files.com 1.0.116 → 1.0.121
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/api_key.md +1 -1
- data/docs/remote_server.md +12 -8
- data/docs/sso_strategy.md +2 -0
- data/docs/user.md +8 -2
- data/lib/files.com/models/api_key.rb +1 -1
- data/lib/files.com/models/remote_server.rb +15 -0
- data/lib/files.com/models/sso_strategy.rb +5 -0
- data/lib/files.com/models/user.rb +7 -1
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: afbaa52d35acc90caddf03f3591030a31497eafabc834d7a7e80a118b75b275c
|
|
4
|
+
data.tar.gz: 0d09ba83f3191475ad3b6f4f3e4832a99cecf378e7a8290b9ae86462f858dde5
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 2c8b2f614e56ec6d051a88ae44cf77fb7e62ccdee5f326364b9994ee2d8c3bb85d85a8ec0765cca2df3498eaea286874bfed4594289e628f1d891c09c7174e9a
|
|
7
|
+
data.tar.gz: c81352b474842a5b48e0e30ea708c67b506b42bfc4b9c26923728927459256fec710867588788f04431a1e60f6c5c5cec80f329fab1f78cec846876365800ba8
|
data/_VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.0.
|
|
1
|
+
1.0.121
|
data/docs/api_key.md
CHANGED
data/docs/remote_server.md
CHANGED
|
@@ -12,10 +12,10 @@
|
|
|
12
12
|
"max_connections": 1,
|
|
13
13
|
"s3_bucket": "my-bucket",
|
|
14
14
|
"s3_region": "us-east-1",
|
|
15
|
-
"server_certificate": "
|
|
15
|
+
"server_certificate": "require_match",
|
|
16
16
|
"server_host_key": "[public key]",
|
|
17
17
|
"server_type": "s3",
|
|
18
|
-
"ssl": "
|
|
18
|
+
"ssl": "if_available",
|
|
19
19
|
"username": "user",
|
|
20
20
|
"google_cloud_storage_bucket": "my-bucket",
|
|
21
21
|
"google_cloud_storage_project_id": "my-project",
|
|
@@ -67,6 +67,7 @@
|
|
|
67
67
|
* `aws_secret_key` (string): AWS secret key.
|
|
68
68
|
* `password` (string): Password if needed.
|
|
69
69
|
* `private_key` (string): Private key if needed.
|
|
70
|
+
* `ssl_certificate` (string): SSL client certificate.
|
|
70
71
|
* `google_cloud_storage_credentials_json` (string): A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
|
|
71
72
|
* `wasabi_access_key` (string): Wasabi access key.
|
|
72
73
|
* `wasabi_secret_key` (string): Wasabi secret key.
|
|
@@ -122,10 +123,10 @@ Files::RemoteServer.create(
|
|
|
122
123
|
port: 1,
|
|
123
124
|
s3_bucket: "my-bucket",
|
|
124
125
|
s3_region: "us-east-1",
|
|
125
|
-
server_certificate: "
|
|
126
|
+
server_certificate: "require_match",
|
|
126
127
|
server_host_key: "[public key]",
|
|
127
128
|
server_type: "s3",
|
|
128
|
-
ssl: "
|
|
129
|
+
ssl: "if_available",
|
|
129
130
|
username: "user",
|
|
130
131
|
google_cloud_storage_bucket: "my-bucket",
|
|
131
132
|
google_cloud_storage_project_id: "my-project",
|
|
@@ -148,6 +149,7 @@ Files::RemoteServer.create(
|
|
|
148
149
|
* `aws_secret_key` (string): AWS secret key.
|
|
149
150
|
* `password` (string): Password if needed.
|
|
150
151
|
* `private_key` (string): Private key if needed.
|
|
152
|
+
* `ssl_certificate` (string): SSL client certificate.
|
|
151
153
|
* `google_cloud_storage_credentials_json` (string): A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
|
|
152
154
|
* `wasabi_access_key` (string): Wasabi access key.
|
|
153
155
|
* `wasabi_secret_key` (string): Wasabi secret key.
|
|
@@ -194,10 +196,10 @@ Files::RemoteServer.update(id,
|
|
|
194
196
|
port: 1,
|
|
195
197
|
s3_bucket: "my-bucket",
|
|
196
198
|
s3_region: "us-east-1",
|
|
197
|
-
server_certificate: "
|
|
199
|
+
server_certificate: "require_match",
|
|
198
200
|
server_host_key: "[public key]",
|
|
199
201
|
server_type: "s3",
|
|
200
|
-
ssl: "
|
|
202
|
+
ssl: "if_available",
|
|
201
203
|
username: "user",
|
|
202
204
|
google_cloud_storage_bucket: "my-bucket",
|
|
203
205
|
google_cloud_storage_project_id: "my-project",
|
|
@@ -221,6 +223,7 @@ Files::RemoteServer.update(id,
|
|
|
221
223
|
* `aws_secret_key` (string): AWS secret key.
|
|
222
224
|
* `password` (string): Password if needed.
|
|
223
225
|
* `private_key` (string): Private key if needed.
|
|
226
|
+
* `ssl_certificate` (string): SSL client certificate.
|
|
224
227
|
* `google_cloud_storage_credentials_json` (string): A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
|
|
225
228
|
* `wasabi_access_key` (string): Wasabi access key.
|
|
226
229
|
* `wasabi_secret_key` (string): Wasabi secret key.
|
|
@@ -282,10 +285,10 @@ remote_server.update(
|
|
|
282
285
|
port: 1,
|
|
283
286
|
s3_bucket: "my-bucket",
|
|
284
287
|
s3_region: "us-east-1",
|
|
285
|
-
server_certificate: "
|
|
288
|
+
server_certificate: "require_match",
|
|
286
289
|
server_host_key: "[public key]",
|
|
287
290
|
server_type: "s3",
|
|
288
|
-
ssl: "
|
|
291
|
+
ssl: "if_available",
|
|
289
292
|
username: "user",
|
|
290
293
|
google_cloud_storage_bucket: "my-bucket",
|
|
291
294
|
google_cloud_storage_project_id: "my-project",
|
|
@@ -309,6 +312,7 @@ remote_server.update(
|
|
|
309
312
|
* `aws_secret_key` (string): AWS secret key.
|
|
310
313
|
* `password` (string): Password if needed.
|
|
311
314
|
* `private_key` (string): Private key if needed.
|
|
315
|
+
* `ssl_certificate` (string): SSL client certificate.
|
|
312
316
|
* `google_cloud_storage_credentials_json` (string): A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
|
|
313
317
|
* `wasabi_access_key` (string): Wasabi access key.
|
|
314
318
|
* `wasabi_secret_key` (string): Wasabi secret key.
|
data/docs/sso_strategy.md
CHANGED
|
@@ -29,6 +29,7 @@
|
|
|
29
29
|
"provision_group_exclusion": "Employees",
|
|
30
30
|
"provision_group_inclusion": "Employees",
|
|
31
31
|
"provision_group_required": "",
|
|
32
|
+
"provision_site_admin_groups": "Employees",
|
|
32
33
|
"provision_attachments_permission": true,
|
|
33
34
|
"provision_dav_permission": true,
|
|
34
35
|
"provision_ftp_permission": true,
|
|
@@ -71,6 +72,7 @@
|
|
|
71
72
|
* `provision_group_exclusion` (string): Comma-separated list of group names for groups (with optional wildcards) that will be excluded from auto-provisioning.
|
|
72
73
|
* `provision_group_inclusion` (string): Comma-separated list of group names for groups (with optional wildcards) that will be auto-provisioned.
|
|
73
74
|
* `provision_group_required` (string): Comma or newline separated list of group names (with optional wildcards) to require membership for user provisioning.
|
|
75
|
+
* `provision_site_admin_groups` (string): Comma-separated list of group names whose members will be created as Site Admins.
|
|
74
76
|
* `provision_attachments_permission` (boolean): Auto-provisioned users get Sharing permission?
|
|
75
77
|
* `provision_dav_permission` (boolean): Auto-provisioned users get WebDAV permission?
|
|
76
78
|
* `provision_ftp_permission` (boolean): Auto-provisioned users get FTP permission?
|
data/docs/user.md
CHANGED
|
@@ -38,7 +38,7 @@
|
|
|
38
38
|
"password_validity_days": 1,
|
|
39
39
|
"public_keys_count": 1,
|
|
40
40
|
"receive_admin_alerts": true,
|
|
41
|
-
"require_2fa":
|
|
41
|
+
"require_2fa": "always_require",
|
|
42
42
|
"active_2fa": true,
|
|
43
43
|
"require_password_change": true,
|
|
44
44
|
"restapi_permission": true,
|
|
@@ -88,7 +88,7 @@
|
|
|
88
88
|
* `password_validity_days` (int64): Number of days to allow user to use the same password
|
|
89
89
|
* `public_keys_count` (int64): Number of public keys associated with this user
|
|
90
90
|
* `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
|
|
91
|
-
* `require_2fa` (
|
|
91
|
+
* `require_2fa` (string): 2FA required setting
|
|
92
92
|
* `active_2fa` (boolean): Is 2fa active for the user?
|
|
93
93
|
* `require_password_change` (boolean): Is a password change required upon next user login?
|
|
94
94
|
* `restapi_permission` (boolean): Can this user access the REST API?
|
|
@@ -200,6 +200,7 @@ Files::User.create(
|
|
|
200
200
|
ssl_required: "always_require",
|
|
201
201
|
sso_strategy_id: 1,
|
|
202
202
|
subscribe_to_newsletter: true,
|
|
203
|
+
require_2fa: "always_require",
|
|
203
204
|
time_zone: "Pacific Time (US & Canada)",
|
|
204
205
|
username: "user"
|
|
205
206
|
)
|
|
@@ -246,6 +247,7 @@ Files::User.create(
|
|
|
246
247
|
* `ssl_required` (string): SSL required setting
|
|
247
248
|
* `sso_strategy_id` (int64): SSO (Single Sign On) strategy ID for the user, if applicable.
|
|
248
249
|
* `subscribe_to_newsletter` (boolean): Is the user subscribed to the newsletter?
|
|
250
|
+
* `require_2fa` (string): 2FA required setting
|
|
249
251
|
* `time_zone` (string): User time zone
|
|
250
252
|
* `user_root` (string): Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
|
|
251
253
|
* `username` (string): User's username
|
|
@@ -328,6 +330,7 @@ Files::User.update(id,
|
|
|
328
330
|
ssl_required: "always_require",
|
|
329
331
|
sso_strategy_id: 1,
|
|
330
332
|
subscribe_to_newsletter: true,
|
|
333
|
+
require_2fa: "always_require",
|
|
331
334
|
time_zone: "Pacific Time (US & Canada)",
|
|
332
335
|
username: "user"
|
|
333
336
|
)
|
|
@@ -375,6 +378,7 @@ Files::User.update(id,
|
|
|
375
378
|
* `ssl_required` (string): SSL required setting
|
|
376
379
|
* `sso_strategy_id` (int64): SSO (Single Sign On) strategy ID for the user, if applicable.
|
|
377
380
|
* `subscribe_to_newsletter` (boolean): Is the user subscribed to the newsletter?
|
|
381
|
+
* `require_2fa` (string): 2FA required setting
|
|
378
382
|
* `time_zone` (string): User time zone
|
|
379
383
|
* `user_root` (string): Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
|
|
380
384
|
* `username` (string): User's username
|
|
@@ -478,6 +482,7 @@ user.update(
|
|
|
478
482
|
ssl_required: "always_require",
|
|
479
483
|
sso_strategy_id: 1,
|
|
480
484
|
subscribe_to_newsletter: true,
|
|
485
|
+
require_2fa: "always_require",
|
|
481
486
|
time_zone: "Pacific Time (US & Canada)",
|
|
482
487
|
username: "user"
|
|
483
488
|
)
|
|
@@ -525,6 +530,7 @@ user.update(
|
|
|
525
530
|
* `ssl_required` (string): SSL required setting
|
|
526
531
|
* `sso_strategy_id` (int64): SSO (Single Sign On) strategy ID for the user, if applicable.
|
|
527
532
|
* `subscribe_to_newsletter` (boolean): Is the user subscribed to the newsletter?
|
|
533
|
+
* `require_2fa` (string): 2FA required setting
|
|
528
534
|
* `time_zone` (string): User time zone
|
|
529
535
|
* `user_root` (string): Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
|
|
530
536
|
* `username` (string): User's username
|
|
@@ -257,7 +257,7 @@ module Files
|
|
|
257
257
|
# Parameters:
|
|
258
258
|
# format - string
|
|
259
259
|
# api_key - object
|
|
260
|
-
def self.
|
|
260
|
+
def self.delete_current(params = {}, options = {})
|
|
261
261
|
raise InvalidParameterError.new("Bad parameter: format must be an String") if params.dig(:format) and !params.dig(:format).is_a?(String)
|
|
262
262
|
raise InvalidParameterError.new("Bad parameter: api_key must be an Hash") if params.dig(:api_key) and !params.dig(:api_key).is_a?(Hash)
|
|
263
263
|
|
|
@@ -297,6 +297,15 @@ module Files
|
|
|
297
297
|
@attributes[:private_key] = value
|
|
298
298
|
end
|
|
299
299
|
|
|
300
|
+
# string - SSL client certificate.
|
|
301
|
+
def ssl_certificate
|
|
302
|
+
@attributes[:ssl_certificate]
|
|
303
|
+
end
|
|
304
|
+
|
|
305
|
+
def ssl_certificate=(value)
|
|
306
|
+
@attributes[:ssl_certificate] = value
|
|
307
|
+
end
|
|
308
|
+
|
|
300
309
|
# string - A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
|
|
301
310
|
def google_cloud_storage_credentials_json
|
|
302
311
|
@attributes[:google_cloud_storage_credentials_json]
|
|
@@ -374,6 +383,7 @@ module Files
|
|
|
374
383
|
# aws_secret_key - string - AWS secret key.
|
|
375
384
|
# password - string - Password if needed.
|
|
376
385
|
# private_key - string - Private key if needed.
|
|
386
|
+
# ssl_certificate - string - SSL client certificate.
|
|
377
387
|
# google_cloud_storage_credentials_json - string - A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
|
|
378
388
|
# wasabi_access_key - string - Wasabi access key.
|
|
379
389
|
# wasabi_secret_key - string - Wasabi secret key.
|
|
@@ -414,6 +424,7 @@ module Files
|
|
|
414
424
|
raise InvalidParameterError.new("Bad parameter: aws_secret_key must be an String") if params.dig(:aws_secret_key) and !params.dig(:aws_secret_key).is_a?(String)
|
|
415
425
|
raise InvalidParameterError.new("Bad parameter: password must be an String") if params.dig(:password) and !params.dig(:password).is_a?(String)
|
|
416
426
|
raise InvalidParameterError.new("Bad parameter: private_key must be an String") if params.dig(:private_key) and !params.dig(:private_key).is_a?(String)
|
|
427
|
+
raise InvalidParameterError.new("Bad parameter: ssl_certificate must be an String") if params.dig(:ssl_certificate) and !params.dig(:ssl_certificate).is_a?(String)
|
|
417
428
|
raise InvalidParameterError.new("Bad parameter: google_cloud_storage_credentials_json must be an String") if params.dig(:google_cloud_storage_credentials_json) and !params.dig(:google_cloud_storage_credentials_json).is_a?(String)
|
|
418
429
|
raise InvalidParameterError.new("Bad parameter: wasabi_access_key must be an String") if params.dig(:wasabi_access_key) and !params.dig(:wasabi_access_key).is_a?(String)
|
|
419
430
|
raise InvalidParameterError.new("Bad parameter: wasabi_secret_key must be an String") if params.dig(:wasabi_secret_key) and !params.dig(:wasabi_secret_key).is_a?(String)
|
|
@@ -513,6 +524,7 @@ module Files
|
|
|
513
524
|
# aws_secret_key - string - AWS secret key.
|
|
514
525
|
# password - string - Password if needed.
|
|
515
526
|
# private_key - string - Private key if needed.
|
|
527
|
+
# ssl_certificate - string - SSL client certificate.
|
|
516
528
|
# google_cloud_storage_credentials_json - string - A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
|
|
517
529
|
# wasabi_access_key - string - Wasabi access key.
|
|
518
530
|
# wasabi_secret_key - string - Wasabi secret key.
|
|
@@ -549,6 +561,7 @@ module Files
|
|
|
549
561
|
raise InvalidParameterError.new("Bad parameter: aws_secret_key must be an String") if params.dig(:aws_secret_key) and !params.dig(:aws_secret_key).is_a?(String)
|
|
550
562
|
raise InvalidParameterError.new("Bad parameter: password must be an String") if params.dig(:password) and !params.dig(:password).is_a?(String)
|
|
551
563
|
raise InvalidParameterError.new("Bad parameter: private_key must be an String") if params.dig(:private_key) and !params.dig(:private_key).is_a?(String)
|
|
564
|
+
raise InvalidParameterError.new("Bad parameter: ssl_certificate must be an String") if params.dig(:ssl_certificate) and !params.dig(:ssl_certificate).is_a?(String)
|
|
552
565
|
raise InvalidParameterError.new("Bad parameter: google_cloud_storage_credentials_json must be an String") if params.dig(:google_cloud_storage_credentials_json) and !params.dig(:google_cloud_storage_credentials_json).is_a?(String)
|
|
553
566
|
raise InvalidParameterError.new("Bad parameter: wasabi_access_key must be an String") if params.dig(:wasabi_access_key) and !params.dig(:wasabi_access_key).is_a?(String)
|
|
554
567
|
raise InvalidParameterError.new("Bad parameter: wasabi_secret_key must be an String") if params.dig(:wasabi_secret_key) and !params.dig(:wasabi_secret_key).is_a?(String)
|
|
@@ -589,6 +602,7 @@ module Files
|
|
|
589
602
|
# aws_secret_key - string - AWS secret key.
|
|
590
603
|
# password - string - Password if needed.
|
|
591
604
|
# private_key - string - Private key if needed.
|
|
605
|
+
# ssl_certificate - string - SSL client certificate.
|
|
592
606
|
# google_cloud_storage_credentials_json - string - A JSON file that contains the private key. To generate see https://cloud.google.com/storage/docs/json_api/v1/how-tos/authorizing#APIKey
|
|
593
607
|
# wasabi_access_key - string - Wasabi access key.
|
|
594
608
|
# wasabi_secret_key - string - Wasabi secret key.
|
|
@@ -628,6 +642,7 @@ module Files
|
|
|
628
642
|
raise InvalidParameterError.new("Bad parameter: aws_secret_key must be an String") if params.dig(:aws_secret_key) and !params.dig(:aws_secret_key).is_a?(String)
|
|
629
643
|
raise InvalidParameterError.new("Bad parameter: password must be an String") if params.dig(:password) and !params.dig(:password).is_a?(String)
|
|
630
644
|
raise InvalidParameterError.new("Bad parameter: private_key must be an String") if params.dig(:private_key) and !params.dig(:private_key).is_a?(String)
|
|
645
|
+
raise InvalidParameterError.new("Bad parameter: ssl_certificate must be an String") if params.dig(:ssl_certificate) and !params.dig(:ssl_certificate).is_a?(String)
|
|
631
646
|
raise InvalidParameterError.new("Bad parameter: google_cloud_storage_credentials_json must be an String") if params.dig(:google_cloud_storage_credentials_json) and !params.dig(:google_cloud_storage_credentials_json).is_a?(String)
|
|
632
647
|
raise InvalidParameterError.new("Bad parameter: wasabi_access_key must be an String") if params.dig(:wasabi_access_key) and !params.dig(:wasabi_access_key).is_a?(String)
|
|
633
648
|
raise InvalidParameterError.new("Bad parameter: wasabi_secret_key must be an String") if params.dig(:wasabi_secret_key) and !params.dig(:wasabi_secret_key).is_a?(String)
|
|
@@ -124,6 +124,11 @@ module Files
|
|
|
124
124
|
@attributes[:provision_group_required]
|
|
125
125
|
end
|
|
126
126
|
|
|
127
|
+
# string - Comma-separated list of group names whose members will be created as Site Admins.
|
|
128
|
+
def provision_site_admin_groups
|
|
129
|
+
@attributes[:provision_site_admin_groups]
|
|
130
|
+
end
|
|
131
|
+
|
|
127
132
|
# boolean - Auto-provisioned users get Sharing permission?
|
|
128
133
|
def provision_attachments_permission
|
|
129
134
|
@attributes[:provision_attachments_permission]
|
|
@@ -293,7 +293,7 @@ module Files
|
|
|
293
293
|
@attributes[:receive_admin_alerts] = value
|
|
294
294
|
end
|
|
295
295
|
|
|
296
|
-
#
|
|
296
|
+
# string - 2FA required setting
|
|
297
297
|
def require_2fa
|
|
298
298
|
@attributes[:require_2fa]
|
|
299
299
|
end
|
|
@@ -582,6 +582,7 @@ module Files
|
|
|
582
582
|
# ssl_required - string - SSL required setting
|
|
583
583
|
# sso_strategy_id - int64 - SSO (Single Sign On) strategy ID for the user, if applicable.
|
|
584
584
|
# subscribe_to_newsletter - boolean - Is the user subscribed to the newsletter?
|
|
585
|
+
# require_2fa - string - 2FA required setting
|
|
585
586
|
# time_zone - string - User time zone
|
|
586
587
|
# user_root - string - Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
|
|
587
588
|
# username - string - User's username
|
|
@@ -610,6 +611,7 @@ module Files
|
|
|
610
611
|
raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params.dig(:password_validity_days) and !params.dig(:password_validity_days).is_a?(Integer)
|
|
611
612
|
raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params.dig(:ssl_required) and !params.dig(:ssl_required).is_a?(String)
|
|
612
613
|
raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params.dig(:sso_strategy_id) and !params.dig(:sso_strategy_id).is_a?(Integer)
|
|
614
|
+
raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params.dig(:require_2fa) and !params.dig(:require_2fa).is_a?(String)
|
|
613
615
|
raise InvalidParameterError.new("Bad parameter: time_zone must be an String") if params.dig(:time_zone) and !params.dig(:time_zone).is_a?(String)
|
|
614
616
|
raise InvalidParameterError.new("Bad parameter: user_root must be an String") if params.dig(:user_root) and !params.dig(:user_root).is_a?(String)
|
|
615
617
|
raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
|
|
@@ -742,6 +744,7 @@ module Files
|
|
|
742
744
|
# ssl_required - string - SSL required setting
|
|
743
745
|
# sso_strategy_id - int64 - SSO (Single Sign On) strategy ID for the user, if applicable.
|
|
744
746
|
# subscribe_to_newsletter - boolean - Is the user subscribed to the newsletter?
|
|
747
|
+
# require_2fa - string - 2FA required setting
|
|
745
748
|
# time_zone - string - User time zone
|
|
746
749
|
# user_root - string - Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
|
|
747
750
|
# username - string - User's username
|
|
@@ -766,6 +769,7 @@ module Files
|
|
|
766
769
|
raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params.dig(:password_validity_days) and !params.dig(:password_validity_days).is_a?(Integer)
|
|
767
770
|
raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params.dig(:ssl_required) and !params.dig(:ssl_required).is_a?(String)
|
|
768
771
|
raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params.dig(:sso_strategy_id) and !params.dig(:sso_strategy_id).is_a?(Integer)
|
|
772
|
+
raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params.dig(:require_2fa) and !params.dig(:require_2fa).is_a?(String)
|
|
769
773
|
raise InvalidParameterError.new("Bad parameter: time_zone must be an String") if params.dig(:time_zone) and !params.dig(:time_zone).is_a?(String)
|
|
770
774
|
raise InvalidParameterError.new("Bad parameter: user_root must be an String") if params.dig(:user_root) and !params.dig(:user_root).is_a?(String)
|
|
771
775
|
raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
|
|
@@ -847,6 +851,7 @@ module Files
|
|
|
847
851
|
# ssl_required - string - SSL required setting
|
|
848
852
|
# sso_strategy_id - int64 - SSO (Single Sign On) strategy ID for the user, if applicable.
|
|
849
853
|
# subscribe_to_newsletter - boolean - Is the user subscribed to the newsletter?
|
|
854
|
+
# require_2fa - string - 2FA required setting
|
|
850
855
|
# time_zone - string - User time zone
|
|
851
856
|
# user_root - string - Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
|
|
852
857
|
# username - string - User's username
|
|
@@ -874,6 +879,7 @@ module Files
|
|
|
874
879
|
raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params.dig(:password_validity_days) and !params.dig(:password_validity_days).is_a?(Integer)
|
|
875
880
|
raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params.dig(:ssl_required) and !params.dig(:ssl_required).is_a?(String)
|
|
876
881
|
raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params.dig(:sso_strategy_id) and !params.dig(:sso_strategy_id).is_a?(Integer)
|
|
882
|
+
raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params.dig(:require_2fa) and !params.dig(:require_2fa).is_a?(String)
|
|
877
883
|
raise InvalidParameterError.new("Bad parameter: time_zone must be an String") if params.dig(:time_zone) and !params.dig(:time_zone).is_a?(String)
|
|
878
884
|
raise InvalidParameterError.new("Bad parameter: user_root must be an String") if params.dig(:user_root) and !params.dig(:user_root).is_a?(String)
|
|
879
885
|
raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: files.com
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.0.
|
|
4
|
+
version: 1.0.121
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- files.com
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2020-
|
|
11
|
+
date: 2020-10-26 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: addressable
|