files.com 1.0.58 → 1.0.59

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 95ef0f5e3fcf334ae2d2abecebcf49f85fe6b6527e5d8b5d8553480a0d794395
4
- data.tar.gz: 32bf7c269933adf563c492162df9a1d2ed234187623549ae1076144c540cc311
3
+ metadata.gz: c09bc8021adb4407a4e021795500c97bf535041760612308aacfaa0ff708975d
4
+ data.tar.gz: af4beceec1c7ffdf320aa36be097ee9c46a54752a6deeb785646885cf55914fd
5
5
  SHA512:
6
- metadata.gz: f257bdbe6e08c15938be2b3009c83c1127194d24d5fd93b4b3427a9a3f32046376ed91ea318890904170a258aa5644169db0af2c9c4fd5a49a745dd4015a62bb
7
- data.tar.gz: 7151db08884f1cd7aa4d33f18e25112abf3beaff0750c16212a3c6185836ec4aa5b900bc3707f80144e2eac057d2f8e4d8773a56136ab98ba89ce54b6bb4ed4d
6
+ metadata.gz: 18cc2d35f9e043ac4435c386412f2858dc19d3dd8632869a103ec3a018896786e39eeabb85e9efcc957813d7eea7246f871fb52d1332d0579b3baf5e9a6dddb0
7
+ data.tar.gz: dda980081bfec7c386cd762619c536a08c27b7ea5966f16e390b467ba2b951c38be5cc38f9df485c5b74faaa230c8033aef8c81964a5d3661243c524cd83c252
data/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.58
1
+ 1.0.59
@@ -13,6 +13,7 @@
13
13
  "s3_bucket": "my-bucket",
14
14
  "s3_region": "us-east-1",
15
15
  "server_certificate": "[certificate]",
16
+ "server_host_key": "[public key]",
16
17
  "server_type": "s3",
17
18
  "ssl": "always",
18
19
  "username": "user",
@@ -34,6 +35,7 @@
34
35
  * `s3_bucket` (string): S3 bucket name
35
36
  * `s3_region` (string): S3 region
36
37
  * `server_certificate` (string): Remote server certificate
38
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
37
39
  * `server_type` (string): Remote server type.
38
40
  * `ssl` (string): Should we require SSL?
39
41
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -98,6 +100,7 @@ Files::RemoteServer.create(
98
100
  s3_bucket: "my-bucket",
99
101
  s3_region: "us-east-1",
100
102
  server_certificate: "[certificate]",
103
+ server_host_key: "[public key]",
101
104
  server_type: "s3",
102
105
  ssl: "always",
103
106
  username: "user",
@@ -128,6 +131,7 @@ Files::RemoteServer.create(
128
131
  * `s3_bucket` (string): S3 bucket name
129
132
  * `s3_region` (string): S3 region
130
133
  * `server_certificate` (string): Remote server certificate
134
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
131
135
  * `server_type` (string): Remote server type.
132
136
  * `ssl` (string): Should we require SSL?
133
137
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -152,6 +156,7 @@ Files::RemoteServer.update(id,
152
156
  s3_bucket: "my-bucket",
153
157
  s3_region: "us-east-1",
154
158
  server_certificate: "[certificate]",
159
+ server_host_key: "[public key]",
155
160
  server_type: "s3",
156
161
  ssl: "always",
157
162
  username: "user",
@@ -183,6 +188,7 @@ Files::RemoteServer.update(id,
183
188
  * `s3_bucket` (string): S3 bucket name
184
189
  * `s3_region` (string): S3 region
185
190
  * `server_certificate` (string): Remote server certificate
191
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
186
192
  * `server_type` (string): Remote server type.
187
193
  * `ssl` (string): Should we require SSL?
188
194
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -221,6 +227,7 @@ remote_server.update(
221
227
  s3_bucket: "my-bucket",
222
228
  s3_region: "us-east-1",
223
229
  server_certificate: "[certificate]",
230
+ server_host_key: "[public key]",
224
231
  server_type: "s3",
225
232
  ssl: "always",
226
233
  username: "user",
@@ -252,6 +259,7 @@ remote_server.update(
252
259
  * `s3_bucket` (string): S3 bucket name
253
260
  * `s3_region` (string): S3 region
254
261
  * `server_certificate` (string): Remote server certificate
262
+ * `server_host_key` (string): Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
255
263
  * `server_type` (string): Remote server type.
256
264
  * `ssl` (string): Should we require SSL?
257
265
  * `username` (string): Remote server username. Not needed for S3 buckets.
@@ -90,6 +90,15 @@ module Files
90
90
  @attributes[:server_certificate] = value
91
91
  end
92
92
 
93
+ # string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
94
+ def server_host_key
95
+ @attributes[:server_host_key]
96
+ end
97
+
98
+ def server_host_key=(value)
99
+ @attributes[:server_host_key] = value
100
+ end
101
+
93
102
  # string - Remote server type.
94
103
  def server_type
95
104
  @attributes[:server_type]
@@ -269,6 +278,7 @@ module Files
269
278
  # s3_bucket - string - S3 bucket name
270
279
  # s3_region - string - S3 region
271
280
  # server_certificate - string - Remote server certificate
281
+ # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
272
282
  # server_type - string - Remote server type.
273
283
  # ssl - string - Should we require SSL?
274
284
  # username - string - Remote server username. Not needed for S3 buckets.
@@ -299,6 +309,7 @@ module Files
299
309
  raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
300
310
  raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
301
311
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
312
+ raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
302
313
  raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
303
314
  raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
304
315
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
@@ -385,6 +396,7 @@ module Files
385
396
  # s3_bucket - string - S3 bucket name
386
397
  # s3_region - string - S3 region
387
398
  # server_certificate - string - Remote server certificate
399
+ # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
388
400
  # server_type - string - Remote server type.
389
401
  # ssl - string - Should we require SSL?
390
402
  # username - string - Remote server username. Not needed for S3 buckets.
@@ -411,6 +423,7 @@ module Files
411
423
  raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
412
424
  raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
413
425
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
426
+ raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
414
427
  raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
415
428
  raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
416
429
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
@@ -442,6 +455,7 @@ module Files
442
455
  # s3_bucket - string - S3 bucket name
443
456
  # s3_region - string - S3 region
444
457
  # server_certificate - string - Remote server certificate
458
+ # server_host_key - string - Remote server SSH Host Key. If provided, we will require that the server host key matches the provided key. Uses OpenSSH format similar to what would go into ~/.ssh/known_hosts
445
459
  # server_type - string - Remote server type.
446
460
  # ssl - string - Should we require SSL?
447
461
  # username - string - Remote server username. Not needed for S3 buckets.
@@ -471,6 +485,7 @@ module Files
471
485
  raise InvalidParameterError.new("Bad parameter: s3_bucket must be an String") if params.dig(:s3_bucket) and !params.dig(:s3_bucket).is_a?(String)
472
486
  raise InvalidParameterError.new("Bad parameter: s3_region must be an String") if params.dig(:s3_region) and !params.dig(:s3_region).is_a?(String)
473
487
  raise InvalidParameterError.new("Bad parameter: server_certificate must be an String") if params.dig(:server_certificate) and !params.dig(:server_certificate).is_a?(String)
488
+ raise InvalidParameterError.new("Bad parameter: server_host_key must be an String") if params.dig(:server_host_key) and !params.dig(:server_host_key).is_a?(String)
474
489
  raise InvalidParameterError.new("Bad parameter: server_type must be an String") if params.dig(:server_type) and !params.dig(:server_type).is_a?(String)
475
490
  raise InvalidParameterError.new("Bad parameter: ssl must be an String") if params.dig(:ssl) and !params.dig(:ssl).is_a?(String)
476
491
  raise InvalidParameterError.new("Bad parameter: username must be an String") if params.dig(:username) and !params.dig(:username).is_a?(String)
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: files.com
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.0.58
4
+ version: 1.0.59
5
5
  platform: ruby
6
6
  authors:
7
7
  - files.com
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-05-28 00:00:00.000000000 Z
11
+ date: 2020-05-29 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: faraday