fix: kafka dev standalone, OIDC realm LUM, Flyway out-of-order, shutdown guard, TypeRef categorie/modules

- docker-compose.dev.yml: retire le service kafka (standalone existant sur :9092), kafka-ui pointe host.docker.internal:9092
- application-dev.properties: OIDC admin-service realm corrigé lions-user-manager (fix AUTH changement mdp)
- application-prod.properties: nouvelle var KEYCLOAK_LUM_AUTH_SERVER_URL + fallback KEYCLOAK_CLIENT_SECRET
- application.properties: quarkus.flyway.out-of-order=true (évite échec si migration hors-séquence)
- V10 renommé V10_1 (évite conflit avec historique Flyway existant)
- AlertMonitoringService: guard Arc.container().isRunning() pour éviter NPE au shutdown
- TypeOrganisationReferenceResource: forward categorie + modulesRequis au service
- Tests: coverage TypeOrganisationReferenceResource + TypeReferenceService
This commit is contained in:
dahoud
2026-04-11 01:25:45 +00:00
parent 065b0008b0
commit 31e8d5534c
9 changed files with 72 additions and 51 deletions

View File

@@ -34,61 +34,31 @@ services:
- postgres-dev - postgres-dev
restart: unless-stopped restart: unless-stopped
kafka: # Kafka est géré comme conteneur standalone (apache/kafka:4.0.0) sur port 9092.
image: apache/kafka:4.0.0 # Ne pas le redéfinir ici pour éviter le conflit de port.
container_name: unionflow-kafka-dev # Démarrer manuellement si nécessaire :
environment: # docker run -d --name kafka --network unionflow-dev \
KAFKA_NODE_ID: 1 # -p 9092:9092 apache/kafka:4.0.0
KAFKA_PROCESS_ROLES: broker,controller # Puis recréer les topics :
KAFKA_CONTROLLER_QUORUM_VOTERS: 1@kafka:9093 # docker exec kafka /opt/kafka/bin/kafka-topics.sh --create \
KAFKA_LISTENERS: PLAINTEXT://:9092,CONTROLLER://:9093 # --bootstrap-server localhost:9092 --topic unionflow.finance.approvals --partitions 3 --replication-factor 1
KAFKA_ADVERTISED_LISTENERS: PLAINTEXT://localhost:9092
KAFKA_LISTENER_SECURITY_PROTOCOL_MAP: PLAINTEXT:PLAINTEXT,CONTROLLER:PLAINTEXT
KAFKA_CONTROLLER_LISTENER_NAMES: CONTROLLER
KAFKA_INTER_BROKER_LISTENER_NAME: PLAINTEXT
KAFKA_LOG_DIRS: /var/lib/kafka/data
KAFKA_OFFSETS_TOPIC_REPLICATION_FACTOR: 1
KAFKA_TRANSACTION_STATE_LOG_REPLICATION_FACTOR: 1
KAFKA_TRANSACTION_STATE_LOG_MIN_ISR: 1
KAFKA_DEFAULT_REPLICATION_FACTOR: 1
KAFKA_NUM_PARTITIONS: 3
KAFKA_AUTO_CREATE_TOPICS_ENABLE: "true"
CLUSTER_ID: MkU3OEVBNTcwNTJENDM2Qk
ports:
- "9092:9092"
volumes:
- kafka_dev_data:/var/lib/kafka/data
networks:
- unionflow-dev
healthcheck:
test: ["CMD-SHELL", "/opt/kafka/bin/kafka-topics.sh --list --bootstrap-server localhost:9092 || exit 1"]
interval: 15s
timeout: 10s
retries: 10
start_period: 30s
restart: unless-stopped
kafka-ui: kafka-ui:
image: ghcr.io/kafbat/kafka-ui:v1.4.2 image: ghcr.io/kafbat/kafka-ui:v1.4.2
container_name: unionflow-kafka-ui-dev container_name: unionflow-kafka-ui-dev
environment: environment:
KAFKA_CLUSTERS_0_NAME: unionflow-dev KAFKA_CLUSTERS_0_NAME: unionflow-dev
KAFKA_CLUSTERS_0_BOOTSTRAPSERVERS: kafka:9092 KAFKA_CLUSTERS_0_BOOTSTRAPSERVERS: host.docker.internal:9092
DYNAMIC_CONFIG_ENABLED: "true" DYNAMIC_CONFIG_ENABLED: "true"
ports: ports:
- "8082:8080" - "8082:8080"
networks: networks:
- unionflow-dev - unionflow-dev
depends_on:
kafka:
condition: service_healthy
restart: unless-stopped restart: unless-stopped
volumes: volumes:
postgres_dev_data: postgres_dev_data:
driver: local driver: local
kafka_dev_data:
driver: local
networks: networks:
unionflow-dev: unionflow-dev:

View File

@@ -70,6 +70,8 @@ public class TypeOrganisationReferenceResource {
.estDefaut(request.estDefaut()) .estDefaut(request.estDefaut())
.estSysteme(request.estSysteme()) .estSysteme(request.estSysteme())
.organisationId(request.organisationId()) .organisationId(request.organisationId())
.categorie(request.categorie())
.modulesRequis(request.modulesRequis())
.build(); .build();
try { try {
TypeReferenceResponse created = typeReferenceService.creer(withDomaine); TypeReferenceResponse created = typeReferenceService.creer(withDomaine);

View File

@@ -5,6 +5,7 @@ import dev.lions.unionflow.server.entity.SystemAlert;
import dev.lions.unionflow.server.repository.AlertConfigurationRepository; import dev.lions.unionflow.server.repository.AlertConfigurationRepository;
import dev.lions.unionflow.server.repository.SystemAlertRepository; import dev.lions.unionflow.server.repository.SystemAlertRepository;
import dev.lions.unionflow.server.repository.SystemLogRepository; import dev.lions.unionflow.server.repository.SystemLogRepository;
import io.quarkus.arc.Arc;
import io.quarkus.scheduler.Scheduled; import io.quarkus.scheduler.Scheduled;
import jakarta.enterprise.context.ApplicationScoped; import jakarta.enterprise.context.ApplicationScoped;
import jakarta.inject.Inject; import jakarta.inject.Inject;
@@ -47,6 +48,10 @@ public class AlertMonitoringService {
@Scheduled(cron = "0 * * * * ?") // Toutes les minutes à la seconde 0 @Scheduled(cron = "0 * * * * ?") // Toutes les minutes à la seconde 0
@Transactional @Transactional
public void monitorSystemMetrics() { public void monitorSystemMetrics() {
// Guard contre l'exécution pendant le shutdown Quarkus (Arc.container() null → NPE)
if (!Arc.container().isRunning()) {
return;
}
try { try {
log.debug("Running scheduled system metrics monitoring..."); log.debug("Running scheduled system metrics monitoring...");

View File

@@ -50,10 +50,12 @@ quarkus.log.category."io.quarkus.security".level=INFO
wave.mock.enabled=true wave.mock.enabled=true
wave.redirect.base.url=http://localhost:8085 wave.redirect.base.url=http://localhost:8085
# OIDC client "admin-service" — service account pour appels admin vers lions-user-manager # OIDC client "admin-service" — service account pour appels vers lions-user-manager
quarkus.oidc-client.admin-service.auth-server-url=http://localhost:8180/realms/unionflow # Utilise le realm lions-user-manager (cohérent avec le serveur LUM qui valide ce realm)
# Le client unionflow-server existe dans lions-user-manager realm avec ce secret
quarkus.oidc-client.admin-service.auth-server-url=http://localhost:8180/realms/lions-user-manager
quarkus.oidc-client.admin-service.client-id=unionflow-server quarkus.oidc-client.admin-service.client-id=unionflow-server
quarkus.oidc-client.admin-service.credentials.secret=unionflow-secret-2025 quarkus.oidc-client.admin-service.credentials.secret=Esj0DzyRt7wSPtcePDae1dQQdqmQxlJm
quarkus.oidc-client.admin-service.grant.type=client quarkus.oidc-client.admin-service.grant.type=client
quarkus.oidc-client.admin-service.tls.verification=none quarkus.oidc-client.admin-service.tls.verification=none
quarkus.oidc-client.admin-service.early-tokens-acquisition=true quarkus.oidc-client.admin-service.early-tokens-acquisition=true

View File

@@ -58,9 +58,10 @@ quarkus.log.category."org.jboss.resteasy".level=WARN
quarkus.rest-client.lions-user-manager-api.url=${LIONS_USER_MANAGER_URL:http://lions-user-manager:8081} quarkus.rest-client.lions-user-manager-api.url=${LIONS_USER_MANAGER_URL:http://lions-user-manager:8081}
# OIDC client "admin-service" — service account pour appels admin vers lions-user-manager # OIDC client "admin-service" — service account pour appels admin vers lions-user-manager
quarkus.oidc-client.admin-service.auth-server-url=${KEYCLOAK_AUTH_SERVER_URL:https://security.lions.dev/realms/unionflow} # Utilise le realm lions-user-manager (cohérent avec le serveur LUM qui valide ce realm)
quarkus.oidc-client.admin-service.auth-server-url=${KEYCLOAK_LUM_AUTH_SERVER_URL:https://security.lions.dev/realms/lions-user-manager}
quarkus.oidc-client.admin-service.client-id=unionflow-server quarkus.oidc-client.admin-service.client-id=unionflow-server
quarkus.oidc-client.admin-service.credentials.secret=${KEYCLOAK_CLIENT_SECRET} quarkus.oidc-client.admin-service.credentials.secret=${KEYCLOAK_ADMIN_SERVICE_SECRET:${KEYCLOAK_CLIENT_SECRET}}
quarkus.oidc-client.admin-service.grant.type=client quarkus.oidc-client.admin-service.grant.type=client
# Wave Money — Production # Wave Money — Production

View File

@@ -45,6 +45,7 @@ quarkus.hibernate-orm.metrics.enabled=false
quarkus.flyway.migrate-at-start=true quarkus.flyway.migrate-at-start=true
quarkus.flyway.baseline-on-migrate=true quarkus.flyway.baseline-on-migrate=true
quarkus.flyway.baseline-version=0 quarkus.flyway.baseline-version=0
quarkus.flyway.out-of-order=true
# Configuration Keycloak OIDC — base commune # Configuration Keycloak OIDC — base commune
quarkus.oidc.application-type=service quarkus.oidc.application-type=service

View File

@@ -2,9 +2,13 @@ package dev.lions.unionflow.server.resource;
import static io.restassured.RestAssured.given; import static io.restassured.RestAssured.given;
import static org.hamcrest.Matchers.notNullValue; import static org.hamcrest.Matchers.notNullValue;
import static org.junit.jupiter.api.Assertions.assertEquals;
import static org.mockito.ArgumentMatchers.*; import static org.mockito.ArgumentMatchers.*;
import static org.mockito.Mockito.*; import static org.mockito.Mockito.*;
import dev.lions.unionflow.server.api.dto.reference.request.CreateTypeReferenceRequest;
import org.mockito.ArgumentCaptor;
import dev.lions.unionflow.server.api.dto.reference.response.TypeReferenceResponse; import dev.lions.unionflow.server.api.dto.reference.response.TypeReferenceResponse;
import dev.lions.unionflow.server.service.TypeReferenceService; import dev.lions.unionflow.server.service.TypeReferenceService;
import io.quarkus.security.identity.SecurityIdentity; import io.quarkus.security.identity.SecurityIdentity;
@@ -83,6 +87,40 @@ class TypeOrganisationReferenceResourceTest {
.contentType(ContentType.JSON); .contentType(ContentType.JSON);
} }
@Test
@TestSecurity(user = "superadmin@test.com", roles = {"SUPER_ADMIN"})
void creerType_withCategorieAndModules_forwardsFields() {
TypeReferenceResponse response = TypeReferenceResponse.builder()
.domaine("TYPE_ORGANISATION")
.code("TONTINE")
.libelle("Tontine")
.categorie("FINANCIER_SOLIDAIRE")
.modulesRequis("TONTINE,COTISATIONS")
.build();
response.setId(UUID.randomUUID());
ArgumentCaptor<CreateTypeReferenceRequest> captor =
ArgumentCaptor.forClass(CreateTypeReferenceRequest.class);
when(typeReferenceService.creer(captor.capture())).thenReturn(response);
String body = """
{"code":"TONTINE","libelle":"Tontine","domaine":"TYPE_ORGANISATION",
"categorie":"FINANCIER_SOLIDAIRE","modulesRequis":"TONTINE,COTISATIONS"}
""";
given()
.contentType(ContentType.JSON)
.body(body)
.when()
.post(BASE_PATH)
.then()
.statusCode(201);
CreateTypeReferenceRequest captured = captor.getValue();
assertEquals("FINANCIER_SOLIDAIRE", captured.categorie());
assertEquals("TONTINE,COTISATIONS", captured.modulesRequis());
assertEquals("TYPE_ORGANISATION", captured.domaine());
}
@Test @Test
@TestSecurity(user = "superadmin@test.com", roles = {"SUPER_ADMIN"}) @TestSecurity(user = "superadmin@test.com", roles = {"SUPER_ADMIN"})
void creerType_illegalArg_returns400() { void creerType_illegalArg_returns400() {

View File

@@ -201,7 +201,7 @@ class TypeReferenceServiceTest {
UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest( UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest(
null, // code (pas de changement) null, // code (pas de changement)
"Nouveau libellé", "Nouveau libellé",
null, null, null, null, null, null, null); null, null, null, null, null, null, null, null, null);
TypeReferenceResponse updated = typeReferenceService.modifier(created.getId(), updateRequest); TypeReferenceResponse updated = typeReferenceService.modifier(created.getId(), updateRequest);
assertThat(updated.getLibelle()).isEqualTo("Nouveau libellé"); assertThat(updated.getLibelle()).isEqualTo("Nouveau libellé");
@@ -212,7 +212,7 @@ class TypeReferenceServiceTest {
@DisplayName("modifier avec UUID inexistant lance IllegalArgumentException") @DisplayName("modifier avec UUID inexistant lance IllegalArgumentException")
void modifier_inexistant_throws() { void modifier_inexistant_throws() {
UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest( UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest(
null, "Libellé", null, null, null, null, null, null, null); null, "Libellé", null, null, null, null, null, null, null, null, null);
assertThatThrownBy(() -> typeReferenceService.modifier(UUID.randomUUID(), updateRequest)) assertThatThrownBy(() -> typeReferenceService.modifier(UUID.randomUUID(), updateRequest))
.isInstanceOf(IllegalArgumentException.class) .isInstanceOf(IllegalArgumentException.class)
@@ -317,7 +317,7 @@ class TypeReferenceServiceTest {
.build()); .build());
UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest( UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest(
newCode, null, null, null, null, null, null, null, null); newCode, null, null, null, null, null, null, null, null, null, null);
TypeReferenceResponse updated = typeReferenceService.modifier(created.getId(), updateRequest); TypeReferenceResponse updated = typeReferenceService.modifier(created.getId(), updateRequest);
assertThat(updated.getCode()).isEqualTo(newCode.toUpperCase()); assertThat(updated.getCode()).isEqualTo(newCode.toUpperCase());
@@ -340,7 +340,7 @@ class TypeReferenceServiceTest {
.build()); .build());
UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest( UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest(
"CHANGED_CODE", null, null, null, null, null, null, null, null); "CHANGED_CODE", null, null, null, null, null, null, null, null, null, null);
assertThatThrownBy(() -> typeReferenceService.modifier(created.getId(), updateRequest)) assertThatThrownBy(() -> typeReferenceService.modifier(created.getId(), updateRequest))
.isInstanceOf(IllegalArgumentException.class) .isInstanceOf(IllegalArgumentException.class)
@@ -365,7 +365,7 @@ class TypeReferenceServiceTest {
// Même code (case-insensitive) → !equalsIgnoreCase = false → if body skipped // Même code (case-insensitive) → !equalsIgnoreCase = false → if body skipped
UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest( UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest(
code.toLowerCase(), "Nouveau libelle", null, null, null, null, null, null, null); code.toLowerCase(), "Nouveau libelle", null, null, null, null, null, null, null, null, null);
TypeReferenceResponse updated = typeReferenceService.modifier(created.getId(), updateRequest); TypeReferenceResponse updated = typeReferenceService.modifier(created.getId(), updateRequest);
assertThat(updated).isNotNull(); assertThat(updated).isNotNull();
@@ -457,7 +457,7 @@ class TypeReferenceServiceTest {
// Modifier le code avec l'organisation non-null → L195-197 : orgId = entity.getOrganisation().getId() // Modifier le code avec l'organisation non-null → L195-197 : orgId = entity.getOrganisation().getId()
UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest( UpdateTypeReferenceRequest updateRequest = new UpdateTypeReferenceRequest(
newCode, null, null, null, null, null, null, null, null); newCode, null, null, null, null, null, null, null, null, null, null);
TypeReferenceResponse updated = typeReferenceService.modifier(created.getId(), updateRequest); TypeReferenceResponse updated = typeReferenceService.modifier(created.getId(), updateRequest);
@@ -491,7 +491,9 @@ class TypeReferenceServiceTest {
"warning", // severity "warning", // severity
10, // ordreAffichage 10, // ordreAffichage
true, // estDefaut true, // estDefaut
false // actif false, // actif
null, // categorie
null // modulesRequis
); );
TypeReferenceResponse updated = typeReferenceService.modifier(created.getId(), updateRequest); TypeReferenceResponse updated = typeReferenceService.modifier(created.getId(), updateRequest);