KeychainAccessTests.swift 80 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740
  1. //
  2. // KeychainAccessTests.swift
  3. // KeychainAccessTests
  4. //
  5. // Created by kishikawa katsumi on 2014/12/24.
  6. // Copyright (c) 2014 kishikawa katsumi. All rights reserved.
  7. //
  8. // Permission is hereby granted, free of charge, to any person obtaining a copy
  9. // of this software and associated documentation files (the "Software"), to deal
  10. // in the Software without restriction, including without limitation the rights
  11. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  12. // copies of the Software, and to permit persons to whom the Software is
  13. // furnished to do so, subject to the following conditions:
  14. //
  15. // The above copyright notice and this permission notice shall be included in
  16. // all copies or substantial portions of the Software.
  17. //
  18. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  19. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  20. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  21. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  22. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  23. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  24. // THE SOFTWARE.
  25. import Foundation
  26. import XCTest
  27. import KeychainAccess
  28. class KeychainAccessTests: XCTestCase {
  29. override func setUp() {
  30. super.setUp()
  31. do { try Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").removeAll() } catch {}
  32. do { try Keychain(service: "Twitter").removeAll() } catch {}
  33. do { try Keychain(server: URL(string: "https://example.com")!, protocolType: .https).removeAll() } catch {}
  34. do { try Keychain(server: URL(string: "https://example.com:443")!, protocolType: .https).removeAll() } catch {}
  35. do { try Keychain().removeAll() } catch {}
  36. }
  37. override func tearDown() {
  38. super.tearDown()
  39. }
  40. // MARK:
  41. func testGenericPassword() {
  42. do {
  43. // Add Keychain items
  44. let keychain = Keychain(service: "Twitter")
  45. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  46. do { try keychain.set("password_1234", key: "password") } catch {}
  47. let username = try! keychain.get("username")
  48. XCTAssertEqual(username, "kishikawa_katsumi")
  49. let password = try! keychain.get("password")
  50. XCTAssertEqual(password, "password_1234")
  51. }
  52. do {
  53. // Update Keychain items
  54. let keychain = Keychain(service: "Twitter")
  55. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  56. do { try keychain.set("1234_password", key: "password") } catch {}
  57. let username = try! keychain.get("username")
  58. XCTAssertEqual(username, "katsumi_kishikawa")
  59. let password = try! keychain.get("password")
  60. XCTAssertEqual(password, "1234_password")
  61. }
  62. do {
  63. // Remove Keychain items
  64. let keychain = Keychain(service: "Twitter")
  65. do { try keychain.remove("username") } catch {}
  66. do { try keychain.remove("password") } catch {}
  67. XCTAssertNil(try! keychain.get("username"))
  68. XCTAssertNil(try! keychain.get("password"))
  69. }
  70. }
  71. func testGenericPasswordSubscripting() {
  72. do {
  73. // Add Keychain items
  74. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  75. keychain["username"] = "kishikawa_katsumi"
  76. keychain["password"] = "password_1234"
  77. let username = keychain["username"]
  78. XCTAssertEqual(username, "kishikawa_katsumi")
  79. let password = keychain["password"]
  80. XCTAssertEqual(password, "password_1234")
  81. }
  82. do {
  83. // Update Keychain items
  84. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  85. keychain["username"] = "katsumi_kishikawa"
  86. keychain["password"] = "1234_password"
  87. let username = keychain["username"]
  88. XCTAssertEqual(username, "katsumi_kishikawa")
  89. let password = keychain["password"]
  90. XCTAssertEqual(password, "1234_password")
  91. }
  92. do {
  93. // Remove Keychain items
  94. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  95. keychain["username"] = nil
  96. keychain["password"] = nil
  97. XCTAssertNil(keychain["username"])
  98. XCTAssertNil(keychain["password"])
  99. }
  100. }
  101. func testGenericPasswordWithAccessGroup1() {
  102. do {
  103. // Add Keychain items
  104. // This attribute (kSecAttrAccessGroup) applies to macOS keychain items only if you also set a value of true for the
  105. // kSecUseDataProtectionKeychain key, the kSecAttrSynchronizable key, or both.
  106. // https://developer.apple.com/documentation/security/ksecattraccessgroup
  107. let keychain = Keychain(service: "Twitter").synchronizable(true)
  108. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  109. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  110. do { try keychain.set("password_1234", key: "password") } catch {}
  111. do { try keychainWithAccessGroup.set("kishikawa_katsumi_access_group", key: "username") } catch {}
  112. do { try keychainWithAccessGroup.set("password_1234_access_group", key: "password") } catch {}
  113. XCTAssertEqual(try! keychain.get("username"), "kishikawa_katsumi")
  114. XCTAssertEqual(try! keychain.get("password"), "password_1234")
  115. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "kishikawa_katsumi_access_group")
  116. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "password_1234_access_group")
  117. }
  118. do {
  119. // Update Keychain items
  120. let keychain = Keychain(service: "Twitter").synchronizable(true)
  121. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  122. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  123. do { try keychain.set("1234_password", key: "password") } catch {}
  124. do { try keychainWithAccessGroup.set("katsumi_kishikawa_access_group", key: "username") } catch {}
  125. do { try keychainWithAccessGroup.set("1234_password_access_group", key: "password") } catch {}
  126. XCTAssertEqual(try! keychain.get("username"), "katsumi_kishikawa")
  127. XCTAssertEqual(try! keychain.get("password"), "1234_password")
  128. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "katsumi_kishikawa_access_group")
  129. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "1234_password_access_group")
  130. }
  131. do {
  132. // Remove Keychain items
  133. let keychain = Keychain(service: "Twitter").synchronizable(true)
  134. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  135. XCTAssertNotNil(try! keychainWithAccessGroup.get("username"))
  136. XCTAssertNotNil(try! keychainWithAccessGroup.get("password"))
  137. do { try keychainWithAccessGroup.remove("username") } catch {}
  138. do { try keychainWithAccessGroup.remove("password") } catch {}
  139. XCTAssertNil(try! keychainWithAccessGroup.get("username"))
  140. XCTAssertNil(try! keychainWithAccessGroup.get("password"))
  141. XCTAssertNotNil(try! keychain.get("username"))
  142. XCTAssertNotNil(try! keychain.get("password"))
  143. do { try keychain.remove("username") } catch {}
  144. do { try keychain.remove("password") } catch {}
  145. XCTAssertNil(try! keychain.get("username"))
  146. XCTAssertNil(try! keychain.get("password"))
  147. }
  148. }
  149. func testGenericPasswordWithAccessGroup2() {
  150. do {
  151. // Add Keychain items
  152. let keychain = Keychain(service: "Twitter").synchronizable(true)
  153. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  154. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  155. do { try keychain.set("password_1234", key: "password") } catch {}
  156. do { try keychainWithAccessGroup.set("kishikawa_katsumi_access_group", key: "username") } catch {}
  157. do { try keychainWithAccessGroup.set("password_1234_access_group", key: "password") } catch {}
  158. XCTAssertEqual(try! keychain.get("username"), "kishikawa_katsumi")
  159. XCTAssertEqual(try! keychain.get("password"), "password_1234")
  160. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "kishikawa_katsumi_access_group")
  161. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "password_1234_access_group")
  162. }
  163. do {
  164. // Update Keychain items
  165. let keychain = Keychain(service: "Twitter").synchronizable(true)
  166. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  167. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  168. do { try keychain.set("1234_password", key: "password") } catch {}
  169. do { try keychainWithAccessGroup.set("katsumi_kishikawa_access_group", key: "username") } catch {}
  170. do { try keychainWithAccessGroup.set("1234_password_access_group", key: "password") } catch {}
  171. XCTAssertEqual(try! keychain.get("username"), "katsumi_kishikawa")
  172. XCTAssertEqual(try! keychain.get("password"), "1234_password")
  173. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "katsumi_kishikawa_access_group")
  174. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "1234_password_access_group")
  175. }
  176. do {
  177. // Remove Keychain items
  178. let keychain = Keychain(service: "Twitter").synchronizable(true)
  179. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  180. XCTAssertNotNil(try! keychainWithAccessGroup.get("username"))
  181. XCTAssertNotNil(try! keychainWithAccessGroup.get("password"))
  182. do { try keychain.remove("username") } catch {}
  183. do { try keychain.remove("password") } catch {}
  184. // If the access group is empty, the query will match all access group. So delete all values in other access groups.
  185. XCTAssertNil(try! keychain.get("username"))
  186. XCTAssertNil(try! keychain.get("password"))
  187. XCTAssertNil(try! keychainWithAccessGroup.get("username"))
  188. XCTAssertNil(try! keychainWithAccessGroup.get("password"))
  189. }
  190. }
  191. // MARK:
  192. func testInternetPassword() {
  193. do {
  194. // Add Keychain items
  195. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  196. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  197. do { try keychain.set("password_1234", key: "password") } catch {}
  198. let username = try! keychain.get("username")
  199. XCTAssertEqual(username, "kishikawa_katsumi")
  200. let password = try! keychain.get("password")
  201. XCTAssertEqual(password, "password_1234")
  202. }
  203. do {
  204. // Update Keychain items
  205. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  206. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  207. do { try keychain.set("1234_password", key: "password") } catch {}
  208. let username = try! keychain.get("username")
  209. XCTAssertEqual(username, "katsumi_kishikawa")
  210. let password = try! keychain.get("password")
  211. XCTAssertEqual(password, "1234_password")
  212. }
  213. do {
  214. // Remove Keychain items
  215. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  216. do { try keychain.remove("username") } catch {}
  217. do { try keychain.remove("password") } catch {}
  218. XCTAssertNil(try! keychain.get("username"))
  219. XCTAssertNil(try! keychain.get("password"))
  220. }
  221. }
  222. func testInternetPasswordSubscripting() {
  223. do {
  224. // Add Keychain items
  225. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  226. keychain["username"] = "kishikawa_katsumi"
  227. keychain["password"] = "password_1234"
  228. let username = keychain["username"]
  229. XCTAssertEqual(username, "kishikawa_katsumi")
  230. let password = keychain["password"]
  231. XCTAssertEqual(password, "password_1234")
  232. }
  233. do {
  234. // Update Keychain items
  235. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  236. keychain["username"] = "katsumi_kishikawa"
  237. keychain["password"] = "1234_password"
  238. let username = keychain["username"]
  239. XCTAssertEqual(username, "katsumi_kishikawa")
  240. let password = keychain["password"]
  241. XCTAssertEqual(password, "1234_password")
  242. }
  243. do {
  244. // Remove Keychain items
  245. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  246. keychain["username"] = nil
  247. keychain["password"] = nil
  248. XCTAssertNil(keychain["username"])
  249. XCTAssertNil(keychain["password"])
  250. }
  251. }
  252. func testInternetPasswordWithAccessGroup1() {
  253. do {
  254. // Add Keychain items
  255. // This attribute (kSecAttrAccessGroup) applies to macOS keychain items only if you also set a value of true for the
  256. // kSecUseDataProtectionKeychain key, the kSecAttrSynchronizable key, or both.
  257. // https://developer.apple.com/documentation/security/ksecattraccessgroup
  258. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  259. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  260. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  261. do { try keychain.set("password_1234", key: "password") } catch {}
  262. do { try keychainWithAccessGroup.set("kishikawa_katsumi_access_group", key: "username") } catch {}
  263. do { try keychainWithAccessGroup.set("password_1234_access_group", key: "password") } catch {}
  264. XCTAssertEqual(try! keychain.get("username"), "kishikawa_katsumi")
  265. XCTAssertEqual(try! keychain.get("password"), "password_1234")
  266. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "kishikawa_katsumi_access_group")
  267. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "password_1234_access_group")
  268. }
  269. do {
  270. // Update Keychain items
  271. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  272. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  273. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  274. do { try keychain.set("1234_password", key: "password") } catch {}
  275. do { try keychainWithAccessGroup.set("katsumi_kishikawa_access_group", key: "username") } catch {}
  276. do { try keychainWithAccessGroup.set("1234_password_access_group", key: "password") } catch {}
  277. XCTAssertEqual(try! keychain.get("username"), "katsumi_kishikawa")
  278. XCTAssertEqual(try! keychain.get("password"), "1234_password")
  279. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "katsumi_kishikawa_access_group")
  280. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "1234_password_access_group")
  281. }
  282. do {
  283. // Remove Keychain items
  284. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  285. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  286. XCTAssertNotNil(try! keychainWithAccessGroup.get("username"))
  287. XCTAssertNotNil(try! keychainWithAccessGroup.get("password"))
  288. do { try keychainWithAccessGroup.remove("username") } catch {}
  289. do { try keychainWithAccessGroup.remove("password") } catch {}
  290. XCTAssertNil(try! keychainWithAccessGroup.get("username"))
  291. XCTAssertNil(try! keychainWithAccessGroup.get("password"))
  292. XCTAssertNotNil(try! keychain.get("username"))
  293. XCTAssertNotNil(try! keychain.get("password"))
  294. do { try keychain.remove("username") } catch {}
  295. do { try keychain.remove("password") } catch {}
  296. XCTAssertNil(try! keychain.get("username"))
  297. XCTAssertNil(try! keychain.get("password"))
  298. }
  299. }
  300. func testInternetPasswordWithAccessGroup2() {
  301. do {
  302. // Add Keychain items
  303. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  304. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  305. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  306. do { try keychain.set("password_1234", key: "password") } catch {}
  307. do { try keychainWithAccessGroup.set("kishikawa_katsumi_access_group", key: "username") } catch {}
  308. do { try keychainWithAccessGroup.set("password_1234_access_group", key: "password") } catch {}
  309. XCTAssertEqual(try! keychain.get("username"), "kishikawa_katsumi")
  310. XCTAssertEqual(try! keychain.get("password"), "password_1234")
  311. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "kishikawa_katsumi_access_group")
  312. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "password_1234_access_group")
  313. }
  314. do {
  315. // Update Keychain items
  316. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  317. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  318. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  319. do { try keychain.set("1234_password", key: "password") } catch {}
  320. do { try keychainWithAccessGroup.set("katsumi_kishikawa_access_group", key: "username") } catch {}
  321. do { try keychainWithAccessGroup.set("1234_password_access_group", key: "password") } catch {}
  322. XCTAssertEqual(try! keychain.get("username"), "katsumi_kishikawa")
  323. XCTAssertEqual(try! keychain.get("password"), "1234_password")
  324. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "katsumi_kishikawa_access_group")
  325. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "1234_password_access_group")
  326. }
  327. do {
  328. // Remove Keychain items
  329. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  330. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  331. XCTAssertNotNil(try! keychainWithAccessGroup.get("username"))
  332. XCTAssertNotNil(try! keychainWithAccessGroup.get("password"))
  333. do { try keychain.remove("username") } catch {}
  334. do { try keychain.remove("password") } catch {}
  335. // If the access group is empty, the query will match all access group. So delete all values in other access groups.
  336. XCTAssertNil(try! keychain.get("username"))
  337. XCTAssertNil(try! keychain.get("password"))
  338. XCTAssertNil(try! keychainWithAccessGroup.get("username"))
  339. XCTAssertNil(try! keychainWithAccessGroup.get("password"))
  340. }
  341. }
  342. // MARK:
  343. func testDefaultInitializer() {
  344. let keychain = Keychain()
  345. XCTAssertEqual(keychain.service, Bundle.main.bundleIdentifier)
  346. XCTAssertEqual(keychain.service, "com.kishikawakatsumi.KeychainAccess.TestHost")
  347. XCTAssertNil(keychain.accessGroup)
  348. }
  349. func testInitializerWithService() {
  350. let keychain = Keychain(service: "com.example.github-token")
  351. XCTAssertEqual(keychain.service, "com.example.github-token")
  352. XCTAssertNil(keychain.accessGroup)
  353. }
  354. func testInitializerWithAccessGroup() {
  355. let keychain = Keychain(accessGroup: "27AEDK3C9F.shared")
  356. XCTAssertEqual(keychain.service, "com.kishikawakatsumi.KeychainAccess.TestHost")
  357. XCTAssertEqual(keychain.accessGroup, "27AEDK3C9F.shared")
  358. }
  359. func testInitializerWithServiceAndAccessGroup() {
  360. let keychain = Keychain(service: "com.example.github-token", accessGroup: "27AEDK3C9F.shared")
  361. XCTAssertEqual(keychain.service, "com.example.github-token")
  362. XCTAssertEqual(keychain.accessGroup, "27AEDK3C9F.shared")
  363. }
  364. func testInitializerWithServer() {
  365. let server = "https://kishikawakatsumi.com"
  366. let url = URL(string: server)!
  367. do {
  368. let keychain = Keychain(server: server, protocolType: .https)
  369. XCTAssertEqual(keychain.server, url)
  370. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  371. XCTAssertEqual(keychain.authenticationType, AuthenticationType.default)
  372. }
  373. do {
  374. let keychain = Keychain(server: url, protocolType: .https)
  375. XCTAssertEqual(keychain.server, url)
  376. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  377. XCTAssertEqual(keychain.authenticationType, AuthenticationType.default)
  378. }
  379. }
  380. func testInitializerWithServerAndAuthenticationType() {
  381. let server = "https://kishikawakatsumi.com"
  382. let url = URL(string: server)!
  383. do {
  384. let keychain = Keychain(server: server, protocolType: .https, authenticationType: .htmlForm)
  385. XCTAssertEqual(keychain.server, url)
  386. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  387. XCTAssertEqual(keychain.authenticationType, AuthenticationType.htmlForm)
  388. }
  389. do {
  390. let keychain = Keychain(server: url, protocolType: .https, authenticationType: .htmlForm)
  391. XCTAssertEqual(keychain.server, url)
  392. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  393. XCTAssertEqual(keychain.authenticationType, AuthenticationType.htmlForm)
  394. }
  395. }
  396. // MARK:
  397. func testContains() {
  398. let keychain = Keychain(service: "Twitter")
  399. XCTAssertFalse(try! keychain.contains("username"), "not stored username")
  400. XCTAssertFalse(try! keychain.contains("password"), "not stored password")
  401. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  402. XCTAssertTrue(try! keychain.contains("username"), "stored username")
  403. XCTAssertFalse(try! keychain.contains("password"), "not stored password")
  404. do { try keychain.set("password1234", key: "password") } catch {}
  405. XCTAssertTrue(try! keychain.contains("username"), "stored username")
  406. XCTAssertTrue(try! keychain.contains("password"), "stored password")
  407. }
  408. // MARK:
  409. func testSetString() {
  410. let keychain = Keychain(service: "Twitter")
  411. XCTAssertNil(try! keychain.get("username"), "not stored username")
  412. XCTAssertNil(try! keychain.get("password"), "not stored password")
  413. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  414. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  415. XCTAssertNil(try! keychain.get("password"), "not stored password")
  416. do { try keychain.set("password1234", key: "password") } catch {}
  417. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  418. XCTAssertEqual(try! keychain.get("password"), "password1234", "stored password")
  419. }
  420. func testSetStringWithLabel() {
  421. let keychain = Keychain(service: "Twitter")
  422. .label("Twitter Account")
  423. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  424. do {
  425. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  426. return attributes?.label
  427. }
  428. XCTAssertNil(label)
  429. } catch {
  430. XCTFail("error occurred")
  431. }
  432. keychain["kishikawakatsumi"] = "password1234"
  433. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  434. do {
  435. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  436. return attributes?.label
  437. }
  438. XCTAssertEqual(label, "Twitter Account")
  439. } catch {
  440. XCTFail("error occurred")
  441. }
  442. }
  443. func testSetStringWithComment() {
  444. let keychain = Keychain(service: "Twitter")
  445. .comment("Kishikawa Katsumi")
  446. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  447. do {
  448. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  449. return attributes?.comment
  450. }
  451. XCTAssertNil(comment)
  452. } catch {
  453. XCTFail("error occurred")
  454. }
  455. keychain["kishikawakatsumi"] = "password1234"
  456. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  457. do {
  458. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  459. return attributes?.comment
  460. }
  461. XCTAssertEqual(comment, "Kishikawa Katsumi")
  462. } catch {
  463. XCTFail("error occurred")
  464. }
  465. }
  466. func testSetStringWithLabelAndComment() {
  467. let keychain = Keychain(service: "Twitter")
  468. .label("Twitter Account")
  469. .comment("Kishikawa Katsumi")
  470. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  471. do {
  472. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  473. return attributes?.label
  474. }
  475. XCTAssertNil(label)
  476. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  477. return attributes?.comment
  478. }
  479. XCTAssertNil(comment)
  480. } catch {
  481. XCTFail("error occurred")
  482. }
  483. keychain["kishikawakatsumi"] = "password1234"
  484. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  485. do {
  486. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  487. return attributes?.label
  488. }
  489. XCTAssertEqual(label, "Twitter Account")
  490. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  491. return attributes?.comment
  492. }
  493. XCTAssertEqual(comment, "Kishikawa Katsumi")
  494. } catch {
  495. XCTFail("error occurred")
  496. }
  497. }
  498. func testSetData() {
  499. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  500. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  501. let keychain = Keychain(service: "Twitter")
  502. XCTAssertNil(try! keychain.getData("JSONData"), "not stored JSON data")
  503. do { try keychain.set(JSONData, key: "JSONData") } catch {}
  504. XCTAssertEqual(try! keychain.getData("JSONData"), JSONData, "stored JSON data")
  505. }
  506. func testStringConversionError() {
  507. let keychain = Keychain(service: "Twitter")
  508. let length = 256
  509. let data = NSMutableData(length: length)!
  510. let bytes = data.mutableBytes.bindMemory(to: UInt8.self, capacity: length)
  511. _ = SecRandomCopyBytes(kSecRandomDefault, length, bytes)
  512. do {
  513. try keychain.set(data as Data, key: "RandomData")
  514. let _ = try keychain.getString("RandomData")
  515. XCTFail("no error occurred")
  516. } catch let error as NSError {
  517. XCTAssertEqual(error.domain, KeychainAccessErrorDomain)
  518. XCTAssertEqual(error.code, Int(Status.conversionError.rawValue))
  519. XCTAssertEqual(error.userInfo[NSLocalizedDescriptionKey] as! String, Status.conversionError.localizedDescription)
  520. } catch {
  521. XCTFail("unexpected error occurred")
  522. }
  523. do {
  524. try keychain.set(data as Data, key: "RandomData")
  525. let _ = try keychain.getString("RandomData")
  526. XCTFail("no error occurred")
  527. } catch Status.conversionError {
  528. XCTAssertTrue(true)
  529. } catch {
  530. XCTFail("unexpected error occurred")
  531. }
  532. }
  533. func testGetPersistentRef() {
  534. let keychain = Keychain(service: "Twitter")
  535. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  536. do {
  537. let persistentRef = try keychain.get("kishikawakatsumi") { $0?.persistentRef }
  538. XCTAssertNil(persistentRef)
  539. } catch {
  540. XCTFail("error occurred")
  541. }
  542. keychain["kishikawakatsumi"] = "password1234"
  543. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  544. do {
  545. let persistentRef = try keychain.get("kishikawakatsumi") { $0?.persistentRef }
  546. XCTAssertNotNil(persistentRef)
  547. } catch {
  548. XCTFail("error occurred")
  549. }
  550. }
  551. #if os(iOS) || os(tvOS)
  552. func testSetAttributes() {
  553. do {
  554. var attributes = [String: Any]()
  555. attributes[String(kSecAttrDescription)] = "Description Test"
  556. attributes[String(kSecAttrComment)] = "Comment Test"
  557. attributes[String(kSecAttrCreator)] = "Creator Test"
  558. attributes[String(kSecAttrType)] = "Type Test"
  559. attributes[String(kSecAttrLabel)] = "Label Test"
  560. attributes[String(kSecAttrIsInvisible)] = true
  561. attributes[String(kSecAttrIsNegative)] = true
  562. let keychain = Keychain(service: "Twitter")
  563. .attributes(attributes)
  564. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  565. do {
  566. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  567. XCTAssertNil(attributes)
  568. } catch {
  569. XCTFail("error occurred")
  570. }
  571. keychain["kishikawakatsumi"] = "password1234"
  572. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  573. do {
  574. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  575. XCTAssertEqual(attributes?.`class`, ItemClass.genericPassword.rawValue)
  576. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  577. XCTAssertNil(attributes?.ref)
  578. XCTAssertNotNil(attributes?.persistentRef)
  579. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  580. if ProcessInfo().isOperatingSystemAtLeast(OperatingSystemVersion(majorVersion: 11, minorVersion: 3, patchVersion: 0)) {
  581. XCTAssertNotNil(attributes?.accessControl)
  582. } else {
  583. XCTAssertNil(attributes?.accessControl)
  584. }
  585. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  586. XCTAssertNotNil(attributes?.synchronizable)
  587. XCTAssertNotNil(attributes?.creationDate)
  588. XCTAssertNotNil(attributes?.modificationDate)
  589. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  590. XCTAssertEqual(attributes?.comment, "Comment Test")
  591. XCTAssertEqual(attributes?.creator, "Creator Test")
  592. XCTAssertEqual(attributes?.type, "Type Test")
  593. XCTAssertEqual(attributes?.label, "Label Test")
  594. XCTAssertEqual(attributes?.isInvisible, true)
  595. XCTAssertEqual(attributes?.isNegative, true)
  596. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  597. XCTAssertEqual(attributes?.service, "Twitter")
  598. XCTAssertNil(attributes?.generic)
  599. XCTAssertNil(attributes?.securityDomain)
  600. XCTAssertNil(attributes?.server)
  601. XCTAssertNil(attributes?.`protocol`)
  602. XCTAssertNil(attributes?.authenticationType)
  603. XCTAssertNil(attributes?.port)
  604. XCTAssertNil(attributes?.path)
  605. XCTAssertEqual(attributes?[String(kSecClass)] as? String, ItemClass.genericPassword.rawValue)
  606. XCTAssertEqual(attributes?[String(kSecValueData)] as? Data, "password1234".data(using: .utf8))
  607. } catch {
  608. XCTFail("error occurred")
  609. }
  610. }
  611. do {
  612. var attributes = [String: Any]()
  613. attributes[String(kSecAttrDescription)] = "Description Test"
  614. attributes[String(kSecAttrComment)] = "Comment Test"
  615. attributes[String(kSecAttrCreator)] = "Creator Test"
  616. attributes[String(kSecAttrType)] = "Type Test"
  617. attributes[String(kSecAttrLabel)] = "Label Test"
  618. attributes[String(kSecAttrIsInvisible)] = true
  619. attributes[String(kSecAttrIsNegative)] = true
  620. attributes[String(kSecAttrSecurityDomain)] = "securitydomain"
  621. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  622. .attributes(attributes)
  623. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  624. do {
  625. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  626. XCTAssertNil(attributes)
  627. } catch {
  628. XCTFail("error occurred")
  629. }
  630. do {
  631. keychain["kishikawakatsumi"] = "password1234"
  632. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  633. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  634. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  635. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  636. XCTAssertNil(attributes?.ref)
  637. XCTAssertNotNil(attributes?.persistentRef)
  638. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  639. #if os(iOS)
  640. if #available(iOS 11.3, *) {
  641. XCTAssertNotNil(attributes?.accessControl)
  642. } else if #available(iOS 9.0, *) {
  643. XCTAssertNil(attributes?.accessControl)
  644. } else {
  645. XCTAssertNotNil(attributes?.accessControl)
  646. }
  647. #else
  648. if #available(tvOS 11.3, *) {
  649. XCTAssertNotNil(attributes?.accessControl)
  650. } else {
  651. XCTAssertNil(attributes?.accessControl)
  652. }
  653. #endif
  654. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  655. XCTAssertNotNil(attributes?.synchronizable)
  656. XCTAssertNotNil(attributes?.creationDate)
  657. XCTAssertNotNil(attributes?.modificationDate)
  658. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  659. XCTAssertEqual(attributes?.comment, "Comment Test")
  660. XCTAssertEqual(attributes?.creator, "Creator Test")
  661. XCTAssertEqual(attributes?.type, "Type Test")
  662. XCTAssertEqual(attributes?.label, "Label Test")
  663. XCTAssertEqual(attributes?.isInvisible, true)
  664. XCTAssertEqual(attributes?.isNegative, true)
  665. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  666. XCTAssertNil(attributes?.service)
  667. XCTAssertNil(attributes?.generic)
  668. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  669. XCTAssertEqual(attributes?.server, "example.com")
  670. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  671. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  672. XCTAssertEqual(attributes?.port, 443)
  673. XCTAssertEqual(attributes?.path, "")
  674. } catch {
  675. XCTFail("error occurred")
  676. }
  677. do {
  678. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  679. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  680. keychain["kishikawakatsumi"] = "1234password"
  681. XCTAssertEqual(keychain["kishikawakatsumi"], "1234password", "updated password")
  682. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  683. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  684. XCTAssertEqual(attributes?.data, "1234password".data(using: .utf8))
  685. XCTAssertNil(attributes?.ref)
  686. XCTAssertNotNil(attributes?.persistentRef)
  687. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  688. #if os(iOS)
  689. if #available(iOS 11.3, *) {
  690. XCTAssertNotNil(attributes?.accessControl)
  691. } else if #available(iOS 9.0, *) {
  692. XCTAssertNil(attributes?.accessControl)
  693. } else {
  694. XCTAssertNotNil(attributes?.accessControl)
  695. }
  696. #else
  697. if #available(tvOS 11.3, *) {
  698. XCTAssertNotNil(attributes?.accessControl)
  699. } else {
  700. XCTAssertNil(attributes?.accessControl)
  701. }
  702. #endif
  703. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  704. XCTAssertNotNil(attributes?.synchronizable)
  705. XCTAssertNotNil(attributes?.creationDate)
  706. XCTAssertNotNil(attributes?.modificationDate)
  707. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  708. XCTAssertEqual(attributes?.comment, "Comment Test")
  709. XCTAssertEqual(attributes?.creator, "Creator Test")
  710. XCTAssertEqual(attributes?.type, "Type Test")
  711. XCTAssertEqual(attributes?.label, "Label Test")
  712. XCTAssertEqual(attributes?.isInvisible, true)
  713. XCTAssertEqual(attributes?.isNegative, true)
  714. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  715. XCTAssertNil(attributes?.service)
  716. XCTAssertNil(attributes?.generic)
  717. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  718. XCTAssertEqual(attributes?.server, "example.com")
  719. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  720. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  721. XCTAssertEqual(attributes?.port, 443)
  722. XCTAssertEqual(attributes?.path, "")
  723. } catch {
  724. XCTFail("error occurred")
  725. }
  726. do {
  727. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  728. .attributes([String(kSecAttrDescription): "Updated Description"])
  729. XCTAssertEqual(keychain["kishikawakatsumi"], "1234password", "stored password")
  730. keychain["kishikawakatsumi"] = "password1234"
  731. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "updated password")
  732. let attributes = keychain[attributes: "kishikawakatsumi"]
  733. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  734. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  735. XCTAssertNil(attributes?.ref)
  736. XCTAssertNotNil(attributes?.persistentRef)
  737. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  738. #if os(iOS)
  739. if #available(iOS 11.3, *) {
  740. XCTAssertNotNil(attributes?.accessControl)
  741. } else if #available(iOS 9.0, *) {
  742. XCTAssertNil(attributes?.accessControl)
  743. } else {
  744. XCTAssertNotNil(attributes?.accessControl)
  745. }
  746. #else
  747. if #available(tvOS 11.3, *) {
  748. XCTAssertNotNil(attributes?.accessControl)
  749. } else {
  750. XCTAssertNil(attributes?.accessControl)
  751. }
  752. #endif
  753. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  754. XCTAssertNotNil(attributes?.synchronizable)
  755. XCTAssertNotNil(attributes?.creationDate)
  756. XCTAssertNotNil(attributes?.modificationDate)
  757. XCTAssertEqual(attributes?.attributeDescription, "Updated Description")
  758. XCTAssertEqual(attributes?.comment, "Comment Test")
  759. XCTAssertEqual(attributes?.creator, "Creator Test")
  760. XCTAssertEqual(attributes?.type, "Type Test")
  761. XCTAssertEqual(attributes?.label, "Label Test")
  762. XCTAssertEqual(attributes?.isInvisible, true)
  763. XCTAssertEqual(attributes?.isNegative, true)
  764. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  765. XCTAssertNil(attributes?.service)
  766. XCTAssertNil(attributes?.generic)
  767. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  768. XCTAssertEqual(attributes?.server, "example.com")
  769. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  770. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  771. XCTAssertEqual(attributes?.port, 443)
  772. XCTAssertEqual(attributes?.path, "")
  773. }
  774. }
  775. }
  776. #endif
  777. func testRemoveString() {
  778. let keychain = Keychain(service: "Twitter")
  779. XCTAssertNil(try! keychain.get("username"), "not stored username")
  780. XCTAssertNil(try! keychain.get("password"), "not stored password")
  781. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  782. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  783. do { try keychain.set("password1234", key: "password") } catch {}
  784. XCTAssertEqual(try! keychain.get("password"), "password1234", "stored password")
  785. do { try keychain.remove("username") } catch {}
  786. XCTAssertNil(try! keychain.get("username"), "removed username")
  787. XCTAssertEqual(try! keychain.get("password"), "password1234", "left password")
  788. do { try keychain.remove("password") } catch {}
  789. XCTAssertNil(try! keychain.get("username"), "removed username")
  790. XCTAssertNil(try! keychain.get("password"), "removed password")
  791. }
  792. func testRemoveData() {
  793. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  794. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  795. let keychain = Keychain(service: "Twitter")
  796. XCTAssertNil(try! keychain.getData("JSONData"), "not stored JSON data")
  797. do { try keychain.set(JSONData, key: "JSONData") } catch {}
  798. XCTAssertEqual(try! keychain.getData("JSONData"), JSONData, "stored JSON data")
  799. do { try keychain.remove("JSONData") } catch {}
  800. XCTAssertNil(try! keychain.getData("JSONData"), "removed JSON data")
  801. }
  802. // MARK:
  803. func testSubscripting() {
  804. let keychain = Keychain(service: "Twitter")
  805. XCTAssertNil(keychain["username"], "not stored username")
  806. XCTAssertNil(keychain["password"], "not stored password")
  807. XCTAssertNil(keychain[string: "username"], "not stored username")
  808. XCTAssertNil(keychain[string: "password"], "not stored password")
  809. keychain["username"] = "kishikawakatsumi"
  810. XCTAssertEqual(keychain["username"], "kishikawakatsumi", "stored username")
  811. XCTAssertEqual(keychain[string: "username"], "kishikawakatsumi", "stored username")
  812. keychain["password"] = "password1234"
  813. XCTAssertEqual(keychain["password"], "password1234", "stored password")
  814. XCTAssertEqual(keychain[string: "password"], "password1234", "stored password")
  815. keychain[string: "username"] = nil
  816. XCTAssertNil(keychain["username"], "removed username")
  817. XCTAssertEqual(keychain["password"], "password1234", "left password")
  818. XCTAssertNil(keychain[string: "username"], "removed username")
  819. XCTAssertEqual(keychain[string: "password"], "password1234", "left password")
  820. keychain[string: "password"] = nil
  821. XCTAssertNil(keychain["username"], "removed username")
  822. XCTAssertNil(keychain["password"], "removed password")
  823. XCTAssertNil(keychain[string: "username"], "removed username")
  824. XCTAssertNil(keychain[string: "password"], "removed password")
  825. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  826. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  827. XCTAssertNil(keychain[data:"JSONData"], "not stored JSON data")
  828. keychain[data: "JSONData"] = JSONData
  829. XCTAssertEqual(keychain[data: "JSONData"], JSONData, "stored JSON data")
  830. keychain[data: "JSONData"] = nil
  831. XCTAssertNil(keychain[data:"JSONData"], "removed JSON data")
  832. }
  833. // MARK:
  834. func testErrorHandling() {
  835. do {
  836. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  837. try keychain.removeAll()
  838. XCTAssertTrue(true, "no error occurred")
  839. } catch {
  840. XCTFail("error occurred")
  841. }
  842. do {
  843. let keychain = Keychain(service: "Twitter")
  844. try keychain.removeAll()
  845. XCTAssertTrue(true, "no error occurred")
  846. } catch {
  847. XCTFail("error occurred")
  848. }
  849. do {
  850. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  851. try keychain.removeAll()
  852. XCTAssertTrue(true, "no error occurred")
  853. } catch {
  854. XCTFail("error occurred")
  855. }
  856. do {
  857. let keychain = Keychain()
  858. try keychain.removeAll()
  859. XCTAssertTrue(true, "no error occurred")
  860. } catch {
  861. XCTFail("error occurred")
  862. }
  863. do {
  864. // Add Keychain items
  865. let keychain = Keychain(service: "Twitter")
  866. do {
  867. try keychain.set("kishikawa_katsumi", key: "username")
  868. XCTAssertTrue(true, "no error occurred")
  869. } catch {
  870. XCTFail("error occurred")
  871. }
  872. do {
  873. try keychain.set("password_1234", key: "password")
  874. XCTAssertTrue(true, "no error occurred")
  875. } catch {
  876. XCTFail("error occurred")
  877. }
  878. do {
  879. let username = try keychain.get("username")
  880. XCTAssertEqual(username, "kishikawa_katsumi")
  881. } catch {
  882. XCTFail("error occurred")
  883. }
  884. do {
  885. let password = try keychain.get("password")
  886. XCTAssertEqual(password, "password_1234")
  887. } catch {
  888. XCTFail("error occurred")
  889. }
  890. }
  891. do {
  892. // Update Keychain items
  893. let keychain = Keychain(service: "Twitter")
  894. do {
  895. try keychain.set("katsumi_kishikawa", key: "username")
  896. XCTAssertTrue(true, "no error occurred")
  897. } catch {
  898. XCTFail("error occurred")
  899. }
  900. do {
  901. try keychain.set("1234_password", key: "password")
  902. XCTAssertTrue(true, "no error occurred")
  903. } catch {
  904. XCTFail("error occurred")
  905. }
  906. do {
  907. let username = try keychain.get("username")
  908. XCTAssertEqual(username, "katsumi_kishikawa")
  909. } catch {
  910. XCTFail("error occurred")
  911. }
  912. do {
  913. let password = try keychain.get("password")
  914. XCTAssertEqual(password, "1234_password")
  915. } catch {
  916. XCTFail("error occurred")
  917. }
  918. }
  919. do {
  920. // Remove Keychain items
  921. let keychain = Keychain(service: "Twitter")
  922. do {
  923. try keychain.remove("username")
  924. XCTAssertNil(try! keychain.get("username"))
  925. } catch {
  926. XCTFail("error occurred")
  927. }
  928. do {
  929. try keychain.remove("password")
  930. XCTAssertNil(try! keychain.get("username"))
  931. } catch {
  932. XCTFail("error occurred")
  933. }
  934. }
  935. }
  936. // MARK:
  937. func testSetStringWithCustomService() {
  938. let username_1 = "kishikawakatsumi"
  939. let password_1 = "password1234"
  940. let username_2 = "kishikawa_katsumi"
  941. let password_2 = "password_1234"
  942. let username_3 = "k_katsumi"
  943. let password_3 = "12341234"
  944. let service_1 = ""
  945. let service_2 = "com.kishikawakatsumi.KeychainAccess"
  946. let service_3 = "example.com"
  947. do { try Keychain().removeAll() } catch {}
  948. do { try Keychain(service: service_1).removeAll() } catch {}
  949. do { try Keychain(service: service_2).removeAll() } catch {}
  950. do { try Keychain(service: service_3).removeAll() } catch {}
  951. XCTAssertNil(try! Keychain().get("username"), "not stored username")
  952. XCTAssertNil(try! Keychain().get("password"), "not stored password")
  953. XCTAssertNil(try! Keychain(service: service_1).get("username"), "not stored username")
  954. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  955. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  956. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  957. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  958. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  959. do { try Keychain().set(username_1, key: "username") } catch {}
  960. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  961. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  962. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  963. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  964. do { try Keychain(service: service_1).set(username_1, key: "username") } catch {}
  965. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  966. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  967. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  968. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  969. do { try Keychain(service: service_2).set(username_2, key: "username") } catch {}
  970. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  971. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  972. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "stored username")
  973. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  974. do { try Keychain(service: service_3).set(username_3, key: "username") } catch {}
  975. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  976. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  977. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "stored username")
  978. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "stored username")
  979. do { try Keychain().set(password_1, key: "password") } catch {}
  980. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  981. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  982. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  983. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  984. do { try Keychain(service: service_1).set(password_1, key: "password") } catch {}
  985. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  986. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  987. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  988. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  989. do { try Keychain(service: service_2).set(password_2, key: "password") } catch {}
  990. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  991. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  992. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "stored password")
  993. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  994. do { try Keychain(service: service_3).set(password_3, key: "password") } catch {}
  995. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  996. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  997. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "stored password")
  998. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "stored password")
  999. do { try Keychain().remove("username") } catch {}
  1000. XCTAssertNil(try! Keychain().get("username"), "removed username")
  1001. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "left username")
  1002. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "left username")
  1003. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  1004. do { try Keychain(service: service_1).remove("username") } catch {}
  1005. XCTAssertNil(try! Keychain().get("username"), "removed username")
  1006. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  1007. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "left username")
  1008. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  1009. do { try Keychain(service: service_2).remove("username") } catch {}
  1010. XCTAssertNil(try! Keychain().get("username"), "removed username")
  1011. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  1012. XCTAssertNil(try! Keychain(service: service_2).get("username"), "removed username")
  1013. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  1014. do { try Keychain(service: service_3).remove("username") } catch {}
  1015. XCTAssertNil(try! Keychain().get("username"), "removed username")
  1016. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  1017. XCTAssertNil(try! Keychain(service: service_2).get("username"), "removed username")
  1018. XCTAssertNil(try! Keychain(service: service_3).get("username"), "removed username")
  1019. do { try Keychain().remove("password") } catch {}
  1020. XCTAssertNil(try! Keychain().get("password"), "removed password")
  1021. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "left password")
  1022. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "left password")
  1023. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  1024. do { try Keychain(service: service_1).remove("password") } catch {}
  1025. XCTAssertNil(try! Keychain().get("password"), "removed password")
  1026. XCTAssertNil(try! Keychain(service: service_1).get("password"), "removed password")
  1027. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "left password")
  1028. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  1029. do { try Keychain(service: service_2).remove("password") } catch {}
  1030. XCTAssertNil(try! Keychain().get("password"), "removed password")
  1031. XCTAssertNil(try! Keychain(service: service_1).get("password"), "removed password")
  1032. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  1033. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  1034. do { try Keychain(service: service_3).remove("password") } catch {}
  1035. XCTAssertNil(try! Keychain().get("password"), "removed password")
  1036. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  1037. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  1038. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  1039. }
  1040. // MARK:
  1041. func testProperties() {
  1042. guard #available(OSX 10.10, *) else {
  1043. return
  1044. }
  1045. let keychain = Keychain()
  1046. XCTAssertEqual(keychain.synchronizable, false)
  1047. XCTAssertEqual(keychain.synchronizable(true).synchronizable, true)
  1048. XCTAssertEqual(keychain.synchronizable(false).synchronizable, false)
  1049. XCTAssertEqual(keychain.accessibility(.afterFirstUnlock).accessibility, Accessibility.afterFirstUnlock)
  1050. XCTAssertEqual(keychain.accessibility(.whenPasscodeSetThisDeviceOnly, authenticationPolicy: .userPresence).accessibility, Accessibility.whenPasscodeSetThisDeviceOnly)
  1051. XCTAssertEqual(keychain.accessibility(.whenPasscodeSetThisDeviceOnly, authenticationPolicy: .userPresence).authenticationPolicy, AuthenticationPolicy.userPresence)
  1052. XCTAssertNil(keychain.label)
  1053. XCTAssertEqual(keychain.label("Label").label, "Label")
  1054. XCTAssertNil(keychain.comment)
  1055. XCTAssertEqual(keychain.comment("Comment").comment, "Comment")
  1056. XCTAssertEqual(keychain.authenticationPrompt("Prompt").authenticationPrompt, "Prompt")
  1057. }
  1058. // MARK:
  1059. func testAllKeys() {
  1060. do {
  1061. let keychain = Keychain()
  1062. keychain["key1"] = "value1"
  1063. keychain["key2"] = "value2"
  1064. keychain["key3"] = "value3"
  1065. let allKeys = keychain.allKeys()
  1066. XCTAssertEqual(allKeys.count, 3)
  1067. XCTAssertEqual(allKeys.sorted(), ["key1", "key2", "key3"])
  1068. let allItems = keychain.allItems()
  1069. XCTAssertEqual(allItems.count, 3)
  1070. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  1071. let key1 = item1["key"] as! String
  1072. let key2 = item2["key"] as! String
  1073. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  1074. }
  1075. #if !os(OSX)
  1076. XCTAssertEqual(sortedItems[0]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  1077. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "false")
  1078. XCTAssertEqual(sortedItems[0]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1079. XCTAssertEqual(sortedItems[0]["value"] as? String, "value1")
  1080. XCTAssertEqual(sortedItems[0]["key"] as? String, "key1")
  1081. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  1082. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "AfterFirstUnlock")
  1083. XCTAssertEqual(sortedItems[1]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  1084. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "false")
  1085. XCTAssertEqual(sortedItems[1]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1086. XCTAssertEqual(sortedItems[1]["value"] as? String, "value2")
  1087. XCTAssertEqual(sortedItems[1]["key"] as? String, "key2")
  1088. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  1089. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "AfterFirstUnlock")
  1090. XCTAssertEqual(sortedItems[2]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  1091. XCTAssertEqual(sortedItems[2]["synchronizable"] as? String, "false")
  1092. XCTAssertEqual(sortedItems[2]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1093. XCTAssertEqual(sortedItems[2]["value"] as? String, "value3")
  1094. XCTAssertEqual(sortedItems[2]["key"] as? String, "key3")
  1095. XCTAssertEqual(sortedItems[2]["class"] as? String, "GenericPassword")
  1096. XCTAssertEqual(sortedItems[2]["accessibility"] as? String, "AfterFirstUnlock")
  1097. #else
  1098. XCTAssertEqual(sortedItems[0]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1099. XCTAssertEqual(sortedItems[0]["key"] as? String, "key1")
  1100. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  1101. XCTAssertEqual(sortedItems[1]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1102. XCTAssertEqual(sortedItems[1]["key"] as? String, "key2")
  1103. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  1104. XCTAssertEqual(sortedItems[2]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1105. XCTAssertEqual(sortedItems[2]["key"] as? String, "key3")
  1106. XCTAssertEqual(sortedItems[2]["class"] as? String, "GenericPassword")
  1107. #endif
  1108. }
  1109. do {
  1110. let keychain = Keychain(service: "service1")
  1111. try! keychain
  1112. .synchronizable(true)
  1113. .accessibility(.whenUnlockedThisDeviceOnly)
  1114. .set("service1_value1", key: "service1_key1")
  1115. try! keychain
  1116. .synchronizable(false)
  1117. .accessibility(.afterFirstUnlockThisDeviceOnly)
  1118. .set("service1_value2", key: "service1_key2")
  1119. let allKeys = keychain.allKeys()
  1120. XCTAssertEqual(allKeys.count, 2)
  1121. XCTAssertEqual(allKeys.sorted(), ["service1_key1", "service1_key2"])
  1122. let allItems = keychain.allItems()
  1123. XCTAssertEqual(allItems.count, 2)
  1124. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  1125. let key1 = item1["key"] as! String
  1126. let key2 = item2["key"] as! String
  1127. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  1128. }
  1129. #if !os(OSX)
  1130. XCTAssertEqual(sortedItems[0]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  1131. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "true")
  1132. XCTAssertEqual(sortedItems[0]["service"] as? String, "service1")
  1133. XCTAssertEqual(sortedItems[0]["value"] as? String, "service1_value1")
  1134. XCTAssertEqual(sortedItems[0]["key"] as? String, "service1_key1")
  1135. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  1136. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "WhenUnlockedThisDeviceOnly")
  1137. XCTAssertEqual(sortedItems[1]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  1138. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "false")
  1139. XCTAssertEqual(sortedItems[1]["service"] as? String, "service1")
  1140. XCTAssertEqual(sortedItems[1]["value"] as? String, "service1_value2")
  1141. XCTAssertEqual(sortedItems[1]["key"] as? String, "service1_key2")
  1142. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  1143. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "AfterFirstUnlockThisDeviceOnly")
  1144. #else
  1145. XCTAssertEqual(sortedItems[0]["service"] as? String, "service1")
  1146. XCTAssertEqual(sortedItems[0]["key"] as? String, "service1_key1")
  1147. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  1148. XCTAssertEqual(sortedItems[1]["service"] as? String, "service1")
  1149. XCTAssertEqual(sortedItems[1]["key"] as? String, "service1_key2")
  1150. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  1151. #endif
  1152. }
  1153. do {
  1154. let keychain = Keychain(server: "https://google.com", protocolType: .https)
  1155. try! keychain
  1156. .synchronizable(false)
  1157. .accessibility(.alwaysThisDeviceOnly)
  1158. .set("google.com_value1", key: "google.com_key1")
  1159. try! keychain
  1160. .synchronizable(true)
  1161. .accessibility(.always)
  1162. .set("google.com_value2", key: "google.com_key2")
  1163. let allKeys = keychain.allKeys()
  1164. XCTAssertEqual(allKeys.count, 2)
  1165. XCTAssertEqual(allKeys.sorted(), ["google.com_key1", "google.com_key2"])
  1166. let allItems = keychain.allItems()
  1167. XCTAssertEqual(allItems.count, 2)
  1168. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  1169. let key1 = item1["key"] as! String
  1170. let key2 = item2["key"] as! String
  1171. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  1172. }
  1173. #if !os(OSX)
  1174. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "false")
  1175. XCTAssertEqual(sortedItems[0]["value"] as? String, "google.com_value1")
  1176. XCTAssertEqual(sortedItems[0]["key"] as? String, "google.com_key1")
  1177. XCTAssertEqual(sortedItems[0]["server"] as? String, "google.com")
  1178. XCTAssertEqual(sortedItems[0]["class"] as? String, "InternetPassword")
  1179. XCTAssertEqual(sortedItems[0]["authenticationType"] as? String, "Default")
  1180. XCTAssertEqual(sortedItems[0]["protocol"] as? String, "HTTPS")
  1181. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "AlwaysThisDeviceOnly")
  1182. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "true")
  1183. XCTAssertEqual(sortedItems[1]["value"] as? String, "google.com_value2")
  1184. XCTAssertEqual(sortedItems[1]["key"] as? String, "google.com_key2")
  1185. XCTAssertEqual(sortedItems[1]["server"] as? String, "google.com")
  1186. XCTAssertEqual(sortedItems[1]["class"] as? String, "InternetPassword")
  1187. XCTAssertEqual(sortedItems[1]["authenticationType"] as? String, "Default")
  1188. XCTAssertEqual(sortedItems[1]["protocol"] as? String, "HTTPS")
  1189. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "Always")
  1190. #else
  1191. XCTAssertEqual(sortedItems[0]["key"] as? String, "google.com_key1")
  1192. XCTAssertEqual(sortedItems[0]["server"] as? String, "google.com")
  1193. XCTAssertEqual(sortedItems[0]["class"] as? String, "InternetPassword")
  1194. XCTAssertEqual(sortedItems[0]["authenticationType"] as? String, "Default")
  1195. XCTAssertEqual(sortedItems[0]["protocol"] as? String, "HTTPS")
  1196. XCTAssertEqual(sortedItems[1]["key"] as? String, "google.com_key2")
  1197. XCTAssertEqual(sortedItems[1]["server"] as? String, "google.com")
  1198. XCTAssertEqual(sortedItems[1]["class"] as? String, "InternetPassword")
  1199. XCTAssertEqual(sortedItems[1]["authenticationType"] as? String, "Default")
  1200. XCTAssertEqual(sortedItems[1]["protocol"] as? String, "HTTPS")
  1201. #endif
  1202. }
  1203. #if !os(OSX)
  1204. do {
  1205. let allKeys = Keychain.allKeys(.genericPassword)
  1206. XCTAssertEqual(allKeys.count, 5)
  1207. let sortedKeys = allKeys.sorted { (key1, key2) -> Bool in
  1208. return key1.1.compare(key2.1) == .orderedAscending || key1.1.compare(key2.1) == .orderedSame
  1209. }
  1210. XCTAssertEqual(sortedKeys[0].0, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1211. XCTAssertEqual(sortedKeys[0].1, "key1")
  1212. XCTAssertEqual(sortedKeys[1].0, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1213. XCTAssertEqual(sortedKeys[1].1, "key2")
  1214. XCTAssertEqual(sortedKeys[2].0, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1215. XCTAssertEqual(sortedKeys[2].1, "key3")
  1216. XCTAssertEqual(sortedKeys[3].0, "service1")
  1217. XCTAssertEqual(sortedKeys[3].1, "service1_key1")
  1218. XCTAssertEqual(sortedKeys[4].0, "service1")
  1219. XCTAssertEqual(sortedKeys[4].1, "service1_key2")
  1220. }
  1221. do {
  1222. let allKeys = Keychain.allKeys(.internetPassword)
  1223. XCTAssertEqual(allKeys.count, 2)
  1224. let sortedKeys = allKeys.sorted { (key1, key2) -> Bool in
  1225. return key1.1.compare(key2.1) == .orderedAscending || key1.1.compare(key2.1) == .orderedSame
  1226. }
  1227. XCTAssertEqual(sortedKeys[0].0, "google.com")
  1228. XCTAssertEqual(sortedKeys[0].1, "google.com_key1")
  1229. XCTAssertEqual(sortedKeys[1].0, "google.com")
  1230. XCTAssertEqual(sortedKeys[1].1, "google.com_key2")
  1231. }
  1232. #endif
  1233. }
  1234. func testDescription() {
  1235. do {
  1236. let keychain = Keychain()
  1237. XCTAssertEqual(keychain.description, "[]")
  1238. XCTAssertEqual(keychain.debugDescription, "[]")
  1239. }
  1240. }
  1241. // MARK:
  1242. func testAuthenticationPolicy() {
  1243. guard #available(iOS 9.0, OSX 10.11, *) else {
  1244. return
  1245. }
  1246. do {
  1247. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1248. let policy: AuthenticationPolicy = [.userPresence]
  1249. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1250. var error: Unmanaged<CFError>?
  1251. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1252. XCTAssertNil(error)
  1253. XCTAssertNotNil(accessControl)
  1254. }
  1255. #if os(iOS)
  1256. do {
  1257. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1258. let policy: AuthenticationPolicy = [.userPresence, .applicationPassword]
  1259. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1260. var error: Unmanaged<CFError>?
  1261. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1262. XCTAssertNil(error)
  1263. XCTAssertNotNil(accessControl)
  1264. }
  1265. do {
  1266. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1267. let policy: AuthenticationPolicy = [.userPresence, .applicationPassword, .privateKeyUsage]
  1268. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1269. var error: Unmanaged<CFError>?
  1270. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1271. XCTAssertNil(error)
  1272. XCTAssertNotNil(accessControl)
  1273. }
  1274. do {
  1275. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1276. let policy: AuthenticationPolicy = [.applicationPassword]
  1277. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1278. var error: Unmanaged<CFError>?
  1279. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1280. XCTAssertNil(error)
  1281. XCTAssertNotNil(accessControl)
  1282. }
  1283. do {
  1284. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1285. let policy: AuthenticationPolicy = [.applicationPassword, .privateKeyUsage]
  1286. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1287. var error: Unmanaged<CFError>?
  1288. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1289. XCTAssertNil(error)
  1290. XCTAssertNotNil(accessControl)
  1291. }
  1292. do {
  1293. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1294. let policy: AuthenticationPolicy = [.privateKeyUsage]
  1295. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1296. var error: Unmanaged<CFError>?
  1297. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1298. XCTAssertNil(error)
  1299. XCTAssertNotNil(accessControl)
  1300. }
  1301. do {
  1302. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1303. let policy: AuthenticationPolicy = [.touchIDAny]
  1304. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1305. var error: Unmanaged<CFError>?
  1306. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1307. XCTAssertNil(error)
  1308. XCTAssertNotNil(accessControl)
  1309. }
  1310. do {
  1311. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1312. let policy: AuthenticationPolicy = [.touchIDAny, .devicePasscode]
  1313. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1314. var error: Unmanaged<CFError>?
  1315. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1316. XCTAssertNil(error)
  1317. XCTAssertTrue(accessControl != nil)
  1318. }
  1319. do {
  1320. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1321. let policy: AuthenticationPolicy = [.touchIDAny, .applicationPassword]
  1322. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1323. var error: Unmanaged<CFError>?
  1324. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1325. XCTAssertNil(error)
  1326. XCTAssertNotNil(accessControl)
  1327. }
  1328. do {
  1329. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1330. let policy: AuthenticationPolicy = [.touchIDAny, .applicationPassword, .privateKeyUsage]
  1331. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1332. var error: Unmanaged<CFError>?
  1333. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1334. XCTAssertNil(error)
  1335. XCTAssertNotNil(accessControl)
  1336. }
  1337. do {
  1338. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1339. let policy: AuthenticationPolicy = [.touchIDCurrentSet]
  1340. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1341. var error: Unmanaged<CFError>?
  1342. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1343. XCTAssertNil(error)
  1344. XCTAssertNotNil(accessControl)
  1345. }
  1346. do {
  1347. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1348. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .devicePasscode]
  1349. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1350. var error: Unmanaged<CFError>?
  1351. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1352. XCTAssertNil(error)
  1353. XCTAssertTrue(accessControl != nil)
  1354. }
  1355. do {
  1356. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1357. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .applicationPassword]
  1358. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1359. var error: Unmanaged<CFError>?
  1360. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1361. XCTAssertNil(error)
  1362. XCTAssertNotNil(accessControl)
  1363. }
  1364. do {
  1365. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1366. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .applicationPassword, .privateKeyUsage]
  1367. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1368. var error: Unmanaged<CFError>?
  1369. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1370. XCTAssertNil(error)
  1371. XCTAssertNotNil(accessControl)
  1372. }
  1373. do {
  1374. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1375. let policy: AuthenticationPolicy = [.touchIDAny, .or, .devicePasscode]
  1376. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1377. var error: Unmanaged<CFError>?
  1378. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1379. XCTAssertNil(error)
  1380. XCTAssertTrue(accessControl != nil)
  1381. }
  1382. do {
  1383. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1384. let policy: AuthenticationPolicy = [.touchIDAny, .and, .devicePasscode]
  1385. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1386. var error: Unmanaged<CFError>?
  1387. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1388. XCTAssertNil(error)
  1389. XCTAssertTrue(accessControl != nil)
  1390. }
  1391. #endif
  1392. #if os(OSX)
  1393. do {
  1394. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1395. let policy: AuthenticationPolicy = [.userPresence]
  1396. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1397. var error: Unmanaged<CFError>?
  1398. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1399. XCTAssertNil(error)
  1400. XCTAssertNotNil(accessControl)
  1401. }
  1402. do {
  1403. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1404. let policy: AuthenticationPolicy = [.devicePasscode]
  1405. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1406. var error: Unmanaged<CFError>?
  1407. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1408. XCTAssertNil(error)
  1409. XCTAssertNotNil(accessControl)
  1410. }
  1411. #endif
  1412. }
  1413. }