files.com 1.2.263 → 1.2.264

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.2.263
1
+ 1.2.264
@@ -15,6 +15,7 @@
15
15
  },
16
16
  "default_mime_type": "application/octet-stream",
17
17
  "mdn_validation_level": "none",
18
+ "signature_validation_level": "normal",
18
19
  "enable_dedicated_ips": true,
19
20
  "hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
20
21
  "public_certificate": "example",
@@ -35,7 +36,8 @@
35
36
  * `http_auth_username` (string): Username to send to server for HTTP Authentication.
36
37
  * `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
37
38
  * `default_mime_type` (string): Default mime type of the file attached to the encrypted message
38
- * `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
39
+ * `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
40
+ * `signature_validation_level` (string): Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
39
41
  * `enable_dedicated_ips` (boolean): If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
40
42
  * `hex_public_certificate_serial` (string): Serial of public certificate used for message security in hex format.
41
43
  * `public_certificate` (string): Public certificate used for message security.
@@ -83,6 +85,7 @@ await As2Partner.create({
83
85
  'enable_dedicated_ips': true,
84
86
  'http_auth_username': "username",
85
87
  'mdn_validation_level': "none",
88
+ 'signature_validation_level': "normal",
86
89
  'server_certificate': "require_match",
87
90
  'default_mime_type': "application/octet-stream",
88
91
  'additional_http_headers': {"key":"example value"},
@@ -99,7 +102,8 @@ await As2Partner.create({
99
102
  * `enable_dedicated_ips` (boolean): If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
100
103
  * `http_auth_username` (string): Username to send to server for HTTP Authentication.
101
104
  * `http_auth_password` (string): Password to send to server for HTTP Authentication.
102
- * `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
105
+ * `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
106
+ * `signature_validation_level` (string): Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
103
107
  * `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
104
108
  * `default_mime_type` (string): Default mime type of the file attached to the encrypted message
105
109
  * `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
@@ -119,6 +123,7 @@ await as2_partner.update({
119
123
  'enable_dedicated_ips': true,
120
124
  'http_auth_username': "username",
121
125
  'mdn_validation_level': "none",
126
+ 'signature_validation_level': "normal",
122
127
  'server_certificate': "require_match",
123
128
  'default_mime_type': "application/octet-stream",
124
129
  'additional_http_headers': {"key":"example value"},
@@ -134,7 +139,8 @@ await as2_partner.update({
134
139
  * `enable_dedicated_ips` (boolean): If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
135
140
  * `http_auth_username` (string): Username to send to server for HTTP Authentication.
136
141
  * `http_auth_password` (string): Password to send to server for HTTP Authentication.
137
- * `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
142
+ * `mdn_validation_level` (string): How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
143
+ * `signature_validation_level` (string): Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
138
144
  * `server_certificate` (string): Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
139
145
  * `default_mime_type` (string): Default mime type of the file attached to the encrypted message
140
146
  * `additional_http_headers` (object): Additional HTTP Headers for outgoing message sent to this partner.
@@ -157,6 +163,7 @@ await as2_partner.update({
157
163
  },
158
164
  "default_mime_type": "application/octet-stream",
159
165
  "mdn_validation_level": "none",
166
+ "signature_validation_level": "normal",
160
167
  "enable_dedicated_ips": true,
161
168
  "hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
162
169
  "public_certificate": "example",
package/lib/Files.js CHANGED
@@ -12,7 +12,7 @@ var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
14
  var language = null;
15
- var version = '1.2.263';
15
+ var version = '1.2.264';
16
16
  var userAgent = "Files.com JavaScript SDK v".concat(version);
17
17
  var logLevel = _Logger.LogLevel.INFO;
18
18
  var debugRequest = false;
@@ -88,13 +88,20 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
88
88
  (0, _defineProperty2.default)(this, "setDefaultMimeType", function (value) {
89
89
  _this.attributes.default_mime_type = value;
90
90
  });
91
- // string # How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
91
+ // string # How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
92
92
  (0, _defineProperty2.default)(this, "getMdnValidationLevel", function () {
93
93
  return _this.attributes.mdn_validation_level;
94
94
  });
95
95
  (0, _defineProperty2.default)(this, "setMdnValidationLevel", function (value) {
96
96
  _this.attributes.mdn_validation_level = value;
97
97
  });
98
+ // string # Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
99
+ (0, _defineProperty2.default)(this, "getSignatureValidationLevel", function () {
100
+ return _this.attributes.signature_validation_level;
101
+ });
102
+ (0, _defineProperty2.default)(this, "setSignatureValidationLevel", function (value) {
103
+ _this.attributes.signature_validation_level = value;
104
+ });
98
105
  // boolean # If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
99
106
  (0, _defineProperty2.default)(this, "getEnableDedicatedIps", function () {
100
107
  return _this.attributes.enable_dedicated_ips;
@@ -169,7 +176,8 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
169
176
  // enable_dedicated_ips - boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
170
177
  // http_auth_username - string - Username to send to server for HTTP Authentication.
171
178
  // http_auth_password - string - Password to send to server for HTTP Authentication.
172
- // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
179
+ // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
180
+ // signature_validation_level - string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
173
181
  // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
174
182
  // default_mime_type - string - Default mime type of the file attached to the encrypted message
175
183
  // additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
@@ -221,56 +229,62 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
221
229
  }
222
230
  throw new errors.InvalidParameterError("Bad parameter: mdn_validation_level must be of type String, received ".concat((0, _utils.getType)(params.mdn_validation_level)));
223
231
  case 6:
224
- if (!(params.server_certificate && !(0, _utils.isString)(params.server_certificate))) {
232
+ if (!(params.signature_validation_level && !(0, _utils.isString)(params.signature_validation_level))) {
225
233
  _context.next = 7;
226
234
  break;
227
235
  }
228
- throw new errors.InvalidParameterError("Bad parameter: server_certificate must be of type String, received ".concat((0, _utils.getType)(params.server_certificate)));
236
+ throw new errors.InvalidParameterError("Bad parameter: signature_validation_level must be of type String, received ".concat((0, _utils.getType)(params.signature_validation_level)));
229
237
  case 7:
230
- if (!(params.default_mime_type && !(0, _utils.isString)(params.default_mime_type))) {
238
+ if (!(params.server_certificate && !(0, _utils.isString)(params.server_certificate))) {
231
239
  _context.next = 8;
232
240
  break;
233
241
  }
234
- throw new errors.InvalidParameterError("Bad parameter: default_mime_type must be of type String, received ".concat((0, _utils.getType)(params.default_mime_type)));
242
+ throw new errors.InvalidParameterError("Bad parameter: server_certificate must be of type String, received ".concat((0, _utils.getType)(params.server_certificate)));
235
243
  case 8:
236
- if (!(params.name && !(0, _utils.isString)(params.name))) {
244
+ if (!(params.default_mime_type && !(0, _utils.isString)(params.default_mime_type))) {
237
245
  _context.next = 9;
238
246
  break;
239
247
  }
240
- throw new errors.InvalidParameterError("Bad parameter: name must be of type String, received ".concat((0, _utils.getType)(params.name)));
248
+ throw new errors.InvalidParameterError("Bad parameter: default_mime_type must be of type String, received ".concat((0, _utils.getType)(params.default_mime_type)));
241
249
  case 9:
242
- if (!(params.uri && !(0, _utils.isString)(params.uri))) {
250
+ if (!(params.name && !(0, _utils.isString)(params.name))) {
243
251
  _context.next = 10;
244
252
  break;
245
253
  }
246
- throw new errors.InvalidParameterError("Bad parameter: uri must be of type String, received ".concat((0, _utils.getType)(params.uri)));
254
+ throw new errors.InvalidParameterError("Bad parameter: name must be of type String, received ".concat((0, _utils.getType)(params.name)));
247
255
  case 10:
248
- if (!(params.public_certificate && !(0, _utils.isString)(params.public_certificate))) {
256
+ if (!(params.uri && !(0, _utils.isString)(params.uri))) {
249
257
  _context.next = 11;
250
258
  break;
251
259
  }
252
- throw new errors.InvalidParameterError("Bad parameter: public_certificate must be of type String, received ".concat((0, _utils.getType)(params.public_certificate)));
260
+ throw new errors.InvalidParameterError("Bad parameter: uri must be of type String, received ".concat((0, _utils.getType)(params.uri)));
253
261
  case 11:
262
+ if (!(params.public_certificate && !(0, _utils.isString)(params.public_certificate))) {
263
+ _context.next = 12;
264
+ break;
265
+ }
266
+ throw new errors.InvalidParameterError("Bad parameter: public_certificate must be of type String, received ".concat((0, _utils.getType)(params.public_certificate)));
267
+ case 12:
254
268
  if (params.id) {
255
- _context.next = 13;
269
+ _context.next = 14;
256
270
  break;
257
271
  }
258
272
  if (!_this.attributes.id) {
259
- _context.next = 12;
273
+ _context.next = 13;
260
274
  break;
261
275
  }
262
276
  params.id = _this.id;
263
- _context.next = 13;
277
+ _context.next = 14;
264
278
  break;
265
- case 12:
266
- throw new errors.MissingParameterError('Parameter missing: id');
267
279
  case 13:
268
- _context.next = 14;
269
- return _Api.default.sendRequest("/as2_partners/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
280
+ throw new errors.MissingParameterError('Parameter missing: id');
270
281
  case 14:
282
+ _context.next = 15;
283
+ return _Api.default.sendRequest("/as2_partners/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
284
+ case 15:
271
285
  response = _context.sent;
272
286
  return _context.abrupt("return", new As2Partner(response === null || response === void 0 ? void 0 : response.data, _this.options));
273
- case 15:
287
+ case 16:
274
288
  case "end":
275
289
  return _context.stop();
276
290
  }
@@ -470,7 +484,8 @@ _As2Partner = As2Partner;
470
484
  // enable_dedicated_ips - boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
471
485
  // http_auth_username - string - Username to send to server for HTTP Authentication.
472
486
  // http_auth_password - string - Password to send to server for HTTP Authentication.
473
- // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
487
+ // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
488
+ // signature_validation_level - string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
474
489
  // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
475
490
  // default_mime_type - string - Default mime type of the file attached to the encrypted message
476
491
  // additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
@@ -530,48 +545,54 @@ _As2Partner = As2Partner;
530
545
  }
531
546
  throw new errors.InvalidParameterError("Bad parameter: mdn_validation_level must be of type String, received ".concat((0, _utils.getType)(params.mdn_validation_level)));
532
547
  case 7:
533
- if (!(params.server_certificate && !(0, _utils.isString)(params.server_certificate))) {
548
+ if (!(params.signature_validation_level && !(0, _utils.isString)(params.signature_validation_level))) {
534
549
  _context6.next = 8;
535
550
  break;
536
551
  }
537
- throw new errors.InvalidParameterError("Bad parameter: server_certificate must be of type String, received ".concat((0, _utils.getType)(params.server_certificate)));
552
+ throw new errors.InvalidParameterError("Bad parameter: signature_validation_level must be of type String, received ".concat((0, _utils.getType)(params.signature_validation_level)));
538
553
  case 8:
539
- if (!(params.default_mime_type && !(0, _utils.isString)(params.default_mime_type))) {
554
+ if (!(params.server_certificate && !(0, _utils.isString)(params.server_certificate))) {
540
555
  _context6.next = 9;
541
556
  break;
542
557
  }
543
- throw new errors.InvalidParameterError("Bad parameter: default_mime_type must be of type String, received ".concat((0, _utils.getType)(params.default_mime_type)));
558
+ throw new errors.InvalidParameterError("Bad parameter: server_certificate must be of type String, received ".concat((0, _utils.getType)(params.server_certificate)));
544
559
  case 9:
545
- if (!(params.as2_station_id && !(0, _utils.isInt)(params.as2_station_id))) {
560
+ if (!(params.default_mime_type && !(0, _utils.isString)(params.default_mime_type))) {
546
561
  _context6.next = 10;
547
562
  break;
548
563
  }
549
- throw new errors.InvalidParameterError("Bad parameter: as2_station_id must be of type Int, received ".concat((0, _utils.getType)(params.as2_station_id)));
564
+ throw new errors.InvalidParameterError("Bad parameter: default_mime_type must be of type String, received ".concat((0, _utils.getType)(params.default_mime_type)));
550
565
  case 10:
551
- if (!(params.name && !(0, _utils.isString)(params.name))) {
566
+ if (!(params.as2_station_id && !(0, _utils.isInt)(params.as2_station_id))) {
552
567
  _context6.next = 11;
553
568
  break;
554
569
  }
555
- throw new errors.InvalidParameterError("Bad parameter: name must be of type String, received ".concat((0, _utils.getType)(params.name)));
570
+ throw new errors.InvalidParameterError("Bad parameter: as2_station_id must be of type Int, received ".concat((0, _utils.getType)(params.as2_station_id)));
556
571
  case 11:
557
- if (!(params.uri && !(0, _utils.isString)(params.uri))) {
572
+ if (!(params.name && !(0, _utils.isString)(params.name))) {
558
573
  _context6.next = 12;
559
574
  break;
560
575
  }
561
- throw new errors.InvalidParameterError("Bad parameter: uri must be of type String, received ".concat((0, _utils.getType)(params.uri)));
576
+ throw new errors.InvalidParameterError("Bad parameter: name must be of type String, received ".concat((0, _utils.getType)(params.name)));
562
577
  case 12:
563
- if (!(params.public_certificate && !(0, _utils.isString)(params.public_certificate))) {
578
+ if (!(params.uri && !(0, _utils.isString)(params.uri))) {
564
579
  _context6.next = 13;
565
580
  break;
566
581
  }
567
- throw new errors.InvalidParameterError("Bad parameter: public_certificate must be of type String, received ".concat((0, _utils.getType)(params.public_certificate)));
582
+ throw new errors.InvalidParameterError("Bad parameter: uri must be of type String, received ".concat((0, _utils.getType)(params.uri)));
568
583
  case 13:
569
- _context6.next = 14;
570
- return _Api.default.sendRequest('/as2_partners', 'POST', params, options);
584
+ if (!(params.public_certificate && !(0, _utils.isString)(params.public_certificate))) {
585
+ _context6.next = 14;
586
+ break;
587
+ }
588
+ throw new errors.InvalidParameterError("Bad parameter: public_certificate must be of type String, received ".concat((0, _utils.getType)(params.public_certificate)));
571
589
  case 14:
590
+ _context6.next = 15;
591
+ return _Api.default.sendRequest('/as2_partners', 'POST', params, options);
592
+ case 15:
572
593
  response = _context6.sent;
573
594
  return _context6.abrupt("return", new _As2Partner(response === null || response === void 0 ? void 0 : response.data, options));
574
- case 15:
595
+ case 16:
575
596
  case "end":
576
597
  return _context6.stop();
577
598
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.2.263",
3
+ "version": "1.2.264",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -6,7 +6,7 @@ let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
8
  let language = null
9
- const version = '1.2.263'
9
+ const version = '1.2.264'
10
10
  let userAgent = `Files.com JavaScript SDK v${version}`
11
11
 
12
12
  let logLevel = LogLevel.INFO
@@ -84,13 +84,20 @@ class As2Partner {
84
84
  this.attributes.default_mime_type = value
85
85
  }
86
86
 
87
- // string # How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
87
+ // string # How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
88
88
  getMdnValidationLevel = () => this.attributes.mdn_validation_level
89
89
 
90
90
  setMdnValidationLevel = value => {
91
91
  this.attributes.mdn_validation_level = value
92
92
  }
93
93
 
94
+ // string # Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
95
+ getSignatureValidationLevel = () => this.attributes.signature_validation_level
96
+
97
+ setSignatureValidationLevel = value => {
98
+ this.attributes.signature_validation_level = value
99
+ }
100
+
94
101
  // boolean # If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
95
102
  getEnableDedicatedIps = () => this.attributes.enable_dedicated_ips
96
103
 
@@ -165,7 +172,8 @@ class As2Partner {
165
172
  // enable_dedicated_ips - boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
166
173
  // http_auth_username - string - Username to send to server for HTTP Authentication.
167
174
  // http_auth_password - string - Password to send to server for HTTP Authentication.
168
- // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
175
+ // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
176
+ // signature_validation_level - string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
169
177
  // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
170
178
  // default_mime_type - string - Default mime type of the file attached to the encrypted message
171
179
  // additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
@@ -198,6 +206,10 @@ class As2Partner {
198
206
  throw new errors.InvalidParameterError(`Bad parameter: mdn_validation_level must be of type String, received ${getType(params.mdn_validation_level)}`)
199
207
  }
200
208
 
209
+ if (params.signature_validation_level && !isString(params.signature_validation_level)) {
210
+ throw new errors.InvalidParameterError(`Bad parameter: signature_validation_level must be of type String, received ${getType(params.signature_validation_level)}`)
211
+ }
212
+
201
213
  if (params.server_certificate && !isString(params.server_certificate)) {
202
214
  throw new errors.InvalidParameterError(`Bad parameter: server_certificate must be of type String, received ${getType(params.server_certificate)}`)
203
215
  }
@@ -320,7 +332,8 @@ class As2Partner {
320
332
  // enable_dedicated_ips - boolean - If `true`, we will use your site's dedicated IPs for all outbound connections to this AS2 Partner.
321
333
  // http_auth_username - string - Username to send to server for HTTP Authentication.
322
334
  // http_auth_password - string - Password to send to server for HTTP Authentication.
323
- // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
335
+ // mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates. `auto`: Automatically set the correct value for this setting based on next mdn received.
336
+ // signature_validation_level - string - Should Files.com require signatures on incoming AS2 messages? `normal`: require that incoming messages are signed with a valid matching signature. `none`: Unsigned incoming messages are allowed. `auto`: Automatically set the correct value for this setting based on next message received.
324
337
  // server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
325
338
  // default_mime_type - string - Default mime type of the file attached to the encrypted message
326
339
  // additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
@@ -357,6 +370,10 @@ class As2Partner {
357
370
  throw new errors.InvalidParameterError(`Bad parameter: mdn_validation_level must be of type String, received ${getType(params.mdn_validation_level)}`)
358
371
  }
359
372
 
373
+ if (params.signature_validation_level && !isString(params.signature_validation_level)) {
374
+ throw new errors.InvalidParameterError(`Bad parameter: signature_validation_level must be of type String, received ${getType(params.signature_validation_level)}`)
375
+ }
376
+
360
377
  if (params.server_certificate && !isString(params.server_certificate)) {
361
378
  throw new errors.InvalidParameterError(`Bad parameter: server_certificate must be of type String, received ${getType(params.server_certificate)}`)
362
379
  }