files.com 1.0.426 → 1.0.428
Sign up to get free protection for your applications and to get access to all the features.
- package/_VERSION +1 -1
- package/docs/models/Site.md +10 -0
- package/lib/Files.js +1 -1
- package/lib/models/Site.js +83 -67
- package/package.json +1 -1
- package/src/Files.js +1 -1
- package/src/models/Site.js +12 -0
package/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.0.
|
1
|
+
1.0.428
|
package/docs/models/Site.md
CHANGED
@@ -20,6 +20,10 @@
|
|
20
20
|
"bundle_expiration": 1,
|
21
21
|
"bundle_not_found_message": "example",
|
22
22
|
"bundle_password_required": true,
|
23
|
+
"bundle_recipient_blacklist_domains": [
|
24
|
+
"example"
|
25
|
+
],
|
26
|
+
"bundle_recipient_blacklist_free_email_domains": true,
|
23
27
|
"bundle_registration_notifications": "never",
|
24
28
|
"bundle_require_registration": true,
|
25
29
|
"bundle_require_share_recipient": true,
|
@@ -240,6 +244,8 @@
|
|
240
244
|
* `bundle_expiration` (int64): Site-wide Bundle expiration in days
|
241
245
|
* `bundle_not_found_message` (string): Custom error message to show when bundle is not found.
|
242
246
|
* `bundle_password_required` (boolean): Do Bundles require password protection?
|
247
|
+
* `bundle_recipient_blacklist_domains` (array): List of email domains to disallow when entering a Bundle/Inbox recipients
|
248
|
+
* `bundle_recipient_blacklist_free_email_domains` (boolean): Disallow free email domains for Bundle/Inbox recipients?
|
243
249
|
* `bundle_registration_notifications` (string): Do Bundle owners receive registration notification?
|
244
250
|
* `bundle_require_registration` (boolean): Do Bundles require registration?
|
245
251
|
* `bundle_require_share_recipient` (boolean): Do Bundles require recipients for sharing?
|
@@ -479,6 +485,8 @@ await Site.update({
|
|
479
485
|
'active_sftp_host_key_id': 1,
|
480
486
|
'bundle_watermark_value': {"key":"example value"},
|
481
487
|
'group_admins_can_set_user_password': true,
|
488
|
+
'bundle_recipient_blacklist_free_email_domains': true,
|
489
|
+
'bundle_recipient_blacklist_domains': ["example"],
|
482
490
|
'allowed_2fa_method_sms': true,
|
483
491
|
'allowed_2fa_method_u2f': true,
|
484
492
|
'allowed_2fa_method_totp': true,
|
@@ -615,6 +623,8 @@ await Site.update({
|
|
615
623
|
* `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
|
616
624
|
* `bundle_watermark_value` (object): Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
|
617
625
|
* `group_admins_can_set_user_password` (boolean): Allow group admins set password authentication method
|
626
|
+
* `bundle_recipient_blacklist_free_email_domains` (boolean): Disallow free email domains for Bundle/Inbox recipients?
|
627
|
+
* `bundle_recipient_blacklist_domains` (array(string)): List of email domains to disallow when entering a Bundle/Inbox recipients
|
618
628
|
* `allowed_2fa_method_sms` (boolean): Is SMS two factor authentication allowed?
|
619
629
|
* `allowed_2fa_method_u2f` (boolean): Is U2F two factor authentication allowed?
|
620
630
|
* `allowed_2fa_method_totp` (boolean): Is TOTP two factor authentication allowed?
|
package/lib/Files.js
CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
|
|
11
11
|
var apiKey;
|
12
12
|
var baseUrl = 'https://app.files.com';
|
13
13
|
var sessionId = null;
|
14
|
-
var version = '1.0.
|
14
|
+
var version = '1.0.428';
|
15
15
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
16
16
|
var logLevel = _Logger.LogLevel.INFO;
|
17
17
|
var debugRequest = false;
|
package/lib/models/Site.js
CHANGED
@@ -97,6 +97,14 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
97
97
|
(0, _defineProperty2.default)(this, "getBundlePasswordRequired", function () {
|
98
98
|
return _this.attributes.bundle_password_required;
|
99
99
|
});
|
100
|
+
// array # List of email domains to disallow when entering a Bundle/Inbox recipients
|
101
|
+
(0, _defineProperty2.default)(this, "getBundleRecipientBlacklistDomains", function () {
|
102
|
+
return _this.attributes.bundle_recipient_blacklist_domains;
|
103
|
+
});
|
104
|
+
// boolean # Disallow free email domains for Bundle/Inbox recipients?
|
105
|
+
(0, _defineProperty2.default)(this, "getBundleRecipientBlacklistFreeEmailDomains", function () {
|
106
|
+
return _this.attributes.bundle_recipient_blacklist_free_email_domains;
|
107
|
+
});
|
100
108
|
// string # Do Bundle owners receive registration notification?
|
101
109
|
(0, _defineProperty2.default)(this, "getBundleRegistrationNotifications", function () {
|
102
110
|
return _this.attributes.bundle_registration_notifications;
|
@@ -759,6 +767,8 @@ _class = Site;
|
|
759
767
|
// active_sftp_host_key_id - int64 - Id of the currently selected custom SFTP Host Key
|
760
768
|
// bundle_watermark_value - object - Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
|
761
769
|
// group_admins_can_set_user_password - boolean - Allow group admins set password authentication method
|
770
|
+
// bundle_recipient_blacklist_free_email_domains - boolean - Disallow free email domains for Bundle/Inbox recipients?
|
771
|
+
// bundle_recipient_blacklist_domains - array(string) - List of email domains to disallow when entering a Bundle/Inbox recipients
|
762
772
|
// allowed_2fa_method_sms - boolean - Is SMS two factor authentication allowed?
|
763
773
|
// allowed_2fa_method_u2f - boolean - Is U2F two factor authentication allowed?
|
764
774
|
// allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
|
@@ -1030,204 +1040,210 @@ _class = Site;
|
|
1030
1040
|
}
|
1031
1041
|
throw new errors.InvalidParameterError("Bad parameter: active_sftp_host_key_id must be of type Int, received ".concat((0, _utils.getType)(params['active_sftp_host_key_id'])));
|
1032
1042
|
case 70:
|
1033
|
-
if (!(params['
|
1043
|
+
if (!(params['bundle_recipient_blacklist_domains'] && !(0, _utils.isArray)(params['bundle_recipient_blacklist_domains']))) {
|
1034
1044
|
_context3.next = 72;
|
1035
1045
|
break;
|
1036
1046
|
}
|
1037
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1047
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_recipient_blacklist_domains must be of type Array, received ".concat((0, _utils.getType)(params['bundle_recipient_blacklist_domains'])));
|
1038
1048
|
case 72:
|
1039
|
-
if (!(params['
|
1049
|
+
if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
|
1040
1050
|
_context3.next = 74;
|
1041
1051
|
break;
|
1042
1052
|
}
|
1043
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1053
|
+
throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
|
1044
1054
|
case 74:
|
1045
|
-
if (!(params['
|
1055
|
+
if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
|
1046
1056
|
_context3.next = 76;
|
1047
1057
|
break;
|
1048
1058
|
}
|
1049
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1059
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
|
1050
1060
|
case 76:
|
1051
|
-
if (!(params['
|
1061
|
+
if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
|
1052
1062
|
_context3.next = 78;
|
1053
1063
|
break;
|
1054
1064
|
}
|
1055
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1065
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
|
1056
1066
|
case 78:
|
1057
|
-
if (!(params['
|
1067
|
+
if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
|
1058
1068
|
_context3.next = 80;
|
1059
1069
|
break;
|
1060
1070
|
}
|
1061
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1071
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
|
1062
1072
|
case 80:
|
1063
|
-
if (!(params['
|
1073
|
+
if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
|
1064
1074
|
_context3.next = 82;
|
1065
1075
|
break;
|
1066
1076
|
}
|
1067
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1077
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
|
1068
1078
|
case 82:
|
1069
|
-
if (!(params['
|
1079
|
+
if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
|
1070
1080
|
_context3.next = 84;
|
1071
1081
|
break;
|
1072
1082
|
}
|
1073
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1083
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
|
1074
1084
|
case 84:
|
1075
|
-
if (!(params['
|
1085
|
+
if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
|
1076
1086
|
_context3.next = 86;
|
1077
1087
|
break;
|
1078
1088
|
}
|
1079
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1089
|
+
throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
|
1080
1090
|
case 86:
|
1081
|
-
if (!(params['
|
1091
|
+
if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
|
1082
1092
|
_context3.next = 88;
|
1083
1093
|
break;
|
1084
1094
|
}
|
1085
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1095
|
+
throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
|
1086
1096
|
case 88:
|
1087
|
-
if (!(params['
|
1097
|
+
if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
|
1088
1098
|
_context3.next = 90;
|
1089
1099
|
break;
|
1090
1100
|
}
|
1091
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1101
|
+
throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
|
1092
1102
|
case 90:
|
1093
|
-
if (!(params['
|
1103
|
+
if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
|
1094
1104
|
_context3.next = 92;
|
1095
1105
|
break;
|
1096
1106
|
}
|
1097
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1107
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
|
1098
1108
|
case 92:
|
1099
|
-
if (!(params['
|
1109
|
+
if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
|
1100
1110
|
_context3.next = 94;
|
1101
1111
|
break;
|
1102
1112
|
}
|
1103
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1113
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
|
1104
1114
|
case 94:
|
1105
|
-
if (!(params['
|
1115
|
+
if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
|
1106
1116
|
_context3.next = 96;
|
1107
1117
|
break;
|
1108
1118
|
}
|
1109
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1119
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
|
1110
1120
|
case 96:
|
1111
|
-
if (!(params['
|
1121
|
+
if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
|
1112
1122
|
_context3.next = 98;
|
1113
1123
|
break;
|
1114
1124
|
}
|
1115
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1125
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
|
1116
1126
|
case 98:
|
1117
|
-
if (!(params['
|
1127
|
+
if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
|
1118
1128
|
_context3.next = 100;
|
1119
1129
|
break;
|
1120
1130
|
}
|
1121
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1131
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
|
1122
1132
|
case 100:
|
1123
|
-
if (!(params['
|
1133
|
+
if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
|
1124
1134
|
_context3.next = 102;
|
1125
1135
|
break;
|
1126
1136
|
}
|
1127
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1137
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
|
1128
1138
|
case 102:
|
1129
|
-
if (!(params['
|
1139
|
+
if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
|
1130
1140
|
_context3.next = 104;
|
1131
1141
|
break;
|
1132
1142
|
}
|
1133
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1143
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
|
1134
1144
|
case 104:
|
1135
|
-
if (!(params['
|
1145
|
+
if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
|
1136
1146
|
_context3.next = 106;
|
1137
1147
|
break;
|
1138
1148
|
}
|
1139
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1149
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
|
1140
1150
|
case 106:
|
1141
|
-
if (!(params['
|
1151
|
+
if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
|
1142
1152
|
_context3.next = 108;
|
1143
1153
|
break;
|
1144
1154
|
}
|
1145
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1155
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
|
1146
1156
|
case 108:
|
1147
|
-
if (!(params['
|
1157
|
+
if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
|
1148
1158
|
_context3.next = 110;
|
1149
1159
|
break;
|
1150
1160
|
}
|
1151
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1161
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
|
1152
1162
|
case 110:
|
1153
|
-
if (!(params['
|
1163
|
+
if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
|
1154
1164
|
_context3.next = 112;
|
1155
1165
|
break;
|
1156
1166
|
}
|
1157
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1167
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
|
1158
1168
|
case 112:
|
1159
|
-
if (!(params['
|
1169
|
+
if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
|
1160
1170
|
_context3.next = 114;
|
1161
1171
|
break;
|
1162
1172
|
}
|
1163
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1173
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
|
1164
1174
|
case 114:
|
1165
|
-
if (!(params['
|
1175
|
+
if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
|
1166
1176
|
_context3.next = 116;
|
1167
1177
|
break;
|
1168
1178
|
}
|
1169
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1179
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
|
1170
1180
|
case 116:
|
1171
|
-
if (!(params['
|
1181
|
+
if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
|
1172
1182
|
_context3.next = 118;
|
1173
1183
|
break;
|
1174
1184
|
}
|
1175
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1185
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
|
1176
1186
|
case 118:
|
1177
|
-
if (!(params['
|
1187
|
+
if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
|
1178
1188
|
_context3.next = 120;
|
1179
1189
|
break;
|
1180
1190
|
}
|
1181
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1191
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
|
1182
1192
|
case 120:
|
1183
|
-
if (!(params['
|
1193
|
+
if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
|
1184
1194
|
_context3.next = 122;
|
1185
1195
|
break;
|
1186
1196
|
}
|
1187
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1197
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
|
1188
1198
|
case 122:
|
1189
|
-
if (!(params['
|
1199
|
+
if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
|
1190
1200
|
_context3.next = 124;
|
1191
1201
|
break;
|
1192
1202
|
}
|
1193
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1203
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
|
1194
1204
|
case 124:
|
1195
|
-
if (!(params['
|
1205
|
+
if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
|
1196
1206
|
_context3.next = 126;
|
1197
1207
|
break;
|
1198
1208
|
}
|
1199
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1209
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
|
1200
1210
|
case 126:
|
1201
|
-
if (!(params['
|
1211
|
+
if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
|
1202
1212
|
_context3.next = 128;
|
1203
1213
|
break;
|
1204
1214
|
}
|
1205
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1215
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
|
1206
1216
|
case 128:
|
1207
|
-
if (!(params['
|
1217
|
+
if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
|
1208
1218
|
_context3.next = 130;
|
1209
1219
|
break;
|
1210
1220
|
}
|
1211
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1221
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
|
1212
1222
|
case 130:
|
1213
|
-
if (!(params['
|
1223
|
+
if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
|
1214
1224
|
_context3.next = 132;
|
1215
1225
|
break;
|
1216
1226
|
}
|
1217
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1227
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
|
1218
1228
|
case 132:
|
1219
|
-
if (!(params['
|
1229
|
+
if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
|
1220
1230
|
_context3.next = 134;
|
1221
1231
|
break;
|
1222
1232
|
}
|
1223
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1233
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
|
1224
1234
|
case 134:
|
1225
|
-
|
1226
|
-
|
1235
|
+
if (!(params['session_expiry_minutes'] && !(0, _utils.isInt)(params['session_expiry_minutes']))) {
|
1236
|
+
_context3.next = 136;
|
1237
|
+
break;
|
1238
|
+
}
|
1239
|
+
throw new errors.InvalidParameterError("Bad parameter: session_expiry_minutes must be of type Int, received ".concat((0, _utils.getType)(params['session_expiry_minutes'])));
|
1227
1240
|
case 136:
|
1241
|
+
_context3.next = 138;
|
1242
|
+
return _Api.default.sendRequest("/site", 'PATCH', params, options);
|
1243
|
+
case 138:
|
1228
1244
|
response = _context3.sent;
|
1229
1245
|
return _context3.abrupt("return", new _class(response === null || response === void 0 ? void 0 : response.data, options));
|
1230
|
-
case
|
1246
|
+
case 140:
|
1231
1247
|
case "end":
|
1232
1248
|
return _context3.stop();
|
1233
1249
|
}
|
package/package.json
CHANGED
package/src/Files.js
CHANGED
package/src/models/Site.js
CHANGED
@@ -72,6 +72,12 @@ class Site {
|
|
72
72
|
// boolean # Do Bundles require password protection?
|
73
73
|
getBundlePasswordRequired = () => this.attributes.bundle_password_required
|
74
74
|
|
75
|
+
// array # List of email domains to disallow when entering a Bundle/Inbox recipients
|
76
|
+
getBundleRecipientBlacklistDomains = () => this.attributes.bundle_recipient_blacklist_domains
|
77
|
+
|
78
|
+
// boolean # Disallow free email domains for Bundle/Inbox recipients?
|
79
|
+
getBundleRecipientBlacklistFreeEmailDomains = () => this.attributes.bundle_recipient_blacklist_free_email_domains
|
80
|
+
|
75
81
|
// string # Do Bundle owners receive registration notification?
|
76
82
|
getBundleRegistrationNotifications = () => this.attributes.bundle_registration_notifications
|
77
83
|
|
@@ -564,6 +570,8 @@ class Site {
|
|
564
570
|
// active_sftp_host_key_id - int64 - Id of the currently selected custom SFTP Host Key
|
565
571
|
// bundle_watermark_value - object - Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
|
566
572
|
// group_admins_can_set_user_password - boolean - Allow group admins set password authentication method
|
573
|
+
// bundle_recipient_blacklist_free_email_domains - boolean - Disallow free email domains for Bundle/Inbox recipients?
|
574
|
+
// bundle_recipient_blacklist_domains - array(string) - List of email domains to disallow when entering a Bundle/Inbox recipients
|
567
575
|
// allowed_2fa_method_sms - boolean - Is SMS two factor authentication allowed?
|
568
576
|
// allowed_2fa_method_u2f - boolean - Is U2F two factor authentication allowed?
|
569
577
|
// allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
|
@@ -758,6 +766,10 @@ class Site {
|
|
758
766
|
throw new errors.InvalidParameterError(`Bad parameter: active_sftp_host_key_id must be of type Int, received ${getType(params['active_sftp_host_key_id'])}`)
|
759
767
|
}
|
760
768
|
|
769
|
+
if (params['bundle_recipient_blacklist_domains'] && !isArray(params['bundle_recipient_blacklist_domains'])) {
|
770
|
+
throw new errors.InvalidParameterError(`Bad parameter: bundle_recipient_blacklist_domains must be of type Array, received ${getType(params['bundle_recipient_blacklist_domains'])}`)
|
771
|
+
}
|
772
|
+
|
761
773
|
if (params['require_2fa_user_type'] && !isString(params['require_2fa_user_type'])) {
|
762
774
|
throw new errors.InvalidParameterError(`Bad parameter: require_2fa_user_type must be of type String, received ${getType(params['require_2fa_user_type'])}`)
|
763
775
|
}
|