summaryrefslogtreecommitdiffstats
path: root/crates/credential/cargo-credential-macos-keychain/src/main.rs
blob: 3fef3f92a6f7a662ca0b947c76545ea7f5fd8015 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
//! Cargo registry macos keychain credential process.

use cargo_credential::{Credential, Error};
use security_framework::os::macos::keychain::SecKeychain;

struct MacKeychain;

/// The account name is not used.
const ACCOUNT: &'static str = "";

fn registry(registry_name: &str) -> String {
    format!("cargo-registry:{}", registry_name)
}

impl Credential for MacKeychain {
    fn name(&self) -> &'static str {
        env!("CARGO_PKG_NAME")
    }

    fn get(&self, index_url: &str) -> Result<String, Error> {
        let keychain = SecKeychain::default().unwrap();
        let service_name = registry(index_url);
        let (pass, _item) = keychain.find_generic_password(&service_name, ACCOUNT)?;
        String::from_utf8(pass.as_ref().to_vec())
            .map_err(|_| "failed to convert token to UTF8".into())
    }

    fn store(&self, index_url: &str, token: &str, name: Option<&str>) -> Result<(), Error> {
        let keychain = SecKeychain::default().unwrap();
        let service_name = registry(name.unwrap_or(index_url));
        if let Ok((_pass, mut item)) = keychain.find_generic_password(&service_name, ACCOUNT) {
            item.set_password(token.as_bytes())?;
        } else {
            keychain.add_generic_password(&service_name, ACCOUNT, token.as_bytes())?;
        }
        Ok(())
    }

    fn erase(&self, index_url: &str) -> Result<(), Error> {
        let keychain = SecKeychain::default().unwrap();
        let service_name = registry(index_url);
        let (_pass, item) = keychain.find_generic_password(&service_name, ACCOUNT)?;
        item.delete();
        Ok(())
    }
}

fn main() {
    cargo_credential::main(MacKeychain);
}