@k-int/bruno-shared-scripts 2.0.0 → 2.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +7 -0
- package/README.md +94 -0
- package/es/index.js +41 -23
- package/package.json +1 -1
- package/src/auth/auth-utils.js +1 -1
- package/src/auth/login.js +34 -20
- package/src/folioRequest.js +27 -12
- package/src/utils/config.js +2 -2
package/CHANGELOG.md
CHANGED
|
@@ -1,3 +1,10 @@
|
|
|
1
|
+
## [2.0.1](https://gitlab.com/knowledge-integration/bruno/bruno-shared-scripts/compare/v2.0.0...v2.0.1) (2026-01-16)
|
|
2
|
+
|
|
3
|
+
|
|
4
|
+
### Bug Fixes
|
|
5
|
+
|
|
6
|
+
* Improvements to login and folioAxios to allow for connecting to a DIFFERENT folio within the pre request scripts ([5acea6e](https://gitlab.com/knowledge-integration/bruno/bruno-shared-scripts/commit/5acea6ec44aefa3fce84f75454908974fdb23f42))
|
|
7
|
+
|
|
1
8
|
# [2.0.0](https://gitlab.com/knowledge-integration/bruno/bruno-shared-scripts/compare/v1.2.1...v2.0.0) (2026-01-12)
|
|
2
9
|
|
|
3
10
|
|
package/README.md
CHANGED
|
@@ -0,0 +1,94 @@
|
|
|
1
|
+
# Bruno shared scripts
|
|
2
|
+
|
|
3
|
+
This is a public NPM module dedicated to any shared behaviour required across varying collections in Bruno. For now it
|
|
4
|
+
focuses mostly on connecting to a
|
|
5
|
+
remote FOLIO instance and managing FOLIO headers, but there is nothing tying this module to only serving those purposes.
|
|
6
|
+
|
|
7
|
+
## Motivation
|
|
8
|
+
|
|
9
|
+
Analogous to Postman's shared scripts cloud library, Bruno instead allows ANY NPM to be imported (In developer mode, via
|
|
10
|
+
`require`) and used within pre/post
|
|
11
|
+
request scripts. This is significantly more powerful and open, and allows us to publish the module onto the public NPM
|
|
12
|
+
with strict versioning and be more in
|
|
13
|
+
control.
|
|
14
|
+
|
|
15
|
+
## Setup
|
|
16
|
+
|
|
17
|
+
To use the shared scripts within a collection, simply import and initialise them.
|
|
18
|
+
|
|
19
|
+
```javascript
|
|
20
|
+
const {
|
|
21
|
+
init,
|
|
22
|
+
} = require('@k-int/bruno-shared-scripts');
|
|
23
|
+
|
|
24
|
+
init({
|
|
25
|
+
bruInstance: bru,
|
|
26
|
+
logger: console,
|
|
27
|
+
requestInstance: req
|
|
28
|
+
})
|
|
29
|
+
```
|
|
30
|
+
|
|
31
|
+
This init is a new requirement for Bruno V3, as the virtual environment the scripts are running in have now been
|
|
32
|
+
configured in such a way that third party modules do not get access to the globals previously available (bru, req),
|
|
33
|
+
and access to the console in Bruno's developer tools is ALSO siloed.
|
|
34
|
+
|
|
35
|
+
To combat this, `init` at the collection level in the pre-request script will ensure that the module is able to
|
|
36
|
+
access the functionality.
|
|
37
|
+
|
|
38
|
+
## How it works
|
|
39
|
+
The module is developed as an ES module, but needs to be built for publishing. This happens via the `npm run build`.
|
|
40
|
+
This will overwrite the `es` directory, creating a single `index.js` file that can then be required by Bruno scripts.
|
|
41
|
+
|
|
42
|
+
## Development
|
|
43
|
+
|
|
44
|
+
Since this is an NPM, and Bruno collections can be built with NPM using a package.json, this _can_ be run in a
|
|
45
|
+
workspace for "easy" development. However developing this module is not completely straightforward, and can take a while
|
|
46
|
+
|
|
47
|
+
### Working in a workspace
|
|
48
|
+
If working in an NPM workspace, as per [bienenvolk-bruno-workspace](https://gitlab.com/knowledge-integration/bruno/bienenvolk-bruno-workspace),
|
|
49
|
+
then the development process is:
|
|
50
|
+
- Make changes to shared scripts
|
|
51
|
+
- Run `build`
|
|
52
|
+
- Restart Bruno GUI
|
|
53
|
+
- IMPORTANT, Bruno caches the NPMs it's using per session, so any changes will NOT be visible until a restart
|
|
54
|
+
- Run request
|
|
55
|
+
- Go back to step 1
|
|
56
|
+
|
|
57
|
+
### Working without a workspace
|
|
58
|
+
The development process is largely the same as working in a workspace, with the only difference being that the
|
|
59
|
+
version will need to point at the newest version
|
|
60
|
+
|
|
61
|
+
- Edit Bruno collection package.json to point the bruno-shared-scripts at `file:path/to/file`
|
|
62
|
+
- Run `build` for shared scripts
|
|
63
|
+
- clean `npm install` in the collection (Delete package lock and node_modules to be sure)
|
|
64
|
+
- Restart Bruno GUI
|
|
65
|
+
- IMPORTANT, Bruno caches the NPMs it's using per session, so any changes will NOT be visible until a restart
|
|
66
|
+
- Run request
|
|
67
|
+
- Go back to step 2
|
|
68
|
+
|
|
69
|
+
And finally remembering to revert the version pointer at the end when the fixed shared-scripts have been published.
|
|
70
|
+
|
|
71
|
+
### Bruno globals
|
|
72
|
+
As of Bruno V3, access to `bru`, `req` and `console` will no longer behave as expected within a shared NPM. The
|
|
73
|
+
solution to this is (for now) a file called `bruno-globals-provider`. This sets up a `setGlobals` method which in
|
|
74
|
+
turn is used by init (I wanted to keep the globals setter separate from the init in case we have side effects down
|
|
75
|
+
the road).
|
|
76
|
+
|
|
77
|
+
Then in each helper method, the requisite getter(s) can be used:
|
|
78
|
+
|
|
79
|
+
```javascript
|
|
80
|
+
import { getBru, getConsole, getReq } from '../bruno-globals-provider.js';
|
|
81
|
+
|
|
82
|
+
const helloWorld = () => {
|
|
83
|
+
const bru = getBru();
|
|
84
|
+
const logger = getConsole();
|
|
85
|
+
const req = getReq();
|
|
86
|
+
|
|
87
|
+
logger.log("Hello world");
|
|
88
|
+
logger.log("Request: %o", req);
|
|
89
|
+
|
|
90
|
+
logger.log("Access Bruno functionality: %o", bru.getEnv("FAKE_ENVIRONMENT_VARIABLE"));
|
|
91
|
+
}
|
|
92
|
+
```
|
|
93
|
+
|
|
94
|
+
Should post-request script helpers be needed, this will need to be extended to include `res` as well.
|
package/es/index.js
CHANGED
|
@@ -91,7 +91,7 @@ var init_auth_utils = __esm({
|
|
|
91
91
|
};
|
|
92
92
|
getIgnoreCreds = () => {
|
|
93
93
|
const bru = getBru();
|
|
94
|
-
return bru.getEnvVar("
|
|
94
|
+
return bru.getEnvVar("ignoreCredentials");
|
|
95
95
|
};
|
|
96
96
|
getUserName = () => {
|
|
97
97
|
const bru = getBru();
|
|
@@ -131,53 +131,62 @@ var init_login = __esm({
|
|
|
131
131
|
doALogin = async ({
|
|
132
132
|
urlOverride = void 0,
|
|
133
133
|
withExpiry = true,
|
|
134
|
-
suppressConsole = true
|
|
134
|
+
suppressConsole = true,
|
|
135
|
+
credsOverride = void 0,
|
|
136
|
+
tenantOverride = void 0
|
|
135
137
|
} = {}) => {
|
|
136
138
|
const logger2 = getConsole();
|
|
137
139
|
const req = getReq();
|
|
140
|
+
const theTenant = tenantOverride ?? getTenant();
|
|
138
141
|
!suppressConsole && logger2.log(`doALogin(${urlOverride}, ${withExpiry}, ${suppressConsole})`);
|
|
139
|
-
const ignoreCreds = getIgnoreCreds();
|
|
142
|
+
const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
|
|
140
143
|
const preExistingHeaders = req.getHeaders();
|
|
141
144
|
const preExistingTenant = preExistingHeaders[Object.keys(preExistingHeaders).find((key) => key.toLowerCase() === "X-Okapi-Tenant".toLowerCase())];
|
|
142
145
|
if (!preExistingTenant) {
|
|
143
|
-
req.setHeader("x-okapi-tenant",
|
|
146
|
+
req.setHeader("x-okapi-tenant", theTenant);
|
|
144
147
|
}
|
|
145
148
|
if (!ignoreCreds || ignoreCreds === false) {
|
|
146
149
|
const url = urlOverride ?? (withExpiry ? getLoginWithExpiryUrl() : getLoginUrl());
|
|
147
|
-
const creds = getCreds();
|
|
148
|
-
const
|
|
149
|
-
|
|
150
|
-
!suppressConsole && logger2.log(`Sending login request to ${url} with creds ${JSON.stringify(creds)} for tenant: ${tenant}`);
|
|
150
|
+
const creds = credsOverride ?? getCreds();
|
|
151
|
+
const config = getBaseRequestConfig({ tenantOverride });
|
|
152
|
+
!suppressConsole && logger2.log(`Sending login request to ${url} with creds ${JSON.stringify(creds)} for tenant: ${theTenant}, and config: ${JSON.stringify(config)}`);
|
|
151
153
|
return await axios.post(
|
|
152
154
|
url,
|
|
153
155
|
creds,
|
|
154
156
|
config
|
|
155
157
|
);
|
|
158
|
+
} else {
|
|
159
|
+
!suppressConsole && logger2.log(`Skipping login as ignoreCredentials is set to true`);
|
|
156
160
|
}
|
|
157
161
|
};
|
|
158
162
|
loginFunc = async ({
|
|
159
163
|
urlOverride = void 0,
|
|
160
164
|
withExpiry = true,
|
|
161
|
-
suppressConsole = true
|
|
165
|
+
suppressConsole = true,
|
|
166
|
+
credsOverride = void 0,
|
|
167
|
+
tenantOverride = void 0
|
|
162
168
|
} = {}) => {
|
|
163
169
|
const logger2 = getConsole();
|
|
164
170
|
const bru = getBru();
|
|
165
171
|
const req = getReq();
|
|
166
172
|
!suppressConsole && logger2.log(`loginFunc(${urlOverride}, ${withExpiry}, ${suppressConsole})`);
|
|
167
|
-
await doALogin({ req, urlOverride, withExpiry, suppressConsole }).then((loginResp) => {
|
|
168
|
-
|
|
169
|
-
|
|
170
|
-
|
|
171
|
-
|
|
172
|
-
|
|
173
|
-
|
|
173
|
+
await doALogin({ req, urlOverride, withExpiry, suppressConsole, credsOverride, tenantOverride }).then((loginResp) => {
|
|
174
|
+
const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
|
|
175
|
+
if (!ignoreCreds || ignoreCreds === false) {
|
|
176
|
+
!suppressConsole && logger2.log("Setting request headers...");
|
|
177
|
+
req.setHeader("Cookie", loginResp.headers["set-cookie"]);
|
|
178
|
+
const token = loginResp.headers["x-okapi-token"];
|
|
179
|
+
bru.setVar("x-okapi-token-value", token);
|
|
180
|
+
if (!withExpiry) {
|
|
181
|
+
req.setHeader("x-okapi-token", getToken());
|
|
182
|
+
}
|
|
174
183
|
}
|
|
175
184
|
}).catch((err) => {
|
|
176
185
|
logger2.error("Failed to login to folio: %o", err);
|
|
177
186
|
});
|
|
178
187
|
};
|
|
179
|
-
login = (urlOverride, suppressConsole) => loginFunc({ urlOverride, withExpiry: false, suppressConsole });
|
|
180
|
-
loginWithExpiry = (urlOverride, suppressConsole) => loginFunc({ urlOverride, suppressConsole });
|
|
188
|
+
login = ({ urlOverride, suppressConsole, credsOverride, tenantOverride } = {}) => loginFunc({ urlOverride, withExpiry: false, suppressConsole, credsOverride, tenantOverride });
|
|
189
|
+
loginWithExpiry = ({ urlOverride, suppressConsole, credsOverride, tenantOverride } = {}) => loginFunc({ urlOverride, suppressConsole, credsOverride, tenantOverride });
|
|
181
190
|
}
|
|
182
191
|
});
|
|
183
192
|
|
|
@@ -208,8 +217,8 @@ var getBaseRequestConfig;
|
|
|
208
217
|
var init_config = __esm({
|
|
209
218
|
"src/utils/config.js"() {
|
|
210
219
|
init_auth();
|
|
211
|
-
getBaseRequestConfig = () => {
|
|
212
|
-
const tenant = getTenant();
|
|
220
|
+
getBaseRequestConfig = ({ tenantOverride }) => {
|
|
221
|
+
const tenant = tenantOverride ?? getTenant();
|
|
213
222
|
return {
|
|
214
223
|
headers: {
|
|
215
224
|
"Content-type": "application/json",
|
|
@@ -241,17 +250,26 @@ init_auth();
|
|
|
241
250
|
|
|
242
251
|
// src/folioRequest.js
|
|
243
252
|
init_bruno_globals_provider();
|
|
253
|
+
init_auth();
|
|
244
254
|
import axios2 from "axios";
|
|
245
255
|
var { doALogin: doALogin2 } = (init_auth(), __toCommonJS(auth_exports));
|
|
246
256
|
var { getBaseRequestConfig: getBaseRequestConfig2 } = (init_utils(), __toCommonJS(utils_exports));
|
|
247
257
|
var getFolioAxios = async ({
|
|
248
258
|
urlOverride = void 0,
|
|
249
259
|
withExpiry = true,
|
|
250
|
-
suppressConsole = true
|
|
260
|
+
suppressConsole = true,
|
|
261
|
+
credsOverride = void 0,
|
|
262
|
+
tenantOverride = void 0
|
|
251
263
|
} = {}) => {
|
|
252
264
|
const logger2 = getConsole();
|
|
253
|
-
|
|
254
|
-
|
|
265
|
+
const config = getBaseRequestConfig2({ tenantOverride });
|
|
266
|
+
const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
|
|
267
|
+
if (ignoreCreds) {
|
|
268
|
+
!suppressConsole && logger2.log("Ignoring credentials so returning a folioAxios without logging in: %o", config);
|
|
269
|
+
return axios2.create(config);
|
|
270
|
+
}
|
|
271
|
+
return doALogin2({ urlOverride, withExpiry, suppressConsole, credsOverride, tenantOverride }).then((loginResp) => {
|
|
272
|
+
!suppressConsole && logger2.log("folio login succeeded with response: %o", loginResp);
|
|
255
273
|
config.headers.Cookie = loginResp.headers["set-cookie"];
|
|
256
274
|
if (!withExpiry) {
|
|
257
275
|
config.headers["x-okapi-token"] = loginResp.headers["x-okapi-token"];
|
package/package.json
CHANGED
package/src/auth/auth-utils.js
CHANGED
package/src/auth/login.js
CHANGED
|
@@ -19,13 +19,17 @@ const getLoginUrl = () => {
|
|
|
19
19
|
const doALogin = async ({
|
|
20
20
|
urlOverride = undefined,
|
|
21
21
|
withExpiry = true,
|
|
22
|
-
suppressConsole = true
|
|
22
|
+
suppressConsole = true,
|
|
23
|
+
credsOverride = undefined,
|
|
24
|
+
tenantOverride = undefined
|
|
23
25
|
} = {}) => {
|
|
24
26
|
const logger = getConsole();
|
|
25
27
|
const req = getReq();
|
|
26
28
|
|
|
29
|
+
const theTenant = tenantOverride ?? getTenant();
|
|
30
|
+
|
|
27
31
|
!suppressConsole && logger.log(`doALogin(${urlOverride}, ${withExpiry}, ${suppressConsole})`);
|
|
28
|
-
const ignoreCreds = getIgnoreCreds();
|
|
32
|
+
const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
|
|
29
33
|
//console.log("URL OVERRIDE: %o", urlOverride)
|
|
30
34
|
|
|
31
35
|
// Ensure that x-okapi-tenant is set if NOT set by request
|
|
@@ -35,46 +39,56 @@ const doALogin = async ({
|
|
|
35
39
|
] // Make sure this is case insensitive
|
|
36
40
|
|
|
37
41
|
if (!preExistingTenant) {
|
|
38
|
-
req.setHeader('x-okapi-tenant',
|
|
42
|
+
req.setHeader('x-okapi-tenant', theTenant) // Keep an eye on this in PM we needed some funky stuff for "disabled" headers
|
|
39
43
|
}
|
|
44
|
+
|
|
40
45
|
// Way to ignore creds for local endpoints
|
|
41
46
|
if (!ignoreCreds || ignoreCreds === false) {
|
|
42
47
|
const url = urlOverride ?? (withExpiry ? getLoginWithExpiryUrl() : getLoginUrl());
|
|
43
|
-
const creds = getCreds();
|
|
44
|
-
const
|
|
45
|
-
|
|
46
|
-
!suppressConsole && logger.log(`Sending login request to ${url} with creds ${JSON.stringify(creds)} for tenant: ${
|
|
48
|
+
const creds = credsOverride ?? getCreds();
|
|
49
|
+
const config = getBaseRequestConfig({ tenantOverride });
|
|
50
|
+
|
|
51
|
+
!suppressConsole && logger.log(`Sending login request to ${url} with creds ${JSON.stringify(creds)} for tenant: ${theTenant}, and config: ${JSON.stringify(config)}`);
|
|
47
52
|
|
|
48
53
|
return await axios.post(
|
|
49
54
|
url,
|
|
50
55
|
creds,
|
|
51
56
|
config
|
|
52
|
-
)
|
|
57
|
+
);
|
|
58
|
+
} else {
|
|
59
|
+
!suppressConsole && logger.log(`Skipping login as ignoreCredentials is set to true`);
|
|
53
60
|
}
|
|
54
61
|
}
|
|
55
62
|
|
|
56
63
|
const loginFunc = async ({
|
|
57
64
|
urlOverride = undefined,
|
|
58
65
|
withExpiry = true,
|
|
59
|
-
suppressConsole = true
|
|
66
|
+
suppressConsole = true,
|
|
67
|
+
credsOverride = undefined,
|
|
68
|
+
tenantOverride = undefined,
|
|
60
69
|
} = {}) => {
|
|
61
70
|
const logger = getConsole();
|
|
62
71
|
const bru = getBru();
|
|
63
72
|
const req = getReq();
|
|
64
73
|
|
|
65
74
|
!suppressConsole && logger.log(`loginFunc(${urlOverride}, ${withExpiry}, ${suppressConsole})`);
|
|
66
|
-
|
|
75
|
+
|
|
76
|
+
await doALogin({ req, urlOverride, withExpiry, suppressConsole, credsOverride, tenantOverride })
|
|
67
77
|
.then((loginResp) => {
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
78
|
+
const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
|
|
79
|
+
|
|
80
|
+
if (!ignoreCreds || ignoreCreds === false) {
|
|
81
|
+
!suppressConsole && logger.log("Setting request headers...")
|
|
82
|
+
// We can't seem to set the cookie jar programatically, so directly set cookies on request instead
|
|
83
|
+
req.setHeader('Cookie', loginResp.headers["set-cookie"])
|
|
71
84
|
|
|
72
|
-
|
|
73
|
-
|
|
85
|
+
const token = loginResp.headers["x-okapi-token"]
|
|
86
|
+
bru.setVar("x-okapi-token-value", token)
|
|
74
87
|
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
88
|
+
if (!withExpiry) {
|
|
89
|
+
// This is only populated on login, not login with expiry
|
|
90
|
+
req.setHeader('x-okapi-token', getToken())
|
|
91
|
+
}
|
|
78
92
|
}
|
|
79
93
|
})
|
|
80
94
|
.catch(err => {
|
|
@@ -82,8 +96,8 @@ const loginFunc = async ({
|
|
|
82
96
|
});
|
|
83
97
|
}
|
|
84
98
|
|
|
85
|
-
const login = (urlOverride, suppressConsole) => loginFunc({ urlOverride, withExpiry: false, suppressConsole });
|
|
86
|
-
const loginWithExpiry = (urlOverride, suppressConsole) => loginFunc({ urlOverride, suppressConsole });
|
|
99
|
+
const login = ({ urlOverride, suppressConsole, credsOverride, tenantOverride } = {}) => loginFunc({ urlOverride, withExpiry: false, suppressConsole, credsOverride, tenantOverride });
|
|
100
|
+
const loginWithExpiry = ({ urlOverride, suppressConsole, credsOverride, tenantOverride } = {}) => loginFunc({ urlOverride, suppressConsole, credsOverride, tenantOverride });
|
|
87
101
|
|
|
88
102
|
export {
|
|
89
103
|
doALogin,
|
package/src/folioRequest.js
CHANGED
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import axios from 'axios';
|
|
2
2
|
import { getConsole } from './bruno-globals-provider.js';
|
|
3
|
+
import { getIgnoreCreds } from './auth/index.js';
|
|
3
4
|
const { doALogin } = require('./auth');
|
|
4
5
|
|
|
5
6
|
const { getBaseRequestConfig } = require('./utils');
|
|
@@ -7,22 +8,36 @@ const { getBaseRequestConfig } = require('./utils');
|
|
|
7
8
|
export const getFolioAxios = async ({
|
|
8
9
|
urlOverride = undefined,
|
|
9
10
|
withExpiry = true,
|
|
10
|
-
suppressConsole = true
|
|
11
|
+
suppressConsole = true,
|
|
12
|
+
credsOverride = undefined,
|
|
13
|
+
tenantOverride = undefined,
|
|
11
14
|
} = {}) => {
|
|
12
15
|
const logger = getConsole();
|
|
13
|
-
return doALogin({ urlOverride, withExpiry, suppressConsole }).then(loginResp => {
|
|
14
16
|
|
|
15
|
-
|
|
16
|
-
|
|
17
|
+
const config = getBaseRequestConfig({ tenantOverride });
|
|
18
|
+
const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
|
|
17
19
|
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
}
|
|
20
|
+
// Bypass login/token stuff for ignored credentials
|
|
21
|
+
if (ignoreCreds) {
|
|
22
|
+
!suppressConsole && logger.log("Ignoring credentials so returning a folioAxios without logging in: %o", config);
|
|
22
23
|
|
|
23
|
-
!suppressConsole && logger.log("folioRequest ready with config: %o", config);
|
|
24
24
|
return axios.create(config);
|
|
25
|
-
}
|
|
26
|
-
|
|
27
|
-
})
|
|
25
|
+
}
|
|
26
|
+
|
|
27
|
+
return doALogin({ urlOverride, withExpiry, suppressConsole, credsOverride, tenantOverride })
|
|
28
|
+
.then(loginResp => {
|
|
29
|
+
!suppressConsole && logger.log("folio login succeeded with response: %o", loginResp);
|
|
30
|
+
|
|
31
|
+
config.headers.Cookie = loginResp.headers["set-cookie"]
|
|
32
|
+
|
|
33
|
+
if (!withExpiry) {
|
|
34
|
+
// This is only populated on login, not login with expiry
|
|
35
|
+
config.headers['x-okapi-token'] = loginResp.headers["x-okapi-token"]
|
|
36
|
+
}
|
|
37
|
+
|
|
38
|
+
!suppressConsole && logger.log("folioRequest ready with config: %o", config);
|
|
39
|
+
return axios.create(config);
|
|
40
|
+
}).catch(err => {
|
|
41
|
+
logger.error("Failed to login to folio: %o", err)
|
|
42
|
+
})
|
|
28
43
|
}
|
package/src/utils/config.js
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
import { getTenant } from '../auth';
|
|
2
2
|
|
|
3
|
-
export const getBaseRequestConfig = () => {
|
|
4
|
-
const tenant = getTenant();
|
|
3
|
+
export const getBaseRequestConfig = ({ tenantOverride }) => {
|
|
4
|
+
const tenant = tenantOverride ?? getTenant();
|
|
5
5
|
return {
|
|
6
6
|
headers: {
|
|
7
7
|
"Content-type": "application/json",
|