KeychainAccessTests.swift 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655
  1. //
  2. // KeychainAccessTests.swift
  3. // KeychainAccessTests
  4. //
  5. // Created by kishikawa katsumi on 2014/12/24.
  6. // Copyright (c) 2014 kishikawa katsumi. All rights reserved.
  7. //
  8. import Foundation
  9. import XCTest
  10. import KeychainAccess
  11. class KeychainAccessTests: XCTestCase {
  12. override func setUp() {
  13. super.setUp()
  14. Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared").removeAll()
  15. Keychain(service: "Twitter").removeAll()
  16. Keychain(server: NSURL(string: "https://example.com")!, protocolType: .HTTPS).removeAll()
  17. Keychain().removeAll()
  18. }
  19. override func tearDown() {
  20. super.tearDown()
  21. }
  22. func locally(x: () -> ()) {
  23. x()
  24. }
  25. // MARK:
  26. func testGenericPassword() {
  27. locally {
  28. // Add Keychain items
  29. let keychain = Keychain(service: "Twitter")
  30. keychain.set("kishikawa_katsumi", key: "username")
  31. keychain.set("password_1234", key: "password")
  32. let username = keychain.get("username")
  33. XCTAssertEqual(username!, "kishikawa_katsumi")
  34. let password = keychain.get("password")
  35. XCTAssertEqual(password!, "password_1234")
  36. }
  37. locally {
  38. // Update Keychain items
  39. let keychain = Keychain(service: "Twitter")
  40. keychain.set("katsumi_kishikawa", key: "username")
  41. keychain.set("1234_password", key: "password")
  42. let username = keychain.get("username")
  43. XCTAssertEqual(username!, "katsumi_kishikawa")
  44. let password = keychain.get("password")
  45. XCTAssertEqual(password!, "1234_password")
  46. }
  47. locally {
  48. // Remove Keychain items
  49. let keychain = Keychain(service: "Twitter")
  50. keychain.remove("username")
  51. keychain.remove("password")
  52. XCTAssertNil(keychain.get("username"))
  53. XCTAssertNil(keychain.get("password"))
  54. }
  55. }
  56. func testGenericPasswordSubscripting() {
  57. locally {
  58. // Add Keychain items
  59. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  60. keychain["username"] = "kishikawa_katsumi"
  61. keychain["password"] = "password_1234"
  62. let username = keychain["username"]
  63. XCTAssertEqual(username!, "kishikawa_katsumi")
  64. let password = keychain["password"]
  65. XCTAssertEqual(password!, "password_1234")
  66. }
  67. locally {
  68. // Update Keychain items
  69. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  70. keychain["username"] = "katsumi_kishikawa"
  71. keychain["password"] = "1234_password"
  72. let username = keychain["username"]
  73. XCTAssertEqual(username!, "katsumi_kishikawa")
  74. let password = keychain["password"]
  75. XCTAssertEqual(password!, "1234_password")
  76. }
  77. locally {
  78. // Remove Keychain items
  79. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  80. keychain["username"] = nil
  81. keychain["password"] = nil
  82. XCTAssertNil(keychain["username"])
  83. XCTAssertNil(keychain["password"])
  84. }
  85. }
  86. // MARK:
  87. func testInternetPassword() {
  88. locally {
  89. // Add Keychain items
  90. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  91. keychain.set("kishikawa_katsumi", key: "username")
  92. keychain.set("password_1234", key: "password")
  93. let username = keychain.get("username")
  94. XCTAssertEqual(username!, "kishikawa_katsumi")
  95. let password = keychain.get("password")
  96. XCTAssertEqual(password!, "password_1234")
  97. }
  98. locally {
  99. // Update Keychain items
  100. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  101. keychain.set("katsumi_kishikawa", key: "username")
  102. keychain.set("1234_password", key: "password")
  103. let username = keychain.get("username")
  104. XCTAssertEqual(username!, "katsumi_kishikawa")
  105. let password = keychain.get("password")
  106. XCTAssertEqual(password!, "1234_password")
  107. }
  108. locally {
  109. // Remove Keychain items
  110. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  111. keychain.remove("username")
  112. keychain.remove("password")
  113. XCTAssertNil(keychain.get("username"))
  114. XCTAssertNil(keychain.get("password"))
  115. }
  116. }
  117. func testInternetPasswordSubscripting() {
  118. locally {
  119. // Add Keychain items
  120. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  121. keychain["username"] = "kishikawa_katsumi"
  122. keychain["password"] = "password_1234"
  123. let username = keychain["username"]
  124. XCTAssertEqual(username!, "kishikawa_katsumi")
  125. let password = keychain["password"]
  126. XCTAssertEqual(password!, "password_1234")
  127. }
  128. locally {
  129. // Update Keychain items
  130. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  131. keychain["username"] = "katsumi_kishikawa"
  132. keychain["password"] = "1234_password"
  133. let username = keychain["username"]
  134. XCTAssertEqual(username!, "katsumi_kishikawa")
  135. let password = keychain["password"]
  136. XCTAssertEqual(password!, "1234_password")
  137. }
  138. locally {
  139. // Remove Keychain items
  140. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  141. keychain["username"] = nil
  142. keychain["password"] = nil
  143. XCTAssertNil(keychain["username"])
  144. XCTAssertNil(keychain["password"])
  145. }
  146. }
  147. // MARK:
  148. func testDefaultInitializer() {
  149. let keychain = Keychain()
  150. XCTAssertEqual(keychain.service, "")
  151. XCTAssertNil(keychain.accessGroup)
  152. }
  153. func testInitializerWithService() {
  154. let keychain = Keychain(service: "com.example.github-token")
  155. XCTAssertEqual(keychain.service, "com.example.github-token")
  156. XCTAssertNil(keychain.accessGroup)
  157. }
  158. func testInitializerWithAccessGroup() {
  159. let keychain = Keychain(accessGroup: "12ABCD3E4F.shared")
  160. XCTAssertEqual(keychain.service, "")
  161. XCTAssertEqual(keychain.accessGroup!, "12ABCD3E4F.shared")
  162. }
  163. func testInitializerWithServiceAndAccessGroup() {
  164. let keychain = Keychain(service: "com.example.github-token", accessGroup: "12ABCD3E4F.shared")
  165. XCTAssertEqual(keychain.service, "com.example.github-token")
  166. XCTAssertEqual(keychain.accessGroup!, "12ABCD3E4F.shared")
  167. }
  168. func testInitializerWithServer() {
  169. let URL = NSURL(string: "https://kishikawakatsumi.com")!
  170. let keychain = Keychain(server: URL, protocolType: .HTTPS)
  171. XCTAssertEqual(keychain.server, URL)
  172. XCTAssertEqual(keychain.protocolType, ProtocolType.HTTPS)
  173. XCTAssertEqual(keychain.authenticationType, AuthenticationType.Default)
  174. }
  175. func testInitializerWithServerAndAuthenticationType() {
  176. let URL = NSURL(string: "https://kishikawakatsumi.com")!
  177. let keychain = Keychain(server: URL, protocolType: .HTTPS, authenticationType: .HTMLForm)
  178. XCTAssertEqual(keychain.server, URL)
  179. XCTAssertEqual(keychain.protocolType, ProtocolType.HTTPS)
  180. XCTAssertEqual(keychain.authenticationType, AuthenticationType.HTMLForm)
  181. }
  182. // MARK:
  183. func testContains() {
  184. let keychain = Keychain(service: "Twitter")
  185. XCTAssertFalse(keychain.contains("username"), "not stored username")
  186. XCTAssertFalse(keychain.contains("password"), "not stored password")
  187. keychain.set("kishikawakatsumi", key: "username")
  188. XCTAssertTrue(keychain.contains("username"), "stored username")
  189. XCTAssertFalse(keychain.contains("password"), "not stored password")
  190. keychain.set("password1234", key: "password")
  191. XCTAssertTrue(keychain.contains("username"), "stored username")
  192. XCTAssertTrue(keychain.contains("password"), "stored password")
  193. }
  194. // MARK:
  195. func testSetString() {
  196. let keychain = Keychain(service: "Twitter")
  197. XCTAssertNil(keychain.get("username"), "not stored username")
  198. XCTAssertNil(keychain.get("password"), "not stored password")
  199. keychain.set("kishikawakatsumi", key: "username")
  200. XCTAssertEqual(keychain.get("username")!, "kishikawakatsumi", "stored username")
  201. XCTAssertNil(keychain.get("password"), "not stored password")
  202. keychain.set("password1234", key: "password")
  203. XCTAssertEqual(keychain.get("username")!, "kishikawakatsumi", "stored username")
  204. XCTAssertEqual(keychain.get("password")!, "password1234", "stored password")
  205. }
  206. func testSetData() {
  207. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  208. let JSONData = NSJSONSerialization.dataWithJSONObject(JSONObject, options: nil, error: nil)
  209. let keychain = Keychain(service: "Twitter")
  210. XCTAssertNil(keychain.getData("JSONData"), "not stored JSON data")
  211. keychain.set(JSONData!, key: "JSONData")
  212. XCTAssertEqual(keychain.getData("JSONData")!, JSONData!, "stored JSON data")
  213. }
  214. func testRemoveString() {
  215. let keychain = Keychain(service: "Twitter")
  216. XCTAssertNil(keychain.get("username"), "not stored username")
  217. XCTAssertNil(keychain.get("password"), "not stored password")
  218. keychain.set("kishikawakatsumi", key: "username")
  219. XCTAssertEqual(keychain.get("username")!, "kishikawakatsumi", "stored username")
  220. keychain.set("password1234", key: "password")
  221. XCTAssertEqual(keychain.get("password")!, "password1234", "stored password")
  222. keychain.remove("username")
  223. XCTAssertNil(keychain.get("username"), "removed username")
  224. XCTAssertEqual(keychain.get("password")!, "password1234", "left password")
  225. keychain.remove("password")
  226. XCTAssertNil(keychain.get("username"), "removed username")
  227. XCTAssertNil(keychain.get("password"), "removed password")
  228. }
  229. func testRemoveData() {
  230. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  231. let JSONData = NSJSONSerialization.dataWithJSONObject(JSONObject, options: nil, error: nil)
  232. let keychain = Keychain(service: "Twitter")
  233. XCTAssertNil(keychain.getData("JSONData"), "not stored JSON data")
  234. keychain.set(JSONData!, key: "JSONData")
  235. XCTAssertEqual(keychain.getData("JSONData")!, JSONData!, "stored JSON data")
  236. keychain.remove("JSONData")
  237. XCTAssertNil(keychain.getData("JSONData"), "removed JSON data")
  238. }
  239. // MARK:
  240. func testSubscripting() {
  241. let keychain = Keychain(service: "Twitter")
  242. XCTAssertNil(keychain["username"], "not stored username")
  243. XCTAssertNil(keychain["password"], "not stored password")
  244. XCTAssertNil(keychain[string: "username"], "not stored username")
  245. XCTAssertNil(keychain[string: "password"], "not stored password")
  246. keychain["username"] = "kishikawakatsumi"
  247. XCTAssertEqual(keychain["username"]!, "kishikawakatsumi", "stored username")
  248. XCTAssertEqual(keychain[string: "username"]!, "kishikawakatsumi", "stored username")
  249. keychain["password"] = "password1234"
  250. XCTAssertEqual(keychain["password"]!, "password1234", "stored password")
  251. XCTAssertEqual(keychain[string: "password"]!, "password1234", "stored password")
  252. keychain["username"] = nil
  253. XCTAssertNil(keychain["username"], "removed username")
  254. XCTAssertEqual(keychain["password"]!, "password1234", "left password")
  255. XCTAssertNil(keychain[string: "username"], "removed username")
  256. XCTAssertEqual(keychain[string: "password"]!, "password1234", "left password")
  257. keychain["password"] = nil
  258. XCTAssertNil(keychain["username"], "removed username")
  259. XCTAssertNil(keychain["password"], "removed password")
  260. XCTAssertNil(keychain[string: "username"], "removed username")
  261. XCTAssertNil(keychain[string: "password"], "removed password")
  262. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  263. let JSONData = NSJSONSerialization.dataWithJSONObject(JSONObject, options: nil, error: nil)
  264. XCTAssertNil(keychain[data:"JSONData"], "not stored JSON data")
  265. keychain[data: "JSONData"] = JSONData
  266. XCTAssertEqual(keychain[data:"JSONData"]!, JSONData!, "stored JSON data")
  267. }
  268. // MARK:
  269. #if os(iOS)
  270. func testErrorHandling() {
  271. if let error = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared").removeAll() {
  272. XCTAssertNil(error, "no error occurred")
  273. }
  274. if let error = Keychain(service: "Twitter").removeAll() {
  275. XCTAssertNil(error, "no error occurred")
  276. }
  277. if let error = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS).removeAll() {
  278. XCTAssertNil(error, "no error occurred")
  279. }
  280. if let error = Keychain().removeAll() {
  281. XCTAssertNil(error, "no error occurred")
  282. }
  283. locally {
  284. // Add Keychain items
  285. let keychain = Keychain(service: "Twitter")
  286. if let error = keychain.set("kishikawa_katsumi", key: "username") {
  287. XCTAssertNil(error, "no error occurred")
  288. }
  289. if let error = keychain.set("password_1234", key: "password") {
  290. XCTAssertNil(error, "no error occurred")
  291. }
  292. let username = keychain.getStringOrError("username")
  293. switch username { // enum
  294. case .Success:
  295. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  296. case .Failure:
  297. XCTFail("unknown error occurred")
  298. }
  299. if let error = username.error { // error object
  300. XCTFail("unknown error occurred")
  301. } else {
  302. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  303. }
  304. if username.succeeded { // check succeeded property
  305. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  306. } else {
  307. XCTFail("unknown error occurred")
  308. }
  309. if username.failed { // failed property
  310. XCTFail("unknown error occurred")
  311. } else {
  312. XCTAssertEqual(username.value!, "kishikawa_katsumi")
  313. }
  314. let password = keychain.getStringOrError("password")
  315. switch password { // enum
  316. case .Success:
  317. XCTAssertEqual(password.value!, "password_1234")
  318. case .Failure:
  319. XCTFail("unknown error occurred")
  320. }
  321. if let error = password.error { // error object
  322. XCTFail("unknown error occurred")
  323. } else {
  324. XCTAssertEqual(password.value!, "password_1234")
  325. }
  326. if password.succeeded { // check succeeded property
  327. XCTAssertEqual(password.value!, "password_1234")
  328. } else {
  329. XCTFail("unknown error occurred")
  330. }
  331. if password.failed { // failed property
  332. XCTFail("unknown error occurred")
  333. } else {
  334. XCTAssertEqual(password.value!, "password_1234")
  335. }
  336. }
  337. locally {
  338. // Update Keychain items
  339. let keychain = Keychain(service: "Twitter")
  340. if let error = keychain.set("katsumi_kishikawa", key: "username") {
  341. XCTAssertNil(error, "no error occurred")
  342. }
  343. if let error = keychain.set("1234_password", key: "password") {
  344. XCTAssertNil(error, "no error occurred")
  345. }
  346. let username = keychain.getStringOrError("username")
  347. switch username { // enum
  348. case .Success:
  349. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  350. case .Failure:
  351. XCTFail("unknown error occurred")
  352. }
  353. if let error = username.error { // error object
  354. XCTFail("unknown error occurred")
  355. } else {
  356. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  357. }
  358. if username.succeeded { // check succeeded property
  359. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  360. } else {
  361. XCTFail("unknown error occurred")
  362. }
  363. if username.failed { // failed property
  364. XCTFail("unknown error occurred")
  365. } else {
  366. XCTAssertEqual(username.value!, "katsumi_kishikawa")
  367. }
  368. let password = keychain.getStringOrError("password")
  369. switch password { // enum
  370. case .Success:
  371. XCTAssertEqual(password.value!, "1234_password")
  372. case .Failure:
  373. XCTFail("unknown error occurred")
  374. }
  375. if let error = password.error { // check error object
  376. XCTFail("unknown error occurred")
  377. } else {
  378. XCTAssertEqual(password.value!, "1234_password")
  379. }
  380. if password.succeeded { // check succeeded property
  381. XCTAssertEqual(password.value!, "1234_password")
  382. } else {
  383. XCTFail("unknown error occurred")
  384. }
  385. if password.failed { // check failed property
  386. XCTFail("unknown error occurred")
  387. } else {
  388. XCTAssertEqual(password.value!, "1234_password")
  389. }
  390. }
  391. locally {
  392. // Remove Keychain items
  393. let keychain = Keychain(service: "Twitter")
  394. if let error = keychain.remove("username") {
  395. XCTAssertNil(error, "no error occurred")
  396. }
  397. if let error = keychain.remove("password") {
  398. XCTAssertNil(error, "no error occurred")
  399. }
  400. XCTAssertNil(keychain.get("username"))
  401. XCTAssertNil(keychain.get("password"))
  402. }
  403. }
  404. #endif
  405. // MARK:
  406. func testSetStringWithCustomService() {
  407. let username_1 = "kishikawakatsumi"
  408. let password_1 = "password1234"
  409. let username_2 = "kishikawa_katsumi"
  410. let password_2 = "password_1234"
  411. let username_3 = "k_katsumi"
  412. let password_3 = "12341234"
  413. let service_1 = ""
  414. let service_2 = "com.kishikawakatsumi.KeychainAccess"
  415. let service_3 = "example.com"
  416. Keychain().removeAll()
  417. Keychain(service: service_1).removeAll()
  418. Keychain(service: service_2).removeAll()
  419. Keychain(service: service_3).removeAll()
  420. XCTAssertNil(Keychain().get("username"), "not stored username")
  421. XCTAssertNil(Keychain().get("password"), "not stored password")
  422. XCTAssertNil(Keychain(service: service_1).get("username"), "not stored username")
  423. XCTAssertNil(Keychain(service: service_1).get("password"), "not stored password")
  424. XCTAssertNil(Keychain(service: service_2).get("username"), "not stored username")
  425. XCTAssertNil(Keychain(service: service_2).get("password"), "not stored password")
  426. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  427. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  428. Keychain().set(username_1, key: "username")
  429. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  430. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  431. XCTAssertNil(Keychain(service: service_2).get("username"), "not stored username")
  432. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  433. Keychain(service: service_1).set(username_1, key: "username")
  434. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  435. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  436. XCTAssertNil(Keychain(service: service_2).get("username"), "not stored username")
  437. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  438. Keychain(service: service_2).set(username_2, key: "username")
  439. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  440. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  441. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "stored username")
  442. XCTAssertNil(Keychain(service: service_3).get("username"), "not stored username")
  443. Keychain(service: service_3).set(username_3, key: "username")
  444. XCTAssertEqual(Keychain().get("username")!, username_1, "stored username")
  445. XCTAssertEqual(Keychain(service: service_1).get("username")!, username_1, "stored username")
  446. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "stored username")
  447. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "stored username")
  448. Keychain().set(password_1, key: "password")
  449. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  450. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  451. XCTAssertNil(Keychain(service: service_2).get("password"), "not stored password")
  452. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  453. Keychain(service: service_1).set(password_1, key: "password")
  454. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  455. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  456. XCTAssertNil(Keychain(service: service_2).get("password"), "not stored password")
  457. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  458. Keychain(service: service_2).set(password_2, key: "password")
  459. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  460. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  461. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "stored password")
  462. XCTAssertNil(Keychain(service: service_3).get("password"), "not stored password")
  463. Keychain(service: service_3).set(password_3, key: "password")
  464. XCTAssertEqual(Keychain().get("password")!, password_1, "stored password")
  465. XCTAssertEqual(Keychain(service: service_1).get("password")!, password_1, "stored password")
  466. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "stored password")
  467. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "stored password")
  468. Keychain().remove("username")
  469. XCTAssertNil(Keychain().get("username"), "removed username")
  470. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  471. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "left username")
  472. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "left username")
  473. Keychain(service: service_1).remove("username")
  474. XCTAssertNil(Keychain().get("username"), "removed username")
  475. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  476. XCTAssertEqual(Keychain(service: service_2).get("username")!, username_2, "left username")
  477. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "left username")
  478. Keychain(service: service_2).remove("username")
  479. XCTAssertNil(Keychain().get("username"), "removed username")
  480. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  481. XCTAssertNil(Keychain(service: service_2).get("username"), "removed username")
  482. XCTAssertEqual(Keychain(service: service_3).get("username")!, username_3, "left username")
  483. Keychain(service: service_3).remove("username")
  484. XCTAssertNil(Keychain().get("username"), "removed username")
  485. XCTAssertNil(Keychain(service: service_1).get("username"), "removed username")
  486. XCTAssertNil(Keychain(service: service_2).get("username"), "removed username")
  487. XCTAssertNil(Keychain(service: service_3).get("username"), "removed username")
  488. Keychain().remove("password")
  489. XCTAssertNil(Keychain().get("password"), "removed password")
  490. XCTAssertNil(Keychain(service: service_1).get("password"), "removed password")
  491. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "left password")
  492. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "left password")
  493. Keychain(service: service_1).remove("password")
  494. XCTAssertNil(Keychain().get("password"), "removed password")
  495. XCTAssertNil(Keychain(service: service_1).get("password"), "removed password")
  496. XCTAssertEqual(Keychain(service: service_2).get("password")!, password_2, "left password")
  497. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "left password")
  498. Keychain(service: service_2).remove("password")
  499. XCTAssertNil(Keychain().get("password"), "removed password")
  500. XCTAssertNil(Keychain(service: service_1).get("password"), "removed password")
  501. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  502. XCTAssertEqual(Keychain(service: service_3).get("password")!, password_3, "left password")
  503. Keychain(service: service_3).remove("password")
  504. XCTAssertNil(Keychain().get("password"), "removed password")
  505. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  506. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  507. XCTAssertNil(Keychain(service: service_2).get("password"), "removed password")
  508. }
  509. }