files.com 1.1.272 → 1.1.273
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/as2_partner.md +12 -4
- data/lib/files.com/models/as2_partner.rb +19 -4
- data/lib/files.com/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: a5cb2a4cbfdbdfc05c8aa311fb975fffca194ca31a3735f51f09b3a6655ccb15
|
4
|
+
data.tar.gz: d9de09d7e652ebfdf6506c4d76d68d0692cc520d5483662fc57bcf45e379e136
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: eac889ddccff0204aa607a40ab26d80645441a36a0ab5dd2c4dc635ecd64cc6f3ec55ba2f6bc9fe49433f5c96af728d6b78582b38d68e863825041e01d849d37
|
7
|
+
data.tar.gz: bf5290304474df2a93cc5978d0549e03ec10b2ee2c251df657581747395dccdf77475e17c382ffe7d974c3a9c3ca52c7a5f122c4b80ecae1b18587fdc25257ee
|
data/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.1.
|
1
|
+
1.1.273
|
data/docs/as2_partner.md
CHANGED
@@ -15,6 +15,7 @@
|
|
15
15
|
},
|
16
16
|
"default_mime_type": "application/octet-stream",
|
17
17
|
"mdn_validation_level": "none",
|
18
|
+
"signature_validation_level": "normal",
|
18
19
|
"enable_dedicated_ips": true,
|
19
20
|
"hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
|
20
21
|
"public_certificate": "example",
|
@@ -35,7 +36,8 @@
|
|
35
36
|
* `http_auth_username` (string): Username to send to server for HTTP Authentication.
|
36
37
|
* `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
|
37
38
|
* `default_mime_type` (string): Default mime type of the file attached to the encrypted message
|
38
|
-
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
39
|
+
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
40
|
+
* `signature_validation_level` (string): Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
39
41
|
* `enable_dedicated_ips` (boolean): If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
40
42
|
* `hex_public_certificate_serial` (string): Serial of public certificate used for message security in hex format.
|
41
43
|
* `public_certificate` (string): Public certificate used for message security.
|
@@ -84,6 +86,7 @@ Files::As2Partner.create(
|
|
84
86
|
enable_dedicated_ips: true,
|
85
87
|
http_auth_username: "username",
|
86
88
|
mdn_validation_level: "none",
|
89
|
+
signature_validation_level: "normal",
|
87
90
|
server_certificate: "require_match",
|
88
91
|
default_mime_type: "application/octet-stream",
|
89
92
|
additional_http_headers: {"key":"example value"},
|
@@ -99,7 +102,8 @@ Files::As2Partner.create(
|
|
99
102
|
* `enable_dedicated_ips` (boolean): If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
100
103
|
* `http_auth_username` (string): Username to send to server for HTTP Authentication.
|
101
104
|
* `http_auth_password` (string): Password to send to server for HTTP Authentication.
|
102
|
-
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
105
|
+
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
106
|
+
* `signature_validation_level` (string): Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
103
107
|
* `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
104
108
|
* `default_mime_type` (string): Default mime type of the file attached to the encrypted message
|
105
109
|
* `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
|
@@ -118,6 +122,7 @@ Files::As2Partner.update(id,
|
|
118
122
|
enable_dedicated_ips: true,
|
119
123
|
http_auth_username: "username",
|
120
124
|
mdn_validation_level: "none",
|
125
|
+
signature_validation_level: "normal",
|
121
126
|
server_certificate: "require_match",
|
122
127
|
default_mime_type: "application/octet-stream",
|
123
128
|
additional_http_headers: {"key":"example value"},
|
@@ -133,7 +138,8 @@ Files::As2Partner.update(id,
|
|
133
138
|
* `enable_dedicated_ips` (boolean): If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
134
139
|
* `http_auth_username` (string): Username to send to server for HTTP Authentication.
|
135
140
|
* `http_auth_password` (string): Password to send to server for HTTP Authentication.
|
136
|
-
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
141
|
+
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
142
|
+
* `signature_validation_level` (string): Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
137
143
|
* `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
138
144
|
* `default_mime_type` (string): Default mime type of the file attached to the encrypted message
|
139
145
|
* `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
|
@@ -166,6 +172,7 @@ as2_partner.update(
|
|
166
172
|
enable_dedicated_ips: true,
|
167
173
|
http_auth_username: "username",
|
168
174
|
mdn_validation_level: "none",
|
175
|
+
signature_validation_level: "normal",
|
169
176
|
server_certificate: "require_match",
|
170
177
|
default_mime_type: "application/octet-stream",
|
171
178
|
additional_http_headers: {"key":"example value"},
|
@@ -181,7 +188,8 @@ as2_partner.update(
|
|
181
188
|
* `enable_dedicated_ips` (boolean): If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
182
189
|
* `http_auth_username` (string): Username to send to server for HTTP Authentication.
|
183
190
|
* `http_auth_password` (string): Password to send to server for HTTP Authentication.
|
184
|
-
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
191
|
+
* `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
192
|
+
* `signature_validation_level` (string): Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
185
193
|
* `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
186
194
|
* `default_mime_type` (string): Default mime type of the file attached to the encrypted message
|
187
195
|
* `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
|
@@ -81,7 +81,7 @@ module Files
|
|
81
81
|
@attributes[:default_mime_type] = value
|
82
82
|
end
|
83
83
|
|
84
|
-
# string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
84
|
+
# string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
85
85
|
def mdn_validation_level
|
86
86
|
@attributes[:mdn_validation_level]
|
87
87
|
end
|
@@ -90,6 +90,15 @@ module Files
|
|
90
90
|
@attributes[:mdn_validation_level] = value
|
91
91
|
end
|
92
92
|
|
93
|
+
# string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
94
|
+
def signature_validation_level
|
95
|
+
@attributes[:signature_validation_level]
|
96
|
+
end
|
97
|
+
|
98
|
+
def signature_validation_level=(value)
|
99
|
+
@attributes[:signature_validation_level] = value
|
100
|
+
end
|
101
|
+
|
93
102
|
# boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
94
103
|
def enable_dedicated_ips
|
95
104
|
@attributes[:enable_dedicated_ips]
|
@@ -184,7 +193,8 @@ module Files
|
|
184
193
|
# enable_dedicated_ips - boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
185
194
|
# http_auth_username - string - Username to send to server for HTTP Authentication.
|
186
195
|
# http_auth_password - string - Password to send to server for HTTP Authentication.
|
187
|
-
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
196
|
+
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
197
|
+
# signature_validation_level - string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
188
198
|
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
189
199
|
# default_mime_type - string - Default mime type of the file attached to the encrypted message
|
190
200
|
# additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
|
@@ -199,6 +209,7 @@ module Files
|
|
199
209
|
raise InvalidParameterError.new("Bad parameter: http_auth_username must be an String") if params[:http_auth_username] and !params[:http_auth_username].is_a?(String)
|
200
210
|
raise InvalidParameterError.new("Bad parameter: http_auth_password must be an String") if params[:http_auth_password] and !params[:http_auth_password].is_a?(String)
|
201
211
|
raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
|
212
|
+
raise InvalidParameterError.new("Bad parameter: signature_validation_level must be an String") if params[:signature_validation_level] and !params[:signature_validation_level].is_a?(String)
|
202
213
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
|
203
214
|
raise InvalidParameterError.new("Bad parameter: default_mime_type must be an String") if params[:default_mime_type] and !params[:default_mime_type].is_a?(String)
|
204
215
|
raise InvalidParameterError.new("Bad parameter: name must be an String") if params[:name] and !params[:name].is_a?(String)
|
@@ -271,7 +282,8 @@ module Files
|
|
271
282
|
# enable_dedicated_ips - boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
272
283
|
# http_auth_username - string - Username to send to server for HTTP Authentication.
|
273
284
|
# http_auth_password - string - Password to send to server for HTTP Authentication.
|
274
|
-
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
285
|
+
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
286
|
+
# signature_validation_level - string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
275
287
|
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
276
288
|
# default_mime_type - string - Default mime type of the file attached to the encrypted message
|
277
289
|
# additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
|
@@ -283,6 +295,7 @@ module Files
|
|
283
295
|
raise InvalidParameterError.new("Bad parameter: http_auth_username must be an String") if params[:http_auth_username] and !params[:http_auth_username].is_a?(String)
|
284
296
|
raise InvalidParameterError.new("Bad parameter: http_auth_password must be an String") if params[:http_auth_password] and !params[:http_auth_password].is_a?(String)
|
285
297
|
raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
|
298
|
+
raise InvalidParameterError.new("Bad parameter: signature_validation_level must be an String") if params[:signature_validation_level] and !params[:signature_validation_level].is_a?(String)
|
286
299
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
|
287
300
|
raise InvalidParameterError.new("Bad parameter: default_mime_type must be an String") if params[:default_mime_type] and !params[:default_mime_type].is_a?(String)
|
288
301
|
raise InvalidParameterError.new("Bad parameter: additional_http_headers must be an Hash") if params[:additional_http_headers] and !params[:additional_http_headers].is_a?(Hash)
|
@@ -303,7 +316,8 @@ module Files
|
|
303
316
|
# enable_dedicated_ips - boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
|
304
317
|
# http_auth_username - string - Username to send to server for HTTP Authentication.
|
305
318
|
# http_auth_password - string - Password to send to server for HTTP Authentication.
|
306
|
-
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
319
|
+
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
|
320
|
+
# signature_validation_level - string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
|
307
321
|
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
308
322
|
# default_mime_type - string - Default mime type of the file attached to the encrypted message
|
309
323
|
# additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
|
@@ -317,6 +331,7 @@ module Files
|
|
317
331
|
raise InvalidParameterError.new("Bad parameter: http_auth_username must be an String") if params[:http_auth_username] and !params[:http_auth_username].is_a?(String)
|
318
332
|
raise InvalidParameterError.new("Bad parameter: http_auth_password must be an String") if params[:http_auth_password] and !params[:http_auth_password].is_a?(String)
|
319
333
|
raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
|
334
|
+
raise InvalidParameterError.new("Bad parameter: signature_validation_level must be an String") if params[:signature_validation_level] and !params[:signature_validation_level].is_a?(String)
|
320
335
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
|
321
336
|
raise InvalidParameterError.new("Bad parameter: default_mime_type must be an String") if params[:default_mime_type] and !params[:default_mime_type].is_a?(String)
|
322
337
|
raise InvalidParameterError.new("Bad parameter: additional_http_headers must be an Hash") if params[:additional_http_headers] and !params[:additional_http_headers].is_a?(Hash)
|
data/lib/files.com/version.rb
CHANGED