fixing tests
All checks were successful
CI / Rustfmt (push) Successful in 23s
CI / Cargo Audit & Deny (push) Successful in 34s
CI / Web Blocking Checks (push) Successful in 49s
CI / Security Blocking Checks (push) Successful in 9s
CI / Clippy (push) Successful in 2m6s
CI / Web Advisory Checks (push) Successful in 24s
CI / Security Advisory Checks (push) Successful in 37s
CI / Tests (push) Successful in 7m39s
All checks were successful
CI / Rustfmt (push) Successful in 23s
CI / Cargo Audit & Deny (push) Successful in 34s
CI / Web Blocking Checks (push) Successful in 49s
CI / Security Blocking Checks (push) Successful in 9s
CI / Clippy (push) Successful in 2m6s
CI / Web Advisory Checks (push) Successful in 24s
CI / Security Advisory Checks (push) Successful in 37s
CI / Tests (push) Successful in 7m39s
This commit is contained in:
@@ -462,12 +462,12 @@ impl ProcessRuntime {
|
|||||||
_ => serde_json::to_string(value)?,
|
_ => serde_json::to_string(value)?,
|
||||||
};
|
};
|
||||||
let escaped = bash_single_quote_escape(&value_str);
|
let escaped = bash_single_quote_escape(&value_str);
|
||||||
script.push_str(&format!(
|
// Define shell variables for the inline action without exporting
|
||||||
"export PARAM_{}='{}'\n",
|
// them into the process environment. This keeps secrets available
|
||||||
key.to_uppercase(),
|
// to the current script while preventing leakage via `printenv`
|
||||||
escaped
|
// or to child processes spawned by the action.
|
||||||
));
|
script.push_str(&format!("PARAM_{}='{}'\n", key.to_uppercase(), escaped));
|
||||||
script.push_str(&format!("export {}='{}'\n", key, escaped));
|
script.push_str(&format!("{}='{}'\n", key, escaped));
|
||||||
}
|
}
|
||||||
script.push('\n');
|
script.push('\n');
|
||||||
script.push_str("# Action code\n");
|
script.push_str("# Action code\n");
|
||||||
|
|||||||
Reference in New Issue
Block a user