files.com 1.2.281 → 1.2.282
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/_VERSION +1 -1
- package/docs/models/Site.md +2 -2
- package/lib/Files.js +1 -1
- package/lib/models/Site.js +2 -2
- package/package.json +1 -1
- package/src/Files.js +1 -1
- package/src/models/Site.js +2 -2
package/_VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.2.
|
|
1
|
+
1.2.282
|
package/docs/models/Site.md
CHANGED
|
@@ -453,7 +453,7 @@
|
|
|
453
453
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
|
454
454
|
* `subdomain` (string): Site subdomain
|
|
455
455
|
* `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
|
|
456
|
-
* `tls_disabled` (boolean):
|
|
456
|
+
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
457
457
|
* `trial_days_left` (int64): Number of days left in trial
|
|
458
458
|
* `trial_until` (date-time): When does this Site trial expire?
|
|
459
459
|
* `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
|
|
@@ -703,7 +703,7 @@ await Site.update({
|
|
|
703
703
|
* `migrate_remote_server_sync_to_sync` (boolean): If true, we will migrate all remote server syncs to the new Sync model.
|
|
704
704
|
* `session_expiry` (double): Session expiry in hours
|
|
705
705
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
|
706
|
-
* `tls_disabled` (boolean):
|
|
706
|
+
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
707
707
|
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
708
708
|
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
709
709
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
package/lib/Files.js
CHANGED
|
@@ -12,7 +12,7 @@ var apiKey;
|
|
|
12
12
|
var baseUrl = 'https://app.files.com';
|
|
13
13
|
var sessionId = null;
|
|
14
14
|
var language = null;
|
|
15
|
-
var version = '1.2.
|
|
15
|
+
var version = '1.2.282';
|
|
16
16
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
|
17
17
|
var logLevel = _Logger.LogLevel.INFO;
|
|
18
18
|
var debugRequest = false;
|
package/lib/models/Site.js
CHANGED
|
@@ -628,7 +628,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
|
628
628
|
(0, _defineProperty2.default)(this, "getSwitchToPlanDate", function () {
|
|
629
629
|
return _this.attributes.switch_to_plan_date;
|
|
630
630
|
});
|
|
631
|
-
// boolean #
|
|
631
|
+
// boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
632
632
|
(0, _defineProperty2.default)(this, "getTlsDisabled", function () {
|
|
633
633
|
return _this.attributes.tls_disabled;
|
|
634
634
|
});
|
|
@@ -812,7 +812,7 @@ _Site = Site;
|
|
|
812
812
|
// migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
|
|
813
813
|
// session_expiry - double - Session expiry in hours
|
|
814
814
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
|
815
|
-
// tls_disabled - boolean -
|
|
815
|
+
// tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
816
816
|
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
817
817
|
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
818
818
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
package/package.json
CHANGED
package/src/Files.js
CHANGED
package/src/models/Site.js
CHANGED
|
@@ -475,7 +475,7 @@ class Site {
|
|
|
475
475
|
// date-time # If switching plans, when does the new plan take effect?
|
|
476
476
|
getSwitchToPlanDate = () => this.attributes.switch_to_plan_date
|
|
477
477
|
|
|
478
|
-
// boolean #
|
|
478
|
+
// boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
479
479
|
getTlsDisabled = () => this.attributes.tls_disabled
|
|
480
480
|
|
|
481
481
|
// int64 # Number of days left in trial
|
|
@@ -597,7 +597,7 @@ class Site {
|
|
|
597
597
|
// migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
|
|
598
598
|
// session_expiry - double - Session expiry in hours
|
|
599
599
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
|
600
|
-
// tls_disabled - boolean -
|
|
600
|
+
// tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
601
601
|
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
602
602
|
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
603
603
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|