files.com 1.0.217 → 1.0.219

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (52) hide show
  1. package/_VERSION +1 -1
  2. package/docs/models/AccountLineItem.md +3 -19
  3. package/docs/models/ActionNotificationExport.md +1 -1
  4. package/docs/models/ApiKey.md +4 -2
  5. package/docs/models/App.md +17 -15
  6. package/docs/models/As2IncomingMessage.md +29 -25
  7. package/docs/models/As2OutgoingMessage.md +24 -20
  8. package/docs/models/As2Partner.md +15 -14
  9. package/docs/models/As2Station.md +18 -18
  10. package/docs/models/Automation.md +28 -40
  11. package/docs/models/Behavior.md +17 -12
  12. package/docs/models/Bundle.md +8 -66
  13. package/docs/models/BundleDownload.md +2 -2
  14. package/docs/models/BundleRegistration.md +5 -3
  15. package/docs/models/Clickwrap.md +12 -6
  16. package/docs/models/DnsRecord.md +1 -1
  17. package/docs/models/ExternalEvent.md +7 -7
  18. package/docs/models/File.md +16 -28
  19. package/docs/models/FileAction.md +1 -1
  20. package/docs/models/FileComment.md +2 -8
  21. package/docs/models/FileUploadPart.md +11 -5
  22. package/docs/models/Folder.md +1 -7
  23. package/docs/models/FormFieldSet.md +4 -30
  24. package/docs/models/Group.md +6 -4
  25. package/docs/models/GroupUser.md +2 -2
  26. package/docs/models/HistoryExport.md +1 -1
  27. package/docs/models/InboxRegistration.md +5 -3
  28. package/docs/models/InboxUpload.md +2 -2
  29. package/docs/models/Invoice.md +3 -19
  30. package/docs/models/Lock.md +1 -1
  31. package/docs/models/Message.md +2 -20
  32. package/docs/models/MessageComment.md +2 -8
  33. package/docs/models/Notification.md +4 -4
  34. package/docs/models/Payment.md +3 -19
  35. package/docs/models/Permission.md +4 -2
  36. package/docs/models/PublicIpAddress.md +2 -2
  37. package/docs/models/RemoteServer.md +12 -6
  38. package/docs/models/Request.md +6 -5
  39. package/docs/models/SettingsChange.md +1 -1
  40. package/docs/models/SftpHostKey.md +8 -10
  41. package/docs/models/Site.md +47 -114
  42. package/docs/models/SsoStrategy.md +12 -12
  43. package/docs/models/Status.md +4 -11
  44. package/docs/models/Style.md +4 -4
  45. package/docs/models/UsageDailySnapshot.md +11 -9
  46. package/docs/models/UsageSnapshot.md +3 -1
  47. package/docs/models/User.md +16 -12
  48. package/docs/models/UserRequest.md +1 -1
  49. package/docs/models/WebhookTest.md +4 -4
  50. package/lib/models/Site.js +104 -87
  51. package/package.json +1 -1
  52. package/src/models/Site.js +16 -0
@@ -14,21 +14,21 @@
14
14
  "api_keys_count": 1,
15
15
  "authenticate_until": "2000-01-01T01:00:00Z",
16
16
  "authentication_method": "password",
17
- "avatar_url": "",
17
+ "avatar_url": "example",
18
18
  "billing_permission": true,
19
19
  "bypass_site_allowed_ips": true,
20
20
  "bypass_inactive_disable": true,
21
21
  "created_at": "2000-01-01T01:00:00Z",
22
22
  "dav_permission": true,
23
23
  "disabled": true,
24
- "email": "john.doe@files.com",
24
+ "email": "example",
25
25
  "first_login_at": "2000-01-01T01:00:00Z",
26
26
  "ftp_permission": true,
27
- "group_ids": "",
27
+ "group_ids": "example",
28
28
  "header_text": "User-specific message.",
29
29
  "language": "en",
30
30
  "last_login_at": "2000-01-01T01:00:00Z",
31
- "last_protocol_cipher": "",
31
+ "last_protocol_cipher": "example",
32
32
  "lockout_expires": "2000-01-01T01:00:00Z",
33
33
  "name": "John Doe",
34
34
  "company": "ACME Corp.",
@@ -55,7 +55,7 @@
55
55
  "time_zone": "Pacific Time (US & Canada)",
56
56
  "type_of_2fa": "yubi",
57
57
  "updated_at": "2000-01-01T01:00:00Z",
58
- "user_root": ""
58
+ "user_root": "example"
59
59
  }
60
60
  ```
61
61
 
@@ -172,8 +172,9 @@ await User.find(id)
172
172
  ```
173
173
  await User.create({
174
174
  'avatar_delete': true,
175
- 'email': "john.doe@files.com",
175
+ 'email': "example",
176
176
  'group_id': 1,
177
+ 'group_ids': "example",
177
178
  'announcements_read': true,
178
179
  'allowed_ips': "127.0.0.1",
179
180
  'attachments_permission': true,
@@ -205,6 +206,7 @@ await User.create({
205
206
  'subscribe_to_newsletter': true,
206
207
  'require_2fa': "always_require",
207
208
  'time_zone': "Pacific Time (US & Canada)",
209
+ 'user_root': "example",
208
210
  'username': "user",
209
211
  })
210
212
  ```
@@ -311,8 +313,9 @@ const [user] = await User.list()
311
313
 
312
314
  await user.update({
313
315
  'avatar_delete': true,
314
- 'email': "john.doe@files.com",
316
+ 'email': "example",
315
317
  'group_id': 1,
318
+ 'group_ids': "example",
316
319
  'announcements_read': true,
317
320
  'allowed_ips': "127.0.0.1",
318
321
  'attachments_permission': true,
@@ -344,6 +347,7 @@ await user.update({
344
347
  'subscribe_to_newsletter': true,
345
348
  'require_2fa': "always_require",
346
349
  'time_zone': "Pacific Time (US & Canada)",
350
+ 'user_root': "example",
347
351
  'username': "user",
348
352
  })
349
353
  ```
@@ -410,21 +414,21 @@ await user.update({
410
414
  "api_keys_count": 1,
411
415
  "authenticate_until": "2000-01-01T01:00:00Z",
412
416
  "authentication_method": "password",
413
- "avatar_url": "",
417
+ "avatar_url": "example",
414
418
  "billing_permission": true,
415
419
  "bypass_site_allowed_ips": true,
416
420
  "bypass_inactive_disable": true,
417
421
  "created_at": "2000-01-01T01:00:00Z",
418
422
  "dav_permission": true,
419
423
  "disabled": true,
420
- "email": "john.doe@files.com",
424
+ "email": "example",
421
425
  "first_login_at": "2000-01-01T01:00:00Z",
422
426
  "ftp_permission": true,
423
- "group_ids": "",
427
+ "group_ids": "example",
424
428
  "header_text": "User-specific message.",
425
429
  "language": "en",
426
430
  "last_login_at": "2000-01-01T01:00:00Z",
427
- "last_protocol_cipher": "",
431
+ "last_protocol_cipher": "example",
428
432
  "lockout_expires": "2000-01-01T01:00:00Z",
429
433
  "name": "John Doe",
430
434
  "company": "ACME Corp.",
@@ -451,7 +455,7 @@ await user.update({
451
455
  "time_zone": "Pacific Time (US & Canada)",
452
456
  "type_of_2fa": "yubi",
453
457
  "updated_at": "2000-01-01T01:00:00Z",
454
- "user_root": ""
458
+ "user_root": "example"
455
459
  }
456
460
  ```
457
461
 
@@ -6,7 +6,7 @@
6
6
  {
7
7
  "id": 1,
8
8
  "name": "John Doe",
9
- "email": "john.doe@files.com",
9
+ "email": "example",
10
10
  "details": "Changed Departments"
11
11
  }
12
12
  ```
@@ -7,7 +7,7 @@
7
7
  "code": 200,
8
8
  "message": "",
9
9
  "status": "",
10
- "data": "",
10
+ "data": "example",
11
11
  "success": true
12
12
  }
13
13
  ```
@@ -36,10 +36,10 @@ await WebhookTest.create({
36
36
  'url': "https://www.site.com/...",
37
37
  'method': "GET",
38
38
  'encoding': "RAW",
39
- 'headers': "x-test-header => testvalue",
40
- 'body': "test-param => testvalue",
39
+ 'headers': {"x-test-header":"testvalue"},
40
+ 'body': {"test-param":"testvalue"},
41
41
  'raw_body': "test body",
42
- 'file_as_body': "false",
42
+ 'file_as_body': true,
43
43
  'file_form_field': "upload_file_data",
44
44
  'action': "test",
45
45
  })
@@ -271,6 +271,15 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
271
271
  (0, _defineProperty2.default)(this, "getMaxPriorPasswords", function () {
272
272
  return _this.attributes.max_prior_passwords;
273
273
  });
274
+ (0, _defineProperty2.default)(this, "getMotdText", function () {
275
+ return _this.attributes.motd_text;
276
+ });
277
+ (0, _defineProperty2.default)(this, "getMotdUseForFtp", function () {
278
+ return _this.attributes.motd_use_for_ftp;
279
+ });
280
+ (0, _defineProperty2.default)(this, "getMotdUseForSftp", function () {
281
+ return _this.attributes.motd_use_for_sftp;
282
+ });
274
283
  (0, _defineProperty2.default)(this, "getNextBillingAmount", function () {
275
284
  return _this.attributes.next_billing_amount;
276
285
  });
@@ -637,350 +646,358 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
637
646
  throw new errors.InvalidParameterError("Bad parameter: welcome_screen must be of type String, received ".concat((0, _utils.getType)(params['welcome_screen'])));
638
647
 
639
648
  case 32:
640
- if (!(params['user_lockout_tries'] && !(0, _utils.isInt)(params['user_lockout_tries']))) {
649
+ if (!(params['motd_text'] && !(0, _utils.isString)(params['motd_text']))) {
641
650
  _context3.next = 34;
642
651
  break;
643
652
  }
644
653
 
645
- throw new errors.InvalidParameterError("Bad parameter: user_lockout_tries must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_tries'])));
654
+ throw new errors.InvalidParameterError("Bad parameter: motd_text must be of type String, received ".concat((0, _utils.getType)(params['motd_text'])));
646
655
 
647
656
  case 34:
648
- if (!(params['user_lockout_within'] && !(0, _utils.isInt)(params['user_lockout_within']))) {
657
+ if (!(params['user_lockout_tries'] && !(0, _utils.isInt)(params['user_lockout_tries']))) {
649
658
  _context3.next = 36;
650
659
  break;
651
660
  }
652
661
 
653
- throw new errors.InvalidParameterError("Bad parameter: user_lockout_within must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_within'])));
662
+ throw new errors.InvalidParameterError("Bad parameter: user_lockout_tries must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_tries'])));
654
663
 
655
664
  case 36:
656
- if (!(params['user_lockout_lock_period'] && !(0, _utils.isInt)(params['user_lockout_lock_period']))) {
665
+ if (!(params['user_lockout_within'] && !(0, _utils.isInt)(params['user_lockout_within']))) {
657
666
  _context3.next = 38;
658
667
  break;
659
668
  }
660
669
 
661
- throw new errors.InvalidParameterError("Bad parameter: user_lockout_lock_period must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_lock_period'])));
670
+ throw new errors.InvalidParameterError("Bad parameter: user_lockout_within must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_within'])));
662
671
 
663
672
  case 38:
664
- if (!(params['allowed_countries'] && !(0, _utils.isString)(params['allowed_countries']))) {
673
+ if (!(params['user_lockout_lock_period'] && !(0, _utils.isInt)(params['user_lockout_lock_period']))) {
665
674
  _context3.next = 40;
666
675
  break;
667
676
  }
668
677
 
669
- throw new errors.InvalidParameterError("Bad parameter: allowed_countries must be of type String, received ".concat((0, _utils.getType)(params['allowed_countries'])));
678
+ throw new errors.InvalidParameterError("Bad parameter: user_lockout_lock_period must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_lock_period'])));
670
679
 
671
680
  case 40:
672
- if (!(params['allowed_ips'] && !(0, _utils.isString)(params['allowed_ips']))) {
681
+ if (!(params['allowed_countries'] && !(0, _utils.isString)(params['allowed_countries']))) {
673
682
  _context3.next = 42;
674
683
  break;
675
684
  }
676
685
 
677
- throw new errors.InvalidParameterError("Bad parameter: allowed_ips must be of type String, received ".concat((0, _utils.getType)(params['allowed_ips'])));
686
+ throw new errors.InvalidParameterError("Bad parameter: allowed_countries must be of type String, received ".concat((0, _utils.getType)(params['allowed_countries'])));
678
687
 
679
688
  case 42:
680
- if (!(params['disallowed_countries'] && !(0, _utils.isString)(params['disallowed_countries']))) {
689
+ if (!(params['allowed_ips'] && !(0, _utils.isString)(params['allowed_ips']))) {
681
690
  _context3.next = 44;
682
691
  break;
683
692
  }
684
693
 
685
- throw new errors.InvalidParameterError("Bad parameter: disallowed_countries must be of type String, received ".concat((0, _utils.getType)(params['disallowed_countries'])));
694
+ throw new errors.InvalidParameterError("Bad parameter: allowed_ips must be of type String, received ".concat((0, _utils.getType)(params['allowed_ips'])));
686
695
 
687
696
  case 44:
688
- if (!(params['days_to_retain_backups'] && !(0, _utils.isInt)(params['days_to_retain_backups']))) {
697
+ if (!(params['disallowed_countries'] && !(0, _utils.isString)(params['disallowed_countries']))) {
689
698
  _context3.next = 46;
690
699
  break;
691
700
  }
692
701
 
693
- throw new errors.InvalidParameterError("Bad parameter: days_to_retain_backups must be of type Int, received ".concat((0, _utils.getType)(params['days_to_retain_backups'])));
702
+ throw new errors.InvalidParameterError("Bad parameter: disallowed_countries must be of type String, received ".concat((0, _utils.getType)(params['disallowed_countries'])));
694
703
 
695
704
  case 46:
696
- if (!(params['max_prior_passwords'] && !(0, _utils.isInt)(params['max_prior_passwords']))) {
705
+ if (!(params['days_to_retain_backups'] && !(0, _utils.isInt)(params['days_to_retain_backups']))) {
697
706
  _context3.next = 48;
698
707
  break;
699
708
  }
700
709
 
701
- throw new errors.InvalidParameterError("Bad parameter: max_prior_passwords must be of type Int, received ".concat((0, _utils.getType)(params['max_prior_passwords'])));
710
+ throw new errors.InvalidParameterError("Bad parameter: days_to_retain_backups must be of type Int, received ".concat((0, _utils.getType)(params['days_to_retain_backups'])));
702
711
 
703
712
  case 48:
704
- if (!(params['password_validity_days'] && !(0, _utils.isInt)(params['password_validity_days']))) {
713
+ if (!(params['max_prior_passwords'] && !(0, _utils.isInt)(params['max_prior_passwords']))) {
705
714
  _context3.next = 50;
706
715
  break;
707
716
  }
708
717
 
709
- throw new errors.InvalidParameterError("Bad parameter: password_validity_days must be of type Int, received ".concat((0, _utils.getType)(params['password_validity_days'])));
718
+ throw new errors.InvalidParameterError("Bad parameter: max_prior_passwords must be of type Int, received ".concat((0, _utils.getType)(params['max_prior_passwords'])));
710
719
 
711
720
  case 50:
712
- if (!(params['password_min_length'] && !(0, _utils.isInt)(params['password_min_length']))) {
721
+ if (!(params['password_validity_days'] && !(0, _utils.isInt)(params['password_validity_days']))) {
713
722
  _context3.next = 52;
714
723
  break;
715
724
  }
716
725
 
717
- throw new errors.InvalidParameterError("Bad parameter: password_min_length must be of type Int, received ".concat((0, _utils.getType)(params['password_min_length'])));
726
+ throw new errors.InvalidParameterError("Bad parameter: password_validity_days must be of type Int, received ".concat((0, _utils.getType)(params['password_validity_days'])));
718
727
 
719
728
  case 52:
720
- if (!(params['disable_users_from_inactivity_period_days'] && !(0, _utils.isInt)(params['disable_users_from_inactivity_period_days']))) {
729
+ if (!(params['password_min_length'] && !(0, _utils.isInt)(params['password_min_length']))) {
721
730
  _context3.next = 54;
722
731
  break;
723
732
  }
724
733
 
725
- throw new errors.InvalidParameterError("Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ".concat((0, _utils.getType)(params['disable_users_from_inactivity_period_days'])));
734
+ throw new errors.InvalidParameterError("Bad parameter: password_min_length must be of type Int, received ".concat((0, _utils.getType)(params['password_min_length'])));
726
735
 
727
736
  case 54:
728
- if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
737
+ if (!(params['disable_users_from_inactivity_period_days'] && !(0, _utils.isInt)(params['disable_users_from_inactivity_period_days']))) {
729
738
  _context3.next = 56;
730
739
  break;
731
740
  }
732
741
 
733
- throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
742
+ throw new errors.InvalidParameterError("Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ".concat((0, _utils.getType)(params['disable_users_from_inactivity_period_days'])));
734
743
 
735
744
  case 56:
736
- if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
745
+ if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
737
746
  _context3.next = 58;
738
747
  break;
739
748
  }
740
749
 
741
- throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
750
+ throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
742
751
 
743
752
  case 58:
744
- if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
753
+ if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
745
754
  _context3.next = 60;
746
755
  break;
747
756
  }
748
757
 
749
- throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
758
+ throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
750
759
 
751
760
  case 60:
752
- if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
761
+ if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
753
762
  _context3.next = 62;
754
763
  break;
755
764
  }
756
765
 
757
- throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
766
+ throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
758
767
 
759
768
  case 62:
760
- if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
769
+ if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
761
770
  _context3.next = 64;
762
771
  break;
763
772
  }
764
773
 
765
- throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
774
+ throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
766
775
 
767
776
  case 64:
768
- if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
777
+ if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
769
778
  _context3.next = 66;
770
779
  break;
771
780
  }
772
781
 
773
- throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
782
+ throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
774
783
 
775
784
  case 66:
776
- if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
785
+ if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
777
786
  _context3.next = 68;
778
787
  break;
779
788
  }
780
789
 
781
- throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
790
+ throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
782
791
 
783
792
  case 68:
784
- if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
793
+ if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
785
794
  _context3.next = 70;
786
795
  break;
787
796
  }
788
797
 
789
- throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
798
+ throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
790
799
 
791
800
  case 70:
792
- if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
801
+ if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
793
802
  _context3.next = 72;
794
803
  break;
795
804
  }
796
805
 
797
- throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
806
+ throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
798
807
 
799
808
  case 72:
800
- if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
809
+ if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
801
810
  _context3.next = 74;
802
811
  break;
803
812
  }
804
813
 
805
- throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
814
+ throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
806
815
 
807
816
  case 74:
808
- if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
817
+ if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
809
818
  _context3.next = 76;
810
819
  break;
811
820
  }
812
821
 
813
- throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
822
+ throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
814
823
 
815
824
  case 76:
816
- if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
825
+ if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
817
826
  _context3.next = 78;
818
827
  break;
819
828
  }
820
829
 
821
- throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
830
+ throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
822
831
 
823
832
  case 78:
824
- if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
833
+ if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
825
834
  _context3.next = 80;
826
835
  break;
827
836
  }
828
837
 
829
- throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
838
+ throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
830
839
 
831
840
  case 80:
832
- if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
841
+ if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
833
842
  _context3.next = 82;
834
843
  break;
835
844
  }
836
845
 
837
- throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
846
+ throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
838
847
 
839
848
  case 82:
840
- if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
849
+ if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
841
850
  _context3.next = 84;
842
851
  break;
843
852
  }
844
853
 
845
- throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
854
+ throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
846
855
 
847
856
  case 84:
848
- if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
857
+ if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
849
858
  _context3.next = 86;
850
859
  break;
851
860
  }
852
861
 
853
- throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
862
+ throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
854
863
 
855
864
  case 86:
856
- if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
865
+ if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
857
866
  _context3.next = 88;
858
867
  break;
859
868
  }
860
869
 
861
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
870
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
862
871
 
863
872
  case 88:
864
- if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
873
+ if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
865
874
  _context3.next = 90;
866
875
  break;
867
876
  }
868
877
 
869
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
878
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
870
879
 
871
880
  case 90:
872
- if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
881
+ if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
873
882
  _context3.next = 92;
874
883
  break;
875
884
  }
876
885
 
877
- throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
886
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
878
887
 
879
888
  case 92:
880
- if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
889
+ if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
881
890
  _context3.next = 94;
882
891
  break;
883
892
  }
884
893
 
885
- throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
894
+ throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
886
895
 
887
896
  case 94:
888
- if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
897
+ if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
889
898
  _context3.next = 96;
890
899
  break;
891
900
  }
892
901
 
893
- throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
902
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
894
903
 
895
904
  case 96:
896
- if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
905
+ if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
897
906
  _context3.next = 98;
898
907
  break;
899
908
  }
900
909
 
901
- throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
910
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
902
911
 
903
912
  case 98:
904
- if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
913
+ if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
905
914
  _context3.next = 100;
906
915
  break;
907
916
  }
908
917
 
909
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
918
+ throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
910
919
 
911
920
  case 100:
912
- if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
921
+ if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
913
922
  _context3.next = 102;
914
923
  break;
915
924
  }
916
925
 
917
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
926
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
918
927
 
919
928
  case 102:
920
- if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
929
+ if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
921
930
  _context3.next = 104;
922
931
  break;
923
932
  }
924
933
 
925
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
934
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
926
935
 
927
936
  case 104:
928
- if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
937
+ if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
929
938
  _context3.next = 106;
930
939
  break;
931
940
  }
932
941
 
933
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
942
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
934
943
 
935
944
  case 106:
936
- if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
945
+ if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
937
946
  _context3.next = 108;
938
947
  break;
939
948
  }
940
949
 
941
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
950
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
942
951
 
943
952
  case 108:
944
- if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
953
+ if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
945
954
  _context3.next = 110;
946
955
  break;
947
956
  }
948
957
 
949
- throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
958
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
950
959
 
951
960
  case 110:
952
- if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
961
+ if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
953
962
  _context3.next = 112;
954
963
  break;
955
964
  }
956
965
 
957
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
966
+ throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
958
967
 
959
968
  case 112:
960
- if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
969
+ if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
961
970
  _context3.next = 114;
962
971
  break;
963
972
  }
964
973
 
965
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
974
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
966
975
 
967
976
  case 114:
968
- if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
977
+ if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
969
978
  _context3.next = 116;
970
979
  break;
971
980
  }
972
981
 
973
- throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
982
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
974
983
 
975
984
  case 116:
976
- _context3.next = 118;
977
- return _Api.default.sendRequest("/site", 'PATCH', params, options);
985
+ if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
986
+ _context3.next = 118;
987
+ break;
988
+ }
989
+
990
+ throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
978
991
 
979
992
  case 118:
993
+ _context3.next = 120;
994
+ return _Api.default.sendRequest("/site", 'PATCH', params, options);
995
+
996
+ case 120:
980
997
  response = _context3.sent;
981
998
  return _context3.abrupt("return", new Site(response === null || response === void 0 ? void 0 : response.data, options));
982
999
 
983
- case 120:
1000
+ case 122:
984
1001
  case "end":
985
1002
  return _context3.stop();
986
1003
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.0.217",
3
+ "version": "1.0.219",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",