files.com 1.0.232 → 1.0.234
Sign up to get free protection for your applications and to get access to all the features.
- package/_VERSION +1 -1
- package/docs/models/Site.md +8 -0
- package/docs/models/User.md +8 -2
- package/lib/models/Site.js +89 -71
- package/lib/models/User.js +12 -0
- package/package.json +1 -1
- package/src/models/Site.js +16 -0
- package/src/models/User.js +14 -0
package/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.0.
|
1
|
+
1.0.234
|
package/docs/models/Site.md
CHANGED
@@ -16,10 +16,12 @@
|
|
16
16
|
"allowed_countries": "US,DE",
|
17
17
|
"allowed_ips": "example",
|
18
18
|
"ask_about_overwrites": true,
|
19
|
+
"bundle_activity_notifications": "never",
|
19
20
|
"bundle_expiration": 1,
|
20
21
|
"bundle_password_required": true,
|
21
22
|
"bundle_registration_notifications": "never",
|
22
23
|
"bundle_require_share_recipient": true,
|
24
|
+
"bundle_upload_receipt_notifications": "never",
|
23
25
|
"bundle_watermark_attachment": "",
|
24
26
|
"bundle_watermark_value": {
|
25
27
|
"key": "example value"
|
@@ -159,10 +161,12 @@
|
|
159
161
|
* `allowed_countries` (string): Comma seperated list of allowed Country codes
|
160
162
|
* `allowed_ips` (string): List of allowed IP addresses
|
161
163
|
* `ask_about_overwrites` (boolean): If false, rename conflicting files instead of asking for overwrite confirmation. Only applies to web interface.
|
164
|
+
* `bundle_activity_notifications` (string): Do Bundle owners receive activity notifications?
|
162
165
|
* `bundle_expiration` (int64): Site-wide Bundle expiration in days
|
163
166
|
* `bundle_password_required` (boolean): Do Bundles require password protection?
|
164
167
|
* `bundle_registration_notifications` (string): Do Bundle owners receive registration notification?
|
165
168
|
* `bundle_require_share_recipient` (boolean): Do Bundles require recipients for sharing?
|
169
|
+
* `bundle_upload_receipt_notifications` (string): Do Bundle uploaders receive upload confirmation notifications?
|
166
170
|
* `bundle_watermark_attachment` (Image): Preview watermark image applied to all bundle items.
|
167
171
|
* `bundle_watermark_value` (object): Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
|
168
172
|
* `color2_left` (string): Page link and button color
|
@@ -371,6 +375,8 @@ await Site.update({
|
|
371
375
|
'bundle_password_required': true,
|
372
376
|
'bundle_require_share_recipient': true,
|
373
377
|
'bundle_registration_notifications': "never",
|
378
|
+
'bundle_activity_notifications': "never",
|
379
|
+
'bundle_upload_receipt_notifications': "never",
|
374
380
|
'password_requirements_apply_to_bundles': true,
|
375
381
|
'opt_out_global': true,
|
376
382
|
'use_provided_modified_at': true,
|
@@ -497,6 +503,8 @@ await Site.update({
|
|
497
503
|
* `bundle_password_required` (boolean): Do Bundles require password protection?
|
498
504
|
* `bundle_require_share_recipient` (boolean): Do Bundles require recipients for sharing?
|
499
505
|
* `bundle_registration_notifications` (string): Do Bundle owners receive registration notification?
|
506
|
+
* `bundle_activity_notifications` (string): Do Bundle owners receive activity notifications?
|
507
|
+
* `bundle_upload_receipt_notifications` (string): Do Bundle uploaders receive upload confirmation notifications?
|
500
508
|
* `password_requirements_apply_to_bundles` (boolean): Require bundles' passwords, and passwords for other items (inboxes, public shares, etc.) to conform to the same requirements as users' passwords?
|
501
509
|
* `opt_out_global` (boolean): Use servers in the USA only?
|
502
510
|
* `use_provided_modified_at` (boolean): Allow uploaders to set `provided_modified_at` for uploaded files?
|
package/docs/models/User.md
CHANGED
@@ -63,7 +63,9 @@
|
|
63
63
|
"time_zone": "Pacific Time (US & Canada)",
|
64
64
|
"type_of_2fa": "yubi",
|
65
65
|
"updated_at": "2000-01-01T01:00:00Z",
|
66
|
-
"user_root": "example"
|
66
|
+
"user_root": "example",
|
67
|
+
"days_remaining_until_password_expire": 1,
|
68
|
+
"password_expire_at": "2000-01-01T01:00:00Z"
|
67
69
|
}
|
68
70
|
```
|
69
71
|
|
@@ -125,6 +127,8 @@
|
|
125
127
|
* `type_of_2fa` (string): Type(s) of 2FA methods in use. Will be either `sms`, `totp`, `u2f`, `yubi`, or multiple values sorted alphabetically and joined by an underscore.
|
126
128
|
* `updated_at` (date-time): User record most recently updated at. Note this may be incremented because of internal or external updates.
|
127
129
|
* `user_root` (string): Root folder for FTP (and optionally SFTP if the appropriate site-wide setting is set.) Note that this is not used for API, Desktop, or Web interface.
|
130
|
+
* `days_remaining_until_password_expire` (int64): Number of days remaining until password expires
|
131
|
+
* `password_expire_at` (date-time): Password expiration datetime
|
128
132
|
* `avatar_file` (file): An image file for your user avatar.
|
129
133
|
* `avatar_delete` (boolean): If true, the avatar will be deleted.
|
130
134
|
* `change_password` (string): Used for changing a password on an existing user.
|
@@ -479,7 +483,9 @@ await user.update({
|
|
479
483
|
"time_zone": "Pacific Time (US & Canada)",
|
480
484
|
"type_of_2fa": "yubi",
|
481
485
|
"updated_at": "2000-01-01T01:00:00Z",
|
482
|
-
"user_root": "example"
|
486
|
+
"user_root": "example",
|
487
|
+
"days_remaining_until_password_expire": 1,
|
488
|
+
"password_expire_at": "2000-01-01T01:00:00Z"
|
483
489
|
}
|
484
490
|
```
|
485
491
|
|
package/lib/models/Site.js
CHANGED
@@ -67,6 +67,9 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
67
67
|
(0, _defineProperty2.default)(this, "getAskAboutOverwrites", function () {
|
68
68
|
return _this.attributes.ask_about_overwrites;
|
69
69
|
});
|
70
|
+
(0, _defineProperty2.default)(this, "getBundleActivityNotifications", function () {
|
71
|
+
return _this.attributes.bundle_activity_notifications;
|
72
|
+
});
|
70
73
|
(0, _defineProperty2.default)(this, "getBundleExpiration", function () {
|
71
74
|
return _this.attributes.bundle_expiration;
|
72
75
|
});
|
@@ -79,6 +82,9 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
79
82
|
(0, _defineProperty2.default)(this, "getBundleRequireShareRecipient", function () {
|
80
83
|
return _this.attributes.bundle_require_share_recipient;
|
81
84
|
});
|
85
|
+
(0, _defineProperty2.default)(this, "getBundleUploadReceiptNotifications", function () {
|
86
|
+
return _this.attributes.bundle_upload_receipt_notifications;
|
87
|
+
});
|
82
88
|
(0, _defineProperty2.default)(this, "getBundleWatermarkAttachment", function () {
|
83
89
|
return _this.attributes.bundle_watermark_attachment;
|
84
90
|
});
|
@@ -673,216 +679,228 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
673
679
|
}
|
674
680
|
throw new errors.InvalidParameterError("Bad parameter: bundle_registration_notifications must be of type String, received ".concat((0, _utils.getType)(params['bundle_registration_notifications'])));
|
675
681
|
case 56:
|
676
|
-
if (!(params['
|
682
|
+
if (!(params['bundle_activity_notifications'] && !(0, _utils.isString)(params['bundle_activity_notifications']))) {
|
677
683
|
_context3.next = 58;
|
678
684
|
break;
|
679
685
|
}
|
680
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
686
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_activity_notifications must be of type String, received ".concat((0, _utils.getType)(params['bundle_activity_notifications'])));
|
681
687
|
case 58:
|
682
|
-
if (!(params['
|
688
|
+
if (!(params['bundle_upload_receipt_notifications'] && !(0, _utils.isString)(params['bundle_upload_receipt_notifications']))) {
|
683
689
|
_context3.next = 60;
|
684
690
|
break;
|
685
691
|
}
|
686
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
692
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_upload_receipt_notifications must be of type String, received ".concat((0, _utils.getType)(params['bundle_upload_receipt_notifications'])));
|
687
693
|
case 60:
|
688
|
-
if (!(params['
|
694
|
+
if (!(params['disable_users_from_inactivity_period_days'] && !(0, _utils.isInt)(params['disable_users_from_inactivity_period_days']))) {
|
689
695
|
_context3.next = 62;
|
690
696
|
break;
|
691
697
|
}
|
692
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
698
|
+
throw new errors.InvalidParameterError("Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ".concat((0, _utils.getType)(params['disable_users_from_inactivity_period_days'])));
|
693
699
|
case 62:
|
694
|
-
if (!(params['
|
700
|
+
if (!(params['sftp_host_key_type'] && !(0, _utils.isString)(params['sftp_host_key_type']))) {
|
695
701
|
_context3.next = 64;
|
696
702
|
break;
|
697
703
|
}
|
698
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
704
|
+
throw new errors.InvalidParameterError("Bad parameter: sftp_host_key_type must be of type String, received ".concat((0, _utils.getType)(params['sftp_host_key_type'])));
|
699
705
|
case 64:
|
700
|
-
if (!(params['
|
706
|
+
if (!(params['active_sftp_host_key_id'] && !(0, _utils.isInt)(params['active_sftp_host_key_id']))) {
|
701
707
|
_context3.next = 66;
|
702
708
|
break;
|
703
709
|
}
|
704
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
710
|
+
throw new errors.InvalidParameterError("Bad parameter: active_sftp_host_key_id must be of type Int, received ".concat((0, _utils.getType)(params['active_sftp_host_key_id'])));
|
705
711
|
case 66:
|
706
|
-
if (!(params['
|
712
|
+
if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
|
707
713
|
_context3.next = 68;
|
708
714
|
break;
|
709
715
|
}
|
710
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
716
|
+
throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
|
711
717
|
case 68:
|
712
|
-
if (!(params['
|
718
|
+
if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
|
713
719
|
_context3.next = 70;
|
714
720
|
break;
|
715
721
|
}
|
716
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
722
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
|
717
723
|
case 70:
|
718
|
-
if (!(params['
|
724
|
+
if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
|
719
725
|
_context3.next = 72;
|
720
726
|
break;
|
721
727
|
}
|
722
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
728
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
|
723
729
|
case 72:
|
724
|
-
if (!(params['
|
730
|
+
if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
|
725
731
|
_context3.next = 74;
|
726
732
|
break;
|
727
733
|
}
|
728
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
734
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
|
729
735
|
case 74:
|
730
|
-
if (!(params['
|
736
|
+
if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
|
731
737
|
_context3.next = 76;
|
732
738
|
break;
|
733
739
|
}
|
734
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
740
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
|
735
741
|
case 76:
|
736
|
-
if (!(params['
|
742
|
+
if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
|
737
743
|
_context3.next = 78;
|
738
744
|
break;
|
739
745
|
}
|
740
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
746
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
|
741
747
|
case 78:
|
742
|
-
if (!(params['
|
748
|
+
if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
|
743
749
|
_context3.next = 80;
|
744
750
|
break;
|
745
751
|
}
|
746
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
752
|
+
throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
|
747
753
|
case 80:
|
748
|
-
if (!(params['
|
754
|
+
if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
|
749
755
|
_context3.next = 82;
|
750
756
|
break;
|
751
757
|
}
|
752
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
758
|
+
throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
|
753
759
|
case 82:
|
754
|
-
if (!(params['
|
760
|
+
if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
|
755
761
|
_context3.next = 84;
|
756
762
|
break;
|
757
763
|
}
|
758
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
764
|
+
throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
|
759
765
|
case 84:
|
760
|
-
if (!(params['
|
766
|
+
if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
|
761
767
|
_context3.next = 86;
|
762
768
|
break;
|
763
769
|
}
|
764
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
770
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
|
765
771
|
case 86:
|
766
|
-
if (!(params['
|
772
|
+
if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
|
767
773
|
_context3.next = 88;
|
768
774
|
break;
|
769
775
|
}
|
770
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
776
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
|
771
777
|
case 88:
|
772
|
-
if (!(params['
|
778
|
+
if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
|
773
779
|
_context3.next = 90;
|
774
780
|
break;
|
775
781
|
}
|
776
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
782
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
|
777
783
|
case 90:
|
778
|
-
if (!(params['
|
784
|
+
if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
|
779
785
|
_context3.next = 92;
|
780
786
|
break;
|
781
787
|
}
|
782
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
788
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
|
783
789
|
case 92:
|
784
|
-
if (!(params['
|
790
|
+
if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
|
785
791
|
_context3.next = 94;
|
786
792
|
break;
|
787
793
|
}
|
788
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
794
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
|
789
795
|
case 94:
|
790
|
-
if (!(params['
|
796
|
+
if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
|
791
797
|
_context3.next = 96;
|
792
798
|
break;
|
793
799
|
}
|
794
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
800
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
|
795
801
|
case 96:
|
796
|
-
if (!(params['
|
802
|
+
if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
|
797
803
|
_context3.next = 98;
|
798
804
|
break;
|
799
805
|
}
|
800
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
806
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
|
801
807
|
case 98:
|
802
|
-
if (!(params['
|
808
|
+
if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
|
803
809
|
_context3.next = 100;
|
804
810
|
break;
|
805
811
|
}
|
806
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
812
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
|
807
813
|
case 100:
|
808
|
-
if (!(params['
|
814
|
+
if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
|
809
815
|
_context3.next = 102;
|
810
816
|
break;
|
811
817
|
}
|
812
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
818
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
|
813
819
|
case 102:
|
814
|
-
if (!(params['
|
820
|
+
if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
|
815
821
|
_context3.next = 104;
|
816
822
|
break;
|
817
823
|
}
|
818
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
824
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
|
819
825
|
case 104:
|
820
|
-
if (!(params['
|
826
|
+
if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
|
821
827
|
_context3.next = 106;
|
822
828
|
break;
|
823
829
|
}
|
824
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
830
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
|
825
831
|
case 106:
|
826
|
-
if (!(params['
|
832
|
+
if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
|
827
833
|
_context3.next = 108;
|
828
834
|
break;
|
829
835
|
}
|
830
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
836
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
|
831
837
|
case 108:
|
832
|
-
if (!(params['
|
838
|
+
if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
|
833
839
|
_context3.next = 110;
|
834
840
|
break;
|
835
841
|
}
|
836
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
842
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
|
837
843
|
case 110:
|
838
|
-
if (!(params['
|
844
|
+
if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
|
839
845
|
_context3.next = 112;
|
840
846
|
break;
|
841
847
|
}
|
842
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
848
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
|
843
849
|
case 112:
|
844
|
-
if (!(params['
|
850
|
+
if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
|
845
851
|
_context3.next = 114;
|
846
852
|
break;
|
847
853
|
}
|
848
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
854
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
|
849
855
|
case 114:
|
850
|
-
if (!(params['
|
856
|
+
if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
|
851
857
|
_context3.next = 116;
|
852
858
|
break;
|
853
859
|
}
|
854
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
860
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
|
855
861
|
case 116:
|
856
|
-
if (!(params['
|
862
|
+
if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
|
857
863
|
_context3.next = 118;
|
858
864
|
break;
|
859
865
|
}
|
860
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
866
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
|
861
867
|
case 118:
|
862
|
-
if (!(params['
|
868
|
+
if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
|
863
869
|
_context3.next = 120;
|
864
870
|
break;
|
865
871
|
}
|
866
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
872
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
|
867
873
|
case 120:
|
868
|
-
if (!(params['
|
874
|
+
if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
|
869
875
|
_context3.next = 122;
|
870
876
|
break;
|
871
877
|
}
|
872
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
878
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
|
873
879
|
case 122:
|
874
|
-
if (!(params['
|
880
|
+
if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
|
875
881
|
_context3.next = 124;
|
876
882
|
break;
|
877
883
|
}
|
878
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
884
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
|
879
885
|
case 124:
|
880
|
-
|
881
|
-
|
886
|
+
if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
|
887
|
+
_context3.next = 126;
|
888
|
+
break;
|
889
|
+
}
|
890
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
|
882
891
|
case 126:
|
892
|
+
if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
|
893
|
+
_context3.next = 128;
|
894
|
+
break;
|
895
|
+
}
|
896
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
|
897
|
+
case 128:
|
898
|
+
_context3.next = 130;
|
899
|
+
return _Api.default.sendRequest("/site", 'PATCH', params, options);
|
900
|
+
case 130:
|
883
901
|
response = _context3.sent;
|
884
902
|
return _context3.abrupt("return", new Site(response === null || response === void 0 ? void 0 : response.data, options));
|
885
|
-
case
|
903
|
+
case 132:
|
886
904
|
case "end":
|
887
905
|
return _context3.stop();
|
888
906
|
}
|
package/lib/models/User.js
CHANGED
@@ -373,6 +373,18 @@ var User = /*#__PURE__*/(0, _createClass2.default)(function User() {
|
|
373
373
|
(0, _defineProperty2.default)(this, "setUserRoot", function (value) {
|
374
374
|
_this.attributes.user_root = value;
|
375
375
|
});
|
376
|
+
(0, _defineProperty2.default)(this, "getDaysRemainingUntilPasswordExpire", function () {
|
377
|
+
return _this.attributes.days_remaining_until_password_expire;
|
378
|
+
});
|
379
|
+
(0, _defineProperty2.default)(this, "setDaysRemainingUntilPasswordExpire", function (value) {
|
380
|
+
_this.attributes.days_remaining_until_password_expire = value;
|
381
|
+
});
|
382
|
+
(0, _defineProperty2.default)(this, "getPasswordExpireAt", function () {
|
383
|
+
return _this.attributes.password_expire_at;
|
384
|
+
});
|
385
|
+
(0, _defineProperty2.default)(this, "setPasswordExpireAt", function (value) {
|
386
|
+
_this.attributes.password_expire_at = value;
|
387
|
+
});
|
376
388
|
(0, _defineProperty2.default)(this, "getAvatarFile", function () {
|
377
389
|
return _this.attributes.avatar_file;
|
378
390
|
});
|
package/package.json
CHANGED
package/src/models/Site.js
CHANGED
@@ -59,6 +59,9 @@ class Site {
|
|
59
59
|
// boolean # If false, rename conflicting files instead of asking for overwrite confirmation. Only applies to web interface.
|
60
60
|
getAskAboutOverwrites = () => this.attributes.ask_about_overwrites
|
61
61
|
|
62
|
+
// string # Do Bundle owners receive activity notifications?
|
63
|
+
getBundleActivityNotifications = () => this.attributes.bundle_activity_notifications
|
64
|
+
|
62
65
|
// int64 # Site-wide Bundle expiration in days
|
63
66
|
getBundleExpiration = () => this.attributes.bundle_expiration
|
64
67
|
|
@@ -71,6 +74,9 @@ class Site {
|
|
71
74
|
// boolean # Do Bundles require recipients for sharing?
|
72
75
|
getBundleRequireShareRecipient = () => this.attributes.bundle_require_share_recipient
|
73
76
|
|
77
|
+
// string # Do Bundle uploaders receive upload confirmation notifications?
|
78
|
+
getBundleUploadReceiptNotifications = () => this.attributes.bundle_upload_receipt_notifications
|
79
|
+
|
74
80
|
// Image # Preview watermark image applied to all bundle items.
|
75
81
|
getBundleWatermarkAttachment = () => this.attributes.bundle_watermark_attachment
|
76
82
|
|
@@ -512,6 +518,8 @@ class Site {
|
|
512
518
|
// bundle_password_required - boolean - Do Bundles require password protection?
|
513
519
|
// bundle_require_share_recipient - boolean - Do Bundles require recipients for sharing?
|
514
520
|
// bundle_registration_notifications - string - Do Bundle owners receive registration notification?
|
521
|
+
// bundle_activity_notifications - string - Do Bundle owners receive activity notifications?
|
522
|
+
// bundle_upload_receipt_notifications - string - Do Bundle uploaders receive upload confirmation notifications?
|
515
523
|
// password_requirements_apply_to_bundles - boolean - Require bundles' passwords, and passwords for other items (inboxes, public shares, etc.) to conform to the same requirements as users' passwords?
|
516
524
|
// opt_out_global - boolean - Use servers in the USA only?
|
517
525
|
// use_provided_modified_at - boolean - Allow uploaders to set `provided_modified_at` for uploaded files?
|
@@ -689,6 +697,14 @@ class Site {
|
|
689
697
|
throw new errors.InvalidParameterError(`Bad parameter: bundle_registration_notifications must be of type String, received ${getType(params['bundle_registration_notifications'])}`)
|
690
698
|
}
|
691
699
|
|
700
|
+
if (params['bundle_activity_notifications'] && !isString(params['bundle_activity_notifications'])) {
|
701
|
+
throw new errors.InvalidParameterError(`Bad parameter: bundle_activity_notifications must be of type String, received ${getType(params['bundle_activity_notifications'])}`)
|
702
|
+
}
|
703
|
+
|
704
|
+
if (params['bundle_upload_receipt_notifications'] && !isString(params['bundle_upload_receipt_notifications'])) {
|
705
|
+
throw new errors.InvalidParameterError(`Bad parameter: bundle_upload_receipt_notifications must be of type String, received ${getType(params['bundle_upload_receipt_notifications'])}`)
|
706
|
+
}
|
707
|
+
|
692
708
|
if (params['disable_users_from_inactivity_period_days'] && !isInt(params['disable_users_from_inactivity_period_days'])) {
|
693
709
|
throw new errors.InvalidParameterError(`Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ${getType(params['disable_users_from_inactivity_period_days'])}`)
|
694
710
|
}
|
package/src/models/User.js
CHANGED
@@ -421,6 +421,20 @@ class User {
|
|
421
421
|
this.attributes.user_root = value
|
422
422
|
}
|
423
423
|
|
424
|
+
// int64 # Number of days remaining until password expires
|
425
|
+
getDaysRemainingUntilPasswordExpire = () => this.attributes.days_remaining_until_password_expire
|
426
|
+
|
427
|
+
setDaysRemainingUntilPasswordExpire = value => {
|
428
|
+
this.attributes.days_remaining_until_password_expire = value
|
429
|
+
}
|
430
|
+
|
431
|
+
// date-time # Password expiration datetime
|
432
|
+
getPasswordExpireAt = () => this.attributes.password_expire_at
|
433
|
+
|
434
|
+
setPasswordExpireAt = value => {
|
435
|
+
this.attributes.password_expire_at = value
|
436
|
+
}
|
437
|
+
|
424
438
|
// file # An image file for your user avatar.
|
425
439
|
getAvatarFile = () => this.attributes.avatar_file
|
426
440
|
|