Skip to content

Commit 4a382fc

Browse files
authored
Merge pull request #575 from web-token/temp-8e9fdc
Merge up 3.4.4 to 4.0.x
2 parents dd3b4f8 + 6c72178 commit 4a382fc

File tree

4 files changed

+20
-29
lines changed

4 files changed

+20
-29
lines changed

composer.json

+3-9
Original file line numberDiff line numberDiff line change
@@ -67,8 +67,8 @@
6767
"ext-sodium": "*",
6868
"ekino/phpstan-banned-code": "^1.0",
6969
"ergebnis/phpunit-slow-test-detector": "^2.14",
70-
"infection/infection": "^0.28|^0.29",
71-
"matthiasnoback/symfony-config-test": "dev-phpunit-11",
70+
"infection/infection": "^0.29",
71+
"matthiasnoback/symfony-config-test": "5.1.x-dev",
7272
"paragonie/sodium_compat": "^1.20|^2.0",
7373
"php-parallel-lint/php-parallel-lint": "^1.3",
7474
"phpbench/phpbench": "^1.2",
@@ -86,7 +86,7 @@
8686
"spomky-labs/aes-key-wrap": "^7.0",
8787
"staabm/phpstan-dba": "^0.2.79",
8888
"staabm/phpstan-todo-by": "^0.1.25",
89-
"struggle-for-php/sfp-phpstan-psr-log": "^0.20.0 || ^0.21.0",
89+
"struggle-for-php/sfp-phpstan-psr-log": "^0.20|^0.21",
9090
"symfony/browser-kit": "^7.0",
9191
"symfony/http-client": "^7.0",
9292
"symfony/clock": "^7.0",
@@ -118,11 +118,5 @@
118118
"php-http/discovery": true,
119119
"infection/extension-installer": false
120120
}
121-
},
122-
"repositories": {
123-
"wickedOne_SymfonyConfigTest": {
124-
"type": "vcs",
125-
"url": "[email protected]:wickedOne/SymfonyConfigTest.git"
126-
}
127121
}
128122
}

src/Library/Core/Util/ECKey.php

+6-7
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@
1111
use function is_array;
1212
use function is_string;
1313
use const OPENSSL_KEYTYPE_EC;
14-
use const PHP_EOL;
1514
use const STR_PAD_LEFT;
1615

1716
/**
@@ -38,10 +37,10 @@ public static function convertPublicKeyToPEM(JWK $jwk): string
3837
default => throw new InvalidArgumentException('Unsupported curve.'),
3938
};
4039
$der .= self::getKey($jwk);
41-
$pem = '-----BEGIN PUBLIC KEY-----' . PHP_EOL;
42-
$pem .= chunk_split(base64_encode($der), 64, PHP_EOL);
40+
$pem = '-----BEGIN PUBLIC KEY-----' . "\n";
41+
$pem .= chunk_split(base64_encode($der), 64, "\n");
4342

44-
return $pem . ('-----END PUBLIC KEY-----' . PHP_EOL);
43+
return $pem . ('-----END PUBLIC KEY-----' . "\n");
4544
}
4645

4746
public static function convertPrivateKeyToPEM(JWK $jwk): string
@@ -54,10 +53,10 @@ public static function convertPrivateKeyToPEM(JWK $jwk): string
5453
default => throw new InvalidArgumentException('Unsupported curve.'),
5554
};
5655
$der .= self::getKey($jwk);
57-
$pem = '-----BEGIN EC PRIVATE KEY-----' . PHP_EOL;
58-
$pem .= chunk_split(base64_encode($der), 64, PHP_EOL);
56+
$pem = '-----BEGIN EC PRIVATE KEY-----' . "\n";
57+
$pem .= chunk_split(base64_encode($der), 64, "\n");
5958

60-
return $pem . ('-----END EC PRIVATE KEY-----' . PHP_EOL);
59+
return $pem . ('-----END EC PRIVATE KEY-----' . "\n");
6160
}
6261

6362
/**

src/Library/KeyManagement/KeyConverter/KeyConverter.php

+10-11
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,6 @@
2828
use const OPENSSL_KEYTYPE_EC;
2929
use const OPENSSL_KEYTYPE_RSA;
3030
use const OPENSSL_RAW_DATA;
31-
use const PHP_EOL;
3231
use const PREG_PATTERN_ORDER;
3332

3433
/**
@@ -163,11 +162,11 @@ public static function loadFromX5C(array $x5c): array
163162
throw new InvalidArgumentException('The certificate chain is empty');
164163
}
165164
foreach ($x5c as $id => $cert) {
166-
assert(is_string($cert), 'Invalid certificate');
167-
$x5c[$id] = '-----BEGIN CERTIFICATE-----' . PHP_EOL . chunk_split(
165+
assert(is_string($cert), 'Invalid certificate chain');
166+
$x5c[$id] = '-----BEGIN CERTIFICATE-----' . "\n" . chunk_split(
168167
$cert,
169168
64,
170-
PHP_EOL
169+
"\n"
171170
) . '-----END CERTIFICATE-----';
172171
$x509 = openssl_x509_read($x5c[$id]);
173172
if ($x509 === false) {
@@ -403,9 +402,9 @@ private static function sanitizePEM(string &$pem): void
403402

404403
$ciphertext = preg_replace('#-.*-|\r|\n| #', '', $pem);
405404

406-
$pem = $matches[0][0] . PHP_EOL;
407-
$pem .= chunk_split($ciphertext ?? '', 64, PHP_EOL);
408-
$pem .= $matches[0][1] . PHP_EOL;
405+
$pem = $matches[0][0] . "\n";
406+
$pem .= chunk_split($ciphertext ?? '', 64, "\n");
407+
$pem .= $matches[0][1] . "\n";
409408
}
410409

411410
/**
@@ -436,16 +435,16 @@ private static function decodePem(string $pem, array $matches, ?string $password
436435
throw new InvalidArgumentException('Unable to load the key');
437436
}
438437

439-
$pem = $result[0][0] . PHP_EOL;
438+
$pem = $result[0][0] . "\n";
440439
$pem .= chunk_split(base64_encode($decoded), 64);
441440

442-
return $pem . ($result[0][1] . PHP_EOL);
441+
return $pem . ($result[0][1] . "\n");
443442
}
444443

445444
private static function convertDerToPem(string $der_data): string
446445
{
447-
$pem = chunk_split(base64_encode($der_data), 64, PHP_EOL);
446+
$pem = chunk_split(base64_encode($der_data), 64, "\n");
448447

449-
return '-----BEGIN CERTIFICATE-----' . PHP_EOL . $pem . '-----END CERTIFICATE-----' . PHP_EOL;
448+
return '-----BEGIN CERTIFICATE-----' . "\n" . $pem . '-----END CERTIFICATE-----' . "\n";
450449
}
451450
}

src/Library/KeyManagement/X5UFactory.php

+1-2
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@
1212
use function assert;
1313
use function is_array;
1414
use function is_string;
15-
use const PHP_EOL;
1615

1716
class X5UFactory extends UrlKeySetFactory
1817
{
@@ -33,7 +32,7 @@ public function loadFromUrl(string $url, array $header = []): JWKSet
3332
foreach ($data as $kid => $cert) {
3433
assert(is_string($cert), 'Invalid content.');
3534
if (mb_strpos($cert, '-----BEGIN CERTIFICATE-----') === false) {
36-
$cert = '-----BEGIN CERTIFICATE-----' . PHP_EOL . $cert . PHP_EOL . '-----END CERTIFICATE-----';
35+
$cert = '-----BEGIN CERTIFICATE-----' . "\n" . $cert . "\n" . '-----END CERTIFICATE-----';
3736
}
3837
$jwk = KeyConverter::loadKeyFromCertificate($cert);
3938
if (is_string($kid)) {

0 commit comments

Comments
 (0)