files.com 1.2.107 → 1.2.109
Sign up to get free protection for your applications and to get access to all the features.
- package/README.md +2 -2
- package/_VERSION +1 -1
- package/docs/models/Site.md +6 -6
- package/docs/models/User.md +3 -3
- package/lib/Files.js +1 -1
- package/lib/models/Site.js +6 -6
- package/lib/models/User.js +3 -3
- package/package.json +1 -1
- package/shared/normalization_for_comparison_test_data.json +1 -1
- package/src/Files.js +1 -1
- package/src/models/Site.js +6 -6
- package/src/models/User.js +3 -3
- package/test/integration/src/index.js +7 -7
package/README.md
CHANGED
@@ -256,9 +256,9 @@ try {
|
|
256
256
|
}
|
257
257
|
catch(err) {
|
258
258
|
if (err instanceof FilesErrors.NotAuthenticatedError) {
|
259
|
-
console.log("Authorization Error
|
259
|
+
console.log("Authorization Error Occurred (" + err.constructor.name + "): " + err.error);
|
260
260
|
} else if (err instanceof FilesErrors.FilesError) {
|
261
|
-
console.log("Unknown Error
|
261
|
+
console.log("Unknown Error Occurred (" + err.constructor.name + "): " + err.error);
|
262
262
|
} else {
|
263
263
|
throw err;
|
264
264
|
}
|
package/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.2.
|
1
|
+
1.2.109
|
package/docs/models/Site.md
CHANGED
@@ -298,7 +298,7 @@
|
|
298
298
|
* `admin_user_id` (int64): User ID for the main site administrator
|
299
299
|
* `admins_bypass_locked_subfolders` (boolean): Allow admins to bypass the locked subfolders setting.
|
300
300
|
* `allow_bundle_names` (boolean): Are manual Bundle names allowed?
|
301
|
-
* `allowed_countries` (string): Comma
|
301
|
+
* `allowed_countries` (string): Comma separated list of allowed Country codes
|
302
302
|
* `allowed_ips` (string): List of allowed IP addresses
|
303
303
|
* `always_mkdir_parents` (boolean): Create parent directories if they do not exist during uploads? This is primarily used to work around broken upload clients that assume servers will perform this step.
|
304
304
|
* `ask_about_overwrites` (boolean): If false, rename conflicting files instead of asking for overwrite confirmation. Only applies to web interface.
|
@@ -335,7 +335,7 @@
|
|
335
335
|
* `mobile_app` (boolean): Is the mobile app enabled?
|
336
336
|
* `mobile_app_session_ip_pinning` (boolean): Is mobile app session IP pinning enabled?
|
337
337
|
* `mobile_app_session_lifetime` (int64): Mobile app session lifetime (in hours)
|
338
|
-
* `disallowed_countries` (string): Comma
|
338
|
+
* `disallowed_countries` (string): Comma separated list of disallowed Country codes
|
339
339
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
340
340
|
* `disable_notifications` (boolean): Are notifications disabled?
|
341
341
|
* `disable_password_reset` (boolean): Is password reset disabled?
|
@@ -407,7 +407,7 @@
|
|
407
407
|
* `sftp_enabled` (boolean): Is SFTP enabled?
|
408
408
|
* `sftp_host_key_type` (string): Sftp Host Key Type
|
409
409
|
* `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
|
410
|
-
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting
|
410
|
+
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
411
411
|
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
412
412
|
* `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
|
413
413
|
* `sharing_enabled` (boolean): Allow bundle creation
|
@@ -661,7 +661,7 @@ await Site.update({
|
|
661
661
|
* `session_expiry` (double): Session expiry in hours
|
662
662
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
663
663
|
* `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
664
|
-
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting
|
664
|
+
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
665
665
|
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
666
666
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
667
667
|
* `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
|
@@ -669,9 +669,9 @@ await Site.update({
|
|
669
669
|
* `user_lockout_within` (int64): Number of hours for user lockout window
|
670
670
|
* `user_lockout_lock_period` (int64): How many hours to lock user out for failed password?
|
671
671
|
* `include_password_in_welcome_email` (boolean): Include password in emails to new users?
|
672
|
-
* `allowed_countries` (string): Comma
|
672
|
+
* `allowed_countries` (string): Comma separated list of allowed Country codes
|
673
673
|
* `allowed_ips` (string): List of allowed IP addresses
|
674
|
-
* `disallowed_countries` (string): Comma
|
674
|
+
* `disallowed_countries` (string): Comma separated list of disallowed Country codes
|
675
675
|
* `days_to_retain_backups` (int64): Number of days to keep deleted files
|
676
676
|
* `max_prior_passwords` (int64): Number of prior passwords to disallow
|
677
677
|
* `password_validity_days` (int64): Number of days password is valid
|
package/docs/models/User.md
CHANGED
@@ -141,7 +141,7 @@
|
|
141
141
|
* `change_password_confirmation` (string): Optional, but if provided, we will ensure that it matches the value sent in `change_password`.
|
142
142
|
* `grant_permission` (string): Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
|
143
143
|
* `group_id` (int64): Group ID to associate this user with.
|
144
|
-
* `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash
|
144
|
+
* `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
|
145
145
|
* `password` (string): User password.
|
146
146
|
* `password_confirmation` (string): Optional, but if provided, we will ensure that it matches the value sent in `password`.
|
147
147
|
* `announcements_read` (boolean): Signifies that the user has read all the announcements in the UI.
|
@@ -241,7 +241,7 @@ await User.create({
|
|
241
241
|
* `grant_permission` (string): Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
|
242
242
|
* `group_id` (int64): Group ID to associate this user with.
|
243
243
|
* `group_ids` (string): A list of group ids to associate this user with. Comma delimited.
|
244
|
-
* `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash
|
244
|
+
* `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
|
245
245
|
* `password` (string): User password.
|
246
246
|
* `password_confirmation` (string): Optional, but if provided, we will ensure that it matches the value sent in `password`.
|
247
247
|
* `announcements_read` (boolean): Signifies that the user has read all the announcements in the UI.
|
@@ -386,7 +386,7 @@ await user.update({
|
|
386
386
|
* `grant_permission` (string): Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
|
387
387
|
* `group_id` (int64): Group ID to associate this user with.
|
388
388
|
* `group_ids` (string): A list of group ids to associate this user with. Comma delimited.
|
389
|
-
* `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash
|
389
|
+
* `imported_password_hash` (string): Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
|
390
390
|
* `password` (string): User password.
|
391
391
|
* `password_confirmation` (string): Optional, but if provided, we will ensure that it matches the value sent in `password`.
|
392
392
|
* `announcements_read` (boolean): Signifies that the user has read all the announcements in the UI.
|
package/lib/Files.js
CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
|
|
11
11
|
var apiKey;
|
12
12
|
var baseUrl = 'https://app.files.com';
|
13
13
|
var sessionId = null;
|
14
|
-
var version = '1.2.
|
14
|
+
var version = '1.2.109';
|
15
15
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
16
16
|
var logLevel = _Logger.LogLevel.INFO;
|
17
17
|
var debugRequest = false;
|
package/lib/models/Site.js
CHANGED
@@ -85,7 +85,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
85
85
|
(0, _defineProperty2.default)(this, "getAllowBundleNames", function () {
|
86
86
|
return _this.attributes.allow_bundle_names;
|
87
87
|
});
|
88
|
-
// string # Comma
|
88
|
+
// string # Comma separated list of allowed Country codes
|
89
89
|
(0, _defineProperty2.default)(this, "getAllowedCountries", function () {
|
90
90
|
return _this.attributes.allowed_countries;
|
91
91
|
});
|
@@ -233,7 +233,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
233
233
|
(0, _defineProperty2.default)(this, "getMobileAppSessionLifetime", function () {
|
234
234
|
return _this.attributes.mobile_app_session_lifetime;
|
235
235
|
});
|
236
|
-
// string # Comma
|
236
|
+
// string # Comma separated list of disallowed Country codes
|
237
237
|
(0, _defineProperty2.default)(this, "getDisallowedCountries", function () {
|
238
238
|
return _this.attributes.disallowed_countries;
|
239
239
|
});
|
@@ -521,7 +521,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
521
521
|
(0, _defineProperty2.default)(this, "getActiveSftpHostKeyId", function () {
|
522
522
|
return _this.attributes.active_sftp_host_key_id;
|
523
523
|
});
|
524
|
-
// boolean # If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting
|
524
|
+
// boolean # If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
525
525
|
(0, _defineProperty2.default)(this, "getSftpInsecureCiphers", function () {
|
526
526
|
return _this.attributes.sftp_insecure_ciphers;
|
527
527
|
});
|
@@ -771,7 +771,7 @@ _Site = Site;
|
|
771
771
|
// session_expiry - double - Session expiry in hours
|
772
772
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
773
773
|
// tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
774
|
-
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting
|
774
|
+
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
775
775
|
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
776
776
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
777
777
|
// user_lockout - boolean - Will users be locked out after incorrect login attempts?
|
@@ -779,9 +779,9 @@ _Site = Site;
|
|
779
779
|
// user_lockout_within - int64 - Number of hours for user lockout window
|
780
780
|
// user_lockout_lock_period - int64 - How many hours to lock user out for failed password?
|
781
781
|
// include_password_in_welcome_email - boolean - Include password in emails to new users?
|
782
|
-
// allowed_countries - string - Comma
|
782
|
+
// allowed_countries - string - Comma separated list of allowed Country codes
|
783
783
|
// allowed_ips - string - List of allowed IP addresses
|
784
|
-
// disallowed_countries - string - Comma
|
784
|
+
// disallowed_countries - string - Comma separated list of disallowed Country codes
|
785
785
|
// days_to_retain_backups - int64 - Number of days to keep deleted files
|
786
786
|
// max_prior_passwords - int64 - Number of prior passwords to disallow
|
787
787
|
// password_validity_days - int64 - Number of days password is valid
|
package/lib/models/User.js
CHANGED
@@ -513,7 +513,7 @@ var User = /*#__PURE__*/(0, _createClass2.default)(function User() {
|
|
513
513
|
(0, _defineProperty2.default)(this, "setGroupId", function (value) {
|
514
514
|
_this.attributes.group_id = value;
|
515
515
|
});
|
516
|
-
// string # Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash
|
516
|
+
// string # Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
|
517
517
|
(0, _defineProperty2.default)(this, "getImportedPasswordHash", function () {
|
518
518
|
return _this.attributes.imported_password_hash;
|
519
519
|
});
|
@@ -697,7 +697,7 @@ var User = /*#__PURE__*/(0, _createClass2.default)(function User() {
|
|
697
697
|
// grant_permission - string - Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
|
698
698
|
// group_id - int64 - Group ID to associate this user with.
|
699
699
|
// group_ids - string - A list of group ids to associate this user with. Comma delimited.
|
700
|
-
// imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash
|
700
|
+
// imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
|
701
701
|
// password - string - User password.
|
702
702
|
// password_confirmation - string - Optional, but if provided, we will ensure that it matches the value sent in `password`.
|
703
703
|
// announcements_read - boolean - Signifies that the user has read all the announcements in the UI.
|
@@ -1163,7 +1163,7 @@ _User = User;
|
|
1163
1163
|
// grant_permission - string - Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
|
1164
1164
|
// group_id - int64 - Group ID to associate this user with.
|
1165
1165
|
// group_ids - string - A list of group ids to associate this user with. Comma delimited.
|
1166
|
-
// imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash
|
1166
|
+
// imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
|
1167
1167
|
// password - string - User password.
|
1168
1168
|
// password_confirmation - string - Optional, but if provided, we will ensure that it matches the value sent in `password`.
|
1169
1169
|
// announcements_read - boolean - Signifies that the user has read all the announcements in the UI.
|
package/package.json
CHANGED
@@ -14,7 +14,7 @@
|
|
14
14
|
[ "a/b/c.txt\r", "a/b/c.txt" ],
|
15
15
|
[ " space_at_beginning", " space_at_beginning"],
|
16
16
|
[ "space_at_end ", "space_at_end"],
|
17
|
-
[ "tab\
|
17
|
+
[ "tab\tseparated", "tab\tseparated"],
|
18
18
|
[ "<title>hello</hello>", "<title>hello</hello>"],
|
19
19
|
[ "안녕하세요", "안녕하세요" ],
|
20
20
|
[ "こんにちは", "こんにちは" ],
|
package/src/Files.js
CHANGED
package/src/models/Site.js
CHANGED
@@ -67,7 +67,7 @@ class Site {
|
|
67
67
|
// boolean # Are manual Bundle names allowed?
|
68
68
|
getAllowBundleNames = () => this.attributes.allow_bundle_names
|
69
69
|
|
70
|
-
// string # Comma
|
70
|
+
// string # Comma separated list of allowed Country codes
|
71
71
|
getAllowedCountries = () => this.attributes.allowed_countries
|
72
72
|
|
73
73
|
// string # List of allowed IP addresses
|
@@ -178,7 +178,7 @@ class Site {
|
|
178
178
|
// int64 # Mobile app session lifetime (in hours)
|
179
179
|
getMobileAppSessionLifetime = () => this.attributes.mobile_app_session_lifetime
|
180
180
|
|
181
|
-
// string # Comma
|
181
|
+
// string # Comma separated list of disallowed Country codes
|
182
182
|
getDisallowedCountries = () => this.attributes.disallowed_countries
|
183
183
|
|
184
184
|
// boolean # If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
@@ -394,7 +394,7 @@ class Site {
|
|
394
394
|
// int64 # Id of the currently selected custom SFTP Host Key
|
395
395
|
getActiveSftpHostKeyId = () => this.attributes.active_sftp_host_key_id
|
396
396
|
|
397
|
-
// boolean # If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting
|
397
|
+
// boolean # If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
398
398
|
getSftpInsecureCiphers = () => this.attributes.sftp_insecure_ciphers
|
399
399
|
|
400
400
|
// boolean # If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
@@ -564,7 +564,7 @@ class Site {
|
|
564
564
|
// session_expiry - double - Session expiry in hours
|
565
565
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
566
566
|
// tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
567
|
-
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting
|
567
|
+
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
568
568
|
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
569
569
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
570
570
|
// user_lockout - boolean - Will users be locked out after incorrect login attempts?
|
@@ -572,9 +572,9 @@ class Site {
|
|
572
572
|
// user_lockout_within - int64 - Number of hours for user lockout window
|
573
573
|
// user_lockout_lock_period - int64 - How many hours to lock user out for failed password?
|
574
574
|
// include_password_in_welcome_email - boolean - Include password in emails to new users?
|
575
|
-
// allowed_countries - string - Comma
|
575
|
+
// allowed_countries - string - Comma separated list of allowed Country codes
|
576
576
|
// allowed_ips - string - List of allowed IP addresses
|
577
|
-
// disallowed_countries - string - Comma
|
577
|
+
// disallowed_countries - string - Comma separated list of disallowed Country codes
|
578
578
|
// days_to_retain_backups - int64 - Number of days to keep deleted files
|
579
579
|
// max_prior_passwords - int64 - Number of prior passwords to disallow
|
580
580
|
// password_validity_days - int64 - Number of days password is valid
|
package/src/models/User.js
CHANGED
@@ -507,7 +507,7 @@ class User {
|
|
507
507
|
this.attributes.group_id = value
|
508
508
|
}
|
509
509
|
|
510
|
-
// string # Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash
|
510
|
+
// string # Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
|
511
511
|
getImportedPasswordHash = () => this.attributes.imported_password_hash
|
512
512
|
|
513
513
|
setImportedPasswordHash = value => {
|
@@ -622,7 +622,7 @@ class User {
|
|
622
622
|
// grant_permission - string - Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
|
623
623
|
// group_id - int64 - Group ID to associate this user with.
|
624
624
|
// group_ids - string - A list of group ids to associate this user with. Comma delimited.
|
625
|
-
// imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash
|
625
|
+
// imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
|
626
626
|
// password - string - User password.
|
627
627
|
// password_confirmation - string - Optional, but if provided, we will ensure that it matches the value sent in `password`.
|
628
628
|
// announcements_read - boolean - Signifies that the user has read all the announcements in the UI.
|
@@ -902,7 +902,7 @@ class User {
|
|
902
902
|
// grant_permission - string - Permission to grant on the user root. Can be blank or `full`, `read`, `write`, `list`, `read+write`, or `list+write`
|
903
903
|
// group_id - int64 - Group ID to associate this user with.
|
904
904
|
// group_ids - string - A list of group ids to associate this user with. Comma delimited.
|
905
|
-
// imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash
|
905
|
+
// imported_password_hash - string - Pre-calculated hash of the user's password. If supplied, this will be used to authenticate the user on first login. Supported hash methods are MD5, SHA1, and SHA256.
|
906
906
|
// password - string - User password.
|
907
907
|
// password_confirmation - string - Optional, but if provided, we will ensure that it matches the value sent in `password`.
|
908
908
|
// announcements_read - boolean - Signifies that the user has read all the announcements in the UI.
|
@@ -82,7 +82,7 @@ const testSuite = async () => {
|
|
82
82
|
invariant(file.display_name === displayName, 'Uploaded file response object should have the same display_name as the file we uploaded')
|
83
83
|
|
84
84
|
const foundFile = await File.find(destinationPath)
|
85
|
-
|
85
|
+
|
86
86
|
invariant(foundFile.path === destinationPath, 'Found file should have the same path as the file we uploaded')
|
87
87
|
invariant(foundFile.display_name === displayName, 'Found file should have the same display_name as the file we uploaded')
|
88
88
|
invariant(typeof foundFile.getDownloadUri() === 'undefined', 'Found file should not have a download uri yet')
|
@@ -211,7 +211,7 @@ const testSuite = async () => {
|
|
211
211
|
const auto = await ApiKey.list({ user_id: 0 })
|
212
212
|
|
213
213
|
invariant(JSON.stringify(manual.attributes) === JSON.stringify(auto.attributes), 'Manual and auto session API key lists should match')
|
214
|
-
|
214
|
+
|
215
215
|
await Session.destroy()
|
216
216
|
|
217
217
|
Files.setSessionId(null)
|
@@ -244,19 +244,19 @@ const testSuite = async () => {
|
|
244
244
|
const testUserListAndUpdate = async () => {
|
245
245
|
const allUsers = await User.all()
|
246
246
|
const firstUser = allUsers[0]
|
247
|
-
|
247
|
+
|
248
248
|
const oldName = firstUser.name
|
249
249
|
const newName = `edited name - ${Math.random()}`
|
250
|
-
|
250
|
+
|
251
251
|
firstUser.setName(newName)
|
252
252
|
await firstUser.save()
|
253
|
-
|
253
|
+
|
254
254
|
const updatedUser = await User.find(firstUser.id)
|
255
|
-
|
255
|
+
|
256
256
|
invariant(updatedUser.isLoaded(), 'updated user should be loaded')
|
257
257
|
invariant(oldName !== newName, 'old name should not equal new name')
|
258
258
|
invariant(updatedUser.name === newName, 'updated user name should match new name')
|
259
|
-
|
259
|
+
|
260
260
|
Logger.info('***** testUserListAndUpdate() succeeded! *****');
|
261
261
|
}
|
262
262
|
|