@seamapi/types 1.805.0 → 1.806.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/connect.cjs +7 -7
- package/dist/connect.cjs.map +1 -1
- package/dist/connect.d.cts +5 -5
- package/dist/index.cjs +7 -7
- package/dist/index.cjs.map +1 -1
- package/lib/seam/connect/models/acs/acs-access-group.js +1 -1
- package/lib/seam/connect/models/acs/acs-encoder.js +1 -1
- package/lib/seam/connect/models/acs/acs-users/acs-user.js +1 -1
- package/lib/seam/connect/openapi.js +4 -4
- package/lib/seam/connect/openapi.js.map +1 -1
- package/lib/seam/connect/route-types.d.ts +5 -5
- package/package.json +1 -1
- package/src/lib/seam/connect/models/acs/acs-access-group.ts +1 -1
- package/src/lib/seam/connect/models/acs/acs-encoder.ts +1 -1
- package/src/lib/seam/connect/models/acs/acs-users/acs-user.ts +1 -1
- package/src/lib/seam/connect/openapi.ts +4 -4
- package/src/lib/seam/connect/route-types.ts +5 -5
package/dist/connect.d.cts
CHANGED
|
@@ -155716,7 +155716,7 @@ type Routes = {
|
|
|
155716
155716
|
|
|
155717
155717
|
Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
|
|
155718
155718
|
|
|
155719
|
-
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
155719
|
+
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
155720
155720
|
acs_access_group: {
|
|
155721
155721
|
/** ID of the access group. */
|
|
155722
155722
|
acs_access_group_id: string;
|
|
@@ -157064,7 +157064,7 @@ type Routes = {
|
|
|
157064
157064
|
acs_system_id?: string | undefined;
|
|
157065
157065
|
/** Access method for the new credential. Supported values: `code`, `card`, `mobile_key`, `cloud_key`. */
|
|
157066
157066
|
access_method: 'code' | 'card' | 'mobile_key' | 'cloud_key';
|
|
157067
|
-
/** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
157067
|
+
/** Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides). */
|
|
157068
157068
|
code?: string | undefined;
|
|
157069
157069
|
/** Indicates whether the new credential is a [multi-phone sync credential](https://docs.seam.co/latest/capability-guides/mobile-access/issuing-mobile-credentials-from-an-access-control-system#what-are-multi-phone-sync-credentials). */
|
|
157070
157070
|
is_multi_phone_sync_credential?: boolean;
|
|
@@ -159872,7 +159872,7 @@ type Routes = {
|
|
|
159872
159872
|
|
|
159873
159873
|
See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
|
|
159874
159874
|
|
|
159875
|
-
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
159875
|
+
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
159876
159876
|
acs_encoder: {
|
|
159877
159877
|
/** ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners. */
|
|
159878
159878
|
acs_encoder_id: string;
|
|
@@ -163697,7 +163697,7 @@ type Routes = {
|
|
|
163697
163697
|
|
|
163698
163698
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
163699
163699
|
|
|
163700
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
163700
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
163701
163701
|
acs_user: {
|
|
163702
163702
|
/** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
|
|
163703
163703
|
acs_user_id: string;
|
|
@@ -163972,7 +163972,7 @@ type Routes = {
|
|
|
163972
163972
|
|
|
163973
163973
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
163974
163974
|
|
|
163975
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
163975
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems). */
|
|
163976
163976
|
acs_user: {
|
|
163977
163977
|
/** ID of the [access system user](https://docs.seam.co/latest/capability-guides/access-systems/user-management). */
|
|
163978
163978
|
acs_user_id: string;
|
package/dist/index.cjs
CHANGED
|
@@ -3216,7 +3216,7 @@ var acs_access_group = common_acs_access_group.extend({
|
|
|
3216
3216
|
|
|
3217
3217
|
Some access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
|
|
3218
3218
|
|
|
3219
|
-
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
3219
|
+
To learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
3220
3220
|
`);
|
|
3221
3221
|
var unmanaged_acs_access_group = common_acs_access_group.extend({
|
|
3222
3222
|
is_managed: zod.z.literal(false)
|
|
@@ -3633,7 +3633,7 @@ var acs_encoder = zod.z.object({
|
|
|
3633
3633
|
|
|
3634
3634
|
See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).
|
|
3635
3635
|
|
|
3636
|
-
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
3636
|
+
To verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
3637
3637
|
`);
|
|
3638
3638
|
var acs_entrance_capability_flags = zod.z.object({
|
|
3639
3639
|
can_unlock_with_mobile_key: zod.z.boolean().optional().describe(
|
|
@@ -4255,7 +4255,7 @@ var acs_user = common_acs_user.merge(
|
|
|
4255
4255
|
|
|
4256
4256
|
An access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
|
|
4257
4257
|
|
|
4258
|
-
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
4258
|
+
For details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).
|
|
4259
4259
|
`);
|
|
4260
4260
|
var unmanaged_acs_user = common_acs_user.merge(
|
|
4261
4261
|
zod.z.object({
|
|
@@ -9533,7 +9533,7 @@ var openapi_default = {
|
|
|
9533
9533
|
"x-route-path": "/access_methods"
|
|
9534
9534
|
},
|
|
9535
9535
|
acs_access_group: {
|
|
9536
|
-
description: "Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
9536
|
+
description: "Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.\n\nSome access control systems use [access group](https://docs.seam.co/latest/capability-guides/access-systems/user-management/assigning-users-to-access-groups), which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.\n\nTo learn whether your access control system supports access groups, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).",
|
|
9537
9537
|
properties: {
|
|
9538
9538
|
access_group_type: {
|
|
9539
9539
|
deprecated: true,
|
|
@@ -10461,7 +10461,7 @@ var openapi_default = {
|
|
|
10461
10461
|
"x-undocumented": "Deprecated. Will be removed."
|
|
10462
10462
|
},
|
|
10463
10463
|
acs_encoder: {
|
|
10464
|
-
description: "Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
10464
|
+
description: "Represents a hardware device that encodes [credential](https://docs.seam.co/latest/capability-guides/access-systems/managing-credentials) data onto physical cards within an [access control system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nSome access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:\n\n1. Credential creation\n Configure the access parameters for the credential.\n2. Card encoding\n Write the credential data onto the card using a compatible card encoder.\n\nSeparately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.\n\n See [Working with Card Encoders and Scanners](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners).\n\nTo verify if your access control system requires a card encoder, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).",
|
|
10465
10465
|
properties: {
|
|
10466
10466
|
acs_encoder_id: {
|
|
10467
10467
|
description: "ID of the [encoder](https://docs.seam.co/latest/capability-guides/access-systems/working-with-card-encoders-and-scanners.",
|
|
@@ -11218,7 +11218,7 @@ var openapi_default = {
|
|
|
11218
11218
|
"x-route-path": "/acs/systems"
|
|
11219
11219
|
},
|
|
11220
11220
|
acs_user: {
|
|
11221
|
-
description: "Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
11221
|
+
description: "Represents a [user](https://docs.seam.co/latest/capability-guides/access-systems/user-management) in an [access system](https://docs.seam.co/latest/capability-guides/access-systems).\n\nAn access system user typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.\n\nFor details about how to configure users in your access system, see the corresponding [system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides#access-control-systems).",
|
|
11222
11222
|
properties: {
|
|
11223
11223
|
access_schedule: {
|
|
11224
11224
|
description: "`starts_at` and `ends_at` timestamps for the [access system user's](https://docs.seam.co/latest/capability-guides/access-systems/user-management) access.",
|
|
@@ -45409,7 +45409,7 @@ var openapi_default = {
|
|
|
45409
45409
|
type: "object"
|
|
45410
45410
|
},
|
|
45411
45411
|
code: {
|
|
45412
|
-
description: "Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides
|
|
45412
|
+
description: "Access (PIN) code for the new credential. There may be manufacturer-specific code restrictions. For details, see the applicable [device or system integration guide](https://docs.seam.co/latest/device-and-system-integration-guides).",
|
|
45413
45413
|
pattern: "^\\d+$",
|
|
45414
45414
|
type: "string"
|
|
45415
45415
|
},
|