files.com 1.1.20 → 1.1.22

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 79f5c31b820c33992b6d9871ba1010c62e05b8f3e2f98308e570919cefbcada7
4
- data.tar.gz: 798a04067fe40ddaf0d8d245dddbaf53a307425656692a74c297f325ae658fec
3
+ metadata.gz: 8c8e386894290e7a277a40f2c836e82d9a00b5f0d5496631326d70003e980567
4
+ data.tar.gz: 5a04c639f0b6b163a71c50f2d546249b10b580e55b0bba20f18a4cf8b8bec318
5
5
  SHA512:
6
- metadata.gz: 450cfcda03afee70ae87ccc9007c3d5bc0dca59ef55b83a0f71d7cc5355f5c699e0e2b3e76907bfc8e56b547616a61f0fc5de0ee297514c71cf340e04fbd3546
7
- data.tar.gz: bc77ec8901d4e910abf8cbfe3cc26089a2cfbc547e2e924e10420b5964cd083dd5da66075a68bdbba554d8c3d87480205e9676df816c08194498fe661a76f16a
6
+ metadata.gz: 46eadaac221fafe81e8b4c02cec7892caba261b45589152908f39410451e1ea3c910d27275f6e11675490c55ffb02fb84ea83ccd90d27a0327022c75d06bc1f0
7
+ data.tar.gz: 3a0e9ac57fa16eee4b4259e541dc48fc0b603172966c9e2d3413ff6ce38eb6fa061cf5a9fbfc828c4d0455d1b6f44a7d26e315a0d2fff010f1b3e567629e69a4
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.1.20
1
+ 1.1.22
data/docs/site.md CHANGED
@@ -10,6 +10,7 @@
10
10
  "allowed_2fa_method_u2f": true,
11
11
  "allowed_2fa_method_webauthn": true,
12
12
  "allowed_2fa_method_yubi": true,
13
+ "allowed_2fa_method_email": true,
13
14
  "allowed_2fa_method_bypass_for_ftp_sftp_dav": true,
14
15
  "admin_user_id": 1,
15
16
  "admins_bypass_locked_subfolders": true,
@@ -237,6 +238,7 @@
237
238
  * `allowed_2fa_method_u2f` (boolean): Is U2F two factor authentication allowed?
238
239
  * `allowed_2fa_method_webauthn` (boolean): Is WebAuthn two factor authentication allowed?
239
240
  * `allowed_2fa_method_yubi` (boolean): Is yubikey two factor authentication allowed?
241
+ * `allowed_2fa_method_email` (boolean): Is OTP via email two factor authentication allowed?
240
242
  * `allowed_2fa_method_bypass_for_ftp_sftp_dav` (boolean): Are users allowed to configure their two factor authentication to be bypassed for FTP/SFTP/WebDAV?
241
243
  * `admin_user_id` (int64): User ID for the main site administrator
242
244
  * `admins_bypass_locked_subfolders` (boolean): Allow admins to bypass the locked subfolders setting.
@@ -503,6 +505,7 @@ Files::Site.update(
503
505
  allowed_2fa_method_totp: true,
504
506
  allowed_2fa_method_webauthn: true,
505
507
  allowed_2fa_method_yubi: true,
508
+ allowed_2fa_method_email: true,
506
509
  allowed_2fa_method_bypass_for_ftp_sftp_dav: true,
507
510
  require_2fa: true,
508
511
  require_2fa_user_type: "`site_admins`",
@@ -644,6 +647,7 @@ Files::Site.update(
644
647
  * `allowed_2fa_method_totp` (boolean): Is TOTP two factor authentication allowed?
645
648
  * `allowed_2fa_method_webauthn` (boolean): Is WebAuthn two factor authentication allowed?
646
649
  * `allowed_2fa_method_yubi` (boolean): Is yubikey two factor authentication allowed?
650
+ * `allowed_2fa_method_email` (boolean): Is OTP via email two factor authentication allowed?
647
651
  * `allowed_2fa_method_bypass_for_ftp_sftp_dav` (boolean): Are users allowed to configure their two factor authentication to be bypassed for FTP/SFTP/WebDAV?
648
652
  * `require_2fa` (boolean): Require two-factor authentication for all users?
649
653
  * `require_2fa_user_type` (string): What type of user is required to use two-factor authentication (when require_2fa is set to `true` for this site)?
@@ -39,6 +39,11 @@ module Files
39
39
  @attributes[:allowed_2fa_method_yubi]
40
40
  end
41
41
 
42
+ # boolean - Is OTP via email two factor authentication allowed?
43
+ def allowed_2fa_method_email
44
+ @attributes[:allowed_2fa_method_email]
45
+ end
46
+
42
47
  # boolean - Are users allowed to configure their two factor authentication to be bypassed for FTP/SFTP/WebDAV?
43
48
  def allowed_2fa_method_bypass_for_ftp_sftp_dav
44
49
  @attributes[:allowed_2fa_method_bypass_for_ftp_sftp_dav]
@@ -874,6 +879,7 @@ module Files
874
879
  # allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
875
880
  # allowed_2fa_method_webauthn - boolean - Is WebAuthn two factor authentication allowed?
876
881
  # allowed_2fa_method_yubi - boolean - Is yubikey two factor authentication allowed?
882
+ # allowed_2fa_method_email - boolean - Is OTP via email two factor authentication allowed?
877
883
  # allowed_2fa_method_bypass_for_ftp_sftp_dav - boolean - Are users allowed to configure their two factor authentication to be bypassed for FTP/SFTP/WebDAV?
878
884
  # require_2fa - boolean - Require two-factor authentication for all users?
879
885
  # require_2fa_user_type - string - What type of user is required to use two-factor authentication (when require_2fa is set to `true` for this site)?
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Files
4
- VERSION = "1.1.20"
4
+ VERSION = "1.1.22"
5
5
  end
@@ -11,26 +11,32 @@
11
11
  },
12
12
  {
13
13
  "headers": {
14
- "Retry-After": ["120"]
14
+ "Retry-After": ["5"]
15
15
  },
16
- "result": 120
16
+ "result": 5
17
17
  },
18
18
  {
19
19
  "headers": {
20
- "Retry-After": ["120", "60"]
20
+ "Retry-After": ["60"]
21
21
  },
22
- "result": 120
22
+ "result": null
23
+ },
24
+ {
25
+ "headers": {
26
+ "Retry-After": ["5", "10"]
27
+ },
28
+ "result": 5
23
29
  },
24
30
  {
25
31
  "headers": {
26
- "Retry-After": ["120", "aaaaaa"]
32
+ "Retry-After": ["5", "aaaaaa"]
27
33
  },
28
- "result": 120
34
+ "result": 5
29
35
  },
30
36
  {
31
37
  "headers": {
32
38
  "Retry-After": ["%s"]
33
39
  },
34
- "result": 60
40
+ "result": 8
35
41
  }
36
42
  ]
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.20
4
+ version: 1.1.22
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-02-06 00:00:00.000000000 Z
11
+ date: 2024-02-14 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable