@@ -87,26 +87,26 @@ func TestRenderStep_EnvTaintPropagatesToRunExpressions(t *testing.T) { |
| 87 | 87 | func TestRenderStep_EnvSensitivityPropagatesToRunExpressions(t *testing.T) { |
| 88 | 88 | t.Parallel() |
| 89 | 89 | ctx := expr.Context{ |
| 90 | | - Secrets: map[string]string{"TOKEN": "hunter2"}, |
| 90 | + Secrets: map[string]string{"PRIVATE": "from-context"}, |
| 91 | 91 | Untrusted: expr.DefaultUntrusted(), |
| 92 | 92 | } |
| 93 | 93 | got, err := RenderStep(StepInput{ |
| 94 | 94 | Context: ctx, |
| 95 | 95 | JobEnv: map[string]string{ |
| 96 | | - "TOKEN": "${{ secrets.TOKEN }}", |
| 96 | + "PRIVATE": "${{ secrets.PRIVATE }}", |
| 97 | 97 | }, |
| 98 | | - Run: "echo ${{ env.TOKEN }}", |
| 98 | + Run: "echo ${{ env.PRIVATE }}", |
| 99 | 99 | }) |
| 100 | 100 | if err != nil { |
| 101 | 101 | t.Fatalf("RenderStep: %v", err) |
| 102 | 102 | } |
| 103 | | - if got.Env["TOKEN"] != "hunter2" || !got.EnvSensitive["TOKEN"] { |
| 103 | + if got.Env["PRIVATE"] != "from-context" || !got.EnvSensitive["PRIVATE"] { |
| 104 | 104 | t.Fatalf("env/sensitive: env=%#v sensitive=%#v", got.Env, got.EnvSensitive) |
| 105 | 105 | } |
| 106 | 106 | if got.Run != "echo ${SHITHUB_INPUT_0}" { |
| 107 | 107 | t.Fatalf("run: %q", got.Run) |
| 108 | 108 | } |
| 109 | | - if got.Env["SHITHUB_INPUT_0"] != "hunter2" { |
| 109 | + if got.Env["SHITHUB_INPUT_0"] != "from-context" { |
| 110 | 110 | t.Fatalf("input binding: %#v", got.Env) |
| 111 | 111 | } |
| 112 | 112 | } |
@@ -163,23 +163,23 @@ func TestRenderStep_StepEnvOverrideClearsJobEnvTaint(t *testing.T) { |
| 163 | 163 | func TestRenderStep_StepEnvOverrideClearsJobEnvSensitivity(t *testing.T) { |
| 164 | 164 | t.Parallel() |
| 165 | 165 | ctx := expr.Context{ |
| 166 | | - Secrets: map[string]string{"TOKEN": "hunter2"}, |
| 166 | + Secrets: map[string]string{"PRIVATE": "from-context"}, |
| 167 | 167 | Untrusted: expr.DefaultUntrusted(), |
| 168 | 168 | } |
| 169 | 169 | got, err := RenderStep(StepInput{ |
| 170 | 170 | Context: ctx, |
| 171 | 171 | JobEnv: map[string]string{ |
| 172 | | - "TOKEN": "${{ secrets.TOKEN }}", |
| 172 | + "PRIVATE": "${{ secrets.PRIVATE }}", |
| 173 | 173 | }, |
| 174 | 174 | StepEnv: map[string]string{ |
| 175 | | - "TOKEN": "trusted", |
| 175 | + "PRIVATE": "trusted", |
| 176 | 176 | }, |
| 177 | | - Run: "echo ${{ env.TOKEN }}", |
| 177 | + Run: "echo ${{ env.PRIVATE }}", |
| 178 | 178 | }) |
| 179 | 179 | if err != nil { |
| 180 | 180 | t.Fatalf("RenderStep: %v", err) |
| 181 | 181 | } |
| 182 | | - if got.EnvSensitive["TOKEN"] { |
| 182 | + if got.EnvSensitive["PRIVATE"] { |
| 183 | 183 | t.Fatalf("step override should clear sensitivity: %#v", got.EnvSensitive) |
| 184 | 184 | } |
| 185 | 185 | if got.Run != "echo trusted" { |