files.com 1.0.427 → 1.0.429

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.0.427
1
+ 1.0.429
@@ -20,6 +20,10 @@
20
20
  "bundle_expiration": 1,
21
21
  "bundle_not_found_message": "example",
22
22
  "bundle_password_required": true,
23
+ "bundle_recipient_blacklist_domains": [
24
+ "example"
25
+ ],
26
+ "bundle_recipient_blacklist_free_email_domains": true,
23
27
  "bundle_registration_notifications": "never",
24
28
  "bundle_require_registration": true,
25
29
  "bundle_require_share_recipient": true,
@@ -240,6 +244,8 @@
240
244
  * `bundle_expiration` (int64): Site-wide Bundle expiration in days
241
245
  * `bundle_not_found_message` (string): Custom error message to show when bundle is not found.
242
246
  * `bundle_password_required` (boolean): Do Bundles require password protection?
247
+ * `bundle_recipient_blacklist_domains` (array): List of email domains to disallow when entering a Bundle/Inbox recipients
248
+ * `bundle_recipient_blacklist_free_email_domains` (boolean): Disallow free email domains for Bundle/Inbox recipients?
243
249
  * `bundle_registration_notifications` (string): Do Bundle owners receive registration notification?
244
250
  * `bundle_require_registration` (boolean): Do Bundles require registration?
245
251
  * `bundle_require_share_recipient` (boolean): Do Bundles require recipients for sharing?
@@ -479,6 +485,8 @@ await Site.update({
479
485
  'active_sftp_host_key_id': 1,
480
486
  'bundle_watermark_value': {"key":"example value"},
481
487
  'group_admins_can_set_user_password': true,
488
+ 'bundle_recipient_blacklist_free_email_domains': true,
489
+ 'bundle_recipient_blacklist_domains': ["example"],
482
490
  'allowed_2fa_method_sms': true,
483
491
  'allowed_2fa_method_u2f': true,
484
492
  'allowed_2fa_method_totp': true,
@@ -615,6 +623,8 @@ await Site.update({
615
623
  * `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
616
624
  * `bundle_watermark_value` (object): Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
617
625
  * `group_admins_can_set_user_password` (boolean): Allow group admins set password authentication method
626
+ * `bundle_recipient_blacklist_free_email_domains` (boolean): Disallow free email domains for Bundle/Inbox recipients?
627
+ * `bundle_recipient_blacklist_domains` (array(string)): List of email domains to disallow when entering a Bundle/Inbox recipients
618
628
  * `allowed_2fa_method_sms` (boolean): Is SMS two factor authentication allowed?
619
629
  * `allowed_2fa_method_u2f` (boolean): Is U2F two factor authentication allowed?
620
630
  * `allowed_2fa_method_totp` (boolean): Is TOTP two factor authentication allowed?
package/lib/Files.js CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
11
11
  var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
- var version = '1.0.427';
14
+ var version = '1.0.429';
15
15
  var userAgent = "Files.com JavaScript SDK v".concat(version);
16
16
  var logLevel = _Logger.LogLevel.INFO;
17
17
  var debugRequest = false;
@@ -97,6 +97,14 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
97
97
  (0, _defineProperty2.default)(this, "getBundlePasswordRequired", function () {
98
98
  return _this.attributes.bundle_password_required;
99
99
  });
100
+ // array # List of email domains to disallow when entering a Bundle/Inbox recipients
101
+ (0, _defineProperty2.default)(this, "getBundleRecipientBlacklistDomains", function () {
102
+ return _this.attributes.bundle_recipient_blacklist_domains;
103
+ });
104
+ // boolean # Disallow free email domains for Bundle/Inbox recipients?
105
+ (0, _defineProperty2.default)(this, "getBundleRecipientBlacklistFreeEmailDomains", function () {
106
+ return _this.attributes.bundle_recipient_blacklist_free_email_domains;
107
+ });
100
108
  // string # Do Bundle owners receive registration notification?
101
109
  (0, _defineProperty2.default)(this, "getBundleRegistrationNotifications", function () {
102
110
  return _this.attributes.bundle_registration_notifications;
@@ -759,6 +767,8 @@ _class = Site;
759
767
  // active_sftp_host_key_id - int64 - Id of the currently selected custom SFTP Host Key
760
768
  // bundle_watermark_value - object - Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
761
769
  // group_admins_can_set_user_password - boolean - Allow group admins set password authentication method
770
+ // bundle_recipient_blacklist_free_email_domains - boolean - Disallow free email domains for Bundle/Inbox recipients?
771
+ // bundle_recipient_blacklist_domains - array(string) - List of email domains to disallow when entering a Bundle/Inbox recipients
762
772
  // allowed_2fa_method_sms - boolean - Is SMS two factor authentication allowed?
763
773
  // allowed_2fa_method_u2f - boolean - Is U2F two factor authentication allowed?
764
774
  // allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
@@ -1030,204 +1040,210 @@ _class = Site;
1030
1040
  }
1031
1041
  throw new errors.InvalidParameterError("Bad parameter: active_sftp_host_key_id must be of type Int, received ".concat((0, _utils.getType)(params['active_sftp_host_key_id'])));
1032
1042
  case 70:
1033
- if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
1043
+ if (!(params['bundle_recipient_blacklist_domains'] && !(0, _utils.isArray)(params['bundle_recipient_blacklist_domains']))) {
1034
1044
  _context3.next = 72;
1035
1045
  break;
1036
1046
  }
1037
- throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
1047
+ throw new errors.InvalidParameterError("Bad parameter: bundle_recipient_blacklist_domains must be of type Array, received ".concat((0, _utils.getType)(params['bundle_recipient_blacklist_domains'])));
1038
1048
  case 72:
1039
- if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
1049
+ if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
1040
1050
  _context3.next = 74;
1041
1051
  break;
1042
1052
  }
1043
- throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
1053
+ throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
1044
1054
  case 74:
1045
- if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
1055
+ if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
1046
1056
  _context3.next = 76;
1047
1057
  break;
1048
1058
  }
1049
- throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
1059
+ throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
1050
1060
  case 76:
1051
- if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
1061
+ if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
1052
1062
  _context3.next = 78;
1053
1063
  break;
1054
1064
  }
1055
- throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
1065
+ throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
1056
1066
  case 78:
1057
- if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
1067
+ if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
1058
1068
  _context3.next = 80;
1059
1069
  break;
1060
1070
  }
1061
- throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
1071
+ throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
1062
1072
  case 80:
1063
- if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
1073
+ if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
1064
1074
  _context3.next = 82;
1065
1075
  break;
1066
1076
  }
1067
- throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
1077
+ throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
1068
1078
  case 82:
1069
- if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
1079
+ if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
1070
1080
  _context3.next = 84;
1071
1081
  break;
1072
1082
  }
1073
- throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
1083
+ throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
1074
1084
  case 84:
1075
- if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
1085
+ if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
1076
1086
  _context3.next = 86;
1077
1087
  break;
1078
1088
  }
1079
- throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
1089
+ throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
1080
1090
  case 86:
1081
- if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
1091
+ if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
1082
1092
  _context3.next = 88;
1083
1093
  break;
1084
1094
  }
1085
- throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
1095
+ throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
1086
1096
  case 88:
1087
- if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
1097
+ if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
1088
1098
  _context3.next = 90;
1089
1099
  break;
1090
1100
  }
1091
- throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
1101
+ throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
1092
1102
  case 90:
1093
- if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
1103
+ if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
1094
1104
  _context3.next = 92;
1095
1105
  break;
1096
1106
  }
1097
- throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
1107
+ throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
1098
1108
  case 92:
1099
- if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
1109
+ if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
1100
1110
  _context3.next = 94;
1101
1111
  break;
1102
1112
  }
1103
- throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
1113
+ throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
1104
1114
  case 94:
1105
- if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
1115
+ if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
1106
1116
  _context3.next = 96;
1107
1117
  break;
1108
1118
  }
1109
- throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
1119
+ throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
1110
1120
  case 96:
1111
- if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
1121
+ if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
1112
1122
  _context3.next = 98;
1113
1123
  break;
1114
1124
  }
1115
- throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
1125
+ throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
1116
1126
  case 98:
1117
- if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
1127
+ if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
1118
1128
  _context3.next = 100;
1119
1129
  break;
1120
1130
  }
1121
- throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
1131
+ throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
1122
1132
  case 100:
1123
- if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
1133
+ if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
1124
1134
  _context3.next = 102;
1125
1135
  break;
1126
1136
  }
1127
- throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
1137
+ throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
1128
1138
  case 102:
1129
- if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
1139
+ if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
1130
1140
  _context3.next = 104;
1131
1141
  break;
1132
1142
  }
1133
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
1143
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
1134
1144
  case 104:
1135
- if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
1145
+ if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
1136
1146
  _context3.next = 106;
1137
1147
  break;
1138
1148
  }
1139
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
1149
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
1140
1150
  case 106:
1141
- if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
1151
+ if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
1142
1152
  _context3.next = 108;
1143
1153
  break;
1144
1154
  }
1145
- throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
1155
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
1146
1156
  case 108:
1147
- if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
1157
+ if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
1148
1158
  _context3.next = 110;
1149
1159
  break;
1150
1160
  }
1151
- throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
1161
+ throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
1152
1162
  case 110:
1153
- if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
1163
+ if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
1154
1164
  _context3.next = 112;
1155
1165
  break;
1156
1166
  }
1157
- throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
1167
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
1158
1168
  case 112:
1159
- if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
1169
+ if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
1160
1170
  _context3.next = 114;
1161
1171
  break;
1162
1172
  }
1163
- throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
1173
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
1164
1174
  case 114:
1165
- if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
1175
+ if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
1166
1176
  _context3.next = 116;
1167
1177
  break;
1168
1178
  }
1169
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
1179
+ throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
1170
1180
  case 116:
1171
- if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
1181
+ if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
1172
1182
  _context3.next = 118;
1173
1183
  break;
1174
1184
  }
1175
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
1185
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
1176
1186
  case 118:
1177
- if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
1187
+ if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
1178
1188
  _context3.next = 120;
1179
1189
  break;
1180
1190
  }
1181
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
1191
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
1182
1192
  case 120:
1183
- if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
1193
+ if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
1184
1194
  _context3.next = 122;
1185
1195
  break;
1186
1196
  }
1187
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
1197
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
1188
1198
  case 122:
1189
- if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
1199
+ if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
1190
1200
  _context3.next = 124;
1191
1201
  break;
1192
1202
  }
1193
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
1203
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
1194
1204
  case 124:
1195
- if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
1205
+ if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
1196
1206
  _context3.next = 126;
1197
1207
  break;
1198
1208
  }
1199
- throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
1209
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
1200
1210
  case 126:
1201
- if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
1211
+ if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
1202
1212
  _context3.next = 128;
1203
1213
  break;
1204
1214
  }
1205
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
1215
+ throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
1206
1216
  case 128:
1207
- if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
1217
+ if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
1208
1218
  _context3.next = 130;
1209
1219
  break;
1210
1220
  }
1211
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
1221
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
1212
1222
  case 130:
1213
- if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
1223
+ if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
1214
1224
  _context3.next = 132;
1215
1225
  break;
1216
1226
  }
1217
- throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
1227
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
1218
1228
  case 132:
1219
- if (!(params['session_expiry_minutes'] && !(0, _utils.isInt)(params['session_expiry_minutes']))) {
1229
+ if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
1220
1230
  _context3.next = 134;
1221
1231
  break;
1222
1232
  }
1223
- throw new errors.InvalidParameterError("Bad parameter: session_expiry_minutes must be of type Int, received ".concat((0, _utils.getType)(params['session_expiry_minutes'])));
1233
+ throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
1224
1234
  case 134:
1225
- _context3.next = 136;
1226
- return _Api.default.sendRequest("/site", 'PATCH', params, options);
1235
+ if (!(params['session_expiry_minutes'] && !(0, _utils.isInt)(params['session_expiry_minutes']))) {
1236
+ _context3.next = 136;
1237
+ break;
1238
+ }
1239
+ throw new errors.InvalidParameterError("Bad parameter: session_expiry_minutes must be of type Int, received ".concat((0, _utils.getType)(params['session_expiry_minutes'])));
1227
1240
  case 136:
1241
+ _context3.next = 138;
1242
+ return _Api.default.sendRequest("/site", 'PATCH', params, options);
1243
+ case 138:
1228
1244
  response = _context3.sent;
1229
1245
  return _context3.abrupt("return", new _class(response === null || response === void 0 ? void 0 : response.data, options));
1230
- case 138:
1246
+ case 140:
1231
1247
  case "end":
1232
1248
  return _context3.stop();
1233
1249
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.0.427",
3
+ "version": "1.0.429",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -5,7 +5,7 @@ const endpointPrefix = '/api/rest/v1'
5
5
  let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
- const version = '1.0.427'
8
+ const version = '1.0.429'
9
9
  let userAgent = `Files.com JavaScript SDK v${version}`
10
10
 
11
11
  let logLevel = LogLevel.INFO
@@ -72,6 +72,12 @@ class Site {
72
72
  // boolean # Do Bundles require password protection?
73
73
  getBundlePasswordRequired = () => this.attributes.bundle_password_required
74
74
 
75
+ // array # List of email domains to disallow when entering a Bundle/Inbox recipients
76
+ getBundleRecipientBlacklistDomains = () => this.attributes.bundle_recipient_blacklist_domains
77
+
78
+ // boolean # Disallow free email domains for Bundle/Inbox recipients?
79
+ getBundleRecipientBlacklistFreeEmailDomains = () => this.attributes.bundle_recipient_blacklist_free_email_domains
80
+
75
81
  // string # Do Bundle owners receive registration notification?
76
82
  getBundleRegistrationNotifications = () => this.attributes.bundle_registration_notifications
77
83
 
@@ -564,6 +570,8 @@ class Site {
564
570
  // active_sftp_host_key_id - int64 - Id of the currently selected custom SFTP Host Key
565
571
  // bundle_watermark_value - object - Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
566
572
  // group_admins_can_set_user_password - boolean - Allow group admins set password authentication method
573
+ // bundle_recipient_blacklist_free_email_domains - boolean - Disallow free email domains for Bundle/Inbox recipients?
574
+ // bundle_recipient_blacklist_domains - array(string) - List of email domains to disallow when entering a Bundle/Inbox recipients
567
575
  // allowed_2fa_method_sms - boolean - Is SMS two factor authentication allowed?
568
576
  // allowed_2fa_method_u2f - boolean - Is U2F two factor authentication allowed?
569
577
  // allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
@@ -758,6 +766,10 @@ class Site {
758
766
  throw new errors.InvalidParameterError(`Bad parameter: active_sftp_host_key_id must be of type Int, received ${getType(params['active_sftp_host_key_id'])}`)
759
767
  }
760
768
 
769
+ if (params['bundle_recipient_blacklist_domains'] && !isArray(params['bundle_recipient_blacklist_domains'])) {
770
+ throw new errors.InvalidParameterError(`Bad parameter: bundle_recipient_blacklist_domains must be of type Array, received ${getType(params['bundle_recipient_blacklist_domains'])}`)
771
+ }
772
+
761
773
  if (params['require_2fa_user_type'] && !isString(params['require_2fa_user_type'])) {
762
774
  throw new errors.InvalidParameterError(`Bad parameter: require_2fa_user_type must be of type String, received ${getType(params['require_2fa_user_type'])}`)
763
775
  }