files.com 1.2.27 → 1.2.29

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.2.27
1
+ 1.2.29
@@ -9,6 +9,7 @@
9
9
  "name": "AS2 Partner Name",
10
10
  "uri": "example",
11
11
  "server_certificate": "require_match",
12
+ "mdn_validation_level": "none",
12
13
  "enable_dedicated_ips": true,
13
14
  "hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
14
15
  "public_certificate_md5": "example",
@@ -25,6 +26,7 @@
25
26
  * `name` (string): The partner's formal AS2 name.
26
27
  * `uri` (string): Public URI for sending AS2 message to.
27
28
  * `server_certificate` (string): Remote server certificate security setting
29
+ * `mdn_validation_level` (string): MDN Validation Level
28
30
  * `enable_dedicated_ips` (boolean): `true` if remote server only accepts connections from dedicated IPs
29
31
  * `hex_public_certificate_serial` (string): Serial of public certificate used for message security in hex format.
30
32
  * `public_certificate_md5` (string): MD5 hash of public certificate used for message security.
@@ -75,6 +77,7 @@ await As2Partner.create({
75
77
  'public_certificate': "public_certificate",
76
78
  'as2_station_id': 1,
77
79
  'server_certificate': "require_match",
80
+ 'mdn_validation_level': "none",
78
81
  'enable_dedicated_ips': true,
79
82
  })
80
83
  ```
@@ -87,6 +90,7 @@ await As2Partner.create({
87
90
  * `public_certificate` (string): Required -
88
91
  * `as2_station_id` (int64): Required - Id of As2Station for this partner
89
92
  * `server_certificate` (string): Remote server certificate security setting
93
+ * `mdn_validation_level` (string): MDN Validation Level
90
94
  * `enable_dedicated_ips` (boolean):
91
95
 
92
96
  ---
@@ -100,6 +104,7 @@ await as2_partner.update({
100
104
  'name': "AS2 Partner Name",
101
105
  'uri': "example",
102
106
  'server_certificate': "require_match",
107
+ 'mdn_validation_level': "none",
103
108
  'enable_dedicated_ips': true,
104
109
  })
105
110
  ```
@@ -110,6 +115,7 @@ await as2_partner.update({
110
115
  * `name` (string): AS2 Name
111
116
  * `uri` (string): URL base for AS2 responses
112
117
  * `server_certificate` (string): Remote server certificate security setting
118
+ * `mdn_validation_level` (string): MDN Validation Level
113
119
  * `public_certificate` (string):
114
120
  * `enable_dedicated_ips` (boolean):
115
121
 
@@ -122,6 +128,7 @@ await as2_partner.update({
122
128
  "name": "AS2 Partner Name",
123
129
  "uri": "example",
124
130
  "server_certificate": "require_match",
131
+ "mdn_validation_level": "none",
125
132
  "enable_dedicated_ips": true,
126
133
  "hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
127
134
  "public_certificate_md5": "example",
@@ -388,7 +388,7 @@
388
388
  * `sftp_enabled` (boolean): Is SFTP enabled?
389
389
  * `sftp_host_key_type` (string): Sftp Host Key Type
390
390
  * `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
391
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
391
+ * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
392
392
  * `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
393
393
  * `sharing_enabled` (boolean): Allow bundle creation
394
394
  * `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
@@ -627,7 +627,7 @@ await Site.update({
627
627
  * `session_expiry` (double): Session expiry in hours
628
628
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
629
629
  * `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
630
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
630
+ * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
631
631
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
632
632
  * `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
633
633
  * `user_lockout_tries` (int64): Number of login tries within `user_lockout_within` hours before users are locked out
package/lib/Files.js CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
11
11
  var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
- var version = '1.2.27';
14
+ var version = '1.2.29';
15
15
  var userAgent = "Files.com JavaScript SDK v".concat(version);
16
16
  var logLevel = _Logger.LogLevel.INFO;
17
17
  var debugRequest = false;
@@ -68,6 +68,13 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
68
68
  (0, _defineProperty2.default)(this, "setServerCertificate", function (value) {
69
69
  _this.attributes.server_certificate = value;
70
70
  });
71
+ // string # MDN Validation Level
72
+ (0, _defineProperty2.default)(this, "getMdnValidationLevel", function () {
73
+ return _this.attributes.mdn_validation_level;
74
+ });
75
+ (0, _defineProperty2.default)(this, "setMdnValidationLevel", function (value) {
76
+ _this.attributes.mdn_validation_level = value;
77
+ });
71
78
  // boolean # `true` if remote server only accepts connections from dedicated IPs
72
79
  (0, _defineProperty2.default)(this, "getEnableDedicatedIps", function () {
73
80
  return _this.attributes.enable_dedicated_ips;
@@ -135,6 +142,7 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
135
142
  // name - string - AS2 Name
136
143
  // uri - string - URL base for AS2 responses
137
144
  // server_certificate - string - Remote server certificate security setting
145
+ // mdn_validation_level - string - MDN Validation Level
138
146
  // public_certificate - string
139
147
  // enable_dedicated_ips - boolean
140
148
  (0, _defineProperty2.default)(this, "update", /*#__PURE__*/(0, _asyncToGenerator2.default)( /*#__PURE__*/_regenerator.default.mark(function _callee() {
@@ -182,32 +190,38 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
182
190
  }
183
191
  throw new errors.InvalidParameterError("Bad parameter: server_certificate must be of type String, received ".concat((0, _utils.getType)(params.server_certificate)));
184
192
  case 14:
185
- if (!(params.public_certificate && !(0, _utils.isString)(params.public_certificate))) {
193
+ if (!(params.mdn_validation_level && !(0, _utils.isString)(params.mdn_validation_level))) {
186
194
  _context.next = 16;
187
195
  break;
188
196
  }
189
- throw new errors.InvalidParameterError("Bad parameter: public_certificate must be of type String, received ".concat((0, _utils.getType)(params.public_certificate)));
197
+ throw new errors.InvalidParameterError("Bad parameter: mdn_validation_level must be of type String, received ".concat((0, _utils.getType)(params.mdn_validation_level)));
190
198
  case 16:
199
+ if (!(params.public_certificate && !(0, _utils.isString)(params.public_certificate))) {
200
+ _context.next = 18;
201
+ break;
202
+ }
203
+ throw new errors.InvalidParameterError("Bad parameter: public_certificate must be of type String, received ".concat((0, _utils.getType)(params.public_certificate)));
204
+ case 18:
191
205
  if (params.id) {
192
- _context.next = 22;
206
+ _context.next = 24;
193
207
  break;
194
208
  }
195
209
  if (!_this.attributes.id) {
196
- _context.next = 21;
210
+ _context.next = 23;
197
211
  break;
198
212
  }
199
213
  params.id = _this.id;
200
- _context.next = 22;
214
+ _context.next = 24;
201
215
  break;
202
- case 21:
216
+ case 23:
203
217
  throw new errors.MissingParameterError('Parameter missing: id');
204
- case 22:
205
- _context.next = 24;
206
- return _Api.default.sendRequest("/as2_partners/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
207
218
  case 24:
219
+ _context.next = 26;
220
+ return _Api.default.sendRequest("/as2_partners/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
221
+ case 26:
208
222
  response = _context.sent;
209
223
  return _context.abrupt("return", new As2Partner(response === null || response === void 0 ? void 0 : response.data, _this.options));
210
- case 26:
224
+ case 28:
211
225
  case "end":
212
226
  return _context.stop();
213
227
  }
@@ -409,6 +423,7 @@ _As2Partner = As2Partner;
409
423
  // public_certificate (required) - string
410
424
  // as2_station_id (required) - int64 - Id of As2Station for this partner
411
425
  // server_certificate - string - Remote server certificate security setting
426
+ // mdn_validation_level - string - MDN Validation Level
412
427
  // enable_dedicated_ips - boolean
413
428
  (0, _defineProperty2.default)(As2Partner, "create", /*#__PURE__*/(0, _asyncToGenerator2.default)( /*#__PURE__*/_regenerator.default.mark(function _callee6() {
414
429
  var params,
@@ -474,12 +489,18 @@ _As2Partner = As2Partner;
474
489
  }
475
490
  throw new errors.InvalidParameterError("Bad parameter: server_certificate must be of type String, received ".concat((0, _utils.getType)(params.server_certificate)));
476
491
  case 20:
477
- _context6.next = 22;
478
- return _Api.default.sendRequest('/as2_partners', 'POST', params, options);
492
+ if (!(params.mdn_validation_level && !(0, _utils.isString)(params.mdn_validation_level))) {
493
+ _context6.next = 22;
494
+ break;
495
+ }
496
+ throw new errors.InvalidParameterError("Bad parameter: mdn_validation_level must be of type String, received ".concat((0, _utils.getType)(params.mdn_validation_level)));
479
497
  case 22:
498
+ _context6.next = 24;
499
+ return _Api.default.sendRequest('/as2_partners', 'POST', params, options);
500
+ case 24:
480
501
  response = _context6.sent;
481
502
  return _context6.abrupt("return", new _As2Partner(response === null || response === void 0 ? void 0 : response.data, options));
482
- case 24:
503
+ case 26:
483
504
  case "end":
484
505
  return _context6.stop();
485
506
  }
@@ -505,7 +505,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
505
505
  (0, _defineProperty2.default)(this, "getActiveSftpHostKeyId", function () {
506
506
  return _this.attributes.active_sftp_host_key_id;
507
507
  });
508
- // boolean # Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
508
+ // boolean # Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
509
509
  (0, _defineProperty2.default)(this, "getSftpInsecureCiphers", function () {
510
510
  return _this.attributes.sftp_insecure_ciphers;
511
511
  });
@@ -736,7 +736,7 @@ _Site = Site;
736
736
  // session_expiry - double - Session expiry in hours
737
737
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
738
738
  // tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
739
- // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
739
+ // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
740
740
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
741
741
  // user_lockout - boolean - Will users be locked out after incorrect login attempts?
742
742
  // user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.2.27",
3
+ "version": "1.2.29",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -5,7 +5,7 @@ const endpointPrefix = '/api/rest/v1'
5
5
  let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
- const version = '1.2.27'
8
+ const version = '1.2.29'
9
9
  let userAgent = `Files.com JavaScript SDK v${version}`
10
10
 
11
11
  let logLevel = LogLevel.INFO
@@ -63,6 +63,13 @@ class As2Partner {
63
63
  this.attributes.server_certificate = value
64
64
  }
65
65
 
66
+ // string # MDN Validation Level
67
+ getMdnValidationLevel = () => this.attributes.mdn_validation_level
68
+
69
+ setMdnValidationLevel = value => {
70
+ this.attributes.mdn_validation_level = value
71
+ }
72
+
66
73
  // boolean # `true` if remote server only accepts connections from dedicated IPs
67
74
  getEnableDedicatedIps = () => this.attributes.enable_dedicated_ips
68
75
 
@@ -130,6 +137,7 @@ class As2Partner {
130
137
  // name - string - AS2 Name
131
138
  // uri - string - URL base for AS2 responses
132
139
  // server_certificate - string - Remote server certificate security setting
140
+ // mdn_validation_level - string - MDN Validation Level
133
141
  // public_certificate - string
134
142
  // enable_dedicated_ips - boolean
135
143
  update = async (params = {}) => {
@@ -158,6 +166,10 @@ class As2Partner {
158
166
  throw new errors.InvalidParameterError(`Bad parameter: server_certificate must be of type String, received ${getType(params.server_certificate)}`)
159
167
  }
160
168
 
169
+ if (params.mdn_validation_level && !isString(params.mdn_validation_level)) {
170
+ throw new errors.InvalidParameterError(`Bad parameter: mdn_validation_level must be of type String, received ${getType(params.mdn_validation_level)}`)
171
+ }
172
+
161
173
  if (params.public_certificate && !isString(params.public_certificate)) {
162
174
  throw new errors.InvalidParameterError(`Bad parameter: public_certificate must be of type String, received ${getType(params.public_certificate)}`)
163
175
  }
@@ -266,6 +278,7 @@ class As2Partner {
266
278
  // public_certificate (required) - string
267
279
  // as2_station_id (required) - int64 - Id of As2Station for this partner
268
280
  // server_certificate - string - Remote server certificate security setting
281
+ // mdn_validation_level - string - MDN Validation Level
269
282
  // enable_dedicated_ips - boolean
270
283
  static create = async (params = {}, options = {}) => {
271
284
  if (!params.name) {
@@ -304,6 +317,10 @@ class As2Partner {
304
317
  throw new errors.InvalidParameterError(`Bad parameter: server_certificate must be of type String, received ${getType(params.server_certificate)}`)
305
318
  }
306
319
 
320
+ if (params.mdn_validation_level && !isString(params.mdn_validation_level)) {
321
+ throw new errors.InvalidParameterError(`Bad parameter: mdn_validation_level must be of type String, received ${getType(params.mdn_validation_level)}`)
322
+ }
323
+
307
324
  const response = await Api.sendRequest('/as2_partners', 'POST', params, options)
308
325
 
309
326
  return new As2Partner(response?.data, options)
@@ -382,7 +382,7 @@ class Site {
382
382
  // int64 # Id of the currently selected custom SFTP Host Key
383
383
  getActiveSftpHostKeyId = () => this.attributes.active_sftp_host_key_id
384
384
 
385
- // boolean # Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
385
+ // boolean # Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
386
386
  getSftpInsecureCiphers = () => this.attributes.sftp_insecure_ciphers
387
387
 
388
388
  // boolean # Use user FTP roots also for SFTP?
@@ -537,7 +537,7 @@ class Site {
537
537
  // session_expiry - double - Session expiry in hours
538
538
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
539
539
  // tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
540
- // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
540
+ // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
541
541
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
542
542
  // user_lockout - boolean - Will users be locked out after incorrect login attempts?
543
543
  // user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out