8 Commits

15 changed files with 289 additions and 99 deletions

1
.gitignore vendored
View File

@ -2,3 +2,4 @@
.env .env
node_modules/ node_modules/
hardcoded-strings-report.md hardcoded-strings-report.md
backend.env

View File

@ -1 +1 @@
node scripts/prepare-commit-msg.js "$1" "$2" #node scripts/prepare-commit-msg.js "$1" "$2"

2
Back-End/.gitignore vendored
View File

@ -5,3 +5,5 @@ data
*.dmp *.dmp
staticfiles staticfiles
/*/Configuration/application*.json /*/Configuration/application*.json
rapport_tests_back.json
tests_automatiques.json

View File

@ -37,7 +37,7 @@
<body> <body>
<div class="container"> <div class="container">
<div class="header"> <div class="header">
<img src="{{URL_DJANGO}}static/img/logo_min.svg" alt="Logo N3wt School" class="logo" /> <img src="{{URL_DJANGO}}/static/img/logo_min.svg" alt="Logo N3wt School" class="logo" />
<h1>Confirmation de souscription</h1> <h1>Confirmation de souscription</h1>
</div> </div>
<div class="content"> <div class="content">

View File

@ -1 +1 @@
__version__ = "0.0.2" __version__ = "0.0.3"

View File

@ -70,3 +70,7 @@ xhtml2pdf==0.2.16
channels==4.0.0 channels==4.0.0
channels-redis==4.1.0 channels-redis==4.1.0
daphne==4.1.0 daphne==4.1.0
pytest
djangorestframework
pytest-django
pytest-json-report

View File

@ -0,0 +1,39 @@
"""
Starter de tests automatiques pour valider tous les endpoints définis dans les fichiers urls.py du projet Django N3WT-SCHOOL.
Chaque endpoint est testé pour la réponse HTTP attendue (200, 401, 403, 404, etc.).
"""
import pytest
from django.urls import reverse, resolve
from rest_framework.test import APIClient
from django.conf import settings
from django.urls import get_resolver
@pytest.mark.django_db
class TestAllEndpoints:
@pytest.fixture(autouse=True)
def setup(self):
self.client = APIClient()
def get_all_url_patterns(self):
resolver = get_resolver()
patterns = resolver.url_patterns
urls = []
def extract(patterns, prefix=""):
for p in patterns:
if hasattr(p, 'url_patterns'):
extract(p.url_patterns, prefix + str(p.pattern))
else:
urls.append(prefix + str(p.pattern))
extract(patterns)
return urls
def test_all_endpoints_anonymous(self):
urls = self.get_all_url_patterns()
for url in urls:
if '<' in url: # skip dynamic urls for starter
continue
try:
response = self.client.get(url)
assert response.status_code in [200, 401, 403, 404]
except Exception as e:
print(f"Erreur sur {url}: {e}")

View File

@ -0,0 +1,124 @@
"""
Tests automatiques pour les endpoints Auth de l'API N3WT-SCHOOL.
- Teste les endpoints GET, y compris dynamiques.
- Teste l'authentification (login JWT) et l'accès aux endpoints protégés.
- Vérifie la structure JSON des réponses principales.
"""
import pytest
from django.urls import reverse
from rest_framework.test import APIClient
from Auth.models import Profile, ProfileRole
from Establishment.models import Establishment
from django.contrib.auth.hashers import make_password
@pytest.mark.django_db
class TestAuthEndpoints:
@pytest.fixture(autouse=True)
def setup(self, db):
self.client = APIClient()
# Création d'un établissement de test
self.establishment = Establishment.objects.create(
name="Etablissement Test",
address="1 rue du test",
total_capacity=100,
establishment_type=[1],
evaluation_frequency=1,
licence_code="LIC123",
is_active=True
)
# Création d'un utilisateur de test
self.test_email = 'testuser@example.com'
self.test_password = 'testpass123'
self.profile = Profile.objects.create(
email=self.test_email,
username=self.test_email,
password=make_password(self.test_password)
)
self.profile_role = ProfileRole.objects.create(
profile=self.profile,
role_type=1, # ADMIN
establishment=self.establishment,
is_active=True
)
def test_csrf(self):
response = self.client.get('/Auth/csrf')
assert response.status_code == 200
assert 'csrfToken' in response.json()
def test_login(self):
response = self.client.post('/Auth/login', {
'email': self.test_email,
'password': self.test_password
}, format='json')
assert response.status_code in [200, 401]
if response.status_code == 200:
assert 'access' in response.json() or 'token' in response.json()
def test_profiles(self):
# GET /Auth/profiles
response = self.client.get(f'/Auth/profiles')
assert response.status_code in [200, 401, 403]
if response.status_code == 200:
# Vérifie que le profil de test existe dans la liste
emails = [p.get('email') for p in response.json() if isinstance(p, dict)]
assert self.test_email in emails
def test_profiles_id(self):
# GET /Auth/profiles/<id>
response = self.client.get(f'/Auth/profiles/{self.profile.id}')
assert response.status_code in [200, 401, 403, 404]
if response.status_code == 200:
data = response.json()
assert data.get('email') == self.test_email
def test_profile_roles(self):
# GET /Auth/profileRoles avec paramètres requis
params = {
'establishment_id': self.establishment.id,
'filter': 'school'
}
response = self.client.get('/Auth/profileRoles', params)
assert response.status_code in [200, 401, 403, 400]
if response.status_code == 200:
results = response.json()
# Adapter à la structure réelle de la réponse : clé 'profilesRoles'
if isinstance(results, dict) and 'profilesRoles' in results:
results = results['profilesRoles']
found = any(
r.get('profile') == self.profile.id and r.get('role_type') == 1
for r in results if isinstance(r, dict)
)
assert found
def test_profile_roles_id(self):
# GET /Auth/profileRoles/<id>
response = self.client.get(f'/Auth/profileRoles/{self.profile_role.id}')
assert response.status_code in [200, 401, 403, 404]
if response.status_code == 200:
data = response.json()
assert data.get('profile') == self.profile.id
assert data.get('role_type') == 1
def test_reset_password(self):
# POST /Auth/resetPassword/<code> (méthode attendue)
response = self.client.post('/Auth/resetPassword/ABCDEF', {
'password1': 'newpass123',
'password2': 'newpass123'
}, format='json')
assert response.status_code in [200, 400, 404]
# 400 attendu si le code est invalide ou expiré
def test_info_session(self):
# GET /Auth/infoSession (protégé)
login = self.client.post('/Auth/login', {
'email': self.test_email,
'password': self.test_password
}, format='json')
if login.status_code == 200 and ('access' in login.json() or 'token' in login.json()):
token = login.json().get('access') or login.json().get('token')
self.client.credentials(HTTP_AUTHORIZATION=f'Bearer {token}')
response = self.client.get('/Auth/infoSession')
assert response.status_code in [200, 401, 403]
else:
pytest.skip('Impossible de sauthentifier pour tester infoSession')

View File

@ -2,6 +2,13 @@
Toutes les modifications notables apportées à ce projet seront documentées dans ce fichier. Toutes les modifications notables apportées à ce projet seront documentées dans ce fichier.
### [0.0.3](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/compare/0.0.2...0.0.3) (2025-06-01)
### Corrections de bugs
* Ajout d'un '/' en fin d'URL ([67cea2f](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/67cea2f1c6edae8eed5e024c79b1e19d08788d4c))
### 0.0.2 (2025-06-01) ### 0.0.2 (2025-06-01)
@ -161,7 +168,7 @@ Toutes les modifications notables apportées à ce projet seront documentées da
* ajout de credential include dans get CSRF ([c161fa7](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/c161fa7e7568437ba501a565ad53192b9cb3b6f3)) * ajout de credential include dans get CSRF ([c161fa7](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/c161fa7e7568437ba501a565ad53192b9cb3b6f3))
* Ajout de l'établissement dans la requête KPI récupérant les ([ada2a44](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/ada2a44c3ec9ba45462bd7e78984dfa38008e231)) * Ajout de l'établissement dans la requête KPI récupérant les ([ada2a44](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/ada2a44c3ec9ba45462bd7e78984dfa38008e231))
* Ajout des niveaux scolaires dans le back [[#27](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/issues/27)] ([05542df](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/05542dfc40649fd194ee551f0298f1535753f219)) * Ajout des niveaux scolaires dans le back [[#27](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/issues/27)] ([05542df](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/05542dfc40649fd194ee551f0298f1535753f219))
* ajout des urls prod et demo ([b780e8b](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/b780e8b4ff4b5e6bbbccf1c77a56136c0c4affcb)), closes [#1](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/issues/1) [#123](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/issues/123) * ajout des urls prod et demo ([043d93d](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/043d93dcc476e5eb3962fdbe0f6a81b937122647))
* Ajout du % ou € en mode édition de réduction ([f2628bb](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/f2628bb45a14da42d014e42b1521820ffeedfb33)) * Ajout du % ou € en mode édition de réduction ([f2628bb](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/f2628bb45a14da42d014e42b1521820ffeedfb33))
* Ajout du controle sur le format des dates ([e538ac3](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/e538ac3d56294d4e647a38d730168ea567c76f04)) * Ajout du controle sur le format des dates ([e538ac3](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/e538ac3d56294d4e647a38d730168ea567c76f04))
* Ajout du mode Visu ([e1c6073](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/e1c607308c12cf75695e9d4593dc27ebe74e6a4f)) * Ajout du mode Visu ([e1c6073](https://git.v0id.ovh:5022/n3wt-innov/n3wt-school/commit/e1c607308c12cf75695e9d4593dc27ebe74e6a4f))

View File

@ -1,6 +1,6 @@
{ {
"name": "n3wt-school-front-end", "name": "n3wt-school-front-end",
"version": "0.0.2", "version": "0.0.3",
"private": true, "private": true,
"scripts": { "scripts": {
"dev": "next dev", "dev": "next dev",

22
conf/backend.env.default Normal file
View File

@ -0,0 +1,22 @@
TZ="Europe/Paris"
TEST_MODE=true
CSRF_COOKIE_SECURE=true
CSRF_COOKIE_DOMAIN=".localhost"
CORS_ALLOWED_ORIGINS=http://localhost:3000,http://127.0.0.1:3000,http://localhost:8080,http://127.0.0.1:8080
CSRF_TRUSTED_ORIGINS=http://localhost:3000,http://127.0.0.1:3000,http://localhost:8080,http://127.0.0.1:8080
BASE_URL=http://localhost:3000
DEBUG=false
EMAIL_HOST="smtp.hostinger.com"
EMAIL_PORT="587"
EMAIL_HOST_USER=""
EMAIL_HOST_PASSWORD=''
EMAIL_USE_TLS=true
EMAIL_USE_SSL=false
DB_NAME="school"
DB_USER="postgres"
DB_PASSWORD="postgres"
DB_HOST="database"
DB_PORT="5432"
URL_DJANGO="http://localhost:8080"
SECRET_KEY="<SIGNINGKEY>"

View File

@ -1,15 +1,19 @@
services: services:
redis: redis:
image: 'redis:latest' image: "redis:latest"
volumes:
- redis-data:/data
expose: expose:
- 6379 - 6379
environment: environment:
- TZ=Europe/Paris - TZ=Europe/Paris
database: database:
image: 'postgres:latest' image: "postgres:latest"
expose: expose:
- 5432 - 5432
volumes:
- postgres-data:/var/lib/postgresql/data
environment: environment:
POSTGRES_USER: postgres POSTGRES_USER: postgres
POSTGRES_PASSWORD: postgres POSTGRES_PASSWORD: postgres
@ -20,17 +24,13 @@ services:
image: git.v0id.ovh/n3wt-innov/n3wt-school/backend:latest image: git.v0id.ovh/n3wt-innov/n3wt-school/backend:latest
ports: ports:
- 8080:8080 - 8080:8080
environment: env_file: "./conf/backend.env"
- TZ=Europe/Paris
- TEST_MODE=True
links: links:
- "database:database" - "database:database"
- "redis:redis" - "redis:redis"
depends_on: depends_on:
- redis - redis
- database - database
volumes:
- ./conf/application.json:/Back-End/Subscriptions/Configuration/application.json
command: python start.py command: python start.py
frontend: frontend:
@ -40,6 +40,8 @@ services:
environment: environment:
- TZ=Europe/Paris - TZ=Europe/Paris
- NODE_ENV=production - NODE_ENV=production
- NEXT_PUBLIC_API_URL=http://toto:8080 volumes:
depends_on: - ./conf/env:/app/.env
- backend volumes:
postgres-data:
redis-data:

View File

@ -1,55 +1,24 @@
services: services:
redis: redis:
image: "redis:latest" image: "redis:latest"
ports: volumes:
- 6379:6379 - redis-data:/data
expose:
- 6379
environment: environment:
- TZ=Europe/Paris - TZ=Europe/Paris
database: database:
image: "postgres:latest" image: "postgres:latest"
ports: expose:
- 5432:5432 - 5432
volumes:
- postgres-data:/var/lib/postgresql/data
environment: environment:
POSTGRES_USER: postgres POSTGRES_USER: postgres
POSTGRES_PASSWORD: postgres POSTGRES_PASSWORD: postgres
POSTGRES_DB: school POSTGRES_DB: school
TZ: Europe/Paris TZ: Europe/Paris
# docuseal_db:
# image: postgres:latest
# environment:
# POSTGRES_USER: postgres
# POSTGRES_PASSWORD: postgres
# DOCUSEAL_DB_HOST: docuseal_db
# POSTGRES_DB: docuseal
# ports:
# - 5433:5432 # port différent si besoin d'accès direct depuis l'hôte
# docuseal:
# image: docuseal/docuseal:latest
# container_name: docuseal_app
# depends_on:
# - docuseal_db
# ports:
# - "3001:3000"
# environment:
# DATABASE_URL: postgresql://postgres:postgres@docuseal_db:5432/docuseal
# volumes:
# - ./docuseal:/data/docuseal
# caddy:
# image: caddy:2
# container_name: caddy
# restart: unless-stopped
# ports:
# - "4000:4443"
# volumes:
# - ./Caddyfile:/etc/caddy/Caddyfile
# - caddy_data:/data
# - caddy_config:/config
# depends_on:
# - docuseal
backend: backend:
build: build:
@ -58,54 +27,15 @@ services:
- 8080:8080 - 8080:8080
volumes: volumes:
- ./Back-End:/Back-End - ./Back-End:/Back-End
environment: env_file: "./conf/backend.env"
- TZ=Europe/Paris
- TEST_MODE=True
- CORS_ALLOWED_ORIGINS=http://localhost:3000,http://127.0.0.1:3000,http://localhost:8080,http://127.0.0.1:8080
- CSRF_TRUSTED_ORIGINS=http://localhost:3000,http://127.0.0.1:3000,http://localhost:8080,http://127.0.0.1:8080
- BASE_URL=http://localhost:3000
links: links:
- "database:database" - "database:database"
- "redis:redis" - "redis:redis"
depends_on: depends_on:
- redis - redis
- database - database
#- docuseal
command: python start.py command: python start.py
# init_docuseal_users:
# build:
# context: .
# dockerfile: Dockerfile
# depends_on:
# - docuseal
# environment:
# DOCUSEAL_DB_HOST: docuseal_db
# POSTGRES_USER: postgres
# POSTGRES_PASSWORD: postgres
# USER_FIRST_NAME: n3wt
# USER_LAST_NAME: school
# USER_COMPANY: n3wt.innov
# USER_EMAIL: n3wt.school@gmail.com
# USER_PASSWORD: n3wt1234
# volumes:
# - ./initDocusealUsers.sh:/docker-entrypoint-initdb.d/initDocusealUsers.sh
# frontend:
# build:
# context: ./Front-End
# args:
# - BUILD_MODE=development
# ports:
# - 3000:3000
# volumes:
# - ./Front-End:/app
# env_file:
# - .env
# environment:
# - TZ=Europe/Paris
# depends_on:
# - backend
volumes: volumes:
caddy_data: postgres-data:
caddy_config: redis-data:

View File

@ -0,0 +1,59 @@
# Documentation des tests automatiques
Ce document décrit la structure et lutilisation du starter de tests automatiques pour valider tous les endpoints exposés par les fichiers `urls.py` des applications Django du Back-End.
## Objectif
- Vérifier automatiquement que chaque route définie dans le projet répond bien à une requête HTTP (statut attendu : 200, 401, 403, 404).
- Permettre une validation rapide de la couverture des endpoints lors de chaque pipeline CI.
## Structure
- Le fichier principal est `Back-End/test_all_endpoints.py`.
- Ce test utilise `pytest` et `pytest-django` pour parcourir toutes les routes du projet et effectuer une requête GET anonyme.
- Les routes dynamiques (avec paramètres) sont ignorées dans ce starter.
## Exécution
1. Installer les dépendances si besoin :
```sh
pip install pytest pytest-django djangorestframework
```
2. Lancer les tests :
```sh
pytest Back-End/test_all_endpoints.py
```
## Intégration CI
- Ajouter la commande de test dans votre pipeline CI (GitHub Actions, GitLab CI, Jenkins, etc.) :
```sh
pytest Back-End/test_all_endpoints.py
```
## Personnalisation
- Pour tester les routes nécessitant une authentification ou des paramètres, compléter le test avec des cas spécifiques.
- Pour chaque nouvelle route, le test sexécutera automatiquement.
## Ajout
- Ajout d'un fichier de tests automatiques dédié à Auth (`test_auth_endpoints.py`) pour tester tous les endpoints Auth (GET, dynamiques, login JWT, accès protégé, structure JSON).
- Les tests créent un utilisateur et un profilRole de test, réalisent un login, et vérifient les accès aux endpoints principaux, y compris les routes dynamiques et protégées.
## Utilisation
- Lancer les tests avec :
```bash
pytest --json-report --json-report-file=tests_automatiques.json
```
- Le rapport inclura les résultats détaillés pour chaque endpoint Auth.
## Extension
- Étendre sur le même modèle pour les autres applications (School, Subscriptions, etc.)
- Ajouter des tests POST/PUT/DELETE et des cas derreur/permissions.
---
Pour toute question ou évolution, se référer au ticket associé.

View File

@ -1,6 +1,6 @@
{ {
"name": "n3wt-school", "name": "n3wt-school",
"version": "0.0.2", "version": "0.0.3",
"scripts": { "scripts": {
"prepare": "husky", "prepare": "husky",
"release": "standard-version", "release": "standard-version",