-
-
Notifications
You must be signed in to change notification settings - Fork 235
/
Copy pathclient.go
246 lines (203 loc) · 6.44 KB
/
client.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
package api
import (
"time"
"strings"
"github.com/spf13/viper"
"github.com/zalando/go-keyring"
"github.com/ankitpokhrel/jira-cli/pkg/jira"
"github.com/ankitpokhrel/jira-cli/pkg/jira/filter"
"github.com/ankitpokhrel/jira-cli/pkg/netrc"
)
const clientTimeout = 15 * time.Second
var jiraClient *jira.Client
// Client initializes and returns jira client.
func Client(config jira.Config) *jira.Client {
if jiraClient != nil {
return jiraClient
}
if config.Server == "" {
config.Server = viper.GetString("server")
}
if config.Login == "" {
config.Login = viper.GetString("login")
}
if config.APIToken == "" {
config.APIToken = viper.GetString("api_token")
}
// Try netrc first if no API token provided
if config.APIToken == "" {
netrcConfig, _ := netrc.Read(config.Server, config.Login)
if netrcConfig != nil {
config.APIToken = netrcConfig.Password
}
}
// Only try keyring if explicitly enabled in config
useKeyring := viper.GetBool("use_keyring")
if config.APIToken == "" && useKeyring {
// Try to get API token from keyring
secret, err := keyring.Get("jira-cli", strings.ToLower(config.Login))
if err == nil {
config.APIToken = secret
}
} else if useKeyring && config.APIToken != "" {
// Save valid API token to keyring for future use
if err := keyring.Set("jira-cli", strings.ToLower(config.Login), config.APIToken); err != nil {
// Non-fatal error, just continue without saving to keyring
// The API token will still work for this session
}
}
if config.AuthType == nil {
authType := jira.AuthType(viper.GetString("auth_type"))
config.AuthType = &authType
}
if config.Insecure == nil {
insecure := viper.GetBool("insecure")
config.Insecure = &insecure
}
// MTLS
if config.MTLSConfig.CaCert == "" {
config.MTLSConfig.CaCert = viper.GetString("mtls.ca_cert")
}
if config.MTLSConfig.ClientCert == "" {
config.MTLSConfig.ClientCert = viper.GetString("mtls.client_cert")
}
if config.MTLSConfig.ClientKey == "" {
config.MTLSConfig.ClientKey = viper.GetString("mtls.client_key")
}
jiraClient = jira.NewClient(
config,
jira.WithTimeout(clientTimeout),
jira.WithInsecureTLS(*config.Insecure),
)
return jiraClient
}
// DefaultClient returns default jira client.
func DefaultClient(debug bool) *jira.Client {
return Client(jira.Config{Debug: debug})
}
// ProxyCreate uses either a v2 or v3 version of the Jira POST /issue
// endpoint to create an issue based on configured installation type.
// Defaults to v3 if installation type is not defined in the config.
func ProxyCreate(c *jira.Client, cr *jira.CreateRequest) (*jira.CreateResponse, error) {
var (
resp *jira.CreateResponse
err error
)
it := viper.GetString("installation")
if it == jira.InstallationTypeLocal {
resp, err = c.CreateV2(cr)
} else {
resp, err = c.Create(cr)
}
return resp, err
}
// ProxyGetIssueRaw executes the same request as ProxyGetIssue but returns raw API response body string.
func ProxyGetIssueRaw(c *jira.Client, key string) (string, error) {
it := viper.GetString("installation")
if it == jira.InstallationTypeLocal {
return c.GetIssueV2Raw(key)
}
return c.GetIssueRaw(key)
}
// ProxyGetIssue uses either a v2 or v3 version of the Jira GET /issue/{key}
// endpoint to fetch the issue details based on configured installation type.
// Defaults to v3 if installation type is not defined in the config.
func ProxyGetIssue(c *jira.Client, key string, opts ...filter.Filter) (*jira.Issue, error) {
var (
iss *jira.Issue
err error
)
it := viper.GetString("installation")
if it == jira.InstallationTypeLocal {
iss, err = c.GetIssueV2(key, opts...)
} else {
iss, err = c.GetIssue(key, opts...)
}
return iss, err
}
// ProxySearch uses either a v2 or v3 version of the Jira GET /search endpoint
// to search for the relevant issues based on configured installation type.
// Defaults to v3 if installation type is not defined in the config.
func ProxySearch(c *jira.Client, jql string, from, limit uint) (*jira.SearchResult, error) {
var (
issues *jira.SearchResult
err error
)
it := viper.GetString("installation")
if it == jira.InstallationTypeLocal {
issues, err = c.SearchV2(jql, from, limit)
} else {
issues, err = c.Search(jql, from, limit)
}
return issues, err
}
// ProxyAssignIssue uses either a v2 or v3 version of the PUT /issue/{key}/assignee
// endpoint to assign an issue to the user.
// Defaults to v3 if installation type is not defined in the config.
func ProxyAssignIssue(c *jira.Client, key string, user *jira.User, def string) error {
it := viper.GetString("installation")
assignee := def
if user != nil {
switch it {
case jira.InstallationTypeLocal:
assignee = user.Name
default:
assignee = user.AccountID
}
}
if it == jira.InstallationTypeLocal {
return c.AssignIssueV2(key, assignee)
}
return c.AssignIssue(key, assignee)
}
// ProxyUserSearch uses either v2 or v3 version of the GET /user/assignable/search
// endpoint to search for the users assignable to the given issue.
// Defaults to v3 if installation type is not defined in the config.
func ProxyUserSearch(c *jira.Client, opts *jira.UserSearchOptions) ([]*jira.User, error) {
var (
users []*jira.User
err error
)
it := viper.GetString("installation")
if it == jira.InstallationTypeLocal {
users, err = c.UserSearchV2(opts)
} else {
users, err = c.UserSearch(opts)
}
return users, err
}
// ProxyTransitions uses either v2 or v3 version of the GET /issue/{key}/transitions
// endpoint to fetch valid transitions for an issue.
// Defaults to v3 if installation type is not defined in the config.
func ProxyTransitions(c *jira.Client, key string) ([]*jira.Transition, error) {
var (
transitions []*jira.Transition
err error
)
it := viper.GetString("installation")
if it == jira.InstallationTypeLocal {
transitions, err = c.TransitionsV2(key)
} else {
transitions, err = c.Transitions(key)
}
return transitions, err
}
// ProxyWatchIssue uses either a v2 or v3 version of the PUT /issue/{key}/watchers
// endpoint to assign an issue to the user. Defaults to v3 if installation type is
// not defined in the config.
func ProxyWatchIssue(c *jira.Client, key string, user *jira.User) error {
it := viper.GetString("installation")
var assignee string
if user != nil {
switch it {
case jira.InstallationTypeLocal:
assignee = user.Name
default:
assignee = user.AccountID
}
}
if it == jira.InstallationTypeLocal {
return c.WatchIssueV2(key, assignee)
}
return c.WatchIssue(key, assignee)
}