files.com 1.0.58 → 1.0.63

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 95ef0f5e3fcf334ae2d2abecebcf49f85fe6b6527e5d8b5d8553480a0d794395
4
- data.tar.gz: 32bf7c269933adf563c492162df9a1d2ed234187623549ae1076144c540cc311
3
+ metadata.gz: e4425d4bcfca9c45d8f7408a76c4c3de345f60c18d069ffb780d3ba1f6f2d173
4
+ data.tar.gz: eb637db3ac7ffec9c2d3a0617c2d1b82d22c94ae8f643e871a17440146eb6d24
5
5
  SHA512:
6
- metadata.gz: f257bdbe6e08c15938be2b3009c83c1127194d24d5fd93b4b3427a9a3f32046376ed91ea318890904170a258aa5644169db0af2c9c4fd5a49a745dd4015a62bb
7
- data.tar.gz: 7151db08884f1cd7aa4d33f18e25112abf3beaff0750c16212a3c6185836ec4aa5b900bc3707f80144e2eac057d2f8e4d8773a56136ab98ba89ce54b6bb4ed4d
6
+ metadata.gz: 6b51b805a970a1fe4861fd3b5d72ed33b8e589d116ce009ca9f350ab7a4d946711f9039f847173d6dbd0e50fc020fe35f3e9219c796bd859c78f9e712642422a
7
+ data.tar.gz: 1e70fccd4752b23ba6384dc9e8da0907e223ea9513f941ff8b068fc3553151ea04036db80c7b5ba5d18297f49d07114f435baf3f559476f85ae4beee9dcc65d1
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.58
1
+ 1.0.63
@@ -158,7 +158,8 @@ Files::ApiKey.delete(id)
158
158
  ## Update Api Key
159
159
 
160
160
  ```
161
- api_key = Files::ApiKey.find(1)
161
+ api_key = Files::ApiKey.list_for(path).first
162
+
162
163
  api_key.update(
163
164
  name: "My Key",
164
165
  permission_set: "full",
@@ -179,7 +180,8 @@ api_key.update(
179
180
  ## Delete Api Key
180
181
 
181
182
  ```
182
- api_key = Files::ApiKey.find(1)
183
+ api_key = Files::ApiKey.list_for(path).first
184
+
183
185
  api_key.delete
184
186
  ```
185
187
 
@@ -105,7 +105,8 @@ Files::As2Key.delete(id)
105
105
  ## Update As2 Key
106
106
 
107
107
  ```
108
- as2_key = Files::As2Key.find(1)
108
+ as2_key = Files::As2Key.list_for(path).first
109
+
109
110
  as2_key.update(
110
111
  as2_partnership_name: "Test"
111
112
  )
@@ -122,7 +123,8 @@ as2_key.update(
122
123
  ## Delete As2 Key
123
124
 
124
125
  ```
125
- as2_key = Files::As2Key.find(1)
126
+ as2_key = Files::As2Key.list_for(path).first
127
+
126
128
  as2_key.delete
127
129
  ```
128
130
 
@@ -143,7 +143,8 @@ Files::Automation.delete(id)
143
143
  ## Update Automation
144
144
 
145
145
  ```
146
- automation = Files::Automation.find(1)
146
+ automation = Files::Automation.list_for(path).first
147
+
147
148
  automation.update(
148
149
  automation: "create_folder",
149
150
  source: "source",
@@ -171,7 +172,8 @@ automation.update(
171
172
  ## Delete Automation
172
173
 
173
174
  ```
174
- automation = Files::Automation.find(1)
175
+ automation = Files::Automation.list_for(path).first
176
+
175
177
  automation.delete
176
178
  ```
177
179
 
@@ -151,7 +151,8 @@ Files::Behavior.delete(id)
151
151
  ## Update Behavior
152
152
 
153
153
  ```
154
- behavior = Files::Behavior.find(1)
154
+ behavior = Files::Behavior.list_for(path).first
155
+
155
156
  behavior.update(
156
157
  value: "{\"method\": \"GET\"}"
157
158
  )
@@ -169,7 +170,8 @@ behavior.update(
169
170
  ## Delete Behavior
170
171
 
171
172
  ```
172
- behavior = Files::Behavior.find(1)
173
+ behavior = Files::Behavior.list_for(path).first
174
+
173
175
  behavior.delete
174
176
  ```
175
177
 
@@ -154,7 +154,8 @@ Files::Bundle.delete(id)
154
154
  ## Send email(s) with a link to bundle
155
155
 
156
156
  ```
157
- bundle = Files::Bundle.find(1)
157
+ bundle = Files::Bundle.list_for(path).first
158
+
158
159
  bundle.share(
159
160
  to: ["johndoe@gmail.com"],
160
161
  note: "Just a note."
@@ -173,7 +174,8 @@ bundle.share(
173
174
  ## Update Bundle
174
175
 
175
176
  ```
176
- bundle = Files::Bundle.find(1)
177
+ bundle = Files::Bundle.list_for(path).first
178
+
177
179
  bundle.update(
178
180
  password: "Password",
179
181
  expires_at: "2000-01-01T01:00:00Z",
@@ -198,7 +200,8 @@ bundle.update(
198
200
  ## Delete Bundle
199
201
 
200
202
  ```
201
- bundle = Files::Bundle.find(1)
203
+ bundle = Files::Bundle.list_for(path).first
204
+
202
205
  bundle.delete
203
206
  ```
204
207
 
@@ -150,7 +150,8 @@ Files::File.delete(path,
150
150
  ## Download file
151
151
 
152
152
  ```
153
- file = Files::File.find(1)
153
+ file = Files::File.list_for(path).first
154
+
154
155
  file.download(
155
156
  id: 1,
156
157
  with_previews: true,
@@ -172,7 +173,8 @@ file.download(
172
173
  ## Update file/folder metadata
173
174
 
174
175
  ```
175
- file = Files::File.find(1)
176
+ file = Files::File.list_for(path).first
177
+
176
178
  file.update(
177
179
  provided_mtime: "2000-01-01T01:00:00Z",
178
180
  priority_color: "red"
@@ -191,7 +193,8 @@ file.update(
191
193
  ## Delete file/folder
192
194
 
193
195
  ```
194
- file = Files::File.find(1)
196
+ file = Files::File.list_for(path).first
197
+
195
198
  file.delete(
196
199
  recursive: true
197
200
  )
@@ -63,7 +63,8 @@ Files::FileAction.begin_upload(path,
63
63
  ## Copy file/folder
64
64
 
65
65
  ```
66
- file_action = Files::FileAction.find(1)
66
+ file_action = Files::FileAction.list_for(path).first
67
+
67
68
  file_action.copy(
68
69
  destination: "destination"
69
70
  )
@@ -80,7 +81,8 @@ file_action.copy(
80
81
  ## Move file/folder
81
82
 
82
83
  ```
83
- file_action = Files::FileAction.find(1)
84
+ file_action = Files::FileAction.list_for(path).first
85
+
84
86
  file_action.move(
85
87
  destination: "destination"
86
88
  )
@@ -97,7 +99,8 @@ file_action.move(
97
99
  ## Begin file upload
98
100
 
99
101
  ```
100
- file_action = Files::FileAction.find(1)
102
+ file_action = Files::FileAction.list_for(path).first
103
+
101
104
  file_action.begin_upload(
102
105
  mkdir_parents: true,
103
106
  part: 1,
@@ -88,7 +88,8 @@ Files::FileComment.delete(id)
88
88
  ## Update File Comment
89
89
 
90
90
  ```
91
- file_comment = Files::FileComment.find(1)
91
+ file_comment = Files::FileComment.list_for(path).first
92
+
92
93
  file_comment.update(
93
94
  body: "body"
94
95
  )
@@ -105,7 +106,8 @@ file_comment.update(
105
106
  ## Delete File Comment
106
107
 
107
108
  ```
108
- file_comment = Files::FileComment.find(1)
109
+ file_comment = Files::FileComment.list_for(path).first
110
+
109
111
  file_comment.delete
110
112
  ```
111
113
 
@@ -52,7 +52,8 @@ Files::FileCommentReaction.delete(id)
52
52
  ## Delete File Comment Reaction
53
53
 
54
54
  ```
55
- file_comment_reaction = Files::FileCommentReaction.find(1)
55
+ file_comment_reaction = Files::FileCommentReaction.list_for(path).first
56
+
56
57
  file_comment_reaction.delete
57
58
  ```
58
59
 
@@ -114,7 +114,8 @@ Files::Group.delete(id)
114
114
  ## Update Group
115
115
 
116
116
  ```
117
- group = Files::Group.find(1)
117
+ group = Files::Group.list_for(path).first
118
+
118
119
  group.update(
119
120
  name: "owners"
120
121
  )
@@ -134,7 +135,8 @@ group.update(
134
135
  ## Delete Group
135
136
 
136
137
  ```
137
- group = Files::Group.find(1)
138
+ group = Files::Group.list_for(path).first
139
+
138
140
  group.delete
139
141
  ```
140
142
 
@@ -81,7 +81,8 @@ Files::GroupUser.delete(id)
81
81
  ## Update Group User
82
82
 
83
83
  ```
84
- group_user = Files::GroupUser.find(1)
84
+ group_user = Files::GroupUser.list_for(path).first
85
+
85
86
  group_user.update(
86
87
  group_id: 1,
87
88
  user_id: 1,
@@ -102,7 +103,8 @@ group_user.update(
102
103
  ## Delete Group User
103
104
 
104
105
  ```
105
- group_user = Files::GroupUser.find(1)
106
+ group_user = Files::GroupUser.list_for(path).first
107
+
106
108
  group_user.delete
107
109
  ```
108
110
 
@@ -164,7 +164,8 @@ Files::HistoryExport.delete(id)
164
164
  ## Delete History Export
165
165
 
166
166
  ```
167
- history_export = Files::HistoryExport.find(1)
167
+ history_export = Files::HistoryExport.list_for(path).first
168
+
168
169
  history_export.delete
169
170
  ```
170
171
 
@@ -85,7 +85,8 @@ Files::Lock.delete(path,
85
85
  ## Delete Lock
86
86
 
87
87
  ```
88
- lock = Files::Lock.find(1)
88
+ lock = Files::Lock.list_for(path).first
89
+
89
90
  lock.delete(
90
91
  token: "token"
91
92
  )
@@ -115,7 +115,8 @@ Files::Message.delete(id)
115
115
  ## Update Message
116
116
 
117
117
  ```
118
- message = Files::Message.find(1)
118
+ message = Files::Message.list_for(path).first
119
+
119
120
  message.update(
120
121
  project_id: 1,
121
122
  subject: "subject",
@@ -136,7 +137,8 @@ message.update(
136
137
  ## Delete Message
137
138
 
138
139
  ```
139
- message = Files::Message.find(1)
140
+ message = Files::Message.list_for(path).first
141
+
140
142
  message.delete
141
143
  ```
142
144
 
@@ -104,7 +104,8 @@ Files::MessageComment.delete(id)
104
104
  ## Update Message Comment
105
105
 
106
106
  ```
107
- message_comment = Files::MessageComment.find(1)
107
+ message_comment = Files::MessageComment.list_for(path).first
108
+
108
109
  message_comment.update(
109
110
  body: "body"
110
111
  )
@@ -121,7 +122,8 @@ message_comment.update(
121
122
  ## Delete Message Comment
122
123
 
123
124
  ```
124
- message_comment = Files::MessageComment.find(1)
125
+ message_comment = Files::MessageComment.list_for(path).first
126
+
125
127
  message_comment.delete
126
128
  ```
127
129
 
@@ -84,7 +84,8 @@ Files::MessageCommentReaction.delete(id)
84
84
  ## Delete Message Comment Reaction
85
85
 
86
86
  ```
87
- message_comment_reaction = Files::MessageCommentReaction.find(1)
87
+ message_comment_reaction = Files::MessageCommentReaction.list_for(path).first
88
+
88
89
  message_comment_reaction.delete
89
90
  ```
90
91
 
@@ -84,7 +84,8 @@ Files::MessageReaction.delete(id)
84
84
  ## Delete Message Reaction
85
85
 
86
86
  ```
87
- message_reaction = Files::MessageReaction.find(1)
87
+ message_reaction = Files::MessageReaction.list_for(path).first
88
+
88
89
  message_reaction.delete
89
90
  ```
90
91
 
@@ -133,7 +133,8 @@ Files::Notification.delete(id)
133
133
  ## Update Notification
134
134
 
135
135
  ```
136
- notification = Files::Notification.find(1)
136
+ notification = Files::Notification.list_for(path).first
137
+
137
138
  notification.update(
138
139
  notify_on_copy: true,
139
140
  notify_user_actions: true,
@@ -154,7 +155,8 @@ notification.update(
154
155
  ## Delete Notification
155
156
 
156
157
  ```
157
- notification = Files::Notification.find(1)
158
+ notification = Files::Notification.list_for(path).first
159
+
158
160
  notification.delete
159
161
  ```
160
162
 
@@ -93,7 +93,8 @@ Files::Project.delete(id)
93
93
  ## Update Project
94
94
 
95
95
  ```
96
- project = Files::Project.find(1)
96
+ project = Files::Project.list_for(path).first
97
+
97
98
  project.update(
98
99
  global_access: "global_access"
99
100
  )
@@ -110,7 +111,8 @@ project.update(
110
111
  ## Delete Project
111
112
 
112
113
  ```
113
- project = Files::Project.find(1)
114
+ project = Files::Project.list_for(path).first
115
+
114
116
  project.delete
115
117
  ```
116
118
 
@@ -105,7 +105,8 @@ Files::PublicKey.delete(id)
105
105
  ## Update Public Key
106
106
 
107
107
  ```
108
- public_key = Files::PublicKey.find(1)
108
+ public_key = Files::PublicKey.list_for(path).first
109
+
109
110
  public_key.update(
110
111
  title: "My Main Key"
111
112
  )
@@ -122,7 +123,8 @@ public_key.update(
122
123
  ## Delete Public Key
123
124
 
124
125
  ```
125
- public_key = Files::PublicKey.find(1)
126
+ public_key = Files::PublicKey.list_for(path).first
127
+
126
128
  public_key.delete
127
129
  ```
128
130
 
@@ -13,6 +13,7 @@
13
13
  "s3_bucket": "my-bucket",
14
14
  "s3_region": "us-east-1",
15
15
  "server_certificate": "[certificate]",
16
+ "server_host_key": "[public key]",
16
17
  "server_type": "s3",
17
18
  "ssl": "always",
18
19
  "username": "user",
@@ -34,6 +35,7 @@
34
35
  * `s3_bucket` (string): S3 bucket name
35
36
  * `s3_region` (string): S3 region
36
37
  * `server_certificate` (string): Remote server certificate
38
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
37
39
  * `server_type` (string): Remote server type.
38
40
  * `ssl` (string): Should we require SSL?
39
41
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -98,6 +100,7 @@ Files::RemoteServer.create(
98
100
  s3_bucket: "my-bucket",
99
101
  s3_region: "us-east-1",
100
102
  server_certificate: "[certificate]",
103
+ server_host_key: "[public key]",
101
104
  server_type: "s3",
102
105
  ssl: "always",
103
106
  username: "user",
@@ -128,6 +131,7 @@ Files::RemoteServer.create(
128
131
  * `s3_bucket` (string): S3 bucket name
129
132
  * `s3_region` (string): S3 region
130
133
  * `server_certificate` (string): Remote server certificate
134
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
131
135
  * `server_type` (string): Remote server type.
132
136
  * `ssl` (string): Should we require SSL?
133
137
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -152,6 +156,7 @@ Files::RemoteServer.update(id,
152
156
  s3_bucket: "my-bucket",
153
157
  s3_region: "us-east-1",
154
158
  server_certificate: "[certificate]",
159
+ server_host_key: "[public key]",
155
160
  server_type: "s3",
156
161
  ssl: "always",
157
162
  username: "user",
@@ -183,6 +188,7 @@ Files::RemoteServer.update(id,
183
188
  * `s3_bucket` (string): S3 bucket name
184
189
  * `s3_region` (string): S3 region
185
190
  * `server_certificate` (string): Remote server certificate
191
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
186
192
  * `server_type` (string): Remote server type.
187
193
  * `ssl` (string): Should we require SSL?
188
194
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -212,7 +218,8 @@ Files::RemoteServer.delete(id)
212
218
  ## Update Remote Server
213
219
 
214
220
  ```
215
- remote_server = Files::RemoteServer.find(1)
221
+ remote_server = Files::RemoteServer.list_for(path).first
222
+
216
223
  remote_server.update(
217
224
  hostname: "remote-server.com",
218
225
  name: "My Remote server",
@@ -221,6 +228,7 @@ remote_server.update(
221
228
  s3_bucket: "my-bucket",
222
229
  s3_region: "us-east-1",
223
230
  server_certificate: "[certificate]",
231
+ server_host_key: "[public key]",
224
232
  server_type: "s3",
225
233
  ssl: "always",
226
234
  username: "user",
@@ -252,6 +260,7 @@ remote_server.update(
252
260
  * `s3_bucket` (string): S3 bucket name
253
261
  * `s3_region` (string): S3 region
254
262
  * `server_certificate` (string): Remote server certificate
263
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
255
264
  * `server_type` (string): Remote server type.
256
265
  * `ssl` (string): Should we require SSL?
257
266
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -268,7 +277,8 @@ remote_server.update(
268
277
  ## Delete Remote Server
269
278
 
270
279
  ```
271
- remote_server = Files::RemoteServer.find(1)
280
+ remote_server = Files::RemoteServer.list_for(path).first
281
+
272
282
  remote_server.delete
273
283
  ```
274
284
 
@@ -101,7 +101,8 @@ Files::Request.delete(id)
101
101
  ## List Requests
102
102
 
103
103
  ```
104
- request = Files::Request.find(1)
104
+ request = Files::Request.list_for(path).first
105
+
105
106
  request.folders(
106
107
  page: 1,
107
108
  per_page: 1,
@@ -19,6 +19,8 @@
19
19
  "subdomain": "my-site",
20
20
  "provision_users": true,
21
21
  "provision_groups": true,
22
+ "deprovision_users": true,
23
+ "deprovision_groups": true,
22
24
  "provision_group_default": "Employees",
23
25
  "provision_group_exclusion": "Employees",
24
26
  "provision_group_inclusion": "Employees",
@@ -27,7 +29,18 @@
27
29
  "provision_dav_permission": true,
28
30
  "provision_ftp_permission": true,
29
31
  "provision_sftp_permission": true,
30
- "provision_time_zone": "Eastern Time (US & Canada)"
32
+ "provision_time_zone": "Eastern Time (US & Canada)",
33
+ "ldap_base_dn": "",
34
+ "ldap_domain": "mysite.com",
35
+ "enabled": true,
36
+ "ldap_host": "ldap.site.com",
37
+ "ldap_host_2": "ldap2.site.com",
38
+ "ldap_host_3": "ldap3.site.com",
39
+ "ldap_port": 1,
40
+ "ldap_secure": true,
41
+ "ldap_user_include_groups": "",
42
+ "ldap_username": "[ldap username]",
43
+ "ldap_username_field": "sAMAccountName"
31
44
  }
32
45
  ```
33
46
 
@@ -46,6 +59,8 @@
46
59
  * `subdomain` (string): Subdomain
47
60
  * `provision_users` (boolean): Auto-provision users?
48
61
  * `provision_groups` (boolean): Auto-provision group membership based on group memberships on the SSO side?
62
+ * `deprovision_users` (boolean): Auto-deprovision users?
63
+ * `deprovision_groups` (boolean): Auto-deprovision group membership based on group memberships on the SSO side?
49
64
  * `provision_group_default` (string): Comma-separated list of group names for groups to automatically add all auto-provisioned users to.
50
65
  * `provision_group_exclusion` (string): Comma-separated list of group names for groups (with optional wildcards) that will be excluded from auto-provisioning.
51
66
  * `provision_group_inclusion` (string): Comma-separated list of group names for groups (with optional wildcards) that will be auto-provisioned.
@@ -55,6 +70,17 @@
55
70
  * `provision_ftp_permission` (boolean): Auto-provisioned users get FTP permission?
56
71
  * `provision_sftp_permission` (boolean): Auto-provisioned users get SFTP permission?
57
72
  * `provision_time_zone` (string): Default time zone for auto provisioned users.
73
+ * `ldap_base_dn` (string): Base DN for looking up users in LDAP server
74
+ * `ldap_domain` (string): Domain name that will be appended to LDAP usernames
75
+ * `enabled` (boolean): Is strategy enabled?
76
+ * `ldap_host` (string): LDAP host
77
+ * `ldap_host_2` (string): LDAP backup host
78
+ * `ldap_host_3` (string): LDAP backup host
79
+ * `ldap_port` (int64): LDAP port
80
+ * `ldap_secure` (boolean): Use secure LDAP?
81
+ * `ldap_user_include_groups` (string): Comma or newline separated list of group names (with optional wildcards) - if provided, only users in these groups will be added or synced.
82
+ * `ldap_username` (string): Username for signing in to LDAP server.
83
+ * `ldap_username_field` (string): LDAP username field
58
84
 
59
85
 
60
86
  ---
@@ -65,7 +65,8 @@ Files::Style.delete(path)
65
65
  ## Update Style
66
66
 
67
67
  ```
68
- style = Files::Style.find(1)
68
+ style = Files::Style.list_for(path).first
69
+
69
70
  style.update(
70
71
  file: "file"
71
72
  )
@@ -82,7 +83,8 @@ style.update(
82
83
  ## Delete Style
83
84
 
84
85
  ```
85
- style = Files::Style.find(1)
86
+ style = Files::Style.list_for(path).first
87
+
86
88
  style.delete
87
89
  ```
88
90
 
@@ -371,7 +371,8 @@ Files::User.delete(id)
371
371
  ## Unlock user who has been locked out due to failed logins
372
372
 
373
373
  ```
374
- user = Files::User.find(1)
374
+ user = Files::User.list_for(path).first
375
+
375
376
  user.unlock
376
377
  ```
377
378
 
@@ -385,7 +386,8 @@ user.unlock
385
386
  ## Resend user welcome email
386
387
 
387
388
  ```
388
- user = Files::User.find(1)
389
+ user = Files::User.list_for(path).first
390
+
389
391
  user.resend_welcome_email
390
392
  ```
391
393
 
@@ -399,7 +401,8 @@ user.resend_welcome_email
399
401
  ## Trigger 2FA Reset process for user who has lost access to their existing 2FA methods
400
402
 
401
403
  ```
402
- user = Files::User.find(1)
404
+ user = Files::User.list_for(path).first
405
+
403
406
  user.user_2fa_reset
404
407
  ```
405
408
 
@@ -413,7 +416,8 @@ user.user_2fa_reset
413
416
  ## Update User
414
417
 
415
418
  ```
416
- user = Files::User.find(1)
419
+ user = Files::User.list_for(path).first
420
+
417
421
  user.update(
418
422
  avatar_delete: true,
419
423
  email: "john.doe@files.com",
@@ -498,7 +502,8 @@ user.update(
498
502
  ## Delete User
499
503
 
500
504
  ```
501
- user = Files::User.find(1)
505
+ user = Files::User.list_for(path).first
506
+
502
507
  user.delete
503
508
  ```
504
509
 
@@ -191,8 +191,9 @@ module Files
191
191
  def self.update(id, params = {}, options = {})
192
192
  params ||= {}
193
193
  params[:id] = id
194
- raise InvalidParameterError.new("Bad parameter: id must be an Integer") if params.dig(:id) and !params.dig(:id).is_a?(Integer)
194
+ raise InvalidParameterError.new("Bad parameter: id must be one of String, Integer, Hash") if params.dig(:id) and [String, Integer, Hash].none? { |klass| params.dig(:id).is_a?(klass) }
195
195
  raise InvalidParameterError.new("Bad parameter: value must be an String") if params.dig(:value) and !params.dig(:value).is_a?(String)
196
+ raise InvalidParameterError.new("Bad parameter: attachment_file must be one of String, Integer, Hash") if params.dig(:attachment_file) and [String, Integer, Hash].none? { |klass| params.dig(:attachment_file).is_a?(klass) }
196
197
  raise MissingParameterError.new("Parameter missing: id") unless params.dig(:id)
197
198
 
198
199
  response, options = Api.send_request("/behaviors/#{params[:id]}", :patch, params, options)
@@ -90,6 +90,15 @@ module Files
90
90
  @attributes[:server_certificate] = value
91
91
  end
92
92
 
93
+ # string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
94
+ def server_host_key
95
+ @attributes[:server_host_key]
96
+ end
97
+
98
+ def server_host_key=(value)
99
+ @attributes[:server_host_key] = value
100
+ end
101
+
93
102
  # string - Remote server type.
94
103
  def server_type
95
104
  @attributes[:server_type]
@@ -269,6 +278,7 @@ module Files
269
278
  # s3_bucket - string - S3 bucket name
270
279
  # s3_region - string - S3 region
271
280
  # server_certificate - string - Remote server certificate
281
+ # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
272
282
  # server_type - string - Remote server type.
273
283
  # ssl - string - Should we require SSL?
274
284
  # username - string - Remote server username. Not needed for S3 buckets.
@@ -299,6 +309,7 @@ module Files
299
309
  raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
300
310
  raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
301
311
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
312
+ raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
302
313
  raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
303
314
  raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
304
315
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
@@ -385,6 +396,7 @@ module Files
385
396
  # s3_bucket - string - S3 bucket name
386
397
  # s3_region - string - S3 region
387
398
  # server_certificate - string - Remote server certificate
399
+ # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
388
400
  # server_type - string - Remote server type.
389
401
  # ssl - string - Should we require SSL?
390
402
  # username - string - Remote server username. Not needed for S3 buckets.
@@ -411,6 +423,7 @@ module Files
411
423
  raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
412
424
  raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
413
425
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
426
+ raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
414
427
  raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
415
428
  raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
416
429
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
@@ -442,6 +455,7 @@ module Files
442
455
  # s3_bucket - string - S3 bucket name
443
456
  # s3_region - string - S3 region
444
457
  # server_certificate - string - Remote server certificate
458
+ # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
445
459
  # server_type - string - Remote server type.
446
460
  # ssl - string - Should we require SSL?
447
461
  # username - string - Remote server username. Not needed for S3 buckets.
@@ -471,6 +485,7 @@ module Files
471
485
  raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
472
486
  raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
473
487
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
488
+ raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
474
489
  raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
475
490
  raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
476
491
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
@@ -84,6 +84,16 @@ module Files
84
84
  @attributes[:provision_groups]
85
85
  end
86
86
 
87
+ # boolean - Auto-deprovision users?
88
+ def deprovision_users
89
+ @attributes[:deprovision_users]
90
+ end
91
+
92
+ # boolean - Auto-deprovision group membership based on group memberships on the SSO side?
93
+ def deprovision_groups
94
+ @attributes[:deprovision_groups]
95
+ end
96
+
87
97
  # string - Comma-separated list of group names for groups to automatically add all auto-provisioned users to.
88
98
  def provision_group_default
89
99
  @attributes[:provision_group_default]
@@ -129,6 +139,61 @@ module Files
129
139
  @attributes[:provision_time_zone]
130
140
  end
131
141
 
142
+ # string - Base DN for looking up users in LDAP server
143
+ def ldap_base_dn
144
+ @attributes[:ldap_base_dn]
145
+ end
146
+
147
+ # string - Domain name that will be appended to LDAP usernames
148
+ def ldap_domain
149
+ @attributes[:ldap_domain]
150
+ end
151
+
152
+ # boolean - Is strategy enabled?
153
+ def enabled
154
+ @attributes[:enabled]
155
+ end
156
+
157
+ # string - LDAP host
158
+ def ldap_host
159
+ @attributes[:ldap_host]
160
+ end
161
+
162
+ # string - LDAP backup host
163
+ def ldap_host_2
164
+ @attributes[:ldap_host_2]
165
+ end
166
+
167
+ # string - LDAP backup host
168
+ def ldap_host_3
169
+ @attributes[:ldap_host_3]
170
+ end
171
+
172
+ # int64 - LDAP port
173
+ def ldap_port
174
+ @attributes[:ldap_port]
175
+ end
176
+
177
+ # boolean - Use secure LDAP?
178
+ def ldap_secure
179
+ @attributes[:ldap_secure]
180
+ end
181
+
182
+ # string - Comma or newline separated list of group names (with optional wildcards) - if provided, only users in these groups will be added or synced.
183
+ def ldap_user_include_groups
184
+ @attributes[:ldap_user_include_groups]
185
+ end
186
+
187
+ # string - Username for signing in to LDAP server.
188
+ def ldap_username
189
+ @attributes[:ldap_username]
190
+ end
191
+
192
+ # string - LDAP username field
193
+ def ldap_username_field
194
+ @attributes[:ldap_username_field]
195
+ end
196
+
132
197
  # Parameters:
133
198
  # page - int64 - Current page number.
134
199
  # per_page - int64 - Number of records to show per page. (Max: 10,000, 1,000 or less is recommended).
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.58
4
+ version: 1.0.63
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-05-28 00:00:00.000000000 Z
11
+ date: 2020-06-03 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: faraday