|
1
|
|
|
<?php |
|
2
|
|
|
|
|
3
|
|
|
/* |
|
4
|
|
|
* This file is part of the Passbook package. |
|
5
|
|
|
* |
|
6
|
|
|
* (c) Eymen Gunay <[email protected]> |
|
7
|
|
|
* |
|
8
|
|
|
* For the full copyright and license information, please view the LICENSE |
|
9
|
|
|
* file that was distributed with this source code. |
|
10
|
|
|
*/ |
|
11
|
|
|
|
|
12
|
|
|
namespace Passbook; |
|
13
|
|
|
|
|
14
|
|
|
use Exception; |
|
15
|
|
|
use FilesystemIterator; |
|
16
|
|
|
use InvalidArgumentException; |
|
17
|
|
|
use Passbook\Certificate\P12; |
|
18
|
|
|
use Passbook\Certificate\WWDR; |
|
19
|
|
|
use Passbook\Exception\FileException; |
|
20
|
|
|
use Passbook\Exception\PassInvalidException; |
|
21
|
|
|
use Passbook\Pass\Image; |
|
22
|
|
|
use RecursiveDirectoryIterator; |
|
23
|
|
|
use RecursiveIteratorIterator; |
|
24
|
|
|
use SplFileObject; |
|
25
|
|
|
use ZipArchive; |
|
26
|
|
|
|
|
27
|
|
|
/** |
|
28
|
|
|
* PassFactory - Creates .pkpass files |
|
29
|
|
|
* |
|
30
|
|
|
* @author Eymen Gunay <[email protected]> |
|
31
|
|
|
*/ |
|
32
|
|
|
class PassFactory |
|
33
|
|
|
{ |
|
34
|
|
|
/** |
|
35
|
|
|
* Output path for generated pass files |
|
36
|
|
|
* |
|
37
|
|
|
* @var string |
|
38
|
|
|
*/ |
|
39
|
|
|
protected $outputPath = ''; |
|
40
|
|
|
|
|
41
|
|
|
/** |
|
42
|
|
|
* Overwrite if pass exists |
|
43
|
|
|
* |
|
44
|
|
|
* @var bool |
|
45
|
|
|
*/ |
|
46
|
|
|
protected $overwrite = false; |
|
47
|
|
|
|
|
48
|
|
|
/** |
|
49
|
|
|
* Pass type identifier |
|
50
|
|
|
* |
|
51
|
|
|
* @var string |
|
52
|
|
|
*/ |
|
53
|
|
|
protected $passTypeIdentifier; |
|
54
|
|
|
|
|
55
|
|
|
/** |
|
56
|
|
|
* Team identifier |
|
57
|
|
|
* |
|
58
|
|
|
* @var string |
|
59
|
|
|
*/ |
|
60
|
|
|
protected $teamIdentifier; |
|
61
|
|
|
|
|
62
|
|
|
/** |
|
63
|
|
|
* Organization name |
|
64
|
|
|
* |
|
65
|
|
|
* @var string |
|
66
|
|
|
*/ |
|
67
|
|
|
protected $organizationName; |
|
68
|
|
|
|
|
69
|
|
|
/** |
|
70
|
|
|
* P12 file |
|
71
|
|
|
* |
|
72
|
|
|
* @var \Passbook\Certificate\P12Interface |
|
73
|
|
|
*/ |
|
74
|
|
|
protected $p12; |
|
75
|
|
|
|
|
76
|
|
|
/** |
|
77
|
|
|
* WWDR file |
|
78
|
|
|
* |
|
79
|
|
|
* @var \Passbook\Certificate\WWDRInterface |
|
80
|
|
|
*/ |
|
81
|
|
|
protected $wwdr; |
|
82
|
|
|
|
|
83
|
|
|
/** |
|
84
|
|
|
* @var bool - skip signing the pass; should only be used for testing |
|
85
|
|
|
*/ |
|
86
|
|
|
protected $skipSignature; |
|
87
|
|
|
|
|
88
|
|
|
/** |
|
89
|
|
|
* @var PassValidatorInterface |
|
90
|
|
|
*/ |
|
91
|
|
|
private $passValidator; |
|
92
|
|
|
|
|
93
|
|
|
/** |
|
94
|
|
|
* Pass file extension |
|
95
|
|
|
* |
|
96
|
|
|
* @var string |
|
97
|
|
|
*/ |
|
98
|
|
|
public const PASS_EXTENSION = '.pkpass'; |
|
99
|
|
|
|
|
100
|
7 |
|
public function __construct($passTypeIdentifier, $teamIdentifier, $organizationName, $p12File, $p12Pass, $wwdrFile) |
|
101
|
|
|
{ |
|
102
|
|
|
// Required pass information |
|
103
|
7 |
|
$this->passTypeIdentifier = $passTypeIdentifier; |
|
104
|
7 |
|
$this->teamIdentifier = $teamIdentifier; |
|
105
|
7 |
|
$this->organizationName = $organizationName; |
|
106
|
|
|
|
|
107
|
|
|
// Create certificate objects |
|
108
|
7 |
|
$this->p12 = new P12($p12File, $p12Pass); |
|
109
|
7 |
|
$this->wwdr = new WWDR($wwdrFile); |
|
110
|
|
|
|
|
111
|
|
|
// By default use the PassValidator |
|
112
|
7 |
|
$this->passValidator = new PassValidator(); |
|
113
|
|
|
} |
|
114
|
|
|
|
|
115
|
|
|
/** |
|
116
|
|
|
* Set outputPath |
|
117
|
|
|
* |
|
118
|
|
|
* @param string $outputPath |
|
119
|
|
|
* |
|
120
|
|
|
* @return $this |
|
121
|
|
|
*/ |
|
122
|
6 |
|
public function setOutputPath($outputPath) |
|
123
|
|
|
{ |
|
124
|
6 |
|
$this->outputPath = $outputPath; |
|
125
|
|
|
|
|
126
|
6 |
|
return $this; |
|
127
|
|
|
} |
|
128
|
|
|
|
|
129
|
|
|
/** |
|
130
|
|
|
* Get outputPath |
|
131
|
|
|
* |
|
132
|
|
|
* @return string |
|
133
|
|
|
*/ |
|
134
|
1 |
|
public function getOutputPath() |
|
135
|
|
|
{ |
|
136
|
1 |
|
return $this->outputPath; |
|
137
|
|
|
} |
|
138
|
|
|
|
|
139
|
|
|
/** |
|
140
|
|
|
* The output path with a directory separator on the end. |
|
141
|
|
|
* |
|
142
|
|
|
* @return string |
|
143
|
|
|
*/ |
|
144
|
4 |
|
public function getNormalizedOutputPath() |
|
145
|
|
|
{ |
|
146
|
4 |
|
return rtrim($this->outputPath, DIRECTORY_SEPARATOR) . DIRECTORY_SEPARATOR; |
|
147
|
|
|
} |
|
148
|
|
|
|
|
149
|
|
|
/** |
|
150
|
|
|
* Set overwrite |
|
151
|
|
|
* |
|
152
|
|
|
* @param boolean $overwrite |
|
153
|
|
|
* |
|
154
|
|
|
* @return $this |
|
155
|
|
|
*/ |
|
156
|
2 |
|
public function setOverwrite($overwrite) |
|
157
|
|
|
{ |
|
158
|
2 |
|
$this->overwrite = $overwrite; |
|
159
|
|
|
|
|
160
|
2 |
|
return $this; |
|
161
|
|
|
} |
|
162
|
|
|
|
|
163
|
|
|
/** |
|
164
|
|
|
* Get overwrite |
|
165
|
|
|
* |
|
166
|
|
|
* @return boolean |
|
167
|
|
|
*/ |
|
168
|
4 |
|
public function isOverwrite() |
|
169
|
|
|
{ |
|
170
|
4 |
|
return $this->overwrite; |
|
171
|
|
|
} |
|
172
|
|
|
|
|
173
|
|
|
/** |
|
174
|
|
|
* Set skip signature |
|
175
|
|
|
* |
|
176
|
|
|
* When set, the pass will not be signed when packaged. This should only |
|
177
|
|
|
* be used for testing. |
|
178
|
|
|
* |
|
179
|
|
|
* @param boolean $skipSignature |
|
180
|
|
|
* |
|
181
|
|
|
* @return $this |
|
182
|
|
|
*/ |
|
183
|
2 |
|
public function setSkipSignature($skipSignature) |
|
184
|
|
|
{ |
|
185
|
2 |
|
$this->skipSignature = $skipSignature; |
|
186
|
|
|
|
|
187
|
2 |
|
return $this; |
|
188
|
|
|
} |
|
189
|
|
|
|
|
190
|
|
|
/** |
|
191
|
|
|
* Get skip signature |
|
192
|
|
|
* |
|
193
|
|
|
* @return boolean |
|
194
|
|
|
*/ |
|
195
|
3 |
|
public function getSkipSignature() |
|
196
|
|
|
{ |
|
197
|
3 |
|
return $this->skipSignature; |
|
198
|
|
|
} |
|
199
|
|
|
|
|
200
|
|
|
/** |
|
201
|
|
|
* Set an implementation of PassValidatorInterface to validate the pass |
|
202
|
|
|
* before packaging. When set to null, no validation is performed when |
|
203
|
|
|
* packaging the pass. |
|
204
|
|
|
* |
|
205
|
|
|
* @param PassValidatorInterface|null $passValidator |
|
206
|
|
|
* |
|
207
|
|
|
* @return $this |
|
208
|
|
|
*/ |
|
209
|
1 |
|
public function setPassValidator(PassValidatorInterface $passValidator = null) |
|
210
|
|
|
{ |
|
211
|
1 |
|
$this->passValidator = $passValidator; |
|
212
|
|
|
|
|
213
|
1 |
|
return $this; |
|
214
|
|
|
} |
|
215
|
|
|
|
|
216
|
|
|
/** |
|
217
|
|
|
* @return PassValidatorInterface |
|
218
|
|
|
*/ |
|
219
|
|
|
public function getPassValidator() |
|
220
|
|
|
{ |
|
221
|
|
|
return $this->passValidator; |
|
222
|
|
|
} |
|
223
|
|
|
|
|
224
|
|
|
/** |
|
225
|
|
|
* Serialize pass |
|
226
|
|
|
* |
|
227
|
|
|
* @param PassInterface $pass |
|
228
|
|
|
* |
|
229
|
|
|
* @return string |
|
230
|
|
|
*/ |
|
231
|
7 |
|
public static function serialize(PassInterface $pass) |
|
232
|
|
|
{ |
|
233
|
7 |
|
return self::jsonEncode($pass->toArray()); |
|
234
|
|
|
} |
|
235
|
|
|
|
|
236
|
|
|
/** |
|
237
|
|
|
* Creates a pkpass file |
|
238
|
|
|
* |
|
239
|
|
|
* @param PassInterface $pass - the pass to be packaged into a .pkpass file |
|
240
|
|
|
* @param string $passName - filename to be used for the pass; if blank the serial number will be used |
|
241
|
|
|
* |
|
242
|
|
|
* @return SplFileObject If an IO error occurred |
|
243
|
|
|
* @throws InvalidArgumentException|PassInvalidException|Exception |
|
244
|
|
|
*/ |
|
245
|
5 |
|
public function package(PassInterface $pass, $passName = '') |
|
246
|
|
|
{ |
|
247
|
5 |
|
if ($pass->getSerialNumber() == '') { |
|
248
|
1 |
|
throw new InvalidArgumentException('Pass must have a serial number to be packaged'); |
|
249
|
|
|
} |
|
250
|
|
|
|
|
251
|
4 |
|
$this->populateRequiredInformation($pass); |
|
252
|
|
|
|
|
253
|
4 |
|
if ($this->passValidator) { |
|
254
|
4 |
|
if (!$this->passValidator->validate($pass)) { |
|
255
|
1 |
|
throw new PassInvalidException('Failed to validate passbook', $this->passValidator->getErrors()); |
|
256
|
|
|
}; |
|
257
|
|
|
} |
|
258
|
|
|
|
|
259
|
3 |
|
$passDir = $this->preparePassDirectory($pass); |
|
260
|
|
|
|
|
261
|
|
|
// Serialize pass |
|
262
|
3 |
|
file_put_contents($passDir . 'pass.json', self::serialize($pass)); |
|
263
|
|
|
|
|
264
|
|
|
// Images |
|
265
|
3 |
|
$this->prepareImages($pass, $passDir); |
|
266
|
|
|
|
|
267
|
|
|
// Localizations |
|
268
|
3 |
|
$this->prepareLocalizations($pass, $passDir); |
|
269
|
|
|
|
|
270
|
|
|
// Manifest.json - recursive, also add files in sub directories |
|
271
|
3 |
|
$manifestJSONFile = $this->prepareManifest($passDir); |
|
272
|
|
|
|
|
273
|
|
|
// Signature |
|
274
|
3 |
|
$this->sign($passDir, $manifestJSONFile); |
|
275
|
|
|
|
|
276
|
|
|
// Zip pass |
|
277
|
3 |
|
$zipFile = $this->getNormalizedOutputPath() . $this->getPassName($passName, $pass) . self::PASS_EXTENSION; |
|
278
|
3 |
|
$this->zip($passDir, $zipFile); |
|
279
|
|
|
|
|
280
|
|
|
// Remove temporary pass directory |
|
281
|
3 |
|
$this->rrmdir($passDir); |
|
282
|
|
|
|
|
283
|
3 |
|
return new SplFileObject($zipFile); |
|
284
|
|
|
} |
|
285
|
|
|
|
|
286
|
|
|
/** |
|
287
|
|
|
* @param $passDir |
|
288
|
|
|
* @param $manifestJSONFile |
|
289
|
|
|
*/ |
|
290
|
3 |
|
private function sign($passDir, $manifestJSONFile): void |
|
291
|
|
|
{ |
|
292
|
3 |
|
if ($this->getSkipSignature()) { |
|
293
|
2 |
|
return; |
|
294
|
|
|
} |
|
295
|
|
|
|
|
296
|
1 |
|
$signatureFile = $passDir . 'signature'; |
|
297
|
1 |
|
$p12 = file_get_contents($this->p12->getRealPath()); |
|
298
|
1 |
|
$certs = []; |
|
299
|
1 |
|
if (openssl_pkcs12_read($p12, $certs, $this->p12->getPassword()) === true) { |
|
300
|
1 |
|
$certdata = openssl_x509_read($certs['cert']); |
|
301
|
1 |
|
$privkey = openssl_pkey_get_private($certs['pkey'], $this->p12->getPassword()); |
|
302
|
1 |
|
openssl_pkcs7_sign( |
|
303
|
1 |
|
$manifestJSONFile, |
|
304
|
1 |
|
$signatureFile, |
|
305
|
1 |
|
$certdata, |
|
306
|
1 |
|
$privkey, |
|
307
|
1 |
|
[], |
|
308
|
1 |
|
PKCS7_BINARY | PKCS7_DETACHED, |
|
309
|
1 |
|
$this->wwdr->getRealPath() |
|
310
|
1 |
|
); |
|
311
|
|
|
// Get signature content |
|
312
|
1 |
|
$signature = file_get_contents($signatureFile); |
|
313
|
|
|
// Check signature content |
|
314
|
1 |
|
if (!$signature) { |
|
315
|
|
|
throw new FileException("Couldn't read signature file."); |
|
316
|
|
|
} |
|
317
|
|
|
// Delimiters |
|
318
|
1 |
|
$begin = 'filename="smime.p7s"'; |
|
319
|
1 |
|
$end = '------'; |
|
320
|
|
|
// Convert signature |
|
321
|
1 |
|
$signature = substr($signature, strpos($signature, $begin) + strlen($begin)); |
|
322
|
1 |
|
$signature = substr($signature, 0, strpos($signature, $end)); |
|
323
|
1 |
|
$signature = base64_decode($signature); |
|
324
|
|
|
// Put new signature |
|
325
|
1 |
|
if (!file_put_contents($signatureFile, $signature)) { |
|
326
|
1 |
|
throw new FileException("Couldn't write signature file."); |
|
327
|
|
|
} |
|
328
|
|
|
} else { |
|
329
|
|
|
throw new FileException('Error reading certificate file'); |
|
330
|
|
|
} |
|
331
|
|
|
} |
|
332
|
|
|
|
|
333
|
|
|
/** |
|
334
|
|
|
* Creates a zip of a directory including all sub directories (recursive) |
|
335
|
|
|
* |
|
336
|
|
|
* @param $source - path to the source directory |
|
|
|
|
|
|
337
|
|
|
* @param $destination - output directory |
|
338
|
|
|
* |
|
339
|
|
|
* @return bool |
|
340
|
|
|
* @throws Exception |
|
341
|
|
|
*/ |
|
342
|
3 |
|
private function zip($source, $destination) |
|
343
|
|
|
{ |
|
344
|
3 |
|
if (!extension_loaded('zip')) { |
|
345
|
|
|
throw new Exception('ZIP extension not available'); |
|
346
|
|
|
} |
|
347
|
|
|
|
|
348
|
3 |
|
$source = realpath($source); |
|
349
|
3 |
|
if (!is_dir($source)) { |
|
350
|
|
|
throw new FileException('Source must be a directory.'); |
|
351
|
|
|
} |
|
352
|
|
|
|
|
353
|
3 |
|
$zip = new ZipArchive(); |
|
354
|
3 |
|
$shouldOverwrite = $this->isOverwrite() ? ZipArchive::OVERWRITE : 0; |
|
355
|
3 |
|
if (!$zip->open($destination, ZipArchive::CREATE | $shouldOverwrite)) { |
|
356
|
|
|
throw new FileException("Couldn't open zip file."); |
|
357
|
|
|
} |
|
358
|
|
|
|
|
359
|
|
|
/* @var $iterator RecursiveIteratorIterator|RecursiveDirectoryIterator */ |
|
360
|
3 |
|
$dirIterator = new RecursiveDirectoryIterator($source, FilesystemIterator::SKIP_DOTS); |
|
361
|
3 |
|
$iterator = new RecursiveIteratorIterator($dirIterator, RecursiveIteratorIterator::SELF_FIRST); |
|
362
|
3 |
|
while ($iterator->valid()) { |
|
363
|
3 |
|
if ($iterator->isDir()) { |
|
|
|
|
|
|
364
|
1 |
|
$zip->addEmptyDir($iterator->getSubPathName()); |
|
|
|
|
|
|
365
|
3 |
|
} elseif ($iterator->isFile()) { |
|
|
|
|
|
|
366
|
3 |
|
$zip->addFromString($iterator->getSubPathName(), file_get_contents($iterator->key())); |
|
|
|
|
|
|
367
|
|
|
} |
|
368
|
3 |
|
$iterator->next(); |
|
369
|
|
|
} |
|
370
|
|
|
|
|
371
|
3 |
|
return $zip->close(); |
|
372
|
|
|
} |
|
373
|
|
|
|
|
374
|
|
|
/** |
|
375
|
|
|
* Recursive folder remove |
|
376
|
|
|
* |
|
377
|
|
|
* @param string $dir |
|
378
|
|
|
* |
|
379
|
|
|
* @return bool |
|
380
|
|
|
*/ |
|
381
|
3 |
|
private function rrmdir($dir) |
|
382
|
|
|
{ |
|
383
|
3 |
|
$files = array_diff(scandir($dir), ['.', '..']); |
|
384
|
3 |
|
foreach ($files as $file) { |
|
385
|
3 |
|
is_dir("$dir/$file") ? $this->rrmdir("$dir/$file") : unlink("$dir/$file"); |
|
386
|
|
|
} |
|
387
|
|
|
|
|
388
|
3 |
|
return rmdir($dir); |
|
389
|
|
|
} |
|
390
|
|
|
|
|
391
|
|
|
/** |
|
392
|
|
|
* @param PassInterface $pass |
|
393
|
|
|
*/ |
|
394
|
4 |
|
private function populateRequiredInformation(PassInterface $pass): void |
|
395
|
|
|
{ |
|
396
|
4 |
|
if (!$pass->getPassTypeIdentifier()) { |
|
397
|
3 |
|
$pass->setPassTypeIdentifier($this->passTypeIdentifier); |
|
398
|
|
|
} |
|
399
|
|
|
|
|
400
|
4 |
|
if (!$pass->getTeamIdentifier()) { |
|
401
|
3 |
|
$pass->setTeamIdentifier($this->teamIdentifier); |
|
402
|
|
|
} |
|
403
|
|
|
|
|
404
|
4 |
|
if (!$pass->getOrganizationName()) { |
|
405
|
3 |
|
$pass->setOrganizationName($this->organizationName); |
|
406
|
|
|
} |
|
407
|
|
|
} |
|
408
|
|
|
|
|
409
|
|
|
/** |
|
410
|
|
|
* @param $array |
|
411
|
|
|
* |
|
412
|
|
|
* @return string |
|
413
|
|
|
*/ |
|
414
|
7 |
|
private static function jsonEncode($array) |
|
415
|
|
|
{ |
|
416
|
|
|
// Check if JSON_UNESCAPED_SLASHES is defined to support PHP 5.3. |
|
417
|
7 |
|
$options = defined('JSON_UNESCAPED_SLASHES') ? JSON_UNESCAPED_SLASHES : 0; |
|
418
|
7 |
|
return json_encode($array, $options); |
|
419
|
|
|
} |
|
420
|
|
|
|
|
421
|
|
|
/** |
|
422
|
|
|
* @param $passName |
|
423
|
|
|
* @param PassInterface $pass |
|
424
|
|
|
* |
|
425
|
|
|
* @return string |
|
426
|
|
|
*/ |
|
427
|
3 |
|
public function getPassName($passName, PassInterface $pass) |
|
428
|
|
|
{ |
|
429
|
3 |
|
$passNameSanitised = preg_replace('/[^a-zA-Z0-9]+/', '', $passName); |
|
430
|
3 |
|
return strlen($passNameSanitised) != 0 ? $passNameSanitised : $pass->getSerialNumber(); |
|
431
|
|
|
} |
|
432
|
|
|
|
|
433
|
|
|
/** |
|
434
|
|
|
* @param $passDir |
|
435
|
|
|
* |
|
436
|
|
|
* @return string |
|
437
|
|
|
*/ |
|
438
|
3 |
|
private function prepareManifest($passDir) |
|
439
|
|
|
{ |
|
440
|
3 |
|
$manifestJSONFile = $passDir . 'manifest.json'; |
|
441
|
3 |
|
$manifest = []; |
|
442
|
3 |
|
$files = new RecursiveIteratorIterator( |
|
443
|
3 |
|
new RecursiveDirectoryIterator($passDir), |
|
444
|
3 |
|
RecursiveIteratorIterator::SELF_FIRST |
|
445
|
3 |
|
); |
|
446
|
3 |
|
foreach ($files as $file) { |
|
447
|
|
|
// Ignore "." and ".." folders |
|
448
|
3 |
|
if (in_array(substr($file, strrpos($file, '/') + 1), ['.', '..'])) { |
|
449
|
3 |
|
continue; |
|
450
|
|
|
} |
|
451
|
|
|
// |
|
452
|
3 |
|
$filePath = realpath($file); |
|
453
|
3 |
|
if (is_file($filePath) === true) { |
|
454
|
3 |
|
$relativePathName = str_replace($passDir, '', $file->getPathname()); |
|
455
|
3 |
|
$manifest[$relativePathName] = sha1_file($filePath); |
|
456
|
|
|
} |
|
457
|
|
|
} |
|
458
|
3 |
|
file_put_contents($manifestJSONFile, $this->jsonEncode($manifest)); |
|
459
|
|
|
|
|
460
|
3 |
|
return $manifestJSONFile; |
|
461
|
|
|
} |
|
462
|
|
|
|
|
463
|
|
|
/** |
|
464
|
|
|
* @param PassInterface $pass |
|
465
|
|
|
* |
|
466
|
|
|
* @return string |
|
467
|
|
|
*/ |
|
468
|
3 |
|
private function preparePassDirectory(PassInterface $pass) |
|
469
|
|
|
{ |
|
470
|
3 |
|
$passDir = $this->getNormalizedOutputPath() . $pass->getSerialNumber() . DIRECTORY_SEPARATOR; |
|
471
|
3 |
|
$passDirExists = file_exists($passDir); |
|
472
|
3 |
|
if ($passDirExists && !$this->isOverwrite()) { |
|
473
|
|
|
throw new FileException('Temporary pass directory already exists'); |
|
474
|
3 |
|
} elseif (!$passDirExists && !mkdir($passDir, 0777, true)) { |
|
475
|
|
|
throw new FileException("Couldn't create temporary pass directory"); |
|
476
|
|
|
} |
|
477
|
|
|
|
|
478
|
3 |
|
return $passDir; |
|
479
|
|
|
} |
|
480
|
|
|
|
|
481
|
|
|
/** |
|
482
|
|
|
* @param PassInterface $pass |
|
483
|
|
|
* @param string $passDir |
|
484
|
|
|
*/ |
|
485
|
3 |
|
private function prepareImages(PassInterface $pass, $passDir): void |
|
486
|
|
|
{ |
|
487
|
|
|
/** @var Image $image */ |
|
488
|
3 |
|
foreach ($pass->getImages() as $image) { |
|
489
|
3 |
|
$fileName = $passDir . $image->getContext(); |
|
490
|
3 |
|
if ($image->getDensity() === 2) { |
|
491
|
|
|
$fileName .= '@2x'; |
|
492
|
3 |
|
} elseif ($image->getDensity() === 3) { |
|
493
|
|
|
$fileName .= '@3x'; |
|
494
|
|
|
} |
|
495
|
|
|
|
|
496
|
3 |
|
$fileName .= '.' . $image->getExtension(); |
|
497
|
3 |
|
copy($image->getPathname(), $fileName); |
|
498
|
|
|
} |
|
499
|
|
|
} |
|
500
|
|
|
|
|
501
|
|
|
/** |
|
502
|
|
|
* @param PassInterface $pass |
|
503
|
|
|
* @param string $passDir |
|
504
|
|
|
*/ |
|
505
|
3 |
|
private function prepareLocalizations(PassInterface $pass, $passDir): void |
|
506
|
|
|
{ |
|
507
|
3 |
|
foreach ($pass->getLocalizations() as $localization) { |
|
508
|
|
|
// Create dir (LANGUAGE.lproj) |
|
509
|
1 |
|
$localizationDir = $passDir . $localization->getLanguage() . '.lproj' . DIRECTORY_SEPARATOR; |
|
510
|
1 |
|
$localizationDirExists = file_exists($localizationDir); |
|
511
|
1 |
|
if ($localizationDirExists && !$this->isOverwrite()) { |
|
512
|
|
|
throw new FileException("Temporary pass localization directory already exists ({$localization->getLanguage()})"); |
|
513
|
1 |
|
} elseif (!$localizationDirExists && !mkdir($localizationDir, 0777, true)) { |
|
514
|
|
|
throw new FileException("Couldn't create temporary pass localization directory ({$localization->getLanguage()})"); |
|
515
|
|
|
} |
|
516
|
|
|
|
|
517
|
|
|
// pass.strings File (Format: "token" = "value") |
|
518
|
1 |
|
$localizationStringsFile = $localizationDir . 'pass.strings'; |
|
519
|
1 |
|
file_put_contents($localizationStringsFile, $localization->getStringsFileOutput()); |
|
520
|
|
|
|
|
521
|
|
|
// Localization images |
|
522
|
1 |
|
foreach ($localization->getImages() as $image) { |
|
523
|
|
|
$fileName = $localizationDir . $image->getContext(); |
|
524
|
|
|
if ($image->getDensity() === 2) { |
|
525
|
|
|
$fileName .= '@2x'; |
|
526
|
|
|
} elseif ($image->getDensity() === 3) { |
|
527
|
|
|
$fileName .= '@3x'; |
|
528
|
|
|
} |
|
529
|
|
|
$fileName .= '.' . $image->getExtension(); |
|
530
|
|
|
copy($image->getPathname(), $fileName); |
|
531
|
|
|
} |
|
532
|
|
|
} |
|
533
|
|
|
} |
|
534
|
|
|
} |
|
535
|
|
|
|