66 lines
1.9 KiB
TypeScript
66 lines
1.9 KiB
TypeScript
import {
|
|
APIGatewayProxyEvent,
|
|
APIGatewayProxyResult,
|
|
Context,
|
|
} from 'aws-lambda';
|
|
import { prismaClient } from '../../../common/database/prisma.lambda.service';
|
|
import { verifyMinglarAdminToken } from '../../../common/middlewares/jwt/authForMinglarAdmin';
|
|
import { safeHandler } from '../../../common/utils/handlers/safeHandler';
|
|
import ApiError from '../../../common/utils/helper/ApiError';
|
|
import { MinglarService } from '../services/minglar.service';
|
|
|
|
const minglarService = new MinglarService(prismaClient);
|
|
|
|
/**
|
|
* Get all host applications handler
|
|
* Returns host details with status, submission date, and account manager info
|
|
*/
|
|
export const handler = safeHandler(
|
|
async (
|
|
event: APIGatewayProxyEvent,
|
|
context?: Context,
|
|
): Promise<APIGatewayProxyResult> => {
|
|
// Verify authentication token
|
|
const token =
|
|
event.headers['x-auth-token'] || event.headers['X-Auth-Token'];
|
|
if (!token) {
|
|
throw new ApiError(
|
|
401,
|
|
'This is a protected route. Please provide a valid token.',
|
|
);
|
|
}
|
|
|
|
await verifyMinglarAdminToken(token);
|
|
|
|
const amXid = event.pathParameters?.amXid;
|
|
if (!amXid) {
|
|
throw new ApiError(
|
|
400,
|
|
'Account Manager XID is required in path parameters.',
|
|
);
|
|
}
|
|
|
|
const amId = Number(amXid);
|
|
if (Number.isNaN(amId)) {
|
|
throw new ApiError(400, 'Account Manager XID must be a valid number.');
|
|
}
|
|
|
|
|
|
// Get all host applications from service based on user role
|
|
const getAmDetailsByid = await minglarService.getAMdetailById( amId );
|
|
|
|
return {
|
|
statusCode: 200,
|
|
headers: {
|
|
'Content-Type': 'application/json',
|
|
'Access-Control-Allow-Origin': '*',
|
|
},
|
|
body: JSON.stringify({
|
|
success: true,
|
|
message: 'Account Manager details retrieved successfully',
|
|
data: getAmDetailsByid,
|
|
}),
|
|
};
|
|
},
|
|
);
|