files.com 1.2.27 → 1.2.28

Sign up to get free protection for your applications and to get access to all the features.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.2.27
1
+ 1.2.28
@@ -388,7 +388,7 @@
388
388
  * `sftp_enabled` (boolean): Is SFTP enabled?
389
389
  * `sftp_host_key_type` (string): Sftp Host Key Type
390
390
  * `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
391
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
391
+ * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
392
392
  * `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
393
393
  * `sharing_enabled` (boolean): Allow bundle creation
394
394
  * `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
@@ -627,7 +627,7 @@ await Site.update({
627
627
  * `session_expiry` (double): Session expiry in hours
628
628
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
629
629
  * `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
630
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
630
+ * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
631
631
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
632
632
  * `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
633
633
  * `user_lockout_tries` (int64): Number of login tries within `user_lockout_within` hours before users are locked out
package/lib/Files.js CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
11
11
  var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
- var version = '1.2.27';
14
+ var version = '1.2.28';
15
15
  var userAgent = "Files.com JavaScript SDK v".concat(version);
16
16
  var logLevel = _Logger.LogLevel.INFO;
17
17
  var debugRequest = false;
@@ -505,7 +505,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
505
505
  (0, _defineProperty2.default)(this, "getActiveSftpHostKeyId", function () {
506
506
  return _this.attributes.active_sftp_host_key_id;
507
507
  });
508
- // boolean # Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
508
+ // boolean # Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
509
509
  (0, _defineProperty2.default)(this, "getSftpInsecureCiphers", function () {
510
510
  return _this.attributes.sftp_insecure_ciphers;
511
511
  });
@@ -736,7 +736,7 @@ _Site = Site;
736
736
  // session_expiry - double - Session expiry in hours
737
737
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
738
738
  // tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
739
- // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
739
+ // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
740
740
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
741
741
  // user_lockout - boolean - Will users be locked out after incorrect login attempts?
742
742
  // user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.2.27",
3
+ "version": "1.2.28",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -5,7 +5,7 @@ const endpointPrefix = '/api/rest/v1'
5
5
  let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
- const version = '1.2.27'
8
+ const version = '1.2.28'
9
9
  let userAgent = `Files.com JavaScript SDK v${version}`
10
10
 
11
11
  let logLevel = LogLevel.INFO
@@ -382,7 +382,7 @@ class Site {
382
382
  // int64 # Id of the currently selected custom SFTP Host Key
383
383
  getActiveSftpHostKeyId = () => this.attributes.active_sftp_host_key_id
384
384
 
385
- // boolean # Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
385
+ // boolean # Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
386
386
  getSftpInsecureCiphers = () => this.attributes.sftp_insecure_ciphers
387
387
 
388
388
  // boolean # Use user FTP roots also for SFTP?
@@ -537,7 +537,7 @@ class Site {
537
537
  // session_expiry - double - Session expiry in hours
538
538
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
539
539
  // tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
540
- // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
540
+ // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
541
541
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
542
542
  // user_lockout - boolean - Will users be locked out after incorrect login attempts?
543
543
  // user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out