Menu Adam R Brown

WP hooks navigation: Home/browseActions indexFilters index

Source View: sanitize_file_name

To save our bandwidth, we show only a snippet of code around each occurence of the hook. View complete file in SVN (without highlighting).

Understanding Source Code

The best way to understand what a hook does is to look at where it occurs in the source code.

Remember, this hook may occur in more than one file. Moreover, the hook's context may change from version to version.

Source View

This hook occurs 2 times in this file.

Line Code
2030           }
2031      }
2032
2033      // Split the filename into a base and extension[s].
2034      $parts = explode( '.', $filename );
2035
2036      // Return if only one extension.
2037      if ( count( $parts ) <= 2 ) {
2038           /** This filter is documented in wp-includes/formatting.php */
2039           return apply_filters( 'sanitize_file_name', $filename, $filename_raw );
2040      }
2041
2042      // Process multiple extensions.
2043      $filename  = array_shift( $parts );
2044      $extension = array_pop( $parts );
2045      $mimes     = get_allowed_mime_types();
2046
2047      /*
2048       * Loop over any intermediate extensions. Postfix them with a trailing underscore
 
Line Code
2070
2071      /**
2072       * Filters a sanitized filename string.
2073       *
2074       * @since 2.8.0
2075       *
2076       * @param string $filename     Sanitized filename.
2077       * @param string $filename_raw The filename prior to sanitization.
2078       */
2079      return apply_filters( 'sanitize_file_name', $filename, $filename_raw );
2080 }
2081
2082 /**
2083  * Sanitizes a username, stripping out unsafe characters.
2084  *
2085  * Removes tags, octets, entities, and if strict is enabled, will only keep
2086  * alphanumeric, _, space, ., -, @. After sanitizing, it passes the username,
2087  * raw username (the username in the parameter), and the value of $strict as
2088  * parameters for the {@see 'sanitize_user'} filter.