files.com 1.0.232 → 1.0.233

Sign up to get free protection for your applications and to get access to all the features.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.232
1
+ 1.0.233
@@ -16,10 +16,12 @@
16
16
  "allowed_countries": "US,DE",
17
17
  "allowed_ips": "example",
18
18
  "ask_about_overwrites": true,
19
+ "bundle_activity_notifications": "never",
19
20
  "bundle_expiration": 1,
20
21
  "bundle_password_required": true,
21
22
  "bundle_registration_notifications": "never",
22
23
  "bundle_require_share_recipient": true,
24
+ "bundle_upload_receipt_notifications": "never",
23
25
  "bundle_watermark_attachment": "",
24
26
  "bundle_watermark_value": {
25
27
  "key": "example value"
@@ -159,10 +161,12 @@
159
161
  * `allowed_countries` (string): Comma seperated list of allowed Country codes
160
162
  * `allowed_ips` (string): List of allowed IP addresses
161
163
  * `ask_about_overwrites` (boolean): If false, rename conflicting files instead of asking for overwrite confirmation. Only applies to web interface.
164
+ * `bundle_activity_notifications` (string): Do Bundle owners receive activity notifications?
162
165
  * `bundle_expiration` (int64): Site-wide Bundle expiration in days
163
166
  * `bundle_password_required` (boolean): Do Bundles require password protection?
164
167
  * `bundle_registration_notifications` (string): Do Bundle owners receive registration notification?
165
168
  * `bundle_require_share_recipient` (boolean): Do Bundles require recipients for sharing?
169
+ * `bundle_upload_receipt_notifications` (string): Do Bundle uploaders receive upload confirmation notifications?
166
170
  * `bundle_watermark_attachment` (Image): Preview watermark image applied to all bundle items.
167
171
  * `bundle_watermark_value` (object): Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
168
172
  * `color2_left` (string): Page link and button color
@@ -371,6 +375,8 @@ await Site.update({
371
375
  'bundle_password_required': true,
372
376
  'bundle_require_share_recipient': true,
373
377
  'bundle_registration_notifications': "never",
378
+ 'bundle_activity_notifications': "never",
379
+ 'bundle_upload_receipt_notifications': "never",
374
380
  'password_requirements_apply_to_bundles': true,
375
381
  'opt_out_global': true,
376
382
  'use_provided_modified_at': true,
@@ -497,6 +503,8 @@ await Site.update({
497
503
  * `bundle_password_required` (boolean): Do Bundles require password protection?
498
504
  * `bundle_require_share_recipient` (boolean): Do Bundles require recipients for sharing?
499
505
  * `bundle_registration_notifications` (string): Do Bundle owners receive registration notification?
506
+ * `bundle_activity_notifications` (string): Do Bundle owners receive activity notifications?
507
+ * `bundle_upload_receipt_notifications` (string): Do Bundle uploaders receive upload confirmation notifications?
500
508
  * `password_requirements_apply_to_bundles` (boolean): Require bundles' passwords, and passwords for other items (inboxes, public shares, etc.) to conform to the same requirements as users' passwords?
501
509
  * `opt_out_global` (boolean): Use servers in the USA only?
502
510
  * `use_provided_modified_at` (boolean): Allow uploaders to set `provided_modified_at` for uploaded files?
@@ -63,7 +63,9 @@
63
63
  "time_zone": "Pacific Time (US & Canada)",
64
64
  "type_of_2fa": "yubi",
65
65
  "updated_at": "2000-01-01T01:00:00Z",
66
- "user_root": "example"
66
+ "user_root": "example",
67
+ "days_remaining_until_password_expire": "2000-01-01T01:00:00Z",
68
+ "password_expire_at": "2000-01-01T01:00:00Z"
67
69
  }
68
70
  ```
69
71
 
@@ -125,6 +127,8 @@
125
127
  * `type_of_2fa` (string): Type(s) of 2FA methods in use. Will be either `sms`, `totp`, `u2f`, `yubi`, or multiple values sorted alphabetically and joined by an underscore.
126
128
  * `updated_at` (date-time): User record most recently updated at. Note this may be incremented because of internal or external updates.
127
129
  * `user_root` (string): Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
130
+ * `days_remaining_until_password_expire` (date-time): Number of days remaining until password expires
131
+ * `password_expire_at` (date-time): Password expiration datetime
128
132
  * `avatar_file` (file): An image file for your user avatar.
129
133
  * `avatar_delete` (boolean): If true, the avatar will be deleted.
130
134
  * `change_password` (string): Used for changing a password on an existing user.
@@ -479,7 +483,9 @@ await user.update({
479
483
  "time_zone": "Pacific Time (US & Canada)",
480
484
  "type_of_2fa": "yubi",
481
485
  "updated_at": "2000-01-01T01:00:00Z",
482
- "user_root": "example"
486
+ "user_root": "example",
487
+ "days_remaining_until_password_expire": "2000-01-01T01:00:00Z",
488
+ "password_expire_at": "2000-01-01T01:00:00Z"
483
489
  }
484
490
  ```
485
491
 
@@ -67,6 +67,9 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
67
67
  (0, _defineProperty2.default)(this, "getAskAboutOverwrites", function () {
68
68
  return _this.attributes.ask_about_overwrites;
69
69
  });
70
+ (0, _defineProperty2.default)(this, "getBundleActivityNotifications", function () {
71
+ return _this.attributes.bundle_activity_notifications;
72
+ });
70
73
  (0, _defineProperty2.default)(this, "getBundleExpiration", function () {
71
74
  return _this.attributes.bundle_expiration;
72
75
  });
@@ -79,6 +82,9 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
79
82
  (0, _defineProperty2.default)(this, "getBundleRequireShareRecipient", function () {
80
83
  return _this.attributes.bundle_require_share_recipient;
81
84
  });
85
+ (0, _defineProperty2.default)(this, "getBundleUploadReceiptNotifications", function () {
86
+ return _this.attributes.bundle_upload_receipt_notifications;
87
+ });
82
88
  (0, _defineProperty2.default)(this, "getBundleWatermarkAttachment", function () {
83
89
  return _this.attributes.bundle_watermark_attachment;
84
90
  });
@@ -673,216 +679,228 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
673
679
  }
674
680
  throw new errors.InvalidParameterError("Bad parameter: bundle_registration_notifications must be of type String, received ".concat((0, _utils.getType)(params['bundle_registration_notifications'])));
675
681
  case 56:
676
- if (!(params['disable_users_from_inactivity_period_days'] && !(0, _utils.isInt)(params['disable_users_from_inactivity_period_days']))) {
682
+ if (!(params['bundle_activity_notifications'] && !(0, _utils.isString)(params['bundle_activity_notifications']))) {
677
683
  _context3.next = 58;
678
684
  break;
679
685
  }
680
- throw new errors.InvalidParameterError("Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ".concat((0, _utils.getType)(params['disable_users_from_inactivity_period_days'])));
686
+ throw new errors.InvalidParameterError("Bad parameter: bundle_activity_notifications must be of type String, received ".concat((0, _utils.getType)(params['bundle_activity_notifications'])));
681
687
  case 58:
682
- if (!(params['sftp_host_key_type'] && !(0, _utils.isString)(params['sftp_host_key_type']))) {
688
+ if (!(params['bundle_upload_receipt_notifications'] && !(0, _utils.isString)(params['bundle_upload_receipt_notifications']))) {
683
689
  _context3.next = 60;
684
690
  break;
685
691
  }
686
- throw new errors.InvalidParameterError("Bad parameter: sftp_host_key_type must be of type String, received ".concat((0, _utils.getType)(params['sftp_host_key_type'])));
692
+ throw new errors.InvalidParameterError("Bad parameter: bundle_upload_receipt_notifications must be of type String, received ".concat((0, _utils.getType)(params['bundle_upload_receipt_notifications'])));
687
693
  case 60:
688
- if (!(params['active_sftp_host_key_id'] && !(0, _utils.isInt)(params['active_sftp_host_key_id']))) {
694
+ if (!(params['disable_users_from_inactivity_period_days'] && !(0, _utils.isInt)(params['disable_users_from_inactivity_period_days']))) {
689
695
  _context3.next = 62;
690
696
  break;
691
697
  }
692
- throw new errors.InvalidParameterError("Bad parameter: active_sftp_host_key_id must be of type Int, received ".concat((0, _utils.getType)(params['active_sftp_host_key_id'])));
698
+ throw new errors.InvalidParameterError("Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ".concat((0, _utils.getType)(params['disable_users_from_inactivity_period_days'])));
693
699
  case 62:
694
- if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
700
+ if (!(params['sftp_host_key_type'] && !(0, _utils.isString)(params['sftp_host_key_type']))) {
695
701
  _context3.next = 64;
696
702
  break;
697
703
  }
698
- throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
704
+ throw new errors.InvalidParameterError("Bad parameter: sftp_host_key_type must be of type String, received ".concat((0, _utils.getType)(params['sftp_host_key_type'])));
699
705
  case 64:
700
- if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
706
+ if (!(params['active_sftp_host_key_id'] && !(0, _utils.isInt)(params['active_sftp_host_key_id']))) {
701
707
  _context3.next = 66;
702
708
  break;
703
709
  }
704
- throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
710
+ throw new errors.InvalidParameterError("Bad parameter: active_sftp_host_key_id must be of type Int, received ".concat((0, _utils.getType)(params['active_sftp_host_key_id'])));
705
711
  case 66:
706
- if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
712
+ if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
707
713
  _context3.next = 68;
708
714
  break;
709
715
  }
710
- throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
716
+ throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
711
717
  case 68:
712
- if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
718
+ if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
713
719
  _context3.next = 70;
714
720
  break;
715
721
  }
716
- throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
722
+ throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
717
723
  case 70:
718
- if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
724
+ if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
719
725
  _context3.next = 72;
720
726
  break;
721
727
  }
722
- throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
728
+ throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
723
729
  case 72:
724
- if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
730
+ if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
725
731
  _context3.next = 74;
726
732
  break;
727
733
  }
728
- throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
734
+ throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
729
735
  case 74:
730
- if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
736
+ if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
731
737
  _context3.next = 76;
732
738
  break;
733
739
  }
734
- throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
740
+ throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
735
741
  case 76:
736
- if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
742
+ if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
737
743
  _context3.next = 78;
738
744
  break;
739
745
  }
740
- throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
746
+ throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
741
747
  case 78:
742
- if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
748
+ if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
743
749
  _context3.next = 80;
744
750
  break;
745
751
  }
746
- throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
752
+ throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
747
753
  case 80:
748
- if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
754
+ if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
749
755
  _context3.next = 82;
750
756
  break;
751
757
  }
752
- throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
758
+ throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
753
759
  case 82:
754
- if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
760
+ if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
755
761
  _context3.next = 84;
756
762
  break;
757
763
  }
758
- throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
764
+ throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
759
765
  case 84:
760
- if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
766
+ if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
761
767
  _context3.next = 86;
762
768
  break;
763
769
  }
764
- throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
770
+ throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
765
771
  case 86:
766
- if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
772
+ if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
767
773
  _context3.next = 88;
768
774
  break;
769
775
  }
770
- throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
776
+ throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
771
777
  case 88:
772
- if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
778
+ if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
773
779
  _context3.next = 90;
774
780
  break;
775
781
  }
776
- throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
782
+ throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
777
783
  case 90:
778
- if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
784
+ if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
779
785
  _context3.next = 92;
780
786
  break;
781
787
  }
782
- throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
788
+ throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
783
789
  case 92:
784
- if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
790
+ if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
785
791
  _context3.next = 94;
786
792
  break;
787
793
  }
788
- throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
794
+ throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
789
795
  case 94:
790
- if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
796
+ if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
791
797
  _context3.next = 96;
792
798
  break;
793
799
  }
794
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
800
+ throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
795
801
  case 96:
796
- if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
802
+ if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
797
803
  _context3.next = 98;
798
804
  break;
799
805
  }
800
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
806
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
801
807
  case 98:
802
- if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
808
+ if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
803
809
  _context3.next = 100;
804
810
  break;
805
811
  }
806
- throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
812
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
807
813
  case 100:
808
- if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
814
+ if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
809
815
  _context3.next = 102;
810
816
  break;
811
817
  }
812
- throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
818
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
813
819
  case 102:
814
- if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
820
+ if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
815
821
  _context3.next = 104;
816
822
  break;
817
823
  }
818
- throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
824
+ throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
819
825
  case 104:
820
- if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
826
+ if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
821
827
  _context3.next = 106;
822
828
  break;
823
829
  }
824
- throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
830
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
825
831
  case 106:
826
- if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
832
+ if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
827
833
  _context3.next = 108;
828
834
  break;
829
835
  }
830
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
836
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
831
837
  case 108:
832
- if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
838
+ if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
833
839
  _context3.next = 110;
834
840
  break;
835
841
  }
836
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
842
+ throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
837
843
  case 110:
838
- if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
844
+ if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
839
845
  _context3.next = 112;
840
846
  break;
841
847
  }
842
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
848
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
843
849
  case 112:
844
- if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
850
+ if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
845
851
  _context3.next = 114;
846
852
  break;
847
853
  }
848
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
854
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
849
855
  case 114:
850
- if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
856
+ if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
851
857
  _context3.next = 116;
852
858
  break;
853
859
  }
854
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
860
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
855
861
  case 116:
856
- if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
862
+ if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
857
863
  _context3.next = 118;
858
864
  break;
859
865
  }
860
- throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
866
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
861
867
  case 118:
862
- if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
868
+ if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
863
869
  _context3.next = 120;
864
870
  break;
865
871
  }
866
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
872
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
867
873
  case 120:
868
- if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
874
+ if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
869
875
  _context3.next = 122;
870
876
  break;
871
877
  }
872
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
878
+ throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
873
879
  case 122:
874
- if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
880
+ if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
875
881
  _context3.next = 124;
876
882
  break;
877
883
  }
878
- throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
884
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
879
885
  case 124:
880
- _context3.next = 126;
881
- return _Api.default.sendRequest("/site", 'PATCH', params, options);
886
+ if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
887
+ _context3.next = 126;
888
+ break;
889
+ }
890
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
882
891
  case 126:
892
+ if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
893
+ _context3.next = 128;
894
+ break;
895
+ }
896
+ throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
897
+ case 128:
898
+ _context3.next = 130;
899
+ return _Api.default.sendRequest("/site", 'PATCH', params, options);
900
+ case 130:
883
901
  response = _context3.sent;
884
902
  return _context3.abrupt("return", new Site(response === null || response === void 0 ? void 0 : response.data, options));
885
- case 128:
903
+ case 132:
886
904
  case "end":
887
905
  return _context3.stop();
888
906
  }
@@ -373,6 +373,18 @@ var User = /*#__PURE__*/(0, _createClass2.default)(function User() {
373
373
  (0, _defineProperty2.default)(this, "setUserRoot", function (value) {
374
374
  _this.attributes.user_root = value;
375
375
  });
376
+ (0, _defineProperty2.default)(this, "getDaysRemainingUntilPasswordExpire", function () {
377
+ return _this.attributes.days_remaining_until_password_expire;
378
+ });
379
+ (0, _defineProperty2.default)(this, "setDaysRemainingUntilPasswordExpire", function (value) {
380
+ _this.attributes.days_remaining_until_password_expire = value;
381
+ });
382
+ (0, _defineProperty2.default)(this, "getPasswordExpireAt", function () {
383
+ return _this.attributes.password_expire_at;
384
+ });
385
+ (0, _defineProperty2.default)(this, "setPasswordExpireAt", function (value) {
386
+ _this.attributes.password_expire_at = value;
387
+ });
376
388
  (0, _defineProperty2.default)(this, "getAvatarFile", function () {
377
389
  return _this.attributes.avatar_file;
378
390
  });
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.0.232",
3
+ "version": "1.0.233",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
@@ -59,6 +59,9 @@ class Site {
59
59
  // boolean # If false, rename conflicting files instead of asking for overwrite confirmation. Only applies to web interface.
60
60
  getAskAboutOverwrites = () => this.attributes.ask_about_overwrites
61
61
 
62
+ // string # Do Bundle owners receive activity notifications?
63
+ getBundleActivityNotifications = () => this.attributes.bundle_activity_notifications
64
+
62
65
  // int64 # Site-wide Bundle expiration in days
63
66
  getBundleExpiration = () => this.attributes.bundle_expiration
64
67
 
@@ -71,6 +74,9 @@ class Site {
71
74
  // boolean # Do Bundles require recipients for sharing?
72
75
  getBundleRequireShareRecipient = () => this.attributes.bundle_require_share_recipient
73
76
 
77
+ // string # Do Bundle uploaders receive upload confirmation notifications?
78
+ getBundleUploadReceiptNotifications = () => this.attributes.bundle_upload_receipt_notifications
79
+
74
80
  // Image # Preview watermark image applied to all bundle items.
75
81
  getBundleWatermarkAttachment = () => this.attributes.bundle_watermark_attachment
76
82
 
@@ -512,6 +518,8 @@ class Site {
512
518
  // bundle_password_required - boolean - Do Bundles require password protection?
513
519
  // bundle_require_share_recipient - boolean - Do Bundles require recipients for sharing?
514
520
  // bundle_registration_notifications - string - Do Bundle owners receive registration notification?
521
+ // bundle_activity_notifications - string - Do Bundle owners receive activity notifications?
522
+ // bundle_upload_receipt_notifications - string - Do Bundle uploaders receive upload confirmation notifications?
515
523
  // password_requirements_apply_to_bundles - boolean - Require bundles' passwords, and passwords for other items (inboxes, public shares, etc.) to conform to the same requirements as users' passwords?
516
524
  // opt_out_global - boolean - Use servers in the USA only?
517
525
  // use_provided_modified_at - boolean - Allow uploaders to set `provided_modified_at` for uploaded files?
@@ -689,6 +697,14 @@ class Site {
689
697
  throw new errors.InvalidParameterError(`Bad parameter: bundle_registration_notifications must be of type String, received ${getType(params['bundle_registration_notifications'])}`)
690
698
  }
691
699
 
700
+ if (params['bundle_activity_notifications'] && !isString(params['bundle_activity_notifications'])) {
701
+ throw new errors.InvalidParameterError(`Bad parameter: bundle_activity_notifications must be of type String, received ${getType(params['bundle_activity_notifications'])}`)
702
+ }
703
+
704
+ if (params['bundle_upload_receipt_notifications'] && !isString(params['bundle_upload_receipt_notifications'])) {
705
+ throw new errors.InvalidParameterError(`Bad parameter: bundle_upload_receipt_notifications must be of type String, received ${getType(params['bundle_upload_receipt_notifications'])}`)
706
+ }
707
+
692
708
  if (params['disable_users_from_inactivity_period_days'] && !isInt(params['disable_users_from_inactivity_period_days'])) {
693
709
  throw new errors.InvalidParameterError(`Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ${getType(params['disable_users_from_inactivity_period_days'])}`)
694
710
  }
@@ -421,6 +421,20 @@ class User {
421
421
  this.attributes.user_root = value
422
422
  }
423
423
 
424
+ // date-time # Number of days remaining until password expires
425
+ getDaysRemainingUntilPasswordExpire = () => this.attributes.days_remaining_until_password_expire
426
+
427
+ setDaysRemainingUntilPasswordExpire = value => {
428
+ this.attributes.days_remaining_until_password_expire = value
429
+ }
430
+
431
+ // date-time # Password expiration datetime
432
+ getPasswordExpireAt = () => this.attributes.password_expire_at
433
+
434
+ setPasswordExpireAt = value => {
435
+ this.attributes.password_expire_at = value
436
+ }
437
+
424
438
  // file # An image file for your user avatar.
425
439
  getAvatarFile = () => this.attributes.avatar_file
426
440