files.com 1.1.63 → 1.1.64
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/remote_server.md +1 -13
- data/docs/site.md +1 -0
- data/docs/user.md +6 -4
- data/lib/files.com/models/remote_server.rb +9 -24
- data/lib/files.com/models/user.rb +13 -4
- data/lib/files.com/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 84250d25a0c58b10038dc9c9ae9a8c1fdd6def976ffdfafc0ddddaa8f8096818
|
|
4
|
+
data.tar.gz: 7d0c9f285dfe11e2cf1f7d254dc9f9b2b848f1afa53e7156b331eaeb489edd85
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 7c3591f7dd961e946697eae63ebb20c00dae12abe5245d4cafa6ee5e8b7d9c3988146d5e155a641e60950751c3192c2615a74ef652d3f71054ba04c64b67edcc
|
|
7
|
+
data.tar.gz: 20c9e9f4a23ae3206dae0e414609d205b757a127c7ff53461cf77f13a4d43d15bc819dc57fae94d723537d848e78ad4408d46d94453d5c753c9e564a3af9aad8
|
data/_VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.1.
|
|
1
|
+
1.1.64
|
data/docs/remote_server.md
CHANGED
|
@@ -37,11 +37,9 @@
|
|
|
37
37
|
"auth_account_name": "me@example.com",
|
|
38
38
|
"one_drive_account_type": "personal",
|
|
39
39
|
"azure_blob_storage_account": "storage-account-name",
|
|
40
|
-
"azure_blob_storage_sas_token": "storage-sas-token",
|
|
41
40
|
"azure_blob_storage_container": "container-name",
|
|
42
41
|
"azure_blob_storage_hierarchical_namespace": true,
|
|
43
42
|
"azure_files_storage_account": "storage-account-name",
|
|
44
|
-
"azure_files_storage_sas_token": "storage-sas-token",
|
|
45
43
|
"azure_files_storage_share_name": "share-name",
|
|
46
44
|
"s3_compatible_bucket": "my-bucket",
|
|
47
45
|
"s3_compatible_endpoint": "mys3platform.com",
|
|
@@ -97,11 +95,9 @@
|
|
|
97
95
|
* `auth_account_name` (string): Describes the authorized account
|
|
98
96
|
* `one_drive_account_type` (string): Either personal or business_other account types
|
|
99
97
|
* `azure_blob_storage_account` (string): Azure Blob Storage Account name
|
|
100
|
-
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
|
101
98
|
* `azure_blob_storage_container` (string): Azure Blob Storage Container name
|
|
102
99
|
* `azure_blob_storage_hierarchical_namespace` (boolean): Enable when storage account has hierarchical namespace feature enabled
|
|
103
100
|
* `azure_files_storage_account` (string): Azure File Storage Account name
|
|
104
|
-
* `azure_files_storage_sas_token` (string): Shared Access Signature (SAS) token
|
|
105
101
|
* `azure_files_storage_share_name` (string): Azure File Storage Share name
|
|
106
102
|
* `s3_compatible_bucket` (string): S3-compatible Bucket name
|
|
107
103
|
* `s3_compatible_endpoint` (string): S3-compatible endpoint
|
|
@@ -134,6 +130,7 @@
|
|
|
134
130
|
* `reset_authentication` (boolean): Reset authenticated account
|
|
135
131
|
* `azure_blob_storage_access_key` (string): Azure Blob Storage secret key.
|
|
136
132
|
* `azure_files_storage_access_key` (string): Azure File Storage access key.
|
|
133
|
+
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
|
137
134
|
* `s3_compatible_secret_key` (string): S3-compatible secret key
|
|
138
135
|
* `filebase_secret_key` (string): Filebase secret key
|
|
139
136
|
* `cloudflare_secret_key` (string): Cloudflare secret key
|
|
@@ -216,10 +213,8 @@ Files::RemoteServer.create(
|
|
|
216
213
|
azure_blob_storage_account: "storage-account-name",
|
|
217
214
|
azure_blob_storage_container: "container-name",
|
|
218
215
|
azure_blob_storage_hierarchical_namespace: true,
|
|
219
|
-
azure_blob_storage_sas_token: "storage-sas-token",
|
|
220
216
|
azure_files_storage_account: "storage-account-name",
|
|
221
217
|
azure_files_storage_share_name: "share-name",
|
|
222
|
-
azure_files_storage_sas_token: "storage-sas-token",
|
|
223
218
|
s3_compatible_bucket: "my-bucket",
|
|
224
219
|
s3_compatible_endpoint: "mys3platform.com",
|
|
225
220
|
s3_compatible_region: "us-east-1",
|
|
@@ -285,7 +280,6 @@ Files::RemoteServer.create(
|
|
|
285
280
|
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
|
286
281
|
* `azure_files_storage_account` (string): Azure File Storage Account name
|
|
287
282
|
* `azure_files_storage_share_name` (string): Azure File Storage Share name
|
|
288
|
-
* `azure_files_storage_sas_token` (string): Shared Access Signature (SAS) token
|
|
289
283
|
* `s3_compatible_bucket` (string): S3-compatible Bucket name
|
|
290
284
|
* `s3_compatible_endpoint` (string): S3-compatible endpoint
|
|
291
285
|
* `s3_compatible_region` (string): S3-compatible endpoint
|
|
@@ -379,10 +373,8 @@ Files::RemoteServer.update(id,
|
|
|
379
373
|
azure_blob_storage_account: "storage-account-name",
|
|
380
374
|
azure_blob_storage_container: "container-name",
|
|
381
375
|
azure_blob_storage_hierarchical_namespace: true,
|
|
382
|
-
azure_blob_storage_sas_token: "storage-sas-token",
|
|
383
376
|
azure_files_storage_account: "storage-account-name",
|
|
384
377
|
azure_files_storage_share_name: "share-name",
|
|
385
|
-
azure_files_storage_sas_token: "storage-sas-token",
|
|
386
378
|
s3_compatible_bucket: "my-bucket",
|
|
387
379
|
s3_compatible_endpoint: "mys3platform.com",
|
|
388
380
|
s3_compatible_region: "us-east-1",
|
|
@@ -449,7 +441,6 @@ Files::RemoteServer.update(id,
|
|
|
449
441
|
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
|
450
442
|
* `azure_files_storage_account` (string): Azure File Storage Account name
|
|
451
443
|
* `azure_files_storage_share_name` (string): Azure File Storage Share name
|
|
452
|
-
* `azure_files_storage_sas_token` (string): Shared Access Signature (SAS) token
|
|
453
444
|
* `s3_compatible_bucket` (string): S3-compatible Bucket name
|
|
454
445
|
* `s3_compatible_endpoint` (string): S3-compatible endpoint
|
|
455
446
|
* `s3_compatible_region` (string): S3-compatible endpoint
|
|
@@ -560,10 +551,8 @@ remote_server.update(
|
|
|
560
551
|
azure_blob_storage_account: "storage-account-name",
|
|
561
552
|
azure_blob_storage_container: "container-name",
|
|
562
553
|
azure_blob_storage_hierarchical_namespace: true,
|
|
563
|
-
azure_blob_storage_sas_token: "storage-sas-token",
|
|
564
554
|
azure_files_storage_account: "storage-account-name",
|
|
565
555
|
azure_files_storage_share_name: "share-name",
|
|
566
|
-
azure_files_storage_sas_token: "storage-sas-token",
|
|
567
556
|
s3_compatible_bucket: "my-bucket",
|
|
568
557
|
s3_compatible_endpoint: "mys3platform.com",
|
|
569
558
|
s3_compatible_region: "us-east-1",
|
|
@@ -630,7 +619,6 @@ remote_server.update(
|
|
|
630
619
|
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
|
631
620
|
* `azure_files_storage_account` (string): Azure File Storage Account name
|
|
632
621
|
* `azure_files_storage_share_name` (string): Azure File Storage Share name
|
|
633
|
-
* `azure_files_storage_sas_token` (string): Shared Access Signature (SAS) token
|
|
634
622
|
* `s3_compatible_bucket` (string): S3-compatible Bucket name
|
|
635
623
|
* `s3_compatible_endpoint` (string): S3-compatible endpoint
|
|
636
624
|
* `s3_compatible_region` (string): S3-compatible endpoint
|
data/docs/site.md
CHANGED
data/docs/user.md
CHANGED
|
@@ -21,6 +21,7 @@
|
|
|
21
21
|
"created_at": "2000-01-01T01:00:00Z",
|
|
22
22
|
"dav_permission": true,
|
|
23
23
|
"disabled": true,
|
|
24
|
+
"disabled_expired_or_inactive": true,
|
|
24
25
|
"email": "example",
|
|
25
26
|
"first_login_at": "2000-01-01T01:00:00Z",
|
|
26
27
|
"ftp_permission": true,
|
|
@@ -84,7 +85,8 @@
|
|
|
84
85
|
* `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
|
|
85
86
|
* `created_at` (date-time): When this user was created
|
|
86
87
|
* `dav_permission` (boolean): Can the user connect with WebDAV?
|
|
87
|
-
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
|
88
|
+
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
|
89
|
+
* `disabled_expired_or_inactive` (boolean): Computed property that returns true if user disabled or expired or inactive.
|
|
88
90
|
* `email` (email): User email address
|
|
89
91
|
* `first_login_at` (date-time): User's first login time
|
|
90
92
|
* `ftp_permission` (boolean): Can the user access with FTP/FTPS?
|
|
@@ -250,7 +252,7 @@ Files::User.create(
|
|
|
250
252
|
* `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
|
|
251
253
|
* `bypass_site_allowed_ips` (boolean): Allow this user to skip site-wide IP blacklists?
|
|
252
254
|
* `dav_permission` (boolean): Can the user connect with WebDAV?
|
|
253
|
-
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
|
255
|
+
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
|
254
256
|
* `ftp_permission` (boolean): Can the user access with FTP/FTPS?
|
|
255
257
|
* `header_text` (string): Text to display to the user in the header of the UI
|
|
256
258
|
* `language` (string): Preferred language
|
|
@@ -386,7 +388,7 @@ Files::User.update(id,
|
|
|
386
388
|
* `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
|
|
387
389
|
* `bypass_site_allowed_ips` (boolean): Allow this user to skip site-wide IP blacklists?
|
|
388
390
|
* `dav_permission` (boolean): Can the user connect with WebDAV?
|
|
389
|
-
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
|
391
|
+
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
|
390
392
|
* `ftp_permission` (boolean): Can the user access with FTP/FTPS?
|
|
391
393
|
* `header_text` (string): Text to display to the user in the header of the UI
|
|
392
394
|
* `language` (string): Preferred language
|
|
@@ -543,7 +545,7 @@ user.update(
|
|
|
543
545
|
* `bypass_inactive_disable` (boolean): Exempt this user from being disabled based on inactivity?
|
|
544
546
|
* `bypass_site_allowed_ips` (boolean): Allow this user to skip site-wide IP blacklists?
|
|
545
547
|
* `dav_permission` (boolean): Can the user connect with WebDAV?
|
|
546
|
-
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
|
548
|
+
* `disabled` (boolean): Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
|
547
549
|
* `ftp_permission` (boolean): Can the user access with FTP/FTPS?
|
|
548
550
|
* `header_text` (string): Text to display to the user in the header of the UI
|
|
549
551
|
* `language` (string): Preferred language
|
|
@@ -306,15 +306,6 @@ module Files
|
|
|
306
306
|
@attributes[:azure_blob_storage_account] = value
|
|
307
307
|
end
|
|
308
308
|
|
|
309
|
-
# string - Shared Access Signature (SAS) token
|
|
310
|
-
def azure_blob_storage_sas_token
|
|
311
|
-
@attributes[:azure_blob_storage_sas_token]
|
|
312
|
-
end
|
|
313
|
-
|
|
314
|
-
def azure_blob_storage_sas_token=(value)
|
|
315
|
-
@attributes[:azure_blob_storage_sas_token] = value
|
|
316
|
-
end
|
|
317
|
-
|
|
318
309
|
# string - Azure Blob Storage Container name
|
|
319
310
|
def azure_blob_storage_container
|
|
320
311
|
@attributes[:azure_blob_storage_container]
|
|
@@ -342,15 +333,6 @@ module Files
|
|
|
342
333
|
@attributes[:azure_files_storage_account] = value
|
|
343
334
|
end
|
|
344
335
|
|
|
345
|
-
# string - Shared Access Signature (SAS) token
|
|
346
|
-
def azure_files_storage_sas_token
|
|
347
|
-
@attributes[:azure_files_storage_sas_token]
|
|
348
|
-
end
|
|
349
|
-
|
|
350
|
-
def azure_files_storage_sas_token=(value)
|
|
351
|
-
@attributes[:azure_files_storage_sas_token] = value
|
|
352
|
-
end
|
|
353
|
-
|
|
354
336
|
# string - Azure File Storage Share name
|
|
355
337
|
def azure_files_storage_share_name
|
|
356
338
|
@attributes[:azure_files_storage_share_name]
|
|
@@ -639,6 +621,15 @@ module Files
|
|
|
639
621
|
@attributes[:azure_files_storage_access_key] = value
|
|
640
622
|
end
|
|
641
623
|
|
|
624
|
+
# string - Shared Access Signature (SAS) token
|
|
625
|
+
def azure_blob_storage_sas_token
|
|
626
|
+
@attributes[:azure_blob_storage_sas_token]
|
|
627
|
+
end
|
|
628
|
+
|
|
629
|
+
def azure_blob_storage_sas_token=(value)
|
|
630
|
+
@attributes[:azure_blob_storage_sas_token] = value
|
|
631
|
+
end
|
|
632
|
+
|
|
642
633
|
# string - S3-compatible secret key
|
|
643
634
|
def s3_compatible_secret_key
|
|
644
635
|
@attributes[:s3_compatible_secret_key]
|
|
@@ -754,7 +745,6 @@ module Files
|
|
|
754
745
|
# azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
|
|
755
746
|
# azure_files_storage_account - string - Azure File Storage Account name
|
|
756
747
|
# azure_files_storage_share_name - string - Azure File Storage Share name
|
|
757
|
-
# azure_files_storage_sas_token - string - Shared Access Signature (SAS) token
|
|
758
748
|
# s3_compatible_bucket - string - S3-compatible Bucket name
|
|
759
749
|
# s3_compatible_endpoint - string - S3-compatible endpoint
|
|
760
750
|
# s3_compatible_region - string - S3-compatible endpoint
|
|
@@ -821,7 +811,6 @@ module Files
|
|
|
821
811
|
raise InvalidParameterError.new("Bad parameter: azure_blob_storage_sas_token must be an String") if params[:azure_blob_storage_sas_token] and !params[:azure_blob_storage_sas_token].is_a?(String)
|
|
822
812
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_account must be an String") if params[:azure_files_storage_account] and !params[:azure_files_storage_account].is_a?(String)
|
|
823
813
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_share_name must be an String") if params[:azure_files_storage_share_name] and !params[:azure_files_storage_share_name].is_a?(String)
|
|
824
|
-
raise InvalidParameterError.new("Bad parameter: azure_files_storage_sas_token must be an String") if params[:azure_files_storage_sas_token] and !params[:azure_files_storage_sas_token].is_a?(String)
|
|
825
814
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_bucket must be an String") if params[:s3_compatible_bucket] and !params[:s3_compatible_bucket].is_a?(String)
|
|
826
815
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_endpoint must be an String") if params[:s3_compatible_endpoint] and !params[:s3_compatible_endpoint].is_a?(String)
|
|
827
816
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_region must be an String") if params[:s3_compatible_region] and !params[:s3_compatible_region].is_a?(String)
|
|
@@ -960,7 +949,6 @@ module Files
|
|
|
960
949
|
# azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
|
|
961
950
|
# azure_files_storage_account - string - Azure File Storage Account name
|
|
962
951
|
# azure_files_storage_share_name - string - Azure File Storage Share name
|
|
963
|
-
# azure_files_storage_sas_token - string - Shared Access Signature (SAS) token
|
|
964
952
|
# s3_compatible_bucket - string - S3-compatible Bucket name
|
|
965
953
|
# s3_compatible_endpoint - string - S3-compatible endpoint
|
|
966
954
|
# s3_compatible_region - string - S3-compatible endpoint
|
|
@@ -1023,7 +1011,6 @@ module Files
|
|
|
1023
1011
|
raise InvalidParameterError.new("Bad parameter: azure_blob_storage_sas_token must be an String") if params[:azure_blob_storage_sas_token] and !params[:azure_blob_storage_sas_token].is_a?(String)
|
|
1024
1012
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_account must be an String") if params[:azure_files_storage_account] and !params[:azure_files_storage_account].is_a?(String)
|
|
1025
1013
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_share_name must be an String") if params[:azure_files_storage_share_name] and !params[:azure_files_storage_share_name].is_a?(String)
|
|
1026
|
-
raise InvalidParameterError.new("Bad parameter: azure_files_storage_sas_token must be an String") if params[:azure_files_storage_sas_token] and !params[:azure_files_storage_sas_token].is_a?(String)
|
|
1027
1014
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_bucket must be an String") if params[:s3_compatible_bucket] and !params[:s3_compatible_bucket].is_a?(String)
|
|
1028
1015
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_endpoint must be an String") if params[:s3_compatible_endpoint] and !params[:s3_compatible_endpoint].is_a?(String)
|
|
1029
1016
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_region must be an String") if params[:s3_compatible_region] and !params[:s3_compatible_region].is_a?(String)
|
|
@@ -1127,7 +1114,6 @@ module Files
|
|
|
1127
1114
|
# azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
|
|
1128
1115
|
# azure_files_storage_account - string - Azure File Storage Account name
|
|
1129
1116
|
# azure_files_storage_share_name - string - Azure File Storage Share name
|
|
1130
|
-
# azure_files_storage_sas_token - string - Shared Access Signature (SAS) token
|
|
1131
1117
|
# s3_compatible_bucket - string - S3-compatible Bucket name
|
|
1132
1118
|
# s3_compatible_endpoint - string - S3-compatible endpoint
|
|
1133
1119
|
# s3_compatible_region - string - S3-compatible endpoint
|
|
@@ -1193,7 +1179,6 @@ module Files
|
|
|
1193
1179
|
raise InvalidParameterError.new("Bad parameter: azure_blob_storage_sas_token must be an String") if params[:azure_blob_storage_sas_token] and !params[:azure_blob_storage_sas_token].is_a?(String)
|
|
1194
1180
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_account must be an String") if params[:azure_files_storage_account] and !params[:azure_files_storage_account].is_a?(String)
|
|
1195
1181
|
raise InvalidParameterError.new("Bad parameter: azure_files_storage_share_name must be an String") if params[:azure_files_storage_share_name] and !params[:azure_files_storage_share_name].is_a?(String)
|
|
1196
|
-
raise InvalidParameterError.new("Bad parameter: azure_files_storage_sas_token must be an String") if params[:azure_files_storage_sas_token] and !params[:azure_files_storage_sas_token].is_a?(String)
|
|
1197
1182
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_bucket must be an String") if params[:s3_compatible_bucket] and !params[:s3_compatible_bucket].is_a?(String)
|
|
1198
1183
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_endpoint must be an String") if params[:s3_compatible_endpoint] and !params[:s3_compatible_endpoint].is_a?(String)
|
|
1199
1184
|
raise InvalidParameterError.new("Bad parameter: s3_compatible_region must be an String") if params[:s3_compatible_region] and !params[:s3_compatible_region].is_a?(String)
|
|
@@ -131,7 +131,7 @@ module Files
|
|
|
131
131
|
@attributes[:dav_permission] = value
|
|
132
132
|
end
|
|
133
133
|
|
|
134
|
-
# boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
|
134
|
+
# boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
|
135
135
|
def disabled
|
|
136
136
|
@attributes[:disabled]
|
|
137
137
|
end
|
|
@@ -140,6 +140,15 @@ module Files
|
|
|
140
140
|
@attributes[:disabled] = value
|
|
141
141
|
end
|
|
142
142
|
|
|
143
|
+
# boolean - Computed property that returns true if user disabled or expired or inactive.
|
|
144
|
+
def disabled_expired_or_inactive
|
|
145
|
+
@attributes[:disabled_expired_or_inactive]
|
|
146
|
+
end
|
|
147
|
+
|
|
148
|
+
def disabled_expired_or_inactive=(value)
|
|
149
|
+
@attributes[:disabled_expired_or_inactive] = value
|
|
150
|
+
end
|
|
151
|
+
|
|
143
152
|
# email - User email address
|
|
144
153
|
def email
|
|
145
154
|
@attributes[:email]
|
|
@@ -698,7 +707,7 @@ module Files
|
|
|
698
707
|
# bypass_inactive_disable - boolean - Exempt this user from being disabled based on inactivity?
|
|
699
708
|
# bypass_site_allowed_ips - boolean - Allow this user to skip site-wide IP blacklists?
|
|
700
709
|
# dav_permission - boolean - Can the user connect with WebDAV?
|
|
701
|
-
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
|
710
|
+
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
|
702
711
|
# ftp_permission - boolean - Can the user access with FTP/FTPS?
|
|
703
712
|
# header_text - string - Text to display to the user in the header of the UI
|
|
704
713
|
# language - string - Preferred language
|
|
@@ -856,7 +865,7 @@ module Files
|
|
|
856
865
|
# bypass_inactive_disable - boolean - Exempt this user from being disabled based on inactivity?
|
|
857
866
|
# bypass_site_allowed_ips - boolean - Allow this user to skip site-wide IP blacklists?
|
|
858
867
|
# dav_permission - boolean - Can the user connect with WebDAV?
|
|
859
|
-
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
|
868
|
+
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
|
860
869
|
# ftp_permission - boolean - Can the user access with FTP/FTPS?
|
|
861
870
|
# header_text - string - Text to display to the user in the header of the UI
|
|
862
871
|
# language - string - Preferred language
|
|
@@ -968,7 +977,7 @@ module Files
|
|
|
968
977
|
# bypass_inactive_disable - boolean - Exempt this user from being disabled based on inactivity?
|
|
969
978
|
# bypass_site_allowed_ips - boolean - Allow this user to skip site-wide IP blacklists?
|
|
970
979
|
# dav_permission - boolean - Can the user connect with WebDAV?
|
|
971
|
-
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes.
|
|
980
|
+
# disabled - boolean - Is user disabled? Disabled users cannot log in, and do not count for billing purposes. Users can be automatically disabled after an inactivity period via a Site setting or schedule to be deactivated after specific date.
|
|
972
981
|
# ftp_permission - boolean - Can the user access with FTP/FTPS?
|
|
973
982
|
# header_text - string - Text to display to the user in the header of the UI
|
|
974
983
|
# language - string - Preferred language
|
data/lib/files.com/version.rb
CHANGED
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: files.com
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.1.
|
|
4
|
+
version: 1.1.64
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- files.com
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2024-05-
|
|
11
|
+
date: 2024-05-02 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: addressable
|