eymengunay /
php-passbook
| 1 | <?php |
||||
| 2 | |||||
| 3 | /* |
||||
| 4 | * This file is part of the Passbook package. |
||||
| 5 | * |
||||
| 6 | * (c) Eymen Gunay <[email protected]> |
||||
| 7 | * |
||||
| 8 | * For the full copyright and license information, please view the LICENSE |
||||
| 9 | * file that was distributed with this source code. |
||||
| 10 | */ |
||||
| 11 | |||||
| 12 | namespace Passbook; |
||||
| 13 | |||||
| 14 | use Exception; |
||||
| 15 | use FilesystemIterator; |
||||
| 16 | use InvalidArgumentException; |
||||
| 17 | use Passbook\Certificate\P12; |
||||
| 18 | use Passbook\Certificate\WWDR; |
||||
| 19 | use Passbook\Exception\FileException; |
||||
| 20 | use Passbook\Exception\PassInvalidException; |
||||
| 21 | use Passbook\Pass\Image; |
||||
| 22 | use RecursiveDirectoryIterator; |
||||
| 23 | use RecursiveIteratorIterator; |
||||
| 24 | use SplFileObject; |
||||
| 25 | use ZipArchive; |
||||
| 26 | |||||
| 27 | /** |
||||
| 28 | * PassFactory - Creates .pkpass files |
||||
| 29 | * |
||||
| 30 | * @author Eymen Gunay <[email protected]> |
||||
| 31 | */ |
||||
| 32 | class PassFactory |
||||
| 33 | { |
||||
| 34 | /** |
||||
| 35 | * Output path for generated pass files |
||||
| 36 | * |
||||
| 37 | * @var string |
||||
| 38 | */ |
||||
| 39 | protected $outputPath = ''; |
||||
| 40 | |||||
| 41 | /** |
||||
| 42 | * Overwrite if pass exists |
||||
| 43 | * |
||||
| 44 | * @var bool |
||||
| 45 | */ |
||||
| 46 | protected $overwrite = false; |
||||
| 47 | |||||
| 48 | /** |
||||
| 49 | * Pass type identifier |
||||
| 50 | * |
||||
| 51 | * @var string |
||||
| 52 | */ |
||||
| 53 | protected $passTypeIdentifier; |
||||
| 54 | |||||
| 55 | /** |
||||
| 56 | * Team identifier |
||||
| 57 | * |
||||
| 58 | * @var string |
||||
| 59 | */ |
||||
| 60 | protected $teamIdentifier; |
||||
| 61 | |||||
| 62 | /** |
||||
| 63 | * Organization name |
||||
| 64 | * |
||||
| 65 | * @var string |
||||
| 66 | */ |
||||
| 67 | protected $organizationName; |
||||
| 68 | |||||
| 69 | /** |
||||
| 70 | * P12 file |
||||
| 71 | * |
||||
| 72 | * @var \Passbook\Certificate\P12Interface |
||||
| 73 | */ |
||||
| 74 | protected $p12; |
||||
| 75 | |||||
| 76 | /** |
||||
| 77 | * WWDR file |
||||
| 78 | * |
||||
| 79 | * @var \Passbook\Certificate\WWDRInterface |
||||
| 80 | */ |
||||
| 81 | protected $wwdr; |
||||
| 82 | |||||
| 83 | /** |
||||
| 84 | * @var bool - skip signing the pass; should only be used for testing |
||||
| 85 | */ |
||||
| 86 | protected $skipSignature; |
||||
| 87 | |||||
| 88 | /** |
||||
| 89 | * @var PassValidatorInterface |
||||
| 90 | */ |
||||
| 91 | private $passValidator; |
||||
| 92 | |||||
| 93 | /** |
||||
| 94 | * Pass file extension |
||||
| 95 | * |
||||
| 96 | * @var string |
||||
| 97 | */ |
||||
| 98 | public const PASS_EXTENSION = '.pkpass'; |
||||
| 99 | |||||
| 100 | 7 | public function __construct($passTypeIdentifier, $teamIdentifier, $organizationName, $p12File, $p12Pass, $wwdrFile) |
|||
| 101 | { |
||||
| 102 | // Required pass information |
||||
| 103 | 7 | $this->passTypeIdentifier = $passTypeIdentifier; |
|||
| 104 | 7 | $this->teamIdentifier = $teamIdentifier; |
|||
| 105 | 7 | $this->organizationName = $organizationName; |
|||
| 106 | |||||
| 107 | // Create certificate objects |
||||
| 108 | 7 | $this->p12 = new P12($p12File, $p12Pass); |
|||
| 109 | 7 | $this->wwdr = new WWDR($wwdrFile); |
|||
| 110 | |||||
| 111 | // By default use the PassValidator |
||||
| 112 | 7 | $this->passValidator = new PassValidator(); |
|||
| 113 | } |
||||
| 114 | |||||
| 115 | /** |
||||
| 116 | * Set outputPath |
||||
| 117 | * |
||||
| 118 | * @param string $outputPath |
||||
| 119 | * |
||||
| 120 | * @return $this |
||||
| 121 | */ |
||||
| 122 | 6 | public function setOutputPath($outputPath) |
|||
| 123 | { |
||||
| 124 | 6 | $this->outputPath = $outputPath; |
|||
| 125 | |||||
| 126 | 6 | return $this; |
|||
| 127 | } |
||||
| 128 | |||||
| 129 | /** |
||||
| 130 | * Get outputPath |
||||
| 131 | * |
||||
| 132 | * @return string |
||||
| 133 | */ |
||||
| 134 | 1 | public function getOutputPath() |
|||
| 135 | { |
||||
| 136 | 1 | return $this->outputPath; |
|||
| 137 | } |
||||
| 138 | |||||
| 139 | /** |
||||
| 140 | * The output path with a directory separator on the end. |
||||
| 141 | * |
||||
| 142 | * @return string |
||||
| 143 | */ |
||||
| 144 | 4 | public function getNormalizedOutputPath() |
|||
| 145 | { |
||||
| 146 | 4 | return rtrim($this->outputPath, DIRECTORY_SEPARATOR) . DIRECTORY_SEPARATOR; |
|||
| 147 | } |
||||
| 148 | |||||
| 149 | /** |
||||
| 150 | * Set overwrite |
||||
| 151 | * |
||||
| 152 | * @param boolean $overwrite |
||||
| 153 | * |
||||
| 154 | * @return $this |
||||
| 155 | */ |
||||
| 156 | 2 | public function setOverwrite($overwrite) |
|||
| 157 | { |
||||
| 158 | 2 | $this->overwrite = $overwrite; |
|||
| 159 | |||||
| 160 | 2 | return $this; |
|||
| 161 | } |
||||
| 162 | |||||
| 163 | /** |
||||
| 164 | * Get overwrite |
||||
| 165 | * |
||||
| 166 | * @return boolean |
||||
| 167 | */ |
||||
| 168 | 4 | public function isOverwrite() |
|||
| 169 | { |
||||
| 170 | 4 | return $this->overwrite; |
|||
| 171 | } |
||||
| 172 | |||||
| 173 | /** |
||||
| 174 | * Set skip signature |
||||
| 175 | * |
||||
| 176 | * When set, the pass will not be signed when packaged. This should only |
||||
| 177 | * be used for testing. |
||||
| 178 | * |
||||
| 179 | * @param boolean $skipSignature |
||||
| 180 | * |
||||
| 181 | * @return $this |
||||
| 182 | */ |
||||
| 183 | 2 | public function setSkipSignature($skipSignature) |
|||
| 184 | { |
||||
| 185 | 2 | $this->skipSignature = $skipSignature; |
|||
| 186 | |||||
| 187 | 2 | return $this; |
|||
| 188 | } |
||||
| 189 | |||||
| 190 | /** |
||||
| 191 | * Get skip signature |
||||
| 192 | * |
||||
| 193 | * @return boolean |
||||
| 194 | */ |
||||
| 195 | 3 | public function getSkipSignature() |
|||
| 196 | { |
||||
| 197 | 3 | return $this->skipSignature; |
|||
| 198 | } |
||||
| 199 | |||||
| 200 | /** |
||||
| 201 | * Set an implementation of PassValidatorInterface to validate the pass |
||||
| 202 | * before packaging. When set to null, no validation is performed when |
||||
| 203 | * packaging the pass. |
||||
| 204 | * |
||||
| 205 | * @param PassValidatorInterface|null $passValidator |
||||
| 206 | * |
||||
| 207 | * @return $this |
||||
| 208 | */ |
||||
| 209 | 1 | public function setPassValidator(PassValidatorInterface $passValidator = null) |
|||
| 210 | { |
||||
| 211 | 1 | $this->passValidator = $passValidator; |
|||
| 212 | |||||
| 213 | 1 | return $this; |
|||
| 214 | } |
||||
| 215 | |||||
| 216 | /** |
||||
| 217 | * @return PassValidatorInterface |
||||
| 218 | */ |
||||
| 219 | public function getPassValidator() |
||||
| 220 | { |
||||
| 221 | return $this->passValidator; |
||||
| 222 | } |
||||
| 223 | |||||
| 224 | /** |
||||
| 225 | * Serialize pass |
||||
| 226 | * |
||||
| 227 | * @param PassInterface $pass |
||||
| 228 | * |
||||
| 229 | * @return string |
||||
| 230 | */ |
||||
| 231 | 9 | public static function serialize(PassInterface $pass) |
|||
| 232 | { |
||||
| 233 | 9 | return self::jsonEncode($pass->toArray()); |
|||
| 234 | } |
||||
| 235 | |||||
| 236 | /** |
||||
| 237 | * Creates a pkpass file |
||||
| 238 | * |
||||
| 239 | * @param PassInterface $pass - the pass to be packaged into a .pkpass file |
||||
| 240 | * @param string $passName - filename to be used for the pass; if blank the serial number will be used |
||||
| 241 | * |
||||
| 242 | * @return SplFileObject If an IO error occurred |
||||
| 243 | * @throws InvalidArgumentException|PassInvalidException|Exception |
||||
| 244 | */ |
||||
| 245 | 5 | public function package(PassInterface $pass, $passName = '') |
|||
| 246 | { |
||||
| 247 | 5 | if ($pass->getSerialNumber() == '') { |
|||
| 248 | 1 | throw new InvalidArgumentException('Pass must have a serial number to be packaged'); |
|||
| 249 | } |
||||
| 250 | |||||
| 251 | 4 | $this->populateRequiredInformation($pass); |
|||
| 252 | |||||
| 253 | 4 | if ($this->passValidator) { |
|||
| 254 | 4 | if (!$this->passValidator->validate($pass)) { |
|||
| 255 | 1 | throw new PassInvalidException('Failed to validate passbook', $this->passValidator->getErrors()); |
|||
| 256 | }; |
||||
| 257 | } |
||||
| 258 | |||||
| 259 | 3 | $passDir = $this->preparePassDirectory($pass); |
|||
| 260 | |||||
| 261 | // Serialize pass |
||||
| 262 | 3 | file_put_contents($passDir . 'pass.json', self::serialize($pass)); |
|||
| 263 | |||||
| 264 | // Images |
||||
| 265 | 3 | $this->prepareImages($pass, $passDir); |
|||
| 266 | |||||
| 267 | // Localizations |
||||
| 268 | 3 | $this->prepareLocalizations($pass, $passDir); |
|||
| 269 | |||||
| 270 | // Manifest.json - recursive, also add files in sub directories |
||||
| 271 | 3 | $manifestJSONFile = $this->prepareManifest($passDir); |
|||
| 272 | |||||
| 273 | // Signature |
||||
| 274 | 3 | $this->sign($passDir, $manifestJSONFile); |
|||
| 275 | |||||
| 276 | // Zip pass |
||||
| 277 | 3 | $zipFile = $this->getNormalizedOutputPath() . $this->getPassName($passName, $pass) . self::PASS_EXTENSION; |
|||
| 278 | 3 | $this->zip($passDir, $zipFile); |
|||
| 279 | |||||
| 280 | // Remove temporary pass directory |
||||
| 281 | 3 | $this->rrmdir($passDir); |
|||
| 282 | |||||
| 283 | 3 | return new SplFileObject($zipFile); |
|||
| 284 | } |
||||
| 285 | |||||
| 286 | /** |
||||
| 287 | * @param $passDir |
||||
| 288 | * @param $manifestJSONFile |
||||
| 289 | */ |
||||
| 290 | 3 | private function sign($passDir, $manifestJSONFile): void |
|||
| 291 | { |
||||
| 292 | 3 | if ($this->getSkipSignature()) { |
|||
| 293 | 2 | return; |
|||
| 294 | } |
||||
| 295 | |||||
| 296 | 1 | $signatureFile = $passDir . 'signature'; |
|||
| 297 | 1 | $p12 = file_get_contents($this->p12->getRealPath()); |
|||
| 298 | 1 | $certs = []; |
|||
| 299 | 1 | if (openssl_pkcs12_read($p12, $certs, $this->p12->getPassword()) === true) { |
|||
| 300 | 1 | $certdata = openssl_x509_read($certs['cert']); |
|||
| 301 | 1 | $privkey = openssl_pkey_get_private($certs['pkey'], $this->p12->getPassword()); |
|||
| 302 | 1 | openssl_pkcs7_sign( |
|||
| 303 | 1 | $manifestJSONFile, |
|||
| 304 | 1 | $signatureFile, |
|||
| 305 | 1 | $certdata, |
|||
| 306 | 1 | $privkey, |
|||
| 307 | 1 | [], |
|||
| 308 | 1 | PKCS7_BINARY | PKCS7_DETACHED, |
|||
| 309 | 1 | $this->wwdr->getRealPath() |
|||
| 310 | 1 | ); |
|||
| 311 | // Get signature content |
||||
| 312 | 1 | $signature = file_get_contents($signatureFile); |
|||
| 313 | // Check signature content |
||||
| 314 | 1 | if (!$signature) { |
|||
| 315 | throw new FileException("Couldn't read signature file."); |
||||
| 316 | } |
||||
| 317 | // Delimiters |
||||
| 318 | 1 | $begin = 'filename="smime.p7s"'; |
|||
| 319 | 1 | $end = '------'; |
|||
| 320 | // Convert signature |
||||
| 321 | 1 | $signature = substr($signature, strpos($signature, $begin) + strlen($begin)); |
|||
| 322 | 1 | $signature = substr($signature, 0, strpos($signature, $end)); |
|||
| 323 | 1 | $signature = base64_decode($signature); |
|||
| 324 | // Put new signature |
||||
| 325 | 1 | if (!file_put_contents($signatureFile, $signature)) { |
|||
| 326 | 1 | throw new FileException("Couldn't write signature file."); |
|||
| 327 | } |
||||
| 328 | } else { |
||||
| 329 | throw new FileException('Error reading certificate file'); |
||||
| 330 | } |
||||
| 331 | } |
||||
| 332 | |||||
| 333 | /** |
||||
| 334 | * Creates a zip of a directory including all sub directories (recursive) |
||||
| 335 | * |
||||
| 336 | * @param $source - path to the source directory |
||||
|
0 ignored issues
–
show
Documentation
Bug
introduced
by
Loading history...
|
|||||
| 337 | * @param $destination - output directory |
||||
| 338 | * |
||||
| 339 | * @return bool |
||||
| 340 | * @throws Exception |
||||
| 341 | */ |
||||
| 342 | 3 | private function zip($source, $destination) |
|||
| 343 | { |
||||
| 344 | 3 | if (!extension_loaded('zip')) { |
|||
| 345 | throw new Exception('ZIP extension not available'); |
||||
| 346 | } |
||||
| 347 | |||||
| 348 | 3 | $source = realpath($source); |
|||
| 349 | 3 | if (!is_dir($source)) { |
|||
| 350 | throw new FileException('Source must be a directory.'); |
||||
| 351 | } |
||||
| 352 | |||||
| 353 | 3 | $zip = new ZipArchive(); |
|||
| 354 | 3 | $shouldOverwrite = $this->isOverwrite() ? ZipArchive::OVERWRITE : 0; |
|||
| 355 | 3 | if (!$zip->open($destination, ZipArchive::CREATE | $shouldOverwrite)) { |
|||
| 356 | throw new FileException("Couldn't open zip file."); |
||||
| 357 | } |
||||
| 358 | |||||
| 359 | /* @var $iterator RecursiveIteratorIterator|RecursiveDirectoryIterator */ |
||||
| 360 | 3 | $dirIterator = new RecursiveDirectoryIterator($source, FilesystemIterator::SKIP_DOTS); |
|||
| 361 | 3 | $iterator = new RecursiveIteratorIterator($dirIterator, RecursiveIteratorIterator::SELF_FIRST); |
|||
| 362 | 3 | while ($iterator->valid()) { |
|||
| 363 | 3 | if ($iterator->isDir()) { |
|||
|
0 ignored issues
–
show
The method
isDir() does not exist on RecursiveIteratorIterator.
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
This check looks for calls to methods that do not seem to exist on a given type. It looks for the method on the type itself as well as in inherited classes or implemented interfaces. This is most likely a typographical error or the method has been renamed. Loading history...
|
|||||
| 364 | 1 | $zip->addEmptyDir($iterator->getSubPathName()); |
|||
|
0 ignored issues
–
show
The method
getSubPathName() does not exist on RecursiveIteratorIterator.
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
This check looks for calls to methods that do not seem to exist on a given type. It looks for the method on the type itself as well as in inherited classes or implemented interfaces. This is most likely a typographical error or the method has been renamed. Loading history...
|
|||||
| 365 | 3 | } elseif ($iterator->isFile()) { |
|||
|
0 ignored issues
–
show
The method
isFile() does not exist on RecursiveIteratorIterator.
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
This check looks for calls to methods that do not seem to exist on a given type. It looks for the method on the type itself as well as in inherited classes or implemented interfaces. This is most likely a typographical error or the method has been renamed. Loading history...
|
|||||
| 366 | 3 | $zip->addFromString($iterator->getSubPathName(), file_get_contents($iterator->key())); |
|||
|
0 ignored issues
–
show
It seems like
$iterator->key() can also be of type null and true; however, parameter $filename of file_get_contents() does only seem to accept string, maybe add an additional type check?
(
Ignorable by Annotation
)
If this is a false-positive, you can also ignore this issue in your code via the
Loading history...
|
|||||
| 367 | } |
||||
| 368 | 3 | $iterator->next(); |
|||
| 369 | } |
||||
| 370 | |||||
| 371 | 3 | return $zip->close(); |
|||
| 372 | } |
||||
| 373 | |||||
| 374 | /** |
||||
| 375 | * Recursive folder remove |
||||
| 376 | * |
||||
| 377 | * @param string $dir |
||||
| 378 | * |
||||
| 379 | * @return bool |
||||
| 380 | */ |
||||
| 381 | 3 | private function rrmdir($dir) |
|||
| 382 | { |
||||
| 383 | 3 | $files = array_diff(scandir($dir), ['.', '..']); |
|||
| 384 | 3 | foreach ($files as $file) { |
|||
| 385 | 3 | is_dir("$dir/$file") ? $this->rrmdir("$dir/$file") : unlink("$dir/$file"); |
|||
| 386 | } |
||||
| 387 | |||||
| 388 | 3 | return rmdir($dir); |
|||
| 389 | } |
||||
| 390 | |||||
| 391 | /** |
||||
| 392 | * @param PassInterface $pass |
||||
| 393 | */ |
||||
| 394 | 4 | private function populateRequiredInformation(PassInterface $pass): void |
|||
| 395 | { |
||||
| 396 | 4 | if (!$pass->getPassTypeIdentifier()) { |
|||
| 397 | 3 | $pass->setPassTypeIdentifier($this->passTypeIdentifier); |
|||
| 398 | } |
||||
| 399 | |||||
| 400 | 4 | if (!$pass->getTeamIdentifier()) { |
|||
| 401 | 3 | $pass->setTeamIdentifier($this->teamIdentifier); |
|||
| 402 | } |
||||
| 403 | |||||
| 404 | 4 | if (!$pass->getOrganizationName()) { |
|||
| 405 | 3 | $pass->setOrganizationName($this->organizationName); |
|||
| 406 | } |
||||
| 407 | } |
||||
| 408 | |||||
| 409 | /** |
||||
| 410 | * @param $array |
||||
| 411 | * |
||||
| 412 | * @return string |
||||
| 413 | */ |
||||
| 414 | 9 | private static function jsonEncode($array) |
|||
| 415 | { |
||||
| 416 | // Check if JSON_UNESCAPED_SLASHES is defined to support PHP 5.3. |
||||
| 417 | 9 | $options = defined('JSON_UNESCAPED_SLASHES') ? JSON_UNESCAPED_SLASHES : 0; |
|||
| 418 | 9 | return json_encode($array, $options); |
|||
| 419 | } |
||||
| 420 | |||||
| 421 | /** |
||||
| 422 | * @param $passName |
||||
| 423 | * @param PassInterface $pass |
||||
| 424 | * |
||||
| 425 | * @return string |
||||
| 426 | */ |
||||
| 427 | 3 | public function getPassName($passName, PassInterface $pass) |
|||
| 428 | { |
||||
| 429 | 3 | $passNameSanitised = preg_replace('/[^a-zA-Z0-9]+/', '', $passName); |
|||
| 430 | 3 | return strlen($passNameSanitised) != 0 ? $passNameSanitised : $pass->getSerialNumber(); |
|||
| 431 | } |
||||
| 432 | |||||
| 433 | /** |
||||
| 434 | * @param $passDir |
||||
| 435 | * |
||||
| 436 | * @return string |
||||
| 437 | */ |
||||
| 438 | 3 | private function prepareManifest($passDir) |
|||
| 439 | { |
||||
| 440 | 3 | $manifestJSONFile = $passDir . 'manifest.json'; |
|||
| 441 | 3 | $manifest = []; |
|||
| 442 | 3 | $files = new RecursiveIteratorIterator( |
|||
| 443 | 3 | new RecursiveDirectoryIterator($passDir), |
|||
| 444 | 3 | RecursiveIteratorIterator::SELF_FIRST |
|||
| 445 | 3 | ); |
|||
| 446 | 3 | foreach ($files as $file) { |
|||
| 447 | // Ignore "." and ".." folders |
||||
| 448 | 3 | if (in_array(substr($file, strrpos($file, '/') + 1), ['.', '..'])) { |
|||
| 449 | 3 | continue; |
|||
| 450 | } |
||||
| 451 | // |
||||
| 452 | 3 | $filePath = realpath($file); |
|||
| 453 | 3 | if (is_file($filePath) === true) { |
|||
| 454 | 3 | $relativePathName = str_replace($passDir, '', $file->getPathname()); |
|||
| 455 | 3 | $manifest[$relativePathName] = sha1_file($filePath); |
|||
| 456 | } |
||||
| 457 | } |
||||
| 458 | 3 | file_put_contents($manifestJSONFile, $this->jsonEncode($manifest)); |
|||
| 459 | |||||
| 460 | 3 | return $manifestJSONFile; |
|||
| 461 | } |
||||
| 462 | |||||
| 463 | /** |
||||
| 464 | * @param PassInterface $pass |
||||
| 465 | * |
||||
| 466 | * @return string |
||||
| 467 | */ |
||||
| 468 | 3 | private function preparePassDirectory(PassInterface $pass) |
|||
| 469 | { |
||||
| 470 | 3 | $passDir = $this->getNormalizedOutputPath() . $pass->getSerialNumber() . DIRECTORY_SEPARATOR; |
|||
| 471 | 3 | $passDirExists = file_exists($passDir); |
|||
| 472 | 3 | if ($passDirExists && !$this->isOverwrite()) { |
|||
| 473 | throw new FileException('Temporary pass directory already exists'); |
||||
| 474 | 3 | } elseif (!$passDirExists && !mkdir($passDir, 0777, true)) { |
|||
| 475 | throw new FileException("Couldn't create temporary pass directory"); |
||||
| 476 | } |
||||
| 477 | |||||
| 478 | 3 | return $passDir; |
|||
| 479 | } |
||||
| 480 | |||||
| 481 | /** |
||||
| 482 | * @param PassInterface $pass |
||||
| 483 | * @param string $passDir |
||||
| 484 | */ |
||||
| 485 | 3 | private function prepareImages(PassInterface $pass, $passDir): void |
|||
| 486 | { |
||||
| 487 | /** @var Image $image */ |
||||
| 488 | 3 | foreach ($pass->getImages() as $image) { |
|||
| 489 | 3 | $fileName = $passDir . $image->getContext(); |
|||
| 490 | 3 | if ($image->getDensity() === 2) { |
|||
| 491 | $fileName .= '@2x'; |
||||
| 492 | 3 | } elseif ($image->getDensity() === 3) { |
|||
| 493 | $fileName .= '@3x'; |
||||
| 494 | } |
||||
| 495 | |||||
| 496 | 3 | $fileName .= '.' . $image->getExtension(); |
|||
| 497 | 3 | copy($image->getPathname(), $fileName); |
|||
| 498 | } |
||||
| 499 | } |
||||
| 500 | |||||
| 501 | /** |
||||
| 502 | * @param PassInterface $pass |
||||
| 503 | * @param string $passDir |
||||
| 504 | */ |
||||
| 505 | 3 | private function prepareLocalizations(PassInterface $pass, $passDir): void |
|||
| 506 | { |
||||
| 507 | 3 | foreach ($pass->getLocalizations() as $localization) { |
|||
| 508 | // Create dir (LANGUAGE.lproj) |
||||
| 509 | 1 | $localizationDir = $passDir . $localization->getLanguage() . '.lproj' . DIRECTORY_SEPARATOR; |
|||
| 510 | 1 | $localizationDirExists = file_exists($localizationDir); |
|||
| 511 | 1 | if ($localizationDirExists && !$this->isOverwrite()) { |
|||
| 512 | throw new FileException("Temporary pass localization directory already exists ({$localization->getLanguage()})"); |
||||
| 513 | 1 | } elseif (!$localizationDirExists && !mkdir($localizationDir, 0777, true)) { |
|||
| 514 | throw new FileException("Couldn't create temporary pass localization directory ({$localization->getLanguage()})"); |
||||
| 515 | } |
||||
| 516 | |||||
| 517 | // pass.strings File (Format: "token" = "value") |
||||
| 518 | 1 | $localizationStringsFile = $localizationDir . 'pass.strings'; |
|||
| 519 | 1 | file_put_contents($localizationStringsFile, $localization->getStringsFileOutput()); |
|||
| 520 | |||||
| 521 | // Localization images |
||||
| 522 | 1 | foreach ($localization->getImages() as $image) { |
|||
| 523 | $fileName = $localizationDir . $image->getContext(); |
||||
| 524 | if ($image->getDensity() === 2) { |
||||
| 525 | $fileName .= '@2x'; |
||||
| 526 | } elseif ($image->getDensity() === 3) { |
||||
| 527 | $fileName .= '@3x'; |
||||
| 528 | } |
||||
| 529 | $fileName .= '.' . $image->getExtension(); |
||||
| 530 | copy($image->getPathname(), $fileName); |
||||
| 531 | } |
||||
| 532 | } |
||||
| 533 | } |
||||
| 534 | } |
||||
| 535 |