files.com 1.0.211 → 1.0.212
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/_VERSION +1 -1
- data/docs/file.md +2 -2
- data/docs/public_ip_address.md +5 -1
- data/docs/session.md +3 -1
- data/docs/site.md +7 -2
- data/lib/files.com/models/file.rb +5 -1
- data/lib/files.com/models/public_ip_address.rb +10 -0
- data/lib/files.com/models/session.rb +10 -1
- data/lib/files.com/models/site.rb +8 -2
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: b47255f7698ba6a1ebe5f8f8ba855d33aa546db17d89d212851219add42b5c2c
|
4
|
+
data.tar.gz: 92b8059a5f8a8d9bda18855fccf4e31a6109bd9a44c785c47ad5b0ab87f54bcf
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 7f655df9c1e037f0d8e88b7f17b44584dcb2a393d4948066d4098522a9389c8d868e9366d1865d633e780acd220b6127a4b5f20d412a8e7f75b39558a3e91adc
|
7
|
+
data.tar.gz: b20cb722bd517b94b5b5344c883b5048d598794d66ea45b97388e44afee89786fc7b1393e21acab4b7e2ee453092f00f3b19c64c4a3c0d379a23471ca6099c89
|
data/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.0.
|
1
|
+
1.0.212
|
data/docs/file.md
CHANGED
@@ -150,10 +150,10 @@ Files::File.delete(path,
|
|
150
150
|
|
151
151
|
---
|
152
152
|
|
153
|
-
##
|
153
|
+
## Find file/folder by path
|
154
154
|
|
155
155
|
```
|
156
|
-
Files::File.
|
156
|
+
Files::File.find(path,
|
157
157
|
with_previews: true,
|
158
158
|
with_priority_color: true
|
159
159
|
)
|
data/docs/public_ip_address.md
CHANGED
@@ -5,9 +5,13 @@
|
|
5
5
|
```
|
6
6
|
{
|
7
7
|
"ip_address": "1.1.1.1",
|
8
|
-
"server_name": "server-1"
|
8
|
+
"server_name": "server-1",
|
9
|
+
"ftp_enabled": "",
|
10
|
+
"sftp_enabled": ""
|
9
11
|
}
|
10
12
|
```
|
11
13
|
|
12
14
|
* `ip_address` (string): The public IP address.
|
13
15
|
* `server_name` (string): The name of the frontend server.
|
16
|
+
* `ftp_enabled` (string):
|
17
|
+
* `sftp_enabled` (string):
|
data/docs/session.md
CHANGED
@@ -12,6 +12,7 @@
|
|
12
12
|
"multiple_regions": true,
|
13
13
|
"read_only": true,
|
14
14
|
"root_path": "",
|
15
|
+
"sftp_insecure_ciphers": true,
|
15
16
|
"site_id": 1,
|
16
17
|
"ssl_required": true,
|
17
18
|
"tls_disabled": true,
|
@@ -33,9 +34,10 @@
|
|
33
34
|
* `multiple_regions` (boolean): Can access multiple regions?
|
34
35
|
* `read_only` (boolean): Is this session read only?
|
35
36
|
* `root_path` (string): Initial root path to start the user's session in.
|
37
|
+
* `sftp_insecure_ciphers` (boolean): Are insecure SFTP ciphers allowed for this user? (If this is set to true, the site administrator has signaled that it is ok to use less secure SSH ciphers for this user.)
|
36
38
|
* `site_id` (int64): Site ID
|
37
39
|
* `ssl_required` (boolean): Is SSL required for this user? (If so, ensure all your communications with this user use SSL.)
|
38
|
-
* `tls_disabled` (boolean):
|
40
|
+
* `tls_disabled` (boolean): Aee insecure TLS versions allowed for this user? (If this is set to true, the site administrator has signaled that it is ok to use less secure TLS versions for this user.)
|
39
41
|
* `two_factor_setup_needed` (boolean): If true, this user needs to add a Two Factor Authentication method before performing any further actions.
|
40
42
|
* `allowed_2fa_method_sms` (boolean): Sent only if 2FA setup is needed. Is SMS two factor authentication allowed?
|
41
43
|
* `allowed_2fa_method_totp` (boolean): Sent only if 2FA setup is needed. Is TOTP two factor authentication allowed?
|
data/docs/site.md
CHANGED
@@ -115,6 +115,7 @@
|
|
115
115
|
"multiple_regions": true,
|
116
116
|
"read_only": true,
|
117
117
|
"root_path": "",
|
118
|
+
"sftp_insecure_ciphers": false,
|
118
119
|
"site_id": 1,
|
119
120
|
"ssl_required": true,
|
120
121
|
"tls_disabled": false,
|
@@ -128,6 +129,7 @@
|
|
128
129
|
},
|
129
130
|
"session_pinned_by_ip": true,
|
130
131
|
"sftp_enabled": true,
|
132
|
+
"sftp_insecure_ciphers": true,
|
131
133
|
"sftp_user_root_enabled": true,
|
132
134
|
"sharing_enabled": true,
|
133
135
|
"show_request_access_link": true,
|
@@ -303,6 +305,7 @@
|
|
303
305
|
* `session`: Current session
|
304
306
|
* `session_pinned_by_ip` (boolean): Are sessions locked to the same IP? (i.e. do users need to log in again if they change IPs?)
|
305
307
|
* `sftp_enabled` (boolean): Is SFTP enabled?
|
308
|
+
* `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
306
309
|
* `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
|
307
310
|
* `sharing_enabled` (boolean): Allow bundle creation
|
308
311
|
* `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
|
@@ -317,7 +320,7 @@
|
|
317
320
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
318
321
|
* `subdomain` (string): Site subdomain
|
319
322
|
* `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
|
320
|
-
* `tls_disabled` (boolean):
|
323
|
+
* `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
|
321
324
|
* `trial_days_left` (int64): Number of days left in trial
|
322
325
|
* `trial_until` (date-time): When does this Site trial expire?
|
323
326
|
* `updated_at` (date-time): Last time this Site was updated
|
@@ -387,6 +390,7 @@ Files::Site.update(
|
|
387
390
|
session_expiry: 1.0,
|
388
391
|
ssl_required: true,
|
389
392
|
tls_disabled: true,
|
393
|
+
sftp_insecure_ciphers: true,
|
390
394
|
user_lockout: true,
|
391
395
|
user_lockout_tries: 1,
|
392
396
|
user_lockout_within: 1,
|
@@ -487,7 +491,8 @@ Files::Site.update(
|
|
487
491
|
* `office_integration_available` (boolean): Allow users to use Office for the web?
|
488
492
|
* `session_expiry` (double): Session expiry in hours
|
489
493
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
490
|
-
* `tls_disabled` (boolean):
|
494
|
+
* `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
|
495
|
+
* `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
491
496
|
* `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
|
492
497
|
* `user_lockout_tries` (int64): Number of login tries within `user_lockout_within` hours before users are locked out
|
493
498
|
* `user_lockout_within` (int64): Number of hours for user lockout window
|
@@ -1017,7 +1017,7 @@ module Files
|
|
1017
1017
|
# preview_size - string - Request a preview size. Can be `small` (default), `large`, `xlarge`, or `pdf`.
|
1018
1018
|
# with_previews - boolean - Include file preview information?
|
1019
1019
|
# with_priority_color - boolean - Include file priority color information?
|
1020
|
-
def self.
|
1020
|
+
def self.find(path, params = {}, options = {})
|
1021
1021
|
params ||= {}
|
1022
1022
|
params[:path] = path
|
1023
1023
|
raise InvalidParameterError.new("Bad parameter: path must be an String") if params.dig(:path) and !params.dig(:path).is_a?(String)
|
@@ -1028,6 +1028,10 @@ module Files
|
|
1028
1028
|
File.new(response.data, options)
|
1029
1029
|
end
|
1030
1030
|
|
1031
|
+
def self.get(path, params = {}, options = {})
|
1032
|
+
find(path, params, options)
|
1033
|
+
end
|
1034
|
+
|
1031
1035
|
# Copy file/folder
|
1032
1036
|
#
|
1033
1037
|
# Parameters:
|
@@ -85,6 +85,15 @@ module Files
|
|
85
85
|
@attributes[:root_path] = value
|
86
86
|
end
|
87
87
|
|
88
|
+
# boolean - Are insecure SFTP ciphers allowed for this user? (If this is set to true, the site administrator has signaled that it is ok to use less secure SSH ciphers for this user.)
|
89
|
+
def sftp_insecure_ciphers
|
90
|
+
@attributes[:sftp_insecure_ciphers]
|
91
|
+
end
|
92
|
+
|
93
|
+
def sftp_insecure_ciphers=(value)
|
94
|
+
@attributes[:sftp_insecure_ciphers] = value
|
95
|
+
end
|
96
|
+
|
88
97
|
# int64 - Site ID
|
89
98
|
def site_id
|
90
99
|
@attributes[:site_id]
|
@@ -103,7 +112,7 @@ module Files
|
|
103
112
|
@attributes[:ssl_required] = value
|
104
113
|
end
|
105
114
|
|
106
|
-
# boolean -
|
115
|
+
# boolean - Aee insecure TLS versions allowed for this user? (If this is set to true, the site administrator has signaled that it is ok to use less secure TLS versions for this user.)
|
107
116
|
def tls_disabled
|
108
117
|
@attributes[:tls_disabled]
|
109
118
|
end
|
@@ -459,6 +459,11 @@ module Files
|
|
459
459
|
@attributes[:sftp_enabled]
|
460
460
|
end
|
461
461
|
|
462
|
+
# boolean - Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
463
|
+
def sftp_insecure_ciphers
|
464
|
+
@attributes[:sftp_insecure_ciphers]
|
465
|
+
end
|
466
|
+
|
462
467
|
# boolean - Use user FTP roots also for SFTP?
|
463
468
|
def sftp_user_root_enabled
|
464
469
|
@attributes[:sftp_user_root_enabled]
|
@@ -529,7 +534,7 @@ module Files
|
|
529
534
|
@attributes[:switch_to_plan_date]
|
530
535
|
end
|
531
536
|
|
532
|
-
# boolean -
|
537
|
+
# boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
|
533
538
|
def tls_disabled
|
534
539
|
@attributes[:tls_disabled]
|
535
540
|
end
|
@@ -652,7 +657,8 @@ module Files
|
|
652
657
|
# office_integration_available - boolean - Allow users to use Office for the web?
|
653
658
|
# session_expiry - double - Session expiry in hours
|
654
659
|
# ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
655
|
-
# tls_disabled - boolean -
|
660
|
+
# tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
|
661
|
+
# sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
656
662
|
# user_lockout - boolean - Will users be locked out after incorrect login attempts?
|
657
663
|
# user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
|
658
664
|
# user_lockout_within - int64 - Number of hours for user lockout window
|