files.com 1.0.217 → 1.0.219

Sign up to get free protection for your applications and to get access to all the features.
Files changed (52) hide show
  1. package/_VERSION +1 -1
  2. package/docs/models/AccountLineItem.md +3 -19
  3. package/docs/models/ActionNotificationExport.md +1 -1
  4. package/docs/models/ApiKey.md +4 -2
  5. package/docs/models/App.md +17 -15
  6. package/docs/models/As2IncomingMessage.md +29 -25
  7. package/docs/models/As2OutgoingMessage.md +24 -20
  8. package/docs/models/As2Partner.md +15 -14
  9. package/docs/models/As2Station.md +18 -18
  10. package/docs/models/Automation.md +28 -40
  11. package/docs/models/Behavior.md +17 -12
  12. package/docs/models/Bundle.md +8 -66
  13. package/docs/models/BundleDownload.md +2 -2
  14. package/docs/models/BundleRegistration.md +5 -3
  15. package/docs/models/Clickwrap.md +12 -6
  16. package/docs/models/DnsRecord.md +1 -1
  17. package/docs/models/ExternalEvent.md +7 -7
  18. package/docs/models/File.md +16 -28
  19. package/docs/models/FileAction.md +1 -1
  20. package/docs/models/FileComment.md +2 -8
  21. package/docs/models/FileUploadPart.md +11 -5
  22. package/docs/models/Folder.md +1 -7
  23. package/docs/models/FormFieldSet.md +4 -30
  24. package/docs/models/Group.md +6 -4
  25. package/docs/models/GroupUser.md +2 -2
  26. package/docs/models/HistoryExport.md +1 -1
  27. package/docs/models/InboxRegistration.md +5 -3
  28. package/docs/models/InboxUpload.md +2 -2
  29. package/docs/models/Invoice.md +3 -19
  30. package/docs/models/Lock.md +1 -1
  31. package/docs/models/Message.md +2 -20
  32. package/docs/models/MessageComment.md +2 -8
  33. package/docs/models/Notification.md +4 -4
  34. package/docs/models/Payment.md +3 -19
  35. package/docs/models/Permission.md +4 -2
  36. package/docs/models/PublicIpAddress.md +2 -2
  37. package/docs/models/RemoteServer.md +12 -6
  38. package/docs/models/Request.md +6 -5
  39. package/docs/models/SettingsChange.md +1 -1
  40. package/docs/models/SftpHostKey.md +8 -10
  41. package/docs/models/Site.md +47 -114
  42. package/docs/models/SsoStrategy.md +12 -12
  43. package/docs/models/Status.md +4 -11
  44. package/docs/models/Style.md +4 -4
  45. package/docs/models/UsageDailySnapshot.md +11 -9
  46. package/docs/models/UsageSnapshot.md +3 -1
  47. package/docs/models/User.md +16 -12
  48. package/docs/models/UserRequest.md +1 -1
  49. package/docs/models/WebhookTest.md +4 -4
  50. package/lib/models/Site.js +104 -87
  51. package/package.json +1 -1
  52. package/src/models/Site.js +16 -0
@@ -14,21 +14,21 @@
14
14
  "api_keys_count": 1,
15
15
  "authenticate_until": "2000-01-01T01:00:00Z",
16
16
  "authentication_method": "password",
17
- "avatar_url": "",
17
+ "avatar_url": "example",
18
18
  "billing_permission": true,
19
19
  "bypass_site_allowed_ips": true,
20
20
  "bypass_inactive_disable": true,
21
21
  "created_at": "2000-01-01T01:00:00Z",
22
22
  "dav_permission": true,
23
23
  "disabled": true,
24
- "email": "john.doe@files.com",
24
+ "email": "example",
25
25
  "first_login_at": "2000-01-01T01:00:00Z",
26
26
  "ftp_permission": true,
27
- "group_ids": "",
27
+ "group_ids": "example",
28
28
  "header_text": "User-specific message.",
29
29
  "language": "en",
30
30
  "last_login_at": "2000-01-01T01:00:00Z",
31
- "last_protocol_cipher": "",
31
+ "last_protocol_cipher": "example",
32
32
  "lockout_expires": "2000-01-01T01:00:00Z",
33
33
  "name": "John Doe",
34
34
  "company": "ACME Corp.",
@@ -55,7 +55,7 @@
55
55
  "time_zone": "Pacific Time (US & Canada)",
56
56
  "type_of_2fa": "yubi",
57
57
  "updated_at": "2000-01-01T01:00:00Z",
58
- "user_root": ""
58
+ "user_root": "example"
59
59
  }
60
60
  ```
61
61
 
@@ -172,8 +172,9 @@ await User.find(id)
172
172
  ```
173
173
  await User.create({
174
174
  'avatar_delete': true,
175
- 'email': "john.doe@files.com",
175
+ 'email': "example",
176
176
  'group_id': 1,
177
+ 'group_ids': "example",
177
178
  'announcements_read': true,
178
179
  'allowed_ips': "127.0.0.1",
179
180
  'attachments_permission': true,
@@ -205,6 +206,7 @@ await User.create({
205
206
  'subscribe_to_newsletter': true,
206
207
  'require_2fa': "always_require",
207
208
  'time_zone': "Pacific Time (US & Canada)",
209
+ 'user_root': "example",
208
210
  'username': "user",
209
211
  })
210
212
  ```
@@ -311,8 +313,9 @@ const [user] = await User.list()
311
313
 
312
314
  await user.update({
313
315
  'avatar_delete': true,
314
- 'email': "john.doe@files.com",
316
+ 'email': "example",
315
317
  'group_id': 1,
318
+ 'group_ids': "example",
316
319
  'announcements_read': true,
317
320
  'allowed_ips': "127.0.0.1",
318
321
  'attachments_permission': true,
@@ -344,6 +347,7 @@ await user.update({
344
347
  'subscribe_to_newsletter': true,
345
348
  'require_2fa': "always_require",
346
349
  'time_zone': "Pacific Time (US & Canada)",
350
+ 'user_root': "example",
347
351
  'username': "user",
348
352
  })
349
353
  ```
@@ -410,21 +414,21 @@ await user.update({
410
414
  "api_keys_count": 1,
411
415
  "authenticate_until": "2000-01-01T01:00:00Z",
412
416
  "authentication_method": "password",
413
- "avatar_url": "",
417
+ "avatar_url": "example",
414
418
  "billing_permission": true,
415
419
  "bypass_site_allowed_ips": true,
416
420
  "bypass_inactive_disable": true,
417
421
  "created_at": "2000-01-01T01:00:00Z",
418
422
  "dav_permission": true,
419
423
  "disabled": true,
420
- "email": "john.doe@files.com",
424
+ "email": "example",
421
425
  "first_login_at": "2000-01-01T01:00:00Z",
422
426
  "ftp_permission": true,
423
- "group_ids": "",
427
+ "group_ids": "example",
424
428
  "header_text": "User-specific message.",
425
429
  "language": "en",
426
430
  "last_login_at": "2000-01-01T01:00:00Z",
427
- "last_protocol_cipher": "",
431
+ "last_protocol_cipher": "example",
428
432
  "lockout_expires": "2000-01-01T01:00:00Z",
429
433
  "name": "John Doe",
430
434
  "company": "ACME Corp.",
@@ -451,7 +455,7 @@ await user.update({
451
455
  "time_zone": "Pacific Time (US & Canada)",
452
456
  "type_of_2fa": "yubi",
453
457
  "updated_at": "2000-01-01T01:00:00Z",
454
- "user_root": ""
458
+ "user_root": "example"
455
459
  }
456
460
  ```
457
461
 
@@ -6,7 +6,7 @@
6
6
  {
7
7
  "id": 1,
8
8
  "name": "John Doe",
9
- "email": "john.doe@files.com",
9
+ "email": "example",
10
10
  "details": "Changed Departments"
11
11
  }
12
12
  ```
@@ -7,7 +7,7 @@
7
7
  "code": 200,
8
8
  "message": "",
9
9
  "status": "",
10
- "data": "",
10
+ "data": "example",
11
11
  "success": true
12
12
  }
13
13
  ```
@@ -36,10 +36,10 @@ await WebhookTest.create({
36
36
  'url': "https://www.site.com/...",
37
37
  'method': "GET",
38
38
  'encoding': "RAW",
39
- 'headers': "x-test-header => testvalue",
40
- 'body': "test-param => testvalue",
39
+ 'headers': {"x-test-header":"testvalue"},
40
+ 'body': {"test-param":"testvalue"},
41
41
  'raw_body': "test body",
42
- 'file_as_body': "false",
42
+ 'file_as_body': true,
43
43
  'file_form_field': "upload_file_data",
44
44
  'action': "test",
45
45
  })
@@ -271,6 +271,15 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
271
271
  (0, _defineProperty2.default)(this, "getMaxPriorPasswords", function () {
272
272
  return _this.attributes.max_prior_passwords;
273
273
  });
274
+ (0, _defineProperty2.default)(this, "getMotdText", function () {
275
+ return _this.attributes.motd_text;
276
+ });
277
+ (0, _defineProperty2.default)(this, "getMotdUseForFtp", function () {
278
+ return _this.attributes.motd_use_for_ftp;
279
+ });
280
+ (0, _defineProperty2.default)(this, "getMotdUseForSftp", function () {
281
+ return _this.attributes.motd_use_for_sftp;
282
+ });
274
283
  (0, _defineProperty2.default)(this, "getNextBillingAmount", function () {
275
284
  return _this.attributes.next_billing_amount;
276
285
  });
@@ -637,350 +646,358 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
637
646
  throw new errors.InvalidParameterError("Bad parameter: welcome_screen must be of type String, received ".concat((0, _utils.getType)(params['welcome_screen'])));
638
647
 
639
648
  case 32:
640
- if (!(params['user_lockout_tries'] && !(0, _utils.isInt)(params['user_lockout_tries']))) {
649
+ if (!(params['motd_text'] && !(0, _utils.isString)(params['motd_text']))) {
641
650
  _context3.next = 34;
642
651
  break;
643
652
  }
644
653
 
645
- throw new errors.InvalidParameterError("Bad parameter: user_lockout_tries must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_tries'])));
654
+ throw new errors.InvalidParameterError("Bad parameter: motd_text must be of type String, received ".concat((0, _utils.getType)(params['motd_text'])));
646
655
 
647
656
  case 34:
648
- if (!(params['user_lockout_within'] && !(0, _utils.isInt)(params['user_lockout_within']))) {
657
+ if (!(params['user_lockout_tries'] && !(0, _utils.isInt)(params['user_lockout_tries']))) {
649
658
  _context3.next = 36;
650
659
  break;
651
660
  }
652
661
 
653
- throw new errors.InvalidParameterError("Bad parameter: user_lockout_within must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_within'])));
662
+ throw new errors.InvalidParameterError("Bad parameter: user_lockout_tries must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_tries'])));
654
663
 
655
664
  case 36:
656
- if (!(params['user_lockout_lock_period'] && !(0, _utils.isInt)(params['user_lockout_lock_period']))) {
665
+ if (!(params['user_lockout_within'] && !(0, _utils.isInt)(params['user_lockout_within']))) {
657
666
  _context3.next = 38;
658
667
  break;
659
668
  }
660
669
 
661
- throw new errors.InvalidParameterError("Bad parameter: user_lockout_lock_period must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_lock_period'])));
670
+ throw new errors.InvalidParameterError("Bad parameter: user_lockout_within must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_within'])));
662
671
 
663
672
  case 38:
664
- if (!(params['allowed_countries'] && !(0, _utils.isString)(params['allowed_countries']))) {
673
+ if (!(params['user_lockout_lock_period'] && !(0, _utils.isInt)(params['user_lockout_lock_period']))) {
665
674
  _context3.next = 40;
666
675
  break;
667
676
  }
668
677
 
669
- throw new errors.InvalidParameterError("Bad parameter: allowed_countries must be of type String, received ".concat((0, _utils.getType)(params['allowed_countries'])));
678
+ throw new errors.InvalidParameterError("Bad parameter: user_lockout_lock_period must be of type Int, received ".concat((0, _utils.getType)(params['user_lockout_lock_period'])));
670
679
 
671
680
  case 40:
672
- if (!(params['allowed_ips'] && !(0, _utils.isString)(params['allowed_ips']))) {
681
+ if (!(params['allowed_countries'] && !(0, _utils.isString)(params['allowed_countries']))) {
673
682
  _context3.next = 42;
674
683
  break;
675
684
  }
676
685
 
677
- throw new errors.InvalidParameterError("Bad parameter: allowed_ips must be of type String, received ".concat((0, _utils.getType)(params['allowed_ips'])));
686
+ throw new errors.InvalidParameterError("Bad parameter: allowed_countries must be of type String, received ".concat((0, _utils.getType)(params['allowed_countries'])));
678
687
 
679
688
  case 42:
680
- if (!(params['disallowed_countries'] && !(0, _utils.isString)(params['disallowed_countries']))) {
689
+ if (!(params['allowed_ips'] && !(0, _utils.isString)(params['allowed_ips']))) {
681
690
  _context3.next = 44;
682
691
  break;
683
692
  }
684
693
 
685
- throw new errors.InvalidParameterError("Bad parameter: disallowed_countries must be of type String, received ".concat((0, _utils.getType)(params['disallowed_countries'])));
694
+ throw new errors.InvalidParameterError("Bad parameter: allowed_ips must be of type String, received ".concat((0, _utils.getType)(params['allowed_ips'])));
686
695
 
687
696
  case 44:
688
- if (!(params['days_to_retain_backups'] && !(0, _utils.isInt)(params['days_to_retain_backups']))) {
697
+ if (!(params['disallowed_countries'] && !(0, _utils.isString)(params['disallowed_countries']))) {
689
698
  _context3.next = 46;
690
699
  break;
691
700
  }
692
701
 
693
- throw new errors.InvalidParameterError("Bad parameter: days_to_retain_backups must be of type Int, received ".concat((0, _utils.getType)(params['days_to_retain_backups'])));
702
+ throw new errors.InvalidParameterError("Bad parameter: disallowed_countries must be of type String, received ".concat((0, _utils.getType)(params['disallowed_countries'])));
694
703
 
695
704
  case 46:
696
- if (!(params['max_prior_passwords'] && !(0, _utils.isInt)(params['max_prior_passwords']))) {
705
+ if (!(params['days_to_retain_backups'] && !(0, _utils.isInt)(params['days_to_retain_backups']))) {
697
706
  _context3.next = 48;
698
707
  break;
699
708
  }
700
709
 
701
- throw new errors.InvalidParameterError("Bad parameter: max_prior_passwords must be of type Int, received ".concat((0, _utils.getType)(params['max_prior_passwords'])));
710
+ throw new errors.InvalidParameterError("Bad parameter: days_to_retain_backups must be of type Int, received ".concat((0, _utils.getType)(params['days_to_retain_backups'])));
702
711
 
703
712
  case 48:
704
- if (!(params['password_validity_days'] && !(0, _utils.isInt)(params['password_validity_days']))) {
713
+ if (!(params['max_prior_passwords'] && !(0, _utils.isInt)(params['max_prior_passwords']))) {
705
714
  _context3.next = 50;
706
715
  break;
707
716
  }
708
717
 
709
- throw new errors.InvalidParameterError("Bad parameter: password_validity_days must be of type Int, received ".concat((0, _utils.getType)(params['password_validity_days'])));
718
+ throw new errors.InvalidParameterError("Bad parameter: max_prior_passwords must be of type Int, received ".concat((0, _utils.getType)(params['max_prior_passwords'])));
710
719
 
711
720
  case 50:
712
- if (!(params['password_min_length'] && !(0, _utils.isInt)(params['password_min_length']))) {
721
+ if (!(params['password_validity_days'] && !(0, _utils.isInt)(params['password_validity_days']))) {
713
722
  _context3.next = 52;
714
723
  break;
715
724
  }
716
725
 
717
- throw new errors.InvalidParameterError("Bad parameter: password_min_length must be of type Int, received ".concat((0, _utils.getType)(params['password_min_length'])));
726
+ throw new errors.InvalidParameterError("Bad parameter: password_validity_days must be of type Int, received ".concat((0, _utils.getType)(params['password_validity_days'])));
718
727
 
719
728
  case 52:
720
- if (!(params['disable_users_from_inactivity_period_days'] && !(0, _utils.isInt)(params['disable_users_from_inactivity_period_days']))) {
729
+ if (!(params['password_min_length'] && !(0, _utils.isInt)(params['password_min_length']))) {
721
730
  _context3.next = 54;
722
731
  break;
723
732
  }
724
733
 
725
- throw new errors.InvalidParameterError("Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ".concat((0, _utils.getType)(params['disable_users_from_inactivity_period_days'])));
734
+ throw new errors.InvalidParameterError("Bad parameter: password_min_length must be of type Int, received ".concat((0, _utils.getType)(params['password_min_length'])));
726
735
 
727
736
  case 54:
728
- if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
737
+ if (!(params['disable_users_from_inactivity_period_days'] && !(0, _utils.isInt)(params['disable_users_from_inactivity_period_days']))) {
729
738
  _context3.next = 56;
730
739
  break;
731
740
  }
732
741
 
733
- throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
742
+ throw new errors.InvalidParameterError("Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ".concat((0, _utils.getType)(params['disable_users_from_inactivity_period_days'])));
734
743
 
735
744
  case 56:
736
- if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
745
+ if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
737
746
  _context3.next = 58;
738
747
  break;
739
748
  }
740
749
 
741
- throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
750
+ throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
742
751
 
743
752
  case 58:
744
- if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
753
+ if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
745
754
  _context3.next = 60;
746
755
  break;
747
756
  }
748
757
 
749
- throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
758
+ throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
750
759
 
751
760
  case 60:
752
- if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
761
+ if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
753
762
  _context3.next = 62;
754
763
  break;
755
764
  }
756
765
 
757
- throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
766
+ throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
758
767
 
759
768
  case 62:
760
- if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
769
+ if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
761
770
  _context3.next = 64;
762
771
  break;
763
772
  }
764
773
 
765
- throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
774
+ throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
766
775
 
767
776
  case 64:
768
- if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
777
+ if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
769
778
  _context3.next = 66;
770
779
  break;
771
780
  }
772
781
 
773
- throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
782
+ throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
774
783
 
775
784
  case 66:
776
- if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
785
+ if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
777
786
  _context3.next = 68;
778
787
  break;
779
788
  }
780
789
 
781
- throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
790
+ throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
782
791
 
783
792
  case 68:
784
- if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
793
+ if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
785
794
  _context3.next = 70;
786
795
  break;
787
796
  }
788
797
 
789
- throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
798
+ throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
790
799
 
791
800
  case 70:
792
- if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
801
+ if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
793
802
  _context3.next = 72;
794
803
  break;
795
804
  }
796
805
 
797
- throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
806
+ throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
798
807
 
799
808
  case 72:
800
- if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
809
+ if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
801
810
  _context3.next = 74;
802
811
  break;
803
812
  }
804
813
 
805
- throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
814
+ throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
806
815
 
807
816
  case 74:
808
- if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
817
+ if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
809
818
  _context3.next = 76;
810
819
  break;
811
820
  }
812
821
 
813
- throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
822
+ throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
814
823
 
815
824
  case 76:
816
- if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
825
+ if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
817
826
  _context3.next = 78;
818
827
  break;
819
828
  }
820
829
 
821
- throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
830
+ throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
822
831
 
823
832
  case 78:
824
- if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
833
+ if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
825
834
  _context3.next = 80;
826
835
  break;
827
836
  }
828
837
 
829
- throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
838
+ throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
830
839
 
831
840
  case 80:
832
- if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
841
+ if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
833
842
  _context3.next = 82;
834
843
  break;
835
844
  }
836
845
 
837
- throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
846
+ throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
838
847
 
839
848
  case 82:
840
- if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
849
+ if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
841
850
  _context3.next = 84;
842
851
  break;
843
852
  }
844
853
 
845
- throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
854
+ throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
846
855
 
847
856
  case 84:
848
- if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
857
+ if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
849
858
  _context3.next = 86;
850
859
  break;
851
860
  }
852
861
 
853
- throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
862
+ throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
854
863
 
855
864
  case 86:
856
- if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
865
+ if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
857
866
  _context3.next = 88;
858
867
  break;
859
868
  }
860
869
 
861
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
870
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
862
871
 
863
872
  case 88:
864
- if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
873
+ if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
865
874
  _context3.next = 90;
866
875
  break;
867
876
  }
868
877
 
869
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
878
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
870
879
 
871
880
  case 90:
872
- if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
881
+ if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
873
882
  _context3.next = 92;
874
883
  break;
875
884
  }
876
885
 
877
- throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
886
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
878
887
 
879
888
  case 92:
880
- if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
889
+ if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
881
890
  _context3.next = 94;
882
891
  break;
883
892
  }
884
893
 
885
- throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
894
+ throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
886
895
 
887
896
  case 94:
888
- if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
897
+ if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
889
898
  _context3.next = 96;
890
899
  break;
891
900
  }
892
901
 
893
- throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
902
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
894
903
 
895
904
  case 96:
896
- if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
905
+ if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
897
906
  _context3.next = 98;
898
907
  break;
899
908
  }
900
909
 
901
- throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
910
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
902
911
 
903
912
  case 98:
904
- if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
913
+ if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
905
914
  _context3.next = 100;
906
915
  break;
907
916
  }
908
917
 
909
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
918
+ throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
910
919
 
911
920
  case 100:
912
- if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
921
+ if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
913
922
  _context3.next = 102;
914
923
  break;
915
924
  }
916
925
 
917
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
926
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
918
927
 
919
928
  case 102:
920
- if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
929
+ if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
921
930
  _context3.next = 104;
922
931
  break;
923
932
  }
924
933
 
925
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
934
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
926
935
 
927
936
  case 104:
928
- if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
937
+ if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
929
938
  _context3.next = 106;
930
939
  break;
931
940
  }
932
941
 
933
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
942
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
934
943
 
935
944
  case 106:
936
- if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
945
+ if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
937
946
  _context3.next = 108;
938
947
  break;
939
948
  }
940
949
 
941
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
950
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
942
951
 
943
952
  case 108:
944
- if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
953
+ if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
945
954
  _context3.next = 110;
946
955
  break;
947
956
  }
948
957
 
949
- throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
958
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
950
959
 
951
960
  case 110:
952
- if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
961
+ if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
953
962
  _context3.next = 112;
954
963
  break;
955
964
  }
956
965
 
957
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
966
+ throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
958
967
 
959
968
  case 112:
960
- if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
969
+ if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
961
970
  _context3.next = 114;
962
971
  break;
963
972
  }
964
973
 
965
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
974
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
966
975
 
967
976
  case 114:
968
- if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
977
+ if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
969
978
  _context3.next = 116;
970
979
  break;
971
980
  }
972
981
 
973
- throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
982
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
974
983
 
975
984
  case 116:
976
- _context3.next = 118;
977
- return _Api.default.sendRequest("/site", 'PATCH', params, options);
985
+ if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
986
+ _context3.next = 118;
987
+ break;
988
+ }
989
+
990
+ throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
978
991
 
979
992
  case 118:
993
+ _context3.next = 120;
994
+ return _Api.default.sendRequest("/site", 'PATCH', params, options);
995
+
996
+ case 120:
980
997
  response = _context3.sent;
981
998
  return _context3.abrupt("return", new Site(response === null || response === void 0 ? void 0 : response.data, options));
982
999
 
983
- case 120:
1000
+ case 122:
984
1001
  case "end":
985
1002
  return _context3.stop();
986
1003
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.0.217",
3
+ "version": "1.0.219",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",