@k-int/bruno-shared-scripts 2.0.0 → 2.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,3 +1,10 @@
1
+ ## [2.0.1](https://gitlab.com/knowledge-integration/bruno/bruno-shared-scripts/compare/v2.0.0...v2.0.1) (2026-01-16)
2
+
3
+
4
+ ### Bug Fixes
5
+
6
+ * Improvements to login and folioAxios to allow for connecting to a DIFFERENT folio within the pre request scripts ([5acea6e](https://gitlab.com/knowledge-integration/bruno/bruno-shared-scripts/commit/5acea6ec44aefa3fce84f75454908974fdb23f42))
7
+
1
8
  # [2.0.0](https://gitlab.com/knowledge-integration/bruno/bruno-shared-scripts/compare/v1.2.1...v2.0.0) (2026-01-12)
2
9
 
3
10
 
package/README.md CHANGED
@@ -0,0 +1,94 @@
1
+ # Bruno shared scripts
2
+
3
+ This is a public NPM module dedicated to any shared behaviour required across varying collections in Bruno. For now it
4
+ focuses mostly on connecting to a
5
+ remote FOLIO instance and managing FOLIO headers, but there is nothing tying this module to only serving those purposes.
6
+
7
+ ## Motivation
8
+
9
+ Analogous to Postman's shared scripts cloud library, Bruno instead allows ANY NPM to be imported (In developer mode, via
10
+ `require`) and used within pre/post
11
+ request scripts. This is significantly more powerful and open, and allows us to publish the module onto the public NPM
12
+ with strict versioning and be more in
13
+ control.
14
+
15
+ ## Setup
16
+
17
+ To use the shared scripts within a collection, simply import and initialise them.
18
+
19
+ ```javascript
20
+ const {
21
+ init,
22
+ } = require('@k-int/bruno-shared-scripts');
23
+
24
+ init({
25
+ bruInstance: bru,
26
+ logger: console,
27
+ requestInstance: req
28
+ })
29
+ ```
30
+
31
+ This init is a new requirement for Bruno V3, as the virtual environment the scripts are running in have now been
32
+ configured in such a way that third party modules do not get access to the globals previously available (bru, req),
33
+ and access to the console in Bruno's developer tools is ALSO siloed.
34
+
35
+ To combat this, `init` at the collection level in the pre-request script will ensure that the module is able to
36
+ access the functionality.
37
+
38
+ ## How it works
39
+ The module is developed as an ES module, but needs to be built for publishing. This happens via the `npm run build`.
40
+ This will overwrite the `es` directory, creating a single `index.js` file that can then be required by Bruno scripts.
41
+
42
+ ## Development
43
+
44
+ Since this is an NPM, and Bruno collections can be built with NPM using a package.json, this _can_ be run in a
45
+ workspace for "easy" development. However developing this module is not completely straightforward, and can take a while
46
+
47
+ ### Working in a workspace
48
+ If working in an NPM workspace, as per [bienenvolk-bruno-workspace](https://gitlab.com/knowledge-integration/bruno/bienenvolk-bruno-workspace),
49
+ then the development process is:
50
+ - Make changes to shared scripts
51
+ - Run `build`
52
+ - Restart Bruno GUI
53
+ - IMPORTANT, Bruno caches the NPMs it's using per session, so any changes will NOT be visible until a restart
54
+ - Run request
55
+ - Go back to step 1
56
+
57
+ ### Working without a workspace
58
+ The development process is largely the same as working in a workspace, with the only difference being that the
59
+ version will need to point at the newest version
60
+
61
+ - Edit Bruno collection package.json to point the bruno-shared-scripts at `file:path/to/file`
62
+ - Run `build` for shared scripts
63
+ - clean `npm install` in the collection (Delete package lock and node_modules to be sure)
64
+ - Restart Bruno GUI
65
+ - IMPORTANT, Bruno caches the NPMs it's using per session, so any changes will NOT be visible until a restart
66
+ - Run request
67
+ - Go back to step 2
68
+
69
+ And finally remembering to revert the version pointer at the end when the fixed shared-scripts have been published.
70
+
71
+ ### Bruno globals
72
+ As of Bruno V3, access to `bru`, `req` and `console` will no longer behave as expected within a shared NPM. The
73
+ solution to this is (for now) a file called `bruno-globals-provider`. This sets up a `setGlobals` method which in
74
+ turn is used by init (I wanted to keep the globals setter separate from the init in case we have side effects down
75
+ the road).
76
+
77
+ Then in each helper method, the requisite getter(s) can be used:
78
+
79
+ ```javascript
80
+ import { getBru, getConsole, getReq } from '../bruno-globals-provider.js';
81
+
82
+ const helloWorld = () => {
83
+ const bru = getBru();
84
+ const logger = getConsole();
85
+ const req = getReq();
86
+
87
+ logger.log("Hello world");
88
+ logger.log("Request: %o", req);
89
+
90
+ logger.log("Access Bruno functionality: %o", bru.getEnv("FAKE_ENVIRONMENT_VARIABLE"));
91
+ }
92
+ ```
93
+
94
+ Should post-request script helpers be needed, this will need to be extended to include `res` as well.
package/es/index.js CHANGED
@@ -91,7 +91,7 @@ var init_auth_utils = __esm({
91
91
  };
92
92
  getIgnoreCreds = () => {
93
93
  const bru = getBru();
94
- return bru.getEnvVar("ignoreCreds");
94
+ return bru.getEnvVar("ignoreCredentials");
95
95
  };
96
96
  getUserName = () => {
97
97
  const bru = getBru();
@@ -131,53 +131,62 @@ var init_login = __esm({
131
131
  doALogin = async ({
132
132
  urlOverride = void 0,
133
133
  withExpiry = true,
134
- suppressConsole = true
134
+ suppressConsole = true,
135
+ credsOverride = void 0,
136
+ tenantOverride = void 0
135
137
  } = {}) => {
136
138
  const logger2 = getConsole();
137
139
  const req = getReq();
140
+ const theTenant = tenantOverride ?? getTenant();
138
141
  !suppressConsole && logger2.log(`doALogin(${urlOverride}, ${withExpiry}, ${suppressConsole})`);
139
- const ignoreCreds = getIgnoreCreds();
142
+ const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
140
143
  const preExistingHeaders = req.getHeaders();
141
144
  const preExistingTenant = preExistingHeaders[Object.keys(preExistingHeaders).find((key) => key.toLowerCase() === "X-Okapi-Tenant".toLowerCase())];
142
145
  if (!preExistingTenant) {
143
- req.setHeader("x-okapi-tenant", getTenant());
146
+ req.setHeader("x-okapi-tenant", theTenant);
144
147
  }
145
148
  if (!ignoreCreds || ignoreCreds === false) {
146
149
  const url = urlOverride ?? (withExpiry ? getLoginWithExpiryUrl() : getLoginUrl());
147
- const creds = getCreds();
148
- const tenant = getTenant();
149
- const config = getBaseRequestConfig();
150
- !suppressConsole && logger2.log(`Sending login request to ${url} with creds ${JSON.stringify(creds)} for tenant: ${tenant}`);
150
+ const creds = credsOverride ?? getCreds();
151
+ const config = getBaseRequestConfig({ tenantOverride });
152
+ !suppressConsole && logger2.log(`Sending login request to ${url} with creds ${JSON.stringify(creds)} for tenant: ${theTenant}, and config: ${JSON.stringify(config)}`);
151
153
  return await axios.post(
152
154
  url,
153
155
  creds,
154
156
  config
155
157
  );
158
+ } else {
159
+ !suppressConsole && logger2.log(`Skipping login as ignoreCredentials is set to true`);
156
160
  }
157
161
  };
158
162
  loginFunc = async ({
159
163
  urlOverride = void 0,
160
164
  withExpiry = true,
161
- suppressConsole = true
165
+ suppressConsole = true,
166
+ credsOverride = void 0,
167
+ tenantOverride = void 0
162
168
  } = {}) => {
163
169
  const logger2 = getConsole();
164
170
  const bru = getBru();
165
171
  const req = getReq();
166
172
  !suppressConsole && logger2.log(`loginFunc(${urlOverride}, ${withExpiry}, ${suppressConsole})`);
167
- await doALogin({ req, urlOverride, withExpiry, suppressConsole }).then((loginResp) => {
168
- !suppressConsole && logger2.log("Setting request headers...");
169
- req.setHeader("Cookie", loginResp.headers["set-cookie"]);
170
- const token = loginResp.headers["x-okapi-token"];
171
- bru.setVar("x-okapi-token-value", token);
172
- if (!withExpiry) {
173
- req.setHeader("x-okapi-token", getToken());
173
+ await doALogin({ req, urlOverride, withExpiry, suppressConsole, credsOverride, tenantOverride }).then((loginResp) => {
174
+ const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
175
+ if (!ignoreCreds || ignoreCreds === false) {
176
+ !suppressConsole && logger2.log("Setting request headers...");
177
+ req.setHeader("Cookie", loginResp.headers["set-cookie"]);
178
+ const token = loginResp.headers["x-okapi-token"];
179
+ bru.setVar("x-okapi-token-value", token);
180
+ if (!withExpiry) {
181
+ req.setHeader("x-okapi-token", getToken());
182
+ }
174
183
  }
175
184
  }).catch((err) => {
176
185
  logger2.error("Failed to login to folio: %o", err);
177
186
  });
178
187
  };
179
- login = (urlOverride, suppressConsole) => loginFunc({ urlOverride, withExpiry: false, suppressConsole });
180
- loginWithExpiry = (urlOverride, suppressConsole) => loginFunc({ urlOverride, suppressConsole });
188
+ login = ({ urlOverride, suppressConsole, credsOverride, tenantOverride } = {}) => loginFunc({ urlOverride, withExpiry: false, suppressConsole, credsOverride, tenantOverride });
189
+ loginWithExpiry = ({ urlOverride, suppressConsole, credsOverride, tenantOverride } = {}) => loginFunc({ urlOverride, suppressConsole, credsOverride, tenantOverride });
181
190
  }
182
191
  });
183
192
 
@@ -208,8 +217,8 @@ var getBaseRequestConfig;
208
217
  var init_config = __esm({
209
218
  "src/utils/config.js"() {
210
219
  init_auth();
211
- getBaseRequestConfig = () => {
212
- const tenant = getTenant();
220
+ getBaseRequestConfig = ({ tenantOverride }) => {
221
+ const tenant = tenantOverride ?? getTenant();
213
222
  return {
214
223
  headers: {
215
224
  "Content-type": "application/json",
@@ -241,17 +250,26 @@ init_auth();
241
250
 
242
251
  // src/folioRequest.js
243
252
  init_bruno_globals_provider();
253
+ init_auth();
244
254
  import axios2 from "axios";
245
255
  var { doALogin: doALogin2 } = (init_auth(), __toCommonJS(auth_exports));
246
256
  var { getBaseRequestConfig: getBaseRequestConfig2 } = (init_utils(), __toCommonJS(utils_exports));
247
257
  var getFolioAxios = async ({
248
258
  urlOverride = void 0,
249
259
  withExpiry = true,
250
- suppressConsole = true
260
+ suppressConsole = true,
261
+ credsOverride = void 0,
262
+ tenantOverride = void 0
251
263
  } = {}) => {
252
264
  const logger2 = getConsole();
253
- return doALogin2({ urlOverride, withExpiry, suppressConsole }).then((loginResp) => {
254
- const config = getBaseRequestConfig2();
265
+ const config = getBaseRequestConfig2({ tenantOverride });
266
+ const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
267
+ if (ignoreCreds) {
268
+ !suppressConsole && logger2.log("Ignoring credentials so returning a folioAxios without logging in: %o", config);
269
+ return axios2.create(config);
270
+ }
271
+ return doALogin2({ urlOverride, withExpiry, suppressConsole, credsOverride, tenantOverride }).then((loginResp) => {
272
+ !suppressConsole && logger2.log("folio login succeeded with response: %o", loginResp);
255
273
  config.headers.Cookie = loginResp.headers["set-cookie"];
256
274
  if (!withExpiry) {
257
275
  config.headers["x-okapi-token"] = loginResp.headers["x-okapi-token"];
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@k-int/bruno-shared-scripts",
3
- "version": "2.0.0",
3
+ "version": "2.0.1",
4
4
  "exports": "./es/index.js",
5
5
  "main": "src/index.js",
6
6
  "type": "module",
@@ -15,7 +15,7 @@ const getToken = () => {
15
15
  const getIgnoreCreds = () => {
16
16
  const bru = getBru();
17
17
 
18
- return bru.getEnvVar("ignoreCreds")
18
+ return bru.getEnvVar("ignoreCredentials")
19
19
  }
20
20
 
21
21
  const getUserName = () => {
package/src/auth/login.js CHANGED
@@ -19,13 +19,17 @@ const getLoginUrl = () => {
19
19
  const doALogin = async ({
20
20
  urlOverride = undefined,
21
21
  withExpiry = true,
22
- suppressConsole = true
22
+ suppressConsole = true,
23
+ credsOverride = undefined,
24
+ tenantOverride = undefined
23
25
  } = {}) => {
24
26
  const logger = getConsole();
25
27
  const req = getReq();
26
28
 
29
+ const theTenant = tenantOverride ?? getTenant();
30
+
27
31
  !suppressConsole && logger.log(`doALogin(${urlOverride}, ${withExpiry}, ${suppressConsole})`);
28
- const ignoreCreds = getIgnoreCreds();
32
+ const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
29
33
  //console.log("URL OVERRIDE: %o", urlOverride)
30
34
 
31
35
  // Ensure that x-okapi-tenant is set if NOT set by request
@@ -35,46 +39,56 @@ const doALogin = async ({
35
39
  ] // Make sure this is case insensitive
36
40
 
37
41
  if (!preExistingTenant) {
38
- req.setHeader('x-okapi-tenant', getTenant()) // Keep an eye on this in PM we needed some funky stuff for "disabled" headers
42
+ req.setHeader('x-okapi-tenant', theTenant) // Keep an eye on this in PM we needed some funky stuff for "disabled" headers
39
43
  }
44
+
40
45
  // Way to ignore creds for local endpoints
41
46
  if (!ignoreCreds || ignoreCreds === false) {
42
47
  const url = urlOverride ?? (withExpiry ? getLoginWithExpiryUrl() : getLoginUrl());
43
- const creds = getCreds();
44
- const tenant = getTenant();
45
- const config = getBaseRequestConfig();
46
- !suppressConsole && logger.log(`Sending login request to ${url} with creds ${JSON.stringify(creds)} for tenant: ${tenant}`);
48
+ const creds = credsOverride ?? getCreds();
49
+ const config = getBaseRequestConfig({ tenantOverride });
50
+
51
+ !suppressConsole && logger.log(`Sending login request to ${url} with creds ${JSON.stringify(creds)} for tenant: ${theTenant}, and config: ${JSON.stringify(config)}`);
47
52
 
48
53
  return await axios.post(
49
54
  url,
50
55
  creds,
51
56
  config
52
- )
57
+ );
58
+ } else {
59
+ !suppressConsole && logger.log(`Skipping login as ignoreCredentials is set to true`);
53
60
  }
54
61
  }
55
62
 
56
63
  const loginFunc = async ({
57
64
  urlOverride = undefined,
58
65
  withExpiry = true,
59
- suppressConsole = true
66
+ suppressConsole = true,
67
+ credsOverride = undefined,
68
+ tenantOverride = undefined,
60
69
  } = {}) => {
61
70
  const logger = getConsole();
62
71
  const bru = getBru();
63
72
  const req = getReq();
64
73
 
65
74
  !suppressConsole && logger.log(`loginFunc(${urlOverride}, ${withExpiry}, ${suppressConsole})`);
66
- await doALogin({ req, urlOverride, withExpiry, suppressConsole })
75
+
76
+ await doALogin({ req, urlOverride, withExpiry, suppressConsole, credsOverride, tenantOverride })
67
77
  .then((loginResp) => {
68
- !suppressConsole && logger.log("Setting request headers...")
69
- // We can't seem to set the cookie jar programatically, so directly set cookies on request instead
70
- req.setHeader('Cookie', loginResp.headers["set-cookie"])
78
+ const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
79
+
80
+ if (!ignoreCreds || ignoreCreds === false) {
81
+ !suppressConsole && logger.log("Setting request headers...")
82
+ // We can't seem to set the cookie jar programatically, so directly set cookies on request instead
83
+ req.setHeader('Cookie', loginResp.headers["set-cookie"])
71
84
 
72
- const token = loginResp.headers["x-okapi-token"]
73
- bru.setVar("x-okapi-token-value", token)
85
+ const token = loginResp.headers["x-okapi-token"]
86
+ bru.setVar("x-okapi-token-value", token)
74
87
 
75
- if (!withExpiry) {
76
- // This is only populated on login, not login with expiry
77
- req.setHeader('x-okapi-token', getToken())
88
+ if (!withExpiry) {
89
+ // This is only populated on login, not login with expiry
90
+ req.setHeader('x-okapi-token', getToken())
91
+ }
78
92
  }
79
93
  })
80
94
  .catch(err => {
@@ -82,8 +96,8 @@ const loginFunc = async ({
82
96
  });
83
97
  }
84
98
 
85
- const login = (urlOverride, suppressConsole) => loginFunc({ urlOverride, withExpiry: false, suppressConsole });
86
- const loginWithExpiry = (urlOverride, suppressConsole) => loginFunc({ urlOverride, suppressConsole });
99
+ const login = ({ urlOverride, suppressConsole, credsOverride, tenantOverride } = {}) => loginFunc({ urlOverride, withExpiry: false, suppressConsole, credsOverride, tenantOverride });
100
+ const loginWithExpiry = ({ urlOverride, suppressConsole, credsOverride, tenantOverride } = {}) => loginFunc({ urlOverride, suppressConsole, credsOverride, tenantOverride });
87
101
 
88
102
  export {
89
103
  doALogin,
@@ -1,5 +1,6 @@
1
1
  import axios from 'axios';
2
2
  import { getConsole } from './bruno-globals-provider.js';
3
+ import { getIgnoreCreds } from './auth/index.js';
3
4
  const { doALogin } = require('./auth');
4
5
 
5
6
  const { getBaseRequestConfig } = require('./utils');
@@ -7,22 +8,36 @@ const { getBaseRequestConfig } = require('./utils');
7
8
  export const getFolioAxios = async ({
8
9
  urlOverride = undefined,
9
10
  withExpiry = true,
10
- suppressConsole = true
11
+ suppressConsole = true,
12
+ credsOverride = undefined,
13
+ tenantOverride = undefined,
11
14
  } = {}) => {
12
15
  const logger = getConsole();
13
- return doALogin({ urlOverride, withExpiry, suppressConsole }).then(loginResp => {
14
16
 
15
- const config = getBaseRequestConfig()
16
- config.headers.Cookie = loginResp.headers["set-cookie"]
17
+ const config = getBaseRequestConfig({ tenantOverride });
18
+ const ignoreCreds = !!credsOverride ? false : getIgnoreCreds();
17
19
 
18
- if (!withExpiry) {
19
- // This is only populated on login, not login with expiry
20
- config.headers['x-okapi-token'] = loginResp.headers["x-okapi-token"]
21
- }
20
+ // Bypass login/token stuff for ignored credentials
21
+ if (ignoreCreds) {
22
+ !suppressConsole && logger.log("Ignoring credentials so returning a folioAxios without logging in: %o", config);
22
23
 
23
- !suppressConsole && logger.log("folioRequest ready with config: %o", config);
24
24
  return axios.create(config);
25
- }).catch(err => {
26
- logger.error("Failed to login to folio: %o", err)
27
- })
25
+ }
26
+
27
+ return doALogin({ urlOverride, withExpiry, suppressConsole, credsOverride, tenantOverride })
28
+ .then(loginResp => {
29
+ !suppressConsole && logger.log("folio login succeeded with response: %o", loginResp);
30
+
31
+ config.headers.Cookie = loginResp.headers["set-cookie"]
32
+
33
+ if (!withExpiry) {
34
+ // This is only populated on login, not login with expiry
35
+ config.headers['x-okapi-token'] = loginResp.headers["x-okapi-token"]
36
+ }
37
+
38
+ !suppressConsole && logger.log("folioRequest ready with config: %o", config);
39
+ return axios.create(config);
40
+ }).catch(err => {
41
+ logger.error("Failed to login to folio: %o", err)
42
+ })
28
43
  }
@@ -1,7 +1,7 @@
1
1
  import { getTenant } from '../auth';
2
2
 
3
- export const getBaseRequestConfig = () => {
4
- const tenant = getTenant();
3
+ export const getBaseRequestConfig = ({ tenantOverride }) => {
4
+ const tenant = tenantOverride ?? getTenant();
5
5
  return {
6
6
  headers: {
7
7
  "Content-type": "application/json",