summaryrefslogtreecommitdiffstats
path: root/src/tools/cargo/credential/cargo-credential-macos-keychain/src/main.rs
blob: 4d6ea96d05bd8ef6f2d35bb71c1a4d5b90387481 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
//! Cargo registry macos keychain credential process.

#[cfg(target_os = "macos")]
mod macos {
    use cargo_credential::{Credential, Error};
    use security_framework::os::macos::keychain::SecKeychain;

    pub(crate) struct MacKeychain;

    /// The account name is not used.
    const ACCOUNT: &'static str = "";

    fn registry(registry_name: &str) -> String {
        format!("cargo-registry:{}", registry_name)
    }

    impl Credential for MacKeychain {
        fn name(&self) -> &'static str {
            env!("CARGO_PKG_NAME")
        }

        fn get(&self, index_url: &str) -> Result<String, Error> {
            let keychain = SecKeychain::default().unwrap();
            let service_name = registry(index_url);
            let (pass, _item) = keychain.find_generic_password(&service_name, ACCOUNT)?;
            String::from_utf8(pass.as_ref().to_vec())
                .map_err(|_| "failed to convert token to UTF8".into())
        }

        fn store(&self, index_url: &str, token: &str, name: Option<&str>) -> Result<(), Error> {
            let keychain = SecKeychain::default().unwrap();
            let service_name = registry(name.unwrap_or(index_url));
            if let Ok((_pass, mut item)) = keychain.find_generic_password(&service_name, ACCOUNT) {
                item.set_password(token.as_bytes())?;
            } else {
                keychain.add_generic_password(&service_name, ACCOUNT, token.as_bytes())?;
            }
            Ok(())
        }

        fn erase(&self, index_url: &str) -> Result<(), Error> {
            let keychain = SecKeychain::default().unwrap();
            let service_name = registry(index_url);
            let (_pass, item) = keychain.find_generic_password(&service_name, ACCOUNT)?;
            item.delete();
            Ok(())
        }
    }
}

#[cfg(not(target_os = "macos"))]
use cargo_credential::UnsupportedCredential as MacKeychain;
#[cfg(target_os = "macos")]
use macos::MacKeychain;

fn main() {
    cargo_credential::main(MacKeychain);
}