files.com 1.2.41 → 1.2.42
Sign up to get free protection for your applications and to get access to all the features.
- package/_VERSION +1 -1
- package/docs/models/Site.md +8 -4
- package/lib/Files.js +1 -1
- package/lib/models/Site.js +9 -4
- package/package.json +1 -1
- package/src/Files.js +1 -1
- package/src/models/Site.js +8 -4
package/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.2.
|
1
|
+
1.2.42
|
package/docs/models/Site.md
CHANGED
@@ -169,6 +169,7 @@
|
|
169
169
|
"sftp_host_key_type": "default",
|
170
170
|
"active_sftp_host_key_id": 1,
|
171
171
|
"sftp_insecure_ciphers": true,
|
172
|
+
"sftp_insecure_diffie_hellman": true,
|
172
173
|
"sftp_user_root_enabled": true,
|
173
174
|
"sharing_enabled": true,
|
174
175
|
"show_request_access_link": true,
|
@@ -391,7 +392,8 @@
|
|
391
392
|
* `sftp_enabled` (boolean): Is SFTP enabled?
|
392
393
|
* `sftp_host_key_type` (string): Sftp Host Key Type
|
393
394
|
* `active_sftp_host_key_id` (int64): Id of the currently selected custom SFTP Host Key
|
394
|
-
* `sftp_insecure_ciphers` (boolean):
|
395
|
+
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
396
|
+
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
395
397
|
* `sftp_user_root_enabled` (boolean): Use user FTP roots also for SFTP?
|
396
398
|
* `sharing_enabled` (boolean): Allow bundle creation
|
397
399
|
* `show_request_access_link` (boolean): Show request access link for users without access? Currently unused.
|
@@ -407,7 +409,7 @@
|
|
407
409
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
408
410
|
* `subdomain` (string): Site subdomain
|
409
411
|
* `switch_to_plan_date` (date-time): If switching plans, when does the new plan take effect?
|
410
|
-
* `tls_disabled` (boolean):
|
412
|
+
* `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
411
413
|
* `trial_days_left` (int64): Number of days left in trial
|
412
414
|
* `trial_until` (date-time): When does this Site trial expire?
|
413
415
|
* `use_provided_modified_at` (boolean): Allow uploaders to set `provided_modified_at` for uploaded files?
|
@@ -489,6 +491,7 @@ await Site.update({
|
|
489
491
|
'ssl_required': true,
|
490
492
|
'tls_disabled': true,
|
491
493
|
'sftp_insecure_ciphers': true,
|
494
|
+
'sftp_insecure_diffie_hellman': true,
|
492
495
|
'disable_files_certificate_generation': true,
|
493
496
|
'user_lockout': true,
|
494
497
|
'user_lockout_tries': 1,
|
@@ -633,8 +636,9 @@ await Site.update({
|
|
633
636
|
* `left_navigation_visibility` (object): Visibility settings for account navigation
|
634
637
|
* `session_expiry` (double): Session expiry in hours
|
635
638
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
636
|
-
* `tls_disabled` (boolean):
|
637
|
-
* `sftp_insecure_ciphers` (boolean):
|
639
|
+
* `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
640
|
+
* `sftp_insecure_ciphers` (boolean): If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
641
|
+
* `sftp_insecure_diffie_hellman` (boolean): If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
638
642
|
* `disable_files_certificate_generation` (boolean): If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
639
643
|
* `user_lockout` (boolean): Will users be locked out after incorrect login attempts?
|
640
644
|
* `user_lockout_tries` (int64): Number of login tries within `user_lockout_within` hours before users are locked out
|
package/lib/Files.js
CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
|
|
11
11
|
var apiKey;
|
12
12
|
var baseUrl = 'https://app.files.com';
|
13
13
|
var sessionId = null;
|
14
|
-
var version = '1.2.
|
14
|
+
var version = '1.2.42';
|
15
15
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
16
16
|
var logLevel = _Logger.LogLevel.INFO;
|
17
17
|
var debugRequest = false;
|
package/lib/models/Site.js
CHANGED
@@ -505,10 +505,14 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
505
505
|
(0, _defineProperty2.default)(this, "getActiveSftpHostKeyId", function () {
|
506
506
|
return _this.attributes.active_sftp_host_key_id;
|
507
507
|
});
|
508
|
-
// boolean #
|
508
|
+
// boolean # If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
509
509
|
(0, _defineProperty2.default)(this, "getSftpInsecureCiphers", function () {
|
510
510
|
return _this.attributes.sftp_insecure_ciphers;
|
511
511
|
});
|
512
|
+
// boolean # If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
513
|
+
(0, _defineProperty2.default)(this, "getSftpInsecureDiffieHellman", function () {
|
514
|
+
return _this.attributes.sftp_insecure_diffie_hellman;
|
515
|
+
});
|
512
516
|
// boolean # Use user FTP roots also for SFTP?
|
513
517
|
(0, _defineProperty2.default)(this, "getSftpUserRootEnabled", function () {
|
514
518
|
return _this.attributes.sftp_user_root_enabled;
|
@@ -569,7 +573,7 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
569
573
|
(0, _defineProperty2.default)(this, "getSwitchToPlanDate", function () {
|
570
574
|
return _this.attributes.switch_to_plan_date;
|
571
575
|
});
|
572
|
-
// boolean #
|
576
|
+
// boolean # DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
573
577
|
(0, _defineProperty2.default)(this, "getTlsDisabled", function () {
|
574
578
|
return _this.attributes.tls_disabled;
|
575
579
|
});
|
@@ -743,8 +747,9 @@ _Site = Site;
|
|
743
747
|
// left_navigation_visibility - object - Visibility settings for account navigation
|
744
748
|
// session_expiry - double - Session expiry in hours
|
745
749
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
746
|
-
// tls_disabled - boolean -
|
747
|
-
// sftp_insecure_ciphers - boolean -
|
750
|
+
// tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
751
|
+
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
752
|
+
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
748
753
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
749
754
|
// user_lockout - boolean - Will users be locked out after incorrect login attempts?
|
750
755
|
// user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
|
package/package.json
CHANGED
package/src/Files.js
CHANGED
package/src/models/Site.js
CHANGED
@@ -382,9 +382,12 @@ class Site {
|
|
382
382
|
// int64 # Id of the currently selected custom SFTP Host Key
|
383
383
|
getActiveSftpHostKeyId = () => this.attributes.active_sftp_host_key_id
|
384
384
|
|
385
|
-
// boolean #
|
385
|
+
// boolean # If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
386
386
|
getSftpInsecureCiphers = () => this.attributes.sftp_insecure_ciphers
|
387
387
|
|
388
|
+
// boolean # If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
389
|
+
getSftpInsecureDiffieHellman = () => this.attributes.sftp_insecure_diffie_hellman
|
390
|
+
|
388
391
|
// boolean # Use user FTP roots also for SFTP?
|
389
392
|
getSftpUserRootEnabled = () => this.attributes.sftp_user_root_enabled
|
390
393
|
|
@@ -430,7 +433,7 @@ class Site {
|
|
430
433
|
// date-time # If switching plans, when does the new plan take effect?
|
431
434
|
getSwitchToPlanDate = () => this.attributes.switch_to_plan_date
|
432
435
|
|
433
|
-
// boolean #
|
436
|
+
// boolean # DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
434
437
|
getTlsDisabled = () => this.attributes.tls_disabled
|
435
438
|
|
436
439
|
// int64 # Number of days left in trial
|
@@ -542,8 +545,9 @@ class Site {
|
|
542
545
|
// left_navigation_visibility - object - Visibility settings for account navigation
|
543
546
|
// session_expiry - double - Session expiry in hours
|
544
547
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
545
|
-
// tls_disabled - boolean -
|
546
|
-
// sftp_insecure_ciphers - boolean -
|
548
|
+
// tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
549
|
+
// sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severly weakens the security of your site and it is not recommend, except as a last resort for compatibility.
|
550
|
+
// sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
|
547
551
|
// disable_files_certificate_generation - boolean - If set, Files.com will not set the CAA records required to generate future SSL certificates for this domain.
|
548
552
|
// user_lockout - boolean - Will users be locked out after incorrect login attempts?
|
549
553
|
// user_lockout_tries - int64 - Number of login tries within `user_lockout_within` hours before users are locked out
|