@@ -10,11 +10,11 @@ import (
10
10
)
11
11
12
12
const (
13
- vaultBadge = "[Vault](https://img.shields.io/badge/-Vault-lightgrey)"
14
- jenkinsOnlyBadge = "[Jenkins only](https://img.shields.io/badge/-Jenkins%20only-yellowgreen)"
15
- secretBadge = "[Secret](https://img.shields.io/badge/-Secret-yellowgreen)"
16
- trustengineBadge = "[Trust Engine](https://img.shields.io/badge/-Trust Engine -lightblue)"
17
- deprecatedBadge = "[deprecated](https://img.shields.io/badge/-deprecated-red)"
13
+ vaultBadge = "! [Vault](https://img.shields.io/badge/-Vault-lightgrey)"
14
+ jenkinsOnlyBadge = "! [Jenkins only](https://img.shields.io/badge/-Jenkins%20only-yellowgreen)"
15
+ secretBadge = "! [Secret](https://img.shields.io/badge/-Secret-yellowgreen)"
16
+ trustengineBadge = "! [Trust Engine](https://img.shields.io/badge/-Trust%20Engine -lightblue)"
17
+ deprecatedBadge = "! [deprecated](https://img.shields.io/badge/-deprecated-red)"
18
18
)
19
19
20
20
// Replaces the Parameters placeholder with the content from the yaml
@@ -93,19 +93,19 @@ func parameterFurtherInfo(paramName string, stepData *config.StepData, execution
93
93
}
94
94
95
95
if paramName == "script" {
96
- return checkParameterInfo (fmt .Sprintf ("[!%s](#) reference to Jenkins main pipeline script" , jenkinsOnlyBadge ), true , executionEnvironment )
96
+ return checkParameterInfo (fmt .Sprintf ("%s reference to Jenkins main pipeline script" , jenkinsOnlyBadge ), true , executionEnvironment )
97
97
}
98
98
99
99
// handle non-step parameters (e.g. Jenkins-specific parameters as well as execution environment parameters)
100
100
jenkinsParams := []string {"containerCommand" , "containerName" , "containerShell" , "dockerVolumeBind" , "dockerWorkspace" , "sidecarReadyCommand" , "sidecarWorkspace" , "stashContent" }
101
101
if ! contains (stepParameterNames , paramName ) {
102
102
for _ , secret := range stepData .Spec .Inputs .Secrets {
103
103
if paramName == secret .Name && secret .Type == "jenkins" {
104
- return checkParameterInfo (fmt .Sprintf ("[!%s](#) id of credentials ([using credentials](https://www.jenkins.io/doc/book/using/using-credentials/))" , jenkinsOnlyBadge ), true , executionEnvironment )
104
+ return checkParameterInfo (fmt .Sprintf ("%s id of credentials ([using credentials](https://www.jenkins.io/doc/book/using/using-credentials/))" , jenkinsOnlyBadge ), true , executionEnvironment )
105
105
}
106
106
}
107
107
if contains (jenkinsParams , paramName ) {
108
- return checkParameterInfo (fmt .Sprintf ("[!%s](#) " , jenkinsOnlyBadge ), false , executionEnvironment )
108
+ return checkParameterInfo (fmt .Sprintf ("%s " , jenkinsOnlyBadge ), false , executionEnvironment )
109
109
}
110
110
return checkParameterInfo ("" , false , executionEnvironment )
111
111
}
@@ -115,17 +115,17 @@ func parameterFurtherInfo(paramName string, stepData *config.StepData, execution
115
115
if paramName == param .Name {
116
116
furtherInfo := ""
117
117
if param .DeprecationMessage != "" {
118
- furtherInfo += fmt .Sprintf ("! %s" , deprecatedBadge )
118
+ furtherInfo += fmt .Sprintf ("%s" , deprecatedBadge )
119
119
}
120
120
if param .Secret {
121
- secretInfo := fmt .Sprintf ("[!%s](#) pass via ENV or Jenkins credentials" , secretBadge )
121
+ secretInfo := fmt .Sprintf ("%s pass via ENV or Jenkins credentials" , secretBadge )
122
122
123
123
isVaultSecret := param .GetReference ("vaultSecret" ) != nil || param .GetReference ("vaultSecretFile" ) != nil
124
124
isTrustengineSecret := param .GetReference (config .RefTypeTrustengineSecret ) != nil
125
125
if isVaultSecret && isTrustengineSecret {
126
- secretInfo = fmt .Sprintf (" [!%s](#) [!%s](#) [!%s](/) pass via ENV, Vault, Trust Engine or Jenkins credentials" , vaultBadge , trustengineBadge , secretBadge )
126
+ secretInfo = fmt .Sprintf (" %s %s %s pass via ENV, Vault, Trust Engine or Jenkins credentials" , vaultBadge , trustengineBadge , secretBadge )
127
127
} else if isVaultSecret {
128
- secretInfo = fmt .Sprintf (" [!%s](#) [!%s](/) pass via ENV, Vault or Jenkins credentials" , vaultBadge , secretBadge )
128
+ secretInfo = fmt .Sprintf (" %s %s pass via ENV, Vault or Jenkins credentials" , vaultBadge , secretBadge )
129
129
}
130
130
131
131
for _ , res := range param .ResourceRef {
0 commit comments