-
Notifications
You must be signed in to change notification settings - Fork 809
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Account Protection: Fix Brute force protection account recovery conflict #41739
base: add/account-protection
Are you sure you want to change the base?
Account Protection: Fix Brute force protection account recovery conflict #41739
Conversation
Are you an Automattician? Please test your changes on all WordPress.com environments to help mitigate accidental explosions.
Interested in more tips and information?
|
Thank you for your PR! When contributing to Jetpack, we have a few suggestions that can help us test and review your patch:
This comment will be updated as you work on your PR and make changes. If you think that some of those checks are not needed for your PR, please explain why you think so. Thanks for cooperation 🤖 The e2e test report can be found here. Please note that it can take a few minutes after the e2e tests checks are complete for the report to be available. 🔴 Action required: Please add missing changelog entries for the following projects: Use the Jetpack CLI tool to generate changelog entries by running the following command: Follow this PR Review Process:
Still unsure? Reach out in #jetpack-developers for guidance! |
Code Coverage SummaryCoverage changed in 6 files. Only the first 5 are listed here.
7 files are newly checked for coverage. Only the first 5 are listed here.
Full summary · PHP report · JS report Add label
I don't care about code coverage for this PR
|
Fixes #
When the Brute force module reaches a point where a user is blocked and locked out, the recovery process hooks into the same
wp_authenticate_user
flow that Account Protection currently does for validation the users password. When validation fails aWP_Error
object is returned and the BFP method then picks it up and attempts to runcheck_valid_blocked_user
which doesn't currently expect that value and immediately errors out.Note that a separate issue has been defined separate from this project to address the bug.
Proposed changes:
Other information:
Jetpack product discussion
Does this pull request change what data or activity we track or use?
Testing instructions:
validate_jetpack_protect_recovery
checkThe recovery token is not valid for this user.
errorPassword validation failed.