files.com 1.0.217 → 1.0.219
Sign up to get free protection for your applications and to get access to all the features.
- package/_VERSION +1 -1
- package/docs/models/AccountLineItem.md +3 -19
- package/docs/models/ActionNotificationExport.md +1 -1
- package/docs/models/ApiKey.md +4 -2
- package/docs/models/App.md +17 -15
- package/docs/models/As2IncomingMessage.md +29 -25
- package/docs/models/As2OutgoingMessage.md +24 -20
- package/docs/models/As2Partner.md +15 -14
- package/docs/models/As2Station.md +18 -18
- package/docs/models/Automation.md +28 -40
- package/docs/models/Behavior.md +17 -12
- package/docs/models/Bundle.md +8 -66
- package/docs/models/BundleDownload.md +2 -2
- package/docs/models/BundleRegistration.md +5 -3
- package/docs/models/Clickwrap.md +12 -6
- package/docs/models/DnsRecord.md +1 -1
- package/docs/models/ExternalEvent.md +7 -7
- package/docs/models/File.md +16 -28
- package/docs/models/FileAction.md +1 -1
- package/docs/models/FileComment.md +2 -8
- package/docs/models/FileUploadPart.md +11 -5
- package/docs/models/Folder.md +1 -7
- package/docs/models/FormFieldSet.md +4 -30
- package/docs/models/Group.md +6 -4
- package/docs/models/GroupUser.md +2 -2
- package/docs/models/HistoryExport.md +1 -1
- package/docs/models/InboxRegistration.md +5 -3
- package/docs/models/InboxUpload.md +2 -2
- package/docs/models/Invoice.md +3 -19
- package/docs/models/Lock.md +1 -1
- package/docs/models/Message.md +2 -20
- package/docs/models/MessageComment.md +2 -8
- package/docs/models/Notification.md +4 -4
- package/docs/models/Payment.md +3 -19
- package/docs/models/Permission.md +4 -2
- package/docs/models/PublicIpAddress.md +2 -2
- package/docs/models/RemoteServer.md +12 -6
- package/docs/models/Request.md +6 -5
- package/docs/models/SettingsChange.md +1 -1
- package/docs/models/SftpHostKey.md +8 -10
- package/docs/models/Site.md +47 -114
- package/docs/models/SsoStrategy.md +12 -12
- package/docs/models/Status.md +4 -11
- package/docs/models/Style.md +4 -4
- package/docs/models/UsageDailySnapshot.md +11 -9
- package/docs/models/UsageSnapshot.md +3 -1
- package/docs/models/User.md +16 -12
- package/docs/models/UserRequest.md +1 -1
- package/docs/models/WebhookTest.md +4 -4
- package/lib/models/Site.js +104 -87
- package/package.json +1 -1
- package/src/models/Site.js +16 -0
package/docs/models/User.md
CHANGED
@@ -14,21 +14,21 @@
|
|
14
14
|
"api_keys_count": 1,
|
15
15
|
"authenticate_until": "2000-01-01T01:00:00Z",
|
16
16
|
"authentication_method": "password",
|
17
|
-
"avatar_url": "",
|
17
|
+
"avatar_url": "example",
|
18
18
|
"billing_permission": true,
|
19
19
|
"bypass_site_allowed_ips": true,
|
20
20
|
"bypass_inactive_disable": true,
|
21
21
|
"created_at": "2000-01-01T01:00:00Z",
|
22
22
|
"dav_permission": true,
|
23
23
|
"disabled": true,
|
24
|
-
"email": "
|
24
|
+
"email": "example",
|
25
25
|
"first_login_at": "2000-01-01T01:00:00Z",
|
26
26
|
"ftp_permission": true,
|
27
|
-
"group_ids": "",
|
27
|
+
"group_ids": "example",
|
28
28
|
"header_text": "User-specific message.",
|
29
29
|
"language": "en",
|
30
30
|
"last_login_at": "2000-01-01T01:00:00Z",
|
31
|
-
"last_protocol_cipher": "",
|
31
|
+
"last_protocol_cipher": "example",
|
32
32
|
"lockout_expires": "2000-01-01T01:00:00Z",
|
33
33
|
"name": "John Doe",
|
34
34
|
"company": "ACME Corp.",
|
@@ -55,7 +55,7 @@
|
|
55
55
|
"time_zone": "Pacific Time (US & Canada)",
|
56
56
|
"type_of_2fa": "yubi",
|
57
57
|
"updated_at": "2000-01-01T01:00:00Z",
|
58
|
-
"user_root": ""
|
58
|
+
"user_root": "example"
|
59
59
|
}
|
60
60
|
```
|
61
61
|
|
@@ -172,8 +172,9 @@ await User.find(id)
|
|
172
172
|
```
|
173
173
|
await User.create({
|
174
174
|
'avatar_delete': true,
|
175
|
-
'email': "
|
175
|
+
'email': "example",
|
176
176
|
'group_id': 1,
|
177
|
+
'group_ids': "example",
|
177
178
|
'announcements_read': true,
|
178
179
|
'allowed_ips': "127.0.0.1",
|
179
180
|
'attachments_permission': true,
|
@@ -205,6 +206,7 @@ await User.create({
|
|
205
206
|
'subscribe_to_newsletter': true,
|
206
207
|
'require_2fa': "always_require",
|
207
208
|
'time_zone': "Pacific Time (US & Canada)",
|
209
|
+
'user_root': "example",
|
208
210
|
'username': "user",
|
209
211
|
})
|
210
212
|
```
|
@@ -311,8 +313,9 @@ const [user] = await User.list()
|
|
311
313
|
|
312
314
|
await user.update({
|
313
315
|
'avatar_delete': true,
|
314
|
-
'email': "
|
316
|
+
'email': "example",
|
315
317
|
'group_id': 1,
|
318
|
+
'group_ids': "example",
|
316
319
|
'announcements_read': true,
|
317
320
|
'allowed_ips': "127.0.0.1",
|
318
321
|
'attachments_permission': true,
|
@@ -344,6 +347,7 @@ await user.update({
|
|
344
347
|
'subscribe_to_newsletter': true,
|
345
348
|
'require_2fa': "always_require",
|
346
349
|
'time_zone': "Pacific Time (US & Canada)",
|
350
|
+
'user_root': "example",
|
347
351
|
'username': "user",
|
348
352
|
})
|
349
353
|
```
|
@@ -410,21 +414,21 @@ await user.update({
|
|
410
414
|
"api_keys_count": 1,
|
411
415
|
"authenticate_until": "2000-01-01T01:00:00Z",
|
412
416
|
"authentication_method": "password",
|
413
|
-
"avatar_url": "",
|
417
|
+
"avatar_url": "example",
|
414
418
|
"billing_permission": true,
|
415
419
|
"bypass_site_allowed_ips": true,
|
416
420
|
"bypass_inactive_disable": true,
|
417
421
|
"created_at": "2000-01-01T01:00:00Z",
|
418
422
|
"dav_permission": true,
|
419
423
|
"disabled": true,
|
420
|
-
"email": "
|
424
|
+
"email": "example",
|
421
425
|
"first_login_at": "2000-01-01T01:00:00Z",
|
422
426
|
"ftp_permission": true,
|
423
|
-
"group_ids": "",
|
427
|
+
"group_ids": "example",
|
424
428
|
"header_text": "User-specific message.",
|
425
429
|
"language": "en",
|
426
430
|
"last_login_at": "2000-01-01T01:00:00Z",
|
427
|
-
"last_protocol_cipher": "",
|
431
|
+
"last_protocol_cipher": "example",
|
428
432
|
"lockout_expires": "2000-01-01T01:00:00Z",
|
429
433
|
"name": "John Doe",
|
430
434
|
"company": "ACME Corp.",
|
@@ -451,7 +455,7 @@ await user.update({
|
|
451
455
|
"time_zone": "Pacific Time (US & Canada)",
|
452
456
|
"type_of_2fa": "yubi",
|
453
457
|
"updated_at": "2000-01-01T01:00:00Z",
|
454
|
-
"user_root": ""
|
458
|
+
"user_root": "example"
|
455
459
|
}
|
456
460
|
```
|
457
461
|
|
@@ -7,7 +7,7 @@
|
|
7
7
|
"code": 200,
|
8
8
|
"message": "",
|
9
9
|
"status": "",
|
10
|
-
"data": "",
|
10
|
+
"data": "example",
|
11
11
|
"success": true
|
12
12
|
}
|
13
13
|
```
|
@@ -36,10 +36,10 @@ await WebhookTest.create({
|
|
36
36
|
'url': "https://www.site.com/...",
|
37
37
|
'method': "GET",
|
38
38
|
'encoding': "RAW",
|
39
|
-
'headers': "x-test-header
|
40
|
-
'body': "test-param
|
39
|
+
'headers': {"x-test-header":"testvalue"},
|
40
|
+
'body': {"test-param":"testvalue"},
|
41
41
|
'raw_body': "test body",
|
42
|
-
'file_as_body':
|
42
|
+
'file_as_body': true,
|
43
43
|
'file_form_field': "upload_file_data",
|
44
44
|
'action': "test",
|
45
45
|
})
|
package/lib/models/Site.js
CHANGED
@@ -271,6 +271,15 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
271
271
|
(0, _defineProperty2.default)(this, "getMaxPriorPasswords", function () {
|
272
272
|
return _this.attributes.max_prior_passwords;
|
273
273
|
});
|
274
|
+
(0, _defineProperty2.default)(this, "getMotdText", function () {
|
275
|
+
return _this.attributes.motd_text;
|
276
|
+
});
|
277
|
+
(0, _defineProperty2.default)(this, "getMotdUseForFtp", function () {
|
278
|
+
return _this.attributes.motd_use_for_ftp;
|
279
|
+
});
|
280
|
+
(0, _defineProperty2.default)(this, "getMotdUseForSftp", function () {
|
281
|
+
return _this.attributes.motd_use_for_sftp;
|
282
|
+
});
|
274
283
|
(0, _defineProperty2.default)(this, "getNextBillingAmount", function () {
|
275
284
|
return _this.attributes.next_billing_amount;
|
276
285
|
});
|
@@ -637,350 +646,358 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
637
646
|
throw new errors.InvalidParameterError("Bad parameter: welcome_screen must be of type String, received ".concat((0, _utils.getType)(params['welcome_screen'])));
|
638
647
|
|
639
648
|
case 32:
|
640
|
-
if (!(params['
|
649
|
+
if (!(params['motd_text'] && !(0, _utils.isString)(params['motd_text']))) {
|
641
650
|
_context3.next = 34;
|
642
651
|
break;
|
643
652
|
}
|
644
653
|
|
645
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
654
|
+
throw new errors.InvalidParameterError("Bad parameter: motd_text must be of type String, received ".concat((0, _utils.getType)(params['motd_text'])));
|
646
655
|
|
647
656
|
case 34:
|
648
|
-
if (!(params['
|
657
|
+
if (!(params['user_lockout_tries'] && !(0, _utils.isInt)(params['user_lockout_tries']))) {
|
649
658
|
_context3.next = 36;
|
650
659
|
break;
|
651
660
|
}
|
652
661
|
|
653
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
662
|
+
throw new errors.InvalidParameterError("Bad parameter: user_lockout_tries must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_tries'])));
|
654
663
|
|
655
664
|
case 36:
|
656
|
-
if (!(params['
|
665
|
+
if (!(params['user_lockout_within'] && !(0, _utils.isInt)(params['user_lockout_within']))) {
|
657
666
|
_context3.next = 38;
|
658
667
|
break;
|
659
668
|
}
|
660
669
|
|
661
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
670
|
+
throw new errors.InvalidParameterError("Bad parameter: user_lockout_within must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_within'])));
|
662
671
|
|
663
672
|
case 38:
|
664
|
-
if (!(params['
|
673
|
+
if (!(params['user_lockout_lock_period'] && !(0, _utils.isInt)(params['user_lockout_lock_period']))) {
|
665
674
|
_context3.next = 40;
|
666
675
|
break;
|
667
676
|
}
|
668
677
|
|
669
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
678
|
+
throw new errors.InvalidParameterError("Bad parameter: user_lockout_lock_period must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_lock_period'])));
|
670
679
|
|
671
680
|
case 40:
|
672
|
-
if (!(params['
|
681
|
+
if (!(params['allowed_countries'] && !(0, _utils.isString)(params['allowed_countries']))) {
|
673
682
|
_context3.next = 42;
|
674
683
|
break;
|
675
684
|
}
|
676
685
|
|
677
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
686
|
+
throw new errors.InvalidParameterError("Bad parameter: allowed_countries must be of type String, received ".concat((0, _utils.getType)(params['allowed_countries'])));
|
678
687
|
|
679
688
|
case 42:
|
680
|
-
if (!(params['
|
689
|
+
if (!(params['allowed_ips'] && !(0, _utils.isString)(params['allowed_ips']))) {
|
681
690
|
_context3.next = 44;
|
682
691
|
break;
|
683
692
|
}
|
684
693
|
|
685
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
694
|
+
throw new errors.InvalidParameterError("Bad parameter: allowed_ips must be of type String, received ".concat((0, _utils.getType)(params['allowed_ips'])));
|
686
695
|
|
687
696
|
case 44:
|
688
|
-
if (!(params['
|
697
|
+
if (!(params['disallowed_countries'] && !(0, _utils.isString)(params['disallowed_countries']))) {
|
689
698
|
_context3.next = 46;
|
690
699
|
break;
|
691
700
|
}
|
692
701
|
|
693
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
702
|
+
throw new errors.InvalidParameterError("Bad parameter: disallowed_countries must be of type String, received ".concat((0, _utils.getType)(params['disallowed_countries'])));
|
694
703
|
|
695
704
|
case 46:
|
696
|
-
if (!(params['
|
705
|
+
if (!(params['days_to_retain_backups'] && !(0, _utils.isInt)(params['days_to_retain_backups']))) {
|
697
706
|
_context3.next = 48;
|
698
707
|
break;
|
699
708
|
}
|
700
709
|
|
701
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
710
|
+
throw new errors.InvalidParameterError("Bad parameter: days_to_retain_backups must be of type Int, received ".concat((0, _utils.getType)(params['days_to_retain_backups'])));
|
702
711
|
|
703
712
|
case 48:
|
704
|
-
if (!(params['
|
713
|
+
if (!(params['max_prior_passwords'] && !(0, _utils.isInt)(params['max_prior_passwords']))) {
|
705
714
|
_context3.next = 50;
|
706
715
|
break;
|
707
716
|
}
|
708
717
|
|
709
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
718
|
+
throw new errors.InvalidParameterError("Bad parameter: max_prior_passwords must be of type Int, received ".concat((0, _utils.getType)(params['max_prior_passwords'])));
|
710
719
|
|
711
720
|
case 50:
|
712
|
-
if (!(params['
|
721
|
+
if (!(params['password_validity_days'] && !(0, _utils.isInt)(params['password_validity_days']))) {
|
713
722
|
_context3.next = 52;
|
714
723
|
break;
|
715
724
|
}
|
716
725
|
|
717
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
726
|
+
throw new errors.InvalidParameterError("Bad parameter: password_validity_days must be of type Int, received ".concat((0, _utils.getType)(params['password_validity_days'])));
|
718
727
|
|
719
728
|
case 52:
|
720
|
-
if (!(params['
|
729
|
+
if (!(params['password_min_length'] && !(0, _utils.isInt)(params['password_min_length']))) {
|
721
730
|
_context3.next = 54;
|
722
731
|
break;
|
723
732
|
}
|
724
733
|
|
725
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
734
|
+
throw new errors.InvalidParameterError("Bad parameter: password_min_length must be of type Int, received ".concat((0, _utils.getType)(params['password_min_length'])));
|
726
735
|
|
727
736
|
case 54:
|
728
|
-
if (!(params['
|
737
|
+
if (!(params['disable_users_from_inactivity_period_days'] && !(0, _utils.isInt)(params['disable_users_from_inactivity_period_days']))) {
|
729
738
|
_context3.next = 56;
|
730
739
|
break;
|
731
740
|
}
|
732
741
|
|
733
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
742
|
+
throw new errors.InvalidParameterError("Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ".concat((0, _utils.getType)(params['disable_users_from_inactivity_period_days'])));
|
734
743
|
|
735
744
|
case 56:
|
736
|
-
if (!(params['
|
745
|
+
if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
|
737
746
|
_context3.next = 58;
|
738
747
|
break;
|
739
748
|
}
|
740
749
|
|
741
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
750
|
+
throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
|
742
751
|
|
743
752
|
case 58:
|
744
|
-
if (!(params['
|
753
|
+
if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
|
745
754
|
_context3.next = 60;
|
746
755
|
break;
|
747
756
|
}
|
748
757
|
|
749
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
758
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
|
750
759
|
|
751
760
|
case 60:
|
752
|
-
if (!(params['
|
761
|
+
if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
|
753
762
|
_context3.next = 62;
|
754
763
|
break;
|
755
764
|
}
|
756
765
|
|
757
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
766
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
|
758
767
|
|
759
768
|
case 62:
|
760
|
-
if (!(params['
|
769
|
+
if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
|
761
770
|
_context3.next = 64;
|
762
771
|
break;
|
763
772
|
}
|
764
773
|
|
765
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
774
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
|
766
775
|
|
767
776
|
case 64:
|
768
|
-
if (!(params['
|
777
|
+
if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
|
769
778
|
_context3.next = 66;
|
770
779
|
break;
|
771
780
|
}
|
772
781
|
|
773
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
782
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
|
774
783
|
|
775
784
|
case 66:
|
776
|
-
if (!(params['
|
785
|
+
if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
|
777
786
|
_context3.next = 68;
|
778
787
|
break;
|
779
788
|
}
|
780
789
|
|
781
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
790
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
|
782
791
|
|
783
792
|
case 68:
|
784
|
-
if (!(params['
|
793
|
+
if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
|
785
794
|
_context3.next = 70;
|
786
795
|
break;
|
787
796
|
}
|
788
797
|
|
789
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
798
|
+
throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
|
790
799
|
|
791
800
|
case 70:
|
792
|
-
if (!(params['
|
801
|
+
if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
|
793
802
|
_context3.next = 72;
|
794
803
|
break;
|
795
804
|
}
|
796
805
|
|
797
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
806
|
+
throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
|
798
807
|
|
799
808
|
case 72:
|
800
|
-
if (!(params['
|
809
|
+
if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
|
801
810
|
_context3.next = 74;
|
802
811
|
break;
|
803
812
|
}
|
804
813
|
|
805
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
814
|
+
throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
|
806
815
|
|
807
816
|
case 74:
|
808
|
-
if (!(params['
|
817
|
+
if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
|
809
818
|
_context3.next = 76;
|
810
819
|
break;
|
811
820
|
}
|
812
821
|
|
813
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
822
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
|
814
823
|
|
815
824
|
case 76:
|
816
|
-
if (!(params['
|
825
|
+
if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
|
817
826
|
_context3.next = 78;
|
818
827
|
break;
|
819
828
|
}
|
820
829
|
|
821
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
830
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
|
822
831
|
|
823
832
|
case 78:
|
824
|
-
if (!(params['
|
833
|
+
if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
|
825
834
|
_context3.next = 80;
|
826
835
|
break;
|
827
836
|
}
|
828
837
|
|
829
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
838
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
|
830
839
|
|
831
840
|
case 80:
|
832
|
-
if (!(params['
|
841
|
+
if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
|
833
842
|
_context3.next = 82;
|
834
843
|
break;
|
835
844
|
}
|
836
845
|
|
837
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
846
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
|
838
847
|
|
839
848
|
case 82:
|
840
|
-
if (!(params['
|
849
|
+
if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
|
841
850
|
_context3.next = 84;
|
842
851
|
break;
|
843
852
|
}
|
844
853
|
|
845
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
854
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
|
846
855
|
|
847
856
|
case 84:
|
848
|
-
if (!(params['
|
857
|
+
if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
|
849
858
|
_context3.next = 86;
|
850
859
|
break;
|
851
860
|
}
|
852
861
|
|
853
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
862
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
|
854
863
|
|
855
864
|
case 86:
|
856
|
-
if (!(params['
|
865
|
+
if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
|
857
866
|
_context3.next = 88;
|
858
867
|
break;
|
859
868
|
}
|
860
869
|
|
861
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
870
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
|
862
871
|
|
863
872
|
case 88:
|
864
|
-
if (!(params['
|
873
|
+
if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
|
865
874
|
_context3.next = 90;
|
866
875
|
break;
|
867
876
|
}
|
868
877
|
|
869
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
878
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
|
870
879
|
|
871
880
|
case 90:
|
872
|
-
if (!(params['
|
881
|
+
if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
|
873
882
|
_context3.next = 92;
|
874
883
|
break;
|
875
884
|
}
|
876
885
|
|
877
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
886
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
|
878
887
|
|
879
888
|
case 92:
|
880
|
-
if (!(params['
|
889
|
+
if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
|
881
890
|
_context3.next = 94;
|
882
891
|
break;
|
883
892
|
}
|
884
893
|
|
885
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
894
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
|
886
895
|
|
887
896
|
case 94:
|
888
|
-
if (!(params['
|
897
|
+
if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
|
889
898
|
_context3.next = 96;
|
890
899
|
break;
|
891
900
|
}
|
892
901
|
|
893
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
902
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
|
894
903
|
|
895
904
|
case 96:
|
896
|
-
if (!(params['
|
905
|
+
if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
|
897
906
|
_context3.next = 98;
|
898
907
|
break;
|
899
908
|
}
|
900
909
|
|
901
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
910
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
|
902
911
|
|
903
912
|
case 98:
|
904
|
-
if (!(params['
|
913
|
+
if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
|
905
914
|
_context3.next = 100;
|
906
915
|
break;
|
907
916
|
}
|
908
917
|
|
909
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
918
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
|
910
919
|
|
911
920
|
case 100:
|
912
|
-
if (!(params['
|
921
|
+
if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
|
913
922
|
_context3.next = 102;
|
914
923
|
break;
|
915
924
|
}
|
916
925
|
|
917
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
926
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
|
918
927
|
|
919
928
|
case 102:
|
920
|
-
if (!(params['
|
929
|
+
if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
|
921
930
|
_context3.next = 104;
|
922
931
|
break;
|
923
932
|
}
|
924
933
|
|
925
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
934
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
|
926
935
|
|
927
936
|
case 104:
|
928
|
-
if (!(params['
|
937
|
+
if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
|
929
938
|
_context3.next = 106;
|
930
939
|
break;
|
931
940
|
}
|
932
941
|
|
933
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
942
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
|
934
943
|
|
935
944
|
case 106:
|
936
|
-
if (!(params['
|
945
|
+
if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
|
937
946
|
_context3.next = 108;
|
938
947
|
break;
|
939
948
|
}
|
940
949
|
|
941
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
950
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
|
942
951
|
|
943
952
|
case 108:
|
944
|
-
if (!(params['
|
953
|
+
if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
|
945
954
|
_context3.next = 110;
|
946
955
|
break;
|
947
956
|
}
|
948
957
|
|
949
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
958
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
|
950
959
|
|
951
960
|
case 110:
|
952
|
-
if (!(params['
|
961
|
+
if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
|
953
962
|
_context3.next = 112;
|
954
963
|
break;
|
955
964
|
}
|
956
965
|
|
957
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
966
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
|
958
967
|
|
959
968
|
case 112:
|
960
|
-
if (!(params['
|
969
|
+
if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
|
961
970
|
_context3.next = 114;
|
962
971
|
break;
|
963
972
|
}
|
964
973
|
|
965
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
974
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
|
966
975
|
|
967
976
|
case 114:
|
968
|
-
if (!(params['
|
977
|
+
if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
|
969
978
|
_context3.next = 116;
|
970
979
|
break;
|
971
980
|
}
|
972
981
|
|
973
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
982
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
|
974
983
|
|
975
984
|
case 116:
|
976
|
-
|
977
|
-
|
985
|
+
if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
|
986
|
+
_context3.next = 118;
|
987
|
+
break;
|
988
|
+
}
|
989
|
+
|
990
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
|
978
991
|
|
979
992
|
case 118:
|
993
|
+
_context3.next = 120;
|
994
|
+
return _Api.default.sendRequest("/site", 'PATCH', params, options);
|
995
|
+
|
996
|
+
case 120:
|
980
997
|
response = _context3.sent;
|
981
998
|
return _context3.abrupt("return", new Site(response === null || response === void 0 ? void 0 : response.data, options));
|
982
999
|
|
983
|
-
case
|
1000
|
+
case 122:
|
984
1001
|
case "end":
|
985
1002
|
return _context3.stop();
|
986
1003
|
}
|