files-com 1.6.137__py3-none-any.whl → 1.6.164__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
files_sdk/models/site.py CHANGED
@@ -157,7 +157,6 @@ class Site:
157
157
  "smtp_from": None, # string - From address to use when mailing through custom SMTP
158
158
  "smtp_port": None, # int64 - SMTP server port
159
159
  "smtp_username": None, # string - SMTP server username
160
- "session_expiry": None, # double - Session expiry in hours
161
160
  "session_expiry_minutes": None, # int64 - Session expiry in minutes
162
161
  "snapshot_sharing_enabled": None, # boolean - Allow snapshot share links creation
163
162
  "ssl_required": None, # boolean - Is SSL required? Disabling this is insecure.
@@ -269,7 +268,7 @@ def get_usage(params=None, options=None):
269
268
  # legacy_checksums_mode - boolean - Use legacy checksums mode?
270
269
  # migrate_remote_server_sync_to_sync - boolean - If true, we will migrate all remote server syncs to the new Sync model.
271
270
  # as2_message_retention_days - int64 - Number of days to retain AS2 messages (incoming and outgoing).
272
- # session_expiry - double - Session expiry in hours
271
+ # session_expiry_minutes - int64 - Session expiry in minutes
273
272
  # ssl_required - boolean - Is SSL required? Disabling this is insecure.
274
273
  # sftp_insecure_ciphers - boolean - If true, we will allow weak and known insecure ciphers to be used for SFTP connections. Enabling this setting severely weakens the security of your site and it is not recommend, except as a last resort for compatibility.
275
274
  # sftp_insecure_diffie_hellman - boolean - If true, we will allow weak Diffie Hellman parameters to be used within ciphers for SFTP that are otherwise on our secure list. This has the effect of making the cipher weaker than our normal threshold for security, but is required to support certain legacy or broken SSH and MFT clients. Enabling this weakens security, but not nearly as much as enabling the full `sftp_insecure_ciphers` option.
@@ -391,7 +390,6 @@ def get_usage(params=None, options=None):
391
390
  # ldap_password_change - string - New LDAP password.
392
391
  # ldap_password_change_confirmation - string - Confirm new LDAP password.
393
392
  # smtp_password - string - Password for SMTP server.
394
- # session_expiry_minutes - int64 - Session expiry in minutes
395
393
  def update(params=None, options=None):
396
394
  if not isinstance(params, dict):
397
395
  params = {}
@@ -633,11 +631,11 @@ def update(params=None, options=None):
633
631
  raise InvalidParameterError(
634
632
  "Bad parameter: as2_message_retention_days must be an int"
635
633
  )
636
- if "session_expiry" in params and not isinstance(
637
- params["session_expiry"], float
634
+ if "session_expiry_minutes" in params and not isinstance(
635
+ params["session_expiry_minutes"], int
638
636
  ):
639
637
  raise InvalidParameterError(
640
- "Bad parameter: session_expiry must be an float"
638
+ "Bad parameter: session_expiry_minutes must be an int"
641
639
  )
642
640
  if "ssl_required" in params and not isinstance(
643
641
  params["ssl_required"], bool
@@ -1283,12 +1281,6 @@ def update(params=None, options=None):
1283
1281
  raise InvalidParameterError(
1284
1282
  "Bad parameter: smtp_password must be an str"
1285
1283
  )
1286
- if "session_expiry_minutes" in params and not isinstance(
1287
- params["session_expiry_minutes"], int
1288
- ):
1289
- raise InvalidParameterError(
1290
- "Bad parameter: session_expiry_minutes must be an int"
1291
- )
1292
1284
  response, options = Api.send_request("PATCH", "/site", params, options)
1293
1285
  return Site(response.data, options)
1294
1286
 
files_sdk/models/sync.py CHANGED
@@ -251,6 +251,8 @@ class Sync:
251
251
  # Parameters:
252
252
  # cursor - string - Used for pagination. When a list request has more records available, cursors are provided in the response headers `X-Files-Cursor-Next` and `X-Files-Cursor-Prev`. Send one of those cursor value here to resume an existing list from the next available record. Note: many of our SDKs have iterator methods that will automatically handle cursor-based pagination.
253
253
  # per_page - int64 - Number of records to show per page. (Max: 10,000, 1,000 or less is recommended).
254
+ # sort_by - object - If set, sort records by the specified field in either `asc` or `desc` direction. Valid fields are `site_id`.
255
+ # filter - object - If set, return records where the specified field is equal to the supplied value. Valid fields are `src_remote_server_id` and `dest_remote_server_id`.
254
256
  def list(params=None, options=None):
255
257
  if not isinstance(params, dict):
256
258
  params = {}
@@ -260,6 +262,10 @@ def list(params=None, options=None):
260
262
  raise InvalidParameterError("Bad parameter: cursor must be an str")
261
263
  if "per_page" in params and not isinstance(params["per_page"], int):
262
264
  raise InvalidParameterError("Bad parameter: per_page must be an int")
265
+ if "sort_by" in params and not isinstance(params["sort_by"], dict):
266
+ raise InvalidParameterError("Bad parameter: sort_by must be an dict")
267
+ if "filter" in params and not isinstance(params["filter"], dict):
268
+ raise InvalidParameterError("Bad parameter: filter must be an dict")
263
269
  return ListObj(Sync, "GET", "/syncs", params, options)
264
270
 
265
271