files.com 1.2.289 → 1.2.291
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/_VERSION +1 -1
- package/docs/models/GpgKey.md +10 -4
- package/docs/models/Site.md +0 -5
- package/lib/Files.js +1 -1
- package/lib/models/GpgKey.js +18 -4
- package/lib/models/Site.js +0 -5
- package/package.json +1 -1
- package/src/Files.js +1 -1
- package/src/models/GpgKey.js +18 -4
- package/src/models/Site.js +0 -4
package/_VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.2.
|
|
1
|
+
1.2.291
|
package/docs/models/GpgKey.md
CHANGED
|
@@ -8,6 +8,8 @@
|
|
|
8
8
|
"expires_at": "2000-01-01T01:00:00Z",
|
|
9
9
|
"name": "key name",
|
|
10
10
|
"user_id": 1,
|
|
11
|
+
"public_key_md5": "7f8bc1210b09b9ddf469e6b6b8920e76",
|
|
12
|
+
"private_key_md5": "ab236cfe4a195f0226bc2e674afdd6b0",
|
|
11
13
|
"public_key": "7f8bc1210b09b9ddf469e6b6b8920e76",
|
|
12
14
|
"private_key": "ab236cfe4a195f0226bc2e674afdd6b0",
|
|
13
15
|
"private_key_password": "[your GPG private key password]"
|
|
@@ -18,6 +20,8 @@
|
|
|
18
20
|
* `expires_at` (date-time): Your GPG key expiration date.
|
|
19
21
|
* `name` (string): Your GPG key name.
|
|
20
22
|
* `user_id` (int64): GPG owner's user id
|
|
23
|
+
* `public_key_md5` (string): MD5 hash of your GPG public key
|
|
24
|
+
* `private_key_md5` (string): MD5 hash of your GPG private key.
|
|
21
25
|
* `public_key` (string): Your GPG public key
|
|
22
26
|
* `private_key` (string): Your GPG private key.
|
|
23
27
|
* `private_key_password` (string): Your GPG private key password. Only required for password protected keys.
|
|
@@ -79,8 +83,8 @@ await GpgKey.create({
|
|
|
79
83
|
### Parameters
|
|
80
84
|
|
|
81
85
|
* `user_id` (int64): User ID. Provide a value of `0` to operate the current session's user.
|
|
82
|
-
* `public_key` (string):
|
|
83
|
-
* `private_key` (string):
|
|
86
|
+
* `public_key` (string): MD5 hash of your GPG public key
|
|
87
|
+
* `private_key` (string): MD5 hash of your GPG private key.
|
|
84
88
|
* `private_key_password` (string): Your GPG private key password. Only required for password protected keys.
|
|
85
89
|
* `name` (string): Required - Your GPG key name.
|
|
86
90
|
* `generate_expires_at` (string): Expiration date of the key. Used for the generation of the key. Will be ignored if `generate_keypair` is false.
|
|
@@ -106,8 +110,8 @@ await gpg_key.update({
|
|
|
106
110
|
### Parameters
|
|
107
111
|
|
|
108
112
|
* `id` (int64): Required - Gpg Key ID.
|
|
109
|
-
* `public_key` (string):
|
|
110
|
-
* `private_key` (string):
|
|
113
|
+
* `public_key` (string): MD5 hash of your GPG public key
|
|
114
|
+
* `private_key` (string): MD5 hash of your GPG private key.
|
|
111
115
|
* `private_key_password` (string): Your GPG private key password. Only required for password protected keys.
|
|
112
116
|
* `name` (string): Your GPG key name.
|
|
113
117
|
|
|
@@ -119,6 +123,8 @@ await gpg_key.update({
|
|
|
119
123
|
"expires_at": "2000-01-01T01:00:00Z",
|
|
120
124
|
"name": "key name",
|
|
121
125
|
"user_id": 1,
|
|
126
|
+
"public_key_md5": "7f8bc1210b09b9ddf469e6b6b8920e76",
|
|
127
|
+
"private_key_md5": "ab236cfe4a195f0226bc2e674afdd6b0",
|
|
122
128
|
"public_key": "7f8bc1210b09b9ddf469e6b6b8920e76",
|
|
123
129
|
"private_key": "ab236cfe4a195f0226bc2e674afdd6b0",
|
|
124
130
|
"private_key_password": "[your GPG private key password]"
|
package/docs/models/Site.md
CHANGED
|
@@ -171,7 +171,6 @@
|
|
|
171
171
|
"site_id": 1,
|
|
172
172
|
"ssl_required": true,
|
|
173
173
|
"timeout_at": "2000-01-01T01:00:00Z",
|
|
174
|
-
"tls_disabled": false,
|
|
175
174
|
"two_factor_setup_needed": false,
|
|
176
175
|
"allowed_2fa_method_sms": true,
|
|
177
176
|
"allowed_2fa_method_totp": true,
|
|
@@ -211,7 +210,6 @@
|
|
|
211
210
|
"ssl_required": true,
|
|
212
211
|
"subdomain": "mysite",
|
|
213
212
|
"switch_to_plan_date": "2000-01-01T01:00:00Z",
|
|
214
|
-
"tls_disabled": true,
|
|
215
213
|
"trial_days_left": 1,
|
|
216
214
|
"trial_until": "2000-01-01T01:00:00Z",
|
|
217
215
|
"use_dedicated_ips_for_smtp": true,
|
|
@@ -457,7 +455,6 @@
|
|
|
457
455
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
|
458
456
|
* `subdomain` (string): Site subdomain
|
|
459
457
|
* `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
|
|
460
|
-
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
461
458
|
* `trial_days_left` (int64): Number of days left in trial
|
|
462
459
|
* `trial_until` (date-time): When does this Site trial expire?
|
|
463
460
|
* `use_dedicated_ips_for_smtp` (boolean): If using custom SMTP, should we use dedicated IPs to deliver emails?
|
|
@@ -547,7 +544,6 @@ await Site.update({
|
|
|
547
544
|
'migrate_remote_server_sync_to_sync': false,
|
|
548
545
|
'session_expiry': 1.0,
|
|
549
546
|
'ssl_required': false,
|
|
550
|
-
'tls_disabled': false,
|
|
551
547
|
'sftp_insecure_ciphers': false,
|
|
552
548
|
'sftp_insecure_diffie_hellman': false,
|
|
553
549
|
'disable_files_certificate_generation': false,
|
|
@@ -709,7 +705,6 @@ await Site.update({
|
|
|
709
705
|
* `migrate_remote_server_sync_to_sync` (boolean): If true, we will migrate all remote server syncs to the new Sync model.
|
|
710
706
|
* `session_expiry` (double): Session expiry in hours
|
|
711
707
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
|
712
|
-
* `tls_disabled` (boolean): This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
713
708
|
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
714
709
|
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
715
710
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
package/lib/Files.js
CHANGED
|
@@ -12,7 +12,7 @@ var apiKey;
|
|
|
12
12
|
var baseUrl = 'https://app.files.com';
|
|
13
13
|
var sessionId = null;
|
|
14
14
|
var language = null;
|
|
15
|
-
var version = '1.2.
|
|
15
|
+
var version = '1.2.291';
|
|
16
16
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
|
17
17
|
var logLevel = _Logger.LogLevel.INFO;
|
|
18
18
|
var debugRequest = false;
|
package/lib/models/GpgKey.js
CHANGED
|
@@ -60,6 +60,20 @@ var GpgKey = /*#__PURE__*/(0, _createClass2.default)(function GpgKey() {
|
|
|
60
60
|
(0, _defineProperty2.default)(this, "setUserId", function (value) {
|
|
61
61
|
_this.attributes.user_id = value;
|
|
62
62
|
});
|
|
63
|
+
// string # MD5 hash of your GPG public key
|
|
64
|
+
(0, _defineProperty2.default)(this, "getPublicKeyMd5", function () {
|
|
65
|
+
return _this.attributes.public_key_md5;
|
|
66
|
+
});
|
|
67
|
+
(0, _defineProperty2.default)(this, "setPublicKeyMd5", function (value) {
|
|
68
|
+
_this.attributes.public_key_md5 = value;
|
|
69
|
+
});
|
|
70
|
+
// string # MD5 hash of your GPG private key.
|
|
71
|
+
(0, _defineProperty2.default)(this, "getPrivateKeyMd5", function () {
|
|
72
|
+
return _this.attributes.private_key_md5;
|
|
73
|
+
});
|
|
74
|
+
(0, _defineProperty2.default)(this, "setPrivateKeyMd5", function (value) {
|
|
75
|
+
_this.attributes.private_key_md5 = value;
|
|
76
|
+
});
|
|
63
77
|
// string # Your GPG public key
|
|
64
78
|
(0, _defineProperty2.default)(this, "getPublicKey", function () {
|
|
65
79
|
return _this.attributes.public_key;
|
|
@@ -110,8 +124,8 @@ var GpgKey = /*#__PURE__*/(0, _createClass2.default)(function GpgKey() {
|
|
|
110
124
|
_this.attributes.generate_email = value;
|
|
111
125
|
});
|
|
112
126
|
// Parameters:
|
|
113
|
-
// public_key - string -
|
|
114
|
-
// private_key - string -
|
|
127
|
+
// public_key - string - MD5 hash of your GPG public key
|
|
128
|
+
// private_key - string - MD5 hash of your GPG private key.
|
|
115
129
|
// private_key_password - string - Your GPG private key password. Only required for password protected keys.
|
|
116
130
|
// name - string - Your GPG key name.
|
|
117
131
|
(0, _defineProperty2.default)(this, "update", /*#__PURE__*/(0, _asyncToGenerator2.default)(/*#__PURE__*/_regenerator.default.mark(function _callee() {
|
|
@@ -390,8 +404,8 @@ _GpgKey = GpgKey;
|
|
|
390
404
|
});
|
|
391
405
|
// Parameters:
|
|
392
406
|
// user_id - int64 - User ID. Provide a value of `0` to operate the current session's user.
|
|
393
|
-
// public_key - string -
|
|
394
|
-
// private_key - string -
|
|
407
|
+
// public_key - string - MD5 hash of your GPG public key
|
|
408
|
+
// private_key - string - MD5 hash of your GPG private key.
|
|
395
409
|
// private_key_password - string - Your GPG private key password. Only required for password protected keys.
|
|
396
410
|
// name (required) - string - Your GPG key name.
|
|
397
411
|
// generate_expires_at - string - Expiration date of the key. Used for the generation of the key. Will be ignored if `generate_keypair` is false.
|
package/lib/models/Site.js
CHANGED
|
@@ -636,10 +636,6 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
|
636
636
|
(0, _defineProperty2.default)(this, "getSwitchToPlanDate", function () {
|
|
637
637
|
return _this.attributes.switch_to_plan_date;
|
|
638
638
|
});
|
|
639
|
-
// boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
640
|
-
(0, _defineProperty2.default)(this, "getTlsDisabled", function () {
|
|
641
|
-
return _this.attributes.tls_disabled;
|
|
642
|
-
});
|
|
643
639
|
// int64 # Number of days left in trial
|
|
644
640
|
(0, _defineProperty2.default)(this, "getTrialDaysLeft", function () {
|
|
645
641
|
return _this.attributes.trial_days_left;
|
|
@@ -820,7 +816,6 @@ _Site = Site;
|
|
|
820
816
|
// migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
|
|
821
817
|
// session_expiry - double - Session expiry in hours
|
|
822
818
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
|
823
|
-
// tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
824
819
|
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
825
820
|
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
826
821
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
package/package.json
CHANGED
package/src/Files.js
CHANGED
package/src/models/GpgKey.js
CHANGED
|
@@ -56,6 +56,20 @@ class GpgKey {
|
|
|
56
56
|
this.attributes.user_id = value
|
|
57
57
|
}
|
|
58
58
|
|
|
59
|
+
// string # MD5 hash of your GPG public key
|
|
60
|
+
getPublicKeyMd5 = () => this.attributes.public_key_md5
|
|
61
|
+
|
|
62
|
+
setPublicKeyMd5 = value => {
|
|
63
|
+
this.attributes.public_key_md5 = value
|
|
64
|
+
}
|
|
65
|
+
|
|
66
|
+
// string # MD5 hash of your GPG private key.
|
|
67
|
+
getPrivateKeyMd5 = () => this.attributes.private_key_md5
|
|
68
|
+
|
|
69
|
+
setPrivateKeyMd5 = value => {
|
|
70
|
+
this.attributes.private_key_md5 = value
|
|
71
|
+
}
|
|
72
|
+
|
|
59
73
|
// string # Your GPG public key
|
|
60
74
|
getPublicKey = () => this.attributes.public_key
|
|
61
75
|
|
|
@@ -106,8 +120,8 @@ class GpgKey {
|
|
|
106
120
|
}
|
|
107
121
|
|
|
108
122
|
// Parameters:
|
|
109
|
-
// public_key - string -
|
|
110
|
-
// private_key - string -
|
|
123
|
+
// public_key - string - MD5 hash of your GPG public key
|
|
124
|
+
// private_key - string - MD5 hash of your GPG private key.
|
|
111
125
|
// private_key_password - string - Your GPG private key password. Only required for password protected keys.
|
|
112
126
|
// name - string - Your GPG key name.
|
|
113
127
|
update = async (params = {}) => {
|
|
@@ -246,8 +260,8 @@ class GpgKey {
|
|
|
246
260
|
|
|
247
261
|
// Parameters:
|
|
248
262
|
// user_id - int64 - User ID. Provide a value of `0` to operate the current session's user.
|
|
249
|
-
// public_key - string -
|
|
250
|
-
// private_key - string -
|
|
263
|
+
// public_key - string - MD5 hash of your GPG public key
|
|
264
|
+
// private_key - string - MD5 hash of your GPG private key.
|
|
251
265
|
// private_key_password - string - Your GPG private key password. Only required for password protected keys.
|
|
252
266
|
// name (required) - string - Your GPG key name.
|
|
253
267
|
// generate_expires_at - string - Expiration date of the key. Used for the generation of the key. Will be ignored if `generate_keypair` is false.
|
package/src/models/Site.js
CHANGED
|
@@ -481,9 +481,6 @@ class Site {
|
|
|
481
481
|
// date-time # If switching plans, when does the new plan take effect?
|
|
482
482
|
getSwitchToPlanDate = () => this.attributes.switch_to_plan_date
|
|
483
483
|
|
|
484
|
-
// boolean # This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
485
|
-
getTlsDisabled = () => this.attributes.tls_disabled
|
|
486
|
-
|
|
487
484
|
// int64 # Number of days left in trial
|
|
488
485
|
getTrialDaysLeft = () => this.attributes.trial_days_left
|
|
489
486
|
|
|
@@ -603,7 +600,6 @@ class Site {
|
|
|
603
600
|
// migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
|
|
604
601
|
// session_expiry - double - Session expiry in hours
|
|
605
602
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
|
606
|
-
// tls_disabled - boolean - This setting enables Legacy Support for Insecure Ciphers across SFTP and FTP. See our documentation for more information. Contrary to its name, this setting does not disable TLS (it used to do that a long time ago), but rather enables certain ciphers which are known to be insecure but required for broad MFT compatibility.
|
|
607
603
|
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
|
608
604
|
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
|
609
605
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|