files.com 1.2.27 → 1.2.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/_VERSION +1 -1
- package/docs/models/As2Partner.md +7 -0
- package/docs/models/Site.md +2 -2
- package/lib/Files.js +1 -1
- package/lib/models/As2Partner.js +34 -13
- package/lib/models/Site.js +2 -2
- package/package.json +1 -1
- package/src/Files.js +1 -1
- package/src/models/As2Partner.js +17 -0
- package/src/models/Site.js +2 -2
package/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.2.
|
1
|
+
1.2.29
|
@@ -9,6 +9,7 @@
|
|
9
9
|
"name": "AS2 Partner Name",
|
10
10
|
"uri": "example",
|
11
11
|
"server_certificate": "require_match",
|
12
|
+
"mdn_validation_level": "none",
|
12
13
|
"enable_dedicated_ips": true,
|
13
14
|
"hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
|
14
15
|
"public_certificate_md5": "example",
|
@@ -25,6 +26,7 @@
|
|
25
26
|
* `name` (string): The partner's formal AS2 name.
|
26
27
|
* `uri` (string): Public URI for sending AS2 message to.
|
27
28
|
* `server_certificate` (string): Remote server certificate security setting
|
29
|
+
* `mdn_validation_level` (string): MDN Validation Level
|
28
30
|
* `enable_dedicated_ips` (boolean): `true` if remote server only accepts connections from dedicated IPs
|
29
31
|
* `hex_public_certificate_serial` (string): Serial of public certificate used for message security in hex format.
|
30
32
|
* `public_certificate_md5` (string): MD5 hash of public certificate used for message security.
|
@@ -75,6 +77,7 @@ await As2Partner.create({
|
|
75
77
|
'public_certificate': "public_certificate",
|
76
78
|
'as2_station_id': 1,
|
77
79
|
'server_certificate': "require_match",
|
80
|
+
'mdn_validation_level': "none",
|
78
81
|
'enable_dedicated_ips': true,
|
79
82
|
})
|
80
83
|
```
|
@@ -87,6 +90,7 @@ await As2Partner.create({
|
|
87
90
|
* `public_certificate` (string): Required -
|
88
91
|
* `as2_station_id` (int64): Required - Id of As2Station for this partner
|
89
92
|
* `server_certificate` (string): Remote server certificate security setting
|
93
|
+
* `mdn_validation_level` (string): MDN Validation Level
|
90
94
|
* `enable_dedicated_ips` (boolean):
|
91
95
|
|
92
96
|
---
|
@@ -100,6 +104,7 @@ await as2_partner.update({
|
|
100
104
|
'name': "AS2 Partner Name",
|
101
105
|
'uri': "example",
|
102
106
|
'server_certificate': "require_match",
|
107
|
+
'mdn_validation_level': "none",
|
103
108
|
'enable_dedicated_ips': true,
|
104
109
|
})
|
105
110
|
```
|
@@ -110,6 +115,7 @@ await as2_partner.update({
|
|
110
115
|
* `name` (string): AS2 Name
|
111
116
|
* `uri` (string): URL base for AS2 responses
|
112
117
|
* `server_certificate` (string): Remote server certificate security setting
|
118
|
+
* `mdn_validation_level` (string): MDN Validation Level
|
113
119
|
* `public_certificate` (string):
|
114
120
|
* `enable_dedicated_ips` (boolean):
|
115
121
|
|
@@ -122,6 +128,7 @@ await as2_partner.update({
|
|
122
128
|
"name": "AS2 Partner Name",
|
123
129
|
"uri": "example",
|
124
130
|
"server_certificate": "require_match",
|
131
|
+
"mdn_validation_level": "none",
|
125
132
|
"enable_dedicated_ips": true,
|
126
133
|
"hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
|
127
134
|
"public_certificate_md5": "example",
|
package/docs/models/Site.md
CHANGED
@@ -388,7 +388,7 @@
|
|
388
388
|
* `sftp_enabled` (boolean): Is SFTP enabled?
|
389
389
|
* `sftp_host_key_type` (string): Sftp Host Key Type
|
390
390
|
* `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
|
391
|
-
* `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note:
|
391
|
+
* `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
392
392
|
* `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
|
393
393
|
* `sharing_enabled` (boolean): Allow bundle creation
|
394
394
|
* `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
|
@@ -627,7 +627,7 @@ await Site.update({
|
|
627
627
|
* `session_expiry` (double): Session expiry in hours
|
628
628
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
629
629
|
* `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
|
630
|
-
* `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note:
|
630
|
+
* `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
631
631
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
632
632
|
* `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
|
633
633
|
* `user_lockout_tries` (int64): Number of login tries within `user_lockout_within` hours before users are locked out
|
package/lib/Files.js
CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
|
|
11
11
|
var apiKey;
|
12
12
|
var baseUrl = 'https://app.files.com';
|
13
13
|
var sessionId = null;
|
14
|
-
var version = '1.2.
|
14
|
+
var version = '1.2.29';
|
15
15
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
16
16
|
var logLevel = _Logger.LogLevel.INFO;
|
17
17
|
var debugRequest = false;
|
package/lib/models/As2Partner.js
CHANGED
@@ -68,6 +68,13 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
|
|
68
68
|
(0, _defineProperty2.default)(this, "setServerCertificate", function (value) {
|
69
69
|
_this.attributes.server_certificate = value;
|
70
70
|
});
|
71
|
+
// string # MDN Validation Level
|
72
|
+
(0, _defineProperty2.default)(this, "getMdnValidationLevel", function () {
|
73
|
+
return _this.attributes.mdn_validation_level;
|
74
|
+
});
|
75
|
+
(0, _defineProperty2.default)(this, "setMdnValidationLevel", function (value) {
|
76
|
+
_this.attributes.mdn_validation_level = value;
|
77
|
+
});
|
71
78
|
// boolean # `true` if remote server only accepts connections from dedicated IPs
|
72
79
|
(0, _defineProperty2.default)(this, "getEnableDedicatedIps", function () {
|
73
80
|
return _this.attributes.enable_dedicated_ips;
|
@@ -135,6 +142,7 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
|
|
135
142
|
// name - string - AS2 Name
|
136
143
|
// uri - string - URL base for AS2 responses
|
137
144
|
// server_certificate - string - Remote server certificate security setting
|
145
|
+
// mdn_validation_level - string - MDN Validation Level
|
138
146
|
// public_certificate - string
|
139
147
|
// enable_dedicated_ips - boolean
|
140
148
|
(0, _defineProperty2.default)(this, "update", /*#__PURE__*/(0, _asyncToGenerator2.default)( /*#__PURE__*/_regenerator.default.mark(function _callee() {
|
@@ -182,32 +190,38 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
|
|
182
190
|
}
|
183
191
|
throw new errors.InvalidParameterError("Bad parameter: server_certificate must be of type String, received ".concat((0, _utils.getType)(params.server_certificate)));
|
184
192
|
case 14:
|
185
|
-
if (!(params.
|
193
|
+
if (!(params.mdn_validation_level && !(0, _utils.isString)(params.mdn_validation_level))) {
|
186
194
|
_context.next = 16;
|
187
195
|
break;
|
188
196
|
}
|
189
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
197
|
+
throw new errors.InvalidParameterError("Bad parameter: mdn_validation_level must be of type String, received ".concat((0, _utils.getType)(params.mdn_validation_level)));
|
190
198
|
case 16:
|
199
|
+
if (!(params.public_certificate && !(0, _utils.isString)(params.public_certificate))) {
|
200
|
+
_context.next = 18;
|
201
|
+
break;
|
202
|
+
}
|
203
|
+
throw new errors.InvalidParameterError("Bad parameter: public_certificate must be of type String, received ".concat((0, _utils.getType)(params.public_certificate)));
|
204
|
+
case 18:
|
191
205
|
if (params.id) {
|
192
|
-
_context.next =
|
206
|
+
_context.next = 24;
|
193
207
|
break;
|
194
208
|
}
|
195
209
|
if (!_this.attributes.id) {
|
196
|
-
_context.next =
|
210
|
+
_context.next = 23;
|
197
211
|
break;
|
198
212
|
}
|
199
213
|
params.id = _this.id;
|
200
|
-
_context.next =
|
214
|
+
_context.next = 24;
|
201
215
|
break;
|
202
|
-
case
|
216
|
+
case 23:
|
203
217
|
throw new errors.MissingParameterError('Parameter missing: id');
|
204
|
-
case 22:
|
205
|
-
_context.next = 24;
|
206
|
-
return _Api.default.sendRequest("/as2_partners/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
|
207
218
|
case 24:
|
219
|
+
_context.next = 26;
|
220
|
+
return _Api.default.sendRequest("/as2_partners/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
|
221
|
+
case 26:
|
208
222
|
response = _context.sent;
|
209
223
|
return _context.abrupt("return", new As2Partner(response === null || response === void 0 ? void 0 : response.data, _this.options));
|
210
|
-
case
|
224
|
+
case 28:
|
211
225
|
case "end":
|
212
226
|
return _context.stop();
|
213
227
|
}
|
@@ -409,6 +423,7 @@ _As2Partner = As2Partner;
|
|
409
423
|
// public_certificate (required) - string
|
410
424
|
// as2_station_id (required) - int64 - Id of As2Station for this partner
|
411
425
|
// server_certificate - string - Remote server certificate security setting
|
426
|
+
// mdn_validation_level - string - MDN Validation Level
|
412
427
|
// enable_dedicated_ips - boolean
|
413
428
|
(0, _defineProperty2.default)(As2Partner, "create", /*#__PURE__*/(0, _asyncToGenerator2.default)( /*#__PURE__*/_regenerator.default.mark(function _callee6() {
|
414
429
|
var params,
|
@@ -474,12 +489,18 @@ _As2Partner = As2Partner;
|
|
474
489
|
}
|
475
490
|
throw new errors.InvalidParameterError("Bad parameter: server_certificate must be of type String, received ".concat((0, _utils.getType)(params.server_certificate)));
|
476
491
|
case 20:
|
477
|
-
|
478
|
-
|
492
|
+
if (!(params.mdn_validation_level && !(0, _utils.isString)(params.mdn_validation_level))) {
|
493
|
+
_context6.next = 22;
|
494
|
+
break;
|
495
|
+
}
|
496
|
+
throw new errors.InvalidParameterError("Bad parameter: mdn_validation_level must be of type String, received ".concat((0, _utils.getType)(params.mdn_validation_level)));
|
479
497
|
case 22:
|
498
|
+
_context6.next = 24;
|
499
|
+
return _Api.default.sendRequest('/as2_partners', 'POST', params, options);
|
500
|
+
case 24:
|
480
501
|
response = _context6.sent;
|
481
502
|
return _context6.abrupt("return", new _As2Partner(response === null || response === void 0 ? void 0 : response.data, options));
|
482
|
-
case
|
503
|
+
case 26:
|
483
504
|
case "end":
|
484
505
|
return _context6.stop();
|
485
506
|
}
|
package/lib/models/Site.js
CHANGED
@@ -505,7 +505,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
505
505
|
(0, _defineProperty2.default)(this, "getActiveSftpHostKeyId", function () {
|
506
506
|
return _this.attributes.active_sftp_host_key_id;
|
507
507
|
});
|
508
|
-
// boolean # Are Insecure Ciphers allowed for SFTP? Note:
|
508
|
+
// boolean # Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
509
509
|
(0, _defineProperty2.default)(this, "getSftpInsecureCiphers", function () {
|
510
510
|
return _this.attributes.sftp_insecure_ciphers;
|
511
511
|
});
|
@@ -736,7 +736,7 @@ _Site = Site;
|
|
736
736
|
// session_expiry - double - Session expiry in hours
|
737
737
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
738
738
|
// tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
|
739
|
-
// sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note:
|
739
|
+
// sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
740
740
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
741
741
|
// user_lockout - boolean - Will users be locked out after incorrect login attempts?
|
742
742
|
// user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
|
package/package.json
CHANGED
package/src/Files.js
CHANGED
package/src/models/As2Partner.js
CHANGED
@@ -63,6 +63,13 @@ class As2Partner {
|
|
63
63
|
this.attributes.server_certificate = value
|
64
64
|
}
|
65
65
|
|
66
|
+
// string # MDN Validation Level
|
67
|
+
getMdnValidationLevel = () => this.attributes.mdn_validation_level
|
68
|
+
|
69
|
+
setMdnValidationLevel = value => {
|
70
|
+
this.attributes.mdn_validation_level = value
|
71
|
+
}
|
72
|
+
|
66
73
|
// boolean # `true` if remote server only accepts connections from dedicated IPs
|
67
74
|
getEnableDedicatedIps = () => this.attributes.enable_dedicated_ips
|
68
75
|
|
@@ -130,6 +137,7 @@ class As2Partner {
|
|
130
137
|
// name - string - AS2 Name
|
131
138
|
// uri - string - URL base for AS2 responses
|
132
139
|
// server_certificate - string - Remote server certificate security setting
|
140
|
+
// mdn_validation_level - string - MDN Validation Level
|
133
141
|
// public_certificate - string
|
134
142
|
// enable_dedicated_ips - boolean
|
135
143
|
update = async (params = {}) => {
|
@@ -158,6 +166,10 @@ class As2Partner {
|
|
158
166
|
throw new errors.InvalidParameterError(`Bad parameter: server_certificate must be of type String, received ${getType(params.server_certificate)}`)
|
159
167
|
}
|
160
168
|
|
169
|
+
if (params.mdn_validation_level && !isString(params.mdn_validation_level)) {
|
170
|
+
throw new errors.InvalidParameterError(`Bad parameter: mdn_validation_level must be of type String, received ${getType(params.mdn_validation_level)}`)
|
171
|
+
}
|
172
|
+
|
161
173
|
if (params.public_certificate && !isString(params.public_certificate)) {
|
162
174
|
throw new errors.InvalidParameterError(`Bad parameter: public_certificate must be of type String, received ${getType(params.public_certificate)}`)
|
163
175
|
}
|
@@ -266,6 +278,7 @@ class As2Partner {
|
|
266
278
|
// public_certificate (required) - string
|
267
279
|
// as2_station_id (required) - int64 - Id of As2Station for this partner
|
268
280
|
// server_certificate - string - Remote server certificate security setting
|
281
|
+
// mdn_validation_level - string - MDN Validation Level
|
269
282
|
// enable_dedicated_ips - boolean
|
270
283
|
static create = async (params = {}, options = {}) => {
|
271
284
|
if (!params.name) {
|
@@ -304,6 +317,10 @@ class As2Partner {
|
|
304
317
|
throw new errors.InvalidParameterError(`Bad parameter: server_certificate must be of type String, received ${getType(params.server_certificate)}`)
|
305
318
|
}
|
306
319
|
|
320
|
+
if (params.mdn_validation_level && !isString(params.mdn_validation_level)) {
|
321
|
+
throw new errors.InvalidParameterError(`Bad parameter: mdn_validation_level must be of type String, received ${getType(params.mdn_validation_level)}`)
|
322
|
+
}
|
323
|
+
|
307
324
|
const response = await Api.sendRequest('/as2_partners', 'POST', params, options)
|
308
325
|
|
309
326
|
return new As2Partner(response?.data, options)
|
package/src/models/Site.js
CHANGED
@@ -382,7 +382,7 @@ class Site {
|
|
382
382
|
// int64 # Id of the currently selected custom SFTP Host Key
|
383
383
|
getActiveSftpHostKeyId = () => this.attributes.active_sftp_host_key_id
|
384
384
|
|
385
|
-
// boolean # Are Insecure Ciphers allowed for SFTP? Note:
|
385
|
+
// boolean # Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
386
386
|
getSftpInsecureCiphers = () => this.attributes.sftp_insecure_ciphers
|
387
387
|
|
388
388
|
// boolean # Use user FTP roots also for SFTP?
|
@@ -537,7 +537,7 @@ class Site {
|
|
537
537
|
// session_expiry - double - Session expiry in hours
|
538
538
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
539
539
|
// tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
|
540
|
-
// sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note:
|
540
|
+
// sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
|
541
541
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
542
542
|
// user_lockout - boolean - Will users be locked out after incorrect login attempts?
|
543
543
|
// user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
|