files.com 1.1.35 → 1.1.37
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/as2_partner.md +8 -0
- data/docs/site.md +2 -2
- data/lib/files.com/models/as2_partner.rb +15 -0
- data/lib/files.com/models/site.rb +2 -2
- data/lib/files.com/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 41d35795768860fe1d590f1be18f2c3f326996b832a4e1a5f514f3952186e815
|
|
4
|
+
data.tar.gz: 4c6dfc3b110e69683a00a4b37f976dd5f5fdfdf52b11e6cb30c0cb702a2603be
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 3b0276c0ee2a443e689c0eb0d3900a985e5d3c47f3503ebcaa8af72dc30265b6793fe9e995319716ff981e1145f1df0b59bd91ddca4eae4c419ca041b7585248
|
|
7
|
+
data.tar.gz: b43fe18a0d2e007ae71cfe6df77b8e8d9fb3ca7364fc09a7f162ee712ed931aed348c5596c6dcd96b05e485338da9399b60c51450bd2cc794b83a6f096e7fcfb
|
data/_VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.1.
|
|
1
|
+
1.1.37
|
data/docs/as2_partner.md
CHANGED
|
@@ -9,6 +9,7 @@
|
|
|
9
9
|
"name": "AS2 Partner Name",
|
|
10
10
|
"uri": "example",
|
|
11
11
|
"server_certificate": "require_match",
|
|
12
|
+
"mdn_validation_level": "none",
|
|
12
13
|
"enable_dedicated_ips": true,
|
|
13
14
|
"hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
|
|
14
15
|
"public_certificate_md5": "example",
|
|
@@ -25,6 +26,7 @@
|
|
|
25
26
|
* `name` (string): The partner's formal AS2 name.
|
|
26
27
|
* `uri` (string): Public URI for sending AS2 message to.
|
|
27
28
|
* `server_certificate` (string): Remote server certificate security setting
|
|
29
|
+
* `mdn_validation_level` (string): MDN Validation Level
|
|
28
30
|
* `enable_dedicated_ips` (boolean): `true` if remote server only accepts connections from dedicated IPs
|
|
29
31
|
* `hex_public_certificate_serial` (string): Serial of public certificate used for message security in hex format.
|
|
30
32
|
* `public_certificate_md5` (string): MD5 hash of public certificate used for message security.
|
|
@@ -76,6 +78,7 @@ Files::As2Partner.create(
|
|
|
76
78
|
public_certificate: "public_certificate",
|
|
77
79
|
as2_station_id: 1,
|
|
78
80
|
server_certificate: "require_match",
|
|
81
|
+
mdn_validation_level: "none",
|
|
79
82
|
enable_dedicated_ips: true
|
|
80
83
|
)
|
|
81
84
|
```
|
|
@@ -87,6 +90,7 @@ Files::As2Partner.create(
|
|
|
87
90
|
* `public_certificate` (string): Required -
|
|
88
91
|
* `as2_station_id` (int64): Required - Id of As2Station for this partner
|
|
89
92
|
* `server_certificate` (string): Remote server certificate security setting
|
|
93
|
+
* `mdn_validation_level` (string): MDN Validation Level
|
|
90
94
|
* `enable_dedicated_ips` (boolean):
|
|
91
95
|
|
|
92
96
|
|
|
@@ -99,6 +103,7 @@ Files::As2Partner.update(id,
|
|
|
99
103
|
name: "AS2 Partner Name",
|
|
100
104
|
uri: "example",
|
|
101
105
|
server_certificate: "require_match",
|
|
106
|
+
mdn_validation_level: "none",
|
|
102
107
|
enable_dedicated_ips: true
|
|
103
108
|
)
|
|
104
109
|
```
|
|
@@ -109,6 +114,7 @@ Files::As2Partner.update(id,
|
|
|
109
114
|
* `name` (string): AS2 Name
|
|
110
115
|
* `uri` (string): URL base for AS2 responses
|
|
111
116
|
* `server_certificate` (string): Remote server certificate security setting
|
|
117
|
+
* `mdn_validation_level` (string): MDN Validation Level
|
|
112
118
|
* `public_certificate` (string):
|
|
113
119
|
* `enable_dedicated_ips` (boolean):
|
|
114
120
|
|
|
@@ -137,6 +143,7 @@ as2_partner.update(
|
|
|
137
143
|
name: "AS2 Partner Name",
|
|
138
144
|
uri: "example",
|
|
139
145
|
server_certificate: "require_match",
|
|
146
|
+
mdn_validation_level: "none",
|
|
140
147
|
enable_dedicated_ips: true
|
|
141
148
|
)
|
|
142
149
|
```
|
|
@@ -147,6 +154,7 @@ as2_partner.update(
|
|
|
147
154
|
* `name` (string): AS2 Name
|
|
148
155
|
* `uri` (string): URL base for AS2 responses
|
|
149
156
|
* `server_certificate` (string): Remote server certificate security setting
|
|
157
|
+
* `mdn_validation_level` (string): MDN Validation Level
|
|
150
158
|
* `public_certificate` (string):
|
|
151
159
|
* `enable_dedicated_ips` (boolean):
|
|
152
160
|
|
data/docs/site.md
CHANGED
|
@@ -388,7 +388,7 @@
|
|
|
388
388
|
* `sftp_enabled` (boolean): Is SFTP enabled?
|
|
389
389
|
* `sftp_host_key_type` (string): Sftp Host Key Type
|
|
390
390
|
* `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
|
|
391
|
-
* `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note:
|
|
391
|
+
* `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
|
392
392
|
* `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
|
|
393
393
|
* `sharing_enabled` (boolean): Allow bundle creation
|
|
394
394
|
* `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
|
|
@@ -627,7 +627,7 @@ Files::Site.update(
|
|
|
627
627
|
* `session_expiry` (double): Session expiry in hours
|
|
628
628
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
|
629
629
|
* `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
|
|
630
|
-
* `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note:
|
|
630
|
+
* `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
|
631
631
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
|
632
632
|
* `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
|
|
633
633
|
* `user_lockout_tries` (int64): Number of login tries within `user_lockout_within` hours before users are locked out
|
|
@@ -54,6 +54,15 @@ module Files
|
|
|
54
54
|
@attributes[:server_certificate] = value
|
|
55
55
|
end
|
|
56
56
|
|
|
57
|
+
# string - MDN Validation Level
|
|
58
|
+
def mdn_validation_level
|
|
59
|
+
@attributes[:mdn_validation_level]
|
|
60
|
+
end
|
|
61
|
+
|
|
62
|
+
def mdn_validation_level=(value)
|
|
63
|
+
@attributes[:mdn_validation_level] = value
|
|
64
|
+
end
|
|
65
|
+
|
|
57
66
|
# boolean - `true` if remote server only accepts connections from dedicated IPs
|
|
58
67
|
def enable_dedicated_ips
|
|
59
68
|
@attributes[:enable_dedicated_ips]
|
|
@@ -139,6 +148,7 @@ module Files
|
|
|
139
148
|
# name - string - AS2 Name
|
|
140
149
|
# uri - string - URL base for AS2 responses
|
|
141
150
|
# server_certificate - string - Remote server certificate security setting
|
|
151
|
+
# mdn_validation_level - string - MDN Validation Level
|
|
142
152
|
# public_certificate - string
|
|
143
153
|
# enable_dedicated_ips - boolean
|
|
144
154
|
def update(params = {})
|
|
@@ -149,6 +159,7 @@ module Files
|
|
|
149
159
|
raise InvalidParameterError.new("Bad parameter: name must be an String") if params[:name] and !params[:name].is_a?(String)
|
|
150
160
|
raise InvalidParameterError.new("Bad parameter: uri must be an String") if params[:uri] and !params[:uri].is_a?(String)
|
|
151
161
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
|
|
162
|
+
raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
|
|
152
163
|
raise InvalidParameterError.new("Bad parameter: public_certificate must be an String") if params[:public_certificate] and !params[:public_certificate].is_a?(String)
|
|
153
164
|
raise MissingParameterError.new("Parameter missing: id") unless params[:id]
|
|
154
165
|
|
|
@@ -219,6 +230,7 @@ module Files
|
|
|
219
230
|
# public_certificate (required) - string
|
|
220
231
|
# as2_station_id (required) - int64 - Id of As2Station for this partner
|
|
221
232
|
# server_certificate - string - Remote server certificate security setting
|
|
233
|
+
# mdn_validation_level - string - MDN Validation Level
|
|
222
234
|
# enable_dedicated_ips - boolean
|
|
223
235
|
def self.create(params = {}, options = {})
|
|
224
236
|
raise InvalidParameterError.new("Bad parameter: name must be an String") if params[:name] and !params[:name].is_a?(String)
|
|
@@ -226,6 +238,7 @@ module Files
|
|
|
226
238
|
raise InvalidParameterError.new("Bad parameter: public_certificate must be an String") if params[:public_certificate] and !params[:public_certificate].is_a?(String)
|
|
227
239
|
raise InvalidParameterError.new("Bad parameter: as2_station_id must be an Integer") if params[:as2_station_id] and !params[:as2_station_id].is_a?(Integer)
|
|
228
240
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
|
|
241
|
+
raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
|
|
229
242
|
raise MissingParameterError.new("Parameter missing: name") unless params[:name]
|
|
230
243
|
raise MissingParameterError.new("Parameter missing: uri") unless params[:uri]
|
|
231
244
|
raise MissingParameterError.new("Parameter missing: public_certificate") unless params[:public_certificate]
|
|
@@ -239,6 +252,7 @@ module Files
|
|
|
239
252
|
# name - string - AS2 Name
|
|
240
253
|
# uri - string - URL base for AS2 responses
|
|
241
254
|
# server_certificate - string - Remote server certificate security setting
|
|
255
|
+
# mdn_validation_level - string - MDN Validation Level
|
|
242
256
|
# public_certificate - string
|
|
243
257
|
# enable_dedicated_ips - boolean
|
|
244
258
|
def self.update(id, params = {}, options = {})
|
|
@@ -248,6 +262,7 @@ module Files
|
|
|
248
262
|
raise InvalidParameterError.new("Bad parameter: name must be an String") if params[:name] and !params[:name].is_a?(String)
|
|
249
263
|
raise InvalidParameterError.new("Bad parameter: uri must be an String") if params[:uri] and !params[:uri].is_a?(String)
|
|
250
264
|
raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params[:server_certificate] and !params[:server_certificate].is_a?(String)
|
|
265
|
+
raise InvalidParameterError.new("Bad parameter: mdn_validation_level must be an String") if params[:mdn_validation_level] and !params[:mdn_validation_level].is_a?(String)
|
|
251
266
|
raise InvalidParameterError.new("Bad parameter: public_certificate must be an String") if params[:public_certificate] and !params[:public_certificate].is_a?(String)
|
|
252
267
|
raise MissingParameterError.new("Parameter missing: id") unless params[:id]
|
|
253
268
|
|
|
@@ -599,7 +599,7 @@ module Files
|
|
|
599
599
|
@attributes[:active_sftp_host_key_id]
|
|
600
600
|
end
|
|
601
601
|
|
|
602
|
-
# boolean - Are Insecure Ciphers allowed for SFTP? Note:
|
|
602
|
+
# boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
|
603
603
|
def sftp_insecure_ciphers
|
|
604
604
|
@attributes[:sftp_insecure_ciphers]
|
|
605
605
|
end
|
|
@@ -821,7 +821,7 @@ module Files
|
|
|
821
821
|
# session_expiry - double - Session expiry in hours
|
|
822
822
|
# ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
|
823
823
|
# tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
|
|
824
|
-
# sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note:
|
|
824
|
+
# sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
|
825
825
|
# disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
|
826
826
|
# user_lockout - boolean - Will users be locked out after incorrect login attempts?
|
|
827
827
|
# user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
|
data/lib/files.com/version.rb
CHANGED
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: files.com
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.1.
|
|
4
|
+
version: 1.1.37
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- files.com
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2024-04-
|
|
11
|
+
date: 2024-04-13 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: addressable
|