files.com 1.2.256 → 1.2.257

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.2.256
1
+ 1.2.257
@@ -30,7 +30,7 @@
30
30
  * `as2_station_id` (int64): ID of the AS2 Station associated with this partner.
31
31
  * `name` (string): The partner's formal AS2 name.
32
32
  * `uri` (string): Public URI where we will send the AS2 messages (via HTTP/HTTPS).
33
- * `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
33
+ * `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
34
34
  * `http_auth_username` (string): Username to send to server for HTTP Authentication.
35
35
  * `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
36
36
  * `default_mime_type` (string): Default mime type of the file attached to the encrypted message
@@ -99,7 +99,7 @@ await As2Partner.create({
99
99
  * `http_auth_username` (string): Username to send to server for HTTP Authentication.
100
100
  * `http_auth_password` (string): Password to send to server for HTTP Authentication.
101
101
  * `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
102
- * `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
102
+ * `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
103
103
  * `default_mime_type` (string): Default mime type of the file attached to the encrypted message
104
104
  * `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
105
105
  * `as2_station_id` (int64): Required - ID of the AS2 Station associated with this partner.
@@ -133,7 +133,7 @@ await as2_partner.update({
133
133
  * `http_auth_username` (string): Username to send to server for HTTP Authentication.
134
134
  * `http_auth_password` (string): Password to send to server for HTTP Authentication.
135
135
  * `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
136
- * `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
136
+ * `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
137
137
  * `default_mime_type` (string): Default mime type of the file attached to the encrypted message
138
138
  * `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
139
139
  * `name` (string): The partner's formal AS2 name.
package/lib/Files.js CHANGED
@@ -12,7 +12,7 @@ var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
14
  var language = null;
15
- var version = '1.2.256';
15
+ var version = '1.2.257';
16
16
  var userAgent = "Files.com JavaScript SDK v".concat(version);
17
17
  var logLevel = _Logger.LogLevel.INFO;
18
18
  var debugRequest = false;
@@ -60,7 +60,7 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
60
60
  (0, _defineProperty2.default)(this, "setUri", function (value) {
61
61
  _this.attributes.uri = value;
62
62
  });
63
- // string # Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
63
+ // string # Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
64
64
  (0, _defineProperty2.default)(this, "getServerCertificate", function () {
65
65
  return _this.attributes.server_certificate;
66
66
  });
@@ -170,7 +170,7 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
170
170
  // http_auth_username - string - Username to send to server for HTTP Authentication.
171
171
  // http_auth_password - string - Password to send to server for HTTP Authentication.
172
172
  // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
173
- // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
173
+ // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
174
174
  // default_mime_type - string - Default mime type of the file attached to the encrypted message
175
175
  // additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
176
176
  // name - string - The partner's formal AS2 name.
@@ -471,7 +471,7 @@ _As2Partner = As2Partner;
471
471
  // http_auth_username - string - Username to send to server for HTTP Authentication.
472
472
  // http_auth_password - string - Password to send to server for HTTP Authentication.
473
473
  // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
474
- // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
474
+ // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
475
475
  // default_mime_type - string - Default mime type of the file attached to the encrypted message
476
476
  // additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
477
477
  // as2_station_id (required) - int64 - ID of the AS2 Station associated with this partner.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.2.256",
3
+ "version": "1.2.257",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -6,7 +6,7 @@ let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
8
  let language = null
9
- const version = '1.2.256'
9
+ const version = '1.2.257'
10
10
  let userAgent = `Files.com JavaScript SDK v${version}`
11
11
 
12
12
  let logLevel = LogLevel.INFO
@@ -56,7 +56,7 @@ class As2Partner {
56
56
  this.attributes.uri = value
57
57
  }
58
58
 
59
- // string # Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
59
+ // string # Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
60
60
  getServerCertificate = () => this.attributes.server_certificate
61
61
 
62
62
  setServerCertificate = value => {
@@ -166,7 +166,7 @@ class As2Partner {
166
166
  // http_auth_username - string - Username to send to server for HTTP Authentication.
167
167
  // http_auth_password - string - Password to send to server for HTTP Authentication.
168
168
  // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
169
- // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
169
+ // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
170
170
  // default_mime_type - string - Default mime type of the file attached to the encrypted message
171
171
  // additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
172
172
  // name - string - The partner's formal AS2 name.
@@ -321,7 +321,7 @@ class As2Partner {
321
321
  // http_auth_username - string - Username to send to server for HTTP Authentication.
322
322
  // http_auth_password - string - Password to send to server for HTTP Authentication.
323
323
  // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
324
- // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
324
+ // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
325
325
  // default_mime_type - string - Default mime type of the file attached to the encrypted message
326
326
  // additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
327
327
  // as2_station_id (required) - int64 - ID of the AS2 Station associated with this partner.