files.com 1.0.427 → 1.0.429
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/_VERSION +1 -1
- package/docs/models/Site.md +10 -0
- package/lib/Files.js +1 -1
- package/lib/models/Site.js +83 -67
- package/package.json +1 -1
- package/src/Files.js +1 -1
- package/src/models/Site.js +12 -0
package/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.0.
|
1
|
+
1.0.429
|
package/docs/models/Site.md
CHANGED
@@ -20,6 +20,10 @@
|
|
20
20
|
"bundle_expiration": 1,
|
21
21
|
"bundle_not_found_message": "example",
|
22
22
|
"bundle_password_required": true,
|
23
|
+
"bundle_recipient_blacklist_domains": [
|
24
|
+
"example"
|
25
|
+
],
|
26
|
+
"bundle_recipient_blacklist_free_email_domains": true,
|
23
27
|
"bundle_registration_notifications": "never",
|
24
28
|
"bundle_require_registration": true,
|
25
29
|
"bundle_require_share_recipient": true,
|
@@ -240,6 +244,8 @@
|
|
240
244
|
* `bundle_expiration` (int64): Site-wide Bundle expiration in days
|
241
245
|
* `bundle_not_found_message` (string): Custom error message to show when bundle is not found.
|
242
246
|
* `bundle_password_required` (boolean): Do Bundles require password protection?
|
247
|
+
* `bundle_recipient_blacklist_domains` (array): List of email domains to disallow when entering a Bundle/Inbox recipients
|
248
|
+
* `bundle_recipient_blacklist_free_email_domains` (boolean): Disallow free email domains for Bundle/Inbox recipients?
|
243
249
|
* `bundle_registration_notifications` (string): Do Bundle owners receive registration notification?
|
244
250
|
* `bundle_require_registration` (boolean): Do Bundles require registration?
|
245
251
|
* `bundle_require_share_recipient` (boolean): Do Bundles require recipients for sharing?
|
@@ -479,6 +485,8 @@ await Site.update({
|
|
479
485
|
'active_sftp_host_key_id': 1,
|
480
486
|
'bundle_watermark_value': {"key":"example value"},
|
481
487
|
'group_admins_can_set_user_password': true,
|
488
|
+
'bundle_recipient_blacklist_free_email_domains': true,
|
489
|
+
'bundle_recipient_blacklist_domains': ["example"],
|
482
490
|
'allowed_2fa_method_sms': true,
|
483
491
|
'allowed_2fa_method_u2f': true,
|
484
492
|
'allowed_2fa_method_totp': true,
|
@@ -615,6 +623,8 @@ await Site.update({
|
|
615
623
|
* `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
|
616
624
|
* `bundle_watermark_value` (object): Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
|
617
625
|
* `group_admins_can_set_user_password` (boolean): Allow group admins set password authentication method
|
626
|
+
* `bundle_recipient_blacklist_free_email_domains` (boolean): Disallow free email domains for Bundle/Inbox recipients?
|
627
|
+
* `bundle_recipient_blacklist_domains` (array(string)): List of email domains to disallow when entering a Bundle/Inbox recipients
|
618
628
|
* `allowed_2fa_method_sms` (boolean): Is SMS two factor authentication allowed?
|
619
629
|
* `allowed_2fa_method_u2f` (boolean): Is U2F two factor authentication allowed?
|
620
630
|
* `allowed_2fa_method_totp` (boolean): Is TOTP two factor authentication allowed?
|
package/lib/Files.js
CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
|
|
11
11
|
var apiKey;
|
12
12
|
var baseUrl = 'https://app.files.com';
|
13
13
|
var sessionId = null;
|
14
|
-
var version = '1.0.
|
14
|
+
var version = '1.0.429';
|
15
15
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
16
16
|
var logLevel = _Logger.LogLevel.INFO;
|
17
17
|
var debugRequest = false;
|
package/lib/models/Site.js
CHANGED
@@ -97,6 +97,14 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
97
97
|
(0, _defineProperty2.default)(this, "getBundlePasswordRequired", function () {
|
98
98
|
return _this.attributes.bundle_password_required;
|
99
99
|
});
|
100
|
+
// array # List of email domains to disallow when entering a Bundle/Inbox recipients
|
101
|
+
(0, _defineProperty2.default)(this, "getBundleRecipientBlacklistDomains", function () {
|
102
|
+
return _this.attributes.bundle_recipient_blacklist_domains;
|
103
|
+
});
|
104
|
+
// boolean # Disallow free email domains for Bundle/Inbox recipients?
|
105
|
+
(0, _defineProperty2.default)(this, "getBundleRecipientBlacklistFreeEmailDomains", function () {
|
106
|
+
return _this.attributes.bundle_recipient_blacklist_free_email_domains;
|
107
|
+
});
|
100
108
|
// string # Do Bundle owners receive registration notification?
|
101
109
|
(0, _defineProperty2.default)(this, "getBundleRegistrationNotifications", function () {
|
102
110
|
return _this.attributes.bundle_registration_notifications;
|
@@ -759,6 +767,8 @@ _class = Site;
|
|
759
767
|
// active_sftp_host_key_id - int64 - Id of the currently selected custom SFTP Host Key
|
760
768
|
// bundle_watermark_value - object - Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
|
761
769
|
// group_admins_can_set_user_password - boolean - Allow group admins set password authentication method
|
770
|
+
// bundle_recipient_blacklist_free_email_domains - boolean - Disallow free email domains for Bundle/Inbox recipients?
|
771
|
+
// bundle_recipient_blacklist_domains - array(string) - List of email domains to disallow when entering a Bundle/Inbox recipients
|
762
772
|
// allowed_2fa_method_sms - boolean - Is SMS two factor authentication allowed?
|
763
773
|
// allowed_2fa_method_u2f - boolean - Is U2F two factor authentication allowed?
|
764
774
|
// allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
|
@@ -1030,204 +1040,210 @@ _class = Site;
|
|
1030
1040
|
}
|
1031
1041
|
throw new errors.InvalidParameterError("Bad parameter: active_sftp_host_key_id must be of type Int, received ".concat((0, _utils.getType)(params['active_sftp_host_key_id'])));
|
1032
1042
|
case 70:
|
1033
|
-
if (!(params['
|
1043
|
+
if (!(params['bundle_recipient_blacklist_domains'] && !(0, _utils.isArray)(params['bundle_recipient_blacklist_domains']))) {
|
1034
1044
|
_context3.next = 72;
|
1035
1045
|
break;
|
1036
1046
|
}
|
1037
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1047
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_recipient_blacklist_domains must be of type Array, received ".concat((0, _utils.getType)(params['bundle_recipient_blacklist_domains'])));
|
1038
1048
|
case 72:
|
1039
|
-
if (!(params['
|
1049
|
+
if (!(params['require_2fa_user_type'] && !(0, _utils.isString)(params['require_2fa_user_type']))) {
|
1040
1050
|
_context3.next = 74;
|
1041
1051
|
break;
|
1042
1052
|
}
|
1043
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1053
|
+
throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params['require_2fa_user_type'])));
|
1044
1054
|
case 74:
|
1045
|
-
if (!(params['
|
1055
|
+
if (!(params['color2_top'] && !(0, _utils.isString)(params['color2_top']))) {
|
1046
1056
|
_context3.next = 76;
|
1047
1057
|
break;
|
1048
1058
|
}
|
1049
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1059
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params['color2_top'])));
|
1050
1060
|
case 76:
|
1051
|
-
if (!(params['
|
1061
|
+
if (!(params['color2_left'] && !(0, _utils.isString)(params['color2_left']))) {
|
1052
1062
|
_context3.next = 78;
|
1053
1063
|
break;
|
1054
1064
|
}
|
1055
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1065
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params['color2_left'])));
|
1056
1066
|
case 78:
|
1057
|
-
if (!(params['
|
1067
|
+
if (!(params['color2_link'] && !(0, _utils.isString)(params['color2_link']))) {
|
1058
1068
|
_context3.next = 80;
|
1059
1069
|
break;
|
1060
1070
|
}
|
1061
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1071
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params['color2_link'])));
|
1062
1072
|
case 80:
|
1063
|
-
if (!(params['
|
1073
|
+
if (!(params['color2_text'] && !(0, _utils.isString)(params['color2_text']))) {
|
1064
1074
|
_context3.next = 82;
|
1065
1075
|
break;
|
1066
1076
|
}
|
1067
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1077
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params['color2_text'])));
|
1068
1078
|
case 82:
|
1069
|
-
if (!(params['
|
1079
|
+
if (!(params['color2_top_text'] && !(0, _utils.isString)(params['color2_top_text']))) {
|
1070
1080
|
_context3.next = 84;
|
1071
1081
|
break;
|
1072
1082
|
}
|
1073
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1083
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params['color2_top_text'])));
|
1074
1084
|
case 84:
|
1075
|
-
if (!(params['
|
1085
|
+
if (!(params['site_header'] && !(0, _utils.isString)(params['site_header']))) {
|
1076
1086
|
_context3.next = 86;
|
1077
1087
|
break;
|
1078
1088
|
}
|
1079
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1089
|
+
throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params['site_header'])));
|
1080
1090
|
case 86:
|
1081
|
-
if (!(params['
|
1091
|
+
if (!(params['site_footer'] && !(0, _utils.isString)(params['site_footer']))) {
|
1082
1092
|
_context3.next = 88;
|
1083
1093
|
break;
|
1084
1094
|
}
|
1085
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1095
|
+
throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params['site_footer'])));
|
1086
1096
|
case 88:
|
1087
|
-
if (!(params['
|
1097
|
+
if (!(params['login_help_text'] && !(0, _utils.isString)(params['login_help_text']))) {
|
1088
1098
|
_context3.next = 90;
|
1089
1099
|
break;
|
1090
1100
|
}
|
1091
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1101
|
+
throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params['login_help_text'])));
|
1092
1102
|
case 90:
|
1093
|
-
if (!(params['
|
1103
|
+
if (!(params['smtp_address'] && !(0, _utils.isString)(params['smtp_address']))) {
|
1094
1104
|
_context3.next = 92;
|
1095
1105
|
break;
|
1096
1106
|
}
|
1097
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1107
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params['smtp_address'])));
|
1098
1108
|
case 92:
|
1099
|
-
if (!(params['
|
1109
|
+
if (!(params['smtp_authentication'] && !(0, _utils.isString)(params['smtp_authentication']))) {
|
1100
1110
|
_context3.next = 94;
|
1101
1111
|
break;
|
1102
1112
|
}
|
1103
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1113
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params['smtp_authentication'])));
|
1104
1114
|
case 94:
|
1105
|
-
if (!(params['
|
1115
|
+
if (!(params['smtp_from'] && !(0, _utils.isString)(params['smtp_from']))) {
|
1106
1116
|
_context3.next = 96;
|
1107
1117
|
break;
|
1108
1118
|
}
|
1109
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1119
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params['smtp_from'])));
|
1110
1120
|
case 96:
|
1111
|
-
if (!(params['
|
1121
|
+
if (!(params['smtp_username'] && !(0, _utils.isString)(params['smtp_username']))) {
|
1112
1122
|
_context3.next = 98;
|
1113
1123
|
break;
|
1114
1124
|
}
|
1115
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1125
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params['smtp_username'])));
|
1116
1126
|
case 98:
|
1117
|
-
if (!(params['
|
1127
|
+
if (!(params['smtp_port'] && !(0, _utils.isInt)(params['smtp_port']))) {
|
1118
1128
|
_context3.next = 100;
|
1119
1129
|
break;
|
1120
1130
|
}
|
1121
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1131
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params['smtp_port'])));
|
1122
1132
|
case 100:
|
1123
|
-
if (!(params['
|
1133
|
+
if (!(params['ldap_type'] && !(0, _utils.isString)(params['ldap_type']))) {
|
1124
1134
|
_context3.next = 102;
|
1125
1135
|
break;
|
1126
1136
|
}
|
1127
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1137
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params['ldap_type'])));
|
1128
1138
|
case 102:
|
1129
|
-
if (!(params['
|
1139
|
+
if (!(params['ldap_host'] && !(0, _utils.isString)(params['ldap_host']))) {
|
1130
1140
|
_context3.next = 104;
|
1131
1141
|
break;
|
1132
1142
|
}
|
1133
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1143
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params['ldap_host'])));
|
1134
1144
|
case 104:
|
1135
|
-
if (!(params['
|
1145
|
+
if (!(params['ldap_host_2'] && !(0, _utils.isString)(params['ldap_host_2']))) {
|
1136
1146
|
_context3.next = 106;
|
1137
1147
|
break;
|
1138
1148
|
}
|
1139
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1149
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_2'])));
|
1140
1150
|
case 106:
|
1141
|
-
if (!(params['
|
1151
|
+
if (!(params['ldap_host_3'] && !(0, _utils.isString)(params['ldap_host_3']))) {
|
1142
1152
|
_context3.next = 108;
|
1143
1153
|
break;
|
1144
1154
|
}
|
1145
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1155
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params['ldap_host_3'])));
|
1146
1156
|
case 108:
|
1147
|
-
if (!(params['
|
1157
|
+
if (!(params['ldap_port'] && !(0, _utils.isInt)(params['ldap_port']))) {
|
1148
1158
|
_context3.next = 110;
|
1149
1159
|
break;
|
1150
1160
|
}
|
1151
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1161
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params['ldap_port'])));
|
1152
1162
|
case 110:
|
1153
|
-
if (!(params['
|
1163
|
+
if (!(params['ldap_username'] && !(0, _utils.isString)(params['ldap_username']))) {
|
1154
1164
|
_context3.next = 112;
|
1155
1165
|
break;
|
1156
1166
|
}
|
1157
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1167
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params['ldap_username'])));
|
1158
1168
|
case 112:
|
1159
|
-
if (!(params['
|
1169
|
+
if (!(params['ldap_username_field'] && !(0, _utils.isString)(params['ldap_username_field']))) {
|
1160
1170
|
_context3.next = 114;
|
1161
1171
|
break;
|
1162
1172
|
}
|
1163
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1173
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params['ldap_username_field'])));
|
1164
1174
|
case 114:
|
1165
|
-
if (!(params['
|
1175
|
+
if (!(params['ldap_domain'] && !(0, _utils.isString)(params['ldap_domain']))) {
|
1166
1176
|
_context3.next = 116;
|
1167
1177
|
break;
|
1168
1178
|
}
|
1169
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1179
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params['ldap_domain'])));
|
1170
1180
|
case 116:
|
1171
|
-
if (!(params['
|
1181
|
+
if (!(params['ldap_user_action'] && !(0, _utils.isString)(params['ldap_user_action']))) {
|
1172
1182
|
_context3.next = 118;
|
1173
1183
|
break;
|
1174
1184
|
}
|
1175
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1185
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_action'])));
|
1176
1186
|
case 118:
|
1177
|
-
if (!(params['
|
1187
|
+
if (!(params['ldap_group_action'] && !(0, _utils.isString)(params['ldap_group_action']))) {
|
1178
1188
|
_context3.next = 120;
|
1179
1189
|
break;
|
1180
1190
|
}
|
1181
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1191
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_action'])));
|
1182
1192
|
case 120:
|
1183
|
-
if (!(params['
|
1193
|
+
if (!(params['ldap_user_include_groups'] && !(0, _utils.isString)(params['ldap_user_include_groups']))) {
|
1184
1194
|
_context3.next = 122;
|
1185
1195
|
break;
|
1186
1196
|
}
|
1187
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1197
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params['ldap_user_include_groups'])));
|
1188
1198
|
case 122:
|
1189
|
-
if (!(params['
|
1199
|
+
if (!(params['ldap_group_exclusion'] && !(0, _utils.isString)(params['ldap_group_exclusion']))) {
|
1190
1200
|
_context3.next = 124;
|
1191
1201
|
break;
|
1192
1202
|
}
|
1193
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1203
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_exclusion'])));
|
1194
1204
|
case 124:
|
1195
|
-
if (!(params['
|
1205
|
+
if (!(params['ldap_group_inclusion'] && !(0, _utils.isString)(params['ldap_group_inclusion']))) {
|
1196
1206
|
_context3.next = 126;
|
1197
1207
|
break;
|
1198
1208
|
}
|
1199
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1209
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params['ldap_group_inclusion'])));
|
1200
1210
|
case 126:
|
1201
|
-
if (!(params['
|
1211
|
+
if (!(params['ldap_base_dn'] && !(0, _utils.isString)(params['ldap_base_dn']))) {
|
1202
1212
|
_context3.next = 128;
|
1203
1213
|
break;
|
1204
1214
|
}
|
1205
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1215
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params['ldap_base_dn'])));
|
1206
1216
|
case 128:
|
1207
|
-
if (!(params['
|
1217
|
+
if (!(params['ldap_password_change'] && !(0, _utils.isString)(params['ldap_password_change']))) {
|
1208
1218
|
_context3.next = 130;
|
1209
1219
|
break;
|
1210
1220
|
}
|
1211
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1221
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change'])));
|
1212
1222
|
case 130:
|
1213
|
-
if (!(params['
|
1223
|
+
if (!(params['ldap_password_change_confirmation'] && !(0, _utils.isString)(params['ldap_password_change_confirmation']))) {
|
1214
1224
|
_context3.next = 132;
|
1215
1225
|
break;
|
1216
1226
|
}
|
1217
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1227
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params['ldap_password_change_confirmation'])));
|
1218
1228
|
case 132:
|
1219
|
-
if (!(params['
|
1229
|
+
if (!(params['smtp_password'] && !(0, _utils.isString)(params['smtp_password']))) {
|
1220
1230
|
_context3.next = 134;
|
1221
1231
|
break;
|
1222
1232
|
}
|
1223
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1233
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params['smtp_password'])));
|
1224
1234
|
case 134:
|
1225
|
-
|
1226
|
-
|
1235
|
+
if (!(params['session_expiry_minutes'] && !(0, _utils.isInt)(params['session_expiry_minutes']))) {
|
1236
|
+
_context3.next = 136;
|
1237
|
+
break;
|
1238
|
+
}
|
1239
|
+
throw new errors.InvalidParameterError("Bad parameter: session_expiry_minutes must be of type Int, received ".concat((0, _utils.getType)(params['session_expiry_minutes'])));
|
1227
1240
|
case 136:
|
1241
|
+
_context3.next = 138;
|
1242
|
+
return _Api.default.sendRequest("/site", 'PATCH', params, options);
|
1243
|
+
case 138:
|
1228
1244
|
response = _context3.sent;
|
1229
1245
|
return _context3.abrupt("return", new _class(response === null || response === void 0 ? void 0 : response.data, options));
|
1230
|
-
case
|
1246
|
+
case 140:
|
1231
1247
|
case "end":
|
1232
1248
|
return _context3.stop();
|
1233
1249
|
}
|
package/package.json
CHANGED
package/src/Files.js
CHANGED
package/src/models/Site.js
CHANGED
@@ -72,6 +72,12 @@ class Site {
|
|
72
72
|
// boolean # Do Bundles require password protection?
|
73
73
|
getBundlePasswordRequired = () => this.attributes.bundle_password_required
|
74
74
|
|
75
|
+
// array # List of email domains to disallow when entering a Bundle/Inbox recipients
|
76
|
+
getBundleRecipientBlacklistDomains = () => this.attributes.bundle_recipient_blacklist_domains
|
77
|
+
|
78
|
+
// boolean # Disallow free email domains for Bundle/Inbox recipients?
|
79
|
+
getBundleRecipientBlacklistFreeEmailDomains = () => this.attributes.bundle_recipient_blacklist_free_email_domains
|
80
|
+
|
75
81
|
// string # Do Bundle owners receive registration notification?
|
76
82
|
getBundleRegistrationNotifications = () => this.attributes.bundle_registration_notifications
|
77
83
|
|
@@ -564,6 +570,8 @@ class Site {
|
|
564
570
|
// active_sftp_host_key_id - int64 - Id of the currently selected custom SFTP Host Key
|
565
571
|
// bundle_watermark_value - object - Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
|
566
572
|
// group_admins_can_set_user_password - boolean - Allow group admins set password authentication method
|
573
|
+
// bundle_recipient_blacklist_free_email_domains - boolean - Disallow free email domains for Bundle/Inbox recipients?
|
574
|
+
// bundle_recipient_blacklist_domains - array(string) - List of email domains to disallow when entering a Bundle/Inbox recipients
|
567
575
|
// allowed_2fa_method_sms - boolean - Is SMS two factor authentication allowed?
|
568
576
|
// allowed_2fa_method_u2f - boolean - Is U2F two factor authentication allowed?
|
569
577
|
// allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
|
@@ -758,6 +766,10 @@ class Site {
|
|
758
766
|
throw new errors.InvalidParameterError(`Bad parameter: active_sftp_host_key_id must be of type Int, received ${getType(params['active_sftp_host_key_id'])}`)
|
759
767
|
}
|
760
768
|
|
769
|
+
if (params['bundle_recipient_blacklist_domains'] && !isArray(params['bundle_recipient_blacklist_domains'])) {
|
770
|
+
throw new errors.InvalidParameterError(`Bad parameter: bundle_recipient_blacklist_domains must be of type Array, received ${getType(params['bundle_recipient_blacklist_domains'])}`)
|
771
|
+
}
|
772
|
+
|
761
773
|
if (params['require_2fa_user_type'] && !isString(params['require_2fa_user_type'])) {
|
762
774
|
throw new errors.InvalidParameterError(`Bad parameter: require_2fa_user_type must be of type String, received ${getType(params['require_2fa_user_type'])}`)
|
763
775
|
}
|