@seamapi/types 1.369.0 → 1.369.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/connect.cjs +51 -15
- package/dist/connect.cjs.map +1 -1
- package/dist/connect.d.cts +58 -11
- package/lib/seam/connect/models/acs/acs-access-group.js +4 -1
- package/lib/seam/connect/models/acs/acs-access-group.js.map +1 -1
- package/lib/seam/connect/models/acs/acs-credential.js +5 -1
- package/lib/seam/connect/models/acs/acs-credential.js.map +1 -1
- package/lib/seam/connect/models/acs/acs-encoder.js +14 -1
- package/lib/seam/connect/models/acs/acs-encoder.js.map +1 -1
- package/lib/seam/connect/models/acs/acs-entrance.js +2 -0
- package/lib/seam/connect/models/acs/acs-entrance.js.map +1 -1
- package/lib/seam/connect/models/acs/acs-system.js +4 -0
- package/lib/seam/connect/models/acs/acs-system.js.map +1 -1
- package/lib/seam/connect/models/acs/acs-users/acs-user.js +6 -0
- package/lib/seam/connect/models/acs/acs-users/acs-user.js.map +1 -1
- package/lib/seam/connect/models/pagination.js +1 -0
- package/lib/seam/connect/models/pagination.js.map +1 -1
- package/lib/seam/connect/openapi.d.ts +6 -0
- package/lib/seam/connect/openapi.js +14 -8
- package/lib/seam/connect/openapi.js.map +1 -1
- package/lib/seam/connect/route-types.d.ts +52 -11
- package/package.json +1 -1
- package/src/lib/seam/connect/models/acs/acs-access-group.ts +4 -1
- package/src/lib/seam/connect/models/acs/acs-credential.ts +5 -1
- package/src/lib/seam/connect/models/acs/acs-encoder.ts +14 -1
- package/src/lib/seam/connect/models/acs/acs-entrance.ts +2 -0
- package/src/lib/seam/connect/models/acs/acs-system.ts +4 -0
- package/src/lib/seam/connect/models/acs/acs-users/acs-user.ts +6 -0
- package/src/lib/seam/connect/models/pagination.ts +1 -0
- package/src/lib/seam/connect/openapi.ts +14 -8
- package/src/lib/seam/connect/route-types.ts +52 -11
package/dist/connect.cjs
CHANGED
|
@@ -1719,7 +1719,10 @@ var acs_access_group = common_acs_access_group.extend({
|
|
|
1719
1719
|
route_path: /acs/access_groups
|
|
1720
1720
|
---
|
|
1721
1721
|
Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.
|
|
1722
|
-
|
|
1722
|
+
|
|
1723
|
+
Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
|
|
1724
|
+
|
|
1725
|
+
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
|
|
1723
1726
|
`);
|
|
1724
1727
|
var unmanaged_acs_access_group = common_acs_access_group.extend({
|
|
1725
1728
|
is_managed: zod.z.literal(false)
|
|
@@ -1946,7 +1949,11 @@ var acs_credential = common_acs_credential.merge(
|
|
|
1946
1949
|
---
|
|
1947
1950
|
route_path: /acs/credentials
|
|
1948
1951
|
---
|
|
1949
|
-
Means by which an [
|
|
1952
|
+
Means by which an [access control system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) gains access at an [entrance](https://docs.seam.co/latest/capability-guides/access-systems/retrieving-entrance-details). The \`acs_credential\` object represents a [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) that provides an ACS user access within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).
|
|
1953
|
+
|
|
1954
|
+
An access control system generally uses digital means of access to authorize a user trying to get through a specific entrance. Examples of credentials include plastic key cards, mobile keys, biometric identifiers, and PIN codes. The electronic nature of these credentials, as well as the fact that access is centralized, enables both the rapid provisioning and rescinding of access and the ability to compile access audit logs.
|
|
1955
|
+
|
|
1956
|
+
For each \`acs_credential\`, you define the access method. You can also specify additional properties, such as a PIN code, depending on the credential type.
|
|
1950
1957
|
`);
|
|
1951
1958
|
var unmanaged_acs_credential = common_acs_credential.merge(
|
|
1952
1959
|
zod.z.object({
|
|
@@ -2056,7 +2063,20 @@ var acs_encoder = zod.z.object({
|
|
|
2056
2063
|
---
|
|
2057
2064
|
route_path: /acs/encoders
|
|
2058
2065
|
---
|
|
2059
|
-
Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).
|
|
2066
|
+
Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).
|
|
2067
|
+
|
|
2068
|
+
Some access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:
|
|
2069
|
+
|
|
2070
|
+
1. Credential creation
|
|
2071
|
+
Configure the access parameters for the credential.
|
|
2072
|
+
2. Card encoding
|
|
2073
|
+
Write the credential data onto the card using a compatible card encoder.
|
|
2074
|
+
|
|
2075
|
+
Separately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.
|
|
2076
|
+
|
|
2077
|
+
See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
|
|
2078
|
+
|
|
2079
|
+
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
|
|
2060
2080
|
`);
|
|
2061
2081
|
var acs_entrance_salto_space_metadata = zod.z.object({
|
|
2062
2082
|
door_name: zod.z.string(),
|
|
@@ -2113,6 +2133,8 @@ var acs_entrance = zod.z.object({
|
|
|
2113
2133
|
route_path: /acs/entrances
|
|
2114
2134
|
---
|
|
2115
2135
|
Represents an [entrance](https://docs.seam.co/latest/capability-guides/access-systems/retrieving-entrance-details) within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).
|
|
2136
|
+
|
|
2137
|
+
In an access control system, an entrance is a secured door, gate, zone, or other method of entry. You can list details for all the \`acs_entrance\` resources in your workspace or get these details for a specific \`acs_entrance\`. You can also list all entrances associated with a specific credential, and you can list all credentials associated with a specific entrance.
|
|
2116
2138
|
`);
|
|
2117
2139
|
var acs_system_capability_flags = zod.z.object({
|
|
2118
2140
|
can_automate_enrollment: zod.z.boolean().optional().describe(
|
|
@@ -2310,6 +2332,10 @@ var acs_system = zod.z.object({
|
|
|
2310
2332
|
route_path: /acs/systems
|
|
2311
2333
|
---
|
|
2312
2334
|
Represents an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).
|
|
2335
|
+
|
|
2336
|
+
Within an \`acs_system\`, create [\`acs_user\`s](https://docs.seam.co/latest/api/acs/users#acs_user) and [\`acs_credential\`s](https://docs.seam.co/latest/api/acs/credentials#acs_credential) to grant access to the \`acs_user\`s.
|
|
2337
|
+
|
|
2338
|
+
For details about the resources associated with an access control system, see the [access control systems namespace](https://docs.seam.co/latest/api/acs).
|
|
2313
2339
|
`);
|
|
2314
2340
|
var phone_number = zod.z.coerce.string().trim().refine(
|
|
2315
2341
|
(val) => {
|
|
@@ -2510,7 +2536,7 @@ zod.z.object({
|
|
|
2510
2536
|
profile: acs_user_profile_modification.optional().nullable()
|
|
2511
2537
|
});
|
|
2512
2538
|
var user_fields = zod.z.object({
|
|
2513
|
-
full_name: zod.z.string().optional().describe(
|
|
2539
|
+
full_name: zod.z.string().trim().min(1).optional().describe(
|
|
2514
2540
|
"Full name of the [ACS user](https://docs.seam.co/latest/capability-guides/access-systems/user-management)."
|
|
2515
2541
|
),
|
|
2516
2542
|
email: zod.z.string().email().optional().describe(`
|
|
@@ -2597,6 +2623,10 @@ var acs_user = common_acs_user.merge(
|
|
|
2597
2623
|
route_path: /acs/users
|
|
2598
2624
|
---
|
|
2599
2625
|
Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).
|
|
2626
|
+
|
|
2627
|
+
An \`acs_user\` typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
2628
|
+
|
|
2629
|
+
For details about how to configure \`acs_user\`s in your access control system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
|
|
2600
2630
|
`);
|
|
2601
2631
|
var unmanaged_acs_user = common_acs_user.merge(
|
|
2602
2632
|
zod.z.object({
|
|
@@ -4069,7 +4099,7 @@ var noise_threshold = zod.z.object({
|
|
|
4069
4099
|
---
|
|
4070
4100
|
`);
|
|
4071
4101
|
var pagination = zod.z.object({
|
|
4072
|
-
next_page_cursor: zod.z.string().nullable().describe(
|
|
4102
|
+
next_page_cursor: zod.z.string().base64().nullable().describe(
|
|
4073
4103
|
"Opaque value that can be used to select the next page of results via the `page_cursor` parameter."
|
|
4074
4104
|
),
|
|
4075
4105
|
has_next_page: zod.z.boolean().describe(
|
|
@@ -5091,7 +5121,7 @@ var openapi_default = {
|
|
|
5091
5121
|
"x-route-path": "/access_codes"
|
|
5092
5122
|
},
|
|
5093
5123
|
acs_access_group: {
|
|
5094
|
-
description: "Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\
|
|
5124
|
+
description: "Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).",
|
|
5095
5125
|
properties: {
|
|
5096
5126
|
access_group_type: {
|
|
5097
5127
|
deprecated: true,
|
|
@@ -5194,7 +5224,7 @@ var openapi_default = {
|
|
|
5194
5224
|
"x-route-path": "/acs/access_groups"
|
|
5195
5225
|
},
|
|
5196
5226
|
acs_credential: {
|
|
5197
|
-
description: "Means by which an [
|
|
5227
|
+
description: "Means by which an [access control system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) gains access at an [entrance](https://docs.seam.co/latest/capability-guides/access-systems/retrieving-entrance-details). The `acs_credential` object represents a [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) that provides an ACS user access within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access control system generally uses digital means of access to authorize a user trying to get through a specific entrance. Examples of credentials include plastic key cards, mobile keys, biometric identifiers, and PIN codes. The electronic nature of these credentials, as well as the fact that access is centralized, enables both the rapid provisioning and rescinding of access and the ability to compile access audit logs.\n\nFor each `acs_credential`, you define the access method. You can also specify additional properties, such as a PIN code, depending on the credential type.",
|
|
5198
5228
|
properties: {
|
|
5199
5229
|
access_method: {
|
|
5200
5230
|
description: "Access method for the [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials). Supported values: `code`, `card`, `mobile_key`.",
|
|
@@ -5547,7 +5577,7 @@ var openapi_default = {
|
|
|
5547
5577
|
"x-route-path": "/acs/credential_provisioning_automations"
|
|
5548
5578
|
},
|
|
5549
5579
|
acs_encoder: {
|
|
5550
|
-
description: "Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).
|
|
5580
|
+
description: "Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).",
|
|
5551
5581
|
properties: {
|
|
5552
5582
|
acs_encoder_id: {
|
|
5553
5583
|
description: "ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners.",
|
|
@@ -5611,7 +5641,7 @@ var openapi_default = {
|
|
|
5611
5641
|
"x-route-path": "/acs/encoders"
|
|
5612
5642
|
},
|
|
5613
5643
|
acs_entrance: {
|
|
5614
|
-
description: "Represents an [entrance](https://docs.seam.co/latest/capability-guides/access-systems/retrieving-entrance-details) within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).",
|
|
5644
|
+
description: "Represents an [entrance](https://docs.seam.co/latest/capability-guides/access-systems/retrieving-entrance-details) within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nIn an access control system, an entrance is a secured door, gate, zone, or other method of entry. You can list details for all the `acs_entrance` resources in your workspace or get these details for a specific `acs_entrance`. You can also list all entrances associated with a specific credential, and you can list all credentials associated with a specific entrance.",
|
|
5615
5645
|
properties: {
|
|
5616
5646
|
acs_entrance_id: {
|
|
5617
5647
|
description: "ID of the [entrance](https://docs.seam.co/latest/capability-guides/access-systems/retrieving-entrance-details).",
|
|
@@ -5764,7 +5794,7 @@ var openapi_default = {
|
|
|
5764
5794
|
"x-route-path": "/acs/entrances"
|
|
5765
5795
|
},
|
|
5766
5796
|
acs_system: {
|
|
5767
|
-
description: "Represents an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).",
|
|
5797
|
+
description: "Represents an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nWithin an `acs_system`, create [`acs_user`s](https://docs.seam.co/latest/api/acs/users#acs_user) and [`acs_credential`s](https://docs.seam.co/latest/api/acs/credentials#acs_credential) to grant access to the `acs_user`s.\n\nFor details about the resources associated with an access control system, see the [access control systems namespace](https://docs.seam.co/latest/api/acs).",
|
|
5768
5798
|
properties: {
|
|
5769
5799
|
acs_system_id: {
|
|
5770
5800
|
description: "ID of the [access control system](https://docs.seam.co/latest/capability-guides/access-systems).",
|
|
@@ -6121,7 +6151,7 @@ var openapi_default = {
|
|
|
6121
6151
|
"x-route-path": "/acs/systems"
|
|
6122
6152
|
},
|
|
6123
6153
|
acs_user: {
|
|
6124
|
-
description: "Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).",
|
|
6154
|
+
description: "Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn `acs_user` typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure `acs_user`s in your access control system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).",
|
|
6125
6155
|
properties: {
|
|
6126
6156
|
access_schedule: {
|
|
6127
6157
|
description: "`starts_at` and `ends_at` timestamps for the [ACS user's](https://docs.seam.co/latest/capability-guides/access-systems/user-management) access.",
|
|
@@ -6300,6 +6330,7 @@ var openapi_default = {
|
|
|
6300
6330
|
},
|
|
6301
6331
|
full_name: {
|
|
6302
6332
|
description: "Full name of the [ACS user](https://docs.seam.co/latest/capability-guides/access-systems/user-management).",
|
|
6333
|
+
minLength: 1,
|
|
6303
6334
|
type: "string"
|
|
6304
6335
|
},
|
|
6305
6336
|
hid_acs_system_id: { format: "uuid", type: "string" },
|
|
@@ -6914,7 +6945,7 @@ var openapi_default = {
|
|
|
6914
6945
|
nullable: true,
|
|
6915
6946
|
oneOf: [
|
|
6916
6947
|
{
|
|
6917
|
-
description: "Means by which an [
|
|
6948
|
+
description: "Means by which an [access control system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) gains access at an [entrance](https://docs.seam.co/latest/capability-guides/access-systems/retrieving-entrance-details). The `acs_credential` object represents a [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) that provides an ACS user access within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access control system generally uses digital means of access to authorize a user trying to get through a specific entrance. Examples of credentials include plastic key cards, mobile keys, biometric identifiers, and PIN codes. The electronic nature of these credentials, as well as the fact that access is centralized, enables both the rapid provisioning and rescinding of access and the ability to compile access audit logs.\n\nFor each `acs_credential`, you define the access method. You can also specify additional properties, such as a PIN code, depending on the credential type.",
|
|
6918
6949
|
properties: {
|
|
6919
6950
|
access_method: {
|
|
6920
6951
|
description: "Access method for the [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials). Supported values: `code`, `card`, `mobile_key`.",
|
|
@@ -7766,7 +7797,7 @@ var openapi_default = {
|
|
|
7766
7797
|
description: "If an encoding attempt was successful, includes the `acs_credential` data that was encoded onto the card.",
|
|
7767
7798
|
oneOf: [
|
|
7768
7799
|
{
|
|
7769
|
-
description: "Means by which an [
|
|
7800
|
+
description: "Means by which an [access control system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) gains access at an [entrance](https://docs.seam.co/latest/capability-guides/access-systems/retrieving-entrance-details). The `acs_credential` object represents a [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) that provides an ACS user access within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access control system generally uses digital means of access to authorize a user trying to get through a specific entrance. Examples of credentials include plastic key cards, mobile keys, biometric identifiers, and PIN codes. The electronic nature of these credentials, as well as the fact that access is centralized, enables both the rapid provisioning and rescinding of access and the ability to compile access audit logs.\n\nFor each `acs_credential`, you define the access method. You can also specify additional properties, such as a PIN code, depending on the credential type.",
|
|
7770
7801
|
properties: {
|
|
7771
7802
|
access_method: {
|
|
7772
7803
|
description: "Access method for the [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials). Supported values: `code`, `card`, `mobile_key`.",
|
|
@@ -17852,6 +17883,7 @@ var openapi_default = {
|
|
|
17852
17883
|
},
|
|
17853
17884
|
full_name: {
|
|
17854
17885
|
description: "Full name of the [ACS user](https://docs.seam.co/latest/capability-guides/access-systems/user-management).",
|
|
17886
|
+
minLength: 1,
|
|
17855
17887
|
type: "string"
|
|
17856
17888
|
},
|
|
17857
17889
|
hid_acs_system_id: { format: "uuid", type: "string" },
|
|
@@ -23723,6 +23755,7 @@ var openapi_default = {
|
|
|
23723
23755
|
},
|
|
23724
23756
|
full_name: {
|
|
23725
23757
|
description: "Full name of the [ACS user](https://docs.seam.co/latest/capability-guides/access-systems/user-management).",
|
|
23758
|
+
minLength: 1,
|
|
23726
23759
|
type: "string"
|
|
23727
23760
|
},
|
|
23728
23761
|
hid_acs_system_id: { format: "uuid", type: "string" },
|
|
@@ -23800,6 +23833,7 @@ var openapi_default = {
|
|
|
23800
23833
|
},
|
|
23801
23834
|
full_name: {
|
|
23802
23835
|
description: "Full name of the [ACS user](https://docs.seam.co/latest/capability-guides/access-systems/user-management).",
|
|
23836
|
+
minLength: 1,
|
|
23803
23837
|
type: "string"
|
|
23804
23838
|
},
|
|
23805
23839
|
hid_acs_system_id: { format: "uuid", type: "string" },
|
|
@@ -25563,7 +25597,8 @@ var openapi_default = {
|
|
|
25563
25597
|
tags: ["/devices"],
|
|
25564
25598
|
"x-fern-sdk-group-name": ["devices", "simulate"],
|
|
25565
25599
|
"x-fern-sdk-method-name": "access_code_lock",
|
|
25566
|
-
"x-response-key": null
|
|
25600
|
+
"x-response-key": null,
|
|
25601
|
+
"x-undocumented": "Unreleased."
|
|
25567
25602
|
}
|
|
25568
25603
|
},
|
|
25569
25604
|
"/devices/simulate/access_code_unlock": {
|
|
@@ -25608,7 +25643,8 @@ var openapi_default = {
|
|
|
25608
25643
|
tags: ["/devices"],
|
|
25609
25644
|
"x-fern-sdk-group-name": ["devices", "simulate"],
|
|
25610
25645
|
"x-fern-sdk-method-name": "access_code_unlock",
|
|
25611
|
-
"x-response-key": null
|
|
25646
|
+
"x-response-key": null,
|
|
25647
|
+
"x-undocumented": "Unreleased."
|
|
25612
25648
|
}
|
|
25613
25649
|
},
|
|
25614
25650
|
"/devices/simulate/connect": {
|