files.com 1.2.189 → 1.2.190
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/_VERSION +1 -1
- package/docs/models/Site.md +4 -0
- package/lib/Files.js +1 -1
- package/lib/models/Site.js +102 -91
- package/package.json +1 -1
- package/src/Files.js +1 -1
- package/src/models/Site.js +8 -0
package/_VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.2.
|
|
1
|
+
1.2.190
|
package/docs/models/Site.md
CHANGED
|
@@ -60,6 +60,7 @@
|
|
|
60
60
|
"custom_namespace": true,
|
|
61
61
|
"dav_enabled": true,
|
|
62
62
|
"dav_user_root_enabled": true,
|
|
63
|
+
"days_before_deleting_disabled_users": 30,
|
|
63
64
|
"days_to_retain_backups": 30,
|
|
64
65
|
"document_edits_in_bundle_allowed": true,
|
|
65
66
|
"default_time_zone": "Pacific Time (US & Canada)",
|
|
@@ -347,6 +348,7 @@
|
|
|
347
348
|
* `custom_namespace` (boolean): Is this site using a custom namespace for users?
|
|
348
349
|
* `dav_enabled` (boolean): Is WebDAV enabled?
|
|
349
350
|
* `dav_user_root_enabled` (boolean): Use user FTP roots also for WebDAV?
|
|
351
|
+
* `days_before_deleting_disabled_users` (int64): Number of days to keep disabled users before deleting them. If set to 0, disabled users will not be deleted.
|
|
350
352
|
* `days_to_retain_backups` (int64): Number of days to keep deleted files
|
|
351
353
|
* `document_edits_in_bundle_allowed` (boolean): If true, allow public viewers of Bundles with full permissions to use document editing integrations.
|
|
352
354
|
* `default_time_zone` (string): Site default time zone
|
|
@@ -548,6 +550,7 @@ await Site.update({
|
|
|
548
550
|
'allowed_countries': "US,DE",
|
|
549
551
|
'allowed_ips': "example",
|
|
550
552
|
'disallowed_countries': "US,DE",
|
|
553
|
+
'days_before_deleting_disabled_users': 1,
|
|
551
554
|
'days_to_retain_backups': 1,
|
|
552
555
|
'max_prior_passwords': 1,
|
|
553
556
|
'password_validity_days': 1,
|
|
@@ -706,6 +709,7 @@ await Site.update({
|
|
|
706
709
|
* `allowed_countries` (string): Comma separated list of allowed Country codes
|
|
707
710
|
* `allowed_ips` (string): List of allowed IP addresses
|
|
708
711
|
* `disallowed_countries` (string): Comma separated list of disallowed Country codes
|
|
712
|
+
* `days_before_deleting_disabled_users` (int64): Number of days to keep disabled users before deleting them. If set to 0, disabled users will not be deleted.
|
|
709
713
|
* `days_to_retain_backups` (int64): Number of days to keep deleted files
|
|
710
714
|
* `max_prior_passwords` (int64): Number of prior passwords to disallow
|
|
711
715
|
* `password_validity_days` (int64): Number of days password is valid
|
package/lib/Files.js
CHANGED
|
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
|
|
|
11
11
|
var apiKey;
|
|
12
12
|
var baseUrl = 'https://app.files.com';
|
|
13
13
|
var sessionId = null;
|
|
14
|
-
var version = '1.2.
|
|
14
|
+
var version = '1.2.190';
|
|
15
15
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
|
16
16
|
var logLevel = _Logger.LogLevel.INFO;
|
|
17
17
|
var debugRequest = false;
|
package/lib/models/Site.js
CHANGED
|
@@ -221,6 +221,10 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
|
221
221
|
(0, _defineProperty2.default)(this, "getDavUserRootEnabled", function () {
|
|
222
222
|
return _this.attributes.dav_user_root_enabled;
|
|
223
223
|
});
|
|
224
|
+
// int64 # Number of days to keep disabled users before deleting them. If set to 0, disabled users will not be deleted.
|
|
225
|
+
(0, _defineProperty2.default)(this, "getDaysBeforeDeletingDisabledUsers", function () {
|
|
226
|
+
return _this.attributes.days_before_deleting_disabled_users;
|
|
227
|
+
});
|
|
224
228
|
// int64 # Number of days to keep deleted files
|
|
225
229
|
(0, _defineProperty2.default)(this, "getDaysToRetainBackups", function () {
|
|
226
230
|
return _this.attributes.days_to_retain_backups;
|
|
@@ -816,6 +820,7 @@ _Site = Site;
|
|
|
816
820
|
// allowed_countries - string - Comma separated list of allowed Country codes
|
|
817
821
|
// allowed_ips - string - List of allowed IP addresses
|
|
818
822
|
// disallowed_countries - string - Comma separated list of disallowed Country codes
|
|
823
|
+
// days_before_deleting_disabled_users - int64 - Number of days to keep disabled users before deleting them. If set to 0, disabled users will not be deleted.
|
|
819
824
|
// days_to_retain_backups - int64 - Number of days to keep deleted files
|
|
820
825
|
// max_prior_passwords - int64 - Number of prior passwords to disallow
|
|
821
826
|
// password_validity_days - int64 - Number of days password is valid
|
|
@@ -1076,276 +1081,282 @@ _Site = Site;
|
|
|
1076
1081
|
}
|
|
1077
1082
|
throw new errors.InvalidParameterError("Bad parameter: disallowed_countries must be of type String, received ".concat((0, _utils.getType)(params.disallowed_countries)));
|
|
1078
1083
|
case 50:
|
|
1079
|
-
if (!(params.
|
|
1084
|
+
if (!(params.days_before_deleting_disabled_users && !(0, _utils.isInt)(params.days_before_deleting_disabled_users))) {
|
|
1080
1085
|
_context3.next = 52;
|
|
1081
1086
|
break;
|
|
1082
1087
|
}
|
|
1083
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1088
|
+
throw new errors.InvalidParameterError("Bad parameter: days_before_deleting_disabled_users must be of type Int, received ".concat((0, _utils.getType)(params.days_before_deleting_disabled_users)));
|
|
1084
1089
|
case 52:
|
|
1085
|
-
if (!(params.
|
|
1090
|
+
if (!(params.days_to_retain_backups && !(0, _utils.isInt)(params.days_to_retain_backups))) {
|
|
1086
1091
|
_context3.next = 54;
|
|
1087
1092
|
break;
|
|
1088
1093
|
}
|
|
1089
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1094
|
+
throw new errors.InvalidParameterError("Bad parameter: days_to_retain_backups must be of type Int, received ".concat((0, _utils.getType)(params.days_to_retain_backups)));
|
|
1090
1095
|
case 54:
|
|
1091
|
-
if (!(params.
|
|
1096
|
+
if (!(params.max_prior_passwords && !(0, _utils.isInt)(params.max_prior_passwords))) {
|
|
1092
1097
|
_context3.next = 56;
|
|
1093
1098
|
break;
|
|
1094
1099
|
}
|
|
1095
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1100
|
+
throw new errors.InvalidParameterError("Bad parameter: max_prior_passwords must be of type Int, received ".concat((0, _utils.getType)(params.max_prior_passwords)));
|
|
1096
1101
|
case 56:
|
|
1097
|
-
if (!(params.
|
|
1102
|
+
if (!(params.password_validity_days && !(0, _utils.isInt)(params.password_validity_days))) {
|
|
1098
1103
|
_context3.next = 58;
|
|
1099
1104
|
break;
|
|
1100
1105
|
}
|
|
1101
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1106
|
+
throw new errors.InvalidParameterError("Bad parameter: password_validity_days must be of type Int, received ".concat((0, _utils.getType)(params.password_validity_days)));
|
|
1102
1107
|
case 58:
|
|
1103
|
-
if (!(params.
|
|
1108
|
+
if (!(params.password_min_length && !(0, _utils.isInt)(params.password_min_length))) {
|
|
1104
1109
|
_context3.next = 60;
|
|
1105
1110
|
break;
|
|
1106
1111
|
}
|
|
1107
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1112
|
+
throw new errors.InvalidParameterError("Bad parameter: password_min_length must be of type Int, received ".concat((0, _utils.getType)(params.password_min_length)));
|
|
1108
1113
|
case 60:
|
|
1109
|
-
if (!(params.
|
|
1114
|
+
if (!(params.bundle_not_found_message && !(0, _utils.isString)(params.bundle_not_found_message))) {
|
|
1110
1115
|
_context3.next = 62;
|
|
1111
1116
|
break;
|
|
1112
1117
|
}
|
|
1113
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1118
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_not_found_message must be of type String, received ".concat((0, _utils.getType)(params.bundle_not_found_message)));
|
|
1114
1119
|
case 62:
|
|
1115
|
-
if (!(params.
|
|
1120
|
+
if (!(params.bundle_registration_notifications && !(0, _utils.isString)(params.bundle_registration_notifications))) {
|
|
1116
1121
|
_context3.next = 64;
|
|
1117
1122
|
break;
|
|
1118
1123
|
}
|
|
1119
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1124
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_registration_notifications must be of type String, received ".concat((0, _utils.getType)(params.bundle_registration_notifications)));
|
|
1120
1125
|
case 64:
|
|
1121
|
-
if (!(params.
|
|
1126
|
+
if (!(params.bundle_activity_notifications && !(0, _utils.isString)(params.bundle_activity_notifications))) {
|
|
1122
1127
|
_context3.next = 66;
|
|
1123
1128
|
break;
|
|
1124
1129
|
}
|
|
1125
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1130
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_activity_notifications must be of type String, received ".concat((0, _utils.getType)(params.bundle_activity_notifications)));
|
|
1126
1131
|
case 66:
|
|
1127
|
-
if (!(params.
|
|
1132
|
+
if (!(params.bundle_upload_receipt_notifications && !(0, _utils.isString)(params.bundle_upload_receipt_notifications))) {
|
|
1128
1133
|
_context3.next = 68;
|
|
1129
1134
|
break;
|
|
1130
1135
|
}
|
|
1131
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1136
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_upload_receipt_notifications must be of type String, received ".concat((0, _utils.getType)(params.bundle_upload_receipt_notifications)));
|
|
1132
1137
|
case 68:
|
|
1133
|
-
if (!(params.
|
|
1138
|
+
if (!(params.disable_users_from_inactivity_period_days && !(0, _utils.isInt)(params.disable_users_from_inactivity_period_days))) {
|
|
1134
1139
|
_context3.next = 70;
|
|
1135
1140
|
break;
|
|
1136
1141
|
}
|
|
1137
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1142
|
+
throw new errors.InvalidParameterError("Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ".concat((0, _utils.getType)(params.disable_users_from_inactivity_period_days)));
|
|
1138
1143
|
case 70:
|
|
1139
|
-
if (!(params.
|
|
1144
|
+
if (!(params.sftp_host_key_type && !(0, _utils.isString)(params.sftp_host_key_type))) {
|
|
1140
1145
|
_context3.next = 72;
|
|
1141
1146
|
break;
|
|
1142
1147
|
}
|
|
1143
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1148
|
+
throw new errors.InvalidParameterError("Bad parameter: sftp_host_key_type must be of type String, received ".concat((0, _utils.getType)(params.sftp_host_key_type)));
|
|
1144
1149
|
case 72:
|
|
1145
|
-
if (!(params.
|
|
1150
|
+
if (!(params.active_sftp_host_key_id && !(0, _utils.isInt)(params.active_sftp_host_key_id))) {
|
|
1146
1151
|
_context3.next = 74;
|
|
1147
1152
|
break;
|
|
1148
1153
|
}
|
|
1149
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1154
|
+
throw new errors.InvalidParameterError("Bad parameter: active_sftp_host_key_id must be of type Int, received ".concat((0, _utils.getType)(params.active_sftp_host_key_id)));
|
|
1150
1155
|
case 74:
|
|
1151
|
-
if (!(params.
|
|
1156
|
+
if (!(params.bundle_recipient_blacklist_domains && !(0, _utils.isArray)(params.bundle_recipient_blacklist_domains))) {
|
|
1152
1157
|
_context3.next = 76;
|
|
1153
1158
|
break;
|
|
1154
1159
|
}
|
|
1155
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1160
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_recipient_blacklist_domains must be of type Array, received ".concat((0, _utils.getType)(params.bundle_recipient_blacklist_domains)));
|
|
1156
1161
|
case 76:
|
|
1157
|
-
if (!(params.
|
|
1162
|
+
if (!(params.require_2fa_user_type && !(0, _utils.isString)(params.require_2fa_user_type))) {
|
|
1158
1163
|
_context3.next = 78;
|
|
1159
1164
|
break;
|
|
1160
1165
|
}
|
|
1161
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1166
|
+
throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params.require_2fa_user_type)));
|
|
1162
1167
|
case 78:
|
|
1163
|
-
if (!(params.
|
|
1168
|
+
if (!(params.color2_top && !(0, _utils.isString)(params.color2_top))) {
|
|
1164
1169
|
_context3.next = 80;
|
|
1165
1170
|
break;
|
|
1166
1171
|
}
|
|
1167
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1172
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params.color2_top)));
|
|
1168
1173
|
case 80:
|
|
1169
|
-
if (!(params.
|
|
1174
|
+
if (!(params.color2_left && !(0, _utils.isString)(params.color2_left))) {
|
|
1170
1175
|
_context3.next = 82;
|
|
1171
1176
|
break;
|
|
1172
1177
|
}
|
|
1173
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1178
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params.color2_left)));
|
|
1174
1179
|
case 82:
|
|
1175
|
-
if (!(params.
|
|
1180
|
+
if (!(params.color2_link && !(0, _utils.isString)(params.color2_link))) {
|
|
1176
1181
|
_context3.next = 84;
|
|
1177
1182
|
break;
|
|
1178
1183
|
}
|
|
1179
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1184
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params.color2_link)));
|
|
1180
1185
|
case 84:
|
|
1181
|
-
if (!(params.
|
|
1186
|
+
if (!(params.color2_text && !(0, _utils.isString)(params.color2_text))) {
|
|
1182
1187
|
_context3.next = 86;
|
|
1183
1188
|
break;
|
|
1184
1189
|
}
|
|
1185
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1190
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params.color2_text)));
|
|
1186
1191
|
case 86:
|
|
1187
|
-
if (!(params.
|
|
1192
|
+
if (!(params.color2_top_text && !(0, _utils.isString)(params.color2_top_text))) {
|
|
1188
1193
|
_context3.next = 88;
|
|
1189
1194
|
break;
|
|
1190
1195
|
}
|
|
1191
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1196
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params.color2_top_text)));
|
|
1192
1197
|
case 88:
|
|
1193
|
-
if (!(params.
|
|
1198
|
+
if (!(params.site_header && !(0, _utils.isString)(params.site_header))) {
|
|
1194
1199
|
_context3.next = 90;
|
|
1195
1200
|
break;
|
|
1196
1201
|
}
|
|
1197
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1202
|
+
throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params.site_header)));
|
|
1198
1203
|
case 90:
|
|
1199
|
-
if (!(params.
|
|
1204
|
+
if (!(params.site_footer && !(0, _utils.isString)(params.site_footer))) {
|
|
1200
1205
|
_context3.next = 92;
|
|
1201
1206
|
break;
|
|
1202
1207
|
}
|
|
1203
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1208
|
+
throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params.site_footer)));
|
|
1204
1209
|
case 92:
|
|
1205
|
-
if (!(params.
|
|
1210
|
+
if (!(params.login_help_text && !(0, _utils.isString)(params.login_help_text))) {
|
|
1206
1211
|
_context3.next = 94;
|
|
1207
1212
|
break;
|
|
1208
1213
|
}
|
|
1209
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1214
|
+
throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params.login_help_text)));
|
|
1210
1215
|
case 94:
|
|
1211
|
-
if (!(params.
|
|
1216
|
+
if (!(params.smtp_address && !(0, _utils.isString)(params.smtp_address))) {
|
|
1212
1217
|
_context3.next = 96;
|
|
1213
1218
|
break;
|
|
1214
1219
|
}
|
|
1215
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1220
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params.smtp_address)));
|
|
1216
1221
|
case 96:
|
|
1217
|
-
if (!(params.
|
|
1222
|
+
if (!(params.smtp_authentication && !(0, _utils.isString)(params.smtp_authentication))) {
|
|
1218
1223
|
_context3.next = 98;
|
|
1219
1224
|
break;
|
|
1220
1225
|
}
|
|
1221
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1226
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params.smtp_authentication)));
|
|
1222
1227
|
case 98:
|
|
1223
|
-
if (!(params.
|
|
1228
|
+
if (!(params.smtp_from && !(0, _utils.isString)(params.smtp_from))) {
|
|
1224
1229
|
_context3.next = 100;
|
|
1225
1230
|
break;
|
|
1226
1231
|
}
|
|
1227
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1232
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params.smtp_from)));
|
|
1228
1233
|
case 100:
|
|
1229
|
-
if (!(params.
|
|
1234
|
+
if (!(params.smtp_username && !(0, _utils.isString)(params.smtp_username))) {
|
|
1230
1235
|
_context3.next = 102;
|
|
1231
1236
|
break;
|
|
1232
1237
|
}
|
|
1233
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1238
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params.smtp_username)));
|
|
1234
1239
|
case 102:
|
|
1235
|
-
if (!(params.
|
|
1240
|
+
if (!(params.smtp_port && !(0, _utils.isInt)(params.smtp_port))) {
|
|
1236
1241
|
_context3.next = 104;
|
|
1237
1242
|
break;
|
|
1238
1243
|
}
|
|
1239
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1244
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params.smtp_port)));
|
|
1240
1245
|
case 104:
|
|
1241
|
-
if (!(params.
|
|
1246
|
+
if (!(params.ldap_type && !(0, _utils.isString)(params.ldap_type))) {
|
|
1242
1247
|
_context3.next = 106;
|
|
1243
1248
|
break;
|
|
1244
1249
|
}
|
|
1245
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1250
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params.ldap_type)));
|
|
1246
1251
|
case 106:
|
|
1247
|
-
if (!(params.
|
|
1252
|
+
if (!(params.ldap_host && !(0, _utils.isString)(params.ldap_host))) {
|
|
1248
1253
|
_context3.next = 108;
|
|
1249
1254
|
break;
|
|
1250
1255
|
}
|
|
1251
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1256
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params.ldap_host)));
|
|
1252
1257
|
case 108:
|
|
1253
|
-
if (!(params.
|
|
1258
|
+
if (!(params.ldap_host_2 && !(0, _utils.isString)(params.ldap_host_2))) {
|
|
1254
1259
|
_context3.next = 110;
|
|
1255
1260
|
break;
|
|
1256
1261
|
}
|
|
1257
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1262
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params.ldap_host_2)));
|
|
1258
1263
|
case 110:
|
|
1259
|
-
if (!(params.
|
|
1264
|
+
if (!(params.ldap_host_3 && !(0, _utils.isString)(params.ldap_host_3))) {
|
|
1260
1265
|
_context3.next = 112;
|
|
1261
1266
|
break;
|
|
1262
1267
|
}
|
|
1263
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1268
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params.ldap_host_3)));
|
|
1264
1269
|
case 112:
|
|
1265
|
-
if (!(params.
|
|
1270
|
+
if (!(params.ldap_port && !(0, _utils.isInt)(params.ldap_port))) {
|
|
1266
1271
|
_context3.next = 114;
|
|
1267
1272
|
break;
|
|
1268
1273
|
}
|
|
1269
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1274
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params.ldap_port)));
|
|
1270
1275
|
case 114:
|
|
1271
|
-
if (!(params.
|
|
1276
|
+
if (!(params.ldap_username && !(0, _utils.isString)(params.ldap_username))) {
|
|
1272
1277
|
_context3.next = 116;
|
|
1273
1278
|
break;
|
|
1274
1279
|
}
|
|
1275
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1280
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params.ldap_username)));
|
|
1276
1281
|
case 116:
|
|
1277
|
-
if (!(params.
|
|
1282
|
+
if (!(params.ldap_username_field && !(0, _utils.isString)(params.ldap_username_field))) {
|
|
1278
1283
|
_context3.next = 118;
|
|
1279
1284
|
break;
|
|
1280
1285
|
}
|
|
1281
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1286
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params.ldap_username_field)));
|
|
1282
1287
|
case 118:
|
|
1283
|
-
if (!(params.
|
|
1288
|
+
if (!(params.ldap_domain && !(0, _utils.isString)(params.ldap_domain))) {
|
|
1284
1289
|
_context3.next = 120;
|
|
1285
1290
|
break;
|
|
1286
1291
|
}
|
|
1287
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1292
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params.ldap_domain)));
|
|
1288
1293
|
case 120:
|
|
1289
|
-
if (!(params.
|
|
1294
|
+
if (!(params.ldap_user_action && !(0, _utils.isString)(params.ldap_user_action))) {
|
|
1290
1295
|
_context3.next = 122;
|
|
1291
1296
|
break;
|
|
1292
1297
|
}
|
|
1293
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1298
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params.ldap_user_action)));
|
|
1294
1299
|
case 122:
|
|
1295
|
-
if (!(params.
|
|
1300
|
+
if (!(params.ldap_group_action && !(0, _utils.isString)(params.ldap_group_action))) {
|
|
1296
1301
|
_context3.next = 124;
|
|
1297
1302
|
break;
|
|
1298
1303
|
}
|
|
1299
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1304
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_action)));
|
|
1300
1305
|
case 124:
|
|
1301
|
-
if (!(params.
|
|
1306
|
+
if (!(params.ldap_user_include_groups && !(0, _utils.isString)(params.ldap_user_include_groups))) {
|
|
1302
1307
|
_context3.next = 126;
|
|
1303
1308
|
break;
|
|
1304
1309
|
}
|
|
1305
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1310
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params.ldap_user_include_groups)));
|
|
1306
1311
|
case 126:
|
|
1307
|
-
if (!(params.
|
|
1312
|
+
if (!(params.ldap_group_exclusion && !(0, _utils.isString)(params.ldap_group_exclusion))) {
|
|
1308
1313
|
_context3.next = 128;
|
|
1309
1314
|
break;
|
|
1310
1315
|
}
|
|
1311
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1316
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_exclusion)));
|
|
1312
1317
|
case 128:
|
|
1313
|
-
if (!(params.
|
|
1318
|
+
if (!(params.ldap_group_inclusion && !(0, _utils.isString)(params.ldap_group_inclusion))) {
|
|
1314
1319
|
_context3.next = 130;
|
|
1315
1320
|
break;
|
|
1316
1321
|
}
|
|
1317
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1322
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_inclusion)));
|
|
1318
1323
|
case 130:
|
|
1319
|
-
if (!(params.
|
|
1324
|
+
if (!(params.ldap_base_dn && !(0, _utils.isString)(params.ldap_base_dn))) {
|
|
1320
1325
|
_context3.next = 132;
|
|
1321
1326
|
break;
|
|
1322
1327
|
}
|
|
1323
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1328
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params.ldap_base_dn)));
|
|
1324
1329
|
case 132:
|
|
1325
|
-
if (!(params.
|
|
1330
|
+
if (!(params.ldap_password_change && !(0, _utils.isString)(params.ldap_password_change))) {
|
|
1326
1331
|
_context3.next = 134;
|
|
1327
1332
|
break;
|
|
1328
1333
|
}
|
|
1329
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1334
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params.ldap_password_change)));
|
|
1330
1335
|
case 134:
|
|
1331
|
-
if (!(params.
|
|
1336
|
+
if (!(params.ldap_password_change_confirmation && !(0, _utils.isString)(params.ldap_password_change_confirmation))) {
|
|
1332
1337
|
_context3.next = 136;
|
|
1333
1338
|
break;
|
|
1334
1339
|
}
|
|
1335
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1340
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params.ldap_password_change_confirmation)));
|
|
1336
1341
|
case 136:
|
|
1337
|
-
if (!(params.
|
|
1342
|
+
if (!(params.smtp_password && !(0, _utils.isString)(params.smtp_password))) {
|
|
1338
1343
|
_context3.next = 138;
|
|
1339
1344
|
break;
|
|
1340
1345
|
}
|
|
1341
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1346
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params.smtp_password)));
|
|
1342
1347
|
case 138:
|
|
1343
|
-
|
|
1344
|
-
|
|
1348
|
+
if (!(params.session_expiry_minutes && !(0, _utils.isInt)(params.session_expiry_minutes))) {
|
|
1349
|
+
_context3.next = 140;
|
|
1350
|
+
break;
|
|
1351
|
+
}
|
|
1352
|
+
throw new errors.InvalidParameterError("Bad parameter: session_expiry_minutes must be of type Int, received ".concat((0, _utils.getType)(params.session_expiry_minutes)));
|
|
1345
1353
|
case 140:
|
|
1354
|
+
_context3.next = 142;
|
|
1355
|
+
return _Api.default.sendRequest('/site', 'PATCH', params, options);
|
|
1356
|
+
case 142:
|
|
1346
1357
|
response = _context3.sent;
|
|
1347
1358
|
return _context3.abrupt("return", new _Site(response === null || response === void 0 ? void 0 : response.data, options));
|
|
1348
|
-
case
|
|
1359
|
+
case 144:
|
|
1349
1360
|
case "end":
|
|
1350
1361
|
return _context3.stop();
|
|
1351
1362
|
}
|
package/package.json
CHANGED
package/src/Files.js
CHANGED
package/src/models/Site.js
CHANGED
|
@@ -169,6 +169,9 @@ class Site {
|
|
|
169
169
|
// boolean # Use user FTP roots also for WebDAV?
|
|
170
170
|
getDavUserRootEnabled = () => this.attributes.dav_user_root_enabled
|
|
171
171
|
|
|
172
|
+
// int64 # Number of days to keep disabled users before deleting them. If set to 0, disabled users will not be deleted.
|
|
173
|
+
getDaysBeforeDeletingDisabledUsers = () => this.attributes.days_before_deleting_disabled_users
|
|
174
|
+
|
|
172
175
|
// int64 # Number of days to keep deleted files
|
|
173
176
|
getDaysToRetainBackups = () => this.attributes.days_to_retain_backups
|
|
174
177
|
|
|
@@ -602,6 +605,7 @@ class Site {
|
|
|
602
605
|
// allowed_countries - string - Comma separated list of allowed Country codes
|
|
603
606
|
// allowed_ips - string - List of allowed IP addresses
|
|
604
607
|
// disallowed_countries - string - Comma separated list of disallowed Country codes
|
|
608
|
+
// days_before_deleting_disabled_users - int64 - Number of days to keep disabled users before deleting them. If set to 0, disabled users will not be deleted.
|
|
605
609
|
// days_to_retain_backups - int64 - Number of days to keep deleted files
|
|
606
610
|
// max_prior_passwords - int64 - Number of prior passwords to disallow
|
|
607
611
|
// password_validity_days - int64 - Number of days password is valid
|
|
@@ -805,6 +809,10 @@ class Site {
|
|
|
805
809
|
throw new errors.InvalidParameterError(`Bad parameter: disallowed_countries must be of type String, received ${getType(params.disallowed_countries)}`)
|
|
806
810
|
}
|
|
807
811
|
|
|
812
|
+
if (params.days_before_deleting_disabled_users && !isInt(params.days_before_deleting_disabled_users)) {
|
|
813
|
+
throw new errors.InvalidParameterError(`Bad parameter: days_before_deleting_disabled_users must be of type Int, received ${getType(params.days_before_deleting_disabled_users)}`)
|
|
814
|
+
}
|
|
815
|
+
|
|
808
816
|
if (params.days_to_retain_backups && !isInt(params.days_to_retain_backups)) {
|
|
809
817
|
throw new errors.InvalidParameterError(`Bad parameter: days_to_retain_backups must be of type Int, received ${getType(params.days_to_retain_backups)}`)
|
|
810
818
|
}
|