179 lines
6.7 KiB
Swift
179 lines
6.7 KiB
Swift
|
/*
|
|||
|
Copyright (C) 2016 Apple Inc. All Rights Reserved.
|
|||
|
See LICENSE.txt for this sample’s licensing information
|
|||
|
|
|||
|
Abstract:
|
|||
|
A struct for accessing generic password keychain items.
|
|||
|
*/
|
|||
|
|
|||
|
import Foundation
|
|||
|
|
|||
|
struct KeychainPasswordItem {
|
|||
|
// MARK: Types
|
|||
|
|
|||
|
enum KeychainError: Error {
|
|||
|
case noPassword
|
|||
|
case unexpectedPasswordData
|
|||
|
case unexpectedItemData
|
|||
|
case unhandledError(status: OSStatus)
|
|||
|
}
|
|||
|
|
|||
|
// MARK: Properties
|
|||
|
|
|||
|
let service: String
|
|||
|
|
|||
|
private(set) var account: String
|
|||
|
|
|||
|
let accessGroup: String?
|
|||
|
|
|||
|
// MARK: Intialization
|
|||
|
|
|||
|
init(service: String, account: String, accessGroup: String? = nil) {
|
|||
|
self.service = service
|
|||
|
self.account = account
|
|||
|
self.accessGroup = accessGroup
|
|||
|
}
|
|||
|
|
|||
|
// MARK: Keychain access
|
|||
|
|
|||
|
func readPassword() throws -> String {
|
|||
|
/*
|
|||
|
Build a query to find the item that matches the service, account and
|
|||
|
access group.
|
|||
|
*/
|
|||
|
var query = KeychainPasswordItem.keychainQuery(withService: service, account: account, accessGroup: accessGroup)
|
|||
|
query[kSecMatchLimit as String] = kSecMatchLimitOne
|
|||
|
query[kSecReturnAttributes as String] = kCFBooleanTrue
|
|||
|
query[kSecReturnData as String] = kCFBooleanTrue
|
|||
|
|
|||
|
// Try to fetch the existing keychain item that matches the query.
|
|||
|
var queryResult: AnyObject?
|
|||
|
let status = withUnsafeMutablePointer(to: &queryResult) {
|
|||
|
SecItemCopyMatching(query as CFDictionary, UnsafeMutablePointer($0))
|
|||
|
}
|
|||
|
|
|||
|
// Check the return status and throw an error if appropriate.
|
|||
|
guard status != errSecItemNotFound else { throw KeychainError.noPassword }
|
|||
|
guard status == noErr else { throw KeychainError.unhandledError(status: status) }
|
|||
|
|
|||
|
// Parse the password string from the query result.
|
|||
|
guard let existingItem = queryResult as? [String : AnyObject],
|
|||
|
let passwordData = existingItem[kSecValueData as String] as? Data,
|
|||
|
let password = String(data: passwordData, encoding: String.Encoding.utf8)
|
|||
|
else {
|
|||
|
throw KeychainError.unexpectedPasswordData
|
|||
|
}
|
|||
|
|
|||
|
return password
|
|||
|
}
|
|||
|
|
|||
|
func savePassword(_ password: String) throws {
|
|||
|
// Encode the password into an Data object.
|
|||
|
let encodedPassword = password.data(using: String.Encoding.utf8)!
|
|||
|
|
|||
|
do {
|
|||
|
// Check for an existing item in the keychain.
|
|||
|
try _ = readPassword()
|
|||
|
|
|||
|
// Update the existing item with the new password.
|
|||
|
var attributesToUpdate = [String : AnyObject]()
|
|||
|
attributesToUpdate[kSecValueData as String] = encodedPassword as AnyObject?
|
|||
|
|
|||
|
let query = KeychainPasswordItem.keychainQuery(withService: service, account: account, accessGroup: accessGroup)
|
|||
|
let status = SecItemUpdate(query as CFDictionary, attributesToUpdate as CFDictionary)
|
|||
|
|
|||
|
// Throw an error if an unexpected status was returned.
|
|||
|
guard status == noErr else { throw KeychainError.unhandledError(status: status) }
|
|||
|
}
|
|||
|
catch KeychainError.noPassword {
|
|||
|
/*
|
|||
|
No password was found in the keychain. Create a dictionary to save
|
|||
|
as a new keychain item.
|
|||
|
*/
|
|||
|
var newItem = KeychainPasswordItem.keychainQuery(withService: service, account: account, accessGroup: accessGroup)
|
|||
|
newItem[kSecValueData as String] = encodedPassword as AnyObject?
|
|||
|
|
|||
|
// Add a the new item to the keychain.
|
|||
|
let status = SecItemAdd(newItem as CFDictionary, nil)
|
|||
|
|
|||
|
// Throw an error if an unexpected status was returned.
|
|||
|
guard status == noErr else { throw KeychainError.unhandledError(status: status) }
|
|||
|
}
|
|||
|
}
|
|||
|
|
|||
|
mutating func renameAccount(_ newAccountName: String) throws {
|
|||
|
// Try to update an existing item with the new account name.
|
|||
|
var attributesToUpdate = [String : AnyObject]()
|
|||
|
attributesToUpdate[kSecAttrAccount as String] = newAccountName as AnyObject?
|
|||
|
|
|||
|
let query = KeychainPasswordItem.keychainQuery(withService: service, account: self.account, accessGroup: accessGroup)
|
|||
|
let status = SecItemUpdate(query as CFDictionary, attributesToUpdate as CFDictionary)
|
|||
|
|
|||
|
// Throw an error if an unexpected status was returned.
|
|||
|
guard status == noErr || status == errSecItemNotFound else { throw KeychainError.unhandledError(status: status) }
|
|||
|
|
|||
|
self.account = newAccountName
|
|||
|
}
|
|||
|
|
|||
|
func deleteItem() throws {
|
|||
|
// Delete the existing item from the keychain.
|
|||
|
let query = KeychainPasswordItem.keychainQuery(withService: service, account: account, accessGroup: accessGroup)
|
|||
|
let status = SecItemDelete(query as CFDictionary)
|
|||
|
|
|||
|
// Throw an error if an unexpected status was returned.
|
|||
|
guard status == noErr || status == errSecItemNotFound else { throw KeychainError.unhandledError(status: status) }
|
|||
|
}
|
|||
|
|
|||
|
static func passwordItems(forService service: String, accessGroup: String? = nil) throws -> [KeychainPasswordItem] {
|
|||
|
// Build a query for all items that match the service and access group.
|
|||
|
var query = KeychainPasswordItem.keychainQuery(withService: service, accessGroup: accessGroup)
|
|||
|
query[kSecMatchLimit as String] = kSecMatchLimitAll
|
|||
|
query[kSecReturnAttributes as String] = kCFBooleanTrue
|
|||
|
query[kSecReturnData as String] = kCFBooleanFalse
|
|||
|
|
|||
|
// Fetch matching items from the keychain.
|
|||
|
var queryResult: AnyObject?
|
|||
|
let status = withUnsafeMutablePointer(to: &queryResult) {
|
|||
|
SecItemCopyMatching(query as CFDictionary, UnsafeMutablePointer($0))
|
|||
|
}
|
|||
|
|
|||
|
// If no items were found, return an empty array.
|
|||
|
guard status != errSecItemNotFound else { return [] }
|
|||
|
|
|||
|
// Throw an error if an unexpected status was returned.
|
|||
|
guard status == noErr else { throw KeychainError.unhandledError(status: status) }
|
|||
|
|
|||
|
// Cast the query result to an array of dictionaries.
|
|||
|
guard let resultData = queryResult as? [[String : AnyObject]] else { throw KeychainError.unexpectedItemData }
|
|||
|
|
|||
|
// Create a `KeychainPasswordItem` for each dictionary in the query result.
|
|||
|
var passwordItems = [KeychainPasswordItem]()
|
|||
|
for result in resultData {
|
|||
|
guard let account = result[kSecAttrAccount as String] as? String else { throw KeychainError.unexpectedItemData }
|
|||
|
|
|||
|
let passwordItem = KeychainPasswordItem(service: service, account: account, accessGroup: accessGroup)
|
|||
|
passwordItems.append(passwordItem)
|
|||
|
}
|
|||
|
|
|||
|
return passwordItems
|
|||
|
}
|
|||
|
|
|||
|
// MARK: Convenience
|
|||
|
|
|||
|
private static func keychainQuery(withService service: String, account: String? = nil, accessGroup: String? = nil) -> [String : AnyObject] {
|
|||
|
var query = [String : AnyObject]()
|
|||
|
query[kSecClass as String] = kSecClassGenericPassword
|
|||
|
query[kSecAttrService as String] = service as AnyObject?
|
|||
|
|
|||
|
if let account = account {
|
|||
|
query[kSecAttrAccount as String] = account as AnyObject?
|
|||
|
}
|
|||
|
|
|||
|
if let accessGroup = accessGroup {
|
|||
|
query[kSecAttrAccessGroup as String] = accessGroup as AnyObject?
|
|||
|
}
|
|||
|
|
|||
|
return query
|
|||
|
}
|
|||
|
}
|