files.com 1.1.62 → 1.1.64
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/remote_server.md +1 -13
- data/docs/sftp_action_log.md +2 -0
- data/docs/site.md +1 -0
- data/docs/user.md +6 -4
- data/lib/files.com/models/remote_server.rb +9 -24
- data/lib/files.com/models/sftp_action_log.rb +5 -0
- data/lib/files.com/models/user.rb +13 -4
- data/lib/files.com/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 84250d25a0c58b10038dc9c9ae9a8c1fdd6def976ffdfafc0ddddaa8f8096818
|
4
|
+
data.tar.gz: 7d0c9f285dfe11e2cf1f7d254dc9f9b2b848f1afa53e7156b331eaeb489edd85
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 7c3591f7dd961e946697eae63ebb20c00dae12abe5245d4cafa6ee5e8b7d9c3988146d5e155a641e60950751c3192c2615a74ef652d3f71054ba04c64b67edcc
|
7
|
+
data.tar.gz: 20c9e9f4a23ae3206dae0e414609d205b757a127c7ff53461cf77f13a4d43d15bc819dc57fae94d723537d848e78ad4408d46d94453d5c753c9e564a3af9aad8
|
data/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.1.
|
1
|
+
1.1.64
|
data/docs/remote_server.md
CHANGED
@@ -37,11 +37,9 @@
|
|
37
37
|
"auth_account_name": "me@example.com",
|
38
38
|
"one_drive_account_type": "personal",
|
39
39
|
"azure_blob_storage_account": "storage-account-name",
|
40
|
-
"azure_blob_storage_sas_token": "storage-sas-token",
|
41
40
|
"azure_blob_storage_container": "container-name",
|
42
41
|
"azure_blob_storage_hierarchical_namespace": true,
|
43
42
|
"azure_files_storage_account": "storage-account-name",
|
44
|
-
"azure_files_storage_sas_token": "storage-sas-token",
|
45
43
|
"azure_files_storage_share_name": "share-name",
|
46
44
|
"s3_compatible_bucket": "my-bucket",
|
47
45
|
"s3_compatible_endpoint": "mys3platform.com",
|
@@ -97,11 +95,9 @@
|
|
97
95
|
* `auth_account_name` (string): Describes the authorized account
|
98
96
|
* `one_drive_account_type` (string): Either personal or business_other account types
|
99
97
|
* `azure_blob_storage_account` (string): Azure Blob Storage Account name
|
100
|
-
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
101
98
|
* `azure_blob_storage_container` (string): Azure Blob Storage Container name
|
102
99
|
* `azure_blob_storage_hierarchical_namespace` (boolean): Enable when storage account has hierarchical namespace feature enabled
|
103
100
|
* `azure_files_storage_account` (string): Azure File Storage Account name
|
104
|
-
* `azure_files_storage_sas_token` (string): Shared Access Signature (SAS) token
|
105
101
|
* `azure_files_storage_share_name` (string): Azure File Storage Share name
|
106
102
|
* `s3_compatible_bucket` (string): S3-compatible Bucket name
|
107
103
|
* `s3_compatible_endpoint` (string): S3-compatible endpoint
|
@@ -134,6 +130,7 @@
|
|
134
130
|
* `reset_authentication` (boolean): Reset authenticated account
|
135
131
|
* `azure_blob_storage_access_key` (string): Azure Blob Storage secret key.
|
136
132
|
* `azure_files_storage_access_key` (string): Azure File Storage access key.
|
133
|
+
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
137
134
|
* `s3_compatible_secret_key` (string): S3-compatible secret key
|
138
135
|
* `filebase_secret_key` (string): Filebase secret key
|
139
136
|
* `cloudflare_secret_key` (string): Cloudflare secret key
|
@@ -216,10 +213,8 @@ Files::RemoteServer.create(
|
|
216
213
|
azure_blob_storage_account: "storage-account-name",
|
217
214
|
azure_blob_storage_container: "container-name",
|
218
215
|
azure_blob_storage_hierarchical_namespace: true,
|
219
|
-
azure_blob_storage_sas_token: "storage-sas-token",
|
220
216
|
azure_files_storage_account: "storage-account-name",
|
221
217
|
azure_files_storage_share_name: "share-name",
|
222
|
-
azure_files_storage_sas_token: "storage-sas-token",
|
223
218
|
s3_compatible_bucket: "my-bucket",
|
224
219
|
s3_compatible_endpoint: "mys3platform.com",
|
225
220
|
s3_compatible_region: "us-east-1",
|
@@ -285,7 +280,6 @@ Files::RemoteServer.create(
|
|
285
280
|
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
286
281
|
* `azure_files_storage_account` (string): Azure File Storage Account name
|
287
282
|
* `azure_files_storage_share_name` (string): Azure File Storage Share name
|
288
|
-
* `azure_files_storage_sas_token` (string): Shared Access Signature (SAS) token
|
289
283
|
* `s3_compatible_bucket` (string): S3-compatible Bucket name
|
290
284
|
* `s3_compatible_endpoint` (string): S3-compatible endpoint
|
291
285
|
* `s3_compatible_region` (string): S3-compatible endpoint
|
@@ -379,10 +373,8 @@ Files::RemoteServer.update(id,
|
|
379
373
|
azure_blob_storage_account: "storage-account-name",
|
380
374
|
azure_blob_storage_container: "container-name",
|
381
375
|
azure_blob_storage_hierarchical_namespace: true,
|
382
|
-
azure_blob_storage_sas_token: "storage-sas-token",
|
383
376
|
azure_files_storage_account: "storage-account-name",
|
384
377
|
azure_files_storage_share_name: "share-name",
|
385
|
-
azure_files_storage_sas_token: "storage-sas-token",
|
386
378
|
s3_compatible_bucket: "my-bucket",
|
387
379
|
s3_compatible_endpoint: "mys3platform.com",
|
388
380
|
s3_compatible_region: "us-east-1",
|
@@ -449,7 +441,6 @@ Files::RemoteServer.update(id,
|
|
449
441
|
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
450
442
|
* `azure_files_storage_account` (string): Azure File Storage Account name
|
451
443
|
* `azure_files_storage_share_name` (string): Azure File Storage Share name
|
452
|
-
* `azure_files_storage_sas_token` (string): Shared Access Signature (SAS) token
|
453
444
|
* `s3_compatible_bucket` (string): S3-compatible Bucket name
|
454
445
|
* `s3_compatible_endpoint` (string): S3-compatible endpoint
|
455
446
|
* `s3_compatible_region` (string): S3-compatible endpoint
|
@@ -560,10 +551,8 @@ remote_server.update(
|
|
560
551
|
azure_blob_storage_account: "storage-account-name",
|
561
552
|
azure_blob_storage_container: "container-name",
|
562
553
|
azure_blob_storage_hierarchical_namespace: true,
|
563
|
-
azure_blob_storage_sas_token: "storage-sas-token",
|
564
554
|
azure_files_storage_account: "storage-account-name",
|
565
555
|
azure_files_storage_share_name: "share-name",
|
566
|
-
azure_files_storage_sas_token: "storage-sas-token",
|
567
556
|
s3_compatible_bucket: "my-bucket",
|
568
557
|
s3_compatible_endpoint: "mys3platform.com",
|
569
558
|
s3_compatible_region: "us-east-1",
|
@@ -630,7 +619,6 @@ remote_server.update(
|
|
630
619
|
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
631
620
|
* `azure_files_storage_account` (string): Azure File Storage Account name
|
632
621
|
* `azure_files_storage_share_name` (string): Azure File Storage Share name
|
633
|
-
* `azure_files_storage_sas_token` (string): Shared Access Signature (SAS) token
|
634
622
|
* `s3_compatible_bucket` (string): S3-compatible Bucket name
|
635
623
|
* `s3_compatible_endpoint` (string): S3-compatible endpoint
|
636
624
|
* `s3_compatible_region` (string): S3-compatible endpoint
|
data/docs/sftp_action_log.md
CHANGED
@@ -6,6 +6,7 @@
|
|
6
6
|
{
|
7
7
|
"timestamp": "2000-01-01T01:00:00Z",
|
8
8
|
"remote_ip": "example",
|
9
|
+
"server_ip": "example",
|
9
10
|
"username": "example",
|
10
11
|
"session_uid": "example",
|
11
12
|
"seq_id": 1,
|
@@ -34,6 +35,7 @@
|
|
34
35
|
|
35
36
|
* `timestamp` (date-time): Start Time of Action
|
36
37
|
* `remote_ip` (string): IP Address of SFTP Client
|
38
|
+
* `server_ip` (string): IP Address of SFTP Server
|
37
39
|
* `username` (string): Username
|
38
40
|
* `session_uid` (string): Unique ID of the Session
|
39
41
|
* `seq_id` (int64): SFTP Sequence ID
|
data/docs/site.md
CHANGED
data/docs/user.md
CHANGED
@@ -21,6 +21,7 @@
|
|
21
21
|
"created_at": "2000-01-01T01:00:00Z",
|
22
22
|
"dav_permission": true,
|
23
23
|
"disabled": true,
|
24
|
+
"disabled_expired_or_inactive": true,
|
24
25
|
"email": "example",
|
25
26
|
"first_login_at": "2000-01-01T01:00:00Z",
|
26
27
|
"ftp_permission": true,
|
@@ -84,7 +85,8 @@
|
|
84
85
|
* `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
|
85
86
|
* `created_at` (date-time): When this user was created
|
86
87
|
* `dav_permission` (boolean): Can the user connect with WebDAV?
|
87
|
-
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
88
|
+
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
89
|
+
* `disabled_expired_or_inactive` (boolean): Computed property that returns true if user disabled or expired or inactive.
|
88
90
|
* `email` (email): User email address
|
89
91
|
* `first_login_at` (date-time): User's first login time
|
90
92
|
* `ftp_permission` (boolean): Can the user access with FTP/FTPS?
|
@@ -250,7 +252,7 @@ Files::User.create(
|
|
250
252
|
* `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
|
251
253
|
* `bypass_site_allowed_ips` (boolean): Allow this user to skip site-wide IP blacklists?
|
252
254
|
* `dav_permission` (boolean): Can the user connect with WebDAV?
|
253
|
-
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
255
|
+
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
254
256
|
* `ftp_permission` (boolean): Can the user access with FTP/FTPS?
|
255
257
|
* `header_text` (string): Text to display to the user in the header of the UI
|
256
258
|
* `language` (string): Preferred language
|
@@ -386,7 +388,7 @@ Files::User.update(id,
|
|
386
388
|
* `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
|
387
389
|
* `bypass_site_allowed_ips` (boolean): Allow this user to skip site-wide IP blacklists?
|
388
390
|
* `dav_permission` (boolean): Can the user connect with WebDAV?
|
389
|
-
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
391
|
+
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
390
392
|
* `ftp_permission` (boolean): Can the user access with FTP/FTPS?
|
391
393
|
* `header_text` (string): Text to display to the user in the header of the UI
|
392
394
|
* `language` (string): Preferred language
|
@@ -543,7 +545,7 @@ user.update(
|
|
543
545
|
* `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
|
544
546
|
* `bypass_site_allowed_ips` (boolean): Allow this user to skip site-wide IP blacklists?
|
545
547
|
* `dav_permission` (boolean): Can the user connect with WebDAV?
|
546
|
-
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
548
|
+
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
547
549
|
* `ftp_permission` (boolean): Can the user access with FTP/FTPS?
|
548
550
|
* `header_text` (string): Text to display to the user in the header of the UI
|
549
551
|
* `language` (string): Preferred language
|
@@ -306,15 +306,6 @@ module Files
|
|
306
306
|
@attributes[:azure_blob_storage_account] = value
|
307
307
|
end
|
308
308
|
|
309
|
-
# string - Shared Access Signature (SAS) token
|
310
|
-
def azure_blob_storage_sas_token
|
311
|
-
@attributes[:azure_blob_storage_sas_token]
|
312
|
-
end
|
313
|
-
|
314
|
-
def azure_blob_storage_sas_token=(value)
|
315
|
-
@attributes[:azure_blob_storage_sas_token] = value
|
316
|
-
end
|
317
|
-
|
318
309
|
# string - Azure Blob Storage Container name
|
319
310
|
def azure_blob_storage_container
|
320
311
|
@attributes[:azure_blob_storage_container]
|
@@ -342,15 +333,6 @@ module Files
|
|
342
333
|
@attributes[:azure_files_storage_account] = value
|
343
334
|
end
|
344
335
|
|
345
|
-
# string - Shared Access Signature (SAS) token
|
346
|
-
def azure_files_storage_sas_token
|
347
|
-
@attributes[:azure_files_storage_sas_token]
|
348
|
-
end
|
349
|
-
|
350
|
-
def azure_files_storage_sas_token=(value)
|
351
|
-
@attributes[:azure_files_storage_sas_token] = value
|
352
|
-
end
|
353
|
-
|
354
336
|
# string - Azure File Storage Share name
|
355
337
|
def azure_files_storage_share_name
|
356
338
|
@attributes[:azure_files_storage_share_name]
|
@@ -639,6 +621,15 @@ module Files
|
|
639
621
|
@attributes[:azure_files_storage_access_key] = value
|
640
622
|
end
|
641
623
|
|
624
|
+
# string - Shared Access Signature (SAS) token
|
625
|
+
def azure_blob_storage_sas_token
|
626
|
+
@attributes[:azure_blob_storage_sas_token]
|
627
|
+
end
|
628
|
+
|
629
|
+
def azure_blob_storage_sas_token=(value)
|
630
|
+
@attributes[:azure_blob_storage_sas_token] = value
|
631
|
+
end
|
632
|
+
|
642
633
|
# string - S3-compatible secret key
|
643
634
|
def s3_compatible_secret_key
|
644
635
|
@attributes[:s3_compatible_secret_key]
|
@@ -754,7 +745,6 @@ module Files
|
|
754
745
|
# azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
|
755
746
|
# azure_files_storage_account - string - Azure File Storage Account name
|
756
747
|
# azure_files_storage_share_name - string - Azure File Storage Share name
|
757
|
-
# azure_files_storage_sas_token - string - Shared Access Signature (SAS) token
|
758
748
|
# s3_compatible_bucket - string - S3-compatible Bucket name
|
759
749
|
# s3_compatible_endpoint - string - S3-compatible endpoint
|
760
750
|
# s3_compatible_region - string - S3-compatible endpoint
|
@@ -821,7 +811,6 @@ module Files
|
|
821
811
|
raise InvalidParameterError.new("Bad parameter: azure_blob_storage_sas_token must be an String") if params[:azure_blob_storage_sas_token] and !params[:azure_blob_storage_sas_token].is_a?(String)
|
822
812
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_account must be an String") if params[:azure_files_storage_account] and !params[:azure_files_storage_account].is_a?(String)
|
823
813
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_share_name must be an String") if params[:azure_files_storage_share_name] and !params[:azure_files_storage_share_name].is_a?(String)
|
824
|
-
raise InvalidParameterError.new("Bad parameter: azure_files_storage_sas_token must be an String") if params[:azure_files_storage_sas_token] and !params[:azure_files_storage_sas_token].is_a?(String)
|
825
814
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_bucket must be an String") if params[:s3_compatible_bucket] and !params[:s3_compatible_bucket].is_a?(String)
|
826
815
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_endpoint must be an String") if params[:s3_compatible_endpoint] and !params[:s3_compatible_endpoint].is_a?(String)
|
827
816
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_region must be an String") if params[:s3_compatible_region] and !params[:s3_compatible_region].is_a?(String)
|
@@ -960,7 +949,6 @@ module Files
|
|
960
949
|
# azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
|
961
950
|
# azure_files_storage_account - string - Azure File Storage Account name
|
962
951
|
# azure_files_storage_share_name - string - Azure File Storage Share name
|
963
|
-
# azure_files_storage_sas_token - string - Shared Access Signature (SAS) token
|
964
952
|
# s3_compatible_bucket - string - S3-compatible Bucket name
|
965
953
|
# s3_compatible_endpoint - string - S3-compatible endpoint
|
966
954
|
# s3_compatible_region - string - S3-compatible endpoint
|
@@ -1023,7 +1011,6 @@ module Files
|
|
1023
1011
|
raise InvalidParameterError.new("Bad parameter: azure_blob_storage_sas_token must be an String") if params[:azure_blob_storage_sas_token] and !params[:azure_blob_storage_sas_token].is_a?(String)
|
1024
1012
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_account must be an String") if params[:azure_files_storage_account] and !params[:azure_files_storage_account].is_a?(String)
|
1025
1013
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_share_name must be an String") if params[:azure_files_storage_share_name] and !params[:azure_files_storage_share_name].is_a?(String)
|
1026
|
-
raise InvalidParameterError.new("Bad parameter: azure_files_storage_sas_token must be an String") if params[:azure_files_storage_sas_token] and !params[:azure_files_storage_sas_token].is_a?(String)
|
1027
1014
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_bucket must be an String") if params[:s3_compatible_bucket] and !params[:s3_compatible_bucket].is_a?(String)
|
1028
1015
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_endpoint must be an String") if params[:s3_compatible_endpoint] and !params[:s3_compatible_endpoint].is_a?(String)
|
1029
1016
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_region must be an String") if params[:s3_compatible_region] and !params[:s3_compatible_region].is_a?(String)
|
@@ -1127,7 +1114,6 @@ module Files
|
|
1127
1114
|
# azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
|
1128
1115
|
# azure_files_storage_account - string - Azure File Storage Account name
|
1129
1116
|
# azure_files_storage_share_name - string - Azure File Storage Share name
|
1130
|
-
# azure_files_storage_sas_token - string - Shared Access Signature (SAS) token
|
1131
1117
|
# s3_compatible_bucket - string - S3-compatible Bucket name
|
1132
1118
|
# s3_compatible_endpoint - string - S3-compatible endpoint
|
1133
1119
|
# s3_compatible_region - string - S3-compatible endpoint
|
@@ -1193,7 +1179,6 @@ module Files
|
|
1193
1179
|
raise InvalidParameterError.new("Bad parameter: azure_blob_storage_sas_token must be an String") if params[:azure_blob_storage_sas_token] and !params[:azure_blob_storage_sas_token].is_a?(String)
|
1194
1180
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_account must be an String") if params[:azure_files_storage_account] and !params[:azure_files_storage_account].is_a?(String)
|
1195
1181
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_share_name must be an String") if params[:azure_files_storage_share_name] and !params[:azure_files_storage_share_name].is_a?(String)
|
1196
|
-
raise InvalidParameterError.new("Bad parameter: azure_files_storage_sas_token must be an String") if params[:azure_files_storage_sas_token] and !params[:azure_files_storage_sas_token].is_a?(String)
|
1197
1182
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_bucket must be an String") if params[:s3_compatible_bucket] and !params[:s3_compatible_bucket].is_a?(String)
|
1198
1183
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_endpoint must be an String") if params[:s3_compatible_endpoint] and !params[:s3_compatible_endpoint].is_a?(String)
|
1199
1184
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_region must be an String") if params[:s3_compatible_region] and !params[:s3_compatible_region].is_a?(String)
|
@@ -131,7 +131,7 @@ module Files
|
|
131
131
|
@attributes[:dav_permission] = value
|
132
132
|
end
|
133
133
|
|
134
|
-
# boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
134
|
+
# boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
135
135
|
def disabled
|
136
136
|
@attributes[:disabled]
|
137
137
|
end
|
@@ -140,6 +140,15 @@ module Files
|
|
140
140
|
@attributes[:disabled] = value
|
141
141
|
end
|
142
142
|
|
143
|
+
# boolean - Computed property that returns true if user disabled or expired or inactive.
|
144
|
+
def disabled_expired_or_inactive
|
145
|
+
@attributes[:disabled_expired_or_inactive]
|
146
|
+
end
|
147
|
+
|
148
|
+
def disabled_expired_or_inactive=(value)
|
149
|
+
@attributes[:disabled_expired_or_inactive] = value
|
150
|
+
end
|
151
|
+
|
143
152
|
# email - User email address
|
144
153
|
def email
|
145
154
|
@attributes[:email]
|
@@ -698,7 +707,7 @@ module Files
|
|
698
707
|
# bypass_inactive_disable - boolean - Exempt this user from being disabled based on inactivity?
|
699
708
|
# bypass_site_allowed_ips - boolean - Allow this user to skip site-wide IP blacklists?
|
700
709
|
# dav_permission - boolean - Can the user connect with WebDAV?
|
701
|
-
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
710
|
+
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
702
711
|
# ftp_permission - boolean - Can the user access with FTP/FTPS?
|
703
712
|
# header_text - string - Text to display to the user in the header of the UI
|
704
713
|
# language - string - Preferred language
|
@@ -856,7 +865,7 @@ module Files
|
|
856
865
|
# bypass_inactive_disable - boolean - Exempt this user from being disabled based on inactivity?
|
857
866
|
# bypass_site_allowed_ips - boolean - Allow this user to skip site-wide IP blacklists?
|
858
867
|
# dav_permission - boolean - Can the user connect with WebDAV?
|
859
|
-
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
868
|
+
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
860
869
|
# ftp_permission - boolean - Can the user access with FTP/FTPS?
|
861
870
|
# header_text - string - Text to display to the user in the header of the UI
|
862
871
|
# language - string - Preferred language
|
@@ -968,7 +977,7 @@ module Files
|
|
968
977
|
# bypass_inactive_disable - boolean - Exempt this user from being disabled based on inactivity?
|
969
978
|
# bypass_site_allowed_ips - boolean - Allow this user to skip site-wide IP blacklists?
|
970
979
|
# dav_permission - boolean - Can the user connect with WebDAV?
|
971
|
-
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
980
|
+
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
972
981
|
# ftp_permission - boolean - Can the user access with FTP/FTPS?
|
973
982
|
# header_text - string - Text to display to the user in the header of the UI
|
974
983
|
# language - string - Preferred language
|
data/lib/files.com/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: files.com
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.1.
|
4
|
+
version: 1.1.64
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- files.com
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-05-02 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: addressable
|