files.com 1.0.58 → 1.0.63
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/api_key.md +4 -2
- data/docs/as2_key.md +4 -2
- data/docs/automation.md +4 -2
- data/docs/behavior.md +4 -2
- data/docs/bundle.md +6 -3
- data/docs/file.md +6 -3
- data/docs/file_action.md +6 -3
- data/docs/file_comment.md +4 -2
- data/docs/file_comment_reaction.md +2 -1
- data/docs/group.md +4 -2
- data/docs/group_user.md +4 -2
- data/docs/history_export.md +2 -1
- data/docs/lock.md +2 -1
- data/docs/message.md +4 -2
- data/docs/message_comment.md +4 -2
- data/docs/message_comment_reaction.md +2 -1
- data/docs/message_reaction.md +2 -1
- data/docs/notification.md +4 -2
- data/docs/project.md +4 -2
- data/docs/public_key.md +4 -2
- data/docs/remote_server.md +12 -2
- data/docs/request.md +2 -1
- data/docs/sso_strategy.md +27 -1
- data/docs/style.md +4 -2
- data/docs/user.md +10 -5
- data/lib/files.com/models/behavior.rb +2 -1
- data/lib/files.com/models/remote_server.rb +15 -0
- data/lib/files.com/models/sso_strategy.rb +65 -0
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: e4425d4bcfca9c45d8f7408a76c4c3de345f60c18d069ffb780d3ba1f6f2d173
|
4
|
+
data.tar.gz: eb637db3ac7ffec9c2d3a0617c2d1b82d22c94ae8f643e871a17440146eb6d24
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 6b51b805a970a1fe4861fd3b5d72ed33b8e589d116ce009ca9f350ab7a4d946711f9039f847173d6dbd0e50fc020fe35f3e9219c796bd859c78f9e712642422a
|
7
|
+
data.tar.gz: 1e70fccd4752b23ba6384dc9e8da0907e223ea9513f941ff8b068fc3553151ea04036db80c7b5ba5d18297f49d07114f435baf3f559476f85ae4beee9dcc65d1
|
data/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.0.
|
1
|
+
1.0.63
|
data/docs/api_key.md
CHANGED
@@ -158,7 +158,8 @@ Files::ApiKey.delete(id)
|
|
158
158
|
## Update Api Key
|
159
159
|
|
160
160
|
```
|
161
|
-
api_key = Files::ApiKey.
|
161
|
+
api_key = Files::ApiKey.list_for(path).first
|
162
|
+
|
162
163
|
api_key.update(
|
163
164
|
name: "My Key",
|
164
165
|
permission_set: "full",
|
@@ -179,7 +180,8 @@ api_key.update(
|
|
179
180
|
## Delete Api Key
|
180
181
|
|
181
182
|
```
|
182
|
-
api_key = Files::ApiKey.
|
183
|
+
api_key = Files::ApiKey.list_for(path).first
|
184
|
+
|
183
185
|
api_key.delete
|
184
186
|
```
|
185
187
|
|
data/docs/as2_key.md
CHANGED
@@ -105,7 +105,8 @@ Files::As2Key.delete(id)
|
|
105
105
|
## Update As2 Key
|
106
106
|
|
107
107
|
```
|
108
|
-
as2_key = Files::As2Key.
|
108
|
+
as2_key = Files::As2Key.list_for(path).first
|
109
|
+
|
109
110
|
as2_key.update(
|
110
111
|
as2_partnership_name: "Test"
|
111
112
|
)
|
@@ -122,7 +123,8 @@ as2_key.update(
|
|
122
123
|
## Delete As2 Key
|
123
124
|
|
124
125
|
```
|
125
|
-
as2_key = Files::As2Key.
|
126
|
+
as2_key = Files::As2Key.list_for(path).first
|
127
|
+
|
126
128
|
as2_key.delete
|
127
129
|
```
|
128
130
|
|
data/docs/automation.md
CHANGED
@@ -143,7 +143,8 @@ Files::Automation.delete(id)
|
|
143
143
|
## Update Automation
|
144
144
|
|
145
145
|
```
|
146
|
-
automation = Files::Automation.
|
146
|
+
automation = Files::Automation.list_for(path).first
|
147
|
+
|
147
148
|
automation.update(
|
148
149
|
automation: "create_folder",
|
149
150
|
source: "source",
|
@@ -171,7 +172,8 @@ automation.update(
|
|
171
172
|
## Delete Automation
|
172
173
|
|
173
174
|
```
|
174
|
-
automation = Files::Automation.
|
175
|
+
automation = Files::Automation.list_for(path).first
|
176
|
+
|
175
177
|
automation.delete
|
176
178
|
```
|
177
179
|
|
data/docs/behavior.md
CHANGED
@@ -151,7 +151,8 @@ Files::Behavior.delete(id)
|
|
151
151
|
## Update Behavior
|
152
152
|
|
153
153
|
```
|
154
|
-
behavior = Files::Behavior.
|
154
|
+
behavior = Files::Behavior.list_for(path).first
|
155
|
+
|
155
156
|
behavior.update(
|
156
157
|
value: "{\"method\": \"GET\"}"
|
157
158
|
)
|
@@ -169,7 +170,8 @@ behavior.update(
|
|
169
170
|
## Delete Behavior
|
170
171
|
|
171
172
|
```
|
172
|
-
behavior = Files::Behavior.
|
173
|
+
behavior = Files::Behavior.list_for(path).first
|
174
|
+
|
173
175
|
behavior.delete
|
174
176
|
```
|
175
177
|
|
data/docs/bundle.md
CHANGED
@@ -154,7 +154,8 @@ Files::Bundle.delete(id)
|
|
154
154
|
## Send email(s) with a link to bundle
|
155
155
|
|
156
156
|
```
|
157
|
-
bundle = Files::Bundle.
|
157
|
+
bundle = Files::Bundle.list_for(path).first
|
158
|
+
|
158
159
|
bundle.share(
|
159
160
|
to: ["johndoe@gmail.com"],
|
160
161
|
note: "Just a note."
|
@@ -173,7 +174,8 @@ bundle.share(
|
|
173
174
|
## Update Bundle
|
174
175
|
|
175
176
|
```
|
176
|
-
bundle = Files::Bundle.
|
177
|
+
bundle = Files::Bundle.list_for(path).first
|
178
|
+
|
177
179
|
bundle.update(
|
178
180
|
password: "Password",
|
179
181
|
expires_at: "2000-01-01T01:00:00Z",
|
@@ -198,7 +200,8 @@ bundle.update(
|
|
198
200
|
## Delete Bundle
|
199
201
|
|
200
202
|
```
|
201
|
-
bundle = Files::Bundle.
|
203
|
+
bundle = Files::Bundle.list_for(path).first
|
204
|
+
|
202
205
|
bundle.delete
|
203
206
|
```
|
204
207
|
|
data/docs/file.md
CHANGED
@@ -150,7 +150,8 @@ Files::File.delete(path,
|
|
150
150
|
## Download file
|
151
151
|
|
152
152
|
```
|
153
|
-
file = Files::File.
|
153
|
+
file = Files::File.list_for(path).first
|
154
|
+
|
154
155
|
file.download(
|
155
156
|
id: 1,
|
156
157
|
with_previews: true,
|
@@ -172,7 +173,8 @@ file.download(
|
|
172
173
|
## Update file/folder metadata
|
173
174
|
|
174
175
|
```
|
175
|
-
file = Files::File.
|
176
|
+
file = Files::File.list_for(path).first
|
177
|
+
|
176
178
|
file.update(
|
177
179
|
provided_mtime: "2000-01-01T01:00:00Z",
|
178
180
|
priority_color: "red"
|
@@ -191,7 +193,8 @@ file.update(
|
|
191
193
|
## Delete file/folder
|
192
194
|
|
193
195
|
```
|
194
|
-
file = Files::File.
|
196
|
+
file = Files::File.list_for(path).first
|
197
|
+
|
195
198
|
file.delete(
|
196
199
|
recursive: true
|
197
200
|
)
|
data/docs/file_action.md
CHANGED
@@ -63,7 +63,8 @@ Files::FileAction.begin_upload(path,
|
|
63
63
|
## Copy file/folder
|
64
64
|
|
65
65
|
```
|
66
|
-
file_action = Files::FileAction.
|
66
|
+
file_action = Files::FileAction.list_for(path).first
|
67
|
+
|
67
68
|
file_action.copy(
|
68
69
|
destination: "destination"
|
69
70
|
)
|
@@ -80,7 +81,8 @@ file_action.copy(
|
|
80
81
|
## Move file/folder
|
81
82
|
|
82
83
|
```
|
83
|
-
file_action = Files::FileAction.
|
84
|
+
file_action = Files::FileAction.list_for(path).first
|
85
|
+
|
84
86
|
file_action.move(
|
85
87
|
destination: "destination"
|
86
88
|
)
|
@@ -97,7 +99,8 @@ file_action.move(
|
|
97
99
|
## Begin file upload
|
98
100
|
|
99
101
|
```
|
100
|
-
file_action = Files::FileAction.
|
102
|
+
file_action = Files::FileAction.list_for(path).first
|
103
|
+
|
101
104
|
file_action.begin_upload(
|
102
105
|
mkdir_parents: true,
|
103
106
|
part: 1,
|
data/docs/file_comment.md
CHANGED
@@ -88,7 +88,8 @@ Files::FileComment.delete(id)
|
|
88
88
|
## Update File Comment
|
89
89
|
|
90
90
|
```
|
91
|
-
file_comment = Files::FileComment.
|
91
|
+
file_comment = Files::FileComment.list_for(path).first
|
92
|
+
|
92
93
|
file_comment.update(
|
93
94
|
body: "body"
|
94
95
|
)
|
@@ -105,7 +106,8 @@ file_comment.update(
|
|
105
106
|
## Delete File Comment
|
106
107
|
|
107
108
|
```
|
108
|
-
file_comment = Files::FileComment.
|
109
|
+
file_comment = Files::FileComment.list_for(path).first
|
110
|
+
|
109
111
|
file_comment.delete
|
110
112
|
```
|
111
113
|
|
@@ -52,7 +52,8 @@ Files::FileCommentReaction.delete(id)
|
|
52
52
|
## Delete File Comment Reaction
|
53
53
|
|
54
54
|
```
|
55
|
-
file_comment_reaction = Files::FileCommentReaction.
|
55
|
+
file_comment_reaction = Files::FileCommentReaction.list_for(path).first
|
56
|
+
|
56
57
|
file_comment_reaction.delete
|
57
58
|
```
|
58
59
|
|
data/docs/group.md
CHANGED
@@ -114,7 +114,8 @@ Files::Group.delete(id)
|
|
114
114
|
## Update Group
|
115
115
|
|
116
116
|
```
|
117
|
-
group = Files::Group.
|
117
|
+
group = Files::Group.list_for(path).first
|
118
|
+
|
118
119
|
group.update(
|
119
120
|
name: "owners"
|
120
121
|
)
|
@@ -134,7 +135,8 @@ group.update(
|
|
134
135
|
## Delete Group
|
135
136
|
|
136
137
|
```
|
137
|
-
group = Files::Group.
|
138
|
+
group = Files::Group.list_for(path).first
|
139
|
+
|
138
140
|
group.delete
|
139
141
|
```
|
140
142
|
|
data/docs/group_user.md
CHANGED
@@ -81,7 +81,8 @@ Files::GroupUser.delete(id)
|
|
81
81
|
## Update Group User
|
82
82
|
|
83
83
|
```
|
84
|
-
group_user = Files::GroupUser.
|
84
|
+
group_user = Files::GroupUser.list_for(path).first
|
85
|
+
|
85
86
|
group_user.update(
|
86
87
|
group_id: 1,
|
87
88
|
user_id: 1,
|
@@ -102,7 +103,8 @@ group_user.update(
|
|
102
103
|
## Delete Group User
|
103
104
|
|
104
105
|
```
|
105
|
-
group_user = Files::GroupUser.
|
106
|
+
group_user = Files::GroupUser.list_for(path).first
|
107
|
+
|
106
108
|
group_user.delete
|
107
109
|
```
|
108
110
|
|
data/docs/history_export.md
CHANGED
data/docs/lock.md
CHANGED
data/docs/message.md
CHANGED
@@ -115,7 +115,8 @@ Files::Message.delete(id)
|
|
115
115
|
## Update Message
|
116
116
|
|
117
117
|
```
|
118
|
-
message = Files::Message.
|
118
|
+
message = Files::Message.list_for(path).first
|
119
|
+
|
119
120
|
message.update(
|
120
121
|
project_id: 1,
|
121
122
|
subject: "subject",
|
@@ -136,7 +137,8 @@ message.update(
|
|
136
137
|
## Delete Message
|
137
138
|
|
138
139
|
```
|
139
|
-
message = Files::Message.
|
140
|
+
message = Files::Message.list_for(path).first
|
141
|
+
|
140
142
|
message.delete
|
141
143
|
```
|
142
144
|
|
data/docs/message_comment.md
CHANGED
@@ -104,7 +104,8 @@ Files::MessageComment.delete(id)
|
|
104
104
|
## Update Message Comment
|
105
105
|
|
106
106
|
```
|
107
|
-
message_comment = Files::MessageComment.
|
107
|
+
message_comment = Files::MessageComment.list_for(path).first
|
108
|
+
|
108
109
|
message_comment.update(
|
109
110
|
body: "body"
|
110
111
|
)
|
@@ -121,7 +122,8 @@ message_comment.update(
|
|
121
122
|
## Delete Message Comment
|
122
123
|
|
123
124
|
```
|
124
|
-
message_comment = Files::MessageComment.
|
125
|
+
message_comment = Files::MessageComment.list_for(path).first
|
126
|
+
|
125
127
|
message_comment.delete
|
126
128
|
```
|
127
129
|
|
@@ -84,7 +84,8 @@ Files::MessageCommentReaction.delete(id)
|
|
84
84
|
## Delete Message Comment Reaction
|
85
85
|
|
86
86
|
```
|
87
|
-
message_comment_reaction = Files::MessageCommentReaction.
|
87
|
+
message_comment_reaction = Files::MessageCommentReaction.list_for(path).first
|
88
|
+
|
88
89
|
message_comment_reaction.delete
|
89
90
|
```
|
90
91
|
|
data/docs/message_reaction.md
CHANGED
data/docs/notification.md
CHANGED
@@ -133,7 +133,8 @@ Files::Notification.delete(id)
|
|
133
133
|
## Update Notification
|
134
134
|
|
135
135
|
```
|
136
|
-
notification = Files::Notification.
|
136
|
+
notification = Files::Notification.list_for(path).first
|
137
|
+
|
137
138
|
notification.update(
|
138
139
|
notify_on_copy: true,
|
139
140
|
notify_user_actions: true,
|
@@ -154,7 +155,8 @@ notification.update(
|
|
154
155
|
## Delete Notification
|
155
156
|
|
156
157
|
```
|
157
|
-
notification = Files::Notification.
|
158
|
+
notification = Files::Notification.list_for(path).first
|
159
|
+
|
158
160
|
notification.delete
|
159
161
|
```
|
160
162
|
|
data/docs/project.md
CHANGED
@@ -93,7 +93,8 @@ Files::Project.delete(id)
|
|
93
93
|
## Update Project
|
94
94
|
|
95
95
|
```
|
96
|
-
project = Files::Project.
|
96
|
+
project = Files::Project.list_for(path).first
|
97
|
+
|
97
98
|
project.update(
|
98
99
|
global_access: "global_access"
|
99
100
|
)
|
@@ -110,7 +111,8 @@ project.update(
|
|
110
111
|
## Delete Project
|
111
112
|
|
112
113
|
```
|
113
|
-
project = Files::Project.
|
114
|
+
project = Files::Project.list_for(path).first
|
115
|
+
|
114
116
|
project.delete
|
115
117
|
```
|
116
118
|
|
data/docs/public_key.md
CHANGED
@@ -105,7 +105,8 @@ Files::PublicKey.delete(id)
|
|
105
105
|
## Update Public Key
|
106
106
|
|
107
107
|
```
|
108
|
-
public_key = Files::PublicKey.
|
108
|
+
public_key = Files::PublicKey.list_for(path).first
|
109
|
+
|
109
110
|
public_key.update(
|
110
111
|
title: "My Main Key"
|
111
112
|
)
|
@@ -122,7 +123,8 @@ public_key.update(
|
|
122
123
|
## Delete Public Key
|
123
124
|
|
124
125
|
```
|
125
|
-
public_key = Files::PublicKey.
|
126
|
+
public_key = Files::PublicKey.list_for(path).first
|
127
|
+
|
126
128
|
public_key.delete
|
127
129
|
```
|
128
130
|
|
data/docs/remote_server.md
CHANGED
@@ -13,6 +13,7 @@
|
|
13
13
|
"s3_bucket": "my-bucket",
|
14
14
|
"s3_region": "us-east-1",
|
15
15
|
"server_certificate": "[certificate]",
|
16
|
+
"server_host_key": "[public key]",
|
16
17
|
"server_type": "s3",
|
17
18
|
"ssl": "always",
|
18
19
|
"username": "user",
|
@@ -34,6 +35,7 @@
|
|
34
35
|
* `s3_bucket` (string): S3 bucket name
|
35
36
|
* `s3_region` (string): S3 region
|
36
37
|
* `server_certificate` (string): Remote server certificate
|
38
|
+
* `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
37
39
|
* `server_type` (string): Remote server type.
|
38
40
|
* `ssl` (string): Should we require SSL?
|
39
41
|
* `username` (string): Remote server username. Not needed for S3 buckets.
|
@@ -98,6 +100,7 @@ Files::RemoteServer.create(
|
|
98
100
|
s3_bucket: "my-bucket",
|
99
101
|
s3_region: "us-east-1",
|
100
102
|
server_certificate: "[certificate]",
|
103
|
+
server_host_key: "[public key]",
|
101
104
|
server_type: "s3",
|
102
105
|
ssl: "always",
|
103
106
|
username: "user",
|
@@ -128,6 +131,7 @@ Files::RemoteServer.create(
|
|
128
131
|
* `s3_bucket` (string): S3 bucket name
|
129
132
|
* `s3_region` (string): S3 region
|
130
133
|
* `server_certificate` (string): Remote server certificate
|
134
|
+
* `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
131
135
|
* `server_type` (string): Remote server type.
|
132
136
|
* `ssl` (string): Should we require SSL?
|
133
137
|
* `username` (string): Remote server username. Not needed for S3 buckets.
|
@@ -152,6 +156,7 @@ Files::RemoteServer.update(id,
|
|
152
156
|
s3_bucket: "my-bucket",
|
153
157
|
s3_region: "us-east-1",
|
154
158
|
server_certificate: "[certificate]",
|
159
|
+
server_host_key: "[public key]",
|
155
160
|
server_type: "s3",
|
156
161
|
ssl: "always",
|
157
162
|
username: "user",
|
@@ -183,6 +188,7 @@ Files::RemoteServer.update(id,
|
|
183
188
|
* `s3_bucket` (string): S3 bucket name
|
184
189
|
* `s3_region` (string): S3 region
|
185
190
|
* `server_certificate` (string): Remote server certificate
|
191
|
+
* `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
186
192
|
* `server_type` (string): Remote server type.
|
187
193
|
* `ssl` (string): Should we require SSL?
|
188
194
|
* `username` (string): Remote server username. Not needed for S3 buckets.
|
@@ -212,7 +218,8 @@ Files::RemoteServer.delete(id)
|
|
212
218
|
## Update Remote Server
|
213
219
|
|
214
220
|
```
|
215
|
-
remote_server = Files::RemoteServer.
|
221
|
+
remote_server = Files::RemoteServer.list_for(path).first
|
222
|
+
|
216
223
|
remote_server.update(
|
217
224
|
hostname: "remote-server.com",
|
218
225
|
name: "My Remote server",
|
@@ -221,6 +228,7 @@ remote_server.update(
|
|
221
228
|
s3_bucket: "my-bucket",
|
222
229
|
s3_region: "us-east-1",
|
223
230
|
server_certificate: "[certificate]",
|
231
|
+
server_host_key: "[public key]",
|
224
232
|
server_type: "s3",
|
225
233
|
ssl: "always",
|
226
234
|
username: "user",
|
@@ -252,6 +260,7 @@ remote_server.update(
|
|
252
260
|
* `s3_bucket` (string): S3 bucket name
|
253
261
|
* `s3_region` (string): S3 region
|
254
262
|
* `server_certificate` (string): Remote server certificate
|
263
|
+
* `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
255
264
|
* `server_type` (string): Remote server type.
|
256
265
|
* `ssl` (string): Should we require SSL?
|
257
266
|
* `username` (string): Remote server username. Not needed for S3 buckets.
|
@@ -268,7 +277,8 @@ remote_server.update(
|
|
268
277
|
## Delete Remote Server
|
269
278
|
|
270
279
|
```
|
271
|
-
remote_server = Files::RemoteServer.
|
280
|
+
remote_server = Files::RemoteServer.list_for(path).first
|
281
|
+
|
272
282
|
remote_server.delete
|
273
283
|
```
|
274
284
|
|
data/docs/request.md
CHANGED
data/docs/sso_strategy.md
CHANGED
@@ -19,6 +19,8 @@
|
|
19
19
|
"subdomain": "my-site",
|
20
20
|
"provision_users": true,
|
21
21
|
"provision_groups": true,
|
22
|
+
"deprovision_users": true,
|
23
|
+
"deprovision_groups": true,
|
22
24
|
"provision_group_default": "Employees",
|
23
25
|
"provision_group_exclusion": "Employees",
|
24
26
|
"provision_group_inclusion": "Employees",
|
@@ -27,7 +29,18 @@
|
|
27
29
|
"provision_dav_permission": true,
|
28
30
|
"provision_ftp_permission": true,
|
29
31
|
"provision_sftp_permission": true,
|
30
|
-
"provision_time_zone": "Eastern Time (US & Canada)"
|
32
|
+
"provision_time_zone": "Eastern Time (US & Canada)",
|
33
|
+
"ldap_base_dn": "",
|
34
|
+
"ldap_domain": "mysite.com",
|
35
|
+
"enabled": true,
|
36
|
+
"ldap_host": "ldap.site.com",
|
37
|
+
"ldap_host_2": "ldap2.site.com",
|
38
|
+
"ldap_host_3": "ldap3.site.com",
|
39
|
+
"ldap_port": 1,
|
40
|
+
"ldap_secure": true,
|
41
|
+
"ldap_user_include_groups": "",
|
42
|
+
"ldap_username": "[ldap username]",
|
43
|
+
"ldap_username_field": "sAMAccountName"
|
31
44
|
}
|
32
45
|
```
|
33
46
|
|
@@ -46,6 +59,8 @@
|
|
46
59
|
* `subdomain` (string): Subdomain
|
47
60
|
* `provision_users` (boolean): Auto-provision users?
|
48
61
|
* `provision_groups` (boolean): Auto-provision group membership based on group memberships on the SSO side?
|
62
|
+
* `deprovision_users` (boolean): Auto-deprovision users?
|
63
|
+
* `deprovision_groups` (boolean): Auto-deprovision group membership based on group memberships on the SSO side?
|
49
64
|
* `provision_group_default` (string): Comma-separated list of group names for groups to automatically add all auto-provisioned users to.
|
50
65
|
* `provision_group_exclusion` (string): Comma-separated list of group names for groups (with optional wildcards) that will be excluded from auto-provisioning.
|
51
66
|
* `provision_group_inclusion` (string): Comma-separated list of group names for groups (with optional wildcards) that will be auto-provisioned.
|
@@ -55,6 +70,17 @@
|
|
55
70
|
* `provision_ftp_permission` (boolean): Auto-provisioned users get FTP permission?
|
56
71
|
* `provision_sftp_permission` (boolean): Auto-provisioned users get SFTP permission?
|
57
72
|
* `provision_time_zone` (string): Default time zone for auto provisioned users.
|
73
|
+
* `ldap_base_dn` (string): Base DN for looking up users in LDAP server
|
74
|
+
* `ldap_domain` (string): Domain name that will be appended to LDAP usernames
|
75
|
+
* `enabled` (boolean): Is strategy enabled?
|
76
|
+
* `ldap_host` (string): LDAP host
|
77
|
+
* `ldap_host_2` (string): LDAP backup host
|
78
|
+
* `ldap_host_3` (string): LDAP backup host
|
79
|
+
* `ldap_port` (int64): LDAP port
|
80
|
+
* `ldap_secure` (boolean): Use secure LDAP?
|
81
|
+
* `ldap_user_include_groups` (string): Comma or newline separated list of group names (with optional wildcards) - if provided, only users in these groups will be added or synced.
|
82
|
+
* `ldap_username` (string): Username for signing in to LDAP server.
|
83
|
+
* `ldap_username_field` (string): LDAP username field
|
58
84
|
|
59
85
|
|
60
86
|
---
|
data/docs/style.md
CHANGED
@@ -65,7 +65,8 @@ Files::Style.delete(path)
|
|
65
65
|
## Update Style
|
66
66
|
|
67
67
|
```
|
68
|
-
style = Files::Style.
|
68
|
+
style = Files::Style.list_for(path).first
|
69
|
+
|
69
70
|
style.update(
|
70
71
|
file: "file"
|
71
72
|
)
|
@@ -82,7 +83,8 @@ style.update(
|
|
82
83
|
## Delete Style
|
83
84
|
|
84
85
|
```
|
85
|
-
style = Files::Style.
|
86
|
+
style = Files::Style.list_for(path).first
|
87
|
+
|
86
88
|
style.delete
|
87
89
|
```
|
88
90
|
|
data/docs/user.md
CHANGED
@@ -371,7 +371,8 @@ Files::User.delete(id)
|
|
371
371
|
## Unlock user who has been locked out due to failed logins
|
372
372
|
|
373
373
|
```
|
374
|
-
user = Files::User.
|
374
|
+
user = Files::User.list_for(path).first
|
375
|
+
|
375
376
|
user.unlock
|
376
377
|
```
|
377
378
|
|
@@ -385,7 +386,8 @@ user.unlock
|
|
385
386
|
## Resend user welcome email
|
386
387
|
|
387
388
|
```
|
388
|
-
user = Files::User.
|
389
|
+
user = Files::User.list_for(path).first
|
390
|
+
|
389
391
|
user.resend_welcome_email
|
390
392
|
```
|
391
393
|
|
@@ -399,7 +401,8 @@ user.resend_welcome_email
|
|
399
401
|
## Trigger 2FA Reset process for user who has lost access to their existing 2FA methods
|
400
402
|
|
401
403
|
```
|
402
|
-
user = Files::User.
|
404
|
+
user = Files::User.list_for(path).first
|
405
|
+
|
403
406
|
user.user_2fa_reset
|
404
407
|
```
|
405
408
|
|
@@ -413,7 +416,8 @@ user.user_2fa_reset
|
|
413
416
|
## Update User
|
414
417
|
|
415
418
|
```
|
416
|
-
user = Files::User.
|
419
|
+
user = Files::User.list_for(path).first
|
420
|
+
|
417
421
|
user.update(
|
418
422
|
avatar_delete: true,
|
419
423
|
email: "john.doe@files.com",
|
@@ -498,7 +502,8 @@ user.update(
|
|
498
502
|
## Delete User
|
499
503
|
|
500
504
|
```
|
501
|
-
user = Files::User.
|
505
|
+
user = Files::User.list_for(path).first
|
506
|
+
|
502
507
|
user.delete
|
503
508
|
```
|
504
509
|
|
@@ -191,8 +191,9 @@ module Files
|
|
191
191
|
def self.update(id, params = {}, options = {})
|
192
192
|
params ||= {}
|
193
193
|
params[:id] = id
|
194
|
-
raise InvalidParameterError.new("Bad parameter: id must be
|
194
|
+
raise InvalidParameterError.new("Bad parameter: id must be one of String, Integer, Hash") if params.dig(:id) and [String, Integer, Hash].none? { |klass| params.dig(:id).is_a?(klass) }
|
195
195
|
raise InvalidParameterError.new("Bad parameter: value must be an String") if params.dig(:value) and !params.dig(:value).is_a?(String)
|
196
|
+
raise InvalidParameterError.new("Bad parameter: attachment_file must be one of String, Integer, Hash") if params.dig(:attachment_file) and [String, Integer, Hash].none? { |klass| params.dig(:attachment_file).is_a?(klass) }
|
196
197
|
raise MissingParameterError.new("Parameter missing: id") unless params.dig(:id)
|
197
198
|
|
198
199
|
response, options = Api.send_request("/behaviors/#{params[:id]}", :patch, params, options)
|
@@ -90,6 +90,15 @@ module Files
|
|
90
90
|
@attributes[:server_certificate] = value
|
91
91
|
end
|
92
92
|
|
93
|
+
# string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
94
|
+
def server_host_key
|
95
|
+
@attributes[:server_host_key]
|
96
|
+
end
|
97
|
+
|
98
|
+
def server_host_key=(value)
|
99
|
+
@attributes[:server_host_key] = value
|
100
|
+
end
|
101
|
+
|
93
102
|
# string - Remote server type.
|
94
103
|
def server_type
|
95
104
|
@attributes[:server_type]
|
@@ -269,6 +278,7 @@ module Files
|
|
269
278
|
# s3_bucket - string - S3 bucket name
|
270
279
|
# s3_region - string - S3 region
|
271
280
|
# server_certificate - string - Remote server certificate
|
281
|
+
# server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
272
282
|
# server_type - string - Remote server type.
|
273
283
|
# ssl - string - Should we require SSL?
|
274
284
|
# username - string - Remote server username. Not needed for S3 buckets.
|
@@ -299,6 +309,7 @@ module Files
|
|
299
309
|
raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
|
300
310
|
raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
|
301
311
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
|
312
|
+
raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
|
302
313
|
raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
|
303
314
|
raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
|
304
315
|
raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
|
@@ -385,6 +396,7 @@ module Files
|
|
385
396
|
# s3_bucket - string - S3 bucket name
|
386
397
|
# s3_region - string - S3 region
|
387
398
|
# server_certificate - string - Remote server certificate
|
399
|
+
# server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
388
400
|
# server_type - string - Remote server type.
|
389
401
|
# ssl - string - Should we require SSL?
|
390
402
|
# username - string - Remote server username. Not needed for S3 buckets.
|
@@ -411,6 +423,7 @@ module Files
|
|
411
423
|
raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
|
412
424
|
raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
|
413
425
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
|
426
|
+
raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
|
414
427
|
raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
|
415
428
|
raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
|
416
429
|
raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
|
@@ -442,6 +455,7 @@ module Files
|
|
442
455
|
# s3_bucket - string - S3 bucket name
|
443
456
|
# s3_region - string - S3 region
|
444
457
|
# server_certificate - string - Remote server certificate
|
458
|
+
# server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
|
445
459
|
# server_type - string - Remote server type.
|
446
460
|
# ssl - string - Should we require SSL?
|
447
461
|
# username - string - Remote server username. Not needed for S3 buckets.
|
@@ -471,6 +485,7 @@ module Files
|
|
471
485
|
raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
|
472
486
|
raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
|
473
487
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
|
488
|
+
raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
|
474
489
|
raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
|
475
490
|
raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
|
476
491
|
raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
|
@@ -84,6 +84,16 @@ module Files
|
|
84
84
|
@attributes[:provision_groups]
|
85
85
|
end
|
86
86
|
|
87
|
+
# boolean - Auto-deprovision users?
|
88
|
+
def deprovision_users
|
89
|
+
@attributes[:deprovision_users]
|
90
|
+
end
|
91
|
+
|
92
|
+
# boolean - Auto-deprovision group membership based on group memberships on the SSO side?
|
93
|
+
def deprovision_groups
|
94
|
+
@attributes[:deprovision_groups]
|
95
|
+
end
|
96
|
+
|
87
97
|
# string - Comma-separated list of group names for groups to automatically add all auto-provisioned users to.
|
88
98
|
def provision_group_default
|
89
99
|
@attributes[:provision_group_default]
|
@@ -129,6 +139,61 @@ module Files
|
|
129
139
|
@attributes[:provision_time_zone]
|
130
140
|
end
|
131
141
|
|
142
|
+
# string - Base DN for looking up users in LDAP server
|
143
|
+
def ldap_base_dn
|
144
|
+
@attributes[:ldap_base_dn]
|
145
|
+
end
|
146
|
+
|
147
|
+
# string - Domain name that will be appended to LDAP usernames
|
148
|
+
def ldap_domain
|
149
|
+
@attributes[:ldap_domain]
|
150
|
+
end
|
151
|
+
|
152
|
+
# boolean - Is strategy enabled?
|
153
|
+
def enabled
|
154
|
+
@attributes[:enabled]
|
155
|
+
end
|
156
|
+
|
157
|
+
# string - LDAP host
|
158
|
+
def ldap_host
|
159
|
+
@attributes[:ldap_host]
|
160
|
+
end
|
161
|
+
|
162
|
+
# string - LDAP backup host
|
163
|
+
def ldap_host_2
|
164
|
+
@attributes[:ldap_host_2]
|
165
|
+
end
|
166
|
+
|
167
|
+
# string - LDAP backup host
|
168
|
+
def ldap_host_3
|
169
|
+
@attributes[:ldap_host_3]
|
170
|
+
end
|
171
|
+
|
172
|
+
# int64 - LDAP port
|
173
|
+
def ldap_port
|
174
|
+
@attributes[:ldap_port]
|
175
|
+
end
|
176
|
+
|
177
|
+
# boolean - Use secure LDAP?
|
178
|
+
def ldap_secure
|
179
|
+
@attributes[:ldap_secure]
|
180
|
+
end
|
181
|
+
|
182
|
+
# string - Comma or newline separated list of group names (with optional wildcards) - if provided, only users in these groups will be added or synced.
|
183
|
+
def ldap_user_include_groups
|
184
|
+
@attributes[:ldap_user_include_groups]
|
185
|
+
end
|
186
|
+
|
187
|
+
# string - Username for signing in to LDAP server.
|
188
|
+
def ldap_username
|
189
|
+
@attributes[:ldap_username]
|
190
|
+
end
|
191
|
+
|
192
|
+
# string - LDAP username field
|
193
|
+
def ldap_username_field
|
194
|
+
@attributes[:ldap_username_field]
|
195
|
+
end
|
196
|
+
|
132
197
|
# Parameters:
|
133
198
|
# page - int64 - Current page number.
|
134
199
|
# per_page - int64 - Number of records to show per page. (Max: 10,000, 1,000 or less is recommended).
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: files.com
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.0.
|
4
|
+
version: 1.0.63
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- files.com
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-
|
11
|
+
date: 2020-06-03 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: faraday
|