files.com 1.1.302 → 1.1.304

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a7f79167aaa5c8c730a4262b6d77c4a2ff401fc5659c47ba044ce9f2ceef6158
4
- data.tar.gz: e236d26bba6a097d7a21e766afce433e8e52364084feddf546a2d319232cfdc3
3
+ metadata.gz: 153496038068ea420584558acfd94d1e009da55b5f1fce648b124013e5bf34c6
4
+ data.tar.gz: b48616e026a5e3d7b07e4939817042b03e22081178012a018d1c59426662f4f1
5
5
  SHA512:
6
- metadata.gz: 8757a060f171ef957da512457759aa3696e5281c555e562e0020636be1aca2fe7a55a87d5ab34ebda42c00b60441f507504efe5413389dd93496a4fb96f814d0
7
- data.tar.gz: 5b1a85d8263ea7c82878b4d94e36aecc0480cbdf18cbbd8e45c4d9ae7c487a361bcb9a4aa8da416e705a94633974945e57f7e0aaf08def642145a1ac350950b8
6
+ metadata.gz: d6037d527897e51064f33880e58c70ea2ae5d50753d4ef097bca37ca057cbebedf1726c4cf024d5a4cb1416e45dd6983d9d71d20e5283c5ba50069f41618f85c
7
+ data.tar.gz: af2c2dd0cdf99d0cf1458b9f7689d085b8e547b640ac97d074a87223d356b7acc409b66fe743a4d11c81006c988c7a44680ab297c64aed4873872086d6e327a5
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.1.302
1
+ 1.1.304
data/docs/site.md CHANGED
@@ -171,7 +171,6 @@
171
171
  "site_id": 1,
172
172
  "ssl_required": true,
173
173
  "timeout_at": "2000-01-01T01:00:00Z",
174
- "tls_disabled": false,
175
174
  "two_factor_setup_needed": false,
176
175
  "allowed_2fa_method_sms": true,
177
176
  "allowed_2fa_method_totp": true,
@@ -211,7 +210,6 @@
211
210
  "ssl_required": true,
212
211
  "subdomain": "mysite",
213
212
  "switch_to_plan_date": "2000-01-01T01:00:00Z",
214
- "tls_disabled": true,
215
213
  "trial_days_left": 1,
216
214
  "trial_until": "2000-01-01T01:00:00Z",
217
215
  "use_dedicated_ips_for_smtp": true,
@@ -457,7 +455,6 @@
457
455
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
458
456
  * `subdomain` (string): Site subdomain
459
457
  * `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
460
- * `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
461
458
  * `trial_days_left` (int64): Number of days left in trial
462
459
  * `trial_until` (date-time): When does this Site trial expire?
463
460
  * `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
@@ -548,7 +545,6 @@ Files::Site.update(
548
545
  migrate_remote_server_sync_to_sync: false,
549
546
  session_expiry: 1.0,
550
547
  ssl_required: false,
551
- tls_disabled: false,
552
548
  sftp_insecure_ciphers: false,
553
549
  sftp_insecure_diffie_hellman: false,
554
550
  disable_files_certificate_generation: false,
@@ -709,7 +705,6 @@ Files::Site.update(
709
705
  * `migrate_remote_server_sync_to_sync` (boolean): If true, we will migrate all remote server syncs to the new Sync model.
710
706
  * `session_expiry` (double): Session expiry in hours
711
707
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
712
- * `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
713
708
  * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
714
709
  * `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
715
710
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
@@ -5,22 +5,24 @@
5
5
  ```
6
6
  {
7
7
  "id": 1,
8
+ "user_id": 1,
9
+ "username": "example",
8
10
  "protocol_cipher": "TLSv1.2; ECDHE-RSA-AES256-GCM-SHA384",
9
11
  "created_at": "2000-01-01T01:00:00Z",
10
12
  "insecure": true,
11
13
  "interface": "restapi",
12
- "updated_at": "2000-01-01T01:00:00Z",
13
- "user_id": 1
14
+ "updated_at": "2000-01-01T01:00:00Z"
14
15
  }
15
16
  ```
16
17
 
17
18
  * `id` (int64): UserCipherUse ID
19
+ * `user_id` (int64): ID of the user who performed this access
20
+ * `username` (string): Username of the user who performed this access
18
21
  * `protocol_cipher` (string): The protocol and cipher employed
19
22
  * `created_at` (date-time): The earliest recorded use of this combination of interface and protocol and cipher (for this user)
20
23
  * `insecure` (boolean): Is this cipher considered insecure?
21
24
  * `interface` (string): The interface accessed
22
25
  * `updated_at` (date-time): The most recent use of this combination of interface and protocol and cipher (for this user)
23
- * `user_id` (int64): ID of the user who performed this access
24
26
 
25
27
 
26
28
  ---
@@ -764,11 +764,6 @@ module Files
764
764
  @attributes[:switch_to_plan_date]
765
765
  end
766
766
 
767
- # boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
768
- def tls_disabled
769
- @attributes[:tls_disabled]
770
- end
771
-
772
767
  # int64 - Number of days left in trial
773
768
  def trial_days_left
774
769
  @attributes[:trial_days_left]
@@ -925,7 +920,6 @@ module Files
925
920
  # migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
926
921
  # session_expiry - double - Session expiry in hours
927
922
  # ssl_required - boolean - Is SSL required? Disabling this is insecure.
928
- # tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
929
923
  # sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
930
924
  # sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
931
925
  # disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
@@ -14,6 +14,16 @@ module Files
14
14
  @attributes[:id]
15
15
  end
16
16
 
17
+ # int64 - ID of the user who performed this access
18
+ def user_id
19
+ @attributes[:user_id]
20
+ end
21
+
22
+ # string - Username of the user who performed this access
23
+ def username
24
+ @attributes[:username]
25
+ end
26
+
17
27
  # string - The protocol and cipher employed
18
28
  def protocol_cipher
19
29
  @attributes[:protocol_cipher]
@@ -39,11 +49,6 @@ module Files
39
49
  @attributes[:updated_at]
40
50
  end
41
51
 
42
- # int64 - ID of the user who performed this access
43
- def user_id
44
- @attributes[:user_id]
45
- end
46
-
47
52
  # Parameters:
48
53
  # user_id - int64 - User ID. If provided, will return uses for this user.
49
54
  # cursor - string - Used for pagination. When a list request has more records available, cursors are provided in the response headers `X-Files-Cursor-Next` and `X-Files-Cursor-Prev`. Send one of those cursor value here to resume an existing list from the next available record. Note: many of our SDKs have iterator methods that will automatically handle cursor-based pagination.
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Files
4
- VERSION = "1.1.302"
4
+ VERSION = "1.1.304"
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.302
4
+ version: 1.1.304
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2025-07-22 00:00:00.000000000 Z
11
+ date: 2025-07-24 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable