files.com 1.1.607 → 1.1.609

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c750e089a2513efc74c8b5e5becf64083f89e985ac31a75449f25252ca82c642
4
- data.tar.gz: d13e2abe226fa3bd2f857fdf659d03fd618614c84c053bea951513e70ecc5c83
3
+ metadata.gz: 0141b45b7feb4472e1f7b7452ec2f6db80187cbc7682e200f2f51ea1eb07f597
4
+ data.tar.gz: 83705f870364c1b6a06ca1ac7c944a25f340d196c9c2c286b3ab24b0f89a360f
5
5
  SHA512:
6
- metadata.gz: 2727026e2c04db76f3c06760e919bfe28e910021125c94961dab36ee40b05276e09b40f225ba2d0daf1800b5efe3293db10908a8fd1ef565324490f99ddd2005
7
- data.tar.gz: 62f8ec0f44df4c05f971299083961d2fb3c653653b40fa107a9b28878e40d4eacdc164d007db534232f171ac00d7868ed4de67fa1d19ef989e45641b3177701b
6
+ metadata.gz: 5911fe0749e5015fbba0365a1c6d1bf9d19f6c483941c6e9d2b4d6ed630d4f76c85fa05cae286dfeda0ec9cb4f7416ba4da29759bb3d1a98aa5f7915302d1289
7
+ data.tar.gz: 522f663240d45389edfa63015967a9e562ce684c48f165e2dd18c1e9ab0f516421d1bfc126634fba62373d7b6172f96ad51a83c3345aa9c8b31c46c29aef2ca9
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.1.607
1
+ 1.1.609
data/docs/group.md CHANGED
@@ -15,6 +15,7 @@
15
15
  "sftp_permission": true,
16
16
  "dav_permission": true,
17
17
  "restapi_permission": true,
18
+ "desktop_configuration_profile_id": 1,
18
19
  "site_id": 1,
19
20
  "workspace_id": 1
20
21
  }
@@ -31,6 +32,7 @@
31
32
  * `sftp_permission` (boolean): If true, users in this group can use SFTP to login. This will override a false value of `sftp_permission` on the user level.
32
33
  * `dav_permission` (boolean): If true, users in this group can use WebDAV to login. This will override a false value of `dav_permission` on the user level.
33
34
  * `restapi_permission` (boolean): If true, users in this group can use the REST API to login. This will override a false value of `restapi_permission` on the user level.
35
+ * `desktop_configuration_profile_id` (int64): Desktop Configuration Profile ID assigned to this Group, if any. Users in the Group inherit it unless a direct per-user assignment overrides it.
34
36
  * `site_id` (int64): Site ID
35
37
  * `workspace_id` (int64): Workspace ID
36
38
 
@@ -82,6 +84,7 @@ Files::Group.create(
82
84
  sftp_permission: true,
83
85
  dav_permission: true,
84
86
  restapi_permission: true,
87
+ desktop_configuration_profile_id: 1,
85
88
  allowed_ips: "10.0.0.0/8\n127.0.0.1",
86
89
  name: "name",
87
90
  workspace_id: 0
@@ -97,6 +100,7 @@ Files::Group.create(
97
100
  * `sftp_permission` (boolean): If true, users in this group can use SFTP to login. This will override a false value of `sftp_permission` on the user level.
98
101
  * `dav_permission` (boolean): If true, users in this group can use WebDAV to login. This will override a false value of `dav_permission` on the user level.
99
102
  * `restapi_permission` (boolean): If true, users in this group can use the REST API to login. This will override a false value of `restapi_permission` on the user level.
103
+ * `desktop_configuration_profile_id` (int64): Desktop Configuration Profile ID assigned to this Group, if any. Users in the Group inherit it unless a direct per-user assignment overrides it.
100
104
  * `allowed_ips` (string): A list of allowed IPs if applicable. Newline delimited
101
105
  * `name` (string): Required - Group name.
102
106
  * `workspace_id` (int64): Workspace ID
@@ -115,6 +119,7 @@ Files::Group.update(id,
115
119
  sftp_permission: true,
116
120
  dav_permission: true,
117
121
  restapi_permission: true,
122
+ desktop_configuration_profile_id: 1,
118
123
  allowed_ips: "10.0.0.0/8\n127.0.0.1",
119
124
  name: "owners"
120
125
  )
@@ -130,6 +135,7 @@ Files::Group.update(id,
130
135
  * `sftp_permission` (boolean): If true, users in this group can use SFTP to login. This will override a false value of `sftp_permission` on the user level.
131
136
  * `dav_permission` (boolean): If true, users in this group can use WebDAV to login. This will override a false value of `dav_permission` on the user level.
132
137
  * `restapi_permission` (boolean): If true, users in this group can use the REST API to login. This will override a false value of `restapi_permission` on the user level.
138
+ * `desktop_configuration_profile_id` (int64): Desktop Configuration Profile ID assigned to this Group, if any. Users in the Group inherit it unless a direct per-user assignment overrides it.
133
139
  * `allowed_ips` (string): A list of allowed IPs if applicable. Newline delimited
134
140
  * `name` (string): Group name.
135
141
 
@@ -162,6 +168,7 @@ group.update(
162
168
  sftp_permission: true,
163
169
  dav_permission: true,
164
170
  restapi_permission: true,
171
+ desktop_configuration_profile_id: 1,
165
172
  allowed_ips: "10.0.0.0/8\n127.0.0.1",
166
173
  name: "owners"
167
174
  )
@@ -177,6 +184,7 @@ group.update(
177
184
  * `sftp_permission` (boolean): If true, users in this group can use SFTP to login. This will override a false value of `sftp_permission` on the user level.
178
185
  * `dav_permission` (boolean): If true, users in this group can use WebDAV to login. This will override a false value of `dav_permission` on the user level.
179
186
  * `restapi_permission` (boolean): If true, users in this group can use the REST API to login. This will override a false value of `restapi_permission` on the user level.
187
+ * `desktop_configuration_profile_id` (int64): Desktop Configuration Profile ID assigned to this Group, if any. Users in the Group inherit it unless a direct per-user assignment overrides it.
180
188
  * `allowed_ips` (string): A list of allowed IPs if applicable. Newline delimited
181
189
  * `name` (string): Group name.
182
190
 
@@ -52,6 +52,7 @@
52
52
  "s3_compatible_bucket": "my-bucket",
53
53
  "s3_compatible_endpoint": "mys3platform.com",
54
54
  "s3_compatible_region": "us-east-1",
55
+ "s3_compatible_virtual_hosted_style": true,
55
56
  "s3_compatible_access_key": "example",
56
57
  "enable_dedicated_ips": true,
57
58
  "files_agent_permission_set": "read_write",
@@ -123,6 +124,7 @@
123
124
  * `s3_compatible_bucket` (string): S3-compatible: Bucket name
124
125
  * `s3_compatible_endpoint` (string): S3-compatible: endpoint
125
126
  * `s3_compatible_region` (string): S3-compatible: region
127
+ * `s3_compatible_virtual_hosted_style` (boolean): S3-compatible: If true, use virtual-hosted-style URLs instead of path-style URLs
126
128
  * `s3_compatible_access_key` (string): S3-compatible: Access Key
127
129
  * `enable_dedicated_ips` (boolean): `true` if remote server only accepts connections from dedicated IPs
128
130
  * `files_agent_permission_set` (string): Local permissions for files agent. read_only, write_only, or read_write
@@ -259,6 +261,7 @@ Files::RemoteServer.create(
259
261
  s3_compatible_bucket: "my-bucket",
260
262
  s3_compatible_endpoint: "mys3platform.com",
261
263
  s3_compatible_region: "us-east-1",
264
+ s3_compatible_virtual_hosted_style: true,
262
265
  s3_region: "us-east-1",
263
266
  server_certificate: "require_match",
264
267
  server_host_key: "[public key]",
@@ -338,6 +341,7 @@ Files::RemoteServer.create(
338
341
  * `s3_compatible_bucket` (string): S3-compatible: Bucket name
339
342
  * `s3_compatible_endpoint` (string): S3-compatible: endpoint
340
343
  * `s3_compatible_region` (string): S3-compatible: region
344
+ * `s3_compatible_virtual_hosted_style` (boolean): S3-compatible: If true, use virtual-hosted-style URLs instead of path-style URLs
341
345
  * `s3_region` (string): S3 region
342
346
  * `server_certificate` (string): Remote server certificate
343
347
  * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
@@ -451,6 +455,7 @@ Files::RemoteServer.update(id,
451
455
  s3_compatible_bucket: "my-bucket",
452
456
  s3_compatible_endpoint: "mys3platform.com",
453
457
  s3_compatible_region: "us-east-1",
458
+ s3_compatible_virtual_hosted_style: true,
454
459
  s3_region: "us-east-1",
455
460
  server_certificate: "require_match",
456
461
  server_host_key: "[public key]",
@@ -530,6 +535,7 @@ Files::RemoteServer.update(id,
530
535
  * `s3_compatible_bucket` (string): S3-compatible: Bucket name
531
536
  * `s3_compatible_endpoint` (string): S3-compatible: endpoint
532
537
  * `s3_compatible_region` (string): S3-compatible: region
538
+ * `s3_compatible_virtual_hosted_style` (boolean): S3-compatible: If true, use virtual-hosted-style URLs instead of path-style URLs
533
539
  * `s3_region` (string): S3 region
534
540
  * `server_certificate` (string): Remote server certificate
535
541
  * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
@@ -661,6 +667,7 @@ remote_server.update(
661
667
  s3_compatible_bucket: "my-bucket",
662
668
  s3_compatible_endpoint: "mys3platform.com",
663
669
  s3_compatible_region: "us-east-1",
670
+ s3_compatible_virtual_hosted_style: true,
664
671
  s3_region: "us-east-1",
665
672
  server_certificate: "require_match",
666
673
  server_host_key: "[public key]",
@@ -740,6 +747,7 @@ remote_server.update(
740
747
  * `s3_compatible_bucket` (string): S3-compatible: Bucket name
741
748
  * `s3_compatible_endpoint` (string): S3-compatible: endpoint
742
749
  * `s3_compatible_region` (string): S3-compatible: region
750
+ * `s3_compatible_virtual_hosted_style` (boolean): S3-compatible: If true, use virtual-hosted-style URLs instead of path-style URLs
743
751
  * `s3_region` (string): S3 region
744
752
  * `server_certificate` (string): Remote server certificate
745
753
  * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
@@ -108,6 +108,15 @@ module Files
108
108
  @attributes[:restapi_permission] = value
109
109
  end
110
110
 
111
+ # int64 - Desktop Configuration Profile ID assigned to this Group, if any. Users in the Group inherit it unless a direct per-user assignment overrides it.
112
+ def desktop_configuration_profile_id
113
+ @attributes[:desktop_configuration_profile_id]
114
+ end
115
+
116
+ def desktop_configuration_profile_id=(value)
117
+ @attributes[:desktop_configuration_profile_id] = value
118
+ end
119
+
111
120
  # int64 - Site ID
112
121
  def site_id
113
122
  @attributes[:site_id]
@@ -134,6 +143,7 @@ module Files
134
143
  # sftp_permission - boolean - If true, users in this group can use SFTP to login. This will override a false value of `sftp_permission` on the user level.
135
144
  # dav_permission - boolean - If true, users in this group can use WebDAV to login. This will override a false value of `dav_permission` on the user level.
136
145
  # restapi_permission - boolean - If true, users in this group can use the REST API to login. This will override a false value of `restapi_permission` on the user level.
146
+ # desktop_configuration_profile_id - int64 - Desktop Configuration Profile ID assigned to this Group, if any. Users in the Group inherit it unless a direct per-user assignment overrides it.
137
147
  # allowed_ips - string - A list of allowed IPs if applicable. Newline delimited
138
148
  # name - string - Group name.
139
149
  def update(params = {})
@@ -144,6 +154,7 @@ module Files
144
154
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
145
155
  raise InvalidParameterError.new("Bad parameter: user_ids must be an String") if params[:user_ids] and !params[:user_ids].is_a?(String)
146
156
  raise InvalidParameterError.new("Bad parameter: admin_ids must be an String") if params[:admin_ids] and !params[:admin_ids].is_a?(String)
157
+ raise InvalidParameterError.new("Bad parameter: desktop_configuration_profile_id must be an Integer") if params[:desktop_configuration_profile_id] and !params[:desktop_configuration_profile_id].is_a?(Integer)
147
158
  raise InvalidParameterError.new("Bad parameter: allowed_ips must be an String") if params[:allowed_ips] and !params[:allowed_ips].is_a?(String)
148
159
  raise InvalidParameterError.new("Bad parameter: name must be an String") if params[:name] and !params[:name].is_a?(String)
149
160
  raise MissingParameterError.new("Parameter missing: id") unless params[:id]
@@ -226,6 +237,7 @@ module Files
226
237
  # sftp_permission - boolean - If true, users in this group can use SFTP to login. This will override a false value of `sftp_permission` on the user level.
227
238
  # dav_permission - boolean - If true, users in this group can use WebDAV to login. This will override a false value of `dav_permission` on the user level.
228
239
  # restapi_permission - boolean - If true, users in this group can use the REST API to login. This will override a false value of `restapi_permission` on the user level.
240
+ # desktop_configuration_profile_id - int64 - Desktop Configuration Profile ID assigned to this Group, if any. Users in the Group inherit it unless a direct per-user assignment overrides it.
229
241
  # allowed_ips - string - A list of allowed IPs if applicable. Newline delimited
230
242
  # name (required) - string - Group name.
231
243
  # workspace_id - int64 - Workspace ID
@@ -233,6 +245,7 @@ module Files
233
245
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
234
246
  raise InvalidParameterError.new("Bad parameter: user_ids must be an String") if params[:user_ids] and !params[:user_ids].is_a?(String)
235
247
  raise InvalidParameterError.new("Bad parameter: admin_ids must be an String") if params[:admin_ids] and !params[:admin_ids].is_a?(String)
248
+ raise InvalidParameterError.new("Bad parameter: desktop_configuration_profile_id must be an Integer") if params[:desktop_configuration_profile_id] and !params[:desktop_configuration_profile_id].is_a?(Integer)
236
249
  raise InvalidParameterError.new("Bad parameter: allowed_ips must be an String") if params[:allowed_ips] and !params[:allowed_ips].is_a?(String)
237
250
  raise InvalidParameterError.new("Bad parameter: name must be an String") if params[:name] and !params[:name].is_a?(String)
238
251
  raise InvalidParameterError.new("Bad parameter: workspace_id must be an Integer") if params[:workspace_id] and !params[:workspace_id].is_a?(Integer)
@@ -250,6 +263,7 @@ module Files
250
263
  # sftp_permission - boolean - If true, users in this group can use SFTP to login. This will override a false value of `sftp_permission` on the user level.
251
264
  # dav_permission - boolean - If true, users in this group can use WebDAV to login. This will override a false value of `dav_permission` on the user level.
252
265
  # restapi_permission - boolean - If true, users in this group can use the REST API to login. This will override a false value of `restapi_permission` on the user level.
266
+ # desktop_configuration_profile_id - int64 - Desktop Configuration Profile ID assigned to this Group, if any. Users in the Group inherit it unless a direct per-user assignment overrides it.
253
267
  # allowed_ips - string - A list of allowed IPs if applicable. Newline delimited
254
268
  # name - string - Group name.
255
269
  def self.update(id, params = {}, options = {})
@@ -259,6 +273,7 @@ module Files
259
273
  raise InvalidParameterError.new("Bad parameter: notes must be an String") if params[:notes] and !params[:notes].is_a?(String)
260
274
  raise InvalidParameterError.new("Bad parameter: user_ids must be an String") if params[:user_ids] and !params[:user_ids].is_a?(String)
261
275
  raise InvalidParameterError.new("Bad parameter: admin_ids must be an String") if params[:admin_ids] and !params[:admin_ids].is_a?(String)
276
+ raise InvalidParameterError.new("Bad parameter: desktop_configuration_profile_id must be an Integer") if params[:desktop_configuration_profile_id] and !params[:desktop_configuration_profile_id].is_a?(Integer)
262
277
  raise InvalidParameterError.new("Bad parameter: allowed_ips must be an String") if params[:allowed_ips] and !params[:allowed_ips].is_a?(String)
263
278
  raise InvalidParameterError.new("Bad parameter: name must be an String") if params[:name] and !params[:name].is_a?(String)
264
279
  raise MissingParameterError.new("Parameter missing: id") unless params[:id]
@@ -441,6 +441,15 @@ module Files
441
441
  @attributes[:s3_compatible_region] = value
442
442
  end
443
443
 
444
+ # boolean - S3-compatible: If true, use virtual-hosted-style URLs instead of path-style URLs
445
+ def s3_compatible_virtual_hosted_style
446
+ @attributes[:s3_compatible_virtual_hosted_style]
447
+ end
448
+
449
+ def s3_compatible_virtual_hosted_style=(value)
450
+ @attributes[:s3_compatible_virtual_hosted_style] = value
451
+ end
452
+
444
453
  # string - S3-compatible: Access Key
445
454
  def s3_compatible_access_key
446
455
  @attributes[:s3_compatible_access_key]
@@ -903,6 +912,7 @@ module Files
903
912
  # s3_compatible_bucket - string - S3-compatible: Bucket name
904
913
  # s3_compatible_endpoint - string - S3-compatible: endpoint
905
914
  # s3_compatible_region - string - S3-compatible: region
915
+ # s3_compatible_virtual_hosted_style - boolean - S3-compatible: If true, use virtual-hosted-style URLs instead of path-style URLs
906
916
  # s3_region - string - S3 region
907
917
  # server_certificate - string - Remote server certificate
908
918
  # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
@@ -1130,6 +1140,7 @@ module Files
1130
1140
  # s3_compatible_bucket - string - S3-compatible: Bucket name
1131
1141
  # s3_compatible_endpoint - string - S3-compatible: endpoint
1132
1142
  # s3_compatible_region - string - S3-compatible: region
1143
+ # s3_compatible_virtual_hosted_style - boolean - S3-compatible: If true, use virtual-hosted-style URLs instead of path-style URLs
1133
1144
  # s3_region - string - S3 region
1134
1145
  # server_certificate - string - Remote server certificate
1135
1146
  # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
@@ -1325,6 +1336,7 @@ module Files
1325
1336
  # s3_compatible_bucket - string - S3-compatible: Bucket name
1326
1337
  # s3_compatible_endpoint - string - S3-compatible: endpoint
1327
1338
  # s3_compatible_region - string - S3-compatible: region
1339
+ # s3_compatible_virtual_hosted_style - boolean - S3-compatible: If true, use virtual-hosted-style URLs instead of path-style URLs
1328
1340
  # s3_region - string - S3 region
1329
1341
  # server_certificate - string - Remote server certificate
1330
1342
  # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Files
4
- VERSION = "1.1.607"
4
+ VERSION = "1.1.609"
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.607
4
+ version: 1.1.609
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2026-04-20 00:00:00.000000000 Z
11
+ date: 2026-04-23 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: addressable