PageRenderTime 103ms CodeModel.GetById 8ms RepoModel.GetById 0ms app.codeStats 0ms

/wp-admin/includes/user.php

https://github.com/MikeLockz/lockwitz
PHP | 383 lines | 219 code | 57 blank | 107 comment | 86 complexity | 3e54749f3f57c28ee764277b321e5373 MD5 | raw file
  1. <?php
  2. /**
  3. * WordPress user administration API.
  4. *
  5. * @package WordPress
  6. * @subpackage Administration
  7. */
  8. /**
  9. * Creates a new user from the "Users" form using $_POST information.
  10. *
  11. * It seems that the first half is for backwards compatibility, but only
  12. * has the ability to alter the user's role. WordPress core seems to
  13. * use this function only in the second way, running edit_user() with
  14. * no id so as to create a new user.
  15. *
  16. * @since 2.0
  17. *
  18. * @param int $user_id Optional. User ID.
  19. * @return null|WP_Error|int Null when adding user, WP_Error or User ID integer when no parameters.
  20. */
  21. function add_user() {
  22. if ( func_num_args() ) { // The hackiest hack that ever did hack
  23. global $wp_roles;
  24. $user_id = (int) func_get_arg( 0 );
  25. if ( isset( $_POST['role'] ) ) {
  26. $new_role = sanitize_text_field( $_POST['role'] );
  27. // Don't let anyone with 'edit_users' (admins) edit their own role to something without it.
  28. if ( $user_id != get_current_user_id() || $wp_roles->role_objects[$new_role]->has_cap( 'edit_users' ) ) {
  29. // If the new role isn't editable by the logged-in user die with error
  30. $editable_roles = get_editable_roles();
  31. if ( empty( $editable_roles[$new_role] ) )
  32. wp_die(__('You can&#8217;t give users that role.'));
  33. $user = new WP_User( $user_id );
  34. $user->set_role( $new_role );
  35. }
  36. }
  37. } else {
  38. add_action( 'user_register', 'add_user' ); // See above
  39. return edit_user();
  40. }
  41. }
  42. /**
  43. * Edit user settings based on contents of $_POST
  44. *
  45. * Used on user-edit.php and profile.php to manage and process user options, passwords etc.
  46. *
  47. * @since 2.0
  48. *
  49. * @param int $user_id Optional. User ID.
  50. * @return int user id of the updated user
  51. */
  52. function edit_user( $user_id = 0 ) {
  53. global $wp_roles, $wpdb;
  54. $user = new stdClass;
  55. if ( $user_id ) {
  56. $update = true;
  57. $user->ID = (int) $user_id;
  58. $userdata = get_userdata( $user_id );
  59. $user->user_login = $wpdb->escape( $userdata->user_login );
  60. } else {
  61. $update = false;
  62. }
  63. if ( !$update && isset( $_POST['user_login'] ) )
  64. $user->user_login = sanitize_user($_POST['user_login'], true);
  65. $pass1 = $pass2 = '';
  66. if ( isset( $_POST['pass1'] ))
  67. $pass1 = $_POST['pass1'];
  68. if ( isset( $_POST['pass2'] ))
  69. $pass2 = $_POST['pass2'];
  70. if ( isset( $_POST['role'] ) && current_user_can( 'edit_users' ) ) {
  71. $new_role = sanitize_text_field( $_POST['role'] );
  72. $potential_role = isset($wp_roles->role_objects[$new_role]) ? $wp_roles->role_objects[$new_role] : false;
  73. // Don't let anyone with 'edit_users' (admins) edit their own role to something without it.
  74. // Multisite super admins can freely edit their blog roles -- they possess all caps.
  75. if ( ( is_multisite() && current_user_can( 'manage_sites' ) ) || $user_id != get_current_user_id() || ($potential_role && $potential_role->has_cap( 'edit_users' ) ) )
  76. $user->role = $new_role;
  77. // If the new role isn't editable by the logged-in user die with error
  78. $editable_roles = get_editable_roles();
  79. if ( ! empty( $new_role ) && empty( $editable_roles[$new_role] ) )
  80. wp_die(__('You can&#8217;t give users that role.'));
  81. }
  82. if ( isset( $_POST['email'] ))
  83. $user->user_email = sanitize_text_field( $_POST['email'] );
  84. if ( isset( $_POST['url'] ) ) {
  85. if ( empty ( $_POST['url'] ) || $_POST['url'] == 'http://' ) {
  86. $user->user_url = '';
  87. } else {
  88. $user->user_url = esc_url_raw( $_POST['url'] );
  89. $user->user_url = preg_match('/^(https?|ftps?|mailto|news|irc|gopher|nntp|feed|telnet):/is', $user->user_url) ? $user->user_url : 'http://'.$user->user_url;
  90. }
  91. }
  92. if ( isset( $_POST['first_name'] ) )
  93. $user->first_name = sanitize_text_field( $_POST['first_name'] );
  94. if ( isset( $_POST['last_name'] ) )
  95. $user->last_name = sanitize_text_field( $_POST['last_name'] );
  96. if ( isset( $_POST['nickname'] ) )
  97. $user->nickname = sanitize_text_field( $_POST['nickname'] );
  98. if ( isset( $_POST['display_name'] ) )
  99. $user->display_name = sanitize_text_field( $_POST['display_name'] );
  100. if ( isset( $_POST['description'] ) )
  101. $user->description = trim( $_POST['description'] );
  102. foreach ( _wp_get_user_contactmethods( $user ) as $method => $name ) {
  103. if ( isset( $_POST[$method] ))
  104. $user->$method = sanitize_text_field( $_POST[$method] );
  105. }
  106. if ( $update ) {
  107. $user->rich_editing = isset( $_POST['rich_editing'] ) && 'false' == $_POST['rich_editing'] ? 'false' : 'true';
  108. $user->admin_color = isset( $_POST['admin_color'] ) ? sanitize_text_field( $_POST['admin_color'] ) : 'fresh';
  109. $user->show_admin_bar_front = isset( $_POST['admin_bar_front'] ) ? 'true' : 'false';
  110. $user->show_admin_bar_admin = isset( $_POST['admin_bar_admin'] ) ? 'true' : 'false';
  111. }
  112. $user->comment_shortcuts = isset( $_POST['comment_shortcuts'] ) && 'true' == $_POST['comment_shortcuts'] ? 'true' : '';
  113. $user->use_ssl = 0;
  114. if ( !empty($_POST['use_ssl']) )
  115. $user->use_ssl = 1;
  116. $errors = new WP_Error();
  117. /* checking that username has been typed */
  118. if ( $user->user_login == '' )
  119. $errors->add( 'user_login', __( '<strong>ERROR</strong>: Please enter a username.' ));
  120. /* checking the password has been typed twice */
  121. do_action_ref_array( 'check_passwords', array ( $user->user_login, & $pass1, & $pass2 ));
  122. if ( $update ) {
  123. if ( empty($pass1) && !empty($pass2) )
  124. $errors->add( 'pass', __( '<strong>ERROR</strong>: You entered your new password only once.' ), array( 'form-field' => 'pass1' ) );
  125. elseif ( !empty($pass1) && empty($pass2) )
  126. $errors->add( 'pass', __( '<strong>ERROR</strong>: You entered your new password only once.' ), array( 'form-field' => 'pass2' ) );
  127. } else {
  128. if ( empty($pass1) )
  129. $errors->add( 'pass', __( '<strong>ERROR</strong>: Please enter your password.' ), array( 'form-field' => 'pass1' ) );
  130. elseif ( empty($pass2) )
  131. $errors->add( 'pass', __( '<strong>ERROR</strong>: Please enter your password twice.' ), array( 'form-field' => 'pass2' ) );
  132. }
  133. /* Check for "\" in password */
  134. if ( false !== strpos( stripslashes($pass1), "\\" ) )
  135. $errors->add( 'pass', __( '<strong>ERROR</strong>: Passwords may not contain the character "\\".' ), array( 'form-field' => 'pass1' ) );
  136. /* checking the password has been typed twice the same */
  137. if ( $pass1 != $pass2 )
  138. $errors->add( 'pass', __( '<strong>ERROR</strong>: Please enter the same password in the two password fields.' ), array( 'form-field' => 'pass1' ) );
  139. if ( !empty( $pass1 ) )
  140. $user->user_pass = $pass1;
  141. if ( !$update && isset( $_POST['user_login'] ) && !validate_username( $_POST['user_login'] ) )
  142. $errors->add( 'user_login', __( '<strong>ERROR</strong>: This username is invalid because it uses illegal characters. Please enter a valid username.' ));
  143. if ( !$update && username_exists( $user->user_login ) )
  144. $errors->add( 'user_login', __( '<strong>ERROR</strong>: This username is already registered. Please choose another one.' ));
  145. /* checking e-mail address */
  146. if ( empty( $user->user_email ) ) {
  147. $errors->add( 'empty_email', __( '<strong>ERROR</strong>: Please enter an e-mail address.' ), array( 'form-field' => 'email' ) );
  148. } elseif ( !is_email( $user->user_email ) ) {
  149. $errors->add( 'invalid_email', __( '<strong>ERROR</strong>: The e-mail address isn&#8217;t correct.' ), array( 'form-field' => 'email' ) );
  150. } elseif ( ( $owner_id = email_exists($user->user_email) ) && ( !$update || ( $owner_id != $user->ID ) ) ) {
  151. $errors->add( 'email_exists', __('<strong>ERROR</strong>: This email is already registered, please choose another one.'), array( 'form-field' => 'email' ) );
  152. }
  153. // Allow plugins to return their own errors.
  154. do_action_ref_array('user_profile_update_errors', array ( &$errors, $update, &$user ) );
  155. if ( $errors->get_error_codes() )
  156. return $errors;
  157. if ( $update ) {
  158. $user_id = wp_update_user( get_object_vars( $user ) );
  159. } else {
  160. $user_id = wp_insert_user( get_object_vars( $user ) );
  161. wp_new_user_notification( $user_id, isset($_POST['send_password']) ? $pass1 : '' );
  162. }
  163. return $user_id;
  164. }
  165. /**
  166. * Fetch a filtered list of user roles that the current user is
  167. * allowed to edit.
  168. *
  169. * Simple function who's main purpose is to allow filtering of the
  170. * list of roles in the $wp_roles object so that plugins can remove
  171. * innappropriate ones depending on the situation or user making edits.
  172. * Specifically because without filtering anyone with the edit_users
  173. * capability can edit others to be administrators, even if they are
  174. * only editors or authors. This filter allows admins to delegate
  175. * user management.
  176. *
  177. * @since 2.8
  178. *
  179. * @return unknown
  180. */
  181. function get_editable_roles() {
  182. global $wp_roles;
  183. $all_roles = $wp_roles->roles;
  184. $editable_roles = apply_filters('editable_roles', $all_roles);
  185. return $editable_roles;
  186. }
  187. /**
  188. * Retrieve user data and filter it.
  189. *
  190. * @since 2.0.5
  191. *
  192. * @param int $user_id User ID.
  193. * @return object WP_User object with user data.
  194. */
  195. function get_user_to_edit( $user_id ) {
  196. $user = new WP_User( $user_id );
  197. $user_contactmethods = _wp_get_user_contactmethods( $user );
  198. foreach ($user_contactmethods as $method => $name) {
  199. if ( empty( $user->{$method} ) )
  200. $user->{$method} = '';
  201. }
  202. if ( empty($user->description) )
  203. $user->description = '';
  204. $user = sanitize_user_object($user, 'edit');
  205. return $user;
  206. }
  207. /**
  208. * Retrieve the user's drafts.
  209. *
  210. * @since 2.0.0
  211. *
  212. * @param int $user_id User ID.
  213. * @return array
  214. */
  215. function get_users_drafts( $user_id ) {
  216. global $wpdb;
  217. $query = $wpdb->prepare("SELECT ID, post_title FROM $wpdb->posts WHERE post_type = 'post' AND post_status = 'draft' AND post_author = %d ORDER BY post_modified DESC", $user_id);
  218. $query = apply_filters('get_users_drafts', $query);
  219. return $wpdb->get_results( $query );
  220. }
  221. /**
  222. * Remove user and optionally reassign posts and links to another user.
  223. *
  224. * If the $reassign parameter is not assigned to an User ID, then all posts will
  225. * be deleted of that user. The action 'delete_user' that is passed the User ID
  226. * being deleted will be run after the posts are either reassigned or deleted.
  227. * The user meta will also be deleted that are for that User ID.
  228. *
  229. * @since 2.0.0
  230. *
  231. * @param int $id User ID.
  232. * @param int $reassign Optional. Reassign posts and links to new User ID.
  233. * @return bool True when finished.
  234. */
  235. function wp_delete_user( $id, $reassign = 'novalue' ) {
  236. global $wpdb;
  237. $id = (int) $id;
  238. // allow for transaction statement
  239. do_action('delete_user', $id);
  240. if ( 'novalue' === $reassign || null === $reassign ) {
  241. $post_ids = $wpdb->get_col( $wpdb->prepare("SELECT ID FROM $wpdb->posts WHERE post_author = %d", $id) );
  242. if ( $post_ids ) {
  243. foreach ( $post_ids as $post_id )
  244. wp_delete_post($post_id);
  245. }
  246. // Clean links
  247. $link_ids = $wpdb->get_col( $wpdb->prepare("SELECT link_id FROM $wpdb->links WHERE link_owner = %d", $id) );
  248. if ( $link_ids ) {
  249. foreach ( $link_ids as $link_id )
  250. wp_delete_link($link_id);
  251. }
  252. } else {
  253. $reassign = (int) $reassign;
  254. $wpdb->update( $wpdb->posts, array('post_author' => $reassign), array('post_author' => $id) );
  255. $wpdb->update( $wpdb->links, array('link_owner' => $reassign), array('link_owner' => $id) );
  256. }
  257. clean_user_cache($id);
  258. // FINALLY, delete user
  259. if ( !is_multisite() ) {
  260. $wpdb->query( $wpdb->prepare("DELETE FROM $wpdb->usermeta WHERE user_id = %d", $id) );
  261. $wpdb->query( $wpdb->prepare("DELETE FROM $wpdb->users WHERE ID = %d", $id) );
  262. } else {
  263. $level_key = $wpdb->get_blog_prefix() . 'capabilities'; // wpmu site admins don't have user_levels
  264. $wpdb->query("DELETE FROM $wpdb->usermeta WHERE user_id = $id AND meta_key = '{$level_key}'");
  265. }
  266. // allow for commit transaction
  267. do_action('deleted_user', $id);
  268. return true;
  269. }
  270. /**
  271. * Remove all capabilities from user.
  272. *
  273. * @since 2.1.0
  274. *
  275. * @param int $id User ID.
  276. */
  277. function wp_revoke_user($id) {
  278. $id = (int) $id;
  279. $user = new WP_User($id);
  280. $user->remove_all_caps();
  281. }
  282. add_action('admin_init', 'default_password_nag_handler');
  283. /**
  284. * @since 2.8.0
  285. */
  286. function default_password_nag_handler($errors = false) {
  287. global $user_ID;
  288. if ( ! get_user_option('default_password_nag') ) //Short circuit it.
  289. return;
  290. //get_user_setting = JS saved UI setting. else no-js-falback code.
  291. if ( 'hide' == get_user_setting('default_password_nag') || isset($_GET['default_password_nag']) && '0' == $_GET['default_password_nag'] ) {
  292. delete_user_setting('default_password_nag');
  293. update_user_option($user_ID, 'default_password_nag', false, true);
  294. }
  295. }
  296. add_action('profile_update', 'default_password_nag_edit_user', 10, 2);
  297. /**
  298. * @since 2.8.0
  299. */
  300. function default_password_nag_edit_user($user_ID, $old_data) {
  301. if ( ! get_user_option('default_password_nag', $user_ID) ) //Short circuit it.
  302. return;
  303. $new_data = get_userdata($user_ID);
  304. if ( $new_data->user_pass != $old_data->user_pass ) { //Remove the nag if the password has been changed.
  305. delete_user_setting('default_password_nag', $user_ID);
  306. update_user_option($user_ID, 'default_password_nag', false, true);
  307. }
  308. }
  309. add_action('admin_notices', 'default_password_nag');
  310. /**
  311. * @since 2.8.0
  312. */
  313. function default_password_nag() {
  314. global $pagenow;
  315. if ( 'profile.php' == $pagenow || ! get_user_option('default_password_nag') ) //Short circuit it.
  316. return;
  317. echo '<div class="error default-password-nag">';
  318. echo '<p>';
  319. echo '<strong>' . __('Notice:') . '</strong> ';
  320. _e('You&rsquo;re using the auto-generated password for your account. Would you like to change it to something easier to remember?');
  321. echo '</p><p>';
  322. printf( '<a href="%s">' . __('Yes, take me to my profile page') . '</a> | ', admin_url('profile.php') . '#password' );
  323. printf( '<a href="%s" id="default-password-nag-no">' . __('No thanks, do not remind me again') . '</a>', '?default_password_nag=0' );
  324. echo '</p></div>';
  325. }
  326. ?>