
|
||||
The Host shall not contact Users outside the Minglar platform unless expressly authorized.
|
||||
|
||||
13.6 Security Measures
|
||||
The Host shall implement reasonable technical and organizational measures to protect personal data from unauthorized access, alteration, misuse, or disclosure, including:
|
||||
- Secure password-protected systems;
|
||||
- Restricted employee access;
|
||||
- Confidentiality undertakings from employees and operators;
|
||||
- Secure handling of operator devices used for check-in/check-out;
|
||||
- Immediate reporting of lost or compromised devices.
|
||||
|
||||
13.7 Data Breach Notification
|
||||
Any actual or suspected breach involving personal data — including medical, biometric, financial, or location data — shall be reported to Minglar India Private Limited immediately and in any event within twenty-four (24) hours of discovery.
|
||||
The Host shall fully cooperate in investigation, mitigation, and regulatory reporting obligations.
|
||||
|
||||
13.8 Retention and Deletion
|
||||
The Host shall not retain personal data beyond the period necessary for conducting the Activity unless required by law.
|
||||
Upon termination of this Agreement, the Host shall delete all User data in its possession and confirm deletion upon request.
|
||||
|
||||
13.9 User Responsibility for Medical Disclosures
|
||||
Users remain responsible for the accuracy and completeness of any medical or health information voluntarily disclosed.
|
||||
The Host may rely on such disclosures in good faith for safety and eligibility determinations.
|
||||
Minglar shall not be liable for losses arising from incomplete or inaccurate medical information provided by Users.
|
||||
|
||||
PART B – HOST PERSONAL DATA
|
||||
|
||||
13.10 Collection of Host Personal Data
|
||||
The Host acknowledges that Minglar may collect and process personal data relating to the Host and its directors, partners, employees, and authorized representatives for:
|
||||
- KYC verification and onboarding;
|
||||
- Regulatory compliance;
|
||||
- Risk assessment and fraud prevention;
|
||||
- Payment processing and settlement;
|
||||
- Audit and safety review;
|
||||
- Enforcement of this Agreement.
|
||||
|
||||
13.11 Sharing and Cross-Border Transfers
|
||||
Host personal data may be shared:
|
||||
- Within Minglar Group entities;
|
||||
- With banks, payment processors, verification agencies, insurers, auditors, and professional advisors;
|
||||
- With regulatory or governmental authorities where legally required.
|
||||
The Host acknowledges that personal data may be transferred between Singapore, India, and other jurisdictions where Minglar operates, subject to compliance with applicable cross-border transfer laws.
|
||||
|
||||
PART C – ACTIVITY LOCATION & OPERATIONAL DATA
|
||||
|
||||
13.12 Collection of Activity Location and Operational Data
|
||||
The Host agrees that Minglar may collect and process operational data relating to Activities, including:
|
||||
- Venue address;
|
||||
- Check-in and check-out locations;
|
||||
- GPS coordinates;
|
||||
- Pick-up and drop-off locations;
|
||||
- Route and logistical details;
|
||||
- Activity schedules.
|
||||
Such data may include precise geo-location information.
|
||||
|
||||
13.13 Use and Display of Location Data
|
||||
The Host expressly consents to Minglar:
|
||||
- Displaying Activity venue, pick-up, and drop-off details on the platform;
|
||||
- Using location data for navigation, safety monitoring, and emergency coordination;
|
||||
- Using such data for fraud prevention and verification.
|
||||
The Host warrants that all location data provided is accurate and lawful.
|
||||
Minglar shall not be liable for losses arising from inaccurate or misleading information provided by the Host.
|
||||
|
||||
PART D – ANALYTICS & PLATFORM OPTIMIZATION
|
||||
|
||||
13.14 Anonymized and Aggregated Data
|
||||
Minglar may use anonymized, aggregated, or de-identified data derived from User or Host activity for:
|
||||
- Platform improvement;
|
||||
- Artificial intelligence systems;
|
||||
- Recommendation engines;
|
||||
- Safety analytics;
|
||||
- Market research;
|
||||
- Business strategy and investor reporting.
|
||||
Such data shall not identify any individual User or Host.
|
||||
All analytics models, algorithms, insights, and derived data shall remain the exclusive intellectual property of Minglar.
|
||||
|
||||
PART E – LIABILITY & SURVIVAL
|
||||
|
||||
13.15 Indemnity
|
||||
The Host shall indemnify and hold harmless Minglar Group Pte. Ltd. and Minglar India Private Limited against any losses, penalties, regulatory actions, claims, damages, or costs arising from:
|
||||
- Unauthorized use of personal data;
|
||||
- Data breaches attributable to the Host;
|
||||
- Non-compliance with applicable data protection laws;
|
||||
- Inaccurate operational or location data provided by the Host.
|
||||
|
||||
13.16 Survival
|
||||
This Section 13 shall survive termination or expiry of this Agreement.
|
||||
|
||||
14. CONFIDENTIALITY
|
||||
The Host shall maintain strict confidentiality regarding all platform operations, processes, user data, and commercial information. These obligations survive five (5) years post-termination. Exceptions only apply if required by law.
|
||||
|
||||
15. NON-EXCLUSIVITY
|
||||
This Agreement does not restrict the Host from offering Activities on other platforms. Minglar India Private Limited does not claim exclusivity. The Host shall not interfere with other platform operations or solicit Users to bypass Minglar.
|
||||
|
||||
16. TERMINATION
|
||||
16.1 Immediate Termination
|
||||
Minglar India Private Limited may terminate immediately in case of breach, misrepresentation, failure to maintain safety or quality standards, or violation of this Agreement.
|
||||
16.2 Termination with Notice
|
||||
Either Party may terminate this Agreement by providing 30 days’ written notice.
|
||||
16.3 Post-Termination Obligations
|
||||
Upon termination, the Host must execute all bookings already made by Users. Minglar India Private Limited will block further bookings for the Host’s Activities.
|
||||
16.4 Commission Adjustment at Renewal
|
||||
Any change in commission shall only occur at renewal of this Agreement. No adjustments shall be made during the active term.
|
||||
16.5 Non-Exclusivity
|
||||
Termination or continuation of this Agreement does not prevent the Host from offering Activities elsewhere.
|
||||
|
||||
17. GOVERNING LAW
|
||||
This Agreement shall be governed by the laws of India. Courts at the registered office jurisdiction of Minglar India Private Limited shall have exclusive jurisdiction.
|
||||
|
||||
18. ENTIRE AGREEMENT
|
||||
This Agreement constitutes the complete understanding between the Parties and supersedes all prior communications.
|
||||
|
||||
19. HOST ACKNOWLEDGMENT & ELECTRONIC CONSENT
|
||||
19.1 Electronic Acceptance
|
||||
By clicking the “I Agree” button, the Host acknowledges they have read, understood, and accepted the terms of this Agreement and the Minglar Privacy Policy.
|
||||
19.2 Binding Agreement
|
||||
Electronic acceptance constitutes a legally binding contract, equivalent to a wet signature.
|
||||
19.3 Host Obligations
|
||||
- Provide accurate and lawful data
|
||||
- Protect User data and follow emergency protocols
|
||||
- Notify Minglar of breaches or unauthorized access
|
||||
- Comply with applicable laws
|
||||
19.4 Electronic Records
|
||||
All electronic records and communications are valid and enforceable.
|
||||
19.5 Updates
|
||||
Continued use after updates constitutes acceptance of amended terms.
|
||||
|
||||
Signed Electronically by:
|
||||
Minglar India Private Limited
|
||||
Authorized Signatory
|
||||
|
||||
Host:
|
||||
[HOST_LEGAL_NAME]
|
||||
Date: [ACCEPT_DATE]
|
||||
`;
|
||||
29
src/common/utils/constants/common.constant.ts
Normal file
29
src/common/utils/constants/common.constant.ts
Normal file
@@ -0,0 +1,29 @@
|
||||
export const ROLE = {
|
||||
MINGLAR_ADMIN: 1,
|
||||
CO_ADMIN: 2,
|
||||
ACCOUNT_MANAGER: 3,
|
||||
HOST: 4,
|
||||
OPERATOR: 5,
|
||||
USER: 6
|
||||
}
|
||||
|
||||
export const ROLE_NAME = {
|
||||
MINGLAR_ADMIN: 'Minglar Admin',
|
||||
CO_ADMIN: 'Co-admin',
|
||||
ACCOUNT_MANAGER: 'Account manager',
|
||||
HOST: 'Host',
|
||||
OPERATOR: 'Operator',
|
||||
USER: 'User'
|
||||
}
|
||||
|
||||
export const USER_STATUS = {
|
||||
INVITED: "Invited",
|
||||
ACTIVE: "Active",
|
||||
DE_ACTIVATED: "De-activated",
|
||||
REJECTED: "Rejected"
|
||||
}
|
||||
|
||||
export const RESTRICTION_NAME = {
|
||||
ABOVE: "Above",
|
||||
BELOW: "Below",
|
||||
}
|
||||
111
src/common/utils/constants/host.constant.ts
Normal file
111
src/common/utils/constants/host.constant.ts
Normal file
@@ -0,0 +1,111 @@
|
||||
export const HOST_STATUS_INTERNAL = {
|
||||
HOST_SUBMITTED: 'Host Submitted',
|
||||
HOST_TO_UPDATE: 'Host To Update',
|
||||
REJECTED: 'Rejected',
|
||||
APPROVED: 'Approved',
|
||||
DRAFT: 'Draft',
|
||||
};
|
||||
|
||||
export const HOST_STATUS_DISPLAY = {
|
||||
DRAFT: 'Draft',
|
||||
UNDER_REVIEW: 'Under Review',
|
||||
ENHANCING: 'Enhancing',
|
||||
REJECTED: 'Rejected',
|
||||
APPROVED: 'Approved',
|
||||
};
|
||||
|
||||
export const STEPPER = {
|
||||
NOT_SUBMITTED: 1,
|
||||
UNDER_REVIEW: 2,
|
||||
COMPANY_DETAILS_APPROVED: 3,
|
||||
BANK_DETAILS_UPDATED: 4,
|
||||
AGREEMENT_ACCEPTED: 5,
|
||||
REJECTED: 6,
|
||||
};
|
||||
|
||||
export const ACTIVITY_INTERNAL_STATUS = {
|
||||
DRAFT_PQ: 'Draft - PQ',
|
||||
APPROVED: 'Approved',
|
||||
REJECTED: 'Rejected',
|
||||
DRAFT: 'Draft',
|
||||
UNDER_REVIEW: 'Under-Review',
|
||||
PQ_FAILED: 'PQ Failed',
|
||||
PQ_TO_UPDATE: 'PQ To Update',
|
||||
PQ_SUBMITTED: 'PQ Submitted',
|
||||
PQ_APPROVED: 'PQ Approved',
|
||||
|
||||
ACTIVITY_DRAFT: 'Draft - Activity',
|
||||
ACTIVITY_SUBMITTED: 'Activity Submitted',
|
||||
ACTIVITY_TO_REVIEW: 'Activity To Review',
|
||||
ACTIVITY_REJECTED: 'Activity Rejected',
|
||||
ACTIVITY_APPROVED: 'Activity Approved',
|
||||
ACTIVITY_LISTED: 'Activity Listed',
|
||||
ACTIVITY_UNLISTED: 'Activity UnListed ',
|
||||
ACTIVITY_NOT_LISTED: 'Activity Not Listed',
|
||||
};
|
||||
|
||||
export const ACTIVITY_DISPLAY_STATUS = {
|
||||
DRAFT_PQ: 'Draft',
|
||||
APPROVED: 'Approved',
|
||||
REJECTED: 'Rejected',
|
||||
DRAFT: 'Draft',
|
||||
UNDER_REVIEW: 'Under-Review',
|
||||
PQ_FAILED: 'PQ Failed',
|
||||
ENHANCING: 'Enhancing',
|
||||
PQ_IN_REVIEW: 'PQ In Review',
|
||||
PQ_APPROVED: 'PQ Approved',
|
||||
|
||||
ACTIVITY_DRAFT: 'Draft',
|
||||
ACTIVITY_IN_REVIEW: 'In Review',
|
||||
ACTIVITY_TO_REVIEW: 'Re-submitted',
|
||||
NOT_LISTED: 'Not Listed',
|
||||
ACTIVITY_LISTED: 'Listed',
|
||||
ACTIVITY_UNLISTED: 'Un Listed',
|
||||
};
|
||||
|
||||
export const ACTIVITY_AM_INTERNAL_STATUS = {
|
||||
DRAFT_PQ: 'Draft - PQ',
|
||||
APPROVED: 'Approved',
|
||||
REJECTED: 'Rejected',
|
||||
DRAFT: 'Draft',
|
||||
UNDER_REVIEW: 'Under-Review',
|
||||
PQ_FAILED: 'PQ Failed',
|
||||
PQ_REJECTED: 'PQ Rejected',
|
||||
PQ_TO_REVIEW: 'PQ To Review',
|
||||
PQ_APPROVED: 'PQ Approved',
|
||||
|
||||
ACTIVITY_DRAFT: 'Draft - Activity',
|
||||
ACTIVITY_TO_REVIEW: 'Activity To Review',
|
||||
ACTIVITY_REJECTED: 'Activity Rejected',
|
||||
ACTIVITY_APPROVED: 'Activity Approved',
|
||||
ACTIVITY_LISTED: 'Activity Listed',
|
||||
ACTIVITY_SUBMITED: 'Activity Submitted',
|
||||
};
|
||||
|
||||
export const ACTIVITY_AM_DISPLAY_STATUS = {
|
||||
DRAFT_PQ: 'Draft',
|
||||
APPROVED: 'Approved',
|
||||
REJECTED: 'Rejected',
|
||||
DRAFT: 'Draft',
|
||||
UNDER_REVIEW: 'Under-Review',
|
||||
PQ_FAILED: 'PQ Failed',
|
||||
ENHANCING: 'Enhancing',
|
||||
NEW: 'New',
|
||||
PQ_APPROVED: 'PQ Approved',
|
||||
REVISED: 'Revised',
|
||||
|
||||
ACTIVITY_DRAFT: 'Draft',
|
||||
ACTIVITY_NEW: 'New',
|
||||
ACTIVITY_TO_REVIEW: 'Activity To Review',
|
||||
ACTIVITY_ENHANCING: 'Enhancing',
|
||||
NOT_LISTED: 'Not Listed',
|
||||
ACTIVITY_LISTED: 'Listed',
|
||||
ACTIVITY_REVISED: 'Activity Revised'
|
||||
};
|
||||
|
||||
export const SCHEDULING_TYPE = {
|
||||
ONCE: 'ONCE',
|
||||
WEEKLY: 'WEEKLY',
|
||||
MONTHLY: 'MONTHLY',
|
||||
CUSTOM: 'CUSTOM',
|
||||
};
|
||||
63
src/common/utils/constants/minglar.constant.ts
Normal file
63
src/common/utils/constants/minglar.constant.ts
Normal file
@@ -0,0 +1,63 @@
|
||||
export const MINGLAR_STATUS_INTERNAL = {
|
||||
ADMIN_TO_REVIEW: 'Admin To Review',
|
||||
ADMIN_REJECTED: 'Admin Rejected',
|
||||
AM_NOT_ASSIGNED: 'AM Not Assigned',
|
||||
AM_TO_REVIEW: 'AM To Review',
|
||||
AM_REJECTED: 'AM Rejected',
|
||||
AM_APPROVED: 'AM Approved',
|
||||
DRAFT: 'Draft',
|
||||
};
|
||||
|
||||
export const MINGLAR_STATUS_DISPLAY = {
|
||||
NEW: 'New',
|
||||
AM_NOT_ASSIGNED: 'AM Not Assigned',
|
||||
TO_REVIEW: 'To Review',
|
||||
ENHANCING: 'Enhancing',
|
||||
APPROVED: 'Approved',
|
||||
REJECTED: 'Rejected',
|
||||
RE_SUBMITTED: 'Re-submitted',
|
||||
DRAFT: 'Draft'
|
||||
};
|
||||
|
||||
export const MINGLAR_INVITATION_STATUS = {
|
||||
PENDING: 'Pending',
|
||||
ACCEPTED: 'Accepted',
|
||||
REJECTED: 'Rejected',
|
||||
INVITED: 'Invited',
|
||||
};
|
||||
|
||||
export const ACTIVITY_TRACK_TYPE = {
|
||||
PQ: 'PQ',
|
||||
ACTIVITY: 'Activity'
|
||||
}
|
||||
|
||||
export const ACTIVITY_TRACK_STATUS = {
|
||||
REJECTED_BY_AM: 'Rejected By AM',
|
||||
ACCEPTED_BY_AM: 'Accepted By AM',
|
||||
ENHANCING: 'Enhancing',
|
||||
PQ_SUBMITTED: 'PQ Submitted',
|
||||
UNDER_REVIEW:'Under Review',
|
||||
SUBMITTED:'Activity Submitted',
|
||||
DRAFT:'Activity Draft'
|
||||
}
|
||||
|
||||
// export const HOST_SUGGESTION_TITLES = {
|
||||
// COMPANY_DETAILS: 'Complete Details',
|
||||
// COMPANY_DOCUMENTATION: 'Company documentataion',
|
||||
// COMPANY_SOCIAL_PROOF: 'Social Proof',
|
||||
// ACTIVITY_INFORMATION: 'Activity Information',
|
||||
// ACTIVITY_LOCATION: 'Activity Location',
|
||||
// PICKUP_DROP_LOCATION: 'Pickup-Drop Location',
|
||||
// NUMBER_OF_PEOPLE: 'Number of People',
|
||||
// INCLUSION: 'Inclusion',
|
||||
// TAX_SETUP: 'Tax Setup',
|
||||
// ENERGY_LEVEL: 'Energy Level',
|
||||
// ELIGIBILITY_CRITERIA: 'Eligibility Criteria',
|
||||
// AMENITIES: 'Amenities',
|
||||
// EXLUSIVE_NOTES: 'Exclusive Notes',
|
||||
// CANCELLATION_POLICY: 'Cancellation Policy',
|
||||
// DOs_AND_DONTs: 'Do’s and Dont’s',
|
||||
// TIPS_FOR_USERS: 'Tips for Users',
|
||||
// SUSTAINABILITY: 'Sustainability',
|
||||
// TERMS_AND_CONDITION_FOR_USER: 'Terms and Conditions for User'
|
||||
// };
|
||||
@@ -2,22 +2,68 @@
|
||||
import { APIGatewayProxyEvent, Context, APIGatewayProxyResult } from 'aws-lambda';
|
||||
import ApiError from '../helper/ApiError';
|
||||
|
||||
const stage = process.env.STAGE ?? 'dev';
|
||||
|
||||
export const safeHandler = (
|
||||
handler: (event: APIGatewayProxyEvent, context?: Context) => Promise<APIGatewayProxyResult | undefined>
|
||||
handler: (event: APIGatewayProxyEvent, context?: Context) => Promise<APIGatewayProxyResult | any>
|
||||
): ((event: APIGatewayProxyEvent, context: Context) => Promise<APIGatewayProxyResult>) => {
|
||||
return async (event, context) => {
|
||||
try {
|
||||
const result = await handler(event, context);
|
||||
return (
|
||||
result ?? {
|
||||
|
||||
// If handler returned null/undefined → return 204 response
|
||||
if (!result) {
|
||||
return {
|
||||
statusCode: 204,
|
||||
body: '',
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
statusCode: 204,
|
||||
message: 'No content',
|
||||
data: null,
|
||||
}),
|
||||
};
|
||||
}
|
||||
);
|
||||
|
||||
// If handler returned a structured Lambda response
|
||||
if (result.statusCode && result.body) {
|
||||
return {
|
||||
statusCode: result.statusCode,
|
||||
headers: result.headers || {},
|
||||
body: injectStatusCodeIntoBody(result.body, result.statusCode),
|
||||
};
|
||||
}
|
||||
|
||||
// If handler returned plain data (not wrapped)
|
||||
return {
|
||||
statusCode: 200,
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'OK',
|
||||
statusCode: 200,
|
||||
data: result,
|
||||
}),
|
||||
};
|
||||
} catch (error: any) {
|
||||
console.error('Error occurred:', error);
|
||||
console.error('❌ Error occurred:', error);
|
||||
|
||||
// Convert Prisma errors to ApiError automatically
|
||||
if (ApiError.isPrismaError(error)) {
|
||||
const apiError = ApiError.fromPrismaError(error);
|
||||
return {
|
||||
statusCode: apiError.statusCode,
|
||||
body: JSON.stringify({
|
||||
success: false,
|
||||
message: apiError.message,
|
||||
statusCode: apiError.statusCode,
|
||||
data: null,
|
||||
error: {
|
||||
code: apiError.code || apiError.statusCode,
|
||||
description: apiError.message,
|
||||
statusCode: apiError.statusCode,
|
||||
...(apiError.meta && { meta: apiError.meta }),
|
||||
...(process.env.STAGE !== 'prod' && { debug: apiError.stack }),
|
||||
},
|
||||
}),
|
||||
};
|
||||
}
|
||||
|
||||
if (error instanceof ApiError) {
|
||||
return {
|
||||
@@ -25,31 +71,53 @@ export const safeHandler = (
|
||||
body: JSON.stringify({
|
||||
success: false,
|
||||
message: error.message,
|
||||
statusCode: error.statusCode,
|
||||
data: null,
|
||||
error: {
|
||||
code: error.statusCode,
|
||||
code: error.code || error.statusCode,
|
||||
description: error.message,
|
||||
statusCode: error.statusCode,
|
||||
...(process.env.STAGE !== 'prod' && { debug: error.stack ?? error.message }),
|
||||
...(error.meta && { meta: error.meta }),
|
||||
...(process.env.STAGE !== 'prod' && { debug: error.stack }),
|
||||
},
|
||||
}),
|
||||
};
|
||||
}
|
||||
|
||||
// Internal Server Error fallback
|
||||
return {
|
||||
statusCode: 500,
|
||||
body: JSON.stringify({
|
||||
success: false,
|
||||
message: 'Internal server error',
|
||||
statusCode: 500,
|
||||
data: null,
|
||||
error: {
|
||||
code: 500,
|
||||
description: 'Internal server error',
|
||||
statusCode: 500,
|
||||
...(process.env.STAGE !== 'prod' && { debug: error.stack ?? error.message }),
|
||||
...(process.env.STAGE !== 'prod' && { debug: error.stack }),
|
||||
},
|
||||
}),
|
||||
};
|
||||
}
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
// Utility: safely inject statusCode into the JSON response body
|
||||
function injectStatusCodeIntoBody(body: string, statusCode: number): string {
|
||||
try {
|
||||
const json = JSON.parse(body);
|
||||
json.statusCode = statusCode;
|
||||
return JSON.stringify(json);
|
||||
} catch {
|
||||
// If body is not JSON, wrap it
|
||||
return JSON.stringify({
|
||||
success: true,
|
||||
statusCode,
|
||||
message: body,
|
||||
data: null,
|
||||
});
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1,3 +1,75 @@
|
||||
import { Prisma } from '@prisma/client';
|
||||
|
||||
/**
|
||||
* Prisma error code mappings to user-friendly messages and HTTP status codes
|
||||
*/
|
||||
const PRISMA_ERROR_CODES: Record<string, { statusCode: number; message: string }> = {
|
||||
// Common errors (P1xxx)
|
||||
P1000: { statusCode: 500, message: 'Authentication failed against database server' },
|
||||
P1001: { statusCode: 503, message: 'Database server is not reachable' },
|
||||
P1002: { statusCode: 504, message: 'Database server timed out' },
|
||||
P1003: { statusCode: 500, message: 'Database does not exist' },
|
||||
P1008: { statusCode: 504, message: 'Database operation timed out' },
|
||||
P1009: { statusCode: 409, message: 'Database already exists' },
|
||||
P1010: { statusCode: 403, message: 'User was denied access to the database' },
|
||||
P1011: { statusCode: 500, message: 'Error opening a TLS connection' },
|
||||
P1012: { statusCode: 500, message: 'Schema validation error' },
|
||||
P1013: { statusCode: 400, message: 'Invalid database connection string' },
|
||||
P1014: { statusCode: 500, message: 'Underlying model does not exist' },
|
||||
P1015: { statusCode: 500, message: 'Database schema uses unsupported features' },
|
||||
P1016: { statusCode: 400, message: 'Raw query has incorrect number of parameters' },
|
||||
P1017: { statusCode: 503, message: 'Database server has closed the connection' },
|
||||
|
||||
// Prisma Client Query Engine errors (P2xxx)
|
||||
P2000: { statusCode: 400, message: 'Value too long for column' },
|
||||
P2001: { statusCode: 404, message: 'Record not found' },
|
||||
P2002: { statusCode: 409, message: 'Unique constraint violation' },
|
||||
P2003: { statusCode: 409, message: 'Foreign key constraint violation' },
|
||||
P2004: { statusCode: 400, message: 'Database constraint violation' },
|
||||
P2005: { statusCode: 400, message: 'Invalid value stored in database' },
|
||||
P2006: { statusCode: 400, message: 'Invalid value provided' },
|
||||
P2007: { statusCode: 400, message: 'Data validation error' },
|
||||
P2008: { statusCode: 400, message: 'Failed to parse the query' },
|
||||
P2009: { statusCode: 400, message: 'Failed to validate the query' },
|
||||
P2010: { statusCode: 500, message: 'Raw query failed' },
|
||||
P2011: { statusCode: 400, message: 'Null constraint violation' },
|
||||
P2012: { statusCode: 400, message: 'Missing required value' },
|
||||
P2013: { statusCode: 400, message: 'Missing required argument' },
|
||||
P2014: { statusCode: 409, message: 'Required relation violation' },
|
||||
P2015: { statusCode: 404, message: 'Related record not found' },
|
||||
P2016: { statusCode: 400, message: 'Query interpretation error' },
|
||||
P2017: { statusCode: 400, message: 'Records for relation not connected' },
|
||||
P2018: { statusCode: 404, message: 'Required connected records not found' },
|
||||
P2019: { statusCode: 400, message: 'Input error' },
|
||||
P2020: { statusCode: 400, message: 'Value out of range' },
|
||||
P2021: { statusCode: 500, message: 'Table does not exist' },
|
||||
P2022: { statusCode: 500, message: 'Column does not exist' },
|
||||
P2023: { statusCode: 500, message: 'Inconsistent column data' },
|
||||
P2024: { statusCode: 503, message: 'Connection pool timeout' },
|
||||
P2025: { statusCode: 404, message: 'Record not found' },
|
||||
P2026: { statusCode: 400, message: 'Unsupported database feature used in query' },
|
||||
P2027: { statusCode: 500, message: 'Multiple database errors occurred' },
|
||||
P2028: { statusCode: 500, message: 'Transaction API error' },
|
||||
P2029: { statusCode: 400, message: 'Query parameter limit exceeded' },
|
||||
P2030: { statusCode: 400, message: 'Fulltext index not found' },
|
||||
P2031: { statusCode: 500, message: 'MongoDB requires replica set' },
|
||||
P2033: { statusCode: 400, message: 'Number does not fit in 64 bit signed integer' },
|
||||
P2034: { statusCode: 409, message: 'Transaction failed due to write conflict or deadlock' },
|
||||
P2035: { statusCode: 500, message: 'Database assertion violation' },
|
||||
P2036: { statusCode: 500, message: 'External connector error' },
|
||||
P2037: { statusCode: 503, message: 'Too many database connections opened' },
|
||||
};
|
||||
|
||||
interface PrismaErrorMeta {
|
||||
target?: string[];
|
||||
field_name?: string;
|
||||
model_name?: string;
|
||||
argument_name?: string;
|
||||
constraint?: string;
|
||||
cause?: string;
|
||||
[key: string]: unknown;
|
||||
}
|
||||
|
||||
class ApiError<T = unknown> extends Error {
|
||||
statusCode: number;
|
||||
data: T | null;
|
||||
@@ -6,13 +78,17 @@ class ApiError<T = unknown> extends Error {
|
||||
errors: Array<Error>;
|
||||
isOperational: boolean;
|
||||
stack?: string;
|
||||
code?: string;
|
||||
meta?: PrismaErrorMeta;
|
||||
|
||||
constructor(
|
||||
statusCode: number,
|
||||
message: string = 'Something went wrong',
|
||||
errors: Array<Error> = [],
|
||||
isOperational: boolean = true,
|
||||
stack?: string
|
||||
stack?: string,
|
||||
code?: string,
|
||||
meta?: PrismaErrorMeta
|
||||
) {
|
||||
super(message);
|
||||
this.statusCode = statusCode;
|
||||
@@ -21,6 +97,8 @@ class ApiError<T = unknown> extends Error {
|
||||
this.success = false;
|
||||
this.errors = errors;
|
||||
this.isOperational = isOperational;
|
||||
this.code = code;
|
||||
this.meta = meta;
|
||||
|
||||
if (stack) {
|
||||
this.stack = stack;
|
||||
@@ -28,6 +106,159 @@ class ApiError<T = unknown> extends Error {
|
||||
Error.captureStackTrace(this, this.constructor);
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Creates an ApiError from a Prisma error
|
||||
* Handles all Prisma error types: PrismaClientKnownRequestError, PrismaClientUnknownRequestError,
|
||||
* PrismaClientRustPanicError, PrismaClientInitializationError, PrismaClientValidationError
|
||||
*/
|
||||
static fromPrismaError(error: unknown): ApiError {
|
||||
// Handle PrismaClientKnownRequestError
|
||||
if (error instanceof Prisma.PrismaClientKnownRequestError) {
|
||||
const errorInfo = PRISMA_ERROR_CODES[error.code] || {
|
||||
statusCode: 500,
|
||||
message: 'Database operation failed',
|
||||
};
|
||||
|
||||
let message = errorInfo.message;
|
||||
const meta = error.meta as PrismaErrorMeta | undefined;
|
||||
|
||||
// Provide more specific messages based on error code and meta
|
||||
switch (error.code) {
|
||||
case 'P2002': {
|
||||
const target = meta?.target;
|
||||
if (target && Array.isArray(target)) {
|
||||
message = `Unique constraint violation on field(s): ${target.join(', ')}`;
|
||||
}
|
||||
break;
|
||||
}
|
||||
case 'P2003': {
|
||||
const fieldName = meta?.field_name;
|
||||
if (fieldName) {
|
||||
message = `Foreign key constraint failed on field: ${fieldName}`;
|
||||
}
|
||||
break;
|
||||
}
|
||||
case 'P2025': {
|
||||
const cause = meta?.cause;
|
||||
if (cause) {
|
||||
message = `Record not found: ${cause}`;
|
||||
}
|
||||
break;
|
||||
}
|
||||
case 'P2011': {
|
||||
const constraint = meta?.constraint;
|
||||
if (constraint) {
|
||||
message = `Null constraint violation on: ${constraint}`;
|
||||
}
|
||||
break;
|
||||
}
|
||||
case 'P2014': {
|
||||
const modelName = meta?.model_name;
|
||||
if (modelName) {
|
||||
message = `Required relation violation on model: ${modelName}`;
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
return new ApiError(
|
||||
errorInfo.statusCode,
|
||||
message,
|
||||
[error],
|
||||
true,
|
||||
error.stack,
|
||||
error.code,
|
||||
meta
|
||||
);
|
||||
}
|
||||
|
||||
// Handle PrismaClientUnknownRequestError
|
||||
if (error instanceof Prisma.PrismaClientUnknownRequestError) {
|
||||
return new ApiError(
|
||||
500,
|
||||
'An unknown database error occurred',
|
||||
[error],
|
||||
true,
|
||||
error.stack,
|
||||
'UNKNOWN_REQUEST_ERROR'
|
||||
);
|
||||
}
|
||||
|
||||
// Handle PrismaClientRustPanicError
|
||||
if (error instanceof Prisma.PrismaClientRustPanicError) {
|
||||
return new ApiError(
|
||||
500,
|
||||
'A critical database error occurred. Please try again later.',
|
||||
[error],
|
||||
false,
|
||||
error.stack,
|
||||
'RUST_PANIC_ERROR'
|
||||
);
|
||||
}
|
||||
|
||||
// Handle PrismaClientInitializationError
|
||||
if (error instanceof Prisma.PrismaClientInitializationError) {
|
||||
const errorInfo = error.errorCode
|
||||
? PRISMA_ERROR_CODES[error.errorCode] || { statusCode: 500, message: 'Database initialization failed' }
|
||||
: { statusCode: 500, message: 'Database initialization failed' };
|
||||
|
||||
return new ApiError(
|
||||
errorInfo.statusCode,
|
||||
errorInfo.message,
|
||||
[error],
|
||||
false,
|
||||
error.stack,
|
||||
error.errorCode || 'INITIALIZATION_ERROR'
|
||||
);
|
||||
}
|
||||
|
||||
// Handle PrismaClientValidationError
|
||||
if (error instanceof Prisma.PrismaClientValidationError) {
|
||||
return new ApiError(
|
||||
400,
|
||||
'Invalid data provided for database operation',
|
||||
[error],
|
||||
true,
|
||||
error.stack,
|
||||
'VALIDATION_ERROR'
|
||||
);
|
||||
}
|
||||
|
||||
// Fallback for any other error
|
||||
if (error instanceof Error) {
|
||||
return new ApiError(500, error.message, [error], true, error.stack);
|
||||
}
|
||||
|
||||
return new ApiError(500, 'An unexpected error occurred');
|
||||
}
|
||||
|
||||
/**
|
||||
* Check if an error is a Prisma error
|
||||
*/
|
||||
static isPrismaError(error: unknown): boolean {
|
||||
return (
|
||||
error instanceof Prisma.PrismaClientKnownRequestError ||
|
||||
error instanceof Prisma.PrismaClientUnknownRequestError ||
|
||||
error instanceof Prisma.PrismaClientRustPanicError ||
|
||||
error instanceof Prisma.PrismaClientInitializationError ||
|
||||
error instanceof Prisma.PrismaClientValidationError
|
||||
);
|
||||
}
|
||||
|
||||
/**
|
||||
* Get a user-friendly message for a Prisma error code
|
||||
*/
|
||||
static getPrismaErrorMessage(code: string): string {
|
||||
return PRISMA_ERROR_CODES[code]?.message || 'Database operation failed';
|
||||
}
|
||||
|
||||
/**
|
||||
* Get HTTP status code for a Prisma error code
|
||||
*/
|
||||
static getPrismaErrorStatusCode(code: string): number {
|
||||
return PRISMA_ERROR_CODES[code]?.statusCode || 500;
|
||||
}
|
||||
}
|
||||
|
||||
export default ApiError;
|
||||
|
||||
37
src/common/utils/helper/CodeGenerator.ts
Normal file
37
src/common/utils/helper/CodeGenerator.ts
Normal file
@@ -0,0 +1,37 @@
|
||||
import * as crypto from 'crypto';
|
||||
|
||||
const algorithm = 'aes-256-cbc';
|
||||
const secretKey = crypto.scryptSync('your-secret-password', 'salt', 32);
|
||||
const ivLength = 16;
|
||||
|
||||
// Encrypt function
|
||||
export function encryptUserId(id: string): string {
|
||||
const iv = crypto.randomBytes(ivLength);
|
||||
const cipher = crypto.createCipheriv(algorithm, secretKey, iv);
|
||||
let encrypted = cipher.update(id, 'utf8', 'hex');
|
||||
encrypted += cipher.final('hex');
|
||||
return `${iv.toString('hex')}:${encrypted}`;
|
||||
}
|
||||
|
||||
// Decrypt function
|
||||
export function decryptUserId(encryptedId: string): string | null {
|
||||
try {
|
||||
const parts = encryptedId.split(':');
|
||||
if (parts.length !== 2) {
|
||||
console.error('Invalid encryptedId format:', encryptedId);
|
||||
return null;
|
||||
}
|
||||
|
||||
const iv = Buffer.from(parts[0], 'hex');
|
||||
const encryptedText = Buffer.from(parts[1], 'hex');
|
||||
|
||||
const decipher = crypto.createDecipheriv(algorithm, secretKey, iv);
|
||||
let decrypted = decipher.update(encryptedText);
|
||||
decrypted = Buffer.concat([decrypted, decipher.final()]);
|
||||
|
||||
return decrypted.toString('utf8');
|
||||
} catch (error) {
|
||||
console.error('Decryption failed:', error);
|
||||
return null;
|
||||
}
|
||||
}
|
||||
18
src/common/utils/helper/OtpGenerator.ts
Normal file
18
src/common/utils/helper/OtpGenerator.ts
Normal file
@@ -0,0 +1,18 @@
|
||||
import config from '../../../config/config';
|
||||
|
||||
export class OtpGenerator {
|
||||
static generateOtp(): string {
|
||||
if (config.byPassOTP) {
|
||||
return '1234';
|
||||
}
|
||||
return Math.floor(1000 + Math.random() * 9000).toString();
|
||||
}
|
||||
}
|
||||
export class OtpGeneratorSixDigit {
|
||||
static generateOtp(): string {
|
||||
if (config.byPassOTP) {
|
||||
return '123456';
|
||||
}
|
||||
return Math.floor(100000 + Math.random() * 900000).toString();
|
||||
}
|
||||
}
|
||||
126
src/common/utils/helper/parseMultipartFormData.ts
Normal file
126
src/common/utils/helper/parseMultipartFormData.ts
Normal file
@@ -0,0 +1,126 @@
|
||||
import ApiError from './ApiError';
|
||||
|
||||
interface ParsedFormData {
|
||||
fields: Record<string, string>;
|
||||
files: Array<{
|
||||
fieldName: string;
|
||||
fileName: string;
|
||||
contentType: string;
|
||||
data: Buffer;
|
||||
}>;
|
||||
}
|
||||
|
||||
/**
|
||||
* Parse multipart/form-data from Lambda event
|
||||
* Supports both base64 encoded and binary body
|
||||
*/
|
||||
export function parseMultipartFormData(
|
||||
eventBody: string | null,
|
||||
contentType: string | undefined,
|
||||
isBase64Encoded: boolean = false
|
||||
): ParsedFormData {
|
||||
if (!eventBody) {
|
||||
throw new ApiError(400, 'Request body is required');
|
||||
}
|
||||
|
||||
if (!contentType || !contentType.includes('multipart/form-data')) {
|
||||
throw new ApiError(400, 'Content-Type must be multipart/form-data');
|
||||
}
|
||||
|
||||
// Extract boundary from Content-Type header
|
||||
const boundaryMatch = contentType.match(/boundary=([^;]+)/);
|
||||
if (!boundaryMatch) {
|
||||
throw new ApiError(400, 'Invalid multipart boundary');
|
||||
}
|
||||
const boundary = boundaryMatch[1].trim();
|
||||
|
||||
// Decode base64 body if needed (API Gateway sends base64 encoded for binary media types)
|
||||
let bodyBuffer: Buffer;
|
||||
try {
|
||||
if (isBase64Encoded) {
|
||||
bodyBuffer = Buffer.from(eventBody, 'base64');
|
||||
} else {
|
||||
// Try to detect if it's base64
|
||||
if (eventBody.match(/^[A-Za-z0-9+/=]+$/)) {
|
||||
bodyBuffer = Buffer.from(eventBody, 'base64');
|
||||
} else {
|
||||
bodyBuffer = Buffer.from(eventBody, 'binary');
|
||||
}
|
||||
}
|
||||
} catch (error) {
|
||||
throw new ApiError(400, 'Invalid request body encoding');
|
||||
}
|
||||
|
||||
// Split by boundary
|
||||
const parts = bodyBuffer.toString('binary').split(`--${boundary}`);
|
||||
|
||||
const fields: Record<string, string> = {};
|
||||
const files: ParsedFormData['files'] = [];
|
||||
|
||||
for (const part of parts) {
|
||||
if (!part || part.trim() === '' || part.trim() === '--') {
|
||||
continue;
|
||||
}
|
||||
|
||||
// Split headers and body
|
||||
const [headers, ...bodyParts] = part.split('\r\n\r\n');
|
||||
if (!headers || bodyParts.length === 0) {
|
||||
continue;
|
||||
}
|
||||
|
||||
const body = bodyParts.join('\r\n\r\n').trim();
|
||||
if (!body) {
|
||||
continue;
|
||||
}
|
||||
|
||||
// Parse Content-Disposition header
|
||||
const contentDispositionMatch = headers.match(/Content-Disposition:\s*form-data;\s*name="([^"]+)"/);
|
||||
if (!contentDispositionMatch) {
|
||||
continue;
|
||||
}
|
||||
|
||||
const fieldName = contentDispositionMatch[1];
|
||||
|
||||
// Check if it's a file
|
||||
const filenameMatch = headers.match(/filename="([^"]+)"/);
|
||||
const contentTypeMatch = headers.match(/Content-Type:\s*([^\r\n]+)/);
|
||||
|
||||
if (filenameMatch) {
|
||||
// It's a file
|
||||
const fileName = filenameMatch[1];
|
||||
const fileContentType = contentTypeMatch ? contentTypeMatch[1].trim() : 'application/octet-stream';
|
||||
|
||||
// Convert body to buffer (remove trailing boundary markers)
|
||||
const fileData = Buffer.from(body.replace(/\r\n--$/, ''), 'binary');
|
||||
|
||||
files.push({
|
||||
fieldName,
|
||||
fileName,
|
||||
contentType: fileContentType,
|
||||
data: fileData,
|
||||
});
|
||||
} else {
|
||||
// It's a regular field
|
||||
fields[fieldName] = body.replace(/\r\n--$/, '').trim();
|
||||
}
|
||||
}
|
||||
|
||||
return { fields, files };
|
||||
}
|
||||
|
||||
/**
|
||||
* Parse JSON field from form data
|
||||
*/
|
||||
export function parseJsonField(fields: Record<string, string>, fieldName: string): any {
|
||||
const value = fields[fieldName];
|
||||
if (!value) {
|
||||
return null;
|
||||
}
|
||||
|
||||
try {
|
||||
return JSON.parse(value);
|
||||
} catch (error) {
|
||||
throw new ApiError(400, `Invalid JSON in field: ${fieldName}`);
|
||||
}
|
||||
}
|
||||
|
||||
62
src/common/utils/helper/resendOtpHelper.ts
Normal file
62
src/common/utils/helper/resendOtpHelper.ts
Normal file
@@ -0,0 +1,62 @@
|
||||
import * as bcrypt from "bcryptjs";
|
||||
import { OtpGenerator, OtpGeneratorSixDigit } from "./OtpGenerator";
|
||||
import { encryptUserId } from "./CodeGenerator";
|
||||
|
||||
export interface OtpResult {
|
||||
otp: string;
|
||||
hashedOtp: string;
|
||||
expiry: Date;
|
||||
encryptedId: string;
|
||||
}
|
||||
|
||||
export async function resendOtpHelper(
|
||||
prisma: any,
|
||||
userId: number,
|
||||
emailPurpose: "Register" | "Login" | "ForgotPassword",
|
||||
otpLength: 4 | 6 = 4,
|
||||
expiryMinutes: number = 5
|
||||
): Promise<OtpResult> {
|
||||
|
||||
// 1️⃣ Deactivate previous OTPs
|
||||
await prisma.userOtp.updateMany({
|
||||
where: {
|
||||
userXid: userId,
|
||||
otpType: emailPurpose,
|
||||
isActive: true,
|
||||
},
|
||||
data: {
|
||||
isActive: false,
|
||||
isVerified: true,
|
||||
},
|
||||
});
|
||||
|
||||
// 2️⃣ Generate new OTP
|
||||
const otp =
|
||||
otpLength === 6
|
||||
? OtpGeneratorSixDigit.generateOtp()
|
||||
: OtpGenerator.generateOtp();
|
||||
|
||||
const hashedOtp = await bcrypt.hash(otp, 10);
|
||||
const expiry = new Date(Date.now() + expiryMinutes * 60000);
|
||||
const encryptedId = encryptUserId(userId.toString());
|
||||
|
||||
// 3️⃣ Insert new OTP into table
|
||||
await prisma.userOtp.create({
|
||||
data: {
|
||||
userXid: userId,
|
||||
otpType: emailPurpose,
|
||||
otpCode: hashedOtp,
|
||||
expiresOn: expiry,
|
||||
isVerified: false,
|
||||
isActive: true,
|
||||
},
|
||||
});
|
||||
|
||||
// 4️⃣ Return new OTP (email will use this)
|
||||
return {
|
||||
otp,
|
||||
hashedOtp,
|
||||
expiry,
|
||||
encryptedId,
|
||||
};
|
||||
}
|
||||
191
src/common/utils/helper/s3Upload.ts
Normal file
191
src/common/utils/helper/s3Upload.ts
Normal file
@@ -0,0 +1,191 @@
|
||||
import dotenv from 'dotenv';
|
||||
import path from 'path';
|
||||
import * as yup from 'yup';
|
||||
|
||||
dotenv.config({ path: path.join(__dirname, '../../.env') });
|
||||
|
||||
const envVarsSchema = yup
|
||||
.object()
|
||||
.shape({
|
||||
NODE_ENV: yup
|
||||
.string()
|
||||
.oneOf(['production', 'development', 'test'])
|
||||
.required(),
|
||||
PORT: yup.number().default(3000),
|
||||
// FRONTEND_URL: yup.string().required('Frontend URL is required'),
|
||||
//JWT
|
||||
JWT_SECRET: yup.string().required('JWT secret key is required'),
|
||||
JWT_ACCESS_EXPIRATION_MINUTES: yup
|
||||
.number()
|
||||
.default(30)
|
||||
.required('minutes after which access tokens expire'),
|
||||
JWT_REFRESH_EXPIRATION_DAYS: yup
|
||||
.number()
|
||||
.default(30)
|
||||
.required('days after which refresh tokens expire'),
|
||||
JWT_RESET_PASSWORD_EXPIRATION_MINUTES: yup
|
||||
.number()
|
||||
.default(10)
|
||||
.required('minutes after which reset password token expires'),
|
||||
JWT_VERIFY_EMAIL_EXPIRATION_MINUTES: yup
|
||||
.number()
|
||||
.default(10)
|
||||
.required('minutes after which verify email token expires'),
|
||||
AWS_REGION: yup.string().required('AWS region is required'),
|
||||
S3_BUCKET_NAME: yup.string().required('S3 bucket name is required'),
|
||||
//SMTP and BREVO
|
||||
// BREVO_SMTP_HOST: yup
|
||||
// .string()
|
||||
// .nullable()
|
||||
// .required('server that will send the emails'),
|
||||
// BREVO_SMTP_PORT: yup
|
||||
// .number()
|
||||
// .nullable()
|
||||
// .required('port to connect to the email server'),
|
||||
// BREVO_SMTP_USER: yup
|
||||
// .string()
|
||||
// .nullable()
|
||||
// .required('username for email server'),
|
||||
// BREVO_SMTP_PASS: yup
|
||||
// .string()
|
||||
// .nullable()
|
||||
// .required('password for email server'),
|
||||
// BREVO_FROM_EMAIL: yup
|
||||
// .string()
|
||||
// .nullable()
|
||||
// .required('the from field in the emails sent by the app'),
|
||||
// BREVO_EMAIL_API_KEY: yup
|
||||
// .string()
|
||||
// .nullable()
|
||||
// .required('the from field in the emails sent by the app api key'),
|
||||
// BREVO_API_BASEURL: yup.string().required('Brevo base URL is required'),
|
||||
// //one signal
|
||||
// ONESIGNAL_APPID: yup.string().required('One signal app id is required'),
|
||||
// ONESIGNAL_REST_APIKEY: yup
|
||||
// .string()
|
||||
// .required('One signal api key is required'),
|
||||
//branch IO
|
||||
// BRANCH_IO_KEY: yup.string().required('Branch IO key is required'),
|
||||
|
||||
// DataBase
|
||||
DB_USERNAME: yup.string().required('DB Username is required'),
|
||||
DB_PASSWORD: yup.string().required('DB Password is required'),
|
||||
DB_DATABASE_NAME: yup.string().required('Database name is required'),
|
||||
DB_HOSTNAME: yup
|
||||
.string()
|
||||
.default('127.0.0.1')
|
||||
.required('DB Hostname is required'),
|
||||
DB_PORT: yup.number().default(3306).required('DB Port is required'),
|
||||
//OTP Bypass
|
||||
BYPASS_OTP: yup.boolean().default(false).required('Bypass OTP is required'),
|
||||
})
|
||||
.noUnknown(true);
|
||||
|
||||
// Validate and prepare the configuration
|
||||
function getConfig() {
|
||||
try {
|
||||
// Validate the environment variables
|
||||
const envVars = envVarsSchema.validateSync(process.env, {
|
||||
abortEarly: false, // Validate all fields before throwing errors
|
||||
stripUnknown: true, // Remove fields not in the schema
|
||||
});
|
||||
|
||||
// Return the validated configuration
|
||||
return {
|
||||
env: envVars.NODE_ENV,
|
||||
port: envVars.PORT,
|
||||
jwt: {
|
||||
secret: envVars.JWT_SECRET,
|
||||
accessExpirationMinutes: envVars.JWT_ACCESS_EXPIRATION_MINUTES,
|
||||
refreshExpirationDays: envVars.JWT_REFRESH_EXPIRATION_DAYS,
|
||||
resetPasswordExpirationMinutes:
|
||||
envVars.JWT_RESET_PASSWORD_EXPIRATION_MINUTES,
|
||||
verifyEmailExpirationMinutes:
|
||||
envVars.JWT_VERIFY_EMAIL_EXPIRATION_MINUTES,
|
||||
},
|
||||
database: {
|
||||
development: {
|
||||
host: envVars.DB_HOSTNAME,
|
||||
port: envVars.DB_PORT,
|
||||
username: envVars.DB_USERNAME,
|
||||
password: envVars.DB_PASSWORD,
|
||||
database: envVars.DB_DATABASE_NAME,
|
||||
logging: false,
|
||||
},
|
||||
test: {
|
||||
host: envVars.DB_HOSTNAME,
|
||||
port: envVars.DB_PORT,
|
||||
username: envVars.DB_USERNAME,
|
||||
password: envVars.DB_PASSWORD,
|
||||
database: envVars.DB_DATABASE_NAME,
|
||||
logging: false,
|
||||
socketPath: '/var/run/mysqld/mysqld.sock',
|
||||
},
|
||||
production: {
|
||||
host: envVars.DB_HOSTNAME,
|
||||
port: envVars.DB_PORT,
|
||||
username: envVars.DB_USERNAME,
|
||||
password: envVars.DB_PASSWORD,
|
||||
database: envVars.DB_DATABASE_NAME,
|
||||
logging: false,
|
||||
socketPath: '/var/run/mysqld/mysqld.sock',
|
||||
},
|
||||
},
|
||||
aws: {
|
||||
region: envVars.AWS_REGION,
|
||||
bucketName: envVars.S3_BUCKET_NAME,
|
||||
},
|
||||
byPassOTP: envVars.BYPASS_OTP,
|
||||
// BaseURL: envVars.BASEURL,
|
||||
// FRONTEND_URL: envVars.FRONTEND_URL,
|
||||
// email: {
|
||||
// smtp: {
|
||||
// host: envVars?.BREVO_SMTP_HOST,
|
||||
// port: envVars?.BREVO_SMTP_PORT,
|
||||
// secure: envVars?.BREVO_SMTP_PORT == 465, // true for 465, false for other ports
|
||||
// auth: {
|
||||
// user: envVars?.BREVO_SMTP_USER,
|
||||
// pass: envVars?.BREVO_SMTP_PASS,
|
||||
// },
|
||||
// },
|
||||
// from: envVars?.BREVO_FROM_EMAIL,
|
||||
// api_key: envVars?.BREVO_EMAIL_API_KEY,
|
||||
// BrevobaseURL: envVars?.BREVO_API_BASEURL,
|
||||
// },
|
||||
// oneSignal: {
|
||||
// appID: envVars.ONESIGNAL_APPID,
|
||||
// restApiKey: envVars.ONESIGNAL_REST_APIKEY,
|
||||
// },
|
||||
// branchIO: {
|
||||
// branchIOKey: envVars.BRANCH_IO_KEY,
|
||||
// },
|
||||
};
|
||||
} catch (error: unknown) {
|
||||
if (error instanceof yup.ValidationError) {
|
||||
console.error('Validation Errors:', error.errors.join(', '));
|
||||
} else {
|
||||
console.error('Unexpected error during configuration validation:', error);
|
||||
}
|
||||
|
||||
console.error(
|
||||
'Server shut down due to incomplete environment variable configuration.'
|
||||
);
|
||||
process.exit(1); // Exit with error code 1
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Created By : Angad Chauhan
|
||||
* Created at : 31/1/25
|
||||
* Use : For google login .env file global variable
|
||||
*/
|
||||
// export const googleConfig = {
|
||||
// clientID: process.env.GOOGLE_CLIENT_ID!,
|
||||
// clientSecret: process.env.GOOGLE_CLIENT_SECRET!,
|
||||
// callbackURL: process.env.GOOGLE_CALLBACK_URL!,
|
||||
// };
|
||||
|
||||
// Validate and export configuration only if validation succeeds
|
||||
const config = getConfig();
|
||||
export default config;
|
||||
|
||||
62
src/common/utils/helper/sendOtp.ts
Normal file
62
src/common/utils/helper/sendOtp.ts
Normal file
@@ -0,0 +1,62 @@
|
||||
import * as bcrypt from "bcryptjs";
|
||||
import { OtpGenerator, OtpGeneratorSixDigit } from "./OtpGenerator";
|
||||
import { encryptUserId } from "./CodeGenerator";
|
||||
|
||||
export interface OtpResult {
|
||||
otp: string;
|
||||
hashedOtp: string;
|
||||
expiry: Date;
|
||||
encryptedId: string;
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate OTP using Prisma instance passed from Lambda
|
||||
*/
|
||||
export async function generateOtpHelper(
|
||||
prisma: any, // ⭐ Inject prisma
|
||||
userId: number,
|
||||
email: string,
|
||||
emailPurpose: "Register" | "Login" | "ForgotPassword",
|
||||
otpLength: 4 | 6 = 4,
|
||||
expiryMinutes: number = 5
|
||||
): Promise<OtpResult> {
|
||||
|
||||
const otp =
|
||||
otpLength === 6
|
||||
? OtpGeneratorSixDigit.generateOtp()
|
||||
: OtpGenerator.generateOtp();
|
||||
|
||||
const hashedOtp = await bcrypt.hash(otp, 10);
|
||||
|
||||
const expiry = new Date(Date.now() + expiryMinutes * 60000);
|
||||
|
||||
const encryptedId = encryptUserId(userId.toString());
|
||||
|
||||
// Delete previous active OTPs
|
||||
await prisma.userOtp.deleteMany({
|
||||
where: {
|
||||
userXid: userId,
|
||||
otpType: emailPurpose,
|
||||
isActive: true,
|
||||
},
|
||||
});
|
||||
|
||||
// Create new OTP entry
|
||||
await prisma.userOtp.create({
|
||||
data: {
|
||||
userXid: userId,
|
||||
otpType: emailPurpose,
|
||||
otpCode: hashedOtp,
|
||||
expiresOn: expiry,
|
||||
isVerified: false,
|
||||
isActive: true,
|
||||
},
|
||||
});
|
||||
|
||||
return {
|
||||
otp,
|
||||
hashedOtp,
|
||||
expiry,
|
||||
encryptedId,
|
||||
};
|
||||
}
|
||||
66
src/common/utils/pagination/pagination.service.ts
Normal file
66
src/common/utils/pagination/pagination.service.ts
Normal file
@@ -0,0 +1,66 @@
|
||||
// common/utils/pagination/pagination.service.ts
|
||||
import { PaginationOptions, PaginationParams, PaginatedResponse } from './pagination.types';
|
||||
|
||||
export class PaginationService {
|
||||
private readonly DEFAULT_PAGE = 1;
|
||||
private readonly DEFAULT_LIMIT = 10;
|
||||
private readonly MAX_LIMIT = 100;
|
||||
|
||||
/**
|
||||
* Parse and validate pagination parameters
|
||||
*/
|
||||
parsePaginationParams(params: PaginationParams): PaginationOptions {
|
||||
let page = Number(params.page) || this.DEFAULT_PAGE;
|
||||
let limit = Number(params.limit) || this.DEFAULT_LIMIT;
|
||||
|
||||
// Validate and constrain values
|
||||
page = Math.max(1, page);
|
||||
limit = Math.max(1, Math.min(limit, this.MAX_LIMIT));
|
||||
|
||||
const skip = (page - 1) * limit;
|
||||
|
||||
return {
|
||||
page,
|
||||
limit,
|
||||
skip,
|
||||
};
|
||||
}
|
||||
|
||||
/**
|
||||
* Create paginated response
|
||||
*/
|
||||
createPaginatedResponse<T>(
|
||||
data: T[],
|
||||
totalCount: number,
|
||||
paginationOptions: PaginationOptions,
|
||||
): PaginatedResponse<T> {
|
||||
const { page, limit } = paginationOptions;
|
||||
const totalPages = Math.ceil(totalCount / limit);
|
||||
|
||||
return {
|
||||
data,
|
||||
pagination: {
|
||||
currentPage: page,
|
||||
pageSize: limit,
|
||||
totalCount,
|
||||
totalPages,
|
||||
hasNext: page < totalPages,
|
||||
hasPrevious: page > 1,
|
||||
},
|
||||
};
|
||||
}
|
||||
|
||||
/**
|
||||
* Extract pagination params from API Gateway event
|
||||
*/
|
||||
getPaginationFromEvent(event: any): PaginationParams {
|
||||
const queryParams = event.queryStringParameters || {};
|
||||
|
||||
return {
|
||||
page: queryParams.page,
|
||||
limit: queryParams.limit,
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
export const paginationService = new PaginationService();
|
||||
23
src/common/utils/pagination/pagination.types.ts
Normal file
23
src/common/utils/pagination/pagination.types.ts
Normal file
@@ -0,0 +1,23 @@
|
||||
// common/utils/pagination/pagination.types.ts
|
||||
export interface PaginationOptions {
|
||||
page: number;
|
||||
limit: number;
|
||||
skip: number;
|
||||
}
|
||||
|
||||
export interface PaginatedResponse<T> {
|
||||
data: T[];
|
||||
pagination: {
|
||||
currentPage: number;
|
||||
pageSize: number;
|
||||
totalCount: number;
|
||||
totalPages: number;
|
||||
hasNext: boolean;
|
||||
hasPrevious: boolean;
|
||||
};
|
||||
}
|
||||
|
||||
export interface PaginationParams {
|
||||
page?: string | number;
|
||||
limit?: string | number;
|
||||
}
|
||||
@@ -0,0 +1,35 @@
|
||||
// validations/hostBankDetails.validation.ts
|
||||
import { z } from "zod";
|
||||
|
||||
export const hostBankDetailsSchema = z.object({
|
||||
accountNumber: z
|
||||
.string()
|
||||
.nonempty("Account number is required"),
|
||||
|
||||
accountHolderName: z
|
||||
.string()
|
||||
.nonempty("Account holder name is required")
|
||||
.min(2, { message: "Account holder name must be at least 2 characters" }),
|
||||
|
||||
bankXid: z
|
||||
.number()
|
||||
.int({ message: "Bank ID must be an integer" })
|
||||
.positive({ message: "Bank ID must be a positive number" }),
|
||||
|
||||
hostXid: z
|
||||
.number()
|
||||
.int({ message: "Host ID must be an integer" })
|
||||
.positive({ message: "Host ID must be a positive number" }),
|
||||
|
||||
bankBranchXid: z
|
||||
.number()
|
||||
.int({ message: "Bank branch ID must be an integer" })
|
||||
.positive({ message: "Bank branch ID must be a positive number" }),
|
||||
|
||||
currencyXid: z
|
||||
.number()
|
||||
.int({ message: "Currency ID must be an integer" })
|
||||
.positive({ message: "Currency ID must be a positive number" }),
|
||||
});
|
||||
|
||||
export type HostBankDetailsSchema = z.infer<typeof hostBankDetailsSchema>;
|
||||
@@ -0,0 +1,76 @@
|
||||
import { z } from 'zod';
|
||||
import { SCHEDULING_TYPE } from '../../constants/host.constant';
|
||||
|
||||
const WeekdayEnum = z.enum([
|
||||
'MONDAY',
|
||||
'TUESDAY',
|
||||
'WEDNESDAY',
|
||||
'THURSDAY',
|
||||
'FRIDAY',
|
||||
'SATURDAY',
|
||||
'SUNDAY',
|
||||
]);
|
||||
|
||||
export const scheduleActivity = z.object({
|
||||
activityXid: z.number(),
|
||||
listNow: z.boolean(),
|
||||
|
||||
scheduleType: z.enum([
|
||||
SCHEDULING_TYPE.ONCE,
|
||||
SCHEDULING_TYPE.WEEKLY,
|
||||
SCHEDULING_TYPE.MONTHLY,
|
||||
SCHEDULING_TYPE.CUSTOM,
|
||||
]),
|
||||
|
||||
dateRange: z.object({
|
||||
startDate: z.string(),
|
||||
endDate: z.string().nullable().optional(),
|
||||
}),
|
||||
|
||||
rules: z.object({
|
||||
weekdays: z.array(WeekdayEnum).optional(),
|
||||
monthDates: z.array(z.number()).optional(),
|
||||
customDates: z.array(z.string()).optional(),
|
||||
}),
|
||||
|
||||
venues: z.array(
|
||||
z.object({
|
||||
venueXid: z.number(),
|
||||
slots: z.array(
|
||||
z.object({
|
||||
startTime: z.string(),
|
||||
endTime: z.string(),
|
||||
weekDay: WeekdayEnum.nullable().optional(),
|
||||
dayOfMonth: z.number().nullable().optional(),
|
||||
occurrenceDate: z.string().nullable().optional(),
|
||||
maxCapacity: z.number(),
|
||||
})
|
||||
).optional().default([]),
|
||||
})
|
||||
),
|
||||
|
||||
earlyCheckInMins: z.number().optional(),
|
||||
bookingCutOffMins: z.number().optional(),
|
||||
isLateCheckingAllowed: z.boolean().optional(),
|
||||
isInstantBooking: z.boolean().optional(),
|
||||
})
|
||||
.superRefine((data, ctx) => {
|
||||
if (data.scheduleType === 'WEEKLY' && !data.rules.weekdays?.length) {
|
||||
ctx.addIssue({ path: ['rules', 'weekdays'], message: 'Weekdays required for WEEKLY schedule', code: 'custom' });
|
||||
}
|
||||
|
||||
if (data.scheduleType === 'MONTHLY' && !data.rules.monthDates?.length) {
|
||||
ctx.addIssue({ path: ['rules', 'monthDates'], message: 'Month dates required for MONTHLY schedule', code: 'custom' });
|
||||
}
|
||||
|
||||
if (
|
||||
(data.scheduleType === 'CUSTOM' || data.scheduleType === 'ONCE') &&
|
||||
!data.rules.customDates?.length
|
||||
) {
|
||||
ctx.addIssue({ path: ['rules', 'customDates'], message: 'Custom dates required', code: 'custom' });
|
||||
}
|
||||
});
|
||||
|
||||
export type ScheduleActivityDTO = z.infer<typeof scheduleActivity>;
|
||||
|
||||
|
||||
@@ -0,0 +1,138 @@
|
||||
import { z } from "zod";
|
||||
|
||||
export const parentCompanySchema = z.object({
|
||||
companyName: z.string()
|
||||
.max(100, "Parent company name cannot exceed 100 characters")
|
||||
.optional(),
|
||||
|
||||
address1: z.string()
|
||||
.max(150, "Address1 cannot exceed 150 characters")
|
||||
.optional(),
|
||||
|
||||
address2: z.string()
|
||||
.max(150, "Address2 cannot exceed 150 characters")
|
||||
.optional(),
|
||||
|
||||
cityXid: z.number().optional(),
|
||||
stateXid: z.number().optional(),
|
||||
countryXid: z.number().optional(),
|
||||
|
||||
pinCode: z.string()
|
||||
.max(30, "Pincode cannot exceed 30 characters")
|
||||
.optional(),
|
||||
|
||||
logoPath: z.string()
|
||||
.max(400, "Logo path cannot exceed 400 characters")
|
||||
.optional(),
|
||||
|
||||
registrationNumber: z.string()
|
||||
.max(30, "Registration number cannot exceed 30 characters")
|
||||
.optional(),
|
||||
|
||||
panNumber: z.string()
|
||||
.max(30, "PAN number cannot exceed 30 characters")
|
||||
.optional(),
|
||||
|
||||
gstNumber: z.string()
|
||||
.max(30, "GST number cannot exceed 30 characters")
|
||||
.optional(),
|
||||
|
||||
formationDate: z.string()
|
||||
.optional()
|
||||
.refine((val) => !val || !isNaN(Date.parse(val)), {
|
||||
message: "Formation date must be a valid date",
|
||||
}),
|
||||
|
||||
companyTypeXid: z.number()
|
||||
.optional(),
|
||||
|
||||
websiteUrl: z.string().nullable().optional(),
|
||||
instagramUrl: z.string().nullable().optional(),
|
||||
facebookUrl: z.string().nullable().optional(),
|
||||
linkedinUrl: z.string().nullable().optional(),
|
||||
twitterUrl: z.string().nullable().optional(),
|
||||
|
||||
});
|
||||
|
||||
|
||||
// =======================================================
|
||||
// HOST COMPANY DETAILS (Main Company)
|
||||
// =======================================================
|
||||
|
||||
export const hostCompanyDetailsSchema = z.object({
|
||||
companyName: z.string()
|
||||
.min(1, "Company name is required")
|
||||
.max(100, "Company name cannot exceed 100 characters"),
|
||||
|
||||
address1: z.string()
|
||||
.min(1, "Address1 is required")
|
||||
.max(150, "Address1 cannot exceed 150 characters"),
|
||||
|
||||
address2: z.string()
|
||||
.max(150, "Address2 cannot exceed 150 characters")
|
||||
.optional(),
|
||||
|
||||
cityXid: z.number().min(1, "City is required"),
|
||||
stateXid: z.number().min(1, "State is required"),
|
||||
countryXid: z.number().min(1, "Country is required"),
|
||||
|
||||
pinCode: z.string()
|
||||
.min(4, "Pincode/Zipcode is required")
|
||||
.max(30, "Pincode cannot exceed 30 characters"),
|
||||
|
||||
logoPath: z.string()
|
||||
.max(400, "Logo path cannot exceed 400 characters")
|
||||
.optional(),
|
||||
|
||||
isSubsidairy: z.boolean(),
|
||||
|
||||
registrationNumber: z.string()
|
||||
.max(30, "Registration number cannot exceed 30 characters")
|
||||
.optional(),
|
||||
|
||||
panNumber: z.string()
|
||||
.min(1, "PAN number is required")
|
||||
.max(30, "PAN number cannot exceed 30 characters"),
|
||||
|
||||
gstNumber: z.string()
|
||||
.max(30, "GST number cannot exceed 30 characters")
|
||||
.optional(),
|
||||
|
||||
formationDate: z.string()
|
||||
.optional()
|
||||
.refine((val) => !val || !isNaN(Date.parse(val)), {
|
||||
message: "Formation date must be a valid date",
|
||||
}),
|
||||
|
||||
companyTypeXid: z.number()
|
||||
.int("Company type must be a valid integer")
|
||||
.min(1, "Company type is required"),
|
||||
|
||||
|
||||
referencedBy: z.string()
|
||||
.optional(),
|
||||
|
||||
websiteUrl: z.string().nullable().optional(),
|
||||
instagramUrl: z.string().nullable().optional(),
|
||||
facebookUrl: z.string().nullable().optional(),
|
||||
linkedinUrl: z.string().nullable().optional(),
|
||||
twitterUrl: z.string().nullable().optional(),
|
||||
|
||||
|
||||
parentCompany: parentCompanySchema.optional(),
|
||||
});
|
||||
|
||||
|
||||
// =======================================================
|
||||
// DOCUMENTS VALIDATION
|
||||
// =======================================================
|
||||
|
||||
export const hostDocumentsSchema = z.array(
|
||||
z.object({
|
||||
documentTypeXid: z.number(),
|
||||
documentName: z.string().max(50, "Document name cannot exceed 50 characters"), // per parent max 50 / host max 20 — safe limit 50
|
||||
fieldName: z.string(),
|
||||
owner: z.enum(['host', 'parent']).optional(),
|
||||
isOptional: z.boolean().optional(),
|
||||
})
|
||||
);
|
||||
20
src/common/utils/validation/host/login.validation.ts
Normal file
20
src/common/utils/validation/host/login.validation.ts
Normal file
@@ -0,0 +1,20 @@
|
||||
// validations/hostBankDetails.validation.ts
|
||||
import { z } from "zod";
|
||||
|
||||
export const loginForHostSchema = z.object({
|
||||
|
||||
|
||||
emailAddress : z
|
||||
.string()
|
||||
.nonempty("Email is required"),
|
||||
|
||||
userPassword : z
|
||||
.string()
|
||||
.nonempty("Password is required")
|
||||
.min(8, { message: "Password must be at least 8 characters" }),
|
||||
|
||||
|
||||
|
||||
});
|
||||
|
||||
export type loginForHostSchema = z.infer<typeof loginForHostSchema>;
|
||||
@@ -0,0 +1,26 @@
|
||||
// validations/hostBankDetails.validation.ts
|
||||
import { z } from "zod";
|
||||
|
||||
export const userPersonalInfoSchema = z.object({
|
||||
firstName: z
|
||||
.string()
|
||||
.nonempty("First name is required"),
|
||||
|
||||
lastName: z
|
||||
.string()
|
||||
.optional(),
|
||||
|
||||
genderName: z
|
||||
.string()
|
||||
.nonempty("Gender is required"),
|
||||
|
||||
dateOfBirth: z
|
||||
.string()
|
||||
.nonempty("Date of birth is required")
|
||||
.refine(val => !isNaN(Date.parse(val)), {
|
||||
message: "Date of birth must be a valid ISO date (YYYY-MM-DD)",
|
||||
}),
|
||||
|
||||
});
|
||||
|
||||
export type UserPersonalInfoSchema = z.infer<typeof userPersonalInfoSchema>;
|
||||
@@ -12,13 +12,12 @@ const envVarsSchema = yup
|
||||
.oneOf(['production', 'development', 'test'])
|
||||
.required(),
|
||||
PORT: yup.number().default(3000),
|
||||
BASEURL: yup.string().required('Base URL is required'),
|
||||
// FRONTEND_URL: yup.string().required('Frontend URL is required'),
|
||||
//JWT
|
||||
JWT_SECRET: yup.string().required('JWT secret key is required'),
|
||||
JWT_ACCESS_EXPIRATION_MINUTES: yup
|
||||
.number()
|
||||
.default(30)
|
||||
.default(1440)
|
||||
.required('minutes after which access tokens expire'),
|
||||
JWT_REFRESH_EXPIRATION_DAYS: yup
|
||||
.number()
|
||||
@@ -32,32 +31,37 @@ const envVarsSchema = yup
|
||||
.number()
|
||||
.default(10)
|
||||
.required('minutes after which verify email token expires'),
|
||||
AWS_REGION: yup.string().required('AWS region is required'),
|
||||
S3_BUCKET_NAME: yup.string().required('S3 bucket name is required'),
|
||||
//SMTP and BREVO
|
||||
// BREVO_SMTP_HOST: yup
|
||||
// .string()
|
||||
// .nullable()
|
||||
// .required('server that will send the emails'),
|
||||
// BREVO_SMTP_PORT: yup
|
||||
// .number()
|
||||
// .nullable()
|
||||
// .required('port to connect to the email server'),
|
||||
// BREVO_SMTP_USER: yup
|
||||
// .string()
|
||||
// .nullable()
|
||||
// .required('username for email server'),
|
||||
// BREVO_SMTP_PASS: yup
|
||||
// .string()
|
||||
// .nullable()
|
||||
// .required('password for email server'),
|
||||
// BREVO_FROM_EMAIL: yup
|
||||
// .string()
|
||||
// .nullable()
|
||||
// .required('the from field in the emails sent by the app'),
|
||||
// BREVO_EMAIL_API_KEY: yup
|
||||
// .string()
|
||||
// .nullable()
|
||||
// .required('the from field in the emails sent by the app api key'),
|
||||
// BREVO_API_BASEURL: yup.string().required('Brevo base URL is required'),
|
||||
BREVO_SMTP_HOST: yup
|
||||
.string()
|
||||
.nullable()
|
||||
.required('server that will send the emails'),
|
||||
BREVO_SMTP_PORT: yup
|
||||
.number()
|
||||
.nullable()
|
||||
.required('port to connect to the email server'),
|
||||
BREVO_SMTP_USER: yup
|
||||
.string()
|
||||
.nullable()
|
||||
.required('username for email server'),
|
||||
BREVO_SMTP_PASS: yup
|
||||
.string()
|
||||
.nullable()
|
||||
.required('password for email server'),
|
||||
BREVO_FROM_EMAIL: yup
|
||||
.string()
|
||||
.nullable()
|
||||
.required('the from field in the emails sent by the app'),
|
||||
BREVO_EMAIL_API_KEY: yup
|
||||
.string()
|
||||
.nullable()
|
||||
.required('the from field in the emails sent by the app api key'),
|
||||
BREVO_API_BASEURL: yup.string().required('Brevo base URL is required'),
|
||||
// Minglar Admin
|
||||
MINGLAR_ADMIN_EMAIL: yup.string().required('Minglar admin email address is required.'),
|
||||
MINGLAR_ADMIN_NAME: yup.string().required('Minglar admin name is required.'),
|
||||
// //one signal
|
||||
// ONESIGNAL_APPID: yup.string().required('One signal app id is required'),
|
||||
// ONESIGNAL_REST_APIKEY: yup
|
||||
@@ -77,6 +81,10 @@ const envVarsSchema = yup
|
||||
DB_PORT: yup.number().default(3306).required('DB Port is required'),
|
||||
//OTP Bypass
|
||||
BYPASS_OTP: yup.boolean().default(false).required('Bypass OTP is required'),
|
||||
// Email links
|
||||
AM_INVITATION_LINK: yup.string().required('Link to send in AM invitation mail is required'),
|
||||
HOST_LINK: yup.string().required('Link to host panel is required'),
|
||||
HOST_LINK_PQ: yup.string().required('Link to host panel pqp is required')
|
||||
})
|
||||
.noUnknown(true);
|
||||
|
||||
@@ -130,23 +138,33 @@ function getConfig() {
|
||||
socketPath: '/var/run/mysqld/mysqld.sock',
|
||||
},
|
||||
},
|
||||
aws: {
|
||||
region: envVars.AWS_REGION,
|
||||
bucketName: envVars.S3_BUCKET_NAME,
|
||||
},
|
||||
byPassOTP: envVars.BYPASS_OTP,
|
||||
// BaseURL: envVars.BASEURL,
|
||||
// FRONTEND_URL: envVars.FRONTEND_URL,
|
||||
// email: {
|
||||
// smtp: {
|
||||
// host: envVars?.BREVO_SMTP_HOST,
|
||||
// port: envVars?.BREVO_SMTP_PORT,
|
||||
// secure: envVars?.BREVO_SMTP_PORT == 465, // true for 465, false for other ports
|
||||
// auth: {
|
||||
// user: envVars?.BREVO_SMTP_USER,
|
||||
// pass: envVars?.BREVO_SMTP_PASS,
|
||||
// },
|
||||
// },
|
||||
// from: envVars?.BREVO_FROM_EMAIL,
|
||||
// api_key: envVars?.BREVO_EMAIL_API_KEY,
|
||||
// BrevobaseURL: envVars?.BREVO_API_BASEURL,
|
||||
// },
|
||||
email: {
|
||||
smtp: {
|
||||
host: envVars?.BREVO_SMTP_HOST,
|
||||
port: envVars?.BREVO_SMTP_PORT,
|
||||
secure: envVars?.BREVO_SMTP_PORT == 465, // true for 465, false for other ports
|
||||
auth: {
|
||||
user: envVars?.BREVO_SMTP_USER,
|
||||
pass: envVars?.BREVO_SMTP_PASS,
|
||||
},
|
||||
},
|
||||
from: envVars?.BREVO_FROM_EMAIL,
|
||||
api_key: envVars?.BREVO_EMAIL_API_KEY,
|
||||
BrevobaseURL: envVars?.BREVO_API_BASEURL,
|
||||
},
|
||||
//Minglar admin
|
||||
MinglarAdminEmail: envVars.MINGLAR_ADMIN_EMAIL,
|
||||
MinglarAdminName: envVars.MINGLAR_ADMIN_NAME,
|
||||
AM_INVITATION_LINK: envVars.AM_INVITATION_LINK,
|
||||
HOST_LINK: envVars.HOST_LINK,
|
||||
HOST_LINK_PQ: envVars.HOST_LINK_PQ,
|
||||
// oneSignal: {
|
||||
// appID: envVars.ONESIGNAL_APPID,
|
||||
// restApiKey: envVars.ONESIGNAL_REST_APIKEY,
|
||||
|
||||
@@ -16,7 +16,7 @@ async function bootstrap() {
|
||||
app.enableCors({
|
||||
origin: [
|
||||
'http://localhost:3000', // Local Swagger UI
|
||||
'http://localhost:3006', // Local Frontend
|
||||
'http://localhost:5173', // Local Frontend
|
||||
'https://editor.swagger.io', // Swagger Editor
|
||||
'https://klc-admin.wdiprojects.com',
|
||||
'https://admin-uat.klc.betadelivery.com',
|
||||
|
||||
176
src/modules/host/dto/createActivity.schema.ts
Normal file
176
src/modules/host/dto/createActivity.schema.ts
Normal file
@@ -0,0 +1,176 @@
|
||||
import { z } from 'zod';
|
||||
|
||||
/* ================= MEDIA ================= */
|
||||
export const MediaDto = z.object({
|
||||
mediaType: z.string().optional(),
|
||||
mediaFileName: z.string(),
|
||||
isCoverImage: z.boolean().optional().default(false),
|
||||
});
|
||||
|
||||
/* ================= PRICE ================= */
|
||||
export const PriceDto = z.object({
|
||||
noOfSession: z.number().int().optional().default(1),
|
||||
isPackage: z.boolean().optional().default(false),
|
||||
sessionValidity: z.number().int().optional().default(0),
|
||||
sessionValidityFrequency: z.string().optional().default('Days'),
|
||||
basePrice: z.number().int().optional().default(0),
|
||||
sellPrice: z.number().int(),
|
||||
});
|
||||
|
||||
/* ================= VENUE ================= */
|
||||
export const VenueDto = z.object({
|
||||
venueName: z.string(),
|
||||
venueLabel: z.string(),
|
||||
venueCapacity: z.number().int().optional().default(0),
|
||||
availableSeats: z.number().int().optional().default(0),
|
||||
isMinPeopleReqMandatory: z.boolean().optional().default(false),
|
||||
minPeopleRequired: z.number().int().nullable().optional(),
|
||||
minReqfullfilledBeforeMins: z.number().int().nullable().optional(),
|
||||
venueDescription: z.string().optional(),
|
||||
media: z.array(MediaDto).optional().default([]),
|
||||
prices: z.array(PriceDto).optional().default([]),
|
||||
});
|
||||
|
||||
/* ================= PICKUP / DROP ================= */
|
||||
export const PickupDetailDto = z.object({
|
||||
isPickUp: z.boolean().optional().default(false),
|
||||
locationLat: z.number().nullable().optional(),
|
||||
locationLong: z.number().nullable().optional(),
|
||||
locationAddress: z.string().nullable().optional(),
|
||||
transportTotalPrice: z.number().int().min(0),
|
||||
});
|
||||
|
||||
export const PickupTransportDto = z.object({
|
||||
transportModeXid: z.number().int(),
|
||||
});
|
||||
|
||||
/* ================= EQUIPMENT ================= */
|
||||
export const EquipmentDto = z.object({
|
||||
equipmentName: z.string(),
|
||||
isEquipmentChargeable: z.boolean().optional(),
|
||||
equipmentBasePrice: z.number().int().optional().default(0),
|
||||
equipmentTotalPrice: z.number().int().optional().default(0),
|
||||
});
|
||||
|
||||
/* ================= NAVIGATION MODE ================= */
|
||||
export const NavigationModeDto = z.object({
|
||||
navigationModeName: z.string().optional(),
|
||||
isChargeable: z.boolean().optional(),
|
||||
totalPrice: z.number().int().optional().default(0),
|
||||
});
|
||||
|
||||
/* ================= ELIGIBILITY ================= */
|
||||
export const EligibilityDto = z.object({
|
||||
isAgeRestriction: z.boolean().optional().default(false),
|
||||
ageRestrictionName: z.string().nullable().optional(),
|
||||
ageEntered: z.number().int().nullable().optional(),
|
||||
ageIn: z.string().nullable().optional(),
|
||||
minAge: z.number().int().nullable().optional(),
|
||||
maxAge: z.number().int().nullable().optional(),
|
||||
|
||||
isWeightRestriction: z.boolean().optional().default(false),
|
||||
weightRestrictionName: z.string().nullable().optional(),
|
||||
weightEntered: z.number().int().nullable().optional(),
|
||||
weightIn: z.string().nullable().optional(),
|
||||
minWeight: z.number().int().nullable().optional(),
|
||||
maxWeight: z.number().int().nullable().optional(),
|
||||
|
||||
isHeightRestriction: z.boolean().optional().default(false),
|
||||
heightRestrictionName: z.string().nullable().optional(),
|
||||
heightEntered: z.number().int().nullable().optional(),
|
||||
heightIn: z.string().nullable().optional(),
|
||||
minHeight: z.number().int().nullable().optional(),
|
||||
maxHeight: z.number().int().nullable().optional(),
|
||||
});
|
||||
|
||||
/* ================= OTHER DETAILS ================= */
|
||||
export const OtherDetailsDto = z.object({
|
||||
exclusiveNotes: z.string().optional(),
|
||||
safetyInstruction: z.string().optional(),
|
||||
dosNotes: z.string().optional(),
|
||||
dontsNotes: z.string().optional(),
|
||||
tipsNotes: z.string().optional(),
|
||||
termsAndCondition: z.string().optional(),
|
||||
cancellations: z.string().optional(),
|
||||
});
|
||||
|
||||
/* ================= CREATE ACTIVITY ================= */
|
||||
export const CreateActivityDto = z.object({
|
||||
activityXid: z.number().int(),
|
||||
|
||||
activityTypeXid: z.number().int().optional(),
|
||||
frequenciesXid: z.number().int().nullable().optional(),
|
||||
activityTitle: z.string().optional(),
|
||||
activityDescription: z.string().optional(),
|
||||
|
||||
checkInLat: z.number().nullable().optional(),
|
||||
checkInLong: z.number().nullable().optional(),
|
||||
checkInAddress: z.string().nullable().optional(),
|
||||
isCheckOutSame: z.boolean().optional().default(true),
|
||||
checkOutLat: z.number().nullable().optional(),
|
||||
checkOutLong: z.number().nullable().optional(),
|
||||
checkOutAddress: z.string().nullable().optional(),
|
||||
checkInStateName: z.string().nullable().optional(),
|
||||
checkInCityName: z.string().nullable().optional(),
|
||||
checkInCountryName: z.string().nullable().optional(),
|
||||
checkOutStateName: z.string().nullable().optional(),
|
||||
checkOutCityName: z.string().nullable().optional(),
|
||||
checkOutCountryName: z.string().nullable().optional(),
|
||||
|
||||
energyLevelXid: z.number().int().nullable().optional(),
|
||||
durationDays: z.number().int().optional(),
|
||||
durationHours: z.number().int().optional(),
|
||||
durationMins: z.number().int().optional(),
|
||||
|
||||
foodAvailable: z.boolean().nullable().optional(),
|
||||
foodIsChargeable: z.boolean().optional().default(false),
|
||||
alcoholAvailable: z.boolean().nullable().optional(),
|
||||
|
||||
trainerAvailable: z.boolean().nullable().optional(),
|
||||
trainerIsChargeable: z.boolean().optional().default(false),
|
||||
|
||||
pickUpDropAvailable: z.boolean().nullable().optional(),
|
||||
pickUpDropIsChargeable: z.boolean().optional().default(false),
|
||||
|
||||
inActivityAvailable: z.boolean().nullable().optional(),
|
||||
inActivityIsChargeable: z.boolean().optional().default(false),
|
||||
|
||||
equipmentAvailable: z.boolean().nullable().optional(),
|
||||
equipmentIsChargeable: z.boolean().optional().default(false),
|
||||
|
||||
cancellationAvailable: z.boolean().nullable().optional(),
|
||||
cancellationAllowedBeforeMins: z.number().int().nullable().optional(),
|
||||
|
||||
currencyXid: z.number().int().nullable().optional(),
|
||||
sustainabilityScore: z.number().int().nullable().optional(),
|
||||
safetyScore: z.number().int().nullable().optional(),
|
||||
isInstantBooking: z.boolean().optional().default(false),
|
||||
|
||||
taxXids: z.array(z.number().int()).optional().default([]),
|
||||
|
||||
media: z.array(MediaDto).optional().default([]),
|
||||
venues: z.array(VenueDto).optional().default([]),
|
||||
|
||||
foodTypeIds: z.array(z.number().int()).optional().default([]),
|
||||
cuisineIds: z.array(z.number().int()).optional().default([]),
|
||||
pickupTransports: z.array(PickupTransportDto).optional().default([]),
|
||||
pickupDetails: z.array(PickupDetailDto).optional().default([]),
|
||||
|
||||
navigationModes: z
|
||||
.array(NavigationModeDto)
|
||||
.optional()
|
||||
.default([]),
|
||||
|
||||
equipments: z.array(EquipmentDto).optional().default([]),
|
||||
amenitiesIds: z.array(z.number().int()).optional().default([]),
|
||||
|
||||
foodTotalAmount: z.number().int().optional().default(0),
|
||||
|
||||
eligibility: EligibilityDto.optional(),
|
||||
otherDetails: OtherDetailsDto.optional(),
|
||||
|
||||
allowedEntryTypes: z.array(z.number().int()).optional().default([]),
|
||||
trainerTotalAmount: z.number().int().optional().default(0),
|
||||
});
|
||||
|
||||
export type CreateActivityInput = z.infer<typeof CreateActivityDto>;
|
||||
39
src/modules/host/dto/createSchedulingOfAct.dto.ts
Normal file
39
src/modules/host/dto/createSchedulingOfAct.dto.ts
Normal file
@@ -0,0 +1,39 @@
|
||||
export interface ScheduleSlotDTO {
|
||||
startTime: string;
|
||||
endTime: string;
|
||||
weekDay?: 'MONDAY' | 'TUESDAY' | 'WEDNESDAY' | 'THURSDAY' | 'FRIDAY' | 'SATURDAY' | 'SUNDAY' | null;
|
||||
dayOfMonth?: number | null; // 1–31
|
||||
occurrenceDate?: string | null;
|
||||
maxCapacity: number;
|
||||
}
|
||||
|
||||
export interface ScheduleVenueDTO {
|
||||
venueXid: number;
|
||||
slots: ScheduleSlotDTO[];
|
||||
}
|
||||
|
||||
// export interface ScheduleActivityDTO {
|
||||
// activityXid: number;
|
||||
// scheduleType: 'ONCE' | 'WEEKLY' | 'MONTHLY' | 'CUSTOM';
|
||||
|
||||
// dateRange: {
|
||||
// startDate: string;
|
||||
// endDate?: string | null;
|
||||
// };
|
||||
|
||||
// rules: {
|
||||
// weekdays?: (
|
||||
// 'MONDAY' | 'TUESDAY' | 'WEDNESDAY' |
|
||||
// 'THURSDAY' | 'FRIDAY' | 'SATURDAY' | 'SUNDAY'
|
||||
// )[];
|
||||
// monthDates?: number[];
|
||||
// customDates?: string[];
|
||||
// };
|
||||
|
||||
// venues: ScheduleVenueDTO[];
|
||||
|
||||
// earlyCheckInMins?: number;
|
||||
// bookingCutOffMins?: number;
|
||||
// isLateCheckingAllowed?: boolean;
|
||||
// isInstantBooking?: boolean;
|
||||
// }
|
||||
@@ -21,7 +21,7 @@ export class CreateHostDto {
|
||||
|
||||
@IsOptional()
|
||||
@IsString()
|
||||
userPasscode?: string;
|
||||
userPassword?: string;
|
||||
|
||||
@IsOptional()
|
||||
@IsInt()
|
||||
@@ -49,3 +49,47 @@ export class UpdateHostDto {
|
||||
@IsBoolean()
|
||||
isActive?: boolean;
|
||||
}
|
||||
|
||||
export class GetHostLoginResponseDTO {
|
||||
id: number;
|
||||
firstName: string | null;
|
||||
lastName: string | null;
|
||||
emailAddress: string;
|
||||
mobileNumber: string | null;
|
||||
isActive: boolean;
|
||||
roleXid: number;
|
||||
accessToken: string;
|
||||
refreshToken: string;
|
||||
|
||||
constructor(user: any, accessToken: string, refreshToken: string) {
|
||||
this.id = user.id;
|
||||
this.firstName = user.firstName;
|
||||
this.lastName = user.lastName;
|
||||
this.emailAddress = user.emailAddress;
|
||||
this.mobileNumber = user.mobileNumber;
|
||||
this.isActive = user.isActive;
|
||||
this.roleXid = user.roleXid;
|
||||
this.accessToken = accessToken;
|
||||
this.refreshToken = refreshToken;
|
||||
}
|
||||
}
|
||||
|
||||
export class AddPaymentDetailsDTO {
|
||||
bankXid: number;
|
||||
bankBranchXid: number;
|
||||
accountNumber: string;
|
||||
accountHolderName: string;
|
||||
ifscCode: string;
|
||||
hostXid: number;
|
||||
currencyXid: number;
|
||||
|
||||
constructor(bankXid: number, bankBranchXid: number, accountNumber: string, accountHolderName: string, ifscCode: string, hostXid: number, currencyXid: number) {
|
||||
this.bankXid = bankXid;
|
||||
this.bankBranchXid = bankBranchXid;
|
||||
this.accountNumber = accountNumber;
|
||||
this.accountHolderName = accountHolderName;
|
||||
this.ifscCode = ifscCode;
|
||||
this.hostXid = hostXid;
|
||||
this.currencyXid = currencyXid;
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,117 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import {
|
||||
CreateActivityDto,
|
||||
CreateActivityInput,
|
||||
} from '../../../dto/createActivity.schema';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(
|
||||
async (event: APIGatewayProxyEvent): Promise<APIGatewayProxyResult> => {
|
||||
|
||||
/* 1️⃣ AUTH */
|
||||
const token =
|
||||
event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(401, 'Missing auth token');
|
||||
}
|
||||
|
||||
const userInfo = await verifyHostToken(token);
|
||||
|
||||
/* 2️⃣ PARSE JSON BODY */
|
||||
if (!event.body) {
|
||||
throw new ApiError(400, 'Request body is required');
|
||||
}
|
||||
|
||||
let body: any;
|
||||
try {
|
||||
body = JSON.parse(event.body);
|
||||
} catch {
|
||||
throw new ApiError(400, 'Invalid JSON body');
|
||||
}
|
||||
|
||||
const {
|
||||
activity,
|
||||
media = [],
|
||||
isDraft = false,
|
||||
} = body;
|
||||
|
||||
if (!activity) {
|
||||
throw new ApiError(400, 'activity payload is required');
|
||||
}
|
||||
|
||||
/* 3️⃣ NORMALIZE ACTIVITY ID */
|
||||
if (activity.activityXid) {
|
||||
activity.activityXid = Number(activity.activityXid);
|
||||
}
|
||||
|
||||
/* 4️⃣ ATTACH ACTIVITY MEDIA (S3 URLs) */
|
||||
if (!Array.isArray(media)) {
|
||||
throw new ApiError(400, 'media must be an array');
|
||||
}
|
||||
|
||||
activity.media = media.map((m: any) => ({
|
||||
mediaType: m.mediaType ?? 'image',
|
||||
mediaFileName: m.mediaFileName,
|
||||
isCoverImage: m.isCoverImage ?? false,
|
||||
}));
|
||||
|
||||
/* 4.1️⃣ ATTACH SAFETY INSTRUCTIONS (string only) */
|
||||
if (activity.safetyInstruction !== undefined && activity.safetyInstruction !== null) {
|
||||
if (typeof activity.safetyInstruction !== 'string') {
|
||||
throw new ApiError(400, 'safetyInstruction must be a string');
|
||||
}
|
||||
}
|
||||
|
||||
/* 4.2️⃣ ATTACH CANCELLATIONS (string only) */
|
||||
if (activity.cancellations !== undefined && activity.cancellations !== null) {
|
||||
if (typeof activity.cancellations !== 'string') {
|
||||
throw new ApiError(400, 'cancellations must be a string');
|
||||
}
|
||||
}
|
||||
|
||||
/* 5️⃣ VALIDATION */
|
||||
let parsedDto: CreateActivityInput;
|
||||
|
||||
if (!isDraft) {
|
||||
const parsed = CreateActivityDto.safeParse(activity);
|
||||
if (!parsed.success) {
|
||||
throw new ApiError(
|
||||
400,
|
||||
parsed.error.issues.map((i) => i.message).join(', ')
|
||||
);
|
||||
}
|
||||
parsedDto = parsed.data;
|
||||
} else {
|
||||
parsedDto = activity as CreateActivityInput;
|
||||
}
|
||||
|
||||
/* 6️⃣ SAVE TO DB */
|
||||
const result = await hostService.createOrUpdateActivity(
|
||||
userInfo.id,
|
||||
parsedDto,
|
||||
isDraft
|
||||
);
|
||||
|
||||
/* 7️⃣ RESPONSE */
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: isDraft
|
||||
? 'Activity saved as draft successfully'
|
||||
: 'Activity submitted successfully',
|
||||
data: result,
|
||||
}),
|
||||
};
|
||||
}
|
||||
);
|
||||
@@ -0,0 +1,61 @@
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import {
|
||||
APIGatewayProxyEvent,
|
||||
APIGatewayProxyResult,
|
||||
Context,
|
||||
} from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(
|
||||
async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context,
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Verify authentication token
|
||||
const token =
|
||||
event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(
|
||||
401,
|
||||
'This is a protected route. Please provide a valid token.',
|
||||
);
|
||||
}
|
||||
|
||||
// Verify token and get user info
|
||||
const userInfo = await verifyHostToken(token);
|
||||
|
||||
let body: any = {};
|
||||
try {
|
||||
body = event.body ? JSON.parse(event.body) : {};
|
||||
} catch (err) {
|
||||
throw new ApiError(400, 'Invalid JSON in request body');
|
||||
}
|
||||
|
||||
const { activityTypeXid, frequenciesXid } = body;
|
||||
|
||||
if (!activityTypeXid || !frequenciesXid) {
|
||||
throw new ApiError(400, 'activityType and frequency ID is required');
|
||||
}
|
||||
|
||||
// Get all host applications from service based on user role
|
||||
const createdData = await hostService.createActivityAndAllQuestionsEntry(userInfo.id, activityTypeXid, frequenciesXid);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Activity created successfully',
|
||||
data: createdData
|
||||
}),
|
||||
};
|
||||
},
|
||||
);
|
||||
@@ -0,0 +1,50 @@
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import { PrePopulateService } from '../../../../prepopulate/services/prepopulate.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
const prePopulateService = new PrePopulateService(prismaClient);
|
||||
|
||||
/**
|
||||
* Add suggestion handler for host applications
|
||||
* Allows Minglar Admin, Co_Admin, and Account Manager to add suggestions
|
||||
* Types: Setup Profile, Review Account, Add Payment Details, Agreement
|
||||
*/
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Verify authentication token
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(401, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Verify token and get user info
|
||||
await verifyHostToken(token);
|
||||
|
||||
|
||||
// Read optional search query (supports ?search= or ?q=)
|
||||
const search = event.queryStringParameters?.search || event.queryStringParameters?.q || undefined;
|
||||
|
||||
const data = await hostService.getAllActivityTypesWithInterest(search);
|
||||
const frequencies = await prePopulateService.getAllFrequencies();
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Data retrieved successfully',
|
||||
data,
|
||||
frequencies
|
||||
}),
|
||||
};
|
||||
});
|
||||
@@ -0,0 +1,47 @@
|
||||
import { verifyMinglarAdminHostToken } from '../../../../../common/middlewares/jwt/authForMinglarAdminHost';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
/**
|
||||
* Add suggestion handler for host applications
|
||||
* Allows Minglar Admin, Co_Admin, and Account Manager to add suggestions
|
||||
* Types: Setup Profile, Review Account, Add Payment Details, Agreement
|
||||
*/
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Verify authentication token
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(401, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Verify token and get user info
|
||||
await verifyMinglarAdminHostToken(token);
|
||||
|
||||
const activityXid = event.pathParameters?.activityXid
|
||||
if (!activityXid) {
|
||||
throw new ApiError(400, 'activityXid is required in path parameters');
|
||||
}
|
||||
|
||||
const data = await hostService.getAllDetailsOfActivityAndVenue(Number(activityXid));
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Data retrieved successfully',
|
||||
data,
|
||||
}),
|
||||
};
|
||||
});
|
||||
@@ -0,0 +1,57 @@
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import { paginationService } from '../../../../../common/utils/pagination/pagination.service';
|
||||
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
|
||||
/**
|
||||
* Add suggestion handler for host applications
|
||||
* Allows Minglar Admin, Co_Admin, and Account Manager to add suggestions
|
||||
* Types: Setup Profile, Review Account, Add Payment Details, Agreement
|
||||
*/
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Verify authentication token
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(401, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Verify token and get user info
|
||||
const userInfo = await verifyHostToken(token);
|
||||
|
||||
// Get pagination params from event
|
||||
const paginationParams = paginationService.getPaginationFromEvent(event);
|
||||
const paginationOptions = paginationService.parsePaginationParams(paginationParams);
|
||||
|
||||
// Read optional search query (supports ?search= or ?q=)
|
||||
const search = event.queryStringParameters?.search || event.queryStringParameters?.q || undefined;
|
||||
|
||||
const result = await hostService.getAllHostActivity(
|
||||
search ? String(search) : undefined,
|
||||
Number(userInfo.id),
|
||||
paginationOptions
|
||||
);
|
||||
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Data retrieved successfully',
|
||||
...result,
|
||||
}),
|
||||
};
|
||||
});
|
||||
@@ -0,0 +1,46 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import { verifyMinglarAdminHostToken } from '../../../../../common/middlewares/jwt/authForMinglarAdminHost';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Extract token from headers
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token']
|
||||
if (!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Authenticate user using the shared authForHost function
|
||||
await verifyMinglarAdminHostToken(token);
|
||||
|
||||
const activity_xid = event.queryStringParameters?.activity_xid
|
||||
? Number(event.queryStringParameters.activity_xid)
|
||||
: null;
|
||||
|
||||
if (!activity_xid) {
|
||||
throw new ApiError(409, "Activity ID is required")
|
||||
}
|
||||
|
||||
const result = await hostService.getAllPQQQuesAndSubmittedAns(Number(activity_xid));
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Data retrieved successfully',
|
||||
data: result,
|
||||
}),
|
||||
};
|
||||
});
|
||||
|
||||
214
src/modules/host/handlers/Activity_Hub/OnBoarding/getPQQScore.ts
Normal file
214
src/modules/host/handlers/Activity_Hub/OnBoarding/getPQQScore.ts
Normal file
@@ -0,0 +1,214 @@
|
||||
import config from '../../../../../config/config';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult } from 'aws-lambda';
|
||||
import AWS from 'aws-sdk';
|
||||
import Busboy from 'busboy';
|
||||
import crypto from 'crypto';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import { sendPQPEmailToAM } from '../../../services/sendHostResubmitEmailToAM.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
const s3 = new AWS.S3({ region: config.aws.region });
|
||||
|
||||
// Extract S3 key from URL
|
||||
function getS3KeyFromUrl(url: string): string {
|
||||
const bucketBaseUrl = `https://${config.aws.bucketName}.s3.${config.aws.region}.amazonaws.com/`;
|
||||
return url.replace(bucketBaseUrl, '');
|
||||
}
|
||||
|
||||
// Delete file from S3
|
||||
async function deleteFromS3(s3Key: string): Promise<void> {
|
||||
try {
|
||||
await s3.deleteObject({
|
||||
Bucket: config.aws.bucketName,
|
||||
Key: s3Key,
|
||||
}).promise();
|
||||
console.log(`✅ Deleted from S3: ${s3Key}`);
|
||||
} catch (err) {
|
||||
console.error(`❌ Failed to delete from S3: ${s3Key}`, err);
|
||||
}
|
||||
}
|
||||
|
||||
// Upload new file
|
||||
async function uploadToS3(buffer: Buffer, mimeType: string, originalName: string, prefix: string): Promise<string> {
|
||||
const uniqueKey = `${crypto.randomUUID()}_${originalName}`;
|
||||
const s3Key = `${prefix}/${uniqueKey}`;
|
||||
|
||||
await s3.upload({
|
||||
Bucket: config.aws.bucketName,
|
||||
Key: s3Key,
|
||||
Body: buffer,
|
||||
ContentType: mimeType,
|
||||
ACL: 'private'
|
||||
}).promise();
|
||||
|
||||
console.log(`✅ Uploaded to S3: ${s3Key}`);
|
||||
return `https://${config.aws.bucketName}.s3.${config.aws.region}.amazonaws.com/${s3Key}`;
|
||||
}
|
||||
|
||||
export const handler = safeHandler(async (event: APIGatewayProxyEvent): Promise<APIGatewayProxyResult> => {
|
||||
try {
|
||||
// AUTH
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) throw new ApiError(401, 'Missing token');
|
||||
|
||||
const user = await verifyHostToken(token);
|
||||
|
||||
// Content-Type
|
||||
const contentType = event.headers["content-type"] || event.headers["Content-Type"];
|
||||
if (!contentType?.startsWith("multipart/form-data"))
|
||||
throw new ApiError(400, "Content-Type must be multipart/form-data");
|
||||
|
||||
if (!event.isBase64Encoded) throw new ApiError(400, "Body must be base64 encoded");
|
||||
|
||||
const bodyBuffer = Buffer.from(event.body!, "base64");
|
||||
|
||||
const fields: any = {};
|
||||
const files: Array<{ buffer: Buffer; mimeType: string; fileName: string; fieldName: string }> = [];
|
||||
|
||||
// Parse multipart
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
const bb = Busboy({ headers: { 'content-type': contentType } });
|
||||
|
||||
bb.on('file', (fieldname, file, info) => {
|
||||
const { filename, mimeType } = info;
|
||||
if (!filename) return file.resume();
|
||||
|
||||
const chunks: Buffer[] = [];
|
||||
let size = 0;
|
||||
|
||||
file.on('data', chunk => {
|
||||
size += chunk.length;
|
||||
if (size > 5 * 1024 * 1024)
|
||||
return reject(new ApiError(400, `File ${filename} exceeds 5MB limit`));
|
||||
|
||||
chunks.push(chunk);
|
||||
});
|
||||
|
||||
file.on('end', () => {
|
||||
if (chunks.length > 0) {
|
||||
files.push({
|
||||
buffer: Buffer.concat(chunks),
|
||||
mimeType,
|
||||
fileName: filename,
|
||||
fieldName: fieldname
|
||||
});
|
||||
}
|
||||
});
|
||||
});
|
||||
|
||||
bb.on('field', (fieldname, val) => {
|
||||
try { fields[fieldname] = JSON.parse(val); }
|
||||
catch { fields[fieldname] = val; }
|
||||
});
|
||||
|
||||
bb.on('close', resolve);
|
||||
bb.on('error', err => reject(new ApiError(400, err.message)));
|
||||
bb.end(bodyBuffer);
|
||||
});
|
||||
|
||||
// Required fields
|
||||
const activityXid = Number(fields.activityXid);
|
||||
const pqqQuestionXid = Number(fields.pqqQuestionXid);
|
||||
const pqqAnswerXid = Number(fields.pqqAnswerXid);
|
||||
const comments = fields.comments || null;
|
||||
|
||||
if (!activityXid || !pqqQuestionXid || !pqqAnswerXid)
|
||||
throw new ApiError(400, "Missing required fields");
|
||||
|
||||
// UPSERT header
|
||||
const existingHeader = await hostService.findHeaderByCompositeKey(activityXid, pqqQuestionXid);
|
||||
let header;
|
||||
|
||||
if (existingHeader) {
|
||||
header = await hostService.updateHeader(existingHeader.id, pqqAnswerXid, comments);
|
||||
} else {
|
||||
header = await hostService.createHeader(activityXid, pqqQuestionXid, pqqAnswerXid, comments);
|
||||
}
|
||||
|
||||
// SCORE
|
||||
const score = await hostService.calculatePqqScoreForUser(activityXid);
|
||||
|
||||
// Existing supporting files
|
||||
const existingSupportingFiles = await hostService.getSupportingFilesByHeaderId(header.id);
|
||||
|
||||
// Read deletedFiles from frontend
|
||||
const deletedFiles = Array.isArray(fields.deletedFiles) ? fields.deletedFiles : [];
|
||||
|
||||
const deleteResults = [];
|
||||
const addResults = [];
|
||||
|
||||
// DELETE explicitly requested files (Case 3)
|
||||
if (deletedFiles.length > 0) {
|
||||
for (const del of deletedFiles) {
|
||||
const id = Number(del.id);
|
||||
const record = existingSupportingFiles.find(f => f.id === id);
|
||||
if (!record) continue;
|
||||
|
||||
// Delete from S3
|
||||
if (record.mediaFileName) {
|
||||
const key = getS3KeyFromUrl(record.mediaFileName);
|
||||
await deleteFromS3(key);
|
||||
}
|
||||
|
||||
// Delete from DB
|
||||
await hostService.deleteSupportingFile(record.id);
|
||||
deleteResults.push({ id: record.id, deleted: true });
|
||||
}
|
||||
}
|
||||
|
||||
// ADD new uploaded files (Case 1 + Case 3 new files)
|
||||
if (files.length > 0) {
|
||||
for (const file of files) {
|
||||
const url = await uploadToS3(
|
||||
file.buffer,
|
||||
file.mimeType,
|
||||
file.fileName,
|
||||
`ActivityOnboarding/supportings/${activityXid}`
|
||||
);
|
||||
|
||||
const newRec = await hostService.addSupportingFile(header.id, file.mimeType, url);
|
||||
addResults.push(newRec);
|
||||
}
|
||||
}
|
||||
|
||||
const getAllUpdatedQuestionResponse = await hostService.getAllPQUpdatedResponse(activityXid)
|
||||
|
||||
const details = await hostService.getSuggestionDetails(user.id);
|
||||
|
||||
await sendPQPEmailToAM(
|
||||
details.hostDetails.accountManager.emailAddress,
|
||||
details.hostDetails.accountManager.firstName,
|
||||
details.hostDetails.companyName,
|
||||
details.hostDetails.user.userRefNumber,
|
||||
)
|
||||
|
||||
// CASE 2 — NO deletion & NO new files => DO NOTHING to existing files
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: { "Content-Type": "application/json", "Access-Control-Allow-Origin": "*" },
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: existingHeader ? "PQQ answer updated successfully" : "PQQ answer submitted successfully",
|
||||
data: {
|
||||
headerId: header.id,
|
||||
activityXid,
|
||||
pqqQuestionXid,
|
||||
pqqAnswerXid,
|
||||
comments,
|
||||
score,
|
||||
getAllUpdatedQuestionResponse
|
||||
}
|
||||
})
|
||||
};
|
||||
|
||||
} catch (err: any) {
|
||||
console.error("❌ Error:", err);
|
||||
throw err;
|
||||
}
|
||||
});
|
||||
@@ -0,0 +1,46 @@
|
||||
import { verifyMinglarAdminHostToken } from '../../../../../common/middlewares/jwt/authForMinglarAdminHost';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Extract token from headers
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Verify token and get user info
|
||||
const userInfo = await verifyMinglarAdminHostToken(token);
|
||||
const userId = Number(userInfo.id);
|
||||
|
||||
const question_xid = Number(event.queryStringParameters?.question_xid);
|
||||
const activity_xid = Number(event.queryStringParameters?.activity_xid);
|
||||
|
||||
if (!question_xid || !activity_xid) {
|
||||
throw new ApiError(400, "Question and activity xid are required.")
|
||||
}
|
||||
|
||||
// Fetch user with their HostHeader stepper info
|
||||
const pqqQuestionDetails = await hostService.getPQQQuestionDetail(question_xid, activity_xid);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Stepper information retrieved successfully',
|
||||
data: pqqQuestionDetails,
|
||||
}),
|
||||
};
|
||||
});
|
||||
|
||||
@@ -0,0 +1,58 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Extract token from headers
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Verify token and get user info
|
||||
const userInfo = await verifyHostToken(token);
|
||||
const userId = Number(userInfo.id);
|
||||
|
||||
const activity_xid = event.queryStringParameters?.activity_xid
|
||||
? Number(event.queryStringParameters.activity_xid)
|
||||
: null;
|
||||
|
||||
// Validate it
|
||||
if (!activity_xid || isNaN(activity_xid)) {
|
||||
throw new ApiError(400, "Activity id is required and must be a number.");
|
||||
}
|
||||
let result = null;
|
||||
|
||||
// Fetch user with their HostHeader stepper info
|
||||
const pqqQuestionDetails = await hostService.getLatestQuestionDetailsPQQ(activity_xid);
|
||||
|
||||
if (pqqQuestionDetails) {
|
||||
result = {
|
||||
pqqQuestionXid: pqqQuestionDetails.pqqQuestionXid,
|
||||
pqqAnswerXid: pqqQuestionDetails.pqqAnswerXid || null,
|
||||
pqqSubCategoryXid: pqqQuestionDetails.pqqQuestions.pqqSubCategoryXid || null,
|
||||
categoryXid: pqqQuestionDetails.pqqQuestions.pqqSubCategories.categoryXid || null
|
||||
}
|
||||
}
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Latest information retrieved successfully',
|
||||
data: result,
|
||||
}),
|
||||
};
|
||||
});
|
||||
|
||||
@@ -0,0 +1,50 @@
|
||||
// import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
// import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
// import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
// import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
// import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
// import { HostService } from '../../../services/host.service';
|
||||
|
||||
// const hostService = new HostService(prismaClient);
|
||||
|
||||
// export const handler = safeHandler(async (
|
||||
// event: APIGatewayProxyEvent,
|
||||
// context?: Context
|
||||
// ): Promise<APIGatewayProxyResult> => {
|
||||
// const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
// if (!token) throw new ApiError(401, 'This is a protected route. Please provide a valid token.');
|
||||
|
||||
// const userInfo = await verifyHostToken(token);
|
||||
|
||||
// let body: any = {};
|
||||
// try {
|
||||
// body = event.body ? JSON.parse(event.body) : {};
|
||||
// } catch (err) {
|
||||
// throw new ApiError(400, 'Invalid JSON in request body');
|
||||
// }
|
||||
|
||||
// const { activityTypeXid, frequenciesXid } = body;
|
||||
|
||||
// if (!activityTypeXid) {
|
||||
// throw new ApiError(400, 'activityTypeXid is required');
|
||||
// }
|
||||
|
||||
// await hostService.createActivity(
|
||||
// userInfo.id,
|
||||
// Number(activityTypeXid),
|
||||
// frequenciesXid ? Number(frequenciesXid) : undefined,
|
||||
// );
|
||||
|
||||
// return {
|
||||
// statusCode: 201,
|
||||
// headers: {
|
||||
// 'Content-Type': 'application/json',
|
||||
// 'Access-Control-Allow-Origin': '*',
|
||||
// },
|
||||
// body: JSON.stringify({
|
||||
// success: true,
|
||||
// message: 'Activity created successfully',
|
||||
// data: null,
|
||||
// }),
|
||||
// };
|
||||
// });
|
||||
@@ -0,0 +1,319 @@
|
||||
import config from '../../../../../config/config';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult } from 'aws-lambda';
|
||||
import AWS from 'aws-sdk';
|
||||
import Busboy from 'busboy';
|
||||
import crypto from 'crypto';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
const s3 = new AWS.S3({ region: config.aws.region });
|
||||
|
||||
function parseMultipartFieldValue(val: string) {
|
||||
if (val === '' || val === 'null' || val === 'undefined') return null;
|
||||
|
||||
const cleaned = val.trim();
|
||||
const looksLikeJson =
|
||||
(cleaned.startsWith('{') && cleaned.endsWith('}')) ||
|
||||
(cleaned.startsWith('[') && cleaned.endsWith(']')) ||
|
||||
(cleaned.startsWith('"') && cleaned.endsWith('"'));
|
||||
|
||||
if (!looksLikeJson) return val;
|
||||
|
||||
try {
|
||||
return JSON.parse(cleaned);
|
||||
} catch {
|
||||
return val;
|
||||
}
|
||||
}
|
||||
|
||||
function normalizeComments(comments: unknown): string | null {
|
||||
if (comments === null || comments === undefined || comments === '') return null;
|
||||
|
||||
const value = String(comments).trim();
|
||||
if (!value) return null;
|
||||
|
||||
if (
|
||||
(value.startsWith('"') && value.endsWith('"')) ||
|
||||
(value.startsWith("'") && value.endsWith("'"))
|
||||
) {
|
||||
return value.slice(1, -1);
|
||||
}
|
||||
|
||||
return value;
|
||||
}
|
||||
|
||||
// Function to extract S3 key from URL
|
||||
function getS3KeyFromUrl(url: string): string {
|
||||
const bucketBaseUrl = `https://${config.aws.bucketName}.s3.${config.aws.region}.amazonaws.com/`;
|
||||
return url.replace(bucketBaseUrl, '');
|
||||
}
|
||||
|
||||
// Function to delete file from S3
|
||||
async function deleteFromS3(s3Key: string): Promise<void> {
|
||||
try {
|
||||
await s3.deleteObject({
|
||||
Bucket: config.aws.bucketName,
|
||||
Key: s3Key,
|
||||
}).promise();
|
||||
console.log(`✅ File deleted from S3: ${s3Key}`);
|
||||
} catch (error) {
|
||||
console.error(`❌ Error deleting file from S3: ${s3Key}`, error);
|
||||
// continue — we don't want S3 deletion failure to crash the whole request
|
||||
}
|
||||
}
|
||||
|
||||
async function uploadToS3(buffer: Buffer, mimeType: string, originalName: string, prefix: string, existingUrl?: string): Promise<string> {
|
||||
// We intentionally do NOT reuse old key. If existingUrl is provided we delete old file and create a new random key.
|
||||
if (existingUrl) {
|
||||
try {
|
||||
const oldKey = getS3KeyFromUrl(existingUrl);
|
||||
await deleteFromS3(oldKey);
|
||||
} catch (err) {
|
||||
console.warn('Warning deleting existingUrl before upload', err);
|
||||
}
|
||||
}
|
||||
|
||||
const uniqueKey = `${crypto.randomUUID()}_${originalName}`;
|
||||
const s3Key = `${prefix}/${uniqueKey}`;
|
||||
|
||||
await s3.upload({
|
||||
Bucket: config.aws.bucketName,
|
||||
Key: s3Key,
|
||||
Body: buffer,
|
||||
ContentType: mimeType,
|
||||
ACL: 'private'
|
||||
}).promise();
|
||||
|
||||
console.log(`✅ File uploaded to S3: ${s3Key}`);
|
||||
return `https://${config.aws.bucketName}.s3.${config.aws.region}.amazonaws.com/${s3Key}`;
|
||||
}
|
||||
|
||||
export const handler = safeHandler(async (event: APIGatewayProxyEvent): Promise<APIGatewayProxyResult> => {
|
||||
try {
|
||||
// 1) Auth
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) throw new ApiError(401, 'Missing token.');
|
||||
const user = await verifyHostToken(token);
|
||||
|
||||
// 2) Content-Type check
|
||||
const contentType = event.headers["content-type"] || event.headers["Content-Type"];
|
||||
if (!contentType?.includes("multipart/form-data"))
|
||||
throw new ApiError(400, "Content-Type must be multipart/form-data");
|
||||
|
||||
// 3) Body decoding
|
||||
const bodyBuffer = event.isBase64Encoded
|
||||
? Buffer.from(event.body!, "base64")
|
||||
: Buffer.from(event.body!, "binary");
|
||||
|
||||
const fields: any = {};
|
||||
const files: Array<{ buffer: Buffer; mimeType: string; fileName: string; fieldName: string }> = [];
|
||||
|
||||
// 4) Parse multipart data
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
const bb = Busboy({ headers: { 'content-type': contentType } });
|
||||
|
||||
bb.on('file', (fieldname, file, info) => {
|
||||
const { filename, mimeType } = info;
|
||||
|
||||
if (!filename) {
|
||||
file.resume();
|
||||
return;
|
||||
}
|
||||
|
||||
const chunks: Buffer[] = [];
|
||||
let size = 0;
|
||||
const MAX_SIZE = 5 * 1024 * 1024;
|
||||
|
||||
file.on("data", (chunk) => {
|
||||
size += chunk.length;
|
||||
if (size > MAX_SIZE) {
|
||||
file.destroy(new Error(`File ${filename} exceeds 5MB limit.`));
|
||||
return;
|
||||
}
|
||||
chunks.push(chunk);
|
||||
});
|
||||
|
||||
file.on("end", () => {
|
||||
if (chunks.length > 0) {
|
||||
files.push({
|
||||
buffer: Buffer.concat(chunks),
|
||||
mimeType,
|
||||
fileName: filename,
|
||||
fieldName: fieldname,
|
||||
});
|
||||
}
|
||||
});
|
||||
|
||||
file.on("error", (err) =>
|
||||
reject(new ApiError(400, `File upload error: ${err.message}`))
|
||||
);
|
||||
});
|
||||
|
||||
bb.on("field", (fieldname, val) => {
|
||||
console.log(`FIELD RAW: ${fieldname} =`, val);
|
||||
fields[fieldname] = parseMultipartFieldValue(val);
|
||||
});
|
||||
|
||||
bb.on("close", () => resolve());
|
||||
bb.on("error", (err) =>
|
||||
reject(new ApiError(400, `Multipart parsing error: ${err.message}`))
|
||||
);
|
||||
|
||||
// IMPORTANT FIX for HTTP API
|
||||
bb.write(bodyBuffer);
|
||||
bb.end();
|
||||
});
|
||||
|
||||
// 5) Extract required fields
|
||||
const activityXid = Number(fields.activityXid);
|
||||
const pqqQuestionXid = Number(fields.pqqQuestionXid);
|
||||
const pqqAnswerXid = Number(fields.pqqAnswerXid);
|
||||
const comments = normalizeComments(fields.comments);
|
||||
|
||||
if (!activityXid || isNaN(activityXid)) throw new ApiError(400, "Please provide a valid activity");
|
||||
if (!pqqQuestionXid || isNaN(pqqQuestionXid)) throw new ApiError(400, "Please select a valid question");
|
||||
if (!pqqAnswerXid || isNaN(pqqAnswerXid)) throw new ApiError(400, "Please select a valid answer");
|
||||
|
||||
// 6) UPSERT header
|
||||
const existingHeader = await hostService.findHeaderByCompositeKey(
|
||||
activityXid,
|
||||
pqqQuestionXid,
|
||||
);
|
||||
|
||||
let header;
|
||||
if (existingHeader) {
|
||||
console.log("🔄 Updating existing PQQ header");
|
||||
header = await hostService.updateHeader(
|
||||
existingHeader.id,
|
||||
pqqAnswerXid,
|
||||
comments
|
||||
);
|
||||
} else {
|
||||
console.log("🆕 Creating new PQQ header");
|
||||
header = await hostService.createHeader(
|
||||
activityXid,
|
||||
pqqQuestionXid,
|
||||
pqqAnswerXid,
|
||||
comments
|
||||
);
|
||||
}
|
||||
|
||||
// 7) Get existing supporting files
|
||||
const existingSupportingFiles = await hostService.getSupportingFilesByHeaderId(header.id);
|
||||
console.log(`📁 Found ${existingSupportingFiles.length} existing supporting files`);
|
||||
|
||||
// 8) Parse incoming control fields
|
||||
// fields.deletedFiles should be array like [{ id: number, url: string }, ...] or null
|
||||
const deletedFiles: Array<{ id: number; url?: string }> = Array.isArray(fields.deletedFiles) ? fields.deletedFiles : [];
|
||||
// fields.existingFiles can be an array of urls; we accept it but do not require it
|
||||
const existingFilesFromFront: string[] = Array.isArray(fields.existingFiles) ? fields.existingFiles : [];
|
||||
|
||||
// Prepare response trackers
|
||||
const deletedResults: Array<{ id: number; success: boolean; reason?: string }> = [];
|
||||
const addedResults: Array<any> = [];
|
||||
|
||||
// 9) Handle explicit deletions (ONLY delete ids provided in deletedFiles)
|
||||
if (deletedFiles.length > 0) {
|
||||
console.log(`🗑️ Processing ${deletedFiles.length} explicit deletions`);
|
||||
// Build a map of existing supporting files by id for quick lookup
|
||||
const existingById = new Map<number, any>();
|
||||
for (const f of existingSupportingFiles) {
|
||||
existingById.set(f.id, f);
|
||||
}
|
||||
|
||||
for (const del of deletedFiles) {
|
||||
const id = Number(del.id);
|
||||
if (!id || !existingById.has(id)) {
|
||||
deletedResults.push({ id, success: false, reason: 'Not found or invalid id' });
|
||||
continue;
|
||||
}
|
||||
|
||||
const record = existingById.get(id);
|
||||
try {
|
||||
// delete from s3
|
||||
if (record.mediaFileName) {
|
||||
const s3Key = getS3KeyFromUrl(record.mediaFileName);
|
||||
await deleteFromS3(s3Key);
|
||||
}
|
||||
|
||||
// delete DB record
|
||||
await hostService.deleteSupportingFile(record.id);
|
||||
|
||||
deletedResults.push({ id: record.id, success: true });
|
||||
console.log(`🗑️ Deleted supporting file record ${record.id}`);
|
||||
} catch (err: any) {
|
||||
console.error(`❌ Failed to delete supporting file id ${id}`, err);
|
||||
deletedResults.push({ id, success: false, reason: err.message || 'delete failed' });
|
||||
}
|
||||
}
|
||||
} else {
|
||||
console.log('ℹ️ No explicit deletions requested (deletedFiles empty)');
|
||||
}
|
||||
|
||||
// 10) Handle new uploaded files (these are ALWAYS added as new rows)
|
||||
if (files.length > 0) {
|
||||
console.log(`📤 Processing ${files.length} uploaded new file(s)`);
|
||||
for (const file of files) {
|
||||
try {
|
||||
const url = await uploadToS3(
|
||||
file.buffer,
|
||||
file.mimeType,
|
||||
file.fileName,
|
||||
`ActivityOnboarding/supportings/${activityXid}`
|
||||
);
|
||||
|
||||
// create DB record
|
||||
const supporting = await hostService.addSupportingFile(
|
||||
header.id,
|
||||
file.mimeType,
|
||||
url
|
||||
);
|
||||
|
||||
addedResults.push(supporting);
|
||||
console.log(`🆕 Created new supporting file record: ${supporting.id}`);
|
||||
} catch (err: any) {
|
||||
console.error('❌ Error uploading/creating supporting file', err);
|
||||
// push failure result but continue processing other files
|
||||
addedResults.push({ success: false, reason: err.message || 'upload/create failed' });
|
||||
}
|
||||
}
|
||||
} else {
|
||||
console.log('📭 No new files uploaded in request');
|
||||
}
|
||||
|
||||
// NOTE: We DO NOT delete or modify existing supporting files that were not listed in deletedFiles.
|
||||
// This satisfies your Case 2: "if no files are provided, do not touch existing supporting files".
|
||||
|
||||
const allPQPQuestionAnswerResponse = await hostService.getAllPQUpdatedResponse(activityXid)
|
||||
|
||||
// 11) Compose response
|
||||
const responseMessage = existingHeader ? "PQQ answer updated successfully" : "PQQ answer submitted successfully";
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
"Content-Type": "application/json",
|
||||
"Access-Control-Allow-Origin": "*"
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: responseMessage,
|
||||
data: {
|
||||
responseOfUpdatedData: allPQPQuestionAnswerResponse,
|
||||
operation: existingHeader ? 'updated' : 'created',
|
||||
// summary label for UI convenience:
|
||||
fileOperation: (deletedResults.length > 0 || addedResults.length > 0) ? 'modified' : 'unchanged'
|
||||
}
|
||||
})
|
||||
};
|
||||
|
||||
} catch (error: any) {
|
||||
console.error("❌ Error in submitPqqAnswer:", error);
|
||||
throw error;
|
||||
}
|
||||
});
|
||||
@@ -0,0 +1,40 @@
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const pqqService = new HostService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(async (event: APIGatewayProxyEvent): Promise<APIGatewayProxyResult> => {
|
||||
try {
|
||||
// 1) Auth
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) throw new ApiError(401, 'Missing token.');
|
||||
const user = await verifyHostToken(token);
|
||||
|
||||
const activity_xid = event.queryStringParameters?.activity_xid
|
||||
? Number(event.queryStringParameters.activity_xid)
|
||||
: null;
|
||||
|
||||
await pqqService.submitpqqforreview(Number(activity_xid), Number(user.id))
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
"Content-Type": "application/json",
|
||||
"Access-Control-Allow-Origin": "*"
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: "Your PQQ has been submitted for review.",
|
||||
data: null
|
||||
})
|
||||
};
|
||||
|
||||
} catch (error: any) {
|
||||
console.error("❌ Error in submitPqqAnswer:", error);
|
||||
throw error;
|
||||
}
|
||||
});
|
||||
@@ -0,0 +1,298 @@
|
||||
import config from '../../../../../config/config';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult } from 'aws-lambda';
|
||||
import AWS from 'aws-sdk';
|
||||
import Busboy from 'busboy';
|
||||
import crypto from 'crypto';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const pqqService = new HostService(prismaClient);
|
||||
|
||||
const s3 = new AWS.S3({ region: config.aws.region });
|
||||
|
||||
// Function to extract S3 key from URL
|
||||
function getS3KeyFromUrl(url: string): string {
|
||||
const bucketBaseUrl = `https://${config.aws.bucketName}.s3.${config.aws.region}.amazonaws.com/`;
|
||||
return url.replace(bucketBaseUrl, '');
|
||||
}
|
||||
|
||||
// Function to delete file from S3
|
||||
async function deleteFromS3(s3Key: string): Promise<void> {
|
||||
try {
|
||||
await s3.deleteObject({
|
||||
Bucket: config.aws.bucketName,
|
||||
Key: s3Key,
|
||||
}).promise();
|
||||
console.log(`✅ File deleted from S3: ${s3Key}`);
|
||||
} catch (error) {
|
||||
console.error(`❌ Error deleting file from S3: ${s3Key}`, error);
|
||||
// continue — we don't want S3 deletion failure to crash the whole request
|
||||
}
|
||||
}
|
||||
|
||||
async function uploadToS3(buffer: Buffer, mimeType: string, originalName: string, prefix: string, existingUrl?: string): Promise<string> {
|
||||
// We intentionally do NOT reuse old key. If existingUrl is provided we delete old file and create a new random key.
|
||||
if (existingUrl) {
|
||||
try {
|
||||
const oldKey = getS3KeyFromUrl(existingUrl);
|
||||
await deleteFromS3(oldKey);
|
||||
} catch (err) {
|
||||
console.warn('Warning deleting existingUrl before upload', err);
|
||||
}
|
||||
}
|
||||
|
||||
const uniqueKey = `${crypto.randomUUID()}_${originalName}`;
|
||||
const s3Key = `${prefix}/${uniqueKey}`;
|
||||
|
||||
await s3.upload({
|
||||
Bucket: config.aws.bucketName,
|
||||
Key: s3Key,
|
||||
Body: buffer,
|
||||
ContentType: mimeType,
|
||||
ACL: 'private'
|
||||
}).promise();
|
||||
|
||||
console.log(`✅ File uploaded to S3: ${s3Key}`);
|
||||
return `https://${config.aws.bucketName}.s3.${config.aws.region}.amazonaws.com/${s3Key}`;
|
||||
}
|
||||
|
||||
export const handler = safeHandler(async (event: APIGatewayProxyEvent): Promise<APIGatewayProxyResult> => {
|
||||
try {
|
||||
// 1) Auth
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) throw new ApiError(401, 'Missing token.');
|
||||
const user = await verifyHostToken(token);
|
||||
|
||||
// 2) Content-Type check
|
||||
const contentType = event.headers["content-type"] || event.headers["Content-Type"];
|
||||
if (!contentType?.includes("multipart/form-data"))
|
||||
throw new ApiError(400, "Content-Type must be multipart/form-data");
|
||||
|
||||
// 3) Body decoding
|
||||
const bodyBuffer = event.isBase64Encoded
|
||||
? Buffer.from(event.body!, "base64")
|
||||
: Buffer.from(event.body!, "binary");
|
||||
|
||||
const fields: any = {};
|
||||
const files: Array<{ buffer: Buffer; mimeType: string; fileName: string; fieldName: string }> = [];
|
||||
|
||||
// 4) Parse multipart data
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
const bb = Busboy({ headers: { 'content-type': contentType } });
|
||||
|
||||
bb.on('file', (fieldname, file, info) => {
|
||||
const { filename, mimeType } = info;
|
||||
|
||||
if (!filename) {
|
||||
file.resume();
|
||||
return;
|
||||
}
|
||||
|
||||
const chunks: Buffer[] = [];
|
||||
let size = 0;
|
||||
const MAX_SIZE = 5 * 1024 * 1024;
|
||||
|
||||
file.on("data", (chunk) => {
|
||||
size += chunk.length;
|
||||
if (size > MAX_SIZE) {
|
||||
file.destroy(new Error(`File ${filename} exceeds 5MB limit.`));
|
||||
return;
|
||||
}
|
||||
chunks.push(chunk);
|
||||
});
|
||||
|
||||
file.on("end", () => {
|
||||
if (chunks.length > 0) {
|
||||
files.push({
|
||||
buffer: Buffer.concat(chunks),
|
||||
mimeType,
|
||||
fileName: filename,
|
||||
fieldName: fieldname,
|
||||
});
|
||||
}
|
||||
});
|
||||
|
||||
file.on("error", (err) =>
|
||||
reject(new ApiError(400, `File upload error: ${err.message}`))
|
||||
);
|
||||
});
|
||||
|
||||
bb.on("field", (fieldname, val) => {
|
||||
if (val === '' || val === 'null' || val === 'undefined') fields[fieldname] = null;
|
||||
else {
|
||||
try {
|
||||
fields[fieldname] = JSON.parse(val);
|
||||
} catch {
|
||||
fields[fieldname] = val;
|
||||
}
|
||||
}
|
||||
});
|
||||
|
||||
bb.on("close", () => resolve());
|
||||
bb.on("error", (err) =>
|
||||
reject(new ApiError(400, `Multipart parsing error: ${err.message}`))
|
||||
);
|
||||
|
||||
// IMPORTANT FIX for HTTP API
|
||||
bb.write(bodyBuffer);
|
||||
bb.end();
|
||||
});
|
||||
|
||||
// 5) Extract required fields
|
||||
const activityXid = Number(fields.activityXid);
|
||||
const pqqQuestionXid = Number(fields.pqqQuestionXid);
|
||||
const pqqAnswerXid = Number(fields.pqqAnswerXid);
|
||||
const comments = fields.comments || null;
|
||||
|
||||
if (!activityXid || isNaN(activityXid)) throw new ApiError(400, "Please provide a valid activity");
|
||||
if (!pqqQuestionXid || isNaN(pqqQuestionXid)) throw new ApiError(400, "Please select a valid question");
|
||||
if (!pqqAnswerXid || isNaN(pqqAnswerXid)) throw new ApiError(400, "Please select a valid answer");
|
||||
|
||||
// 6) UPSERT header
|
||||
const existingHeader = await pqqService.findHeaderByCompositeKey(
|
||||
activityXid,
|
||||
pqqQuestionXid,
|
||||
);
|
||||
|
||||
let header;
|
||||
if (existingHeader) {
|
||||
console.log("🔄 Updating existing PQQ header");
|
||||
header = await pqqService.updateHeader(
|
||||
existingHeader.id,
|
||||
pqqAnswerXid,
|
||||
comments
|
||||
);
|
||||
} else {
|
||||
console.log("🆕 Creating new PQQ header");
|
||||
header = await pqqService.createHeader(
|
||||
activityXid,
|
||||
pqqQuestionXid,
|
||||
pqqAnswerXid,
|
||||
comments
|
||||
);
|
||||
}
|
||||
|
||||
// 7) Get existing supporting files
|
||||
const existingSupportingFiles = await pqqService.getSupportingFilesByHeaderId(header.id);
|
||||
console.log(`📁 Found ${existingSupportingFiles.length} existing supporting files`);
|
||||
|
||||
// 8) Parse incoming control fields
|
||||
// fields.deletedFiles should be array like [{ id: number, url: string }, ...] or null
|
||||
const deletedFiles: Array<{ id: number; url?: string }> = Array.isArray(fields.deletedFiles) ? fields.deletedFiles : [];
|
||||
// fields.existingFiles can be an array of urls; we accept it but do not require it
|
||||
const existingFilesFromFront: string[] = Array.isArray(fields.existingFiles) ? fields.existingFiles : [];
|
||||
|
||||
// Prepare response trackers
|
||||
const deletedResults: Array<{ id: number; success: boolean; reason?: string }> = [];
|
||||
const addedResults: Array<any> = [];
|
||||
|
||||
// 9) Handle explicit deletions (ONLY delete ids provided in deletedFiles)
|
||||
if (deletedFiles.length > 0) {
|
||||
console.log(`🗑️ Processing ${deletedFiles.length} explicit deletions`);
|
||||
// Build a map of existing supporting files by id for quick lookup
|
||||
const existingById = new Map<number, any>();
|
||||
for (const f of existingSupportingFiles) {
|
||||
existingById.set(f.id, f);
|
||||
}
|
||||
|
||||
for (const del of deletedFiles) {
|
||||
const id = Number(del.id);
|
||||
if (!id || !existingById.has(id)) {
|
||||
deletedResults.push({ id, success: false, reason: 'Not found or invalid id' });
|
||||
continue;
|
||||
}
|
||||
|
||||
const record = existingById.get(id);
|
||||
try {
|
||||
// delete from s3
|
||||
if (record.mediaFileName) {
|
||||
const s3Key = getS3KeyFromUrl(record.mediaFileName);
|
||||
await deleteFromS3(s3Key);
|
||||
}
|
||||
|
||||
// delete DB record
|
||||
await pqqService.deleteSupportingFile(record.id);
|
||||
|
||||
deletedResults.push({ id: record.id, success: true });
|
||||
console.log(`🗑️ Deleted supporting file record ${record.id}`);
|
||||
} catch (err: any) {
|
||||
console.error(`❌ Failed to delete supporting file id ${id}`, err);
|
||||
deletedResults.push({ id, success: false, reason: err.message || 'delete failed' });
|
||||
}
|
||||
}
|
||||
} else {
|
||||
console.log('ℹ️ No explicit deletions requested (deletedFiles empty)');
|
||||
}
|
||||
|
||||
// 10) Handle new uploaded files (these are ALWAYS added as new rows)
|
||||
if (files.length > 0) {
|
||||
console.log(`📤 Processing ${files.length} uploaded new file(s)`);
|
||||
for (const file of files) {
|
||||
try {
|
||||
const url = await uploadToS3(
|
||||
file.buffer,
|
||||
file.mimeType,
|
||||
file.fileName,
|
||||
`ActivityOnboarding/supportings/${activityXid}`
|
||||
);
|
||||
|
||||
// create DB record
|
||||
const supporting = await pqqService.addSupportingFile(
|
||||
header.id,
|
||||
file.mimeType,
|
||||
url
|
||||
);
|
||||
|
||||
addedResults.push(supporting);
|
||||
console.log(`🆕 Created new supporting file record: ${supporting.id}`);
|
||||
} catch (err: any) {
|
||||
console.error('❌ Error uploading/creating supporting file', err);
|
||||
// push failure result but continue processing other files
|
||||
addedResults.push({ success: false, reason: err.message || 'upload/create failed' });
|
||||
}
|
||||
}
|
||||
} else {
|
||||
console.log('📭 No new files uploaded in request');
|
||||
}
|
||||
|
||||
// NOTE: We DO NOT delete or modify existing supporting files that were not listed in deletedFiles.
|
||||
// This satisfies your Case 2: "if no files are provided, do not touch existing supporting files".
|
||||
|
||||
// 11) Compose response
|
||||
const responseMessage = existingHeader ? "PQQ answer updated successfully" : "PQQ answer submitted successfully";
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
"Content-Type": "application/json",
|
||||
"Access-Control-Allow-Origin": "*"
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: responseMessage,
|
||||
data: {
|
||||
headerId: header.id,
|
||||
activityXid,
|
||||
pqqQuestionXid,
|
||||
pqqAnswerXid,
|
||||
comments,
|
||||
files: {
|
||||
added: addedResults,
|
||||
deleted: deletedResults,
|
||||
existingKeptCount: (existingSupportingFiles.length - deletedResults.filter(d => d.success).length)
|
||||
},
|
||||
operation: existingHeader ? 'updated' : 'created',
|
||||
// summary label for UI convenience:
|
||||
fileOperation: (deletedResults.length > 0 || addedResults.length > 0) ? 'modified' : 'unchanged'
|
||||
}
|
||||
})
|
||||
};
|
||||
|
||||
} catch (error: any) {
|
||||
console.error("❌ Error in submitPqqAnswer:", error);
|
||||
throw error;
|
||||
}
|
||||
});
|
||||
@@ -0,0 +1,50 @@
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) throw new ApiError(401, 'This is a protected route. Please provide a valid token.');
|
||||
|
||||
const userInfo = await verifyHostToken(token);
|
||||
|
||||
let body: any = {};
|
||||
try {
|
||||
body = event.body ? JSON.parse(event.body) : {};
|
||||
} catch (err) {
|
||||
throw new ApiError(400, 'Invalid JSON in request body');
|
||||
}
|
||||
|
||||
const { activityPqqHeaderXid, activityPQQSuggestionId } = body;
|
||||
|
||||
if (!activityPqqHeaderXid) {
|
||||
throw new ApiError(400, 'activityPqqHeaderXid is required');
|
||||
}
|
||||
|
||||
await hostService.markPQQSuggestionReviewed(
|
||||
userInfo.id,
|
||||
Number(activityPqqHeaderXid),
|
||||
Number(activityPQQSuggestionId)
|
||||
);
|
||||
|
||||
return {
|
||||
statusCode: 201,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Suggestion reviewed successfully',
|
||||
data: null,
|
||||
}),
|
||||
};
|
||||
});
|
||||
100
src/modules/host/handlers/Activity_Hub/Scheduling/cancelSlot.ts
Normal file
100
src/modules/host/handlers/Activity_Hub/Scheduling/cancelSlot.ts
Normal file
@@ -0,0 +1,100 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { SchedulingService } from '../../../services/activityScheduling.service';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const schedulingService = new SchedulingService(prismaClient);
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Extract token from headers
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token']
|
||||
if (!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Authenticate user using the shared authForHost function
|
||||
const userInfo = await verifyHostToken(token);
|
||||
const hostId = userInfo.id;
|
||||
|
||||
if (Number.isNaN(hostId)) {
|
||||
throw new ApiError(400, 'Host id must be a number');
|
||||
}
|
||||
|
||||
const host = await hostService.getHostIdByUserXid(hostId);
|
||||
if (!host) {
|
||||
throw new ApiError(404, 'Host not found');
|
||||
}
|
||||
|
||||
let body: {
|
||||
activityXid: number;
|
||||
venueXid: number;
|
||||
cancellations: {
|
||||
scheduleHeaderXid: number;
|
||||
occurenceDate: string;
|
||||
startTime: string;
|
||||
endTime: string;
|
||||
cancellationReason: string
|
||||
}[]
|
||||
};
|
||||
|
||||
try {
|
||||
body = event.body ? JSON.parse(event.body) : {};
|
||||
} catch {
|
||||
throw new ApiError(400, 'Invalid JSON payload');
|
||||
}
|
||||
|
||||
if (!body.activityXid || !body.venueXid || !Array.isArray(body.cancellations) || body.cancellations.length === 0) {
|
||||
throw new ApiError(400, 'Missing required fields');
|
||||
}
|
||||
|
||||
const activity = await schedulingService.getActivityByXid(body.activityXid);
|
||||
if (!activity) {
|
||||
throw new ApiError(404, "Activity not found");
|
||||
}
|
||||
|
||||
const venueExists = await schedulingService.getVenueFromVenueXid(
|
||||
body.venueXid,
|
||||
body.activityXid
|
||||
);
|
||||
|
||||
if (!venueExists) {
|
||||
throw new ApiError(
|
||||
404,
|
||||
`Venue not found for this activity`
|
||||
)
|
||||
}
|
||||
|
||||
|
||||
await schedulingService.cancelMultipleSlotsForActivity(
|
||||
body.cancellations.map((item: any) => ({
|
||||
scheduleHeaderXid: Number(item.scheduleHeaderXid),
|
||||
occurenceDate: item.occurenceDate,
|
||||
startTime: item.startTime,
|
||||
endTime: item.endTime,
|
||||
cancellationReason: item.cancellationReason
|
||||
}))
|
||||
);
|
||||
|
||||
|
||||
const result = await schedulingService.getVenueDurationByAct(Number(body.activityXid), Number(hostId));
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Slot blocked successfully',
|
||||
data: result
|
||||
}),
|
||||
};
|
||||
});
|
||||
@@ -0,0 +1,89 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { SchedulingService } from '../../../services/activityScheduling.service';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { scheduleActivity } from '../../../../../common/utils/validation/host/createSchedulingOfAct.validation';
|
||||
import { z } from 'zod';
|
||||
|
||||
const schedulingService = new SchedulingService(prismaClient);
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Extract token from headers
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token']
|
||||
if (!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Authenticate user using the shared authForHost function
|
||||
const userInfo = await verifyHostToken(token);
|
||||
const hostId = userInfo.id;
|
||||
|
||||
if (Number.isNaN(hostId)) {
|
||||
throw new ApiError(400, 'Host id must be a number');
|
||||
}
|
||||
|
||||
const host = await hostService.getHostIdByUserXid(hostId);
|
||||
if (!host) {
|
||||
throw new ApiError(404, 'Host not found');
|
||||
}
|
||||
|
||||
let body: unknown;
|
||||
try {
|
||||
body = event.body ? JSON.parse(event.body) : {};
|
||||
} catch {
|
||||
throw new ApiError(400, 'Invalid JSON payload');
|
||||
}
|
||||
|
||||
// ✅ Validate payload using Zod
|
||||
|
||||
const parsed = scheduleActivity.safeParse(body);
|
||||
|
||||
if (!parsed.success) {
|
||||
const msg = parsed.error.issues
|
||||
.map(e => e.message)
|
||||
.join(', ');
|
||||
throw new ApiError(400, `Validation failed: ${msg}`);
|
||||
}
|
||||
|
||||
const activity = await schedulingService.getActivityByXid(parsed.data.activityXid);
|
||||
if (!activity) {
|
||||
throw new ApiError(404, "Activity not found");
|
||||
}
|
||||
|
||||
if (parsed.data.venues && parsed.data.venues.length > 0) {
|
||||
for (const venue of parsed.data.venues) {
|
||||
const venueExists = await schedulingService.getVenueFromVenueXid(
|
||||
venue.venueXid,
|
||||
parsed.data.activityXid
|
||||
);
|
||||
|
||||
if (!venueExists) {
|
||||
throw new ApiError(
|
||||
404,
|
||||
`Venue with xid ${venue.venueXid} not found for this activity`
|
||||
);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
await schedulingService.addSchedulingForActivity(parsed.data);
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Scheduling details updated successfully',
|
||||
}),
|
||||
};
|
||||
});
|
||||
@@ -0,0 +1,64 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { verifyMinglarAdminHostToken } from '../../../../../common/middlewares/jwt/authForMinglarAdminHost';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { SchedulingService } from '../../../services/activityScheduling.service';
|
||||
import { ACTIVITY_INTERNAL_STATUS } from '../../../../../common/utils/constants/host.constant';
|
||||
|
||||
const schedulingService = new SchedulingService(prismaClient);
|
||||
|
||||
/**
|
||||
* GET /activities
|
||||
* Query Parameters:
|
||||
* - status: Listed | Unlisted | Not_Listed (optional - if not provided, returns all)
|
||||
* - hostId: ID of host (required from token)
|
||||
*
|
||||
* Returns activities based on status filter
|
||||
*/
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Get and verify token
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
const userInfo = await verifyMinglarAdminHostToken(token);
|
||||
const userId = Number(userInfo.id);
|
||||
|
||||
// Get status filter from query parameters
|
||||
const status = event.queryStringParameters?.status as string | undefined;
|
||||
|
||||
const hostId = await schedulingService.getHostIdByUserId(userId);
|
||||
|
||||
// Validate status if provided
|
||||
const validStatuses = [ACTIVITY_INTERNAL_STATUS.ACTIVITY_APPROVED, ACTIVITY_INTERNAL_STATUS.ACTIVITY_UNLISTED, ACTIVITY_INTERNAL_STATUS.ACTIVITY_LISTED];
|
||||
if (status && !validStatuses.includes(status)) {
|
||||
throw new ApiError(400, `Invalid status. Must be one of: ${validStatuses.join(', ')}`);
|
||||
}
|
||||
|
||||
// Get activities from service
|
||||
const activities = await schedulingService.getActivitiesByStatus(hostId, status);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Activities retrieved successfully',
|
||||
data: {
|
||||
total: activities.length,
|
||||
activities: activities,
|
||||
filter: {
|
||||
status: status || 'All',
|
||||
},
|
||||
},
|
||||
}),
|
||||
};
|
||||
});
|
||||
@@ -0,0 +1,52 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { SchedulingService } from '../../../services/activityScheduling.service';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
|
||||
const schedulingService = new SchedulingService(prismaClient);
|
||||
|
||||
/**
|
||||
* GET /activities
|
||||
* Query Parameters:
|
||||
* - status: Listed | Unlisted | Not_Listed (optional - if not provided, returns all)
|
||||
* - hostId: ID of host (required from token)
|
||||
*
|
||||
* Returns activities based on status filter
|
||||
*/
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Get and verify token
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
const userInfo = await verifyHostToken(token);
|
||||
const userId = Number(userInfo.id);
|
||||
|
||||
const activityXid = event.pathParameters?.activityXid
|
||||
if (!activityXid) {
|
||||
throw new ApiError(400, 'activityXid is required in path parameters');
|
||||
}
|
||||
|
||||
const hostId = await schedulingService.getHostIdByUserId(userId);
|
||||
|
||||
const result = await schedulingService.getVenueDurationByAct(Number(activityXid), Number(hostId));
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Details retrieved successfully',
|
||||
data: result,
|
||||
}),
|
||||
};
|
||||
});
|
||||
@@ -0,0 +1,103 @@
|
||||
import {
|
||||
APIGatewayProxyEvent,
|
||||
APIGatewayProxyResult,
|
||||
Context,
|
||||
} from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { SchedulingService } from '../../../services/activityScheduling.service';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const schedulingService = new SchedulingService(prismaClient);
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(
|
||||
async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context,
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Extract token from headers
|
||||
const token =
|
||||
event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(
|
||||
400,
|
||||
'This is a protected route. Please provide a valid token.',
|
||||
);
|
||||
}
|
||||
|
||||
// Authenticate user using the shared authForHost function
|
||||
const userInfo = await verifyHostToken(token);
|
||||
const hostId = userInfo.id;
|
||||
|
||||
if (Number.isNaN(hostId)) {
|
||||
throw new ApiError(400, 'Host id must be a number');
|
||||
}
|
||||
|
||||
const host = await hostService.getHostIdByUserXid(hostId);
|
||||
if (!host) {
|
||||
throw new ApiError(404, 'Host not found');
|
||||
}
|
||||
|
||||
let body: {
|
||||
activityXid: number;
|
||||
venueXid: number;
|
||||
cancellations: { cancellationXid: number; }[];
|
||||
};
|
||||
|
||||
try {
|
||||
body = event.body ? JSON.parse(event.body) : {};
|
||||
} catch {
|
||||
throw new ApiError(400, 'Invalid JSON payload');
|
||||
}
|
||||
|
||||
if (
|
||||
!body.activityXid ||
|
||||
!body.venueXid ||
|
||||
!Array.isArray(body.cancellations) ||
|
||||
body.cancellations.length === 0
|
||||
) {
|
||||
throw new ApiError(400, 'Missing required fields');
|
||||
}
|
||||
|
||||
const activity = await schedulingService.getActivityByXid(body.activityXid);
|
||||
if (!activity) {
|
||||
throw new ApiError(404, 'Activity not found');
|
||||
}
|
||||
|
||||
const venueExists = await schedulingService.getVenueFromVenueXid(
|
||||
body.venueXid,
|
||||
body.activityXid,
|
||||
);
|
||||
|
||||
if (!venueExists) {
|
||||
throw new ApiError(404, `Venue not found for this activity`);
|
||||
}
|
||||
|
||||
await schedulingService.openCanceledSlot(
|
||||
body.cancellations.map((item: any) => ({
|
||||
cancellationXid: Number(item.cancellationXid),
|
||||
})),
|
||||
);
|
||||
|
||||
const result = await schedulingService.getVenueDurationByAct(
|
||||
Number(body.activityXid),
|
||||
Number(hostId),
|
||||
);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Slot opened successfully',
|
||||
data: result,
|
||||
}),
|
||||
};
|
||||
},
|
||||
);
|
||||
@@ -0,0 +1,46 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
/**
|
||||
* Add suggestion handler for host applications
|
||||
* Allows Minglar Admin, Co_Admin, and Account Manager to add suggestions
|
||||
* Types: Setup Profile, Review Account, Add Payment Details, Agreement
|
||||
*/
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Verify authentication token
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(401, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Verify token and get user info
|
||||
const userInfo = await verifyHostToken(token);
|
||||
|
||||
// Accept agreement and get dynamic fields and PDF URL
|
||||
const result = await hostService.acceptMinglarAgreement(userInfo.id);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Application accepted successfully',
|
||||
data: {
|
||||
filePath: result.filePath,
|
||||
dynamicFields: result.dynamicFields,
|
||||
},
|
||||
}),
|
||||
};
|
||||
});
|
||||
@@ -0,0 +1,64 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Extract token from headers
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token']
|
||||
if(!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Authenticate user using the shared authForHost function
|
||||
const userInfo = await verifyHostToken(token);
|
||||
const user_xid = userInfo.id;
|
||||
|
||||
// Parse request body
|
||||
let body: { password?: string; confirmPassword?: string };
|
||||
|
||||
try {
|
||||
body = event.body ? JSON.parse(event.body) : {};
|
||||
} catch (error) {
|
||||
throw new ApiError(400, 'Invalid JSON in request body');
|
||||
}
|
||||
|
||||
const { password, confirmPassword } = body;
|
||||
|
||||
if (!password || !confirmPassword) {
|
||||
throw new ApiError(400, 'Password and confirm password are required');
|
||||
}
|
||||
|
||||
// Validate password match
|
||||
if (password !== confirmPassword) {
|
||||
throw new ApiError(400, 'Password and confirm password do not match');
|
||||
}
|
||||
|
||||
// Validate password length
|
||||
if (password.length < 8) {
|
||||
throw new ApiError(400, 'Password must be at least 8 characters long');
|
||||
}
|
||||
|
||||
await hostService.createPassword(user_xid, password);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Password created successfully',
|
||||
data: null,
|
||||
}),
|
||||
};
|
||||
});
|
||||
|
||||
@@ -0,0 +1,54 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { MinglarService } from '../../../../minglaradmin/services/minglar.service';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { verifyMinglarAdminHostToken } from '../../../../../common/middlewares/jwt/authForMinglarAdminHost';
|
||||
|
||||
const minglarService = new MinglarService(prismaClient);
|
||||
|
||||
/**
|
||||
* Get suggestions handler
|
||||
* Retrieves suggestions based on user's role and host assignments
|
||||
*/
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// ✅ Verify authentication token
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(401, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// ✅ Verify token and extract user info
|
||||
const userInfo = await verifyMinglarAdminHostToken(token);
|
||||
|
||||
// ✅ Extract activityXid from query parameters
|
||||
const activityXidParam = event.queryStringParameters?.activityXid;
|
||||
if (!activityXidParam) {
|
||||
throw new ApiError(400, 'Missing required query parameter: activityXid');
|
||||
}
|
||||
|
||||
const activityXid = Number(activityXidParam);
|
||||
if (isNaN(activityXid) || activityXid <= 0) {
|
||||
throw new ApiError(400, 'Invalid activityXid provided. Must be a positive number.');
|
||||
}
|
||||
|
||||
// ✅ Fetch suggestions from the service
|
||||
const suggestions = await minglarService.getHostSuggestionsForActivity(activityXid);
|
||||
|
||||
// ✅ Return response
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Suggestions retrieved successfully',
|
||||
data: suggestions,
|
||||
}),
|
||||
};
|
||||
});
|
||||
@@ -0,0 +1,54 @@
|
||||
import { verifyMinglarAdminHostToken } from '../../../../../common/middlewares/jwt/authForMinglarAdminHost';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
/**
|
||||
* Get latest active agreement for a specific host by hostXid.
|
||||
* Accessible for Minglar Admin / Host Admin using admin-host token.
|
||||
*/
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context,
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Validate admin/host admin token
|
||||
await verifyMinglarAdminHostToken(token);
|
||||
|
||||
const hostXidParam =
|
||||
event.queryStringParameters?.hostXid ?? event.queryStringParameters?.host_xid;
|
||||
|
||||
const hostXid = Number(hostXidParam);
|
||||
|
||||
if (!hostXidParam) {
|
||||
throw new ApiError(400, 'hostXid is required');
|
||||
}
|
||||
|
||||
if (Number.isNaN(hostXid)) {
|
||||
throw new ApiError(400, 'Invalid hostXid format');
|
||||
}
|
||||
|
||||
const agreement = await hostService.getLatestHostAgreement(hostXid);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Latest host agreement retrieved successfully',
|
||||
data: agreement,
|
||||
}),
|
||||
};
|
||||
});
|
||||
|
||||
70
src/modules/host/handlers/Host_Admin/onboarding/login.ts
Normal file
70
src/modules/host/handlers/Host_Admin/onboarding/login.ts
Normal file
@@ -0,0 +1,70 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import { TokenService } from '../../../services/token.service';
|
||||
import { GetHostLoginResponseDTO } from '../../../dto/host.dto';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
const tokenService = new TokenService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Parse request body
|
||||
let body: { emailAddress?: string; userPassword?: string };
|
||||
|
||||
try {
|
||||
body = event.body ? JSON.parse(event.body) : {};
|
||||
} catch (error) {
|
||||
throw new ApiError(400, 'Invalid JSON in request body');
|
||||
}
|
||||
|
||||
const { emailAddress, userPassword } = body;
|
||||
|
||||
if (!emailAddress || !userPassword) {
|
||||
throw new ApiError(400, 'Email and password are required');
|
||||
}
|
||||
|
||||
const emailToLowerCase = emailAddress.toLowerCase()
|
||||
|
||||
const loginForHost = await hostService.loginForHost(emailToLowerCase, userPassword);
|
||||
|
||||
if (!loginForHost) {
|
||||
throw new ApiError(400, 'Failed to login');
|
||||
}
|
||||
|
||||
if (!loginForHost.userPassword) {
|
||||
throw new ApiError(401, 'Invalid credentials');
|
||||
}
|
||||
|
||||
const generateTokenForHost = await tokenService.generateAuthToken(
|
||||
loginForHost.id
|
||||
);
|
||||
|
||||
if (!generateTokenForHost) {
|
||||
throw new ApiError(500, 'Failed to generate token');
|
||||
}
|
||||
|
||||
const loginForHostResponse = new GetHostLoginResponseDTO(
|
||||
loginForHost,
|
||||
generateTokenForHost.access.token,
|
||||
generateTokenForHost.refresh.token
|
||||
);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Login successful',
|
||||
data: loginForHostResponse,
|
||||
}),
|
||||
};
|
||||
});
|
||||
|
||||
@@ -0,0 +1,42 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { MinglarService } from '../../../../minglaradmin/services/minglar.service';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
|
||||
const minglarService = new MinglarService(prismaClient);
|
||||
|
||||
/**
|
||||
* Get suggestions handler
|
||||
* Retrieves suggestions based on user's role and host assignments
|
||||
*/
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Verify authentication token
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(401, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Verify token and get user info
|
||||
const userInfo = await verifyHostToken(token);
|
||||
|
||||
// Get suggestions using service
|
||||
const suggestions = await minglarService.getHostSuggestions(userInfo.id);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Suggestions retrieved successfully',
|
||||
data: suggestions,
|
||||
}),
|
||||
};
|
||||
});
|
||||
121
src/modules/host/handlers/Host_Admin/onboarding/signUp.ts
Normal file
121
src/modules/host/handlers/Host_Admin/onboarding/signUp.ts
Normal file
@@ -0,0 +1,121 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import * as bcrypt from 'bcryptjs';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { ROLE } from '../../../../../common/utils/constants/common.constant';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { encryptUserId } from '../../../../../common/utils/helper/CodeGenerator';
|
||||
import { OtpGeneratorSixDigit } from '../../../../../common/utils/helper/OtpGenerator';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import { sendOtpEmailForHost } from '@/modules/host/services/sendOTPEmail.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
export async function generateHostRefNumber(tx: any) {
|
||||
const lastrecord = await tx.user.findFirst({
|
||||
orderBy: {
|
||||
id: 'desc',
|
||||
},
|
||||
select: {
|
||||
id: true,
|
||||
},
|
||||
});
|
||||
|
||||
const nextId = lastrecord ? lastrecord.id + 1 : 1;
|
||||
|
||||
return `076-H-${String(nextId).padStart(6, '0')}`;;
|
||||
}
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Parse request body
|
||||
let body: { email?: string };
|
||||
|
||||
try {
|
||||
body = event.body ? JSON.parse(event.body) : {};
|
||||
} catch (error) {
|
||||
throw new ApiError(400, 'Invalid JSON in request body');
|
||||
}
|
||||
|
||||
const { email } = body;
|
||||
|
||||
if (!email) {
|
||||
throw new ApiError(400, 'Email is required');
|
||||
}
|
||||
|
||||
const emailToLowerCase = email.toLowerCase()
|
||||
|
||||
// Use a single transaction for user creation/lookup and OTP storage
|
||||
const transactionResult = await prismaClient.$transaction(async (tx) => {
|
||||
const user = await tx.user.findUnique({
|
||||
where: { emailAddress: emailToLowerCase },
|
||||
select: { emailAddress: true, id: true, userPassword: true },
|
||||
});
|
||||
|
||||
if (user && user.userPassword) {
|
||||
throw new ApiError(409, 'User is already registered. Please login.');
|
||||
}
|
||||
|
||||
let newUserLocal;
|
||||
|
||||
const referenceNumber = await generateHostRefNumber(tx);
|
||||
|
||||
if (user && !user.userPassword) {
|
||||
// reuse existing invited user record
|
||||
newUserLocal = user;
|
||||
} else {
|
||||
// create new user record within the transaction
|
||||
newUserLocal = await tx.user.create({
|
||||
data: { emailAddress: emailToLowerCase, roleXid: ROLE.HOST, userRefNumber: referenceNumber },
|
||||
});
|
||||
}
|
||||
|
||||
// Generate OTP (6-digit) and store within the same transaction
|
||||
const otp = OtpGeneratorSixDigit.generateOtp();
|
||||
const hashedOtp = await bcrypt.hash(otp, 10);
|
||||
const expiry = new Date(Date.now() + 5 * 60 * 1000); // 5 minutes
|
||||
|
||||
// delete old active OTPs for this user/purpose
|
||||
await tx.userOtp.deleteMany({
|
||||
where: { userXid: Number(newUserLocal.id), otpType: 'Register', isActive: true },
|
||||
});
|
||||
|
||||
await tx.userOtp.create({
|
||||
data: {
|
||||
userXid: Number(newUserLocal.id),
|
||||
otpType: 'Register',
|
||||
otpCode: hashedOtp,
|
||||
expiresOn: expiry,
|
||||
isVerified: false,
|
||||
isActive: true,
|
||||
},
|
||||
});
|
||||
|
||||
const encryptedId = encryptUserId(String(newUserLocal.id));
|
||||
|
||||
return { newUser: newUserLocal, otp, encryptedId };
|
||||
});
|
||||
|
||||
if (!transactionResult || !transactionResult.otp) {
|
||||
throw new ApiError(500, 'Failed to generate OTP');
|
||||
}
|
||||
|
||||
// Send OTP email outside the DB transaction
|
||||
await sendOtpEmailForHost(transactionResult.newUser.emailAddress, transactionResult.otp);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'OTP sent successfully.',
|
||||
data: {},
|
||||
}),
|
||||
};
|
||||
});
|
||||
|
||||
@@ -0,0 +1,560 @@
|
||||
// modules/host/handlers/addCompanyDetails.ts
|
||||
import config from '../../../../../config/config';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult } from 'aws-lambda';
|
||||
import AWS from 'aws-sdk';
|
||||
import Busboy from 'busboy';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import {
|
||||
hostCompanyDetailsSchema,
|
||||
hostDocumentsSchema,
|
||||
parentCompanySchema,
|
||||
} from '../../../../../common/utils/validation/host/hostCompanyDetails.validation';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import { sendEmailToAM, sendEmailToMinglarAdmin } from '../../../services/sendHostResubmitEmailToAM.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
function getExtensionFromMime(mimeType: string) {
|
||||
const map: Record<string, string> = {
|
||||
'image/jpeg': 'jpg',
|
||||
'image/png': 'png',
|
||||
'application/pdf': 'pdf',
|
||||
'image/webp': 'webp',
|
||||
};
|
||||
return map[mimeType] || 'bin';
|
||||
}
|
||||
|
||||
const s3 = new AWS.S3({
|
||||
region: config.aws.region,
|
||||
});
|
||||
|
||||
function normalizeJsonField(fields: any, key: string) {
|
||||
if (!fields[key]) return undefined;
|
||||
const val = fields[key];
|
||||
|
||||
if (typeof val === 'object') return val;
|
||||
|
||||
if (typeof val === 'string') {
|
||||
try {
|
||||
return JSON.parse(val);
|
||||
} catch (err) {
|
||||
throw new ApiError(400, `Invalid JSON in field: ${key}`);
|
||||
}
|
||||
}
|
||||
throw new ApiError(400, `Invalid input: ${key} must be object or JSON string.`);
|
||||
}
|
||||
|
||||
function cleanEmptyStrings(obj: any) {
|
||||
if (!obj || typeof obj !== 'object') return obj;
|
||||
|
||||
const cleaned: any = {};
|
||||
for (const key of Object.keys(obj)) {
|
||||
if (obj[key] === '') cleaned[key] = undefined;
|
||||
else if (typeof obj[key] === 'object') cleaned[key] = cleanEmptyStrings(obj[key]);
|
||||
else cleaned[key] = obj[key];
|
||||
}
|
||||
return cleaned;
|
||||
}
|
||||
|
||||
function getS3KeyFromUrl(url: string): string {
|
||||
const base = `https://${config.aws.bucketName}.s3.${config.aws.region}.amazonaws.com/`;
|
||||
return url.replace(base, "");
|
||||
}
|
||||
|
||||
async function deleteFromS3(key: string) {
|
||||
try {
|
||||
await s3.deleteObject({
|
||||
Bucket: config.aws.bucketName,
|
||||
Key: key
|
||||
}).promise();
|
||||
|
||||
console.log("✅ Deleted from S3:", key);
|
||||
} catch (err) {
|
||||
console.error("❌ Failed to delete from S3:", key, err);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
export const handler = safeHandler(async (event: APIGatewayProxyEvent): Promise<APIGatewayProxyResult> => {
|
||||
try {
|
||||
|
||||
/** 1) AUTH */
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
const userInfo = await verifyHostToken(token);
|
||||
|
||||
/** 2) CHECK CONTENT TYPE */
|
||||
const contentType = event.headers['content-type'] || event.headers['Content-Type'];
|
||||
if (!contentType?.includes('multipart/form-data')) {
|
||||
throw new ApiError(400, 'Content-Type must be multipart/form-data.');
|
||||
}
|
||||
|
||||
/** 3) HANDLE BODY */
|
||||
const bodyBuffer = event.isBase64Encoded
|
||||
? Buffer.from(event.body as string, 'base64')
|
||||
: Buffer.from(event.body as string, 'binary');
|
||||
|
||||
const fields: Record<string, any> = {};
|
||||
const files: Array<{ buffer: Buffer; mimeType: string; fileName: string; fieldName: string }> = [];
|
||||
|
||||
await new Promise<void>((resolve, reject) => {
|
||||
const bb = Busboy({ headers: { 'content-type': contentType } });
|
||||
|
||||
bb.on('file', (fieldname, file, info) => {
|
||||
const { filename, mimeType } = info;
|
||||
const chunks: Buffer[] = [];
|
||||
let totalSize = 0;
|
||||
const MAX_SIZE = 5 * 1024 * 1024;
|
||||
|
||||
file.on('data', (chunk) => {
|
||||
totalSize += chunk.length;
|
||||
if (totalSize > MAX_SIZE) {
|
||||
file.destroy(new Error(`File ${filename} exceeds 5MB limit.`));
|
||||
return;
|
||||
}
|
||||
chunks.push(chunk);
|
||||
});
|
||||
|
||||
file.on('end', () => {
|
||||
if (chunks.length > 0) {
|
||||
files.push({
|
||||
buffer: Buffer.concat(chunks),
|
||||
mimeType: mimeType || 'application/octet-stream',
|
||||
fileName: filename || 'unknown',
|
||||
fieldName: fieldname,
|
||||
});
|
||||
}
|
||||
});
|
||||
|
||||
file.on('error', (error) => reject(new ApiError(400, `File upload error: ${error.message}`)));
|
||||
});
|
||||
|
||||
bb.on('field', (fieldname, val) => (fields[fieldname] = val));
|
||||
bb.on('close', () => resolve());
|
||||
bb.on('error', (error) => reject(new ApiError(400, `Multipart parsing error: ${error.message}`)));
|
||||
|
||||
bb.write(bodyBuffer);
|
||||
bb.end();
|
||||
});
|
||||
|
||||
const deletedFiles = normalizeJsonField(fields, "deletedFiles") || [];
|
||||
const parentDeletedFiles = normalizeJsonField(fields, "parentDeletedFiles") || [];
|
||||
const deleteCompanyLogo =
|
||||
fields.deleteCompanyLogo === 'true' || fields.deleteCompanyLogo === true;
|
||||
const deleteParentCompanyLogo =
|
||||
fields.deleteParentCompanyLogo === 'true' || fields.deleteParentCompanyLogo === true;
|
||||
|
||||
/** 4) Extract and clean isDraft flag */
|
||||
const isDraft = fields.isDraft === 'true' || fields.isDraft === true;
|
||||
|
||||
/** 5) PROCESS companyDetails ONCE ONLY (IMPORTANT FIX) */
|
||||
let companyDetailsRaw = normalizeJsonField(fields, 'companyDetails');
|
||||
if (!companyDetailsRaw) throw new ApiError(400, 'companyDetails is required.');
|
||||
|
||||
if (isDraft) {
|
||||
companyDetailsRaw = cleanEmptyStrings(companyDetailsRaw);
|
||||
|
||||
// IMPORTANT: also clean parent company nested fields
|
||||
if (companyDetailsRaw.parentCompany) {
|
||||
companyDetailsRaw.parentCompany = cleanEmptyStrings(companyDetailsRaw.parentCompany);
|
||||
}
|
||||
}
|
||||
|
||||
if (
|
||||
companyDetailsRaw.parentCompany &&
|
||||
Object.values(companyDetailsRaw.parentCompany).every(
|
||||
(v) => v === undefined || v === null
|
||||
)
|
||||
) {
|
||||
companyDetailsRaw.parentCompany = null;
|
||||
}
|
||||
|
||||
/** 6) Profile update if provided */
|
||||
if (fields.userProfile) {
|
||||
const userProfileRaw = normalizeJsonField(fields, 'userProfile');
|
||||
if (userProfileRaw) {
|
||||
const { firstName, lastName, mobileNumber } = userProfileRaw;
|
||||
|
||||
await prismaClient.user.update({
|
||||
where: { id: userInfo.id },
|
||||
data: {
|
||||
...(firstName && { firstName }),
|
||||
...(lastName && { lastName }),
|
||||
...(mobileNumber && { mobileNumber }),
|
||||
},
|
||||
});
|
||||
}
|
||||
}
|
||||
|
||||
/** 7) VALIDATION - SKIPPED IF DRAFT */
|
||||
let parsedCompany: any = companyDetailsRaw;
|
||||
|
||||
if (!isDraft) {
|
||||
const validate = hostCompanyDetailsSchema.safeParse(companyDetailsRaw);
|
||||
if (!validate.success) {
|
||||
const message = validate.error.issues.map((i) => i.message).join(', ');
|
||||
throw new ApiError(400, `Validation failed: ${message}`);
|
||||
}
|
||||
parsedCompany = validate.data;
|
||||
}
|
||||
|
||||
/** 8) DOCUMENT METADATA */
|
||||
const documentsMetadataRaw = normalizeJsonField(fields, 'documents');
|
||||
if (!Array.isArray(documentsMetadataRaw)) throw new ApiError(400, 'documents must be an array.');
|
||||
|
||||
if (!isDraft) {
|
||||
const docsParse = hostDocumentsSchema.safeParse(documentsMetadataRaw);
|
||||
if (!docsParse.success) {
|
||||
const message = docsParse.error.issues.map((i) => i.message).join(', ');
|
||||
throw new ApiError(400, `Documents validation failed: ${message}`);
|
||||
}
|
||||
}
|
||||
|
||||
const documentsMetadata = documentsMetadataRaw.map((d: any) => ({
|
||||
...d,
|
||||
owner: d.owner || 'host',
|
||||
}));
|
||||
|
||||
const documentMetadata = documentsMetadata.map((doc: any) => {
|
||||
const file = files.find((f) => f.fieldName === doc.fieldName);
|
||||
|
||||
// In DRAFT mode → allow missing documents
|
||||
if (!file) {
|
||||
return { ...doc, file: null };
|
||||
}
|
||||
|
||||
return { ...doc, file };
|
||||
});
|
||||
|
||||
/** 9) SPLIT host & parent docs */
|
||||
const hostDocs = documentMetadata.filter((d) => d.owner === 'host');
|
||||
const parentDocs = documentMetadata.filter((d) => d.owner === 'parent');
|
||||
|
||||
/** 10) VALIDATE PARENT COMPANY (ONLY IN FINAL SUBMISSION) */
|
||||
let parsedParentCompany: any = null;
|
||||
|
||||
if (!isDraft && parsedCompany.isSubsidairy) {
|
||||
if (!parsedCompany.parentCompany) {
|
||||
throw new ApiError(400, 'isSubsidairy is true but parentCompany object is missing.');
|
||||
}
|
||||
|
||||
const parentCheck = parentCompanySchema.safeParse(parsedCompany.parentCompany);
|
||||
if (!parentCheck.success) {
|
||||
const message = parentCheck.error.issues.map((i) => i.message).join(', ');
|
||||
throw new ApiError(400, `Parent company validation failed: ${message}`);
|
||||
}
|
||||
|
||||
parsedParentCompany = parentCheck.data;
|
||||
} else {
|
||||
parsedParentCompany = parsedCompany.parentCompany || null;
|
||||
}
|
||||
|
||||
/** 9.5) DELETE DOCUMENTS IF REQUESTED **/
|
||||
if (Array.isArray(deletedFiles) && deletedFiles.length > 0) {
|
||||
console.log(`🗑️ Deleting ${deletedFiles.length} documents...`);
|
||||
|
||||
for (const del of deletedFiles) {
|
||||
const id = Number(del.id);
|
||||
const url = del.url;
|
||||
|
||||
if (!id || !url) {
|
||||
console.log("❌ Invalid delete entry:", del);
|
||||
continue;
|
||||
}
|
||||
|
||||
// Extract S3 key
|
||||
const s3Key = getS3KeyFromUrl(url);
|
||||
|
||||
// Delete from S3
|
||||
await deleteFromS3(s3Key);
|
||||
|
||||
// Delete from DB
|
||||
await prismaClient.hostDocuments.delete({
|
||||
where: { id }
|
||||
});
|
||||
|
||||
console.log(`🗑️ Deleted host document ID ${id}`);
|
||||
}
|
||||
}
|
||||
|
||||
/** 9.6) DELETE PARENT DOCUMENTS **/
|
||||
if (parsedCompany.isSubsidairy && Array.isArray(parentDeletedFiles) && parentDeletedFiles.length > 0) {
|
||||
console.log(`🗑️ Deleting ${parentDeletedFiles.length} PARENT documents...`);
|
||||
|
||||
for (const del of parentDeletedFiles) {
|
||||
const id = Number(del.id);
|
||||
const url = del.url;
|
||||
|
||||
if (!id || !url) {
|
||||
console.log("⚠️ Invalid parent delete entry:", del);
|
||||
continue;
|
||||
}
|
||||
|
||||
const s3Key = getS3KeyFromUrl(url);
|
||||
|
||||
// Delete S3
|
||||
await deleteFromS3(s3Key);
|
||||
|
||||
// Delete DB
|
||||
await prismaClient.hostParenetDocuments.delete({
|
||||
where: { id }
|
||||
});
|
||||
|
||||
console.log(`🗑️ Deleted PARENT document ID ${id}`);
|
||||
}
|
||||
}
|
||||
|
||||
/** 11) UPLOAD DOCUMENTS */
|
||||
async function uploadToS3(buffer, mimeType, originalName, folderType, documentTypeXid?, fieldName?) {
|
||||
// const ext = originalName.split('.').pop() || 'jpg';
|
||||
const ext = getExtensionFromMime(mimeType);
|
||||
|
||||
let s3Key = '';
|
||||
|
||||
if (folderType === 'logo') {
|
||||
s3Key = `Documents/Host/${userInfo.id}/logo/company_logo.${ext}`;
|
||||
}
|
||||
else if (folderType === 'parent_company_logo') {
|
||||
s3Key = `Documents/Host/${userInfo.id}/parent_company/logo/parent_company_logo.${ext}`;
|
||||
}
|
||||
else if (folderType === 'documents') {
|
||||
s3Key = `Documents/Host/${userInfo.id}/documents/${documentTypeXid}_${fieldName}.${ext}`;
|
||||
}
|
||||
else if (folderType === 'parent_company') {
|
||||
s3Key = `Documents/Host/${userInfo.id}/parent_company/${documentTypeXid}_${fieldName}.${ext}`;
|
||||
}
|
||||
|
||||
await s3
|
||||
.upload({
|
||||
Bucket: config.aws.bucketName,
|
||||
Key: s3Key,
|
||||
Body: buffer,
|
||||
ContentType: mimeType,
|
||||
ACL: 'private',
|
||||
})
|
||||
.promise();
|
||||
|
||||
return `https://${config.aws.bucketName}.s3.${config.aws.region}.amazonaws.com/${s3Key}`;
|
||||
}
|
||||
|
||||
|
||||
/** Upload host docs */
|
||||
const uploadedHostDocs: Array<any> = [];
|
||||
for (const doc of hostDocs) {
|
||||
if (!doc.file) continue;
|
||||
|
||||
const path = await uploadToS3(
|
||||
doc.file.buffer,
|
||||
doc.file.mimeType,
|
||||
doc.file.fileName,
|
||||
'documents',
|
||||
doc.documentTypeXid,
|
||||
doc.fieldName,
|
||||
);
|
||||
|
||||
uploadedHostDocs.push({
|
||||
documentTypeXid: doc.documentTypeXid,
|
||||
documentName: doc.fieldName,
|
||||
filePath: path,
|
||||
});
|
||||
}
|
||||
|
||||
/** Upload parent docs */
|
||||
const uploadedParentDocs: Array<any> = [];
|
||||
for (const doc of parentDocs) {
|
||||
if (!doc.file) continue; // skip missing files in draft mode
|
||||
|
||||
const path = await uploadToS3(
|
||||
doc.file.buffer,
|
||||
doc.file.mimeType,
|
||||
doc.file.fileName,
|
||||
'parent_company',
|
||||
doc.documentTypeXid,
|
||||
doc.fieldName,
|
||||
);
|
||||
|
||||
uploadedParentDocs.push({
|
||||
documentTypeXid: doc.documentTypeXid,
|
||||
documentName: doc.documentName,
|
||||
filePath: path,
|
||||
});
|
||||
}
|
||||
|
||||
/** DELETE EXISTING LOGO IF REQUESTED */
|
||||
if (deleteCompanyLogo) {
|
||||
const existingHost = await prismaClient.hostHeader.findFirst({
|
||||
where: { userXid: userInfo.id },
|
||||
select: { logoPath: true },
|
||||
});
|
||||
|
||||
if (existingHost?.logoPath) {
|
||||
try {
|
||||
const s3Key = getS3KeyFromUrl(existingHost.logoPath);
|
||||
await deleteFromS3(s3Key);
|
||||
} catch (e) {
|
||||
console.error('S3 delete failed for company logo:', existingHost.logoPath, e);
|
||||
}
|
||||
}
|
||||
|
||||
parsedCompany.logoPath = null;
|
||||
}
|
||||
|
||||
/** DELETE EXISTING PARENT COMPANY LOGO IF REQUESTED */
|
||||
if (deleteParentCompanyLogo && parsedCompany.isSubsidairy) {
|
||||
const existingHost = await prismaClient.hostHeader.findFirst({
|
||||
where: { userXid: userInfo.id },
|
||||
select: {
|
||||
id: true,
|
||||
hostParent: {
|
||||
select: {
|
||||
id: true,
|
||||
logoPath: true,
|
||||
},
|
||||
take: 1,
|
||||
},
|
||||
},
|
||||
});
|
||||
|
||||
const existingParent = Array.isArray(existingHost?.hostParent)
|
||||
? existingHost.hostParent[0]
|
||||
: existingHost?.hostParent;
|
||||
|
||||
if (existingParent?.logoPath) {
|
||||
try {
|
||||
const s3Key = getS3KeyFromUrl(existingParent.logoPath);
|
||||
await deleteFromS3(s3Key);
|
||||
} catch (e) {
|
||||
console.error('S3 delete failed for parent company logo:', existingParent.logoPath, e);
|
||||
}
|
||||
}
|
||||
|
||||
if (parsedParentCompany) {
|
||||
parsedParentCompany.logoPath = null;
|
||||
} else {
|
||||
parsedParentCompany = {
|
||||
logoPath: null,
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
/** UPLOAD LOGO (if provided) */
|
||||
const logoFile = files.find(
|
||||
(f) => f.fieldName === 'companyLogo' || f.fieldName === 'companyLogoFile'
|
||||
);
|
||||
|
||||
if (logoFile && logoFile.buffer && logoFile.fileName) {
|
||||
const logoUrl = await uploadToS3(
|
||||
logoFile.buffer,
|
||||
logoFile.mimeType,
|
||||
logoFile.fileName,
|
||||
'logo'
|
||||
);
|
||||
parsedCompany.logoPath = logoUrl;
|
||||
}
|
||||
|
||||
/** UPLOAD PARENT COMPANY LOGO (if provided) */
|
||||
const parentLogoFile = files.find(
|
||||
(f) => f.fieldName === 'parentCompanyLogo'
|
||||
);
|
||||
|
||||
if (parentLogoFile && parentLogoFile.buffer && parentLogoFile.mimeType) {
|
||||
// 🔒 Only upload when an actual file is present
|
||||
const parentLogoUrl = await uploadToS3(
|
||||
parentLogoFile.buffer,
|
||||
parentLogoFile.mimeType,
|
||||
parentLogoFile.fileName, // safe here because it's a real file
|
||||
'parent_company_logo',
|
||||
);
|
||||
|
||||
if (parsedParentCompany) {
|
||||
parsedParentCompany.logoPath = parentLogoUrl;
|
||||
} else {
|
||||
parsedParentCompany = {
|
||||
logoPath: parentLogoUrl,
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
if (parsedCompany.cityXid) {
|
||||
const city = await prismaClient.cities.findUnique({
|
||||
where: { id: Number(parsedCompany.cityXid) }
|
||||
});
|
||||
if (!city) {
|
||||
throw new ApiError(400, `City with ID ${parsedCompany.cityXid} not found`);
|
||||
}
|
||||
}
|
||||
|
||||
if (!parsedCompany.isSubsidairy) {
|
||||
const parentDocuments = await hostService.getParentDocumentsByHostId(userInfo.id);
|
||||
if (parentDocuments.length > 0) {
|
||||
for (const doc of parentDocuments) {
|
||||
try {
|
||||
const s3Key = getS3KeyFromUrl(doc.filePath);
|
||||
await deleteFromS3(s3Key);
|
||||
} catch (e) {
|
||||
console.error("S3 delete failed:", doc.filePath, e);
|
||||
}
|
||||
}
|
||||
}
|
||||
await hostService.deleteExistingParentRecords(userInfo.id)
|
||||
}
|
||||
|
||||
/** 12) SAVE / UPDATE HOST ENTRY */
|
||||
const createdOrUpdated = await hostService.addOrUpdateCompanyDetails(
|
||||
userInfo.id,
|
||||
parsedCompany,
|
||||
uploadedHostDocs,
|
||||
parsedParentCompany,
|
||||
uploadedParentDocs,
|
||||
isDraft,
|
||||
{ deleteCompanyLogo, deleteParentCompanyLogo },
|
||||
);
|
||||
|
||||
if (!createdOrUpdated) throw new ApiError(400, 'Failed to add/update company details.');
|
||||
|
||||
/** 13) SEND EMAIL ONLY IN FINAL SUBMISSION */
|
||||
if (!isDraft) {
|
||||
const details = await hostService.getSuggestionDetails(userInfo.id);
|
||||
|
||||
if (details.hostDetails.accountManagerXid) {
|
||||
await sendEmailToAM(
|
||||
details.hostDetails.accountManager.emailAddress,
|
||||
details.hostDetails.accountManager.firstName,
|
||||
details.hostDetails.companyName,
|
||||
details.hostDetails.user.userRefNumber,
|
||||
);
|
||||
} else {
|
||||
await sendEmailToMinglarAdmin(
|
||||
config.MinglarAdminEmail,
|
||||
config.MinglarAdminName,
|
||||
details.hostDetails.companyName,
|
||||
details.hostDetails.user.userRefNumber,
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
/** RESPONSE */
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: isDraft ? 'Company details saved as draft successfully.' : 'Company details uploaded successfully.',
|
||||
data: {
|
||||
id: createdOrUpdated.id,
|
||||
isDraft,
|
||||
},
|
||||
}),
|
||||
};
|
||||
|
||||
} catch (error: any) {
|
||||
console.error('❌ Error in addCompanyDetails:', error);
|
||||
throw error;
|
||||
}
|
||||
});
|
||||
@@ -0,0 +1,78 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { verifyHostToken } from '../../../../../common/middlewares/jwt/authForHost';
|
||||
import { hostBankDetailsSchema } from '../../../../../common/utils/validation/host/addPaymentDetails.validation';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Extract token from headers
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token']
|
||||
if (!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Authenticate user using the shared authForHost function
|
||||
const userInfo = await verifyHostToken(token);
|
||||
const hostId = userInfo.id;
|
||||
|
||||
if (Number.isNaN(hostId)) {
|
||||
throw new ApiError(400, 'Host id must be a number');
|
||||
}
|
||||
|
||||
const host = await hostService.getHostIdByUserXid(hostId);
|
||||
if (!host) {
|
||||
throw new ApiError(404, 'Host not found');
|
||||
}
|
||||
|
||||
// Parse request body
|
||||
let body: { bankXid?: number; bankBranchXid?: number; accountNumber?: string; confirmAccountNumber?: string; accountHolderName?: string; currencyXid?: number };
|
||||
|
||||
try {
|
||||
body = event.body ? JSON.parse(event.body) : {};
|
||||
} catch (error) {
|
||||
throw new ApiError(400, 'Invalid JSON in request body');
|
||||
}
|
||||
|
||||
// ✅ Validate payload using Zod
|
||||
const validationResult = hostBankDetailsSchema.safeParse({
|
||||
...(body as object),
|
||||
hostXid: host.host.id, // inject hostId from token (not from user input)
|
||||
});
|
||||
|
||||
if (!validationResult.success) {
|
||||
const errorMessages = validationResult.error.issues.map(e => e.message).join(', ');
|
||||
throw new ApiError(400, `Validation failed: ${errorMessages}`);
|
||||
}
|
||||
|
||||
const validatedData = validationResult.data;
|
||||
|
||||
// Fetch IFSC code from bank branch
|
||||
const bankBranch = await hostService.getBankBranchById(validatedData.bankBranchXid);
|
||||
if (!bankBranch) {
|
||||
throw new ApiError(404, 'Bank branch not found');
|
||||
}
|
||||
|
||||
await hostService.addPaymentDetails({
|
||||
...validatedData,
|
||||
ifscCode: bankBranch.ifscCode,
|
||||
});
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Payment details added successfully',
|
||||
}),
|
||||
};
|
||||
});
|
||||
53
src/modules/host/handlers/Host_Admin/onboarding/verifyOTP.ts
Normal file
53
src/modules/host/handlers/Host_Admin/onboarding/verifyOTP.ts
Normal file
@@ -0,0 +1,53 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { safeHandler } from '../../../../../common/utils/handlers/safeHandler';
|
||||
import { prismaClient } from '../../../../../common/database/prisma.lambda.service';
|
||||
import { HostService } from '../../../services/host.service';
|
||||
import ApiError from '../../../../../common/utils/helper/ApiError';
|
||||
import { TokenService } from '../../../services/token.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
const tokenService = new TokenService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Parse request body
|
||||
let body: { email?: string; otp?: string };
|
||||
|
||||
try {
|
||||
body = event.body ? JSON.parse(event.body) : {};
|
||||
} catch (error) {
|
||||
throw new ApiError(400, 'Invalid JSON in request body');
|
||||
}
|
||||
|
||||
const { email, otp } = body;
|
||||
|
||||
if (!email || !otp) {
|
||||
throw new ApiError(400, 'Email and OTP are required');
|
||||
}
|
||||
|
||||
const emailToLowerCase = email.toLowerCase();
|
||||
|
||||
await hostService.verifyHostOtp(emailToLowerCase, otp);
|
||||
const user = await hostService.getHostByEmail(emailToLowerCase);
|
||||
const generateTokenForHost = await tokenService.generateAuthToken(
|
||||
user.id
|
||||
);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'OTP verified successfully',
|
||||
accessToken: generateTokenForHost.access.token,
|
||||
refreshToken: generateTokenForHost.refresh.token,
|
||||
data: null,
|
||||
}),
|
||||
};
|
||||
});
|
||||
|
||||
47
src/modules/host/handlers/getStepper.ts
Normal file
47
src/modules/host/handlers/getStepper.ts
Normal file
@@ -0,0 +1,47 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { safeHandler } from '../../../common/utils/handlers/safeHandler';
|
||||
import { prismaClient } from '../../../common/database/prisma.lambda.service';
|
||||
import ApiError from '../../../common/utils/helper/ApiError';
|
||||
import { verifyHostToken } from '../../../common/middlewares/jwt/authForHost';
|
||||
import { HostService } from '../services/host.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Extract token from headers
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
||||
if (!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
// Verify token and get user info
|
||||
const userInfo = await verifyHostToken(token);
|
||||
const userId = Number(userInfo.id);
|
||||
|
||||
if (!userId || isNaN(userId)) {
|
||||
throw new ApiError(400, 'Invalid user ID');
|
||||
}
|
||||
|
||||
// Fetch user with their HostHeader stepper info
|
||||
const host = await hostService.getHostIdByUserXid(userId);
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Stepper information retrieved successfully',
|
||||
data: {
|
||||
stepper: host?.host?.stepper || null,
|
||||
emailAddress: host.user?.emailAddress || null,
|
||||
hostId: host.user?.userRefNumber || null,
|
||||
},
|
||||
}),
|
||||
};
|
||||
});
|
||||
|
||||
49
src/modules/host/handlers/getbyidhandler.ts
Normal file
49
src/modules/host/handlers/getbyidhandler.ts
Normal file
@@ -0,0 +1,49 @@
|
||||
import { verifyMinglarAdminHostToken } from '../../../common/middlewares/jwt/authForMinglarAdminHost';
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { prismaClient } from '../../../common/database/prisma.lambda.service';
|
||||
import { safeHandler } from '../../../common/utils/handlers/safeHandler';
|
||||
import ApiError from '../../../common/utils/helper/ApiError';
|
||||
import { HostService } from '../services/host.service';
|
||||
|
||||
const hostService = new HostService(prismaClient);
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent,
|
||||
context?: Context
|
||||
): Promise<APIGatewayProxyResult> => {
|
||||
// Get host ID from path parameters
|
||||
const token = event.headers['x-auth-token'] || event.headers['X-Auth-Token']
|
||||
if (!token) {
|
||||
throw new ApiError(400, 'This is a protected route. Please provide a valid token.');
|
||||
}
|
||||
|
||||
const userInfo = await verifyMinglarAdminHostToken(token);
|
||||
const id = Number(userInfo.id)
|
||||
|
||||
if (!id) {
|
||||
throw new ApiError(400, 'Host ID is required');
|
||||
}
|
||||
|
||||
if (isNaN(id)) {
|
||||
throw new ApiError(400, 'Invalid host ID format');
|
||||
}
|
||||
|
||||
const hostDetails = await hostService.getHostById(id);
|
||||
|
||||
if (!hostDetails) {
|
||||
throw new ApiError(404, 'Host not found');
|
||||
}
|
||||
|
||||
return {
|
||||
statusCode: 200,
|
||||
headers: {
|
||||
'Content-Type': 'application/json',
|
||||
'Access-Control-Allow-Origin': '*',
|
||||
},
|
||||
body: JSON.stringify({
|
||||
success: true,
|
||||
message: 'Host details retrieved successfully',
|
||||
data: hostDetails,
|
||||
}),
|
||||
};
|
||||
});
|
||||
@@ -1,8 +1,8 @@
|
||||
import { APIGatewayProxyEvent, APIGatewayProxyResult, Context } from 'aws-lambda';
|
||||
import { PrismaClient } from '@prisma/client';
|
||||
import { safeHandler } from '../../../common/utils/handlers/safeHandler';
|
||||
import { prismaClient } from '../../../common/database/prisma.lambda.service';
|
||||
|
||||
const prisma = new PrismaClient();
|
||||
const prisma = prismaClient;
|
||||
|
||||
export const handler = safeHandler(async (
|
||||
event: APIGatewayProxyEvent
|
||||
@@ -11,7 +11,6 @@ export const handler = safeHandler(async (
|
||||
const result = await prisma.hostHeader.findMany({
|
||||
select: {
|
||||
hostParent: true,
|
||||
hostRefNumber: true,
|
||||
hostStatusDisplay: true,
|
||||
accountManager: true,
|
||||
},
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user