files.com 1.2.233 → 1.2.235
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +16 -0
- package/_VERSION +1 -1
- package/docs/models/RemoteServer.md +7 -0
- package/docs/models/Site.md +4 -0
- package/lib/Api.js +17 -13
- package/lib/Files.js +8 -1
- package/lib/models/RemoteServer.js +124 -103
- package/lib/models/Site.js +5 -0
- package/package.json +1 -1
- package/src/Api.js +3 -0
- package/src/Files.js +6 -1
- package/src/models/RemoteServer.js +17 -0
- package/src/models/Site.js +4 -0
- package/test/integration/src/index.js +76 -2
package/README.md
CHANGED
|
@@ -420,6 +420,22 @@ try {
|
|
|
420
420
|
}
|
|
421
421
|
```
|
|
422
422
|
|
|
423
|
+
## Foreign Language Support
|
|
424
|
+
|
|
425
|
+
The Files.com Javascript SDK supports localized responses by using the `Files.setLanguage()` configuration method.
|
|
426
|
+
When configured, this guides the API in selecting a preferred language for applicable response content.
|
|
427
|
+
|
|
428
|
+
Language support currently applies to select human-facing fields only, such as notification messages
|
|
429
|
+
and error descriptions.
|
|
430
|
+
|
|
431
|
+
If the specified language is not supported or the value is omitted, the API defaults to English.
|
|
432
|
+
|
|
433
|
+
```javascript title="Example Request"
|
|
434
|
+
import Files from 'files.com/lib/Files';
|
|
435
|
+
|
|
436
|
+
Files.setLanguage('es');
|
|
437
|
+
```
|
|
438
|
+
|
|
423
439
|
## Errors
|
|
424
440
|
|
|
425
441
|
The Files.com JavaScript SDK will return errors by raising exceptions. There are many exception classes defined in the Files SDK that correspond
|
package/_VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.2.
|
|
1
|
+
1.2.235
|
|
@@ -38,6 +38,7 @@
|
|
|
38
38
|
"azure_blob_storage_account": "storage-account-name",
|
|
39
39
|
"azure_blob_storage_container": "container-name",
|
|
40
40
|
"azure_blob_storage_hierarchical_namespace": true,
|
|
41
|
+
"azure_blob_storage_dns_suffix": "usgovcloudapi.net",
|
|
41
42
|
"azure_files_storage_account": "storage-account-name",
|
|
42
43
|
"azure_files_storage_share_name": "share-name",
|
|
43
44
|
"azure_files_storage_dns_suffix": "file.core.windows.net",
|
|
@@ -97,6 +98,7 @@
|
|
|
97
98
|
* `azure_blob_storage_account` (string): Azure Blob Storage Account name
|
|
98
99
|
* `azure_blob_storage_container` (string): Azure Blob Storage Container name
|
|
99
100
|
* `azure_blob_storage_hierarchical_namespace` (boolean): Enable when storage account has hierarchical namespace feature enabled
|
|
101
|
+
* `azure_blob_storage_dns_suffix` (string): Custom DNS suffix
|
|
100
102
|
* `azure_files_storage_account` (string): Azure File Storage Account name
|
|
101
103
|
* `azure_files_storage_share_name` (string): Azure File Storage Share name
|
|
102
104
|
* `azure_files_storage_dns_suffix` (string): Custom DNS suffix
|
|
@@ -216,6 +218,7 @@ await RemoteServer.create({
|
|
|
216
218
|
'azure_blob_storage_account': "storage-account-name",
|
|
217
219
|
'azure_blob_storage_container': "container-name",
|
|
218
220
|
'azure_blob_storage_hierarchical_namespace': true,
|
|
221
|
+
'azure_blob_storage_dns_suffix': "usgovcloudapi.net",
|
|
219
222
|
'azure_files_storage_account': "storage-account-name",
|
|
220
223
|
'azure_files_storage_share_name': "share-name",
|
|
221
224
|
'azure_files_storage_dns_suffix': "file.core.windows.net",
|
|
@@ -283,6 +286,7 @@ await RemoteServer.create({
|
|
|
283
286
|
* `azure_blob_storage_container` (string): Azure Blob Storage Container name
|
|
284
287
|
* `azure_blob_storage_hierarchical_namespace` (boolean): Enable when storage account has hierarchical namespace feature enabled
|
|
285
288
|
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
|
289
|
+
* `azure_blob_storage_dns_suffix` (string): Custom DNS suffix
|
|
286
290
|
* `azure_files_storage_account` (string): Azure File Storage Account name
|
|
287
291
|
* `azure_files_storage_share_name` (string): Azure File Storage Share name
|
|
288
292
|
* `azure_files_storage_dns_suffix` (string): Custom DNS suffix
|
|
@@ -413,6 +417,7 @@ await remote_server.update({
|
|
|
413
417
|
'azure_blob_storage_account': "storage-account-name",
|
|
414
418
|
'azure_blob_storage_container': "container-name",
|
|
415
419
|
'azure_blob_storage_hierarchical_namespace': true,
|
|
420
|
+
'azure_blob_storage_dns_suffix': "usgovcloudapi.net",
|
|
416
421
|
'azure_files_storage_account': "storage-account-name",
|
|
417
422
|
'azure_files_storage_share_name': "share-name",
|
|
418
423
|
'azure_files_storage_dns_suffix': "file.core.windows.net",
|
|
@@ -480,6 +485,7 @@ await remote_server.update({
|
|
|
480
485
|
* `azure_blob_storage_container` (string): Azure Blob Storage Container name
|
|
481
486
|
* `azure_blob_storage_hierarchical_namespace` (boolean): Enable when storage account has hierarchical namespace feature enabled
|
|
482
487
|
* `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
|
|
488
|
+
* `azure_blob_storage_dns_suffix` (string): Custom DNS suffix
|
|
483
489
|
* `azure_files_storage_account` (string): Azure File Storage Account name
|
|
484
490
|
* `azure_files_storage_share_name` (string): Azure File Storage Share name
|
|
485
491
|
* `azure_files_storage_dns_suffix` (string): Custom DNS suffix
|
|
@@ -544,6 +550,7 @@ await remote_server.update({
|
|
|
544
550
|
"azure_blob_storage_account": "storage-account-name",
|
|
545
551
|
"azure_blob_storage_container": "container-name",
|
|
546
552
|
"azure_blob_storage_hierarchical_namespace": true,
|
|
553
|
+
"azure_blob_storage_dns_suffix": "usgovcloudapi.net",
|
|
547
554
|
"azure_files_storage_account": "storage-account-name",
|
|
548
555
|
"azure_files_storage_share_name": "share-name",
|
|
549
556
|
"azure_files_storage_dns_suffix": "file.core.windows.net",
|
package/docs/models/Site.md
CHANGED
|
@@ -203,6 +203,7 @@
|
|
|
203
203
|
"smtp_username": "mail",
|
|
204
204
|
"session_expiry": 6.0,
|
|
205
205
|
"session_expiry_minutes": 360,
|
|
206
|
+
"snapshot_sharing_enabled": true,
|
|
206
207
|
"ssl_required": true,
|
|
207
208
|
"subdomain": "mysite",
|
|
208
209
|
"switch_to_plan_date": "2000-01-01T01:00:00Z",
|
|
@@ -445,6 +446,7 @@
|
|
|
445
446
|
* `smtp_username` (string): SMTP server username
|
|
446
447
|
* `session_expiry` (double): Session expiry in hours
|
|
447
448
|
* `session_expiry_minutes` (int64): Session expiry in minutes
|
|
449
|
+
* `snapshot_sharing_enabled` (boolean): Allow snapshot share links creation
|
|
448
450
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
|
449
451
|
* `subdomain` (string): Site subdomain
|
|
450
452
|
* `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
|
|
@@ -582,6 +584,7 @@ await Site.update({
|
|
|
582
584
|
'non_sso_groups_allowed': false,
|
|
583
585
|
'non_sso_users_allowed': false,
|
|
584
586
|
'sharing_enabled': false,
|
|
587
|
+
'snapshot_sharing_enabled': false,
|
|
585
588
|
'user_requests_enabled': false,
|
|
586
589
|
'user_requests_notify_admins': false,
|
|
587
590
|
'dav_enabled': false,
|
|
@@ -741,6 +744,7 @@ await Site.update({
|
|
|
741
744
|
* `non_sso_groups_allowed` (boolean): If true, groups can be manually created / modified / deleted by Site Admins. Otherwise, groups can only be managed via your SSO provider.
|
|
742
745
|
* `non_sso_users_allowed` (boolean): If true, users can be manually created / modified / deleted by Site Admins. Otherwise, users can only be managed via your SSO provider.
|
|
743
746
|
* `sharing_enabled` (boolean): Allow bundle creation
|
|
747
|
+
* `snapshot_sharing_enabled` (boolean): Allow snapshot share links creation
|
|
744
748
|
* `user_requests_enabled` (boolean): Enable User Requests feature
|
|
745
749
|
* `user_requests_notify_admins` (boolean): Send email to site admins when a user request is received?
|
|
746
750
|
* `dav_enabled` (boolean): Is WebDAV enabled?
|
package/lib/Api.js
CHANGED
|
@@ -266,6 +266,7 @@ _Api = Api;
|
|
|
266
266
|
var params,
|
|
267
267
|
options,
|
|
268
268
|
metadata,
|
|
269
|
+
languageHeader,
|
|
269
270
|
headers,
|
|
270
271
|
isExternal,
|
|
271
272
|
sessionId,
|
|
@@ -294,39 +295,42 @@ _Api = Api;
|
|
|
294
295
|
params = _args4.length > 2 && _args4[2] !== undefined ? _args4[2] : null;
|
|
295
296
|
options = _args4.length > 3 && _args4[3] !== undefined ? _args4[3] : {};
|
|
296
297
|
metadata = _args4.length > 4 && _args4[4] !== undefined ? _args4[4] : null;
|
|
297
|
-
|
|
298
|
+
languageHeader = _Files.default.getLanguage() ? {
|
|
299
|
+
'Accept-Language': _Files.default.getLanguage()
|
|
300
|
+
} : {};
|
|
301
|
+
headers = _objectSpread(_objectSpread(_objectSpread({
|
|
298
302
|
Accept: 'application/json'
|
|
299
|
-
}, options.headers), {}, {
|
|
303
|
+
}, languageHeader), options.headers), {}, {
|
|
300
304
|
'User-Agent': _Files.default.getUserAgent()
|
|
301
305
|
});
|
|
302
306
|
isExternal = /^[a-zA-Z]+:\/\//.test(path);
|
|
303
307
|
if (isExternal) {
|
|
304
|
-
_context4.next =
|
|
308
|
+
_context4.next = 18;
|
|
305
309
|
break;
|
|
306
310
|
}
|
|
307
311
|
sessionId = options.sessionId || _Files.default.getSessionId();
|
|
308
312
|
if (!sessionId) {
|
|
309
|
-
_context4.next =
|
|
313
|
+
_context4.next = 12;
|
|
310
314
|
break;
|
|
311
315
|
}
|
|
312
316
|
headers['X-FilesAPI-Auth'] = sessionId;
|
|
313
|
-
_context4.next =
|
|
317
|
+
_context4.next = 18;
|
|
314
318
|
break;
|
|
315
|
-
case
|
|
319
|
+
case 12:
|
|
316
320
|
isCreatingSession = path === '/sessions' && verb.toUpperCase() === 'POST'; // api key cannot be used when creating a session
|
|
317
321
|
if (isCreatingSession) {
|
|
318
|
-
_context4.next =
|
|
322
|
+
_context4.next = 18;
|
|
319
323
|
break;
|
|
320
324
|
}
|
|
321
325
|
apiKey = options.apiKey || _Files.default.getApiKey();
|
|
322
326
|
if (apiKey) {
|
|
323
|
-
_context4.next =
|
|
327
|
+
_context4.next = 17;
|
|
324
328
|
break;
|
|
325
329
|
}
|
|
326
330
|
throw new errors.ConfigurationError('API key has not been set - use Files.setApiKey() to set it');
|
|
327
|
-
case 16:
|
|
328
|
-
headers['X-FilesAPI-Key'] = apiKey;
|
|
329
331
|
case 17:
|
|
332
|
+
headers['X-FilesAPI-Key'] = apiKey;
|
|
333
|
+
case 18:
|
|
330
334
|
updatedOptions = _objectSpread(_objectSpread({}, options), {}, {
|
|
331
335
|
headers: headers
|
|
332
336
|
});
|
|
@@ -368,12 +372,12 @@ _Api = Api;
|
|
|
368
372
|
})
|
|
369
373
|
}));
|
|
370
374
|
}
|
|
371
|
-
_context4.next =
|
|
375
|
+
_context4.next = 25;
|
|
372
376
|
return _Api._sendVerbatim(requestPath, verb, updatedOptions);
|
|
373
|
-
case
|
|
377
|
+
case 25:
|
|
374
378
|
response = _context4.sent;
|
|
375
379
|
return _context4.abrupt("return", _Api._autoPaginate(path, verb, params, updatedOptions, response, metadata));
|
|
376
|
-
case
|
|
380
|
+
case 27:
|
|
377
381
|
case "end":
|
|
378
382
|
return _context4.stop();
|
|
379
383
|
}
|
package/lib/Files.js
CHANGED
|
@@ -11,7 +11,8 @@ var endpointPrefix = '/api/rest/v1';
|
|
|
11
11
|
var apiKey;
|
|
12
12
|
var baseUrl = 'https://app.files.com';
|
|
13
13
|
var sessionId = null;
|
|
14
|
-
var
|
|
14
|
+
var language = null;
|
|
15
|
+
var version = '1.2.235';
|
|
15
16
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
|
16
17
|
var logLevel = _Logger.LogLevel.INFO;
|
|
17
18
|
var debugRequest = false;
|
|
@@ -48,6 +49,12 @@ var Files = /*#__PURE__*/(0, _createClass2.default)(function Files() {
|
|
|
48
49
|
(0, _defineProperty2.default)(Files, "getSessionId", function () {
|
|
49
50
|
return sessionId;
|
|
50
51
|
});
|
|
52
|
+
(0, _defineProperty2.default)(Files, "getLanguage", function () {
|
|
53
|
+
return language;
|
|
54
|
+
});
|
|
55
|
+
(0, _defineProperty2.default)(Files, "setLanguage", function (value) {
|
|
56
|
+
language = value;
|
|
57
|
+
});
|
|
51
58
|
(0, _defineProperty2.default)(Files, "getEndpointPrefix", function () {
|
|
52
59
|
return endpointPrefix;
|
|
53
60
|
});
|
|
@@ -271,6 +271,13 @@ var RemoteServer = /*#__PURE__*/(0, _createClass2.default)(function RemoteServer
|
|
|
271
271
|
(0, _defineProperty2.default)(this, "setAzureBlobStorageHierarchicalNamespace", function (value) {
|
|
272
272
|
_this.attributes.azure_blob_storage_hierarchical_namespace = value;
|
|
273
273
|
});
|
|
274
|
+
// string # Custom DNS suffix
|
|
275
|
+
(0, _defineProperty2.default)(this, "getAzureBlobStorageDnsSuffix", function () {
|
|
276
|
+
return _this.attributes.azure_blob_storage_dns_suffix;
|
|
277
|
+
});
|
|
278
|
+
(0, _defineProperty2.default)(this, "setAzureBlobStorageDnsSuffix", function (value) {
|
|
279
|
+
_this.attributes.azure_blob_storage_dns_suffix = value;
|
|
280
|
+
});
|
|
274
281
|
// string # Azure File Storage Account name
|
|
275
282
|
(0, _defineProperty2.default)(this, "getAzureFilesStorageAccount", function () {
|
|
276
283
|
return _this.attributes.azure_files_storage_account;
|
|
@@ -734,6 +741,7 @@ var RemoteServer = /*#__PURE__*/(0, _createClass2.default)(function RemoteServer
|
|
|
734
741
|
// azure_blob_storage_container - string - Azure Blob Storage Container name
|
|
735
742
|
// azure_blob_storage_hierarchical_namespace - boolean - Enable when storage account has hierarchical namespace feature enabled
|
|
736
743
|
// azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
|
|
744
|
+
// azure_blob_storage_dns_suffix - string - Custom DNS suffix
|
|
737
745
|
// azure_files_storage_account - string - Azure File Storage Account name
|
|
738
746
|
// azure_files_storage_share_name - string - Azure File Storage Share name
|
|
739
747
|
// azure_files_storage_dns_suffix - string - Custom DNS suffix
|
|
@@ -1014,164 +1022,170 @@ var RemoteServer = /*#__PURE__*/(0, _createClass2.default)(function RemoteServer
|
|
|
1014
1022
|
}
|
|
1015
1023
|
throw new errors.InvalidParameterError("Bad parameter: azure_blob_storage_sas_token must be of type String, received ".concat((0, _utils.getType)(params.azure_blob_storage_sas_token)));
|
|
1016
1024
|
case 84:
|
|
1017
|
-
if (!(params.
|
|
1025
|
+
if (!(params.azure_blob_storage_dns_suffix && !(0, _utils.isString)(params.azure_blob_storage_dns_suffix))) {
|
|
1018
1026
|
_context2.next = 86;
|
|
1019
1027
|
break;
|
|
1020
1028
|
}
|
|
1021
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1029
|
+
throw new errors.InvalidParameterError("Bad parameter: azure_blob_storage_dns_suffix must be of type String, received ".concat((0, _utils.getType)(params.azure_blob_storage_dns_suffix)));
|
|
1022
1030
|
case 86:
|
|
1023
|
-
if (!(params.
|
|
1031
|
+
if (!(params.azure_files_storage_account && !(0, _utils.isString)(params.azure_files_storage_account))) {
|
|
1024
1032
|
_context2.next = 88;
|
|
1025
1033
|
break;
|
|
1026
1034
|
}
|
|
1027
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1035
|
+
throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_account must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_account)));
|
|
1028
1036
|
case 88:
|
|
1029
|
-
if (!(params.
|
|
1037
|
+
if (!(params.azure_files_storage_share_name && !(0, _utils.isString)(params.azure_files_storage_share_name))) {
|
|
1030
1038
|
_context2.next = 90;
|
|
1031
1039
|
break;
|
|
1032
1040
|
}
|
|
1033
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1041
|
+
throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_share_name must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_share_name)));
|
|
1034
1042
|
case 90:
|
|
1035
|
-
if (!(params.
|
|
1043
|
+
if (!(params.azure_files_storage_dns_suffix && !(0, _utils.isString)(params.azure_files_storage_dns_suffix))) {
|
|
1036
1044
|
_context2.next = 92;
|
|
1037
1045
|
break;
|
|
1038
1046
|
}
|
|
1039
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1047
|
+
throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_dns_suffix must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_dns_suffix)));
|
|
1040
1048
|
case 92:
|
|
1041
|
-
if (!(params.
|
|
1049
|
+
if (!(params.azure_files_storage_sas_token && !(0, _utils.isString)(params.azure_files_storage_sas_token))) {
|
|
1042
1050
|
_context2.next = 94;
|
|
1043
1051
|
break;
|
|
1044
1052
|
}
|
|
1045
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1053
|
+
throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_sas_token must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_sas_token)));
|
|
1046
1054
|
case 94:
|
|
1047
|
-
if (!(params.
|
|
1055
|
+
if (!(params.s3_compatible_bucket && !(0, _utils.isString)(params.s3_compatible_bucket))) {
|
|
1048
1056
|
_context2.next = 96;
|
|
1049
1057
|
break;
|
|
1050
1058
|
}
|
|
1051
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1059
|
+
throw new errors.InvalidParameterError("Bad parameter: s3_compatible_bucket must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_bucket)));
|
|
1052
1060
|
case 96:
|
|
1053
|
-
if (!(params.
|
|
1061
|
+
if (!(params.s3_compatible_endpoint && !(0, _utils.isString)(params.s3_compatible_endpoint))) {
|
|
1054
1062
|
_context2.next = 98;
|
|
1055
1063
|
break;
|
|
1056
1064
|
}
|
|
1057
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1065
|
+
throw new errors.InvalidParameterError("Bad parameter: s3_compatible_endpoint must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_endpoint)));
|
|
1058
1066
|
case 98:
|
|
1059
|
-
if (!(params.
|
|
1067
|
+
if (!(params.s3_compatible_region && !(0, _utils.isString)(params.s3_compatible_region))) {
|
|
1060
1068
|
_context2.next = 100;
|
|
1061
1069
|
break;
|
|
1062
1070
|
}
|
|
1063
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1071
|
+
throw new errors.InvalidParameterError("Bad parameter: s3_compatible_region must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_region)));
|
|
1064
1072
|
case 100:
|
|
1065
|
-
if (!(params.
|
|
1073
|
+
if (!(params.s3_compatible_access_key && !(0, _utils.isString)(params.s3_compatible_access_key))) {
|
|
1066
1074
|
_context2.next = 102;
|
|
1067
1075
|
break;
|
|
1068
1076
|
}
|
|
1069
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1077
|
+
throw new errors.InvalidParameterError("Bad parameter: s3_compatible_access_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_access_key)));
|
|
1070
1078
|
case 102:
|
|
1071
|
-
if (!(params.
|
|
1079
|
+
if (!(params.s3_compatible_secret_key && !(0, _utils.isString)(params.s3_compatible_secret_key))) {
|
|
1072
1080
|
_context2.next = 104;
|
|
1073
1081
|
break;
|
|
1074
1082
|
}
|
|
1075
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1083
|
+
throw new errors.InvalidParameterError("Bad parameter: s3_compatible_secret_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_secret_key)));
|
|
1076
1084
|
case 104:
|
|
1077
|
-
if (!(params.
|
|
1085
|
+
if (!(params.files_agent_root && !(0, _utils.isString)(params.files_agent_root))) {
|
|
1078
1086
|
_context2.next = 106;
|
|
1079
1087
|
break;
|
|
1080
1088
|
}
|
|
1081
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1089
|
+
throw new errors.InvalidParameterError("Bad parameter: files_agent_root must be of type String, received ".concat((0, _utils.getType)(params.files_agent_root)));
|
|
1082
1090
|
case 106:
|
|
1083
|
-
if (!(params.
|
|
1091
|
+
if (!(params.files_agent_permission_set && !(0, _utils.isString)(params.files_agent_permission_set))) {
|
|
1084
1092
|
_context2.next = 108;
|
|
1085
1093
|
break;
|
|
1086
1094
|
}
|
|
1087
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1095
|
+
throw new errors.InvalidParameterError("Bad parameter: files_agent_permission_set must be of type String, received ".concat((0, _utils.getType)(params.files_agent_permission_set)));
|
|
1088
1096
|
case 108:
|
|
1089
|
-
if (!(params.
|
|
1097
|
+
if (!(params.files_agent_version && !(0, _utils.isString)(params.files_agent_version))) {
|
|
1090
1098
|
_context2.next = 110;
|
|
1091
1099
|
break;
|
|
1092
1100
|
}
|
|
1093
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1101
|
+
throw new errors.InvalidParameterError("Bad parameter: files_agent_version must be of type String, received ".concat((0, _utils.getType)(params.files_agent_version)));
|
|
1094
1102
|
case 110:
|
|
1095
|
-
if (!(params.
|
|
1103
|
+
if (!(params.filebase_access_key && !(0, _utils.isString)(params.filebase_access_key))) {
|
|
1096
1104
|
_context2.next = 112;
|
|
1097
1105
|
break;
|
|
1098
1106
|
}
|
|
1099
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1107
|
+
throw new errors.InvalidParameterError("Bad parameter: filebase_access_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_access_key)));
|
|
1100
1108
|
case 112:
|
|
1101
|
-
if (!(params.
|
|
1109
|
+
if (!(params.filebase_secret_key && !(0, _utils.isString)(params.filebase_secret_key))) {
|
|
1102
1110
|
_context2.next = 114;
|
|
1103
1111
|
break;
|
|
1104
1112
|
}
|
|
1105
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1113
|
+
throw new errors.InvalidParameterError("Bad parameter: filebase_secret_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_secret_key)));
|
|
1106
1114
|
case 114:
|
|
1107
|
-
if (!(params.
|
|
1115
|
+
if (!(params.filebase_bucket && !(0, _utils.isString)(params.filebase_bucket))) {
|
|
1108
1116
|
_context2.next = 116;
|
|
1109
1117
|
break;
|
|
1110
1118
|
}
|
|
1111
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1119
|
+
throw new errors.InvalidParameterError("Bad parameter: filebase_bucket must be of type String, received ".concat((0, _utils.getType)(params.filebase_bucket)));
|
|
1112
1120
|
case 116:
|
|
1113
|
-
if (!(params.
|
|
1121
|
+
if (!(params.cloudflare_access_key && !(0, _utils.isString)(params.cloudflare_access_key))) {
|
|
1114
1122
|
_context2.next = 118;
|
|
1115
1123
|
break;
|
|
1116
1124
|
}
|
|
1117
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1125
|
+
throw new errors.InvalidParameterError("Bad parameter: cloudflare_access_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_access_key)));
|
|
1118
1126
|
case 118:
|
|
1119
|
-
if (!(params.
|
|
1127
|
+
if (!(params.cloudflare_secret_key && !(0, _utils.isString)(params.cloudflare_secret_key))) {
|
|
1120
1128
|
_context2.next = 120;
|
|
1121
1129
|
break;
|
|
1122
1130
|
}
|
|
1123
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1131
|
+
throw new errors.InvalidParameterError("Bad parameter: cloudflare_secret_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_secret_key)));
|
|
1124
1132
|
case 120:
|
|
1125
|
-
if (!(params.
|
|
1133
|
+
if (!(params.cloudflare_bucket && !(0, _utils.isString)(params.cloudflare_bucket))) {
|
|
1126
1134
|
_context2.next = 122;
|
|
1127
1135
|
break;
|
|
1128
1136
|
}
|
|
1129
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1137
|
+
throw new errors.InvalidParameterError("Bad parameter: cloudflare_bucket must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_bucket)));
|
|
1130
1138
|
case 122:
|
|
1131
|
-
if (!(params.
|
|
1139
|
+
if (!(params.cloudflare_endpoint && !(0, _utils.isString)(params.cloudflare_endpoint))) {
|
|
1132
1140
|
_context2.next = 124;
|
|
1133
1141
|
break;
|
|
1134
1142
|
}
|
|
1135
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1143
|
+
throw new errors.InvalidParameterError("Bad parameter: cloudflare_endpoint must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_endpoint)));
|
|
1136
1144
|
case 124:
|
|
1137
|
-
if (!(params.
|
|
1145
|
+
if (!(params.linode_access_key && !(0, _utils.isString)(params.linode_access_key))) {
|
|
1138
1146
|
_context2.next = 126;
|
|
1139
1147
|
break;
|
|
1140
1148
|
}
|
|
1141
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1149
|
+
throw new errors.InvalidParameterError("Bad parameter: linode_access_key must be of type String, received ".concat((0, _utils.getType)(params.linode_access_key)));
|
|
1142
1150
|
case 126:
|
|
1143
|
-
if (!(params.
|
|
1151
|
+
if (!(params.linode_secret_key && !(0, _utils.isString)(params.linode_secret_key))) {
|
|
1144
1152
|
_context2.next = 128;
|
|
1145
1153
|
break;
|
|
1146
1154
|
}
|
|
1147
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1155
|
+
throw new errors.InvalidParameterError("Bad parameter: linode_secret_key must be of type String, received ".concat((0, _utils.getType)(params.linode_secret_key)));
|
|
1148
1156
|
case 128:
|
|
1149
|
-
if (!(params.
|
|
1157
|
+
if (!(params.linode_bucket && !(0, _utils.isString)(params.linode_bucket))) {
|
|
1150
1158
|
_context2.next = 130;
|
|
1151
1159
|
break;
|
|
1152
1160
|
}
|
|
1153
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1161
|
+
throw new errors.InvalidParameterError("Bad parameter: linode_bucket must be of type String, received ".concat((0, _utils.getType)(params.linode_bucket)));
|
|
1154
1162
|
case 130:
|
|
1163
|
+
if (!(params.linode_region && !(0, _utils.isString)(params.linode_region))) {
|
|
1164
|
+
_context2.next = 132;
|
|
1165
|
+
break;
|
|
1166
|
+
}
|
|
1167
|
+
throw new errors.InvalidParameterError("Bad parameter: linode_region must be of type String, received ".concat((0, _utils.getType)(params.linode_region)));
|
|
1168
|
+
case 132:
|
|
1155
1169
|
if (params.id) {
|
|
1156
|
-
_context2.next =
|
|
1170
|
+
_context2.next = 138;
|
|
1157
1171
|
break;
|
|
1158
1172
|
}
|
|
1159
1173
|
if (!_this.attributes.id) {
|
|
1160
|
-
_context2.next =
|
|
1174
|
+
_context2.next = 137;
|
|
1161
1175
|
break;
|
|
1162
1176
|
}
|
|
1163
1177
|
params.id = _this.id;
|
|
1164
|
-
_context2.next =
|
|
1178
|
+
_context2.next = 138;
|
|
1165
1179
|
break;
|
|
1166
|
-
case
|
|
1180
|
+
case 137:
|
|
1167
1181
|
throw new errors.MissingParameterError('Parameter missing: id');
|
|
1168
|
-
case 136:
|
|
1169
|
-
_context2.next = 138;
|
|
1170
|
-
return _Api.default.sendRequest("/remote_servers/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
|
|
1171
1182
|
case 138:
|
|
1183
|
+
_context2.next = 140;
|
|
1184
|
+
return _Api.default.sendRequest("/remote_servers/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
|
|
1185
|
+
case 140:
|
|
1172
1186
|
response = _context2.sent;
|
|
1173
1187
|
return _context2.abrupt("return", new RemoteServer(response === null || response === void 0 ? void 0 : response.data, _this.options));
|
|
1174
|
-
case
|
|
1188
|
+
case 142:
|
|
1175
1189
|
case "end":
|
|
1176
1190
|
return _context2.stop();
|
|
1177
1191
|
}
|
|
@@ -1461,6 +1475,7 @@ _RemoteServer = RemoteServer;
|
|
|
1461
1475
|
// azure_blob_storage_container - string - Azure Blob Storage Container name
|
|
1462
1476
|
// azure_blob_storage_hierarchical_namespace - boolean - Enable when storage account has hierarchical namespace feature enabled
|
|
1463
1477
|
// azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
|
|
1478
|
+
// azure_blob_storage_dns_suffix - string - Custom DNS suffix
|
|
1464
1479
|
// azure_files_storage_account - string - Azure File Storage Account name
|
|
1465
1480
|
// azure_files_storage_share_name - string - Azure File Storage Share name
|
|
1466
1481
|
// azure_files_storage_dns_suffix - string - Custom DNS suffix
|
|
@@ -1724,150 +1739,156 @@ _RemoteServer = RemoteServer;
|
|
|
1724
1739
|
}
|
|
1725
1740
|
throw new errors.InvalidParameterError("Bad parameter: azure_blob_storage_sas_token must be of type String, received ".concat((0, _utils.getType)(params.azure_blob_storage_sas_token)));
|
|
1726
1741
|
case 78:
|
|
1727
|
-
if (!(params.
|
|
1742
|
+
if (!(params.azure_blob_storage_dns_suffix && !(0, _utils.isString)(params.azure_blob_storage_dns_suffix))) {
|
|
1728
1743
|
_context8.next = 80;
|
|
1729
1744
|
break;
|
|
1730
1745
|
}
|
|
1731
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1746
|
+
throw new errors.InvalidParameterError("Bad parameter: azure_blob_storage_dns_suffix must be of type String, received ".concat((0, _utils.getType)(params.azure_blob_storage_dns_suffix)));
|
|
1732
1747
|
case 80:
|
|
1733
|
-
if (!(params.
|
|
1748
|
+
if (!(params.azure_files_storage_account && !(0, _utils.isString)(params.azure_files_storage_account))) {
|
|
1734
1749
|
_context8.next = 82;
|
|
1735
1750
|
break;
|
|
1736
1751
|
}
|
|
1737
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1752
|
+
throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_account must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_account)));
|
|
1738
1753
|
case 82:
|
|
1739
|
-
if (!(params.
|
|
1754
|
+
if (!(params.azure_files_storage_share_name && !(0, _utils.isString)(params.azure_files_storage_share_name))) {
|
|
1740
1755
|
_context8.next = 84;
|
|
1741
1756
|
break;
|
|
1742
1757
|
}
|
|
1743
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1758
|
+
throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_share_name must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_share_name)));
|
|
1744
1759
|
case 84:
|
|
1745
|
-
if (!(params.
|
|
1760
|
+
if (!(params.azure_files_storage_dns_suffix && !(0, _utils.isString)(params.azure_files_storage_dns_suffix))) {
|
|
1746
1761
|
_context8.next = 86;
|
|
1747
1762
|
break;
|
|
1748
1763
|
}
|
|
1749
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1764
|
+
throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_dns_suffix must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_dns_suffix)));
|
|
1750
1765
|
case 86:
|
|
1751
|
-
if (!(params.
|
|
1766
|
+
if (!(params.azure_files_storage_sas_token && !(0, _utils.isString)(params.azure_files_storage_sas_token))) {
|
|
1752
1767
|
_context8.next = 88;
|
|
1753
1768
|
break;
|
|
1754
1769
|
}
|
|
1755
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1770
|
+
throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_sas_token must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_sas_token)));
|
|
1756
1771
|
case 88:
|
|
1757
|
-
if (!(params.
|
|
1772
|
+
if (!(params.s3_compatible_bucket && !(0, _utils.isString)(params.s3_compatible_bucket))) {
|
|
1758
1773
|
_context8.next = 90;
|
|
1759
1774
|
break;
|
|
1760
1775
|
}
|
|
1761
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1776
|
+
throw new errors.InvalidParameterError("Bad parameter: s3_compatible_bucket must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_bucket)));
|
|
1762
1777
|
case 90:
|
|
1763
|
-
if (!(params.
|
|
1778
|
+
if (!(params.s3_compatible_endpoint && !(0, _utils.isString)(params.s3_compatible_endpoint))) {
|
|
1764
1779
|
_context8.next = 92;
|
|
1765
1780
|
break;
|
|
1766
1781
|
}
|
|
1767
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1782
|
+
throw new errors.InvalidParameterError("Bad parameter: s3_compatible_endpoint must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_endpoint)));
|
|
1768
1783
|
case 92:
|
|
1769
|
-
if (!(params.
|
|
1784
|
+
if (!(params.s3_compatible_region && !(0, _utils.isString)(params.s3_compatible_region))) {
|
|
1770
1785
|
_context8.next = 94;
|
|
1771
1786
|
break;
|
|
1772
1787
|
}
|
|
1773
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1788
|
+
throw new errors.InvalidParameterError("Bad parameter: s3_compatible_region must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_region)));
|
|
1774
1789
|
case 94:
|
|
1775
|
-
if (!(params.
|
|
1790
|
+
if (!(params.s3_compatible_access_key && !(0, _utils.isString)(params.s3_compatible_access_key))) {
|
|
1776
1791
|
_context8.next = 96;
|
|
1777
1792
|
break;
|
|
1778
1793
|
}
|
|
1779
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1794
|
+
throw new errors.InvalidParameterError("Bad parameter: s3_compatible_access_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_access_key)));
|
|
1780
1795
|
case 96:
|
|
1781
|
-
if (!(params.
|
|
1796
|
+
if (!(params.s3_compatible_secret_key && !(0, _utils.isString)(params.s3_compatible_secret_key))) {
|
|
1782
1797
|
_context8.next = 98;
|
|
1783
1798
|
break;
|
|
1784
1799
|
}
|
|
1785
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1800
|
+
throw new errors.InvalidParameterError("Bad parameter: s3_compatible_secret_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_secret_key)));
|
|
1786
1801
|
case 98:
|
|
1787
|
-
if (!(params.
|
|
1802
|
+
if (!(params.files_agent_root && !(0, _utils.isString)(params.files_agent_root))) {
|
|
1788
1803
|
_context8.next = 100;
|
|
1789
1804
|
break;
|
|
1790
1805
|
}
|
|
1791
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1806
|
+
throw new errors.InvalidParameterError("Bad parameter: files_agent_root must be of type String, received ".concat((0, _utils.getType)(params.files_agent_root)));
|
|
1792
1807
|
case 100:
|
|
1793
|
-
if (!(params.
|
|
1808
|
+
if (!(params.files_agent_permission_set && !(0, _utils.isString)(params.files_agent_permission_set))) {
|
|
1794
1809
|
_context8.next = 102;
|
|
1795
1810
|
break;
|
|
1796
1811
|
}
|
|
1797
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1812
|
+
throw new errors.InvalidParameterError("Bad parameter: files_agent_permission_set must be of type String, received ".concat((0, _utils.getType)(params.files_agent_permission_set)));
|
|
1798
1813
|
case 102:
|
|
1799
|
-
if (!(params.
|
|
1814
|
+
if (!(params.files_agent_version && !(0, _utils.isString)(params.files_agent_version))) {
|
|
1800
1815
|
_context8.next = 104;
|
|
1801
1816
|
break;
|
|
1802
1817
|
}
|
|
1803
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1818
|
+
throw new errors.InvalidParameterError("Bad parameter: files_agent_version must be of type String, received ".concat((0, _utils.getType)(params.files_agent_version)));
|
|
1804
1819
|
case 104:
|
|
1805
|
-
if (!(params.
|
|
1820
|
+
if (!(params.filebase_access_key && !(0, _utils.isString)(params.filebase_access_key))) {
|
|
1806
1821
|
_context8.next = 106;
|
|
1807
1822
|
break;
|
|
1808
1823
|
}
|
|
1809
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1824
|
+
throw new errors.InvalidParameterError("Bad parameter: filebase_access_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_access_key)));
|
|
1810
1825
|
case 106:
|
|
1811
|
-
if (!(params.
|
|
1826
|
+
if (!(params.filebase_secret_key && !(0, _utils.isString)(params.filebase_secret_key))) {
|
|
1812
1827
|
_context8.next = 108;
|
|
1813
1828
|
break;
|
|
1814
1829
|
}
|
|
1815
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1830
|
+
throw new errors.InvalidParameterError("Bad parameter: filebase_secret_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_secret_key)));
|
|
1816
1831
|
case 108:
|
|
1817
|
-
if (!(params.
|
|
1832
|
+
if (!(params.filebase_bucket && !(0, _utils.isString)(params.filebase_bucket))) {
|
|
1818
1833
|
_context8.next = 110;
|
|
1819
1834
|
break;
|
|
1820
1835
|
}
|
|
1821
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1836
|
+
throw new errors.InvalidParameterError("Bad parameter: filebase_bucket must be of type String, received ".concat((0, _utils.getType)(params.filebase_bucket)));
|
|
1822
1837
|
case 110:
|
|
1823
|
-
if (!(params.
|
|
1838
|
+
if (!(params.cloudflare_access_key && !(0, _utils.isString)(params.cloudflare_access_key))) {
|
|
1824
1839
|
_context8.next = 112;
|
|
1825
1840
|
break;
|
|
1826
1841
|
}
|
|
1827
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1842
|
+
throw new errors.InvalidParameterError("Bad parameter: cloudflare_access_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_access_key)));
|
|
1828
1843
|
case 112:
|
|
1829
|
-
if (!(params.
|
|
1844
|
+
if (!(params.cloudflare_secret_key && !(0, _utils.isString)(params.cloudflare_secret_key))) {
|
|
1830
1845
|
_context8.next = 114;
|
|
1831
1846
|
break;
|
|
1832
1847
|
}
|
|
1833
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1848
|
+
throw new errors.InvalidParameterError("Bad parameter: cloudflare_secret_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_secret_key)));
|
|
1834
1849
|
case 114:
|
|
1835
|
-
if (!(params.
|
|
1850
|
+
if (!(params.cloudflare_bucket && !(0, _utils.isString)(params.cloudflare_bucket))) {
|
|
1836
1851
|
_context8.next = 116;
|
|
1837
1852
|
break;
|
|
1838
1853
|
}
|
|
1839
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1854
|
+
throw new errors.InvalidParameterError("Bad parameter: cloudflare_bucket must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_bucket)));
|
|
1840
1855
|
case 116:
|
|
1841
|
-
if (!(params.
|
|
1856
|
+
if (!(params.cloudflare_endpoint && !(0, _utils.isString)(params.cloudflare_endpoint))) {
|
|
1842
1857
|
_context8.next = 118;
|
|
1843
1858
|
break;
|
|
1844
1859
|
}
|
|
1845
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1860
|
+
throw new errors.InvalidParameterError("Bad parameter: cloudflare_endpoint must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_endpoint)));
|
|
1846
1861
|
case 118:
|
|
1847
|
-
if (!(params.
|
|
1862
|
+
if (!(params.linode_access_key && !(0, _utils.isString)(params.linode_access_key))) {
|
|
1848
1863
|
_context8.next = 120;
|
|
1849
1864
|
break;
|
|
1850
1865
|
}
|
|
1851
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1866
|
+
throw new errors.InvalidParameterError("Bad parameter: linode_access_key must be of type String, received ".concat((0, _utils.getType)(params.linode_access_key)));
|
|
1852
1867
|
case 120:
|
|
1853
|
-
if (!(params.
|
|
1868
|
+
if (!(params.linode_secret_key && !(0, _utils.isString)(params.linode_secret_key))) {
|
|
1854
1869
|
_context8.next = 122;
|
|
1855
1870
|
break;
|
|
1856
1871
|
}
|
|
1857
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1872
|
+
throw new errors.InvalidParameterError("Bad parameter: linode_secret_key must be of type String, received ".concat((0, _utils.getType)(params.linode_secret_key)));
|
|
1858
1873
|
case 122:
|
|
1859
|
-
if (!(params.
|
|
1874
|
+
if (!(params.linode_bucket && !(0, _utils.isString)(params.linode_bucket))) {
|
|
1860
1875
|
_context8.next = 124;
|
|
1861
1876
|
break;
|
|
1862
1877
|
}
|
|
1863
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1878
|
+
throw new errors.InvalidParameterError("Bad parameter: linode_bucket must be of type String, received ".concat((0, _utils.getType)(params.linode_bucket)));
|
|
1864
1879
|
case 124:
|
|
1865
|
-
|
|
1866
|
-
|
|
1880
|
+
if (!(params.linode_region && !(0, _utils.isString)(params.linode_region))) {
|
|
1881
|
+
_context8.next = 126;
|
|
1882
|
+
break;
|
|
1883
|
+
}
|
|
1884
|
+
throw new errors.InvalidParameterError("Bad parameter: linode_region must be of type String, received ".concat((0, _utils.getType)(params.linode_region)));
|
|
1867
1885
|
case 126:
|
|
1886
|
+
_context8.next = 128;
|
|
1887
|
+
return _Api.default.sendRequest('/remote_servers', 'POST', params, options);
|
|
1888
|
+
case 128:
|
|
1868
1889
|
response = _context8.sent;
|
|
1869
1890
|
return _context8.abrupt("return", new _RemoteServer(response === null || response === void 0 ? void 0 : response.data, options));
|
|
1870
|
-
case
|
|
1891
|
+
case 130:
|
|
1871
1892
|
case "end":
|
|
1872
1893
|
return _context8.stop();
|
|
1873
1894
|
}
|
package/lib/models/Site.js
CHANGED
|
@@ -609,6 +609,10 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
|
609
609
|
(0, _defineProperty2.default)(this, "getSessionExpiryMinutes", function () {
|
|
610
610
|
return _this.attributes.session_expiry_minutes;
|
|
611
611
|
});
|
|
612
|
+
// boolean # Allow snapshot share links creation
|
|
613
|
+
(0, _defineProperty2.default)(this, "getSnapshotSharingEnabled", function () {
|
|
614
|
+
return _this.attributes.snapshot_sharing_enabled;
|
|
615
|
+
});
|
|
612
616
|
// boolean # Is SSL required? Disabling this is insecure.
|
|
613
617
|
(0, _defineProperty2.default)(this, "getSslRequired", function () {
|
|
614
618
|
return _this.attributes.ssl_required;
|
|
@@ -852,6 +856,7 @@ _Site = Site;
|
|
|
852
856
|
// non_sso_groups_allowed - boolean - If true, groups can be manually created / modified / deleted by Site Admins. Otherwise, groups can only be managed via your SSO provider.
|
|
853
857
|
// non_sso_users_allowed - boolean - If true, users can be manually created / modified / deleted by Site Admins. Otherwise, users can only be managed via your SSO provider.
|
|
854
858
|
// sharing_enabled - boolean - Allow bundle creation
|
|
859
|
+
// snapshot_sharing_enabled - boolean - Allow snapshot share links creation
|
|
855
860
|
// user_requests_enabled - boolean - Enable User Requests feature
|
|
856
861
|
// user_requests_notify_admins - boolean - Send email to site admins when a user request is received?
|
|
857
862
|
// dav_enabled - boolean - Is WebDAV enabled?
|
package/package.json
CHANGED
package/src/Api.js
CHANGED
|
@@ -172,8 +172,11 @@ class Api {
|
|
|
172
172
|
}
|
|
173
173
|
|
|
174
174
|
static sendRequest = async (path, verb, params = null, options = {}, metadata = null) => {
|
|
175
|
+
const languageHeader = Files.getLanguage() ? { 'Accept-Language': Files.getLanguage() } : {}
|
|
176
|
+
|
|
175
177
|
const headers = {
|
|
176
178
|
Accept: 'application/json',
|
|
179
|
+
...languageHeader,
|
|
177
180
|
...options.headers,
|
|
178
181
|
'User-Agent': Files.getUserAgent(),
|
|
179
182
|
}
|
package/src/Files.js
CHANGED
|
@@ -5,7 +5,8 @@ const endpointPrefix = '/api/rest/v1'
|
|
|
5
5
|
let apiKey
|
|
6
6
|
let baseUrl = 'https://app.files.com'
|
|
7
7
|
let sessionId = null
|
|
8
|
-
|
|
8
|
+
let language = null
|
|
9
|
+
const version = '1.2.235'
|
|
9
10
|
let userAgent = `Files.com JavaScript SDK v${version}`
|
|
10
11
|
|
|
11
12
|
let logLevel = LogLevel.INFO
|
|
@@ -35,6 +36,10 @@ class Files {
|
|
|
35
36
|
|
|
36
37
|
static getSessionId = () => sessionId
|
|
37
38
|
|
|
39
|
+
static getLanguage = () => language
|
|
40
|
+
|
|
41
|
+
static setLanguage = value => { language = value }
|
|
42
|
+
|
|
38
43
|
static getEndpointPrefix = () => endpointPrefix
|
|
39
44
|
|
|
40
45
|
static setLogLevel = value => { logLevel = value }
|
|
@@ -266,6 +266,13 @@ class RemoteServer {
|
|
|
266
266
|
this.attributes.azure_blob_storage_hierarchical_namespace = value
|
|
267
267
|
}
|
|
268
268
|
|
|
269
|
+
// string # Custom DNS suffix
|
|
270
|
+
getAzureBlobStorageDnsSuffix = () => this.attributes.azure_blob_storage_dns_suffix
|
|
271
|
+
|
|
272
|
+
setAzureBlobStorageDnsSuffix = value => {
|
|
273
|
+
this.attributes.azure_blob_storage_dns_suffix = value
|
|
274
|
+
}
|
|
275
|
+
|
|
269
276
|
// string # Azure File Storage Account name
|
|
270
277
|
getAzureFilesStorageAccount = () => this.attributes.azure_files_storage_account
|
|
271
278
|
|
|
@@ -681,6 +688,7 @@ class RemoteServer {
|
|
|
681
688
|
// azure_blob_storage_container - string - Azure Blob Storage Container name
|
|
682
689
|
// azure_blob_storage_hierarchical_namespace - boolean - Enable when storage account has hierarchical namespace feature enabled
|
|
683
690
|
// azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
|
|
691
|
+
// azure_blob_storage_dns_suffix - string - Custom DNS suffix
|
|
684
692
|
// azure_files_storage_account - string - Azure File Storage Account name
|
|
685
693
|
// azure_files_storage_share_name - string - Azure File Storage Share name
|
|
686
694
|
// azure_files_storage_dns_suffix - string - Custom DNS suffix
|
|
@@ -872,6 +880,10 @@ class RemoteServer {
|
|
|
872
880
|
throw new errors.InvalidParameterError(`Bad parameter: azure_blob_storage_sas_token must be of type String, received ${getType(params.azure_blob_storage_sas_token)}`)
|
|
873
881
|
}
|
|
874
882
|
|
|
883
|
+
if (params.azure_blob_storage_dns_suffix && !isString(params.azure_blob_storage_dns_suffix)) {
|
|
884
|
+
throw new errors.InvalidParameterError(`Bad parameter: azure_blob_storage_dns_suffix must be of type String, received ${getType(params.azure_blob_storage_dns_suffix)}`)
|
|
885
|
+
}
|
|
886
|
+
|
|
875
887
|
if (params.azure_files_storage_account && !isString(params.azure_files_storage_account)) {
|
|
876
888
|
throw new errors.InvalidParameterError(`Bad parameter: azure_files_storage_account must be of type String, received ${getType(params.azure_files_storage_account)}`)
|
|
877
889
|
}
|
|
@@ -1130,6 +1142,7 @@ class RemoteServer {
|
|
|
1130
1142
|
// azure_blob_storage_container - string - Azure Blob Storage Container name
|
|
1131
1143
|
// azure_blob_storage_hierarchical_namespace - boolean - Enable when storage account has hierarchical namespace feature enabled
|
|
1132
1144
|
// azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
|
|
1145
|
+
// azure_blob_storage_dns_suffix - string - Custom DNS suffix
|
|
1133
1146
|
// azure_files_storage_account - string - Azure File Storage Account name
|
|
1134
1147
|
// azure_files_storage_share_name - string - Azure File Storage Share name
|
|
1135
1148
|
// azure_files_storage_dns_suffix - string - Custom DNS suffix
|
|
@@ -1308,6 +1321,10 @@ class RemoteServer {
|
|
|
1308
1321
|
throw new errors.InvalidParameterError(`Bad parameter: azure_blob_storage_sas_token must be of type String, received ${getType(params.azure_blob_storage_sas_token)}`)
|
|
1309
1322
|
}
|
|
1310
1323
|
|
|
1324
|
+
if (params.azure_blob_storage_dns_suffix && !isString(params.azure_blob_storage_dns_suffix)) {
|
|
1325
|
+
throw new errors.InvalidParameterError(`Bad parameter: azure_blob_storage_dns_suffix must be of type String, received ${getType(params.azure_blob_storage_dns_suffix)}`)
|
|
1326
|
+
}
|
|
1327
|
+
|
|
1311
1328
|
if (params.azure_files_storage_account && !isString(params.azure_files_storage_account)) {
|
|
1312
1329
|
throw new errors.InvalidParameterError(`Bad parameter: azure_files_storage_account must be of type String, received ${getType(params.azure_files_storage_account)}`)
|
|
1313
1330
|
}
|
package/src/models/Site.js
CHANGED
|
@@ -460,6 +460,9 @@ class Site {
|
|
|
460
460
|
// int64 # Session expiry in minutes
|
|
461
461
|
getSessionExpiryMinutes = () => this.attributes.session_expiry_minutes
|
|
462
462
|
|
|
463
|
+
// boolean # Allow snapshot share links creation
|
|
464
|
+
getSnapshotSharingEnabled = () => this.attributes.snapshot_sharing_enabled
|
|
465
|
+
|
|
463
466
|
// boolean # Is SSL required? Disabling this is insecure.
|
|
464
467
|
getSslRequired = () => this.attributes.ssl_required
|
|
465
468
|
|
|
@@ -637,6 +640,7 @@ class Site {
|
|
|
637
640
|
// non_sso_groups_allowed - boolean - If true, groups can be manually created / modified / deleted by Site Admins. Otherwise, groups can only be managed via your SSO provider.
|
|
638
641
|
// non_sso_users_allowed - boolean - If true, users can be manually created / modified / deleted by Site Admins. Otherwise, users can only be managed via your SSO provider.
|
|
639
642
|
// sharing_enabled - boolean - Allow bundle creation
|
|
643
|
+
// snapshot_sharing_enabled - boolean - Allow snapshot share links creation
|
|
640
644
|
// user_requests_enabled - boolean - Enable User Requests feature
|
|
641
645
|
// user_requests_notify_admins - boolean - Send email to site admins when a user request is received?
|
|
642
646
|
// dav_enabled - boolean - Is WebDAV enabled?
|
|
@@ -1,3 +1,39 @@
|
|
|
1
|
+
///////////////////////////////////////////////////////////////////////////////
|
|
2
|
+
// To run this test suite, first set environment variables:
|
|
3
|
+
//
|
|
4
|
+
// required:
|
|
5
|
+
// FILES_API_KEY - set to your API key
|
|
6
|
+
// FILES_API_DOMAIN - set to your Files.com subdomain (e.g. mysite.files.com)
|
|
7
|
+
//
|
|
8
|
+
// required only if testSession() is run, otherwise can be omitted:
|
|
9
|
+
// FILES_SESSION_USERNAME - username to login with
|
|
10
|
+
// FILES_SESSION_PASSWORD - password to login with
|
|
11
|
+
//
|
|
12
|
+
// optional:
|
|
13
|
+
// USER_COUNT_TO_TRIGGER_PAGINATION - defaults to 1, set to a number that will
|
|
14
|
+
// require multiple page requests to fetch all users, but don't set it too low;
|
|
15
|
+
// if you have many users, then "1" will trigger a fetch for every single user
|
|
16
|
+
//
|
|
17
|
+
///////////////////////////////////////////////////////////////////////////////
|
|
18
|
+
//
|
|
19
|
+
// Next, in the ../../../ directory, build the SDK:
|
|
20
|
+
//
|
|
21
|
+
// npm install
|
|
22
|
+
// npm run build
|
|
23
|
+
//
|
|
24
|
+
// Then, in the ../ directory, build the test suite:
|
|
25
|
+
//
|
|
26
|
+
// npm install
|
|
27
|
+
// npm run build
|
|
28
|
+
//
|
|
29
|
+
// Finally, execute the current file:
|
|
30
|
+
//
|
|
31
|
+
// npm run test
|
|
32
|
+
//
|
|
33
|
+
///////////////////////////////////////////////////////////////////////////////
|
|
34
|
+
// Note: you can comment out at the bottom of this file any tests you don't want to run.
|
|
35
|
+
///////////////////////////////////////////////////////////////////////////////
|
|
36
|
+
|
|
1
37
|
import Files from 'files.com/lib/Files'
|
|
2
38
|
import Logger, { LogLevel } from 'files.com/lib/Logger'
|
|
3
39
|
import ApiKey from 'files.com/lib/models/ApiKey'
|
|
@@ -27,13 +63,15 @@ if (!apiDomain) {
|
|
|
27
63
|
Files.setApiKey(apiKey)
|
|
28
64
|
Files.setBaseUrl(`https://${apiDomain}`)
|
|
29
65
|
|
|
30
|
-
// temp for testing against staging
|
|
31
66
|
if (apiDomain.substr(-10) === 'staging.av') {
|
|
32
67
|
process.env.NODE_TLS_REJECT_UNAUTHORIZED = 0
|
|
33
68
|
}
|
|
34
69
|
|
|
35
70
|
const DEBUG_MODE = false
|
|
36
71
|
|
|
72
|
+
// any user count that will require multiple page requests to fetch all users
|
|
73
|
+
const USER_COUNT_TO_TRIGGER_PAGINATION = process.env.USER_COUNT_TO_TRIGGER_PAGINATION || 1
|
|
74
|
+
|
|
37
75
|
Files.setLogLevel(DEBUG_MODE ? LogLevel.DEBUG : LogLevel.INFO)
|
|
38
76
|
|
|
39
77
|
Files.configureDebugging({
|
|
@@ -53,7 +91,7 @@ const testSuite = async () => {
|
|
|
53
91
|
autoPaginate: false,
|
|
54
92
|
})
|
|
55
93
|
|
|
56
|
-
const firstPageItems = await Folder.listFor('/', { per_page:
|
|
94
|
+
const firstPageItems = await Folder.listFor('/', { per_page: USER_COUNT_TO_TRIGGER_PAGINATION })
|
|
57
95
|
|
|
58
96
|
invariant(firstPageItems.length === 1, 'First page should have 1 item')
|
|
59
97
|
|
|
@@ -260,6 +298,41 @@ const testSuite = async () => {
|
|
|
260
298
|
Logger.info('***** testUserListAndUpdate() succeeded! *****');
|
|
261
299
|
}
|
|
262
300
|
|
|
301
|
+
const testLanguage = async () => {
|
|
302
|
+
Files.setLanguage('es');
|
|
303
|
+
invariant(Files.getLanguage() === 'es');
|
|
304
|
+
|
|
305
|
+
const savedLogLevel = Files.getLogLevel()
|
|
306
|
+
const savedDebugRequest = Files.shouldDebugRequest()
|
|
307
|
+
const savedDebugResponseHeaders = Files.shouldDebugResponseHeaders()
|
|
308
|
+
Files.setLogLevel(LogLevel.DEBUG)
|
|
309
|
+
Files.configureDebugging({
|
|
310
|
+
debugRequest: true,
|
|
311
|
+
debugResponseHeaders: true,
|
|
312
|
+
})
|
|
313
|
+
|
|
314
|
+
const logs = []
|
|
315
|
+
const savedConsoleLog = console.log
|
|
316
|
+
console.log = (...args) => {
|
|
317
|
+
logs.push(args.map(JSON.stringify).join(' '))
|
|
318
|
+
}
|
|
319
|
+
|
|
320
|
+
await ApiKey.list({ user_id: 0 })
|
|
321
|
+
|
|
322
|
+
console.log = savedConsoleLog
|
|
323
|
+
|
|
324
|
+
Files.setLogLevel(savedLogLevel)
|
|
325
|
+
Files.configureDebugging({
|
|
326
|
+
debugRequest: savedDebugRequest,
|
|
327
|
+
debugResponseHeaders: savedDebugResponseHeaders,
|
|
328
|
+
})
|
|
329
|
+
|
|
330
|
+
const allLogs = logs.join('\n')
|
|
331
|
+
invariant(allLogs.includes('"Accept-Language":"es"'), '"Accept-Language: es" header not found in debug output');
|
|
332
|
+
|
|
333
|
+
Logger.info('***** testLanguage() succeeded! *****');
|
|
334
|
+
}
|
|
335
|
+
|
|
263
336
|
//
|
|
264
337
|
// execute all tests
|
|
265
338
|
//
|
|
@@ -273,6 +346,7 @@ const testSuite = async () => {
|
|
|
273
346
|
await testSession()
|
|
274
347
|
await testFailure()
|
|
275
348
|
await testUserListAndUpdate()
|
|
349
|
+
await testLanguage()
|
|
276
350
|
} catch (error) {
|
|
277
351
|
console.log('*** TEST SUITE FAILED ***')
|
|
278
352
|
console.error(error)
|