KeychainAccessTests.swift 90 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909
  1. //
  2. // KeychainAccessTests.swift
  3. // KeychainAccessTests
  4. //
  5. // Created by kishikawa katsumi on 2014/12/24.
  6. // Copyright (c) 2014 kishikawa katsumi. All rights reserved.
  7. //
  8. // Permission is hereby granted, free of charge, to any person obtaining a copy
  9. // of this software and associated documentation files (the "Software"), to deal
  10. // in the Software without restriction, including without limitation the rights
  11. // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
  12. // copies of the Software, and to permit persons to whom the Software is
  13. // furnished to do so, subject to the following conditions:
  14. //
  15. // The above copyright notice and this permission notice shall be included in
  16. // all copies or substantial portions of the Software.
  17. //
  18. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  19. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  20. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  21. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  22. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  23. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
  24. // THE SOFTWARE.
  25. import Foundation
  26. import XCTest
  27. import KeychainAccess
  28. class KeychainAccessTests: XCTestCase {
  29. override func setUp() {
  30. super.setUp()
  31. do { try Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").removeAll() } catch {}
  32. do { try Keychain(service: "Twitter").removeAll() } catch {}
  33. do { try Keychain(server: URL(string: "https://example.com")!, protocolType: .https).removeAll() } catch {}
  34. do { try Keychain(server: URL(string: "https://example.com:443")!, protocolType: .https).removeAll() } catch {}
  35. do { try Keychain().removeAll() } catch {}
  36. }
  37. override func tearDown() {
  38. super.tearDown()
  39. }
  40. // MARK:
  41. func testGenericPassword() {
  42. do {
  43. // Add Keychain items
  44. let keychain = Keychain(service: "Twitter")
  45. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  46. do { try keychain.set("password_1234", key: "password") } catch {}
  47. let username = try! keychain.get("username")
  48. XCTAssertEqual(username, "kishikawa_katsumi")
  49. let password = try! keychain.get("password")
  50. XCTAssertEqual(password, "password_1234")
  51. }
  52. do {
  53. // Update Keychain items
  54. let keychain = Keychain(service: "Twitter")
  55. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  56. do { try keychain.set("1234_password", key: "password") } catch {}
  57. let username = try! keychain.get("username")
  58. XCTAssertEqual(username, "katsumi_kishikawa")
  59. let password = try! keychain.get("password")
  60. XCTAssertEqual(password, "1234_password")
  61. }
  62. do {
  63. // Remove Keychain items
  64. let keychain = Keychain(service: "Twitter")
  65. do { try keychain.remove("username") } catch {}
  66. do { try keychain.remove("password") } catch {}
  67. XCTAssertNil(try! keychain.get("username"))
  68. XCTAssertNil(try! keychain.get("password"))
  69. }
  70. }
  71. func testGenericPasswordSubscripting() {
  72. do {
  73. // Add Keychain items
  74. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  75. keychain["username"] = "kishikawa_katsumi"
  76. keychain["password"] = "password_1234"
  77. let username = keychain["username"]
  78. XCTAssertEqual(username, "kishikawa_katsumi")
  79. let password = keychain["password"]
  80. XCTAssertEqual(password, "password_1234")
  81. }
  82. do {
  83. // Update Keychain items
  84. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  85. keychain["username"] = "katsumi_kishikawa"
  86. keychain["password"] = "1234_password"
  87. let username = keychain["username"]
  88. XCTAssertEqual(username, "katsumi_kishikawa")
  89. let password = keychain["password"]
  90. XCTAssertEqual(password, "1234_password")
  91. }
  92. do {
  93. // Remove Keychain items
  94. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  95. keychain["username"] = nil
  96. keychain["password"] = nil
  97. XCTAssertNil(keychain["username"])
  98. XCTAssertNil(keychain["password"])
  99. }
  100. }
  101. func testGenericPasswordWithAccessGroup1() {
  102. do {
  103. // Add Keychain items
  104. // This attribute (kSecAttrAccessGroup) applies to macOS keychain items only if you also set a value of true for the
  105. // kSecUseDataProtectionKeychain key, the kSecAttrSynchronizable key, or both.
  106. // https://developer.apple.com/documentation/security/ksecattraccessgroup
  107. let keychain = Keychain(service: "Twitter").synchronizable(true)
  108. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  109. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  110. do { try keychain.set("password_1234", key: "password") } catch {}
  111. do { try keychainWithAccessGroup.set("kishikawa_katsumi_access_group", key: "username") } catch {}
  112. do { try keychainWithAccessGroup.set("password_1234_access_group", key: "password") } catch {}
  113. XCTAssertEqual(try! keychain.get("username"), "kishikawa_katsumi")
  114. XCTAssertEqual(try! keychain.get("password"), "password_1234")
  115. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "kishikawa_katsumi_access_group")
  116. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "password_1234_access_group")
  117. }
  118. do {
  119. // Update Keychain items
  120. let keychain = Keychain(service: "Twitter").synchronizable(true)
  121. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  122. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  123. do { try keychain.set("1234_password", key: "password") } catch {}
  124. do { try keychainWithAccessGroup.set("katsumi_kishikawa_access_group", key: "username") } catch {}
  125. do { try keychainWithAccessGroup.set("1234_password_access_group", key: "password") } catch {}
  126. XCTAssertEqual(try! keychain.get("username"), "katsumi_kishikawa")
  127. XCTAssertEqual(try! keychain.get("password"), "1234_password")
  128. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "katsumi_kishikawa_access_group")
  129. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "1234_password_access_group")
  130. }
  131. do {
  132. // Remove Keychain items
  133. let keychain = Keychain(service: "Twitter").synchronizable(true)
  134. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  135. XCTAssertNotNil(try! keychainWithAccessGroup.get("username"))
  136. XCTAssertNotNil(try! keychainWithAccessGroup.get("password"))
  137. do { try keychainWithAccessGroup.remove("username") } catch {}
  138. do { try keychainWithAccessGroup.remove("password") } catch {}
  139. XCTAssertNil(try! keychainWithAccessGroup.get("username"))
  140. XCTAssertNil(try! keychainWithAccessGroup.get("password"))
  141. XCTAssertNotNil(try! keychain.get("username"))
  142. XCTAssertNotNil(try! keychain.get("password"))
  143. do { try keychain.remove("username") } catch {}
  144. do { try keychain.remove("password") } catch {}
  145. XCTAssertNil(try! keychain.get("username"))
  146. XCTAssertNil(try! keychain.get("password"))
  147. }
  148. }
  149. func testGenericPasswordWithAccessGroup2() {
  150. do {
  151. // Add Keychain items
  152. let keychain = Keychain(service: "Twitter").synchronizable(true)
  153. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  154. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  155. do { try keychain.set("password_1234", key: "password") } catch {}
  156. do { try keychainWithAccessGroup.set("kishikawa_katsumi_access_group", key: "username") } catch {}
  157. do { try keychainWithAccessGroup.set("password_1234_access_group", key: "password") } catch {}
  158. XCTAssertEqual(try! keychain.get("username"), "kishikawa_katsumi")
  159. XCTAssertEqual(try! keychain.get("password"), "password_1234")
  160. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "kishikawa_katsumi_access_group")
  161. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "password_1234_access_group")
  162. }
  163. do {
  164. // Update Keychain items
  165. let keychain = Keychain(service: "Twitter").synchronizable(true)
  166. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  167. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  168. do { try keychain.set("1234_password", key: "password") } catch {}
  169. do { try keychainWithAccessGroup.set("katsumi_kishikawa_access_group", key: "username") } catch {}
  170. do { try keychainWithAccessGroup.set("1234_password_access_group", key: "password") } catch {}
  171. XCTAssertEqual(try! keychain.get("username"), "katsumi_kishikawa")
  172. XCTAssertEqual(try! keychain.get("password"), "1234_password")
  173. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "katsumi_kishikawa_access_group")
  174. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "1234_password_access_group")
  175. }
  176. do {
  177. // Remove Keychain items
  178. let keychain = Keychain(service: "Twitter").synchronizable(true)
  179. let keychainWithAccessGroup = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  180. XCTAssertNotNil(try! keychainWithAccessGroup.get("username"))
  181. XCTAssertNotNil(try! keychainWithAccessGroup.get("password"))
  182. do { try keychain.remove("username") } catch {}
  183. do { try keychain.remove("password") } catch {}
  184. // If the access group is empty, the query will match all access group. So delete all values in other access groups.
  185. XCTAssertNil(try! keychain.get("username"))
  186. XCTAssertNil(try! keychain.get("password"))
  187. XCTAssertNil(try! keychainWithAccessGroup.get("username"))
  188. XCTAssertNil(try! keychainWithAccessGroup.get("password"))
  189. }
  190. }
  191. // MARK:
  192. func testInternetPassword() {
  193. do {
  194. // Add Keychain items
  195. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  196. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  197. do { try keychain.set("password_1234", key: "password") } catch {}
  198. let username = try! keychain.get("username")
  199. XCTAssertEqual(username, "kishikawa_katsumi")
  200. let password = try! keychain.get("password")
  201. XCTAssertEqual(password, "password_1234")
  202. }
  203. do {
  204. // Update Keychain items
  205. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  206. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  207. do { try keychain.set("1234_password", key: "password") } catch {}
  208. let username = try! keychain.get("username")
  209. XCTAssertEqual(username, "katsumi_kishikawa")
  210. let password = try! keychain.get("password")
  211. XCTAssertEqual(password, "1234_password")
  212. }
  213. do {
  214. // Remove Keychain items
  215. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  216. do { try keychain.remove("username") } catch {}
  217. do { try keychain.remove("password") } catch {}
  218. XCTAssertNil(try! keychain.get("username"))
  219. XCTAssertNil(try! keychain.get("password"))
  220. }
  221. }
  222. func testInternetPasswordSubscripting() {
  223. do {
  224. // Add Keychain items
  225. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  226. keychain["username"] = "kishikawa_katsumi"
  227. keychain["password"] = "password_1234"
  228. let username = keychain["username"]
  229. XCTAssertEqual(username, "kishikawa_katsumi")
  230. let password = keychain["password"]
  231. XCTAssertEqual(password, "password_1234")
  232. }
  233. do {
  234. // Update Keychain items
  235. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  236. keychain["username"] = "katsumi_kishikawa"
  237. keychain["password"] = "1234_password"
  238. let username = keychain["username"]
  239. XCTAssertEqual(username, "katsumi_kishikawa")
  240. let password = keychain["password"]
  241. XCTAssertEqual(password, "1234_password")
  242. }
  243. do {
  244. // Remove Keychain items
  245. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  246. keychain["username"] = nil
  247. keychain["password"] = nil
  248. XCTAssertNil(keychain["username"])
  249. XCTAssertNil(keychain["password"])
  250. }
  251. }
  252. func testInternetPasswordWithAccessGroup1() {
  253. do {
  254. // Add Keychain items
  255. // This attribute (kSecAttrAccessGroup) applies to macOS keychain items only if you also set a value of true for the
  256. // kSecUseDataProtectionKeychain key, the kSecAttrSynchronizable key, or both.
  257. // https://developer.apple.com/documentation/security/ksecattraccessgroup
  258. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  259. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  260. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  261. do { try keychain.set("password_1234", key: "password") } catch {}
  262. do { try keychainWithAccessGroup.set("kishikawa_katsumi_access_group", key: "username") } catch {}
  263. do { try keychainWithAccessGroup.set("password_1234_access_group", key: "password") } catch {}
  264. XCTAssertEqual(try! keychain.get("username"), "kishikawa_katsumi")
  265. XCTAssertEqual(try! keychain.get("password"), "password_1234")
  266. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "kishikawa_katsumi_access_group")
  267. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "password_1234_access_group")
  268. }
  269. do {
  270. // Update Keychain items
  271. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  272. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  273. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  274. do { try keychain.set("1234_password", key: "password") } catch {}
  275. do { try keychainWithAccessGroup.set("katsumi_kishikawa_access_group", key: "username") } catch {}
  276. do { try keychainWithAccessGroup.set("1234_password_access_group", key: "password") } catch {}
  277. XCTAssertEqual(try! keychain.get("username"), "katsumi_kishikawa")
  278. XCTAssertEqual(try! keychain.get("password"), "1234_password")
  279. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "katsumi_kishikawa_access_group")
  280. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "1234_password_access_group")
  281. }
  282. do {
  283. // Remove Keychain items
  284. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  285. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  286. XCTAssertNotNil(try! keychainWithAccessGroup.get("username"))
  287. XCTAssertNotNil(try! keychainWithAccessGroup.get("password"))
  288. do { try keychainWithAccessGroup.remove("username") } catch {}
  289. do { try keychainWithAccessGroup.remove("password") } catch {}
  290. XCTAssertNil(try! keychainWithAccessGroup.get("username"))
  291. XCTAssertNil(try! keychainWithAccessGroup.get("password"))
  292. XCTAssertNotNil(try! keychain.get("username"))
  293. XCTAssertNotNil(try! keychain.get("password"))
  294. do { try keychain.remove("username") } catch {}
  295. do { try keychain.remove("password") } catch {}
  296. XCTAssertNil(try! keychain.get("username"))
  297. XCTAssertNil(try! keychain.get("password"))
  298. }
  299. }
  300. func testInternetPasswordWithAccessGroup2() {
  301. do {
  302. // Add Keychain items
  303. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  304. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  305. do { try keychain.set("kishikawa_katsumi", key: "username") } catch {}
  306. do { try keychain.set("password_1234", key: "password") } catch {}
  307. do { try keychainWithAccessGroup.set("kishikawa_katsumi_access_group", key: "username") } catch {}
  308. do { try keychainWithAccessGroup.set("password_1234_access_group", key: "password") } catch {}
  309. XCTAssertEqual(try! keychain.get("username"), "kishikawa_katsumi")
  310. XCTAssertEqual(try! keychain.get("password"), "password_1234")
  311. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "kishikawa_katsumi_access_group")
  312. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "password_1234_access_group")
  313. }
  314. do {
  315. // Update Keychain items
  316. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  317. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  318. do { try keychain.set("katsumi_kishikawa", key: "username") } catch {}
  319. do { try keychain.set("1234_password", key: "password") } catch {}
  320. do { try keychainWithAccessGroup.set("katsumi_kishikawa_access_group", key: "username") } catch {}
  321. do { try keychainWithAccessGroup.set("1234_password_access_group", key: "password") } catch {}
  322. XCTAssertEqual(try! keychain.get("username"), "katsumi_kishikawa")
  323. XCTAssertEqual(try! keychain.get("password"), "1234_password")
  324. XCTAssertEqual(try! keychainWithAccessGroup.get("username"), "katsumi_kishikawa_access_group")
  325. XCTAssertEqual(try! keychainWithAccessGroup.get("password"), "1234_password_access_group")
  326. }
  327. do {
  328. // Remove Keychain items
  329. let keychain = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https).synchronizable(true)
  330. let keychainWithAccessGroup = Keychain(server: "https://kishikawakatsumi.com", protocolType: .https, accessGroup: "27AEDK3C9F.shared").synchronizable(true)
  331. XCTAssertNotNil(try! keychainWithAccessGroup.get("username"))
  332. XCTAssertNotNil(try! keychainWithAccessGroup.get("password"))
  333. do { try keychain.remove("username") } catch {}
  334. do { try keychain.remove("password") } catch {}
  335. // If the access group is empty, the query will match all access group. So delete all values in other access groups.
  336. XCTAssertNil(try! keychain.get("username"))
  337. XCTAssertNil(try! keychain.get("password"))
  338. XCTAssertNil(try! keychainWithAccessGroup.get("username"))
  339. XCTAssertNil(try! keychainWithAccessGroup.get("password"))
  340. }
  341. }
  342. // MARK:
  343. func testDefaultInitializer() {
  344. let keychain = Keychain()
  345. XCTAssertEqual(keychain.service, Bundle.main.bundleIdentifier)
  346. let service: String
  347. #if targetEnvironment(macCatalyst)
  348. service = "maccatalyst.com.kishikawakatsumi.KeychainAccess.TestHost-MacCatalyst"
  349. #else
  350. service = "com.kishikawakatsumi.KeychainAccess.TestHost"
  351. #endif
  352. XCTAssertEqual(keychain.service, service)
  353. XCTAssertNil(keychain.accessGroup)
  354. }
  355. func testInitializerWithService() {
  356. let keychain = Keychain(service: "com.example.github-token")
  357. XCTAssertEqual(keychain.service, "com.example.github-token")
  358. XCTAssertNil(keychain.accessGroup)
  359. }
  360. func testInitializerWithAccessGroup() {
  361. let keychain = Keychain(accessGroup: "27AEDK3C9F.shared")
  362. let service: String
  363. #if targetEnvironment(macCatalyst)
  364. service = "maccatalyst.com.kishikawakatsumi.KeychainAccess.TestHost-MacCatalyst"
  365. #else
  366. service = "com.kishikawakatsumi.KeychainAccess.TestHost"
  367. #endif
  368. XCTAssertEqual(keychain.service, service)
  369. XCTAssertEqual(keychain.accessGroup, "27AEDK3C9F.shared")
  370. }
  371. func testInitializerWithServiceAndAccessGroup() {
  372. let keychain = Keychain(service: "com.example.github-token", accessGroup: "27AEDK3C9F.shared")
  373. XCTAssertEqual(keychain.service, "com.example.github-token")
  374. XCTAssertEqual(keychain.accessGroup, "27AEDK3C9F.shared")
  375. }
  376. func testInitializerWithServer() {
  377. let server = "https://kishikawakatsumi.com"
  378. let url = URL(string: server)!
  379. do {
  380. let keychain = Keychain(server: server, protocolType: .https)
  381. XCTAssertEqual(keychain.server, url)
  382. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  383. XCTAssertEqual(keychain.authenticationType, AuthenticationType.default)
  384. }
  385. do {
  386. let keychain = Keychain(server: url, protocolType: .https)
  387. XCTAssertEqual(keychain.server, url)
  388. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  389. XCTAssertEqual(keychain.authenticationType, AuthenticationType.default)
  390. }
  391. }
  392. func testInitializerWithServerAndAuthenticationType() {
  393. let server = "https://kishikawakatsumi.com"
  394. let url = URL(string: server)!
  395. do {
  396. let keychain = Keychain(server: server, protocolType: .https, authenticationType: .htmlForm)
  397. XCTAssertEqual(keychain.server, url)
  398. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  399. XCTAssertEqual(keychain.authenticationType, AuthenticationType.htmlForm)
  400. }
  401. do {
  402. let keychain = Keychain(server: url, protocolType: .https, authenticationType: .htmlForm)
  403. XCTAssertEqual(keychain.server, url)
  404. XCTAssertEqual(keychain.protocolType, ProtocolType.https)
  405. XCTAssertEqual(keychain.authenticationType, AuthenticationType.htmlForm)
  406. }
  407. }
  408. // MARK:
  409. func testContains() {
  410. let keychain = Keychain(service: "Twitter")
  411. XCTAssertFalse(try! keychain.contains("username"), "not stored username")
  412. XCTAssertFalse(try! keychain.contains("password"), "not stored password")
  413. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  414. XCTAssertTrue(try! keychain.contains("username"), "stored username")
  415. XCTAssertFalse(try! keychain.contains("password"), "not stored password")
  416. do { try keychain.set("password1234", key: "password") } catch {}
  417. XCTAssertTrue(try! keychain.contains("username"), "stored username")
  418. XCTAssertTrue(try! keychain.contains("password"), "stored password")
  419. }
  420. // MARK:
  421. func testSetString() {
  422. let keychain = Keychain(service: "Twitter")
  423. XCTAssertNil(try! keychain.get("username"), "not stored username")
  424. XCTAssertNil(try! keychain.get("password"), "not stored password")
  425. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  426. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  427. XCTAssertNil(try! keychain.get("password"), "not stored password")
  428. do { try keychain.set("password1234", key: "password") } catch {}
  429. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  430. XCTAssertEqual(try! keychain.get("password"), "password1234", "stored password")
  431. }
  432. func testSetStringWithLabel() {
  433. let keychain = Keychain(service: "Twitter")
  434. .label("Twitter Account")
  435. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  436. do {
  437. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  438. return attributes?.label
  439. }
  440. XCTAssertNil(label)
  441. } catch {
  442. XCTFail("error occurred")
  443. }
  444. keychain["kishikawakatsumi"] = "password1234"
  445. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  446. do {
  447. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  448. return attributes?.label
  449. }
  450. XCTAssertEqual(label, "Twitter Account")
  451. } catch {
  452. XCTFail("error occurred")
  453. }
  454. }
  455. func testSetStringWithComment() {
  456. let keychain = Keychain(service: "Twitter")
  457. .comment("Kishikawa Katsumi")
  458. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  459. do {
  460. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  461. return attributes?.comment
  462. }
  463. XCTAssertNil(comment)
  464. } catch {
  465. XCTFail("error occurred")
  466. }
  467. keychain["kishikawakatsumi"] = "password1234"
  468. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  469. do {
  470. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  471. return attributes?.comment
  472. }
  473. XCTAssertEqual(comment, "Kishikawa Katsumi")
  474. } catch {
  475. XCTFail("error occurred")
  476. }
  477. }
  478. func testSetStringWithLabelAndComment() {
  479. let keychain = Keychain(service: "Twitter")
  480. .label("Twitter Account")
  481. .comment("Kishikawa Katsumi")
  482. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  483. do {
  484. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  485. return attributes?.label
  486. }
  487. XCTAssertNil(label)
  488. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  489. return attributes?.comment
  490. }
  491. XCTAssertNil(comment)
  492. } catch {
  493. XCTFail("error occurred")
  494. }
  495. keychain["kishikawakatsumi"] = "password1234"
  496. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  497. do {
  498. let label = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  499. return attributes?.label
  500. }
  501. XCTAssertEqual(label, "Twitter Account")
  502. let comment = try keychain.get("kishikawakatsumi") { (attributes) -> String? in
  503. return attributes?.comment
  504. }
  505. XCTAssertEqual(comment, "Kishikawa Katsumi")
  506. } catch {
  507. XCTFail("error occurred")
  508. }
  509. }
  510. func testSetData() {
  511. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  512. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  513. let keychain = Keychain(service: "Twitter")
  514. XCTAssertNil(try! keychain.getData("JSONData"), "not stored JSON data")
  515. do { try keychain.set(JSONData, key: "JSONData") } catch {}
  516. XCTAssertEqual(try! keychain.getData("JSONData"), JSONData, "stored JSON data")
  517. }
  518. func testStringConversionError() {
  519. let keychain = Keychain(service: "Twitter")
  520. let length = 256
  521. let data = NSMutableData(length: length)!
  522. let bytes = data.mutableBytes.bindMemory(to: UInt8.self, capacity: length)
  523. _ = SecRandomCopyBytes(kSecRandomDefault, length, bytes)
  524. do {
  525. try keychain.set(data as Data, key: "RandomData")
  526. let _ = try keychain.getString("RandomData")
  527. XCTFail("no error occurred")
  528. } catch let error as NSError {
  529. XCTAssertEqual(error.domain, KeychainAccessErrorDomain)
  530. XCTAssertEqual(error.code, Int(Status.conversionError.rawValue))
  531. XCTAssertEqual(error.userInfo[NSLocalizedDescriptionKey] as! String, Status.conversionError.localizedDescription)
  532. } catch {
  533. XCTFail("unexpected error occurred")
  534. }
  535. do {
  536. try keychain.set(data as Data, key: "RandomData")
  537. let _ = try keychain.getString("RandomData")
  538. XCTFail("no error occurred")
  539. } catch Status.conversionError {
  540. XCTAssertTrue(true)
  541. } catch {
  542. XCTFail("unexpected error occurred")
  543. }
  544. }
  545. func testGetPersistentRef() {
  546. let keychain = Keychain(service: "Twitter")
  547. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  548. do {
  549. let persistentRef = try keychain.get("kishikawakatsumi") { $0?.persistentRef }
  550. XCTAssertNil(persistentRef)
  551. } catch {
  552. XCTFail("error occurred")
  553. }
  554. keychain["kishikawakatsumi"] = "password1234"
  555. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  556. do {
  557. let persistentRef = try keychain.get("kishikawakatsumi") { $0?.persistentRef }
  558. XCTAssertNotNil(persistentRef)
  559. } catch {
  560. XCTFail("error occurred")
  561. }
  562. }
  563. #if os(iOS) || os(tvOS)
  564. func testSetAttributes() {
  565. do {
  566. var attributes = [String: Any]()
  567. attributes[String(kSecAttrDescription)] = "Description Test"
  568. attributes[String(kSecAttrComment)] = "Comment Test"
  569. attributes[String(kSecAttrCreator)] = "Creator Test"
  570. attributes[String(kSecAttrType)] = "Type Test"
  571. attributes[String(kSecAttrLabel)] = "Label Test"
  572. attributes[String(kSecAttrIsInvisible)] = true
  573. attributes[String(kSecAttrIsNegative)] = true
  574. let keychain = Keychain(service: "Twitter")
  575. .attributes(attributes)
  576. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  577. do {
  578. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  579. XCTAssertNil(attributes)
  580. } catch {
  581. XCTFail("error occurred")
  582. }
  583. keychain["kishikawakatsumi"] = "password1234"
  584. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  585. do {
  586. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  587. XCTAssertEqual(attributes?.`class`, ItemClass.genericPassword.rawValue)
  588. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  589. XCTAssertNil(attributes?.ref)
  590. XCTAssertNotNil(attributes?.persistentRef)
  591. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  592. #if targetEnvironment(macCatalyst)
  593. XCTAssertNotNil(attributes?.accessControl)
  594. #else
  595. if ProcessInfo().isOperatingSystemAtLeast(OperatingSystemVersion(majorVersion: 11, minorVersion: 3, patchVersion: 0)) {
  596. XCTAssertNotNil(attributes?.accessControl)
  597. } else {
  598. XCTAssertNil(attributes?.accessControl)
  599. }
  600. #endif
  601. let accessGroup: String
  602. #if targetEnvironment(macCatalyst)
  603. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost-MacCatalyst"
  604. #else
  605. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost"
  606. #endif
  607. XCTAssertEqual(attributes?.accessGroup, accessGroup)
  608. XCTAssertNotNil(attributes?.synchronizable)
  609. XCTAssertNotNil(attributes?.creationDate)
  610. XCTAssertNotNil(attributes?.modificationDate)
  611. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  612. XCTAssertEqual(attributes?.comment, "Comment Test")
  613. XCTAssertEqual(attributes?.creator, "Creator Test")
  614. XCTAssertEqual(attributes?.type, "Type Test")
  615. XCTAssertEqual(attributes?.label, "Label Test")
  616. XCTAssertEqual(attributes?.isInvisible, true)
  617. XCTAssertEqual(attributes?.isNegative, true)
  618. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  619. XCTAssertEqual(attributes?.service, "Twitter")
  620. XCTAssertNil(attributes?.generic)
  621. XCTAssertNil(attributes?.securityDomain)
  622. XCTAssertNil(attributes?.server)
  623. XCTAssertNil(attributes?.`protocol`)
  624. XCTAssertNil(attributes?.authenticationType)
  625. XCTAssertNil(attributes?.port)
  626. XCTAssertNil(attributes?.path)
  627. XCTAssertEqual(attributes?[String(kSecClass)] as? String, ItemClass.genericPassword.rawValue)
  628. XCTAssertEqual(attributes?[String(kSecValueData)] as? Data, "password1234".data(using: .utf8))
  629. } catch {
  630. XCTFail("error occurred")
  631. }
  632. }
  633. do {
  634. var attributes = [String: Any]()
  635. attributes[String(kSecAttrDescription)] = "Description Test"
  636. attributes[String(kSecAttrComment)] = "Comment Test"
  637. attributes[String(kSecAttrCreator)] = "Creator Test"
  638. attributes[String(kSecAttrType)] = "Type Test"
  639. attributes[String(kSecAttrLabel)] = "Label Test"
  640. attributes[String(kSecAttrIsInvisible)] = true
  641. attributes[String(kSecAttrIsNegative)] = true
  642. attributes[String(kSecAttrSecurityDomain)] = "securitydomain"
  643. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  644. .attributes(attributes)
  645. XCTAssertNil(keychain["kishikawakatsumi"], "not stored password")
  646. do {
  647. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  648. XCTAssertNil(attributes)
  649. } catch {
  650. XCTFail("error occurred")
  651. }
  652. do {
  653. keychain["kishikawakatsumi"] = "password1234"
  654. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  655. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  656. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  657. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  658. XCTAssertNil(attributes?.ref)
  659. XCTAssertNotNil(attributes?.persistentRef)
  660. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  661. #if os(iOS)
  662. if #available(iOS 11.3, *) {
  663. XCTAssertNotNil(attributes?.accessControl)
  664. } else if #available(iOS 9.0, *) {
  665. XCTAssertNil(attributes?.accessControl)
  666. } else {
  667. XCTAssertNotNil(attributes?.accessControl)
  668. }
  669. #else
  670. if #available(tvOS 11.3, *) {
  671. XCTAssertNotNil(attributes?.accessControl)
  672. } else {
  673. XCTAssertNil(attributes?.accessControl)
  674. }
  675. #endif
  676. let accessGroup: String
  677. #if targetEnvironment(macCatalyst)
  678. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost-MacCatalyst"
  679. #else
  680. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost"
  681. #endif
  682. XCTAssertEqual(attributes?.accessGroup, accessGroup)
  683. XCTAssertNotNil(attributes?.synchronizable)
  684. XCTAssertNotNil(attributes?.creationDate)
  685. XCTAssertNotNil(attributes?.modificationDate)
  686. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  687. XCTAssertEqual(attributes?.comment, "Comment Test")
  688. XCTAssertEqual(attributes?.creator, "Creator Test")
  689. XCTAssertEqual(attributes?.type, "Type Test")
  690. XCTAssertEqual(attributes?.label, "Label Test")
  691. XCTAssertEqual(attributes?.isInvisible, true)
  692. XCTAssertEqual(attributes?.isNegative, true)
  693. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  694. XCTAssertNil(attributes?.service)
  695. XCTAssertNil(attributes?.generic)
  696. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  697. XCTAssertEqual(attributes?.server, "example.com")
  698. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  699. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  700. XCTAssertEqual(attributes?.port, 443)
  701. XCTAssertEqual(attributes?.path, "")
  702. } catch {
  703. XCTFail("error occurred")
  704. }
  705. do {
  706. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  707. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "stored password")
  708. keychain["kishikawakatsumi"] = "1234password"
  709. XCTAssertEqual(keychain["kishikawakatsumi"], "1234password", "updated password")
  710. let attributes = try keychain.get("kishikawakatsumi") { $0 }
  711. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  712. XCTAssertEqual(attributes?.data, "1234password".data(using: .utf8))
  713. XCTAssertNil(attributes?.ref)
  714. XCTAssertNotNil(attributes?.persistentRef)
  715. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  716. #if os(iOS)
  717. if #available(iOS 11.3, *) {
  718. XCTAssertNotNil(attributes?.accessControl)
  719. } else if #available(iOS 9.0, *) {
  720. XCTAssertNil(attributes?.accessControl)
  721. } else {
  722. XCTAssertNotNil(attributes?.accessControl)
  723. }
  724. #else
  725. if #available(tvOS 11.3, *) {
  726. XCTAssertNotNil(attributes?.accessControl)
  727. } else {
  728. XCTAssertNil(attributes?.accessControl)
  729. }
  730. #endif
  731. let accessGroup: String
  732. #if targetEnvironment(macCatalyst)
  733. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost-MacCatalyst"
  734. #else
  735. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost"
  736. #endif
  737. XCTAssertEqual(attributes?.accessGroup, accessGroup)
  738. XCTAssertNotNil(attributes?.synchronizable)
  739. XCTAssertNotNil(attributes?.creationDate)
  740. XCTAssertNotNil(attributes?.modificationDate)
  741. XCTAssertEqual(attributes?.attributeDescription, "Description Test")
  742. XCTAssertEqual(attributes?.comment, "Comment Test")
  743. XCTAssertEqual(attributes?.creator, "Creator Test")
  744. XCTAssertEqual(attributes?.type, "Type Test")
  745. XCTAssertEqual(attributes?.label, "Label Test")
  746. XCTAssertEqual(attributes?.isInvisible, true)
  747. XCTAssertEqual(attributes?.isNegative, true)
  748. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  749. XCTAssertNil(attributes?.service)
  750. XCTAssertNil(attributes?.generic)
  751. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  752. XCTAssertEqual(attributes?.server, "example.com")
  753. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  754. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  755. XCTAssertEqual(attributes?.port, 443)
  756. XCTAssertEqual(attributes?.path, "")
  757. } catch {
  758. XCTFail("error occurred")
  759. }
  760. do {
  761. let keychain = Keychain(server: URL(string: "https://example.com:443/api/login/")!, protocolType: .https)
  762. .attributes([String(kSecAttrDescription): "Updated Description"])
  763. XCTAssertEqual(keychain["kishikawakatsumi"], "1234password", "stored password")
  764. keychain["kishikawakatsumi"] = "password1234"
  765. XCTAssertEqual(keychain["kishikawakatsumi"], "password1234", "updated password")
  766. let attributes = keychain[attributes: "kishikawakatsumi"]
  767. XCTAssertEqual(attributes?.`class`, ItemClass.internetPassword.rawValue)
  768. XCTAssertEqual(attributes?.data, "password1234".data(using: .utf8))
  769. XCTAssertNil(attributes?.ref)
  770. XCTAssertNotNil(attributes?.persistentRef)
  771. XCTAssertEqual(attributes?.accessible, Accessibility.afterFirstUnlock.rawValue)
  772. #if os(iOS)
  773. if #available(iOS 11.3, *) {
  774. XCTAssertNotNil(attributes?.accessControl)
  775. } else if #available(iOS 9.0, *) {
  776. XCTAssertNil(attributes?.accessControl)
  777. } else {
  778. XCTAssertNotNil(attributes?.accessControl)
  779. }
  780. #else
  781. if #available(tvOS 11.3, *) {
  782. XCTAssertNotNil(attributes?.accessControl)
  783. } else {
  784. XCTAssertNil(attributes?.accessControl)
  785. }
  786. #endif
  787. let accessGroup: String
  788. #if targetEnvironment(macCatalyst)
  789. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost-MacCatalyst"
  790. #else
  791. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost"
  792. #endif
  793. XCTAssertEqual(attributes?.accessGroup, accessGroup)
  794. XCTAssertNotNil(attributes?.synchronizable)
  795. XCTAssertNotNil(attributes?.creationDate)
  796. XCTAssertNotNil(attributes?.modificationDate)
  797. XCTAssertEqual(attributes?.attributeDescription, "Updated Description")
  798. XCTAssertEqual(attributes?.comment, "Comment Test")
  799. XCTAssertEqual(attributes?.creator, "Creator Test")
  800. XCTAssertEqual(attributes?.type, "Type Test")
  801. XCTAssertEqual(attributes?.label, "Label Test")
  802. XCTAssertEqual(attributes?.isInvisible, true)
  803. XCTAssertEqual(attributes?.isNegative, true)
  804. XCTAssertEqual(attributes?.account, "kishikawakatsumi")
  805. XCTAssertNil(attributes?.service)
  806. XCTAssertNil(attributes?.generic)
  807. XCTAssertEqual(attributes?.securityDomain, "securitydomain")
  808. XCTAssertEqual(attributes?.server, "example.com")
  809. XCTAssertEqual(attributes?.`protocol`, ProtocolType.https.rawValue)
  810. XCTAssertEqual(attributes?.authenticationType, AuthenticationType.default.rawValue)
  811. XCTAssertEqual(attributes?.port, 443)
  812. XCTAssertEqual(attributes?.path, "")
  813. }
  814. }
  815. }
  816. #endif
  817. func testRemoveString() {
  818. let keychain = Keychain(service: "Twitter")
  819. XCTAssertNil(try! keychain.get("username"), "not stored username")
  820. XCTAssertNil(try! keychain.get("password"), "not stored password")
  821. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  822. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  823. do { try keychain.set("password1234", key: "password") } catch {}
  824. XCTAssertEqual(try! keychain.get("password"), "password1234", "stored password")
  825. do { try keychain.remove("username") } catch {}
  826. XCTAssertNil(try! keychain.get("username"), "removed username")
  827. XCTAssertEqual(try! keychain.get("password"), "password1234", "left password")
  828. do { try keychain.remove("password") } catch {}
  829. XCTAssertNil(try! keychain.get("username"), "removed username")
  830. XCTAssertNil(try! keychain.get("password"), "removed password")
  831. }
  832. func testRemoveData() {
  833. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  834. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  835. let keychain = Keychain(service: "Twitter")
  836. XCTAssertNil(try! keychain.getData("JSONData"), "not stored JSON data")
  837. do { try keychain.set(JSONData, key: "JSONData") } catch {}
  838. XCTAssertEqual(try! keychain.getData("JSONData"), JSONData, "stored JSON data")
  839. do { try keychain.remove("JSONData") } catch {}
  840. XCTAssertNil(try! keychain.getData("JSONData"), "removed JSON data")
  841. }
  842. // MARK:
  843. func testSubscripting() {
  844. let keychain = Keychain(service: "Twitter")
  845. XCTAssertNil(keychain["username"], "not stored username")
  846. XCTAssertNil(keychain["password"], "not stored password")
  847. XCTAssertNil(keychain[string: "username"], "not stored username")
  848. XCTAssertNil(keychain[string: "password"], "not stored password")
  849. keychain["username"] = "kishikawakatsumi"
  850. XCTAssertEqual(keychain["username"], "kishikawakatsumi", "stored username")
  851. XCTAssertEqual(keychain[string: "username"], "kishikawakatsumi", "stored username")
  852. keychain["password"] = "password1234"
  853. XCTAssertEqual(keychain["password"], "password1234", "stored password")
  854. XCTAssertEqual(keychain[string: "password"], "password1234", "stored password")
  855. keychain[string: "username"] = nil
  856. XCTAssertNil(keychain["username"], "removed username")
  857. XCTAssertEqual(keychain["password"], "password1234", "left password")
  858. XCTAssertNil(keychain[string: "username"], "removed username")
  859. XCTAssertEqual(keychain[string: "password"], "password1234", "left password")
  860. keychain[string: "password"] = nil
  861. XCTAssertNil(keychain["username"], "removed username")
  862. XCTAssertNil(keychain["password"], "removed password")
  863. XCTAssertNil(keychain[string: "username"], "removed username")
  864. XCTAssertNil(keychain[string: "password"], "removed password")
  865. let JSONObject = ["username": "kishikawakatsumi", "password": "password1234"]
  866. let JSONData = try! JSONSerialization.data(withJSONObject: JSONObject, options: [])
  867. XCTAssertNil(keychain[data:"JSONData"], "not stored JSON data")
  868. keychain[data: "JSONData"] = JSONData
  869. XCTAssertEqual(keychain[data: "JSONData"], JSONData, "stored JSON data")
  870. keychain[data: "JSONData"] = nil
  871. XCTAssertNil(keychain[data:"JSONData"], "removed JSON data")
  872. }
  873. // MARK:
  874. func testErrorHandling() {
  875. do {
  876. let keychain = Keychain(service: "Twitter", accessGroup: "27AEDK3C9F.shared")
  877. try keychain.removeAll()
  878. XCTAssertTrue(true, "no error occurred")
  879. } catch {
  880. XCTFail("error occurred")
  881. }
  882. do {
  883. let keychain = Keychain(service: "Twitter")
  884. try keychain.removeAll()
  885. XCTAssertTrue(true, "no error occurred")
  886. } catch {
  887. XCTFail("error occurred")
  888. }
  889. do {
  890. let keychain = Keychain(server: URL(string: "https://kishikawakatsumi.com")!, protocolType: .https)
  891. try keychain.removeAll()
  892. XCTAssertTrue(true, "no error occurred")
  893. } catch {
  894. XCTFail("error occurred")
  895. }
  896. do {
  897. let keychain = Keychain()
  898. try keychain.removeAll()
  899. XCTAssertTrue(true, "no error occurred")
  900. } catch {
  901. XCTFail("error occurred")
  902. }
  903. do {
  904. // Add Keychain items
  905. let keychain = Keychain(service: "Twitter")
  906. do {
  907. try keychain.set("kishikawa_katsumi", key: "username")
  908. XCTAssertTrue(true, "no error occurred")
  909. } catch {
  910. XCTFail("error occurred")
  911. }
  912. do {
  913. try keychain.set("password_1234", key: "password")
  914. XCTAssertTrue(true, "no error occurred")
  915. } catch {
  916. XCTFail("error occurred")
  917. }
  918. do {
  919. let username = try keychain.get("username")
  920. XCTAssertEqual(username, "kishikawa_katsumi")
  921. } catch {
  922. XCTFail("error occurred")
  923. }
  924. do {
  925. let password = try keychain.get("password")
  926. XCTAssertEqual(password, "password_1234")
  927. } catch {
  928. XCTFail("error occurred")
  929. }
  930. }
  931. do {
  932. // Update Keychain items
  933. let keychain = Keychain(service: "Twitter")
  934. do {
  935. try keychain.set("katsumi_kishikawa", key: "username")
  936. XCTAssertTrue(true, "no error occurred")
  937. } catch {
  938. XCTFail("error occurred")
  939. }
  940. do {
  941. try keychain.set("1234_password", key: "password")
  942. XCTAssertTrue(true, "no error occurred")
  943. } catch {
  944. XCTFail("error occurred")
  945. }
  946. do {
  947. let username = try keychain.get("username")
  948. XCTAssertEqual(username, "katsumi_kishikawa")
  949. } catch {
  950. XCTFail("error occurred")
  951. }
  952. do {
  953. let password = try keychain.get("password")
  954. XCTAssertEqual(password, "1234_password")
  955. } catch {
  956. XCTFail("error occurred")
  957. }
  958. }
  959. do {
  960. // Remove Keychain items
  961. let keychain = Keychain(service: "Twitter")
  962. do {
  963. try keychain.remove("username")
  964. XCTAssertNil(try! keychain.get("username"))
  965. } catch {
  966. XCTFail("error occurred")
  967. }
  968. do {
  969. try keychain.remove("password")
  970. XCTAssertNil(try! keychain.get("username"))
  971. } catch {
  972. XCTFail("error occurred")
  973. }
  974. }
  975. }
  976. // MARK:
  977. func testSetStringWithCustomService() {
  978. let username_1 = "kishikawakatsumi"
  979. let password_1 = "password1234"
  980. let username_2 = "kishikawa_katsumi"
  981. let password_2 = "password_1234"
  982. let username_3 = "k_katsumi"
  983. let password_3 = "12341234"
  984. let service_1 = ""
  985. let service_2 = "com.kishikawakatsumi.KeychainAccess"
  986. let service_3 = "example.com"
  987. do { try Keychain().removeAll() } catch {}
  988. do { try Keychain(service: service_1).removeAll() } catch {}
  989. do { try Keychain(service: service_2).removeAll() } catch {}
  990. do { try Keychain(service: service_3).removeAll() } catch {}
  991. XCTAssertNil(try! Keychain().get("username"), "not stored username")
  992. XCTAssertNil(try! Keychain().get("password"), "not stored password")
  993. XCTAssertNil(try! Keychain(service: service_1).get("username"), "not stored username")
  994. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  995. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  996. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  997. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  998. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  999. do { try Keychain().set(username_1, key: "username") } catch {}
  1000. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  1001. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  1002. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  1003. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  1004. do { try Keychain(service: service_1).set(username_1, key: "username") } catch {}
  1005. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  1006. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  1007. XCTAssertNil(try! Keychain(service: service_2).get("username"), "not stored username")
  1008. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  1009. do { try Keychain(service: service_2).set(username_2, key: "username") } catch {}
  1010. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  1011. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  1012. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "stored username")
  1013. XCTAssertNil(try! Keychain(service: service_3).get("username"), "not stored username")
  1014. do { try Keychain(service: service_3).set(username_3, key: "username") } catch {}
  1015. XCTAssertEqual(try! Keychain().get("username"), username_1, "stored username")
  1016. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "stored username")
  1017. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "stored username")
  1018. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "stored username")
  1019. do { try Keychain().set(password_1, key: "password") } catch {}
  1020. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  1021. XCTAssertNil(try! Keychain(service: service_1).get("password"), "not stored password")
  1022. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  1023. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  1024. do { try Keychain(service: service_1).set(password_1, key: "password") } catch {}
  1025. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  1026. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  1027. XCTAssertNil(try! Keychain(service: service_2).get("password"), "not stored password")
  1028. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  1029. do { try Keychain(service: service_2).set(password_2, key: "password") } catch {}
  1030. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  1031. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  1032. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "stored password")
  1033. XCTAssertNil(try! Keychain(service: service_3).get("password"), "not stored password")
  1034. do { try Keychain(service: service_3).set(password_3, key: "password") } catch {}
  1035. XCTAssertEqual(try! Keychain().get("password"), password_1, "stored password")
  1036. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "stored password")
  1037. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "stored password")
  1038. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "stored password")
  1039. do { try Keychain().remove("username") } catch {}
  1040. XCTAssertNil(try! Keychain().get("username"), "removed username")
  1041. XCTAssertEqual(try! Keychain(service: service_1).get("username"), username_1, "left username")
  1042. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "left username")
  1043. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  1044. do { try Keychain(service: service_1).remove("username") } catch {}
  1045. XCTAssertNil(try! Keychain().get("username"), "removed username")
  1046. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  1047. XCTAssertEqual(try! Keychain(service: service_2).get("username"), username_2, "left username")
  1048. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  1049. do { try Keychain(service: service_2).remove("username") } catch {}
  1050. XCTAssertNil(try! Keychain().get("username"), "removed username")
  1051. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  1052. XCTAssertNil(try! Keychain(service: service_2).get("username"), "removed username")
  1053. XCTAssertEqual(try! Keychain(service: service_3).get("username"), username_3, "left username")
  1054. do { try Keychain(service: service_3).remove("username") } catch {}
  1055. XCTAssertNil(try! Keychain().get("username"), "removed username")
  1056. XCTAssertNil(try! Keychain(service: service_1).get("username"), "removed username")
  1057. XCTAssertNil(try! Keychain(service: service_2).get("username"), "removed username")
  1058. XCTAssertNil(try! Keychain(service: service_3).get("username"), "removed username")
  1059. do { try Keychain().remove("password") } catch {}
  1060. XCTAssertNil(try! Keychain().get("password"), "removed password")
  1061. XCTAssertEqual(try! Keychain(service: service_1).get("password"), password_1, "left password")
  1062. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "left password")
  1063. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  1064. do { try Keychain(service: service_1).remove("password") } catch {}
  1065. XCTAssertNil(try! Keychain().get("password"), "removed password")
  1066. XCTAssertNil(try! Keychain(service: service_1).get("password"), "removed password")
  1067. XCTAssertEqual(try! Keychain(service: service_2).get("password"), password_2, "left password")
  1068. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  1069. do { try Keychain(service: service_2).remove("password") } catch {}
  1070. XCTAssertNil(try! Keychain().get("password"), "removed password")
  1071. XCTAssertNil(try! Keychain(service: service_1).get("password"), "removed password")
  1072. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  1073. XCTAssertEqual(try! Keychain(service: service_3).get("password"), password_3, "left password")
  1074. do { try Keychain(service: service_3).remove("password") } catch {}
  1075. XCTAssertNil(try! Keychain().get("password"), "removed password")
  1076. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  1077. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  1078. XCTAssertNil(try! Keychain(service: service_2).get("password"), "removed password")
  1079. }
  1080. // MARK:
  1081. func testProperties() {
  1082. guard #available(OSX 10.10, *) else {
  1083. return
  1084. }
  1085. let keychain = Keychain()
  1086. XCTAssertEqual(keychain.synchronizable, false)
  1087. XCTAssertEqual(keychain.synchronizable(true).synchronizable, true)
  1088. XCTAssertEqual(keychain.synchronizable(false).synchronizable, false)
  1089. XCTAssertEqual(keychain.accessibility(.afterFirstUnlock).accessibility, Accessibility.afterFirstUnlock)
  1090. XCTAssertEqual(keychain.accessibility(.whenPasscodeSetThisDeviceOnly, authenticationPolicy: .userPresence).accessibility, Accessibility.whenPasscodeSetThisDeviceOnly)
  1091. XCTAssertEqual(keychain.accessibility(.whenPasscodeSetThisDeviceOnly, authenticationPolicy: .userPresence).authenticationPolicy, AuthenticationPolicy.userPresence)
  1092. XCTAssertNil(keychain.label)
  1093. XCTAssertEqual(keychain.label("Label").label, "Label")
  1094. XCTAssertNil(keychain.comment)
  1095. XCTAssertEqual(keychain.comment("Comment").comment, "Comment")
  1096. XCTAssertEqual(keychain.authenticationPrompt("Prompt").authenticationPrompt, "Prompt")
  1097. }
  1098. // MARK:
  1099. func testAllKeys() {
  1100. do {
  1101. let keychain = Keychain()
  1102. keychain["key1"] = "value1"
  1103. keychain["key2"] = "value2"
  1104. keychain["key3"] = "value3"
  1105. let allKeys = keychain.allKeys()
  1106. XCTAssertEqual(allKeys.count, 3)
  1107. XCTAssertEqual(allKeys.sorted(), ["key1", "key2", "key3"])
  1108. let allItems = keychain.allItems()
  1109. XCTAssertEqual(allItems.count, 3)
  1110. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  1111. let key1 = item1["key"] as! String
  1112. let key2 = item2["key"] as! String
  1113. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  1114. }
  1115. #if !os(OSX)
  1116. let service: String
  1117. let accessGroup: String
  1118. #if targetEnvironment(macCatalyst)
  1119. service = "maccatalyst.com.kishikawakatsumi.KeychainAccess.TestHost-MacCatalyst"
  1120. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost-MacCatalyst"
  1121. #else
  1122. service = "com.kishikawakatsumi.KeychainAccess.TestHost"
  1123. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost"
  1124. #endif
  1125. XCTAssertEqual(sortedItems[0]["accessGroup"] as? String, accessGroup)
  1126. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "false")
  1127. XCTAssertEqual(sortedItems[0]["service"] as? String, service)
  1128. XCTAssertEqual(sortedItems[0]["value"] as? String, "value1")
  1129. XCTAssertEqual(sortedItems[0]["key"] as? String, "key1")
  1130. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  1131. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "AfterFirstUnlock")
  1132. XCTAssertEqual(sortedItems[1]["accessGroup"] as? String, accessGroup)
  1133. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "false")
  1134. XCTAssertEqual(sortedItems[1]["service"] as? String, service)
  1135. XCTAssertEqual(sortedItems[1]["value"] as? String, "value2")
  1136. XCTAssertEqual(sortedItems[1]["key"] as? String, "key2")
  1137. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  1138. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "AfterFirstUnlock")
  1139. XCTAssertEqual(sortedItems[2]["accessGroup"] as? String, accessGroup)
  1140. XCTAssertEqual(sortedItems[2]["synchronizable"] as? String, "false")
  1141. XCTAssertEqual(sortedItems[2]["service"] as? String, service)
  1142. XCTAssertEqual(sortedItems[2]["value"] as? String, "value3")
  1143. XCTAssertEqual(sortedItems[2]["key"] as? String, "key3")
  1144. XCTAssertEqual(sortedItems[2]["class"] as? String, "GenericPassword")
  1145. XCTAssertEqual(sortedItems[2]["accessibility"] as? String, "AfterFirstUnlock")
  1146. #else
  1147. XCTAssertEqual(sortedItems[0]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1148. XCTAssertEqual(sortedItems[0]["key"] as? String, "key1")
  1149. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  1150. XCTAssertEqual(sortedItems[1]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1151. XCTAssertEqual(sortedItems[1]["key"] as? String, "key2")
  1152. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  1153. XCTAssertEqual(sortedItems[2]["service"] as? String, "com.kishikawakatsumi.KeychainAccess.TestHost")
  1154. XCTAssertEqual(sortedItems[2]["key"] as? String, "key3")
  1155. XCTAssertEqual(sortedItems[2]["class"] as? String, "GenericPassword")
  1156. #endif
  1157. }
  1158. do {
  1159. let keychain = Keychain(service: "service1")
  1160. try! keychain
  1161. .synchronizable(true)
  1162. .accessibility(.whenUnlockedThisDeviceOnly)
  1163. .set("service1_value1", key: "service1_key1")
  1164. try! keychain
  1165. .synchronizable(false)
  1166. .accessibility(.afterFirstUnlockThisDeviceOnly)
  1167. .set("service1_value2", key: "service1_key2")
  1168. let allKeys = keychain.allKeys()
  1169. XCTAssertEqual(allKeys.count, 2)
  1170. XCTAssertEqual(allKeys.sorted(), ["service1_key1", "service1_key2"])
  1171. let allItems = keychain.allItems()
  1172. XCTAssertEqual(allItems.count, 2)
  1173. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  1174. let key1 = item1["key"] as! String
  1175. let key2 = item2["key"] as! String
  1176. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  1177. }
  1178. #if !os(OSX)
  1179. let accessGroup: String
  1180. #if targetEnvironment(macCatalyst)
  1181. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost-MacCatalyst"
  1182. #else
  1183. accessGroup = "27AEDK3C9F.com.kishikawakatsumi.KeychainAccess.TestHost"
  1184. #endif
  1185. XCTAssertEqual(sortedItems[0]["accessGroup"] as? String, accessGroup)
  1186. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "true")
  1187. XCTAssertEqual(sortedItems[0]["service"] as? String, "service1")
  1188. XCTAssertEqual(sortedItems[0]["value"] as? String, "service1_value1")
  1189. XCTAssertEqual(sortedItems[0]["key"] as? String, "service1_key1")
  1190. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  1191. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "WhenUnlockedThisDeviceOnly")
  1192. XCTAssertEqual(sortedItems[1]["accessGroup"] as? String, accessGroup)
  1193. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "false")
  1194. XCTAssertEqual(sortedItems[1]["service"] as? String, "service1")
  1195. XCTAssertEqual(sortedItems[1]["value"] as? String, "service1_value2")
  1196. XCTAssertEqual(sortedItems[1]["key"] as? String, "service1_key2")
  1197. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  1198. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "AfterFirstUnlockThisDeviceOnly")
  1199. #else
  1200. XCTAssertEqual(sortedItems[0]["service"] as? String, "service1")
  1201. XCTAssertEqual(sortedItems[0]["key"] as? String, "service1_key1")
  1202. XCTAssertEqual(sortedItems[0]["class"] as? String, "GenericPassword")
  1203. XCTAssertEqual(sortedItems[1]["service"] as? String, "service1")
  1204. XCTAssertEqual(sortedItems[1]["key"] as? String, "service1_key2")
  1205. XCTAssertEqual(sortedItems[1]["class"] as? String, "GenericPassword")
  1206. #endif
  1207. }
  1208. do {
  1209. let keychain = Keychain(server: "https://google.com", protocolType: .https)
  1210. #if !targetEnvironment(macCatalyst)
  1211. try! keychain
  1212. .synchronizable(false)
  1213. .accessibility(.alwaysThisDeviceOnly)
  1214. .set("google.com_value1", key: "google.com_key1")
  1215. #else
  1216. try! keychain
  1217. .synchronizable(false)
  1218. .accessibility(.afterFirstUnlockThisDeviceOnly)
  1219. .set("google.com_value1", key: "google.com_key1")
  1220. #endif
  1221. #if !targetEnvironment(macCatalyst)
  1222. try! keychain
  1223. .synchronizable(true)
  1224. .accessibility(.always)
  1225. .set("google.com_value2", key: "google.com_key2")
  1226. #else
  1227. try! keychain
  1228. .synchronizable(true)
  1229. .accessibility(.afterFirstUnlock)
  1230. .set("google.com_value2", key: "google.com_key2")
  1231. #endif
  1232. let allKeys = keychain.allKeys()
  1233. XCTAssertEqual(allKeys.count, 2)
  1234. XCTAssertEqual(allKeys.sorted(), ["google.com_key1", "google.com_key2"])
  1235. let allItems = keychain.allItems()
  1236. XCTAssertEqual(allItems.count, 2)
  1237. let sortedItems = allItems.sorted { (item1, item2) -> Bool in
  1238. let key1 = item1["key"] as! String
  1239. let key2 = item2["key"] as! String
  1240. return key1.compare(key2) == .orderedAscending || key1.compare(key2) == .orderedSame
  1241. }
  1242. #if !os(OSX)
  1243. XCTAssertEqual(sortedItems[0]["synchronizable"] as? String, "false")
  1244. XCTAssertEqual(sortedItems[0]["value"] as? String, "google.com_value1")
  1245. XCTAssertEqual(sortedItems[0]["key"] as? String, "google.com_key1")
  1246. XCTAssertEqual(sortedItems[0]["server"] as? String, "google.com")
  1247. XCTAssertEqual(sortedItems[0]["class"] as? String, "InternetPassword")
  1248. XCTAssertEqual(sortedItems[0]["authenticationType"] as? String, "Default")
  1249. XCTAssertEqual(sortedItems[0]["protocol"] as? String, "HTTPS")
  1250. #if targetEnvironment(macCatalyst)
  1251. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "AfterFirstUnlockThisDeviceOnly")
  1252. #else
  1253. XCTAssertEqual(sortedItems[0]["accessibility"] as? String, "AlwaysThisDeviceOnly")
  1254. #endif
  1255. XCTAssertEqual(sortedItems[1]["synchronizable"] as? String, "true")
  1256. XCTAssertEqual(sortedItems[1]["value"] as? String, "google.com_value2")
  1257. XCTAssertEqual(sortedItems[1]["key"] as? String, "google.com_key2")
  1258. XCTAssertEqual(sortedItems[1]["server"] as? String, "google.com")
  1259. XCTAssertEqual(sortedItems[1]["class"] as? String, "InternetPassword")
  1260. XCTAssertEqual(sortedItems[1]["authenticationType"] as? String, "Default")
  1261. XCTAssertEqual(sortedItems[1]["protocol"] as? String, "HTTPS")
  1262. #if targetEnvironment(macCatalyst)
  1263. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "AfterFirstUnlock")
  1264. #else
  1265. XCTAssertEqual(sortedItems[1]["accessibility"] as? String, "Always")
  1266. #endif
  1267. #else
  1268. XCTAssertEqual(sortedItems[0]["key"] as? String, "google.com_key1")
  1269. XCTAssertEqual(sortedItems[0]["server"] as? String, "google.com")
  1270. XCTAssertEqual(sortedItems[0]["class"] as? String, "InternetPassword")
  1271. XCTAssertEqual(sortedItems[0]["authenticationType"] as? String, "Default")
  1272. XCTAssertEqual(sortedItems[0]["protocol"] as? String, "HTTPS")
  1273. XCTAssertEqual(sortedItems[1]["key"] as? String, "google.com_key2")
  1274. XCTAssertEqual(sortedItems[1]["server"] as? String, "google.com")
  1275. XCTAssertEqual(sortedItems[1]["class"] as? String, "InternetPassword")
  1276. XCTAssertEqual(sortedItems[1]["authenticationType"] as? String, "Default")
  1277. XCTAssertEqual(sortedItems[1]["protocol"] as? String, "HTTPS")
  1278. #endif
  1279. }
  1280. #if !os(OSX)
  1281. do {
  1282. let allKeys = Keychain.allKeys(.genericPassword)
  1283. XCTAssertEqual(allKeys.count, 5)
  1284. let sortedKeys = allKeys.sorted { (key1, key2) -> Bool in
  1285. return key1.1.compare(key2.1) == .orderedAscending || key1.1.compare(key2.1) == .orderedSame
  1286. }
  1287. let service: String
  1288. #if targetEnvironment(macCatalyst)
  1289. service = "maccatalyst.com.kishikawakatsumi.KeychainAccess.TestHost-MacCatalyst"
  1290. #else
  1291. service = "com.kishikawakatsumi.KeychainAccess.TestHost"
  1292. #endif
  1293. XCTAssertEqual(sortedKeys[0].0, service)
  1294. XCTAssertEqual(sortedKeys[0].1, "key1")
  1295. XCTAssertEqual(sortedKeys[1].0, service)
  1296. XCTAssertEqual(sortedKeys[1].1, "key2")
  1297. XCTAssertEqual(sortedKeys[2].0, service)
  1298. XCTAssertEqual(sortedKeys[2].1, "key3")
  1299. XCTAssertEqual(sortedKeys[3].0, "service1")
  1300. XCTAssertEqual(sortedKeys[3].1, "service1_key1")
  1301. XCTAssertEqual(sortedKeys[4].0, "service1")
  1302. XCTAssertEqual(sortedKeys[4].1, "service1_key2")
  1303. }
  1304. do {
  1305. let allKeys = Keychain.allKeys(.internetPassword)
  1306. XCTAssertEqual(allKeys.count, 2)
  1307. let sortedKeys = allKeys.sorted { (key1, key2) -> Bool in
  1308. return key1.1.compare(key2.1) == .orderedAscending || key1.1.compare(key2.1) == .orderedSame
  1309. }
  1310. XCTAssertEqual(sortedKeys[0].0, "google.com")
  1311. XCTAssertEqual(sortedKeys[0].1, "google.com_key1")
  1312. XCTAssertEqual(sortedKeys[1].0, "google.com")
  1313. XCTAssertEqual(sortedKeys[1].1, "google.com_key2")
  1314. }
  1315. #endif
  1316. }
  1317. func testDescription() {
  1318. do {
  1319. let keychain = Keychain()
  1320. XCTAssertEqual(keychain.description, "[]")
  1321. XCTAssertEqual(keychain.debugDescription, "[]")
  1322. }
  1323. }
  1324. // MARK:
  1325. func testAuthenticationPolicy() {
  1326. guard #available(iOS 9.0, OSX 10.11, *) else {
  1327. return
  1328. }
  1329. do {
  1330. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1331. let policy: AuthenticationPolicy = [.userPresence]
  1332. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1333. var error: Unmanaged<CFError>?
  1334. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1335. XCTAssertNil(error)
  1336. XCTAssertNotNil(accessControl)
  1337. }
  1338. #if os(iOS)
  1339. do {
  1340. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1341. let policy: AuthenticationPolicy = [.userPresence, .applicationPassword]
  1342. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1343. var error: Unmanaged<CFError>?
  1344. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1345. XCTAssertNil(error)
  1346. XCTAssertNotNil(accessControl)
  1347. }
  1348. do {
  1349. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1350. let policy: AuthenticationPolicy = [.userPresence, .applicationPassword, .privateKeyUsage]
  1351. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1352. var error: Unmanaged<CFError>?
  1353. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1354. XCTAssertNil(error)
  1355. XCTAssertNotNil(accessControl)
  1356. }
  1357. do {
  1358. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1359. let policy: AuthenticationPolicy = [.applicationPassword]
  1360. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1361. var error: Unmanaged<CFError>?
  1362. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1363. XCTAssertNil(error)
  1364. XCTAssertNotNil(accessControl)
  1365. }
  1366. do {
  1367. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1368. let policy: AuthenticationPolicy = [.applicationPassword, .privateKeyUsage]
  1369. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1370. var error: Unmanaged<CFError>?
  1371. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1372. XCTAssertNil(error)
  1373. XCTAssertNotNil(accessControl)
  1374. }
  1375. do {
  1376. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1377. let policy: AuthenticationPolicy = [.privateKeyUsage]
  1378. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1379. var error: Unmanaged<CFError>?
  1380. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1381. XCTAssertNil(error)
  1382. XCTAssertNotNil(accessControl)
  1383. }
  1384. do {
  1385. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1386. let policy: AuthenticationPolicy = [.touchIDAny]
  1387. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1388. var error: Unmanaged<CFError>?
  1389. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1390. XCTAssertNil(error)
  1391. XCTAssertNotNil(accessControl)
  1392. }
  1393. do {
  1394. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1395. let policy: AuthenticationPolicy = [.touchIDAny, .devicePasscode]
  1396. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1397. var error: Unmanaged<CFError>?
  1398. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1399. XCTAssertNil(error)
  1400. XCTAssertTrue(accessControl != nil)
  1401. }
  1402. do {
  1403. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1404. let policy: AuthenticationPolicy = [.touchIDAny, .applicationPassword]
  1405. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1406. var error: Unmanaged<CFError>?
  1407. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1408. XCTAssertNil(error)
  1409. XCTAssertNotNil(accessControl)
  1410. }
  1411. do {
  1412. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1413. let policy: AuthenticationPolicy = [.touchIDAny, .applicationPassword, .privateKeyUsage]
  1414. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1415. var error: Unmanaged<CFError>?
  1416. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1417. XCTAssertNil(error)
  1418. XCTAssertNotNil(accessControl)
  1419. }
  1420. do {
  1421. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1422. let policy: AuthenticationPolicy = [.touchIDCurrentSet]
  1423. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1424. var error: Unmanaged<CFError>?
  1425. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1426. XCTAssertNil(error)
  1427. XCTAssertNotNil(accessControl)
  1428. }
  1429. do {
  1430. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1431. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .devicePasscode]
  1432. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1433. var error: Unmanaged<CFError>?
  1434. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1435. XCTAssertNil(error)
  1436. XCTAssertTrue(accessControl != nil)
  1437. }
  1438. do {
  1439. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1440. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .applicationPassword]
  1441. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1442. var error: Unmanaged<CFError>?
  1443. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1444. XCTAssertNil(error)
  1445. XCTAssertNotNil(accessControl)
  1446. }
  1447. do {
  1448. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1449. let policy: AuthenticationPolicy = [.touchIDCurrentSet, .applicationPassword, .privateKeyUsage]
  1450. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1451. var error: Unmanaged<CFError>?
  1452. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1453. XCTAssertNil(error)
  1454. XCTAssertNotNil(accessControl)
  1455. }
  1456. do {
  1457. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1458. let policy: AuthenticationPolicy = [.touchIDAny, .or, .devicePasscode]
  1459. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1460. var error: Unmanaged<CFError>?
  1461. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1462. XCTAssertNil(error)
  1463. XCTAssertTrue(accessControl != nil)
  1464. }
  1465. do {
  1466. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1467. let policy: AuthenticationPolicy = [.touchIDAny, .and, .devicePasscode]
  1468. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1469. var error: Unmanaged<CFError>?
  1470. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1471. XCTAssertNil(error)
  1472. XCTAssertTrue(accessControl != nil)
  1473. }
  1474. #endif
  1475. #if os(OSX)
  1476. do {
  1477. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1478. let policy: AuthenticationPolicy = [.userPresence]
  1479. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1480. var error: Unmanaged<CFError>?
  1481. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1482. XCTAssertNil(error)
  1483. XCTAssertNotNil(accessControl)
  1484. }
  1485. do {
  1486. let accessibility: Accessibility = .whenPasscodeSetThisDeviceOnly
  1487. let policy: AuthenticationPolicy = [.devicePasscode]
  1488. let flags = SecAccessControlCreateFlags(rawValue: policy.rawValue)
  1489. var error: Unmanaged<CFError>?
  1490. let accessControl = SecAccessControlCreateWithFlags(kCFAllocatorDefault, accessibility.rawValue as CFTypeRef, flags, &error)
  1491. XCTAssertNil(error)
  1492. XCTAssertNotNil(accessControl)
  1493. }
  1494. #endif
  1495. }
  1496. func testIgnoringAttributeSynchronizable() {
  1497. let keychain = Keychain(service: "Twitter").synchronizable(false)
  1498. let keychainSynchronizable = Keychain(service: "Twitter").synchronizable(true)
  1499. XCTAssertNil(try! keychain.get("username", ignoringAttributeSynchronizable: false), "not stored username")
  1500. XCTAssertNil(try! keychain.get("password", ignoringAttributeSynchronizable: false), "not stored password")
  1501. XCTAssertNil(try! keychainSynchronizable.get("username", ignoringAttributeSynchronizable: false), "not stored username")
  1502. XCTAssertNil(try! keychainSynchronizable.get("password", ignoringAttributeSynchronizable: false), "not stored password")
  1503. do { try keychain.set("kishikawakatsumi", key: "username", ignoringAttributeSynchronizable: false) } catch {}
  1504. do { try keychainSynchronizable.set("kishikawakatsumi_synchronizable", key: "username", ignoringAttributeSynchronizable: false) } catch {}
  1505. XCTAssertEqual(try! keychain.get("username", ignoringAttributeSynchronizable: false), "kishikawakatsumi", "stored username")
  1506. XCTAssertEqual(try! keychainSynchronizable.get("username", ignoringAttributeSynchronizable: false), "kishikawakatsumi_synchronizable", "stored username")
  1507. XCTAssertNil(try! keychain.get("password", ignoringAttributeSynchronizable: false), "not stored password")
  1508. XCTAssertNil(try! keychainSynchronizable.get("password", ignoringAttributeSynchronizable: false), "not stored password")
  1509. do { try keychain.set("password1234", key: "password", ignoringAttributeSynchronizable: false) } catch {}
  1510. do { try keychainSynchronizable.set("password1234_synchronizable", key: "password", ignoringAttributeSynchronizable: false) } catch {}
  1511. XCTAssertEqual(try! keychain.get("username", ignoringAttributeSynchronizable: false), "kishikawakatsumi", "stored username")
  1512. XCTAssertEqual(try! keychainSynchronizable.get("username", ignoringAttributeSynchronizable: false), "kishikawakatsumi_synchronizable", "stored username")
  1513. XCTAssertEqual(try! keychain.get("password", ignoringAttributeSynchronizable: false), "password1234", "stored password")
  1514. XCTAssertEqual(try! keychainSynchronizable.get("password", ignoringAttributeSynchronizable: false), "password1234_synchronizable", "stored password")
  1515. do { try keychain.remove("username", ignoringAttributeSynchronizable: false) } catch {}
  1516. XCTAssertNil(try! keychain.get("username", ignoringAttributeSynchronizable: false), "not stored username")
  1517. XCTAssertEqual(try! keychainSynchronizable.get("username", ignoringAttributeSynchronizable: false), "kishikawakatsumi_synchronizable", "stored username")
  1518. do { try keychainSynchronizable.remove("username", ignoringAttributeSynchronizable: false) } catch {}
  1519. XCTAssertNil(try! keychain.get("username", ignoringAttributeSynchronizable: false), "not stored username")
  1520. XCTAssertNil(try! keychainSynchronizable.get("username", ignoringAttributeSynchronizable: false), "not stored username")
  1521. XCTAssertEqual(try! keychain.get("password", ignoringAttributeSynchronizable: false), "password1234", "stored password")
  1522. XCTAssertEqual(try! keychainSynchronizable.get("password", ignoringAttributeSynchronizable: false), "password1234_synchronizable", "stored password")
  1523. do { try keychain.removeAll() } catch {}
  1524. XCTAssertNil(try! keychain.get("username", ignoringAttributeSynchronizable: false), "not stored username")
  1525. XCTAssertNil(try! keychainSynchronizable.get("username", ignoringAttributeSynchronizable: false), "not stored username")
  1526. XCTAssertNil(try! keychain.get("password", ignoringAttributeSynchronizable: false), "not stored password")
  1527. XCTAssertNil(try! keychainSynchronizable.get("password", ignoringAttributeSynchronizable: false), "not stored password")
  1528. }
  1529. func testIgnoringAttributeSynchronizableBackwardCompatibility() {
  1530. let keychain = Keychain(service: "Twitter").synchronizable(false)
  1531. let keychainSynchronizable = Keychain(service: "Twitter").synchronizable(true)
  1532. XCTAssertNil(try! keychain.get("username"), "not stored username")
  1533. XCTAssertNil(try! keychain.get("password"), "not stored password")
  1534. XCTAssertNil(try! keychainSynchronizable.get("username"), "not stored username")
  1535. XCTAssertNil(try! keychainSynchronizable.get("password"), "not stored password")
  1536. do { try keychain.set("kishikawakatsumi", key: "username") } catch {}
  1537. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi", "stored username")
  1538. XCTAssertEqual(try! keychainSynchronizable.get("username"), "kishikawakatsumi", "stored username")
  1539. do { try keychainSynchronizable.set("kishikawakatsumi_synchronizable", key: "username") } catch {}
  1540. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi_synchronizable", "stored username")
  1541. XCTAssertEqual(try! keychainSynchronizable.get("username"), "kishikawakatsumi_synchronizable", "stored username")
  1542. XCTAssertNil(try! keychain.get("password"), "not stored password")
  1543. XCTAssertNil(try! keychainSynchronizable.get("password"), "not stored password")
  1544. do { try keychain.set("password1234", key: "password") } catch {}
  1545. XCTAssertEqual(try! keychain.get("password"), "password1234", "stored password")
  1546. XCTAssertEqual(try! keychainSynchronizable.get("password"), "password1234", "stored password")
  1547. do { try keychainSynchronizable.set("password1234_synchronizable", key: "password") } catch {}
  1548. XCTAssertEqual(try! keychain.get("username"), "kishikawakatsumi_synchronizable", "stored username")
  1549. XCTAssertEqual(try! keychainSynchronizable.get("username"), "kishikawakatsumi_synchronizable", "stored username")
  1550. XCTAssertEqual(try! keychain.get("password"), "password1234_synchronizable", "stored password")
  1551. XCTAssertEqual(try! keychainSynchronizable.get("password"), "password1234_synchronizable", "stored password")
  1552. do { try keychain.remove("username") } catch {}
  1553. XCTAssertNil(try! keychain.get("username"), "not stored username")
  1554. XCTAssertNil(try! keychainSynchronizable.get("username"), "not stored username")
  1555. XCTAssertEqual(try! keychain.get("password"), "password1234_synchronizable", "stored password")
  1556. XCTAssertEqual(try! keychainSynchronizable.get("password"), "password1234_synchronizable", "stored password")
  1557. do { try keychain.removeAll() } catch {}
  1558. XCTAssertNil(try! keychain.get("username"), "not stored username")
  1559. XCTAssertNil(try! keychainSynchronizable.get("username"), "not stored username")
  1560. XCTAssertNil(try! keychain.get("password"), "not stored password")
  1561. XCTAssertNil(try! keychainSynchronizable.get("password"), "not stored password")
  1562. }
  1563. }