assert_equal(array(1024, 768, "image/jpeg", "jpg"), photo::get_file_metadata($photo->file_path())); } public function get_file_metadata_with_non_existent_file_test() { try { $metadata = photo::get_file_metadata(MODPATH . "gallery/tests/this_does_not_exist"); $this->assert_true(false, "Shouldn't get here"); } catch (Exception $e) { // pass } } public function get_file_metadata_with_no_extension_test() { copy(MODPATH . "gallery/tests/test.jpg", TMPPATH . "test_jpg_with_no_extension"); $this->assert_equal(array(1024, 768, "image/jpeg", "jpg"), photo::get_file_metadata(TMPPATH . "test_jpg_with_no_extension")); } public function get_file_metadata_with_illegal_extension_test() { $this->assert_equal(array(0, 0, null, null), photo::get_file_metadata(MODPATH . "gallery/tests/Photo_Helper_Test.php")); } public function get_file_metadata_with_illegal_extension_but_valid_file_contents_test() { // This ensures that we correctly "re-type" files with invalid extensions if the contents // themselves are valid. This is needed to ensure that issues similar to those corrected by // ticket #1855, where an image that looked valid (header said jpg) with a php extension was // previously accepted without changing its extension, do not arise and cause security issues. copy(MODPATH . "gallery/tests/test.jpg", TMPPATH . "test_jpg_with_php_extension.php"); $this->assert_equal(array(1024, 768, "image/jpeg", "jpg"), photo::get_file_metadata(TMPPATH . "test_jpg_with_php_extension.php")); } }