files.com 1.0.300 → 1.0.302

Sign up to get free protection for your applications and to get access to all the features.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.300
1
+ 1.0.302
@@ -24,6 +24,7 @@
24
24
  "target_permission": "full",
25
25
  "target_recursive": true,
26
26
  "target_expires_at": 1,
27
+ "target_expires_at_iso8601": "example",
27
28
  "target_permission_set": "desktop_app",
28
29
  "target_platform": "windows",
29
30
  "target_username": "jerry",
@@ -50,7 +51,8 @@
50
51
  * `target_name` (string): Name of the User, Group or other object with a name related to this action
51
52
  * `target_permission` (string): Permission level of the action
52
53
  * `target_recursive` (boolean): Whether or not the action was recursive
53
- * `target_expires_at` (int64): If searching for Histories about API keys, this is when the API key will expire
54
+ * `target_expires_at` (int64): If searching for Histories about API keys, this is when the API key will expire. Represented as a Unix timestamp.
55
+ * `target_expires_at_iso8601` (string): If searching for Histories about API keys, this is when the API key will expire. Represented in ISO8601 format.
54
56
  * `target_permission_set` (string): If searching for Histories about API keys, this represents the permission set of the associated API key
55
57
  * `target_platform` (string): If searching for Histories about API keys, this is the platform on which the action was taken
56
58
  * `target_username` (string): If searching for Histories about API keys, this is the username on which the action was taken
@@ -185,6 +185,7 @@
185
185
  "public_keys_count": 1,
186
186
  "receive_admin_alerts": true,
187
187
  "require_2fa": "always_require",
188
+ "require_login_by": "2000-01-01T01:00:00Z",
188
189
  "active_2fa": true,
189
190
  "require_password_change": true,
190
191
  "password_expired": true,
@@ -48,6 +48,7 @@
48
48
  "public_keys_count": 1,
49
49
  "receive_admin_alerts": true,
50
50
  "require_2fa": "always_require",
51
+ "require_login_by": "2000-01-01T01:00:00Z",
51
52
  "active_2fa": true,
52
53
  "require_password_change": true,
53
54
  "password_expired": true,
@@ -110,6 +111,7 @@
110
111
  * `public_keys_count` (int64): Number of public keys associated with this user
111
112
  * `receive_admin_alerts` (boolean): Should the user receive admin alerts such a certificate expiration notifications and overages?
112
113
  * `require_2fa` (string): 2FA required setting
114
+ * `require_login_by` (date-time): Require user to login by specified date otherwise it will be disabled.
113
115
  * `active_2fa` (boolean): Is 2fa active for the user?
114
116
  * `require_password_change` (boolean): Is a password change required upon next user login?
115
117
  * `password_expired` (boolean): Is user's password expired?
@@ -466,6 +468,7 @@ await user.update({
466
468
  "public_keys_count": 1,
467
469
  "receive_admin_alerts": true,
468
470
  "require_2fa": "always_require",
471
+ "require_login_by": "2000-01-01T01:00:00Z",
469
472
  "active_2fa": true,
470
473
  "require_password_change": true,
471
474
  "password_expired": true,
@@ -107,10 +107,14 @@ var HistoryExportResult = /*#__PURE__*/(0, _createClass2.default)(function Histo
107
107
  (0, _defineProperty2.default)(this, "getTargetRecursive", function () {
108
108
  return _this.attributes.target_recursive;
109
109
  });
110
- // int64 # If searching for Histories about API keys, this is when the API key will expire
110
+ // int64 # If searching for Histories about API keys, this is when the API key will expire. Represented as a Unix timestamp.
111
111
  (0, _defineProperty2.default)(this, "getTargetExpiresAt", function () {
112
112
  return _this.attributes.target_expires_at;
113
113
  });
114
+ // string # If searching for Histories about API keys, this is when the API key will expire. Represented in ISO8601 format.
115
+ (0, _defineProperty2.default)(this, "getTargetExpiresAtIso8601", function () {
116
+ return _this.attributes.target_expires_at_iso8601;
117
+ });
114
118
  // string # If searching for Histories about API keys, this represents the permission set of the associated API key
115
119
  (0, _defineProperty2.default)(this, "getTargetPermissionSet", function () {
116
120
  return _this.attributes.target_permission_set;
@@ -322,6 +322,13 @@ var User = /*#__PURE__*/(0, _createClass2.default)(function User() {
322
322
  (0, _defineProperty2.default)(this, "setRequire2fa", function (value) {
323
323
  _this.attributes.require_2fa = value;
324
324
  });
325
+ // date-time # Require user to login by specified date otherwise it will be disabled.
326
+ (0, _defineProperty2.default)(this, "getRequireLoginBy", function () {
327
+ return _this.attributes.require_login_by;
328
+ });
329
+ (0, _defineProperty2.default)(this, "setRequireLoginBy", function (value) {
330
+ _this.attributes.require_login_by = value;
331
+ });
325
332
  // boolean # Is 2fa active for the user?
326
333
  (0, _defineProperty2.default)(this, "getActive2fa", function () {
327
334
  return _this.attributes.active_2fa;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.0.300",
3
+ "version": "1.0.302",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
@@ -80,9 +80,12 @@ class HistoryExportResult {
80
80
  // boolean # Whether or not the action was recursive
81
81
  getTargetRecursive = () => this.attributes.target_recursive
82
82
 
83
- // int64 # If searching for Histories about API keys, this is when the API key will expire
83
+ // int64 # If searching for Histories about API keys, this is when the API key will expire. Represented as a Unix timestamp.
84
84
  getTargetExpiresAt = () => this.attributes.target_expires_at
85
85
 
86
+ // string # If searching for Histories about API keys, this is when the API key will expire. Represented in ISO8601 format.
87
+ getTargetExpiresAtIso8601 = () => this.attributes.target_expires_at_iso8601
88
+
86
89
  // string # If searching for Histories about API keys, this represents the permission set of the associated API key
87
90
  getTargetPermissionSet = () => this.attributes.target_permission_set
88
91
 
@@ -313,6 +313,13 @@ class User {
313
313
  this.attributes.require_2fa = value
314
314
  }
315
315
 
316
+ // date-time # Require user to login by specified date otherwise it will be disabled.
317
+ getRequireLoginBy = () => this.attributes.require_login_by
318
+
319
+ setRequireLoginBy = value => {
320
+ this.attributes.require_login_by = value
321
+ }
322
+
316
323
  // boolean # Is 2fa active for the user?
317
324
  getActive2fa = () => this.attributes.active_2fa
318
325