files.com 1.1.302 → 1.1.304
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/site.md +0 -5
- data/docs/user_cipher_use.md +5 -3
- data/lib/files.com/models/site.rb +0 -6
- data/lib/files.com/models/user_cipher_use.rb +10 -5
- data/lib/files.com/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 153496038068ea420584558acfd94d1e009da55b5f1fce648b124013e5bf34c6
|
4
|
+
data.tar.gz: b48616e026a5e3d7b07e4939817042b03e22081178012a018d1c59426662f4f1
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: d6037d527897e51064f33880e58c70ea2ae5d50753d4ef097bca37ca057cbebedf1726c4cf024d5a4cb1416e45dd6983d9d71d20e5283c5ba50069f41618f85c
|
7
|
+
data.tar.gz: af2c2dd0cdf99d0cf1458b9f7689d085b8e547b640ac97d074a87223d356b7acc409b66fe743a4d11c81006c988c7a44680ab297c64aed4873872086d6e327a5
|
data/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.1.
|
1
|
+
1.1.304
|
data/docs/site.md
CHANGED
@@ -171,7 +171,6 @@
|
|
171
171
|
"site_id": 1,
|
172
172
|
"ssl_required": true,
|
173
173
|
"timeout_at": "2000-01-01T01:00:00Z",
|
174
|
-
"tls_disabled": false,
|
175
174
|
"two_factor_setup_needed": false,
|
176
175
|
"allowed_2fa_method_sms": true,
|
177
176
|
"allowed_2fa_method_totp": true,
|
@@ -211,7 +210,6 @@
|
|
211
210
|
"ssl_required": true,
|
212
211
|
"subdomain": "mysite",
|
213
212
|
"switch_to_plan_date": "2000-01-01T01:00:00Z",
|
214
|
-
"tls_disabled": true,
|
215
213
|
"trial_days_left": 1,
|
216
214
|
"trial_until": "2000-01-01T01:00:00Z",
|
217
215
|
"use_dedicated_ips_for_smtp": true,
|
@@ -457,7 +455,6 @@
|
|
457
455
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
458
456
|
* `subdomain` (string): Site subdomain
|
459
457
|
* `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
|
460
|
-
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
461
458
|
* `trial_days_left` (int64): Number of days left in trial
|
462
459
|
* `trial_until` (date-time): When does this Site trial expire?
|
463
460
|
* `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
|
@@ -548,7 +545,6 @@ Files::Site.update(
|
|
548
545
|
migrate_remote_server_sync_to_sync: false,
|
549
546
|
session_expiry: 1.0,
|
550
547
|
ssl_required: false,
|
551
|
-
tls_disabled: false,
|
552
548
|
sftp_insecure_ciphers: false,
|
553
549
|
sftp_insecure_diffie_hellman: false,
|
554
550
|
disable_files_certificate_generation: false,
|
@@ -709,7 +705,6 @@ Files::Site.update(
|
|
709
705
|
* `migrate_remote_server_sync_to_sync` (boolean): If true, we will migrate all remote server syncs to the new Sync model.
|
710
706
|
* `session_expiry` (double): Session expiry in hours
|
711
707
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
712
|
-
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
713
708
|
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
714
709
|
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
715
710
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
data/docs/user_cipher_use.md
CHANGED
@@ -5,22 +5,24 @@
|
|
5
5
|
```
|
6
6
|
{
|
7
7
|
"id": 1,
|
8
|
+
"user_id": 1,
|
9
|
+
"username": "example",
|
8
10
|
"protocol_cipher": "TLSv1.2; ECDHE-RSA-AES256-GCM-SHA384",
|
9
11
|
"created_at": "2000-01-01T01:00:00Z",
|
10
12
|
"insecure": true,
|
11
13
|
"interface": "restapi",
|
12
|
-
"updated_at": "2000-01-01T01:00:00Z"
|
13
|
-
"user_id": 1
|
14
|
+
"updated_at": "2000-01-01T01:00:00Z"
|
14
15
|
}
|
15
16
|
```
|
16
17
|
|
17
18
|
* `id` (int64): UserCipherUse ID
|
19
|
+
* `user_id` (int64): ID of the user who performed this access
|
20
|
+
* `username` (string): Username of the user who performed this access
|
18
21
|
* `protocol_cipher` (string): The protocol and cipher employed
|
19
22
|
* `created_at` (date-time): The earliest recorded use of this combination of interface and protocol and cipher (for this user)
|
20
23
|
* `insecure` (boolean): Is this cipher considered insecure?
|
21
24
|
* `interface` (string): The interface accessed
|
22
25
|
* `updated_at` (date-time): The most recent use of this combination of interface and protocol and cipher (for this user)
|
23
|
-
* `user_id` (int64): ID of the user who performed this access
|
24
26
|
|
25
27
|
|
26
28
|
---
|
@@ -764,11 +764,6 @@ module Files
|
|
764
764
|
@attributes[:switch_to_plan_date]
|
765
765
|
end
|
766
766
|
|
767
|
-
# boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
768
|
-
def tls_disabled
|
769
|
-
@attributes[:tls_disabled]
|
770
|
-
end
|
771
|
-
|
772
767
|
# int64 - Number of days left in trial
|
773
768
|
def trial_days_left
|
774
769
|
@attributes[:trial_days_left]
|
@@ -925,7 +920,6 @@ module Files
|
|
925
920
|
# migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
|
926
921
|
# session_expiry - double - Session expiry in hours
|
927
922
|
# ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
928
|
-
# tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
929
923
|
# sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
930
924
|
# sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
931
925
|
# disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
@@ -14,6 +14,16 @@ module Files
|
|
14
14
|
@attributes[:id]
|
15
15
|
end
|
16
16
|
|
17
|
+
# int64 - ID of the user who performed this access
|
18
|
+
def user_id
|
19
|
+
@attributes[:user_id]
|
20
|
+
end
|
21
|
+
|
22
|
+
# string - Username of the user who performed this access
|
23
|
+
def username
|
24
|
+
@attributes[:username]
|
25
|
+
end
|
26
|
+
|
17
27
|
# string - The protocol and cipher employed
|
18
28
|
def protocol_cipher
|
19
29
|
@attributes[:protocol_cipher]
|
@@ -39,11 +49,6 @@ module Files
|
|
39
49
|
@attributes[:updated_at]
|
40
50
|
end
|
41
51
|
|
42
|
-
# int64 - ID of the user who performed this access
|
43
|
-
def user_id
|
44
|
-
@attributes[:user_id]
|
45
|
-
end
|
46
|
-
|
47
52
|
# Parameters:
|
48
53
|
# user_id - int64 - User ID. If provided, will return uses for this user.
|
49
54
|
# cursor - string - Used for pagination. When a list request has more records available, cursors are provided in the response headers `X-Files-Cursor-Next` and `X-Files-Cursor-Prev`. Send one of those cursor value here to resume an existing list from the next available record. Note: many of our SDKs have iterator methods that will automatically handle cursor-based pagination.
|
data/lib/files.com/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: files.com
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.1.
|
4
|
+
version: 1.1.304
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- files.com
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2025-07-
|
11
|
+
date: 2025-07-24 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: addressable
|