files.com 1.2.288 → 1.2.290

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.2.288
1
+ 1.2.290
@@ -171,7 +171,6 @@
171
171
  "site_id": 1,
172
172
  "ssl_required": true,
173
173
  "timeout_at": "2000-01-01T01:00:00Z",
174
- "tls_disabled": false,
175
174
  "two_factor_setup_needed": false,
176
175
  "allowed_2fa_method_sms": true,
177
176
  "allowed_2fa_method_totp": true,
@@ -211,7 +210,6 @@
211
210
  "ssl_required": true,
212
211
  "subdomain": "mysite",
213
212
  "switch_to_plan_date": "2000-01-01T01:00:00Z",
214
- "tls_disabled": true,
215
213
  "trial_days_left": 1,
216
214
  "trial_until": "2000-01-01T01:00:00Z",
217
215
  "use_dedicated_ips_for_smtp": true,
@@ -457,7 +455,6 @@
457
455
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
458
456
  * `subdomain` (string): Site subdomain
459
457
  * `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
460
- * `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
461
458
  * `trial_days_left` (int64): Number of days left in trial
462
459
  * `trial_until` (date-time): When does this Site trial expire?
463
460
  * `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
@@ -547,7 +544,6 @@ await Site.update({
547
544
  'migrate_remote_server_sync_to_sync': false,
548
545
  'session_expiry': 1.0,
549
546
  'ssl_required': false,
550
- 'tls_disabled': false,
551
547
  'sftp_insecure_ciphers': false,
552
548
  'sftp_insecure_diffie_hellman': false,
553
549
  'disable_files_certificate_generation': false,
@@ -709,7 +705,6 @@ await Site.update({
709
705
  * `migrate_remote_server_sync_to_sync` (boolean): If true, we will migrate all remote server syncs to the new Sync model.
710
706
  * `session_expiry` (double): Session expiry in hours
711
707
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
712
- * `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
713
708
  * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
714
709
  * `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
715
710
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
@@ -5,22 +5,24 @@
5
5
  ```
6
6
  {
7
7
  "id": 1,
8
+ "user_id": 1,
9
+ "username": "example",
8
10
  "protocol_cipher": "TLSv1.2; ECDHE-RSA-AES256-GCM-SHA384",
9
11
  "created_at": "2000-01-01T01:00:00Z",
10
12
  "insecure": true,
11
13
  "interface": "restapi",
12
- "updated_at": "2000-01-01T01:00:00Z",
13
- "user_id": 1
14
+ "updated_at": "2000-01-01T01:00:00Z"
14
15
  }
15
16
  ```
16
17
 
17
18
  * `id` (int64): UserCipherUse ID
19
+ * `user_id` (int64): ID of the user who performed this access
20
+ * `username` (string): Username of the user who performed this access
18
21
  * `protocol_cipher` (string): The protocol and cipher employed
19
22
  * `created_at` (date-time): The earliest recorded use of this combination of interface and protocol and cipher (for this user)
20
23
  * `insecure` (boolean): Is this cipher considered insecure?
21
24
  * `interface` (string): The interface accessed
22
25
  * `updated_at` (date-time): The most recent use of this combination of interface and protocol and cipher (for this user)
23
- * `user_id` (int64): ID of the user who performed this access
24
26
 
25
27
  ---
26
28
 
package/lib/Files.js CHANGED
@@ -12,7 +12,7 @@ var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
14
  var language = null;
15
- var version = '1.2.288';
15
+ var version = '1.2.290';
16
16
  var userAgent = "Files.com JavaScript SDK v".concat(version);
17
17
  var logLevel = _Logger.LogLevel.INFO;
18
18
  var debugRequest = false;
@@ -636,10 +636,6 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
636
636
  (0, _defineProperty2.default)(this, "getSwitchToPlanDate", function () {
637
637
  return _this.attributes.switch_to_plan_date;
638
638
  });
639
- // boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
640
- (0, _defineProperty2.default)(this, "getTlsDisabled", function () {
641
- return _this.attributes.tls_disabled;
642
- });
643
639
  // int64 # Number of days left in trial
644
640
  (0, _defineProperty2.default)(this, "getTrialDaysLeft", function () {
645
641
  return _this.attributes.trial_days_left;
@@ -820,7 +816,6 @@ _Site = Site;
820
816
  // migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
821
817
  // session_expiry - double - Session expiry in hours
822
818
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
823
- // tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
824
819
  // sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
825
820
  // sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
826
821
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
@@ -36,6 +36,14 @@ var UserCipherUse = /*#__PURE__*/(0, _createClass2.default)(function UserCipherU
36
36
  (0, _defineProperty2.default)(this, "getId", function () {
37
37
  return _this.attributes.id;
38
38
  });
39
+ // int64 # ID of the user who performed this access
40
+ (0, _defineProperty2.default)(this, "getUserId", function () {
41
+ return _this.attributes.user_id;
42
+ });
43
+ // string # Username of the user who performed this access
44
+ (0, _defineProperty2.default)(this, "getUsername", function () {
45
+ return _this.attributes.username;
46
+ });
39
47
  // string # The protocol and cipher employed
40
48
  (0, _defineProperty2.default)(this, "getProtocolCipher", function () {
41
49
  return _this.attributes.protocol_cipher;
@@ -56,10 +64,6 @@ var UserCipherUse = /*#__PURE__*/(0, _createClass2.default)(function UserCipherU
56
64
  (0, _defineProperty2.default)(this, "getUpdatedAt", function () {
57
65
  return _this.attributes.updated_at;
58
66
  });
59
- // int64 # ID of the user who performed this access
60
- (0, _defineProperty2.default)(this, "getUserId", function () {
61
- return _this.attributes.user_id;
62
- });
63
67
  Object.entries(attributes).forEach(function (_ref) {
64
68
  var _ref2 = (0, _slicedToArray2.default)(_ref, 2),
65
69
  key = _ref2[0],
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.2.288",
3
+ "version": "1.2.290",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -6,7 +6,7 @@ let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
8
  let language = null
9
- const version = '1.2.288'
9
+ const version = '1.2.290'
10
10
  let userAgent = `Files.com JavaScript SDK v${version}`
11
11
 
12
12
  let logLevel = LogLevel.INFO
@@ -481,9 +481,6 @@ class Site {
481
481
  // date-time # If switching plans, when does the new plan take effect?
482
482
  getSwitchToPlanDate = () => this.attributes.switch_to_plan_date
483
483
 
484
- // boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
485
- getTlsDisabled = () => this.attributes.tls_disabled
486
-
487
484
  // int64 # Number of days left in trial
488
485
  getTrialDaysLeft = () => this.attributes.trial_days_left
489
486
 
@@ -603,7 +600,6 @@ class Site {
603
600
  // migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
604
601
  // session_expiry - double - Session expiry in hours
605
602
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
606
- // tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
607
603
  // sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
608
604
  // sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
609
605
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
@@ -31,6 +31,12 @@ class UserCipherUse {
31
31
  // int64 # UserCipherUse ID
32
32
  getId = () => this.attributes.id
33
33
 
34
+ // int64 # ID of the user who performed this access
35
+ getUserId = () => this.attributes.user_id
36
+
37
+ // string # Username of the user who performed this access
38
+ getUsername = () => this.attributes.username
39
+
34
40
  // string # The protocol and cipher employed
35
41
  getProtocolCipher = () => this.attributes.protocol_cipher
36
42
 
@@ -46,9 +52,6 @@ class UserCipherUse {
46
52
  // date-time # The most recent use of this combination of interface and protocol and cipher (for this user)
47
53
  getUpdatedAt = () => this.attributes.updated_at
48
54
 
49
- // int64 # ID of the user who performed this access
50
- getUserId = () => this.attributes.user_id
51
-
52
55
  // Parameters:
53
56
  // user_id - int64 - User ID. If provided, will return uses for this user.
54
57
  // cursor - string - Used for pagination. When a list request has more records available, cursors are provided in the response headers `X-Files-Cursor-Next` and `X-Files-Cursor-Prev`. Send one of those cursor value here to resume an existing list from the next available record. Note: many of our SDKs have iterator methods that will automatically handle cursor-based pagination.