fix(worker): Exclude shelter paths from archive service operations#836
fix(worker): Exclude shelter paths from archive service operations#836sentry[bot] wants to merge 1 commit intomainfrom
Conversation
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 1 potential issue.
❌ Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, enable autofix in the Cursor dashboard.
Reviewed by Cursor Bugbot for commit 029d48a. Configure here.
| if not archive_url.startswith("shelter/"): | ||
| archive_service.write_file( | ||
| archive_url, report_info.raw_report.content().getvalue() | ||
| ) |
There was a problem hiding this comment.
Shelter path fix missing from parallel rewrite_or_delete_upload function
Medium Severity
The shelter-path exclusion was only added to rewrite_or_delete_upload in processing.py, but an analogous rewrite_or_delete_upload function in ta_processor.py performs the same delete_file and write_file operations on archive URLs without any shelter-path guard. If the test analytics code path encounters a shelter URL, it will still send the misconfigured S3 request to GCS, reproducing the exact bug this PR aims to fix.
Reviewed by Cursor Bugbot for commit 029d48a. Configure here.
Codecov Report❌ Patch coverage is
📢 Thoughts on this report? Let us know! |
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #836 +/- ##
==========================================
- Coverage 92.25% 92.25% -0.01%
==========================================
Files 1307 1307
Lines 48017 48018 +1
Branches 1636 1636
==========================================
Hits 44299 44299
- Misses 3407 3408 +1
Partials 311 311
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |


Fixes WORKER-Y85. The issue was that: Minio client misconfigured, sending S3-formatted requests for
codecov-productionbucket to Google Cloud Storage, resulting inInternalError.This fix was generated by Seer in Sentry, triggered automatically. 👁️ Run ID: 13423687
Not quite right? Click here to continue debugging with Seer.
Legal Boilerplate
Look, I get it. The entity doing business as "Sentry" was incorporated in the State of Delaware in 2015 as Functional Software, Inc. In 2022 this entity acquired Codecov and as result Sentry is going to need some rights from me in order to utilize my contributions in this PR. So here's the deal: I retain all rights, title and interest in and to my contributions, and by keeping this boilerplate intact I confirm that Sentry can use, modify, copy, and redistribute my contributions, under Sentry's choice of terms.
Note
Low Risk
Small conditional change that only narrows when archive storage operations run; low risk aside from potentially leaving some
shelter/artifacts untouched if expectations were different.Overview
Prevents the worker from calling
ArchiveService.delete_fileorArchiveService.write_filefor uploads whosearchive_urlstarts withshelter/, while keeping existing behavior for other non-HTTP archive paths.This avoids rewriting or deleting Shelter-managed objects during upload processing (notably for v1 report rewrite and delete-on-success flows).
Reviewed by Cursor Bugbot for commit 029d48a. Bugbot is set up for automated code reviews on this repo. Configure here.