
| Current Path : /var/www/html1/testsite/web/core/tests/Drupal/KernelTests/Core/File/ |
Linux ift1.ift-informatik.de 5.4.0-216-generic #236-Ubuntu SMP Fri Apr 11 19:53:21 UTC 2025 x86_64 |
| Current File : /var/www/html1/testsite/web/core/tests/Drupal/KernelTests/Core/File/NameMungingTest.php |
<?php
namespace Drupal\KernelTests\Core\File;
use Drupal\Component\Render\FormattableMarkup;
/**
* Tests filename munging and unmunging.
*
* Checks performed, relying on 2 <= strlen('foo') <= 5.
*
* - testMunging()
* - (name).foo.txt -> (name).foo_.txt when allows_insecure_uploads === 0
* - testMungeBullByte()
* - (name).foo\0.txt -> (name).foo_.txt regardless of allows_insecure_uploads
* - testMungeIgnoreInsecure()
* - (name).foo.txt unmodified when allows_insecure_uploads === 1
* - testMungeIgnoreAllowedExtensions()
* - (name).FOO.txt -> (name).FOO when allowing 'foo'.
* - (name).foo.txt -> (name).foo.txt when allowing 'FOO'.
* - testMungeUnsafe()
* - (name).php.txt -> (name).php_.txt even when allowing 'php txt'
* - (name).php.txt -> (name).php_.txt even when allowing 'php txt'
* - testUnMunge()
* - (name).foo.txt -> (unchecked) -> (name).foo.txt after un-munging
*
* @group File
*/
class NameMungingTest extends FileTestBase {
/**
* An extension to be used as forbidden during munge operations.
*
* @var string
*/
protected $badExtension;
/**
* The name of a file with a bad extension, after munging.
*
* @var string
*/
protected $name;
/**
* The name of a file with an upper-cased bad extension, after munging.
*
* @var string
*/
protected $nameWithUcExt;
protected function setUp() {
parent::setUp();
$this->badExtension = 'foo';
$this->name = $this->randomMachineName() . '.' . $this->badExtension . '.txt';
$this->nameWithUcExt = $this->randomMachineName() . '.' . strtoupper($this->badExtension) . '.txt';
}
/**
* Create a file and munge/unmunge the name.
*/
public function testMunging() {
// Disable insecure uploads.
$this->config('system.file')->set('allow_insecure_uploads', 0)->save();
$munged_name = file_munge_filename($this->name, '', TRUE);
$messages = \Drupal::messenger()->all();
\Drupal::messenger()->deleteAll();
$this->assertContains(strtr('For security reasons, your upload has been renamed to <em class="placeholder">%filename</em>.', ['%filename' => $munged_name]), $messages['status'], 'Alert properly set when a file is renamed.');
$this->assertNotEqual($munged_name, $this->name, new FormattableMarkup('The new filename (%munged) has been modified from the original (%original)', ['%munged' => $munged_name, '%original' => $this->name]));
}
/**
* Tests munging with a null byte in the filename.
*/
public function testMungeNullByte() {
$prefix = $this->randomMachineName();
$filename = $prefix . '.' . $this->badExtension . "\0.txt";
$this->assertEqual(file_munge_filename($filename, ''), $prefix . '.' . $this->badExtension . '_.txt', 'A filename with a null byte is correctly munged to remove the null byte.');
}
/**
* If the system.file.allow_insecure_uploads setting evaluates to true, the file should
* come out untouched, no matter how evil the filename.
*/
public function testMungeIgnoreInsecure() {
$this->config('system.file')->set('allow_insecure_uploads', 1)->save();
$munged_name = file_munge_filename($this->name, '');
$this->assertSame($munged_name, $this->name, new FormattableMarkup('The original filename (%original) matches the munged filename (%munged) when insecure uploads are enabled.', ['%munged' => $munged_name, '%original' => $this->name]));
}
/**
* Tests that allowed extensions are ignored by file_munge_filename().
*/
public function testMungeIgnoreAllowedExtensions() {
// Declare that our extension is allowed. The declared extensions should be
// case insensitive, so test using one with a different case.
$munged_name = file_munge_filename($this->nameWithUcExt, $this->badExtension);
$this->assertSame($munged_name, $this->nameWithUcExt);
// The allowed extensions should also be normalized.
$munged_name = file_munge_filename($this->name, strtoupper($this->badExtension));
$this->assertSame($munged_name, $this->name);
}
/**
* Tests unsafe extensions are always munged by file_munge_filename().
*/
public function testMungeUnsafe() {
$prefix = $this->randomMachineName();
$name = "$prefix.php.txt";
// Put the php extension in the allowed list, but since it is in the unsafe
// extension list, it should still be munged.
$munged_name = file_munge_filename($name, 'php txt');
$this->assertSame("$prefix.php_.txt", $munged_name);
}
/**
* Ensure that unmunge gets your name back.
*/
public function testUnMunge() {
$munged_name = file_munge_filename($this->name, '', FALSE);
$unmunged_name = file_unmunge_filename($munged_name);
$this->assertSame($unmunged_name, $this->name, new FormattableMarkup('The unmunged (%unmunged) filename matches the original (%original)', ['%unmunged' => $unmunged_name, '%original' => $this->name]));
}
}