@seamapi/types 1.804.0 → 1.806.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/connect.cjs +46 -43
- package/dist/connect.cjs.map +1 -1
- package/dist/connect.d.cts +38 -35
- package/dist/index.cjs +46 -43
- package/dist/index.cjs.map +1 -1
- package/lib/seam/connect/models/acs/acs-access-group.js +1 -1
- package/lib/seam/connect/models/acs/acs-encoder.js +1 -1
- package/lib/seam/connect/models/acs/acs-users/acs-user.js +1 -1
- package/lib/seam/connect/openapi.d.ts +33 -30
- package/lib/seam/connect/openapi.js +43 -40
- package/lib/seam/connect/openapi.js.map +1 -1
- package/lib/seam/connect/route-types.d.ts +5 -5
- package/package.json +1 -1
- package/src/lib/seam/connect/models/acs/acs-access-group.ts +1 -1
- package/src/lib/seam/connect/models/acs/acs-encoder.ts +1 -1
- package/src/lib/seam/connect/models/acs/acs-users/acs-user.ts +1 -1
- package/src/lib/seam/connect/openapi.ts +47 -44
- package/src/lib/seam/connect/route-types.ts +5 -5
|
@@ -124,7 +124,7 @@ export const acs_access_group = common_acs_access_group.extend({
|
|
|
124
124
|
|
|
125
125
|
Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
|
|
126
126
|
|
|
127
|
-
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
127
|
+
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
128
128
|
`);
|
|
129
129
|
export const unmanaged_acs_access_group = common_acs_access_group.extend({
|
|
130
130
|
is_managed: z.literal(false),
|
|
@@ -64,6 +64,6 @@ export const acs_encoder = z.object({
|
|
|
64
64
|
|
|
65
65
|
See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
|
|
66
66
|
|
|
67
|
-
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
67
|
+
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
68
68
|
`);
|
|
69
69
|
//# sourceMappingURL=acs-encoder.js.map
|
|
@@ -234,7 +234,7 @@ export const acs_user = common_acs_user.merge(z.object({
|
|
|
234
234
|
|
|
235
235
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
236
236
|
|
|
237
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
237
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
238
238
|
`);
|
|
239
239
|
export const unmanaged_acs_user = common_acs_user.merge(z.object({
|
|
240
240
|
is_managed: z.literal(false),
|
|
@@ -5842,6 +5842,38 @@ declare const _default: {
|
|
|
5842
5842
|
'x-route-path': string;
|
|
5843
5843
|
'x-undocumented': string;
|
|
5844
5844
|
};
|
|
5845
|
+
customer_portal: {
|
|
5846
|
+
description: string;
|
|
5847
|
+
properties: {
|
|
5848
|
+
created_at: {
|
|
5849
|
+
description: string;
|
|
5850
|
+
format: string;
|
|
5851
|
+
type: string;
|
|
5852
|
+
};
|
|
5853
|
+
customer_key: {
|
|
5854
|
+
description: string;
|
|
5855
|
+
type: string;
|
|
5856
|
+
};
|
|
5857
|
+
expires_at: {
|
|
5858
|
+
description: string;
|
|
5859
|
+
format: string;
|
|
5860
|
+
type: string;
|
|
5861
|
+
};
|
|
5862
|
+
url: {
|
|
5863
|
+
description: string;
|
|
5864
|
+
format: string;
|
|
5865
|
+
type: string;
|
|
5866
|
+
};
|
|
5867
|
+
workspace_id: {
|
|
5868
|
+
description: string;
|
|
5869
|
+
format: string;
|
|
5870
|
+
type: string;
|
|
5871
|
+
};
|
|
5872
|
+
};
|
|
5873
|
+
required: string[];
|
|
5874
|
+
type: string;
|
|
5875
|
+
'x-route-path': string;
|
|
5876
|
+
};
|
|
5845
5877
|
customization_profile: {
|
|
5846
5878
|
description: string;
|
|
5847
5879
|
properties: {
|
|
@@ -40940,36 +40972,7 @@ declare const _default: {
|
|
|
40940
40972
|
schema: {
|
|
40941
40973
|
properties: {
|
|
40942
40974
|
customer_portal: {
|
|
40943
|
-
|
|
40944
|
-
properties: {
|
|
40945
|
-
created_at: {
|
|
40946
|
-
description: string;
|
|
40947
|
-
format: string;
|
|
40948
|
-
type: string;
|
|
40949
|
-
};
|
|
40950
|
-
customer_key: {
|
|
40951
|
-
description: string;
|
|
40952
|
-
type: string;
|
|
40953
|
-
};
|
|
40954
|
-
expires_at: {
|
|
40955
|
-
description: string;
|
|
40956
|
-
format: string;
|
|
40957
|
-
type: string;
|
|
40958
|
-
};
|
|
40959
|
-
url: {
|
|
40960
|
-
description: string;
|
|
40961
|
-
format: string;
|
|
40962
|
-
type: string;
|
|
40963
|
-
};
|
|
40964
|
-
workspace_id: {
|
|
40965
|
-
description: string;
|
|
40966
|
-
format: string;
|
|
40967
|
-
type: string;
|
|
40968
|
-
};
|
|
40969
|
-
};
|
|
40970
|
-
required: string[];
|
|
40971
|
-
type: string;
|
|
40972
|
-
'x-route-path': string;
|
|
40975
|
+
$ref: string;
|
|
40973
40976
|
};
|
|
40974
40977
|
magic_link: {
|
|
40975
40978
|
$ref: string;
|
|
@@ -2689,7 +2689,7 @@ export default {
|
|
|
2689
2689
|
'x-route-path': '/access_methods',
|
|
2690
2690
|
},
|
|
2691
2691
|
acs_access_group: {
|
|
2692
|
-
description: 'Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
2692
|
+
description: 'Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
|
|
2693
2693
|
properties: {
|
|
2694
2694
|
access_group_type: {
|
|
2695
2695
|
deprecated: true,
|
|
@@ -3617,7 +3617,7 @@ export default {
|
|
|
3617
3617
|
'x-undocumented': 'Deprecated. Will be removed.',
|
|
3618
3618
|
},
|
|
3619
3619
|
acs_encoder: {
|
|
3620
|
-
description: 'Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
3620
|
+
description: 'Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
|
|
3621
3621
|
properties: {
|
|
3622
3622
|
acs_encoder_id: {
|
|
3623
3623
|
description: 'ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners.',
|
|
@@ -4374,7 +4374,7 @@ export default {
|
|
|
4374
4374
|
'x-route-path': '/acs/systems',
|
|
4375
4375
|
},
|
|
4376
4376
|
acs_user: {
|
|
4377
|
-
description: 'Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
4377
|
+
description: 'Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
|
|
4378
4378
|
properties: {
|
|
4379
4379
|
access_schedule: {
|
|
4380
4380
|
description: "`starts_at` and `ends_at` timestamps for the [access system user's](https://docs.seam.co/latest/capability-guides/access-systems/user-management) access.",
|
|
@@ -10024,6 +10024,44 @@ export default {
|
|
|
10024
10024
|
'x-route-path': '/customers',
|
|
10025
10025
|
'x-undocumented': 'Internal resource.',
|
|
10026
10026
|
},
|
|
10027
|
+
customer_portal: {
|
|
10028
|
+
description: "Represents a Customer Portal. Customer Portal is a hosted, customizable interface for managing device access. It enables you to embed secure, pre-authenticated access flows into your product—either by sharing a link with users or embedding a view in an iframe.\n\nWith Customer Portal, you no longer need to build out frontend experiences for physical access, thermostats, and sensors. Instead, you can ship enterprise-grade access control experiences in a fraction of the time, while maintaining your product's branding and user experience.\n\nSeam hosts these flows, handling everything from account connection and device mapping to full-featured device control.",
|
|
10029
|
+
properties: {
|
|
10030
|
+
created_at: {
|
|
10031
|
+
description: 'Date and time at which the customer portal link was created.',
|
|
10032
|
+
format: 'date-time',
|
|
10033
|
+
type: 'string',
|
|
10034
|
+
},
|
|
10035
|
+
customer_key: {
|
|
10036
|
+
description: 'Customer key for the customer portal.',
|
|
10037
|
+
type: 'string',
|
|
10038
|
+
},
|
|
10039
|
+
expires_at: {
|
|
10040
|
+
description: 'Date and time at which the customer portal link expires.',
|
|
10041
|
+
format: 'date-time',
|
|
10042
|
+
type: 'string',
|
|
10043
|
+
},
|
|
10044
|
+
url: {
|
|
10045
|
+
description: 'URL for the customer portal.',
|
|
10046
|
+
format: 'uri',
|
|
10047
|
+
type: 'string',
|
|
10048
|
+
},
|
|
10049
|
+
workspace_id: {
|
|
10050
|
+
description: 'ID of the [workspace](https://docs.seam.co/latest/core-concepts/workspaces) associated with the customer portal.',
|
|
10051
|
+
format: 'uuid',
|
|
10052
|
+
type: 'string',
|
|
10053
|
+
},
|
|
10054
|
+
},
|
|
10055
|
+
required: [
|
|
10056
|
+
'url',
|
|
10057
|
+
'customer_key',
|
|
10058
|
+
'expires_at',
|
|
10059
|
+
'workspace_id',
|
|
10060
|
+
'created_at',
|
|
10061
|
+
],
|
|
10062
|
+
type: 'object',
|
|
10063
|
+
'x-route-path': '/customers',
|
|
10064
|
+
},
|
|
10027
10065
|
customization_profile: {
|
|
10028
10066
|
description: 'A customization profile.',
|
|
10029
10067
|
properties: {
|
|
@@ -38527,7 +38565,7 @@ export default {
|
|
|
38527
38565
|
type: 'object',
|
|
38528
38566
|
},
|
|
38529
38567
|
code: {
|
|
38530
|
-
description: 'Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
38568
|
+
description: 'Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides).',
|
|
38531
38569
|
pattern: '^\\d+$',
|
|
38532
38570
|
type: 'string',
|
|
38533
38571
|
},
|
|
@@ -46794,42 +46832,7 @@ export default {
|
|
|
46794
46832
|
schema: {
|
|
46795
46833
|
properties: {
|
|
46796
46834
|
customer_portal: {
|
|
46797
|
-
|
|
46798
|
-
properties: {
|
|
46799
|
-
created_at: {
|
|
46800
|
-
description: 'Date and time at which the customer portal link was created.',
|
|
46801
|
-
format: 'date-time',
|
|
46802
|
-
type: 'string',
|
|
46803
|
-
},
|
|
46804
|
-
customer_key: {
|
|
46805
|
-
description: 'Customer key for the customer portal.',
|
|
46806
|
-
type: 'string',
|
|
46807
|
-
},
|
|
46808
|
-
expires_at: {
|
|
46809
|
-
description: 'Date and time at which the customer portal link expires.',
|
|
46810
|
-
format: 'date-time',
|
|
46811
|
-
type: 'string',
|
|
46812
|
-
},
|
|
46813
|
-
url: {
|
|
46814
|
-
description: 'URL for the customer portal.',
|
|
46815
|
-
format: 'uri',
|
|
46816
|
-
type: 'string',
|
|
46817
|
-
},
|
|
46818
|
-
workspace_id: {
|
|
46819
|
-
description: 'ID of the [workspace](https://docs.seam.co/latest/core-concepts/workspaces) associated with the customer portal.',
|
|
46820
|
-
format: 'uuid',
|
|
46821
|
-
type: 'string',
|
|
46822
|
-
},
|
|
46823
|
-
},
|
|
46824
|
-
required: [
|
|
46825
|
-
'url',
|
|
46826
|
-
'customer_key',
|
|
46827
|
-
'expires_at',
|
|
46828
|
-
'workspace_id',
|
|
46829
|
-
'created_at',
|
|
46830
|
-
],
|
|
46831
|
-
type: 'object',
|
|
46832
|
-
'x-route-path': '/customers',
|
|
46835
|
+
$ref: '#/components/schemas/customer_portal',
|
|
46833
46836
|
},
|
|
46834
46837
|
magic_link: { $ref: '#/components/schemas/magic_link' },
|
|
46835
46838
|
ok: { type: 'boolean' },
|