@seamapi/types 1.804.0 → 1.806.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -18080,7 +18080,7 @@ export type Routes = {
18080
18080
 
18081
18081
  Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
18082
18082
 
18083
- To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems). */
18083
+ To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
18084
18084
  acs_access_group: {
18085
18085
  /** ID of the access group. */
18086
18086
  acs_access_group_id: string;
@@ -19428,7 +19428,7 @@ export type Routes = {
19428
19428
  acs_system_id?: string | undefined;
19429
19429
  /** Access method for the new credential. Supported values: `code`, `card`, `mobile_key`, `cloud_key`. */
19430
19430
  access_method: 'code' | 'card' | 'mobile_key' | 'cloud_key';
19431
- /** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview). */
19431
+ /** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides). */
19432
19432
  code?: string | undefined;
19433
19433
  /** Indicates whether the new credential is a [multi-phone sync credential](https://docs.seam.co/latest/capability-guides/mobile-access/issuing-mobile-credentials-from-an-access-control-system#what-are-multi-phone-sync-credentials). */
19434
19434
  is_multi_phone_sync_credential?: boolean;
@@ -22236,7 +22236,7 @@ export type Routes = {
22236
22236
 
22237
22237
  See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
22238
22238
 
22239
- To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems). */
22239
+ To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
22240
22240
  acs_encoder: {
22241
22241
  /** ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners. */
22242
22242
  acs_encoder_id: string;
@@ -26061,7 +26061,7 @@ export type Routes = {
26061
26061
 
26062
26062
  An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
26063
26063
 
26064
- For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems). */
26064
+ For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
26065
26065
  acs_user: {
26066
26066
  /** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
26067
26067
  acs_user_id: string;
@@ -26336,7 +26336,7 @@ export type Routes = {
26336
26336
 
26337
26337
  An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
26338
26338
 
26339
- For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems). */
26339
+ For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
26340
26340
  acs_user: {
26341
26341
  /** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
26342
26342
  acs_user_id: string;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@seamapi/types",
3
- "version": "1.804.0",
3
+ "version": "1.806.0",
4
4
  "description": "TypeScript types for the Seam API.",
5
5
  "type": "module",
6
6
  "main": "index.js",
@@ -178,7 +178,7 @@ export const acs_access_group = common_acs_access_group.extend({
178
178
 
179
179
  Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
180
180
 
181
- To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
181
+ To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
182
182
  `)
183
183
  export const unmanaged_acs_access_group = common_acs_access_group.extend({
184
184
  is_managed: z.literal(false),
@@ -91,7 +91,7 @@ export const acs_encoder = z.object({
91
91
 
92
92
  See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
93
93
 
94
- To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
94
+ To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
95
95
  `)
96
96
 
97
97
  export type AcsEncoder = z.infer<typeof acs_encoder>
@@ -332,7 +332,7 @@ export const acs_user = common_acs_user.merge(
332
332
 
333
333
  An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
334
334
 
335
- For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).
335
+ For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
336
336
  `)
337
337
 
338
338
  export const unmanaged_acs_user = common_acs_user.merge(
@@ -3066,7 +3066,7 @@ export default {
3066
3066
  },
3067
3067
  acs_access_group: {
3068
3068
  description:
3069
- 'Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).',
3069
+ 'Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
3070
3070
  properties: {
3071
3071
  access_group_type: {
3072
3072
  deprecated: true,
@@ -4104,7 +4104,7 @@ export default {
4104
4104
  },
4105
4105
  acs_encoder: {
4106
4106
  description:
4107
- 'Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).',
4107
+ 'Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
4108
4108
  properties: {
4109
4109
  acs_encoder_id: {
4110
4110
  description:
@@ -4971,7 +4971,7 @@ export default {
4971
4971
  },
4972
4972
  acs_user: {
4973
4973
  description:
4974
- 'Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems).',
4974
+ 'Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).',
4975
4975
  properties: {
4976
4976
  access_schedule: {
4977
4977
  description:
@@ -11306,6 +11306,48 @@ export default {
11306
11306
  'x-route-path': '/customers',
11307
11307
  'x-undocumented': 'Internal resource.',
11308
11308
  },
11309
+ customer_portal: {
11310
+ description:
11311
+ "Represents a Customer Portal. Customer Portal is a hosted, customizable interface for managing device access. It enables you to embed secure, pre-authenticated access flows into your product—either by sharing a link with users or embedding a view in an iframe.\n\nWith Customer Portal, you no longer need to build out frontend experiences for physical access, thermostats, and sensors. Instead, you can ship enterprise-grade access control experiences in a fraction of the time, while maintaining your product's branding and user experience.\n\nSeam hosts these flows, handling everything from account connection and device mapping to full-featured device control.",
11312
+ properties: {
11313
+ created_at: {
11314
+ description:
11315
+ 'Date and time at which the customer portal link was created.',
11316
+ format: 'date-time',
11317
+ type: 'string',
11318
+ },
11319
+ customer_key: {
11320
+ description: 'Customer key for the customer portal.',
11321
+ type: 'string',
11322
+ },
11323
+ expires_at: {
11324
+ description:
11325
+ 'Date and time at which the customer portal link expires.',
11326
+ format: 'date-time',
11327
+ type: 'string',
11328
+ },
11329
+ url: {
11330
+ description: 'URL for the customer portal.',
11331
+ format: 'uri',
11332
+ type: 'string',
11333
+ },
11334
+ workspace_id: {
11335
+ description:
11336
+ 'ID of the [workspace](https://docs.seam.co/latest/core-concepts/workspaces) associated with the customer portal.',
11337
+ format: 'uuid',
11338
+ type: 'string',
11339
+ },
11340
+ },
11341
+ required: [
11342
+ 'url',
11343
+ 'customer_key',
11344
+ 'expires_at',
11345
+ 'workspace_id',
11346
+ 'created_at',
11347
+ ],
11348
+ type: 'object',
11349
+ 'x-route-path': '/customers',
11350
+ },
11309
11351
  customization_profile: {
11310
11352
  description: 'A customization profile.',
11311
11353
  properties: {
@@ -42731,7 +42773,7 @@ export default {
42731
42773
  },
42732
42774
  code: {
42733
42775
  description:
42734
- 'Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview).',
42776
+ 'Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides).',
42735
42777
  pattern: '^\\d+$',
42736
42778
  type: 'string',
42737
42779
  },
@@ -51571,46 +51613,7 @@ export default {
51571
51613
  schema: {
51572
51614
  properties: {
51573
51615
  customer_portal: {
51574
- description:
51575
- "Represents a Customer Portal. Customer Portal is a hosted, customizable interface for managing device access. It enables you to embed secure, pre-authenticated access flows into your product—either by sharing a link with users or embedding a view in an iframe.\n\nWith Customer Portal, you no longer need to build out frontend experiences for physical access, thermostats, and sensors. Instead, you can ship enterprise-grade access control experiences in a fraction of the time, while maintaining your product's branding and user experience.\n\nSeam hosts these flows, handling everything from account connection and device mapping to full-featured device control.",
51576
- properties: {
51577
- created_at: {
51578
- description:
51579
- 'Date and time at which the customer portal link was created.',
51580
- format: 'date-time',
51581
- type: 'string',
51582
- },
51583
- customer_key: {
51584
- description: 'Customer key for the customer portal.',
51585
- type: 'string',
51586
- },
51587
- expires_at: {
51588
- description:
51589
- 'Date and time at which the customer portal link expires.',
51590
- format: 'date-time',
51591
- type: 'string',
51592
- },
51593
- url: {
51594
- description: 'URL for the customer portal.',
51595
- format: 'uri',
51596
- type: 'string',
51597
- },
51598
- workspace_id: {
51599
- description:
51600
- 'ID of the [workspace](https://docs.seam.co/latest/core-concepts/workspaces) associated with the customer portal.',
51601
- format: 'uuid',
51602
- type: 'string',
51603
- },
51604
- },
51605
- required: [
51606
- 'url',
51607
- 'customer_key',
51608
- 'expires_at',
51609
- 'workspace_id',
51610
- 'created_at',
51611
- ],
51612
- type: 'object',
51613
- 'x-route-path': '/customers',
51616
+ $ref: '#/components/schemas/customer_portal',
51614
51617
  },
51615
51618
  magic_link: { $ref: '#/components/schemas/magic_link' },
51616
51619
  ok: { type: 'boolean' },
@@ -20851,7 +20851,7 @@ export type Routes = {
20851
20851
 
20852
20852
  Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
20853
20853
 
20854
- To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems). */
20854
+ To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
20855
20855
  acs_access_group: {
20856
20856
  /** ID of the access group. */
20857
20857
  acs_access_group_id: string
@@ -22406,7 +22406,7 @@ export type Routes = {
22406
22406
  acs_system_id?: string | undefined
22407
22407
  /** Access method for the new credential. Supported values: `code`, `card`, `mobile_key`, `cloud_key`. */
22408
22408
  access_method: 'code' | 'card' | 'mobile_key' | 'cloud_key'
22409
- /** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview). */
22409
+ /** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides). */
22410
22410
  code?: string | undefined
22411
22411
  /** Indicates whether the new credential is a [multi-phone sync credential](https://docs.seam.co/latest/capability-guides/mobile-access/issuing-mobile-credentials-from-an-access-control-system#what-are-multi-phone-sync-credentials). */
22412
22412
  is_multi_phone_sync_credential?: boolean
@@ -25708,7 +25708,7 @@ export type Routes = {
25708
25708
 
25709
25709
  See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
25710
25710
 
25711
- To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems). */
25711
+ To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
25712
25712
  acs_encoder: {
25713
25713
  /** ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners. */
25714
25714
  acs_encoder_id: string
@@ -30210,7 +30210,7 @@ export type Routes = {
30210
30210
 
30211
30211
  An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
30212
30212
 
30213
- For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems). */
30213
+ For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
30214
30214
  acs_user: {
30215
30215
  /** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
30216
30216
  acs_user_id: string
@@ -30522,7 +30522,7 @@ export type Routes = {
30522
30522
 
30523
30523
  An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
30524
30524
 
30525
- For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides/overview#access-control-systems). */
30525
+ For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
30526
30526
  acs_user: {
30527
30527
  /** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
30528
30528
  acs_user_id: string