files.com 1.1.49 → 1.1.51

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 62ffe766397a8a89cc19a752a643c1c441a3fb701ab6b51866fdf2fb2a165ca4
4
- data.tar.gz: eca84037c412e2e99723b2138cac95553311b81d52ff9dc2b3ebbc7dfea03a7b
3
+ metadata.gz: c8bd9cc3feb73431ee538e9295167cdebb8ce110bf18ee89ef2c8b163efb881b
4
+ data.tar.gz: 858411d5c41eebb73365462ca7c4816a20a586b1270b75391fce1c7d692bd12e
5
5
  SHA512:
6
- metadata.gz: f56e2155cc61b60d2e18108b14b239436246cb7309c53d86340782597c9ad9f86f54f86d2bece6106ec6f6781b785c4c5b020c54b2fa03d2ffeefe41674a165a
7
- data.tar.gz: 28595ea44b467bfc32ca25d0a4dc2d51040573da41823e1285dd819e05d26c3e9375f204556c4d5dcb4f307761d2c518ca194ce3b2c54e72a4ab828a82534d42
6
+ metadata.gz: 9775894e1107eba82c28bda7d817ce175550dfcdfe0d085b9692a39e182485eb583798cb120918da878ad06eb10eb8f0ed21b75d338932a17bd69a4dad0e1018
7
+ data.tar.gz: 958e5c54dbdf03f378c37f88a3c99a171c954872ed54233f4a93d74e43de3881a4010c7fb4ca8003eacf4ca361303e160e2995a231fa58ff17fdbbfdee909a48
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.1.49
1
+ 1.1.51
data/docs/site.md CHANGED
@@ -169,6 +169,7 @@
169
169
  "sftp_host_key_type": "default",
170
170
  "active_sftp_host_key_id": 1,
171
171
  "sftp_insecure_ciphers": true,
172
+ "sftp_insecure_diffie_hellman": true,
172
173
  "sftp_user_root_enabled": true,
173
174
  "sharing_enabled": true,
174
175
  "show_request_access_link": true,
@@ -391,7 +392,8 @@
391
392
  * `sftp_enabled` (boolean): Is SFTP enabled?
392
393
  * `sftp_host_key_type` (string): Sftp Host Key Type
393
394
  * `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
394
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
395
+ * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
396
+ * `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
395
397
  * `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
396
398
  * `sharing_enabled` (boolean): Allow bundle creation
397
399
  * `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
@@ -407,7 +409,7 @@
407
409
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
408
410
  * `subdomain` (string): Site subdomain
409
411
  * `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
410
- * `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
412
+ * `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
411
413
  * `trial_days_left` (int64): Number of days left in trial
412
414
  * `trial_until` (date-time): When does this Site trial expire?
413
415
  * `use_provided_modified_at` (boolean): Allow uploaders to set `provided_modified_at` for uploaded files?
@@ -490,6 +492,7 @@ Files::Site.update(
490
492
  ssl_required: true,
491
493
  tls_disabled: true,
492
494
  sftp_insecure_ciphers: true,
495
+ sftp_insecure_diffie_hellman: true,
493
496
  disable_files_certificate_generation: true,
494
497
  user_lockout: true,
495
498
  user_lockout_tries: 1,
@@ -633,8 +636,9 @@ Files::Site.update(
633
636
  * `left_navigation_visibility` (object): Visibility settings for account navigation
634
637
  * `session_expiry` (double): Session expiry in hours
635
638
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
636
- * `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
637
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
639
+ * `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
640
+ * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
641
+ * `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
638
642
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
639
643
  * `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
640
644
  * `user_lockout_tries` (int64): Number of login tries within `user_lockout_within` hours before users are locked out
data/docs/snapshot.md CHANGED
@@ -69,6 +69,19 @@ Files::Snapshot.create(
69
69
  * `paths` (array(string)): An array of paths to add to the snapshot.
70
70
 
71
71
 
72
+ ---
73
+
74
+ ## Finalize Snapshot
75
+
76
+ ```
77
+ Files::Snapshot.finalize(id)
78
+ ```
79
+
80
+ ### Parameters
81
+
82
+ * `id` (int64): Required - Snapshot ID.
83
+
84
+
72
85
  ---
73
86
 
74
87
  ## Update Snapshot
@@ -101,6 +114,21 @@ Files::Snapshot.delete(id)
101
114
  * `id` (int64): Required - Snapshot ID.
102
115
 
103
116
 
117
+ ---
118
+
119
+ ## Finalize Snapshot
120
+
121
+ ```
122
+ snapshot = Files::Snapshot.list.first
123
+
124
+ snapshot.finalize
125
+ ```
126
+
127
+ ### Parameters
128
+
129
+ * `id` (int64): Required - Snapshot ID.
130
+
131
+
104
132
  ---
105
133
 
106
134
  ## Update Snapshot
@@ -156,6 +156,7 @@ module Files
156
156
  class UserNotFoundError < NotFoundError; end
157
157
 
158
158
  class ProcessingFailureError < APIError; end
159
+ class AlreadyCompletedError < ProcessingFailureError; end
159
160
  class AutomationCannotBeRunManuallyError < ProcessingFailureError; end
160
161
  class BundleOnlyAllowsPreviewsError < ProcessingFailureError; end
161
162
  class BundleOperationRequiresSubfolderError < ProcessingFailureError; end
@@ -599,11 +599,16 @@ module Files
599
599
  @attributes[:active_sftp_host_key_id]
600
600
  end
601
601
 
602
- # boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
602
+ # boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
603
603
  def sftp_insecure_ciphers
604
604
  @attributes[:sftp_insecure_ciphers]
605
605
  end
606
606
 
607
+ # boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
608
+ def sftp_insecure_diffie_hellman
609
+ @attributes[:sftp_insecure_diffie_hellman]
610
+ end
611
+
607
612
  # boolean - Use user FTP roots also for SFTP?
608
613
  def sftp_user_root_enabled
609
614
  @attributes[:sftp_user_root_enabled]
@@ -679,7 +684,7 @@ module Files
679
684
  @attributes[:switch_to_plan_date]
680
685
  end
681
686
 
682
- # boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
687
+ # boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
683
688
  def tls_disabled
684
689
  @attributes[:tls_disabled]
685
690
  end
@@ -830,8 +835,9 @@ module Files
830
835
  # left_navigation_visibility - object - Visibility settings for account navigation
831
836
  # session_expiry - double - Session expiry in hours
832
837
  # ssl_required - boolean - Is SSL required? Disabling this is insecure.
833
- # tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
834
- # sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
838
+ # tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
839
+ # sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
840
+ # sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
835
841
  # disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
836
842
  # user_lockout - boolean - Will users be locked out after incorrect login attempts?
837
843
  # user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
@@ -72,6 +72,17 @@ module Files
72
72
  @attributes[:paths] = value
73
73
  end
74
74
 
75
+ # Finalize Snapshot
76
+ def finalize(params = {})
77
+ params ||= {}
78
+ params[:id] = @attributes[:id]
79
+ raise MissingParameterError.new("Current object doesn't have a id") unless @attributes[:id]
80
+ raise InvalidParameterError.new("Bad parameter: id must be an Integer") if params[:id] and !params[:id].is_a?(Integer)
81
+ raise MissingParameterError.new("Parameter missing: id") unless params[:id]
82
+
83
+ Api.send_request("/snapshots/#{@attributes[:id]}/finalize", :post, params, @options)
84
+ end
85
+
75
86
  # Parameters:
76
87
  # expires_at - string - When the snapshot expires.
77
88
  # name - string - A name for the snapshot.
@@ -160,6 +171,17 @@ module Files
160
171
  Snapshot.new(response.data, options)
161
172
  end
162
173
 
174
+ # Finalize Snapshot
175
+ def self.finalize(id, params = {}, options = {})
176
+ params ||= {}
177
+ params[:id] = id
178
+ raise InvalidParameterError.new("Bad parameter: id must be an Integer") if params[:id] and !params[:id].is_a?(Integer)
179
+ raise MissingParameterError.new("Parameter missing: id") unless params[:id]
180
+
181
+ Api.send_request("/snapshots/#{params[:id]}/finalize", :post, params, options)
182
+ nil
183
+ end
184
+
163
185
  # Parameters:
164
186
  # expires_at - string - When the snapshot expires.
165
187
  # name - string - A name for the snapshot.
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Files
4
- VERSION = "1.1.49"
4
+ VERSION = "1.1.51"
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.49
4
+ version: 1.1.51
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-04-22 00:00:00.000000000 Z
11
+ date: 2024-04-23 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable