View source
<?php
namespace Drupal\image\Tests;
use Drupal\simpletest\WebTestBase;
class ImageStylesPathAndUrlTest extends WebTestBase {
public static $modules = array(
'image',
'image_module_test',
);
protected $style;
protected function setUp() {
parent::setUp();
$this->style = entity_create('image_style', array(
'name' => 'style_foo',
'label' => $this
->randomString(),
));
$this->style
->save();
}
function testImageStylePath() {
$scheme = 'public';
$actual = $this->style
->buildUri("{$scheme}://foo/bar.gif");
$expected = "{$scheme}://styles/" . $this->style
->id() . "/{$scheme}/foo/bar.gif";
$this
->assertEqual($actual, $expected, 'Got the path for a file URI.');
$actual = $this->style
->buildUri('foo/bar.gif');
$expected = "{$scheme}://styles/" . $this->style
->id() . "/{$scheme}/foo/bar.gif";
$this
->assertEqual($actual, $expected, 'Got the path for a relative file path.');
}
function testImageStyleUrlAndPathPublic() {
$this
->doImageStyleUrlAndPathTests('public');
}
function testImageStyleUrlAndPathPrivate() {
$this
->doImageStyleUrlAndPathTests('private');
}
function testImageStyleUrlAndPathPublicUnclean() {
$this
->doImageStyleUrlAndPathTests('public', FALSE);
}
function testImageStyleUrlAndPathPrivateUnclean() {
$this
->doImageStyleUrlAndPathTests('private', FALSE);
}
function testImageStyleUrlExtraSlash() {
$this
->doImageStyleUrlAndPathTests('public', TRUE, TRUE);
}
function testImageStyleUrlForMissingSourceImage() {
$non_existent_uri = 'public://foo.png';
$generated_url = $this->style
->buildUrl($non_existent_uri);
$this
->drupalGet($generated_url);
$this
->assertResponse(404, 'Accessing an image style URL with a source image that does not exist provides a 404 error response.');
}
function doImageStyleUrlAndPathTests($scheme, $clean_url = TRUE, $extra_slash = FALSE) {
$this
->prepareRequestForGenerator($clean_url);
$this
->config('system.file')
->set('default_scheme', 'temporary')
->save();
$directory = $scheme . '://styles/' . $this->style
->id();
$status = file_prepare_directory($directory, FILE_CREATE_DIRECTORY);
$this
->assertNotIdentical(FALSE, $status, 'Created the directory for the generated images for the test style.');
$files = $this
->drupalGetTestFiles('image');
$file = array_shift($files);
$original_uri = file_unmanaged_copy($file->uri, $scheme . '://', FILE_EXISTS_RENAME);
\Drupal::state()
->set('image.test_file_download', $original_uri);
$this
->assertNotIdentical(FALSE, $original_uri, 'Created the generated image file.');
$generated_uri = $this->style
->buildUri($original_uri);
$this
->assertFalse(file_exists($generated_uri), 'Generated file does not exist.');
$generate_url = $this->style
->buildUrl($original_uri, $clean_url);
if ($extra_slash) {
$modified_uri = str_replace('://', ':///', $original_uri);
$this
->assertNotEqual($original_uri, $modified_uri, 'An extra slash was added to the generated file URI.');
$generate_url = $this->style
->buildUrl($modified_uri, $clean_url);
}
if (!$clean_url) {
$this
->assertTrue(strpos($generate_url, 'index.php/') !== FALSE, 'When using non-clean URLS, the system path contains the script name.');
}
$this
->drupalGet(str_replace(IMAGE_DERIVATIVE_TOKEN . '=', IMAGE_DERIVATIVE_TOKEN . '=Zo', $generate_url));
$this
->assertResponse(403, 'Image was inaccessible at the URL with an invalid token.');
$this
->drupalGet(str_replace(IMAGE_DERIVATIVE_TOKEN . '=', 'wrongparam=', $generate_url));
$this
->assertResponse(403, 'Image was inaccessible at the URL with a missing token.');
$this
->config('system.file')
->set('default_scheme', $scheme)
->save();
$relative_path = file_uri_target($original_uri);
$generate_url_from_relative_path = $this->style
->buildUrl($relative_path, $clean_url);
$this
->assertEqual($generate_url, $generate_url_from_relative_path);
$this
->config('system.file')
->set('default_scheme', 'temporary')
->save();
$this
->drupalGet($generate_url);
$this
->assertResponse(200, 'Image was generated at the URL.');
$this
->assertTrue(file_exists($generated_uri), 'Generated file does exist after we accessed it.');
$this
->assertRaw(file_get_contents($generated_uri), 'URL returns expected file.');
$image = $this->container
->get('image.factory')
->get($generated_uri);
$this
->assertEqual($this
->drupalGetHeader('Content-Type'), $image
->getMimeType(), 'Expected Content-Type was reported.');
$this
->assertEqual($this
->drupalGetHeader('Content-Length'), $image
->getFileSize(), 'Expected Content-Length was reported.');
if ($scheme == 'private') {
$this
->assertEqual($this
->drupalGetHeader('Expires'), 'Sun, 19 Nov 1978 05:00:00 GMT', 'Expires header was sent.');
$this
->assertNotEqual(strpos($this
->drupalGetHeader('Cache-Control'), 'no-cache'), FALSE, 'Cache-Control header contains \'no-cache\' to prevent caching.');
$this
->assertEqual($this
->drupalGetHeader('X-Image-Owned-By'), 'image_module_test', 'Expected custom header has been added.');
$this
->drupalGet($generate_url);
$this
->assertResponse(200, 'Image was generated at the URL.');
\Drupal::state()
->delete('image.test_file_download');
$this
->drupalGet($generate_url);
$this
->assertResponse(403, 'Confirmed that access is denied for the private image style.');
$file_noaccess = array_shift($files);
$original_uri_noaccess = file_unmanaged_copy($file_noaccess->uri, $scheme . '://', FILE_EXISTS_RENAME);
$generated_uri_noaccess = $scheme . '://styles/' . $this->style
->id() . '/' . $scheme . '/' . drupal_basename($original_uri_noaccess);
$this
->assertFalse(file_exists($generated_uri_noaccess), 'Generated file does not exist.');
$generate_url_noaccess = $this->style
->buildUrl($original_uri_noaccess);
$this
->drupalGet($generate_url_noaccess);
$this
->assertResponse(403, 'Confirmed that access is denied for the private image style.');
if (strpos($generate_url, '.png') === FALSE) {
$this
->fail('Confirming that private image styles are not appended require PNG file.');
}
else {
$this
->assertNoRaw(chr(137) . chr(80) . chr(78) . chr(71) . chr(13) . chr(10) . chr(26) . chr(10), 'No PNG signature found in the response body.');
}
}
else {
$this
->assertEqual($this
->drupalGetHeader('Expires'), 'Sun, 19 Nov 1978 05:00:00 GMT', 'Expires header was sent.');
$this
->assertEqual(strpos($this
->drupalGetHeader('Cache-Control'), 'no-cache'), FALSE, 'Cache-Control header contains \'no-cache\' to prevent caching.');
if ($clean_url) {
$this
->drupalGet(str_replace(IMAGE_DERIVATIVE_TOKEN . '=', IMAGE_DERIVATIVE_TOKEN . '=Zo', $generate_url));
$this
->assertResponse(200, 'Existing image was accessible at the URL with an invalid token.');
}
}
$this
->config('image.settings')
->set('allow_insecure_derivatives', TRUE)
->save();
$files = $this
->drupalGetTestFiles('image');
$file = array_shift($files);
$original_uri = file_unmanaged_copy($file->uri, $scheme . '://', FILE_EXISTS_RENAME);
\Drupal::state()
->set('image.test_file_download', $original_uri);
$this
->config('image.settings')
->set('suppress_itok_output', TRUE)
->save();
$generated_uri = $this->style
->buildUri($original_uri);
$this
->assertFalse(file_exists($generated_uri), 'Generated file does not exist.');
$generate_url = $this->style
->buildUrl($original_uri, $clean_url);
$this
->assertIdentical(strpos($generate_url, IMAGE_DERIVATIVE_TOKEN . '='), FALSE, 'The security token does not appear in the image style URL.');
$this
->drupalGet($generate_url);
$this
->assertResponse(200, 'Image was accessible at the URL with a missing token.');
$this
->config('image.settings')
->set('suppress_itok_output', FALSE)
->save();
$this
->assertEqual($this
->config('image.settings')
->get('allow_insecure_derivatives'), TRUE);
$nested_url = $this->style
->buildUrl($generated_uri, $clean_url);
$matches_expected_url_format = (bool) preg_match('/styles\\/' . $this->style
->id() . '\\/' . $scheme . '\\/styles\\/' . $this->style
->id() . '\\/' . $scheme . '/', $nested_url);
$this
->assertTrue($matches_expected_url_format, "Url for a derivative of an image style matches expected format.");
$nested_url_with_wrong_token = str_replace(IMAGE_DERIVATIVE_TOKEN . '=', 'wrongparam=', $nested_url);
$this
->drupalGet($nested_url_with_wrong_token);
$this
->assertResponse(403, 'Image generated from an earlier derivative was inaccessible at the URL with a missing token.');
$this
->drupalGet(substr_replace($nested_url_with_wrong_token, '//styles/', strrpos($nested_url_with_wrong_token, '/styles/'), strlen('/styles/')));
$this
->assertResponse(403, 'Image generated from an earlier derivative was inaccessible at the URL with a missing token, even with an extra forward slash in the URL.');
$this
->drupalGet(substr_replace($nested_url_with_wrong_token, '////styles/', strrpos($nested_url_with_wrong_token, '/styles/'), strlen('/styles/')));
$this
->assertResponse(403, 'Image generated from an earlier derivative was inaccessible at the URL with a missing token, even with multiple forward slashes in the URL.');
$this
->drupalGet($nested_url);
$this
->assertResponse(200, 'Image was accessible when a correct token was provided in the URL.');
$directory = $scheme . '://styles/' . $this->style
->id() . '/' . $scheme . '/' . $this
->randomMachineName();
$this
->drupalGet(file_create_url($directory . '/' . $this
->randomString()));
$this
->assertFalse(file_exists($directory), 'New directory was not created in the filesystem when requesting an unauthorized image.');
}
}