KeychainAccessTests.swift 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639
  1. //
  2. // KeychainAccessTests.swift
  3. // KeychainAccessTests
  4. //
  5. // Created by kishikawa katsumi on 2014/12/24.
  6. // Copyright (c) 2014 kishikawa katsumi. All rights reserved.
  7. //
  8. import Foundation
  9. import XCTest
  10. import KeychainAccess
  11. class KeychainAccessTests: XCTestCase {
  12. override func setUp() {
  13. super.setUp()
  14. Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared").removeAll()
  15. Keychain(service: "Twitter").removeAll()
  16. Keychain(server: NSURL(string: "https://example.com")!, protocolType: .HTTPS).removeAll()
  17. Keychain().removeAll()
  18. }
  19. override func tearDown() {
  20. super.tearDown()
  21. }
  22. func locally(x: () -> ()) {
  23. x()
  24. }
  25. // MARK:
  26. func testGenericPassword() {
  27. locally {
  28. // Add Keychain items
  29. let keychain = Keychain(service: "Twitter")
  30. keychain.set("kishikawa_katsumi", key: "username")
  31. keychain.set("password_1234", key: "password")
  32. let username = keychain.get("username")
  33. XCTAssertEqual(username!, "kishikawa_katsumi")
  34. let password = keychain.get("password")
  35. XCTAssertEqual(password!, "password_1234")
  36. }
  37. locally {
  38. // Update Keychain items
  39. let keychain = Keychain(service: "Twitter")
  40. keychain.set("katsumi_kishikawa", key: "username")
  41. keychain.set("1234_password", key: "password")
  42. let username = keychain.get("username")
  43. XCTAssertEqual(username!, "katsumi_kishikawa")
  44. let password = keychain.get("password")
  45. XCTAssertEqual(password!, "1234_password")
  46. }
  47. locally {
  48. // Remove Keychain items
  49. let keychain = Keychain(service: "Twitter")
  50. keychain.remove("username")
  51. keychain.remove("password")
  52. XCTAssertNil(keychain.get("username"))
  53. XCTAssertNil(keychain.get("password"))
  54. }
  55. }
  56. func testGenericPasswordSubscripting() {
  57. locally {
  58. // Add Keychain items
  59. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  60. keychain["username"] = "kishikawa_katsumi"
  61. keychain["password"] = "password_1234"
  62. let username = keychain["username"]
  63. XCTAssertEqual(username!, "kishikawa_katsumi")
  64. let password = keychain["password"]
  65. XCTAssertEqual(password!, "password_1234")
  66. }
  67. locally {
  68. // Update Keychain items
  69. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  70. keychain["username"] = "katsumi_kishikawa"
  71. keychain["password"] = "1234_password"
  72. let username = keychain["username"]
  73. XCTAssertEqual(username!, "katsumi_kishikawa")
  74. let password = keychain["password"]
  75. XCTAssertEqual(password!, "1234_password")
  76. }
  77. locally {
  78. // Remove Keychain items
  79. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  80. keychain["username"] = nil
  81. keychain["password"] = nil
  82. XCTAssertNil(keychain["username"])
  83. XCTAssertNil(keychain["password"])
  84. }
  85. }
  86. // MARK:
  87. func testInternetPassword() {
  88. locally {
  89. // Add Keychain items
  90. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  91. keychain.set("kishikawa_katsumi", key: "username")
  92. keychain.set("password_1234", key: "password")
  93. let username = keychain.get("username")
  94. XCTAssertEqual(username!, "kishikawa_katsumi")
  95. let password = keychain.get("password")
  96. XCTAssertEqual(password!, "password_1234")
  97. }
  98. locally {
  99. // Update Keychain items
  100. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  101. keychain.set("katsumi_kishikawa", key: "username")
  102. keychain.set("1234_password", key: "password")
  103. let username = keychain.get("username")
  104. XCTAssertEqual(username!, "katsumi_kishikawa")
  105. let password = keychain.get("password")
  106. XCTAssertEqual(password!, "1234_password")
  107. }
  108. locally {
  109. // Remove Keychain items
  110. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  111. keychain.remove("username")
  112. keychain.remove("password")
  113. XCTAssertNil(keychain.get("username"))
  114. XCTAssertNil(keychain.get("password"))
  115. }
  116. }
  117. func testInternetPasswordSubscripting() {
  118. locally {
  119. // Add Keychain items
  120. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  121. keychain["username"] = "kishikawa_katsumi"
  122. keychain["password"] = "password_1234"
  123. let username = keychain["username"]
  124. XCTAssertEqual(username!, "kishikawa_katsumi")
  125. let password = keychain["password"]
  126. XCTAssertEqual(password!, "password_1234")
  127. }
  128. locally {
  129. // Update Keychain items
  130. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  131. keychain["username"] = "katsumi_kishikawa"
  132. keychain["password"] = "1234_password"
  133. let username = keychain["username"]
  134. XCTAssertEqual(username!, "katsumi_kishikawa")
  135. let password = keychain["password"]
  136. XCTAssertEqual(password!, "1234_password")
  137. }
  138. locally {
  139. // Remove Keychain items
  140. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  141. keychain["username"] = nil
  142. keychain["password"] = nil
  143. XCTAssertNil(keychain["username"])
  144. XCTAssertNil(keychain["password"])
  145. }
  146. }
  147. // MARK:
  148. func testDefaultInitializer() {
  149. let keychain = Keychain()
  150. XCTAssertEqual(keychain.service, "")
  151. XCTAssertNil(keychain.accessGroup)
  152. }
  153. func testInitializerWithService() {
  154. let keychain = Keychain(service: "com.example.github-token")
  155. XCTAssertEqual(keychain.service, "com.example.github-token")
  156. XCTAssertNil(keychain.accessGroup)
  157. }
  158. func testInitializerWithAccessGroup() {
  159. let keychain = Keychain(accessGroup: "12ABCD3E4F.shared")
  160. XCTAssertEqual(keychain.service, "")
  161. XCTAssertEqual(keychain.accessGroup!, "12ABCD3E4F.shared")
  162. }
  163. func testInitializerWithServiceAndAccessGroup() {
  164. let keychain = Keychain(service: "com.example.github-token", accessGroup: "12ABCD3E4F.shared")
  165. XCTAssertEqual(keychain.service, "com.example.github-token")
  166. XCTAssertEqual(keychain.accessGroup!, "12ABCD3E4F.shared")
  167. }
  168. func testInitializerWithServer() {
  169. let URL = NSURL(string: "https://kishikawakatsumi.com")!
  170. let keychain = Keychain(server: URL, protocolType: .HTTPS)
  171. XCTAssertEqual(keychain.server, URL)
  172. XCTAssertEqual(keychain.protocolType, ProtocolType.HTTPS)
  173. XCTAssertEqual(keychain.authenticationType, AuthenticationType.Default)
  174. }
  175. func testInitializerWithServerAndAuthenticationType() {
  176. let URL = NSURL(string: "https://kishikawakatsumi.com")!
  177. let keychain = Keychain(server: URL, protocolType: .HTTPS, authenticationType: .HTMLForm)
  178. XCTAssertEqual(keychain.server, URL)
  179. XCTAssertEqual(keychain.protocolType, ProtocolType.HTTPS)
  180. XCTAssertEqual(keychain.authenticationType, AuthenticationType.HTMLForm)
  181. }
  182. // MARK:
  183. func testContains() {
  184. let keychain = Keychain(service: "Twitter")
  185. XCTAssertFalse(keychain.contains("username"), "not stored username")
  186. XCTAssertFalse(keychain.contains("password"), "not stored password")
  187. keychain.set("kishikawakatsumi", key: "username")
  188. XCTAssertTrue(keychain.contains("username"), "stored username")
  189. XCTAssertFalse(keychain.contains("password"), "not stored password")
  190. keychain.set("password1234", key: "password")
  191. XCTAssertTrue(keychain.contains("username"), "stored username")
  192. XCTAssertTrue(keychain.contains("password"), "stored password")
  193. }
  194. // MARK:
  195. func testSetString() {
  196. let keychain = Keychain(service: "Twitter")
  197. XCTAssertNil(keychain.get("username"), "not stored username")
  198. XCTAssertNil(keychain.get("password"), "not stored password")
  199. keychain.set("kishikawakatsumi", key: "username")
  200. XCTAssertEqual(keychain.get("username")!, "kishikawakatsumi", "stored username")
  201. XCTAssertNil(keychain.get("password"), "not stored password")
  202. keychain.set("password1234", key: "password")
  203. XCTAssertEqual(keychain.get("username")!, "kishikawakatsumi", "stored username")
  204. XCTAssertEqual(keychain.get("password")!, "password1234", "stored password")
  205. }
  206. func testSetData() {
  207. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  208. let JSONData = NSJSONSerialization.dataWithJSONObject(JSONObject, options: nil, error: nil)
  209. let keychain = Keychain(service: "Twitter")
  210. XCTAssertNil(keychain.getData("JSONData"), "not stored JSON data")
  211. keychain.set(JSONData!, key: "JSONData")
  212. XCTAssertEqual(keychain.getData("JSONData")!, JSONData!, "stored JSON data")
  213. }
  214. func testRemoveString() {
  215. let keychain = Keychain(service: "Twitter")
  216. XCTAssertNil(keychain.get("username"), "not stored username")
  217. XCTAssertNil(keychain.get("password"), "not stored password")
  218. keychain.set("kishikawakatsumi", key: "username")
  219. XCTAssertEqual(keychain.get("username")!, "kishikawakatsumi", "stored username")
  220. keychain.set("password1234", key: "password")
  221. XCTAssertEqual(keychain.get("password")!, "password1234", "stored password")
  222. keychain.remove("username")
  223. XCTAssertNil(keychain.get("username"), "removed username")
  224. XCTAssertEqual(keychain.get("password")!, "password1234", "left password")
  225. keychain.remove("password")
  226. XCTAssertNil(keychain.get("username"), "removed username")
  227. XCTAssertNil(keychain.get("password"), "removed password")
  228. }
  229. func testRemoveData() {
  230. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  231. let JSONData = NSJSONSerialization.dataWithJSONObject(JSONObject, options: nil, error: nil)
  232. let keychain = Keychain(service: "Twitter")
  233. XCTAssertNil(keychain.getData("JSONData"), "not stored JSON data")
  234. keychain.set(JSONData!, key: "JSONData")
  235. XCTAssertEqual(keychain.getData("JSONData")!, JSONData!, "stored JSON data")
  236. keychain.remove("JSONData")
  237. XCTAssertNil(keychain.getData("JSONData"), "removed JSON data")
  238. }
  239. // MARK:
  240. func testSubscripting() {
  241. let keychain = Keychain(service: "Twitter")
  242. XCTAssertNil(keychain["username"], "not stored username")
  243. XCTAssertNil(keychain["password"], "not stored password")
  244. keychain["username"] = "kishikawakatsumi"
  245. XCTAssertEqual(keychain["username"]!, "kishikawakatsumi", "stored username")
  246. keychain["password"] = "password1234"
  247. XCTAssertEqual(keychain["password"]!, "password1234", "stored password")
  248. keychain["username"] = nil
  249. XCTAssertNil(keychain["username"], "removed username")
  250. XCTAssertEqual(keychain["password"]!, "password1234", "left password")
  251. keychain["password"] = nil
  252. XCTAssertNil(keychain["username"], "removed username")
  253. XCTAssertNil(keychain["password"], "removed password")
  254. }
  255. // MARK:
  256. #if os(iOS)
  257. func testErrorHandling() {
  258. if let error = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared").removeAll() {
  259. XCTAssertNil(error, "no error occurred")
  260. }
  261. if let error = Keychain(service: "Twitter").removeAll() {
  262. XCTAssertNil(error, "no error occurred")
  263. }
  264. if let error = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS).removeAll() {
  265. XCTAssertNil(error, "no error occurred")
  266. }
  267. if let error = Keychain().removeAll() {
  268. XCTAssertNil(error, "no error occurred")
  269. }
  270. locally {
  271. // Add Keychain items
  272. let keychain = Keychain(service: "Twitter")
  273. if let error = keychain.set("kishikawa_katsumi", key: "username") {
  274. XCTAssertNil(error, "no error occurred")
  275. }
  276. if let error = keychain.set("password_1234", key: "password") {
  277. XCTAssertNil(error, "no error occurred")
  278. }
  279. let username = keychain.getStringOrError("username")
  280. switch username { // enum
  281. case .Success:
  282. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  283. case .Failure:
  284. XCTFail("unknown error occurred")
  285. }
  286. if let error = username.error { // error object
  287. XCTFail("unknown error occurred")
  288. } else {
  289. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  290. }
  291. if username.succeeded { // check succeeded property
  292. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  293. } else {
  294. XCTFail("unknown error occurred")
  295. }
  296. if username.failed { // failed property
  297. XCTFail("unknown error occurred")
  298. } else {
  299. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  300. }
  301. let password = keychain.getStringOrError("password")
  302. switch password { // enum
  303. case .Success:
  304. XCTAssertEqual(password.value!, "password_1234")
  305. case .Failure:
  306. XCTFail("unknown error occurred")
  307. }
  308. if let error = password.error { // error object
  309. XCTFail("unknown error occurred")
  310. } else {
  311. XCTAssertEqual(password.value!, "password_1234")
  312. }
  313. if password.succeeded { // check succeeded property
  314. XCTAssertEqual(password.value!, "password_1234")
  315. } else {
  316. XCTFail("unknown error occurred")
  317. }
  318. if password.failed { // failed property
  319. XCTFail("unknown error occurred")
  320. } else {
  321. XCTAssertEqual(password.value!, "password_1234")
  322. }
  323. }
  324. locally {
  325. // Update Keychain items
  326. let keychain = Keychain(service: "Twitter")
  327. if let error = keychain.set("katsumi_kishikawa", key: "username") {
  328. XCTAssertNil(error, "no error occurred")
  329. }
  330. if let error = keychain.set("1234_password", key: "password") {
  331. XCTAssertNil(error, "no error occurred")
  332. }
  333. let username = keychain.getStringOrError("username")
  334. switch username { // enum
  335. case .Success:
  336. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  337. case .Failure:
  338. XCTFail("unknown error occurred")
  339. }
  340. if let error = username.error { // error object
  341. XCTFail("unknown error occurred")
  342. } else {
  343. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  344. }
  345. if username.succeeded { // check succeeded property
  346. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  347. } else {
  348. XCTFail("unknown error occurred")
  349. }
  350. if username.failed { // failed property
  351. XCTFail("unknown error occurred")
  352. } else {
  353. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  354. }
  355. let password = keychain.getStringOrError("password")
  356. switch password { // enum
  357. case .Success:
  358. XCTAssertEqual(password.value!, "1234_password")
  359. case .Failure:
  360. XCTFail("unknown error occurred")
  361. }
  362. if let error = password.error { // check error object
  363. XCTFail("unknown error occurred")
  364. } else {
  365. XCTAssertEqual(password.value!, "1234_password")
  366. }
  367. if password.succeeded { // check succeeded property
  368. XCTAssertEqual(password.value!, "1234_password")
  369. } else {
  370. XCTFail("unknown error occurred")
  371. }
  372. if password.failed { // check failed property
  373. XCTFail("unknown error occurred")
  374. } else {
  375. XCTAssertEqual(password.value!, "1234_password")
  376. }
  377. }
  378. locally {
  379. // Remove Keychain items
  380. let keychain = Keychain(service: "Twitter")
  381. if let error = keychain.remove("username") {
  382. XCTAssertNil(error, "no error occurred")
  383. }
  384. if let error = keychain.remove("password") {
  385. XCTAssertNil(error, "no error occurred")
  386. }
  387. XCTAssertNil(keychain.get("username"))
  388. XCTAssertNil(keychain.get("password"))
  389. }
  390. }
  391. #endif
  392. // MARK:
  393. func testSetStringWithCustomService() {
  394. let username_1 = "kishikawakatsumi"
  395. let password_1 = "password1234"
  396. let username_2 = "kishikawa_katsumi"
  397. let password_2 = "password_1234"
  398. let username_3 = "k_katsumi"
  399. let password_3 = "12341234"
  400. let service_1 = ""
  401. let service_2 = "com.kishikawakatsumi.KeychainAccess"
  402. let service_3 = "example.com"
  403. Keychain().removeAll()
  404. Keychain(service: service_1).removeAll()
  405. Keychain(service: service_2).removeAll()
  406. Keychain(service: service_3).removeAll()
  407. XCTAssertNil(Keychain().get("username"), "not stored username")
  408. XCTAssertNil(Keychain().get("password"), "not stored password")
  409. XCTAssertNil(Keychain(service: service_1).get("username"), "not stored username")
  410. XCTAssertNil(Keychain(service: service_1).get("password"), "not stored password")
  411. XCTAssertNil(Keychain(service: service_2).get("username"), "not stored username")
  412. XCTAssertNil(Keychain(service: service_2).get("password"), "not stored password")
  413. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  414. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  415. Keychain().set(username_1, key: "username")
  416. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  417. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  418. XCTAssertNil(Keychain(service: service_2).get("username"), "not stored username")
  419. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  420. Keychain(service: service_1).set(username_1, key: "username")
  421. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  422. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  423. XCTAssertNil(Keychain(service: service_2).get("username"), "not stored username")
  424. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  425. Keychain(service: service_2).set(username_2, key: "username")
  426. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  427. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  428. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "stored username")
  429. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  430. Keychain(service: service_3).set(username_3, key: "username")
  431. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  432. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  433. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "stored username")
  434. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "stored username")
  435. Keychain().set(password_1, key: "password")
  436. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  437. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  438. XCTAssertNil(Keychain(service: service_2).get("password"), "not stored password")
  439. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  440. Keychain(service: service_1).set(password_1, key: "password")
  441. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  442. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  443. XCTAssertNil(Keychain(service: service_2).get("password"), "not stored password")
  444. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  445. Keychain(service: service_2).set(password_2, key: "password")
  446. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  447. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  448. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "stored password")
  449. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  450. Keychain(service: service_3).set(password_3, key: "password")
  451. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  452. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  453. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "stored password")
  454. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "stored password")
  455. Keychain().remove("username")
  456. XCTAssertNil(Keychain().get("username"), "removed username")
  457. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  458. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "left username")
  459. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "left username")
  460. Keychain(service: service_1).remove("username")
  461. XCTAssertNil(Keychain().get("username"), "removed username")
  462. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  463. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "left username")
  464. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "left username")
  465. Keychain(service: service_2).remove("username")
  466. XCTAssertNil(Keychain().get("username"), "removed username")
  467. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  468. XCTAssertNil(Keychain(service: service_2).get("username"), "removed username")
  469. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "left username")
  470. Keychain(service: service_3).remove("username")
  471. XCTAssertNil(Keychain().get("username"), "removed username")
  472. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  473. XCTAssertNil(Keychain(service: service_2).get("username"), "removed username")
  474. XCTAssertNil(Keychain(service: service_3).get("username"), "removed username")
  475. Keychain().remove("password")
  476. XCTAssertNil(Keychain().get("password"), "removed password")
  477. XCTAssertNil(Keychain(service: service_1).get("password"), "removed password")
  478. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "left password")
  479. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "left password")
  480. Keychain(service: service_1).remove("password")
  481. XCTAssertNil(Keychain().get("password"), "removed password")
  482. XCTAssertNil(Keychain(service: service_1).get("password"), "removed password")
  483. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "left password")
  484. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "left password")
  485. Keychain(service: service_2).remove("password")
  486. XCTAssertNil(Keychain().get("password"), "removed password")
  487. XCTAssertNil(Keychain(service: service_1).get("password"), "removed password")
  488. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  489. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "left password")
  490. Keychain(service: service_3).remove("password")
  491. XCTAssertNil(Keychain().get("password"), "removed password")
  492. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  493. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  494. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  495. }
  496. }