Skip to content

Commit f807208

Browse files
committed
workflows/eval: avoid potential script injection attack
Although matrix.system is supposed to be generated from trusted code, we'd better follow [Github Actions good practices][1]. [1]: https://docs.github.com/en/actions/security-for-github-actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
1 parent 516819d commit f807208

1 file changed

Lines changed: 3 additions & 1 deletion

File tree

.github/workflows/eval.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,9 +85,11 @@ jobs:
8585
uses: cachix/install-nix-action@08dcb3a5e62fa31e2da3d490afc4176ef55ecd72 # v30
8686

8787
- name: Evaluate the ${{ matrix.system }} output paths for all derivation attributes
88+
env:
89+
MATRIX_SYSTEM: ${{ matrix.system }}
8890
run: |
8991
nix-build nixpkgs/ci -A eval.singleSystem \
90-
--argstr evalSystem ${{ matrix.system }} \
92+
--argstr evalSystem "$MATRIX_SYSTEM" \
9193
--arg attrpathFile ./paths/paths.json \
9294
--arg chunkSize 10000
9395
# If it uses too much memory, slightly decrease chunkSize

0 commit comments

Comments
 (0)