files.com 1.1.303 → 1.1.305
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/gpg_key.md +10 -6
- data/docs/site.md +0 -5
- data/lib/files.com/models/gpg_key.rb +24 -6
- data/lib/files.com/models/site.rb +0 -6
- data/lib/files.com/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 579b93a802b0cc99c706d688acc0ec39ec7f286c61a5f5d745971631c414ed20
|
4
|
+
data.tar.gz: 3771606162fd216b934a7d5f0a416919f0ca7fb7d318db0f3b2d2b7c1f26a021
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cd4aa144604b9cd9bbc00ffa24afba9daf5fd191f221dd6744ec4c156dcaeec18c129ea3b6bb3871fa3c73e61a51f272b0cbcd76dec26bf2900169df0e3eac16
|
7
|
+
data.tar.gz: d78f941b9dd7b134c6091c4dafd57a1b5ef3b9054a02ff27089612ba11fd54a655c1e5b05594467852e6f184aa7df6d39b910284cbea4cc612388fc50cb65f1f
|
data/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.1.
|
1
|
+
1.1.305
|
data/docs/gpg_key.md
CHANGED
@@ -8,6 +8,8 @@
|
|
8
8
|
"expires_at": "2000-01-01T01:00:00Z",
|
9
9
|
"name": "key name",
|
10
10
|
"user_id": 1,
|
11
|
+
"public_key_md5": "7f8bc1210b09b9ddf469e6b6b8920e76",
|
12
|
+
"private_key_md5": "ab236cfe4a195f0226bc2e674afdd6b0",
|
11
13
|
"public_key": "7f8bc1210b09b9ddf469e6b6b8920e76",
|
12
14
|
"private_key": "ab236cfe4a195f0226bc2e674afdd6b0",
|
13
15
|
"private_key_password": "[your GPG private key password]"
|
@@ -18,6 +20,8 @@
|
|
18
20
|
* `expires_at` (date-time): Your GPG key expiration date.
|
19
21
|
* `name` (string): Your GPG key name.
|
20
22
|
* `user_id` (int64): GPG owner's user id
|
23
|
+
* `public_key_md5` (string): MD5 hash of your GPG public key
|
24
|
+
* `private_key_md5` (string): MD5 hash of your GPG private key.
|
21
25
|
* `public_key` (string): Your GPG public key
|
22
26
|
* `private_key` (string): Your GPG private key.
|
23
27
|
* `private_key_password` (string): Your GPG private key password. Only required for password protected keys.
|
@@ -79,8 +83,8 @@ Files::GpgKey.create(
|
|
79
83
|
### Parameters
|
80
84
|
|
81
85
|
* `user_id` (int64): User ID. Provide a value of `0` to operate the current session's user.
|
82
|
-
* `public_key` (string):
|
83
|
-
* `private_key` (string):
|
86
|
+
* `public_key` (string): MD5 hash of your GPG public key
|
87
|
+
* `private_key` (string): MD5 hash of your GPG private key.
|
84
88
|
* `private_key_password` (string): Your GPG private key password. Only required for password protected keys.
|
85
89
|
* `name` (string): Required - Your GPG key name.
|
86
90
|
* `generate_expires_at` (string): Expiration date of the key. Used for the generation of the key. Will be ignored if `generate_keypair` is false.
|
@@ -105,8 +109,8 @@ Files::GpgKey.update(id,
|
|
105
109
|
### Parameters
|
106
110
|
|
107
111
|
* `id` (int64): Required - Gpg Key ID.
|
108
|
-
* `public_key` (string):
|
109
|
-
* `private_key` (string):
|
112
|
+
* `public_key` (string): MD5 hash of your GPG public key
|
113
|
+
* `private_key` (string): MD5 hash of your GPG private key.
|
110
114
|
* `private_key_password` (string): Your GPG private key password. Only required for password protected keys.
|
111
115
|
* `name` (string): Your GPG key name.
|
112
116
|
|
@@ -142,8 +146,8 @@ gpg_key.update(
|
|
142
146
|
### Parameters
|
143
147
|
|
144
148
|
* `id` (int64): Required - Gpg Key ID.
|
145
|
-
* `public_key` (string):
|
146
|
-
* `private_key` (string):
|
149
|
+
* `public_key` (string): MD5 hash of your GPG public key
|
150
|
+
* `private_key` (string): MD5 hash of your GPG private key.
|
147
151
|
* `private_key_password` (string): Your GPG private key password. Only required for password protected keys.
|
148
152
|
* `name` (string): Your GPG key name.
|
149
153
|
|
data/docs/site.md
CHANGED
@@ -171,7 +171,6 @@
|
|
171
171
|
"site_id": 1,
|
172
172
|
"ssl_required": true,
|
173
173
|
"timeout_at": "2000-01-01T01:00:00Z",
|
174
|
-
"tls_disabled": false,
|
175
174
|
"two_factor_setup_needed": false,
|
176
175
|
"allowed_2fa_method_sms": true,
|
177
176
|
"allowed_2fa_method_totp": true,
|
@@ -211,7 +210,6 @@
|
|
211
210
|
"ssl_required": true,
|
212
211
|
"subdomain": "mysite",
|
213
212
|
"switch_to_plan_date": "2000-01-01T01:00:00Z",
|
214
|
-
"tls_disabled": true,
|
215
213
|
"trial_days_left": 1,
|
216
214
|
"trial_until": "2000-01-01T01:00:00Z",
|
217
215
|
"use_dedicated_ips_for_smtp": true,
|
@@ -457,7 +455,6 @@
|
|
457
455
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
458
456
|
* `subdomain` (string): Site subdomain
|
459
457
|
* `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
|
460
|
-
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
461
458
|
* `trial_days_left` (int64): Number of days left in trial
|
462
459
|
* `trial_until` (date-time): When does this Site trial expire?
|
463
460
|
* `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
|
@@ -548,7 +545,6 @@ Files::Site.update(
|
|
548
545
|
migrate_remote_server_sync_to_sync: false,
|
549
546
|
session_expiry: 1.0,
|
550
547
|
ssl_required: false,
|
551
|
-
tls_disabled: false,
|
552
548
|
sftp_insecure_ciphers: false,
|
553
549
|
sftp_insecure_diffie_hellman: false,
|
554
550
|
disable_files_certificate_generation: false,
|
@@ -709,7 +705,6 @@ Files::Site.update(
|
|
709
705
|
* `migrate_remote_server_sync_to_sync` (boolean): If true, we will migrate all remote server syncs to the new Sync model.
|
710
706
|
* `session_expiry` (double): Session expiry in hours
|
711
707
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
712
|
-
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
713
708
|
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
714
709
|
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
715
710
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
@@ -45,6 +45,24 @@ module Files
|
|
45
45
|
@attributes[:user_id] = value
|
46
46
|
end
|
47
47
|
|
48
|
+
# string - MD5 hash of your GPG public key
|
49
|
+
def public_key_md5
|
50
|
+
@attributes[:public_key_md5]
|
51
|
+
end
|
52
|
+
|
53
|
+
def public_key_md5=(value)
|
54
|
+
@attributes[:public_key_md5] = value
|
55
|
+
end
|
56
|
+
|
57
|
+
# string - MD5 hash of your GPG private key.
|
58
|
+
def private_key_md5
|
59
|
+
@attributes[:private_key_md5]
|
60
|
+
end
|
61
|
+
|
62
|
+
def private_key_md5=(value)
|
63
|
+
@attributes[:private_key_md5] = value
|
64
|
+
end
|
65
|
+
|
48
66
|
# string - Your GPG public key
|
49
67
|
def public_key
|
50
68
|
@attributes[:public_key]
|
@@ -109,8 +127,8 @@ module Files
|
|
109
127
|
end
|
110
128
|
|
111
129
|
# Parameters:
|
112
|
-
# public_key - string -
|
113
|
-
# private_key - string -
|
130
|
+
# public_key - string - MD5 hash of your GPG public key
|
131
|
+
# private_key - string - MD5 hash of your GPG private key.
|
114
132
|
# private_key_password - string - Your GPG private key password. Only required for password protected keys.
|
115
133
|
# name - string - Your GPG key name.
|
116
134
|
def update(params = {})
|
@@ -191,8 +209,8 @@ module Files
|
|
191
209
|
|
192
210
|
# Parameters:
|
193
211
|
# user_id - int64 - User ID. Provide a value of `0` to operate the current session's user.
|
194
|
-
# public_key - string -
|
195
|
-
# private_key - string -
|
212
|
+
# public_key - string - MD5 hash of your GPG public key
|
213
|
+
# private_key - string - MD5 hash of your GPG private key.
|
196
214
|
# private_key_password - string - Your GPG private key password. Only required for password protected keys.
|
197
215
|
# name (required) - string - Your GPG key name.
|
198
216
|
# generate_expires_at - string - Expiration date of the key. Used for the generation of the key. Will be ignored if `generate_keypair` is false.
|
@@ -215,8 +233,8 @@ module Files
|
|
215
233
|
end
|
216
234
|
|
217
235
|
# Parameters:
|
218
|
-
# public_key - string -
|
219
|
-
# private_key - string -
|
236
|
+
# public_key - string - MD5 hash of your GPG public key
|
237
|
+
# private_key - string - MD5 hash of your GPG private key.
|
220
238
|
# private_key_password - string - Your GPG private key password. Only required for password protected keys.
|
221
239
|
# name - string - Your GPG key name.
|
222
240
|
def self.update(id, params = {}, options = {})
|
@@ -764,11 +764,6 @@ module Files
|
|
764
764
|
@attributes[:switch_to_plan_date]
|
765
765
|
end
|
766
766
|
|
767
|
-
# boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
768
|
-
def tls_disabled
|
769
|
-
@attributes[:tls_disabled]
|
770
|
-
end
|
771
|
-
|
772
767
|
# int64 - Number of days left in trial
|
773
768
|
def trial_days_left
|
774
769
|
@attributes[:trial_days_left]
|
@@ -925,7 +920,6 @@ module Files
|
|
925
920
|
# migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
|
926
921
|
# session_expiry - double - Session expiry in hours
|
927
922
|
# ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
928
|
-
# tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
929
923
|
# sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
930
924
|
# sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
931
925
|
# disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
data/lib/files.com/version.rb
CHANGED