files.com 1.2.281 → 1.2.283

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.2.281
1
+ 1.2.283
@@ -198,6 +198,8 @@
198
198
  "show_request_access_link": true,
199
199
  "site_footer": "example",
200
200
  "site_header": "example",
201
+ "site_public_footer": "example",
202
+ "site_public_header": "example",
201
203
  "smtp_address": "smtp.my-mail-server.com",
202
204
  "smtp_authentication": "plain",
203
205
  "smtp_from": "me@my-mail-server.com",
@@ -440,8 +442,10 @@
440
442
  * `sharing_enabled` (boolean): Allow bundle creation
441
443
  * `show_user_notifications_log_in_link` (boolean): Show log in link in user notifications?
442
444
  * `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
443
- * `site_footer` (string): Custom site footer text
444
- * `site_header` (string): Custom site header text
445
+ * `site_footer` (string): Custom site footer text for authenticated pages
446
+ * `site_header` (string): Custom site header text for authenticated pages
447
+ * `site_public_footer` (string): Custom site footer text for public pages
448
+ * `site_public_header` (string): Custom site header text for public pages
445
449
  * `smtp_address` (string): SMTP server hostname or IP
446
450
  * `smtp_authentication` (string): SMTP server authentication type
447
451
  * `smtp_from` (string): From address to use when mailing through custom SMTP
@@ -453,7 +457,7 @@
453
457
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
454
458
  * `subdomain` (string): Site subdomain
455
459
  * `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
456
- * `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
460
+ * `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
457
461
  * `trial_days_left` (int64): Number of days left in trial
458
462
  * `trial_until` (date-time): When does this Site trial expire?
459
463
  * `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
@@ -619,6 +623,8 @@ await Site.update({
619
623
  'color2_top_text': "#ffffff",
620
624
  'site_header': "example",
621
625
  'site_footer': "example",
626
+ 'site_public_header': "example",
627
+ 'site_public_footer': "example",
622
628
  'login_help_text': "Login page help text.",
623
629
  'use_dedicated_ips_for_smtp': false,
624
630
  'smtp_address': "smtp.my-mail-server.com",
@@ -703,7 +709,7 @@ await Site.update({
703
709
  * `migrate_remote_server_sync_to_sync` (boolean): If true, we will migrate all remote server syncs to the new Sync model.
704
710
  * `session_expiry` (double): Session expiry in hours
705
711
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
706
- * `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
712
+ * `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
707
713
  * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
708
714
  * `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
709
715
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
@@ -777,8 +783,10 @@ await Site.update({
777
783
  * `color2_link` (string): Top bar link color
778
784
  * `color2_text` (string): Page link and button color
779
785
  * `color2_top_text` (string): Top bar text color
780
- * `site_header` (string): Custom site header text
781
- * `site_footer` (string): Custom site footer text
786
+ * `site_header` (string): Custom site header text for authenticated pages
787
+ * `site_footer` (string): Custom site footer text for authenticated pages
788
+ * `site_public_header` (string): Custom site header text for public pages
789
+ * `site_public_footer` (string): Custom site footer text for public pages
782
790
  * `login_help_text` (string): Login help text
783
791
  * `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
784
792
  * `smtp_address` (string): SMTP server hostname or IP
package/lib/Files.js CHANGED
@@ -12,7 +12,7 @@ var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
14
  var language = null;
15
- var version = '1.2.281';
15
+ var version = '1.2.283';
16
16
  var userAgent = "Files.com JavaScript SDK v".concat(version);
17
17
  var logLevel = _Logger.LogLevel.INFO;
18
18
  var debugRequest = false;
@@ -576,14 +576,22 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
576
576
  (0, _defineProperty2.default)(this, "getShowRequestAccessLink", function () {
577
577
  return _this.attributes.show_request_access_link;
578
578
  });
579
- // string # Custom site footer text
579
+ // string # Custom site footer text for authenticated pages
580
580
  (0, _defineProperty2.default)(this, "getSiteFooter", function () {
581
581
  return _this.attributes.site_footer;
582
582
  });
583
- // string # Custom site header text
583
+ // string # Custom site header text for authenticated pages
584
584
  (0, _defineProperty2.default)(this, "getSiteHeader", function () {
585
585
  return _this.attributes.site_header;
586
586
  });
587
+ // string # Custom site footer text for public pages
588
+ (0, _defineProperty2.default)(this, "getSitePublicFooter", function () {
589
+ return _this.attributes.site_public_footer;
590
+ });
591
+ // string # Custom site header text for public pages
592
+ (0, _defineProperty2.default)(this, "getSitePublicHeader", function () {
593
+ return _this.attributes.site_public_header;
594
+ });
587
595
  // string # SMTP server hostname or IP
588
596
  (0, _defineProperty2.default)(this, "getSmtpAddress", function () {
589
597
  return _this.attributes.smtp_address;
@@ -628,7 +636,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
628
636
  (0, _defineProperty2.default)(this, "getSwitchToPlanDate", function () {
629
637
  return _this.attributes.switch_to_plan_date;
630
638
  });
631
- // boolean # DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
639
+ // boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
632
640
  (0, _defineProperty2.default)(this, "getTlsDisabled", function () {
633
641
  return _this.attributes.tls_disabled;
634
642
  });
@@ -812,7 +820,7 @@ _Site = Site;
812
820
  // migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
813
821
  // session_expiry - double - Session expiry in hours
814
822
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
815
- // tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
823
+ // tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
816
824
  // sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
817
825
  // sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
818
826
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
@@ -886,8 +894,10 @@ _Site = Site;
886
894
  // color2_link - string - Top bar link color
887
895
  // color2_text - string - Page link and button color
888
896
  // color2_top_text - string - Top bar text color
889
- // site_header - string - Custom site header text
890
- // site_footer - string - Custom site footer text
897
+ // site_header - string - Custom site header text for authenticated pages
898
+ // site_footer - string - Custom site footer text for authenticated pages
899
+ // site_public_header - string - Custom site header text for public pages
900
+ // site_public_footer - string - Custom site footer text for public pages
891
901
  // login_help_text - string - Login help text
892
902
  // use_dedicated_ips_for_smtp - boolean - If using custom SMTP, should we use dedicated IPs to deliver emails?
893
903
  // smtp_address - string - SMTP server hostname or IP
@@ -1199,156 +1209,168 @@ _Site = Site;
1199
1209
  }
1200
1210
  throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params.site_footer)));
1201
1211
  case 43:
1202
- if (!(params.login_help_text && !(0, _utils.isString)(params.login_help_text))) {
1212
+ if (!(params.site_public_header && !(0, _utils.isString)(params.site_public_header))) {
1203
1213
  _context3.next = 44;
1204
1214
  break;
1205
1215
  }
1206
- throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params.login_help_text)));
1216
+ throw new errors.InvalidParameterError("Bad parameter: site_public_header must be of type String, received ".concat((0, _utils.getType)(params.site_public_header)));
1207
1217
  case 44:
1208
- if (!(params.smtp_address && !(0, _utils.isString)(params.smtp_address))) {
1218
+ if (!(params.site_public_footer && !(0, _utils.isString)(params.site_public_footer))) {
1209
1219
  _context3.next = 45;
1210
1220
  break;
1211
1221
  }
1212
- throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params.smtp_address)));
1222
+ throw new errors.InvalidParameterError("Bad parameter: site_public_footer must be of type String, received ".concat((0, _utils.getType)(params.site_public_footer)));
1213
1223
  case 45:
1214
- if (!(params.smtp_authentication && !(0, _utils.isString)(params.smtp_authentication))) {
1224
+ if (!(params.login_help_text && !(0, _utils.isString)(params.login_help_text))) {
1215
1225
  _context3.next = 46;
1216
1226
  break;
1217
1227
  }
1218
- throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params.smtp_authentication)));
1228
+ throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params.login_help_text)));
1219
1229
  case 46:
1220
- if (!(params.smtp_from && !(0, _utils.isString)(params.smtp_from))) {
1230
+ if (!(params.smtp_address && !(0, _utils.isString)(params.smtp_address))) {
1221
1231
  _context3.next = 47;
1222
1232
  break;
1223
1233
  }
1224
- throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params.smtp_from)));
1234
+ throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params.smtp_address)));
1225
1235
  case 47:
1226
- if (!(params.smtp_username && !(0, _utils.isString)(params.smtp_username))) {
1236
+ if (!(params.smtp_authentication && !(0, _utils.isString)(params.smtp_authentication))) {
1227
1237
  _context3.next = 48;
1228
1238
  break;
1229
1239
  }
1230
- throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params.smtp_username)));
1240
+ throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params.smtp_authentication)));
1231
1241
  case 48:
1232
- if (!(params.smtp_port && !(0, _utils.isInt)(params.smtp_port))) {
1242
+ if (!(params.smtp_from && !(0, _utils.isString)(params.smtp_from))) {
1233
1243
  _context3.next = 49;
1234
1244
  break;
1235
1245
  }
1236
- throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params.smtp_port)));
1246
+ throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params.smtp_from)));
1237
1247
  case 49:
1238
- if (!(params.ldap_type && !(0, _utils.isString)(params.ldap_type))) {
1248
+ if (!(params.smtp_username && !(0, _utils.isString)(params.smtp_username))) {
1239
1249
  _context3.next = 50;
1240
1250
  break;
1241
1251
  }
1242
- throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params.ldap_type)));
1252
+ throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params.smtp_username)));
1243
1253
  case 50:
1244
- if (!(params.ldap_host && !(0, _utils.isString)(params.ldap_host))) {
1254
+ if (!(params.smtp_port && !(0, _utils.isInt)(params.smtp_port))) {
1245
1255
  _context3.next = 51;
1246
1256
  break;
1247
1257
  }
1248
- throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params.ldap_host)));
1258
+ throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params.smtp_port)));
1249
1259
  case 51:
1250
- if (!(params.ldap_host_2 && !(0, _utils.isString)(params.ldap_host_2))) {
1260
+ if (!(params.ldap_type && !(0, _utils.isString)(params.ldap_type))) {
1251
1261
  _context3.next = 52;
1252
1262
  break;
1253
1263
  }
1254
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params.ldap_host_2)));
1264
+ throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params.ldap_type)));
1255
1265
  case 52:
1256
- if (!(params.ldap_host_3 && !(0, _utils.isString)(params.ldap_host_3))) {
1266
+ if (!(params.ldap_host && !(0, _utils.isString)(params.ldap_host))) {
1257
1267
  _context3.next = 53;
1258
1268
  break;
1259
1269
  }
1260
- throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params.ldap_host_3)));
1270
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params.ldap_host)));
1261
1271
  case 53:
1262
- if (!(params.ldap_port && !(0, _utils.isInt)(params.ldap_port))) {
1272
+ if (!(params.ldap_host_2 && !(0, _utils.isString)(params.ldap_host_2))) {
1263
1273
  _context3.next = 54;
1264
1274
  break;
1265
1275
  }
1266
- throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params.ldap_port)));
1276
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params.ldap_host_2)));
1267
1277
  case 54:
1268
- if (!(params.ldap_username && !(0, _utils.isString)(params.ldap_username))) {
1278
+ if (!(params.ldap_host_3 && !(0, _utils.isString)(params.ldap_host_3))) {
1269
1279
  _context3.next = 55;
1270
1280
  break;
1271
1281
  }
1272
- throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params.ldap_username)));
1282
+ throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params.ldap_host_3)));
1273
1283
  case 55:
1274
- if (!(params.ldap_username_field && !(0, _utils.isString)(params.ldap_username_field))) {
1284
+ if (!(params.ldap_port && !(0, _utils.isInt)(params.ldap_port))) {
1275
1285
  _context3.next = 56;
1276
1286
  break;
1277
1287
  }
1278
- throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params.ldap_username_field)));
1288
+ throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params.ldap_port)));
1279
1289
  case 56:
1280
- if (!(params.ldap_domain && !(0, _utils.isString)(params.ldap_domain))) {
1290
+ if (!(params.ldap_username && !(0, _utils.isString)(params.ldap_username))) {
1281
1291
  _context3.next = 57;
1282
1292
  break;
1283
1293
  }
1284
- throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params.ldap_domain)));
1294
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params.ldap_username)));
1285
1295
  case 57:
1286
- if (!(params.ldap_user_action && !(0, _utils.isString)(params.ldap_user_action))) {
1296
+ if (!(params.ldap_username_field && !(0, _utils.isString)(params.ldap_username_field))) {
1287
1297
  _context3.next = 58;
1288
1298
  break;
1289
1299
  }
1290
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params.ldap_user_action)));
1300
+ throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params.ldap_username_field)));
1291
1301
  case 58:
1292
- if (!(params.ldap_group_action && !(0, _utils.isString)(params.ldap_group_action))) {
1302
+ if (!(params.ldap_domain && !(0, _utils.isString)(params.ldap_domain))) {
1293
1303
  _context3.next = 59;
1294
1304
  break;
1295
1305
  }
1296
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_action)));
1306
+ throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params.ldap_domain)));
1297
1307
  case 59:
1298
- if (!(params.ldap_user_include_groups && !(0, _utils.isString)(params.ldap_user_include_groups))) {
1308
+ if (!(params.ldap_user_action && !(0, _utils.isString)(params.ldap_user_action))) {
1299
1309
  _context3.next = 60;
1300
1310
  break;
1301
1311
  }
1302
- throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params.ldap_user_include_groups)));
1312
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params.ldap_user_action)));
1303
1313
  case 60:
1304
- if (!(params.ldap_group_exclusion && !(0, _utils.isString)(params.ldap_group_exclusion))) {
1314
+ if (!(params.ldap_group_action && !(0, _utils.isString)(params.ldap_group_action))) {
1305
1315
  _context3.next = 61;
1306
1316
  break;
1307
1317
  }
1308
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_exclusion)));
1318
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_action)));
1309
1319
  case 61:
1310
- if (!(params.ldap_group_inclusion && !(0, _utils.isString)(params.ldap_group_inclusion))) {
1320
+ if (!(params.ldap_user_include_groups && !(0, _utils.isString)(params.ldap_user_include_groups))) {
1311
1321
  _context3.next = 62;
1312
1322
  break;
1313
1323
  }
1314
- throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_inclusion)));
1324
+ throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params.ldap_user_include_groups)));
1315
1325
  case 62:
1316
- if (!(params.ldap_base_dn && !(0, _utils.isString)(params.ldap_base_dn))) {
1326
+ if (!(params.ldap_group_exclusion && !(0, _utils.isString)(params.ldap_group_exclusion))) {
1317
1327
  _context3.next = 63;
1318
1328
  break;
1319
1329
  }
1320
- throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params.ldap_base_dn)));
1330
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_exclusion)));
1321
1331
  case 63:
1322
- if (!(params.ldap_password_change && !(0, _utils.isString)(params.ldap_password_change))) {
1332
+ if (!(params.ldap_group_inclusion && !(0, _utils.isString)(params.ldap_group_inclusion))) {
1323
1333
  _context3.next = 64;
1324
1334
  break;
1325
1335
  }
1326
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params.ldap_password_change)));
1336
+ throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_inclusion)));
1327
1337
  case 64:
1328
- if (!(params.ldap_password_change_confirmation && !(0, _utils.isString)(params.ldap_password_change_confirmation))) {
1338
+ if (!(params.ldap_base_dn && !(0, _utils.isString)(params.ldap_base_dn))) {
1329
1339
  _context3.next = 65;
1330
1340
  break;
1331
1341
  }
1332
- throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params.ldap_password_change_confirmation)));
1342
+ throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params.ldap_base_dn)));
1333
1343
  case 65:
1334
- if (!(params.smtp_password && !(0, _utils.isString)(params.smtp_password))) {
1344
+ if (!(params.ldap_password_change && !(0, _utils.isString)(params.ldap_password_change))) {
1335
1345
  _context3.next = 66;
1336
1346
  break;
1337
1347
  }
1338
- throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params.smtp_password)));
1348
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params.ldap_password_change)));
1339
1349
  case 66:
1340
- if (!(params.session_expiry_minutes && !(0, _utils.isInt)(params.session_expiry_minutes))) {
1350
+ if (!(params.ldap_password_change_confirmation && !(0, _utils.isString)(params.ldap_password_change_confirmation))) {
1341
1351
  _context3.next = 67;
1342
1352
  break;
1343
1353
  }
1344
- throw new errors.InvalidParameterError("Bad parameter: session_expiry_minutes must be of type Int, received ".concat((0, _utils.getType)(params.session_expiry_minutes)));
1354
+ throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params.ldap_password_change_confirmation)));
1345
1355
  case 67:
1346
- _context3.next = 68;
1347
- return _Api.default.sendRequest('/site', 'PATCH', params, options);
1356
+ if (!(params.smtp_password && !(0, _utils.isString)(params.smtp_password))) {
1357
+ _context3.next = 68;
1358
+ break;
1359
+ }
1360
+ throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params.smtp_password)));
1348
1361
  case 68:
1362
+ if (!(params.session_expiry_minutes && !(0, _utils.isInt)(params.session_expiry_minutes))) {
1363
+ _context3.next = 69;
1364
+ break;
1365
+ }
1366
+ throw new errors.InvalidParameterError("Bad parameter: session_expiry_minutes must be of type Int, received ".concat((0, _utils.getType)(params.session_expiry_minutes)));
1367
+ case 69:
1368
+ _context3.next = 70;
1369
+ return _Api.default.sendRequest('/site', 'PATCH', params, options);
1370
+ case 70:
1349
1371
  response = _context3.sent;
1350
1372
  return _context3.abrupt("return", new _Site(response === null || response === void 0 ? void 0 : response.data, options));
1351
- case 69:
1373
+ case 71:
1352
1374
  case "end":
1353
1375
  return _context3.stop();
1354
1376
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.2.281",
3
+ "version": "1.2.283",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -6,7 +6,7 @@ let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
8
  let language = null
9
- const version = '1.2.281'
9
+ const version = '1.2.283'
10
10
  let userAgent = `Files.com JavaScript SDK v${version}`
11
11
 
12
12
  let logLevel = LogLevel.INFO
@@ -436,12 +436,18 @@ class Site {
436
436
  // boolean # Show request access link for users without access? Currently unused.
437
437
  getShowRequestAccessLink = () => this.attributes.show_request_access_link
438
438
 
439
- // string # Custom site footer text
439
+ // string # Custom site footer text for authenticated pages
440
440
  getSiteFooter = () => this.attributes.site_footer
441
441
 
442
- // string # Custom site header text
442
+ // string # Custom site header text for authenticated pages
443
443
  getSiteHeader = () => this.attributes.site_header
444
444
 
445
+ // string # Custom site footer text for public pages
446
+ getSitePublicFooter = () => this.attributes.site_public_footer
447
+
448
+ // string # Custom site header text for public pages
449
+ getSitePublicHeader = () => this.attributes.site_public_header
450
+
445
451
  // string # SMTP server hostname or IP
446
452
  getSmtpAddress = () => this.attributes.smtp_address
447
453
 
@@ -475,7 +481,7 @@ class Site {
475
481
  // date-time # If switching plans, when does the new plan take effect?
476
482
  getSwitchToPlanDate = () => this.attributes.switch_to_plan_date
477
483
 
478
- // boolean # DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
484
+ // boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
479
485
  getTlsDisabled = () => this.attributes.tls_disabled
480
486
 
481
487
  // int64 # Number of days left in trial
@@ -597,7 +603,7 @@ class Site {
597
603
  // migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
598
604
  // session_expiry - double - Session expiry in hours
599
605
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
600
- // tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
606
+ // tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
601
607
  // sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
602
608
  // sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
603
609
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
@@ -671,8 +677,10 @@ class Site {
671
677
  // color2_link - string - Top bar link color
672
678
  // color2_text - string - Page link and button color
673
679
  // color2_top_text - string - Top bar text color
674
- // site_header - string - Custom site header text
675
- // site_footer - string - Custom site footer text
680
+ // site_header - string - Custom site header text for authenticated pages
681
+ // site_footer - string - Custom site footer text for authenticated pages
682
+ // site_public_header - string - Custom site header text for public pages
683
+ // site_public_footer - string - Custom site footer text for public pages
676
684
  // login_help_text - string - Login help text
677
685
  // use_dedicated_ips_for_smtp - boolean - If using custom SMTP, should we use dedicated IPs to deliver emails?
678
686
  // smtp_address - string - SMTP server hostname or IP
@@ -889,6 +897,14 @@ class Site {
889
897
  throw new errors.InvalidParameterError(`Bad parameter: site_footer must be of type String, received ${getType(params.site_footer)}`)
890
898
  }
891
899
 
900
+ if (params.site_public_header && !isString(params.site_public_header)) {
901
+ throw new errors.InvalidParameterError(`Bad parameter: site_public_header must be of type String, received ${getType(params.site_public_header)}`)
902
+ }
903
+
904
+ if (params.site_public_footer && !isString(params.site_public_footer)) {
905
+ throw new errors.InvalidParameterError(`Bad parameter: site_public_footer must be of type String, received ${getType(params.site_public_footer)}`)
906
+ }
907
+
892
908
  if (params.login_help_text && !isString(params.login_help_text)) {
893
909
  throw new errors.InvalidParameterError(`Bad parameter: login_help_text must be of type String, received ${getType(params.login_help_text)}`)
894
910
  }