files.com 1.2.281 → 1.2.283
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/_VERSION +1 -1
- package/docs/models/Site.md +14 -6
- package/lib/Files.js +1 -1
- package/lib/models/Site.js +79 -57
- package/package.json +1 -1
- package/src/Files.js +1 -1
- package/src/models/Site.js +22 -6
package/_VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.2.
|
|
1
|
+
1.2.283
|
package/docs/models/Site.md
CHANGED
|
@@ -198,6 +198,8 @@
|
|
|
198
198
|
"show_request_access_link": true,
|
|
199
199
|
"site_footer": "example",
|
|
200
200
|
"site_header": "example",
|
|
201
|
+
"site_public_footer": "example",
|
|
202
|
+
"site_public_header": "example",
|
|
201
203
|
"smtp_address": "smtp.my-mail-server.com",
|
|
202
204
|
"smtp_authentication": "plain",
|
|
203
205
|
"smtp_from": "me@my-mail-server.com",
|
|
@@ -440,8 +442,10 @@
|
|
|
440
442
|
* `sharing_enabled` (boolean): Allow bundle creation
|
|
441
443
|
* `show_user_notifications_log_in_link` (boolean): Show log in link in user notifications?
|
|
442
444
|
* `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
|
|
443
|
-
* `site_footer` (string): Custom site footer text
|
|
444
|
-
* `site_header` (string): Custom site header text
|
|
445
|
+
* `site_footer` (string): Custom site footer text for authenticated pages
|
|
446
|
+
* `site_header` (string): Custom site header text for authenticated pages
|
|
447
|
+
* `site_public_footer` (string): Custom site footer text for public pages
|
|
448
|
+
* `site_public_header` (string): Custom site header text for public pages
|
|
445
449
|
* `smtp_address` (string): SMTP server hostname or IP
|
|
446
450
|
* `smtp_authentication` (string): SMTP server authentication type
|
|
447
451
|
* `smtp_from` (string): From address to use when mailing through custom SMTP
|
|
@@ -453,7 +457,7 @@
|
|
|
453
457
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
|
454
458
|
* `subdomain` (string): Site subdomain
|
|
455
459
|
* `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
|
|
456
|
-
* `tls_disabled` (boolean):
|
|
460
|
+
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
457
461
|
* `trial_days_left` (int64): Number of days left in trial
|
|
458
462
|
* `trial_until` (date-time): When does this Site trial expire?
|
|
459
463
|
* `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
|
|
@@ -619,6 +623,8 @@ await Site.update({
|
|
|
619
623
|
'color2_top_text': "#ffffff",
|
|
620
624
|
'site_header': "example",
|
|
621
625
|
'site_footer': "example",
|
|
626
|
+
'site_public_header': "example",
|
|
627
|
+
'site_public_footer': "example",
|
|
622
628
|
'login_help_text': "Login page help text.",
|
|
623
629
|
'use_dedicated_ips_for_smtp': false,
|
|
624
630
|
'smtp_address': "smtp.my-mail-server.com",
|
|
@@ -703,7 +709,7 @@ await Site.update({
|
|
|
703
709
|
* `migrate_remote_server_sync_to_sync` (boolean): If true, we will migrate all remote server syncs to the new Sync model.
|
|
704
710
|
* `session_expiry` (double): Session expiry in hours
|
|
705
711
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
|
706
|
-
* `tls_disabled` (boolean):
|
|
712
|
+
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
707
713
|
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
708
714
|
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
709
715
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
|
@@ -777,8 +783,10 @@ await Site.update({
|
|
|
777
783
|
* `color2_link` (string): Top bar link color
|
|
778
784
|
* `color2_text` (string): Page link and button color
|
|
779
785
|
* `color2_top_text` (string): Top bar text color
|
|
780
|
-
* `site_header` (string): Custom site header text
|
|
781
|
-
* `site_footer` (string): Custom site footer text
|
|
786
|
+
* `site_header` (string): Custom site header text for authenticated pages
|
|
787
|
+
* `site_footer` (string): Custom site footer text for authenticated pages
|
|
788
|
+
* `site_public_header` (string): Custom site header text for public pages
|
|
789
|
+
* `site_public_footer` (string): Custom site footer text for public pages
|
|
782
790
|
* `login_help_text` (string): Login help text
|
|
783
791
|
* `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
|
|
784
792
|
* `smtp_address` (string): SMTP server hostname or IP
|
package/lib/Files.js
CHANGED
|
@@ -12,7 +12,7 @@ var apiKey;
|
|
|
12
12
|
var baseUrl = 'https://app.files.com';
|
|
13
13
|
var sessionId = null;
|
|
14
14
|
var language = null;
|
|
15
|
-
var version = '1.2.
|
|
15
|
+
var version = '1.2.283';
|
|
16
16
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
|
17
17
|
var logLevel = _Logger.LogLevel.INFO;
|
|
18
18
|
var debugRequest = false;
|
package/lib/models/Site.js
CHANGED
|
@@ -576,14 +576,22 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
|
576
576
|
(0, _defineProperty2.default)(this, "getShowRequestAccessLink", function () {
|
|
577
577
|
return _this.attributes.show_request_access_link;
|
|
578
578
|
});
|
|
579
|
-
// string # Custom site footer text
|
|
579
|
+
// string # Custom site footer text for authenticated pages
|
|
580
580
|
(0, _defineProperty2.default)(this, "getSiteFooter", function () {
|
|
581
581
|
return _this.attributes.site_footer;
|
|
582
582
|
});
|
|
583
|
-
// string # Custom site header text
|
|
583
|
+
// string # Custom site header text for authenticated pages
|
|
584
584
|
(0, _defineProperty2.default)(this, "getSiteHeader", function () {
|
|
585
585
|
return _this.attributes.site_header;
|
|
586
586
|
});
|
|
587
|
+
// string # Custom site footer text for public pages
|
|
588
|
+
(0, _defineProperty2.default)(this, "getSitePublicFooter", function () {
|
|
589
|
+
return _this.attributes.site_public_footer;
|
|
590
|
+
});
|
|
591
|
+
// string # Custom site header text for public pages
|
|
592
|
+
(0, _defineProperty2.default)(this, "getSitePublicHeader", function () {
|
|
593
|
+
return _this.attributes.site_public_header;
|
|
594
|
+
});
|
|
587
595
|
// string # SMTP server hostname or IP
|
|
588
596
|
(0, _defineProperty2.default)(this, "getSmtpAddress", function () {
|
|
589
597
|
return _this.attributes.smtp_address;
|
|
@@ -628,7 +636,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
|
628
636
|
(0, _defineProperty2.default)(this, "getSwitchToPlanDate", function () {
|
|
629
637
|
return _this.attributes.switch_to_plan_date;
|
|
630
638
|
});
|
|
631
|
-
// boolean #
|
|
639
|
+
// boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
632
640
|
(0, _defineProperty2.default)(this, "getTlsDisabled", function () {
|
|
633
641
|
return _this.attributes.tls_disabled;
|
|
634
642
|
});
|
|
@@ -812,7 +820,7 @@ _Site = Site;
|
|
|
812
820
|
// migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
|
|
813
821
|
// session_expiry - double - Session expiry in hours
|
|
814
822
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
|
815
|
-
// tls_disabled - boolean -
|
|
823
|
+
// tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
816
824
|
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
817
825
|
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
818
826
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
|
@@ -886,8 +894,10 @@ _Site = Site;
|
|
|
886
894
|
// color2_link - string - Top bar link color
|
|
887
895
|
// color2_text - string - Page link and button color
|
|
888
896
|
// color2_top_text - string - Top bar text color
|
|
889
|
-
// site_header - string - Custom site header text
|
|
890
|
-
// site_footer - string - Custom site footer text
|
|
897
|
+
// site_header - string - Custom site header text for authenticated pages
|
|
898
|
+
// site_footer - string - Custom site footer text for authenticated pages
|
|
899
|
+
// site_public_header - string - Custom site header text for public pages
|
|
900
|
+
// site_public_footer - string - Custom site footer text for public pages
|
|
891
901
|
// login_help_text - string - Login help text
|
|
892
902
|
// use_dedicated_ips_for_smtp - boolean - If using custom SMTP, should we use dedicated IPs to deliver emails?
|
|
893
903
|
// smtp_address - string - SMTP server hostname or IP
|
|
@@ -1199,156 +1209,168 @@ _Site = Site;
|
|
|
1199
1209
|
}
|
|
1200
1210
|
throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params.site_footer)));
|
|
1201
1211
|
case 43:
|
|
1202
|
-
if (!(params.
|
|
1212
|
+
if (!(params.site_public_header && !(0, _utils.isString)(params.site_public_header))) {
|
|
1203
1213
|
_context3.next = 44;
|
|
1204
1214
|
break;
|
|
1205
1215
|
}
|
|
1206
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1216
|
+
throw new errors.InvalidParameterError("Bad parameter: site_public_header must be of type String, received ".concat((0, _utils.getType)(params.site_public_header)));
|
|
1207
1217
|
case 44:
|
|
1208
|
-
if (!(params.
|
|
1218
|
+
if (!(params.site_public_footer && !(0, _utils.isString)(params.site_public_footer))) {
|
|
1209
1219
|
_context3.next = 45;
|
|
1210
1220
|
break;
|
|
1211
1221
|
}
|
|
1212
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1222
|
+
throw new errors.InvalidParameterError("Bad parameter: site_public_footer must be of type String, received ".concat((0, _utils.getType)(params.site_public_footer)));
|
|
1213
1223
|
case 45:
|
|
1214
|
-
if (!(params.
|
|
1224
|
+
if (!(params.login_help_text && !(0, _utils.isString)(params.login_help_text))) {
|
|
1215
1225
|
_context3.next = 46;
|
|
1216
1226
|
break;
|
|
1217
1227
|
}
|
|
1218
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1228
|
+
throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params.login_help_text)));
|
|
1219
1229
|
case 46:
|
|
1220
|
-
if (!(params.
|
|
1230
|
+
if (!(params.smtp_address && !(0, _utils.isString)(params.smtp_address))) {
|
|
1221
1231
|
_context3.next = 47;
|
|
1222
1232
|
break;
|
|
1223
1233
|
}
|
|
1224
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1234
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params.smtp_address)));
|
|
1225
1235
|
case 47:
|
|
1226
|
-
if (!(params.
|
|
1236
|
+
if (!(params.smtp_authentication && !(0, _utils.isString)(params.smtp_authentication))) {
|
|
1227
1237
|
_context3.next = 48;
|
|
1228
1238
|
break;
|
|
1229
1239
|
}
|
|
1230
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1240
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params.smtp_authentication)));
|
|
1231
1241
|
case 48:
|
|
1232
|
-
if (!(params.
|
|
1242
|
+
if (!(params.smtp_from && !(0, _utils.isString)(params.smtp_from))) {
|
|
1233
1243
|
_context3.next = 49;
|
|
1234
1244
|
break;
|
|
1235
1245
|
}
|
|
1236
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1246
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params.smtp_from)));
|
|
1237
1247
|
case 49:
|
|
1238
|
-
if (!(params.
|
|
1248
|
+
if (!(params.smtp_username && !(0, _utils.isString)(params.smtp_username))) {
|
|
1239
1249
|
_context3.next = 50;
|
|
1240
1250
|
break;
|
|
1241
1251
|
}
|
|
1242
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1252
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params.smtp_username)));
|
|
1243
1253
|
case 50:
|
|
1244
|
-
if (!(params.
|
|
1254
|
+
if (!(params.smtp_port && !(0, _utils.isInt)(params.smtp_port))) {
|
|
1245
1255
|
_context3.next = 51;
|
|
1246
1256
|
break;
|
|
1247
1257
|
}
|
|
1248
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1258
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params.smtp_port)));
|
|
1249
1259
|
case 51:
|
|
1250
|
-
if (!(params.
|
|
1260
|
+
if (!(params.ldap_type && !(0, _utils.isString)(params.ldap_type))) {
|
|
1251
1261
|
_context3.next = 52;
|
|
1252
1262
|
break;
|
|
1253
1263
|
}
|
|
1254
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1264
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params.ldap_type)));
|
|
1255
1265
|
case 52:
|
|
1256
|
-
if (!(params.
|
|
1266
|
+
if (!(params.ldap_host && !(0, _utils.isString)(params.ldap_host))) {
|
|
1257
1267
|
_context3.next = 53;
|
|
1258
1268
|
break;
|
|
1259
1269
|
}
|
|
1260
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1270
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params.ldap_host)));
|
|
1261
1271
|
case 53:
|
|
1262
|
-
if (!(params.
|
|
1272
|
+
if (!(params.ldap_host_2 && !(0, _utils.isString)(params.ldap_host_2))) {
|
|
1263
1273
|
_context3.next = 54;
|
|
1264
1274
|
break;
|
|
1265
1275
|
}
|
|
1266
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1276
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params.ldap_host_2)));
|
|
1267
1277
|
case 54:
|
|
1268
|
-
if (!(params.
|
|
1278
|
+
if (!(params.ldap_host_3 && !(0, _utils.isString)(params.ldap_host_3))) {
|
|
1269
1279
|
_context3.next = 55;
|
|
1270
1280
|
break;
|
|
1271
1281
|
}
|
|
1272
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1282
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params.ldap_host_3)));
|
|
1273
1283
|
case 55:
|
|
1274
|
-
if (!(params.
|
|
1284
|
+
if (!(params.ldap_port && !(0, _utils.isInt)(params.ldap_port))) {
|
|
1275
1285
|
_context3.next = 56;
|
|
1276
1286
|
break;
|
|
1277
1287
|
}
|
|
1278
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1288
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params.ldap_port)));
|
|
1279
1289
|
case 56:
|
|
1280
|
-
if (!(params.
|
|
1290
|
+
if (!(params.ldap_username && !(0, _utils.isString)(params.ldap_username))) {
|
|
1281
1291
|
_context3.next = 57;
|
|
1282
1292
|
break;
|
|
1283
1293
|
}
|
|
1284
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1294
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params.ldap_username)));
|
|
1285
1295
|
case 57:
|
|
1286
|
-
if (!(params.
|
|
1296
|
+
if (!(params.ldap_username_field && !(0, _utils.isString)(params.ldap_username_field))) {
|
|
1287
1297
|
_context3.next = 58;
|
|
1288
1298
|
break;
|
|
1289
1299
|
}
|
|
1290
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1300
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params.ldap_username_field)));
|
|
1291
1301
|
case 58:
|
|
1292
|
-
if (!(params.
|
|
1302
|
+
if (!(params.ldap_domain && !(0, _utils.isString)(params.ldap_domain))) {
|
|
1293
1303
|
_context3.next = 59;
|
|
1294
1304
|
break;
|
|
1295
1305
|
}
|
|
1296
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1306
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params.ldap_domain)));
|
|
1297
1307
|
case 59:
|
|
1298
|
-
if (!(params.
|
|
1308
|
+
if (!(params.ldap_user_action && !(0, _utils.isString)(params.ldap_user_action))) {
|
|
1299
1309
|
_context3.next = 60;
|
|
1300
1310
|
break;
|
|
1301
1311
|
}
|
|
1302
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1312
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params.ldap_user_action)));
|
|
1303
1313
|
case 60:
|
|
1304
|
-
if (!(params.
|
|
1314
|
+
if (!(params.ldap_group_action && !(0, _utils.isString)(params.ldap_group_action))) {
|
|
1305
1315
|
_context3.next = 61;
|
|
1306
1316
|
break;
|
|
1307
1317
|
}
|
|
1308
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1318
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_action)));
|
|
1309
1319
|
case 61:
|
|
1310
|
-
if (!(params.
|
|
1320
|
+
if (!(params.ldap_user_include_groups && !(0, _utils.isString)(params.ldap_user_include_groups))) {
|
|
1311
1321
|
_context3.next = 62;
|
|
1312
1322
|
break;
|
|
1313
1323
|
}
|
|
1314
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1324
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params.ldap_user_include_groups)));
|
|
1315
1325
|
case 62:
|
|
1316
|
-
if (!(params.
|
|
1326
|
+
if (!(params.ldap_group_exclusion && !(0, _utils.isString)(params.ldap_group_exclusion))) {
|
|
1317
1327
|
_context3.next = 63;
|
|
1318
1328
|
break;
|
|
1319
1329
|
}
|
|
1320
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1330
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_exclusion)));
|
|
1321
1331
|
case 63:
|
|
1322
|
-
if (!(params.
|
|
1332
|
+
if (!(params.ldap_group_inclusion && !(0, _utils.isString)(params.ldap_group_inclusion))) {
|
|
1323
1333
|
_context3.next = 64;
|
|
1324
1334
|
break;
|
|
1325
1335
|
}
|
|
1326
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1336
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_inclusion)));
|
|
1327
1337
|
case 64:
|
|
1328
|
-
if (!(params.
|
|
1338
|
+
if (!(params.ldap_base_dn && !(0, _utils.isString)(params.ldap_base_dn))) {
|
|
1329
1339
|
_context3.next = 65;
|
|
1330
1340
|
break;
|
|
1331
1341
|
}
|
|
1332
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1342
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params.ldap_base_dn)));
|
|
1333
1343
|
case 65:
|
|
1334
|
-
if (!(params.
|
|
1344
|
+
if (!(params.ldap_password_change && !(0, _utils.isString)(params.ldap_password_change))) {
|
|
1335
1345
|
_context3.next = 66;
|
|
1336
1346
|
break;
|
|
1337
1347
|
}
|
|
1338
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1348
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params.ldap_password_change)));
|
|
1339
1349
|
case 66:
|
|
1340
|
-
if (!(params.
|
|
1350
|
+
if (!(params.ldap_password_change_confirmation && !(0, _utils.isString)(params.ldap_password_change_confirmation))) {
|
|
1341
1351
|
_context3.next = 67;
|
|
1342
1352
|
break;
|
|
1343
1353
|
}
|
|
1344
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
|
1354
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params.ldap_password_change_confirmation)));
|
|
1345
1355
|
case 67:
|
|
1346
|
-
|
|
1347
|
-
|
|
1356
|
+
if (!(params.smtp_password && !(0, _utils.isString)(params.smtp_password))) {
|
|
1357
|
+
_context3.next = 68;
|
|
1358
|
+
break;
|
|
1359
|
+
}
|
|
1360
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params.smtp_password)));
|
|
1348
1361
|
case 68:
|
|
1362
|
+
if (!(params.session_expiry_minutes && !(0, _utils.isInt)(params.session_expiry_minutes))) {
|
|
1363
|
+
_context3.next = 69;
|
|
1364
|
+
break;
|
|
1365
|
+
}
|
|
1366
|
+
throw new errors.InvalidParameterError("Bad parameter: session_expiry_minutes must be of type Int, received ".concat((0, _utils.getType)(params.session_expiry_minutes)));
|
|
1367
|
+
case 69:
|
|
1368
|
+
_context3.next = 70;
|
|
1369
|
+
return _Api.default.sendRequest('/site', 'PATCH', params, options);
|
|
1370
|
+
case 70:
|
|
1349
1371
|
response = _context3.sent;
|
|
1350
1372
|
return _context3.abrupt("return", new _Site(response === null || response === void 0 ? void 0 : response.data, options));
|
|
1351
|
-
case
|
|
1373
|
+
case 71:
|
|
1352
1374
|
case "end":
|
|
1353
1375
|
return _context3.stop();
|
|
1354
1376
|
}
|
package/package.json
CHANGED
package/src/Files.js
CHANGED
package/src/models/Site.js
CHANGED
|
@@ -436,12 +436,18 @@ class Site {
|
|
|
436
436
|
// boolean # Show request access link for users without access? Currently unused.
|
|
437
437
|
getShowRequestAccessLink = () => this.attributes.show_request_access_link
|
|
438
438
|
|
|
439
|
-
// string # Custom site footer text
|
|
439
|
+
// string # Custom site footer text for authenticated pages
|
|
440
440
|
getSiteFooter = () => this.attributes.site_footer
|
|
441
441
|
|
|
442
|
-
// string # Custom site header text
|
|
442
|
+
// string # Custom site header text for authenticated pages
|
|
443
443
|
getSiteHeader = () => this.attributes.site_header
|
|
444
444
|
|
|
445
|
+
// string # Custom site footer text for public pages
|
|
446
|
+
getSitePublicFooter = () => this.attributes.site_public_footer
|
|
447
|
+
|
|
448
|
+
// string # Custom site header text for public pages
|
|
449
|
+
getSitePublicHeader = () => this.attributes.site_public_header
|
|
450
|
+
|
|
445
451
|
// string # SMTP server hostname or IP
|
|
446
452
|
getSmtpAddress = () => this.attributes.smtp_address
|
|
447
453
|
|
|
@@ -475,7 +481,7 @@ class Site {
|
|
|
475
481
|
// date-time # If switching plans, when does the new plan take effect?
|
|
476
482
|
getSwitchToPlanDate = () => this.attributes.switch_to_plan_date
|
|
477
483
|
|
|
478
|
-
// boolean #
|
|
484
|
+
// boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
479
485
|
getTlsDisabled = () => this.attributes.tls_disabled
|
|
480
486
|
|
|
481
487
|
// int64 # Number of days left in trial
|
|
@@ -597,7 +603,7 @@ class Site {
|
|
|
597
603
|
// migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
|
|
598
604
|
// session_expiry - double - Session expiry in hours
|
|
599
605
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
|
600
|
-
// tls_disabled - boolean -
|
|
606
|
+
// tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
601
607
|
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
602
608
|
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
603
609
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
|
@@ -671,8 +677,10 @@ class Site {
|
|
|
671
677
|
// color2_link - string - Top bar link color
|
|
672
678
|
// color2_text - string - Page link and button color
|
|
673
679
|
// color2_top_text - string - Top bar text color
|
|
674
|
-
// site_header - string - Custom site header text
|
|
675
|
-
// site_footer - string - Custom site footer text
|
|
680
|
+
// site_header - string - Custom site header text for authenticated pages
|
|
681
|
+
// site_footer - string - Custom site footer text for authenticated pages
|
|
682
|
+
// site_public_header - string - Custom site header text for public pages
|
|
683
|
+
// site_public_footer - string - Custom site footer text for public pages
|
|
676
684
|
// login_help_text - string - Login help text
|
|
677
685
|
// use_dedicated_ips_for_smtp - boolean - If using custom SMTP, should we use dedicated IPs to deliver emails?
|
|
678
686
|
// smtp_address - string - SMTP server hostname or IP
|
|
@@ -889,6 +897,14 @@ class Site {
|
|
|
889
897
|
throw new errors.InvalidParameterError(`Bad parameter: site_footer must be of type String, received ${getType(params.site_footer)}`)
|
|
890
898
|
}
|
|
891
899
|
|
|
900
|
+
if (params.site_public_header && !isString(params.site_public_header)) {
|
|
901
|
+
throw new errors.InvalidParameterError(`Bad parameter: site_public_header must be of type String, received ${getType(params.site_public_header)}`)
|
|
902
|
+
}
|
|
903
|
+
|
|
904
|
+
if (params.site_public_footer && !isString(params.site_public_footer)) {
|
|
905
|
+
throw new errors.InvalidParameterError(`Bad parameter: site_public_footer must be of type String, received ${getType(params.site_public_footer)}`)
|
|
906
|
+
}
|
|
907
|
+
|
|
892
908
|
if (params.login_help_text && !isString(params.login_help_text)) {
|
|
893
909
|
throw new errors.InvalidParameterError(`Bad parameter: login_help_text must be of type String, received ${getType(params.login_help_text)}`)
|
|
894
910
|
}
|