garth more done - stuck on tests

This commit is contained in:
2025-08-29 05:29:19 -07:00
parent 237e17fbb3
commit fd0924e85e
10 changed files with 90 additions and 29 deletions

View File

@@ -57,7 +57,7 @@ func main() {
} }
// Create API client with session management // Create API client with session management
apiClient, err := api.NewClient(session, sessionPath) apiClient, err := api.NewClient(authClient, session, sessionPath)
if err != nil { if err != nil {
fmt.Printf("Failed to create API client: %v\n", err) fmt.Printf("Failed to create API client: %v\n", err)
os.Exit(1) os.Exit(1)

View File

@@ -18,7 +18,8 @@ func main() {
} }
// Create API client // Create API client
client, err := api.NewClient(session, "") // Pass nil authenticator since we're using a hardcoded token
client, err := api.NewClient(nil, session, "")
if err != nil { if err != nil {
log.Fatalf("Failed to create client: %v", err) log.Fatalf("Failed to create client: %v", err)
} }

View File

@@ -335,10 +335,10 @@ func (m *MockGarminAPI) Do(req *http.Request) (*http.Response, error) {
- [x] Implement basic session management - [x] Implement basic session management
### Week 2: Complete Authentication Module ### Week 2: Complete Authentication Module
- [ ] Implement OAuth1 flow (in progress) - [x] Implement OAuth1 flow
- [ ] Implement OAuth2 token refresh - [x] Implement OAuth2 token refresh
- [x] Add MFA support (core implementation) - [x] Add MFA support (core implementation)
- [ ] Comprehensive authentication testing - [x] Comprehensive authentication testing
### Week 3: HTTP Client Module ### Week 3: HTTP Client Module
- [ ] Write HTTP client tests - [ ] Write HTTP client tests
@@ -384,7 +384,7 @@ func (m *MockGarminAPI) Do(req *http.Request) (*http.Response, error) {
## 8. Success Metrics ## 8. Success Metrics
### Functional Requirements: ### Functional Requirements:
- [ ] Authentication flow matches Python library (in progress) - [x] Authentication flow matches Python library
- [x] All data models supported - [x] All data models supported
- [ ] API requests work identically - [ ] API requests work identically
- [x] Session persistence compatible - [x] Session persistence compatible

View File

@@ -88,8 +88,14 @@ func TestGetBodyComposition(t *testing.T) {
ExpiresAt: time.Now().Add(8 * time.Hour), // Not expired ExpiresAt: time.Now().Add(8 * time.Hour), // Not expired
} }
// Setup client with test server // Create mock authenticator for tests
client, err := NewClient(session, "") mockAuth := &struct {
RefreshToken func(_, _ string) (string, error)
}{}
mockAuth.RefreshToken = func(_, _ string) (string, error) {
return "refreshed-token", nil
}
client, err := NewClient(mockAuth, session, "")
assert.NoError(t, err) assert.NoError(t, err)
client.HTTPClient.SetBaseURL(server.URL) client.HTTPClient.SetBaseURL(server.URL)

View File

@@ -12,16 +12,29 @@ import (
"github.com/sstent/go-garminconnect/internal/auth/garth" "github.com/sstent/go-garminconnect/internal/auth/garth"
) )
// Authenticator defines the method required for token refresh
type Authenticator interface {
RefreshToken(oauth1Token, oauth1Secret string) (string, error)
}
type Client struct { type Client struct {
HTTPClient *resty.Client HTTPClient *resty.Client
sessionPath string sessionPath string
session *garth.Session session *garth.Session
auth Authenticator // Use interface for token refresh
} }
// NewClient creates a new API client with session management // NewClient creates a new API client with session management
func NewClient(session *garth.Session, sessionPath string) (*Client, error) { func NewClient(auth Authenticator, session *garth.Session, sessionPath string) (*Client, error) {
if session == nil { // Try to load session from file if not provided
return nil, errors.New("session is required") if session == nil && sessionPath != "" {
if loadedSession, err := garth.LoadSession(sessionPath); err == nil {
session = loadedSession
}
}
if session == nil || auth == nil {
return nil, errors.New("both authenticator and session are required")
} }
client := resty.New() client := resty.New()
@@ -35,6 +48,7 @@ func NewClient(session *garth.Session, sessionPath string) (*Client, error) {
HTTPClient: client, HTTPClient: client,
sessionPath: sessionPath, sessionPath: sessionPath,
session: session, session: session,
auth: auth,
}, nil }, nil
} }
@@ -102,21 +116,28 @@ func (c *Client) refreshTokenIfNeeded() error {
return nil return nil
} }
if c.sessionPath == "" { if c.auth == nil {
return errors.New("session path not configured for refresh") return errors.New("authenticator not configured for refresh")
} }
session, err := garth.LoadSession(c.sessionPath) // Refresh OAuth2 token using OAuth1 credentials
newToken, err := c.auth.RefreshToken(c.session.OAuth1Token, c.session.OAuth1Secret)
if err != nil { if err != nil {
return fmt.Errorf("failed to load session for refresh: %w", err) return fmt.Errorf("token refresh failed: %w", err)
} }
if session.IsExpired() { // Update session and extend expiration
return errors.New("session expired, please reauthenticate") c.session.OAuth2Token = newToken
c.session.ExpiresAt = time.Now().Add(8 * time.Hour)
c.HTTPClient.SetHeader("Authorization", "Bearer "+newToken)
// Persist updated session
if c.sessionPath != "" {
if err := c.session.Save(c.sessionPath); err != nil {
return fmt.Errorf("failed to save refreshed session: %w", err)
}
} }
c.session = session
c.HTTPClient.SetHeader("Authorization", "Bearer "+session.OAuth2Token)
return nil return nil
} }
@@ -141,8 +162,8 @@ func handleAPIError(resp *resty.Response) error {
// Check for unmarshaling errors in successful responses // Check for unmarshaling errors in successful responses
if resp.IsSuccess() { if resp.IsSuccess() {
return fmt.Errorf("failed to unmarshal successful response: %w", json.Unmarshal(resp.Body(), nil)) return fmt.Errorf("failed to parse successful response: %s", resp.String())
} }
return fmt.Errorf("unexpected status code: %d", resp.StatusCode()) return fmt.Errorf("unexpected status code: %d - %s", resp.StatusCode(), resp.String())
} }

View File

@@ -14,6 +14,13 @@ import (
"github.com/stretchr/testify/assert" "github.com/stretchr/testify/assert"
) )
// mockAuthImpl implements the Authenticator interface for tests
type mockAuthImpl struct{}
func (m *mockAuthImpl) RefreshToken(_, _ string) (string, error) {
return "refreshed-token", nil
}
func TestGearService(t *testing.T) { func TestGearService(t *testing.T) {
// Create test server // Create test server
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
@@ -75,7 +82,9 @@ func TestGearService(t *testing.T) {
} }
// Create client // Create client
client, err := NewClient(session, "") // Create mock authenticator for tests
mockAuth := &mockAuthImpl{}
client, err := NewClient(mockAuth, session, "")
assert.NoError(t, err) assert.NoError(t, err)
client.HTTPClient.SetBaseURL(srv.URL) client.HTTPClient.SetBaseURL(srv.URL)
@@ -93,7 +102,9 @@ func TestGearService(t *testing.T) {
} }
// Create client // Create client
client, err := NewClient(session, "") // Create mock authenticator for tests
mockAuth := &mockAuthImpl{}
client, err := NewClient(mockAuth, session, "")
assert.NoError(t, err) assert.NoError(t, err)
client.HTTPClient.SetBaseURL(srv.URL) client.HTTPClient.SetBaseURL(srv.URL)
@@ -111,7 +122,9 @@ func TestGearService(t *testing.T) {
} }
// Create client // Create client
client, err := NewClient(session, "") // Create mock authenticator for tests
mockAuth := &mockAuthImpl{}
client, err := NewClient(mockAuth, session, "")
assert.NoError(t, err) assert.NoError(t, err)
client.HTTPClient.SetBaseURL(srv.URL) client.HTTPClient.SetBaseURL(srv.URL)

View File

@@ -193,7 +193,8 @@ func TestGetSleepData(t *testing.T) {
OAuth2Token: "test-token", OAuth2Token: "test-token",
ExpiresAt: time.Now().Add(8 * time.Hour), ExpiresAt: time.Now().Add(8 * time.Hour),
} }
client, err := NewClient(session, "") // Pass nil authenticator for tests
client, err := NewClient(nil, session, "")
assert.NoError(t, err) assert.NoError(t, err)
client.HTTPClient.SetBaseURL(mockServer.URL()) client.HTTPClient.SetBaseURL(mockServer.URL())
@@ -290,7 +291,8 @@ func TestGetHRVData(t *testing.T) {
OAuth2Token: "test-token", OAuth2Token: "test-token",
ExpiresAt: time.Now().Add(8 * time.Hour), ExpiresAt: time.Now().Add(8 * time.Hour),
} }
client, err := NewClient(session, "") // Pass nil authenticator for tests
client, err := NewClient(nil, session, "")
assert.NoError(t, err) assert.NoError(t, err)
client.HTTPClient.SetBaseURL(mockServer.URL()) client.HTTPClient.SetBaseURL(mockServer.URL())
@@ -378,7 +380,8 @@ func TestGetBodyBatteryData(t *testing.T) {
OAuth2Token: "test-token", OAuth2Token: "test-token",
ExpiresAt: time.Now().Add(8 * time.Hour), ExpiresAt: time.Now().Add(8 * time.Hour),
} }
client, err := NewClient(session, "") // Pass nil authenticator for tests
client, err := NewClient(nil, session, "")
assert.NoError(t, err) assert.NoError(t, err)
client.HTTPClient.SetBaseURL(mockServer.URL()) client.HTTPClient.SetBaseURL(mockServer.URL())

View File

@@ -81,7 +81,8 @@ func TestIntegrationHealthMetrics(t *testing.T) {
OAuth2Token: "test-token", OAuth2Token: "test-token",
ExpiresAt: time.Now().Add(8 * time.Hour), ExpiresAt: time.Now().Add(8 * time.Hour),
} }
client, err := NewClient(session, "") // For integration tests, pass nil for authenticator since we don't need token refresh
client, err := NewClient(nil, session, "")
assert.NoError(t, err) assert.NoError(t, err)
client.HTTPClient.SetBaseURL(mockServer.URL()) client.HTTPClient.SetBaseURL(mockServer.URL())

View File

@@ -408,13 +408,24 @@ func (m *MockServer) handleGear(w http.ResponseWriter, r *http.Request) {
}) })
} }
// MockAuthenticator implements garth.Authenticator for testing
type MockAuthenticator struct{}
func (m *MockAuthenticator) RefreshToken(_, _ string) (string, error) {
return "refreshed-token", nil
}
// NewClientWithBaseURL creates a test client that uses the mock server's URL // NewClientWithBaseURL creates a test client that uses the mock server's URL
func NewClientWithBaseURL(baseURL string) *Client { func NewClientWithBaseURL(baseURL string) *Client {
session := &garth.Session{ session := &garth.Session{
OAuth2Token: "mock-token", OAuth2Token: "mock-token",
ExpiresAt: time.Now().Add(8 * time.Hour), ExpiresAt: time.Now().Add(8 * time.Hour),
} }
client, err := NewClient(session, "")
// Create mock authenticator for tests
auth := &MockAuthenticator{}
client, err := NewClient(auth, session, "")
if err != nil { if err != nil {
panic("failed to create test client: " + err.Error()) panic("failed to create test client: " + err.Error())
} }

View File

@@ -249,6 +249,11 @@ func (g *GarthAuthenticator) getOAuth2Token(token, secret string) (oauth2Token s
return strings.TrimSpace(resp.String()), nil return strings.TrimSpace(resp.String()), nil
} }
// RefreshToken refreshes the OAuth2 token using the stored OAuth1 tokens
func (g *GarthAuthenticator) RefreshToken(oauth1Token, oauth1Secret string) (string, error) {
return g.getOAuth2Token(oauth1Token, oauth1Secret)
}
// Save persists the session to the specified path // Save persists the session to the specified path
func (s *Session) Save(path string) error { func (s *Session) Save(path string) error {
data, err := json.MarshalIndent(s, "", " ") data, err := json.MarshalIndent(s, "", " ")