files.com 1.2.233 → 1.2.235

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -420,6 +420,22 @@ try {
420
420
  }
421
421
  ```
422
422
 
423
+ ## Foreign Language Support
424
+
425
+ The Files.com Javascript SDK supports localized responses by using the `Files.setLanguage()` configuration method.
426
+ When configured, this guides the API in selecting a preferred language for applicable response content.
427
+
428
+ Language support currently applies to select human-facing fields only, such as notification messages
429
+ and error descriptions.
430
+
431
+ If the specified language is not supported or the value is omitted, the API defaults to English.
432
+
433
+ ```javascript title="Example Request"
434
+ import Files from 'files.com/lib/Files';
435
+
436
+ Files.setLanguage('es');
437
+ ```
438
+
423
439
  ## Errors
424
440
 
425
441
  The Files.com JavaScript SDK will return errors by raising exceptions. There are many exception classes defined in the Files SDK that correspond
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.2.233
1
+ 1.2.235
@@ -38,6 +38,7 @@
38
38
  "azure_blob_storage_account": "storage-account-name",
39
39
  "azure_blob_storage_container": "container-name",
40
40
  "azure_blob_storage_hierarchical_namespace": true,
41
+ "azure_blob_storage_dns_suffix": "usgovcloudapi.net",
41
42
  "azure_files_storage_account": "storage-account-name",
42
43
  "azure_files_storage_share_name": "share-name",
43
44
  "azure_files_storage_dns_suffix": "file.core.windows.net",
@@ -97,6 +98,7 @@
97
98
  * `azure_blob_storage_account` (string): Azure Blob Storage Account name
98
99
  * `azure_blob_storage_container` (string): Azure Blob Storage Container name
99
100
  * `azure_blob_storage_hierarchical_namespace` (boolean): Enable when storage account has hierarchical namespace feature enabled
101
+ * `azure_blob_storage_dns_suffix` (string): Custom DNS suffix
100
102
  * `azure_files_storage_account` (string): Azure File Storage Account name
101
103
  * `azure_files_storage_share_name` (string): Azure File Storage Share name
102
104
  * `azure_files_storage_dns_suffix` (string): Custom DNS suffix
@@ -216,6 +218,7 @@ await RemoteServer.create({
216
218
  'azure_blob_storage_account': "storage-account-name",
217
219
  'azure_blob_storage_container': "container-name",
218
220
  'azure_blob_storage_hierarchical_namespace': true,
221
+ 'azure_blob_storage_dns_suffix': "usgovcloudapi.net",
219
222
  'azure_files_storage_account': "storage-account-name",
220
223
  'azure_files_storage_share_name': "share-name",
221
224
  'azure_files_storage_dns_suffix': "file.core.windows.net",
@@ -283,6 +286,7 @@ await RemoteServer.create({
283
286
  * `azure_blob_storage_container` (string): Azure Blob Storage Container name
284
287
  * `azure_blob_storage_hierarchical_namespace` (boolean): Enable when storage account has hierarchical namespace feature enabled
285
288
  * `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
289
+ * `azure_blob_storage_dns_suffix` (string): Custom DNS suffix
286
290
  * `azure_files_storage_account` (string): Azure File Storage Account name
287
291
  * `azure_files_storage_share_name` (string): Azure File Storage Share name
288
292
  * `azure_files_storage_dns_suffix` (string): Custom DNS suffix
@@ -413,6 +417,7 @@ await remote_server.update({
413
417
  'azure_blob_storage_account': "storage-account-name",
414
418
  'azure_blob_storage_container': "container-name",
415
419
  'azure_blob_storage_hierarchical_namespace': true,
420
+ 'azure_blob_storage_dns_suffix': "usgovcloudapi.net",
416
421
  'azure_files_storage_account': "storage-account-name",
417
422
  'azure_files_storage_share_name': "share-name",
418
423
  'azure_files_storage_dns_suffix': "file.core.windows.net",
@@ -480,6 +485,7 @@ await remote_server.update({
480
485
  * `azure_blob_storage_container` (string): Azure Blob Storage Container name
481
486
  * `azure_blob_storage_hierarchical_namespace` (boolean): Enable when storage account has hierarchical namespace feature enabled
482
487
  * `azure_blob_storage_sas_token` (string): Shared Access Signature (SAS) token
488
+ * `azure_blob_storage_dns_suffix` (string): Custom DNS suffix
483
489
  * `azure_files_storage_account` (string): Azure File Storage Account name
484
490
  * `azure_files_storage_share_name` (string): Azure File Storage Share name
485
491
  * `azure_files_storage_dns_suffix` (string): Custom DNS suffix
@@ -544,6 +550,7 @@ await remote_server.update({
544
550
  "azure_blob_storage_account": "storage-account-name",
545
551
  "azure_blob_storage_container": "container-name",
546
552
  "azure_blob_storage_hierarchical_namespace": true,
553
+ "azure_blob_storage_dns_suffix": "usgovcloudapi.net",
547
554
  "azure_files_storage_account": "storage-account-name",
548
555
  "azure_files_storage_share_name": "share-name",
549
556
  "azure_files_storage_dns_suffix": "file.core.windows.net",
@@ -203,6 +203,7 @@
203
203
  "smtp_username": "mail",
204
204
  "session_expiry": 6.0,
205
205
  "session_expiry_minutes": 360,
206
+ "snapshot_sharing_enabled": true,
206
207
  "ssl_required": true,
207
208
  "subdomain": "mysite",
208
209
  "switch_to_plan_date": "2000-01-01T01:00:00Z",
@@ -445,6 +446,7 @@
445
446
  * `smtp_username` (string): SMTP server username
446
447
  * `session_expiry` (double): Session expiry in hours
447
448
  * `session_expiry_minutes` (int64): Session expiry in minutes
449
+ * `snapshot_sharing_enabled` (boolean): Allow snapshot share links creation
448
450
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
449
451
  * `subdomain` (string): Site subdomain
450
452
  * `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
@@ -582,6 +584,7 @@ await Site.update({
582
584
  'non_sso_groups_allowed': false,
583
585
  'non_sso_users_allowed': false,
584
586
  'sharing_enabled': false,
587
+ 'snapshot_sharing_enabled': false,
585
588
  'user_requests_enabled': false,
586
589
  'user_requests_notify_admins': false,
587
590
  'dav_enabled': false,
@@ -741,6 +744,7 @@ await Site.update({
741
744
  * `non_sso_groups_allowed` (boolean): If true, groups can be manually created / modified / deleted by Site Admins. Otherwise, groups can only be managed via your SSO provider.
742
745
  * `non_sso_users_allowed` (boolean): If true, users can be manually created / modified / deleted by Site Admins. Otherwise, users can only be managed via your SSO provider.
743
746
  * `sharing_enabled` (boolean): Allow bundle creation
747
+ * `snapshot_sharing_enabled` (boolean): Allow snapshot share links creation
744
748
  * `user_requests_enabled` (boolean): Enable User Requests feature
745
749
  * `user_requests_notify_admins` (boolean): Send email to site admins when a user request is received?
746
750
  * `dav_enabled` (boolean): Is WebDAV enabled?
package/lib/Api.js CHANGED
@@ -266,6 +266,7 @@ _Api = Api;
266
266
  var params,
267
267
  options,
268
268
  metadata,
269
+ languageHeader,
269
270
  headers,
270
271
  isExternal,
271
272
  sessionId,
@@ -294,39 +295,42 @@ _Api = Api;
294
295
  params = _args4.length > 2 && _args4[2] !== undefined ? _args4[2] : null;
295
296
  options = _args4.length > 3 && _args4[3] !== undefined ? _args4[3] : {};
296
297
  metadata = _args4.length > 4 && _args4[4] !== undefined ? _args4[4] : null;
297
- headers = _objectSpread(_objectSpread({
298
+ languageHeader = _Files.default.getLanguage() ? {
299
+ 'Accept-Language': _Files.default.getLanguage()
300
+ } : {};
301
+ headers = _objectSpread(_objectSpread(_objectSpread({
298
302
  Accept: 'application/json'
299
- }, options.headers), {}, {
303
+ }, languageHeader), options.headers), {}, {
300
304
  'User-Agent': _Files.default.getUserAgent()
301
305
  });
302
306
  isExternal = /^[a-zA-Z]+:\/\//.test(path);
303
307
  if (isExternal) {
304
- _context4.next = 17;
308
+ _context4.next = 18;
305
309
  break;
306
310
  }
307
311
  sessionId = options.sessionId || _Files.default.getSessionId();
308
312
  if (!sessionId) {
309
- _context4.next = 11;
313
+ _context4.next = 12;
310
314
  break;
311
315
  }
312
316
  headers['X-FilesAPI-Auth'] = sessionId;
313
- _context4.next = 17;
317
+ _context4.next = 18;
314
318
  break;
315
- case 11:
319
+ case 12:
316
320
  isCreatingSession = path === '/sessions' && verb.toUpperCase() === 'POST'; // api key cannot be used when creating a session
317
321
  if (isCreatingSession) {
318
- _context4.next = 17;
322
+ _context4.next = 18;
319
323
  break;
320
324
  }
321
325
  apiKey = options.apiKey || _Files.default.getApiKey();
322
326
  if (apiKey) {
323
- _context4.next = 16;
327
+ _context4.next = 17;
324
328
  break;
325
329
  }
326
330
  throw new errors.ConfigurationError('API key has not been set - use Files.setApiKey() to set it');
327
- case 16:
328
- headers['X-FilesAPI-Key'] = apiKey;
329
331
  case 17:
332
+ headers['X-FilesAPI-Key'] = apiKey;
333
+ case 18:
330
334
  updatedOptions = _objectSpread(_objectSpread({}, options), {}, {
331
335
  headers: headers
332
336
  });
@@ -368,12 +372,12 @@ _Api = Api;
368
372
  })
369
373
  }));
370
374
  }
371
- _context4.next = 24;
375
+ _context4.next = 25;
372
376
  return _Api._sendVerbatim(requestPath, verb, updatedOptions);
373
- case 24:
377
+ case 25:
374
378
  response = _context4.sent;
375
379
  return _context4.abrupt("return", _Api._autoPaginate(path, verb, params, updatedOptions, response, metadata));
376
- case 26:
380
+ case 27:
377
381
  case "end":
378
382
  return _context4.stop();
379
383
  }
package/lib/Files.js CHANGED
@@ -11,7 +11,8 @@ var endpointPrefix = '/api/rest/v1';
11
11
  var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
- var version = '1.2.233';
14
+ var language = null;
15
+ var version = '1.2.235';
15
16
  var userAgent = "Files.com JavaScript SDK v".concat(version);
16
17
  var logLevel = _Logger.LogLevel.INFO;
17
18
  var debugRequest = false;
@@ -48,6 +49,12 @@ var Files = /*#__PURE__*/(0, _createClass2.default)(function Files() {
48
49
  (0, _defineProperty2.default)(Files, "getSessionId", function () {
49
50
  return sessionId;
50
51
  });
52
+ (0, _defineProperty2.default)(Files, "getLanguage", function () {
53
+ return language;
54
+ });
55
+ (0, _defineProperty2.default)(Files, "setLanguage", function (value) {
56
+ language = value;
57
+ });
51
58
  (0, _defineProperty2.default)(Files, "getEndpointPrefix", function () {
52
59
  return endpointPrefix;
53
60
  });
@@ -271,6 +271,13 @@ var RemoteServer = /*#__PURE__*/(0, _createClass2.default)(function RemoteServer
271
271
  (0, _defineProperty2.default)(this, "setAzureBlobStorageHierarchicalNamespace", function (value) {
272
272
  _this.attributes.azure_blob_storage_hierarchical_namespace = value;
273
273
  });
274
+ // string # Custom DNS suffix
275
+ (0, _defineProperty2.default)(this, "getAzureBlobStorageDnsSuffix", function () {
276
+ return _this.attributes.azure_blob_storage_dns_suffix;
277
+ });
278
+ (0, _defineProperty2.default)(this, "setAzureBlobStorageDnsSuffix", function (value) {
279
+ _this.attributes.azure_blob_storage_dns_suffix = value;
280
+ });
274
281
  // string # Azure File Storage Account name
275
282
  (0, _defineProperty2.default)(this, "getAzureFilesStorageAccount", function () {
276
283
  return _this.attributes.azure_files_storage_account;
@@ -734,6 +741,7 @@ var RemoteServer = /*#__PURE__*/(0, _createClass2.default)(function RemoteServer
734
741
  // azure_blob_storage_container - string - Azure Blob Storage Container name
735
742
  // azure_blob_storage_hierarchical_namespace - boolean - Enable when storage account has hierarchical namespace feature enabled
736
743
  // azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
744
+ // azure_blob_storage_dns_suffix - string - Custom DNS suffix
737
745
  // azure_files_storage_account - string - Azure File Storage Account name
738
746
  // azure_files_storage_share_name - string - Azure File Storage Share name
739
747
  // azure_files_storage_dns_suffix - string - Custom DNS suffix
@@ -1014,164 +1022,170 @@ var RemoteServer = /*#__PURE__*/(0, _createClass2.default)(function RemoteServer
1014
1022
  }
1015
1023
  throw new errors.InvalidParameterError("Bad parameter: azure_blob_storage_sas_token must be of type String, received ".concat((0, _utils.getType)(params.azure_blob_storage_sas_token)));
1016
1024
  case 84:
1017
- if (!(params.azure_files_storage_account && !(0, _utils.isString)(params.azure_files_storage_account))) {
1025
+ if (!(params.azure_blob_storage_dns_suffix && !(0, _utils.isString)(params.azure_blob_storage_dns_suffix))) {
1018
1026
  _context2.next = 86;
1019
1027
  break;
1020
1028
  }
1021
- throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_account must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_account)));
1029
+ throw new errors.InvalidParameterError("Bad parameter: azure_blob_storage_dns_suffix must be of type String, received ".concat((0, _utils.getType)(params.azure_blob_storage_dns_suffix)));
1022
1030
  case 86:
1023
- if (!(params.azure_files_storage_share_name && !(0, _utils.isString)(params.azure_files_storage_share_name))) {
1031
+ if (!(params.azure_files_storage_account && !(0, _utils.isString)(params.azure_files_storage_account))) {
1024
1032
  _context2.next = 88;
1025
1033
  break;
1026
1034
  }
1027
- throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_share_name must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_share_name)));
1035
+ throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_account must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_account)));
1028
1036
  case 88:
1029
- if (!(params.azure_files_storage_dns_suffix && !(0, _utils.isString)(params.azure_files_storage_dns_suffix))) {
1037
+ if (!(params.azure_files_storage_share_name && !(0, _utils.isString)(params.azure_files_storage_share_name))) {
1030
1038
  _context2.next = 90;
1031
1039
  break;
1032
1040
  }
1033
- throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_dns_suffix must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_dns_suffix)));
1041
+ throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_share_name must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_share_name)));
1034
1042
  case 90:
1035
- if (!(params.azure_files_storage_sas_token && !(0, _utils.isString)(params.azure_files_storage_sas_token))) {
1043
+ if (!(params.azure_files_storage_dns_suffix && !(0, _utils.isString)(params.azure_files_storage_dns_suffix))) {
1036
1044
  _context2.next = 92;
1037
1045
  break;
1038
1046
  }
1039
- throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_sas_token must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_sas_token)));
1047
+ throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_dns_suffix must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_dns_suffix)));
1040
1048
  case 92:
1041
- if (!(params.s3_compatible_bucket && !(0, _utils.isString)(params.s3_compatible_bucket))) {
1049
+ if (!(params.azure_files_storage_sas_token && !(0, _utils.isString)(params.azure_files_storage_sas_token))) {
1042
1050
  _context2.next = 94;
1043
1051
  break;
1044
1052
  }
1045
- throw new errors.InvalidParameterError("Bad parameter: s3_compatible_bucket must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_bucket)));
1053
+ throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_sas_token must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_sas_token)));
1046
1054
  case 94:
1047
- if (!(params.s3_compatible_endpoint && !(0, _utils.isString)(params.s3_compatible_endpoint))) {
1055
+ if (!(params.s3_compatible_bucket && !(0, _utils.isString)(params.s3_compatible_bucket))) {
1048
1056
  _context2.next = 96;
1049
1057
  break;
1050
1058
  }
1051
- throw new errors.InvalidParameterError("Bad parameter: s3_compatible_endpoint must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_endpoint)));
1059
+ throw new errors.InvalidParameterError("Bad parameter: s3_compatible_bucket must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_bucket)));
1052
1060
  case 96:
1053
- if (!(params.s3_compatible_region && !(0, _utils.isString)(params.s3_compatible_region))) {
1061
+ if (!(params.s3_compatible_endpoint && !(0, _utils.isString)(params.s3_compatible_endpoint))) {
1054
1062
  _context2.next = 98;
1055
1063
  break;
1056
1064
  }
1057
- throw new errors.InvalidParameterError("Bad parameter: s3_compatible_region must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_region)));
1065
+ throw new errors.InvalidParameterError("Bad parameter: s3_compatible_endpoint must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_endpoint)));
1058
1066
  case 98:
1059
- if (!(params.s3_compatible_access_key && !(0, _utils.isString)(params.s3_compatible_access_key))) {
1067
+ if (!(params.s3_compatible_region && !(0, _utils.isString)(params.s3_compatible_region))) {
1060
1068
  _context2.next = 100;
1061
1069
  break;
1062
1070
  }
1063
- throw new errors.InvalidParameterError("Bad parameter: s3_compatible_access_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_access_key)));
1071
+ throw new errors.InvalidParameterError("Bad parameter: s3_compatible_region must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_region)));
1064
1072
  case 100:
1065
- if (!(params.s3_compatible_secret_key && !(0, _utils.isString)(params.s3_compatible_secret_key))) {
1073
+ if (!(params.s3_compatible_access_key && !(0, _utils.isString)(params.s3_compatible_access_key))) {
1066
1074
  _context2.next = 102;
1067
1075
  break;
1068
1076
  }
1069
- throw new errors.InvalidParameterError("Bad parameter: s3_compatible_secret_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_secret_key)));
1077
+ throw new errors.InvalidParameterError("Bad parameter: s3_compatible_access_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_access_key)));
1070
1078
  case 102:
1071
- if (!(params.files_agent_root && !(0, _utils.isString)(params.files_agent_root))) {
1079
+ if (!(params.s3_compatible_secret_key && !(0, _utils.isString)(params.s3_compatible_secret_key))) {
1072
1080
  _context2.next = 104;
1073
1081
  break;
1074
1082
  }
1075
- throw new errors.InvalidParameterError("Bad parameter: files_agent_root must be of type String, received ".concat((0, _utils.getType)(params.files_agent_root)));
1083
+ throw new errors.InvalidParameterError("Bad parameter: s3_compatible_secret_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_secret_key)));
1076
1084
  case 104:
1077
- if (!(params.files_agent_permission_set && !(0, _utils.isString)(params.files_agent_permission_set))) {
1085
+ if (!(params.files_agent_root && !(0, _utils.isString)(params.files_agent_root))) {
1078
1086
  _context2.next = 106;
1079
1087
  break;
1080
1088
  }
1081
- throw new errors.InvalidParameterError("Bad parameter: files_agent_permission_set must be of type String, received ".concat((0, _utils.getType)(params.files_agent_permission_set)));
1089
+ throw new errors.InvalidParameterError("Bad parameter: files_agent_root must be of type String, received ".concat((0, _utils.getType)(params.files_agent_root)));
1082
1090
  case 106:
1083
- if (!(params.files_agent_version && !(0, _utils.isString)(params.files_agent_version))) {
1091
+ if (!(params.files_agent_permission_set && !(0, _utils.isString)(params.files_agent_permission_set))) {
1084
1092
  _context2.next = 108;
1085
1093
  break;
1086
1094
  }
1087
- throw new errors.InvalidParameterError("Bad parameter: files_agent_version must be of type String, received ".concat((0, _utils.getType)(params.files_agent_version)));
1095
+ throw new errors.InvalidParameterError("Bad parameter: files_agent_permission_set must be of type String, received ".concat((0, _utils.getType)(params.files_agent_permission_set)));
1088
1096
  case 108:
1089
- if (!(params.filebase_access_key && !(0, _utils.isString)(params.filebase_access_key))) {
1097
+ if (!(params.files_agent_version && !(0, _utils.isString)(params.files_agent_version))) {
1090
1098
  _context2.next = 110;
1091
1099
  break;
1092
1100
  }
1093
- throw new errors.InvalidParameterError("Bad parameter: filebase_access_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_access_key)));
1101
+ throw new errors.InvalidParameterError("Bad parameter: files_agent_version must be of type String, received ".concat((0, _utils.getType)(params.files_agent_version)));
1094
1102
  case 110:
1095
- if (!(params.filebase_secret_key && !(0, _utils.isString)(params.filebase_secret_key))) {
1103
+ if (!(params.filebase_access_key && !(0, _utils.isString)(params.filebase_access_key))) {
1096
1104
  _context2.next = 112;
1097
1105
  break;
1098
1106
  }
1099
- throw new errors.InvalidParameterError("Bad parameter: filebase_secret_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_secret_key)));
1107
+ throw new errors.InvalidParameterError("Bad parameter: filebase_access_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_access_key)));
1100
1108
  case 112:
1101
- if (!(params.filebase_bucket && !(0, _utils.isString)(params.filebase_bucket))) {
1109
+ if (!(params.filebase_secret_key && !(0, _utils.isString)(params.filebase_secret_key))) {
1102
1110
  _context2.next = 114;
1103
1111
  break;
1104
1112
  }
1105
- throw new errors.InvalidParameterError("Bad parameter: filebase_bucket must be of type String, received ".concat((0, _utils.getType)(params.filebase_bucket)));
1113
+ throw new errors.InvalidParameterError("Bad parameter: filebase_secret_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_secret_key)));
1106
1114
  case 114:
1107
- if (!(params.cloudflare_access_key && !(0, _utils.isString)(params.cloudflare_access_key))) {
1115
+ if (!(params.filebase_bucket && !(0, _utils.isString)(params.filebase_bucket))) {
1108
1116
  _context2.next = 116;
1109
1117
  break;
1110
1118
  }
1111
- throw new errors.InvalidParameterError("Bad parameter: cloudflare_access_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_access_key)));
1119
+ throw new errors.InvalidParameterError("Bad parameter: filebase_bucket must be of type String, received ".concat((0, _utils.getType)(params.filebase_bucket)));
1112
1120
  case 116:
1113
- if (!(params.cloudflare_secret_key && !(0, _utils.isString)(params.cloudflare_secret_key))) {
1121
+ if (!(params.cloudflare_access_key && !(0, _utils.isString)(params.cloudflare_access_key))) {
1114
1122
  _context2.next = 118;
1115
1123
  break;
1116
1124
  }
1117
- throw new errors.InvalidParameterError("Bad parameter: cloudflare_secret_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_secret_key)));
1125
+ throw new errors.InvalidParameterError("Bad parameter: cloudflare_access_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_access_key)));
1118
1126
  case 118:
1119
- if (!(params.cloudflare_bucket && !(0, _utils.isString)(params.cloudflare_bucket))) {
1127
+ if (!(params.cloudflare_secret_key && !(0, _utils.isString)(params.cloudflare_secret_key))) {
1120
1128
  _context2.next = 120;
1121
1129
  break;
1122
1130
  }
1123
- throw new errors.InvalidParameterError("Bad parameter: cloudflare_bucket must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_bucket)));
1131
+ throw new errors.InvalidParameterError("Bad parameter: cloudflare_secret_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_secret_key)));
1124
1132
  case 120:
1125
- if (!(params.cloudflare_endpoint && !(0, _utils.isString)(params.cloudflare_endpoint))) {
1133
+ if (!(params.cloudflare_bucket && !(0, _utils.isString)(params.cloudflare_bucket))) {
1126
1134
  _context2.next = 122;
1127
1135
  break;
1128
1136
  }
1129
- throw new errors.InvalidParameterError("Bad parameter: cloudflare_endpoint must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_endpoint)));
1137
+ throw new errors.InvalidParameterError("Bad parameter: cloudflare_bucket must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_bucket)));
1130
1138
  case 122:
1131
- if (!(params.linode_access_key && !(0, _utils.isString)(params.linode_access_key))) {
1139
+ if (!(params.cloudflare_endpoint && !(0, _utils.isString)(params.cloudflare_endpoint))) {
1132
1140
  _context2.next = 124;
1133
1141
  break;
1134
1142
  }
1135
- throw new errors.InvalidParameterError("Bad parameter: linode_access_key must be of type String, received ".concat((0, _utils.getType)(params.linode_access_key)));
1143
+ throw new errors.InvalidParameterError("Bad parameter: cloudflare_endpoint must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_endpoint)));
1136
1144
  case 124:
1137
- if (!(params.linode_secret_key && !(0, _utils.isString)(params.linode_secret_key))) {
1145
+ if (!(params.linode_access_key && !(0, _utils.isString)(params.linode_access_key))) {
1138
1146
  _context2.next = 126;
1139
1147
  break;
1140
1148
  }
1141
- throw new errors.InvalidParameterError("Bad parameter: linode_secret_key must be of type String, received ".concat((0, _utils.getType)(params.linode_secret_key)));
1149
+ throw new errors.InvalidParameterError("Bad parameter: linode_access_key must be of type String, received ".concat((0, _utils.getType)(params.linode_access_key)));
1142
1150
  case 126:
1143
- if (!(params.linode_bucket && !(0, _utils.isString)(params.linode_bucket))) {
1151
+ if (!(params.linode_secret_key && !(0, _utils.isString)(params.linode_secret_key))) {
1144
1152
  _context2.next = 128;
1145
1153
  break;
1146
1154
  }
1147
- throw new errors.InvalidParameterError("Bad parameter: linode_bucket must be of type String, received ".concat((0, _utils.getType)(params.linode_bucket)));
1155
+ throw new errors.InvalidParameterError("Bad parameter: linode_secret_key must be of type String, received ".concat((0, _utils.getType)(params.linode_secret_key)));
1148
1156
  case 128:
1149
- if (!(params.linode_region && !(0, _utils.isString)(params.linode_region))) {
1157
+ if (!(params.linode_bucket && !(0, _utils.isString)(params.linode_bucket))) {
1150
1158
  _context2.next = 130;
1151
1159
  break;
1152
1160
  }
1153
- throw new errors.InvalidParameterError("Bad parameter: linode_region must be of type String, received ".concat((0, _utils.getType)(params.linode_region)));
1161
+ throw new errors.InvalidParameterError("Bad parameter: linode_bucket must be of type String, received ".concat((0, _utils.getType)(params.linode_bucket)));
1154
1162
  case 130:
1163
+ if (!(params.linode_region && !(0, _utils.isString)(params.linode_region))) {
1164
+ _context2.next = 132;
1165
+ break;
1166
+ }
1167
+ throw new errors.InvalidParameterError("Bad parameter: linode_region must be of type String, received ".concat((0, _utils.getType)(params.linode_region)));
1168
+ case 132:
1155
1169
  if (params.id) {
1156
- _context2.next = 136;
1170
+ _context2.next = 138;
1157
1171
  break;
1158
1172
  }
1159
1173
  if (!_this.attributes.id) {
1160
- _context2.next = 135;
1174
+ _context2.next = 137;
1161
1175
  break;
1162
1176
  }
1163
1177
  params.id = _this.id;
1164
- _context2.next = 136;
1178
+ _context2.next = 138;
1165
1179
  break;
1166
- case 135:
1180
+ case 137:
1167
1181
  throw new errors.MissingParameterError('Parameter missing: id');
1168
- case 136:
1169
- _context2.next = 138;
1170
- return _Api.default.sendRequest("/remote_servers/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
1171
1182
  case 138:
1183
+ _context2.next = 140;
1184
+ return _Api.default.sendRequest("/remote_servers/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
1185
+ case 140:
1172
1186
  response = _context2.sent;
1173
1187
  return _context2.abrupt("return", new RemoteServer(response === null || response === void 0 ? void 0 : response.data, _this.options));
1174
- case 140:
1188
+ case 142:
1175
1189
  case "end":
1176
1190
  return _context2.stop();
1177
1191
  }
@@ -1461,6 +1475,7 @@ _RemoteServer = RemoteServer;
1461
1475
  // azure_blob_storage_container - string - Azure Blob Storage Container name
1462
1476
  // azure_blob_storage_hierarchical_namespace - boolean - Enable when storage account has hierarchical namespace feature enabled
1463
1477
  // azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
1478
+ // azure_blob_storage_dns_suffix - string - Custom DNS suffix
1464
1479
  // azure_files_storage_account - string - Azure File Storage Account name
1465
1480
  // azure_files_storage_share_name - string - Azure File Storage Share name
1466
1481
  // azure_files_storage_dns_suffix - string - Custom DNS suffix
@@ -1724,150 +1739,156 @@ _RemoteServer = RemoteServer;
1724
1739
  }
1725
1740
  throw new errors.InvalidParameterError("Bad parameter: azure_blob_storage_sas_token must be of type String, received ".concat((0, _utils.getType)(params.azure_blob_storage_sas_token)));
1726
1741
  case 78:
1727
- if (!(params.azure_files_storage_account && !(0, _utils.isString)(params.azure_files_storage_account))) {
1742
+ if (!(params.azure_blob_storage_dns_suffix && !(0, _utils.isString)(params.azure_blob_storage_dns_suffix))) {
1728
1743
  _context8.next = 80;
1729
1744
  break;
1730
1745
  }
1731
- throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_account must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_account)));
1746
+ throw new errors.InvalidParameterError("Bad parameter: azure_blob_storage_dns_suffix must be of type String, received ".concat((0, _utils.getType)(params.azure_blob_storage_dns_suffix)));
1732
1747
  case 80:
1733
- if (!(params.azure_files_storage_share_name && !(0, _utils.isString)(params.azure_files_storage_share_name))) {
1748
+ if (!(params.azure_files_storage_account && !(0, _utils.isString)(params.azure_files_storage_account))) {
1734
1749
  _context8.next = 82;
1735
1750
  break;
1736
1751
  }
1737
- throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_share_name must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_share_name)));
1752
+ throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_account must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_account)));
1738
1753
  case 82:
1739
- if (!(params.azure_files_storage_dns_suffix && !(0, _utils.isString)(params.azure_files_storage_dns_suffix))) {
1754
+ if (!(params.azure_files_storage_share_name && !(0, _utils.isString)(params.azure_files_storage_share_name))) {
1740
1755
  _context8.next = 84;
1741
1756
  break;
1742
1757
  }
1743
- throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_dns_suffix must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_dns_suffix)));
1758
+ throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_share_name must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_share_name)));
1744
1759
  case 84:
1745
- if (!(params.azure_files_storage_sas_token && !(0, _utils.isString)(params.azure_files_storage_sas_token))) {
1760
+ if (!(params.azure_files_storage_dns_suffix && !(0, _utils.isString)(params.azure_files_storage_dns_suffix))) {
1746
1761
  _context8.next = 86;
1747
1762
  break;
1748
1763
  }
1749
- throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_sas_token must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_sas_token)));
1764
+ throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_dns_suffix must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_dns_suffix)));
1750
1765
  case 86:
1751
- if (!(params.s3_compatible_bucket && !(0, _utils.isString)(params.s3_compatible_bucket))) {
1766
+ if (!(params.azure_files_storage_sas_token && !(0, _utils.isString)(params.azure_files_storage_sas_token))) {
1752
1767
  _context8.next = 88;
1753
1768
  break;
1754
1769
  }
1755
- throw new errors.InvalidParameterError("Bad parameter: s3_compatible_bucket must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_bucket)));
1770
+ throw new errors.InvalidParameterError("Bad parameter: azure_files_storage_sas_token must be of type String, received ".concat((0, _utils.getType)(params.azure_files_storage_sas_token)));
1756
1771
  case 88:
1757
- if (!(params.s3_compatible_endpoint && !(0, _utils.isString)(params.s3_compatible_endpoint))) {
1772
+ if (!(params.s3_compatible_bucket && !(0, _utils.isString)(params.s3_compatible_bucket))) {
1758
1773
  _context8.next = 90;
1759
1774
  break;
1760
1775
  }
1761
- throw new errors.InvalidParameterError("Bad parameter: s3_compatible_endpoint must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_endpoint)));
1776
+ throw new errors.InvalidParameterError("Bad parameter: s3_compatible_bucket must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_bucket)));
1762
1777
  case 90:
1763
- if (!(params.s3_compatible_region && !(0, _utils.isString)(params.s3_compatible_region))) {
1778
+ if (!(params.s3_compatible_endpoint && !(0, _utils.isString)(params.s3_compatible_endpoint))) {
1764
1779
  _context8.next = 92;
1765
1780
  break;
1766
1781
  }
1767
- throw new errors.InvalidParameterError("Bad parameter: s3_compatible_region must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_region)));
1782
+ throw new errors.InvalidParameterError("Bad parameter: s3_compatible_endpoint must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_endpoint)));
1768
1783
  case 92:
1769
- if (!(params.s3_compatible_access_key && !(0, _utils.isString)(params.s3_compatible_access_key))) {
1784
+ if (!(params.s3_compatible_region && !(0, _utils.isString)(params.s3_compatible_region))) {
1770
1785
  _context8.next = 94;
1771
1786
  break;
1772
1787
  }
1773
- throw new errors.InvalidParameterError("Bad parameter: s3_compatible_access_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_access_key)));
1788
+ throw new errors.InvalidParameterError("Bad parameter: s3_compatible_region must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_region)));
1774
1789
  case 94:
1775
- if (!(params.s3_compatible_secret_key && !(0, _utils.isString)(params.s3_compatible_secret_key))) {
1790
+ if (!(params.s3_compatible_access_key && !(0, _utils.isString)(params.s3_compatible_access_key))) {
1776
1791
  _context8.next = 96;
1777
1792
  break;
1778
1793
  }
1779
- throw new errors.InvalidParameterError("Bad parameter: s3_compatible_secret_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_secret_key)));
1794
+ throw new errors.InvalidParameterError("Bad parameter: s3_compatible_access_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_access_key)));
1780
1795
  case 96:
1781
- if (!(params.files_agent_root && !(0, _utils.isString)(params.files_agent_root))) {
1796
+ if (!(params.s3_compatible_secret_key && !(0, _utils.isString)(params.s3_compatible_secret_key))) {
1782
1797
  _context8.next = 98;
1783
1798
  break;
1784
1799
  }
1785
- throw new errors.InvalidParameterError("Bad parameter: files_agent_root must be of type String, received ".concat((0, _utils.getType)(params.files_agent_root)));
1800
+ throw new errors.InvalidParameterError("Bad parameter: s3_compatible_secret_key must be of type String, received ".concat((0, _utils.getType)(params.s3_compatible_secret_key)));
1786
1801
  case 98:
1787
- if (!(params.files_agent_permission_set && !(0, _utils.isString)(params.files_agent_permission_set))) {
1802
+ if (!(params.files_agent_root && !(0, _utils.isString)(params.files_agent_root))) {
1788
1803
  _context8.next = 100;
1789
1804
  break;
1790
1805
  }
1791
- throw new errors.InvalidParameterError("Bad parameter: files_agent_permission_set must be of type String, received ".concat((0, _utils.getType)(params.files_agent_permission_set)));
1806
+ throw new errors.InvalidParameterError("Bad parameter: files_agent_root must be of type String, received ".concat((0, _utils.getType)(params.files_agent_root)));
1792
1807
  case 100:
1793
- if (!(params.files_agent_version && !(0, _utils.isString)(params.files_agent_version))) {
1808
+ if (!(params.files_agent_permission_set && !(0, _utils.isString)(params.files_agent_permission_set))) {
1794
1809
  _context8.next = 102;
1795
1810
  break;
1796
1811
  }
1797
- throw new errors.InvalidParameterError("Bad parameter: files_agent_version must be of type String, received ".concat((0, _utils.getType)(params.files_agent_version)));
1812
+ throw new errors.InvalidParameterError("Bad parameter: files_agent_permission_set must be of type String, received ".concat((0, _utils.getType)(params.files_agent_permission_set)));
1798
1813
  case 102:
1799
- if (!(params.filebase_access_key && !(0, _utils.isString)(params.filebase_access_key))) {
1814
+ if (!(params.files_agent_version && !(0, _utils.isString)(params.files_agent_version))) {
1800
1815
  _context8.next = 104;
1801
1816
  break;
1802
1817
  }
1803
- throw new errors.InvalidParameterError("Bad parameter: filebase_access_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_access_key)));
1818
+ throw new errors.InvalidParameterError("Bad parameter: files_agent_version must be of type String, received ".concat((0, _utils.getType)(params.files_agent_version)));
1804
1819
  case 104:
1805
- if (!(params.filebase_secret_key && !(0, _utils.isString)(params.filebase_secret_key))) {
1820
+ if (!(params.filebase_access_key && !(0, _utils.isString)(params.filebase_access_key))) {
1806
1821
  _context8.next = 106;
1807
1822
  break;
1808
1823
  }
1809
- throw new errors.InvalidParameterError("Bad parameter: filebase_secret_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_secret_key)));
1824
+ throw new errors.InvalidParameterError("Bad parameter: filebase_access_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_access_key)));
1810
1825
  case 106:
1811
- if (!(params.filebase_bucket && !(0, _utils.isString)(params.filebase_bucket))) {
1826
+ if (!(params.filebase_secret_key && !(0, _utils.isString)(params.filebase_secret_key))) {
1812
1827
  _context8.next = 108;
1813
1828
  break;
1814
1829
  }
1815
- throw new errors.InvalidParameterError("Bad parameter: filebase_bucket must be of type String, received ".concat((0, _utils.getType)(params.filebase_bucket)));
1830
+ throw new errors.InvalidParameterError("Bad parameter: filebase_secret_key must be of type String, received ".concat((0, _utils.getType)(params.filebase_secret_key)));
1816
1831
  case 108:
1817
- if (!(params.cloudflare_access_key && !(0, _utils.isString)(params.cloudflare_access_key))) {
1832
+ if (!(params.filebase_bucket && !(0, _utils.isString)(params.filebase_bucket))) {
1818
1833
  _context8.next = 110;
1819
1834
  break;
1820
1835
  }
1821
- throw new errors.InvalidParameterError("Bad parameter: cloudflare_access_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_access_key)));
1836
+ throw new errors.InvalidParameterError("Bad parameter: filebase_bucket must be of type String, received ".concat((0, _utils.getType)(params.filebase_bucket)));
1822
1837
  case 110:
1823
- if (!(params.cloudflare_secret_key && !(0, _utils.isString)(params.cloudflare_secret_key))) {
1838
+ if (!(params.cloudflare_access_key && !(0, _utils.isString)(params.cloudflare_access_key))) {
1824
1839
  _context8.next = 112;
1825
1840
  break;
1826
1841
  }
1827
- throw new errors.InvalidParameterError("Bad parameter: cloudflare_secret_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_secret_key)));
1842
+ throw new errors.InvalidParameterError("Bad parameter: cloudflare_access_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_access_key)));
1828
1843
  case 112:
1829
- if (!(params.cloudflare_bucket && !(0, _utils.isString)(params.cloudflare_bucket))) {
1844
+ if (!(params.cloudflare_secret_key && !(0, _utils.isString)(params.cloudflare_secret_key))) {
1830
1845
  _context8.next = 114;
1831
1846
  break;
1832
1847
  }
1833
- throw new errors.InvalidParameterError("Bad parameter: cloudflare_bucket must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_bucket)));
1848
+ throw new errors.InvalidParameterError("Bad parameter: cloudflare_secret_key must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_secret_key)));
1834
1849
  case 114:
1835
- if (!(params.cloudflare_endpoint && !(0, _utils.isString)(params.cloudflare_endpoint))) {
1850
+ if (!(params.cloudflare_bucket && !(0, _utils.isString)(params.cloudflare_bucket))) {
1836
1851
  _context8.next = 116;
1837
1852
  break;
1838
1853
  }
1839
- throw new errors.InvalidParameterError("Bad parameter: cloudflare_endpoint must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_endpoint)));
1854
+ throw new errors.InvalidParameterError("Bad parameter: cloudflare_bucket must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_bucket)));
1840
1855
  case 116:
1841
- if (!(params.linode_access_key && !(0, _utils.isString)(params.linode_access_key))) {
1856
+ if (!(params.cloudflare_endpoint && !(0, _utils.isString)(params.cloudflare_endpoint))) {
1842
1857
  _context8.next = 118;
1843
1858
  break;
1844
1859
  }
1845
- throw new errors.InvalidParameterError("Bad parameter: linode_access_key must be of type String, received ".concat((0, _utils.getType)(params.linode_access_key)));
1860
+ throw new errors.InvalidParameterError("Bad parameter: cloudflare_endpoint must be of type String, received ".concat((0, _utils.getType)(params.cloudflare_endpoint)));
1846
1861
  case 118:
1847
- if (!(params.linode_secret_key && !(0, _utils.isString)(params.linode_secret_key))) {
1862
+ if (!(params.linode_access_key && !(0, _utils.isString)(params.linode_access_key))) {
1848
1863
  _context8.next = 120;
1849
1864
  break;
1850
1865
  }
1851
- throw new errors.InvalidParameterError("Bad parameter: linode_secret_key must be of type String, received ".concat((0, _utils.getType)(params.linode_secret_key)));
1866
+ throw new errors.InvalidParameterError("Bad parameter: linode_access_key must be of type String, received ".concat((0, _utils.getType)(params.linode_access_key)));
1852
1867
  case 120:
1853
- if (!(params.linode_bucket && !(0, _utils.isString)(params.linode_bucket))) {
1868
+ if (!(params.linode_secret_key && !(0, _utils.isString)(params.linode_secret_key))) {
1854
1869
  _context8.next = 122;
1855
1870
  break;
1856
1871
  }
1857
- throw new errors.InvalidParameterError("Bad parameter: linode_bucket must be of type String, received ".concat((0, _utils.getType)(params.linode_bucket)));
1872
+ throw new errors.InvalidParameterError("Bad parameter: linode_secret_key must be of type String, received ".concat((0, _utils.getType)(params.linode_secret_key)));
1858
1873
  case 122:
1859
- if (!(params.linode_region && !(0, _utils.isString)(params.linode_region))) {
1874
+ if (!(params.linode_bucket && !(0, _utils.isString)(params.linode_bucket))) {
1860
1875
  _context8.next = 124;
1861
1876
  break;
1862
1877
  }
1863
- throw new errors.InvalidParameterError("Bad parameter: linode_region must be of type String, received ".concat((0, _utils.getType)(params.linode_region)));
1878
+ throw new errors.InvalidParameterError("Bad parameter: linode_bucket must be of type String, received ".concat((0, _utils.getType)(params.linode_bucket)));
1864
1879
  case 124:
1865
- _context8.next = 126;
1866
- return _Api.default.sendRequest('/remote_servers', 'POST', params, options);
1880
+ if (!(params.linode_region && !(0, _utils.isString)(params.linode_region))) {
1881
+ _context8.next = 126;
1882
+ break;
1883
+ }
1884
+ throw new errors.InvalidParameterError("Bad parameter: linode_region must be of type String, received ".concat((0, _utils.getType)(params.linode_region)));
1867
1885
  case 126:
1886
+ _context8.next = 128;
1887
+ return _Api.default.sendRequest('/remote_servers', 'POST', params, options);
1888
+ case 128:
1868
1889
  response = _context8.sent;
1869
1890
  return _context8.abrupt("return", new _RemoteServer(response === null || response === void 0 ? void 0 : response.data, options));
1870
- case 128:
1891
+ case 130:
1871
1892
  case "end":
1872
1893
  return _context8.stop();
1873
1894
  }
@@ -609,6 +609,10 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
609
609
  (0, _defineProperty2.default)(this, "getSessionExpiryMinutes", function () {
610
610
  return _this.attributes.session_expiry_minutes;
611
611
  });
612
+ // boolean # Allow snapshot share links creation
613
+ (0, _defineProperty2.default)(this, "getSnapshotSharingEnabled", function () {
614
+ return _this.attributes.snapshot_sharing_enabled;
615
+ });
612
616
  // boolean # Is SSL required? Disabling this is insecure.
613
617
  (0, _defineProperty2.default)(this, "getSslRequired", function () {
614
618
  return _this.attributes.ssl_required;
@@ -852,6 +856,7 @@ _Site = Site;
852
856
  // non_sso_groups_allowed - boolean - If true, groups can be manually created / modified / deleted by Site Admins. Otherwise, groups can only be managed via your SSO provider.
853
857
  // non_sso_users_allowed - boolean - If true, users can be manually created / modified / deleted by Site Admins. Otherwise, users can only be managed via your SSO provider.
854
858
  // sharing_enabled - boolean - Allow bundle creation
859
+ // snapshot_sharing_enabled - boolean - Allow snapshot share links creation
855
860
  // user_requests_enabled - boolean - Enable User Requests feature
856
861
  // user_requests_notify_admins - boolean - Send email to site admins when a user request is received?
857
862
  // dav_enabled - boolean - Is WebDAV enabled?
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.2.233",
3
+ "version": "1.2.235",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Api.js CHANGED
@@ -172,8 +172,11 @@ class Api {
172
172
  }
173
173
 
174
174
  static sendRequest = async (path, verb, params = null, options = {}, metadata = null) => {
175
+ const languageHeader = Files.getLanguage() ? { 'Accept-Language': Files.getLanguage() } : {}
176
+
175
177
  const headers = {
176
178
  Accept: 'application/json',
179
+ ...languageHeader,
177
180
  ...options.headers,
178
181
  'User-Agent': Files.getUserAgent(),
179
182
  }
package/src/Files.js CHANGED
@@ -5,7 +5,8 @@ const endpointPrefix = '/api/rest/v1'
5
5
  let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
- const version = '1.2.233'
8
+ let language = null
9
+ const version = '1.2.235'
9
10
  let userAgent = `Files.com JavaScript SDK v${version}`
10
11
 
11
12
  let logLevel = LogLevel.INFO
@@ -35,6 +36,10 @@ class Files {
35
36
 
36
37
  static getSessionId = () => sessionId
37
38
 
39
+ static getLanguage = () => language
40
+
41
+ static setLanguage = value => { language = value }
42
+
38
43
  static getEndpointPrefix = () => endpointPrefix
39
44
 
40
45
  static setLogLevel = value => { logLevel = value }
@@ -266,6 +266,13 @@ class RemoteServer {
266
266
  this.attributes.azure_blob_storage_hierarchical_namespace = value
267
267
  }
268
268
 
269
+ // string # Custom DNS suffix
270
+ getAzureBlobStorageDnsSuffix = () => this.attributes.azure_blob_storage_dns_suffix
271
+
272
+ setAzureBlobStorageDnsSuffix = value => {
273
+ this.attributes.azure_blob_storage_dns_suffix = value
274
+ }
275
+
269
276
  // string # Azure File Storage Account name
270
277
  getAzureFilesStorageAccount = () => this.attributes.azure_files_storage_account
271
278
 
@@ -681,6 +688,7 @@ class RemoteServer {
681
688
  // azure_blob_storage_container - string - Azure Blob Storage Container name
682
689
  // azure_blob_storage_hierarchical_namespace - boolean - Enable when storage account has hierarchical namespace feature enabled
683
690
  // azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
691
+ // azure_blob_storage_dns_suffix - string - Custom DNS suffix
684
692
  // azure_files_storage_account - string - Azure File Storage Account name
685
693
  // azure_files_storage_share_name - string - Azure File Storage Share name
686
694
  // azure_files_storage_dns_suffix - string - Custom DNS suffix
@@ -872,6 +880,10 @@ class RemoteServer {
872
880
  throw new errors.InvalidParameterError(`Bad parameter: azure_blob_storage_sas_token must be of type String, received ${getType(params.azure_blob_storage_sas_token)}`)
873
881
  }
874
882
 
883
+ if (params.azure_blob_storage_dns_suffix && !isString(params.azure_blob_storage_dns_suffix)) {
884
+ throw new errors.InvalidParameterError(`Bad parameter: azure_blob_storage_dns_suffix must be of type String, received ${getType(params.azure_blob_storage_dns_suffix)}`)
885
+ }
886
+
875
887
  if (params.azure_files_storage_account && !isString(params.azure_files_storage_account)) {
876
888
  throw new errors.InvalidParameterError(`Bad parameter: azure_files_storage_account must be of type String, received ${getType(params.azure_files_storage_account)}`)
877
889
  }
@@ -1130,6 +1142,7 @@ class RemoteServer {
1130
1142
  // azure_blob_storage_container - string - Azure Blob Storage Container name
1131
1143
  // azure_blob_storage_hierarchical_namespace - boolean - Enable when storage account has hierarchical namespace feature enabled
1132
1144
  // azure_blob_storage_sas_token - string - Shared Access Signature (SAS) token
1145
+ // azure_blob_storage_dns_suffix - string - Custom DNS suffix
1133
1146
  // azure_files_storage_account - string - Azure File Storage Account name
1134
1147
  // azure_files_storage_share_name - string - Azure File Storage Share name
1135
1148
  // azure_files_storage_dns_suffix - string - Custom DNS suffix
@@ -1308,6 +1321,10 @@ class RemoteServer {
1308
1321
  throw new errors.InvalidParameterError(`Bad parameter: azure_blob_storage_sas_token must be of type String, received ${getType(params.azure_blob_storage_sas_token)}`)
1309
1322
  }
1310
1323
 
1324
+ if (params.azure_blob_storage_dns_suffix && !isString(params.azure_blob_storage_dns_suffix)) {
1325
+ throw new errors.InvalidParameterError(`Bad parameter: azure_blob_storage_dns_suffix must be of type String, received ${getType(params.azure_blob_storage_dns_suffix)}`)
1326
+ }
1327
+
1311
1328
  if (params.azure_files_storage_account && !isString(params.azure_files_storage_account)) {
1312
1329
  throw new errors.InvalidParameterError(`Bad parameter: azure_files_storage_account must be of type String, received ${getType(params.azure_files_storage_account)}`)
1313
1330
  }
@@ -460,6 +460,9 @@ class Site {
460
460
  // int64 # Session expiry in minutes
461
461
  getSessionExpiryMinutes = () => this.attributes.session_expiry_minutes
462
462
 
463
+ // boolean # Allow snapshot share links creation
464
+ getSnapshotSharingEnabled = () => this.attributes.snapshot_sharing_enabled
465
+
463
466
  // boolean # Is SSL required? Disabling this is insecure.
464
467
  getSslRequired = () => this.attributes.ssl_required
465
468
 
@@ -637,6 +640,7 @@ class Site {
637
640
  // non_sso_groups_allowed - boolean - If true, groups can be manually created / modified / deleted by Site Admins. Otherwise, groups can only be managed via your SSO provider.
638
641
  // non_sso_users_allowed - boolean - If true, users can be manually created / modified / deleted by Site Admins. Otherwise, users can only be managed via your SSO provider.
639
642
  // sharing_enabled - boolean - Allow bundle creation
643
+ // snapshot_sharing_enabled - boolean - Allow snapshot share links creation
640
644
  // user_requests_enabled - boolean - Enable User Requests feature
641
645
  // user_requests_notify_admins - boolean - Send email to site admins when a user request is received?
642
646
  // dav_enabled - boolean - Is WebDAV enabled?
@@ -1,3 +1,39 @@
1
+ ///////////////////////////////////////////////////////////////////////////////
2
+ // To run this test suite, first set environment variables:
3
+ //
4
+ // required:
5
+ // FILES_API_KEY - set to your API key
6
+ // FILES_API_DOMAIN - set to your Files.com subdomain (e.g. mysite.files.com)
7
+ //
8
+ // required only if testSession() is run, otherwise can be omitted:
9
+ // FILES_SESSION_USERNAME - username to login with
10
+ // FILES_SESSION_PASSWORD - password to login with
11
+ //
12
+ // optional:
13
+ // USER_COUNT_TO_TRIGGER_PAGINATION - defaults to 1, set to a number that will
14
+ // require multiple page requests to fetch all users, but don't set it too low;
15
+ // if you have many users, then "1" will trigger a fetch for every single user
16
+ //
17
+ ///////////////////////////////////////////////////////////////////////////////
18
+ //
19
+ // Next, in the ../../../ directory, build the SDK:
20
+ //
21
+ // npm install
22
+ // npm run build
23
+ //
24
+ // Then, in the ../ directory, build the test suite:
25
+ //
26
+ // npm install
27
+ // npm run build
28
+ //
29
+ // Finally, execute the current file:
30
+ //
31
+ // npm run test
32
+ //
33
+ ///////////////////////////////////////////////////////////////////////////////
34
+ // Note: you can comment out at the bottom of this file any tests you don't want to run.
35
+ ///////////////////////////////////////////////////////////////////////////////
36
+
1
37
  import Files from 'files.com/lib/Files'
2
38
  import Logger, { LogLevel } from 'files.com/lib/Logger'
3
39
  import ApiKey from 'files.com/lib/models/ApiKey'
@@ -27,13 +63,15 @@ if (!apiDomain) {
27
63
  Files.setApiKey(apiKey)
28
64
  Files.setBaseUrl(`https://${apiDomain}`)
29
65
 
30
- // temp for testing against staging
31
66
  if (apiDomain.substr(-10) === 'staging.av') {
32
67
  process.env.NODE_TLS_REJECT_UNAUTHORIZED = 0
33
68
  }
34
69
 
35
70
  const DEBUG_MODE = false
36
71
 
72
+ // any user count that will require multiple page requests to fetch all users
73
+ const USER_COUNT_TO_TRIGGER_PAGINATION = process.env.USER_COUNT_TO_TRIGGER_PAGINATION || 1
74
+
37
75
  Files.setLogLevel(DEBUG_MODE ? LogLevel.DEBUG : LogLevel.INFO)
38
76
 
39
77
  Files.configureDebugging({
@@ -53,7 +91,7 @@ const testSuite = async () => {
53
91
  autoPaginate: false,
54
92
  })
55
93
 
56
- const firstPageItems = await Folder.listFor('/', { per_page: 1 })
94
+ const firstPageItems = await Folder.listFor('/', { per_page: USER_COUNT_TO_TRIGGER_PAGINATION })
57
95
 
58
96
  invariant(firstPageItems.length === 1, 'First page should have 1 item')
59
97
 
@@ -260,6 +298,41 @@ const testSuite = async () => {
260
298
  Logger.info('***** testUserListAndUpdate() succeeded! *****');
261
299
  }
262
300
 
301
+ const testLanguage = async () => {
302
+ Files.setLanguage('es');
303
+ invariant(Files.getLanguage() === 'es');
304
+
305
+ const savedLogLevel = Files.getLogLevel()
306
+ const savedDebugRequest = Files.shouldDebugRequest()
307
+ const savedDebugResponseHeaders = Files.shouldDebugResponseHeaders()
308
+ Files.setLogLevel(LogLevel.DEBUG)
309
+ Files.configureDebugging({
310
+ debugRequest: true,
311
+ debugResponseHeaders: true,
312
+ })
313
+
314
+ const logs = []
315
+ const savedConsoleLog = console.log
316
+ console.log = (...args) => {
317
+ logs.push(args.map(JSON.stringify).join(' '))
318
+ }
319
+
320
+ await ApiKey.list({ user_id: 0 })
321
+
322
+ console.log = savedConsoleLog
323
+
324
+ Files.setLogLevel(savedLogLevel)
325
+ Files.configureDebugging({
326
+ debugRequest: savedDebugRequest,
327
+ debugResponseHeaders: savedDebugResponseHeaders,
328
+ })
329
+
330
+ const allLogs = logs.join('\n')
331
+ invariant(allLogs.includes('"Accept-Language":"es"'), '"Accept-Language: es" header not found in debug output');
332
+
333
+ Logger.info('***** testLanguage() succeeded! *****');
334
+ }
335
+
263
336
  //
264
337
  // execute all tests
265
338
  //
@@ -273,6 +346,7 @@ const testSuite = async () => {
273
346
  await testSession()
274
347
  await testFailure()
275
348
  await testUserListAndUpdate()
349
+ await testLanguage()
276
350
  } catch (error) {
277
351
  console.log('*** TEST SUITE FAILED ***')
278
352
  console.error(error)