mysql:wikiadmin@db1094 [centralauth]> select gu_name from globaluser where gu_name>'d' order by gu_name limit 10; ------------------ | gu_name | ------------------ | damien710 | | daniel.graziotin | | debel | | delight | | demi 84 | | deweerdt | | diba | | djam | | dlc | | dmgerman | ------------------ 10 rows in set (0.00 sec)
Description
Description
Related Objects
Related Objects
Event Timeline
Comment Actions
mysql:wikiadmin@db1094 [centralauth]> select gu_name, gu_registration from globaluser where gu_name>'d' order by gu_name limit 10; ------------------ ----------------- | gu_name | gu_registration | ------------------ ----------------- | damien710 | 20130411174858 | | daniel.graziotin | 20130411204127 | | debel | 20130411211940 | | delight | 20130411211940 | | demi 84 | 20130411211941 | | deweerdt | 20130411174858 | | diba | 20130411211941 | | djam | 20130411174858 | | dlc | 20130411211941 | | dmgerman | 20130411203256 | ------------------ ----------------- 10 rows in set (0.00 sec)
We should write a variant of checkUsernames.php in core to query against globaluser to get a list of invalid accounts. We should also keep an eye on the gu_registration column to see if any of these were recent account creations, or if this was a bug from a long time ago. These users likely haven't been able to login in years.
Comment Actions
In total:
mysql:[email protected] [centralauth]> select count(*) from globaluser where gu_name rlike '^[[:lower:]]'; ---------- | count(*) | ---------- | 323 | ---------- 1 row in set (25.49 sec)
Comment Actions
There's also a task I opened months ago reporting a bunch of invalid
usernames like those ones and others with forbidden characters. However no
action was taken there.
Comment Actions
It was T160296 and given the roughly same numbers, I’d say this task is a
duplicate of the one I am linking.
This comment was removed by MarcoAurelio.