auth_cookie_bad_username
Fires if a bad username is entered in the user authentication process.
Использование
add_action( 'auth_cookie_bad_username', 'wp_kama_auth_cookie_bad_username_action' ); /** * Function for `auth_cookie_bad_username` action-hook. * * @param string[] $cookie_elements Authentication cookie components. None of the components should be assumed to be valid as they come directly from a client-provided cookie value. * * @return void */ function wp_kama_auth_cookie_bad_username_action( $cookie_elements ){ // action... }
- $cookie_elements(string[])
Authentication cookie components. None of the components should be assumed to be valid as they come directly from a client-provided cookie value.
-
username(строка)
User's username. -
expiration(строка)
The time the cookie expires as a UNIX timestamp. -
token(строка)
User's session token used. -
hmac(строка)
The security hash for the cookie. - scheme(строка)
The cookie scheme to use.
-
Список изменений
С версии 2.7.0 | Введена. |
Где вызывается хук
auth_cookie_bad_username
wp-includes/pluggable.php 761
do_action( 'auth_cookie_bad_username', $cookie_elements );
Где используется хук в WordPress
wp-includes/default-filters.php 325
add_action( 'auth_cookie_bad_username', 'rest_cookie_collect_status' );