Installations
npm install jira-client-xray
Score
53.4
Supply Chain
93
Quality
71
Maintenance
50
Vulnerability
97
License
Releases
Unable to fetch releases
Developer
Developer Guide
Module System
CommonJS
Min. Node Version
Typescript Support
No
Node Version
8.11.1
NPM Version
5.8.0
Statistics
3 Stars
4 Commits
3 Forks
3 Watching
1 Branches
1 Contributors
Updated on 28 Jan 2023
Bundle Size
848.57 kB
Minified
222.82 kB
Minified + Gzipped
Languages
JavaScript (100%)
Total Downloads
Cumulative downloads
Total Downloads
191,254
Last day
49.4%
248
Compared to previous day
Last week
-6.8%
1,133
Compared to previous week
Last month
13.7%
4,788
Compared to previous month
Last year
3%
37,657
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dependencies
2
Dev Dependencies
4
jira-client-xray
An extended wrapper of the existing jira-client
module, which adds support for the "Xray for Jira" Test Management plugin's REST API.
Installation
1$ npm install --save jira-client-xray
API
Create A Client
1var JiraApiWithXray = require('jira-client-xray');
2
3// Initialize
4var jira = new JiraApiWithXray({
5 strictSSL: true,
6 protocol: 'https',
7 username: 'username',
8 password: 'password',
9 host: 'jira.somehost.com',
10 base: 'jira',
11 xrayVersion: '1.0'
12});
The constructor options
parameter is a superset of the jira-client
module's constructor's options
parameter. It contains all of those configuration options, plus the following additional properties:
xrayVersion
(string) - The REST API version of the "Xray for Jira" plugin. Defaults to'1.0'
.
Import Test Execution Results
For deeper documentation, please view our ESDoc-generated documentation.
Response Schema
The HTTP response object (referred to as the "testExecIssueId" in all subsequent examples) returned from the Promise
for each of the following import methods is as follows:
1{ 2 "testExecIssue": { 3 "id": "10000", 4 "key": "DEMO-123", 5 "self": "http://www.example.com/jira/rest/api/2/issue/10000" 6 } 7}
Jira Issue Customization Request Schema
The JSON schema for the issueData
parameter that is an optional part of some of these API calls is as follows:
Xray JSON
1jira 2 .importExecResultsFromXray(testExecResults) 3 .then(function(testExecIssueId) { /* ... */ });
Cucumber JSON
Results Only
1jira 2 .importExecResultsFromCucumber(testExecResults) 3 .then(function(testExecIssueId) { /* ... */ });
With JIRA Issue Customization
1jira
2 .importExecResultsFromCucumber(testExecResults, issueData)
3 .then(function(testExecIssueId) { /* ... */ });
Behave JSON
Results Only
1jira 2 .importExecResultsFromBehave(testExecResults) 3 .then(function(testExecIssueId) { /* ... */ });
With JIRA Issue Customization
1jira
2 .importExecResultsFromBehave(testExecResults, issueData)
3 .then(function(testExecIssueId) { /* ... */ });
JUnit XML
Results Only
1jira
2 .importExecResultsFromJUnit(testExecResults, query)
3 .then(function(testExecIssueId) { /* ... */ });
With JIRA Issue Customization
1jira
2 .importExecResultsFromJUnit(testExecResults, null, issueData)
3 .then(function(testExecIssueId) { /* ... */ });
TestNG XML
Results Only
1jira
2 .importExecResultsFromTestNG(testExecResults, query)
3 .then(function(testExecIssueId) { /* ... */ });
With JIRA Issue Customization
1jira
2 .importExecResultsFromTestNG(testExecResults, null, issueData)
3 .then(function(testExecIssueId) { /* ... */ });
NUnit XML
Results Only
1jira
2 .importExecResultsFromNUnit(testExecResults, query)
3 .then(function(testExecIssueId) { /* ... */ });
With JIRA Issue Customization
1jira
2 .importExecResultsFromNUnit(testExecResults, null, issueData)
3 .then(function(testExecIssueId) { /* ... */ });
Robot Framework XML
Results Only
1jira
2 .importExecResultsFromRobot(testExecResults, query)
3 .then(function(testExecIssueId) { /* ... */ });
With JIRA Issue Customization
1jira
2 .importExecResultsFromRobot(testExecResults, null, issueData)
3 .then(function(testExecIssueId) { /* ... */ });
License
Copyright (c) 2018, James M. Greene (MIT License)
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
Found 0/4 approved changesets -- score normalized to 0
Reason
project is archived
Details
- Warn: Repository is archived.
Reason
no SAST tool detected
Details
- Warn: no pull requests merged into dev branch
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'master'
Reason
30 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-v88g-cgmw-v5xw
- Warn: Project is vulnerable to: GHSA-67hx-6x53-jw92
- Warn: Project is vulnerable to: GHSA-rq8g-5pc5-wrhr
- Warn: Project is vulnerable to: GHSA-p28h-cc7q-c4fg
- Warn: Project is vulnerable to: GHSA-qrmc-fj45-qfc2
- Warn: Project is vulnerable to: GHSA-44pw-h2cw-w3vq
- Warn: Project is vulnerable to: GHSA-c429-5p7v-vgjp
- Warn: Project is vulnerable to: GHSA-896r-f27r-55mw
- Warn: Project is vulnerable to: GHSA-jf85-cpcp-j695
- Warn: Project is vulnerable to: GHSA-fvqr-27wr-82fm
- Warn: Project is vulnerable to: GHSA-4xc9-xhrj-v574
- Warn: Project is vulnerable to: GHSA-x5rq-j2xg-h7qm
- Warn: Project is vulnerable to: GHSA-p6mc-m468-83gw
- Warn: Project is vulnerable to: GHSA-29mw-wpgm-hmr9
- Warn: Project is vulnerable to: GHSA-35jh-r3h4-6jhm
- Warn: Project is vulnerable to: GHSA-h726-x36v-rx45
- Warn: Project is vulnerable to: GHSA-7px7-7xjx-hxm8
- Warn: Project is vulnerable to: GHSA-x5pg-88wf-qq4p
- Warn: Project is vulnerable to: GHSA-5v2h-r2cx-5xgj
- Warn: Project is vulnerable to: GHSA-rrrm-qjm4-v8hf
- Warn: Project is vulnerable to: GHSA-f8q6-p94x-37v3
- Warn: Project is vulnerable to: GHSA-vh95-rmgr-6w4m / GHSA-xvch-5gv4-984h
- Warn: Project is vulnerable to: GHSA-rp65-9cf3-cjxr
- Warn: Project is vulnerable to: GHSA-hrpp-h998-j3pp
- Warn: Project is vulnerable to: GHSA-p8p7-x288-28g6
- Warn: Project is vulnerable to: GHSA-4rq4-32rv-6wp6
- Warn: Project is vulnerable to: GHSA-64g7-mvw6-v9qj
- Warn: Project is vulnerable to: GHSA-mf6x-7mm4-x2g7
- Warn: Project is vulnerable to: GHSA-mxhp-79qh-mcx6
- Warn: Project is vulnerable to: GHSA-72xf-g2v4-qvf3
Score
1.7
/10
Last Scanned on 2024-11-25
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More