files.com 1.2.40 → 1.2.42

Sign up to get free protection for your applications and to get access to all the features.
package/_VERSION CHANGED
@@ -1 +1 @@
1
- 1.2.40
1
+ 1.2.42
@@ -26,7 +26,7 @@
26
26
  * `name` (string): The partner's formal AS2 name.
27
27
  * `uri` (string): Public URI for sending AS2 message to.
28
28
  * `server_certificate` (string): Remote server certificate security setting
29
- * `mdn_validation_level` (string): MDN Validation Level
29
+ * `mdn_validation_level` (string): MDN Validation Level controls how to evaluate message transfer success based on a partner's MDN response. NOTE: This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
30
30
  * `enable_dedicated_ips` (boolean): `true` if remote server only accepts connections from dedicated IPs
31
31
  * `hex_public_certificate_serial` (string): Serial of public certificate used for message security in hex format.
32
32
  * `public_certificate_md5` (string): MD5 hash of public certificate used for message security.
@@ -76,7 +76,8 @@
76
76
  "has_inbox": true,
77
77
  "paths": [
78
78
  "file.txt"
79
- ]
79
+ ],
80
+ "bundlepaths": "example"
80
81
  }
81
82
  ```
82
83
 
@@ -118,6 +119,7 @@
118
119
  * `watermark_value` (object): Preview watermark settings applied to all bundle items. Uses the same keys as Behavior.value
119
120
  * `has_inbox` (boolean): Does this bundle have an associated inbox?
120
121
  * `paths` (array): A list of paths in this bundle. For performance reasons, this is not provided when listing bundles.
122
+ * `bundlepaths` (BundlePath): A list of bundlepaths in this bundle. For performance reasons, this is not provided when listing bundles.
121
123
  * `password` (string): Password for this bundle.
122
124
  * `form_field_set_id` (int64): Id of Form Field Set to use with this bundle
123
125
  * `create_snapshot` (boolean): If true, create a snapshot of this bundle's contents.
@@ -392,7 +394,8 @@ await bundle.update({
392
394
  "has_inbox": true,
393
395
  "paths": [
394
396
  "file.txt"
395
- ]
397
+ ],
398
+ "bundlepaths": "example"
396
399
  }
397
400
  ```
398
401
 
@@ -0,0 +1,13 @@
1
+ # BundlePath
2
+
3
+ ## Example BundlePath Object
4
+
5
+ ```
6
+ {
7
+ "recursive": true,
8
+ "path": "example"
9
+ }
10
+ ```
11
+
12
+ * `recursive` (boolean): Allow access to subfolders content?
13
+ * `path` (string): The path to the resource relative to filesystem. This must be slash-delimited, but it must neither start nor end with a slash. Maximum of 5000 characters.
@@ -169,6 +169,7 @@
169
169
  "sftp_host_key_type": "default",
170
170
  "active_sftp_host_key_id": 1,
171
171
  "sftp_insecure_ciphers": true,
172
+ "sftp_insecure_diffie_hellman": true,
172
173
  "sftp_user_root_enabled": true,
173
174
  "sharing_enabled": true,
174
175
  "show_request_access_link": true,
@@ -391,7 +392,8 @@
391
392
  * `sftp_enabled` (boolean): Is SFTP enabled?
392
393
  * `sftp_host_key_type` (string): Sftp Host Key Type
393
394
  * `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
394
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
395
+ * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
396
+ * `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
395
397
  * `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
396
398
  * `sharing_enabled` (boolean): Allow bundle creation
397
399
  * `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
@@ -407,7 +409,7 @@
407
409
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
408
410
  * `subdomain` (string): Site subdomain
409
411
  * `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
410
- * `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
412
+ * `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
411
413
  * `trial_days_left` (int64): Number of days left in trial
412
414
  * `trial_until` (date-time): When does this Site trial expire?
413
415
  * `use_provided_modified_at` (boolean): Allow uploaders to set `provided_modified_at` for uploaded files?
@@ -489,6 +491,7 @@ await Site.update({
489
491
  'ssl_required': true,
490
492
  'tls_disabled': true,
491
493
  'sftp_insecure_ciphers': true,
494
+ 'sftp_insecure_diffie_hellman': true,
492
495
  'disable_files_certificate_generation': true,
493
496
  'user_lockout': true,
494
497
  'user_lockout_tries': 1,
@@ -633,8 +636,9 @@ await Site.update({
633
636
  * `left_navigation_visibility` (object): Visibility settings for account navigation
634
637
  * `session_expiry` (double): Session expiry in hours
635
638
  * `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
636
- * `tls_disabled` (boolean): Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
637
- * `sftp_insecure_ciphers` (boolean): Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
639
+ * `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
640
+ * `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
641
+ * `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
638
642
  * `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
639
643
  * `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
640
644
  * `user_lockout_tries` (int64): Number of login tries within `user_lockout_within` hours before users are locked out
package/lib/Files.js CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
11
11
  var apiKey;
12
12
  var baseUrl = 'https://app.files.com';
13
13
  var sessionId = null;
14
- var version = '1.2.40';
14
+ var version = '1.2.42';
15
15
  var userAgent = "Files.com JavaScript SDK v".concat(version);
16
16
  var logLevel = _Logger.LogLevel.INFO;
17
17
  var debugRequest = false;
@@ -68,7 +68,7 @@ var As2Partner = /*#__PURE__*/(0, _createClass2.default)(function As2Partner() {
68
68
  (0, _defineProperty2.default)(this, "setServerCertificate", function (value) {
69
69
  _this.attributes.server_certificate = value;
70
70
  });
71
- // string # MDN Validation Level
71
+ // string # MDN Validation Level controls how to evaluate message transfer success based on a partner's MDN response. NOTE: This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
72
72
  (0, _defineProperty2.default)(this, "getMdnValidationLevel", function () {
73
73
  return _this.attributes.mdn_validation_level;
74
74
  });
@@ -296,6 +296,13 @@ var Bundle = /*#__PURE__*/(0, _createClass2.default)(function Bundle() {
296
296
  (0, _defineProperty2.default)(this, "setPaths", function (value) {
297
297
  _this.attributes.paths = value;
298
298
  });
299
+ // BundlePath # A list of bundlepaths in this bundle. For performance reasons, this is not provided when listing bundles.
300
+ (0, _defineProperty2.default)(this, "getBundlepaths", function () {
301
+ return _this.attributes.bundlepaths;
302
+ });
303
+ (0, _defineProperty2.default)(this, "setBundlepaths", function (value) {
304
+ _this.attributes.bundlepaths = value;
305
+ });
299
306
  // string # Password for this bundle.
300
307
  (0, _defineProperty2.default)(this, "getPassword", function () {
301
308
  return _this.attributes.password;
@@ -0,0 +1,55 @@
1
+ "use strict";
2
+
3
+ var _interopRequireDefault = require("@babel/runtime/helpers/interopRequireDefault");
4
+ var _typeof = require("@babel/runtime/helpers/typeof");
5
+ exports.__esModule = true;
6
+ exports.default = void 0;
7
+ var _slicedToArray2 = _interopRequireDefault(require("@babel/runtime/helpers/slicedToArray"));
8
+ var _createClass2 = _interopRequireDefault(require("@babel/runtime/helpers/createClass"));
9
+ var _classCallCheck2 = _interopRequireDefault(require("@babel/runtime/helpers/classCallCheck"));
10
+ var _defineProperty2 = _interopRequireDefault(require("@babel/runtime/helpers/defineProperty"));
11
+ var _Api = _interopRequireDefault(require("../Api"));
12
+ var errors = _interopRequireWildcard(require("../Errors"));
13
+ var _utils = require("../utils");
14
+ function _getRequireWildcardCache(e) { if ("function" != typeof WeakMap) return null; var r = new WeakMap(), t = new WeakMap(); return (_getRequireWildcardCache = function _getRequireWildcardCache(e) { return e ? t : r; })(e); }
15
+ function _interopRequireWildcard(e, r) { if (!r && e && e.__esModule) return e; if (null === e || "object" != _typeof(e) && "function" != typeof e) return { default: e }; var t = _getRequireWildcardCache(r); if (t && t.has(e)) return t.get(e); var n = { __proto__: null }, a = Object.defineProperty && Object.getOwnPropertyDescriptor; for (var u in e) if ("default" !== u && {}.hasOwnProperty.call(e, u)) { var i = a ? Object.getOwnPropertyDescriptor(e, u) : null; i && (i.get || i.set) ? Object.defineProperty(n, u, i) : n[u] = e[u]; } return n.default = e, t && t.set(e, n), n; }
16
+ function ownKeys(e, r) { var t = Object.keys(e); if (Object.getOwnPropertySymbols) { var o = Object.getOwnPropertySymbols(e); r && (o = o.filter(function (r) { return Object.getOwnPropertyDescriptor(e, r).enumerable; })), t.push.apply(t, o); } return t; }
17
+ function _objectSpread(e) { for (var r = 1; r < arguments.length; r++) { var t = null != arguments[r] ? arguments[r] : {}; r % 2 ? ownKeys(Object(t), !0).forEach(function (r) { (0, _defineProperty2.default)(e, r, t[r]); }) : Object.getOwnPropertyDescriptors ? Object.defineProperties(e, Object.getOwnPropertyDescriptors(t)) : ownKeys(Object(t)).forEach(function (r) { Object.defineProperty(e, r, Object.getOwnPropertyDescriptor(t, r)); }); } return e; } /* eslint-disable no-unused-vars */
18
+ /* eslint-enable no-unused-vars */
19
+ /**
20
+ * Class BundlePath
21
+ */
22
+ var BundlePath = /*#__PURE__*/(0, _createClass2.default)(function BundlePath() {
23
+ var _this = this;
24
+ var attributes = arguments.length > 0 && arguments[0] !== undefined ? arguments[0] : {};
25
+ var options = arguments.length > 1 && arguments[1] !== undefined ? arguments[1] : {};
26
+ (0, _classCallCheck2.default)(this, BundlePath);
27
+ (0, _defineProperty2.default)(this, "attributes", {});
28
+ (0, _defineProperty2.default)(this, "options", {});
29
+ (0, _defineProperty2.default)(this, "isLoaded", function () {
30
+ return !!_this.attributes.id;
31
+ });
32
+ // boolean # Allow access to subfolders content?
33
+ (0, _defineProperty2.default)(this, "getRecursive", function () {
34
+ return _this.attributes.recursive;
35
+ });
36
+ // string # The path to the resource relative to filesystem. This must be slash-delimited, but it must neither start nor end with a slash. Maximum of 5000 characters.
37
+ (0, _defineProperty2.default)(this, "getPath", function () {
38
+ return _this.attributes.path;
39
+ });
40
+ Object.entries(attributes).forEach(function (_ref) {
41
+ var _ref2 = (0, _slicedToArray2.default)(_ref, 2),
42
+ key = _ref2[0],
43
+ value = _ref2[1];
44
+ var normalizedKey = key.replace('?', '');
45
+ _this.attributes[normalizedKey] = value;
46
+ Object.defineProperty(_this, normalizedKey, {
47
+ value: value,
48
+ writable: false
49
+ });
50
+ });
51
+ this.options = _objectSpread({}, options);
52
+ });
53
+ var _default = exports.default = BundlePath;
54
+ module.exports = BundlePath;
55
+ module.exports.default = BundlePath;
@@ -505,10 +505,14 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
505
505
  (0, _defineProperty2.default)(this, "getActiveSftpHostKeyId", function () {
506
506
  return _this.attributes.active_sftp_host_key_id;
507
507
  });
508
- // boolean # Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
508
+ // boolean # If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
509
509
  (0, _defineProperty2.default)(this, "getSftpInsecureCiphers", function () {
510
510
  return _this.attributes.sftp_insecure_ciphers;
511
511
  });
512
+ // boolean # If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
513
+ (0, _defineProperty2.default)(this, "getSftpInsecureDiffieHellman", function () {
514
+ return _this.attributes.sftp_insecure_diffie_hellman;
515
+ });
512
516
  // boolean # Use user FTP roots also for SFTP?
513
517
  (0, _defineProperty2.default)(this, "getSftpUserRootEnabled", function () {
514
518
  return _this.attributes.sftp_user_root_enabled;
@@ -569,7 +573,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
569
573
  (0, _defineProperty2.default)(this, "getSwitchToPlanDate", function () {
570
574
  return _this.attributes.switch_to_plan_date;
571
575
  });
572
- // boolean # Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
576
+ // boolean # DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
573
577
  (0, _defineProperty2.default)(this, "getTlsDisabled", function () {
574
578
  return _this.attributes.tls_disabled;
575
579
  });
@@ -743,8 +747,9 @@ _Site = Site;
743
747
  // left_navigation_visibility - object - Visibility settings for account navigation
744
748
  // session_expiry - double - Session expiry in hours
745
749
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
746
- // tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
747
- // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
750
+ // tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
751
+ // sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
752
+ // sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
748
753
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
749
754
  // user_lockout - boolean - Will users be locked out after incorrect login attempts?
750
755
  // user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "files.com",
3
- "version": "1.2.40",
3
+ "version": "1.2.42",
4
4
  "description": "Files.com SDK for JavaScript",
5
5
  "keywords": [
6
6
  "files.com",
package/src/Files.js CHANGED
@@ -5,7 +5,7 @@ const endpointPrefix = '/api/rest/v1'
5
5
  let apiKey
6
6
  let baseUrl = 'https://app.files.com'
7
7
  let sessionId = null
8
- const version = '1.2.40'
8
+ const version = '1.2.42'
9
9
  let userAgent = `Files.com JavaScript SDK v${version}`
10
10
 
11
11
  let logLevel = LogLevel.INFO
@@ -63,7 +63,7 @@ class As2Partner {
63
63
  this.attributes.server_certificate = value
64
64
  }
65
65
 
66
- // string # MDN Validation Level
66
+ // string # MDN Validation Level controls how to evaluate message transfer success based on a partner's MDN response. NOTE: This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
67
67
  getMdnValidationLevel = () => this.attributes.mdn_validation_level
68
68
 
69
69
  setMdnValidationLevel = value => {
@@ -290,6 +290,13 @@ class Bundle {
290
290
  this.attributes.paths = value
291
291
  }
292
292
 
293
+ // BundlePath # A list of bundlepaths in this bundle. For performance reasons, this is not provided when listing bundles.
294
+ getBundlepaths = () => this.attributes.bundlepaths
295
+
296
+ setBundlepaths = value => {
297
+ this.attributes.bundlepaths = value
298
+ }
299
+
293
300
  // string # Password for this bundle.
294
301
  getPassword = () => this.attributes.password
295
302
 
@@ -0,0 +1,41 @@
1
+ /* eslint-disable no-unused-vars */
2
+ import Api from '../Api'
3
+ import * as errors from '../Errors'
4
+ import {
5
+ getType, isArray, isInt, isObject, isString,
6
+ } from '../utils'
7
+ /* eslint-enable no-unused-vars */
8
+
9
+ /**
10
+ * Class BundlePath
11
+ */
12
+ class BundlePath {
13
+ attributes = {}
14
+
15
+ options = {}
16
+
17
+ constructor(attributes = {}, options = {}) {
18
+ Object.entries(attributes).forEach(([key, value]) => {
19
+ const normalizedKey = key.replace('?', '')
20
+
21
+ this.attributes[normalizedKey] = value
22
+
23
+ Object.defineProperty(this, normalizedKey, { value, writable: false })
24
+ })
25
+
26
+ this.options = { ...options }
27
+ }
28
+
29
+ isLoaded = () => !!this.attributes.id
30
+
31
+ // boolean # Allow access to subfolders content?
32
+ getRecursive = () => this.attributes.recursive
33
+
34
+ // string # The path to the resource relative to filesystem. This must be slash-delimited, but it must neither start nor end with a slash. Maximum of 5000 characters.
35
+ getPath = () => this.attributes.path
36
+ }
37
+
38
+ export default BundlePath
39
+
40
+ module.exports = BundlePath
41
+ module.exports.default = BundlePath
@@ -382,9 +382,12 @@ class Site {
382
382
  // int64 # Id of the currently selected custom SFTP Host Key
383
383
  getActiveSftpHostKeyId = () => this.attributes.active_sftp_host_key_id
384
384
 
385
- // boolean # Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
385
+ // boolean # If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
386
386
  getSftpInsecureCiphers = () => this.attributes.sftp_insecure_ciphers
387
387
 
388
+ // boolean # If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
389
+ getSftpInsecureDiffieHellman = () => this.attributes.sftp_insecure_diffie_hellman
390
+
388
391
  // boolean # Use user FTP roots also for SFTP?
389
392
  getSftpUserRootEnabled = () => this.attributes.sftp_user_root_enabled
390
393
 
@@ -430,7 +433,7 @@ class Site {
430
433
  // date-time # If switching plans, when does the new plan take effect?
431
434
  getSwitchToPlanDate = () => this.attributes.switch_to_plan_date
432
435
 
433
- // boolean # Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
436
+ // boolean # DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
434
437
  getTlsDisabled = () => this.attributes.tls_disabled
435
438
 
436
439
  // int64 # Number of days left in trial
@@ -542,8 +545,9 @@ class Site {
542
545
  // left_navigation_visibility - object - Visibility settings for account navigation
543
546
  // session_expiry - double - Session expiry in hours
544
547
  // ssl_required - boolean - Is SSL required? Disabling this is insecure.
545
- // tls_disabled - boolean - Are Insecure TLS and SFTP Ciphers allowed? Enabling this is insecure.
546
- // sftp_insecure_ciphers - boolean - Are Insecure Ciphers allowed for SFTP? Note: Setting TLS Disabled -> True will always allow insecure ciphers for SFTP as well. Enabling this is insecure.
548
+ // tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
549
+ // sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
550
+ // sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
547
551
  // disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
548
552
  // user_lockout - boolean - Will users be locked out after incorrect login attempts?
549
553
  // user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out