Menu Adam R Brown

WP hooks navigation: Home/browseActions indexFilters index

Source View: sanitize_file_name

To save our bandwidth, we show only a snippet of code around each occurence of the hook. View complete file in SVN (without highlighting).

Understanding Source Code

The best way to understand what a hook does is to look at where it occurs in the source code.

Remember, this hook may occur in more than one file. Moreover, the hook's context may change from version to version.

Source View

This hook occurs 2 times in this file.

Line Code
2046           }
2047      }
2048
2049      // Split the filename into a base and extension[s].
2050      $parts = explode( '.', $filename );
2051
2052      // Return if only one extension.
2053      if ( count( $parts ) <= 2 ) {
2054           /** This filter is documented in wp-includes/formatting.php */
2055           return apply_filters( 'sanitize_file_name', $filename, $filename_raw );
2056      }
2057
2058      // Process multiple extensions.
2059      $filename  = array_shift( $parts );
2060      $extension = array_pop( $parts );
2061      $mimes     = get_allowed_mime_types();
2062
2063      /*
2064       * Loop over any intermediate extensions. Postfix them with a trailing underscore
 
Line Code
2086
2087      /**
2088       * Filters a sanitized filename string.
2089       *
2090       * @since 2.8.0
2091       *
2092       * @param string $filename     Sanitized filename.
2093       * @param string $filename_raw The filename prior to sanitization.
2094       */
2095      return apply_filters( 'sanitize_file_name', $filename, $filename_raw );
2096 }
2097
2098 /**
2099  * Sanitizes a username, stripping out unsafe characters.
2100  *
2101  * Removes tags, octets, entities, and if strict is enabled, will only keep
2102  * alphanumeric, _, space, ., -, @. After sanitizing, it passes the username,
2103  * raw username (the username in the parameter), and the value of $strict as
2104  * parameters for the {@see 'sanitize_user'} filter.