files-com 1.6.12__py3-none-any.whl → 1.6.14__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of files-com might be problematic. Click here for more details.
- _VERSION +1 -1
- {files_com-1.6.12.dist-info → files_com-1.6.14.dist-info}/METADATA +1 -1
- {files_com-1.6.12.dist-info → files_com-1.6.14.dist-info}/RECORD +9 -9
- files_sdk/__init__.py +1 -1
- files_sdk/models/as2_partner.py +4 -4
- files_sdk/models/public_key.py +1 -0
- {files_com-1.6.12.dist-info → files_com-1.6.14.dist-info}/WHEEL +0 -0
- {files_com-1.6.12.dist-info → files_com-1.6.14.dist-info}/licenses/LICENSE +0 -0
- {files_com-1.6.12.dist-info → files_com-1.6.14.dist-info}/top_level.txt +0 -0
_VERSION
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
1.6.
|
|
1
|
+
1.6.14
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
README.md,sha256=dJpTjuJA-JJIQ4CKgQhlbqyxanVatHk0RXgCD6KFl3A,28758
|
|
2
|
-
_VERSION,sha256=
|
|
3
|
-
files_com-1.6.
|
|
4
|
-
files_sdk/__init__.py,sha256=
|
|
2
|
+
_VERSION,sha256=zAiN9vddsGbO2jD_QHAQpub4SSmlIcX3EEcg_frAUDM,7
|
|
3
|
+
files_com-1.6.14.dist-info/licenses/LICENSE,sha256=ziANl9OTD-5-iE8XYIZNm6IYBDxOCHwQ-mdhci7lNew,1102
|
|
4
|
+
files_sdk/__init__.py,sha256=cdI_8PzEMEJ_0IBTLDoFanu0C-_xF7phiylXSxHEu1Y,12464
|
|
5
5
|
files_sdk/api.py,sha256=HOLk50HLQCbnHwnAr9OElQEWvdA_BABBSEvvFSt1S4A,1846
|
|
6
6
|
files_sdk/api_client.py,sha256=cfFvm-o4Ao8SWADiJv7t7qnJfG_LJmWV3l6ALTC-Opo,11264
|
|
7
7
|
files_sdk/error.py,sha256=lZKht6lYj9i99CzRbHschmdSs6T2Y51-YrZX_5Y_o7A,64945
|
|
@@ -18,7 +18,7 @@ files_sdk/models/api_request_log.py,sha256=zpHdjzuyof6IngTSCYDrL7wX2_mG6HUQwjRdh
|
|
|
18
18
|
files_sdk/models/app.py,sha256=JiK40FW3FOp_sUehb3RCWfkc9-1OcjWai15tn9BtxbU,4678
|
|
19
19
|
files_sdk/models/as2_incoming_message.py,sha256=VEkva5pSbXo_mM4UWQLcaL3EZSgBWIPqNY8PMLTMn2o,7153
|
|
20
20
|
files_sdk/models/as2_outgoing_message.py,sha256=7mSM2Ce-9HUsk7klRmS30kBBPMJBRWsXmWCI7Uz85MQ,6696
|
|
21
|
-
files_sdk/models/as2_partner.py,sha256=
|
|
21
|
+
files_sdk/models/as2_partner.py,sha256=S51I40FW2mvQgFkfYrLt-WjoJ2zEpf3iHquTgFkXfwE,20118
|
|
22
22
|
files_sdk/models/as2_station.py,sha256=ZFjSw2sBRQgh9x1m76dFB2crSp4P__9xqStaBZa8ZBY,10955
|
|
23
23
|
files_sdk/models/auto.py,sha256=nODYUPqEsTw7suz0s6zDTsFd8j5yeSIzBELTiaXxzRE,995
|
|
24
24
|
files_sdk/models/automation.py,sha256=MmzKUW6VbOGUcNOEQdyhMPAT49M8sIvuf3jakXG4m6s,48097
|
|
@@ -79,7 +79,7 @@ files_sdk/models/priority.py,sha256=kByzhOOVwKVSxrMI5xJb1RwUtQdSuFFBLBNEHYzWSm0,
|
|
|
79
79
|
files_sdk/models/project.py,sha256=nDpX0qc7jY6evRprjQ7l4YgjM9WNH0aXaRbE2mpo6zk,7510
|
|
80
80
|
files_sdk/models/public_hosting_request_log.py,sha256=N3QWRTV0fmKNNrSRlw04-xwPezvKhsCXiFYkr5eKsyE,5441
|
|
81
81
|
files_sdk/models/public_ip_address.py,sha256=5VSlJ4PZQilV6tpGRCnyvGJzqRzdSRpwVDZxKwsplcU,1259
|
|
82
|
-
files_sdk/models/public_key.py,sha256=
|
|
82
|
+
files_sdk/models/public_key.py,sha256=c-OySt4m2ghmPZ6jutTZTmB8IVYp5jN-OE8_K9k2U9Y,10039
|
|
83
83
|
files_sdk/models/remote_bandwidth_snapshot.py,sha256=kryNewGqe_ZN4D3JBL26DoVYKDowubUNLXn7NQtEJb8,4476
|
|
84
84
|
files_sdk/models/remote_server.py,sha256=crDqrWv56GEYW49Y0vUiZhXCvjymMyn-ByWmqfEof3k,86036
|
|
85
85
|
files_sdk/models/remote_server_configuration_file.py,sha256=m6kfh5yUAYTP42nHuYJ-GFu73981kjjqPuZX3SeHbiA,3330
|
|
@@ -108,7 +108,7 @@ files_sdk/models/user_request.py,sha256=ykA5Lq0MYB7qTDOMMFBuyKa_R_LgQwGVorC-q-6q
|
|
|
108
108
|
files_sdk/models/user_sftp_client_use.py,sha256=VnOo3ll6fwSc8grG5ZqGK8o3grYKg5P9b5B_hGS4vCs,2827
|
|
109
109
|
files_sdk/models/web_dav_action_log.py,sha256=jPX4sOmR9TbYnsU8DU3b0-KQ8E2cHNaqdmFZKTjzpwE,56358
|
|
110
110
|
files_sdk/models/webhook_test.py,sha256=AWGH8ULsgltBJL2YtTYGnAJ80cCVekrjZ2sUP0UlWgc,5018
|
|
111
|
-
files_com-1.6.
|
|
112
|
-
files_com-1.6.
|
|
113
|
-
files_com-1.6.
|
|
114
|
-
files_com-1.6.
|
|
111
|
+
files_com-1.6.14.dist-info/METADATA,sha256=-1gLnB3CtMJGe_aSLZ7SVIo8pfNgWp66Kvm0-ZRHze8,29050
|
|
112
|
+
files_com-1.6.14.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
|
|
113
|
+
files_com-1.6.14.dist-info/top_level.txt,sha256=p_2P-gluT_8boeXQNixTP3x-tFd1-la2NedKOiln21I,10
|
|
114
|
+
files_com-1.6.14.dist-info/RECORD,,
|
files_sdk/__init__.py
CHANGED
files_sdk/models/as2_partner.py
CHANGED
|
@@ -14,7 +14,7 @@ class As2Partner:
|
|
|
14
14
|
"as2_station_id": None, # int64 - ID of the AS2 Station associated with this partner.
|
|
15
15
|
"name": None, # string - The partner's formal AS2 name.
|
|
16
16
|
"uri": None, # string - Public URI where we will send the AS2 messages (via HTTP/HTTPS).
|
|
17
|
-
"server_certificate": None, # string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
|
|
17
|
+
"server_certificate": None, # string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
|
18
18
|
"http_auth_username": None, # string - Username to send to server for HTTP Authentication.
|
|
19
19
|
"additional_http_headers": None, # object - Additional HTTP Headers for outgoing message sent to this partner.
|
|
20
20
|
"default_mime_type": None, # string - Default mime type of the file attached to the encrypted message
|
|
@@ -55,7 +55,7 @@ class As2Partner:
|
|
|
55
55
|
# http_auth_username - string - Username to send to server for HTTP Authentication.
|
|
56
56
|
# http_auth_password - string - Password to send to server for HTTP Authentication.
|
|
57
57
|
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
|
58
|
-
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
|
|
58
|
+
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
|
59
59
|
# default_mime_type - string - Default mime type of the file attached to the encrypted message
|
|
60
60
|
# additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
|
|
61
61
|
# name - string - The partner's formal AS2 name.
|
|
@@ -200,7 +200,7 @@ def get(id, params=None, options=None):
|
|
|
200
200
|
# http_auth_username - string - Username to send to server for HTTP Authentication.
|
|
201
201
|
# http_auth_password - string - Password to send to server for HTTP Authentication.
|
|
202
202
|
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
|
203
|
-
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
|
|
203
|
+
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
|
204
204
|
# default_mime_type - string - Default mime type of the file attached to the encrypted message
|
|
205
205
|
# additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
|
|
206
206
|
# as2_station_id (required) - int64 - ID of the AS2 Station associated with this partner.
|
|
@@ -289,7 +289,7 @@ def create(params=None, options=None):
|
|
|
289
289
|
# http_auth_username - string - Username to send to server for HTTP Authentication.
|
|
290
290
|
# http_auth_password - string - Password to send to server for HTTP Authentication.
|
|
291
291
|
# mdn_validation_level - string - How should Files.com evaluate message transfer success based on a partner's MDN response? This setting does not affect MDN storage; all MDNs received from a partner are always stored. `none`: MDN is stored for informational purposes only, a successful HTTPS transfer is a successful AS2 transfer. `weak`: Inspect the MDN for MIC and Disposition only. `normal`: `weak` plus validate MDN signature matches body, `strict`: `normal` but do not allow signatures from self-signed or incorrectly purposed certificates.
|
|
292
|
-
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS?
|
|
292
|
+
# server_certificate - string - Should we require that the remote HTTP server have a valid SSL Certificate for HTTPS? (This only applies to Outgoing AS2 message from Files.com to a Partner.)
|
|
293
293
|
# default_mime_type - string - Default mime type of the file attached to the encrypted message
|
|
294
294
|
# additional_http_headers - object - Additional HTTP Headers for outgoing message sent to this partner.
|
|
295
295
|
# name - string - The partner's formal AS2 name.
|
files_sdk/models/public_key.py
CHANGED
|
@@ -15,6 +15,7 @@ class PublicKey:
|
|
|
15
15
|
"created_at": None, # date-time - Public key created at date/time
|
|
16
16
|
"fingerprint": None, # string - Public key fingerprint (MD5)
|
|
17
17
|
"fingerprint_sha256": None, # string - Public key fingerprint (SHA256)
|
|
18
|
+
"last_login_at": None, # date-time - Key's most recent login time via SFTP
|
|
18
19
|
"username": None, # string - Username of the user this public key is associated with
|
|
19
20
|
"user_id": None, # int64 - User ID this public key is associated with
|
|
20
21
|
"public_key": None, # string - Actual contents of SSH key.
|
|
File without changes
|
|
File without changes
|
|
File without changes
|