1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
use crate::error::Result;
use security_framework::os::macos::keychain::SecKeychain;
use security_framework::os::macos::passwords::find_generic_password;
use std::path::Path;
pub struct Keyring<'a> {
service: &'a str,
username: &'a str,
path: Option<&'a Path>
}
impl<'a> Keyring<'a> {
pub fn new(service: &'a str, username: &'a str) -> Keyring<'a> {
Keyring { service, username, path: None }
}
#[cfg(feature = "macos-specify-keychain")]
pub fn use_keychain(service: &'a str, username: &'a str, path: &'a Path) -> Keyring<'a> {
Keyring { service, username, path: Some(path) }
}
fn get_keychain(&self) -> security_framework::base::Result<SecKeychain> {
match self.path {
Some(path) => SecKeychain::open(path),
_ => SecKeychain::default()
}
}
pub fn set_password(&self, password: &str) -> Result<()> {
self.get_keychain()?.set_generic_password(
self.service,
self.username,
password.as_bytes(),
)?;
Ok(())
}
pub fn get_password(&self) -> Result<String> {
let (password_bytes, _) = find_generic_password(Some(&[self.get_keychain()?]), self.service, self.username)?;
let password = String::from_utf8(password_bytes.to_vec())?;
Ok(password)
}
pub fn delete_password(&self) -> Result<()> {
let (_, item) = find_generic_password(Some(&[self.get_keychain()?]), self.service, self.username)?;
item.delete();
Ok(())
}
}
#[cfg(test)]
mod test {
use super::*;
use keychain_services::keychain::Keychain;
use security_framework::os::macos::keychain;
use tempfile::{tempdir, TempDir};
#[test]
fn test_basic() {
let password_1 = "大根";
let password_2 = "0xE5A4A7E6A0B9";
let keyring = Keyring::new("testservice", "testuser");
keyring.set_password(password_1).unwrap();
let res_1 = keyring.get_password().unwrap();
println!("{}:{}", res_1, password_1);
assert_eq!(res_1, password_1);
keyring.set_password(password_2).unwrap();
let res_2 = keyring.get_password().unwrap();
println!("{}:{}", res_2, password_2);
assert_eq!(res_2, password_2);
keyring.delete_password().unwrap();
}
#[test]
#[ignore]
#[cfg(feature = "macos-specify-keychain")]
fn test_basic_with_features() {
let password_1 = "大根";
let password_2 = "0xE5A4A7E6A0B9";
let dir = tempdir().unwrap();
let temp_keychain_path = dir.path().join("Temporary.keychain");
dbg!(&temp_keychain_path);
let temp_keychain = keychain::CreateOptions::new();
temp_keychain.create(&temp_keychain_path).expect("Could not create temp keychain");
let keyring = Keyring::use_keychain("testservice", "testuser", &temp_keychain_path);
keyring.set_password(password_1).unwrap();
let res_1 = keyring.get_password().unwrap();
println!("{}:{}", res_1, password_1);
assert_eq!(res_1, password_1);
keyring.set_password(password_2).unwrap();
let res_2 = keyring.get_password().unwrap();
println!("{}:{}", res_2, password_2);
assert_eq!(res_2, password_2);
keyring.delete_password().unwrap();
}
}