files.com 1.0.264 → 1.0.267

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: dfea549d6dcd6c67bd7b39730e1b1b92f35423828ad92aa90d872a63ddbf45e4
4
- data.tar.gz: b5d95c6f6ed89be5dc931d8460b27622ae8c7675f8e2d07d997864cec70bd55b
3
+ metadata.gz: 8627bcbee349f32a87b922bd4f6336f9f7bc25ac06ba332831d169c67668d3ff
4
+ data.tar.gz: 89095e4907a6d32e627f8cee582c56fcb511d6e5c7a3018ac5675509965cac86
5
5
  SHA512:
6
- metadata.gz: dfbd8233812d671644ccc0f5232eb4fe7fc4680c2d2a863600b6bdba7de05f5ade525dd06e022f6990cd6910d2aaec892d9885d77c5f345ca93edf86b744e6ac
7
- data.tar.gz: 66328f3c3e22a3132030d53c794a53384c56d769e25b2d2f6cb3e3dc7112ac5086c26fe78a47f9d18a48378cf53d6e614a8743624e593303af12de7495fc64a9
6
+ metadata.gz: 330aedf8428d823a8ad5dce44fbd4c70065ea763128ec035a3c77348cabd1abad58d548b0b4671bd0956e4b2639d1487e65c58948ba5f571235bae982817c131
7
+ data.tar.gz: 315ea6fd8a726033472ff567881c019502d0fe623226c979ae7818eedbd8ba24b59a564ba27a432908e744cab2e14712e2d9de5ea9189c176c878f9ec181397c
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.264
1
+ 1.0.267
data/docs/as2_partner.md CHANGED
@@ -11,7 +11,7 @@
11
11
  "server_certificate": "require_match",
12
12
  "hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
13
13
  "public_certificate_md5": "",
14
- "public_certificate_subjec": "",
14
+ "public_certificate_subject": "",
15
15
  "public_certificate_issuer": "",
16
16
  "public_certificate_serial": "",
17
17
  "public_certificate_not_before": "",
@@ -26,7 +26,7 @@
26
26
  * `server_certificate` (string): Remote server certificate security setting
27
27
  * `hex_public_certificate_serial` (string): Serial of public certificate used for message security in hex format.
28
28
  * `public_certificate_md5` (string): MD5 hash of public certificate used for message security.
29
- * `public_certificate_subjec` (string): Subject of public certificate used for message security.
29
+ * `public_certificate_subject` (string): Subject of public certificate used for message security.
30
30
  * `public_certificate_issuer` (string): Issuer of public certificate used for message security.
31
31
  * `public_certificate_serial` (string): Serial of public certificate used for message security.
32
32
  * `public_certificate_not_before` (string): Not before value of public certificate used for message security.
data/docs/notification.md CHANGED
@@ -12,6 +12,7 @@
12
12
  "notify_on_copy": true,
13
13
  "recursive": true,
14
14
  "send_interval": "fifteen_minutes",
15
+ "message": "custom notification email message",
15
16
  "unsubscribed": true,
16
17
  "unsubscribed_reason": "",
17
18
  "user_id": 1,
@@ -28,6 +29,7 @@
28
29
  * `notify_on_copy` (boolean): Triggers notification when moving or copying files to this path
29
30
  * `recursive` (boolean): Enable notifications for each subfolder in this path
30
31
  * `send_interval` (string): The time interval that notifications are aggregated to
32
+ * `message` (string): Custom message to include in notification emails.
31
33
  * `unsubscribed` (boolean): Is the user unsubscribed from this notification?
32
34
  * `unsubscribed_reason` (string): The reason that the user unsubscribed
33
35
  * `user_id` (int64): Notification user ID
@@ -89,6 +91,7 @@ Files::Notification.create(
89
91
  notify_user_actions: true,
90
92
  recursive: true,
91
93
  send_interval: "daily",
94
+ message: "custom notification email message",
92
95
  group_id: 1,
93
96
  username: "User"
94
97
  )
@@ -101,6 +104,7 @@ Files::Notification.create(
101
104
  * `notify_user_actions` (boolean): If `true` actions initiated by the user will still result in a notification
102
105
  * `recursive` (boolean): If `true`, enable notifications for each subfolder in this path
103
106
  * `send_interval` (string): The time interval that notifications are aggregated by. Can be `five_minutes`, `fifteen_minutes`, `hourly`, or `daily`.
107
+ * `message` (string): Custom message to include in notification emails.
104
108
  * `group_id` (int64): The ID of the group to notify. Provide `user_id`, `username` or `group_id`.
105
109
  * `path` (string): Path
106
110
  * `username` (string): The username of the user to notify. Provide `user_id`, `username` or `group_id`.
@@ -115,7 +119,8 @@ Files::Notification.update(id,
115
119
  notify_on_copy: true,
116
120
  notify_user_actions: true,
117
121
  recursive: true,
118
- send_interval: "daily"
122
+ send_interval: "daily",
123
+ message: "custom notification email message"
119
124
  )
120
125
  ```
121
126
 
@@ -126,6 +131,7 @@ Files::Notification.update(id,
126
131
  * `notify_user_actions` (boolean): If `true` actions initiated by the user will still result in a notification
127
132
  * `recursive` (boolean): If `true`, enable notifications for each subfolder in this path
128
133
  * `send_interval` (string): The time interval that notifications are aggregated by. Can be `five_minutes`, `fifteen_minutes`, `hourly`, or `daily`.
134
+ * `message` (string): Custom message to include in notification emails.
129
135
 
130
136
 
131
137
  ---
@@ -152,7 +158,8 @@ notification.update(
152
158
  notify_on_copy: true,
153
159
  notify_user_actions: true,
154
160
  recursive: true,
155
- send_interval: "daily"
161
+ send_interval: "daily",
162
+ message: "custom notification email message"
156
163
  )
157
164
  ```
158
165
 
@@ -163,6 +170,7 @@ notification.update(
163
170
  * `notify_user_actions` (boolean): If `true` actions initiated by the user will still result in a notification
164
171
  * `recursive` (boolean): If `true`, enable notifications for each subfolder in this path
165
172
  * `send_interval` (string): The time interval that notifications are aggregated by. Can be `five_minutes`, `fifteen_minutes`, `hourly`, or `daily`.
173
+ * `message` (string): Custom message to include in notification emails.
166
174
 
167
175
 
168
176
  ---
data/docs/site.md CHANGED
@@ -10,6 +10,7 @@
10
10
  "allowed_2fa_method_u2f": true,
11
11
  "allowed_2fa_method_webauthn": true,
12
12
  "allowed_2fa_method_yubi": true,
13
+ "allowed_2fa_method_bypass_for_ftp_sftp_dav": true,
13
14
  "admin_user_id": 1,
14
15
  "allow_bundle_names": true,
15
16
  "allowed_countries": "US,DE",
@@ -231,6 +232,7 @@
231
232
  * `allowed_2fa_method_u2f` (boolean): Is U2F two factor authentication allowed?
232
233
  * `allowed_2fa_method_webauthn` (boolean): Is WebAuthn two factor authentication allowed?
233
234
  * `allowed_2fa_method_yubi` (boolean): Is yubikey two factor authentication allowed?
235
+ * `allowed_2fa_method_bypass_for_ftp_sftp_dav` (boolean): Are users allowed to configure their two factor authentication to be bypassed for FTP/SFTP/WebDAV?
234
236
  * `admin_user_id` (int64): User ID for the main site administrator
235
237
  * `allow_bundle_names` (boolean): Are manual Bundle names allowed?
236
238
  * `allowed_countries` (string): Comma seperated list of allowed Country codes
@@ -446,6 +448,7 @@ Files::Site.update(
446
448
  allowed_2fa_method_totp: true,
447
449
  allowed_2fa_method_webauthn: true,
448
450
  allowed_2fa_method_yubi: true,
451
+ allowed_2fa_method_bypass_for_ftp_sftp_dav: true,
449
452
  require_2fa: true,
450
453
  require_2fa_user_type: "`site_admins`",
451
454
  color2_top: "#000000",
@@ -554,6 +557,7 @@ Files::Site.update(
554
557
  * `allowed_2fa_method_totp` (boolean): Is TOTP two factor authentication allowed?
555
558
  * `allowed_2fa_method_webauthn` (boolean): Is WebAuthn two factor authentication allowed?
556
559
  * `allowed_2fa_method_yubi` (boolean): Is yubikey two factor authentication allowed?
560
+ * `allowed_2fa_method_bypass_for_ftp_sftp_dav` (boolean): Are users allowed to configure their two factor authentication to be bypassed for FTP/SFTP/WebDAV?
557
561
  * `require_2fa` (boolean): Require two-factor authentication for all users?
558
562
  * `require_2fa_user_type` (string): What type of user is required to use two-factor authentication (when require_2fa is set to `true` for this site)?
559
563
  * `color2_top` (string): Top bar background color
@@ -73,12 +73,12 @@ module Files
73
73
  end
74
74
 
75
75
  # string - Subject of public certificate used for message security.
76
- def public_certificate_subjec
77
- @attributes[:public_certificate_subjec]
76
+ def public_certificate_subject
77
+ @attributes[:public_certificate_subject]
78
78
  end
79
79
 
80
- def public_certificate_subjec=(value)
81
- @attributes[:public_certificate_subjec] = value
80
+ def public_certificate_subject=(value)
81
+ @attributes[:public_certificate_subject] = value
82
82
  end
83
83
 
84
84
  # string - Issuer of public certificate used for message security.
@@ -81,6 +81,15 @@ module Files
81
81
  @attributes[:send_interval] = value
82
82
  end
83
83
 
84
+ # string - Custom message to include in notification emails.
85
+ def message
86
+ @attributes[:message]
87
+ end
88
+
89
+ def message=(value)
90
+ @attributes[:message] = value
91
+ end
92
+
84
93
  # boolean - Is the user unsubscribed from this notification?
85
94
  def unsubscribed
86
95
  @attributes[:unsubscribed]
@@ -131,12 +140,14 @@ module Files
131
140
  # notify_user_actions - boolean - If `true` actions initiated by the user will still result in a notification
132
141
  # recursive - boolean - If `true`, enable notifications for each subfolder in this path
133
142
  # send_interval - string - The time interval that notifications are aggregated by. Can be `five_minutes`, `fifteen_minutes`, `hourly`, or `daily`.
143
+ # message - string - Custom message to include in notification emails.
134
144
  def update(params = {})
135
145
  params ||= {}
136
146
  params[:id] = @attributes[:id]
137
147
  raise MissingParameterError.new("Current object doesn't have a id") unless @attributes[:id]
138
148
  raise InvalidParameterError.new("Bad parameter: id must be an Integer") if params.dig(:id) and !params.dig(:id).is_a?(Integer)
139
149
  raise InvalidParameterError.new("Bad parameter: send_interval must be an String") if params.dig(:send_interval) and !params.dig(:send_interval).is_a?(String)
150
+ raise InvalidParameterError.new("Bad parameter: message must be an String") if params.dig(:message) and !params.dig(:message).is_a?(String)
140
151
  raise MissingParameterError.new("Parameter missing: id") unless params.dig(:id)
141
152
 
142
153
  Api.send_request("/notifications/#{@attributes[:id]}", :patch, params, @options)
@@ -224,12 +235,14 @@ module Files
224
235
  # notify_user_actions - boolean - If `true` actions initiated by the user will still result in a notification
225
236
  # recursive - boolean - If `true`, enable notifications for each subfolder in this path
226
237
  # send_interval - string - The time interval that notifications are aggregated by. Can be `five_minutes`, `fifteen_minutes`, `hourly`, or `daily`.
238
+ # message - string - Custom message to include in notification emails.
227
239
  # group_id - int64 - The ID of the group to notify. Provide `user_id`, `username` or `group_id`.
228
240
  # path - string - Path
229
241
  # username - string - The username of the user to notify. Provide `user_id`, `username` or `group_id`.
230
242
  def self.create(params = {}, options = {})
231
243
  raise InvalidParameterError.new("Bad parameter: user_id must be an Integer") if params.dig(:user_id) and !params.dig(:user_id).is_a?(Integer)
232
244
  raise InvalidParameterError.new("Bad parameter: send_interval must be an String") if params.dig(:send_interval) and !params.dig(:send_interval).is_a?(String)
245
+ raise InvalidParameterError.new("Bad parameter: message must be an String") if params.dig(:message) and !params.dig(:message).is_a?(String)
233
246
  raise InvalidParameterError.new("Bad parameter: group_id must be an Integer") if params.dig(:group_id) and !params.dig(:group_id).is_a?(Integer)
234
247
  raise InvalidParameterError.new("Bad parameter: path must be an String") if params.dig(:path) and !params.dig(:path).is_a?(String)
235
248
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
@@ -243,11 +256,13 @@ module Files
243
256
  # notify_user_actions - boolean - If `true` actions initiated by the user will still result in a notification
244
257
  # recursive - boolean - If `true`, enable notifications for each subfolder in this path
245
258
  # send_interval - string - The time interval that notifications are aggregated by. Can be `five_minutes`, `fifteen_minutes`, `hourly`, or `daily`.
259
+ # message - string - Custom message to include in notification emails.
246
260
  def self.update(id, params = {}, options = {})
247
261
  params ||= {}
248
262
  params[:id] = id
249
263
  raise InvalidParameterError.new("Bad parameter: id must be an Integer") if params.dig(:id) and !params.dig(:id).is_a?(Integer)
250
264
  raise InvalidParameterError.new("Bad parameter: send_interval must be an String") if params.dig(:send_interval) and !params.dig(:send_interval).is_a?(String)
265
+ raise InvalidParameterError.new("Bad parameter: message must be an String") if params.dig(:message) and !params.dig(:message).is_a?(String)
251
266
  raise MissingParameterError.new("Parameter missing: id") unless params.dig(:id)
252
267
 
253
268
  response, options = Api.send_request("/notifications/#{params[:id]}", :patch, params, options)
@@ -39,6 +39,11 @@ module Files
39
39
  @attributes[:allowed_2fa_method_yubi]
40
40
  end
41
41
 
42
+ # boolean - Are users allowed to configure their two factor authentication to be bypassed for FTP/SFTP/WebDAV?
43
+ def allowed_2fa_method_bypass_for_ftp_sftp_dav
44
+ @attributes[:allowed_2fa_method_bypass_for_ftp_sftp_dav]
45
+ end
46
+
42
47
  # int64 - User ID for the main site administrator
43
48
  def admin_user_id
44
49
  @attributes[:admin_user_id]
@@ -731,6 +736,7 @@ module Files
731
736
  # allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
732
737
  # allowed_2fa_method_webauthn - boolean - Is WebAuthn two factor authentication allowed?
733
738
  # allowed_2fa_method_yubi - boolean - Is yubikey two factor authentication allowed?
739
+ # allowed_2fa_method_bypass_for_ftp_sftp_dav - boolean - Are users allowed to configure their two factor authentication to be bypassed for FTP/SFTP/WebDAV?
734
740
  # require_2fa - boolean - Require two-factor authentication for all users?
735
741
  # require_2fa_user_type - string - What type of user is required to use two-factor authentication (when require_2fa is set to `true` for this site)?
736
742
  # color2_top - string - Top bar background color
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.264
4
+ version: 1.0.267
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-05-06 00:00:00.000000000 Z
11
+ date: 2022-05-11 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable