files.com 1.0.116 → 1.0.121

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: fe8d365e0a6dd51ed1084b46bf345a2ea01ae8e43de58b8801f02ed029741c63
4
- data.tar.gz: 7c6b295051e88cf4b34099548c6a4993dd35a09e47cfe1a41eb622fd0e37b451
3
+ metadata.gz: afbaa52d35acc90caddf03f3591030a31497eafabc834d7a7e80a118b75b275c
4
+ data.tar.gz: 0d09ba83f3191475ad3b6f4f3e4832a99cecf378e7a8290b9ae86462f858dde5
5
5
  SHA512:
6
- metadata.gz: 5c9c94be4423c4ff4795a78bd08eadede1f94071eb86a556950086350bc187ab8ed8099daf5ef2b21ee327faa2bc3685dbeab9ffd8f1e24d1dd238481cfbd13d
7
- data.tar.gz: 90a29beb3d00210c2d3a88b26eaa4e28a40962aadeb7bbeab37a40e8b7673cd0242fb8b0df9d5c5b444b24298d622dd56138eec7ff84523427fc2817389c889c
6
+ metadata.gz: 2c8b2f614e56ec6d051a88ae44cf77fb7e62ccdee5f326364b9994ee2d8c3bb85d85a8ec0765cca2df3498eaea286874bfed4594289e628f1d891c09c7174e9a
7
+ data.tar.gz: c81352b474842a5b48e0e30ea708c67b506b42bfc4b9c26923728927459256fec710867588788f04431a1e60f6c5c5cec80f329fab1f78cec846876365800ba8
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.116
1
+ 1.0.121
@@ -156,7 +156,7 @@ Files::ApiKey.update(id,
156
156
  ## Delete current API key. (Requires current API connection to be using an API key.)
157
157
 
158
158
  ```
159
- Files::ApiKey.current(
159
+ Files::ApiKey.delete_current(
160
160
  format: "",
161
161
  api_key: ""
162
162
  )
@@ -12,10 +12,10 @@
12
12
  "max_connections": 1,
13
13
  "s3_bucket": "my-bucket",
14
14
  "s3_region": "us-east-1",
15
- "server_certificate": "[certificate]",
15
+ "server_certificate": "require_match",
16
16
  "server_host_key": "[public key]",
17
17
  "server_type": "s3",
18
- "ssl": "always",
18
+ "ssl": "if_available",
19
19
  "username": "user",
20
20
  "google_cloud_storage_bucket": "my-bucket",
21
21
  "google_cloud_storage_project_id": "my-project",
@@ -67,6 +67,7 @@
67
67
  * `aws_secret_key` (string): AWS secret key.
68
68
  * `password` (string): Password if needed.
69
69
  * `private_key` (string): Private key if needed.
70
+ * `ssl_certificate` (string): SSL client certificate.
70
71
  * `google_cloud_storage_credentials_json` (string): A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
71
72
  * `wasabi_access_key` (string): Wasabi access key.
72
73
  * `wasabi_secret_key` (string): Wasabi secret key.
@@ -122,10 +123,10 @@ Files::RemoteServer.create(
122
123
  port: 1,
123
124
  s3_bucket: "my-bucket",
124
125
  s3_region: "us-east-1",
125
- server_certificate: "[certificate]",
126
+ server_certificate: "require_match",
126
127
  server_host_key: "[public key]",
127
128
  server_type: "s3",
128
- ssl: "always",
129
+ ssl: "if_available",
129
130
  username: "user",
130
131
  google_cloud_storage_bucket: "my-bucket",
131
132
  google_cloud_storage_project_id: "my-project",
@@ -148,6 +149,7 @@ Files::RemoteServer.create(
148
149
  * `aws_secret_key` (string): AWS secret key.
149
150
  * `password` (string): Password if needed.
150
151
  * `private_key` (string): Private key if needed.
152
+ * `ssl_certificate` (string): SSL client certificate.
151
153
  * `google_cloud_storage_credentials_json` (string): A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
152
154
  * `wasabi_access_key` (string): Wasabi access key.
153
155
  * `wasabi_secret_key` (string): Wasabi secret key.
@@ -194,10 +196,10 @@ Files::RemoteServer.update(id,
194
196
  port: 1,
195
197
  s3_bucket: "my-bucket",
196
198
  s3_region: "us-east-1",
197
- server_certificate: "[certificate]",
199
+ server_certificate: "require_match",
198
200
  server_host_key: "[public key]",
199
201
  server_type: "s3",
200
- ssl: "always",
202
+ ssl: "if_available",
201
203
  username: "user",
202
204
  google_cloud_storage_bucket: "my-bucket",
203
205
  google_cloud_storage_project_id: "my-project",
@@ -221,6 +223,7 @@ Files::RemoteServer.update(id,
221
223
  * `aws_secret_key` (string): AWS secret key.
222
224
  * `password` (string): Password if needed.
223
225
  * `private_key` (string): Private key if needed.
226
+ * `ssl_certificate` (string): SSL client certificate.
224
227
  * `google_cloud_storage_credentials_json` (string): A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
225
228
  * `wasabi_access_key` (string): Wasabi access key.
226
229
  * `wasabi_secret_key` (string): Wasabi secret key.
@@ -282,10 +285,10 @@ remote_server.update(
282
285
  port: 1,
283
286
  s3_bucket: "my-bucket",
284
287
  s3_region: "us-east-1",
285
- server_certificate: "[certificate]",
288
+ server_certificate: "require_match",
286
289
  server_host_key: "[public key]",
287
290
  server_type: "s3",
288
- ssl: "always",
291
+ ssl: "if_available",
289
292
  username: "user",
290
293
  google_cloud_storage_bucket: "my-bucket",
291
294
  google_cloud_storage_project_id: "my-project",
@@ -309,6 +312,7 @@ remote_server.update(
309
312
  * `aws_secret_key` (string): AWS secret key.
310
313
  * `password` (string): Password if needed.
311
314
  * `private_key` (string): Private key if needed.
315
+ * `ssl_certificate` (string): SSL client certificate.
312
316
  * `google_cloud_storage_credentials_json` (string): A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
313
317
  * `wasabi_access_key` (string): Wasabi access key.
314
318
  * `wasabi_secret_key` (string): Wasabi secret key.
@@ -29,6 +29,7 @@
29
29
  "provision_group_exclusion": "Employees",
30
30
  "provision_group_inclusion": "Employees",
31
31
  "provision_group_required": "",
32
+ "provision_site_admin_groups": "Employees",
32
33
  "provision_attachments_permission": true,
33
34
  "provision_dav_permission": true,
34
35
  "provision_ftp_permission": true,
@@ -71,6 +72,7 @@
71
72
  * `provision_group_exclusion` (string): Comma-separated list of group names for groups (with optional wildcards) that will be excluded from auto-provisioning.
72
73
  * `provision_group_inclusion` (string): Comma-separated list of group names for groups (with optional wildcards) that will be auto-provisioned.
73
74
  * `provision_group_required` (string): Comma or newline separated list of group names (with optional wildcards) to require membership for user provisioning.
75
+ * `provision_site_admin_groups` (string): Comma-separated list of group names whose members will be created as Site Admins.
74
76
  * `provision_attachments_permission` (boolean): Auto-provisioned users get Sharing permission?
75
77
  * `provision_dav_permission` (boolean): Auto-provisioned users get WebDAV permission?
76
78
  * `provision_ftp_permission` (boolean): Auto-provisioned users get FTP permission?
@@ -38,7 +38,7 @@
38
38
  "password_validity_days": 1,
39
39
  "public_keys_count": 1,
40
40
  "receive_admin_alerts": true,
41
- "require_2fa": true,
41
+ "require_2fa": "always_require",
42
42
  "active_2fa": true,
43
43
  "require_password_change": true,
44
44
  "restapi_permission": true,
@@ -88,7 +88,7 @@
88
88
  * `password_validity_days` (int64): Number of days to allow user to use the same password
89
89
  * `public_keys_count` (int64): Number of public keys associated with this user
90
90
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
91
- * `require_2fa` (boolean): Is 2fa required to sign in?
91
+ * `require_2fa` (string): 2FA required setting
92
92
  * `active_2fa` (boolean): Is 2fa active for the user?
93
93
  * `require_password_change` (boolean): Is a password change required upon next user login?
94
94
  * `restapi_permission` (boolean): Can this user access the REST API?
@@ -200,6 +200,7 @@ Files::User.create(
200
200
  ssl_required: "always_require",
201
201
  sso_strategy_id: 1,
202
202
  subscribe_to_newsletter: true,
203
+ require_2fa: "always_require",
203
204
  time_zone: "Pacific Time (US & Canada)",
204
205
  username: "user"
205
206
  )
@@ -246,6 +247,7 @@ Files::User.create(
246
247
  * `ssl_required` (string): SSL required setting
247
248
  * `sso_strategy_id` (int64): SSO (Single Sign On) strategy ID for the user, if applicable.
248
249
  * `subscribe_to_newsletter` (boolean): Is the user subscribed to the newsletter?
250
+ * `require_2fa` (string): 2FA required setting
249
251
  * `time_zone` (string): User time zone
250
252
  * `user_root` (string): Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
251
253
  * `username` (string): User's username
@@ -328,6 +330,7 @@ Files::User.update(id,
328
330
  ssl_required: "always_require",
329
331
  sso_strategy_id: 1,
330
332
  subscribe_to_newsletter: true,
333
+ require_2fa: "always_require",
331
334
  time_zone: "Pacific Time (US & Canada)",
332
335
  username: "user"
333
336
  )
@@ -375,6 +378,7 @@ Files::User.update(id,
375
378
  * `ssl_required` (string): SSL required setting
376
379
  * `sso_strategy_id` (int64): SSO (Single Sign On) strategy ID for the user, if applicable.
377
380
  * `subscribe_to_newsletter` (boolean): Is the user subscribed to the newsletter?
381
+ * `require_2fa` (string): 2FA required setting
378
382
  * `time_zone` (string): User time zone
379
383
  * `user_root` (string): Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
380
384
  * `username` (string): User's username
@@ -478,6 +482,7 @@ user.update(
478
482
  ssl_required: "always_require",
479
483
  sso_strategy_id: 1,
480
484
  subscribe_to_newsletter: true,
485
+ require_2fa: "always_require",
481
486
  time_zone: "Pacific Time (US & Canada)",
482
487
  username: "user"
483
488
  )
@@ -525,6 +530,7 @@ user.update(
525
530
  * `ssl_required` (string): SSL required setting
526
531
  * `sso_strategy_id` (int64): SSO (Single Sign On) strategy ID for the user, if applicable.
527
532
  * `subscribe_to_newsletter` (boolean): Is the user subscribed to the newsletter?
533
+ * `require_2fa` (string): 2FA required setting
528
534
  * `time_zone` (string): User time zone
529
535
  * `user_root` (string): Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
530
536
  * `username` (string): User's username
@@ -257,7 +257,7 @@ module Files
257
257
  # Parameters:
258
258
  # format - string
259
259
  # api_key - object
260
- def self.current(params = {}, options = {})
260
+ def self.delete_current(params = {}, options = {})
261
261
  raise InvalidParameterError.new("Bad parameter: format must be an String") if params.dig(:format) and !params.dig(:format).is_a?(String)
262
262
  raise InvalidParameterError.new("Bad parameter: api_key must be an Hash") if params.dig(:api_key) and !params.dig(:api_key).is_a?(Hash)
263
263
 
@@ -297,6 +297,15 @@ module Files
297
297
  @attributes[:private_key] = value
298
298
  end
299
299
 
300
+ # string - SSL client certificate.
301
+ def ssl_certificate
302
+ @attributes[:ssl_certificate]
303
+ end
304
+
305
+ def ssl_certificate=(value)
306
+ @attributes[:ssl_certificate] = value
307
+ end
308
+
300
309
  # string - A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
301
310
  def google_cloud_storage_credentials_json
302
311
  @attributes[:google_cloud_storage_credentials_json]
@@ -374,6 +383,7 @@ module Files
374
383
  # aws_secret_key - string - AWS secret key.
375
384
  # password - string - Password if needed.
376
385
  # private_key - string - Private key if needed.
386
+ # ssl_certificate - string - SSL client certificate.
377
387
  # google_cloud_storage_credentials_json - string - A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
378
388
  # wasabi_access_key - string - Wasabi access key.
379
389
  # wasabi_secret_key - string - Wasabi secret key.
@@ -414,6 +424,7 @@ module Files
414
424
  raise InvalidParameterError.new("Bad parameter: aws_secret_key must be an String") if params.dig(:aws_secret_key) and !params.dig(:aws_secret_key).is_a?(String)
415
425
  raise InvalidParameterError.new("Bad parameter: password must be an String") if params.dig(:password) and !params.dig(:password).is_a?(String)
416
426
  raise InvalidParameterError.new("Bad parameter: private_key must be an String") if params.dig(:private_key) and !params.dig(:private_key).is_a?(String)
427
+ raise InvalidParameterError.new("Bad parameter: ssl_certificate must be an String") if params.dig(:ssl_certificate) and !params.dig(:ssl_certificate).is_a?(String)
417
428
  raise InvalidParameterError.new("Bad parameter: google_cloud_storage_credentials_json must be an String") if params.dig(:google_cloud_storage_credentials_json) and !params.dig(:google_cloud_storage_credentials_json).is_a?(String)
418
429
  raise InvalidParameterError.new("Bad parameter: wasabi_access_key must be an String") if params.dig(:wasabi_access_key) and !params.dig(:wasabi_access_key).is_a?(String)
419
430
  raise InvalidParameterError.new("Bad parameter: wasabi_secret_key must be an String") if params.dig(:wasabi_secret_key) and !params.dig(:wasabi_secret_key).is_a?(String)
@@ -513,6 +524,7 @@ module Files
513
524
  # aws_secret_key - string - AWS secret key.
514
525
  # password - string - Password if needed.
515
526
  # private_key - string - Private key if needed.
527
+ # ssl_certificate - string - SSL client certificate.
516
528
  # google_cloud_storage_credentials_json - string - A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
517
529
  # wasabi_access_key - string - Wasabi access key.
518
530
  # wasabi_secret_key - string - Wasabi secret key.
@@ -549,6 +561,7 @@ module Files
549
561
  raise InvalidParameterError.new("Bad parameter: aws_secret_key must be an String") if params.dig(:aws_secret_key) and !params.dig(:aws_secret_key).is_a?(String)
550
562
  raise InvalidParameterError.new("Bad parameter: password must be an String") if params.dig(:password) and !params.dig(:password).is_a?(String)
551
563
  raise InvalidParameterError.new("Bad parameter: private_key must be an String") if params.dig(:private_key) and !params.dig(:private_key).is_a?(String)
564
+ raise InvalidParameterError.new("Bad parameter: ssl_certificate must be an String") if params.dig(:ssl_certificate) and !params.dig(:ssl_certificate).is_a?(String)
552
565
  raise InvalidParameterError.new("Bad parameter: google_cloud_storage_credentials_json must be an String") if params.dig(:google_cloud_storage_credentials_json) and !params.dig(:google_cloud_storage_credentials_json).is_a?(String)
553
566
  raise InvalidParameterError.new("Bad parameter: wasabi_access_key must be an String") if params.dig(:wasabi_access_key) and !params.dig(:wasabi_access_key).is_a?(String)
554
567
  raise InvalidParameterError.new("Bad parameter: wasabi_secret_key must be an String") if params.dig(:wasabi_secret_key) and !params.dig(:wasabi_secret_key).is_a?(String)
@@ -589,6 +602,7 @@ module Files
589
602
  # aws_secret_key - string - AWS secret key.
590
603
  # password - string - Password if needed.
591
604
  # private_key - string - Private key if needed.
605
+ # ssl_certificate - string - SSL client certificate.
592
606
  # google_cloud_storage_credentials_json - string - A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
593
607
  # wasabi_access_key - string - Wasabi access key.
594
608
  # wasabi_secret_key - string - Wasabi secret key.
@@ -628,6 +642,7 @@ module Files
628
642
  raise InvalidParameterError.new("Bad parameter: aws_secret_key must be an String") if params.dig(:aws_secret_key) and !params.dig(:aws_secret_key).is_a?(String)
629
643
  raise InvalidParameterError.new("Bad parameter: password must be an String") if params.dig(:password) and !params.dig(:password).is_a?(String)
630
644
  raise InvalidParameterError.new("Bad parameter: private_key must be an String") if params.dig(:private_key) and !params.dig(:private_key).is_a?(String)
645
+ raise InvalidParameterError.new("Bad parameter: ssl_certificate must be an String") if params.dig(:ssl_certificate) and !params.dig(:ssl_certificate).is_a?(String)
631
646
  raise InvalidParameterError.new("Bad parameter: google_cloud_storage_credentials_json must be an String") if params.dig(:google_cloud_storage_credentials_json) and !params.dig(:google_cloud_storage_credentials_json).is_a?(String)
632
647
  raise InvalidParameterError.new("Bad parameter: wasabi_access_key must be an String") if params.dig(:wasabi_access_key) and !params.dig(:wasabi_access_key).is_a?(String)
633
648
  raise InvalidParameterError.new("Bad parameter: wasabi_secret_key must be an String") if params.dig(:wasabi_secret_key) and !params.dig(:wasabi_secret_key).is_a?(String)
@@ -124,6 +124,11 @@ module Files
124
124
  @attributes[:provision_group_required]
125
125
  end
126
126
 
127
+ # string - Comma-separated list of group names whose members will be created as Site Admins.
128
+ def provision_site_admin_groups
129
+ @attributes[:provision_site_admin_groups]
130
+ end
131
+
127
132
  # boolean - Auto-provisioned users get Sharing permission?
128
133
  def provision_attachments_permission
129
134
  @attributes[:provision_attachments_permission]
@@ -293,7 +293,7 @@ module Files
293
293
  @attributes[:receive_admin_alerts] = value
294
294
  end
295
295
 
296
- # boolean - Is 2fa required to sign in?
296
+ # string - 2FA required setting
297
297
  def require_2fa
298
298
  @attributes[:require_2fa]
299
299
  end
@@ -582,6 +582,7 @@ module Files
582
582
  # ssl_required - string - SSL required setting
583
583
  # sso_strategy_id - int64 - SSO (Single Sign On) strategy ID for the user, if applicable.
584
584
  # subscribe_to_newsletter - boolean - Is the user subscribed to the newsletter?
585
+ # require_2fa - string - 2FA required setting
585
586
  # time_zone - string - User time zone
586
587
  # user_root - string - Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
587
588
  # username - string - User's username
@@ -610,6 +611,7 @@ module Files
610
611
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params.dig(:password_validity_days) and !params.dig(:password_validity_days).is_a?(Integer)
611
612
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params.dig(:ssl_required) and !params.dig(:ssl_required).is_a?(String)
612
613
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params.dig(:sso_strategy_id) and !params.dig(:sso_strategy_id).is_a?(Integer)
614
+ raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params.dig(:require_2fa) and !params.dig(:require_2fa).is_a?(String)
613
615
  raise InvalidParameterError.new("Bad parameter: time_zone must be an String") if params.dig(:time_zone) and !params.dig(:time_zone).is_a?(String)
614
616
  raise InvalidParameterError.new("Bad parameter: user_root must be an String") if params.dig(:user_root) and !params.dig(:user_root).is_a?(String)
615
617
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
@@ -742,6 +744,7 @@ module Files
742
744
  # ssl_required - string - SSL required setting
743
745
  # sso_strategy_id - int64 - SSO (Single Sign On) strategy ID for the user, if applicable.
744
746
  # subscribe_to_newsletter - boolean - Is the user subscribed to the newsletter?
747
+ # require_2fa - string - 2FA required setting
745
748
  # time_zone - string - User time zone
746
749
  # user_root - string - Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
747
750
  # username - string - User's username
@@ -766,6 +769,7 @@ module Files
766
769
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params.dig(:password_validity_days) and !params.dig(:password_validity_days).is_a?(Integer)
767
770
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params.dig(:ssl_required) and !params.dig(:ssl_required).is_a?(String)
768
771
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params.dig(:sso_strategy_id) and !params.dig(:sso_strategy_id).is_a?(Integer)
772
+ raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params.dig(:require_2fa) and !params.dig(:require_2fa).is_a?(String)
769
773
  raise InvalidParameterError.new("Bad parameter: time_zone must be an String") if params.dig(:time_zone) and !params.dig(:time_zone).is_a?(String)
770
774
  raise InvalidParameterError.new("Bad parameter: user_root must be an String") if params.dig(:user_root) and !params.dig(:user_root).is_a?(String)
771
775
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
@@ -847,6 +851,7 @@ module Files
847
851
  # ssl_required - string - SSL required setting
848
852
  # sso_strategy_id - int64 - SSO (Single Sign On) strategy ID for the user, if applicable.
849
853
  # subscribe_to_newsletter - boolean - Is the user subscribed to the newsletter?
854
+ # require_2fa - string - 2FA required setting
850
855
  # time_zone - string - User time zone
851
856
  # user_root - string - Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
852
857
  # username - string - User's username
@@ -874,6 +879,7 @@ module Files
874
879
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params.dig(:password_validity_days) and !params.dig(:password_validity_days).is_a?(Integer)
875
880
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params.dig(:ssl_required) and !params.dig(:ssl_required).is_a?(String)
876
881
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params.dig(:sso_strategy_id) and !params.dig(:sso_strategy_id).is_a?(Integer)
882
+ raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params.dig(:require_2fa) and !params.dig(:require_2fa).is_a?(String)
877
883
  raise InvalidParameterError.new("Bad parameter: time_zone must be an String") if params.dig(:time_zone) and !params.dig(:time_zone).is_a?(String)
878
884
  raise InvalidParameterError.new("Bad parameter: user_root must be an String") if params.dig(:user_root) and !params.dig(:user_root).is_a?(String)
879
885
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.116
4
+ version: 1.0.121
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-09-25 00:00:00.000000000 Z
11
+ date: 2020-10-26 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable