This is an automated email from the ASF dual-hosted git repository.
sbp pushed a commit to branch sbp
in repository https://gitbox.apache.org/repos/asf/tooling-trusted-releases.git
The following commit(s) were added to refs/heads/sbp by this push:
new 9e286de6 Do not run further path checks after a file is found to be
disallowed
9e286de6 is described below
commit 9e286de66e65f59923bc994bdbe4f69de3dc9361
Author: Sean B. Palmer <[email protected]>
AuthorDate: Fri Feb 13 19:12:02 2026 +0000
Do not run further path checks after a file is found to be disallowed
---
atr/tasks/checks/paths.py | 22 ++++++++++++++++++++--
1 file changed, 20 insertions(+), 2 deletions(-)
diff --git a/atr/tasks/checks/paths.py b/atr/tasks/checks/paths.py
index 9b968b3c..299e4b25 100644
--- a/atr/tasks/checks/paths.py
+++ b/atr/tasks/checks/paths.py
@@ -205,9 +205,27 @@ async def _check_path_process_single( # noqa: C901
if relative_path.name == "KEYS":
errors.append("The KEYS file should be uploaded via the 'Keys'
section, not included in the artifact bundle")
if relative_path.name in analysis.DISALLOWED_FILENAMES:
- blockers.append(f"Disallowed file: {relative_path.name}")
+ await _record(
+ recorder_errors,
+ recorder_warnings,
+ recorder_success,
+ relative_path_str,
+ errors,
+ [f"Disallowed file: {relative_path.name}"],
+ warnings,
+ )
+ return
elif relative_path.suffix in analysis.DISALLOWED_SUFFIXES:
- blockers.append(f"Disallowed file type: {relative_path.suffix}")
+ await _record(
+ recorder_errors,
+ recorder_warnings,
+ recorder_success,
+ relative_path_str,
+ errors,
+ [f"Disallowed file type: {relative_path.suffix}"],
+ warnings,
+ )
+ return
elif any(part.startswith(".") for part in relative_path.parts):
# TODO: There is not a a policy for this
# We should enquire as to whether such a policy should be instituted
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]