KeychainAccessTests.swift 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674
  1. //
  2. // KeychainAccessTests.swift
  3. // KeychainAccessTests
  4. //
  5. // Created by kishikawa katsumi on 2014/12/24.
  6. // Copyright (c) 2014 kishikawa katsumi. All rights reserved.
  7. //
  8. import Foundation
  9. import XCTest
  10. import KeychainAccess
  11. class KeychainAccessTests: XCTestCase {
  12. override func setUp() {
  13. super.setUp()
  14. Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared").removeAll()
  15. Keychain(service: "Twitter").removeAll()
  16. Keychain(server: NSURL(string: "https://example.com")!, protocolType: .HTTPS).removeAll()
  17. Keychain().removeAll()
  18. }
  19. override func tearDown() {
  20. super.tearDown()
  21. }
  22. func locally(x: () -> ()) {
  23. x()
  24. }
  25. // MARK:
  26. func testGenericPassword() {
  27. locally {
  28. // Add Keychain items
  29. let keychain = Keychain(service: "Twitter")
  30. keychain.set("kishikawa_katsumi", key: "username")
  31. keychain.set("password_1234", key: "password")
  32. let username = keychain.get("username")
  33. XCTAssertEqual(username!, "kishikawa_katsumi")
  34. let password = keychain.get("password")
  35. XCTAssertEqual(password!, "password_1234")
  36. }
  37. locally {
  38. // Update Keychain items
  39. let keychain = Keychain(service: "Twitter")
  40. keychain.set("katsumi_kishikawa", key: "username")
  41. keychain.set("1234_password", key: "password")
  42. let username = keychain.get("username")
  43. XCTAssertEqual(username!, "katsumi_kishikawa")
  44. let password = keychain.get("password")
  45. XCTAssertEqual(password!, "1234_password")
  46. }
  47. locally {
  48. // Remove Keychain items
  49. let keychain = Keychain(service: "Twitter")
  50. keychain.remove("username")
  51. keychain.remove("password")
  52. XCTAssertNil(keychain.get("username"))
  53. XCTAssertNil(keychain.get("password"))
  54. }
  55. }
  56. func testGenericPasswordSubscripting() {
  57. locally {
  58. // Add Keychain items
  59. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  60. keychain["username"] = "kishikawa_katsumi"
  61. keychain["password"] = "password_1234"
  62. let username = keychain["username"]
  63. XCTAssertEqual(username!, "kishikawa_katsumi")
  64. let password = keychain["password"]
  65. XCTAssertEqual(password!, "password_1234")
  66. }
  67. locally {
  68. // Update Keychain items
  69. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  70. keychain["username"] = "katsumi_kishikawa"
  71. keychain["password"] = "1234_password"
  72. let username = keychain["username"]
  73. XCTAssertEqual(username!, "katsumi_kishikawa")
  74. let password = keychain["password"]
  75. XCTAssertEqual(password!, "1234_password")
  76. }
  77. locally {
  78. // Remove Keychain items
  79. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  80. keychain["username"] = nil
  81. keychain["password"] = nil
  82. XCTAssertNil(keychain["username"])
  83. XCTAssertNil(keychain["password"])
  84. }
  85. }
  86. // MARK:
  87. func testInternetPassword() {
  88. locally {
  89. // Add Keychain items
  90. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  91. keychain.set("kishikawa_katsumi", key: "username")
  92. keychain.set("password_1234", key: "password")
  93. let username = keychain.get("username")
  94. XCTAssertEqual(username!, "kishikawa_katsumi")
  95. let password = keychain.get("password")
  96. XCTAssertEqual(password!, "password_1234")
  97. }
  98. locally {
  99. // Update Keychain items
  100. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  101. keychain.set("katsumi_kishikawa", key: "username")
  102. keychain.set("1234_password", key: "password")
  103. let username = keychain.get("username")
  104. XCTAssertEqual(username!, "katsumi_kishikawa")
  105. let password = keychain.get("password")
  106. XCTAssertEqual(password!, "1234_password")
  107. }
  108. locally {
  109. // Remove Keychain items
  110. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  111. keychain.remove("username")
  112. keychain.remove("password")
  113. XCTAssertNil(keychain.get("username"))
  114. XCTAssertNil(keychain.get("password"))
  115. }
  116. }
  117. func testInternetPasswordSubscripting() {
  118. locally {
  119. // Add Keychain items
  120. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  121. keychain["username"] = "kishikawa_katsumi"
  122. keychain["password"] = "password_1234"
  123. let username = keychain["username"]
  124. XCTAssertEqual(username!, "kishikawa_katsumi")
  125. let password = keychain["password"]
  126. XCTAssertEqual(password!, "password_1234")
  127. }
  128. locally {
  129. // Update Keychain items
  130. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  131. keychain["username"] = "katsumi_kishikawa"
  132. keychain["password"] = "1234_password"
  133. let username = keychain["username"]
  134. XCTAssertEqual(username!, "katsumi_kishikawa")
  135. let password = keychain["password"]
  136. XCTAssertEqual(password!, "1234_password")
  137. }
  138. locally {
  139. // Remove Keychain items
  140. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  141. keychain["username"] = nil
  142. keychain["password"] = nil
  143. XCTAssertNil(keychain["username"])
  144. XCTAssertNil(keychain["password"])
  145. }
  146. }
  147. // MARK:
  148. func testDefaultInitializer() {
  149. let keychain = Keychain()
  150. XCTAssertEqual(keychain.service, "")
  151. XCTAssertNil(keychain.accessGroup)
  152. }
  153. func testInitializerWithService() {
  154. let keychain = Keychain(service: "com.example.github-token")
  155. XCTAssertEqual(keychain.service, "com.example.github-token")
  156. XCTAssertNil(keychain.accessGroup)
  157. }
  158. func testInitializerWithAccessGroup() {
  159. let keychain = Keychain(accessGroup: "12ABCD3E4F.shared")
  160. XCTAssertEqual(keychain.service, "")
  161. XCTAssertEqual(keychain.accessGroup!, "12ABCD3E4F.shared")
  162. }
  163. func testInitializerWithServiceAndAccessGroup() {
  164. let keychain = Keychain(service: "com.example.github-token", accessGroup: "12ABCD3E4F.shared")
  165. XCTAssertEqual(keychain.service, "com.example.github-token")
  166. XCTAssertEqual(keychain.accessGroup!, "12ABCD3E4F.shared")
  167. }
  168. func testInitializerWithServer() {
  169. let URL = NSURL(string: "https://kishikawakatsumi.com")!
  170. let keychain = Keychain(server: URL, protocolType: .HTTPS)
  171. XCTAssertEqual(keychain.server, URL)
  172. XCTAssertEqual(keychain.protocolType, ProtocolType.HTTPS)
  173. XCTAssertEqual(keychain.authenticationType, AuthenticationType.Default)
  174. }
  175. func testInitializerWithServerAndAuthenticationType() {
  176. let URL = NSURL(string: "https://kishikawakatsumi.com")!
  177. let keychain = Keychain(server: URL, protocolType: .HTTPS, authenticationType: .HTMLForm)
  178. XCTAssertEqual(keychain.server, URL)
  179. XCTAssertEqual(keychain.protocolType, ProtocolType.HTTPS)
  180. XCTAssertEqual(keychain.authenticationType, AuthenticationType.HTMLForm)
  181. }
  182. // MARK:
  183. func testContains() {
  184. let keychain = Keychain(service: "Twitter")
  185. XCTAssertFalse(keychain.contains("username"), "not stored username")
  186. XCTAssertFalse(keychain.contains("password"), "not stored password")
  187. keychain.set("kishikawakatsumi", key: "username")
  188. XCTAssertTrue(keychain.contains("username"), "stored username")
  189. XCTAssertFalse(keychain.contains("password"), "not stored password")
  190. keychain.set("password1234", key: "password")
  191. XCTAssertTrue(keychain.contains("username"), "stored username")
  192. XCTAssertTrue(keychain.contains("password"), "stored password")
  193. }
  194. // MARK:
  195. func testSetString() {
  196. let keychain = Keychain(service: "Twitter")
  197. XCTAssertNil(keychain.get("username"), "not stored username")
  198. XCTAssertNil(keychain.get("password"), "not stored password")
  199. keychain.set("kishikawakatsumi", key: "username")
  200. XCTAssertEqual(keychain.get("username")!, "kishikawakatsumi", "stored username")
  201. XCTAssertNil(keychain.get("password"), "not stored password")
  202. keychain.set("password1234", key: "password")
  203. XCTAssertEqual(keychain.get("username")!, "kishikawakatsumi", "stored username")
  204. XCTAssertEqual(keychain.get("password")!, "password1234", "stored password")
  205. }
  206. func testSetData() {
  207. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  208. let JSONData: NSData?
  209. do {
  210. JSONData = try NSJSONSerialization.dataWithJSONObject(JSONObject, options: [])
  211. } catch _ {
  212. JSONData = nil
  213. }
  214. let keychain = Keychain(service: "Twitter")
  215. XCTAssertNil(keychain.getData("JSONData"), "not stored JSON data")
  216. keychain.set(JSONData!, key: "JSONData")
  217. XCTAssertEqual(keychain.getData("JSONData")!, JSONData!, "stored JSON data")
  218. }
  219. func testRemoveString() {
  220. let keychain = Keychain(service: "Twitter")
  221. XCTAssertNil(keychain.get("username"), "not stored username")
  222. XCTAssertNil(keychain.get("password"), "not stored password")
  223. keychain.set("kishikawakatsumi", key: "username")
  224. XCTAssertEqual(keychain.get("username")!, "kishikawakatsumi", "stored username")
  225. keychain.set("password1234", key: "password")
  226. XCTAssertEqual(keychain.get("password")!, "password1234", "stored password")
  227. keychain.remove("username")
  228. XCTAssertNil(keychain.get("username"), "removed username")
  229. XCTAssertEqual(keychain.get("password")!, "password1234", "left password")
  230. keychain.remove("password")
  231. XCTAssertNil(keychain.get("username"), "removed username")
  232. XCTAssertNil(keychain.get("password"), "removed password")
  233. }
  234. func testRemoveData() {
  235. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  236. let JSONData: NSData?
  237. do {
  238. JSONData = try NSJSONSerialization.dataWithJSONObject(JSONObject, options: [])
  239. } catch _ {
  240. JSONData = nil
  241. }
  242. let keychain = Keychain(service: "Twitter")
  243. XCTAssertNil(keychain.getData("JSONData"), "not stored JSON data")
  244. keychain.set(JSONData!, key: "JSONData")
  245. XCTAssertEqual(keychain.getData("JSONData")!, JSONData!, "stored JSON data")
  246. keychain.remove("JSONData")
  247. XCTAssertNil(keychain.getData("JSONData"), "removed JSON data")
  248. }
  249. // MARK:
  250. func testSubscripting() {
  251. let keychain = Keychain(service: "Twitter")
  252. XCTAssertNil(keychain["username"], "not stored username")
  253. XCTAssertNil(keychain["password"], "not stored password")
  254. XCTAssertNil(keychain[string: "username"], "not stored username")
  255. XCTAssertNil(keychain[string: "password"], "not stored password")
  256. keychain["username"] = "kishikawakatsumi"
  257. XCTAssertEqual(keychain["username"]!, "kishikawakatsumi", "stored username")
  258. XCTAssertEqual(keychain[string: "username"]!, "kishikawakatsumi", "stored username")
  259. keychain["password"] = "password1234"
  260. XCTAssertEqual(keychain["password"]!, "password1234", "stored password")
  261. XCTAssertEqual(keychain[string: "password"]!, "password1234", "stored password")
  262. keychain["username"] = nil
  263. XCTAssertNil(keychain["username"], "removed username")
  264. XCTAssertEqual(keychain["password"]!, "password1234", "left password")
  265. XCTAssertNil(keychain[string: "username"], "removed username")
  266. XCTAssertEqual(keychain[string: "password"]!, "password1234", "left password")
  267. keychain["password"] = nil
  268. XCTAssertNil(keychain["username"], "removed username")
  269. XCTAssertNil(keychain["password"], "removed password")
  270. XCTAssertNil(keychain[string: "username"], "removed username")
  271. XCTAssertNil(keychain[string: "password"], "removed password")
  272. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  273. let JSONData: NSData?
  274. do {
  275. JSONData = try NSJSONSerialization.dataWithJSONObject(JSONObject, options: [])
  276. } catch _ {
  277. JSONData = nil
  278. }
  279. XCTAssertNil(keychain[data:"JSONData"], "not stored JSON data")
  280. keychain[data: "JSONData"] = JSONData
  281. XCTAssertEqual(keychain[data:"JSONData"]!, JSONData!, "stored JSON data")
  282. }
  283. // MARK:
  284. #if os(iOS)
  285. func testErrorHandling() {
  286. if let error = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared").removeAll() {
  287. XCTAssertNil(error, "no error occurred")
  288. }
  289. if let error = Keychain(service: "Twitter").removeAll() {
  290. XCTAssertNil(error, "no error occurred")
  291. }
  292. if let error = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS).removeAll() {
  293. XCTAssertNil(error, "no error occurred")
  294. }
  295. if let error = Keychain().removeAll() {
  296. XCTAssertNil(error, "no error occurred")
  297. }
  298. locally {
  299. // Add Keychain items
  300. let keychain = Keychain(service: "Twitter")
  301. if let error = keychain.set("kishikawa_katsumi", key: "username") {
  302. XCTAssertNil(error, "no error occurred")
  303. }
  304. if let error = keychain.set("password_1234", key: "password") {
  305. XCTAssertNil(error, "no error occurred")
  306. }
  307. let username = keychain.getStringOrError("username")
  308. switch username { // enum
  309. case .Success:
  310. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  311. case .Failure:
  312. XCTFail("unknown error occurred")
  313. }
  314. if let error = username.error { // error object
  315. XCTAssertNotNil(error)
  316. XCTFail("unknown error occurred")
  317. } else {
  318. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  319. }
  320. if username.succeeded { // check succeeded property
  321. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  322. } else {
  323. XCTFail("unknown error occurred")
  324. }
  325. if username.failed { // failed property
  326. XCTFail("unknown error occurred")
  327. } else {
  328. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  329. }
  330. let password = keychain.getStringOrError("password")
  331. switch password { // enum
  332. case .Success:
  333. XCTAssertEqual(password.value!, "password_1234")
  334. case .Failure:
  335. XCTFail("unknown error occurred")
  336. }
  337. if let error = password.error { // error object
  338. XCTAssertNotNil(error)
  339. XCTFail("unknown error occurred")
  340. } else {
  341. XCTAssertEqual(password.value!, "password_1234")
  342. }
  343. if password.succeeded { // check succeeded property
  344. XCTAssertEqual(password.value!, "password_1234")
  345. } else {
  346. XCTFail("unknown error occurred")
  347. }
  348. if password.failed { // failed property
  349. XCTFail("unknown error occurred")
  350. } else {
  351. XCTAssertEqual(password.value!, "password_1234")
  352. }
  353. }
  354. locally {
  355. // Update Keychain items
  356. let keychain = Keychain(service: "Twitter")
  357. if let error = keychain.set("katsumi_kishikawa", key: "username") {
  358. XCTAssertNil(error, "no error occurred")
  359. }
  360. if let error = keychain.set("1234_password", key: "password") {
  361. XCTAssertNil(error, "no error occurred")
  362. }
  363. let username = keychain.getStringOrError("username")
  364. switch username { // enum
  365. case .Success:
  366. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  367. case .Failure:
  368. XCTFail("unknown error occurred")
  369. }
  370. if let error = username.error { // error object
  371. XCTAssertNotNil(error)
  372. XCTFail("unknown error occurred")
  373. } else {
  374. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  375. }
  376. if username.succeeded { // check succeeded property
  377. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  378. } else {
  379. XCTFail("unknown error occurred")
  380. }
  381. if username.failed { // failed property
  382. XCTFail("unknown error occurred")
  383. } else {
  384. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  385. }
  386. let password = keychain.getStringOrError("password")
  387. switch password { // enum
  388. case .Success:
  389. XCTAssertEqual(password.value!, "1234_password")
  390. case .Failure:
  391. XCTFail("unknown error occurred")
  392. }
  393. if let error = password.error { // check error object
  394. XCTAssertNotNil(error)
  395. XCTFail("unknown error occurred")
  396. } else {
  397. XCTAssertEqual(password.value!, "1234_password")
  398. }
  399. if password.succeeded { // check succeeded property
  400. XCTAssertEqual(password.value!, "1234_password")
  401. } else {
  402. XCTFail("unknown error occurred")
  403. }
  404. if password.failed { // check failed property
  405. XCTFail("unknown error occurred")
  406. } else {
  407. XCTAssertEqual(password.value!, "1234_password")
  408. }
  409. }
  410. locally {
  411. // Remove Keychain items
  412. let keychain = Keychain(service: "Twitter")
  413. if let error = keychain.remove("username") {
  414. XCTAssertNil(error, "no error occurred")
  415. }
  416. if let error = keychain.remove("password") {
  417. XCTAssertNil(error, "no error occurred")
  418. }
  419. XCTAssertNil(keychain.get("username"))
  420. XCTAssertNil(keychain.get("password"))
  421. }
  422. }
  423. #endif
  424. // MARK:
  425. func testSetStringWithCustomService() {
  426. let username_1 = "kishikawakatsumi"
  427. let password_1 = "password1234"
  428. let username_2 = "kishikawa_katsumi"
  429. let password_2 = "password_1234"
  430. let username_3 = "k_katsumi"
  431. let password_3 = "12341234"
  432. let service_1 = ""
  433. let service_2 = "com.kishikawakatsumi.KeychainAccess"
  434. let service_3 = "example.com"
  435. Keychain().removeAll()
  436. Keychain(service: service_1).removeAll()
  437. Keychain(service: service_2).removeAll()
  438. Keychain(service: service_3).removeAll()
  439. XCTAssertNil(Keychain().get("username"), "not stored username")
  440. XCTAssertNil(Keychain().get("password"), "not stored password")
  441. XCTAssertNil(Keychain(service: service_1).get("username"), "not stored username")
  442. XCTAssertNil(Keychain(service: service_1).get("password"), "not stored password")
  443. XCTAssertNil(Keychain(service: service_2).get("username"), "not stored username")
  444. XCTAssertNil(Keychain(service: service_2).get("password"), "not stored password")
  445. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  446. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  447. Keychain().set(username_1, key: "username")
  448. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  449. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  450. XCTAssertNil(Keychain(service: service_2).get("username"), "not stored username")
  451. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  452. Keychain(service: service_1).set(username_1, key: "username")
  453. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  454. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  455. XCTAssertNil(Keychain(service: service_2).get("username"), "not stored username")
  456. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  457. Keychain(service: service_2).set(username_2, key: "username")
  458. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  459. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  460. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "stored username")
  461. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  462. Keychain(service: service_3).set(username_3, key: "username")
  463. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  464. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  465. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "stored username")
  466. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "stored username")
  467. Keychain().set(password_1, key: "password")
  468. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  469. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  470. XCTAssertNil(Keychain(service: service_2).get("password"), "not stored password")
  471. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  472. Keychain(service: service_1).set(password_1, key: "password")
  473. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  474. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  475. XCTAssertNil(Keychain(service: service_2).get("password"), "not stored password")
  476. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  477. Keychain(service: service_2).set(password_2, key: "password")
  478. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  479. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  480. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "stored password")
  481. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  482. Keychain(service: service_3).set(password_3, key: "password")
  483. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  484. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  485. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "stored password")
  486. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "stored password")
  487. Keychain().remove("username")
  488. XCTAssertNil(Keychain().get("username"), "removed username")
  489. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  490. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "left username")
  491. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "left username")
  492. Keychain(service: service_1).remove("username")
  493. XCTAssertNil(Keychain().get("username"), "removed username")
  494. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  495. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "left username")
  496. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "left username")
  497. Keychain(service: service_2).remove("username")
  498. XCTAssertNil(Keychain().get("username"), "removed username")
  499. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  500. XCTAssertNil(Keychain(service: service_2).get("username"), "removed username")
  501. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "left username")
  502. Keychain(service: service_3).remove("username")
  503. XCTAssertNil(Keychain().get("username"), "removed username")
  504. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  505. XCTAssertNil(Keychain(service: service_2).get("username"), "removed username")
  506. XCTAssertNil(Keychain(service: service_3).get("username"), "removed username")
  507. Keychain().remove("password")
  508. XCTAssertNil(Keychain().get("password"), "removed password")
  509. XCTAssertNil(Keychain(service: service_1).get("password"), "removed password")
  510. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "left password")
  511. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "left password")
  512. Keychain(service: service_1).remove("password")
  513. XCTAssertNil(Keychain().get("password"), "removed password")
  514. XCTAssertNil(Keychain(service: service_1).get("password"), "removed password")
  515. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "left password")
  516. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "left password")
  517. Keychain(service: service_2).remove("password")
  518. XCTAssertNil(Keychain().get("password"), "removed password")
  519. XCTAssertNil(Keychain(service: service_1).get("password"), "removed password")
  520. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  521. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "left password")
  522. Keychain(service: service_3).remove("password")
  523. XCTAssertNil(Keychain().get("password"), "removed password")
  524. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  525. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  526. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  527. }
  528. }