-
Notifications
You must be signed in to change notification settings - Fork 809
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
My Jetpack: Allow the "Threats detected" Notice to be closed(X) with persistence. #41728
base: trunk
Are you sure you want to change the base?
Conversation
Are you an Automattician? Please test your changes on all WordPress.com environments to help mitigate accidental explosions.
Interested in more tips and information?
|
Thank you for your PR! When contributing to Jetpack, we have a few suggestions that can help us test and review your patch:
This comment will be updated as you work on your PR and make changes. If you think that some of those checks are not needed for your PR, please explain why you think so. Thanks for cooperation 🤖 The e2e test report can be found here. Please note that it can take a few minutes after the e2e tests checks are complete for the report to be available. Follow this PR Review Process:
Still unsure? Reach out in #jetpack-developers for guidance! |
Code Coverage SummaryCoverage changed in 2 files.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
This PR allows the Protect "Threats detected" notice to be manually closed (by clicking the close(X) icon), and remain closed (until browser session expires).
Closes https://github.com/Automattic/jetpack-roadmap/issues/2297
Proposed changes:
onCloseClick
event handler. Set a session cookie on close click & remove the Notice.Other information:
Jetpack product discussion
Part of overall task: https://github.com/Automattic/jetpack-roadmap/issues/2050
Does this pull request change what data or activity we track or use?
No
Testing instructions:
/wp-admin/plugins.php
), verify it was installed, and click activate link.EICAR Threat
andCreate a fake vulnerable plugin
, and click the "Update site threats" button.