files.com 1.0.58 → 1.0.59
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/remote_server.md +8 -0
- data/lib/files.com/models/remote_server.rb +15 -0
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c09bc8021adb4407a4e021795500c97bf535041760612308aacfaa0ff708975d
|
4
|
+
data.tar.gz: af4beceec1c7ffdf320aa36be097ee9c46a54752a6deeb785646885cf55914fd
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 18cc2d35f9e043ac4435c386412f2858dc19d3dd8632869a103ec3a018896786e39eeabb85e9efcc957813d7eea7246f871fb52d1332d0579b3baf5e9a6dddb0
|
7
|
+
data.tar.gz: dda980081bfec7c386cd762619c536a08c27b7ea5966f16e390b467ba2b951c38be5cc38f9df485c5b74faaa230c8033aef8c81964a5d3661243c524cd83c252
|
data/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.0.
|
1
|
+
1.0.59
|
data/docs/remote_server.md
CHANGED
@@ -13,6 +13,7 @@
|
|
13
13
|
"s3_bucket": "my-bucket",
|
14
14
|
"s3_region": "us-east-1",
|
15
15
|
"server_certificate": "[certificate]",
|
16
|
+
"server_host_key": "[public key]",
|
16
17
|
"server_type": "s3",
|
17
18
|
"ssl": "always",
|
18
19
|
"username": "user",
|
@@ -34,6 +35,7 @@
|
|
34
35
|
* `s3_bucket` (string): S3 bucket name
|
35
36
|
* `s3_region` (string): S3 region
|
36
37
|
* `server_certificate` (string): Remote server certificate
|
38
|
+
* `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
37
39
|
* `server_type` (string): Remote server type.
|
38
40
|
* `ssl` (string): Should we require SSL?
|
39
41
|
* `username` (string): Remote server username. Not needed for S3 buckets.
|
@@ -98,6 +100,7 @@ Files::RemoteServer.create(
|
|
98
100
|
s3_bucket: "my-bucket",
|
99
101
|
s3_region: "us-east-1",
|
100
102
|
server_certificate: "[certificate]",
|
103
|
+
server_host_key: "[public key]",
|
101
104
|
server_type: "s3",
|
102
105
|
ssl: "always",
|
103
106
|
username: "user",
|
@@ -128,6 +131,7 @@ Files::RemoteServer.create(
|
|
128
131
|
* `s3_bucket` (string): S3 bucket name
|
129
132
|
* `s3_region` (string): S3 region
|
130
133
|
* `server_certificate` (string): Remote server certificate
|
134
|
+
* `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
131
135
|
* `server_type` (string): Remote server type.
|
132
136
|
* `ssl` (string): Should we require SSL?
|
133
137
|
* `username` (string): Remote server username. Not needed for S3 buckets.
|
@@ -152,6 +156,7 @@ Files::RemoteServer.update(id,
|
|
152
156
|
s3_bucket: "my-bucket",
|
153
157
|
s3_region: "us-east-1",
|
154
158
|
server_certificate: "[certificate]",
|
159
|
+
server_host_key: "[public key]",
|
155
160
|
server_type: "s3",
|
156
161
|
ssl: "always",
|
157
162
|
username: "user",
|
@@ -183,6 +188,7 @@ Files::RemoteServer.update(id,
|
|
183
188
|
* `s3_bucket` (string): S3 bucket name
|
184
189
|
* `s3_region` (string): S3 region
|
185
190
|
* `server_certificate` (string): Remote server certificate
|
191
|
+
* `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
186
192
|
* `server_type` (string): Remote server type.
|
187
193
|
* `ssl` (string): Should we require SSL?
|
188
194
|
* `username` (string): Remote server username. Not needed for S3 buckets.
|
@@ -221,6 +227,7 @@ remote_server.update(
|
|
221
227
|
s3_bucket: "my-bucket",
|
222
228
|
s3_region: "us-east-1",
|
223
229
|
server_certificate: "[certificate]",
|
230
|
+
server_host_key: "[public key]",
|
224
231
|
server_type: "s3",
|
225
232
|
ssl: "always",
|
226
233
|
username: "user",
|
@@ -252,6 +259,7 @@ remote_server.update(
|
|
252
259
|
* `s3_bucket` (string): S3 bucket name
|
253
260
|
* `s3_region` (string): S3 region
|
254
261
|
* `server_certificate` (string): Remote server certificate
|
262
|
+
* `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
255
263
|
* `server_type` (string): Remote server type.
|
256
264
|
* `ssl` (string): Should we require SSL?
|
257
265
|
* `username` (string): Remote server username. Not needed for S3 buckets.
|
@@ -90,6 +90,15 @@ module Files
|
|
90
90
|
@attributes[:server_certificate] = value
|
91
91
|
end
|
92
92
|
|
93
|
+
# string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
94
|
+
def server_host_key
|
95
|
+
@attributes[:server_host_key]
|
96
|
+
end
|
97
|
+
|
98
|
+
def server_host_key=(value)
|
99
|
+
@attributes[:server_host_key] = value
|
100
|
+
end
|
101
|
+
|
93
102
|
# string - Remote server type.
|
94
103
|
def server_type
|
95
104
|
@attributes[:server_type]
|
@@ -269,6 +278,7 @@ module Files
|
|
269
278
|
# s3_bucket - string - S3 bucket name
|
270
279
|
# s3_region - string - S3 region
|
271
280
|
# server_certificate - string - Remote server certificate
|
281
|
+
# server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
272
282
|
# server_type - string - Remote server type.
|
273
283
|
# ssl - string - Should we require SSL?
|
274
284
|
# username - string - Remote server username. Not needed for S3 buckets.
|
@@ -299,6 +309,7 @@ module Files
|
|
299
309
|
raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
|
300
310
|
raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
|
301
311
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
|
312
|
+
raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
|
302
313
|
raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
|
303
314
|
raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
|
304
315
|
raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
|
@@ -385,6 +396,7 @@ module Files
|
|
385
396
|
# s3_bucket - string - S3 bucket name
|
386
397
|
# s3_region - string - S3 region
|
387
398
|
# server_certificate - string - Remote server certificate
|
399
|
+
# server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
388
400
|
# server_type - string - Remote server type.
|
389
401
|
# ssl - string - Should we require SSL?
|
390
402
|
# username - string - Remote server username. Not needed for S3 buckets.
|
@@ -411,6 +423,7 @@ module Files
|
|
411
423
|
raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
|
412
424
|
raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
|
413
425
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
|
426
|
+
raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
|
414
427
|
raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
|
415
428
|
raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
|
416
429
|
raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
|
@@ -442,6 +455,7 @@ module Files
|
|
442
455
|
# s3_bucket - string - S3 bucket name
|
443
456
|
# s3_region - string - S3 region
|
444
457
|
# server_certificate - string - Remote server certificate
|
458
|
+
# server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
445
459
|
# server_type - string - Remote server type.
|
446
460
|
# ssl - string - Should we require SSL?
|
447
461
|
# username - string - Remote server username. Not needed for S3 buckets.
|
@@ -471,6 +485,7 @@ module Files
|
|
471
485
|
raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
|
472
486
|
raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
|
473
487
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
|
488
|
+
raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
|
474
489
|
raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
|
475
490
|
raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
|
476
491
|
raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: files.com
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.0.
|
4
|
+
version: 1.0.59
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- files.com
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-05-
|
11
|
+
date: 2020-05-29 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: faraday
|