@seamapi/types 1.804.0 → 1.806.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/connect.cjs +46 -43
- package/dist/connect.cjs.map +1 -1
- package/dist/connect.d.cts +38 -35
- package/dist/index.cjs +46 -43
- package/dist/index.cjs.map +1 -1
- package/lib/seam/connect/models/acs/acs-access-group.js +1 -1
- package/lib/seam/connect/models/acs/acs-encoder.js +1 -1
- package/lib/seam/connect/models/acs/acs-users/acs-user.js +1 -1
- package/lib/seam/connect/openapi.d.ts +33 -30
- package/lib/seam/connect/openapi.js +43 -40
- package/lib/seam/connect/openapi.js.map +1 -1
- package/lib/seam/connect/route-types.d.ts +5 -5
- package/package.json +1 -1
- package/src/lib/seam/connect/models/acs/acs-access-group.ts +1 -1
- package/src/lib/seam/connect/models/acs/acs-encoder.ts +1 -1
- package/src/lib/seam/connect/models/acs/acs-users/acs-user.ts +1 -1
- package/src/lib/seam/connect/openapi.ts +47 -44
- package/src/lib/seam/connect/route-types.ts +5 -5
package/dist/connect.d.cts
CHANGED
|
@@ -69291,6 +69291,38 @@ declare const _default: {
|
|
|
69291
69291
|
'x-route-path': string;
|
|
69292
69292
|
'x-undocumented': string;
|
|
69293
69293
|
};
|
|
69294
|
+
customer_portal: {
|
|
69295
|
+
description: string;
|
|
69296
|
+
properties: {
|
|
69297
|
+
created_at: {
|
|
69298
|
+
description: string;
|
|
69299
|
+
format: string;
|
|
69300
|
+
type: string;
|
|
69301
|
+
};
|
|
69302
|
+
customer_key: {
|
|
69303
|
+
description: string;
|
|
69304
|
+
type: string;
|
|
69305
|
+
};
|
|
69306
|
+
expires_at: {
|
|
69307
|
+
description: string;
|
|
69308
|
+
format: string;
|
|
69309
|
+
type: string;
|
|
69310
|
+
};
|
|
69311
|
+
url: {
|
|
69312
|
+
description: string;
|
|
69313
|
+
format: string;
|
|
69314
|
+
type: string;
|
|
69315
|
+
};
|
|
69316
|
+
workspace_id: {
|
|
69317
|
+
description: string;
|
|
69318
|
+
format: string;
|
|
69319
|
+
type: string;
|
|
69320
|
+
};
|
|
69321
|
+
};
|
|
69322
|
+
required: string[];
|
|
69323
|
+
type: string;
|
|
69324
|
+
'x-route-path': string;
|
|
69325
|
+
};
|
|
69294
69326
|
customization_profile: {
|
|
69295
69327
|
description: string;
|
|
69296
69328
|
properties: {
|
|
@@ -104389,36 +104421,7 @@ declare const _default: {
|
|
|
104389
104421
|
schema: {
|
|
104390
104422
|
properties: {
|
|
104391
104423
|
customer_portal: {
|
|
104392
|
-
|
|
104393
|
-
properties: {
|
|
104394
|
-
created_at: {
|
|
104395
|
-
description: string;
|
|
104396
|
-
format: string;
|
|
104397
|
-
type: string;
|
|
104398
|
-
};
|
|
104399
|
-
customer_key: {
|
|
104400
|
-
description: string;
|
|
104401
|
-
type: string;
|
|
104402
|
-
};
|
|
104403
|
-
expires_at: {
|
|
104404
|
-
description: string;
|
|
104405
|
-
format: string;
|
|
104406
|
-
type: string;
|
|
104407
|
-
};
|
|
104408
|
-
url: {
|
|
104409
|
-
description: string;
|
|
104410
|
-
format: string;
|
|
104411
|
-
type: string;
|
|
104412
|
-
};
|
|
104413
|
-
workspace_id: {
|
|
104414
|
-
description: string;
|
|
104415
|
-
format: string;
|
|
104416
|
-
type: string;
|
|
104417
|
-
};
|
|
104418
|
-
};
|
|
104419
|
-
required: string[];
|
|
104420
|
-
type: string;
|
|
104421
|
-
'x-route-path': string;
|
|
104424
|
+
$ref: string;
|
|
104422
104425
|
};
|
|
104423
104426
|
magic_link: {
|
|
104424
104427
|
$ref: string;
|
|
@@ -155713,7 +155716,7 @@ type Routes = {
|
|
|
155713
155716
|
|
|
155714
155717
|
Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
|
|
155715
155718
|
|
|
155716
|
-
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
155719
|
+
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
155717
155720
|
acs_access_group: {
|
|
155718
155721
|
/** ID of the access group. */
|
|
155719
155722
|
acs_access_group_id: string;
|
|
@@ -157061,7 +157064,7 @@ type Routes = {
|
|
|
157061
157064
|
acs_system_id?: string | undefined;
|
|
157062
157065
|
/** Access method for the new credential. Supported values: `code`, `card`, `mobile_key`, `cloud_key`. */
|
|
157063
157066
|
access_method: 'code' | 'card' | 'mobile_key' | 'cloud_key';
|
|
157064
|
-
/** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
157067
|
+
/** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides). */
|
|
157065
157068
|
code?: string | undefined;
|
|
157066
157069
|
/** Indicates whether the new credential is a [multi-phone sync credential](https://docs.seam.co/latest/capability-guides/mobile-access/issuing-mobile-credentials-from-an-access-control-system#what-are-multi-phone-sync-credentials). */
|
|
157067
157070
|
is_multi_phone_sync_credential?: boolean;
|
|
@@ -159869,7 +159872,7 @@ type Routes = {
|
|
|
159869
159872
|
|
|
159870
159873
|
See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
|
|
159871
159874
|
|
|
159872
|
-
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
159875
|
+
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
159873
159876
|
acs_encoder: {
|
|
159874
159877
|
/** ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners. */
|
|
159875
159878
|
acs_encoder_id: string;
|
|
@@ -163694,7 +163697,7 @@ type Routes = {
|
|
|
163694
163697
|
|
|
163695
163698
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
163696
163699
|
|
|
163697
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
163700
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
163698
163701
|
acs_user: {
|
|
163699
163702
|
/** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
|
|
163700
163703
|
acs_user_id: string;
|
|
@@ -163969,7 +163972,7 @@ type Routes = {
|
|
|
163969
163972
|
|
|
163970
163973
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
163971
163974
|
|
|
163972
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
163975
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
163973
163976
|
acs_user: {
|
|
163974
163977
|
/** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
|
|
163975
163978
|
acs_user_id: string;
|
package/dist/index.cjs
CHANGED
|
@@ -3216,7 +3216,7 @@ var acs_access_group = common_acs_access_group.extend({
|
|
|
3216
3216
|
|
|
3217
3217
|
Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
|
|
3218
3218
|
|
|
3219
|
-
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
3219
|
+
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
3220
3220
|
`);
|
|
3221
3221
|
var unmanaged_acs_access_group = common_acs_access_group.extend({
|
|
3222
3222
|
is_managed: zod.z.literal(false)
|
|
@@ -3633,7 +3633,7 @@ var acs_encoder = zod.z.object({
|
|
|
3633
3633
|
|
|
3634
3634
|
See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
|
|
3635
3635
|
|
|
3636
|
-
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
3636
|
+
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
3637
3637
|
`);
|
|
3638
3638
|
var acs_entrance_capability_flags = zod.z.object({
|
|
3639
3639
|
can_unlock_with_mobile_key: zod.z.boolean().optional().describe(
|
|
@@ -4255,7 +4255,7 @@ var acs_user = common_acs_user.merge(
|
|
|
4255
4255
|
|
|
4256
4256
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
4257
4257
|
|
|
4258
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
4258
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
4259
4259
|
`);
|
|
4260
4260
|
var unmanaged_acs_user = common_acs_user.merge(
|
|
4261
4261
|
zod.z.object({
|
|
@@ -9533,7 +9533,7 @@ var openapi_default = {
|
|
|
9533
9533
|
"x-route-path": "/access_methods"
|
|
9534
9534
|
},
|
|
9535
9535
|
acs_access_group: {
|
|
9536
|
-
description: "Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
9536
|
+
description: "Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).",
|
|
9537
9537
|
properties: {
|
|
9538
9538
|
access_group_type: {
|
|
9539
9539
|
deprecated: true,
|
|
@@ -10461,7 +10461,7 @@ var openapi_default = {
|
|
|
10461
10461
|
"x-undocumented": "Deprecated. Will be removed."
|
|
10462
10462
|
},
|
|
10463
10463
|
acs_encoder: {
|
|
10464
|
-
description: "Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
10464
|
+
description: "Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).",
|
|
10465
10465
|
properties: {
|
|
10466
10466
|
acs_encoder_id: {
|
|
10467
10467
|
description: "ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners.",
|
|
@@ -11218,7 +11218,7 @@ var openapi_default = {
|
|
|
11218
11218
|
"x-route-path": "/acs/systems"
|
|
11219
11219
|
},
|
|
11220
11220
|
acs_user: {
|
|
11221
|
-
description: "Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
11221
|
+
description: "Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).",
|
|
11222
11222
|
properties: {
|
|
11223
11223
|
access_schedule: {
|
|
11224
11224
|
description: "`starts_at` and `ends_at` timestamps for the [access system user's](https://docs.seam.co/latest/capability-guides/access-systems/user-management) access.",
|
|
@@ -16868,6 +16868,44 @@ var openapi_default = {
|
|
|
16868
16868
|
"x-route-path": "/customers",
|
|
16869
16869
|
"x-undocumented": "Internal resource."
|
|
16870
16870
|
},
|
|
16871
|
+
customer_portal: {
|
|
16872
|
+
description: "Represents a Customer Portal. Customer Portal is a hosted, customizable interface for managing device access. It enables you to embed secure, pre-authenticated access flows into your product\u2014either by sharing a link with users or embedding a view in an iframe.\n\nWith Customer Portal, you no longer need to build out frontend experiences for physical access, thermostats, and sensors. Instead, you can ship enterprise-grade access control experiences in a fraction of the time, while maintaining your product's branding and user experience.\n\nSeam hosts these flows, handling everything from account connection and device mapping to full-featured device control.",
|
|
16873
|
+
properties: {
|
|
16874
|
+
created_at: {
|
|
16875
|
+
description: "Date and time at which the customer portal link was created.",
|
|
16876
|
+
format: "date-time",
|
|
16877
|
+
type: "string"
|
|
16878
|
+
},
|
|
16879
|
+
customer_key: {
|
|
16880
|
+
description: "Customer key for the customer portal.",
|
|
16881
|
+
type: "string"
|
|
16882
|
+
},
|
|
16883
|
+
expires_at: {
|
|
16884
|
+
description: "Date and time at which the customer portal link expires.",
|
|
16885
|
+
format: "date-time",
|
|
16886
|
+
type: "string"
|
|
16887
|
+
},
|
|
16888
|
+
url: {
|
|
16889
|
+
description: "URL for the customer portal.",
|
|
16890
|
+
format: "uri",
|
|
16891
|
+
type: "string"
|
|
16892
|
+
},
|
|
16893
|
+
workspace_id: {
|
|
16894
|
+
description: "ID of the [workspace](https://docs.seam.co/latest/core-concepts/workspaces) associated with the customer portal.",
|
|
16895
|
+
format: "uuid",
|
|
16896
|
+
type: "string"
|
|
16897
|
+
}
|
|
16898
|
+
},
|
|
16899
|
+
required: [
|
|
16900
|
+
"url",
|
|
16901
|
+
"customer_key",
|
|
16902
|
+
"expires_at",
|
|
16903
|
+
"workspace_id",
|
|
16904
|
+
"created_at"
|
|
16905
|
+
],
|
|
16906
|
+
type: "object",
|
|
16907
|
+
"x-route-path": "/customers"
|
|
16908
|
+
},
|
|
16871
16909
|
customization_profile: {
|
|
16872
16910
|
description: "A customization profile.",
|
|
16873
16911
|
properties: {
|
|
@@ -45371,7 +45409,7 @@ var openapi_default = {
|
|
|
45371
45409
|
type: "object"
|
|
45372
45410
|
},
|
|
45373
45411
|
code: {
|
|
45374
|
-
description: "Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
45412
|
+
description: "Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides).",
|
|
45375
45413
|
pattern: "^\\d+$",
|
|
45376
45414
|
type: "string"
|
|
45377
45415
|
},
|
|
@@ -53638,42 +53676,7 @@ var openapi_default = {
|
|
|
53638
53676
|
schema: {
|
|
53639
53677
|
properties: {
|
|
53640
53678
|
customer_portal: {
|
|
53641
|
-
|
|
53642
|
-
properties: {
|
|
53643
|
-
created_at: {
|
|
53644
|
-
description: "Date and time at which the customer portal link was created.",
|
|
53645
|
-
format: "date-time",
|
|
53646
|
-
type: "string"
|
|
53647
|
-
},
|
|
53648
|
-
customer_key: {
|
|
53649
|
-
description: "Customer key for the customer portal.",
|
|
53650
|
-
type: "string"
|
|
53651
|
-
},
|
|
53652
|
-
expires_at: {
|
|
53653
|
-
description: "Date and time at which the customer portal link expires.",
|
|
53654
|
-
format: "date-time",
|
|
53655
|
-
type: "string"
|
|
53656
|
-
},
|
|
53657
|
-
url: {
|
|
53658
|
-
description: "URL for the customer portal.",
|
|
53659
|
-
format: "uri",
|
|
53660
|
-
type: "string"
|
|
53661
|
-
},
|
|
53662
|
-
workspace_id: {
|
|
53663
|
-
description: "ID of the [workspace](https://docs.seam.co/latest/core-concepts/workspaces) associated with the customer portal.",
|
|
53664
|
-
format: "uuid",
|
|
53665
|
-
type: "string"
|
|
53666
|
-
}
|
|
53667
|
-
},
|
|
53668
|
-
required: [
|
|
53669
|
-
"url",
|
|
53670
|
-
"customer_key",
|
|
53671
|
-
"expires_at",
|
|
53672
|
-
"workspace_id",
|
|
53673
|
-
"created_at"
|
|
53674
|
-
],
|
|
53675
|
-
type: "object",
|
|
53676
|
-
"x-route-path": "/customers"
|
|
53679
|
+
$ref: "#/components/schemas/customer_portal"
|
|
53677
53680
|
},
|
|
53678
53681
|
magic_link: { $ref: "#/components/schemas/magic_link" },
|
|
53679
53682
|
ok: { type: "boolean" }
|