files.com 1.1.115 → 1.1.117

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 30d08c44cf76dc40af6da91c786166ace44b7cdc3f90da618ceea18d51ef8856
4
- data.tar.gz: c3157dc9f0c8a813ff64cfd03f6a709c0ab4b29fa4384fb9c9c2749b2c8b4b51
3
+ metadata.gz: d2df8436470fbc39588b6ee6962f075fb16a4d3baabca1022ad05df423f05817
4
+ data.tar.gz: fcc282b8b5b60162a16c7094a6687251ca94b5f60dbf457e64728279fdaf2ba0
5
5
  SHA512:
6
- metadata.gz: 23ec622064a33418d8ab643b1875e1e063e0be536f75131c3176ea6506b3ceabb36fc5641bc02c136f0f350aa5e985f6f7d301ea05a36cb0bbd769c826eb1e43
7
- data.tar.gz: 341ec7627d24938c3863e3ee6f9dffd59182edac945710aba1fcf228b1d7fc73e9d1f1374fe738f8bc5450a309e79d0d56c872cb00461fbafff1e3e5b0e8812c
6
+ metadata.gz: 5efcd48bbc5e7fd1970173d712faa2809563824efdcfe5721e8d133d7f20cfdef61ce958dd1bc4f8c683e26ca64e4085d0ccad02bbe481147075325b075b5aa2
7
+ data.tar.gz: 7e5b42f97d1c14a400d3b962c2605d079f362cd3b899ab6da6e447865477221e4b2ccf5c2008c891f8202936c13ecf25649464198d36d4ec7060d7aa3147537b
data/README.md CHANGED
@@ -26,9 +26,7 @@ gem 'files.com', '~> 1.0'
26
26
 
27
27
  Ruby 2.x is now considered end-of-life by the Ruby project. As a policy, Files.com does not support integrations which are considered end-of-life by their vendor.
28
28
 
29
- <Note title="Repository">
30
29
  Explore the [files-sdk-ruby](https://github.com/Files-com/files-sdk-ruby) code on GitHub.
31
- </Note>
32
30
 
33
31
  ### Getting Support
34
32
 
@@ -59,9 +57,7 @@ Files.api_key = 'YOUR_API_KEY'
59
57
  Files::User.new(params, api_key: 'YOUR_API_KEY')
60
58
  ```
61
59
 
62
- <Note>
63
60
  Don't forget to replace the placeholder, `YOUR_API_KEY`, with your actual API key.
64
- </Note>
65
61
 
66
62
  ### Authenticate with a Session
67
63
 
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.1.115
1
+ 1.1.117
data/docs/site.md CHANGED
@@ -298,7 +298,7 @@
298
298
  * `admin_user_id` (int64): User ID for the main site administrator
299
299
  * `admins_bypass_locked_subfolders` (boolean): Allow admins to bypass the locked subfolders setting.
300
300
  * `allow_bundle_names` (boolean): Are manual Bundle names allowed?
301
- * `allowed_countries` (string): Comma seperated list of allowed Country codes
301
+ * `allowed_countries` (string): Comma separated list of allowed Country codes
302
302
  * `allowed_ips` (string): List of allowed IP addresses
303
303
  * `always_mkdir_parents` (boolean): Create parent directories if they do not exist during uploads? This is primarily used to work around broken upload clients that assume servers will perform this step.
304
304
  * `ask_about_overwrites` (boolean): If false, rename conflicting files instead of asking for overwrite confirmation. Only applies to web interface.
@@ -335,7 +335,7 @@
335
335
  * `mobile_app` (boolean): Is the mobile app enabled?
336
336
  * `mobile_app_session_ip_pinning` (boolean): Is mobile app session IP pinning enabled?
337
337
  * `mobile_app_session_lifetime` (int64): Mobile app session lifetime (in hours)
338
- * `disallowed_countries` (string): Comma seperated list of disallowed Country codes
338
+ * `disallowed_countries` (string): Comma separated list of disallowed Country codes
339
339
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
340
340
  * `disable_notifications` (boolean): Are notifications disabled?
341
341
  * `disable_password_reset` (boolean): Is password reset disabled?
@@ -407,7 +407,7 @@
407
407
  * `sftp_enabled` (boolean): Is SFTP enabled?
408
408
  * `sftp_host_key_type` (string): Sftp Host Key Type
409
409
  * `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
410
- * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
410
+ * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
411
411
  * `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
412
412
  * `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
413
413
  * `sharing_enabled` (boolean): Allow bundle creation
@@ -661,7 +661,7 @@ Files::Site.update(
661
661
  * `session_expiry` (double): Session expiry in hours
662
662
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
663
663
  * `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
664
- * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
664
+ * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
665
665
  * `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
666
666
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
667
667
  * `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
@@ -669,9 +669,9 @@ Files::Site.update(
669
669
  * `user_lockout_within` (int64): Number of hours for user lockout window
670
670
  * `user_lockout_lock_period` (int64): How many hours to lock user out for failed password?
671
671
  * `include_password_in_welcome_email` (boolean): Include password in emails to new users?
672
- * `allowed_countries` (string): Comma seperated list of allowed Country codes
672
+ * `allowed_countries` (string): Comma separated list of allowed Country codes
673
673
  * `allowed_ips` (string): List of allowed IP addresses
674
- * `disallowed_countries` (string): Comma seperated list of disallowed Country codes
674
+ * `disallowed_countries` (string): Comma separated list of disallowed Country codes
675
675
  * `days_to_retain_backups` (int64): Number of days to keep deleted files
676
676
  * `max_prior_passwords` (int64): Number of prior passwords to disallow
677
677
  * `password_validity_days` (int64): Number of days password is valid
data/docs/user.md CHANGED
@@ -141,7 +141,7 @@
141
141
  * `change_password_confirmation` (string): Optional, but if provided, we will ensure that it matches the value sent in `change_password`.
142
142
  * `grant_permission` (string): Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
143
143
  * `group_id` (int64): Group ID to associate this user with.
144
- * `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash menthods are MD5, SHA1, and SHA256.
144
+ * `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
145
145
  * `password` (string): User password.
146
146
  * `password_confirmation` (string): Optional, but if provided, we will ensure that it matches the value sent in `password`.
147
147
  * `announcements_read` (boolean): Signifies that the user has read all the announcements in the UI.
@@ -241,7 +241,7 @@ Files::User.create(
241
241
  * `grant_permission` (string): Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
242
242
  * `group_id` (int64): Group ID to associate this user with.
243
243
  * `group_ids` (string): A list of group ids to associate this user with. Comma delimited.
244
- * `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash menthods are MD5, SHA1, and SHA256.
244
+ * `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
245
245
  * `password` (string): User password.
246
246
  * `password_confirmation` (string): Optional, but if provided, we will ensure that it matches the value sent in `password`.
247
247
  * `announcements_read` (boolean): Signifies that the user has read all the announcements in the UI.
@@ -379,7 +379,7 @@ Files::User.update(id,
379
379
  * `grant_permission` (string): Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
380
380
  * `group_id` (int64): Group ID to associate this user with.
381
381
  * `group_ids` (string): A list of group ids to associate this user with. Comma delimited.
382
- * `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash menthods are MD5, SHA1, and SHA256.
382
+ * `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
383
383
  * `password` (string): User password.
384
384
  * `password_confirmation` (string): Optional, but if provided, we will ensure that it matches the value sent in `password`.
385
385
  * `announcements_read` (boolean): Signifies that the user has read all the announcements in the UI.
@@ -538,7 +538,7 @@ user.update(
538
538
  * `grant_permission` (string): Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
539
539
  * `group_id` (int64): Group ID to associate this user with.
540
540
  * `group_ids` (string): A list of group ids to associate this user with. Comma delimited.
541
- * `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash menthods are MD5, SHA1, and SHA256.
541
+ * `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
542
542
  * `password` (string): User password.
543
543
  * `password_confirmation` (string): Optional, but if provided, we will ensure that it matches the value sent in `password`.
544
544
  * `announcements_read` (boolean): Signifies that the user has read all the announcements in the UI.
@@ -74,7 +74,7 @@ module Files
74
74
  @attributes[:allow_bundle_names]
75
75
  end
76
76
 
77
- # string - Comma seperated list of allowed Country codes
77
+ # string - Comma separated list of allowed Country codes
78
78
  def allowed_countries
79
79
  @attributes[:allowed_countries]
80
80
  end
@@ -259,7 +259,7 @@ module Files
259
259
  @attributes[:mobile_app_session_lifetime]
260
260
  end
261
261
 
262
- # string - Comma seperated list of disallowed Country codes
262
+ # string - Comma separated list of disallowed Country codes
263
263
  def disallowed_countries
264
264
  @attributes[:disallowed_countries]
265
265
  end
@@ -619,7 +619,7 @@ module Files
619
619
  @attributes[:active_sftp_host_key_id]
620
620
  end
621
621
 
622
- # boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
622
+ # boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
623
623
  def sftp_insecure_ciphers
624
624
  @attributes[:sftp_insecure_ciphers]
625
625
  end
@@ -864,7 +864,7 @@ module Files
864
864
  # session_expiry - double - Session expiry in hours
865
865
  # ssl_required - boolean - Is SSL required? Disabling this is insecure.
866
866
  # tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
867
- # sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
867
+ # sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
868
868
  # sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
869
869
  # disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
870
870
  # user_lockout - boolean - Will users be locked out after incorrect login attempts?
@@ -872,9 +872,9 @@ module Files
872
872
  # user_lockout_within - int64 - Number of hours for user lockout window
873
873
  # user_lockout_lock_period - int64 - How many hours to lock user out for failed password?
874
874
  # include_password_in_welcome_email - boolean - Include password in emails to new users?
875
- # allowed_countries - string - Comma seperated list of allowed Country codes
875
+ # allowed_countries - string - Comma separated list of allowed Country codes
876
876
  # allowed_ips - string - List of allowed IP addresses
877
- # disallowed_countries - string - Comma seperated list of disallowed Country codes
877
+ # disallowed_countries - string - Comma separated list of disallowed Country codes
878
878
  # days_to_retain_backups - int64 - Number of days to keep deleted files
879
879
  # max_prior_passwords - int64 - Number of prior passwords to disallow
880
880
  # password_validity_days - int64 - Number of days password is valid
@@ -626,7 +626,7 @@ module Files
626
626
  @attributes[:group_id] = value
627
627
  end
628
628
 
629
- # string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash menthods are MD5, SHA1, and SHA256.
629
+ # string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
630
630
  def imported_password_hash
631
631
  @attributes[:imported_password_hash]
632
632
  end
@@ -704,7 +704,7 @@ module Files
704
704
  # grant_permission - string - Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
705
705
  # group_id - int64 - Group ID to associate this user with.
706
706
  # group_ids - string - A list of group ids to associate this user with. Comma delimited.
707
- # imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash menthods are MD5, SHA1, and SHA256.
707
+ # imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
708
708
  # password - string - User password.
709
709
  # password_confirmation - string - Optional, but if provided, we will ensure that it matches the value sent in `password`.
710
710
  # announcements_read - boolean - Signifies that the user has read all the announcements in the UI.
@@ -863,7 +863,7 @@ module Files
863
863
  # grant_permission - string - Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
864
864
  # group_id - int64 - Group ID to associate this user with.
865
865
  # group_ids - string - A list of group ids to associate this user with. Comma delimited.
866
- # imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash menthods are MD5, SHA1, and SHA256.
866
+ # imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
867
867
  # password - string - User password.
868
868
  # password_confirmation - string - Optional, but if provided, we will ensure that it matches the value sent in `password`.
869
869
  # announcements_read - boolean - Signifies that the user has read all the announcements in the UI.
@@ -976,7 +976,7 @@ module Files
976
976
  # grant_permission - string - Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
977
977
  # group_id - int64 - Group ID to associate this user with.
978
978
  # group_ids - string - A list of group ids to associate this user with. Comma delimited.
979
- # imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash menthods are MD5, SHA1, and SHA256.
979
+ # imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
980
980
  # password - string - User password.
981
981
  # password_confirmation - string - Optional, but if provided, we will ensure that it matches the value sent in `password`.
982
982
  # announcements_read - boolean - Signifies that the user has read all the announcements in the UI.
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Files
4
- VERSION = "1.1.115"
4
+ VERSION = "1.1.117"
5
5
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.115
4
+ version: 1.1.117
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com