` element.
* Default ‘Log In’.
* @param string $message Optional. Message to display in header. Default empty.
* @param WP_Error $wp_error Optional. The error to pass. Default empty.
*/
function login_header( $title = ‘Log In’, $message = ”, $wp_error = ” ) {
global $error, $interim_login, $action;
// Don’t index any of these forms
add_action( ‘login_head’, ‘wp_no_robots’ );
add_action( ‘login_head’, ‘wp_login_viewport_meta’ );
if ( empty($wp_error) )
$wp_error = new WP_Error();
// Shake it!
$shake_error_codes = array( ’empty_password’, ’empty_email’, ‘invalid_email’, ‘invalidcombo’, ’empty_username’, ‘invalid_username’, ‘incorrect_password’ );
/**
* Filters the error codes array for shaking the login form.
*
* @since 3.0.0
*
* @param array $shake_error_codes Error codes that shake the login form.
*/
$shake_error_codes = apply_filters( ‘shake_error_codes’, $shake_error_codes );
if ( $shake_error_codes && $wp_error->get_error_code() && in_array( $wp_error->get_error_code(), $shake_error_codes ) )
add_action( ‘login_head’, ‘wp_shake_js’, 12 );
$separator = is_rtl() ? ‘ › ‘ : ‘ ‹ ‘;
?>
>
site_name;
} else {
$login_header_url = __( ‘https://wordpress.org/’ );
$login_header_title = __( ‘Powered by WordPress’ );
}
/**
* Filters link URL of the header logo above login form.
*
* @since 2.1.0
*
* @param string $login_header_url Login header logo URL.
*/
$login_header_url = apply_filters( ‘login_headerurl’, $login_header_url );
/**
* Filters the title attribute of the header logo above login form.
*
* @since 2.1.0
*
* @param string $login_header_title Login header logo title attribute.
*/
$login_header_title = apply_filters( ‘login_headertitle’, $login_header_title );
$classes = array( ‘login-action-‘ . $action, ‘wp-core-ui’ );
if ( is_rtl() )
$classes[] = ‘rtl’;
if ( $interim_login ) {
$classes[] = ‘interim-login’;
?>
add(‘error’, $error);
unset($error);
}
if ( $wp_error->get_error_code() ) {
$errors = ”;
$messages = ”;
foreach ( $wp_error->get_error_codes() as $code ) {
$severity = $wp_error->get_error_data( $code );
foreach ( $wp_error->get_error_messages( $code ) as $error_message ) {
if ( ‘message’ == $severity )
$messages .= ‘ ‘ . $error_message . “
\n”;
else
$errors .= ‘ ‘ . $error_message . “
\n”;
}
}
if ( ! empty( $errors ) ) {
/**
* Filters the error messages displayed above the login form.
*
* @since 2.1.0
*
* @param string $errors Login error message.
*/
echo ‘
‘ . apply_filters( ‘login_errors’, $errors ) . “
\n”;
}
if ( ! empty( $messages ) ) {
/**
* Filters instructional messages displayed above the login form.
*
* @since 2.5.0
*
* @param string $messages Login messages.
*/
echo ‘
\n”;
}
}
} // End of login_header()
/**
* Outputs the footer for the login page.
*
* @param string $input_id Which input to auto-focus
*/
function login_footer($input_id = ”) {
global $interim_login;
// Don’t allow interim logins to navigate away from the page.
if ( ! $interim_login ): ?>
try{document.getElementById('').focus();}catch(e){}
if(typeof wpOnload=='function')wpOnload();
add(’empty_username’, __(‘ERROR: Enter a username or email address.’));
} elseif ( strpos( $_POST[‘user_login’], ‘@’ ) ) {
$user_data = get_user_by( ’email’, trim( wp_unslash( $_POST[‘user_login’] ) ) );
if ( empty( $user_data ) )
$errors->add(‘invalid_email’, __(‘ERROR: There is no user registered with that email address.’));
} else {
$login = trim($_POST[‘user_login’]);
$user_data = get_user_by(‘login’, $login);
}
/**
* Fires before errors are returned from a password reset request.
*
* @since 2.1.0
* @since 4.4.0 Added the `$errors` parameter.
*
* @param WP_Error $errors A WP_Error object containing any errors generated
* by using invalid credentials.
*/
do_action( ‘lostpassword_post’, $errors );
if ( $errors->get_error_code() )
return $errors;
if ( !$user_data ) {
$errors->add(‘invalidcombo’, __(‘ERROR: Invalid username or email.’));
return $errors;
}
// Redefining user_login ensures we return the right case in the email.
$user_login = $user_data->user_login;
$user_email = $user_data->user_email;
$key = get_password_reset_key( $user_data );
if ( is_wp_error( $key ) ) {
return $key;
}
$message = __(‘Someone has requested a password reset for the following account:’) . “\r\n\r\n”;
$message .= network_home_url( ‘/’ ) . “\r\n\r\n”;
$message .= sprintf(__(‘Username: %s’), $user_login) . “\r\n\r\n”;
$message .= __(‘If this was a mistake, just ignore this email and nothing will happen.’) . “\r\n\r\n”;
$message .= __(‘To reset your password, visit the following address:’) . “\r\n\r\n”;
$message .= ‘<' . network_site_url("wp-login.php?action=rp&key=$key&login=" . rawurlencode($user_login), 'login') . ">\r\n”;
if ( is_multisite() ) {
$blogname = get_network()->site_name;
} else {
/*
* The blogname option is escaped with esc_html on the way into the database
* in sanitize_option we want to reverse this for the plain text arena of emails.
*/
$blogname = wp_specialchars_decode(get_option(‘blogname’), ENT_QUOTES);
}
/* translators: Password reset email subject. 1: Site name */
$title = sprintf( __(‘[%s] Password Reset’), $blogname );
/**
* Filters the subject of the password reset email.
*
* @since 2.8.0
* @since 4.4.0 Added the `$user_login` and `$user_data` parameters.
*
* @param string $title Default email title.
* @param string $user_login The username for the user.
* @param WP_User $user_data WP_User object.
*/
$title = apply_filters( ‘retrieve_password_title’, $title, $user_login, $user_data );
/**
* Filters the message body of the password reset mail.
*
* @since 2.8.0
* @since 4.1.0 Added `$user_login` and `$user_data` parameters.
*
* @param string $message Default mail message.
* @param string $key The activation key.
* @param string $user_login The username for the user.
* @param WP_User $user_data WP_User object.
*/
$message = apply_filters( ‘retrieve_password_message’, $message, $key, $user_login, $user_data );
if ( $message && !wp_mail( $user_email, wp_specialchars_decode( $title ), $message ) )
wp_die( __(‘The email could not be sent.’) . “
\n” . __(‘Possible reason: your host may have disabled the mail() function.’) );
return true;
}
//
// Main
//
$action = isset($_REQUEST[‘action’]) ? $_REQUEST[‘action’] : ‘login’;
$errors = new WP_Error();
if ( isset($_GET[‘key’]) )
$action = ‘resetpass’;
// validate action so as to default to the login screen
if ( !in_array( $action, array( ‘postpass’, ‘logout’, ‘lostpassword’, ‘retrievepassword’, ‘resetpass’, ‘rp’, ‘register’, ‘login’ ), true ) && false === has_filter( ‘login_form_’ . $action ) )
$action = ‘login’;
nocache_headers();
header(‘Content-Type: ‘.get_bloginfo(‘html_type’).’; charset=’.get_bloginfo(‘charset’));
if ( defined( ‘RELOCATE’ ) && RELOCATE ) { // Move flag is set
if ( isset( $_SERVER[‘PATH_INFO’] ) && ($_SERVER[‘PATH_INFO’] != $_SERVER[‘PHP_SELF’]) )
$_SERVER[‘PHP_SELF’] = str_replace( $_SERVER[‘PATH_INFO’], ”, $_SERVER[‘PHP_SELF’] );
$url = dirname( set_url_scheme( ‘http://’ . $_SERVER[‘HTTP_HOST’] . $_SERVER[‘PHP_SELF’] ) );
if ( $url != get_option( ‘siteurl’ ) )
update_option( ‘siteurl’, $url );
}
//Set a cookie now to see if they are supported by the browser.
$secure = ( ‘https’ === parse_url( wp_login_url(), PHP_URL_SCHEME ) );
setcookie( TEST_COOKIE, ‘WP Cookie check’, 0, COOKIEPATH, COOKIE_DOMAIN, $secure );
if ( SITECOOKIEPATH != COOKIEPATH )
setcookie( TEST_COOKIE, ‘WP Cookie check’, 0, SITECOOKIEPATH, COOKIE_DOMAIN, $secure );
/**
* Fires when the login form is initialized.
*
* @since 3.2.0
*/
do_action( ‘login_init’ );
/**
* Fires before a specified login form action.
*
* The dynamic portion of the hook name, `$action`, refers to the action
* that brought the visitor to the login form. Actions include ‘postpass’,
* ‘logout’, ‘lostpassword’, etc.
*
* @since 2.8.0
*/
do_action( “login_form_{$action}” );
$http_post = (‘POST’ == $_SERVER[‘REQUEST_METHOD’]);
$interim_login = isset($_REQUEST[‘interim-login’]);
switch ($action) {
case ‘postpass’ :
if ( ! array_key_exists( ‘post_password’, $_POST ) ) {
wp_safe_redirect( wp_get_referer() );
exit();
}
$hasher = new PasswordHash( 8, true );
/**
* Filters the life span of the post password cookie.
*
* By default, the cookie expires 10 days from creation. To turn this
* into a session cookie, return 0.
*
* @since 3.7.0
*
* @param int $expires The expiry time, as passed to setcookie().
*/
$expire = apply_filters( ‘post_password_expires’, time() + 10 * DAY_IN_SECONDS );
$referer = wp_get_referer();
if ( $referer ) {
$secure = ( ‘https’ === parse_url( $referer, PHP_URL_SCHEME ) );
} else {
$secure = false;
}
setcookie( ‘wp-postpass_’ . COOKIEHASH, $hasher->HashPassword( wp_unslash( $_POST[‘post_password’] ) ), $expire, COOKIEPATH, COOKIE_DOMAIN, $secure );
wp_safe_redirect( wp_get_referer() );
exit();
case ‘logout’ :
check_admin_referer(‘log-out’);
$user = wp_get_current_user();
wp_logout();
if ( ! empty( $_REQUEST[‘redirect_to’] ) ) {
$redirect_to = $requested_redirect_to = $_REQUEST[‘redirect_to’];
} else {
$redirect_to = ‘wp-login.php?loggedout=true’;
$requested_redirect_to = ”;
}
/**
* Filters the log out redirect URL.
*
* @since 4.2.0
*
* @param string $redirect_to The redirect destination URL.
* @param string $requested_redirect_to The requested redirect destination URL passed as a parameter.
* @param WP_User $user The WP_User object for the user that’s logging out.
*/
$redirect_to = apply_filters( ‘logout_redirect’, $redirect_to, $requested_redirect_to, $user );
wp_safe_redirect( $redirect_to );
exit();
case ‘lostpassword’ :
case ‘retrievepassword’ :
if ( $http_post ) {
$errors = retrieve_password();
if ( !is_wp_error($errors) ) {
$redirect_to = !empty( $_REQUEST[‘redirect_to’] ) ? $_REQUEST[‘redirect_to’] : ‘wp-login.php?checkemail=confirm’;
wp_safe_redirect( $redirect_to );
exit();
}
}
if ( isset( $_GET[‘error’] ) ) {
if ( ‘invalidkey’ == $_GET[‘error’] ) {
$errors->add( ‘invalidkey’, __( ‘Your password reset link appears to be invalid. Please request a new link below.’ ) );
} elseif ( ‘expiredkey’ == $_GET[‘error’] ) {
$errors->add( ‘expiredkey’, __( ‘Your password reset link has expired. Please request a new link below.’ ) );
}
}
$lostpassword_redirect = ! empty( $_REQUEST[‘redirect_to’] ) ? $_REQUEST[‘redirect_to’] : ”;
/**
* Filters the URL redirected to after submitting the lostpassword/retrievepassword form.
*
* @since 3.0.0
*
* @param string $lostpassword_redirect The redirect destination URL.
*/
$redirect_to = apply_filters( ‘lostpassword_redirect’, $lostpassword_redirect );
/**
* Fires before the lost password form.
*
* @since 1.5.1
*/
do_action( ‘lost_password’ );
login_header(__(‘Lost Password’), ‘
‘, $errors);
$user_login = isset($_POST[‘user_login’]) ? wp_unslash($_POST[‘user_login’]) : ”;
?>
$errors = ”;
$messages = ”;
foreach ( $wp_error->get_error_codes() as $code ) {
$severity = $wp_error->get_error_data( $code );
foreach ( $wp_error->get_error_messages( $code ) as $error_message ) {
if ( ‘message’ == $severity )
$messages .= ‘ ‘ . $error_message . “
\n”;
else
$errors .= ‘ ‘ . $error_message . “
\n”;
}
}
if ( ! empty( $errors ) ) {
/**
* Filters the error messages displayed above the login form.
*
* @since 2.1.0
*
* @param string $errors Login error message.
*/
echo ‘
}
if ( ! empty( $messages ) ) {
/**
* Filters instructional messages displayed above the login form.
*
* @since 2.5.0
*
* @param string $messages Login messages.
*/
echo ‘
}
}
} // End of login_header()
* Outputs the footer for the login page.
*
* @param string $input_id Which input to auto-focus
*/
function login_footer($input_id = ”) {
global $interim_login;
if ( ! $interim_login ): ?>
add(’empty_username’, __(‘ERROR: Enter a username or email address.’));
} elseif ( strpos( $_POST[‘user_login’], ‘@’ ) ) {
$user_data = get_user_by( ’email’, trim( wp_unslash( $_POST[‘user_login’] ) ) );
if ( empty( $user_data ) )
$errors->add(‘invalid_email’, __(‘ERROR: There is no user registered with that email address.’));
} else {
$login = trim($_POST[‘user_login’]);
$user_data = get_user_by(‘login’, $login);
}
* Fires before errors are returned from a password reset request.
*
* @since 2.1.0
* @since 4.4.0 Added the `$errors` parameter.
*
* @param WP_Error $errors A WP_Error object containing any errors generated
* by using invalid credentials.
*/
do_action( ‘lostpassword_post’, $errors );
return $errors;
$errors->add(‘invalidcombo’, __(‘ERROR: Invalid username or email.’));
return $errors;
}
$user_login = $user_data->user_login;
$user_email = $user_data->user_email;
$key = get_password_reset_key( $user_data );
return $key;
}
$message .= network_home_url( ‘/’ ) . “\r\n\r\n”;
$message .= sprintf(__(‘Username: %s’), $user_login) . “\r\n\r\n”;
$message .= __(‘If this was a mistake, just ignore this email and nothing will happen.’) . “\r\n\r\n”;
$message .= __(‘To reset your password, visit the following address:’) . “\r\n\r\n”;
$message .= ‘<' . network_site_url("wp-login.php?action=rp&key=$key&login=" . rawurlencode($user_login), 'login') . ">\r\n”;
$blogname = get_network()->site_name;
} else {
/*
* The blogname option is escaped with esc_html on the way into the database
* in sanitize_option we want to reverse this for the plain text arena of emails.
*/
$blogname = wp_specialchars_decode(get_option(‘blogname’), ENT_QUOTES);
}
$title = sprintf( __(‘[%s] Password Reset’), $blogname );
* Filters the subject of the password reset email.
*
* @since 2.8.0
* @since 4.4.0 Added the `$user_login` and `$user_data` parameters.
*
* @param string $title Default email title.
* @param string $user_login The username for the user.
* @param WP_User $user_data WP_User object.
*/
$title = apply_filters( ‘retrieve_password_title’, $title, $user_login, $user_data );
* Filters the message body of the password reset mail.
*
* @since 2.8.0
* @since 4.1.0 Added `$user_login` and `$user_data` parameters.
*
* @param string $message Default mail message.
* @param string $key The activation key.
* @param string $user_login The username for the user.
* @param WP_User $user_data WP_User object.
*/
$message = apply_filters( ‘retrieve_password_message’, $message, $key, $user_login, $user_data );
wp_die( __(‘The email could not be sent.’) . “
\n” . __(‘Possible reason: your host may have disabled the mail() function.’) );
}
// Main
//
$errors = new WP_Error();
$action = ‘resetpass’;
if ( !in_array( $action, array( ‘postpass’, ‘logout’, ‘lostpassword’, ‘retrievepassword’, ‘resetpass’, ‘rp’, ‘register’, ‘login’ ), true ) && false === has_filter( ‘login_form_’ . $action ) )
$action = ‘login’;
if ( isset( $_SERVER[‘PATH_INFO’] ) && ($_SERVER[‘PATH_INFO’] != $_SERVER[‘PHP_SELF’]) )
$_SERVER[‘PHP_SELF’] = str_replace( $_SERVER[‘PATH_INFO’], ”, $_SERVER[‘PHP_SELF’] );
if ( $url != get_option( ‘siteurl’ ) )
update_option( ‘siteurl’, $url );
}
$secure = ( ‘https’ === parse_url( wp_login_url(), PHP_URL_SCHEME ) );
setcookie( TEST_COOKIE, ‘WP Cookie check’, 0, COOKIEPATH, COOKIE_DOMAIN, $secure );
if ( SITECOOKIEPATH != COOKIEPATH )
setcookie( TEST_COOKIE, ‘WP Cookie check’, 0, SITECOOKIEPATH, COOKIE_DOMAIN, $secure );
* Fires when the login form is initialized.
*
* @since 3.2.0
*/
do_action( ‘login_init’ );
/**
* Fires before a specified login form action.
*
* The dynamic portion of the hook name, `$action`, refers to the action
* that brought the visitor to the login form. Actions include ‘postpass’,
* ‘logout’, ‘lostpassword’, etc.
*
* @since 2.8.0
*/
do_action( “login_form_{$action}” );
$interim_login = isset($_REQUEST[‘interim-login’]);
if ( ! array_key_exists( ‘post_password’, $_POST ) ) {
wp_safe_redirect( wp_get_referer() );
exit();
}
* Filters the life span of the post password cookie.
*
* By default, the cookie expires 10 days from creation. To turn this
* into a session cookie, return 0.
*
* @since 3.7.0
*
* @param int $expires The expiry time, as passed to setcookie().
*/
$expire = apply_filters( ‘post_password_expires’, time() + 10 * DAY_IN_SECONDS );
$referer = wp_get_referer();
if ( $referer ) {
$secure = ( ‘https’ === parse_url( $referer, PHP_URL_SCHEME ) );
} else {
$secure = false;
}
setcookie( ‘wp-postpass_’ . COOKIEHASH, $hasher->HashPassword( wp_unslash( $_POST[‘post_password’] ) ), $expire, COOKIEPATH, COOKIE_DOMAIN, $secure );
exit();
check_admin_referer(‘log-out’);
$redirect_to = $requested_redirect_to = $_REQUEST[‘redirect_to’];
} else {
$redirect_to = ‘wp-login.php?loggedout=true’;
$requested_redirect_to = ”;
}
* Filters the log out redirect URL.
*
* @since 4.2.0
*
* @param string $redirect_to The redirect destination URL.
* @param string $requested_redirect_to The requested redirect destination URL passed as a parameter.
* @param WP_User $user The WP_User object for the user that’s logging out.
*/
$redirect_to = apply_filters( ‘logout_redirect’, $redirect_to, $requested_redirect_to, $user );
wp_safe_redirect( $redirect_to );
exit();
case ‘retrievepassword’ :
$errors = retrieve_password();
if ( !is_wp_error($errors) ) {
$redirect_to = !empty( $_REQUEST[‘redirect_to’] ) ? $_REQUEST[‘redirect_to’] : ‘wp-login.php?checkemail=confirm’;
wp_safe_redirect( $redirect_to );
exit();
}
}
if ( ‘invalidkey’ == $_GET[‘error’] ) {
$errors->add( ‘invalidkey’, __( ‘Your password reset link appears to be invalid. Please request a new link below.’ ) );
} elseif ( ‘expiredkey’ == $_GET[‘error’] ) {
$errors->add( ‘expiredkey’, __( ‘Your password reset link has expired. Please request a new link below.’ ) );
}
}
/**
* Filters the URL redirected to after submitting the lostpassword/retrievepassword form.
*
* @since 3.0.0
*
* @param string $lostpassword_redirect The redirect destination URL.
*/
$redirect_to = apply_filters( ‘lostpassword_redirect’, $lostpassword_redirect );
* Fires before the lost password form.
*
* @since 1.5.1
*/
do_action( ‘lost_password’ );
%s‘, esc_url( wp_registration_url() ), __( ‘Register’ ) );
/** This filter is documented in wp-includes/general-template.php */
echo ‘ | ‘ . apply_filters( ‘register’, $registration_url );
endif;
?>
‘ . __(‘Register For This Site’) . ‘
‘, $errors);
?>