files.com 1.1.35 → 1.1.37

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 9a31a916150c9211fe59fc4322ebad2012722d3efff38b60ef3a9a80211b6536
4
- data.tar.gz: a1e69cbb9e21ce9acb30681033b331a7b9f8ff74f80e12f605df2b46c326251a
3
+ metadata.gz: 41d35795768860fe1d590f1be18f2c3f326996b832a4e1a5f514f3952186e815
4
+ data.tar.gz: 4c6dfc3b110e69683a00a4b37f976dd5f5fdfdf52b11e6cb30c0cb702a2603be
5
5
  SHA512:
6
- metadata.gz: 79cc896408411492f66898c2f40d428466588331502adaffa050993df41b40322182d8613556fe3c9ca57893a93a6c64a804d2bd5fce8542c609f3952b8735d2
7
- data.tar.gz: a1d5832ce30a7aeaad325c3882499cabed46a10954835e4a9afa4aa58125d4721e334c88bbf9d492af50a0bf5b7990fed677ff2a84592c4127bb6bedcd7299ee
6
+ metadata.gz: 3b0276c0ee2a443e689c0eb0d3900a985e5d3c47f3503ebcaa8af72dc30265b6793fe9e995319716ff981e1145f1df0b59bd91ddca4eae4c419ca041b7585248
7
+ data.tar.gz: b43fe18a0d2e007ae71cfe6df77b8e8d9fb3ca7364fc09a7f162ee712ed931aed348c5596c6dcd96b05e485338da9399b60c51450bd2cc794b83a6f096e7fcfb
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.1.35
1
+ 1.1.37
data/docs/as2_partner.md CHANGED
@@ -9,6 +9,7 @@
9
9
  "name": "AS2 Partner Name",
10
10
  "uri": "example",
11
11
  "server_certificate": "require_match",
12
+ "mdn_validation_level": "none",
12
13
  "enable_dedicated_ips": true,
13
14
  "hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
14
15
  "public_certificate_md5": "example",
@@ -25,6 +26,7 @@
25
26
  * `name` (string): The partner's formal AS2 name.
26
27
  * `uri` (string): Public URI for sending AS2 message to.
27
28
  * `server_certificate` (string): Remote server certificate security setting
29
+ * `mdn_validation_level` (string): MDN Validation Level
28
30
  * `enable_dedicated_ips` (boolean): `true` if remote server only accepts connections from dedicated IPs
29
31
  * `hex_public_certificate_serial` (string): Serial of public certificate used for message security in hex format.
30
32
  * `public_certificate_md5` (string): MD5 hash of public certificate used for message security.
@@ -76,6 +78,7 @@ Files::As2Partner.create(
76
78
  public_certificate: "public_certificate",
77
79
  as2_station_id: 1,
78
80
  server_certificate: "require_match",
81
+ mdn_validation_level: "none",
79
82
  enable_dedicated_ips: true
80
83
  )
81
84
  ```
@@ -87,6 +90,7 @@ Files::As2Partner.create(
87
90
  * `public_certificate` (string): Required -
88
91
  * `as2_station_id` (int64): Required - Id of As2Station for this partner
89
92
  * `server_certificate` (string): Remote server certificate security setting
93
+ * `mdn_validation_level` (string): MDN Validation Level
90
94
  * `enable_dedicated_ips` (boolean):
91
95
 
92
96
 
@@ -99,6 +103,7 @@ Files::As2Partner.update(id,
99
103
  name: "AS2 Partner Name",
100
104
  uri: "example",
101
105
  server_certificate: "require_match",
106
+ mdn_validation_level: "none",
102
107
  enable_dedicated_ips: true
103
108
  )
104
109
  ```
@@ -109,6 +114,7 @@ Files::As2Partner.update(id,
109
114
  * `name` (string): AS2 Name
110
115
  * `uri` (string): URL base for AS2 responses
111
116
  * `server_certificate` (string): Remote server certificate security setting
117
+ * `mdn_validation_level` (string): MDN Validation Level
112
118
  * `public_certificate` (string):
113
119
  * `enable_dedicated_ips` (boolean):
114
120
 
@@ -137,6 +143,7 @@ as2_partner.update(
137
143
  name: "AS2 Partner Name",
138
144
  uri: "example",
139
145
  server_certificate: "require_match",
146
+ mdn_validation_level: "none",
140
147
  enable_dedicated_ips: true
141
148
  )
142
149
  ```
@@ -147,6 +154,7 @@ as2_partner.update(
147
154
  * `name` (string): AS2 Name
148
155
  * `uri` (string): URL base for AS2 responses
149
156
  * `server_certificate` (string): Remote server certificate security setting
157
+ * `mdn_validation_level` (string): MDN Validation Level
150
158
  * `public_certificate` (string):
151
159
  * `enable_dedicated_ips` (boolean):
152
160
 
data/docs/site.md CHANGED
@@ -388,7 +388,7 @@
388
388
  * `sftp_enabled` (boolean): Is SFTP enabled?
389
389
  * `sftp_host_key_type` (string): Sftp Host Key Type
390
390
  * `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
391
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
391
+ * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
392
392
  * `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
393
393
  * `sharing_enabled` (boolean): Allow bundle creation
394
394
  * `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
@@ -627,7 +627,7 @@ Files::Site.update(
627
627
  * `session_expiry` (double): Session expiry in hours
628
628
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
629
629
  * `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
630
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
630
+ * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
631
631
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
632
632
  * `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
633
633
  * `user_lockout_tries` (int64): Number of login tries within `user_lockout_within` hours before users are locked out
@@ -54,6 +54,15 @@ module Files
54
54
  @attributes[:server_certificate] = value
55
55
  end
56
56
 
57
+ # string - MDN Validation Level
58
+ def mdn_validation_level
59
+ @attributes[:mdn_validation_level]
60
+ end
61
+
62
+ def mdn_validation_level=(value)
63
+ @attributes[:mdn_validation_level] = value
64
+ end
65
+
57
66
  # boolean - `true` if remote server only accepts connections from dedicated IPs
58
67
  def enable_dedicated_ips
59
68
  @attributes[:enable_dedicated_ips]
@@ -139,6 +148,7 @@ module Files
139
148
  # name - string - AS2 Name
140
149
  # uri - string - URL base for AS2 responses
141
150
  # server_certificate - string - Remote server certificate security setting
151
+ # mdn_validation_level - string - MDN Validation Level
142
152
  # public_certificate - string
143
153
  # enable_dedicated_ips - boolean
144
154
  def update(params = {})
@@ -149,6 +159,7 @@ module Files
149
159
  raise InvalidParameterError.new("Bad parameter: name must be an String") if params[:name] and !params[:name].is_a?(String)
150
160
  raise InvalidParameterError.new("Bad parameter: uri must be an String") if params[:uri] and !params[:uri].is_a?(String)
151
161
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
162
+ raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
152
163
  raise InvalidParameterError.new("Bad parameter: public_certificate must be an String") if params[:public_certificate] and !params[:public_certificate].is_a?(String)
153
164
  raise MissingParameterError.new("Parameter missing: id") unless params[:id]
154
165
 
@@ -219,6 +230,7 @@ module Files
219
230
  # public_certificate (required) - string
220
231
  # as2_station_id (required) - int64 - Id of As2Station for this partner
221
232
  # server_certificate - string - Remote server certificate security setting
233
+ # mdn_validation_level - string - MDN Validation Level
222
234
  # enable_dedicated_ips - boolean
223
235
  def self.create(params = {}, options = {})
224
236
  raise InvalidParameterError.new("Bad parameter: name must be an String") if params[:name] and !params[:name].is_a?(String)
@@ -226,6 +238,7 @@ module Files
226
238
  raise InvalidParameterError.new("Bad parameter: public_certificate must be an String") if params[:public_certificate] and !params[:public_certificate].is_a?(String)
227
239
  raise InvalidParameterError.new("Bad parameter: as2_station_id must be an Integer") if params[:as2_station_id] and !params[:as2_station_id].is_a?(Integer)
228
240
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
241
+ raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
229
242
  raise MissingParameterError.new("Parameter missing: name") unless params[:name]
230
243
  raise MissingParameterError.new("Parameter missing: uri") unless params[:uri]
231
244
  raise MissingParameterError.new("Parameter missing: public_certificate") unless params[:public_certificate]
@@ -239,6 +252,7 @@ module Files
239
252
  # name - string - AS2 Name
240
253
  # uri - string - URL base for AS2 responses
241
254
  # server_certificate - string - Remote server certificate security setting
255
+ # mdn_validation_level - string - MDN Validation Level
242
256
  # public_certificate - string
243
257
  # enable_dedicated_ips - boolean
244
258
  def self.update(id, params = {}, options = {})
@@ -248,6 +262,7 @@ module Files
248
262
  raise InvalidParameterError.new("Bad parameter: name must be an String") if params[:name] and !params[:name].is_a?(String)
249
263
  raise InvalidParameterError.new("Bad parameter: uri must be an String") if params[:uri] and !params[:uri].is_a?(String)
250
264
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
265
+ raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
251
266
  raise InvalidParameterError.new("Bad parameter: public_certificate must be an String") if params[:public_certificate] and !params[:public_certificate].is_a?(String)
252
267
  raise MissingParameterError.new("Parameter missing: id") unless params[:id]
253
268
 
@@ -599,7 +599,7 @@ module Files
599
599
  @attributes[:active_sftp_host_key_id]
600
600
  end
601
601
 
602
- # boolean - Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
602
+ # boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
603
603
  def sftp_insecure_ciphers
604
604
  @attributes[:sftp_insecure_ciphers]
605
605
  end
@@ -821,7 +821,7 @@ module Files
821
821
  # session_expiry - double - Session expiry in hours
822
822
  # ssl_required - boolean - Is SSL required? Disabling this is insecure.
823
823
  # tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
824
- # sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
824
+ # sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
825
825
  # disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
826
826
  # user_lockout - boolean - Will users be locked out after incorrect login attempts?
827
827
  # user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Files
4
- VERSION = "1.1.35"
4
+ VERSION = "1.1.37"
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.35
4
+ version: 1.1.37
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-04-12 00:00:00.000000000 Z
11
+ date: 2024-04-13 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable