files.com 1.0.426 → 1.0.428

Sign up to get free protection for your applications and to get access to all the features.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.426
1
+ 1.0.428
@@ -20,6 +20,10 @@
20
20
  "bundle_expiration": 1,
21
21
  "bundle_not_found_message": "example",
22
22
  "bundle_password_required": true,
23
+ "bundle_recipient_blacklist_domains": [
24
+ "example"
25
+ ],
26
+ "bundle_recipient_blacklist_free_email_domains": true,
23
27
  "bundle_registration_notifications": "never",
24
28
  "bundle_require_registration": true,
25
29
  "bundle_require_share_recipient": true,
@@ -240,6 +244,8 @@
240
244
  * `bundle_expiration` (int64): Site-wide Bundle expiration in days
241
245
  * `bundle_not_found_message` (string): Custom error message to show when bundle is not found.
242
246
  * `bundle_password_required` (boolean): Do Bundles require password protection?
247
+ * `bundle_recipient_blacklist_domains` (array): List of email domains to disallow when entering a Bundle/Inbox recipients
248
+ * `bundle_recipient_blacklist_free_email_domains` (boolean): Disallow free email domains for Bundle/Inbox recipients?
243
249
  * `bundle_registration_notifications` (string): Do Bundle owners receive registration notification?
244
250
  * `bundle_require_registration` (boolean): Do Bundles require registration?
245
251
  * `bundle_require_share_recipient` (boolean): Do Bundles require recipients for sharing?
@@ -479,6 +485,8 @@ await Site.update({
479
485
  'active_sftp_host_key_id': 1,
480
486
  'bundle_watermark_value': {"key":"example value"},
481
487
  'group_admins_can_set_user_password': true,
488
+ 'bundle_recipient_blacklist_free_email_domains': true,
489
+ 'bundle_recipient_blacklist_domains': ["example"],
482
490
  'allowed_2fa_method_sms': true,
483
491
  'allowed_2fa_method_u2f': true,
484
492
  'allowed_2fa_method_totp': true,
@@ -615,6 +623,8 @@ await Site.update({
615
623
  * `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
616
624
  * `bundle_watermark_value` (object): Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
617
625
  * `group_admins_can_set_user_password` (boolean): Allow group admins set password authentication method
626
+ * `bundle_recipient_blacklist_free_email_domains` (boolean): Disallow free email domains for Bundle/Inbox recipients?
627
+ * `bundle_recipient_blacklist_domains` (array(string)): List of email domains to disallow when entering a Bundle/Inbox recipients
618
628
  * `allowed_2fa_method_sms` (boolean): Is SMS two factor authentication allowed?
619
629
  * `allowed_2fa_method_u2f` (boolean): Is U2F two factor authentication allowed?
620
630
  * `allowed_2fa_method_totp` (boolean): Is TOTP two factor authentication allowed?
package/lib/Files.js CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
11
11
  var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
- var version = '1.0.426';
14
+ var version = '1.0.428';
15
15
  var userAgent = "Files.com JavaScript SDK v".concat(version);
16
16
  var logLevel = _Logger.LogLevel.INFO;
17
17
  var debugRequest = false;
@@ -97,6 +97,14 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
97
97
  (0, _defineProperty2.default)(this, "getBundlePasswordRequired", function () {
98
98
  return _this.attributes.bundle_password_required;
99
99
  });
100
+ // array # List of email domains to disallow when entering a Bundle/Inbox recipients
101
+ (0, _defineProperty2.default)(this, "getBundleRecipientBlacklistDomains", function () {
102
+ return _this.attributes.bundle_recipient_blacklist_domains;
103
+ });
104
+ // boolean # Disallow free email domains for Bundle/Inbox recipients?
105
+ (0, _defineProperty2.default)(this, "getBundleRecipientBlacklistFreeEmailDomains", function () {
106
+ return _this.attributes.bundle_recipient_blacklist_free_email_domains;
107
+ });
100
108
  // string # Do Bundle owners receive registration notification?
101
109
  (0, _defineProperty2.default)(this, "getBundleRegistrationNotifications", function () {
102
110
  return _this.attributes.bundle_registration_notifications;
@@ -759,6 +767,8 @@ _class = Site;
759
767
  // active_sftp_host_key_id - int64 - Id of the currently selected custom SFTP Host Key
760
768
  // bundle_watermark_value - object - Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
761
769
  // group_admins_can_set_user_password - boolean - Allow group admins set password authentication method
770
+ // bundle_recipient_blacklist_free_email_domains - boolean - Disallow free email domains for Bundle/Inbox recipients?
771
+ // bundle_recipient_blacklist_domains - array(string) - List of email domains to disallow when entering a Bundle/Inbox recipients
762
772
  // allowed_2fa_method_sms - boolean - Is SMS two factor authentication allowed?
763
773
  // allowed_2fa_method_u2f - boolean - Is U2F two factor authentication allowed?
764
774
  // allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
@@ -1030,204 +1040,210 @@ _class = Site;
1030
1040
  }
1031
1041
  throw new errors.InvalidParameterError("Bad parameter: active_sftp_host_key_id must be of type Int, received ".concat((0, _utils.getType)(params['active_sftp_host_key_id'])));
1032
1042
  case 70:
1033
- if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
1043
+ if (!(params['bundle_recipient_blacklist_domains'] && !(0, _utils.isArray)(params['bundle_recipient_blacklist_domains']))) {
1034
1044
  _context3.next = 72;
1035
1045
  break;
1036
1046
  }
1037
- throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
1047
+ throw new errors.InvalidParameterError("Bad parameter: bundle_recipient_blacklist_domains must be of type Array, received ".concat((0, _utils.getType)(params['bundle_recipient_blacklist_domains'])));
1038
1048
  case 72:
1039
- if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
1049
+ if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
1040
1050
  _context3.next = 74;
1041
1051
  break;
1042
1052
  }
1043
- throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
1053
+ throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
1044
1054
  case 74:
1045
- if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
1055
+ if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
1046
1056
  _context3.next = 76;
1047
1057
  break;
1048
1058
  }
1049
- throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
1059
+ throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
1050
1060
  case 76:
1051
- if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
1061
+ if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
1052
1062
  _context3.next = 78;
1053
1063
  break;
1054
1064
  }
1055
- throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
1065
+ throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
1056
1066
  case 78:
1057
- if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
1067
+ if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
1058
1068
  _context3.next = 80;
1059
1069
  break;
1060
1070
  }
1061
- throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
1071
+ throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
1062
1072
  case 80:
1063
- if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
1073
+ if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
1064
1074
  _context3.next = 82;
1065
1075
  break;
1066
1076
  }
1067
- throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
1077
+ throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
1068
1078
  case 82:
1069
- if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
1079
+ if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
1070
1080
  _context3.next = 84;
1071
1081
  break;
1072
1082
  }
1073
- throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
1083
+ throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
1074
1084
  case 84:
1075
- if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
1085
+ if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
1076
1086
  _context3.next = 86;
1077
1087
  break;
1078
1088
  }
1079
- throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
1089
+ throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
1080
1090
  case 86:
1081
- if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
1091
+ if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
1082
1092
  _context3.next = 88;
1083
1093
  break;
1084
1094
  }
1085
- throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
1095
+ throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
1086
1096
  case 88:
1087
- if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
1097
+ if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
1088
1098
  _context3.next = 90;
1089
1099
  break;
1090
1100
  }
1091
- throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
1101
+ throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
1092
1102
  case 90:
1093
- if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
1103
+ if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
1094
1104
  _context3.next = 92;
1095
1105
  break;
1096
1106
  }
1097
- throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
1107
+ throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
1098
1108
  case 92:
1099
- if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
1109
+ if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
1100
1110
  _context3.next = 94;
1101
1111
  break;
1102
1112
  }
1103
- throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
1113
+ throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
1104
1114
  case 94:
1105
- if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
1115
+ if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
1106
1116
  _context3.next = 96;
1107
1117
  break;
1108
1118
  }
1109
- throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
1119
+ throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
1110
1120
  case 96:
1111
- if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
1121
+ if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
1112
1122
  _context3.next = 98;
1113
1123
  break;
1114
1124
  }
1115
- throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
1125
+ throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
1116
1126
  case 98:
1117
- if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
1127
+ if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
1118
1128
  _context3.next = 100;
1119
1129
  break;
1120
1130
  }
1121
- throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
1131
+ throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
1122
1132
  case 100:
1123
- if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
1133
+ if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
1124
1134
  _context3.next = 102;
1125
1135
  break;
1126
1136
  }
1127
- throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
1137
+ throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
1128
1138
  case 102:
1129
- if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
1139
+ if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
1130
1140
  _context3.next = 104;
1131
1141
  break;
1132
1142
  }
1133
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
1143
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
1134
1144
  case 104:
1135
- if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
1145
+ if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
1136
1146
  _context3.next = 106;
1137
1147
  break;
1138
1148
  }
1139
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
1149
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
1140
1150
  case 106:
1141
- if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
1151
+ if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
1142
1152
  _context3.next = 108;
1143
1153
  break;
1144
1154
  }
1145
- throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
1155
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
1146
1156
  case 108:
1147
- if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
1157
+ if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
1148
1158
  _context3.next = 110;
1149
1159
  break;
1150
1160
  }
1151
- throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
1161
+ throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
1152
1162
  case 110:
1153
- if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
1163
+ if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
1154
1164
  _context3.next = 112;
1155
1165
  break;
1156
1166
  }
1157
- throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
1167
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
1158
1168
  case 112:
1159
- if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
1169
+ if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
1160
1170
  _context3.next = 114;
1161
1171
  break;
1162
1172
  }
1163
- throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
1173
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
1164
1174
  case 114:
1165
- if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
1175
+ if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
1166
1176
  _context3.next = 116;
1167
1177
  break;
1168
1178
  }
1169
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
1179
+ throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
1170
1180
  case 116:
1171
- if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
1181
+ if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
1172
1182
  _context3.next = 118;
1173
1183
  break;
1174
1184
  }
1175
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
1185
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
1176
1186
  case 118:
1177
- if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
1187
+ if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
1178
1188
  _context3.next = 120;
1179
1189
  break;
1180
1190
  }
1181
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
1191
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
1182
1192
  case 120:
1183
- if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
1193
+ if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
1184
1194
  _context3.next = 122;
1185
1195
  break;
1186
1196
  }
1187
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
1197
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
1188
1198
  case 122:
1189
- if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
1199
+ if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
1190
1200
  _context3.next = 124;
1191
1201
  break;
1192
1202
  }
1193
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
1203
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
1194
1204
  case 124:
1195
- if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
1205
+ if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
1196
1206
  _context3.next = 126;
1197
1207
  break;
1198
1208
  }
1199
- throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
1209
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
1200
1210
  case 126:
1201
- if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
1211
+ if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
1202
1212
  _context3.next = 128;
1203
1213
  break;
1204
1214
  }
1205
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
1215
+ throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
1206
1216
  case 128:
1207
- if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
1217
+ if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
1208
1218
  _context3.next = 130;
1209
1219
  break;
1210
1220
  }
1211
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
1221
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
1212
1222
  case 130:
1213
- if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
1223
+ if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
1214
1224
  _context3.next = 132;
1215
1225
  break;
1216
1226
  }
1217
- throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
1227
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
1218
1228
  case 132:
1219
- if (!(params['session_expiry_minutes'] && !(0, _utils.isInt)(params['session_expiry_minutes']))) {
1229
+ if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
1220
1230
  _context3.next = 134;
1221
1231
  break;
1222
1232
  }
1223
- throw new errors.InvalidParameterError("Bad parameter: session_expiry_minutes must be of type Int, received ".concat((0, _utils.getType)(params['session_expiry_minutes'])));
1233
+ throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
1224
1234
  case 134:
1225
- _context3.next = 136;
1226
- return _Api.default.sendRequest("/site", 'PATCH', params, options);
1235
+ if (!(params['session_expiry_minutes'] && !(0, _utils.isInt)(params['session_expiry_minutes']))) {
1236
+ _context3.next = 136;
1237
+ break;
1238
+ }
1239
+ throw new errors.InvalidParameterError("Bad parameter: session_expiry_minutes must be of type Int, received ".concat((0, _utils.getType)(params['session_expiry_minutes'])));
1227
1240
  case 136:
1241
+ _context3.next = 138;
1242
+ return _Api.default.sendRequest("/site", 'PATCH', params, options);
1243
+ case 138:
1228
1244
  response = _context3.sent;
1229
1245
  return _context3.abrupt("return", new _class(response === null || response === void 0 ? void 0 : response.data, options));
1230
- case 138:
1246
+ case 140:
1231
1247
  case "end":
1232
1248
  return _context3.stop();
1233
1249
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.0.426",
3
+ "version": "1.0.428",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -5,7 +5,7 @@ const endpointPrefix = '/api/rest/v1'
5
5
  let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
- const version = '1.0.426'
8
+ const version = '1.0.428'
9
9
  let userAgent = `Files.com JavaScript SDK v${version}`
10
10
 
11
11
  let logLevel = LogLevel.INFO
@@ -72,6 +72,12 @@ class Site {
72
72
  // boolean # Do Bundles require password protection?
73
73
  getBundlePasswordRequired = () => this.attributes.bundle_password_required
74
74
 
75
+ // array # List of email domains to disallow when entering a Bundle/Inbox recipients
76
+ getBundleRecipientBlacklistDomains = () => this.attributes.bundle_recipient_blacklist_domains
77
+
78
+ // boolean # Disallow free email domains for Bundle/Inbox recipients?
79
+ getBundleRecipientBlacklistFreeEmailDomains = () => this.attributes.bundle_recipient_blacklist_free_email_domains
80
+
75
81
  // string # Do Bundle owners receive registration notification?
76
82
  getBundleRegistrationNotifications = () => this.attributes.bundle_registration_notifications
77
83
 
@@ -564,6 +570,8 @@ class Site {
564
570
  // active_sftp_host_key_id - int64 - Id of the currently selected custom SFTP Host Key
565
571
  // bundle_watermark_value - object - Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
566
572
  // group_admins_can_set_user_password - boolean - Allow group admins set password authentication method
573
+ // bundle_recipient_blacklist_free_email_domains - boolean - Disallow free email domains for Bundle/Inbox recipients?
574
+ // bundle_recipient_blacklist_domains - array(string) - List of email domains to disallow when entering a Bundle/Inbox recipients
567
575
  // allowed_2fa_method_sms - boolean - Is SMS two factor authentication allowed?
568
576
  // allowed_2fa_method_u2f - boolean - Is U2F two factor authentication allowed?
569
577
  // allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
@@ -758,6 +766,10 @@ class Site {
758
766
  throw new errors.InvalidParameterError(`Bad parameter: active_sftp_host_key_id must be of type Int, received ${getType(params['active_sftp_host_key_id'])}`)
759
767
  }
760
768
 
769
+ if (params['bundle_recipient_blacklist_domains'] && !isArray(params['bundle_recipient_blacklist_domains'])) {
770
+ throw new errors.InvalidParameterError(`Bad parameter: bundle_recipient_blacklist_domains must be of type Array, received ${getType(params['bundle_recipient_blacklist_domains'])}`)
771
+ }
772
+
761
773
  if (params['require_2fa_user_type'] && !isString(params['require_2fa_user_type'])) {
762
774
  throw new errors.InvalidParameterError(`Bad parameter: require_2fa_user_type must be of type String, received ${getType(params['require_2fa_user_type'])}`)
763
775
  }