mirror of
https://github.com/nektos/act.git
synced 2026-04-26 01:15:51 +03:00
[GH-ISSUE #2708] Support set but empty env variables #1222
Labels
No labels
area/action
area/cli
area/docs
area/image
area/runner
area/workflow
backlog
confirmed/not-planned
kind/bug
kind/discussion
kind/external
kind/feature-request
kind/question
meta/duplicate
meta/invalid
meta/need-more-info
meta/resolved
meta/wontfix
meta/workaround
needs-work
pull-request
review/not-planned
size/M
size/XL
size/XXL
stale
stale-exempt
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/act#1222
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @jklap on GitHub (Mar 24, 2025).
Original GitHub issue: https://github.com/nektos/act/issues/2708
Act version
act version: 0.2.75
Feature description
There are scenarios where we want to support sending empty vars and/or secrets into a workflow. But attempting to do this via any of the below scenarios doesn't work:
We should support the ability to pass in a var or secret via the command line or a set-but-empty env var
@jklap commented on GitHub (Apr 8, 2025):
Thanks for the feedback but I didn't ask if there was a way to pass in an empty variable, I said those specifically listed scenarios don't work.
Testing for a variable, set yet empty, etc, is not relevant here -- the issue isn't within the workflow, it is to avoid act querying the user for a variable that we know is not going to be relevant (or we know is going to be empty)-- our use of act is highly scripted for testing purposes and asking for a variable prevents us automating this.
One specific example is the use of aws-actions/configure-aws-credentials -- a user using the AWS CLI to authenticate may not need to use role-to-assume but an IAM user used as a service account often times will. To support using the GHA via act and also running as a service account in GitHub we have to set a variable for role-to-assume in with: but for act it will always be empty. We have several other scenarios similar to this but are more unique/custom.