KeychainAccessTests.swift 66 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475
  1. //
  2. // KeychainAccessTests.swift
  3. // KeychainAccessTests
  4. //
  5. // Created by kishikawa katsumi on 2014/12/24.
  6. // Copyright (c) 2014 kishikawa katsumi. All rights reserved.
  7. //
  8. // Permission is hereby granted, free of charge, to any person obtaining a copy
  9. // of this software and associated documentation files (the "Software"), to deal
  10. // in the Software without restriction, including without limitation the rights
  11. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  12. // copies of the Software, and to permit persons to whom the Software is
  13. // furnished to do so, subject to the following conditions:
  14. //
  15. // The above copyright notice and this permission notice shall be included in
  16. // all copies or substantial portions of the Software.
  17. //
  18. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  19. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  20. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  21. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  22. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  23. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  24. // THE SOFTWARE.
  25. import Foundation
  26. import XCTest
  27. import KeychainAccess
  28. class KeychainAccessTests: XCTestCase {
  29. override func setUp() {
  30. super.setUp()
  31. do { try Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").removeAll() } catch {}
  32. do { try Keychain(service: "Twitter").removeAll() } catch {}
  33. do { try Keychain(server: URL(string: "https://example.com")!, protocolType: .https).removeAll() } catch {}
  34. do { try Keychain(server: URL(string: "https://example.com:443")!, protocolType: .https).removeAll() } catch {}
  35. do { try Keychain().removeAll() } catch {}
  36. }
  37. override func tearDown() {
  38. super.tearDown()
  39. }
  40. // MARK:
  41. func testGenericPassword() {
  42. do {
  43. // Add Keychain items
  44. let keychain = Keychain(service: "Twitter")
  45. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  46. do { try keychain.set("password_1234", key: "password") } catch {}
  47. let username = try! keychain.get("username")
  48. XCTAssertEqual(username, "kishikawa_katsumi")
  49. let password = try! keychain.get("password")
  50. XCTAssertEqual(password, "password_1234")
  51. }
  52. do {
  53. // Update Keychain items
  54. let keychain = Keychain(service: "Twitter")
  55. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  56. do { try keychain.set("1234_password", key: "password") } catch {}
  57. let username = try! keychain.get("username")
  58. XCTAssertEqual(username, "katsumi_kishikawa")
  59. let password = try! keychain.get("password")
  60. XCTAssertEqual(password, "1234_password")
  61. }
  62. do {
  63. // Remove Keychain items
  64. let keychain = Keychain(service: "Twitter")
  65. do { try keychain.remove("username") } catch {}
  66. do { try keychain.remove("password") } catch {}
  67. XCTAssertNil(try! keychain.get("username"))
  68. XCTAssertNil(try! keychain.get("password"))
  69. }
  70. }
  71. func testGenericPasswordSubscripting() {
  72. do {
  73. // Add Keychain items
  74. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  75. keychain["username"] = "kishikawa_katsumi"
  76. keychain["password"] = "password_1234"
  77. let username = keychain["username"]
  78. XCTAssertEqual(username, "kishikawa_katsumi")
  79. let password = keychain["password"]
  80. XCTAssertEqual(password, "password_1234")
  81. }
  82. do {
  83. // Update Keychain items
  84. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  85. keychain["username"] = "katsumi_kishikawa"
  86. keychain["password"] = "1234_password"
  87. let username = keychain["username"]
  88. XCTAssertEqual(username, "katsumi_kishikawa")
  89. let password = keychain["password"]
  90. XCTAssertEqual(password, "1234_password")
  91. }
  92. do {
  93. // Remove Keychain items
  94. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  95. keychain["username"] = nil
  96. keychain["password"] = nil
  97. XCTAssertNil(keychain["username"])
  98. XCTAssertNil(keychain["password"])
  99. }
  100. }
  101. // MARK:
  102. func testInternetPassword() {
  103. do {
  104. // Add Keychain items
  105. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  106. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  107. do { try keychain.set("password_1234", key: "password") } catch {}
  108. let username = try! keychain.get("username")
  109. XCTAssertEqual(username, "kishikawa_katsumi")
  110. let password = try! keychain.get("password")
  111. XCTAssertEqual(password, "password_1234")
  112. }
  113. do {
  114. // Update Keychain items
  115. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  116. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  117. do { try keychain.set("1234_password", key: "password") } catch {}
  118. let username = try! keychain.get("username")
  119. XCTAssertEqual(username, "katsumi_kishikawa")
  120. let password = try! keychain.get("password")
  121. XCTAssertEqual(password, "1234_password")
  122. }
  123. do {
  124. // Remove Keychain items
  125. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  126. do { try keychain.remove("username") } catch {}
  127. do { try keychain.remove("password") } catch {}
  128. XCTAssertNil(try! keychain.get("username"))
  129. XCTAssertNil(try! keychain.get("password"))
  130. }
  131. }
  132. func testInternetPasswordSubscripting() {
  133. do {
  134. // Add Keychain items
  135. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  136. keychain["username"] = "kishikawa_katsumi"
  137. keychain["password"] = "password_1234"
  138. let username = keychain["username"]
  139. XCTAssertEqual(username, "kishikawa_katsumi")
  140. let password = keychain["password"]
  141. XCTAssertEqual(password, "password_1234")
  142. }
  143. do {
  144. // Update Keychain items
  145. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  146. keychain["username"] = "katsumi_kishikawa"
  147. keychain["password"] = "1234_password"
  148. let username = keychain["username"]
  149. XCTAssertEqual(username, "katsumi_kishikawa")
  150. let password = keychain["password"]
  151. XCTAssertEqual(password, "1234_password")
  152. }
  153. do {
  154. // Remove Keychain items
  155. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  156. keychain["username"] = nil
  157. keychain["password"] = nil
  158. XCTAssertNil(keychain["username"])
  159. XCTAssertNil(keychain["password"])
  160. }
  161. }
  162. // MARK:
  163. func testDefaultInitializer() {
  164. let keychain = Keychain()
  165. XCTAssertEqual(keychain.service, Bundle.main.bundleIdentifier)
  166. XCTAssertEqual(keychain.service, "com.kishikawakatsumi.KeychainAccess.TestHost")
  167. XCTAssertNil(keychain.accessGroup)
  168. }
  169. func testInitializerWithService() {
  170. let keychain = Keychain(service: "com.example.github-token")
  171. XCTAssertEqual(keychain.service, "com.example.github-token")
  172. XCTAssertNil(keychain.accessGroup)
  173. }
  174. func testInitializerWithAccessGroup() {
  175. let keychain = Keychain(accessGroup: "27AEDK3C9F.shared")
  176. XCTAssertEqual(keychain.service, "com.kishikawakatsumi.KeychainAccess.TestHost")
  177. XCTAssertEqual(keychain.accessGroup, "27AEDK3C9F.shared")
  178. }
  179. func testInitializerWithServiceAndAccessGroup() {
  180. let keychain = Keychain(service: "com.example.github-token", accessGroup: "27AEDK3C9F.shared")
  181. XCTAssertEqual(keychain.service, "com.example.github-token")
  182. XCTAssertEqual(keychain.accessGroup, "27AEDK3C9F.shared")
  183. }
  184. func testInitializerWithServer() {
  185. let server = "https://kishikawakatsumi.com"
  186. let url = URL(string: server)!
  187. do {
  188. let keychain = Keychain(server: server, protocolType: .https)
  189. XCTAssertEqual(keychain.server, url)
  190. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  191. XCTAssertEqual(keychain.authenticationType, AuthenticationType.default)
  192. }
  193. do {
  194. let keychain = Keychain(server: url, protocolType: .https)
  195. XCTAssertEqual(keychain.server, url)
  196. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  197. XCTAssertEqual(keychain.authenticationType, AuthenticationType.default)
  198. }
  199. }
  200. func testInitializerWithServerAndAuthenticationType() {
  201. let server = "https://kishikawakatsumi.com"
  202. let url = URL(string: server)!
  203. do {
  204. let keychain = Keychain(server: server, protocolType: .https, authenticationType: .htmlForm)
  205. XCTAssertEqual(keychain.server, url)
  206. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  207. XCTAssertEqual(keychain.authenticationType, AuthenticationType.htmlForm)
  208. }
  209. do {
  210. let keychain = Keychain(server: url, protocolType: .https, authenticationType: .htmlForm)
  211. XCTAssertEqual(keychain.server, url)
  212. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  213. XCTAssertEqual(keychain.authenticationType, AuthenticationType.htmlForm)
  214. }
  215. }
  216. // MARK:
  217. func testContains() {
  218. let keychain = Keychain(service: "Twitter")
  219. XCTAssertFalse(try! keychain.contains("username"), "not stored username")
  220. XCTAssertFalse(try! keychain.contains("password"), "not stored password")
  221. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  222. XCTAssertTrue(try! keychain.contains("username"), "stored username")
  223. XCTAssertFalse(try! keychain.contains("password"), "not stored password")
  224. do { try keychain.set("password1234", key: "password") } catch {}
  225. XCTAssertTrue(try! keychain.contains("username"), "stored username")
  226. XCTAssertTrue(try! keychain.contains("password"), "stored password")
  227. }
  228. // MARK:
  229. func testSetString() {
  230. let keychain = Keychain(service: "Twitter")
  231. XCTAssertNil(try! keychain.get("username"), "not stored username")
  232. XCTAssertNil(try! keychain.get("password"), "not stored password")
  233. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  234. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  235. XCTAssertNil(try! keychain.get("password"), "not stored password")
  236. do { try keychain.set("password1234", key: "password") } catch {}
  237. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  238. XCTAssertEqual(try! keychain.get("password"), "password1234", "stored password")
  239. }
  240. func testSetStringWithLabel() {
  241. let keychain = Keychain(service: "Twitter")
  242. .label("Twitter Account")
  243. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  244. do {
  245. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  246. return attributes?.label
  247. }
  248. XCTAssertNil(label)
  249. } catch {
  250. XCTFail("error occurred")
  251. }
  252. keychain["kishikawakatsumi"] = "password1234"
  253. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  254. do {
  255. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  256. return attributes?.label
  257. }
  258. XCTAssertEqual(label, "Twitter Account")
  259. } catch {
  260. XCTFail("error occurred")
  261. }
  262. }
  263. func testSetStringWithComment() {
  264. let keychain = Keychain(service: "Twitter")
  265. .comment("Kishikawa Katsumi")
  266. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  267. do {
  268. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  269. return attributes?.comment
  270. }
  271. XCTAssertNil(comment)
  272. } catch {
  273. XCTFail("error occurred")
  274. }
  275. keychain["kishikawakatsumi"] = "password1234"
  276. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  277. do {
  278. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  279. return attributes?.comment
  280. }
  281. XCTAssertEqual(comment, "Kishikawa Katsumi")
  282. } catch {
  283. XCTFail("error occurred")
  284. }
  285. }
  286. func testSetStringWithLabelAndComment() {
  287. let keychain = Keychain(service: "Twitter")
  288. .label("Twitter Account")
  289. .comment("Kishikawa Katsumi")
  290. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  291. do {
  292. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  293. return attributes?.label
  294. }
  295. XCTAssertNil(label)
  296. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  297. return attributes?.comment
  298. }
  299. XCTAssertNil(comment)
  300. } catch {
  301. XCTFail("error occurred")
  302. }
  303. keychain["kishikawakatsumi"] = "password1234"
  304. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  305. do {
  306. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  307. return attributes?.label
  308. }
  309. XCTAssertEqual(label, "Twitter Account")
  310. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  311. return attributes?.comment
  312. }
  313. XCTAssertEqual(comment, "Kishikawa Katsumi")
  314. } catch {
  315. XCTFail("error occurred")
  316. }
  317. }
  318. func testSetData() {
  319. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  320. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  321. let keychain = Keychain(service: "Twitter")
  322. XCTAssertNil(try! keychain.getData("JSONData"), "not stored JSON data")
  323. do { try keychain.set(JSONData, key: "JSONData") } catch {}
  324. XCTAssertEqual(try! keychain.getData("JSONData"), JSONData, "stored JSON data")
  325. }
  326. func testStringConversionError() {
  327. let keychain = Keychain(service: "Twitter")
  328. let length = 256
  329. let data = NSMutableData(length: length)!
  330. let bytes = data.mutableBytes.bindMemory(to: UInt8.self, capacity: length)
  331. _ = SecRandomCopyBytes(kSecRandomDefault, length, bytes)
  332. do {
  333. try keychain.set(data as Data, key: "RandomData")
  334. let _ = try keychain.getString("RandomData")
  335. XCTFail("no error occurred")
  336. } catch let error as NSError {
  337. XCTAssertEqual(error.domain, KeychainAccessErrorDomain)
  338. XCTAssertEqual(error.code, Int(Status.conversionError.rawValue))
  339. XCTAssertEqual(error.userInfo[NSLocalizedDescriptionKey] as! String, Status.conversionError.localizedDescription)
  340. } catch {
  341. XCTFail("unexpected error occurred")
  342. }
  343. do {
  344. try keychain.set(data as Data, key: "RandomData")
  345. let _ = try keychain.getString("RandomData")
  346. XCTFail("no error occurred")
  347. } catch Status.conversionError {
  348. XCTAssertTrue(true)
  349. } catch {
  350. XCTFail("unexpected error occurred")
  351. }
  352. }
  353. func testGetPersistentRef() {
  354. let keychain = Keychain(service: "Twitter")
  355. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  356. do {
  357. let persistentRef = try keychain.get("kishikawakatsumi") { $0?.persistentRef }
  358. XCTAssertNil(persistentRef)
  359. } catch {
  360. XCTFail("error occurred")
  361. }
  362. keychain["kishikawakatsumi"] = "password1234"
  363. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  364. do {
  365. let persistentRef = try keychain.get("kishikawakatsumi") { $0?.persistentRef }
  366. XCTAssertNotNil(persistentRef)
  367. } catch {
  368. XCTFail("error occurred")
  369. }
  370. }
  371. #if os(iOS) || os(tvOS)
  372. func testSetAttributes() {
  373. let expectation = self.expectation(description: "Touch ID authentication")
  374. DispatchQueue.global(qos: .default).async {
  375. do {
  376. var attributes = [String: Any]()
  377. attributes[String(kSecAttrDescription)] = "Description Test"
  378. attributes[String(kSecAttrComment)] = "Comment Test"
  379. attributes[String(kSecAttrCreator)] = "Creator Test"
  380. attributes[String(kSecAttrType)] = "Type Test"
  381. attributes[String(kSecAttrLabel)] = "Label Test"
  382. attributes[String(kSecAttrIsInvisible)] = true
  383. attributes[String(kSecAttrIsNegative)] = true
  384. let keychain = Keychain(service: "Twitter")
  385. .attributes(attributes)
  386. .accessibility(.whenPasscodeSetThisDeviceOnly, authenticationPolicy: .userPresence)
  387. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  388. do {
  389. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  390. XCTAssertNil(attributes)
  391. } catch {
  392. XCTFail("error occurred")
  393. }
  394. keychain["kishikawakatsumi"] = "password1234"
  395. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  396. do {
  397. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  398. XCTAssertEqual(attributes?.`class`, ItemClass.genericPassword.rawValue)
  399. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  400. XCTAssertNil(attributes?.ref)
  401. XCTAssertNotNil(attributes?.persistentRef)
  402. XCTAssertEqual(attributes?.accessible, Accessibility.whenPasscodeSetThisDeviceOnly.rawValue)
  403. XCTAssertNotNil(attributes?.accessControl)
  404. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  405. XCTAssertNotNil(attributes?.synchronizable)
  406. XCTAssertNotNil(attributes?.creationDate)
  407. XCTAssertNotNil(attributes?.modificationDate)
  408. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  409. XCTAssertEqual(attributes?.comment, "Comment Test")
  410. XCTAssertEqual(attributes?.creator, "Creator Test")
  411. XCTAssertEqual(attributes?.type, "Type Test")
  412. XCTAssertEqual(attributes?.label, "Label Test")
  413. XCTAssertEqual(attributes?.isInvisible, true)
  414. XCTAssertEqual(attributes?.isNegative, true)
  415. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  416. XCTAssertEqual(attributes?.service, "Twitter")
  417. XCTAssertNil(attributes?.generic)
  418. XCTAssertNil(attributes?.securityDomain)
  419. XCTAssertNil(attributes?.server)
  420. XCTAssertNil(attributes?.`protocol`)
  421. XCTAssertNil(attributes?.authenticationType)
  422. XCTAssertNil(attributes?.port)
  423. XCTAssertNil(attributes?.path)
  424. XCTAssertEqual(attributes![String(kSecClass)] as? String, ItemClass.genericPassword.rawValue)
  425. XCTAssertEqual(attributes![String(kSecValueData)] as? Data, "password1234".data(using: .utf8))
  426. expectation.fulfill()
  427. } catch {
  428. XCTFail("error occurred")
  429. }
  430. }
  431. }
  432. waitForExpectations(timeout: 10.0, handler: nil)
  433. do {
  434. var attributes = [String: Any]()
  435. attributes[String(kSecAttrDescription)] = "Description Test"
  436. attributes[String(kSecAttrComment)] = "Comment Test"
  437. attributes[String(kSecAttrCreator)] = "Creator Test"
  438. attributes[String(kSecAttrType)] = "Type Test"
  439. attributes[String(kSecAttrLabel)] = "Label Test"
  440. attributes[String(kSecAttrIsInvisible)] = true
  441. attributes[String(kSecAttrIsNegative)] = true
  442. attributes[String(kSecAttrSecurityDomain)] = "securitydomain"
  443. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  444. .attributes(attributes)
  445. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  446. do {
  447. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  448. XCTAssertNil(attributes)
  449. } catch {
  450. XCTFail("error occurred")
  451. }
  452. do {
  453. keychain["kishikawakatsumi"] = "password1234"
  454. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  455. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  456. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  457. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  458. XCTAssertNil(attributes?.ref)
  459. XCTAssertNotNil(attributes?.persistentRef)
  460. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  461. if #available(iOS 9.0, *) {
  462. XCTAssertNil(attributes?.accessControl)
  463. } else {
  464. XCTAssertNotNil(attributes?.accessControl)
  465. }
  466. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  467. XCTAssertNotNil(attributes?.synchronizable)
  468. XCTAssertNotNil(attributes?.creationDate)
  469. XCTAssertNotNil(attributes?.modificationDate)
  470. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  471. XCTAssertEqual(attributes?.comment, "Comment Test")
  472. XCTAssertEqual(attributes?.creator, "Creator Test")
  473. XCTAssertEqual(attributes?.type, "Type Test")
  474. XCTAssertEqual(attributes?.label, "Label Test")
  475. XCTAssertEqual(attributes?.isInvisible, true)
  476. XCTAssertEqual(attributes?.isNegative, true)
  477. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  478. XCTAssertNil(attributes?.service)
  479. XCTAssertNil(attributes?.generic)
  480. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  481. XCTAssertEqual(attributes?.server, "example.com")
  482. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  483. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  484. XCTAssertEqual(attributes?.port, 443)
  485. XCTAssertEqual(attributes?.path, "")
  486. } catch {
  487. XCTFail("error occurred")
  488. }
  489. do {
  490. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  491. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  492. keychain["kishikawakatsumi"] = "1234password"
  493. XCTAssertEqual(keychain["kishikawakatsumi"], "1234password", "updated password")
  494. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  495. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  496. XCTAssertEqual(attributes?.data, "1234password".data(using: .utf8))
  497. XCTAssertNil(attributes?.ref)
  498. XCTAssertNotNil(attributes?.persistentRef)
  499. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  500. if #available(iOS 9.0, *) {
  501. XCTAssertNil(attributes?.accessControl)
  502. } else {
  503. XCTAssertNotNil(attributes?.accessControl)
  504. }
  505. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  506. XCTAssertNotNil(attributes?.synchronizable)
  507. XCTAssertNotNil(attributes?.creationDate)
  508. XCTAssertNotNil(attributes?.modificationDate)
  509. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  510. XCTAssertEqual(attributes?.comment, "Comment Test")
  511. XCTAssertEqual(attributes?.creator, "Creator Test")
  512. XCTAssertEqual(attributes?.type, "Type Test")
  513. XCTAssertEqual(attributes?.label, "Label Test")
  514. XCTAssertEqual(attributes?.isInvisible, true)
  515. XCTAssertEqual(attributes?.isNegative, true)
  516. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  517. XCTAssertNil(attributes?.service)
  518. XCTAssertNil(attributes?.generic)
  519. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  520. XCTAssertEqual(attributes?.server, "example.com")
  521. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  522. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  523. XCTAssertEqual(attributes?.port, 443)
  524. XCTAssertEqual(attributes?.path, "")
  525. } catch {
  526. XCTFail("error occurred")
  527. }
  528. do {
  529. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  530. .attributes([String(kSecAttrDescription): "Updated Description"])
  531. XCTAssertEqual(keychain["kishikawakatsumi"], "1234password", "stored password")
  532. keychain["kishikawakatsumi"] = "password1234"
  533. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "updated password")
  534. let attributes = keychain[attributes: "kishikawakatsumi"]
  535. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  536. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  537. XCTAssertNil(attributes?.ref)
  538. XCTAssertNotNil(attributes?.persistentRef)
  539. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  540. if #available(iOS 9.0, *) {
  541. XCTAssertNil(attributes?.accessControl)
  542. } else {
  543. XCTAssertNotNil(attributes?.accessControl)
  544. }
  545. XCTAssertEqual(attributes?.accessGroup, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  546. XCTAssertNotNil(attributes?.synchronizable)
  547. XCTAssertNotNil(attributes?.creationDate)
  548. XCTAssertNotNil(attributes?.modificationDate)
  549. XCTAssertEqual(attributes?.attributeDescription, "Updated Description")
  550. XCTAssertEqual(attributes?.comment, "Comment Test")
  551. XCTAssertEqual(attributes?.creator, "Creator Test")
  552. XCTAssertEqual(attributes?.type, "Type Test")
  553. XCTAssertEqual(attributes?.label, "Label Test")
  554. XCTAssertEqual(attributes?.isInvisible, true)
  555. XCTAssertEqual(attributes?.isNegative, true)
  556. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  557. XCTAssertNil(attributes?.service)
  558. XCTAssertNil(attributes?.generic)
  559. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  560. XCTAssertEqual(attributes?.server, "example.com")
  561. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  562. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  563. XCTAssertEqual(attributes?.port, 443)
  564. XCTAssertEqual(attributes?.path, "")
  565. }
  566. }
  567. }
  568. #endif
  569. func testRemoveString() {
  570. let keychain = Keychain(service: "Twitter")
  571. XCTAssertNil(try! keychain.get("username"), "not stored username")
  572. XCTAssertNil(try! keychain.get("password"), "not stored password")
  573. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  574. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  575. do { try keychain.set("password1234", key: "password") } catch {}
  576. XCTAssertEqual(try! keychain.get("password"), "password1234", "stored password")
  577. do { try keychain.remove("username") } catch {}
  578. XCTAssertNil(try! keychain.get("username"), "removed username")
  579. XCTAssertEqual(try! keychain.get("password"), "password1234", "left password")
  580. do { try keychain.remove("password") } catch {}
  581. XCTAssertNil(try! keychain.get("username"), "removed username")
  582. XCTAssertNil(try! keychain.get("password"), "removed password")
  583. }
  584. func testRemoveData() {
  585. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  586. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  587. let keychain = Keychain(service: "Twitter")
  588. XCTAssertNil(try! keychain.getData("JSONData"), "not stored JSON data")
  589. do { try keychain.set(JSONData, key: "JSONData") } catch {}
  590. XCTAssertEqual(try! keychain.getData("JSONData"), JSONData, "stored JSON data")
  591. do { try keychain.remove("JSONData") } catch {}
  592. XCTAssertNil(try! keychain.getData("JSONData"), "removed JSON data")
  593. }
  594. // MARK:
  595. func testSubscripting() {
  596. let keychain = Keychain(service: "Twitter")
  597. XCTAssertNil(keychain["username"], "not stored username")
  598. XCTAssertNil(keychain["password"], "not stored password")
  599. XCTAssertNil(keychain[string: "username"], "not stored username")
  600. XCTAssertNil(keychain[string: "password"], "not stored password")
  601. keychain["username"] = "kishikawakatsumi"
  602. XCTAssertEqual(keychain["username"], "kishikawakatsumi", "stored username")
  603. XCTAssertEqual(keychain[string: "username"], "kishikawakatsumi", "stored username")
  604. keychain["password"] = "password1234"
  605. XCTAssertEqual(keychain["password"], "password1234", "stored password")
  606. XCTAssertEqual(keychain[string: "password"], "password1234", "stored password")
  607. keychain[string: "username"] = nil
  608. XCTAssertNil(keychain["username"], "removed username")
  609. XCTAssertEqual(keychain["password"], "password1234", "left password")
  610. XCTAssertNil(keychain[string: "username"], "removed username")
  611. XCTAssertEqual(keychain[string: "password"], "password1234", "left password")
  612. keychain[string: "password"] = nil
  613. XCTAssertNil(keychain["username"], "removed username")
  614. XCTAssertNil(keychain["password"], "removed password")
  615. XCTAssertNil(keychain[string: "username"], "removed username")
  616. XCTAssertNil(keychain[string: "password"], "removed password")
  617. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  618. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  619. XCTAssertNil(keychain[data:"JSONData"], "not stored JSON data")
  620. keychain[data: "JSONData"] = JSONData
  621. XCTAssertEqual(keychain[data: "JSONData"], JSONData, "stored JSON data")
  622. keychain[data: "JSONData"] = nil
  623. XCTAssertNil(keychain[data:"JSONData"], "removed JSON data")
  624. }
  625. // MARK:
  626. func testErrorHandling() {
  627. do {
  628. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  629. try keychain.removeAll()
  630. XCTAssertTrue(true, "no error occurred")
  631. } catch {
  632. XCTFail("error occurred")
  633. }
  634. do {
  635. let keychain = Keychain(service: "Twitter")
  636. try keychain.removeAll()
  637. XCTAssertTrue(true, "no error occurred")
  638. } catch {
  639. XCTFail("error occurred")
  640. }
  641. do {
  642. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  643. try keychain.removeAll()
  644. XCTAssertTrue(true, "no error occurred")
  645. } catch {
  646. XCTFail("error occurred")
  647. }
  648. do {
  649. let keychain = Keychain()
  650. try keychain.removeAll()
  651. XCTAssertTrue(true, "no error occurred")
  652. } catch {
  653. XCTFail("error occurred")
  654. }
  655. do {
  656. // Add Keychain items
  657. let keychain = Keychain(service: "Twitter")
  658. do {
  659. try keychain.set("kishikawa_katsumi", key: "username")
  660. XCTAssertTrue(true, "no error occurred")
  661. } catch {
  662. XCTFail("error occurred")
  663. }
  664. do {
  665. try keychain.set("password_1234", key: "password")
  666. XCTAssertTrue(true, "no error occurred")
  667. } catch {
  668. XCTFail("error occurred")
  669. }
  670. do {
  671. let username = try keychain.get("username")
  672. XCTAssertEqual(username, "kishikawa_katsumi")
  673. } catch {
  674. XCTFail("error occurred")
  675. }
  676. do {
  677. let password = try keychain.get("password")
  678. XCTAssertEqual(password, "password_1234")
  679. } catch {
  680. XCTFail("error occurred")
  681. }
  682. }
  683. do {
  684. // Update Keychain items
  685. let keychain = Keychain(service: "Twitter")
  686. do {
  687. try keychain.set("katsumi_kishikawa", key: "username")
  688. XCTAssertTrue(true, "no error occurred")
  689. } catch {
  690. XCTFail("error occurred")
  691. }
  692. do {
  693. try keychain.set("1234_password", key: "password")
  694. XCTAssertTrue(true, "no error occurred")
  695. } catch {
  696. XCTFail("error occurred")
  697. }
  698. do {
  699. let username = try keychain.get("username")
  700. XCTAssertEqual(username, "katsumi_kishikawa")
  701. } catch {
  702. XCTFail("error occurred")
  703. }
  704. do {
  705. let password = try keychain.get("password")
  706. XCTAssertEqual(password, "1234_password")
  707. } catch {
  708. XCTFail("error occurred")
  709. }
  710. }
  711. do {
  712. // Remove Keychain items
  713. let keychain = Keychain(service: "Twitter")
  714. do {
  715. try keychain.remove("username")
  716. XCTAssertNil(try! keychain.get("username"))
  717. } catch {
  718. XCTFail("error occurred")
  719. }
  720. do {
  721. try keychain.remove("password")
  722. XCTAssertNil(try! keychain.get("username"))
  723. } catch {
  724. XCTFail("error occurred")
  725. }
  726. }
  727. }
  728. // MARK:
  729. func testSetStringWithCustomService() {
  730. let username_1 = "kishikawakatsumi"
  731. let password_1 = "password1234"
  732. let username_2 = "kishikawa_katsumi"
  733. let password_2 = "password_1234"
  734. let username_3 = "k_katsumi"
  735. let password_3 = "12341234"
  736. let service_1 = ""
  737. let service_2 = "com.kishikawakatsumi.KeychainAccess"
  738. let service_3 = "example.com"
  739. do { try Keychain().removeAll() } catch {}
  740. do { try Keychain(service: service_1).removeAll() } catch {}
  741. do { try Keychain(service: service_2).removeAll() } catch {}
  742. do { try Keychain(service: service_3).removeAll() } catch {}
  743. XCTAssertNil(try! Keychain().get("username"), "not stored username")
  744. XCTAssertNil(try! Keychain().get("password"), "not stored password")
  745. XCTAssertNil(try! Keychain(service: service_1).get("username"), "not stored username")
  746. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  747. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  748. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  749. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  750. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  751. do { try Keychain().set(username_1, key: "username") } catch {}
  752. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  753. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  754. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  755. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  756. do { try Keychain(service: service_1).set(username_1, key: "username") } catch {}
  757. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  758. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  759. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  760. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  761. do { try Keychain(service: service_2).set(username_2, key: "username") } catch {}
  762. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  763. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  764. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "stored username")
  765. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  766. do { try Keychain(service: service_3).set(username_3, key: "username") } catch {}
  767. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  768. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  769. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "stored username")
  770. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "stored username")
  771. do { try Keychain().set(password_1, key: "password") } catch {}
  772. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  773. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  774. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  775. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  776. do { try Keychain(service: service_1).set(password_1, key: "password") } catch {}
  777. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  778. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  779. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  780. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  781. do { try Keychain(service: service_2).set(password_2, key: "password") } catch {}
  782. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  783. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  784. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "stored password")
  785. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  786. do { try Keychain(service: service_3).set(password_3, key: "password") } catch {}
  787. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  788. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  789. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "stored password")
  790. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "stored password")
  791. do { try Keychain().remove("username") } catch {}
  792. XCTAssertNil(try! Keychain().get("username"), "removed username")
  793. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "left username")
  794. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "left username")
  795. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  796. do { try Keychain(service: service_1).remove("username") } catch {}
  797. XCTAssertNil(try! Keychain().get("username"), "removed username")
  798. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  799. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "left username")
  800. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  801. do { try Keychain(service: service_2).remove("username") } catch {}
  802. XCTAssertNil(try! Keychain().get("username"), "removed username")
  803. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  804. XCTAssertNil(try! Keychain(service: service_2).get("username"), "removed username")
  805. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  806. do { try Keychain(service: service_3).remove("username") } catch {}
  807. XCTAssertNil(try! Keychain().get("username"), "removed username")
  808. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  809. XCTAssertNil(try! Keychain(service: service_2).get("username"), "removed username")
  810. XCTAssertNil(try! Keychain(service: service_3).get("username"), "removed username")
  811. do { try Keychain().remove("password") } catch {}
  812. XCTAssertNil(try! Keychain().get("password"), "removed password")
  813. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "left password")
  814. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "left password")
  815. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  816. do { try Keychain(service: service_1).remove("password") } catch {}
  817. XCTAssertNil(try! Keychain().get("password"), "removed password")
  818. XCTAssertNil(try! Keychain(service: service_1).get("password"), "removed password")
  819. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "left password")
  820. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  821. do { try Keychain(service: service_2).remove("password") } catch {}
  822. XCTAssertNil(try! Keychain().get("password"), "removed password")
  823. XCTAssertNil(try! Keychain(service: service_1).get("password"), "removed password")
  824. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  825. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  826. do { try Keychain(service: service_3).remove("password") } catch {}
  827. XCTAssertNil(try! Keychain().get("password"), "removed password")
  828. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  829. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  830. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  831. }
  832. // MARK:
  833. func testProperties() {
  834. guard #available(OSX 10.10, *) else {
  835. return
  836. }
  837. let keychain = Keychain()
  838. XCTAssertEqual(keychain.synchronizable, false)
  839. XCTAssertEqual(keychain.synchronizable(true).synchronizable, true)
  840. XCTAssertEqual(keychain.synchronizable(false).synchronizable, false)
  841. XCTAssertEqual(keychain.accessibility(.afterFirstUnlock).accessibility, Accessibility.afterFirstUnlock)
  842. XCTAssertEqual(keychain.accessibility(.whenPasscodeSetThisDeviceOnly, authenticationPolicy: .userPresence).accessibility, Accessibility.whenPasscodeSetThisDeviceOnly)
  843. XCTAssertEqual(keychain.accessibility(.whenPasscodeSetThisDeviceOnly, authenticationPolicy: .userPresence).authenticationPolicy, AuthenticationPolicy.userPresence)
  844. XCTAssertNil(keychain.label)
  845. XCTAssertEqual(keychain.label("Label").label, "Label")
  846. XCTAssertNil(keychain.comment)
  847. XCTAssertEqual(keychain.comment("Comment").comment, "Comment")
  848. XCTAssertEqual(keychain.authenticationPrompt("Prompt").authenticationPrompt, "Prompt")
  849. }
  850. // MARK:
  851. func testAllKeys() {
  852. do {
  853. let keychain = Keychain()
  854. keychain["key1"] = "value1"
  855. keychain["key2"] = "value2"
  856. keychain["key3"] = "value3"
  857. let allKeys = keychain.allKeys()
  858. XCTAssertEqual(allKeys.count, 3)
  859. XCTAssertEqual(allKeys.sorted(), ["key1", "key2", "key3"])
  860. let allItems = keychain.allItems()
  861. XCTAssertEqual(allItems.count, 3)
  862. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  863. let key1 = item1["key"] as! String
  864. let key2 = item2["key"] as! String
  865. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  866. }
  867. #if !os(OSX)
  868. XCTAssertEqual(sortedItems[0]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  869. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "false")
  870. XCTAssertEqual(sortedItems[0]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  871. XCTAssertEqual(sortedItems[0]["value"] as? String, "value1")
  872. XCTAssertEqual(sortedItems[0]["key"] as? String, "key1")
  873. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  874. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "AfterFirstUnlock")
  875. XCTAssertEqual(sortedItems[1]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  876. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "false")
  877. XCTAssertEqual(sortedItems[1]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  878. XCTAssertEqual(sortedItems[1]["value"] as? String, "value2")
  879. XCTAssertEqual(sortedItems[1]["key"] as? String, "key2")
  880. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  881. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "AfterFirstUnlock")
  882. XCTAssertEqual(sortedItems[2]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  883. XCTAssertEqual(sortedItems[2]["synchronizable"] as? String, "false")
  884. XCTAssertEqual(sortedItems[2]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  885. XCTAssertEqual(sortedItems[2]["value"] as? String, "value3")
  886. XCTAssertEqual(sortedItems[2]["key"] as? String, "key3")
  887. XCTAssertEqual(sortedItems[2]["class"] as? String, "GenericPassword")
  888. XCTAssertEqual(sortedItems[2]["accessibility"] as? String, "AfterFirstUnlock")
  889. #else
  890. XCTAssertEqual(sortedItems[0]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  891. XCTAssertEqual(sortedItems[0]["key"] as? String, "key1")
  892. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  893. XCTAssertEqual(sortedItems[1]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  894. XCTAssertEqual(sortedItems[1]["key"] as? String, "key2")
  895. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  896. XCTAssertEqual(sortedItems[2]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  897. XCTAssertEqual(sortedItems[2]["key"] as? String, "key3")
  898. XCTAssertEqual(sortedItems[2]["class"] as? String, "GenericPassword")
  899. #endif
  900. }
  901. do {
  902. let keychain = Keychain(service: "service1")
  903. try! keychain
  904. .synchronizable(true)
  905. .accessibility(.whenUnlockedThisDeviceOnly)
  906. .set("service1_value1", key: "service1_key1")
  907. try! keychain
  908. .synchronizable(false)
  909. .accessibility(.afterFirstUnlockThisDeviceOnly)
  910. .set("service1_value2", key: "service1_key2")
  911. let allKeys = keychain.allKeys()
  912. XCTAssertEqual(allKeys.count, 2)
  913. XCTAssertEqual(allKeys.sorted(), ["service1_key1", "service1_key2"])
  914. let allItems = keychain.allItems()
  915. XCTAssertEqual(allItems.count, 2)
  916. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  917. let key1 = item1["key"] as! String
  918. let key2 = item2["key"] as! String
  919. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  920. }
  921. #if !os(OSX)
  922. XCTAssertEqual(sortedItems[0]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  923. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "true")
  924. XCTAssertEqual(sortedItems[0]["service"] as? String, "service1")
  925. XCTAssertEqual(sortedItems[0]["value"] as? String, "service1_value1")
  926. XCTAssertEqual(sortedItems[0]["key"] as? String, "service1_key1")
  927. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  928. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "WhenUnlockedThisDeviceOnly")
  929. XCTAssertEqual(sortedItems[1]["accessGroup"] as? String, "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost")
  930. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "false")
  931. XCTAssertEqual(sortedItems[1]["service"] as? String, "service1")
  932. XCTAssertEqual(sortedItems[1]["value"] as? String, "service1_value2")
  933. XCTAssertEqual(sortedItems[1]["key"] as? String, "service1_key2")
  934. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  935. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "AfterFirstUnlockThisDeviceOnly")
  936. #else
  937. XCTAssertEqual(sortedItems[0]["service"] as? String, "service1")
  938. XCTAssertEqual(sortedItems[0]["key"] as? String, "service1_key1")
  939. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  940. XCTAssertEqual(sortedItems[1]["service"] as? String, "service1")
  941. XCTAssertEqual(sortedItems[1]["key"] as? String, "service1_key2")
  942. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  943. #endif
  944. }
  945. do {
  946. let keychain = Keychain(server: "https://google.com", protocolType: .https)
  947. try! keychain
  948. .synchronizable(false)
  949. .accessibility(.alwaysThisDeviceOnly)
  950. .set("google.com_value1", key: "google.com_key1")
  951. try! keychain
  952. .synchronizable(true)
  953. .accessibility(.always)
  954. .set("google.com_value2", key: "google.com_key2")
  955. let allKeys = keychain.allKeys()
  956. XCTAssertEqual(allKeys.count, 2)
  957. XCTAssertEqual(allKeys.sorted(), ["google.com_key1", "google.com_key2"])
  958. let allItems = keychain.allItems()
  959. XCTAssertEqual(allItems.count, 2)
  960. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  961. let key1 = item1["key"] as! String
  962. let key2 = item2["key"] as! String
  963. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  964. }
  965. #if !os(OSX)
  966. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "false")
  967. XCTAssertEqual(sortedItems[0]["value"] as? String, "google.com_value1")
  968. XCTAssertEqual(sortedItems[0]["key"] as? String, "google.com_key1")
  969. XCTAssertEqual(sortedItems[0]["server"] as? String, "google.com")
  970. XCTAssertEqual(sortedItems[0]["class"] as? String, "InternetPassword")
  971. XCTAssertEqual(sortedItems[0]["authenticationType"] as? String, "Default")
  972. XCTAssertEqual(sortedItems[0]["protocol"] as? String, "HTTPS")
  973. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "AlwaysThisDeviceOnly")
  974. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "true")
  975. XCTAssertEqual(sortedItems[1]["value"] as? String, "google.com_value2")
  976. XCTAssertEqual(sortedItems[1]["key"] as? String, "google.com_key2")
  977. XCTAssertEqual(sortedItems[1]["server"] as? String, "google.com")
  978. XCTAssertEqual(sortedItems[1]["class"] as? String, "InternetPassword")
  979. XCTAssertEqual(sortedItems[1]["authenticationType"] as? String, "Default")
  980. XCTAssertEqual(sortedItems[1]["protocol"] as? String, "HTTPS")
  981. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "Always")
  982. #else
  983. XCTAssertEqual(sortedItems[0]["key"] as? String, "google.com_key1")
  984. XCTAssertEqual(sortedItems[0]["server"] as? String, "google.com")
  985. XCTAssertEqual(sortedItems[0]["class"] as? String, "InternetPassword")
  986. XCTAssertEqual(sortedItems[0]["authenticationType"] as? String, "Default")
  987. XCTAssertEqual(sortedItems[0]["protocol"] as? String, "HTTPS")
  988. XCTAssertEqual(sortedItems[1]["key"] as? String, "google.com_key2")
  989. XCTAssertEqual(sortedItems[1]["server"] as? String, "google.com")
  990. XCTAssertEqual(sortedItems[1]["class"] as? String, "InternetPassword")
  991. XCTAssertEqual(sortedItems[1]["authenticationType"] as? String, "Default")
  992. XCTAssertEqual(sortedItems[1]["protocol"] as? String, "HTTPS")
  993. #endif
  994. }
  995. #if !os(OSX)
  996. do {
  997. let allKeys = Keychain.allKeys(.genericPassword)
  998. XCTAssertEqual(allKeys.count, 5)
  999. let sortedKeys = allKeys.sorted { (key1, key2) -> Bool in
  1000. return key1.1.compare(key2.1) == .orderedAscending || key1.1.compare(key2.1) == .orderedSame
  1001. }
  1002. XCTAssertEqual(sortedKeys[0].0, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1003. XCTAssertEqual(sortedKeys[0].1, "key1")
  1004. XCTAssertEqual(sortedKeys[1].0, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1005. XCTAssertEqual(sortedKeys[1].1, "key2")
  1006. XCTAssertEqual(sortedKeys[2].0, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1007. XCTAssertEqual(sortedKeys[2].1, "key3")
  1008. XCTAssertEqual(sortedKeys[3].0, "service1")
  1009. XCTAssertEqual(sortedKeys[3].1, "service1_key1")
  1010. XCTAssertEqual(sortedKeys[4].0, "service1")
  1011. XCTAssertEqual(sortedKeys[4].1, "service1_key2")
  1012. }
  1013. do {
  1014. let allKeys = Keychain.allKeys(.internetPassword)
  1015. XCTAssertEqual(allKeys.count, 2)
  1016. let sortedKeys = allKeys.sorted { (key1, key2) -> Bool in
  1017. return key1.1.compare(key2.1) == .orderedAscending || key1.1.compare(key2.1) == .orderedSame
  1018. }
  1019. XCTAssertEqual(sortedKeys[0].0, "google.com")
  1020. XCTAssertEqual(sortedKeys[0].1, "google.com_key1")
  1021. XCTAssertEqual(sortedKeys[1].0, "google.com")
  1022. XCTAssertEqual(sortedKeys[1].1, "google.com_key2")
  1023. }
  1024. #endif
  1025. }
  1026. func testDescription() {
  1027. do {
  1028. let keychain = Keychain()
  1029. XCTAssertEqual(keychain.description, "[]")
  1030. XCTAssertEqual(keychain.debugDescription, "[]")
  1031. }
  1032. }
  1033. // MARK:
  1034. func testAuthenticationPolicy() {
  1035. guard #available(iOS 9.0, OSX 10.11, *) else {
  1036. return
  1037. }
  1038. do {
  1039. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1040. let policy: AuthenticationPolicy = [.userPresence]
  1041. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1042. var error: Unmanaged<CFError>?
  1043. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1044. XCTAssertNil(error)
  1045. XCTAssertNotNil(accessControl)
  1046. }
  1047. #if os(iOS)
  1048. do {
  1049. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1050. let policy: AuthenticationPolicy = [.userPresence, .applicationPassword]
  1051. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1052. var error: Unmanaged<CFError>?
  1053. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1054. XCTAssertNil(error)
  1055. XCTAssertNotNil(accessControl)
  1056. }
  1057. do {
  1058. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1059. let policy: AuthenticationPolicy = [.userPresence, .applicationPassword, .privateKeyUsage]
  1060. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1061. var error: Unmanaged<CFError>?
  1062. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1063. XCTAssertNil(error)
  1064. XCTAssertNotNil(accessControl)
  1065. }
  1066. do {
  1067. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1068. let policy: AuthenticationPolicy = [.applicationPassword]
  1069. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1070. var error: Unmanaged<CFError>?
  1071. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1072. XCTAssertNil(error)
  1073. XCTAssertNotNil(accessControl)
  1074. }
  1075. do {
  1076. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1077. let policy: AuthenticationPolicy = [.applicationPassword, .privateKeyUsage]
  1078. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1079. var error: Unmanaged<CFError>?
  1080. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1081. XCTAssertNil(error)
  1082. XCTAssertNotNil(accessControl)
  1083. }
  1084. do {
  1085. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1086. let policy: AuthenticationPolicy = [.privateKeyUsage]
  1087. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1088. var error: Unmanaged<CFError>?
  1089. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1090. XCTAssertNil(error)
  1091. XCTAssertNotNil(accessControl)
  1092. }
  1093. do {
  1094. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1095. let policy: AuthenticationPolicy = [.touchIDAny]
  1096. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1097. var error: Unmanaged<CFError>?
  1098. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1099. XCTAssertNil(error)
  1100. XCTAssertNotNil(accessControl)
  1101. }
  1102. do {
  1103. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1104. let policy: AuthenticationPolicy = [.touchIDAny, .devicePasscode]
  1105. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1106. var error: Unmanaged<CFError>?
  1107. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1108. XCTAssertNil(error)
  1109. XCTAssertNotNil(accessControl)
  1110. }
  1111. do {
  1112. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1113. let policy: AuthenticationPolicy = [.touchIDAny, .applicationPassword]
  1114. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1115. var error: Unmanaged<CFError>?
  1116. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1117. XCTAssertNil(error)
  1118. XCTAssertNotNil(accessControl)
  1119. }
  1120. do {
  1121. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1122. let policy: AuthenticationPolicy = [.touchIDAny, .applicationPassword, .privateKeyUsage]
  1123. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1124. var error: Unmanaged<CFError>?
  1125. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1126. XCTAssertNil(error)
  1127. XCTAssertNotNil(accessControl)
  1128. }
  1129. do {
  1130. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1131. let policy: AuthenticationPolicy = [.touchIDCurrentSet]
  1132. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1133. var error: Unmanaged<CFError>?
  1134. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1135. XCTAssertNil(error)
  1136. XCTAssertNotNil(accessControl)
  1137. }
  1138. do {
  1139. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1140. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .devicePasscode]
  1141. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1142. var error: Unmanaged<CFError>?
  1143. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1144. XCTAssertNil(error)
  1145. XCTAssertNotNil(accessControl)
  1146. }
  1147. do {
  1148. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1149. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .applicationPassword]
  1150. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1151. var error: Unmanaged<CFError>?
  1152. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1153. XCTAssertNil(error)
  1154. XCTAssertNotNil(accessControl)
  1155. }
  1156. do {
  1157. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1158. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .applicationPassword, .privateKeyUsage]
  1159. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1160. var error: Unmanaged<CFError>?
  1161. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1162. XCTAssertNil(error)
  1163. XCTAssertNotNil(accessControl)
  1164. }
  1165. do {
  1166. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1167. let policy: AuthenticationPolicy = [.touchIDAny, .or, .devicePasscode]
  1168. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1169. var error: Unmanaged<CFError>?
  1170. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1171. XCTAssertNil(error)
  1172. XCTAssertNotNil(accessControl)
  1173. }
  1174. do {
  1175. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1176. let policy: AuthenticationPolicy = [.touchIDAny, .and, .devicePasscode]
  1177. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1178. var error: Unmanaged<CFError>?
  1179. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1180. XCTAssertNil(error)
  1181. XCTAssertNotNil(accessControl)
  1182. }
  1183. #endif
  1184. #if os(OSX)
  1185. do {
  1186. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1187. let policy: AuthenticationPolicy = [.userPresence]
  1188. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1189. var error: Unmanaged<CFError>?
  1190. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1191. XCTAssertNil(error)
  1192. XCTAssertNotNil(accessControl)
  1193. }
  1194. do {
  1195. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1196. let policy: AuthenticationPolicy = [.devicePasscode]
  1197. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1198. var error: Unmanaged<CFError>?
  1199. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1200. XCTAssertNil(error)
  1201. XCTAssertNotNil(accessControl)
  1202. }
  1203. #endif
  1204. }
  1205. }