KeychainAccessTests.swift 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606
  1. //
  2. // KeychainAccessTests.swift
  3. // KeychainAccessTests
  4. //
  5. // Created by kishikawa katsumi on 2014/12/24.
  6. // Copyright (c) 2014 kishikawa katsumi. All rights reserved.
  7. //
  8. import Foundation
  9. import XCTest
  10. import KeychainAccess
  11. class KeychainAccessTests: XCTestCase {
  12. override func setUp() {
  13. super.setUp()
  14. do { try Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared").removeAll() } catch {}
  15. do { try Keychain(service: "Twitter").removeAll() } catch {}
  16. do { try Keychain(server: NSURL(string: "https://example.com")!, protocolType: .HTTPS).removeAll() } catch {}
  17. do { try Keychain().removeAll() } catch {}
  18. }
  19. override func tearDown() {
  20. super.tearDown()
  21. }
  22. // MARK:
  23. func testGenericPassword() {
  24. do {
  25. // Add Keychain items
  26. let keychain = Keychain(service: "Twitter")
  27. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  28. do { try keychain.set("password_1234", key: "password") } catch {}
  29. let username = try! keychain.get("username")
  30. XCTAssertEqual(username!, "kishikawa_katsumi")
  31. let password = try! keychain.get("password")
  32. XCTAssertEqual(password!, "password_1234")
  33. }
  34. do {
  35. // Update Keychain items
  36. let keychain = Keychain(service: "Twitter")
  37. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  38. do { try keychain.set("1234_password", key: "password") } catch {}
  39. let username = try! keychain.get("username")
  40. XCTAssertEqual(username!, "katsumi_kishikawa")
  41. let password = try! keychain.get("password")
  42. XCTAssertEqual(password!, "1234_password")
  43. }
  44. do {
  45. // Remove Keychain items
  46. let keychain = Keychain(service: "Twitter")
  47. do { try keychain.remove("username") } catch {}
  48. do { try keychain.remove("password") } catch {}
  49. XCTAssertNil(try! keychain.get("username"))
  50. XCTAssertNil(try! keychain.get("password"))
  51. }
  52. }
  53. func testGenericPasswordSubscripting() {
  54. do {
  55. // Add Keychain items
  56. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  57. keychain["username"] = "kishikawa_katsumi"
  58. keychain["password"] = "password_1234"
  59. let username = keychain["username"]
  60. XCTAssertEqual(username!, "kishikawa_katsumi")
  61. let password = keychain["password"]
  62. XCTAssertEqual(password!, "password_1234")
  63. }
  64. do {
  65. // Update Keychain items
  66. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  67. keychain["username"] = "katsumi_kishikawa"
  68. keychain["password"] = "1234_password"
  69. let username = keychain["username"]
  70. XCTAssertEqual(username!, "katsumi_kishikawa")
  71. let password = keychain["password"]
  72. XCTAssertEqual(password!, "1234_password")
  73. }
  74. do {
  75. // Remove Keychain items
  76. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  77. keychain["username"] = nil
  78. keychain["password"] = nil
  79. XCTAssertNil(keychain["username"])
  80. XCTAssertNil(keychain["password"])
  81. }
  82. }
  83. // MARK:
  84. func testInternetPassword() {
  85. do {
  86. // Add Keychain items
  87. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  88. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  89. do { try keychain.set("password_1234", key: "password") } catch {}
  90. let username = try! keychain.get("username")
  91. XCTAssertEqual(username!, "kishikawa_katsumi")
  92. let password = try! keychain.get("password")
  93. XCTAssertEqual(password!, "password_1234")
  94. }
  95. do {
  96. // Update Keychain items
  97. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  98. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  99. do { try keychain.set("1234_password", key: "password") } catch {}
  100. let username = try! keychain.get("username")
  101. XCTAssertEqual(username!, "katsumi_kishikawa")
  102. let password = try! keychain.get("password")
  103. XCTAssertEqual(password!, "1234_password")
  104. }
  105. do {
  106. // Remove Keychain items
  107. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  108. do { try keychain.remove("username") } catch {}
  109. do { try keychain.remove("password") } catch {}
  110. XCTAssertNil(try! keychain.get("username"))
  111. XCTAssertNil(try! keychain.get("password"))
  112. }
  113. }
  114. func testInternetPasswordSubscripting() {
  115. do {
  116. // Add Keychain items
  117. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  118. keychain["username"] = "kishikawa_katsumi"
  119. keychain["password"] = "password_1234"
  120. let username = keychain["username"]
  121. XCTAssertEqual(username!, "kishikawa_katsumi")
  122. let password = keychain["password"]
  123. XCTAssertEqual(password!, "password_1234")
  124. }
  125. do {
  126. // Update Keychain items
  127. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  128. keychain["username"] = "katsumi_kishikawa"
  129. keychain["password"] = "1234_password"
  130. let username = keychain["username"]
  131. XCTAssertEqual(username!, "katsumi_kishikawa")
  132. let password = keychain["password"]
  133. XCTAssertEqual(password!, "1234_password")
  134. }
  135. do {
  136. // Remove Keychain items
  137. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  138. keychain["username"] = nil
  139. keychain["password"] = nil
  140. XCTAssertNil(keychain["username"])
  141. XCTAssertNil(keychain["password"])
  142. }
  143. }
  144. // MARK:
  145. func testDefaultInitializer() {
  146. let keychain = Keychain()
  147. XCTAssertEqual(keychain.service, "")
  148. XCTAssertNil(keychain.accessGroup)
  149. }
  150. func testInitializerWithService() {
  151. let keychain = Keychain(service: "com.example.github-token")
  152. XCTAssertEqual(keychain.service, "com.example.github-token")
  153. XCTAssertNil(keychain.accessGroup)
  154. }
  155. func testInitializerWithAccessGroup() {
  156. let keychain = Keychain(accessGroup: "12ABCD3E4F.shared")
  157. XCTAssertEqual(keychain.service, "")
  158. XCTAssertEqual(keychain.accessGroup!, "12ABCD3E4F.shared")
  159. }
  160. func testInitializerWithServiceAndAccessGroup() {
  161. let keychain = Keychain(service: "com.example.github-token", accessGroup: "12ABCD3E4F.shared")
  162. XCTAssertEqual(keychain.service, "com.example.github-token")
  163. XCTAssertEqual(keychain.accessGroup!, "12ABCD3E4F.shared")
  164. }
  165. func testInitializerWithServer() {
  166. let URL = NSURL(string: "https://kishikawakatsumi.com")!
  167. let keychain = Keychain(server: URL, protocolType: .HTTPS)
  168. XCTAssertEqual(keychain.server, URL)
  169. XCTAssertEqual(keychain.protocolType, ProtocolType.HTTPS)
  170. XCTAssertEqual(keychain.authenticationType, AuthenticationType.Default)
  171. }
  172. func testInitializerWithServerAndAuthenticationType() {
  173. let URL = NSURL(string: "https://kishikawakatsumi.com")!
  174. let keychain = Keychain(server: URL, protocolType: .HTTPS, authenticationType: .HTMLForm)
  175. XCTAssertEqual(keychain.server, URL)
  176. XCTAssertEqual(keychain.protocolType, ProtocolType.HTTPS)
  177. XCTAssertEqual(keychain.authenticationType, AuthenticationType.HTMLForm)
  178. }
  179. // MARK:
  180. func testContains() {
  181. let keychain = Keychain(service: "Twitter")
  182. XCTAssertFalse(try! keychain.contains("username"), "not stored username")
  183. XCTAssertFalse(try! keychain.contains("password"), "not stored password")
  184. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  185. XCTAssertTrue(try! keychain.contains("username"), "stored username")
  186. XCTAssertFalse(try! keychain.contains("password"), "not stored password")
  187. do { try keychain.set("password1234", key: "password") } catch {}
  188. XCTAssertTrue(try! keychain.contains("username"), "stored username")
  189. XCTAssertTrue(try! keychain.contains("password"), "stored password")
  190. }
  191. // MARK:
  192. func testSetString() {
  193. let keychain = Keychain(service: "Twitter")
  194. XCTAssertNil(try! keychain.get("username"), "not stored username")
  195. XCTAssertNil(try! keychain.get("password"), "not stored password")
  196. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  197. XCTAssertEqual(try! keychain.get("username")!, "kishikawakatsumi", "stored username")
  198. XCTAssertNil(try! keychain.get("password"), "not stored password")
  199. do { try keychain.set("password1234", key: "password") } catch {}
  200. XCTAssertEqual(try! keychain.get("username")!, "kishikawakatsumi", "stored username")
  201. XCTAssertEqual(try! keychain.get("password")!, "password1234", "stored password")
  202. }
  203. func testSetData() {
  204. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  205. let JSONData = try! NSJSONSerialization.dataWithJSONObject(JSONObject, options: [])
  206. let keychain = Keychain(service: "Twitter")
  207. XCTAssertNil(try! keychain.getData("JSONData"), "not stored JSON data")
  208. do { try keychain.set(JSONData, key: "JSONData") } catch {}
  209. XCTAssertEqual(try! keychain.getData("JSONData")!, JSONData, "stored JSON data")
  210. }
  211. func testRemoveString() {
  212. let keychain = Keychain(service: "Twitter")
  213. XCTAssertNil(try! keychain.get("username"), "not stored username")
  214. XCTAssertNil(try! keychain.get("password"), "not stored password")
  215. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  216. XCTAssertEqual(try! keychain.get("username")!, "kishikawakatsumi", "stored username")
  217. do { try keychain.set("password1234", key: "password") } catch {}
  218. XCTAssertEqual(try! keychain.get("password")!, "password1234", "stored password")
  219. do { try keychain.remove("username") } catch {}
  220. XCTAssertNil(try! keychain.get("username"), "removed username")
  221. XCTAssertEqual(try! keychain.get("password")!, "password1234", "left password")
  222. do { try keychain.remove("password") } catch {}
  223. XCTAssertNil(try! keychain.get("username"), "removed username")
  224. XCTAssertNil(try! keychain.get("password"), "removed password")
  225. }
  226. func testRemoveData() {
  227. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  228. let JSONData = try! NSJSONSerialization.dataWithJSONObject(JSONObject, options: [])
  229. let keychain = Keychain(service: "Twitter")
  230. XCTAssertNil(try! keychain.getData("JSONData"), "not stored JSON data")
  231. do { try keychain.set(JSONData, key: "JSONData") } catch {}
  232. XCTAssertEqual(try! keychain.getData("JSONData")!, JSONData, "stored JSON data")
  233. do { try keychain.remove("JSONData") } catch {}
  234. XCTAssertNil(try! keychain.getData("JSONData"), "removed JSON data")
  235. }
  236. // MARK:
  237. func testSubscripting() {
  238. let keychain = Keychain(service: "Twitter")
  239. XCTAssertNil(keychain["username"], "not stored username")
  240. XCTAssertNil(keychain["password"], "not stored password")
  241. XCTAssertNil(keychain[string: "username"], "not stored username")
  242. XCTAssertNil(keychain[string: "password"], "not stored password")
  243. keychain["username"] = "kishikawakatsumi"
  244. XCTAssertEqual(keychain["username"]!, "kishikawakatsumi", "stored username")
  245. XCTAssertEqual(keychain[string: "username"]!, "kishikawakatsumi", "stored username")
  246. keychain["password"] = "password1234"
  247. XCTAssertEqual(keychain["password"]!, "password1234", "stored password")
  248. XCTAssertEqual(keychain[string: "password"]!, "password1234", "stored password")
  249. keychain["username"] = nil
  250. XCTAssertNil(keychain["username"], "removed username")
  251. XCTAssertEqual(keychain["password"]!, "password1234", "left password")
  252. XCTAssertNil(keychain[string: "username"], "removed username")
  253. XCTAssertEqual(keychain[string: "password"]!, "password1234", "left password")
  254. keychain["password"] = nil
  255. XCTAssertNil(keychain["username"], "removed username")
  256. XCTAssertNil(keychain["password"], "removed password")
  257. XCTAssertNil(keychain[string: "username"], "removed username")
  258. XCTAssertNil(keychain[string: "password"], "removed password")
  259. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  260. let JSONData = try! NSJSONSerialization.dataWithJSONObject(JSONObject, options: [])
  261. XCTAssertNil(keychain[data:"JSONData"], "not stored JSON data")
  262. keychain[data: "JSONData"] = JSONData
  263. XCTAssertEqual(keychain[data:"JSONData"]!, JSONData, "stored JSON data")
  264. }
  265. // MARK:
  266. #if os(iOS)
  267. func testErrorHandling() {
  268. do {
  269. let keychain = Keychain(service: "Twitter", accessGroup: "12ABCD3E4F.shared")
  270. try keychain.removeAll()
  271. XCTAssertTrue(true, "no error occurred")
  272. } catch {
  273. XCTFail("error occurred")
  274. }
  275. do {
  276. let keychain = Keychain(service: "Twitter")
  277. try keychain.removeAll()
  278. XCTAssertTrue(true, "no error occurred")
  279. } catch {
  280. XCTFail("error occurred")
  281. }
  282. do {
  283. let keychain = Keychain(server: NSURL(string: "https://kishikawakatsumi.com")!, protocolType: .HTTPS)
  284. try keychain.removeAll()
  285. XCTAssertTrue(true, "no error occurred")
  286. } catch {
  287. XCTFail("error occurred")
  288. }
  289. do {
  290. let keychain = Keychain()
  291. try keychain.removeAll()
  292. XCTAssertTrue(true, "no error occurred")
  293. } catch {
  294. XCTFail("error occurred")
  295. }
  296. do {
  297. // Add Keychain items
  298. let keychain = Keychain(service: "Twitter")
  299. do {
  300. try keychain.set("kishikawa_katsumi", key: "username")
  301. XCTAssertTrue(true, "no error occurred")
  302. } catch {
  303. XCTFail("error occurred")
  304. }
  305. do {
  306. try keychain.set("password_1234", key: "password")
  307. XCTAssertTrue(true, "no error occurred")
  308. } catch {
  309. XCTFail("error occurred")
  310. }
  311. do {
  312. let username = try keychain.get("username")
  313. XCTAssertEqual(username, "kishikawa_katsumi")
  314. } catch {
  315. XCTFail("error occurred")
  316. }
  317. do {
  318. let password = try keychain.get("password")
  319. XCTAssertEqual(password, "password_1234")
  320. } catch {
  321. XCTFail("error occurred")
  322. }
  323. }
  324. do {
  325. // Update Keychain items
  326. let keychain = Keychain(service: "Twitter")
  327. do {
  328. try keychain.set("katsumi_kishikawa", key: "username")
  329. XCTAssertTrue(true, "no error occurred")
  330. } catch {
  331. XCTFail("error occurred")
  332. }
  333. do {
  334. try keychain.set("1234_password", key: "password")
  335. XCTAssertTrue(true, "no error occurred")
  336. } catch {
  337. XCTFail("error occurred")
  338. }
  339. do {
  340. let username = try keychain.get("username")
  341. XCTAssertEqual(username, "katsumi_kishikawa")
  342. } catch {
  343. XCTFail("error occurred")
  344. }
  345. do {
  346. let password = try keychain.get("password")
  347. XCTAssertEqual(password, "1234_password")
  348. } catch {
  349. XCTFail("error occurred")
  350. }
  351. }
  352. do {
  353. // Remove Keychain items
  354. let keychain = Keychain(service: "Twitter")
  355. do {
  356. try keychain.remove("username")
  357. XCTAssertNil(try! keychain.get("username"))
  358. } catch {
  359. XCTFail("error occurred")
  360. }
  361. do {
  362. try keychain.remove("password")
  363. XCTAssertNil(try! keychain.get("username"))
  364. } catch {
  365. XCTFail("error occurred")
  366. }
  367. }
  368. }
  369. #endif
  370. // MARK:
  371. func testSetStringWithCustomService() {
  372. let username_1 = "kishikawakatsumi"
  373. let password_1 = "password1234"
  374. let username_2 = "kishikawa_katsumi"
  375. let password_2 = "password_1234"
  376. let username_3 = "k_katsumi"
  377. let password_3 = "12341234"
  378. let service_1 = ""
  379. let service_2 = "com.kishikawakatsumi.KeychainAccess"
  380. let service_3 = "example.com"
  381. do { try Keychain().removeAll() } catch {}
  382. do { try Keychain(service: service_1).removeAll() } catch {}
  383. do { try Keychain(service: service_2).removeAll() } catch {}
  384. do { try Keychain(service: service_3).removeAll() } catch {}
  385. XCTAssertNil(try! Keychain().get("username"), "not stored username")
  386. XCTAssertNil(try! Keychain().get("password"), "not stored password")
  387. XCTAssertNil(try! Keychain(service: service_1).get("username"), "not stored username")
  388. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  389. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  390. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  391. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  392. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  393. do { try Keychain().set(username_1, key: "username") } catch {}
  394. XCTAssertEqual(try! Keychain().get("username")!, username_1, "stored username")
  395. XCTAssertEqual(try! Keychain(service: service_1).get("username")!, username_1, "stored username")
  396. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  397. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  398. do { try Keychain(service: service_1).set(username_1, key: "username") } catch {}
  399. XCTAssertEqual(try! Keychain().get("username")!, username_1, "stored username")
  400. XCTAssertEqual(try! Keychain(service: service_1).get("username")!, username_1, "stored username")
  401. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  402. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  403. do { try Keychain(service: service_2).set(username_2, key: "username") } catch {}
  404. XCTAssertEqual(try! Keychain().get("username")!, username_1, "stored username")
  405. XCTAssertEqual(try! Keychain(service: service_1).get("username")!, username_1, "stored username")
  406. XCTAssertEqual(try! Keychain(service: service_2).get("username")!, username_2, "stored username")
  407. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  408. do { try Keychain(service: service_3).set(username_3, key: "username") } catch {}
  409. XCTAssertEqual(try! Keychain().get("username")!, username_1, "stored username")
  410. XCTAssertEqual(try! Keychain(service: service_1).get("username")!, username_1, "stored username")
  411. XCTAssertEqual(try! Keychain(service: service_2).get("username")!, username_2, "stored username")
  412. XCTAssertEqual(try! Keychain(service: service_3).get("username")!, username_3, "stored username")
  413. do { try Keychain().set(password_1, key: "password") } catch {}
  414. XCTAssertEqual(try! Keychain().get("password")!, password_1, "stored password")
  415. XCTAssertEqual(try! Keychain(service: service_1).get("password")!, password_1, "stored password")
  416. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  417. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  418. do { try Keychain(service: service_1).set(password_1, key: "password") } catch {}
  419. XCTAssertEqual(try! Keychain().get("password")!, password_1, "stored password")
  420. XCTAssertEqual(try! Keychain(service: service_1).get("password")!, password_1, "stored password")
  421. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  422. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  423. do { try Keychain(service: service_2).set(password_2, key: "password") } catch {}
  424. XCTAssertEqual(try! Keychain().get("password")!, password_1, "stored password")
  425. XCTAssertEqual(try! Keychain(service: service_1).get("password")!, password_1, "stored password")
  426. XCTAssertEqual(try! Keychain(service: service_2).get("password")!, password_2, "stored password")
  427. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  428. do { try Keychain(service: service_3).set(password_3, key: "password") } catch {}
  429. XCTAssertEqual(try! Keychain().get("password")!, password_1, "stored password")
  430. XCTAssertEqual(try! Keychain(service: service_1).get("password")!, password_1, "stored password")
  431. XCTAssertEqual(try! Keychain(service: service_2).get("password")!, password_2, "stored password")
  432. XCTAssertEqual(try! Keychain(service: service_3).get("password")!, password_3, "stored password")
  433. do { try Keychain().remove("username") } catch {}
  434. XCTAssertNil(try! Keychain().get("username"), "removed username")
  435. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  436. XCTAssertEqual(try! Keychain(service: service_2).get("username")!, username_2, "left username")
  437. XCTAssertEqual(try! Keychain(service: service_3).get("username")!, username_3, "left username")
  438. do { try Keychain(service: service_1).remove("username") } catch {}
  439. XCTAssertNil(try! Keychain().get("username"), "removed username")
  440. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  441. XCTAssertEqual(try! Keychain(service: service_2).get("username")!, username_2, "left username")
  442. XCTAssertEqual(try! Keychain(service: service_3).get("username")!, username_3, "left username")
  443. do { try Keychain(service: service_2).remove("username") } catch {}
  444. XCTAssertNil(try! Keychain().get("username"), "removed username")
  445. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  446. XCTAssertNil(try! Keychain(service: service_2).get("username"), "removed username")
  447. XCTAssertEqual(try! Keychain(service: service_3).get("username")!, username_3, "left username")
  448. do { try Keychain(service: service_3).remove("username") } catch {}
  449. XCTAssertNil(try! Keychain().get("username"), "removed username")
  450. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  451. XCTAssertNil(try! Keychain(service: service_2).get("username"), "removed username")
  452. XCTAssertNil(try! Keychain(service: service_3).get("username"), "removed username")
  453. do { try Keychain().remove("password") } catch {}
  454. XCTAssertNil(try! Keychain().get("password"), "removed password")
  455. XCTAssertNil(try! Keychain(service: service_1).get("password"), "removed password")
  456. XCTAssertEqual(try! Keychain(service: service_2).get("password")!, password_2, "left password")
  457. XCTAssertEqual(try! Keychain(service: service_3).get("password")!, password_3, "left password")
  458. do { try Keychain(service: service_1).remove("password") } catch {}
  459. XCTAssertNil(try! Keychain().get("password"), "removed password")
  460. XCTAssertNil(try! Keychain(service: service_1).get("password"), "removed password")
  461. XCTAssertEqual(try! Keychain(service: service_2).get("password")!, password_2, "left password")
  462. XCTAssertEqual(try! Keychain(service: service_3).get("password")!, password_3, "left password")
  463. do { try Keychain(service: service_2).remove("password") } catch {}
  464. XCTAssertNil(try! Keychain().get("password"), "removed password")
  465. XCTAssertNil(try! Keychain(service: service_1).get("password"), "removed password")
  466. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  467. XCTAssertEqual(try! Keychain(service: service_3).get("password")!, password_3, "left password")
  468. do { try Keychain(service: service_3).remove("password") } catch {}
  469. XCTAssertNil(try! Keychain().get("password"), "removed password")
  470. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  471. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  472. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  473. }
  474. }