files.com 1.1.49 → 1.1.51
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/site.md +8 -4
- data/docs/snapshot.md +28 -0
- data/lib/files.com/errors.rb +1 -0
- data/lib/files.com/models/site.rb +10 -4
- data/lib/files.com/models/snapshot.rb +22 -0
- data/lib/files.com/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c8bd9cc3feb73431ee538e9295167cdebb8ce110bf18ee89ef2c8b163efb881b
|
4
|
+
data.tar.gz: 858411d5c41eebb73365462ca7c4816a20a586b1270b75391fce1c7d692bd12e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 9775894e1107eba82c28bda7d817ce175550dfcdfe0d085b9692a39e182485eb583798cb120918da878ad06eb10eb8f0ed21b75d338932a17bd69a4dad0e1018
|
7
|
+
data.tar.gz: 958e5c54dbdf03f378c37f88a3c99a171c954872ed54233f4a93d74e43de3881a4010c7fb4ca8003eacf4ca361303e160e2995a231fa58ff17fdbbfdee909a48
|
data/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.1.
|
1
|
+
1.1.51
|
data/docs/site.md
CHANGED
@@ -169,6 +169,7 @@
|
|
169
169
|
"sftp_host_key_type": "default",
|
170
170
|
"active_sftp_host_key_id": 1,
|
171
171
|
"sftp_insecure_ciphers": true,
|
172
|
+
"sftp_insecure_diffie_hellman": true,
|
172
173
|
"sftp_user_root_enabled": true,
|
173
174
|
"sharing_enabled": true,
|
174
175
|
"show_request_access_link": true,
|
@@ -391,7 +392,8 @@
|
|
391
392
|
* `sftp_enabled` (boolean): Is SFTP enabled?
|
392
393
|
* `sftp_host_key_type` (string): Sftp Host Key Type
|
393
394
|
* `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
|
394
|
-
* `sftp_insecure_ciphers` (boolean):
|
395
|
+
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
396
|
+
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
395
397
|
* `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
|
396
398
|
* `sharing_enabled` (boolean): Allow bundle creation
|
397
399
|
* `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
|
@@ -407,7 +409,7 @@
|
|
407
409
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
408
410
|
* `subdomain` (string): Site subdomain
|
409
411
|
* `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
|
410
|
-
* `tls_disabled` (boolean):
|
412
|
+
* `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
411
413
|
* `trial_days_left` (int64): Number of days left in trial
|
412
414
|
* `trial_until` (date-time): When does this Site trial expire?
|
413
415
|
* `use_provided_modified_at` (boolean): Allow uploaders to set `provided_modified_at` for uploaded files?
|
@@ -490,6 +492,7 @@ Files::Site.update(
|
|
490
492
|
ssl_required: true,
|
491
493
|
tls_disabled: true,
|
492
494
|
sftp_insecure_ciphers: true,
|
495
|
+
sftp_insecure_diffie_hellman: true,
|
493
496
|
disable_files_certificate_generation: true,
|
494
497
|
user_lockout: true,
|
495
498
|
user_lockout_tries: 1,
|
@@ -633,8 +636,9 @@ Files::Site.update(
|
|
633
636
|
* `left_navigation_visibility` (object): Visibility settings for account navigation
|
634
637
|
* `session_expiry` (double): Session expiry in hours
|
635
638
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
636
|
-
* `tls_disabled` (boolean):
|
637
|
-
* `sftp_insecure_ciphers` (boolean):
|
639
|
+
* `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
640
|
+
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
641
|
+
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
638
642
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
639
643
|
* `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
|
640
644
|
* `user_lockout_tries` (int64): Number of login tries within `user_lockout_within` hours before users are locked out
|
data/docs/snapshot.md
CHANGED
@@ -69,6 +69,19 @@ Files::Snapshot.create(
|
|
69
69
|
* `paths` (array(string)): An array of paths to add to the snapshot.
|
70
70
|
|
71
71
|
|
72
|
+
---
|
73
|
+
|
74
|
+
## Finalize Snapshot
|
75
|
+
|
76
|
+
```
|
77
|
+
Files::Snapshot.finalize(id)
|
78
|
+
```
|
79
|
+
|
80
|
+
### Parameters
|
81
|
+
|
82
|
+
* `id` (int64): Required - Snapshot ID.
|
83
|
+
|
84
|
+
|
72
85
|
---
|
73
86
|
|
74
87
|
## Update Snapshot
|
@@ -101,6 +114,21 @@ Files::Snapshot.delete(id)
|
|
101
114
|
* `id` (int64): Required - Snapshot ID.
|
102
115
|
|
103
116
|
|
117
|
+
---
|
118
|
+
|
119
|
+
## Finalize Snapshot
|
120
|
+
|
121
|
+
```
|
122
|
+
snapshot = Files::Snapshot.list.first
|
123
|
+
|
124
|
+
snapshot.finalize
|
125
|
+
```
|
126
|
+
|
127
|
+
### Parameters
|
128
|
+
|
129
|
+
* `id` (int64): Required - Snapshot ID.
|
130
|
+
|
131
|
+
|
104
132
|
---
|
105
133
|
|
106
134
|
## Update Snapshot
|
data/lib/files.com/errors.rb
CHANGED
@@ -156,6 +156,7 @@ module Files
|
|
156
156
|
class UserNotFoundError < NotFoundError; end
|
157
157
|
|
158
158
|
class ProcessingFailureError < APIError; end
|
159
|
+
class AlreadyCompletedError < ProcessingFailureError; end
|
159
160
|
class AutomationCannotBeRunManuallyError < ProcessingFailureError; end
|
160
161
|
class BundleOnlyAllowsPreviewsError < ProcessingFailureError; end
|
161
162
|
class BundleOperationRequiresSubfolderError < ProcessingFailureError; end
|
@@ -599,11 +599,16 @@ module Files
|
|
599
599
|
@attributes[:active_sftp_host_key_id]
|
600
600
|
end
|
601
601
|
|
602
|
-
# boolean -
|
602
|
+
# boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
603
603
|
def sftp_insecure_ciphers
|
604
604
|
@attributes[:sftp_insecure_ciphers]
|
605
605
|
end
|
606
606
|
|
607
|
+
# boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
608
|
+
def sftp_insecure_diffie_hellman
|
609
|
+
@attributes[:sftp_insecure_diffie_hellman]
|
610
|
+
end
|
611
|
+
|
607
612
|
# boolean - Use user FTP roots also for SFTP?
|
608
613
|
def sftp_user_root_enabled
|
609
614
|
@attributes[:sftp_user_root_enabled]
|
@@ -679,7 +684,7 @@ module Files
|
|
679
684
|
@attributes[:switch_to_plan_date]
|
680
685
|
end
|
681
686
|
|
682
|
-
# boolean -
|
687
|
+
# boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
683
688
|
def tls_disabled
|
684
689
|
@attributes[:tls_disabled]
|
685
690
|
end
|
@@ -830,8 +835,9 @@ module Files
|
|
830
835
|
# left_navigation_visibility - object - Visibility settings for account navigation
|
831
836
|
# session_expiry - double - Session expiry in hours
|
832
837
|
# ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
833
|
-
# tls_disabled - boolean -
|
834
|
-
# sftp_insecure_ciphers - boolean -
|
838
|
+
# tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
839
|
+
# sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
840
|
+
# sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
835
841
|
# disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
836
842
|
# user_lockout - boolean - Will users be locked out after incorrect login attempts?
|
837
843
|
# user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
|
@@ -72,6 +72,17 @@ module Files
|
|
72
72
|
@attributes[:paths] = value
|
73
73
|
end
|
74
74
|
|
75
|
+
# Finalize Snapshot
|
76
|
+
def finalize(params = {})
|
77
|
+
params ||= {}
|
78
|
+
params[:id] = @attributes[:id]
|
79
|
+
raise MissingParameterError.new("Current object doesn't have a id") unless @attributes[:id]
|
80
|
+
raise InvalidParameterError.new("Bad parameter: id must be an Integer") if params[:id] and !params[:id].is_a?(Integer)
|
81
|
+
raise MissingParameterError.new("Parameter missing: id") unless params[:id]
|
82
|
+
|
83
|
+
Api.send_request("/snapshots/#{@attributes[:id]}/finalize", :post, params, @options)
|
84
|
+
end
|
85
|
+
|
75
86
|
# Parameters:
|
76
87
|
# expires_at - string - When the snapshot expires.
|
77
88
|
# name - string - A name for the snapshot.
|
@@ -160,6 +171,17 @@ module Files
|
|
160
171
|
Snapshot.new(response.data, options)
|
161
172
|
end
|
162
173
|
|
174
|
+
# Finalize Snapshot
|
175
|
+
def self.finalize(id, params = {}, options = {})
|
176
|
+
params ||= {}
|
177
|
+
params[:id] = id
|
178
|
+
raise InvalidParameterError.new("Bad parameter: id must be an Integer") if params[:id] and !params[:id].is_a?(Integer)
|
179
|
+
raise MissingParameterError.new("Parameter missing: id") unless params[:id]
|
180
|
+
|
181
|
+
Api.send_request("/snapshots/#{params[:id]}/finalize", :post, params, options)
|
182
|
+
nil
|
183
|
+
end
|
184
|
+
|
163
185
|
# Parameters:
|
164
186
|
# expires_at - string - When the snapshot expires.
|
165
187
|
# name - string - A name for the snapshot.
|
data/lib/files.com/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: files.com
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.1.
|
4
|
+
version: 1.1.51
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- files.com
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-04-
|
11
|
+
date: 2024-04-23 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: addressable
|