files.com 1.1.8 → 1.1.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.1.8
1
+ 1.1.10
@@ -12,6 +12,7 @@
12
12
  "allowed_2fa_method_yubi": true,
13
13
  "allowed_2fa_method_bypass_for_ftp_sftp_dav": true,
14
14
  "admin_user_id": 1,
15
+ "admins_bypass_locked_subfolders": true,
15
16
  "allow_bundle_names": true,
16
17
  "allowed_countries": "US,DE",
17
18
  "allowed_ips": "example",
@@ -236,6 +237,7 @@
236
237
  * `allowed_2fa_method_yubi` (boolean): Is yubikey two factor authentication allowed?
237
238
  * `allowed_2fa_method_bypass_for_ftp_sftp_dav` (boolean): Are users allowed to configure their two factor authentication to be bypassed for FTP/SFTP/WebDAV?
238
239
  * `admin_user_id` (int64): User ID for the main site administrator
240
+ * `admins_bypass_locked_subfolders` (boolean): Allow admins to bypass the locked subfolders setting.
239
241
  * `allow_bundle_names` (boolean): Are manual Bundle names allowed?
240
242
  * `allowed_countries` (string): Comma seperated list of allowed Country codes
241
243
  * `allowed_ips` (string): List of allowed IP addresses
@@ -487,6 +489,7 @@ await Site.update({
487
489
  'group_admins_can_set_user_password': true,
488
490
  'bundle_recipient_blacklist_free_email_domains': true,
489
491
  'bundle_recipient_blacklist_domains': ["example"],
492
+ 'admins_bypass_locked_subfolders': true,
490
493
  'allowed_2fa_method_sms': true,
491
494
  'allowed_2fa_method_u2f': true,
492
495
  'allowed_2fa_method_totp': true,
@@ -625,6 +628,7 @@ await Site.update({
625
628
  * `group_admins_can_set_user_password` (boolean): Allow group admins set password authentication method
626
629
  * `bundle_recipient_blacklist_free_email_domains` (boolean): Disallow free email domains for Bundle/Inbox recipients?
627
630
  * `bundle_recipient_blacklist_domains` (array(string)): List of email domains to disallow when entering a Bundle/Inbox recipients
631
+ * `admins_bypass_locked_subfolders` (boolean): Allow admins to bypass the locked subfolders setting.
628
632
  * `allowed_2fa_method_sms` (boolean): Is SMS two factor authentication allowed?
629
633
  * `allowed_2fa_method_u2f` (boolean): Is U2F two factor authentication allowed?
630
634
  * `allowed_2fa_method_totp` (boolean): Is TOTP two factor authentication allowed?
@@ -9,6 +9,7 @@
9
9
  "label": "My Corporate SSO Provider",
10
10
  "logo_url": "https://mysite.files.com/.../logo.png",
11
11
  "id": 1,
12
+ "user_count": 1,
12
13
  "saml_provider_cert_fingerprint": "example",
13
14
  "saml_provider_issuer_url": "example",
14
15
  "saml_provider_metadata_content": "example",
@@ -56,6 +57,7 @@
56
57
  * `label` (string): Custom label for the SSO provider on the login page.
57
58
  * `logo_url` (string): URL holding a custom logo for the SSO provider on the login page.
58
59
  * `id` (int64): ID
60
+ * `user_count` (int64): Count of users with this SSO Strategy
59
61
  * `saml_provider_cert_fingerprint` (string): Identity provider sha256 cert fingerprint if saml_provider_metadata_url is not available.
60
62
  * `saml_provider_issuer_url` (string): Identity provider issuer url
61
63
  * `saml_provider_metadata_content` (string): Custom identity provider metadata
package/lib/Files.js CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
11
11
  var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
- var version = '1.1.8';
14
+ var version = '1.1.10';
15
15
  var userAgent = "Files.com JavaScript SDK v".concat(version);
16
16
  var logLevel = _Logger.LogLevel.INFO;
17
17
  var debugRequest = false;
@@ -65,6 +65,10 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
65
65
  (0, _defineProperty2.default)(this, "getAdminUserId", function () {
66
66
  return _this.attributes.admin_user_id;
67
67
  });
68
+ // boolean # Allow admins to bypass the locked subfolders setting.
69
+ (0, _defineProperty2.default)(this, "getAdminsBypassLockedSubfolders", function () {
70
+ return _this.attributes.admins_bypass_locked_subfolders;
71
+ });
68
72
  // boolean # Are manual Bundle names allowed?
69
73
  (0, _defineProperty2.default)(this, "getAllowBundleNames", function () {
70
74
  return _this.attributes.allow_bundle_names;
@@ -769,6 +773,7 @@ _class = Site;
769
773
  // group_admins_can_set_user_password - boolean - Allow group admins set password authentication method
770
774
  // bundle_recipient_blacklist_free_email_domains - boolean - Disallow free email domains for Bundle/Inbox recipients?
771
775
  // bundle_recipient_blacklist_domains - array(string) - List of email domains to disallow when entering a Bundle/Inbox recipients
776
+ // admins_bypass_locked_subfolders - boolean - Allow admins to bypass the locked subfolders setting.
772
777
  // allowed_2fa_method_sms - boolean - Is SMS two factor authentication allowed?
773
778
  // allowed_2fa_method_u2f - boolean - Is U2F two factor authentication allowed?
774
779
  // allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
@@ -53,6 +53,10 @@ var SsoStrategy = /*#__PURE__*/(0, _createClass2.default)(function SsoStrategy()
53
53
  (0, _defineProperty2.default)(this, "getId", function () {
54
54
  return _this.attributes.id;
55
55
  });
56
+ // int64 # Count of users with this SSO Strategy
57
+ (0, _defineProperty2.default)(this, "getUserCount", function () {
58
+ return _this.attributes.user_count;
59
+ });
56
60
  // string # Identity provider sha256 cert fingerprint if saml_provider_metadata_url is not available.
57
61
  (0, _defineProperty2.default)(this, "getSamlProviderCertFingerprint", function () {
58
62
  return _this.attributes.saml_provider_cert_fingerprint;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.1.8",
3
+ "version": "1.1.10",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -5,7 +5,7 @@ const endpointPrefix = '/api/rest/v1'
5
5
  let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
- const version = '1.1.8'
8
+ const version = '1.1.10'
9
9
  let userAgent = `Files.com JavaScript SDK v${version}`
10
10
 
11
11
  let logLevel = LogLevel.INFO
@@ -48,6 +48,9 @@ class Site {
48
48
  // int64 # User ID for the main site administrator
49
49
  getAdminUserId = () => this.attributes.admin_user_id
50
50
 
51
+ // boolean # Allow admins to bypass the locked subfolders setting.
52
+ getAdminsBypassLockedSubfolders = () => this.attributes.admins_bypass_locked_subfolders
53
+
51
54
  // boolean # Are manual Bundle names allowed?
52
55
  getAllowBundleNames = () => this.attributes.allow_bundle_names
53
56
 
@@ -572,6 +575,7 @@ class Site {
572
575
  // group_admins_can_set_user_password - boolean - Allow group admins set password authentication method
573
576
  // bundle_recipient_blacklist_free_email_domains - boolean - Disallow free email domains for Bundle/Inbox recipients?
574
577
  // bundle_recipient_blacklist_domains - array(string) - List of email domains to disallow when entering a Bundle/Inbox recipients
578
+ // admins_bypass_locked_subfolders - boolean - Allow admins to bypass the locked subfolders setting.
575
579
  // allowed_2fa_method_sms - boolean - Is SMS two factor authentication allowed?
576
580
  // allowed_2fa_method_u2f - boolean - Is U2F two factor authentication allowed?
577
581
  // allowed_2fa_method_totp - boolean - Is TOTP two factor authentication allowed?
@@ -39,6 +39,9 @@ class SsoStrategy {
39
39
  // int64 # ID
40
40
  getId = () => this.attributes.id
41
41
 
42
+ // int64 # Count of users with this SSO Strategy
43
+ getUserCount = () => this.attributes.user_count
44
+
42
45
  // string # Identity provider sha256 cert fingerprint if saml_provider_metadata_url is not available.
43
46
  getSamlProviderCertFingerprint = () => this.attributes.saml_provider_cert_fingerprint
44
47