2006-06-08 04:22:16 +02:00
< ? php
2008-09-12 06:29:09 +02:00
/**
2015-09-22 15:03:24 +02:00
* Core User API
2008-09-12 06:29:09 +02:00
*
* @ package WordPress
2014-03-02 20:40:14 +01:00
* @ subpackage Users
2015-11-20 08:24:30 +01:00
*/
/**
2016-02-07 09:11:25 +01:00
* Authenticates and logs a user in with 'remember' capability .
2015-11-20 08:24:30 +01:00
*
* The credentials is an array that has 'user_login' , 'user_password' , and
* 'remember' indices . If the credentials is not given , then the log in form
* will be assumed and used if set .
*
* The various authentication cookies will be set by this function and will be
* set for a longer period depending on if the 'remember' credential is set to
* true .
*
2017-06-25 22:08:40 +02:00
* Note : wp_signon () doesn ' t handle setting the current user . This means that if the
* function is called before the { @ see 'init' } hook is fired , is_user_logged_in () will
* evaluate as false until that point . If is_user_logged_in () is needed in conjunction
* with wp_signon (), wp_set_current_user () should be called explicitly .
*
2015-11-20 08:24:30 +01:00
* @ since 2.5 . 0
*
* @ global string $auth_secure_cookie
*
* @ param array $credentials Optional . User info in order to sign on .
* @ param string | bool $secure_cookie Optional . Whether to use secure cookie .
* @ return WP_User | WP_Error WP_User on success , WP_Error on failure .
*/
function wp_signon ( $credentials = array (), $secure_cookie = '' ) {
2017-12-01 00:11:00 +01:00
if ( empty ( $credentials ) ) {
2016-06-14 17:34:29 +02:00
$credentials = array (); // Back-compat for plugins passing an empty string.
2017-12-01 00:11:00 +01:00
if ( ! empty ( $_POST [ 'log' ] ) ) {
2019-11-03 21:12:02 +01:00
$credentials [ 'user_login' ] = wp_unslash ( $_POST [ 'log' ] );
2017-12-01 00:11:00 +01:00
}
if ( ! empty ( $_POST [ 'pwd' ] ) ) {
2015-11-20 08:24:30 +01:00
$credentials [ 'user_password' ] = $_POST [ 'pwd' ];
2017-12-01 00:11:00 +01:00
}
if ( ! empty ( $_POST [ 'rememberme' ] ) ) {
2015-11-20 08:24:30 +01:00
$credentials [ 'remember' ] = $_POST [ 'rememberme' ];
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
}
2017-12-01 00:11:00 +01:00
if ( ! empty ( $credentials [ 'remember' ] ) ) {
2015-11-20 08:24:30 +01:00
$credentials [ 'remember' ] = true ;
2017-12-01 00:11:00 +01:00
} else {
2015-11-20 08:24:30 +01:00
$credentials [ 'remember' ] = false ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
/**
* Fires before the user is authenticated .
*
* The variables passed to the callbacks are passed by reference ,
* and can be modified by callback functions .
*
* @ since 1.5 . 1
*
* @ todo Decide whether to deprecate the wp_authenticate action .
*
2017-10-03 00:14:46 +02:00
* @ param string $user_login Username ( passed by reference ) .
* @ param string $user_password User password ( passed by reference ) .
2015-11-20 08:24:30 +01:00
*/
do_action_ref_array ( 'wp_authenticate' , array ( & $credentials [ 'user_login' ], & $credentials [ 'user_password' ] ) );
2017-12-01 00:11:00 +01:00
if ( '' === $secure_cookie ) {
2015-11-20 08:24:30 +01:00
$secure_cookie = is_ssl ();
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
/**
2016-05-22 20:30:27 +02:00
* Filters whether to use a secure sign - on cookie .
2015-11-20 08:24:30 +01:00
*
* @ since 3.1 . 0
*
* @ param bool $secure_cookie Whether to use a secure sign - on cookie .
* @ param array $credentials {
2017-12-01 00:11:00 +01:00
* Array of entered sign - on data .
*
* @ type string $user_login Username .
* @ type string $user_password Password entered .
2015-11-20 08:24:30 +01:00
* @ type bool $remember Whether to 'remember' the user . Increases the time
* that the cookie will be kept . Default false .
2017-12-01 00:11:00 +01:00
* }
2015-11-20 08:24:30 +01:00
*/
$secure_cookie = apply_filters ( 'secure_signon_cookie' , $secure_cookie , $credentials );
2020-01-29 01:45:18 +01:00
global $auth_secure_cookie ; // XXX ugly hack to pass this to wp_authenticate_cookie().
2015-11-20 08:24:30 +01:00
$auth_secure_cookie = $secure_cookie ;
2017-12-01 00:11:00 +01:00
add_filter ( 'authenticate' , 'wp_authenticate_cookie' , 30 , 3 );
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
$user = wp_authenticate ( $credentials [ 'user_login' ], $credentials [ 'user_password' ] );
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
if ( is_wp_error ( $user ) ) {
2015-11-20 08:24:30 +01:00
return $user ;
}
2017-12-01 00:11:00 +01:00
wp_set_auth_cookie ( $user -> ID , $credentials [ 'remember' ], $secure_cookie );
2015-11-20 08:24:30 +01:00
/**
* Fires after the user has successfully logged in .
*
* @ since 1.5 . 0
*
* @ param string $user_login Username .
* @ param WP_User $user WP_User object of the logged - in user .
*/
do_action ( 'wp_login' , $user -> user_login , $user );
return $user ;
}
/**
2016-01-09 21:52:27 +01:00
* Authenticate a user , confirming the username and password are valid .
2015-11-20 08:24:30 +01:00
*
* @ since 2.8 . 0
*
* @ param WP_User | WP_Error | null $user WP_User or WP_Error object from a previous callback . Default null .
* @ param string $username Username for authentication .
* @ param string $password Password for authentication .
* @ return WP_User | WP_Error WP_User on success , WP_Error on failure .
*/
2017-12-01 00:11:00 +01:00
function wp_authenticate_username_password ( $user , $username , $password ) {
2015-11-20 08:24:30 +01:00
if ( $user instanceof WP_User ) {
return $user ;
}
2017-12-01 00:11:00 +01:00
if ( empty ( $username ) || empty ( $password ) ) {
if ( is_wp_error ( $user ) ) {
2015-11-20 08:24:30 +01:00
return $user ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
$error = new WP_Error ();
2017-12-01 00:11:00 +01:00
if ( empty ( $username ) ) {
2020-06-21 16:00:09 +02:00
$error -> add ( 'empty_username' , __ ( '<strong>Error</strong>: The username field is empty.' ) );
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
if ( empty ( $password ) ) {
2020-06-21 16:00:09 +02:00
$error -> add ( 'empty_password' , __ ( '<strong>Error</strong>: The password field is empty.' ) );
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
return $error ;
}
2017-12-01 00:11:00 +01:00
$user = get_user_by ( 'login' , $username );
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
if ( ! $user ) {
return new WP_Error (
'invalid_username' ,
2021-03-26 13:14:07 +01:00
__ ( '<strong>Error</strong>: Unknown username. Check again or try your email address.' )
2015-11-20 08:24:30 +01:00
);
}
/**
2016-05-22 20:30:27 +02:00
* Filters whether the given user can be authenticated with the provided $password .
2015-11-20 08:24:30 +01:00
*
* @ since 2.5 . 0
*
* @ param WP_User | WP_Error $user WP_User or WP_Error object if a previous
* callback failed authentication .
* @ param string $password Password to check against the user .
*/
$user = apply_filters ( 'wp_authenticate_user' , $user , $password );
2017-12-01 00:11:00 +01:00
if ( is_wp_error ( $user ) ) {
2015-11-20 08:24:30 +01:00
return $user ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
if ( ! wp_check_password ( $password , $user -> user_pass , $user -> ID ) ) {
2017-12-01 00:11:00 +01:00
return new WP_Error (
'incorrect_password' ,
2015-11-20 08:24:30 +01:00
sprintf (
2019-09-03 02:41:05 +02:00
/* translators: %s: User name. */
2020-06-21 16:00:09 +02:00
__ ( '<strong>Error</strong>: The password you entered for the username %s is incorrect.' ),
2015-11-20 08:24:30 +01:00
'<strong>' . $username . '</strong>'
) .
' <a href="' . wp_lostpassword_url () . '">' .
__ ( 'Lost your password?' ) .
'</a>'
);
}
return $user ;
}
2016-02-23 00:15:27 +01:00
/**
2016-03-16 17:18:27 +01:00
* Authenticates a user using the email and password .
2016-02-23 00:15:27 +01:00
*
* @ since 4.5 . 0
*
* @ param WP_User | WP_Error | null $user WP_User or WP_Error object if a previous
* callback failed authentication .
* @ param string $email Email address for authentication .
* @ param string $password Password for authentication .
* @ return WP_User | WP_Error WP_User on success , WP_Error on failure .
*/
function wp_authenticate_email_password ( $user , $email , $password ) {
if ( $user instanceof WP_User ) {
return $user ;
}
if ( empty ( $email ) || empty ( $password ) ) {
if ( is_wp_error ( $user ) ) {
return $user ;
}
$error = new WP_Error ();
if ( empty ( $email ) ) {
2020-01-29 01:45:18 +01:00
// Uses 'empty_username' for back-compat with wp_signon().
2020-06-21 16:00:09 +02:00
$error -> add ( 'empty_username' , __ ( '<strong>Error</strong>: The email field is empty.' ) );
2016-02-23 00:15:27 +01:00
}
if ( empty ( $password ) ) {
2020-06-21 16:00:09 +02:00
$error -> add ( 'empty_password' , __ ( '<strong>Error</strong>: The password field is empty.' ) );
2016-02-23 00:15:27 +01:00
}
return $error ;
}
if ( ! is_email ( $email ) ) {
return $user ;
}
$user = get_user_by ( 'email' , $email );
if ( ! $user ) {
2017-12-01 00:11:00 +01:00
return new WP_Error (
'invalid_email' ,
Accessibility: Login and Registration: Improve the invalid username and invalid email messages.
- explicitly informs users they can use their email to log in as an alternative to their username and vice-versa
- shows the `Lost your password?` link only when an wrong password has been entered
- uses a more appropriate copy by changing "invalid" to "unknown"
- removes the all caps `ERROR`
Props subrataemfluence, zalak151291, ryokuhi, SergeyBiryukov, audrasjb, joedolson, marybaum, ramiy, markjaquith, chanthaboune, afercia.
Fixes #43037.
Built from https://develop.svn.wordpress.org/trunk@46417
git-svn-id: http://core.svn.wordpress.org/trunk@46215 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2019-10-07 13:54:05 +02:00
__ ( 'Unknown email address. Check again or try your username.' )
2016-02-23 00:15:27 +01:00
);
}
/** This filter is documented in wp-includes/user.php */
$user = apply_filters ( 'wp_authenticate_user' , $user , $password );
if ( is_wp_error ( $user ) ) {
return $user ;
}
if ( ! wp_check_password ( $password , $user -> user_pass , $user -> ID ) ) {
2017-12-01 00:11:00 +01:00
return new WP_Error (
'incorrect_password' ,
2016-02-23 00:15:27 +01:00
sprintf (
2019-09-03 02:41:05 +02:00
/* translators: %s: Email address. */
2020-06-21 16:00:09 +02:00
__ ( '<strong>Error</strong>: The password you entered for the email address %s is incorrect.' ),
2016-02-23 00:15:27 +01:00
'<strong>' . $email . '</strong>'
) .
' <a href="' . wp_lostpassword_url () . '">' .
__ ( 'Lost your password?' ) .
'</a>'
);
}
return $user ;
}
2015-11-20 08:24:30 +01:00
/**
* Authenticate the user using the WordPress auth cookie .
*
* @ since 2.8 . 0
*
* @ global string $auth_secure_cookie
*
* @ param WP_User | WP_Error | null $user WP_User or WP_Error object from a previous callback . Default null .
* @ param string $username Username . If not empty , cancels the cookie authentication .
* @ param string $password Password . If not empty , cancels the cookie authentication .
* @ return WP_User | WP_Error WP_User on success , WP_Error on failure .
*/
2017-12-01 00:11:00 +01:00
function wp_authenticate_cookie ( $user , $username , $password ) {
2015-11-20 08:24:30 +01:00
if ( $user instanceof WP_User ) {
return $user ;
}
2017-12-01 00:11:00 +01:00
if ( empty ( $username ) && empty ( $password ) ) {
2015-11-20 08:24:30 +01:00
$user_id = wp_validate_auth_cookie ();
2017-12-01 00:11:00 +01:00
if ( $user_id ) {
return new WP_User ( $user_id );
}
2015-11-20 08:24:30 +01:00
global $auth_secure_cookie ;
2017-12-01 00:11:00 +01:00
if ( $auth_secure_cookie ) {
2015-11-20 08:24:30 +01:00
$auth_cookie = SECURE_AUTH_COOKIE ;
2017-12-01 00:11:00 +01:00
} else {
2015-11-20 08:24:30 +01:00
$auth_cookie = AUTH_COOKIE ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
if ( ! empty ( $_COOKIE [ $auth_cookie ] ) ) {
return new WP_Error ( 'expired_session' , __ ( 'Please log in again.' ) );
}
2015-11-20 08:24:30 +01:00
// If the cookie is not set, be silent.
}
return $user ;
}
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
/**
* Authenticates the user using an application password .
*
* @ since 5.6 . 0
*
* @ param WP_User | WP_Error | null $input_user WP_User or WP_Error object if a previous
* callback failed authentication .
* @ param string $username Username for authentication .
* @ param string $password Password for authentication .
2020-12-11 00:53:07 +01:00
* @ return WP_User | WP_Error | null WP_User on success , WP_Error on failure , null if
* null is passed in and this isn ' t an API request .
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
*/
function wp_authenticate_application_password ( $input_user , $username , $password ) {
if ( $input_user instanceof WP_User ) {
return $input_user ;
}
App Passwords: Prevent conflicts when Basic Auth is already used by the site.
Application Passwords uses Basic Authentication to transfer authentication details. If the site is already using Basic Auth, for instance to implement a private staging environment, then the REST API will treat this as an authentication attempt and would end up generating an error for any REST API request.
Now, Application Password authentication will only be attempted if Application Passwords is in use by a site. This is flagged by setting an option whenever an Application Password is created. An upgrade routine is added to set this option if any App Passwords already exist.
Lastly, creating an Application Password will be prevented if the site appears to already be using Basic Authentication.
Props chexwarrior, georgestephanis, adamsilverstein, helen, Clorith, marybaum, TimothyBlynJacobs.
Fixes #51939.
Built from https://develop.svn.wordpress.org/trunk@49752
git-svn-id: http://core.svn.wordpress.org/trunk@49475 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-12-04 22:44:07 +01:00
if ( ! WP_Application_Passwords :: is_in_use () ) {
return $input_user ;
}
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
$is_api_request = ( ( defined ( 'XMLRPC_REQUEST' ) && XMLRPC_REQUEST ) || ( defined ( 'REST_REQUEST' ) && REST_REQUEST ) );
/**
* Filters whether this is an API request that Application Passwords can be used on .
*
* By default , Application Passwords is available for the REST API and XML - RPC .
*
* @ since 5.6 . 0
*
* @ param bool $is_api_request If this is an acceptable API request .
*/
$is_api_request = apply_filters ( 'application_password_is_api_request' , $is_api_request );
if ( ! $is_api_request ) {
return $input_user ;
}
$error = null ;
$user = get_user_by ( 'login' , $username );
if ( ! $user && is_email ( $username ) ) {
$user = get_user_by ( 'email' , $username );
}
// If the login name is invalid, short circuit.
if ( ! $user ) {
if ( is_email ( $username ) ) {
$error = new WP_Error (
'invalid_email' ,
2021-03-26 13:14:07 +01:00
__ ( '<strong>Error</strong>: Unknown email address. Check again or try your username.' )
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
);
} else {
$error = new WP_Error (
'invalid_username' ,
2021-03-26 13:14:07 +01:00
__ ( '<strong>Error</strong>: Unknown username. Check again or try your email address.' )
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
);
}
2020-11-16 23:42:04 +01:00
} elseif ( ! wp_is_application_passwords_available () ) {
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
$error = new WP_Error (
'application_passwords_disabled' ,
2020-11-17 11:21:08 +01:00
__ ( 'Application passwords are not available.' )
2020-11-16 23:42:04 +01:00
);
} elseif ( ! wp_is_application_passwords_available_for_user ( $user ) ) {
$error = new WP_Error (
'application_passwords_disabled_for_user' ,
__ ( 'Application passwords are not available for your account. Please contact the site administrator for assistance.' )
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
);
}
if ( $error ) {
/**
* Fires when an application password failed to authenticate the user .
*
* @ since 5.6 . 0
*
* @ param WP_Error $error The authentication error .
*/
do_action ( 'application_password_failed_authentication' , $error );
return $error ;
}
/*
* Strip out anything non - alphanumeric . This is so passwords can be used with
* or without spaces to indicate the groupings for readability .
*
* Generated application passwords are exclusively alphanumeric .
*/
$password = preg_replace ( '/[^a-z\d]/i' , '' , $password );
$hashed_passwords = WP_Application_Passwords :: get_user_application_passwords ( $user -> ID );
foreach ( $hashed_passwords as $key => $item ) {
if ( ! wp_check_password ( $password , $item [ 'password' ], $user -> ID ) ) {
continue ;
}
$error = new WP_Error ();
/**
* Fires when an application password has been successfully checked as valid .
*
* This allows for plugins to add additional constraints to prevent an application password from being used .
*
* @ since 5.6 . 0
*
* @ param WP_Error $error The error object .
* @ param WP_User $user The user authenticating .
* @ param array $item The details about the application password .
* @ param string $password The raw supplied password .
*/
do_action ( 'wp_authenticate_application_password_errors' , $error , $user , $item , $password );
if ( is_wp_error ( $error ) && $error -> has_errors () ) {
/** This action is documented in wp-includes/user.php */
do_action ( 'application_password_failed_authentication' , $error );
return $error ;
}
WP_Application_Passwords :: record_application_password_usage ( $user -> ID , $item [ 'uuid' ] );
/**
* Fires after an application password was used for authentication .
*
* @ since 5.6 . 0
*
* @ param WP_User $user The user who was authenticated .
* @ param array $item The application password used .
*/
do_action ( 'application_password_did_authenticate' , $user , $item );
return $user ;
}
$error = new WP_Error (
'incorrect_password' ,
__ ( 'The provided password is an invalid application password.' )
);
/** This action is documented in wp-includes/user.php */
do_action ( 'application_password_failed_authentication' , $error );
return $error ;
}
/**
* Validates the application password credentials passed via Basic Authentication .
*
* @ since 5.6 . 0
*
2021-01-03 23:04:04 +01:00
* @ param int | false $input_user User ID if one has been determined , false otherwise .
* @ return int | false The authenticated user ID if successful , false otherwise .
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
*/
function wp_validate_application_password ( $input_user ) {
// Don't authenticate twice.
if ( ! empty ( $input_user ) ) {
return $input_user ;
}
if ( ! wp_is_application_passwords_available () ) {
return $input_user ;
}
2021-01-02 22:35:04 +01:00
// Both $_SERVER['PHP_AUTH_USER'] and $_SERVER['PHP_AUTH_PW'] must be set in order to attempt authentication.
if ( ! isset ( $_SERVER [ 'PHP_AUTH_USER' ], $_SERVER [ 'PHP_AUTH_PW' ] ) ) {
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
return $input_user ;
}
$authenticated = wp_authenticate_application_password ( null , $_SERVER [ 'PHP_AUTH_USER' ], $_SERVER [ 'PHP_AUTH_PW' ] );
if ( $authenticated instanceof WP_User ) {
return $authenticated -> ID ;
}
// If it wasn't a user what got returned, just pass on what we had received originally.
return $input_user ;
}
2015-11-20 08:24:30 +01:00
/**
* For Multisite blogs , check if the authenticated user has been marked as a
* spammer , or if the user ' s primary blog has been marked as spam .
*
* @ since 3.7 . 0
*
* @ param WP_User | WP_Error | null $user WP_User or WP_Error object from a previous callback . Default null .
* @ return WP_User | WP_Error WP_User on success , WP_Error if the user is considered a spammer .
*/
function wp_authenticate_spam_check ( $user ) {
if ( $user instanceof WP_User && is_multisite () ) {
/**
2016-05-22 20:30:27 +02:00
* Filters whether the user has been marked as a spammer .
2015-11-20 08:24:30 +01:00
*
* @ since 3.7 . 0
*
* @ param bool $spammed Whether the user is considered a spammer .
* @ param WP_User $user User to check against .
*/
2016-04-27 07:36:28 +02:00
$spammed = apply_filters ( 'check_is_user_spammed' , is_user_spammy ( $user ), $user );
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
if ( $spammed ) {
2020-06-21 16:00:09 +02:00
return new WP_Error ( 'spammer_account' , __ ( '<strong>Error</strong>: Your account has been marked as a spammer.' ) );
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
}
return $user ;
}
/**
2016-05-23 21:02:28 +02:00
* Validates the logged - in cookie .
2015-11-20 08:24:30 +01:00
*
* Checks the logged - in cookie if the previous auth cookie could not be
* validated and parsed .
*
2016-05-23 21:02:28 +02:00
* This is a callback for the { @ see 'determine_current_user' } filter , rather than API .
2015-11-20 08:24:30 +01:00
*
* @ since 3.9 . 0
*
2021-01-03 23:04:04 +01:00
* @ param int | false $user_id The user ID ( or false ) as received from
* the `determine_current_user` filter .
2015-11-20 08:24:30 +01:00
* @ return int | false User ID if validated , false otherwise . If a user ID from
* an earlier filter callback is received , that value is returned .
*/
function wp_validate_logged_in_cookie ( $user_id ) {
if ( $user_id ) {
return $user_id ;
}
2017-12-01 00:11:00 +01:00
if ( is_blog_admin () || is_network_admin () || empty ( $_COOKIE [ LOGGED_IN_COOKIE ] ) ) {
2015-11-20 08:24:30 +01:00
return false ;
}
2017-12-01 00:11:00 +01:00
return wp_validate_auth_cookie ( $_COOKIE [ LOGGED_IN_COOKIE ], 'logged_in' );
2015-11-20 08:24:30 +01:00
}
/**
* Number of posts user has written .
*
* @ since 3.0 . 0
* @ since 4.1 . 0 Added `$post_type` argument .
* @ since 4.3 . 0 Added `$public_only` argument . Added the ability to pass an array
* of post types to `$post_type` .
*
* @ global wpdb $wpdb WordPress database abstraction object .
*
* @ param int $userid User ID .
* @ param array | string $post_type Optional . Single post type or array of post types to count the number of posts for . Default 'post' .
* @ param bool $public_only Optional . Whether to only return counts for public posts . Default false .
2015-12-25 21:18:27 +01:00
* @ return string Number of posts the user has written in this post type .
2015-11-20 08:24:30 +01:00
*/
function count_user_posts ( $userid , $post_type = 'post' , $public_only = false ) {
global $wpdb ;
$where = get_posts_by_author_sql ( $post_type , true , $userid , $public_only );
$count = $wpdb -> get_var ( " SELECT COUNT(*) FROM $wpdb->posts $where " );
/**
2016-05-22 20:30:27 +02:00
* Filters the number of posts a user has written .
2015-11-20 08:24:30 +01:00
*
* @ since 2.7 . 0
* @ since 4.1 . 0 Added `$post_type` argument .
* @ since 4.3 . 1 Added `$public_only` argument .
*
* @ param int $count The user ' s post count .
* @ param int $userid User ID .
* @ param string | array $post_type Single post type or array of post types to count the number of posts for .
* @ param bool $public_only Whether to limit counted posts to public posts .
*/
return apply_filters ( 'get_usernumposts' , $count , $userid , $post_type , $public_only );
}
/**
* Number of posts written by a list of users .
*
* @ since 3.0 . 0
*
* @ global wpdb $wpdb WordPress database abstraction object .
*
2019-11-05 22:23:02 +01:00
* @ param int [] $users Array of user IDs .
* @ param string | string [] $post_type Optional . Single post type or array of post types to check . Defaults to 'post' .
* @ param bool $public_only Optional . Only return counts for public posts . Defaults to false .
* @ return string [] Amount of posts each user has written , as strings , keyed by user ID .
2015-11-20 08:24:30 +01:00
*/
function count_many_users_posts ( $users , $post_type = 'post' , $public_only = false ) {
global $wpdb ;
$count = array ();
2017-12-01 00:11:00 +01:00
if ( empty ( $users ) || ! is_array ( $users ) ) {
2015-11-20 08:24:30 +01:00
return $count ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
$userlist = implode ( ',' , array_map ( 'absint' , $users ) );
2017-12-01 00:11:00 +01:00
$where = get_posts_by_author_sql ( $post_type , true , null , $public_only );
2015-11-20 08:24:30 +01:00
$result = $wpdb -> get_results ( " SELECT post_author, COUNT(*) FROM $wpdb->posts $where AND post_author IN ( $userlist ) GROUP BY post_author " , ARRAY_N );
foreach ( $result as $row ) {
$count [ $row [ 0 ] ] = $row [ 1 ];
}
foreach ( $users as $id ) {
2017-12-01 00:11:00 +01:00
if ( ! isset ( $count [ $id ] ) ) {
2015-11-20 08:24:30 +01:00
$count [ $id ] = 0 ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
}
return $count ;
}
//
2020-01-29 01:45:18 +01:00
// User option functions.
2015-11-20 08:24:30 +01:00
//
/**
* Get the current user ' s ID
*
2017-08-01 22:44:43 +02:00
* @ since MU ( 3.0 . 0 )
2015-11-20 08:24:30 +01:00
*
2016-12-04 20:25:16 +01:00
* @ return int The current user ' s ID , or 0 if no user is logged in .
2015-11-20 08:24:30 +01:00
*/
function get_current_user_id () {
2017-12-01 00:11:00 +01:00
if ( ! function_exists ( 'wp_get_current_user' ) ) {
2015-11-20 08:24:30 +01:00
return 0 ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
$user = wp_get_current_user ();
return ( isset ( $user -> ID ) ? ( int ) $user -> ID : 0 );
}
/**
* Retrieve user option that can be either per Site or per Network .
*
* If the user ID is not given , then the current user will be used instead . If
* the user ID is given , then the user data will be retrieved . The filter for
* the result , will also pass the original option name and finally the user data
* object as the third parameter .
*
* The option will first check for the per site name and then the per Network name .
*
* @ since 2.0 . 0
*
* @ global wpdb $wpdb WordPress database abstraction object .
*
* @ param string $option User option name .
* @ param int $user Optional . User ID .
* @ param string $deprecated Use get_option () to check for an option in the options table .
* @ return mixed User option value on success , false on failure .
*/
function get_user_option ( $option , $user = 0 , $deprecated = '' ) {
global $wpdb ;
2017-12-01 00:11:00 +01:00
if ( ! empty ( $deprecated ) ) {
2016-07-06 14:40:29 +02:00
_deprecated_argument ( __FUNCTION__ , '3.0.0' );
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
if ( empty ( $user ) ) {
2015-11-20 08:24:30 +01:00
$user = get_current_user_id ();
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
2019-07-03 01:42:58 +02:00
$user = get_userdata ( $user );
if ( ! $user ) {
2015-11-20 08:24:30 +01:00
return false ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
$prefix = $wpdb -> get_blog_prefix ();
2020-01-29 01:45:18 +01:00
if ( $user -> has_prop ( $prefix . $option ) ) { // Blog-specific.
2015-11-20 08:24:30 +01:00
$result = $user -> get ( $prefix . $option );
2020-01-29 01:45:18 +01:00
} elseif ( $user -> has_prop ( $option ) ) { // User-specific and cross-blog.
2015-11-20 08:24:30 +01:00
$result = $user -> get ( $option );
2017-12-01 00:11:00 +01:00
} else {
2015-11-20 08:24:30 +01:00
$result = false ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
/**
2016-05-22 20:30:27 +02:00
* Filters a specific user option value .
2015-11-20 08:24:30 +01:00
*
* The dynamic portion of the hook name , `$option` , refers to the user option name .
*
* @ since 2.5 . 0
*
* @ param mixed $result Value for the user ' s option .
* @ param string $option Name of the option being retrieved .
* @ param WP_User $user WP_User object of the user whose option is being retrieved .
*/
return apply_filters ( " get_user_option_ { $option } " , $result , $option , $user );
}
/**
* Update user option with global blog capability .
*
* User options are just like user metadata except that they have support for
* global blog options . If the 'global' parameter is false , which it is by default
* it will prepend the WordPress table prefix to the option name .
*
* Deletes the user option if $newvalue is empty .
*
* @ since 2.0 . 0
*
* @ global wpdb $wpdb WordPress database abstraction object .
*
* @ param int $user_id User ID .
* @ param string $option_name User option name .
* @ param mixed $newvalue User option value .
* @ param bool $global Optional . Whether option name is global or blog specific .
* Default false ( blog specific ) .
* @ return int | bool User meta ID if the option didn ' t exist , true on successful update ,
* false on failure .
*/
function update_user_option ( $user_id , $option_name , $newvalue , $global = false ) {
global $wpdb ;
2017-12-01 00:11:00 +01:00
if ( ! $global ) {
2015-11-20 08:24:30 +01:00
$option_name = $wpdb -> get_blog_prefix () . $option_name ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
return update_user_meta ( $user_id , $option_name , $newvalue );
}
/**
* Delete user option with global blog capability .
*
* User options are just like user metadata except that they have support for
* global blog options . If the 'global' parameter is false , which it is by default
* it will prepend the WordPress table prefix to the option name .
*
* @ since 3.0 . 0
*
* @ global wpdb $wpdb WordPress database abstraction object .
*
* @ param int $user_id User ID
* @ param string $option_name User option name .
* @ param bool $global Optional . Whether option name is global or blog specific .
* Default false ( blog specific ) .
* @ return bool True on success , false on failure .
*/
function delete_user_option ( $user_id , $option_name , $global = false ) {
global $wpdb ;
2017-12-01 00:11:00 +01:00
if ( ! $global ) {
2015-11-20 08:24:30 +01:00
$option_name = $wpdb -> get_blog_prefix () . $option_name ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
return delete_user_meta ( $user_id , $option_name );
}
/**
* Retrieve list of users matching criteria .
*
* @ since 3.1 . 0
*
* @ see WP_User_Query
*
2016-05-02 06:00:28 +02:00
* @ param array $args Optional . Arguments to retrieve users . See WP_User_Query :: prepare_query () .
2015-11-20 08:24:30 +01:00
* for more information on accepted arguments .
* @ return array List of users .
*/
function get_users ( $args = array () ) {
2017-12-01 00:11:00 +01:00
$args = wp_parse_args ( $args );
2015-11-20 08:24:30 +01:00
$args [ 'count_total' ] = false ;
2017-12-01 00:11:00 +01:00
$user_search = new WP_User_Query ( $args );
2015-11-20 08:24:30 +01:00
return ( array ) $user_search -> get_results ();
}
/**
2016-09-30 06:35:27 +02:00
* Get the sites a user belongs to .
2015-11-20 08:24:30 +01:00
*
* @ since 3.0 . 0
2018-02-09 17:55:31 +01:00
* @ since 4.7 . 0 Converted to use `get_sites()` .
2015-11-20 08:24:30 +01:00
*
* @ global wpdb $wpdb WordPress database abstraction object .
*
* @ param int $user_id User ID
2016-09-30 06:35:27 +02:00
* @ param bool $all Whether to retrieve all sites , or only sites that are not
2015-11-20 08:24:30 +01:00
* marked as deleted , archived , or spam .
2020-10-17 18:05:09 +02:00
* @ return object [] A list of the user 's sites. An empty array if the user doesn' t exist
* or belongs to no sites .
2015-11-20 08:24:30 +01:00
*/
function get_blogs_of_user ( $user_id , $all = false ) {
global $wpdb ;
$user_id = ( int ) $user_id ;
2020-01-29 01:45:18 +01:00
// Logged out users can't have sites.
2017-12-01 00:11:00 +01:00
if ( empty ( $user_id ) ) {
2015-11-20 08:24:30 +01:00
return array ();
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
2016-04-29 17:53:28 +02:00
/**
2016-05-22 20:30:27 +02:00
* Filters the list of a user ' s sites before it is populated .
2016-04-29 17:53:28 +02:00
*
2020-06-26 20:49:09 +02:00
* Returning a non - null value from the filter will effectively short circuit
2016-04-29 17:53:28 +02:00
* get_blogs_of_user (), returning that value instead .
*
* @ since 4.6 . 0
*
2020-10-17 18:05:09 +02:00
* @ param null | object [] $sites An array of site objects of which the user is a member .
* @ param int $user_id User ID .
* @ param bool $all Whether the returned array should contain all sites , including
* those marked 'deleted' , 'archived' , or 'spam' . Default false .
2016-04-29 17:53:28 +02:00
*/
2016-09-30 06:35:27 +02:00
$sites = apply_filters ( 'pre_get_blogs_of_user' , null , $user_id , $all );
2016-04-29 17:53:28 +02:00
2016-09-30 06:35:27 +02:00
if ( null !== $sites ) {
return $sites ;
2016-04-29 17:53:28 +02:00
}
2015-11-20 08:24:30 +01:00
$keys = get_user_meta ( $user_id );
2017-12-01 00:11:00 +01:00
if ( empty ( $keys ) ) {
2015-11-20 08:24:30 +01:00
return array ();
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
if ( ! is_multisite () ) {
2017-12-01 00:11:00 +01:00
$site_id = get_current_blog_id ();
$sites = array ( $site_id => new stdClass );
2016-09-30 06:35:27 +02:00
$sites [ $site_id ] -> userblog_id = $site_id ;
2017-12-01 00:11:00 +01:00
$sites [ $site_id ] -> blogname = get_option ( 'blogname' );
$sites [ $site_id ] -> domain = '' ;
$sites [ $site_id ] -> path = '' ;
$sites [ $site_id ] -> site_id = 1 ;
$sites [ $site_id ] -> siteurl = get_option ( 'siteurl' );
$sites [ $site_id ] -> archived = 0 ;
$sites [ $site_id ] -> spam = 0 ;
$sites [ $site_id ] -> deleted = 0 ;
2016-09-30 06:35:27 +02:00
return $sites ;
2015-11-20 08:24:30 +01:00
}
2016-09-30 06:35:27 +02:00
$site_ids = array ();
2015-11-20 08:24:30 +01:00
if ( isset ( $keys [ $wpdb -> base_prefix . 'capabilities' ] ) && defined ( 'MULTISITE' ) ) {
2016-09-30 06:35:27 +02:00
$site_ids [] = 1 ;
2015-11-20 08:24:30 +01:00
unset ( $keys [ $wpdb -> base_prefix . 'capabilities' ] );
}
$keys = array_keys ( $keys );
foreach ( $keys as $key ) {
2017-12-01 00:11:00 +01:00
if ( 'capabilities' !== substr ( $key , - 12 ) ) {
2015-11-20 08:24:30 +01:00
continue ;
2017-12-01 00:11:00 +01:00
}
if ( $wpdb -> base_prefix && 0 !== strpos ( $key , $wpdb -> base_prefix ) ) {
2015-11-20 08:24:30 +01:00
continue ;
2017-12-01 00:11:00 +01:00
}
2016-09-30 06:35:27 +02:00
$site_id = str_replace ( array ( $wpdb -> base_prefix , '_capabilities' ), '' , $key );
2017-12-01 00:11:00 +01:00
if ( ! is_numeric ( $site_id ) ) {
2015-11-20 08:24:30 +01:00
continue ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
2016-09-30 06:35:27 +02:00
$site_ids [] = ( int ) $site_id ;
}
$sites = array ();
if ( ! empty ( $site_ids ) ) {
$args = array (
2019-03-18 16:56:51 +01:00
'number' => '' ,
'site__in' => $site_ids ,
'update_site_meta_cache' => false ,
2016-09-30 06:35:27 +02:00
);
if ( ! $all ) {
$args [ 'archived' ] = 0 ;
$args [ 'spam' ] = 0 ;
$args [ 'deleted' ] = 0 ;
}
$_sites = get_sites ( $args );
foreach ( $_sites as $site ) {
$sites [ $site -> id ] = ( object ) array (
'userblog_id' => $site -> id ,
'blogname' => $site -> blogname ,
'domain' => $site -> domain ,
'path' => $site -> path ,
'site_id' => $site -> network_id ,
'siteurl' => $site -> siteurl ,
'archived' => $site -> archived ,
'mature' => $site -> mature ,
'spam' => $site -> spam ,
'deleted' => $site -> deleted ,
2015-11-20 08:24:30 +01:00
);
}
}
/**
2016-09-30 06:35:27 +02:00
* Filters the list of sites a user belongs to .
2015-11-20 08:24:30 +01:00
*
2017-08-01 22:44:43 +02:00
* @ since MU ( 3.0 . 0 )
2015-11-20 08:24:30 +01:00
*
2020-10-17 18:05:09 +02:00
* @ param object [] $sites An array of site objects belonging to the user .
* @ param int $user_id User ID .
* @ param bool $all Whether the returned sites array should contain all sites , including
* those marked 'deleted' , 'archived' , or 'spam' . Default false .
2015-11-20 08:24:30 +01:00
*/
2016-09-30 06:35:27 +02:00
return apply_filters ( 'get_blogs_of_user' , $sites , $user_id , $all );
2015-11-20 08:24:30 +01:00
}
/**
* Find out whether a user is a member of a given blog .
*
2017-10-03 19:44:48 +02:00
* @ since MU ( 3.0 . 0 )
2015-11-20 08:24:30 +01:00
*
2017-07-13 15:54:41 +02:00
* @ global wpdb $wpdb WordPress database abstraction object .
*
2015-11-20 08:24:30 +01:00
* @ param int $user_id Optional . The unique ID of the user . Defaults to the current user .
* @ param int $blog_id Optional . ID of the blog to check . Defaults to the current site .
* @ return bool
*/
function is_user_member_of_blog ( $user_id = 0 , $blog_id = 0 ) {
global $wpdb ;
$user_id = ( int ) $user_id ;
$blog_id = ( int ) $blog_id ;
if ( empty ( $user_id ) ) {
$user_id = get_current_user_id ();
}
2020-01-29 01:45:18 +01:00
// Technically not needed, but does save calls to get_site() and get_user_meta()
// in the event that the function is called when a user isn't logged in.
2015-11-20 08:24:30 +01:00
if ( empty ( $user_id ) ) {
return false ;
} else {
$user = get_userdata ( $user_id );
if ( ! $user instanceof WP_User ) {
return false ;
}
}
if ( ! is_multisite () ) {
return true ;
}
if ( empty ( $blog_id ) ) {
$blog_id = get_current_blog_id ();
}
2016-10-25 08:02:35 +02:00
$blog = get_site ( $blog_id );
2015-11-20 08:24:30 +01:00
if ( ! $blog || ! isset ( $blog -> domain ) || $blog -> archived || $blog -> spam || $blog -> deleted ) {
return false ;
}
$keys = get_user_meta ( $user_id );
if ( empty ( $keys ) ) {
return false ;
}
2020-01-29 01:45:18 +01:00
// No underscore before capabilities in $base_capabilities_key.
2015-11-20 08:24:30 +01:00
$base_capabilities_key = $wpdb -> base_prefix . 'capabilities' ;
$site_capabilities_key = $wpdb -> base_prefix . $blog_id . '_capabilities' ;
2020-02-09 17:55:09 +01:00
if ( isset ( $keys [ $base_capabilities_key ] ) && 1 == $blog_id ) {
2015-11-20 08:24:30 +01:00
return true ;
}
if ( isset ( $keys [ $site_capabilities_key ] ) ) {
return true ;
}
return false ;
}
/**
2017-07-30 16:32:45 +02:00
* Adds meta data to a user .
2015-11-20 08:24:30 +01:00
*
* @ since 3.0 . 0
*
* @ param int $user_id User ID .
* @ param string $meta_key Metadata name .
2020-04-22 12:31:09 +02:00
* @ param mixed $meta_value Metadata value . Must be serializable if non - scalar .
* @ param bool $unique Optional . Whether the same key should not be added .
* Default false .
2015-11-20 08:24:30 +01:00
* @ return int | false Meta ID on success , false on failure .
*/
2017-12-01 00:11:00 +01:00
function add_user_meta ( $user_id , $meta_key , $meta_value , $unique = false ) {
return add_metadata ( 'user' , $user_id , $meta_key , $meta_value , $unique );
2015-11-20 08:24:30 +01:00
}
/**
* Remove metadata matching criteria from a user .
*
* You can match based on the key , or key and value . Removing based on key and
* value , will keep from removing duplicate metadata with the same key . It also
* allows removing all metadata matching key , if needed .
*
* @ since 3.0 . 0
2020-06-16 23:07:14 +02:00
*
2019-07-26 00:45:57 +02:00
* @ link https :// developer . wordpress . org / reference / functions / delete_user_meta /
2015-11-20 08:24:30 +01:00
*
* @ param int $user_id User ID
* @ param string $meta_key Metadata name .
2020-04-22 12:31:09 +02:00
* @ param mixed $meta_value Optional . Metadata value . If provided ,
* rows will only be removed that match the value .
* Must be serializable if non - scalar . Default empty .
2015-11-20 08:24:30 +01:00
* @ return bool True on success , false on failure .
*/
2017-12-01 00:11:00 +01:00
function delete_user_meta ( $user_id , $meta_key , $meta_value = '' ) {
return delete_metadata ( 'user' , $user_id , $meta_key , $meta_value );
2015-11-20 08:24:30 +01:00
}
/**
* Retrieve user meta field for a user .
*
* @ since 3.0 . 0
2020-06-16 23:07:14 +02:00
*
2019-07-26 00:45:57 +02:00
* @ link https :// developer . wordpress . org / reference / functions / get_user_meta /
2015-11-20 08:24:30 +01:00
*
* @ param int $user_id User ID .
2020-04-22 12:31:09 +02:00
* @ param string $key Optional . The meta key to retrieve . By default ,
* returns data for all keys .
* @ param bool $single Optional . Whether to return a single value .
2021-04-02 17:49:05 +02:00
* This parameter has no effect if `$key` is not specified .
2020-04-22 12:31:09 +02:00
* Default false .
2021-04-02 17:49:05 +02:00
* @ return mixed An array of values if `$single` is false .
* The value of meta data field if `$single` is true .
* False for an invalid `$user_id` ( non - numeric , zero , or negative value ) .
* An empty string if a valid but non - existing user ID is passed .
2015-11-20 08:24:30 +01:00
*/
2017-12-01 00:11:00 +01:00
function get_user_meta ( $user_id , $key = '' , $single = false ) {
return get_metadata ( 'user' , $user_id , $key , $single );
2015-11-20 08:24:30 +01:00
}
/**
* Update user meta field based on user ID .
*
* Use the $prev_value parameter to differentiate between meta fields with the
* same key and user ID .
*
* If the meta field for the user does not exist , it will be added .
*
* @ since 3.0 . 0
2020-06-16 23:07:14 +02:00
*
2019-07-26 00:45:57 +02:00
* @ link https :// developer . wordpress . org / reference / functions / update_user_meta /
2015-11-20 08:24:30 +01:00
*
* @ param int $user_id User ID .
* @ param string $meta_key Metadata key .
2020-04-22 12:31:09 +02:00
* @ param mixed $meta_value Metadata value . Must be serializable if non - scalar .
* @ param mixed $prev_value Optional . Previous value to check before updating .
2020-06-29 23:22:09 +02:00
* If specified , only update existing metadata entries with
* this value . Otherwise , update all entries . Default empty .
2020-04-22 12:31:09 +02:00
* @ return int | bool Meta ID if the key didn ' t exist , true on successful update ,
2020-06-29 23:22:09 +02:00
* false on failure or if the value passed to the function
* is the same as the one that is already in the database .
2015-11-20 08:24:30 +01:00
*/
2017-12-01 00:11:00 +01:00
function update_user_meta ( $user_id , $meta_key , $meta_value , $prev_value = '' ) {
return update_metadata ( 'user' , $user_id , $meta_key , $meta_value , $prev_value );
2015-11-20 08:24:30 +01:00
}
/**
* Count number of users who have each of the user roles .
*
* Assumes there are neither duplicated nor orphaned capabilities meta_values .
* Assumes role names are unique phrases . Same assumption made by WP_User_Query :: prepare_query ()
* Using $strategy = 'time' this is CPU - intensive and should handle around 10 ^ 7 users .
* Using $strategy = 'memory' this is memory - intensive and should handle around 10 ^ 5 users , but see WP Bug #12257.
*
* @ since 3.0 . 0
* @ since 4.4 . 0 The number of users with no role is now included in the `none` element .
2017-07-25 02:24:43 +02:00
* @ since 4.9 . 0 The `$site_id` parameter was added to support multisite .
2015-11-20 08:24:30 +01:00
*
* @ global wpdb $wpdb WordPress database abstraction object .
*
2017-07-25 02:24:43 +02:00
* @ param string $strategy Optional . The computational strategy to use when counting the users .
* Accepts either 'time' or 'memory' . Default 'time' .
* @ param int | null $site_id Optional . The site ID to count users for . Defaults to the current site .
2019-11-05 22:23:02 +01:00
* @ return array {
* User counts .
*
* @ type int $total_users Total number of users on the site .
* @ type int [] $avail_roles Array of user counts keyed by user role .
* }
2015-11-20 08:24:30 +01:00
*/
2017-07-25 02:24:43 +02:00
function count_users ( $strategy = 'time' , $site_id = null ) {
2015-11-20 08:24:30 +01:00
global $wpdb ;
2020-01-29 01:45:18 +01:00
// Initialize.
2017-07-25 02:24:43 +02:00
if ( ! $site_id ) {
$site_id = get_current_blog_id ();
}
2019-01-08 10:49:50 +01:00
/**
2020-08-11 02:34:08 +02:00
* Filters the user count before queries are run .
*
* Return a non - null value to cause count_users () to return early .
2019-01-08 10:49:50 +01:00
*
* @ since 5.1 . 0
*
2020-01-22 01:25:04 +01:00
* @ param null | string $result The value to return instead . Default null to continue with the query .
2019-01-08 10:49:50 +01:00
* @ param string $strategy Optional . The computational strategy to use when counting the users .
* Accepts either 'time' or 'memory' . Default 'time' .
* @ param int | null $site_id Optional . The site ID to count users for . Defaults to the current site .
*/
$pre = apply_filters ( 'pre_count_users' , null , $strategy , $site_id );
if ( null !== $pre ) {
return $pre ;
}
2017-07-25 02:24:43 +02:00
$blog_prefix = $wpdb -> get_blog_prefix ( $site_id );
2017-12-01 00:11:00 +01:00
$result = array ();
2015-11-20 08:24:30 +01:00
2020-05-16 20:42:12 +02:00
if ( 'time' === $strategy ) {
2020-02-09 17:55:09 +01:00
if ( is_multisite () && get_current_blog_id () != $site_id ) {
2017-09-30 05:54:45 +02:00
switch_to_blog ( $site_id );
$avail_roles = wp_roles () -> get_names ();
restore_current_blog ();
} else {
$avail_roles = wp_roles () -> get_names ();
}
2015-11-20 08:24:30 +01:00
// Build a CPU-intensive query that will return concise information.
$select_count = array ();
foreach ( $avail_roles as $this_role => $name ) {
2017-12-01 00:11:00 +01:00
$select_count [] = $wpdb -> prepare ( 'COUNT(NULLIF(`meta_value` LIKE %s, false))' , '%' . $wpdb -> esc_like ( '"' . $this_role . '"' ) . '%' );
2015-11-20 08:24:30 +01:00
}
$select_count [] = " COUNT(NULLIF(`meta_value` = 'a:0: { }', false)) " ;
2017-12-01 00:11:00 +01:00
$select_count = implode ( ', ' , $select_count );
2015-11-20 08:24:30 +01:00
// Add the meta_value index to the selection list, then run the query.
2017-12-01 00:11:00 +01:00
$row = $wpdb -> get_row (
"
2017-04-30 15:03:41 +02:00
SELECT { $select_count }, COUNT ( * )
FROM { $wpdb -> usermeta }
INNER JOIN { $wpdb -> users } ON user_id = ID
WHERE meta_key = '{$blog_prefix}capabilities'
2018-08-17 03:51:36 +02:00
" ,
ARRAY_N
2017-12-01 00:11:00 +01:00
);
2015-11-20 08:24:30 +01:00
// Run the previous loop again to associate results with role names.
2017-12-01 00:11:00 +01:00
$col = 0 ;
2015-11-20 08:24:30 +01:00
$role_counts = array ();
foreach ( $avail_roles as $this_role => $name ) {
2017-12-01 00:11:00 +01:00
$count = ( int ) $row [ $col ++ ];
if ( $count > 0 ) {
$role_counts [ $this_role ] = $count ;
2015-11-20 08:24:30 +01:00
}
}
2017-12-01 00:11:00 +01:00
$role_counts [ 'none' ] = ( int ) $row [ $col ++ ];
2015-11-20 08:24:30 +01:00
// Get the meta_value index from the end of the result set.
2017-12-01 00:11:00 +01:00
$total_users = ( int ) $row [ $col ];
2015-11-20 08:24:30 +01:00
$result [ 'total_users' ] = $total_users ;
$result [ 'avail_roles' ] =& $role_counts ;
} else {
$avail_roles = array (
'none' => 0 ,
);
2017-12-01 00:11:00 +01:00
$users_of_blog = $wpdb -> get_col (
"
2017-04-30 15:03:41 +02:00
SELECT meta_value
FROM { $wpdb -> usermeta }
INNER JOIN { $wpdb -> users } ON user_id = ID
WHERE meta_key = '{$blog_prefix}capabilities'
2017-12-01 00:11:00 +01:00
"
);
2015-11-20 08:24:30 +01:00
foreach ( $users_of_blog as $caps_meta ) {
2017-12-01 00:11:00 +01:00
$b_roles = maybe_unserialize ( $caps_meta );
if ( ! is_array ( $b_roles ) ) {
2015-11-20 08:24:30 +01:00
continue ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
if ( empty ( $b_roles ) ) {
$avail_roles [ 'none' ] ++ ;
}
foreach ( $b_roles as $b_role => $val ) {
2017-12-01 00:11:00 +01:00
if ( isset ( $avail_roles [ $b_role ] ) ) {
$avail_roles [ $b_role ] ++ ;
2015-11-20 08:24:30 +01:00
} else {
2017-12-01 00:11:00 +01:00
$avail_roles [ $b_role ] = 1 ;
2015-11-20 08:24:30 +01:00
}
}
}
$result [ 'total_users' ] = count ( $users_of_blog );
$result [ 'avail_roles' ] =& $avail_roles ;
}
return $result ;
}
//
2020-01-29 01:45:18 +01:00
// Private helper functions.
2015-11-20 08:24:30 +01:00
//
/**
* Set up global user vars .
*
* Used by wp_set_current_user () for back compat . Might be deprecated in the future .
*
* @ since 2.0 . 4
*
2017-08-19 22:19:44 +02:00
* @ global string $user_login The user username for logging in
* @ global WP_User $userdata User data .
* @ global int $user_level The level of the user
* @ global int $user_ID The ID of the user
* @ global string $user_email The email address of the user
* @ global string $user_url The url in the user ' s profile
* @ global string $user_identity The display name of the user
2015-11-20 08:24:30 +01:00
*
2019-01-15 11:29:50 +01:00
* @ param int $for_user_id Optional . User ID to set up global data . Default 0.
2015-11-20 08:24:30 +01:00
*/
2019-01-15 07:33:50 +01:00
function setup_userdata ( $for_user_id = 0 ) {
2015-11-20 08:24:30 +01:00
global $user_login , $userdata , $user_level , $user_ID , $user_email , $user_url , $user_identity ;
2019-01-15 07:33:50 +01:00
if ( ! $for_user_id ) {
2015-11-20 08:24:30 +01:00
$for_user_id = get_current_user_id ();
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
$user = get_userdata ( $for_user_id );
if ( ! $user ) {
2019-07-03 01:42:58 +02:00
$user_ID = 0 ;
$user_level = 0 ;
$userdata = null ;
$user_login = '' ;
$user_email = '' ;
$user_url = '' ;
$user_identity = '' ;
2015-11-20 08:24:30 +01:00
return ;
}
2017-12-01 00:11:00 +01:00
$user_ID = ( int ) $user -> ID ;
$user_level = ( int ) $user -> user_level ;
$userdata = $user ;
$user_login = $user -> user_login ;
$user_email = $user -> user_email ;
$user_url = $user -> user_url ;
2015-11-20 08:24:30 +01:00
$user_identity = $user -> display_name ;
}
/**
* Create dropdown HTML content of users .
*
* The content can either be displayed , which it is by default or retrieved by
* setting the 'echo' argument . The 'include' and 'exclude' arguments do not
* need to be used ; all users will be displayed in that case . Only one can be
* used , either 'include' or 'exclude' , but not both .
*
* The available arguments are as follows :
*
* @ since 2.3 . 0
2015-12-06 21:57:26 +01:00
* @ since 4.5 . 0 Added the 'display_name_with_login' value for 'show' .
2016-09-25 19:45:28 +02:00
* @ since 4.7 . 0 Added the `$role` , `$role__in` , and `$role__not_in` parameters .
2015-11-20 08:24:30 +01:00
*
* @ param array | string $args {
* Optional . Array or string of arguments to generate a drop - down of users .
2016-05-02 06:00:28 +02:00
* See WP_User_Query :: prepare_query () for additional available arguments .
2015-11-20 08:24:30 +01:00
*
* @ type string $show_option_all Text to show as the drop - down default ( all ) .
* Default empty .
* @ type string $show_option_none Text to show as the drop - down default when no
* users were found . Default empty .
* @ type int | string $option_none_value Value to use for $show_option_non when no users
* were found . Default - 1.
* @ type string $hide_if_only_one_author Whether to skip generating the drop - down
* if only one user was found . Default empty .
* @ type string $orderby Field to order found users by . Accepts user fields .
* Default 'display_name' .
* @ type string $order Whether to order users in ascending or descending
* order . Accepts 'ASC' ( ascending ) or 'DESC' ( descending ) .
* Default 'ASC' .
2020-11-19 19:24:09 +01:00
* @ type int [] | string $include Array or comma - separated list of user IDs to include .
2015-11-20 08:24:30 +01:00
* Default empty .
2020-11-19 19:24:09 +01:00
* @ type int [] | string $exclude Array or comma - separated list of user IDs to exclude .
2015-11-20 08:24:30 +01:00
* Default empty .
* @ type bool | int $multi Whether to skip the ID attribute on the 'select' element .
* Accepts 1 | true or 0 | false . Default 0 | false .
2015-12-06 21:57:26 +01:00
* @ type string $show User data to display . If the selected item is empty
2015-11-20 08:24:30 +01:00
* then the 'user_login' will be displayed in parentheses .
2015-12-06 21:57:26 +01:00
* Accepts any user field , or 'display_name_with_login' to show
* the display name with user_login in parentheses .
* Default 'display_name' .
2015-11-20 08:24:30 +01:00
* @ type int | bool $echo Whether to echo or return the drop - down . Accepts 1 | true ( echo )
* or 0 | false ( return ) . Default 1 | true .
* @ type int $selected Which user ID should be selected . Default 0.
* @ type bool $include_selected Whether to always include the selected user ID in the drop -
* down . Default false .
* @ type string $name Name attribute of select element . Default 'user' .
* @ type string $id ID attribute of the select element . Default is the value of $name .
* @ type string $class Class attribute of the select element . Default empty .
* @ type int $blog_id ID of blog ( Multisite only ) . Default is ID of the current blog .
* @ type string $who Which type of users to query . Accepts only an empty string or
* 'authors' . Default empty .
2016-09-25 19:45:28 +02:00
* @ type string | array $role An array or a comma - separated list of role names that users must
* match to be included in results . Note that this is an inclusive
* list : users must match * each * role . Default empty .
2020-11-24 22:27:05 +01:00
* @ type string [] $role__in An array of role names . Matched users must have at least one of
2016-09-25 19:45:28 +02:00
* these roles . Default empty array .
2020-11-24 22:27:05 +01:00
* @ type string [] $role__not_in An array of role names to exclude . Users matching one or more of
2016-09-25 19:45:28 +02:00
* these roles will not be included in results . Default empty array .
2015-11-20 08:24:30 +01:00
* }
2020-01-11 19:32:05 +01:00
* @ return string HTML dropdown list of users .
2015-11-20 08:24:30 +01:00
*/
function wp_dropdown_users ( $args = '' ) {
$defaults = array (
2017-12-01 00:11:00 +01:00
'show_option_all' => '' ,
'show_option_none' => '' ,
'hide_if_only_one_author' => '' ,
'orderby' => 'display_name' ,
'order' => 'ASC' ,
'include' => '' ,
'exclude' => '' ,
'multi' => 0 ,
'show' => 'display_name' ,
'echo' => 1 ,
'selected' => 0 ,
'name' => 'user' ,
'class' => '' ,
'id' => '' ,
'blog_id' => get_current_blog_id (),
'who' => '' ,
'include_selected' => false ,
'option_none_value' => - 1 ,
'role' => '' ,
'role__in' => array (),
'role__not_in' => array (),
2015-11-20 08:24:30 +01:00
);
$defaults [ 'selected' ] = is_author () ? get_query_var ( 'author' ) : 0 ;
2019-07-25 02:48:58 +02:00
$parsed_args = wp_parse_args ( $args , $defaults );
2015-12-06 21:57:26 +01:00
2019-07-25 02:48:58 +02:00
$query_args = wp_array_slice_assoc ( $parsed_args , array ( 'blog_id' , 'include' , 'exclude' , 'orderby' , 'order' , 'who' , 'role' , 'role__in' , 'role__not_in' ) );
2015-12-06 21:57:26 +01:00
$fields = array ( 'ID' , 'user_login' );
2019-07-25 02:48:58 +02:00
$show = ! empty ( $parsed_args [ 'show' ] ) ? $parsed_args [ 'show' ] : 'display_name' ;
2015-12-06 21:57:26 +01:00
if ( 'display_name_with_login' === $show ) {
$fields [] = 'display_name' ;
} else {
$fields [] = $show ;
}
$query_args [ 'fields' ] = $fields ;
2019-07-25 02:48:58 +02:00
$show_option_all = $parsed_args [ 'show_option_all' ];
$show_option_none = $parsed_args [ 'show_option_none' ];
$option_none_value = $parsed_args [ 'option_none_value' ];
2015-11-20 08:24:30 +01:00
/**
2016-08-27 18:54:31 +02:00
* Filters the query arguments for the list of users in the dropdown .
2015-11-20 08:24:30 +01:00
*
* @ since 4.4 . 0
*
2020-01-21 16:41:04 +01:00
* @ param array $query_args The query arguments for get_users () .
* @ param array $parsed_args The arguments passed to wp_dropdown_users () combined with the defaults .
2015-11-20 08:24:30 +01:00
*/
2019-07-25 02:48:58 +02:00
$query_args = apply_filters ( 'wp_dropdown_users_args' , $query_args , $parsed_args );
2015-11-20 08:24:30 +01:00
$users = get_users ( $query_args );
$output = '' ;
2019-07-25 02:48:58 +02:00
if ( ! empty ( $users ) && ( empty ( $parsed_args [ 'hide_if_only_one_author' ] ) || count ( $users ) > 1 ) ) {
$name = esc_attr ( $parsed_args [ 'name' ] );
if ( $parsed_args [ 'multi' ] && ! $parsed_args [ 'id' ] ) {
2015-11-20 08:24:30 +01:00
$id = '' ;
} else {
2019-07-25 02:48:58 +02:00
$id = $parsed_args [ 'id' ] ? " id=' " . esc_attr ( $parsed_args [ 'id' ] ) . " ' " : " id=' $name ' " ;
2015-11-20 08:24:30 +01:00
}
2019-07-25 02:48:58 +02:00
$output = " <select name=' { $name } ' { $id } class=' " . $parsed_args [ 'class' ] . " '> \n " ;
2015-11-20 08:24:30 +01:00
if ( $show_option_all ) {
$output .= " \t <option value='0'> $show_option_all </option> \n " ;
}
if ( $show_option_none ) {
2019-07-25 02:48:58 +02:00
$_selected = selected ( $option_none_value , $parsed_args [ 'selected' ], false );
2017-12-01 00:11:00 +01:00
$output .= " \t <option value=' " . esc_attr ( $option_none_value ) . " ' $_selected > $show_option_none </option> \n " ;
2015-11-20 08:24:30 +01:00
}
2019-07-25 02:48:58 +02:00
if ( $parsed_args [ 'include_selected' ] && ( $parsed_args [ 'selected' ] > 0 ) ) {
$found_selected = false ;
$parsed_args [ 'selected' ] = ( int ) $parsed_args [ 'selected' ];
2020-09-23 02:27:07 +02:00
2015-12-06 21:57:26 +01:00
foreach ( ( array ) $users as $user ) {
$user -> ID = ( int ) $user -> ID ;
2019-07-25 02:48:58 +02:00
if ( $user -> ID === $parsed_args [ 'selected' ] ) {
2015-12-06 21:57:26 +01:00
$found_selected = true ;
}
}
if ( ! $found_selected ) {
2020-09-23 02:27:07 +02:00
$selected_user = get_userdata ( $parsed_args [ 'selected' ] );
if ( $selected_user ) {
$users [] = $selected_user ;
}
2015-11-20 08:24:30 +01:00
}
}
2015-12-06 21:57:26 +01:00
foreach ( ( array ) $users as $user ) {
if ( 'display_name_with_login' === $show ) {
2019-09-03 02:41:05 +02:00
/* translators: 1: User's display name, 2: User login. */
2015-12-06 21:57:26 +01:00
$display = sprintf ( _x ( '%1$s (%2$s)' , 'user dropdown' ), $user -> display_name , $user -> user_login );
} elseif ( ! empty ( $user -> $show ) ) {
$display = $user -> $show ;
} else {
$display = '(' . $user -> user_login . ')' ;
}
2019-07-25 02:48:58 +02:00
$_selected = selected ( $user -> ID , $parsed_args [ 'selected' ], false );
2017-12-01 00:11:00 +01:00
$output .= " \t <option value=' $user->ID ' $_selected > " . esc_html ( $display ) . " </option> \n " ;
2015-11-20 08:24:30 +01:00
}
2017-12-01 00:11:00 +01:00
$output .= '</select>' ;
2015-11-20 08:24:30 +01:00
}
/**
2016-05-22 20:30:27 +02:00
* Filters the wp_dropdown_users () HTML output .
2015-11-20 08:24:30 +01:00
*
* @ since 2.3 . 0
*
* @ param string $output HTML output generated by wp_dropdown_users () .
*/
$html = apply_filters ( 'wp_dropdown_users' , $output );
2019-07-25 02:48:58 +02:00
if ( $parsed_args [ 'echo' ] ) {
2015-11-20 08:24:30 +01:00
echo $html ;
}
return $html ;
}
/**
* Sanitize user field based on context .
*
* Possible context values are : 'raw' , 'edit' , 'db' , 'display' , 'attribute' and 'js' . The
* 'display' context is used by default . 'attribute' and 'js' contexts are treated like 'display'
* when calling filters .
*
* @ since 2.3 . 0
*
* @ param string $field The user Object field name .
* @ param mixed $value The user Object value .
* @ param int $user_id User ID .
* @ param string $context How to sanitize user fields . Looks for 'raw' , 'edit' , 'db' , 'display' ,
* 'attribute' and 'js' .
* @ return mixed Sanitized value .
*/
2017-12-01 00:11:00 +01:00
function sanitize_user_field ( $field , $value , $user_id , $context ) {
$int_fields = array ( 'ID' );
2020-04-05 05:02:11 +02:00
if ( in_array ( $field , $int_fields , true ) ) {
2015-11-20 08:24:30 +01:00
$value = ( int ) $value ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
2020-05-16 20:42:12 +02:00
if ( 'raw' === $context ) {
2015-11-20 08:24:30 +01:00
return $value ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
if ( ! is_string ( $value ) && ! is_numeric ( $value ) ) {
2015-11-20 08:24:30 +01:00
return $value ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
$prefixed = false !== strpos ( $field , 'user_' );
2020-05-16 20:42:12 +02:00
if ( 'edit' === $context ) {
2015-11-20 08:24:30 +01:00
if ( $prefixed ) {
2015-11-22 04:51:28 +01:00
/** This filter is documented in wp-includes/post.php */
2015-11-20 08:24:30 +01:00
$value = apply_filters ( " edit_ { $field } " , $value , $user_id );
} else {
/**
2016-05-22 20:30:27 +02:00
* Filters a user field value in the 'edit' context .
2015-11-20 08:24:30 +01:00
*
* The dynamic portion of the hook name , `$field` , refers to the prefixed user
* field being filtered , such as 'user_login' , 'user_email' , 'first_name' , etc .
*
* @ since 2.9 . 0
*
* @ param mixed $value Value of the prefixed user field .
* @ param int $user_id User ID .
*/
$value = apply_filters ( " edit_user_ { $field } " , $value , $user_id );
}
2020-05-16 20:42:12 +02:00
if ( 'description' === $field ) {
2015-11-20 08:24:30 +01:00
$value = esc_html ( $value ); // textarea_escaped?
2017-12-01 00:11:00 +01:00
} else {
$value = esc_attr ( $value );
}
2020-05-16 20:42:12 +02:00
} elseif ( 'db' === $context ) {
2015-11-20 08:24:30 +01:00
if ( $prefixed ) {
2015-11-22 04:51:28 +01:00
/** This filter is documented in wp-includes/post.php */
2015-11-20 08:24:30 +01:00
$value = apply_filters ( " pre_ { $field } " , $value );
} else {
/**
2016-05-22 20:30:27 +02:00
* Filters the value of a user field in the 'db' context .
2015-11-20 08:24:30 +01:00
*
* The dynamic portion of the hook name , `$field` , refers to the prefixed user
* field being filtered , such as 'user_login' , 'user_email' , 'first_name' , etc .
2017-12-01 00:11:00 +01:00
*
2015-11-20 08:24:30 +01:00
* @ since 2.9 . 0
*
* @ param mixed $value Value of the prefixed user field .
*/
$value = apply_filters ( " pre_user_ { $field } " , $value );
}
} else {
// Use display filters by default.
if ( $prefixed ) {
2015-11-22 04:51:28 +01:00
/** This filter is documented in wp-includes/post.php */
2016-12-14 05:18:42 +01:00
$value = apply_filters ( " { $field } " , $value , $user_id , $context );
2015-11-20 08:24:30 +01:00
} else {
/**
2016-05-22 20:30:27 +02:00
* Filters the value of a user field in a standard context .
2015-11-20 08:24:30 +01:00
*
* The dynamic portion of the hook name , `$field` , refers to the prefixed user
* field being filtered , such as 'user_login' , 'user_email' , 'first_name' , etc .
*
* @ since 2.9 . 0
*
* @ param mixed $value The user object value to sanitize .
* @ param int $user_id User ID .
* @ param string $context The context to filter within .
*/
$value = apply_filters ( " user_ { $field } " , $value , $user_id , $context );
}
}
2020-05-16 20:42:12 +02:00
if ( 'user_url' === $field ) {
2017-12-01 00:11:00 +01:00
$value = esc_url ( $value );
}
2015-11-20 08:24:30 +01:00
2020-05-16 20:42:12 +02:00
if ( 'attribute' === $context ) {
2015-11-20 08:24:30 +01:00
$value = esc_attr ( $value );
2020-05-16 20:42:12 +02:00
} elseif ( 'js' === $context ) {
2015-11-20 08:24:30 +01:00
$value = esc_js ( $value );
}
return $value ;
}
/**
* Update all user caches
*
* @ since 3.0 . 0
*
2020-10-18 22:53:08 +02:00
* @ param object | WP_User $user User object or database row to be cached
2021-01-05 17:48:07 +01:00
* @ return void | false Void on success , false on failure .
2015-11-20 08:24:30 +01:00
*/
function update_user_caches ( $user ) {
if ( $user instanceof WP_User ) {
if ( ! $user -> exists () ) {
return false ;
}
$user = $user -> data ;
}
2017-12-01 00:11:00 +01:00
wp_cache_add ( $user -> ID , $user , 'users' );
wp_cache_add ( $user -> user_login , $user -> ID , 'userlogins' );
wp_cache_add ( $user -> user_email , $user -> ID , 'useremail' );
wp_cache_add ( $user -> user_nicename , $user -> ID , 'userslugs' );
2015-11-20 08:24:30 +01:00
}
/**
* Clean all user caches
*
* @ since 3.0 . 0
* @ since 4.4 . 0 'clean_user_cache' action was added .
*
* @ param WP_User | int $user User object or ID to be cleaned from the cache
*/
function clean_user_cache ( $user ) {
2017-12-01 00:11:00 +01:00
if ( is_numeric ( $user ) ) {
2015-11-20 08:24:30 +01:00
$user = new WP_User ( $user );
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
if ( ! $user -> exists () ) {
2015-11-20 08:24:30 +01:00
return ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
wp_cache_delete ( $user -> ID , 'users' );
wp_cache_delete ( $user -> user_login , 'userlogins' );
wp_cache_delete ( $user -> user_email , 'useremail' );
wp_cache_delete ( $user -> user_nicename , 'userslugs' );
/**
* Fires immediately after the given user ' s cache is cleaned .
*
* @ since 4.4 . 0
*
* @ param int $user_id User ID .
* @ param WP_User $user User object .
*/
do_action ( 'clean_user_cache' , $user -> ID , $user );
}
/**
2018-02-13 17:54:31 +01:00
* Determines whether the given username exists .
2018-03-07 00:47:30 +01:00
*
2018-02-13 17:54:31 +01:00
* For more information on this and similar theme functions , check out
2018-03-07 00:47:30 +01:00
* the { @ link https :// developer . wordpress . org / themes / basics / conditional - tags /
2018-02-13 17:54:31 +01:00
* Conditional Tags } article in the Theme Developer Handbook .
2015-11-20 08:24:30 +01:00
*
* @ since 2.0 . 0
*
2020-10-14 21:04:08 +02:00
* @ param string $username The username to check for existence .
* @ return int | false The user ID on success , false on failure .
2015-11-20 08:24:30 +01:00
*/
function username_exists ( $username ) {
2019-01-15 06:38:49 +01:00
$user = get_user_by ( 'login' , $username );
if ( $user ) {
2017-07-26 18:25:40 +02:00
$user_id = $user -> ID ;
} else {
$user_id = false ;
2015-11-20 08:24:30 +01:00
}
2017-07-26 18:25:40 +02:00
/**
2020-10-14 21:04:08 +02:00
* Filters whether the given username exists .
2017-07-26 18:25:40 +02:00
*
* @ since 4.9 . 0
*
2020-10-14 21:04:08 +02:00
* @ param int | false $user_id The user ID associated with the username ,
* or false if the username does not exist .
2020-10-15 02:16:08 +02:00
* @ param string $username The username to check for existence .
2017-07-26 18:25:40 +02:00
*/
return apply_filters ( 'username_exists' , $user_id , $username );
2015-11-20 08:24:30 +01:00
}
/**
2018-02-13 17:54:31 +01:00
* Determines whether the given email exists .
2018-03-07 00:47:30 +01:00
*
2018-02-13 17:54:31 +01:00
* For more information on this and similar theme functions , check out
2018-03-07 00:47:30 +01:00
* the { @ link https :// developer . wordpress . org / themes / basics / conditional - tags /
2018-02-13 17:54:31 +01:00
* Conditional Tags } article in the Theme Developer Handbook .
2015-11-20 08:24:30 +01:00
*
2015-09-04 03:33:24 +02:00
* @ since 2.1 . 0
2015-11-20 08:24:30 +01:00
*
2020-10-15 02:16:08 +02:00
* @ param string $email The email to check for existence .
2020-10-14 21:04:08 +02:00
* @ return int | false The user ID on success , false on failure .
2015-11-20 08:24:30 +01:00
*/
function email_exists ( $email ) {
2019-01-15 06:38:49 +01:00
$user = get_user_by ( 'email' , $email );
if ( $user ) {
2020-10-14 21:04:08 +02:00
$user_id = $user -> ID ;
} else {
$user_id = false ;
2015-11-20 08:24:30 +01:00
}
2020-10-14 21:04:08 +02:00
/**
* Filters whether the given email exists .
*
* @ since 5.6 . 0
*
* @ param int | false $user_id The user ID associated with the email ,
* or false if the email does not exist .
2020-10-15 02:16:08 +02:00
* @ param string $email The email to check for existence .
2020-10-14 21:04:08 +02:00
*/
return apply_filters ( 'email_exists' , $user_id , $email );
2015-11-20 08:24:30 +01:00
}
/**
* Checks whether a username is valid .
*
* @ since 2.0 . 1
2020-10-14 21:04:08 +02:00
* @ since 4.4 . 0 Empty sanitized usernames are now considered invalid .
2015-11-20 08:24:30 +01:00
*
* @ param string $username Username .
2020-10-14 21:04:08 +02:00
* @ return bool Whether username given is valid .
2015-11-20 08:24:30 +01:00
*/
function validate_username ( $username ) {
$sanitized = sanitize_user ( $username , true );
2017-12-01 00:11:00 +01:00
$valid = ( $sanitized == $username && ! empty ( $sanitized ) );
2015-11-20 08:24:30 +01:00
/**
2020-10-14 21:04:08 +02:00
* Filters whether the provided username is valid .
2015-11-20 08:24:30 +01:00
*
* @ since 2.0 . 1
*
* @ param bool $valid Whether given username is valid .
* @ param string $username Username to check .
*/
return apply_filters ( 'validate_username' , $valid , $username );
}
/**
* Insert a user into the database .
*
* Most of the `$userdata` array fields have filters associated with the values . Exceptions are
Editor: Add CodeMirror-powered code editor with syntax highlighting, linting, and auto-completion.
* Code editor is integrated into the Theme/Plugin Editor, Additional CSS in Customizer, and Custom HTML widget. Code editor is not yet integrated into the post editor, and it may not be until accessibility concerns are addressed.
* The CodeMirror component in the Custom HTML widget is integrated in a similar way to TinyMCE being integrated into the Text widget, adopting the same approach for integrating dynamic JavaScript-initialized fields.
* Linting is performed for JS, CSS, HTML, and JSON via JSHint, CSSLint, HTMLHint, and JSONLint respectively. Linting is not yet supported for PHP.
* When user lacks `unfiltered_html` the capability, the Custom HTML widget will report any Kses-invalid elements and attributes as errors via a custom Kses rule for HTMLHint.
* When linting errors are detected, the user will be prevented from saving the code until the errors are fixed, reducing instances of broken websites.
* The placeholder value is removed from Custom CSS in favor of a fleshed-out section description which now auto-expands when the CSS field is empty. See #39892.
* The CodeMirror library is included as `wp.CodeMirror` to prevent conflicts with any existing `CodeMirror` global.
* An `wp.codeEditor.initialize()` API in JS is provided to convert a `textarea` into CodeMirror, with a `wp_enqueue_code_editor()` function in PHP to manage enqueueing the assets and settings needed to edit a given type of code.
* A user preference is added to manage whether or not "syntax highlighting" is enabled. The feature is opt-out, being enabled by default.
* Allowed file extensions in the theme and plugin editors have been updated to include formats which CodeMirror has modes for: `conf`, `css`, `diff`, `patch`, `html`, `htm`, `http`, `js`, `json`, `jsx`, `less`, `md`, `php`, `phtml`, `php3`, `php4`, `php5`, `php7`, `phps`, `scss`, `sass`, `sh`, `bash`, `sql`, `svg`, `xml`, `yml`, `yaml`, `txt`.
Props westonruter, georgestephanis, obenland, melchoyce, pixolin, mizejewski, michelleweber, afercia, grahamarmfield, samikeijonen, rianrietveld, iseulde.
See #38707.
Fixes #12423, #39892.
Built from https://develop.svn.wordpress.org/trunk@41376
git-svn-id: http://core.svn.wordpress.org/trunk@41209 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-09-13 08:08:47 +02:00
* 'ID' , 'rich_editing' , 'syntax_highlighting' , 'comment_shortcuts' , 'admin_color' , 'use_ssl' ,
2019-08-01 19:25:55 +02:00
* 'user_registered' , 'user_activation_key' , 'spam' , and 'role' . The filters have the prefix
* 'pre_user_' followed by the field name . An example using 'description' would have the filter
* called 'pre_user_description' that can be hooked into .
2015-11-20 08:24:30 +01:00
*
* @ since 2.0 . 0
* @ since 3.6 . 0 The `aim` , `jabber` , and `yim` fields were removed as default user contact
2017-08-22 13:52:48 +02:00
* methods for new installations . See wp_get_user_contact_methods () .
2016-10-03 09:04:29 +02:00
* @ since 4.7 . 0 The user ' s locale can be passed to `$userdata` .
2019-08-01 19:25:55 +02:00
* @ since 5.3 . 0 The `user_activation_key` field can be passed to `$userdata` .
2019-08-01 13:28:54 +02:00
* @ since 5.3 . 0 The `spam` field can be passed to `$userdata` ( Multisite only ) .
2015-11-20 08:24:30 +01:00
*
* @ global wpdb $wpdb WordPress database abstraction object .
*
* @ param array | object | WP_User $userdata {
* An array , object , or WP_User object of user data arguments .
*
2020-02-25 19:20:06 +01:00
* @ type int $ID User ID . If supplied , the user will be updated .
* @ type string $user_pass The plain - text user password .
* @ type string $user_login The user ' s login username .
* @ type string $user_nicename The URL - friendly user name .
* @ type string $user_url The user URL .
* @ type string $user_email The user email address .
* @ type string $display_name The user ' s display name .
* Default is the user ' s username .
* @ type string $nickname The user ' s nickname .
* Default is the user ' s username .
* @ type string $first_name The user ' s first name . For new users , will be used
* to build the first part of the user ' s display name
* if `$display_name` is not specified .
* @ type string $last_name The user ' s last name . For new users , will be used
* to build the second part of the user ' s display name
* if `$display_name` is not specified .
* @ type string $description The user ' s biographical description .
* @ type string $rich_editing Whether to enable the rich - editor for the user .
* Accepts 'true' or 'false' as a string literal ,
* not boolean . Default 'true' .
* @ type string $syntax_highlighting Whether to enable the rich code editor for the user .
* Accepts 'true' or 'false' as a string literal ,
* not boolean . Default 'true' .
* @ type string $comment_shortcuts Whether to enable comment moderation keyboard
* shortcuts for the user . Accepts 'true' or 'false'
* as a string literal , not boolean . Default 'false' .
* @ type string $admin_color Admin color scheme for the user . Default 'fresh' .
* @ type bool $use_ssl Whether the user should always access the admin over
* https . Default false .
* @ type string $user_registered Date the user registered . Format is 'Y-m-d H:i:s' .
* @ type string $user_activation_key Password reset key . Default empty .
* @ type bool $spam Multisite only . Whether the user is marked as spam .
* Default false .
* @ type string $show_admin_bar_front Whether to display the Admin Bar for the user
* on the site 's front end. Accepts ' true ' or ' false '
* as a string literal , not boolean . Default 'true' .
* @ type string $role User ' s role .
* @ type string $locale User ' s locale . Default empty .
2015-11-20 08:24:30 +01:00
* }
* @ return int | WP_Error The newly created user ' s ID or a WP_Error object if the user could not
* be created .
*/
function wp_insert_user ( $userdata ) {
global $wpdb ;
if ( $userdata instanceof stdClass ) {
$userdata = get_object_vars ( $userdata );
} elseif ( $userdata instanceof WP_User ) {
$userdata = $userdata -> to_array ();
}
// Are we updating or creating?
if ( ! empty ( $userdata [ 'ID' ] ) ) {
2017-12-01 00:11:00 +01:00
$ID = ( int ) $userdata [ 'ID' ];
$update = true ;
2015-11-20 08:24:30 +01:00
$old_user_data = get_userdata ( $ID );
if ( ! $old_user_data ) {
return new WP_Error ( 'invalid_user_id' , __ ( 'Invalid user ID.' ) );
}
2020-06-16 23:07:14 +02:00
// Hashed in wp_update_user(), plaintext if called directly.
2015-11-20 08:24:30 +01:00
$user_pass = ! empty ( $userdata [ 'user_pass' ] ) ? $userdata [ 'user_pass' ] : $old_user_data -> user_pass ;
} else {
$update = false ;
2020-01-29 01:45:18 +01:00
// Hash the password.
2015-11-20 08:24:30 +01:00
$user_pass = wp_hash_password ( $userdata [ 'user_pass' ] );
}
$sanitized_user_login = sanitize_user ( $userdata [ 'user_login' ], true );
/**
2016-05-22 20:30:27 +02:00
* Filters a username after it has been sanitized .
2015-11-20 08:24:30 +01:00
*
* This filter is called before the user is created or updated .
*
* @ since 2.0 . 3
*
* @ param string $sanitized_user_login Username after it has been sanitized .
*/
$pre_user_login = apply_filters ( 'pre_user_login' , $sanitized_user_login );
2020-01-29 01:45:18 +01:00
// Remove any non-printable chars from the login string to see if we have ended up with an empty username.
2015-11-20 08:24:30 +01:00
$user_login = trim ( $pre_user_login );
// user_login must be between 0 and 60 characters.
if ( empty ( $user_login ) ) {
2017-12-01 00:11:00 +01:00
return new WP_Error ( 'empty_user_login' , __ ( 'Cannot create a user with an empty login name.' ) );
2015-11-20 08:24:30 +01:00
} elseif ( mb_strlen ( $user_login ) > 60 ) {
return new WP_Error ( 'user_login_too_long' , __ ( 'Username may not be longer than 60 characters.' ) );
}
if ( ! $update && username_exists ( $user_login ) ) {
return new WP_Error ( 'existing_user_login' , __ ( 'Sorry, that username already exists!' ) );
}
/**
General: Remove “whitelist” and “blacklist” in favor of more clear and inclusive language.
“The WordPress open source community cares about diversity. We strive to maintain a welcoming environment where everyone can feel included.”
With this commit, all occurrences of “whitelist” and “blacklist” (with the single exception of the `$new_whitelist_options` global variable) are removed. A new ticket has been opened to explore renaming the `$new_whitelist_options` variable (#50434).
Changing to more specific names or rewording sentences containing these terms not only makes the code more inclusive, but also helps provide clarity. These terms are often ambiguous. What is being blocked or allowed is not always immediately clear. This can make it more difficult for non-native English speakers to read through the codebase.
Words matter. If one contributor feels more welcome because these terms are removed, this was worth the effort.
Props strangerstudios, jorbin, desrosj, joemcgill, timothyblynjacobs, ocean90, ayeshrajans, davidbaumwald, earnjam.
See #48900, #50434.
Fixes #50413.
Built from https://develop.svn.wordpress.org/trunk@48121
git-svn-id: http://core.svn.wordpress.org/trunk@47890 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-22 19:26:13 +02:00
* Filters the list of disallowed usernames .
2015-11-20 08:24:30 +01:00
*
* @ since 4.4 . 0
*
General: Remove “whitelist” and “blacklist” in favor of more clear and inclusive language.
“The WordPress open source community cares about diversity. We strive to maintain a welcoming environment where everyone can feel included.”
With this commit, all occurrences of “whitelist” and “blacklist” (with the single exception of the `$new_whitelist_options` global variable) are removed. A new ticket has been opened to explore renaming the `$new_whitelist_options` variable (#50434).
Changing to more specific names or rewording sentences containing these terms not only makes the code more inclusive, but also helps provide clarity. These terms are often ambiguous. What is being blocked or allowed is not always immediately clear. This can make it more difficult for non-native English speakers to read through the codebase.
Words matter. If one contributor feels more welcome because these terms are removed, this was worth the effort.
Props strangerstudios, jorbin, desrosj, joemcgill, timothyblynjacobs, ocean90, ayeshrajans, davidbaumwald, earnjam.
See #48900, #50434.
Fixes #50413.
Built from https://develop.svn.wordpress.org/trunk@48121
git-svn-id: http://core.svn.wordpress.org/trunk@47890 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-06-22 19:26:13 +02:00
* @ param array $usernames Array of disallowed usernames .
2015-11-20 08:24:30 +01:00
*/
$illegal_logins = ( array ) apply_filters ( 'illegal_user_logins' , array () );
2019-11-29 23:04:02 +01:00
if ( in_array ( strtolower ( $user_login ), array_map ( 'strtolower' , $illegal_logins ), true ) ) {
2015-12-05 00:25:26 +01:00
return new WP_Error ( 'invalid_username' , __ ( 'Sorry, that username is not allowed.' ) );
2015-11-20 08:24:30 +01:00
}
/*
* If a nicename is provided , remove unsafe user characters before using it .
* Otherwise build a nicename from the user_login .
*/
if ( ! empty ( $userdata [ 'user_nicename' ] ) ) {
$user_nicename = sanitize_user ( $userdata [ 'user_nicename' ], true );
if ( mb_strlen ( $user_nicename ) > 50 ) {
return new WP_Error ( 'user_nicename_too_long' , __ ( 'Nicename may not be longer than 50 characters.' ) );
}
} else {
$user_nicename = mb_substr ( $user_login , 0 , 50 );
}
$user_nicename = sanitize_title ( $user_nicename );
/**
2016-05-22 20:30:27 +02:00
* Filters a user ' s nicename before the user is created or updated .
2015-11-20 08:24:30 +01:00
*
* @ since 2.0 . 3
*
* @ param string $user_nicename The user ' s nicename .
*/
$user_nicename = apply_filters ( 'pre_user_nicename' , $user_nicename );
2019-08-01 19:13:57 +02:00
$user_nicename_check = $wpdb -> get_var ( $wpdb -> prepare ( " SELECT ID FROM $wpdb->users WHERE user_nicename = %s AND user_login != %s LIMIT 1 " , $user_nicename , $user_login ) );
2015-11-20 08:24:30 +01:00
2019-08-01 19:13:57 +02:00
if ( $user_nicename_check ) {
$suffix = 2 ;
while ( $user_nicename_check ) {
// user_nicename allows 50 chars. Subtract one for a hyphen, plus the length of the suffix.
$base_length = 49 - mb_strlen ( $suffix );
$alt_user_nicename = mb_substr ( $user_nicename , 0 , $base_length ) . " - $suffix " ;
$user_nicename_check = $wpdb -> get_var ( $wpdb -> prepare ( " SELECT ID FROM $wpdb->users WHERE user_nicename = %s AND user_login != %s LIMIT 1 " , $alt_user_nicename , $user_login ) );
$suffix ++ ;
}
$user_nicename = $alt_user_nicename ;
}
2015-11-20 08:24:30 +01:00
$raw_user_email = empty ( $userdata [ 'user_email' ] ) ? '' : $userdata [ 'user_email' ];
/**
2016-05-22 20:30:27 +02:00
* Filters a user ' s email before the user is created or updated .
2015-11-20 08:24:30 +01:00
*
* @ since 2.0 . 3
*
* @ param string $raw_user_email The user ' s email .
*/
$user_email = apply_filters ( 'pre_user_email' , $raw_user_email );
/*
* If there is no update , just check for `email_exists` . If there is an update ,
2020-10-14 21:04:08 +02:00
* check if current email and new email are the same , and check `email_exists`
2015-11-20 08:24:30 +01:00
* accordingly .
*/
if ( ( ! $update || ( ! empty ( $old_user_data ) && 0 !== strcasecmp ( $user_email , $old_user_data -> user_email ) ) )
&& ! defined ( 'WP_IMPORTING' )
&& email_exists ( $user_email )
) {
return new WP_Error ( 'existing_user_email' , __ ( 'Sorry, that email address is already used!' ) );
}
2019-08-01 13:28:54 +02:00
2019-08-01 19:13:57 +02:00
$raw_user_url = empty ( $userdata [ 'user_url' ] ) ? '' : $userdata [ 'user_url' ];
/**
* Filters a user ' s URL before the user is created or updated .
*
* @ since 2.0 . 3
*
* @ param string $raw_user_url The user ' s URL .
*/
$user_url = apply_filters ( 'pre_user_url' , $raw_user_url );
$user_registered = empty ( $userdata [ 'user_registered' ] ) ? gmdate ( 'Y-m-d H:i:s' ) : $userdata [ 'user_registered' ];
2019-08-01 19:25:55 +02:00
$user_activation_key = empty ( $userdata [ 'user_activation_key' ] ) ? '' : $userdata [ 'user_activation_key' ];
2019-08-22 03:53:55 +02:00
if ( ! empty ( $userdata [ 'spam' ] ) && ! is_multisite () ) {
2019-08-01 13:28:54 +02:00
return new WP_Error ( 'no_spam' , __ ( 'Sorry, marking a user as spam is only supported on Multisite.' ) );
}
$spam = empty ( $userdata [ 'spam' ] ) ? 0 : ( bool ) $userdata [ 'spam' ];
2019-08-01 19:13:57 +02:00
// Store values to save in user meta.
$meta = array ();
2015-11-20 08:24:30 +01:00
$nickname = empty ( $userdata [ 'nickname' ] ) ? $user_login : $userdata [ 'nickname' ];
/**
2016-05-22 20:30:27 +02:00
* Filters a user ' s nickname before the user is created or updated .
2015-11-20 08:24:30 +01:00
*
* @ since 2.0 . 3
*
* @ param string $nickname The user ' s nickname .
*/
$meta [ 'nickname' ] = apply_filters ( 'pre_user_nickname' , $nickname );
$first_name = empty ( $userdata [ 'first_name' ] ) ? '' : $userdata [ 'first_name' ];
/**
2016-05-22 20:30:27 +02:00
* Filters a user ' s first name before the user is created or updated .
2015-11-20 08:24:30 +01:00
*
* @ since 2.0 . 3
*
* @ param string $first_name The user ' s first name .
*/
$meta [ 'first_name' ] = apply_filters ( 'pre_user_first_name' , $first_name );
$last_name = empty ( $userdata [ 'last_name' ] ) ? '' : $userdata [ 'last_name' ];
/**
2016-05-22 20:30:27 +02:00
* Filters a user ' s last name before the user is created or updated .
2015-11-20 08:24:30 +01:00
*
* @ since 2.0 . 3
*
* @ param string $last_name The user ' s last name .
*/
$meta [ 'last_name' ] = apply_filters ( 'pre_user_last_name' , $last_name );
if ( empty ( $userdata [ 'display_name' ] ) ) {
if ( $update ) {
$display_name = $user_login ;
} elseif ( $meta [ 'first_name' ] && $meta [ 'last_name' ] ) {
2019-09-03 02:41:05 +02:00
/* translators: 1: User's first name, 2: Last name. */
2015-11-20 08:24:30 +01:00
$display_name = sprintf ( _x ( '%1$s %2$s' , 'Display name based on first name and last name' ), $meta [ 'first_name' ], $meta [ 'last_name' ] );
} elseif ( $meta [ 'first_name' ] ) {
$display_name = $meta [ 'first_name' ];
} elseif ( $meta [ 'last_name' ] ) {
$display_name = $meta [ 'last_name' ];
} else {
$display_name = $user_login ;
}
} else {
$display_name = $userdata [ 'display_name' ];
}
/**
2016-05-22 20:30:27 +02:00
* Filters a user ' s display name before the user is created or updated .
2015-11-20 08:24:30 +01:00
*
* @ since 2.0 . 3
*
* @ param string $display_name The user ' s display name .
*/
$display_name = apply_filters ( 'pre_user_display_name' , $display_name );
$description = empty ( $userdata [ 'description' ] ) ? '' : $userdata [ 'description' ];
/**
2016-05-22 20:30:27 +02:00
* Filters a user ' s description before the user is created or updated .
2015-11-20 08:24:30 +01:00
*
* @ since 2.0 . 3
*
* @ param string $description The user ' s description .
*/
$meta [ 'description' ] = apply_filters ( 'pre_user_description' , $description );
$meta [ 'rich_editing' ] = empty ( $userdata [ 'rich_editing' ] ) ? 'true' : $userdata [ 'rich_editing' ];
Editor: Add CodeMirror-powered code editor with syntax highlighting, linting, and auto-completion.
* Code editor is integrated into the Theme/Plugin Editor, Additional CSS in Customizer, and Custom HTML widget. Code editor is not yet integrated into the post editor, and it may not be until accessibility concerns are addressed.
* The CodeMirror component in the Custom HTML widget is integrated in a similar way to TinyMCE being integrated into the Text widget, adopting the same approach for integrating dynamic JavaScript-initialized fields.
* Linting is performed for JS, CSS, HTML, and JSON via JSHint, CSSLint, HTMLHint, and JSONLint respectively. Linting is not yet supported for PHP.
* When user lacks `unfiltered_html` the capability, the Custom HTML widget will report any Kses-invalid elements and attributes as errors via a custom Kses rule for HTMLHint.
* When linting errors are detected, the user will be prevented from saving the code until the errors are fixed, reducing instances of broken websites.
* The placeholder value is removed from Custom CSS in favor of a fleshed-out section description which now auto-expands when the CSS field is empty. See #39892.
* The CodeMirror library is included as `wp.CodeMirror` to prevent conflicts with any existing `CodeMirror` global.
* An `wp.codeEditor.initialize()` API in JS is provided to convert a `textarea` into CodeMirror, with a `wp_enqueue_code_editor()` function in PHP to manage enqueueing the assets and settings needed to edit a given type of code.
* A user preference is added to manage whether or not "syntax highlighting" is enabled. The feature is opt-out, being enabled by default.
* Allowed file extensions in the theme and plugin editors have been updated to include formats which CodeMirror has modes for: `conf`, `css`, `diff`, `patch`, `html`, `htm`, `http`, `js`, `json`, `jsx`, `less`, `md`, `php`, `phtml`, `php3`, `php4`, `php5`, `php7`, `phps`, `scss`, `sass`, `sh`, `bash`, `sql`, `svg`, `xml`, `yml`, `yaml`, `txt`.
Props westonruter, georgestephanis, obenland, melchoyce, pixolin, mizejewski, michelleweber, afercia, grahamarmfield, samikeijonen, rianrietveld, iseulde.
See #38707.
Fixes #12423, #39892.
Built from https://develop.svn.wordpress.org/trunk@41376
git-svn-id: http://core.svn.wordpress.org/trunk@41209 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-09-13 08:08:47 +02:00
$meta [ 'syntax_highlighting' ] = empty ( $userdata [ 'syntax_highlighting' ] ) ? 'true' : $userdata [ 'syntax_highlighting' ];
2015-11-20 08:24:30 +01:00
$meta [ 'comment_shortcuts' ] = empty ( $userdata [ 'comment_shortcuts' ] ) || 'false' === $userdata [ 'comment_shortcuts' ] ? 'false' : 'true' ;
2017-12-01 00:11:00 +01:00
$admin_color = empty ( $userdata [ 'admin_color' ] ) ? 'fresh' : $userdata [ 'admin_color' ];
2015-11-20 08:24:30 +01:00
$meta [ 'admin_color' ] = preg_replace ( '|[^a-z0-9 _.\-@]|i' , '' , $admin_color );
2019-08-01 13:28:54 +02:00
$meta [ 'use_ssl' ] = empty ( $userdata [ 'use_ssl' ] ) ? 0 : ( bool ) $userdata [ 'use_ssl' ];
2015-11-20 08:24:30 +01:00
$meta [ 'show_admin_bar_front' ] = empty ( $userdata [ 'show_admin_bar_front' ] ) ? 'true' : $userdata [ 'show_admin_bar_front' ];
2016-10-03 09:04:29 +02:00
$meta [ 'locale' ] = isset ( $userdata [ 'locale' ] ) ? $userdata [ 'locale' ] : '' ;
2019-08-01 19:25:55 +02:00
$compacted = compact ( 'user_pass' , 'user_nicename' , 'user_email' , 'user_url' , 'user_registered' , 'user_activation_key' , 'display_name' );
2017-12-01 00:11:00 +01:00
$data = wp_unslash ( $compacted );
2015-11-20 08:24:30 +01:00
2017-07-01 15:30:42 +02:00
if ( ! $update ) {
$data = $data + compact ( 'user_login' );
}
2019-08-01 13:28:54 +02:00
if ( is_multisite () ) {
$data = $data + compact ( 'spam' );
}
2017-07-01 15:30:42 +02:00
/**
* Filters user data before the record is created or updated .
*
2020-10-26 23:53:06 +01:00
* It only includes data in the users table , not any user metadata .
2017-07-01 15:30:42 +02:00
*
* @ since 4.9 . 0
*
* @ param array $data {
* Values and keys for the user .
*
* @ type string $user_login The user ' s login . Only included if $update == false
* @ type string $user_pass The user ' s password .
* @ type string $user_email The user ' s email .
* @ type string $user_url The user ' s url .
* @ type string $user_nicename The user 's nice name. Defaults to a URL-safe version of user' s login
* @ type string $display_name The user ' s display name .
* @ type string $user_registered MySQL timestamp describing the moment when the user registered . Defaults to
* the current UTC timestamp .
* }
* @ param bool $update Whether the user is being updated rather than created .
* @ param int | null $id ID of the user to be updated , or NULL if the user is being created .
*/
$data = apply_filters ( 'wp_pre_insert_user_data' , $data , $update , $update ? ( int ) $ID : null );
2019-08-20 19:26:55 +02:00
if ( empty ( $data ) || ! is_array ( $data ) ) {
return new WP_Error ( 'empty_data' , __ ( 'Not enough data to create this user.' ) );
}
2015-11-20 08:24:30 +01:00
if ( $update ) {
2020-04-29 17:25:07 +02:00
if ( $user_email !== $old_user_data -> user_email || $user_pass !== $old_user_data -> user_pass ) {
2015-11-20 08:24:30 +01:00
$data [ 'user_activation_key' ] = '' ;
}
$wpdb -> update ( $wpdb -> users , $data , compact ( 'ID' ) );
$user_id = ( int ) $ID ;
} else {
2017-07-01 15:30:42 +02:00
$wpdb -> insert ( $wpdb -> users , $data );
2015-11-20 08:24:30 +01:00
$user_id = ( int ) $wpdb -> insert_id ;
}
$user = new WP_User ( $user_id );
/**
2017-12-01 00:11:00 +01:00
* Filters a user ' s meta values and keys immediately after the user is created or updated
* and before any user meta is inserted or updated .
*
* Does not include contact methods . These are added using `wp_get_user_contact_methods( $user )` .
*
* @ since 4.4 . 0
*
* @ param array $meta {
* Default meta values and keys for the user .
*
* @ type string $nickname The user 's nickname. Default is the user' s username .
2015-11-20 08:24:30 +01:00
* @ type string $first_name The user ' s first name .
* @ type string $last_name The user ' s last name .
* @ type string $description The user ' s description .
2020-02-25 19:20:06 +01:00
* @ type string $rich_editing Whether to enable the rich - editor for the user . Default 'true' .
* @ type string $syntax_highlighting Whether to enable the rich code editor for the user . Default 'true' .
* @ type string $comment_shortcuts Whether to enable keyboard shortcuts for the user . Default 'false' .
2015-11-20 08:24:30 +01:00
* @ type string $admin_color The color scheme for a user 's admin screen. Default ' fresh ' .
2020-02-25 19:20:06 +01:00
* @ type int | bool $use_ssl Whether to force SSL on the user ' s admin area . 0 | false if SSL
* is not forced .
* @ type string $show_admin_bar_front Whether to show the admin bar on the front end for the user .
2020-02-25 19:16:07 +01:00
* Default 'true' .
2019-05-30 16:37:53 +02:00
* @ type string $locale User ' s locale . Default empty .
2017-12-01 00:11:00 +01:00
* }
2015-11-20 08:24:30 +01:00
* @ param WP_User $user User object .
* @ param bool $update Whether the user is being updated rather than created .
2017-12-01 00:11:00 +01:00
*/
2015-11-20 08:24:30 +01:00
$meta = apply_filters ( 'insert_user_meta' , $meta , $user , $update );
// Update user meta.
foreach ( $meta as $key => $value ) {
update_user_meta ( $user_id , $key , $value );
}
foreach ( wp_get_user_contact_methods ( $user ) as $key => $value ) {
if ( isset ( $userdata [ $key ] ) ) {
update_user_meta ( $user_id , $key , $userdata [ $key ] );
}
}
if ( isset ( $userdata [ 'role' ] ) ) {
$user -> set_role ( $userdata [ 'role' ] );
} elseif ( ! $update ) {
2017-12-01 00:11:00 +01:00
$user -> set_role ( get_option ( 'default_role' ) );
2015-11-20 08:24:30 +01:00
}
2019-08-01 19:49:57 +02:00
clean_user_cache ( $user_id );
2015-11-20 08:24:30 +01:00
if ( $update ) {
/**
* Fires immediately after an existing user is updated .
*
* @ since 2.0 . 0
*
2017-08-19 22:19:44 +02:00
* @ param int $user_id User ID .
* @ param WP_User $old_user_data Object containing user ' s data prior to update .
2015-11-20 08:24:30 +01:00
*/
do_action ( 'profile_update' , $user_id , $old_user_data );
2019-08-01 13:28:54 +02:00
if ( isset ( $userdata [ 'spam' ] ) && $userdata [ 'spam' ] != $old_user_data -> spam ) {
2020-02-09 17:55:09 +01:00
if ( 1 == $userdata [ 'spam' ] ) {
2019-08-01 13:28:54 +02:00
/**
* Fires after the user is marked as a SPAM user .
*
* @ since 3.0 . 0
*
* @ param int $user_id ID of the user marked as SPAM .
*/
do_action ( 'make_spam_user' , $user_id );
} else {
/**
* Fires after the user is marked as a HAM user . Opposite of SPAM .
*
* @ since 3.0 . 0
*
* @ param int $user_id ID of the user marked as HAM .
*/
do_action ( 'make_ham_user' , $user_id );
}
}
2015-11-20 08:24:30 +01:00
} else {
/**
* Fires immediately after a new user is registered .
*
* @ since 1.5 . 0
*
* @ param int $user_id User ID .
*/
do_action ( 'user_register' , $user_id );
}
return $user_id ;
}
/**
* Update a user in the database .
*
* It is possible to update a user 's password by specifying the ' user_pass '
* value in the $userdata parameter array .
*
* If current user ' s password is being updated , then the cookies will be
* cleared .
*
* @ since 2.0 . 0
*
* @ see wp_insert_user () For what fields can be set in $userdata .
*
2018-03-04 19:12:31 +01:00
* @ param array | object | WP_User $userdata An array of user data or a user object of type stdClass or WP_User .
2015-11-20 08:24:30 +01:00
* @ return int | WP_Error The updated user ' s ID or a WP_Error object if the user could not be updated .
2008-09-12 06:29:09 +02:00
*/
2017-12-01 00:11:00 +01:00
function wp_update_user ( $userdata ) {
2015-11-20 08:24:30 +01:00
if ( $userdata instanceof stdClass ) {
$userdata = get_object_vars ( $userdata );
} elseif ( $userdata instanceof WP_User ) {
$userdata = $userdata -> to_array ();
}
$ID = isset ( $userdata [ 'ID' ] ) ? ( int ) $userdata [ 'ID' ] : 0 ;
if ( ! $ID ) {
return new WP_Error ( 'invalid_user_id' , __ ( 'Invalid user ID.' ) );
}
2020-01-29 01:45:18 +01:00
// First, get all of the original fields.
2015-11-20 08:24:30 +01:00
$user_obj = get_userdata ( $ID );
if ( ! $user_obj ) {
return new WP_Error ( 'invalid_user_id' , __ ( 'Invalid user ID.' ) );
}
$user = $user_obj -> to_array ();
2020-01-29 01:45:18 +01:00
// Add additional custom fields.
2015-11-20 08:24:30 +01:00
foreach ( _get_additional_user_keys ( $user_obj ) as $key ) {
$user [ $key ] = get_user_meta ( $ID , $key , true );
}
// Escape data pulled from DB.
$user = add_magic_quotes ( $user );
if ( ! empty ( $userdata [ 'user_pass' ] ) && $userdata [ 'user_pass' ] !== $user_obj -> user_pass ) {
2020-01-29 01:45:18 +01:00
// If password is changing, hash it now.
2017-12-01 00:11:00 +01:00
$plaintext_pass = $userdata [ 'user_pass' ];
2015-11-20 08:24:30 +01:00
$userdata [ 'user_pass' ] = wp_hash_password ( $userdata [ 'user_pass' ] );
/**
2016-05-22 20:30:27 +02:00
* Filters whether to send the password change email .
2015-11-20 08:24:30 +01:00
*
* @ since 4.3 . 0
*
* @ see wp_insert_user () For `$user` and `$userdata` fields .
*
* @ param bool $send Whether to send the email .
* @ param array $user The original user array .
* @ param array $userdata The updated user array .
*/
$send_password_change_email = apply_filters ( 'send_password_change_email' , true , $user , $userdata );
}
if ( isset ( $userdata [ 'user_email' ] ) && $user [ 'user_email' ] !== $userdata [ 'user_email' ] ) {
/**
2016-05-22 20:30:27 +02:00
* Filters whether to send the email change email .
2015-11-20 08:24:30 +01:00
*
* @ since 4.3 . 0
*
* @ see wp_insert_user () For `$user` and `$userdata` fields .
*
* @ param bool $send Whether to send the email .
* @ param array $user The original user array .
* @ param array $userdata The updated user array .
*/
$send_email_change_email = apply_filters ( 'send_email_change_email' , true , $user , $userdata );
}
2019-08-01 19:49:57 +02:00
clean_user_cache ( $user_obj );
2015-11-20 08:24:30 +01:00
// Merge old and new fields with new fields overwriting old ones.
$userdata = array_merge ( $user , $userdata );
2017-12-01 00:11:00 +01:00
$user_id = wp_insert_user ( $userdata );
2015-11-20 08:24:30 +01:00
if ( ! is_wp_error ( $user_id ) ) {
2016-01-15 08:29:27 +01:00
$blog_name = wp_specialchars_decode ( get_option ( 'blogname' ), ENT_QUOTES );
2015-11-20 08:24:30 +01:00
2016-10-26 17:36:31 +02:00
$switched_locale = false ;
if ( ! empty ( $send_password_change_email ) || ! empty ( $send_email_change_email ) ) {
$switched_locale = switch_to_locale ( get_user_locale ( $user_id ) );
}
2015-11-20 08:24:30 +01:00
2016-10-26 17:36:31 +02:00
if ( ! empty ( $send_password_change_email ) ) {
2015-11-20 08:24:30 +01:00
/* translators: Do not translate USERNAME, ADMIN_EMAIL, EMAIL, SITENAME, SITEURL: those are placeholders. */
2017-12-01 00:11:00 +01:00
$pass_change_text = __ (
' Hi ###USERNAME###,
2015-11-20 08:24:30 +01:00
This notice confirms that your password was changed on ###SITENAME###.
If you did not change your password , please contact the Site Administrator at
###ADMIN_EMAIL###
This email has been sent to ###EMAIL###
Regards ,
All at ###SITENAME###
2017-12-01 00:11:00 +01:00
###SITEURL###'
);
2015-11-20 08:24:30 +01:00
$pass_change_email = array (
'to' => $user [ 'user_email' ],
2019-09-03 02:41:05 +02:00
/* translators: Password change notification email subject. %s: Site title. */
2019-04-08 08:17:51 +02:00
'subject' => __ ( '[%s] Password Changed' ),
2015-11-20 08:24:30 +01:00
'message' => $pass_change_text ,
'headers' => '' ,
);
/**
2016-05-22 20:30:27 +02:00
* Filters the contents of the email sent when the user ' s password is changed .
2015-11-20 08:24:30 +01:00
*
* @ since 4.3 . 0
*
* @ param array $pass_change_email {
2020-09-21 18:46:06 +02:00
* Used to build wp_mail () .
2020-06-20 14:22:07 +02:00
*
2020-09-21 18:46:06 +02:00
* @ type string $to The intended recipients . Add emails in a comma separated string .
* @ type string $subject The subject of the email .
* @ type string $message The content of the email .
* The following strings have a special meaning and will get replaced dynamically :
* - ###USERNAME### The current user's username.
* - ###ADMIN_EMAIL### The admin email in case this was unexpected.
* - ###EMAIL### The user's email address.
* - ###SITENAME### The name of the site.
* - ###SITEURL### The URL to the site.
* @ type string $headers Headers . Add headers in a newline ( \r\n ) separated string .
* }
2015-11-20 08:24:30 +01:00
* @ param array $user The original user array .
* @ param array $userdata The updated user array .
*/
$pass_change_email = apply_filters ( 'password_change_email' , $pass_change_email , $user , $userdata );
$pass_change_email [ 'message' ] = str_replace ( '###USERNAME###' , $user [ 'user_login' ], $pass_change_email [ 'message' ] );
$pass_change_email [ 'message' ] = str_replace ( '###ADMIN_EMAIL###' , get_option ( 'admin_email' ), $pass_change_email [ 'message' ] );
$pass_change_email [ 'message' ] = str_replace ( '###EMAIL###' , $user [ 'user_email' ], $pass_change_email [ 'message' ] );
2016-01-15 08:29:27 +01:00
$pass_change_email [ 'message' ] = str_replace ( '###SITENAME###' , $blog_name , $pass_change_email [ 'message' ] );
2015-11-20 08:24:30 +01:00
$pass_change_email [ 'message' ] = str_replace ( '###SITEURL###' , home_url (), $pass_change_email [ 'message' ] );
wp_mail ( $pass_change_email [ 'to' ], sprintf ( $pass_change_email [ 'subject' ], $blog_name ), $pass_change_email [ 'message' ], $pass_change_email [ 'headers' ] );
}
if ( ! empty ( $send_email_change_email ) ) {
2017-07-27 04:57:43 +02:00
/* translators: Do not translate USERNAME, ADMIN_EMAIL, NEW_EMAIL, EMAIL, SITENAME, SITEURL: those are placeholders. */
2017-12-01 00:11:00 +01:00
$email_change_text = __ (
' Hi ###USERNAME###,
2015-11-20 08:24:30 +01:00
2017-07-27 04:57:43 +02:00
This notice confirms that your email address on ###SITENAME### was changed to ###NEW_EMAIL###.
2015-11-20 08:24:30 +01:00
If you did not change your email , please contact the Site Administrator at
###ADMIN_EMAIL###
This email has been sent to ###EMAIL###
Regards ,
All at ###SITENAME###
2017-12-01 00:11:00 +01:00
###SITEURL###'
);
2015-11-20 08:24:30 +01:00
$email_change_email = array (
'to' => $user [ 'user_email' ],
2019-09-03 02:41:05 +02:00
/* translators: Email change notification email subject. %s: Site title. */
2019-04-08 08:17:51 +02:00
'subject' => __ ( '[%s] Email Changed' ),
2015-11-20 08:24:30 +01:00
'message' => $email_change_text ,
'headers' => '' ,
);
/**
2016-05-22 20:30:27 +02:00
* Filters the contents of the email sent when the user ' s email is changed .
2015-11-20 08:24:30 +01:00
*
* @ since 4.3 . 0
*
* @ param array $email_change_email {
2020-09-21 18:46:06 +02:00
* Used to build wp_mail () .
2020-06-20 14:22:07 +02:00
*
2020-09-21 18:46:06 +02:00
* @ type string $to The intended recipients .
* @ type string $subject The subject of the email .
* @ type string $message The content of the email .
* The following strings have a special meaning and will get replaced dynamically :
* - ###USERNAME### The current user's username.
* - ###ADMIN_EMAIL### The admin email in case this was unexpected.
* - ###NEW_EMAIL### The new email address.
* - ###EMAIL### The old email address.
* - ###SITENAME### The name of the site.
* - ###SITEURL### The URL to the site.
* @ type string $headers Headers .
* }
2020-06-20 14:22:07 +02:00
* @ param array $user The original user array .
2015-11-20 08:24:30 +01:00
* @ param array $userdata The updated user array .
*/
$email_change_email = apply_filters ( 'email_change_email' , $email_change_email , $user , $userdata );
$email_change_email [ 'message' ] = str_replace ( '###USERNAME###' , $user [ 'user_login' ], $email_change_email [ 'message' ] );
$email_change_email [ 'message' ] = str_replace ( '###ADMIN_EMAIL###' , get_option ( 'admin_email' ), $email_change_email [ 'message' ] );
2017-07-27 04:57:43 +02:00
$email_change_email [ 'message' ] = str_replace ( '###NEW_EMAIL###' , $userdata [ 'user_email' ], $email_change_email [ 'message' ] );
2015-11-20 08:24:30 +01:00
$email_change_email [ 'message' ] = str_replace ( '###EMAIL###' , $user [ 'user_email' ], $email_change_email [ 'message' ] );
2016-01-15 08:29:27 +01:00
$email_change_email [ 'message' ] = str_replace ( '###SITENAME###' , $blog_name , $email_change_email [ 'message' ] );
2015-11-20 08:24:30 +01:00
$email_change_email [ 'message' ] = str_replace ( '###SITEURL###' , home_url (), $email_change_email [ 'message' ] );
wp_mail ( $email_change_email [ 'to' ], sprintf ( $email_change_email [ 'subject' ], $blog_name ), $email_change_email [ 'message' ], $email_change_email [ 'headers' ] );
}
2016-10-26 17:36:31 +02:00
if ( $switched_locale ) {
restore_previous_locale ();
}
2015-11-20 08:24:30 +01:00
}
// Update the cookies if the password changed.
$current_user = wp_get_current_user ();
if ( $current_user -> ID == $ID ) {
2017-12-01 00:11:00 +01:00
if ( isset ( $plaintext_pass ) ) {
2015-11-20 08:24:30 +01:00
wp_clear_auth_cookie ();
// Here we calculate the expiration length of the current auth cookie and compare it to the default expiration.
// If it's greater than this, then we know the user checked 'Remember Me' when they logged in.
2017-12-01 00:11:00 +01:00
$logged_in_cookie = wp_parse_auth_cookie ( '' , 'logged_in' );
2015-11-20 08:24:30 +01:00
/** This filter is documented in wp-includes/pluggable.php */
$default_cookie_life = apply_filters ( 'auth_cookie_expiration' , ( 2 * DAY_IN_SECONDS ), $ID , false );
2019-07-15 08:25:57 +02:00
$remember = false ;
if ( false !== $logged_in_cookie && ( $logged_in_cookie [ 'expiration' ] - time () ) > $default_cookie_life ) {
$remember = true ;
}
2015-11-20 08:24:30 +01:00
wp_set_auth_cookie ( $ID , $remember );
}
}
return $user_id ;
}
/**
* A simpler way of inserting a user into the database .
*
* Creates a new user with just the username , password , and email . For more
2016-05-02 06:00:28 +02:00
* complex user creation use wp_insert_user () to specify more information .
2015-11-20 08:24:30 +01:00
*
* @ since 2.0 . 0
2020-06-16 23:07:14 +02:00
*
* @ see wp_insert_user () More complete way to create a new user .
2015-11-20 08:24:30 +01:00
*
* @ param string $username The user ' s username .
* @ param string $password The user ' s password .
* @ param string $email Optional . The user ' s email . Default empty .
* @ return int | WP_Error The newly created user ' s ID or a WP_Error object if the user could not
* be created .
*/
2017-12-01 00:11:00 +01:00
function wp_create_user ( $username , $password , $email = '' ) {
2015-11-20 08:24:30 +01:00
$user_login = wp_slash ( $username );
2017-12-01 00:11:00 +01:00
$user_email = wp_slash ( $email );
$user_pass = $password ;
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
$userdata = compact ( 'user_login' , 'user_email' , 'user_pass' );
return wp_insert_user ( $userdata );
2015-11-20 08:24:30 +01:00
}
/**
* Returns a list of meta keys to be ( maybe ) populated in wp_update_user () .
*
* The list of keys returned via this function are dependent on the presence
* of those keys in the user meta data to be set .
*
* @ since 3.3 . 0
* @ access private
*
* @ param WP_User $user WP_User instance .
2019-11-05 22:23:02 +01:00
* @ return string [] List of user keys to be populated in wp_update_user () .
2015-11-20 08:24:30 +01:00
*/
function _get_additional_user_keys ( $user ) {
Editor: Add CodeMirror-powered code editor with syntax highlighting, linting, and auto-completion.
* Code editor is integrated into the Theme/Plugin Editor, Additional CSS in Customizer, and Custom HTML widget. Code editor is not yet integrated into the post editor, and it may not be until accessibility concerns are addressed.
* The CodeMirror component in the Custom HTML widget is integrated in a similar way to TinyMCE being integrated into the Text widget, adopting the same approach for integrating dynamic JavaScript-initialized fields.
* Linting is performed for JS, CSS, HTML, and JSON via JSHint, CSSLint, HTMLHint, and JSONLint respectively. Linting is not yet supported for PHP.
* When user lacks `unfiltered_html` the capability, the Custom HTML widget will report any Kses-invalid elements and attributes as errors via a custom Kses rule for HTMLHint.
* When linting errors are detected, the user will be prevented from saving the code until the errors are fixed, reducing instances of broken websites.
* The placeholder value is removed from Custom CSS in favor of a fleshed-out section description which now auto-expands when the CSS field is empty. See #39892.
* The CodeMirror library is included as `wp.CodeMirror` to prevent conflicts with any existing `CodeMirror` global.
* An `wp.codeEditor.initialize()` API in JS is provided to convert a `textarea` into CodeMirror, with a `wp_enqueue_code_editor()` function in PHP to manage enqueueing the assets and settings needed to edit a given type of code.
* A user preference is added to manage whether or not "syntax highlighting" is enabled. The feature is opt-out, being enabled by default.
* Allowed file extensions in the theme and plugin editors have been updated to include formats which CodeMirror has modes for: `conf`, `css`, `diff`, `patch`, `html`, `htm`, `http`, `js`, `json`, `jsx`, `less`, `md`, `php`, `phtml`, `php3`, `php4`, `php5`, `php7`, `phps`, `scss`, `sass`, `sh`, `bash`, `sql`, `svg`, `xml`, `yml`, `yaml`, `txt`.
Props westonruter, georgestephanis, obenland, melchoyce, pixolin, mizejewski, michelleweber, afercia, grahamarmfield, samikeijonen, rianrietveld, iseulde.
See #38707.
Fixes #12423, #39892.
Built from https://develop.svn.wordpress.org/trunk@41376
git-svn-id: http://core.svn.wordpress.org/trunk@41209 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2017-09-13 08:08:47 +02:00
$keys = array ( 'first_name' , 'last_name' , 'nickname' , 'description' , 'rich_editing' , 'syntax_highlighting' , 'comment_shortcuts' , 'admin_color' , 'use_ssl' , 'show_admin_bar_front' , 'locale' );
2015-11-20 08:24:30 +01:00
return array_merge ( $keys , array_keys ( wp_get_user_contact_methods ( $user ) ) );
}
/**
* Set up the user contact methods .
*
* Default contact methods were removed in 3.6 . A filter dictates contact methods .
*
* @ since 3.7 . 0
*
* @ param WP_User $user Optional . WP_User object .
2019-11-05 22:23:02 +01:00
* @ return string [] Array of contact method labels keyed by contact method .
2015-11-20 08:24:30 +01:00
*/
function wp_get_user_contact_methods ( $user = null ) {
$methods = array ();
if ( get_site_option ( 'initial_db_version' ) < 23588 ) {
$methods = array (
'aim' => __ ( 'AIM' ),
'yim' => __ ( 'Yahoo IM' ),
2017-12-01 00:11:00 +01:00
'jabber' => __ ( 'Jabber / Google Talk' ),
2015-11-20 08:24:30 +01:00
);
}
/**
2016-05-22 20:30:27 +02:00
* Filters the user contact methods .
2015-11-20 08:24:30 +01:00
*
* @ since 2.9 . 0
*
2019-11-05 22:23:02 +01:00
* @ param string [] $methods Array of contact method labels keyed by contact method .
* @ param WP_User $user WP_User object .
2015-11-20 08:24:30 +01:00
*/
return apply_filters ( 'user_contactmethods' , $methods , $user );
}
/**
* The old private function for setting up user contact methods .
*
2015-12-17 17:41:27 +01:00
* Use wp_get_user_contact_methods () instead .
*
2015-11-20 08:24:30 +01:00
* @ since 2.9 . 0
* @ access private
2015-12-17 17:41:27 +01:00
*
* @ param WP_User $user Optional . WP_User object . Default null .
2019-11-05 22:23:02 +01:00
* @ return string [] Array of contact method labels keyed by contact method .
2015-11-20 08:24:30 +01:00
*/
function _wp_get_user_contactmethods ( $user = null ) {
return wp_get_user_contact_methods ( $user );
}
/**
* Gets the text suggesting how to create strong passwords .
*
* @ since 4.1 . 0
*
* @ return string The password hint text .
*/
function wp_get_password_hint () {
$hint = __ ( 'Hint: The password should be at least twelve characters long. To make it stronger, use upper and lower case letters, numbers, and symbols like ! " ? $ % ^ & ).' );
/**
2016-05-22 20:30:27 +02:00
* Filters the text describing the site ' s password complexity policy .
2015-11-20 08:24:30 +01:00
*
* @ since 4.1 . 0
*
* @ param string $hint The password hint text .
*/
return apply_filters ( 'password_hint' , $hint );
}
/**
* Creates , stores , then returns a password reset key for user .
*
* @ since 4.4 . 0
*
* @ global PasswordHash $wp_hasher Portable PHP password hashing framework .
*
* @ param WP_User $user User to retrieve password reset key for .
* @ return string | WP_Error Password reset key on success . WP_Error on error .
*/
function get_password_reset_key ( $user ) {
2019-08-01 19:25:55 +02:00
global $wp_hasher ;
2015-11-20 08:24:30 +01:00
2019-01-15 07:27:49 +01:00
if ( ! ( $user instanceof WP_User ) ) {
2020-06-21 16:00:09 +02:00
return new WP_Error ( 'invalidcombo' , __ ( '<strong>Error</strong>: There is no account with that username or email address.' ) );
2019-01-15 07:27:49 +01:00
}
2015-11-20 08:24:30 +01:00
/**
* Fires before a new password is retrieved .
*
2016-05-23 21:02:28 +02:00
* Use the { @ see 'retrieve_password' } hook instead .
*
2015-11-20 08:24:30 +01:00
* @ since 1.5 . 0
2019-11-09 14:05:02 +01:00
* @ deprecated 1.5 . 1 Misspelled . Use { @ see 'retrieve_password' } hook instead .
2015-11-20 08:24:30 +01:00
*
* @ param string $user_login The user login name .
*/
2019-11-09 13:59:03 +01:00
do_action_deprecated ( 'retreive_password' , array ( $user -> user_login ), '1.5.1' , 'retrieve_password' );
2015-11-20 08:24:30 +01:00
/**
* Fires before a new password is retrieved .
*
* @ since 1.5 . 1
*
* @ param string $user_login The user login name .
*/
do_action ( 'retrieve_password' , $user -> user_login );
2016-04-27 07:55:27 +02:00
$allow = true ;
if ( is_multisite () && is_user_spammy ( $user ) ) {
$allow = false ;
}
2015-11-20 08:24:30 +01:00
/**
2016-05-22 20:30:27 +02:00
* Filters whether to allow a password to be reset .
2015-11-20 08:24:30 +01:00
*
* @ since 2.7 . 0
*
2020-07-23 21:06:03 +02:00
* @ param bool $allow Whether to allow the password to be reset . Default true .
* @ param int $ID The ID of the user attempting to reset a password .
2015-11-20 08:24:30 +01:00
*/
2016-04-27 07:55:27 +02:00
$allow = apply_filters ( 'allow_password_reset' , $allow , $user -> ID );
2015-11-20 08:24:30 +01:00
if ( ! $allow ) {
return new WP_Error ( 'no_password_reset' , __ ( 'Password reset is not allowed for this user' ) );
} elseif ( is_wp_error ( $allow ) ) {
return $allow ;
}
// Generate something random for a password reset key.
$key = wp_generate_password ( 20 , false );
/**
* Fires when a password reset key is generated .
*
* @ since 2.5 . 0
*
* @ param string $user_login The username for the user .
* @ param string $key The generated password reset key .
*/
do_action ( 'retrieve_password_key' , $user -> user_login , $key );
// Now insert the key, hashed, into the DB.
if ( empty ( $wp_hasher ) ) {
2017-04-06 20:01:42 +02:00
require_once ABSPATH . WPINC . '/class-phpass.php' ;
2015-11-20 08:24:30 +01:00
$wp_hasher = new PasswordHash ( 8 , true );
}
2019-08-01 19:25:55 +02:00
$hashed = time () . ':' . $wp_hasher -> HashPassword ( $key );
$key_saved = wp_update_user (
array (
'ID' => $user -> ID ,
'user_activation_key' => $hashed ,
)
);
if ( is_wp_error ( $key_saved ) ) {
return $key_saved ;
2015-11-20 08:24:30 +01:00
}
return $key ;
}
/**
* Retrieves a user row based on password reset key and login
*
* A key is considered 'expired' if it exactly matches the value of the
* user_activation_key field , rather than being matched after going through the
* hashing process . This field is now hashed ; old values are no longer accepted
* but have a different WP_Error code so good user feedback can be provided .
*
* @ since 3.1 . 0
*
* @ global wpdb $wpdb WordPress database object for queries .
* @ global PasswordHash $wp_hasher Portable PHP password hashing framework instance .
*
* @ param string $key Hash to validate sending user ' s password .
* @ param string $login The user login .
* @ return WP_User | WP_Error WP_User object on success , WP_Error object for invalid or expired keys .
*/
2017-12-01 00:11:00 +01:00
function check_password_reset_key ( $key , $login ) {
2015-11-20 08:24:30 +01:00
global $wpdb , $wp_hasher ;
2017-12-01 00:11:00 +01:00
$key = preg_replace ( '/[^a-z0-9]/i' , '' , $key );
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
if ( empty ( $key ) || ! is_string ( $key ) ) {
2019-03-19 03:37:52 +01:00
return new WP_Error ( 'invalid_key' , __ ( 'Invalid key.' ) );
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
2017-12-01 00:11:00 +01:00
if ( empty ( $login ) || ! is_string ( $login ) ) {
2019-03-19 03:37:52 +01:00
return new WP_Error ( 'invalid_key' , __ ( 'Invalid key.' ) );
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
2019-08-01 21:19:55 +02:00
$user = get_user_by ( 'login' , $login );
if ( ! $user ) {
2019-03-19 03:37:52 +01:00
return new WP_Error ( 'invalid_key' , __ ( 'Invalid key.' ) );
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
if ( empty ( $wp_hasher ) ) {
2017-04-06 20:01:42 +02:00
require_once ABSPATH . WPINC . '/class-phpass.php' ;
2015-11-20 08:24:30 +01:00
$wp_hasher = new PasswordHash ( 8 , true );
}
/**
2016-05-22 20:30:27 +02:00
* Filters the expiration time of password reset keys .
2015-11-20 08:24:30 +01:00
*
* @ since 4.3 . 0
*
* @ param int $expiration The expiration time in seconds .
*/
$expiration_duration = apply_filters ( 'password_reset_expiration' , DAY_IN_SECONDS );
2019-08-01 21:19:55 +02:00
if ( false !== strpos ( $user -> user_activation_key , ':' ) ) {
list ( $pass_request_time , $pass_key ) = explode ( ':' , $user -> user_activation_key , 2 );
2017-12-01 00:11:00 +01:00
$expiration_time = $pass_request_time + $expiration_duration ;
2015-11-20 08:24:30 +01:00
} else {
2019-08-01 21:19:55 +02:00
$pass_key = $user -> user_activation_key ;
2015-11-20 08:24:30 +01:00
$expiration_time = false ;
}
2015-12-24 03:49:26 +01:00
if ( ! $pass_key ) {
2019-03-19 03:37:52 +01:00
return new WP_Error ( 'invalid_key' , __ ( 'Invalid key.' ) );
2015-12-24 03:49:26 +01:00
}
2015-11-20 08:24:30 +01:00
$hash_is_correct = $wp_hasher -> CheckPassword ( $key , $pass_key );
if ( $hash_is_correct && $expiration_time && time () < $expiration_time ) {
2019-08-01 21:19:55 +02:00
return $user ;
2015-11-20 08:24:30 +01:00
} elseif ( $hash_is_correct && $expiration_time ) {
2020-01-29 01:45:18 +01:00
// Key has an expiration time that's passed.
2019-03-19 03:37:52 +01:00
return new WP_Error ( 'expired_key' , __ ( 'Invalid key.' ) );
2015-11-20 08:24:30 +01:00
}
2019-08-01 21:19:55 +02:00
if ( hash_equals ( $user -> user_activation_key , $key ) || ( $hash_is_correct && ! $expiration_time ) ) {
2019-03-19 03:37:52 +01:00
$return = new WP_Error ( 'expired_key' , __ ( 'Invalid key.' ) );
2019-08-01 21:19:55 +02:00
$user_id = $user -> ID ;
2015-11-20 08:24:30 +01:00
/**
2016-05-22 20:30:27 +02:00
* Filters the return value of check_password_reset_key () when an
2015-11-20 08:24:30 +01:00
* old - style key is used .
*
* @ since 3.7 . 0 Previously plain - text keys were stored in the database .
* @ since 4.3 . 0 Previously key hashes were stored without an expiration time .
*
* @ param WP_Error $return A WP_Error object denoting an expired key .
* Return a WP_User object to validate the key .
* @ param int $user_id The matched user ID .
*/
return apply_filters ( 'password_reset_key_expired' , $return , $user_id );
}
2019-03-19 03:37:52 +01:00
return new WP_Error ( 'invalid_key' , __ ( 'Invalid key.' ) );
2015-11-20 08:24:30 +01:00
}
2021-02-02 13:37:03 +01:00
/**
* Handles sending a password retrieval email to a user .
*
* @ since 2.5 . 0
* @ since 5.7 . 0 Added `$user_login` parameter .
*
* @ global wpdb $wpdb WordPress database abstraction object .
* @ global PasswordHash $wp_hasher Portable PHP password hashing framework .
*
2021-02-02 13:43:04 +01:00
* @ param string $user_login Optional . Username to send a password retrieval email for .
* Defaults to `$_POST['user_login']` if not set .
2021-02-02 13:37:03 +01:00
* @ return true | WP_Error True when finished , WP_Error object on error .
*/
function retrieve_password ( $user_login = null ) {
$errors = new WP_Error ();
$user_data = false ;
// Use the passed $user_login if available, otherwise use $_POST['user_login'].
if ( ! $user_login && ! empty ( $_POST [ 'user_login' ] ) ) {
$user_login = $_POST [ 'user_login' ];
}
if ( empty ( $user_login ) ) {
$errors -> add ( 'empty_username' , __ ( '<strong>Error</strong>: Please enter a username or email address.' ) );
} elseif ( strpos ( $user_login , '@' ) ) {
$user_data = get_user_by ( 'email' , trim ( wp_unslash ( $user_login ) ) );
if ( empty ( $user_data ) ) {
$errors -> add ( 'invalid_email' , __ ( '<strong>Error</strong>: There is no account with that username or email address.' ) );
}
} else {
$user_data = get_user_by ( 'login' , trim ( wp_unslash ( $user_login ) ) );
}
/**
* Filters the user data during a password reset request .
*
* Allows , for example , custom validation using data other than username or email address .
*
* @ since 5.7 . 0
*
* @ param WP_User | false $user_data WP_User object if found , false if the user does not exist .
* @ param WP_Error $errors A WP_Error object containing any errors generated
* by using invalid credentials .
*/
$user_data = apply_filters ( 'lostpassword_user_data' , $user_data , $errors );
/**
* Fires before errors are returned from a password reset request .
*
* @ since 2.1 . 0
* @ since 4.4 . 0 Added the `$errors` parameter .
* @ since 5.4 . 0 Added the `$user_data` parameter .
*
* @ param WP_Error $errors A WP_Error object containing any errors generated
* by using invalid credentials .
* @ param WP_User | false $user_data WP_User object if found , false if the user does not exist .
*/
do_action ( 'lostpassword_post' , $errors , $user_data );
/**
* Filters the errors encountered on a password reset request .
*
* The filtered WP_Error object may , for example , contain errors for an invalid
* username or email address . A WP_Error object should always be returned ,
* but may or may not contain errors .
*
* If any errors are present in $errors , this will abort the password reset request .
*
* @ since 5.5 . 0
*
* @ param WP_Error $errors A WP_Error object containing any errors generated
* by using invalid credentials .
* @ param WP_User | false $user_data WP_User object if found , false if the user does not exist .
*/
$errors = apply_filters ( 'lostpassword_errors' , $errors , $user_data );
if ( $errors -> has_errors () ) {
return $errors ;
}
if ( ! $user_data ) {
$errors -> add ( 'invalidcombo' , __ ( '<strong>Error</strong>: There is no account with that username or email address.' ) );
return $errors ;
}
// Redefining user_login ensures we return the right case in the email.
$user_login = $user_data -> user_login ;
$user_email = $user_data -> user_email ;
$key = get_password_reset_key ( $user_data );
if ( is_wp_error ( $key ) ) {
return $key ;
}
2021-02-26 01:52:02 +01:00
// Localize password reset message content for user.
$locale = get_user_locale ( $user_data );
$switched_locale = switch_to_locale ( $locale );
2021-02-02 13:37:03 +01:00
if ( is_multisite () ) {
$site_name = get_network () -> site_name ;
} else {
/*
* The blogname option is escaped with esc_html on the way into the database
* in sanitize_option . We want to reverse this for the plain text arena of emails .
*/
$site_name = wp_specialchars_decode ( get_option ( 'blogname' ), ENT_QUOTES );
}
$message = __ ( 'Someone has requested a password reset for the following account:' ) . " \r \n \r \n " ;
/* translators: %s: Site name. */
$message .= sprintf ( __ ( 'Site Name: %s' ), $site_name ) . " \r \n \r \n " ;
/* translators: %s: User login. */
$message .= sprintf ( __ ( 'Username: %s' ), $user_login ) . " \r \n \r \n " ;
$message .= __ ( 'If this was a mistake, ignore this email and nothing will happen.' ) . " \r \n \r \n " ;
$message .= __ ( 'To reset your password, visit the following address:' ) . " \r \n \r \n " ;
$message .= network_site_url ( " wp-login.php?action=rp&key= $key &login= " . rawurlencode ( $user_login ), 'login' ) . " \r \n \r \n " ;
2021-02-23 21:08:03 +01:00
if ( ! is_user_logged_in () ) {
$requester_ip = $_SERVER [ 'REMOTE_ADDR' ];
if ( $requester_ip ) {
$message .= sprintf (
/* translators: %s: IP address of password reset requester. */
__ ( 'This password reset request originated from the IP address %s.' ),
$requester_ip
) . " \r \n " ;
}
2021-02-02 13:37:03 +01:00
}
/* translators: Password reset notification email subject. %s: Site title. */
$title = sprintf ( __ ( '[%s] Password Reset' ), $site_name );
/**
* Filters the subject of the password reset email .
*
* @ since 2.8 . 0
* @ since 4.4 . 0 Added the `$user_login` and `$user_data` parameters .
*
* @ param string $title Email subject .
* @ param string $user_login The username for the user .
* @ param WP_User $user_data WP_User object .
*/
$title = apply_filters ( 'retrieve_password_title' , $title , $user_login , $user_data );
/**
* Filters the message body of the password reset mail .
*
* If the filtered message is empty , the password reset email will not be sent .
*
* @ since 2.8 . 0
* @ since 4.1 . 0 Added `$user_login` and `$user_data` parameters .
*
* @ param string $message Email message .
* @ param string $key The activation key .
* @ param string $user_login The username for the user .
* @ param WP_User $user_data WP_User object .
*/
$message = apply_filters ( 'retrieve_password_message' , $message , $key , $user_login , $user_data );
2021-02-23 17:38:06 +01:00
if ( $switched_locale ) {
restore_previous_locale ();
}
2021-02-02 13:37:03 +01:00
if ( $message && ! wp_mail ( $user_email , wp_specialchars_decode ( $title ), $message ) ) {
$errors -> add (
'retrieve_password_email_failure' ,
sprintf (
/* translators: %s: Documentation URL. */
__ ( '<strong>Error</strong>: The email could not be sent. Your site may not be correctly configured to send emails. <a href="%s">Get support for resetting your password</a>.' ),
esc_url ( __ ( 'https://wordpress.org/support/article/resetting-your-password/' ) )
)
);
return $errors ;
}
return true ;
}
2015-11-20 08:24:30 +01:00
/**
* Handles resetting the user ' s password .
*
* @ since 2.5 . 0
*
2017-08-19 22:19:44 +02:00
* @ param WP_User $user The user
2020-07-23 23:11:05 +02:00
* @ param string $new_pass New password for the user in plaintext
2015-11-20 08:24:30 +01:00
*/
function reset_password ( $user , $new_pass ) {
/**
* Fires before the user ' s password is reset .
*
* @ since 1.5 . 0
*
2019-12-06 23:43:04 +01:00
* @ param WP_User $user The user .
* @ param string $new_pass New user password .
2015-11-20 08:24:30 +01:00
*/
do_action ( 'password_reset' , $user , $new_pass );
wp_set_password ( $new_pass , $user -> ID );
update_user_option ( $user -> ID , 'default_password_nag' , false , true );
/**
* Fires after the user ' s password is reset .
*
* @ since 4.4 . 0
*
2017-08-19 22:19:44 +02:00
* @ param WP_User $user The user .
* @ param string $new_pass New user password .
2015-11-20 08:24:30 +01:00
*/
do_action ( 'after_password_reset' , $user , $new_pass );
}
/**
* Handles registering a new user .
*
* @ since 2.5 . 0
*
* @ param string $user_login User ' s username for logging in
* @ param string $user_email User ' s email address to send password and add
* @ return int | WP_Error Either user ' s ID or error on failure .
*/
function register_new_user ( $user_login , $user_email ) {
$errors = new WP_Error ();
$sanitized_user_login = sanitize_user ( $user_login );
/**
2016-05-22 20:30:27 +02:00
* Filters the email address of a user being registered .
2015-11-20 08:24:30 +01:00
*
* @ since 2.1 . 0
*
* @ param string $user_email The email address of the new user .
*/
$user_email = apply_filters ( 'user_registration_email' , $user_email );
2020-01-29 01:45:18 +01:00
// Check the username.
2020-05-16 20:42:12 +02:00
if ( '' === $sanitized_user_login ) {
2020-06-21 16:00:09 +02:00
$errors -> add ( 'empty_username' , __ ( '<strong>Error</strong>: Please enter a username.' ) );
2015-11-20 08:24:30 +01:00
} elseif ( ! validate_username ( $user_login ) ) {
2020-06-21 16:00:09 +02:00
$errors -> add ( 'invalid_username' , __ ( '<strong>Error</strong>: This username is invalid because it uses illegal characters. Please enter a valid username.' ) );
2015-11-20 08:24:30 +01:00
$sanitized_user_login = '' ;
} elseif ( username_exists ( $sanitized_user_login ) ) {
2020-06-21 16:00:09 +02:00
$errors -> add ( 'username_exists' , __ ( '<strong>Error</strong>: This username is already registered. Please choose another one.' ) );
2015-12-05 00:25:26 +01:00
} else {
/** This filter is documented in wp-includes/user.php */
2019-09-10 21:23:55 +02:00
$illegal_user_logins = ( array ) apply_filters ( 'illegal_user_logins' , array () );
2019-11-29 23:04:02 +01:00
if ( in_array ( strtolower ( $sanitized_user_login ), array_map ( 'strtolower' , $illegal_user_logins ), true ) ) {
2020-06-21 16:00:09 +02:00
$errors -> add ( 'invalid_username' , __ ( '<strong>Error</strong>: Sorry, that username is not allowed.' ) );
2015-12-05 00:25:26 +01:00
}
2015-11-20 08:24:30 +01:00
}
2020-01-29 01:45:18 +01:00
// Check the email address.
2020-05-16 20:42:12 +02:00
if ( '' === $user_email ) {
2020-06-21 16:00:09 +02:00
$errors -> add ( 'empty_email' , __ ( '<strong>Error</strong>: Please type your email address.' ) );
2015-11-20 08:24:30 +01:00
} elseif ( ! is_email ( $user_email ) ) {
2020-06-21 16:00:09 +02:00
$errors -> add ( 'invalid_email' , __ ( '<strong>Error</strong>: The email address isn’t correct.' ) );
2015-11-20 08:24:30 +01:00
$user_email = '' ;
} elseif ( email_exists ( $user_email ) ) {
2020-06-21 16:00:09 +02:00
$errors -> add ( 'email_exists' , __ ( '<strong>Error</strong>: This email is already registered. Please choose another one.' ) );
2015-11-20 08:24:30 +01:00
}
/**
* Fires when submitting registration form data , before the user is created .
*
* @ since 2.1 . 0
*
* @ param string $sanitized_user_login The submitted username after being sanitized .
* @ param string $user_email The submitted email .
* @ param WP_Error $errors Contains any errors with submitted username and email ,
* e . g . , an empty field , an invalid username or email ,
* or an existing username or email .
*/
do_action ( 'register_post' , $sanitized_user_login , $user_email , $errors );
/**
2016-05-22 20:30:27 +02:00
* Filters the errors encountered when a new user is being registered .
2015-11-20 08:24:30 +01:00
*
* The filtered WP_Error object may , for example , contain errors for an invalid
2020-06-18 22:24:09 +02:00
* or existing username or email address . A WP_Error object should always be returned ,
2015-11-20 08:24:30 +01:00
* but may or may not contain errors .
*
* If any errors are present in $errors , this will abort the user ' s registration .
*
* @ since 2.1 . 0
*
* @ param WP_Error $errors A WP_Error object containing any errors encountered
* during registration .
* @ param string $sanitized_user_login User ' s username after it has been sanitized .
* @ param string $user_email User ' s email .
*/
$errors = apply_filters ( 'registration_errors' , $errors , $sanitized_user_login , $user_email );
2018-02-27 03:31:31 +01:00
if ( $errors -> has_errors () ) {
2015-11-20 08:24:30 +01:00
return $errors ;
2017-12-01 00:11:00 +01:00
}
2015-11-20 08:24:30 +01:00
$user_pass = wp_generate_password ( 12 , false );
2017-12-01 00:11:00 +01:00
$user_id = wp_create_user ( $sanitized_user_login , $user_pass , $user_email );
2015-11-20 08:24:30 +01:00
if ( ! $user_id || is_wp_error ( $user_id ) ) {
I18N: Improve translator comments.
* Add missing translator comments.
* Fix placement of some translator comments. Translator comments should be on the line directly above the line containing the translation function call for optimal compatibility with various `.pot` file generation tools. The CS auto-fixing, which changed some inconsistent function calls to multi-line function calls, is part of the reason why this was no longer the case for a select group of translator comments.
Includes minor code layout fixes.
Polyglots, rejoice! All WordPress core files now have translator comments for all strings with placeholders!
Props jrf, subrataemfluence, GaryJ, webdados, Dency, swissspidy, alvarogois, marcomartins, mihaiiceyro, vladwtz, niq1982, flipkeijzer, michielatyoast, chandrapatel, thrijith, joshuanoyce, FesoVik, tessak22, bhaktirajdev, cleancoded, dhavalkasvala, garrett-eclipse, bibliofille, socalchristina, priyankkpatel, 5hel2l2y, adamsilverstein, JeffPaul, pierlo, SergeyBiryukov.
Fixes #44360.
Built from https://develop.svn.wordpress.org/trunk@45926
git-svn-id: http://core.svn.wordpress.org/trunk@45737 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2019-09-01 19:13:59 +02:00
$errors -> add (
'registerfail' ,
sprintf (
2019-09-03 02:41:05 +02:00
/* translators: %s: Admin email address. */
2020-06-21 16:00:09 +02:00
__ ( '<strong>Error</strong>: Couldn’t register you… please contact the <a href="mailto:%s">site admin</a>!' ),
I18N: Improve translator comments.
* Add missing translator comments.
* Fix placement of some translator comments. Translator comments should be on the line directly above the line containing the translation function call for optimal compatibility with various `.pot` file generation tools. The CS auto-fixing, which changed some inconsistent function calls to multi-line function calls, is part of the reason why this was no longer the case for a select group of translator comments.
Includes minor code layout fixes.
Polyglots, rejoice! All WordPress core files now have translator comments for all strings with placeholders!
Props jrf, subrataemfluence, GaryJ, webdados, Dency, swissspidy, alvarogois, marcomartins, mihaiiceyro, vladwtz, niq1982, flipkeijzer, michielatyoast, chandrapatel, thrijith, joshuanoyce, FesoVik, tessak22, bhaktirajdev, cleancoded, dhavalkasvala, garrett-eclipse, bibliofille, socalchristina, priyankkpatel, 5hel2l2y, adamsilverstein, JeffPaul, pierlo, SergeyBiryukov.
Fixes #44360.
Built from https://develop.svn.wordpress.org/trunk@45926
git-svn-id: http://core.svn.wordpress.org/trunk@45737 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2019-09-01 19:13:59 +02:00
get_option ( 'admin_email' )
)
);
2015-11-20 08:24:30 +01:00
return $errors ;
}
2020-01-29 01:45:18 +01:00
update_user_option ( $user_id , 'default_password_nag' , true , true ); // Set up the password change nag.
2015-11-20 08:24:30 +01:00
/**
* Fires after a new user registration has been recorded .
*
* @ since 4.4 . 0
*
* @ param int $user_id ID of the newly registered user .
*/
do_action ( 'register_new_user' , $user_id );
return $user_id ;
}
/**
2016-07-20 21:33:30 +02:00
* Initiates email notifications related to the creation of new users .
2015-11-20 08:24:30 +01:00
*
* Notifications are sent both to the site admin and to the newly created user .
*
* @ since 4.4 . 0
2016-07-20 21:33:30 +02:00
* @ since 4.6 . 0 Converted the `$notify` parameter to accept 'user' for sending
* notifications only to the user created .
2015-11-20 08:24:30 +01:00
*
2015-11-25 23:38:29 +01:00
* @ param int $user_id ID of the newly created user .
2016-07-20 21:33:30 +02:00
* @ param string $notify Optional . Type of notification that should happen . Accepts 'admin'
* or an empty string ( admin only ), 'user' , or 'both' ( admin and user ) .
* Default 'both' .
2015-11-20 08:24:30 +01:00
*/
2015-11-25 23:38:29 +01:00
function wp_send_new_user_notifications ( $user_id , $notify = 'both' ) {
wp_new_user_notification ( $user_id , null , $notify );
2015-11-20 08:24:30 +01:00
}
/**
* Retrieve the current session token from the logged_in cookie .
*
* @ since 4.0 . 0
*
* @ return string Token .
*/
function wp_get_session_token () {
$cookie = wp_parse_auth_cookie ( '' , 'logged_in' );
return ! empty ( $cookie [ 'token' ] ) ? $cookie [ 'token' ] : '' ;
}
/**
* Retrieve a list of sessions for the current user .
*
* @ since 4.0 . 0
2020-06-16 23:07:14 +02:00
*
2015-11-20 08:24:30 +01:00
* @ return array Array of sessions .
*/
function wp_get_all_sessions () {
$manager = WP_Session_Tokens :: get_instance ( get_current_user_id () );
return $manager -> get_all ();
}
/**
* Remove the current session token from the database .
*
* @ since 4.0 . 0
*/
function wp_destroy_current_session () {
$token = wp_get_session_token ();
if ( $token ) {
$manager = WP_Session_Tokens :: get_instance ( get_current_user_id () );
$manager -> destroy ( $token );
}
}
/**
* Remove all but the current session token for the current user for the database .
*
* @ since 4.0 . 0
*/
function wp_destroy_other_sessions () {
$token = wp_get_session_token ();
if ( $token ) {
$manager = WP_Session_Tokens :: get_instance ( get_current_user_id () );
$manager -> destroy_others ( $token );
}
}
/**
* Remove all session tokens for the current user from the database .
*
* @ since 4.0 . 0
*/
function wp_destroy_all_sessions () {
$manager = WP_Session_Tokens :: get_instance ( get_current_user_id () );
$manager -> destroy_all ();
}
/**
* Get the user IDs of all users with no role on this site .
*
* @ since 4.4 . 0
2017-07-25 02:24:43 +02:00
* @ since 4.9 . 0 The `$site_id` parameter was added to support multisite .
2015-11-20 08:24:30 +01:00
*
2017-07-25 02:24:43 +02:00
* @ param int | null $site_id Optional . The site ID to get users with no role for . Defaults to the current site .
2019-11-05 22:23:02 +01:00
* @ return string [] Array of user IDs as strings .
2015-11-20 08:24:30 +01:00
*/
2017-07-25 02:24:43 +02:00
function wp_get_users_with_no_role ( $site_id = null ) {
2015-11-20 08:24:30 +01:00
global $wpdb ;
2017-07-25 02:24:43 +02:00
if ( ! $site_id ) {
$site_id = get_current_blog_id ();
2015-11-20 08:24:30 +01:00
}
2008-09-12 06:29:09 +02:00
2017-07-25 02:24:43 +02:00
$prefix = $wpdb -> get_blog_prefix ( $site_id );
2017-09-30 06:10:45 +02:00
2020-02-09 17:55:09 +01:00
if ( is_multisite () && get_current_blog_id () != $site_id ) {
2017-09-30 06:10:45 +02:00
switch_to_blog ( $site_id );
$role_names = wp_roles () -> get_names ();
restore_current_blog ();
} else {
$role_names = wp_roles () -> get_names ();
}
2017-12-01 00:11:00 +01:00
$regex = implode ( '|' , array_keys ( $role_names ) );
$regex = preg_replace ( '/[^a-zA-Z_\|-]/' , '' , $regex );
$users = $wpdb -> get_col (
$wpdb -> prepare (
"
2015-11-20 08:24:30 +01:00
SELECT user_id
FROM $wpdb -> usermeta
WHERE meta_key = '{$prefix}capabilities'
AND meta_value NOT REGEXP % s
2018-08-17 03:51:36 +02:00
" ,
$regex
2017-12-01 00:11:00 +01:00
)
);
2015-09-04 03:33:24 +02:00
2015-11-20 08:24:30 +01:00
return $users ;
}
2016-02-23 23:26:28 +01:00
/**
2016-02-25 06:07:26 +01:00
* Retrieves the current user object .
2016-02-23 23:26:28 +01:00
*
* Will set the current user , if the current user is not set . The current user
* will be set to the logged - in person . If no user is logged - in , then it will
* set the current user to 0 , which is invalid and won ' t have any permissions .
*
2016-02-25 06:07:26 +01:00
* This function is used by the pluggable functions wp_get_current_user () and
2016-03-16 17:21:26 +01:00
* get_currentuserinfo (), the latter of which is deprecated but used for backward
* compatibility .
2016-02-23 23:26:28 +01:00
*
* @ since 4.5 . 0
* @ access private
*
2016-02-25 06:07:26 +01:00
* @ see wp_get_current_user ()
2016-02-23 23:26:28 +01:00
* @ global WP_User $current_user Checks if the current user is set .
*
* @ return WP_User Current WP_User instance .
*/
function _wp_get_current_user () {
global $current_user ;
if ( ! empty ( $current_user ) ) {
if ( $current_user instanceof WP_User ) {
return $current_user ;
}
2020-01-29 01:45:18 +01:00
// Upgrade stdClass to WP_User.
2016-02-23 23:26:28 +01:00
if ( is_object ( $current_user ) && isset ( $current_user -> ID ) ) {
2017-12-01 00:11:00 +01:00
$cur_id = $current_user -> ID ;
2016-02-23 23:26:28 +01:00
$current_user = null ;
wp_set_current_user ( $cur_id );
return $current_user ;
}
// $current_user has a junk value. Force to WP_User with ID 0.
$current_user = null ;
wp_set_current_user ( 0 );
return $current_user ;
}
2017-12-01 00:11:00 +01:00
if ( defined ( 'XMLRPC_REQUEST' ) && XMLRPC_REQUEST ) {
2016-02-23 23:26:28 +01:00
wp_set_current_user ( 0 );
return $current_user ;
}
/**
2016-05-22 20:30:27 +02:00
* Filters the current user .
2016-02-23 23:26:28 +01:00
*
* The default filters use this to determine the current user from the
* request ' s cookies , if available .
*
* Returning a value of false will effectively short - circuit setting
* the current user .
*
* @ since 3.9 . 0
*
2021-01-03 23:04:04 +01:00
* @ param int | false $user_id User ID if one has been determined , false otherwise .
2016-02-23 23:26:28 +01:00
*/
$user_id = apply_filters ( 'determine_current_user' , false );
if ( ! $user_id ) {
wp_set_current_user ( 0 );
return $current_user ;
}
wp_set_current_user ( $user_id );
return $current_user ;
}
2017-07-27 04:10:42 +02:00
/**
2017-08-02 22:43:44 +02:00
* Send a confirmation request email when a change of user email address is attempted .
2017-07-27 04:10:42 +02:00
*
* @ since 3.0 . 0
* @ since 4.9 . 0 This function was moved from wp - admin / includes / ms . php so it ' s no longer Multisite specific .
*
* @ global WP_Error $errors WP_Error object .
*/
function send_confirmation_on_profile_email () {
2019-01-08 07:07:51 +01:00
global $errors ;
2017-07-27 04:10:42 +02:00
$current_user = wp_get_current_user ();
if ( ! is_object ( $errors ) ) {
$errors = new WP_Error ();
}
if ( $current_user -> ID != $_POST [ 'user_id' ] ) {
return false ;
}
if ( $current_user -> user_email != $_POST [ 'email' ] ) {
if ( ! is_email ( $_POST [ 'email' ] ) ) {
2017-12-01 00:11:00 +01:00
$errors -> add (
2018-08-17 03:51:36 +02:00
'user_email' ,
2020-06-21 16:00:09 +02:00
__ ( '<strong>Error</strong>: The email address isn’t correct.' ),
2018-08-17 03:51:36 +02:00
array (
2017-12-01 00:11:00 +01:00
'form-field' => 'email' ,
)
);
2017-07-27 04:10:42 +02:00
return ;
}
2019-01-08 10:03:50 +01:00
if ( email_exists ( $_POST [ 'email' ] ) ) {
2017-12-01 00:11:00 +01:00
$errors -> add (
2018-08-17 03:51:36 +02:00
'user_email' ,
2020-06-21 16:00:09 +02:00
__ ( '<strong>Error</strong>: The email address is already used.' ),
2018-08-17 03:51:36 +02:00
array (
2017-12-01 00:11:00 +01:00
'form-field' => 'email' ,
)
);
2017-07-27 04:10:42 +02:00
delete_user_meta ( $current_user -> ID , '_new_email' );
return ;
}
2018-06-28 04:38:43 +02:00
$hash = md5 ( $_POST [ 'email' ] . time () . wp_rand () );
2017-07-27 04:10:42 +02:00
$new_user_email = array (
'hash' => $hash ,
'newemail' => $_POST [ 'email' ],
);
update_user_meta ( $current_user -> ID , '_new_email' , $new_user_email );
2018-07-03 19:00:25 +02:00
$sitename = wp_specialchars_decode ( get_option ( 'blogname' ), ENT_QUOTES );
2017-07-27 16:59:43 +02:00
2017-07-27 04:10:42 +02:00
/* translators: Do not translate USERNAME, ADMIN_URL, EMAIL, SITENAME, SITEURL: those are placeholders. */
2017-12-01 00:11:00 +01:00
$email_text = __ (
' Howdy ###USERNAME###,
2017-07-27 04:10:42 +02:00
You recently requested to have the email address on your account changed .
If this is correct , please click on the following link to change it :
###ADMIN_URL###
You can safely ignore and delete this email if you do not want to
take this action .
This email has been sent to ###EMAIL###
Regards ,
All at ###SITENAME###
2017-12-01 00:11:00 +01:00
###SITEURL###'
);
2017-07-27 04:10:42 +02:00
/**
2017-08-02 22:43:44 +02:00
* Filters the text of the email sent when a change of user email address is attempted .
2017-07-27 04:10:42 +02:00
*
* The following strings have a special meaning and will get replaced dynamically :
2020-06-20 14:22:07 +02:00
* - ###USERNAME### The current user's username.
* - ###ADMIN_URL### The link to click on to confirm the email change.
* - ###EMAIL### The new email.
* - ###SITENAME### The name of the site.
* - ###SITEURL### The URL to the site.
2017-07-27 04:10:42 +02:00
*
2017-08-01 22:44:43 +02:00
* @ since MU ( 3.0 . 0 )
2017-07-27 04:10:42 +02:00
* @ since 4.9 . 0 This filter is no longer Multisite specific .
*
* @ param string $email_text Text in the email .
2017-08-02 22:43:44 +02:00
* @ param array $new_user_email {
* Data relating to the new user email address .
*
* @ type string $hash The secure hash used in the confirmation link URL .
* @ type string $newemail The proposed new email address .
* }
2017-07-27 04:10:42 +02:00
*/
$content = apply_filters ( 'new_user_email_content' , $email_text , $new_user_email );
$content = str_replace ( '###USERNAME###' , $current_user -> user_login , $content );
$content = str_replace ( '###ADMIN_URL###' , esc_url ( admin_url ( 'profile.php?newuseremail=' . $hash ) ), $content );
$content = str_replace ( '###EMAIL###' , $_POST [ 'email' ], $content );
2018-07-03 19:00:25 +02:00
$content = str_replace ( '###SITENAME###' , $sitename , $content );
$content = str_replace ( '###SITEURL###' , home_url (), $content );
2017-07-27 04:10:42 +02:00
2019-09-03 02:41:05 +02:00
/* translators: New email address notification email subject. %s: Site title. */
2019-04-08 08:17:51 +02:00
wp_mail ( $_POST [ 'email' ], sprintf ( __ ( '[%s] Email Change Request' ), $sitename ), $content );
2017-07-27 04:10:42 +02:00
$_POST [ 'email' ] = $current_user -> user_email ;
}
}
/**
2017-08-02 22:43:44 +02:00
* Adds an admin notice alerting the user to check for confirmation request email
2017-07-27 04:10:42 +02:00
* after email address change .
*
* @ since 3.0 . 0
* @ since 4.9 . 0 This function was moved from wp - admin / includes / ms . php so it ' s no longer Multisite specific .
*
* @ global string $pagenow
*/
function new_user_email_admin_notice () {
global $pagenow ;
2019-01-15 06:38:49 +01:00
if ( 'profile.php' === $pagenow && isset ( $_GET [ 'updated' ] ) ) {
$email = get_user_meta ( get_current_user_id (), '_new_email' , true );
if ( $email ) {
2019-09-03 02:41:05 +02:00
/* translators: %s: New email address. */
2019-01-15 06:38:49 +01:00
echo '<div class="notice notice-info"><p>' . sprintf ( __ ( 'Your email address has not been updated yet. Please check your inbox at %s for a confirmation email.' ), '<code>' . esc_html ( $email [ 'newemail' ] ) . '</code>' ) . '</p></div>' ;
}
2017-07-27 04:10:42 +02:00
}
}
2018-03-07 00:47:30 +01:00
2018-04-10 20:02:30 +02:00
/**
2021-01-17 18:46:06 +01:00
* Get all personal data request types .
2018-04-10 20:02:30 +02:00
*
2018-04-27 12:12:22 +02:00
* @ since 4.9 . 6
2018-04-10 20:02:30 +02:00
* @ access private
*
2018-05-14 16:53:21 +02:00
* @ return array List of core privacy action types .
2018-04-10 20:02:30 +02:00
*/
function _wp_privacy_action_request_types () {
return array (
2018-04-27 12:12:22 +02:00
'export_personal_data' ,
'remove_personal_data' ,
2018-04-10 20:02:30 +02:00
);
}
2018-05-01 15:59:21 +02:00
/**
* Registers the personal data exporter for users .
*
* @ since 4.9 . 6
*
* @ param array $exporters An array of personal data exporters .
* @ return array An array of personal data exporters .
*/
function wp_register_user_personal_data_exporter ( $exporters ) {
2018-05-03 21:28:21 +02:00
$exporters [ 'wordpress-user' ] = array (
2018-05-01 15:59:21 +02:00
'exporter_friendly_name' => __ ( 'WordPress User' ),
'callback' => 'wp_user_personal_data_exporter' ,
);
return $exporters ;
}
/**
* Finds and exports personal data associated with an email address from the user and user_meta table .
*
* @ since 4.9 . 6
2020-02-10 06:44:04 +01:00
* @ since 5.4 . 0 Added 'Community Events Location' group to the export data .
* @ since 5.4 . 0 Added 'Session Tokens' group to the export data .
2018-05-01 15:59:21 +02:00
*
2020-02-11 21:55:07 +01:00
* @ param string $email_address The user ' s email address .
2018-05-01 15:59:21 +02:00
* @ return array An array of personal data .
*/
function wp_user_personal_data_exporter ( $email_address ) {
$email_address = trim ( $email_address );
$data_to_export = array ();
$user = get_user_by ( 'email' , $email_address );
if ( ! $user ) {
return array (
'data' => array (),
'done' => true ,
);
}
$user_meta = get_user_meta ( $user -> ID );
2020-02-10 06:32:06 +01:00
$user_props_to_export = array (
2018-05-01 15:59:21 +02:00
'ID' => __ ( 'User ID' ),
'user_login' => __ ( 'User Login Name' ),
'user_nicename' => __ ( 'User Nice Name' ),
'user_email' => __ ( 'User Email' ),
'user_url' => __ ( 'User URL' ),
'user_registered' => __ ( 'User Registration Date' ),
'display_name' => __ ( 'User Display Name' ),
'nickname' => __ ( 'User Nickname' ),
'first_name' => __ ( 'User First Name' ),
'last_name' => __ ( 'User Last Name' ),
'description' => __ ( 'User Description' ),
);
$user_data_to_export = array ();
2020-02-10 06:32:06 +01:00
foreach ( $user_props_to_export as $key => $name ) {
2018-05-01 15:59:21 +02:00
$value = '' ;
switch ( $key ) {
case 'ID' :
case 'user_login' :
case 'user_nicename' :
case 'user_email' :
case 'user_url' :
case 'user_registered' :
case 'display_name' :
$value = $user -> data -> $key ;
break ;
case 'nickname' :
case 'first_name' :
case 'last_name' :
case 'description' :
$value = $user_meta [ $key ][ 0 ];
break ;
}
if ( ! empty ( $value ) ) {
$user_data_to_export [] = array (
'name' => $name ,
'value' => $value ,
);
}
}
2020-02-11 19:59:05 +01:00
// Get the list of reserved names.
$reserved_names = array_values ( $user_props_to_export );
/**
2020-02-11 21:55:07 +01:00
* Filter to extend the user ' s profile data for the privacy exporter .
2020-02-11 19:59:05 +01:00
*
* @ since 5.4 . 0
*
* @ param array $additional_user_profile_data {
* An array of name - value pairs of additional user data items . Default empty array .
*
* @ type string $name The user - facing name of an item name - value pair , e . g . 'IP Address' .
* @ type string $value The user - facing value of an item data pair , e . g . '50.60.70.0' .
* }
* @ param WP_User $user The user whose data is being exported .
* @ param string [] $reserved_names An array of reserved names . Any item in `$additional_user_data`
* that uses one of these for its `name` will not be included in the export .
*/
$_extra_data = apply_filters ( 'wp_privacy_additional_user_profile_data' , array (), $user , $reserved_names );
if ( is_array ( $_extra_data ) && ! empty ( $_extra_data ) ) {
// Remove items that use reserved names.
$extra_data = array_filter (
$_extra_data ,
function ( $item ) use ( $reserved_names ) {
2020-02-11 21:55:07 +01:00
return ! in_array ( $item [ 'name' ], $reserved_names , true );
2020-02-11 19:59:05 +01:00
}
);
if ( count ( $extra_data ) !== count ( $_extra_data ) ) {
_doing_it_wrong (
__FUNCTION__ ,
sprintf (
/* translators: %s: wp_privacy_additional_user_profile_data */
__ ( 'Filter %s returned items with reserved names.' ),
'<code>wp_privacy_additional_user_profile_data</code>'
),
'5.4.0'
);
}
if ( ! empty ( $extra_data ) ) {
$user_data_to_export = array_merge ( $user_data_to_export , $extra_data );
}
}
2018-05-01 15:59:21 +02:00
$data_to_export [] = array (
2019-08-18 04:07:57 +02:00
'group_id' => 'user' ,
'group_label' => __ ( 'User' ),
'group_description' => __ ( 'User’s profile data.' ),
'item_id' => " user- { $user -> ID } " ,
'data' => $user_data_to_export ,
2018-05-01 15:59:21 +02:00
);
2020-02-10 06:32:06 +01:00
if ( isset ( $user_meta [ 'community-events-location' ] ) ) {
$location = maybe_unserialize ( $user_meta [ 'community-events-location' ][ 0 ] );
$location_props_to_export = array (
'description' => __ ( 'City' ),
'country' => __ ( 'Country' ),
'latitude' => __ ( 'Latitude' ),
'longitude' => __ ( 'Longitude' ),
'ip' => __ ( 'IP' ),
);
$location_data_to_export = array ();
foreach ( $location_props_to_export as $key => $name ) {
if ( ! empty ( $location [ $key ] ) ) {
$location_data_to_export [] = array (
'name' => $name ,
'value' => $location [ $key ],
);
}
}
$data_to_export [] = array (
'group_id' => 'community-events-location' ,
'group_label' => __ ( 'Community Events Location' ),
'group_description' => __ ( 'User’s location data used for the Community Events in the WordPress Events and News dashboard widget.' ),
'item_id' => " community-events-location- { $user -> ID } " ,
'data' => $location_data_to_export ,
);
}
2020-02-10 06:44:04 +01:00
if ( isset ( $user_meta [ 'session_tokens' ] ) ) {
$session_tokens = maybe_unserialize ( $user_meta [ 'session_tokens' ][ 0 ] );
$session_tokens_props_to_export = array (
'expiration' => __ ( 'Expiration' ),
'ip' => __ ( 'IP' ),
'ua' => __ ( 'User Agent' ),
'login' => __ ( 'Last Login' ),
);
foreach ( $session_tokens as $token_key => $session_token ) {
$session_tokens_data_to_export = array ();
foreach ( $session_tokens_props_to_export as $key => $name ) {
if ( ! empty ( $session_token [ $key ] ) ) {
$value = $session_token [ $key ];
2020-04-05 05:02:11 +02:00
if ( in_array ( $key , array ( 'expiration' , 'login' ), true ) ) {
2020-02-10 06:44:04 +01:00
$value = date_i18n ( 'F d, Y H:i A' , $value );
}
$session_tokens_data_to_export [] = array (
'name' => $name ,
'value' => $value ,
);
}
}
$data_to_export [] = array (
'group_id' => 'session-tokens' ,
'group_label' => __ ( 'Session Tokens' ),
'group_description' => __ ( 'User’s Session Tokens data.' ),
'item_id' => " session-tokens- { $user -> ID } - { $token_key } " ,
'data' => $session_tokens_data_to_export ,
);
}
}
2018-05-01 15:59:21 +02:00
return array (
'data' => $data_to_export ,
'done' => true ,
);
}
2018-04-10 20:02:30 +02:00
/**
* Update log when privacy request is confirmed .
*
2018-04-27 12:12:22 +02:00
* @ since 4.9 . 6
2018-04-10 20:02:30 +02:00
* @ access private
*
2018-04-27 12:12:22 +02:00
* @ param int $request_id ID of the request .
2018-04-10 20:02:30 +02:00
*/
2018-04-27 12:12:22 +02:00
function _wp_privacy_account_request_confirmed ( $request_id ) {
2020-02-10 20:57:05 +01:00
$request = wp_get_user_request ( $request_id );
2018-04-10 20:02:30 +02:00
2019-01-15 23:35:52 +01:00
if ( ! $request ) {
2018-04-27 12:12:22 +02:00
return ;
}
2018-04-10 20:02:30 +02:00
2019-01-15 23:35:52 +01:00
if ( ! in_array ( $request -> status , array ( 'request-pending' , 'request-failed' ), true ) ) {
2018-04-27 12:12:22 +02:00
return ;
2018-04-10 20:02:30 +02:00
}
2018-04-27 12:12:22 +02:00
update_post_meta ( $request_id , '_wp_user_request_confirmed_timestamp' , time () );
2018-08-17 03:51:36 +02:00
wp_update_post (
array (
'ID' => $request_id ,
'post_status' => 'request-confirmed' ,
)
);
2018-04-10 20:02:30 +02:00
}
2018-05-10 07:00:20 +02:00
/**
* Notify the site administrator via email when a request is confirmed .
*
* Without this , the admin would have to manually check the site to see if any
* action was needed on their part yet .
*
* @ since 4.9 . 6
*
* @ param int $request_id The ID of the request .
*/
function _wp_privacy_send_request_confirmation_notification ( $request_id ) {
2020-02-10 20:57:05 +01:00
$request = wp_get_user_request ( $request_id );
2018-05-10 07:00:20 +02:00
2019-01-15 23:35:52 +01:00
if ( ! is_a ( $request , 'WP_User_Request' ) || 'request-confirmed' !== $request -> status ) {
2018-05-10 07:00:20 +02:00
return ;
}
$already_notified = ( bool ) get_post_meta ( $request_id , '_wp_admin_notified' , true );
if ( $already_notified ) {
return ;
}
2020-03-03 01:50:06 +01:00
if ( 'export_personal_data' === $request -> action_name ) {
$manage_url = admin_url ( 'export-personal-data.php' );
} elseif ( 'remove_personal_data' === $request -> action_name ) {
$manage_url = admin_url ( 'erase-personal-data.php' );
}
2019-01-15 23:35:52 +01:00
$action_description = wp_user_request_action_description ( $request -> action_name );
2018-05-10 07:00:20 +02:00
/**
* Filters the recipient of the data request confirmation notification .
*
* In a Multisite environment , this will default to the email address of the
* network admin because , by default , single site admins do not have the
* capabilities required to process requests . Some networks may wish to
* delegate those capabilities to a single - site admin , or a dedicated person
* responsible for managing privacy requests .
*
* @ since 4.9 . 6
*
2019-01-15 23:35:52 +01:00
* @ param string $admin_email The email address of the notification recipient .
* @ param WP_User_Request $request The request that is initiating the notification .
2018-05-10 07:00:20 +02:00
*/
2019-01-15 23:35:52 +01:00
$admin_email = apply_filters ( 'user_request_confirmed_email_to' , get_site_option ( 'admin_email' ), $request );
2018-05-10 07:00:20 +02:00
$email_data = array (
2019-01-15 23:35:52 +01:00
'request' => $request ,
'user_email' => $request -> email ,
2018-06-28 04:42:03 +02:00
'description' => $action_description ,
2018-05-10 07:00:20 +02:00
'manage_url' => $manage_url ,
2018-07-03 19:00:25 +02:00
'sitename' => wp_specialchars_decode ( get_option ( 'blogname' ), ENT_QUOTES ),
2018-05-10 07:00:20 +02:00
'siteurl' => home_url (),
'admin_email' => $admin_email ,
);
/* translators: Do not translate SITENAME, USER_EMAIL, DESCRIPTION, MANAGE_URL, SITEURL; those are placeholders. */
$email_text = __ (
' Howdy ,
A user data privacy request has been confirmed on ###SITENAME###:
User : ###USER_EMAIL###
Request : ###DESCRIPTION###
You can view and manage these data privacy requests here :
###MANAGE_URL###
Regards ,
All at ###SITENAME###
###SITEURL###'
);
/**
* Filters the body of the user request confirmation email .
*
* The email is sent to an administrator when an user request is confirmed .
* The following strings have a special meaning and will get replaced dynamically :
*
* ###SITENAME### The name of the site.
* ###USER_EMAIL### The user email for the request.
* ###DESCRIPTION### Description of the action being performed so the user knows what the email is for.
* ###MANAGE_URL### The URL to manage requests.
* ###SITEURL### The URL to the site.
*
* @ since 4.9 . 6
*
* @ param string $email_text Text in the email .
* @ param array $email_data {
* Data relating to the account action email .
*
* @ type WP_User_Request $request User request object .
* @ type string $user_email The email address confirming a request
* @ type string $description Description of the action being performed so the user knows what the email is for .
* @ type string $manage_url The link to click manage privacy requests of this type .
* @ type string $sitename The site name sending the mail .
* @ type string $siteurl The site URL sending the mail .
2018-06-28 04:41:13 +02:00
* @ type string $admin_email The administrator email receiving the mail .
2018-05-10 07:00:20 +02:00
* }
*/
$content = apply_filters ( 'user_confirmed_action_email_content' , $email_text , $email_data );
2018-07-03 19:00:25 +02:00
$content = str_replace ( '###SITENAME###' , $email_data [ 'sitename' ], $content );
2018-05-10 07:00:20 +02:00
$content = str_replace ( '###USER_EMAIL###' , $email_data [ 'user_email' ], $content );
$content = str_replace ( '###DESCRIPTION###' , $email_data [ 'description' ], $content );
$content = str_replace ( '###MANAGE_URL###' , esc_url_raw ( $email_data [ 'manage_url' ] ), $content );
$content = str_replace ( '###SITEURL###' , esc_url_raw ( $email_data [ 'siteurl' ] ), $content );
2018-06-28 04:41:13 +02:00
$subject = sprintf (
2019-04-16 00:39:50 +02:00
/* translators: Privacy data request confirmed notification email subject. 1: Site title, 2: Name of the confirmed action. */
2018-06-28 04:42:03 +02:00
__ ( '[%1$s] Action Confirmed: %2$s' ),
2018-07-03 19:00:25 +02:00
$email_data [ 'sitename' ],
2018-06-28 04:42:03 +02:00
$action_description
2018-06-28 04:41:13 +02:00
);
/**
* Filters the subject of the user request confirmation email .
*
2018-07-16 14:12:25 +02:00
* @ since 4.9 . 8
2018-06-28 04:41:13 +02:00
*
* @ param string $subject The email subject .
2018-07-03 19:00:25 +02:00
* @ param string $sitename The name of the site .
2018-06-28 04:41:13 +02:00
* @ param array $email_data {
* Data relating to the account action email .
*
* @ type WP_User_Request $request User request object .
* @ type string $user_email The email address confirming a request
* @ type string $description Description of the action being performed so the user knows what the email is for .
* @ type string $manage_url The link to click manage privacy requests of this type .
* @ type string $sitename The site name sending the mail .
* @ type string $siteurl The site URL sending the mail .
* @ type string $admin_email The administrator email receiving the mail .
* }
*/
2018-07-03 19:00:25 +02:00
$subject = apply_filters ( 'user_request_confirmed_email_subject' , $subject , $email_data [ 'sitename' ], $email_data );
2018-06-28 04:41:13 +02:00
2020-02-11 22:43:07 +01:00
$headers = '' ;
/**
* Filters the headers of the user request confirmation email .
*
* @ since 5.4 . 0
*
* @ param string | array $headers The email headers .
* @ param string $subject The email subject .
* @ param string $content The email content .
* @ param int $request_id The request ID .
* @ param array $email_data {
* Data relating to the account action email .
*
* @ type WP_User_Request $request User request object .
* @ type string $user_email The email address confirming a request
* @ type string $description Description of the action being performed so the user knows what the email is for .
* @ type string $manage_url The link to click manage privacy requests of this type .
* @ type string $sitename The site name sending the mail .
* @ type string $siteurl The site URL sending the mail .
* @ type string $admin_email The administrator email receiving the mail .
* }
*/
$headers = apply_filters ( 'user_request_confirmed_email_headers' , $headers , $subject , $content , $request_id , $email_data );
$email_sent = wp_mail ( $email_data [ 'admin_email' ], $subject , $content , $headers );
2018-05-10 07:00:20 +02:00
if ( $email_sent ) {
update_post_meta ( $request_id , '_wp_admin_notified' , true );
}
}
2018-05-10 22:43:22 +02:00
/**
* Notify the user when their erasure request is fulfilled .
*
* Without this , the user would never know if their data was actually erased .
*
* @ since 4.9 . 6
*
* @ param int $request_id The privacy request post ID associated with this request .
*/
function _wp_privacy_send_erasure_fulfillment_notification ( $request_id ) {
2020-02-10 20:57:05 +01:00
$request = wp_get_user_request ( $request_id );
2018-05-10 22:43:22 +02:00
2019-01-15 23:35:52 +01:00
if ( ! is_a ( $request , 'WP_User_Request' ) || 'request-completed' !== $request -> status ) {
2018-05-10 22:43:22 +02:00
return ;
}
$already_notified = ( bool ) get_post_meta ( $request_id , '_wp_user_notified' , true );
if ( $already_notified ) {
return ;
}
2019-03-27 20:41:53 +01:00
// Localize message content for user; fallback to site default for visitors.
if ( ! empty ( $request -> user_id ) ) {
$locale = get_user_locale ( $request -> user_id );
} else {
$locale = get_locale ();
}
$switched_locale = switch_to_locale ( $locale );
2018-05-10 22:43:22 +02:00
/**
* Filters the recipient of the data erasure fulfillment notification .
*
* @ since 4.9 . 6
*
2019-01-15 23:35:52 +01:00
* @ param string $user_email The email address of the notification recipient .
* @ param WP_User_Request $request The request that is initiating the notification .
2018-05-10 22:43:22 +02:00
*/
2019-01-15 23:35:52 +01:00
$user_email = apply_filters ( 'user_erasure_fulfillment_email_to' , $request -> email , $request );
2018-05-10 22:43:22 +02:00
$email_data = array (
2019-01-15 23:35:52 +01:00
'request' => $request ,
2018-05-10 23:20:22 +02:00
'message_recipient' => $user_email ,
2018-05-10 22:43:22 +02:00
'privacy_policy_url' => get_privacy_policy_url (),
2018-07-03 19:00:25 +02:00
'sitename' => wp_specialchars_decode ( get_option ( 'blogname' ), ENT_QUOTES ),
2018-05-10 22:43:22 +02:00
'siteurl' => home_url (),
);
2018-08-17 03:51:36 +02:00
$subject = sprintf (
2019-09-03 02:41:05 +02:00
/* translators: Erasure request fulfilled notification email subject. %s: Site title. */
2018-07-03 19:00:25 +02:00
__ ( '[%s] Erasure Request Fulfilled' ),
$email_data [ 'sitename' ]
);
2018-07-17 15:42:25 +02:00
/**
* Filters the subject of the email sent when an erasure request is completed .
*
* @ since 4.9 . 8
*
* @ param string $subject The email subject .
* @ param string $sitename The name of the site .
* @ param array $email_data {
* Data relating to the account action email .
*
* @ type WP_User_Request $request User request object .
* @ type string $message_recipient The address that the email will be sent to . Defaults
* to the value of `$request->email` , but can be changed
* by the `user_erasure_fulfillment_email_to` filter .
* @ type string $privacy_policy_url Privacy policy URL .
* @ type string $sitename The site name sending the mail .
* @ type string $siteurl The site URL sending the mail .
* }
*/
$subject = apply_filters ( 'user_erasure_complete_email_subject' , $subject , $email_data [ 'sitename' ], $email_data );
2018-05-10 22:43:22 +02:00
if ( empty ( $email_data [ 'privacy_policy_url' ] ) ) {
/* translators: Do not translate SITENAME, SITEURL; those are placeholders. */
$email_text = __ (
' Howdy ,
Your request to erase your personal data on ###SITENAME### has been completed.
If you have any follow - up questions or concerns , please contact the site administrator .
Regards ,
All at ###SITENAME###
###SITEURL###'
);
} else {
/* translators: Do not translate SITENAME, SITEURL, PRIVACY_POLICY_URL; those are placeholders. */
$email_text = __ (
' Howdy ,
Your request to erase your personal data on ###SITENAME### has been completed.
If you have any follow - up questions or concerns , please contact the site administrator .
For more information , you can also read our privacy policy : ###PRIVACY_POLICY_URL###
Regards ,
All at ###SITENAME###
###SITEURL###'
);
}
/**
* Filters the body of the data erasure fulfillment notification .
*
* The email is sent to a user when a their data erasure request is fulfilled
* by an administrator .
*
* The following strings have a special meaning and will get replaced dynamically :
*
* ###SITENAME### The name of the site.
* ###PRIVACY_POLICY_URL### Privacy policy page URL.
* ###SITEURL### The URL to the site.
*
* @ since 4.9 . 6
*
* @ param string $email_text Text in the email .
* @ param array $email_data {
* Data relating to the account action email .
*
* @ type WP_User_Request $request User request object .
2018-05-10 23:20:22 +02:00
* @ type string $message_recipient The address that the email will be sent to . Defaults
* to the value of `$request->email` , but can be changed
* by the `user_erasure_fulfillment_email_to` filter .
2018-05-10 22:43:22 +02:00
* @ type string $privacy_policy_url Privacy policy URL .
* @ type string $sitename The site name sending the mail .
* @ type string $siteurl The site URL sending the mail .
* }
*/
$content = apply_filters ( 'user_confirmed_action_email_content' , $email_text , $email_data );
2018-07-03 19:00:25 +02:00
$content = str_replace ( '###SITENAME###' , $email_data [ 'sitename' ], $content );
2018-05-10 22:43:22 +02:00
$content = str_replace ( '###PRIVACY_POLICY_URL###' , $email_data [ 'privacy_policy_url' ], $content );
$content = str_replace ( '###SITEURL###' , esc_url_raw ( $email_data [ 'siteurl' ] ), $content );
2020-02-11 22:43:07 +01:00
$headers = '' ;
/**
* Filters the headers of the data erasure fulfillment notification .
*
* @ since 5.4 . 0
*
* @ param string | array $headers The email headers .
* @ param string $subject The email subject .
* @ param string $content The email content .
* @ param int $request_id The request ID .
* @ param array $email_data {
* Data relating to the account action email .
*
* @ type WP_User_Request $request User request object .
* @ type string $message_recipient The address that the email will be sent to . Defaults
* to the value of `$request->email` , but can be changed
* by the `user_erasure_fulfillment_email_to` filter .
* @ type string $privacy_policy_url Privacy policy URL .
* @ type string $sitename The site name sending the mail .
* @ type string $siteurl The site URL sending the mail .
* }
*/
$headers = apply_filters ( 'user_erasure_complete_email_headers' , $headers , $subject , $content , $request_id , $email_data );
$email_sent = wp_mail ( $user_email , $subject , $content , $headers );
2018-05-10 22:43:22 +02:00
2019-03-27 20:41:53 +01:00
if ( $switched_locale ) {
restore_previous_locale ();
}
2018-05-10 22:43:22 +02:00
if ( $email_sent ) {
update_post_meta ( $request_id , '_wp_user_notified' , true );
}
}
2018-04-10 20:02:30 +02:00
/**
2018-04-27 12:12:22 +02:00
* Return request confirmation message HTML .
2018-04-10 20:02:30 +02:00
*
2018-04-27 12:12:22 +02:00
* @ since 4.9 . 6
2018-04-10 20:02:30 +02:00
* @ access private
*
2018-05-10 22:53:21 +02:00
* @ param int $request_id The request ID being confirmed .
2020-06-20 00:55:12 +02:00
* @ return string The confirmation message .
2018-04-10 20:02:30 +02:00
*/
2018-05-10 22:53:21 +02:00
function _wp_privacy_account_request_confirmed_message ( $request_id ) {
2020-02-10 20:57:05 +01:00
$request = wp_get_user_request ( $request_id );
2018-04-10 20:02:30 +02:00
2018-08-17 03:51:36 +02:00
$message = '<p class="success">' . __ ( 'Action has been confirmed.' ) . '</p>' ;
2018-05-10 22:53:21 +02:00
$message .= '<p>' . __ ( 'The site administrator has been notified and will fulfill your request as soon as possible.' ) . '</p>' ;
2018-04-27 19:31:22 +02:00
if ( $request && in_array ( $request -> action_name , _wp_privacy_action_request_types (), true ) ) {
2018-05-10 22:53:21 +02:00
if ( 'export_personal_data' === $request -> action_name ) {
2018-08-17 03:51:36 +02:00
$message = '<p class="success">' . __ ( 'Thanks for confirming your export request.' ) . '</p>' ;
2018-05-10 22:53:21 +02:00
$message .= '<p>' . __ ( 'The site administrator has been notified. You will receive a link to download your export via email when they fulfill your request.' ) . '</p>' ;
} elseif ( 'remove_personal_data' === $request -> action_name ) {
2018-08-17 03:51:36 +02:00
$message = '<p class="success">' . __ ( 'Thanks for confirming your erasure request.' ) . '</p>' ;
2018-05-10 22:53:21 +02:00
$message .= '<p>' . __ ( 'The site administrator has been notified. You will receive an email confirmation when they erase your data.' ) . '</p>' ;
}
2018-04-10 20:02:30 +02:00
}
2018-04-27 12:12:22 +02:00
2018-05-10 22:53:21 +02:00
/**
* Filters the message displayed to a user when they confirm a data request .
*
* @ since 4.9 . 6
*
* @ param string $message The message to the user .
* @ param int $request_id The ID of the request being confirmed .
*/
$message = apply_filters ( 'user_request_action_confirmed_message' , $message , $request_id );
2018-04-27 12:12:22 +02:00
return $message ;
2018-04-10 20:02:30 +02:00
}
2018-03-07 00:47:30 +01:00
/**
2018-04-27 12:12:22 +02:00
* Create and log a user request to perform a specific action .
2018-03-07 00:47:30 +01:00
*
2018-04-27 12:12:22 +02:00
* Requests are stored inside a post type named `user_request` since they can apply to both
* users on the site , or guests without a user account .
2018-03-07 00:47:30 +01:00
*
2018-04-27 12:12:22 +02:00
* @ since 4.9 . 6
2021-02-05 16:50:05 +01:00
* @ since 5.7 . 0 Added the `$status` parameter .
2018-04-27 12:12:22 +02:00
*
2021-02-02 21:42:03 +01:00
* @ param string $email_address User email address . This can be the address of a registered
* or non - registered user .
Privacy: Allow Admin to Skip e-mail confirmation for Export.
This adds a form option to skip the admin email alert when exporting personal data.
Props xkon, azaozz, TZ-Media, iandunn, desrosj, iprg, allendav, wesselvandenberg, karmatosed, birgire, davidbaumwald, estelaris, paaljoachim, hellofromTonya.
Fixes #43890.
Built from https://develop.svn.wordpress.org/trunk@50159
git-svn-id: http://core.svn.wordpress.org/trunk@49838 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-02-02 20:45:03 +01:00
* @ param string $action_name Name of the action that is being confirmed . Required .
2021-02-02 21:42:03 +01:00
* @ param array $request_data Misc data you want to send with the verification request and pass
* to the actions once the request is confirmed .
2021-02-05 16:50:05 +01:00
* @ param string $status Optional request status ( pending or confirmed ) . Default 'pending' .
Privacy: Allow Admin to Skip e-mail confirmation for Export.
This adds a form option to skip the admin email alert when exporting personal data.
Props xkon, azaozz, TZ-Media, iandunn, desrosj, iprg, allendav, wesselvandenberg, karmatosed, birgire, davidbaumwald, estelaris, paaljoachim, hellofromTonya.
Fixes #43890.
Built from https://develop.svn.wordpress.org/trunk@50159
git-svn-id: http://core.svn.wordpress.org/trunk@49838 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2021-02-02 20:45:03 +01:00
* @ return int | WP_Error Returns the request ID if successful , or a WP_Error object on failure .
2018-03-07 00:47:30 +01:00
*/
2021-02-05 16:50:05 +01:00
function wp_create_user_request ( $email_address = '' , $action_name = '' , $request_data = array (), $status = 'pending' ) {
2018-04-27 12:12:22 +02:00
$email_address = sanitize_email ( $email_address );
$action_name = sanitize_key ( $action_name );
2018-03-07 00:47:30 +01:00
2018-04-27 12:12:22 +02:00
if ( ! is_email ( $email_address ) ) {
2018-05-02 20:42:21 +02:00
return new WP_Error ( 'invalid_email' , __ ( 'Invalid email address.' ) );
2018-04-06 21:10:30 +02:00
}
2020-11-02 19:42:04 +01:00
if ( ! in_array ( $action_name , _wp_privacy_action_request_types (), true ) ) {
2018-05-02 20:42:21 +02:00
return new WP_Error ( 'invalid_action' , __ ( 'Invalid action name.' ) );
2018-03-07 00:47:30 +01:00
}
2021-02-05 16:50:05 +01:00
if ( ! in_array ( $status , array ( 'pending' , 'confirmed' ), true ) ) {
return new WP_Error ( 'invalid_status' , __ ( 'Invalid request status.' ) );
}
2018-04-27 12:12:22 +02:00
$user = get_user_by ( 'email' , $email_address );
2018-05-10 12:01:21 +02:00
$user_id = $user && ! is_wp_error ( $user ) ? $user -> ID : 0 ;
2018-03-07 00:47:30 +01:00
2018-04-27 12:12:22 +02:00
// Check for duplicates.
2018-08-17 03:51:36 +02:00
$requests_query = new WP_Query (
array (
'post_type' => 'user_request' ,
2020-01-29 01:45:18 +01:00
'post_name__in' => array ( $action_name ), // Action name stored in post_name column.
'title' => $email_address , // Email address stored in post_title column.
2019-03-15 17:27:49 +01:00
'post_status' => array (
'request-pending' ,
'request-confirmed' ,
),
2018-08-17 03:51:36 +02:00
'fields' => 'ids' ,
)
);
2018-03-07 00:47:30 +01:00
2018-04-27 12:12:22 +02:00
if ( $requests_query -> found_posts ) {
2021-01-17 18:46:06 +01:00
return new WP_Error ( 'duplicate_request' , __ ( 'An incomplete personal data request for this email address already exists.' ) );
2018-03-07 00:47:30 +01:00
}
2018-08-17 03:51:36 +02:00
$request_id = wp_insert_post (
array (
'post_author' => $user_id ,
'post_name' => $action_name ,
'post_title' => $email_address ,
'post_content' => wp_json_encode ( $request_data ),
2021-02-05 16:50:05 +01:00
'post_status' => 'request-' . $status ,
2018-08-17 03:51:36 +02:00
'post_type' => 'user_request' ,
'post_date' => current_time ( 'mysql' , false ),
'post_date_gmt' => current_time ( 'mysql' , true ),
),
true
);
2018-04-27 12:12:22 +02:00
return $request_id ;
}
2018-03-07 00:47:30 +01:00
2018-04-27 12:12:22 +02:00
/**
* Get action description from the name and return a string .
*
* @ since 4.9 . 6
*
* @ param string $action_name Action name of the request .
2018-05-14 16:53:21 +02:00
* @ return string Human readable action name .
2018-04-27 12:12:22 +02:00
*/
function wp_user_request_action_description ( $action_name ) {
switch ( $action_name ) {
case 'export_personal_data' :
$description = __ ( 'Export Personal Data' );
break ;
case 'remove_personal_data' :
2018-05-07 18:45:22 +02:00
$description = __ ( 'Erase Personal Data' );
2018-04-27 12:12:22 +02:00
break ;
default :
2019-09-03 02:41:05 +02:00
/* translators: %s: Action name. */
2018-04-27 12:12:22 +02:00
$description = sprintf ( __ ( 'Confirm the "%s" action' ), $action_name );
break ;
2018-03-07 00:47:30 +01:00
}
2018-04-27 12:12:22 +02:00
/**
* Filters the user action description .
*
2018-04-28 14:04:21 +02:00
* @ since 4.9 . 6
*
2018-04-27 12:12:22 +02:00
* @ param string $description The default description .
* @ param string $action_name The name of the request .
2018-04-27 19:31:22 +02:00
*/
2018-04-27 12:12:22 +02:00
return apply_filters ( 'user_request_action_description' , $description , $action_name );
}
2018-04-06 21:10:30 +02:00
2018-04-27 12:12:22 +02:00
/**
* Send a confirmation request email to confirm an action .
*
* If the request is not already pending , it will be updated .
*
* @ since 4.9 . 6
*
* @ param string $request_id ID of the request created via wp_create_user_request () .
2021-01-03 23:04:04 +01:00
* @ return true | WP_Error True on success , `WP_Error` on failure .
2018-04-27 12:12:22 +02:00
*/
function wp_send_user_request ( $request_id ) {
$request_id = absint ( $request_id );
2020-02-10 20:57:05 +01:00
$request = wp_get_user_request ( $request_id );
2018-04-27 12:12:22 +02:00
2018-04-27 19:31:22 +02:00
if ( ! $request ) {
2021-01-17 18:46:06 +01:00
return new WP_Error ( 'invalid_request' , __ ( 'Invalid personal data request.' ) );
2018-03-07 00:47:30 +01:00
}
2018-08-13 18:32:27 +02:00
// Localize message content for user; fallback to site default for visitors.
if ( ! empty ( $request -> user_id ) ) {
$locale = get_user_locale ( $request -> user_id );
} else {
$locale = get_locale ();
}
$switched_locale = switch_to_locale ( $locale );
2018-04-27 12:12:22 +02:00
$email_data = array (
2018-07-17 15:53:25 +02:00
'request' => $request ,
2018-04-27 19:31:22 +02:00
'email' => $request -> email ,
'description' => wp_user_request_action_description ( $request -> action_name ),
2018-08-17 03:51:36 +02:00
'confirm_url' => add_query_arg (
array (
'action' => 'confirmaction' ,
'request_id' => $request_id ,
'confirm_key' => wp_generate_user_request_key ( $request_id ),
),
wp_login_url ()
),
2018-07-03 19:00:25 +02:00
'sitename' => wp_specialchars_decode ( get_option ( 'blogname' ), ENT_QUOTES ),
'siteurl' => home_url (),
2018-04-27 12:12:22 +02:00
);
2018-06-28 04:32:48 +02:00
/* translators: Do not translate DESCRIPTION, CONFIRM_URL, SITENAME, SITEURL: those are placeholders. */
2018-03-07 00:47:30 +01:00
$email_text = __ (
' Howdy ,
2018-04-06 21:10:30 +02:00
A request has been made to perform the following action on your account :
2018-03-07 00:47:30 +01:00
###DESCRIPTION###
2018-04-06 21:10:30 +02:00
To confirm this , please click on the following link :
2018-03-07 00:47:30 +01:00
###CONFIRM_URL###
You can safely ignore and delete this email if you do not want to
take this action .
Regards ,
All at ###SITENAME###
###SITEURL###'
);
/**
* Filters the text of the email sent when an account action is attempted .
*
* The following strings have a special meaning and will get replaced dynamically :
2018-05-09 16:38:21 +02:00
*
2018-03-07 00:47:30 +01:00
* ###DESCRIPTION### Description of the action being performed so the user knows what the email is for.
* ###CONFIRM_URL### The link to click on to confirm the account action.
2018-05-09 16:38:21 +02:00
* ###SITENAME### The name of the site.
* ###SITEURL### The URL to the site.
2018-03-07 00:47:30 +01:00
*
2018-04-27 12:12:22 +02:00
* @ since 4.9 . 6
2018-04-10 20:02:30 +02:00
*
2018-05-09 16:38:21 +02:00
* @ param string $email_text Text in the email .
2018-03-07 00:47:30 +01:00
* @ param array $email_data {
* Data relating to the account action email .
*
2018-05-09 16:38:21 +02:00
* @ type WP_User_Request $request User request object .
2018-04-27 19:31:22 +02:00
* @ type string $email The email address this is being sent to .
* @ type string $description Description of the action being performed so the user knows what the email is for .
* @ type string $confirm_url The link to click on to confirm the account action .
* @ type string $sitename The site name sending the mail .
* @ type string $siteurl The site URL sending the mail .
2018-03-07 00:47:30 +01:00
* }
*/
2018-04-27 12:12:22 +02:00
$content = apply_filters ( 'user_request_action_email_content' , $email_text , $email_data );
2018-03-07 00:47:30 +01:00
$content = str_replace ( '###DESCRIPTION###' , $email_data [ 'description' ], $content );
$content = str_replace ( '###CONFIRM_URL###' , esc_url_raw ( $email_data [ 'confirm_url' ] ), $content );
$content = str_replace ( '###EMAIL###' , $email_data [ 'email' ], $content );
2018-07-03 19:00:25 +02:00
$content = str_replace ( '###SITENAME###' , $email_data [ 'sitename' ], $content );
2018-03-07 00:47:30 +01:00
$content = str_replace ( '###SITEURL###' , esc_url_raw ( $email_data [ 'siteurl' ] ), $content );
2019-09-03 02:41:05 +02:00
/* translators: Confirm privacy data request notification email subject. 1: Site title, 2: Name of the action. */
2018-07-03 19:00:25 +02:00
$subject = sprintf ( __ ( '[%1$s] Confirm Action: %2$s' ), $email_data [ 'sitename' ], $email_data [ 'description' ] );
2018-05-09 19:51:21 +02:00
/**
* Filters the subject of the email sent when an account action is attempted .
*
* @ since 4.9 . 6
*
* @ param string $subject The email subject .
2018-07-03 19:00:25 +02:00
* @ param string $sitename The name of the site .
2018-05-09 19:51:21 +02:00
* @ param array $email_data {
* Data relating to the account action email .
*
2018-05-14 16:53:21 +02:00
* @ type WP_User_Request $request User request object .
2018-05-09 19:51:21 +02:00
* @ type string $email The email address this is being sent to .
* @ type string $description Description of the action being performed so the user knows what the email is for .
* @ type string $confirm_url The link to click on to confirm the account action .
* @ type string $sitename The site name sending the mail .
* @ type string $siteurl The site URL sending the mail .
* }
*/
2018-07-03 19:00:25 +02:00
$subject = apply_filters ( 'user_request_action_email_subject' , $subject , $email_data [ 'sitename' ], $email_data );
2018-05-09 19:51:21 +02:00
2020-02-11 22:43:07 +01:00
$headers = '' ;
/**
* Filters the headers of the email sent when an account action is attempted .
*
* @ since 5.4 . 0
*
* @ param string | array $headers The email headers .
* @ param string $subject The email subject .
* @ param string $content The email content .
* @ param int $request_id The request ID .
* @ param array $email_data {
* Data relating to the account action email .
*
* @ type WP_User_Request $request User request object .
* @ type string $email The email address this is being sent to .
* @ type string $description Description of the action being performed so the user knows what the email is for .
* @ type string $confirm_url The link to click on to confirm the account action .
* @ type string $sitename The site name sending the mail .
* @ type string $siteurl The site URL sending the mail .
* }
*/
$headers = apply_filters ( 'user_request_action_email_headers' , $headers , $subject , $content , $request_id , $email_data );
$email_sent = wp_mail ( $email_data [ 'email' ], $subject , $content , $headers );
2018-08-13 18:32:27 +02:00
if ( $switched_locale ) {
restore_previous_locale ();
}
if ( ! $email_sent ) {
return new WP_Error ( 'privacy_email_error' , __ ( 'Unable to send personal data export confirmation email.' ) );
}
return true ;
2018-03-07 00:47:30 +01:00
}
/**
2018-04-27 19:31:22 +02:00
* Returns a confirmation key for a user action and stores the hashed version for future comparison .
2018-03-07 00:47:30 +01:00
*
2018-04-27 12:12:22 +02:00
* @ since 4.9 . 6
2018-03-07 00:47:30 +01:00
*
2018-04-27 12:12:22 +02:00
* @ param int $request_id Request ID .
* @ return string Confirmation key .
2018-03-07 00:47:30 +01:00
*/
2018-04-27 12:12:22 +02:00
function wp_generate_user_request_key ( $request_id ) {
2018-03-07 00:47:30 +01:00
global $wp_hasher ;
// Generate something random for a confirmation key.
$key = wp_generate_password ( 20 , false );
2018-04-27 12:12:22 +02:00
// Return the key, hashed.
2018-03-07 00:47:30 +01:00
if ( empty ( $wp_hasher ) ) {
require_once ABSPATH . WPINC . '/class-phpass.php' ;
$wp_hasher = new PasswordHash ( 8 , true );
}
2018-08-17 03:51:36 +02:00
wp_update_post (
array (
2019-01-09 05:33:50 +01:00
'ID' => $request_id ,
'post_status' => 'request-pending' ,
'post_password' => $wp_hasher -> HashPassword ( $key ),
2018-08-17 03:51:36 +02:00
)
);
2018-03-07 00:47:30 +01:00
return $key ;
}
/**
2018-05-14 16:53:21 +02:00
* Validate a user request by comparing the key with the request ' s key .
2018-03-07 00:47:30 +01:00
*
2018-04-27 12:12:22 +02:00
* @ since 4.9 . 6
2018-03-07 00:47:30 +01:00
*
2018-04-27 12:12:22 +02:00
* @ param string $request_id ID of the request being confirmed .
* @ param string $key Provided key to validate .
2021-01-03 23:04:04 +01:00
* @ return true | WP_Error True on success , WP_Error on failure .
2018-03-07 00:47:30 +01:00
*/
2018-04-27 12:12:22 +02:00
function wp_validate_user_request_key ( $request_id , $key ) {
2018-03-07 00:47:30 +01:00
global $wp_hasher ;
2020-10-04 05:23:09 +02:00
$request_id = absint ( $request_id );
$request = wp_get_user_request ( $request_id );
$saved_key = $request -> confirm_key ;
$key_request_time = $request -> modified_timestamp ;
2018-03-07 00:47:30 +01:00
2020-10-04 05:23:09 +02:00
if ( ! $request || ! $saved_key || ! $key_request_time ) {
2021-01-17 18:46:06 +01:00
return new WP_Error ( 'invalid_request' , __ ( 'Invalid personal data request.' ) );
2018-04-27 12:12:22 +02:00
}
2018-03-07 00:47:30 +01:00
2018-04-27 19:31:22 +02:00
if ( ! in_array ( $request -> status , array ( 'request-pending' , 'request-failed' ), true ) ) {
2021-01-17 18:46:06 +01:00
return new WP_Error ( 'expired_request' , __ ( 'This personal data request has expired.' ) );
2018-04-06 21:10:30 +02:00
}
2018-03-07 00:47:30 +01:00
2018-04-27 12:12:22 +02:00
if ( empty ( $key ) ) {
2021-01-17 18:46:06 +01:00
return new WP_Error ( 'missing_key' , __ ( 'The confirmation key is missing from this personal data request.' ) );
2018-04-27 12:12:22 +02:00
}
2018-03-07 00:47:30 +01:00
2018-04-06 21:10:30 +02:00
if ( empty ( $wp_hasher ) ) {
require_once ABSPATH . WPINC . '/class-phpass.php' ;
$wp_hasher = new PasswordHash ( 8 , true );
}
2018-03-07 00:47:30 +01:00
2018-04-06 21:10:30 +02:00
/**
* Filters the expiration time of confirm keys .
*
2018-04-27 12:12:22 +02:00
* @ since 4.9 . 6
2018-04-10 20:02:30 +02:00
*
2018-04-06 21:10:30 +02:00
* @ param int $expiration The expiration time in seconds .
*/
2018-04-27 12:12:22 +02:00
$expiration_duration = ( int ) apply_filters ( 'user_request_key_expiration' , DAY_IN_SECONDS );
2018-04-06 21:10:30 +02:00
$expiration_time = $key_request_time + $expiration_duration ;
if ( ! $wp_hasher -> CheckPassword ( $key , $saved_key ) ) {
2021-01-17 18:46:06 +01:00
return new WP_Error ( 'invalid_key' , __ ( 'The confirmation key is invalid for this personal data request.' ) );
2018-04-06 21:10:30 +02:00
}
2018-04-27 12:12:22 +02:00
if ( ! $expiration_time || time () > $expiration_time ) {
2021-01-17 18:46:06 +01:00
return new WP_Error ( 'expired_key' , __ ( 'The confirmation key has expired for this personal data request.' ) );
2018-04-06 21:10:30 +02:00
}
2018-04-27 12:12:22 +02:00
return true ;
}
/**
2020-02-10 20:57:05 +01:00
* Return the user request object for the specified request ID .
2018-04-27 12:12:22 +02:00
*
* @ since 4.9 . 6
*
2020-02-10 20:57:05 +01:00
* @ param int $request_id The ID of the user request .
2018-04-27 21:54:21 +02:00
* @ return WP_User_Request | false
2018-04-27 12:12:22 +02:00
*/
2020-02-10 20:57:05 +01:00
function wp_get_user_request ( $request_id ) {
2018-04-27 12:12:22 +02:00
$request_id = absint ( $request_id );
2018-04-27 19:31:22 +02:00
$post = get_post ( $request_id );
2018-04-27 12:12:22 +02:00
2018-04-27 19:31:22 +02:00
if ( ! $post || 'user_request' !== $post -> post_type ) {
2018-04-27 12:12:22 +02:00
return false ;
2018-04-06 21:10:30 +02:00
}
2018-04-27 19:31:22 +02:00
return new WP_User_Request ( $post );
}
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
/**
* Checks if Application Passwords is globally available .
*
2020-10-13 22:10:04 +02:00
* By default , Application Passwords is available to all sites using SSL or to local environments .
* Use { @ see 'wp_is_application_passwords_available' } to adjust its availability .
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
*
* @ since 5.6 . 0
*
* @ return bool
*/
function wp_is_application_passwords_available () {
2020-10-13 22:10:04 +02:00
$available = is_ssl () || 'local' === wp_get_environment_type ();
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
/**
* Filters whether Application Passwords is available .
*
* @ since 5.6 . 0
*
* @ param bool $available True if available , false otherwise .
*/
2020-10-13 22:10:04 +02:00
return apply_filters ( 'wp_is_application_passwords_available' , $available );
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
}
/**
2020-11-16 23:42:04 +01:00
* Checks if Application Passwords is available for a specific user .
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
*
2020-10-13 22:10:04 +02:00
* By default all users can use Application Passwords . Use { @ see 'wp_is_application_passwords_available_for_user' }
* to restrict availability to certain users .
REST API: Introduce Application Passwords for API authentication.
In WordPress 4.4 the REST API was first introduced. A few releases later in WordPress 4.7, the Content API endpoints were added, paving the way for Gutenberg and countless in-site experiences. In the intervening years, numerous plugins have built on top of the REST API. Many developers shared a common frustration, the lack of external authentication to the REST API.
This commit introduces Application Passwords to allow users to connect to external applications to their WordPress website. Users can generate individual passwords for each application, allowing for easy revocation and activity monitoring. An authorization flow is introduced to make the connection flow simple for users and application developers.
Application Passwords uses Basic Authentication, and by default is only available over an SSL connection.
Props georgestephanis, kasparsd, timothyblynjacobs, afercia, akkspro, andraganescu, arippberger, aristath, austyfrosty, ayesh, batmoo, bradyvercher, brianhenryie, helen, ipstenu, jeffmatson, jeffpaul, joostdevalk, joshlevinson, kadamwhite, kjbenk, koke, michael-arestad, Otto42, pekz0r, salzano, spacedmonkey, valendesigns.
Fixes #42790.
Built from https://develop.svn.wordpress.org/trunk@49109
git-svn-id: http://core.svn.wordpress.org/trunk@48871 1a063a9b-81f0-0310-95a4-ce76da25c4cd
2020-10-09 00:14:06 +02:00
*
* @ since 5.6 . 0
*
* @ param int | WP_User $user The user to check .
* @ return bool
*/
function wp_is_application_passwords_available_for_user ( $user ) {
if ( ! wp_is_application_passwords_available () ) {
return false ;
}
if ( ! is_object ( $user ) ) {
$user = get_userdata ( $user );
}
if ( ! $user || ! $user -> exists () ) {
return false ;
}
/**
* Filters whether Application Passwords is available for a specific user .
*
* @ since 5.6 . 0
*
* @ param bool $available True if available , false otherwise .
* @ param WP_User $user The user to check .
*/
return apply_filters ( 'wp_is_application_passwords_available_for_user' , true , $user );
}