files.com 1.2.289 → 1.2.291

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.2.289
1
+ 1.2.291
@@ -8,6 +8,8 @@
8
8
  "expires_at": "2000-01-01T01:00:00Z",
9
9
  "name": "key name",
10
10
  "user_id": 1,
11
+ "public_key_md5": "7f8bc1210b09b9ddf469e6b6b8920e76",
12
+ "private_key_md5": "ab236cfe4a195f0226bc2e674afdd6b0",
11
13
  "public_key": "7f8bc1210b09b9ddf469e6b6b8920e76",
12
14
  "private_key": "ab236cfe4a195f0226bc2e674afdd6b0",
13
15
  "private_key_password": "[your GPG private key password]"
@@ -18,6 +20,8 @@
18
20
  * `expires_at` (date-time): Your GPG key expiration date.
19
21
  * `name` (string): Your GPG key name.
20
22
  * `user_id` (int64): GPG owner's user id
23
+ * `public_key_md5` (string): MD5 hash of your GPG public key
24
+ * `private_key_md5` (string): MD5 hash of your GPG private key.
21
25
  * `public_key` (string): Your GPG public key
22
26
  * `private_key` (string): Your GPG private key.
23
27
  * `private_key_password` (string): Your GPG private key password. Only required for password protected keys.
@@ -79,8 +83,8 @@ await GpgKey.create({
79
83
  ### Parameters
80
84
 
81
85
  * `user_id` (int64): User ID. Provide a value of `0` to operate the current session's user.
82
- * `public_key` (string): Your GPG public key
83
- * `private_key` (string): Your GPG private key.
86
+ * `public_key` (string): MD5 hash of your GPG public key
87
+ * `private_key` (string): MD5 hash of your GPG private key.
84
88
  * `private_key_password` (string): Your GPG private key password. Only required for password protected keys.
85
89
  * `name` (string): Required - Your GPG key name.
86
90
  * `generate_expires_at` (string): Expiration date of the key. Used for the generation of the key. Will be ignored if `generate_keypair` is false.
@@ -106,8 +110,8 @@ await gpg_key.update({
106
110
  ### Parameters
107
111
 
108
112
  * `id` (int64): Required - Gpg Key ID.
109
- * `public_key` (string): Your GPG public key
110
- * `private_key` (string): Your GPG private key.
113
+ * `public_key` (string): MD5 hash of your GPG public key
114
+ * `private_key` (string): MD5 hash of your GPG private key.
111
115
  * `private_key_password` (string): Your GPG private key password. Only required for password protected keys.
112
116
  * `name` (string): Your GPG key name.
113
117
 
@@ -119,6 +123,8 @@ await gpg_key.update({
119
123
  "expires_at": "2000-01-01T01:00:00Z",
120
124
  "name": "key name",
121
125
  "user_id": 1,
126
+ "public_key_md5": "7f8bc1210b09b9ddf469e6b6b8920e76",
127
+ "private_key_md5": "ab236cfe4a195f0226bc2e674afdd6b0",
122
128
  "public_key": "7f8bc1210b09b9ddf469e6b6b8920e76",
123
129
  "private_key": "ab236cfe4a195f0226bc2e674afdd6b0",
124
130
  "private_key_password": "[your GPG private key password]"
@@ -171,7 +171,6 @@
171
171
  "site_id": 1,
172
172
  "ssl_required": true,
173
173
  "timeout_at": "2000-01-01T01:00:00Z",
174
- "tls_disabled": false,
175
174
  "two_factor_setup_needed": false,
176
175
  "allowed_2fa_method_sms": true,
177
176
  "allowed_2fa_method_totp": true,
@@ -211,7 +210,6 @@
211
210
  "ssl_required": true,
212
211
  "subdomain": "mysite",
213
212
  "switch_to_plan_date": "2000-01-01T01:00:00Z",
214
- "tls_disabled": true,
215
213
  "trial_days_left": 1,
216
214
  "trial_until": "2000-01-01T01:00:00Z",
217
215
  "use_dedicated_ips_for_smtp": true,
@@ -457,7 +455,6 @@
457
455
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
458
456
  * `subdomain` (string): Site subdomain
459
457
  * `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
460
- * `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
461
458
  * `trial_days_left` (int64): Number of days left in trial
462
459
  * `trial_until` (date-time): When does this Site trial expire?
463
460
  * `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
@@ -547,7 +544,6 @@ await Site.update({
547
544
  'migrate_remote_server_sync_to_sync': false,
548
545
  'session_expiry': 1.0,
549
546
  'ssl_required': false,
550
- 'tls_disabled': false,
551
547
  'sftp_insecure_ciphers': false,
552
548
  'sftp_insecure_diffie_hellman': false,
553
549
  'disable_files_certificate_generation': false,
@@ -709,7 +705,6 @@ await Site.update({
709
705
  * `migrate_remote_server_sync_to_sync` (boolean): If true, we will migrate all remote server syncs to the new Sync model.
710
706
  * `session_expiry` (double): Session expiry in hours
711
707
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
712
- * `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
713
708
  * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
714
709
  * `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
715
710
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
package/lib/Files.js CHANGED
@@ -12,7 +12,7 @@ var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
14
  var language = null;
15
- var version = '1.2.289';
15
+ var version = '1.2.291';
16
16
  var userAgent = "Files.com JavaScript SDK v".concat(version);
17
17
  var logLevel = _Logger.LogLevel.INFO;
18
18
  var debugRequest = false;
@@ -60,6 +60,20 @@ var GpgKey = /*#__PURE__*/(0, _createClass2.default)(function GpgKey() {
60
60
  (0, _defineProperty2.default)(this, "setUserId", function (value) {
61
61
  _this.attributes.user_id = value;
62
62
  });
63
+ // string # MD5 hash of your GPG public key
64
+ (0, _defineProperty2.default)(this, "getPublicKeyMd5", function () {
65
+ return _this.attributes.public_key_md5;
66
+ });
67
+ (0, _defineProperty2.default)(this, "setPublicKeyMd5", function (value) {
68
+ _this.attributes.public_key_md5 = value;
69
+ });
70
+ // string # MD5 hash of your GPG private key.
71
+ (0, _defineProperty2.default)(this, "getPrivateKeyMd5", function () {
72
+ return _this.attributes.private_key_md5;
73
+ });
74
+ (0, _defineProperty2.default)(this, "setPrivateKeyMd5", function (value) {
75
+ _this.attributes.private_key_md5 = value;
76
+ });
63
77
  // string # Your GPG public key
64
78
  (0, _defineProperty2.default)(this, "getPublicKey", function () {
65
79
  return _this.attributes.public_key;
@@ -110,8 +124,8 @@ var GpgKey = /*#__PURE__*/(0, _createClass2.default)(function GpgKey() {
110
124
  _this.attributes.generate_email = value;
111
125
  });
112
126
  // Parameters:
113
- // public_key - string - Your GPG public key
114
- // private_key - string - Your GPG private key.
127
+ // public_key - string - MD5 hash of your GPG public key
128
+ // private_key - string - MD5 hash of your GPG private key.
115
129
  // private_key_password - string - Your GPG private key password. Only required for password protected keys.
116
130
  // name - string - Your GPG key name.
117
131
  (0, _defineProperty2.default)(this, "update", /*#__PURE__*/(0, _asyncToGenerator2.default)(/*#__PURE__*/_regenerator.default.mark(function _callee() {
@@ -390,8 +404,8 @@ _GpgKey = GpgKey;
390
404
  });
391
405
  // Parameters:
392
406
  // user_id - int64 - User ID. Provide a value of `0` to operate the current session's user.
393
- // public_key - string - Your GPG public key
394
- // private_key - string - Your GPG private key.
407
+ // public_key - string - MD5 hash of your GPG public key
408
+ // private_key - string - MD5 hash of your GPG private key.
395
409
  // private_key_password - string - Your GPG private key password. Only required for password protected keys.
396
410
  // name (required) - string - Your GPG key name.
397
411
  // generate_expires_at - string - Expiration date of the key. Used for the generation of the key. Will be ignored if `generate_keypair` is false.
@@ -636,10 +636,6 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
636
636
  (0, _defineProperty2.default)(this, "getSwitchToPlanDate", function () {
637
637
  return _this.attributes.switch_to_plan_date;
638
638
  });
639
- // boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
640
- (0, _defineProperty2.default)(this, "getTlsDisabled", function () {
641
- return _this.attributes.tls_disabled;
642
- });
643
639
  // int64 # Number of days left in trial
644
640
  (0, _defineProperty2.default)(this, "getTrialDaysLeft", function () {
645
641
  return _this.attributes.trial_days_left;
@@ -820,7 +816,6 @@ _Site = Site;
820
816
  // migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
821
817
  // session_expiry - double - Session expiry in hours
822
818
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
823
- // tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
824
819
  // sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
825
820
  // sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
826
821
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.2.289",
3
+ "version": "1.2.291",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -6,7 +6,7 @@ let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
8
  let language = null
9
- const version = '1.2.289'
9
+ const version = '1.2.291'
10
10
  let userAgent = `Files.com JavaScript SDK v${version}`
11
11
 
12
12
  let logLevel = LogLevel.INFO
@@ -56,6 +56,20 @@ class GpgKey {
56
56
  this.attributes.user_id = value
57
57
  }
58
58
 
59
+ // string # MD5 hash of your GPG public key
60
+ getPublicKeyMd5 = () => this.attributes.public_key_md5
61
+
62
+ setPublicKeyMd5 = value => {
63
+ this.attributes.public_key_md5 = value
64
+ }
65
+
66
+ // string # MD5 hash of your GPG private key.
67
+ getPrivateKeyMd5 = () => this.attributes.private_key_md5
68
+
69
+ setPrivateKeyMd5 = value => {
70
+ this.attributes.private_key_md5 = value
71
+ }
72
+
59
73
  // string # Your GPG public key
60
74
  getPublicKey = () => this.attributes.public_key
61
75
 
@@ -106,8 +120,8 @@ class GpgKey {
106
120
  }
107
121
 
108
122
  // Parameters:
109
- // public_key - string - Your GPG public key
110
- // private_key - string - Your GPG private key.
123
+ // public_key - string - MD5 hash of your GPG public key
124
+ // private_key - string - MD5 hash of your GPG private key.
111
125
  // private_key_password - string - Your GPG private key password. Only required for password protected keys.
112
126
  // name - string - Your GPG key name.
113
127
  update = async (params = {}) => {
@@ -246,8 +260,8 @@ class GpgKey {
246
260
 
247
261
  // Parameters:
248
262
  // user_id - int64 - User ID. Provide a value of `0` to operate the current session's user.
249
- // public_key - string - Your GPG public key
250
- // private_key - string - Your GPG private key.
263
+ // public_key - string - MD5 hash of your GPG public key
264
+ // private_key - string - MD5 hash of your GPG private key.
251
265
  // private_key_password - string - Your GPG private key password. Only required for password protected keys.
252
266
  // name (required) - string - Your GPG key name.
253
267
  // generate_expires_at - string - Expiration date of the key. Used for the generation of the key. Will be ignored if `generate_keypair` is false.
@@ -481,9 +481,6 @@ class Site {
481
481
  // date-time # If switching plans, when does the new plan take effect?
482
482
  getSwitchToPlanDate = () => this.attributes.switch_to_plan_date
483
483
 
484
- // boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
485
- getTlsDisabled = () => this.attributes.tls_disabled
486
-
487
484
  // int64 # Number of days left in trial
488
485
  getTrialDaysLeft = () => this.attributes.trial_days_left
489
486
 
@@ -603,7 +600,6 @@ class Site {
603
600
  // migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
604
601
  // session_expiry - double - Session expiry in hours
605
602
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
606
- // tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
607
603
  // sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
608
604
  // sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
609
605
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.