@seamapi/types 1.804.0 → 1.806.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -124,7 +124,7 @@ export const acs_access_group = common_acs_access_group.extend({
124
124
 
125
125
  Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
126
126
 
127
- To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
127
+ To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
128
128
  `);
129
129
  export const unmanaged_acs_access_group = common_acs_access_group.extend({
130
130
  is_managed: z.literal(false),
@@ -64,6 +64,6 @@ export const acs_encoder = z.object({
64
64
 
65
65
  See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
66
66
 
67
- To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
67
+ To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
68
68
  `);
69
69
  //# sourceMappingURL=acs-encoder.js.map
@@ -234,7 +234,7 @@ export const acs_user = common_acs_user.merge(z.object({
234
234
 
235
235
  An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
236
236
 
237
- For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
237
+ For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
238
238
  `);
239
239
  export const unmanaged_acs_user = common_acs_user.merge(z.object({
240
240
  is_managed: z.literal(false),
@@ -5842,6 +5842,38 @@ declare const _default: {
5842
5842
  'x-route-path': string;
5843
5843
  'x-undocumented': string;
5844
5844
  };
5845
+ customer_portal: {
5846
+ description: string;
5847
+ properties: {
5848
+ created_at: {
5849
+ description: string;
5850
+ format: string;
5851
+ type: string;
5852
+ };
5853
+ customer_key: {
5854
+ description: string;
5855
+ type: string;
5856
+ };
5857
+ expires_at: {
5858
+ description: string;
5859
+ format: string;
5860
+ type: string;
5861
+ };
5862
+ url: {
5863
+ description: string;
5864
+ format: string;
5865
+ type: string;
5866
+ };
5867
+ workspace_id: {
5868
+ description: string;
5869
+ format: string;
5870
+ type: string;
5871
+ };
5872
+ };
5873
+ required: string[];
5874
+ type: string;
5875
+ 'x-route-path': string;
5876
+ };
5845
5877
  customization_profile: {
5846
5878
  description: string;
5847
5879
  properties: {
@@ -40940,36 +40972,7 @@ declare const _default: {
40940
40972
  schema: {
40941
40973
  properties: {
40942
40974
  customer_portal: {
40943
- description: string;
40944
- properties: {
40945
- created_at: {
40946
- description: string;
40947
- format: string;
40948
- type: string;
40949
- };
40950
- customer_key: {
40951
- description: string;
40952
- type: string;
40953
- };
40954
- expires_at: {
40955
- description: string;
40956
- format: string;
40957
- type: string;
40958
- };
40959
- url: {
40960
- description: string;
40961
- format: string;
40962
- type: string;
40963
- };
40964
- workspace_id: {
40965
- description: string;
40966
- format: string;
40967
- type: string;
40968
- };
40969
- };
40970
- required: string[];
40971
- type: string;
40972
- 'x-route-path': string;
40975
+ $ref: string;
40973
40976
  };
40974
40977
  magic_link: {
40975
40978
  $ref: string;
@@ -2689,7 +2689,7 @@ export default {
2689
2689
  'x-route-path': '/access_methods',
2690
2690
  },
2691
2691
  acs_access_group: {
2692
- description: 'Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).',
2692
+ description: 'Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
2693
2693
  properties: {
2694
2694
  access_group_type: {
2695
2695
  deprecated: true,
@@ -3617,7 +3617,7 @@ export default {
3617
3617
  'x-undocumented': 'Deprecated. Will be removed.',
3618
3618
  },
3619
3619
  acs_encoder: {
3620
- description: 'Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).',
3620
+ description: 'Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
3621
3621
  properties: {
3622
3622
  acs_encoder_id: {
3623
3623
  description: 'ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners.',
@@ -4374,7 +4374,7 @@ export default {
4374
4374
  'x-route-path': '/acs/systems',
4375
4375
  },
4376
4376
  acs_user: {
4377
- description: 'Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).',
4377
+ description: 'Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
4378
4378
  properties: {
4379
4379
  access_schedule: {
4380
4380
  description: "`starts_at` and `ends_at` timestamps for the [access system user's](https://docs.seam.co/latest/capability-guides/access-systems/user-management) access.",
@@ -10024,6 +10024,44 @@ export default {
10024
10024
  'x-route-path': '/customers',
10025
10025
  'x-undocumented': 'Internal resource.',
10026
10026
  },
10027
+ customer_portal: {
10028
+ description: "Represents a Customer Portal. Customer Portal is a hosted, customizable interface for managing device access. It enables you to embed secure, pre-authenticated access flows into your product—either by sharing a link with users or embedding a view in an iframe.\n\nWith Customer Portal, you no longer need to build out frontend experiences for physical access, thermostats, and sensors. Instead, you can ship enterprise-grade access control experiences in a fraction of the time, while maintaining your product's branding and user experience.\n\nSeam hosts these flows, handling everything from account connection and device mapping to full-featured device control.",
10029
+ properties: {
10030
+ created_at: {
10031
+ description: 'Date and time at which the customer portal link was created.',
10032
+ format: 'date-time',
10033
+ type: 'string',
10034
+ },
10035
+ customer_key: {
10036
+ description: 'Customer key for the customer portal.',
10037
+ type: 'string',
10038
+ },
10039
+ expires_at: {
10040
+ description: 'Date and time at which the customer portal link expires.',
10041
+ format: 'date-time',
10042
+ type: 'string',
10043
+ },
10044
+ url: {
10045
+ description: 'URL for the customer portal.',
10046
+ format: 'uri',
10047
+ type: 'string',
10048
+ },
10049
+ workspace_id: {
10050
+ description: 'ID of the [workspace](https://docs.seam.co/latest/core-concepts/workspaces) associated with the customer portal.',
10051
+ format: 'uuid',
10052
+ type: 'string',
10053
+ },
10054
+ },
10055
+ required: [
10056
+ 'url',
10057
+ 'customer_key',
10058
+ 'expires_at',
10059
+ 'workspace_id',
10060
+ 'created_at',
10061
+ ],
10062
+ type: 'object',
10063
+ 'x-route-path': '/customers',
10064
+ },
10027
10065
  customization_profile: {
10028
10066
  description: 'A customization profile.',
10029
10067
  properties: {
@@ -38527,7 +38565,7 @@ export default {
38527
38565
  type: 'object',
38528
38566
  },
38529
38567
  code: {
38530
- description: 'Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview).',
38568
+ description: 'Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides).',
38531
38569
  pattern: '^\\d+$',
38532
38570
  type: 'string',
38533
38571
  },
@@ -46794,42 +46832,7 @@ export default {
46794
46832
  schema: {
46795
46833
  properties: {
46796
46834
  customer_portal: {
46797
- description: "Represents a Customer Portal. Customer Portal is a hosted, customizable interface for managing device access. It enables you to embed secure, pre-authenticated access flows into your product—either by sharing a link with users or embedding a view in an iframe.\n\nWith Customer Portal, you no longer need to build out frontend experiences for physical access, thermostats, and sensors. Instead, you can ship enterprise-grade access control experiences in a fraction of the time, while maintaining your product's branding and user experience.\n\nSeam hosts these flows, handling everything from account connection and device mapping to full-featured device control.",
46798
- properties: {
46799
- created_at: {
46800
- description: 'Date and time at which the customer portal link was created.',
46801
- format: 'date-time',
46802
- type: 'string',
46803
- },
46804
- customer_key: {
46805
- description: 'Customer key for the customer portal.',
46806
- type: 'string',
46807
- },
46808
- expires_at: {
46809
- description: 'Date and time at which the customer portal link expires.',
46810
- format: 'date-time',
46811
- type: 'string',
46812
- },
46813
- url: {
46814
- description: 'URL for the customer portal.',
46815
- format: 'uri',
46816
- type: 'string',
46817
- },
46818
- workspace_id: {
46819
- description: 'ID of the [workspace](https://docs.seam.co/latest/core-concepts/workspaces) associated with the customer portal.',
46820
- format: 'uuid',
46821
- type: 'string',
46822
- },
46823
- },
46824
- required: [
46825
- 'url',
46826
- 'customer_key',
46827
- 'expires_at',
46828
- 'workspace_id',
46829
- 'created_at',
46830
- ],
46831
- type: 'object',
46832
- 'x-route-path': '/customers',
46835
+ $ref: '#/components/schemas/customer_portal',
46833
46836
  },
46834
46837
  magic_link: { $ref: '#/components/schemas/magic_link' },
46835
46838
  ok: { type: 'boolean' },