files.com 1.2.46 → 1.2.48
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/_VERSION +1 -1
- package/docs/models/File.md +4 -0
- package/docs/models/Site.md +6 -0
- package/lib/Files.js +1 -1
- package/lib/models/File.js +2 -0
- package/lib/models/Site.js +114 -103
- package/package.json +1 -1
- package/src/Files.js +1 -1
- package/src/models/File.js +2 -0
- package/src/models/Site.js +8 -0
package/_VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.2.
|
1
|
+
1.2.48
|
package/docs/models/File.md
CHANGED
@@ -247,6 +247,7 @@ file.path = myFilePath
|
|
247
247
|
await file.copy({
|
248
248
|
'destination': "destination",
|
249
249
|
'structure': true,
|
250
|
+
'overwrite': true,
|
250
251
|
})
|
251
252
|
```
|
252
253
|
|
@@ -255,6 +256,7 @@ await file.copy({
|
|
255
256
|
* `path` (string): Required - Path to operate on.
|
256
257
|
* `destination` (string): Required - Copy destination path.
|
257
258
|
* `structure` (boolean): Copy structure only?
|
259
|
+
* `overwrite` (boolean): Overwrite existing file(s) in the destination?
|
258
260
|
|
259
261
|
### Example Response
|
260
262
|
|
@@ -275,6 +277,7 @@ file.path = myFilePath
|
|
275
277
|
|
276
278
|
await file.move({
|
277
279
|
'destination': "destination",
|
280
|
+
'overwrite': true,
|
278
281
|
})
|
279
282
|
```
|
280
283
|
|
@@ -282,6 +285,7 @@ await file.move({
|
|
282
285
|
|
283
286
|
* `path` (string): Required - Path to operate on.
|
284
287
|
* `destination` (string): Required - Move destination path.
|
288
|
+
* `overwrite` (boolean): Overwrite existing file(s) in the destination?
|
285
289
|
|
286
290
|
### Example Response
|
287
291
|
|
package/docs/models/Site.md
CHANGED
@@ -5,6 +5,9 @@
|
|
5
5
|
```
|
6
6
|
{
|
7
7
|
"name": "My Site",
|
8
|
+
"additional_text_file_types": [
|
9
|
+
"example"
|
10
|
+
],
|
8
11
|
"allowed_2fa_method_sms": true,
|
9
12
|
"allowed_2fa_method_totp": true,
|
10
13
|
"allowed_2fa_method_u2f": true,
|
@@ -275,6 +278,7 @@
|
|
275
278
|
```
|
276
279
|
|
277
280
|
* `name` (string): Site name
|
281
|
+
* `additional_text_file_types` (array): Additional extensions that are considered text files
|
278
282
|
* `allowed_2fa_method_sms` (boolean): Is SMS two factor authentication allowed?
|
279
283
|
* `allowed_2fa_method_totp` (boolean): Is TOTP two factor authentication allowed?
|
280
284
|
* `allowed_2fa_method_u2f` (boolean): Is U2F two factor authentication allowed?
|
@@ -487,6 +491,7 @@ await Site.update({
|
|
487
491
|
'motd_text': "example",
|
488
492
|
'motd_use_for_ftp': true,
|
489
493
|
'motd_use_for_sftp': true,
|
494
|
+
'additional_text_file_types': ["example"],
|
490
495
|
'session_expiry': 1.0,
|
491
496
|
'ssl_required': true,
|
492
497
|
'tls_disabled': true,
|
@@ -634,6 +639,7 @@ await Site.update({
|
|
634
639
|
* `motd_use_for_ftp` (boolean): Show message to users connecting via FTP
|
635
640
|
* `motd_use_for_sftp` (boolean): Show message to users connecting via SFTP
|
636
641
|
* `left_navigation_visibility` (object): Visibility settings for account navigation
|
642
|
+
* `additional_text_file_types` (array(string)): Additional extensions that are considered text files
|
637
643
|
* `session_expiry` (double): Session expiry in hours
|
638
644
|
* `ssl_required` (boolean): Is SSL required? Disabling this is insecure.
|
639
645
|
* `tls_disabled` (boolean): DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
package/lib/Files.js
CHANGED
@@ -11,7 +11,7 @@ var endpointPrefix = '/api/rest/v1';
|
|
11
11
|
var apiKey;
|
12
12
|
var baseUrl = 'https://app.files.com';
|
13
13
|
var sessionId = null;
|
14
|
-
var version = '1.2.
|
14
|
+
var version = '1.2.48';
|
15
15
|
var userAgent = "Files.com JavaScript SDK v".concat(version);
|
16
16
|
var logLevel = _Logger.LogLevel.INFO;
|
17
17
|
var debugRequest = false;
|
package/lib/models/File.js
CHANGED
@@ -548,6 +548,7 @@ var File = /*#__PURE__*/(0, _createClass2.default)(function File() {
|
|
548
548
|
// Parameters:
|
549
549
|
// destination (required) - string - Copy destination path.
|
550
550
|
// structure - boolean - Copy structure only?
|
551
|
+
// overwrite - boolean - Overwrite existing file(s) in the destination?
|
551
552
|
(0, _defineProperty2.default)(this, "copy", /*#__PURE__*/(0, _asyncToGenerator2.default)( /*#__PURE__*/_regenerator.default.mark(function _callee9() {
|
552
553
|
var params,
|
553
554
|
response,
|
@@ -626,6 +627,7 @@ var File = /*#__PURE__*/(0, _createClass2.default)(function File() {
|
|
626
627
|
//
|
627
628
|
// Parameters:
|
628
629
|
// destination (required) - string - Move destination path.
|
630
|
+
// overwrite - boolean - Overwrite existing file(s) in the destination?
|
629
631
|
(0, _defineProperty2.default)(this, "move", /*#__PURE__*/(0, _asyncToGenerator2.default)( /*#__PURE__*/_regenerator.default.mark(function _callee10() {
|
630
632
|
var params,
|
631
633
|
response,
|
package/lib/models/Site.js
CHANGED
@@ -37,6 +37,10 @@ var Site = /*#__PURE__*/(0, _createClass2.default)(function Site() {
|
|
37
37
|
(0, _defineProperty2.default)(this, "getName", function () {
|
38
38
|
return _this.attributes.name;
|
39
39
|
});
|
40
|
+
// array # Additional extensions that are considered text files
|
41
|
+
(0, _defineProperty2.default)(this, "getAdditionalTextFileTypes", function () {
|
42
|
+
return _this.attributes.additional_text_file_types;
|
43
|
+
});
|
40
44
|
// boolean # Is SMS two factor authentication allowed?
|
41
45
|
(0, _defineProperty2.default)(this, "getAllowed2faMethodSms", function () {
|
42
46
|
return _this.attributes.allowed_2fa_method_sms;
|
@@ -745,6 +749,7 @@ _Site = Site;
|
|
745
749
|
// motd_use_for_ftp - boolean - Show message to users connecting via FTP
|
746
750
|
// motd_use_for_sftp - boolean - Show message to users connecting via SFTP
|
747
751
|
// left_navigation_visibility - object - Visibility settings for account navigation
|
752
|
+
// additional_text_file_types - array(string) - Additional extensions that are considered text files
|
748
753
|
// session_expiry - double - Session expiry in hours
|
749
754
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
750
755
|
// tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
@@ -975,312 +980,318 @@ _Site = Site;
|
|
975
980
|
}
|
976
981
|
throw new errors.InvalidParameterError("Bad parameter: motd_text must be of type String, received ".concat((0, _utils.getType)(params.motd_text)));
|
977
982
|
case 36:
|
978
|
-
if (!(params.
|
983
|
+
if (!(params.additional_text_file_types && !(0, _utils.isArray)(params.additional_text_file_types))) {
|
979
984
|
_context3.next = 38;
|
980
985
|
break;
|
981
986
|
}
|
982
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
987
|
+
throw new errors.InvalidParameterError("Bad parameter: additional_text_file_types must be of type Array, received ".concat((0, _utils.getType)(params.additional_text_file_types)));
|
983
988
|
case 38:
|
984
|
-
if (!(params.
|
989
|
+
if (!(params.user_lockout_tries && !(0, _utils.isInt)(params.user_lockout_tries))) {
|
985
990
|
_context3.next = 40;
|
986
991
|
break;
|
987
992
|
}
|
988
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
993
|
+
throw new errors.InvalidParameterError("Bad parameter: user_lockout_tries must be of type Int, received ".concat((0, _utils.getType)(params.user_lockout_tries)));
|
989
994
|
case 40:
|
990
|
-
if (!(params.
|
995
|
+
if (!(params.user_lockout_within && !(0, _utils.isInt)(params.user_lockout_within))) {
|
991
996
|
_context3.next = 42;
|
992
997
|
break;
|
993
998
|
}
|
994
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
999
|
+
throw new errors.InvalidParameterError("Bad parameter: user_lockout_within must be of type Int, received ".concat((0, _utils.getType)(params.user_lockout_within)));
|
995
1000
|
case 42:
|
996
|
-
if (!(params.
|
1001
|
+
if (!(params.user_lockout_lock_period && !(0, _utils.isInt)(params.user_lockout_lock_period))) {
|
997
1002
|
_context3.next = 44;
|
998
1003
|
break;
|
999
1004
|
}
|
1000
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1005
|
+
throw new errors.InvalidParameterError("Bad parameter: user_lockout_lock_period must be of type Int, received ".concat((0, _utils.getType)(params.user_lockout_lock_period)));
|
1001
1006
|
case 44:
|
1002
|
-
if (!(params.
|
1007
|
+
if (!(params.allowed_countries && !(0, _utils.isString)(params.allowed_countries))) {
|
1003
1008
|
_context3.next = 46;
|
1004
1009
|
break;
|
1005
1010
|
}
|
1006
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1011
|
+
throw new errors.InvalidParameterError("Bad parameter: allowed_countries must be of type String, received ".concat((0, _utils.getType)(params.allowed_countries)));
|
1007
1012
|
case 46:
|
1008
|
-
if (!(params.
|
1013
|
+
if (!(params.allowed_ips && !(0, _utils.isString)(params.allowed_ips))) {
|
1009
1014
|
_context3.next = 48;
|
1010
1015
|
break;
|
1011
1016
|
}
|
1012
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1017
|
+
throw new errors.InvalidParameterError("Bad parameter: allowed_ips must be of type String, received ".concat((0, _utils.getType)(params.allowed_ips)));
|
1013
1018
|
case 48:
|
1014
|
-
if (!(params.
|
1019
|
+
if (!(params.disallowed_countries && !(0, _utils.isString)(params.disallowed_countries))) {
|
1015
1020
|
_context3.next = 50;
|
1016
1021
|
break;
|
1017
1022
|
}
|
1018
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1023
|
+
throw new errors.InvalidParameterError("Bad parameter: disallowed_countries must be of type String, received ".concat((0, _utils.getType)(params.disallowed_countries)));
|
1019
1024
|
case 50:
|
1020
|
-
if (!(params.
|
1025
|
+
if (!(params.days_to_retain_backups && !(0, _utils.isInt)(params.days_to_retain_backups))) {
|
1021
1026
|
_context3.next = 52;
|
1022
1027
|
break;
|
1023
1028
|
}
|
1024
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1029
|
+
throw new errors.InvalidParameterError("Bad parameter: days_to_retain_backups must be of type Int, received ".concat((0, _utils.getType)(params.days_to_retain_backups)));
|
1025
1030
|
case 52:
|
1026
|
-
if (!(params.
|
1031
|
+
if (!(params.max_prior_passwords && !(0, _utils.isInt)(params.max_prior_passwords))) {
|
1027
1032
|
_context3.next = 54;
|
1028
1033
|
break;
|
1029
1034
|
}
|
1030
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1035
|
+
throw new errors.InvalidParameterError("Bad parameter: max_prior_passwords must be of type Int, received ".concat((0, _utils.getType)(params.max_prior_passwords)));
|
1031
1036
|
case 54:
|
1032
|
-
if (!(params.
|
1037
|
+
if (!(params.password_validity_days && !(0, _utils.isInt)(params.password_validity_days))) {
|
1033
1038
|
_context3.next = 56;
|
1034
1039
|
break;
|
1035
1040
|
}
|
1036
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1041
|
+
throw new errors.InvalidParameterError("Bad parameter: password_validity_days must be of type Int, received ".concat((0, _utils.getType)(params.password_validity_days)));
|
1037
1042
|
case 56:
|
1038
|
-
if (!(params.
|
1043
|
+
if (!(params.password_min_length && !(0, _utils.isInt)(params.password_min_length))) {
|
1039
1044
|
_context3.next = 58;
|
1040
1045
|
break;
|
1041
1046
|
}
|
1042
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1047
|
+
throw new errors.InvalidParameterError("Bad parameter: password_min_length must be of type Int, received ".concat((0, _utils.getType)(params.password_min_length)));
|
1043
1048
|
case 58:
|
1044
|
-
if (!(params.
|
1049
|
+
if (!(params.bundle_not_found_message && !(0, _utils.isString)(params.bundle_not_found_message))) {
|
1045
1050
|
_context3.next = 60;
|
1046
1051
|
break;
|
1047
1052
|
}
|
1048
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1053
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_not_found_message must be of type String, received ".concat((0, _utils.getType)(params.bundle_not_found_message)));
|
1049
1054
|
case 60:
|
1050
|
-
if (!(params.
|
1055
|
+
if (!(params.bundle_registration_notifications && !(0, _utils.isString)(params.bundle_registration_notifications))) {
|
1051
1056
|
_context3.next = 62;
|
1052
1057
|
break;
|
1053
1058
|
}
|
1054
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1059
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_registration_notifications must be of type String, received ".concat((0, _utils.getType)(params.bundle_registration_notifications)));
|
1055
1060
|
case 62:
|
1056
|
-
if (!(params.
|
1061
|
+
if (!(params.bundle_activity_notifications && !(0, _utils.isString)(params.bundle_activity_notifications))) {
|
1057
1062
|
_context3.next = 64;
|
1058
1063
|
break;
|
1059
1064
|
}
|
1060
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1065
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_activity_notifications must be of type String, received ".concat((0, _utils.getType)(params.bundle_activity_notifications)));
|
1061
1066
|
case 64:
|
1062
|
-
if (!(params.
|
1067
|
+
if (!(params.bundle_upload_receipt_notifications && !(0, _utils.isString)(params.bundle_upload_receipt_notifications))) {
|
1063
1068
|
_context3.next = 66;
|
1064
1069
|
break;
|
1065
1070
|
}
|
1066
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1071
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_upload_receipt_notifications must be of type String, received ".concat((0, _utils.getType)(params.bundle_upload_receipt_notifications)));
|
1067
1072
|
case 66:
|
1068
|
-
if (!(params.
|
1073
|
+
if (!(params.disable_users_from_inactivity_period_days && !(0, _utils.isInt)(params.disable_users_from_inactivity_period_days))) {
|
1069
1074
|
_context3.next = 68;
|
1070
1075
|
break;
|
1071
1076
|
}
|
1072
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1077
|
+
throw new errors.InvalidParameterError("Bad parameter: disable_users_from_inactivity_period_days must be of type Int, received ".concat((0, _utils.getType)(params.disable_users_from_inactivity_period_days)));
|
1073
1078
|
case 68:
|
1074
|
-
if (!(params.
|
1079
|
+
if (!(params.sftp_host_key_type && !(0, _utils.isString)(params.sftp_host_key_type))) {
|
1075
1080
|
_context3.next = 70;
|
1076
1081
|
break;
|
1077
1082
|
}
|
1078
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1083
|
+
throw new errors.InvalidParameterError("Bad parameter: sftp_host_key_type must be of type String, received ".concat((0, _utils.getType)(params.sftp_host_key_type)));
|
1079
1084
|
case 70:
|
1080
|
-
if (!(params.
|
1085
|
+
if (!(params.active_sftp_host_key_id && !(0, _utils.isInt)(params.active_sftp_host_key_id))) {
|
1081
1086
|
_context3.next = 72;
|
1082
1087
|
break;
|
1083
1088
|
}
|
1084
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1089
|
+
throw new errors.InvalidParameterError("Bad parameter: active_sftp_host_key_id must be of type Int, received ".concat((0, _utils.getType)(params.active_sftp_host_key_id)));
|
1085
1090
|
case 72:
|
1086
|
-
if (!(params.
|
1091
|
+
if (!(params.bundle_recipient_blacklist_domains && !(0, _utils.isArray)(params.bundle_recipient_blacklist_domains))) {
|
1087
1092
|
_context3.next = 74;
|
1088
1093
|
break;
|
1089
1094
|
}
|
1090
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1095
|
+
throw new errors.InvalidParameterError("Bad parameter: bundle_recipient_blacklist_domains must be of type Array, received ".concat((0, _utils.getType)(params.bundle_recipient_blacklist_domains)));
|
1091
1096
|
case 74:
|
1092
|
-
if (!(params.
|
1097
|
+
if (!(params.require_2fa_user_type && !(0, _utils.isString)(params.require_2fa_user_type))) {
|
1093
1098
|
_context3.next = 76;
|
1094
1099
|
break;
|
1095
1100
|
}
|
1096
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1101
|
+
throw new errors.InvalidParameterError("Bad parameter: require_2fa_user_type must be of type String, received ".concat((0, _utils.getType)(params.require_2fa_user_type)));
|
1097
1102
|
case 76:
|
1098
|
-
if (!(params.
|
1103
|
+
if (!(params.color2_top && !(0, _utils.isString)(params.color2_top))) {
|
1099
1104
|
_context3.next = 78;
|
1100
1105
|
break;
|
1101
1106
|
}
|
1102
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1107
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top must be of type String, received ".concat((0, _utils.getType)(params.color2_top)));
|
1103
1108
|
case 78:
|
1104
|
-
if (!(params.
|
1109
|
+
if (!(params.color2_left && !(0, _utils.isString)(params.color2_left))) {
|
1105
1110
|
_context3.next = 80;
|
1106
1111
|
break;
|
1107
1112
|
}
|
1108
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1113
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_left must be of type String, received ".concat((0, _utils.getType)(params.color2_left)));
|
1109
1114
|
case 80:
|
1110
|
-
if (!(params.
|
1115
|
+
if (!(params.color2_link && !(0, _utils.isString)(params.color2_link))) {
|
1111
1116
|
_context3.next = 82;
|
1112
1117
|
break;
|
1113
1118
|
}
|
1114
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1119
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_link must be of type String, received ".concat((0, _utils.getType)(params.color2_link)));
|
1115
1120
|
case 82:
|
1116
|
-
if (!(params.
|
1121
|
+
if (!(params.color2_text && !(0, _utils.isString)(params.color2_text))) {
|
1117
1122
|
_context3.next = 84;
|
1118
1123
|
break;
|
1119
1124
|
}
|
1120
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1125
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_text must be of type String, received ".concat((0, _utils.getType)(params.color2_text)));
|
1121
1126
|
case 84:
|
1122
|
-
if (!(params.
|
1127
|
+
if (!(params.color2_top_text && !(0, _utils.isString)(params.color2_top_text))) {
|
1123
1128
|
_context3.next = 86;
|
1124
1129
|
break;
|
1125
1130
|
}
|
1126
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1131
|
+
throw new errors.InvalidParameterError("Bad parameter: color2_top_text must be of type String, received ".concat((0, _utils.getType)(params.color2_top_text)));
|
1127
1132
|
case 86:
|
1128
|
-
if (!(params.
|
1133
|
+
if (!(params.site_header && !(0, _utils.isString)(params.site_header))) {
|
1129
1134
|
_context3.next = 88;
|
1130
1135
|
break;
|
1131
1136
|
}
|
1132
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1137
|
+
throw new errors.InvalidParameterError("Bad parameter: site_header must be of type String, received ".concat((0, _utils.getType)(params.site_header)));
|
1133
1138
|
case 88:
|
1134
|
-
if (!(params.
|
1139
|
+
if (!(params.site_footer && !(0, _utils.isString)(params.site_footer))) {
|
1135
1140
|
_context3.next = 90;
|
1136
1141
|
break;
|
1137
1142
|
}
|
1138
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1143
|
+
throw new errors.InvalidParameterError("Bad parameter: site_footer must be of type String, received ".concat((0, _utils.getType)(params.site_footer)));
|
1139
1144
|
case 90:
|
1140
|
-
if (!(params.
|
1145
|
+
if (!(params.login_help_text && !(0, _utils.isString)(params.login_help_text))) {
|
1141
1146
|
_context3.next = 92;
|
1142
1147
|
break;
|
1143
1148
|
}
|
1144
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1149
|
+
throw new errors.InvalidParameterError("Bad parameter: login_help_text must be of type String, received ".concat((0, _utils.getType)(params.login_help_text)));
|
1145
1150
|
case 92:
|
1146
|
-
if (!(params.
|
1151
|
+
if (!(params.smtp_address && !(0, _utils.isString)(params.smtp_address))) {
|
1147
1152
|
_context3.next = 94;
|
1148
1153
|
break;
|
1149
1154
|
}
|
1150
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1155
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_address must be of type String, received ".concat((0, _utils.getType)(params.smtp_address)));
|
1151
1156
|
case 94:
|
1152
|
-
if (!(params.
|
1157
|
+
if (!(params.smtp_authentication && !(0, _utils.isString)(params.smtp_authentication))) {
|
1153
1158
|
_context3.next = 96;
|
1154
1159
|
break;
|
1155
1160
|
}
|
1156
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1161
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_authentication must be of type String, received ".concat((0, _utils.getType)(params.smtp_authentication)));
|
1157
1162
|
case 96:
|
1158
|
-
if (!(params.
|
1163
|
+
if (!(params.smtp_from && !(0, _utils.isString)(params.smtp_from))) {
|
1159
1164
|
_context3.next = 98;
|
1160
1165
|
break;
|
1161
1166
|
}
|
1162
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1167
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_from must be of type String, received ".concat((0, _utils.getType)(params.smtp_from)));
|
1163
1168
|
case 98:
|
1164
|
-
if (!(params.
|
1169
|
+
if (!(params.smtp_username && !(0, _utils.isString)(params.smtp_username))) {
|
1165
1170
|
_context3.next = 100;
|
1166
1171
|
break;
|
1167
1172
|
}
|
1168
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1173
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_username must be of type String, received ".concat((0, _utils.getType)(params.smtp_username)));
|
1169
1174
|
case 100:
|
1170
|
-
if (!(params.
|
1175
|
+
if (!(params.smtp_port && !(0, _utils.isInt)(params.smtp_port))) {
|
1171
1176
|
_context3.next = 102;
|
1172
1177
|
break;
|
1173
1178
|
}
|
1174
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1179
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_port must be of type Int, received ".concat((0, _utils.getType)(params.smtp_port)));
|
1175
1180
|
case 102:
|
1176
|
-
if (!(params.
|
1181
|
+
if (!(params.ldap_type && !(0, _utils.isString)(params.ldap_type))) {
|
1177
1182
|
_context3.next = 104;
|
1178
1183
|
break;
|
1179
1184
|
}
|
1180
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1185
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_type must be of type String, received ".concat((0, _utils.getType)(params.ldap_type)));
|
1181
1186
|
case 104:
|
1182
|
-
if (!(params.
|
1187
|
+
if (!(params.ldap_host && !(0, _utils.isString)(params.ldap_host))) {
|
1183
1188
|
_context3.next = 106;
|
1184
1189
|
break;
|
1185
1190
|
}
|
1186
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1191
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host must be of type String, received ".concat((0, _utils.getType)(params.ldap_host)));
|
1187
1192
|
case 106:
|
1188
|
-
if (!(params.
|
1193
|
+
if (!(params.ldap_host_2 && !(0, _utils.isString)(params.ldap_host_2))) {
|
1189
1194
|
_context3.next = 108;
|
1190
1195
|
break;
|
1191
1196
|
}
|
1192
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1197
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_2 must be of type String, received ".concat((0, _utils.getType)(params.ldap_host_2)));
|
1193
1198
|
case 108:
|
1194
|
-
if (!(params.
|
1199
|
+
if (!(params.ldap_host_3 && !(0, _utils.isString)(params.ldap_host_3))) {
|
1195
1200
|
_context3.next = 110;
|
1196
1201
|
break;
|
1197
1202
|
}
|
1198
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1203
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_host_3 must be of type String, received ".concat((0, _utils.getType)(params.ldap_host_3)));
|
1199
1204
|
case 110:
|
1200
|
-
if (!(params.
|
1205
|
+
if (!(params.ldap_port && !(0, _utils.isInt)(params.ldap_port))) {
|
1201
1206
|
_context3.next = 112;
|
1202
1207
|
break;
|
1203
1208
|
}
|
1204
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1209
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_port must be of type Int, received ".concat((0, _utils.getType)(params.ldap_port)));
|
1205
1210
|
case 112:
|
1206
|
-
if (!(params.
|
1211
|
+
if (!(params.ldap_username && !(0, _utils.isString)(params.ldap_username))) {
|
1207
1212
|
_context3.next = 114;
|
1208
1213
|
break;
|
1209
1214
|
}
|
1210
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1215
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username must be of type String, received ".concat((0, _utils.getType)(params.ldap_username)));
|
1211
1216
|
case 114:
|
1212
|
-
if (!(params.
|
1217
|
+
if (!(params.ldap_username_field && !(0, _utils.isString)(params.ldap_username_field))) {
|
1213
1218
|
_context3.next = 116;
|
1214
1219
|
break;
|
1215
1220
|
}
|
1216
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1221
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_username_field must be of type String, received ".concat((0, _utils.getType)(params.ldap_username_field)));
|
1217
1222
|
case 116:
|
1218
|
-
if (!(params.
|
1223
|
+
if (!(params.ldap_domain && !(0, _utils.isString)(params.ldap_domain))) {
|
1219
1224
|
_context3.next = 118;
|
1220
1225
|
break;
|
1221
1226
|
}
|
1222
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1227
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_domain must be of type String, received ".concat((0, _utils.getType)(params.ldap_domain)));
|
1223
1228
|
case 118:
|
1224
|
-
if (!(params.
|
1229
|
+
if (!(params.ldap_user_action && !(0, _utils.isString)(params.ldap_user_action))) {
|
1225
1230
|
_context3.next = 120;
|
1226
1231
|
break;
|
1227
1232
|
}
|
1228
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1233
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_action must be of type String, received ".concat((0, _utils.getType)(params.ldap_user_action)));
|
1229
1234
|
case 120:
|
1230
|
-
if (!(params.
|
1235
|
+
if (!(params.ldap_group_action && !(0, _utils.isString)(params.ldap_group_action))) {
|
1231
1236
|
_context3.next = 122;
|
1232
1237
|
break;
|
1233
1238
|
}
|
1234
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1239
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_action must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_action)));
|
1235
1240
|
case 122:
|
1236
|
-
if (!(params.
|
1241
|
+
if (!(params.ldap_user_include_groups && !(0, _utils.isString)(params.ldap_user_include_groups))) {
|
1237
1242
|
_context3.next = 124;
|
1238
1243
|
break;
|
1239
1244
|
}
|
1240
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1245
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_user_include_groups must be of type String, received ".concat((0, _utils.getType)(params.ldap_user_include_groups)));
|
1241
1246
|
case 124:
|
1242
|
-
if (!(params.
|
1247
|
+
if (!(params.ldap_group_exclusion && !(0, _utils.isString)(params.ldap_group_exclusion))) {
|
1243
1248
|
_context3.next = 126;
|
1244
1249
|
break;
|
1245
1250
|
}
|
1246
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1251
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_exclusion must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_exclusion)));
|
1247
1252
|
case 126:
|
1248
|
-
if (!(params.
|
1253
|
+
if (!(params.ldap_group_inclusion && !(0, _utils.isString)(params.ldap_group_inclusion))) {
|
1249
1254
|
_context3.next = 128;
|
1250
1255
|
break;
|
1251
1256
|
}
|
1252
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1257
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_group_inclusion must be of type String, received ".concat((0, _utils.getType)(params.ldap_group_inclusion)));
|
1253
1258
|
case 128:
|
1254
|
-
if (!(params.
|
1259
|
+
if (!(params.ldap_base_dn && !(0, _utils.isString)(params.ldap_base_dn))) {
|
1255
1260
|
_context3.next = 130;
|
1256
1261
|
break;
|
1257
1262
|
}
|
1258
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1263
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_base_dn must be of type String, received ".concat((0, _utils.getType)(params.ldap_base_dn)));
|
1259
1264
|
case 130:
|
1260
|
-
if (!(params.
|
1265
|
+
if (!(params.ldap_password_change && !(0, _utils.isString)(params.ldap_password_change))) {
|
1261
1266
|
_context3.next = 132;
|
1262
1267
|
break;
|
1263
1268
|
}
|
1264
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1269
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change must be of type String, received ".concat((0, _utils.getType)(params.ldap_password_change)));
|
1265
1270
|
case 132:
|
1266
|
-
if (!(params.
|
1271
|
+
if (!(params.ldap_password_change_confirmation && !(0, _utils.isString)(params.ldap_password_change_confirmation))) {
|
1267
1272
|
_context3.next = 134;
|
1268
1273
|
break;
|
1269
1274
|
}
|
1270
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1275
|
+
throw new errors.InvalidParameterError("Bad parameter: ldap_password_change_confirmation must be of type String, received ".concat((0, _utils.getType)(params.ldap_password_change_confirmation)));
|
1271
1276
|
case 134:
|
1272
|
-
if (!(params.
|
1277
|
+
if (!(params.smtp_password && !(0, _utils.isString)(params.smtp_password))) {
|
1273
1278
|
_context3.next = 136;
|
1274
1279
|
break;
|
1275
1280
|
}
|
1276
|
-
throw new errors.InvalidParameterError("Bad parameter:
|
1281
|
+
throw new errors.InvalidParameterError("Bad parameter: smtp_password must be of type String, received ".concat((0, _utils.getType)(params.smtp_password)));
|
1277
1282
|
case 136:
|
1278
|
-
|
1279
|
-
|
1283
|
+
if (!(params.session_expiry_minutes && !(0, _utils.isInt)(params.session_expiry_minutes))) {
|
1284
|
+
_context3.next = 138;
|
1285
|
+
break;
|
1286
|
+
}
|
1287
|
+
throw new errors.InvalidParameterError("Bad parameter: session_expiry_minutes must be of type Int, received ".concat((0, _utils.getType)(params.session_expiry_minutes)));
|
1280
1288
|
case 138:
|
1289
|
+
_context3.next = 140;
|
1290
|
+
return _Api.default.sendRequest('/site', 'PATCH', params, options);
|
1291
|
+
case 140:
|
1281
1292
|
response = _context3.sent;
|
1282
1293
|
return _context3.abrupt("return", new _Site(response === null || response === void 0 ? void 0 : response.data, options));
|
1283
|
-
case
|
1294
|
+
case 142:
|
1284
1295
|
case "end":
|
1285
1296
|
return _context3.stop();
|
1286
1297
|
}
|
package/package.json
CHANGED
package/src/Files.js
CHANGED
package/src/models/File.js
CHANGED
@@ -609,6 +609,7 @@ class File {
|
|
609
609
|
// Parameters:
|
610
610
|
// destination (required) - string - Copy destination path.
|
611
611
|
// structure - boolean - Copy structure only?
|
612
|
+
// overwrite - boolean - Overwrite existing file(s) in the destination?
|
612
613
|
copy = async (params = {}) => {
|
613
614
|
if (!this.attributes.path) {
|
614
615
|
throw new errors.EmptyPropertyError('Current object has no path')
|
@@ -653,6 +654,7 @@ class File {
|
|
653
654
|
//
|
654
655
|
// Parameters:
|
655
656
|
// destination (required) - string - Move destination path.
|
657
|
+
// overwrite - boolean - Overwrite existing file(s) in the destination?
|
656
658
|
move = async (params = {}) => {
|
657
659
|
if (!this.attributes.path) {
|
658
660
|
throw new errors.EmptyPropertyError('Current object has no path')
|
package/src/models/Site.js
CHANGED
@@ -31,6 +31,9 @@ class Site {
|
|
31
31
|
// string # Site name
|
32
32
|
getName = () => this.attributes.name
|
33
33
|
|
34
|
+
// array # Additional extensions that are considered text files
|
35
|
+
getAdditionalTextFileTypes = () => this.attributes.additional_text_file_types
|
36
|
+
|
34
37
|
// boolean # Is SMS two factor authentication allowed?
|
35
38
|
getAllowed2faMethodSms = () => this.attributes.allowed_2fa_method_sms
|
36
39
|
|
@@ -543,6 +546,7 @@ class Site {
|
|
543
546
|
// motd_use_for_ftp - boolean - Show message to users connecting via FTP
|
544
547
|
// motd_use_for_sftp - boolean - Show message to users connecting via SFTP
|
545
548
|
// left_navigation_visibility - object - Visibility settings for account navigation
|
549
|
+
// additional_text_file_types - array(string) - Additional extensions that are considered text files
|
546
550
|
// session_expiry - double - Session expiry in hours
|
547
551
|
// ssl_required - boolean - Is SSL required? Disabling this is insecure.
|
548
552
|
// tls_disabled - boolean - DO NOT ENABLE. This setting allows TLSv1.0 and TLSv1.1 to be used on your site. We intend to remove this capability entirely in early 2024. If set, the `sftp_insecure_ciphers` flag will be automatically set to true.
|
@@ -730,6 +734,10 @@ class Site {
|
|
730
734
|
throw new errors.InvalidParameterError(`Bad parameter: motd_text must be of type String, received ${getType(params.motd_text)}`)
|
731
735
|
}
|
732
736
|
|
737
|
+
if (params.additional_text_file_types && !isArray(params.additional_text_file_types)) {
|
738
|
+
throw new errors.InvalidParameterError(`Bad parameter: additional_text_file_types must be of type Array, received ${getType(params.additional_text_file_types)}`)
|
739
|
+
}
|
740
|
+
|
733
741
|
if (params.user_lockout_tries && !isInt(params.user_lockout_tries)) {
|
734
742
|
throw new errors.InvalidParameterError(`Bad parameter: user_lockout_tries must be of type Int, received ${getType(params.user_lockout_tries)}`)
|
735
743
|
}
|