files.com 1.0.58 → 1.0.59

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 95ef0f5e3fcf334ae2d2abecebcf49f85fe6b6527e5d8b5d8553480a0d794395
4
- data.tar.gz: 32bf7c269933adf563c492162df9a1d2ed234187623549ae1076144c540cc311
3
+ metadata.gz: c09bc8021adb4407a4e021795500c97bf535041760612308aacfaa0ff708975d
4
+ data.tar.gz: af4beceec1c7ffdf320aa36be097ee9c46a54752a6deeb785646885cf55914fd
5
5
  SHA512:
6
- metadata.gz: f257bdbe6e08c15938be2b3009c83c1127194d24d5fd93b4b3427a9a3f32046376ed91ea318890904170a258aa5644169db0af2c9c4fd5a49a745dd4015a62bb
7
- data.tar.gz: 7151db08884f1cd7aa4d33f18e25112abf3beaff0750c16212a3c6185836ec4aa5b900bc3707f80144e2eac057d2f8e4d8773a56136ab98ba89ce54b6bb4ed4d
6
+ metadata.gz: 18cc2d35f9e043ac4435c386412f2858dc19d3dd8632869a103ec3a018896786e39eeabb85e9efcc957813d7eea7246f871fb52d1332d0579b3baf5e9a6dddb0
7
+ data.tar.gz: dda980081bfec7c386cd762619c536a08c27b7ea5966f16e390b467ba2b951c38be5cc38f9df485c5b74faaa230c8033aef8c81964a5d3661243c524cd83c252
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.58
1
+ 1.0.59
@@ -13,6 +13,7 @@
13
13
  "s3_bucket": "my-bucket",
14
14
  "s3_region": "us-east-1",
15
15
  "server_certificate": "[certificate]",
16
+ "server_host_key": "[public key]",
16
17
  "server_type": "s3",
17
18
  "ssl": "always",
18
19
  "username": "user",
@@ -34,6 +35,7 @@
34
35
  * `s3_bucket` (string): S3 bucket name
35
36
  * `s3_region` (string): S3 region
36
37
  * `server_certificate` (string): Remote server certificate
38
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
37
39
  * `server_type` (string): Remote server type.
38
40
  * `ssl` (string): Should we require SSL?
39
41
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -98,6 +100,7 @@ Files::RemoteServer.create(
98
100
  s3_bucket: "my-bucket",
99
101
  s3_region: "us-east-1",
100
102
  server_certificate: "[certificate]",
103
+ server_host_key: "[public key]",
101
104
  server_type: "s3",
102
105
  ssl: "always",
103
106
  username: "user",
@@ -128,6 +131,7 @@ Files::RemoteServer.create(
128
131
  * `s3_bucket` (string): S3 bucket name
129
132
  * `s3_region` (string): S3 region
130
133
  * `server_certificate` (string): Remote server certificate
134
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
131
135
  * `server_type` (string): Remote server type.
132
136
  * `ssl` (string): Should we require SSL?
133
137
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -152,6 +156,7 @@ Files::RemoteServer.update(id,
152
156
  s3_bucket: "my-bucket",
153
157
  s3_region: "us-east-1",
154
158
  server_certificate: "[certificate]",
159
+ server_host_key: "[public key]",
155
160
  server_type: "s3",
156
161
  ssl: "always",
157
162
  username: "user",
@@ -183,6 +188,7 @@ Files::RemoteServer.update(id,
183
188
  * `s3_bucket` (string): S3 bucket name
184
189
  * `s3_region` (string): S3 region
185
190
  * `server_certificate` (string): Remote server certificate
191
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
186
192
  * `server_type` (string): Remote server type.
187
193
  * `ssl` (string): Should we require SSL?
188
194
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -221,6 +227,7 @@ remote_server.update(
221
227
  s3_bucket: "my-bucket",
222
228
  s3_region: "us-east-1",
223
229
  server_certificate: "[certificate]",
230
+ server_host_key: "[public key]",
224
231
  server_type: "s3",
225
232
  ssl: "always",
226
233
  username: "user",
@@ -252,6 +259,7 @@ remote_server.update(
252
259
  * `s3_bucket` (string): S3 bucket name
253
260
  * `s3_region` (string): S3 region
254
261
  * `server_certificate` (string): Remote server certificate
262
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
255
263
  * `server_type` (string): Remote server type.
256
264
  * `ssl` (string): Should we require SSL?
257
265
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -90,6 +90,15 @@ module Files
90
90
  @attributes[:server_certificate] = value
91
91
  end
92
92
 
93
+ # string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
94
+ def server_host_key
95
+ @attributes[:server_host_key]
96
+ end
97
+
98
+ def server_host_key=(value)
99
+ @attributes[:server_host_key] = value
100
+ end
101
+
93
102
  # string - Remote server type.
94
103
  def server_type
95
104
  @attributes[:server_type]
@@ -269,6 +278,7 @@ module Files
269
278
  # s3_bucket - string - S3 bucket name
270
279
  # s3_region - string - S3 region
271
280
  # server_certificate - string - Remote server certificate
281
+ # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
272
282
  # server_type - string - Remote server type.
273
283
  # ssl - string - Should we require SSL?
274
284
  # username - string - Remote server username. Not needed for S3 buckets.
@@ -299,6 +309,7 @@ module Files
299
309
  raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
300
310
  raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
301
311
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
312
+ raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
302
313
  raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
303
314
  raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
304
315
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
@@ -385,6 +396,7 @@ module Files
385
396
  # s3_bucket - string - S3 bucket name
386
397
  # s3_region - string - S3 region
387
398
  # server_certificate - string - Remote server certificate
399
+ # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
388
400
  # server_type - string - Remote server type.
389
401
  # ssl - string - Should we require SSL?
390
402
  # username - string - Remote server username. Not needed for S3 buckets.
@@ -411,6 +423,7 @@ module Files
411
423
  raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
412
424
  raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
413
425
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
426
+ raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
414
427
  raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
415
428
  raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
416
429
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
@@ -442,6 +455,7 @@ module Files
442
455
  # s3_bucket - string - S3 bucket name
443
456
  # s3_region - string - S3 region
444
457
  # server_certificate - string - Remote server certificate
458
+ # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
445
459
  # server_type - string - Remote server type.
446
460
  # ssl - string - Should we require SSL?
447
461
  # username - string - Remote server username. Not needed for S3 buckets.
@@ -471,6 +485,7 @@ module Files
471
485
  raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
472
486
  raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
473
487
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
488
+ raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
474
489
  raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
475
490
  raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
476
491
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.58
4
+ version: 1.0.59
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-05-28 00:00:00.000000000 Z
11
+ date: 2020-05-29 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: faraday