files.com 1.0.51 → 1.0.56

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 153c562598745e63891e8a91ef392a2c0807be4421aba02425466f63a364e8ff
4
- data.tar.gz: da035c5eda67df5893e38cabbaddb62e15b43b6e690ca3751523ca418486701b
3
+ metadata.gz: 381b16cfb532994ea5bee4702987ba4a0f29e9194c4341b6bd4cd2dbc92bd1f2
4
+ data.tar.gz: 36fe3b2a15c1046f72e147cbc64245942cf803140355478c482a79e062834698
5
5
  SHA512:
6
- metadata.gz: f0c8ff95b2a38ecc6500623b9215f0c6711e736969bf9dd72a2243518680b5cd3e2253b55efd40be10ac993c2a13d5a184a13e3ede11600ee8f8505176eea4d9
7
- data.tar.gz: c01d2d03ee6e81c513af643bb74e201eb81e0c4a00749bb1b14c0c7e1585472cf9cde9d1aa9b4106f82b0ce3ae3663aae1927b2748fa16fd691f8e7e958b282c
6
+ metadata.gz: c0a7356c4ec94d29b127c446c806824ea268b1903a81a4481c14e88fb2688a8b69ebe7350510168204538506c2328932aaf92213a279eed9eb34c8a77ff43b95
7
+ data.tar.gz: c1a3cf1d3febb88765d714f22222477a17eea2cd4cb90b986e24ed4bfc50ca7a01ca223dbe122ced7f0eedcb05e6d262aa6fdb391c35c0b4de4264309563e04e
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.51
1
+ 1.0.56
@@ -26,8 +26,8 @@
26
26
  ```
27
27
 
28
28
  * `id` (int64): Line item Id
29
- * `amount` (float): Line item amount
30
- * `balance` (float): Line item balance
29
+ * `amount` (double): Line item amount
30
+ * `balance` (double): Line item balance
31
31
  * `created_at` (date-time): Line item created at
32
32
  * `currency` (string): Line item currency
33
33
  * `download_uri` (string): Line item download uri
@@ -74,24 +74,24 @@ Files::Bundle.find(id)
74
74
  ```
75
75
  Files::Bundle.create(
76
76
  user_id: 1,
77
- paths: ["file.txt"],
78
77
  password: "Password",
79
78
  expires_at: "2000-01-01T01:00:00Z",
80
- description: "Public description",
81
- note: "Internal Note",
82
- code: "abc123"
79
+ description: "The public description of the bundle.",
80
+ note: "The internal note on the bundle.",
81
+ code: "abc123",
82
+ paths: ["file.txt"]
83
83
  )
84
84
  ```
85
85
 
86
86
  ### Parameters
87
87
 
88
88
  * `user_id` (int64): User ID. Provide a value of `0` to operate the current session's user.
89
- * `paths` (array(string)): Required - A list of paths to include in this bundle.
90
89
  * `password` (string): Password for this bundle.
91
- * `expires_at` (string): Bundle expiration date/time.
92
- * `description` (string): Bundle public description
90
+ * `expires_at` (string): Bundle expiration date/time
91
+ * `description` (string): Public description
93
92
  * `note` (string): Bundle internal note
94
- * `code` (string): Bundle name
93
+ * `code` (string): Bundle code. This code forms the end part of the Public URL.
94
+ * `paths` (array(string)): Required - A list of paths to include in this bundle.
95
95
 
96
96
 
97
97
  ---
@@ -112,6 +112,30 @@ Files::Bundle.share(id,
112
112
  * `note` (string): Note to include in email.
113
113
 
114
114
 
115
+ ---
116
+
117
+ ## Update Bundle
118
+
119
+ ```
120
+ Files::Bundle.update(id,
121
+ password: "Password",
122
+ expires_at: "2000-01-01T01:00:00Z",
123
+ description: "The public description of the bundle.",
124
+ note: "The internal note on the bundle.",
125
+ code: "abc123"
126
+ )
127
+ ```
128
+
129
+ ### Parameters
130
+
131
+ * `id` (int64): Required - Bundle ID.
132
+ * `password` (string): Password for this bundle.
133
+ * `expires_at` (string): Bundle expiration date/time
134
+ * `description` (string): Public description
135
+ * `note` (string): Bundle internal note
136
+ * `code` (string): Bundle code. This code forms the end part of the Public URL.
137
+
138
+
115
139
  ---
116
140
 
117
141
  ## Delete Bundle
@@ -144,6 +168,31 @@ bundle.share(
144
168
  * `note` (string): Note to include in email.
145
169
 
146
170
 
171
+ ---
172
+
173
+ ## Update Bundle
174
+
175
+ ```
176
+ bundle = Files::Bundle.find(1)
177
+ bundle.update(
178
+ password: "Password",
179
+ expires_at: "2000-01-01T01:00:00Z",
180
+ description: "The public description of the bundle.",
181
+ note: "The internal note on the bundle.",
182
+ code: "abc123"
183
+ )
184
+ ```
185
+
186
+ ### Parameters
187
+
188
+ * `id` (int64): Required - Bundle ID.
189
+ * `password` (string): Password for this bundle.
190
+ * `expires_at` (string): Bundle expiration date/time
191
+ * `description` (string): Public description
192
+ * `note` (string): Bundle internal note
193
+ * `code` (string): Bundle code. This code forms the end part of the Public URL.
194
+
195
+
147
196
  ---
148
197
 
149
198
  ## Delete Bundle
@@ -26,8 +26,8 @@
26
26
  ```
27
27
 
28
28
  * `id` (int64): Line item Id
29
- * `amount` (float): Line item amount
30
- * `balance` (float): Line item balance
29
+ * `amount` (double): Line item amount
30
+ * `balance` (double): Line item balance
31
31
  * `created_at` (date-time): Line item created at
32
32
  * `currency` (string): Line item currency
33
33
  * `download_uri` (string): Line item download uri
@@ -16,7 +16,7 @@
16
16
  }
17
17
  ```
18
18
 
19
- * `amount` (float): Invoice line item amount
19
+ * `amount` (double): Invoice line item amount
20
20
  * `created_at` (date-time): Invoice line item created at date/time
21
21
  * `description` (string): Invoice line item description
22
22
  * `type` (string): Invoice line item type
@@ -26,8 +26,8 @@
26
26
  ```
27
27
 
28
28
  * `id` (int64): Line item Id
29
- * `amount` (float): Line item amount
30
- * `balance` (float): Line item balance
29
+ * `amount` (double): Line item amount
30
+ * `balance` (double): Line item balance
31
31
  * `created_at` (date-time): Line item created at
32
32
  * `currency` (string): Line item currency
33
33
  * `download_uri` (string): Line item download uri
@@ -12,7 +12,7 @@
12
12
  }
13
13
  ```
14
14
 
15
- * `amount` (float): Payment line item amount
15
+ * `amount` (double): Payment line item amount
16
16
  * `created_at` (date-time): Payment line item created at date/time
17
17
  * `invoice_id` (int64): Invoice ID
18
18
  * `payment_id` (int64): Payment ID
@@ -11,7 +11,6 @@
11
11
  "allowed_2fa_method_yubi": true,
12
12
  "admin_user_id": 1,
13
13
  "allow_bundle_names": true,
14
- "allowed_file_types": "",
15
14
  "allowed_ips": "",
16
15
  "ask_about_overwrites": true,
17
16
  "bundle_expiration": 1,
@@ -90,7 +89,7 @@
90
89
  "smtp_from": "me@my-mail-server.com",
91
90
  "smtp_port": 25,
92
91
  "smtp_username": "mail",
93
- "session_expiry": 6,
92
+ "session_expiry": 6.0,
94
93
  "ssl_required": true,
95
94
  "subdomain": "mysite",
96
95
  "switch_to_plan_date": "2000-01-01T01:00:00Z",
@@ -120,7 +119,6 @@
120
119
  * `allowed_2fa_method_yubi` (boolean): Is yubikey two factor authentication allowed?
121
120
  * `admin_user_id` (int64): User ID for the main site administrator
122
121
  * `allow_bundle_names` (boolean): Are manual Bundle names allowed?
123
- * `allowed_file_types` (string): List of allowed file types
124
122
  * `allowed_ips` (string): List of allowed IP addresses
125
123
  * `ask_about_overwrites` (boolean): If false, rename conflicting files instead of asking for overwrite confirmation. Only applies to web interface.
126
124
  * `bundle_expiration` (int64): Site-wide Bundle expiration in days
@@ -170,7 +168,7 @@
170
168
  * `login_help_text` (string): Login help text
171
169
  * `logo`: Branded logo
172
170
  * `max_prior_passwords` (int64): Number of prior passwords to disallow
173
- * `next_billing_amount` (float): Next billing amount
171
+ * `next_billing_amount` (double): Next billing amount
174
172
  * `next_billing_date` (string): Next billing date
175
173
  * `opt_out_global` (boolean): Use servers in the USA only?
176
174
  * `overage_notified_at` (date-time): Last time the site was notified about an overage
@@ -199,7 +197,7 @@
199
197
  * `smtp_from` (string): From address to use when mailing through custom SMTP
200
198
  * `smtp_port` (int64): SMTP server port
201
199
  * `smtp_username` (string): SMTP server username
202
- * `session_expiry` (int64): Session expiry in hours
200
+ * `session_expiry` (double): Session expiry in hours
203
201
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
204
202
  * `subdomain` (string): Site subdomain
205
203
  * `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
@@ -264,7 +262,7 @@ Files::Site.update(
264
262
  desktop_app_session_lifetime: 1,
265
263
  folder_permissions_groups_only: true,
266
264
  welcome_screen: "user_controlled",
267
- session_expiry: 1,
265
+ session_expiry: 6.0,
268
266
  ssl_required: true,
269
267
  tls_disabled: true,
270
268
  user_lockout: true,
@@ -351,7 +349,7 @@ Files::Site.update(
351
349
  * `desktop_app_session_lifetime` (int64): Desktop app session lifetime (in hours)
352
350
  * `folder_permissions_groups_only` (boolean): If true, permissions for this site must be bound to a group (not a user). Otherwise, permissions must be bound to a user.
353
351
  * `welcome_screen` (string): Does the welcome screen appear?
354
- * `session_expiry` (int64): Session expiry in hours
352
+ * `session_expiry` (number): Session expiry in hours
355
353
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
356
354
  * `tls_disabled` (boolean): Is TLS disabled(site setting)?
357
355
  * `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
@@ -359,7 +357,6 @@ Files::Site.update(
359
357
  * `user_lockout_within` (int64): Number of hours for user lockout window
360
358
  * `user_lockout_lock_period` (int64): How many hours to lock user out for failed password?
361
359
  * `include_password_in_welcome_email` (boolean): Include password in emails to new users?
362
- * `allowed_file_types` (string): List of allowed file types
363
360
  * `allowed_ips` (string): List of allowed IP addresses
364
361
  * `days_to_retain_backups` (int64): Number of days to keep deleted files
365
362
  * `max_prior_passwords` (int64): Number of prior passwords to disallow
@@ -6,6 +6,8 @@
6
6
  {
7
7
  "protocol": "okta",
8
8
  "provider": "okta",
9
+ "label": "My Corporate SSO Provider",
10
+ "logo_url": "https://mysite.files.com/.../logo.png",
9
11
  "id": 1,
10
12
  "saml_provider_cert_fingerprint": "",
11
13
  "saml_provider_issuer_url": "",
@@ -31,6 +33,8 @@
31
33
 
32
34
  * `protocol` (string): SSO Protocol
33
35
  * `provider` (string): Provider name
36
+ * `label` (string): Custom label for the SSO provider on the login page.
37
+ * `logo_url` (string): URL holding a custom logo for the SSO provider on the login page.
34
38
  * `id` (int64): ID
35
39
  * `saml_provider_cert_fingerprint` (string): Identity provider sha256 cert fingerprint if saml_provider_metadata_url is not available.
36
40
  * `saml_provider_issuer_url` (string): Identity provider issuer url
@@ -24,15 +24,15 @@
24
24
  * `start_at` (date-time): Site usage report start date/time
25
25
  * `end_at` (date-time): Site usage report end date/time
26
26
  * `created_at` (date-time): Site usage report created at date/time
27
- * `current_storage` (float): Current site usage as of report
28
- * `high_water_storage` (float): Site usage report highest usage in time period
27
+ * `current_storage` (double): Current site usage as of report
28
+ * `high_water_storage` (double): Site usage report highest usage in time period
29
29
  * `total_downloads` (int64): Number of downloads in report time period
30
30
  * `total_uploads` (int64): Number of uploads in time period
31
31
  * `updated_at` (date-time): The last time this site usage report was updated
32
32
  * `usage_by_top_level_dir` (object): A map of root folders to their total usage
33
- * `root_storage` (float): Usage for root folder
34
- * `deleted_files_counted_in_minimum` (float): Usage for files that are deleted but uploaded within last 30 days
35
- * `deleted_files_storage` (float): Usage for files that are deleted but retained as backups
33
+ * `root_storage` (double): Usage for root folder
34
+ * `deleted_files_counted_in_minimum` (double): Usage for files that are deleted but uploaded within last 30 days
35
+ * `deleted_files_storage` (double): Usage for files that are deleted but retained as backups
36
36
 
37
37
 
38
38
  ---
@@ -17,6 +17,7 @@
17
17
  "avatar_url": "",
18
18
  "billing_permission": true,
19
19
  "bypass_site_allowed_ips": true,
20
+ "bypass_inactive_disable": true,
20
21
  "created_at": "2000-01-01T01:00:00Z",
21
22
  "dav_permission": true,
22
23
  "disabled": true,
@@ -64,6 +65,7 @@
64
65
  * `avatar_url` (string): URL holding the user's avatar
65
66
  * `billing_permission` (boolean): Allow this user to perform operations on the account, payments, and invoices?
66
67
  * `bypass_site_allowed_ips` (boolean): Allow this user to skip site-wide IP blacklists?
68
+ * `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
67
69
  * `created_at` (date-time): When this user was created
68
70
  * `dav_permission` (boolean): Can the user connect with WebDAV?
69
71
  * `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting.
@@ -160,6 +162,7 @@ Files::User.create(
160
162
  authenticate_until: "2000-01-01T01:00:00Z",
161
163
  authentication_method: "password",
162
164
  billing_permission: true,
165
+ bypass_inactive_disable: true,
163
166
  bypass_site_allowed_ips: true,
164
167
  dav_permission: true,
165
168
  disabled: true,
@@ -202,6 +205,7 @@ Files::User.create(
202
205
  * `authenticate_until` (string): Scheduled Date/Time at which user will be deactivated
203
206
  * `authentication_method` (string): How is this user authenticated?
204
207
  * `billing_permission` (boolean): Allow this user to perform operations on the account, payments, and invoices?
208
+ * `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
205
209
  * `bypass_site_allowed_ips` (boolean): Allow this user to skip site-wide IP blacklists?
206
210
  * `dav_permission` (boolean): Can the user connect with WebDAV?
207
211
  * `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting.
@@ -280,6 +284,7 @@ Files::User.update(id,
280
284
  authenticate_until: "2000-01-01T01:00:00Z",
281
285
  authentication_method: "password",
282
286
  billing_permission: true,
287
+ bypass_inactive_disable: true,
283
288
  bypass_site_allowed_ips: true,
284
289
  dav_permission: true,
285
290
  disabled: true,
@@ -323,6 +328,7 @@ Files::User.update(id,
323
328
  * `authenticate_until` (string): Scheduled Date/Time at which user will be deactivated
324
329
  * `authentication_method` (string): How is this user authenticated?
325
330
  * `billing_permission` (boolean): Allow this user to perform operations on the account, payments, and invoices?
331
+ * `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
326
332
  * `bypass_site_allowed_ips` (boolean): Allow this user to skip site-wide IP blacklists?
327
333
  * `dav_permission` (boolean): Can the user connect with WebDAV?
328
334
  * `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting.
@@ -418,6 +424,7 @@ user.update(
418
424
  authenticate_until: "2000-01-01T01:00:00Z",
419
425
  authentication_method: "password",
420
426
  billing_permission: true,
427
+ bypass_inactive_disable: true,
421
428
  bypass_site_allowed_ips: true,
422
429
  dav_permission: true,
423
430
  disabled: true,
@@ -461,6 +468,7 @@ user.update(
461
468
  * `authenticate_until` (string): Scheduled Date/Time at which user will be deactivated
462
469
  * `authentication_method` (string): How is this user authenticated?
463
470
  * `billing_permission` (boolean): Allow this user to perform operations on the account, payments, and invoices?
471
+ * `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
464
472
  * `bypass_site_allowed_ips` (boolean): Allow this user to skip site-wide IP blacklists?
465
473
  * `dav_permission` (boolean): Can the user connect with WebDAV?
466
474
  * `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting.
@@ -14,12 +14,12 @@ module Files
14
14
  @attributes[:id]
15
15
  end
16
16
 
17
- # float - Line item amount
17
+ # double - Line item amount
18
18
  def amount
19
19
  @attributes[:amount]
20
20
  end
21
21
 
22
- # float - Line item balance
22
+ # double - Line item balance
23
23
  def balance
24
24
  @attributes[:balance]
25
25
  end
@@ -131,6 +131,27 @@ module Files
131
131
  Api.send_request("/bundles/#{@attributes[:id]}/share", :post, params, @options)
132
132
  end
133
133
 
134
+ # Parameters:
135
+ # password - string - Password for this bundle.
136
+ # expires_at - string - Bundle expiration date/time
137
+ # description - string - Public description
138
+ # note - string - Bundle internal note
139
+ # code - string - Bundle code. This code forms the end part of the Public URL.
140
+ def update(params = {})
141
+ params ||= {}
142
+ params[:id] = @attributes[:id]
143
+ raise MissingParameterError.new("Current object doesn't have a id") unless @attributes[:id]
144
+ raise InvalidParameterError.new("Bad parameter: id must be an Integer") if params.dig(:id) and !params.dig(:id).is_a?(Integer)
145
+ raise InvalidParameterError.new("Bad parameter: password must be an String") if params.dig(:password) and !params.dig(:password).is_a?(String)
146
+ raise InvalidParameterError.new("Bad parameter: expires_at must be an String") if params.dig(:expires_at) and !params.dig(:expires_at).is_a?(String)
147
+ raise InvalidParameterError.new("Bad parameter: description must be an String") if params.dig(:description) and !params.dig(:description).is_a?(String)
148
+ raise InvalidParameterError.new("Bad parameter: note must be an String") if params.dig(:note) and !params.dig(:note).is_a?(String)
149
+ raise InvalidParameterError.new("Bad parameter: code must be an String") if params.dig(:code) and !params.dig(:code).is_a?(String)
150
+ raise MissingParameterError.new("Parameter missing: id") unless params.dig(:id)
151
+
152
+ Api.send_request("/bundles/#{@attributes[:id]}", :patch, params, @options)
153
+ end
154
+
134
155
  def delete(params = {})
135
156
  params ||= {}
136
157
  params[:id] = @attributes[:id]
@@ -147,7 +168,7 @@ module Files
147
168
 
148
169
  def save
149
170
  if @attributes[:id]
150
- raise NotImplementedError.new("The Bundle object doesn't support updates.")
171
+ update(@attributes)
151
172
  else
152
173
  new_obj = Bundle.create(@attributes, @options)
153
174
  @attributes = new_obj.attributes
@@ -190,20 +211,20 @@ module Files
190
211
 
191
212
  # Parameters:
192
213
  # user_id - integer - User ID. Provide a value of `0` to operate the current session's user.
193
- # paths (required) - array - A list of paths to include in this bundle.
194
214
  # password - string - Password for this bundle.
195
- # expires_at - string - Bundle expiration date/time.
196
- # description - string - Bundle public description
215
+ # expires_at - string - Bundle expiration date/time
216
+ # description - string - Public description
197
217
  # note - string - Bundle internal note
198
- # code - string - Bundle name
218
+ # code - string - Bundle code. This code forms the end part of the Public URL.
219
+ # paths (required) - array - A list of paths to include in this bundle.
199
220
  def self.create(params = {}, options = {})
200
221
  raise InvalidParameterError.new("Bad parameter: user_id must be an Integer") if params.dig(:user_id) and !params.dig(:user_id).is_a?(Integer)
201
- raise InvalidParameterError.new("Bad parameter: paths must be an Array") if params.dig(:paths) and !params.dig(:paths).is_a?(Array)
202
222
  raise InvalidParameterError.new("Bad parameter: password must be an String") if params.dig(:password) and !params.dig(:password).is_a?(String)
203
223
  raise InvalidParameterError.new("Bad parameter: expires_at must be an String") if params.dig(:expires_at) and !params.dig(:expires_at).is_a?(String)
204
224
  raise InvalidParameterError.new("Bad parameter: description must be an String") if params.dig(:description) and !params.dig(:description).is_a?(String)
205
225
  raise InvalidParameterError.new("Bad parameter: note must be an String") if params.dig(:note) and !params.dig(:note).is_a?(String)
206
226
  raise InvalidParameterError.new("Bad parameter: code must be an String") if params.dig(:code) and !params.dig(:code).is_a?(String)
227
+ raise InvalidParameterError.new("Bad parameter: paths must be an Array") if params.dig(:paths) and !params.dig(:paths).is_a?(Array)
207
228
  raise MissingParameterError.new("Parameter missing: paths") unless params.dig(:paths)
208
229
 
209
230
  response, options = Api.send_request("/bundles", :post, params, options)
@@ -228,6 +249,27 @@ module Files
228
249
  response.data
229
250
  end
230
251
 
252
+ # Parameters:
253
+ # password - string - Password for this bundle.
254
+ # expires_at - string - Bundle expiration date/time
255
+ # description - string - Public description
256
+ # note - string - Bundle internal note
257
+ # code - string - Bundle code. This code forms the end part of the Public URL.
258
+ def self.update(id, params = {}, options = {})
259
+ params ||= {}
260
+ params[:id] = id
261
+ raise InvalidParameterError.new("Bad parameter: id must be an Integer") if params.dig(:id) and !params.dig(:id).is_a?(Integer)
262
+ raise InvalidParameterError.new("Bad parameter: password must be an String") if params.dig(:password) and !params.dig(:password).is_a?(String)
263
+ raise InvalidParameterError.new("Bad parameter: expires_at must be an String") if params.dig(:expires_at) and !params.dig(:expires_at).is_a?(String)
264
+ raise InvalidParameterError.new("Bad parameter: description must be an String") if params.dig(:description) and !params.dig(:description).is_a?(String)
265
+ raise InvalidParameterError.new("Bad parameter: note must be an String") if params.dig(:note) and !params.dig(:note).is_a?(String)
266
+ raise InvalidParameterError.new("Bad parameter: code must be an String") if params.dig(:code) and !params.dig(:code).is_a?(String)
267
+ raise MissingParameterError.new("Parameter missing: id") unless params.dig(:id)
268
+
269
+ response, options = Api.send_request("/bundles/#{params[:id]}", :patch, params, options)
270
+ Bundle.new(response.data, options)
271
+ end
272
+
231
273
  def self.delete(id, params = {}, options = {})
232
274
  params ||= {}
233
275
  params[:id] = id
@@ -14,12 +14,12 @@ module Files
14
14
  @attributes[:id]
15
15
  end
16
16
 
17
- # float - Line item amount
17
+ # double - Line item amount
18
18
  def amount
19
19
  @attributes[:amount]
20
20
  end
21
21
 
22
- # float - Line item balance
22
+ # double - Line item balance
23
23
  def balance
24
24
  @attributes[:balance]
25
25
  end
@@ -9,7 +9,7 @@ module Files
9
9
  @options = options || {}
10
10
  end
11
11
 
12
- # float - Invoice line item amount
12
+ # double - Invoice line item amount
13
13
  def amount
14
14
  @attributes[:amount]
15
15
  end
@@ -14,12 +14,12 @@ module Files
14
14
  @attributes[:id]
15
15
  end
16
16
 
17
- # float - Line item amount
17
+ # double - Line item amount
18
18
  def amount
19
19
  @attributes[:amount]
20
20
  end
21
21
 
22
- # float - Line item balance
22
+ # double - Line item balance
23
23
  def balance
24
24
  @attributes[:balance]
25
25
  end
@@ -9,7 +9,7 @@ module Files
9
9
  @options = options || {}
10
10
  end
11
11
 
12
- # float - Payment line item amount
12
+ # double - Payment line item amount
13
13
  def amount
14
14
  @attributes[:amount]
15
15
  end
@@ -44,11 +44,6 @@ module Files
44
44
  @attributes[:allow_bundle_names]
45
45
  end
46
46
 
47
- # string - List of allowed file types
48
- def allowed_file_types
49
- @attributes[:allowed_file_types]
50
- end
51
-
52
47
  # string - List of allowed IP addresses
53
48
  def allowed_ips
54
49
  @attributes[:allowed_ips]
@@ -294,7 +289,7 @@ module Files
294
289
  @attributes[:max_prior_passwords]
295
290
  end
296
291
 
297
- # float - Next billing amount
292
+ # double - Next billing amount
298
293
  def next_billing_amount
299
294
  @attributes[:next_billing_amount]
300
295
  end
@@ -439,7 +434,7 @@ module Files
439
434
  @attributes[:smtp_username]
440
435
  end
441
436
 
442
- # int64 - Session expiry in hours
437
+ # double - Session expiry in hours
443
438
  def session_expiry
444
439
  @attributes[:session_expiry]
445
440
  end
@@ -570,7 +565,7 @@ module Files
570
565
  # desktop_app_session_lifetime - integer - Desktop app session lifetime (in hours)
571
566
  # folder_permissions_groups_only - boolean - If true, permissions for this site must be bound to a group (not a user). Otherwise, permissions must be bound to a user.
572
567
  # welcome_screen - string - Does the welcome screen appear?
573
- # session_expiry - integer - Session expiry in hours
568
+ # session_expiry - number - Session expiry in hours
574
569
  # ssl_required - boolean - Is SSL required? Disabling this is insecure.
575
570
  # tls_disabled - boolean - Is TLS disabled(site setting)?
576
571
  # user_lockout - boolean - Will users be locked out after incorrect login attempts?
@@ -578,7 +573,6 @@ module Files
578
573
  # user_lockout_within - integer - Number of hours for user lockout window
579
574
  # user_lockout_lock_period - integer - How many hours to lock user out for failed password?
580
575
  # include_password_in_welcome_email - boolean - Include password in emails to new users?
581
- # allowed_file_types - string - List of allowed file types
582
576
  # allowed_ips - string - List of allowed IP addresses
583
577
  # days_to_retain_backups - integer - Number of days to keep deleted files
584
578
  # max_prior_passwords - integer - Number of prior passwords to disallow
@@ -660,11 +654,9 @@ module Files
660
654
  raise InvalidParameterError.new("Bad parameter: default_time_zone must be an String") if params.dig(:default_time_zone) and !params.dig(:default_time_zone).is_a?(String)
661
655
  raise InvalidParameterError.new("Bad parameter: desktop_app_session_lifetime must be an Integer") if params.dig(:desktop_app_session_lifetime) and !params.dig(:desktop_app_session_lifetime).is_a?(Integer)
662
656
  raise InvalidParameterError.new("Bad parameter: welcome_screen must be an String") if params.dig(:welcome_screen) and !params.dig(:welcome_screen).is_a?(String)
663
- raise InvalidParameterError.new("Bad parameter: session_expiry must be an Integer") if params.dig(:session_expiry) and !params.dig(:session_expiry).is_a?(Integer)
664
657
  raise InvalidParameterError.new("Bad parameter: user_lockout_tries must be an Integer") if params.dig(:user_lockout_tries) and !params.dig(:user_lockout_tries).is_a?(Integer)
665
658
  raise InvalidParameterError.new("Bad parameter: user_lockout_within must be an Integer") if params.dig(:user_lockout_within) and !params.dig(:user_lockout_within).is_a?(Integer)
666
659
  raise InvalidParameterError.new("Bad parameter: user_lockout_lock_period must be an Integer") if params.dig(:user_lockout_lock_period) and !params.dig(:user_lockout_lock_period).is_a?(Integer)
667
- raise InvalidParameterError.new("Bad parameter: allowed_file_types must be an String") if params.dig(:allowed_file_types) and !params.dig(:allowed_file_types).is_a?(String)
668
660
  raise InvalidParameterError.new("Bad parameter: allowed_ips must be an String") if params.dig(:allowed_ips) and !params.dig(:allowed_ips).is_a?(String)
669
661
  raise InvalidParameterError.new("Bad parameter: days_to_retain_backups must be an Integer") if params.dig(:days_to_retain_backups) and !params.dig(:days_to_retain_backups).is_a?(Integer)
670
662
  raise InvalidParameterError.new("Bad parameter: max_prior_passwords must be an Integer") if params.dig(:max_prior_passwords) and !params.dig(:max_prior_passwords).is_a?(Integer)
@@ -19,6 +19,16 @@ module Files
19
19
  @attributes[:provider]
20
20
  end
21
21
 
22
+ # string - Custom label for the SSO provider on the login page.
23
+ def label
24
+ @attributes[:label]
25
+ end
26
+
27
+ # string - URL holding a custom logo for the SSO provider on the login page.
28
+ def logo_url
29
+ @attributes[:logo_url]
30
+ end
31
+
22
32
  # int64 - ID
23
33
  def id
24
34
  @attributes[:id]
@@ -29,12 +29,12 @@ module Files
29
29
  @attributes[:created_at]
30
30
  end
31
31
 
32
- # float - Current site usage as of report
32
+ # double - Current site usage as of report
33
33
  def current_storage
34
34
  @attributes[:current_storage]
35
35
  end
36
36
 
37
- # float - Site usage report highest usage in time period
37
+ # double - Site usage report highest usage in time period
38
38
  def high_water_storage
39
39
  @attributes[:high_water_storage]
40
40
  end
@@ -59,17 +59,17 @@ module Files
59
59
  @attributes[:usage_by_top_level_dir]
60
60
  end
61
61
 
62
- # float - Usage for root folder
62
+ # double - Usage for root folder
63
63
  def root_storage
64
64
  @attributes[:root_storage]
65
65
  end
66
66
 
67
- # float - Usage for files that are deleted but uploaded within last 30 days
67
+ # double - Usage for files that are deleted but uploaded within last 30 days
68
68
  def deleted_files_counted_in_minimum
69
69
  @attributes[:deleted_files_counted_in_minimum]
70
70
  end
71
71
 
72
- # float - Usage for files that are deleted but retained as backups
72
+ # double - Usage for files that are deleted but retained as backups
73
73
  def deleted_files_storage
74
74
  @attributes[:deleted_files_storage]
75
75
  end
@@ -108,6 +108,15 @@ module Files
108
108
  @attributes[:bypass_site_allowed_ips] = value
109
109
  end
110
110
 
111
+ # boolean - Exempt this user from being disabled based on inactivity?
112
+ def bypass_inactive_disable
113
+ @attributes[:bypass_inactive_disable]
114
+ end
115
+
116
+ def bypass_inactive_disable=(value)
117
+ @attributes[:bypass_inactive_disable] = value
118
+ end
119
+
111
120
  # date-time - When this user was created
112
121
  def created_at
113
122
  @attributes[:created_at]
@@ -514,6 +523,7 @@ module Files
514
523
  # authenticate_until - string - Scheduled Date/Time at which user will be deactivated
515
524
  # authentication_method - string - How is this user authenticated?
516
525
  # billing_permission - boolean - Allow this user to perform operations on the account, payments, and invoices?
526
+ # bypass_inactive_disable - boolean - Exempt this user from being disabled based on inactivity?
517
527
  # bypass_site_allowed_ips - boolean - Allow this user to skip site-wide IP blacklists?
518
528
  # dav_permission - boolean - Can the user connect with WebDAV?
519
529
  # disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting.
@@ -648,6 +658,7 @@ module Files
648
658
  # authenticate_until - string - Scheduled Date/Time at which user will be deactivated
649
659
  # authentication_method - string - How is this user authenticated?
650
660
  # billing_permission - boolean - Allow this user to perform operations on the account, payments, and invoices?
661
+ # bypass_inactive_disable - boolean - Exempt this user from being disabled based on inactivity?
651
662
  # bypass_site_allowed_ips - boolean - Allow this user to skip site-wide IP blacklists?
652
663
  # dav_permission - boolean - Can the user connect with WebDAV?
653
664
  # disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting.
@@ -747,6 +758,7 @@ module Files
747
758
  # authenticate_until - string - Scheduled Date/Time at which user will be deactivated
748
759
  # authentication_method - string - How is this user authenticated?
749
760
  # billing_permission - boolean - Allow this user to perform operations on the account, payments, and invoices?
761
+ # bypass_inactive_disable - boolean - Exempt this user from being disabled based on inactivity?
750
762
  # bypass_site_allowed_ips - boolean - Allow this user to skip site-wide IP blacklists?
751
763
  # dav_permission - boolean - Can the user connect with WebDAV?
752
764
  # disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting.
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.51
4
+ version: 1.0.56
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-05-19 00:00:00.000000000 Z
11
+ date: 2020-05-26 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: faraday