files.com 1.2.27 → 1.2.29

Sign up to get free protection for your applications and to get access to all the features.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.2.27
1
+ 1.2.29
@@ -9,6 +9,7 @@
9
9
  "name": "AS2 Partner Name",
10
10
  "uri": "example",
11
11
  "server_certificate": "require_match",
12
+ "mdn_validation_level": "none",
12
13
  "enable_dedicated_ips": true,
13
14
  "hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
14
15
  "public_certificate_md5": "example",
@@ -25,6 +26,7 @@
25
26
  * `name` (string): The partner's formal AS2 name.
26
27
  * `uri` (string): Public URI for sending AS2 message to.
27
28
  * `server_certificate` (string): Remote server certificate security setting
29
+ * `mdn_validation_level` (string): MDN Validation Level
28
30
  * `enable_dedicated_ips` (boolean): `true` if remote server only accepts connections from dedicated IPs
29
31
  * `hex_public_certificate_serial` (string): Serial of public certificate used for message security in hex format.
30
32
  * `public_certificate_md5` (string): MD5 hash of public certificate used for message security.
@@ -75,6 +77,7 @@ await As2Partner.create({
75
77
  'public_certificate': "public_certificate",
76
78
  'as2_station_id': 1,
77
79
  'server_certificate': "require_match",
80
+ 'mdn_validation_level': "none",
78
81
  'enable_dedicated_ips': true,
79
82
  })
80
83
  ```
@@ -87,6 +90,7 @@ await As2Partner.create({
87
90
  * `public_certificate` (string): Required -
88
91
  * `as2_station_id` (int64): Required - Id of As2Station for this partner
89
92
  * `server_certificate` (string): Remote server certificate security setting
93
+ * `mdn_validation_level` (string): MDN Validation Level
90
94
  * `enable_dedicated_ips` (boolean):
91
95
 
92
96
  ---
@@ -100,6 +104,7 @@ await as2_partner.update({
100
104
  'name': "AS2 Partner Name",
101
105
  'uri': "example",
102
106
  'server_certificate': "require_match",
107
+ 'mdn_validation_level': "none",
103
108
  'enable_dedicated_ips': true,
104
109
  })
105
110
  ```
@@ -110,6 +115,7 @@ await as2_partner.update({
110
115
  * `name` (string): AS2 Name
111
116
  * `uri` (string): URL base for AS2 responses
112
117
  * `server_certificate` (string): Remote server certificate security setting
118
+ * `mdn_validation_level` (string): MDN Validation Level
113
119
  * `public_certificate` (string):
114
120
  * `enable_dedicated_ips` (boolean):
115
121
 
@@ -122,6 +128,7 @@ await as2_partner.update({
122
128
  "name": "AS2 Partner Name",
123
129
  "uri": "example",
124
130
  "server_certificate": "require_match",
131
+ "mdn_validation_level": "none",
125
132
  "enable_dedicated_ips": true,
126
133
  "hex_public_certificate_serial": "A5:EB:C1:95:DC:D8:2B:E7",
127
134
  "public_certificate_md5": "example",
@@ -388,7 +388,7 @@
388
388
  * `sftp_enabled` (boolean): Is SFTP enabled?
389
389
  * `sftp_host_key_type` (string): Sftp Host Key Type
390
390
  * `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
391
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
391
+ * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
392
392
  * `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
393
393
  * `sharing_enabled` (boolean): Allow bundle creation
394
394
  * `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
@@ -627,7 +627,7 @@ await Site.update({
627
627
  * `session_expiry` (double): Session expiry in hours
628
628
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
629
629
  * `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
630
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
630
+ * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
631
631
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
632
632
  * `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
633
633
  * `user_lockout_tries` (int64): Number of login tries within `user_lockout_within` hours before users are locked out
package/lib/Files.js CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
11
11
  var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
- var version = '1.2.27';
14
+ var version = '1.2.29';
15
15
  var userAgent = "Files.com JavaScript SDK v".concat(version);
16
16
  var logLevel = _Logger.LogLevel.INFO;
17
17
  var debugRequest = false;
@@ -68,6 +68,13 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
68
68
  (0, _defineProperty2.default)(this, "setServerCertificate", function (value) {
69
69
  _this.attributes.server_certificate = value;
70
70
  });
71
+ // string # MDN Validation Level
72
+ (0, _defineProperty2.default)(this, "getMdnValidationLevel", function () {
73
+ return _this.attributes.mdn_validation_level;
74
+ });
75
+ (0, _defineProperty2.default)(this, "setMdnValidationLevel", function (value) {
76
+ _this.attributes.mdn_validation_level = value;
77
+ });
71
78
  // boolean # `true` if remote server only accepts connections from dedicated IPs
72
79
  (0, _defineProperty2.default)(this, "getEnableDedicatedIps", function () {
73
80
  return _this.attributes.enable_dedicated_ips;
@@ -135,6 +142,7 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
135
142
  // name - string - AS2 Name
136
143
  // uri - string - URL base for AS2 responses
137
144
  // server_certificate - string - Remote server certificate security setting
145
+ // mdn_validation_level - string - MDN Validation Level
138
146
  // public_certificate - string
139
147
  // enable_dedicated_ips - boolean
140
148
  (0, _defineProperty2.default)(this, "update", /*#__PURE__*/(0, _asyncToGenerator2.default)( /*#__PURE__*/_regenerator.default.mark(function _callee() {
@@ -182,32 +190,38 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
182
190
  }
183
191
  throw new errors.InvalidParameterError("Bad parameter: server_certificate must be of type String, received ".concat((0, _utils.getType)(params.server_certificate)));
184
192
  case 14:
185
- if (!(params.public_certificate && !(0, _utils.isString)(params.public_certificate))) {
193
+ if (!(params.mdn_validation_level && !(0, _utils.isString)(params.mdn_validation_level))) {
186
194
  _context.next = 16;
187
195
  break;
188
196
  }
189
- throw new errors.InvalidParameterError("Bad parameter: public_certificate must be of type String, received ".concat((0, _utils.getType)(params.public_certificate)));
197
+ throw new errors.InvalidParameterError("Bad parameter: mdn_validation_level must be of type String, received ".concat((0, _utils.getType)(params.mdn_validation_level)));
190
198
  case 16:
199
+ if (!(params.public_certificate && !(0, _utils.isString)(params.public_certificate))) {
200
+ _context.next = 18;
201
+ break;
202
+ }
203
+ throw new errors.InvalidParameterError("Bad parameter: public_certificate must be of type String, received ".concat((0, _utils.getType)(params.public_certificate)));
204
+ case 18:
191
205
  if (params.id) {
192
- _context.next = 22;
206
+ _context.next = 24;
193
207
  break;
194
208
  }
195
209
  if (!_this.attributes.id) {
196
- _context.next = 21;
210
+ _context.next = 23;
197
211
  break;
198
212
  }
199
213
  params.id = _this.id;
200
- _context.next = 22;
214
+ _context.next = 24;
201
215
  break;
202
- case 21:
216
+ case 23:
203
217
  throw new errors.MissingParameterError('Parameter missing: id');
204
- case 22:
205
- _context.next = 24;
206
- return _Api.default.sendRequest("/as2_partners/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
207
218
  case 24:
219
+ _context.next = 26;
220
+ return _Api.default.sendRequest("/as2_partners/".concat(encodeURIComponent(params.id)), 'PATCH', params, _this.options);
221
+ case 26:
208
222
  response = _context.sent;
209
223
  return _context.abrupt("return", new As2Partner(response === null || response === void 0 ? void 0 : response.data, _this.options));
210
- case 26:
224
+ case 28:
211
225
  case "end":
212
226
  return _context.stop();
213
227
  }
@@ -409,6 +423,7 @@ _As2Partner = As2Partner;
409
423
  // public_certificate (required) - string
410
424
  // as2_station_id (required) - int64 - Id of As2Station for this partner
411
425
  // server_certificate - string - Remote server certificate security setting
426
+ // mdn_validation_level - string - MDN Validation Level
412
427
  // enable_dedicated_ips - boolean
413
428
  (0, _defineProperty2.default)(As2Partner, "create", /*#__PURE__*/(0, _asyncToGenerator2.default)( /*#__PURE__*/_regenerator.default.mark(function _callee6() {
414
429
  var params,
@@ -474,12 +489,18 @@ _As2Partner = As2Partner;
474
489
  }
475
490
  throw new errors.InvalidParameterError("Bad parameter: server_certificate must be of type String, received ".concat((0, _utils.getType)(params.server_certificate)));
476
491
  case 20:
477
- _context6.next = 22;
478
- return _Api.default.sendRequest('/as2_partners', 'POST', params, options);
492
+ if (!(params.mdn_validation_level && !(0, _utils.isString)(params.mdn_validation_level))) {
493
+ _context6.next = 22;
494
+ break;
495
+ }
496
+ throw new errors.InvalidParameterError("Bad parameter: mdn_validation_level must be of type String, received ".concat((0, _utils.getType)(params.mdn_validation_level)));
479
497
  case 22:
498
+ _context6.next = 24;
499
+ return _Api.default.sendRequest('/as2_partners', 'POST', params, options);
500
+ case 24:
480
501
  response = _context6.sent;
481
502
  return _context6.abrupt("return", new _As2Partner(response === null || response === void 0 ? void 0 : response.data, options));
482
- case 24:
503
+ case 26:
483
504
  case "end":
484
505
  return _context6.stop();
485
506
  }
@@ -505,7 +505,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
505
505
  (0, _defineProperty2.default)(this, "getActiveSftpHostKeyId", function () {
506
506
  return _this.attributes.active_sftp_host_key_id;
507
507
  });
508
- // boolean # Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
508
+ // boolean # Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
509
509
  (0, _defineProperty2.default)(this, "getSftpInsecureCiphers", function () {
510
510
  return _this.attributes.sftp_insecure_ciphers;
511
511
  });
@@ -736,7 +736,7 @@ _Site = Site;
736
736
  // session_expiry - double - Session expiry in hours
737
737
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
738
738
  // tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
739
- // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
739
+ // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
740
740
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
741
741
  // user_lockout - boolean - Will users be locked out after incorrect login attempts?
742
742
  // user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.2.27",
3
+ "version": "1.2.29",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -5,7 +5,7 @@ const endpointPrefix = '/api/rest/v1'
5
5
  let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
- const version = '1.2.27'
8
+ const version = '1.2.29'
9
9
  let userAgent = `Files.com JavaScript SDK v${version}`
10
10
 
11
11
  let logLevel = LogLevel.INFO
@@ -63,6 +63,13 @@ class As2Partner {
63
63
  this.attributes.server_certificate = value
64
64
  }
65
65
 
66
+ // string # MDN Validation Level
67
+ getMdnValidationLevel = () => this.attributes.mdn_validation_level
68
+
69
+ setMdnValidationLevel = value => {
70
+ this.attributes.mdn_validation_level = value
71
+ }
72
+
66
73
  // boolean # `true` if remote server only accepts connections from dedicated IPs
67
74
  getEnableDedicatedIps = () => this.attributes.enable_dedicated_ips
68
75
 
@@ -130,6 +137,7 @@ class As2Partner {
130
137
  // name - string - AS2 Name
131
138
  // uri - string - URL base for AS2 responses
132
139
  // server_certificate - string - Remote server certificate security setting
140
+ // mdn_validation_level - string - MDN Validation Level
133
141
  // public_certificate - string
134
142
  // enable_dedicated_ips - boolean
135
143
  update = async (params = {}) => {
@@ -158,6 +166,10 @@ class As2Partner {
158
166
  throw new errors.InvalidParameterError(`Bad parameter: server_certificate must be of type String, received ${getType(params.server_certificate)}`)
159
167
  }
160
168
 
169
+ if (params.mdn_validation_level && !isString(params.mdn_validation_level)) {
170
+ throw new errors.InvalidParameterError(`Bad parameter: mdn_validation_level must be of type String, received ${getType(params.mdn_validation_level)}`)
171
+ }
172
+
161
173
  if (params.public_certificate && !isString(params.public_certificate)) {
162
174
  throw new errors.InvalidParameterError(`Bad parameter: public_certificate must be of type String, received ${getType(params.public_certificate)}`)
163
175
  }
@@ -266,6 +278,7 @@ class As2Partner {
266
278
  // public_certificate (required) - string
267
279
  // as2_station_id (required) - int64 - Id of As2Station for this partner
268
280
  // server_certificate - string - Remote server certificate security setting
281
+ // mdn_validation_level - string - MDN Validation Level
269
282
  // enable_dedicated_ips - boolean
270
283
  static create = async (params = {}, options = {}) => {
271
284
  if (!params.name) {
@@ -304,6 +317,10 @@ class As2Partner {
304
317
  throw new errors.InvalidParameterError(`Bad parameter: server_certificate must be of type String, received ${getType(params.server_certificate)}`)
305
318
  }
306
319
 
320
+ if (params.mdn_validation_level && !isString(params.mdn_validation_level)) {
321
+ throw new errors.InvalidParameterError(`Bad parameter: mdn_validation_level must be of type String, received ${getType(params.mdn_validation_level)}`)
322
+ }
323
+
307
324
  const response = await Api.sendRequest('/as2_partners', 'POST', params, options)
308
325
 
309
326
  return new As2Partner(response?.data, options)
@@ -382,7 +382,7 @@ class Site {
382
382
  // int64 # Id of the currently selected custom SFTP Host Key
383
383
  getActiveSftpHostKeyId = () => this.attributes.active_sftp_host_key_id
384
384
 
385
- // boolean # Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
385
+ // boolean # Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
386
386
  getSftpInsecureCiphers = () => this.attributes.sftp_insecure_ciphers
387
387
 
388
388
  // boolean # Use user FTP roots also for SFTP?
@@ -537,7 +537,7 @@ class Site {
537
537
  // session_expiry - double - Session expiry in hours
538
538
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
539
539
  // tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
540
- // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Settting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
540
+ // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
541
541
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
542
542
  // user_lockout - boolean - Will users be locked out after incorrect login attempts?
543
543
  // user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out