files.com 1.2.288 → 1.2.290
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/_VERSION +1 -1
- package/docs/models/Site.md +0 -5
- package/docs/models/UserCipherUse.md +5 -3
- package/lib/Files.js +1 -1
- package/lib/models/Site.js +0 -5
- package/lib/models/UserCipherUse.js +8 -4
- package/package.json +1 -1
- package/src/Files.js +1 -1
- package/src/models/Site.js +0 -4
- package/src/models/UserCipherUse.js +6 -3
package/_VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.2.
|
|
1
|
+
1.2.290
|
package/docs/models/Site.md
CHANGED
|
@@ -171,7 +171,6 @@
|
|
|
171
171
|
"site_id": 1,
|
|
172
172
|
"ssl_required": true,
|
|
173
173
|
"timeout_at": "2000-01-01T01:00:00Z",
|
|
174
|
-
"tls_disabled": false,
|
|
175
174
|
"two_factor_setup_needed": false,
|
|
176
175
|
"allowed_2fa_method_sms": true,
|
|
177
176
|
"allowed_2fa_method_totp": true,
|
|
@@ -211,7 +210,6 @@
|
|
|
211
210
|
"ssl_required": true,
|
|
212
211
|
"subdomain": "mysite",
|
|
213
212
|
"switch_to_plan_date": "2000-01-01T01:00:00Z",
|
|
214
|
-
"tls_disabled": true,
|
|
215
213
|
"trial_days_left": 1,
|
|
216
214
|
"trial_until": "2000-01-01T01:00:00Z",
|
|
217
215
|
"use_dedicated_ips_for_smtp": true,
|
|
@@ -457,7 +455,6 @@
|
|
|
457
455
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
|
458
456
|
* `subdomain` (string): Site subdomain
|
|
459
457
|
* `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
|
|
460
|
-
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
461
458
|
* `trial_days_left` (int64): Number of days left in trial
|
|
462
459
|
* `trial_until` (date-time): When does this Site trial expire?
|
|
463
460
|
* `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
|
|
@@ -547,7 +544,6 @@ await Site.update({
|
|
|
547
544
|
'migrate_remote_server_sync_to_sync': false,
|
|
548
545
|
'session_expiry': 1.0,
|
|
549
546
|
'ssl_required': false,
|
|
550
|
-
'tls_disabled': false,
|
|
551
547
|
'sftp_insecure_ciphers': false,
|
|
552
548
|
'sftp_insecure_diffie_hellman': false,
|
|
553
549
|
'disable_files_certificate_generation': false,
|
|
@@ -709,7 +705,6 @@ await Site.update({
|
|
|
709
705
|
* `migrate_remote_server_sync_to_sync` (boolean): If true, we will migrate all remote server syncs to the new Sync model.
|
|
710
706
|
* `session_expiry` (double): Session expiry in hours
|
|
711
707
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
|
712
|
-
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
713
708
|
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
714
709
|
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
715
710
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
|
@@ -5,22 +5,24 @@
|
|
|
5
5
|
```
|
|
6
6
|
{
|
|
7
7
|
"id": 1,
|
|
8
|
+
"user_id": 1,
|
|
9
|
+
"username": "example",
|
|
8
10
|
"protocol_cipher": "TLSv1.2; ECDHE-RSA-AES256-GCM-SHA384",
|
|
9
11
|
"created_at": "2000-01-01T01:00:00Z",
|
|
10
12
|
"insecure": true,
|
|
11
13
|
"interface": "restapi",
|
|
12
|
-
"updated_at": "2000-01-01T01:00:00Z"
|
|
13
|
-
"user_id": 1
|
|
14
|
+
"updated_at": "2000-01-01T01:00:00Z"
|
|
14
15
|
}
|
|
15
16
|
```
|
|
16
17
|
|
|
17
18
|
* `id` (int64): UserCipherUse ID
|
|
19
|
+
* `user_id` (int64): ID of the user who performed this access
|
|
20
|
+
* `username` (string): Username of the user who performed this access
|
|
18
21
|
* `protocol_cipher` (string): The protocol and cipher employed
|
|
19
22
|
* `created_at` (date-time): The earliest recorded use of this combination of interface and protocol and cipher (for this user)
|
|
20
23
|
* `insecure` (boolean): Is this cipher considered insecure?
|
|
21
24
|
* `interface` (string): The interface accessed
|
|
22
25
|
* `updated_at` (date-time): The most recent use of this combination of interface and protocol and cipher (for this user)
|
|
23
|
-
* `user_id` (int64): ID of the user who performed this access
|
|
24
26
|
|
|
25
27
|
---
|
|
26
28
|
|
package/lib/Files.js
CHANGED
|
@@ -12,7 +12,7 @@ var apiKey;
|
|
|
12
12
|
var baseUrl = 'https://app.files.com';
|
|
13
13
|
var sessionId = null;
|
|
14
14
|
var language = null;
|
|
15
|
-
var version = '1.2.
|
|
15
|
+
var version = '1.2.290';
|
|
16
16
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
|
17
17
|
var logLevel = _Logger.LogLevel.INFO;
|
|
18
18
|
var debugRequest = false;
|
package/lib/models/Site.js
CHANGED
|
@@ -636,10 +636,6 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
|
636
636
|
(0, _defineProperty2.default)(this, "getSwitchToPlanDate", function () {
|
|
637
637
|
return _this.attributes.switch_to_plan_date;
|
|
638
638
|
});
|
|
639
|
-
// boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
640
|
-
(0, _defineProperty2.default)(this, "getTlsDisabled", function () {
|
|
641
|
-
return _this.attributes.tls_disabled;
|
|
642
|
-
});
|
|
643
639
|
// int64 # Number of days left in trial
|
|
644
640
|
(0, _defineProperty2.default)(this, "getTrialDaysLeft", function () {
|
|
645
641
|
return _this.attributes.trial_days_left;
|
|
@@ -820,7 +816,6 @@ _Site = Site;
|
|
|
820
816
|
// migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
|
|
821
817
|
// session_expiry - double - Session expiry in hours
|
|
822
818
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
|
823
|
-
// tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
824
819
|
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
825
820
|
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
826
821
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
|
@@ -36,6 +36,14 @@ var UserCipherUse = /*#__PURE__*/(0, _createClass2.default)(function UserCipherU
|
|
|
36
36
|
(0, _defineProperty2.default)(this, "getId", function () {
|
|
37
37
|
return _this.attributes.id;
|
|
38
38
|
});
|
|
39
|
+
// int64 # ID of the user who performed this access
|
|
40
|
+
(0, _defineProperty2.default)(this, "getUserId", function () {
|
|
41
|
+
return _this.attributes.user_id;
|
|
42
|
+
});
|
|
43
|
+
// string # Username of the user who performed this access
|
|
44
|
+
(0, _defineProperty2.default)(this, "getUsername", function () {
|
|
45
|
+
return _this.attributes.username;
|
|
46
|
+
});
|
|
39
47
|
// string # The protocol and cipher employed
|
|
40
48
|
(0, _defineProperty2.default)(this, "getProtocolCipher", function () {
|
|
41
49
|
return _this.attributes.protocol_cipher;
|
|
@@ -56,10 +64,6 @@ var UserCipherUse = /*#__PURE__*/(0, _createClass2.default)(function UserCipherU
|
|
|
56
64
|
(0, _defineProperty2.default)(this, "getUpdatedAt", function () {
|
|
57
65
|
return _this.attributes.updated_at;
|
|
58
66
|
});
|
|
59
|
-
// int64 # ID of the user who performed this access
|
|
60
|
-
(0, _defineProperty2.default)(this, "getUserId", function () {
|
|
61
|
-
return _this.attributes.user_id;
|
|
62
|
-
});
|
|
63
67
|
Object.entries(attributes).forEach(function (_ref) {
|
|
64
68
|
var _ref2 = (0, _slicedToArray2.default)(_ref, 2),
|
|
65
69
|
key = _ref2[0],
|
package/package.json
CHANGED
package/src/Files.js
CHANGED
package/src/models/Site.js
CHANGED
|
@@ -481,9 +481,6 @@ class Site {
|
|
|
481
481
|
// date-time # If switching plans, when does the new plan take effect?
|
|
482
482
|
getSwitchToPlanDate = () => this.attributes.switch_to_plan_date
|
|
483
483
|
|
|
484
|
-
// boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
485
|
-
getTlsDisabled = () => this.attributes.tls_disabled
|
|
486
|
-
|
|
487
484
|
// int64 # Number of days left in trial
|
|
488
485
|
getTrialDaysLeft = () => this.attributes.trial_days_left
|
|
489
486
|
|
|
@@ -603,7 +600,6 @@ class Site {
|
|
|
603
600
|
// migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
|
|
604
601
|
// session_expiry - double - Session expiry in hours
|
|
605
602
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
|
606
|
-
// tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
607
603
|
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
608
604
|
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
609
605
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
|
@@ -31,6 +31,12 @@ class UserCipherUse {
|
|
|
31
31
|
// int64 # UserCipherUse ID
|
|
32
32
|
getId = () => this.attributes.id
|
|
33
33
|
|
|
34
|
+
// int64 # ID of the user who performed this access
|
|
35
|
+
getUserId = () => this.attributes.user_id
|
|
36
|
+
|
|
37
|
+
// string # Username of the user who performed this access
|
|
38
|
+
getUsername = () => this.attributes.username
|
|
39
|
+
|
|
34
40
|
// string # The protocol and cipher employed
|
|
35
41
|
getProtocolCipher = () => this.attributes.protocol_cipher
|
|
36
42
|
|
|
@@ -46,9 +52,6 @@ class UserCipherUse {
|
|
|
46
52
|
// date-time # The most recent use of this combination of interface and protocol and cipher (for this user)
|
|
47
53
|
getUpdatedAt = () => this.attributes.updated_at
|
|
48
54
|
|
|
49
|
-
// int64 # ID of the user who performed this access
|
|
50
|
-
getUserId = () => this.attributes.user_id
|
|
51
|
-
|
|
52
55
|
// Parameters:
|
|
53
56
|
// user_id - int64 - User ID. If provided, will return uses for this user.
|
|
54
57
|
// cursor - string - Used for pagination. When a list request has more records available, cursors are provided in the response headers `X-Files-Cursor-Next` and `X-Files-Cursor-Prev`. Send one of those cursor value here to resume an existing list from the next available record. Note: many of our SDKs have iterator methods that will automatically handle cursor-based pagination.
|