Menu Adam R Brown

WP hooks navigation: Home/browseActions indexFilters index

Source View: sanitize_file_name

To save our bandwidth, we show only a snippet of code around each occurence of the hook. View complete file in SVN (without highlighting).

Understanding Source Code

The best way to understand what a hook does is to look at where it occurs in the source code.

Remember, this hook may occur in more than one file. Moreover, the hook's context may change from version to version.

Source View

This hook occurs 2 times in this file.

Line Code
2035           }
2036      }
2037
2038      // Split the filename into a base and extension[s].
2039      $parts = explode( '.', $filename );
2040
2041      // Return if only one extension.
2042      if ( count( $parts ) <= 2 ) {
2043           /** This filter is documented in wp-includes/formatting.php */
2044           return apply_filters( 'sanitize_file_name', $filename, $filename_raw );
2045      }
2046
2047      // Process multiple extensions.
2048      $filename  = array_shift( $parts );
2049      $extension = array_pop( $parts );
2050      $mimes     = get_allowed_mime_types();
2051
2052      /*
2053       * Loop over any intermediate extensions. Postfix them with a trailing underscore
 
Line Code
2075
2076      /**
2077       * Filters a sanitized filename string.
2078       *
2079       * @since 2.8.0
2080       *
2081       * @param string $filename     Sanitized filename.
2082       * @param string $filename_raw The filename prior to sanitization.
2083       */
2084      return apply_filters( 'sanitize_file_name', $filename, $filename_raw );
2085 }
2086
2087 /**
2088  * Sanitizes a username, stripping out unsafe characters.
2089  *
2090  * Removes tags, octets, entities, and if strict is enabled, will only keep
2091  * alphanumeric, _, space, ., -, @. After sanitizing, it passes the username,
2092  * raw username (the username in the parameter), and the value of $strict as
2093  * parameters for the {@see 'sanitize_user'} filter.