@seamapi/types 1.804.0 → 1.806.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/connect.cjs CHANGED
@@ -3216,7 +3216,7 @@ var acs_access_group = common_acs_access_group.extend({
3216
3216
 
3217
3217
  Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
3218
3218
 
3219
- To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
3219
+ To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
3220
3220
  `);
3221
3221
  var unmanaged_acs_access_group = common_acs_access_group.extend({
3222
3222
  is_managed: zod.z.literal(false)
@@ -3633,7 +3633,7 @@ var acs_encoder = zod.z.object({
3633
3633
 
3634
3634
  See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
3635
3635
 
3636
- To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
3636
+ To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
3637
3637
  `);
3638
3638
  var acs_entrance_capability_flags = zod.z.object({
3639
3639
  can_unlock_with_mobile_key: zod.z.boolean().optional().describe(
@@ -4255,7 +4255,7 @@ var acs_user = common_acs_user.merge(
4255
4255
 
4256
4256
  An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
4257
4257
 
4258
- For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
4258
+ For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
4259
4259
  `);
4260
4260
  var unmanaged_acs_user = common_acs_user.merge(
4261
4261
  zod.z.object({
@@ -9533,7 +9533,7 @@ var openapi_default = {
9533
9533
  "x-route-path": "/access_methods"
9534
9534
  },
9535
9535
  acs_access_group: {
9536
- description: "Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).",
9536
+ description: "Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).",
9537
9537
  properties: {
9538
9538
  access_group_type: {
9539
9539
  deprecated: true,
@@ -10461,7 +10461,7 @@ var openapi_default = {
10461
10461
  "x-undocumented": "Deprecated. Will be removed."
10462
10462
  },
10463
10463
  acs_encoder: {
10464
- description: "Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).",
10464
+ description: "Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).",
10465
10465
  properties: {
10466
10466
  acs_encoder_id: {
10467
10467
  description: "ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners.",
@@ -11218,7 +11218,7 @@ var openapi_default = {
11218
11218
  "x-route-path": "/acs/systems"
11219
11219
  },
11220
11220
  acs_user: {
11221
- description: "Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).",
11221
+ description: "Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).",
11222
11222
  properties: {
11223
11223
  access_schedule: {
11224
11224
  description: "`starts_at` and `ends_at` timestamps for the [access system user's](https://docs.seam.co/latest/capability-guides/access-systems/user-management) access.",
@@ -16868,6 +16868,44 @@ var openapi_default = {
16868
16868
  "x-route-path": "/customers",
16869
16869
  "x-undocumented": "Internal resource."
16870
16870
  },
16871
+ customer_portal: {
16872
+ description: "Represents a Customer Portal. Customer Portal is a hosted, customizable interface for managing device access. It enables you to embed secure, pre-authenticated access flows into your product\u2014either by sharing a link with users or embedding a view in an iframe.\n\nWith Customer Portal, you no longer need to build out frontend experiences for physical access, thermostats, and sensors. Instead, you can ship enterprise-grade access control experiences in a fraction of the time, while maintaining your product's branding and user experience.\n\nSeam hosts these flows, handling everything from account connection and device mapping to full-featured device control.",
16873
+ properties: {
16874
+ created_at: {
16875
+ description: "Date and time at which the customer portal link was created.",
16876
+ format: "date-time",
16877
+ type: "string"
16878
+ },
16879
+ customer_key: {
16880
+ description: "Customer key for the customer portal.",
16881
+ type: "string"
16882
+ },
16883
+ expires_at: {
16884
+ description: "Date and time at which the customer portal link expires.",
16885
+ format: "date-time",
16886
+ type: "string"
16887
+ },
16888
+ url: {
16889
+ description: "URL for the customer portal.",
16890
+ format: "uri",
16891
+ type: "string"
16892
+ },
16893
+ workspace_id: {
16894
+ description: "ID of the [workspace](https://docs.seam.co/latest/core-concepts/workspaces) associated with the customer portal.",
16895
+ format: "uuid",
16896
+ type: "string"
16897
+ }
16898
+ },
16899
+ required: [
16900
+ "url",
16901
+ "customer_key",
16902
+ "expires_at",
16903
+ "workspace_id",
16904
+ "created_at"
16905
+ ],
16906
+ type: "object",
16907
+ "x-route-path": "/customers"
16908
+ },
16871
16909
  customization_profile: {
16872
16910
  description: "A customization profile.",
16873
16911
  properties: {
@@ -45371,7 +45409,7 @@ var openapi_default = {
45371
45409
  type: "object"
45372
45410
  },
45373
45411
  code: {
45374
- description: "Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview).",
45412
+ description: "Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides).",
45375
45413
  pattern: "^\\d+$",
45376
45414
  type: "string"
45377
45415
  },
@@ -53638,42 +53676,7 @@ var openapi_default = {
53638
53676
  schema: {
53639
53677
  properties: {
53640
53678
  customer_portal: {
53641
- description: "Represents a Customer Portal. Customer Portal is a hosted, customizable interface for managing device access. It enables you to embed secure, pre-authenticated access flows into your product\u2014either by sharing a link with users or embedding a view in an iframe.\n\nWith Customer Portal, you no longer need to build out frontend experiences for physical access, thermostats, and sensors. Instead, you can ship enterprise-grade access control experiences in a fraction of the time, while maintaining your product's branding and user experience.\n\nSeam hosts these flows, handling everything from account connection and device mapping to full-featured device control.",
53642
- properties: {
53643
- created_at: {
53644
- description: "Date and time at which the customer portal link was created.",
53645
- format: "date-time",
53646
- type: "string"
53647
- },
53648
- customer_key: {
53649
- description: "Customer key for the customer portal.",
53650
- type: "string"
53651
- },
53652
- expires_at: {
53653
- description: "Date and time at which the customer portal link expires.",
53654
- format: "date-time",
53655
- type: "string"
53656
- },
53657
- url: {
53658
- description: "URL for the customer portal.",
53659
- format: "uri",
53660
- type: "string"
53661
- },
53662
- workspace_id: {
53663
- description: "ID of the [workspace](https://docs.seam.co/latest/core-concepts/workspaces) associated with the customer portal.",
53664
- format: "uuid",
53665
- type: "string"
53666
- }
53667
- },
53668
- required: [
53669
- "url",
53670
- "customer_key",
53671
- "expires_at",
53672
- "workspace_id",
53673
- "created_at"
53674
- ],
53675
- type: "object",
53676
- "x-route-path": "/customers"
53679
+ $ref: "#/components/schemas/customer_portal"
53677
53680
  },
53678
53681
  magic_link: { $ref: "#/components/schemas/magic_link" },
53679
53682
  ok: { type: "boolean" }