• This repository has been archived on 21/Sep/2023
  • Stars
    star
    123
  • Rank 288,645 (Top 6 %)
  • Language
    Go
  • License
    Apache License 2.0
  • Created about 7 years ago
  • Updated over 5 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

A tool for synchronizing issue tracking between GitHub and JIRA

issue-sync

Issue-sync is a tool for mirroring GitHub issues in JIRA. It grew out of a desire to maintain a public GitHub repo while tracking private issues in a JIRA board; rather than require people to keep up with both sources, we decided to make one the single source of truth. Note that issue-sync works only one way and will NOT mirror issues from JIRA to GitHub.

Usage

JIRA Configuration

To use, first ensure you have a JIRA server with the project you want to track on it - it can be a cloud account, or self-hosted. Also make sure you have a user account that can access the project and create issues on it; it's recommended that you create an account specifically for the issue-sync tool.

Add the following custom fields to the project: GitHub ID, GitHub Number, GitHub Labels, GitHub Status, GitHub Reporter, and Last Issue-Sync Update. These fields are required and the names must match exactly. In addition, GitHub ID and GitHub Number must be number fields, Last Issue-Sync Update must be a date time field, and the remainder must be text fields.

If you intend to use OAuth with JIRA, you must create an inbound application connection and add a public key. Instructions can be found in OAuth for Rest APIs.

Application Configuration

Arguments to the program may be passed on the command line or in a JSON configuration file. For the command line arguments, run issue-sync help. The JSON format is a single, flat object, with the argument long names as keys.

Configuration arguments are as follows:

Name Value Type Example Value Required Default
log-level string "warn" false "info"
github-token string true null
jira-user string "[email protected]" false null
jira-pass string false null
jira-token string false null
jira-secret string false null
jira-consumer-key string false null
jira-private-key-path string false null
repo-name string "coreos/issue-sync" true null
jira-uri string "https://jira.example.com true null
jira-project string "SYNC" true null
since string "2017-07-01T13:45:00-0800" false "1970-01-01T00:00:00+0000"
timeout duration 500ms false 1m

Configuration Key Descriptions

log-level is the minimum level which will be logged; any output below this value will be discarded.

github-token is a personal access token used to access GitHub as a specific user.

jira-user and jira-pass are the username (i.e. email) and password of the JIRA user which will be authenticated. See Authentication for more details.

jira-token and jira-secret are OAuth access tokens which will be used to perform an OAuth connection to JIRA. jira-consumer-key and jira-private-key-path are the RSA key used for OAuth. See Authentication for more details.

repo-name is the GitHub repo from which issues will be retrieved. It must be in the form owner/repo, for example coreos/issue-sync.

jira-uri is the base URL of the JIRA instance. If the JIRA instance lives at a non-root URL, the path must be included. For example, https://example.com/jira.

jira-project is the key (not the name) of the project in JIRA to which the issues will be synchronized.

since is the cutoff date issue-sync will use when searching for issues to synchronize. If an issue was last updated before this time, it will not be synchronized. Usually this is the last run of the tool. It is in ISO-8601 format.

timeout represents the duration of time for which an API request will be retried in case of failure. Human-friendly strings such as 30s are accepted as input, although the application will save it to the file in a number of nanoseconds.

Configuration File

By default, issue-sync looks for the configuration file at $HOME/.issue-sync.json. To override this location, use the --config option on the command line.

If both a configuration file and command line arguments are provided, the command line arguments override the configuration file.

After a successful run, the current configuration, with command line arguments overwritten, is saved to the configuration file (either the one provided, or $HOME/.issue-sync.json); the "since" date is updated to the current date when the tool is run, as well.

Authentication

If jira-user or jira-pass are provided, both are required, and the application will connect to JIRA via Basic Authentication.

Otherwise, OAuth will be used. In this case, the jira-consumer-key, which is the name of the RSA public key on the JIRA server, and the jira-private-key, which is the path to the RSA private key which matches, must be provided.

If the jira-token and jira-secret are provided, they are used as the OAuth access token.

If they are not provided, an OAuth handshake occurs, and an authorization URL will be given. The user will need to open the URL in their browser, and receive the authorization code provided. Once the code is entered into the application, an access token will be generated, and it will be added to the configuration for future use.

More Repositories

1

fleet

fleet ties together systemd and etcd into a distributed init system
Go
2,426
star
2

go-systemd

Go bindings to systemd socket activation, journal, D-Bus, and unit files
Go
2,232
star
3

torus

Torus Distributed Storage
Go
1,776
star
4

etcd-operator

etcd operator creates/configures/manages etcd clusters atop Kubernetes
Go
1,747
star
5

coreos-vagrant

Minimal Vagrantfile for Container Linux
1,654
star
6

go-oidc

A Go OpenID Connect client.
Go
1,633
star
7

coreos-kubernetes

CoreOS Container Linux+Kubernetes documentation & Vagrant installers
Shell
1,105
star
8

go-iptables

Go wrapper around iptables utility
Go
1,096
star
9

rpm-ostree

โš›๐Ÿ“ฆ Hybrid image/package system with atomic upgrades and package layering
C
854
star
10

vault-operator

Run and manage Vault on Kubernetes simply and securely
Go
759
star
11

ignition

First boot installer and configuration tool
Go
747
star
12

tectonic-installer

Install a Kubernetes cluster the CoreOS Tectonic Way: HA, self-hosted, RBAC, etcd Operator, and more
HCL
597
star
13

toolbox

bring your tools with you
Shell
395
star
14

go-etcd

DEPRECATED - please use the official client at https://github.com/coreos/etcd/tree/master/client
Go
365
star
15

coreos-cloudinit

[DEPRECATED] - Simple configuration tool for Container Linux
Go
344
star
16

grub

GRand Unified Bootloader http://www.gnu.org/software/grub/grub.html
C
333
star
17

coreos-xhyve

Container Linux running on xhyve hypervisor
Shell
332
star
18

coreos-assembler

Tooling container to assemble CoreOS-like systems
Go
327
star
19

go-semver

semver library in Go
Go
317
star
20

locksmith

Reboot manager for Container Linux
Go
273
star
21

fedora-coreos-tracker

Issue tracker for Fedora CoreOS
261
star
22

coreos-overlay

Custom ebuilds for Container Linux
Shell
249
star
23

coreos-installer

Installer for CoreOS disk images
Rust
215
star
24

container-linux-update-operator

A Kubernetes operator to manage updates of Container Linux by CoreOS
Go
211
star
25

fero

YubiHSM2-backed signing server
Rust
208
star
26

etcd-ca

Go
199
star
27

awesome-kubernetes-extensions

A resource tracking a number of Kubernetes extensions built on TPRs, CRDs, and API Aggregation
199
star
28

butane

Butane translates human-readable Butane Configs into machine-readable Ignition Configs.
Go
199
star
29

container-linux-config-transpiler

Convert a Container Linux Config into Ignition
Go
190
star
30

pkg

a collection of go utility packages
Go
186
star
31

afterburn

A one-shot cloud provider agent
Rust
183
star
32

etcdctl

DEPRECATED - see https://github.com/coreos/etcd/tree/master/etcdctl instead
181
star
33

discovery.etcd.io

etcd discovery service
Go
168
star
34

scripts

Build and maintenance scripts for Container Linux
Shell
155
star
35

zincati

Agent for Fedora CoreOS auto-updates
Rust
149
star
36

bugs

Issue tracker for CoreOS Container Linux
148
star
37

fedora-coreos-config

Base configuration for Fedora CoreOS
Shell
145
star
38

kpm

KPM is a tool to deploy and manage application stacks on Kubernetes.
Python
124
star
39

terraform-aws-kubernetes

Install a Kubernetes cluster the CoreOS Tectonic Way: HA, self-hosted, RBAC, etcd Operator, and more
HCL
117
star
40

bootupd

Bootloader updater
Rust
105
star
41

manifest

repo tool manifest for Container Linux sdk
99
star
42

go-omaha

omaha protocol for go
Go
96
star
43

init

init system units and configuration for Container Linux
Shell
95
star
44

mantle

Mantle: Gluing Container Linux together
Go
93
star
45

quartermaster

A framework for managing containerized storage systems on top of Kubernetes
Go
93
star
46

aws-auth-proxy

HTTP proxy that signs requests for upstream AWS endpoints
Go
86
star
47

mayday

A diagnostics tool for capturing system state.
Go
80
star
48

go-webrtc-datachannel

Go
77
star
49

go-gitreceive

A gitreceive implementation in Go
Go
75
star
50

torcx

torcx is a boot-time addon manager for immutable systems
Go
73
star
51

elb-presence

Python
72
star
52

layering-examples

Dockerfile
72
star
53

unit-examples

A collection of systemd units designed to run on CoreOS/fleet
65
star
54

go-workflow

Go
60
star
55

corelb

a loadbalancer built on coreinit and nginx
Lua
55
star
56

go-tcmu

Go SCSI emulation via the Linux TCM in Userspace module
Go
54
star
57

go-namespaces

DEPRECATED: Golang implementations of Linux Namespaces
Go
52
star
58

fedora-coreos-docs

Documentation for Fedora CoreOS
Shell
49
star
59

third_party.go

third_party.go - self contained GOPATH helper
Go
49
star
60

fedora-coreos-pipeline

Build pipeline for Fedora CoreOS
Groovy
49
star
61

updateservicectl

CoreUpdate Command Line Interface
Go
48
star
62

coreos-web

CSS
45
star
63

depot_tools

Python
43
star
64

jenkins-os

Groovy pipeline jobs that build and test Container Linux with Jenkins
Groovy
43
star
65

fabric-kubernetes-nodes

A fabric Fabfile for SSHing into Kubernetes nodes by label query
43
star
66

gocat

Socket activated transparent SSL proxy written in Go
Go
42
star
67

ssh-key-dir

sshd AuthorizedKeysCommand to read ~/.ssh/authorized_keys.d
Rust
42
star
68

tectonic-docs

Tectonic documentation - https://coreos.com/tectonic/docs/latest/
42
star
69

flannel-cni

Image for sidecar container that installs cni related assets for flannel
Shell
41
star
70

grafiti

Tag and remove AWS Resources with Automation
Go
39
star
71

go-log

Go logging library with systemd journal support
Go
38
star
72

update-ssh-keys

Deprecated tool for managing authorized ssh keys
Rust
38
star
73

airlock

Minimal update/reboot orchestrator for Fedora CoreOS clusters
Go
38
star
74

nsproxy

Linux namespaces tcp proxy
Go
36
star
75

ksched

Experimental flow-based Kubernetes scheduler
Go
36
star
76

update_engine

update daemon for Container Linux
C++
35
star
77

openssh-keys

A pure-Rust library to read and write OpenSSH public keys
Rust
35
star
78

fedora-coreos-streams

Stream metadata and overrides for Fedora CoreOS
Python
34
star
79

cargo-vendor-filterer

Tool to `cargo vendor` with filtering
Rust
32
star
80

bootengine

Initramfs for Container Linux
Shell
31
star
81

krud

kubernetes rolling update webhook server
Go
30
star
82

tectonic-forum

29
star
83

gzran

gzip indexer for random access into compressed files
Go
28
star
84

bcrypt-tool

Go
27
star
85

portage-stable

unmodified ebuilds mirrored from the portage tree
Shell
27
star
86

minikube-iso

An alternative bootable ISO image for minikube
27
star
87

khealth

basic kubernetes health monitoring
Go
26
star
88

kscale

Scripts for k8s scalability testing and analysis
Go
24
star
89

terraform-azurerm-kubernetes

Install a Kubernetes cluster the CoreOS Tectonic Way: HA, self-hosted, RBAC, etcd Operator, and more
HCL
22
star
90

coreos.fedoraproject.org

Old coreos.fedoraproject.org website (deprecated)
HTML
21
star
91

awscli

AWS CLI container image
21
star
92

baselayout

Basic Container Linux filesystem layout and configs
Shell
20
star
93

subgun

Subscribe to a mailing list on mailgun via a web interface
Go
20
star
94

etcd-manager

An etcd cluster management tool
Go
19
star
95

license-bill-of-materials

Fork of https://github.com/pmezard/licenses
Go
19
star
96

systemd-rest

Go
19
star
97

kapprover

A kubelet CSR auto-approver
Go
18
star
98

enhancements

Enhancement tracking repo for CoreOS-based systems
17
star
99

docker-nginx-https-redirect

Docker container which redirects any http request on 80 to https on 443
17
star
100

envsubst-rs

Simple Rust library for variables substitution
Rust
17
star