Skip to content

Instantly share code, notes, and snippets.

@yingmu52
Forked from dschuetz/make_passbook.py
Created April 24, 2018 21:22
Show Gist options
  • Save yingmu52/97077411189168c02eae6802ca0c54fb to your computer and use it in GitHub Desktop.
Save yingmu52/97077411189168c02eae6802ca0c54fb to your computer and use it in GitHub Desktop.
Simple hack to create Passbook .pkpass file
import sys, os.path, hashlib, re
import zipfile
import subprocess
from StringIO import StringIO
from io import BytesIO
#
# Passbook Hack
# David Schuetz
# 30 May 2014
#
# Simple hack that builds a Passbook .pkpass file.
# Requires openssl to perform S/MIME detached signature.
# Requires Apple WWDR CA Cert, and Apple Developer Cert / Key that
# matches the passbook ID within the pass.json file.
#
#
# 1. Go to provisioning profile, create a new Pass Type ID
# 2. Download genereated pass.cer file and import into Keychain
# 3. Export as Certificates.p12
# 4. Split out key and cert:
# openssl pkcs12 -in Certificates.p12 -clcerts -nokeys -out passcert.pem
# openssl pkcs12 -in Certificates.p12 -nocerts -out passkey.pem
# 5. Download Apple WWDR certificate:
# http://developer.apple.com/certificationauthority/AppleWWDRCA.cer
# Export from Keychain to wwdr.pem
# 6. Put supporting files in a new folder called "components"
# logo.png, [email protected], thumbnail.png, [email protected], etc.
# (see "files" list below)
# 7. Move the .pem files into components
# 8. Create components/pass.json with the contents of the passbook pass
# 9. Run the script. Cross your fingers.
#
# For detailed Passbook documentation, see the official Apple docs:
# https://developer.apple.com/library/ios/documentation/UserExperience/Conceptual/PassKit_PG/Chapters/Introduction.html
#
# to hash the manifest:
# shasum manifest
# to manually parse the signature:
# openssl asn1parse -in signature -inform der
# you should see the shasum in there somewhere (under :messageDigest)
# to manually verify the signature:
# openssl smime -verify -in signature -content manifest.json -inform der -noverify
# the "-noverify" means to not verify the entire CA chain, just check the
# message signature vs the content, using the certs embeeded in signature
#
APP_MEDIA_DIR = './components/'
WWDR_FILENAME = APP_MEDIA_DIR + 'Apple_WWDR.pem'
PASS_KEY_FILENAME = APP_MEDIA_DIR + 'passkey.pem'
PASS_CERT_FILENAME = APP_MEDIA_DIR + 'passcert.pem'
files = ('pass.json', 'logo.png', '[email protected]', 'icon.png', '[email protected]',
'thumbnail.png', '[email protected]')
#
# load supporting files, hash 'em, build up manifest
#
file_data = {}
file_hashes = {}
manifest = '{\n'
for file in files:
f = open(APP_MEDIA_DIR + file, 'r')
data = f.read()
f.close()
filename = os.path.basename(file)
file_data[filename] = data
file_hashes[filename] = hashlib.sha1(data).hexdigest()
manifest += ' "%s":"%s",\n' % (filename, file_hashes[filename])
manifest += '}\n'
#
# write the manifest to manifest.json
#
f = open(APP_MEDIA_DIR + 'manifest.json', 'w')
f.write(manifest)
f.close()
#
# sign the manifest, save as a detatched binary DER signature in "signature"
#
cmd = '/usr/bin/openssl smime -sign -signer %s -inkey %s -certfile %s -in %smanifest -out %ssignature -outform der -binary' % (PASS_CERT_FILENAME, PASS_KEY_FILENAME, WWDR_FILENAME, APP_MEDIA_DIR, APP_MEDIA_DIR )
print cmd
subprocess.call(cmd, shell=True)
#
# add manifest and signature to the list of files
#
for file in ['manifest.json', 'signature']:
f = open(APP_MEDIA_DIR + file, 'r')
data = f.read()
f.close()
filename = os.path.basename(file)
file_data[filename] = data
file_hashes[filename] = hashlib.sha1(data).hexdigest()
#
# put all the files into a zip file
#
zipdata = BytesIO()
zip = zipfile.ZipFile(zipdata, 'w')
for filename, data in file_data.items():
zip.writestr(filename, data)
#
# and write the zip file to pass.pkpass
#
f = open('pass.pkpass', 'w')
f.write(zipdata.getvalue())
f.close()
@mamunme12
Copy link

For me when I try to open the .pkpass file it doesn't open. So I have run this command :

openssl smime -verify -in signature -content manifest.json -inform der

To verify the signature without "-noverify"
and I got this error:

Verification failure 0066E80D01000000:error:16000069:STORE routines:ossl_store_get0_loader_int:unregistered scheme:crypto/store/store_register.c:237:scheme=file 0066E80D01000000:error:80000002:system library:file_open:No such file or directory:providers/implementations/storemgmt/file_store.c:267:calling stat(/usr/local/etc/openssl@3/certs) 0066E80D01000000:error:16000069:STORE routines:ossl_store_get0_loader_int:unregistered scheme:crypto/store/store_register.c:237:scheme=file 0066E80D01000000:error:80000002:system library:file_open:No such file or directory:providers/implementations/storemgmt/file_store.c:267:calling stat(/usr/local/etc/openssl@3/certs) 0066E80D01000000:error:10800075:PKCS7 routines:PKCS7_verify:certificate verify error:crypto/pkcs7/pk7_smime.c:295:Verify error: unable to get local issuer certificate

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment