files.com 1.1.294 → 1.1.296

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ee1c7ff65812de4894b7e38f2576aca47d448f657acb783b3d1bc4fba9ce1da3
4
- data.tar.gz: acc3648dd73d8ae25b088c933c5e4eb6e8ae321b1b97ab95c3a07d151d8f32e2
3
+ metadata.gz: 2e37faa39cb7be8484877c34fe39a436640072e4b2e1be2ee6ce3a03bb94ce37
4
+ data.tar.gz: 0d16cc9c9a6b6805ae658f1abef6f13b3494c33b7b4bfe5665e0da0cd620abf7
5
5
  SHA512:
6
- metadata.gz: 961c1021846442cbffcc6be9363902f25f65e303fc04d42bd2b9fb4e7cd77bb520e322671b9c1085a664f5c5f5a12963f930ff7bb0d99d7c1098a26e4b389e38
7
- data.tar.gz: de55928084ae88b13eaec75b1906280e03a398cb14e8980ef90e6f7cb97774ecd7ebe0f49b00eaa7f7345e3fb5d3c3e9896d84da9c28e974cbdb04211e1f2cbe
6
+ metadata.gz: f64e99fd1b185120a73acfda5a3a44dcb913c0809068689323aae1c341eec42fe39d6b2ee168fb07bbd5adc86f47b34a50a7f8627fcdefa2838cd5f2f2a2e9db
7
+ data.tar.gz: dfd2e7638fb0bff46bbebaea4ff5db9fdf0deb94744e228f36be6ce451412a4cf93ad413ceff6f0e612434e089161df9978f5e641b787d2fbf20ee68808b3d8e
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.1.294
1
+ 1.1.296
data/docs/site.md CHANGED
@@ -198,6 +198,8 @@
198
198
  "show_request_access_link": true,
199
199
  "site_footer": "example",
200
200
  "site_header": "example",
201
+ "site_public_footer": "example",
202
+ "site_public_header": "example",
201
203
  "smtp_address": "smtp.my-mail-server.com",
202
204
  "smtp_authentication": "plain",
203
205
  "smtp_from": "me@my-mail-server.com",
@@ -440,8 +442,10 @@
440
442
  * `sharing_enabled` (boolean): Allow bundle creation
441
443
  * `show_user_notifications_log_in_link` (boolean): Show log in link in user notifications?
442
444
  * `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
443
- * `site_footer` (string): Custom site footer text
444
- * `site_header` (string): Custom site header text
445
+ * `site_footer` (string): Custom site footer text for authenticated pages
446
+ * `site_header` (string): Custom site header text for authenticated pages
447
+ * `site_public_footer` (string): Custom site footer text for public pages
448
+ * `site_public_header` (string): Custom site header text for public pages
445
449
  * `smtp_address` (string): SMTP server hostname or IP
446
450
  * `smtp_authentication` (string): SMTP server authentication type
447
451
  * `smtp_from` (string): From address to use when mailing through custom SMTP
@@ -453,7 +457,7 @@
453
457
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
454
458
  * `subdomain` (string): Site subdomain
455
459
  * `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
456
- * `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
460
+ * `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
457
461
  * `trial_days_left` (int64): Number of days left in trial
458
462
  * `trial_until` (date-time): When does this Site trial expire?
459
463
  * `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
@@ -620,6 +624,8 @@ Files::Site.update(
620
624
  color2_top_text: "#ffffff",
621
625
  site_header: "example",
622
626
  site_footer: "example",
627
+ site_public_header: "example",
628
+ site_public_footer: "example",
623
629
  login_help_text: "Login page help text.",
624
630
  use_dedicated_ips_for_smtp: false,
625
631
  smtp_address: "smtp.my-mail-server.com",
@@ -703,7 +709,7 @@ Files::Site.update(
703
709
  * `migrate_remote_server_sync_to_sync` (boolean): If true, we will migrate all remote server syncs to the new Sync model.
704
710
  * `session_expiry` (double): Session expiry in hours
705
711
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
706
- * `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
712
+ * `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
707
713
  * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
708
714
  * `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
709
715
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
@@ -777,8 +783,10 @@ Files::Site.update(
777
783
  * `color2_link` (string): Top bar link color
778
784
  * `color2_text` (string): Page link and button color
779
785
  * `color2_top_text` (string): Top bar text color
780
- * `site_header` (string): Custom site header text
781
- * `site_footer` (string): Custom site footer text
786
+ * `site_header` (string): Custom site header text for authenticated pages
787
+ * `site_footer` (string): Custom site footer text for authenticated pages
788
+ * `site_public_header` (string): Custom site header text for public pages
789
+ * `site_public_footer` (string): Custom site footer text for public pages
782
790
  * `login_help_text` (string): Login help text
783
791
  * `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
784
792
  * `smtp_address` (string): SMTP server hostname or IP
@@ -689,16 +689,26 @@ module Files
689
689
  @attributes[:show_request_access_link]
690
690
  end
691
691
 
692
- # string - Custom site footer text
692
+ # string - Custom site footer text for authenticated pages
693
693
  def site_footer
694
694
  @attributes[:site_footer]
695
695
  end
696
696
 
697
- # string - Custom site header text
697
+ # string - Custom site header text for authenticated pages
698
698
  def site_header
699
699
  @attributes[:site_header]
700
700
  end
701
701
 
702
+ # string - Custom site footer text for public pages
703
+ def site_public_footer
704
+ @attributes[:site_public_footer]
705
+ end
706
+
707
+ # string - Custom site header text for public pages
708
+ def site_public_header
709
+ @attributes[:site_public_header]
710
+ end
711
+
702
712
  # string - SMTP server hostname or IP
703
713
  def smtp_address
704
714
  @attributes[:smtp_address]
@@ -754,7 +764,7 @@ module Files
754
764
  @attributes[:switch_to_plan_date]
755
765
  end
756
766
 
757
- # boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
767
+ # boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
758
768
  def tls_disabled
759
769
  @attributes[:tls_disabled]
760
770
  end
@@ -915,7 +925,7 @@ module Files
915
925
  # migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
916
926
  # session_expiry - double - Session expiry in hours
917
927
  # ssl_required - boolean - Is SSL required? Disabling this is insecure.
918
- # tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
928
+ # tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
919
929
  # sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
920
930
  # sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
921
931
  # disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
@@ -989,8 +999,10 @@ module Files
989
999
  # color2_link - string - Top bar link color
990
1000
  # color2_text - string - Page link and button color
991
1001
  # color2_top_text - string - Top bar text color
992
- # site_header - string - Custom site header text
993
- # site_footer - string - Custom site footer text
1002
+ # site_header - string - Custom site header text for authenticated pages
1003
+ # site_footer - string - Custom site footer text for authenticated pages
1004
+ # site_public_header - string - Custom site header text for public pages
1005
+ # site_public_footer - string - Custom site footer text for public pages
994
1006
  # login_help_text - string - Login help text
995
1007
  # use_dedicated_ips_for_smtp - boolean - If using custom SMTP, should we use dedicated IPs to deliver emails?
996
1008
  # smtp_address - string - SMTP server hostname or IP
@@ -1081,6 +1093,8 @@ module Files
1081
1093
  raise InvalidParameterError.new("Bad parameter: color2_top_text must be an String") if params[:color2_top_text] and !params[:color2_top_text].is_a?(String)
1082
1094
  raise InvalidParameterError.new("Bad parameter: site_header must be an String") if params[:site_header] and !params[:site_header].is_a?(String)
1083
1095
  raise InvalidParameterError.new("Bad parameter: site_footer must be an String") if params[:site_footer] and !params[:site_footer].is_a?(String)
1096
+ raise InvalidParameterError.new("Bad parameter: site_public_header must be an String") if params[:site_public_header] and !params[:site_public_header].is_a?(String)
1097
+ raise InvalidParameterError.new("Bad parameter: site_public_footer must be an String") if params[:site_public_footer] and !params[:site_public_footer].is_a?(String)
1084
1098
  raise InvalidParameterError.new("Bad parameter: login_help_text must be an String") if params[:login_help_text] and !params[:login_help_text].is_a?(String)
1085
1099
  raise InvalidParameterError.new("Bad parameter: smtp_address must be an String") if params[:smtp_address] and !params[:smtp_address].is_a?(String)
1086
1100
  raise InvalidParameterError.new("Bad parameter: smtp_authentication must be an String") if params[:smtp_authentication] and !params[:smtp_authentication].is_a?(String)
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Files
4
- VERSION = "1.1.294"
4
+ VERSION = "1.1.296"
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.294
4
+ version: 1.1.296
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2025-07-10 00:00:00.000000000 Z
11
+ date: 2025-07-15 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable