files.com 1.1.271 → 1.1.273
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/as2_partner.md +12 -4
- data/docs/sync.md +8 -8
- data/lib/files.com/models/as2_partner.rb +19 -4
- data/lib/files.com/models/sync.rb +15 -15
- data/lib/files.com/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: a5cb2a4cbfdbdfc05c8aa311fb975fffca194ca31a3735f51f09b3a6655ccb15
|
4
|
+
data.tar.gz: d9de09d7e652ebfdf6506c4d76d68d0692cc520d5483662fc57bcf45e379e136
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: eac889ddccff0204aa607a40ab26d80645441a36a0ab5dd2c4dc635ecd64cc6f3ec55ba2f6bc9fe49433f5c96af728d6b78582b38d68e863825041e01d849d37
|
7
|
+
data.tar.gz: bf5290304474df2a93cc5978d0549e03ec10b2ee2c251df657581747395dccdf77475e17c382ffe7d974c3a9c3ca52c7a5f122c4b80ecae1b18587fdc25257ee
|
data/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.1.
|
1
|
+
1.1.273
|
data/docs/as2_partner.md
CHANGED
@@ -15,6 +15,7 @@
|
|
15
15
|
},
|
16
16
|
"default_mime_type": "application/octet-stream",
|
17
17
|
"mdn_validation_level": "none",
|
18
|
+
"signature_validation_level": "normal",
|
18
19
|
"enable_dedicated_ips": true,
|
19
20
|
"hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
|
20
21
|
"public_certificate": "example",
|
@@ -35,7 +36,8 @@
|
|
35
36
|
* `http_auth_username` (string): Username to send to server for HTTP Authentication.
|
36
37
|
* `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
|
37
38
|
* `default_mime_type` (string): Default mime type of the file attached to the encrypted message
|
38
|
-
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
39
|
+
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
40
|
+
* `signature_validation_level` (string): Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
39
41
|
* `enable_dedicated_ips` (boolean): If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
40
42
|
* `hex_public_certificate_serial` (string): Serial of public certificate used for message security in hex format.
|
41
43
|
* `public_certificate` (string): Public certificate used for message security.
|
@@ -84,6 +86,7 @@ Files::As2Partner.create(
|
|
84
86
|
enable_dedicated_ips: true,
|
85
87
|
http_auth_username: "username",
|
86
88
|
mdn_validation_level: "none",
|
89
|
+
signature_validation_level: "normal",
|
87
90
|
server_certificate: "require_match",
|
88
91
|
default_mime_type: "application/octet-stream",
|
89
92
|
additional_http_headers: {"key":"example value"},
|
@@ -99,7 +102,8 @@ Files::As2Partner.create(
|
|
99
102
|
* `enable_dedicated_ips` (boolean): If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
100
103
|
* `http_auth_username` (string): Username to send to server for HTTP Authentication.
|
101
104
|
* `http_auth_password` (string): Password to send to server for HTTP Authentication.
|
102
|
-
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
105
|
+
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
106
|
+
* `signature_validation_level` (string): Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
103
107
|
* `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
104
108
|
* `default_mime_type` (string): Default mime type of the file attached to the encrypted message
|
105
109
|
* `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
|
@@ -118,6 +122,7 @@ Files::As2Partner.update(id,
|
|
118
122
|
enable_dedicated_ips: true,
|
119
123
|
http_auth_username: "username",
|
120
124
|
mdn_validation_level: "none",
|
125
|
+
signature_validation_level: "normal",
|
121
126
|
server_certificate: "require_match",
|
122
127
|
default_mime_type: "application/octet-stream",
|
123
128
|
additional_http_headers: {"key":"example value"},
|
@@ -133,7 +138,8 @@ Files::As2Partner.update(id,
|
|
133
138
|
* `enable_dedicated_ips` (boolean): If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
134
139
|
* `http_auth_username` (string): Username to send to server for HTTP Authentication.
|
135
140
|
* `http_auth_password` (string): Password to send to server for HTTP Authentication.
|
136
|
-
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
141
|
+
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
142
|
+
* `signature_validation_level` (string): Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
137
143
|
* `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
138
144
|
* `default_mime_type` (string): Default mime type of the file attached to the encrypted message
|
139
145
|
* `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
|
@@ -166,6 +172,7 @@ as2_partner.update(
|
|
166
172
|
enable_dedicated_ips: true,
|
167
173
|
http_auth_username: "username",
|
168
174
|
mdn_validation_level: "none",
|
175
|
+
signature_validation_level: "normal",
|
169
176
|
server_certificate: "require_match",
|
170
177
|
default_mime_type: "application/octet-stream",
|
171
178
|
additional_http_headers: {"key":"example value"},
|
@@ -181,7 +188,8 @@ as2_partner.update(
|
|
181
188
|
* `enable_dedicated_ips` (boolean): If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
182
189
|
* `http_auth_username` (string): Username to send to server for HTTP Authentication.
|
183
190
|
* `http_auth_password` (string): Password to send to server for HTTP Authentication.
|
184
|
-
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
191
|
+
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
192
|
+
* `signature_validation_level` (string): Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
185
193
|
* `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
186
194
|
* `default_mime_type` (string): Default mime type of the file attached to the encrypted message
|
187
195
|
* `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
|
data/docs/sync.md
CHANGED
@@ -17,7 +17,6 @@
|
|
17
17
|
"keep_after_copy": true,
|
18
18
|
"delete_empty_folders": true,
|
19
19
|
"disabled": true,
|
20
|
-
"interval": "week",
|
21
20
|
"trigger": "example",
|
22
21
|
"trigger_file": "example",
|
23
22
|
"include_patterns": [
|
@@ -29,6 +28,7 @@
|
|
29
28
|
"created_at": "2000-01-01T01:00:00Z",
|
30
29
|
"updated_at": "2000-01-01T01:00:00Z",
|
31
30
|
"sync_interval_minutes": 1,
|
31
|
+
"interval": "week",
|
32
32
|
"recurring_day": 25,
|
33
33
|
"schedule_days_of_week": [
|
34
34
|
0,
|
@@ -56,7 +56,6 @@
|
|
56
56
|
* `keep_after_copy` (boolean): Keep files after copying?
|
57
57
|
* `delete_empty_folders` (boolean): Delete empty folders after sync?
|
58
58
|
* `disabled` (boolean): Is this sync disabled?
|
59
|
-
* `interval` (string): If trigger is `daily`, this specifies how often to run this sync. One of: `day`, `week`, `week_end`, `month`, `month_end`, `quarter`, `quarter_end`, `year`, `year_end`
|
60
59
|
* `trigger` (string): Trigger type: daily, custom_schedule, or manual
|
61
60
|
* `trigger_file` (string): Some MFT services request an empty file (known as a trigger file) to signal the sync is complete and they can begin further processing. If trigger_file is set, a zero-byte file will be sent at the end of the sync.
|
62
61
|
* `include_patterns` (array(string)): Array of glob patterns to include
|
@@ -64,6 +63,7 @@
|
|
64
63
|
* `created_at` (date-time): When this sync was created
|
65
64
|
* `updated_at` (date-time): When this sync was last updated
|
66
65
|
* `sync_interval_minutes` (int64): Frequency in minutes between syncs. If set, this value must be greater than or equal to the `remote_sync_interval` value for the site's plan. If left blank, the plan's `remote_sync_interval` will be used. This setting is only used if `trigger` is empty.
|
66
|
+
* `interval` (string): If trigger is `daily`, this specifies how often to run this sync. One of: `day`, `week`, `week_end`, `month`, `month_end`, `quarter`, `quarter_end`, `year`, `year_end`
|
67
67
|
* `recurring_day` (int64): If trigger type is `daily`, this specifies a day number to run in one of the supported intervals: `week`, `month`, `quarter`, `year`.
|
68
68
|
* `schedule_days_of_week` (array(int64)): If trigger is `custom_schedule`, Custom schedule description for when the sync should be run. 0-based days of the week. 0 is Sunday, 1 is Monday, etc.
|
69
69
|
* `schedule_times_of_day` (array(string)): If trigger is `custom_schedule`, Custom schedule description for when the sync should be run. Times of day in HH:MM format.
|
@@ -113,7 +113,7 @@ Files::Sync.create(
|
|
113
113
|
keep_after_copy: false,
|
114
114
|
delete_empty_folders: false,
|
115
115
|
disabled: false,
|
116
|
-
interval:
|
116
|
+
interval: "week",
|
117
117
|
trigger: "example",
|
118
118
|
trigger_file: "example",
|
119
119
|
recurring_day: 25,
|
@@ -135,7 +135,7 @@ Files::Sync.create(
|
|
135
135
|
* `keep_after_copy` (boolean): Keep files after copying?
|
136
136
|
* `delete_empty_folders` (boolean): Delete empty folders after sync?
|
137
137
|
* `disabled` (boolean): Is this sync disabled?
|
138
|
-
* `interval` (
|
138
|
+
* `interval` (string): If trigger is `daily`, this specifies how often to run this sync. One of: `day`, `week`, `week_end`, `month`, `month_end`, `quarter`, `quarter_end`, `year`, `year_end`
|
139
139
|
* `trigger` (string): Trigger type: daily, custom_schedule, or manual
|
140
140
|
* `trigger_file` (string): Some MFT services request an empty file (known as a trigger file) to signal the sync is complete and they can begin further processing. If trigger_file is set, a zero-byte file will be sent at the end of the sync.
|
141
141
|
* `recurring_day` (int64): If trigger type is `daily`, this specifies a day number to run in one of the supported intervals: `week`, `month`, `quarter`, `year`.
|
@@ -169,7 +169,7 @@ Files::Sync.update(id,
|
|
169
169
|
keep_after_copy: false,
|
170
170
|
delete_empty_folders: false,
|
171
171
|
disabled: false,
|
172
|
-
interval:
|
172
|
+
interval: "week",
|
173
173
|
trigger: "example",
|
174
174
|
trigger_file: "example",
|
175
175
|
recurring_day: 25,
|
@@ -192,7 +192,7 @@ Files::Sync.update(id,
|
|
192
192
|
* `keep_after_copy` (boolean): Keep files after copying?
|
193
193
|
* `delete_empty_folders` (boolean): Delete empty folders after sync?
|
194
194
|
* `disabled` (boolean): Is this sync disabled?
|
195
|
-
* `interval` (
|
195
|
+
* `interval` (string): If trigger is `daily`, this specifies how often to run this sync. One of: `day`, `week`, `week_end`, `month`, `month_end`, `quarter`, `quarter_end`, `year`, `year_end`
|
196
196
|
* `trigger` (string): Trigger type: daily, custom_schedule, or manual
|
197
197
|
* `trigger_file` (string): Some MFT services request an empty file (known as a trigger file) to signal the sync is complete and they can begin further processing. If trigger_file is set, a zero-byte file will be sent at the end of the sync.
|
198
198
|
* `recurring_day` (int64): If trigger type is `daily`, this specifies a day number to run in one of the supported intervals: `week`, `month`, `quarter`, `year`.
|
@@ -232,7 +232,7 @@ sync.update(
|
|
232
232
|
keep_after_copy: false,
|
233
233
|
delete_empty_folders: false,
|
234
234
|
disabled: false,
|
235
|
-
interval:
|
235
|
+
interval: "week",
|
236
236
|
trigger: "example",
|
237
237
|
trigger_file: "example",
|
238
238
|
recurring_day: 25,
|
@@ -255,7 +255,7 @@ sync.update(
|
|
255
255
|
* `keep_after_copy` (boolean): Keep files after copying?
|
256
256
|
* `delete_empty_folders` (boolean): Delete empty folders after sync?
|
257
257
|
* `disabled` (boolean): Is this sync disabled?
|
258
|
-
* `interval` (
|
258
|
+
* `interval` (string): If trigger is `daily`, this specifies how often to run this sync. One of: `day`, `week`, `week_end`, `month`, `month_end`, `quarter`, `quarter_end`, `year`, `year_end`
|
259
259
|
* `trigger` (string): Trigger type: daily, custom_schedule, or manual
|
260
260
|
* `trigger_file` (string): Some MFT services request an empty file (known as a trigger file) to signal the sync is complete and they can begin further processing. If trigger_file is set, a zero-byte file will be sent at the end of the sync.
|
261
261
|
* `recurring_day` (int64): If trigger type is `daily`, this specifies a day number to run in one of the supported intervals: `week`, `month`, `quarter`, `year`.
|
@@ -81,7 +81,7 @@ module Files
|
|
81
81
|
@attributes[:default_mime_type] = value
|
82
82
|
end
|
83
83
|
|
84
|
-
# string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
84
|
+
# string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
85
85
|
def mdn_validation_level
|
86
86
|
@attributes[:mdn_validation_level]
|
87
87
|
end
|
@@ -90,6 +90,15 @@ module Files
|
|
90
90
|
@attributes[:mdn_validation_level] = value
|
91
91
|
end
|
92
92
|
|
93
|
+
# string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
94
|
+
def signature_validation_level
|
95
|
+
@attributes[:signature_validation_level]
|
96
|
+
end
|
97
|
+
|
98
|
+
def signature_validation_level=(value)
|
99
|
+
@attributes[:signature_validation_level] = value
|
100
|
+
end
|
101
|
+
|
93
102
|
# boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
94
103
|
def enable_dedicated_ips
|
95
104
|
@attributes[:enable_dedicated_ips]
|
@@ -184,7 +193,8 @@ module Files
|
|
184
193
|
# enable_dedicated_ips - boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
185
194
|
# http_auth_username - string - Username to send to server for HTTP Authentication.
|
186
195
|
# http_auth_password - string - Password to send to server for HTTP Authentication.
|
187
|
-
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
196
|
+
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
197
|
+
# signature_validation_level - string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
188
198
|
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
189
199
|
# default_mime_type - string - Default mime type of the file attached to the encrypted message
|
190
200
|
# additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
|
@@ -199,6 +209,7 @@ module Files
|
|
199
209
|
raise InvalidParameterError.new("Bad parameter: http_auth_username must be an String") if params[:http_auth_username] and !params[:http_auth_username].is_a?(String)
|
200
210
|
raise InvalidParameterError.new("Bad parameter: http_auth_password must be an String") if params[:http_auth_password] and !params[:http_auth_password].is_a?(String)
|
201
211
|
raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
|
212
|
+
raise InvalidParameterError.new("Bad parameter: signature_validation_level must be an String") if params[:signature_validation_level] and !params[:signature_validation_level].is_a?(String)
|
202
213
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
|
203
214
|
raise InvalidParameterError.new("Bad parameter: default_mime_type must be an String") if params[:default_mime_type] and !params[:default_mime_type].is_a?(String)
|
204
215
|
raise InvalidParameterError.new("Bad parameter: name must be an String") if params[:name] and !params[:name].is_a?(String)
|
@@ -271,7 +282,8 @@ module Files
|
|
271
282
|
# enable_dedicated_ips - boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
272
283
|
# http_auth_username - string - Username to send to server for HTTP Authentication.
|
273
284
|
# http_auth_password - string - Password to send to server for HTTP Authentication.
|
274
|
-
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
285
|
+
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
286
|
+
# signature_validation_level - string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
275
287
|
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
276
288
|
# default_mime_type - string - Default mime type of the file attached to the encrypted message
|
277
289
|
# additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
|
@@ -283,6 +295,7 @@ module Files
|
|
283
295
|
raise InvalidParameterError.new("Bad parameter: http_auth_username must be an String") if params[:http_auth_username] and !params[:http_auth_username].is_a?(String)
|
284
296
|
raise InvalidParameterError.new("Bad parameter: http_auth_password must be an String") if params[:http_auth_password] and !params[:http_auth_password].is_a?(String)
|
285
297
|
raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
|
298
|
+
raise InvalidParameterError.new("Bad parameter: signature_validation_level must be an String") if params[:signature_validation_level] and !params[:signature_validation_level].is_a?(String)
|
286
299
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
|
287
300
|
raise InvalidParameterError.new("Bad parameter: default_mime_type must be an String") if params[:default_mime_type] and !params[:default_mime_type].is_a?(String)
|
288
301
|
raise InvalidParameterError.new("Bad parameter: additional_http_headers must be an Hash") if params[:additional_http_headers] and !params[:additional_http_headers].is_a?(Hash)
|
@@ -303,7 +316,8 @@ module Files
|
|
303
316
|
# enable_dedicated_ips - boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
304
317
|
# http_auth_username - string - Username to send to server for HTTP Authentication.
|
305
318
|
# http_auth_password - string - Password to send to server for HTTP Authentication.
|
306
|
-
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
319
|
+
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
320
|
+
# signature_validation_level - string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
307
321
|
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
308
322
|
# default_mime_type - string - Default mime type of the file attached to the encrypted message
|
309
323
|
# additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
|
@@ -317,6 +331,7 @@ module Files
|
|
317
331
|
raise InvalidParameterError.new("Bad parameter: http_auth_username must be an String") if params[:http_auth_username] and !params[:http_auth_username].is_a?(String)
|
318
332
|
raise InvalidParameterError.new("Bad parameter: http_auth_password must be an String") if params[:http_auth_password] and !params[:http_auth_password].is_a?(String)
|
319
333
|
raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
|
334
|
+
raise InvalidParameterError.new("Bad parameter: signature_validation_level must be an String") if params[:signature_validation_level] and !params[:signature_validation_level].is_a?(String)
|
320
335
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
|
321
336
|
raise InvalidParameterError.new("Bad parameter: default_mime_type must be an String") if params[:default_mime_type] and !params[:default_mime_type].is_a?(String)
|
322
337
|
raise InvalidParameterError.new("Bad parameter: additional_http_headers must be an Hash") if params[:additional_http_headers] and !params[:additional_http_headers].is_a?(Hash)
|
@@ -126,15 +126,6 @@ module Files
|
|
126
126
|
@attributes[:disabled] = value
|
127
127
|
end
|
128
128
|
|
129
|
-
# string - If trigger is `daily`, this specifies how often to run this sync. One of: `day`, `week`, `week_end`, `month`, `month_end`, `quarter`, `quarter_end`, `year`, `year_end`
|
130
|
-
def interval
|
131
|
-
@attributes[:interval]
|
132
|
-
end
|
133
|
-
|
134
|
-
def interval=(value)
|
135
|
-
@attributes[:interval] = value
|
136
|
-
end
|
137
|
-
|
138
129
|
# string - Trigger type: daily, custom_schedule, or manual
|
139
130
|
def trigger
|
140
131
|
@attributes[:trigger]
|
@@ -190,6 +181,15 @@ module Files
|
|
190
181
|
@attributes[:sync_interval_minutes] = value
|
191
182
|
end
|
192
183
|
|
184
|
+
# string - If trigger is `daily`, this specifies how often to run this sync. One of: `day`, `week`, `week_end`, `month`, `month_end`, `quarter`, `quarter_end`, `year`, `year_end`
|
185
|
+
def interval
|
186
|
+
@attributes[:interval]
|
187
|
+
end
|
188
|
+
|
189
|
+
def interval=(value)
|
190
|
+
@attributes[:interval] = value
|
191
|
+
end
|
192
|
+
|
193
193
|
# int64 - If trigger type is `daily`, this specifies a day number to run in one of the supported intervals: `week`, `month`, `quarter`, `year`.
|
194
194
|
def recurring_day
|
195
195
|
@attributes[:recurring_day]
|
@@ -237,7 +237,7 @@ module Files
|
|
237
237
|
# keep_after_copy - boolean - Keep files after copying?
|
238
238
|
# delete_empty_folders - boolean - Delete empty folders after sync?
|
239
239
|
# disabled - boolean - Is this sync disabled?
|
240
|
-
# interval -
|
240
|
+
# interval - string - If trigger is `daily`, this specifies how often to run this sync. One of: `day`, `week`, `week_end`, `month`, `month_end`, `quarter`, `quarter_end`, `year`, `year_end`
|
241
241
|
# trigger - string - Trigger type: daily, custom_schedule, or manual
|
242
242
|
# trigger_file - string - Some MFT services request an empty file (known as a trigger file) to signal the sync is complete and they can begin further processing. If trigger_file is set, a zero-byte file will be sent at the end of the sync.
|
243
243
|
# recurring_day - int64 - If trigger type is `daily`, this specifies a day number to run in one of the supported intervals: `week`, `month`, `quarter`, `year`.
|
@@ -255,7 +255,7 @@ module Files
|
|
255
255
|
raise InvalidParameterError.new("Bad parameter: dest_path must be an String") if params[:dest_path] and !params[:dest_path].is_a?(String)
|
256
256
|
raise InvalidParameterError.new("Bad parameter: src_remote_server_id must be an Integer") if params[:src_remote_server_id] and !params[:src_remote_server_id].is_a?(Integer)
|
257
257
|
raise InvalidParameterError.new("Bad parameter: dest_remote_server_id must be an Integer") if params[:dest_remote_server_id] and !params[:dest_remote_server_id].is_a?(Integer)
|
258
|
-
raise InvalidParameterError.new("Bad parameter: interval must be an
|
258
|
+
raise InvalidParameterError.new("Bad parameter: interval must be an String") if params[:interval] and !params[:interval].is_a?(String)
|
259
259
|
raise InvalidParameterError.new("Bad parameter: trigger must be an String") if params[:trigger] and !params[:trigger].is_a?(String)
|
260
260
|
raise InvalidParameterError.new("Bad parameter: trigger_file must be an String") if params[:trigger_file] and !params[:trigger_file].is_a?(String)
|
261
261
|
raise InvalidParameterError.new("Bad parameter: recurring_day must be an Integer") if params[:recurring_day] and !params[:recurring_day].is_a?(Integer)
|
@@ -336,7 +336,7 @@ module Files
|
|
336
336
|
# keep_after_copy - boolean - Keep files after copying?
|
337
337
|
# delete_empty_folders - boolean - Delete empty folders after sync?
|
338
338
|
# disabled - boolean - Is this sync disabled?
|
339
|
-
# interval -
|
339
|
+
# interval - string - If trigger is `daily`, this specifies how often to run this sync. One of: `day`, `week`, `week_end`, `month`, `month_end`, `quarter`, `quarter_end`, `year`, `year_end`
|
340
340
|
# trigger - string - Trigger type: daily, custom_schedule, or manual
|
341
341
|
# trigger_file - string - Some MFT services request an empty file (known as a trigger file) to signal the sync is complete and they can begin further processing. If trigger_file is set, a zero-byte file will be sent at the end of the sync.
|
342
342
|
# recurring_day - int64 - If trigger type is `daily`, this specifies a day number to run in one of the supported intervals: `week`, `month`, `quarter`, `year`.
|
@@ -350,7 +350,7 @@ module Files
|
|
350
350
|
raise InvalidParameterError.new("Bad parameter: dest_path must be an String") if params[:dest_path] and !params[:dest_path].is_a?(String)
|
351
351
|
raise InvalidParameterError.new("Bad parameter: src_remote_server_id must be an Integer") if params[:src_remote_server_id] and !params[:src_remote_server_id].is_a?(Integer)
|
352
352
|
raise InvalidParameterError.new("Bad parameter: dest_remote_server_id must be an Integer") if params[:dest_remote_server_id] and !params[:dest_remote_server_id].is_a?(Integer)
|
353
|
-
raise InvalidParameterError.new("Bad parameter: interval must be an
|
353
|
+
raise InvalidParameterError.new("Bad parameter: interval must be an String") if params[:interval] and !params[:interval].is_a?(String)
|
354
354
|
raise InvalidParameterError.new("Bad parameter: trigger must be an String") if params[:trigger] and !params[:trigger].is_a?(String)
|
355
355
|
raise InvalidParameterError.new("Bad parameter: trigger_file must be an String") if params[:trigger_file] and !params[:trigger_file].is_a?(String)
|
356
356
|
raise InvalidParameterError.new("Bad parameter: recurring_day must be an Integer") if params[:recurring_day] and !params[:recurring_day].is_a?(Integer)
|
@@ -378,7 +378,7 @@ module Files
|
|
378
378
|
# keep_after_copy - boolean - Keep files after copying?
|
379
379
|
# delete_empty_folders - boolean - Delete empty folders after sync?
|
380
380
|
# disabled - boolean - Is this sync disabled?
|
381
|
-
# interval -
|
381
|
+
# interval - string - If trigger is `daily`, this specifies how often to run this sync. One of: `day`, `week`, `week_end`, `month`, `month_end`, `quarter`, `quarter_end`, `year`, `year_end`
|
382
382
|
# trigger - string - Trigger type: daily, custom_schedule, or manual
|
383
383
|
# trigger_file - string - Some MFT services request an empty file (known as a trigger file) to signal the sync is complete and they can begin further processing. If trigger_file is set, a zero-byte file will be sent at the end of the sync.
|
384
384
|
# recurring_day - int64 - If trigger type is `daily`, this specifies a day number to run in one of the supported intervals: `week`, `month`, `quarter`, `year`.
|
@@ -395,7 +395,7 @@ module Files
|
|
395
395
|
raise InvalidParameterError.new("Bad parameter: dest_path must be an String") if params[:dest_path] and !params[:dest_path].is_a?(String)
|
396
396
|
raise InvalidParameterError.new("Bad parameter: src_remote_server_id must be an Integer") if params[:src_remote_server_id] and !params[:src_remote_server_id].is_a?(Integer)
|
397
397
|
raise InvalidParameterError.new("Bad parameter: dest_remote_server_id must be an Integer") if params[:dest_remote_server_id] and !params[:dest_remote_server_id].is_a?(Integer)
|
398
|
-
raise InvalidParameterError.new("Bad parameter: interval must be an
|
398
|
+
raise InvalidParameterError.new("Bad parameter: interval must be an String") if params[:interval] and !params[:interval].is_a?(String)
|
399
399
|
raise InvalidParameterError.new("Bad parameter: trigger must be an String") if params[:trigger] and !params[:trigger].is_a?(String)
|
400
400
|
raise InvalidParameterError.new("Bad parameter: trigger_file must be an String") if params[:trigger_file] and !params[:trigger_file].is_a?(String)
|
401
401
|
raise InvalidParameterError.new("Bad parameter: recurring_day must be an Integer") if params[:recurring_day] and !params[:recurring_day].is_a?(Integer)
|
data/lib/files.com/version.rb
CHANGED