files.com 1.0.370 → 1.0.371

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0d2fe78953773ed28ca9092c5ac4bd98424cebe39719349b2f8da32498e9f3f3
4
- data.tar.gz: 2497dc7f393eabfc34bc3a85a6c3678960e663db780d75cb0e0116701e620cef
3
+ metadata.gz: '0811bbd05ab1828ae8a62a6439f3133e269c36996ef927ca24602c81333ff4a1'
4
+ data.tar.gz: fcd74ccaab330bc3d53cdf2d8e76a34667f84e6041c0a8a8e4e860f7a10e5209
5
5
  SHA512:
6
- metadata.gz: cbba291e41dccd38391815dbf7393c5e5c3d891f32c0dec1accb9d7d0137471fdf8c1284e48ad9594388bd48f261f8781cf13c74c57df7214dcf5b09afba3849
7
- data.tar.gz: ca21c9b79c0ef2a434b983cccd1aeae9a0d7afd0524a7dec8ffa2820952f9770d6edc8622418afa24f956d8765635343c27553703c398bc881b5adf5127b330d
6
+ metadata.gz: 8cd726b632441a2899cde0be800fdc86f11559420a59d455a1bdf985ea2fa0010e761e2ede3a24578bdd8292d9f114da34915e0f88d555da951ee52bd9aa0aba
7
+ data.tar.gz: 23e0abdef92a20a351d2ff3f42986acabe310e13b7c8dc1f8ddd063dcaa126c9ec11c256e533e14a112635269547abf058223022de30b2c01c2f742a9775515e
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.370
1
+ 1.0.371
data/docs/public_key.md CHANGED
@@ -7,7 +7,9 @@
7
7
  "id": 1,
8
8
  "title": "My public key",
9
9
  "created_at": "2000-01-01T01:00:00Z",
10
- "fingerprint": "43:51:43:a1:b5:fc:8b:b7:0a:3a:a9:b1:0f:66:73:a8"
10
+ "fingerprint": "43:51:43:a1:b5:fc:8b:b7:0a:3a:a9:b1:0f:66:73:a8",
11
+ "username": "User",
12
+ "user_id": 1
11
13
  }
12
14
  ```
13
15
 
@@ -15,7 +17,8 @@
15
17
  * `title` (string): Public key title
16
18
  * `created_at` (date-time): Public key created at date/time
17
19
  * `fingerprint` (string): Public key fingerprint
18
- * `user_id` (int64): User ID. Provide a value of `0` to operate the current session's user.
20
+ * `username` (string): Username of the user this public key is associated with
21
+ * `user_id` (int64): User ID this public key is associated with
19
22
  * `public_key` (string): Actual contents of SSH key.
20
23
 
21
24
 
data/docs/user.md CHANGED
@@ -216,6 +216,7 @@ Files::User.create(
216
216
  office_integration_enabled: true,
217
217
  password_validity_days: 1,
218
218
  receive_admin_alerts: true,
219
+ require_login_by: "2000-01-01T01:00:00Z",
219
220
  require_password_change: true,
220
221
  restapi_permission: true,
221
222
  self_managed: true,
@@ -265,6 +266,7 @@ Files::User.create(
265
266
  * `office_integration_enabled` (boolean): Enable integration with Office for the web?
266
267
  * `password_validity_days` (int64): Number of days to allow user to use the same password
267
268
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
269
+ * `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
268
270
  * `require_password_change` (boolean): Is a password change required upon next user login?
269
271
  * `restapi_permission` (boolean): Can this user access the REST API?
270
272
  * `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
@@ -349,6 +351,7 @@ Files::User.update(id,
349
351
  office_integration_enabled: true,
350
352
  password_validity_days: 1,
351
353
  receive_admin_alerts: true,
354
+ require_login_by: "2000-01-01T01:00:00Z",
352
355
  require_password_change: true,
353
356
  restapi_permission: true,
354
357
  self_managed: true,
@@ -399,6 +402,7 @@ Files::User.update(id,
399
402
  * `office_integration_enabled` (boolean): Enable integration with Office for the web?
400
403
  * `password_validity_days` (int64): Number of days to allow user to use the same password
401
404
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
405
+ * `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
402
406
  * `require_password_change` (boolean): Is a password change required upon next user login?
403
407
  * `restapi_permission` (boolean): Can this user access the REST API?
404
408
  * `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
@@ -504,6 +508,7 @@ user.update(
504
508
  office_integration_enabled: true,
505
509
  password_validity_days: 1,
506
510
  receive_admin_alerts: true,
511
+ require_login_by: "2000-01-01T01:00:00Z",
507
512
  require_password_change: true,
508
513
  restapi_permission: true,
509
514
  self_managed: true,
@@ -554,6 +559,7 @@ user.update(
554
559
  * `office_integration_enabled` (boolean): Enable integration with Office for the web?
555
560
  * `password_validity_days` (int64): Number of days to allow user to use the same password
556
561
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
562
+ * `require_login_by` (string): Require user to login by specified date otherwise it will be disabled.
557
563
  * `require_password_change` (boolean): Is a password change required upon next user login?
558
564
  * `restapi_permission` (boolean): Can this user access the REST API?
559
565
  * `self_managed` (boolean): Does this user manage it's own credentials or is it a shared/bot user?
@@ -41,7 +41,16 @@ module Files
41
41
  @attributes[:fingerprint] = value
42
42
  end
43
43
 
44
- # int64 - User ID. Provide a value of `0` to operate the current session's user.
44
+ # string - Username of the user this public key is associated with
45
+ def username
46
+ @attributes[:username]
47
+ end
48
+
49
+ def username=(value)
50
+ @attributes[:username] = value
51
+ end
52
+
53
+ # int64 - User ID this public key is associated with
45
54
  def user_id
46
55
  @attributes[:user_id]
47
56
  end
@@ -700,6 +700,7 @@ module Files
700
700
  # office_integration_enabled - boolean - Enable integration with Office for the web?
701
701
  # password_validity_days - int64 - Number of days to allow user to use the same password
702
702
  # receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
703
+ # require_login_by - string - Require user to login by specified date otherwise it will be disabled.
703
704
  # require_password_change - boolean - Is a password change required upon next user login?
704
705
  # restapi_permission - boolean - Can this user access the REST API?
705
706
  # self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
@@ -737,6 +738,7 @@ module Files
737
738
  raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
738
739
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
739
740
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
741
+ raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
740
742
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
741
743
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
742
744
  raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
@@ -860,6 +862,7 @@ module Files
860
862
  # office_integration_enabled - boolean - Enable integration with Office for the web?
861
863
  # password_validity_days - int64 - Number of days to allow user to use the same password
862
864
  # receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
865
+ # require_login_by - string - Require user to login by specified date otherwise it will be disabled.
863
866
  # require_password_change - boolean - Is a password change required upon next user login?
864
867
  # restapi_permission - boolean - Can this user access the REST API?
865
868
  # self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
@@ -893,6 +896,7 @@ module Files
893
896
  raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
894
897
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
895
898
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
899
+ raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
896
900
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
897
901
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
898
902
  raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
@@ -969,6 +973,7 @@ module Files
969
973
  # office_integration_enabled - boolean - Enable integration with Office for the web?
970
974
  # password_validity_days - int64 - Number of days to allow user to use the same password
971
975
  # receive_admin_alerts - boolean - Should the user receive admin alerts such a certificate expiration notifications and overages?
976
+ # require_login_by - string - Require user to login by specified date otherwise it will be disabled.
972
977
  # require_password_change - boolean - Is a password change required upon next user login?
973
978
  # restapi_permission - boolean - Can this user access the REST API?
974
979
  # self_managed - boolean - Does this user manage it's own credentials or is it a shared/bot user?
@@ -1005,6 +1010,7 @@ module Files
1005
1010
  raise InvalidParameterError.new("Bad parameter: company must be an String") if params[:company] and !params[:company].is_a?(String)
1006
1011
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
1007
1012
  raise InvalidParameterError.new("Bad parameter: password_validity_days must be an Integer") if params[:password_validity_days] and !params[:password_validity_days].is_a?(Integer)
1013
+ raise InvalidParameterError.new("Bad parameter: require_login_by must be an String") if params[:require_login_by] and !params[:require_login_by].is_a?(String)
1008
1014
  raise InvalidParameterError.new("Bad parameter: ssl_required must be an String") if params[:ssl_required] and !params[:ssl_required].is_a?(String)
1009
1015
  raise InvalidParameterError.new("Bad parameter: sso_strategy_id must be an Integer") if params[:sso_strategy_id] and !params[:sso_strategy_id].is_a?(Integer)
1010
1016
  raise InvalidParameterError.new("Bad parameter: require_2fa must be an String") if params[:require_2fa] and !params[:require_2fa].is_a?(String)
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.370
4
+ version: 1.0.371
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-07-17 00:00:00.000000000 Z
11
+ date: 2023-07-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable