分类: PHP

  • 【WordPress】function wp_validate_auth_cookie( cookie = '',scheme = ” )

    function wp_validate_auth_cookie( cookie = '',scheme = '' ) {
    		cookie_elements = wp_parse_auth_cookie(cookie, scheme ); 		if ( !cookie_elements ) {
    			/**
    			 * Fires if an authentication cookie is malformed.
    			 *
    			 * @since 2.7.0
    			 *
    			 * @param string cookie Malformed auth cookie. 			 * @param stringscheme Authentication scheme. Values include 'auth', 'secure_auth',
    			 *                       or 'logged_in'.
    			 */
    			do_action( 'auth_cookie_malformed', cookie,scheme );
    			return false;
    		}
    
    		scheme     =cookie_elements['scheme'];
    		username   =cookie_elements['username'];
    		hmac       =cookie_elements['hmac'];
    		token      =cookie_elements['token'];
    		expired    =cookie_elements['expiration'];
    		expiration =cookie_elements['expiration'];
    
    		// Allow a grace period for POST and Ajax requests.
    		if ( wp_doing_ajax() || 'POST' === _SERVER['REQUEST_METHOD'] ) {expired += HOUR_IN_SECONDS;
    		}
    
    		// Quick check to see if an honest cookie has expired.
    		if ( expired < time() ) { 			/** 			 * Fires once an authentication cookie has expired. 			 * 			 * @since 2.7.0 			 * 			 * @param string[]cookie_elements {
    			 *     Authentication cookie components. None of the components should be assumed
    			 *     to be valid as they come directly from a client-provided cookie value.
    			 *
    			 *     @type string username   User's username. 			 *     @type stringexpiration The time the cookie expires as a UNIX timestamp.
    			 *     @type string token      User's session token used. 			 *     @type stringhmac       The security hash for the cookie.
    			 *     @type string scheme     The cookie scheme to use. 			 * } 			 */ 			do_action( 'auth_cookie_expired',cookie_elements );
    			return false;
    		}
    
    		user = get_user_by( 'login',username );
    		if ( ! user ) { 			/** 			 * Fires if a bad username is entered in the user authentication process. 			 * 			 * @since 2.7.0 			 * 			 * @param string[]cookie_elements {
    			 *     Authentication cookie components. None of the components should be assumed
    			 *     to be valid as they come directly from a client-provided cookie value.
    			 *
    			 *     @type string username   User's username. 			 *     @type stringexpiration The time the cookie expires as a UNIX timestamp.
    			 *     @type string token      User's session token used. 			 *     @type stringhmac       The security hash for the cookie.
    			 *     @type string scheme     The cookie scheme to use. 			 * } 			 */ 			do_action( 'auth_cookie_bad_username',cookie_elements );
    			return false;
    		}
    
    		pass_frag = substr(user->user_pass, 8, 4 );
    
    		key = wp_hash(username . '|' . pass_frag . '|' .expiration . '|' . token,scheme );
    
    		// If ext/hash is not present, compat.php's hash_hmac() does not support sha256.
    		algo = function_exists( 'hash' ) ? 'sha256' : 'sha1';hash = hash_hmac( algo,username . '|' . expiration . '|' .token, key );  		if ( ! hash_equals(hash, hmac ) ) { 			/** 			 * Fires if a bad authentication cookie hash is encountered. 			 * 			 * @since 2.7.0 			 * 			 * @param string[]cookie_elements {
    			 *     Authentication cookie components. None of the components should be assumed
    			 *     to be valid as they come directly from a client-provided cookie value.
    			 *
    			 *     @type string username   User's username. 			 *     @type stringexpiration The time the cookie expires as a UNIX timestamp.
    			 *     @type string token      User's session token used. 			 *     @type stringhmac       The security hash for the cookie.
    			 *     @type string scheme     The cookie scheme to use. 			 * } 			 */ 			do_action( 'auth_cookie_bad_hash',cookie_elements );
    			return false;
    		}
    
    		manager = WP_Session_Tokens::get_instance(user->ID );
    		if ( ! manager->verify(token ) ) {
    			/**
    			 * Fires if a bad session token is encountered.
    			 *
    			 * @since 4.0.0
    			 *
    			 * @param string[] cookie_elements { 			 *     Authentication cookie components. None of the components should be assumed 			 *     to be valid as they come directly from a client-provided cookie value. 			 * 			 *     @type stringusername   User's username.
    			 *     @type string expiration The time the cookie expires as a UNIX timestamp. 			 *     @type stringtoken      User's session token used.
    			 *     @type string hmac       The security hash for the cookie. 			 *     @type stringscheme     The cookie scheme to use.
    			 * }
    			 */
    			do_action( 'auth_cookie_bad_session_token', cookie_elements ); 			return false; 		}  		// Ajax/POST grace period set above. 		if (expiration < time() ) {
    			GLOBALS['login_grace_period'] = 1; 		}  		/** 		 * Fires once an authentication cookie has been validated. 		 * 		 * @since 2.7.0 		 * 		 * @param string[]cookie_elements {
    		 *     Authentication cookie components.
    		 *
    		 *     @type string username   User's username. 		 *     @type stringexpiration The time the cookie expires as a UNIX timestamp.
    		 *     @type string token      User's session token used. 		 *     @type stringhmac       The security hash for the cookie.
    		 *     @type string scheme     The cookie scheme to use. 		 * } 		 * @param WP_Useruser            User object.
    		 */
    		do_action( 'auth_cookie_valid', cookie_elements,user );
    
    		return user->ID; 	}</code></pre> <!-- /wp:code -->  <!-- wp:separator --> <hr class="wp-block-separator has-alpha-channel-opacity"/> <!-- /wp:separator -->  <!-- wp:paragraph --> 这个PHP函数 <code>wp_validate_auth_cookie()</code> 是WordPress的身份验证系统的一部分。它用于验证用户登录时每个请求发送的身份验证cookie。该函数有两个可选参数:<code>cookie$scheme

    函数首先使用 wp_parse_auth_cookie() 函数解析身份验证cookie。如果cookie格式错误或不存在,函数会触发 auth_cookie_malformed 动作并返回 false

    接下来,它从解析的cookie中提取各种元素,包括方案、用户名、HMAC(用于数据完整性的一种加密哈希)、令牌和过期时间。

    然后,函数检查请求是否为AJAX或POST请求。如果是,它会将cookie的过期时间延长一小时。这是一个宽限期,用于允许长时间运行的操作。

    接着,函数检查cookie是否已过期。如果已过期,它会触发 auth_cookie_expired 动作并返回 false

    接下来,它检索与cookie中的用户名关联的用户。如果不存在这样的用户,它会触发 auth_cookie_bad_username 动作并返回 false

    然后,函数通过哈希cookie和用户密码的各种元素来生成一个密钥。它使用这个密钥来生成用户名、过期时间和令牌的哈希。如果生成的哈希与cookie中的HMAC不匹配,它会触发 auth_cookie_bad_hash 动作并返回 false

    接下来,它使用 WP_Session_Tokens::get_instance() 方法验证会话令牌。如果令牌无效,它会触发 auth_cookie_bad_session_token 动作并返回 false

    如果此时cookie的过期时间已过(只有在请求是AJAX或POST请求并且已应用宽限期的情况下才可能发生),它会将全局 login_grace_period 变量设置为 1

    最后,如果所有检查都通过,函数会触发 auth_cookie_valid 动作并返回用户的ID,表示身份验证cookie有效。

  • 【WordPress】wp-load.php

    <?php
    /**
     * Bootstrap file for setting the ABSPATH constant
     * and loading the wp-config.php file. The wp-config.php
     * file will then load the wp-settings.php file, which
     * will then set up the WordPress environment.
     *
     * If the wp-config.php file is not found then an error
     * will be displayed asking the visitor to set up the
     * wp-config.php file.
     *
     * Will also search for wp-config.php in WordPress' parent
     * directory to allow the WordPress directory to remain
     * untouched.
     *
     * @package WordPress
     */
    
    /** Define ABSPATH as this file's directory */
    if ( ! defined( 'ABSPATH' ) ) {
    	define( 'ABSPATH', __DIR__ . '/' );
    }
    
    /*
     * The error_reporting() function can be disabled in php.ini. On systems where that is the case,
     * it's best to add a dummy function to the wp-config.php file, but as this call to the function
     * is run prior to wp-config.php loading, it is wrapped in a function_exists() check.
     */
    if ( function_exists( 'error_reporting' ) ) {
    	/*
    	 * Initialize error reporting to a known set of levels.
    	 *
    	 * This will be adapted in wp_debug_mode() located in wp-includes/load.php based on WP_DEBUG.
    	 * @see https://www.php.net/manual/en/errorfunc.constants.php List of known error levels.
    	 */
    	error_reporting( E_CORE_ERROR | E_CORE_WARNING | E_COMPILE_ERROR | E_ERROR | E_WARNING | E_PARSE | E_USER_ERROR | E_USER_WARNING | E_RECOVERABLE_ERROR );
    }
    
    /*
     * If wp-config.php exists in the WordPress root, or if it exists in the root and wp-settings.php
     * doesn't, load wp-config.php. The secondary check for wp-settings.php has the added benefit
     * of avoiding cases where the current directory is a nested installation, e.g. / is WordPress(a)
     * and /blog/ is WordPress(b).
     *
     * If neither set of conditions is true, initiate loading the setup process.
     */
    if ( file_exists( ABSPATH . 'wp-config.php' ) ) {
    
    	/** The config file resides in ABSPATH */
    	require_once ABSPATH . 'wp-config.php';
    
    } elseif ( @file_exists( dirname( ABSPATH ) . '/wp-config.php' ) && ! @file_exists( dirname( ABSPATH ) . '/wp-settings.php' ) ) {
    
    	/** The config file resides one level above ABSPATH but is not part of another installation */
    	require_once dirname( ABSPATH ) . '/wp-config.php';
    
    } else {
    
    	// A config file doesn't exist.
    
    	define( 'WPINC', 'wp-includes' );
    	require_once ABSPATH . WPINC . '/version.php';
    	require_once ABSPATH . WPINC . '/compat.php';
    	require_once ABSPATH . WPINC . '/load.php';
    
    	// Check for the required PHP version and for the MySQL extension or a database drop-in.
    	wp_check_php_mysql_versions();
    
    	// Standardize _SERVER variables across setups. 	wp_fix_server_vars();  	define( 'WP_CONTENT_DIR', ABSPATH . 'wp-content' ); 	require_once ABSPATH . WPINC . '/functions.php';path = wp_guess_url() . '/wp-admin/setup-config.php';
    
    	// Redirect to setup-config.php.
    	if ( ! str_contains( _SERVER['REQUEST_URI'], 'setup-config' ) ) { 		header( 'Location: ' .path );
    		exit;
    	}
    
    	wp_load_translations_early();
    
    	// Die with an error message.
    	die = '' . sprintf( 		/* translators: %s: wp-config.php */ 		__( "There doesn't seem to be a %s file. It is needed before the installation can continue." ), 		'<code>wp-config.php</code>' 	) . '';die .= '<p>' . sprintf(
    		/* translators: 1: Documentation URL, 2: wp-config.php */
    		__( 'Need more help? <a href="%1s">Read the support article on %2s</a>.' ),
    		__( 'https://wordpress.org/documentation/article/editing-wp-config-php/' ),
    		'<code>wp-config.php</code>'
    	) . '</p>';
    	die .= '' . sprintf( 		/* translators: %s: wp-config.php */ 		__( "You can create a %s file through a web interface, but this doesn't work for all server setups. The safest way is to manually create the file." ), 		'<code>wp-config.php</code>' 	) . '';die .= '<p><a href="' . path . '" class="button button-large">' . __( 'Create a Configuration File' ) . '</a>';  	wp_die(die, __( 'WordPress &rsaquo; Error' ) );
    }
    

    这段PHP脚本是WordPress应用的一部分,它的主要目的是加载一些必要的文件,并进行一些基本的环境检查。

    首先,它加载了一些核心的WordPress文件,包括版本信息(version.php)、兼容性函数(compat.php)和加载函数(load.php)。

    然后,它调用wp_check_php_mysql_versions()函数来检查当前环境的PHP版本以及是否安装了MySQL扩展或者数据库插件。

    接着,它调用wp_fix_server_vars()函数来标准化$_SERVER变量,以确保在不同的环境下这些变量的行为是一致的。

    然后,它定义了WP_CONTENT_DIR常量,这个常量指向WordPress的内容目录,然后加载了一些基本的WordPress函数(functions.php)。

    接下来,它构造了一个指向setup-config.php的URL,并检查当前的请求URL是否包含setup-config,如果不包含,那么就会重定向到setup-config.php

    然后,它调用wp_load_translations_early()函数来加载早期的翻译。

    最后,如果wp-config.php文件不存在,它会显示一个错误信息,告诉用户需要wp-config.php文件才能继续安装,并提供了一个链接到编辑wp-config.php文件的支持文章,以及一个创建配置文件的按钮。如果用户点击这个按钮,就会被重定向到setup-config.php

    如果所有的检查都通过,那么WordPress的安装过程就可以开始了。

人生梦想 - 关注前沿的计算机技术 acejoy.com 🐾 步子哥の博客 🐾 背多分论坛 🐾 借一步网
Page Stats: PV: 183 | UV: 102
Last updated: 2025-06-28 04:28:04
沪ICP备2024052574号-1